US20130031065A1 - Multi-level compressed look-up tables formed by logical operations to compress selected index bits - Google Patents

Multi-level compressed look-up tables formed by logical operations to compress selected index bits Download PDF

Info

Publication number
US20130031065A1
US20130031065A1 US13/647,303 US201213647303A US2013031065A1 US 20130031065 A1 US20130031065 A1 US 20130031065A1 US 201213647303 A US201213647303 A US 201213647303A US 2013031065 A1 US2013031065 A1 US 2013031065A1
Authority
US
United States
Prior art keywords
stride
bits
entry
compressed
bit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US13/647,303
Inventor
Millind Mittal
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gula Consulting LLC
Original Assignee
Green Investment Fund LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Green Investment Fund LLC filed Critical Green Investment Fund LLC
Priority to US13/647,303 priority Critical patent/US20130031065A1/en
Assigned to GREEN INVESTMENT FUND, L.L.C. reassignment GREEN INVESTMENT FUND, L.L.C. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: X-ENGINES, INC.
Publication of US20130031065A1 publication Critical patent/US20130031065A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/901Indexing; Data structures therefor; Storage structures
    • G06F16/9027Trees
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99941Database schema or data structure
    • Y10S707/99942Manipulating data structure, e.g. compression, compaction, compilation
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99941Database schema or data structure
    • Y10S707/99943Generating database or data structure, e.g. via user interface

