DOI: /jos Tel/Fax: by Journal of Software. All rights reserved.
|
|
- Marcus Leo Gaines
- 7 years ago
- Views:
Transcription
1 ISSN , CODEN RUXUEW Journal of Software, Vol17, No9, September 2006, pp http//wwwjosorgcn DOI /jos Tel/Fax by Journal of Software All rights reserved AM-Trie +,, (, ) AM-Trie A Parallel Multidimensional Packet Classification Algorithm Fitting for Network Processor ZHENG Bo +, LIN Chuang, QU Yang (Department of Computer Science and Technology, Tsinghua University, Beijing , China) + Corresponding author Phn , Fax , bzheng@csnet1cstsinghuaeducn Zheng B, Lin C, Qu Y AM-Trie A parallel multidimensional packet classification algorithm fitting for network processor Journal of Software, 2006,17(9) http//wwwjosorgcn/ /17/1949htm Abstract Nowadays, many high speed Internet applications require high speed multidimensional packet classification algorithms Based on the uniqueness of Network Processor, this paper presents a multidimensional classification algorithm AM-Trie (asymmetrical multi-bit trie) AM-Trie is a high speed, parallel and scalable algorithm and very fit for the multi-thread and multi-core feature of the Network Processor A heuristic field division algorithm is also presented, and it is proved theoretically that it can find out the minimum storage cost solution when the height of the AM-Tire is given Finally, a prototype is implemented based on Intel IXP 2400 Network Processor The performance testing result shows that AM-Trie is a high-speed and scalable algorithm; the throughput of the whole system is influenced little by the size of rules and it can reach 25 Gbps wire speed Key words packet classification; network processor; parallel algorithm; multidimensional; AM-Trie, AM-Trie (asymmetrical multi-bit trie, Trie ),,,, AM-Trie, Intel IXP2400,,, 25Gbps ; ; ;AM-Trie TP393 A Supported by the Major Research Plan of the National Natural Science Foundation of China under Grant No ( ); the National Grand Fundamental Research 973 Program of China under Grant No2003CB ( (973)); the Juniper Research Grant (Juniper ); the Intel IXA University Research Plan (Intel IXA ) Received ; Accepted
2 1950 Journal of Software Vol17, No9, September 2006,,,,Internet (best-effort service) QoS(quality of service), ( ) (content-awareness),, (VPNs) (NAT) (IDS) QoS MPLS IPv6,,,Sigcomm,Infocom [1 5],,,, [6 8],, ( TCAM FPGA),, ( ),,, O(DW), D ;W, IPv6, AM-Trie (asymmetrical multi-bit trie, Trie ), AM-Trie ; AM-Trie,,AM-Trie O(d+h),d,h AM-Trie, O(N 2 ),N ; AM-Trie, AM-Trie ( ), ( ), ;, ;,, Intel IXP2400 ( OC48),, TCP/IP 25Gbps ( 64, 5Mpps) 1 2 AM-Trie 3 AM-Trie 4, 5 1 ASIC, (1) (multi-core) [9],, Cisco PXF,Motorola C-5 DCP ;,, Intel IXP,IBM PowerNP Agere PayloadPlus (2), (multi-thread), 0,Intel IXP2400 8, PCIBM PowerNP
3 AM-Trie 1951 (3) DMA,, DMA,,Intel IXP2400 SRAM (4) [10],,,,,,, (multi-core and multi-thread) AM-Trie, 2 AM-Trie, ( ),,Internet, Internet,,, Trie, IPv4 32 Trie (, 32 ),IPv6 128 Trie,, 2 m Trie Trie, Internet CIDR, 0, Trie, 2 ( 1-bit trie), ( 4, 2-bit, ) AM-Trie 1 k-bit, } 1 67 k 8 } k *,0*,1*,,111*,000,,11 k 1 2 k+1 1, 1,2,,2 k+1 1, (k+1)-bit P*,P p-bit, 2 p +P * 1, 1111* 31, k+1 k, Trie AM-Trie 21 AM-Trie,,, (variable stride) AM-Trie AM-Trie,AM-Trie l, h 1,h 2,,h l,,am-trie 2, h w,w AM-Trie,, ;, ;, ( ), ;,, h i l i=1 i = AM-Trie AM-Trie pnext prule
4 1952 Journal of Software Vol17, No9, September 2006,,, 1 1 AM-Trie, 2-bits Table 1 1 A simple policy table Rule Field R0 (default) * R1 0* R2 01* R3 011* R pnext prule Fig1 AM-Trie creation and search 1 AM-Trie 1 R0, (*), 1, R0 1,R1,R2 2 5 R3, 1 (01) 5, 5 2 (1*),R (*) (01*), R2 (*),R4 R5 R3 011*,, R5 R3, R3 R5, AM-Trie, 2 1 *,,, Trie (asymmetrical multi-bit trie, AM-Trie) AM-Trie,, 0110, 1 01( 5), 5, 2 10( 6), 6,, 1*( 3) 3 R3, 1 22 AM-Trie AM-Trie,,, (push) h i
5 AM-Trie 1953, (, 1* 10 11),,AM-Trie *,,, 2(, ) AM-Trie AM-Trie,, O(h),h AM-Trie AM-Trie, AM-Tire AM-Trie, prule ;,, 0, AM-Trie O(h),h AM-Trie pnext prule Fig2 AM-Trie compression 2 AM-Trie 23 AM-Trie, (ABV) [2] d, AM-Trie,AM-Trie ABV, ( ), AND, N d, AM-Trie d AM-Trie h( h<<w), 1 AM-Trie O(Nlog 2 N) AM-Trie O(Nh), (ABV),, O(Nlog 2 N) 2 AM-Trie O(h+d) AM-Trie ABV h, AM-Trie ; ABV d AM-Trie O(h+d) 3 AM-Trie O(N 2 ) n, P N m-bit, 2 m
