CN112270944A - Table item management method and equipment - Google Patents

Table item management method and equipment Download PDF

Info

Publication number
CN112270944A
CN112270944A CN202011047359.6A CN202011047359A CN112270944A CN 112270944 A CN112270944 A CN 112270944A CN 202011047359 A CN202011047359 A CN 202011047359A CN 112270944 A CN112270944 A CN 112270944A
Authority
CN
China
Prior art keywords
block
access control
control table
application
table entry
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011047359.6A
Other languages
Chinese (zh)
Other versions
CN112270944B (en
Inventor
田妍君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
New H3C Information Technologies Co Ltd
Original Assignee
Hangzhou H3C Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou H3C Technologies Co Ltd filed Critical Hangzhou H3C Technologies Co Ltd
Priority to CN202011047359.6A priority Critical patent/CN112270944B/en
Publication of CN112270944A publication Critical patent/CN112270944A/en
Application granted granted Critical
Publication of CN112270944B publication Critical patent/CN112270944B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11CSTATIC STORES
    • G11C15/00Digital stores in which information comprising one or more characteristic parts is written into the store and in which information is read-out by searching for one or more of these characteristic parts, i.e. associative or content-addressed stores
    • G11C15/04Digital stores in which information comprising one or more characteristic parts is written into the store and in which information is read-out by searching for one or more of these characteristic parts, i.e. associative or content-addressed stores using semiconductor elements

Abstract

The application provides a table entry management method and device. The table entry management method comprises the following steps: acquiring a first access control table item to be dynamically configured; identifying a first application associated with a first access control table entry; determining that each block has been allocated to other applications; identifying a plurality of blocks in the ternary content addressable memory, wherein the blocks store non-conflicting access control table entries; moving an access control table entry stored by a block with a low priority in the plurality of identified blocks to a block with a highest priority in the plurality of identified blocks, and releasing more than one block; allocating the highest priority block to the application associated with the access control table entry moved to the highest priority block; allocating one of the released blocks to a first application; the first access control table entry is stored in a block allocated to the first application.

