Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Yoram Revah is active.

Publication


Featured researches published by Yoram Revah.


IEEE Journal on Selected Areas in Communications | 2014

Compressing Forwarding Tables for Datacenter Scalability

Ori Rottenstreich; Marat Radan; Yuval Cassuto; Isaac Keslassy; Carmi Arad; Tal Mizrahi; Yoram Revah; Avinatan Hassidim

With the rise of datacenter virtualization, the number of entries in the forwarding tables of datacenter switches is expected to scale from several thousands to several millions. Unfortunately, such forwarding table sizes would not fit on-chip memory using current implementations. In this paper, we investigate the compressibility of forwarding tables. We first introduce a novel forwarding table architecture with separate encoding in each column. It is designed to keep supporting fast random accesses and fixed-width memory words. Then, we show that although finding the optimal encoding is NP-hard, we can suggest an encoding whose memory requirement per row entry is guaranteed to be within a small additive constant of the optimum. Next, we analyze the common case of two-column forwarding tables, and show that such tables can be presented as bipartite graphs. We deduce graph-theoretical bounds on the encoding size. We also introduce an algorithm for optimal conditional encoding of the second column given an encoding of the first one. In addition, we explain how our architecture can handle table updates. Last, we evaluate our suggested encoding techniques on synthetic forwarding tables as well as on real-life tables.


international conference on computer communications | 2013

Compressing forwarding tables

Ori Rottenstreich; Marat Radan; Yuval Cassuto; Isaac Keslassy; Carmi Arad; Tal Mizrahi; Yoram Revah; Avinatan Hassidim

With the rise of datacenter virtualization, the number of entries in forwarding tables is expected to scale from several thousands to several millions. Unfortunately, such forwarding table sizes can hardly be implemented today in on-chip memory. In this paper, we investigate the compressibility of forwarding tables. We first introduce a novel forwarding table architecture with separate encoding in each column. It is designed to keep supporting fast random accesses and fixed-width memory words. Then, we suggest an encoding whose memory requirement per row entry is guaranteed to be within a small additive constant of the optimum. Next, we analyze the common case of two-column forwarding tables, and show that such tables can be presented as bipartite graphs. We deduce graph-theoretical bounds on the encoding size. We also introduce an algorithm for optimal conditional encoding of the second column given an encoding of the first one. In addition, we explain how our architecture can handle table updates. Last, we evaluate our suggested encoding techniques on synthetic forwarding tables as well as on real-life tables.


international symposium on precision clock synchronization for measurement control and communication | 2013

Multi-path Time Protocols

Alexander Shpiner; Yoram Revah; Tal Mizrahi

Over the last few years, packet based networks have become the common transport for applications requiring clock synchronization. Classical time distribution protocols are run between a master clock and a slave clock using a single network path between the two clocks. A recently introduced approach called Slave Diversity uses multiple paths between a master-slave pair to reduce the effect of temporal congestion or errors in a specific path. The current paper applies the multi-path approach to the most widely-used packet based time protocols, PTP and NTP. We introduce extensions to the PTP and NTP standards called Multi-Path PTP (MPPTP) and Multi-Path NTP (MPNTP), respectively, and describe their application over various transport protocols. Our experimental evaluation shows that a large number of paths can be utilized when running the multi-path protocols over the internet, and thus that our multi-path approach can be effectively deployed over existing IP networks.


IEEE Transactions on Parallel and Distributed Systems | 2017

Minimizing Delay in Network Function Virtualization with Shared Pipelines

Ori Rottenstreich; Isaac Keslassy; Yoram Revah; Aviran Kadosh

Pipelines are widely used to increase throughput in multi-core chips by parallelizing packet processing while relying on virtualization. Typically, each packet type is served by a dedicated pipeline with several cores, each implementing a network service. However, with the increase in the number of packet types and their number of required services, there are not enough cores for pipelines. In this paper, we study pipeline sharing, such that a single pipeline can be used to serve several packet types. Pipeline sharing decreases the needed total number of cores, but typically increases pipeline lengths and therefore packet delays. We consider two novel optimization problems of allocating cores between different packet types such that the average or the worst-case delay is minimized. We study the two problems and suggest optimal algorithms that apply under different assumptions on the input. We also present greedy algorithms for the general case. Last, we examine our solutions on synthetic examples as well as on real-life applications and demonstrate that they often achieve close-to-optimal delays.


conference on network and service management | 2014

SAL: Scaling data centers using Smart Address Learning

Alexander Shpiner; Isaac Keslassy; Carmi Arad; Tal Mizrahi; Yoram Revah

Multi-tenant data centers provide a cost-effective many-server infrastructure for hosting large-scale applications. These data centers can run multiple virtual machines (VMs) for each tenant, and potentially place any of these VMs on any of the servers. Therefore, for inter-VM communication, they also need to provide a VM resolution method that can quickly determine the server location of any VM. Unfortunately, existing methods suffer from a scalability bottleneck in the network load of the address resolution messages and/or in the size of the resolution tables. In this paper, we propose Smart Address Learning (SAL), a novel approach that expands the scalability of both the network load and the resolution table sizes, making it implementable on faster memory devices. The key property of the approach is to selectively learn the addresses in the resolution tables, by using the fact that the VMs of different tenants do not communicate. We further compare the various resolution methods and analyze the tradeoff between network load and table sizes. We also evaluate our results using real-life trace simulations. Our analysis shows that SAL can reduce both the network load and the resolution table sizes by several orders of magnitude.


high performance interconnects | 2013

Minimizing Delay in Shared Pipelines

Ori Rottenstreich; Isaac Keslassy; Yoram Revah; Aviran Kadosh

Pipelines are widely used to increase throughput in multi-core chips by parallelizing packet processing. Typically, each packet type is serviced by a dedicated pipeline. However, with the increase in the number of packet types and their number of required services, there are not enough cores for pipelines. In this paper, we study pipeline sharing, such that a single pipeline can be used to serve several packet types. Pipeline sharing decreases the needed total number of cores, but typically increases pipeline lengths and therefore packet delays. We consider the optimization problem of allocating cores between different packet types such that the average delay is minimized. We suggest a polynomial-time algorithm that finds the optimal solution when the packet types preserve a specific property. We also present a greedy algorithm for the general case. Last, we examine our solutions on synthetic examples, on packet-processing applications, and on real-life H.264 standard requirements.


Immunotechnology | 2017

FM-Delta: Fault Management packet compression

Tal Mizrahi; Yoram Revah; Yehonathan Refael Kalim; Elad Kapuza; Yuval Cassuto

Fault Management (FM) is a cardinal feature in communication networks. One of the most common FM approaches is to use periodic keepalive messages. Hence, switches and routers are required to transmit a large number of FM messages periodically, requiring a hardware-based packet generator that periodically transmits a set of messages that are stored in an expensive on-chip memory. With the rapid growth of carrier networks, and as 5G technologies emerge, the number of users and the traffic rates are expected to significantly increase over the next few years. Consequently, we expect the on-chip memories used for FM to become a costly component in switch and router chips. We introduce a novel approach in which FM messages are stored in compressed form in the on-chip memory, allowing to significantly reduce the memory size. We present FM-Delta, a simple hardware-friendly delta encoding algorithm that allows FM messages to be compressed by a factor of 2.6. We show that this compression ratio is very close to the results of the zlib compression library, which requires much higher implementation complexity.


IEEE ACM Transactions on Networking | 2017

Perfectly Periodic Scheduling of Collective Data Streams

Ori Rottenstreich; Mario Di Francesco; Yoram Revah

This paper addresses the problem of scheduling a single resource to handle requests for time-sensitive periodic services (i.e., data streams) jointly realizing a distributed application. We specifically consider the case, where the demand of each data stream is expressed as a weight relative to a network-wide cyclic schedule. Within this context, we consider the problem of minimizing the schedule length while satisfying the perfect periodicity constraints: the service intervals for the same data stream are fixed and each data stream is cyclically served exactly as many times as its demand. This problem is challenging, as serving a data stream in one time slot might enforce serving it at some specific time slots in the future. As a result, most of the existing solutions have relaxed either the periodicity or the demand constraints of the data streams. In contrast, we study the strict enforcement of both requirements through perfectly periodic schedules. We show that the considered problem is NP-hard and address special cases for which optimal schedules can be derived. We further discuss the more generic instance of the problem represented by an arbitrary number of data streams and demands. Specifically, we provide an approximation algorithm and an efficient greedy solution for such a general case of arbitrary weights. We conduct extensive simulations to evaluate the performance of the proposed solutions. Finally, we show that it is possible to relax the input demands to improve the communication performance at the cost of some other overhead (e.g., in terms of energy consumption).


high performance switching and routing | 2015

“Don't let the stack get stuck#x201D;: A novel approach for designing efficient stackable routers

Jose Yallouz; Gideon Blocq; Yoram Revah; Aviran Kadosh; Ariel Orda

Stackable Routers, i.e. a class of independent routing units operating together as a single router, constitute an affordable scalable approach for coping with the growing networking requirements of organizations. In this study, we investigate several design problems of stackable routers and develop novel schemes for improving their performance. First, we formalize a mathematical model for optimizing the network topology in terms of throughput and delay, while obeying constraints in the number of ports of each internal routing unit. We then consider the problem of minimizing the diameter of the interconnection topology, as a measure of maximum delay, and establish efficient near-to optimal (explicit) topologies. Furthermore, we also consider the problem of maximizing the throughput of a stackable router. We show its hardness and derive bounds for the optimal solution. While, traditionally, the different routing units of a stackable router are linked together in a ring topology, through simulations we show that a major improvement in the diameter of stackable routers can be accomplished even through the employment of randomly-generated topologies. Finally, we investigate the basic problem of constructing a feasible stackable router and establish some fundamental properties of the required structure of the routing units.


high performance switching and routing | 2014

Weighted periodic scheduling of a shared resource

Ori Rottenstreich; Yoram Revah

We study a perfectly-periodic scheduling problem of a resource shared among several users. Each user is characterized by a weight describing the number of times it has to use the resource within a cyclic schedule. With the constraint that the resource can be used by at most one user in each time slot, we would like to find a schedule with a minimal time period (number of time slots), in which each user is served once in a fixed number of time slots according to its required total number of times. As many other variants of periodic-scheduling problems, we first prove that the problem is NP-hard. We then describe different cases for which we can calculate the exact value of the optimal time period and present algorithms that obtain optimal schedules. We also study the optimal time period in the case of two users with random weights drawn according to known distributions. We then discuss the general case of arbitrary number of users with general weights and provide approximation algorithms that achieve schedules with guaranteed time periods. Last, we conduct simulations to examine the presented analysis.

Collaboration


Dive into the Yoram Revah's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Tal Mizrahi

Technion – Israel Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Aviran Kadosh

Technion – Israel Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Isaac Keslassy

Technion – Israel Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Yuval Cassuto

Technion – Israel Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Carmi Arad

Marvell Technology Group

View shared research outputs
Top Co-Authors

Avatar

Alexander Shpiner

Technion – Israel Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Marat Radan

Technion – Israel Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Ariel Orda

Technion – Israel Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge