scispace - formally typeset
Search or ask a question
Author

Tal Mizrahi

Other affiliations: Harvard University, Huawei
Bio: Tal Mizrahi is an academic researcher from Technion – Israel Institute of Technology. The author has contributed to research in topics: Network packet & Clock synchronization. The author has an hindex of 24, co-authored 100 publications receiving 1726 citations. Previous affiliations of Tal Mizrahi include Harvard University & Huawei.


Papers
More filters
Patent
18 Apr 2011
TL;DR: In this article, a data extraction unit extracts first destination information from the header of the packet and generates second destination information that conforms to the recognized communication protocol, based on which the processing unit determines an egress interface to which the packet is to be forwarded.
Abstract: An apparatus for forwarding packets includes a packet processing pipeline having a processing unit that processes packets compliant with a recognized communication protocol. A first port coupled to the packet processing pipeline is configured to receive a packet that does not comply with the recognized communication protocol and has a header that conforms to a second communication protocol. A data extraction unit extracts first destination information from the header of the packet and, based on the first destination information, generates second destination information that conforms to the recognized communication protocol. The processing unit determines, based on the second destination information, an egress interface to which the packet is to be forwarded.

150 citations

Patent
29 Nov 2011
TL;DR: In this article, the authors propose a load balance traffic in a network device or switch using hash value generator configured to generate a hash value based on information included in the packet and based on at least one virtual port.
Abstract: Techniques to load balance traffic in a network device or switch include a network device or switch having a first interface to receive a data unit or packet, a second interface to transmit the packet, and a mapper to map between virtual ports and physical ports. The network device includes hash value generator configured to generate a hash value based on information included in the packet and based on at least one virtual port. The hash value may be optionally modified to load balance egress traffic of the network device. The network device selects a particular virtual port for egress of the packet, such as by determining an index into an egress table based on the (modified) hash value. The packet is transmitted from the network device using a physical port mapped to the particular virtual port.

123 citations

01 Oct 2014
TL;DR: This document defines a set of security requirements for time protocols, focusing on the Precision time Protocol (PTP) and the Network Time Protocol (NTP), and discusses the security impacts of time protocol practices, the performance implications of external security practices on time protocols and the dependencies between other security services and time synchronization.
Abstract: As time and frequency distribution protocols are becoming increasingly common and widely deployed, concern about their exposure to various security threats is increasing. This document defines a set of security requirements for time protocols, focusing on the Precision Time Protocol (PTP) and the Network Time Protocol (NTP). This document also discusses the security impacts of time protocol practices, the performance implications of external security practices on time protocols, and the dependencies between other security services and time synchronization.

78 citations

Proceedings ArticleDOI
24 Aug 2015
TL;DR: A practical method for implementing accurate time-based updates, using TIMEFLIPs, and shows that if there is enough flexibility in determining the scheduled time, a TimeFlip can be encoded by a single TCAM entry, using a single bit to represent the timestamp, and allowing the update to be performed with an accuracy on the order of 1 microsecond.
Abstract: Network configuration and policy updates occur frequently, and must be performed in a way that minimizes transient effects caused by intermediate states of the network. It has been shown that accurate time can be used for coordinating network-wide updates, thereby reducing temporary inconsistencies. However, this approach presents a great challenge; even if network devices have perfectly synchronized clocks, how can we guarantee that updates are performed at the exact time for which they were scheduled? In this paper we present a practical method for implementing accurate time-based updates, using TIMEFLIPs. A TimeFlip is a time-based update that is implemented using a timestamp field in a Ternary Content Addressable Memory (TCAM) entry. TIMEFLIPs can be used to implement Atomic Bundle updates, and to coordinate network updates with high accuracy. We analyze the amount of TCAM resources required to encode a TimeFlip, and show that if there is enough flexibility in determining the scheduled time, a TimeFlip can be encoded by a single TCAM entry, using a single bit to represent the timestamp, and allowing the update to be performed with an accuracy on the order of 1 microsecond.

72 citations

Patent
15 Jun 2012
TL;DR: In this article, a method for processing packets, in a network device including at least one processing engine that is not configured to process destination information that conforms to a first protocol and is configured to handle destination information conforming to a second protocol, includes receiving a packet at the network device, and determining first destination information included in the packet.
Abstract: A method for processing packets, in a network device including at least one processing engine that i) is not configured to process destination information that conforms to a first protocol and ii) is configured to process destination information that conforms to a second protocol, includes receiving a packet at the network device, and determining, in the network device, first destination information included in the packet. The first destination information conforms to the first protocol. The method also includes generating, in the network device, second destination information conforming to a third protocol based on the first destination information. The method also includes generating, in the network device, third destination information conforming to the second protocol based on the second destination information. The method also includes processing the packet with the at least one processing engine included in the network device using the third destination information.

68 citations


Cited by
More filters
Journal ArticleDOI

1,083 citations

Journal ArticleDOI
TL;DR: This paper surveys the state-of-the-art in traffic engineering for SDNs, and mainly focuses on four thrusts including flow management, fault tolerance, topology update, and traffic analysis/characterization.

513 citations

Proceedings ArticleDOI
17 Aug 2014
TL;DR: Dionysus encodes as a graph the consistency-related dependencies among updates at individual switches, and it then dynamically schedules these updates based on runtime differences in the update speeds of different switches, which increases the system's speed.
Abstract: We present Dionysus, a system for fast, consistent network updates in software-defined networks. Dionysus encodes as a graph the consistency-related dependencies among updates at individual switches, and it then dynamically schedules these updates based on runtime differences in the update speeds of different switches. This dynamic scheduling is the key to its speed; prior update methods are slow because they pre-determine a schedule, which does not adapt to runtime conditions. Testbed experiments and data-driven simulations show that Dionysus improves the median update speed by 53--88% in both wide area and data center networks compared to prior methods.

359 citations

Patent
17 Aug 2012
TL;DR: In this paper, a method for logically routing a packet between a source machine in a first logical domain and a destination machine that is in a second logical domain is described, which configures a router in a host that includes the second-level managed switching element.
Abstract: A novel method for logically routing a packet between a source machine that is in a first logical domain and a destination machine that is in a second logical domain is described. The method configures a managed switching element as a second-level managed switching element. The method configures a router in a host that includes the second-level managed switching element. The method communicatively couples the second-level managed switching element with the router. The method causes the router to route a packet when the router receives a packet from the first logical domain that is addressed to the second logical domain.

321 citations

Journal ArticleDOI
TL;DR: In this article, the authors provide an up-to-date comprehensive survey of the IEEE TSN and IETF DetNet standards and related research studies and identify the pitfalls and limitations of the existing standards and research studies.
Abstract: Many network applications, eg, industrial control, demand ultra-low latency (ULL) However, traditional packet networks can only reduce the end-to-end latencies to the order of tens of milliseconds The IEEE 8021 time sensitive networking (TSN) standard and related research studies have sought to provide link layer support for ULL networking, while the emerging IETF deterministic networking (DetNet) standards seek to provide the complementary network layer ULL support This paper provides an up-to-date comprehensive survey of the IEEE TSN and IETF DetNet standards and the related research studies The survey of these standards and research studies is organized according to the main categories of flow concept, flow synchronization, flow management, flow control, and flow integrity ULL networking mechanisms play a critical role in the emerging fifth generation (5G) network access chain from wireless devices via access, backhaul, and core networks We survey the studies that specifically target the support of ULL in 5G networks, with the main categories of fronthaul, backhaul, and network management Throughout, we identify the pitfalls and limitations of the existing standards and research studies This survey can thus serve as a basis for the development of standards enhancements and future ULL research studies that address the identified pitfalls and limitations

316 citations