Definitions

  • This invention relates to table lookups, and more particularly to look-up engines for large table structures divided into strides.
  • a wide variety of types of data can be stored in a database or data structure. When there are many data items or records to be stored, the time needed to access a data item may become undesirably slow. Some data structures contain huge amounts to data. For example, large networks can have millions or billions of destinations and millions of intermediate nodes, and each node may be identified by its own network address.
  • IPv4 Internet Protocol version 4
  • IPv6 uses 128-bit IP addresses and can have 2 128 IP-addressable nodes.
  • Each record in a data structure might contain one IP address or a range of IP addresses.
  • Routers, switches, and other network nodes may contain a subset of the available IP addresses, and may query other devices for more detailed information.
  • the quantity of data records to be stored by a network device can still be quite large, even huge.
  • a network data structure may need to be expandable and able to store all 4 billion possible records, even though only a subset is stored at any time.
  • a content-addressable memory may also be used for an associative lookup.
  • a CAM may eliminate memory occupied by invalid entries, but CAM's are quite expensive and limited in size. Additionally, a special class of CAM may be required to support range matches. Such a special class of CAM is typically more expensive than a standard exact-match CAM.
  • the binary search scheme minimizes the memory-space penalty by arranging the entries in a sorted list, and then matching the search key against a value at a mid-point of a partition covering the range that contains the search key.
  • the number of accesses can be on the order of log 2 (N), where N is the number of total entries in the database.
  • Log 2 (N) accesses can be excessive for high-performance applications.
  • binary search on a sorted list does not lend itself well for supporting range or longest prefix matches.
  • a linear binary search may be used on multiple levels of lookup. Each bit of an input lookup key is used to decide between forks in paths through a tree-like table structure. Since multiple levels of search are required, search time is slow, although the storage space needed for the table is more efficient.
  • a traditional Trie structure has a number of access levels equal to a number of bits in the input key. Each stride, or jump to the next level, consumes one bit of the input key.
  • FIG. 1 shows prior-art stride tables in a multi-bit Trie structure.
  • Key 18 is the lookup key that is input to the table structure.
  • a lookup is an operation to find an entry in the table structure that matches key 18 .
  • Key 18 is divided into four strides S 1 , S 2 , S 3 , S 3 .
  • key 18 is only 8 bits wide, and each stride is 2 bits wide.
  • the number of strides and width of the strides may vary. Some strides may be larger than other strides.
  • the first stride S 1 selects one of four entries in first-level stride table 10 .
  • Entries in table 10 contain pointers to tables 12 in the second level. For example, the top second-level table 12 is pointed to by the top entry in table 10 , which is selected when S 1 is 11.
  • Another second-level table 12 ′ is pointed to by the third entry in table 10 , which is selected when S 1 is 01.
  • each stride is 2 bits
  • each entry in one level points to a table of 4 entries in the next level.
  • a single table 10 in level 1 expands to four tables 12 in the second level, sixteen tables 14 in the third level, and sixty-four tables 16 in the fourth level.
  • a lookup is performed by traversing the four levels of the tables in the table structure. For the example of key 18 having a value of 01110011, the first stride S 1 is 01 and selects the third entry in table 10 , which points to table 12 ′ in level 2 .
  • the two stride bits 11 for S 2 select from among the four entries in each of tables 12 . Since first-level stride table 10 pointed to table 12 ′, an entry from selected table 12 ′ is used and other tables 12 are ignored. The top entry in table 12 ′ is selected by the value (11) of S 2 . This top entry contains a pointer to selected table 14 ′ in level 3 .
  • the two stride bits S 3 of level three select from among the four entries in selected table 14 ′ in the third level.
  • the value of S 3 is 00, which selects the lowest entry in selected table 14 ′. This entry has a pointer to one of the 64 tables in level four, selected table 16 ′.
  • the value of the fourth stride S 4 , 11, selects the upper of four entries in selected stride table 16 ′. This entry contains the result of the lookup, or a pointer to the result. The value 01110011 of key 18 returns this result. Both the key and the result may be composed of several fields that are combined together.
  • intermediate results may be stored in entries in tables 10 , 12 , 14 of the intermediate levels, rather than only at the end (leaf) levels.
  • Trie structures modified for multi-bit strides are useful compromises between a fast but large single-level table, and a slow but storage-efficient Trie structure, the storage requirements may still be large using stride tables.
  • Network tables tend to be sparse tables since the address locations are sparsely populated with valid entries. Most memory locations tend to be empty, or have invalid entries.
  • a network router may contain entries for IP addresses within a local area or organization, rather than for the whole Internet. IP addresses outside this local area are sent to a gateway device. A network table for the local-area network router may not need many entries since remote IP addresses are passed off to another device.
  • the valid entries in a stride table may be compressed to squeeze our invalid entries and reduce the storage requirements. Ideally, only the valid entries would be stored, but in practice some invalid entries are also stored in the compressed tables. Thus the degree of compression may be less than ideal.
  • Five-tuple lookup uses five fields from packet headers to perform the lookup. The five fields are the IP source, IP destination, Protocol type, Port source and Port destination. For IPv4 the resulting key is 104 bits wide, while for IPv6 the key becomes 296 bit wide.
  • ACLs Access Control List
  • QoS Quality-of-Service
  • FIG. 2 shows a prior art compressed stride table.
  • Table 20 is a stride table such as one of tables 10 , 12 , 14 , 16 of FIG. 1 .
  • the current stride size is 4 bits.
  • the current stride of the input key is used as a 4-bit index address that selects one of the 16 entries in stride table 20 .
  • Each entry in stride table 20 is in a location identified by a 4-bit index of bits A 3 , A 2 , A 1 , A 0 .
  • Stride table 20 contains only 4 valid entries, at index locations 1100 , 1011 , 1001 , and 1000 .
  • the other 12 indexes contain invalid or empty entries.
  • index bit A 3 is not needed to select among the four valid entries.
  • Index bit A 3 could be removed or masked from stride table 20 .
  • a 3 -bit index is used in compressed stride table 20 ′ to select among the 8 entries in table 20 ′.
  • stride table 20 has been reduced by 50% by eliminating one index bit and deleting the empty entries from compressed stride table 20 ′.
  • Other stride tables could also be compressed, reducing the overall storage requirements.
  • compressed stride table 20 ′ While 50% is a significant size reduction, compressed stride table 20 ′ still has four invalid entries. All three index bits A 2 , A 1 , A 0 appear to be needed to select one of the four valid entries, since their indexes are now 100, 011, 001, and 000. Each of the three index bits A 2 , A 1 , A 0 toggle between 0 and 1 within these four entries, so another index bit cannot simply be deleted. For example, if A 3 was deleted, then the indexes would be 00, 11, 01, 00. The first and fourth entries would collide, having the same 2-bit index. Since these 2 entries might point to different results or next-level tables, the entries cannot be combined. Thus the maximum compression seems to be 50%, even though half of compressed stride table 20 ′ is empty or wasted space.
  • FIG. 1 shows prior-art stride tables in a multi-bit Trie structure.
  • FIG. 2 shows a prior art compressed stride table.
  • FIG. 3 shows a logically-compressed stride table.
  • FIG. 4 is a diagram illustrating masking and logically combining index bits to create compressed index bits for a logically-compressed stride table.
  • FIG. 5 shows a logical compressor in more detail.
  • FIG. 6 shows a generalized logical compressor with initial and final masking.
  • FIG. 7 shows a compressor that uses input bits, newly-created merged bits, and a final mask.
  • FIG. 8 shows a compressor that uses only newly-created merged bits with the final mask.
  • FIG. 9 shows details of a logical merger that creates merged index bits.
  • FIG. 10 shows a conditional-shift compress function
  • FIG. 11 shows storing of compression functions (CF) in a stride-table entry.
  • FIGS. 12A and 12B show a flowchart of an initialization routine to find discriminate bits used to compress a stride table.
  • FIG. 13 shows a subroutine to calculate the maximum deltas for pairs of test groups formed for a candidate bit-position.
  • FIG. 14 is an example of finding discriminate or compressed index bits.
  • FIGS. 15A , 15 B, and 15 C show a regional entry that covers a range of input key values.
  • FIGS. 16A , 16 B, and 16 C highlight adding an entry that overlaps a regional entry.
  • the present invention relates to an improvement in lookup table structures.
  • the following description is presented to enable one of ordinary skill in the art to make and use the invention as provided in the context of a particular application and its requirements.
  • Various modifications to the preferred embodiment will be apparent to those with skill in the art, and the general principles defined herein may be applied to other embodiments. Therefore, the present invention is not intended to be limited to the particular embodiments shown and described, but is to be accorded the widest scope consistent with the principles and novel features herein disclosed.
  • index bits may be compressed using various functions. For example, two or more index bits may be combined together into a single index bit using a logical function such as a logical XOR.
  • a logical function such as a logical XOR.
  • compression functions may be used such as XOR, AND, OR, rotate, shifts, and conditional operations.
  • a field in the table entry can indicate which logical functions to perform for the next level of stride tables. Thus the different logical functions may be mixed together within a table structure to optimize compression.
  • FIG. 3 shows a logically-compressed stride table.
  • Table 20 is a stride table such as one of tables 10 , 12 , 14 , 16 of FIG. 1 .
  • the current stride size is 4 bits.
  • the current stride of the input key is used as a 4-bit index address that selects one of the 16 entries in stride table 20 .
  • Each entry in stride table 20 is in a location identified by a 4-bit index of bits A 3 , A 2 , A 1 , A 0 .
  • Stride table 20 contains only 4 valid entries, at index locations 1100 , 1011 , 1001 , and 1000 .
  • the other 12 indexes contain invalid or empty entries.
  • index bit A 3 is not needed to select among the four valid entries.
  • Index bit A 3 could be removed or masked from stride table 20 , as was shown in prior-art FIG. 2 .
  • index bits A 2 and A 1 are combined by an XOR function to generate a new A 1 index bit.
  • the old A 2 and A 1 index bits are replaced by this new A 1 index bit.
  • the result is that a 2-bit index is used in compressed stride table 22 to select among the 4 entries in table 22 .
  • stride table 22 has been reduced by 75% by masking one index bit (A 3 ) and logically combining two other index bits (A 2 , A 1 ). Empty entries are removed from compressed stride table 22 .
  • Other stride tables could also be compressed, reducing the overall storage requirements.
  • Logical compression is effective since four valid entries only require two address bits to distinguish among them.
  • the theoretical minimum index bits for selecting from among 4 valid entries is just 2 index bits. If there were 6 valid entries, then the minimum number of index bits would be 3, and the compressed table would still have 2 invalid entries.
  • the minimum number of index bits required is the nearest power of two that is equal to or greater than the number of valid entries in a stride table being compressed.
  • Two steps were performed to compress the 4 index bits down to 2 index bits.
  • the XOR function used for this logical combining is a compression function (CF).
  • Other compression functions may be used for other tables, such as AND, OR, rotate, shift, or more complex functions such as AND-OR, etc.
  • FIG. 4 is a diagram illustrating masking and logically combining index bits to create compressed index bits for a logically-compressed stride table.
  • Uncompressed stride table 20 has S bits in its index, and contains 2 S entries. Many of these 2 S entries are invalid or empty since this is a sparse table.
  • the first step is to mask out some of the S index bits.
  • Initial masker 24 receives an index mask (IM) that is applied to the S index bits, and removes M bits.
  • IM index mask
  • the remaining S ⁇ M unmasked index bits from initial masker 24 are applied to logical compressor 26 .
  • a selected compression function CF is applied to logical compressor 26 to cause logical compressor 26 to perform the selected compression function on specified bits.
  • the compression function CF or another control field, can indicate which of the S ⁇ M unmasked index bits are combined together by logical compressor 26 , and which of the S ⁇ M index bits are passed through logical compressor 26 without alteration.
  • Logical compressor 26 reduces the number of index bits by C. For example, when CF specifies two XOR's that reduce 4 index bits to 2 index bits, then C is 2. The final number of compressed index bits is S ⁇ M ⁇ C. These S ⁇ M ⁇ C bits select one entry in compressed stride table 22 . The number of entries in compressed stride table 22 is 2 S ⁇ M ⁇ C , which has 2 M ⁇ C entries fewer than uncompressed stride table 20 .
  • Some of the entries in compressed stride table 22 may be invalid entries, since the number of valid entries may not be a power of 2. Compression may be less than ideal, even when a variety of compression functions are available. However, significantly better compression can be achieved than with the simple bit masking of FIG. 2 .
  • FIG. 5 shows a logical compressor in more detail. Uncompressed index bits are masked by an initial mask applied to initial masker 24 . Some of the remaining bits from initial masker 24 bypass logical compressor 26 and become bits in the compressed index, while other bits from initial masker 24 are input to logical compressor 26 for further compression.
  • Bit selector 42 receives bit-position information from a control field and selects which of the bits from initial masker 24 to input for logical compression. For example, bit-positions 5 , 7 may be selected so that the fifth and seventh bits are selected.
  • bits selected by bit selector 42 are applied as inputs to logical gates 40 , 44 , 46 . These may be discrete logical gates, or they may be implemented in firmware or software or in an arithmetic-logic-unit (ALU) or similar programmable device.
  • the compression function CF applied to logical compressor 26 determines which of logical gates 40 , 44 , 46 are selected, while the others are disabled.
  • CF may indicate XOR, so that XOR logical gate 46 is selected and gates 40 , 44 are disabled.
  • the 2 index bits selected by bit selector 42 are applied to the inputs of XOR logical gate 46 , which combines them into a single index bit which becomes part of the compressed index.
  • logical compressor 26 Other functions may be supported by logical compressor 26 . More complex logical gates may be substituted, or multiple levels of logical gates, or gates with wider inputs or multiple outputs. Inversions could be added. Some operations may be conditional, such as a conditional rotate or conditional shift, as shown later in FIG. 10 . Compression functions that count ones or zeros, or that are priority encoders or leading-one or leading-zero encoders and compressors may be supported. Encryption or signature algorithms may be supported. Designers may devise complex compression functions that are particularly useful for compressing certain kinds of stride tables.
  • bits could be chosen for merging using a variety of merge functions.
  • Three or more bits could be merged to one, two, or more bits that replaced the original index bits.
  • compression can occur. For example, compression can occur when 3 original bits are merged to create two merged bits that replace the original 3 bits.
  • FIG. 6 shows a generalized logical compressor with initial and final masking.
  • two or more of the input bits selected by the initial mask are logically combined to create new candidate bits.
  • a final selection is made from the full set of bits from the initial selection and from the newly created candidate bits.
  • the XOR of FIG. 3 created a new index bit (new A 1 ) from two of the uncompressed index bits (A 2 , A 1 ). This new index bit, the output of the XOR, was selected while the two original index bits were dropped.
  • the operation of logical compressor 26 can be thought of as initially creating new candidate index bits (merged bits) by performing logical operations such as XOR, and then selecting from among the merged and original index bits to create the final compressed index.
  • initial bit selection and final bit selection may lead to better candidates for index bits. Overall, fewer of the newly created index bits may need to be selected than if only the initial bits were available.
  • Uncompressed index bits are masked by an initial mask applied to initial masker 24 . Some of the remaining bits from initial masker 24 bypass logical merger 28 and are input directly to final masker 30 , while other bits from initial masker 24 are input to logical merger 28 .
  • Logical merger 28 combines selected index bits from initial masker 24 using logical functions to produce merged bits E. For example, adjacent index bits may be combined by an XOR function, and the XOR results are the merged bits. The XOR results may be more efficient at encoding the valid entries than the original index bits, as was true of the XOR of A 2 , A 1 in FIG. 3 .
  • Final masker 30 receives both the original index bits selected by initial masker 24 , and the merged bits created by logical merger 28 . Final masker 30 selects from among the original and merged bits to output the final compressed index bits.
  • the compression function CF can indicate that merged bits are to be created, and which of the S ⁇ M unmasked index bits are combined together by logical merger 28 .
  • the final mask field can indicate which of the S ⁇ M index bits and E merged bits are output as the final compressed index.
  • S ⁇ M+E ⁇ F bits select one entry in compressed stride table 22 .
  • the number of entries in compressed stride table 22 is 2 S ⁇ M+E ⁇ F which has 2 M+F ⁇ E entries fewer than uncompressed stride table 20 .
  • Some of the entries in compressed stride table 22 may be invalid entries, since the number of valid entries may not be a power of 2. Compression may be less than ideal, even when a variety of compression functions are available. However, significantly better compression can be achieved than with the simple bit masking of FIG. 2 .
  • FIG. 7 shows a compressor that uses input bits, newly-created merged bits, and a final mask.
  • all S uncompressed index bits are passed through to final masker 30 and to logical merger 28 . There is no initial masker.
  • Logical merger 28 combines selected index bits using logical functions to produce merged bits E.
  • the newly-created candidate bits are referred to as merged bits E.
  • adjacent index bits may be combined by an XOR function, and the XOR results are the merged bits.
  • the XOR results may be more efficient at encoding the valid entries than the original index bits.
  • Final masker 30 receives both the original index bits and the merged bits created by logical merger 28 . Final masker 30 selects from among the original and merged bits to output the final compressed index bits.
  • the compression function CF can indicate that merged bits are to be created, and which of the S index bits are combined together by logical merger 28 .
  • the final mask field can indicate which of the S index bits and E merged bits are output as the final compressed index.
  • the number of final compressed index bits is S+E ⁇ F. These S+E ⁇ F bits select one entry in compressed stride table 22 .
  • the number of entries in compressed stride table 22 is 2 S+E ⁇ F , which has 2 F ⁇ E entries fewer than uncompressed stride table 20 .
  • FIG. 8 shows a compressor that uses only newly-created merged bits with the final mask.
  • the S uncompressed index bits are input to logical merger 28 but none are applied to final masker 30 .
  • the final compressed index bits can only come from the merged bits from logical merger 28 .
  • Logical merger 28 combines selected index bits using logical functions to produce merged bits E. For example, adjacent index bits may be combined by an XOR function, and the XOR results are the merged bits. The XOR results may be more efficient at encoding the valid entries than the original index bits.
  • Final masker 30 receives only the merged bits created by logical merger 28 . Final masker 30 does not receive the original index bits. Final masker 30 selects from among the merged bits to output the final compressed index bits.
  • the compression function CF can indicate that merged bits are to be created, and which of the S index bits are combined together by logical merger 28 .
  • the final mask field can indicate which of the E merged bits are output as the final compressed index.
  • the number of final compressed index bits is E ⁇ F. These E ⁇ F bits select one entry in compressed stride table 22 .
  • the number of entries in compressed stride table 22 is 2 E ⁇ F , which has fewer entries than uncompressed stride table 20 .
  • FIG. 9 shows details of a logical merger that creates merged index bits. Uncompressed index bits are optionally masked by an initial mask applied to initial masker 24 . Some of the remaining bits from initial masker 24 may bypass logical merger 28 and become bits in the compressed index, while other bits from initial masker 24 are input to logical merger 28 for further compression.
  • index bits are input and used to create merged bits using many logic gates.
  • the bits are applied as inputs to logical gates 48 , 48 ′. These may be discrete XOR logical gates, or they may be implemented in firmware or software or in an arithmetic-logic-unit (ALU) or similar programmable device.
  • the compression function CF applied to logical compressor 26 determines which of logical gates 48 , 48 ′, 49 are selected, while the others are disabled.
  • one CF function value may indicate 2-input XOR's of adjacent bits, so that XOR logical gates 48 is selected and gates 48 ′, 49 are disabled. There are S ⁇ 1 of the 2-input XOR logical gates 48 , producing S ⁇ 1 outputs from adjacent index bits A(i), A(i+1)that are sent to final masker 30 .
  • Another CF function is to XOR every four adjacent index bits using XOR gates 48 ′. Gates 48 , 49 are disabled. There could be S ⁇ 1 of the 4-input XOR logical gates 48 ′, producing S ⁇ 1 outputs from adjacent index bits A(i), A(i+1), A(i+2), A(i+3) that are sent to final masker 30 .
  • a third CF function uses two levels of logic gates.
  • the initial level of XOR logical gates 48 combines adjacent pairs of index bits A(i), A(i+1). Then the outputs of logical gates 48 are input to second-level logical gates 49 , which produces deeper XOR averaging.
  • the outputs of second-level logical gates 49 E(j) are sent to final masker 30 .
  • Final masker 30 selects merged bits for use in the compressed index.
  • stride tables may compress better with two-level XOR'ing, while other stride tables compress well using 2-input or 4-input XOR'ing.
  • software can test the various CF functions and choose an optimal function from the many available functions. Routines that find the best CF functions and which index bits to compress can be written that either intelligently find the optimal or near-optimal choices, or that try all combinations and then select the one with the best results.
  • Some embodiments may have more candidate bits, and require that more mask bits be stored, while other embodiments may have fewer candidate bits and thus require fewer mask bits, but may not be as effective at compression.
  • FIG. 10 shows a conditional-shift compress function.
  • stride tables sometimes have two groups of entries in the same table that can be compressed using conditional operations. One group of entries in the table matches a condition, and has the conditional operation applied, with the other group of entries in the table does not match the condition, and does not have the conditional operation applied.
  • un-compressed stride table 22 Only the valid entries are shown in un-compressed stride table 22 .
  • the uncompressed index is 9 bits: A 8 , A 7 , A 6 . . . A 1 , A 0 .
  • locations for 2 9 or 512 entries only 8 entries are valid.
  • the other 506 entries are invalid.
  • the valid entries fall into two groups.
  • the remaining 2 bits are discriminate bits, since they select from among the entries. These two discriminate bits can be designated as DD.
  • DD discriminate bits
  • the second group of four entries have the same last 6 bits (LSB's), but different MSB's:
  • Compression can be vastly improved when the discriminate bits DD align for the two groups. Then A and B can be collapsed into one discriminate bit that selects between the A and B groups, and the same discriminate bits DD can be used by both groups to select entries within the group.
  • the first group fails the condition and is not shifted, and remains A_DD.
  • the second group meets the condition and is shifted or rotated from DDD_B to B_DDD.
  • the three discriminate bits DDD of the second group can be logically compressed into 2 bits, so that the second group becomes B_DD.
  • both groups can use the same discriminate bits.
  • the strategy is to shift the B group but not shift the A group so that the discriminate bits align, then replace the A and B prefixes with a single group-discriminate bit, and then perform any additional logical compression on the index bits.
  • An initial mask can be performed by initial masker 24 . Since all entries have the same values for index bits A 5 , A 4 , A 3 , A 2 (0001) these middle bits (shown in the dotted box in stride table 20 ) can be masked off by initial masker 24 .
  • OR gate 36 When all three MSB's are zero, OR gate 36 outputs a 0. When any of A 8 , A 7 , A 6 are 1, then OR gate 36 outputs a 1.
  • Conditional shifter 34 is activated to perform a shift when the output of OR gate 36 is 1. The shift is disabled when OR gate 36 outputs a 0. Conditional shifter 34 performs a right shift by 3. Conditional shifter 34 receives all 5 unmasked bits from initial masker 24 , bits A 8 , A 7 , A 6 , A 1 , A 0 .
  • the first group Since the first group has all 0's in the MSB's, the first group is not shifted by conditional shifter 34 .
  • the bit from OR gate 36 is 0 and becomes the group-discriminate bit, which is A 2 in the compressed index. This bit replaces A.
  • Bits A 1 , A 0 from conditional shifter 34 are passed through and become the discriminate bits that select one of the four entries in the first group. Bits A 8 , A 7 , A 6 are discarded.
  • the second group Since the second group has at least one 1 in the MSB's, the second group is shifted by conditional shifter 34 .
  • the bit from OR gate 36 is 1 and becomes the group-discriminate bit, which is A 2 in the compressed index. This bit replaces B.
  • Conditional shifter 34 shifts the remaining bits A 8 , A 7 , A 6 , A 1 , A 0 to the right by 3 positions, so that A 8 , A 7 are now in the A 1 , A 0 positions.
  • the lower three bits A 6 , A 1 , A 0 are shifted off the right edge and are discarded.
  • a shift by 7 of the original bits could also be performed in some embodiments.
  • Shifted bits A 1 , A 0 original bits A 8 , A 7 from conditional shifter 34 are passed through and become the discriminate bits that select one of the four entries in the second group. Bits A 8 , A 7 , A 6 are discarded. Since original bit A 6 was redundant with bits A 8 , A 7 , bit A 6 can be discarded. Otherwise, another logical operation such as an XOR could be performed to further reduce the number of compressed index bits.
  • the 8 entries in compressed stride table 22 are still in two groups, designated 0 DD and 1 DD.
  • the first group 0 DD was formed from the A_DD entries while the second group 1 DD was formed from the DDD_B entries.
  • a very high degree of compression is achieved, from 512 entries in un-compressed stride table 20 to just 8 entries in compressed stride table 22 .
  • the compression function and mask values are pre-calculated and known at the time of a lookup operation.
  • the CF field is read from the prior level of the table and used to compress the stride bits to create the compressed index that selects one of the entries in the compressed stride table.
  • the first or top-level table may use a compression function that is indicated by a programmable register or by a field that is associated with a pointer to the top level table.
  • This type of compression function is useful when a logical operation can determine whether an entry belongs to Group A or to Group B.
  • a common case where this function type works well is when the leading MSBs belonging to Group A are zero, while at least one MSB bit is set to one for each entry in group B. In this case, a simple OR function over the selected MSBs can decide whether an entry belongs to Group A or to Group B.
  • index bits may be don't care bits and can be ignored.
  • group A may be detected by comparing 6 bits, but another 4 bits are not compared and are masked off as don't care bits.
  • the shift count does not have to equal the number of bits in a group since these don't care bits may be present. Many other variations are possible.
  • FIG. 11 shows storing of compression functions (CF) in a stride-table entry. While compression functions could be fixed in hardware or software routines or specified in other ways, storing the compression function in the stride table entry allows different compression functions to be used for different stride tables within the table structure. Thus compression for each table may be optimized, resulting in better overall compression. The compression may even adapt to the type of entries being stored, or to entry changes that occur over time.
  • CF compression functions
  • Entry 50 is a valid entry in a stride table in level N.
  • Stride bits Sn are extracted from the input key and used to select this entry from other entries in the Nth level of the stride tables.
  • the value of these stride bits Sn are stored in tag field 52 and compared to the input stride bits Sn to ensure a match. Aliasing and other errors are thus avoided.
  • next stride size field 56 The number of bits in the next level of the stride table is stored in next stride size field 56 .
  • a value of 0111 could indicate that 8 bits of the input key are used for the stride bits in the next level N+1.
  • the stride sizes are fixed and next stride size field 56 is not needed.
  • CF field 60 The compression function (CF) to use for compressing the stride bits to generate the compressed index for the next level N+1 of the stride table is indicated by CF field 60 .
  • CF field 60 may include opcode field 62 with a function-type field that indicates the logical function (XOR, shift, etc.).
  • Operand field 64 may contain control bits that control the function, such as indicating a number of positions to shift by, or which bit-positions to use as inputs.
  • a bit mask may be stored in operand field 64 . This may be the initial mask (IM) used by initial masker 24 , or a final mask used by final masker 30 ( FIG. 6 ), or some other mask.
  • the mask may be encoded or compressed in some way, or could be a bit-by-bit mask. Positive or negative masks may be used.
  • CF field 60 may be data-dependent, with some CF functions requiring more control bits than other functions.
  • Opcode field 62 may have a fixed number of bits while operand field 64 varies in width. Decoding of opcode field 62 can determine the number of bits in operand field 64 .
  • Pointer field 58 contains a pointer to the stride table in the next level N+1.
  • the compression function specified in CF field 60 is used to compress the next level stride bits S N+1 to find the entry in the next-level stride table pointed to by pointer field 58 .
  • Pointer field 58 could contain a full address or a partial address, offset, or some other way of indicating the next stride table.
  • the final level of stride tables does not point to another level. Instead, pointer field 58 may contain a pointer to a lookup result, or could contain the result itself Sometimes, a partial lookup is performed. There may be some valid entries for which only some of the input key's bits are matched; other input key bits are ignored (don't cares). These are referred to as regional entries. For example, the 15 most-significant-bits (MSB's) of a key are matched while the remaining 17 LSB's are ignored. When the first and second level strides are each 8 bits wide, then the second-level stride only matches 7 of the 8 stride bits.
  • MSB-to-use field 54 indicates that only the 7 MSB's of the 8 stride bits are matched when comparing tag field 52 to the input key. For a regional entry in the database, it is possible to successfully terminate the search prior to completely traversing all of the levels. A match may be identified prior to traversing all of the levels. This may occur when a search key matches a regional entry, and there is no exact match entry present for a given search key. In this case, there is a valid result available even prior to completing traversal. In this case the result may be provided in field 58 .
  • the lookup operation can be finished quickly. However, determining which compression function and mask to use for each of the many stride tables is a slower, more complex process.
  • a routine can be executed to find discriminate bits for that stride table.
  • FIGS. 12A-B show a flowchart of a routine to find discriminate bits used to compress a stride table.
  • Routine 100 can be repeated for each of the many stride tables 10 , 12 , 14 , 16 of FIG. 1 during table initialization to compress any or all of these tables.
  • Routine 100 may also be activated when new entries are added to a stride table, and that table needs to be expanded to make room for the new entries.
  • Routine 100 could also be activated when entries are removed from a table and the table could be compressed further. Initial and final masks may be found using this routine.
  • the uncompressed index bits A(i) for valid entries in a stride table are received, step 102 .
  • the stride table is likely to be sparsely populated with valid entries.
  • the uncompressed index bits are the stride bits from the input key that match the tag stored in the valid entries which are also the address or index value within the uncompressed stride table for these valid entries.
  • merged index bits E(i) can be generated from the uncompressed index bits A(i).
  • One or more of the XOR averaging techniques shown in FIG. 9 may be used to generate the merged index bits.
  • Several sets of merged index bits may be generated, one for each merge method, and routine 100 can select the best merge method later when the discriminate bits are selected. Alternately, just one merge technique may be used.
  • the initial set of candidate bits N(i) are the bit positions i for the uncompressed index bits A(i) plus additional bit-positions for any merged bits E(i), for the valid entries. Some of the bit-positions i will be chosen as discriminate bits and be used in the compressed index, while other bit-positions i will not be chosen and be discarded and not present in the compressed index.
  • the merged bits E(i) can be considered as additional bit positions in the uncompressed index for routine 100 .
  • the initial group of valid entries contains all valid entries in the stride table. This initial group will be divided into smaller groups by routine 100 until each sub-divided group has only 1 valid entry in it. The initial set of candidate bits will become smaller as discriminate bits are found by routine 100 and removed from the set of candidate bits.
  • a maximum delta value is calculated using subroutine 200 .
  • Subroutine 200 is shown in FIG. 13 .
  • a group of entries is sub-divided into a pair of test groups using the current bit-position i.
  • candidate bit N(i) is used to split the group of entries into two test groups.
  • the delta value is the difference between the number of entries in the two test groups. Ideally, the entries are split as evenly as possible between the two new test groups, so delta values closer to zero are preferred.
  • the maximum delta value is the larger of the two delta values for the pair of test groups formed by splitting the group. When there are many groups, each group is sub-divided into a pair of test groups, and the maximum delta value is the largest delta value for all pairs of test groups formed using the current candidate bit N(i). Subroutine 200 returns the maximum delta value for all pairs of test groups formed using bit position i.
  • step 108 When there are more candidate bit-positions that have not yet been tested for their maximum deltas, step 108 , then another bit-position i is selected, step 106 . Test groups are formed using this candidate bit position and its maximum delta found using subroutine 200 .
  • routine 100 continues in FIG. 12B .
  • the current discriminate bit D is selected, step 110 , from among the candidate bit-positions that were tested in the loop in FIG. 12A .
  • Each candidate bit-positions had a maximum delta calculated using subroutine 200 . The smallest of these maximum deltas is selected.
  • the candidate bit-position that generated the smallest maximum delta is selected as the new or current discriminate bit, since this candidate bit-position best split the groups into evenly-divided test groups.
  • the current discriminate bit which is the selected candidate bit-position, is removed from the set of candidate bit-positions, step 112 .
  • the current discriminate bit is added to the set of discriminate bits that are in the compressed index.
  • Each of the groups of entries is split into a pair of groups using values of the current discriminate bit D, step 114 .
  • the sub-divided groups replace the pre-divided groups. Any groups that have less than two valid entries are removed from further processing by routine 100 , step 116 . These removed groups do not need to be further sub-divided.
  • step 118 If any of the groups contain two or more valid entries, step 118 , then further processing is needed to find more discriminate bits that can divide these groups into single entries. Routine 100 continues with another iteration, returning to FIG. 12A to test the remaining set of candidate bit-positions to find another discriminate bit.
  • step 118 When all groups contain no more than 1 entry, step 118 , then a sufficient number of discriminate bits have been selected. All the entries can be uniquely addressed using the set of discriminate bits found by routine 100 .
  • the discriminate bits found in all iterations at step 110 are used as the compressed index bits, step 120 . Other bit-positions that were not selected and that are still in the set of candidate bit-positions are not used.
  • the stride table is compressed because these non-selected candidate bits are removed from the compressed index.
  • the discriminate bit-positions can include bit-positions from the original uncompressed index bits, and bit-positions from the merged bits.
  • the compression function (CF) specifies how the new candidate bits created. Field 64 in FIG. 11 may provide some control bits for the CF function.
  • the initial mask and the final mask are two examples of control bits.
  • More complex compression functions such as the shift shown in FIG. 10 may require a more complex routine 100 , or additional steps to test for compressibility using that complex compression function.
  • FIG. 13 shows a subroutine to calculate the maximum deltas for pairs of test groups formed for a candidate bit-position. Initially there is only one group, while in later iterations of routine 100 there can be many groups of entries.
  • These count values generated in step 204 are the number of valid entries in each test group formed by sub-dividing the group using the candidate bit-position.
  • the delta value for this group is calculated in step 206 as the absolute value of the difference of the count values, or ABS[count(0)-count(1)].
  • the delta value measures the evenness of sub-dividing this group using the candidate bit-position. A higher delta value indicates that poor sub-dividing occurred, with one of the test groups having more entries than the other test group.
  • step 208 When there are other groups, step 208 , then counting valid entries in sub-divided test groups and calculating their delta values continues for these groups. Once all groups have been tested and their deltas calculated, the maximum delta is selected, step 212 . The maximum delta is the largest of the deltas calculated for this candidate bit-position. The maximum delta is the worst-case sub-dividing among these groups using the candidate bit-position. The maximum delta is returned to routine 100 , step 214 . The best of the candidate bit-positions (selected in step 110 of FIG. 12B ) is the one that has the smallest maximum delta, or the best worst-case sub-dividing.
  • one of these bits may be chosen as the new discriminate bit.
  • the choice can always be the MSB, always the LSB, or the choice can be random.
  • FIG. 14 is an example of finding discriminate or compressed index bits.
  • routine 100 of FIGS. 12A-B and subroutine 200 of FIG. 13 an initial group of entries 302 is sub-divided while discriminate bits are found.
  • the initial entries have 4 candidate bit-positions B 3 , B 2 , B 1 , B 0 in the uncompressed index.
  • the maximum deltas are the deltas for the single group.
  • the initial group in table 302 is sub-divided into two groups using the current discriminate bit B 3 .
  • Iteration 2 has these two groups 304 , 306 , and the candidate bit-positions are B 2 , B 1 , B 0 , since B 3 has been removed as a candidate.
  • the maximum deltas for candidate bits B 2 , B 1 , B 0 are 1, 1, 3, respectively.
  • Candidate bit B 0 is a bad choice due to its large delta, while candidate bits B 2 and B 1 both have the smallest delta value of 1.
  • Either of candidate bits B 2 or B 1 could be chosen as the discriminate bit.
  • the choice among tied candidate bits can be made randomly, or the MSB may be chosen, or some other method may be used. In this example, the MSB is chosen, so B 2 is the current discriminate bit.
  • Each of groups 304 , 306 are sub-divided into pairs of groups using the current discriminate bit B 2 .
  • groups 312 , 316 each contain only one entry, groups 312 , 316 can be removed from further processing. Only groups 310 , 314 are considered for iteration 3 .
  • Iteration 3 has these two groups 310 , 314 , and the candidate bit-positions are B 1 , B 0 , since B 3 and B 2 have been removed as candidates.
  • Group 310 can be sub-divided into groups 320 , 322 , while group 314 can be sub-divided into groups 324 , 326 . Since each of groups 320 , 322 , 324 , 326 has only one entry, processing is complete.
  • the discriminate bits are B 3 from iteration 1 , B 2 from iteration 2 , and B 1 from iteration 3 .
  • Index bit B 0 can be removed from the compressed index.
  • results for entries in the final level of the stride tables represent one value of the input key
  • results may also be stored at intermediate levels of the stride tables rather than at the final (leaf) level. Representing regional entries is useful because a regional entry represents match results for many values of the input key. The number of entries in the stride tables can be reduced, since one regional entry can represent many final entries.
  • FIGS. 15A-C show a regional entry that covers a range of input key values.
  • regional entry 50 ′ is stored at an intermediate level of the stride tables.
  • Tag field 52 contains a tag that the stride bits for this level must match.
  • MSB-to-use field 54 indicates a mask that can be applied to the tag value from tag field 52 when matching the stride bits from the input key.
  • MSB-to-use field 54 may have a value of 4 that indicates that only the 4 MSB bits are matched; the remaining LSB's are not matched or don't cares.
  • stride size is 7 bits, and MSBu is 4, the 4 upper bits of the tag are matched while the lower 3 bits are not matched.
  • the input key is compared to the masked tag.
  • tag value in tag field 52 is 1010000, the masked tag is 1010XXX.
  • the stride bits from the input key only have to match 1010XXX rather than the full 7 bit tag of 1010000.
  • key values such as 1010111 or 1010011 create a match.
  • FIG. 15B shows that a range or region of input-key values can match the regional entry of FIG. 15A .
  • the masked tag value for the entry is 1010XXX, which matches stride bits from key values for the current level with values of 1010000, 1010001, 1010010, . . . 1010101, 1010110, 1010111. There are 8 values of the stride bits that can match the regional entry.
  • each stride value can point to whole tables at lower levels, each stride value can cover a wide region of entries in the final level of the stride tables.
  • the 8 values matched at the current level of the table can cover many thousands or millions of entries in the final level of the stride tables.
  • extended bits When extended bits are created from the uncompressed index bits, extended bits that are created from masked bits should not be used. Only extended bits that are created from unmasked bits should be placed in the set of candidate bits.
  • FIGS. 16A-C highlight adding an entry that overlaps a regional entry. Sometimes a new entry that overlaps a regional entry is added to a stride table, or during initialization an entry overlaps a regional entry.
  • a regular, non-regional entry of 1010101 is to be added to the stride tables.
  • the regular entry 1010101 points to a different result, R 2 , than does the regional entry 1010XXX of FIG. 15 , which points to result R 1 .
  • result R 2 is considered to be more accurate than result R 1 , since 1010101 is an exact match while 1010XXX is a masked match. Thus result R 2 should be the result eventually returned when the stride bits match 1010101 (and lower levels of the stride tables also match the input key), while result R 1 is immediately returned and the lower levels of the stride table not accessed when the stride bits match 1010XXX but not 1010101.
  • the regional entry 1010XXX is divided into several entries that do not overlap with the exact entry 1010101.
  • Two regional entries 10100XX and 101011X along with one exact entry 1010100 can replace the region of 7 stride values covered by 1010XXX minus 1010101.
  • the regional entry 1010XXX is removed from the stride table, and the 2 new regional entries 10100XX and 101011X and the exact entry 1010100 are loaded into the stride table.
  • the overlapping exact entry 1010101 is also loaded into the stride table now that it no longer overlaps any of the regional entries.
  • the index bits may then need to be re-compressed using routine 100 or a similar routine.
  • FIG. 16C shows which results are returned for key matches with the replaced entries.
  • the new regional entry 10100XX covers 4 values of the stride bits and returns the current result R 1 .
  • the new regional entry 101011X covers 2 values of the stride bits and also returns the current result R 1 .
  • the new exact entry 1010100 also returns the current value R 1 .
  • the exact entry 1010101 returns the value R 2 after traversing lower levels of the stride tables.
  • compression functions may be supported. For example, the number of leading 1's or 0's may be counted and compressed. More complex logical gates may be substituted, or multiple levels of logical gates, or gates with wider inputs or multiple outputs. Inversions could be added. Some operations may be conditional, such as a conditional rotate or conditional shift. Compression functions that are priority encoders or leading-one or leading-zero encoders and compressors may be supported. Encryption or signature algorithms may be supported. Designers may devise complex compression functions that are particularly useful for compressing certain kinds of stride tables. Encryption algorithms could be used as compression functions. A subset of the possible compression functions may be supported, such as only XOR functions while AND and OR functions are not supported.
  • Tables with only one valid entry may be compressed using an identity function as the compression function. All values of stride bits then point to the only entry for that table. When a table has only two valid entries, a single bit may be generated to distinguish between the two entries.
  • the compressed stride table can be a perfect hash table wherein there are no collisions between valid entries.
  • the tag field may not be required in all embodiments.
  • the stride table When the stride table is fully compressed, it can be a minimal perfect hash table.
  • a minimal, fully-compressed table has a size that is the nearest power of two that is equal to or greater than the number of valid entries in the table.
  • the stride size field is not needed.
  • Some levels of the stride tables could use fixed, predetermined strides, and prior-level entries pointing to these tables do not need the stride size field, while other levels have a variable stride size and their prior-level entries have the stride size field.
  • Result pointers are only needed for final-level entries or when an intermediate or current result is present. The final level tables do not need pointer to next-level tables since there is no next level to point to.
  • Some table structures or levels within a table structure may not implement all compression functions, but only support a subset of the functions. For example, supporting XOR alone may be sufficient, without supporting AND and OR compression functions.
  • Merged bits could be generated for each of the supported functions, including some of the more complex functions such as shifts, and a variation of routine 100 used to select from among the merged bits that were generated using the various compression functions to find the best set of determinant bits. All possible compression functions could be tested during initialization to find the optimal functions to use. More complex or simplified routines may be substituted. The routine to find determinant bits could iterate over several levels at a time rather than over one level, or an exhaustive search over all possible combinations of bits may be performed and evaluated to find deterministic bits.
  • Values can be inverted, offset, combined with other values, and manipulated in many ways using known mathematical properties. For example, rather than finding the maximum delta, the delta could be inverted to a negative number and then the smallest (most negative) delta could be chosen as the “maximum” delta.
  • An inversion could be added to an XOR to generate an exclusive-NOR (XNOR), but this is simply a derivative of an XOR and within a family of XOR functions. Other logic tricks and manipulations are contemplated and considered to be within the scope of the claims.
  • three levels of masking are used.
  • the compressor creates initial compressed index bits, and then using compressed bits, creates a new index bit set having only new candidate bits selected with the mask applied over only new candidate bits.
  • a final selection is made between the Index bits selected from the input bits only, or index bits selected from the new candidate bits created from the original selected index bits from input bits only.
  • the initial mask may have different uses in different embodiments.
  • the initial mask may indicate which index bits are selected and applied as inputs to the merge or compression logic. For example, in FIG. 6 , some of the S uncompressed index bits may bypass initial masker 24 and be directly applied to final masker 30 .
  • Initial masker 24 may only select bits to apply to logical merger 28 .
  • the initial mask may indicate which initial index bits are selected to be part of the compressed index bits.
  • the final compressed index bits could be selected from only initial index bits, or selected only from final masked bits. This can optimize the number of mask bits needed. For example, if both the initial mask and the final mask required S mask bits, having both masks would occupy 2S bits. If only S mask bits were used, a single select bit could indicate when the mask bits are for the initial mask, and when the mask bits are for the final mask. Then only S+1 bits would be needed. Other variations are possible.

