IP address lookup for Internet routers using cache routing table
|
|
|
- Brendan Blankenship
- 10 years ago
- Views:
Transcription
1 ISSN (Print): IP address lookup for Internet routers using cache routing table Houassi Hichem 1 and Bilami Azeddine 2 1 Department of Computer Science, University Center of Khenchela, Algeria 2 Department of Computer Science, University of Batna, Algeria Abstract So that the routers forward an IP packet with his destination, they are running a forwarding decision on an incoming packet to determine the packet s next-hop router. This is achieved by looking up the longest matching prefix with a packet destination address in the routing tables. Therefore, one major factor in the overall performance of a router is the speed of the IP address lookup operation due to the increase in routing table size, in this paper, a new IP address lookup algorithm based on cache routing-table is proposed, that contains recently used IP addresses and their forwarding information to speed up the IP address lookups operation in the routers. We evaluated the performance of our proposed algorithm in terms of consultation time for several sets of IP addresses, the results of performance evaluation show that our algorithm is efficient in terms of the lookup speed since search can be immediately finished when the input IP address is found in the cache routing table. Keywords: Internet router, cache routing table, IP addresses lookup, longest prefix. 1. Introduction The Internet is becoming omnipresent and has been exponentially growing in size. The number of users, sub-networks and domains connected to the Internet seem to be exploding. The Internet network is comprised of routers, that forward packets towards their destinations, and physical links that transport packets from one router to another. Each router is required to perform a forwarding decision on an incoming packet to determine the packet s next-hop. This is achieved by looking up the destination IP address of the incoming packet in a forwarding table. The packet forwarding process in a router is to find the longest prefix in the routing table that provides the best match to the destination IP address of the data packet. When a router receives an IP packet, it searches for the longest prefix matches the destination IP address of this packet. The routing table is structured in two main entry (prefix and prefix length), where the length of a prefix is limited by the length of the destination IP address (32 for the IPv4 addresses and 128 for IPv6). For years, the main bottleneck in the performance of IP routers is the time to find a next-hop for an incoming IP packet in the routing table. The problem is defined as the research of the longest prefix from all prefixes that match the destination IP address in the routing table. The rest of the paper is organized as follows. Section 2 describes the drawbacks to the existing approaches to IP lookups. Section 3 briefly defines the IP addresses lookup problem. Section 4 describes our lookup schemes based on cache routing table. Section 5 details the routing table structure and the cache routing table management. Subsection 5.1 represents the main routing table structure; Subsection 5.2 represents the cache routing table structure; Subsection 5.3 describes the entry replacement in the proposed cache routing table; Subsection 5.4 describes the cache routing table scheduling mechanism. Section 6 describes performance measurements of our schemes. We conclude in Section 7 by assessing the contributions of this paper. 2. Existing approaches to IP Lookup Different hardware and software approaches are proposed and deployed to improve the performance of routers [8], the main metric of performance was the forwarding speed or the number of packets forwarded per second. There are many approaches for fast IP-address lookup that are based on software solutions. The search for next hop in the routing table is in general, by the longest prefix technique, the binary trie [19] is the basis of the majority of these approaches. Several other variants of binary trie have been proposed to improve the longest prefix match search performance [1,3,7], The longest prefix search operation on an input destination IP address starts from the root node and recursively go to the left child or the right child until there is no more child to proceed. At each node, if the IP address matches the stored prefix, it is remembered as the current best matching prefix; one extension to the binary trie is the multibit trie [1] which reduce the depth of the binary trie, the research process in the
2 ISSN (Print): multi-bit trie skip several bits of the IP address at the same traversal between nodes. Authors of [2] proposes the level and path compression trie (LC-trie), the path compression removes internal nodes with only one child. With these methods, The LC-trie significantly reduces the depth and the number of nodes of the trie. Authors of [20] proposed a Binary prefix tree (BPT) algorithm attempts to perform binary search on prefix values. (BPT) is constructed by defining the comparison on values of two different length prefixes. This technique an excellent property in memory accesses due to the absence of internal empty nodes, but the depth of the tree depends on the number of prefixes. Since the empty nodes in the binary trie are not associated with any prefix then to remove empty nodes, the priority trie (P-trie) [21] relocates the longest prefix of the sub-trie rooted by an empty node into the empty node. Recently, binary search tree with prefix vector is proposed. This tree is constructed only with leaves of the binary trie and makes each leaf hold the nested prefix information using a prefix vector. This tree requires a wide memory because of the prefix vector. These data structures produce high-speed lookups for the 32-bit addresses of the IPv4 addresses but their performance degrades when they are used for the 128-bit addresses of the IPv6. Therefore this performance degradation is due to the increase in number of memory accesses as a result of the growth of the routing table; Hardware based address lookup algorithms are classified into four classes, namely, the memory on a single application specific integrated circuit (ASIC) [5], the content addressable memories (CAMs) and ternary content addressable memories (TCAM) [6], reconfigurable hardware-based solutions and parallel architectures solutions [12] [13]. The ASICs are typically used to implement binary tree data structures using the high-speed memories such as SRAMs. A number of researchers have stated that the speed of the IP packets forwarding using these memories can be significantly increased [11]. To reduce the time for memory accesses, many hardware solutions use a pipelined architecture that allows one address lookup per memory cycle [10]. Trie-based IP lookup schemes usually require several memory accesses per lookup and those accesses may be serialized. In contrast, CAMs and TCAMs [6] can perform a lookup operation in a single cycle owing to its parallel access characteristics. Traditionally, TCAM and CAMs have been designed as a hardware solution to store prefixes to make consultations with IP addresses and IP packets classification. TCAM are fully associative memories in which each entry is appropriate to store fields of the prefixes, TCAM is designed so that all entries are compared in parallel, and then a TCAM is a memory used for searching a data item (bits of a prefix) in parallel. Parallel architectures proposed in [12] [13] are based on the principle of partitioning the routing table into several sub-tables handled in parallel to find the longest prefix in each sub-table, and then select the most longest prefix between results in different subtables. The essential difference between these proposals architectures is the partitioning criterion of the routing table and the main principles of the longest prefix selection among the partial results obtained. Other approaches are proposed to improve the performance of routers by using a cache memory to store recently referenced IP addresses and their forwarding information. All the future packets that would match the same prefix in the routing table will find their route in the prefix cache and will not need to refer to the routing table. The majority of these approaches as [4] [14] [15] [16] [17] [18] proposes hardware solutions i.e processors with memory that contains prefixes recently referenced. [14] Proposes an expansion of prefixes in the cache and search the IP address by comparison, [4] proposes a cache-prefixes architecture without expansion. [16] Proposes multizone pipelined cache architecture. 3. IP Address lookup problem The IP (Internet Protocol) defines a mechanism for transmitting Internet packets where each packet has a destination IP address. In an Internet router, there is a routing table that associates any IP address to an output port (next hop) by the prefix technique. Because each entry in a routing table (prefix) may specify a subnetwork, one destination address may match more than one routing table entry. The IP lookup operation becomes more and more computationally intensive because the variable sized prefixes have been extensively employed since the advent of CIDR(Classless Inter-Domain Routing) [9]. Since several prefixes can be matched for a destination IP address under the CIDR, the router has the burden to select the longest matching prefix (LMP) as the best matching one. Therefore, the performance of the router strongly depends on the efficiency of the IP lookup operation. For example, the prefix 1101* matches all destination addresses that begin with 1101, and 10010* matches all destination addresses that begin with Suppose that a router table includes the prefixes P1 = 101*, P2 = 10010*, P3 = 01*, P4 = 1*, and P5 = 1010*. The destination address d = is matched by the prefixes P1, P4, and P5. Since, length(p1) = 3 (the length of a prefix is a number of bits in the prefix), length(p4) = 1, and length(p5) = 4, P5 is the longest prefix that matches d. In longestprefix routing, the next hop for a packet destined for the destination address d is given by the longest prefix that matches d. The IP Address Lookup problem is to study how to construct a data structure for storing the routing table prefixes, so that we can quickly find the output port (next hop) for a data packets received to a router.
3 ISSN (Print): Router with a cache routing table The router is composed of two routing tables in our proposition, a main routing table and a cache routing table. The cache routing table is relatively small and quick table, each entry in the cache routing table is composed of three fields, the IP destination address, the packet forwarding information such as the output port number of the router and the prefix of the IP address generated from the main table. The role of this cache table is to store the IP addresses recently used in the main routing table that is larger and slower. It serves to accelerate the road search operation, in order to find the output ports of the router quickly to send a data packet received by a router. The diagram in Figure 1 illustrates the routing table of a router with a cache routing table. The routing table is composed of two tables, the main routing table and the cache routing table. When a packet arrives at a input port of a router, a router port extract the destination IP address and searches for the output port in the cache routing table, if the destination IP address extracted found, the data packet is forwarded to the output port of the router matching this IP address in the cache routing table, if the IP address does not exist in the cache routing table a new search is started in the main routing table using the search by prefix technique (longest prefix) [7]. Once the output port corresponding to the longest prefix of the IP address found in the main routing table, two main operations are performed: (1) Forwarding of the data packet to the output port, (2) Update the cache routing table by this new information; insertion of a new entry containing the IP address, the prefix found in the main routing table and the output port for future research in