SINCE the ever increasing dependency on the Internet, there

Size: px
Start display at page:

Download "SINCE the ever increasing dependency on the Internet, there"

Transcription

1 IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 8, NO. 6, DECEMBER Scalable Packet Classification for Enabling Internet Differentiated Services Pi-Chung Wang, Member, IEEE, Chia-Tai Chan, Chun-Liang Lee, and Hung-Yi Chang Abstract Nowadays, IP networks are rapidly evolving toward a QoS-enabled infrastructure. The need for packet classification is increasing in accordance with emerging differentiated services. While the new differentiated services could significantly increase the number of rules, it has been demonstrated that performing packet classification on a potentially large number of rules is difficult and has poor worst-case performance. In this work, we present an enhanced tuple pruning search algorithm called Tuple Pruning Plus (TPP) for packet classification, which outperforms the existing schemes on the scalability. Our main idea is to simplify the lookup procedure and to avoid unnecessary tuple probing by maintaining the least-cost property of rule through precomputation and the proposed Information Marker. With extra rules added for Information Marker, only one tuple access is required in each packet classification. In our experiments, 70 MB DRAM is used to achieve 50 million packets per second (MPPS) for a 1 M-rule set, showing a performance improvement by a factor of 50. We also present a heuristic to further reduce the required storage to about 20 MB. These results demonstrate the effectiveness of the TPP scheme to achieve high speed packet classification. Index Terms Best matching prefix, multicast, multidimensional range lookup, packet classification. I. INTRODUCTION SINCE the ever increasing dependency on the Internet, there has been a rapid evolution in the Internet applications. It provides a broad range of multimedia services, such as IP telephony, video conferencing, collaborative research, and distance based virtual reality/visualization. To meet real time property, Quality-of-Service (QoS) management for networked multimedia applications over IP is thus a significant and demanding challenge. During the past several years, numerous mechanisms have been proposed for providing QoS networks. The ultimate goal of these QoS mechanisms is to provide differentiated services to the applications at the edges of the Manuscript received July 29, 2005; revised January 29, This work was supported in part by the National Science Council of Taiwan, R.O.C., under Grant NSC E The associate editor coordinating the review of this manuscript and approving it for publication was Dr. Anna Hac. P.-C. Wang is with the Department of Computer Science, National Chung Hsing University, Taichung, Taiwan, R.O.C. ( pcwang@cs.nchu.edu.tw). C.-T. Chan is with the Institute of Biomedical Engineering, National Yang- Ming University, Taipei 112, Taiwan, R.O.C. ( ctchan@ym.edu.tw). C.-L. Lee is with the Department of Computer Science and Information Engineering, Chang-Gung University, Taoyuan 333, Taiwan, R.O.C. ( leecl@csie.nctu.edu.tw). H.-Y. Chang is with the Department of Information Management, National Kaohsiung First University of Science and Technology, Kaohsiung 811, Taiwan, R.O.C. ( leorean@ccms.nkfust.edu.tw). Digital Object Identifier /TMM Fig. 1. Enabling procedures for QoS mechanism. network. These mechanisms usually rely on two procedures [1], as shown in Fig. 1. First, traffic arriving at edge routers is separated into distinct forwarding classes, e.g., indicated by the differentiated services codepoint (DSCP field) in the DiffServ model [2], via the process of packet classification. Packets from each flow are then directed to a corresponding queue. Then, the queue-scheduling algorithm determines the rate at which packet from each queue is forwarded that the resources are allotted to each queue and to the corresponding flows. Currently, end-to-end service guarantees for specific aggregated flows are achieved through RSVP, MPLS, or similar reservation protocols by routing these flows along specific traffic engineered paths. The directed routing is based on the source and destination addresses of packets [3] [5]. The 2-D packet classification determines the next hop and the allocated resource for each packet based on its source and destination addresses. Hence, packet classification is a key component of the QoS mechanisms that determines to which forwarding class a packet belongs. For example, the current discussions about differentiated services within the IETF assume that the edge routers of a core network are capable to classify the packets of different users [6]. Furthermore, 2-D packet classification is also useful for multicast forwarding which requires lookups based on both the source address and multicast group [7], [8]. Packet classification entails searching a table of rules which binds a packet to a flow or set of flows and returning the forwarding class for the least-cost rule which matches the packet. A rule consists of a set of fields, which in turn correspond to another set of fields in the packet header. The most common fields include the IP source address (SA, 32 bits), the destination address (DA, 32 bits), the protocol type (8 bits), port numbers (16 bits) of source/destination applications and protocol flags in the packet header. Each field can be any variable length prefix bit string, range, explicit value or wildcard. A -dimensional rule is thus defined as. A packet is said to match a particular rule if for all, the field of the header satisfies. Each rule has an associated action, which /$ IEEE

2 1240 IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 8, NO. 6, DECEMBER 2006 is usually assigned a cost to define its priority among the actions of matched rules. The matched rule with the least-cost action will be enacted to process the arriving packets. In sum, the complexity of packet classification builds on the search for the least-cost, matching rule. While packet classification has been extensively employed in the Internet for security, the properties of rules for security and service differentiation are quite different. Currently, the largest rule sets in firewalls contain a few thousand rules [9] [11]; however, dynamic resource reservation protocols could cause rule sets to swell into the tens of thousands. For example, let s consider a backbone router with 100 K prefixes. If each destination prefix is coupled with even a few source prefixes (e.g., for resource reservation between content providers and customers), it is not hard to imagine the need for several hundred thousand rules. Thus the problem of finding the best matching rule for more than 100 K rules at Gigabit speeds is an important challenge [12]. In the last few years, the problem of packet classification has been studied extensively. Most of these algorithms are designed for applications on firewalls. Since these rule sets used for security and firewalls are fairly small [9], the performance of these algorithms cannot be guaranteed with a reasonable storage as the number of rules increases. Thus, they might not be suitable for differentiated services. To successfully deploy the Internet differentiated services, we are interested in solutions that can scale to several hundreds of thousands rules. In addition, the algorithms should be able to achieve fast updating since the rules specified for differentiated services might change frequently. Furthermore, we concern only worst-case performance of the algorithms since the header processing delay should be avoided in order to provide service assurances. Our Contributions: In previous work, tuple pruning search is proposed to achieve fast and scalable 2 D (SA, DA) packet classification [10]. However, the worst-case performance is not acceptable for the extremely large rule set. For example, at most 51 hash accesses are required for a packet classification within a 1M-rule set in our experiment. In this work, we propose an enhanced tuple pruning search algorithm called Tuple Pruning Plus (TPP) to achieve much faster forwarding throughput. By maintaining the least-cost property of rule through precomputation and the introduction of Information Marker, an improved tuple pruning mechanism is proposed to reduce the number of the probed tuples. There is a trade-off between the number of the hash accesses and the required storage. With extra rules added for Information Marker, the number of hash accesses for each packet classification could remain constant. In 1M-entry set, the lookup could be achieved in one hash access with sevenfold entries or four hash accesses with twofold entries. As compared with the existing tuple pruning search scheme, the experimental results demonstrate that the lookup speed increased by a factor of 50. An incremental update procedure is also provided. The rest of the paper is organized as follows. Firstly, the related algorithms are introduced in Section II. Section III presents the proposed algorithm. A further refinement to the proposed TPP scheme is shown in Section IV. The experimental setup and results are presented in Section V. Finally, a summary is given in Section VI. II. RELATED WORKS Several algorithms for classifying packets have recently appeared in the literature [9] [11], [13] [19]. They can be grouped into the following classes: linear search/caching, hardware-based solutions, grid of tries, decision-based, cross-producting-based and hash-based solutions. The following briefly describes the important properties of these algorithms. Assume that is the number of the rules, is the number of classified fields and is the length of the IP address. Linear Search/Caching: The simplest method for packet classification involves a linear search of all the rules. The spatial and temporal complexity is. Caching is a technique frequently used at either the hardware or the software level to improve the performance of linear search. However, the performance of caching depends critically on each flow s having large number of packets. Also, if the number of simultaneous flows exceeds the cache size, then the performance would be severely degraded. Hardware-Based Solutions: A high degree of parallelism can be implemented in hardware to provide a speed-up advantage. In particular, ternary content addressable memories (TCAMs) can be used effectively to look up rules. However, TCAMs with a particular word width cannot be used when flexibility of the rule specification is required. Manufacturing TCAMs with sufficiently wide words to accommodate all bits in a rule is difficult. It also suffers from the problem of power consumption and scalability [20]. Lakshman et al. presented another scheme that depends on a very wide memory bus [14]. The algorithm reads bits from memory, corresponding to the BMPs in each field, and determines their intersection to find a set of matching rules. The memory requirement for this scheme is and the time complexity is, where is the memory bus width. Recently, Baboescu et al. addressed the speed issue and described an improved version by merging consecutive bits, although the required storage was not improved [12]. In sum, the hardware-oriented schemes rely on heavy parallelism, and involve considerable hardware cost; the flexibility and scalability of hardware solutions remain to be very limited. Grid of Tries: Specifically for the case of two-field rules, Srinivasan et al. [13] presented a trie-based algorithm. The algorithm has a memory requirement of and requires memory accesses per rule lookup. In addition, there is an enhanced version that is presented in [19]. FIS Trees: In [15], Feldman and Muthukrishnan proposed the Fat Inverted Segment trees (FIS trees) for 2-D classification. FIS tree is a modification of a segment tree by adopting the data structure of multiway search tree and child-to-parent pointers. By adjusting the number of levels in the FIS trees, the required storage can be traded off with lookup time. Decision-Based Solutions: The decision-based algorithms include works presented by Gupta et al. [18] and Woo [17]. Both schemes use a decision tree to divide the rules into multiple groups. Each group is listed in the leaf nodes of the decision tree, and linear search is used to traverse the group. The number of rules in each group is limited by a predefined value. The decision at each node could be a field [18] or a bit of any field [17]. A suitable selection of decisions would

3 WANG et al.: SCALABLE PACKET CLASSIFICATION 1241 minimize the required storage and search time. The hypercuts presented by Singh et al. [11] further extends the 1-D cut into a multidimensional one. Cross-Producting-Based Solutions: A general mechanism, called cross-producting, involves BMP lookups on individual fields and the use of a precomputed table to combine the results of individual prefix lookups [13]. However, this scheme suffers from an memory blowup for -field rules. Gupta et al. presented an algorithm that can be considered to be a generalization of cross-producting [9]. In this algorithm, after BMP lookup is accomplished, a recursive flow classification algorithm hierarchically performs cross-producting. Thus BMP lookups and additional memory accesses are required per rule lookup. The algorithm is expected to improve the average throughput significantly; nevertheless, it requires space in the worst case. Also, in the case of two-field rules, this scheme is identical to cross-producting scheme. Hash-Based Solution: This solution is motivated by the observation that, although rule sets include several different prefixes or ranges, the distinct prefix lengths tend to be few [10]. For example, backbone routers have around 200K destination address prefixes, but only 32 distinct prefix lengths exist. Hence, all the prefixes can be divided into 32 groups, one for each length. Since all prefixes in a group have the same length, the prefix bit string can be used as a hash key, leading to a simple IP lookup scheme, which requires hash lookups, independent of the number of prefixes. The algorithm of Waldvogel [21] performs a binary search over the length groups and has a worst-case time complexity. The tuple space idea generalizes the foregoing approach [21] to 2-D rules [10]. A tuple is a set of rules with specific prefix lengths, and the resulting set of tuples is called a tuple space. For example, the 2-D rules and both belong to the tuple in the second row and third column in the tuple space. When searching for, a hash key is constructed by concatenating two bits of the source field with three bits of the destination field. The matched rule can be found by probing each tuple alternately while tracking the least-cost rule. Even a linear search of the tuple space represents a considerable improvement over a linear search of the rules since the number of tuples is typically much smaller than the number of rules. The rectangle search, a tuple-based algorithm, was proposed to improve the performance of the tuple lookup [10]. The lower bound has been demonstrated to be given a rectangular tuple space, where is the number of distinct prefix lengths. The primary aim is to eliminate a set of tuples during each probing, as depicted in Fig. 2. Tuples above are eliminated if the probe of tuple returns Match. Otherwise, tuples to the right of tuple are discarded. Markers and a precomputation mechanism are required to reach this goal. Assuming that the number of rules is, a rectangle search requires memory space. In our experiments, the number of the generated markers are about twelve times of the original rules. In [22], Wang et al. presented an algorithm to improve the required storage and the lookup speed of the rectangle search. Based on the observation that the performance of the rectangle search ties to the number of tuples, this scheme adopts a dynamic program- Fig. 2. Rectangle search algorithm. Fig. 3. Tuple pruning search algorithm. Fig. 4. Sample direwall database with two rules. ming scheme to calculate the optimal set of tuples and reorganizes the rules by using rule expansion. However, the cost of precomputation would increase exponentially as the classifier expands and makes the scheme unsuitable for large rule sets. Another heuristic, tuple pruning search, performs lookups on individual fields to eliminate tuples that cannot match the query. For each dimension, the referred information is collected in the pruning table. Accordingly, the lookup procedure starts by searching the pruning tables. The set of referred tuples for each prefix are recorded and the tuples corresponding to the intersection will be probed. Since no extra entry is required besides the pruning table, it features low update cost. We use an example to explain the lookup procedure. The two rules and are located in and, respectively. For the incoming packets with addresses (101000,110010), the matched prefixes of source address include and which are referred in and, respectively. For the destination address, the matched prefixes are and which are also referred in and. Hence the intersected tuples and will be probed, as

4 1242 IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 8, NO. 6, DECEMBER 2006 Fig. 5. Tuple construction algorithm. shown in Fig. 3. The authors claimed that the intersected rules are very rare in the industrial firewall database, hence it might perform well in the practical environment [10]. However, its worst case performance is identical to that of the linear search. III. ENHANCED TUPLE PRUNING Since the action of the least-cost matching rule is used to process the arriving packet. The tuple pruning search can be improved dramatically by maintaining the least-cost property through precomputation. An enhanced tuple pruning scheme for 2-D packet classification is described as follows. To begin with, two prefix tables are constructed by collecting the referred prefixes for both dimensions. Via precomputation, we can calculate the best matching prefixes (BMPs) for both SA and DA and concatenate them as a so called best matching rule (BMR). Since there is only one BMR existing for each (SA,DA) pair, the number of the probed tuples is reduced to one for any incoming packets. To facilitate the explanation of our idea, let s assume that there are two 2-D rules in the rule set, and. For the incoming packet with header (101000,110010), the BMR is and indicates that the will be probed, as shown in Fig. 4. However, two obstacles might impede the correctness of BMR probing. The first is the cost of the fetched BMR which might not be the lowest one. For example, the cost of might be lower than that of while is the BMR for the incoming packets. Second, the BMR in the specific tuple may not exist, as shown in the example that the BMR for header (100000,110010) does not exist in the original set. To deal with both of the critical situations, an informational marker is introduced to maintain the associated information. For the example in Fig. 3, the BMR has to be generated at, as shown in Fig. 4. Since the tuple dominates the tuple, the action of is equal to that of. We name this extra rule as an information-marker ( -marker here after). The associated -markers for are also inserted into and. Since the one inserted into is identical to, the action of willbe compared with that of. If the cost of action is lower than that of, its action will replace the action of. The -marker is used to improve the search procedure on a par with the marker used in [10]. The major difference is that -markers Fig. 6. Number of different subprefix lengths for each route prefix. are generated in correspondence to the existence of longer prefixes, while the markers are generated according to the position of the rule. Furthermore, the -marker can result in an efficient data structure and search algorithm. In the following, the generation of the -markers as well as the searchable data structure are presented. Tuple Construction: The construction procedure of the searchable tuples consists of two parts. First, each rule is inserted into the associated tuple according to the lengths of its prefixes. In the mean time, the prefix trees for both dimensions are constructed to record the referred prefixes in the rule set and indicate the associated tuple. The data structure of prefix tree can be a binary tree or a multibit tree proposed in [23]. The pruning tables will be generated from the prefix trees. Also, it can keep track of the relationship between each prefix and its subprefixes. To be more specific, let and be two prefix strings, where. Assume that the string matching function, P-match, will return the common string between and.if is a substring of, P-match. Next, the -marker is generated and inserted into the associated tuples. Before the -marker is inserted into the tuple, the occurrence of the duplicate rule is checked. If there is no duplicate entry, the -marker is inserted. Otherwise, the cost of rule actions will be compared and the lower-cost action will be recorded in

5 WANG et al.: SCALABLE PACKET CLASSIFICATION 1243 Fig. 7. Rule insertion algorithm. the entry. Note that the rules with a wildcard field can be treated as 1-D prefixes. They will not be inserted into the tuples but inserted into the prefix tree. Assume each rule consists of two fields, (source address prefix) and (destination address prefix). The set of the longer prefixes for and are listed in and, respectively. Each combination in the cross-product of and are used to examine the related tuples and to check whether the rule with identical prefixes exists. If yes, the cost of both actions are compared and the one with lower cost will be kept in the existing rule to guarantee that once the rule is probed, the least-cost action will be taken. Otherwise, an -marker with the action of will be put into the tuple for the possible probing in the tuple pruning search. Let be the length of prefix. The tuple construction algorithm is given in Fig. 5. In the worst case, tuples are probed for each rule insertion, where is the length of IP address. The total number of generated -markers can be expressed as where, is the number of existing rules whose and. One of the major concerns about this approach is the number of the additional -markers which ties to the different lengths of referred prefixes in each dimension. Apparently, the number of the -markers ties to the existence of rules with longer prefixes. Therefore, each rule can result in at most -markers with shorter prefixes. Nevertheless, the observation from the real-world routing tables and rule sets indicate that the number of different subprefix lengths is few. First, we use the routing tables downloaded from [24], [25] to show the number of different subprefix lengths for each route prefix without counting the default route. For most route prefixes, there are usually less than (1) three subprefixes in the routing table and six in the worst case, as shown in Fig. 6. Thus at most 48 extra rules will be generated for each inserted rule. However, the occurrence of the worst-case situation should be relatively low since only 5% of route prefixes have more than three and two subprefixes in the NLANR and the rest routing tables, respectively. In [12], the authors also reported that the phenomenon remains for the industrial classifiers. In our experiments, we further demonstrate that the extra cost is reasonable with respect to the improvement in performance. Search: The classification procedure consists of two pruningtable lookups and one hash lookup to the tuple. First, the BMP lookups are performed in the pruning tables for both dimensions. However, the lookup result fetched here is the length of the BMP. If the results are and, the tuple will be probed for the best matched rule. The tuple space lookup performance mainly ties to the lookup performance of pruning tables. The fast 1-D lookup algorithm proposed in the previous schemes can be applied to provide good performance, as shown in [23], [26]. Update: The tuple updates can be divided into three categories: change of rule action, insertion, and deletion of rule. We only explain how to perform rule insertion and deletion since change of rule action can be treated as re-insert the rule with updated action. To deal with rule insertion, the prefix tree for each dimension and the -markers within the related tuples must be created and maintained. Let,, be the inserted rule and, be the set of shorter prefixes of,. The rule insertion algorithm is given Fig. 7. In the worst case, tuples are modified. The insertion of -markers will not affect the construction of prefix tree since it is based on the original rules. Furthermore, the tuples covered by the least-cost rule will not be probed for the insertion since they will not be affected by the inserted rule, as shown in Fig. 8. A rule is inserted into the two-rule set of Fig. 4. After inserting the SA and DA into the prefix trees, the set of probed tuples are derived. According to the row-major order, the -markers are put into,, and, respectively.

