A Scalable Approach for Packet Classification Using Rule-Base Partition

Size: px
Start display at page:

Download "A Scalable Approach for Packet Classification Using Rule-Base Partition"

Transcription

1 CNIR Journal, Volume (5), Issue (1), Dec., 2005 A Scalable Approach for Packet Classification Using Rule-Base Partition Mr. S J Wagh 1 and Dr. T. R. Sontakke 2 [1] Assistant Professor in Information Technology, Army Institute of Technology. (Affiliated to University of Pune, MS) ID: sjwagh@rediffmail.com [2] Director & Professor, S.G.G.S. College of Engineering and Technology, Vishnupuri, Nanded MS. ID: trsontakke@yahoo.com Abstract: This paper focuses on a new direction for packet classification, which can substantially improve the performance of a classifier by decreasing the rule-base lookup latency. The classifier partitions the rule-base into smaller independent sub-rule bases by using the hash key of hashing technique. We apply the concept of maximum entropy to select the hash key for optimal partitioning of rule-base. We performed the detailed simulations of our proposed algorithm on synthetic rulebases of size 1K to 200K entries using packet traces. From the simulation results we found that the algorithm significantly outperforms by reducing the size of a rulebase by more than four orders of magnitude with just two-levels of partitioning. Both the space and time complexity of the algorithm exhibit linearity in terms of the size of a rule-bases. The proposed idea suggests a good scalable solution for the packet classification with a large rule-base. Keywords: Packet classification, scalability, Lookup latency, Rule-bases, Space & Time complexity 1. Introductions The proposed algorithm basically intends to observe that a given packet matches only a few rules even in large classifiers [1]. This strongly implies that most of rules in any given rule-base are independent. Thus, we can partition the rule-base into many smaller independent sub-rule-bases. As long as the matching sub-rule-base can be identified quickly, the performance of the rulebase lookup can be substantially improved since the lookup needs to be performed only in the final sub-rulebase. This is achieved by hierarchically decomposing the original rule-base into many smaller independent subrule-bases based on the rules definitions. Our algorithm works in two phases: preprocessing and classification. In the preprocessing phase we hierarchically partition the original rule-base into many smaller independent sub-rule-bases by hashing on the bit fields selected from the classification space. The degree of the partitioning depends on the density of a sub-rule-base in the classification space. The denser the sub-rule-base, the more partitioning is needed. This hierarchical partitioning stops until all the sub-rule-bases are small enough. Then, during the classification phase a classifier inspects each incoming packet using the same hash key used in the preprocessing and identifies the sub-rule-base relevant to the packet. The search to find a matching rule is performed only in the final sub-rulebase where any existing lookup algorithm can be employed. To evaluate the performance of our classification algorithm, we have applied our algorithm to simulator which traces packet under synthetic rulebases of size 1K to 200K rules. The results show that the algorithm can reduce the size of the original rule-base by several orders of magnitude with only two-levels of partitioning, which requires only a couple of memory lookups. For example, a rule-base with 100K rules can be reduced to a sub-rule-base with only 7.6 rules on average and 258 rules in the worst case. In view of memory accesses, our algorithm requires 2 or 3 times less number of memory lookups compared to best classification algorithms known so far. Fur 1 thermore, the algorithm exhibits scalability in both its memory requirement and classification performance as we increase the size of a rule-base. 2. Theory The packet classification problem can define as follows. Given a rule base, which is a set of rules, a packet classifier matches one or more fields of the incoming packets in order to identify the rule. Each rule is specified by the range of values in 19

2 one or more fields of a packet header. Specifically, in d- dimensional packet classification, each rule r i is defined over d fields. Formally, r i is defined by a tuple (Ci, Ai) where Ci is called a classification space and Ai is the associated action of rule r i. The classification space is defined by the cross-product, where is a range of values the field k must take. A rule r i match a packet p= {b 1,b 2,b 3,.b d } if for where b k is a singleton. Multiple rules can match a packet. Thus, a classifier must identify the highest priority rule among all the matching rules. Intuitively, this requires the classifier to lookup the header fields of an incoming packet and to compare them against the rules in the rule base one by one in order of decreasing priority. When n, i.e. the number of rules, is large or the arrival rate of incoming packet is high, this is a time-consuming serial process, which will limit the speed of the classifier. Thus, the essence of the problem is to find a fast yet scalable classification function both in time and in space. 2.1 Proposed Algorithm This classification algorithm is based on the conjecture that, in a rule base, only a few rules have the possibility of matching a given packet. Let s look at the rule base example of a typical firewall shown in Table 1 (please refer Appendix -1) where inner network serves several application services such as HTTP, telnet and FTP. Rules R1, R2, and R3 represent grant of these connection requests while R0 protects inner network against spoofing attacks. D is the default deny rule for all other communications. The protocol field in Table 1 suggests that a packet using UDP protocol can be matched only to R0 or D. Thus, R1, R2 and R3 need not be matched against a UDP packet. Our algorithm works in two phases: preprocessing and classification based on divideand-conquer approach. In the preprocessing phase we divide the original rule base into many smaller independent subrule bases based on the values of classification fields where each rule is defined. This deviation of original rule base is shown in Figure 1 (please refer Appendix-2) From table 1 (please refer Appendix-1) a rule Overlaps with a rule If Intuitively, two rules overlap if there exist any instance of a packet that matches both rules. Since sub-rule bases differ at least in those bits that are selected as the hash key, a packet cannot match both sub-rule bases at the same time. Thus, the independence among sub-rule bases is guaranteed. Therefore, we need to look up only the relevant sub-rule base after inspecting a packet on the same bit fields. CNIR Journal, Volume (5), Issue (1), Dec., Preprocessing Phase The preprocessing phase starts by partitioning the original rule base into many independent sub-rule bases. Further, by looking up the protocol field of an incoming packet, we only need to look up the sub-rule base with the same protocol. We can select any of the bits in the classification fields as a hash key. If we select 8 bits, then we create a hash table with 2 8 =256 entries, each of which points to a sub-rule base. Intuitively, two rules may overlap if they map to the same sub-rule base while rules mapped to different sub-rule bases would never overlap, which implies that they are independent. The sub-rule bases larger threshold value can be repartitioned with another hash key, which must be different from the previously used first hash key. This hierarchical partitioning stops until all the sub-rule bases are small enough. However, the experimentation results show that two levels of partitioning are enough for a rule base fewer than 200K rules. Both the space and time complexity of this classification algorithm depend on the number of nodes and the depth of the partitioning hierarchy. To reduce the number of partitioning we need to partition a rule base into sub-rule bases as evenly as possible so that the number of empty sub-rule bases is minimized and the number of rules in sub-rule bases must follow uniform distribution. This partitioning efficiency depends on the hash key selection algorithm. 2.3 Classification Phase After partitioning a rule base and constructing hash tables during the preprocessing stage, a classifier narrows down the rule base lookup by mapping an incoming packet into the corresponding sub-rule base where the packet can be applied. The classifier looks up the hash table by using the hash key extracted from the packet header. Let us consider the rule base example shown in Table 2 (please refer Appendix -1). Assume that rules R0 to R3 are listed in the decreasing order of priority. We assume 5-dimensional classification, which uses 104-bit fields from protocol (8), source port (16), destination port (16), source (32) and destination (32) IP addresses from the header. In Table 2, we show only 8 most significant bits (MSBs) of a classification space, which may represent any header field such as the protocol. We partition the rule base to 256 buckets by using the 8 MSBs and create the hash table as shown in Table 2. Rules in one sub-rule base do not overlap with rules in other sub-rule bases. When a packet arrives, the classifier extracts the 8 MSBs from the header and uses it as an index to the hash table. If the hash table entry is not empty, then the classification is performed within the sub-rule base. Otherwise, the default rule is the matching rule. 3. Hash Key Selection Algorithm Hash key is a bit number selected from the rule space, to divide the original large rule base in to smaller part of sub rule bases. The partition of rule base is carried out on the basis of hash table, which is formed after selecting desired hash keys. The size of hash table is depends on the number of hash keys selected. If we select n