6 1954 Journal of Software Vol17, No9, September 2006 ( ), [(h 1) N+1] 2 m sizeof(node)+n sizeof(abv),,sizeof(node) (8, );sizeof(abv) (N-bits) AM-Trie O(N 2 ) 2 AM-Trie,AM-Trie,,,,, Table 2 AM-Trie compared with current algorithms 2 AM-Trie Algorithm Time complexity Space complexity Parallel execution RFC [1] O(logN) O(N d ) No ABV [2] O(W+d) O(N 2 ) Yes HyperCut [3] O(logN) O(N d ) No AM-Trie O(h+d) O(N 2 ) Yes 3 AM-Trie AM-Trie,??, [11],,, 3 BGP [12] ,, 24, Percentage Fig Prefix length (bits) The prefix length distribution of a BGP table 3 BGP 31 AM-Trie AM-Trie ( ), AM-Trie R[N,F 1 (W 1 ),F 2 (W 2 ),,F d (W d )] d,,n ;F i (W i ) i W i 1 F(W), 1-bit trie ( trie,binary trie) i i+j multi-bit trie,, multi-bit trie [nodes(i) leaves(i)] 2 j,,nodes(i) leaves(i) 1-bit trie i i, i+j 2 j ; i+1 i+j i, multi-bit trie [nodes(i) leaves(i)] 2 j
7 AM-Trie R F i (W i ) h W, l 1,l 2,,l h (l 1 +l 2 + +l h =W), h AM-Trie, O(h W 2 ) S(x,y) x 1-bit trie y multi-bit trie 4, W 1-bit trie h multi-bit trie m 1-bit trie h 1 multi-bit trie;, W m h h multi-bit trie Level 0 AM-Trie Level h 1 m Binary trie Cost=S(m,h 1) Level h Fig4 W m For each expanded node Cost=2 W m Recursion analysis of fixed stride AM-Trie 1, S( W, h) = 4 AM-Trie min h 1 m W 1 { S( m, h 1) + [ nodes( m) leaves( m)] 2 W m S(W,1)=2 W (2) S 0~W 0~h, h W, O(h W 2 ) W m, (1), [ nodes( m) leaves( m)] 2, leaves(m) m ; (W m) AM-Trie, AM-Trie, 32 AM-Trie AM-Trie ( ),,, 2 R[N,F 1 (W 1 ),F 2 (W 2 ),,F d (W d )] F i (W i ), h W, l n1,l n2,,l nk (l n1 +l n2 + +l nk =W, 1 n N, 1 k h), h AM-Trie, O(N h W 2 ) C(M,r) M, r AM-Trie height(m) M height(m)=0, nodes(s) nodes(m,s), 1-bit trie s M 5, 1-bit Trie h AM-Trie, G AM-Trie 1, h 1 AM-Trie, m C( M, h) = min 2 + C( M, h 1) 1 m 1 + height ( G) M Nodes( G, m+ 1) C(M,1)=2 1+height(M) (4), AM-Trie } (1) (3)
8 1956 Journal of Software Vo l17, No9, September 2006, O(N W 2 k) AM-Trie Level 0 Binary trie m Cost=2 m Level 1 Level h (at most) T 1 Fig5 4 T 2 T n 1 T n Cost=sum of costs of covering T 1 through T n using h 1 levels Recursion analysis of variable stride AM-Trie 5 Trie Intel IXP2400 AM-Trie,8 1, 4 IP, 3, IXIA 1600 IXP2400, 64 TCP/IP ( IP IP TOS ), 6,6 AM-Trie 3,, MHz DDR SDRAM, AM-Trie 10Mpps 6 32~4096,,, 25Gbps(5Mpps) AM-Trie (,AM-Trie 256K ), ; IXP2400 OC48 (25Gbps),AM-Trie IXP2400, ( ), 7 AM-Trie (, 4096,,, O(N 2 ) ),AM-Trie, RAM (FPGA,TCAM ) IXP M SRAM 2G DRAM, AM-Trie Throughput (Mbps) Number of rules Number of rules Fig6 The throughput of AM-Trie on IXP2400 Fig7 The memory cost of AM-Trie on IXP2400 Memory used (Mbytes) 6 IXP2400 AM-Trie 7 IXP2400 AM-Trie Intel IXP2800,, 10Gbps
9 AM-Trie 1957, 10Gbps( 20M pps) 5 Internet ( TCAM FPGA),, AM-Trie ( Trie ), Trie ; AM-Trie, AM-Trie, ;, AM-Trie O(logW),W, O(N 2 ),N, AM-Trie, AM-Trie ( ) (, Intel IXP2400 ( OC48),,AM-Trie TCP/IP 25Gbps ( 64, 5Mpps), ( IXP2800),, RAM References [1] Gupta P, McKeown N Packet classification on multiple fields In Proc of the ACM SIGCOMM http//tiny- terastanfordedu/~nickm/papers/sigcomm99pdf [2] Baboescu F, Varghese G Scalable packet classification In Proc of the ACM SIGCOMM http//wwwcs ucsdedu/groups/sysnet/miscpapers/p2-baboescupdf [3] Singh S, Baboescu F, Varghese G, Wang J Packet classification using multidimensional cutting In Proc of the ACM SIGCOMM http//wwwsigcommorg/sigcomm2003/papers/p213-singhpdf [4] Baboescu SSF, Varghese G Packet classification for core routers Is there an alternative to cams? In Proc of the IEEE INFOCOM [5] Lakshminarayanan ARK, Venkatachary S Algorithms for advanced packet classification with ternary cams In Proc of the ACM SIGCOMM [6] Network processing forum (npf) http//wwwnpforumorg/ [7] Network systems design conference http//wwwnetworkprocessorscom/ [8] Wolf T, Franklin MS Design tradeoffs for embedded network processors In Proc of the ARCS [9] Shah N Understanding network processors Technical Report, 2001 http//wwwgigascaleorg/pubs/338html [10] McAuley AJ, Francis P Fast routing table lookup using CAMs In INFOCOM (3) [11] Srinivasan V, Varghese G Faster IP lookups using controlled prefix expansion In Measurement and Modeling of Computer Systems [12] BGP routing table analysis reports http//bgppotaroonet/ (1978 ),,,,, (1978 ),,,,, (1948 ),,,,CCF,,, Petri,
IP address lookup for Internet routers using cache routing table
ISSN (Print): 1694 0814 35 IP address lookup for Internet routers using cache routing table Houassi Hichem 1 and Bilami Azeddine 2 1 Department of Computer Science, University Center of Khenchela, Algeria
More informationFAST IP ADDRESS LOOKUP ENGINE FOR SOC INTEGRATION
FAST IP ADDRESS LOOKUP ENGINE FOR SOC INTEGRATION Tomas Henriksson Department of Electrical Engineering Linköpings universitet SE-581 83 Linköping tomhe@isy.liu.se Ingrid Verbauwhede UCLA EE Dept 7440B
