Authors: Haowei Yuan, Tian Song, and Patrick Crowley Publisher: ICCCN 2012 Presenter: Chai-Yi Chu Date: 2013/05/22 1.

Slides:



Advertisements
Similar presentations
IP Router Architectures. Outline Basic IP Router Functionalities IP Router Architectures.
Advertisements

Logically Centralized Control Class 2. Types of Networks ISP Networks – Entity only owns the switches – Throughput: 100GB-10TB – Heterogeneous devices:
A Search Memory Substrate for High Throughput and Low Power Packet Processing Sangyeun Cho, Michel Hanna and Rami Melhem Dept. of Computer Science University.
A Scalable and Reconfigurable Search Memory Substrate for High Throughput Packet Processing Sangyeun Cho and Rami Melhem Dept. of Computer Science University.
1 An Efficient, Hardware-based Multi-Hash Scheme for High Speed IP Lookup Hot Interconnects 2008 Socrates Demetriades, Michel Hanna, Sangyeun Cho and Rami.
Bio Michel Hanna M.S. in E.E., Cairo University, Egypt B.S. in E.E., Cairo University at Fayoum, Egypt Currently is a Ph.D. Student in Computer Engineering.
Multimedia and Mobile communications Laboratory CCN 1 DK Han Junghwan Song Computer Networks Practice.
Authors: Alexander Afanasyev, Priya Mahadevany, Ilya Moiseenko, Ersin Uzuny, Lixia Zhang Publisher: IFIP Networking, 2013 (International Federation for.
1 Fast Routing Table Lookup Based on Deterministic Multi- hashing Zhuo Huang, David Lin, Jih-Kwon Peir, Shigang Chen, S. M. Iftekharul Alam Department.
M. Waldvogel, G. Varghese, J. Turner, B. Plattner Presenter: Shulin You UNIVERSITY OF MASSACHUSETTS, AMHERST – Department of Electrical and Computer Engineering.
PIT AGGREGATION Marc Mosko, Nacho Solis, J.J. Garcia-Luna-Aceves ICNRG Iterim (Dallas, TX) March 23, 2015.
Streaming NetCDF John Caron July What does NetCDF do for you? Data Storage: machine-, OS-, compiler-independent Standard API (Application Programming.
OpenFlow-Based Server Load Balancing GoneWild
Scalable Content-aware Request Distribution in Cluster-based Network Servers Jianbin Wei 10/4/2001.
Traffic Management - OpenFlow Switch on the NetFPGA platform Chun-Jen Chung( ) SriramGopinath( )
Named Data Networking for Social Network Content delivery P. Truong, B. Mathieu (Orange Labs), K. Satzke (Alu) E. Stephan (Orange Labs) draft-truong-icnrg-ndn-osn-00.txt.
Web Caching Schemes1 A Survey of Web Caching Schemes for the Internet Jia Wang.
Internet Indirection Infrastructure Ion Stoica UC Berkeley.
Efficient IP-Address Lookup with a Shared Forwarding Table for Multiple Virtual Routers Author: Jing Fu, Jennifer Rexford Publisher: ACM CoNEXT 2008 Presenter:
CSCI 4550/8556 Computer Networks Comer, Chapter 19: Binding Protocol Addresses (ARP)
Performance Evaluation of IPv6 Packet Classification with Caching Author: Kai-Yuan Ho, Yaw-Chung Chen Publisher: ChinaCom 2008 Presenter: Chen-Yu Chaug.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
Internet Networking Spring 2002 Tutorial 13 Web Caching Protocols ICP, CARP.
Design and Implementation of a Server Director Project for the LCCN Lab at the Technion.
1 The Mystery of Cooperative Web Caching 2 b b Web caching : is a process implemented by a caching proxy to improve the efficiency of the web. It reduces.
Chapter 9 Classification And Forwarding. Outline.
Hash, Don’t Cache: Fast Packet Forwarding for Enterprise Edge Routers Minlan Yu Princeton University Joint work with Jennifer.
CS 6401 Efficient Addressing Outline Addressing Subnetting Supernetting.
CN2668 Routers and Switches Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
OpenFlow-Based Server Load Balancing GoneWild Author : Richard Wang, Dana Butnariu, Jennifer Rexford Publisher : Hot-ICE'11 Proceedings of the 11th USENIX.
Adaptive flow control via Interest Aggregation in CCN by Dojun Byun, Byoung-joon, Myeong-Wuk Jang Samsung Electronics, Advanced Institute of Technology.
CEN Network Fundamentals Chapter 19 Binding Protocol Addresses (ARP) To insert your company logo on this slide From the Insert Menu Select “Picture”
