Proceedings of the 2005 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications 2005
DOI: 10.1145/1080091.1080114
|View full text |Cite
|
Sign up to set email alerts
|

Fast hash table lookup using extended bloom filter

Abstract: Hash tables are fundamental components of several network processing algorithms and applications, including route lookup, packet classification, per-flow state management and network monitoring. These applications, which typically occur in the data-path of high-speed routers, must process and forward packets with little or no buffer, making it important to maintain wire-speed throughout. A poorly designed hash table can critically affect the worst-case throughput of an application, since the number of memory a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
199
0

Year Published

2006
2006
2014
2014

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 231 publications
(200 citation statements)
references
References 24 publications
1
199
0
Order By: Relevance
“…Fast Hash Table [10], Cuckoo Hashing [11], and Tree Bitmap [12]), we adopt the basic Naïve Hash Table (NHT) [13] because NHT supports parallelisable fast lookups in multiple memories without additional memory overhead, and new replacement policies can be added with minimal effort.…”
Section: Addressing Schemementioning
confidence: 99%
See 1 more Smart Citation
“…Fast Hash Table [10], Cuckoo Hashing [11], and Tree Bitmap [12]), we adopt the basic Naïve Hash Table (NHT) [13] because NHT supports parallelisable fast lookups in multiple memories without additional memory overhead, and new replacement policies can be added with minimal effort.…”
Section: Addressing Schemementioning
confidence: 99%
“…Many indexing schemes were suggested (e.g., [12]) but the most popular ones are variations of hash tables [10,11].…”
Section: Related Workmentioning
confidence: 99%
“…1 However, extraction of 2D matching features at high-speed edge routers is not an easy task. We will address this issue in Sections III and IV.…”
Section: A Motivationmentioning
confidence: 99%
“…During the lookup process, a specific row index is generated by the hash function and the row is searched to find the target key. An important design goal in this case is to minimize the worst-case length of the linked lists and to balance the bucket population by using Bloom filters-like data structures [5,6,7].…”
Section: Introductionmentioning
confidence: 99%