Abstract Algorithms and Data Structures For

Total Page:16

File Type:pdf, Size:1020Kb

Abstract Algorithms and Data Structures For ABSTRACT Title of Dissertation: ALGORITHMS AND DATA STRUCTURES FOR INDEXING, QUERYING, AND ANALYZING LARGE COLLECTIONS OF SEQUENCING DATA IN THE PRESENCE OR ABSENCE OF A REFERENCE Fatemeh Almodaresi Doctor of Philosophy, Dissertation Directed by: Professor Rob Patro Department of Computer Science High-throughput sequencing has helped to transform our study of biological organisms and processes. For example, RNA-seq is one popular sequencing assay that allows measuring dynamic transcriptomes and enables the discovery (via assem- bly) of novel transcripts. Likewise, metagenomic sequencing lets us probe natural environments to profile organismal diversity and to discover new strains and species that may be integral to the environment or process being studied. The vast amount of available sequencing data, and its growth rate over the past decade also brings with it some immense computational challenges. One of these is how do we design memory-efficient structures for indexing and querying this data. This challenge is not limited to only raw sequencing data (i.e. reads) but also to the growing collection of reference sequences (genomes, and genes) that are assembled from this raw data. We have developed new data structures (both reference-based and reference-free) to index raw sequencing data and assembled reference sequences. Specifically, we describe three separate indices, “Pufferfish”, an index over a set of genomes or tran- scriptomes, and “Rainbowfish” and “Mantis” which are both indices for indexing a set of raw sequencing data sets. All of these indices are designed with consideration of support for high query performance and memory efficient construction and query. The Pufferfish data structure is based on constructing a compacted, colored, reference de Bruijn graph (ccdbg), and then indexing this structure in an efficient manner. We have developed both sparse and dense indexing schemes which allow trading index space for query speed (though queries always remain asymptotically optimal). Pufferfish provides a full reference index that can return the set of refer- ences, positions and orientations of any k-mer (substring of fixed length “k” ) in the input genomes. We have built an alignment tool, Puffaligner, around this index for aligning sequencing reads to reference sequences. We demonstrate that Puffaligner is able to produce highly-sensitive alignments, similar to those of Bowtie, but much more quickly and exhibits speed similar to the ultrafast STAR aligner while requiring considerably less memory to construct its index and align reads. The Rainbowfish and Mantis data structures, on the other hand, are based on reference-free colored de Bruijn graphs (cdbg) constructed over raw sequencing data. Rainbowfish introduces a new efficient representation of the color information which is then adopted and refined by Mantis. Mantis supports graph traversal and other topological analyses, but is also particularly well-suited for large-scale sequence-level search over thousands of samples. We develop multiple and successively-refined versions of the Mantis index, culminating in an index that adopts a minimizer- partitioned representation of the underlying k-mer set and a referential encoding of the color information that exploits fast near-neighbor search and efficient encoding via a minimum spanning tree. We describe, further, how this index can be made incrementally updatable by developing an efficient merge algorithm and storing the overall index in a multi-level log-structured merge (LSM) tree. We demonstrate the utility of this index by building a searchable Mantis, via recursive merging, over , raw sequencing samples, which we then scale to over , samples via incremental update. This index can be queried, on a commodity server, to discover the samples likely containing thousands of reference sequences in only a few minutes. ALGORITHMS AND DATA STRUCTURES FOR INDEXING, QUERYING, AND ANALYZING LARGE COLLECTIONS OF SEQUENCING DATA IN THE PRESENCE OR ABSENCE OF A REFERENCE by Fatemeh Almodaresi Dissertation submitted to the Faculty of the Graduate School of the University of Maryland, College Park in partial fulfillment of the requirements for the degree of Doctor of Philosophy Advisory Committee: Professor Rob Patro, Chair/Advisor Professor Stephen Mount, University Chair Representative Professor David Mount Professor Hector Corrada Bravo Professor Mihai Pop © Copyright by Fatemeh Almodaresi Dedication I dedicate this work to Khanoom, my grandma, that if it wasn’t for her I couldn’t image myself be the person I am now or better said, even be! ii Acknowledgments “And whatever of blessings and good things you have, it is from Allah.” Quran (:) There are many people to whom I owe my gratitude for helping me during my PhD years and making this thesis a piece of work that I will be thrilled about forever. First and foremost, I would like to express my deepest appreciation to my advisor, Professor Patro. I started my work with him as someone who “believed” is incapable of any achievements and if it wasn’t for his profound belief in my work and my abilities and for his patience and relentless support I would not be where I am now. He has not only guided me to become a critical thinker and a professional scientist but also a better and stronger person. Taking his class was the pivotal moment of my life that changed it entirely. I now see myself as a proficient researcher who is now able and passionate to work on novel problems and he is my role model for all of that. I have watched him and learned a lot from his extensive knowledge in his area of expertise, persistence in accomplishing the task, and his constructive advice and ingenious contributions. The work in this thesis was impossible without him. I had great pleasure of collaborating with many researchers and scientists in the field during my PhD and I thank them all for the precious experience they offered. iii I would like to thank all the members of Mantis project, specially Michael Ferdman and Robert Johnson for fruitful conversations and insightful suggestions during the three years of collaboration and Prashant Pandey for his invaluable contribution. I would like to thank my thesis committee members for all of their guidance through this process; your discussion, ideas, and feedback have been absolutely invaluable. Many thanks to my colleagues in our lab and CBCB that had made my PhD journey full of fun and exciting. Special thanks to Laraib Iqbal Malik who was like a sister to me and I miss her deeply as well as Mohsen Zakeri for being the brother that was always there for me. I would also like to acknowledge help and support from some of the staff members, specifically Kathy Germana, Tom Hurst, and Barbara Lewis for their kindness, patience and guidance for all the administrative tasks with a constant smile always on their faces. I cannot begin to express my thanks to my husband, Hamid, for his unwavering support, encouragement and accommodation throughout the past years. He gave up the life back in our country and his career for me to pursue my dream which has now become a reality. He has my deepest appreciation for never giving up on me. I would also like to extend my deepest gratitude to my parents for the love, support, and constant encouragement I have gotten over the years. I want to specifically thank my mother who has gone through a lot of struggle and pain but has never surrender nurturing and supporting me. In the end, many thanks to my little siblings, specially Gazelle for her relentless support. Finally, I am extremely thankful to all my friends and family for their per- iv manent and unfailing support. Specifically, Leila Khatami, who is always my fuel and motivator. Her help cannot be overestimated as she was always there for me throughout the hard time when I was alone and far from family. Also, my deepest appreciation goes to Zohreh Sadeghi and Shohreh Tabesh whom never wavered in their support. I would like to specifically thank our Iranian and religion community in NY, who were the most welcoming people one could imagine. Our friends at Stony Brook always make us feel at home and our friends in NY enriched us with a lot of knowledge and love that could not have been achieved otherwise. I was the luckiest person to have them in my life and will always owe a great part of my mindset, and perspective to them. Funding: I gratefully acknowledge support from NSF grants BBSRC-NSF/BIO- , IIS-, IIS-, CNS- , CCF- , CCF-, CCF-, and from Sandia National Laboratories. The following grants specif- ically funded the Mantis line of work discussed in chapters and : National Science Foundation grants CSR- , CCF- , CCF-, CCF-, CNS- , CNS- National Institutes of Health grants RHG , and RGM . The experiments were conducted with equipment purchased through NSF CISE Research Infrastructure Grant Number . v Table of Contents Dedication ii Acknowledgements iii Table of Contents vi List of Tables ix List of Figuresx List of Abbreviations xii Introduction Sequence Indexing............................ . Reference-based Indices..................... . Reference-free Indices....................... De Bruijn Graph............................. . Compacted de Bruijn graph................... . Colored de Bruijn graph..................... Sequence Search.............................. Overview of this document and contribution.............. Pufferfish Introduction................................ Preliminaries............................... Method.................................. . The dense
Recommended publications
  • A General-Purpose High Accuracy and Space Efficient
    countBF: A General-purpose High Accuracy and Space Efficient Counting Bloom Filter 1st Sabuzima Nayak 2nd Ripon Patgiri, Senior Member, IEEE Dept. Computer Science & Engineering Dept. Computer Science & Engineering National Institute of Technology Silchar National Institute of Technology Silchar Cachar-788010, Assam, India Cachar-788010, Assam, India sabuzima [email protected] [email protected] Abstract—Bloom Filter is a probabilistic data structure for Delete operation is crucial for Bloom Filter. Suppose a the membership query, and it has been intensely experimented database management system integrates Bloom Filter to avoid in various fields to reduce memory consumption and enhance unnecessary disk accesses and enhance its performance sig- a system’s performance. Bloom Filter is classified into two key categories: counting Bloom Filter (CBF), and non-counting nificantly with a tiny amount of memory [18]. Thus, the Bloom Filter. CBF has a higher false positive probability than database management system requires to insert, query, and standard Bloom Filter (SBF), i.e., CBF uses a higher memory delete operation for which conventional Bloom Filter is not footprint than SBF. But CBF can address the issue of the false suitable. Therefore, counting Bloom Filter is used in such negative probability. Notably, SBF is also false negative free, but kind of requirements. Another example is a network router. it cannot support delete operations like CBF. To address these issues, we present a novel counting Bloom Filter based on SBF Older packets are removed from the router databases. There- and 2D Bloom Filter, called countBF. countBF uses a modified fore, the router requires counting Bloom Filter.
    [Show full text]
  • Efficient Data Structures for High Speed Packet Processing
    Efficient data structures for high speed packet processing Paolo Giaccone Notes for the class on \Computer aided simulations and performance evaluation " Politecnico di Torino November 2020 Outline 1 Applications 2 Theoretical background 3 Tables Direct access arrays Hash tables Multiple-choice hash tables Cuckoo hash 4 Set Membership Problem definition Application Fingerprinting Bit String Hashing Bloom filters Cuckoo filters 5 Longest prefix matching Patricia trie Giaccone (Politecnico di Torino) Hash, Cuckoo, Bloom and Patricia Nov. 2020 2 / 93 Applications Section 1 Applications Giaccone (Politecnico di Torino) Hash, Cuckoo, Bloom and Patricia Nov. 2020 3 / 93 Applications Big Data and probabilistic data structures 3 V's of Big Data Volume (amount of data) Velocity (speed at which data is arriving and is processed) Variety (types of data) Main efficiency metrics for data structures space time to write, to update, to read, to delete Probabilistic data structures based on different hashing techniques approximated answers, but reliable estimation of the error typically, low memory, constant query time, high scaling Giaccone (Politecnico di Torino) Hash, Cuckoo, Bloom and Patricia Nov. 2020 4 / 93 Applications Probabilistic data structures Membership answer approximate membership queries e.g., Bloom filter, counting Bloom filter, quotient filter, Cuckoo filter Cardinality estimate the number of unique elements in a dataset. e.g., linear counting, probabilistic counting, LogLog and HyperLogLog Frequency in streaming applications, find the frequency of some element, filter the most frequent elements in the stream, detect the trending elements, etc. e.g., majority algorithm, frequent algorithm, count sketch, count{min sketch Giaccone (Politecnico di Torino) Hash, Cuckoo, Bloom and Patricia Nov.
    [Show full text]
  • Quotient Hash Tables-Efficiently Detecting Duplicates in Streaming
    Quotient Hash Tables - Efficiently Detecting Duplicates in Streaming Data Rémi Gérauda,c, Marius Lombard-Platet∗a,b, and David Naccachea,c aDépartement d’informatique de l’ENS, École normale supérieure, CNRS, PSL Research University, Paris, France bBe-Studys, Geneva, Switzerland cIngenico Labs Advanced Research, Paris, France Abstract This article presents the Quotient Hash Table (QHT) a new data structure for duplicate detection in unbounded streams. QHTs stem from a corrected analysis of streaming quotient filters (SQFs), resulting in a 33% reduction in memory usage for equal performance. We provide a new and thorough analysis of both algorithms, with results of interest to other existing constructions. We also introduce an optimised version of our new data structure dubbed Queued QHT with Duplicates (QQHTD). Finally we discuss the effect of adversarial inputs for hash-based duplicate filters similar to QHT. 1 Introduction and Motivation bits. We consider in this paper the following problem: given a pos- Proof. A perfect duplicate filter must be able to store all sibly infinite stream of symbols, detect whether a given sym- streams Ei = (e1,...,en), i.e. must be able to store any bol appeared somewhere in the stream. It turns out that in- subset of Γ, which we denote by (Γ). Given that there are P stances of this duplicate detection problem arise naturally in (Γ) = 2 Γ = 2U of them, according to information theory |P | | | many applications: backup systems [11] or Web caches [10], any such filter requires at least log ( (Γ) ) = log (2U )= U 2 |P | 2 search engine databases or click counting in web advertise- bits of storage.
    [Show full text]
  • When the Levee Breaks: a Practical Guide to Sketching Algorithms for Processing the Flood of Genomic Data Will P
    Rowe Genome Biology (2019) 20:199 https://doi.org/10.1186/s13059-019-1809-x REVIEW Open Access When the levee breaks: a practical guide to sketching algorithms for processing the flood of genomic data Will P. M. Rowe1,2 Abstract Considerable advances in genomics over the past decade have resulted in vast amounts of data being generated and deposited in global archives. The growth of these archives exceeds our ability to process their content, leading to significant analysis bottlenecks. Sketching algorithms produce small, approximate summaries of data and have shown great utility in tackling this flood of genomic data, while using minimal compute resources. This article reviews the current state of the field, focusing on how the algorithms work and how genomicists can utilize them effectively. References to interactive workbooks for explaining concepts and demonstrating workflows are included at https://github.com/will-rowe/genome-sketching. Introduction made, such as the quantity, quality and distribution of data. To gain biological insight from genomic data, a genomicist In an ideal world, most genomicists would elect to include must design experiments, run bioinformatic software and all available data but this is growing harder to achieve as evaluate the results. This process is repeated, refined or theamountofdatadrivesupruntimesandcosts. augmented as new insight is gained. Typically, given the In response to being unable to analyze all the things,gen- size of genomic data, this process is performed using high omicists are turning to analytics solutions from the wider performance computing (HPC) in the form of local com- data science field in order to process data quickly and effi- pute clusters, high-memory servers or cloud services.
    [Show full text]
  • A Cuckoo Filter Modification Inspired by Bloom Filter
    AUT Journal of Electrical Engineering AUT J. Elec. Eng., 51(2) (2019) 187-200 DOI: 10.22060/eej.2019.16370.5287 A Cuckoo Filter Modification Inspired by Bloom Filter Ha. Sasaniyan Asl1,*, B. Mozaffari Tazehkand2, M.J. Museviniya2 1 MSc,Faculty of Electrical and Computer Engineering, University of Tabriz, Tabriz, Iran 2 PhD,Faculty of Electrical and Computer Engineering, University of Tabriz, Tabriz, Iran ABSTRACT: Probabilistic data structures are so popular in membership queries, network applications, Review History: and databases and so on. Bloom Filter and Cuckoo Filter are two popular space efficient models Received: 2019-05-20 that incorporate in set membership checking part of many important protocols. They are compact Revised: 2019-09-17 representations of data that use hash functions to randomize a set of items. Being able to store more Accepted: 2019-09-17 elements while keeping a reasonable false positive probability is a key factor of design. A new algorithm Available Online: 2019-12-01 is proposed to improve some of the performance properties of Cuckoo Filter such as false positive rate and insertion performance and solve some drawbacks of the Cuckoo algorithm such as endless loop. Keywords: Main characteristic of the Bloom Filter is used to improve Cuckoo Filter, so we have a smart Cuckoo Bloom Filter Filter which is modified by Bloom Filter so called as SCFMBF. SCFMBF uses the same table of buckets Cuckoo Filter as Cuckoo Filter but instead of storing constant Fingerprints, it stores Bloom Filters. Bloom Filters can be accumulated in the table’s buckets which leads to higher insertion feasibility.
    [Show full text]
  • Fast and Space-Efficient Maps for Large Data Sets
    Fast and Space-Efficient Maps for Large Data Sets A Dissertation presented by Prashant Pandey to The Graduate School in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy in Computer Science Stony Brook University December 2018 Stony Brook University The Graduate School Prashant Pandey We, the dissertation committee for the above candidate for the Doctor of Philosophy degree, hereby recommend acceptance of this dissertation Michael A. Bender, Thesis Advisor Professor, Computer Science Rob Johnson, Thesis Advisor Research Assistant Professor, Computer Science Michael Ferdman, Thesis Committee Chair Associate Professor, Computer Science Rob Patro Assistant Professor, Computer Science Guy Blelloch Professor, Computer Science Carnegie Mellon University This dissertation is accepted by the Graduate School Dean of the Graduate School ii Abstract of the Dissertation Fast and Space-Efficient Maps for Large Data Sets by Prashant Pandey Doctor of Philosophy in Computer Science Stony Brook University 2018 Approximate Membership Query (AMQ) data structures, such as the Bloom filter, have found numerous applications in databases, storage systems, networks, computa- tional biology, and other domains. However, many applications must work around limitations in the capabilities or performance of current AMQs, making these appli- cations more complex and less performant. For example, many current AMQs cannot delete or count the number of occurrences of each input item, nor can they store values corresponding to items. They take up large amounts of space, are slow, cannot be resized or merged, or have poor locality of reference and hence perform poorly when stored on SSD or disk. In this dissertation, we show how to use recent advances in the theory of compact and succinct data structures to build a general-purpose AMQ.
    [Show full text]
  • {PDF} Probabilistic Data Structures and Algorithms for Big Data
    PROBABILISTIC DATA STRUCTURES AND ALGORITHMS FOR BIG DATA APPLICATIONS PDF, EPUB, EBOOK Andrii Gakhov | 220 pages | 11 Feb 2019 | BOOKS ON DEMAND | 9783748190486 | English | none Probabilistic Data Structures and Algorithms for Big Data Applications PDF Book Mousavi A. About this product Product Information A technical book about popular space-efficient data structures and fast algorithms that are extremely useful in modern Big Data applications. A simple proof of the restricted isometry property for random matrices. Global Ocean Sampling This service is more advanced with JavaScript available. Edition Location Original text Corrected text 1st, p. Rank We study data structures to estimate quantiles and percentiles in a data stream using only one pass through the data. On the other hand, calculating the exact cardinality requires an amount of memory proportional to the cardinality, which is impractical for very large data sets. Sectional minhash for near-duplicate detection. As the size of the reference databases terabytes to petabytes and the number of reads 10s of millions to billions in metagenomic samples increase, it becomes computationally intractable to perform exhaustive comparison of all k -mers in the reads against all k -mers within the reference databases, opening the door for efficient new tools. Emerging Research Trends and New Horizons. Finally, the containment index is converted to a score that approximates sequence similarity. Big Data Analytics. In addition to extensions and variations of fundamental methods, recent advances have developed by combining several core data structures and techniques. About this book The purpose of this book is to introduce probabilistic data structures and algorithms to technology practitioners, including software architects and developers, as well as technology decision makers.
