R. Cohen

University of Haifa, H̱efa, Haifa District, Israel

Are you R. Cohen?

Claim your profile

Publications (20)10.34 Total impact

  • [Show abstract] [Hide abstract]
    ABSTRACT: In recent years, hardware-based packet classification has became an essential component in many networking devices. It often relies on ternary content-addressable memories (TCAMs), which can compare in parallel the packet header against a large set of rules. Designers of TCAMs often have to deal with unpredictable sets of rules. These result in highly variable rule expansions, and can only rely on heuristic encoding algorithms with no reasonable guarantees. In this paper, given several types of rules, we provide new upper bounds on the TCAM worst case rule expansions. In particular, we prove that a W-bit range can be encoded in W TCAM entries, improving upon the previously known bound of 2W - 5. We further prove the optimality of this bound of W for prefix encoding, using new analytical tools based on independent sets and alternating paths. Next, we generalize these lower bounds to a new class of codes called hierarchical codes that includes both binary codes and Gray codes. Last, we propose a modified TCAM architecture that can use additional logic to significantly reduce the rule expansions, both in the worst case and using real-life classification databases.
    IEEE Transactions on Computers 06/2013; 62(6):1127-1140. · 1.47 Impact Factor
  • [Show abstract] [Hide abstract]
    ABSTRACT: The recent growing popularity of cloud-based solutions and the variety of new applications present new challenges for cloud management and resource utilization. In this paper we concentrate on the networking aspect and consider the placement problem of virtual machines (VMs) of applications with intense bandwidth requirements. Optimizing the available network bandwidth is far more complex than optimizing resources like memory or CPU, since every network link may be used by many physical hosts and thus by the VMs residing in these hosts. We focus on maximizing the benefit from the overall communication sent by the VMs to a single designated point in the data center (called the root). This is the typical case when considering a storage area network of applications with intense storage requirements. We formulate a bandwidth-constrained VM placement optimization problem that models this setting. This problem is NP hard, and we present a polynomial-time constant approximation algorithm for its most general version, in which hosts are connected to the root by a general network graph. For more practical cases, in which the network topology is a tree and the revenue is a simple function of the allocated bandwidth, we present improved approximation algorithms that are more efficient in terms of running time. We evaluate the expected performance of our proposed algorithms through a simulation study over traces from a real production data center, providing strong indications to the superiority of our proposed solutions.
    INFOCOM, 2013 Proceedings IEEE; 01/2013
  • R. Cohen, D. Raz
    [Show abstract] [Hide abstract]
    ABSTRACT: Overlay routing in a very attractive scheme that allows improving certain properties of the routing without the need to change the standards of the current underlying routing. However, deploying overlay routing requires the placement and maintenance of overlay infrastructure. This gives rise to the following optimization problem: find a minimal set of overlay nodes such that the required routing properties are satisfied. In this paper we rigorously study this optimization problem. We show that it is NP hard and derive a non-trivial approximation algorithm for it, where the approximation ratio depends on specific properties of the problem at hand. We examine the practical aspects of the scheme by evaluating the gain one can get over two real scenarios. The first one is BGP routing, and we show, using up-to-date data reflecting the current BGP routing policy in the Internet, that a relative small number of less than 100 relay servers are sufficient to enable routing over shorter paths from a single source to all ASes, reducing the average path length of inflated paths by 40%. We also demonstrate that using the scheme for TCP performance improvement, results in an almost optimal placement of overlay nodes.
    INFOCOM, 2011 Proceedings IEEE; 05/2011
  • R. Cohen, D. Raz
    [Show abstract] [Hide abstract]
    ABSTRACT: In recent years, hardware based packet classification has became an essential component in many networking devices. Ternary Content-Addressable Memories (TCAMs) are one of the most popular solutions in this domain, allowing to compare in parallel the packet header against a large set of rules, and to retrieve the first match. However, using TCAM to match a range of values is much more problematic and dramatically reduces the cost effectiveness of the solution. In this paper we study ways to use simple built-in TCAM mechanisms in order to increase the efficiency of range coverage. While current techniques have a worst expansion ratio of 2W-4, we present an efficient algorithm enabling to encode any range with at most W TCAM entries (where W in the number of bits), without using additional processing, extra bits, and without any external encoding. The same paradigm can be applied to multiple raging rules as well, resulting in significant improvement over current known techniques. Moreover, our simulation results indicate that these techniques can be used to reduce the actual TCAM size of hardware networking devices under realistic scenarios.
    INFOCOM, 2010 Proceedings IEEE; 04/2010
  • Source
    M. Aezladen, R. Cohen, D. Raz
    [Show abstract] [Hide abstract]
    ABSTRACT: The paper deals with efficient distribution of timely information to flows of mobile devices. We consider the case where a set of information dissemination devices (IDDs) broadcast a limited amount of information to passing mobile nodes that are moving along well-defined paths. This is the case, for example, in intelligent transportation systems. We develop a novel model that captures the main aspects of the problem, and define a new optimization problem we call MBMAP (maximum benefit message assignment problem). We study the computational complexity of this problem in the global and local cases, and provide new approximation algorithms.
    INFOCOM 2009, IEEE; 05/2009
  • Source
    R. Cohen, L. Katzir
    [Show abstract] [Hide abstract]
    ABSTRACT: OFDMA is one of the most important modulation and access methods for the future mobile networks. Before transmitting a frame on the downlink, an OFDMA base station has to invoke an algorithm that determines which of the pending packets will be transmitted, what modulation should be used for each of them, and how to construct the complex OFDMA frame matrix as a collection of rectangles that fit into a single matrix with fixed dimensions. We propose efficient, and theoretically best possible, algorithms that solves this intricate OFDMA scheduling problem by breaking it down into two sub-problems, referred to as macro and micro scheduling. We analyze the computational complexity of these sub-problems and develop efficient algorithms for solving them.
    INFOCOM 2008. The 27th Conference on Computer Communications. IEEE; 05/2008
  • Source
    R. Cohen, L. Katzir, R. Rizzi
    [Show abstract] [Hide abstract]
    ABSTRACT: In this paper, we define a new problem that has not been addressed in the past: the trade-off between energy efficiency and throughput for multicast services in 802.16e or similar mobile networks. In such networks, the mobile host can reduce its energy consumption by entering the sleep mode when it is not supposed to receive or transmit information. For unicast applications, the tradeoff between delay and energy efficiency has been extensively researched. However, for mobile hosts running multicast (usually push- based) applications, it is much more difficult to determine when data should be transmitted by the base station and when each host should enter the sleep mode. In order to maximize the channel throughput while limiting the energy consumption, a group of hosts needing similar data items should be active during the same time intervals. We define this as an optimization problem and present several algorithms for it. We show that the most efficient solution is the one that employs cross-layer optimization by dividing the hosts into groups according to the quality of their downlink physical (PHY) channels.
    IEEE Transactions on Mobile Computing 04/2008; · 2.91 Impact Factor
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: In this work we extend the aforementioned supermarket model by incorporating the management costs into it. In particular, we assume that when a server is polled about its load, it has to allocate resources in order to answer this query. We consider a system that consists of n identical servers. Each server processes its incoming service requests according to the FIFO
    Autonomic Computing, 2007. ICAC '07. Fourth International Conference on; 07/2007
  • Source
    R. Cohen, D. Raz
    [Show abstract] [Hide abstract]
    ABSTRACT: The Internet connectivity in the autonomous system (AS) level reflects the commercial relationship between ASes. A connection between two ASes could be of type customer-provider when one AS is a provider of the other AS, or of type peer-peer , if they are peering ASes. This commercial relationship induces a global hierarchical structure which is a key ingredient in the ability to understand the topological structure of the AS connectivity graph. Unfortunately, it is very difficult to collect data regarding the actual type of the relationships between ASes, and in general this information is not part of the collected AS connectivity data. The Type of Relationship ( ToR ) problem attempts to address this shortcoming, by inferring the type of relationship between connected ASes based on their routing policies. However, the approaches presented so far are local in nature and do not capture the global hierarchical structure. In this work we define a novel way to infer this type of relationship from the collected data, taking into consideration both local policies and global hierarchy constrains. We define the Acyclic Type of Relationship AToR problem that captures this global hierarchy and present an efficient algorithm that allows determining if there is a hierarchical assignment without invalid paths. We then show that the related general optimization problem is NP-complete and present a 2/3 approximation algorithm where the objective function is to minimize the total number of local policy mismatches. We support our approach by extensive experiments and simulation results showing that our algorithms classify the type of relationship between ASes much better than all previous algorithms.
    INFOCOM 2007. 26th IEEE International Conference on Computer Communications. IEEE; 06/2007
  • Source
    R. Cohen, D. Raz
    [Show abstract] [Hide abstract]
    ABSTRACT: The rapid growth of wireless and cellular networks, and the high availability of small communication devices, such as PDAs, brings us faster than ever to the point where context aware services (CASs) are becoming a commodity. In order to allow fast and efficient development, deployment, and management of such services, a global system that allows the services to gain access to the context information needs to be created, maintained, and managed. We study the requirements for such a context distribution system. We deal with the architectural decisions regarding the definition of context items and the way context information becomes available to the CASs, and also the algorithmic aspects of disseminating this information. We demonstrate the advantages of the architecture and the proposed information dissemination algorithms by conducting a simulation study under realistic practical assumptions. Our results indicate that a modular approach in which context information is provided in many network locations by brokers through an open simple API is both powerful enough to provide the needed context information, and simple enough to be easily implemented.
    Network Operations and Management Symposium, 2004. NOMS 2004. IEEE/IFIP; 05/2004
  • Source
    R. Cohen, L. Katzir
    [Show abstract] [Hide abstract]
    ABSTRACT: We present a scheme for allocating unsolicited grants to the end hosts of synchronous applications of a wireless access network, in accordance with the condition of the channel, the importance of each packet and the specific loss recovery mechanism employed in the channel. The proposed scheme is generic in the sense that it maximizes the effectiveness of the channel under various conditions and it can he used along with every FEC-based or retransmission-based error recovery strategy
    INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies; 04/2004
  • Source
    R. Cohen, L. Katzir, D. Raz
    [Show abstract] [Hide abstract]
    ABSTRACT: Cache pre-filling is emerging as a new concept for increasing the availability of popular Web items in cache servers. According to this concept, Web items are sent by a "push-server" to the proxy cache servers, usually through a broadcast-based or a multicast-based distribution mechanism. One of the most difficult challenges is to design the scheduling algorithm of the push-server. This algorithm needs to determine the "broadcast scheduling map", namely which Web items to broadcast and when. In this paper we study the approach where every constant period of time each proxy cache analyzes the requests it has received in the past and determines which Web item it prefers to receive by broadcast and when. We formalize a related problem, called the "cache pre-filing push" (CPFP) problem, analyze its computational complexity, and describe efficient algorithms to solve it.
    INFOCOM 2002. Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE; 02/2002
  • Source
    E. Bortnikov, R. Cohen
    [Show abstract] [Hide abstract]
    ABSTRACT: The paper addresses the problem of designing efficient scheduling policies for the transmission of control messages by hierarchical network protocols. Such protocols encounter a tradeoff between the desire to forward a control message across the tree as soon, as it is received, and the desire to reduce control traffic. Scheduling problems that arise in this context are defined and discussed. The paper mainly concentrates on minimizing the average extra delay encountered by the control messages under an upper bound on the number of outgoing messages a node can send during a fixed period of time. A polynomial-time algorithm is presented for the off-line version of the problem, and then several efficient on-line heuristics are presented and compared
    INFOCOM '98. Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE; 04/2001
  • Source
    R. Cohen, G. Kaempfer
    [Show abstract] [Hide abstract]
    ABSTRACT: Network layer multicast is know as the most efficient way to support multicast sessions. However, for security, QoS and other considerations, most of the real-time application protocols can be better served by upper layer (transport or application) multicast. We propose a scheme called M-RTP for multicast RTP sessions. The idea behind this scheme is to set up the multicast RTP session over a set of unicast RTP sessions, established between the various participants (source and destinations) of the multicast session. We then address the issue of finding a set of paths with maximum bottleneck for an M-RTP session. We show that this problem is NP-complete, and propose several heuristics to solve it
    INFOCOM 2001. Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE; 02/2001
  • Source
    R. Cohen, G. Kaempfer
    [Show abstract] [Hide abstract]
    ABSTRACT: A virtual private network (VPN) is a private data network that uses a nonprivate data network to carry traffic between remote sites. An “Intranet VPN” establishes network layer connectivity between remote Intranet sites by creating an IP overlay network over the nonprivate network, using various tunneling mechanisms. There are two approaches for establishing such tunnels: a “CPE-based approach” and a “network-based approach.” In the first approach, tunnels are established only between the CPE devices, whereas in the second approach tunnels are also established between the routers of the core nonprivate network. In this paper we address the problem of determining a CPE-based and a network-based layout of VPN tunnels while taking into account two factors: the cost of the links over which the VPN tunnels are established and the cost of the core routers that serve as end points for the VPN. We define related graph algorithm problems, analyze their complexity, and present heuristics for solving these problems efficiently
    IEEE/ACM Transactions on Networking 01/2001; · 1.99 Impact Factor
  • Source
    R. Cohen, E. Felstaine, R. Emek
    [Show abstract] [Hide abstract]
    ABSTRACT: We propose a framework for the creation and maintenance of multicast trees in hierarchical ATM networks. This framework aims at coping with an inherent difficulty of topology aggregation in such networks. The main idea of the proposed framework is to distribute the tree topology information among a set of hierarchical multicast group servers (MGS) nominated for each multicast tree, while keeping regions that do not have a member in the multicast group unaware of the tree. The framework can be employed with every multicast routing algorithm designed for non-hierarchical networks
    INFOCOM 2000. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE; 04/2000
  • Source
    R. Cohen, Y. Hamo
    [Show abstract] [Hide abstract]
    ABSTRACT: TCP suffers from low performance over asynchronous transfer mode (ATM) networks. This is mainly because during phases of congestion, ATM drops cells without taking into account the effect this has on the upper layer protocols. Two main algorithms, called PPD and EPD, were proposed in the past for improving TCP performance. However they address one aspect of the problem, that has only small effect on the final performance. In this paper we propose an enhanced method for packet discard, called balanced packet discard (BPD), that improves TCP performance dramatically on congested networks and guarantees fairness among multiple connections. We show that BPD increases TCP throughput by more than 25% compared to EPD/PPD
    INFOCOM 2000. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE; 04/2000
  • Source
    E. Felstaine, R. Cohen
    [Show abstract] [Hide abstract]
    ABSTRACT: ATM private network-to-network interface (PNNI) is a hierarchical and dynamic link-state routing protocol, designed to scale to the largest possible ATM networks, encompassing thousands of nodes. This paper investigates the route computation load imposed by the PNNI routing scheme, and shows that this load is unevenly distributed among the network nodes. More specifically, the routing computation load associated with the setup of a single virtual path grows exponentially with the hierarchy level. As a result, some of the network nodes-mainly those that function as border nodes of high levels-may be overloaded with route computation, while other nodes are rarely involved in this process. This paper also proposes a possible scheme for spreading the route computation burden more evenly. According to this scheme, heavily loaded nodes transfer route computation tasks to lightly loaded nodes
    IEEE/ACM Transactions on Networking 01/2000; · 1.99 Impact Factor
  • Source
    E. Felstaine, R. Cohen, O. Hader
    [Show abstract] [Hide abstract]
    ABSTRACT: When an ATM node discovers that it cannot continue the setup of a virtual channel under the requested QoS, it initiates a back-tracking procedure called “crankback”. We propose a novel scheme, referred to as crankback prediction, that decreases the crankback overhead. Under the proposed scheme, nodes check during the connection admission control procedure whether the establishment of a virtual channel has a good chance to be admitted over the entire designated route. If this is not the ease, crankback is initiated even before a certain QoS parameter is exceeded
    INFOCOM '99. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE; 04/1999
  • Source
    E. Aharoni, R. Cohen
    [Show abstract] [Hide abstract]
    ABSTRACT: The paper addresses the issue of minimizing the number of nodes involved in routing over a multicast tree and in the maintenance of such a tree in a datagram network. It presents a scheme where the tree routing and maintenance burden is laid only upon the source node and the destination nodes associated with the multicast tree. The main concept behind this scheme is to view each multicast tree as a collection of unicast paths and to locate only the multicast source and destination nodes on the junctions of their multicast tree. The paper shows that despite this restriction, the cost of the created multicast trees is not necessarily higher than the cost of the trees created by other algorithms that do not impose the restriction and therefore require all nodes along the data path of a tree to participate in routing over the tree and in the maintenance of the tree
    IEEE/ACM Transactions on Networking 07/1998; 6(3):286-297. · 1.99 Impact Factor

Publication Stats

249 Citations
10.34 Total Impact Points

Institutions

  • 2013
    • University of Haifa
      H̱efa, Haifa District, Israel
  • 1998–2008
    • Technion - Israel Institute of Technology
      • Electrical Engineering Group
      H̱efa, Haifa District, Israel