DocumentCode :
1004983
Title :
Fully pipelined bloom filter architecture
Author :
Paynter, Michael ; Kocak, Taskin
Author_Institution :
Dept. of Electr. & Electron. Engieering, Bristol Univ., Bristol
Volume :
12
Issue :
11
fYear :
2008
fDate :
11/1/2008 12:00:00 AM
Firstpage :
855
Lastpage :
857
Abstract :
Recently, we proposed a two-stage pipelined Bloom filter architecture to save power for network security applications. In this letter, we generalize the pipelined Bloom filter architecture to k-stage and show that significant power savings can be achieved by employing one hash function per stage. We analytically show that the expected power consumption and latency of the fully pipelined Bloom filter architecture will not be greater than that of the two hash functions and two clock cycles, respectively, however large the number of hash functions is. Furthermore, we discuss the worst-case performance of the proposed architecture.
Keywords :
data structures; filters; pipeline processing; power consumption; clock cycles; hash functions; network security; power consumption; power savings; two-stage pipelined Bloom filter; Clocks; Delay; Energy consumption; Filters; Hardware; Intrusion detection; Peer to peer computing; Routing; Telecommunication traffic; Testing; Bloom filters; low-power design; network intrusion detection;
fLanguage :
English
Journal_Title :
Communications Letters, IEEE
Publisher :
ieee
ISSN :
1089-7798
Type :
jour
DOI :
10.1109/LCOMM.2008.081176
Filename :
4685977
Link To Document :
بازگشت