Guided multiple hashing: Achieving near perfect balance for fast routing lookup

作者: Xi Tao , Yan Qiao , Jih-Kwon Peir , Shigang Chen , Zhuo Huang

DOI: 10.1109/ICNP.2013.6733607

关键词: Key-based routingRouting tablePacket forwardingComputer networkComputer scienceRouting (electronic design automation)RouterNetwork processorRouting protocolHash function

摘要: The routing and packet forwarding function is at the core of IP network-layer protocols. throughput a router constrained by speed which table lookup can be performed. Hash-based has been research focus in this area due to its O(1) average time, as compared other approachs such trie-based tends make more memory accesses. With series prior multi-hashing developments, including d-random, 2-left, d-left, we discover that new guided approach holds promise further pushing envelope line significant performance improvement beyond what today's best technology achieve. Our achieves near perfect load balance among hash buckets, while limiting number buckets probed for each key (address) lookup, where bucket one or few entries. Unlike localized optimization approaches, utilize full information multi-hash mapping from keys global key-to-bucket assignment. We have dual objectives lowering size increasing empty helps reduce brought off-chip network processor lookup. introduce mechanisms sure most lookups only require fetched. simulation results show with same functions, multiple-hashing schemes are balanced than d-left others, accessed reduced 20-50%.

参考文章(23)
Michael L. Fredman, János Komlós, On the Size of Separating Systems and Families of Perfect Hash Functions Siam Journal on Algebraic and Discrete Methods. ,vol. 5, pp. 61- 68 ,(1984) , 10.1137/0605009
Ronitt Rubinfeld, Bernard Chazelle, Joe Kilian, Ayellet Tal, The Bloomier filter: an efficient data structure for static support lookup tables symposium on discrete algorithms. pp. 30- 39 ,(2004) , 10.5555/982792.982797
Renzo Sprugnoli, Perfect hashing functions Communications of the ACM. ,vol. 20, pp. 841- 850 ,(1977) , 10.1145/359863.359887
Zhuo Huang, Jih-Kwon Peir, Shigang Chen, Approximately-perfect hashing: Improving network throughput through efficient off-chip routing table lookup international conference on computer communications. pp. 311- 315 ,(2011) , 10.1109/INFCOM.2011.5935158
A. Broder, M. Mitzenmacher, Using multiple hash functions to improve IP lookups international conference on computer communications. ,vol. 3, pp. 1454- 1463 ,(2001) , 10.1109/INFCOM.2001.916641
Burton H. Bloom, Space/time trade-offs in hash coding with allowable errors Communications of the ACM. ,vol. 13, pp. 422- 426 ,(1970) , 10.1145/362686.362692
Ralph Schlenk, Haoyu Song, Christian Hermsmeyer, Riccardo Gemelli, Stephan Bunse, Towards 100G packet processing: Challenges and technologies Bell Labs Technical Journal. ,vol. 14, pp. 57- 79 ,(2009) , 10.1002/BLTJ.V14:2
Haoyu Song, Sarang Dharmapurikar, Jonathan Turner, John Lockwood, Fast hash table lookup using extended bloom filter: an aid to network processing acm special interest group on data communication. ,vol. 35, pp. 181- 192 ,(2005) , 10.1145/1080091.1080114
B. Vocking, How asymmetry helps load balancing foundations of computer science. pp. 131- 141 ,(1999) , 10.1109/SFFCS.1999.814585