3 CNIR Journal, Volume (5), Issue (1), Dec., 2005 number of hash keys then their 2 n number of entries in hash table. 3.1 Rule-base Partition In the first-level partitioning, we only consider the protocol and port numbers as a hash key since these fields can naturally classify rules based on the Internet services governed by the rules. For example, HTTP service corresponds to protocol 6 and server port 80. The 6 bits are used for a client port. Thus, a hash key is concatenated from [protocol field], [direction bit] and [10 LSBs 6 MSBs in one of the port field]. Since a server port has a higher partitioning efficiency than a client port, we use the server port regardless of direction if a rule specifies a server port. If a rule specifies client ports in both source and destination ports, we use the 6 MSBs and spread the rules in both source and destination hash tables. classification space at this level is comprised of protocol In second level partitioning, which applies to (8), source (16), and destination port (16) numbers. In buckets larger than the threshold after the first level order to reduce the size of the hash table, we select a partitioning, we consider source and destination IP subset from the classification space as a hash key. If it is addresses, since the second-level hash key must be required to use a 17-bit hash key, which suggests a hash disjoint from the first-level hash key. To limit the size of table with 128K entries. There is a tradeoff between the the hash table, we only select a subset of the 64-bit fields memory space and the depth of the partitioning hierarchy as a second level hash key. depending on the size of the hash key. Assuming each entry contains either a 32-bit address or NULL-pointer, the size of the table is 512Kbytes. 3.2 Algorithm for Selecting Hash Key Selecting 6 bits from the protocol field using the The number of hash keys required for entropy-maximizing key selection algorithm, the 17-bit partitioning large rule base depends on original size of hash key is built. Since only two protocols, TCP and rule base and the threshold value (Maximum value) of UDP, need to specify port numbers, we select up to 11 sub-rule base. The formula for calculate number of hash additional bits from the port numbers for these protocols. keys is as follows Since a port number is bi-directional, i.e. either source or destination, and specified by a range with upper and N = S / T or N = 2 H lower bounds, we select one of the port field by an additional bit to denote the direction and then select additional 10 LSBs or 6 MSBs from the port field by using the precision directed grouping. Typically, a server port (dense area) designates a specific port Where N = Number of sub-rules S = Size of original rule base T = Threshold value of sub-rule base number between 0 and 1023 while a client port (sparse area) uses a random port numbered from 1024 to H = Total number of hash keys required Thus, lower 10 bits are used for a server port while upper There are following different type of hash key selection algorithms, i.e. MSB pattern (represented as MSB), Exponential growing pattern (Exp) Where w = the length of classification space, Mask distribution pattern (Mask) and The Entropymaximizing pattern (Ent) n = the total number of rules in a rule base. s = the length of a hash key, Entropy-maximizing pattern algorithm is a heart of this classification algorithm with this algorithm we 3.3 Demo on 4-hash key selection Algorithm find a good hash key by using the concepts of entropy technique, which is used in information theory. As We have simulated above-mentioned four algorithms by known widely, the entropy is maximized when all the considering only 16 rules (The rules are taken entries have the same probability of occurrence. Thus, randomly) and compared the results. We take 16 rules we can find a good hash key through the calculation of randomly by multiplying 76 with random function so as, to change the rule set each time. In real world the entropy. Using the entropy technique, a hash key standard size of one rule is up to 104 bits, but we of length can be expressed recursively by considered the size of one rule is 8 bit. We have where is the concatenation provided 4 options with respect to the hash key selection operator and q is the bit from the classification space that produces the maximum entropy. The algorithm starts by calculating the entropy for the hash key of algorithm. The original rule base (with 16 rules) is divided in to 4 groups, so we required total 2 hash keys for partitioning the rule base according to formula N = length 1 and determines the bit position that produces 2 H the maximum entropy value. Then, the algorithm The result of Entropy maximizing pattern is as repeats this process for the hash key of length 2 and so shown in Figure 2. (Please refer appendix-2). In this the on until the length of the hash key reaches or the bit B5 and B3 are get selected as hash key. The selection entropy does not increase further. Based on this of these keys is carried out according to the Entropy algorithm, we select required number of hash keys half maximizing algorithm, which is briefly explained from the source address field and half from the before. Comparing the results obtained for the four destination field. The time complexity this algorithm is 21

4 algorithms we conclude that the Entropy Maximizing pattern algorithm gives efficient results. 4. Experimentation and Results In this paper, we demonstrate the performance of the proposed algorithms for 3-dimensional classification (rule) in visual basic environment. Since it is difficult to obtain large real-life classification rule bases, we synthesized large rule bases by using random function, which is readily available in visual basic language. To create a synthetic rule base that resembles real-life rule bases, we carefully synthesized a rule base by following the rule base characteristics observed from real-life firewall applications. All of this experimentation was performed on 1.8GHz Pentium IV system with 256MB of memory running Windows XP Operating system. The Figure 3 shows the window by which the rules are accepted. According to figure one rule consist total 3 fields 1. Source port address (16 bit) 2. Destination port address (16 bit) 3. Protocol number (8bit) In the rule each bit is formed from a tuple {0, 1, *}, here * is a don t care bit it can be 0 or 1. The variation in rule base is maintained by entering the random value, before going for accepting rules. Figure 4 shows the results of the first level partitioning by displaying the average and maximum size of a sub-rule base after the partitioning. By the partitioning we can reduce the average size of a rule base substantially. For rule bases with 1K, 5K and 10K rules, the reduction ratios are , , and respectively. This is very significant since we can reduce the size of a rule base by more than two orders of magnitude by a single memory lookup to the corresponding hash table. However, as you can see from the maximum size of a sub-rule base in the figure, rules are not evenly distributed in the partitioned rule bases. The largest sub-rule base contains about 24% of rules of the original rule base in all the rule bases tested. As we can predict, these rules are related to HTTP service, which corresponds to protocol 6 and port 80. The numbers of sub-rule bases over the threshold (16 rules per sub-rule base) are 35, 200, and 150 for 1K, 5K, and 10K cases. For these sub-rule bases we perform the second-level partitioning. All of the first level partitioning is completed in less than one second in our experimentation platform. As a side effect of the first level partitioning, we observe that the partitioning more than doubles the total number of rules due to rule spreading. The actual inflation ratio is 2:42. Figure 5 and Figure 6 (please refer appendix-2) show the graphical results of the second level partitioning with various hash key selection algorithms. Figure 5 shows the average number of rules per sub-rule base while the Figure 6 shows the size of the largest rule base. Assuming the entropy maximizing key selection, the second-level partitioning further reduces the sub-rule base by reduction ratios of 0.054, 0.054, and for CNIR Journal, Volume (5), Issue (1), Dec., K, 5K, and 10K rule bases. When the first-level and the second-level partitioning are combined, 1K, 5K, and 10K rule bases are reduced to 1.6, 7.6, and 36.6 rules per subrule base on average, which corresponds to reduction ratios of , , and This is very significant since we can reduce the size of a rule base by more than four orders of magnitude by just two memory lookups to the hash tables. The second level partitioning is also very effective in reducing the largest sub-rule base, which contained 24% of the entire original rule base after the first level partitioning. Assuming the entropy-maximizing key selection, with the second level partitioning we can reduce the size of the largest rule base to contain 80, 100, and 150 rules in 1K, 5K, and 10K rule bases respectively. This suggests that for a 10K rule base we only need to compare a packet to those 150 rules in the worst case during classification phase. 5. Conclusion Most of existing works mainly carry out on relatively small classifiers, which consists less than 20K rules. Beyond this size, the existing packet classification algorithm schemes may not scale either due to the memory explosion or slowdown of classification. The proposed new classification algorithm is best at this time in achieving the scalability by hierarchically partitioning a rule-base into many smaller independent sub-rule bases. By using the same hash key used in the partitioning a classifier can inspect an incoming packet and find its relevant sub-rule base with a few memory lookups to the hash tables. By using the concepts of entropy we get effective hash key by which the sub-rule base can be effectively reduced compared to the original rule base. The experimental results show that two-levels of partitioning can substantially reduce the size of a rule base. Due to the partitioning phase, in a classification phase a classifier needs to access only 4.2, 20.4, and 207 rules on average for rule bases with 5K, 50K, and 200K rules. The results of simulation on this algorithm are very promising since one of the best-known algorithms [1] requires at least 13 memory accesses while this required only 4.2 memory access for 5K rules. Furthermore, according to resultant graph we show that the proposed algorithm has the unique scalability both in space and in time as we increase the size of rule base. 6. Acknowledgements We would like to acknowledge the Technical support by SRES College of Engineering, Kopargaon & SGGSCOE&T, Nanded for our Practical work of paper. 7. References: [1]A. Feldmann and S. Muthukrishnan, Tradeoffs for Packet Classification. In Gigabit Networking Workshop of the Proceedings of the IEEE INFOCOM 00. March [2] M. M. Buddhikot, S. Suri, and M. Waldvogel, Space Decomposition Techniques for Fast Layer-4 Switching, In Proceedings of the IFIP Sixth

5 International Workshop on Protocols for High Speed Networks. Vol. 66, No. 6, pp , August [3] P. Gupta and N. McKeown, Packet Classification on Multiple Fields, In Proceedings of the ACM SIGCOM 99, Vol. 29, issue 4, August [4] Robert B. Ash, Information Theory, Dover Publications, 1 st edition, November [5] S J Wagh, P M Yawalkar & D B Kshirasgar, Taxonomical Survey of IP Address Lookup Algorithms, Proc. National Conference on Latest Trends in Information Technology, at North Maharashtra University, Jalgaon, (MS) India, Oct [6] S. J. Wagh, P. M. Yawalkar & S. R. Patil, Hierarchical Intelligent Cuttings: A Packet Classification Technique Proc. National Conference on Signal Processing, Intelligent Systems and Networking - SPIN 2003, Dec 4-5, 2003, Bangalore, India. [7] T. V. Lakshman and D. Stiladis, High-speed Policybased Packet Forwarding using Efficient Multidimensional Range Matching, In Proceedings of the ACM SIGCOMM 98, Vol. 28, pp , [8] V. Srinivasan, S. Suri, G. Varghese, and M. Valdvogel, Fast and Scalable Layer Four Switching, In Proceedings of the ACM SIGCOMM 98, Vol. 28, pp , [9] T. Woo, A Modular Approach to Packet Classification: Algorithms and Results, In Proceedings of the IEEE INFOCOM 00. March CNIR Journal, Volume (5), Issue (1), Dec.,

6 CNIR Journal, Volume (5), Issue (1), Dec., 2005 APPENDIX-1 [TABLES] Table 1:A rule base example of a firewall. Rules Protocol Src. Port Dest. Port R0 * * * R1 R2 R3 TCP TCP TCP 1024~ ~ ~ Src. IP Dest. IP Action Description side Outer Outer Outer Deny Protection against Spoofing Attack Accept HTTP Services Accept Accept Telnet Service FTP Service Distance * * * * * Deny Default Rule side: protected local network by the firewall. Outer side: network separated from inner side network by the firewall Table 2:A rule base example and its hash tables. Classification Phase (b0,b1,..b103) Rule Hash Key 8MSBs (b0,b1,b2,b3,b4,b5,b6,b7) R0 Subrulebase Null Entry R3 Hash Key B3,b5 Subrulebase 00 R R Null Entry R0, R1 01 R0, R Null Entry R2 10 R R R Null Entry 11 Null Entry **** **** D Null Entry * : denotes a don the care bit Table 3. A rule base and its hash tables with two different hash keys of length 2. Rule Field Description (b0,b1,b2,b3,b4,b5,b6,b7) Index Hash Key b0,b1 Hash Key b0,b2 R R0 R0 R R1 R1 R R2,R3 R2 R3 1* R3 R3 24

7 CNIR Journal, Volume (5), Issue (1), Dec., 2005 Appendix-2 [figures] Figure 1: Demo on hash key selection Algorithms Figure 2: Result of Entropy Maximizing Patterns Figure 3: Window for accepting synthetic rules Figure 4: The result of the first level partitioning Figure 5: The average size of a sub-rule base with different key selection algorithms Figure 6: The maximum size of a sub-rule base with different key selection algorithms 25

8 CNIR Journal, Volume (5), Issue (1), Dec., 2005 APPENDIX-3 [ALGORITHM] Entropy maximizing key selection algorithm is described as follows. Consider: N = Number of sub-rules S = Size of original rule base T = Threshold value of sub-rule base H = Total number of hash keys required n = Total number of bits present in one rule ALGORITHM: Step 1: S1 = S Step 2: For (I =0; I < H; I++) For (J = 0; J < n; J++) {For (K = 0; K < S; K++) {Count number of 1 or * which is present at J th bit position in rule number K if it is considerable and store that summation at J th position in a single dimensional array say A} } For ( J = 0 ; J < n ; J1++) {A [J] = absolute (A [J] S1 / 2 /* S1 is a number of considerable rule */ } /*Now scan the array A to find out smallest element and store the index of that smallest element from array A in a resultant array say R in a I th position, The index which we will be getting is nothing but hash key number */ Step 3: For ( K1 = 0 ; K1 < S ; K1++ ) {Now make rule number K1 as non-considerable if it consist 0 at bit position R[ I ]} S1 = S - Number of non-considerable rules } Step 4: Stop. /*from this algorithm array R consist the hash keys*/ LIST OF TABLES: Table 1: Rule base example of a firewall. Table 2: Rule base example and its hash tables. Table 3: Rule base and its hash tables with two different hash keys of length 2. LIST OF FIGURES: Figure 1: Demo on hash key selection Algorithms Figure 2: Result of Entropy Maximizing Patterns Figure 3: Window for accepting synthetic rules Figure 4: The result of the first level partitioning Figure 5: The average size of a sub-rule base with different key selection algorithms Figure 6: The maximum size of a sub-rule base with different key selection algorithms 26

Sealahle Packet Classification through Maximum Entropy Dashing

Sealahle Packet Classification through Maximum Entropy Dashing Sealahle Packet Classification through Maximum Entropy Dashing Lynn Choi\ Jaesung Heo', Hyogon Kim', Jinoo Joung 2, and Sunil Kim' 'The Department ofelectronics and Computer Engineering, Korea University,

More information

(12) Patent Application Publication (10) Pub. No.: US 2005/ A1

(12) Patent Application Publication (10) Pub. No.: US 2005/ A1 (19) United States US 2005O2545O2A1 (12) Patent Application Publication (10) Pub. No.: US 2005/0254502 A1 Choi (43) Pub. Date: (54) PACKET CLASSIFICATION METHOD THROUGH HERARCHICAL RULEBASE PARTITIONING

More information

Packet Classification Using Dynamically Generated Decision Trees

Packet Classification Using Dynamically Generated Decision Trees 1 Packet Classification Using Dynamically Generated Decision Trees Yu-Chieh Cheng, Pi-Chung Wang Abstract Binary Search on Levels (BSOL) is a decision-tree algorithm for packet classification with superior

More information

DESIGN AND IMPLEMENTATION OF OPTIMIZED PACKET CLASSIFIER

DESIGN AND IMPLEMENTATION OF OPTIMIZED PACKET CLASSIFIER International Journal of Computer Engineering and Applications, Volume VI, Issue II, May 14 www.ijcea.com ISSN 2321 3469 DESIGN AND IMPLEMENTATION OF OPTIMIZED PACKET CLASSIFIER Kiran K C 1, Sunil T D

More information

Problem Statement. Algorithm MinDPQ (contd.) Algorithm MinDPQ. Summary of Algorithm MinDPQ. Algorithm MinDPQ: Experimental Results.

Problem Statement. Algorithm MinDPQ (contd.) Algorithm MinDPQ. Summary of Algorithm MinDPQ. Algorithm MinDPQ: Experimental Results. Algorithms for Routing Lookups and Packet Classification October 3, 2000 High Level Outline Part I. Routing Lookups - Two lookup algorithms Part II. Packet Classification - One classification algorithm

More information

Performance Improvement of Hardware-Based Packet Classification Algorithm

Performance Improvement of Hardware-Based Packet Classification Algorithm Performance Improvement of Hardware-Based Packet Classification Algorithm Yaw-Chung Chen 1, Pi-Chung Wang 2, Chun-Liang Lee 2, and Chia-Tai Chan 2 1 Department of Computer Science and Information Engineering,

More information

Fast Packet Classification Algorithms

Fast Packet Classification Algorithms Fast Packet Classification Algorithms Mrudul Dixit, Anuja Kale, Madhavi Narote, Sneha Talwalkar, and B. V. Barbadekar Abstract A packet classifier possesses a set of rules for classifying packets based

More information

Tree-Based Minimization of TCAM Entries for Packet Classification

Tree-Based Minimization of TCAM Entries for Packet Classification Tree-Based Minimization of TCAM Entries for Packet Classification YanSunandMinSikKim School of Electrical Engineering and Computer Science Washington State University Pullman, Washington 99164-2752, U.S.A.

More information

Towards Effective Packet Classification. J. Li, Y. Qi, and B. Xu Network Security Lab RIIT, Tsinghua University Dec, 2005

Towards Effective Packet Classification. J. Li, Y. Qi, and B. Xu Network Security Lab RIIT, Tsinghua University Dec, 2005 Towards Effective Packet Classification J. Li, Y. Qi, and B. Xu Network Security Lab RIIT, Tsinghua University Dec, 2005 Outline Algorithm Study Understanding Packet Classification Worst-case Complexity

More information

Implementation of Boundary Cutting Algorithm Using Packet Classification

Implementation of Boundary Cutting Algorithm Using Packet Classification Implementation of Boundary Cutting Algorithm Using Packet Classification Dasari Mallesh M.Tech Student Department of CSE Vignana Bharathi Institute of Technology, Hyderabad. ABSTRACT: Decision-tree-based

More information

Hierarchical Intelligent Cuttings: A Dynamic Multi-dimensional Packet Classification Algorithm

Hierarchical Intelligent Cuttings: A Dynamic Multi-dimensional Packet Classification Algorithm 161 CHAPTER 5 Hierarchical Intelligent Cuttings: A Dynamic Multi-dimensional Packet Classification Algorithm 1 Introduction We saw in the previous chapter that real-life classifiers exhibit structure and

More information

Packet Classification Algorithm Based on Geometric Tree by using Recursive Dimensional Cutting (DimCut)

Packet Classification Algorithm Based on Geometric Tree by using Recursive Dimensional Cutting (DimCut) Research Journal of Recent Sciences ISSN 2277-2502 Res.J.Recent Sci. Packet Classification Algorithm Based on Geometric Tree by using Recursive Dimensional Cutting (DimCut) Abstract Hediyeh Amir Jahanshahi

More information

ITTC High-Performance Networking The University of Kansas EECS 881 Packet Switch I/O Processing

ITTC High-Performance Networking The University of Kansas EECS 881 Packet Switch I/O Processing High-Performance Networking The University of Kansas EECS 881 Packet Switch I/O Processing James P.G. Sterbenz Department of Electrical Engineering & Computer Science Information Technology & Telecommunications

More information

Multi-core Implementation of Decomposition-based Packet Classification Algorithms 1

Multi-core Implementation of Decomposition-based Packet Classification Algorithms 1 Multi-core Implementation of Decomposition-based Packet Classification Algorithms 1 Shijie Zhou, Yun R. Qu, and Viktor K. Prasanna Ming Hsieh Department of Electrical Engineering, University of Southern

More information

CS 268: Route Lookup and Packet Classification

CS 268: Route Lookup and Packet Classification Overview CS 268: Route Lookup and Packet Classification Packet Lookup Packet Classification Ion Stoica March 3, 24 istoica@cs.berkeley.edu 2 Lookup Problem Identify the output interface to forward an incoming

More information

AN EFFICIENT HYBRID ALGORITHM FOR MULTIDIMENSIONAL PACKET CLASSIFICATION

AN EFFICIENT HYBRID ALGORITHM FOR MULTIDIMENSIONAL PACKET CLASSIFICATION AN EFFICIENT HYBRID ALGORITHM FOR MULTIDIMENSIONAL PACKET CLASSIFICATION Yaxuan Qi 1 and Jun Li 1,2 1 Research Institute of Information Technology (RIIT), Tsinghua University, Beijing, China, 100084 2

More information

Design of a High Speed FPGA-Based Classifier for Efficient Packet Classification

Design of a High Speed FPGA-Based Classifier for Efficient Packet Classification Design of a High Speed FPGA-Based Classifier for Efficient Packet Classification V.S.Pallavi 1, Dr.D.Rukmani Devi 2 PG Scholar 1, Department of ECE, RMK Engineering College, Chennai, Tamil Nadu, India

More information

TOWARDS EFFECTIVE PACKET CLASSIFICATION

TOWARDS EFFECTIVE PACKET CLASSIFICATION TOWARDS EFFECTIVE PACKET CLASSIFICATION Yaxuan Qi 1 and Jun Li 1, 2 1 Research Institute of Information Technology (RIIT), Tsinghua University, Beijing, China, 100084 2 Tsinghua National Lab for Information

More information

Packet Classification using Rule Caching

Packet Classification using Rule Caching Packet Classification using Rule Caching Nitesh B. Guinde, Roberto Rojas-Cessa and Sotirios G. Ziavras Electrical and Computer Engineering Department New Jersey Institute Technology Newark, NJ 72, USA

More information

Packet Classification Using Standard Access Control List

Packet Classification Using Standard Access Control List Packet Classification Using Standard Access Control List S.Mythrei 1, R.Dharmaraj 2 PG Student, Dept of CSE, Sri Vidya College of engineering and technology, Virudhunagar, Tamilnadu, India 1 Research Scholar,

More information

A Multi Gigabit FPGA-based 5-tuple classification system

A Multi Gigabit FPGA-based 5-tuple classification system A Multi Gigabit FPGA-based 5-tuple classification system Antonis Nikitakis Technical University of Crete, Department of Electronic and Computer Engineering Kounoupidiana, Chania, Crete, GR73100, Greece

