Cross-Product Packet Classification in GNIFS based on Non-overlapping Areas and Equivalence Class Author: Mohua Zhang, Ge Li Publisher: AISS 2012 Presenter:

Slides:



Advertisements
Similar presentations
Memory.
Advertisements

An On-Chip IP Address Lookup Algorithm Author: Xuehong Sun and Yiqiang Q. Zhao Publisher: IEEE TRANSACTIONS ON COMPUTERS, 2005 Presenter: Yu Hao, Tseng.
Fast Firewall Implementation for Software and Hardware-based Routers Lili Qiu, Microsoft Research George Varghese, UCSD Subhash Suri, UCSB 9 th International.
Bio Michel Hanna M.S. in E.E., Cairo University, Egypt B.S. in E.E., Cairo University at Fayoum, Egypt Currently is a Ph.D. Student in Computer Engineering.
Binary Trees CSC 220. Your Observations (so far data structures) Array –Unordered Add, delete, search –Ordered Linked List –??
©Silberschatz, Korth and Sudarshan12.1Database System Concepts Chapter 12: Part C Part A:  Index Definition in SQL  Ordered Indices  Index Sequential.
CPSC 335 Dr. Marina Gavrilova Computer Science University of Calgary Canada.
Outline Introduction Related work on packet classification Grouper Performance Empirical Evaluation Conclusions.
A Ternary Unification Framework for Optimizing TCAM-Based Packet Classification Systems Author: Eric Norige, Alex X. Liu, and Eric Torng Publisher: ANCS.
1 TCAM Razor: A Systematic Approach Towards Minimizing Packet Classifiers in TCAMs Department of Computer Science and Information Engineering National.
Fast Filter Updates for Packet Classification using TCAM Authors: Haoyu Song, Jonathan Turner. Publisher: GLOBECOM 2006, IEEE Present: Chen-Yu Lin Date:
1 A Tree Based Router Search Engine Architecture With Single Port Memories Author: Baboescu, F.Baboescu, F. Tullsen, D.M. Rosu, G. Singh, S. Tullsen, D.M.Rosu,
Firewall Policy Queries Author: Alex X. Liu, Mohamed G. Gouda Publisher: IEEE Transaction on Parallel and Distributed Systems 2009 Presenter: Chen-Yu Chang.
1 Energy Efficient Multi-match Packet Classification with TCAM Fang Yu
CS 268: Lectures 13/14 (Route Lookup and Packet Classification) Ion Stoica April 1/3, 2002.
Efficient Multidimensional Packet Classification with Fast Updates Author: Yeim-Kuan Chang Publisher: IEEE TRANSACTIONS ON COMPUTERS, VOL. 58, NO. 4, APRIL.
1 Partition Filter Set for Power- Efficient Packet Classification Authors: Haibin Lu, MianPan Publisher: IEEE GLOBECOM 2006 Present: Chen-Yu Lin Date:
Parallel-Search Trie-based Scheme for Fast IP Lookup
Performance Evaluation of IPv6 Packet Classification with Caching Author: Kai-Yuan Ho, Yaw-Chung Chen Publisher: ChinaCom 2008 Presenter: Chen-Yu Chaug.
Hash Tables1 Part E Hash Tables  
1 DRES:Dynamic Range Encoding Scheme for TCAM Coprocessors Authors: Hao Che, Zhijun Wang, Kai Zheng and Bin Liu Publisher: IEEE Transactions on Computers,
This material in not in your text (except as exercises) Sequence Comparisons –Problems in molecular biology involve finding the minimum number of edit.
Hash Tables1 Part E Hash Tables  
1 A Fast IP Lookup Scheme for Longest-Matching Prefix Authors: Lih-Chyau Wuu, Shou-Yu Pin Reporter: Chen-Nien Tsai.
Hash Tables1 Part E Hash Tables  
1 Packet classification using diagonal-based tuple space search Department of Computer Science and Information Engineering National Cheng Kung University,
1 Performing packet content inspection by longest prefix matching technology Authors: Nen-Fu Huang, Yen-Ming Chu, Yen-Min Wu and Chia- Wen Ho Publisher:
Fast Packet Classification Using Bit Compression with Fast Boolean Expansion Author: Chien Chen, Chia-Jen Hsu and Chi-Chia Huang Publisher: Journal of.
Arrays Data Structures - structured data are data organized to show the relationship among the individual elements. It usually requires a collecting mechanism.
Fast binary and multiway prefix searches for pachet forwarding Author: Yeim-Kuan Chang Publisher: COMPUTER NETWORKS, Volume 51, Issue 3, pp , February.
Cs6390 summer 2000 Tradeoffs for Packet Classification 1 Tradeoffs for Packet Classification Members: Jinxiao Song & Yan Tong.
1 Efficient packet classification using TCAMs Authors: Derek Pao, Yiu Keung Li and Peng Zhou Publisher: Computer Networks 2006 Present: Chen-Yu Lin Date:
PARALLEL TABLE LOOKUP FOR NEXT GENERATION INTERNET
: Chapter 12: Image Compression 1 Montri Karnjanadecha ac.th/~montri Image Processing.
Packet Classification Using Multi-Iteration RFC Author: Chun-Hui Tsai, Hung-Mao Chu, Pi-Chung Wang Publisher: COMPSACW, 2013 IEEE 37th Annual (Computer.
8.4 paging Paging is a memory-management scheme that permits the physical address space of a process to be non-contiguous. The basic method for implementation.
Fast Packet Classification Using Bloom filters Authors: Sarang Dharmapurikar, Haoyu Song, Jonathan Turner, and John Lockwood Publisher: ANCS 2006 Present:
Packet Classification on Multiple Fields 참고 논문 : Pankaj Gupta and Nick McKeown SigComm 1999.
Multi-Field Range Encoding for Packet Classification in TCAM Author: Yeim-Kuan Chang, Chun-I Lee and Cheng-Chien Su Publisher: INFOCOM 2011 Presenter:
An Efficient Regular Expressions Compression Algorithm From A New Perspective  Author: Tingwen Liu, Yifu Yang, Yanbing Liu, Yong Sun, Li Guo  Publisher:
StrideBV: Single chip 400G+ packet classification Author: Thilan Ganegedara, Viktor K. Prasanna Publisher: HPSR 2012 Presenter: Chun-Sheng Hsueh Date:
1 Fast packet classification for two-dimensional conflict-free filters Department of Computer Science and Information Engineering National Cheng Kung University,
A Smart Pre-Classifier to Reduce Power Consumption of TCAMs for Multi-dimensional Packet Classification Yadi Ma, Suman Banerjee University of Wisconsin-Madison.
High-Speed Policy-Based Packet Forwarding Using Efficient Multi-dimensional Range Matching Lakshman and Stiliadis ACM SIGCOMM 98.
Bit Weaving: A Non-Prefix Approach to Compressing Packet Classifiers in TCAMs Author: Chad R. Meiners, Alex X. Liu, and Eric Torng Publisher: 2012 IEEE/ACM.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 PART III: DATA LINK LAYER ERROR DETECTION AND CORRECTION 7.1 Chapter 10.
Parallel tree search: An algorithmic approach for multi- field packet classification Authors: Derek Pao and Cutson Liu. Publisher: Computer communications.
Packet Classification Using Multidimensional Cutting Sumeet Singh (UCSD) Florin Baboescu (UCSD) George Varghese (UCSD) Jia Wang (AT&T Labs-Research) Reviewed.
Packet Classification Using Dynamically Generated Decision Trees
IP Routing table compaction and sampling schemes to enhance TCAM cache performance Author: Ruirui Guo a, Jose G. Delgado-Frias Publisher: Journal of Systems.
A Fast and Scalable IPv6 Packet Classification Author: Xiaoju Zhou, Xiaohong Huang, Qiong Sun, Wei Yang, Yan Ma Publisher: Network Infrastructure and Digital.
1 IP Routing table compaction and sampling schemes to enhance TCAM cache performance Author: Ruirui Guo, Jose G. Delgado-Frias Publisher: Journal of Systems.
Hierarchical packet classification using a Bloom filter and rule-priority tries Source : Computer Communications Authors : A. G. Alagu Priya 、 Hyesook.
Author : Lynn Choi, Hyogon Kim, Sunil Kim, Moon Hae Kim Publisher/Conf : IEEE/ACM TRANSACTIONS ON NETWORKING Speaker : De yu Chen Data :
Packet Classification Using Multi- Iteration RFC Author: Chun-Hui Tsai, Hung-Mao Chu, Pi-Chung Wang Publisher: 2013 IEEE 37th Annual Computer Software.
1 Research on packet classification cased on improved cross-product method Author: Mohua Zhang, Ge Li Publisher: Procedia Engineering, Volume 24, 2011,
Author : Tzi-Cker Chiueh, Prashant Pradhan Publisher : High-Performance Computer Architecture, Presenter : Jo-Ning Yu Date : 2010/11/03.
Scalable Multi-match Packet Classification Using TCAM and SRAM Author: Yu-Chieh Cheng, Pi-Chung Wang Publisher: IEEE Transactions on Computers (2015) Presenter:
IP Routers – internal view
AN ON-CHIP IP ADDRESS LOOKUP ALGORITHM
© 2013 Goodrich, Tamassia, Goldwasser
Dictionaries 9/14/ :35 AM Hash Tables   4
Statistical Optimal Hash-based Longest Prefix Match
Packet Classification Using Coarse-Grained Tuple Spaces
CH 9.2 : Hash Tables Acknowledgement: These slides are adapted from slides provided with Data Structures and Algorithms in C++, Goodrich, Tamassia and.
A Small and Fast IP Forwarding Table Using Hashing
Scalable Multi-Match Packet Classification Using TCAM and SRAM
Authors: A. Rasmussen, A. Kragelund, M. Berger, H. Wessing, S. Ruepp
Worst-Case TCAM Rule Expansion
MEET-IP Memory and Energy Efficient TCAM-based IP Lookup
Presentation transcript:

