PEDS: A PARALLEL ERROR DETECTION SCHEME FOR TCAM DEVICES Author: Anat Bremler-Barr, David Hay, Danny Hendler and Ron M. Roth Publisher/Conf.: IEEE INFOCOM.

Slides:



Advertisements
Similar presentations
Mahdi Barhoush Mohammad Hanaysheh
Advertisements

Cyclic Code.
Error Control Code.
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
II. Linear Block Codes. © Tallal Elshabrawy 2 Last Lecture H Matrix and Calculation of d min Error Detection Capability Error Correction Capability Error.
NETWORKING CONCEPTS. ERROR DETECTION Error occures when a bit is altered between transmission& reception ie. Binary 1 is transmitted but received is binary.
Chien Hsing James Wu David Gottesman Andrew Landahl.
DIGITAL COMMUNICATION Coding
EEE377 Lecture Notes1 EEE436 DIGITAL COMMUNICATION Coding En. Mohd Nazri Mahmud MPhil (Cambridge, UK) BEng (Essex, UK) Room 2.14.
Chapter 11 Algebraic Coding Theory. Single Error Detection M = (1, 1, …, 1) is the m  1 parity check matrix for single error detection. If c = (0, 1,
PEDS: Parallel Error Detection Scheme for TCAM Devices David Hay, Politecnico di Torino Joint work with Anat Bremler Barr (IDC), Danny Hendler (BGU) and.
Low Density Parity Check Codes LDPC ( Low Density Parity Check ) codes are a class of linear bock code. The term “Low Density” refers to the characteristic.
Error detection and correction
DIGITAL COMMUNICATION Coding
15-853Page :Algorithms in the Real World Error Correcting Codes I – Overview – Hamming Codes – Linear Codes.
Mario Vodisek 1 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Erasure Codes for Reading and Writing Mario Vodisek ( joint work.
Hamming Code Rachel Ah Chuen. Basic concepts Networks must be able to transfer data from one device to another with complete accuracy. Data can be corrupted.
Hamming Code A Hamming code is a linear error-correcting code named after its inventor, Richard Hamming. Hamming codes can detect up to two bit errors,
CS774. Markov Random Field : Theory and Application Lecture 10 Kyomin Jung KAIST Oct
exercise in the previous class (1)
Syndrome Decoding of Linear Block Code
Linear Codes.
PEDS: Parallel Error Detection Scheme for TCAM Devices David Hay, Politecnico di Torino Joint work with Anat Bremler Barr (IDC, Israel), Danny Hendler.
1 Channel Coding (II) Cyclic Codes and Convolutional Codes.
Combinatorial Algorithms Reference Text: Kreher and Stinson.
CODING/DECODING CONCEPTS AND BLOCK CODING. ERROR DETECTION CORRECTION Increase signal power Decrease signal power Reduce Diversity Retransmission Forward.
Error Control Code. Widely used in many areas, like communications, DVD, data storage… In communications, because of noise, you can never be sure that.
Codes Codes are used for the following purposes: - to detect errors - to correct errors after detection Error Control Coding © Erhan A. Ince Types: -Linear.
Error Detection and Correction
§6 Linear Codes § 6.1 Classification of error control system § 6.2 Channel coding conception § 6.3 The generator and parity-check matrices § 6.5 Hamming.
DIGITAL COMMUNICATIONS Linear Block Codes
Hamming codes. Golay codes.
1 Introduction to Quantum Information Processing CS 667 / PH 767 / CO 681 / AM 871 Richard Cleve DC 2117 Lecture 20 (2009)
The Bloom Paradox Ori Rottenstreich Joint work with Yossi Kanizo and Isaac Keslassy Technion, Israel.
ADVANTAGE of GENERATOR MATRIX:
Chapter 31 INTRODUCTION TO ALGEBRAIC CODING THEORY.
Information and Coding Theory Cyclic codes Juris Viksna, 2015.
Information Theory Linear Block Codes Jalal Al Roumy.
Word : Let F be a field then the expression of the form a 1, a 2, …, a n where a i  F  i is called a word of length n over the field F. We denote the.
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
The parity bits of linear block codes are linear combination of the message. Therefore, we can represent the encoder by a linear system described by matrices.
10.1 Chapter 10 Error Detection and Correction Data can be corrupted during transmission. Some applications require that errors be detected and.
Basic Concepts of Encoding Codes and Error Correction 1.
Error Detection and Correction – Hamming Code
Error Detection and Correction
Digital Communications I: Modulation and Coding Course Term Catharina Logothetis Lecture 9.
Data Communications and Networking
Error-Detecting and Error-Correcting Codes
HIGH-PERFORMANCE LONGEST PREFIX MATCH LOGIC SUPPORTING FAST UPDATES FOR IP FORWARDING DEVICES Author: Arun Kumar S P Publisher/Conf.: 2009 IEEE International.
Hamming Distance & Hamming Code
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Error Control Coding. Purpose To detect and correct error(s) that is introduced during transmission of digital signal.
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Space-Efficient TCAM-based Classification Using Gray Coding Authors: Anat Bremler-Barr and Danny Hendler Publisher: IEEE INFOCOM 2007 Present: Chen-Yu.
Richard Cleve DC 2117 Introduction to Quantum Information Processing QIC 710 / CS 667 / PH 767 / CO 681 / AM 871 Lecture (2011)
Channel Coding: Part I Presentation II Irvanda Kurniadi V. ( ) Digital Communication 1.
REVIEW Linear Combinations Given vectors and given scalars
parity bit is 1: data should have an odd number of 1's
Part 2 Linear block codes
Communication Networks: Technology & Protocols
DATA COMMUNICATION AND NETWORKINGS
The Variable-Increment Counting Bloom Filter
Welcome to the presentation. Linear Block Codes Almost all block codes used today belong to a subset called linear block codes. The exclusive OR of two.
Subject Name: Information Theory Coding Subject Code: 10EC55
II. Linear Block Codes.
Block codes. encodes each message individually into a codeword n is fixed, Input/out belong to alphabet Q of cardinality q. The set of Q-ary n-tuples.
Information Redundancy Fault Tolerant Computing
II. Linear Block Codes.
Error Detection and Correction
Lecture 17 Making New Codes from Old Codes (Section 4.6)
Presentation transcript:

PEDS: A PARALLEL ERROR DETECTION SCHEME FOR TCAM DEVICES Author: Anat Bremler-Barr, David Hay, Danny Hendler and Ron M. Roth Publisher/Conf.: IEEE INFOCOM 2009 Speaker: Han-Jhen Guo Date:

OUTLINE Introduction The Proposed Scheme Basic idea PEDS architecture Hardware design (with mod-2 counters) Performance 2

INTRODUCTION Problem statement (search key = 1101) false miss/hit indirect false hit 3

The Proposed Scheme - Basic idea Assume that only one error can occur in each pair of symbols For each clause in the TCAM memory (eg. 0*10) 1. encoding to a pair with the check bit(s) eg. 00** applying a sequence of TCAM searches for a predetermined set of search keys eg. predetermined set = {*…*01*…*, *…*10*…*}) 3. analyzing their results from step 2. there occurs 2 matches → no error (** is matched) there occurs no match → no error (00 or 11 is matched) there occurs 1 match only → ERROR! 4

The Proposed Scheme - Basic idea eg. check entry = *10* 5 ** ** 01 ** ** ** (m) 10 ** ** ** (m) ** ** ** 01 ** ** (n) ** 10 ** ** (n) ** ** ** ** 01 ** (n) ** ** 10 ** (n) ** ** ** ** ** 01 (m) ** ** ** 10 (m)

The Proposed Scheme - Basic idea eg. check entry = *10* with errors 6 ** * 01 ** ** ** (m) 10 ** ** ** (m) ** * ** 01 ** ** (n) ** 10 ** ** (n) ** * ** ** 01 ** (m) ** ** 10 ** (n) ** * ** ** ** 01 (m) ** ** ** 10 (n) ERROR!

THE PROPOSED SCHEME - PEDS ARCHITECTURE High-level PEDS architecture the i-th clause contains all the symbols whose indices modulo k equal i. 7

THE PROPOSED SCHEME - PEDS ARCHITECTURE (eg. of TCAM memory) check each of the W/k clauses (in conjunction with its check symbols) separately—but concurrently for all entries—against a predetermined set of search keys 8

THE PROPOSED SCHEME - PEDS ARCHITECTURE High-level PEDS architecture property of predetermined set of search keys an entry is error free if and only if the number of search keys that match it is in a predetermined set T (int. set) eg. T = {0, 2} 9 hardware-based mechanism counts the number of matches per entry and determines whether it belongs to T hardware-based mechanism counts the number of matches per entry and determines whether it belongs to T

The Proposed Scheme - Hardware design (with mod-2 counters) 1. Regard the 3 symbols “0”, “1”, and “*” as elements of the finite field of three elements, GF(3). Mapping: *  0; 0  +1; 1  Encode each k -symbol clause into an n -symbol block in every entry (each block is a codeword of C ) fix the linear [n; k; d] code C over GF(3) d is the minimum (Hamming) distance between any two distinct codewords in C, that is, every two codewords in C differ in at least d positions (and there are two codewords that differ in exactly d positions). can detect any pattern of less than d errors that occur in codewords of C, including changes to and from “*” 10

The Proposed Scheme - Hardware design (with mod-2 counters) eg. C = {(-1, -1), (0, 0), (+1, +1)} d = 2 11

THE PROPOSED SCHEME - HARDWARE DESIGN (WITH MOD-2 COUNTERS) 3. Find the parity-check matrix H of C H is a right kernel of C eg., → r = 3 4. Find the L(h i ) eg. 12

THE PROPOSED SCHEME - HARDWARE DESIGN (WITH MOD-2 COUNTERS) 5. Decode for locating the erroneous entries Theorem - Let the k -symbol clauses in the TCAM be encoded into n -symbol blocks such that each block is a codeword of a linear [n; k; d] code C over F, and let h 1, h 2,…, h r be the rows of a parity-check matrix of C. Suppose that each block is subject to less than d errors. Then the following two conditions are equivalent for every block v in the TCAM: v is error-free. For every i = 1, 2, …, r, the number of vectors in L(h i ) that match v is even. 13

THE PROPOSED SCHEME - HARDWARE DESIGN (WITH MOD-2 COUNTERS) Hardware change required for implementing the fast detection scheme described above. ⊕ denotes a XOR gate □ denotes a 1-bit flip-flop 14

THE PROPOSED SCHEME - HARDWARE DESIGN (WITH MOD-2 COUNTERS) eg. 15 Flag as erroneous all TCAM entries whose match lines feed “1” to the priority encoder

THE PROPOSED SCHEME - HARDWARE DESIGN (WITH MOD-2 COUNTERS) eg. 16

THE PROPOSED SCHEME - HARDWARE DESIGN (WITH MOD-2 COUNTERS) eg. 17 Flag as erroneous all TCAM entries whose match lines feed “1” to the priority encoder

THE PROPOSED SCHEME - HARDWARE DESIGN (WITH MOD-2 COUNTERS) eg. 18 Flag as erroneous all TCAM entries whose match lines feed “1” to the priority encoder

PERFORMANCE The parameter k defines a trade-off when d is fixed resilience since the number of detectable errors per block is fixed, a poorer error rate requires using a smaller k space the number of check symbols per entry is proportional to the number W / k of blocks (clauses) per entry and, therefore, it reduces as k increases time the number of search keys that are applied during the decoding increases (exponentially) with k 19

PERFORMANCE The trade-off between the space and time assuming that the parity code is used (d = 2) with 100 information symbols (W = 100) 20 setting k to 3, 4, or 5 is the most practical choice

21