Closed amaan-fmad closed 3 years ago
We deterministically sort the 5-Tuple of a network connection first, and then hash it so that the hash can be used to trace the full-duplex connection for flows.
We deterministically sort the 5-Tuple of a network connection first, and then hash it so that the hash can be used to trace the full-duplex connection for flows.