完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.author | Lin, Yi-Neng | en_US |
dc.contributor.author | Chang, Yao-Chung | en_US |
dc.contributor.author | Lin, Ying-Dar | en_US |
dc.contributor.author | Lai, Yuan-Chen | en_US |
dc.date.accessioned | 2014-12-08T15:13:47Z | - |
dc.date.available | 2014-12-08T15:13:47Z | - |
dc.date.issued | 2007-07-01 | en_US |
dc.identifier.issn | 0164-1212 | en_US |
dc.identifier.uri | http://dx.doi.org/10.1016/j.jss.2007.01.032 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/10657 | - |
dc.description.abstract | Networking applications with high memory access overhead gradually exploit network processors that feature multiple hardware multithreaded processor cores along with a versatile memory hierarchy. Given rich hardware resources, however, the performance depends on whether those resources are properly allocated. In this work, we develop an NIPS (Network Intrusion Prevention System) edge gateway over the Intel IXP2400 by characterizing/mapping the processing stages onto hardware components. The impact and strategy of resource allocation are also investigated through internal and external benchmarks. Important conclusions include: (1) the system throughput is influenced mostly by the total number of threads, namely I x J, where I and J represent the numbers of processors and threads per processor, respectively, as long as the processors are not fully utilized, (2) given an application, algorithm and hardware specification, an appropriate (1, J) for packet inspection can be derived and (3) the effectiveness of multiple memory banks for tackling the SRAM bottleneck is affected considerably by the algorithms adopted. (C) 2007 Elsevier Inc. All rights reserved. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | network intrusion and detection system | en_US |
dc.subject | network processor | en_US |
dc.subject | resource allocation | en_US |
dc.subject | benchmark | en_US |
dc.subject | bottleneck | en_US |
dc.title | Resource allocation in network processors for network intrusion prevention systems | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1016/j.jss.2007.01.032 | en_US |
dc.identifier.journal | JOURNAL OF SYSTEMS AND SOFTWARE | en_US |
dc.citation.volume | 80 | en_US |
dc.citation.issue | 7 | en_US |
dc.citation.spage | 1030 | en_US |
dc.citation.epage | 1036 | en_US |
dc.contributor.department | 資訊工程學系 | zh_TW |
dc.contributor.department | Department of Computer Science | en_US |
dc.identifier.wosnumber | WOS:000247453800011 | - |
dc.citation.woscount | 0 | - |
顯示於類別: | 期刊論文 |