• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

High-speed policy-based packet forwarding using efficient multi-dimensional range matching, in: (1998)

by T V Lakshman, D Stidialis
Venue:Proc. of ACM SIGCOMM,
Add To MetaCart

Tools

Sorted by:
Results 1 - 10 of 172
Next 10 →

Packet Classification on Multiple Fields

by Pankaj Gupta , Nick McKeown , 1999
"... Routers classify packets to determine which flow they belong to, and to decide what service they should receive. Classification may, in general, be based on an arbitrary number of fields in the packet header. Performing classification quickly on an arbitrary number of fields is known to be difficult ..."
Abstract - Cited by 261 (4 self) - Add to MetaCart
Routers classify packets to determine which flow they belong to, and to decide what service they should receive. Classification may, in general, be based on an arbitrary number of fields in the packet header. Performing classification quickly on an arbitrary number of fields is known to be difficult, and has poor worst-case performance. In this paper, we consider a number of classifiers taken from real networks. We find that the classifiers contain considerable structure and redundancy that can be exploited by the classification algorithm. In particular, we find that a simple multi-stage classification algorithm, called RFC (recursive flow classification), can classify 30 million packets per second in pipelined hardware, or one million packets per second in software.
(Show Context)

Citation Context

...classifiers, the authors propose a caching technique (on-demand crossproducting) with a non-deterministic classification time. + Not to be confused with "Request For Comments" Another recent=-= proposal [15]-=- describes a scheme optimized for implementation in hardware. Employing bit-level parallelism to match multiple fields concurrently, the scheme is reported to support up to 512 rules, classifying one ...

Algorithms for Packet Classification

by Pankaj Gupta, Nick Mckeown , 2001
"... The process of categorizing packets into "flows" in an Internet router is called packet classification. All packets belonging to the same flow obey a pre-defined rule and are processed in a similar manner by the router. For example, all packets with the same source and destination IP addre ..."
Abstract - Cited by 231 (3 self) - Add to MetaCart
The process of categorizing packets into "flows" in an Internet router is called packet classification. All packets belonging to the same flow obey a pre-defined rule and are processed in a similar manner by the router. For example, all packets with the same source and destination IP addresses may be defined to form a flow. Packet classification is needed for non "best-effort" services, such as firewalls and quality of service; services that require the capability to distinguish and isolate traffic in different flows for suitable processing. In general, packet classification on multiple fields is a difficult problem. Hence, researchers have proposed a variety of algorithms which, broadly speaking, can be categorized as "basic search algorithms," geometric algorithms, heuristic algorithms, or hardware-specific search algorithms. In this tutorial we describe algorithms that are representative of each category, and discuss which type of algorithm might be suitable for different applications. 1

Survey & Taxonomy of Packet Classification Techniques

by David E. Taylor - ACM COMPUTING SURVEYS , 2004
"... Packet classification is an enabling function for a variety of Internet applications including Quality of Service, security, monitoring, and multimedia communications. In order to classify a packet as belonging to a particular flow or set of flows, network nodes must perform a search over a set of f ..."
Abstract - Cited by 142 (1 self) - Add to MetaCart
Packet classification is an enabling function for a variety of Internet applications including Quality of Service, security, monitoring, and multimedia communications. In order to classify a packet as belonging to a particular flow or set of flows, network nodes must perform a search over a set of filters using multiple fields of the packet as the search key. In general, there have been two major threads of research addressing packet classification: algorithmic and architectural. A few pioneering groups of researchers posed the problem, provided complexity bounds, and offered a collection of algorithmic solutions. Subsequently, the design space has been vigorously explored by many offering new algorithms and improvements upon existing algorithms. Given the inability of early algorithms to meet performance constraints imposed by high speed links, researchers in industry and academia devised architectural solutions to the problem. This thread of research produced the most widely-used packet classification device technology, Ternary Content Addressable Memory (TCAM). New architectural research combines intelligent algorithms and novel architectures to eliminate many of the unfavorable characteristics of current TCAMs. We observe that the community appears to be converging on a combined algorithmic and architectural approach to the problem. Using a taxonomy based on the high-level approach to the problem and a minimal set of running examples, we provide a survey of the seminal and recent solutions to the problem. It is our hope to foster a deeper understanding of the various packet classification techniques while providing a useful framework for discerning relationships and distinctions.

Tradeoffs for Packet Classification

by Anja Feldmann, S. Muthukrishnan
"... We present an algorithmic framework for solving the packet classification problem that allows various access time vs. memory tradeoffs. It reduces the multi-dimensional packet classification problem to solving a few instances of the one-dimensional IP lookup problem. It gives the best known lookup ..."
Abstract - Cited by 133 (1 self) - Add to MetaCart
We present an algorithmic framework for solving the packet classification problem that allows various access time vs. memory tradeoffs. It reduces the multi-dimensional packet classification problem to solving a few instances of the one-dimensional IP lookup problem. It gives the best known lookup performance with moderately large memory space. Furthermore, it efficiently supports a reasonable number of additions and deletions to the rulesets without degrading the lookup performance. We perform a thorough experimental study of the tradeoffs for the two-dimensional packet classification problem on rulesets derived from datasets collected from AT&T WorldNet, an Internet Service Provider.

Header Space Analysis: Static Checking For Networks

by Peyman Kazemian, George Varghese, Nick Mckeown
"... Today’s networks typically carry or deploy dozens of protocols and mechanisms simultaneously such as MPLS, NAT, ACLs and route redistribution. Even when individual protocols function correctly, failures can arise from the complex interactions of their aggregate, requiring network administrators to b ..."
Abstract - Cited by 119 (12 self) - Add to MetaCart
Today’s networks typically carry or deploy dozens of protocols and mechanisms simultaneously such as MPLS, NAT, ACLs and route redistribution. Even when individual protocols function correctly, failures can arise from the complex interactions of their aggregate, requiring network administrators to be masters of detail. Our goal is to automatically find an important class of failures, regardless of the protocols running, for both operational and experimental networks. To this end we developed a general and protocolagnostic framework, called Header Space Analysis (HSA). Our formalism allows us to statically check network specifications and configurations to identify an important class of failures such as Reachability Failures, Forwarding Loops and Traffic Isolation and Leakage problems. In HSA, protocol header fields are not first class entities; instead we look at the entire packet header as a concatenation of bits without any associated meaning. Each packet is a point in the {0, 1} L space where L is the maximum length of a packet header, and networking boxes transform packets from one point in the space to another point or set of points (multicast). We created a library of tools, called Hassel, to implement our framework, and used it to analyze a variety of networks and protocols. Hassel was used to analyze the Stanford University backbone network, and found all the forwarding loops in less than 10 minutes, and verified reachability constraints between two subnets in 13 seconds. It also found a large and complex loop in an experimental loose source routing protocol in 4 minutes. 1
(Show Context)

Citation Context

...works for a variety of failure conditions in a protocol-independent way. Key to our approach is a generalization of the geometric approach to packet classification pioneered by Lakshman and Stiliadis =-=[3]-=-, in which classification rules over K packet fields are viewed as subspaces in a K dimensional space. We generalize in three ways. First, we jettison the notion of pre-specified fields in favor of a ...

Load-Sensitive Routing of Long-Lived IP Flows

by Anees Shaikh, Jennifer Rexford, Kang G. Shin - SIGCOMM'99 , 1999
"... Internet service providers face a daunting challenge in provisioning network resources, due to the rapid growth of the Internet and wide fluctuations in the underlying traffic patterns. The ability of dynamic routing to circumvent congested links and improve application performance makes it a valuab ..."
Abstract - Cited by 119 (1 self) - Add to MetaCart
Internet service providers face a daunting challenge in provisioning network resources, due to the rapid growth of the Internet and wide fluctuations in the underlying traffic patterns. The ability of dynamic routing to circumvent congested links and improve application performance makes it a valuable traffic engineering tool. However, deployment of load-sensitive routing is hampered by the overheads imposed by link-state update propagation, path selection, and signaling. Under reasonable protocol and computational overheads, traditional approaches to load-sensitive routing of IP traffic are ineffective, and can introduce significant route flapping, since paths are selected based on out-of-date link-state information. Although stability is improved by performing load-sensitive routing at the flow level, flapping still occurs, because most IP flows have a short duration relative to the desired frequency of link-state updates. To address the efficiency and stability challenges of load-sensitive routing, we introduce a new hybrid approach that performs dynamic routing of long-lived flows, while forwarding shortlived flows on static preprovisioned paths. By relating the detection of long-lived flows to the timescale of link-state update messages in the routing protocol, route stability is considerably improved. Through simulation experiments using a one-week ISP packet trace, we show that our hybrid approach significantly outperforms traditional static and dynamic routing schemes, by reacting to fluctuations in network load without introducing route flapping.
(Show Context)

Citation Context

...an effective way for the network to classify flows, and to initiate selection of a dynamic route for the long-lived traffic. Routers at the edge of the network can employ flow classification hardware =-=[32, 33]-=- to associate each packet with a flow, based on bits in the IP and TCP/UDP headers. Depending on the flow definition, the classifier could group packets from the same TCP connection or, more broadly, ...

A Modular Approach to Packet Classification: Algorithms and Results

by Thomas Y. C. Woo - In IEEE Infocom , 2000
"... The ability to classify packets according to pre-defined rules is critical to providing many sophisticated value-added services, such as security, QoS, load balancing, traffic accounting, etc. Various approaches to packet classification have been studied in the literature with accompanying theoretic ..."
Abstract - Cited by 112 (0 self) - Add to MetaCart
The ability to classify packets according to pre-defined rules is critical to providing many sophisticated value-added services, such as security, QoS, load balancing, traffic accounting, etc. Various approaches to packet classification have been studied in the literature with accompanying theoretical bounds. Practical studies with results applying to large number of filters (from 8K to 1 million) are rare. In this paper, we take a practical approach to the problem of packet classification. Specifically, we propose and study a novel approach to packet classification which combines heuristic tree search with the use of filter buckets. Besides high performance and reasonable storage requirement, our algorithm is unique in the sense that it can adapt to the input packet distribution by taking into account the relative filter usage. To evaluate our algorithms, we have developed realistic models of large scale filter tables, and used them to drive extensive experimentation. The results de...
(Show Context)

Citation Context

...trate practicality of our algorithms for even up to 1 million filters. I. INTRODUCTION Multi-dimensional packet classification with a large number of filter rules is a provably hard problem [4], [7], =-=[8]-=-. Specifically, previous work has cast it in terms of the range matching problem in computational geometry [3], where there are various known algorithms and theoretical results. Most of these studies,...

Fast hash table lookup using extended Bloom filter: an aid to network processing

by Haoyu Song, Sarang Dharmapurikar, Jonathan Turner, John Lockwood - In ACM SIGCOMM , 2005
"... ..."
Abstract - Cited by 87 (5 self) - Add to MetaCart
Abstract not found
(Show Context)

Citation Context

...thms. Fundamentally, many packet classification algorithms first perform a lookup on a single header field and leverage the results to narrow down the search to a smaller subset of packet classifiers =-=[18, 4, 19, 15]-=-. Since a lookup on the individual fields can also be performed using one of the hash table based algorithms mentioned above, improving the hash table performance also benefits packet classification a...

