2021 IFIP Networking Conference (IFIP Networking) 2021
DOI: 10.23919/ifipnetworking52078.2021.9472832
|View full text |Cite
|
Sign up to set email alerts
|

Boundaries of Flow Table Usage Reduction Algorithms Based on Elephant Flow Detection

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 34 publications
0
4
0
Order By: Relevance
“…The benchmark for assessment is the theoretical flow table occupancy reduction rate curves of a model that can perfectly predict the size of all flows from their first packet. This approach is detailed in [30] as the first method. The process involves selecting the smallest number of largest flows, ordered by size in descending order, which cumulatively accounts for a predetermined percentage of total network traffic.…”
Section: Resultsmentioning
confidence: 99%
“…The benchmark for assessment is the theoretical flow table occupancy reduction rate curves of a model that can perfectly predict the size of all flows from their first packet. This approach is detailed in [30] as the first method. The process involves selecting the smallest number of largest flows, ordered by size in descending order, which cumulatively accounts for a predetermined percentage of total network traffic.…”
Section: Resultsmentioning
confidence: 99%
“…This projection is predicated on the assumption of perfect prediction of each flow's size on its initial packet. This methodology, described in [35] as the first method, involves selecting the smallest subset of the largest flows, arranged by size in descending order, which collectively represent a predetermined percentage of the total network traffic.…”
Section: Flow Table Reduction Vs Traffic Coveragementioning
confidence: 99%
“…The phenomenon of elephant and mice flows can lead to poor network performance [2]. Limitations in storage and processing resources make it impossible to collect and monitor all network packets.…”
Section: A Backgroundmentioning
confidence: 99%
“…These flows are called elephant flows. The remaining flows, which are large in number but carry very little traffic, are called mice flows [2]. The latter carry most traffic in bytes, but most flows are mice.…”
Section: Introductionmentioning
confidence: 99%