Hierarchical packet classification using a Bloom filter and rule-priority tries Source : Computer Communications Authors : A. G. Alagu Priya 、 Hyesook.

Slides:



Advertisements
Similar presentations
Survey and Proposal on Binary Search Algorithms for Longest Prefix Match Author: Hyesook Lim, Member, IEEE, and Nara Lee, Student Member, IEEE Publisher:
Advertisements

Fast Updating Algorithms for TCAMs Devavrat Shah Pankaj Gupta IEEE MICRO, Jan.-Feb
Packet Classification using Hierarchical Intelligent Cuttings
1 IP-Lookup and Packet Classification Advanced Algorithms & Data Structures Lecture Theme 08 – Part I Prof. Dr. Th. Ottmann Summer Semester 2006.
Fast Firewall Implementation for Software and Hardware-based Routers Lili Qiu, Microsoft Research George Varghese, UCSD Subhash Suri, UCSB 9 th International.
Bio Michel Hanna M.S. in E.E., Cairo University, Egypt B.S. in E.E., Cairo University at Fayoum, Egypt Currently is a Ph.D. Student in Computer Engineering.
A Fast and Memory Efficient Dynamic IP Lookup Algorithm Based on B-Tree Author:Yeim-Kuan Chang and Yung-Chieh Lin Publisher: 2009 International Conference.
HybridCuts: A Scheme Combining Decomposition and Cutting for Packet Classification Author: Wenjun Li, Xianfeng Li Publisher: 2013 IEEE 21 st Annual Symposium.
A Ternary Unification Framework for Optimizing TCAM-Based Packet Classification Systems Author: Eric Norige, Alex X. Liu, and Eric Torng Publisher: ANCS.
ClassBench: A Packet Classification Benchmark
Two-dimensional packet classification algorithm using a quad-tree Author: Hyesook Lim,Min Young Kang and Changhoo Yim Publisher: Computer Communications,
An Efficient IP Address Lookup Algorithm Using a Priority Trie Authors: Hyesook Lim and Ju Hyoung Mun Presenter: Yi-Sheng, Lin ( 林意勝 ) Date: Mar. 11, 2008.
1 Two-dimensional packet classification algorithm using a quad-tree Authors: Hyesook Lim,Min Young Kang and Changhoo Yim Publisher: computer communications.
1 Author: Ioannis Sourdis, Sri Harsha Katamaneni Publisher: IEEE ASAP,2011 Presenter: Jia-Wei Yo Date: 2011/11/16 Longest prefix Match and Updates in Range.
IP Address Lookup for Internet Routers Using Balanced Binary Search with Prefix Vector Author: Hyesook Lim, Hyeong-gee Kim, Changhoon Publisher: IEEE TRANSACTIONS.
1 MIPS Extension for a TCAM Based Parallel Architecture for Fast IP Lookup Author: Oğuzhan ERDEM Cüneyt F. BAZLAMAÇCI Publisher: ISCIS 2009 Presenter:
1 A Tree Based Router Search Engine Architecture With Single Port Memories Author: Baboescu, F.Baboescu, F. Tullsen, D.M. Rosu, G. Singh, S. Tullsen, D.M.Rosu,
1 On Constructing Efficient Shared Decision Trees for Multiple Packet Filters Author: Bo Zhang T. S. Eugene Ng Publisher: IEEE INFOCOM 2010 Presenter:
Efficient IP-Address Lookup with a Shared Forwarding Table for Multiple Virtual Routers Author: Jing Fu, Jennifer Rexford Publisher: ACM CoNEXT 2008 Presenter:
Efficient Multidimensional Packet Classification with Fast Updates Author: Yeim-Kuan Chang Publisher: IEEE TRANSACTIONS ON COMPUTERS, VOL. 58, NO. 4, APRIL.
Fast Packet Classification Using Bloom filters Author: Sarang Dharmapurikar, Haoyu Song, Jonathan Turner, John Lockwood Publisher: Architecture for networking.
Parallel-Search Trie-based Scheme for Fast IP Lookup
PC-DUOS: Fast TCAM Lookup and Update for Packet Classifiers Author: Tania Banerjee-Mishra, Sartaj Sahni,Gunasekaran Seetharaman Publisher: IEEE Symposium.
Performance Evaluation of IPv6 Packet Classification with Caching Author: Kai-Yuan Ho, Yaw-Chung Chen Publisher: ChinaCom 2008 Presenter: Chen-Yu Chaug.
1 Energy Efficient Packet Classification Hardware Accelerator Alan Kennedy, Xiaojun Wang HDL Lab, School of Electronic Engineering, Dublin City University.
1 A Fast IP Lookup Scheme for Longest-Matching Prefix Authors: Lih-Chyau Wuu, Shou-Yu Pin Reporter: Chen-Nien Tsai.
Two stage packet classification using most specific filter matching and transport level sharing Authors: M.E. Kounavis *,A. Kumar,R. Yavatkar,H. Vin Presenter:
An Efficient IP Lookup Architecture with Fast Update Using Single-Match TCAMs Author: Jinsoo Kim, Junghwan Kim Publisher: WWIC 2008 Presenter: Chen-Yu.
Basic Data Structures for IP lookups and Packet Classification
1 HEXA: Compact Data Structures or Faster Packet Processing Author: Sailesh Kumar, Jonathan Turner, Patrick Crowley, Michael Mitzenmacher. Publisher: ICNP.
Fast binary and multiway prefix searches for pachet forwarding Author: Yeim-Kuan Chang Publisher: COMPUTER NETWORKS, Volume 51, Issue 3, pp , February.
1 Efficient packet classification using TCAMs Authors: Derek Pao, Yiu Keung Li and Peng Zhou Publisher: Computer Networks 2006 Present: Chen-Yu Lin Date:
Packet Classification using Rule Caching Author: Nitesh B. Guinde, Roberto Rojas-Cessa, Sotirios G. Ziavras Publisher: IISA, 2013 Fourth International.
PARALLEL TABLE LOOKUP FOR NEXT GENERATION INTERNET
IP Address Lookup Masoud Sabaei Assistant professor
Packet Classification Using Multi-Iteration RFC Author: Chun-Hui Tsai, Hung-Mao Chu, Pi-Chung Wang Publisher: COMPSACW, 2013 IEEE 37th Annual (Computer.
LayeredTrees: Most Specific Prefix based Pipelined Design for On-Chip IP Address Lookups Author: Yeim-Kuau Chang, Fang-Chen Kuo, Han-Jhen Guo and Cheng-Chien.
Author: Haoyu Song, Fang Hao, Murali Kodialam, T.V. Lakshman Publisher: IEEE INFOCOM 2009 Presenter: Chin-Chung Pan Date: 2009/12/09.
Fast Packet Classification Using Bloom filters Authors: Sarang Dharmapurikar, Haoyu Song, Jonathan Turner, and John Lockwood Publisher: ANCS 2006 Present:
High-Speed Packet Classification Using Binary Search on Length Authors: Hyesook Lim and Ju Hyoung Mun Presenter: Yi-Sheng, Lin ( 林意勝 ) Date: Jan. 14, 2008.
Packet Classification using Tuple Space Search
Multi-Field Range Encoding for Packet Classification in TCAM Author: Yeim-Kuan Chang, Chun-I Lee and Cheng-Chien Su Publisher: INFOCOM 2011 Presenter:
Applied Research Laboratory Edward W. Spitznagel 24 October Packet Classification using Extended TCAMs Edward W. Spitznagel, Jonathan S. Turner,
Balajee Vamanan and T. N. Vijaykumar School of Electrical & Computer Engineering CoNEXT 2011.
Author : Guangdeng Liao, Heeyeol Yu, Laxmi Bhuyan Publisher : Publisher : DAC'10 Presenter : Jo-Ning Yu Date : 2010/10/06.
On Adding Bloom Filters to Longest Prefix Matching Algorithms
1 Power-Efficient TCAM Partitioning for IP Lookups with Incremental Updates Author: Yeim-Kuan Chang Publisher: ICOIN 2005 Presenter: Po Ting Huang Date:
1 Fast packet classification for two-dimensional conflict-free filters Department of Computer Science and Information Engineering National Cheng Kung University,
A Small IP Forwarding Table Using Hashing Yeim-Kuan Chang and Wen-Hsin Cheng Dept. of Computer Science and Information Engineering National Cheng Kung.
Cross-Product Packet Classification in GNIFS based on Non-overlapping Areas and Equivalence Class Author: Mohua Zhang, Ge Li Publisher: AISS 2012 Presenter:
CS 740: Advanced Computer Networks IP Lookup and classification Supplemental material 02/05/2007.
Author : Yang Xu, Lei Ma, Zhaobo Liu, H. Jonathan Chao Publisher : ANCS 2011 Presenter : Jo-Ning Yu Date : 2011/12/28.
Author: Haoyu Song, Murali Kodialam, Fang Hao and T.V. Lakshman Publisher/Conf. : IEEE International Conference on Network Protocols (ICNP), 2009 Speaker:
Boundary Cutting for Packet Classification Author: Hyesook Lim, Nara Lee, Geumdan Jin, Jungwon Lee, Youngju Choi, Changhoon Yim Publisher: Networking,
Parallel tree search: An algorithmic approach for multi- field packet classification Authors: Derek Pao and Cutson Liu. Publisher: Computer communications.
Packet Classification Using Dynamically Generated Decision Trees
Author: Weirong Jiang and Viktor K. Prasanna Publisher: The 18th International Conference on Computer Communications and Networks (ICCCN 2009) Presenter:
IP Routing table compaction and sampling schemes to enhance TCAM cache performance Author: Ruirui Guo a, Jose G. Delgado-Frias Publisher: Journal of Systems.
A Fast and Scalable IPv6 Packet Classification Author: Xiaoju Zhou, Xiaohong Huang, Qiong Sun, Wei Yang, Yan Ma Publisher: Network Infrastructure and Digital.
1 Space-Efficient TCAM-based Classification Using Gray Coding Authors: Anat Bremler-Barr and Danny Hendler Publisher: IEEE INFOCOM 2007 Present: Chen-Yu.
1 IP Routing table compaction and sampling schemes to enhance TCAM cache performance Author: Ruirui Guo, Jose G. Delgado-Frias Publisher: Journal of Systems.
Author : Masanori Bando and H. Jonathan Chao Publisher : INFOCOM, 2010 Presenter : Jo-Ning Yu Date : 2011/02/16.
Packet Classification Using Multi- Iteration RFC Author: Chun-Hui Tsai, Hung-Mao Chu, Pi-Chung Wang Publisher: 2013 IEEE 37th Annual Computer Software.
Scalable Multi-match Packet Classification Using TCAM and SRAM Author: Yu-Chieh Cheng, Pi-Chung Wang Publisher: IEEE Transactions on Computers (2015) Presenter:
Parallel Processing Priority Trie-based IP Lookup Approach
Packet Classification Using Coarse-Grained Tuple Spaces
A Small and Fast IP Forwarding Table Using Hashing
Scalable Multi-Match Packet Classification Using TCAM and SRAM
Publisher : TRANSACTIONS ON NETWORKING Author : Haoyu Song, Jonathan S
Packet Classification Using Binary Content Addressable Memory
Presentation transcript:

