2018
DOI: 10.1016/j.jnca.2018.02.018
|View full text |Cite
|
Sign up to set email alerts
|

Towards load-balanced service chaining by Hash-based Traffic Steering on Softswitches

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 7 publications
0
5
0
Order By: Relevance
“…A general observation in the HH classification literature is that there is no consensus on what feature or set of features (e.g., size, duration, and rate) should be selected. In consequence, some techniques rely on size 7,8,63,[83][84][85] while other approaches use rate 50,69,86 or duration 50,51 as a threshold. Other features such as the number of packets transmitted in the flow 52 and specific data structures 87 are also used as a threshold.…”
Section: Challenges Of Threshold-based Classificationmentioning
confidence: 99%
“…A general observation in the HH classification literature is that there is no consensus on what feature or set of features (e.g., size, duration, and rate) should be selected. In consequence, some techniques rely on size 7,8,63,[83][84][85] while other approaches use rate 50,69,86 or duration 50,51 as a threshold. Other features such as the number of packets transmitted in the flow 52 and specific data structures 87 are also used as a threshold.…”
Section: Challenges Of Threshold-based Classificationmentioning
confidence: 99%
“…In other words, when two elephant flows have the same hash value, they may share the same link or instance, which will cause the shared link or instance to be heavily loaded, even though the others' loads are light. Although the HATS-Flowcell algorithm, presented in paper [27], was designed to solve this problem of hash collision, this algorithm incurs problems involving packet reordering.…”
Section: A Motivationmentioning
confidence: 99%
“…However, the ECMP approach may cause the hash collision of elephant flows when the hash values of different elephant flows are not considered. To solve the problem of service chaining in a DCN, in the method presented in [27], VNF instances are selected and paths are constructed at soft edge switches by hashing packet headers instead of triggering the centralized controller. In this way, the number of flow entries in the system is reduced while achieving network and VNF load balancing.…”
Section: Sfc Mapping By Utilizing Multiple Pathsmentioning
confidence: 99%
See 1 more Smart Citation
“…Finally, updates in the monitoring module do not trigger any changes in other components. The proposed standalone monitoring module could be used to feed monitoring information to a service orchestrator, or to a traffic steering mechanism operating over complex infrastructures comprising both network and computing resources (as, for example, presented in [8]). Additionally, our solution may be useful to discover the limitations and real performance of a virtualized infrastructure managed and controlled by a third-party provider.…”
Section: Introductionmentioning
confidence: 99%