978-1-4244-1694-3/08/$25.00 ©2008 IEEE A Space- and Time-Ecient Hash Table Hierarchically Indexed by Bloom Filters Heeyeol Yu and Rabi Mahapatra Texas A&M University College Station, TX 77843 Email: {hyyu,rabi}@cs.tamu.edu Abstract Hash tables (HTs) are poorly designed for multiple mem- ory accesses during IP lookup and this design flow critically aects their throughput in high-speed routers. Thus, a high capacity HT with a predictable lookup throughput is desir- able. A recently proposed fast HT (FHT) [20] has draw- backs like low on-chip memory utilization for a high-speed router and substantial memory overheads due to o-chip du- plicate keys and pointers. Similarly, a Bloomier filter-based HT (BFHT) [13], generating an index to a key table, suers from setup failures and static membership testing for keys. In this paper, we propose a novel hash architecture which addresses these issues by using pipelined Bloom filters. The proposed scheme, a hierarchically indexed HT (HIHT), gen- erates indexes to a key table for the given key, so that the on-chip memory size is reduced and the overhead of point- ers in a linked list is removed. Secondly, an HIHT demon- strates approximately 5.1 and 2.3 times improvement in on- chip space eciency with at most one o-chip memory ac- cess, compared to an FHT and a BFHT, respectively. In ad- dition to our analyses on access time and memory space, our simulation for IP lookup with 6 BGP tables shows that an HIHT exhibits 4.5 and 2.0 times on-chip memory eciencies for 160Gbps router than an FHT and a BFHT, respectively. 1. Introduction The rapid increase in high-bandwidth usage applications from a huge number of hosts has resulted in a substantial de- mand for high-speed and large-scale routers. It is observed that a class of fast packet processing, such as packet classifi- cation and IP lookup, has become critical data path functions for these networking applications. These functions have en- joyed wide application in networking devices to support fire- wall, access control list, and quality of service in several net- work domains. They look up a packet in a table that fits its associated rule under various matching conditions, such as singleton, longest prefix match, or range match. One in- teresting lookup scheme uses Ternary Content Addressable Memory (TCAM) to achieve deterministic and high-speed packet processing [14, 22, 24]. Unlike TCAM with high cost and power consumption, ap- proaches using a Bloom filter (BF) have been widely docu- mented in literature on networking [8–11, 13, 18, 20]. A BF is a virtually generalized hash mechanism for an approxi- mate membership testing with memory-ecient set repre- sentation. Dharmapurikar et al. in [9] introduced the first algorithm to employ BFs working in parallel for IP lookup. However, any packet processing that simply uses BFs like [9, 11, 18] can only provide an approximate match, so that it will suer time loss from the later sequential perfect match. Traditionally for a fast perfect match search, a hash table (HT) is widely used to perform fast associative lookups since the search requires O(1) average memory access per lookup. A typical HT application is a network packet processing in a high-speed network router device [13, 19, 20, 23]. In this domain, it is desirable to reduce memory cost and to im- prove lookup speed by using a small amount of fast on-chip memory that takes 1-5ns and cheap o-chip memory that takes 10ns. Beyond a need of having an O(1) complexity for IP lookup with on/o-chip memories, a collision rate for a given lookup must also satisfy the bandwidth requirement of a high-speed router. For example, a 160Gbps router re- quires a deterministic process of 500M packets of minimum size 40 bytes per second. Thus, on average, a chance of col- lision among 500M lookups does not satisfy the bandwidth requirement of the 160Gbps router. Literature [9, 13, 20] on a BF has focused on the deterministic lookup with a very low collision rate, so that for a given lookup a few accesses to o-chip memory are made. These approaches [13,20], however, have the following defects not suitable for a high-speed and large-scale router: 1) Song et al. [20] claimed that for a perfect match a fast HT (FHT) with help of a BF improves the performance over a legacy HT (LHT) by combining hashed linked lists with Authorized licensed use limited to: National Cheng Kung University. Downloaded on April 30, 2009 at 06:11 from IEEE Xplore. Restrictions apply.