Abstract

A lookup is performed using multiple levels of compressed stride tables in a multi-bit Trie structure. An input lookup key is divided into several strides including a current stride of S bits. A valid entry in a current stride table is located by compressing the S bits to form a compressed index of D bits into the current stride table. A compression function logically combines the S bits to generate the D compressed index bits. An entry in a prior-level table points to the current stride table and has a field indicating which compression function and mask to use. Compression functions can include XOR, shifts, rotates, and multi-bit averaging. Rather than store all 2S entries, the current stride table is compressed to store only 2D entries. Ideally, the number of valid entries in the current stride table is between 2D-1 and 2D for maximum compression. Storage requirements are reduced.

Description

    CROSS REFERENCE TO RELATED APPLICATIONS
  • This application is a continuation of U.S. Ser. No. 12/190,692, filed Aug. 13, 2008, which is a continuation of U.S. Ser. No. 11/309,160, filed Jul. 3, 2006, now U.S. Pat. No. 7,430,560, which claims the benefit of U.S. Provisional Applications 60/701,442 filed Jul. 22, 2005, and 60/720,712 filed Sep. 27, 2005, the entire contents of which are incorporated herein by reference.
  • TECHNICAL FIELD
  • This invention relates to table lookups, and more particularly to look-up engines for large table structures divided into strides.
  • BACKGROUND
  • A wide variety of types of data can be stored in a database or data structure. When there are many data items or records to be stored, the time needed to access a data item may become undesirably slow. Some data structures contain huge amounts to data. For example, large networks can have millions or billions of destinations and millions of intermediate nodes, and each node may be identified by its own network address.
  • Traffic in a network may be routed by looking up records in a routing table or structure. The widely-used Internet Protocol, version 4 (IPv4) uses 32-bit IP addresses and can support up to 232 IP nodes, or about 4 billon addresses. A newer version, IPv6, uses 128-bit IP addresses and can have 2128 IP-addressable nodes. Each record in a data structure might contain one IP address or a range of IP addresses.
  • Routers, switches, and other network nodes may contain a subset of the available IP addresses, and may query other devices for more detailed information. However, the quantity of data records to be stored by a network device can still be quite large, even huge. A network data structure may need to be expandable and able to store all 4 billion possible records, even though only a subset is stored at any time.
  • An engineering tradeoff often must be made for these large data structures. A single very-large table could be constructed, allowing any record to be retrieved in a fast, single lookup step. However, the size of this table could be enormous, since unused (invalid) entries occupy address locations or slots in the table.
  • A content-addressable memory (CAM) may also be used for an associative lookup. A CAM may eliminate memory occupied by invalid entries, but CAM's are quite expensive and limited in size. Additionally, a special class of CAM may be required to support range matches. Such a special class of CAM is typically more expensive than a standard exact-match CAM.
  • The binary search scheme minimizes the memory-space penalty by arranging the entries in a sorted list, and then matching the search key against a value at a mid-point of a partition covering the range that contains the search key. In this approach, the number of accesses can be on the order of log2(N), where N is the number of total entries in the database. However, Log2(N) accesses can be excessive for high-performance applications. Additionally, binary search on a sorted list does not lend itself well for supporting range or longest prefix matches.
  • A linear binary search may be used on multiple levels of lookup. Each bit of an input lookup key is used to decide between forks in paths through a tree-like table structure. Since multiple levels of search are required, search time is slow, although the storage space needed for the table is more efficient. A traditional Trie structure has a number of access levels equal to a number of bits in the input key. Each stride, or jump to the next level, consumes one bit of the input key.
  • A compromise data structure modifies the Trie structure to use strides of more than one bit. This structure can provide a good trade-off between access speed and storage requirements. FIG. 1 shows prior-art stride tables in a multi-bit Trie structure. Key 18 is the lookup key that is input to the table structure. A lookup is an operation to find an entry in the table structure that matches key 18.
  • Key 18 is divided into four strides S1, S2, S3, S3. In this simplified example, key 18 is only 8 bits wide, and each stride is 2 bits wide. Typically much larger keys are used, and the number of strides and width of the strides may vary. Some strides may be larger than other strides.
  • The first stride S1 selects one of four entries in first-level stride table 10. Entries in table 10 contain pointers to tables 12 in the second level. For example, the top second-level table 12 is pointed to by the top entry in table 10, which is selected when S1 is 11. Another second-level table 12′ is pointed to by the third entry in table 10, which is selected when S1 is 01.
  • Since each stride is 2 bits, each entry in one level points to a table of 4 entries in the next level. Thus a single table 10 in level 1 expands to four tables 12 in the second level, sixteen tables 14 in the third level, and sixty-four tables 16 in the fourth level.
  • A lookup is performed by traversing the four levels of the tables in the table structure. For the example of key 18 having a value of 01110011, the first stride S1 is 01 and selects the third entry in table 10, which points to table 12′ in level 2.
  • The two stride bits 11 for S2 select from among the four entries in each of tables 12. Since first-level stride table 10 pointed to table 12′, an entry from selected table 12′ is used and other tables 12 are ignored. The top entry in table 12′ is selected by the value (11) of S2. This top entry contains a pointer to selected table 14′ in level 3.
  • The two stride bits S3 of level three select from among the four entries in selected table 14′ in the third level. The value of S3 is 00, which selects the lowest entry in selected table 14′. This entry has a pointer to one of the 64 tables in level four, selected table 16′.
  • The value of the fourth stride S4, 11, selects the upper of four entries in selected stride table 16′. This entry contains the result of the lookup, or a pointer to the result. The value 01110011 of key 18 returns this result. Both the key and the result may be composed of several fields that are combined together.
  • When longest-prefix matches (LPM) are supported, intermediate results may be stored in entries in tables 10, 12, 14 of the intermediate levels, rather than only at the end (leaf) levels.
  • While such Trie structures modified for multi-bit strides are useful compromises between a fast but large single-level table, and a slow but storage-efficient Trie structure, the storage requirements may still be large using stride tables.
  • Network tables tend to be sparse tables since the address locations are sparsely populated with valid entries. Most memory locations tend to be empty, or have invalid entries. For example, a network router may contain entries for IP addresses within a local area or organization, rather than for the whole Internet. IP addresses outside this local area are sent to a gateway device. A network table for the local-area network router may not need many entries since remote IP addresses are passed off to another device.
  • Since network tables are sparse, the valid entries in a stride table may be compressed to squeeze our invalid entries and reduce the storage requirements. Ideally, only the valid entries would be stored, but in practice some invalid entries are also stored in the compressed tables. Thus the degree of compression may be less than ideal.
  • Other types of lookup are known. Five-tuple lookup uses five fields from packet headers to perform the lookup. The five fields are the IP source, IP destination, Protocol type, Port source and Port destination. For IPv4 the resulting key is 104 bits wide, while for IPv6 the key becomes 296 bit wide.
  • Look-up operations are also performed for Access Control List (ACLs). ACLs consist of rules which indicate what connections are allowed to be made, and which connections are suppressed. There may also be some specifications with respect to Quality-of-Service (QoS) requirements for certain classes of connections. Each entry for ACL may consist of fields that cover a range of values, as opposed to just being exact values.
  • FIG. 2 shows a prior art compressed stride table. Table 20 is a stride table such as one of tables 10, 12, 14, 16 of FIG. 1. In FIG. 2, the current stride size is 4 bits. The current stride of the input key is used as a 4-bit index address that selects one of the 16 entries in stride table 20. Each entry in stride table 20 is in a location identified by a 4-bit index of bits A3, A2, A1, A0.
  • Stride table 20 contains only 4 valid entries, at index locations 1100, 1011, 1001, and 1000. The other 12 indexes contain invalid or empty entries.
  • Since all four valid entries have a 1 in the most-significant-bit (MSB) of the index, or A3=1, index bit A3 is not needed to select among the four valid entries. Index bit A3 could be removed or masked from stride table 20. The entries with A3=0 are deleted, since they are all empty entries. Only the entries with A3=1 are retained in compressed stride table 20′. A3-bit index is used in compressed stride table 20′ to select among the 8 entries in table 20′.
  • The size of stride table 20 has been reduced by 50% by eliminating one index bit and deleting the empty entries from compressed stride table 20′. Other stride tables could also be compressed, reducing the overall storage requirements.
  • While 50% is a significant size reduction, compressed stride table 20′ still has four invalid entries. All three index bits A2, A1, A0 appear to be needed to select one of the four valid entries, since their indexes are now 100, 011, 001, and 000. Each of the three index bits A2, A1, A0 toggle between 0 and 1 within these four entries, so another index bit cannot simply be deleted. For example, if A3 was deleted, then the indexes would be 00, 11, 01, 00. The first and fourth entries would collide, having the same 2-bit index. Since these 2 entries might point to different results or next-level tables, the entries cannot be combined. Thus the maximum compression seems to be 50%, even though half of compressed stride table 20′ is empty or wasted space.
  • While such compression of stride tables is useful, the resulting compression by masking index bits does not always produce good compression. The resulting compressed stride tables are still somewhat inefficiently compressed.
  • What is desired is better compression of stride tables. A more flexible and adaptable compression for stride tables is desirable. A lookup engine using compressed stride tables is desirable.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 shows prior-art stride tables in a multi-bit Trie structure.
  • FIG. 2 shows a prior art compressed stride table.
  • FIG. 3 shows a logically-compressed stride table.
  • FIG. 4 is a diagram illustrating masking and logically combining index bits to create compressed index bits for a logically-compressed stride table.
  • FIG. 5 shows a logical compressor in more detail.
  • FIG. 6 shows a generalized logical compressor with initial and final masking.
  • FIG. 7 shows a compressor that uses input bits, newly-created merged bits, and a final mask.
  • FIG. 8 shows a compressor that uses only newly-created merged bits with the final mask.
  • FIG. 9 shows details of a logical merger that creates merged index bits.
  • FIG. 10 shows a conditional-shift compress function.
  • FIG. 11 shows storing of compression functions (CF) in a stride-table entry.
  • FIGS. 12A and 12B show a flowchart of an initialization routine to find discriminate bits used to compress a stride table.
  • FIG. 13 shows a subroutine to calculate the maximum deltas for pairs of test groups formed for a candidate bit-position.
  • FIG. 14 is an example of finding discriminate or compressed index bits.
  • FIGS. 15A, 15B, and 15C show a regional entry that covers a range of input key values.
  • FIGS. 16A, 16B, and 16C highlight adding an entry that overlaps a regional entry.
  • DETAILED DESCRIPTION OF ILLUSTRATIVE EMBODIMENTS
  • The present invention relates to an improvement in lookup table structures. The following description is presented to enable one of ordinary skill in the art to make and use the invention as provided in the context of a particular application and its requirements. Various modifications to the preferred embodiment will be apparent to those with skill in the art, and the general principles defined herein may be applied to other embodiments. Therefore, the present invention is not intended to be limited to the particular embodiments shown and described, but is to be accorded the widest scope consistent with the principles and novel features herein disclosed.
  • The inventor has realized that better compression of stride tables can be achieved. Rather than simply masking or deleting index bits to compress a table, index bits may be compressed using various functions. For example, two or more index bits may be combined together into a single index bit using a logical function such as a logical XOR. A variety of compression functions may be used such as XOR, AND, OR, rotate, shifts, and conditional operations. A field in the table entry can indicate which logical functions to perform for the next level of stride tables. Thus the different logical functions may be mixed together within a table structure to optimize compression.
  • FIG. 3 shows a logically-compressed stride table. Table 20 is a stride table such as one of tables 10, 12, 14, 16 of FIG. 1. In FIG. 3, the current stride size is 4 bits. The current stride of the input key is used as a 4-bit index address that selects one of the 16 entries in stride table 20. Each entry in stride table 20 is in a location identified by a 4-bit index of bits A3, A2, A1, A0.
  • Stride table 20 contains only 4 valid entries, at index locations 1100, 1011, 1001, and 1000. The other 12 indexes contain invalid or empty entries.
  • Since all four valid entries have a 1 in the most-significant-bit (MSB) of the index, or A3=1, index bit A3 is not needed to select among the four valid entries. Index bit A3 could be removed or masked from stride table 20, as was shown in prior-art FIG. 2. The entries with A3=0 are deleted, since they are all empty entries. Only the entries with A3=1 are retained in compressed stride table 20′.
  • Further compression can be achieved by combining two of the remaining three index bits to create a new index bit. In this example, index bits A2 and A1 are combined by an XOR function to generate a new A1 index bit. The old A2 and A1 index bits are replaced by this new A1 index bit. The result is that a 2-bit index is used in compressed stride table 22 to select among the 4 entries in table 22.
  • The size of stride table 22 has been reduced by 75% by masking one index bit (A3) and logically combining two other index bits (A2, A1). Empty entries are removed from compressed stride table 22. Other stride tables could also be compressed, reducing the overall storage requirements.
  • Logical compression is effective since four valid entries only require two address bits to distinguish among them. The theoretical minimum index bits for selecting from among 4 valid entries is just 2 index bits. If there were 6 valid entries, then the minimum number of index bits would be 3, and the compressed table would still have 2 invalid entries. The minimum number of index bits required is the nearest power of two that is equal to or greater than the number of valid entries in a stride table being compressed.
  • Two steps were performed to compress the 4 index bits down to 2 index bits. First, one of the index bits (A3) was masked out. Second, two index bits (A2, A1) were logically combined into one index bit (the new A1). The XOR function used for this logical combining is a compression function (CF). Other compression functions may be used for other tables, such as AND, OR, rotate, shift, or more complex functions such as AND-OR, etc.
  • FIG. 4 is a diagram illustrating masking and logically combining index bits to create compressed index bits for a logically-compressed stride table. Uncompressed stride table 20 has S bits in its index, and contains 2S entries. Many of these 2S entries are invalid or empty since this is a sparse table.
  • The first step is to mask out some of the S index bits. Initial masker 24 receives an index mask (IM) that is applied to the S index bits, and removes M bits. The remaining S−M unmasked index bits from initial masker 24 are applied to logical compressor 26. A selected compression function CF is applied to logical compressor 26 to cause logical compressor 26 to perform the selected compression function on specified bits. The compression function CF, or another control field, can indicate which of the S−M unmasked index bits are combined together by logical compressor 26, and which of the S−M index bits are passed through logical compressor 26 without alteration.
  • Logical compressor 26 reduces the number of index bits by C. For example, when CF specifies two XOR's that reduce 4 index bits to 2 index bits, then C is 2. The final number of compressed index bits is S−M−C. These S−M−C bits select one entry in compressed stride table 22. The number of entries in compressed stride table 22 is 2S−M−C, which has 2M−C entries fewer than uncompressed stride table 20.
  • Some of the entries in compressed stride table 22 may be invalid entries, since the number of valid entries may not be a power of 2. Compression may be less than ideal, even when a variety of compression functions are available. However, significantly better compression can be achieved than with the simple bit masking of FIG. 2.
  • FIG. 5 shows a logical compressor in more detail. Uncompressed index bits are masked by an initial mask applied to initial masker 24. Some of the remaining bits from initial masker 24 bypass logical compressor 26 and become bits in the compressed index, while other bits from initial masker 24 are input to logical compressor 26 for further compression.
  • Bit selector 42 receives bit-position information from a control field and selects which of the bits from initial masker 24 to input for logical compression. For example, bit-positions 5, 7 may be selected so that the fifth and seventh bits are selected.
  • The bits selected by bit selector 42 are applied as inputs to logical gates 40, 44, 46. These may be discrete logical gates, or they may be implemented in firmware or software or in an arithmetic-logic-unit (ALU) or similar programmable device. The compression function CF applied to logical compressor 26 determines which of logical gates 40, 44, 46 are selected, while the others are disabled.
  • For example, CF may indicate XOR, so that XOR logical gate 46 is selected and gates 40, 44 are disabled. The 2 index bits selected by bit selector 42 are applied to the inputs of XOR logical gate 46, which combines them into a single index bit which becomes part of the compressed index.
  • Other functions may be supported by logical compressor 26. More complex logical gates may be substituted, or multiple levels of logical gates, or gates with wider inputs or multiple outputs. Inversions could be added. Some operations may be conditional, such as a conditional rotate or conditional shift, as shown later in FIG. 10. Compression functions that count ones or zeros, or that are priority encoders or leading-one or leading-zero encoders and compressors may be supported. Encryption or signature algorithms may be supported. Designers may devise complex compression functions that are particularly useful for compressing certain kinds of stride tables.
  • Of course, other bits could be chosen for merging using a variety of merge functions. Three or more bits could be merged to one, two, or more bits that replaced the original index bits. When the number of merged bits is less than the number of original bits, compression can occur. For example, compression can occur when 3 original bits are merged to create two merged bits that replace the original 3 bits.
  • FIG. 6 shows a generalized logical compressor with initial and final masking. In this generalization of the compression function of FIG. 5, two or more of the input bits selected by the initial mask are logically combined to create new candidate bits. A final selection is made from the full set of bits from the initial selection and from the newly created candidate bits.
  • The XOR of FIG. 3 created a new index bit (new A1) from two of the uncompressed index bits (A2, A1). This new index bit, the output of the XOR, was selected while the two original index bits were dropped. The operation of logical compressor 26 can be thought of as initially creating new candidate index bits (merged bits) by performing logical operations such as XOR, and then selecting from among the merged and original index bits to create the final compressed index.
  • It is expected that the combination of initial bit selection and final bit selection may lead to better candidates for index bits. Overall, fewer of the newly created index bits may need to be selected than if only the initial bits were available.
  • Uncompressed index bits are masked by an initial mask applied to initial masker 24. Some of the remaining bits from initial masker 24 bypass logical merger 28 and are input directly to final masker 30, while other bits from initial masker 24 are input to logical merger 28.
  • Logical merger 28 combines selected index bits from initial masker 24 using logical functions to produce merged bits E. For example, adjacent index bits may be combined by an XOR function, and the XOR results are the merged bits. The XOR results may be more efficient at encoding the valid entries than the original index bits, as was true of the XOR of A2, A1 in FIG. 3.
