SlideShare a Scribd company logo
1 of 4
Download to read offline
A Review of
IP Address lookup using bit-shuffled trie
October 14, 2015
Submitted By:
Name: Sunawar Khan
Reg No. : 813-MSCS-F14
Research Paper Authors:
Author 1: Derek Pao
Author 2: Zian Lu
Author 3: yat Hang Poon
About Research Paper:
Volume No: 47
Cited: 3
1 What This Paper Tells Us?
In this paper, a new algorithm introduced to save RAM Memory when ip
address looked up this method is called bit-shuffled trie. About this we
discuss in later section to describe this, which differeent bits are rearranged
to create new index table. The Momory cost for a 474K prefix IPv4 routing
table is only 1.1 MB and the momory cost for a 215 K 64-Bit Prefixes IPv6
routing table. For this purpose FGPA device is used. A field-programmable
gate array (FPGA) is an integrated circuit (IC) that can be programmed in
the field after manufacture.
1
2 Motivtion
The IP Lookup problem can be build upon on the basis over Binary-Trie.
Multibit-trie is ussed where mutliple bits of the input address are processed.
the number of bits processed in a sterp is called Stride width.
There are differnt casses for LMP of an input address against a set of
prefixes.
1. Prefix inthe rouring table are divided into 6 groups. and it can be
eliminated, and no reference pointers are required in the bitmap structures.
2. All prefixes in a group have a minimun length of Lmin bits.
3. separate hardware pipelines are used to seach 6 groups of prefixs in
parallel.
Bit Shuffled trie is motivated by multibit trie on the basis of folow-
ing reasons.
1. In the conventional multibit-trie, bits of the input address are processed
from left to right. in bit-shuffled in some other order.
2. In the conventional multibit trie, where prefixes are expanded to some
predefined are divided into several lenghts.
3. Prefix expansion require in multibit-trie, where prefixes are expanded
to some predefined discrete length.
3 Approach
There are three algortihm propoed for this approach named as IP Lookup,
other is trie-based approach and the third approach is range search approach.
IP lookup is essential because routing table size mantain the order of half
million devices entries. Memorey is primary resource required. FGPA more
or less fully used. here we discuss memory cost methods.
i. Trie-Based Approach As we discuss above searching problem mod-
eled over a binary trie. some of the well know trie-based methods have very
compact data structures e.g. LC-Trie. and the shape shifting trie. Processing
of a node may require iterative operations.
Other design constraints in hardware implementations for example com-
plexity of hardware circut. here are some reasons for desirable for hardware
IP Lookup engine:
i. the method use simple data structure that are ease to interpret
ii. simple operations are involved.
2
iii. the method gurantees to finish in a fixed number of steps.
Lim et al. proposed a variant of trie-based method called priority-trie.
In this empty nodes are replace on the basis of priority prefixes.
Hsieh and yang proposed a method called classified multisuffix trie which
is a varient of multi-bit trie.
ii. Range-search approach. A prefix corresponds to a range on the
number line. To find the longest matching prefix for an input address is
equivalent to finding the most specify range that encloses the input value.
iii.Hashing-based approachUsing hash tables to solve the IP lookup
problem, a hash function operates on fixed-length keys, there is one hash
table for each possible prefix length in the basic scheme.
4 Techniquer Enhanced
Bit-shuffled trieDifferent table are use to get result.
The shortest prefix length is 8 bits, and the longest prefix length is 32
bits. In the proposed method, prefixes in the routing table are divided into
6 groups by length
Bits 1 to 21 constitute the fixed-length portion, and bits 22 to 24 are
called the extension bits.
The hardware pipeline contains 4 stages, and the data fields. In the first
two pipeline stages, a certain number of bits are extracted from the input
bit-vector to form the address for accessing the internal index table, and the
remaining bits are packed before passing onto the next pipeline stage. We
call this operation bit-shuffling.
i. Bit-Shuffle and bit extract circuir, and the subtree processing
module. In this approach two basic operations, bit-shuffle and bit-extract.
A common first stage bit-shuffle operation is applied to all prefixes in a
length-group. Hence, the first stage bit-shuffle circuit can be implemented
using multiplexors (MUXs).
ii. Dimension of lookup tables and selection of bitsMultiple pre-
fixes may share common leading 21-bit values.The procedure to determine
the selected bits.
Block overlaying and block compactionThe bit-shuffling and index-
ing operations effectively divide the group of prefixes into subsets, where
each subset has a small number of items. The items in a subset can then be
further distinguished by selecting a few bits from the residue prefix.
3
5 Performance Evaluation
i. Hardware Implement Cost We evaluate the memory cost of the pro-
posed method.
ii. Incremental update to the routing tableA few studies have
focused on the incremental update issue of IP lookup.In this section we study
dynamic updates to the bit-shuffled trie. There can be three types of updates
to the routing table, i. modification of the next-hop value associated with a
prefix, ii. insertion of a new prefix, iii. deletion of an existing prefix.
Extension to the IPv6 lookup.The 128-bit IPv6 address is logically
divided into 2 parts, the leading 64 bits correspond to the network address
and the remaining 64 bits correspond to the host ID.In principle we can
divide the prefixes into 12 length-groups where each length-group covers a
range of 4 bits as in the case for IPv4.
6 What We Get
.A simple and elegant pipelined architecture for IPv4 and IPv6 lookup is
presented. When the size of the IPv4 table is further increased, the density
of the 21 to 24 bits prefixes will become higher and we can expect to have
more prefixes encoded in a ST-vector. As a result, the memory efficiency
of the bit-shuffled trie method in terms of bits per prefix may be further
improved.
4

More Related Content

What's hot

SIMILARITY SEARCH FOR TRAJECTORIES OF RFID TAGS IN SUPPLY CHAIN TRAFFIC
SIMILARITY SEARCH FOR TRAJECTORIES OF RFID TAGS IN SUPPLY CHAIN TRAFFICSIMILARITY SEARCH FOR TRAJECTORIES OF RFID TAGS IN SUPPLY CHAIN TRAFFIC
SIMILARITY SEARCH FOR TRAJECTORIES OF RFID TAGS IN SUPPLY CHAIN TRAFFICijdms
 
Internet Protocol Version 6 By Suvo 2002
Internet Protocol Version 6 By Suvo 2002Internet Protocol Version 6 By Suvo 2002
Internet Protocol Version 6 By Suvo 2002suvobgd
 
I pv6(internet protocol version 6)
I pv6(internet protocol version 6)I pv6(internet protocol version 6)
I pv6(internet protocol version 6)Subrata Kumer Paul
 
Ipv4 packet structure
Ipv4 packet structureIpv4 packet structure
Ipv4 packet structurevlsirajagopal
 
Networking presentation 9 march 2009
Networking presentation   9 march 2009Networking presentation   9 march 2009
Networking presentation 9 march 2009Kinshook Chaturvedi
 
logical addressing
logical addressinglogical addressing
logical addressingSagar Gor
 
6 ccna (fundamentals of i pv4 addressing and routing)
6  ccna (fundamentals of i pv4 addressing and routing)6  ccna (fundamentals of i pv4 addressing and routing)
6 ccna (fundamentals of i pv4 addressing and routing)Ulaş Ural
 
IPv6 - The Next next generation protocol
IPv6 - The Next next generation protocolIPv6 - The Next next generation protocol
IPv6 - The Next next generation protocolMohit Sharma
 
2 logical addressing
2 logical addressing2 logical addressing
2 logical addressinggafurov_x
 
IPv4- Internet Protocol version 4
IPv4- Internet Protocol version 4IPv4- Internet Protocol version 4
IPv4- Internet Protocol version 4praveenps17
 
An efficient model for design of 64-bit High Speed Parallel Prefix VLSI adder
An efficient model for design of 64-bit High Speed Parallel Prefix VLSI adderAn efficient model for design of 64-bit High Speed Parallel Prefix VLSI adder
An efficient model for design of 64-bit High Speed Parallel Prefix VLSI adderIJMER
 
Ch 18 intro to network layer - section 4
Ch 18   intro to network layer - section 4Ch 18   intro to network layer - section 4
Ch 18 intro to network layer - section 4Hossam El-Deen Osama
 
Introduction to IP
Introduction to IPIntroduction to IP
Introduction to IPaibad ahmed
 

What's hot (20)

SIMILARITY SEARCH FOR TRAJECTORIES OF RFID TAGS IN SUPPLY CHAIN TRAFFIC
SIMILARITY SEARCH FOR TRAJECTORIES OF RFID TAGS IN SUPPLY CHAIN TRAFFICSIMILARITY SEARCH FOR TRAJECTORIES OF RFID TAGS IN SUPPLY CHAIN TRAFFIC
SIMILARITY SEARCH FOR TRAJECTORIES OF RFID TAGS IN SUPPLY CHAIN TRAFFIC
 
Internet Protocol Version 6 By Suvo 2002
Internet Protocol Version 6 By Suvo 2002Internet Protocol Version 6 By Suvo 2002
Internet Protocol Version 6 By Suvo 2002
 
I pv6(internet protocol version 6)
I pv6(internet protocol version 6)I pv6(internet protocol version 6)
I pv6(internet protocol version 6)
 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
 
I.p. protocol
I.p. protocolI.p. protocol
I.p. protocol
 
Ipv4 packet structure
Ipv4 packet structureIpv4 packet structure
Ipv4 packet structure
 
Networking presentation 9 march 2009
Networking presentation   9 march 2009Networking presentation   9 march 2009
Networking presentation 9 march 2009
 
logical addressing
logical addressinglogical addressing
logical addressing
 
ipv6 ppt
ipv6 pptipv6 ppt
ipv6 ppt
 
6 ccna (fundamentals of i pv4 addressing and routing)
6  ccna (fundamentals of i pv4 addressing and routing)6  ccna (fundamentals of i pv4 addressing and routing)
6 ccna (fundamentals of i pv4 addressing and routing)
 
IPv6 - The Next next generation protocol
IPv6 - The Next next generation protocolIPv6 - The Next next generation protocol
IPv6 - The Next next generation protocol
 
2 logical addressing
2 logical addressing2 logical addressing
2 logical addressing
 
IPv4- Internet Protocol version 4
IPv4- Internet Protocol version 4IPv4- Internet Protocol version 4
IPv4- Internet Protocol version 4
 
An efficient model for design of 64-bit High Speed Parallel Prefix VLSI adder
An efficient model for design of 64-bit High Speed Parallel Prefix VLSI adderAn efficient model for design of 64-bit High Speed Parallel Prefix VLSI adder
An efficient model for design of 64-bit High Speed Parallel Prefix VLSI adder
 
IPV4 Frame Format
IPV4 Frame FormatIPV4 Frame Format
IPV4 Frame Format
 
Ch 18 intro to network layer - section 4
Ch 18   intro to network layer - section 4Ch 18   intro to network layer - section 4
Ch 18 intro to network layer - section 4
 
Introduction to IP
Introduction to IPIntroduction to IP
Introduction to IP
 
Logical addressing
Logical  addressingLogical  addressing
Logical addressing
 
IP Datagram Structure
IP Datagram StructureIP Datagram Structure
IP Datagram Structure
 
Ipv4 and Ipv6
Ipv4 and Ipv6Ipv4 and Ipv6
Ipv4 and Ipv6
 

Similar to IP Address lookup using bit-shuffled trie=Article Review

IP Address Lookup By Using GPU
IP Address Lookup By Using GPUIP Address Lookup By Using GPU
IP Address Lookup By Using GPUJino Antony
 
Internet Protocol version 6
Internet Protocol version 6Internet Protocol version 6
Internet Protocol version 6Rekha Yadav
 
Icemc22010[1].bd siitdstm
Icemc22010[1].bd siitdstmIcemc22010[1].bd siitdstm
Icemc22010[1].bd siitdstmhanums1
 
Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...
Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...
Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...IOSR Journals
 
Iccsit2010 paper2
Iccsit2010 paper2Iccsit2010 paper2
Iccsit2010 paper2hanums1
 
Ch 19 Network-layer protocols Section 1
Ch 19  Network-layer protocols Section 1Ch 19  Network-layer protocols Section 1
Ch 19 Network-layer protocols Section 1Hossam El-Deen Osama
 
IPV6 EXPLANATION BY FOROUZANN DATA COMMUNICATION
IPV6  EXPLANATION BY FOROUZANN DATA COMMUNICATIONIPV6  EXPLANATION BY FOROUZANN DATA COMMUNICATION
IPV6 EXPLANATION BY FOROUZANN DATA COMMUNICATIONgopi5692
 
Unit 2- Next Generation IP-1.pptx
Unit 2- Next Generation IP-1.pptxUnit 2- Next Generation IP-1.pptx
Unit 2- Next Generation IP-1.pptxDESTROYER39
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Custom_IP_Network_Protocol_and_Router
Custom_IP_Network_Protocol_and_RouterCustom_IP_Network_Protocol_and_Router
Custom_IP_Network_Protocol_and_RouterVishal Vasudev
 
DCN 5th ed. slides ch22 Next Generation IP.pdf
DCN 5th ed. slides ch22 Next Generation IP.pdfDCN 5th ed. slides ch22 Next Generation IP.pdf
DCN 5th ed. slides ch22 Next Generation IP.pdfBilal Munir Mughal
 
Look at ipv6 security advantages over ipv4
Look at ipv6 security advantages over ipv4Look at ipv6 security advantages over ipv4
Look at ipv6 security advantages over ipv4Alexander Decker
 

Similar to IP Address lookup using bit-shuffled trie=Article Review (20)

Ip address lookup Bit Shuffle Trie
Ip address lookup Bit Shuffle TrieIp address lookup Bit Shuffle Trie
Ip address lookup Bit Shuffle Trie
 
IP Address Lookup By Using GPU
IP Address Lookup By Using GPUIP Address Lookup By Using GPU
IP Address Lookup By Using GPU
 
Internet Protocol version 6
Internet Protocol version 6Internet Protocol version 6
Internet Protocol version 6
 
Icemc22010[1].bd siitdstm
Icemc22010[1].bd siitdstmIcemc22010[1].bd siitdstm
Icemc22010[1].bd siitdstm
 
IPV6.ppt
IPV6.pptIPV6.ppt
IPV6.ppt
 
M017147275
M017147275M017147275
M017147275
 
Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...
Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...
Performance Evaluation of IPv4 Vs Ipv6 and Tunnelling Techniques Using Optimi...
 
Iccsit2010 paper2
Iccsit2010 paper2Iccsit2010 paper2
Iccsit2010 paper2
 
Ch 19 Network-layer protocols Section 1
Ch 19  Network-layer protocols Section 1Ch 19  Network-layer protocols Section 1
Ch 19 Network-layer protocols Section 1
 
IPV6 EXPLANATION BY FOROUZANN DATA COMMUNICATION
IPV6  EXPLANATION BY FOROUZANN DATA COMMUNICATIONIPV6  EXPLANATION BY FOROUZANN DATA COMMUNICATION
IPV6 EXPLANATION BY FOROUZANN DATA COMMUNICATION
 
IPv4.pdf
IPv4.pdfIPv4.pdf
IPv4.pdf
 
i pv6
i pv6i pv6
i pv6
 
Tcp ip
Tcp ipTcp ip
Tcp ip
 
Unit 2- Next Generation IP-1.pptx
Unit 2- Next Generation IP-1.pptxUnit 2- Next Generation IP-1.pptx
Unit 2- Next Generation IP-1.pptx
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
I pv6 mechanism
I pv6 mechanismI pv6 mechanism
I pv6 mechanism
 
Custom_IP_Network_Protocol_and_Router
Custom_IP_Network_Protocol_and_RouterCustom_IP_Network_Protocol_and_Router
Custom_IP_Network_Protocol_and_Router
 
Network Layer And I Pv6
Network Layer And I Pv6Network Layer And I Pv6
Network Layer And I Pv6
 
DCN 5th ed. slides ch22 Next Generation IP.pdf
DCN 5th ed. slides ch22 Next Generation IP.pdfDCN 5th ed. slides ch22 Next Generation IP.pdf
DCN 5th ed. slides ch22 Next Generation IP.pdf
 
Look at ipv6 security advantages over ipv4
Look at ipv6 security advantages over ipv4Look at ipv6 security advantages over ipv4
Look at ipv6 security advantages over ipv4
 

More from International Islamic University (20)

Hash tables
Hash tablesHash tables
Hash tables
 
Binary Search Tree
Binary Search TreeBinary Search Tree
Binary Search Tree
 
Graph 1
Graph 1Graph 1
Graph 1
 
Graph 2
Graph 2Graph 2
Graph 2
 
Graph 3
Graph 3Graph 3
Graph 3
 
Greedy algorithm
Greedy algorithmGreedy algorithm
Greedy algorithm
 
Dynamic programming
Dynamic programmingDynamic programming
Dynamic programming
 
Quick sort
Quick sortQuick sort
Quick sort
 
Merge sort
Merge sortMerge sort
Merge sort
 
Linear timesorting
Linear timesortingLinear timesorting
Linear timesorting
 
Facial Expression Recognitino
Facial Expression RecognitinoFacial Expression Recognitino
Facial Expression Recognitino
 
Lecture#4
Lecture#4Lecture#4
Lecture#4
 
Lecture#3
Lecture#3 Lecture#3
Lecture#3
 
Lecture#2
Lecture#2 Lecture#2
Lecture#2
 
Case study
Case studyCase study
Case study
 
Arrays
ArraysArrays
Arrays
 
Pcb
PcbPcb
Pcb
 
Data transmission
Data transmissionData transmission
Data transmission
 
Basic organization of computer
Basic organization of computerBasic organization of computer
Basic organization of computer
 
Sorting techniques
Sorting techniquesSorting techniques
Sorting techniques
 

Recently uploaded

MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 

Recently uploaded (20)

MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 

IP Address lookup using bit-shuffled trie=Article Review

  • 1. A Review of IP Address lookup using bit-shuffled trie October 14, 2015 Submitted By: Name: Sunawar Khan Reg No. : 813-MSCS-F14 Research Paper Authors: Author 1: Derek Pao Author 2: Zian Lu Author 3: yat Hang Poon About Research Paper: Volume No: 47 Cited: 3 1 What This Paper Tells Us? In this paper, a new algorithm introduced to save RAM Memory when ip address looked up this method is called bit-shuffled trie. About this we discuss in later section to describe this, which differeent bits are rearranged to create new index table. The Momory cost for a 474K prefix IPv4 routing table is only 1.1 MB and the momory cost for a 215 K 64-Bit Prefixes IPv6 routing table. For this purpose FGPA device is used. A field-programmable gate array (FPGA) is an integrated circuit (IC) that can be programmed in the field after manufacture. 1
  • 2. 2 Motivtion The IP Lookup problem can be build upon on the basis over Binary-Trie. Multibit-trie is ussed where mutliple bits of the input address are processed. the number of bits processed in a sterp is called Stride width. There are differnt casses for LMP of an input address against a set of prefixes. 1. Prefix inthe rouring table are divided into 6 groups. and it can be eliminated, and no reference pointers are required in the bitmap structures. 2. All prefixes in a group have a minimun length of Lmin bits. 3. separate hardware pipelines are used to seach 6 groups of prefixs in parallel. Bit Shuffled trie is motivated by multibit trie on the basis of folow- ing reasons. 1. In the conventional multibit-trie, bits of the input address are processed from left to right. in bit-shuffled in some other order. 2. In the conventional multibit trie, where prefixes are expanded to some predefined are divided into several lenghts. 3. Prefix expansion require in multibit-trie, where prefixes are expanded to some predefined discrete length. 3 Approach There are three algortihm propoed for this approach named as IP Lookup, other is trie-based approach and the third approach is range search approach. IP lookup is essential because routing table size mantain the order of half million devices entries. Memorey is primary resource required. FGPA more or less fully used. here we discuss memory cost methods. i. Trie-Based Approach As we discuss above searching problem mod- eled over a binary trie. some of the well know trie-based methods have very compact data structures e.g. LC-Trie. and the shape shifting trie. Processing of a node may require iterative operations. Other design constraints in hardware implementations for example com- plexity of hardware circut. here are some reasons for desirable for hardware IP Lookup engine: i. the method use simple data structure that are ease to interpret ii. simple operations are involved. 2
  • 3. iii. the method gurantees to finish in a fixed number of steps. Lim et al. proposed a variant of trie-based method called priority-trie. In this empty nodes are replace on the basis of priority prefixes. Hsieh and yang proposed a method called classified multisuffix trie which is a varient of multi-bit trie. ii. Range-search approach. A prefix corresponds to a range on the number line. To find the longest matching prefix for an input address is equivalent to finding the most specify range that encloses the input value. iii.Hashing-based approachUsing hash tables to solve the IP lookup problem, a hash function operates on fixed-length keys, there is one hash table for each possible prefix length in the basic scheme. 4 Techniquer Enhanced Bit-shuffled trieDifferent table are use to get result. The shortest prefix length is 8 bits, and the longest prefix length is 32 bits. In the proposed method, prefixes in the routing table are divided into 6 groups by length Bits 1 to 21 constitute the fixed-length portion, and bits 22 to 24 are called the extension bits. The hardware pipeline contains 4 stages, and the data fields. In the first two pipeline stages, a certain number of bits are extracted from the input bit-vector to form the address for accessing the internal index table, and the remaining bits are packed before passing onto the next pipeline stage. We call this operation bit-shuffling. i. Bit-Shuffle and bit extract circuir, and the subtree processing module. In this approach two basic operations, bit-shuffle and bit-extract. A common first stage bit-shuffle operation is applied to all prefixes in a length-group. Hence, the first stage bit-shuffle circuit can be implemented using multiplexors (MUXs). ii. Dimension of lookup tables and selection of bitsMultiple pre- fixes may share common leading 21-bit values.The procedure to determine the selected bits. Block overlaying and block compactionThe bit-shuffling and index- ing operations effectively divide the group of prefixes into subsets, where each subset has a small number of items. The items in a subset can then be further distinguished by selecting a few bits from the residue prefix. 3
  • 4. 5 Performance Evaluation i. Hardware Implement Cost We evaluate the memory cost of the pro- posed method. ii. Incremental update to the routing tableA few studies have focused on the incremental update issue of IP lookup.In this section we study dynamic updates to the bit-shuffled trie. There can be three types of updates to the routing table, i. modification of the next-hop value associated with a prefix, ii. insertion of a new prefix, iii. deletion of an existing prefix. Extension to the IPv6 lookup.The 128-bit IPv6 address is logically divided into 2 parts, the leading 64 bits correspond to the network address and the remaining 64 bits correspond to the host ID.In principle we can divide the prefixes into 12 length-groups where each length-group covers a range of 4 bits as in the case for IPv4. 6 What We Get .A simple and elegant pipelined architecture for IPv4 and IPv6 lookup is presented. When the size of the IPv4 table is further increased, the density of the 21 to 24 bits prefixes will become higher and we can expect to have more prefixes encoded in a ST-vector. As a result, the memory efficiency of the bit-shuffled trie method in terms of bits per prefix may be further improved. 4