More informationTrieC: A High-Speed IPv6 Lookup with Fast Updates Using Network Processor
TrieC: High-Speed IPv6 Lookup with Fast Updates Using Network Processor Xianghui Hu 1, Bei Hua 1, and Xinan Tang 2 1 Department of Computer Science and Technology, University of Science and Technology
More informationPacket Classification for Core Routers: Is there an alternative to CAMs?
Packet Classification for Core Routers: Is there an alternative to CAMs? Florin Baboescu, Sumeet Singh, George Varghese Abstract A classifier consists of a set of rules for classifying packets based on
More informationAlgorithms for Advanced Packet Classification with Ternary CAMs
Algorithms for Advanced Packet Classification with Ternary CAMs Karthik Lakshminarayanan UC Berkeley Joint work with Anand Rangarajan and Srinivasan Venkatachary (Cypress Semiconductor) Packet Processing
More informationCHAPTER 5 FINITE STATE MACHINE FOR LOOKUP ENGINE
CHAPTER 5 71 FINITE STATE MACHINE FOR LOOKUP ENGINE 5.1 INTRODUCTION Finite State Machines (FSMs) are important components of digital systems. Therefore, techniques for area efficiency and fast implementation
More informationEfficient IP-Address Lookup with a Shared Forwarding Table for Multiple Virtual Routers
Efficient IP-Address Lookup with a Shared Forwarding Table for Multiple Virtual Routers ABSTRACT Jing Fu KTH, Royal Institute of Technology Stockholm, Sweden jing@kth.se Virtual routers are a promising
More informationHybrid Data Structure for IP Lookup in Virtual Routers Using FPGAs
Hybrid Data Structure for IP Lookup in Virtual Routers Using FPGAs O guzhan Erdem Electrical and Electronics Engineering Middle East Technical University Ankara, TURKEY 68 Email: ogerdem@metu.edu.tr Hoang
More informationOn Constructing Efficient Shared Decision Trees for Multiple Packet Filters
On Constructing Efficient Shared Decision Trees for Multiple Packet Filters Bo Zhang T. S. Eugene Ng Department of Computer Science Rice University Abstract Multiple packet filters serving different purposes
More informationNetworking Virtualization Using FPGAs
Networking Virtualization Using FPGAs Russell Tessier, Deepak Unnikrishnan, Dong Yin, and Lixin Gao Reconfigurable Computing Group Department of Electrical and Computer Engineering University of Massachusetts,
More informationIP Address Lookup Using A Dynamic Hash Function
IP Address Lookup Using A Dynamic Hash Function Xiaojun Nie David J. Wilson Jerome Cornet Gerard Damm Yiqiang Zhao Carleton University Alcatel Alcatel Alcatel Carleton University xnie@math.carleton.ca
More informationMonitoring Large Flows in Network
Monitoring Large Flows in Network Jing Li, Chengchen Hu, Bin Liu Department of Computer Science and Technology, Tsinghua University Beijing, P. R. China, 100084 { l-j02, hucc03 }@mails.tsinghua.edu.cn,
More informationCOMPARISON OF ALGORITHMS FOR DETECTING FIREWALL POLICY ANOMALIES
COMPARISON OF ALGORITHMS FOR DETECTING FIREWALL POLICY ANOMALIES 1 SHILPA KALANTRI, 2 JYOTI JOGLEKAR 1,2 Computer Engineering Department, Shah and Anchor Kutchhi Engineering College, Mumbai, India E-mail:
More informationOptimizing firewall performance
Optimizing firewall performance Anssi Kolehmainen Helsinki University of Technology anssi.kolehmainen@hut.fi Abstract Firewalls are one key factor in network performance. If they can t process their rules
More informationRouting Prefix Caching in Network Processor Design
Routing Prefix Caching in Network Processor Design Huan Liu Department of Electrical Engineering Stanford University, C 9435 huanliu@stanford.edu bstract Cache has been time proven to be a very effective
More informationStateful Inspection Firewall Session Table Processing
International Journal of Information Technology, Vol. 11 No. 2 Xin Li, ZhenZhou Ji, and MingZeng Hu School of Computer Science and Technology Harbin Institute of Technology 92 West Da Zhi St. Harbin, China
More informationScalable Prefix Matching for Internet Packet Forwarding
Scalable Prefix Matching for Internet Packet Forwarding Marcel Waldvogel Computer Engineering and Networks Laboratory Institut für Technische Informatik und Kommunikationsnetze Background Internet growth
More informationFast Address Lookups Using Controlled Prefix Expansion
Fast Address Lookups Using Controlled Prefix Expansion V. SRINIVASAN and G. VARGHESE Washington University in St. Louis Internet (IP) address lookup is a major bottleneck in high-performance routers. IP
More informationChallenges in high speed packet processing
Challenges in high speed packet processing Denis Salopek University of Zagreb, Faculty of Electrical Engineering and Computing, Croatia denis.salopek@fer.hr Abstract With billions of packets traveling
More informationAccelerating network security services with fast packet classification
Computer Communications 27 (2004) 1637 1646 www.elsevier.com/locate/comcom Accelerating network security services with fast packet classification Shiuhpyng Shieh 1, Fu-Yuan Lee 1, *, Ya-Wen Lin 1 Department
More informationA Comparison of Ruleset Feature Independent Packet Classification Engines on FPGA
A Comparison of Ruleset Feature Independent Packet Classification Engines on FPGA Andrea Sanny, Thilan Ganegedara, Viktor K. Prasanna Ming Hsieh Dept. of Electrical Engineering University of Southern California
More informationHigh-Performance IP Service Node with Layer 4 to 7 Packet Processing Features
UDC 621.395.31:681.3 High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features VTsuneo Katsuyama VAkira Hakata VMasafumi Katoh VAkira Takeyama (Manuscript received February 27, 2001)
More informationData Structures For IP Lookup With Bursty Access Patterns
Data Structures For IP Lookup With Bursty Access Patterns Sartaj Sahni & Kun Suk Kim sahni, kskim @cise.ufl.edu Department of Computer and Information Science and Engineering University of Florida, Gainesville,
More informationDRAFT 18-09-2003. 2.1 Gigabit network intrusion detection systems
An Intrusion Detection System for Gigabit Networks (Working paper: describing ongoing work) Gerald Tripp Computing Laboratory, University of Kent. CT2 7NF. UK e-mail: G.E.W.Tripp@kent.ac.uk This draft
More informationContent-Aware Load Balancing using Direct Routing for VOD Streaming Service
Content-Aware Load Balancing using Direct Routing for VOD Streaming Service Young-Hwan Woo, Jin-Wook Chung, Seok-soo Kim Dept. of Computer & Information System, Geo-chang Provincial College, Korea School
More informationFORWARDING of Internet Protocol (IP) packets is the primary. Scalable IP Lookup for Internet Routers
Scalable IP Lookup for Internet Routers David E. Taylor, Jonathan S. Turner, John W. Lockwood, Todd S. Sproull, David B. Parlour Abstract IP address lookup is a central processing function of Internet
More informationAn Algorithm for Performing Routing Lookups in Hardware
31 CHAPTER 2 An Algorithm for Performing Routing Lookups in Hardware 1 Introduction This chapter describes a longest prefix matching algorithm to perform fast IPv4 route lookups in hardware. The chapter
More informationA Scalable Large Format Display Based on Zero Client Processor
International Journal of Electrical and Computer Engineering (IJECE) Vol. 5, No. 4, August 2015, pp. 714~719 ISSN: 2088-8708 714 A Scalable Large Format Display Based on Zero Client Processor Sang Don
More informationHardware Assisted Packet Filtering Firewall
Hardware Assisted Packet Filtering Firewall Shubhash Wasti Department of Computer Science University of Saskatchewan 57 Campus Drive Saskatoon, SK S7N 5A9 Canada email: shw320@cs.usask.ca Supervisor: Ralph
More informationThe Load Balancing System Design of Service Based on IXP2400 Yi Shijun 1, a, Jing Xiaoping 1,b
Advanced Engineering Forum Vol. 1 (2011) pp 42-46 Online: 2011-09-09 (2011) Trans Tech Publications, Switzerland doi:10.4028/www.scientific.net/aef.1.42 The Load Balancing System Design of Service Based
More informationConfigurable String Matching Hardware for Speeding up Intrusion Detection. Monther Aldwairi*, Thomas Conte, Paul Franzon
Configurable String Matching Hardware for Speeding up Intrusion Detection Monther Aldwairi*, Thomas Conte, Paul Franzon Department of Electrical and Computer Engineering, North Carolina State University,
More informationClassifying DDoS packets in high-speed networks
IJCSNS International Journal of Computer Science and Network Security, Vol. 6, No. 2B, February 26 7 Classifying DDoS packets in high-speed networks Yang Xiang and Wanlei Zhou School of Engineering and
More informationInternational Journal of Scientific & Engineering Research, Volume 4, Issue 8, August-2013 1300 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 4, Issue 8, August-2013 1300 Efficient Packet Filtering for Stateful Firewall using the Geometric Efficient Matching Algorithm. Shriya.A.
