Scalable Packet Classification for IPv6 by Using Limited TCAMs
|
|
- Marylou Hancock
- 5 years ago
- Views:
Transcription
1 Scalable Packet Classification for IPv6 by Using Limited TCAMs Chia-Tai Chan 1, Pi-Chung Wang 1,Shuo-ChengHu 2, Chung-Liang Lee 1,and Rong-Chang Chen 3 1 Telecommunication Laboratories, Chunghwa Telecom Co., Ltd. 7F, No. 9 Lane 74 Hsin-Yi Rd. Sec. 4, Taipei, Taiwan 106, R.O.C. {ctchan,abu,chlilee}@cht.com.tw 2 Department of Info. Management, Ming-Hsin University of Science and Technology 1 Hsin-Hsing Rd. Hsin-Fong, Hsinchu, Taiwan 304, R.O.C. schu@mis.must.edu.tw 3 Department of Logistics Engineering and Management National Taichung Institute of Technology No. 129, Sec. 3, Sanmin Rd., Taichung, Taiwan 404, R.O.C. rcchens@ntit.edu.tw Abstract. It has been demonstrated that performing packet classification on a potentially large number of filters on key header fields is difficult and has poor worst-case performance. To achieve fast packet classification, hardware support is unavoidable. Ternary content-addressable memory (TCAM) has been widely used to perform fast packet classification due to its ability to solve the problem in O(1) time without considering the number of entries, mask continuity and their lengths. As compared to the software-based solutions, the TCAM can offer sustained throughput and simple system architecture. It is attractive for packet classification, especially for the ultimate IPv6-based networks. However, it also comes with several shortcomings, such as the limited number of entries, expansive cost and power consumption. Accordingly, we propose an efficient algorithm to reduce the required TCAM by encoding the address portion of the searchable entries. The new scheme could encrypt the 128-bit prefixes of the real-world IPv6 routing tables into 11 bits and still keeps the property of CIDR. 1 Introduction The major obstacle for the high-speed router ties to the relatively slow Internet lookup, including routing lookup and packet classification. For an incoming packet, a router must perform routing lookup to forward packets toward their destinations based on the information gathered by the routing protocols. In next generation networks, the new services, such as firewall processing, RSVP style resource reservation policies, QoS Routing, and normal unicast and multicast forwarding, require more discriminating forwarding called packet classification. It allowsservice differentiation because the router can distinguish traffic based on
2 2 Chan et al. source/destination address, TCP/UDP port numbers, and protocol flags. Consequently, each packet is distinguished according to the policies (or filters). The forwarding database of a router consists of a potentially large number of policies. Each policy has a given cost. The header of the incoming packet might match multiple policies. The policy with least cost will be used to forward the packet. To perform packet classification on a potentially large number of policies on key header fields is difficult and has poor worst-case performance. Unlike the routing prefixes, the policy could be un-continuously masked and the length of policy is much longer than that of routing prefix. The routing lookup problem is just a special case of packet classification. As a result, the search of least cost policy (LCP) may be time consuming for a backbone router with a large number of table entries. The exponential growth of the Internet hosts has further stressed the routing system. It is difficult for the packet-forwarding rate to keep up with the increased traffic demand. 1.1 Problem Statement Essentially, packet classification is a problem of multi-dimensional range match. To describe the problem formally, we have to define the classifier and the policy. A classifier maintains a set of policies to divide an incoming packet stream into multiple classes. A policy F =(f[1],f[2],...,f[k]) is called k-dimension if the policy consists of k fields, where each f[i] is either a variable length prefix bit string, a range or a explicit value of the packet header. A policy can be any combination of fields of the packet header, the most common fields are the IP source address, the IP destination address, the protocol type, port numbers of source/destination applications and protocol flags. A packet P is said to match a particular policy F if for all i, thei th field of the header satisfies the f[i]. Each policy has an associative action. For example, the policy F = ( ,,UDP,1090, ) specifies a rule for flows which address to the subnet use the progressive networks audio (PNA) and the action of the rule may assign the packets belonged to these flows with higher queueing priority. Besides the action, the policy is usually given a cost value to define the priority in the database. The action of the least-cost matched policy will be used to process the arriving packets, thus the packet classification problem is a least-cost problem. 1.2 Existing Approaches Recently, several packet classification algorithms have been proposed in the literature [2 6]. It can be categorized into following classes: linear search/caching, hardware-based, grid of tries/cross-product, recursive-flow classification, and hash-based solutions. In the following, we briefly described the main properties of these algorithms. Assume that N is the number of the policies, D is the number of classified fields and W is the length of IP address. Linear Search/Caching: The simplest approach for packet classification is to perform a linear search through all the policies. The space and time complexity
3 Scalable Packet Classification for IPv6 3 is O(N). Caching is a technique often employed at either hardware or software level to improve performance of linear search. However, performance of caching is critically dependent on having large number of packets in each flow. Also, if the number of simultaneous flows becomes larger than cache size, the performance degrades severely. Bit-Parallelism: Another scheme that relies on very wide memory bus is presented by Lakshamn et al. [5]. The algorithm reads Nk bits from memory, corresponding to the BMPs in each field and takes their intersection to find the set of matching policies. Memory requirement for this scheme is O(N 2 ). This scheme relies on heavy parallelism, and requires significant hardware cost, not to mention that flexibility and scalability of hardware solutions is very limited. Grid of Tries/Cross-product: Specifically for the case of 2-field policies, Srinivasan et al. [2] presented a trie-based algorithm. This algorithm has memory requirement O(NW)andrequires2W 1 memory accesses per policy lookup. Also presented in [2] is a general mechanism called cross-product which involves performing the BMP lookups on individual fields, and using a pre-computed table for combining results of individual prefix lookups. However, this scheme suffers from a O(N k ) memory blowup for k-field policies, including k = 2 field policies. Recursive-flow Classification: Gupta et al. presented an algorithm, which can be considered as a generalization of cross-product [3]. After BMP lookup has been performed, recursive flow classification algorithm performs cross-product in a hierarchical manner. Thus k BMP lookups and k 1 additional memory accesses are required per policy lookup. It is expected to provide significant improvement on an average, but it requires O(N k ) memory in the worst case. Also, for the case of 2-field policies, this scheme is identical to the cross-producting and hence has memory requirement of O(N 2 ). Hash-based Solution: The basic idea is motivated by the observation that while policy databases contain many different prefixes or ranges, the number of distinct prefix lengths tends to be small [1]. For instance, backbone routers have about 60K destination address prefixes, but there are only 32 distinct prefix lengths. Thus it can divide all the prefixes into 32 groups, one for each length (W ). Since all prefixes in a group have the same length, it can use the prefix bit string as a hash key. That leads to a simple IP lookup scheme, which requires O(W ) hash lookups, independent of the number of prefixes. The algorithm of Waldvogel [1] performs a binary search over the W length groups, and achieves O(logW ) worst-case time complexity. The tuple space idea generalizes the aforementioned approach to multi-dimension policies [4]. A tuple is a set of policies with specific prefix lengths, and the resulting set of tuples is called as tuple space. Since each tuple has a specific bit-length for each field, by concatenating these fields in order to create a hash key, which can be used to perform the tuple lookup. Thus, the matched policy can be found by probing each tuple alternately, and keep track of the least cost policy. As an example, the two-dimension policies F =(10, 110 ) andg =(11, 001 ) will both belong to the tuple T 2,3.When searching T 2,3, a hash key is constructed by concatenating 2 bits of the source
4 4 Chan et al. field with 3 bits of the destination field. Since the number of tuples is generally much smaller than the number of policies, even a linear search of the tuple space results, in a significant improvement over linear search of the policies. Ternary CAM: Ternary content-addressable memory (TCAM) is one popular hardware device to perform fast packet classification. As compared to the software-based solutions, the TCAM can offer sustained throughput and simple system architecture, thus makes it attractive. However, it also comes with several shortcomings, such as the limited size, power consumption and expansive cost. For example, a 9 Mbits TCAM chip (US $200, 40mm 40mm) running at 100 MHz dissipates about 8.5W. In comparison, a 9 Mbits SRAM (US $20, 14mm 22mm) running at 250 MHz dissipates only 0.75W. Specifically, the policy length could be as long as 296 bits with IPv6. With the state-of-the-art 9-Mbit TCAM, it could support 16K such entries. In next generation networks, the TCAM will be suffering from a limited number of entries. Table 1. Complexity comparisons. Schemes Speed Storage Scalability Linear Search O(N) O(NW) - Bit Parallelism [5] O(DW + N/B) O(DN 2 ) - Grid of Tries [2] O(W D 1 ) O(NDW 2 ) Cross-producting [2] O(DW ) O(N D ) - RFC [3] O(D) O(N D ) - Tuple Space Search [4] O(N) O(NW) Ternary CAM O(1) O(NW) - Proposed scheme O(1) O(N (logw + β)) N:the number of prefixes, W:the maximum prefix length D:the number of dimensions, B: the memory bus width β:the number of levels. In this article, we propose an efficient algorithm to reduce the required TCAM by encoding the address portion of the searchable entries. The new scheme could reduce the length of TCAM entries from W to (logn + β) and still keeps the property of CIDR, where N is the number of the policies, β is the maximum number of levels and W is the length of IP address. In our experiments, it could encrypt the 128-bit prefixes of the real-world IPv6 routing tables into 11 bits. The rest of the paper is organized as follows. Section 2 presents the proposed algorithm. The experiment results are presented in Section 3. Finally, a summary is given in Section 4.
5 2 TCAM Entry Encryption Algorithm Scalable Packet Classification for IPv6 5 From the proposed system architecture, the packet classification could inherit the search result from routing lookup. It motivates us to encode the routing prefix as a much shorter one by replacing the original source/destination addresses in the original policy with the generated keys, so that the required TCAM is also reduced. To achieve the purpose, we have to realize the nature of IP routing prefixes firstly. The adoption of classless inter-domain routing (CIDR) [10] allows the network administrator to specify a smaller network within an existing network. For example, an ISP network is specified by prefix whose next hop is A. It might exists a enterprise network, which is specified by prefix and its next hop is B. The encoding scheme must be able to reflect the hierarchical nature of the routing prefixes. Namely, the generated key for the prefix must be a shorter prefix of that for the prefix Basic Scheme To encode the address portion of the searchable entries, a straightforward scheme is to divide the prefixes into several sub-prefixes according to the length of their shorter prefixes, as shown in Figure 1. The prefix P has two shorter prefixes: P 1 0 and P Thus it is divided as three sub-prefixes 0, 100 and 00 that are inserted to bit-stream group Level I, Level II and Level III, respectively. Clearly, it may derive the same sub-prefixes from different prefixes; such as the Level II bit-stream 01 of prefix P 13 is identical to that of P 2. In each group, the duplicate bit-stream must be eliminated and each bit-stream is assigned a unique IDs. By concatenating the relevant IDs, the encrypted key for each prefix can be generated. In this example, there are three different bit-streamin LevelI,fivein LevelII and four in Level III. Thus maximum 7 (=2+3+2) bits are required to represent the original prefixes. Prefixes P 1 0 P P P P P P P P P P P P P Prefixes with "Level I" bit-stream Prefixes with "Level I" & "Level II" bit-streams Prefixes with "Level I" ~ "Level III" bit-streams P 4 P 2 Binary Tree Representation P 1 P 6 P 3 P 7 P 8 P 5 P 9 P 10 P 11 P 12 P 13 P 14 LevelI ID Level I ID Level IID Fig. 1. Encoding the bit-streams according to what they attach to.
6 6 Chan et al. Exclusive Scheme Though the basic scheme is simple, the number of the encryptedbit-streams may be over-estimated. The encoding results are inefficient for the reason that it is without considering the associated relation between prefixes. For example, the bit-streams 100 and 1010 (i.e., corresponding to P 3 and P 5 respectively) in Level II only concatenate to 0 (i.e., P 1 ). Thus we only have to count the number of bit-streams attached to a specific shorter bit-stream. In our example, there are three bit-streams connected to 0 (P 1 ) and two to both 101 (P 6 )and 11 (P 12 ). Therefore, the number of bits for Level II could be reduced to two and the total length is reduced to six. In Figure 2, we list the ID for each bit-stream. The dotted line is used to separate the bit-streams based on their attached bit-streams. LevelI ID Level IID Level IID P 2 Binary Tree Representation P 1 P 6 P 3 P 7 P 8 P 5 P 11 P 12 P 13 P 14 P 4 P 9 P 10 Fig. 2. Encoding the bit-streams according to what they attach to. Adaptive Scheme The exclusive scheme can be further improved with ingenious encoding of the bit-streams. According to the successive bit-stream length, the exclusive scheme can adjust the length of encoded ID dynamically, as shown in Figure 3. It encodes the bit-stream with bottom-up manner and uses Huffman Encoding to reduce the maximum length of concatenated IDs. Thus the bit-streams in Level III are encoded at first. The minimum required length for each Level III bit-stream is recorded in its preceding prefix. The Level II bit-streams are sorted according to the length of their successive bit-streams. Then the longest one, for example, the Level II bit-streams 1 corresponding to P 8, is assigned the shortest ID 0. Another Level II bit-stream 0 attached to P 6 is thus assigned the ID 01. The IDs for each bit-stream is listed in the left part of Figure 3. In Table 2, we show the encrypted prefixes for different schemes. With the basic scheme, the maximum required length is 7. It can be improved to 6 and 4 by adopting the exclusive and adaptive schemes respectively. Generally speaking, the length of the required bits for the adaptive scheme is quite close to
7 Scalable Packet Classification for IPv6 7 LevelI ID Level IID Level IID P Binary Tree Representation P 1 P 3 P 5 P 7 3 P 6 Minimum Requied Length for the attached bit-streams 2 P 8 P 11 P 12 P 13 1 P 14 P 4 P 9 P 10 Fig. 3. Encoding bit-streams according to the length of their successive bit-streams. the optimal value (log 2 N). Consequently, we use the prefixes of the real-world routing tables to demonstrate the performance of the proposed scheme. Prefix Basic Table 2. The encrypted prefixes for different schemes. Exclusive Adaptive Prefix Basic Exclusive Adaptive P P P P P P P P P P P P P P Usage In each classifier, the referred routing prefixes are extracted from the policies. Then we construct the prefix tree and execute the encoding algorithm to encrypt the prefixes. These results are attached to the routing prefixes as a part of lookup results. For those prefixes which are not referred in the policies, the encrypted results of their referred sub-prefixes are recorded. Also, the address portion of the policy is replaced by the encoded prefixes and inserted into the TCAM. The routing lookup for each incoming packet will decide the next hop and also the encoded prefixes. Since the routing lookup is only performed for the destination address, an extra lookup for the source address is required. Consequently, the addresses in the packet header are replaced by the encoded prefixes and forwarded to the classifier. Then the classifier performs packet classification to derive the service priority.
8 8 Chan et al. 3 Performance Evaluation Through experiments, we demonstrate that the proposed scheme features much less TCAM bits. Currently, the IPv6 routing tables consist of only few hundreds prefixes which are download from 6bone. To further realize the scalability of the proposed scheme, we also use the real data available from the IPMA [8] and NLANR [9] projects for comparison, these data provide a daily snapshot of the routing tables used by some major Network Access Points (NAPs). We illustrate the maximum length of the encoded prefixes for different routing tables and different schemes. Figure 5 shows the encoding results for different routing tables. For the IPv4 routing tables, the basic scheme and exclusive scheme might incur longer encoded-bits than the original prefixes (32 bits). It is because these schemes concatenate maximum bits for each level to generate the encrypted prefixes. Contrarily, the adaptive scheme could complement the longest ID with shortest ID to eliminate the total length. In the experimental results, the adaptive scheme could encrypt the 32-bit prefix to a 22-bit one, which shows a bit-reduction of 70%. Moreover, the proposed scheme has achieved near optimal encoding as compared with the value log 2 (number of prefixes). The difference between two values is incurred by the round-off error in each level. For example, in the routing table of NLANR, there are 102,271 prefixes and 6 levels. The maximum length for NLANR table is 22-bit which is nearly equal to log 2 (102,271) + 6= Maimum Length ofthe Encoded Prefix Basic Schem e Exclusive Schem e Adaptive Schem e LOG(Num berofprefixes) 0 10,000 20,000 30,000 40,000 50,000 60,000 70,000 80,000 90, , ,000 Num berofprefixes Fig. 4. The maximum length of encoded prefixes for different IPv4 routing tables. For the IPv6 routing tables, the adaptive scheme still outperforms the rest schemes, as shown in Figure 5. But with fewer prefixes, the number of levels is reduced as well. Thus even with the simplest scheme, it could achieve fairly good
