Escolar Documentos
Profissional Documentos
Cultura Documentos
2010
International Conference on Ultra Modern Telecommunications, 18-20 October 2010, Moscow (Russia), pp. 335-342, ISSN: 2157-0221, print
ISBN 978-1-4244-7285-7, DOI: 10.1109/ICUMT.2010.5676616 Authors private draft do not distribute
I. INTRODUCTION
Pier Luca Montessoro, Distributed Linked Data Structures for Efficient Access to Information within Routers, Proceedings of IEEE 2010
International Conference on Ultra Modern Telecommunications, 18-20 October 2010, Moscow (Russia), pp. 335-342, ISSN: 2157-0221, print
ISBN 978-1-4244-7285-7, DOI: 10.1109/ICUMT.2010.5676616 Authors private draft do not distribute
must match the one stored in the table. For example, the
destination address contained in the { destination address,
output port } pair retrieved from the routing table must match
the destination address stored in the packet. Or, for a flow
oriented or virtual circuit routing, the flow/circuit ID in the
table must match the ID in the packet.
Figure 2 shows what happens in case of mismatch due to a
route change. The same array of pointers seen in Figure 1 is
rerouted through router R3 instead of R2. The integrity check
fails because (in the same example as above) the destination
stored in the packet does not match the one found in the
addressed routing table entry. The pointers within the packet
are invalidated and this will trigger a new pointer collection
procedure at the end nodes. Please note the importance, in the
integrity check, of the verification that the pointer is within
the range mentioned above. In a router different from the
correct one the table can be smaller and a memory access
violation can occur. Another range that must be checked is the
hop counter vs. the size of the array of pointers: if a route
change makes the path become longer than the original one,
the pointer selection must fail if the hop counter exceeds the
number of pointers stored in the packet.
B. Stateful routers
The stateless approach does not require any additional
information to be stored within the routers, but the packet
must make room for an array whose size increases linearly
with the route length. If some per-flow information is already
(or can be) stored in the router tables, the pointers can be
stored in these tables too, reducing the packet size increase to
a single pointer.
Figure 3 shows an example of such a DLDS for stateful
routers for the same network depicted above. Each time a
DLDS-aware packet traverse a router, the pointer it contains is
used to access both the information and the next pointer; then,
the next pointer is copied in the packet to replace the one just
used.
Stateful approaches suffer the problem of possible obsolete
entries that must be identified and removed. Benefits and
limitations of hard and soft state approaches have been
discussed in literature [5] and lie beyond the purpose of this
paper. However, for our purposes, a simple and effective
solution is using a soft-state approach, providing a time stamp
associated to each table entry that is updated each time a
packet addresses that entry. A background, low-priority
process is used to cleanup the table removing the entries
whose timestamps are older than a given threshold.
The integrity check for the stateful approach is simpler than
the stateless one since the hop counter is no longer used. If a
route change occurs in the middle of the path, the information
accessed using the next pointer will not match, as shown in
Figure 4. If a route change affects the last hop, the next
Pier Luca Montessoro, Distributed Linked Data Structures for Efficient Access to Information within Routers, Proceedings of IEEE 2010
International Conference on Ultra Modern Telecommunications, 18-20 October 2010, Moscow (Russia), pp. 335-342, ISSN: 2157-0221, print
ISBN 978-1-4244-7285-7, DOI: 10.1109/ICUMT.2010.5676616 Authors private draft do not distribute
Pier Luca Montessoro, Distributed Linked Data Structures for Efficient Access to Information within Routers, Proceedings of IEEE 2010
International Conference on Ultra Modern Telecommunications, 18-20 October 2010, Moscow (Russia), pp. 335-342, ISSN: 2157-0221, print
ISBN 978-1-4244-7285-7, DOI: 10.1109/ICUMT.2010.5676616 Authors private draft do not distribute
Pier Luca Montessoro, Distributed Linked Data Structures for Efficient Access to Information within Routers, Proceedings of IEEE 2010
International Conference on Ultra Modern Telecommunications, 18-20 October 2010, Moscow (Russia), pp. 335-342, ISSN: 2157-0221, print
ISBN 978-1-4244-7285-7, DOI: 10.1109/ICUMT.2010.5676616 Authors private draft do not distribute
Pier Luca Montessoro, Distributed Linked Data Structures for Efficient Access to Information within Routers, Proceedings of IEEE 2010
International Conference on Ultra Modern Telecommunications, 18-20 October 2010, Moscow (Russia), pp. 335-342, ISSN: 2157-0221, print
ISBN 978-1-4244-7285-7, DOI: 10.1109/ICUMT.2010.5676616 Authors private draft do not distribute
TABLE I
ESTIMATED NUMBER OF PACKETS FOR COMMON FILE TRANSFERS AND
MULTIMEDIA STREAMS
Data type
Bitrate
size (kB)
(still)
1,500
128 kb/s
3,840
300 kb/s
135,000
1Mb/s
450,000
4 Mb/s
1,800,000
#packets
1,000
2,560
90,000
300,000
1,200,000
Pier Luca Montessoro, Distributed Linked Data Structures for Efficient Access to Information within Routers, Proceedings of IEEE 2010
International Conference on Ultra Modern Telecommunications, 18-20 October 2010, Moscow (Russia), pp. 335-342, ISSN: 2157-0221, print
ISBN 978-1-4244-7285-7, DOI: 10.1109/ICUMT.2010.5676616 Authors private draft do not distribute
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
A
R3
R1
B
packet
3 2 4
0
1
2
3
4
R2
R4
Router R1 table
0
1
2
3
4
0
1
2
3
4
Router R2 table
Router R4 table
Fig. 1. The basic idea: packets traversing the routers belonging to a path contain memory pointers for direct access to stored information. The hop
counter is used to select the memory pointer to be used.
Pier Luca Montessoro, Distributed Linked Data Structures for Efficient Access to Information within Routers, Proceedings of IEEE 2010
International Conference on Ultra Modern Telecommunications, 18-20 October 2010, Moscow (Russia), pp. 335-342, ISSN: 2157-0221, print
ISBN 978-1-4244-7285-7, DOI: 10.1109/ICUMT.2010.5676616 Authors private draft do not distribute
?
A
0
1
2
3
4
packet
3 2 4
R3
Router R3 table
R1
B
0
1
2
3
4
R2
R4
Router R1 table
0
1
2
3
4
0
1
2
3
4
Router R2 table
Router R4 table
Fig. 2. After a route change some memory pointer will be out of range or will address wrong information. The target information stored in the
packet does not match the one addressed in the routers table. Mode is switched back to conventional lookup and pointers are reset.
?
A
0
1
2
3
4
packet
packet
R3
Router R3 table
R1
B
0
1
2
3
4
R2
R4
2
Router R1 table
0
1
2
3
4
4
Router R2 table
0
1
2
3
4
Router R4 table
Pier Luca Montessoro, Distributed Linked Data Structures for Efficient Access to Information within Routers, Proceedings of IEEE 2010
International Conference on Ultra Modern Telecommunications, 18-20 October 2010, Moscow (Russia), pp. 335-342, ISSN: 2157-0221, print
ISBN 978-1-4244-7285-7, DOI: 10.1109/ICUMT.2010.5676616 Authors private draft do not distribute
packet
R3
3
R1
packet
2
0
1
2
3
4
packet
4
R2
R4
2
Router R1 table
0
1
2
3
4
4
Router R2 table
0
1
2
3
4
Router R4 table
Fig. 3. Stateful routers: the next pointer is stored in the routers table and copied in the packet when it traverses the router.