2012
DOI: 10.1109/tnet.2011.2165323
|View full text |Cite
|
Sign up to set email alerts
|

Bit Weaving: A Non-Prefix Approach to Compressing Packet Classifiers in TCAMs

Abstract: Abstract-Ternary Content Addressable Memories (TCAMs) have become the de facto standard in industry for fast packet classification. Unfortunately, TCAMs have limitations of small capacity, high power consumption, high heat generation, and high cost. The well-known range expansion problem exacerbates these limitations as each classifier rule typically has to be converted to multiple TCAM rules. One method for coping with these limitations is to use compression schemes to reduce the number of TCAM rules required… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
48
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 139 publications
(48 citation statements)
references
References 27 publications
0
48
0
Order By: Relevance
“…Wildcard-based compression for ACLs is considered in [21]. It uses a heuristic that runs in polynomial time which is based on two functions: bit swapping and bit merging.…”
Section: Openflow-based Sdn For Carrier Networkmentioning
confidence: 99%
“…Wildcard-based compression for ACLs is considered in [21]. It uses a heuristic that runs in polynomial time which is based on two functions: bit swapping and bit merging.…”
Section: Openflow-based Sdn For Carrier Networkmentioning
confidence: 99%
“…Further, there are three paths A, B, and C traversing a switch. All three paths have these two rules in their ingress port policies, one of which is a permit rule r 1 with matching field of src: 10 Figure 5. If we decide to share the three rules, there will be a circular dependency since we have to put r 1 before r 2 for path A and B but the order is reversed for path C; otherwise, the semantics of the policies will not be obeyed.…”
Section: B Rule Mergingmentioning
confidence: 99%
“…These range from rule compression systems on single switches [7], [8], [9], [10], [11], [12], distributing ACL policies on network edge switches [13], distributing ACL policies while also changing routing on internal switches [14], as well as distributing ACL policies while respecting a separate routing module [1], [15]. Most approaches follow the idea of representing ACL policies using multi-dimensional packet (or flow) spaces, computing covers in some multi-dimensional packet space that corresponds to optimized rules, and distributing such covers over network paths.…”
Section: Introductionmentioning
confidence: 99%
“…This work has used one of two types of techniques: equivalent transformation [2,6,13,14,16,21] and reencoding [4,5,9,15,17,19,25]. In equivalent transformation, the goal is to convert a given d-dimensional classifier into a semantically equivalent d-dimensional classifier with fewer TCAM entries.…”
Section: Comparison To Previous Workmentioning
confidence: 99%