摘要:
A method for executing a binarized neural network (BNN) using a switching chip includes describing an artificial neural network application in a binarized form to provide the BNN; configuring a parser of the switching chip to encode an input vector of the BNN in a packet header; configuring a plurality of match-action tables (MATs) of the switching chip to execute, on the input vector encoded in the packet header, one or more of the operations including XNOR, bit counting, and sign operations such that the plurality of MATs are configured to: implement a bitwise XNOR operation between the input vector and a weights matrix to produce a plurality of first stage vectors, implement an algorithm for counting a number of bits set to 1 in the plurality of first stage vectors to produce a plurality of second stage vectors, and implement a sign operation on the second stage vectors.
摘要:
A method for transmitting, over a transport network, data belonging to a data flow includes creating a proxy network including a plurality of transport network proxies; defining a plurality of proxy pairs; defining a plurality of proxy pair links; determining, for each proxy pair link, a round trip time (RTT) of the respective proxy pair link; determining, using the determined RTTs of the plurality of proxy pair links, a list of one or more preferred paths for each proxy pair, each preferred path connecting, via one or more of the plurality of proxy pair links, one proxy of the respective proxy pair to the other proxy of the respective proxy pair; and transmitting, from an ingress proxy to an egress proxy, the data belonging to the data flow over a proxy pair path selected from the list of preferred proxy pair paths.
摘要:
A method for executing a binarized neural network (BNN) using a switching chip includes describing an artificial neural network application in a binarized form to provide the BNN; configuring a parser of the switching chip to encode an input vector of the BNN in a packet header; configuring a plurality of match-action tables (MATs) of the switching chip to execute, on the input vector encoded in the packet header, one or more of the operations including XNOR, bit counting, and sign operations such that the plurality of MATs are configured to: implement a bitwise XNOR operation between the input vector and a weights matrix to produce a plurality of first stage vectors, implement an algorithm for counting a number of bits set to 1 in the plurality of first stage vectors to produce a plurality of second stage vectors, and implement a sign operation on the second stage vectors.
摘要:
A method of providing access control for a software defined network (SDN) controller includes establishing a cascaded flow of flow table entries by linking together flow table entries of flow tables that are installed at network resources and that apply to the same packets or network flows, analyzing the impact of configuration requests from one or more applications regarding the installation and/or removal of flow table entries on existing cascaded flows, and rejecting configuration requests if the installation and/or removal of flow table entries according to the configuration requests would destroy an existing cascaded flow. The SDN controller includes an interface for interacting with one or more applications that are installed to run at the control plane of the SDN atop the SDN controller.
摘要:
A method of providing access control for a software defined network (SDN) controller includes establishing a cascaded flow of flow table entries by linking together flow table entries of flow tables that are installed at network resources and that apply to the same packets or network flows, analyzing the impact of configuration requests from one or more applications regarding the installation and/or removal of flow table entries on existing cascaded flows, and rejecting configuration requests if the installation and/or removal of flow table entries according to the configuration requests would destroy an existing cascaded flow. The SDN controller includes an interface for interacting with one or more applications that are installed to run at the control plane of the SDN atop the SDN controller.
摘要:
A packet data network includes a flow-based programmable network device. The flow-based programmable network device includes a data plane having a plurality of input and output ports, a control interface and forwarding rules that map packets received on one of the input ports to one of the output ports based on a packet matching a rule in the forwarding rules. A controller entity is configured to program the flow-based programmable network device via the control interface. The flow-based programmable network device has a connection via the data plane to at least one delegated entity which is a network device configured to process network traffic on behalf of the flow-based programmable network device in a transparent manner from a perspective of the controller entity.
摘要:
A method for transmitting, over a transport network, data belonging to a data flow includes creating a proxy network including a plurality of transport network proxies; defining a plurality of proxy pairs; defining a plurality of proxy pair links; determining, for each proxy pair link, a round trip time (RTT) of the respective proxy pair link; determining, using the determined RTTs of the plurality of proxy pair links, a list of one or more preferred paths for each proxy pair, each preferred path connecting, via one or more of the plurality of proxy pair links, one proxy of the respective proxy pair to the other proxy of the respective proxy pair; and transmitting, from an ingress proxy to an egress proxy, the data belonging to the data flow over a proxy pair path selected from the list of preferred proxy pair paths.
摘要:
A method for detecting interactions on a forwarding element in a network, the element adapted to forward data according to rules, a rule set installed on the element, and including a match set and corresponding action set, the match set including at least one match field and the action set including one or more actions wherein action to be performed when matching a match set includes determining one or more relations between match sets based on match field relations, determining one or more relations between action sets, determining one or more interactions between rules based on determined relations between match sets and action sets, each rule being tested against another rule for determining the interaction, and reducing the rule set to an actual rule set according to determined interactions so that the actual rule set includes only rules with no interactions among them.
摘要:
A method for handling subscribers' network traffic between a CPE (customer premises equipment) and a broadband access network includes establishing a subscriber session between the CPE and a BNG (broadband network gateway, an entity within the broadband access network), to set up a network route between the CPE and the BNG. Data transmitted within the subscriber session are encapsulated into protocol frames. A NCE (network control entity) acquires a state of the subscriber session and updates network policies in at least one network entity on the network route based on the state of the subscriber session. A DEM (dynamic encapsulation module) decides, based on a DEM configuration, whether data sent to the broadband access network are encapsulated data within the subscriber session or are non-encapsulated data outside the subscriber session. The data are transmitted on a part of the network route and are handled according to the network policies.
摘要:
A method of providing access control for a software defined network (SDN) controller includes triggering, by the SDN controller upon receiving a trigger event from a data plane of the software defined network, one or more applications that are installed to run at a control plane of the software defined network atop the SDN controller to react to the trigger event, applying, by the SDN controller before triggering applications due to a trigger event, a conflict resolution scheme. The conflict resolution scheme includes determining all flow spaces that are affected by the trigger event and selecting from these flow spaces a single selected flow space that complies with a predetermined policy, determining, a single master application according to predefined criteria, and triggering, in addition to the master application, only those applications whose reactions to the trigger event do not conflict with the master application.