    [Show full text]
  • Concurrent Expandable Amqs on the Basis of Quotient Filters
    Concurrent Expandable AMQs on the Basis of Quotient Filters Tobias Maier Karlsruhe Institute of Technology, Germany [email protected] Peter Sanders Karlsruhe Institute of Technology, Germany [email protected] Robert Williger Karlsruhe Institute of Technology, Germany Abstract A quotient filter is a cache efficient Approximate Membership Query (AMQ) data structure. De- pending on the fill degree of the filter most insertions and queries only need to access one or two consecutive cache lines. This makes quotient filters very fast compared to the more commonly used Bloom filters that incur multiple independent memory accesses depending on the false positive rate. However, concurrent Bloom filters are easy to implement and can be implemented lock-free while concurrent quotient filters are not as simple. Usually concurrent quotient filters work by using an external array of locks – each protecting a region of the table. Accessing this array incurs one additional memory access per operation. We propose a new locking scheme that has no memory overhead. Using this new locking scheme we achieve 1.6× times higher insertion performance and over 2.1× higher query performance than with the common external locking scheme. Another advantage of quotient filters over Bloom filters is that a quotient filter can change its capacity when it is becoming full. We implement this growing technique for our concurrent quotient filters and adapt it in a way that allows unbounded growing while keeping a bounded false positive rate. We call the resulting data structure a fully expandable quotient filter. Its design is similar to scalable Bloom filters, but we exploit some concepts inherent to quotient filters to improve the space efficiency and the query speed.
    [Show full text]
  • Arxiv:1208.0290V1 [Cs.DB] 1 Aug 2012 1
    Don’t Thrash: How to Cache Your Hash on Flash Michael A. Bender∗§ Martin Farach-Colton†§ Rob Johnson∗ Russell Kraner¶ Bradley C. Kuszmaul‡§ Dzejla Medjedovic∗ Pablo Montes∗ Pradeep Shetty∗ Richard P. Spillane∗ Erez Zadok∗ ∗{bender,rob,dmededov,pmontes,pshetty,spillane,ezk}@cs.stonybrook.edu †[email protected][email protected][email protected] ABSTRACT queries for elements that do not exist in the database, in This paper presents new alternatives to the well-known external storage, or on a remote network host. Bloom filter data structure. The Bloom filter, a compact The Bloom filter is the classic example of an approximate data structure supporting set insertion and membership membership query data structure (AMQ). A Bloom filter queries, has found wide application in databases, storage supports insert and lookup operations on a set of keys. For systems, and networks. Because the Bloom filter performs a key in the set, lookup returns “present.” For a key not frequent random reads and writes, it is used almost exclu- in the set, lookup returns “absent” with probability at least 1 ε, where ε is a tunable false-positive rate. There is sively in RAM, limiting the size of the sets it can represent. − This paper first describes the quotient filter, which sup- a tradeoff between ε and the space consumption. Other ports the basic operations of the Bloom filter, achieving AMQs, such as counting Bloom filters, additionally support roughly comparable performance in terms of space and time, deletes [3,11]. For a comprehensive review of Bloom filters, but with better data locality. Operations on the quotient fil- see Broder and Mitzenmacher [4].
    [Show full text]
  • Concurrent Dynamic Quotient Filters: Packing Fingerprints Into Atomics
    Master Thesis Concurrent Dynamic Quotient Filters: Packing Fingerprints into Atomics Robert Williger Date: 29. March 2019 Supervisors: Prof. Dr. Peter Sanders Tobias Maier Institute of Theoretical Informatics, Algorithmics Department of Informatics Karlsruhe Institute of Technology Hiermit versichere ich, dass ich diese Arbeit selbständig verfasst und keine anderen, als die angegebenen Quellen und Hilfsmittel benutzt, die wörtlich oder inhaltlich übernommenen Stellen als solche kenntlich gemacht und die Satzung des Karlsruher Instituts für Technolo- gie zur Sicherung guter wissenschaftlicher Praxis in der jeweils gültigen Fassung beachtet habe. ———————————— Karlsruhe, den 29. März 2019 Abstract Quotient filters are approximate membership data structures that can be used for a variety of applications, from speeding up database accesses to uses in computational biology. We look at several improvements to common quotient filters which are orthogonal to each other and can be combined as needed. We show how to use compact arbitrary length data types to reduce the memory usage by up to seven times and get very close to the theoretical optimum. We also present two different approaches to building concurrent quotient filters that use localized locking or no locking at all. This leads to a good speedup with increasing thread counts and an increase in performance of up to four times compared to traditional locking techniques. Using the compact packing technique with concurrent quotient filters also has the benefit of reducing atomic operations and enabling lock elision optimizations. Additionally, we describe how to use a multilevel quotient filter structure to implement dynamic growing while still allowing a user defined maximum false positive rate and being less than 10% slower compared to non-growing variants in scenarios where growing is not necessary.