6 1244 IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 8, NO. 6, DECEMBER 2006 Fig. 10. Implement with parallel hardware. Fig. 8. Example of rule insertion. Fig. 11. Flooding avoidance of i-markers. Fig. 9. Example of rule deletion. While traversing, a collision with is encountered. After comparing their cost, if the cost of is lower, its action will replace the least-cost action field of and keep traversing the rest tuples (, and ). Otherwise, the entry in will remain unchanged and the remained three tuples covered by will not be probed in this insertion. As a result, at most tuples would be probed. The procedure of rule deletion is similar to that of rule insertion. For each deleted rule, the related -markers should be dropped. The -markers in,, and will be removed for the deletion of, as shown in Fig. 9. Furthermore, the tuples covered by the deleted rule will also be examined for the correctness of the least-cost action. The nearest rule which covers should be checked for possible revision. This is because if the examined tuples with -markers or rules with cost higher than, the action of should replace those entries to ensure that the lowest cost action will be taken. Otherwise, their actions will remain unchangeable. The number of the deleted -markers are and the examined tuples are in the worst case. For the ease of updating, each entry in the tuple should have two action fields: one is the least-cost action related to the rule and another is its original action. Implementation: The tuple pruning search can be implemented with software or hardware. With software implementation, the total lookup time is plus one hash access time. The lookup performance can be further improved through hardware implementation. By exploiting hardware parallelism, the total lookup time of the pruning tables is reduced to max(lookup(sa),lookup(da)), as shown in Fig. 10. We can also perform pruning and hashing simultaneously by adopting pipeline design and accomplish one packet classification within maximum(pruning(sa), pruning(da), one hash access to the tuple). Assume the worst-case pruning time is 20 ns with 10ns SRAM [26] and one hash access time (without collision) is 20 ns (one 20 ns DRAM access time), the proposed scheme can achieve 50 MPPS. IV. FLOODING AVOIDANCE OF -MARKERS The basic scheme described in Section III takes just two lookups in the pruning tables and one hash access to the tuple. Although the experimental results show that the number of generated -markers is acceptable with respect to the number of rules, the flooding avoidance mechanism can further reduce the number of -markers as well as the required storage. The basic idea is to divide the tuple space into multiple subspaces. Since the number of subprefixes in each subspace is reduced, the generated -markers will be decreased as well. For each subspace, at most one tuple will be probed. Consequently, the number of probed tuples is not greater than the number of subspaces. Though the increase of the memory accesses incurs the performance degradation, it can be alleviated through parallel design with multibank memory architecture. By putting these two subspaces into two separate memory banks, the lookups can be performed concurrently. We use the example in Fig. 8 to illustrate the operation. Assume the boundary line is at the bit of DA, the tuple space is divided into two subspaces, as shown in Fig. 11. There are two rules in the left subspace and one for the other. Thus only two

7 WANG et al.: SCALABLE PACKET CLASSIFICATION 1245 TABLE I COMPARE TO THE TUPLE PRUNING SEARCH BASED ON CLASSIFIERS WITH 80% LOCALITY Fig. 12. Modification to the pruning tables. -markers are generated in the left subspace and none in the right one. To lookup the best matched rule, we use the address pair (100000,110010) as an example. The tuple will be probed in the left subspace and in the right one. Their action will be compared to decide whose action will be taken. The action of -markers in the tuple is equal to that in since they are duplicates of. Thus, can be removed without influence, so does. Consequently, the action of will be equal to that of since the activated action of must have the least cost between and. is withdrawn in the same way. Overall, the -marker reduction will not affect the correctness of classification result. The original pruning procedure has to be modified to support lookup in the subspaces. To make the illustration even easier, we use the example in Fig. 11 and adapt the binary tree as the pruning table. The prefix tree for SA and DA prefixes are shown in Fig. 12. Each node in the SA prefix tree has two fields (1 bit for each subspace) that are used to indicate the SA prefix occurrence in the left/right subspaces. For example, prefixes and occur in the left subspace, thus the left fields of the correspondent nodes will be set to 1. Also, the right field of node mapped to 1010 is set to 1, while the DA prefix tree stays unchanged. While performing tuple pruning, the lookup procedure in the SA prefix tree has to record the last occurrence of 1 for both left and right fields. For the DA prefix tree, the revised procedure has to record the length of the longest match prefix which is shorter than the boundary line, i.e., cut-bit (the bit of DA). Namely, to classify the packet with address pair (SA:100000, DA:110010), the last 1 appears at traversed node for the left field and traversed node for the right one in the SA prefix tree while searching for To search the DA address , and bit will be recorded. Thus the probed tuples will be and, respectively. The dynamic programming can be used to calculate the optimum scope of each subspace. Assume the tuple space are divided into subspaces. The number of the boundary lines in the row is expressed as and the one in the column is expressed TABLE II COMPARE TO THE TUPLE PRUNING SEARCH BASED ON RANDOM CLASSIFIERS as which satisfies, as shown in (2) at the bottom of the page. For each combination, there are sets of the cut-bit positions. The number of the generated -markers in each cut-bit combination is listed in (3), shown at the bottom of page. The definition of is modified as which is the set of the longer prefixes conforming to the length restriction of the subspace. V. PERFORMANCE EVALUATION To evaluate the performance of the proposed TPP scheme, we use the synthetical rule sets with 5 K to 1 M entries. Since our algorithm is designed for supporting QoS of multimedia applications, we generate (3), where the rule sets from the routing table in NLANR [24]. There are prefixes in the sample (2) (3)

8 1246 IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 8, NO. 6, DECEMBER 2006 Fig. 13. Rule lengths distribution of original database. (left: random, right: 80% locality). Fig. 14. Rule lengths distribution of database with i-markers. (left: random, right: 80% locality). routing table. We use two different sampling schemes to generate the (SA,DA) rules: the first one is to choose the prefixes uniformly [10] and the other is to concentrate 80% rules in 20% address space to show locality [27]. Note that the rules with wildcard are not considered in the simulation because they will be inserted into the pruning table and will not affect the tuples. The rule length distribution of the 100 K-rule set with 80% locality is shown in the right part of Fig. 13 which is similar to the figure represented by uniformly chosen rules. Most rules correspond to the tuples near (24,24). The color shades represent the density of rules: the darker the shade, the greater number of rules. A. Comparison With Tuple Pruning Search We first examine the rules set with 80% locality. The major performance metric is the number of -markers. From Table I, we can see that the numbers of entries are about three to six times of the original tables. However, with a larger set (larger than 10 K entries), the increased entry ratio is smaller with respect to the smaller set (1 K). This is because with more entries in the table, the probability to generate an -marker collided with any existing rule is also higher, thereby reducing the ratio of increased entries. The result for the random-generated set is shown in Table II. The number of occupied tuples is slightly reduced due to the address locality. The number of entries is increased for the large set (for set with more than 50 K rules) since the wide-spread rules might cause the occurrence of -marker collision to be reduced. For the 1 M-rule set, it requires about 70 MB memory whose cost is lower than US$50. For both sets, the TPP scheme offers apparent improvement on speed since only one tuple is probed. With the native tuple pruning search, the probed tuples will increase to 51 in the worst case, i.e., at least 51 memory accesses. The TPP scheme is, therefore, much suitable for speed-critical environment, even with sevenfold storage. As described above, the TPP scheme can achieve 50 MPPS while coupling with fast 1-D lookup algorithm. The resulted rule lengths distribution from Fig. 13 is shown in Fig. 14. It can be noticed that the number of required tuples is increased and the colors of most of the blocks are darker than as compared with Fig. 13. Furthermore, the number of colored blocks is increased because the -markers might be inserted to the tuples, which do not contain any rule originally. B. Performance With Flooding Avoidance Next, we apply the heuristic described in Section IV and show the results in Table III. By dividing the tuple space into four subspaces and executing dynamic programming, the cut-bits are set to bit. By using the flooding avoidance scheme, the number of -markers is reduced significantly. Note that after -marker reduction, the entry counts for both sets are pretty close. The number of entries is reduced to about twofold entries, but it also comes with three more hash accesses. The parallel design can increase the throughput by searching four subspaces simultaneously. We also found that the number of tuples is much less than

9 WANG et al.: SCALABLE PACKET CLASSIFICATION 1247 TABLE III NUMBER OF ENTRIES WITH i-markers REDUCTION TABLE V COMPARE TO THE TUPLE REDUCTION SCHEME TABLE IV COMPARE TO THE RECTANGLE SEARCH SCHEME the basic scheme, which demonstrates the effect of -marker reduction. For the 1 M-rule set, the required storage is reduced to about 20 MB. C. Comparison With the Rectangle Search Schemes In this section, the TPP scheme is compared to the rectangle search schemes presented in [10], [22]. Since the existing rectangle search schemes require extensive precomputation, we only compare their performance based on classifiers with at most 100 K rules. First, we present the comparison between the TPP scheme and the rectangle search. As shown in Table IV, the TPP scheme might result in more tuples than the rectangle search, but the required storage and the lookup speed are greatly superior than the rectangle search. This is due to the fact that the -markers are inserted into the tuples based on the referred prefixes, the markers used in the rectangle search are inserted into every lefthand tuple. Hence the -makers can result in an efficient data structure and search algorithm, as demonstrated in Table IV. Next, we compare the TPP scheme with the tuple-reduction scheme [22]. As listed in Table V, the tuple reduction scheme outperforms the rectangle search in both speed and storage. Nevertheless, the TPP scheme provides better performance than the tuple reduction scheme due to the efficiency of the -markers. D. Comparison With Other Existing Schemes It is difficult to compare the practical performance of the existing schemes because there is no public available benchmark tools for packet classification yet. Currently, most schemes use randomly generated rule set to examine the performance while few schemes use real-world firewall databases. In addition, most schemes are designed for 5-D packet classification except for the tuple-based schemes, Grid of Tries and the proposed scheme. Therefore, it is necessary for us to demonstrate their performance based on theoretical complexity. The comparisons of theoretical time, space and update complexity are shown in Table VI, where is the number of rules, is the length of the IP address, is the number of fields, is the memory bus width and the and are the number of divisions for SA and DA. As compared to the 2-D schemes, the TPP scheme features faster lookup performance, but the worst-case storage requirement shows possible memory explosion and requires the heuristic presented in Section IV to avoid the worst-case situation. By dividing the tuple space into more subspaces, the storage complexity will approach to. Also, the TPP scheme provides good scalability and incremental update. VI. CONCLUSION Aimed to support QoS of multimedia applications, we propose a remarkable enhancement to the 2-D tuple pruning search. Our main idea is to simplify the lookup procedure and avoid unnecessary tuple probing. By maintaining the least-cost property of rule through precomputation and the introduced Information Marker, we can reduce the number of probed tuples from the worst-case to O(1). The incremental update is also supported in the new approach. The TPP scheme can achieve a constant throughput of 50 MPPS with parallel hardware design. Through experiments, 70 MB storage is required for a 1 M-rule set as a reasonable tradeoff. To lessen the memory demand, we introduce the heuristic to reduce the required storage. By dividing the tuple space into multiple subspaces, the number of the generated -markers are decreased. For example, the required storage for 1M-rule set is reduce to about 20 MB with four subspaces. As compared with the tuple-based algorithms, the predeterminable performance can provide sustainable throughput and ease the implementation. Therefore, the proposed Tuple Pruning Plus scheme is a feasible solution for the emerging Internet differentiated services.

10 1248 IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 8, NO. 6, DECEMBER 2006 TABLE VI SEARCH, MEMORY USAGE AND UPDATE COMPLEXITY REFERENCES [1] J. R. Gallardo, D. Makrakis, and M. Angulo, Dynamic resource management considering the real behavior of aggregate traffic, IEEE Trans. Multimedia, vol. 3, no. 2, pp , Jun [2] S. Blake et al., An Architecture for Differentiated Services RFC 2475, [3] T. Li and Y. Rekhter, Provider Architecture for Differentiated Services and Traffic Engineering (PASTE) RFC 2430, Oct [4] J. Boyle, RSVP extensions for CIDR aggregated data flows, Internet Draft [Online]. Available: draft-ietfrsvp-cidr-ext-01.txt Dec [5] E. Rosen, A. Viswanathan, and R. Callon, Multiprotocol Label Switching Architecture RFC 3031, Jan [6] V. P. Kumar, T. V. Lakshman, and D. Stiliadis, Beyond best effort: router architectures for the differentiated services of tomorrows internet, IEEE Commun. Mag., vol. 36, no. 5, pp , May [7] D. Estrin, D. Farinacci, A. Helmy, D. Thaler, S. Deering, M. Handley, V. Jacobson, C. Liu, P. Sharma, and L. Wei, Protocol Independent Multicast Sparse Mode: Protocol Specification RFC 2117, Jun [8] D. Waitzman, C. Partridge, and S. Deering, Distance Vector Multicast Routing Protocol. RFC 1075, Jun [9] P. Gupta and N. McKeown, Packet classification on multiple fields, in ACM SIGCOMM, September 1999, pp [10] V. Srinivasan, G. Varghese, and S. Suri, Packet classification using tuple space search, in ACM SIGCOMM, Sep. 1999, pp [11] S. Singh, F. Baboescu, G. Varghese, and J. Wang, Packet classification using multidimensional cutting, in ACM SIGCOMM 03, Aug. 2003, pp [12] F. Baboescu and G. Varghese, Scalable packet classification, IEEE/ACM Trans. Netw., vol. 13, no. 1, pp. 2 14, [13] V. Srinivasan, G. Varghese, S. Suri, and M. Waldvogel, Fast scalable level four switching, in ACM SIGCOMM, Sep. 1998, pp [14] T. V. Lakshman and D. Stidialis, High speed policy-based packet forwarding using efficient multi-dimensional range matching, in ACM SIGCOMM, Sep. 1998, pp [15] A. Feldmann and S. Muthukrishnan, Tradeoffs for packet classification, in IEEE INFOCOM, Mar. 2000, pp [16] M. Buddhikot, S. Suri, and M. Waldvogel, Space decomposition techniques for fast layer-4 switching., in IFIP Sixth Int. Workshop on High Speed Networks, 2000, pp [17] T. Woo, A modular approach to packet classification: algorithms and results, in IEEE INFOCOM, Mar. 2000, pp [18] P. Gupta and N. McKeown, Packet classification using hierarchical intelligent cuttings, IEEE Micro, vol. 20, no. 1, pp , [19] F. Baboescu, S. Singh, and G. Varghese, Packet classification for core routers: is there an alternative to CAMs?, in IEEE INFOCOM, Mar. 2003, pp [20] P. Gupta and N. McKeown, Algorithms for packet classification, IEEE Network Mag., vol. 15, no. 2, pp , [21] M. Waldvogel, G. Varghese, J. Turner, and B. Plattner, Scalable high speed IP routing lookups, in ACM SIGCOMM, Sep. 1997, pp [22] P. C. Wang, C. T. Chan, S. C. Hu, C. L. Lee, and W. C. Tseng, Highspeed packet classification for differentiated services in next-generation networks, IEEE Trans. Multimedia, vol. 6, no. 6, pp , [23] V. Srinivasan and G. Varghese, Fast IP lookups using controlled prefix expansion, ACM Trans. Comput., vol. 17, pp. 1 40, Feb [24] NLANR Project, National Laboratory for Applied Network Research [Online]. Available: [25] Merit Networks Inc., IMPA Project [Online]. Available: merit.edu/ipma/routing table/ [26] P. C. Wang, C. T. Chan, and Y. C. Chen, A fast IP routing lookup scheme, IEEE Commun. Lett., vol. 5, no. 3, pp , Mar [27] Y. D. Lin, H. Y. Wei, and K. J. Wu, Ordered lookup with bypass matching for scalable per-flow classification in layer 4 routers, Comput. Commun., vol. 24, no. 7 8, pp , Pi-Chung Wang (M 02) received the M.S. and Ph.D. degrees in computer science and information engineering from the National Chiao-Tung University, Hsinchu, Taiwan, R.O.C., in 1997 and 2001, respectively. From 2002 to 2006, he was with Telecommunication Laboratories of Chunghwa Telecom, Taipei, Taiwan, working on network planning in broadband access networks and PSTN migration. During these four years, he also worked on IP lookup and classification algorithms. Since February 2006, he has been an assistant professor of Computer Science at National Chung Hsing University. His research interests included IP lookup and classification algorithms, scheduling algorithms, congestion control, network processors, algorithms and applications related computational geometry. He is currently working on high speed string matching for network intrusion detection.

11 WANG et al.: SCALABLE PACKET CLASSIFICATION 1249 Chia-Tai Chan received the Ph.D. degree in computer sceince and information engineering from National Chiao-Tung University, Hsinchu, Taiwan, R.O.C., in From 1999 to 2005, he was with Telecommunication Laboratories Chunghwa Telecom Co., Ltd., as a Project Researcher. In August 2005, he joined the faculty of the Institute of Biomedical Engineering, National Yang-Ming University, Taipei, Taiwan, as an Associate Professor. His research interests include the design, analysis and traffic engineering of broadband multiservice networks. Hung-Yi Chang was born in Taiwan, R.O.C., in He received the M.S. and Ph.D. degrees in computer science and information engineering from National Chiao-Tung University, Hsinchu, Taiwan, in 1994 and 1999, respectively. He is now an assistant professor in the Department of Information Management in National Kaohsiung First University of Science and Technology, Kaohsiung, Taiwan. His research interests include network management and interconnection networks. Chun-Liang Lee received the M.S. and Ph.D. degrees in computer science and information engineering from National Chiao-Tung University, Hsinchu, Taiwan, R.O.C., in 1997 and 2001, respectively. From 2002 to 2006, he was with the Telecommunication Laboratories, Chunghwa Telecom Co., Ltd. Since February 2006, he has been an assistant professor of Computer Science and Information Engineering at Chang-Gung University, Taoyuan, Taiwan. His research interests include design and analysis of network protocols, quality of service in the Internet, and packet classification algorithms.

Performance Improvement of Hardware-Based Packet Classification Algorithm

Performance Improvement of Hardware-Based Packet Classification Algorithm Performance Improvement of Hardware-Based Packet Classification Algorithm Yaw-Chung Chen 1, Pi-Chung Wang 2, Chun-Liang Lee 2, and Chia-Tai Chan 2 1 Department of Computer Science and Information Engineering,

More information

Packet Classification Using Dynamically Generated Decision Trees

Packet Classification Using Dynamically Generated Decision Trees 1 Packet Classification Using Dynamically Generated Decision Trees Yu-Chieh Cheng, Pi-Chung Wang Abstract Binary Search on Levels (BSOL) is a decision-tree algorithm for packet classification with superior

More information

Scalable Packet Classification for IPv6 by Using Limited TCAMs

Scalable Packet Classification for IPv6 by Using Limited TCAMs Scalable Packet Classification for IPv6 by Using Limited TCAMs Chia-Tai Chan 1, Pi-Chung Wang 1,Shuo-ChengHu 2, Chung-Liang Lee 1,and Rong-Chang Chen 3 1 Telecommunication Laboratories, Chunghwa Telecom

More information

Design of a High Speed FPGA-Based Classifier for Efficient Packet Classification

Design of a High Speed FPGA-Based Classifier for Efficient Packet Classification Design of a High Speed FPGA-Based Classifier for Efficient Packet Classification V.S.Pallavi 1, Dr.D.Rukmani Devi 2 PG Scholar 1, Department of ECE, RMK Engineering College, Chennai, Tamil Nadu, India

More information

Fast Packet Classification Algorithms

Fast Packet Classification Algorithms Fast Packet Classification Algorithms Mrudul Dixit, Anuja Kale, Madhavi Narote, Sneha Talwalkar, and B. V. Barbadekar Abstract A packet classifier possesses a set of rules for classifying packets based

More information

Tree-Based Minimization of TCAM Entries for Packet Classification

Tree-Based Minimization of TCAM Entries for Packet Classification Tree-Based Minimization of TCAM Entries for Packet Classification YanSunandMinSikKim School of Electrical Engineering and Computer Science Washington State University Pullman, Washington 99164-2752, U.S.A.

More information

Implementation of Boundary Cutting Algorithm Using Packet Classification

Implementation of Boundary Cutting Algorithm Using Packet Classification Implementation of Boundary Cutting Algorithm Using Packet Classification Dasari Mallesh M.Tech Student Department of CSE Vignana Bharathi Institute of Technology, Hyderabad. ABSTRACT: Decision-tree-based

More information

Problem Statement. Algorithm MinDPQ (contd.) Algorithm MinDPQ. Summary of Algorithm MinDPQ. Algorithm MinDPQ: Experimental Results.

Problem Statement. Algorithm MinDPQ (contd.) Algorithm MinDPQ. Summary of Algorithm MinDPQ. Algorithm MinDPQ: Experimental Results. Algorithms for Routing Lookups and Packet Classification October 3, 2000 High Level Outline Part I. Routing Lookups - Two lookup algorithms Part II. Packet Classification - One classification algorithm

More information

Scalable IP Routing Lookup in Next Generation Network

Scalable IP Routing Lookup in Next Generation Network Scalable IP Routing Lookup in Next Generation Network Chia-Tai Chan 1, Pi-Chung Wang 1,Shuo-ChengHu 2, Chung-Liang Lee 1, and Rong-Chang Chen 3 1 Telecommunication Laboratories, Chunghwa Telecom Co., Ltd.

More information

AN EFFICIENT HYBRID ALGORITHM FOR MULTIDIMENSIONAL PACKET CLASSIFICATION

AN EFFICIENT HYBRID ALGORITHM FOR MULTIDIMENSIONAL PACKET CLASSIFICATION AN EFFICIENT HYBRID ALGORITHM FOR MULTIDIMENSIONAL PACKET CLASSIFICATION Yaxuan Qi 1 and Jun Li 1,2 1 Research Institute of Information Technology (RIIT), Tsinghua University, Beijing, China, 100084 2

More information

DESIGN AND IMPLEMENTATION OF OPTIMIZED PACKET CLASSIFIER

DESIGN AND IMPLEMENTATION OF OPTIMIZED PACKET CLASSIFIER International Journal of Computer Engineering and Applications, Volume VI, Issue II, May 14 www.ijcea.com ISSN 2321 3469 DESIGN AND IMPLEMENTATION OF OPTIMIZED PACKET CLASSIFIER Kiran K C 1, Sunil T D

More information

Performance Evaluation and Improvement of Algorithmic Approaches for Packet Classification

Performance Evaluation and Improvement of Algorithmic Approaches for Packet Classification Performance Evaluation and Improvement of Algorithmic Approaches for Packet Classification Yaxuan Qi, Jun Li Research Institute of Information Technology (RIIT) Tsinghua University, Beijing, China, 100084

More information

Packet Classification using Rule Caching

Packet Classification using Rule Caching Packet Classification using Rule Caching Nitesh B. Guinde, Roberto Rojas-Cessa and Sotirios G. Ziavras Electrical and Computer Engineering Department New Jersey Institute Technology Newark, NJ 72, USA

More information

Grid of Segment Trees for Packet Classification

Grid of Segment Trees for Packet Classification 2010 24th IEEE International Conference on Advanced Information Networking and Applications Grid of Segment Trees for Packet Classification Yeim-Kuan Chang, Yung-Chieh Lin, and Chen-Yu Lin Department of

More information

Three Different Designs for Packet Classification

Three Different Designs for Packet Classification Three Different Designs for Packet Classification HATAM ABDOLI Computer Department Bu-Ali Sina University Shahid Fahmideh street, Hamadan IRAN abdoli@basu.ac.ir http://www.profs.basu.ac.ir/abdoli Abstract:

More information

A Scalable Approach for Packet Classification Using Rule-Base Partition

A Scalable Approach for Packet Classification Using Rule-Base Partition CNIR Journal, Volume (5), Issue (1), Dec., 2005 A Scalable Approach for Packet Classification Using Rule-Base Partition Mr. S J Wagh 1 and Dr. T. R. Sontakke 2 [1] Assistant Professor in Information Technology,

More information

TOWARDS EFFECTIVE PACKET CLASSIFICATION

TOWARDS EFFECTIVE PACKET CLASSIFICATION TOWARDS EFFECTIVE PACKET CLASSIFICATION Yaxuan Qi 1 and Jun Li 1, 2 1 Research Institute of Information Technology (RIIT), Tsinghua University, Beijing, China, 100084 2 Tsinghua National Lab for Information

More information

Efficient Packet Classification using Splay Tree Models

Efficient Packet Classification using Splay Tree Models 28 IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.5B, May 2006 Efficient Packet Classification using Splay Tree Models Srinivasan.T, Nivedita.M, Mahadevan.V Sri Venkateswara

More information

AN ASSOCIATIVE TERNARY CACHE FOR IP ROUTING. 1. Introduction. 2. Associative Cache Scheme

AN ASSOCIATIVE TERNARY CACHE FOR IP ROUTING. 1. Introduction. 2. Associative Cache Scheme AN ASSOCIATIVE TERNARY CACHE FOR IP ROUTING James J. Rooney 1 José G. Delgado-Frias 2 Douglas H. Summerville 1 1 Dept. of Electrical and Computer Engineering. 2 School of Electrical Engr. and Computer

More information

Towards Effective Packet Classification. J. Li, Y. Qi, and B. Xu Network Security Lab RIIT, Tsinghua University Dec, 2005

Towards Effective Packet Classification. J. Li, Y. Qi, and B. Xu Network Security Lab RIIT, Tsinghua University Dec, 2005 Towards Effective Packet Classification J. Li, Y. Qi, and B. Xu Network Security Lab RIIT, Tsinghua University Dec, 2005 Outline Algorithm Study Understanding Packet Classification Worst-case Complexity

More information

Selective Boundary Cutting For Packet Classification SOUMYA. K 1, CHANDRA SEKHAR. M 2

Selective Boundary Cutting For Packet Classification SOUMYA. K 1, CHANDRA SEKHAR. M 2 ISSN 2319-8885 Vol.04,Issue.34, August-2015, Pages:6786-6790 www.ijsetr.com SOUMYA. K 1, CHANDRA SEKHAR. M 2 1 Navodaya Institute of Technology, Raichur, Karnataka, India, E-mail: Keerthisree1112@gmail.com.

