Fig. 2. BF-based routing table lookup for L2 switching.
Fig. 3. A high-level illustration of the approach using nBFs.
Fig. 4. The condition to outperform BFs only case.
Fig. 5. A high-level illustration of the approach using sBF.
Fig. 6. False positive rate w.r.t. the storage space (600 K elements, 10 subsets, and 10% NACTIVE).
Fig. 7. False positive rate w.r.t. the number of subsets (1 MB storage space, 600 K elements, and 10% NACTIVE ).
Fig. 8. Bits per element for achieving the target false positive rate (1 MB storage space, 600 K elements,10 subsets, and 10% NACTIVE).
Fig. 9. Comparison with existing approaches (nBF).
Fig. 10. A high-level illustration of sTable.
Fig. 11. The membership query error rate w.r.t the number of subsets (1 MB storage space, 600 Kelements, and 10% NACTIVE).
Fig. 12. The processing time w.r.t the number of subsets (1 MB storage space, 600 K elements, and 10%NACTIVE).
Fig. 13. The required amount of storage space for achieving the target error probability (1 MB storagespace, 600 K elements, 10 subsets, and 10% NACTIVE).
Fig. 1. Element insertion and membership query using a BF: (a) filter initialization, (b) element insertion, and (c) membership query.
Table 1. Routing table lookup time
table lookup time by 58% compared to the hash table. Table 2. Comparison of sTable and hash table
References
- S. Dharmapurikar, P. Krishnamurthy, and D. E. Taylor, "Longest prefix matching using bloom filters," IEEE/ACM Transactions on Networking (TON), vol. 14, no. 2, pp. 397-409, 2006. https://doi.org/10.1109/TNET.2006.872576
- M. Yu, A. Fabrikant, and J. Rexford, "BUFFALO: bloom filter forwarding architecture for large organizations," in Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies, Rome, Italy, 2009, pp. 313-324.
- H. Wu, D. Yang, and G. Zhang, "SybilBF: defending against Sybil attacks via Bloom filters," ETRI Journal, vol. 33, no. 5, pp. 826-829, 2011. https://doi.org/10.4218/etrij.11.0210.0431
- J. Byers, J. Considine, M. Mitzenmacher, and S. Rost, "Informed content delivery across adaptive overlay networks," ACM SIGCOMM Computer Communication Review, vol. 32, no. 4, pp. 47-60, 2002. https://doi.org/10.1145/964725.633031
- L. Fan, P. Cao, J. Almeida, and A. Z. Broder, "Summary cache: a scalable wide-area web cache sharing protocol," IEEE/ACM Transactions on Networking (TON), vol. 8, no. 3, pp. 281-293, 2000. https://doi.org/10.1109/90.851975
- B. H. Bloom, "Space/time trade-offs in hash coding with allowable errors," Communications of the ACM, vol. 13, no. 7, pp. 422-426, 1970. https://doi.org/10.1145/362686.362692
- Click modular router, https://github.com/kohler/click.
- B. Fan, D. G. Andersen, M. Kaminsky, and M. D. Mitzenmacher, "Cuckoo filter: Practically better than bloom," in Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies, Sydney, Australia, 2014, pp. 75-88.
- A. Crainiceanu, "Bloofi: a hierarchical Bloom filter index with applications to distributed data provenance," in Proceedings of the 2nd International Workshop on Cloud Intelligence, Trento, Italy, 2013.
- J. Lu, T. Yang, Y. Wang, H. Dai, L. Jin, H. Song, and B. Liu, "One-hashing bloom filter," in Proceedings of 2015 IEEE 23rd International Symposium on Quality of Service (IWQoS), Portland, OR, 2015, pp. 289-298.
- T. Yang, A. X. Liu, M. Shahzad, Y. Zhong, Q. Fu, Z. Li, G. Xie, and X. Li, "A shifting bloom filter framework for set queries," Proceedings of the VLDB Endowment, vol. 9, no. 5, pp. 408-419, 2016. https://doi.org/10.14778/2876473.2876476
- Y. Liu, X. Ge, D. H. C. Du, and X. Huang, "Par-BF: a parallel partitioned Bloom filter for dynamic data sets," The International Journal of High Performance Computing Applications, vol. 30, no. 3, pp. 259-275, 2016. https://doi.org/10.1177/1094342015618452
- S. Tarkoma, C. E. Rothenberg, and E. Lagerspetz, "Theory and practice of bloom filters for distributed systems," IEEE Communications Surveys & Tutorials, vol. 14, no. 1, pp. 131-155, 2011.
- M. Zhong, P. Lu, K. Shen, and J. Seiferas, "Optimizing data popularity conscious bloom filters," in Proceedings of the 27th ACM Symposium on Principles of Distributed Computing, Toronto, Canada, 2008, pp. 355-364.
- J. Bruck, J. Gao, and A. Jiang, "Weighted bloom filter," in Proceedings of 2006 IEEE International Symposium on Information Theory, Seattle, WA, 2006, pp. 2304-2308.
- B. Donnet, B. Baynat, and T. Friedman, "Retouched bloom filters: allowing networked applications to trade off selected false positives against false negatives," in Proceedings of the 2006 ACM CoNEXT Conference, Lisbon, Portugal, 2006.
- C. Kim, M. Caesar, A. Gerber, and J. Rexford, "Revisiting route caching: the world should be flat," in Passive and Active Network Measurement. Heidelberg: Springer, 2009, pp. 3-12.
- COIN-OR Interior Point Optimizer (IPOPT) [Online]. Available: https://github.com/coin-or/Ipopt.
- D. Wagner, "A generalized birthday problem," in Advances in Cryptology-CRYPTO 2002. Heidelberg: Springer, 2002, pp. 288-304.