CN103001878A - Determination method and device for media access control (MAC) address Hash collision - Google Patents
- ️Wed Mar 27 2013
Info
-
Publication number
- CN103001878A CN103001878A CN2012104853485A CN201210485348A CN103001878A CN 103001878 A CN103001878 A CN 103001878A CN 2012104853485 A CN2012104853485 A CN 2012104853485A CN 201210485348 A CN201210485348 A CN 201210485348A CN 103001878 A CN103001878 A CN 103001878A Authority
- CN
- China Prior art keywords
- hash
- collision
- mac
- key assignments
- address Prior art date
- 2012-11-26 Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title abstract description 21
- 238000010586 diagram Methods 0.000 description 8
- 230000008878 coupling Effects 0.000 description 6
- 238000010168 coupling process Methods 0.000 description 6
- 238000005859 coupling reaction Methods 0.000 description 6
- 230000006870 function Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 2
- 238000000151 deposition Methods 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 238000012163 sequencing technique Methods 0.000 description 1
Images
Landscapes
- Small-Scale Networks (AREA)
Abstract
The invention provides a determination method and device for media access control (MAC) address Hash collision. The method comprises performing N-order Hash on key values, obtaining N Hash values, enabling N to be an integer larger than 2; respectively using M Hash values to search M Hash tables in a one-to-one correspondence mode, obtaining M Hash table items, and enabling M to be smaller than N; using (N-M) Hash values in the N Hash values except the M Hash values to undergo ergodic comparison with the Hash values in the M Hash table items, and searching and/or studying MAC addresses where Hash collision exists. According to an embodiment, by performing multiple-order Hash on the key values, the probability of the Hash collision is effectively reduced, and accordingly occupation of a ternary content addressable memory (TCAM) space is greatly reduced.
Description
Technical field
The present invention relates to field of computer technology, relate in particular to definite method and the device of a kind of media interviews control (MAC) Address-Hash conflict.
Background technology
A position visits record to Hash table (Hash table also cries hash table) in the table by key value is mapped to.This mapping function is called hash function, and the array of put is called Hash table.May obtain same hash address to different keywords, i.e. Key1 ≠ Key2, and f (Key1)=f (Key2), this phenomenon claims hash-collision.The advantage of Hash table lookup method is to search fast, and the memory space utilance is high.Shortcoming is that the time of searching is unfixing, and the conflict time of searching longer more.
MAC (Media Access Control, media interviews control) address is the sign of identifying LAN node, and the whole world is unique.MAC Address is 48, represent with 12 hexadecimal numbers, wherein, front 24 by IEEE (Institute of Electrical and Electronics Engineers, IEEE-USA) distributes, be used for recognition network equipment vendors, consist of OUI (OrganizationalUnique Identifier, organize unique identifier), specified voluntarily by network equipment vendor for rear 24.
In Ethernet, two layers of forwarding need to be to MAC+VSID (Virtual Switching InstanceDoman, the virtual switch instance territory) carrying out forwarding lookup and study searches, because MAC Address has 48, general 16 of VSID, totally 64 of MAC+VSID can not distribute a list item for each address in practice, therefore generally realize by Hash table.
Fig. 1 is that a kind of MAC searches flow chart in the prior art, at first searches Hash table, if there is hash-collision, continues to search conflict solution table; Fig. 2 is that another kind of MAC searches flow chart in the prior art, at first searches conflict solution table, if do not mate, continues to search Hash table.Both differences are the sequencing that Hash table and conflict solution table are searched.The Hash table scheme of a success should be to remove as few as possible to search conflict solution table, minimizing takies conflict solution table place memory, conflict solution table generally is placed among the TCAM (Ternary Content Addressable Memory, three-state content addressing memory).
In the prior art, as long as hash-collision occurs, just list item is write hash-collision solution table, hash-collision is larger, and is more to the TCAM resource occupation, increases the TCAM capacity and can be subject to again the large and high restriction of cost of TCAM power consumption.
Summary of the invention
The embodiment of the invention provides a kind of definite method and device of MAC Address hash-collision, with minimizing hash-collision probability, and then greatly reduces taking the TCAM space.
The embodiment of the invention provides definite method of a kind of media interviews control (MAC) Address-Hash conflict, and the method comprises:
Key assignments is Hash N time, obtains N cryptographic Hash, N is the integer greater than 2;
Use respectively M cryptographic Hash one by one correspondence search M Hash table, obtain M hash table, described M is less than described N;
Use that (N-M) the individual cryptographic Hash except a described M cryptographic Hash and the cryptographic Hash in the described M hash table travel through comparison in the described N cryptographic Hash, search and/or learn to exist the MAC Address of hash-collision.
Preferably, described searching exists the MAC Address of hash-collision to comprise:
If traveled through the clauses and subclauses that rear existence equates, then calculate the MAC table address, search corresponding MAC table, compare with key assignments field and described key assignments in the described MAC table, if the two is equal, then determine to find the MAC Address that has hash-collision.
Preferably, after the key assignments field in the described MAC table of described usefulness and described key assignments compare, also comprise:
If the two is unequal, then determine not exist the MAC Address of hash-collision.
Preferably, described study exists the MAC Address of hash-collision to comprise:
If traveled through the clauses and subclauses that rear existence equates, then determine to exist hash-collision, this key assignments is learnt in the conflict solution table;
If there are not equal clauses and subclauses after having traveled through, then calculate the idle entry number in the described M hash table, if the idle entry number in the described M hash table is zero, then this key assignments is learnt in the described conflict solution table; If the idle entry number in the described M hash table not all is zero, then search and whether exist cryptographic Hash to equal the clauses and subclauses of arbitrary cryptographic Hash in described (N-M) individual cryptographic Hash in hash-collision table corresponding to the non-vanishing hash table of idle entry number, if exist, then this key assignments is learnt in the described conflict solution table, if there is no, judge then whether the conflict list item is full in this hash-collision table, if full, then this key assignments learnt in the described conflict solution table.
Preferably, described judge in this hash-collision table that the conflict list item is whether full after, also comprise:
If less than, then described (N-M) individual cryptographic Hash is write in the described hash-collision table, calculate the MAC table address, this key assignments is learnt in the described MAC table.
The embodiment of the invention also provides definite device of a kind of media interviews control (MAC) Address-Hash conflict, is applied in the network processing unit, and this device comprises:
The Hash module is used for key assignments is Hash N time, obtains N cryptographic Hash, and N is the integer greater than 2;
Search module, be used for using respectively M cryptographic Hash one by one correspondence search M Hash table, obtain M hash table, described M is less than described N;
Processing module travels through comparison for (N-M) individual cryptographic Hash of using a described N cryptographic Hash except a described M cryptographic Hash and the cryptographic Hash in the described M hash table, searches and/or learn to exist the MAC Address of hash-collision.
Preferably, described processing module specifically is used for: if traveled through the clauses and subclauses that rear existence equates, then calculate the MAC table address, search corresponding MAC table, compare with key assignments field and described key assignments in the described MAC table, if the two equates, then determines to find the MAC Address that has hash-collision.
Preferably, described processing module also is used for: if the two is unequal, then determine not exist the MAC Address of hash-collision.
Preferably, described processing module specifically is used for:
If traveled through the clauses and subclauses that rear existence equates, then determine to exist hash-collision, this key assignments is learnt in the conflict solution table;
If there are not equal clauses and subclauses after having traveled through, then calculate the idle entry number in the described M hash table, if the idle entry number in the described M hash table is zero, then this key assignments is learnt in the described conflict solution table; If the idle entry number in the described M hash table not all is zero, then search and whether exist cryptographic Hash to equal the clauses and subclauses of arbitrary cryptographic Hash in described (N-M) individual cryptographic Hash in hash-collision table corresponding to the non-vanishing hash table of idle entry number, if exist, then this key assignments is learnt in the described conflict solution table, if there is no, judge then whether the conflict list item is full in this hash-collision table, if full, then this key assignments learnt in the described conflict solution table.
Preferably, described processing module also is used for: if less than, then described (N-M) individual cryptographic Hash is write in the described hash-collision table, calculate the MAC table address, this key assignments is learnt in the described MAC table.
The embodiment of the invention effectively reduces the probability of hash-collision by key assignments being done repeatedly Hash, thereby greatly reduces taking the TCAM space.
Description of drawings
Fig. 1 is that a kind of MAC of the prior art searches flow chart;
Fig. 2 is that another kind of MAC of the prior art searches flow chart;
Fig. 3 is the schematic diagram of used in the present invention couple of Hash lookup table embodiment;
List item Relations Among schematic diagram when Fig. 4 is the two Hash lookup of the embodiment of the invention;
Fig. 5 is the flow chart of the two Hash lookup processes of the embodiment of the invention;
Hash-collision schematic diagram when Fig. 6 is embodiment of the invention mac learning;
Fig. 7 is Hash collision table schematic diagram in the embodiment of the invention mac learning;
Fig. 8 is the flow chart of embodiment of the invention mac learning process;
Fig. 9 is the structural representation of definite device of embodiment of the invention MAC Address hash-collision.
Embodiment
For making the purpose, technical solutions and advantages of the present invention clearer, hereinafter in connection with accompanying drawing embodiments of the invention are elaborated.Need to prove that in the situation of not conflicting, the embodiment among the application and the feature among the embodiment be combination in any mutually.
Hash-collision in the embodiment of the invention mainly is present in following two kinds of situations:
When 1) MAC searches, find key value and not yet learn in the list item, but and learn to have produced hash-collision into the key assignments of list item, find same MAC table list item, at this moment, need to finding key value and showing that the Compare field compares among the result, judge whether it is this corresponding list item that finds key value;
2) hash-collision during mac learning.
For above-mentioned two kinds of hash-collisions, the embodiment of the invention provides definite method of a kind of media interviews control (MAC) Address-Hash conflict, and the method comprises:
Key assignments is Hash N time, obtains N cryptographic Hash, N is the integer greater than 2;
Use respectively M cryptographic Hash one by one correspondence search M Hash table, obtain M hash table, described M is less than described N;
Use that (N-M) the individual cryptographic Hash except a described M cryptographic Hash and the cryptographic Hash in the described M hash table travel through comparison in the described N cryptographic Hash, search and/or learn to exist the MAC Address of hash-collision.
Above-mentioned M is preferably N-1, and for example N is that 3, M is 2, and certainly, N can also be 3 for 4, M, and in addition, M can also be 2, etc.
Wherein, the hash-collision when searching for MAC, adopt following processing scheme:
As shown in Figure 3, be the schematic diagram of used in the present invention couple of Hash lookup table embodiment, can learn the list item definition of two Hash lookup tables by this figure:
Hash table is defined as n Hash list item (List), and each Hash List (be called for short HL) comprises m Hash clauses and subclauses, and whether valid bit representation clauses and subclauses are effective, and the Hash field is that key assignments is done cryptographic Hash behind the Hash.
MAC table capacity is n*m list item, each list item comprises two parts, Compare (being called for short Comp) field is original key assignments, judge hash-collision when being used for searching, the reason that this hash-collision produces is: the key assignments when searching is not yet learnt in the list item, but and learn to have produced hash-collision into the key assignments of list item, find same MAC table list item, at this moment, need to finding key value and showing that the Compare field compares among the result, judge whether it is this corresponding list item that finds key value.MAC result (MAC Result) is used for depositing the MAC forwarding information.
As shown in Figure 4, list item Relations Among schematic diagram in this embodiment, is done Hash three times to key assignments when being the two Hash lookup of the embodiment of the invention, produces three cryptographic Hash: HashA, HashB, HashC; Search respectively Hash table A, Hash table B with HashA, HashB, lookup result is Hash entry A, Hash entry B, i.e. the described Hash List of Fig. 3; Then with the hash value among HashC and Hash List A, the Hash ListB relatively, if do not find equal clauses and subclauses, then do not match clauses and subclauses in the two Hash lookups of expression; If find equal clauses and subclauses, continue to search the MAC table, with the Compare field in the MAC table and the comparison that finds key value, if equate, expression finds the coupling clauses and subclauses; If unequal, expression does not find the coupling clauses and subclauses.
As shown in Figure 5, be the flow chart of the two Hash lookup processes of the embodiment of the invention, this process comprises:
101, do Hash three times to finding key value, obtain three cryptographic Hash: HashA, HashB, HashC;
102, search Hash table A, Hash table B with HashA, HashB correspondence, obtain Hash entry Hash List A and Hash List B;
103, relatively (travel through first Hash List A with the hash value among HashC and Hash List A, Hash List B traversal, if without occurrence, travel through again Hash List B), if do not have equal clauses and subclauses after having traveled through all clauses and subclauses, then the two Hash tables of expression do not match clauses and subclauses;
If there be clauses and subclauses and the
valid position1 that equates in
step104, the address that record matching list item HashList is corresponding is RamAddr, and skew corresponding to coupling clauses and subclauses is index among the record HashList;
105, calculating MAC table address: RamAddr*m+index search the MAC table;
106, with the Compare field in the MAC table with find key value comparison, if equate, expression finds the coupling clauses and subclauses; If unequal, expression does not find the coupling clauses and subclauses.
Wherein, the hash-collision during for mac learning, adopt following processing scheme:
As shown in Figure 6, the hash-collision schematic diagram when being embodiment of the invention mac learning, among this embodiment, Key1 is through twice Hash, respectively Hash List j among Hash List i and the Hash table B among the corresponding Hash table A; According to preferentially writing many this principles of Hash table of idle clauses and subclauses, suppose the idle clauses and subclauses of Hash Listj of Hash table B at this moment more than the Hash List i of Hash table A, so Key1 writes the Hash Listj of Hash table B;
During study Key2, Key2 is done Hash twice, Hash List k among Hash List i and the Hash table B among the corresponding Hash table A of difference, namely the HashA value of Key2 and Key1 is identical, has produced hash-collision; Suppose that the idle clauses and subclauses of Hash List i of Hash table A at this moment are more than the Hash List k of Hash table B, therefore Key2 writes the Hash List i of Hash table A, if at this moment the HashC value of Key2 and Key1 is identical, produced hash-collision, because Key1 writes the Hash List i of Hash table A, Key1 can match these clauses and subclauses among the Hash List i of Hash table A when searching, cause the mistake coupling.
The condition that this hash-collision exists is: the HashA of Key1 and Key2, HashB have one to produce hash-collision (such as the HashA among Fig. 6), the key assignments of rear interpolation will write in the Hash table that produces hash-collision (the Hash table A in showing such as Fig. 6), and HashC produces hash-collision.
In order to solve this hash-collision, define a hash-collision table.
As shown in Figure 7, it is Hash collision table schematic diagram in the embodiment of the invention mac learning, the hash-collision table definition is n conflict list item (Collision List, CL), each Collision List list item comprises k Hash clauses and subclauses (the hash-collision degree of depth is k), and whether valid bit representation clauses and subclauses are effective.
As shown in Figure 8, be the flow chart of embodiment of the invention mac learning process, this process comprises:
201, key assignments is done Hash three times, obtain three cryptographic Hash: HashA, HashB, HashC;
202, search Hash table A, Hash table B with HashA, HashB, obtain Hash List A, Hash List B;
203, with the hash value among HashC and Hash List A, Hash List B traversal relatively (travel through first Hash List A, if without occurrence, travel through again Hash List B).If occurrence is arranged, and
valid position1, there is hash-collision in expression, and this key assignments is learnt conflict solution table;
204, the clauses and subclauses that if there is no equate are calculated idle entry number among Hash table A and the Hash table B list item HashList, and recording the many hash table addresses of idle entry number is RamAddr, and another hash table address is designated as RamAddrOther; If there are not idle clauses and subclauses in Hash table A and Hash table B list item HashList, this key assignments is learnt conflict solution table;
If there are idle clauses and subclauses in
step205 Hash table A or Hash table B list item HashList, search hash-collision table (Collision Table, CT), whether exist the hash value to equal the clauses and subclauses of HashC and valid=1 in the traversal conflict list item (Collision List), if exist, this key assignments is learnt conflict solution table;
If do not exist the hash value to equal the clauses and subclauses of HashC and valid=1 among
step206 hash-collision table (CollisionTable) the Collision List, judge whether Collision List is full, if CollisionList is full, this key assignments is learnt conflict solution table;
If
step207 Collision List less than, HashC is write Hash table; Writing address is RamAddr+index;
HashTable[RamAddr][index].hash=HashC
HashTable[RamAddr][index].valid=1
If
step208 Collision List less than, HashC is write the hash-collision table, judge conflict when being used for new key assignments study; Writing address is RamAddrOther+index;
CollisionTabel[RamAddrOther][index].hash=HashC
CollisionTabel[RamAddrOther][index].valid=1
209, this key assignments is learnt MAC table, writing address is RamAddr*m+index.
The embodiment of the invention effectively reduces the probability of hash-collision by key assignments being done repeatedly Hash, thereby greatly reduces taking the TCAM space.
As shown in Figure 9, be the structural representation of definite device of embodiment of the invention MAC Address hash-collision, this determines application of installation in network processing unit, this device comprises Hash module 11,
searches module12 and
processing module13, wherein:
The Hash module is used for key assignments is Hash N time, obtains N cryptographic Hash, and N is the integer greater than 2;
Search module, be used for using respectively M cryptographic Hash one by one correspondence search M Hash table, obtain M hash table, described M is less than described N;
Processing module travels through comparison for (N-M) individual cryptographic Hash of using a described N cryptographic Hash except a described M cryptographic Hash and the cryptographic Hash in the described M hash table, searches and/or learn to exist the MAC Address of hash-collision.
Wherein, described processing module specifically is used for: if traveled through the clauses and subclauses that rear existence equates, then calculate the MAC table address, search corresponding MAC table, compare with key assignments field and described key assignments in the described MAC table, if the two equates, then determines to find the MAC Address that has hash-collision.In addition, described processing module also is used for: if the two is unequal, then determine not exist the MAC Address of hash-collision.Concrete processing procedure can be referring to Fig. 5.
Similarly, described processing module specifically is used for: if traveled through the clauses and subclauses that rear existence equates, then determine to exist hash-collision, this key assignments is learnt in the conflict solution table; If there are not equal clauses and subclauses after having traveled through, then calculate the idle entry number in the described M hash table, if the idle entry number in the described M hash table is zero, then this key assignments is learnt in the described conflict solution table; If the idle entry number in the described M hash table not all is zero, then search and whether exist cryptographic Hash to equal the clauses and subclauses of arbitrary cryptographic Hash in described (N-M) individual cryptographic Hash in hash-collision table corresponding to the non-vanishing hash table of idle entry number, if exist, then this key assignments is learnt in the described conflict solution table, if there is no, judge then whether the conflict list item is full in this hash-collision table, if full, then this key assignments learnt in the described conflict solution table.In addition, described processing module also is used for: if less than, then described (N-M) individual cryptographic Hash is write in the described hash-collision table, calculate the MAC table address, this key assignments is learnt in the described MAC table.Concrete processing procedure can be referring to Fig. 8.
Above-mentioned definite device can effectively reduce the probability of hash-collision by key assignments being done repeatedly Hash, thereby greatly reduces taking the TCAM space.
One of ordinary skill in the art will appreciate that all or part of step in the said method can come the instruction related hardware to finish by program, said procedure can be stored in the computer-readable recording medium, such as read-only memory, disk or CD etc.Alternatively, all or part of step of above-described embodiment also can realize with one or more integrated circuits.Correspondingly, each the module/unit in above-described embodiment can adopt the form of hardware to realize, also can adopt the form of software function module to realize.The present invention is not restricted to the combination of the hardware and software of any particular form.
Above embodiment is only unrestricted in order to technical scheme of the present invention to be described, only with reference to preferred embodiment the present invention is had been described in detail.Those of ordinary skill in the art should be appreciated that and can make amendment or be equal to replacement technical scheme of the present invention, and do not break away from the spirit and scope of technical solution of the present invention, all should be encompassed in the middle of the claim scope of the present invention.
Claims (10)
1. definite method that (MAC) Address-Hash conflicts is controlled in media interviews, it is characterized in that the method comprises:
Key assignments is Hash N time, obtains N cryptographic Hash, N is the integer greater than 2;
Use respectively M cryptographic Hash one by one correspondence search M Hash table, obtain M hash table, described M is less than described N;
Use that (N-M) the individual cryptographic Hash except a described M cryptographic Hash and the cryptographic Hash in the described M hash table travel through comparison in the described N cryptographic Hash, search and/or learn to exist the MAC Address of hash-collision.
2. method according to claim 1 is characterized in that:
Described searching exists the MAC Address of hash-collision to comprise:
If traveled through the clauses and subclauses that rear existence equates, then calculate the MAC table address, search corresponding MAC table, compare with key assignments field and described key assignments in the described MAC table, if the two is equal, then determine to find the MAC Address that has hash-collision.
3. method according to claim 2 is characterized in that:
After key assignments field in the described MAC table of described usefulness and described key assignments compare, also comprise:
If the two is unequal, then determine not exist the MAC Address of hash-collision.
4. method according to claim 1 is characterized in that:
Described study exists the MAC Address of hash-collision to comprise:
If traveled through the clauses and subclauses that rear existence equates, then determine to exist hash-collision, this key assignments is learnt in the conflict solution table;
If there are not equal clauses and subclauses after having traveled through, then calculate the idle entry number in the described M hash table, if the idle entry number in the described M hash table is zero, then this key assignments is learnt in the described conflict solution table; If the idle entry number in the described M hash table not all is zero, then search and whether exist cryptographic Hash to equal the clauses and subclauses of arbitrary cryptographic Hash in described (N-M) individual cryptographic Hash in hash-collision table corresponding to the non-vanishing hash table of idle entry number, if exist, then this key assignments is learnt in the described conflict solution table, if there is no, judge then whether the conflict list item is full in this hash-collision table, if full, then this key assignments learnt in the described conflict solution table.
5. method according to claim 4 is characterized in that:
Described judge in this hash-collision table that the conflict list item is whether full after, also comprise:
If less than, then described (N-M) individual cryptographic Hash is write in the described hash-collision table, calculate the MAC table address, this key assignments is learnt in the described MAC table.
6. definite device that (MAC) Address-Hash conflicts is controlled in media interviews, it is characterized in that be applied in the network processing unit, this device comprises:
The Hash module is used for key assignments is Hash N time, obtains N cryptographic Hash, and N is the integer greater than 2;
Search module, be used for using respectively M cryptographic Hash one by one correspondence search M Hash table, obtain M hash table, described M is less than described N;
Processing module travels through comparison for (N-M) individual cryptographic Hash of using a described N cryptographic Hash except a described M cryptographic Hash and the cryptographic Hash in the described M hash table, searches and/or learn to exist the MAC Address of hash-collision.