More information

Enhancement of the CBT Multicast Routing Protocol

Enhancement of the CBT Multicast Routing Protocol Enhancement of the CBT Multicast Routing Protocol Seok Joo Koh and Shin Gak Kang Protocol Engineering Center, ETRI, Korea E-mail: sjkoh@pec.etri.re.kr Abstract In this paper, we propose a simple practical

More information

Packet classification using diagonal-based tuple space search q

Packet classification using diagonal-based tuple space search q Computer Networks 50 (2006) 1406 1423 www.elsevier.com/locate/comnet Packet classification using diagonal-based tuple space search q Fu-Yuan Lee *, Shiuhpyng Shieh Department of Computer Science and Information

More information

MULTI-MATCH PACKET CLASSIFICATION BASED ON DISTRIBUTED HASHTABLE

MULTI-MATCH PACKET CLASSIFICATION BASED ON DISTRIBUTED HASHTABLE International Journal of Science, Environment and Technology, Vol. 4, No 4, 2015, 1098 1106 ISSN 2278-3687 (O) 2277-663X (P) MULTI-MATCH PACKET CLASSIFICATION BASED ON DISTRIBUTED HASHTABLE 1 Neeshma K

More information

Recursive Flow Classification: An Algorithm for Packet Classification on Multiple Fields

Recursive Flow Classification: An Algorithm for Packet Classification on Multiple Fields 5 CHAPTER 4 Recursive Flow Classification: An Algorithm for Packet Classification on Multiple Fields Introduction Chapters 2 and 3 described algorithms for routing lookups. In this chapter and the next

More information

Design of a Multi-Dimensional Packet Classifier for Network Processors

Design of a Multi-Dimensional Packet Classifier for Network Processors Design of a Multi-Dimensional Packet Classifier for Network Processors Stefano Giordano, Gregorio Procissi, Federico Rossi, Fabio Vitucci Dept. of Information Engineering, University of Pisa, ITALY E-mail:

More information

EVERY Internet router today can forward entering Internet

EVERY Internet router today can forward entering Internet 2 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 13, NO. 1, FEBRUARY 2005 Scalable Packet Classification Florin Baboescu and George Varghese, Member, IEEE Abstract Packet classification is important for applications

More information

Cross-Layer QoS Support in the IEEE Mesh Network

Cross-Layer QoS Support in the IEEE Mesh Network Cross-Layer QoS Support in the IEEE 802.16 Mesh Network Chun-Chuan Yang, Yi-Ting Mai and Liang-Chi Tsai Multimedia and Communications Laboratory Department of Computer Science and Information Engineering

More information

Design and Evaluation of Diffserv Functionalities in the MPLS Edge Router Architecture

Design and Evaluation of Diffserv Functionalities in the MPLS Edge Router Architecture Design and Evaluation of Diffserv Functionalities in the MPLS Edge Router Architecture Wei-Chu Lai, Kuo-Ching Wu, and Ting-Chao Hou* Center for Telecommunication Research and Department of Electrical Engineering

More information

AN ASSOCIATIVE TERNARY CACHE FOR IP ROUTING. 1. Introduction

AN ASSOCIATIVE TERNARY CACHE FOR IP ROUTING. 1. Introduction AN ASSOCIATIVE TERNARY CACHE FOR IP ROUTING James J Rooney 1 José G Delgado-Frias 2 Douglas H Summerville 1 1 Department of Electrical and Computer Engineering 2 School of Electrical Engineering and Computer

More information

Performance Evaluation of Cutting Algorithms for the Packet Classification in Next Generation Networks

Performance Evaluation of Cutting Algorithms for the Packet Classification in Next Generation Networks Performance Evaluation of Cutting Algorithms for the Packet Classification in Next Generation Networks Abstract---Packet classification plays an important role in both edge and core routers to provide

More information

Multi-core Implementation of Decomposition-based Packet Classification Algorithms 1

Multi-core Implementation of Decomposition-based Packet Classification Algorithms 1 Multi-core Implementation of Decomposition-based Packet Classification Algorithms 1 Shijie Zhou, Yun R. Qu, and Viktor K. Prasanna Ming Hsieh Department of Electrical Engineering, University of Southern

More information

CS 268: Route Lookup and Packet Classification

CS 268: Route Lookup and Packet Classification Overview CS 268: Route Lookup and Packet Classification Packet Lookup Packet Classification Ion Stoica March 3, 24 istoica@cs.berkeley.edu 2 Lookup Problem Identify the output interface to forward an incoming

More information

Frugal IP Lookup Based on a Parallel Search

Frugal IP Lookup Based on a Parallel Search Frugal IP Lookup Based on a Parallel Search Zoran Čiča and Aleksandra Smiljanić School of Electrical Engineering, Belgrade University, Serbia Email: cicasyl@etf.rs, aleksandra@etf.rs Abstract Lookup function

More information

Scalable Packet Classification on FPGA

Scalable Packet Classification on FPGA Scalable Packet Classification on FPGA 1 Deepak K. Thakkar, 2 Dr. B. S. Agarkar 1 Student, 2 Professor 1 Electronics and Telecommunication Engineering, 1 Sanjivani college of Engineering, Kopargaon, India.

More information

FPGA Implementation of Lookup Algorithms

FPGA Implementation of Lookup Algorithms 2011 IEEE 12th International Conference on High Performance Switching and Routing FPGA Implementation of Lookup Algorithms Zoran Chicha, Luka Milinkovic, Aleksandra Smiljanic Department of Telecommunications

More information

Routing Lookup Algorithm for IPv6 using Hash Tables

Routing Lookup Algorithm for IPv6 using Hash Tables Routing Lookup Algorithm for IPv6 using Hash Tables Peter Korppoey, John Smith, Department of Electronics Engineering, New Mexico State University-Main Campus Abstract: After analyzing of existing routing

More information

Data Structures for Packet Classification

Data Structures for Packet Classification Presenter: Patrick Nicholson Department of Computer Science CS840 Topics in Data Structures Outline 1 The Problem 2 Hardware Solutions 3 Data Structures: 1D 4 Trie-Based Solutions Packet Classification

More information

Homework 1 Solutions:

Homework 1 Solutions: Homework 1 Solutions: If we expand the square in the statistic, we get three terms that have to be summed for each i: (ExpectedFrequency[i]), (2ObservedFrequency[i]) and (ObservedFrequency[i])2 / Expected

More information

An Efficient IP Routing Lookup by Using Routing Interval

An Efficient IP Routing Lookup by Using Routing Interval 374 JOURNA OF COMMUNICATIONS AND NETWORKS, VO.3, NO.4, DECEMBER 21 An Efficient IP Routing ookup by Using Routing Interval Pi-Chung Wang, Chia-Tai Chan, and Yaw-Chung Chen Abstract: Nowadays, the commonly

More information

Forwarding and Routers : Computer Networking. Original IP Route Lookup. Outline

Forwarding and Routers : Computer Networking. Original IP Route Lookup. Outline Forwarding and Routers 15-744: Computer Networking L-9 Router Algorithms IP lookup Longest prefix matching Classification Flow monitoring Readings [EVF3] Bitmap Algorithms for Active Flows on High Speed

More information

Packet Classification Using Standard Access Control List

Packet Classification Using Standard Access Control List Packet Classification Using Standard Access Control List S.Mythrei 1, R.Dharmaraj 2 PG Student, Dept of CSE, Sri Vidya College of engineering and technology, Virudhunagar, Tamilnadu, India 1 Research Scholar,

More information

QoS-Aware Hierarchical Multicast Routing on Next Generation Internetworks

QoS-Aware Hierarchical Multicast Routing on Next Generation Internetworks QoS-Aware Hierarchical Multicast Routing on Next Generation Internetworks Satyabrata Pradhan, Yi Li, and Muthucumaru Maheswaran Advanced Networking Research Laboratory Department of Computer Science University

More information

Dynamic Routing Tables Using Simple Balanced. Search Trees

Dynamic Routing Tables Using Simple Balanced. Search Trees Dynamic Routing Tables Using Simple Balanced Search Trees Y.-K. Chang and Y.-C. Lin Department of Computer Science and Information Engineering National Cheng Kung University Tainan, Taiwan R.O.C. ykchang@mail.ncku.edu.tw

More information

ECE697AA Lecture 21. Packet Classification

ECE697AA Lecture 21. Packet Classification ECE697AA Lecture 21 Routers: Flow Classification Algorithms Tilman Wolf Department of Electrical and Computer Engineering 11/20/08 Packet Classification What is packet classification? Categorization of

More information

A Hybrid Approach to CAM-Based Longest Prefix Matching for IP Route Lookup

A Hybrid Approach to CAM-Based Longest Prefix Matching for IP Route Lookup A Hybrid Approach to CAM-Based Longest Prefix Matching for IP Route Lookup Yan Sun and Min Sik Kim School of Electrical Engineering and Computer Science Washington State University Pullman, Washington

More information

Efficient TCAM Encoding Schemes for Packet Classification using Gray Code

Efficient TCAM Encoding Schemes for Packet Classification using Gray Code Efficient TCAM Encoding Schemes for Packet Classification using Gray Code Yeim-Kuan Chang and Cheng-Chien Su Department of Computer Science and Information Engineering National Cheng Kung University Tainan,

More information

Switch and Router Design. Packet Processing Examples. Packet Processing Examples. Packet Processing Rate 12/14/2011

Switch and Router Design. Packet Processing Examples. Packet Processing Examples. Packet Processing Rate 12/14/2011 // Bottlenecks Memory, memory, 88 - Switch and Router Design Dr. David Hay Ross 8b dhay@cs.huji.ac.il Source: Nick Mckeown, Isaac Keslassy Packet Processing Examples Address Lookup (IP/Ethernet) Where

More information

An Efficient Parallel IP Lookup Technique for IPv6 Routers Using Multiple Hashing with Ternary marker storage

An Efficient Parallel IP Lookup Technique for IPv6 Routers Using Multiple Hashing with Ternary marker storage An Efficient Parallel IP Lookup Technique for IPv Routers Using Multiple Hashing with Ternary marker storage P. Kiran Sree Dr. Inampudi Ramesh Babu Mr. P.Kiran Sree,Associate Professor, Department of Computer

More information

Packet Classification. George Varghese

Packet Classification. George Varghese Packet Classification George Varghese Original Motivation: Firewalls Firewalls use packet filtering to block say ssh and force access to web and mail via proxies. Still part of defense in depth today.

More information

LONGEST prefix matching (LPM) techniques have received

LONGEST prefix matching (LPM) techniques have received IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 14, NO. 2, APRIL 2006 397 Longest Prefix Matching Using Bloom Filters Sarang Dharmapurikar, Praveen Krishnamurthy, and David E. Taylor, Member, IEEE Abstract We

More information

A Multi-stage IPv6 Routing Lookup Algorithm Based on Hash Table and Multibit Trie Xing-ya HE * and Yun YANG

A Multi-stage IPv6 Routing Lookup Algorithm Based on Hash Table and Multibit Trie Xing-ya HE * and Yun YANG 2017 International Conference on Computer, Electronics and Communication Engineering (CECE 2017) ISBN: 978-1-60595-476-9 A Multi-stage IPv6 Routing Lookup Algorithm Based on Hash Table and Multibit Trie

More information

Towards High-performance Flow-level level Packet Processing on Multi-core Network Processors

Towards High-performance Flow-level level Packet Processing on Multi-core Network Processors Towards High-performance Flow-level level Packet Processing on Multi-core Network Processors Yaxuan Qi (presenter), Bo Xu, Fei He, Baohua Yang, Jianming Yu and Jun Li ANCS 2007, Orlando, USA Outline Introduction

More information

IP Address Lookup in Hardware for High-Speed Routing

IP Address Lookup in Hardware for High-Speed Routing IP Address Lookup in Hardware for High-Speed Routing Andreas Moestedt and Peter Sjödin am@sics.se, peter@sics.se Swedish Institute of Computer Science P.O. Box 1263, SE-164 29 KISTA, Sweden Abstract This

More information

Algorithms for Packet Classification

Algorithms for Packet Classification Algorithms for Packet Classification Pankaj Gupta and Nick McKeown, Stanford University Abstract The process of categorizing packets into flows in an Internet router is called packet classification. All

More information

A Multi Gigabit FPGA-based 5-tuple classification system

A Multi Gigabit FPGA-based 5-tuple classification system A Multi Gigabit FPGA-based 5-tuple classification system Antonis Nikitakis Technical University of Crete, Department of Electronic and Computer Engineering Kounoupidiana, Chania, Crete, GR73100, Greece

More information

High-Performance Packet Classification on GPU

High-Performance Packet Classification on GPU High-Performance Packet Classification on GPU Shijie Zhou, Shreyas G. Singapura and Viktor. Prasanna Ming Hsieh Department of Electrical Engineering University of Southern California Los Angeles, CA 99

More information

TUPLE PRUNING USING BLOOM FILTERS FOR PACKET CLASSIFICATION

TUPLE PRUNING USING BLOOM FILTERS FOR PACKET CLASSIFICATION ... TUPLE PRUNING USING BLOOM FILTERS FOR PACKET CLASSIFICATION... TUPLE PRUNING FOR PACKET CLASSIFICATION PROVIDES FAST SEARCH AND A LOW IMPLEMENTATION COMPLEXITY. THE TUPLE PRUNING ALGORITHM REDUCES

More information

Rule Caching for Packet Classification Support

Rule Caching for Packet Classification Support Rule Caching for Packet Classification Support Joji Philip, Manish Taneja, and Roberto Rojas-Cessa Abstract The growth of the Internet and requirements for enhanced flexibility and versatility have resulted

More information

Parallel-Search Trie-based Scheme for Fast IP Lookup

Parallel-Search Trie-based Scheme for Fast IP Lookup Parallel-Search Trie-based Scheme for Fast IP Lookup Roberto Rojas-Cessa, Lakshmi Ramesh, Ziqian Dong, Lin Cai, and Nirwan Ansari Department of Electrical and Computer Engineering, New Jersey Institute

More information

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097 Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master

More information

Tree, Segment Table, and Route Bucket: A Multistage Algorithm for IPv6 Routing Table Lookup

Tree, Segment Table, and Route Bucket: A Multistage Algorithm for IPv6 Routing Table Lookup Tree, Segment Table, and Route Bucket: A Multistage Algorithm for IPv6 Routing Table Lookup Zhenqiang LI Dongqu ZHENG Yan MA School of Computer Science and Technology Network Information Center Beijing

More information

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097 Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for

More information

Hardware Assisted Recursive Packet Classification Module for IPv6 etworks ABSTRACT

Hardware Assisted Recursive Packet Classification Module for IPv6 etworks ABSTRACT Hardware Assisted Recursive Packet Classification Module for IPv6 etworks Shivvasangari Subramani [shivva1@umbc.edu] Department of Computer Science and Electrical Engineering University of Maryland Baltimore

More information

ITTC High-Performance Networking The University of Kansas EECS 881 Packet Switch I/O Processing

ITTC High-Performance Networking The University of Kansas EECS 881 Packet Switch I/O Processing High-Performance Networking The University of Kansas EECS 881 Packet Switch I/O Processing James P.G. Sterbenz Department of Electrical Engineering & Computer Science Information Technology & Telecommunications

More information

Multi-Field Range Encoding for Packet Classification in TCAM

Multi-Field Range Encoding for Packet Classification in TCAM This paper was presented as part of the Mini-Conference at IEEE INFOCOM 2011 Multi-Field Range Encoding for Packet Classification in TCAM Yeim-Kuan Chang, Chun-I Lee and Cheng-Chien Su Department of Computer

More information

IN recent years, the amount of traffic has rapidly increased

IN recent years, the amount of traffic has rapidly increased , March 15-17, 2017, Hong Kong Content Download Method with Distributed Cache Management Masamitsu Iio, Kouji Hirata, and Miki Yamamoto Abstract This paper proposes a content download method with distributed

More information

A Method of Identifying the P2P File Sharing

A Method of Identifying the P2P File Sharing IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.11, November 2010 111 A Method of Identifying the P2P File Sharing Jian-Bo Chen Department of Information & Telecommunications

More information

THE advent of the World Wide Web (WWW) has doubled

THE advent of the World Wide Web (WWW) has doubled IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 17, NO. 6, JUNE 1999 1093 A Novel IP-Routing Lookup Scheme and Hardware Architecture for Multigigabit Switching Routers Nen-Fu Huang, Member, IEEE,

More information

Growth of the Internet Network capacity: A scarce resource Good Service

Growth of the Internet Network capacity: A scarce resource Good Service IP Route Lookups 1 Introduction Growth of the Internet Network capacity: A scarce resource Good Service Large-bandwidth links -> Readily handled (Fiber optic links) High router data throughput -> Readily

More information

PERFORMANCE ANALYSIS OF AF IN CONSIDERING LINK

PERFORMANCE ANALYSIS OF AF IN CONSIDERING LINK I.J.E.M.S., VOL.2 (3) 211: 163-171 ISSN 2229-6X PERFORMANCE ANALYSIS OF AF IN CONSIDERING LINK UTILISATION BY SIMULATION Jai Kumar and U.C. Jaiswal Department of Computer Science and Engineering, Madan

More information

A Multi-constraint Resource Search Algorithm for P2P-SIP Conference Services

A Multi-constraint Resource Search Algorithm for P2P-SIP Conference Services A Multi-constraint Resource Search Algorithm for P2P-SIP Conference Services Hui-Kai Su 1,*, Wen-Hsu Hsiao 2, Jian-Ting Pan 3, Chen-Hung Liao 4, Kim-Joan Chen 3, and Chien-Min Wu 5 1 Dept. of Electrical

More information

THE orthogonal frequency-division multiplex (OFDM)

THE orthogonal frequency-division multiplex (OFDM) 26 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II: EXPRESS BRIEFS, VOL. 57, NO. 1, JANUARY 2010 A Generalized Mixed-Radix Algorithm for Memory-Based FFT Processors Chen-Fong Hsiao, Yuan Chen, Member, IEEE,

More information

Binary Search Schemes for Fast IP Lookups

Binary Search Schemes for Fast IP Lookups 1 Schemes for Fast IP Lookups Pronita Mehrotra, Paul D. Franzon Abstract IP route look up is the most time consuming operation of a router. Route lookup is becoming a very challenging problem due to the

More information

Fast Update of Forwarding Tables in Internet Router Using AS Numbers Λ

Fast Update of Forwarding Tables in Internet Router Using AS Numbers Λ Fast Update of Forwarding Tables in Internet Router Using AS Numbers Λ Heonsoo Lee, Seokjae Ha, and Yanghee Choi School of Computer Science and Engineering Seoul National University San 56-1, Shilim-dong,

