DOI: /jos Tel/Fax: by Journal of Software. All rights reserved.

Size: px
Start display at page:

Download "DOI: /jos Tel/Fax: by Journal of Software. All rights reserved."

Transcription

1 ISSN , CODEN RUXUEW Journal of Software, Vol17, No9, September 2006, pp http//wwwjosorgcn DOI /jos Tel/Fax by Journal of Software All rights reserved AM-Trie +,, (, ) AM-Trie A Parallel Multidimensional Packet Classification Algorithm Fitting for Network Processor ZHENG Bo +, LIN Chuang, QU Yang (Department of Computer Science and Technology, Tsinghua University, Beijing , China) + Corresponding author Phn , Fax , bzheng@csnet1cstsinghuaeducn Zheng B, Lin C, Qu Y AM-Trie A parallel multidimensional packet classification algorithm fitting for network processor Journal of Software, 2006,17(9) http//wwwjosorgcn/ /17/1949htm Abstract Nowadays, many high speed Internet applications require high speed multidimensional packet classification algorithms Based on the uniqueness of Network Processor, this paper presents a multidimensional classification algorithm AM-Trie (asymmetrical multi-bit trie) AM-Trie is a high speed, parallel and scalable algorithm and very fit for the multi-thread and multi-core feature of the Network Processor A heuristic field division algorithm is also presented, and it is proved theoretically that it can find out the minimum storage cost solution when the height of the AM-Tire is given Finally, a prototype is implemented based on Intel IXP 2400 Network Processor The performance testing result shows that AM-Trie is a high-speed and scalable algorithm; the throughput of the whole system is influenced little by the size of rules and it can reach 25 Gbps wire speed Key words packet classification; network processor; parallel algorithm; multidimensional; AM-Trie, AM-Trie (asymmetrical multi-bit trie, Trie ),,,, AM-Trie, Intel IXP2400,,, 25Gbps ; ; ;AM-Trie TP393 A Supported by the Major Research Plan of the National Natural Science Foundation of China under Grant No ( ); the National Grand Fundamental Research 973 Program of China under Grant No2003CB ( (973)); the Juniper Research Grant (Juniper ); the Intel IXA University Research Plan (Intel IXA ) Received ; Accepted

2 1950 Journal of Software Vol17, No9, September 2006,,,,Internet (best-effort service) QoS(quality of service), ( ) (content-awareness),, (VPNs) (NAT) (IDS) QoS MPLS IPv6,,,Sigcomm,Infocom [1 5],,,, [6 8],, ( TCAM FPGA),, ( ),,, O(DW), D ;W, IPv6, AM-Trie (asymmetrical multi-bit trie, Trie ), AM-Trie ; AM-Trie,,AM-Trie O(d+h),d,h AM-Trie, O(N 2 ),N ; AM-Trie, AM-Trie ( ), ( ), ;, ;,, Intel IXP2400 ( OC48),, TCP/IP 25Gbps ( 64, 5Mpps) 1 2 AM-Trie 3 AM-Trie 4, 5 1 ASIC, (1) (multi-core) [9],, Cisco PXF,Motorola C-5 DCP ;,, Intel IXP,IBM PowerNP Agere PayloadPlus (2), (multi-thread), 0,Intel IXP2400 8, PCIBM PowerNP

3 AM-Trie 1951 (3) DMA,, DMA,,Intel IXP2400 SRAM (4) [10],,,,,,, (multi-core and multi-thread) AM-Trie, 2 AM-Trie, ( ),,Internet, Internet,,, Trie, IPv4 32 Trie (, 32 ),IPv6 128 Trie,, 2 m Trie Trie, Internet CIDR, 0, Trie, 2 ( 1-bit trie), ( 4, 2-bit, ) AM-Trie 1 k-bit, } 1 67 k 8 } k *,0*,1*,,111*,000,,11 k 1 2 k+1 1, 1,2,,2 k+1 1, (k+1)-bit P*,P p-bit, 2 p +P * 1, 1111* 31, k+1 k, Trie AM-Trie 21 AM-Trie,,, (variable stride) AM-Trie AM-Trie,AM-Trie l, h 1,h 2,,h l,,am-trie 2, h w,w AM-Trie,, ;, ;, ( ), ;,, h i l i=1 i = AM-Trie AM-Trie pnext prule

4 1952 Journal of Software Vol17, No9, September 2006,,, 1 1 AM-Trie, 2-bits Table 1 1 A simple policy table Rule Field R0 (default) * R1 0* R2 01* R3 011* R pnext prule Fig1 AM-Trie creation and search 1 AM-Trie 1 R0, (*), 1, R0 1,R1,R2 2 5 R3, 1 (01) 5, 5 2 (1*),R (*) (01*), R2 (*),R4 R5 R3 011*,, R5 R3, R3 R5, AM-Trie, 2 1 *,,, Trie (asymmetrical multi-bit trie, AM-Trie) AM-Trie,, 0110, 1 01( 5), 5, 2 10( 6), 6,, 1*( 3) 3 R3, 1 22 AM-Trie AM-Trie,,, (push) h i

5 AM-Trie 1953, (, 1* 10 11),,AM-Trie *,,, 2(, ) AM-Trie AM-Trie,, O(h),h AM-Trie AM-Trie, AM-Tire AM-Trie, prule ;,, 0, AM-Trie O(h),h AM-Trie pnext prule Fig2 AM-Trie compression 2 AM-Trie 23 AM-Trie, (ABV) [2] d, AM-Trie,AM-Trie ABV, ( ), AND, N d, AM-Trie d AM-Trie h( h<<w), 1 AM-Trie O(Nlog 2 N) AM-Trie O(Nh), (ABV),, O(Nlog 2 N) 2 AM-Trie O(h+d) AM-Trie ABV h, AM-Trie ; ABV d AM-Trie O(h+d) 3 AM-Trie O(N 2 ) n, P N m-bit, 2 m

