Movatterモバイル変換


[0]ホーム

URL:


CN103001878A - Determination method and device for media access control (MAC) address Hash collision - Google Patents

Determination method and device for media access control (MAC) address Hash collision
Download PDF

Info

Publication number
CN103001878A
CN103001878ACN2012104853485ACN201210485348ACN103001878ACN 103001878 ACN103001878 ACN 103001878ACN 2012104853485 ACN2012104853485 ACN 2012104853485ACN 201210485348 ACN201210485348 ACN 201210485348ACN 103001878 ACN103001878 ACN 103001878A
Authority
CN
China
Prior art keywords
hash
collision
mac
key assignments
address
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012104853485A
Other languages
Chinese (zh)
Other versions
CN103001878B (en
Inventor
谢密
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE CorpfiledCriticalZTE Corp
Priority to CN201210485348.5ApriorityCriticalpatent/CN103001878B/en
Publication of CN103001878ApublicationCriticalpatent/CN103001878A/en
Application grantedgrantedCritical
Publication of CN103001878BpublicationCriticalpatent/CN103001878B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Images

Landscapes

Abstract

The invention provides a determination method and device for media access control (MAC) address Hash collision. The method comprises performing N-order Hash on key values, obtaining N Hash values, enabling N to be an integer larger than 2; respectively using M Hash values to search M Hash tables in a one-to-one correspondence mode, obtaining M Hash table items, and enabling M to be smaller than N; using (N-M) Hash values in the N Hash values except the M Hash values to undergo ergodic comparison with the Hash values in the M Hash table items, and searching and/or studying MAC addresses where Hash collision exists. According to an embodiment, by performing multiple-order Hash on the key values, the probability of the Hash collision is effectively reduced, and accordingly occupation of a ternary content addressable memory (TCAM) space is greatly reduced.

Description

Definite method and the device of MAC Address hash-collision
Technical field
The present invention relates to field of computer technology, relate in particular to definite method and the device of a kind of media interviews control (MAC) Address-Hash conflict.
Background technology
A position visits record to Hash table (Hash table also cries hash table) in the table by key value is mapped to.This mapping function is called hash function, and the array of put is called Hash table.May obtain same hash address to different keywords, i.e. Key1 ≠ Key2, and f (Key1)=f (Key2), this phenomenon claims hash-collision.The advantage of Hash table lookup method is to search fast, and the memory space utilance is high.Shortcoming is that the time of searching is unfixing, and the conflict time of searching longer more.
MAC (Media Access Control, media interviews control) address is the sign of identifying LAN node, and the whole world is unique.MAC Address is 48, represent with 12 hexadecimal numbers, wherein, front 24 by IEEE (Institute of Electrical and Electronics Engineers, IEEE-USA) distributes, be used for recognition network equipment vendors, consist of OUI (OrganizationalUnique Identifier, organize unique identifier), specified voluntarily by network equipment vendor for rear 24.
In Ethernet, two layers of forwarding need to be to MAC+VSID (Virtual Switching InstanceDoman, the virtual switch instance territory) carrying out forwarding lookup and study searches, because MAC Address has 48, general 16 of VSID, totally 64 of MAC+VSID can not distribute a list item for each address in practice, therefore generally realize by Hash table.
Fig. 1 is that a kind of MAC searches flow chart in the prior art, at first searches Hash table, if there is hash-collision, continues to search conflict solution table; Fig. 2 is that another kind of MAC searches flow chart in the prior art, at first searches conflict solution table, if do not mate, continues to search Hash table.Both differences are the sequencing that Hash table and conflict solution table are searched.The Hash table scheme of a success should be to remove as few as possible to search conflict solution table, minimizing takies conflict solution table place memory, conflict solution table generally is placed among the TCAM (Ternary Content Addressable Memory, three-state content addressing memory).
In the prior art, as long as hash-collision occurs, just list item is write hash-collision solution table, hash-collision is larger, and is more to the TCAM resource occupation, increases the TCAM capacity and can be subject to again the large and high restriction of cost of TCAM power consumption.
Summary of the invention
The embodiment of the invention provides a kind of definite method and device of MAC Address hash-collision, with minimizing hash-collision probability, and then greatly reduces taking the TCAM space.
The embodiment of the invention provides definite method of a kind of media interviews control (MAC) Address-Hash conflict, and the method comprises:
Key assignments is Hash N time, obtains N cryptographic Hash, N is the integer greater than 2;
Use respectively M cryptographic Hash one by one correspondence search M Hash table, obtain M hash table, described M is less than described N;
Use that (N-M) the individual cryptographic Hash except a described M cryptographic Hash and the cryptographic Hash in the described M hash table travel through comparison in the described N cryptographic Hash, search and/or learn to exist the MAC Address of hash-collision.
Preferably, described searching exists the MAC Address of hash-collision to comprise:
If traveled through the clauses and subclauses that rear existence equates, then calculate the MAC table address, search corresponding MAC table, compare with key assignments field and described key assignments in the described MAC table, if the two is equal, then determine to find the MAC Address that has hash-collision.
Preferably, after the key assignments field in the described MAC table of described usefulness and described key assignments compare, also comprise:
If the two is unequal, then determine not exist the MAC Address of hash-collision.
Preferably, described study exists the MAC Address of hash-collision to comprise:
If traveled through the clauses and subclauses that rear existence equates, then determine to exist hash-collision, this key assignments is learnt in the conflict solution table;
If there are not equal clauses and subclauses after having traveled through, then calculate the idle entry number in the described M hash table, if the idle entry number in the described M hash table is zero, then this key assignments is learnt in the described conflict solution table; If the idle entry number in the described M hash table not all is zero, then search and whether exist cryptographic Hash to equal the clauses and subclauses of arbitrary cryptographic Hash in described (N-M) individual cryptographic Hash in hash-collision table corresponding to the non-vanishing hash table of idle entry number, if exist, then this key assignments is learnt in the described conflict solution table, if there is no, judge then whether the conflict list item is full in this hash-collision table, if full, then this key assignments learnt in the described conflict solution table.
Preferably, described judge in this hash-collision table that the conflict list item is whether full after, also comprise:
If less than, then described (N-M) individual cryptographic Hash is write in the described hash-collision table, calculate the MAC table address, this key assignments is learnt in the described MAC table.
The embodiment of the invention also provides definite device of a kind of media interviews control (MAC) Address-Hash conflict, is applied in the network processing unit, and this device comprises:
The Hash module is used for key assignments is Hash N time, obtains N cryptographic Hash, and N is the integer greater than 2;
Search module, be used for using respectively M cryptographic Hash one by one correspondence search M Hash table, obtain M hash table, described M is less than described N;
Processing module travels through comparison for (N-M) individual cryptographic Hash of using a described N cryptographic Hash except a described M cryptographic Hash and the cryptographic Hash in the described M hash table, searches and/or learn to exist the MAC Address of hash-collision.
Preferably, described processing module specifically is used for: if traveled through the clauses and subclauses that rear existence equates, then calculate the MAC table address, search corresponding MAC table, compare with key assignments field and described key assignments in the described MAC table, if the two equates, then determines to find the MAC Address that has hash-collision.
Preferably, described processing module also is used for: if the two is unequal, then determine not exist the MAC Address of hash-collision.
Preferably, described processing module specifically is used for:
If traveled through the clauses and subclauses that rear existence equates, then determine to exist hash-collision, this key assignments is learnt in the conflict solution table;
If there are not equal clauses and subclauses after having traveled through, then calculate the idle entry number in the described M hash table, if the idle entry number in the described M hash table is zero, then this key assignments is learnt in the described conflict solution table; If the idle entry number in the described M hash table not all is zero, then search and whether exist cryptographic Hash to equal the clauses and subclauses of arbitrary cryptographic Hash in described (N-M) individual cryptographic Hash in hash-collision table corresponding to the non-vanishing hash table of idle entry number, if exist, then this key assignments is learnt in the described conflict solution table, if there is no, judge then whether the conflict list item is full in this hash-collision table, if full, then this key assignments learnt in the described conflict solution table.
Preferably, described processing module also is used for: if less than, then described (N-M) individual cryptographic Hash is write in the described hash-collision table, calculate the MAC table address, this key assignments is learnt in the described MAC table.
The embodiment of the invention effectively reduces the probability of hash-collision by key assignments being done repeatedly Hash, thereby greatly reduces taking the TCAM space.
Description of drawings
Fig. 1 is that a kind of MAC of the prior art searches flow chart;
Fig. 2 is that another kind of MAC of the prior art searches flow chart;
Fig. 3 is the schematic diagram of used in the present invention couple of Hash lookup table embodiment;
List item Relations Among schematic diagram when Fig. 4 is the two Hash lookup of the embodiment of the invention;
Fig. 5 is the flow chart of the two Hash lookup processes of the embodiment of the invention;
Hash-collision schematic diagram when Fig. 6 is embodiment of the invention mac learning;
Fig. 7 is Hash collision table schematic diagram in the embodiment of the invention mac learning;
Fig. 8 is the flow chart of embodiment of the invention mac learning process;
Fig. 9 is the structural representation of definite device of embodiment of the invention MAC Address hash-collision.
Embodiment
For making the purpose, technical solutions and advantages of the present invention clearer, hereinafter in connection with accompanying drawing embodiments of the invention are elaborated.Need to prove that in the situation of not conflicting, the embodiment among the application and the feature among the embodiment be combination in any mutually.
Hash-collision in the embodiment of the invention mainly is present in following two kinds of situations:
When 1) MAC searches, find key value and not yet learn in the list item, but and learn to have produced hash-collision into the key assignments of list item, find same MAC table list item, at this moment, need to finding key value and showing that the Compare field compares among the result, judge whether it is this corresponding list item that finds key value;
2) hash-collision during mac learning.
For above-mentioned two kinds of hash-collisions, the embodiment of the invention provides definite method of a kind of media interviews control (MAC) Address-Hash conflict, and the method comprises:
Key assignments is Hash N time, obtains N cryptographic Hash, N is the integer greater than 2;
Use respectively M cryptographic Hash one by one correspondence search M Hash table, obtain M hash table, described M is less than described N;
Use that (N-M) the individual cryptographic Hash except a described M cryptographic Hash and the cryptographic Hash in the described M hash table travel through comparison in the described N cryptographic Hash, search and/or learn to exist the MAC Address of hash-collision.
Above-mentioned M is preferably N-1, and for example N is that 3, M is 2, and certainly, N can also be 3 for 4, M, and in addition, M can also be 2, etc.
Wherein, the hash-collision when searching for MAC, adopt following processing scheme:
As shown in Figure 3, be the schematic diagram of used in the present invention couple of Hash lookup table embodiment, can learn the list item definition of two Hash lookup tables by this figure:
Hash table is defined as n Hash list item (List), and each Hash List (be called for short HL) comprises m Hash clauses and subclauses, and whether valid bit representation clauses and subclauses are effective, and the Hash field is that key assignments is done cryptographic Hash behind the Hash.
MAC table capacity is n*m list item, each list item comprises two parts, Compare (being called for short Comp) field is original key assignments, judge hash-collision when being used for searching, the reason that this hash-collision produces is: the key assignments when searching is not yet learnt in the list item, but and learn to have produced hash-collision into the key assignments of list item, find same MAC table list item, at this moment, need to finding key value and showing that the Compare field compares among the result, judge whether it is this corresponding list item that finds key value.MAC result (MAC Result) is used for depositing the MAC forwarding information.
As shown in Figure 4, list item Relations Among schematic diagram in this embodiment, is done Hash three times to key assignments when being the two Hash lookup of the embodiment of the invention, produces three cryptographic Hash: HashA, HashB, HashC; Search respectively Hash table A, Hash table B with HashA, HashB, lookup result is Hash entry A, Hash entry B, i.e. the described Hash List of Fig. 3; Then with the hash value among HashC and Hash List A, the Hash ListB relatively, if do not find equal clauses and subclauses, then do not match clauses and subclauses in the two Hash lookups of expression; If find equal clauses and subclauses, continue to search the MAC table, with the Compare field in the MAC table and the comparison that finds key value, if equate, expression finds the coupling clauses and subclauses; If unequal, expression does not find the coupling clauses and subclauses.
As shown in Figure 5, be the flow chart of the two Hash lookup processes of the embodiment of the invention, this process comprises:
Step 101, do Hash three times to finding key value, obtain three cryptographic Hash: HashA, HashB, HashC;
Step 102, search Hash table A, Hash table B with HashA, HashB correspondence, obtain Hash entry Hash List A and Hash List B;
Step 103, relatively (travel through first Hash List A with the hash value among HashC and Hash List A, Hash List B traversal, if without occurrence, travel through again Hash List B), if do not have equal clauses and subclauses after having traveled through all clauses and subclauses, then the two Hash tables of expression do not match clauses and subclauses;
If there be clauses and subclauses and thevalid position 1 that equates instep 104, the address that record matching list item HashList is corresponding is RamAddr, and skew corresponding to coupling clauses and subclauses is index among the record HashList;
Step 105, calculating MAC table address: RamAddr*m+index search the MAC table;
Step 106, with the Compare field in the MAC table with find key value comparison, if equate, expression finds the coupling clauses and subclauses; If unequal, expression does not find the coupling clauses and subclauses.
Wherein, the hash-collision during for mac learning, adopt following processing scheme:
As shown in Figure 6, the hash-collision schematic diagram when being embodiment of the invention mac learning, among this embodiment, Key1 is through twice Hash, respectively Hash List j among Hash List i and the Hash table B among the corresponding Hash table A; According to preferentially writing many this principles of Hash table of idle clauses and subclauses, suppose the idle clauses and subclauses of Hash Listj of Hash table B at this moment more than the Hash List i of Hash table A, so Key1 writes the Hash Listj of Hash table B;
During study Key2, Key2 is done Hash twice, Hash List k among Hash List i and the Hash table B among the corresponding Hash table A of difference, namely the HashA value of Key2 and Key1 is identical, has produced hash-collision; Suppose that the idle clauses and subclauses of Hash List i of Hash table A at this moment are more than the Hash List k of Hash table B, therefore Key2 writes the Hash List i of Hash table A, if at this moment the HashC value of Key2 and Key1 is identical, produced hash-collision, because Key1 writes the Hash List i of Hash table A, Key1 can match these clauses and subclauses among the Hash List i of Hash table A when searching, cause the mistake coupling.
The condition that this hash-collision exists is: the HashA of Key1 and Key2, HashB have one to produce hash-collision (such as the HashA among Fig. 6), the key assignments of rear interpolation will write in the Hash table that produces hash-collision (the Hash table A in showing such as Fig. 6), and HashC produces hash-collision.
In order to solve this hash-collision, define a hash-collision table.
As shown in Figure 7, it is Hash collision table schematic diagram in the embodiment of the invention mac learning, the hash-collision table definition is n conflict list item (Collision List, CL), each Collision List list item comprises k Hash clauses and subclauses (the hash-collision degree of depth is k), and whether valid bit representation clauses and subclauses are effective.
As shown in Figure 8, be the flow chart of embodiment of the invention mac learning process, this process comprises:
Step 201, key assignments is done Hash three times, obtain three cryptographic Hash: HashA, HashB, HashC;
Step 202, search Hash table A, Hash table B with HashA, HashB, obtain Hash List A, Hash List B;
Step 203, with the hash value among HashC and Hash List A, Hash List B traversal relatively (travel through first Hash List A, if without occurrence, travel through again Hash List B).If occurrence is arranged, andvalid position 1, there is hash-collision in expression, and this key assignments is learnt conflict solution table;
Step 204, the clauses and subclauses that if there is no equate are calculated idle entry number among Hash table A and the Hash table B list item HashList, and recording the many hash table addresses of idle entry number is RamAddr, and another hash table address is designated as RamAddrOther; If there are not idle clauses and subclauses in Hash table A and Hash table B list item HashList, this key assignments is learnt conflict solution table;
If there are idle clauses and subclauses instep 205 Hash table A or Hash table B list item HashList, search hash-collision table (Collision Table, CT), whether exist the hash value to equal the clauses and subclauses of HashC and valid=1 in the traversal conflict list item (Collision List), if exist, this key assignments is learnt conflict solution table;
If do not exist the hash value to equal the clauses and subclauses of HashC and valid=1 amongstep 206 hash-collision table (CollisionTable) the Collision List, judge whether Collision List is full, if CollisionList is full, this key assignments is learnt conflict solution table;
Ifstep 207 Collision List less than, HashC is write Hash table; Writing address is RamAddr+index;
HashTable[RamAddr][index].hash=HashC
HashTable[RamAddr][index].valid=1
Ifstep 208 Collision List less than, HashC is write the hash-collision table, judge conflict when being used for new key assignments study; Writing address is RamAddrOther+index;
CollisionTabel[RamAddrOther][index].hash=HashC
CollisionTabel[RamAddrOther][index].valid=1
Step 209, this key assignments is learnt MAC table, writing address is RamAddr*m+index.
The embodiment of the invention effectively reduces the probability of hash-collision by key assignments being done repeatedly Hash, thereby greatly reduces taking the TCAM space.
As shown in Figure 9, be the structural representation of definite device of embodiment of the invention MAC Address hash-collision, this determines application of installation in network processing unit, this device comprises Hash module 11,searches module 12 andprocessing module 13, wherein:
The Hash module is used for key assignments is Hash N time, obtains N cryptographic Hash, and N is the integer greater than 2;
Search module, be used for using respectively M cryptographic Hash one by one correspondence search M Hash table, obtain M hash table, described M is less than described N;
Processing module travels through comparison for (N-M) individual cryptographic Hash of using a described N cryptographic Hash except a described M cryptographic Hash and the cryptographic Hash in the described M hash table, searches and/or learn to exist the MAC Address of hash-collision.
Wherein, described processing module specifically is used for: if traveled through the clauses and subclauses that rear existence equates, then calculate the MAC table address, search corresponding MAC table, compare with key assignments field and described key assignments in the described MAC table, if the two equates, then determines to find the MAC Address that has hash-collision.In addition, described processing module also is used for: if the two is unequal, then determine not exist the MAC Address of hash-collision.Concrete processing procedure can be referring to Fig. 5.
Similarly, described processing module specifically is used for: if traveled through the clauses and subclauses that rear existence equates, then determine to exist hash-collision, this key assignments is learnt in the conflict solution table; If there are not equal clauses and subclauses after having traveled through, then calculate the idle entry number in the described M hash table, if the idle entry number in the described M hash table is zero, then this key assignments is learnt in the described conflict solution table; If the idle entry number in the described M hash table not all is zero, then search and whether exist cryptographic Hash to equal the clauses and subclauses of arbitrary cryptographic Hash in described (N-M) individual cryptographic Hash in hash-collision table corresponding to the non-vanishing hash table of idle entry number, if exist, then this key assignments is learnt in the described conflict solution table, if there is no, judge then whether the conflict list item is full in this hash-collision table, if full, then this key assignments learnt in the described conflict solution table.In addition, described processing module also is used for: if less than, then described (N-M) individual cryptographic Hash is write in the described hash-collision table, calculate the MAC table address, this key assignments is learnt in the described MAC table.Concrete processing procedure can be referring to Fig. 8.
Above-mentioned definite device can effectively reduce the probability of hash-collision by key assignments being done repeatedly Hash, thereby greatly reduces taking the TCAM space.
One of ordinary skill in the art will appreciate that all or part of step in the said method can come the instruction related hardware to finish by program, said procedure can be stored in the computer-readable recording medium, such as read-only memory, disk or CD etc.Alternatively, all or part of step of above-described embodiment also can realize with one or more integrated circuits.Correspondingly, each the module/unit in above-described embodiment can adopt the form of hardware to realize, also can adopt the form of software function module to realize.The present invention is not restricted to the combination of the hardware and software of any particular form.
Above embodiment is only unrestricted in order to technical scheme of the present invention to be described, only with reference to preferred embodiment the present invention is had been described in detail.Those of ordinary skill in the art should be appreciated that and can make amendment or be equal to replacement technical scheme of the present invention, and do not break away from the spirit and scope of technical solution of the present invention, all should be encompassed in the middle of the claim scope of the present invention.

Claims (10)

If there are not equal clauses and subclauses after having traveled through, then calculate the idle entry number in the described M hash table, if the idle entry number in the described M hash table is zero, then this key assignments is learnt in the described conflict solution table; If the idle entry number in the described M hash table not all is zero, then search and whether exist cryptographic Hash to equal the clauses and subclauses of arbitrary cryptographic Hash in described (N-M) individual cryptographic Hash in hash-collision table corresponding to the non-vanishing hash table of idle entry number, if exist, then this key assignments is learnt in the described conflict solution table, if there is no, judge then whether the conflict list item is full in this hash-collision table, if full, then this key assignments learnt in the described conflict solution table.
If there are not equal clauses and subclauses after having traveled through, then calculate the idle entry number in the described M hash table, if the idle entry number in the described M hash table is zero, then this key assignments is learnt in the described conflict solution table; If the idle entry number in the described M hash table not all is zero, then search and whether exist cryptographic Hash to equal the clauses and subclauses of arbitrary cryptographic Hash in described (N-M) individual cryptographic Hash in hash-collision table corresponding to the non-vanishing hash table of idle entry number, if exist, then this key assignments is learnt in the described conflict solution table, if there is no, judge then whether the conflict list item is full in this hash-collision table, if full, then this key assignments learnt in the described conflict solution table.
CN201210485348.5A2012-11-262012-11-26The determination method and device of MAC Address hash-collisionActiveCN103001878B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201210485348.5ACN103001878B (en)2012-11-262012-11-26The determination method and device of MAC Address hash-collision

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201210485348.5ACN103001878B (en)2012-11-262012-11-26The determination method and device of MAC Address hash-collision

Publications (2)

Publication NumberPublication Date
CN103001878Atrue CN103001878A (en)2013-03-27
CN103001878B CN103001878B (en)2018-02-16

Family

ID=47930031

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201210485348.5AActiveCN103001878B (en)2012-11-262012-11-26The determination method and device of MAC Address hash-collision

Country Status (1)

CountryLink
CN (1)CN103001878B (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN103581024A (en)*2013-11-212014-02-12盛科网络(苏州)有限公司Learning method and device combining MAC address hardware and software
CN104079489A (en)*2013-03-282014-10-01日立金属株式会社Network relay device
WO2016082367A1 (en)*2014-11-252016-06-02中兴通讯股份有限公司Method and device for realizing hardware table traversal based on network processor
CN105955971A (en)*2015-11-302016-09-21中国银联股份有限公司Key value buffer memory implementation method and device
CN106095770A (en)*2016-05-052016-11-09邦彦技术股份有限公司Data quick searching device, searching method, adding method and deleting method
CN108664518A (en)*2017-03-312018-10-16深圳市中兴微电子技术有限公司A kind of method and device for realizing processing of tabling look-up
CN108848034A (en)*2018-07-172018-11-20新华三技术有限公司A kind of network equipment and list item learning method
CN112637379A (en)*2020-12-252021-04-09北京天融信网络安全技术有限公司mac address hash operation method, device, equipment and storage medium
CN114422478A (en)*2021-12-212022-04-29福建星网智慧科技有限公司Method for mapping GEMPORT ID and MAC address and storage device
CN115576954A (en)*2022-11-242023-01-06恒生电子股份有限公司Hash table determining method and device
CN116701987A (en)*2023-04-242023-09-05西安微电子技术研究所Combined packet classifier and method based on hash and TCAM
WO2024197825A1 (en)*2023-03-312024-10-03新华三技术有限公司Storing mac address table entries

Citations (11)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6697873B1 (en)*1999-12-202004-02-24Zarlink Semiconductor V.N., Inc.High speed MAC address search engine
CN1932818A (en)*2006-09-202007-03-21华为技术有限公司Data bank system and method for controlling data bank data
CN101140592A (en)*2007-09-302008-03-12华为技术有限公司 Keyword storage, search method and device
CN101232444A (en)*2008-01-222008-07-30杭州华三通信技术有限公司 Hash conflict resolution method, device and switching equipment with the device
CN101692651A (en)*2009-09-272010-04-07中兴通讯股份有限公司Method and device for Hash lookup table
CN102073733A (en)*2011-01-192011-05-25中兴通讯股份有限公司Method and device for managing Hash table
CN102232219A (en)*2010-01-262011-11-02华为技术有限公司Method and device for storing and searching keyword
CN102346735A (en)*2010-07-292012-02-08高通创锐讯通讯科技(上海)有限公司Hash search method capable of reducing hash collision
CN102682116A (en)*2012-05-142012-09-19中兴通讯股份有限公司Method and device for processing table items based on Hash table
CN102710813A (en)*2012-06-212012-10-03杭州华三通信技术有限公司MAC address table entry access method and equipment
CN102724106A (en)*2011-03-302012-10-10华为技术有限公司Learning method for MAC addresses, network side equipment, and system

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6697873B1 (en)*1999-12-202004-02-24Zarlink Semiconductor V.N., Inc.High speed MAC address search engine
CN1932818A (en)*2006-09-202007-03-21华为技术有限公司Data bank system and method for controlling data bank data
CN101140592A (en)*2007-09-302008-03-12华为技术有限公司 Keyword storage, search method and device
CN101232444A (en)*2008-01-222008-07-30杭州华三通信技术有限公司 Hash conflict resolution method, device and switching equipment with the device
CN101692651A (en)*2009-09-272010-04-07中兴通讯股份有限公司Method and device for Hash lookup table
CN102232219A (en)*2010-01-262011-11-02华为技术有限公司Method and device for storing and searching keyword
CN102346735A (en)*2010-07-292012-02-08高通创锐讯通讯科技(上海)有限公司Hash search method capable of reducing hash collision
CN102073733A (en)*2011-01-192011-05-25中兴通讯股份有限公司Method and device for managing Hash table
CN102724106A (en)*2011-03-302012-10-10华为技术有限公司Learning method for MAC addresses, network side equipment, and system
CN102682116A (en)*2012-05-142012-09-19中兴通讯股份有限公司Method and device for processing table items based on Hash table
CN102710813A (en)*2012-06-212012-10-03杭州华三通信技术有限公司MAC address table entry access method and equipment

Cited By (21)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN104079489B (en)*2013-03-282018-08-28日立金属株式会社Network repeater
CN104079489A (en)*2013-03-282014-10-01日立金属株式会社Network relay device
CN103581024A (en)*2013-11-212014-02-12盛科网络(苏州)有限公司Learning method and device combining MAC address hardware and software
WO2016082367A1 (en)*2014-11-252016-06-02中兴通讯股份有限公司Method and device for realizing hardware table traversal based on network processor
CN105700859A (en)*2014-11-252016-06-22中兴通讯股份有限公司Network-processor-based hardware table traversal method and apparatus
CN105955971A (en)*2015-11-302016-09-21中国银联股份有限公司Key value buffer memory implementation method and device
CN105955971B (en)*2015-11-302019-09-17中国银联股份有限公司A kind of implementation method and device of key assignments caching
CN106095770A (en)*2016-05-052016-11-09邦彦技术股份有限公司Data quick searching device, searching method, adding method and deleting method
WO2017190409A1 (en)*2016-05-052017-11-09邦彦技术股份有限公司Quick data search method, search method, adding method and deletion method
CN106095770B (en)*2016-05-052019-10-11邦彦技术股份有限公司Data quick searching device, searching method, adding method and deleting method
CN108664518B (en)*2017-03-312021-12-07深圳市中兴微电子技术有限公司Method and device for realizing table look-up processing
CN108664518A (en)*2017-03-312018-10-16深圳市中兴微电子技术有限公司A kind of method and device for realizing processing of tabling look-up
CN108848034A (en)*2018-07-172018-11-20新华三技术有限公司A kind of network equipment and list item learning method
CN108848034B (en)*2018-07-172021-04-27新华三技术有限公司Network equipment and table entry learning method
CN112637379A (en)*2020-12-252021-04-09北京天融信网络安全技术有限公司mac address hash operation method, device, equipment and storage medium
CN112637379B (en)*2020-12-252022-11-15北京天融信网络安全技术有限公司mac address hash operation method, device, equipment and storage medium
CN114422478A (en)*2021-12-212022-04-29福建星网智慧科技有限公司Method for mapping GEMPORT ID and MAC address and storage device
CN115576954A (en)*2022-11-242023-01-06恒生电子股份有限公司Hash table determining method and device
CN115576954B (en)*2022-11-242023-04-07恒生电子股份有限公司Hash table determining method and device
WO2024197825A1 (en)*2023-03-312024-10-03新华三技术有限公司Storing mac address table entries
CN116701987A (en)*2023-04-242023-09-05西安微电子技术研究所Combined packet classifier and method based on hash and TCAM

Also Published As

Publication numberPublication date
CN103001878B (en)2018-02-16

Similar Documents

PublicationPublication DateTitle
CN103001878A (en)Determination method and device for media access control (MAC) address Hash collision
US9967187B2 (en)Exact match lookup with variable key sizes
CN100498767C (en)System for high-performance hashing
CN101604337B (en) Device and method for storing and searching hash table items
WO2020125741A1 (en)Hash collision processing method, apparatus, device, and computer readable storage medium
CN103544077B (en)Data processing method and device, shared storage device
EP3113036B1 (en)Data matching method and apparatus and computer storage medium
US9294390B2 (en)Hash table storage and search methods and devices
US20090132474A1 (en)Method and Apparatus for Optimizing Queries over Vertically Stored Database
CN103973810B (en)The data processing method and device of internet protocol-based IP disks
US20110188503A1 (en)Ethernet Forwarding Database Method
EP3276501B1 (en)Traffic classification method and device, and storage medium
CN100531097C (en)A bridging method and device
US6725216B2 (en)Partitioning search key thereby distributing table across multiple non-contiguous memory segments, memory banks or memory modules
CN102880628A (en)Hash data storage method and device
CN111680489B (en)Target text matching method and device, storage medium and electronic equipment
CN106302172A (en)Support Hash lookup and the storage of route querying, lookup method and device simultaneously
CN112148738B (en)Hash conflict processing method and system
US20140358886A1 (en)Internal search engines architecture
GB2604770A (en)Ontology-based data storage for distributed knowledge bases
WO2019034136A1 (en)Storage and query of entry data
CN105978814A (en)Network device and method for querying data in network device
CN117520216B (en)Address conversion method, computing system and electronic equipment
CN106599091A (en)Storage and indexing method of RDF graph structures stored based on key values
CN118227518A (en)Table entry storage and searching method and device, network equipment and storage medium

Legal Events

DateCodeTitleDescription
C06Publication
PB01Publication
C10Entry into substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant

[8]ページ先頭

©2009-2025 Movatter.jp