Models, Algorithms, and Architectures for Scalable Packet Classification

Total Page:16

File Type:pdf, Size:1020Kb

Models, Algorithms, and Architectures for Scalable Packet Classification Washington University in St. Louis Washington University Open Scholarship All Computer Science and Engineering Research Computer Science and Engineering Report Number: WUCSE-2004-40 2004-07-28 Models, Algorithms, and Architectures for Scalable Packet Classification David Edward Taylor and Jonathan S. Turner The growth and diversification of the Internet imposes increasing demands on the performance and functionality of network infrastructure. Routers, the devices responsible for the switch-ing and directing of traffic in the Internet, are being called upon to not only handle increased volumes of traffic at higher speeds, but also impose tighter security policies and provide support for a richer set of network services. This dissertation addresses the searching tasks performed by Internet routers in order to forward packets and apply network services to packets belonging to defined traffic flows. As these searching tasks must be performed for each packet... Read complete abstract on page 2. Follow this and additional works at: https://openscholarship.wustl.edu/cse_research Recommended Citation Taylor, David Edward and Turner, Jonathan S., "Models, Algorithms, and Architectures for Scalable Packet Classification" Report Number: WUCSE-2004-40 (2004). All Computer Science and Engineering Research. https://openscholarship.wustl.edu/cse_research/1014 Department of Computer Science & Engineering - Washington University in St. Louis Campus Box 1045 - St. Louis, MO - 63130 - ph: (314) 935-6160. This technical report is available at Washington University Open Scholarship: https://openscholarship.wustl.edu/ cse_research/1014 Models, Algorithms, and Architectures for Scalable Packet Classification David Edward Taylor and Jonathan S. Turner Complete Abstract: The growth and diversification of the Internet imposes increasing demands on the performance and functionality of network infrastructure. Routers, the devices responsible for the switch-ing and directing of traffic in the Internet, are being called upon to not only handle increased volumes of traffic at higher speeds, but also impose tighter security policies and provide support for a richer set of network services. This dissertation addresses the searching tasks performed by Internet routers in order to forward packets and apply network services to packets belonging to defined traffic flows. As these searching tasks must be performed for each packet traversing the router, the speed and scalability of the solutions to the route lookup and packet classification problems largely determine the realizable performance of the router, and hence the Internet as a whole. Despite the energetic attention of the academic and corporate research communities, there remains a need for search engines that scale to support faster communication links, larger route tables and filter sets and increasingly complex filters. The major contributions of this work include the design and analysis of a scalable hardware implementation of a Longest Prefix Matching (LPM) search engine for route lookup, a survey and taxonomy of packet classification techniques, a thorough analysis of packet classification filter sets, the design and analysis of a suite of performance evaluation tools for packet classification algorithms and devices, and a new packet classification algorithm that scales to support high-speed links and large filter sets classifying on additional packet fields. WASHINGTON UNIVERSITY SEVER INSTITUTE OF TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING MODELS, ALGORITHMS, AND ARCHITECTURES FOR SCALABLE PACKET CLASSIFICATION by David Edward Taylor, M.S.Co.E., M.S.E.E., B.S.Co.E., B.S.E.E. Prepared under the direction of Dr. Jonathan S. Turner A dissertation presented to the Sever Institute of Washington University in partial fulfillment of the requirements for the degree of Doctor of Science August, 2004 Saint Louis, Missouri WASHINGTON UNIVERSITY SEVER INSTITUTE OF TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING ABSTRACT MODELS, ALGORITHMS, AND ARCHITECTURES FOR SCALABLE PACKET CLASSIFICATION by David Edward Taylor ADVISOR: Dr. Jonathan S. Turner August, 2004 Saint Louis, Missouri The growth and diversification of the Internet imposes increasing demands on the perfor- mance and functionality of network infrastructure. Routers, the devices responsible for the switch- ing and directing of traffic in the Internet, are being called upon to not only handle increased vol- umes of traffic at higher speeds, but also impose tighter security policies and provide support for a richer set of network services. This dissertation addresses the searching tasks performed by Inter- net routers in order to forward packets and apply network services to packets belonging to defined traffic flows. As these searching tasks must be performed for each packet traversing the router, the speed and scalability of the solutions to the route lookup and packet classification problems largely determine the realizable performance of the router, and hence the Internet as a whole. Despite the energetic attention of the academic and corporate research communities, there remains a need for search engines that scale to support faster communication links, larger route tables and filter sets, and increasingly complex filters. The major contributions of this work include the design and anal- ysis of a scalable hardware implementation of a Longest Prefix Matching (LPM) search engine for route lookup, a survey and taxonomy of packet classification techniques, a thorough analysis of packet classification filter sets, the design and analysis of a suite of performance evaluation tools for packet classification algorithms and devices, and a new packet classification algorithm that scales to support high-speed links and large filter sets classifying on additional packet fields. copyright by David Edward Taylor 2004 SOLI DEO GLORIA to God alone be the glory Contents List of Tables ........................................ ix List of Figures ........................................ xi Acknowledgments ..................................... xvii Preface ........................................... xx 1 Introduction ....................................... 1 1.1 State of the Internet . 1 1.2 The “Next Generation” Internet . 5 1.3 The Packet Classification Problem . 6 1.3.1 Constraints . 9 1.4 Organization of the Dissertation . 11 2 Single-Field Search Techniques ............................ 12 2.1 ExactMatching.................................... 12 2.1.1 B-Trees.................................... 13 2.1.2 Hashing.................................... 13 2.1.3 Bloom Filters . 14 2.2 Longest Prefix Matching (LPM) . 17 2.2.1 LinearSearch................................. 18 2.2.2 Content Addressable Memory (CAM) . 18 2.2.3 TrieBasedSchemes ............................. 19 2.2.4 Multiway and Multicolumn Search . 21 2.2.5 Binary Search on Prefix Lengths . 22 2.2.6 Longest Prefix Matching using Bloom Filters . 23 2.3 All Prefix Matching (APM) . 25 2.4 RangeMatching.................................... 26 2.4.1 SegmentTree................................. 27 2.4.2 IntervalTree ................................. 28 v 2.4.3 Range to Prefix Conversion . 29 2.4.4 Range Matching Circuits . 30 3 Fast Internet Protocol Lookup (FIPL) ......................... 31 3.1 Introduction...................................... 31 3.2 Tree Bitmap Algorithm . 33 3.2.1 Split-Trie Optimization . 36 3.3 Hardware Design and Implementation . 37 3.3.1 FIPL Engine . 38 3.3.2 FIPL Engine Controller . 40 3.3.3 Implementation Platform . 41 3.3.4 Memory Configuration . 42 3.3.5 Worst-Case Performance . 42 3.3.6 Hardware Resource Usage . 42 3.4 System Management and Control Components . 43 3.4.1 NCHARGE.................................. 43 3.4.2 FIPL Memory Manager . 43 3.4.3 SocketsInterfaces .............................. 45 3.4.4 Remote User Interface . 45 3.4.5 CommandFlow................................ 45 3.5 Performance Measurements . 47 3.5.1 Memory Utilization . 48 3.5.2 LookupRate ................................. 48 3.6 Towards Better Performance . 50 3.6.1 Implementation Optimizations . 51 3.6.2 Root Node Extension & Caching . 51 3.7 RelatedWork ..................................... 53 3.8 Discussion....................................... 55 4 Multiple Field Search Techniques ........................... 56 4.1 Taxonomy....................................... 57 4.2 Exhaustive Search . 58 4.2.1 LinearSearch................................. 60 4.2.2 Ternary Content Addressable Memory (TCAM) . 60 4.3 DecisionTree..................................... 62 4.3.1 Grid-of-Tries . 64 4.3.2 Extended Grid-of-Tries (EGT) . 67 4.3.3 Hierarchical Intelligent Cuttings (HiCuts) . 69 4.3.4 Modular Packet Classification . 70 vi 4.3.5 HyperCuts .................................. 73 4.3.6 Extended TCAM (E-TCAM) . 74 4.3.7 Fat Inverted Segment (FIS) Trees . 75 4.4 Decomposition .................................... 78 4.4.1 Parallel Bit-Vectors (BV) . 78 4.4.2 Aggregated Bit-Vector (ABV) . 80 4.4.3 Crossproducting . 82 4.4.4 Recursive Flow Classification (RFC) . 82 4.4.5 Parallel Packet Classification (P 2C)..................... 84 4.4.6 Distributed Crossproducting of Field Labels (DCFL) . 87 4.5 TupleSpace...................................... 90 4.5.1 Tuple Space Search & Tuple Pruning . 92 4.5.2 RectangleSearch............................... 94 4.5.3 Conflict-Free Rectangle Search . 95 4.6 Caching........................................ 95 4.7 Discussion....................................... 96 5 Analysis of Real Filter Sets ..............................
Recommended publications
  • Strategic Use of the Internet and E-Commerce: Cisco Systems
    Journal of Strategic Information Systems 11 (2002) 5±29 www.elsevier.com/locate/jsis Strategic use of the Internet and e-commerce: Cisco Systems Kenneth L. Kraemer*, Jason Dedrick Graduate School of Management and Center for Research on Information Technology and Organizations, University of California, Irvine, 3200 Berkeley Place, Irvine, CA 92697-4650, USA Accepted 3October 2001 Abstract Information systems are strategic to the extent that they support a ®rm's business strategy. Cisco Systems has used the Internet and its own information systems to support its strategy in several ways: (1) to create a business ecology around its technology standards; (2) to coordinate a virtual organiza- tion that allows it to concentrate on product innovation while outsourcing other functions; (3) to showcase its own use of the Internet as a marketing tool. Cisco's strategy and execution enabled it to dominate key networking standards and sustain high growth rates throughout the 1990s. In late 2000, however, Cisco's market collapsed and the company was left with billions of dollars in unsold inventory, calling into question the ability of its information systems to help it anticipate and respond effectively to a decline in demand. q 2002 Elsevier Science B.V. All rights reserved. Keywords: Internet; e-commerce; Cisco Systems; Virtual Organization; Business Ecology 1. Introduction Information systems are strategic to the extent that they are used to support or enable different elements of a ®rm's business strategy (Porter and Millar, 1985). Cisco Systems, the world's largest networking equipment company, has used the Internet, electronic commerce (e-commerce), and information systems as part of its broad strategy of estab- lishing a dominant technology standard in the Internet era.
    [Show full text]
  • Networking Hardware: Absolute Beginner's Guide T Networking, 3Rd Edition Page 1 of 15
    Chapter 3: Networking Hardware: Absolute Beginner's Guide t Networking, 3rd Edition Page 1 of 15 Chapter 3: Networking Hardware In this chapter z Working with network interface cards z Selecting and installing a NIC z Using hubs z Working with PC motherboards z Understanding processors and PC RAM z Working with hard drives z Differentiating server and client hardware Our Age of Anxiety is, in great part, the result of trying to do today’s jobs with yesterday’s tools. –Marshall McLuhan Now that we’ve discussed the different kinds of networks and looked at network topologies, we should spend some time discussing the hardware involved in networking. This chapter will concentrate on the connectivity devices that define the network topology—the most important being the network interface card. We will also take a look at hubs, routers, and switches. Another important aspect of building your network is selecting the hardware for your client PCs and your network servers. There are many good primers on computer hardware—for example, the Absolute Beginner’s Guide to PC Upgrades, published by Que. Also, numerous advanced books, such as Upgrading and Repairing PCs (by Scott Mueller, also from Que), are available, so we won't cover PC hardware in depth in this chapter. We will take a look at motherboards, RAM, and hard drives because of the impact these components have on server performance. We will also explore some of the issues related to buying client and server hardware. Let's start our discussion with the network interface card. We can then look at network connectivity devices and finish up with some information on PC hardware.
    [Show full text]
  • Computer Networking in Nuclear Medicine
    CONTINUING EDUCATION Computer Networking In Nuclear Medicine Michael K. O'Connor Department of Radiology, The Mayo Clinic, Rochester, Minnesota to the possibility of not only connecting computer systems Objective: The purpose of this article is to provide a com­ from different vendors, but also connecting these systems to prehensive description of computer networks and how they a standard PC, Macintosh and other workstations in a de­ can improve the efficiency of a nuclear medicine department. partment (I). It should also be possible to utilize many other Methods: This paper discusses various types of networks, network resources such as printers and plotters with the defines specific network terminology and discusses the im­ nuclear medicine computer systems. This article reviews the plementation of a computer network in a nuclear medicine technology of computer networking and describes the ad­ department. vantages and disadvantages of such a network currently in Results: A computer network can serve as a vital component of a nuclear medicine department, reducing the time ex­ use at Mayo Clinic. pended on menial tasks while allowing retrieval and transfer­ WHAT IS A NETWORK? ral of information. Conclusions: A computer network can revolutionize a stan­ A network is a way of connecting several computers to­ dard nuclear medicine department. However, the complexity gether so that they all have access to files, programs, printers and size of an individual department will determine if net­ and other services (collectively called resources). In com­ working will be cost-effective. puter jargon, such a collection of computers all located Key Words: Computer network, LAN, WAN, Ethernet, within a few thousand feet of each other is called a local area ARCnet, Token-Ring.
    [Show full text]
  • An Extensible System-On-Chip Internet Firewall
    An Extensible System-On-Chip Internet Firewall ----- ----- ----- ----- ----- ----- ABSTRACT Internet Packets A single-chip, firewall has been implemented that performs packet filtering, content scanning, and per-flow queuing of Internet Fiber packets at Gigabit/second rates. All of the packet processing Ethernet Backbone Switch operations are performed using reconfigurable hardware within a Switch single Xilinx Virtex XCV2000E Field Programmable Gate Array (FPGA). The SOC firewall processes headers of Internet packets Firewall in hardware with layered protocol wrappers. The firewall filters packets using rules stored in Content Addressable Memories PC 1 (CAMs). The firewall scans payloads of packets for keywords PC 2 using a hardware-based regular expression matching circuit. Lastly, the SOC firewall integrates a per-flow queuing module to Internal Hosts Internet mitigate the effect of Denial of Service attacks. Additional features can be added to the firewall by dynamic reconfiguration of FPGA hardware. Figure 1: Internet Firewall Configuration network, individual subnets can be isolated from each other and Categories and Subject Descriptors be protected from other hosts on the Internet. I.5.3 [Pattern Recognition]: Design Methodology; B.4.1 [Data Communications]: Input/Output Devices; C.2.1 [Computer- Recently, new types of firewalls have been introduced with an Communication Networks]: Network Architecture and Design increasing set of features. While some types of attacks have been thwarted by dropping packets based on the value of packet headers, new types of firewalls must scan the bytes in the payload General Terms of the packets as well. Further, new types of firewalls need to Design, Experimentation, Network Security defend internal hosts from Denial of Service (DoS) attacks, which occur when remote machines flood traffic to a victim host at high Keywords rates [1].
    [Show full text]
  • Cisco Systems (A): Evolution to E-Business
    Case #1-0001 Cisco Systems (A): Evolution to E-Business "We view the Internet as a prototype of how organizations eventually will shape themselves in a truly global economy. It is a self ruling entity." —John Morgridge, Annual Report, 1993 Cisco Systems, says president and CEO John Chambers, is “an end-to-end networking company.” Its products and services enable the construction of corporate information superhighways, a driving concern of today’s CEOs, seeking to become “e-business” leaders in their industries. Defining “e-business” can prove more difficult than embracing it, however. In executive programs at the Tuck School, Professor Phil Anderson frequently asks participants, “How will you know when you have seen the first e-business within your industry?” Typically, there is little consensus. Is it mass customization? Streamlined production processes? One- to-one marketing? Cisco’s Internet Business Systems Group (IBSG), an internal consulting group, advises senior executives on information technology investment strategies. The group is closer to major corporate buying decisions than anyone at Cisco. As advocates for Cisco’s equipment, group members’ main struggle is identifying the benefits of becoming an e-business, which are wide, varied, and difficult to quantify. Additionally, the initial infrastructure investment is large enough to prompt many CEOs to wonder whether it’s really worthwhile to become an e-business. Trying to build a business case (calculate an ROI) for making a major IT investment can be an exercise in frustration. Says Sanjeev Agrawal, a director within the IBSG, “Can you show me the ROI of going to sixth grade? The amount of time it is going to take to try to go through the logic of that is not worth it.” The IBSG hopes that potential customers will look to Cisco as an example of how a company can make the most of information technology.
    [Show full text]
  • Ch05-Hardware.Pdf
    5 Networking Hardware In the last couple of years, an unprecedented surge in interest in wireless networking hardware has brought a huge variety of inexpensive equipment to the market. So much variety, in fact, that it would be impossible to catalog every available component. In this chapter, well look at the sort of features and attributes that are desirable in a wireless component, and see several examples of commercial and DIY gear that has worked well in the past. Wired wireless With a name like “wireless”, you may be surprised at how many wires are involved in making a simple point-to-point link. A wireless node consists of many components, which must all be connected to each other with appropri- ate cabling. You obviously need at least one computer connected to an Eth- ernet network, and a wireless router or bridge attached to the same network. Radio components need to be connected to antennas, but along the way they may need to interface with an amplifier, lightning arrestor, or other de- vice. Many components require power, either via an AC mains line or using a DC transformer. All of these components use various sorts of connectors, not to mention a wide variety of cable types and thicknesses. Now multiply those cables and connectors by the number of nodes you will bring online, and you may well be wondering why this stuff is referred to as “wireless”. The diagram on the next page will give you some idea of the ca- bling required for a typical point-to-point link.
    [Show full text]
  • UNIT :II Hardware and Software Requirements for E-Commerce Web Server Meaning • It Refers to a Common Computer, Which Provides
    UNIT :II Hardware and Software Requirements for E-Commerce Web Server Meaning • It refers to a common computer, which provides information to other computers on the internet. • It is either the hardware (the computer) or the software (the computer programs) that stores the digital information (web content) and delivers it through Internet whenever required. The three components to a web server • The Hardware • Operating system software • web server software Website & Internet Utility Programs Meaning of Website • A Website is a collection of related web pages on a web server maintained by any individual or organization. • A website is hosted on web server, accessible via internet or private LAN through an internet address called URL (Uniform Resource Locator). All publicly accessible websites collectively constitute the WWW (world wide web) Meaning of Utility Programs These are software tools to help users in developing, writing and documenting programs (a sequence of instructions to a computer) There are 2 types of utility programs 1) File Management Utilities – it helps in creating, copying, printing, erasing and renaming the files. 2) Program Development Utilities – it is useful in assembler, compiler, linker, locator etc, Website & utility programs include: Electronic Mail – sending & receiving messages globally via internet. Use Net News – it’s a software that enables a group of internet users to exchange their view, ideas, information on some common topic of interest with all members belonging to the group. Ex:-politics, social issues, sports etc. Real Time Chatting – It is an internet program available to users across the net to talk to each other, text messages, video chat and video conference via internet.
    [Show full text]
  • Review Article an Overview of Multiple Sequence Alignments and Cloud Computing in Bioinformatics
    Hindawi Publishing Corporation ISRN Biomathematics Volume 2013, Article ID 615630, 14 pages http://dx.doi.org/10.1155/2013/615630 Review Article An Overview of Multiple Sequence Alignments and Cloud Computing in Bioinformatics Jurate Daugelaite,1 Aisling O’ Driscoll,2 and Roy D. Sleator1 1 Department of Biological Sciences, Cork Institute of Technology,RossaAvenue,Bishopstown,Cork,Ireland 2 Department of Computing, Cork Institute of Technology, Rossa Avenue, Bishopstown, Cork, Ireland Correspondence should be addressed to Roy D. Sleator; [email protected] Received 24 May 2013; Accepted 23 June 2013 Academic Editors: M. Glavinovic and X.-Y. Lou Copyright © 2013 Jurate Daugelaite et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Multiple sequence alignment (MSA) of DNA, RNA, and protein sequences is one of the most essential techniques in the fields of molecular biology, computational biology, and bioinformatics. Next-generation sequencing technologies are changing the biology landscape, flooding the databases with massive amounts of raw sequence data. MSA of ever-increasing sequence data sets is becoming a significant bottleneck. In order to realise the promise of MSA for large-scale sequence data sets, it is necessary for existing MSA algorithms to be run in a parallelised fashion with the sequence data distributed over a computing cluster or server farm. Combining MSA algorithms with cloud computing technologies is therefore likely to improve the speed, quality, and capability for MSA to handle large numbers of sequences. In this review, multiple sequence alignments are discussed, with a specific focus on the ClustalW and Clustal Omega algorithms.
    [Show full text]
  • High-Performance Computing (HPC) What Is It and Why Do We Care?
    High-Performance Computing (HPC) What is it and why do we care? Partners Funding bioexcel.eu Reusing this material This work is licensed under a Creative Commons Attribution- NonCommercial-ShareAlike 4.0 International License. http://creativecommons.org/licenses/by-nc- sa/4.0/deed.en_US This means you are free to copy and redistribute the material and adapt and build on the material under the following terms: You must give appropriate credit, provide a link to the license and indicate if changes were made. If you adapt or build on the material you must distribute your work under the same license as the original. bioexcel.eu Defining HPC Q: What is high-performance computing? bioexcel.eu Defining HPC Q: What is high-performance computing? A: Using a high-performance computer (a supercomputer)… bioexcel.eu Defining HPC Q: What is a high-performance computer? bioexcel.eu Defining HPC Q: What is a high-performance computer? A: bioexcel.eu Defining HPC Q: What is a high-performance computer? A: a machine that combines a large number* of processors and makes their combined computing power available to use Based fundamentally on parallel computing: using many processors (cores**) at the same time to solve a problem * this number keeps on increasing over time ** define cores vs processors clearly in lecture on hardware building blocks bioexcel.eu Generic Parallel Machine (computer cluster) • Rough conceptual model is a collection of laptops • Connected together by a network so they can all communicate • Each laptop is a laptop1 compute node laptop2
    [Show full text]
  • Path Computation Enhancement in SDN Networks
    Path Computation Enhancement in SDN Networks by Tim Huang Bachelor of Computer Science in ChengDu College of University of Electronic Science and Technology of China, ChengDu, 2011 A thesis presented to Ryerson University in partial fulfillment of the requirements for the degree of Master of Applied Science in the Program of Computer Networks Toronto, Ontario, Canada, 2015 c Tim Huang 2015 AUTHOR’S DECLARATION FOR ELECTRONIC SUBMISSION OF A THESIS I hereby declare that I am the sole author of this thesis. This is a true copy of the thesis, including any required final revisions, as accepted by my examiners. I authorize Ryerson University to lend this thesis to other institutions or individuals for the purpose of scholarly research. I further authorize Ryerson University to reproduce this thesis by photocopying or by other means, in total or in part, at the request of other institutions or individuals for the purpose of scholarly research. I understand that my dissertation may be made electronically available to the public. iii Path Computation Enhancement in SDN Networks Master of Applied Science 2015 Tim Huang Computer Networks Ryerson University Abstract Path computation is always the core topic in networking. The target of the path computation is to choose an appropriate path for the traffic flow. With the emergence of Software-defined networking (SDN), path computation moves from the distributed network nodes to a centralized controller. In this thesis, we will present a load balancing algorithm in SDN framework for popular data center networks and a fault management approach for hybrid SDN networks. The proposed load balancing algorithm computes and selects appropriate paths based on characteristics of data center networks and congestion status.
    [Show full text]
  • The Lee Center for Advanced Networking CALIFORNIA INSTITUTE of TECHNOLOGY 2 the Lee Center Table of Contents
    The Lee Center for Advanced Networking CALIFORNIA INSTITUTE OF TECHNOLOGY 2 the lee center table of contents The Lee Center for Advanced Networking CALIFORNIA INSTITUTE OF TECHNOLOGY introduction ������������������������������������������������������������������������������������������������������������������������������������������4 f o r w a r d ��������������������������������������������������������������������������������������������������������������������������������������������������������������5 research overview Natural Information Networks ���������������������������������������������������������������������������������������������������������������������������������������6 Sense and Respond Systems ����������������������������������������������������������������������������������������������������������������������������������������� 10 The Architecture of Robust, Evolvable Networks ������������������������������������������������������������������������������������������������������� 12 Research in Two-sided Matching Markets ������������������������������������������������������������������������������������������������������������������� 16 Network Equivalence ����������������������������������������������������������������������������������������������������������������������������������������������������� 18 Low-power Data Communication Circuits for Advanced Integrated Systems ���������������������������������������������������������20 Distributed Integrated Circuit Design for the 21st Century ��������������������������������������������������������������������������������������22
    [Show full text]
  • A Layman's Guide to Layer 1 Switching
    White Paper A layman’s guide to Layer 1 Switching The world of network engineering and platforms is complex and full of acronyms and new vocabulary. This guide serves as an introduction to Layer 1 switching, explaining in layman’s terms the OSI model, the functionality of crosspoint switches, the concept of latency, clock and data recovery as well as programmable switches. Great if you are getting started, useful if you are just looking for a quick refresher. The OSI Model The Open Systems Interconnection (OSI) model is a conceptual model that characterizes and standardizes the internal functions of a communication system by partitioning it into abstract layers of functionality. It has been ratified in 1984 and has ever since been a key reference as to how network protocols and devices should communicate and interoperate with each other. The lowest layer of the internal functions of a communication system is known as layer 1, the physical layer. The physical layer consists of the basic networking hardware technologies which transmit data, moving it across the network interface. All of the other layers of a network perform useful functions to create and / or interpret messages sent, but they must all be transmitted down through a layer 1 OSI MODEL device, where they are physically sent out over the network. DATA LAYER The main functions of the physical layer are: DATA APPLICATION • Encoding and Signalling: The physical layer transforms the data from bits that reside within a computer or other device into signals that can be sent over the network as DATA PRESENTATION voltage, light pulses or radio waves that represent ones and zeroes.
    [Show full text]