Can the production network be the testbed

by Rob Sherwood, Glen Gibb, Kok-kiong Yap, Martin Casado, Nick Mckeown, Guru Parulkar - In USENIX Symposium on Operating Systems Design and Implementation (OSDI , 2010
"... A persistent problem in computer network research is validation. When deciding how to evaluate a new feature or bug fix, a researcher or operator must trade-off realism (in terms of scale, actual user traffic, real equipment) and cost (larger scale costs more money, real user traffic likely requires ..."
Abstract - Cited by 72 (6 self) - Add to MetaCart
A persistent problem in computer network research is validation. When deciding how to evaluate a new feature or bug fix, a researcher or operator must trade-off realism (in terms of scale, actual user traffic, real equipment) and cost (larger scale costs more money, real user traffic likely requires downtime, and real equipment requires vendor adoption which can take years). Building a realistic testbed is hard because “real ” networking takes place on closed, commercial switches and routers with special purpose hardware. But if we build our testbed from software switches, they run several orders of magnitude slower. Even if we build a realistic network testbed, it is hard to scale, because it is special purpose and is in addition to the regular network. It needs its own location, support and dedicated links. For a testbed to have global reach takes investment beyond the reach of most researchers. In this paper, we describe a way to build a testbed that is embedded in—and thus grows with—the network. The technique—embodied in our first prototype, FlowVisor—slices the network hardware by placing a layer between the control plane and the data plane. We demonstrate that FlowVisor slices our own production network, with legacy protocols running in their own protected slice, alongside experiments created by researchers. The basic idea is that if unmodified hardware supports some basic primitives (in our prototype, Open-Flow, but others are possible), then a worldwide testbed can ride on the coat-tails of deployments, at no extra expense. Further, we evaluate the performance impact and describe how FlowVisor is deployed at seven other campuses as part of a wider evaluation platform. 1
(Show Context)

Citation Context

... arriving packet is a single point in that space representing all packets with the same header. Similar to the geometric representation used to describe access control lists for packet classification =-=[14]-=-, we use this abstraction to partition the space into regions (flowspace) and map those regions to slices. The flowspace abstraction helps us manage users who opt-in. To opt-in to a new experiment or ...

Efficient packet classification for network intrusion detection using fpga

by Haoyu Song, John W. Lockwood , 2005
"... FPGA technology has become widely used for real-time net-work intrusion detection. In this paper, a novel packet clas-sification architecture called BV-TCAM is presented, which is implemented for an FPGA-based Network Intrusion De-tection System (NIDS). The classifier can report multiple matches at ..."
Abstract - Cited by 69 (4 self) - Add to MetaCart
FPGA technology has become widely used for real-time net-work intrusion detection. In this paper, a novel packet clas-sification architecture called BV-TCAM is presented, which is implemented for an FPGA-based Network Intrusion De-tection System (NIDS). The classifier can report multiple matches at gigabit per second network link rates. The BV-TCAM architecture combines the Ternary Content Address-able Memory (TCAM) and the Bit Vector (BV) algorithm to effectively compress the data representations and boost throughput. A tree-bitmap implementation of the BV algo-rithm is used for source and destination port lookup while a TCAM performs the lookup of the other header fields, which can be represented as a prefix or exact value. The architecture eliminates the requirement for prefix expansion of port ranges. With the aid of a small embedded TCAM, packet classification can be implemented in a relatively small part of the available logic of an FPGA. The design is pro-totyped and evaluated in a Xilinx FPGA XCV2000E on the FPX platform. Even with the most difficult set of rules and packet inputs, the circuit is fast enough to sustain OC48 traffic throughput. Using larger and faster FPGAs, the sys-tem can work at speeds greater than OC192.
(Show Context)

Citation Context

...rms tree based lookups. This tends to lower the system throughput. Another practical packet classification algorithm often referred as Lucent Bit Vector (BV) was initially proposed by Lakshman et al. =-=[8]-=-. The BV scheme is targeted for hardware implementation. It decomposes the multiple header fields matching problem into several instances of single field matching problem. The idea is to search for ru...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University