    [Show full text]
  • Vector Quotient Filters: Overcoming the Time/Space Trade-Off in Filter Design
    Vector Quotient Filters: Overcoming the Time/Space Trade-Off in Filter Design Prashant Pandey Alex Conway Joe Durie [email protected] [email protected] [email protected] Lawrence Berkeley National Lab VMware Research Rutgers University and University of California Berkeley Michael A. Bender Martin Farach-Colton Rob Johnson [email protected] [email protected] [email protected] Stony Brook University Rutgers University VMware Research ABSTRACT International Conference on Management of Data (SIGMOD ’21), June Today’s filters, such as quotient, cuckoo, and Morton, havea 20–25, 2021, Virtual Event, China. ACM, New York, NY, USA, 14 pages. https://doi.org/10.1145/3448016.3452841 trade-off between space and speed; even when moderately full (e.g., 50%-75% full), their performance degrades nontrivially. The result is that today’s systems designers are forced to choose between speed 1 INTRODUCTION and space usage. Filters, such as Bloom [9], quotient [43], and cuckoo filters [31], In this paper, we present the vector quotient filter (VQF). Locally, maintain compact representations of sets. They tolerate a small the VQF is based on Robin Hood hashing, like the quotient filter, false-positive rate ε: a membership query to a filter for set S returns but uses power-of-two-choices hashing to reduce the variance of present for any x 2S, and returns absent with probability at least runs, and thus offers consistent, high throughput across load factors. 1−ε for any x <S. A filter for a set of size n uses space that depends Power-of-two-choices hashing also makes it more amenable to on ε and n but is much smaller than explicitly storing all items of S.
    [Show full text]
  • A Survey of Sketches in Traffic Measurement: Design, Optimization
    A survey of sketches in traffic measurement: Design, Optimization, Application and Implementation Shangsen Li, Lailong Luo, Deke Guo, Qianzhen Zhang, Pengtao Fu Science and Technology on Information System Engineering Laboratory, National University of Defense Technology, Changsha Hunan 410073, P.R. China. Abstract—Network measurement probes the underlying net- cardinality), the number of packets for a flow (flow size), the work to support upper-level decisions such as network manage- traffic volume contributed by a specific flow (flow volume) ment, network update, network maintenance, network defense and the time information. These statistics together profile and beyond. Due to the massive, speedy, unpredictable features of network flows, sketches are widely implemented in measurement the network and provide essential information for network nodes to approximately record the frequency or estimate the management and protection/defense. cardinality of flows. At their cores, sketches usually maintain one or multiple counter array(s), and rely on hash functions to select TABLE I: Comparison with existing surveys the counter(s) for each flow. Then the space-efficient sketches from the distributed measurement nodes are aggregated to First author # Variants #Measurement tasks Year provide statistics of the undergoing flows. Currently, tremendous Cormode [9] ≤ 15 3 2010 redesigns and optimizations have been proposed to improve the Cormode [10] ≤ 20 3 2011 sketches for better network measurement performance. However, Zhou [11] ≤ 10 4 2014 existing reviews or surveys mainly focus on one particular Yassine [12] — — 2015 aspect of measurement tasks. Researchers and engineers in the Gibbons [13] ≤ 10 1 2016 network measurement community desire an all-in-one survey that Yan [14] — 1 2016 This survey ≥ 90 13 2021 covers the entire processing pipeline of sketch-based network measurement.
    [Show full text]