Skip to main content
Log in

Layered Hashing Algorithm for Real-time Systems

  • Published:
Theory of Computing Systems Aims and scope Submit manuscript

Abstract

We present a hashing mechanism designated for real-time systems. As such, it is faster than standard hashing techniques, yet remains low-cost and uses a relatively small amount of resources. We study a mathematical model of the proposed mechanism, and compare the theoretical results to statistics obtained from simulations. The main contribution of this work is a procedure to determine the appropriate dimensions of the Hash-Table as a function of the required load, and a long-run analysis of the distribution of elements in the table.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Knuth, D.: The art of computer programming. In: Sorting and Searching, 2nd edn., vol. 3, pp. 513–558. Addison-Wesley, Reading (1998). Sect. 6.4: Hashing

    Google Scholar 

  2. Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introduction to algorithms, 21nd edn. In: Hash Tables, pp. 221–252. MIT Press, Cambridge (2001). Chap. 11

    Google Scholar 

  3. Pagiamtzis, K., Sheikholeslami, A.: Content-addressable memory (CAM) circuits and architectures: a tutorial and survey. IEEE J. Solid-State Circuits 41(3), 712–727 (2006). http://www.pagiamtzis.com/pubs/pagiamtzis-jssc2006.pdf

    Article  Google Scholar 

  4. Wimax Forum: http://www.wimaxforum.org/

  5. IEEE Std 802–2001. IEEE standard for local and metropolitan area networks: overview and architecture. http://standards.ieee.org/getieee802/download/802-2001.pdf

  6. Kirsch, A., Mitzenmacher, M., Varghese, G.: Hash-based techniques for high-speed packet processing. http://www.eecs.harvard.edu/~michaelm/postscripts/dimacschapter-08.pdf

  7. Gonnet, G.H.: Expected length of the longest probe sequence in hash code searching. J. Assoc. Comput. Mach. 28, 289–304 (1981)

    Article  MATH  MathSciNet  Google Scholar 

  8. Broder, A., Mitzenmacher, M.: Using multiple hash functions to improve IP lookups. In: IEEE INFOCOM 2001

  9. Azar, Y., Broder, A., Karlin, A.R., Upfal, E.: Balanced allocations. SIAM J. Comput. 29(1), 180–200 (1999)

    Article  MATH  MathSciNet  Google Scholar 

  10. Vöcking, B.: How asymmetry helps load balancing. J. ACM 50(4), 568–589 (2003)

    Article  MathSciNet  Google Scholar 

  11. Broder, A., Karlin, A.R.: Multilevel adaptive hashing. In: Proceedings of the 1st ACM-SIAM Symposium on Discrete Algorithms (SODA), pp. 43–53 (1990)

    Google Scholar 

  12. Dietzfelbinger, M., Weidling, C.: Balanced allocation and dictionaries with tightly packed constant size bins. Theor. Comput. Sci. 380, 47–68 (2007)

    Article  MATH  MathSciNet  Google Scholar 

  13. Devroye, L., Morin, P.: Cuckoo hashing: further analysis. Inform. Process. Lett. 86(4), 215–219 (2003)

    Article  MATH  MathSciNet  Google Scholar 

  14. Pagh, R., Rodler, F.: Cuckoo hashing. J. Algorithms 51, 122–144 (2004)

    Article  MATH  MathSciNet  Google Scholar 

  15. Lu, Y., Montanari, A., Prabhakar, B., Dharmapurikar, S., Kabbani, A.: Counter braids: a novel counter architecture for per-flow measurement. In: Proceedings of the 2008 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS), 2008

  16. Kirsch, A., Mitzenmacher, M.: The power of one move: hashing schemes for hardware. In: Proceedings of the 27th IEEE International Conference on Computer Communications (INFOCOM), 2008

  17. Song, H., Dharmapurikar, S., Turner, J., Lockwood, J.: Fast hash table lookup using extended Bloom filter: an aid to network processing. In: Proceedings of ACM SIGCOMM, pp. 181–192 (2005)

    Google Scholar 

  18. Feistel, H.: Cryptography and computer privacy. Sci. Am. 228(5), 15–23 (1973)

    Article  Google Scholar 

  19. Feller, W.: An Introduction to Probability Theory and Its Applications, vol. 1, 3rd edn. Wiley, New York (1968), pp. 31–32

    MATH  Google Scholar 

  20. Abramowitz, M., Stegun, I.A. (eds.): Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables. 9th printing. Dover, New York (1972), p. 260

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Matan Mandelbrod.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Mandelbrod, M. Layered Hashing Algorithm for Real-time Systems. Theory Comput Syst 50, 279–295 (2012). https://doi.org/10.1007/s00224-010-9297-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00224-010-9297-0

Keywords

Navigation