Cart (Loading....) | Create Account
Close category search window

Notice of Retraction
A method to device flow hash algorithm based traffic character

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Cheng Guang ; Key Lab. of the Comput. Network Technol. in Jiangsu Province, Southeast Univ., Nanjing ; Gong Jian

Notice of Retraction

After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.

We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.

The presenting author of this paper has the option to appeal this decision by contacting

Flow sampling algorithms and data streaming algorithms have widely adopted the hashing algorithms to detect flow information at the high-speed links for the applications of the flow distribution, the number of flow, the heavy-tailed flow, and so on. Hashing algorithms involve transforming a key inside a hash value. But there arenpsilat hash algorithms which are designed for flow measurement. In this paper, we propose a method to design flow hash algorithm based on traffic character. A bit probability distance metric is given to design a flow hash algorithm, and a flow hash algorithm is given using a CERNET trace, and the flow hash algorithm is compared with Bob and CRC hash algorithms by an uniformity test, the number of active flows tests, and a speed test. The experimental result shows that the flow hash algorithm is superior to others hash algorithms.

Published in:

Communication Technology, 2008. ICCT 2008. 11th IEEE International Conference on

Date of Conference:

10-12 Nov. 2008

Need Help?

IEEE Advancing Technology for Humanity About IEEE Xplore | Contact | Help | Terms of Use | Nondiscrimination Policy | Site Map | Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.
© Copyright 2014 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.