6 1954 Journal of Software Vol17, No9, September 2006 ( ), [(h 1) N+1] 2 m sizeof(node)+n sizeof(abv),,sizeof(node) (8, );sizeof(abv) (N-bits) AM-Trie O(N 2 ) 2 AM-Trie,AM-Trie,,,,, Table 2 AM-Trie compared with current algorithms 2 AM-Trie Algorithm Time complexity Space complexity Parallel execution RFC [1] O(logN) O(N d ) No ABV [2] O(W+d) O(N 2 ) Yes HyperCut [3] O(logN) O(N d ) No AM-Trie O(h+d) O(N 2 ) Yes 3 AM-Trie AM-Trie,??, [11],,, 3 BGP [12] ,, 24, Percentage Fig Prefix length (bits) The prefix length distribution of a BGP table 3 BGP 31 AM-Trie AM-Trie ( ), AM-Trie R[N,F 1 (W 1 ),F 2 (W 2 ),,F d (W d )] d,,n ;F i (W i ) i W i 1 F(W), 1-bit trie ( trie,binary trie) i i+j multi-bit trie,, multi-bit trie [nodes(i) leaves(i)] 2 j,,nodes(i) leaves(i) 1-bit trie i i, i+j 2 j ; i+1 i+j i, multi-bit trie [nodes(i) leaves(i)] 2 j

7 AM-Trie R F i (W i ) h W, l 1,l 2,,l h (l 1 +l 2 + +l h =W), h AM-Trie, O(h W 2 ) S(x,y) x 1-bit trie y multi-bit trie 4, W 1-bit trie h multi-bit trie m 1-bit trie h 1 multi-bit trie;, W m h h multi-bit trie Level 0 AM-Trie Level h 1 m Binary trie Cost=S(m,h 1) Level h Fig4 W m For each expanded node Cost=2 W m Recursion analysis of fixed stride AM-Trie 1, S( W, h) = 4 AM-Trie min h 1 m W 1 { S( m, h 1) + [ nodes( m) leaves( m)] 2 W m S(W,1)=2 W (2) S 0~W 0~h, h W, O(h W 2 ) W m, (1), [ nodes( m) leaves( m)] 2, leaves(m) m ; (W m) AM-Trie, AM-Trie, 32 AM-Trie AM-Trie ( ),,, 2 R[N,F 1 (W 1 ),F 2 (W 2 ),,F d (W d )] F i (W i ), h W, l n1,l n2,,l nk (l n1 +l n2 + +l nk =W, 1 n N, 1 k h), h AM-Trie, O(N h W 2 ) C(M,r) M, r AM-Trie height(m) M height(m)=0, nodes(s) nodes(m,s), 1-bit trie s M 5, 1-bit Trie h AM-Trie, G AM-Trie 1, h 1 AM-Trie, m C( M, h) = min 2 + C( M, h 1) 1 m 1 + height ( G) M Nodes( G, m+ 1) C(M,1)=2 1+height(M) (4), AM-Trie } (1) (3)

8 1956 Journal of Software Vo l17, No9, September 2006, O(N W 2 k) AM-Trie Level 0 Binary trie m Cost=2 m Level 1 Level h (at most) T 1 Fig5 4 T 2 T n 1 T n Cost=sum of costs of covering T 1 through T n using h 1 levels Recursion analysis of variable stride AM-Trie 5 Trie Intel IXP2400 AM-Trie,8 1, 4 IP, 3, IXIA 1600 IXP2400, 64 TCP/IP ( IP IP TOS ), 6,6 AM-Trie 3,, MHz DDR SDRAM, AM-Trie 10Mpps 6 32~4096,,, 25Gbps(5Mpps) AM-Trie (,AM-Trie 256K ), ; IXP2400 OC48 (25Gbps),AM-Trie IXP2400, ( ), 7 AM-Trie (, 4096,,, O(N 2 ) ),AM-Trie, RAM (FPGA,TCAM ) IXP M SRAM 2G DRAM, AM-Trie Throughput (Mbps) Number of rules Number of rules Fig6 The throughput of AM-Trie on IXP2400 Fig7 The memory cost of AM-Trie on IXP2400 Memory used (Mbytes) 6 IXP2400 AM-Trie 7 IXP2400 AM-Trie Intel IXP2800,, 10Gbps

9 AM-Trie 1957, 10Gbps( 20M pps) 5 Internet ( TCAM FPGA),, AM-Trie ( Trie ), Trie ; AM-Trie, AM-Trie, ;, AM-Trie O(logW),W, O(N 2 ),N, AM-Trie, AM-Trie ( ) (, Intel IXP2400 ( OC48),,AM-Trie TCP/IP 25Gbps ( 64, 5Mpps), ( IXP2800),, RAM References [1] Gupta P, McKeown N Packet classification on multiple fields In Proc of the ACM SIGCOMM http//tiny- terastanfordedu/~nickm/papers/sigcomm99pdf [2] Baboescu F, Varghese G Scalable packet classification In Proc of the ACM SIGCOMM http//wwwcs ucsdedu/groups/sysnet/miscpapers/p2-baboescupdf [3] Singh S, Baboescu F, Varghese G, Wang J Packet classification using multidimensional cutting In Proc of the ACM SIGCOMM http//wwwsigcommorg/sigcomm2003/papers/p213-singhpdf [4] Baboescu SSF, Varghese G Packet classification for core routers Is there an alternative to cams? In Proc of the IEEE INFOCOM [5] Lakshminarayanan ARK, Venkatachary S Algorithms for advanced packet classification with ternary cams In Proc of the ACM SIGCOMM [6] Network processing forum (npf) http//wwwnpforumorg/ [7] Network systems design conference http//wwwnetworkprocessorscom/ [8] Wolf T, Franklin MS Design tradeoffs for embedded network processors In Proc of the ARCS [9] Shah N Understanding network processors Technical Report, 2001 http//wwwgigascaleorg/pubs/338html [10] McAuley AJ, Francis P Fast routing table lookup using CAMs In INFOCOM (3) [11] Srinivasan V, Varghese G Faster IP lookups using controlled prefix expansion In Measurement and Modeling of Computer Systems [12] BGP routing table analysis reports http//bgppotaroonet/ (1978 ),,,,, (1978 ),,,,, (1948 ),,,,CCF,,, Petri,

