Study of Rule Placement Schemes for Minimizing TCAM Space and Effective Bandwidth Utilization in SDN

Yen-Wen Chen, Yu-Hsuan Lin
{"title":"Study of Rule Placement Schemes for Minimizing TCAM Space and Effective Bandwidth Utilization in SDN","authors":"Yen-Wen Chen, Yu-Hsuan Lin","doi":"10.1109/W-FICLOUD.2018.00010","DOIUrl":null,"url":null,"abstract":"Software Defined Networking (SDN) provides flexible route arrangement and specific packets processing through the resided flow table. The flow table is always implemented by using ternary content addressable memory (TCAM) for fast packet matching and forwarding. In addition to the route information, TCAM provides packet processing rules to deal with packet redirection, filtering, and dropping for network security consideration. The packet filtering rules are also placed in the flow table of a specific SDN switch that the packet will pass through. If the rule can be placed at the switch that most packets are aggregated, then it will save the overall TCAM utilization. However, it will consume more link bandwidth, if the packet shall be dropped before it reaches the switch that the associated rule is placed. This paper proposes the rule placement scheme by considering the tradeoff of TCAM space utilization and the bandwidth consumption in SDN networks. Practical network topologies were adopted for exhaustive simulations. The simulation results show that the proposed scheme achieves the desired objective.","PeriodicalId":218683,"journal":{"name":"2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 6th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/W-FICLOUD.2018.00010","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

Software Defined Networking (SDN) provides flexible route arrangement and specific packets processing through the resided flow table. The flow table is always implemented by using ternary content addressable memory (TCAM) for fast packet matching and forwarding. In addition to the route information, TCAM provides packet processing rules to deal with packet redirection, filtering, and dropping for network security consideration. The packet filtering rules are also placed in the flow table of a specific SDN switch that the packet will pass through. If the rule can be placed at the switch that most packets are aggregated, then it will save the overall TCAM utilization. However, it will consume more link bandwidth, if the packet shall be dropped before it reaches the switch that the associated rule is placed. This paper proposes the rule placement scheme by considering the tradeoff of TCAM space utilization and the bandwidth consumption in SDN networks. Practical network topologies were adopted for exhaustive simulations. The simulation results show that the proposed scheme achieves the desired objective.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
SDN中最小化TCAM空间和有效带宽利用率的规则放置方案研究
SDN (Software Defined Networking)通过驻留流表提供灵活的路由安排和特定的报文处理。流表通常使用三元内容可寻址存储器(TCAM)来实现数据包的快速匹配和转发。除了路由信息外,TCAM还提供了数据包处理规则,用于处理数据包的重定向、过滤和丢弃,以保证网络安全。包过滤规则也被放置在数据包将经过的特定SDN交换机的流表中。如果规则可以放在大多数数据包聚合的交换机上,那么它将节省总体TCAM利用率。但是,如果在数据包到达放置关联规则的交换机之前将其丢弃,则会消耗更多的链路带宽。本文提出了在SDN网络中权衡TCAM空间利用率和带宽消耗的规则放置方案。采用实际的网络拓扑进行了详尽的仿真。仿真结果表明,该方案达到了预期目标。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Battling the Fear of Public Speaking: Designing Software as a Service Solution for a Virtual Reality Therapy Study of Rule Placement Schemes for Minimizing TCAM Space and Effective Bandwidth Utilization in SDN A Proxy-Based Query Aggregation Method for Distributed Key-Value Stores Social Engineering: Application of Psychology to Information Security Design and Implementation of a Mobile Device for Blood Glucose Level Assessment
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1