CN112270944A - Table item management method and equipment - Google Patents
Table item management method and equipment Download PDFInfo
- Publication number
- CN112270944A CN112270944A CN202011047359.6A CN202011047359A CN112270944A CN 112270944 A CN112270944 A CN 112270944A CN 202011047359 A CN202011047359 A CN 202011047359A CN 112270944 A CN112270944 A CN 112270944A
- Authority
- CN
- China
- Prior art keywords
- block
- access control
- control table
- application
- table entry
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C15/00—Digital stores in which information comprising one or more characteristic parts is written into the store and in which information is read-out by searching for one or more of these characteristic parts, i.e. associative or content-addressed stores
- G11C15/04—Digital stores in which information comprising one or more characteristic parts is written into the store and in which information is read-out by searching for one or more of these characteristic parts, i.e. associative or content-addressed stores using semiconductor elements
Abstract
The application provides a table entry management method and device. The table entry management method comprises the following steps: acquiring a first access control table item to be dynamically configured; identifying a first application associated with a first access control table entry; determining that each block has been allocated to other applications; identifying a plurality of blocks in the ternary content addressable memory, wherein the blocks store non-conflicting access control table entries; moving an access control table entry stored by a block with a low priority in the plurality of identified blocks to a block with a highest priority in the plurality of identified blocks, and releasing more than one block; allocating the highest priority block to the application associated with the access control table entry moved to the highest priority block; allocating one of the released blocks to a first application; the first access control table entry is stored in a block allocated to the first application.
Description
Technical Field
The present application relates to communication technologies, and in particular, to a method and an apparatus for entry management.
Background
TCAM (Triple Content Addressed Memory) can be divided into a plurality of blocks in hardware/logic, and each block stores an ACL (Access Control List) entry. And by the fuzzy searching function realized by the mask, whether the matching item of each ACL is matched with the message is searched in parallel among a plurality of blocks. The preceding rules are preferably validated when a block can host one or more ACL applications.
When ACL entries required to be searched by different applications are stored in the same block, the storage position of the ACL entries with high effective priority is in front. When ACL entries required to be searched by different applications are stored in different blocks, each block can have one ACL entry effective, action items (action fields) of the effective ACL entries of the blocks can be superposed to take effect, and the action items of the ACL entries with high action priority take effect preferentially; if the action priorities of the action items of the ACL entries of different block entries are the same and cannot be superposed to be effective, the ACL entries with the same matching items and the same action priorities cannot be stored in one block because the ACL entries cannot be superposed to be effective and conflict with each other. However, blocks of the TCMA are limited, and when an application corresponding to an ACL to be dynamically configured has no allocable blocks and thus Block resources are insufficient, an ACL entry that needs to be dynamically configured to the switch chip may fail to be configured.
Disclosure of Invention
The application aims to provide a table entry management method and device, which can avoid the failure of configuration of a dynamic access control table entry caused by insufficient block storage resources in a ternary content addressable memory.
In order to achieve the above object, the present application provides a method for managing table entries, where the method further includes: acquiring a first access control table item to be dynamically configured; identifying a first application associated with a first access control table entry; determining that each block has been allocated to other applications; identifying a plurality of blocks in the ternary content addressable memory, wherein the blocks store non-conflicting access control table entries; moving an access control table entry stored by a block with a low priority in the plurality of identified blocks to a block with a highest priority in the plurality of identified blocks, and releasing more than one block; allocating the highest priority block to the access control table entry moved to the highest priority block; allocating one of the released blocks to a first application; the first access control table entry is stored in a block allocated to the first application.
In order to achieve the above object, the present application further provides an entry management device, which includes a processor and a memory; the memory is used for storing processor executable instructions; wherein the processor is configured to perform the following by executing the processor-executable instructions in the memory: acquiring a first access control table item to be dynamically configured; identifying a first application associated with a first access control table entry; determining that each block has been allocated to other applications; identifying a plurality of blocks in the ternary content addressable memory, wherein the blocks store non-conflicting access control table entries; moving an access control table entry stored by a block with a low priority in the plurality of identified blocks to a block with a highest priority in the plurality of identified blocks, and releasing more than one block; allocating the highest priority block to the application associated with the access control table entry moved to the highest priority block; allocating one of the released blocks to a first application; the first access control table entry is stored in a block allocated to the first application.