IP address lookup for Internet routers using cache routing table

IP address lookup for Internet routers using cache routing table ISSN (Print): 1694 0814 35 IP address lookup for Internet routers using cache routing table Houassi Hichem 1 and Bilami Azeddine 2 1 Department of Computer Science, University Center of Khenchela, Algeria

More information

FAST IP ADDRESS LOOKUP ENGINE FOR SOC INTEGRATION

FAST IP ADDRESS LOOKUP ENGINE FOR SOC INTEGRATION FAST IP ADDRESS LOOKUP ENGINE FOR SOC INTEGRATION Tomas Henriksson Department of Electrical Engineering Linköpings universitet SE-581 83 Linköping tomhe@isy.liu.se Ingrid Verbauwhede UCLA EE Dept 7440B

More information

TrieC: A High-Speed IPv6 Lookup with Fast Updates Using Network Processor

TrieC: A High-Speed IPv6 Lookup with Fast Updates Using Network Processor TrieC: High-Speed IPv6 Lookup with Fast Updates Using Network Processor Xianghui Hu 1, Bei Hua 1, and Xinan Tang 2 1 Department of Computer Science and Technology, University of Science and Technology

More information

Packet Classification for Core Routers: Is there an alternative to CAMs?

Packet Classification for Core Routers: Is there an alternative to CAMs? Packet Classification for Core Routers: Is there an alternative to CAMs? Florin Baboescu, Sumeet Singh, George Varghese Abstract A classifier consists of a set of rules for classifying packets based on

More information

Algorithms for Advanced Packet Classification with Ternary CAMs

Algorithms for Advanced Packet Classification with Ternary CAMs Algorithms for Advanced Packet Classification with Ternary CAMs Karthik Lakshminarayanan UC Berkeley Joint work with Anand Rangarajan and Srinivasan Venkatachary (Cypress Semiconductor) Packet Processing

More information

CHAPTER 5 FINITE STATE MACHINE FOR LOOKUP ENGINE

CHAPTER 5 FINITE STATE MACHINE FOR LOOKUP ENGINE CHAPTER 5 71 FINITE STATE MACHINE FOR LOOKUP ENGINE 5.1 INTRODUCTION Finite State Machines (FSMs) are important components of digital systems. Therefore, techniques for area efficiency and fast implementation

More information

Efficient IP-Address Lookup with a Shared Forwarding Table for Multiple Virtual Routers

Efficient IP-Address Lookup with a Shared Forwarding Table for Multiple Virtual Routers Efficient IP-Address Lookup with a Shared Forwarding Table for Multiple Virtual Routers ABSTRACT Jing Fu KTH, Royal Institute of Technology Stockholm, Sweden jing@kth.se Virtual routers are a promising

More information

Hybrid Data Structure for IP Lookup in Virtual Routers Using FPGAs

Hybrid Data Structure for IP Lookup in Virtual Routers Using FPGAs Hybrid Data Structure for IP Lookup in Virtual Routers Using FPGAs O guzhan Erdem Electrical and Electronics Engineering Middle East Technical University Ankara, TURKEY 68 Email: ogerdem@metu.edu.tr Hoang

More information

On Constructing Efficient Shared Decision Trees for Multiple Packet Filters

On Constructing Efficient Shared Decision Trees for Multiple Packet Filters On Constructing Efficient Shared Decision Trees for Multiple Packet Filters Bo Zhang T. S. Eugene Ng Department of Computer Science Rice University Abstract Multiple packet filters serving different purposes

More information

Networking Virtualization Using FPGAs

Networking Virtualization Using FPGAs Networking Virtualization Using FPGAs Russell Tessier, Deepak Unnikrishnan, Dong Yin, and Lixin Gao Reconfigurable Computing Group Department of Electrical and Computer Engineering University of Massachusetts,

More information

IP Address Lookup Using A Dynamic Hash Function

IP Address Lookup Using A Dynamic Hash Function IP Address Lookup Using A Dynamic Hash Function Xiaojun Nie David J. Wilson Jerome Cornet Gerard Damm Yiqiang Zhao Carleton University Alcatel Alcatel Alcatel Carleton University xnie@math.carleton.ca

More information

Monitoring Large Flows in Network

Monitoring Large Flows in Network Monitoring Large Flows in Network Jing Li, Chengchen Hu, Bin Liu Department of Computer Science and Technology, Tsinghua University Beijing, P. R. China, 100084 { l-j02, hucc03 }@mails.tsinghua.edu.cn,

More information

COMPARISON OF ALGORITHMS FOR DETECTING FIREWALL POLICY ANOMALIES

COMPARISON OF ALGORITHMS FOR DETECTING FIREWALL POLICY ANOMALIES COMPARISON OF ALGORITHMS FOR DETECTING FIREWALL POLICY ANOMALIES 1 SHILPA KALANTRI, 2 JYOTI JOGLEKAR 1,2 Computer Engineering Department, Shah and Anchor Kutchhi Engineering College, Mumbai, India E-mail:

More information

Optimizing firewall performance

Optimizing firewall performance Optimizing firewall performance Anssi Kolehmainen Helsinki University of Technology anssi.kolehmainen@hut.fi Abstract Firewalls are one key factor in network performance. If they can t process their rules

More information

Routing Prefix Caching in Network Processor Design

Routing Prefix Caching in Network Processor Design Routing Prefix Caching in Network Processor Design Huan Liu Department of Electrical Engineering Stanford University, C 9435 huanliu@stanford.edu bstract Cache has been time proven to be a very effective

More information

Stateful Inspection Firewall Session Table Processing

Stateful Inspection Firewall Session Table Processing International Journal of Information Technology, Vol. 11 No. 2 Xin Li, ZhenZhou Ji, and MingZeng Hu School of Computer Science and Technology Harbin Institute of Technology 92 West Da Zhi St. Harbin, China

More information

Scalable Prefix Matching for Internet Packet Forwarding

Scalable Prefix Matching for Internet Packet Forwarding Scalable Prefix Matching for Internet Packet Forwarding Marcel Waldvogel Computer Engineering and Networks Laboratory Institut für Technische Informatik und Kommunikationsnetze Background Internet growth

