2010
DOI: 10.1109/tpds.2008.216
|View full text |Cite
|
Sign up to set email alerts
|

Complete Redundancy Removal for Packet Classifiers in TCAMs

Abstract: Abstract-Packet classification is the core mechanism that enables many networking services on the Internet such as firewall packet filtering and traffic accounting. Using Ternary Content Addressable Memories (TCAMs) to perform high-speed packet classification has become the de facto standard in the industry. TCAMs classify packets in constant time by comparing a packet with all classification rules of ternary encoding in parallel. Despite their high speed, TCAMs suffer from the well-known interval expansion pr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
34
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
5
3
2

Relationship

1
9

Authors

Journals

citations
Cited by 55 publications
(35 citation statements)
references
References 37 publications
(52 reference statements)
0
34
0
Order By: Relevance
“…An algorithm of polynomial time optimal was proposed for the weighted onedimensional prefix compression problem of Access control lists by means of dynamic programming [6] [15]. This algorithm is on the basis of three explanations such as: initially the last rule of g can forever have its predicate altered to a defaulting predicate and this alteration is potential for the reason that g is absolute and as a result extending the assortment of the interval of last rule cannot modify the semantics of g. An added default rule to g can be appended devoid of altering the semantics of the consequential access control lists [9].…”
Section: Methodsmentioning
confidence: 99%
“…An algorithm of polynomial time optimal was proposed for the weighted onedimensional prefix compression problem of Access control lists by means of dynamic programming [6] [15]. This algorithm is on the basis of three explanations such as: initially the last rule of g can forever have its predicate altered to a defaulting predicate and this alteration is potential for the reason that g is absolute and as a result extending the assortment of the interval of last rule cannot modify the semantics of g. An added default rule to g can be appended devoid of altering the semantics of the consequential access control lists [9].…”
Section: Methodsmentioning
confidence: 99%
“…The redundant rules are classified into downward redundant rules and upward redundant rules and they formally conclude that after executing the two algorithms, resulting classifiers have no redundant rules. TCAMs are widely used but they are costly and their power consumption is very high [5].…”
Section: Working Of Firewallmentioning
confidence: 99%
“…All prior TCAM-based classifier compression schemes (i.e., [3], [6], [7], [13], [16], [23]) suffer from one fundamental limitation: they only produce prefix classifiers, which means they all miss some opportunities for compression. A prefix classifier is a classifier in which every rule is a prefix rule.…”
Section: Limitations Of Prior Artmentioning
confidence: 99%