Level compressed DAGs for lookup tables

نویسندگان

  • Ioannis Ioannidis
  • Ananth Grama
چکیده

Trie-based data structures for implementing IP lookups have attracted considerable research aUention. Techniques such as path compression, level compression, generalized level compression, and controlled prefix expansion are commonly used to implement lookup tables. [0 this paper, we present a fundamentally new technique that relies on directed acyclic graphs (DAGs). which, when coupled with generalized level compression, yield significantly better performance than existing techniques. Current im· plementations of trie-hased lookup tables utilize a route validation table in addition to a trie to enable fixed-length sub-prefix resolution to support path compression. This path validation enables us to merge different, partially filled subtrees to form full subtrees. The resulting DAGs introduce spurious routes that are eliminated in the validation phase. When combined with level compression (and generalized level compression), this slructure yields considerably shoder paths than existing approaches. In this paper, we describe transformation of tries to DAGs, algorithms for packing complementary subtrees, and profile performance of these algorithms and resulting improvements in lookup time. Specifically, we demonstrate, on actual lookup tables, performance gains cfup to 34% compared to LC-tries with minimal memory overhead (a little over 1%). Considering the fad that an LC trie is already a highly optimized structure, these gains are remarkable.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Fast Computation of Monochromatic Infrared Atmospheric Transmittances Using Compressed Look-Up Tables

We present a new technique for the fast computation of near-monochromatic atmospheric transmittances in the infrared, utilizing compressed lookup tables, that is well suited for nadir viewing satellite and airplane observations. The algorithm is very simple to use in radiative transfer codes and is easily adapted to provide analytic Jacobians of radiances. A Singular Value Decomposition (SVD) i...

متن کامل

Compressing IP Forwarding Tables: Towards Entropy Bounds and Beyond A revised technical report

Lately, there has been an upsurge of interest in compressed data structures, aiming to pack ever larger quantities of information into constrained memory without sacrificing the efficiency of standard operations, like random access, search, or update. The main goal of this paper is to demonstrate how data compression can benefit the networking community, by showing how to squeeze the IP Forward...

متن کامل

Experimental Evaluations of Algorithms for IP Table Minimization

The continuous growth of the routing tables sizes in backbone routers is one of the most compelling scaling problems affecting the Internet and has originated considerable research in the design of compacting techniques. Various algorithms have been proposed in the literature both for a single and for multiple tables, also with the possibility of performing address reassignments [1, 5]. In this...

متن کامل

IP Routing Lookups Algorithms Evaluation

We consider the problem of organizing the Internet routing tables in such a way as to enable fast routing lookup performance We concentrate on two recently proposed methods and try to evaluate their performance We describe our implementation of the methods and results of performance measurements on existing as well as arti cially generated input data We present some conclusions about the genera...

متن کامل

Cascade hash tables: a series of multilevel double hashing schemes with O(1) worst case lookup time

In this paper, the author proposes a series of multilevel double hashing schemes called cascade hash tables. They use several levels of hash tables. In each table, we use the common double hashing scheme. Higher level hash tables work as fail-safes of lower level hash tables. By this strategy, it could e ectively reduce collisions in hash insertion. Thus it gains a constant worst case lookup ti...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computer Networks

دوره 49  شماره 

صفحات  -

تاریخ انتشار 2005