Encoding Short Ranges in TCAM Without Expansion: Efficient Algorithm and Applications

Size: px
Start display at page:

Download "Encoding Short Ranges in TCAM Without Expansion: Efficient Algorithm and Applications"

Transcription

1 Encoding Short Ranges in TCAM Without Expansion: Efficient Algorithm and Applications Yotam Harchol The Hebrew University of Jerusalem, Israel Joint work with: Anat Bremler-Barr David Hay Yacov Hel-Or IDC Herzliya, Israel To appear in ACM SPAA 26 Hebrew University, Israel IDC Herzliya, Israel This research was supported by the European Research Council under the European Union s Seventh Framework Programme (FP7/27-23)/ERC Grant agreement no

2 TCAM Ternary Content Addressable Memory TCAM is an associative memory module Useful for parallel multidimensional prefix lookup Each entry may consist of,, and * bits Widely used in high-speed networking devices Example: 2-dimensional IP lookup: Source IP Dest. IP What about ranges? (e.g., port numbers) ******* ******* ************* *********** P P2 Drop P TCAM SRAM 2

3 Range Encoding in Binary Representation Can ternary encode only certain intervals Or we need more than one entry (expansion) ** *** **???? * *???? * * Exponential space blow-up when using multiple range fields 3

4 Encoding Short Ranges Ranges of arbitrary length infeasible without expansion Ranges with bounded length feasible! Useful for: Short TCP/UDP ranges (>6% of the ranges in real life) QoS mechanisms (IP ToS/DSCP) Packet size classification (by categories) Timestamps and counters IP spoofing detection (using IP TTL) SDX AS numbering Also useful for applications outside the networking domain 4

5 Range Encoding on TCAM: Two Approaches Database-independent encoding: [Lakshminarayanan et al., 25], [Bremler Barr et al., 27] f enc ([x, y]) = ***** ****** ******* Easy to update Lower bound for w-bits field without expansion: 2 w - bits per range [Lakshminarayanan et al., 25] Database-dependent encoding: [Liu, 22], [Van Lunteren & Engbersen, 23], [Chang & Su, 27], [Che et al., 28], [Bremler Barr et al., 29], [Rottenstreich & Keslassy, 2], [Rottenstreich et al., 23], [Kogan et al., 24] f (, [x, y]) = enc DB **** ***** Both schemes require expansion for a feasible code length Compact codes 5

6 RENÉ Range Encoding with No Expansion Encoding function for short ranges: f enc ([x, y]) = ***** Database independent - easy to update No row expansion Near-optimal TCAM space usage Useful for packet classification applications Useful for high dimensional nearest neighbor search 6

7 Binary-Reflected Gray Code (BRGC) Build recursively by reflecting binary code: Hamming distance between each two adjacent points = 7

8 Range Encoding with Binary-Reflected Gray Code With ternary BRGC we can encode some of the ranges of length h=2 k (k N) ** ** ** ** *** ** ** ** ** What about other (red) ranges? 8

9 Layers Layer: a set of disjoint consecutive ranges Two (blue) layers can be encoded with a BRGC-based ternary word Other (red) layers need more bits ** ** ** ** *** ** ** ** ** 9

10 Cover Ranges Cover range of R: the smallest blue range that fully contains R In red layers: No two consecutive ranges in the same layer are fully contained in a cover range R *** cover(r) Given the cover range, one bit is enough to differentiate ranges in the same layer

11 Single Bit Range Index Red ranges require different encoding Add one bit for each red layer Bit value alternates between ranges in the same layer Bits of other red layers are set to * For blue layers, these bits are always * ** * * * * * 8 * * * * * ** ** ** ** ** ** ** ** 4 5

12 Encoding Scheme for Ranges Encoding of a single range of length h=2 k is: Blue ranges: BRGC(R) Red ranges: BRGC(cover(R)) Ternary BRGC w bits Bit of L... Bit of L h/2- h-2 bits Bit of L h/2+... Bit of L h- Value encoding is now: BRGC Bit of L... Bit of L h/2- Bit of L h/2+... Bit of L h- w bits h-2 bits 2

13 Toy Example 3

14 Optimization For ranges of length h=2 k k- LSBs of the BRGC part are always * *** * ** ** Code can be shorten to w-log(h)+h- bits 6 7 ** ** ** ** ** ** ** ** *** * 8 *** * *** * *** * *** * ** ** ** ** ** ** ** ** 5 *** * *** * *** * *** * 4

15 Encoding Multiple Range Lengths For ranges of length 3, intersect two ranges of length 4: 2 * ** We present the conjunction operator Π: ** * * ** ** * * ** * ** * ** ** * ** * ** * * ** ( means * ** undefined, * ** ** * and if a i Π b i = ** * then a Π b = ) ** * ** * 5 * ** ** * For two ranges R, R 2 : tcode(v) tcode(r4 7 ) Π tcode(r * ** 2 ) if and only if v R R (also: tcode(r ) Π tcode(r 2 ) = ** * R R 2 = ) 5 7 * ** Π ** * = * * 5

16 TCAM bits used per range field (log 2 scale) Theoretical Bound For w=6 Maximal range length (log 2 scale) 6

17 The Nearest Neighbor Search Problem Input: - A set of data points - A query point (or a series of those) (points are in a discrete space) Output: Data point closest to the query point The Curse of Dimensionality: Hard problem for high dimensions (even over or so) 7

18 The Nearest Neighbor Search Problem Encode cubes on data points Given a query point, single TCAM lookup returns the smallest cube that contains it No TCAM entry expansion in high dimension Data Query 8

19 The Nearest Neighbor Search Problem Or instead, save TCAM space Encode cubes on the query point Query TCAM with growing cubes Find first data point to match Data Query 9

20 Experiment on a Real TCAM Currently - no evaluation board for TCAM Instead, we used a commodity network switch with a TCAM Switch has 48 ports of Gbps each (.5 Million packet per second) TCAM is 92 bits wide d-dimensional Cube Representation: ****************************** Src. MAC Dest. MAC Src. IP Dest. IP st dimension 2 nd dimension 3 rd dimension 4 th dimension 5 th dimension 6 th dimension 7 th dimension OpenFlow flow_mod Single port:.5 Million Queries Per Second! Queries as packets OpenFlow Counters 2

21 Conclusions Encoding function for short ranges: f enc ([x, y]) = ***** Database independent - easy to update No row expansion Near-optimal TCAM space usage Useful for packet classification applications Useful for high dimensional nearest neighbor search 2

22 Questions? Thank you. 22

Encoding Short Ranges in TCAM Without Expansion: Efficient Algorithm and Applications

Encoding Short Ranges in TCAM Without Expansion: Efficient Algorithm and Applications Encoding Short Ranges in TCAM Without Expansion: Efficient Algorithm and Applications Technical Report ABSTRACT Anat Bremler-Barr The Interdisciplinary Center Herzliya, Israel bremler@idc.ac.il David Hay

More information

Encoding Short Ranges in TCAM Without Expansion: Efficient Algorithm and Applications

Encoding Short Ranges in TCAM Without Expansion: Efficient Algorithm and Applications Encoding Short Ranges in TCAM Without Expansion: Efficient Algorithm and Applications ABSTRACT Anat Bremler-Barr The Interdisciplinary Center Herzliya, Israel bremler@idc.ac.il David Hay The Hebrew University

More information

Encoding Short Ranges in TCAM Without Expansion: Efficient Algorithm and Applications

Encoding Short Ranges in TCAM Without Expansion: Efficient Algorithm and Applications IEEE/ACM TRANSACTIONS ON NETWORKING 1 Encoding Short Ranges in TCAM Without Expansion: Efficient Algorithm and Applications Anat Bremler-Barr, Member, IEEE, Yotam Harchol, Member, IEEE, David Hay, Member,

More information

Ultra-Fast Similarity Search Using Ternary Content Addressable Memory

Ultra-Fast Similarity Search Using Ternary Content Addressable Memory Ultra-Fast Similarity Search Using Ternary Content Addressable Memory ABSTRACT Anat Bremler-Barr The Interdisciplinary Center Herzliya, Israel bremler@idc.ac.il David Hay The Hebrew University Jerusalem,

More information

Multi-Field Range Encoding for Packet Classification in TCAM

Multi-Field Range Encoding for Packet Classification in TCAM This paper was presented as part of the Mini-Conference at IEEE INFOCOM 2011 Multi-Field Range Encoding for Packet Classification in TCAM Yeim-Kuan Chang, Chun-I Lee and Cheng-Chien Su Department of Computer

More information

Deep Packet Inspection of Next Generation Network Devices

Deep Packet Inspection of Next Generation Network Devices Deep Packet Inspection of Next Generation Network Devices Prof. Anat Bremler-Barr IDC Herzliya, Israel www.deepness-lab.org This work was supported by European Research Council (ERC) Starting Grant no.

More information

Multi-Field Range Encoding for Packet Classification in TCAM

Multi-Field Range Encoding for Packet Classification in TCAM Multi-Field Range Encoding for Packet Classification in TCAM Yeim-Kuan Chang, Chun-I Lee and Cheng-Chien Su Department of Computer Science and Information Engineering National Cheng Kung University Tainan,

More information

Making Network Functions Software-Defined

Making Network Functions Software-Defined Making Network Functions Software-Defined Yotam Harchol VMware Research / The Hebrew University of Jerusalem Joint work with Anat Bremler-Barr and David Hay Appeared in ACM SIGCOMM 2016 THE HEBREW UNIVERSITY

More information

Efficient TCAM Encoding Schemes for Packet Classification using Gray Code

Efficient TCAM Encoding Schemes for Packet Classification using Gray Code Efficient TCAM Encoding Schemes for Packet Classification using Gray Code Yeim-Kuan Chang and Cheng-Chien Su Department of Computer Science and Information Engineering National Cheng Kung University Tainan,

More information

Tree-Based Minimization of TCAM Entries for Packet Classification

Tree-Based Minimization of TCAM Entries for Packet Classification Tree-Based Minimization of TCAM Entries for Packet Classification YanSunandMinSikKim School of Electrical Engineering and Computer Science Washington State University Pullman, Washington 99164-2752, U.S.A.

More information

SSA: A Power and Memory Efficient Scheme to Multi-Match Packet Classification. Fang Yu, T.V. Lakshman, Martin Austin Motoyama, Randy H.

SSA: A Power and Memory Efficient Scheme to Multi-Match Packet Classification. Fang Yu, T.V. Lakshman, Martin Austin Motoyama, Randy H. SSA: A Power and Memory Efficient Scheme to Multi-Match Packet Classification Fang Yu, T.V. Lakshman, Martin Austin Motoyama, Randy H. Katz Presented by: Discussion led by: Sailesh Kumar Packet Classification

More information

Switch and Router Design. Packet Processing Examples. Packet Processing Examples. Packet Processing Rate 12/14/2011

Switch and Router Design. Packet Processing Examples. Packet Processing Examples. Packet Processing Rate 12/14/2011 // Bottlenecks Memory, memory, 88 - Switch and Router Design Dr. David Hay Ross 8b dhay@cs.huji.ac.il Source: Nick Mckeown, Isaac Keslassy Packet Processing Examples Address Lookup (IP/Ethernet) Where

More information

Layered Interval Codes for TCAM-based Classification

Layered Interval Codes for TCAM-based Classification Layered Interval Codes for TCAM-based Classification Anat Bremler-Barr School of Computer Science The Interdisciplinary Center Herzliya, Israel Email: bremler@idc.ac.il David Hay Department of Electrical

More information

PEDS: A Parallel Error Detection Scheme for TCAM Devices

PEDS: A Parallel Error Detection Scheme for TCAM Devices PEDS: A Parallel Error Detection Scheme for TCAM Devices Anat Bremler-Barr, David Hay, Danny Hendler and Ron M. Roth The Interdisciplinary Center, Herzliya, Israel. Email: bremler@idc.ac.il Politecnico

More information

PEDS: A Parallel Error Detection Scheme for TCAM Devices

PEDS: A Parallel Error Detection Scheme for TCAM Devices IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 5, OCTOBER 2010 1665 PEDS: A Parallel Error Detection Scheme for TCAM Devices Anat Bremler-Barr, David Hay, Member, IEEE, Danny Hendler, and Ron M. Roth,

More information

100 GBE AND BEYOND. Diagram courtesy of the CFP MSA Brocade Communications Systems, Inc. v /11/21

100 GBE AND BEYOND. Diagram courtesy of the CFP MSA Brocade Communications Systems, Inc. v /11/21 100 GBE AND BEYOND 2011 Brocade Communications Systems, Inc. Diagram courtesy of the CFP MSA. v1.4 2011/11/21 Current State of the Industry 10 Electrical Fundamental 1 st generation technology constraints

More information

Decision Forest: A Scalable Architecture for Flexible Flow Matching on FPGA

Decision Forest: A Scalable Architecture for Flexible Flow Matching on FPGA Decision Forest: A Scalable Architecture for Flexible Flow Matching on FPGA Weirong Jiang, Viktor K. Prasanna University of Southern California Norio Yamagaki NEC Corporation September 1, 2010 Outline

More information

CS 268: Route Lookup and Packet Classification

CS 268: Route Lookup and Packet Classification Overview CS 268: Route Lookup and Packet Classification Packet Lookup Packet Classification Ion Stoica March 3, 24 istoica@cs.berkeley.edu 2 Lookup Problem Identify the output interface to forward an incoming

More information

Generic Architecture. EECS 122: Introduction to Computer Networks Switch and Router Architectures. Shared Memory (1 st Generation) Today s Lecture

Generic Architecture. EECS 122: Introduction to Computer Networks Switch and Router Architectures. Shared Memory (1 st Generation) Today s Lecture Generic Architecture EECS : Introduction to Computer Networks Switch and Router Architectures Computer Science Division Department of Electrical Engineering and Computer Sciences University of California,

More information

Geometric Data Structures Multi-dimensional queries Nearest neighbour problem References. Notes on Computational Geometry and Data Structures

Geometric Data Structures Multi-dimensional queries Nearest neighbour problem References. Notes on Computational Geometry and Data Structures Notes on Computational Geometry and Data Structures 2008 Geometric Data Structures and CGAL Geometric Data Structures and CGAL Data Structure Interval Tree Priority Search Tree Segment Tree Range tree

More information

Configure Routing Resources on the Switch

Configure Routing Resources on the Switch Configure Routing Resources on the Switch Objective On your switch, all of the routing information is stored in special high-speed memory called Ternary Content Addressable Memory (TCAM) which mainly functions

More information

EECS 122: Introduction to Computer Networks Switch and Router Architectures. Today s Lecture

EECS 122: Introduction to Computer Networks Switch and Router Architectures. Today s Lecture EECS : Introduction to Computer Networks Switch and Router Architectures Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley,

More information

Multidimensional Indexes [14]

Multidimensional Indexes [14] CMSC 661, Principles of Database Systems Multidimensional Indexes [14] Dr. Kalpakis http://www.csee.umbc.edu/~kalpakis/courses/661 Motivation Examined indexes when search keys are in 1-D space Many interesting

More information

Efficient Gray-Code-Based Range Encoding Schemes for Packet ClassificationinTCAM

Efficient Gray-Code-Based Range Encoding Schemes for Packet ClassificationinTCAM IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 21, NO. 4, AUGUST 2013 1201 Efficient Gray-Code-Based Range Encoding Schemes for Packet ClassificationinTCAM Yeim-Kuan Chang, Cheng-Chien Su, Yung-Chieh Lin, and

More information

PC-DUOS: Fast TCAM Lookup and Update for Packet Classifiers

PC-DUOS: Fast TCAM Lookup and Update for Packet Classifiers PC-DUOS: Fast TCAM Lookup and Update for Packet Classifiers Tania Mishra and Sartaj Sahni Department of Computer and Information Science and Engineering, University of Florida, Gainesville, FL 326 {tmishra,

More information

Scalable Name-Based Packet Forwarding: From Millions to Billions. Tian Song, Beijing Institute of Technology

Scalable Name-Based Packet Forwarding: From Millions to Billions. Tian Song, Beijing Institute of Technology Scalable Name-Based Packet Forwarding: From Millions to Billions Tian Song, songtian@bit.edu.cn, Beijing Institute of Technology Haowei Yuan, Patrick Crowley, Washington University Beichuan Zhang, The

More information

PC-TRIO: An Indexed TCAM Architecture for Packet Classifiers

PC-TRIO: An Indexed TCAM Architecture for Packet Classifiers PC-TRIO: An Indexed TCAM Architecture for Packet Classifiers Tania Banerjee-Mishra and Sartaj Sahni, University of Florida, Gainesville, FL, USA {tmishra, sahni}@cise.ufl.edu Gunasekaran Seetharaman, AFRL,

More information

ECE697AA Lecture 21. Packet Classification

ECE697AA Lecture 21. Packet Classification ECE697AA Lecture 21 Routers: Flow Classification Algorithms Tilman Wolf Department of Electrical and Computer Engineering 11/20/08 Packet Classification What is packet classification? Categorization of

More information

Implementation of Boundary Cutting Algorithm Using Packet Classification

Implementation of Boundary Cutting Algorithm Using Packet Classification Implementation of Boundary Cutting Algorithm Using Packet Classification Dasari Mallesh M.Tech Student Department of CSE Vignana Bharathi Institute of Technology, Hyderabad. ABSTRACT: Decision-tree-based

More information

An Efficient TCAM Update Scheme for Packet Classification

An Efficient TCAM Update Scheme for Packet Classification 03 IEEE 7th International Conference on Advanced Information Networking and Applications An Efficient TCAM Update Scheme for Packet Classification Yeim-Kuan Chang Department of Computer Science and Information

More information

CS 5114 Network Programming Languages Data Plane. Nate Foster Cornell University Spring 2013

CS 5114 Network Programming Languages Data Plane. Nate Foster Cornell University Spring 2013 CS 5114 Network Programming Languages Data Plane http://www.flickr.com/photos/rofi/2097239111/ Nate Foster Cornell University Spring 2013 Based on lecture notes by Jennifer Rexford and Michael Freedman

More information

A middle ground between CAMs and DAGs for high-speed packet classification

A middle ground between CAMs and DAGs for high-speed packet classification A middle ground between CAMs and DAGs for high-speed packet classification Amit Prakash Adnan Aziz The University of Texas at Austin Abstract Packet classification is a computationally intensive task that

More information

Multi-core Implementation of Decomposition-based Packet Classification Algorithms 1

Multi-core Implementation of Decomposition-based Packet Classification Algorithms 1 Multi-core Implementation of Decomposition-based Packet Classification Algorithms 1 Shijie Zhou, Yun R. Qu, and Viktor K. Prasanna Ming Hsieh Department of Electrical Engineering, University of Southern

More information

Packet Classification Using Dynamically Generated Decision Trees

Packet Classification Using Dynamically Generated Decision Trees 1 Packet Classification Using Dynamically Generated Decision Trees Yu-Chieh Cheng, Pi-Chung Wang Abstract Binary Search on Levels (BSOL) is a decision-tree algorithm for packet classification with superior

More information

Data Mining. 3.5 Lazy Learners (Instance-Based Learners) Fall Instructor: Dr. Masoud Yaghini. Lazy Learners

Data Mining. 3.5 Lazy Learners (Instance-Based Learners) Fall Instructor: Dr. Masoud Yaghini. Lazy Learners Data Mining 3.5 (Instance-Based Learners) Fall 2008 Instructor: Dr. Masoud Yaghini Outline Introduction k-nearest-neighbor Classifiers References Introduction Introduction Lazy vs. eager learning Eager

More information

Performance Evaluation and Improvement of Algorithmic Approaches for Packet Classification

Performance Evaluation and Improvement of Algorithmic Approaches for Packet Classification Performance Evaluation and Improvement of Algorithmic Approaches for Packet Classification Yaxuan Qi, Jun Li Research Institute of Information Technology (RIIT) Tsinghua University, Beijing, China, 100084

More information

Rule Caching in Software- Define Networkings. Supervisor: Prof Weifa Liang Student: Zhenge Jia, u Date of presentation: 24 th May 2016

Rule Caching in Software- Define Networkings. Supervisor: Prof Weifa Liang Student: Zhenge Jia, u Date of presentation: 24 th May 2016 Rule Caching in Software- Define Networkings Supervisor: Prof Weifa Liang Student: Zhenge Jia, u5433077 Date of presentation: 24 th May 2016 Background Related Work System Model CONTENT Wildcard Rule Caching

More information

ECE697AA Lecture 20. Forwarding Tables

ECE697AA Lecture 20. Forwarding Tables ECE697AA Lecture 20 Routers: Prefix Lookup Algorithms Tilman Wolf Department of Electrical and Computer Engineering 11/14/08 Forwarding Tables Routing protocols involve a lot of information Path choices,

More information

Bit Weaving: A Non-prefix Approach to Compressing Packet Classifiers in TCAMs

Bit Weaving: A Non-prefix Approach to Compressing Packet Classifiers in TCAMs 1 Bit Weaving: A Non-prefix Approach to Compressing Packet Classifiers in TCAMs Chad R. Meiners Alex X. Liu Eric Torng Abstract Ternary Content Addressable Memories (TCAMs) have become the de facto standard

More information

All-Match Based Complete Redundancy Removal for Packet Classifiers in TCAMs

All-Match Based Complete Redundancy Removal for Packet Classifiers in TCAMs All-Match Based Complete for Packet Classifiers in TCAMs Alex X Liu Chad R Meiners Yun Zhou Department of Computer Science and Engineering Michigan State University East Lansing, MI 48823, USA {alexliu,

More information

Image Processing Via Pixel Permutations

Image Processing Via Pixel Permutations Image Processing Via Pixel Permutations Michael Elad The Computer Science Department The Technion Israel Institute of technology Haifa 32000, Israel Joint work with Idan Ram Israel Cohen The Electrical

More information

AN EFFICIENT HYBRID ALGORITHM FOR MULTIDIMENSIONAL PACKET CLASSIFICATION

AN EFFICIENT HYBRID ALGORITHM FOR MULTIDIMENSIONAL PACKET CLASSIFICATION AN EFFICIENT HYBRID ALGORITHM FOR MULTIDIMENSIONAL PACKET CLASSIFICATION Yaxuan Qi 1 and Jun Li 1,2 1 Research Institute of Information Technology (RIIT), Tsinghua University, Beijing, China, 100084 2

More information

Striped Grid Files: An Alternative for Highdimensional

Striped Grid Files: An Alternative for Highdimensional Striped Grid Files: An Alternative for Highdimensional Indexing Thanet Praneenararat 1, Vorapong Suppakitpaisarn 2, Sunchai Pitakchonlasap 1, and Jaruloj Chongstitvatana 1 Department of Mathematics 1,

More information

Managing and Securing Computer Networks. Guy Leduc. Chapter 2: Software-Defined Networks (SDN) Chapter 2. Chapter goals:

Managing and Securing Computer Networks. Guy Leduc. Chapter 2: Software-Defined Networks (SDN) Chapter 2. Chapter goals: Managing and Securing Computer Networks Guy Leduc Chapter 2: Software-Defined Networks (SDN) Mainly based on: Computer Networks and Internets, 6 th Edition Douglas E. Comer Pearson Education, 2015 (Chapter

More information

Clustering Billions of Images with Large Scale Nearest Neighbor Search

Clustering Billions of Images with Large Scale Nearest Neighbor Search Clustering Billions of Images with Large Scale Nearest Neighbor Search Ting Liu, Charles Rosenberg, Henry A. Rowley IEEE Workshop on Applications of Computer Vision February 2007 Presented by Dafna Bitton

More information

Non-Parametric Modeling

Non-Parametric Modeling Non-Parametric Modeling CE-725: Statistical Pattern Recognition Sharif University of Technology Spring 2013 Soleymani Outline Introduction Non-Parametric Density Estimation Parzen Windows Kn-Nearest Neighbor

More information

PUSHING THE LIMITS, A PERSPECTIVE ON ROUTER ARCHITECTURE CHALLENGES

PUSHING THE LIMITS, A PERSPECTIVE ON ROUTER ARCHITECTURE CHALLENGES PUSHING THE LIMITS, A PERSPECTIVE ON ROUTER ARCHITECTURE CHALLENGES Greg Hankins APRICOT 2012 2012 Brocade Communications Systems, Inc. 2012/02/28 Lookup Capacity and Forwarding

More information

EE 584 MACHINE VISION

EE 584 MACHINE VISION EE 584 MACHINE VISION Binary Images Analysis Geometrical & Topological Properties Connectedness Binary Algorithms Morphology Binary Images Binary (two-valued; black/white) images gives better efficiency

More information

An Architecture for IPv6 Lookup Using Parallel Index Generation Units

An Architecture for IPv6 Lookup Using Parallel Index Generation Units An Architecture for IPv6 Lookup Using Parallel Index Generation Units Hiroki Nakahara, Tsutomu Sasao, and Munehiro Matsuura Kagoshima University, Japan Kyushu Institute of Technology, Japan Abstract. This

More information

We use non-bold capital letters for all random variables in these notes, whether they are scalar-, vector-, matrix-, or whatever-valued.

We use non-bold capital letters for all random variables in these notes, whether they are scalar-, vector-, matrix-, or whatever-valued. The Bayes Classifier We have been starting to look at the supervised classification problem: we are given data (x i, y i ) for i = 1,..., n, where x i R d, and y i {1,..., K}. In this section, we suppose

More information

The Data Link Layer. CS158a Chris Pollett Feb 26, 2007.

The Data Link Layer. CS158a Chris Pollett Feb 26, 2007. The Data Link Layer CS158a Chris Pollett Feb 26, 2007. Outline Finish up Overview of Data Link Layer Error Detecting and Correcting Codes Finish up Overview of Data Link Layer Last day we were explaining

More information

6. Dicretization methods 6.1 The purpose of discretization

6. Dicretization methods 6.1 The purpose of discretization 6. Dicretization methods 6.1 The purpose of discretization Often data are given in the form of continuous values. If their number is huge, model building for such data can be difficult. Moreover, many

More information

Forwarding and Routers : Computer Networking. Original IP Route Lookup. Outline

Forwarding and Routers : Computer Networking. Original IP Route Lookup. Outline Forwarding and Routers 15-744: Computer Networking L-9 Router Algorithms IP lookup Longest prefix matching Classification Flow monitoring Readings [EVF3] Bitmap Algorithms for Active Flows on High Speed

More information

Shape Shifting Tries for Faster IP Route Lookup

Shape Shifting Tries for Faster IP Route Lookup Shape Shifting Tries for Faster IP Route Lookup Haoyu Song, Jonathan Turner, John Lockwood Applied Research Laboratory Washington University in St. Louis Email: {hs1,jst,lockwood}@arl.wustl.edu Abstract

More information

Problem Statement. Algorithm MinDPQ (contd.) Algorithm MinDPQ. Summary of Algorithm MinDPQ. Algorithm MinDPQ: Experimental Results.

Problem Statement. Algorithm MinDPQ (contd.) Algorithm MinDPQ. Summary of Algorithm MinDPQ. Algorithm MinDPQ: Experimental Results. Algorithms for Routing Lookups and Packet Classification October 3, 2000 High Level Outline Part I. Routing Lookups - Two lookup algorithms Part II. Packet Classification - One classification algorithm

More information

(Master Course) Mohammad Farshi Department of Computer Science, Yazd University. Yazd Univ. Computational Geometry.

(Master Course) Mohammad Farshi Department of Computer Science, Yazd University. Yazd Univ. Computational Geometry. 1 / 17 (Master Course) Mohammad Farshi Department of Computer Science, Yazd University 1392-1 2 / 17 : Mark de Berg, Otfried Cheong, Marc van Kreveld, Mark Overmars, Algorithms and Applications, 3rd Edition,

More information

4.1.2 Merge Sort Sorting Lower Bound Counting Sort Sorting in Practice Solving Problems by Sorting...

4.1.2 Merge Sort Sorting Lower Bound Counting Sort Sorting in Practice Solving Problems by Sorting... Contents 1 Introduction... 1 1.1 What is Competitive Programming?... 1 1.1.1 Programming Contests.... 2 1.1.2 Tips for Practicing.... 3 1.2 About This Book... 3 1.3 CSES Problem Set... 5 1.4 Other Resources...

More information

A Parallel Algorithm for Exact Structure Learning of Bayesian Networks

A Parallel Algorithm for Exact Structure Learning of Bayesian Networks A Parallel Algorithm for Exact Structure Learning of Bayesian Networks Olga Nikolova, Jaroslaw Zola, and Srinivas Aluru Department of Computer Engineering Iowa State University Ames, IA 0010 {olia,zola,aluru}@iastate.edu

More information

Shape Shifting Tries for Faster IP Route Lookup

Shape Shifting Tries for Faster IP Route Lookup Shape Shifting Tries for Faster IP Route Lookup Haoyu Song, Jonathan Turner, John Lockwood Applied Research Laboratory Washington University in St. Louis Email: {hs1,jst,lockwood}@arl.wustl.edu Abstract

More information

Theorem 2.9: nearest addition algorithm

Theorem 2.9: nearest addition algorithm There are severe limits on our ability to compute near-optimal tours It is NP-complete to decide whether a given undirected =(,)has a Hamiltonian cycle An approximation algorithm for the TSP can be used

More information

15-744: Computer Networking. Routers

15-744: Computer Networking. Routers 15-744: Computer Networking outers Forwarding and outers Forwarding IP lookup High-speed router architecture eadings [McK97] A Fast Switched Backplane for a Gigabit Switched outer Optional [D+97] Small

More information

Scalable Enterprise Networks with Inexpensive Switches

Scalable Enterprise Networks with Inexpensive Switches Scalable Enterprise Networks with Inexpensive Switches Minlan Yu minlanyu@cs.princeton.edu Princeton University Joint work with Alex Fabrikant, Mike Freedman, Jennifer Rexford and Jia Wang 1 Enterprises

More information

ITTC High-Performance Networking The University of Kansas EECS 881 Packet Switch I/O Processing

ITTC High-Performance Networking The University of Kansas EECS 881 Packet Switch I/O Processing High-Performance Networking The University of Kansas EECS 881 Packet Switch I/O Processing James P.G. Sterbenz Department of Electrical Engineering & Computer Science Information Technology & Telecommunications

More information

Algorithms for Nearest Neighbors

Algorithms for Nearest Neighbors Algorithms for Nearest Neighbors Classic Ideas, New Ideas Yury Lifshits Steklov Institute of Mathematics at St.Petersburg http://logic.pdmi.ras.ru/~yura University of Toronto, July 2007 1 / 39 Outline

More information

Data Structures for Approximate Proximity and Range Searching

Data Structures for Approximate Proximity and Range Searching Data Structures for Approximate Proximity and Range Searching David M. Mount University of Maryland Joint work with: Sunil Arya (Hong Kong U. of Sci. and Tech) Charis Malamatos (Max Plank Inst.) 1 Introduction

More information

Data Analytics and Boolean Algebras

Data Analytics and Boolean Algebras Data Analytics and Boolean Algebras Hans van Thiel November 28, 2012 c Muitovar 2012 KvK Amsterdam 34350608 Passeerdersstraat 76 1016 XZ Amsterdam The Netherlands T: + 31 20 6247137 E: hthiel@muitovar.com

More information

Approximate Nearest Neighbors. CS 510 Lecture #24 April 18 th, 2014

Approximate Nearest Neighbors. CS 510 Lecture #24 April 18 th, 2014 Approximate Nearest Neighbors CS 510 Lecture #24 April 18 th, 2014 How is the assignment going? 2 hcp://breckon.eu/toby/demos/videovolumes/ Review: Video as Data Cube Mathematically, the cube can be viewed

More information

A Sorted Partitioning Approach to High-speed and Fast-update OpenFlow Classification

A Sorted Partitioning Approach to High-speed and Fast-update OpenFlow Classification A Sorted Partitioning Approach to High-speed and Fast-update OpenFlow Classification Sorrachai Yingchareonthawornchai James Daly Alex X. Liu Eric Torng Department of Computer Science and Engineering, Michigan

More information

Time and Timestamping in Softwarized Environments

Time and Timestamping in Softwarized Environments Time and Timestamping in Softwarized Environments Tal Mizrahi, Yoram Moses Technion Israel Institute of Technology April 2016 The First Synchronized Clocks Railway switch 2 Networks: Communications vs.

More information

Recursive Flow Classification: An Algorithm for Packet Classification on Multiple Fields

Recursive Flow Classification: An Algorithm for Packet Classification on Multiple Fields 5 CHAPTER 4 Recursive Flow Classification: An Algorithm for Packet Classification on Multiple Fields Introduction Chapters 2 and 3 described algorithms for routing lookups. In this chapter and the next

More information

Nearest Neighbor Classification

Nearest Neighbor Classification Nearest Neighbor Classification Charles Elkan elkan@cs.ucsd.edu October 9, 2007 The nearest-neighbor method is perhaps the simplest of all algorithms for predicting the class of a test example. The training

More information

Compact Data Representations and their Applications. Moses Charikar Princeton University

Compact Data Representations and their Applications. Moses Charikar Princeton University Compact Data Representations and their Applications Moses Charikar Princeton University Lots and lots of data AT&T Information about who calls whom What information can be got from this data? Network router

More information

Chapter 9. Greedy Technique. Copyright 2007 Pearson Addison-Wesley. All rights reserved.

Chapter 9. Greedy Technique. Copyright 2007 Pearson Addison-Wesley. All rights reserved. Chapter 9 Greedy Technique Copyright 2007 Pearson Addison-Wesley. All rights reserved. Greedy Technique Constructs a solution to an optimization problem piece by piece through a sequence of choices that

More information

Predecessor. Predecessor Problem van Emde Boas Tries. Philip Bille

Predecessor. Predecessor Problem van Emde Boas Tries. Philip Bille Predecessor Predecessor Problem van Emde Boas Tries Philip Bille Predecessor Predecessor Problem van Emde Boas Tries Predecessors Predecessor problem. Maintain a set S U = {,..., u-} supporting predecessor(x):

More information

1. Meshes. D7013E Lecture 14

1. Meshes. D7013E Lecture 14 D7013E Lecture 14 Quadtrees Mesh Generation 1. Meshes Input: Components in the form of disjoint polygonal objects Integer coordinates, 0, 45, 90, or 135 angles Output: A triangular mesh Conforming: A triangle

More information

Bitmap Intersection Lookup (BIL) : A Packet Classification s Algorithm with Rules Updating

Bitmap Intersection Lookup (BIL) : A Packet Classification s Algorithm with Rules Updating ICCAS25 Bitmap Intersection Lookup (BIL) : A Packet Classification s Algorithm with Rules Updating Akharin Khunkitti*, Nuttachot Promrit** *Faculty of Information Technology, King Mongkut's Institute of

More information

Router Architectures

Router Architectures Router Architectures Venkat Padmanabhan Microsoft Research 13 April 2001 Venkat Padmanabhan 1 Outline Router architecture overview 50 Gbps multi-gigabit router (Partridge et al.) Technology trends Venkat

More information

Z-KNN Join for the Swiss Feed Database: a feasibility study

Z-KNN Join for the Swiss Feed Database: a feasibility study Z-KNN Join for the Swiss Feed Database: a feasibility study Francesco Luminati University Of Zurich, Switzerland francesco.luminati@uzh.ch 1 Introduction K-nearest neighbor query (knn) and k-nearest neighbor

More information

Accommodating Bursts in Distributed Stream Processing Systems

Accommodating Bursts in Distributed Stream Processing Systems Accommodating Bursts in Distributed Stream Processing Systems Distributed Real-time Systems Lab University of California, Riverside {drougas,vana}@cs.ucr.edu http://www.cs.ucr.edu/~{drougas,vana} Stream

More information

Machine Learning. Nonparametric methods for Classification. Eric Xing , Fall Lecture 2, September 12, 2016

Machine Learning. Nonparametric methods for Classification. Eric Xing , Fall Lecture 2, September 12, 2016 Machine Learning 10-701, Fall 2016 Nonparametric methods for Classification Eric Xing Lecture 2, September 12, 2016 Reading: 1 Classification Representing data: Hypothesis (classifier) 2 Clustering 3 Supervised

More information

Flow Caching for High Entropy Packet Fields

Flow Caching for High Entropy Packet Fields Flow Caching for High Entropy Packet Fields Nick Shelly Nick McKeown! Ethan Jackson Teemu Koponen Jarno Rajahalme Outline Current flow classification in OVS Problems with high entropy packets Proposed

More information

TCAM Razor: A Systematic Approach Towards Minimizing Packet Classifiers in TCAMs Alex X. Liu, Chad R. Meiners, and Eric Torng

TCAM Razor: A Systematic Approach Towards Minimizing Packet Classifiers in TCAMs Alex X. Liu, Chad R. Meiners, and Eric Torng 490 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 2, APRIL 2010 TCAM Razor: A Systematic Approach Towards Minimizing Packet Classifiers in TCAMs Alex X. Liu, Chad R. Meiners, and Eric Torng Abstract

More information

Incompletely Specified Functions with Don t Cares 2-Level Transformation Review Boolean Cube Karnaugh-Map Representation and Methods Examples

Incompletely Specified Functions with Don t Cares 2-Level Transformation Review Boolean Cube Karnaugh-Map Representation and Methods Examples Lecture B: Logic Minimization Incompletely Specified Functions with Don t Cares 2-Level Transformation Review Boolean Cube Karnaugh-Map Representation and Methods Examples Incompletely specified functions

More information

Strategies for Mitigating TCAM Space Bottlenecks

Strategies for Mitigating TCAM Space Bottlenecks Strategies for Mitigating TCAM Space Bottlenecks Kirill Kogan 1,2, Sergey Nikolenko 3,4, Patrick Eugster 1,5, Eddie Ruan 6 Purdue University 1 IMDEA NETWORKS 2 Steklov Institute of Mathematics at St. Petersburg

More information

Predecessor Data Structures. Philip Bille

Predecessor Data Structures. Philip Bille Predecessor Data Structures Philip Bille Outline Predecessor problem First tradeoffs Simple tries x-fast tries y-fast tries Predecessor Problem Predecessor Problem The predecessor problem: Maintain a set

More information

Resource-Efficient SRAM-based Ternary Content Addressable Memory

Resource-Efficient SRAM-based Ternary Content Addressable Memory Abstract: Resource-Efficient SRAM-based Ternary Content Addressable Memory Static random access memory (SRAM)-based ternary content addressable memory (TCAM) offers TCAM functionality by emulating it with

More information

Algorithms for Nearest Neighbors

Algorithms for Nearest Neighbors Algorithms for Nearest Neighbors State-of-the-Art Yury Lifshits Steklov Institute of Mathematics at St.Petersburg Yandex Tech Seminar, April 2007 1 / 28 Outline 1 Problem Statement Applications Data Models

More information

Network Processors. Nevin Heintze Agere Systems

Network Processors. Nevin Heintze Agere Systems Network Processors Nevin Heintze Agere Systems Network Processors What are the packaging challenges for NPs? Caveat: I know very little about packaging. Network Processors What are the packaging challenges

More information

Efficient Packet Classification using Splay Tree Models

Efficient Packet Classification using Splay Tree Models 28 IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.5B, May 2006 Efficient Packet Classification using Splay Tree Models Srinivasan.T, Nivedita.M, Mahadevan.V Sri Venkateswara

More information

Accelerometer Gesture Recognition

Accelerometer Gesture Recognition Accelerometer Gesture Recognition Michael Xie xie@cs.stanford.edu David Pan napdivad@stanford.edu December 12, 2014 Abstract Our goal is to make gesture-based input for smartphones and smartwatches accurate

More information

Single Image Interpolation via Adaptive Non-Local Sparsity-Based Modeling

Single Image Interpolation via Adaptive Non-Local Sparsity-Based Modeling Single Image Interpolation via Adaptive Non-Local Sparsity-Based Modeling Yaniv Romano The Electrical Engineering Department Matan Protter The Computer Science Department Michael Elad The Computer Science

More information

Predecessor. Predecessor. Predecessors. Predecessors. Predecessor Problem van Emde Boas Tries. Predecessor Problem van Emde Boas Tries.

Predecessor. Predecessor. Predecessors. Predecessors. Predecessor Problem van Emde Boas Tries. Predecessor Problem van Emde Boas Tries. Philip Bille s problem. Maintain a set S U = {,..., u-} supporting predecessor(x): return the largest element in S that is x. sucessor(x): return the smallest element in S that is x. insert(x): set S =

More information

Geometric data structures:

Geometric data structures: Geometric data structures: Machine Learning for Big Data CSE547/STAT548, University of Washington Sham Kakade Sham Kakade 2017 1 Announcements: HW3 posted Today: Review: LSH for Euclidean distance Other

More information

COMPUTATIONAL STATISTICS UNSUPERVISED LEARNING

COMPUTATIONAL STATISTICS UNSUPERVISED LEARNING COMPUTATIONAL STATISTICS UNSUPERVISED LEARNING Luca Bortolussi Department of Mathematics and Geosciences University of Trieste Office 238, third floor, H2bis luca@dmi.units.it Trieste, Winter Semester

More information

Dynamic Pipelining: Making IP- Lookup Truly Scalable

Dynamic Pipelining: Making IP- Lookup Truly Scalable Dynamic Pipelining: Making IP- Lookup Truly Scalable Jahangir Hasan T. N. Vijaykumar School of Electrical and Computer Engineering, Purdue University SIGCOMM 05 Rung-Bo-Su 10/26/05 1 0.Abstract IP-lookup

More information

ECE276B: Planning & Learning in Robotics Lecture 5: Configuration Space

ECE276B: Planning & Learning in Robotics Lecture 5: Configuration Space ECE276B: Planning & Learning in Robotics Lecture 5: Configuration Space Lecturer: Nikolay Atanasov: natanasov@ucsd.edu Teaching Assistants: Tianyu Wang: tiw161@eng.ucsd.edu Yongxi Lu: yol070@eng.ucsd.edu

More information

The Boundary Forest Algorithm

The Boundary Forest Algorithm The Boundary Forest Algorithm Jonathan Yedidia Director of AI Research, Analog Devices Director of the Algorithmic Systems Group, Analog Garage With Charles Mathy, Nate Derbinsky, José Bento and Jonathan

More information

Approximation Algorithms for Geometric Intersection Graphs

Approximation Algorithms for Geometric Intersection Graphs Approximation Algorithms for Geometric Intersection Graphs Subhas C. Nandy (nandysc@isical.ac.in) Advanced Computing and Microelectronics Unit Indian Statistical Institute Kolkata 700108, India. Outline

More information

Two-Level Logic Optimization ( Introduction to Computer-Aided Design) School of EECS Seoul National University

Two-Level Logic Optimization ( Introduction to Computer-Aided Design) School of EECS Seoul National University Two-Level Logic Optimization (4541.554 Introduction to Computer-Aided Design) School of EECS Seoul National University Minimization of Two-Level Functions Goals: Minimize cover cardinality Minimize number

More information

Spatio-temporal Range Searching Over Compressed Kinetic Sensor Data. Sorelle A. Friedler Google Joint work with David M. Mount

Spatio-temporal Range Searching Over Compressed Kinetic Sensor Data. Sorelle A. Friedler Google Joint work with David M. Mount Spatio-temporal Range Searching Over Compressed Kinetic Sensor Data Sorelle A. Friedler Google Joint work with David M. Mount Motivation Kinetic data: data generated by moving objects Sensors collect data

More information