Authors: Shuai Ding, Zhen Chen, and Zhi Liu Publisher: ICNDC 2012 Presenter: Chai-Yi Chu Date: 2013/03/20 1.
1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
Authors: Yi Wang, Tian Pan, Zhian Mi, Huichen Dai, Xiaoyu Guo, Ting Zhang, Bin Liu, and Qunfeng Dong Publisher: INFOCOM 2013 mini Presenter: Chai-Yi Chu.
The Anatomy of a Large-Scale Hypertextual Web Search Engine Presented By: Sibin G. Peter Instructor: Dr. R.M.Verma.
(ANCS 2013) Named data networking on a router: fast and dos-resistant forwarding with hash tables Authors: Won So, Ashok Narayanan, David Oran (Cisco Systems)
Scalable Name Lookup in NDN Using Effective Name Component Encoding
ComNets Tutorial: Future Internet with Information Centric Networks Asanga Udugama (1), Carmelita Goerg (1) and Andreas Timm-Giel (2) (1) Communications.
Compact Data Structures and Applications Gil Einziger and Roy Friedman Technion, Haifa.
Author: Haoyu Song, Fang Hao, Murali Kodialam, T.V. Lakshman Publisher: IEEE INFOCOM 2009 Presenter: Chin-Chung Pan Date: 2009/12/09.
Scalable Web Server on Heterogeneous Cluster CHEN Ge.
A NAMED DATA NETWORKING FLEXIBLE FRAMEWORK FOR MANAGEMENT COMMUNICATION Authors: Daneil Corjuo and Rui L. Aguiar Ivan Vidal and Jamie Garcia-Reinoso Presented.
Towards a Billion Routing Lookups per Second in Software  Author: Marko Zec, Luigi, Rizzo Miljenko Mikuc  Publisher: SIGCOMM Computer Communication Review,
Review of the literature : DMND:Collecting Data from Mobiles Using Named Data Takashima Daiki Park Lab, Waseda University, Japan 1/15.
Multi-Field Range Encoding for Packet Classification in TCAM Author: Yeim-Kuan Chang, Chun-I Lee and Cheng-Chien Su Publisher: INFOCOM 2011 Presenter:
Running large scale experimentation on Content-Centric Networking via the Grid’5000 platform Massimo GALLO (Bell Labs, Alcatel - Lucent) Joint work with:
Routing Policies in Named Data Networking Steve DiBenedetto Christos Papadopoulos Dan Massey.
Authors: Matteo Varvello, Diego Perino, and Leonardo Linguaglossa Publisher: NOMEN 2013 (The 2nd IEEE International Workshop on Emerging Design Choices.
IP1 The Underlying Technologies. What is inside the Internet? Or What are the key underlying technologies that make it work so successfully? –Packet Switching.
Authors: Haowei Yuan and Patrick Crowley Publisher: 2013 Proceedings IEEE INFOCOM Presenter: Chia-Yi Chu Date: 2013/08/14 1.
Jennifer Rexford Princeton University MW 11:00am-12:20pm Measurement COS 597E: Software Defined Networking.
Multimedia & Mobile Communications Lab.
Open-Eye Georgios Androulidakis National Technical University of Athens.
Freenet “…an adaptive peer-to-peer network application that permits the publication, replication, and retrieval of data while protecting the anonymity.
Bloom Cookies: Web Search Personalization without User Tracking Authors: Nitesh Mor, Oriana Riva, Suman Nath, and John Kubiatowicz Presented by Ben Summers.
CS 6401 Overlay Networks Outline Overlay networks overview Routing overlays Resilient Overlay Networks Content Distribution Networks.
Hyperion :High Volume Stream Archival Divya Muthukumaran.
Zhaogeng Li, Jun Bi, Sen Wang, and Xiaoke Jiang Asia FI Workshop in Kyoto, 2012 Sho Harada Park Lab Nov 29 th, 2012.
Packet Classification Using Multi- Iteration RFC Author: Chun-Hui Tsai, Hung-Mao Chu, Pi-Chung Wang Publisher: 2013 IEEE 37th Annual Computer Software.
1 Copyright © 2008, Oracle. All rights reserved. Repository Basics.
Chapter 27 Network Management Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
BUFFALO: Bloom Filter Forwarding Architecture for Large Organizations Minlan Yu Princeton University Joint work with Alex Fabrikant,
Fast Forwarding for NDN Won So Ashok Narayanan Mark Stapp Cisco Systems IETF ICNRG, 31/7/2013, Berlin.
Hardware accelerator to speed up packet processing in NDN router
ECE 544 Protocol Design Project 2016
Improving the Freshness of NDN Forwarding States
Kalyan Boggavarapu Lehigh University
Statistical Optimal Hash-based Longest Prefix Match
Ch 17 - Binding Protocol Addresses
Presentation transcript:

Authors: Haowei Yuan, Tian Song, and Patrick Crowley Publisher: ICCCN 2012 Presenter: Chai-Yi Chu Date: 2013/05/22 1

 Introduction  The NDN Forwarding Plane  The CCNx Performance Study  Issues in Scalable NDN Forwarding  Design Principles 2

 An NDN software prototype, CCNx.  Present an experimental evaluation of the current CCNx implementation.  Description of the major data structures and algorithms used in CCNx.  Analyze and simplify the packet forwarding operations in CCNx and NDN. 3

 Decides what to do for each incoming packet.  Can be divided into multiple layers based on the functions: 1.The strategy layer  Selects forwarding strategies and impacts the forwarding decisions. 2.The data forwarding layer  Packet forwarding, pending Interest management and temporary content storing. 3.The transport layer  Handles network communication. 4

5

 Study was conducted in the Open Network Laboratory (ONL)  The CCNx implementation evaluated in this work is ccnx-0.4.0, released on September 15, ◦ compiled using gcc with optimization level -O4. ◦ The core component, ccnd, is configured with all default environment variable values. ◦ The Content Store size is set at the default value of 50, 000 6

7

 To generate CCNx traffic, the built-in ccncatchunks2 and our ccndelphi programs are used as the client program and server program. ◦ ccncatchunks2: generates a sequence of Interest packets to fetch a large file. ◦ ccndelphi: generates Data packets with random payloads, and it is designed to send back Data packets as soon as possible. 8

 Throughput values are sampled every 1 second. For each experimental configuration, we select top 20 throughput values to compute the average peak throughput and calculate a 90% confidence interval.  Two experimental configurations were used for measuring CCNx router peak throughput: 1.every client requests a different file  ccnx:/i/chunk, i = 0…15, chunk starts with value 0 and increases by 1 for each generated Interest request. 2.all clients request the same file  ccnx:/0/chunk 9

10

11

 Use Gprof to profile the saturated ccnd daemon. ◦ ccnd daemon, which implements the packet forwarding plane. ◦ more than 60% of the time was taken by unctions related to packet name decoding. ◦ ccn_skeleton_decode function, which is the lowest level packet decoding function, takes 35.46%. 12

13

 The logical FIB and PIT share a hash table named Name Prefix Hash Table (NPHT), which indexes the Propagating Entries(PEs) and Forwarding Info Entries (FIEs). ◦ the structures storing detailed pending Interest information and forwarding information  Each bucket in the NPHT has pointers pointing to PEs and FIEs 14

 The Propagating Hash Table (PHT) is keyed by the nonce field ◦ which is unique for each Interest packet. ◦ Stores all the nonce field of the Interest packets presented in PIT (in the form of PEs). 15

 For Content Store, each Data packet is assigned a unique accession number  The cached Data packets are stored in an array named Content Array (CA) indexed by the accession numbers.  Old but popular Data packet whose accession number is out of the range that CA supports. ◦ These packets are stored in the Straggler Hash Table (SHT) to save space 16

 Two data structures summarize the Content Store, namely 1. Content Hash Table (CHT) ◦ a hash table keyed by the Data packet full name 2. Content Skip List (CSL) ◦ a standard implementation of the skip list data structure 17

18

19

20

21

 Simplified Data Structures and Operational Flows 22

23

 Key Issues to Be Solved ◦ Exact string matching with fast updates  In PIT & CS ◦ Longest prefix matching for variable-length and unbounded names  In FIB ◦ Large-scale flow maintenance  similar to IP network per-flow monitoring  {name, incoming interfaceID, outgoing interfaceID} 24

25

26

 Aim for constant-time operations  URL-format for Optimization ◦ names in NDN have a format similar to HTTP URLs  Simple Data Structures for Fast Updates ◦ include hash tables, d-left hash tables and counting bloom filters.  Efficient Packet Encoding/Decoding ◦ a complicated XML format to encode packets  develop a quickly and efficiently packet decoding algorithm  Different Content Store Policies 27