Title :
Fully pipelined bloom filter architecture
Author :
Paynter, Michael ; Kocak, Taskin
Author_Institution :
Dept. of Electr. & Electron. Engieering, Bristol Univ., Bristol
fDate :
11/1/2008 12:00:00 AM
Abstract :
Recently, we proposed a two-stage pipelined Bloom filter architecture to save power for network security applications. In this letter, we generalize the pipelined Bloom filter architecture to k-stage and show that significant power savings can be achieved by employing one hash function per stage. We analytically show that the expected power consumption and latency of the fully pipelined Bloom filter architecture will not be greater than that of the two hash functions and two clock cycles, respectively, however large the number of hash functions is. Furthermore, we discuss the worst-case performance of the proposed architecture.
Keywords :
data structures; filters; pipeline processing; power consumption; clock cycles; hash functions; network security; power consumption; power savings; two-stage pipelined Bloom filter; Clocks; Delay; Energy consumption; Filters; Hardware; Intrusion detection; Peer to peer computing; Routing; Telecommunication traffic; Testing; Bloom filters; low-power design; network intrusion detection;
Journal_Title :
Communications Letters, IEEE
DOI :
10.1109/LCOMM.2008.081176