Fig. 2From: Identifying elephant flows using dynamic thresholds in programmable IXP networksMultilevel Hash Mapping [24]Back to article page