期刊文献+

CAM辅助的哈希表查找性能分析 被引量:3

Analysis on Lookup of CAM Aided Hash Table
下载PDF
导出
摘要 现有大规模IP流处理方式中,哈希机制极具优势而在高速网络环境下被广泛采用,但其查找性能直接受限于访存次数。该文主要研究了CAM(Content Addressable Memory)辅助的哈希表(CAHT)查找性能。利用合理的近似,推导了单函数CAHT查找时平均访存次数的理论下限;结合单函数CAHT的分析结论给出了多函数CAHT查找时达到平均访存次数最小的条件。最后,使用实际网络数据验证了分析结果的有效性,为准确评估CAHT处理能力提供了必要的理论依据。 Hashing is popularly adopted when it comes to a large scale of IP flows.High throughout is available with minimized average memory access number.This paper mainly focused on the lookup performance of CAM(Content Addressable Memory) Aided Hash Table(CAHT).By rational approximation,the paper provides the lower bound on average memory access number over lookup of CASHT;based on the analysis of CASHT,the paper also proposes the condition when to get the lower bound on average memory access number over lookup of CAMHT;Finally,simulation of actual network data shows its consistency to the theory model,which gives essential theory support to design and evaluate the hashing scheme in the actual applications.
出处 《电子与信息学报》 EI CSCD 北大核心 2011年第2期272-277,共6页 Journal of Electronics & Information Technology
基金 国家973计划项目(2007CB307102) 国家863计划项目(2008AA01A323)资助课题
关键词 CAM(Content ADDRESSABLE Memory)辅助的哈希表(CAHT) 查找 平均访存次数下限 泊松分布 CAM(Content Addressable Memory) Aided Hash Table(CAHT) Lookup Lower bound of average memory access Poisson distribution
  • 相关文献

参考文献11

  • 1Yan H, Maltz D A, and Eugene Ng T S, et al.. Tesseract: a 4D network control plane [C]. 4th USENIX Symposium on Networked Systems Design & Implementation (NSDI), Cambridge, MA, USA, April 11-13, 2007: 369-382.
  • 2Casado M, Freedman M J, and Pettit J, et al.. Ethane: taking control of the enterprise [J]. ACM SIGCOMM Computer Communication Review, 2007, 37(4): 1-12.
  • 3McKeown N, Anderson T, and Balakrishnan H. OpenFlow: enabling innovation in campus networks [J]. ACM SIGCOMM Computer Communication Review, 2008, 38(2): 69-74.
  • 4Azar Y, Broder A Z, and Karlin A R, et al.. Balanced allocation [J]. SIAM Journal on Computing, 1999, 29(1): 180-200.
  • 5Kirsch A and Mitzenmacher M. The power of one move: hashing schemes for hardware [C]. the 27th IEEE International Conference on Computer Communications (INFOCOM), Phoenix, AZ, USA, April 15-17, 2008: 565-573.
  • 6Fotakis D, Pagh R, and Sanders P, et al.. Space efficient hash tables with worst case constant access time [C]. the 20th Annual Symposium on Theoretical Aspects of Computer Science, Berlin, Germany, February 27-March 1, 2003: 271-282.
  • 7Kanizo Y, Hay D, and Keslassy I. Optimal fast hashing [C]. the 28th IEEE International Conference on Computer Communications (INFOCOM), Rio de Janeiro, Brazil, April 19-25. 2009:2500-2508.
  • 8Bremler-Barr A, Hay D, and Hendler D, et al.. Layered interval codes for team-based classification [C]. the 2008 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, Annapolis MD, USA, June 2-6, 2008:445-446.
  • 9Steele M J. Le Cam's inequality and Poisson approximations [J]. American Mathematical Monthly, 1994, 101(1): 48-54.
  • 10Kurtz T G. Solutions of ordinary differential equations as limits of pure jump Markov processes [J]. Journal of Applied Probability, 1970, 7(1): 49-58.

二级参考文献9

  • 1IP Flow information export (ipfix). 2004. http://www.ietf. org/html.charters/ipfix-charter.html
  • 2Thompson K, Miller G, Wilder R. Wide area Internet traffic patterns and characteristics. IEEE Network, 1997,11(6):10-23.
  • 3Cisco Netflow. 2004. http://www.cisco.com/warp/public/732/Tech/nmp/netflow/index.shtml
  • 4Jain R. A comparison of hashing schemes for address lookup in computer networks. IEEE Trans. on Communications, 1992,40(3):1570-1573.
  • 5Cao Z, Wang Z, Zegura E. Performance of hashing-based schemes for Internet load balancing. In: Nokia FB, ed. Proc. of the IEEE INFOCOM 2000. Piscataway: IEEE Computer and Communications Societies, 2000. 332-341.
  • 6Duffield NG, Grossglauser M. Trajectory sampling for direct traffic observation. IEEE/ACM Trans. on Networking, 2001,9(3):280-292.
  • 7NLANR network traffic packet header traces. 2004. http://pma.nlanr.net/Traces/
  • 8Niccolini S, Molina M, Duffield N. Hash functions description for packet selection. 2003. http://www.watersprings.org/pub/id/draft-niccolini-hash-descr-00.txt
  • 9程光,龚俭,丁伟.基于统计分析的高速网络分布式抽样测量模型[J].计算机学报,2003,26(10):1266-1273. 被引量:24

共引文献53

同被引文献27

  • 1宋宇鲲,王锐,胡永华,高明伦.使用排队论模型对FIFO深度的研究[J].仪器仪表学报,2006,27(z3):2485-2487. 被引量:10
  • 2唐自立.红黑树的高度[J].苏州大学学报(自然科学版),2006,22(3):33-36. 被引量:4
  • 3李之棠,程鹏.一种评价Hash编码策略性能的方法[J].计算机应用研究,1996,13(5):31-32. 被引量:1
  • 4CORMEN T H. , LEISERSON C E, RONSLD L. 算法导论[M].北京:机械工业出版社,2006:1-8.
  • 5DALLY W J, POULTON J W. Digital systems engineering[M] Cambridge (UK): Cambridge University Press, 1998.
  • 6BALCH M. Complete digital design[M]. New York: McGraw-Hill 2003.
  • 7COCHRAN A J, BAILEY P N, CARR L S. FIFO buffer depth estimation for asynchronous gapped payloads: US, 7227678B1 [P]. 2007-06-05.
  • 8Nicolai M.losuttis,C + + standard library:a tutorial and reference[M] .Boston:Addis on Wesley Longman Inc,1999:175-216.
  • 9SEIFERT R, EDWARDS J. The all-new switch book: the complete guide to Ian switching technology[M]. Indianapolis: Wiley Publishing, 2008.
  • 10PAPAEFSTATIllOU V, PAPAEFSTATIllOU I. A hardware-engine for layer-2 classification in low-storage, ultrahigh bandwidth environments[C]llProceedings of the Conference on Design, Automation and Test. Belgium: European Design and Automation Association, 2006: 112-117.

引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部