  • Final masker 30 receives both the original index bits selected by initial masker 24, and the merged bits created by logical merger 28. Final masker 30 selects from among the original and merged bits to output the final compressed index bits.
  • The compression function CF, or another control field, can indicate that merged bits are to be created, and which of the S−M unmasked index bits are combined together by logical merger 28. The final mask field can indicate which of the S−M index bits and E merged bits are output as the final compressed index.
  • When E merged bits are created by logical merger 28, and initial masker 24 removes M index bits from an original S index bits, and final masker 30 removes another F index bits, the number of final compressed index bits is S−M+E−F.
  • These S−M+E−F bits select one entry in compressed stride table 22. The number of entries in compressed stride table 22 is 2S−M+E−F which has 2M+F−E entries fewer than uncompressed stride table 20.
  • Some of the entries in compressed stride table 22 may be invalid entries, since the number of valid entries may not be a power of 2. Compression may be less than ideal, even when a variety of compression functions are available. However, significantly better compression can be achieved than with the simple bit masking of FIG. 2.
  • FIG. 7 shows a compressor that uses input bits, newly-created merged bits, and a final mask. In this alternative of FIG. 4, all S uncompressed index bits are passed through to final masker 30 and to logical merger 28. There is no initial masker.
  • Logical merger 28 combines selected index bits using logical functions to produce merged bits E. The newly-created candidate bits are referred to as merged bits E. For example, adjacent index bits may be combined by an XOR function, and the XOR results are the merged bits. The XOR results may be more efficient at encoding the valid entries than the original index bits.
  • Final masker 30 receives both the original index bits and the merged bits created by logical merger 28. Final masker 30 selects from among the original and merged bits to output the final compressed index bits.
  • The compression function CF, or another control field, can indicate that merged bits are to be created, and which of the S index bits are combined together by logical merger 28. The final mask field can indicate which of the S index bits and E merged bits are output as the final compressed index.
  • The number of final compressed index bits is S+E−F. These S+E−F bits select one entry in compressed stride table 22. The number of entries in compressed stride table 22 is 2S+E−F, which has 2F−E entries fewer than uncompressed stride table 20.
  • FIG. 8 shows a compressor that uses only newly-created merged bits with the final mask. In this alternative of FIG. 4, the S uncompressed index bits are input to logical merger 28 but none are applied to final masker 30. Thus the final compressed index bits can only come from the merged bits from logical merger 28.
  • Logical merger 28 combines selected index bits using logical functions to produce merged bits E. For example, adjacent index bits may be combined by an XOR function, and the XOR results are the merged bits. The XOR results may be more efficient at encoding the valid entries than the original index bits.
  • Final masker 30 receives only the merged bits created by logical merger 28. Final masker 30 does not receive the original index bits. Final masker 30 selects from among the merged bits to output the final compressed index bits.
  • The compression function CF, or another control field, can indicate that merged bits are to be created, and which of the S index bits are combined together by logical merger 28. The final mask field can indicate which of the E merged bits are output as the final compressed index.
  • The number of final compressed index bits is E−F. These E−F bits select one entry in compressed stride table 22. The number of entries in compressed stride table 22 is 2E−F, which has fewer entries than uncompressed stride table 20.
  • FIG. 9 shows details of a logical merger that creates merged index bits. Uncompressed index bits are optionally masked by an initial mask applied to initial masker 24. Some of the remaining bits from initial masker 24 may bypass logical merger 28 and become bits in the compressed index, while other bits from initial masker 24 are input to logical merger 28 for further compression.
  • While a bit selector could be used to select which index bits to receive as inputs, in another embodiment all index bits are input and used to create merged bits using many logic gates. The bits are applied as inputs to logical gates 48, 48′. These may be discrete XOR logical gates, or they may be implemented in firmware or software or in an arithmetic-logic-unit (ALU) or similar programmable device. The compression function CF applied to logical compressor 26 determines which of logical gates 48, 48′, 49 are selected, while the others are disabled.
  • For example, one CF function value may indicate 2-input XOR's of adjacent bits, so that XOR logical gates 48 is selected and gates 48′, 49 are disabled. There are S−1 of the 2-input XOR logical gates 48, producing S−1 outputs from adjacent index bits A(i), A(i+1)that are sent to final masker 30.
  • Another CF function is to XOR every four adjacent index bits using XOR gates 48′. Gates 48, 49 are disabled. There could be S−1 of the 4-input XOR logical gates 48′, producing S−1 outputs from adjacent index bits A(i), A(i+1), A(i+2), A(i+3) that are sent to final masker 30.
  • A third CF function uses two levels of logic gates. The initial level of XOR logical gates 48 combines adjacent pairs of index bits A(i), A(i+1). Then the outputs of logical gates 48 are input to second-level logical gates 49, which produces deeper XOR averaging. The outputs of second-level logical gates 49 E(j) are sent to final masker 30. Final masker 30 then selects merged bits for use in the compressed index.
  • Some stride tables may compress better with two-level XOR'ing, while other stride tables compress well using 2-input or 4-input XOR'ing. When the stride tables are being constructed or new entries are being added that cause a stride table to be expanded, software can test the various CF functions and choose an optimal function from the many available functions. Routines that find the best CF functions and which index bits to compress can be written that either intelligently find the optimal or near-optimal choices, or that try all combinations and then select the one with the best results.
  • Various engineering design trade-offs can be made with the variations shown in FIGS. 5-9. Some embodiments may have more candidate bits, and require that more mask bits be stored, while other embodiments may have fewer candidate bits and thus require fewer mask bits, but may not be as effective at compression.
  • FIG. 10 shows a conditional-shift compress function. The inventor has discovered that certain data patterns to entries sometimes occur in network data structures. In particular, stride tables sometimes have two groups of entries in the same table that can be compressed using conditional operations. One group of entries in the table matches a condition, and has the conditional operation applied, with the other group of entries in the table does not match the condition, and does not have the conditional operation applied.
  • Only the valid entries are shown in un-compressed stride table 22. The uncompressed index is 9 bits: A8, A7, A6 . . . A1, A0. Although there are locations for 29 or 512 entries, only 8 entries are valid. The other 506 entries are invalid.
  • The valid entries fall into two groups. The first group have the same initial 7 index bits, 0000001, which can be designated as A (A=0000001). The remaining 2 bits are discriminate bits, since they select from among the entries. These two discriminate bits can be designated as DD. Thus the four entries in the first group:
  • 000000100
  • 000000101
  • 000000110
  • 000000111
  • can be abbreviated as:
  • A00
  • A01
  • A10
  • A11
  • or generically as:
  • A_DD.
  • The second group of four entries have the same last 6 bits (LSB's), but different MSB's:
  • 001000101
  • 011000101
  • 100000101
  • 110000101
  • When B is 000101, these four entries can be abbreviate as:
  • 001B
  • 011B
  • 100B
  • 110B
  • or generically as:
  • DDD_B.
  • Thus the two groups have generic patterns:
  • A_DD
  • DDD_B
  • Compression can be vastly improved when the discriminate bits DD align for the two groups. Then A and B can be collapsed into one discriminate bit that selects between the A and B groups, and the same discriminate bits DD can be used by both groups to select entries within the group.
  • To align the two groups, a conditional shift is used. The first group fails the condition and is not shifted, and remains A_DD. The second group meets the condition and is shifted or rotated from DDD_B to B_DDD. The three discriminate bits DDD of the second group can be logically compressed into 2 bits, so that the second group becomes B_DD.
  • Since
  • A_DD and
  • B_DD
  • have the discriminate bits D aligned, both groups can use the same discriminate bits. A and B, which are strings of 6 or 7 bits, can be replaced by a single new index bit (a group-discriminate bit) that is =0 for A, and =1 for B.
  • The strategy is to shift the B group but not shift the A group so that the discriminate bits align, then replace the A and B prefixes with a single group-discriminate bit, and then perform any additional logical compression on the index bits.
  • An initial mask can be performed by initial masker 24. Since all entries have the same values for index bits A5, A4, A3, A2 (0001) these middle bits (shown in the dotted box in stride table 20) can be masked off by initial masker 24.
  • The 3 MSB's, A8, A7, A6 are applied to OR gate 36. When all three MSB's are zero, OR gate 36 outputs a 0. When any of A8, A7, A6 are 1, then OR gate 36 outputs a 1.
  • Conditional shifter 34 is activated to perform a shift when the output of OR gate 36 is 1. The shift is disabled when OR gate 36 outputs a 0. Conditional shifter 34 performs a right shift by 3. Conditional shifter 34 receives all 5 unmasked bits from initial masker 24, bits A8, A7, A6, A1, A0.
  • Since the first group has all 0's in the MSB's, the first group is not shifted by conditional shifter 34. The bit from OR gate 36 is 0 and becomes the group-discriminate bit, which is A2 in the compressed index. This bit replaces A. Bits A1, A0 from conditional shifter 34 are passed through and become the discriminate bits that select one of the four entries in the first group. Bits A8, A7, A6 are discarded.
  • Since the second group has at least one 1 in the MSB's, the second group is shifted by conditional shifter 34. The bit from OR gate 36 is 1 and becomes the group-discriminate bit, which is A2 in the compressed index. This bit replaces B.
  • Conditional shifter 34 shifts the remaining bits A8, A7, A6, A1, A0 to the right by 3 positions, so that A8, A7 are now in the A1, A0 positions. The lower three bits A6, A1, A0 are shifted off the right edge and are discarded. A shift by 7 of the original bits could also be performed in some embodiments.
  • Shifted bits A1, A0 (original bits A8, A7) from conditional shifter 34 are passed through and become the discriminate bits that select one of the four entries in the second group. Bits A8, A7, A6 are discarded. Since original bit A6 was redundant with bits A8, A7, bit A6 can be discarded. Otherwise, another logical operation such as an XOR could be performed to further reduce the number of compressed index bits.
  • The 8 entries in compressed stride table 22 are still in two groups, designated 0DD and 1DD. The first group 0DD was formed from the A_DD entries while the second group 1DD was formed from the DDD_B entries.
  • A very high degree of compression is achieved, from 512 entries in un-compressed stride table 20 to just 8 entries in compressed stride table 22.
  • The compression function and mask values are pre-calculated and known at the time of a lookup operation. During the lookup operation, the CF field is read from the prior level of the table and used to compress the stride bits to create the compressed index that selects one of the entries in the compressed stride table. The first or top-level table may use a compression function that is indicated by a programmable register or by a field that is associated with a pointer to the top level table.
  • This type of compression function is useful when a logical operation can determine whether an entry belongs to Group A or to Group B. A common case where this function type works well is when the leading MSBs belonging to Group A are zero, while at least one MSB bit is set to one for each entry in group B. In this case, a simple OR function over the selected MSBs can decide whether an entry belongs to Group A or to Group B.
  • There may be other index bits present (not shown) that vary in value within group A or within group B. These may be don't care bits and can be ignored. For example, group A may be detected by comparing 6 bits, but another 4 bits are not compared and are masked off as don't care bits. The shift count does not have to equal the number of bits in a group since these don't care bits may be present. Many other variations are possible.
  • FIG. 11 shows storing of compression functions (CF) in a stride-table entry. While compression functions could be fixed in hardware or software routines or specified in other ways, storing the compression function in the stride table entry allows different compression functions to be used for different stride tables within the table structure. Thus compression for each table may be optimized, resulting in better overall compression. The compression may even adapt to the type of entries being stored, or to entry changes that occur over time.
  • Entry 50 is a valid entry in a stride table in level N. Stride bits Sn are extracted from the input key and used to select this entry from other entries in the Nth level of the stride tables. The value of these stride bits Sn are stored in tag field 52 and compared to the input stride bits Sn to ensure a match. Aliasing and other errors are thus avoided.
  • The number of bits in the next level of the stride table is stored in next stride size field 56. For example, a value of 0111 could indicate that 8 bits of the input key are used for the stride bits in the next level N+1. In some embodiments, the stride sizes are fixed and next stride size field 56 is not needed.
  • The compression function (CF) to use for compressing the stride bits to generate the compressed index for the next level N+1 of the stride table is indicated by CF field 60. CF field 60 may include opcode field 62 with a function-type field that indicates the logical function (XOR, shift, etc.). Operand field 64 may contain control bits that control the function, such as indicating a number of positions to shift by, or which bit-positions to use as inputs. A bit mask may be stored in operand field 64. This may be the initial mask (IM) used by initial masker 24, or a final mask used by final masker 30 (FIG. 6), or some other mask. The mask may be encoded or compressed in some way, or could be a bit-by-bit mask. Positive or negative masks may be used.
  • The exact format of CF field 60 may be data-dependent, with some CF functions requiring more control bits than other functions. Opcode field 62 may have a fixed number of bits while operand field 64 varies in width. Decoding of opcode field 62 can determine the number of bits in operand field 64.
  • Each valid entry 50 in the stride table at level N points to another whole stride table in the next level N+1. Pointer field 58 contains a pointer to the stride table in the next level N+1. The compression function specified in CF field 60 is used to compress the next level stride bits SN+1 to find the entry in the next-level stride table pointed to by pointer field 58. Pointer field 58 could contain a full address or a partial address, offset, or some other way of indicating the next stride table.
  • The final level of stride tables does not point to another level. Instead, pointer field 58 may contain a pointer to a lookup result, or could contain the result itself Sometimes, a partial lookup is performed. There may be some valid entries for which only some of the input key's bits are matched; other input key bits are ignored (don't cares). These are referred to as regional entries. For example, the 15 most-significant-bits (MSB's) of a key are matched while the remaining 17 LSB's are ignored. When the first and second level strides are each 8 bits wide, then the second-level stride only matches 7 of the 8 stride bits.
  • MSB-to-use field 54 indicates that only the 7 MSB's of the 8 stride bits are matched when comparing tag field 52 to the input key. For a regional entry in the database, it is possible to successfully terminate the search prior to completely traversing all of the levels. A match may be identified prior to traversing all of the levels. This may occur when a search key matches a regional entry, and there is no exact match entry present for a given search key. In this case, there is a valid result available even prior to completing traversal. In this case the result may be provided in field 58.
  • Routines to Find Discriminate Bits—FIGS. 12-14
  • Since the compression function is predetermined before a lookup, the lookup operation can be finished quickly. However, determining which compression function and mask to use for each of the many stride tables is a slower, more complex process. During table initialization, or when entries are added to a stride table that must be expanded, a routine can be executed to find discriminate bits for that stride table.
  • FIGS. 12A-B show a flowchart of a routine to find discriminate bits used to compress a stride table. Routine 100 can be repeated for each of the many stride tables 10, 12, 14, 16 of FIG. 1 during table initialization to compress any or all of these tables. Routine 100 may also be activated when new entries are added to a stride table, and that table needs to be expanded to make room for the new entries. Routine 100 could also be activated when entries are removed from a table and the table could be compressed further. Initial and final masks may be found using this routine.
  • The uncompressed index bits A(i) for valid entries in a stride table are received, step 102. The stride table is likely to be sparsely populated with valid entries. The uncompressed index bits are the stride bits from the input key that match the tag stored in the valid entries which are also the address or index value within the uncompressed stride table for these valid entries.
  • In some embodiments, merged index bits E(i) can be generated from the uncompressed index bits A(i). One or more of the XOR averaging techniques shown in FIG. 9 may be used to generate the merged index bits. Several sets of merged index bits may be generated, one for each merge method, and routine 100 can select the best merge method later when the discriminate bits are selected. Alternately, just one merge technique may be used.
  • The initial set of candidate bits N(i) are the bit positions i for the uncompressed index bits A(i) plus additional bit-positions for any merged bits E(i), for the valid entries. Some of the bit-positions i will be chosen as discriminate bits and be used in the compressed index, while other bit-positions i will not be chosen and be discarded and not present in the compressed index. The merged bits E(i) can be considered as additional bit positions in the uncompressed index for routine 100.
  • The initial group of valid entries contains all valid entries in the stride table. This initial group will be divided into smaller groups by routine 100 until each sub-divided group has only 1 valid entry in it. The initial set of candidate bits will become smaller as discriminate bits are found by routine 100 and removed from the set of candidate bits.
  • For each bit position i in the set of candidate bits, step 106, or in the merged bits, a maximum delta value is calculated using subroutine 200. Subroutine 200 is shown in FIG. 13. A group of entries is sub-divided into a pair of test groups using the current bit-position i. One test group has the valid entries with N(i)=0, while the other test group has the valid entries with N(i)=1. Thus candidate bit N(i) is used to split the group of entries into two test groups.
  • The delta value is the difference between the number of entries in the two test groups. Ideally, the entries are split as evenly as possible between the two new test groups, so delta values closer to zero are preferred. The maximum delta value is the larger of the two delta values for the pair of test groups formed by splitting the group. When there are many groups, each group is sub-divided into a pair of test groups, and the maximum delta value is the largest delta value for all pairs of test groups formed using the current candidate bit N(i). Subroutine 200 returns the maximum delta value for all pairs of test groups formed using bit position i.
  • When there are more candidate bit-positions that have not yet been tested for their maximum deltas, step 108, then another bit-position i is selected, step 106. Test groups are formed using this candidate bit position and its maximum delta found using subroutine 200.
  • Once all candidate bit positions i have been tested and their maximum deltas found, step 108, then routine 100 continues in FIG. 12B. The current discriminate bit D is selected, step 110, from among the candidate bit-positions that were tested in the loop in FIG. 12A. Each candidate bit-positions had a maximum delta calculated using subroutine 200. The smallest of these maximum deltas is selected. The candidate bit-position that generated the smallest maximum delta is selected as the new or current discriminate bit, since this candidate bit-position best split the groups into evenly-divided test groups.
  • The current discriminate bit, which is the selected candidate bit-position, is removed from the set of candidate bit-positions, step 112. The current discriminate bit is added to the set of discriminate bits that are in the compressed index.