More information

Three Different Designs for Packet Classification

Three Different Designs for Packet Classification Three Different Designs for Packet Classification HATAM ABDOLI Computer Department Bu-Ali Sina University Shahid Fahmideh street, Hamadan IRAN abdoli@basu.ac.ir http://www.profs.basu.ac.ir/abdoli Abstract:

More information

Efficient TCAM Encoding Schemes for Packet Classification using Gray Code

Efficient TCAM Encoding Schemes for Packet Classification using Gray Code Efficient TCAM Encoding Schemes for Packet Classification using Gray Code Yeim-Kuan Chang and Cheng-Chien Su Department of Computer Science and Information Engineering National Cheng Kung University Tainan,

More information

Efficient Packet Classification using Splay Tree Models

Efficient Packet Classification using Splay Tree Models 28 IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.5B, May 2006 Efficient Packet Classification using Splay Tree Models Srinivasan.T, Nivedita.M, Mahadevan.V Sri Venkateswara

More information

Selective Boundary Cutting For Packet Classification SOUMYA. K 1, CHANDRA SEKHAR. M 2

Selective Boundary Cutting For Packet Classification SOUMYA. K 1, CHANDRA SEKHAR. M 2 ISSN 2319-8885 Vol.04,Issue.34, August-2015, Pages:6786-6790 www.ijsetr.com SOUMYA. K 1, CHANDRA SEKHAR. M 2 1 Navodaya Institute of Technology, Raichur, Karnataka, India, E-mail: Keerthisree1112@gmail.com.

More information

SSA: A Power and Memory Efficient Scheme to Multi-Match Packet Classification. Fang Yu, T.V. Lakshman, Martin Austin Motoyama, Randy H.

SSA: A Power and Memory Efficient Scheme to Multi-Match Packet Classification. Fang Yu, T.V. Lakshman, Martin Austin Motoyama, Randy H. SSA: A Power and Memory Efficient Scheme to Multi-Match Packet Classification Fang Yu, T.V. Lakshman, Martin Austin Motoyama, Randy H. Katz Presented by: Discussion led by: Sailesh Kumar Packet Classification

More information

All-Match Based Complete Redundancy Removal for Packet Classifiers in TCAMs

All-Match Based Complete Redundancy Removal for Packet Classifiers in TCAMs All-Match Based Complete for Packet Classifiers in TCAMs Alex X Liu Chad R Meiners Yun Zhou Department of Computer Science and Engineering Michigan State University East Lansing, MI 48823, USA {alexliu,

More information

Performance Evaluation and Improvement of Algorithmic Approaches for Packet Classification

Performance Evaluation and Improvement of Algorithmic Approaches for Packet Classification Performance Evaluation and Improvement of Algorithmic Approaches for Packet Classification Yaxuan Qi, Jun Li Research Institute of Information Technology (RIIT) Tsinghua University, Beijing, China, 100084

More information

Packet Classification. George Varghese

Packet Classification. George Varghese Packet Classification George Varghese Original Motivation: Firewalls Firewalls use packet filtering to block say ssh and force access to web and mail via proxies. Still part of defense in depth today.

More information

Grid of Segment Trees for Packet Classification

Grid of Segment Trees for Packet Classification 2010 24th IEEE International Conference on Advanced Information Networking and Applications Grid of Segment Trees for Packet Classification Yeim-Kuan Chang, Yung-Chieh Lin, and Chen-Yu Lin Department of

More information

Recursive Flow Classification: An Algorithm for Packet Classification on Multiple Fields

Recursive Flow Classification: An Algorithm for Packet Classification on Multiple Fields 5 CHAPTER 4 Recursive Flow Classification: An Algorithm for Packet Classification on Multiple Fields Introduction Chapters 2 and 3 described algorithms for routing lookups. In this chapter and the next

More information

Dynamic Routing Tables Using Simple Balanced. Search Trees

Dynamic Routing Tables Using Simple Balanced. Search Trees Dynamic Routing Tables Using Simple Balanced Search Trees Y.-K. Chang and Y.-C. Lin Department of Computer Science and Information Engineering National Cheng Kung University Tainan, Taiwan R.O.C. ykchang@mail.ncku.edu.tw

More information

Routing Lookup Algorithm for IPv6 using Hash Tables

Routing Lookup Algorithm for IPv6 using Hash Tables Routing Lookup Algorithm for IPv6 using Hash Tables Peter Korppoey, John Smith, Department of Electronics Engineering, New Mexico State University-Main Campus Abstract: After analyzing of existing routing

More information

A STUDY & COMPARATIVE EVALUATION OF PACKET CLASSIFICATION ALGORITHMS

A STUDY & COMPARATIVE EVALUATION OF PACKET CLASSIFICATION ALGORITHMS A STUDY & COMPARATIVE EVALUATION OF PACKET CLASSIFICATION ALGORITHMS HEDIYEH AMIRJAHANSHAHI SISTANI Department of Computer Studies and Research, Symbiosis International University, Pune, India Email: hediehamirjahanshahi@yahoo.com

More information

ECE697AA Lecture 21. Packet Classification

ECE697AA Lecture 21. Packet Classification ECE697AA Lecture 21 Routers: Flow Classification Algorithms Tilman Wolf Department of Electrical and Computer Engineering 11/20/08 Packet Classification What is packet classification? Categorization of

More information

Efficient Multi-Match Packet Classification with TCAM

Efficient Multi-Match Packet Classification with TCAM Efficient Multi-Match Packet Classification with Fang Yu and Randy Katz fyu, randy @eecs.berkeley.edu CS Division, EECS Department, U.C.Berkeley Report No. UCB/CSD-4-1316 March 2004 Computer Science Division

More information

A Hybrid Approach to CAM-Based Longest Prefix Matching for IP Route Lookup

A Hybrid Approach to CAM-Based Longest Prefix Matching for IP Route Lookup A Hybrid Approach to CAM-Based Longest Prefix Matching for IP Route Lookup Yan Sun and Min Sik Kim School of Electrical Engineering and Computer Science Washington State University Pullman, Washington

More information

Rule Caching for Packet Classification Support

Rule Caching for Packet Classification Support Rule Caching for Packet Classification Support Joji Philip, Manish Taneja, and Roberto Rojas-Cessa Abstract The growth of the Internet and requirements for enhanced flexibility and versatility have resulted

More information

Trace Driven Simulation of GDSF# and Existing Caching Algorithms for Web Proxy Servers

Trace Driven Simulation of GDSF# and Existing Caching Algorithms for Web Proxy Servers Proceeding of the 9th WSEAS Int. Conference on Data Networks, Communications, Computers, Trinidad and Tobago, November 5-7, 2007 378 Trace Driven Simulation of GDSF# and Existing Caching Algorithms for

More information

Priority Area-based Quad-Tree Packet Classification Algorithm and Its Mathematical Framework

Priority Area-based Quad-Tree Packet Classification Algorithm and Its Mathematical Framework Appl. Math. Inf. Sci. 7, No. 1, 9-20 (2013) 9 Applied Mathematics & Information Sciences An International Journal Priority Area-based Quad-Tree Packet Classification Algorithm and Its Mathematical Framework

More information

Forwarding and Routers : Computer Networking. Original IP Route Lookup. Outline

Forwarding and Routers : Computer Networking. Original IP Route Lookup. Outline Forwarding and Routers 15-744: Computer Networking L-9 Router Algorithms IP lookup Longest prefix matching Classification Flow monitoring Readings [EVF3] Bitmap Algorithms for Active Flows on High Speed

More information

Trie-Based Policy Representations for Network Firewalls

Trie-Based Policy Representations for Network Firewalls Trie-Based Policy Representations for Network Firewalls Errin W. Fulp and Stephen J. Tarsa Wake Forest University Department of Computer Science Winston-Salem, NC, USA nsg.cs.wfu.edu {fulp tarssj2}@wfu.edu

More information

EVERY Internet router today can forward entering Internet

EVERY Internet router today can forward entering Internet 2 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 13, NO. 1, FEBRUARY 2005 Scalable Packet Classification Florin Baboescu and George Varghese, Member, IEEE Abstract Packet classification is important for applications

More information

Scalable Packet Classification for IPv6 by Using Limited TCAMs

Scalable Packet Classification for IPv6 by Using Limited TCAMs Scalable Packet Classification for IPv6 by Using Limited TCAMs Chia-Tai Chan 1, Pi-Chung Wang 1,Shuo-ChengHu 2, Chung-Liang Lee 1,and Rong-Chang Chen 3 1 Telecommunication Laboratories, Chunghwa Telecom

More information

Fast and Reconfigurable Packet Classification Engine in FPGA-Based Firewall

Fast and Reconfigurable Packet Classification Engine in FPGA-Based Firewall 2011 International Conference on Electrical Engineering and Informatics 17-19 July 2011, Bandung, Indonesia Fast and Reconfigurable Packet Classification Engine in FPGA-Based Firewall Arief Wicaksana #1,

More information

Real Time Packet Classification and Analysis based on Bloom Filter for Longest Prefix Matching

Real Time Packet Classification and Analysis based on Bloom Filter for Longest Prefix Matching Real Time Packet Classification and Analysis based on Bloom Filter for Longest Prefix Matching Ms. Namita N. Kothari ME Information Technology2nd, Amrutvahini College of Engineering, Sangamner, India namitakothari8@gmail.com

More information

Memory-Efficient 5D Packet Classification At 40 Gbps

Memory-Efficient 5D Packet Classification At 40 Gbps Memory-Efficient 5D Packet Classification At 40 Gbps Ioannis Papaefstathiou ECE Department, Technical University of Crete, Kounoupidiana, Chania, Crete, GR73100, Greece ygp@ece.tuc.gr Vassilis Papaefstathiou

More information

Packet Classification: From Theory to Practice

Packet Classification: From Theory to Practice Packet Classification: From Theory to Practice Jun Li Most contributions from Yaxuan Qi and many other students of mine Tsinghua Univ., Beijing, China Outline Packet Classification Introduction Review

More information

IP LOOK-UP WITH TIME OR MEMORY GUARANTEE AND LOW UPDATE TIME 1

IP LOOK-UP WITH TIME OR MEMORY GUARANTEE AND LOW UPDATE TIME 1 2005 IEEE International Symposium on Signal Processing and Information Technology IP LOOK-UP WITH TIME OR MEMORY GUARANTEE AND LOW UPDATE TIME 1 G.T. Kousiouris and D.N. Serpanos Dept. of Electrical and

More information

An Enhanced Bloom Filter for Longest Prefix Matching

An Enhanced Bloom Filter for Longest Prefix Matching An Enhanced Bloom Filter for Longest Prefix Matching Gahyun Park SUNY-Geneseo Email: park@geneseo.edu Minseok Kwon Rochester Institute of Technology Email: jmk@cs.rit.edu Abstract A Bloom filter is a succinct

More information

NETWORK SECURITY PROVISION BY MEANS OF ACCESS CONTROL LIST

NETWORK SECURITY PROVISION BY MEANS OF ACCESS CONTROL LIST INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE NETWORK SECURITY PROVISION BY MEANS OF ACCESS CONTROL LIST Chate A.B 1, Chirchi V.R 2 1 PG Student, Dept of CNE, M.B.E.S College

More information

Decision Forest: A Scalable Architecture for Flexible Flow Matching on FPGA

Decision Forest: A Scalable Architecture for Flexible Flow Matching on FPGA Decision Forest: A Scalable Architecture for Flexible Flow Matching on FPGA Weirong Jiang, Viktor K. Prasanna University of Southern California Norio Yamagaki NEC Corporation September 1, 2010 Outline

More information

Design of a Multi-Dimensional Packet Classifier for Network Processors

Design of a Multi-Dimensional Packet Classifier for Network Processors Design of a Multi-Dimensional Packet Classifier for Network Processors Stefano Giordano, Gregorio Procissi, Federico Rossi, Fabio Vitucci Dept. of Information Engineering, University of Pisa, ITALY E-mail:

More information

Performance Evaluation of Cutting Algorithms for the Packet Classification in Next Generation Networks

Performance Evaluation of Cutting Algorithms for the Packet Classification in Next Generation Networks Performance Evaluation of Cutting Algorithms for the Packet Classification in Next Generation Networks Abstract---Packet classification plays an important role in both edge and core routers to provide

More information

FPGA Implementation of Lookup Algorithms

FPGA Implementation of Lookup Algorithms 2011 IEEE 12th International Conference on High Performance Switching and Routing FPGA Implementation of Lookup Algorithms Zoran Chicha, Luka Milinkovic, Aleksandra Smiljanic Department of Telecommunications

More information

Bitmap Intersection Lookup (BIL) : A Packet Classification s Algorithm with Rules Updating

Bitmap Intersection Lookup (BIL) : A Packet Classification s Algorithm with Rules Updating ICCAS25 Bitmap Intersection Lookup (BIL) : A Packet Classification s Algorithm with Rules Updating Akharin Khunkitti*, Nuttachot Promrit** *Faculty of Information Technology, King Mongkut's Institute of

More information

High-Performance Packet Classification on GPU

High-Performance Packet Classification on GPU High-Performance Packet Classification on GPU Shijie Zhou, Shreyas G. Singapura, and Viktor K. Prasanna Ming Hsieh Department of Electrical Engineering University of Southern California 1 Outline Introduction

More information

Algorithms for Packet Classification

Algorithms for Packet Classification Algorithms for Packet Classification Pankaj Gupta and Nick McKeown, Stanford University Abstract The process of categorizing packets into flows in an Internet router is called packet classification. All

More information

MULTI-MATCH PACKET CLASSIFICATION BASED ON DISTRIBUTED HASHTABLE

MULTI-MATCH PACKET CLASSIFICATION BASED ON DISTRIBUTED HASHTABLE International Journal of Science, Environment and Technology, Vol. 4, No 4, 2015, 1098 1106 ISSN 2278-3687 (O) 2277-663X (P) MULTI-MATCH PACKET CLASSIFICATION BASED ON DISTRIBUTED HASHTABLE 1 Neeshma K

More information

Lecture 8 13 March, 2012

Lecture 8 13 March, 2012 6.851: Advanced Data Structures Spring 2012 Prof. Erik Demaine Lecture 8 13 March, 2012 1 From Last Lectures... In the previous lecture, we discussed the External Memory and Cache Oblivious memory models.

More information

Scalable Packet Classification on FPGA

Scalable Packet Classification on FPGA Scalable Packet Classification on FPGA 1 Deepak K. Thakkar, 2 Dr. B. S. Agarkar 1 Student, 2 Professor 1 Electronics and Telecommunication Engineering, 1 Sanjivani college of Engineering, Kopargaon, India.

More information

SINCE the ever increasing dependency on the Internet, there

SINCE the ever increasing dependency on the Internet, there IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 8, NO. 6, DECEMBER 2006 1239 Scalable Packet Classification for Enabling Internet Differentiated Services Pi-Chung Wang, Member, IEEE, Chia-Tai Chan, Chun-Liang Lee,

More information

Decision Forest: A Scalable Architecture for Flexible Flow Matching on FPGA

Decision Forest: A Scalable Architecture for Flexible Flow Matching on FPGA 2010 International Conference on Field Programmable Logic and Applications Decision Forest: A Scalable Architecture for Flexible Flow Matching on FPGA Weirong Jiang, Viktor K. Prasanna Ming Hsieh Department

More information

Web Page Classification using FP Growth Algorithm Akansha Garg,Computer Science Department Swami Vivekanad Subharti University,Meerut, India

Web Page Classification using FP Growth Algorithm Akansha Garg,Computer Science Department Swami Vivekanad Subharti University,Meerut, India Web Page Classification using FP Growth Algorithm Akansha Garg,Computer Science Department Swami Vivekanad Subharti University,Meerut, India Abstract - The primary goal of the web site is to provide the

More information

Performance Based Study of Association Rule Algorithms On Voter DB

Performance Based Study of Association Rule Algorithms On Voter DB Performance Based Study of Association Rule Algorithms On Voter DB K.Padmavathi 1, R.Aruna Kirithika 2 1 Department of BCA, St.Joseph s College, Thiruvalluvar University, Cuddalore, Tamil Nadu, India,

More information

Disjoint Superposition for Reduction of Conjoined Prefixes in IP Lookup for Actual IPv6 Forwarding Tables

Disjoint Superposition for Reduction of Conjoined Prefixes in IP Lookup for Actual IPv6 Forwarding Tables Disjoint Superposition for Reduction of Conjoined Prefixes in IP Lookup for Actual IPv6 Forwarding Tables Roberto Rojas-Cessa, Taweesak Kijkanjanarat, Wara Wangchai, Krutika Patil, Narathip Thirapittayatakul

More information

Multi-Field Range Encoding for Packet Classification in TCAM

Multi-Field Range Encoding for Packet Classification in TCAM This paper was presented as part of the Mini-Conference at IEEE INFOCOM 2011 Multi-Field Range Encoding for Packet Classification in TCAM Yeim-Kuan Chang, Chun-I Lee and Cheng-Chien Su Department of Computer

More information

CS 5114 Network Programming Languages Data Plane. Nate Foster Cornell University Spring 2013

CS 5114 Network Programming Languages Data Plane. Nate Foster Cornell University Spring 2013 CS 5114 Network Programming Languages Data Plane http://www.flickr.com/photos/rofi/2097239111/ Nate Foster Cornell University Spring 2013 Based on lecture notes by Jennifer Rexford and Michael Freedman

More information

Rules in Play: On the Complexity of Routing Tables and Firewalls

Rules in Play: On the Complexity of Routing Tables and Firewalls Rules in Play: On the Complexity of Routing Tables and Firewalls M. Wahdwa, A. Pal, A. Shah, P. Mittal and H. B. Acharya IIIT Delhi, India acharya@iiitd.ac.in arxiv:1510.07880v1 [cs.ni] 27 Oct 2015 Abstract

More information

Systematic Detection And Resolution Of Firewall Policy Anomalies

Systematic Detection And Resolution Of Firewall Policy Anomalies Systematic Detection And Resolution Of Firewall Policy Anomalies 1.M.Madhuri 2.Knvssk Rajesh Dept.of CSE, Kakinada institute of Engineering & Tech., Korangi, kakinada, E.g.dt, AP, India. Abstract: In this

More information

ERFC: An Enhanced Recursive Flow Classification Algorithm

ERFC: An Enhanced Recursive Flow Classification Algorithm Gong XY, Wang WD, Cheng SD. ERFC: An enhanced recursive flow classification algorithm. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 25(5): 958 969 Sept. 2010. DOI 10.1007/s11390-010-1076-5 ERFC: An Enhanced

More information

AN ASSOCIATIVE TERNARY CACHE FOR IP ROUTING. 1. Introduction. 2. Associative Cache Scheme

AN ASSOCIATIVE TERNARY CACHE FOR IP ROUTING. 1. Introduction. 2. Associative Cache Scheme AN ASSOCIATIVE TERNARY CACHE FOR IP ROUTING James J. Rooney 1 José G. Delgado-Frias 2 Douglas H. Summerville 1 1 Dept. of Electrical and Computer Engineering. 2 School of Electrical Engr. and Computer

More information

International Journal of Scientific Research & Engineering Trends Volume 4, Issue 6, Nov-Dec-2018, ISSN (Online): X

International Journal of Scientific Research & Engineering Trends Volume 4, Issue 6, Nov-Dec-2018, ISSN (Online): X Analysis about Classification Techniques on Categorical Data in Data Mining Assistant Professor P. Meena Department of Computer Science Adhiyaman Arts and Science College for Women Uthangarai, Krishnagiri,

More information

Packet Classification via Improved Space Decomposition Techniques

Packet Classification via Improved Space Decomposition Techniques 1 Packet Classification via Improved Space Decomposition Techniques Filippo Geraci, Marco Pellegrini, Paolo Pisati IIT-CNR, Pisa, filippo.geraci,marco.pellegrini,paolo.pisati @iit.cnr.it Luigi Rizzo Dip.Ing.Informazione,

More information

Results and Discussions on Transaction Splitting Technique for Mining Differential Private Frequent Itemsets

Results and Discussions on Transaction Splitting Technique for Mining Differential Private Frequent Itemsets Results and Discussions on Transaction Splitting Technique for Mining Differential Private Frequent Itemsets Sheetal K. Labade Computer Engineering Dept., JSCOE, Hadapsar Pune, India Srinivasa Narasimha

More information

Resource Efficient Multi Ported Sram Based Ternary Content Addressable Memory

Resource Efficient Multi Ported Sram Based Ternary Content Addressable Memory IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 PP 11-18 www.iosrjen.org Resource Efficient Multi Ported Sram Based Ternary Content Addressable Memory S.Parkavi (1) And S.Bharath

More information

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks X. Yuan, R. Melhem and R. Gupta Department of Computer Science University of Pittsburgh Pittsburgh, PA 156 fxyuan,

More information

Report on Cache-Oblivious Priority Queue and Graph Algorithm Applications[1]

Report on Cache-Oblivious Priority Queue and Graph Algorithm Applications[1] Report on Cache-Oblivious Priority Queue and Graph Algorithm Applications[1] Marc André Tanner May 30, 2014 Abstract This report contains two main sections: In section 1 the cache-oblivious computational

More information

Configuring ACLs. ACL overview. ACL categories. ACL numbering and naming

Configuring ACLs. ACL overview. ACL categories. ACL numbering and naming Contents Configuring ACLs 1 ACL overview 1 ACL categories 1 ACL numbering and naming 1 Match order 2 ACL rule numbering 3 Implementing time-based ACL rules 3 IPv4 fragments filtering with ACLs 3 Flow templates

More information

On Distributed Algorithms for Maximizing the Network Lifetime in Wireless Sensor Networks

On Distributed Algorithms for Maximizing the Network Lifetime in Wireless Sensor Networks On Distributed Algorithms for Maximizing the Network Lifetime in Wireless Sensor Networks Akshaye Dhawan Georgia State University Atlanta, Ga 30303 akshaye@cs.gsu.edu Abstract A key challenge in Wireless

More information

Toward Predictable Performance in Decision Tree based Packet Classification Algorithms

Toward Predictable Performance in Decision Tree based Packet Classification Algorithms Toward Predictable Performance in Decision Tree based Packet Classification Algorithms Peng He, Hongtao Guan, Laurent Mathy, Kavé Salamatian Gaogang Xie Institute of Computing Technology, Chinese Academy