the cache routing table. routing table, a table entry that contains the prefix, the prefix length and the output port. The Next hop research problem in the main routing table is to find a longest prefix matching for a destination IP address among all prefixes of the routing table. Table 1: Main routing table Prefix Prefix length Next Hop 11* 2 A 10* 2 B 111* 3 C 1101* 4 D 5.2. Cache routing table Our cache routing table is used as the main routing table for fast next hop search. During the IP packets forwarding operation, the router will search the routing table entry that matches the destination IP address of the incoming IP packet, to speed up the searching in the cache table, we proposed a table of limited size and contrary to the main routing table the research done by direct comparison of cache table entries with the destination IP address, for that, the entries of the proposed cache routing table are as follows: - The complete IP address: to avoid the use of prefixes in the cache table. - The prefix found in the main routing table. This information is used for the routing table updates operations - The Next hop: The router interface to which the packets routed are sent. Table 2: Cache table with IP addresses of 5 bits Destination IP address Cache routing table Yes No Update Main routing table Mux Output port IP Address Prefix Next Hop * A * B * C * D 5.3. Entry replacement in the cache routing table Fig. 1 Diagram of a router with a cache routing table 5. Routing table structure 5.1. Main routing table In order to allow a more efficient use of the IP address space and avoid the problem of routing table explosion, prefixes in the main routing table can have an arbitrary length from 0 to 32 bits for IPv4 and from 0 to 128 bits for IPv6 using CIDR. To further reduce the routing tables, Table 1 shows an example of a main Our approach includes not only the search operation of next hop, but also the operations necessary to update the cache routing table. The cache table may not contain all the IP addresses searches in the main table because of its limited size, we must define a method indicating which cache table entry should be replaced by the new IP address. This method is called entry (IP address) replacement method of the cache table. An IP address is restored in cache table when it is required and found in the main routing table. But the
4 ISSN (Print): problem of the withdrawal remains; what address will leave its place to the restored IP address? The ideal is to remove an IP address just after its last use (corresponding to the last data packet routed) but this requires knowing the last data packet in a data flow. To approach to the optimal algorithm must be based on the following observation: Since all packets in a same data flow arrived in a router has the same destination IP address and are transferred in sequence, once a user starts a download operation, the routers try to forward all data packets constituting the data flow continuously to their destination. This suggests the following mechanism: when a default address occurs in the cache table, the address that has not been used for the longest time is removed and replaced by the new address. This method is called the least recently used. To fully implement, we propose to manage a linked list of all entries (IP addresses) of the cache table, with the most recently used address in top and the least recently used in queue of list, this list must be updated at each reference to the cache table 5.4. Cache table scheduling At the arrival of a new data packet to the router, the router extracts the IP destination address and uses the IP destination address to look up the cache table to get the output port for this packet, and subsequently move this cache table entry to the header list of IP addresses. By this technique of moving entries, the most recently used IP address is located on top of the list and the least recently used is at the bottom of the IP addresses list. Scheduling procedure: Procedure cache_list_sheduling For all incomin data packet Adr packet IP address While (the IP addresses list IP_Adr_List Unfinished) If (the address Adr found in the list List_Adr_IP) Then Return the output port Move this item to the List_Adr_IP header 6. Experimentation Routing lookup algorithm can be evaluated by its lookup speed. To evaluate the effectiveness and performance of our proposed algorithm, we developed a generator which allows: To generate a routing table containing prefixes with various lengths, and allows us to vary the entries number of these tables, and on the other hand to generate a series of IP packets used like traces of IP routers We used a database representing the routing table for our experiments, the objective of the first test is to vary the number of entries in the cache routing table to specify cache size optimizing the search time of the output port, using a set of IP packets and a main routing table with prefixes. Concerning the evaluation of the next hop search operation, the routing table has received neither suppression non insertion of prefixes throughout the experiment. Table 3: Routing period for different cache size Cache table size Routing period (s) Cache table size Table 3 give the measured lookup time, however, We can see from the result that increases the number of entries in the cache routing table, the search time to forward IP packets is reduced as shown in Figure 2. Fig.2. Graphical representation of table 3 results Routing period (s) In a second test, we evaluate the performance of our proposed algorithm; we used various sizes of routing tables generated by our tool (prefixes generator tool). We compared our algorithm with other proposed scheme in terms of the search time.
5 ISSN (Print): Table 4 shows the performance comparison of the proposed algorithm with an algorithm uses a binary trie [3] for represents a routing table, we used a main routing table with prefixes and a cache routing table with 0.1% of the main routing table size. The proposed algorithm is the best in the average time search. Since the search process in our proposed algorithm stops when a next hop is found in a cache table, Table 4: Comparing our algorithm with the binary trie based search algorithm IP packets series The figure 3 shows the distribution of search time for the four sets of IP packets tested. It is clear in the figure 3 that our algorithm improves the search time for all series of IP packets tested Fig.3. Time search distribution for the IP packets sets tested 7. Conclusion Routing with cache (s) Routing with binary trie (s)[3] In this paper, we have proposed an algorithm for the best address lookup operation that uses the cache routing table approach. The IP routing table is structured in main routing table and cache table, the cache routing table is able to store the IP addresses recently looked, in the proposed cache table; we not only cache the prefix destination address of the packet but also cache the prefix for used in the routing table updates. Our main contribution was to propose an algorithm to speed the IP address lookup operation. To demonstrate the effectiveness of our algorithm, comparisons are made with the binary trie based algorithm [3], the simulation results show that our approach offers better search speed performance compared with the binary trie based packet forwarding algorithm. References [1] Haibin Lu and Sartaj Sahni O (log n) Dynamic Router-Tables for Prefixes and Ranges IEEE transactions on computers, vol. 53, no. 10, October 2004 [2] S. Nilsson, G. Karlsson, IP address lookup using LCtries, IEEE Journal on Selected Areas in Communications, vol 17, issue 6, pp , [3] R.C. Chang and B.-H. Lim Efficient IP routing table lookup scheme IEE Proc. Commun., Vol. 149, No. 2, pp.77-82, April 2002 [4] Chi-Cheng Wu Jia-Long Wu Huang-Sen Chiu Improving IP lookup Performance with a Routing-Table Cache IEEE Communications Letters, Volume 7, Issue 3, March 2003 [5] Chang, R.C. Beng-Huat Lim Efficient IP routing table VLSI design for multigigabit routers IEEE International Symposium on vol 2,pp [6] Jinsoo Kim and Junghwan Kim An Efficient IP Lookup Architecture with Fast Update Using Single- Match TCAMs Springer-Verlag Berlin Heidelberg, pp , 2008 [7] M. Ruiz-Sلnchez, E. Biersack, and W. Dabbous, Survey and Taxonomy of IP Address Lookup Algorithms, IEEE Network Magazine, March/April [8] David Antos Overview of Data Structures in IP Lookups CESNET Tchnical Report 9/2002. [9] V. Fuller, T. Li, J. Yu, and K. Varadhan, Classless Inter-Domain Routing (CIDR): an Address Assignment and Aggregation Strategy RFC 1519, September 1993 [10] Anindya Basu Girija Narlikar Fast Incremental Updates for Pipelined Forwarding Engines IEEE/ACM Transactions on Networking (TON), Volume 13, Issue 3, pp , June 2005 [11] P. Gupta, S. Lin, and N. McKeown. Routing Lookups in Hardware at Memory Access Speeds. In Proceedings of Infocom 98, pp , San Francisco, April 1998 [12] Mohammad J. Akhbarizadeh, Mehrdad Nourani Hardware-Based IP Routing Using Partitioned Lookup Table IEEE/ACM transactions on networking, vol. 13, no. 4,pp august 2005 [13] Houassi Hichem, Bilami Azeddine Une architecture parallèle pour la consultation des tables de routage The 5th international Conference: sciences of electronics, technologies of information and telecommunication SETIT 2009, Tunisia, March [14] M. J. Akhbarizadeh and M. Nourani Efficient prefix cache for network processors In 12th Annual IEEE Symposium on High Performance Interconnects, pp , Aug [15] S. Kasnavi, P. Berube, V. Gaudet, and J.N Amaral A cache-based Internet Protocol address lookup architecture IEEE, Computer Networks, Vol. 52, Issue 2, pp , February [16] Soraya Kasnavi, Paul Berube, Vincent C. Gaudet, and Jos Nelson Amaral A Multizone Pipelined Cache for IP Routing LNCS 3462, pp , networking [17] Kaushik Rajan and Ramaswamy Govindarajan, Senior Member, A Novel Cache Architecture and Placement Framework for Packet Forwarding Engines, IEEE Transactions on computers, VOL. 58, NO. 8, pp , AUGUST 2009
6 ISSN (Print): [18] L. Peng, W. Lu, and L. Duan Power efficient IP lookup with supernode caching IEEE GLOBECOM, Vol. 48, pp , November [19] L.C Wuu, T.J Liu, and K.M Chen A longest prefix first search tree for IP lookup Elsevier,Computer Networks, Volume 51, Issue 12, pp , August 2007 [20] N. Yazdani and P. S. Min, Fast and scalable schemes for the IP address lookup problem, in Proc. IEEE HPSR2000, pp 83-92, [21] H. Lim and J. Mun, An efficient IP address lookup algorithm using a priority-trie, IEEE Globecom, pp. 1-5, Nov Houassi Hichem received the magister degree in 2004 from the Department of Computer Science, University of Batna, Algeria. He is currently an assistant professor at the University Center of Khenchela, Algeria. He is currently a Doctoral student in the Department of Computer Science, University of Batna, Algeria. His research interests include router architectures, IP-address lookup algorithms, and mobile networks. Bilami Azeddine is professor in the Department of Computer Science, University of Batna, Algeria. His research interests include Wireless Networks, network security and router architectures.
CHAPTER 5 FINITE STATE MACHINE FOR LOOKUP ENGINE
CHAPTER 5 71 FINITE STATE MACHINE FOR LOOKUP ENGINE 5.1 INTRODUCTION Finite State Machines (FSMs) are important components of digital systems. Therefore, techniques for area efficiency and fast implementation
Scalable Prefix Matching for Internet Packet Forwarding
Scalable Prefix Matching for Internet Packet Forwarding Marcel Waldvogel Computer Engineering and Networks Laboratory Institut für Technische Informatik und Kommunikationsnetze Background Internet growth
Data Structures For IP Lookup With Bursty Access Patterns
Data Structures For IP Lookup With Bursty Access Patterns Sartaj Sahni & Kun Suk Kim sahni, kskim @cise.ufl.edu Department of Computer and Information Science and Engineering University of Florida, Gainesville,
IP Address Lookup Using A Dynamic Hash Function
IP Address Lookup Using A Dynamic Hash Function Xiaojun Nie David J. Wilson Jerome Cornet Gerard Damm Yiqiang Zhao Carleton University Alcatel Alcatel Alcatel Carleton University [email protected]
Index Terms Domain name, Firewall, Packet, Phishing, URL.
BDD for Implementation of Packet Filter Firewall and Detecting Phishing Websites Naresh Shende Vidyalankar Institute of Technology Prof. S. K. Shinde Lokmanya Tilak College of Engineering Abstract Packet
COMPARISON OF ALGORITHMS FOR DETECTING FIREWALL POLICY ANOMALIES
COMPARISON OF ALGORITHMS FOR DETECTING FIREWALL POLICY ANOMALIES 1 SHILPA KALANTRI, 2 JYOTI JOGLEKAR 1,2 Computer Engineering Department, Shah and Anchor Kutchhi Engineering College, Mumbai, India E-mail:
Router Architectures
Router Architectures An overview of router architectures. Introduction What is a Packet Switch? Basic Architectural Components Some Example Packet Switches The Evolution of IP Routers 2 1 Router Components
Quality of Service Routing Network and Performance Evaluation*
Quality of Service Routing Network and Performance Evaluation* Shen Lin, Cui Yong, Xu Ming-wei, and Xu Ke Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 {shenlin, cy, xmw,
Routing Prefix Caching in Network Processor Design
Routing Prefix Caching in Network Processor Design Huan Liu Department of Electrical Engineering Stanford University, C 9435 [email protected] bstract Cache has been time proven to be a very effective
Section #6: Addressing
Section #6: Addressing Problem 1: Routing entries Consider the following routing table for router A, given in CIDR ( slash-n ) notation: 56.162.0.0/15: Port 0 56.164.0.0/15: Port 1 56.166.0.0/16: Port
Stateful Inspection Firewall Session Table Processing
International Journal of Information Technology, Vol. 11 No. 2 Xin Li, ZhenZhou Ji, and MingZeng Hu School of Computer Science and Technology Harbin Institute of Technology 92 West Da Zhi St. Harbin, China
Exam 1 Review Questions
CSE 473 Introduction to Computer Networks Exam 1 Review Questions Jon Turner 10/2013 1. A user in St. Louis, connected to the internet via a 20 Mb/s (b=bits) connection retrieves a 250 KB (B=bytes) web
1. How many unique network IDs are there in class A addresses? # of unique hosts?
CS445: IPv4 Addresses In-class activity Names: Part 1: Address Classes Original three classes of IPv4 addresses: A: 0 network (7 bits) host (24 bits) B: 10 network (14 bits) host (16 bits) C: 110 network
ECE 578 Term Paper Network Security through IP packet Filtering
ECE 578 Term Paper Network Security through IP packet Filtering Cheedu Venugopal Reddy Dept of Electrical Eng and Comp science Oregon State University Bin Cao Dept of electrical Eng and Comp science Oregon
Network layer: Overview. Network layer functions IP Routing and forwarding
Network layer: Overview Network layer functions IP Routing and forwarding 1 Network layer functions Transport packet from sending to receiving hosts Network layer protocols in every host, router application
Interconnection Networks. Interconnection Networks. Interconnection networks are used everywhere!
Interconnection Networks Interconnection Networks Interconnection networks are used everywhere! Supercomputers connecting the processors Routers connecting the ports can consider a router as a parallel
IP Router Architectures: An Overview
IP Router Architectures: An Overview by James Aweya {Email: [email protected]; Tel: 1-613-763-6491; Fax: 1-613-763-5692} Nortel Networks Ottawa, Canada, K1Y 4H7 Abstract In the emerging environment
IP addressing. Interface: Connection between host, router and physical link. IP address: 32-bit identifier for host, router interface
IP addressing IP address: 32-bit identifier for host, router interface Interface: Connection between host, router and physical link routers typically have multiple interfaces host may have multiple interfaces
ECE 358: Computer Networks. Solutions to Homework #4. Chapter 4 - The Network Layer
ECE 358: Computer Networks Solutions to Homework #4 Chapter 4 - The Network Layer P 4. Consider the network below. a. Suppose that this network is a datagram network. Show the forwarding table in router
CLASSLESS INTER DOMAIN ROUTING - CIDR
CLASSLESS INTER DOMAIN ROUTING - CIDR Marko Luoma Helsinki University of Technology Laboratory of Telecommunications Technology [email protected] ABSTRACT As the Internet evolved and become more familiar
WHITE PAPER. Understanding IP Addressing: Everything You Ever Wanted To Know
WHITE PAPER Understanding IP Addressing: Everything You Ever Wanted To Know Understanding IP Addressing: Everything You Ever Wanted To Know CONTENTS Internet Scaling Problems 1 Classful IP Addressing 3
Computer Network Foundation. Chun-Jen (James) Chung. Arizona State University
Computer Network Foundation Chun-Jen (James) Chung 1 Outline Network Addressing Subnetting Classless Inter-Domain Routing (CIDR) Route Aggregation Network Addressing How does the network decide where to
5. Classless and Subnet Address Extensions 최 양 희 서울대학교 컴퓨터공학부
5. Classless and Subnet Address Extensions 최 양 희 서울대학교 컴퓨터공학부 1 Introduction In the original IP addressing scheme, each physical network is assigned a unique network address Individual sites can have the
Answers to Sample Questions on Network Layer
Answers to Sample Questions on Network Layer ) IP Packets on a certain network can carry a maximum of only 500 bytes in the data portion. An application using TCP/IP on a node on this network generates
Configuring a Load-Balancing Scheme
Configuring a Load-Balancing Scheme Finding Feature Information Configuring a Load-Balancing Scheme Last Updated: August 15, 2011 This module contains information about Cisco Express Forwarding and describes
Hyper Node Torus: A New Interconnection Network for High Speed Packet Processors
2011 International Symposium on Computer Networks and Distributed Systems (CNDS), February 23-24, 2011 Hyper Node Torus: A New Interconnection Network for High Speed Packet Processors Atefeh Khosravi,
Route Table Partitioning and Load Balancing for Parallel Searching with TCAMs I
Route Table Partitioning and Load Balancing for Parallel Searching with TCAMs I Dong Lin 1, Yue Zhang 1, Chengchen Hu 1, Bin Liu 1, Xin Zhang 2, and Derek Pao 3 1 Dept. of Computer Science and Technology
8.2 The Internet Protocol
TCP/IP Protocol Suite HTTP SMTP DNS RTP Distributed applications Reliable stream service TCP UDP User datagram service Best-effort connectionless packet transfer Network Interface 1 IP Network Interface
IPv4 and IPv6: Connecting NAT-PT to Network Address Pool
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(5):547-553 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Intercommunication Strategy about IPv4/IPv6 coexistence
SUBNETS, CIDR, AND CLASSLESS ADDRESSING
Announcements SUBNETS, CIDR, AND CLASSLESS ADDRESSING Internet Protocols CSC / ECE 573 Fall, 005 No office hours tomorrow (Wednesday) out of town No class on Thursday Fall break! Midterm exam next Tuesday!
Computer Networks By Bahaa Q. Al-Mussawi Subnetting Basics Reduced network traffic Optimized network performance Simplified management
Subnetting Basics You learned previously how to define and find the valid host ranges used in a Class A, Class B, and Class C network address by turning the host bits all off and then all on. This is very
VLSM and CIDR Malin Bornhager Halmstad University
VLSM and CIDR Malin Bornhager Halmstad University Session Number 2002, Svenska-CNAP Halmstad University 1 Objectives Classless routing VLSM Example of a VLSM calculation 2 Classless routing CIDR (Classless
Performance of networks containing both MaxNet and SumNet links
Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for
10CS64: COMPUTER NETWORKS - II
QUESTION BANK 10CS64: COMPUTER NETWORKS - II Part A Unit 1 & 2: Packet-Switching Networks 1 and Packet-Switching Networks 2 1. Mention different types of network services? Explain the same. 2. Difference
Scaling 10Gb/s Clustering at Wire-Speed
Scaling 10Gb/s Clustering at Wire-Speed InfiniBand offers cost-effective wire-speed scaling with deterministic performance Mellanox Technologies Inc. 2900 Stender Way, Santa Clara, CA 95054 Tel: 408-970-3400
RSVP- A Fault Tolerant Mechanism in MPLS Networks
RSVP- A Fault Tolerant Mechanism in MPLS Networks S.Ravi Kumar, M.Tech(NN) Assistant Professor Gokul Institute of Technology And Sciences Piridi, Bobbili, Vizianagaram, Andhrapradesh. Abstract: The data
An Active Packet can be classified as
Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,[email protected] Abstract-Traditionally, network management systems
Scalable High-Speed Prefix Matching
Scalable High-Speed Prefix Matching MARCEL WALDVOGEL IBM Zurich Research Laboratory GEORGE VARGHESE University of California, San Diego JON TURNER Washington University in St. Louis and BERNHARD PLATTNER
Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.
CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer
Software Defined Networking (SDN) - Open Flow
Software Defined Networking (SDN) - Open Flow Introduction Current Internet: egalitarian routing/delivery based on destination address, best effort. Future Internet: criteria based traffic management,
IP Addressing Introductory material.
IP Addressing Introductory material. A module devoted to IP addresses. Addresses & Names Hardware (Layer 2) Lowest level Ethernet (MAC), Serial point-to-point,.. Network (Layer 3) IP IPX, SNA, others Transport
A Fast Path Recovery Mechanism for MPLS Networks
A Fast Path Recovery Mechanism for MPLS Networks Jenhui Chen, Chung-Ching Chiou, and Shih-Lin Wu Department of Computer Science and Information Engineering Chang Gung University, Taoyuan, Taiwan, R.O.C.
Architectural Level Power Consumption of Network on Chip. Presenter: YUAN Zheng
Architectural Level Power Consumption of Network Presenter: YUAN Zheng Why Architectural Low Power Design? High-speed and large volume communication among different parts on a chip Problem: Power consumption
Increasing Path Diversity using Route Reflector
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 5 ǁ May. 2013 ǁ PP.05-09 Increasing Path Diversity using Route Reflector Prasha Dubey
DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL
IJVD: 3(1), 2012, pp. 15-20 DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL Suvarna A. Jadhav 1 and U.L. Bombale 2 1,2 Department of Technology Shivaji university, Kolhapur, 1 E-mail: [email protected]
Packet Classification for Core Routers: Is there an alternative to CAMs?
