Workshop on End-to-End Monitoring Techniques and Services, 2005.
DOI: 10.1109/e2emon.2005.1564468
|View full text |Cite
|
Sign up to set email alerts
|

nCap: wire-speed packet capture and transmission

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
36
0
1

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 64 publications
(38 citation statements)
references
References 3 publications
1
36
0
1
Order By: Relevance
“…Researchers have demonstrated that packet capture, the cornerstone of the majority of passive monitoring applications, can be substantially improved by enhancing general purpose operating systems for traffic analysis [11,12,26]. These results are encouraging because today's commodity hardware offers features and performance that just a few years ago were only provided by costly custom hardware design.…”
Section: Introductionmentioning
confidence: 58%
“…Researchers have demonstrated that packet capture, the cornerstone of the majority of passive monitoring applications, can be substantially improved by enhancing general purpose operating systems for traffic analysis [11,12,26]. These results are encouraging because today's commodity hardware offers features and performance that just a few years ago were only provided by costly custom hardware design.…”
Section: Introductionmentioning
confidence: 58%
“…Commercial products such as DAG Packet Capture Cards [9] are designed for zero-loss packet capture. Besides commercial solutions, the nCap architecture is presented to create a straight path from the network adapter to the user-space by means of memory mapping for wire-speed packet capture [10]. Although highperformance packet capture is not the purpose of this work, this work can adopt these solutions if the live environment is a high-speed network.…”
Section: Related Workmentioning
confidence: 99%
“…If this happens, then regardless of clock method the results will be compromised. An ideal solution is to use the TSC method in combination with code that is executed by the kernel, for instance the network driver [17,18] where scheduling effects can be minimized.…”
Section: Timestampsmentioning
confidence: 99%