Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1159913.1159950acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
Article
Free access

Beyond bloom filters: from approximate membership checks to approximate state machines

Published: 11 August 2006 Publication History

Abstract

Many networking applications require fast state lookups in a concurrent state machine,which tracks the state of a large number of flows simultaneously.We consider the question of how to compactly represent such concurrent state machines. To achieve compactness,we consider data structures for Approximate Concurrent State Machines (ACSMs)that can return false positives,false negatives,or a "don 't know "response.We describe three techniques based on Bloom filters and hashing,and evaluate them using both theoretical analysis and simulation.Our analysis leads us to an extremely efficient hashing-based scheme with several parameters that can be chosen to trade off space,computation,and the pact of errors.Our hashing approach also yields a simple alternative structure with the same functionality as a counting Bloom filter that uses much less space.We show how ACSMs can be used for video congestion control.Using an ACSM,a router can implement sophisticated Active Queue Management (AQM)techniques for video traffic (without the need for standards changes to mark packets or change video formats),with a factor of four reduction in memory compared to full-state schemes and with very little error.We also show that ACSMs show promise for real-time detection of P2P traffic.

References

[1]
E. Amir, S. McCanne. M. Vitterli. A Layered DCT coder for Internet Video. In Proc. IEEE International Conference on Image Processing Lausanne, Switzerland, Sept 1996.
[2]
B. Bloom. Space/time tradeoffs in in hash coding with allowable errors. Communications of the ACM 13(7):422--426, 1970.
[3]
A. Broder and M. Mitzenmacher. Using multiple hash functions to improve IP Lookups. In Proceedings of IEEE INFOCOM pp. 1454--1463, 2001.
[4]
A. Broder and M. Mitzenmacher. Network applications of Bloom filters: A survey. Internet Mathematics 1(4):485--509, 2004.
[5]
B. Chazelle, J. Kilian, R. Rubinfeld, and A. Tal. The Bloomier filter: an efficient data structure for static support lookup tables. In Proceedings of the Fifteenth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA) pp 30--39, 2004.
[6]
F. Bonomi, M. Mitzenmacher, R. Panigrahy, S. Singh, and G. Varghese. An Improved Construction for Counting Bloom Filters. To appear in the 2006 European Symposium on Algorithms.
[7]
S. Dharmapurikar, P. Krishnamurthy, T. Sproull, and J. Lockwood. Deep Packet Inspection using Parallel Bloom Filters. In IEEE Hot Interconnects 12 Stanford, CA, August 2003. IEEE Computer Society Press.
[8]
L. Fan, P. Cao, J. Almeida, and A. Z. Broder. Summary cache: a scalable wide-area Web cache sharing protocol. IEEE/ACM Transactions on Networking 8(3):281--293, 2000.
[9]
D. Forsgren, U. Jennehag. P. Osterberg, Objective Endtoend QoS Gain from Packet Prioritization and Layering in MPEG-2 streaming video. At http://amp.ece.cmu.edu/packetvideo2002/papers/61-ananhseors.pdf
[10]
T. Karargiannis, A. Broido, M. Faloutsos, and K. C. Claffy. Transport Layer Identification of P2P Traffic. In Proceedings of ACM SIGCOMM 2004.
[11]
T. Karargiannis, A. Broido, M. Faloutsos, and K.C.Claffy. BLINC: Multilevel Traffic Classification in the Dark. In Proceedings of ACM SIGCOMM 2005.
[12]
A. Kirsch and M. Mitzenmacher. Simple Summaries for Hashing with Multiple Choices. In Proc. of the Forty-Third Annual Allerton Conference 2005.
[13]
Y. Lu, B. Prabhakar, and F. Bonomi. Bloom Filters: Design Innovations and Novel Applications. In Proc. of the Forty-Third Annual Allerton Conference 2005.
[14]
Steve McCanne. Scalable Compression and Transmission of Internet Multicast Video. Ph. D. Thesis, Berkeley
[15]
M. Mitzenmacher.Compressed Bloom Filters. IEEE/ACM Transactions on Networking 10(5):613--620, 2002.
[16]
M. Mitzenmacher and E. Upfal. Probability and Computing: Randomized Algorithms and Probabilistic Analysis Cambridge University Press, 2005.
[17]
A. Pagh, R. Pagh, and S. Srinivas Rao. An Optimal Bloom Filter Replacement. In Proceedings of the Sixteenth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA) pp. 823--829, 2005.
[18]
A. Romanow and S. Floyd. Dynamics of TCP Traffic over ATM Networks. IEEE Journal on Selected Areas in Communications 13(4):633--641 (1995).
[19]
S. Sen, O. Spatscheck, and D. Wang. Accurate, Scalable In-network identification of P2P Traffic Using Application Signatures. In 13th International World Wide Web Conference New York City, 17--22 May 2004.
[20]
H. Song, S. Dharmapurikar, J. Turner, and J. Lockwood. Fast hash table lookup using extended Bloom filter: an aid to network processing. In Proceedings of ACM SIGCOMM pp. 181--192, 2005.
[21]
A. Snoeren, C. Partridge, L. Sanchez, C. Jones, F. Tchakountio, B. Schwartz, S. Kent, and W. Strayer. Single-Packet IP Traceback. IEEE/ACM Transactions on Networking 10(6):721--734, 2002.
[22]
Tektronix FTP site, ftp://ftp.tek.com/tv/test/streams/Element/MPEG-Video/625/
[23]
K. Thomson, G. J. Miller, and R. Wilder. Wide-area traffic patterns and characteristics. IEEE Network December 1997.
[24]
B. Vöcking. How asymmetry helps load balancing. In Proceedings of the 40th IEEE-FOCS pp. 131--140, 1999.

Cited By

View all
  • (2023)L-rCBF: Learning-Based Key–Value Data Structure for Dynamic Data ProcessingApplied Sciences10.3390/app13221211613:22(12116)Online publication date: 7-Nov-2023
  • (2023)${{\sf PEBA}}$: Enhancing User Privacy and Coverage of Safe Browsing ServicesIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.320476720:5(4343-4358)Online publication date: 1-Sep-2023
  • (2022)DH-SVRF: A Reconfigurable Unicast/Multicast Forwarding for High-Performance Packet Forwarding EnginesIEEE Transactions on Parallel and Distributed Systems10.1109/TPDS.2021.310889933:5(1262-1275)Online publication date: 1-May-2022
  • Show More Cited By

Index Terms

  1. Beyond bloom filters: from approximate membership checks to approximate state machines

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SIGCOMM '06: Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
    September 2006
    458 pages
    ISBN:1595933085
    DOI:10.1145/1159913
    • cover image ACM SIGCOMM Computer Communication Review
      ACM SIGCOMM Computer Communication Review  Volume 36, Issue 4
      Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
      October 2006
      445 pages
      ISSN:0146-4833
      DOI:10.1145/1151659
      Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 11 August 2006

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. bloom filters
    2. network flows
    3. state machines

    Qualifiers

    • Article

    Conference

    SIGCOMM06
    Sponsor:
    SIGCOMM06: ACM SIGCOMM 2006 Conference
    September 11 - 15, 2006
    Pisa, Italy

    Acceptance Rates

    Overall Acceptance Rate 462 of 3,389 submissions, 14%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)71
    • Downloads (Last 6 weeks)8
    Reflects downloads up to 01 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)L-rCBF: Learning-Based Key–Value Data Structure for Dynamic Data ProcessingApplied Sciences10.3390/app13221211613:22(12116)Online publication date: 7-Nov-2023
    • (2023)${{\sf PEBA}}$: Enhancing User Privacy and Coverage of Safe Browsing ServicesIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.320476720:5(4343-4358)Online publication date: 1-Sep-2023
    • (2022)DH-SVRF: A Reconfigurable Unicast/Multicast Forwarding for High-Performance Packet Forwarding EnginesIEEE Transactions on Parallel and Distributed Systems10.1109/TPDS.2021.310889933:5(1262-1275)Online publication date: 1-May-2022
    • (2022)Bloom Filter with Noisy Coding Framework for Multi-Set Membership TestingIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2022.3199646(1-14)Online publication date: 2022
    • (2022)FadingBF: A Bloom Filter With Consistent Guarantees for Online ApplicationsIEEE Transactions on Computers10.1109/TC.2020.303642471:1(40-52)Online publication date: 1-Jan-2022
    • (2021)Privacy-Preserving Traffic Monitoring with False Report Filtering via Fog-Assisted Vehicular CrowdsensingIEEE Transactions on Services Computing10.1109/TSC.2019.290306014:6(1902-1913)Online publication date: 1-Nov-2021
    • (2021)Bloom Filter With a False Positive Free ZoneIEEE Transactions on Network and Service Management10.1109/TNSM.2021.305907518:2(2334-2349)Online publication date: Jun-2021
    • (2021)A Stateful Bloom Filter for Per-Flow State MonitoringIEEE Transactions on Network Science and Engineering10.1109/TNSE.2021.30574598:2(1399-1413)Online publication date: 1-Apr-2021
    • (2021)Learned FBF: Learning-Based Functional Bloom Filter for Key-Value StorageIEEE Transactions on Computers10.1109/TC.2021.3112079(1-1)Online publication date: 2021
    • (2021)FBF: Bloom Filter for Fuzzy Membership Queries on Strings2021 IEEE 15th International Conference on Semantic Computing (ICSC)10.1109/ICSC50631.2021.00010(25-32)Online publication date: Jan-2021
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media