Encoding Short Ranges in TCAM Without Expansion: Efficient Algorithm and Applications
|
|
- Clara Osborne
- 5 years ago
- Views:
Transcription
1 Encoding Short Ranges in TCAM Without Expansion: Efficient Algorithm and Applications Yotam Harchol The Hebrew University of Jerusalem, Israel Joint work with: Anat Bremler-Barr David Hay Yacov Hel-Or IDC Herzliya, Israel To appear in ACM SPAA 26 Hebrew University, Israel IDC Herzliya, Israel This research was supported by the European Research Council under the European Union s Seventh Framework Programme (FP7/27-23)/ERC Grant agreement no
2 TCAM Ternary Content Addressable Memory TCAM is an associative memory module Useful for parallel multidimensional prefix lookup Each entry may consist of,, and * bits Widely used in high-speed networking devices Example: 2-dimensional IP lookup: Source IP Dest. IP What about ranges? (e.g., port numbers) ******* ******* ************* *********** P P2 Drop P TCAM SRAM 2
3 Range Encoding in Binary Representation Can ternary encode only certain intervals Or we need more than one entry (expansion) ** *** **???? * *???? * * Exponential space blow-up when using multiple range fields 3
4 Encoding Short Ranges Ranges of arbitrary length infeasible without expansion Ranges with bounded length feasible! Useful for: Short TCP/UDP ranges (>6% of the ranges in real life) QoS mechanisms (IP ToS/DSCP) Packet size classification (by categories) Timestamps and counters IP spoofing detection (using IP TTL) SDX AS numbering Also useful for applications outside the networking domain 4
5 Range Encoding on TCAM: Two Approaches Database-independent encoding: [Lakshminarayanan et al., 25], [Bremler Barr et al., 27] f enc ([x, y]) = ***** ****** ******* Easy to update Lower bound for w-bits field without expansion: 2 w - bits per range [Lakshminarayanan et al., 25] Database-dependent encoding: [Liu, 22], [Van Lunteren & Engbersen, 23], [Chang & Su, 27], [Che et al., 28], [Bremler Barr et al., 29], [Rottenstreich & Keslassy, 2], [Rottenstreich et al., 23], [Kogan et al., 24] f (, [x, y]) = enc DB **** ***** Both schemes require expansion for a feasible code length Compact codes 5
6 RENÉ Range Encoding with No Expansion Encoding function for short ranges: f enc ([x, y]) = ***** Database independent - easy to update No row expansion Near-optimal TCAM space usage Useful for packet classification applications Useful for high dimensional nearest neighbor search 6
7 Binary-Reflected Gray Code (BRGC) Build recursively by reflecting binary code: Hamming distance between each two adjacent points = 7
8 Range Encoding with Binary-Reflected Gray Code With ternary BRGC we can encode some of the ranges of length h=2 k (k N) ** ** ** ** *** ** ** ** ** What about other (red) ranges? 8
9 Layers Layer: a set of disjoint consecutive ranges Two (blue) layers can be encoded with a BRGC-based ternary word Other (red) layers need more bits ** ** ** ** *** ** ** ** ** 9
10 Cover Ranges Cover range of R: the smallest blue range that fully contains R In red layers: No two consecutive ranges in the same layer are fully contained in a cover range R *** cover(r) Given the cover range, one bit is enough to differentiate ranges in the same layer
11 Single Bit Range Index Red ranges require different encoding Add one bit for each red layer Bit value alternates between ranges in the same layer Bits of other red layers are set to * For blue layers, these bits are always * ** * * * * * 8 * * * * * ** ** ** ** ** ** ** ** 4 5
12 Encoding Scheme for Ranges Encoding of a single range of length h=2 k is: Blue ranges: BRGC(R) Red ranges: BRGC(cover(R)) Ternary BRGC w bits Bit of L... Bit of L h/2- h-2 bits Bit of L h/2+... Bit of L h- Value encoding is now: BRGC Bit of L... Bit of L h/2- Bit of L h/2+... Bit of L h- w bits h-2 bits 2
13 Toy Example 3
14 Optimization For ranges of length h=2 k k- LSBs of the BRGC part are always * *** * ** ** Code can be shorten to w-log(h)+h- bits 6 7 ** ** ** ** ** ** ** ** *** * 8 *** * *** * *** * *** * ** ** ** ** ** ** ** ** 5 *** * *** * *** * *** * 4
15 Encoding Multiple Range Lengths For ranges of length 3, intersect two ranges of length 4: 2 * ** We present the conjunction operator Π: ** * * ** ** * * ** * ** * ** ** * ** * ** * * ** ( means * ** undefined, * ** ** * and if a i Π b i = ** * then a Π b = ) ** * ** * 5 * ** ** * For two ranges R, R 2 : tcode(v) tcode(r4 7 ) Π tcode(r * ** 2 ) if and only if v R R (also: tcode(r ) Π tcode(r 2 ) = ** * R R 2 = ) 5 7 * ** Π ** * = * * 5
16 TCAM bits used per range field (log 2 scale) Theoretical Bound For w=6 Maximal range length (log 2 scale) 6
17 The Nearest Neighbor Search Problem Input: - A set of data points - A query point (or a series of those) (points are in a discrete space) Output: Data point closest to the query point The Curse of Dimensionality: Hard problem for high dimensions (even over or so) 7
18 The Nearest Neighbor Search Problem Encode cubes on data points Given a query point, single TCAM lookup returns the smallest cube that contains it No TCAM entry expansion in high dimension Data Query 8
19 The Nearest Neighbor Search Problem Or instead, save TCAM space Encode cubes on the query point Query TCAM with growing cubes Find first data point to match Data Query 9
20 Experiment on a Real TCAM Currently - no evaluation board for TCAM Instead, we used a commodity network switch with a TCAM Switch has 48 ports of Gbps each (.5 Million packet per second) TCAM is 92 bits wide d-dimensional Cube Representation: ****************************** Src. MAC Dest. MAC Src. IP Dest. IP st dimension 2 nd dimension 3 rd dimension 4 th dimension 5 th dimension 6 th dimension 7 th dimension OpenFlow flow_mod Single port:.5 Million Queries Per Second! Queries as packets OpenFlow Counters 2
21 Conclusions Encoding function for short ranges: f enc ([x, y]) = ***** Database independent - easy to update No row expansion Near-optimal TCAM space usage Useful for packet classification applications Useful for high dimensional nearest neighbor search 2
22 Questions? Thank you. 22
Encoding Short Ranges in TCAM Without Expansion: Efficient Algorithm and Applications
Encoding Short Ranges in TCAM Without Expansion: Efficient Algorithm and Applications Technical Report ABSTRACT Anat Bremler-Barr The Interdisciplinary Center Herzliya, Israel bremler@idc.ac.il David Hay
More informationEncoding Short Ranges in TCAM Without Expansion: Efficient Algorithm and Applications
Encoding Short Ranges in TCAM Without Expansion: Efficient Algorithm and Applications ABSTRACT Anat Bremler-Barr The Interdisciplinary Center Herzliya, Israel bremler@idc.ac.il David Hay The Hebrew University
More informationEncoding Short Ranges in TCAM Without Expansion: Efficient Algorithm and Applications
IEEE/ACM TRANSACTIONS ON NETWORKING 1 Encoding Short Ranges in TCAM Without Expansion: Efficient Algorithm and Applications Anat Bremler-Barr, Member, IEEE, Yotam Harchol, Member, IEEE, David Hay, Member,
More informationUltra-Fast Similarity Search Using Ternary Content Addressable Memory
Ultra-Fast Similarity Search Using Ternary Content Addressable Memory ABSTRACT Anat Bremler-Barr The Interdisciplinary Center Herzliya, Israel bremler@idc.ac.il David Hay The Hebrew University Jerusalem,
More informationMulti-Field Range Encoding for Packet Classification in TCAM
This paper was presented as part of the Mini-Conference at IEEE INFOCOM 2011 Multi-Field Range Encoding for Packet Classification in TCAM Yeim-Kuan Chang, Chun-I Lee and Cheng-Chien Su Department of Computer
More informationDeep Packet Inspection of Next Generation Network Devices
Deep Packet Inspection of Next Generation Network Devices Prof. Anat Bremler-Barr IDC Herzliya, Israel www.deepness-lab.org This work was supported by European Research Council (ERC) Starting Grant no.
More informationMulti-Field Range Encoding for Packet Classification in TCAM
Multi-Field Range Encoding for Packet Classification in TCAM Yeim-Kuan Chang, Chun-I Lee and Cheng-Chien Su Department of Computer Science and Information Engineering National Cheng Kung University Tainan,
More informationMaking Network Functions Software-Defined
Making Network Functions Software-Defined Yotam Harchol VMware Research / The Hebrew University of Jerusalem Joint work with Anat Bremler-Barr and David Hay Appeared in ACM SIGCOMM 2016 THE HEBREW UNIVERSITY
More informationEfficient TCAM Encoding Schemes for Packet Classification using Gray Code
Efficient TCAM Encoding Schemes for Packet Classification using Gray Code Yeim-Kuan Chang and Cheng-Chien Su Department of Computer Science and Information Engineering National Cheng Kung University Tainan,
More informationTree-Based Minimization of TCAM Entries for Packet Classification
Tree-Based Minimization of TCAM Entries for Packet Classification YanSunandMinSikKim School of Electrical Engineering and Computer Science Washington State University Pullman, Washington 99164-2752, U.S.A.
More informationSSA: A Power and Memory Efficient Scheme to Multi-Match Packet Classification. Fang Yu, T.V. Lakshman, Martin Austin Motoyama, Randy H.
SSA: A Power and Memory Efficient Scheme to Multi-Match Packet Classification Fang Yu, T.V. Lakshman, Martin Austin Motoyama, Randy H. Katz Presented by: Discussion led by: Sailesh Kumar Packet Classification
More informationSwitch and Router Design. Packet Processing Examples. Packet Processing Examples. Packet Processing Rate 12/14/2011
// Bottlenecks Memory, memory, 88 - Switch and Router Design Dr. David Hay Ross 8b dhay@cs.huji.ac.il Source: Nick Mckeown, Isaac Keslassy Packet Processing Examples Address Lookup (IP/Ethernet) Where
More informationLayered Interval Codes for TCAM-based Classification
Layered Interval Codes for TCAM-based Classification Anat Bremler-Barr School of Computer Science The Interdisciplinary Center Herzliya, Israel Email: bremler@idc.ac.il David Hay Department of Electrical
More informationPEDS: A Parallel Error Detection Scheme for TCAM Devices
PEDS: A Parallel Error Detection Scheme for TCAM Devices Anat Bremler-Barr, David Hay, Danny Hendler and Ron M. Roth The Interdisciplinary Center, Herzliya, Israel. Email: bremler@idc.ac.il Politecnico
More informationPEDS: A Parallel Error Detection Scheme for TCAM Devices
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 5, OCTOBER 2010 1665 PEDS: A Parallel Error Detection Scheme for TCAM Devices Anat Bremler-Barr, David Hay, Member, IEEE, Danny Hendler, and Ron M. Roth,
More information100 GBE AND BEYOND. Diagram courtesy of the CFP MSA Brocade Communications Systems, Inc. v /11/21
100 GBE AND BEYOND 2011 Brocade Communications Systems, Inc. Diagram courtesy of the CFP MSA. v1.4 2011/11/21 Current State of the Industry 10 Electrical Fundamental 1 st generation technology constraints
More informationDecision Forest: A Scalable Architecture for Flexible Flow Matching on FPGA
Decision Forest: A Scalable Architecture for Flexible Flow Matching on FPGA Weirong Jiang, Viktor K. Prasanna University of Southern California Norio Yamagaki NEC Corporation September 1, 2010 Outline
More informationCS 268: Route Lookup and Packet Classification
Overview CS 268: Route Lookup and Packet Classification Packet Lookup Packet Classification Ion Stoica March 3, 24 istoica@cs.berkeley.edu 2 Lookup Problem Identify the output interface to forward an incoming
More informationGeneric Architecture. EECS 122: Introduction to Computer Networks Switch and Router Architectures. Shared Memory (1 st Generation) Today s Lecture
Generic Architecture EECS : Introduction to Computer Networks Switch and Router Architectures Computer Science Division Department of Electrical Engineering and Computer Sciences University of California,
More informationGeometric Data Structures Multi-dimensional queries Nearest neighbour problem References. Notes on Computational Geometry and Data Structures
Notes on Computational Geometry and Data Structures 2008 Geometric Data Structures and CGAL Geometric Data Structures and CGAL Data Structure Interval Tree Priority Search Tree Segment Tree Range tree
More informationConfigure Routing Resources on the Switch
Configure Routing Resources on the Switch Objective On your switch, all of the routing information is stored in special high-speed memory called Ternary Content Addressable Memory (TCAM) which mainly functions
More informationEECS 122: Introduction to Computer Networks Switch and Router Architectures. Today s Lecture
EECS : Introduction to Computer Networks Switch and Router Architectures Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley,
More informationMultidimensional Indexes [14]
CMSC 661, Principles of Database Systems Multidimensional Indexes [14] Dr. Kalpakis http://www.csee.umbc.edu/~kalpakis/courses/661 Motivation Examined indexes when search keys are in 1-D space Many interesting
More informationEfficient Gray-Code-Based Range Encoding Schemes for Packet ClassificationinTCAM
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 21, NO. 4, AUGUST 2013 1201 Efficient Gray-Code-Based Range Encoding Schemes for Packet ClassificationinTCAM Yeim-Kuan Chang, Cheng-Chien Su, Yung-Chieh Lin, and
More informationPC-DUOS: Fast TCAM Lookup and Update for Packet Classifiers
PC-DUOS: Fast TCAM Lookup and Update for Packet Classifiers Tania Mishra and Sartaj Sahni Department of Computer and Information Science and Engineering, University of Florida, Gainesville, FL 326 {tmishra,
More informationScalable Name-Based Packet Forwarding: From Millions to Billions. Tian Song, Beijing Institute of Technology
Scalable Name-Based Packet Forwarding: From Millions to Billions Tian Song, songtian@bit.edu.cn, Beijing Institute of Technology Haowei Yuan, Patrick Crowley, Washington University Beichuan Zhang, The
More informationPC-TRIO: An Indexed TCAM Architecture for Packet Classifiers
PC-TRIO: An Indexed TCAM Architecture for Packet Classifiers Tania Banerjee-Mishra and Sartaj Sahni, University of Florida, Gainesville, FL, USA {tmishra, sahni}@cise.ufl.edu Gunasekaran Seetharaman, AFRL,
More informationECE697AA Lecture 21. Packet Classification
ECE697AA Lecture 21 Routers: Flow Classification Algorithms Tilman Wolf Department of Electrical and Computer Engineering 11/20/08 Packet Classification What is packet classification? Categorization of
More informationImplementation of Boundary Cutting Algorithm Using Packet Classification
Implementation of Boundary Cutting Algorithm Using Packet Classification Dasari Mallesh M.Tech Student Department of CSE Vignana Bharathi Institute of Technology, Hyderabad. ABSTRACT: Decision-tree-based
More informationAn Efficient TCAM Update Scheme for Packet Classification
03 IEEE 7th International Conference on Advanced Information Networking and Applications An Efficient TCAM Update Scheme for Packet Classification Yeim-Kuan Chang Department of Computer Science and Information
More informationCS 5114 Network Programming Languages Data Plane. Nate Foster Cornell University Spring 2013
CS 5114 Network Programming Languages Data Plane http://www.flickr.com/photos/rofi/2097239111/ Nate Foster Cornell University Spring 2013 Based on lecture notes by Jennifer Rexford and Michael Freedman
More informationA middle ground between CAMs and DAGs for high-speed packet classification
A middle ground between CAMs and DAGs for high-speed packet classification Amit Prakash Adnan Aziz The University of Texas at Austin Abstract Packet classification is a computationally intensive task that
More informationMulti-core Implementation of Decomposition-based Packet Classification Algorithms 1
Multi-core Implementation of Decomposition-based Packet Classification Algorithms 1 Shijie Zhou, Yun R. Qu, and Viktor K. Prasanna Ming Hsieh Department of Electrical Engineering, University of Southern
More informationPacket Classification Using Dynamically Generated Decision Trees
1 Packet Classification Using Dynamically Generated Decision Trees Yu-Chieh Cheng, Pi-Chung Wang Abstract Binary Search on Levels (BSOL) is a decision-tree algorithm for packet classification with superior
More informationData Mining. 3.5 Lazy Learners (Instance-Based Learners) Fall Instructor: Dr. Masoud Yaghini. Lazy Learners
Data Mining 3.5 (Instance-Based Learners) Fall 2008 Instructor: Dr. Masoud Yaghini Outline Introduction k-nearest-neighbor Classifiers References Introduction Introduction Lazy vs. eager learning Eager
More informationPerformance Evaluation and Improvement of Algorithmic Approaches for Packet Classification
Performance Evaluation and Improvement of Algorithmic Approaches for Packet Classification Yaxuan Qi, Jun Li Research Institute of Information Technology (RIIT) Tsinghua University, Beijing, China, 100084
More informationRule Caching in Software- Define Networkings. Supervisor: Prof Weifa Liang Student: Zhenge Jia, u Date of presentation: 24 th May 2016
Rule Caching in Software- Define Networkings Supervisor: Prof Weifa Liang Student: Zhenge Jia, u5433077 Date of presentation: 24 th May 2016 Background Related Work System Model CONTENT Wildcard Rule Caching
More informationECE697AA Lecture 20. Forwarding Tables
ECE697AA Lecture 20 Routers: Prefix Lookup Algorithms Tilman Wolf Department of Electrical and Computer Engineering 11/14/08 Forwarding Tables Routing protocols involve a lot of information Path choices,
More informationBit Weaving: A Non-prefix Approach to Compressing Packet Classifiers in TCAMs
1 Bit Weaving: A Non-prefix Approach to Compressing Packet Classifiers in TCAMs Chad R. Meiners Alex X. Liu Eric Torng Abstract Ternary Content Addressable Memories (TCAMs) have become the de facto standard
More informationAll-Match Based Complete Redundancy Removal for Packet Classifiers in TCAMs
All-Match Based Complete for Packet Classifiers in TCAMs Alex X Liu Chad R Meiners Yun Zhou Department of Computer Science and Engineering Michigan State University East Lansing, MI 48823, USA {alexliu,
More informationImage Processing Via Pixel Permutations
Image Processing Via Pixel Permutations Michael Elad The Computer Science Department The Technion Israel Institute of technology Haifa 32000, Israel Joint work with Idan Ram Israel Cohen The Electrical
More informationAN EFFICIENT HYBRID ALGORITHM FOR MULTIDIMENSIONAL PACKET CLASSIFICATION
AN EFFICIENT HYBRID ALGORITHM FOR MULTIDIMENSIONAL PACKET CLASSIFICATION Yaxuan Qi 1 and Jun Li 1,2 1 Research Institute of Information Technology (RIIT), Tsinghua University, Beijing, China, 100084 2
More informationStriped Grid Files: An Alternative for Highdimensional
Striped Grid Files: An Alternative for Highdimensional Indexing Thanet Praneenararat 1, Vorapong Suppakitpaisarn 2, Sunchai Pitakchonlasap 1, and Jaruloj Chongstitvatana 1 Department of Mathematics 1,
More informationManaging and Securing Computer Networks. Guy Leduc. Chapter 2: Software-Defined Networks (SDN) Chapter 2. Chapter goals:
Managing and Securing Computer Networks Guy Leduc Chapter 2: Software-Defined Networks (SDN) Mainly based on: Computer Networks and Internets, 6 th Edition Douglas E. Comer Pearson Education, 2015 (Chapter
More informationClustering Billions of Images with Large Scale Nearest Neighbor Search
Clustering Billions of Images with Large Scale Nearest Neighbor Search Ting Liu, Charles Rosenberg, Henry A. Rowley IEEE Workshop on Applications of Computer Vision February 2007 Presented by Dafna Bitton
More informationNon-Parametric Modeling
Non-Parametric Modeling CE-725: Statistical Pattern Recognition Sharif University of Technology Spring 2013 Soleymani Outline Introduction Non-Parametric Density Estimation Parzen Windows Kn-Nearest Neighbor
More informationPUSHING THE LIMITS, A PERSPECTIVE ON ROUTER ARCHITECTURE CHALLENGES
PUSHING THE LIMITS, A PERSPECTIVE ON ROUTER ARCHITECTURE CHALLENGES Greg Hankins APRICOT 2012 2012 Brocade Communications Systems, Inc. 2012/02/28 Lookup Capacity and Forwarding
More informationEE 584 MACHINE VISION
EE 584 MACHINE VISION Binary Images Analysis Geometrical & Topological Properties Connectedness Binary Algorithms Morphology Binary Images Binary (two-valued; black/white) images gives better efficiency
More informationAn Architecture for IPv6 Lookup Using Parallel Index Generation Units
An Architecture for IPv6 Lookup Using Parallel Index Generation Units Hiroki Nakahara, Tsutomu Sasao, and Munehiro Matsuura Kagoshima University, Japan Kyushu Institute of Technology, Japan Abstract. This
More informationWe use non-bold capital letters for all random variables in these notes, whether they are scalar-, vector-, matrix-, or whatever-valued.
The Bayes Classifier We have been starting to look at the supervised classification problem: we are given data (x i, y i ) for i = 1,..., n, where x i R d, and y i {1,..., K}. In this section, we suppose
More informationThe Data Link Layer. CS158a Chris Pollett Feb 26, 2007.
The Data Link Layer CS158a Chris Pollett Feb 26, 2007. Outline Finish up Overview of Data Link Layer Error Detecting and Correcting Codes Finish up Overview of Data Link Layer Last day we were explaining
More information6. Dicretization methods 6.1 The purpose of discretization
6. Dicretization methods 6.1 The purpose of discretization Often data are given in the form of continuous values. If their number is huge, model building for such data can be difficult. Moreover, many
More informationForwarding and Routers : Computer Networking. Original IP Route Lookup. Outline
Forwarding and Routers 15-744: Computer Networking L-9 Router Algorithms IP lookup Longest prefix matching Classification Flow monitoring Readings [EVF3] Bitmap Algorithms for Active Flows on High Speed
More informationShape Shifting Tries for Faster IP Route Lookup
Shape Shifting Tries for Faster IP Route Lookup Haoyu Song, Jonathan Turner, John Lockwood Applied Research Laboratory Washington University in St. Louis Email: {hs1,jst,lockwood}@arl.wustl.edu Abstract
More informationProblem Statement. Algorithm MinDPQ (contd.) Algorithm MinDPQ. Summary of Algorithm MinDPQ. Algorithm MinDPQ: Experimental Results.
Algorithms for Routing Lookups and Packet Classification October 3, 2000 High Level Outline Part I. Routing Lookups - Two lookup algorithms Part II. Packet Classification - One classification algorithm
More information(Master Course) Mohammad Farshi Department of Computer Science, Yazd University. Yazd Univ. Computational Geometry.
1 / 17 (Master Course) Mohammad Farshi Department of Computer Science, Yazd University 1392-1 2 / 17 : Mark de Berg, Otfried Cheong, Marc van Kreveld, Mark Overmars, Algorithms and Applications, 3rd Edition,
More information4.1.2 Merge Sort Sorting Lower Bound Counting Sort Sorting in Practice Solving Problems by Sorting...
Contents 1 Introduction... 1 1.1 What is Competitive Programming?... 1 1.1.1 Programming Contests.... 2 1.1.2 Tips for Practicing.... 3 1.2 About This Book... 3 1.3 CSES Problem Set... 5 1.4 Other Resources...
More informationA Parallel Algorithm for Exact Structure Learning of Bayesian Networks
A Parallel Algorithm for Exact Structure Learning of Bayesian Networks Olga Nikolova, Jaroslaw Zola, and Srinivas Aluru Department of Computer Engineering Iowa State University Ames, IA 0010 {olia,zola,aluru}@iastate.edu
More informationShape Shifting Tries for Faster IP Route Lookup
Shape Shifting Tries for Faster IP Route Lookup Haoyu Song, Jonathan Turner, John Lockwood Applied Research Laboratory Washington University in St. Louis Email: {hs1,jst,lockwood}@arl.wustl.edu Abstract
More informationTheorem 2.9: nearest addition algorithm
There are severe limits on our ability to compute near-optimal tours It is NP-complete to decide whether a given undirected =(,)has a Hamiltonian cycle An approximation algorithm for the TSP can be used
More information15-744: Computer Networking. Routers
15-744: Computer Networking outers Forwarding and outers Forwarding IP lookup High-speed router architecture eadings [McK97] A Fast Switched Backplane for a Gigabit Switched outer Optional [D+97] Small
More informationScalable Enterprise Networks with Inexpensive Switches
Scalable Enterprise Networks with Inexpensive Switches Minlan Yu minlanyu@cs.princeton.edu Princeton University Joint work with Alex Fabrikant, Mike Freedman, Jennifer Rexford and Jia Wang 1 Enterprises
More informationITTC High-Performance Networking The University of Kansas EECS 881 Packet Switch I/O Processing
High-Performance Networking The University of Kansas EECS 881 Packet Switch I/O Processing James P.G. Sterbenz Department of Electrical Engineering & Computer Science Information Technology & Telecommunications
More informationAlgorithms for Nearest Neighbors
Algorithms for Nearest Neighbors Classic Ideas, New Ideas Yury Lifshits Steklov Institute of Mathematics at St.Petersburg http://logic.pdmi.ras.ru/~yura University of Toronto, July 2007 1 / 39 Outline
More informationData Structures for Approximate Proximity and Range Searching
Data Structures for Approximate Proximity and Range Searching David M. Mount University of Maryland Joint work with: Sunil Arya (Hong Kong U. of Sci. and Tech) Charis Malamatos (Max Plank Inst.) 1 Introduction
More informationData Analytics and Boolean Algebras
Data Analytics and Boolean Algebras Hans van Thiel November 28, 2012 c Muitovar 2012 KvK Amsterdam 34350608 Passeerdersstraat 76 1016 XZ Amsterdam The Netherlands T: + 31 20 6247137 E: hthiel@muitovar.com
More informationApproximate Nearest Neighbors. CS 510 Lecture #24 April 18 th, 2014
Approximate Nearest Neighbors CS 510 Lecture #24 April 18 th, 2014 How is the assignment going? 2 hcp://breckon.eu/toby/demos/videovolumes/ Review: Video as Data Cube Mathematically, the cube can be viewed
More informationA Sorted Partitioning Approach to High-speed and Fast-update OpenFlow Classification
A Sorted Partitioning Approach to High-speed and Fast-update OpenFlow Classification Sorrachai Yingchareonthawornchai James Daly Alex X. Liu Eric Torng Department of Computer Science and Engineering, Michigan
More informationTime and Timestamping in Softwarized Environments
Time and Timestamping in Softwarized Environments Tal Mizrahi, Yoram Moses Technion Israel Institute of Technology April 2016 The First Synchronized Clocks Railway switch 2 Networks: Communications vs.
More informationRecursive Flow Classification: An Algorithm for Packet Classification on Multiple Fields
5 CHAPTER 4 Recursive Flow Classification: An Algorithm for Packet Classification on Multiple Fields Introduction Chapters 2 and 3 described algorithms for routing lookups. In this chapter and the next
More informationNearest Neighbor Classification
Nearest Neighbor Classification Charles Elkan elkan@cs.ucsd.edu October 9, 2007 The nearest-neighbor method is perhaps the simplest of all algorithms for predicting the class of a test example. The training
More informationCompact Data Representations and their Applications. Moses Charikar Princeton University
Compact Data Representations and their Applications Moses Charikar Princeton University Lots and lots of data AT&T Information about who calls whom What information can be got from this data? Network router
More informationChapter 9. Greedy Technique. Copyright 2007 Pearson Addison-Wesley. All rights reserved.
Chapter 9 Greedy Technique Copyright 2007 Pearson Addison-Wesley. All rights reserved. Greedy Technique Constructs a solution to an optimization problem piece by piece through a sequence of choices that
More informationPredecessor. Predecessor Problem van Emde Boas Tries. Philip Bille
Predecessor Predecessor Problem van Emde Boas Tries Philip Bille Predecessor Predecessor Problem van Emde Boas Tries Predecessors Predecessor problem. Maintain a set S U = {,..., u-} supporting predecessor(x):
More information1. Meshes. D7013E Lecture 14
D7013E Lecture 14 Quadtrees Mesh Generation 1. Meshes Input: Components in the form of disjoint polygonal objects Integer coordinates, 0, 45, 90, or 135 angles Output: A triangular mesh Conforming: A triangle
More informationBitmap Intersection Lookup (BIL) : A Packet Classification s Algorithm with Rules Updating
ICCAS25 Bitmap Intersection Lookup (BIL) : A Packet Classification s Algorithm with Rules Updating Akharin Khunkitti*, Nuttachot Promrit** *Faculty of Information Technology, King Mongkut's Institute of
More informationRouter Architectures
Router Architectures Venkat Padmanabhan Microsoft Research 13 April 2001 Venkat Padmanabhan 1 Outline Router architecture overview 50 Gbps multi-gigabit router (Partridge et al.) Technology trends Venkat
More informationZ-KNN Join for the Swiss Feed Database: a feasibility study
Z-KNN Join for the Swiss Feed Database: a feasibility study Francesco Luminati University Of Zurich, Switzerland francesco.luminati@uzh.ch 1 Introduction K-nearest neighbor query (knn) and k-nearest neighbor
More informationAccommodating Bursts in Distributed Stream Processing Systems
Accommodating Bursts in Distributed Stream Processing Systems Distributed Real-time Systems Lab University of California, Riverside {drougas,vana}@cs.ucr.edu http://www.cs.ucr.edu/~{drougas,vana} Stream
More informationMachine Learning. Nonparametric methods for Classification. Eric Xing , Fall Lecture 2, September 12, 2016
Machine Learning 10-701, Fall 2016 Nonparametric methods for Classification Eric Xing Lecture 2, September 12, 2016 Reading: 1 Classification Representing data: Hypothesis (classifier) 2 Clustering 3 Supervised
More informationFlow Caching for High Entropy Packet Fields
Flow Caching for High Entropy Packet Fields Nick Shelly Nick McKeown! Ethan Jackson Teemu Koponen Jarno Rajahalme Outline Current flow classification in OVS Problems with high entropy packets Proposed
More informationTCAM Razor: A Systematic Approach Towards Minimizing Packet Classifiers in TCAMs Alex X. Liu, Chad R. Meiners, and Eric Torng
490 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 2, APRIL 2010 TCAM Razor: A Systematic Approach Towards Minimizing Packet Classifiers in TCAMs Alex X. Liu, Chad R. Meiners, and Eric Torng Abstract
More informationIncompletely Specified Functions with Don t Cares 2-Level Transformation Review Boolean Cube Karnaugh-Map Representation and Methods Examples
Lecture B: Logic Minimization Incompletely Specified Functions with Don t Cares 2-Level Transformation Review Boolean Cube Karnaugh-Map Representation and Methods Examples Incompletely specified functions
More informationStrategies for Mitigating TCAM Space Bottlenecks
Strategies for Mitigating TCAM Space Bottlenecks Kirill Kogan 1,2, Sergey Nikolenko 3,4, Patrick Eugster 1,5, Eddie Ruan 6 Purdue University 1 IMDEA NETWORKS 2 Steklov Institute of Mathematics at St. Petersburg
More informationPredecessor Data Structures. Philip Bille
Predecessor Data Structures Philip Bille Outline Predecessor problem First tradeoffs Simple tries x-fast tries y-fast tries Predecessor Problem Predecessor Problem The predecessor problem: Maintain a set
More informationResource-Efficient SRAM-based Ternary Content Addressable Memory
Abstract: Resource-Efficient SRAM-based Ternary Content Addressable Memory Static random access memory (SRAM)-based ternary content addressable memory (TCAM) offers TCAM functionality by emulating it with
More informationAlgorithms for Nearest Neighbors
Algorithms for Nearest Neighbors State-of-the-Art Yury Lifshits Steklov Institute of Mathematics at St.Petersburg Yandex Tech Seminar, April 2007 1 / 28 Outline 1 Problem Statement Applications Data Models
More informationNetwork Processors. Nevin Heintze Agere Systems
Network Processors Nevin Heintze Agere Systems Network Processors What are the packaging challenges for NPs? Caveat: I know very little about packaging. Network Processors What are the packaging challenges
More informationEfficient Packet Classification using Splay Tree Models
28 IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.5B, May 2006 Efficient Packet Classification using Splay Tree Models Srinivasan.T, Nivedita.M, Mahadevan.V Sri Venkateswara
More informationAccelerometer Gesture Recognition
Accelerometer Gesture Recognition Michael Xie xie@cs.stanford.edu David Pan napdivad@stanford.edu December 12, 2014 Abstract Our goal is to make gesture-based input for smartphones and smartwatches accurate
More informationSingle Image Interpolation via Adaptive Non-Local Sparsity-Based Modeling
Single Image Interpolation via Adaptive Non-Local Sparsity-Based Modeling Yaniv Romano The Electrical Engineering Department Matan Protter The Computer Science Department Michael Elad The Computer Science
More informationPredecessor. Predecessor. Predecessors. Predecessors. Predecessor Problem van Emde Boas Tries. Predecessor Problem van Emde Boas Tries.
Philip Bille s problem. Maintain a set S U = {,..., u-} supporting predecessor(x): return the largest element in S that is x. sucessor(x): return the smallest element in S that is x. insert(x): set S =
More informationGeometric data structures:
Geometric data structures: Machine Learning for Big Data CSE547/STAT548, University of Washington Sham Kakade Sham Kakade 2017 1 Announcements: HW3 posted Today: Review: LSH for Euclidean distance Other
More informationCOMPUTATIONAL STATISTICS UNSUPERVISED LEARNING
COMPUTATIONAL STATISTICS UNSUPERVISED LEARNING Luca Bortolussi Department of Mathematics and Geosciences University of Trieste Office 238, third floor, H2bis luca@dmi.units.it Trieste, Winter Semester
More informationDynamic Pipelining: Making IP- Lookup Truly Scalable
Dynamic Pipelining: Making IP- Lookup Truly Scalable Jahangir Hasan T. N. Vijaykumar School of Electrical and Computer Engineering, Purdue University SIGCOMM 05 Rung-Bo-Su 10/26/05 1 0.Abstract IP-lookup
More informationECE276B: Planning & Learning in Robotics Lecture 5: Configuration Space
ECE276B: Planning & Learning in Robotics Lecture 5: Configuration Space Lecturer: Nikolay Atanasov: natanasov@ucsd.edu Teaching Assistants: Tianyu Wang: tiw161@eng.ucsd.edu Yongxi Lu: yol070@eng.ucsd.edu
More informationThe Boundary Forest Algorithm
The Boundary Forest Algorithm Jonathan Yedidia Director of AI Research, Analog Devices Director of the Algorithmic Systems Group, Analog Garage With Charles Mathy, Nate Derbinsky, José Bento and Jonathan
More informationApproximation Algorithms for Geometric Intersection Graphs
Approximation Algorithms for Geometric Intersection Graphs Subhas C. Nandy (nandysc@isical.ac.in) Advanced Computing and Microelectronics Unit Indian Statistical Institute Kolkata 700108, India. Outline
More informationTwo-Level Logic Optimization ( Introduction to Computer-Aided Design) School of EECS Seoul National University
Two-Level Logic Optimization (4541.554 Introduction to Computer-Aided Design) School of EECS Seoul National University Minimization of Two-Level Functions Goals: Minimize cover cardinality Minimize number
More informationSpatio-temporal Range Searching Over Compressed Kinetic Sensor Data. Sorelle A. Friedler Google Joint work with David M. Mount
Spatio-temporal Range Searching Over Compressed Kinetic Sensor Data Sorelle A. Friedler Google Joint work with David M. Mount Motivation Kinetic data: data generated by moving objects Sensors collect data
More information