Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Packet Classification with Evolvable Hardware Hash Functions – An Intrinsic Approach

  • Conference paper
Biologically Inspired Approaches to Advanced Information Technology (BioADIT 2006)

Abstract

Bandwidth demands of communication networks are rising permanently. Thus, the requirements to modern routers regarding packet classification are rising accordingly. Conventional algorithms for packet classification use either a huge amount of memory or have high computational demands to perform the task. Using a hash function in order to classify packets is promising regarding both memory and computation time. However, such a hash function needs to be of high performance and cheap in hardware costs. These two design goals are contradictory. To limit the costs of a hardware implementation, known good hash functions, as used for software implementations of encryption algorithms, are applicable to only a limited extend. To achieve the goals mentioned above, an adaptive hash function is needed. In this paper, an approach for a hardware packet classifier using an evolvable hash function is presented. It consists of an evolutionary algorithm which is entirely implemented in hardware.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Gupta, P., McKweon, N.: Algorithms for packet classification. IEEE Network, 24–32 (2001)

    Google Scholar 

  2. Gupta, P., McKweon, N.: Packet classification using hierarchical intelligent cuttings. IEEE Micro., 34–41 (2000)

    Google Scholar 

  3. Goldberg, D.E.: Genetic algorthms in search, optimization, and machine learning. Addison-Wesley, Reading (1999) (20th printing)

    Google Scholar 

  4. Yao, X., Higuchi, T.: Promises and challenges of evolvable hardware. IEEE Transactions on Systems, Man, and Cybernetics - Part C (1999)

    Google Scholar 

  5. Knuth, D.E.: The art of computer programming, sorting and searching, 3rd edn., vol. 3. Addison-Wesley, Reading (1998)

    Google Scholar 

  6. Tufte, G., Haddow, P.C.: Prototyping a ga pipeline for complete hardware evolution. Evolvable Hardware, 143–150 (1999)

    Google Scholar 

  7. Damiani, E., Tettamanzi, A.G.B.: On-line evolution of fpga-based circuits: A case study on hash functions. Evolvable Hardware, 33–36 (1999)

    Google Scholar 

  8. Broder, A., Mitzenmacher, M.: Using multiple hash functions to improve ip lookups. IEEE Infocom., 1454–1463 (2001)

    Google Scholar 

  9. Kubisch, S., Hecht, R., Timmermann, D.: Design flow on a chip - an evolvable hw/sw platform. In: 2nd IEEE ICAC, pp. 393–394 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Widiger, H., Salomon, R., Timmermann, D. (2006). Packet Classification with Evolvable Hardware Hash Functions – An Intrinsic Approach. In: Ijspeert, A.J., Masuzawa, T., Kusumoto, S. (eds) Biologically Inspired Approaches to Advanced Information Technology. BioADIT 2006. Lecture Notes in Computer Science, vol 3853. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11613022_8

Download citation

  • DOI: https://doi.org/10.1007/11613022_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-31253-6

  • Online ISBN: 978-3-540-32438-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics