Proceedings Sixth International Conference on Network Protocols (Cat. No.98TB100256)
DOI: 10.1109/icnp.1998.723750
|View full text |Cite
|
Sign up to set email alerts
|

Distributed packet rewriting and its application to scalable server architectures

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
23
0

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 53 publications
(23 citation statements)
references
References 11 publications
0
23
0
Order By: Relevance
“…The IMX scenario is different from web and call server scenarios, since IMX nodes will always stay in the path for processing or policing tasks. A problem closer to the IMX scenario is presented in [8], where web servers forward new connections to other servers by rewriting addresses directly in the network stack. However, the resource allocation mechanism statically forwards a fix rate of requests, which is inappropriate for IMX where relocation is more costly.…”
Section: B Differences To Server Clustersmentioning
confidence: 99%
See 1 more Smart Citation
“…The IMX scenario is different from web and call server scenarios, since IMX nodes will always stay in the path for processing or policing tasks. A problem closer to the IMX scenario is presented in [8], where web servers forward new connections to other servers by rewriting addresses directly in the network stack. However, the resource allocation mechanism statically forwards a fix rate of requests, which is inappropriate for IMX where relocation is more costly.…”
Section: B Differences To Server Clustersmentioning
confidence: 99%
“…Even in the ideal case, there are free resources at IMX2 when IMX1 blocks, which is an intended property that avoids overloading remote nodes by relocating calls to them up to their limit. From Figure 5, we can derive the following relations: Full utilization in IMX1 (7), utilization in IMX2 (8), and (9) from comparing occupation of IMX1 and IMX2.…”
Section: B Considerations For the Ideal And Static Casementioning
confidence: 99%
“…From Table 1, we can immediately notice that hashing does an extremely good job in scattering flows. In fact, a load balancing system relying mainly on flow distribution, e.g., web servers [5] , works very well with static hashing. But hashing is not so effective in distributing packets as shown in Table 2 and is even worse for distributing bytes as shown in Table 3 .…”
Section: 2mentioning
confidence: 99%
“…Distributed packet rewriting is similar to packet rewriting (Bestavros, Crovella, Liu, and Martin, 1998). When a packet reaches a server, the server uses a hash function to calculate the packet's destination by the use of the client's IP address and port number to determine to which server the packet should be redirected.…”
Section: Request Redirection Mechanismsmentioning
confidence: 99%