2018 IEEE Symposium on Computers and Communications (ISCC) 2018
DOI: 10.1109/iscc.2018.8538522
|View full text |Cite
|
Sign up to set email alerts
|

CNOR: A Non-Overlapping Wildcard Rule Caching System for Software-Defined Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
24
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(24 citation statements)
references
References 18 publications
0
24
0
Order By: Relevance
“…The performance of HBD is evaluated through simulation, and three other algorithms are implemented for comparison, which includes: (1) the naive exact dispatching approach; (2) a dependency-based algorithm that works in reactive mode, copies the strategy of Cover-set [12] , and treats the hits on the cover sets as cache misses (We refer to it as DependencyBased Dispatching, DBD); and (3) the cache rule generation algorithm used in CAB [16] .…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…The performance of HBD is evaluated through simulation, and three other algorithms are implemented for comparison, which includes: (1) the naive exact dispatching approach; (2) a dependency-based algorithm that works in reactive mode, copies the strategy of Cover-set [12] , and treats the hits on the cover sets as cache misses (We refer to it as DependencyBased Dispatching, DBD); and (3) the cache rule generation algorithm used in CAB [16] .…”
Section: Discussionmentioning
confidence: 99%
“…(3) Cut-based algorithm: As one latest work targeting at reactive rule dispatching, CAching in Buckets (CAB) [16] dispatches a set of buckets associated with their overlapped rules, and implements a two-stage table pipeline in the forwarding device. The bucket generation procedure, which directly affects cache performance, shares similarity with space decomposition based packet classification algorithms such as HiCuts [17] and HyperCuts [18] .…”
Section: Prior Algorithmsmentioning
confidence: 99%
“…Many SDN applications rely on sophisticated packet processing and advanced pipelining. Examples include source address validation [9], d-dimensional packet classification [10], wildcard rule caching [11], controller modularization or hierarchical network management [12]. The available hardware, on the other hand, does not necessarily support all required capabilities.…”
Section: Background and Related Workmentioning
confidence: 99%
“…The caching system for the SDN based on the wildcard rules, called CAching in Buckets (CAB), is presented in [101]. The basic idea of the CAB is the partitioning of the field into logical structures, called bucket, and bucket caching along with the associated rules.…”
Section: A Performancementioning
confidence: 99%