Description

Table item management method and equipment
Technical Field
The present application relates to communication technologies, and in particular, to a method and an apparatus for entry management.
Background
TCAM (Triple Content Addressed Memory) can be divided into a plurality of blocks in hardware/logic, and each block stores an ACL (Access Control List) entry. And by the fuzzy searching function realized by the mask, whether the matching item of each ACL is matched with the message is searched in parallel among a plurality of blocks. The preceding rules are preferably validated when a block can host one or more ACL applications.
When ACL entries required to be searched by different applications are stored in the same block, the storage position of the ACL entries with high effective priority is in front. When ACL entries required to be searched by different applications are stored in different blocks, each block can have one ACL entry effective, action items (action fields) of the effective ACL entries of the blocks can be superposed to take effect, and the action items of the ACL entries with high action priority take effect preferentially; if the action priorities of the action items of the ACL entries of different block entries are the same and cannot be superposed to be effective, the ACL entries with the same matching items and the same action priorities cannot be stored in one block because the ACL entries cannot be superposed to be effective and conflict with each other. However, blocks of the TCMA are limited, and when an application corresponding to an ACL to be dynamically configured has no allocable blocks and thus Block resources are insufficient, an ACL entry that needs to be dynamically configured to the switch chip may fail to be configured.
Disclosure of Invention
The application aims to provide a table entry management method and device, which can avoid the failure of configuration of a dynamic access control table entry caused by insufficient block storage resources in a ternary content addressable memory.
In order to achieve the above object, the present application provides a method for managing table entries, where the method further includes: acquiring a first access control table item to be dynamically configured; identifying a first application associated with a first access control table entry; determining that each block has been allocated to other applications; identifying a plurality of blocks in the ternary content addressable memory, wherein the blocks store non-conflicting access control table entries; moving an access control table entry stored by a block with a low priority in the plurality of identified blocks to a block with a highest priority in the plurality of identified blocks, and releasing more than one block; allocating the highest priority block to the access control table entry moved to the highest priority block; allocating one of the released blocks to a first application; the first access control table entry is stored in a block allocated to the first application.
In order to achieve the above object, the present application further provides an entry management device, which includes a processor and a memory; the memory is used for storing processor executable instructions; wherein the processor is configured to perform the following by executing the processor-executable instructions in the memory: acquiring a first access control table item to be dynamically configured; identifying a first application associated with a first access control table entry; determining that each block has been allocated to other applications; identifying a plurality of blocks in the ternary content addressable memory, wherein the blocks store non-conflicting access control table entries; moving an access control table entry stored by a block with a low priority in the plurality of identified blocks to a block with a highest priority in the plurality of identified blocks, and releasing more than one block; allocating the highest priority block to the application associated with the access control table entry moved to the highest priority block; allocating one of the released blocks to a first application; the first access control table entry is stored in a block allocated to the first application.
The method and the device have the advantages that the ACL table items of the applications which are not conflicted are combined in one block, block resources are saved, the ACL table which needs to be dynamically configured is stored in the released block, and the problem that the block which can be allocated to the new application cannot be allocated due to insufficient block resources to cause configuration failure is avoided.
Drawings
Fig. 1 is a flowchart of an entry management method provided in the present application;
FIG. 2 is a diagram of a first embodiment of a merged block storage resource provided herein;
FIG. 3 is a diagram of a second embodiment of a merged block memory resource provided by the present application;
FIG. 4 is a diagram of a third embodiment of a merged block memory resource provided by the present application;
FIG. 5 is a diagram of a second embodiment of a merged block memory resource provided by the present application;
fig. 6 is a schematic diagram of an entry management device provided in the present application.
Detailed Description
A detailed description will be given of a number of examples shown in a number of figures. In the following detailed description, numerous specific details are set forth in order to provide a thorough understanding of the present application. Well-known methods, procedures, components and circuits have not been described in detail so as not to obscure the examples.
The term "including" as that term is used is meant to include, but is not limited to; the term "comprising" means including but not limited to; the terms "above," "within," and "below" include the instant numbers; the terms "greater than" and "less than" mean that the number is not included. The term "based on" means based on at least a portion thereof.
Step 101, a first access control table entry to be dynamically configured is obtained.
At step 102, a first application associated with a first access control table entry is identified.
And 103, determining that each block is allocated to other applications.
At step 104, a plurality of blocks in the TCMA in which non-conflicting access control entries are stored are identified.
When the stored non-superposition effective ACL entries of the plurality of access control entries are different, the matching fields of the matching entries of the ACL entries stored in different blocks are different, and the blocks are identified as the blocks storing the non-conflict access control entries. When the ACL entries which are stored in the plurality of access control entry are superposed to be effective, the matching fields of the matching entries of the ACL entries stored in different blocks are the same, but the action priorities corresponding to the action fields in the action entries are different, and then the blocks are identified to be the blocks which store the non-conflict access control entries.
And 105, moving the access control table entry stored by the block with the low priority among the plurality of identified blocks to the block with the highest priority among the plurality of identified blocks, and releasing more than one block.
And 106, distributing the highest priority block to the application associated with the access control table entry moved to the highest priority block.
Step 107, one of the released blocks is allocated to the first application.
Step 108, storing the first access control table entry in the block allocated to the first application.
The embodiment shown in fig. 1 has the advantages that the ACL table entries of non-conflicting applications are combined into one block, so that block resources are saved, the ACL table required to be dynamically configured is stored in the released block, and the problem that the block which can be allocated to a new application is not enough to cause configuration failure due to insufficient block resources is avoided.
Fig. 2 is a schematic diagram of a merged block storage resource according to a first embodiment of the present disclosure. In fig. 2, the TCAM of the communication device includes four blocks, block1 and block4, respectively. Block1 stores ACL table entry ACLa 1-an of application a, and Block2 stores ACL table entry b1-bm of application b; block3 stores ACL table entry c1-cx of application c; block4 stores ACL entry d1-dy for application d.
When the communication device needs the ACL entry f1 of the application f, it is determined that all blocks have been allocated applications and there are no block resources that can be allocated to the application f. Based on the method shown in fig. 1, it is first identified that adjacent blocks 1 and 2 store conflicting ACL entries (e.g., ACL entries that match the same items and do not require superposition validation, or ACL entries that match the same items and have the same action priority for the action items and take validation on superposition), the ACL entries of block1 and block2 are not merged.
Whether the adjacent blocks have conflict ACLs or not is firstly identified, and whether the adjacent blocks have the conflict ACLs or not can be combined. In this application, adjacent blocks refer to blocks with similar priorities.
The communication device then identifies that block2 and block3 store conflicting ACL entries, then block1 and block3 store non-conflicting ACL entries (e.g., ACL entries that do not require overlay validation that match different entries or overlay validation ACL entries that match the same entry but have different action priorities for the action items) and block1 has a higher priority. The communication equipment stores ACL table entries c1-cx of block3 into block1, deletes ACL table entries c1-cx of application c stored by block3, and moves ACL table entries of application c stored by block3 to block 1.
Then, the communication device recognizes that block2 and block4 store conflicting ACL entries, recognizes that block1 and block4 store non-conflicting ACL entries and that block1 has a higher priority, stores ACL entry d1-dy of block4 to block1, deletes ACL entry d1-dy of application d stored by block4, and moves ACL entry of application d stored by block4 to block 1.
The communication device assigns block3 to application f and configures ACL entry f1 in block3 as shown in fig. 2.
3-5 are embodiments of resolving an ACL entry conflict when an ACL entry conflict occurs when block1 configures an ACL phenotype after merging based on the embodiment shown in FIG. 2.
In fig. 3. When the communication equipment needs to configure an application ACL entry dy +1, identifying an application d associated with the ACL entry d y + 1; it is determined that block1 has allocated application d.
When the communication equipment compares ACL entry dy +1 with ACL entries already stored by block1, it is determined that block1 stores conflicting ACL entries of ACL entry dy +1 (ACL entries of checking applications A and C); and allocating the released block4 to the application d, storing the ACL entry dy +1 in block4, storing the ACL entry d1-dy of the application d stored by block1 in block4, and deleting the ACL entry d1-dy of the application d stored by block1, thereby moving the ACL entry d1-dy of the application d stored by block1 to block 4.
In fig. 4, when the communication device determines that block1 stores a conflicting ACL entry of dy +1 of an ACL entry, it determines that ACL entry f1 stored by block3 does not conflict with dy +1 of the ACL entry, block3 is allocated to application d, dy +1 of the ACL entry is stored in block3, ACL entry d1-dy of application d stored by block1 is stored in block4, ACL entry d1-dy of application d stored by block1 is deleted, and thereby ACL entry d1-dy of application d stored by block1 is moved to block 3.
In fig. 5, when it is determined that block1 stores the conflicting ACL entries of dy +1 of ACL entries, it is determined that the ACL entries of application a and application c stored in block1 are non-conflicting entries with ACL entry f1, block3 is allocated to applications a and c, the ACL entries of applications a and c stored in block1 are stored in block4, the ACL entries of applications a and c stored in block1 are deleted, and the ACL entries of applications a and c already stored in block1 are moved to block3 by the communications device.
The static ACL entry layout in the TCAM of the device is determined by the software version. In implementing the present application, the inventor also noticed that different users may need different static ACL layouts based on their own network traffic requirements, and thus special versions need to be developed for users to meet the static ACL layouts. The more user demands, the more customized development of software versions of the communication device is required.
