Method and apparatus for improving non-uniform memory access

ABSTRACT

A method, computer readable medium and apparatus for improving non-uniform memory access are disclosed. For example, the method divides a plurality of stream processing jobs into a plurality of groups of stream processing jobs to match a topology of a non-uniform memory access platform. The method sets a parameter in an operating system kernel of the non-uniform memory access platform to favor an allocation of a local memory, and defines a plurality of processor sets. The method binds one of the plurality of groups to one of the plurality of processor sets, and run the one group of stream processing jobs on the one processor set.

The present disclosure relates to a method for improving non-uniformmemory access.

BACKGROUND

Currently, there is tremendous growth in the cellular data network usagedue to the popularity of smart phones. Understanding the type ofwireless traffic that is traversing over a network will provide valuableinsights to a wireless network service provider, e.g., who is using thenetwork, what they are using it for, and how much bandwidth they areusing, etc. However, monitoring the wireless traffic is computationallyvery expensive given the large volume of data that must be monitored andanalyzed. Furthermore, it is often beneficial to monitor the wirelesstraffic in real time, but real time monitoring further increases thecomplexity and computational cost for the wireless network serviceprovider. For example, non-uniform memory access (NUMA) machines can beused to perform such monitoring function, but it has been observed thatthe efficiency of the NUMA machines will degrade over time when deployedto perform such monitoring function.

SUMMARY

In one embodiment, the present disclosure teaches a method, computerreadable medium and apparatus for improving non-uniform memory access.For example, the method divides a plurality of stream processing jobsinto a plurality of groups of stream processing jobs to match a topologyof a non-uniform memory access platform. The method sets a parameter inan operating system kernel of the non-uniform memory access platform tofavor an allocation of a local memory, and defines a plurality ofprocessor sets. The method binds one of the plurality of groups to oneof the plurality of processor sets, and run the one group of streamprocessing jobs on the one processor set.

BRIEF DESCRIPTION OF THE DRAWINGS

The teaching of the present disclosure can be readily understood byconsidering the following detailed description in conjunction with theaccompanying drawings, in which:

FIG. 1 illustrates one example of a cellular network architecture;

FIG. 2 illustrates a passive Deep Packet Inspection (DPI) architecture;

FIG. 3 illustrates a high level flowchart of one embodiment of a methodfor processing wireless traffic via a two-layer architecture;

FIG. 4 illustrates a method for optimizing stream processing onnon-uniform memory access (NUMA) machines;

FIG. 5 illustrates a high level diagram of a network architecture whereend to end measurements can be correlated through control planemonitoring of wireless traffic;

FIG. 6 illustrates a method for correlating end to end measurementsthrough control plane monitoring of wireless traffic;

FIG. 7 illustrates a method for applying a uniform hashing to wirelesstraffics in a plurality of probe servers;

FIG. 8 illustrates a method for managing a degree of parallelism ofstreams in accordance with available resources; and

FIG. 9 illustrates a high-level block diagram of a general-purposecomputer suitable for use in performing the functions described herein.

To facilitate understanding, identical reference numerals have beenused, where possible, to designate identical elements that are common tothe figures.

DETAILED DESCRIPTION

The present disclosure broadly discloses a method, computer readablemedium and an apparatus for processing wireless traffic or mobilitytraffic of a wireless network, e.g., a cellular network. The terms“wireless traffic” and “mobility traffic” are used interchangeably inthe present disclosure and broadly represent data packets that weretransported in part via a wireless medium. In one embodiment, thepresent disclosure discloses a two-layer architecture for processing thewireless traffic along with various data processing methods.

As discussed above, understanding the type of wireless traffic that istraversing over a network will provide valuable insights to a wirelessnetwork service provider. Deep packet inspection (DPI) is a technologythat examines the Internet Protocol (IP) packet header and payload,e.g., to determine the user source and the type of application containedwithin a packet. DPI can be performed as the packet passes an inspectionpoint, searching for protocol non-compliance, viruses, intrusions orpredefined criteria to decide what actions are to be taken on thepacket, or simply for collecting statistical information. Deep packetinspection enables a network service provider to provide advancednetwork management, user services, and/or security functions. However,implementing DPI can be quite challenging given very large volume oftraffic, especially if real time traffic monitoring is performed. Thepresent disclosure provides a novel passive DPI system and various dataprocessing methods that can be deployed to efficiently process wirelesstraffic. This implementation will provide the ability to monitor andanalyze the types of data traffic generated by mobility datasubscribers, thereby allowing a cellular carrier to better customizecommercial offers, monitor services, create reports for businessmanagement purposes and so on.