7. device according to claim 6 is characterized in that:
Described processing module specifically is used for: if traveled through the clauses and subclauses that rear existence equates, then calculate the MAC table address, search corresponding MAC table, compare with key assignments field and described key assignments in the described MAC table, if the two is equal, then determine to find the MAC Address that has hash-collision.
8. device according to claim 7 is characterized in that:
Described processing module also is used for: if the two is unequal, then determine not exist the MAC Address of hash-collision.
9. device according to claim 6 is characterized in that:
Described processing module specifically is used for:
If traveled through the clauses and subclauses that rear existence equates, then determine to exist hash-collision, this key assignments is learnt in the conflict solution table;
If there are not equal clauses and subclauses after having traveled through, then calculate the idle entry number in the described M hash table, if the idle entry number in the described M hash table is zero, then this key assignments is learnt in the described conflict solution table; If the idle entry number in the described M hash table not all is zero, then search and whether exist cryptographic Hash to equal the clauses and subclauses of arbitrary cryptographic Hash in described (N-M) individual cryptographic Hash in hash-collision table corresponding to the non-vanishing hash table of idle entry number, if exist, then this key assignments is learnt in the described conflict solution table, if there is no, judge then whether the conflict list item is full in this hash-collision table, if full, then this key assignments learnt in the described conflict solution table.
10. device according to claim 9 is characterized in that:
Described processing module also is used for: if less than, then described (N-M) individual cryptographic Hash is write in the described hash-collision table, calculate the MAC table address, this key assignments is learnt in the described MAC table.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210485348.5A CN103001878B (en) | 2012-11-26 | 2012-11-26 | The determination method and device of MAC Address hash-collision |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210485348.5A CN103001878B (en) | 2012-11-26 | 2012-11-26 | The determination method and device of MAC Address hash-collision |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103001878A true CN103001878A (en) | 2013-03-27 |
CN103001878B CN103001878B (en) | 2018-02-16 |
Family
ID=47930031
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210485348.5A Active CN103001878B (en) | 2012-11-26 | 2012-11-26 | The determination method and device of MAC Address hash-collision |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103001878B (en) |
Cited By (11)
* Cited by examiner, † Cited by third partyPublication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103581024A (en) * | 2013-11-21 | 2014-02-12 | 盛科网络(苏州)有限公司 | Learning method and device combining MAC address hardware and software |
CN104079489A (en) * | 2013-03-28 | 2014-10-01 | 日立金属株式会社 | Network relay device |
WO2016082367A1 (en) * | 2014-11-25 | 2016-06-02 | 中兴通讯股份有限公司 | Method and device for realizing hardware table traversal based on network processor |
CN105955971A (en) * | 2015-11-30 | 2016-09-21 | 中国银联股份有限公司 | Key value buffer memory implementation method and device |
CN106095770A (en) * | 2016-05-05 | 2016-11-09 | 邦彦技术股份有限公司 | Data quick searching device, searching method, adding method and deleting method |
CN108664518A (en) * | 2017-03-31 | 2018-10-16 | 深圳市中兴微电子技术有限公司 | A kind of method and device for realizing processing of tabling look-up |
CN108848034A (en) * | 2018-07-17 | 2018-11-20 | 新华三技术有限公司 | A kind of network equipment and list item learning method |
CN112637379A (en) * | 2020-12-25 | 2021-04-09 | 北京天融信网络安全技术有限公司 | mac address hash operation method, device, equipment and storage medium |
CN114422478A (en) * | 2021-12-21 | 2022-04-29 | 福建星网智慧科技有限公司 | Method for mapping GEMPORT ID and MAC address and storage device |
CN115576954A (en) * | 2022-11-24 | 2023-01-06 | 恒生电子股份有限公司 | Hash table determining method and device |
WO2024197825A1 (en) * | 2023-03-31 | 2024-10-03 | 新华三技术有限公司 | Storing mac address table entries |
Citations (11)
* Cited by examiner, † Cited by third partyPublication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6697873B1 (en) * | 1999-12-20 | 2004-02-24 | Zarlink Semiconductor V.N., Inc. | High speed MAC address search engine |
CN1932818A (en) * | 2006-09-20 | 2007-03-21 | 华为技术有限公司 | Data bank system and method for controlling data bank data |
CN101140592A (en) * | 2007-09-30 | 2008-03-12 | 华为技术有限公司 | Keywords storing and researching method and apparatus |
CN101232444A (en) * | 2008-01-22 | 2008-07-30 | 杭州华三通信技术有限公司 | Apparatus and method for solving hash collision and exchange equipment with the same |
CN101692651A (en) * | 2009-09-27 | 2010-04-07 | 中兴通讯股份有限公司 | Method and device for Hash lookup table |
CN102073733A (en) * | 2011-01-19 | 2011-05-25 | 中兴通讯股份有限公司 | Method and device for managing Hash table |
CN102232219A (en) * | 2010-01-26 | 2011-11-02 | 华为技术有限公司 | Method and device for storing and searching keyword |
CN102346735A (en) * | 2010-07-29 | 2012-02-08 | 高通创锐讯通讯科技(上海)有限公司 | Hash search method capable of reducing hash collision |
CN102682116A (en) * | 2012-05-14 | 2012-09-19 | 中兴通讯股份有限公司 | Method and device for processing table items based on Hash table |
CN102710813A (en) * | 2012-06-21 | 2012-10-03 | 杭州华三通信技术有限公司 | MAC address table entry access method and equipment |
CN102724106A (en) * | 2011-03-30 | 2012-10-10 | 华为技术有限公司 | Learning method for MAC addresses, network side equipment, and system |
-
2012
- 2012-11-26 CN CN201210485348.5A patent/CN103001878B/en active Active
Patent Citations (11)
* Cited by examiner, † Cited by third partyPublication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6697873B1 (en) * | 1999-12-20 | 2004-02-24 | Zarlink Semiconductor V.N., Inc. | High speed MAC address search engine |
CN1932818A (en) * | 2006-09-20 | 2007-03-21 | 华为技术有限公司 | Data bank system and method for controlling data bank data |
CN101140592A (en) * | 2007-09-30 | 2008-03-12 | 华为技术有限公司 | Keywords storing and researching method and apparatus |
CN101232444A (en) * | 2008-01-22 | 2008-07-30 | 杭州华三通信技术有限公司 | Apparatus and method for solving hash collision and exchange equipment with the same |
CN101692651A (en) * | 2009-09-27 | 2010-04-07 | 中兴通讯股份有限公司 | Method and device for Hash lookup table |
CN102232219A (en) * | 2010-01-26 | 2011-11-02 | 华为技术有限公司 | Method and device for storing and searching keyword |
CN102346735A (en) * | 2010-07-29 | 2012-02-08 | 高通创锐讯通讯科技(上海)有限公司 | Hash search method capable of reducing hash collision |
CN102073733A (en) * | 2011-01-19 | 2011-05-25 | 中兴通讯股份有限公司 | Method and device for managing Hash table |
CN102724106A (en) * | 2011-03-30 | 2012-10-10 | 华为技术有限公司 | Learning method for MAC addresses, network side equipment, and system |
CN102682116A (en) * | 2012-05-14 | 2012-09-19 | 中兴通讯股份有限公司 | Method and device for processing table items based on Hash table |
CN102710813A (en) * | 2012-06-21 | 2012-10-03 | 杭州华三通信技术有限公司 | MAC address table entry access method and equipment |
Cited By (20)
* Cited by examiner, † Cited by third partyPublication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104079489B (en) * | 2013-03-28 | 2018-08-28 | 日立金属株式会社 | Network repeater |
CN104079489A (en) * | 2013-03-28 | 2014-10-01 | 日立金属株式会社 | Network relay device |
CN103581024A (en) * | 2013-11-21 | 2014-02-12 | 盛科网络(苏州)有限公司 | Learning method and device combining MAC address hardware and software |
WO2016082367A1 (en) * | 2014-11-25 | 2016-06-02 | 中兴通讯股份有限公司 | Method and device for realizing hardware table traversal based on network processor |
CN105700859A (en) * | 2014-11-25 | 2016-06-22 | 中兴通讯股份有限公司 | Network-processor-based hardware table traversal method and apparatus |
CN105955971A (en) * | 2015-11-30 | 2016-09-21 | 中国银联股份有限公司 | Key value buffer memory implementation method and device |
CN105955971B (en) * | 2015-11-30 | 2019-09-17 | 中国银联股份有限公司 | A kind of implementation method and device of key assignments caching |
CN106095770A (en) * | 2016-05-05 | 2016-11-09 | 邦彦技术股份有限公司 | Data quick searching device, searching method, adding method and deleting method |
WO2017190409A1 (en) * | 2016-05-05 | 2017-11-09 | 邦彦技术股份有限公司 | Quick data search method, search method, adding method and deletion method |
CN106095770B (en) * | 2016-05-05 | 2019-10-11 | 邦彦技术股份有限公司 | Data quick searching device, searching method, adding method and deleting method |
CN108664518A (en) * | 2017-03-31 | 2018-10-16 | 深圳市中兴微电子技术有限公司 | A kind of method and device for realizing processing of tabling look-up |
CN108664518B (en) * | 2017-03-31 | 2021-12-07 | 深圳市中兴微电子技术有限公司 | Method and device for realizing table look-up processing |
CN108848034A (en) * | 2018-07-17 | 2018-11-20 | 新华三技术有限公司 | A kind of network equipment and list item learning method |
CN108848034B (en) * | 2018-07-17 | 2021-04-27 | 新华三技术有限公司 | Network equipment and table entry learning method |
CN112637379A (en) * | 2020-12-25 | 2021-04-09 | 北京天融信网络安全技术有限公司 | mac address hash operation method, device, equipment and storage medium |
CN112637379B (en) * | 2020-12-25 | 2022-11-15 | 北京天融信网络安全技术有限公司 | mac address hash operation method, device, equipment and storage medium |
CN114422478A (en) * | 2021-12-21 | 2022-04-29 | 福建星网智慧科技有限公司 | Method for mapping GEMPORT ID and MAC address and storage device |
CN115576954A (en) * | 2022-11-24 | 2023-01-06 | 恒生电子股份有限公司 | Hash table determining method and device |
CN115576954B (en) * | 2022-11-24 | 2023-04-07 | 恒生电子股份有限公司 | Hash table determining method and device |
WO2024197825A1 (en) * | 2023-03-31 | 2024-10-03 | 新华三技术有限公司 | Storing mac address table entries |
Also Published As
Publication number | Publication date |
---|---|
CN103001878B (en) | 2018-02-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103001878A (en) | 2013-03-27 | Determination method and device for media access control (MAC) address Hash collision |
US11102120B2 (en) | 2021-08-24 | Storing keys with variable sizes in a multi-bank database |
WO2020125741A1 (en) | 2020-06-25 | Hash collision processing method, apparatus, device, and computer readable storage medium |
US7987179B2 (en) | 2011-07-26 | Method and apparatus for optimizing queries over vertically stored database |
EP3113036B1 (en) | 2019-02-20 | Data matching method and apparatus and computer storage medium |
CN100531097C (en) | 2009-08-19 | A bridging method and device |
US20120246163A1 (en) | 2012-09-27 | Hash table storage and search methods and devices |
WO2014012390A1 (en) | 2014-01-23 | Data processing method and apparatus, and shared storage device |
CN102880628A (en) | 2013-01-16 | Hash data storage method and device |
US20180107759A1 (en) | 2018-04-19 | Flow classification method and device and storage medium |
CN106302172A (en) | 2017-01-04 | Support Hash lookup and the storage of route querying, lookup method and device simultaneously |
US20140358886A1 (en) | 2014-12-04 | Internal search engines architecture |
CN106789859B (en) | 2021-06-04 | Message matching method and device |
WO2019034136A1 (en) | 2019-02-21 | Storage and query of entry data |
CN111680489A (en) | 2020-09-18 | Target text matching method and device, storage medium and electronic equipment |
GB2604770A (en) | 2022-09-14 | Ontology-based data storage for distributed knowledge bases |
CN106599091A (en) | 2017-04-26 | Storage and indexing method of RDF graph structures stored based on key values |
US8407255B1 (en) | 2013-03-26 | Method and apparatus for exploiting master-detail data relationships to enhance searching operations |
WO2015043254A1 (en) | 2015-04-02 | Method and apparatus for searching for packet classification rule |
CN112148738B (en) | 2024-06-11 | Hash conflict processing method and system |
CN102904812B (en) | 2015-07-29 | The storage means of route table items, lookup method, Apparatus and system |
CN118227518A (en) | 2024-06-21 | Table entry storage and searching method and device, network equipment and storage medium |
CN106021339A (en) | 2016-10-12 | A semantic query method and system for a resource tree |
US20090262740A1 (en) | 2009-10-22 | Transmission Information Transfer Apparatus and Method Thereof |
CN112818185A (en) | 2021-05-18 | Method for searching longest prefix matching hardware system based on SRAM |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
2013-03-27 | C06 | Publication | |
2013-03-27 | PB01 | Publication | |
2015-01-21 | C10 | Entry into substantive examination | |
2015-01-21 | SE01 | Entry into force of request for substantive examination | |
2018-02-16 | GR01 | Patent grant | |
2018-02-16 | GR01 | Patent grant |