Fast Forwarding for NDN Won So Ashok Narayanan Mark Stapp Cisco Systems IETF ICNRG, 31/7/2013, Berlin.

Slides:



Advertisements
Similar presentations
Router Internals CS 4251: Computer Networking II Nick Feamster Spring 2008.
Advertisements

Router Internals CS 4251: Computer Networking II Nick Feamster Fall 2008.
1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
IP Forwarding Relates to Lab 3.
A Scalable and Reconfigurable Search Memory Substrate for High Throughput Packet Processing Sangyeun Cho and Rami Melhem Dept. of Computer Science University.
Bio Michel Hanna M.S. in E.E., Cairo University, Egypt B.S. in E.E., Cairo University at Fayoum, Egypt Currently is a Ph.D. Student in Computer Engineering.
Mitigate DDoS Attacks in NDN by Interest Traceback Huichen Dai, Yi Wang, Jindou Fan, Bin Liu Tsinghua University, China 1.
© 2009 Cisco Systems, Inc. All rights reserved. SWITCH v1.0—4-1 Implementing Inter-VLAN Routing Deploying Multilayer Switching with Cisco Express Forwarding.
Hash-Based IP Traceback Best Student Paper ACM SIGCOMM’01.
TCP/IP Protocol Suite 1 Chapter 7 Upon completion you will be able to: ARP and RARP Understand the need for ARP Understand the cases in which ARP is used.
Spring 2002CS 4611 Router Construction Outline Switched Fabrics IP Routers Tag Switching.
Efficient IP-Address Lookup with a Shared Forwarding Table for Multiple Virtual Routers Author: Jing Fu, Jennifer Rexford Publisher: ACM CoNEXT 2008 Presenter:
Page: 1 Director 1.0 TECHNION Department of Computer Science The Computer Communication Lab (236340) Summer 2002 Submitted by: David Schwartz Idan Zak.
TCP/IP Protocol Suite 1 Chapter 11 Upon completion you will be able to: User Datagram Protocol Be able to explain process-to-process communication Know.
1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
Hash, Don’t Cache: Fast Packet Forwarding for Enterprise Edge Routers Minlan Yu Princeton University Joint work with Jennifer.
Just Say No: Authenticated Denial for ICN Copyright (c) 2015 by Cisco Systems Inc.1 Mark Stapp, Cisco ICNRG meeting at IETF 92, Dallas, 3/2015.
Computer Networks Switching Professor Hui Zhang
Sarang Dharmapurikar With contributions from : Praveen Krishnamurthy,
ECE 526 – Network Processing Systems Design Network Processor Architecture and Scalability Chapter 13,14: D. E. Comer.
Network Layer (3). Node lookup in p2p networks Section in the textbook. In a p2p network, each node may provide some kind of service for other.
1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
NFD forwarding pipelines Junxiao Shi,
Para-Snort : A Multi-thread Snort on Multi-Core IA Platform Tsinghua University PDCS 2009 November 3, 2009 Xinming Chen, Yiyao Wu, Lianghong Xu, Yibo Xue.
IP Forwarding.
Othman Othman M.M., Koji Okamura Kyushu University 1.
(ANCS 2013) Named data networking on a router: fast and dos-resistant forwarding with hash tables Authors: Won So, Ashok Narayanan, David Oran (Cisco Systems)
Scalable Name Lookup in NDN Using Effective Name Component Encoding
ComNets Tutorial: Future Internet with Information Centric Networks Asanga Udugama (1), Carmelita Goerg (1) and Andreas Timm-Giel (2) (1) Communications.
A NAMED DATA NETWORKING FLEXIBLE FRAMEWORK FOR MANAGEMENT COMMUNICATION Authors: Daneil Corjuo and Rui L. Aguiar Ivan Vidal and Jamie Garcia-Reinoso Presented.
Spring Routing & Switching Umar Kalim Dept. of Communication Systems Engineering 27/03/2007.
NFD forwarding pipelines Junxiao Shi,
Hyung-Min Lee ©Networking Lab., 2001 Chapter 8 ARP and RARP.
Authors: Haowei Yuan, Tian Song, and Patrick Crowley Publisher: ICCCN 2012 Presenter: Chai-Yi Chu Date: 2013/05/22 1.
Review of the literature : DMND:Collecting Data from Mobiles Using Named Data Takashima Daiki Park Lab, Waseda University, Japan 1/15.
Local-Area-Network (LAN) Architecture Department of Computer Science Southern Illinois University Edwardsville Fall, 2013 Dr. Hiroshi Fujinoki
Routing Policies in Named Data Networking Steve DiBenedetto Christos Papadopoulos Dan Massey.
Para-Snort : A Multi-thread Snort on Multi-Core IA Platform Tsinghua University PDCS 2009 November 3, 2009 Xinming Chen, Yiyao Wu, Lianghong Xu, Yibo Xue.
Pending Interest Table Sizing in Named Data Networking Luca Muscariello Orange Labs Networks / IRT SystemX G. Carofiglio (Cisco), M. Gallo, D. Perino (Bell.
Authors: Matteo Varvello, Diego Perino, and Leonardo Linguaglossa Publisher: NOMEN 2013 (The 2nd IEEE International Workshop on Emerging Design Choices.
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
Multimedia & Mobile Communications Lab.
Network Address Translation External/ Internal/. OVERLOADING In Overloading, each computer on the private network is translated to the same IP address;
Networking Named Content Van Jacobson, Diana K. Smetters, James D. Thornton, Michael F. Plass, Nicholas H. Briggs, Rebecca L. Braynard.
Efficient Cache Structures of IP Routers to Provide Policy-Based Services Graduate School of Engineering Osaka City University
1 Kyung Hee University Chapter 8 ARP(Address Resolution Protocol)
Where are we? Chapter 3 and 4 are focused on getting the data from one place to another. Switching and routing Review the next slides First our goal is.
Quiz 1 Review (Week 10) Sam Green ’17 (646)
CS 6401 Overlay Networks Outline Overlay networks overview Routing overlays Resilient Overlay Networks Content Distribution Networks.
Describe basic routing concepts. Routers Interconnect Networks Router is responsible for forwarding packets from network to network, from the original.
Ofir Luzon Supervisor: Prof. Michael Segal Longest Prefix Match For IP Lookup.
NFD forwarding pipelines Junxiao Shi,
Chapter 8 ARP(Address Resolution Protocol)
NDN (Named Data Networking)
NFD forwarding pipelines
ARP and RARP Objectives Chapter 7 Upon completion you will be able to:
NDN Messages and NDN Packets
IP Forwarding Covers the principles of end-to-end datagram delivery in IP networks.
Addressing: Router Design
NTHU CS5421 Cloud Computing
IP Forwarding Relates to Lab 3.
Statistical Optimal Hash-based Longest Prefix Match
IP Forwarding Relates to Lab 3.
© 2002, Cisco Systems, Inc. All rights reserved.
© 2002, Cisco Systems, Inc. All rights reserved.
Virtual TCAM for Data Center Switches
1 ADDRESS RESOLUTION PROTOCOL (ARP) & REVERSE ADDRESS RESOLUTION PROTOCOL ( RARP) K. PALANIVEL Systems Analyst, Computer Centre Pondicherry University,
IP Forwarding Relates to Lab 3.
Networking and Network Protocols (Part2)
IP Forwarding Relates to Lab 3.
Presentation transcript:

Fast Forwarding for NDN Won So Ashok Narayanan Mark Stapp Cisco Systems IETF ICNRG, 31/7/2013, Berlin

CCN/NDN in Two Slides (1)  Network forwards and caches named data 'objects'; no host addresses  Pull-based communication model  Interest message: Client asks for a content object by name  Data message: Any node having data responds with a content object  Client is able to validate data because the Content message is signed Interest data

NDN in Two Slides (2)  Routers have some new components  Content Store (CS) – cache used for local repair; may be persistent/non-volatile  Pending-Interest Table (PIT)  Every Interest message creates state in the router  The PIT state is used to direct Content messages to clients  FIB  Holds name prefixes; there are no “addresses”  Must be prepared to hold >1 entry per prefix  Natural support for multi-path forwarding and mcast

NDN in Two Slides (3) Figure source: Yi et al., Adaptive forwarding in named data networking, ACM SIGCOMM CCR, 42(3), 2012.

Hash-based Forwarding (1)  Making line-rate decisions using variable-length names in messages is … an opportunity  We're working on a hash-based approach  Using siphash (Aumasson and djb), a 'crypto' hash  Locate 'name' in the message  Make one pass through name  Produce complete hash of the name  Collect partial hash result at each name-component boundary  Hash of name is used to distribute work to a cpu core  CPU core owns a partition of the PIT  PIT changes do not incur MESI coherence penalty

Hash-based Forwarding (2)  When messages arrive at a worker cpu core  Check the combined CS/PIT for the name hash  Return Content from cache if poss  De-dup Interests  Dupe Content messages if >1 Interest was received  Reject Content with no pending Interest  Probe the FIB with some of the partial name prefix hashes  Start at a “likely” prefix  FIB entries tell us how many lookups to attempt  Relatively easy to reject name-component-count attacks  Locate longest match in FIB  Gather FIB re-write info and return message to original Dispatcher  Dispatcher uses re-write info and puts outbound message back on the switch fabric

Hash-based Forwarding (3)  A Real Router: Cisco ASR9000  Integrated Service Module (ISM) blade  Linux  4 x Intel 10G ports  2 x Xeon CPUs  6 cores per CPU package  48GB SDRAM  2 x 1.6 TB modular flash SSD

Hash-based Forwarding (4) ISM FPGA Niantic 0Niantic 1 Xeon 0 D0D1 A0A1A2A3 Xeon 1 D2D3 A4A5A6A7 LC1 LC2 Packet 1Packet 2 Flow through the ASR9000 ISM Blade: D == Dispatcher user-space process A == Worker 'App' user-space process

Input Dataset (1)  IRCache traces to supply 13M +/- urls  Generate Interest Names from the urls  URL blacklist to supply FIB prefix length profile  Generate FIB by applying length profile to selected input urls

Input Dataset (2)  Example transforming url to NDN name tlv: |1|84|2|3|c o m|2|6|m c a f e e|2|3|w w w|2|6|c o m m o n|2|5|m e d i a|2|6 |i m a g e s|2|6|c o n t e n t|2|6|p r o m o s|2|5|s m a l l|2|18|b o x _ m i s s _ 4 5 x 5 8. g i f|

Input Dataset (3)

Performance Summary  Reasonably linear multi-core scalability  For ref, ~5.62MPPS required for 20Gbps with 425-byte (avg) packets

Caveats and TODOs  Experimenting with the data structs and algorithms, primarily  No CS  No congestion-control (of significance)  Very few drops – most messages' names are in the FIB  No fragments (no 4K/8K Content messages)  Naming patterns and traffic patterns we haven't tried yet  No Content signature verification  We haven't measured everything we want to measure just yet  So I may not be able to answer every question...