參考文獻 |
[1] R. Singh, None Vibha, R. Mishra, Rani Nandkishor Aher, Avishek Ghosal, and N. Chakraborty, “A Survey on Cloud Computing Approaches,” Nov. 2023, doi: https://doi.org/10.1109/iccsai59793.2023.10421324.
[2] “Global Load Balancer Market Size, Share, Growth Analysis, By Component (Hardware, Software), By Service (Training and Consulting, Integration and Deployment), By Type (Local Load Balancer, and Global Load Balancer ), By Deployment (Cloud, and On-premise ),” www.giiresearch.com. https://www.giiresearch.com/report/sky1373831-global-load-balancer-market-size-share-growth.html (accessed Jun. 12, 2024).
[3] T. Loba, N. Konate, M. R. Batiebo, and R. D. J. Bita, “Development of a web server load balancing system,” International Journal of Innovation and Applied Studies, vol. 41, no. 3, pp. 859–866, Jan. 2024, Accessed: Jun. 12, 2024. [Online]. Available: https://ijias.issr-journals.org/abstract.php?article=IJIAS-23-330-09
[4] P. Bosshart et al., “P4,” ACM SIGCOMM Computer Communication Review, vol. 44, no. 3, pp. 87–95, Jul. 2014, doi: https://doi.org/10.1145/2656877.2656890.
[5] Mohammad Rifki Baihaqi, Ridha Muldina Negara, and R. Tulloh, “Analysis of Load Balancing Performance using Round Robin and IP Hash Algorithm on P4,” Dec. 2022, doi: https://doi.org/10.1109/isriti56927.2022.10052975.
[6] M. Hamdan et al., “A comprehensive survey of load balancing techniques in software-defined network,” Journal of Network and Computer Applications, vol. 174, p. 102856, Jan. 2021, doi: https://doi.org/10.1016/j.jnca.2020.102856.
[7] M. Coluzzi, A. Brocco, Patrizio Contu, and Tiziano Leidi, “A survey and comparison of consistent hashing algorithms,” Apr. 2023, doi: https://doi.org/10.1109/ispass57527.2023.00048.
[8] Maria Manuela Silva, P. Nielsen, N. Bay, and Paulo A.F. Martins, “Failure mechanisms in single-point incremental forming of metals,” vol. 56, no. 9–12, pp. 893–903, Jun. 2011, doi: https://doi.org/10.1007/s00170-011-3254-1.
[9] L. Tan et al., “In-band Network Telemetry: A Survey,” Computer Networks, vol. 186, p. 107763, Feb. 2021, doi: https://doi.org/10.1016/j.comnet.2020.107763.
[10] D. Kreutz, F. M. V. Ramos, P. Esteves Verissimo, C. Esteve Rothenberg, S. Azodolmolky, and S. Uhlig, “Software-Defined Networking: A Comprehensive Survey,” Proceedings of the IEEE, vol. 103, no. 1, pp. 14–76, Jan. 2015, doi: https://doi.org/10.1109/jproc.2014.2371999.
[11] ONF Solution Brief, "OpenFlow-Enabled SDN and Network Functions Virtualization," Open Netw. Found, vol. 17, pp. 1-12, 2014.
[12] A. Lara, A. Kolasani, and B. Ramamurthy, “Network Innovation using OpenFlow: A Survey,” IEEE Communications Surveys & Tutorials, vol. 16, no. 1, pp. 493–512, 2014, doi: https://doi.org/10.1109/surv.2013.081313.00105.
[13] C. Partridge, J. Hughes, and J. Stone, “Performance of checksums and CRCs over real data,” ACM SIGCOMM Computer Communication Review, vol. 25, no. 4, pp. 68–76, Oct. 1995, doi: https://doi.org/10.1145/217391.217413.
[14] M. Menth, H. Mostafaei, D. Merling, and M. Häberle, “Implementation and Evaluation of Activity-Based Congestion Management Using P4 (P4-ABC),” Future Internet, vol. 11, no. 7, p. 159, Jul. 2019, doi: https://doi.org/10.3390/fi11070159. “P4: Programming Networks Forwarding Plane,” VOLANSYS, Aug. 17, 2018. https://www.volansys.com/blog/p4-programming-networks-forwarding-plane/ (accessed Jun. 13, 2024).
[15] "P4: Programming Networks Forwarding Plane" Accessed on: May 23, 2023. [Online]. Available: https://www.volansys.com/blog/p4-programming-networks-forwarding-plane/
[16] T. Barbette et al., “A High-Speed Load-Balancer Design with Guaranteed Per-Connection-Consistency,” pp. 667–683, Jan. 2020.
[17] E. Jafarnejad Ghomi, A. Masoud Rahmani, and N. Nasih Qader, “Load-balancing algorithms in cloud computing: A survey,” Journal of Network and Computer Applications, vol. 88, pp. 50–71, Jun. 2017, doi: https://doi.org/10.1016/j.jnca.2017.04.007.
[18] Y. Sato, Y. Namba, and H. Nishi, “Layer-7 and 5-Tuple Information Analysis Framework for Providing Positional Flexibility In Location Determination for Service Provision,” Oct. 2023, doi: https://doi.org/10.1109/iecon51785.2023.10311793.
[19] J. S. Chase, D. C. Anderson, P. N. Thakar, A. M. Vahdat, and R. P. Doyle, “Managing energy and server resources in hosting centers,” ACM SIGOPS Operating Systems Review, vol. 35, no. 5, p. 103, Dec. 2001, doi: https://doi.org/10.1145/502059.502045.
[20] None Hailong Zhang, None Xiao Guo, None Jinyao Yan, None Bo Liu, and None Qianjun Shuai, “SDN-based ECMP algorithm for data center networks,” Oct. 2014, doi: https://doi.org/10.1109/comcomap.2014.7017162.
[21] C. Avin, K. Mondal, and S. Schmid, “Demand-Aware Network Design With Minimal Congestion and Route Lengths,” IEEE/ACM transactions on networking, vol. 30, no. 4, pp. 1838–1848, Aug. 2022, doi: https://doi.org/10.1109/tnet.2022.3153586.
[22] C. Rizzi, Z. Yao, Yoann Desmouceaux, M. Townsley, and T. Clausen, “Charon: Load-Aware Load-Balancing in P4,” arXiv (Cornell University), Oct. 2021, doi: https://doi.org/10.23919/cnsm52442.2021.9615535.
[23] “A randomized least-connection first layer-4 load balancer using P4 switch, Jul. 28, 2020. https://hdl.handle.net/11296/3b5arp (accessed Jun. 13, 2024).
[24] D. E. Eisenbud et al., “Maglev: a fast and reliable software network load balancer,” pp. 523–535, Mar. 2016.
[25] M. Kulkarni, B. Goswami, and J. Paulose, “P4 based Load Balancing Strategies for Large Scale Software-Defined Networks,” IEEE Xplore, Apr. 01, 2022. https://ieeexplore.ieee.org/abstract/document/9807999 (accessed Jun. 13, 2024).
[26] Benoit Pit-Claudel, Yoann Desmouceaux, P. Pfister, M. Townsley, and T. Clausen, “Stateless Load-Aware Load Balancing in P4,” HAL (Le Centre pour la Communication Scientifique Directe), Sep. 2018, doi: https://doi.org/10.1109/icnp.2018.00058.
[27] C. Filsfils, S. Previdi, L. Ginsberg, B. Decraene, S. Litkowski, and R. Shakir, “Segment Routing Architecture,” www.rfc-editor.org, Jul. 2018, doi: https://doi.org/10.17487/RFC8402.
[28] “GitHub - p4lang/behavioral-model: The reference P4 software switch,” GitHub. https://github.com/p4lang/behavioral-model (accessed Jun. 13, 2024)
[29] C. L. Schuba, I. V. Krsul, M. G. Kuhn, E. H. Spafford, A. Sundaram, and D. Zamboni, “Analysis of a denial of service attack on TCP,” Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097), 1997, doi: https://doi.org/10.1109/secpri.1997.601338.
[30] V. Akoto-Adjepong, “An Enhanced Non- Cryptographic Hash Function,” ir.knust.edu.gh, Sep. 2016, Accessed: Jun. 13, 2024. [Online]. Available: https://ir.knust.edu.gh/items/71431c56-89e5-45ed-8e9e-699435f48b54
[31] K. Kaur, M. Kaur, K. Kaur, and A. Madaan, "A Comparative Study of OSI and TCP/IP Models," International Journal of Engineering and Management Research, vol. 13, no. 2, pp. 127-135, 2023.
[32] “In-band Network Telemetry — What Is It All About? CodiLime,” CodiLime, Jan. 30, 2023. https://codilime.com/blog/in-band-network-telemetry-what-is-it-all-about/ (accessed Jun. 13, 2024).
[33] V. Henson, “An Analysis of Compare-by-hash,” www.usenix.org, 2003. https://www.usenix.org/conference/hotos-ix/analysis-compare-hash
[34] P. Saxena, “Analysis of Various Hash Function,” International Journal of Innovative Science and Research Technology, vol. 3, no. 5, 2018, Accessed: Jun. 13, 2024. [Online]. Available: https://ijisrt.com/wp-content/uploads/2018/05/Analysis-Of-Various-Hash-Function.pdf
[35] “The murmur hashing algorithm,” KeiruaProd, Apr. 02, 2023. https://www.keiruaprod.fr/blog/2023/04/02/the-murmur-hashing-algorithm.html (accessed Jun. 13, 2024).
[36] M. Xiang, Y. Jiang, Z. Xia, and C. Huang, “Consistent hashing with bounded loads and virtual nodes-based load balancing strategy for proxy cache cluster,” Cluster Computing, vol. 23, no. 4, pp. 3139–3155, Feb. 2020, doi: https://doi.org/10.1007/s10586-020-03076-4.
[37] GeeksforGeeks, “TCP 3-way handshake process,” GeeksforGeeks, Oct. 26, 2021. https://www.geeksforgeeks.org/tcp-3-way-handshake-process/(accessed Jun. 13, 2024).
[38] “Ethernet Protocol — Computer Networking 0.5 documentation,” cot-cn.cougarnet.uh.edu. https://cot-cn.cougarnet.uh.edu/docs/compnet/012-ethernet.html(accessed Jun. 13, 2024).
[39] "p4-utils", Accessed on July 13, 2024. [Online]. Available: https://github.com/nsg-ethz/p4-utils
[40] "mininet", Accessed on July 13, 2024. [Online]. Available: http://mininet.org/
[41] "Scapy", Accessed on July 13, 2024. [Online]. Available: https://scapy.readthedocs.io/en/latest/
[42] "Wireshark", Accessed on July 13, 2024. [Online]. Available: https://www.wireshark.org/
[43] "iperf", Accessed on July 12, 2024. [Online]. Available: https://iperf.fr/
[44] "Ping", Accessed on July 12, 2024. [Online]. Available: https://www.man7.org/linux/man-pages/man8/ping.8.html
[45] H. Handschuh, “SHA Family (Secure Hash Algorithm),” Encyclopedia of Cryptography and Security, pp. 565–567, 2020, doi: https://doi.org/10.1007/0-387-23483-7_388.
[46] C. Hayes, “Non-Cryptographic Hash Functions: Focus on FNV - MURAL - Maynooth University Research Archive Library,” Maynoothuniversity.ie, 2023, https://mural.maynoothuniversity.ie/18141/1/Final%20thesis%20submission%20to%20examination%20office%20Jan%202024.pdf.
[47] "Intel Tofino 2", Accessed on June 8, 2023. [Online]. Available: https://www.intel.com/content/www/us/en/products/network-io/programmable-ethernet-switch/tofino-2-series.html
[48] S. Laki, R. Stoyanov, D. Kis, R. Soulé, P. Vörös, and N. Zilberman, “P4Pi,” ACM SIGCOMM Computer Communication Review, vol. 51, no. 3, pp. 17–21, Jul. 2021, doi: https://doi.org/10.1145/3477482.3477486.
[49] G. C. Sankaran, K. M. Sivalingam and H. Gondaliya, "P4 and NetFPGA-Based Secure In-Network Computing Architecture for AI-Enabled Industrial Internet of Things," IEEE Internet of Things Journal, vol. 10, no. 4, pp. 2979-2994, Feb, 2023, doi: 10.1109/JIOT.2021.3125862.
[50] "SmartNICs with P4 support" Accessed on June 8, 2023. [Online]. Available: https://codilime.com/blog/smartnics-with-p4-support/ |