International Conference on Passive and Active Network Measurement

PAM 2009: Passive and Active Network Measurement pp 197-206

Empirical Evaluation of Hash Functions for PacketID Generation in Sampled Multipoint Measurements

  • Christian Henke
  • Carsten Schmoll
  • Tanja Zseby
Conference paper

DOI: 10.1007/978-3-642-00975-4_20

Volume 5448 of the book series Lecture Notes in Computer Science (LNCS)
Cite this paper as:
Henke C., Schmoll C., Zseby T. (2009) Empirical Evaluation of Hash Functions for PacketID Generation in Sampled Multipoint Measurements. In: Moon S.B., Teixeira R., Uhlig S. (eds) Passive and Active Network Measurement. PAM 2009. Lecture Notes in Computer Science, vol 5448. Springer, Berlin, Heidelberg

Abstract

A broad spectrum of network measurement applications demand for multipoint measurements; e.g. one-way delay measurements or packets path tracing. A passive multipoint measurement technique is realized by generating a timestamp and a packet identifier (ID) for each packet traversing an observation point and sending this information to a common collector. The packet ID can be provided by using parts of the packet or generating a digest of the packet content. Multipoint measurements demand for high resource measurement infrastructure. Random packet selection techniques can reduce the resource consumption while still maintaining sufficient information about most metrics. Nevertheless random packet selection cannot be used for multipoint measurements, because the packets selection decisions on its path can differ. Hash-based selection is a deterministic passive multipoint measurement technique that emulates random selection and enables the correlation of a selected subset of packets at different measurement points. The selection decision is based on a hash value over invariant parts of the packet.

When hash-based selection is applied two hash values are generated - one on which the selection decision is based and a second one that is used as the packet ID. In a previous paper we already evaluated hash functions for hash-based selection. In this paper we analyze hash functions for packet ID generation. Other authors recommend the use of two different hash values for both operations - we show that in certain scenarios it is more efficient to use only one hash value.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Christian Henke
    • 1
  • Carsten Schmoll
    • 1
  • Tanja Zseby
    • 1
  1. 1.Fraunhofer Institute FokusBerlinGermany