More informationMPFC: Massively Parallel Firewall Circuits
MPFC: Massively Parallel s Sven Hager Frank Winkler Björn Scheuermann Klaus Reinhardt Computer Engineering Group Humboldt University of Berlin, Germany Email: {hagersve, fwinkler, scheuermann, reinhakl}@informatik.hu-berlin.de
More informationIP Lookups Using Multiway and Multicolumn Search
324 IEEE/ACM TRANSACTIONS NETWORKING, VOL. I, NO. 3, JUNE 1999 IP Lookups Using Multiway and Multicolumn Search Butler Lampson, Venkatachary Srinivasan, and George Varghese, Associate Member, IEEE Abstract-
More informationMonitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX
Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX Martin Elich 1,3, Matěj Grégr 1,2 and Pavel Čeleda1,3 1 CESNET, z.s.p.o., Prague, Czech Republic 2 Brno University of Technology,
More informationScalable High-Speed Prefix Matching
Scalable High-Speed Prefix Matching MARCEL WALDVOGEL IBM Zurich Research Laboratory GEORGE VARGHESE University of California, San Diego JON TURNER Washington University in St. Louis and BERNHARD PLATTNER
More informationSteve Worrall Systems Engineer. sworrall@foundrynet.com
Steve Worrall Systems Engineer sworrall@foundrynet.com Agenda 100GbE Load sharing/link aggregation Foundry Direct Routing 2 100 Gigabit Ethernet 3 Current Status PAR approved, 802.3ba task force set up
More information1. Memory technology & Hierarchy
1. Memory technology & Hierarchy RAM types Advances in Computer Architecture Andy D. Pimentel Memory wall Memory wall = divergence between CPU and RAM speed We can increase bandwidth by introducing concurrency
More informationQuantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand
More informationVLSM and CIDR Malin Bornhager Halmstad University
VLSM and CIDR Malin Bornhager Halmstad University Session Number 2002, Svenska-CNAP Halmstad University 1 Objectives Classless routing VLSM Example of a VLSM calculation 2 Classless routing CIDR (Classless
More informationECE 578 Term Paper Network Security through IP packet Filtering
ECE 578 Term Paper Network Security through IP packet Filtering Cheedu Venugopal Reddy Dept of Electrical Eng and Comp science Oregon State University Bin Cao Dept of electrical Eng and Comp science Oregon
More informationAn Architecture for Parallelizing Network Monitoring Based on Multi-Core Processors
Journal of Convergence Information Technology, Volume 6, Number 4. April An Architecture for Parallelizing Network Monitoring Based on Multi-Core Processors Chuan Xu, Weiren Shi, Qingyu Xiong, First Author
More informationSBSCET, Firozpur (Punjab), India
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based
More informationNetwork Layer: Network Layer and IP Protocol
1 Network Layer: Network Layer and IP Protocol Required reading: Garcia 7.3.3, 8.1, 8.2.1 CSE 3213, Winter 2010 Instructor: N. Vlajic 2 1. Introduction 2. Router Architecture 3. Network Layer Protocols
More informationOpen Flow Controller and Switch Datasheet
Open Flow Controller and Switch Datasheet California State University Chico Alan Braithwaite Spring 2013 Block Diagram Figure 1. High Level Block Diagram The project will consist of a network development
More informationResearch on Video Traffic Control Technology Based on SDN. Ziyan Lin
Joint International Mechanical, Electronic and Information Technology Conference (JIMET 2015) Research on Video Traffic Control Technology Based on SDN Ziyan Lin Communication University of China, Beijing
More informationSecurity-Aware Beacon Based Network Monitoring
Security-Aware Beacon Based Network Monitoring Masahiro Sasaki, Liang Zhao, Hiroshi Nagamochi Graduate School of Informatics, Kyoto University, Kyoto, Japan Email: {sasaki, liang, nag}@amp.i.kyoto-u.ac.jp
More informationReducing the Size of Rule Set in a Firewall
Reducing the Size of Rule Set in a Firewall MyungKeun Yoon Shigang Chen Zhan Zhang Department of Computer & Information Science & Engineering University of Florida, Gainesville, FL 32611, USA 352 392 2713
More informationComparative Analysis of Packet Filtering Algorithms with Implementation
Research Journal of Recent Sciences ISSN 2277-2502. Comparative Analysis of Packet Filtering Algorithms with Implementation Abstract Hediyeh Amir Jahanshahi Sistani 1, Sayyed Mehdi Poustchi Amin 2 and
More informationMAXIMIZING RESTORABLE THROUGHPUT IN MPLS NETWORKS
MAXIMIZING RESTORABLE THROUGHPUT IN MPLS NETWORKS 1 M.LAKSHMI, 2 N.LAKSHMI 1 Assitant Professor, Dept.of.Computer science, MCC college.pattukottai. 2 Research Scholar, Dept.of.Computer science, MCC college.pattukottai.
More informationOn the Design of Next-Generation Routers and IP Networks JING FU
On the Design of Next-Generation Routers and IP Networks JING FU Doctoral Thesis Stockholm, Sweden, 2008 TRITA-EE 2008:040 ISSN 1653-5146 School of Electrical Engineering KTH, Stockholm, Sweden Akademisk
More informationFactors to Consider When Designing a Network
Quality of Service Routing for Supporting Multimedia Applications Zheng Wang and Jon Crowcroft Department of Computer Science, University College London Gower Street, London WC1E 6BT, United Kingdom ABSTRACT
More informationTHe Internet provides a critical infrastructure for a
IEEE TRANSACTIONS ON COMPUTERS, VOL. XX, NO. X, MONTH 2012 1 Reconfigurable Data Planes for Scalable Network Virtualization Deepak Unnikrishnan, Ramakrishna Vadlamani, Yong Liao, Jérémie Crenne, Lixin
More informationAn Adaptive Load Balancing to Provide Quality of Service
An Adaptive Load Balancing to Provide Quality of Service 1 Zahra Vali, 2 Massoud Reza Hashemi, 3 Neda Moghim *1, Isfahan University of Technology, Isfahan, Iran 2, Isfahan University of Technology, Isfahan,
More informationQuality of Service Routing Network and Performance Evaluation*
Quality of Service Routing Network and Performance Evaluation* Shen Lin, Cui Yong, Xu Ming-wei, and Xu Ke Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 {shenlin, cy, xmw,
More informationAdvanced IP Addressing
Advanced IP Addressing CS-765 A Aspects Of Systems Administration Spring-2005 Instructure: Jan Schauman Stevens Institute Of Technology, NJ. Prepared By: Modh, Jay A. M.S. NIS SID: 999-14-0352 Date: 05/02/2005
More informationExam 1 Review Questions
CSE 473 Introduction to Computer Networks Exam 1 Review Questions Jon Turner 10/2013 1. A user in St. Louis, connected to the internet via a 20 Mb/s (b=bits) connection retrieves a 250 KB (B=bytes) web
More informationHow Router Technology Shapes Inter-Cloud Computing Service Architecture for The Future Internet
How Router Technology Shapes Inter-Cloud Computing Service Architecture for The Future Internet Professor Jiann-Liang Chen Friday, September 23, 2011 Wireless Networks and Evolutional Communications Laboratory
More informationPerformance of Host Identity Protocol on Nokia Internet Tablet
Performance of Host Identity Protocol on Nokia Internet Tablet Andrey Khurri Helsinki Institute for Information Technology HIP Research Group IETF 68 Prague March 23, 2007
More informationHardware Router s Lookup Machine and its Formal Verification
Hardware Router s Lookup Machine and its Formal Verification David Antoš Faculty of Informatics, Masaryk University Brno, Botanická 68a, Brno 602 00 Czech Republic Email: antos@liberouter.org Jan Kořenek
More informationDemartek June 2012. Broadcom FCoE/iSCSI and IP Networking Adapter Evaluation. Introduction. Evaluation Environment
June 212 FCoE/iSCSI and IP Networking Adapter Evaluation Evaluation report prepared under contract with Corporation Introduction Enterprises are moving towards 1 Gigabit networking infrastructures and
More informationThe Research and Application of Multi-Firewall Technology in Enterprise Network Security
, pp. 53-6 http://dx.doi.org/0.457/ijsia.05.9.5.6 The Research and Application of Multi-Firewall Technology in Enterprise Network Security Jing Li College of Information Engineering, Qingdao University,
More informationDEVELOPMENT OF SMART FIREWALL LOAD BALANCING FRAMEWORK FOR MULTIPLE FIREWALLS WITH AN EFFICIENT HEURISTIC FIREWALL RULE SET
DEVELOPMENT OF SMART FIREWALL LOAD BALANCING FRAMEWORK FOR MULTIPLE FIREWALLS WITH AN EFFICIENT HEURISTIC FIREWALL RULE SET 1 R. BALA KRISHNAN, 2 Dr. N. K. SAKTHIVEL 1 School of Computing, SASTRA University,
More informationTCP/IP Basis. OSI Model
TCP/IP Basis 高 雄 大 學 資 訊 工 程 學 系 嚴 力 行 Source OSI Model Destination Application Presentation Session Transport Network Data-Link Physical ENCAPSULATION DATA SEGMENT PACKET FRAME BITS 0101010101010101010
More informationTraffic-Adaptive Packet Filtering of Denial of Service Attacks
Traffic-Adaptive Packet Filtering of Denial of Service Attacks Lukas Kencl, Christian Schwarzer Intel Research JJ Thomson Avenue, Cambridge, CB FD, United Kingdom {lukas.kencl, christian.schwarzer}@intel.com
More informationArchitecture of distributed network processors: specifics of application in information security systems
Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia vlad@neva.ru 1. Introduction Modern
More informationStandards-Based NPU/Switch Fabric Devices for Next-Generation Multi-Service Platforms
P244_Borgioli_Paper page 1 of 9 Standards-Based NPU/ Fabric Devices for Next-Generation Multi-Service Platforms Richard Borgioli and Raffaele Noro, Vitesse Semiconductor Ho Wang, Intel Corp ABSTRACT The
More informationParallel Firewalls on General-Purpose Graphics Processing Units
Parallel Firewalls on General-Purpose Graphics Processing Units Manoj Singh Gaur and Vijay Laxmi Kamal Chandra Reddy, Ankit Tharwani, Ch.Vamshi Krishna, Lakshminarayanan.V Department of Computer Engineering
More informationDesign Patterns for Packet Processing Applications on Multi-core Intel Architecture Processors
White Paper Cristian F. Dumitrescu Software Engineer Intel Corporation Design Patterns for Packet Processing Applications on Multi-core Intel Architecture Processors December 2008 321058 Executive Summary
More informationIP Video Rendering Basics
CohuHD offers a broad line of High Definition network based cameras, positioning systems and VMS solutions designed for the performance requirements associated with critical infrastructure applications.
