patents.google.com

CN103001878A - Determination method and device for media access control (MAC) address Hash collision - Google Patents

  • ️Wed Mar 27 2013
Determination method and device for media access control (MAC) address Hash collision Download PDF

Info

Publication number
CN103001878A
CN103001878A CN2012104853485A CN201210485348A CN103001878A CN 103001878 A CN103001878 A CN 103001878A CN 2012104853485 A CN2012104853485 A CN 2012104853485A CN 201210485348 A CN201210485348 A CN 201210485348A CN 103001878 A CN103001878 A CN 103001878A Authority
CN
China
Prior art keywords
hash
collision
mac
key assignments
address
Prior art date
2012-11-26
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012104853485A
Other languages
Chinese (zh)
Other versions
CN103001878B (en
Inventor
谢密
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
2012-11-26
Filing date
2012-11-26
Publication date
2013-03-27
2012-11-26 Application filed by ZTE Corp filed Critical ZTE Corp
2012-11-26 Priority to CN201210485348.5A priority Critical patent/CN103001878B/en
2013-03-27 Publication of CN103001878A publication Critical patent/CN103001878A/en
2018-02-16 Application granted granted Critical
2018-02-16 Publication of CN103001878B publication Critical patent/CN103001878B/en
Status Active legal-status Critical Current
2032-11-26 Anticipated expiration legal-status Critical

Links

  • 238000000034 method Methods 0.000 title abstract description 21
  • 238000010586 diagram Methods 0.000 description 8
  • 230000008878 coupling Effects 0.000 description 6
  • 238000010168 coupling process Methods 0.000 description 6
  • 238000005859 coupling reaction Methods 0.000 description 6
  • 230000006870 function Effects 0.000 description 3
  • 238000005516 engineering process Methods 0.000 description 2
  • 238000000151 deposition Methods 0.000 description 1
  • 238000009434 installation Methods 0.000 description 1
  • 238000013507 mapping Methods 0.000 description 1
  • 238000012163 sequencing technique Methods 0.000 description 1

Images

Landscapes

  • Small-Scale Networks (AREA)

Abstract

The invention provides a determination method and device for media access control (MAC) address Hash collision. The method comprises performing N-order Hash on key values, obtaining N Hash values, enabling N to be an integer larger than 2; respectively using M Hash values to search M Hash tables in a one-to-one correspondence mode, obtaining M Hash table items, and enabling M to be smaller than N; using (N-M) Hash values in the N Hash values except the M Hash values to undergo ergodic comparison with the Hash values in the M Hash table items, and searching and/or studying MAC addresses where Hash collision exists. According to an embodiment, by performing multiple-order Hash on the key values, the probability of the Hash collision is effectively reduced, and accordingly occupation of a ternary content addressable memory (TCAM) space is greatly reduced.

Description

Definite method and the device of MAC Address hash-collision

Technical field

The present invention relates to field of computer technology, relate in particular to definite method and the device of a kind of media interviews control (MAC) Address-Hash conflict.

Background technology

A position visits record to Hash table (Hash table also cries hash table) in the table by key value is mapped to.This mapping function is called hash function, and the array of put is called Hash table.May obtain same hash address to different keywords, i.e. Key1 ≠ Key2, and f (Key1)=f (Key2), this phenomenon claims hash-collision.The advantage of Hash table lookup method is to search fast, and the memory space utilance is high.Shortcoming is that the time of searching is unfixing, and the conflict time of searching longer more.

MAC (Media Access Control, media interviews control) address is the sign of identifying LAN node, and the whole world is unique.MAC Address is 48, represent with 12 hexadecimal numbers, wherein, front 24 by IEEE (Institute of Electrical and Electronics Engineers, IEEE-USA) distributes, be used for recognition network equipment vendors, consist of OUI (OrganizationalUnique Identifier, organize unique identifier), specified voluntarily by network equipment vendor for rear 24.

In Ethernet, two layers of forwarding need to be to MAC+VSID (Virtual Switching InstanceDoman, the virtual switch instance territory) carrying out forwarding lookup and study searches, because MAC Address has 48, general 16 of VSID, totally 64 of MAC+VSID can not distribute a list item for each address in practice, therefore generally realize by Hash table.

Fig. 1 is that a kind of MAC searches flow chart in the prior art, at first searches Hash table, if there is hash-collision, continues to search conflict solution table; Fig. 2 is that another kind of MAC searches flow chart in the prior art, at first searches conflict solution table, if do not mate, continues to search Hash table.Both differences are the sequencing that Hash table and conflict solution table are searched.The Hash table scheme of a success should be to remove as few as possible to search conflict solution table, minimizing takies conflict solution table place memory, conflict solution table generally is placed among the TCAM (Ternary Content Addressable Memory, three-state content addressing memory).

In the prior art, as long as hash-collision occurs, just list item is write hash-collision solution table, hash-collision is larger, and is more to the TCAM resource occupation, increases the TCAM capacity and can be subject to again the large and high restriction of cost of TCAM power consumption.

Summary of the invention

The embodiment of the invention provides a kind of definite method and device of MAC Address hash-collision, with minimizing hash-collision probability, and then greatly reduces taking the TCAM space.

The embodiment of the invention provides definite method of a kind of media interviews control (MAC) Address-Hash conflict, and the method comprises:

Key assignments is Hash N time, obtains N cryptographic Hash, N is the integer greater than 2;

Use respectively M cryptographic Hash one by one correspondence search M Hash table, obtain M hash table, described M is less than described N;

Use that (N-M) the individual cryptographic Hash except a described M cryptographic Hash and the cryptographic Hash in the described M hash table travel through comparison in the described N cryptographic Hash, search and/or learn to exist the MAC Address of hash-collision.

Preferably, described searching exists the MAC Address of hash-collision to comprise:

If traveled through the clauses and subclauses that rear existence equates, then calculate the MAC table address, search corresponding MAC table, compare with key assignments field and described key assignments in the described MAC table, if the two is equal, then determine to find the MAC Address that has hash-collision.

Preferably, after the key assignments field in the described MAC table of described usefulness and described key assignments compare, also comprise:

If the two is unequal, then determine not exist the MAC Address of hash-collision.

Preferably, described study exists the MAC Address of hash-collision to comprise:

If traveled through the clauses and subclauses that rear existence equates, then determine to exist hash-collision, this key assignments is learnt in the conflict solution table;

If there are not equal clauses and subclauses after having traveled through, then calculate the idle entry number in the described M hash table, if the idle entry number in the described M hash table is zero, then this key assignments is learnt in the described conflict solution table; If the idle entry number in the described M hash table not all is zero, then search and whether exist cryptographic Hash to equal the clauses and subclauses of arbitrary cryptographic Hash in described (N-M) individual cryptographic Hash in hash-collision table corresponding to the non-vanishing hash table of idle entry number, if exist, then this key assignments is learnt in the described conflict solution table, if there is no, judge then whether the conflict list item is full in this hash-collision table, if full, then this key assignments learnt in the described conflict solution table.

Preferably, described judge in this hash-collision table that the conflict list item is whether full after, also comprise:

If less than, then described (N-M) individual cryptographic Hash is write in the described hash-collision table, calculate the MAC table address, this key assignments is learnt in the described MAC table.

The embodiment of the invention also provides definite device of a kind of media interviews control (MAC) Address-Hash conflict, is applied in the network processing unit, and this device comprises:

The Hash module is used for key assignments is Hash N time, obtains N cryptographic Hash, and N is the integer greater than 2;

Search module, be used for using respectively M cryptographic Hash one by one correspondence search M Hash table, obtain M hash table, described M is less than described N;

Processing module travels through comparison for (N-M) individual cryptographic Hash of using a described N cryptographic Hash except a described M cryptographic Hash and the cryptographic Hash in the described M hash table, searches and/or learn to exist the MAC Address of hash-collision.

Preferably, described processing module specifically is used for: if traveled through the clauses and subclauses that rear existence equates, then calculate the MAC table address, search corresponding MAC table, compare with key assignments field and described key assignments in the described MAC table, if the two equates, then determines to find the MAC Address that has hash-collision.

Preferably, described processing module also is used for: if the two is unequal, then determine not exist the MAC Address of hash-collision.

Preferably, described processing module specifically is used for:

If traveled through the clauses and subclauses that rear existence equates, then determine to exist hash-collision, this key assignments is learnt in the conflict solution table;

If there are not equal clauses and subclauses after having traveled through, then calculate the idle entry number in the described M hash table, if the idle entry number in the described M hash table is zero, then this key assignments is learnt in the described conflict solution table; If the idle entry number in the described M hash table not all is zero, then search and whether exist cryptographic Hash to equal the clauses and subclauses of arbitrary cryptographic Hash in described (N-M) individual cryptographic Hash in hash-collision table corresponding to the non-vanishing hash table of idle entry number, if exist, then this key assignments is learnt in the described conflict solution table, if there is no, judge then whether the conflict list item is full in this hash-collision table, if full, then this key assignments learnt in the described conflict solution table.

Preferably, described processing module also is used for: if less than, then described (N-M) individual cryptographic Hash is write in the described hash-collision table, calculate the MAC table address, this key assignments is learnt in the described MAC table.

The embodiment of the invention effectively reduces the probability of hash-collision by key assignments being done repeatedly Hash, thereby greatly reduces taking the TCAM space.

Description of drawings

Fig. 1 is that a kind of MAC of the prior art searches flow chart;

Fig. 2 is that another kind of MAC of the prior art searches flow chart;

Fig. 3 is the schematic diagram of used in the present invention couple of Hash lookup table embodiment;

List item Relations Among schematic diagram when Fig. 4 is the two Hash lookup of the embodiment of the invention;

Fig. 5 is the flow chart of the two Hash lookup processes of the embodiment of the invention;

Hash-collision schematic diagram when Fig. 6 is embodiment of the invention mac learning;

Fig. 7 is Hash collision table schematic diagram in the embodiment of the invention mac learning;

Fig. 8 is the flow chart of embodiment of the invention mac learning process;

Fig. 9 is the structural representation of definite device of embodiment of the invention MAC Address hash-collision.

Embodiment

For making the purpose, technical solutions and advantages of the present invention clearer, hereinafter in connection with accompanying drawing embodiments of the invention are elaborated.Need to prove that in the situation of not conflicting, the embodiment among the application and the feature among the embodiment be combination in any mutually.

Hash-collision in the embodiment of the invention mainly is present in following two kinds of situations:

When 1) MAC searches, find key value and not yet learn in the list item, but and learn to have produced hash-collision into the key assignments of list item, find same MAC table list item, at this moment, need to finding key value and showing that the Compare field compares among the result, judge whether it is this corresponding list item that finds key value;

2) hash-collision during mac learning.

For above-mentioned two kinds of hash-collisions, the embodiment of the invention provides definite method of a kind of media interviews control (MAC) Address-Hash conflict, and the method comprises:

Key assignments is Hash N time, obtains N cryptographic Hash, N is the integer greater than 2;

Use respectively M cryptographic Hash one by one correspondence search M Hash table, obtain M hash table, described M is less than described N;

Use that (N-M) the individual cryptographic Hash except a described M cryptographic Hash and the cryptographic Hash in the described M hash table travel through comparison in the described N cryptographic Hash, search and/or learn to exist the MAC Address of hash-collision.

Above-mentioned M is preferably N-1, and for example N is that 3, M is 2, and certainly, N can also be 3 for 4, M, and in addition, M can also be 2, etc.

Wherein, the hash-collision when searching for MAC, adopt following processing scheme:

As shown in Figure 3, be the schematic diagram of used in the present invention couple of Hash lookup table embodiment, can learn the list item definition of two Hash lookup tables by this figure:

Hash table is defined as n Hash list item (List), and each Hash List (be called for short HL) comprises m Hash clauses and subclauses, and whether valid bit representation clauses and subclauses are effective, and the Hash field is that key assignments is done cryptographic Hash behind the Hash.

MAC table capacity is n*m list item, each list item comprises two parts, Compare (being called for short Comp) field is original key assignments, judge hash-collision when being used for searching, the reason that this hash-collision produces is: the key assignments when searching is not yet learnt in the list item, but and learn to have produced hash-collision into the key assignments of list item, find same MAC table list item, at this moment, need to finding key value and showing that the Compare field compares among the result, judge whether it is this corresponding list item that finds key value.MAC result (MAC Result) is used for depositing the MAC forwarding information.

As shown in Figure 4, list item Relations Among schematic diagram in this embodiment, is done Hash three times to key assignments when being the two Hash lookup of the embodiment of the invention, produces three cryptographic Hash: HashA, HashB, HashC; Search respectively Hash table A, Hash table B with HashA, HashB, lookup result is Hash entry A, Hash entry B, i.e. the described Hash List of Fig. 3; Then with the hash value among HashC and Hash List A, the Hash ListB relatively, if do not find equal clauses and subclauses, then do not match clauses and subclauses in the two Hash lookups of expression; If find equal clauses and subclauses, continue to search the MAC table, with the Compare field in the MAC table and the comparison that finds key value, if equate, expression finds the coupling clauses and subclauses; If unequal, expression does not find the coupling clauses and subclauses.

As shown in Figure 5, be the flow chart of the two Hash lookup processes of the embodiment of the invention, this process comprises:

Step

101, do Hash three times to finding key value, obtain three cryptographic Hash: HashA, HashB, HashC;

Step

102, search Hash table A, Hash table B with HashA, HashB correspondence, obtain Hash entry Hash List A and Hash List B;

Step

103, relatively (travel through first Hash List A with the hash value among HashC and Hash List A, Hash List B traversal, if without occurrence, travel through again Hash List B), if do not have equal clauses and subclauses after having traveled through all clauses and subclauses, then the two Hash tables of expression do not match clauses and subclauses;

If there be clauses and subclauses and the

valid position

1 that equates in

step

104, the address that record matching list item HashList is corresponding is RamAddr, and skew corresponding to coupling clauses and subclauses is index among the record HashList;

Step

105, calculating MAC table address: RamAddr*m+index search the MAC table;

Step

106, with the Compare field in the MAC table with find key value comparison, if equate, expression finds the coupling clauses and subclauses; If unequal, expression does not find the coupling clauses and subclauses.

Wherein, the hash-collision during for mac learning, adopt following processing scheme:

As shown in Figure 6, the hash-collision schematic diagram when being embodiment of the invention mac learning, among this embodiment, Key1 is through twice Hash, respectively Hash List j among Hash List i and the Hash table B among the corresponding Hash table A; According to preferentially writing many this principles of Hash table of idle clauses and subclauses, suppose the idle clauses and subclauses of Hash Listj of Hash table B at this moment more than the Hash List i of Hash table A, so Key1 writes the Hash Listj of Hash table B;

During study Key2, Key2 is done Hash twice, Hash List k among Hash List i and the Hash table B among the corresponding Hash table A of difference, namely the HashA value of Key2 and Key1 is identical, has produced hash-collision; Suppose that the idle clauses and subclauses of Hash List i of Hash table A at this moment are more than the Hash List k of Hash table B, therefore Key2 writes the Hash List i of Hash table A, if at this moment the HashC value of Key2 and Key1 is identical, produced hash-collision, because Key1 writes the Hash List i of Hash table A, Key1 can match these clauses and subclauses among the Hash List i of Hash table A when searching, cause the mistake coupling.

The condition that this hash-collision exists is: the HashA of Key1 and Key2, HashB have one to produce hash-collision (such as the HashA among Fig. 6), the key assignments of rear interpolation will write in the Hash table that produces hash-collision (the Hash table A in showing such as Fig. 6), and HashC produces hash-collision.

In order to solve this hash-collision, define a hash-collision table.

As shown in Figure 7, it is Hash collision table schematic diagram in the embodiment of the invention mac learning, the hash-collision table definition is n conflict list item (Collision List, CL), each Collision List list item comprises k Hash clauses and subclauses (the hash-collision degree of depth is k), and whether valid bit representation clauses and subclauses are effective.

As shown in Figure 8, be the flow chart of embodiment of the invention mac learning process, this process comprises:

Step

201, key assignments is done Hash three times, obtain three cryptographic Hash: HashA, HashB, HashC;

Step

202, search Hash table A, Hash table B with HashA, HashB, obtain Hash List A, Hash List B;

Step

203, with the hash value among HashC and Hash List A, Hash List B traversal relatively (travel through first Hash List A, if without occurrence, travel through again Hash List B).If occurrence is arranged, and

valid position

1, there is hash-collision in expression, and this key assignments is learnt conflict solution table;

Step

204, the clauses and subclauses that if there is no equate are calculated idle entry number among Hash table A and the Hash table B list item HashList, and recording the many hash table addresses of idle entry number is RamAddr, and another hash table address is designated as RamAddrOther; If there are not idle clauses and subclauses in Hash table A and Hash table B list item HashList, this key assignments is learnt conflict solution table;

If there are idle clauses and subclauses in

step

205 Hash table A or Hash table B list item HashList, search hash-collision table (Collision Table, CT), whether exist the hash value to equal the clauses and subclauses of HashC and valid=1 in the traversal conflict list item (Collision List), if exist, this key assignments is learnt conflict solution table;

If do not exist the hash value to equal the clauses and subclauses of HashC and valid=1 among

step

206 hash-collision table (CollisionTable) the Collision List, judge whether Collision List is full, if CollisionList is full, this key assignments is learnt conflict solution table;

If

step

207 Collision List less than, HashC is write Hash table; Writing address is RamAddr+index;

HashTable[RamAddr][index].hash=HashC

HashTable[RamAddr][index].valid=1

If

step

208 Collision List less than, HashC is write the hash-collision table, judge conflict when being used for new key assignments study; Writing address is RamAddrOther+index;

CollisionTabel[RamAddrOther][index].hash=HashC

CollisionTabel[RamAddrOther][index].valid=1

Step

209, this key assignments is learnt MAC table, writing address is RamAddr*m+index.