Hierarchical packet classification using a Bloom filter and rule-priority tries Source : Computer Communications Authors : A. G. Alagu Priya 、 Hyesook Lim Publisher : Butterworth-Heinemann Newton, MA, USA Presenter : JHAO-YAN JIAN Date : 2010/9/15

Outline  Introduction  ALBF  RPT  Performance Evaluation

Introduction TCAM based solutions are the one which offers consistently a high performance independent of the characteristics of the rule set. However, the cost and high power consumption of TCAM made to explore some other algorithmic solutions – fast algorithm based on Bloom filters – the Bloom filter is used to avoid lookup in some subsets which contain no matching. – It can be implemented with on-chip memory or a fast cache.

Bloom filter(1/2)  Bloom filter is a space-efficient probabilistic data structure that is used to test whether an element is a member of a set.  IP address lookup algorithms using Bloom filter and assign each distinct prefix length a Bloom filter.  To design a Bloom filter which can accommodate various lengths of prefixes in it.

Bloom filter(2/2)  S. Dharmapurikar, P. Krishnamurthy, D. Taylor, Longest prefix matching using Bloom filters, in: Proc. of ACM SIGCOMM, August 2003, pp. 201–212.

Hierarchical approach  Algorithm based on a hierarchical approach.  First stage : ALBF(all-length Bloom filter)  Accommodates different length of prefixes in a single Bloom filter  ALBF is constructed based on source prefixes  Second stage : RPT(rule-priority trie)  RPT is constructed based on destination prefixes

ALBF(1/2)  Hash generator  Any number of hash indices can be easily obtained from the generated CRC code by selecting several different combinations of bits  First 4 bits & Last 4 bits Prefix CRC code Hash indices 010* , 8 101* , 13 1* , * , * , 8 111* , 5 b 0 (t+1) = input XOR b 5 (t) b 1 (t+1) = input XOR b 0 (t) b 2 (t+1) = b 1 (t) b 3 (t+1) = b 2 (t) b 4 (t+1) = b 3 (t) b 5 (t+1) = input XOR b 4 (t) CRC-6 generator

ALBF(2/2)  There are two factors affecting the performance of a Bloom filter: the size of the Bloom filter and the number of hash indices.  To determine the size m of the ALBF :  n : the number of non-wild source prefixes  2 z : the size of the Bloom filter m  2 (z-1) 0.  In selecting two hash indices from a CRC code, we consistently selected the first z bits and the last z bits for two hash indices, k 1 and k 2. The bit- locations k 1 and k 2 in the ALBF are set as ALBF programmed for distinct source prefixes

RPT(1/2)  proposed rule-priority trie (RPT) is based on the priority trie, but relocating the highest-priority rule instead of the longest-prefix rule.  The relocated rule is termed as a priority rule, and a rule stored in its own level is termed as an ordinary rule.  nodes in the RPT will have information about entire rule fields.  If the destination prefix reaches its own position, in which the node position corresponds to the destination prefix, even if the node had a higher-priority rule, the rule has to be replaced.

RPT(2/2)  If we assume that rules are sorted first in the order of decreasing priority, the pushing is not frequently occurred.  Search in the proposed algorithm is finished either at a match with a priority rule or at a leaf while it is always finished at a leaf in other trie- based algorithms. Rule Prefix R1010* R2101* R3* R41* R1 R2 R3 R2 R1 R3 R4 R1 R2

Packet classification approach(1/3)  Packet classification approach follows the observation from real databases that any packet matches only a small number of distinct source-destination prefix pairs.  The port range specifications stay as ranges without the blowups associated with range translation.  Since the rules with source prefix as wild-card (*) cannot be programmed in the ALBF, a separate RPT is created for those rules, and it is termed as RPT-wild.  After constructing every RPT, we denote the threshold value for each RPT, where the threshold value of a RPT is equal to the highest-priority rule included in that RPT.

Packet classification approach(2/3) Rule Src prefix Dest prefix Src port Dest port Protocol R0 010* 10* 0, ,25 6 R1 101* 001* 53,53 443,443 4 R2 * 10* 53, , R3 * 01* 53,53 443,443 4 R4 1* 1* 53,53 25,25 4 R5 1101* 001* 0, , R * 11* 53, , R7 * 11* 53,53 25,25 6 R8 111* 01* 67, , R9 010* 10* 0, ,102 6 R10 111* 1* 67,67 25,25 4 R * 001* 53, , R12 111* * 1024, ,5632 4

Packet classification approach(3/3)  Searching :  The search procedure is repeated for the sub-string of the source address with the next smaller distinct length, and if the Bloom filter gives a positive result, the search will be continued in the corresponding RPT-k 1.  Once a RPT is accessed, then that trie will be disabled.  If the already found match has a higher priority than the threshold, that trie is not necessarily searched.  The RPT-wild is accessed only if its threshold value has a higher priority than the already found match.

Incremental update  Insert:  If the new rule has a source prefix length which is different from the lengths of already stored prefixes, then the distinct lengths of prefixes stored in ALBF are updated.  The rule is inserted into the corresponding RPT.  Delete  the rule can be removed from the RPT and that empty location can be filled with the next priority rule in that sub-trie.  the representation of source prefix of that rule cannot be deleted from the ALBF, because the corresponding bit-locations of k 1 and k 2 of that prefixes may also represent some other prefixes.  The problem can be solved using a counting Bloom filter.

Simulation Results(1/6)  Three different types of rule sets, ACL, FW, and IPC, are created with sizes of about 1000 and 5000 rules, each.  a 32-bit CRC generator to provide hash indices for all-length Bloom filter (ALBF) CRC-6 generator

Simulation Results(2/6)

Simulation Results(3/6)  Proposed : multiplication factor I is set as ‘1’.  Hierarchical trie (H-trie)  set-pruning trie  Hierarchical binary search tree (HBST) algorithm is the same as the H- trie except that HBST replaces the trie structure in H-trie with the tree structure which does not include empty internal nodes.  Area-based quad-trie (AQT) recursively partitions a 2-dimensional plane composed of source and destination prefixes, and each partitioned area is mapped to a quad-trie node.  Priority-based quad-trie (PQT) algorithm is based on the AQT algorithm, but empty nodes in the AQT are completely avoided.  Binary search on prefix length (BSL)  Bit-vector (BV)  Hicut & Hypercut : high binth and cuts in each dimension are set to 4.

Simulation Results(4/6) Average number of memory accesses for 1K rule setsWorst case number of memory accesses for 1K rule sets

Simulation Results(5/6) Average number of memory accesses for 5K rule setsWorst case number of memory accesses for 5K rule sets

Simulation Results(6/6) Memory requirements for 1K rule sets (Kbytes)Memory requirements for 5K rule sets (Kbytes)