Cross-Product Packet Classification in GNIFS based on Non-overlapping Areas and Equivalence Class Author: Mohua Zhang, Ge Li Publisher: AISS 2012 Presenter: Chun-Sheng Hsueh Date: 2013/02/27

Introduction Rule matching schemes may be an exact match or a prefix/range matching on multiple fields. If the classification uses only one selector, it is called a one- dimensional classification. A multidimensional classification processing includes more than one selector and the packet to be processed should be matched with all of these selectors, each called a dimension.

Introduction A classifier C is the rules sets, which contains N rules. Assuming that each packet header has K fields and the rule Rj(Rj C,1≤j≤N) consists of three parts: ◦ A Regular expression Rj[i],1≤i≤K. It depicts the K fields of a packet header and could be specific values, range expressions or prefix expressions. ◦ An integer pri(Rj).It defines the rule’s priority in the classifier and can be used to determine which rule has the higher priority when a packet matches several rules. ◦ An action A(Rj). It indicates the actions to be performed when a rule is matched.

Related research work Cross-Product algorithm searches all prefixes of every dimension concurrently, and then it selects the legal matching rules from various cross-products. But the algorithm suffers from a memory explosion problem: in worst case, the cross-product table can have N^k entries, where N is the number of rules and K is the number of fields.

Related research work Overall, the cross-product algorithm has a lot of advantages in the aspect of searching time. In the K dimensional circumstance, it only needs K times of linear searches and a table look-up time. Time complexity of the algorithm is O (KN), but its space complexity is O(N^K).

Related research work For the previous cross-product method, the classification of every dimension is based on the difference display of IP packet address. It classifies the addresses into several classes, and then cross- product these classes. Either in one-dimension or two-dimension, these classes are overlapping in an address space. Otherwise, it can’t be looked up using fast one-dimensional algorithm.

What this paper do? This paper provides a partition method which divides the space into some non-overlapping areas, and is able to use the fast one- dimensional searching algorithm thus decreasing the searching time. To compress a large cross-product table, this paper uses an equivalent class to combine repeated rows or columns. Run-length encoding (RLE) and Bit Array compression algorithm is applied to achieve a better compression ratio.

Improved cross-product*

Improved cross-product From the above process, we can see in every dimension(S,T), the ranges defined in the rules conflict with each other and have the overlapping areas, so there are many matching prefixes in searching results. Figure 1 shows the regional map of the rules base C. R3, R4, R5, and R6 have overlapping areas (the rectangular areas where R3 is in).When searching for the matching rules of H, four matching rules will be found.

Improved cross-product*

Improved cross-product When searching for matching intervals, as each interval doesn’t overlap, the fast one dimensional algorithm can be applied, such as binary searching algorithm and binary searching tree algorithm. Thus the time complexity is reduced from O(KN) to O(KlogN). At the same time, there is only one matching rule in the look-up table and no need to compare the priorities with other matching rules.

Improved cross-product The improved Cross-product table shown in table3. When the point H(0110,1000) is searched, only binary search in the source address S is needed, and the corresponding matching source address is {X3}.Then the destination address T is checked, and the matching one is {Y4}, thus we can get the best matching rules R3.

Improved cross-product However, the main defect of the above method is that the size of Cross-product table is increased. In order to reduce the table size, this paper proposes a solution based on the equivalent class. As shown in figure3, the rules of Y5 and Y1 are same. The scope of action by Y1 and Y5 is considered as the same. So we can consider merging them, thereby reducing the size of the Cross-product table.

Improved cross-product Y1 can be divided into two items. Then there are five columns in the table, but only four classes. After this modification, the range is continuous and non-overlapping. As a result, the linear search can be accelerated by using the fast one-dimensional searching algorithm.

Further compress the storage space We can adopt the method of change cross-product table's data structure to compress the storage space. This method is based on the following two characterizes: ◦ Cross-product’ table needs large space, especially for large-scale rule bases. ◦ For the rule base with N rules, it has N different actions, every rule correspondences one action, but this table may have N*N units and every action is stored N times repeatedly on average. Obviously, this table has compression probability

Further compress the storage space For example, there is a Cross-product table; one row of it has the following structure: ◦ AAAABBBBBBBCCCBBBBBBDDDDDDDDDCC It is obvious that there are lots of continuously repeated rules. For this situation, two methods can be used to compress the table and still keep the previous searching time. ◦ Run-length encoding (RLE) ◦ Bit array

Run-length encoding (RLE) RLE is a very simple form of data compression in which runs of are stored as a single data value and count, rather than as the original run. ◦ Take the above rules as an example, it can be showed as: A4B7C2B6D9C2. For the longer character string, continuous summation takes a lot of time. In order to speed up the searching speed, this paper inserts one byte after every W byte, it is the summation of all second bytes of the prior double bytes. Thus only W-1 times of summation are needed at most.

Bit array This method makes a character string as a compressive character string (CCS) and a bit array (BA). If the character is the same as the prior character, it is represented as "0" in BA, otherwise represented as "1" in BA. Taking the above rule as an example, it can show as : ◦ CCS:ABCBDC ◦ BA: We can use the same processing method as RLE for the longer character string, thus only W-1 times of summation are needed at most.

Theoretical accessment Suppose there are N rules in the rule base. For the source and destination addresses of the prefix forms, it can be proved that the subsection of each dimension merger should not exceed N +1 equivalent interval according to the above method. That is to say, in the worst case, the bad space complexity of rules for two dimensions is O ((N + 1) * (N + 1)).

Theoretical accessment Definition 1: If the values of two addresses in one-dimension are represented in the form of prefix, then their relationship is only Contain or Contained, Equal or Irrelevant and no Overlapping. Definition 2: If the values of two addresses in two-dimension are represented in the form of prefix, then their relationship is only Contain or Contained, Equal, Intersecting or Irrelevant and no Overlapping.

Theoretical accessment Assuming there are two two-dimensional prefix addresses A and B, A= (A1, A2), B= (B1,B2).The relation between A and B is shown in figure3.

Theoretical accessment Theorem 1: With regard to the destination address and the source address in the form of prefix, based on the above method, each dimension section shall not exceed N+1 after the merger. When N =1, the proposition is obviously right. When N =2, their relationship is shown in figure 3. For both X and Y axes, if A and B are overlapping, they can be segmented to overlapping part and none-overlapping part; if A and B are not overlapping, they can be segmented to A and B. The number of sections of each dimension is only two, so the proposition is right.

Theoretical accessment If N=K-1, the proposition is right, namely after the merger, the subsections of X axis and Y axis will not exceed K classes. When N = K, namely there is one rule RLk to be added. The relation between the two edges of RLk, left and right, and the sections of previous K-1 rules on the X axis is as follows: ◦ When two sides of RLk have both the same separator line with the previous sections, this rule doesn’t add section on the X axis.

Theoretical accessment When N = K, namely there is one rule RLk to be added. The relation between the two edges of RLk, left and right, and the sections of previous K-1 rules on the X axis is as follows: ◦ When only one side of RLk has the same separator line with the previous ones, just the subsections on the X axis are increased by the projection of one side. Namely, only one class is increased and the number of sections does not exceed K+1. ◦ When both two sides of the RLk don’t have the same separator line with the previous ones,the result is as shown in figure 4.

Theoretical accessment*

Experimental evaluation