Packet Classification for Core Routers: Is there an alternative to CAMs? Florin Baboescu, Sumeet Singh, George Varghese Abstract A classifier consists of a set of rules for classifying packets based on
Internet Protocols Fall 2005. Lectures 7-8 Andreas Terzis
Internet Protocols Fall 2005 Lectures 7-8 Andreas Terzis Outline Internet Protocol Service Model Fragmentation Addressing Original addressing scheme Subnetting CIDR Forwarding ICMP ARP Address Shortage
How To Make A Network Address Prefix Smaller
CSC521 Communication Protocols 網 路 通 訊 協 定 Ch.9 Classless And Subnet Address Extensions (CIDR) 吳 俊 興 國 立 高 雄 大 學 資 訊 工 程 學 系 Outline 1. Introduction 2. Review Of Relevant Facts 3. Minimizing Network Numbers
High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features
UDC 621.395.31:681.3 High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features VTsuneo Katsuyama VAkira Hakata VMasafumi Katoh VAkira Takeyama (Manuscript received February 27, 2001)
(Refer Slide Time: 02:17)
Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #06 IP Subnetting and Addressing (Not audible: (00:46)) Now,
Content-Aware Load Balancing using Direct Routing for VOD Streaming Service
Content-Aware Load Balancing using Direct Routing for VOD Streaming Service Young-Hwan Woo, Jin-Wook Chung, Seok-soo Kim Dept. of Computer & Information System, Geo-chang Provincial College, Korea School
FORWARDING of Internet Protocol (IP) packets is the primary. Scalable IP Lookup for Internet Routers
Scalable IP Lookup for Internet Routers David E. Taylor, Jonathan S. Turner, John W. Lockwood, Todd S. Sproull, David B. Parlour Abstract IP address lookup is a central processing function of Internet
IP Subnetting and Addressing
Indian Institute of Technology Kharagpur IP Subnetting and Addressing Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Kharagpur Lecture 6: IP Subnetting and Addressing
An Adaptive Load Balancing to Provide Quality of Service
An Adaptive Load Balancing to Provide Quality of Service 1 Zahra Vali, 2 Massoud Reza Hashemi, 3 Neda Moghim *1, Isfahan University of Technology, Isfahan, Iran 2, Isfahan University of Technology, Isfahan,
Architecture of distributed network processors: specifics of application in information security systems
Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia [email protected] 1. Introduction Modern
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
Hosts Address Auto Configuration for Mobile Ad Hoc Networks
Hosts Address Auto Configuration for Mobile Ad Hoc Networks Sudath Indrasinghe, Rubem Pereira, Hala Mokhtar School of Computing and Mathematical Sciences Liverpool John Moores University [email protected],
Email Spam Detection Using Customized SimHash Function
International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 1, Issue 8, December 2014, PP 35-40 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org Email
Opnet Based simulation for route redistribution in EIGRP, BGP and OSPF network protocols
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 1, Ver. IV (Jan. 2014), PP 47-52 Opnet Based simulation for route redistribution
Algorithms for Advanced Packet Classification with Ternary CAMs
Algorithms for Advanced Packet Classification with Ternary CAMs Karthik Lakshminarayanan UC Berkeley Joint work with Anand Rangarajan and Srinivasan Venkatachary (Cypress Semiconductor) Packet Processing
MAXIMIZING RESTORABLE THROUGHPUT IN MPLS NETWORKS
MAXIMIZING RESTORABLE THROUGHPUT IN MPLS NETWORKS 1 M.LAKSHMI, 2 N.LAKSHMI 1 Assitant Professor, Dept.of.Computer science, MCC college.pattukottai. 2 Research Scholar, Dept.of.Computer science, MCC college.pattukottai.
Internet Addresses (You should read Chapter 4 in Forouzan)
Internet Addresses (You should read Chapter 4 in Forouzan) IP Address is 32 Bits Long Conceptually the address is the pair (NETID, HOSTID) Addresses are assigned by the internet company for assignment
Internetworking and Internet-1. Global Addresses
Internetworking and Internet Global Addresses IP servcie model has two parts Datagram (connectionless) packet delivery model Global addressing scheme awaytoidentifyall H in the internetwork Properties
DRAFT 18-09-2003. 2.1 Gigabit network intrusion detection systems
An Intrusion Detection System for Gigabit Networks (Working paper: describing ongoing work) Gerald Tripp Computing Laboratory, University of Kent. CT2 7NF. UK e-mail: [email protected] This draft
Classful IP Addressing (cont.)
Classful IP Addressing (cont.) 1 Address Prefix aka Net ID defines the network Address Suffix aka Host ID defines the node In Classful addressing, prefix is of fixed length (1, 2, or 3 bytes)! Classful
Introduction. Internet Address Depletion and CIDR. Introduction. Introduction
Introduction Internet Address Depletion and A subnet is a subset of class A, B, or C networks IP addresses are formed of a network and host portions network mask used to separate the information Introduction
A Study of Network Security Systems
A Study of Network Security Systems Ramy K. Khalil, Fayez W. Zaki, Mohamed M. Ashour, Mohamed A. Mohamed Department of Communication and Electronics Mansoura University El Gomhorya Street, Mansora,Dakahlya
CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012
CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012 Important: The solutions to the homework problems from the course book have been provided by the authors.
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
Autonomous Fast Rerouting for Software Defined Network
Autonomous ast Rerouting for Software Defined Network 2012.10.29 NTT Network Service System Laboratories, NTT Corporation Shohei Kamamura, Akeo Masuda, Koji Sasayama Page 1 Outline 1. Background and Motivation
Configuring NetFlow Switching
Configuring NetFlow Switching This chapter describes how to configure NetFlow switching. For a complete description of NetFlow commands used in this chapter, refer to the Cisco IOS Switching s chapter
ICS 351: Today's plan
ICS 351: Today's plan Quiz, on overall Internet function, linux and IOS commands, network monitoring, protocols IPv4 addresses: network part and host part address masks IP interface configuration IPv6
Resource Allocation Schemes for Gang Scheduling
Resource Allocation Schemes for Gang Scheduling B. B. Zhou School of Computing and Mathematics Deakin University Geelong, VIC 327, Australia D. Walsh R. P. Brent Department of Computer Science Australian
Efficient Addressing. Outline. Addressing Subnetting Supernetting CS 640 1
Efficient Addressing Outline Addressing Subnetting Supernetting CS 640 1 IPV4 Global Addresses Properties IPv4 uses 32 bit address space globally unique hierarchical: network + host 7 24 Dot Notation 10.3.2.4
A Fast Pattern-Matching Algorithm for Network Intrusion Detection System
A Fast Pattern-Matching Algorithm for Network Intrusion Detection System Jung-Sik Sung 1, Seok-Min Kang 2, Taeck-Geun Kwon 2 1 ETRI, 161 Gajeong-dong, Yuseong-gu, Daejeon, 305-700, Korea [email protected]
Design and Implementation of an On-Chip timing based Permutation Network for Multiprocessor system on Chip
Design and Implementation of an On-Chip timing based Permutation Network for Multiprocessor system on Chip Ms Lavanya Thunuguntla 1, Saritha Sapa 2 1 Associate Professor, Department of ECE, HITAM, Telangana
Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks
Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Prashil S. Waghmare PG student, Sinhgad College of Engineering, Vadgaon, Pune University, Maharashtra, India. [email protected]
How To Balance A Web Server With Remaining Capacity
Remaining Capacity Based Load Balancing Architecture for Heterogeneous Web Server System Tsang-Long Pao Dept. Computer Science and Engineering Tatung University Taipei, ROC Jian-Bo Chen Dept. Computer
Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)
Lecture 15 IP Address Each host and router on the Internet has an IP address, which consist of a combination of network number and host number. The combination is unique; no two machines have the same
EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK
EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK S.Abarna 1, R.Padmapriya 2 1 Mphil Scholar, 2 Assistant Professor, Department of Computer Science,
Load Balanced Optical-Network-Unit (ONU) Placement Algorithm in Wireless-Optical Broadband Access Networks
Load Balanced Optical-Network-Unit (ONU Placement Algorithm in Wireless-Optical Broadband Access Networks Bing Li, Yejun Liu, and Lei Guo Abstract With the broadband services increasing, such as video
A Novel QoS Framework Based on Admission Control and Self-Adaptive Bandwidth Reconfiguration
Int. J. of Computers, Communications & Control, ISSN 1841-9836, E-ISSN 1841-9844 Vol. V (2010), No. 5, pp. 862-870 A Novel QoS Framework Based on Admission Control and Self-Adaptive Bandwidth Reconfiguration
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements
IP Addressing. IP Addresses. Introductory material.
IP Addressing Introductory material. An entire module devoted to IP addresses. IP Addresses Structure of an IP address Classful IP addresses Limitations and problems with classful IP addresses Subnetting
Module 7. Routing and Congestion Control. Version 2 CSE IIT, Kharagpur
Module 7 Routing and Congestion Control Lesson 4 Border Gateway Protocol (BGP) Specific Instructional Objectives On completion of this lesson, the students will be able to: Explain the operation of the
COMPARATIVE ANALYSIS OF DIFFERENT QUEUING MECHANISMS IN HETROGENEOUS NETWORKS
COMPARATIVE ANALYSIS OF DIFFERENT QUEUING MECHANISMS IN HETROGENEOUS NETWORKS Shubhangi Rastogi 1, Samir Srivastava 2 M.Tech Student, Computer Science and Engineering, KNIT, Sultanpur, India 1 Associate
Cisco Networking Academy CCNP Multilayer Switching
CCNP 3 v5 - Chapter 4 Cisco Networking Academy CCNP Multilayer Switching Implementing Inter-VLAN Routing VLANs VLANs are associated with individual networks or subnetworks Network devices in different
Configuring a Load-Balancing Scheme
Configuring a Load-Balancing Scheme Last Updated: October 5, 2011 This module contains information about Cisco Express Forwarding and describes the tasks for configuring a load-balancing scheme for Cisco
Guide to TCP/IP, Third Edition. Chapter 2: IP Addressing and Related Topics
Guide to TCP/IP, Third Edition Chapter 2: IP Addressing and Related Topics Objectives Understand IP addressing, anatomy and structures, and addresses from a computer s point of view Recognize and describe
