2013
DOI: 10.1109/tc.2012.155
|View full text |Cite
|
Sign up to set email alerts
|

Reconfigurable Data Planes for Scalable Network Virtualization

Abstract: Network virtualization presents a powerful approach to share physical network infrastructure among multiple virtual networks. Recent advances in network virtualization advocate the use of field-programmable gate arrays (FPGAs) as flexible high performance alternatives to conventional host virtualization techniques. However, the limited on-chip logic and memory resources in FPGAs severely restrict the scalability of the virtualization platform and necessitate the implementation of efficient forwarding structure… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2014
2014
2017
2017

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 11 publications
(9 citation statements)
references
References 20 publications
0
9
0
Order By: Relevance
“…This approach was demonstrated for networking applications for protocol and packet filtering modules in the context of virtual networking [195]. Similarly, entire modules used for SQL database query operations were dynamically configured in milliseconds to enhance application performance [196].…”
Section: Rtr Applicationsmentioning
confidence: 99%
“…This approach was demonstrated for networking applications for protocol and packet filtering modules in the context of virtual networking [195]. Similarly, entire modules used for SQL database query operations were dynamically configured in milliseconds to enhance application performance [196].…”
Section: Rtr Applicationsmentioning
confidence: 99%
“…Depending on the type of matching (i.e., BM versus MM), the complexity of determining the involved UR is substantially different. This determines requirement (2). For the case of BM, each UR maps to exactly one different UV, resulting in |UR| = |UV|.…”
Section: Comparison Of Lookup Schemesmentioning
confidence: 99%
“…Port is the value of the incoming key and is propagated through the tree pipeline. Port ctrl in, meanwhile, holds (1) values key value to be compared against the key at each node, (2) branching information next or urid, and (3) the flag , which tells if a match has been found for the incoming key. In general, any node should be able to store both next node and URID values for the MM case, since multiple matches can occur while traversing the tree.…”
Section: Binary Search Treementioning
confidence: 99%
See 2 more Smart Citations