More information

Fast Address Lookups Using Controlled Prefix Expansion

Fast Address Lookups Using Controlled Prefix Expansion Fast Address Lookups Using Controlled Prefix Expansion V. SRINIVASAN and G. VARGHESE Washington University in St. Louis Internet (IP) address lookup is a major bottleneck in high-performance routers. IP

More information

Challenges in high speed packet processing

Challenges in high speed packet processing Challenges in high speed packet processing Denis Salopek University of Zagreb, Faculty of Electrical Engineering and Computing, Croatia denis.salopek@fer.hr Abstract With billions of packets traveling

More information

Accelerating network security services with fast packet classification

Accelerating network security services with fast packet classification Computer Communications 27 (2004) 1637 1646 www.elsevier.com/locate/comcom Accelerating network security services with fast packet classification Shiuhpyng Shieh 1, Fu-Yuan Lee 1, *, Ya-Wen Lin 1 Department

More information

A Comparison of Ruleset Feature Independent Packet Classification Engines on FPGA

A Comparison of Ruleset Feature Independent Packet Classification Engines on FPGA A Comparison of Ruleset Feature Independent Packet Classification Engines on FPGA Andrea Sanny, Thilan Ganegedara, Viktor K. Prasanna Ming Hsieh Dept. of Electrical Engineering University of Southern California

More information

High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features

High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features UDC 621.395.31:681.3 High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features VTsuneo Katsuyama VAkira Hakata VMasafumi Katoh VAkira Takeyama (Manuscript received February 27, 2001)

More information

Data Structures For IP Lookup With Bursty Access Patterns

Data Structures For IP Lookup With Bursty Access Patterns Data Structures For IP Lookup With Bursty Access Patterns Sartaj Sahni & Kun Suk Kim sahni, kskim @cise.ufl.edu Department of Computer and Information Science and Engineering University of Florida, Gainesville,

More information

DRAFT 18-09-2003. 2.1 Gigabit network intrusion detection systems

DRAFT 18-09-2003. 2.1 Gigabit network intrusion detection systems An Intrusion Detection System for Gigabit Networks (Working paper: describing ongoing work) Gerald Tripp Computing Laboratory, University of Kent. CT2 7NF. UK e-mail: G.E.W.Tripp@kent.ac.uk This draft

More information

Content-Aware Load Balancing using Direct Routing for VOD Streaming Service

Content-Aware Load Balancing using Direct Routing for VOD Streaming Service Content-Aware Load Balancing using Direct Routing for VOD Streaming Service Young-Hwan Woo, Jin-Wook Chung, Seok-soo Kim Dept. of Computer & Information System, Geo-chang Provincial College, Korea School

More information

FORWARDING of Internet Protocol (IP) packets is the primary. Scalable IP Lookup for Internet Routers

FORWARDING of Internet Protocol (IP) packets is the primary. Scalable IP Lookup for Internet Routers Scalable IP Lookup for Internet Routers David E. Taylor, Jonathan S. Turner, John W. Lockwood, Todd S. Sproull, David B. Parlour Abstract IP address lookup is a central processing function of Internet

More information

An Algorithm for Performing Routing Lookups in Hardware

An Algorithm for Performing Routing Lookups in Hardware 31 CHAPTER 2 An Algorithm for Performing Routing Lookups in Hardware 1 Introduction This chapter describes a longest prefix matching algorithm to perform fast IPv4 route lookups in hardware. The chapter

More information

A Scalable Large Format Display Based on Zero Client Processor

A Scalable Large Format Display Based on Zero Client Processor International Journal of Electrical and Computer Engineering (IJECE) Vol. 5, No. 4, August 2015, pp. 714~719 ISSN: 2088-8708 714 A Scalable Large Format Display Based on Zero Client Processor Sang Don

More information

Hardware Assisted Packet Filtering Firewall

Hardware Assisted Packet Filtering Firewall Hardware Assisted Packet Filtering Firewall Shubhash Wasti Department of Computer Science University of Saskatchewan 57 Campus Drive Saskatoon, SK S7N 5A9 Canada email: shw320@cs.usask.ca Supervisor: Ralph

More information

The Load Balancing System Design of Service Based on IXP2400 Yi Shijun 1, a, Jing Xiaoping 1,b

The Load Balancing System Design of Service Based on IXP2400 Yi Shijun 1, a, Jing Xiaoping 1,b Advanced Engineering Forum Vol. 1 (2011) pp 42-46 Online: 2011-09-09 (2011) Trans Tech Publications, Switzerland doi:10.4028/www.scientific.net/aef.1.42 The Load Balancing System Design of Service Based

More information

Configurable String Matching Hardware for Speeding up Intrusion Detection. Monther Aldwairi*, Thomas Conte, Paul Franzon

Configurable String Matching Hardware for Speeding up Intrusion Detection. Monther Aldwairi*, Thomas Conte, Paul Franzon Configurable String Matching Hardware for Speeding up Intrusion Detection Monther Aldwairi*, Thomas Conte, Paul Franzon Department of Electrical and Computer Engineering, North Carolina State University,

More information

Classifying DDoS packets in high-speed networks

Classifying DDoS packets in high-speed networks IJCSNS International Journal of Computer Science and Network Security, Vol. 6, No. 2B, February 26 7 Classifying DDoS packets in high-speed networks Yang Xiang and Wanlei Zhou School of Engineering and

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 8, August-2013 1300 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 4, Issue 8, August-2013 1300 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 4, Issue 8, August-2013 1300 Efficient Packet Filtering for Stateful Firewall using the Geometric Efficient Matching Algorithm. Shriya.A.

More information

MPFC: Massively Parallel Firewall Circuits

MPFC: Massively Parallel Firewall Circuits MPFC: Massively Parallel s Sven Hager Frank Winkler Björn Scheuermann Klaus Reinhardt Computer Engineering Group Humboldt University of Berlin, Germany Email: {hagersve, fwinkler, scheuermann, reinhakl}@informatik.hu-berlin.de

More information

IP Lookups Using Multiway and Multicolumn Search

IP Lookups Using Multiway and Multicolumn Search 324 IEEE/ACM TRANSACTIONS NETWORKING, VOL. I, NO. 3, JUNE 1999 IP Lookups Using Multiway and Multicolumn Search Butler Lampson, Venkatachary Srinivasan, and George Varghese, Associate Member, IEEE Abstract-

More information

Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX

Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX Martin Elich 1,3, Matěj Grégr 1,2 and Pavel Čeleda1,3 1 CESNET, z.s.p.o., Prague, Czech Republic 2 Brno University of Technology,

More information

Scalable High-Speed Prefix Matching

Scalable High-Speed Prefix Matching Scalable High-Speed Prefix Matching MARCEL WALDVOGEL IBM Zurich Research Laboratory GEORGE VARGHESE University of California, San Diego JON TURNER Washington University in St. Louis and BERNHARD PLATTNER

More information

Steve Worrall Systems Engineer. sworrall@foundrynet.com

Steve Worrall Systems Engineer. sworrall@foundrynet.com Steve Worrall Systems Engineer sworrall@foundrynet.com Agenda 100GbE Load sharing/link aggregation Foundry Direct Routing 2 100 Gigabit Ethernet 3 Current Status PAR approved, 802.3ba task force set up

More information

1. Memory technology & Hierarchy

1. Memory technology & Hierarchy 1. Memory technology & Hierarchy RAM types Advances in Computer Architecture Andy D. Pimentel Memory wall Memory wall = divergence between CPU and RAM speed We can increase bandwidth by introducing concurrency

More information

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand

More information

VLSM and CIDR Malin Bornhager Halmstad University

VLSM and CIDR Malin Bornhager Halmstad University VLSM and CIDR Malin Bornhager Halmstad University Session Number 2002, Svenska-CNAP Halmstad University 1 Objectives Classless routing VLSM Example of a VLSM calculation 2 Classless routing CIDR (Classless

More information

ECE 578 Term Paper Network Security through IP packet Filtering

ECE 578 Term Paper Network Security through IP packet Filtering ECE 578 Term Paper Network Security through IP packet Filtering Cheedu Venugopal Reddy Dept of Electrical Eng and Comp science Oregon State University Bin Cao Dept of electrical Eng and Comp science Oregon

More information

An Architecture for Parallelizing Network Monitoring Based on Multi-Core Processors

An Architecture for Parallelizing Network Monitoring Based on Multi-Core Processors Journal of Convergence Information Technology, Volume 6, Number 4. April An Architecture for Parallelizing Network Monitoring Based on Multi-Core Processors Chuan Xu, Weiren Shi, Qingyu Xiong, First Author

More information

SBSCET, Firozpur (Punjab), India

SBSCET, Firozpur (Punjab), India Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based

More information

Network Layer: Network Layer and IP Protocol

Network Layer: Network Layer and IP Protocol 1 Network Layer: Network Layer and IP Protocol Required reading: Garcia 7.3.3, 8.1, 8.2.1 CSE 3213, Winter 2010 Instructor: N. Vlajic 2 1. Introduction 2. Router Architecture 3. Network Layer Protocols

More information

Open Flow Controller and Switch Datasheet

Open Flow Controller and Switch Datasheet Open Flow Controller and Switch Datasheet California State University Chico Alan Braithwaite Spring 2013 Block Diagram Figure 1. High Level Block Diagram The project will consist of a network development

More information

Research on Video Traffic Control Technology Based on SDN. Ziyan Lin

Research on Video Traffic Control Technology Based on SDN. Ziyan Lin Joint International Mechanical, Electronic and Information Technology Conference (JIMET 2015) Research on Video Traffic Control Technology Based on SDN Ziyan Lin Communication University of China, Beijing

More information

Security-Aware Beacon Based Network Monitoring

Security-Aware Beacon Based Network Monitoring Security-Aware Beacon Based Network Monitoring Masahiro Sasaki, Liang Zhao, Hiroshi Nagamochi Graduate School of Informatics, Kyoto University, Kyoto, Japan Email: {sasaki, liang, nag}@amp.i.kyoto-u.ac.jp

More information

Reducing the Size of Rule Set in a Firewall

Reducing the Size of Rule Set in a Firewall Reducing the Size of Rule Set in a Firewall MyungKeun Yoon Shigang Chen Zhan Zhang Department of Computer & Information Science & Engineering University of Florida, Gainesville, FL 32611, USA 352 392 2713

More information

Comparative Analysis of Packet Filtering Algorithms with Implementation

Comparative Analysis of Packet Filtering Algorithms with Implementation Research Journal of Recent Sciences ISSN 2277-2502. Comparative Analysis of Packet Filtering Algorithms with Implementation Abstract Hediyeh Amir Jahanshahi Sistani 1, Sayyed Mehdi Poustchi Amin 2 and

More information

MAXIMIZING RESTORABLE THROUGHPUT IN MPLS NETWORKS

MAXIMIZING RESTORABLE THROUGHPUT IN MPLS NETWORKS MAXIMIZING RESTORABLE THROUGHPUT IN MPLS NETWORKS 1 M.LAKSHMI, 2 N.LAKSHMI 1 Assitant Professor, Dept.of.Computer science, MCC college.pattukottai. 2 Research Scholar, Dept.of.Computer science, MCC college.pattukottai.

More information

On the Design of Next-Generation Routers and IP Networks JING FU

On the Design of Next-Generation Routers and IP Networks JING FU On the Design of Next-Generation Routers and IP Networks JING FU Doctoral Thesis Stockholm, Sweden, 2008 TRITA-EE 2008:040 ISSN 1653-5146 School of Electrical Engineering KTH, Stockholm, Sweden Akademisk

More information

Factors to Consider When Designing a Network

Factors to Consider When Designing a Network Quality of Service Routing for Supporting Multimedia Applications Zheng Wang and Jon Crowcroft Department of Computer Science, University College London Gower Street, London WC1E 6BT, United Kingdom ABSTRACT

More information

THe Internet provides a critical infrastructure for a

THe Internet provides a critical infrastructure for a IEEE TRANSACTIONS ON COMPUTERS, VOL. XX, NO. X, MONTH 2012 1 Reconfigurable Data Planes for Scalable Network Virtualization Deepak Unnikrishnan, Ramakrishna Vadlamani, Yong Liao, Jérémie Crenne, Lixin

