2011 Proceedings IEEE INFOCOM 2011
DOI: 10.1109/infcom.2011.5934956
|View full text |Cite
|
Sign up to set email alerts
|

Mahout: Low-overhead datacenter traffic management using end-host-based elephant detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
172
0
2

Year Published

2017
2017
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 330 publications
(174 citation statements)
references
References 14 publications
0
172
0
2
Order By: Relevance
“…The remaining 10% of the services are elephant services. An elephant service requires a high amount of slots (ten times more than a mice), and its holding time is also larger in comparison with a mice service -video on demand and file transfer backup are common examples of elephant services [18].…”
Section: Accepted Manuscriptmentioning
confidence: 99%
“…The remaining 10% of the services are elephant services. An elephant service requires a high amount of slots (ten times more than a mice), and its holding time is also larger in comparison with a mice service -video on demand and file transfer backup are common examples of elephant services [18].…”
Section: Accepted Manuscriptmentioning
confidence: 99%
“…B4 [12] allows to define application priority and uses multipath routing/tunneling to optimize link usage. Mahout [6] detects elephant flows at the end hosts and uses placement algorithms to compute paths for them. NoF [21] raises the network programming level by allowing the application specialists to program the network through high-level constructs.…”
Section: Background and Related Workmentioning
confidence: 99%
“…The existing works using SDN for forwarding communications through multiple paths use information collected from end-hosts or network devices [2], [6], [12]. To our knowledge, this is the first work using the well-behaved patterns expressed by SciApps to forward their communication flows through multiple network paths, considering latency and bandwidth requirements.…”
Section: Introductionmentioning
confidence: 99%
“…3 To reduce the workload and improve the efficiency on control plane, many elephant flow detection approaches had been proposed by several studies. [6][7][8][9][10][11] These elephant flow detection methods can be classified into 4 categories: (1) pull-based statistics, [6][7][8] (2) host-based trigger, 9 (3) sampling, 10 and (4) host-based detection. 11 All these methodologies mentioned are preconfigured with a fixed value, which will cause a lot of false positive errors and false negative errors.…”
Section: Introductionmentioning
confidence: 99%
“…[6][7][8][9][10][11] These elephant flow detection methods can be classified into 4 categories: (1) pull-based statistics, [6][7][8] (2) host-based trigger, 9 (3) sampling, 10 and (4) host-based detection. 11 All these methodologies mentioned are preconfigured with a fixed value, which will cause a lot of false positive errors and false negative errors. For example, the traffic of a flow in daytime is much less than that in night so that the detection system will possibly regard all the flows as mice flows in daytime while regard those as elephant flows in night.…”
Section: Introductionmentioning
confidence: 99%