More information

Binary Search Schemes for Fast IP Lookups

Binary Search Schemes for Fast IP Lookups 1 Schemes for Fast IP Lookups Pronita Mehrotra, Paul D. Franzon Abstract IP route look up is the most time consuming operation of a router. Route lookup is becoming a very challenging problem due to the

More information

TUPLE PRUNING USING BLOOM FILTERS FOR PACKET CLASSIFICATION

TUPLE PRUNING USING BLOOM FILTERS FOR PACKET CLASSIFICATION ... TUPLE PRUNING USING BLOOM FILTERS FOR PACKET CLASSIFICATION... TUPLE PRUNING FOR PACKET CLASSIFICATION PROVIDES FAST SEARCH AND A LOW IMPLEMENTATION COMPLEXITY. THE TUPLE PRUNING ALGORITHM REDUCES

More information

FRACTAL IMAGE COMPRESSION OF GRAYSCALE AND RGB IMAGES USING DCT WITH QUADTREE DECOMPOSITION AND HUFFMAN CODING. Moheb R. Girgis and Mohammed M.

FRACTAL IMAGE COMPRESSION OF GRAYSCALE AND RGB IMAGES USING DCT WITH QUADTREE DECOMPOSITION AND HUFFMAN CODING. Moheb R. Girgis and Mohammed M. 322 FRACTAL IMAGE COMPRESSION OF GRAYSCALE AND RGB IMAGES USING DCT WITH QUADTREE DECOMPOSITION AND HUFFMAN CODING Moheb R. Girgis and Mohammed M. Talaat Abstract: Fractal image compression (FIC) is a

More information

Data Structures for Packet Classification

Data Structures for Packet Classification Presenter: Patrick Nicholson Department of Computer Science CS840 Topics in Data Structures Outline 1 The Problem 2 Hardware Solutions 3 Data Structures: 1D 4 Trie-Based Solutions Packet Classification

More information

Statistical based Approach for Packet Classification

Statistical based Approach for Packet Classification Statistical based Approach for Packet Classification Dr. Mrudul Dixit 1, Ankita Sanjay Moholkar 2, Sagarika Satish Limaye 2, Devashree Chandrashekhar Limaye 2 Cummins College of engineering for women,

More information

Switch and Router Design. Packet Processing Examples. Packet Processing Examples. Packet Processing Rate 12/14/2011

Switch and Router Design. Packet Processing Examples. Packet Processing Examples. Packet Processing Rate 12/14/2011 // Bottlenecks Memory, memory, 88 - Switch and Router Design Dr. David Hay Ross 8b dhay@cs.huji.ac.il Source: Nick Mckeown, Isaac Keslassy Packet Processing Examples Address Lookup (IP/Ethernet) Where

More information

Fast Firewall Implementations for Software and Hardware-based Routers

Fast Firewall Implementations for Software and Hardware-based Routers Fast Firewall Implementations for Software and Hardware-based Routers Lili Qiu George Varghese Subhash Suri liliq@microsoft.com varghese@cs.ucsd.edu suri@cs.ucsb.edu Microsoft Research University of California,

More information

Fault Localization for Firewall Policies

Fault Localization for Firewall Policies Fault Localization for Firewall Policies JeeHyun Hwang 1 Tao Xie 1 Fei Chen Alex X. Liu 1 Department of Computer Science, North Carolina State University, Raleigh, NC 7695-86 Department of Computer Science

More information

Design and Implementation of A P2P Cooperative Proxy Cache System

Design and Implementation of A P2P Cooperative Proxy Cache System Design and Implementation of A PP Cooperative Proxy Cache System James Z. Wang Vipul Bhulawala Department of Computer Science Clemson University, Box 40974 Clemson, SC 94-0974, USA +1-84--778 {jzwang,

More information

An Efficient Parallel IP Lookup Technique for IPv6 Routers Using Multiple Hashing with Ternary marker storage

An Efficient Parallel IP Lookup Technique for IPv6 Routers Using Multiple Hashing with Ternary marker storage An Efficient Parallel IP Lookup Technique for IPv Routers Using Multiple Hashing with Ternary marker storage P. Kiran Sree Dr. Inampudi Ramesh Babu Mr. P.Kiran Sree,Associate Professor, Department of Computer

More information

ISSN: (Online) Volume 2, Issue 7, July 2014 International Journal of Advance Research in Computer Science and Management Studies

ISSN: (Online) Volume 2, Issue 7, July 2014 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 2, Issue 7, July 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

Firewall Policy Modelling and Anomaly Detection

Firewall Policy Modelling and Anomaly Detection Firewall Policy Modelling and Anomaly Detection 1 Suhail Ahmed 1 Computer Science & Engineering Department, VTU University, SDIT, Mangalore, Karnataka. India Abstract - In this paper an anomaly management

More information

Auto Finding and Resolving Distributed Firewall Policy

Auto Finding and Resolving Distributed Firewall Policy IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 10, Issue 5 (Mar. - Apr. 2013), PP 56-60 Auto Finding and Resolving Distributed Firewall Policy Arunkumar.k 1,

More information

Performance Evaluation of Sequential and Parallel Mining of Association Rules using Apriori Algorithms

Performance Evaluation of Sequential and Parallel Mining of Association Rules using Apriori Algorithms Int. J. Advanced Networking and Applications 458 Performance Evaluation of Sequential and Parallel Mining of Association Rules using Apriori Algorithms Puttegowda D Department of Computer Science, Ghousia

More information

PACKET classification is an enabling function for a variety

PACKET classification is an enabling function for a variety IEEE INFOCOM 5 1 Scalable Packet Classification using Distributed Crossproducting of Field Labels David E. Taylor, Jonathan S. Turner Applied Research Laboratory Washington University in Saint Louis {det3,jst}@arl.wustl.edu

More information

HybridCuts: A Scheme Combining Decomposition and Cutting for Packet Classification

HybridCuts: A Scheme Combining Decomposition and Cutting for Packet Classification 2013 IEEE 21st Annual Symposium on High-Performance Interconnects HybridCuts: A Scheme Combining Decomposition and Cutting for Packet Classification Wenjun Li (liwenjun@sz.pku.edu.cn), Xianfeng Li (lixianfeng@pkusz.edu.cn)

More information

IMPLEMENTATION OF TWIN PRECISION TECHNIQUE FOR MULTIPLICATION

IMPLEMENTATION OF TWIN PRECISION TECHNIQUE FOR MULTIPLICATION IMPLEMENTATION OF TWIN PRECISION TECHNIQUE FOR MULTIPLICATION SUNITH KUMAR BANDI #1, M.VINODH KUMAR *2 # ECE department, M.V.G.R College of Engineering, Vizianagaram, Andhra Pradesh, INDIA. 1 sunithjc@gmail.com

More information

Heuristic Algorithms for Multiconstrained Quality-of-Service Routing

Heuristic Algorithms for Multiconstrained Quality-of-Service Routing 244 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 10, NO 2, APRIL 2002 Heuristic Algorithms for Multiconstrained Quality-of-Service Routing Xin Yuan, Member, IEEE Abstract Multiconstrained quality-of-service

More information

PC-DUOS: Fast TCAM Lookup and Update for Packet Classifiers

PC-DUOS: Fast TCAM Lookup and Update for Packet Classifiers PC-DUOS: Fast TCAM Lookup and Update for Packet Classifiers Tania Mishra and Sartaj Sahni Department of Computer and Information Science and Engineering, University of Florida, Gainesville, FL 326 {tmishra,

More information