A Memory-optimized Bloom Filter using An Additional Hashing Function Author: Mahmood Ahmadi, Stephan Wong Publisher: IEEE GLOBECOM 2008 Presenter: Yu-Ping.

Slides:



Advertisements
Similar presentations
Hash Tables Many of the slides are from Prof. Plaisteds resources at University of North Carolina at Chapel Hill.
Advertisements

Comp 122, Spring 2004 Hash Tables – 1. hashtables - 2 Lin / Devi Comp 122, Fall 2003 Dictionary Dictionary: »Dynamic-set data structure for storing items.
Hashing.
An On-Chip IP Address Lookup Algorithm Author: Xuehong Sun and Yiqiang Q. Zhao Publisher: IEEE TRANSACTIONS ON COMPUTERS, 2005 Presenter: Yu Hao, Tseng.
1 Blooming Trees: Space-Efficient Structures for Data Representation Author: Domenico Ficara, Stefano Giordano, Gregorio Procissi, Fabio Vitucci Publisher:
Registers and Counters. Register Register is built with gates, but has memory. The only type of flip-flop required in this class – the D flip-flop – Has.
Author: Francis Chang, Wu-chang Feng, Kang Li Publisher: INFOCOM 2004 Presenter: Yun-Yan Chang Date: 2010/12/01 1.
An Efficient IP Address Lookup Algorithm Using a Priority Trie Authors: Hyesook Lim and Ju Hyoung Mun Presenter: Yi-Sheng, Lin ( 林意勝 ) Date: Mar. 11, 2008.
Bloom Filters Kira Radinsky Slides based on material from:
IP Address Lookup for Internet Routers Using Balanced Binary Search with Prefix Vector Author: Hyesook Lim, Hyeong-gee Kim, Changhoon Publisher: IEEE TRANSACTIONS.
1 Searching Very Large Routing Tables in Wide Embedded Memory Author: Jan van Lunteren Publisher: GLOBECOM 2001 Presenter: Han-Chen Chen Date: 2010/01/06.
1 A Heuristic and Hybrid Hash- based Approach to Fast Lookup Author: Gianni Antichi, Andrea Di Pietro, Domenico Ficara, Stefano Giordano, Gregorio Procissi,
1 Compressing Two-Dimensional Routing Tables Author: Subhash Suri, Tuomas Sandholm, Priyank Warkhede. Publisher: ALGO'03 Presenter: Yu-Ping Chiang Date:
1 Design of Bloom Filter Array for Network Anomaly Detection Author: Jieyan Fan, Dapeng Wu, Kejie Lu, Antonio Nucci Publisher: IEEE GLOBECOM 2006 Presenter:
1 Fast Packet Classification using Group Bit Vector Author: Tong Liu, Huawei Li, Xiaowei Li, Yinhe Han Publisher: IEEE GLOBECOM 2006 Presenter: Hsin-Mao.
1 On Constructing Efficient Shared Decision Trees for Multiple Packet Filters Author: Bo Zhang T. S. Eugene Ng Publisher: IEEE INFOCOM 2010 Presenter:
Spring 2003 ECE569 Lecture ECE 569 Database System Engineering Spring 2003 Yanyong Zhang
Look-up problem IP address did we see the IP address before?
1 Memory-Efficient 5D Packet Classification At 40 Gbps Authors: Ioannis Papaefstathiou, and Vassilis Papaefstathiou Publisher: IEEE INFOCOM 2007 Presenter:
Fast Packet Classification Using Bloom filters Author: Sarang Dharmapurikar, Haoyu Song, Jonathan Turner, John Lockwood Publisher: Architecture for networking.
1 Regular expression matching with input compression : a hardware design for use within network intrusion detection systems Department of Computer Science.
A Multi Gigabit FPGA-based 5-tuple classification system Author: Antonis Nikitakis, Ioannis Papaefstathiou; Publisher: Communications, ICC '08. IEEE.
Hashing for dummies 1 For quick search, insert and delete of data from a table. 1 figures and concepts from MITOPENCOURSEWARE
HASH TABLES Malathi Mansanpally CS_257 ID-220. Agenda: Extensible Hash Tables Insertion Into Extensible Hash Tables Linear Hash Tables Insertion Into.
1 HEXA: Compact Data Structures or Faster Packet Processing Author: Sailesh Kumar, Jonathan Turner, Patrick Crowley, Michael Mitzenmacher. Publisher: ICNP.
Fast and Scalable Packet Classification Using Perfect Hash functions Author: Viktor Puš, Jan Korenek Publisher: FPGA’09 Presenter: Yu-Ping Chiang Date:
BUFFALO: Bloom Filter Forwarding Architecture for Large Organizations Minlan Yu Princeton University Joint work with Alex Fabrikant,
Hash, Don’t Cache: Fast Packet Forwarding for Enterprise Edge Routers Minlan Yu Princeton University Joint work with Jennifer.
1. 2 Problem RT&T is a large phone company, and they want to provide enhanced caller ID capability: –given a phone number, return the caller’s name –phone.
PARALLEL TABLE LOOKUP FOR NEXT GENERATION INTERNET
Author: Haoyu Song, Fang Hao, Murali Kodialam, T.V. Lakshman Publisher: IEEE INFOCOM 2009 Presenter: Chin-Chung Pan Date: 2009/12/09.
Course Teacher: Moona Kanwal
1 CSE 326: Data Structures: Hash Tables Lecture 12: Monday, Feb 3, 2003.
CSE 326: Data Structures Lecture #16 Hashing HUGE Data Sets (and two presents from the Database Fiancée) Steve Wolfman Winter Quarter 2000.
Author : Guangdeng Liao, Heeyeol Yu, Laxmi Bhuyan Publisher : Publisher : DAC'10 Presenter : Jo-Ning Yu Date : 2010/10/06.
On Adding Bloom Filters to Longest Prefix Matching Algorithms
1 A Throughput-Efficient Packet Classifier with n Bloom filters Authors: Heeyeol Yu and Rabi Mahapatra Publisher: IEEE GLOBECOM 2008 proceedings Present:
HASHING PROJECT 1. SEARCHING DATA STRUCTURES Consider a set of data with N data items stored in some data structure We must be able to insert, delete.
1 Introduction to Hashing - Hash Functions Sections 5.1, 5.2, and 5.6.
1 Blooming Trees for Minimal Perfect Hashing Author: Gianni Antichi, Domenico Ficara, Stefano Giordano, Gregorio Procissi, Fabio Vitucci Publisher: GLOBECOM.
Author: Heeyeol Yu and Rabi Mahapatra
The Bloom Paradox Ori Rottenstreich Joint work with Isaac Keslassy Technion, Israel.
Data Structure II So Pak Yeung Outline Review  Array  Sorted Array  Linked List Binary Search Tree Heap Hash Table.
Midterm Midterm is Wednesday next week ! The quiz contains 5 problems = 50 min + 0 min more –Master Theorem/ Examples –Quicksort/ Mergesort –Binary Heaps.
Author : Yang Xu, Lei Ma, Zhaobo Liu, H. Jonathan Chao Publisher : ANCS 2011 Presenter : Jo-Ning Yu Date : 2011/12/28.
1 Efficient System-on-Chip Energy Management with a Segmented Counting Bloom Filter Mrinmoy Ghosh- Georgia Tech Emre Özer- ARM Ltd Stuart Biles- ARM Ltd.
Hash Tables ADT Data Dictionary, with two operations – Insert an item, – Search for (and retrieve) an item How should we implement a data dictionary? –
Tables, hashtables, relations and dictionaries Dr. Andrew Wallace PhD BEng(hons) EurIng
Cuckoo Filter: Practically Better Than Bloom Author: Bin Fan, David G. Andersen, Michael Kaminsky, Michael D. Mitzenmacher Publisher: ACM CoNEXT 2014 Presenter:
1 Data Structures CSCI 132, Spring 2014 Lecture 33 Hash Tables.
Hashing & Hash Tables. Sets/Dictionaries Set - Our best efforts to date:
Duplicate Detection in Click Streams(2005) SubtitleAhmed Metwally Divyakant Agrawal Amr El Abbadi Tian Wang.
Hierarchical packet classification using a Bloom filter and rule-priority tries Source : Computer Communications Authors : A. G. Alagu Priya 、 Hyesook.
Author : Masanori Bando and H. Jonathan Chao Publisher : INFOCOM, 2010 Presenter : Jo-Ning Yu Date : 2011/02/16.
Singleton Processing with Limited Memory Peter L. Montgomery Microsoft Research Redmond, WA, USA.
Chapter 11 (Lafore’s Book) Hash Tables Hwajung Lee.
Author: Heeyeol Yu; Mahapatra, R.; Publisher: IEEE INFOCOM 2008
Operation performed by Linear Structure
CS223 Advanced Data Structures and Algorithms
Bloom Filters Burton Bloom (1970) Favorite Data Structure
Bloom Filters Burton Bloom (1970) Favorite Data Structure
תרגול 8 Hash Tables ds162-ps08 11/23/2018.
Bloom Filters Very fast set membership. Is x in S? False Positive
A Small and Fast IP Forwarding Table Using Hashing
Counter Integrated Circuits (I.C.s)
CS223 Advanced Data Structures and Algorithms
Compact DFA Structure for Multiple Regular Expressions Matching
Author: Yi Lu, Balaji Prabhakar Publisher: INFOCOM’09
2019/10/9 Regular Expression Matching for Reconfigurable Constraint Repetition Inspection Authors : Miad Faezipour and Mehrdad Nourani Publisher : IEEE.
An index-split Bloom filter for deep packet inspection
Presentation transcript:

A Memory-optimized Bloom Filter using An Additional Hashing Function Author: Mahmood Ahmadi, Stephan Wong Publisher: IEEE GLOBECOM 2008 Presenter: Yu-Ping Chiang Date: 2009/04/29

Outline Related work  Regular bloom filter  Pruned bloom filter BFAH (bloom filter with an additional hashing function) Performance

Regular bloom filter Address Bit-array R0 R2 R3 R1 H1(R1) H2(R1) H3(R1) R0 R1 R0 R1 R2 R3 R2 R3 R0

Regular bloom filter - search Address Bit-array Input: X H1(X) H3(X) R0 R1 R0 R1 R2 R3 R2 R3 H2(X) R0 NO match any rule !! Disadvantages: ‧ Can’t delete rule ‧ Duplicate rules in memory

Pruned bloom filter Bit-array Address R0 R2 R3 R1 R0 R1 R2 R Counter ‧ After set bit-array for all rules, save rule only in smallest counter position.

Outline Related work  Regular bloom filter  Pruned bloom filter BFAH (bloom filter with an additional hashing function) Performance

BFAH Determine which place will use to insert item. Address Bit-array R0 R2 R3 R1 H1(R1) H2(R1) H3(R1) Additional hash function

BFAH - example Address Bit-array R0 H1(R1) H2(R1) H3(R1) Additional hash function rule_num mod 3 Input : 0 Output : 0 R0

BFAH - example Address Bit-array R0 R1 Additional hash function rule_num mod 3 Input : 1 Output : 1 R0 R1

BFAH - example Address Bit-array R0 R2 R3 R1 Additional hash function rule_num mod 3 R0 R1 R3 R2

Outline Related work  Regular bloom filter  Pruned bloom filter BFAH (bloom filter with an additional hashing function) Performance

R.B : Regular Bloom filter P.C.B : Pruned Counting Bloom filter M.B : BFAH k = # of hash functions m = size of bit array n = # of items (rules)

Performance R.B : Regular Bloom filter P.C.B : Pruned Counting Bloom filter M.B : BFAH k = # of hash functions m = size of bit array n = # of items (rules)

Performance Average number of collisions for all rule-set.