2020 6th IEEE Conference on Network Softwarization (NetSoft) 2020
DOI: 10.1109/netsoft48620.2020.9165447
|View full text |Cite
|
Sign up to set email alerts
|

Pythia: Scheduling of Concurrent Network Packet Processing Applications on Heterogeneous Devices

Abstract: Modern commodity computing systems are composed of a number of heterogeneous processing units, each one with its own unique performance and energy characteristics. However, the majority of current network packet processing frameworks targets only one device (either the CPU or an accelerator), leaving the remaining computational resources underutilized or even idle. In this paper, we propose an adaptive scheduling approach for network packet processing applications that exploits any heterogeneous architecture t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
2
2

Relationship

3
1

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…b) Heterogeneous processing environments. : The architectural heterogeneity in commodity computing systems has led many researchers to explore their abilities on different applications and workloads [19], [20], [21], [22], [23], [24], [25], [26], [27]. The performance ranking of different devices has been shown to have wide variations when executing different classes of network applications [19], [21], [22].…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…b) Heterogeneous processing environments. : The architectural heterogeneity in commodity computing systems has led many researchers to explore their abilities on different applications and workloads [19], [20], [21], [22], [23], [24], [25], [26], [27]. The performance ranking of different devices has been shown to have wide variations when executing different classes of network applications [19], [21], [22].…”
Section: Discussionmentioning
confidence: 99%
“…: The architectural heterogeneity in commodity computing systems has led many researchers to explore their abilities on different applications and workloads [19], [20], [21], [22], [23], [24], [25], [26], [27]. The performance ranking of different devices has been shown to have wide variations when executing different classes of network applications [19], [21], [22]. To capture the performance variability effect, it is important to perform in-field studies and quantitative evaluation of the different processing units [26], [27].…”
Section: Discussionmentioning
confidence: 99%
“…Furthermore, Papadogiannaki et al [30] proposed a scheduling approach that, based on performance policies (such as high throughput or low power consumption), determines the most suitable combination of heterogeneous devices (i.e., CPU, integrated, or discrete GPUs) for efficient execution of network packet processing workloads (such as DPI or packet encryption). Similarly, in Pythia [31,32], authors add the support for concurrent execution of different network packet processing applications across multiple and heterogeneous devices. In APUNet [33], authors propose the utilization of integrated GPUs to accelerate packet processing workloads without paying the overheads of memory transactions between the host and discrete GPUs.…”
Section: Gpu-based Pattern Matchingmentioning
confidence: 99%
“…Popular network intrusion detection system (NIDS) solutions like Snort [22] and Suricata [21] utilize pattern matching and regular expressions in order to analyze network traffic while Zeek/Bro [23] utilizes scripts that allow easier automation. The research community has also put effort into improving the performance of NIDS using either commodity hardware, such as graphics processing units (GPUs) [69,70,76,116,138,[152][153][154][155] and parallel nodes [117,149], or specialized hardware, such as ternary content-addressable memories (TCAMs), application-specific integrated circuits (ASICs), and field-programmable gate array (FPGAs) [47,99,141,169]. However, these works are able to process network traffic that is unencrypted, since they extract meaningful information from network packet payload content.…”
Section: Network Traffic Processing and Inspectionmentioning
confidence: 99%