The embodiment of the invention effectively reduces the probability of hash-collision by key assignments being done repeatedly Hash, thereby greatly reduces taking the TCAM space.

As shown in Figure 9, be the structural representation of definite device of embodiment of the invention MAC Address hash-collision, this determines application of installation in network processing unit, this device comprises Hash module 11,

searches module

12 and

processing module

13, wherein:

The Hash module is used for key assignments is Hash N time, obtains N cryptographic Hash, and N is the integer greater than 2;

Search module, be used for using respectively M cryptographic Hash one by one correspondence search M Hash table, obtain M hash table, described M is less than described N;

Processing module travels through comparison for (N-M) individual cryptographic Hash of using a described N cryptographic Hash except a described M cryptographic Hash and the cryptographic Hash in the described M hash table, searches and/or learn to exist the MAC Address of hash-collision.

Wherein, described processing module specifically is used for: if traveled through the clauses and subclauses that rear existence equates, then calculate the MAC table address, search corresponding MAC table, compare with key assignments field and described key assignments in the described MAC table, if the two equates, then determines to find the MAC Address that has hash-collision.In addition, described processing module also is used for: if the two is unequal, then determine not exist the MAC Address of hash-collision.Concrete processing procedure can be referring to Fig. 5.

Similarly, described processing module specifically is used for: if traveled through the clauses and subclauses that rear existence equates, then determine to exist hash-collision, this key assignments is learnt in the conflict solution table; If there are not equal clauses and subclauses after having traveled through, then calculate the idle entry number in the described M hash table, if the idle entry number in the described M hash table is zero, then this key assignments is learnt in the described conflict solution table; If the idle entry number in the described M hash table not all is zero, then search and whether exist cryptographic Hash to equal the clauses and subclauses of arbitrary cryptographic Hash in described (N-M) individual cryptographic Hash in hash-collision table corresponding to the non-vanishing hash table of idle entry number, if exist, then this key assignments is learnt in the described conflict solution table, if there is no, judge then whether the conflict list item is full in this hash-collision table, if full, then this key assignments learnt in the described conflict solution table.In addition, described processing module also is used for: if less than, then described (N-M) individual cryptographic Hash is write in the described hash-collision table, calculate the MAC table address, this key assignments is learnt in the described MAC table.Concrete processing procedure can be referring to Fig. 8.

Above-mentioned definite device can effectively reduce the probability of hash-collision by key assignments being done repeatedly Hash, thereby greatly reduces taking the TCAM space.

One of ordinary skill in the art will appreciate that all or part of step in the said method can come the instruction related hardware to finish by program, said procedure can be stored in the computer-readable recording medium, such as read-only memory, disk or CD etc.Alternatively, all or part of step of above-described embodiment also can realize with one or more integrated circuits.Correspondingly, each the module/unit in above-described embodiment can adopt the form of hardware to realize, also can adopt the form of software function module to realize.The present invention is not restricted to the combination of the hardware and software of any particular form.

Above embodiment is only unrestricted in order to technical scheme of the present invention to be described, only with reference to preferred embodiment the present invention is had been described in detail.Those of ordinary skill in the art should be appreciated that and can make amendment or be equal to replacement technical scheme of the present invention, and do not break away from the spirit and scope of technical solution of the present invention, all should be encompassed in the middle of the claim scope of the present invention.

Claims (10)

1. definite method that (MAC) Address-Hash conflicts is controlled in media interviews, it is characterized in that the method comprises:

Key assignments is Hash N time, obtains N cryptographic Hash, N is the integer greater than 2;

Use respectively M cryptographic Hash one by one correspondence search M Hash table, obtain M hash table, described M is less than described N;

Use that (N-M) the individual cryptographic Hash except a described M cryptographic Hash and the cryptographic Hash in the described M hash table travel through comparison in the described N cryptographic Hash, search and/or learn to exist the MAC Address of hash-collision.

2. method according to claim 1 is characterized in that:

Described searching exists the MAC Address of hash-collision to comprise:

If traveled through the clauses and subclauses that rear existence equates, then calculate the MAC table address, search corresponding MAC table, compare with key assignments field and described key assignments in the described MAC table, if the two is equal, then determine to find the MAC Address that has hash-collision.

3. method according to claim 2 is characterized in that:

After key assignments field in the described MAC table of described usefulness and described key assignments compare, also comprise:

If the two is unequal, then determine not exist the MAC Address of hash-collision.

4. method according to claim 1 is characterized in that:

Described study exists the MAC Address of hash-collision to comprise:

If traveled through the clauses and subclauses that rear existence equates, then determine to exist hash-collision, this key assignments is learnt in the conflict solution table;

If there are not equal clauses and subclauses after having traveled through, then calculate the idle entry number in the described M hash table, if the idle entry number in the described M hash table is zero, then this key assignments is learnt in the described conflict solution table; If the idle entry number in the described M hash table not all is zero, then search and whether exist cryptographic Hash to equal the clauses and subclauses of arbitrary cryptographic Hash in described (N-M) individual cryptographic Hash in hash-collision table corresponding to the non-vanishing hash table of idle entry number, if exist, then this key assignments is learnt in the described conflict solution table, if there is no, judge then whether the conflict list item is full in this hash-collision table, if full, then this key assignments learnt in the described conflict solution table.

5. method according to claim 4 is characterized in that:

Described judge in this hash-collision table that the conflict list item is whether full after, also comprise:

If less than, then described (N-M) individual cryptographic Hash is write in the described hash-collision table, calculate the MAC table address, this key assignments is learnt in the described MAC table.

6. definite device that (MAC) Address-Hash conflicts is controlled in media interviews, it is characterized in that be applied in the network processing unit, this device comprises:

The Hash module is used for key assignments is Hash N time, obtains N cryptographic Hash, and N is the integer greater than 2;

Search module, be used for using respectively M cryptographic Hash one by one correspondence search M Hash table, obtain M hash table, described M is less than described N;

Processing module travels through comparison for (N-M) individual cryptographic Hash of using a described N cryptographic Hash except a described M cryptographic Hash and the cryptographic Hash in the described M hash table, searches and/or learn to exist the MAC Address of hash-collision.

7. device according to claim 6 is characterized in that:

Described processing module specifically is used for: if traveled through the clauses and subclauses that rear existence equates, then calculate the MAC table address, search corresponding MAC table, compare with key assignments field and described key assignments in the described MAC table, if the two is equal, then determine to find the MAC Address that has hash-collision.

8. device according to claim 7 is characterized in that:

Described processing module also is used for: if the two is unequal, then determine not exist the MAC Address of hash-collision.

9. device according to claim 6 is characterized in that:

Described processing module specifically is used for:

If traveled through the clauses and subclauses that rear existence equates, then determine to exist hash-collision, this key assignments is learnt in the conflict solution table;

If there are not equal clauses and subclauses after having traveled through, then calculate the idle entry number in the described M hash table, if the idle entry number in the described M hash table is zero, then this key assignments is learnt in the described conflict solution table; If the idle entry number in the described M hash table not all is zero, then search and whether exist cryptographic Hash to equal the clauses and subclauses of arbitrary cryptographic Hash in described (N-M) individual cryptographic Hash in hash-collision table corresponding to the non-vanishing hash table of idle entry number, if exist, then this key assignments is learnt in the described conflict solution table, if there is no, judge then whether the conflict list item is full in this hash-collision table, if full, then this key assignments learnt in the described conflict solution table.

10. device according to claim 9 is characterized in that:

Described processing module also is used for: if less than, then described (N-M) individual cryptographic Hash is write in the described hash-collision table, calculate the MAC table address, this key assignments is learnt in the described MAC table.

CN201210485348.5A 2012-11-26 2012-11-26 The determination method and device of MAC Address hash-collision Active CN103001878B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210485348.5A CN103001878B (en) 2012-11-26 2012-11-26 The determination method and device of MAC Address hash-collision

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210485348.5A CN103001878B (en) 2012-11-26 2012-11-26 The determination method and device of MAC Address hash-collision

Publications (2)

Publication Number Publication Date
CN103001878A true CN103001878A (en) 2013-03-27
CN103001878B CN103001878B (en) 2018-02-16

Family

ID=47930031

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210485348.5A Active CN103001878B (en) 2012-11-26 2012-11-26 The determination method and device of MAC Address hash-collision

Country Status (1)

Country Link
CN (1) CN103001878B (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103581024A (en) * 2013-11-21 2014-02-12 盛科网络(苏州)有限公司 Learning method and device combining MAC address hardware and software
CN104079489A (en) * 2013-03-28 2014-10-01 日立金属株式会社 Network relay device
WO2016082367A1 (en) * 2014-11-25 2016-06-02 中兴通讯股份有限公司 Method and device for realizing hardware table traversal based on network processor
CN105955971A (en) * 2015-11-30 2016-09-21 中国银联股份有限公司 Key value buffer memory implementation method and device
CN106095770A (en) * 2016-05-05 2016-11-09 邦彦技术股份有限公司 Data quick searching device, searching method, adding method and deleting method
CN108664518A (en) * 2017-03-31 2018-10-16 深圳市中兴微电子技术有限公司 A kind of method and device for realizing processing of tabling look-up
CN108848034A (en) * 2018-07-17 2018-11-20 新华三技术有限公司 A kind of network equipment and list item learning method
CN112637379A (en) * 2020-12-25 2021-04-09 北京天融信网络安全技术有限公司 mac address hash operation method, device, equipment and storage medium
CN114422478A (en) * 2021-12-21 2022-04-29 福建星网智慧科技有限公司 Method for mapping GEMPORT ID and MAC address and storage device
CN115576954A (en) * 2022-11-24 2023-01-06 恒生电子股份有限公司 Hash table determining method and device
WO2024197825A1 (en) * 2023-03-31 2024-10-03 新华三技术有限公司 Storing mac address table entries