More information

An Adaptive Load Balancing to Provide Quality of Service

An Adaptive Load Balancing to Provide Quality of Service An Adaptive Load Balancing to Provide Quality of Service 1 Zahra Vali, 2 Massoud Reza Hashemi, 3 Neda Moghim *1, Isfahan University of Technology, Isfahan, Iran 2, Isfahan University of Technology, Isfahan,

More information

Quality of Service Routing Network and Performance Evaluation*

Quality of Service Routing Network and Performance Evaluation* Quality of Service Routing Network and Performance Evaluation* Shen Lin, Cui Yong, Xu Ming-wei, and Xu Ke Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 {shenlin, cy, xmw,

More information

Advanced IP Addressing

Advanced IP Addressing Advanced IP Addressing CS-765 A Aspects Of Systems Administration Spring-2005 Instructure: Jan Schauman Stevens Institute Of Technology, NJ. Prepared By: Modh, Jay A. M.S. NIS SID: 999-14-0352 Date: 05/02/2005

More information

Exam 1 Review Questions

Exam 1 Review Questions CSE 473 Introduction to Computer Networks Exam 1 Review Questions Jon Turner 10/2013 1. A user in St. Louis, connected to the internet via a 20 Mb/s (b=bits) connection retrieves a 250 KB (B=bytes) web

More information

How Router Technology Shapes Inter-Cloud Computing Service Architecture for The Future Internet

How Router Technology Shapes Inter-Cloud Computing Service Architecture for The Future Internet How Router Technology Shapes Inter-Cloud Computing Service Architecture for The Future Internet Professor Jiann-Liang Chen Friday, September 23, 2011 Wireless Networks and Evolutional Communications Laboratory

More information

Performance of Host Identity Protocol on Nokia Internet Tablet

Performance of Host Identity Protocol on Nokia Internet Tablet Performance of Host Identity Protocol on Nokia Internet Tablet Andrey Khurri Helsinki Institute for Information Technology HIP Research Group IETF 68 Prague March 23, 2007

More information

Hardware Router s Lookup Machine and its Formal Verification

Hardware Router s Lookup Machine and its Formal Verification Hardware Router s Lookup Machine and its Formal Verification David Antoš Faculty of Informatics, Masaryk University Brno, Botanická 68a, Brno 602 00 Czech Republic Email: antos@liberouter.org Jan Kořenek

More information

Demartek June 2012. Broadcom FCoE/iSCSI and IP Networking Adapter Evaluation. Introduction. Evaluation Environment

Demartek June 2012. Broadcom FCoE/iSCSI and IP Networking Adapter Evaluation. Introduction. Evaluation Environment June 212 FCoE/iSCSI and IP Networking Adapter Evaluation Evaluation report prepared under contract with Corporation Introduction Enterprises are moving towards 1 Gigabit networking infrastructures and

More information

The Research and Application of Multi-Firewall Technology in Enterprise Network Security

The Research and Application of Multi-Firewall Technology in Enterprise Network Security , pp. 53-6 http://dx.doi.org/0.457/ijsia.05.9.5.6 The Research and Application of Multi-Firewall Technology in Enterprise Network Security Jing Li College of Information Engineering, Qingdao University,

More information

DEVELOPMENT OF SMART FIREWALL LOAD BALANCING FRAMEWORK FOR MULTIPLE FIREWALLS WITH AN EFFICIENT HEURISTIC FIREWALL RULE SET

DEVELOPMENT OF SMART FIREWALL LOAD BALANCING FRAMEWORK FOR MULTIPLE FIREWALLS WITH AN EFFICIENT HEURISTIC FIREWALL RULE SET DEVELOPMENT OF SMART FIREWALL LOAD BALANCING FRAMEWORK FOR MULTIPLE FIREWALLS WITH AN EFFICIENT HEURISTIC FIREWALL RULE SET 1 R. BALA KRISHNAN, 2 Dr. N. K. SAKTHIVEL 1 School of Computing, SASTRA University,

More information

TCP/IP Basis. OSI Model

TCP/IP Basis. OSI Model TCP/IP Basis 高 雄 大 學 資 訊 工 程 學 系 嚴 力 行 Source OSI Model Destination Application Presentation Session Transport Network Data-Link Physical ENCAPSULATION DATA SEGMENT PACKET FRAME BITS 0101010101010101010

More information

Traffic-Adaptive Packet Filtering of Denial of Service Attacks

Traffic-Adaptive Packet Filtering of Denial of Service Attacks Traffic-Adaptive Packet Filtering of Denial of Service Attacks Lukas Kencl, Christian Schwarzer Intel Research JJ Thomson Avenue, Cambridge, CB FD, United Kingdom {lukas.kencl, christian.schwarzer}@intel.com

More information

Architecture of distributed network processors: specifics of application in information security systems

Architecture of distributed network processors: specifics of application in information security systems Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia vlad@neva.ru 1. Introduction Modern

More information

Standards-Based NPU/Switch Fabric Devices for Next-Generation Multi-Service Platforms

Standards-Based NPU/Switch Fabric Devices for Next-Generation Multi-Service Platforms P244_Borgioli_Paper page 1 of 9 Standards-Based NPU/ Fabric Devices for Next-Generation Multi-Service Platforms Richard Borgioli and Raffaele Noro, Vitesse Semiconductor Ho Wang, Intel Corp ABSTRACT The

More information

Parallel Firewalls on General-Purpose Graphics Processing Units

Parallel Firewalls on General-Purpose Graphics Processing Units Parallel Firewalls on General-Purpose Graphics Processing Units Manoj Singh Gaur and Vijay Laxmi Kamal Chandra Reddy, Ankit Tharwani, Ch.Vamshi Krishna, Lakshminarayanan.V Department of Computer Engineering

More information

Design Patterns for Packet Processing Applications on Multi-core Intel Architecture Processors

Design Patterns for Packet Processing Applications on Multi-core Intel Architecture Processors White Paper Cristian F. Dumitrescu Software Engineer Intel Corporation Design Patterns for Packet Processing Applications on Multi-core Intel Architecture Processors December 2008 321058 Executive Summary

More information

IP Video Rendering Basics

IP Video Rendering Basics CohuHD offers a broad line of High Definition network based cameras, positioning systems and VMS solutions designed for the performance requirements associated with critical infrastructure applications.

More information

Implementation of Wireless Gateway for Smart Home

Implementation of Wireless Gateway for Smart Home Communications and Network, 2013, 5, 16-20 doi:10.4236/cn.2013.51b005 Published Online February 2013 (http://www.scirp.org/journal/cn) Implementation of Wireless Gateway for Smart Home Yepeng Ni 1, Fang

More information

Choosing Routers for the Campus

Choosing Routers for the Campus Choosing Routers for the Campus Network Startup Resource Center These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)

More information

IPStash: A Set-Associative Memory Approach for Efficient IP-lookup

IPStash: A Set-Associative Memory Approach for Efficient IP-lookup IPStash: A Set-Associative Memory Approach for Efficient IP-lookup Stefanos Kaxiras Department of Electrical and Computer Engineering University of Patras, Greece kaxiras@ee.upatras.gr Georgios Keramidas

More information

Efficient Filter Construction for Access Control in Firewalls

Efficient Filter Construction for Access Control in Firewalls Efficient Filter Construction for Access Control in Firewalls Gopinath C.B Vinoda A.M Department of Computer science and Engineering Department of Master of Computer Applications, Government Engineering

More information

Distributed Consistency Method and Two-Phase Locking in Cloud Storage over Multiple Data Centers

Distributed Consistency Method and Two-Phase Locking in Cloud Storage over Multiple Data Centers BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 15, No 6 Special Issue on Logistics, Informatics and Service Science Sofia 2015 Print ISSN: 1311-9702; Online ISSN: 1314-4081

More information

FPGA-based Router Virtualization: A Power Perspective

FPGA-based Router Virtualization: A Power Perspective 2012 IEEE 2012 26th IEEE International 26th International Parallel Parallel and Distributed and Distributed Processing Processing Symposium Symposium Workshops Workshops & PhD Forum FPGA-based Router Virtualization:

More information

Internet Protocols Fall 2005. Lectures 7-8 Andreas Terzis

Internet Protocols Fall 2005. Lectures 7-8 Andreas Terzis Internet Protocols Fall 2005 Lectures 7-8 Andreas Terzis Outline Internet Protocol Service Model Fragmentation Addressing Original addressing scheme Subnetting CIDR Forwarding ICMP ARP Address Shortage

More information

Algorithms and Architectures for Network Search Processors, Doctoral Dissertation, August 2006

Algorithms and Architectures for Network Search Processors, Doctoral Dissertation, August 2006 Department of Computer Science & Engineering 26-43 Algorithms and Architectures for Network Search Processors, Doctoral Dissertation, August 26 Authors: Sarang Dharmapurikar Corresponding Author: sarang@arl.wustl.edu

More information

PERFORMANCE AND FLEXIBILITY OF OPEN SOURCE ROUTING SOFTWARE 1

PERFORMANCE AND FLEXIBILITY OF OPEN SOURCE ROUTING SOFTWARE 1 PERFORMANCE AND FLEXIBILITY OF OPEN SOURCE ROUTING SOFTWARE 1 V. Eramo, M. Listanti, A. Cianfrani, E. Cipollone University of Roma La Sapienza, INFOCOM Dept. Abstract- Routing protocols are a critical

More information

Performance Evaluation of Linux Bridge

Performance Evaluation of Linux Bridge Performance Evaluation of Linux Bridge James T. Yu School of Computer Science, Telecommunications, and Information System (CTI) DePaul University ABSTRACT This paper studies a unique network feature, Ethernet

More information

SOLVING HIGH-SPEED MEMORY INTERFACE CHALLENGES WITH LOW-COST FPGAS

SOLVING HIGH-SPEED MEMORY INTERFACE CHALLENGES WITH LOW-COST FPGAS SOLVING HIGH-SPEED MEMORY INTERFACE CHALLENGES WITH LOW-COST FPGAS A Lattice Semiconductor White Paper May 2005 Lattice Semiconductor 5555 Northeast Moore Ct. Hillsboro, Oregon 97124 USA Telephone: (503)

More information

Implementation of Full -Parallelism AES Encryption and Decryption

Implementation of Full -Parallelism AES Encryption and Decryption Implementation of Full -Parallelism AES Encryption and Decryption M.Anto Merline M.E-Commuication Systems, ECE Department K.Ramakrishnan College of Engineering-Samayapuram, Trichy. Abstract-Advanced Encryption

More information

EFFICIENT DATA STRUCTURES FOR LOCAL INCONSISTENCY DETECTION IN FIREWALL ACL UPDATES

EFFICIENT DATA STRUCTURES FOR LOCAL INCONSISTENCY DETECTION IN FIREWALL ACL UPDATES EFFICIENT DATA STRUCTURES FOR LOCAL INCONSISTENCY DETECTION IN FIREWALL ACL UPDATES S. Pozo, R. M. Gasca, F. de la Rosa T. Department of Computer Languages and Systems,Computer Engineering College, University

More information

7a. System-on-chip design and prototyping platforms

7a. System-on-chip design and prototyping platforms 7a. System-on-chip design and prototyping platforms Labros Bisdounis, Ph.D. Department of Computer and Communication Engineering 1 What is System-on-Chip (SoC)? System-on-chip is an integrated circuit

More information

Yarrp ing the Internet

Yarrp ing the Internet Yarrp ing the Internet Robert Beverly Naval Postgraduate School February 12, 2016 Active Internet Measurements (AIMS) Workshop R. Beverly (NPS) Yarrp AIMS 2016 1 / 17 Motivation Active Topology Probing

More information

Performance Evaluation of VoIP using Shortest-Widest and Modified Widest-Shortest QoS Routing Algorithms

Performance Evaluation of VoIP using Shortest-Widest and Modified Widest-Shortest QoS Routing Algorithms Performance Evaluation of VoIP using Shortest-Widest and Modified Widest-Shortest QoS Routing Algorithms Ala F. Khalifeh, and Ali H. El-Mousa Abstract Implementation of current real time services (of which

More information

Building MPLS VPNs with QoS Routing Capability i

Building MPLS VPNs with QoS Routing Capability i Building MPLS VPNs with QoS Routing Capability i Peng Zhang, Raimo Kantola Laboratory of Telecommunication Technology, Helsinki University of Technology Otakaari 5A, Espoo, FIN-02015, Finland Tel: +358

More information

Analysis on Virtualization Technologies in Cloud

Analysis on Virtualization Technologies in Cloud Analysis on Virtualization Technologies in Cloud 1 V RaviTeja Kanakala, V.Krishna Reddy, K.Thirupathi Rao 1 Research Scholar, Department of CSE, KL University, Vaddeswaram, India I. Abstract Virtualization

More information

MPLS VPN in Cellular Mobile IPv6 Architectures(04##017)

MPLS VPN in Cellular Mobile IPv6 Architectures(04##017) MPLS VPN in Cellular Mobile IPv6 Architectures(04##017) Yao-Chung Chang, Han-Chieh Chao, K.M. Liu and T. G. Tsuei* Department of Electrical Engineering, National Dong Hwa University Hualien, Taiwan, Republic

More information

A 10-Gbps High-Speed Single-Chip Network Intrusion Detection and Prevention System

A 10-Gbps High-Speed Single-Chip Network Intrusion Detection and Prevention System A 0-Gbps High-Speed Single-Chip Network Intrusion Detection and Prevention System N. Sertac Artan, Rajdip Ghosh, Yanchuan Guo, and H. Jonathan Chao Department of Electrical and Computer Engineering Polytechnic

More information

Welcome to the Dawn of Open-Source Networking. Linux IP Routers Bob Gilligan gilligan@vyatta.com

Welcome to the Dawn of Open-Source Networking. Linux IP Routers Bob Gilligan gilligan@vyatta.com Welcome to the Dawn of Open-Source Networking. Linux IP Routers Bob Gilligan gilligan@vyatta.com Outline About Vyatta: Open source project, and software product Areas we re working on or interested in

More information

A Load Balancing Method in SiCo Hierarchical DHT-based P2P Network

A Load Balancing Method in SiCo Hierarchical DHT-based P2P Network 1 Shuang Kai, 2 Qu Zheng *1, Shuang Kai Beijing University of Posts and Telecommunications, shuangk@bupt.edu.cn 2, Qu Zheng Beijing University of Posts and Telecommunications, buptquzheng@gmail.com Abstract

More information

High-Speed Policy-based Packet Forwarding Using Efficient Multi-dimensional Range Matching

High-Speed Policy-based Packet Forwarding Using Efficient Multi-dimensional Range Matching High-Speed Policy-based Packet Forwarding Using Efficient Multi-dimensional Range Matching T.V. Lakshman and D. Stiliadis Bell Laboratories 101 Crawfords Corner Rd. HolmdeP, NJ 07733 {lakshman, stiliadi

More information

CLOUDDMSS: CLOUD-BASED DISTRIBUTED MULTIMEDIA STREAMING SERVICE SYSTEM FOR HETEROGENEOUS DEVICES

CLOUDDMSS: CLOUD-BASED DISTRIBUTED MULTIMEDIA STREAMING SERVICE SYSTEM FOR HETEROGENEOUS DEVICES CLOUDDMSS: CLOUD-BASED DISTRIBUTED MULTIMEDIA STREAMING SERVICE SYSTEM FOR HETEROGENEOUS DEVICES 1 MYOUNGJIN KIM, 2 CUI YUN, 3 SEUNGHO HAN, 4 HANKU LEE 1,2,3,4 Department of Internet & Multimedia Engineering,

More information

An Efficient Load Balancing Technology in CDN

An Efficient Load Balancing Technology in CDN Issue 2, Volume 1, 2007 92 An Efficient Load Balancing Technology in CDN YUN BAI 1, BO JIA 2, JIXIANG ZHANG 3, QIANGGUO PU 1, NIKOS MASTORAKIS 4 1 College of Information and Electronic Engineering, University

More information

WASHINGTON UNIVERSITY THE HENRY EDWIN SEVER GRADUATE SCHOOL DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING ABSTRACT

WASHINGTON UNIVERSITY THE HENRY EDWIN SEVER GRADUATE SCHOOL DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING ABSTRACT WASHINGTON UNIVERSITY THE HENRY EDWIN SEVER GRADUATE SCHOOL DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING ABSTRACT HIGH PERFORMANCE PACKET CLASSIFICATION by Edward W. Spitznagel ADVISOR: Professor Jonathan

More information

IMPLEMENTATION OF FPGA CARD IN CONTENT FILTERING SOLUTIONS FOR SECURING COMPUTER NETWORKS. Received May 2010; accepted July 2010

IMPLEMENTATION OF FPGA CARD IN CONTENT FILTERING SOLUTIONS FOR SECURING COMPUTER NETWORKS. Received May 2010; accepted July 2010 ICIC Express Letters Part B: Applications ICIC International c 2010 ISSN 2185-2766 Volume 1, Number 1, September 2010 pp. 71 76 IMPLEMENTATION OF FPGA CARD IN CONTENT FILTERING SOLUTIONS FOR SECURING COMPUTER

More information

Adaptive Early Packet Filtering for Defending Firewalls against DoS Attacks

Adaptive Early Packet Filtering for Defending Firewalls against DoS Attacks Adaptive Early Packet Filtering for Defending Firewalls against DoS Attacks Adel El-Atawy, Ehab Al-Shaer School of Computing DePaul University Chicago, Illinois, USA Email: {aelatawy,ehab}@cs.depaul.edu

More information

Research of TCP ssthresh Dynamical Adjustment Algorithm Based on Available Bandwidth in Mixed Networks

Research of TCP ssthresh Dynamical Adjustment Algorithm Based on Available Bandwidth in Mixed Networks Research of TCP ssthresh Dynamical Adjustment Algorithm Based on Available Bandwidth in Mixed Networks 1 Wang Zhanjie, 2 Zhang Yunyang 1, First Author Department of Computer Science,Dalian University of

More information