9 Scalable Packet Classification for IPv6 9 results. While the number of prefixes increases, the effect of the adaptive scheme is emerged. In the results, the adaptive scheme could encrypt the 128-bit prefix to an 11-bit one, which shows a bit-reduction of 9%. 20 Maimum Length ofthe Encoded Prefix Basic Schem e Exclusive Schem e Adaptive Schem e LOG(Num berofprefixes) Num berofprefixes Fig. 5. The maximum length of encoded prefixes for different IPv6 routing tables. According to the experiments, we believe that the required bits are constrained from the increasing prefix length and prefix count. As the routing table contains 1M entries and 12 levels, it would require about 32 bits for encryption, not to mention the route aggregation in IPv6 will largely reduce the number of levels. 4 Conclusions This study investigates the major issues in TCAM-based router design, including its price, power and size. To make use of the TCAM in IPv6-based packet classification, we propose an efficient approach to utilize the limited bits of TCAM. The scheme is motivated by the necessity of routing lookup for each packet. By encoding the prefixes into a much shorter one, the required bits for the TCAM entry could be significantly reduced. The basic idea is to divide the prefixes according to the length of their shorter prefixes and allocate enough bits for each level. It could be further improved by adopting the concept of exclusion to eliminate the combination in each level. Accordingly, we address how to joint a long ID with a short one by using Huffman Encoding. The length of the generated prefix is dramatically reduced. A typical IPv4 routing prefix needs 22 bits and 11 bits for IPv6 routing prefix in the worst case. The resulted prefix length is nearly equal to O(log 2 N + β), where N is the number of prefixes and β is the maximum number of levels. We also demonstrate this in our experiments. With
10 10 Chan et al. the route aggregation in IPv6, the value of b tends to be small. Also, only the referred routing prefixes have to be encoded. Thus the required length for an IPv6 prefix is likely less than 32 bits, which save more than 75% storage. References 1. M. Waldvogel, G. vargnese, J. Turner, and B. Plattner, Scalable High Speed IP Routing Lookups, In Proc. ACM SIGCOMM 97, pages 25-36, Cannes, France, Sept V. Srinivasan, G. Varghese and S. Suri, Packet Classification using Tuple Space Search, in ACM SIGCOMM, September 1999, pp Pankaj Gupta and Nick McKeown, Packet Classification on Multiple Fields, in ACM SIGCOMM, September 1999, pp V. Srinivasan, G. Varghese, S. Suri and M. Waldvogel, Fast Scalable Level Four Switching, in ACM SIGCOMM, September 1998, pp T.V. Lakshman and D. Stidialis, High Speed Policy-based Packet Forwarding Using Efficient Multi-dimensional Range Matching, in ACM SIGCOMM, September 1998, pp Anja Feldmann and S. Muthukrishnan, Tradeoffs for Packet Classification, in IEEE INFOCOM, March 2000, pp D. Shah and P. Gupta, Fast updating Algorithms for TCAMs, IEEE Micro Mag., 21(1):36-47, Jan.-Feb Merit Networks, Inc. Internet Performance Measurement and Analysis (IPMA) Statistics and Daily Reports. See table/. 9. NLANR Project. See Y. Rekhter, T. Li, An Architecture for IP Address Allocation with CIDR. RFC 1518, Sept
Scalable IP Routing Lookup in Next Generation Network
Scalable IP Routing Lookup in Next Generation Network Chia-Tai Chan 1, Pi-Chung Wang 1,Shuo-ChengHu 2, Chung-Liang Lee 1, and Rong-Chang Chen 3 1 Telecommunication Laboratories, Chunghwa Telecom Co., Ltd.
More informationPerformance Improvement of Hardware-Based Packet Classification Algorithm
Performance Improvement of Hardware-Based Packet Classification Algorithm Yaw-Chung Chen 1, Pi-Chung Wang 2, Chun-Liang Lee 2, and Chia-Tai Chan 2 1 Department of Computer Science and Information Engineering,
More informationPacket Classification Using Dynamically Generated Decision Trees
1 Packet Classification Using Dynamically Generated Decision Trees Yu-Chieh Cheng, Pi-Chung Wang Abstract Binary Search on Levels (BSOL) is a decision-tree algorithm for packet classification with superior
More informationSINCE the ever increasing dependency on the Internet, there
IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 8, NO. 6, DECEMBER 2006 1239 Scalable Packet Classification for Enabling Internet Differentiated Services Pi-Chung Wang, Member, IEEE, Chia-Tai Chan, Chun-Liang Lee,
More informationFast Packet Classification Algorithms
Fast Packet Classification Algorithms Mrudul Dixit, Anuja Kale, Madhavi Narote, Sneha Talwalkar, and B. V. Barbadekar Abstract A packet classifier possesses a set of rules for classifying packets based
More informationProblem Statement. Algorithm MinDPQ (contd.) Algorithm MinDPQ. Summary of Algorithm MinDPQ. Algorithm MinDPQ: Experimental Results.
Algorithms for Routing Lookups and Packet Classification October 3, 2000 High Level Outline Part I. Routing Lookups - Two lookup algorithms Part II. Packet Classification - One classification algorithm
More informationTree-Based Minimization of TCAM Entries for Packet Classification
Tree-Based Minimization of TCAM Entries for Packet Classification YanSunandMinSikKim School of Electrical Engineering and Computer Science Washington State University Pullman, Washington 99164-2752, U.S.A.
More informationData Structures for Packet Classification
Presenter: Patrick Nicholson Department of Computer Science CS840 Topics in Data Structures Outline 1 The Problem 2 Hardware Solutions 3 Data Structures: 1D 4 Trie-Based Solutions Packet Classification
More informationCS 268: Route Lookup and Packet Classification
Overview CS 268: Route Lookup and Packet Classification Packet Lookup Packet Classification Ion Stoica March 3, 24 istoica@cs.berkeley.edu 2 Lookup Problem Identify the output interface to forward an incoming
More informationPacket classification using diagonal-based tuple space search q
Computer Networks 50 (2006) 1406 1423 www.elsevier.com/locate/comnet Packet classification using diagonal-based tuple space search q Fu-Yuan Lee *, Shiuhpyng Shieh Department of Computer Science and Information
More informationGrid of Segment Trees for Packet Classification
2010 24th IEEE International Conference on Advanced Information Networking and Applications Grid of Segment Trees for Packet Classification Yeim-Kuan Chang, Yung-Chieh Lin, and Chen-Yu Lin Department of
More informationAN ASSOCIATIVE TERNARY CACHE FOR IP ROUTING. 1. Introduction. 2. Associative Cache Scheme
AN ASSOCIATIVE TERNARY CACHE FOR IP ROUTING James J. Rooney 1 José G. Delgado-Frias 2 Douglas H. Summerville 1 1 Dept. of Electrical and Computer Engineering. 2 School of Electrical Engr. and Computer
More informationECE697AA Lecture 21. Packet Classification
ECE697AA Lecture 21 Routers: Flow Classification Algorithms Tilman Wolf Department of Electrical and Computer Engineering 11/20/08 Packet Classification What is packet classification? Categorization of
More informationForwarding and Routers : Computer Networking. Original IP Route Lookup. Outline
Forwarding and Routers 15-744: Computer Networking L-9 Router Algorithms IP lookup Longest prefix matching Classification Flow monitoring Readings [EVF3] Bitmap Algorithms for Active Flows on High Speed
More informationPacket Classification using Rule Caching
Packet Classification using Rule Caching Nitesh B. Guinde, Roberto Rojas-Cessa and Sotirios G. Ziavras Electrical and Computer Engineering Department New Jersey Institute Technology Newark, NJ 72, USA
More informationDesign of a Multi-Dimensional Packet Classifier for Network Processors
Design of a Multi-Dimensional Packet Classifier for Network Processors Stefano Giordano, Gregorio Procissi, Federico Rossi, Fabio Vitucci Dept. of Information Engineering, University of Pisa, ITALY E-mail:
More informationSwitch and Router Design. Packet Processing Examples. Packet Processing Examples. Packet Processing Rate 12/14/2011
// Bottlenecks Memory, memory, 88 - Switch and Router Design Dr. David Hay Ross 8b dhay@cs.huji.ac.il Source: Nick Mckeown, Isaac Keslassy Packet Processing Examples Address Lookup (IP/Ethernet) Where
More informationPerformance Evaluation and Improvement of Algorithmic Approaches for Packet Classification
Performance Evaluation and Improvement of Algorithmic Approaches for Packet Classification Yaxuan Qi, Jun Li Research Institute of Information Technology (RIIT) Tsinghua University, Beijing, China, 100084
More informationLast Lecture: Network Layer
Last Lecture: Network Layer 1. Design goals and issues 2. Basic Routing Algorithms & Protocols 3. Addressing, Fragmentation and reassembly 4. Internet Routing Protocols and Inter-networking 5. Router design
More informationAN EFFICIENT HYBRID ALGORITHM FOR MULTIDIMENSIONAL PACKET CLASSIFICATION
AN EFFICIENT HYBRID ALGORITHM FOR MULTIDIMENSIONAL PACKET CLASSIFICATION Yaxuan Qi 1 and Jun Li 1,2 1 Research Institute of Information Technology (RIIT), Tsinghua University, Beijing, China, 100084 2
More informationITTC High-Performance Networking The University of Kansas EECS 881 Packet Switch I/O Processing
High-Performance Networking The University of Kansas EECS 881 Packet Switch I/O Processing James P.G. Sterbenz Department of Electrical Engineering & Computer Science Information Technology & Telecommunications
More informationThree Different Designs for Packet Classification
Three Different Designs for Packet Classification HATAM ABDOLI Computer Department Bu-Ali Sina University Shahid Fahmideh street, Hamadan IRAN abdoli@basu.ac.ir http://www.profs.basu.ac.ir/abdoli Abstract:
More informationHardware Assisted Recursive Packet Classification Module for IPv6 etworks ABSTRACT
Hardware Assisted Recursive Packet Classification Module for IPv6 etworks Shivvasangari Subramani [shivva1@umbc.edu] Department of Computer Science and Electrical Engineering University of Maryland Baltimore
More informationEfficient Packet Classification using Splay Tree Models
28 IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.5B, May 2006 Efficient Packet Classification using Splay Tree Models Srinivasan.T, Nivedita.M, Mahadevan.V Sri Venkateswara
More informationRouting Lookup Algorithm for IPv6 using Hash Tables
Routing Lookup Algorithm for IPv6 using Hash Tables Peter Korppoey, John Smith, Department of Electronics Engineering, New Mexico State University-Main Campus Abstract: After analyzing of existing routing
More informationRecursive Flow Classification: An Algorithm for Packet Classification on Multiple Fields
5 CHAPTER 4 Recursive Flow Classification: An Algorithm for Packet Classification on Multiple Fields Introduction Chapters 2 and 3 described algorithms for routing lookups. In this chapter and the next
More informationFast Update of Forwarding Tables in Internet Router Using AS Numbers Λ
Fast Update of Forwarding Tables in Internet Router Using AS Numbers Λ Heonsoo Lee, Seokjae Ha, and Yanghee Choi School of Computer Science and Engineering Seoul National University San 56-1, Shilim-dong,
More informationFast IP Routing Lookup with Configurable Processor and Compressed Routing Table
Fast IP Routing Lookup with Configurable Processor and Compressed Routing Table H. Michael Ji, and Ranga Srinivasan Tensilica, Inc. 3255-6 Scott Blvd Santa Clara, CA 95054 Abstract--In this paper we examine
More informationAlgorithms for Packet Classification
Algorithms for Packet Classification Pankaj Gupta and Nick McKeown, Stanford University Abstract The process of categorizing packets into flows in an Internet router is called packet classification. All
More informationAn Efficient IP Routing Lookup by Using Routing Interval
374 JOURNA OF COMMUNICATIONS AND NETWORKS, VO.3, NO.4, DECEMBER 21 An Efficient IP Routing ookup by Using Routing Interval Pi-Chung Wang, Chia-Tai Chan, and Yaw-Chung Chen Abstract: Nowadays, the commonly
More informationFrugal IP Lookup Based on a Parallel Search
Frugal IP Lookup Based on a Parallel Search Zoran Čiča and Aleksandra Smiljanić School of Electrical Engineering, Belgrade University, Serbia Email: cicasyl@etf.rs, aleksandra@etf.rs Abstract Lookup function
More informationEfficient TCAM Encoding Schemes for Packet Classification using Gray Code
Efficient TCAM Encoding Schemes for Packet Classification using Gray Code Yeim-Kuan Chang and Cheng-Chien Su Department of Computer Science and Information Engineering National Cheng Kung University Tainan,
More informationAN ASSOCIATIVE TERNARY CACHE FOR IP ROUTING. 1. Introduction
AN ASSOCIATIVE TERNARY CACHE FOR IP ROUTING James J Rooney 1 José G Delgado-Frias 2 Douglas H Summerville 1 1 Department of Electrical and Computer Engineering 2 School of Electrical Engineering and Computer
More informationEECS 122: Introduction to Computer Networks Switch and Router Architectures. Today s Lecture
EECS : Introduction to Computer Networks Switch and Router Architectures Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley,
More informationGeneric Architecture. EECS 122: Introduction to Computer Networks Switch and Router Architectures. Shared Memory (1 st Generation) Today s Lecture
Generic Architecture EECS : Introduction to Computer Networks Switch and Router Architectures Computer Science Division Department of Electrical Engineering and Computer Sciences University of California,
More informationMaster Course Computer Networks IN2097
Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master
More informationMaster Course Computer Networks IN2097
Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for
More informationECE697AA Lecture 20. Forwarding Tables
