Scalable Packet Classification for IPv6 by Using Limited TCAMs

Size: px
Start display at page:

Download "Scalable Packet Classification for IPv6 by Using Limited TCAMs"

Transcription

1 Scalable Packet Classification for IPv6 by Using Limited TCAMs Chia-Tai Chan 1, Pi-Chung Wang 1,Shuo-ChengHu 2, Chung-Liang Lee 1,and Rong-Chang Chen 3 1 Telecommunication Laboratories, Chunghwa Telecom Co., Ltd. 7F, No. 9 Lane 74 Hsin-Yi Rd. Sec. 4, Taipei, Taiwan 106, R.O.C. {ctchan,abu,chlilee}@cht.com.tw 2 Department of Info. Management, Ming-Hsin University of Science and Technology 1 Hsin-Hsing Rd. Hsin-Fong, Hsinchu, Taiwan 304, R.O.C. schu@mis.must.edu.tw 3 Department of Logistics Engineering and Management National Taichung Institute of Technology No. 129, Sec. 3, Sanmin Rd., Taichung, Taiwan 404, R.O.C. rcchens@ntit.edu.tw Abstract. It has been demonstrated that performing packet classification on a potentially large number of filters on key header fields is difficult and has poor worst-case performance. To achieve fast packet classification, hardware support is unavoidable. Ternary content-addressable memory (TCAM) has been widely used to perform fast packet classification due to its ability to solve the problem in O(1) time without considering the number of entries, mask continuity and their lengths. As compared to the software-based solutions, the TCAM can offer sustained throughput and simple system architecture. It is attractive for packet classification, especially for the ultimate IPv6-based networks. However, it also comes with several shortcomings, such as the limited number of entries, expansive cost and power consumption. Accordingly, we propose an efficient algorithm to reduce the required TCAM by encoding the address portion of the searchable entries. The new scheme could encrypt the 128-bit prefixes of the real-world IPv6 routing tables into 11 bits and still keeps the property of CIDR. 1 Introduction The major obstacle for the high-speed router ties to the relatively slow Internet lookup, including routing lookup and packet classification. For an incoming packet, a router must perform routing lookup to forward packets toward their destinations based on the information gathered by the routing protocols. In next generation networks, the new services, such as firewall processing, RSVP style resource reservation policies, QoS Routing, and normal unicast and multicast forwarding, require more discriminating forwarding called packet classification. It allowsservice differentiation because the router can distinguish traffic based on

2 2 Chan et al. source/destination address, TCP/UDP port numbers, and protocol flags. Consequently, each packet is distinguished according to the policies (or filters). The forwarding database of a router consists of a potentially large number of policies. Each policy has a given cost. The header of the incoming packet might match multiple policies. The policy with least cost will be used to forward the packet. To perform packet classification on a potentially large number of policies on key header fields is difficult and has poor worst-case performance. Unlike the routing prefixes, the policy could be un-continuously masked and the length of policy is much longer than that of routing prefix. The routing lookup problem is just a special case of packet classification. As a result, the search of least cost policy (LCP) may be time consuming for a backbone router with a large number of table entries. The exponential growth of the Internet hosts has further stressed the routing system. It is difficult for the packet-forwarding rate to keep up with the increased traffic demand. 1.1 Problem Statement Essentially, packet classification is a problem of multi-dimensional range match. To describe the problem formally, we have to define the classifier and the policy. A classifier maintains a set of policies to divide an incoming packet stream into multiple classes. A policy F =(f[1],f[2],...,f[k]) is called k-dimension if the policy consists of k fields, where each f[i] is either a variable length prefix bit string, a range or a explicit value of the packet header. A policy can be any combination of fields of the packet header, the most common fields are the IP source address, the IP destination address, the protocol type, port numbers of source/destination applications and protocol flags. A packet P is said to match a particular policy F if for all i, thei th field of the header satisfies the f[i]. Each policy has an associative action. For example, the policy F = ( ,,UDP,1090, ) specifies a rule for flows which address to the subnet use the progressive networks audio (PNA) and the action of the rule may assign the packets belonged to these flows with higher queueing priority. Besides the action, the policy is usually given a cost value to define the priority in the database. The action of the least-cost matched policy will be used to process the arriving packets, thus the packet classification problem is a least-cost problem. 1.2 Existing Approaches Recently, several packet classification algorithms have been proposed in the literature [2 6]. It can be categorized into following classes: linear search/caching, hardware-based, grid of tries/cross-product, recursive-flow classification, and hash-based solutions. In the following, we briefly described the main properties of these algorithms. Assume that N is the number of the policies, D is the number of classified fields and W is the length of IP address. Linear Search/Caching: The simplest approach for packet classification is to perform a linear search through all the policies. The space and time complexity

3 Scalable Packet Classification for IPv6 3 is O(N). Caching is a technique often employed at either hardware or software level to improve performance of linear search. However, performance of caching is critically dependent on having large number of packets in each flow. Also, if the number of simultaneous flows becomes larger than cache size, the performance degrades severely. Bit-Parallelism: Another scheme that relies on very wide memory bus is presented by Lakshamn et al. [5]. The algorithm reads Nk bits from memory, corresponding to the BMPs in each field and takes their intersection to find the set of matching policies. Memory requirement for this scheme is O(N 2 ). This scheme relies on heavy parallelism, and requires significant hardware cost, not to mention that flexibility and scalability of hardware solutions is very limited. Grid of Tries/Cross-product: Specifically for the case of 2-field policies, Srinivasan et al. [2] presented a trie-based algorithm. This algorithm has memory requirement O(NW)andrequires2W 1 memory accesses per policy lookup. Also presented in [2] is a general mechanism called cross-product which involves performing the BMP lookups on individual fields, and using a pre-computed table for combining results of individual prefix lookups. However, this scheme suffers from a O(N k ) memory blowup for k-field policies, including k = 2 field policies. Recursive-flow Classification: Gupta et al. presented an algorithm, which can be considered as a generalization of cross-product [3]. After BMP lookup has been performed, recursive flow classification algorithm performs cross-product in a hierarchical manner. Thus k BMP lookups and k 1 additional memory accesses are required per policy lookup. It is expected to provide significant improvement on an average, but it requires O(N k ) memory in the worst case. Also, for the case of 2-field policies, this scheme is identical to the cross-producting and hence has memory requirement of O(N 2 ). Hash-based Solution: The basic idea is motivated by the observation that while policy databases contain many different prefixes or ranges, the number of distinct prefix lengths tends to be small [1]. For instance, backbone routers have about 60K destination address prefixes, but there are only 32 distinct prefix lengths. Thus it can divide all the prefixes into 32 groups, one for each length (W ). Since all prefixes in a group have the same length, it can use the prefix bit string as a hash key. That leads to a simple IP lookup scheme, which requires O(W ) hash lookups, independent of the number of prefixes. The algorithm of Waldvogel [1] performs a binary search over the W length groups, and achieves O(logW ) worst-case time complexity. The tuple space idea generalizes the aforementioned approach to multi-dimension policies [4]. A tuple is a set of policies with specific prefix lengths, and the resulting set of tuples is called as tuple space. Since each tuple has a specific bit-length for each field, by concatenating these fields in order to create a hash key, which can be used to perform the tuple lookup. Thus, the matched policy can be found by probing each tuple alternately, and keep track of the least cost policy. As an example, the two-dimension policies F =(10, 110 ) andg =(11, 001 ) will both belong to the tuple T 2,3.When searching T 2,3, a hash key is constructed by concatenating 2 bits of the source

