Compressing Forwarding Tables Ori Rottenstreich (Technion, Israel) Joint work with Marat Radan, Yuval Cassuto, Isaac Keslassy (Technion, Israel) Carmi.

Slides:



Advertisements
Similar presentations
한양대학교 정보보호 및 알고리즘 연구실 이재준 담당교수님 : 박희진 교수님
Advertisements

Introduction to Algorithms
EE384y: Packet Switch Architectures
Cognitive Radio Communications and Networks: Principles and Practice By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009) 1 Chapter 12 Cross-Layer.
Energy-Efficient Distributed Algorithms for Ad hoc Wireless Networks Gopal Pandurangan Department of Computer Science Purdue University.
Tuesday, May 7 Integer Programming Formulations Handouts: Lecture Notes.
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
0 - 0.
DIVIDING INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
MULTIPLYING MONOMIALS TIMES POLYNOMIALS (DISTRIBUTIVE PROPERTY)
ADDING INTEGERS 1. POS. + POS. = POS. 2. NEG. + NEG. = NEG. 3. POS. + NEG. OR NEG. + POS. SUBTRACT TAKE SIGN OF BIGGER ABSOLUTE VALUE.
SUBTRACTING INTEGERS 1. CHANGE THE SUBTRACTION SIGN TO ADDITION
MULT. INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
Addition Facts
1 LP, extended maxflow, TRW OR: How to understand Vladimirs most recent work Ramin Zabih Cornell University.
On Sequential Experimental Design for Empirical Model-Building under Interval Error Sergei Zhilin, Altai State University, Barnaul, Russia.
1 Outline relationship among topics secrets LP with upper bounds by Simplex method basic feasible solution (BFS) by Simplex method for bounded variables.
1 Maintaining Packet Order in Two-Stage Switches Isaac Keslassy, Nick McKeown Stanford University.
Two-Market Inter-domain Bandwidth Contracting
Greedy Technique Constructs a solution to an optimization problem piece by piece through a sequence of choices that are: feasible, i.e. satisfying the.
1 Column Generation. 2 Outline trim loss problem different formulations column generation the trim loss problem master problem and subproblem in column.
Recurrences : 1 Chapter 3. Growth of function Chapter 4. Recurrences.
Data Structures: A Pseudocode Approach with C
ADTs unsorted List and Sorted List
Data Structures Using C++
Chapter 9 -- Simplification of Sequential Circuits.
Hash Tables.
The Capacity of Wireless Networks
Chapter 15 Integrated Services Digital Network ISDN Services History Subscriber Access Layers BISDN WCB/McGraw-Hill The McGraw-Hill Companies, Inc., 1998.
Name Convolutional codes Tomashevich Victor. Name- 2 - Introduction Convolutional codes map information to code bits sequentially by convolving a sequence.
Three Special Functions
Squares and Square Root WALK. Solve each problem REVIEW:
Routing and Congestion Problems in General Networks Presented by Jun Zou CAS 744.
I/O and Space-Efficient Path Traversal in Planar Graphs Craig Dillabaugh, Carleton University Meng He, University of Waterloo Anil Maheshwari, Carleton.
Scalable and Dynamic Quorum Systems Moni Naor & Udi Wieder The Weizmann Institute of Science.
Addition 1’s to 20.
25 seconds left…...
Week 1.
CSE 473/573 Computer Vision and Image Processing (CVIP) Ifeoma Nwogu Lecture 27 – Overview of probability concepts 1.
February 12, 2007 WALCOM '2007 1/22 DiskTrie: An Efficient Data Structure Using Flash Memory for Mobile Devices N. M. Mosharaf Kabir Chowdhury Md. Mostofa.
Connecting LANs, Backbone Networks, and Virtual LANs
1/22 Worst and Best-Case Coverage in Sensor Networks Seapahn Meguerdichian, Farinaz Koushanfar, Miodrag Potkonjak, and Mani Srivastava IEEE TRANSACTIONS.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 16 Integrated Services Digital Network (ISDN)
From Approximative Kernelization to High Fidelity Reductions joint with Michael Fellows Ariel Kulik Frances Rosamond Technion Charles Darwin Univ. Hadas.
Inapproximability of MAX-CUT Khot,Kindler,Mossel and O ’ Donnell Moshe Ben Nehemia June 05.
Copyright © Cengage Learning. All rights reserved.
Delay Analysis and Optimality of Scheduling Policies for Multihop Wireless Networks Gagan Raj Gupta Post-Doctoral Research Associate with the Parallel.
Minimum Vertex Cover in Rectangle Graphs
13-Optimization Assoc.Prof.Dr. Ahmet Zafer Şenalp Mechanical Engineering Department Gebze Technical.
Fast Algorithms For Hierarchical Range Histogram Constructions
Minimizing Seed Set for Viral Marketing Cheng Long & Raymond Chi-Wing Wong Presented by: Cheng Long 20-August-2011.
Bio Michel Hanna M.S. in E.E., Cairo University, Egypt B.S. in E.E., Cairo University at Fayoum, Egypt Currently is a Ph.D. Student in Computer Engineering.
Optimal Fast Hashing Yossi Kanizo (Technion, Israel) Joint work with Isaac Keslassy (Technion, Israel) and David Hay (Hebrew Univ., Israel)
On the Code Length of TCAM Coding Schemes Ori Rottenstreich (Technion, Israel) Joint work with Isaac Keslassy (Technion, Israel) 1.
Hash Tables With Finite Buckets Are Less Resistant to Deletions Yossi Kanizo (Technion, Israel) Joint work with David Hay (Columbia U. and Hebrew U.) and.
Worst-Case TCAM Rule Expansion Ori Rottenstreich (Technion, Israel) Joint work with Isaac Keslassy (Technion, Israel)
Code and Decoder Design of LDPC Codes for Gbps Systems Jeremy Thorpe Presented to: Microsoft Research
Worst-Case TCAM Rule Expansion Ori Rottenstreich (Technion, Israel) Joint work with Isaac Keslassy (Technion, Israel)
Palette: Distributing Tables in Software-Defined Networks Yossi Kanizo (Technion, Israel) Joint work with Isaac Keslassy (Technion, Israel) and David Hay.
On Finding an Optimal TCAM Encoding Scheme for Packet Classification Ori Rottenstreich (Technion, Israel) Joint work with Isaac Keslassy (Technion, Israel)
The Bloom Paradox Ori Rottenstreich Joint work with Yossi Kanizo and Isaac Keslassy Technion, Israel.
The Bloom Paradox Ori Rottenstreich Joint work with Isaac Keslassy Technion, Israel.
Minimizing Delay in Shared Pipelines Ori Rottenstreich (Technion, Israel) Joint work with Isaac Keslassy (Technion, Israel) Yoram Revah, Aviran Kadosh.
Compression for Fixed-Width Memories Ori Rottenstriech, Amit Berman, Yuval Cassuto and Isaac Keslassy Technion, Israel.
1 Using Network Coding for Dependent Data Broadcasting in a Mobile Environment Chung-Hua Chu, De-Nian Yang and Ming-Syan Chen IEEE GLOBECOM 2007 Reporter.
EE465: Introduction to Digital Image Processing
The Variable-Increment Counting Bloom Filter
Tapping Into The Unutilized Router Processing Power
Worst-Case TCAM Rule Expansion
Presentation transcript:

Compressing Forwarding Tables Ori Rottenstreich (Technion, Israel) Joint work with Marat Radan, Yuval Cassuto, Isaac Keslassy (Technion, Israel) Carmi Arad, Tal Mizrahi, Yoram Revah (Marvell Israel) Avinatan Hassidim (Google Israel & Bar-Ilan Univ.)

Forwarding information in datacenter networks is stored in switch forwarding tables Example: o Lookup key: MAC Address + VLAN o Forwarding Information: Target Port Forwarding Tables in Datacenters 2 ?

Typical table size: hd·b bits Host virtualization in datacenter networks results in a rapid growth of forwarding tables. o More hosts ( h ) o More attributes ( d ) o More attribute values ( b ) Growth of Forwarding Tables 3 d fields, each of b bits (on average) 1 h h rows Field 1 Field 2 Field d This table architecture doesnt scale! hash-based matching Packet header

Direct access to all rows regardless of their indices o High packet rate Storing each row in a fixed-width memory word o We would like to minimize the required memory width Required Properties of a Solution 4 width row 1 row h

i P bits (with d fields) Illustration of access to the encoded forwarding table. A single encoded row of at most P bits is retrieved. Then, d pipelined accesses to d dictionaries are performed. Goal: Find d codes that minimize the maximal width P. Solution Overview σ1σ1 σ2σ2 σdσd 1 h hash-based matching h rows Packet header

Table A with d=3 columns and its encoding scheme Obtained maximal width of bits A Forwarding Table Example Today d=3 dictionaries Suggested Solution 6 Encoded table Original table 3+1+1= = = = = =5 width

Huffman encoding: o Minimizes the average width but not the maximal width o Existence of long rows Fixed uniform encoding: o Without long rows, but not efficient Our goal: Find an encoding scheme that minimizes the maximal width: Traditional Solutions 7

Definition 1 (Encoding Scheme): A n encoding scheme of a FIB table with d columns is composed of d prefix codes, one for each column. Definition 2 (Encoding Width): The encoding width of an encoding scheme is defined as the maximal sum of the lengths of the d codewords in the encoding of a row of A, i.e. Problem Definition 8

Definition 3 (Optimal Encoding Width): For a table A, we denote by the smallest possible width of an encoding scheme of A such that Our goal: Find an encoding scheme that minimizes the encoding width Constraint on the encoding scheme (Krafts Inequality): There exists a prefix encoding of the elements in a set with codeword lengths iff Problem Definition (2) 9

For a table A with h rows, we define the following optimization problem: We would like to minimize the maximal width P while satisfying the Krafts inequality for the d prefix codes The codeword lengths should be positive integers. Optimization Problem 10

Theorem: Finding the optimal encoding is NP-hard in the general case ( ). Convex Algorithm: o Consider the relaxed problem: codeword lengths are not necessarily integers. (The relaxed problem is convex.) o Take the ceiling of the codeword lengths in its solution o Example: Solution: (2.2, 3.71) (3, 4) Theorem: By taking the ceiling of the codeword lengths in an optimal solution to the relaxed problem, we achieve a legal encoding scheme that satisfies Approximation of the Optimal Encoding 11

Outline Introduction and Problem Definition General Properties Two Column FIB Tables Graph Representation Optimal Conditional Encoding Bounds on the Optimal Encoding Width Experimental Results Summary 12

Motivation: L2 MAC tables with two fields: Target Port + An additional attribute. Assumption: The table A has two columns with distinct elements in each column. Theorem: The optimal encoding width of A satisfies Two-Column FIB Tables 13

A two-column FIB table A can be represented as a bipartite graph. Example: Two-column FIB table with h=6 rows and (for W=2) distinct elements in each column. Graph Representation Forwarding table Bipartite graph 14

Given an encoding of one column, we would like to find an encoding of the second column that minimizes the encoding width P. For an element, we should consider the maximal codeword length of an element in that shares a row with. Notation: Optimal Conditional Encoding 15 ua y wb y y P bits v z u

Theorem: The optimal conditional encoding width satisfies Notes: We should encode in bits. Linear complexity Optimal Conditional Encoding 16

Reminder (Edge Cover): In an undirected graph a set of edges is an edge cover of if. Example: nodes at each side ( ) Intuition: Smaller covering number More independent edges Constraints on more elements Larger optimal width Lower Bound on the Optimal Encoding Width 17 (A) (B) Edge covering number: 8 Edge covering number: 14

Theorem: The optimal encoding width of a table A with an edge covering number satisfies Example: ( ) Lower Bound on the Optimal Encoding Width 18 (A) (B) Edge covering number: 8 Edge covering number:

Effectiveness of the encoding algorithm on synthetic FIB tables with d=2 columns and (W=8) elements, as a function of Zipf dist. parameter. Simulation details: 1000 rows, 10 iterations. Experimental Results A lower bound of. Lower parameter Closer to the uniform distribution

Table: 903 rows. Collected in the enterprise network of a large company. Without encoding: row width of 29 bits. With convex encoding: width of only 11 bits. Real-Life FIB Table 20 improvement

Concluding Remarks New architecture for compression of forwarding tables in datacenters Approximation of the optimal solution Analysis of the optimal encoding width 21

Thank You