ECE697AA Lecture 20 Routers: Prefix Lookup Algorithms Tilman Wolf Department of Electrical and Computer Engineering 11/14/08 Forwarding Tables Routing protocols involve a lot of information Path choices,
More informationTHE advent of the World Wide Web (WWW) has doubled
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 17, NO. 6, JUNE 1999 1093 A Novel IP-Routing Lookup Scheme and Hardware Architecture for Multigigabit Switching Routers Nen-Fu Huang, Member, IEEE,
More informationDynamic Routing Tables Using Simple Balanced. Search Trees
Dynamic Routing Tables Using Simple Balanced Search Trees Y.-K. Chang and Y.-C. Lin Department of Computer Science and Information Engineering National Cheng Kung University Tainan, Taiwan R.O.C. ykchang@mail.ncku.edu.tw
More informationTowards Effective Packet Classification. J. Li, Y. Qi, and B. Xu Network Security Lab RIIT, Tsinghua University Dec, 2005
Towards Effective Packet Classification J. Li, Y. Qi, and B. Xu Network Security Lab RIIT, Tsinghua University Dec, 2005 Outline Algorithm Study Understanding Packet Classification Worst-case Complexity
More informationBinary Search Schemes for Fast IP Lookups
1 Schemes for Fast IP Lookups Pronita Mehrotra, Paul D. Franzon Abstract IP route look up is the most time consuming operation of a router. Route lookup is becoming a very challenging problem due to the
More informationLONGEST prefix matching (LPM) techniques have received
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 14, NO. 2, APRIL 2006 397 Longest Prefix Matching Using Bloom Filters Sarang Dharmapurikar, Praveen Krishnamurthy, and David E. Taylor, Member, IEEE Abstract We
More informationImplementation of Boundary Cutting Algorithm Using Packet Classification
Implementation of Boundary Cutting Algorithm Using Packet Classification Dasari Mallesh M.Tech Student Department of CSE Vignana Bharathi Institute of Technology, Hyderabad. ABSTRACT: Decision-tree-based
More informationMulti-core Implementation of Decomposition-based Packet Classification Algorithms 1
Multi-core Implementation of Decomposition-based Packet Classification Algorithms 1 Shijie Zhou, Yun R. Qu, and Viktor K. Prasanna Ming Hsieh Department of Electrical Engineering, University of Southern
More informationBitmap Intersection Lookup (BIL) : A Packet Classification s Algorithm with Rules Updating
ICCAS25 Bitmap Intersection Lookup (BIL) : A Packet Classification s Algorithm with Rules Updating Akharin Khunkitti*, Nuttachot Promrit** *Faculty of Information Technology, King Mongkut's Institute of
More informationDesign of a High Speed FPGA-Based Classifier for Efficient Packet Classification
Design of a High Speed FPGA-Based Classifier for Efficient Packet Classification V.S.Pallavi 1, Dr.D.Rukmani Devi 2 PG Scholar 1, Department of ECE, RMK Engineering College, Chennai, Tamil Nadu, India
More informationMulti-Field Range Encoding for Packet Classification in TCAM
This paper was presented as part of the Mini-Conference at IEEE INFOCOM 2011 Multi-Field Range Encoding for Packet Classification in TCAM Yeim-Kuan Chang, Chun-I Lee and Cheng-Chien Su Department of Computer
More informationParallel-Search Trie-based Scheme for Fast IP Lookup
Parallel-Search Trie-based Scheme for Fast IP Lookup Roberto Rojas-Cessa, Lakshmi Ramesh, Ziqian Dong, Lin Cai, and Nirwan Ansari Department of Electrical and Computer Engineering, New Jersey Institute
More informationMultiway Range Trees: Scalable IP Lookup with Fast Updates
Multiway Range Trees: Scalable IP Lookup with Fast Updates Subhash Suri George Varghese Priyank Ramesh Warkhede Department of Computer Science Washington University St. Louis, MO 63130. Abstract In this
More informationHomework 1 Solutions:
Homework 1 Solutions: If we expand the square in the statistic, we get three terms that have to be summed for each i: (ExpectedFrequency[i]), (2ObservedFrequency[i]) and (ObservedFrequency[i])2 / Expected
More informationA Scalable Approach for Packet Classification Using Rule-Base Partition
CNIR Journal, Volume (5), Issue (1), Dec., 2005 A Scalable Approach for Packet Classification Using Rule-Base Partition Mr. S J Wagh 1 and Dr. T. R. Sontakke 2 [1] Assistant Professor in Information Technology,
More informationA Hybrid Approach to CAM-Based Longest Prefix Matching for IP Route Lookup
A Hybrid Approach to CAM-Based Longest Prefix Matching for IP Route Lookup Yan Sun and Min Sik Kim School of Electrical Engineering and Computer Science Washington State University Pullman, Washington
More informationTree, Segment Table, and Route Bucket: A Multistage Algorithm for IPv6 Routing Table Lookup
Tree, Segment Table, and Route Bucket: A Multistage Algorithm for IPv6 Routing Table Lookup Zhenqiang LI Dongqu ZHENG Yan MA School of Computer Science and Technology Network Information Center Beijing
More information15-744: Computer Networking. Routers
15-744: Computer Networking outers Forwarding and outers Forwarding IP lookup High-speed router architecture eadings [McK97] A Fast Switched Backplane for a Gigabit Switched outer Optional [D+97] Small
More informationDESIGN AND IMPLEMENTATION OF OPTIMIZED PACKET CLASSIFIER
International Journal of Computer Engineering and Applications, Volume VI, Issue II, May 14 www.ijcea.com ISSN 2321 3469 DESIGN AND IMPLEMENTATION OF OPTIMIZED PACKET CLASSIFIER Kiran K C 1, Sunil T D
More informationIntroduction CHAPTER 1
1 CHAPTER 1 Introduction The Internet is comprised of a mesh of routers interconnected by links. Communication among nodes on the Internet (routers and end-hosts) takes place using the Internet Protocol,
More informationLecture 12: Aggregation. CSE 123: Computer Networks Alex C. Snoeren
Lecture 12: Aggregation CSE 123: Computer Networks Alex C. Snoeren Lecture 12 Overview Subnetting Classless addressing Route aggregation 2 Class-based Addressing Most significant bits determines class
More informationLecture 12: Addressing. CSE 123: Computer Networks Alex C. Snoeren
Lecture 12: Addressing CSE 123: Computer Networks Alex C. Snoeren Lecture 12 Overview IP Addresses Class-based addressing Subnetting Classless addressing Route aggregation 2 Addressing Considerations Fixed
More informationPacket Classification Using Standard Access Control List
Packet Classification Using Standard Access Control List S.Mythrei 1, R.Dharmaraj 2 PG Student, Dept of CSE, Sri Vidya College of engineering and technology, Virudhunagar, Tamilnadu, India 1 Research Scholar,
More information5. Providing a narrower address space is the primary design goal for IPv6.
Chapter 2: IP Addressing and Related Topics TRUE/FALSE 1. IP addresses can be represented as domain names to make it possible for users to identify and access resources on a network. T PTS: 1 REF: 59 2.
More informationRouter Architectures
Router Architectures Venkat Padmanabhan Microsoft Research 13 April 2001 Venkat Padmanabhan 1 Outline Router architecture overview 50 Gbps multi-gigabit router (Partridge et al.) Technology trends Venkat
More informationPacket Classification Algorithms: A Survey
Packet Classification Algorithms: A Survey Evangeline Asha B 1, Kavitha S 2 1 PG Scholar, Hindusthan Institute of Technology, Coimbatore, Tamil Nadu, India 2 Professor, Hindusthan Institute of Technology,
More informationThe Interconnection Structure of. The Internet. EECC694 - Shaaban
The Internet Evolved from the ARPANET (the Advanced Research Projects Agency Network), a project funded by The U.S. Department of Defense (DOD) in 1969. ARPANET's purpose was to provide the U.S. Defense
More informationSelective Boundary Cutting For Packet Classification SOUMYA. K 1, CHANDRA SEKHAR. M 2
ISSN 2319-8885 Vol.04,Issue.34, August-2015, Pages:6786-6790 www.ijsetr.com SOUMYA. K 1, CHANDRA SEKHAR. M 2 1 Navodaya Institute of Technology, Raichur, Karnataka, India, E-mail: Keerthisree1112@gmail.com.
More informationReview on Tries for IPv6 Lookups
Available online www.ejaet.com European Journal of Advances in Engineering and Technology, 2016, 3(7): 28-33 Review Article ISSN: 2394-658X Review on Tries for IPv6 Lookups Rohit G Bal Department of Computer
More informationPacket Classification. George Varghese
Packet Classification George Varghese Original Motivation: Firewalls Firewalls use packet filtering to block say ssh and force access to web and mail via proxies. Still part of defense in depth today.
More informationAn Efficient Parallel IP Lookup Technique for IPv6 Routers Using Multiple Hashing with Ternary marker storage
An Efficient Parallel IP Lookup Technique for IPv Routers Using Multiple Hashing with Ternary marker storage P. Kiran Sree Dr. Inampudi Ramesh Babu Mr. P.Kiran Sree,Associate Professor, Department of Computer
More information1 Connectionless Routing
UCSD DEPARTMENT OF COMPUTER SCIENCE CS123a Computer Networking, IP Addressing and Neighbor Routing In these we quickly give an overview of IP addressing and Neighbor Routing. Routing consists of: IP addressing
More informationFast Packet Classification Using Bloom filters
Fast Packet Classification Using Bloom filters Sarang Dharmapurikar Haoyu Song Jonathan Turner John Lockwood sarang@arl.wustl.edu hs@arl.wustl.edu jst@arl.wustl.edu lockwood@arl.wustl.edu Washington University
More informationEVERY Internet router today can forward entering Internet
2 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 13, NO. 1, FEBRUARY 2005 Scalable Packet Classification Florin Baboescu and George Varghese, Member, IEEE Abstract Packet classification is important for applications
More informationGuide to TCP/IP Fourth Edition. Chapter 2: IP Addressing and Related Topics
Guide to TCP/IP Fourth Edition Chapter 2: IP Addressing and Related Topics Objectives Describe IP addressing, anatomy and structures, and addresses from a computer s point of view Recognize and describe
More informationEfficient hardware architecture for fast IP address lookup. Citation Proceedings - IEEE INFOCOM, 2002, v. 2, p
Title Efficient hardware architecture for fast IP address lookup Author(s) Pao, D; Liu, C; Wu, A; Yeung, L; Chan, KS Citation Proceedings - IEEE INFOCOM, 2002, v 2, p 555-56 Issued Date 2002 URL http://hdlhandlenet/0722/48458
More informationEfficient Prefix Cache for Network Processors
Efficient Prefix Cache for Network Processors Mohammad J. Akhbarizadeh and Mehrdad Nourani Center for Integrated Circuits & Systems The University of Texas at Dallas Richardson, TX 7583 feazadeh,nouranig@utdallas.edu
More informationReal Time Packet Classification and Analysis based on Bloom Filter for Longest Prefix Matching
Real Time Packet Classification and Analysis based on Bloom Filter for Longest Prefix Matching Ms. Namita N. Kothari ME Information Technology2nd, Amrutvahini College of Engineering, Sangamner, India namitakothari8@gmail.com
More informationFast binary and multiway prefix searches for packet forwarding
Computer Networks 5 (27) 588 65 www.elsevier.com/locate/comnet Fast binary and multiway prefix searches for packet forwarding Yeim-Kuan Chang Department of Computer Science and Information Engineering,
More informationFPGA Implementation of Lookup Algorithms
2011 IEEE 12th International Conference on High Performance Switching and Routing FPGA Implementation of Lookup Algorithms Zoran Chicha, Luka Milinkovic, Aleksandra Smiljanic Department of Telecommunications
More informationIntroduction. Introduction. Router Architectures. Introduction. Recent advances in routing architecture including
Router Architectures By the end of this lecture, you should be able to. Explain the different generations of router architectures Describe the route lookup process Explain the operation of PATRICIA algorithm
More informationIP Address Lookup in Hardware for High-Speed Routing
IP Address Lookup in Hardware for High-Speed Routing Andreas Moestedt and Peter Sjödin am@sics.se, peter@sics.se Swedish Institute of Computer Science P.O. Box 1263, SE-164 29 KISTA, Sweden Abstract This
More informationEEC-684/584 Computer Networks
EEC-684/584 Computer Networks Lecture 14 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of last lecture Internetworking
More informationFast Firewall Implementations for Software and Hardware-based Routers
Fast Firewall Implementations for Software and Hardware-based Routers Lili Qiu George Varghese Subhash Suri liliq@microsoft.com varghese@cs.ucsd.edu suri@cs.ucsb.edu Microsoft Research University of California,
More informationDisjoint Superposition for Reduction of Conjoined Prefixes in IP Lookup for Actual IPv6 Forwarding Tables
Disjoint Superposition for Reduction of Conjoined Prefixes in IP Lookup for Actual IPv6 Forwarding Tables Roberto Rojas-Cessa, Taweesak Kijkanjanarat, Wara Wangchai, Krutika Patil, Narathip Thirapittayatakul
More informationHigh-Performance Network Data-Packet Classification Using Embedded Content-Addressable Memory
High-Performance Network Data-Packet Classification Using Embedded Content-Addressable Memory Embedding a TCAM block along with the rest of the system in a single device should overcome the disadvantages
More informationNetwork Support for Multimedia
Network Support for Multimedia Daniel Zappala CS 460 Computer Networking Brigham Young University Network Support for Multimedia 2/33 make the best of best effort use application-level techniques use CDNs
More informationRule Caching for Packet Classification Support
Rule Caching for Packet Classification Support Joji Philip, Manish Taneja, and Roberto Rojas-Cessa Abstract The growth of the Internet and requirements for enhanced flexibility and versatility have resulted
More informationInternet Protocol version 6
Internet Protocol version 6 Claudio Cicconetti International Master on Communication Networks Engineering 2006/2007 IP version 6 The Internet is growing extremely rapidly. The
More informationChapter 18 and 22. IPv4 Address. Data Communications and Networking
University of Human Development College of Science and Technology Department of Information Technology Chapter 18 and 22 Data Communications and Networking IPv4 Address 1 Lecture Outline IPv4 Addressing
More informationTOWARDS EFFECTIVE PACKET CLASSIFICATION
TOWARDS EFFECTIVE PACKET CLASSIFICATION Yaxuan Qi 1 and Jun Li 1, 2 1 Research Institute of Information Technology (RIIT), Tsinghua University, Beijing, China, 100084 2 Tsinghua National Lab for Information
More informationFull file at
ch02 True/False Indicate whether the statement is true or false. 1. IP addresses have links to domain names to make it possible for users to identify and access resources on a network. 2. As a frame moves
More informationLecture 3: Packet Forwarding
Lecture 3: Packet Forwarding CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Mike Freedman & Amin Vahdat Lecture 3 Overview Paper reviews Packet Forwarding IP Addressing Subnetting/CIDR
More informationMultiway Range Trees: Scalable IP Lookup with Fast Updates
Washington University in St. Louis Washington University Open Scholarship All Computer Science and Engineering Research Computer Science and Engineering Report Number: WUCS-99-28 1999-01-01 Multiway Range
More informationDiffServ Architecture: Impact of scheduling on QoS
DiffServ Architecture: Impact of scheduling on QoS Abstract: Scheduling is one of the most important components in providing a differentiated service at the routers. Due to the varying traffic characteristics
More informationComputer Networks 56 (2012) Contents lists available at SciVerse ScienceDirect. Computer Networks
Computer Networks 56 (2012) 3010 3022 Contents lists available at SciVerse ScienceDirect Computer Networks journal homepage: www.elsevier.com/locate/comnet A new hierarchical packet classification algorithm
More informationIntroduction. Router Architectures. Introduction. Introduction. Recent advances in routing architecture including
Introduction Router Architectures Recent advances in routing architecture including specialized hardware switching fabrics efficient and faster lookup algorithms have created routers that are capable of
More informationTopics for Today. Network Layer. Readings. Introduction Addressing Address Resolution. Sections 5.1,
Topics for Today Network Layer Introduction Addressing Address Resolution Readings Sections 5.1, 5.6.1-5.6.2 1 Network Layer: Introduction A network-wide concern! Transport layer Between two end hosts
More informationTag Switching. Background. Tag-Switching Architecture. Forwarding Component CHAPTER
CHAPTER 23 Tag Switching Background Rapid changes in the type (and quantity) of traffic handled by the Internet and the explosion in the number of Internet users is putting an unprecedented strain on the
More informationComputer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS
Computer Network Architectures and Multimedia Guy Leduc Chapter 2 MPLS networks Chapter based on Section 5.5 of Computer Networking: A Top Down Approach, 6 th edition. Jim Kurose, Keith Ross Addison-Wesley,
More informationEfficient IP-Address Lookup with a Shared Forwarding Table for Multiple Virtual Routers
Efficient IP-Address Lookup with a Shared Forwarding Table for Multiple Virtual Routers ABSTRACT Jing Fu KTH, Royal Institute of Technology Stockholm, Sweden jing@kth.se Virtual routers are a promising
More informationOn characterizing BGP routing table growth
University of Massachusetts Amherst From the SelectedWorks of Lixin Gao 00 On characterizing BGP routing table growth T Bu LX Gao D Towsley Available at: https://works.bepress.com/lixin_gao/66/ On Characterizing
More informationV6Gene: A Scalable IPv6 Prefix Generator for Route Lookup Algorithm
Scalable IPv6 Prefix Generator for Benchmark 1 V6Gene: A Scalable IPv6 Prefix Generator for Route Lookup Algorithm Benchmark i Abstract-- Most conventional IPv4-based route lookup algorithms are no more
More information