Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication 2015
DOI: 10.1145/2785956.2787493
|View full text |Cite
|
Sign up to set email alerts
|

Enabling End-Host Network Functions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 40 publications
(6 citation statements)
references
References 44 publications
0
6
0
Order By: Relevance
“…This means that, in a DDoS mitigation scenario, packets belonging to legitimate sources have to be inserted back into the kernel, causing unnecessary packet copies that slow down the performance. 1 Furthermore, these frameworks require the fixed allocation of one (or more) CPU cores to the above programs, independently from the presence of an ongoing attack, hence reducing the performance-cost ratio, as precious CPU resources are no longer available for normal processing tasks (e.g., virtual machines).…”
Section: ) Host-based Mitigationmentioning
confidence: 99%
See 1 more Smart Citation
“…This means that, in a DDoS mitigation scenario, packets belonging to legitimate sources have to be inserted back into the kernel, causing unnecessary packet copies that slow down the performance. 1 Furthermore, these frameworks require the fixed allocation of one (or more) CPU cores to the above programs, independently from the presence of an ongoing attack, hence reducing the performance-cost ratio, as precious CPU resources are no longer available for normal processing tasks (e.g., virtual machines).…”
Section: ) Host-based Mitigationmentioning
confidence: 99%
“…With the recent trend of ''network softwarization'', promoted by emerging technologies such as Network Function Virtualization (NFV) and Software Defined Networking (SDN), system administrators of data center and enterprise networks have started to replace dedicated hardware-based middleboxes with virtualized Network Functions (NFs) running on commodity servers and end hosts [1]- [6]. This radical change has facilitated the provisioning of advanced and flexible network services, ultimately helping the system administrators to cope with the rapid changes on service requirements and networking workloads.…”
Section: Introductionmentioning
confidence: 99%
“…Also, rather than modifying network switches, a recent hardware trend towards programmable NICs [2,25] could allow the proposer and acceptor logic to run at the network edge, on programmable NICs that provide high-speed processing at minimal latencies (tens of µs). Via the PICe bus, the programmable NIC could communicate to the host OS and obtain access to permanent storage.…”
Section: Paxos In Sdn Switchesmentioning
confidence: 99%
“…Some of these proposals focus on providing per-flow fairness [18,20,34] with various network-level objectives, such as minimizing per-packet latency [25] or flow completion time [5,6,44] using network-level properties, such as flow size or deadlines [5,6,13,25,44,55]. Other works aim to provide isolation among tenants or applications when running in shared datacenters [11,12,23,27,32,48,57].…”
Section: Introductionmentioning
confidence: 99%