  • Each of the groups of entries is split into a pair of groups using values of the current discriminate bit D, step 114. A group is split into two sub-divided groups by placing entries from the group that have D=0 into one sub-divided group, while entries having D=1 are placed into the other sub-divided group. The sub-divided groups replace the pre-divided groups. Any groups that have less than two valid entries are removed from further processing by routine 100, step 116. These removed groups do not need to be further sub-divided.
  • If any of the groups contain two or more valid entries, step 118, then further processing is needed to find more discriminate bits that can divide these groups into single entries. Routine 100 continues with another iteration, returning to FIG. 12A to test the remaining set of candidate bit-positions to find another discriminate bit.
  • When all groups contain no more than 1 entry, step 118, then a sufficient number of discriminate bits have been selected. All the entries can be uniquely addressed using the set of discriminate bits found by routine 100. The discriminate bits found in all iterations at step 110 are used as the compressed index bits, step 120. Other bit-positions that were not selected and that are still in the set of candidate bit-positions are not used. The stride table is compressed because these non-selected candidate bits are removed from the compressed index.
  • The discriminate bit-positions can include bit-positions from the original uncompressed index bits, and bit-positions from the merged bits. The compression function (CF) specifies how the new candidate bits created. Field 64 in FIG. 11 may provide some control bits for the CF function. The initial mask and the final mask are two examples of control bits.
  • More complex compression functions such as the shift shown in FIG. 10 may require a more complex routine 100, or additional steps to test for compressibility using that complex compression function.
  • FIG. 13 shows a subroutine to calculate the maximum deltas for pairs of test groups formed for a candidate bit-position. Initially there is only one group, while in later iterations of routine 100 there can be many groups of entries.
  • For each group of entries, step 202, the number of valid entries in that group having the candidate bit N(i)=0 are counted as value count(0), and the number of valid entries in that group having the candidate bit N(i)=1 are counted as value count(1). These count values generated in step 204 are the number of valid entries in each test group formed by sub-dividing the group using the candidate bit-position.
  • The delta value for this group is calculated in step 206 as the absolute value of the difference of the count values, or ABS[count(0)-count(1)]. The delta value measures the evenness of sub-dividing this group using the candidate bit-position. A higher delta value indicates that poor sub-dividing occurred, with one of the test groups having more entries than the other test group.
  • When there are other groups, step 208, then counting valid entries in sub-divided test groups and calculating their delta values continues for these groups. Once all groups have been tested and their deltas calculated, the maximum delta is selected, step 212. The maximum delta is the largest of the deltas calculated for this candidate bit-position. The maximum delta is the worst-case sub-dividing among these groups using the candidate bit-position. The maximum delta is returned to routine 100, step 214. The best of the candidate bit-positions (selected in step 110 of FIG. 12B) is the one that has the smallest maximum delta, or the best worst-case sub-dividing.
  • In case there are more than one bit positions from the candidate bit positions that lead to a smallest maximum delta, (a tie) then one of these bits may be chosen as the new discriminate bit. The choice can always be the MSB, always the LSB, or the choice can be random. There may be additional policies used. For example, if up to this point the bits chosen fall either in the set of original bits, or in the set of new candidate bits, there could be a bias toward selecting the bit that belongs to the same sub group, i.e. the group consisting of original bits, or the group consisting of new candidate bits. If such a choice arises for the first discriminate bit, the bit can be chosen belonging to subgroup of new candidate bits. The candidate bit position that results in the greater number of groups could be chosen, or the bit producing the smallest sized group. An additional iteration could be performed before the decision is made when the smallest maximum deltas are the same.
  • FIG. 14 is an example of finding discriminate or compressed index bits. Using routine 100 of FIGS. 12A-B and subroutine 200 of FIG. 13, an initial group of entries 302 is sub-divided while discriminate bits are found. The initial entries have 4 candidate bit-positions B3, B2, B1, B0 in the uncompressed index.
  • The initial group is all entries in table 302. There is only one groups initially. Deltas are calculated for each of the candidate bit-positions. For candidate bit-position B3, three entries in table 302 have B3=1, and three entries have B3=0, so the delta for B3=3−3=0.
  • For candidate bit-position B2, four entries in table 302 have B2=1, and two entries have B2=0, so the delta for B2=4−2=2. For candidate bit-position B1, four entries in table 302 have B1=1, and two entries have B1=0, so the delta for B1=4−2=2. For candidate bit-position B0, five entries in table 302 have B0=1, and one entry has B0=0, so the delta for B0=5−1=4.
  • Since there is only one group, the maximum deltas are the deltas for the single group. The smallest delta is the delta=0 for candidate bit-position B3, so B3 is chosen as the current discriminate bit for iteration 1.
  • The initial group in table 302 is sub-divided into two groups using the current discriminate bit B3. Group 304 is formed from the three entries in table 302 that have B3=1, while group 306 is formed from the remaining three entries in table 302 that have B3=0.
  • Iteration 2 has these two groups 304, 306, and the candidate bit-positions are B2, B1, B0, since B3 has been removed as a candidate.
  • For candidate bit-position B2, 2 entries in group 304 have B2=1, and 1 entry has B2=0, so the delta for B2 for group 304=2−1=1. For group 306, 2 entries in group 306 have B2=1, and 1 entry has B2=0, so the delta for B2 for group 306=2−1=1. The maximum delta for bit-position B2 is 1.
  • For candidate bit-position B1, 2 entries in group 304 have B1=1, and 1 entry has B1=0, so the delta for B1 for group 304=2−1=1. For group 306, 2 entries in group 306 have B1=1, and 1 entry has B1=0, so the delta for B1 for group 306=2−1=1. The maximum delta for bit-position B1 is also 1.
  • For candidate bit-position B0, 2 entries in group 304 have B0=1, and 1 entry has B0=0, so the delta for B0 for group 304=2−1=1. For group 306, 3 entries in group 306 have B0=1, and no entry has B0=0, so the delta for B0 for group 306=3−0=3. The maximum delta for bit-position B0 is 3.
  • The maximum deltas for candidate bits B2, B1, B0 are 1, 1, 3, respectively. Candidate bit B0 is a bad choice due to its large delta, while candidate bits B2 and B1 both have the smallest delta value of 1. Either of candidate bits B2 or B1 could be chosen as the discriminate bit. The choice among tied candidate bits can be made randomly, or the MSB may be chosen, or some other method may be used. In this example, the MSB is chosen, so B2 is the current discriminate bit.
  • Each of groups 304, 306 are sub-divided into pairs of groups using the current discriminate bit B2. Group 304 is sub-divided into group 310, which has the two entries with B2=1, and group 312, which has the one entry with B2=0. Group 306 is sub-divided into group 314, which has the two entries with B2=1, and group 316, which has the one entry with B2=0.
  • Since groups 312, 316 each contain only one entry, groups 312, 316 can be removed from further processing. Only groups 310, 314 are considered for iteration 3.
  • Iteration 3 has these two groups 310, 314, and the candidate bit-positions are B1, B0, since B3 and B2 have been removed as candidates.
  • For candidate bit-position B1, 1 entry in group 310 has B1=1, and 1 entry has B1=0, so the delta for B1 for group 310 =1−1=0. For group 314, 1 entry in group 314 has B1=1, and 1 entry has B1=0, so the delta for B1 for group 314=1−1=0. The maximum delta for candidate bit-position B1 is 0.
  • For candidate bit-position B0, 1 entry in group 310 has B0=1, and 1 entry has B0=0, so the delta for B0 for group 310=1−1=0. For group 314, 2 entries in group 314 have B0=1, and no entry has B0=0, so the delta for B0 for group 314=2−0=2. The maximum delta for candidate bit-position B0 is 2.
  • The smallest maximum delta is 0, obtained for candidate bit-position B1, so B1 is chosen as the current discriminate bit. Group 310 can be sub-divided into groups 320, 322, while group 314 can be sub-divided into groups 324, 326. Since each of groups 320, 322, 324, 326 has only one entry, processing is complete.
  • The discriminate bits are B3 from iteration 1, B2 from iteration 2, and B1 from iteration 3. Index bit B0 can be removed from the compressed index.
  • Regional Entries for Longest-Prefix Matching—FIGS. 15, 16
  • While results for entries in the final level of the stride tables represent one value of the input key, for the regional entries, the results may also be stored at intermediate levels of the stride tables rather than at the final (leaf) level. Representing regional entries is useful because a regional entry represents match results for many values of the input key. The number of entries in the stride tables can be reduced, since one regional entry can represent many final entries.
  • FIGS. 15A-C show a regional entry that covers a range of input key values. In FIG. 15A, regional entry 50′ is stored at an intermediate level of the stride tables. Tag field 52 contains a tag that the stride bits for this level must match. MSB-to-use field 54 indicates a mask that can be applied to the tag value from tag field 52 when matching the stride bits from the input key.
  • For example, MSB-to-use field 54 may have a value of 4 that indicates that only the 4 MSB bits are matched; the remaining LSB's are not matched or don't cares. When the stride size is 7 bits, and MSBu is 4, the 4 upper bits of the tag are matched while the lower 3 bits are not matched. The input key is compared to the masked tag. When the tag value in tag field 52 is 1010000, the masked tag is 1010XXX. The stride bits from the input key only have to match 1010XXX rather than the full 7 bit tag of 1010000. Thus key values such as 1010111 or 1010011 create a match.
  • When a match occurs, even when the match is a masked match, the current result is obtained and the lookup ends without traversing the remaining levels of the stride tables. Field 58 is read for the current result, or a pointer to the current result for the lookup. When the stride bits from the input key match the masked entry, the current result R1 is returned which the most specific region match for a given input key.
  • FIG. 15B shows that a range or region of input-key values can match the regional entry of FIG. 15A. The masked tag value for the entry is 1010XXX, which matches stride bits from key values for the current level with values of 1010000, 1010001, 1010010, . . . 1010101, 1010110, 1010111. There are 8 values of the stride bits that can match the regional entry.
  • Since each stride value can point to whole tables at lower levels, each stride value can cover a wide region of entries in the final level of the stride tables. Thus the 8 values matched at the current level of the table can cover many thousands or millions of entries in the final level of the stride tables.
  • When finding the discriminate bits, such as using routine 100 of FIGS. 12-13, some adjustments should be made for regional entries. In FIG. 15C, when a stride table has a regional entry, only the MSB bits indicated by MSB-to-use field 54 are placed in the set of candidate bit-positions. The masked LSB bits are removed from the set of candidate bits. The candidate bits are only the MSBs that are valid for all of the entries in the set of groups with more than one entry. Thus there are only unmasked bits used for creating index vector.
  • When extended bits are created from the uncompressed index bits, extended bits that are created from masked bits should not be used. Only extended bits that are created from unmasked bits should be placed in the set of candidate bits.
  • FIGS. 16A-C highlight adding an entry that overlaps a regional entry. Sometimes a new entry that overlaps a regional entry is added to a stride table, or during initialization an entry overlaps a regional entry. In FIG. 16A, a regular, non-regional entry of 1010101 is to be added to the stride tables. The regular entry 1010101 points to a different result, R2, than does the regional entry 1010XXX of FIG. 15, which points to result R1.
  • Since 1010101 overlaps the regional entry of 1010XXX of FIG. 15, yet produces a different result, some special handling is needed. Result R2 is considered to be more accurate than result R1, since 1010101 is an exact match while 1010XXX is a masked match. Thus result R2 should be the result eventually returned when the stride bits match 1010101 (and lower levels of the stride tables also match the input key), while result R1 is immediately returned and the lower levels of the stride table not accessed when the stride bits match 1010XXX but not 1010101.
  • In FIG. 16B, the regional entry 1010XXX is divided into several entries that do not overlap with the exact entry 1010101. Two regional entries 10100XX and 101011X along with one exact entry 1010100 can replace the region of 7 stride values covered by 1010XXX minus 1010101.
  • The regional entry 1010XXX is removed from the stride table, and the 2 new regional entries 10100XX and 101011X and the exact entry 1010100 are loaded into the stride table. The overlapping exact entry 1010101 is also loaded into the stride table now that it no longer overlaps any of the regional entries. The index bits may then need to be re-compressed using routine 100 or a similar routine.
  • FIG. 16C shows which results are returned for key matches with the replaced entries. The new regional entry 10100XX covers 4 values of the stride bits and returns the current result R1. The new regional entry 101011X covers 2 values of the stride bits and also returns the current result R1. The new exact entry 1010100 also returns the current value R1. However, the exact entry 1010101 returns the value R2 after traversing lower levels of the stride tables.
  • Alternate Embodiments
  • Several other embodiments are contemplated by the inventor. For example, while simple examples have been shown to facilitate understanding, more complex situations can be handled by processors and other electronic equipment in more practical uses. Compression, masking, and other functions may be implemented as hardware gates, programmable logic, or other hardware, firmware, software, or various combinations thereof.
  • Other compression functions may be supported. For example, the number of leading 1's or 0's may be counted and compressed. More complex logical gates may be substituted, or multiple levels of logical gates, or gates with wider inputs or multiple outputs. Inversions could be added. Some operations may be conditional, such as a conditional rotate or conditional shift. Compression functions that are priority encoders or leading-one or leading-zero encoders and compressors may be supported. Encryption or signature algorithms may be supported. Designers may devise complex compression functions that are particularly useful for compressing certain kinds of stride tables. Encryption algorithms could be used as compression functions. A subset of the possible compression functions may be supported, such as only XOR functions while AND and OR functions are not supported.
  • Tables with only one valid entry may be compressed using an identity function as the compression function. All values of stride bits then point to the only entry for that table. When a table has only two valid entries, a single bit may be generated to distinguish between the two entries.
  • The compressed stride table can be a perfect hash table wherein there are no collisions between valid entries. The tag field may not be required in all embodiments. When the stride table is fully compressed, it can be a minimal perfect hash table. A minimal, fully-compressed table has a size that is the nearest power of two that is equal to or greater than the number of valid entries in the table.
  • Not all of the fields shown need to be present in each entry. For example, when the stride size is fixed in the table design, the stride size field is not needed. Some levels of the stride tables could use fixed, predetermined strides, and prior-level entries pointing to these tables do not need the stride size field, while other levels have a variable stride size and their prior-level entries have the stride size field. Result pointers are only needed for final-level entries or when an intermediate or current result is present. The final level tables do not need pointer to next-level tables since there is no next level to point to.
  • Other fields could be added to various entries, such as memory or table management fields. Fields could be formatted in a variety of ways and encodings, and may be combined or split. Regional entries could be supported in other ways such as pointers to additional tables or entries Various formats and physical embodiments to the stride tables are possible. Other modifications to the basic multi-bit Trie structure and lookup key formats are possible.
  • Some table structures or levels within a table structure may not implement all compression functions, but only support a subset of the functions. For example, supporting XOR alone may be sufficient, without supporting AND and OR compression functions. Merged bits could be generated for each of the supported functions, including some of the more complex functions such as shifts, and a variation of routine 100 used to select from among the merged bits that were generated using the various compression functions to find the best set of determinant bits. All possible compression functions could be tested during initialization to find the optimal functions to use. More complex or simplified routines may be substituted. The routine to find determinant bits could iterate over several levels at a time rather than over one level, or an exhaustive search over all possible combinations of bits may be performed and evaluated to find deterministic bits.
  • Values can be inverted, offset, combined with other values, and manipulated in many ways using known mathematical properties. For example, rather than finding the maximum delta, the delta could be inverted to a negative number and then the smallest (most negative) delta could be chosen as the “maximum” delta. An inversion could be added to an XOR to generate an exclusive-NOR (XNOR), but this is simply a derivative of an XOR and within a family of XOR functions. Other logic tricks and manipulations are contemplated and considered to be within the scope of the claims.
  • In yet another variation similar to FIGS. 8-9, three levels of masking are used. The compressor creates initial compressed index bits, and then using compressed bits, creates a new index bit set having only new candidate bits selected with the mask applied over only new candidate bits. In this alternative, a final selection is made between the Index bits selected from the input bits only, or index bits selected from the new candidate bits created from the original selected index bits from input bits only.
  • The initial mask may have different uses in different embodiments. The initial mask may indicate which index bits are selected and applied as inputs to the merge or compression logic. For example, in FIG. 6, some of the S uncompressed index bits may bypass initial masker 24 and be directly applied to final masker 30. Initial masker 24 may only select bits to apply to logical merger 28. The initial mask may indicate which initial index bits are selected to be part of the compressed index bits.
  • The final compressed index bits could be selected from only initial index bits, or selected only from final masked bits. This can optimize the number of mask bits needed. For example, if both the initial mask and the final mask required S mask bits, having both masks would occupy 2S bits. If only S mask bits were used, a single select bit could indicate when the mask bits are for the initial mask, and when the mask bits are for the final mask. Then only S+1 bits would be needed. Other variations are possible.
  • Any advantages and benefits described may not apply to all embodiments of the invention. When the word “means” is recited in a claim element, Applicant intends for the claim element to fall under 35 USC Sect. 112, paragraph 6. Often a label of one or more words precedes the word “means”. The word or words preceding the word “means” is a label intended to ease referencing of claims elements and is not intended to convey a structural limitation. Such means-plus-function claims are intended to cover not only the structures described herein for performing the function and their structural equivalents, but also equivalent structures. For example, although a nail and a screw have different structures, they are equivalent structures since they both perform the function of fastening. Claims that do not use the word “means” are not intended to fall under 35 USC Sect. 112, paragraph 6. Signals are typically electronic signals, but may be optical signals such as can be carried over a fiber optic line.
  • The foregoing description of the embodiments of the invention has been presented for the purposes of illustration and description. It is not intended to be exhaustive or to limit the invention to the precise form disclosed. Many modifications and variations are possible in light of the above teaching. It is intended that the scope of the invention be limited not by this detailed description, but rather by the claims appended hereto.