More information

Priority Area-based Quad-Tree Packet Classification Algorithm and Its Mathematical Framework

Priority Area-based Quad-Tree Packet Classification Algorithm and Its Mathematical Framework Appl. Math. Inf. Sci. 7, No. 1, 9-20 (2013) 9 Applied Mathematics & Information Sciences An International Journal Priority Area-based Quad-Tree Packet Classification Algorithm and Its Mathematical Framework

More information

ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT

ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT PhD Summary DOCTORATE OF PHILOSOPHY IN COMPUTER SCIENCE & ENGINEERING By Sandip Kumar Goyal (09-PhD-052) Under the Supervision

More information

Disjoint Superposition for Reduction of Conjoined Prefixes in IP Lookup for Actual IPv6 Forwarding Tables

Disjoint Superposition for Reduction of Conjoined Prefixes in IP Lookup for Actual IPv6 Forwarding Tables Disjoint Superposition for Reduction of Conjoined Prefixes in IP Lookup for Actual IPv6 Forwarding Tables Roberto Rojas-Cessa, Taweesak Kijkanjanarat, Wara Wangchai, Krutika Patil, Narathip Thirapittayatakul

More information

Shape Shifting Tries for Faster IP Route Lookup

Shape Shifting Tries for Faster IP Route Lookup Shape Shifting Tries for Faster IP Route Lookup Haoyu Song, Jonathan Turner, John Lockwood Applied Research Laboratory Washington University in St. Louis Email: {hs1,jst,lockwood}@arl.wustl.edu Abstract

More information

Enhanced Cores Based Tree for Many-to-Many IP Multicasting

Enhanced Cores Based Tree for Many-to-Many IP Multicasting Enhanced Cores Based Tree for Many-to-Many IP Multicasting In this paper, we propose a simple and practical scheme for many-to-many IP multicasting. The proposed scheme is based on the core based tree

More information

Interaction of RSVP with ATM for the support of shortcut QoS VCs: extension to the multicast case

Interaction of RSVP with ATM for the support of shortcut QoS VCs: extension to the multicast case Roberto Cocca, Stefano Salsano Interaction of RSVP with ATM for the support of shortcut QoS VCs: extension to the multicast case INFOCOM Department Report 004-004-1999 University of Rome La Sapienza Abstract

More information

Real Time Packet Classification and Analysis based on Bloom Filter for Longest Prefix Matching

Real Time Packet Classification and Analysis based on Bloom Filter for Longest Prefix Matching Real Time Packet Classification and Analysis based on Bloom Filter for Longest Prefix Matching Ms. Namita N. Kothari ME Information Technology2nd, Amrutvahini College of Engineering, Sangamner, India namitakothari8@gmail.com

More information

PARALLEL ALGORITHMS FOR IP SWITCHERS/ROUTERS

PARALLEL ALGORITHMS FOR IP SWITCHERS/ROUTERS THE UNIVERSITY OF NAIROBI DEPARTMENT OF ELECTRICAL AND INFORMATION ENGINEERING FINAL YEAR PROJECT. PROJECT NO. 60 PARALLEL ALGORITHMS FOR IP SWITCHERS/ROUTERS OMARI JAPHETH N. F17/2157/2004 SUPERVISOR:

More information

Tag Switching. Background. Tag-Switching Architecture. Forwarding Component CHAPTER

Tag Switching. Background. Tag-Switching Architecture. Forwarding Component CHAPTER CHAPTER 23 Tag Switching Background Rapid changes in the type (and quantity) of traffic handled by the Internet and the explosion in the number of Internet users is putting an unprecedented strain on the

More information

Fast Firewall Implementations for Software and Hardware-based Routers

Fast Firewall Implementations for Software and Hardware-based Routers Fast Firewall Implementations for Software and Hardware-based Routers Lili Qiu George Varghese Subhash Suri liliq@microsoft.com varghese@cs.ucsd.edu suri@cs.ucsb.edu Microsoft Research University of California,

More information

An Evaluation of Shared Multicast Trees with Multiple Active Cores

An Evaluation of Shared Multicast Trees with Multiple Active Cores Brigham Young University BYU ScholarsArchive All Faculty Publications 2001-07-01 An Evaluation of Shared Multicast Trees with Multiple Active Cores Daniel Zappala daniel_zappala@byu.edu Aaron Fabbri Follow

More information

PC-DUOS: Fast TCAM Lookup and Update for Packet Classifiers

PC-DUOS: Fast TCAM Lookup and Update for Packet Classifiers PC-DUOS: Fast TCAM Lookup and Update for Packet Classifiers Tania Mishra and Sartaj Sahni Department of Computer and Information Science and Engineering, University of Florida, Gainesville, FL 326 {tmishra,

More information

International Workshop NGNT 31. DiffServ and MPLS. Tímea Dreilinger

International Workshop NGNT 31. DiffServ and MPLS. Tímea Dreilinger International Workshop NGNT 31 DiffServ and MPLS Tímea Dreilinger Abstract Multi Protocol Label Switching (MPLS) technology enables Internet Service Providers to scale their current offerings, and exercise

More information

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations

More information

Decision Forest: A Scalable Architecture for Flexible Flow Matching on FPGA

Decision Forest: A Scalable Architecture for Flexible Flow Matching on FPGA 2010 International Conference on Field Programmable Logic and Applications Decision Forest: A Scalable Architecture for Flexible Flow Matching on FPGA Weirong Jiang, Viktor K. Prasanna Ming Hsieh Department

More information

Shape Shifting Tries for Faster IP Route Lookup

Shape Shifting Tries for Faster IP Route Lookup Shape Shifting Tries for Faster IP Route Lookup Haoyu Song, Jonathan Turner, John Lockwood Applied Research Laboratory Washington University in St. Louis Email: {hs1,jst,lockwood}@arl.wustl.edu Abstract

More information

Efficient hardware architecture for fast IP address lookup. Citation Proceedings - IEEE INFOCOM, 2002, v. 2, p

Efficient hardware architecture for fast IP address lookup. Citation Proceedings - IEEE INFOCOM, 2002, v. 2, p Title Efficient hardware architecture for fast IP address lookup Author(s) Pao, D; Liu, C; Wu, A; Yeung, L; Chan, KS Citation Proceedings - IEEE INFOCOM, 2002, v 2, p 555-56 Issued Date 2002 URL http://hdlhandlenet/0722/48458

More information

Bitmap Intersection Lookup (BIL) : A Packet Classification s Algorithm with Rules Updating

Bitmap Intersection Lookup (BIL) : A Packet Classification s Algorithm with Rules Updating ICCAS25 Bitmap Intersection Lookup (BIL) : A Packet Classification s Algorithm with Rules Updating Akharin Khunkitti*, Nuttachot Promrit** *Faculty of Information Technology, King Mongkut's Institute of

More information

Fast Packet Classification Using Bloom filters

Fast Packet Classification Using Bloom filters Fast Packet Classification Using Bloom filters Sarang Dharmapurikar Haoyu Song Jonathan Turner John Lockwood sarang@arl.wustl.edu hs@arl.wustl.edu jst@arl.wustl.edu lockwood@arl.wustl.edu Washington University

More information

The Improved WCMRP Protocol for Mobile Wireless Sensor Networks

The Improved WCMRP Protocol for Mobile Wireless Sensor Networks 152 JOURNAL OF COMMUNICATIONS, VOL. 6, NO. 2, APRIL 2011 The Improved WCMRP Protocol for Mobile Wireless Sensor Networks Ming Huang Guo Department of Information Management, Shih-Hsin University, Taipei,

More information

Packet Classification via Improved Space Decomposition Techniques

Packet Classification via Improved Space Decomposition Techniques 1 Packet Classification via Improved Space Decomposition Techniques Filippo Geraci, Marco Pellegrini, Paolo Pisati IIT-CNR, Pisa, filippo.geraci,marco.pellegrini,paolo.pisati @iit.cnr.it Luigi Rizzo Dip.Ing.Informazione,

More information

THE DATA networks using TCP/IP technology, i.e., the. Flow Aggregated, Traffic Driven Label Mapping in Label-Switching Networks

THE DATA networks using TCP/IP technology, i.e., the. Flow Aggregated, Traffic Driven Label Mapping in Label-Switching Networks 1170 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 17, NO. 6, JUNE 1999 Flow Aggregated, Traffic Driven Label Mapping in Label-Switching Networks Ken-ichi Nagami, Hiroshi Esaki, Member, IEEE,

More information

RECENTLY, researches on gigabit wireless personal area

RECENTLY, researches on gigabit wireless personal area 146 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II: EXPRESS BRIEFS, VOL. 55, NO. 2, FEBRUARY 2008 An Indexed-Scaling Pipelined FFT Processor for OFDM-Based WPAN Applications Yuan Chen, Student Member, IEEE,

More information

DiffServ Architecture: Impact of scheduling on QoS

DiffServ Architecture: Impact of scheduling on QoS DiffServ Architecture: Impact of scheduling on QoS Abstract: Scheduling is one of the most important components in providing a differentiated service at the routers. Due to the varying traffic characteristics

More information

A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS

A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS Tzu-Chiang Chiang,, Ching-Hung Yeh, Yueh-Min Huang and Fenglien Lee Department of Engineering Science, National Cheng-Kung University, Taiwan,

More information