More informationImplementation of Wireless Gateway for Smart Home
Communications and Network, 2013, 5, 16-20 doi:10.4236/cn.2013.51b005 Published Online February 2013 (http://www.scirp.org/journal/cn) Implementation of Wireless Gateway for Smart Home Yepeng Ni 1, Fang
More informationChoosing Routers for the Campus
Choosing Routers for the Campus Network Startup Resource Center These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)
More informationIPStash: A Set-Associative Memory Approach for Efficient IP-lookup
IPStash: A Set-Associative Memory Approach for Efficient IP-lookup Stefanos Kaxiras Department of Electrical and Computer Engineering University of Patras, Greece kaxiras@ee.upatras.gr Georgios Keramidas
More informationEfficient Filter Construction for Access Control in Firewalls
Efficient Filter Construction for Access Control in Firewalls Gopinath C.B Vinoda A.M Department of Computer science and Engineering Department of Master of Computer Applications, Government Engineering
More informationDistributed Consistency Method and Two-Phase Locking in Cloud Storage over Multiple Data Centers
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 15, No 6 Special Issue on Logistics, Informatics and Service Science Sofia 2015 Print ISSN: 1311-9702; Online ISSN: 1314-4081
More informationFPGA-based Router Virtualization: A Power Perspective
2012 IEEE 2012 26th IEEE International 26th International Parallel Parallel and Distributed and Distributed Processing Processing Symposium Symposium Workshops Workshops & PhD Forum FPGA-based Router Virtualization:
More informationInternet Protocols Fall 2005. Lectures 7-8 Andreas Terzis
Internet Protocols Fall 2005 Lectures 7-8 Andreas Terzis Outline Internet Protocol Service Model Fragmentation Addressing Original addressing scheme Subnetting CIDR Forwarding ICMP ARP Address Shortage
More informationAlgorithms and Architectures for Network Search Processors, Doctoral Dissertation, August 2006
Department of Computer Science & Engineering 26-43 Algorithms and Architectures for Network Search Processors, Doctoral Dissertation, August 26 Authors: Sarang Dharmapurikar Corresponding Author: sarang@arl.wustl.edu
More informationPERFORMANCE AND FLEXIBILITY OF OPEN SOURCE ROUTING SOFTWARE 1
PERFORMANCE AND FLEXIBILITY OF OPEN SOURCE ROUTING SOFTWARE 1 V. Eramo, M. Listanti, A. Cianfrani, E. Cipollone University of Roma La Sapienza, INFOCOM Dept. Abstract- Routing protocols are a critical
More informationPerformance Evaluation of Linux Bridge
Performance Evaluation of Linux Bridge James T. Yu School of Computer Science, Telecommunications, and Information System (CTI) DePaul University ABSTRACT This paper studies a unique network feature, Ethernet
More informationSOLVING HIGH-SPEED MEMORY INTERFACE CHALLENGES WITH LOW-COST FPGAS
SOLVING HIGH-SPEED MEMORY INTERFACE CHALLENGES WITH LOW-COST FPGAS A Lattice Semiconductor White Paper May 2005 Lattice Semiconductor 5555 Northeast Moore Ct. Hillsboro, Oregon 97124 USA Telephone: (503)
More informationImplementation of Full -Parallelism AES Encryption and Decryption
Implementation of Full -Parallelism AES Encryption and Decryption M.Anto Merline M.E-Commuication Systems, ECE Department K.Ramakrishnan College of Engineering-Samayapuram, Trichy. Abstract-Advanced Encryption
More informationEFFICIENT DATA STRUCTURES FOR LOCAL INCONSISTENCY DETECTION IN FIREWALL ACL UPDATES
EFFICIENT DATA STRUCTURES FOR LOCAL INCONSISTENCY DETECTION IN FIREWALL ACL UPDATES S. Pozo, R. M. Gasca, F. de la Rosa T. Department of Computer Languages and Systems,Computer Engineering College, University
More information7a. System-on-chip design and prototyping platforms
7a. System-on-chip design and prototyping platforms Labros Bisdounis, Ph.D. Department of Computer and Communication Engineering 1 What is System-on-Chip (SoC)? System-on-chip is an integrated circuit
More informationYarrp ing the Internet
Yarrp ing the Internet Robert Beverly Naval Postgraduate School February 12, 2016 Active Internet Measurements (AIMS) Workshop R. Beverly (NPS) Yarrp AIMS 2016 1 / 17 Motivation Active Topology Probing
More informationPerformance Evaluation of VoIP using Shortest-Widest and Modified Widest-Shortest QoS Routing Algorithms
Performance Evaluation of VoIP using Shortest-Widest and Modified Widest-Shortest QoS Routing Algorithms Ala F. Khalifeh, and Ali H. El-Mousa Abstract Implementation of current real time services (of which
More informationBuilding MPLS VPNs with QoS Routing Capability i
Building MPLS VPNs with QoS Routing Capability i Peng Zhang, Raimo Kantola Laboratory of Telecommunication Technology, Helsinki University of Technology Otakaari 5A, Espoo, FIN-02015, Finland Tel: +358
More informationAnalysis on Virtualization Technologies in Cloud
Analysis on Virtualization Technologies in Cloud 1 V RaviTeja Kanakala, V.Krishna Reddy, K.Thirupathi Rao 1 Research Scholar, Department of CSE, KL University, Vaddeswaram, India I. Abstract Virtualization
More informationMPLS VPN in Cellular Mobile IPv6 Architectures(04##017)
MPLS VPN in Cellular Mobile IPv6 Architectures(04##017) Yao-Chung Chang, Han-Chieh Chao, K.M. Liu and T. G. Tsuei* Department of Electrical Engineering, National Dong Hwa University Hualien, Taiwan, Republic
More informationA 10-Gbps High-Speed Single-Chip Network Intrusion Detection and Prevention System
A 0-Gbps High-Speed Single-Chip Network Intrusion Detection and Prevention System N. Sertac Artan, Rajdip Ghosh, Yanchuan Guo, and H. Jonathan Chao Department of Electrical and Computer Engineering Polytechnic
More informationWelcome to the Dawn of Open-Source Networking. Linux IP Routers Bob Gilligan gilligan@vyatta.com
Welcome to the Dawn of Open-Source Networking. Linux IP Routers Bob Gilligan gilligan@vyatta.com Outline About Vyatta: Open source project, and software product Areas we re working on or interested in
More informationA Load Balancing Method in SiCo Hierarchical DHT-based P2P Network
1 Shuang Kai, 2 Qu Zheng *1, Shuang Kai Beijing University of Posts and Telecommunications, shuangk@bupt.edu.cn 2, Qu Zheng Beijing University of Posts and Telecommunications, buptquzheng@gmail.com Abstract
More informationHigh-Speed Policy-based Packet Forwarding Using Efficient Multi-dimensional Range Matching
High-Speed Policy-based Packet Forwarding Using Efficient Multi-dimensional Range Matching T.V. Lakshman and D. Stiliadis Bell Laboratories 101 Crawfords Corner Rd. HolmdeP, NJ 07733 {lakshman, stiliadi
More informationCLOUDDMSS: CLOUD-BASED DISTRIBUTED MULTIMEDIA STREAMING SERVICE SYSTEM FOR HETEROGENEOUS DEVICES
CLOUDDMSS: CLOUD-BASED DISTRIBUTED MULTIMEDIA STREAMING SERVICE SYSTEM FOR HETEROGENEOUS DEVICES 1 MYOUNGJIN KIM, 2 CUI YUN, 3 SEUNGHO HAN, 4 HANKU LEE 1,2,3,4 Department of Internet & Multimedia Engineering,
More informationAn Efficient Load Balancing Technology in CDN
Issue 2, Volume 1, 2007 92 An Efficient Load Balancing Technology in CDN YUN BAI 1, BO JIA 2, JIXIANG ZHANG 3, QIANGGUO PU 1, NIKOS MASTORAKIS 4 1 College of Information and Electronic Engineering, University
More informationWASHINGTON UNIVERSITY THE HENRY EDWIN SEVER GRADUATE SCHOOL DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING ABSTRACT
WASHINGTON UNIVERSITY THE HENRY EDWIN SEVER GRADUATE SCHOOL DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING ABSTRACT HIGH PERFORMANCE PACKET CLASSIFICATION by Edward W. Spitznagel ADVISOR: Professor Jonathan
More informationIMPLEMENTATION OF FPGA CARD IN CONTENT FILTERING SOLUTIONS FOR SECURING COMPUTER NETWORKS. Received May 2010; accepted July 2010
ICIC Express Letters Part B: Applications ICIC International c 2010 ISSN 2185-2766 Volume 1, Number 1, September 2010 pp. 71 76 IMPLEMENTATION OF FPGA CARD IN CONTENT FILTERING SOLUTIONS FOR SECURING COMPUTER
More informationAdaptive Early Packet Filtering for Defending Firewalls against DoS Attacks
Adaptive Early Packet Filtering for Defending Firewalls against DoS Attacks Adel El-Atawy, Ehab Al-Shaer School of Computing DePaul University Chicago, Illinois, USA Email: {aelatawy,ehab}@cs.depaul.edu
More informationResearch of TCP ssthresh Dynamical Adjustment Algorithm Based on Available Bandwidth in Mixed Networks
Research of TCP ssthresh Dynamical Adjustment Algorithm Based on Available Bandwidth in Mixed Networks 1 Wang Zhanjie, 2 Zhang Yunyang 1, First Author Department of Computer Science,Dalian University of
More information