Efficient Hashing technique based on Bloom filter for High-Speed Network

被引:11
作者
He, Gang [1 ]
Du, Yanzhe [1 ]
Yu, Dechen [2 ]
机构
[1] Beijing Univ Posts & Telecommun, Beijing Key Lab Network Syst Architecture & Conve, Beijing, Peoples R China
[2] Wisetone Technol Co Ltd, Beijing, Peoples R China
来源
2016 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT HUMAN-MACHINE SYSTEMS AND CYBERNETICS (IHMSC), VOL. 1 | 2016年
关键词
High-Speed Network; more efficient Hashing Scheme; Hash function; data storing structure; collision resolution policy; PBS-CPE;
D O I
10.1109/IHMSC.2016.94
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Hashing is an extensively used technique for packet-processing of High-Speed Network. Hashing provides a more efficient way for storing and looking up TCP sessions, achieving O(1), query, insert, and delete operations at low loads. However, with the rapid development of Network, we have to deal with packets from higher-speed as well as higher-load Network which means that it should be necessary to process more packets in constant time. In this case, traditional hashing scheme using a single hash function with chaining to deal with collisions cannot alleviate the situation of more frequent collisions caused by increased table occupancy and load. In this paper, we aim to seek what makes a more efficient Hashing Scheme from three aspects: Hash function, data storing structure and collision resolution policy. Also, we will survey much of the recent work in hashing scheme, paying particular attention to their performance in High-Speed Network and the difference in their performance when dealing with various situations. Besides, in this paper, we propose a Hashing-Scheme called PBS-CPE (Previous Bucket Store-Change Priority of Elements). Strictly speaking, PBS-CPE is a fast-querying method instead of a complete set of Hashing Scheme, however, PBS-CPE can fit in as part of any efficient Hashing Scheme just because of this.
引用
收藏
页码:58 / 63
页数:6
相关论文
共 12 条
  • [1] [Anonymous], [No title captured]
  • [2] Bing Xiong, 2011, J HUAZHONG U SCI TEC, V39, P19
  • [3] BRODER AZ, 1990, PROCEEDINGS OF THE FIRST ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS, P43
  • [4] Cormode G, 2010, COMPUT COMMUN NETW S, P1, DOI 10.1007/978-1-84882-765-3
  • [5] Cuckoo hashing: Further analysis
    Devroye, L
    Morin, P
    [J]. INFORMATION PROCESSING LETTERS, 2003, 86 (04) : 215 - 219
  • [6] Hasan J, 2006, CONF PROC INT SYMP C, P203, DOI 10.1145/1150019.1136503
  • [7] PACKET TRAINS - MEASUREMENTS AND A NEW MODEL FOR COMPUTER NETWORK TRAFFIC
    JAIN, R
    ROUTHIER, SA
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1986, 4 (06) : 986 - 995
  • [8] Simple summaries for hashing with choices
    Kirsch, Adam
    Mitzenmacher, Michael
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2008, 16 (01) : 218 - 231
  • [9] Kumar Sailesh., 2005, Proceedings of the ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), P91
  • [10] Theory and Practice of Bloom Filters for Distributed Systems
    Tarkoma, Sasu
    Rothenberg, Christian Esteve
    Lagerspetz, Eemil
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2012, 14 (01): : 131 - 155