4 4 Chan et al. field with 3 bits of the destination field. Since the number of tuples is generally much smaller than the number of policies, even a linear search of the tuple space results, in a significant improvement over linear search of the policies. Ternary CAM: Ternary content-addressable memory (TCAM) is one popular hardware device to perform fast packet classification. As compared to the software-based solutions, the TCAM can offer sustained throughput and simple system architecture, thus makes it attractive. However, it also comes with several shortcomings, such as the limited size, power consumption and expansive cost. For example, a 9 Mbits TCAM chip (US $200, 40mm 40mm) running at 100 MHz dissipates about 8.5W. In comparison, a 9 Mbits SRAM (US $20, 14mm 22mm) running at 250 MHz dissipates only 0.75W. Specifically, the policy length could be as long as 296 bits with IPv6. With the state-of-the-art 9-Mbit TCAM, it could support 16K such entries. In next generation networks, the TCAM will be suffering from a limited number of entries. Table 1. Complexity comparisons. Schemes Speed Storage Scalability Linear Search O(N) O(NW) - Bit Parallelism [5] O(DW + N/B) O(DN 2 ) - Grid of Tries [2] O(W D 1 ) O(NDW 2 ) Cross-producting [2] O(DW ) O(N D ) - RFC [3] O(D) O(N D ) - Tuple Space Search [4] O(N) O(NW) Ternary CAM O(1) O(NW) - Proposed scheme O(1) O(N (logw + β)) N:the number of prefixes, W:the maximum prefix length D:the number of dimensions, B: the memory bus width β:the number of levels. In this article, we propose an efficient algorithm to reduce the required TCAM by encoding the address portion of the searchable entries. The new scheme could reduce the length of TCAM entries from W to (logn + β) and still keeps the property of CIDR, where N is the number of the policies, β is the maximum number of levels and W is the length of IP address. In our experiments, it could encrypt the 128-bit prefixes of the real-world IPv6 routing tables into 11 bits. The rest of the paper is organized as follows. Section 2 presents the proposed algorithm. The experiment results are presented in Section 3. Finally, a summary is given in Section 4.

5 2 TCAM Entry Encryption Algorithm Scalable Packet Classification for IPv6 5 From the proposed system architecture, the packet classification could inherit the search result from routing lookup. It motivates us to encode the routing prefix as a much shorter one by replacing the original source/destination addresses in the original policy with the generated keys, so that the required TCAM is also reduced. To achieve the purpose, we have to realize the nature of IP routing prefixes firstly. The adoption of classless inter-domain routing (CIDR) [10] allows the network administrator to specify a smaller network within an existing network. For example, an ISP network is specified by prefix whose next hop is A. It might exists a enterprise network, which is specified by prefix and its next hop is B. The encoding scheme must be able to reflect the hierarchical nature of the routing prefixes. Namely, the generated key for the prefix must be a shorter prefix of that for the prefix Basic Scheme To encode the address portion of the searchable entries, a straightforward scheme is to divide the prefixes into several sub-prefixes according to the length of their shorter prefixes, as shown in Figure 1. The prefix P has two shorter prefixes: P 1 0 and P Thus it is divided as three sub-prefixes 0, 100 and 00 that are inserted to bit-stream group Level I, Level II and Level III, respectively. Clearly, it may derive the same sub-prefixes from different prefixes; such as the Level II bit-stream 01 of prefix P 13 is identical to that of P 2. In each group, the duplicate bit-stream must be eliminated and each bit-stream is assigned a unique IDs. By concatenating the relevant IDs, the encrypted key for each prefix can be generated. In this example, there are three different bit-streamin LevelI,fivein LevelII and four in Level III. Thus maximum 7 (=2+3+2) bits are required to represent the original prefixes. Prefixes P 1 0 P P P P P P P P P P P P P Prefixes with "Level I" bit-stream Prefixes with "Level I" & "Level II" bit-streams Prefixes with "Level I" ~ "Level III" bit-streams P 4 P 2 Binary Tree Representation P 1 P 6 P 3 P 7 P 8 P 5 P 9 P 10 P 11 P 12 P 13 P 14 LevelI ID Level I ID Level IID Fig. 1. Encoding the bit-streams according to what they attach to.

6 6 Chan et al. Exclusive Scheme Though the basic scheme is simple, the number of the encryptedbit-streams may be over-estimated. The encoding results are inefficient for the reason that it is without considering the associated relation between prefixes. For example, the bit-streams 100 and 1010 (i.e., corresponding to P 3 and P 5 respectively) in Level II only concatenate to 0 (i.e., P 1 ). Thus we only have to count the number of bit-streams attached to a specific shorter bit-stream. In our example, there are three bit-streams connected to 0 (P 1 ) and two to both 101 (P 6 )and 11 (P 12 ). Therefore, the number of bits for Level II could be reduced to two and the total length is reduced to six. In Figure 2, we list the ID for each bit-stream. The dotted line is used to separate the bit-streams based on their attached bit-streams. LevelI ID Level IID Level IID P 2 Binary Tree Representation P 1 P 6 P 3 P 7 P 8 P 5 P 11 P 12 P 13 P 14 P 4 P 9 P 10 Fig. 2. Encoding the bit-streams according to what they attach to. Adaptive Scheme The exclusive scheme can be further improved with ingenious encoding of the bit-streams. According to the successive bit-stream length, the exclusive scheme can adjust the length of encoded ID dynamically, as shown in Figure 3. It encodes the bit-stream with bottom-up manner and uses Huffman Encoding to reduce the maximum length of concatenated IDs. Thus the bit-streams in Level III are encoded at first. The minimum required length for each Level III bit-stream is recorded in its preceding prefix. The Level II bit-streams are sorted according to the length of their successive bit-streams. Then the longest one, for example, the Level II bit-streams 1 corresponding to P 8, is assigned the shortest ID 0. Another Level II bit-stream 0 attached to P 6 is thus assigned the ID 01. The IDs for each bit-stream is listed in the left part of Figure 3. In Table 2, we show the encrypted prefixes for different schemes. With the basic scheme, the maximum required length is 7. It can be improved to 6 and 4 by adopting the exclusive and adaptive schemes respectively. Generally speaking, the length of the required bits for the adaptive scheme is quite close to

7 Scalable Packet Classification for IPv6 7 LevelI ID Level IID Level IID P Binary Tree Representation P 1 P 3 P 5 P 7 3 P 6 Minimum Requied Length for the attached bit-streams 2 P 8 P 11 P 12 P 13 1 P 14 P 4 P 9 P 10 Fig. 3. Encoding bit-streams according to the length of their successive bit-streams. the optimal value (log 2 N). Consequently, we use the prefixes of the real-world routing tables to demonstrate the performance of the proposed scheme. Prefix Basic Table 2. The encrypted prefixes for different schemes. Exclusive Adaptive Prefix Basic Exclusive Adaptive P P P P P P P P P P P P P P Usage In each classifier, the referred routing prefixes are extracted from the policies. Then we construct the prefix tree and execute the encoding algorithm to encrypt the prefixes. These results are attached to the routing prefixes as a part of lookup results. For those prefixes which are not referred in the policies, the encrypted results of their referred sub-prefixes are recorded. Also, the address portion of the policy is replaced by the encoded prefixes and inserted into the TCAM. The routing lookup for each incoming packet will decide the next hop and also the encoded prefixes. Since the routing lookup is only performed for the destination address, an extra lookup for the source address is required. Consequently, the addresses in the packet header are replaced by the encoded prefixes and forwarded to the classifier. Then the classifier performs packet classification to derive the service priority.

8 8 Chan et al. 3 Performance Evaluation Through experiments, we demonstrate that the proposed scheme features much less TCAM bits. Currently, the IPv6 routing tables consist of only few hundreds prefixes which are download from 6bone. To further realize the scalability of the proposed scheme, we also use the real data available from the IPMA [8] and NLANR [9] projects for comparison, these data provide a daily snapshot of the routing tables used by some major Network Access Points (NAPs). We illustrate the maximum length of the encoded prefixes for different routing tables and different schemes. Figure 5 shows the encoding results for different routing tables. For the IPv4 routing tables, the basic scheme and exclusive scheme might incur longer encoded-bits than the original prefixes (32 bits). It is because these schemes concatenate maximum bits for each level to generate the encrypted prefixes. Contrarily, the adaptive scheme could complement the longest ID with shortest ID to eliminate the total length. In the experimental results, the adaptive scheme could encrypt the 32-bit prefix to a 22-bit one, which shows a bit-reduction of 70%. Moreover, the proposed scheme has achieved near optimal encoding as compared with the value log 2 (number of prefixes). The difference between two values is incurred by the round-off error in each level. For example, in the routing table of NLANR, there are 102,271 prefixes and 6 levels. The maximum length for NLANR table is 22-bit which is nearly equal to log 2 (102,271) + 6= Maimum Length ofthe Encoded Prefix Basic Schem e Exclusive Schem e Adaptive Schem e LOG(Num berofprefixes) 0 10,000 20,000 30,000 40,000 50,000 60,000 70,000 80,000 90, , ,000 Num berofprefixes Fig. 4. The maximum length of encoded prefixes for different IPv4 routing tables. For the IPv6 routing tables, the adaptive scheme still outperforms the rest schemes, as shown in Figure 5. But with fewer prefixes, the number of levels is reduced as well. Thus even with the simplest scheme, it could achieve fairly good

9 Scalable Packet Classification for IPv6 9 results. While the number of prefixes increases, the effect of the adaptive scheme is emerged. In the results, the adaptive scheme could encrypt the 128-bit prefix to an 11-bit one, which shows a bit-reduction of 9%. 20 Maimum Length ofthe Encoded Prefix Basic Schem e Exclusive Schem e Adaptive Schem e LOG(Num berofprefixes) Num berofprefixes Fig. 5. The maximum length of encoded prefixes for different IPv6 routing tables. According to the experiments, we believe that the required bits are constrained from the increasing prefix length and prefix count. As the routing table contains 1M entries and 12 levels, it would require about 32 bits for encryption, not to mention the route aggregation in IPv6 will largely reduce the number of levels. 4 Conclusions This study investigates the major issues in TCAM-based router design, including its price, power and size. To make use of the TCAM in IPv6-based packet classification, we propose an efficient approach to utilize the limited bits of TCAM. The scheme is motivated by the necessity of routing lookup for each packet. By encoding the prefixes into a much shorter one, the required bits for the TCAM entry could be significantly reduced. The basic idea is to divide the prefixes according to the length of their shorter prefixes and allocate enough bits for each level. It could be further improved by adopting the concept of exclusion to eliminate the combination in each level. Accordingly, we address how to joint a long ID with a short one by using Huffman Encoding. The length of the generated prefix is dramatically reduced. A typical IPv4 routing prefix needs 22 bits and 11 bits for IPv6 routing prefix in the worst case. The resulted prefix length is nearly equal to O(log 2 N + β), where N is the number of prefixes and β is the maximum number of levels. We also demonstrate this in our experiments. With

10 10 Chan et al. the route aggregation in IPv6, the value of b tends to be small. Also, only the referred routing prefixes have to be encoded. Thus the required length for an IPv6 prefix is likely less than 32 bits, which save more than 75% storage. References 1. M. Waldvogel, G. vargnese, J. Turner, and B. Plattner, Scalable High Speed IP Routing Lookups, In Proc. ACM SIGCOMM 97, pages 25-36, Cannes, France, Sept V. Srinivasan, G. Varghese and S. Suri, Packet Classification using Tuple Space Search, in ACM SIGCOMM, September 1999, pp Pankaj Gupta and Nick McKeown, Packet Classification on Multiple Fields, in ACM SIGCOMM, September 1999, pp V. Srinivasan, G. Varghese, S. Suri and M. Waldvogel, Fast Scalable Level Four Switching, in ACM SIGCOMM, September 1998, pp T.V. Lakshman and D. Stidialis, High Speed Policy-based Packet Forwarding Using Efficient Multi-dimensional Range Matching, in ACM SIGCOMM, September 1998, pp Anja Feldmann and S. Muthukrishnan, Tradeoffs for Packet Classification, in IEEE INFOCOM, March 2000, pp D. Shah and P. Gupta, Fast updating Algorithms for TCAMs, IEEE Micro Mag., 21(1):36-47, Jan.-Feb Merit Networks, Inc. Internet Performance Measurement and Analysis (IPMA) Statistics and Daily Reports. See table/. 9. NLANR Project. See Y. Rekhter, T. Li, An Architecture for IP Address Allocation with CIDR. RFC 1518, Sept

Scalable IP Routing Lookup in Next Generation Network

Scalable IP Routing Lookup in Next Generation Network Scalable IP Routing Lookup in Next Generation Network Chia-Tai Chan 1, Pi-Chung Wang 1,Shuo-ChengHu 2, Chung-Liang Lee 1, and Rong-Chang Chen 3 1 Telecommunication Laboratories, Chunghwa Telecom Co., Ltd.

More information

Performance Improvement of Hardware-Based Packet Classification Algorithm

Performance Improvement of Hardware-Based Packet Classification Algorithm Performance Improvement of Hardware-Based Packet Classification Algorithm Yaw-Chung Chen 1, Pi-Chung Wang 2, Chun-Liang Lee 2, and Chia-Tai Chan 2 1 Department of Computer Science and Information Engineering,

More information

Packet Classification Using Dynamically Generated Decision Trees

Packet Classification Using Dynamically Generated Decision Trees 1 Packet Classification Using Dynamically Generated Decision Trees Yu-Chieh Cheng, Pi-Chung Wang Abstract Binary Search on Levels (BSOL) is a decision-tree algorithm for packet classification with superior

More information

SINCE the ever increasing dependency on the Internet, there

SINCE the ever increasing dependency on the Internet, there IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 8, NO. 6, DECEMBER 2006 1239 Scalable Packet Classification for Enabling Internet Differentiated Services Pi-Chung Wang, Member, IEEE, Chia-Tai Chan, Chun-Liang Lee,

More information

Fast Packet Classification Algorithms

Fast Packet Classification Algorithms Fast Packet Classification Algorithms Mrudul Dixit, Anuja Kale, Madhavi Narote, Sneha Talwalkar, and B. V. Barbadekar Abstract A packet classifier possesses a set of rules for classifying packets based

More information

Problem Statement. Algorithm MinDPQ (contd.) Algorithm MinDPQ. Summary of Algorithm MinDPQ. Algorithm MinDPQ: Experimental Results.

Problem Statement. Algorithm MinDPQ (contd.) Algorithm MinDPQ. Summary of Algorithm MinDPQ. Algorithm MinDPQ: Experimental Results. Algorithms for Routing Lookups and Packet Classification October 3, 2000 High Level Outline Part I. Routing Lookups - Two lookup algorithms Part II. Packet Classification - One classification algorithm

More information

Tree-Based Minimization of TCAM Entries for Packet Classification

Tree-Based Minimization of TCAM Entries for Packet Classification Tree-Based Minimization of TCAM Entries for Packet Classification YanSunandMinSikKim School of Electrical Engineering and Computer Science Washington State University Pullman, Washington 99164-2752, U.S.A.

More information

Data Structures for Packet Classification

Data Structures for Packet Classification Presenter: Patrick Nicholson Department of Computer Science CS840 Topics in Data Structures Outline 1 The Problem 2 Hardware Solutions 3 Data Structures: 1D 4 Trie-Based Solutions Packet Classification

More information

CS 268: Route Lookup and Packet Classification

CS 268: Route Lookup and Packet Classification Overview CS 268: Route Lookup and Packet Classification Packet Lookup Packet Classification Ion Stoica March 3, 24 istoica@cs.berkeley.edu 2 Lookup Problem Identify the output interface to forward an incoming

More information

Packet classification using diagonal-based tuple space search q

Packet classification using diagonal-based tuple space search q Computer Networks 50 (2006) 1406 1423 www.elsevier.com/locate/comnet Packet classification using diagonal-based tuple space search q Fu-Yuan Lee *, Shiuhpyng Shieh Department of Computer Science and Information

More information

Grid of Segment Trees for Packet Classification

Grid of Segment Trees for Packet Classification 2010 24th IEEE International Conference on Advanced Information Networking and Applications Grid of Segment Trees for Packet Classification Yeim-Kuan Chang, Yung-Chieh Lin, and Chen-Yu Lin Department of

More information

AN ASSOCIATIVE TERNARY CACHE FOR IP ROUTING. 1. Introduction. 2. Associative Cache Scheme

AN ASSOCIATIVE TERNARY CACHE FOR IP ROUTING. 1. Introduction. 2. Associative Cache Scheme AN ASSOCIATIVE TERNARY CACHE FOR IP ROUTING James J. Rooney 1 José G. Delgado-Frias 2 Douglas H. Summerville 1 1 Dept. of Electrical and Computer Engineering. 2 School of Electrical Engr. and Computer

More information

ECE697AA Lecture 21. Packet Classification

ECE697AA Lecture 21. Packet Classification ECE697AA Lecture 21 Routers: Flow Classification Algorithms Tilman Wolf Department of Electrical and Computer Engineering 11/20/08 Packet Classification What is packet classification? Categorization of

More information

Forwarding and Routers : Computer Networking. Original IP Route Lookup. Outline

Forwarding and Routers : Computer Networking. Original IP Route Lookup. Outline Forwarding and Routers 15-744: Computer Networking L-9 Router Algorithms IP lookup Longest prefix matching Classification Flow monitoring Readings [EVF3] Bitmap Algorithms for Active Flows on High Speed

More information

Packet Classification using Rule Caching

Packet Classification using Rule Caching Packet Classification using Rule Caching Nitesh B. Guinde, Roberto Rojas-Cessa and Sotirios G. Ziavras Electrical and Computer Engineering Department New Jersey Institute Technology Newark, NJ 72, USA

More information

Design of a Multi-Dimensional Packet Classifier for Network Processors

Design of a Multi-Dimensional Packet Classifier for Network Processors Design of a Multi-Dimensional Packet Classifier for Network Processors Stefano Giordano, Gregorio Procissi, Federico Rossi, Fabio Vitucci Dept. of Information Engineering, University of Pisa, ITALY E-mail:

More information

Switch and Router Design. Packet Processing Examples. Packet Processing Examples. Packet Processing Rate 12/14/2011

Switch and Router Design. Packet Processing Examples. Packet Processing Examples. Packet Processing Rate 12/14/2011 // Bottlenecks Memory, memory, 88 - Switch and Router Design Dr. David Hay Ross 8b dhay@cs.huji.ac.il Source: Nick Mckeown, Isaac Keslassy Packet Processing Examples Address Lookup (IP/Ethernet) Where

More information

Performance Evaluation and Improvement of Algorithmic Approaches for Packet Classification

Performance Evaluation and Improvement of Algorithmic Approaches for Packet Classification Performance Evaluation and Improvement of Algorithmic Approaches for Packet Classification Yaxuan Qi, Jun Li Research Institute of Information Technology (RIIT) Tsinghua University, Beijing, China, 100084

More information

Last Lecture: Network Layer

Last Lecture: Network Layer Last Lecture: Network Layer 1. Design goals and issues 2. Basic Routing Algorithms & Protocols 3. Addressing, Fragmentation and reassembly 4. Internet Routing Protocols and Inter-networking 5. Router design

More information

AN EFFICIENT HYBRID ALGORITHM FOR MULTIDIMENSIONAL PACKET CLASSIFICATION

AN EFFICIENT HYBRID ALGORITHM FOR MULTIDIMENSIONAL PACKET CLASSIFICATION AN EFFICIENT HYBRID ALGORITHM FOR MULTIDIMENSIONAL PACKET CLASSIFICATION Yaxuan Qi 1 and Jun Li 1,2 1 Research Institute of Information Technology (RIIT), Tsinghua University, Beijing, China, 100084 2

More information

ITTC High-Performance Networking The University of Kansas EECS 881 Packet Switch I/O Processing

ITTC High-Performance Networking The University of Kansas EECS 881 Packet Switch I/O Processing High-Performance Networking The University of Kansas EECS 881 Packet Switch I/O Processing James P.G. Sterbenz Department of Electrical Engineering & Computer Science Information Technology & Telecommunications

More information

Three Different Designs for Packet Classification

Three Different Designs for Packet Classification Three Different Designs for Packet Classification HATAM ABDOLI Computer Department Bu-Ali Sina University Shahid Fahmideh street, Hamadan IRAN abdoli@basu.ac.ir http://www.profs.basu.ac.ir/abdoli Abstract:

More information

Hardware Assisted Recursive Packet Classification Module for IPv6 etworks ABSTRACT

Hardware Assisted Recursive Packet Classification Module for IPv6 etworks ABSTRACT Hardware Assisted Recursive Packet Classification Module for IPv6 etworks Shivvasangari Subramani [shivva1@umbc.edu] Department of Computer Science and Electrical Engineering University of Maryland Baltimore

More information

Efficient Packet Classification using Splay Tree Models

Efficient Packet Classification using Splay Tree Models 28 IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.5B, May 2006 Efficient Packet Classification using Splay Tree Models Srinivasan.T, Nivedita.M, Mahadevan.V Sri Venkateswara

More information

Routing Lookup Algorithm for IPv6 using Hash Tables

Routing Lookup Algorithm for IPv6 using Hash Tables Routing Lookup Algorithm for IPv6 using Hash Tables Peter Korppoey, John Smith, Department of Electronics Engineering, New Mexico State University-Main Campus Abstract: After analyzing of existing routing

More information

Recursive Flow Classification: An Algorithm for Packet Classification on Multiple Fields

Recursive Flow Classification: An Algorithm for Packet Classification on Multiple Fields 5 CHAPTER 4 Recursive Flow Classification: An Algorithm for Packet Classification on Multiple Fields Introduction Chapters 2 and 3 described algorithms for routing lookups. In this chapter and the next

More information

Fast Update of Forwarding Tables in Internet Router Using AS Numbers Λ

Fast Update of Forwarding Tables in Internet Router Using AS Numbers Λ Fast Update of Forwarding Tables in Internet Router Using AS Numbers Λ Heonsoo Lee, Seokjae Ha, and Yanghee Choi School of Computer Science and Engineering Seoul National University San 56-1, Shilim-dong,

More information

Fast IP Routing Lookup with Configurable Processor and Compressed Routing Table

Fast IP Routing Lookup with Configurable Processor and Compressed Routing Table Fast IP Routing Lookup with Configurable Processor and Compressed Routing Table H. Michael Ji, and Ranga Srinivasan Tensilica, Inc. 3255-6 Scott Blvd Santa Clara, CA 95054 Abstract--In this paper we examine

More information

Algorithms for Packet Classification

Algorithms for Packet Classification Algorithms for Packet Classification Pankaj Gupta and Nick McKeown, Stanford University Abstract The process of categorizing packets into flows in an Internet router is called packet classification. All

More information

An Efficient IP Routing Lookup by Using Routing Interval

An Efficient IP Routing Lookup by Using Routing Interval 374 JOURNA OF COMMUNICATIONS AND NETWORKS, VO.3, NO.4, DECEMBER 21 An Efficient IP Routing ookup by Using Routing Interval Pi-Chung Wang, Chia-Tai Chan, and Yaw-Chung Chen Abstract: Nowadays, the commonly

More information

Frugal IP Lookup Based on a Parallel Search

Frugal IP Lookup Based on a Parallel Search Frugal IP Lookup Based on a Parallel Search Zoran Čiča and Aleksandra Smiljanić School of Electrical Engineering, Belgrade University, Serbia Email: cicasyl@etf.rs, aleksandra@etf.rs Abstract Lookup function

More information

Efficient TCAM Encoding Schemes for Packet Classification using Gray Code

Efficient TCAM Encoding Schemes for Packet Classification using Gray Code Efficient TCAM Encoding Schemes for Packet Classification using Gray Code Yeim-Kuan Chang and Cheng-Chien Su Department of Computer Science and Information Engineering National Cheng Kung University Tainan,

More information

AN ASSOCIATIVE TERNARY CACHE FOR IP ROUTING. 1. Introduction

AN ASSOCIATIVE TERNARY CACHE FOR IP ROUTING. 1. Introduction AN ASSOCIATIVE TERNARY CACHE FOR IP ROUTING James J Rooney 1 José G Delgado-Frias 2 Douglas H Summerville 1 1 Department of Electrical and Computer Engineering 2 School of Electrical Engineering and Computer

More information

EECS 122: Introduction to Computer Networks Switch and Router Architectures. Today s Lecture

EECS 122: Introduction to Computer Networks Switch and Router Architectures. Today s Lecture EECS : Introduction to Computer Networks Switch and Router Architectures Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley,

More information

Generic Architecture. EECS 122: Introduction to Computer Networks Switch and Router Architectures. Shared Memory (1 st Generation) Today s Lecture

Generic Architecture. EECS 122: Introduction to Computer Networks Switch and Router Architectures. Shared Memory (1 st Generation) Today s Lecture Generic Architecture EECS : Introduction to Computer Networks Switch and Router Architectures Computer Science Division Department of Electrical Engineering and Computer Sciences University of California,

More information

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097 Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master

More information

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097 Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for

More information

ECE697AA Lecture 20. Forwarding Tables

ECE697AA Lecture 20. Forwarding Tables ECE697AA Lecture 20 Routers: Prefix Lookup Algorithms Tilman Wolf Department of Electrical and Computer Engineering 11/14/08 Forwarding Tables Routing protocols involve a lot of information Path choices,

More information

THE advent of the World Wide Web (WWW) has doubled

THE advent of the World Wide Web (WWW) has doubled IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 17, NO. 6, JUNE 1999 1093 A Novel IP-Routing Lookup Scheme and Hardware Architecture for Multigigabit Switching Routers Nen-Fu Huang, Member, IEEE,

More information

Dynamic Routing Tables Using Simple Balanced. Search Trees

Dynamic Routing Tables Using Simple Balanced. Search Trees Dynamic Routing Tables Using Simple Balanced Search Trees Y.-K. Chang and Y.-C. Lin Department of Computer Science and Information Engineering National Cheng Kung University Tainan, Taiwan R.O.C. ykchang@mail.ncku.edu.tw

More information

Towards Effective Packet Classification. J. Li, Y. Qi, and B. Xu Network Security Lab RIIT, Tsinghua University Dec, 2005

Towards Effective Packet Classification. J. Li, Y. Qi, and B. Xu Network Security Lab RIIT, Tsinghua University Dec, 2005 Towards Effective Packet Classification J. Li, Y. Qi, and B. Xu Network Security Lab RIIT, Tsinghua University Dec, 2005 Outline Algorithm Study Understanding Packet Classification Worst-case Complexity

More information

Binary Search Schemes for Fast IP Lookups

Binary Search Schemes for Fast IP Lookups 1 Schemes for Fast IP Lookups Pronita Mehrotra, Paul D. Franzon Abstract IP route look up is the most time consuming operation of a router. Route lookup is becoming a very challenging problem due to the

More information

LONGEST prefix matching (LPM) techniques have received

LONGEST prefix matching (LPM) techniques have received IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 14, NO. 2, APRIL 2006 397 Longest Prefix Matching Using Bloom Filters Sarang Dharmapurikar, Praveen Krishnamurthy, and David E. Taylor, Member, IEEE Abstract We

More information

Implementation of Boundary Cutting Algorithm Using Packet Classification

Implementation of Boundary Cutting Algorithm Using Packet Classification Implementation of Boundary Cutting Algorithm Using Packet Classification Dasari Mallesh M.Tech Student Department of CSE Vignana Bharathi Institute of Technology, Hyderabad. ABSTRACT: Decision-tree-based

More information

Multi-core Implementation of Decomposition-based Packet Classification Algorithms 1

Multi-core Implementation of Decomposition-based Packet Classification Algorithms 1 Multi-core Implementation of Decomposition-based Packet Classification Algorithms 1 Shijie Zhou, Yun R. Qu, and Viktor K. Prasanna Ming Hsieh Department of Electrical Engineering, University of Southern

More information

Bitmap Intersection Lookup (BIL) : A Packet Classification s Algorithm with Rules Updating

Bitmap Intersection Lookup (BIL) : A Packet Classification s Algorithm with Rules Updating ICCAS25 Bitmap Intersection Lookup (BIL) : A Packet Classification s Algorithm with Rules Updating Akharin Khunkitti*, Nuttachot Promrit** *Faculty of Information Technology, King Mongkut's Institute of

More information

Design of a High Speed FPGA-Based Classifier for Efficient Packet Classification

Design of a High Speed FPGA-Based Classifier for Efficient Packet Classification Design of a High Speed FPGA-Based Classifier for Efficient Packet Classification V.S.Pallavi 1, Dr.D.Rukmani Devi 2 PG Scholar 1, Department of ECE, RMK Engineering College, Chennai, Tamil Nadu, India

More information

Multi-Field Range Encoding for Packet Classification in TCAM

Multi-Field Range Encoding for Packet Classification in TCAM This paper was presented as part of the Mini-Conference at IEEE INFOCOM 2011 Multi-Field Range Encoding for Packet Classification in TCAM Yeim-Kuan Chang, Chun-I Lee and Cheng-Chien Su Department of Computer

More information

Parallel-Search Trie-based Scheme for Fast IP Lookup

Parallel-Search Trie-based Scheme for Fast IP Lookup Parallel-Search Trie-based Scheme for Fast IP Lookup Roberto Rojas-Cessa, Lakshmi Ramesh, Ziqian Dong, Lin Cai, and Nirwan Ansari Department of Electrical and Computer Engineering, New Jersey Institute

More information

Multiway Range Trees: Scalable IP Lookup with Fast Updates

Multiway Range Trees: Scalable IP Lookup with Fast Updates Multiway Range Trees: Scalable IP Lookup with Fast Updates Subhash Suri George Varghese Priyank Ramesh Warkhede Department of Computer Science Washington University St. Louis, MO 63130. Abstract In this

More information

Homework 1 Solutions:

Homework 1 Solutions: Homework 1 Solutions: If we expand the square in the statistic, we get three terms that have to be summed for each i: (ExpectedFrequency[i]), (2ObservedFrequency[i]) and (ObservedFrequency[i])2 / Expected

More information

A Scalable Approach for Packet Classification Using Rule-Base Partition

A Scalable Approach for Packet Classification Using Rule-Base Partition CNIR Journal, Volume (5), Issue (1), Dec., 2005 A Scalable Approach for Packet Classification Using Rule-Base Partition Mr. S J Wagh 1 and Dr. T. R. Sontakke 2 [1] Assistant Professor in Information Technology,

More information

A Hybrid Approach to CAM-Based Longest Prefix Matching for IP Route Lookup

A Hybrid Approach to CAM-Based Longest Prefix Matching for IP Route Lookup A Hybrid Approach to CAM-Based Longest Prefix Matching for IP Route Lookup Yan Sun and Min Sik Kim School of Electrical Engineering and Computer Science Washington State University Pullman, Washington

More information

Tree, Segment Table, and Route Bucket: A Multistage Algorithm for IPv6 Routing Table Lookup

Tree, Segment Table, and Route Bucket: A Multistage Algorithm for IPv6 Routing Table Lookup Tree, Segment Table, and Route Bucket: A Multistage Algorithm for IPv6 Routing Table Lookup Zhenqiang LI Dongqu ZHENG Yan MA School of Computer Science and Technology Network Information Center Beijing

More information

15-744: Computer Networking. Routers

15-744: Computer Networking. Routers 15-744: Computer Networking outers Forwarding and outers Forwarding IP lookup High-speed router architecture eadings [McK97] A Fast Switched Backplane for a Gigabit Switched outer Optional [D+97] Small

More information

DESIGN AND IMPLEMENTATION OF OPTIMIZED PACKET CLASSIFIER

DESIGN AND IMPLEMENTATION OF OPTIMIZED PACKET CLASSIFIER International Journal of Computer Engineering and Applications, Volume VI, Issue II, May 14 www.ijcea.com ISSN 2321 3469 DESIGN AND IMPLEMENTATION OF OPTIMIZED PACKET CLASSIFIER Kiran K C 1, Sunil T D

More information

Introduction CHAPTER 1

Introduction CHAPTER 1 1 CHAPTER 1 Introduction The Internet is comprised of a mesh of routers interconnected by links. Communication among nodes on the Internet (routers and end-hosts) takes place using the Internet Protocol,

More information

Lecture 12: Aggregation. CSE 123: Computer Networks Alex C. Snoeren

Lecture 12: Aggregation. CSE 123: Computer Networks Alex C. Snoeren Lecture 12: Aggregation CSE 123: Computer Networks Alex C. Snoeren Lecture 12 Overview Subnetting Classless addressing Route aggregation 2 Class-based Addressing Most significant bits determines class

More information

Lecture 12: Addressing. CSE 123: Computer Networks Alex C. Snoeren

Lecture 12: Addressing. CSE 123: Computer Networks Alex C. Snoeren Lecture 12: Addressing CSE 123: Computer Networks Alex C. Snoeren Lecture 12 Overview IP Addresses Class-based addressing Subnetting Classless addressing Route aggregation 2 Addressing Considerations Fixed

More information

Packet Classification Using Standard Access Control List

Packet Classification Using Standard Access Control List Packet Classification Using Standard Access Control List S.Mythrei 1, R.Dharmaraj 2 PG Student, Dept of CSE, Sri Vidya College of engineering and technology, Virudhunagar, Tamilnadu, India 1 Research Scholar,

More information

5. Providing a narrower address space is the primary design goal for IPv6.

5. Providing a narrower address space is the primary design goal for IPv6. Chapter 2: IP Addressing and Related Topics TRUE/FALSE 1. IP addresses can be represented as domain names to make it possible for users to identify and access resources on a network. T PTS: 1 REF: 59 2.

More information

Router Architectures

Router Architectures Router Architectures Venkat Padmanabhan Microsoft Research 13 April 2001 Venkat Padmanabhan 1 Outline Router architecture overview 50 Gbps multi-gigabit router (Partridge et al.) Technology trends Venkat

More information

Packet Classification Algorithms: A Survey

Packet Classification Algorithms: A Survey Packet Classification Algorithms: A Survey Evangeline Asha B 1, Kavitha S 2 1 PG Scholar, Hindusthan Institute of Technology, Coimbatore, Tamil Nadu, India 2 Professor, Hindusthan Institute of Technology,

More information

The Interconnection Structure of. The Internet. EECC694 - Shaaban

The Interconnection Structure of. The Internet. EECC694 - Shaaban The Internet Evolved from the ARPANET (the Advanced Research Projects Agency Network), a project funded by The U.S. Department of Defense (DOD) in 1969. ARPANET's purpose was to provide the U.S. Defense

More information

Selective Boundary Cutting For Packet Classification SOUMYA. K 1, CHANDRA SEKHAR. M 2

Selective Boundary Cutting For Packet Classification SOUMYA. K 1, CHANDRA SEKHAR. M 2 ISSN 2319-8885 Vol.04,Issue.34, August-2015, Pages:6786-6790 www.ijsetr.com SOUMYA. K 1, CHANDRA SEKHAR. M 2 1 Navodaya Institute of Technology, Raichur, Karnataka, India, E-mail: Keerthisree1112@gmail.com.

More information

Review on Tries for IPv6 Lookups

Review on Tries for IPv6 Lookups Available online www.ejaet.com European Journal of Advances in Engineering and Technology, 2016, 3(7): 28-33 Review Article ISSN: 2394-658X Review on Tries for IPv6 Lookups Rohit G Bal Department of Computer

More information

Packet Classification. George Varghese

Packet Classification. George Varghese Packet Classification George Varghese Original Motivation: Firewalls Firewalls use packet filtering to block say ssh and force access to web and mail via proxies. Still part of defense in depth today.

More information

An Efficient Parallel IP Lookup Technique for IPv6 Routers Using Multiple Hashing with Ternary marker storage

An Efficient Parallel IP Lookup Technique for IPv6 Routers Using Multiple Hashing with Ternary marker storage An Efficient Parallel IP Lookup Technique for IPv Routers Using Multiple Hashing with Ternary marker storage P. Kiran Sree Dr. Inampudi Ramesh Babu Mr. P.Kiran Sree,Associate Professor, Department of Computer

More information

1 Connectionless Routing

1 Connectionless Routing UCSD DEPARTMENT OF COMPUTER SCIENCE CS123a Computer Networking, IP Addressing and Neighbor Routing In these we quickly give an overview of IP addressing and Neighbor Routing. Routing consists of: IP addressing

More information

Fast Packet Classification Using Bloom filters

Fast Packet Classification Using Bloom filters Fast Packet Classification Using Bloom filters Sarang Dharmapurikar Haoyu Song Jonathan Turner John Lockwood sarang@arl.wustl.edu hs@arl.wustl.edu jst@arl.wustl.edu lockwood@arl.wustl.edu Washington University

More information

EVERY Internet router today can forward entering Internet

EVERY Internet router today can forward entering Internet 2 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 13, NO. 1, FEBRUARY 2005 Scalable Packet Classification Florin Baboescu and George Varghese, Member, IEEE Abstract Packet classification is important for applications

More information

Guide to TCP/IP Fourth Edition. Chapter 2: IP Addressing and Related Topics

Guide to TCP/IP Fourth Edition. Chapter 2: IP Addressing and Related Topics Guide to TCP/IP Fourth Edition Chapter 2: IP Addressing and Related Topics Objectives Describe IP addressing, anatomy and structures, and addresses from a computer s point of view Recognize and describe

More information

Efficient hardware architecture for fast IP address lookup. Citation Proceedings - IEEE INFOCOM, 2002, v. 2, p

Efficient hardware architecture for fast IP address lookup. Citation Proceedings - IEEE INFOCOM, 2002, v. 2, p Title Efficient hardware architecture for fast IP address lookup Author(s) Pao, D; Liu, C; Wu, A; Yeung, L; Chan, KS Citation Proceedings - IEEE INFOCOM, 2002, v 2, p 555-56 Issued Date 2002 URL http://hdlhandlenet/0722/48458

More information

Efficient Prefix Cache for Network Processors

Efficient Prefix Cache for Network Processors Efficient Prefix Cache for Network Processors Mohammad J. Akhbarizadeh and Mehrdad Nourani Center for Integrated Circuits & Systems The University of Texas at Dallas Richardson, TX 7583 feazadeh,nouranig@utdallas.edu

More information

Real Time Packet Classification and Analysis based on Bloom Filter for Longest Prefix Matching

Real Time Packet Classification and Analysis based on Bloom Filter for Longest Prefix Matching Real Time Packet Classification and Analysis based on Bloom Filter for Longest Prefix Matching Ms. Namita N. Kothari ME Information Technology2nd, Amrutvahini College of Engineering, Sangamner, India namitakothari8@gmail.com

More information

Fast binary and multiway prefix searches for packet forwarding

Fast binary and multiway prefix searches for packet forwarding Computer Networks 5 (27) 588 65 www.elsevier.com/locate/comnet Fast binary and multiway prefix searches for packet forwarding Yeim-Kuan Chang Department of Computer Science and Information Engineering,

More information

FPGA Implementation of Lookup Algorithms

FPGA Implementation of Lookup Algorithms 2011 IEEE 12th International Conference on High Performance Switching and Routing FPGA Implementation of Lookup Algorithms Zoran Chicha, Luka Milinkovic, Aleksandra Smiljanic Department of Telecommunications

More information

Introduction. Introduction. Router Architectures. Introduction. Recent advances in routing architecture including

Introduction. Introduction. Router Architectures. Introduction. Recent advances in routing architecture including Router Architectures By the end of this lecture, you should be able to. Explain the different generations of router architectures Describe the route lookup process Explain the operation of PATRICIA algorithm

More information

IP Address Lookup in Hardware for High-Speed Routing

IP Address Lookup in Hardware for High-Speed Routing IP Address Lookup in Hardware for High-Speed Routing Andreas Moestedt and Peter Sjödin am@sics.se, peter@sics.se Swedish Institute of Computer Science P.O. Box 1263, SE-164 29 KISTA, Sweden Abstract This

More information

EEC-684/584 Computer Networks

EEC-684/584 Computer Networks EEC-684/584 Computer Networks Lecture 14 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of last lecture Internetworking

More information

Fast Firewall Implementations for Software and Hardware-based Routers

Fast Firewall Implementations for Software and Hardware-based Routers Fast Firewall Implementations for Software and Hardware-based Routers Lili Qiu George Varghese Subhash Suri liliq@microsoft.com varghese@cs.ucsd.edu suri@cs.ucsb.edu Microsoft Research University of California,

More information

Disjoint Superposition for Reduction of Conjoined Prefixes in IP Lookup for Actual IPv6 Forwarding Tables

Disjoint Superposition for Reduction of Conjoined Prefixes in IP Lookup for Actual IPv6 Forwarding Tables Disjoint Superposition for Reduction of Conjoined Prefixes in IP Lookup for Actual IPv6 Forwarding Tables Roberto Rojas-Cessa, Taweesak Kijkanjanarat, Wara Wangchai, Krutika Patil, Narathip Thirapittayatakul

More information

High-Performance Network Data-Packet Classification Using Embedded Content-Addressable Memory

High-Performance Network Data-Packet Classification Using Embedded Content-Addressable Memory High-Performance Network Data-Packet Classification Using Embedded Content-Addressable Memory Embedding a TCAM block along with the rest of the system in a single device should overcome the disadvantages

More information

Network Support for Multimedia

Network Support for Multimedia Network Support for Multimedia Daniel Zappala CS 460 Computer Networking Brigham Young University Network Support for Multimedia 2/33 make the best of best effort use application-level techniques use CDNs

More information

Rule Caching for Packet Classification Support

Rule Caching for Packet Classification Support Rule Caching for Packet Classification Support Joji Philip, Manish Taneja, and Roberto Rojas-Cessa Abstract The growth of the Internet and requirements for enhanced flexibility and versatility have resulted

More information

Internet Protocol version 6

Internet Protocol version 6 Internet Protocol version 6 Claudio Cicconetti International Master on Communication Networks Engineering 2006/2007 IP version 6 The Internet is growing extremely rapidly. The

More information

Chapter 18 and 22. IPv4 Address. Data Communications and Networking

Chapter 18 and 22. IPv4 Address. Data Communications and Networking University of Human Development College of Science and Technology Department of Information Technology Chapter 18 and 22 Data Communications and Networking IPv4 Address 1 Lecture Outline IPv4 Addressing

More information

TOWARDS EFFECTIVE PACKET CLASSIFICATION

TOWARDS EFFECTIVE PACKET CLASSIFICATION TOWARDS EFFECTIVE PACKET CLASSIFICATION Yaxuan Qi 1 and Jun Li 1, 2 1 Research Institute of Information Technology (RIIT), Tsinghua University, Beijing, China, 100084 2 Tsinghua National Lab for Information

More information

Full file at

Full file at ch02 True/False Indicate whether the statement is true or false. 1. IP addresses have links to domain names to make it possible for users to identify and access resources on a network. 2. As a frame moves

More information

Lecture 3: Packet Forwarding

Lecture 3: Packet Forwarding Lecture 3: Packet Forwarding CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Mike Freedman & Amin Vahdat Lecture 3 Overview Paper reviews Packet Forwarding IP Addressing Subnetting/CIDR

More information

Multiway Range Trees: Scalable IP Lookup with Fast Updates

Multiway Range Trees: Scalable IP Lookup with Fast Updates Washington University in St. Louis Washington University Open Scholarship All Computer Science and Engineering Research Computer Science and Engineering Report Number: WUCS-99-28 1999-01-01 Multiway Range

More information

DiffServ Architecture: Impact of scheduling on QoS

DiffServ Architecture: Impact of scheduling on QoS DiffServ Architecture: Impact of scheduling on QoS Abstract: Scheduling is one of the most important components in providing a differentiated service at the routers. Due to the varying traffic characteristics

More information

Computer Networks 56 (2012) Contents lists available at SciVerse ScienceDirect. Computer Networks

Computer Networks 56 (2012) Contents lists available at SciVerse ScienceDirect. Computer Networks Computer Networks 56 (2012) 3010 3022 Contents lists available at SciVerse ScienceDirect Computer Networks journal homepage: www.elsevier.com/locate/comnet A new hierarchical packet classification algorithm

More information

Introduction. Router Architectures. Introduction. Introduction. Recent advances in routing architecture including

Introduction. Router Architectures. Introduction. Introduction. Recent advances in routing architecture including Introduction Router Architectures Recent advances in routing architecture including specialized hardware switching fabrics efficient and faster lookup algorithms have created routers that are capable of

More information

Topics for Today. Network Layer. Readings. Introduction Addressing Address Resolution. Sections 5.1,

Topics for Today. Network Layer. Readings. Introduction Addressing Address Resolution. Sections 5.1, Topics for Today Network Layer Introduction Addressing Address Resolution Readings Sections 5.1, 5.6.1-5.6.2 1 Network Layer: Introduction A network-wide concern! Transport layer Between two end hosts

More information

Tag Switching. Background. Tag-Switching Architecture. Forwarding Component CHAPTER

Tag Switching. Background. Tag-Switching Architecture. Forwarding Component CHAPTER CHAPTER 23 Tag Switching Background Rapid changes in the type (and quantity) of traffic handled by the Internet and the explosion in the number of Internet users is putting an unprecedented strain on the

More information

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS Computer Network Architectures and Multimedia Guy Leduc Chapter 2 MPLS networks Chapter based on Section 5.5 of Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross Addison-Wesley,

More information

Efficient IP-Address Lookup with a Shared Forwarding Table for Multiple Virtual Routers

Efficient IP-Address Lookup with a Shared Forwarding Table for Multiple Virtual Routers Efficient IP-Address Lookup with a Shared Forwarding Table for Multiple Virtual Routers ABSTRACT Jing Fu KTH, Royal Institute of Technology Stockholm, Sweden jing@kth.se Virtual routers are a promising

More information

On characterizing BGP routing table growth

On characterizing BGP routing table growth University of Massachusetts Amherst From the SelectedWorks of Lixin Gao 00 On characterizing BGP routing table growth T Bu LX Gao D Towsley Available at: https://works.bepress.com/lixin_gao/66/ On Characterizing

More information

V6Gene: A Scalable IPv6 Prefix Generator for Route Lookup Algorithm

V6Gene: A Scalable IPv6 Prefix Generator for Route Lookup Algorithm Scalable IPv6 Prefix Generator for Benchmark 1 V6Gene: A Scalable IPv6 Prefix Generator for Route Lookup Algorithm Benchmark i Abstract-- Most conventional IPv4-based route lookup algorithms are no more

More information