I have a very nice shaper in my linux box :-)

How the configurator works — it’s another question, here i will try to describe how one could configure her shaper with hash-based filtering.

So, this page about configuring linux kernel traffic shaper, which uses filter hashing for massive IP processing.

  1. Introduction
  2. Idea
  3. Task
  4. Configuring
  5. Real case
  6. Notes

Introduction

In a couple of words::

Shaper, in some sense, is a queueing discipline, which processes queue(s) of packets. Discipline may be classless or classfulClassful means that certain traffic may be shaped by certain class.

For certain traffic to be shaped by certain class, there is certain filter should be configured.

So, in some sense, classful discipline consists of two trees — tree of classes and tree of filters. Filters filter packets to classes, classes shape traffic.

Anyway, these topics discovered in a lot of manuals :-)

Why hashes.

«Filters tree» is a defined sequence of filters, with possible jumps between branches. But if tree has a lot of filters, it takes a lot of time to reach mathing one.

If while filters tree is a sequence of check an IP address for a match, it is far more effective to use hashes. Hash is a table of keys «matching» their «values», so for every key there may be only one value, and hash searching (»which value corresponds to this key?») is very fast.

In our case key is an IP address and value for a key is a filter, which filters a packet to a certain shaping class.

Surely, see also a LARTC HOWTO chapter for this.

Idea

So, if we create a table with 256 cells for /24 network and look for neede cell using IP address as a key, every needed filter we will find by one step. It would be 128 steps (in average) with no hash table.

If we need to manage two /24 networks, we can create three tables, two of them for 256 cells (for /24’s) and one with two cells. First select «proper» large table by «network» key and then find proper filter by IP (host part particularly).

Like this:

Lets take two /24, 192.168.1.0/24 and 192.168.2.0/24.

Third bytes are 00000001 and 00000010 (in binary format) respectively.

So, kernel with the very first filter chooses a cell in two-cells table — by third byte in IP address. In that cell there is a filter, which points to one of two 256-cells table, and uses fourth byte as a key. With this filter kernel can find the last (possibly) filter in particular cell of particular table. (»Posibly» — because that filter can point to elsewhere, be chained to other filter(s)). The last filter filters a packet to a class, which shapes a packet.

The task

We have:

  • Five networks /24: 192.168.1.0/24, 192.168.2.0/24 .. 192.168.5.0/24
  • Interface $DEV , directed to these networks

We need:

  • To shape packets depending on destination IP address
  • Unclassified traffic should be shaped on a special class

Configuring

We will want to have a script, which will configure our kernel… Or to configure kernel directly:

# it may be useful to distinct between
# configuring and creating script:
#tc="/sbin/tc"

tc="/bin/echo /sbin/tc"

Create root qdisc (class 90 — for unclassified traffic):

$tc qdisc add dev $DEV root handle 1: htb default 90

Root class:

$tc class add dev $DEV parent 1:0 classid 1:1 htb rate 100Mbit

Now we need to create «root filter» — other filters need this:

$tc filter add dev $DEV parent 1:1 prio 10 protocol ip u32

Create a table with five cells, one cell for every /24:

# divisor 5 --- table for 5 cells:
$tc filter add dev $DEV parent 1:1 protocol ip prio 10 handle 8: u32 divisor 5

Now let’s create five tables with 256 cells each:

for i in 1 2 3 4 5; do
$tc filter add dev $DEV parent 1:1 prio 10 handle ${i}: protocol ip u32 divisor 256
done

Now let’s fill upper table (with 5 cells), it must contain jumps to particular 256-cells table:

for i in 1 2 3 4 5; do
$tc filter add dev $DEV parent 1:1 protocol ip prio 10 \
u32 ht 8:$[i-1]: \
match ip dst 192.168.${i}.0/24 \
hashkey mask 0x000000ff at 16 \
link $i:
done

This means: put in cell $[i-1] of table 8 (ht 8:$[i-1]:) a filter, which takes a fourth byte
(hashkey mask 0x000000ff) of destination IP address (match ip dst 192.168.${i}.0/24), and uses it as a key for searching in table $i (link $i:).

Now — a «master filter», which uses tree bits of third byte as a key for searching in a main table:

$tc filter add dev $DEV parent 1:0 protocol ip prio 100 u32 ht 800:: \
match ip dst 192.168.0.0/21 \
hashkey mask 0x00000700 at 16 link 8:

It means — root filter (ht 800::) must check destination IP address and, if it matches one our networks, (match ip dst 192.168.0.0/21) use last three bits of third byte of address (hashkey mask 0x00000700 at 16) as a key for searching in table 8 (link 8:).

Now we may create classes/filters for our clients.

This is a very individual process (every administrator decides in which format she will store configuration data — classids, rates etc.), so for the sake of demonstration we will create one clients class and a filter for it:

# class 1: 320 --- parent for clients' classes:
$tc class add dev $DEV parent 1:1 classid 1:230 htb rate 30Mbit ceil 50Mbit quantum 1500 . . .
#
# particular client:

$tc class add dev $DEV parent 1:230 classid 1:431 htb rate 2Mbit ceil 10Mbit quantum 1500 burst . . .
$tc filter add dev $DEV protocol ip parent 1:0 prio 100 u32 ht 3:4: match ip dst 192.168.3.4 flowid 1:431

Last command means — In a fifth cell (numbered from zero!) of third table (for 192.168.3.0/24) out a filter, which will filter packets in class 1:431.

So in a loop we can create classes and filters for every client — and we actually fill our 256-cells tables with these filters.

Real case

In a real case the administrator may want to keep configuration data in a SQL database, real scripts may differ a lot but perform the same job. Such shapers scale quite well, we may double (tripe, quadruple etc ….) number of networks, but filters will work very fast.

Probably you will configure your shaper at a bridge — HTB works quite nice at bridged interfaces, with no IP address assigned.

Notes

  • When i worked on this configuration, i noticed that it is necessary to create a «whole» number of 256-cells tables: it should be equal to (2^^n – 1), where n is a number of /24 networks. So, i have to create more tables than i actually need, but otherwise it doesn’t work :-)
  • Cells are numbered starting with zero; cells numbers must be in hex. So, in the example above — u32 ht 3:4: match — four (4) is in hex, too :-)
  • This is the first beta draft :-)

Optimizing shaper — hashing filters (HTB)的更多相关文章

  1. Hashing filters for very fast massive filtering

    If you have a need for thousands of rules, for example if you have a lot of clients or computers, al ...

  2. 【Ansible 文档】【译文】模版(Jinja2)

    Templating (Jinja2) 正如在 variables 部分描述的那样, Ansible 使用Jinja2模版来启用动态表达式和访问变量. Ansible 扩展了许多 filtes 和 t ...

  3. 【Ansible 文档】【译文】常见问题

    http://docs.ansible.com/ansible/latest/faq.html 如何为一个task或者整个Playbook设置PATH或者任意其他环境变量? 通过environment ...

  4. 布隆过滤器(Bloom Filters)的原理及代码实现(Python + Java)

    本文介绍了布隆过滤器的概念及变体,这种描述非常适合代码模拟实现.重点在于标准布隆过滤器和计算布隆过滤器,其他的大都在此基础上优化.文末附上了标准布隆过滤器和计算布隆过滤器的代码实现(Java版和Pyt ...

  5. ABP(现代ASP.NET样板开发框架)系列之13、ABP领域层——数据过滤器(Data filters)

    点这里进入ABP系列文章总目录 基于DDD的现代ASP.NET开发框架--ABP系列之13.ABP领域层——数据过滤器(Data filters) ABP是“ASP.NET Boilerplate P ...

  6. ASP.NET MVC Filters 4种默认过滤器的使用【附示例】

    过滤器(Filters)的出现使得我们可以在ASP.NET MVC程序里更好的控制浏览器请求过来的URL,不是每个请求都会响应内容,只响应特定内容给那些有特定权限的用户,过滤器理论上有以下功能: 判断 ...

  7. Unity性能优化(3)-官方教程Optimizing garbage collection in Unity games翻译

    本文是Unity官方教程,性能优化系列的第三篇<Optimizing garbage collection in Unity games>的翻译. 相关文章: Unity性能优化(1)-官 ...

  8. Unity性能优化(4)-官方教程Optimizing graphics rendering in Unity games翻译

    本文是Unity官方教程,性能优化系列的第四篇<Optimizing graphics rendering in Unity games>的翻译. 相关文章: Unity性能优化(1)-官 ...

  9. [Algorithm] 局部敏感哈希算法(Locality Sensitive Hashing)

    局部敏感哈希(Locality Sensitive Hashing,LSH)算法是我在前一段时间找工作时接触到的一种衡量文本相似度的算法.局部敏感哈希是近似最近邻搜索算法中最流行的一种,它有坚实的理论 ...

随机推荐

  1. JBOSS常用端口说明

    1.jboss 的端口修改位置总结 Jboss通常占用的端口是1098,1099,4444,4445,8080,8009,8083,8093这几个, 默认端口是8080 在windows系统中: 10 ...

  2. Centos 下搭建SVN + Apache 服务器(转载)

    安装软件包 ? 1 # yum install httpd ? 1 # yum install mod_dav_svn ? 1 # yum install subversion 2.  验证安装 ? ...

  3. java引用类型

      java数据类型图: java的数据类型分基本数据类型(原始数据类型)和引用数据类型:1.基本八大类,图中可以很清楚的看到:这种类型的数据变量在声明之后java就会立刻分配给他内存空间.如:sho ...

  4. 1968: [Ahoi2005]COMMON 约数研究

    #include<cstdio> #include<iostream> #define M 1000008 using namespace std; long long tot ...

  5. 二模 (8) day1

    第一题: 题目大意: 梦幻城市每年为全市高中生兴办一次运动会.为促使各校同学之间的交流,采用特别的分队方式:每一个学校的同学,必须被均匀分散到各队,使得每一队中该校的人数皆相同.为增加比赛的竞争性,希 ...

  6. Ibatis.Net 入门示例(一)

    新项目用的是Ibatis.Net.哥的感觉是NHibernate才是哥的最爱.没办法,即使重复,也要抽时间学习.努力做好这份工作再说吧. 一.Ibatis.Net-SQLServer2008 还是以哥 ...

  7. IT公司100题-14-排序数组中和为给定值的两个数字

    问题描述: 输入一个升序排序的数组,给定一个目标值target,求数组的两个数a和b,a+b=target.如果有多个组合满足这个条件,输出任意一对即可. 例如,输入升序数组[1, 3, 4, 5, ...

  8. AbstractMap学习记录

    package java.util;import java.util.Map.Entry; /** * This class provides a skeletal implementation of ...

  9. android listview getviewtypecount和getItemViewType

    package newdemo.jeno.listviewdemo; import android.app.Activity;import android.os.Bundle;import andro ...

  10. JavaScript 时间特效 显示当前时间

    <!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/ ...