Nothing Special   »   [go: up one dir, main page]

Skip to main content

Workload Characterization of Stateful Networking Applications

  • Conference paper
High-Performance Computing (ISHPC 2005, ALPS 2006)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4759))

  • 810 Accesses

Abstract

The explosive and robust growth of the Internet owes a lot to the “end-to-end principle”, which pushes stateful operations to the end-points. The Internet grow both in traffic volume, and in the richness of the applications it supports. A whole new class of applications requires stateful processing.

This paper presents the first workload characterization of stateful networking applications. The analysis emphasizes the study of data cache behaviour. Nevertheless, we also discuss other issues, such as branch prediction, instruction distribution and ILP. Another important contribution is the study of the state categories of the networking applications. The results show an important memory bottleneck that involves new challenges to overcome.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Beale, J., Foster, J.C., Posluns, J., Caswell, B.: Snort 2.0 Intrusion Detection. Syngress Publishing Inc. (2003)

    Google Scholar 

  2. Coretez, G.: Fun with Packets: Designing a Stick, Draft White Paper on Stick, http://www.eurocompton.net/stick/

  3. Cisco IOS NetFlow. http://www.cisco.com/warp/public/732/Tech/nmp/netflow/index.shtml

  4. Argus - Auditing Network Activity. http://www.qosient.com/argus

  5. Snot V0.92 alpha. http://www.stolenshoes.net/sniph/snot-0.92a-README.txt

  6. Cooperative association for internet data analysis. www.caida.org

  7. The Computer Emergency Response Team. http://www.cert.org

  8. The System Administration, Networking and Security Organization. http://www.sans.org

  9. Chandra, P., Hady, F., Yavatkar, R., Bock, T., Cabot, M., Mathew, P.: Benchmarking network processors. In: Proc. NP1, Held in conjunction with HPCA-8, Cambridge, MA, USA (February 2002)

    Google Scholar 

  10. Kohler, E., Li, J., Paxson, V., Shenker, S.: Observed structure of addresses in IP traffic. In: Proc. of the 2nd ACM SIGCOMM Workshop on Internet measurment workshop, Pittsburgh, PA, USA (August 2002)

    Google Scholar 

  11. Kruegel, C., Valeur, F., Vigna, G., Kemmerer, R.: Stateful intrusion detection for high-speed networks. In: Proc. IEEE Symposium Security and Privacy, IEEE Computer Society Press, CA, USA (2002)

    Google Scholar 

  12. Lee, B.K., John, L.K.: Npbench: A benchmark suite for control plane and data plane applications for network processors. In: Proc. of ICCD, San Jose, CA, USA (October 2003)

    Google Scholar 

  13. Melvin, S., Nemirovsky, M., Musoll, E., Huynh, J., Milito, R., Urdaneta, H., Saraf, K.: A massively multithreaded packet processor. In: Proc. of NP2, Held in conjunction with HPCA-9, Anaheim, CA, USA (February 2003)

    Google Scholar 

  14. Memik, G., Mangione-Smith, W.H., Hu, W.: Netbench: A benchmarking suite for network processors. In: Proc. of ICCAD, San Jose, CA, USA (November 2001)

    Google Scholar 

  15. Nemirovsky, A.: Towards characterizing network processors: Needs and challenges. Xstream Logic Inc., white paper (2000)

    Google Scholar 

  16. National lab of applied network research. http://pma.nlanr.net/Traces

  17. Odlyzko, A.M.: Internet traffic growth: Sources and implications. In: Dingel, B.B., Weiershausen, W., Dutta, A.K., Sato, K.-I. (eds.) Proc. SPIE, Optical Transmission Systems and Equipment for WDM Networking II, vol. 5247 (September 2003)

    Google Scholar 

  18. Pang, R., Paxson, V.: A high-level programming environment for packet trace anonymization and transformation. In: Proc. of the ACM SIGCOMM Conference (August 2003)

    Google Scholar 

  19. Roesch, M.: Snort- lightweight intrusion detection for networks. In: LISA. Proc. of the 13th Conference on Systems Administration, Seattle, WA, USA (1999)

    Google Scholar 

  20. Schaelicke, L., Slabach, T., Moore, B., Freeland, C.: Characterizing the performance of network intrusion detection sensors. In: Proc. of RAID-6, Pittsburgh, PA, USA (September 2003)

    Google Scholar 

  21. Srivastava, A., Eustace, A.: ATOM - A system for building customized program analysis tools. In: Proc. ACM SIGPLAN Conf. on Programming Language Design and Implementation, pp. 196–205 (June 1994)

    Google Scholar 

  22. Tullsen, D.M.: Simulation and modeling of a simultaneous multithreading processor. In: 22nd Annual Computer Measurement Group Conference (December 1996)

    Google Scholar 

  23. Verdú, J., García, J., Nemirovsky, M., Valero, M.: Analysis of traffic traces for stateful applications. In: Proc. of NP3, Held in conjunction with HPCA-10, Madrid, Spain (February 2004)

    Google Scholar 

  24. Verdú, J., García, J., Nemirovsky, M., Valero, M.: The Impact of Traffic Aggregation on the Memory Performance of Networking Applications. In: Proc. of MEDEA Workshop, Held in conjunction with PACT-2004, France (September 2004)

    Google Scholar 

  25. Wolf, T., Franklin, M.A.: Commbench - a telecommunications benchmark for network processors. In: Proc. of ISPASS, Austin, TX, USA (April 2000)

    Google Scholar 

  26. Jimenez, D., Lin, C.: Neural methods for dynamic branch prediction. ACM Transactions on Computer Systems 20(4), 369–397 (2002)

    Article  Google Scholar 

  27. Vintan, L., Iridon, M.: Towards a high performance neural branch predictor. In: Proc. of IJCNN, vol. 2, pp. 868–873 (July 1999)

    Google Scholar 

  28. McFarling, S.: Combining Branch Predictors. Technical Report TN-36, Compaq Western Research Lab (June 1993)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Jesús Labarta Kazuki Joe Toshinori Sato

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Verdú, J., Nemirovsky, M., García, J., Valero, M. (2008). Workload Characterization of Stateful Networking Applications. In: Labarta, J., Joe, K., Sato, T. (eds) High-Performance Computing. ISHPC ALPS 2005 2006. Lecture Notes in Computer Science, vol 4759. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77704-5_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-77704-5_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-77703-8

  • Online ISBN: 978-3-540-77704-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics