skip to main content
article
Free Access

Trading packet headers for packet processing

Published:01 April 1996Publication History
First page image

References

  1. 1 M. Abbott and L. Peterson, "Increasing network throughput by integrating protocol layers," IEEE/ACM Trans. Networking, vol. 1, no. 5, Oct. 1993.]] Google ScholarGoogle Scholar
  2. 2 T. Braun and C. Diot, "Protocol implementation using integrated layer processing," in Proc. ACM SIGCOMM '95 Syrup., Oct. 1995, pp. 151-161.]] Google ScholarGoogle Scholar
  3. 3 A. Birrell and B. Nelson, "Implementing remote procedure calls," ACM Trans. Comput. Syst., vol. 2, no. 1, Feb. 1984.]] Google ScholarGoogle Scholar
  4. 4 D. Banks and M Prudence, "A high-performance network architecture for a PA-RISC workstation," IEEEJ. Select. Areas Commun., Feb. 1993.]]Google ScholarGoogle Scholar
  5. 5 D. D. Clark, V. Jacobson, J. Romkey, and H. Salwen, "An analysis of TCP processing overhead," IEEE Trans. Commun., vol. 27, no. 6, pp. 23-29, June 1989.]]Google ScholarGoogle Scholar
  6. 6 D. D. Clark, 'q'he structuring of systems using upcalls,' in Proc. lOth ACM Syrup. on Operating Systems Principles, Dec. 1985, pp. 171-180.]] Google ScholarGoogle Scholar
  7. 7 T. H. Cormen, C. E. Leiserson, and R. L. Rivest, Introduction to Algorithms. New York: McGraw-Hill, 1990.]] Google ScholarGoogle Scholar
  8. 8 D. D. Clark and D. L. Tennehouse, "Architectural considerations for a new generation of protocols," in Proc. ACM SIGCOMM '90 Syrup., Sept. 1990, pp. 2(g)-208.]] Google ScholarGoogle Scholar
  9. 9 G. P. Chandranmenon and G. Varghese, "Trading packet headers for packet processing," in Proc. ACM SIGCOMM '95 Syrup., Oct. 1995, pp. 162-173.]] Google ScholarGoogle Scholar
  10. 10 D. C. Feldmeier, "A data labeling technique for high-performance protocol processing and its consequences," Computer Communications Review (SIGCOMM '93), vol. 23, no. 4, pp. 170-181, Oct. 1993.]] Google ScholarGoogle Scholar
  11. 11 P. Francis, "A near-term architecture for deploying pip," IEEE Networking Mag., pp. 30-37, May 1993.]]Google ScholarGoogle Scholar
  12. 12 P. Gunningberg, C. Partridge, T. Sirotkin, and B. Victor, "Delayed evaluation of gigabit protocols, in Proc. 2nd MultiG Workshop, June 1991.]]Google ScholarGoogle Scholar
  13. 13 R. Hinden, Ed., Internet Protocol, version 6 (IPv6) specification, Draft (work in progress), Oct. 1994.]]Google ScholarGoogle Scholar
  14. 14 R. Jain, "A comparison of hashing schemes for address lookups in computer networks," IEEE Trans. Commun., vol. 40, no. 10, pp. 1570-1573, Oct. 1992.]]Google ScholarGoogle Scholar
  15. 15 N. P. Kronenberg, H. Levy, and W. D. Strecker, "VAXClusters: A closely coupled distributed system," ACM Trans. Comput. Syst., vol. 4, no. 2, May 1986.]] Google ScholarGoogle Scholar
  16. 16 J. KayandJ'Pasquale'"Theimp~rtance~fn~ndatat~uchingpr~cessing overheads in tcp/ip," in Proc. ACM SIGCOMM '93 Syrup., Sept. 1993, pp. 259-268.]] Google ScholarGoogle Scholar
  17. 17 S. McCanne and V. Jacobson, "The BSD packet filter: A new architecture for user-level packet capture," in USENIX Tech. Conf Proc., Winter 1993, pp. 259-269.]] Google ScholarGoogle Scholar
  18. 18 C. Partridge, Gigabit Networking. Reading, MA: Addison-Wesley, 1993.]] Google ScholarGoogle Scholar
  19. 19 R. Perlman, Interconnections: Bridges and Routers. Reading, MA: Addison-Wesley, 1992.]] Google ScholarGoogle Scholar
  20. 20 J. P. G. Sterbernz and G. M. Parulkar, "Axon: A high speed communication architecture for distributed applications," in Proc. IEEE INFOCOMM '90, San Francisco, CA, June 1990, pp. 415-425.]]Google ScholarGoogle Scholar
  21. 21 J. H. Saltzer, D. P. Reed, and D. D. Clark, "End-to-end arguments in system design," ACM Trans. Comput. Syst., vol. 2, no. 4, Nov. 1984.]] Google ScholarGoogle Scholar
  22. 22 A. S. Tanenbaum, Computer Networks. Englewood Cliffs, NJ: Prentice-Hall, 1981.]] Google ScholarGoogle Scholar
  23. 23 G. Varghese, "Trading packet headers for packet processing," Dept. of Computer Science, Washington University, Technical Rep. WU94-16, 1994.]]Google ScholarGoogle Scholar
  24. 24 T. von Eicken, D. E. Culler, S. C. Goldstein, and K. E. Schauser, "Active messages: a mechanism for integrated communication and computation," in Proc. 19th Int. Symp. Computer Archit., May 1992.]] Google ScholarGoogle Scholar

Index Terms

  1. Trading packet headers for packet processing

            Recommendations

            Reviews

            Robert Bruce McLaughlin

            It has long been known that one can speed the processing time of a packet by a node by adding information to the packet header. Until recently, however, bandwidth was more expensive than the processing power of the node. As the bandwidth of links increases, node processing is becoming the more limited resource. As a result, it seems logical to add bits to the packet to speed up node processing. These bits could be added for each layer that processes the packet—all the OSI layers, for example—greatly speeding the packet on its way. In this paper, the authors propose additions to the packet header, namely a source hashing scheme, threaded indices, and a data manipulation layer (DML). Source hashing is similar to hashing in a database. A somewhat randomized pointer is created by the source and translated toward the destination by the interceding nodes. It does not require a path setup, so it is connectionless in nature. Threaded indices have a per-hop index for each source-destination pair, or they know the route the packet will take through the network. The idea of DML is to allow extensions of the data processing that can be done at each layer, such as encryption. The problem with any packet routing network is knowledge of paths. It is always likely that the source will know the destination. It is unlikely, especially in a connectionless network, that the source will ever know the path to the destination. Often the nodes know only the next closest node to the destination. In an ideal network, all the nodes would know all the paths at all times. Generally, the overhead for such information is considered too expensive in light of its being time-delayed. It is not clear that, in such networks, either the threaded indexing or the DML schemes proposed would improve performance. The proposed hashing scheme would improve performance in connectionless networks. I think the authors envision the use of DML and threaded indices in a connection-oriented or virtual connection-oriented network such as asynchronous transfer mode (ATM) permanent virtual circuit s. In that context, they would have value, assuming that the network is such that a circuit can be reserved at call setup, not a trivial problem in a large ATM network. Understanding what path to take through a connectionless network at any given instance is not easy. People who are trying to combine the statistical gain of a connectionless network with the services that depend on a guaranteed connection are finding that this is a hard problem. The authors may have an interesting piece of the solution.

            Access critical reviews of Computing literature here

            Become a reviewer for Computing Reviews.

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access

            • Published in

              cover image IEEE/ACM Transactions on Networking
              IEEE/ACM Transactions on Networking  Volume 4, Issue 2
              April 1996
              159 pages

              Publisher

              IEEE Press

              Publication History

              • Published: 1 April 1996
              Published in ton Volume 4, Issue 2

              Qualifiers

              • article

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader