Estimating Logarithmic and Exponential Functions to Track Network Traffic Entropy in P4

被引:27
作者
Ding, Damu [1 ,2 ]
Savi, Marco [1 ]
Siracusa, Domenico [1 ]
机构
[1] Fdn Bruno Kessler, CREATE NET Res Ctr, Trento, Italy
[2] Univ Bologna, Bologna, Italy
来源
NOMS 2020 - PROCEEDINGS OF THE 2020 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM 2020: MANAGEMENT IN THE AGE OF SOFTWARIZATION AND ARTIFICIAL INTELLIGENCE | 2020年
关键词
D O I
10.1109/noms47738.2020.9110257
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The evaluation of network traffic entropy is very useful for management purposes, since it helps to keep track of changes in network flow distribution. Nowadays, network traffic entropy is usually estimated in centralized monitoring collectors, which require a significant amount of information to be retrieved from switches. The advent of programmable data planes in Software-Defined Networks helps mitigate this issue, opening the door to the possibility of estimating entropy directly in the switches' data plane. Unfortunately, the most widely-adopted programming language used to program the data plane, called P4, lacks supporting many arithmetic operations such as logarithm and exponential function computation, which are necessary for entropy estimation. In this paper we propose two new algorithms, called P4Log and P4Exp, to fill this gap: these algorithms can estimate logarithms and exponential functions with a given precision by only using P4-supported arithmetic operations. Additionally, we leverage them to propose a novel strategy, called P4Entropy, to estimate traffic entropy entirely in the switch data plane. Results show that P4Entropy has comparable accuracy as an existing solution but without (i) constraining the number of packets in an observation interval and (ii) requiring the usage of TCAM, which is a scarce resource.
引用
收藏
页数:9
相关论文
共 25 条
[1]  
[Anonymous], 2005, P 5 ACM SIGCOMM C IN
[2]  
Berezinski P, 2014, LECT NOTES COMPUT SC, V8838, P465, DOI 10.1007/978-3-662-45237-0_43
[3]   Programming Protocol-Independent Packet Processors [J].
Bosshart, Pat ;
Daly, Dan ;
Gibb, Glen ;
Izzard, Martin ;
McKeown, Nick ;
Rexford, Jennifer ;
Schlesinger, Cole ;
Talayco, Dan ;
Vahdat, Amin ;
Varghese, George ;
Walker, David .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2014, 44 (03) :87-95
[4]  
Cardoso Lapolli Angelo, 2019, 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), P19
[5]   Finding frequent items in data streams [J].
Charikar, M ;
Chen, K ;
Farach-Colton, M .
THEORETICAL COMPUTER SCIENCE, 2004, 312 (01) :3-15
[6]  
Cormode G., 2009, Encyclopedia of Database Systems, P511, DOI DOI 10.1007/978-0-387-39940-9_87
[7]  
Cormode G., 2011, Foundations and Trends in Databases
[8]  
Ding DM, 2019, PROCEEDINGS OF THE 2019 IEEE CONFERENCE ON NETWORK SOFTWARIZATION (NETSOFT 2019), P160, DOI [10.1109/netsoft.2019.8806649, 10.1109/NETSOFT.2019.8806649]
[9]  
Flajolet P., 2007, P DISCR MATH THEOR C, P137, DOI [10.46298/dmtcs.3545, DOI 10.46298/DMTCS.3545]
[10]   SketchVisor: Robust Network Measurement for Soft ware Packet Processing [J].
Huang, Qun ;
Jin, Xin ;
Lee, Patrick P. C. ;
Li, Runhui ;
Tang, Lu ;
Chen, Yi-Chao ;
Zhang, Gong .
SIGCOMM '17: PROCEEDINGS OF THE 2017 CONFERENCE OF THE ACM SPECIAL INTEREST GROUP ON DATA COMMUNICATION, 2017, :113-126