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6697873B1 (en) * 1999-12-20 2004-02-24 Zarlink Semiconductor V.N., Inc. High speed MAC address search engine
CN1932818A (en) * 2006-09-20 2007-03-21 华为技术有限公司 Data bank system and method for controlling data bank data
CN101140592A (en) * 2007-09-30 2008-03-12 华为技术有限公司 Keywords storing and researching method and apparatus
CN101232444A (en) * 2008-01-22 2008-07-30 杭州华三通信技术有限公司 Apparatus and method for solving hash collision and exchange equipment with the same
CN101692651A (en) * 2009-09-27 2010-04-07 中兴通讯股份有限公司 Method and device for Hash lookup table
CN102073733A (en) * 2011-01-19 2011-05-25 中兴通讯股份有限公司 Method and device for managing Hash table
CN102232219A (en) * 2010-01-26 2011-11-02 华为技术有限公司 Method and device for storing and searching keyword
CN102346735A (en) * 2010-07-29 2012-02-08 高通创锐讯通讯科技(上海)有限公司 Hash search method capable of reducing hash collision
CN102682116A (en) * 2012-05-14 2012-09-19 中兴通讯股份有限公司 Method and device for processing table items based on Hash table
CN102710813A (en) * 2012-06-21 2012-10-03 杭州华三通信技术有限公司 MAC address table entry access method and equipment
CN102724106A (en) * 2011-03-30 2012-10-10 华为技术有限公司 Learning method for MAC addresses, network side equipment, and system

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6697873B1 (en) * 1999-12-20 2004-02-24 Zarlink Semiconductor V.N., Inc. High speed MAC address search engine
CN1932818A (en) * 2006-09-20 2007-03-21 华为技术有限公司 Data bank system and method for controlling data bank data
CN101140592A (en) * 2007-09-30 2008-03-12 华为技术有限公司 Keywords storing and researching method and apparatus
CN101232444A (en) * 2008-01-22 2008-07-30 杭州华三通信技术有限公司 Apparatus and method for solving hash collision and exchange equipment with the same
CN101692651A (en) * 2009-09-27 2010-04-07 中兴通讯股份有限公司 Method and device for Hash lookup table
CN102232219A (en) * 2010-01-26 2011-11-02 华为技术有限公司 Method and device for storing and searching keyword
CN102346735A (en) * 2010-07-29 2012-02-08 高通创锐讯通讯科技(上海)有限公司 Hash search method capable of reducing hash collision
CN102073733A (en) * 2011-01-19 2011-05-25 中兴通讯股份有限公司 Method and device for managing Hash table
CN102724106A (en) * 2011-03-30 2012-10-10 华为技术有限公司 Learning method for MAC addresses, network side equipment, and system
CN102682116A (en) * 2012-05-14 2012-09-19 中兴通讯股份有限公司 Method and device for processing table items based on Hash table
CN102710813A (en) * 2012-06-21 2012-10-03 杭州华三通信技术有限公司 MAC address table entry access method and equipment

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104079489B (en) * 2013-03-28 2018-08-28 日立金属株式会社 Network repeater
CN104079489A (en) * 2013-03-28 2014-10-01 日立金属株式会社 Network relay device
CN103581024A (en) * 2013-11-21 2014-02-12 盛科网络(苏州)有限公司 Learning method and device combining MAC address hardware and software
WO2016082367A1 (en) * 2014-11-25 2016-06-02 中兴通讯股份有限公司 Method and device for realizing hardware table traversal based on network processor
CN105700859A (en) * 2014-11-25 2016-06-22 中兴通讯股份有限公司 Network-processor-based hardware table traversal method and apparatus
CN105955971A (en) * 2015-11-30 2016-09-21 中国银联股份有限公司 Key value buffer memory implementation method and device
CN105955971B (en) * 2015-11-30 2019-09-17 中国银联股份有限公司 A kind of implementation method and device of key assignments caching
CN106095770A (en) * 2016-05-05 2016-11-09 邦彦技术股份有限公司 Data quick searching device, searching method, adding method and deleting method
WO2017190409A1 (en) * 2016-05-05 2017-11-09 邦彦技术股份有限公司 Quick data search method, search method, adding method and deletion method
CN106095770B (en) * 2016-05-05 2019-10-11 邦彦技术股份有限公司 Data quick searching device, searching method, adding method and deleting method
CN108664518A (en) * 2017-03-31 2018-10-16 深圳市中兴微电子技术有限公司 A kind of method and device for realizing processing of tabling look-up
CN108664518B (en) * 2017-03-31 2021-12-07 深圳市中兴微电子技术有限公司 Method and device for realizing table look-up processing
CN108848034A (en) * 2018-07-17 2018-11-20 新华三技术有限公司 A kind of network equipment and list item learning method
CN108848034B (en) * 2018-07-17 2021-04-27 新华三技术有限公司 Network equipment and table entry learning method
CN112637379A (en) * 2020-12-25 2021-04-09 北京天融信网络安全技术有限公司 mac address hash operation method, device, equipment and storage medium
CN112637379B (en) * 2020-12-25 2022-11-15 北京天融信网络安全技术有限公司 mac address hash operation method, device, equipment and storage medium
CN114422478A (en) * 2021-12-21 2022-04-29 福建星网智慧科技有限公司 Method for mapping GEMPORT ID and MAC address and storage device
CN115576954A (en) * 2022-11-24 2023-01-06 恒生电子股份有限公司 Hash table determining method and device
CN115576954B (en) * 2022-11-24 2023-04-07 恒生电子股份有限公司 Hash table determining method and device
WO2024197825A1 (en) * 2023-03-31 2024-10-03 新华三技术有限公司 Storing mac address table entries

Also Published As

Publication number Publication date
CN103001878B (en) 2018-02-16

Similar Documents

Publication Publication Date Title
CN103001878A (en) 2013-03-27 Determination method and device for media access control (MAC) address Hash collision
US11102120B2 (en) 2021-08-24 Storing keys with variable sizes in a multi-bank database
WO2020125741A1 (en) 2020-06-25 Hash collision processing method, apparatus, device, and computer readable storage medium
US7987179B2 (en) 2011-07-26 Method and apparatus for optimizing queries over vertically stored database
EP3113036B1 (en) 2019-02-20 Data matching method and apparatus and computer storage medium
CN100531097C (en) 2009-08-19 A bridging method and device
US20120246163A1 (en) 2012-09-27 Hash table storage and search methods and devices
WO2014012390A1 (en) 2014-01-23 Data processing method and apparatus, and shared storage device
CN102880628A (en) 2013-01-16 Hash data storage method and device
US20180107759A1 (en) 2018-04-19 Flow classification method and device and storage medium
CN106302172A (en) 2017-01-04 Support Hash lookup and the storage of route querying, lookup method and device simultaneously
US20140358886A1 (en) 2014-12-04 Internal search engines architecture
CN106789859B (en) 2021-06-04 Message matching method and device
WO2019034136A1 (en) 2019-02-21 Storage and query of entry data
CN111680489A (en) 2020-09-18 Target text matching method and device, storage medium and electronic equipment
GB2604770A (en) 2022-09-14 Ontology-based data storage for distributed knowledge bases
CN106599091A (en) 2017-04-26 Storage and indexing method of RDF graph structures stored based on key values
US8407255B1 (en) 2013-03-26 Method and apparatus for exploiting master-detail data relationships to enhance searching operations
WO2015043254A1 (en) 2015-04-02 Method and apparatus for searching for packet classification rule
CN112148738B (en) 2024-06-11 Hash conflict processing method and system
CN102904812B (en) 2015-07-29 The storage means of route table items, lookup method, Apparatus and system
CN118227518A (en) 2024-06-21 Table entry storage and searching method and device, network equipment and storage medium
CN106021339A (en) 2016-10-12 A semantic query method and system for a resource tree
US20090262740A1 (en) 2009-10-22 Transmission Information Transfer Apparatus and Method Thereof
CN112818185A (en) 2021-05-18 Method for searching longest prefix matching hardware system based on SRAM

Legal Events

Date Code Title Description
2013-03-27 C06 Publication
2013-03-27 PB01 Publication
2015-01-21 C10 Entry into substantive examination
2015-01-21 SE01 Entry into force of request for substantive examination
2018-02-16 GR01 Patent grant
2018-02-16 GR01 Patent grant