A brief discussion of an illustrative cellular network architecture isfirst provided before the novel passive DPI system and various dataprocessing methods are disclosed in greater detail below. Despitedifferent technologies being adopted, a cellular data network is broadlydivided into two parts, the radio access network and the core network.The radio access network may contain different infrastructuressupporting 2G technology, e.g., General Packet Radio Service (GPRS),Enhanced Data rates for GSM Evolution (EDGE), and single carrier (1x)radio transmission technology (1xRTT), and 3G technology, e.g.,universal mobile telecommunication system (UMTS) and Evolution DataOnly/Evolution Data Optimized (EV-DO) system, respectively. In oneembodiment, the structure of the core network does not differentiate 2Gtechnology with 3G technology. So a single core network is compatiblewith both 2G technology and 3G technology. An illustrative cellularnetwork architecture will now be briefly described to provide thecontext of the present disclosure. It should be noted that the presentdisclosure is not limited to any particular type of cellular datanetwork. For example, the present disclosure can be adapted to the LongTerm Evolution (LTE) architecture. It should be noted that differenttypes of cellular data network will have different paths. For example,the control plane and the data plane in some network architecture mayfollow the same network path, whereas others do not. Irrespective ofsuch distinctions, the present disclosure is equally applicable to suchcellular data network with different path structures.

FIG. 1 shows a typical UMTS data network architecture 100. The radioaccess network 110 is comprised of Base Transceiver Stations (BTS) 112,Base Station Controllers (BSC) for 2G technology, whereas radio accessnetwork 120 is compromised of NodeBs 122, Radio Network Controllers(RNC) 124 for 3G technology. The core network 130 comprises of ServingGPRS Support Nodes (SGSN) 132 and Gateway GPRS Support Nodes (GGSN) 134.The SGSN has a logical connection to the wireless user endpoint device105. When a user endpoint device 105 connects to a cellular datanetwork, the device first communicates with its local SGSN that willinform other GGSNs of the user's access point name (APN). Which GGSNserves the user is decided according to the user's APN. The SGSNconverts the mobile data into IP packets and send them to the GGSNthrough a tunneling protocol, e.g., GPRS Tunneling Protocol (GTP), wherea Gn interface supports the GPRS tunneling protocol. GTP is a group ofIP-based communications protocols used to carry General Packet RadioService (GPRS) within GSM and UMTS networks. For example, GTP is usedwithin the GPRS core network for signaling between the Gateway GPRSSupport Node and the Serving GPRS Support Nodes. This allows the SGSN toactivate a session on a user's behalf (PDP context activation), todeactivate the same session, to adjust quality of service parameters, orto update a session for a subscriber who has just arrived from anotherSGSN. The GGSN serves as the gateway between the cellular core networkand the external network e.g., Internet 140. The GGSN is the firstvisible IP hop in the path from the user to the Internet. All thetraffic between the cellular data network and the Internet goes throughthe GGSN.

FIG. 2 illustrates a passive deep packet inspection architecture 200. Itshould be noted that FIG. 2 only provides a high level simplified viewof the passive deep packet inspection architecture 200. As such, variousnetwork elements are not shown and the configuration of the networkelements that are shown should not be interpreted as a limitation of thepresent disclosure.

In one embodiment, the DPI architecture 200 comprises a national datacenter (NDC) 210, broadly a data center that is processing wirelesstraffic for a cellular carrier. Although only one NDC is shown, itshould be noted that a cellular carrier may deploy any number of NDCsthroughout the country. In one embodiment, the wireless traffic is shownoriginating from a radio access network interacting with an SGSN 240that is coupled to an access network 245 to reach the national datacenter 210. In one embodiment, the national data center 210 comprises aprovider edge (PE) device 212 for receiving the wireless traffic and forforwarding the wireless traffic to a GGSN 216 that, in turn, interfaceswith the Internet 250.

In one embodiment, the national data center 210 comprises a DPI system220 for performing deep packet inspection on the wireless traffichandled by the national data center 210. The wireless traffic isobtained passively via one or more splitters (e.g., a passive opticalsplitter) 214. In one embodiment, the optical splitters are used to tapthe fiber links between the PE device 212 and the GGSN 216. The opticalsplitter is a passive device (fused fiber) that sends a copy of thesignal between the PE and GGSN to the DPI system 220 to be analyzed asfurther described below. The passive optical splitters are available ina variety of configurations (1×2, 1×3), fiber types (single mode ormultimode), data rates (1GE, 10GE), and split ratios (50:50, 80:20,33:33:33). The present disclosure is not limited to any particularsplitter type.

In one embodiment, there are many PE-GGSN links that need to be tapped.To allow for a more scalable architecture, a switch, e.g., an Ethernetswitch 222 (DPI Switch/Router), is used to aggregate the data feeds fromall the PE-GGSN links, and split that traffic among a plurality of probeservers 224. The switch 222 is also used to provide a connectivitybetween the probe servers and a plurality of aggregator servers 226 thathas access to a data storage (DS) 218 (e.g., one or more optical ormagnetic storage devices with one or more databases). It should be notedthat the probe servers 224 can be deployed in different parts of thenetwork.

In one embodiment, the function of the DPI Switch/Router 222 is strictlyto aggregate the traffic from the multiple PE-GGSN links and distributethis traffic using a load balancing policy to the probe servers foranalysis. The DPI Switch/Router 222 collects traffic from the opticalsplitter between the PE and GGSN. Only the RX ports of the DPI SwitchRouter 222 are connected to the PE-GGSN link. Thus, the DPISwitch/Router 222 is only able to receive wireless traffic on thoselinks, but it is not able to transmit on those links. In one embodiment,the DPI Switch/Router 222 collects the wireless traffic from the opticalsplitter ports, combines this wireless traffic and, using load balancingsends the traffic to the plurality of probe servers. It should be notedthat the DPI Switch/Router 222 is not connected to any part of therouting network, and is strictly used to connect between the opticalsplitters, the probe servers, and the aggregator servers.

In one embodiment, the passive deep packet inspection architecture 200further comprises an off-site or offline data storage system 230 (orbroadly an offline data center). The off-site data storage system 230may comprise a data storage 232 having a database, an element managementsystem (EMS) 234 that can query the data storage 232 to provide one ormore reports 236. The element management system 234 may perform variousother management functions in addition to report generation, e.g.,tracking and reporting the health of various network elements and thelike. In one embodiment, the off-site data storage system 230 can beaccessed via a data access API web service interface. In one embodiment,data from the aggregators is backhauled to the database located on thedata storage 232. The data storage 232 stores the data collected and mayperform further traffic analysis to provide reports such as trendingreports. One aspect of the present architecture is to deploy a passiveand non-intrusive DPI system to detect and monitor data traffic acrossthe cellular network and send data to a centralized offline storage forfurther analysis and reporting. As such, data from other NDCs (notshown) are also backhauled to the database located on the data storage232.

In one embodiment, the DPI system 220 has a two-layer architecture forprocessing the wireless traffic comprising probe servers 224 (a firstlayer) and aggregator servers 226 (a second layer). The probe servers224 and aggregator servers 226 operate independently and are on separatehardware platform (i.e., on different physical platforms). Probe serversmonitor the Gn links in the NDC and decode GTP/IP traffic. One advantageof probing the Gn link network is that there are informational elementsin the GTP messaging which can be very useful. Furthermore, although theprobe servers 224 and the aggregator servers 226 are illustrated asbeing co-located in a single NDC in one embodiment, the presentdisclosure is not so limited. Namely, the probe servers 224 and theaggregator servers 226 can be implemented in a distributed fashion,e.g., deployed in various different NDCs (i.e., not co-located at acommon location). Furthermore, the Iu-PS interface can also be monitoredand be included in the control plane information as discussed below.

In one embodiment, the probe server analyzes on the fly the wirelesstraffic, extracts the relevant information and generates various datafeeds (e.g. control flows (e.g., GTP control messages), and data flows)where the information is grouped in files, e.g., “1 minute” (1 nm)duration files. In one embodiment, the data input stream (e.g., datapackets collected by the optical splitter on the Gn interface) isfiltered/aggregated or joined on the probe server to build a pluralityof output streams with different semantic meanings (e.g., performance,application mix, and/or traffic volume by network element). Thatinformation is then passed to the aggregator servers that correlatethese data feeds (e.g., merge the GTP tunnel information (control flows)with the data traffic flows) and creates new time-based file groupings,e.g. ‘5 minute’ (5 nm) groupings of aggregate records that are thenexported to the database 232 that is capable of being contacted by a webreporting server. In one embodiment, the probe and the aggregator layersare decoupled (i.e., there can be X probe servers and Y aggregatorservers) and, while the probe servers have to process the data in realtime in order to prevent any data loss, the aggregator servers do nothave such a requirement (i.e., if the aggregator servers were to fallbehind, no data would be lost, due to the use of data storage 218, wherethe output is simply delayed).

As discussed above, the probe servers form the first layer of a dataprocessing architecture that has at least two distinct layers. The probeservers may perform duplicates removal. More specifically, the probeservers are able to remove duplicates packets, which were common whenVLAN Access Control Lists (VACL) were used. Although duplicate packetsare not expected to be a problem under the splitter approach as shown inFIG. 2, the probe servers are nevertheless configured to remove anyduplicates packets. The probe servers also extract information in realtime from the network data streams via fiber taps. In one embodiment,for scalability reasons, the various flows are split into multiplestreams based on a symmetrical hash function of the (source IP,destination IP) pairs. A novel hashing method will be described below ingreater details. It should be noted that each probe server is capable ofgenerating separate data and control feeds (e.g., one data feed for TCPdata flows, one data feed for application signatures detected in theseflows and one control feed for GTP control messages, and so on). Oneillustrative example of a data plane feed is the amount of InternetProtocol (IP) traffic per application and per source and destination IPaddresses. Another illustrative example of a control plane feed is theGTP control message that includes cellular phone identifiers (e.g.,MSISDN, IMSI or IMEI), timestamp, cellular sector where the data wasgenerated and authentication success message.

In one embodiment, the aggregator servers form the second layer of dataprocessing. The aggregator servers filter, aggregate, and correlate thevarious data feeds generated by the first layer. For instance, thetraffic volume data feed will be correlated with the GTP session datafeed and the application identification data feed. In one embodiment,for scalability reasons, the flows are split into multiple streams basedon a hash of the (source IP, destination IP) pairs. Each stream stillretains a complete copy of all the GTP session events.

In one embodiment, the aggregator servers create the standard outputthat will be incorporated by the database 232. It can filter some of theflows to focus on specific applications (e.g., Multimedia streams);samples the data to manage the quantity of information exported andfurther aggregate the data. In the embodiment, only the aggregationfunction is used to generate 5 minute aggregates. It should be notedthat aggregates of any time duration are within the scope of the presentdisclosure.

FIG. 3 illustrates a high level flowchart of one embodiment of a method300 for processing wireless traffic via a two-layer architecture. Forexample, method 300 can be implemented by DPI system 220 or a generalpurpose computer as discussed below. Method 300 starts in step 305 andproceeds to step 310.

In step 310, method 300 obtains wireless traffic in a passive fashion,e.g., using an optical splitter in a NDC as discuss above. For example,the DPI switch/router 222 may receive traffic from one or moresplitters, e.g., 20 optical splitters. The DPI switch/router aggregatesthe traffic from the 20 optical splitters and forwards it to theplurality of probe servers using a load balancing policy.

In step 320, method 300 processes the wireless traffic using theplurality of probe servers in a first layer. Namely, the wirelesstraffic is processed into a plurality of feeds, e.g., comprising atleast one data feed and at least one control feed. For example, eachprobe server collects the traffic information, and creates a set offiles (e.g., 1 minute files) that contain records in accordance with thefirst layer analysis (as described above). In one embodiment, when theprobe server finishes writing the first layer files, it creates a“READY” file which informs the pertinent aggregator server(s) that thereis new data ready to be collected, and the name of the new files.

In step 330, the method correlates the various feeds generated by theprobe servers by using a plurality of aggregator servers that is taskedwith correlating the control feeds and the data feeds. In oneembodiment, the method 300 correlates a plurality of feeds from theplurality of probe servers via a plurality of aggregator servers, wherethe data feed and the control feed of each of the plurality of probeservers are correlated with at least one other probe server of theplurality of probe servers. In one embodiment, the correlated resultcomprises a correlated control feed derived from a plurality of controlfeeds from the plurality of probe servers. In other words, each of theprobe server may be processing data focused on a particular aspect ofthe cellular data network, but is unable to have insights into otheraspects of the cellular data network. Thus, each aggregator server istasked with performing correlation of the various feeds that arereceived from the plurality of probe servers. For example, a controlfeed may indicate who is using a particular GTP tunnel, while thepertinent data feed may provide statistics pertaining to one aspect ofthe particular GTP tunnel. It is up to the aggregator servers tocorrelate these feeds to provide correlated results that can be used tomanage the cellular data network. More specifically, in one embodiment,the aggregator server periodically checks the “READY” file on the probeserver such that when files are ready, it transfers the files to theaggregator server and performs the Layer 2 analysis (as describedabove). In one embodiment, the aggregator server creates a set of filesevery 5 minutes and creates a READY file when it has completed a set offiles. It should be noted that although the present disclosure describesthe probe servers as providing the control plane information to theaggregator servers, the present disclosure is not so limited. Namely, inone embodiment, the control plane information could come from networkelements such as routers.

In step 340, method 300 outputs the correlated results. For example, thedatabase on data storage 232 may periodically check the READY file onthe aggregator server for new files, such that when there are new filesin the READY file, the database transfers those files to a landing zoneon the database. Method 300 then ends in step 345.

As discussed above, the present architecture employs a plurality ofprobe servers and aggregator servers that are operating continuouslyover a very long period of time in the processing of the data streams.Servers such as non-uniform memory access (NUMA) machines can beemployed to serve as the probe servers and aggregator servers. Manylarge servers employ NUMA architectures in order to allow scaling tomany central processing unit (CPU) cores. NUMA platforms range fromsmall rack based servers to the largest data warehouse servers. However,NUMA machines may suffer performance degradation in certain scenarios,e.g., where processing is running for a long duration of time andfragmentation occurs in the memory, where each process has a largememory footprint, and/or where each process frequently changes itsmemory image, i.e., causing high “churn.” More specifically, while NUMAarchitectures have the same programming model as a symmetricalmulti-processor (SMP) platform, in that the programmer need not make anyspecial locality arrangements when allocating memory, the performanceconsequences can be unexpected, since there may be different latenciesto memory located in different areas of the server with regard to therunning program. For example, memory latency on a NUMA architecture canbe three times (3×) greater for memory located on a different systemboard in a different base cabinet as the CPU on which the program ofinterest is running. For programs which are heavily memory-access bound,this can incur a steep performance penalty, approaching the memorylatency penalty.

Unfortunately, the use of NUMA machines in processing the data streamsas discussed above falls into one or more of the scenarios where NUMAmachines may not perform efficiently over time. More specifically,stream processing of large datasets typically involves continuousprocessing (e.g., 24 hours a day, 7 days a week, and so on). Whenprocessing such information as network telemetry, this can also involvevery large memory images, which are far larger than the system's CPUcaches, and hence involve intense access to the system's main memory,which may be distributed across a complex NUMA interconnect.

To address this criticality, the present disclosure provides a method400 as illustrated in FIG. 4 for optimizing stream processing on NUMAmachines. In brief, method 400 exploits several operating systemmechanisms to increase locality of memory for the stream processingprocesses, thereby reducing access to “high latency” memory. In oneembodiment, the method also involved telemetry to monitor the memorylocality over time and adjust certain parameters to keep the processingoptimized. Method 400 can be implemented in the probe servers andaggregator servers as discussed above or in a general purpose computeras discussed below. Method 400 starts in step 405 and proceeds to step410.

In step 410, method 400 discovers or acquires the topology of thephysical platform, e.g., a NUMA machine. For example, the topology ofthe physical platform can be discovered (e.g., number and types of CPUs,cache placement and sizes, arrangement and sizes of local memory groupsversus remote memory groups, and so on). It should be noted that if thetopology of the physical platform is known, then no discovery step isrequired and the topology of the physical platform is simply used below.

In step 420, the method 400 divides the stream processing jobs intogroups matching the topology (i.e., elements) of the physical platform,e.g., the NUMA platform. Thus, based on the mapping, a portion of thephysical platform can be perceived as being local to a group of streamprocessing jobs.

In step 430, the method 400 sets or configures parameters in theoperating system (OS) kernel to favor allocation of local memory to astream processing process. In other words, the OS kernel is configuredto strongly prefer allocation of local memory (even if fragmentationoccurs in the local memory and defragmentation overhead is imposed) overremote memory. Namely, the preference is set in such a manner thatremote memory is so disfavored that even if the remote memory beingunfragmented will still not be selected when compared to a local memorythat is fragmented.

In step 440, the method 400 defines “processor sets” that are bound tosystem elements that have uniform main memory access. In other words,“processor sets” are defined and bound to single system elements wherememory access is uniform, e.g., “system boards”.

In step 450, the method 400 binds the stream processing jobs toassociated processor sets in a “hard” manner. Namely, stream processingjobs cannot be operated on a processor set that is not associated withthe stream processing jobs.

In step 460, the method 400 runs the stream processing jobs.

In step 470, the method 400 measures the fraction of memory access whichis local versus remote. In other words, telemetry is run in thebackground to measure the amount of local memory access as compared toremote memory access. As such, one or more parameters can be adjustedover time, if necessary (e.g., when there is too much remote memoryaccess), to maintain processing efficiency, e.g., forcing a process tooperate in a smaller memory footprint, changing kernel parameters tostrengthen the association to local memory (broadly changing a strengthof the association to the local memory, e.g., increasing or decreasing),and so on. It should be noted that although step 470 is shown in asserial manner following step 460, the present disclosure is not solimited. In other words, in one embodiment step 470 should be perceivedas a concurrent step that operates in the background and may affectindividually one or more steps of FIG. 4. Method ends in step 475.

FIG. 5 illustrates a high level diagram of a network architecture 500where end to end measurements 510 can be correlated through controlplane monitoring of wireless traffic. It is beneficial to a wirelessnetwork service provider to be able to perform end to end measurementsfor a session so that the wireless network service provider is able tomonitor the performance of its network and the quality of service thatis provided to its subscribers. In general, one of the strengths ofpassive performance monitoring is that it can track the end userexperience, instead of generating active traffic that may not berepresentative of end user experience. To illustrate, a user using theendpoint device 520 may want to access content provided by a contentprovider 580, e.g., stored on an application server. The session isestablished and handled by a particular BTS 530, a particular BSC 540, aparticular SGSN 550, a particular NDC 560, and a particular GGSN 570.Again, FIG. 5 is only a simplified view. As such, there may beadditional network elements supporting the established session that arenot illustrated in FIG. 5. It would be beneficial to the wirelessnetwork service provider not only to have a measurement of the overallperformance of the session, but be able to attribute performance down toindividual network elements as shown in FIG. 5.

FIG. 6 illustrates a method 600 for correlating end to end measurementsthrough control plane monitoring of wireless traffic. For example,method 600 can be performed by one or more of the aggregator servers asdiscussed above or by a general purpose computer as discussed below.Method 600 starts in step 605 and proceeds to step 610.

In step 610, method 600 extracts partial path information of a flow or asession from a control plane. For example, the control plane can begenerated by the plurality of aggregator servers as discussed above bycorrelating the control feeds provided by the probe servers. However, itshould be noted that the control plane by itself may not be able toprovide the complete path for a flow or a session. For example,referring to FIG. 5, the control plane may reveal that a flow pertainsto a BTS 530 and an SGSN 550, but is unable to determine which BSC amongmany available BSCs that was actually used to setup the flow. As such,in some scenarios, the method 600 can only extract partial pathinformation for the flow or the session from the control plane.

In step 620, method 600 fills in any missing network elements supportingthe flow or session from external topology information, e.g., topologyinformation that was not obtained by the processing of the variousfeeds. For example, given that BTS 530 was used to support the flow,external topology information (e.g., location information, provisioninginformation, and the like) may indicate that BSC 540 must be the BSCthat supported the session given a particular BTS.

In step 630, the method 600 correlates performance information from thedata plane. Namely, the method correlates the performance of the pathfrom the plurality of data feeds provided by the probe servers. Itshould be noted that in one alternate embodiment, the method may includeperformance measurements obtained from server logs, instead of just thepassive performance measurements from the network probe servers. Infact, in one embodiment, the method can also add another source of data:Network Address Translation (NAT)/Port Address Translation (PAT) thatmaps private IP addresses to public IP addresses. Currently, when datais measured on one side (private side) of the GGSN, one will see theprivate IP address which is the same IP that one will see in the controlplane measurement. However, if the same data is collected on theInternet side, one would only see the public IP address. With the NATlogs, one could then translate it to a private IP address that can thenbe correlated with the passive performance measurements.

In step 640, the method identifies a network element along the pathhaving a performance issue. For example, the correlation from step 630may reveal a degradation for a particular portion of the path. In doingso, the method can correlate that information down to a particularnetwork element. Method ends in step 645.

As discussed above, hashing can be employed to improve the processingefficiency of the stream processing method. Broadly, hashing is thetransformation of a string of characters into a usually shorterfixed-length value or key that represents the original string. Forexample, hashing can be used to index and retrieve items in a databasebecause it is faster to find the item using the shorter hashed key thanto find it using the original value.

In one embodiment, hashing is applied to both layers of the presenttwo-layer architecture for processing the wireless traffic. Namely,hashing is applied by the probe servers in the first layer and hashingis applied by the aggregators in the second layer. The hashing providesa plurality of streams, thereby increasing the parallelism of streamprocessing in one embodiment. Since the wireless traffic is sovoluminous, parallel processing of the wireless traffic will increasethe processing efficiency of the DPI system.

FIG. 7 illustrates a method 700 for applying a uniform hashing towireless traffics in a plurality of probe servers. For example, method700 can be performed by one or more of the probe servers, aggregatorservers, a switch and/or a router as discussed above or by a generalpurpose computer as discussed below. Method 700 starts in step 705 andproceeds to step 710.

In step 710, method 700 hashes the wireless traffic into a plurality ofstreams based on different keys. For example, the traffic input to eachof the probe server is hashed into a plurality of streams. Forscalability reasons, the traffic flows are split into multiple streamsbased on a symmetrical hash function of the (e.g., source IP,destination IP) pairs. Thus, broadly the different keys may comprisesourceIP, destIP, MPLS labels, Ethernet VLANs, and GTP tunnelidentifier. It should be noted that other keys not listed here can alsobe used without limiting the scope of the present disclosure. Forexample, for the data traffic, it would indentify a particular SSGN-GGSNtunnel, and for the control traffic it would identify a particular partof a SSGN-GGSN control session. Thus, for a particular data session, allthe traffic that we may want to associate with each other is in the samestream.

In optional step 720, method 700 further hashes at least one of theplurality of streams into a plurality of sub-streams based on differentkeys. It should be noted that step 720 can be repeatedly applied so thatwireless traffic can be hashed up to any level of sub-streams asrequired for a particular application.

In optional step 730, method 700 may further hash each of the outputinto a plurality of output streams. For example, an output stream foreach of the probe servers is hashed into a plurality of output streamsto be forwarded to a plurality of aggregator servers. In other words,additional parallelism may be required by the aggregator servers.

In step optional step 740, method 700 hashes the input stream from aprobe server into a plurality of streams based on different keys. Forexample, the input stream to each of the aggregator server can be hashedinto a plurality of streams.

It should be noted that the hashing can be performed on the probeservers and/or the aggregator servers. Furthermore, the hashing can bedone on the input side and/or the output side of the probe serversand/or the aggregator servers. It should be noted that the hashing isuniform across all of the probe servers and/or the aggregator servers.That means that a packet of a particular source IP address processed byone probe server will end up in the same stream of packets having thesame source IP address processed by other probe servers. It should benoted that control traffic is generally processed first before the datatraffic. This allows a state table to be generated for the controltraffic, where the state table is distributed across all of theaggregator servers.

In step 750, the plurality of streams is then correlated to provide acorrelated output. Method 700 ends in step 755.

However, too much parallelism may also negatively impact the efficiencyof the DPI system. Namely, there can be too many different streams thatthe DPI system may actually suffer a performance degradation.

FIG. 8 illustrates a method 800 for managing a degree of parallelism ofstreams in accordance with available resources. For example, method 800can be performed by one or more of the probe servers, aggregatorservers, a switch and/or a router as discussed above or by a generalpurpose computer as discussed below. Method 800 starts in step 805 andproceeds to step 810.

In step 810, method 800 analyzes a representative set of wirelesstraffic to determine a profile of the wireless traffic. For example,method 800 may analyze a set of wireless traffic to determine variouscharacteristics of the wireless traffic, e.g., time of peak volume for agiven day, day of peak volume for a given week, traffic pattern for eachbase station, traffic pattern for each BTS, traffic pattern for eachBSC, traffic pattern for each SGSN, traffic pattern for each GGSN and soon. In one embodiment, the method is able to measure the requiredresources (e.g., the number of CPUs) to address the plurality of diverseoutput streams and predicts the needed resources for each output streamas a function of the maximum input traffic volume. Once the statisticsare collected, they can be organized into a profile.

In step 820, method 800 applies the profile to manage a degree ofparallelism in the processing of the plurality of feeds. For example,method 800 is able to match the amount of available processing resourcesto the profile. To illustrate, if the volume of wireless traffic is veryhigh for a particular source IP address, then the DPI system can beconfigured to increase the degree of parallelism associated with thatsource IP address, e.g., increasing the hashing associated with thatsource IP address to produce more feeds. Alternatively, the DPI systemcan be configured to provide additional CPUs to process streamsassociated with that source IP address, and so on. For example, in oneembodiment, the method may match the needed resources for each outputstream against the peak performance (e.g., within a certain maximumpercentage of processing limit or threshold, e.g., 90%, 95%, 99% and soon) of a single CPU core. In another embodiment, the method processeseach output stream sufficiently and individually to sustain the maximuminput traffic without exceeding the peak performance of any single CPUcore while minimizing the amount of parallelism to minimize theparallelization overhead (e.g., kernel task switches, memory copy,etc.). Method 800 ends in step 825.

It should be noted that although not explicitly specified, one or moresteps of the various methods described in FIGS. 3-4 and 6-8 may includea storing, displaying and/or outputting step as required for aparticular application. In other words, any data, records, fields,and/or intermediate results discussed in the methods can be stored,displayed, and/or outputted to another device as required for aparticular application.

FIG. 9 depicts a high-level block diagram of a general-purpose computersuitable for use in performing the functions described herein. Asdepicted in FIG. 9, the system 900 comprises a processor element 902(e.g., a CPU), a memory 904, e.g., random access memory (RAM) and/orread only memory (ROM), a module 905 for processing wireless traffic viaa two-layer architecture, and various input/output devices 906 (e.g.,storage devices, including but not limited to, a tape drive, a floppydrive, a hard disk drive or a compact disk drive, a receiver, atransmitter, a speaker, a display, a speech synthesizer, an output port,and a user input device (such as a keyboard, a keypad, a mouse, and thelike)).

It should be noted that the present disclosure can be implemented insoftware and/or in a combination of software and hardware, e.g., usingapplication specific integrated circuits (ASIC), a general purposecomputer or any other hardware equivalents. In one embodiment, thepresent module or process 905 for processing wireless traffic via atwo-layer architecture can be loaded into memory 904 and executed byprocessor 902 to implement the functions as discussed above. As such,the present method 905 for processing wireless traffic via a two-layerarchitecture (including associated data structures) of the presentdisclosure can be stored on a non-transitory (tangible or physical)computer readable storage medium, e.g., RAM memory, magnetic or opticaldrive or diskette and the like.

While various embodiments have been described above, it should beunderstood that they have been presented by way of example only, and notlimitation. Thus, the breadth and scope of a preferred embodiment shouldnot be limited by any of the above-described exemplary embodiments, butshould be defined only in accordance with the following claims and theirequivalents.

1. A method for improving non-uniform memory access, comprising:dividing a plurality of stream processing jobs into a plurality ofgroups of stream processing jobs to match a topology of a non-uniformmemory access platform; setting a parameter in an operating systemkernel of the non-uniform memory access platform to favor an allocationof a local memory; defining a plurality of processor sets; binding oneof the plurality of groups to one of the plurality of processor sets;and running the one group of stream processing jobs on the one processorset.
 2. The method of claim 1, further comprising: measuring a fractionof an amount of local memory access versus an amount of remote memoryaccess.
 3. The method of claim 2, further comprising: adjusting theparameter in the operating system kernel in accordance with thefraction.
 4. The method of claim 3, wherein the adjusting comprisesadjusting a strength of the allocation to the local memory.
 5. Themethod of claim 4, wherein the adjusting the strength of the allocationcomprises increasing a strength of the allocation.
 6. The method ofclaim 4, wherein the adjusting the strength of the allocation comprisesdecreasing a strength of the allocation.
 7. The method of claim 1,wherein the one group of stream processing jobs comprises wirelesstraffic.
 8. The method of claim 1, wherein the non-uniform memory accessplatform is employed as a probe server to process the one group ofstream processing jobs.
 9. The method of claim 1, wherein thenon-uniform memory access platform is employed as an aggregator serverto process a plurality of streams received from a plurality of probeservers.
 10. The method of claim 9, wherein the plurality of streams isderived from the one group of stream processing jobs.
 11. Anon-transitory computer-readable medium having stored thereon aplurality of instructions, the plurality of instructions includinginstructions which, when executed by a processor, cause the processor toperform a method for improving non-uniform memory access, comprising:dividing a plurality of stream processing jobs into a plurality ofgroups of stream processing jobs to match a topology of a non-uniformmemory access platform; setting a parameter in an operating systemkernel of the non-uniform memory access platform to favor an allocationof a local memory; defining a plurality of processor sets; binding oneof the plurality of groups to one of the plurality of processor sets;and running the one group of stream processing jobs on the one processorset.
 12. The non-transitory computer-readable medium of claim 11,further comprising: measuring a fraction of an amount of local memoryaccess versus an amount of remote memory access.
 13. The non-transitorycomputer-readable medium of claim 12, further comprising: adjusting theparameter in the operating system kernel in accordance with thefraction.
 14. The non-transitory computer-readable medium of claim 13,wherein the adjusting comprises adjusting a strength of the allocationto the local memory.
 15. The non-transitory computer-readable medium ofclaim 14, wherein the adjusting the strength of the allocation comprisesincreasing a strength of the allocation.
 16. The non-transitorycomputer-readable medium of claim 14, wherein the adjusting the strengthof the allocation comprises decreasing a strength of the allocation. 17.The non-transitory computer-readable medium of claim 11, wherein the onegroup of stream processing jobs comprises wireless traffic.
 18. Thenon-transitory computer-readable medium of claim 11, wherein thenon-uniform memory access platform is employed as a probe server toprocess the one group of stream processing jobs.
 19. The non-transitorycomputer-readable medium of claim 11, wherein the non-uniform memoryaccess platform is employed as an aggregator server to process aplurality of streams received from a plurality of probe servers.
 20. Anapparatus for improving non-uniform memory access, comprising: aprocessor configured to: divide a plurality of stream processing jobsinto a plurality of groups of stream processing jobs to match a topologyof a non-uniform memory access platform; set a parameter in an operatingsystem kernel of the non-uniform memory access platform to favor anallocation of a local memory; define a plurality of processor sets; bindone of the plurality of groups to one of the plurality of processorsets; and run the one group of stream processing jobs on the oneprocessor set.