DocumentCode
1004983
Title
Fully pipelined bloom filter architecture
Author
Paynter, Michael ; Kocak, Taskin
Author_Institution
Dept. of Electr. & Electron. Engieering, Bristol Univ., Bristol
Volume
12
Issue
11
fYear
2008
fDate
11/1/2008 12:00:00 AM
Firstpage
855
Lastpage
857
Abstract
Recently, we proposed a two-stage pipelined Bloom filter architecture to save power for network security applications. In this letter, we generalize the pipelined Bloom filter architecture to k-stage and show that significant power savings can be achieved by employing one hash function per stage. We analytically show that the expected power consumption and latency of the fully pipelined Bloom filter architecture will not be greater than that of the two hash functions and two clock cycles, respectively, however large the number of hash functions is. Furthermore, we discuss the worst-case performance of the proposed architecture.
Keywords
data structures; filters; pipeline processing; power consumption; clock cycles; hash functions; network security; power consumption; power savings; two-stage pipelined Bloom filter; Clocks; Delay; Energy consumption; Filters; Hardware; Intrusion detection; Peer to peer computing; Routing; Telecommunication traffic; Testing; Bloom filters; low-power design; network intrusion detection;
fLanguage
English
Journal_Title
Communications Letters, IEEE
Publisher
ieee
ISSN
1089-7798
Type
jour
DOI
10.1109/LCOMM.2008.081176
Filename
4685977
Link To Document