In the application, the communication device can execute the response operation according to the input static configuration ACL control instruction. For example, the switch inputs a block priority configuration command indicating a block to be configured and a priority to be modified through a remote network manager or a local input interface (keyboard, touch screen); and the communication equipment modifies the priority of the block to be configured based on the acquired block priority configuration command. Such as; the communication equipment receives the command of obtaining the static table item configuration; the static table entry configuration command indicates a block before movement, a storage position before movement, a block after movement and a storage position after movement; and based on the static table item configuration command, moving the static access control table items to be moved stored in the storage position before the block is moved to the storage position after the block is moved.
Therefore, the communication equipment can flexibly modify the priority of the blocks according to different static configuration commands and flexibly move the ACL entries which are statically configured and moved among different blocks.
Fig. 6 is a schematic diagram of an embodiment of the table entry management device provided in the application, where the device 60 includes a switch chip, a processor, and a memory for forwarding a network packet; the memory is to store processor-executable instructions. The processor is operable by executing processor-executable instructions in the memory to perform the following: acquiring a first access control table item to be dynamically configured; identifying a first application associated with a first access control table entry; determining that each block has been allocated to other applications; identifying a plurality of blocks in the ternary content addressable memory, wherein the blocks store non-conflicting access control table entries; moving an access control table entry stored by a block with a low priority in the plurality of identified blocks to a block with a highest priority in the plurality of identified blocks, and releasing more than one block; allocating the highest priority block to the application associated with the access control table entry moved to the highest priority block; allocating one of the released blocks to a first application; the first access control table entry is stored in a block allocated to the first application.
The processor, by executing the processor-executable instructions in the memory, further performs the following: acquiring a second access control table item to be configured; identifying a second application associated with a second access control table entry; determining that a highest priority block has been allocated to the second application; determining a conflict access control table entry of a second access control table entry stored in the block with the highest priority; and allocating an unallocated block of the released blocks to the second application, storing the second access control table entry in the block allocated to the second application, and moving the access control table entry of the second application, which has been stored in the block with the highest priority, to the block allocated to the second application.
The processor, by executing the processor-executable instructions in the memory, further performs the following: acquiring a second access control table item to be configured; identifying a second application associated with a second access control table entry; determining that a second application has been assigned to a highest priority block; determining a conflict access control table entry of a second access control table entry stored in the block with the highest priority; determining that a block allocated to the first application stores a conflicting entry for a second access control entry; and allocating the second application to the block of the first application and storing the second access control table entry in the block allocated to the first application, and moving the access control table entry of the second application, which has been stored by the highest priority block, to the block allocated to the first application.
The processor, by executing the processor-executable instructions in the memory, further performs the following: acquiring a second access control table item to be configured; identifying a second application associated with a second access control table entry; determining that a second application has been assigned to a highest priority block; determining a conflict access control table entry of a second access control table entry stored in the highest priority block; and determining that the access control table entries of the other applications stored in the highest priority block are non-conflict table entries of the first access control table entry, distributing the block of the first application to the other applications, and moving the access control table entries of the other applications stored in the highest priority block to the block of the first application.
The processor, by executing the processor-executable instructions in the memory, further performs the following: acquiring a block priority configuration command carrying an indication to-be-configured block and a to-be-modified priority; modifying the priority of the block to be configured based on the block priority configuration command; acquiring a static table item configuration command; the static table entry configuration command indicates a block before movement, a storage position before movement, a block after movement and a storage position after movement; and based on the static table item configuration command, moving the static access control table items to be moved stored in the storage position before the block is moved to the storage position after the block is moved.
The above description is only exemplary of the present application and should not be taken as limiting the present application, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present application should be included in the scope of protection of the present application.

Claims (10)

1. A method for entry management, the method further comprising:
acquiring a first access control table item to be dynamically configured;
identifying a first application associated with the first access control table entry;
determining that each block has been allocated to other applications;
identifying a plurality of blocks in the ternary content addressable memory, wherein the blocks store non-conflicting access control table entries;
moving an access control table entry stored by a block with a low priority in the plurality of identified blocks to a block with a highest priority in the plurality of identified blocks, and releasing more than one block;
assigning the highest priority block to an application associated with an access control entry moved to the highest priority block;
allocating one of the released blocks to the first application;
storing the first access control table entry in a block allocated to the first application.
2. The method of claim 1, further comprising:
acquiring a second access control table item to be configured;
identifying a second application associated with the second access control table entry;
determining that the second application has been assigned to the highest priority block;
determining a conflict access control table entry of the second access control table entry stored in the highest priority block;
and allocating an unallocated block of the released blocks to the second application, storing the second access control table entry in the block allocated to the second application, and moving the access control table entry of the second application, which is stored in the highest priority block, to the block allocated to the second application.
3. The method of claim 1, further comprising:
acquiring a second access control table item to be configured;
identifying a second application associated with the second access control table entry;
determining that the second application has been assigned to the highest priority block;
determining a conflict access control table entry of the second access control table entry stored in the highest priority block;
determining that a block allocated to the first application stores a conflicting entry for the second access control entry;
and allocating the block of the first application to a second application and storing the second access control table entry in the block allocated to the first application, and moving the access control table entry of the second application, which is stored by the highest priority block, to the block allocated to the first application.
4. The method of claim 1, further comprising:
acquiring a second access control table item to be configured;
identifying a second application associated with the second access control table entry;
determining that the second application has been assigned to the highest priority block;
determining a conflict access control table entry of the second access control table entry stored in the highest priority block;
determining that the access control table entry of the other application stored by the highest priority block is a non-conflict table entry of the first access control table entry, allocating the block of the first application to the other application, and moving the access control table entry of the second application stored by the highest priority block by the block allocated to the first application.
5. The method of claim 1, further comprising:
acquiring a block priority configuration command carrying an indication to-be-configured block and a to-be-modified priority;
modifying the priority of the block to be configured based on the block priority configuration command; acquiring a static table item configuration command; wherein the static table entry configuration command indicates a block before movement, a storage location before movement, a block after movement and a storage location after movement;
and based on the static table item configuration command, moving the static access control table items to be moved stored in the storage position before the movement of the block to the storage position after the movement of the block after the movement.
6. An entry management device, comprising a processor and a memory; the memory is to store processor-executable instructions; wherein the processor, by executing the processor-executable instructions in the memory, is to perform operations comprising:
acquiring a first access control table item to be dynamically configured;
identifying a first application associated with the first access control table entry;
determining that each block has been allocated to other applications;
identifying a plurality of blocks in the ternary content addressable memory, wherein the blocks store non-conflicting access control table entries;
moving an access control table entry stored by a block with a low priority in the plurality of identified blocks to a block with a highest priority in the plurality of identified blocks, and releasing more than one block;
assigning the highest priority block to an application associated with an access control entry moved to the highest priority block;
allocating one of the released blocks to the first application;
storing the first access control table entry in a block allocated to the first application.
7. The device of claim 6, wherein the processor, by executing the processor-executable instructions in the memory, further performs the following:
acquiring a second access control table item to be configured;
identifying a second application associated with the second access control table entry;
determining that the second application has been assigned to the highest priority block;
determining that the highest priority block stores the conflict access control table entry of the second access control table entry;
and allocating an unallocated block of the released blocks to the second application, storing the second access control table entry in the block allocated to the second application, and moving the access control table entry of the second application, which is stored in the highest priority block, to the block allocated to the second application.
8. The device of claim 6, wherein the processor, by executing the processor-executable instructions in the memory, further performs the following:
acquiring a second access control table item to be configured;
identifying a second application associated with the second access control table entry;
determining that the second application has been assigned to the highest priority block;
determining that the highest priority block stores the conflict access control table entry of the second access control table entry;
determining that a block allocated to the first application stores a conflicting entry for the second access control entry;
and allocating the block of the first application to a second application allocation and storing the second access control table entry in the block allocated to the first application, and moving the access control table entry of the second application, which is stored by the highest priority block, to the block allocated to the first application.
9. The device of claim 6, wherein the processor, by executing the processor-executable instructions in the memory, further performs the following:
acquiring a second access control table item to be configured;
identifying a second application associated with the second access control table entry;
determining that the second application has been assigned to the highest priority block;
determining a conflict access control table entry of the second access control table entry stored in the highest priority block;
and determining that the access control table entries of other applications stored in the highest priority block are non-conflict table entries of the first access control table entry, distributing the block of the first application to the other applications, and moving the access control table entries of the other applications stored in the highest priority block to the block of the first application.
10. The device of claim 6, wherein the processor, by executing the processor-executable instructions in the memory, further performs the following:
acquiring a block priority configuration command carrying an indication to-be-configured block and a to-be-modified priority;
modifying the priority of the block to be configured based on the block priority configuration command;
acquiring a static table item configuration command; wherein the static table entry configuration command indicates a block before movement, a storage location before movement, a block after movement and a storage location after movement;
and based on the static table item configuration command, moving the static access control table items to be moved stored in the storage position before the movement of the block to the storage position after the movement of the block after the movement.
CN202011047359.6A 2020-09-29 2020-09-29 Table item management method and equipment Active CN112270944B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011047359.6A CN112270944B (en) 2020-09-29 2020-09-29 Table item management method and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011047359.6A CN112270944B (en) 2020-09-29 2020-09-29 Table item management method and equipment

Publications (2)

Publication Number Publication Date
CN112270944A true CN112270944A (en) 2021-01-26
CN112270944B CN112270944B (en) 2022-10-21

Family

ID=74349395

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011047359.6A Active CN112270944B (en) 2020-09-29 2020-09-29 Table item management method and equipment

Country Status (1)

Country Link
CN (1) CN112270944B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103368851A (en) * 2013-07-22 2013-10-23 武汉烽火网络有限责任公司 Openflow flow table storage and optimization method based on resource reuse
CN103795644A (en) * 2014-01-27 2014-05-14 福建星网锐捷网络有限公司 Strategy table entry collocation method, device and system
CN104035928A (en) * 2013-03-04 2014-09-10 杭州华三通信技术有限公司 TCAM (telecommunication access method) table space recovery method and device
US20150262668A1 (en) * 2014-02-12 2015-09-17 Texas Instruments Incorporated Tcam providing efficient move contents operation
CN105704037A (en) * 2015-12-31 2016-06-22 北京华为数字技术有限公司 Table item storage method and controller
CN108512782A (en) * 2017-02-24 2018-09-07 华为数字技术(苏州)有限公司 Accesses control list is grouped method of adjustment, the network equipment and system
CN110120923A (en) * 2019-05-13 2019-08-13 电子科技大学 A kind of stream rule conflict detection method based on Hash-Trie

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104035928A (en) * 2013-03-04 2014-09-10 杭州华三通信技术有限公司 TCAM (telecommunication access method) table space recovery method and device
CN103368851A (en) * 2013-07-22 2013-10-23 武汉烽火网络有限责任公司 Openflow flow table storage and optimization method based on resource reuse
CN103795644A (en) * 2014-01-27 2014-05-14 福建星网锐捷网络有限公司 Strategy table entry collocation method, device and system
US20150262668A1 (en) * 2014-02-12 2015-09-17 Texas Instruments Incorporated Tcam providing efficient move contents operation
CN105704037A (en) * 2015-12-31 2016-06-22 北京华为数字技术有限公司 Table item storage method and controller
CN108512782A (en) * 2017-02-24 2018-09-07 华为数字技术(苏州)有限公司 Accesses control list is grouped method of adjustment, the network equipment and system
CN110120923A (en) * 2019-05-13 2019-08-13 电子科技大学 A kind of stream rule conflict detection method based on Hash-Trie

Also Published As

Publication number Publication date
CN112270944B (en) 2022-10-21

Similar Documents

Publication Publication Date Title
JP3942617B2 (en) Computer resource management method for distributed processing system
US10511506B2 (en) Method and device for managing virtualized network function
CN111193744B (en) Firewall strategy inquiry and elastic expansion method, system, equipment and storage medium
JP2018518733A (en) File operation method and apparatus
WO2020224249A1 (en) Blockchain-based transaction processing method, device and apparatus, and storage medium
CN109525658A (en) A kind of production method, server, equipment, storage medium and operation system
CN110709819B (en) Managing multi-single tenant SaaS services
WO2012039053A1 (en) Method of managing computer system operations, computer system and computer-readable medium storing program
US7747750B1 (en) Method for reserving resources in a storage area network with selective capabilities
CN106802939B (en) Method and system for solving data conflict
CN108616424B (en) Resource scheduling method, computer equipment and system
CN103716383A (en) Method and device for accessing shared resources
CN110532197A (en) Method for recovering internal storage and device, electronic equipment, storage medium
JP2015170239A (en) index tree search method and computer
US20200053150A1 (en) Network topology templates for internal states of management and control planes
CN105282057B (en) Flow table updating method, controller and flow table analysis device
CN112650692A (en) Heap memory allocation method, device and storage medium
US20150278543A1 (en) System and Method for Optimizing Storage of File System Access Control Lists
CN112270944B (en) Table item management method and equipment
CN107770190B (en) Authority management method and device
CN109783196B (en) Virtual machine migration method and device
JPH10293695A (en) Dynamic reconfiguration system of logic computer system
CN115729702A (en) Application program memory configuration method, electronic device and computer storage medium
CN108628925B (en) Method for writing key and method for using key
CN114157569A (en) Cluster system and construction method and construction device thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20230620

Address after: 310052 11th Floor, 466 Changhe Road, Binjiang District, Hangzhou City, Zhejiang Province

Patentee after: H3C INFORMATION TECHNOLOGY Co.,Ltd.

Address before: 310052 Changhe Road, Binjiang District, Hangzhou, Zhejiang Province, No. 466

Patentee before: NEW H3C TECHNOLOGIES Co.,Ltd.