Claims (20)

1. A computing device configured to:
store a plurality of stride tables arranged into a plurality of levels that form a multi-bit Trie structure, the plurality of stride tables including a compressed stride table pointed to by a table pointer in a prior-level selected entry in a prior stride table at a prior level in the plurality of levels, the prior-level selected entry being selected by a prior stride;
receive an input lookup key dividable into a plurality of strides corresponding to the plurality of levels, wherein at least one of the strides has multiple bits and the compressed stride table includes a plurality of valid entries selected with compressed index bits, the compressed index bits having fewer bits than a current stride for the compressed stride table; and
receive current stride bits for the current stride of the input lookup key and logically combine the current stride bits to generate logically combined compressed index bits.
2. The computing device of claim 1 further configured to:
logically combine the current stride bits using a logical function specified by a function identified by a compression field stored in the prior level selected entry.
3. The computing device of claim 2 further configured to:
logically combine the current stride bits using a logical function specified by a compression function type identified in the compression field.
4. The computing device of claim 3 wherein the compression function type specifies an exclusive-OR (XOR) logical function, an AND logical function, or an OR logical function,
whereby stride bits are compressed to form the compressed index bits with the XOR, AND, or OR function.
5. The computing device of claim 4 wherein the compression function type specifies a conditional operation to be performed when the current stride bits match a condition value.
6. The computing device of claim 5 wherein the conditional operation is a shift or a rotate of at least a subset of the current stride bits,
whereby conditional shifts or conditional rotates are supported as compression function types.
7. The computing device of claim 3 further configured to:
logically combine input bits to generate logically-combined bits; and
select bits from the current stride bits for use in the compressed index bits.
8. The computing device of claim 7 further configured to:
specify a mask indicating which of the current stride bits and which of the logically-combined bits to select to form the compressed index bits.
9. The computing device of claim 3 further further configured to:
generate merged bits by logically combining current stride bits using an XOR logical function; and
select a subset of the merged bits for inclusion in the compressed index bits,
whereby current stride bits are first merged by the XOR logical function, and then masked to form the compressed index bits.
10. A table lookup method comprising:
receiving an input lookup key and dividing the input lookup key into a first stride and a second stride;
using the first stride to locate a first entry in a first-level stride table;
locating a second-level stride table using a table pointer in the first entry;
compressing stride bits in the second to generate compressed second stride bits;
using the compressed second stride bits to locate a second entry in the second-level stride table;
determining that the second entry is not a final entry and using a table pointer in the second entry as a pointer to a next-level stride table; and
using table pointers in additional entries as pointers to additional stride tables until a final entry in a final-level stride table is located.
11. The table lookup method of claim 10 further comprising
comparing a second tag value stored in the second entry to determine when a valid match has occurred.
12. The table lookup method of claim 11 further comprising
masking uncompressed stride bits in the second stride when comparing the second tag value and a second mask stored in the second entry is set.
13. The table lookup method of claim 12 further comprising:
in response to said comparison, generating a partial stride mask in a current-level stride table at a current level using the current-level stride table as the final-level stride table; and
returning the lookup result stored in or pointed to by the final entry in the final-level stride table.
14. A compressed-lookup-table computing device configured to:
receive an input key;
extract a multi-bit stride from the input key;
compress the multi-bit stride to form a compressed index having fewer bits than the multi-bit stride;
use the compressed to locate a selected entry within a stride table; and
reading a result pointer from the selected entry and locate a lookup result.
15. A table compression method comprising:
dividing an input lookup key into one or more strides of stride bits populated into stride tables at one or more levels;
receiving uncompressed stride bits in a current stride for valid entries in a current stride table and placing the valid entries into an initial group;
determining a set of candidate bit-positions of uncompressed stride bits for the current stride table;
(a) for each candidate bit-position in the set of candidate bit-positions, finding a splitting value that indicates a degree of evenness of splitting groups into pairs of groups using the candidate bit-position;
selecting as a current discriminate bit-position a candidate bit-position that generated a smallest value for the splitting value;
removing the current discriminate bit-position from the set of candidate bit-positions and adding the current discriminate bit-position to bit-positions of compressed stride bits for the current stride;
splitting each group of valid entries into a pair of groups using a value of the current discriminate bit-position;
repeating from step (a) for groups having two or more valid entries until all groups have no more than one valid entry;
forming a compressed stride table from the valid entries by using the compressed stride bits to locate valid entries,
whereby bit-positions of compressed stride bits are determined by successively splitting groups of valid entries.
16. A table lookup method comprising:
dividing an input lookup key into a plurality of strides of stride bits including a first stride, a second stride, and a third stride;
using the first stride to locate a first entry in a first-level stride table;
locating a second-level stride table in a plurality of second-level stride tables using a table pointer in the first entry;
compressing stride bits in the second stride using a function indicated by a compression-type field in the first entry to generate compressed second stride bits;
using the compressed second stride bits to locate a second entry in the second-level stride table;
locating a third-level stride table in a plurality of third-level stride tables using a table pointer in the second entry;
compressing stride bits in the third stride using a second function indicated by a compression-type field in the second entry to generate compressed third stride bits;
using the compressed third stride bits to locate a third entry in the third-level stride table;
continuing for other strides in the input lookup key until a final entry in a final-level stride table is located; and
returning a lookup result stored in or pointed to by the final entry in the final-level stride table.
17. The table lookup method of claim 16, further comprising:
comparing a second tag value stored in the second entry with the second stride to determine that a valid match has occurred; and
comparing a third tag value stored in the third entry with the third stride to determine that the valid match has occurred, whereby stored tags are compared to uncompressed stride bits to determine when valid matches occur.
18. The table lookup method of claim 17, further comprising:
masking uncompressed stride bits in the second stride when comparing the second tag and a second mask stored in the second entry is set; and
masking uncompressed stride bits in the third stride when comparing the third tag when a third mask stored in the third entry is set, whereby masked comparisons allow for a partial stride match to determine when a valid mask has occurred.
19. A table lookup method comprising:
dividing an input lookup key into a plurality of strides of stride bits, including a first stride, a second stride, and a third stride;
using the first stride to locate a first entry in a first-level stride table;
locating a second-level stride table in a plurality of second-level stride tables using a table pointer in the first entry;
compressing stride bits in the second stride using a function indicated by a compression-type field in the first entry to generate compressed second stride bits;
using the compressed second stride bits to locate a second entry in the second-level stride table;
locating a third-level stride table in a plurality of third-level stride tables using a table pointer in the second entry;
compressing stride bits in the third stride using a second function indicted by a compression-type field in the second entry to generate compressed third stride bits;
using the compressed third stride bits to locate a third entry in the third-level stride table;
continuing for other strides in the input lookup key until a final entry in a final-level stride table is located;
returning a lookup result stored in or pointed to by the final entry in the final-level stride table;
compressing a stride table by:
receiving uncompressed stride bits in a current stride for valid entries in the current stride table; and
determining a set of candidate bit-positions of the uncompressed stride bits for the current stride table by:
generating merged stride bits by performing an XOR function on the uncompressed stride bits for the current stride; and
adding the merged stride bits to the set of candidate bit-positions of the uncompressed stride bits for the current stride table;
(a) selecting as a current discriminate bit-position a candidate bit-position that discriminates between valid entries in the current stride table;
removing the current discriminate bit-position from the set of candidate bit-positions and adding the current discriminate bit-position to bit-positions of compressed stride bits for the current stride;
repeating from step (a) for two or more valid entries until the bit-positions of compressed stride bits for the current stride discriminate between valid entries in the current stride table; and
forming a compressed stride table from the valid entries by using the bit-positions of compressed stride bits to locate valid entries.
20. The table lookup method of claim 19, further comprising:
generating merged stride bits by performing functions on the uncompressed stride bits for the current stride; and
when a merged stride bit is selected as the current discriminate bit-position, determining a current function used to generate the merged stride bit and storing an indication of the current function in the compression-type field.
US13/647,303 2005-07-22 2012-10-08 Multi-level compressed look-up tables formed by logical operations to compress selected index bits Abandoned US20130031065A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US13/647,303 US20130031065A1 (en) 2005-07-22 2012-10-08 Multi-level compressed look-up tables formed by logical operations to compress selected index bits