The method and the device have the advantages that the ACL table items of the applications which are not conflicted are combined in one block, block resources are saved, the ACL table which needs to be dynamically configured is stored in the released block, and the problem that the block which can be allocated to the new application cannot be allocated due to insufficient block resources to cause configuration failure is avoided.
Drawings
Fig. 1 is a flowchart of an entry management method provided in the present application;
FIG. 2 is a diagram of a first embodiment of a merged block storage resource provided herein;
FIG. 3 is a diagram of a second embodiment of a merged block memory resource provided by the present application;
FIG. 4 is a diagram of a third embodiment of a merged block memory resource provided by the present application;
FIG. 5 is a diagram of a second embodiment of a merged block memory resource provided by the present application;
fig. 6 is a schematic diagram of an entry management device provided in the present application.
Detailed Description
A detailed description will be given of a number of examples shown in a number of figures. In the following detailed description, numerous specific details are set forth in order to provide a thorough understanding of the present application. Well-known methods, procedures, components and circuits have not been described in detail so as not to obscure the examples.
The term "including" as that term is used is meant to include, but is not limited to; the term "comprising" means including but not limited to; the terms "above," "within," and "below" include the instant numbers; the terms "greater than" and "less than" mean that the number is not included. The term "based on" means based on at least a portion thereof.
At step 102, a first application associated with a first access control table entry is identified.
And 103, determining that each block is allocated to other applications.
At step 104, a plurality of blocks in the TCMA in which non-conflicting access control entries are stored are identified.
When the stored non-superposition effective ACL entries of the plurality of access control entries are different, the matching fields of the matching entries of the ACL entries stored in different blocks are different, and the blocks are identified as the blocks storing the non-conflict access control entries. When the ACL entries which are stored in the plurality of access control entry are superposed to be effective, the matching fields of the matching entries of the ACL entries stored in different blocks are the same, but the action priorities corresponding to the action fields in the action entries are different, and then the blocks are identified to be the blocks which store the non-conflict access control entries.
And 105, moving the access control table entry stored by the block with the low priority among the plurality of identified blocks to the block with the highest priority among the plurality of identified blocks, and releasing more than one block.
And 106, distributing the highest priority block to the application associated with the access control table entry moved to the highest priority block.
The embodiment shown in fig. 1 has the advantages that the ACL table entries of non-conflicting applications are combined into one block, so that block resources are saved, the ACL table required to be dynamically configured is stored in the released block, and the problem that the block which can be allocated to a new application is not enough to cause configuration failure due to insufficient block resources is avoided.
Fig. 2 is a schematic diagram of a merged block storage resource according to a first embodiment of the present disclosure. In fig. 2, the TCAM of the communication device includes four blocks, block1 and block4, respectively. Block1 stores ACL table entry ACLa 1-an of application a, and Block2 stores ACL table entry b1-bm of application b; block3 stores ACL table entry c1-cx of application c; block4 stores ACL entry d1-dy for application d.
When the communication device needs the ACL entry f1 of the application f, it is determined that all blocks have been allocated applications and there are no block resources that can be allocated to the application f. Based on the method shown in fig. 1, it is first identified that adjacent blocks 1 and 2 store conflicting ACL entries (e.g., ACL entries that match the same items and do not require superposition validation, or ACL entries that match the same items and have the same action priority for the action items and take validation on superposition), the ACL entries of block1 and block2 are not merged.
Whether the adjacent blocks have conflict ACLs or not is firstly identified, and whether the adjacent blocks have the conflict ACLs or not can be combined. In this application, adjacent blocks refer to blocks with similar priorities.
The communication device then identifies that block2 and block3 store conflicting ACL entries, then block1 and block3 store non-conflicting ACL entries (e.g., ACL entries that do not require overlay validation that match different entries or overlay validation ACL entries that match the same entry but have different action priorities for the action items) and block1 has a higher priority. The communication equipment stores ACL table entries c1-cx of block3 into block1, deletes ACL table entries c1-cx of application c stored by block3, and moves ACL table entries of application c stored by block3 to block 1.
Then, the communication device recognizes that block2 and block4 store conflicting ACL entries, recognizes that block1 and block4 store non-conflicting ACL entries and that block1 has a higher priority, stores ACL entry d1-dy of block4 to block1, deletes ACL entry d1-dy of application d stored by block4, and moves ACL entry of application d stored by block4 to block 1.
The communication device assigns block3 to application f and configures ACL entry f1 in block3 as shown in fig. 2.
3-5 are embodiments of resolving an ACL entry conflict when an ACL entry conflict occurs when block1 configures an ACL phenotype after merging based on the embodiment shown in FIG. 2.
In fig. 3. When the communication equipment needs to configure an application ACL entry dy +1, identifying an application d associated with the ACL entry d y + 1; it is determined that block1 has allocated application d.
When the communication equipment compares ACL entry dy +1 with ACL entries already stored by block1, it is determined that block1 stores conflicting ACL entries of ACL entry dy +1 (ACL entries of checking applications A and C); and allocating the released block4 to the application d, storing the ACL entry dy +1 in block4, storing the ACL entry d1-dy of the application d stored by block1 in block4, and deleting the ACL entry d1-dy of the application d stored by block1, thereby moving the ACL entry d1-dy of the application d stored by block1 to block 4.
In fig. 4, when the communication device determines that block1 stores a conflicting ACL entry of dy +1 of an ACL entry, it determines that ACL entry f1 stored by block3 does not conflict with dy +1 of the ACL entry, block3 is allocated to application d, dy +1 of the ACL entry is stored in block3, ACL entry d1-dy of application d stored by block1 is stored in block4, ACL entry d1-dy of application d stored by block1 is deleted, and thereby ACL entry d1-dy of application d stored by block1 is moved to block 3.
In fig. 5, when it is determined that block1 stores the conflicting ACL entries of dy +1 of ACL entries, it is determined that the ACL entries of application a and application c stored in block1 are non-conflicting entries with ACL entry f1, block3 is allocated to applications a and c, the ACL entries of applications a and c stored in block1 are stored in block4, the ACL entries of applications a and c stored in block1 are deleted, and the ACL entries of applications a and c already stored in block1 are moved to block3 by the communications device.
The static ACL entry layout in the TCAM of the device is determined by the software version. In implementing the present application, the inventor also noticed that different users may need different static ACL layouts based on their own network traffic requirements, and thus special versions need to be developed for users to meet the static ACL layouts. The more user demands, the more customized development of software versions of the communication device is required.
In the application, the communication device can execute the response operation according to the input static configuration ACL control instruction. For example, the switch inputs a block priority configuration command indicating a block to be configured and a priority to be modified through a remote network manager or a local input interface (keyboard, touch screen); and the communication equipment modifies the priority of the block to be configured based on the acquired block priority configuration command. Such as; the communication equipment receives the command of obtaining the static table item configuration; the static table entry configuration command indicates a block before movement, a storage position before movement, a block after movement and a storage position after movement; and based on the static table item configuration command, moving the static access control table items to be moved stored in the storage position before the block is moved to the storage position after the block is moved.
Therefore, the communication equipment can flexibly modify the priority of the blocks according to different static configuration commands and flexibly move the ACL entries which are statically configured and moved among different blocks.
Fig. 6 is a schematic diagram of an embodiment of the table entry management device provided in the application, where the device 60 includes a switch chip, a processor, and a memory for forwarding a network packet; the memory is to store processor-executable instructions. The processor is operable by executing processor-executable instructions in the memory to perform the following: acquiring a first access control table item to be dynamically configured; identifying a first application associated with a first access control table entry; determining that each block has been allocated to other applications; identifying a plurality of blocks in the ternary content addressable memory, wherein the blocks store non-conflicting access control table entries; moving an access control table entry stored by a block with a low priority in the plurality of identified blocks to a block with a highest priority in the plurality of identified blocks, and releasing more than one block; allocating the highest priority block to the application associated with the access control table entry moved to the highest priority block; allocating one of the released blocks to a first application; the first access control table entry is stored in a block allocated to the first application.
The processor, by executing the processor-executable instructions in the memory, further performs the following: acquiring a second access control table item to be configured; identifying a second application associated with a second access control table entry; determining that a highest priority block has been allocated to the second application; determining a conflict access control table entry of a second access control table entry stored in the block with the highest priority; and allocating an unallocated block of the released blocks to the second application, storing the second access control table entry in the block allocated to the second application, and moving the access control table entry of the second application, which has been stored in the block with the highest priority, to the block allocated to the second application.
The processor, by executing the processor-executable instructions in the memory, further performs the following: acquiring a second access control table item to be configured; identifying a second application associated with a second access control table entry; determining that a second application has been assigned to a highest priority block; determining a conflict access control table entry of a second access control table entry stored in the block with the highest priority; determining that a block allocated to the first application stores a conflicting entry for a second access control entry; and allocating the second application to the block of the first application and storing the second access control table entry in the block allocated to the first application, and moving the access control table entry of the second application, which has been stored by the highest priority block, to the block allocated to the first application.
The processor, by executing the processor-executable instructions in the memory, further performs the following: acquiring a second access control table item to be configured; identifying a second application associated with a second access control table entry; determining that a second application has been assigned to a highest priority block; determining a conflict access control table entry of a second access control table entry stored in the highest priority block; and determining that the access control table entries of the other applications stored in the highest priority block are non-conflict table entries of the first access control table entry, distributing the block of the first application to the other applications, and moving the access control table entries of the other applications stored in the highest priority block to the block of the first application.
The processor, by executing the processor-executable instructions in the memory, further performs the following: acquiring a block priority configuration command carrying an indication to-be-configured block and a to-be-modified priority; modifying the priority of the block to be configured based on the block priority configuration command; acquiring a static table item configuration command; the static table entry configuration command indicates a block before movement, a storage position before movement, a block after movement and a storage position after movement; and based on the static table item configuration command, moving the static access control table items to be moved stored in the storage position before the block is moved to the storage position after the block is moved.
The above description is only exemplary of the present application and should not be taken as limiting the present application, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present application should be included in the scope of protection of the present application.
Claims (10)
1. A method for entry management, the method further comprising:
acquiring a first access control table item to be dynamically configured;
identifying a first application associated with the first access control table entry;
determining that each block has been allocated to other applications;
identifying a plurality of blocks in the ternary content addressable memory, wherein the blocks store non-conflicting access control table entries;
moving an access control table entry stored by a block with a low priority in the plurality of identified blocks to a block with a highest priority in the plurality of identified blocks, and releasing more than one block;
assigning the highest priority block to an application associated with an access control entry moved to the highest priority block;
allocating one of the released blocks to the first application;
storing the first access control table entry in a block allocated to the first application.
2. The method of claim 1, further comprising:
acquiring a second access control table item to be configured;
identifying a second application associated with the second access control table entry;
determining that the second application has been assigned to the highest priority block;
determining a conflict access control table entry of the second access control table entry stored in the highest priority block;
and allocating an unallocated block of the released blocks to the second application, storing the second access control table entry in the block allocated to the second application, and moving the access control table entry of the second application, which is stored in the highest priority block, to the block allocated to the second application.
3. The method of claim 1, further comprising:
acquiring a second access control table item to be configured;
identifying a second application associated with the second access control table entry;
determining that the second application has been assigned to the highest priority block;
determining a conflict access control table entry of the second access control table entry stored in the highest priority block;
determining that a block allocated to the first application stores a conflicting entry for the second access control entry;
and allocating the block of the first application to a second application and storing the second access control table entry in the block allocated to the first application, and moving the access control table entry of the second application, which is stored by the highest priority block, to the block allocated to the first application.
4. The method of claim 1, further comprising:
acquiring a second access control table item to be configured;
identifying a second application associated with the second access control table entry;
determining that the second application has been assigned to the highest priority block;
determining a conflict access control table entry of the second access control table entry stored in the highest priority block;
determining that the access control table entry of the other application stored by the highest priority block is a non-conflict table entry of the first access control table entry, allocating the block of the first application to the other application, and moving the access control table entry of the second application stored by the highest priority block by the block allocated to the first application.
5. The method of claim 1, further comprising:
acquiring a block priority configuration command carrying an indication to-be-configured block and a to-be-modified priority;
modifying the priority of the block to be configured based on the block priority configuration command; acquiring a static table item configuration command; wherein the static table entry configuration command indicates a block before movement, a storage location before movement, a block after movement and a storage location after movement;
and based on the static table item configuration command, moving the static access control table items to be moved stored in the storage position before the movement of the block to the storage position after the movement of the block after the movement.
6. An entry management device, comprising a processor and a memory; the memory is to store processor-executable instructions; wherein the processor, by executing the processor-executable instructions in the memory, is to perform operations comprising:
acquiring a first access control table item to be dynamically configured;
identifying a first application associated with the first access control table entry;
determining that each block has been allocated to other applications;
identifying a plurality of blocks in the ternary content addressable memory, wherein the blocks store non-conflicting access control table entries;
moving an access control table entry stored by a block with a low priority in the plurality of identified blocks to a block with a highest priority in the plurality of identified blocks, and releasing more than one block;
assigning the highest priority block to an application associated with an access control entry moved to the highest priority block;
allocating one of the released blocks to the first application;
storing the first access control table entry in a block allocated to the first application.
7. The device of claim 6, wherein the processor, by executing the processor-executable instructions in the memory, further performs the following:
acquiring a second access control table item to be configured;
identifying a second application associated with the second access control table entry;
determining that the second application has been assigned to the highest priority block;
determining that the highest priority block stores the conflict access control table entry of the second access control table entry;
and allocating an unallocated block of the released blocks to the second application, storing the second access control table entry in the block allocated to the second application, and moving the access control table entry of the second application, which is stored in the highest priority block, to the block allocated to the second application.
8. The device of claim 6, wherein the processor, by executing the processor-executable instructions in the memory, further performs the following:
acquiring a second access control table item to be configured;
identifying a second application associated with the second access control table entry;
determining that the second application has been assigned to the highest priority block;
determining that the highest priority block stores the conflict access control table entry of the second access control table entry;
determining that a block allocated to the first application stores a conflicting entry for the second access control entry;
and allocating the block of the first application to a second application allocation and storing the second access control table entry in the block allocated to the first application, and moving the access control table entry of the second application, which is stored by the highest priority block, to the block allocated to the first application.
9. The device of claim 6, wherein the processor, by executing the processor-executable instructions in the memory, further performs the following:
acquiring a second access control table item to be configured;
identifying a second application associated with the second access control table entry;
determining that the second application has been assigned to the highest priority block;
determining a conflict access control table entry of the second access control table entry stored in the highest priority block;
and determining that the access control table entries of other applications stored in the highest priority block are non-conflict table entries of the first access control table entry, distributing the block of the first application to the other applications, and moving the access control table entries of the other applications stored in the highest priority block to the block of the first application.
10. The device of claim 6, wherein the processor, by executing the processor-executable instructions in the memory, further performs the following:
acquiring a block priority configuration command carrying an indication to-be-configured block and a to-be-modified priority;
modifying the priority of the block to be configured based on the block priority configuration command;
acquiring a static table item configuration command; wherein the static table entry configuration command indicates a block before movement, a storage location before movement, a block after movement and a storage location after movement;
and based on the static table item configuration command, moving the static access control table items to be moved stored in the storage position before the movement of the block to the storage position after the movement of the block after the movement.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011047359.6A CN112270944B (en) | 2020-09-29 | 2020-09-29 | Table item management method and equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011047359.6A CN112270944B (en) | 2020-09-29 | 2020-09-29 | Table item management method and equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112270944A true CN112270944A (en) | 2021-01-26 |
CN112270944B CN112270944B (en) | 2022-10-21 |
Family
ID=74349395
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011047359.6A Active CN112270944B (en) | 2020-09-29 | 2020-09-29 | Table item management method and equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112270944B (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103368851A (en) * | 2013-07-22 | 2013-10-23 | 武汉烽火网络有限责任公司 | Openflow flow table storage and optimization method based on resource reuse |
CN103795644A (en) * | 2014-01-27 | 2014-05-14 | 福建星网锐捷网络有限公司 | Strategy table entry collocation method, device and system |
CN104035928A (en) * | 2013-03-04 | 2014-09-10 | 杭州华三通信技术有限公司 | TCAM (telecommunication access method) table space recovery method and device |
US20150262668A1 (en) * | 2014-02-12 | 2015-09-17 | Texas Instruments Incorporated | Tcam providing efficient move contents operation |
CN105704037A (en) * | 2015-12-31 | 2016-06-22 | 北京华为数字技术有限公司 | Table item storage method and controller |
CN108512782A (en) * | 2017-02-24 | 2018-09-07 | 华为数字技术(苏州)有限公司 | Accesses control list is grouped method of adjustment, the network equipment and system |
CN110120923A (en) * | 2019-05-13 | 2019-08-13 | 电子科技大学 | A kind of stream rule conflict detection method based on Hash-Trie |
-
2020
- 2020-09-29 CN CN202011047359.6A patent/CN112270944B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104035928A (en) * | 2013-03-04 | 2014-09-10 | 杭州华三通信技术有限公司 | TCAM (telecommunication access method) table space recovery method and device |
CN103368851A (en) * | 2013-07-22 | 2013-10-23 | 武汉烽火网络有限责任公司 | Openflow flow table storage and optimization method based on resource reuse |
CN103795644A (en) * | 2014-01-27 | 2014-05-14 | 福建星网锐捷网络有限公司 | Strategy table entry collocation method, device and system |
US20150262668A1 (en) * | 2014-02-12 | 2015-09-17 | Texas Instruments Incorporated | Tcam providing efficient move contents operation |
CN105704037A (en) * | 2015-12-31 | 2016-06-22 | 北京华为数字技术有限公司 | Table item storage method and controller |
CN108512782A (en) * | 2017-02-24 | 2018-09-07 | 华为数字技术(苏州)有限公司 | Accesses control list is grouped method of adjustment, the network equipment and system |
CN110120923A (en) * | 2019-05-13 | 2019-08-13 | 电子科技大学 | A kind of stream rule conflict detection method based on Hash-Trie |
Also Published As
Publication number | Publication date |
---|---|
CN112270944B (en) | 2022-10-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP3942617B2 (en) | Computer resource management method for distributed processing system | |
US10511506B2 (en) | Method and device for managing virtualized network function | |
CN111193744B (en) | Firewall strategy inquiry and elastic expansion method, system, equipment and storage medium | |
JP2018518733A (en) | File operation method and apparatus | |
WO2020224249A1 (en) | Blockchain-based transaction processing method, device and apparatus, and storage medium | |
CN109525658A (en) | A kind of production method, server, equipment, storage medium and operation system | |
CN110709819B (en) | Managing multi-single tenant SaaS services | |
WO2012039053A1 (en) | Method of managing computer system operations, computer system and computer-readable medium storing program | |
US7747750B1 (en) | Method for reserving resources in a storage area network with selective capabilities | |
CN106802939B (en) | Method and system for solving data conflict | |
CN108616424B (en) | Resource scheduling method, computer equipment and system | |
CN103716383A (en) | Method and device for accessing shared resources | |
CN110532197A (en) | Method for recovering internal storage and device, electronic equipment, storage medium | |
JP2015170239A (en) | index tree search method and computer | |
US20200053150A1 (en) | Network topology templates for internal states of management and control planes | |
CN105282057B (en) | Flow table updating method, controller and flow table analysis device | |
CN112650692A (en) | Heap memory allocation method, device and storage medium | |
US20150278543A1 (en) | System and Method for Optimizing Storage of File System Access Control Lists | |
CN112270944B (en) | Table item management method and equipment | |
CN107770190B (en) | Authority management method and device | |
CN109783196B (en) | Virtual machine migration method and device | |
JPH10293695A (en) | Dynamic reconfiguration system of logic computer system | |
CN115729702A (en) | Application program memory configuration method, electronic device and computer storage medium | |
CN108628925B (en) | Method for writing key and method for using key | |
CN114157569A (en) | Cluster system and construction method and construction device thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20230620 Address after: 310052 11th Floor, 466 Changhe Road, Binjiang District, Hangzhou City, Zhejiang Province Patentee after: H3C INFORMATION TECHNOLOGY Co.,Ltd. Address before: 310052 Changhe Road, Binjiang District, Hangzhou, Zhejiang Province, No. 466 Patentee before: NEW H3C TECHNOLOGIES Co.,Ltd. |