Cargando…
Efficient hash tables for network applications
Hashing has yet to be widely accepted as a component of hard real-time systems and hardware implementations, due to still existing prejudices concerning the unpredictability of space and time requirements resulting from collisions. While in theory perfect hashing can provide optimal mapping, in prac...
Autores principales: | , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Springer International Publishing
2015
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4441648/ https://www.ncbi.nlm.nih.gov/pubmed/26020021 http://dx.doi.org/10.1186/s40064-015-0958-y |
_version_ | 1782372814340227072 |
---|---|
author | Zink, Thomas Waldvogel, Marcel |
author_facet | Zink, Thomas Waldvogel, Marcel |
author_sort | Zink, Thomas |
collection | PubMed |
description | Hashing has yet to be widely accepted as a component of hard real-time systems and hardware implementations, due to still existing prejudices concerning the unpredictability of space and time requirements resulting from collisions. While in theory perfect hashing can provide optimal mapping, in practice, finding a perfect hash function is too expensive, especially in the context of high-speed applications. The introduction of hashing with multiple choices, d-left hashing and probabilistic table summaries, has caused a shift towards deterministic DRAM access. However, high amounts of rare and expensive high-speed SRAM need to be traded off for predictability, which is infeasible for many applications. In this paper we show that previous suggestions suffer from the false precondition of full generality. Our approach exploits four individual degrees of freedom available in many practical applications, especially hardware and high-speed lookups. This reduces the requirement of on-chip memory up to an order of magnitude and guarantees constant lookup and update time at the cost of only minute amounts of additional hardware. Our design makes efficient hash table implementations cheaper, more predictable, and more practical. |
format | Online Article Text |
id | pubmed-4441648 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2015 |
publisher | Springer International Publishing |
record_format | MEDLINE/PubMed |
spelling | pubmed-44416482015-05-27 Efficient hash tables for network applications Zink, Thomas Waldvogel, Marcel Springerplus Methodology Hashing has yet to be widely accepted as a component of hard real-time systems and hardware implementations, due to still existing prejudices concerning the unpredictability of space and time requirements resulting from collisions. While in theory perfect hashing can provide optimal mapping, in practice, finding a perfect hash function is too expensive, especially in the context of high-speed applications. The introduction of hashing with multiple choices, d-left hashing and probabilistic table summaries, has caused a shift towards deterministic DRAM access. However, high amounts of rare and expensive high-speed SRAM need to be traded off for predictability, which is infeasible for many applications. In this paper we show that previous suggestions suffer from the false precondition of full generality. Our approach exploits four individual degrees of freedom available in many practical applications, especially hardware and high-speed lookups. This reduces the requirement of on-chip memory up to an order of magnitude and guarantees constant lookup and update time at the cost of only minute amounts of additional hardware. Our design makes efficient hash table implementations cheaper, more predictable, and more practical. Springer International Publishing 2015-05-15 /pmc/articles/PMC4441648/ /pubmed/26020021 http://dx.doi.org/10.1186/s40064-015-0958-y Text en © Zink and Waldvogel; licensee Springer. 2015 This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly credited. |
spellingShingle | Methodology Zink, Thomas Waldvogel, Marcel Efficient hash tables for network applications |
title | Efficient hash tables for network applications |
title_full | Efficient hash tables for network applications |
title_fullStr | Efficient hash tables for network applications |
title_full_unstemmed | Efficient hash tables for network applications |
title_short | Efficient hash tables for network applications |
title_sort | efficient hash tables for network applications |
topic | Methodology |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4441648/ https://www.ncbi.nlm.nih.gov/pubmed/26020021 http://dx.doi.org/10.1186/s40064-015-0958-y |
work_keys_str_mv | AT zinkthomas efficienthashtablesfornetworkapplications AT waldvogelmarcel efficienthashtablesfornetworkapplications |