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US70144205P 2005-07-22 2005-07-22
US72071205P 2005-09-27 2005-09-27
US11/309,160 US7430560B1 (en) 2005-07-22 2006-07-03 Multi-level compressed lock-up tables formed by logical operations to compress selected index bits
US12/190,692 US8356020B2 (en) 2005-07-22 2008-08-13 Multi-level compressed look-up tables formed by logical operations to compress selected index bits
US13/647,303 US20130031065A1 (en) 2005-07-22 2012-10-08 Multi-level compressed look-up tables formed by logical operations to compress selected index bits

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US12/190,692 Continuation US8356020B2 (en) 2005-07-22 2008-08-13 Multi-level compressed look-up tables formed by logical operations to compress selected index bits

Publications (1)

Publication Number Publication Date
US20130031065A1 true US20130031065A1 (en) 2013-01-31

Family

ID=39776559

Family Applications (3)

Application Number Title Priority Date Filing Date
US11/309,160 Active 2026-10-22 US7430560B1 (en) 2005-07-22 2006-07-03 Multi-level compressed lock-up tables formed by logical operations to compress selected index bits
US12/190,692 Active 2027-07-27 US8356020B2 (en) 2005-07-22 2008-08-13 Multi-level compressed look-up tables formed by logical operations to compress selected index bits
US13/647,303 Abandoned US20130031065A1 (en) 2005-07-22 2012-10-08 Multi-level compressed look-up tables formed by logical operations to compress selected index bits

Family Applications Before (2)

Application Number Title Priority Date Filing Date
US11/309,160 Active 2026-10-22 US7430560B1 (en) 2005-07-22 2006-07-03 Multi-level compressed lock-up tables formed by logical operations to compress selected index bits
US12/190,692 Active 2027-07-27 US8356020B2 (en) 2005-07-22 2008-08-13 Multi-level compressed look-up tables formed by logical operations to compress selected index bits

Country Status (1)

Country Link
US (3) US7430560B1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8804814B1 (en) * 2013-06-04 2014-08-12 Centri Technology, Inc. Seeding of a workspace to optimize codec operations

Families Citing this family (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7515588B2 (en) * 2004-03-18 2009-04-07 Intel Corporation Method and apparatus to support a large internet protocol forwarding information base
US7430560B1 (en) * 2005-07-22 2008-09-30 X-Engines, Inc. Multi-level compressed lock-up tables formed by logical operations to compress selected index bits
KR100800699B1 (en) * 2006-02-01 2008-02-01 삼성전자주식회사 Method for color look-up table generation
US7720854B2 (en) * 2006-08-25 2010-05-18 Intel Corporation Techniques for accessing a table
CN101507191A (en) * 2006-08-25 2009-08-12 佛罗里达大学研究基金公司 Recursively partioned static ip router tables
US7827218B1 (en) * 2006-11-18 2010-11-02 X-Engines, Inc. Deterministic lookup using hashed key in a multi-stride compressed trie structure
US8290934B2 (en) * 2008-08-06 2012-10-16 Fujitsu Limited Method and system for processing access control lists using a hashing scheme
JP5577497B2 (en) * 2009-04-14 2014-08-27 ウイングアーク1st株式会社 Text data processing apparatus and program
US8271635B2 (en) * 2009-06-17 2012-09-18 Microsoft Corporation Multi-tier, multi-state lookup
CN102385589A (en) * 2010-08-31 2012-03-21 财团法人工业技术研究院 Method for establishing multiple look-up tables and data acquisition method by using multiple look-up tables
US8863146B1 (en) * 2011-04-07 2014-10-14 The Mathworks, Inc. Efficient index folding using indexing expression generated using selected pair of indices for parallel operations based on the number of indices exceeding a pre-determined threshold
US8681795B1 (en) * 2011-12-28 2014-03-25 Juniper Networks, Inc. Fixed latency priority classifier for network data
CN110460851B (en) 2012-08-21 2022-03-08 Emc 公司 Lossless compression system, method and storage medium for segmented image data
US9772864B2 (en) 2013-04-16 2017-09-26 Arm Limited Methods of and apparatus for multidimensional indexing in microprocessor systems
WO2016048331A1 (en) 2014-09-25 2016-03-31 Hewlett Packard Enterprise Development Lp Storage of a data chunk with a colliding fingerprint
US9678749B2 (en) * 2014-12-22 2017-06-13 Intel Corporation Instruction and logic for shift-sum multiplier
US10311026B2 (en) * 2016-05-27 2019-06-04 International Business Machines Corporation Compressed data layout for optimizing data transactions
US10417202B2 (en) 2016-12-21 2019-09-17 Hewlett Packard Enterprise Development Lp Storage system deduplication
KR102545167B1 (en) * 2017-11-23 2023-06-19 삼성전자주식회사 Key-value storage device and method of operating the key-value storage device
US10810162B2 (en) * 2018-07-12 2020-10-20 EMC IP Holding Company LLC Physical file verification
CN112491723B (en) * 2020-12-07 2022-03-01 上海励驰半导体有限公司 Gateway message forwarding method, device, storage medium and gateway

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6247014B1 (en) * 1998-07-01 2001-06-12 Nortel Networks Limited Method and apparatus for performing hash lookups using valid bit tables with pointers
US6782382B2 (en) * 2000-05-29 2004-08-24 International Business Machines Corporation Prefix search method and data structure using compressed search tables
US20040167923A1 (en) * 2000-06-28 2004-08-26 Carr. David W. Method and apparatus for longest matching prefix determination in a communication network

Family Cites Families (44)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5105353A (en) 1987-10-30 1992-04-14 International Business Machines Corporation Compressed LR parsing table and method of compressing LR parsing tables
AU620994B2 (en) 1989-07-12 1992-02-27 Digital Equipment Corporation Compressed prefix matching database searching
US5276868A (en) * 1990-05-23 1994-01-04 Digital Equipment Corp. Method and apparatus for pointer compression in structured databases
US5640551A (en) 1993-04-14 1997-06-17 Apple Computer, Inc. Efficient high speed trie search process
CA2125337A1 (en) * 1993-06-30 1994-12-31 Marlin Jay Eller Method and system for searching compressed data
US5813001A (en) 1993-10-22 1998-09-22 Nodel Corporation Method for performing optimized intelligent searches of knowledge bases using submaps associated with search objects
US5651099A (en) 1995-01-26 1997-07-22 Hewlett-Packard Company Use of a genetic algorithm to optimize memory space
US7095854B1 (en) 1995-02-13 2006-08-22 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US5787026A (en) 1995-12-20 1998-07-28 Intel Corporation Method and apparatus for providing memory access in a processor pipeline
US6067574A (en) 1998-05-18 2000-05-23 Lucent Technologies Inc High speed routing using compressed tree process
FI982095A (en) * 1998-09-29 2000-03-30 Nokia Networks Oy Method of implementing memory and memory arrangement
US6279097B1 (en) 1998-11-20 2001-08-21 Allied Telesyn International Corporation Method and apparatus for adaptive address lookup table generator for networking application
FI991261A (en) 1999-06-02 2000-12-03 Nokia Networks Oy Functional memory based on tree structure
US6560610B1 (en) 1999-08-10 2003-05-06 Washington University Data structure using a tree bitmap and method for rapid classification of data in a database
US7376814B1 (en) 1999-09-07 2008-05-20 Nxp B.V. Method for forming variable length instructions in a processing system
US6535925B1 (en) * 1999-11-09 2003-03-18 Telefonaktiebolaget L M Ericsson (Publ) Packet header compression using division remainders
US6779101B1 (en) 2000-03-07 2004-08-17 University Of Washington Method and apparatus for processing compressed VLIW subinstruction opcodes
US7089240B2 (en) 2000-04-06 2006-08-08 International Business Machines Corporation Longest prefix match lookup using hash function
US7007101B1 (en) 2001-11-09 2006-02-28 Radisys Microware Communications Software Division, Inc. Routing and forwarding table management for network processor architectures
US7154888B1 (en) 2002-02-08 2006-12-26 Cisco Technology, Inc. Method for classifying packets using multi-class structures
US7474657B2 (en) 2002-04-30 2009-01-06 University Of Florida Research Foundation, Inc. Partitioning methods for dynamic router tables
US7444318B2 (en) 2002-07-03 2008-10-28 University Of Florida Research Foundation, Inc. Prefix partitioning methods for dynamic router tables
US7162481B2 (en) 2002-12-06 2007-01-09 Stmicroelectronics, Inc. Method for increasing storage capacity in a multi-bit trie-based hardware storage engine by compressing the representation of single-length prefixes
US7924839B2 (en) 2002-12-06 2011-04-12 Stmicroelectronics, Inc. Mechanism to reduce lookup latency in a pipelined hardware implementation of a trie-based IP lookup algorithm
US7093099B2 (en) 2002-12-12 2006-08-15 Alacritech, Inc. Native lookup instruction for file-access processor searching a three-level lookup cache for variable-length keys
US7904432B2 (en) * 2003-01-24 2011-03-08 Hewlett-Packard Development Company, L.P. Compressed data structure for extracted changes to a database and method of generating the data structure
US6892207B2 (en) * 2003-01-24 2005-05-10 Hewlett-Packard Development Company, L.P. Method of updating data in a compressed data structure
US7325059B2 (en) 2003-05-15 2008-01-29 Cisco Technology, Inc. Bounded index extensible hash-based IPv6 address lookup method
US7370054B1 (en) 2003-09-29 2008-05-06 Sun Microsystems, Inc Method and apparatus for indexing a hash table which is organized as a linked list
US6903669B1 (en) * 2003-10-03 2005-06-07 Cirrus Logic, Inc. Systems and methods for decoding compressed data
US7019674B2 (en) 2004-02-05 2006-03-28 Nec Laboratories America, Inc. Content-based information retrieval architecture
US20050187898A1 (en) 2004-02-05 2005-08-25 Nec Laboratories America, Inc. Data Lookup architecture
US7403526B1 (en) 2004-05-17 2008-07-22 Cisco Technology, Inc. Partitioning and filtering a search space of particular use for determining a longest prefix match thereon
US7827402B2 (en) 2004-12-01 2010-11-02 Cisco Technology, Inc. Method and apparatus for ingress filtering using security group information
US20070022479A1 (en) 2005-07-21 2007-01-25 Somsubhra Sikdar Network interface and firewall device
US20060155915A1 (en) 2004-12-30 2006-07-13 Pereira Jose P Database query processor
US20060288024A1 (en) 2005-04-28 2006-12-21 Freescale Semiconductor Incorporated Compressed representations of tries
US7451297B2 (en) 2005-06-01 2008-11-11 Microsoft Corporation Computing system and method that determines current configuration dependent on operand input from another configuration
US7389377B2 (en) 2005-06-22 2008-06-17 Netlogic Microsystems, Inc. Access control list processor
US7784094B2 (en) 2005-06-30 2010-08-24 Intel Corporation Stateful packet content matching mechanisms
US7522521B2 (en) 2005-07-12 2009-04-21 Cisco Technology, Inc. Route processor adjusting of line card admission control parameters for packets destined for the route processor
US7430560B1 (en) 2005-07-22 2008-09-30 X-Engines, Inc. Multi-level compressed lock-up tables formed by logical operations to compress selected index bits
US7702629B2 (en) 2005-12-02 2010-04-20 Exegy Incorporated Method and device for high performance regular expression pattern matching
US7446681B2 (en) 2006-06-14 2008-11-04 Freescale Semiconductor, Inc. Lookup table array compression and indexing

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6247014B1 (en) * 1998-07-01 2001-06-12 Nortel Networks Limited Method and apparatus for performing hash lookups using valid bit tables with pointers
US6782382B2 (en) * 2000-05-29 2004-08-24 International Business Machines Corporation Prefix search method and data structure using compressed search tables
US20040167923A1 (en) * 2000-06-28 2004-08-26 Carr. David W. Method and apparatus for longest matching prefix determination in a communication network

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8804814B1 (en) * 2013-06-04 2014-08-12 Centri Technology, Inc. Seeding of a workspace to optimize codec operations

Also Published As

Publication number Publication date
US8356020B2 (en) 2013-01-15
US7430560B1 (en) 2008-09-30
US20090024643A1 (en) 2009-01-22

Similar Documents

Publication Publication Date Title
US7430560B1 (en) Multi-level compressed lock-up tables formed by logical operations to compress selected index bits
US8572140B1 (en) Deterministic lookup using hashed key in a multi-stride compressed trie structure
US7921088B1 (en) Logical operations encoded by a function table for compressing index bits in multi-level compressed look-up tables
Lakshminarayanan et al. Algorithms for advanced packet classification with ternary CAMs
US7437354B2 (en) Architecture for network search engines with fixed latency, high capacity, and high throughput
US8856203B1 (en) System and method for algorithmic TCAM packet classification
US7019674B2 (en) Content-based information retrieval architecture
US6728732B1 (en) Data structure using a tree bitmap and method for rapid classification of data in a database
US7356033B2 (en) Method and apparatus for performing network routing with use of power efficient TCAM-based forwarding engine architectures
US8295286B2 (en) Apparatus and method using hashing for efficiently implementing an IP lookup solution in hardware
US6782382B2 (en) Prefix search method and data structure using compressed search tables
US20110317704A1 (en) Dense mode coding scheme
US20060288024A1 (en) Compressed representations of tries
US20060248095A1 (en) Efficient RAM lookups by means of compressed keys
US7680806B2 (en) Reducing overflow of hash table entries
US20060155915A1 (en) Database query processor
US7249149B1 (en) Tree bitmap data structures and their use in performing lookup operations
Yu et al. SSA: A power and memory efficient scheme to multi-match packet classification
US20160335296A1 (en) Memory System for Optimized Search Access
Pak et al. High performance and high scalable packet classification algorithm for network security systems
US7739445B1 (en) Circuit, apparatus, and method for extracting multiple matching entries from a content addressable memory (CAM) device
US7478109B1 (en) Identification of a longest matching prefix based on a search of intervals corresponding to the prefixes
US7558775B1 (en) Methods and apparatus for maintaining sets of ranges typically using an associative memory and for using these ranges to identify a matching range based on a query point or query range and to maintain sorted elements for use such as in providing priority queue operations
Chang A 2-level TCAM architecture for ranges
KR100428247B1 (en) Method of Constructing the Pipe-Lined Content Addressable Memory for High Speed Lookup of Longest Prefix Matching Algorithm in Internet Protocol Address Lookup

Legal Events

Date Code Title Description
AS Assignment

Owner name: GREEN INVESTMENT FUND, L.L.C., DELAWARE

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:X-ENGINES, INC.;REEL/FRAME:029235/0860

Effective date: 20110826

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION