CN1538663A - Method of finding route table item using ltsh chain table - Google Patents
Method of finding route table item using ltsh chain table Download PDFInfo
- Publication number
- CN1538663A CN1538663A CNA031098789A CN03109878A CN1538663A CN 1538663 A CN1538663 A CN 1538663A CN A031098789 A CNA031098789 A CN A031098789A CN 03109878 A CN03109878 A CN 03109878A CN 1538663 A CN1538663 A CN 1538663A
- Authority
- CN
- China
- Prior art keywords
- list item
- search
- route table
- hash
- table items
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The method of searching routing table by Hash chained list includs such steps as Carrying out logic operation for segmented 48 bits address in media access control (MAC) layer obtains result as index to constitute table in first stage in Hash table. All MAC addresses with same content in table in first stage are attached back of table in first stage by using chain table format as route table of table item in second stage. Route forwarding table in second layer of MAC layer is searched based on indexing table in first and second stages. In the method 48 bits MAC address is divided into three addresses with 16 bits, and logic operation is exclusive or operation. The Advantages of the method are simple, reducing memory needed and improving searching efficiency.
Description
Technical field
The present invention relates to a kind of method of in switch, searching route table items, exactly, relate to the method that a kind of employing Hash (Hash) chained list is searched route table items, belong to the data switching networks technical field.
Background technology
In Layer 2 switch, when the study that realizes two layers of route, forwarding and corresponding multicast forwarding function, in order to improve the efficient of routing forwarding, to the most employing of searching of big capacity route table items Hash storage lookup method; Just: set up a firsts and seconds Hash look-up table as routing index, realize 48 media access control layer (MAC, Medium Access Control Layer) address and two layers of route table items is corresponding one by one, can find the two layers of route forwarding table and the corresponding multicast forwarding filter table of media access control layer according to this index.The time that Hash searches and the complexity in space are one of key factors that influences two layers of routing forwarding efficient.At present the Hash lookup method that adopts uses is lookup method step by step, when the skewness of the address of media access control layer, can expend a large amount of internal memories.
Fig. 1 has showed the schematic diagram that the HASH table of present employing is searched step by step.Hash among Fig. 1 lookup method has step by step only illustrated successively to search the process that list item is searched of finishing by the secondary of one-level concordance list and secondary index table.Wherein so-called one-level concordance list is 16 compositions that hang down with the Mac address, 64K (2 altogether
16) individual list item, every layer secondary index table is then by hang down one 16 (2 that 16 high 4 (i.e. 17-20 positions) are before formed in the Mac address
4) the less table of individual list item.When searching, at first low 16 according to the Mac address search one-level Hash concordance list, if no conflict occurred, be its low 16 bit address differences, then carry out subsequent treatment, normally directly change the address port table of corresponding secondary list item over to according to the address of the appropriate address port routing table of this one-level list item storage.If should hang down 16 identical (being referred to as " conflict " usually), so just continue to search and mate than the secondary list item of higher 4 (i.e. 17-20 positions), if find the list item of coupling, then carry out subsequent treatment according to the address of corresponding two layers of port routing table of secondary list item storage.If also can not find the list item of coupling, then need to trace back again higher 4 (i.e. 21-24 position) form, size also is 16 (2
4) the secondary index table (or being referred to as three grades of concordance lists) of individual list item proceeds coupling, till the list item that finds a coupling.That is to say that each one-level index list item can expand to the secondary index table of 16 high 4 addresses in conflict, the structure of this secondary index list item and one-level concordance list are identical, and every layer of secondary index look-up table can mate 4 searching; If occur this conflict of 4 again, descend the coupling of three grades of concordance lists of one deck so again, so circulation is searched, till finding.Like this, in the worst case, if have only its highest 4 (i.e. 45-48 position) difference in two Mac addresses, just need carry out in proper order secondary, three grades ... searching of nine grades of index list items, just need to set up (48-16)/4+1=9 level index list item altogether and carry out matching ratio, will have a large amount of space wastes like this.
Below shown in table 1 be exactly the look-up table of one-level HASH index list item.
63 | … | ?16 | ?15 | ?14 | ?13 | ?12 | ?11 | ?10 | ?9 | ?8 | ?7 | ?6 | ?5 | ?4 | ?3 | ?2 | ?1 | ?0 | |
?0 | ?????Rev. | ??????????????????????????????????Index(i) |
The present Hash that uses lookup method resource needed step by step is calculated as follows: the one-level concordance list uses 16 and searches, and the resource that needs is: (64K * 8) individual byte; 4 of the each uses of secondary index table are searched, and resource that each table needs is: (16 * 8) individual byte.Suppose in system, can support at most the study and the forwarding of N two layers of route table items.Under best-case, Mac address in the network evenly distributes, list items all in the one-level concordance list are all utilized, and the list item in the secondary index table of the time expansion of at every turn conflicting also all utilizes, be that the neither one list item is idle (certainly, this ideal situation almost is impossible occur in actual life).Like this, the memory source of Hash table needs is:
The resource that one-level Hash concordance list is required: 64K * 8=512K (byte)
The resource that secondary Hash concordance list is required: N * 8=8N (byte)
Amount to: (512K+8N) byte.
And under worst case, the Mac address distributed pole in the network is inhomogeneous, all Mac addresses low 16 all identical, cause the list item utilance in the one-level concordance list extremely low, promptly only used one.In order to find the Mac address of a coupling, have to repeatedly carry out high 4 and trace back matched and searched.When expanding to the secondary index list item for the first time, the order of magnitude of its secondary index list item is 16.Afterwards, whenever trace back once, its order of magnitude all will multiply by 16, and can trace back 8 times at most, so its order of magnitude can reach 16 at most
8=2
32If great majority are again useless in the secondary index list item of each expansion, will waste a large amount of spaces; And, (being the higher bit of Mac address) more to the end, the space of waste is big more.Usually, when the Mac address distributes very concentratedly, promptly low when repeating than very large amount, this situation will appear.Like this, the memory source that the Hash table needs is: one-level Hash shows resource requirement: 64K * 8=512K (byte),
Secondary Hash shows the space (order of magnitude 2 of resource requirement: N * 8 (byte)+a large amount of wastes
31* 8 bytes).
As can be seen from the above analysis, the Hash disadvantage of lookup method step by step is that the waste in space is quite serious, especially in the Mac address time pockety.
Summary of the invention
The purpose of this invention is to provide the method that a kind of Hash of employing chained list is searched route table items, be used for substituting original lookup method step by step,, do not reduce search efficiency simultaneously so that can save memory headroom significantly.
The object of the present invention is achieved like this: a kind of Hash of employing chained list is searched the method for route table items, it is characterized in that: this method be the result that will carry out respectively obtaining after the logical operation after 48 media access control layer (Mac) the address segmentation as index, form the one-level list item of Hash table; All again that the one-level contents in table is identical Mac addresses promptly adopt the address segmentation to carry out all addresses that come to the same thing after the logical operation respectively, adopt the chain sheet form to be articulated in after the one-level list item, as the routing table of secondary list item; Then, search two layers of route forwarding table of media access control layer according to this secondary index table.
Described Mac address segmentation with 48 is that these 48 Mac addresses are divided into three each 16 bit address.
Described logical operation is an XOR.
Described chain sheet form is meant: after utilizing all Mac addresses the address segmentation to carry out logical operation respectively, its all route table items that come to the same thing are linked in sequence by flag bit and pointer, form the table of a chain.
Described flag bit in the described route table items is the tail tag note, and whether be used to identify current route table items is the chained list tail, promptly whether also has other effective list item in the back of current route table items; Described pointer is back to pointer, is used at chained list search procedure middle finger to the effective secondary list item of the next one.
Described flag bit in the described route table items also comprises labeling head, and whether be used to identify current route table items is linked list head, promptly whether also has other effective list item in the front of current route table items; Described pointer comprises forwarding pointer, is used at chained list search procedure middle finger to previous effective secondary list item.
The number of the one-level list item of described Hash table has 64K at most, based on the actual needs of networking and the consideration of systemic price ratio, can only use 16K.
The concrete operations step of this method is:
A, set up the index of one-level list item, its method is to get high, medium and low each 16 of Mac address to carry out XOR respectively, with 16 of final result as the index of searching the secondary list item;
B, set up secondary list item-routing table, its method is each Mac address that all the elements in each one-level list item are identical, adopt the chain sheet form be linked in sequence as and the corresponding secondary list item of this one-level list item;
C, high, medium and low each 16 of certain Mac address that will need to seek route table items carry out XOR respectively,, search at the one-level list item as index with 16 of its final result;
If the corresponding one-level contents in table that D finds is an illegal value, then this searches failure;
If the corresponding one-level contents in table that E finds is a legal value, be index then with this value, search the secondary list item;
The content of certain the secondary list item that finds among F, the read step E, whether Mac address wherein is identical with given Mac address, if both are identical, then searches successfully; Otherwise, with back in certain the secondary list item that finds in the step e to pointer as index, search the next secondary list item in this chained list;
G, execution in step F repeatedly are to search the secondary list item identical with given Mac address; If up to the chained list tail of this chained list, do not find the Mac address in the secondary list item identical with given Mac address yet, then this searches failure.
The one-level contents in table is an illegal value among the described step D, represents that this one-level contents in table does not have corresponding secondary list item, can't continue to search; The numerical characteristics of this illegal value should be provided with or stipulate in advance.
The present invention is a kind of new Hash memory contents and method of searching route table items in the chained list mode of adopting, the lookup method step by step that this method is overall with traditional is the same, the pattern that also is to use a secondary to search, when its main distinction is that secondary is searched, the secondary list item is not to adopt step by step to search, but adopts the chain sheet form to search.In addition, definition to one-level list item and secondary list item is also different: the definition of one-level list item is: adopt the address segmentation method to carry out logical operation respectively to the Mac address earlier, for example high, medium and low each 16 bit with the Mac address carry out XOR, then with 16 of the final results that obtain as index, make up size and be the one-level Hash store look-up tables of 64K (can be reduced to 16K).The composition of secondary list item is all Mac addresses (for example all Mac addresses that come to the same thing behind high, medium and low each the 16 bit address XOR with the Mac address) that the one-level contents in table is identical, adopt the form of chained list to be articulated in one-level list item back, the relevant pointer of searching is provided simultaneously.Consequently, improve the efficient of searching in order to reduce the possibility of conflict to greatest extent.
The great advantage of Hash chained list lookup method of the present invention is to have saved taking of memory source greatly.Simple computation is as follows: search if the one-level list item uses 16, needing resource is (64K * 8) individual byte, the secondary list item does not use independent index, just in two layers of exchange routing table, increase by 8 bytes, be used to store two flag bits and two pointers, so that set up two layers of two-way search chained list between each list item in the exchange routing table.Wherein forwarding pointer and back take two bytes respectively to pointer, and each flag bit respectively takies a bit, and remaining 30 bits then conduct are standby when function will be expanded from now on.Equally, suppose in system, to support at most the study and the forwarding of N two layers of route table items.Then setting up Hash table required memory resource is:
One-level Hash shows resource requirement: 64K * 8=512K (byte)
Secondary Hash shows resource requirement: N * 8=8N (byte)
Amount to: (512K+8N) byte.
The analysis of contrast front as can be known, the required memory source of the lookup method of Hash chained list of the present invention equals the ideal situation of lookup method step by step, (promptly carry out 4 couplings and trace back and search 4 times, the order of magnitude in the space of average waste is 2 than the latter's average case
15* 8 bytes, therefore, the total space resource cost is: 512K+8N+2
15* 8 bytes) order of magnitude of the memory headroom of Jie Shenging is 2
15* 8 bytes.Suppose N=64K, then the space proportion of Jie Shenging approximately is 25%.
From search efficiency, the method that chained list lookup method of the present invention has used the address segmentation to carry out logical operation, evenly disperseed the distribution of Mac address, reduced the possibility of conflict to greatest extent, made that the number of the secondary list item that each one-level list item back is hung is fewer.Suppose N=64K, then two layers of converting route of great majority can find in 1 to 2 time.Like this, to search algorithm be identical on the order of magnitude with the search efficiency of searching algorithm step by step to chained list.
Therefore, the advantage of the inventive method is that its implementation is simple, greatly reduces taking of memory source.Simultaneously, the search efficiency and the efficient of searching algorithm step by step are the same orders of magnitude.
Description of drawings
Fig. 1 is the schematic diagram of lookup method step by step of the HASH table of use now.
Fig. 2 is an embodiment schematic diagram of the chained list lookup method of HASH table of the present invention.
Fig. 3 is that the present invention adopts the Hash chained list to search an embodiment operating procedure flow chart of route table items.
Embodiment
Referring to Fig. 2, the present invention is the method that a kind of Hash of employing chained list is searched route table items, this method be the result that will carry out respectively obtaining after the logical operation after 48 media access control layer (Mac) the address segmentation as index, form the one-level list item of Hash table; All again that the one-level contents in table is identical Mac addresses, promptly adopt and carry out all addresses of coming to the same thing after the logical operation after the segmentation of address respectively, adopt the chain sheet form (just after carrying out logical operation respectively after all employing Mac address segmentations, its all route table items that come to the same thing are linked in sequence by flag bit and pointer, form the table of a chain.) be articulated in after the one-level list item, as the routing table of secondary list item; Then, search two layers of route forwarding table of media access control layer according to this secondary index table.
Wherein 48 Mac address being adopted the address segmentation method is that these 48 Mac addresses are divided into three each 16 bit address.And logical operation is an XOR.
Represented among Fig. 2 that two flag bit-labeling heads and tail tag in the route table items remember-take 1 bit respectively, whether they are used to identify this current route table items is linked list head h (being the abbreviation of head) and chained list tail t (being the abbreviation of tail), promptly whether also has other effective list item in the front and back of this current route table items.Labeling head h=1 in route table items represents that this route table items is a linked list head, does not have other effective list item in its front; And the labeling head h=0 in the route table items represents that this route table items is not a linked list head, also has other effective list item in its front.Tail tag note t=1 in route table items represents that this route table items is the chained list tail, does not have other effective list item in its back; And the note of the tail tag in route table items t=0 represents that this route table items is not the chained list tail, also has other effective list item in its back.Utilize among Fig. 2 h and t different numeric representations one-level list item Index0, Index1 and Index2 a secondary route table items, several secondary route table items and two secondary route table items are arranged respectively.
Fig. 2 has also showed back to pointer (being illustrated as next_pointer) in the route table items of the present invention, this pointer is used at chained list search procedure middle finger to the effective secondary list item of the next one, coming to the same thing behind the 16 bit address XORs of the result behind the 16 bit address XORs of the Mac address of the route table items that it is pointed and the Mac address of current list item.The function of forwarding pointer is identical to pointer with the back, omits among Fig. 2 and does not show it.
The number of the one-level list item of Hash table of the present invention can have 64K at most, based on the actual needs of networking and the consideration of systemic price ratio, can only use 16K, to simplify storage and search operation.
Referring to Fig. 3, the flowchart text of an embodiment concrete operations step of the inventive method is as follows:
A, set up the index of one-level list item, its method is to get high, medium and low each 16 of Mac address to carry out XOR respectively, with final result (16) as the index of searching the secondary list item;
B, set up secondary list item-routing table, its method is each Mac address that all the elements in each one-level list item are identical, adopt the chain sheet form be linked in sequence as and the corresponding secondary list item of this one-level list item;
C, high, medium and low each 16 of certain Mac address that will need to seek route table items carry out XOR respectively,, search at the one-level list item as index with its final result (16);
If the corresponding one-level contents in table that D finds is an illegal value, promptly this one-level contents in table does not have corresponding secondary list item, can't continue to search, and then this searches failure; The numerical characteristics of this illegal value should be provided with or stipulate in advance, for example judges with most significant bit numerical value, certain or some special values;
If the corresponding one-level contents in table that E finds is a legal value, be index then with this value, search the secondary list item;
The content of certain the secondary list item that finds among F, the read step E, whether Mac address wherein is identical with given Mac address, if both are identical, then searches successfully; Otherwise, with back in certain the secondary list item that finds in the step e to pointer (Next Pointer) as index, search the next secondary list item in this chained list;
G, execution in step F repeatedly are to search the secondary list item identical with given Mac address; If up to the chained list tail of this chained list, do not find the Mac address in the secondary list item identical with given Mac address yet, then this searches failure.
Claims (9)
1, a kind of Hash of employing chained list method of searching route table items is characterized in that: this method be the result that will carry out respectively obtaining after the logical operation after 48 media access control layer (Mac) the address segmentation as index, form the one-level list item of Hash table; All again that the one-level contents in table is identical Mac addresses promptly adopt the address segmentation to carry out all addresses that come to the same thing after the logical operation respectively, adopt the chain sheet form to be articulated in after the one-level list item, as the routing table of secondary list item; Then, search two layers of route forwarding table of media access control layer according to this secondary index table.
2, the method that adopts the Hash chained list to search route table items according to claim 1 is characterized in that: described Mac address segmentation with 48 is that these 48 Mac addresses are divided into three each 16 bit address.
3, the method that adopts the Hash chained list to search route table items according to claim 1, it is characterized in that: described logical operation is an XOR.
4, the method that adopts the Hash chained list to search route table items according to claim 1, it is characterized in that: described chain sheet form is meant: after utilizing all Mac addresses the address segmentation to carry out logical operation respectively, its all route table items that come to the same thing are linked in sequence by flag bit and pointer, form the table of a chain.
5, the method that adopts the Hash chained list to search route table items according to claim 4, it is characterized in that: the described flag bit in the described route table items is the tail tag note, whether be chained list tail, promptly whether also have other effective list item in the back of current route table items if being used to identify current route table items; Described pointer is back to pointer, is used at chained list search procedure middle finger to the effective secondary list item of the next one.
6, according to claim 4 or the 5 described methods that adopt the Hash chained lists to search route table items, it is characterized in that: the described flag bit in the described route table items also comprises labeling head, whether be linked list head, promptly whether also have other effective list item in the front of current route table items if being used to identify current route table items; Described pointer comprises forwarding pointer, is used at chained list search procedure middle finger to previous effective secondary list item.
7, the method that adopts the Hash chained list to search route table items according to claim 1 is characterized in that: the number of the one-level list item of described Hash table has 64K at most, based on the actual needs of networking and the consideration of systemic price ratio, can only use 16K.
8, according to claim 1 or the 2 or 3 described methods that adopt the Hash chained lists to search route table items, it is characterized in that: the concrete operations step of this method is:
A, set up the index of one-level list item, its method is to get high, medium and low each 16 of Mac address to carry out XOR respectively, with 16 of final result as the index of searching the secondary list item;
B, set up secondary list item-routing table, its method is each Mac address that all the elements in each one-level list item are identical, adopt the chain sheet form be linked in sequence as and the corresponding secondary list item of this one-level list item;
C, high, medium and low each 16 of certain Mac address that will need to seek route table items carry out XOR respectively,, search at the one-level list item as index with 16 of its final result;
If the corresponding one-level contents in table that D finds is an illegal value, then this searches failure; .
If the corresponding one-level contents in table that E finds is a legal value, be index then with this value, search the secondary list item;
The content of certain the secondary list item that finds among F, the read step E, whether Mac address wherein is identical with given Mac address, if both are identical, then searches successfully; Otherwise, with back in certain the secondary list item that finds in the step e to pointer as index, search the next secondary list item in this chained list;
G, execution in step F repeatedly are to search the secondary list item identical with given Mac address; If up to the chained list tail of this chained list, do not find the Mac address in the secondary list item identical with given Mac address yet, then this searches failure.
9, the method that adopts the Hash chained list to search route table items according to claim 8, it is characterized in that: the one-level contents in table is an illegal value among the described step D, represents that this one-level contents in table does not have corresponding secondary list item, can't continue to search; The numerical characteristics of this illegal value should be provided with or stipulate in advance.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB031098789A CN1319325C (en) | 2003-04-16 | 2003-04-16 | Method of finding route table item using ltsh chain table |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB031098789A CN1319325C (en) | 2003-04-16 | 2003-04-16 | Method of finding route table item using ltsh chain table |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1538663A true CN1538663A (en) | 2004-10-20 |
CN1319325C CN1319325C (en) | 2007-05-30 |
Family
ID=34319553
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB031098789A Expired - Fee Related CN1319325C (en) | 2003-04-16 | 2003-04-16 | Method of finding route table item using ltsh chain table |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN1319325C (en) |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100355245C (en) * | 2005-11-08 | 2007-12-12 | 东南大学 | Restoring method for source string of enhanced multiple Hash in use for system of intrusion detection |
CN100393072C (en) * | 2006-02-20 | 2008-06-04 | 杭州华三通信技术有限公司 | Method and apparatus for storing table entry, and inquiry method |
CN100401723C (en) * | 2005-10-13 | 2008-07-09 | 华为技术有限公司 | Fast indexing method |
WO2008101423A1 (en) * | 2007-02-16 | 2008-08-28 | Huawei Technologies Co., Ltd. | System and method for bridge connection |
CN100426791C (en) * | 2005-06-21 | 2008-10-15 | 中兴通讯股份有限公司 | Engine apparatus for route forwarding table address searching |
CN100496019C (en) * | 2005-11-10 | 2009-06-03 | 中国科学院计算技术研究所 | A method to quickly search and update IPv6 routing list |
CN101267381B (en) * | 2007-03-13 | 2010-12-29 | 大唐移动通信设备有限公司 | Operation method and device for Hash table |
CN101340386B (en) * | 2008-08-12 | 2011-08-10 | 华为技术有限公司 | Method and router for establishing and searching route table items |
CN101043428B (en) * | 2006-05-30 | 2012-05-02 | 华为技术有限公司 | Routing retransmitting method and system |
CN102571558A (en) * | 2010-11-30 | 2012-07-11 | 马维尔以色列(M.I.S.L.)有限公司 | Load balancing hash computation for network switches |
CN102739526A (en) * | 2012-06-13 | 2012-10-17 | 烽火通信科技股份有限公司 | Realization method of efficient distributed routing list realizing method |
CN102821052A (en) * | 2012-08-22 | 2012-12-12 | 迈普通信技术股份有限公司 | Method and device for searching forwarding information in virtual special local area network service network |
WO2014127605A1 (en) * | 2013-02-21 | 2014-08-28 | 烽火通信科技股份有限公司 | Mac address hardware learning method and system based on hash table and tcam table |
CN104025520A (en) * | 2012-12-25 | 2014-09-03 | 华为技术有限公司 | Lookup table creation method and query method, and controller, forwarding device and system therefor |
CN107888521A (en) * | 2017-10-20 | 2018-04-06 | 深圳市楠菲微电子有限公司 | The method and apparatus that multi-protocols share list item resource pool |
CN108206782A (en) * | 2017-11-22 | 2018-06-26 | 盛科网络(苏州)有限公司 | Message forwarding method, device, chip and server |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3059639B2 (en) * | 1994-07-14 | 2000-07-04 | 古河電気工業株式会社 | Route selection information search device |
US6266706B1 (en) * | 1997-09-15 | 2001-07-24 | Effnet Group Ab | Fast routing lookup system using complete prefix tree, bit vector, and pointers in a routing table for determining where to route IP datagrams |
US6061712A (en) * | 1998-01-07 | 2000-05-09 | Lucent Technologies, Inc. | Method for IP routing table look-up |
KR100424244B1 (en) * | 1999-05-12 | 2004-03-22 | 인터내셔널 비지네스 머신즈 코포레이션 | Longest matching prefix lookup |
CN1134177C (en) * | 2000-09-28 | 2004-01-07 | 国家数字交换系统工程技术研究中心 | Segmental looking-up method for line speed of IP route |
-
2003
- 2003-04-16 CN CNB031098789A patent/CN1319325C/en not_active Expired - Fee Related
Cited By (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100426791C (en) * | 2005-06-21 | 2008-10-15 | 中兴通讯股份有限公司 | Engine apparatus for route forwarding table address searching |
CN100401723C (en) * | 2005-10-13 | 2008-07-09 | 华为技术有限公司 | Fast indexing method |
CN100355245C (en) * | 2005-11-08 | 2007-12-12 | 东南大学 | Restoring method for source string of enhanced multiple Hash in use for system of intrusion detection |
CN100496019C (en) * | 2005-11-10 | 2009-06-03 | 中国科学院计算技术研究所 | A method to quickly search and update IPv6 routing list |
CN100393072C (en) * | 2006-02-20 | 2008-06-04 | 杭州华三通信技术有限公司 | Method and apparatus for storing table entry, and inquiry method |
CN101043428B (en) * | 2006-05-30 | 2012-05-02 | 华为技术有限公司 | Routing retransmitting method and system |
WO2008101423A1 (en) * | 2007-02-16 | 2008-08-28 | Huawei Technologies Co., Ltd. | System and method for bridge connection |
CN101267381B (en) * | 2007-03-13 | 2010-12-29 | 大唐移动通信设备有限公司 | Operation method and device for Hash table |
CN101340386B (en) * | 2008-08-12 | 2011-08-10 | 华为技术有限公司 | Method and router for establishing and searching route table items |
CN102571558B (en) * | 2010-11-30 | 2016-08-31 | 马维尔以色列(M.I.S.L.)有限公司 | Load balance Hash calculation for the network switch |
CN102571558A (en) * | 2010-11-30 | 2012-07-11 | 马维尔以色列(M.I.S.L.)有限公司 | Load balancing hash computation for network switches |
CN102739526A (en) * | 2012-06-13 | 2012-10-17 | 烽火通信科技股份有限公司 | Realization method of efficient distributed routing list realizing method |
CN102739526B (en) * | 2012-06-13 | 2015-02-25 | 烽火通信科技股份有限公司 | Realization method of efficient distributed routing list realizing method |
CN102821052B (en) * | 2012-08-22 | 2015-06-03 | 迈普通信技术股份有限公司 | Method and device for searching forwarding information in virtual special local area network service network |
CN102821052A (en) * | 2012-08-22 | 2012-12-12 | 迈普通信技术股份有限公司 | Method and device for searching forwarding information in virtual special local area network service network |
CN104025520A (en) * | 2012-12-25 | 2014-09-03 | 华为技术有限公司 | Lookup table creation method and query method, and controller, forwarding device and system therefor |
CN104025520B (en) * | 2012-12-25 | 2017-04-26 | 华为技术有限公司 | Lookup table creation method and query method, and controller, forwarding device and system therefor |
US9705795B2 (en) | 2012-12-25 | 2017-07-11 | Huawei Technologies Co., Ltd. | Look-up table creation method and query method, controller, forwarding device, and system |
US10243852B2 (en) | 2012-12-25 | 2019-03-26 | Huawei Technologies Co., Ltd. | Look-up table creation method and query method, controller, forwarding device, and system |
WO2014127605A1 (en) * | 2013-02-21 | 2014-08-28 | 烽火通信科技股份有限公司 | Mac address hardware learning method and system based on hash table and tcam table |
CN107888521A (en) * | 2017-10-20 | 2018-04-06 | 深圳市楠菲微电子有限公司 | The method and apparatus that multi-protocols share list item resource pool |
CN107888521B (en) * | 2017-10-20 | 2021-01-01 | 深圳市楠菲微电子有限公司 | Method and device for sharing table resource pool by multiple protocols |
CN108206782A (en) * | 2017-11-22 | 2018-06-26 | 盛科网络(苏州)有限公司 | Message forwarding method, device, chip and server |
Also Published As
Publication number | Publication date |
---|---|
CN1319325C (en) | 2007-05-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1538663A (en) | Method of finding route table item using ltsh chain table | |
CN102484610B (en) | Routing table construction method and device and routing table lookup method and device | |
CN101655861B (en) | Hashing method based on double-counting bloom filter and hashing device | |
US8856203B1 (en) | System and method for algorithmic TCAM packet classification | |
US7099881B2 (en) | Method for increasing average storage capacity in a bit-mapped tree-based storage engine by using remappable prefix representations and a run-length encoding scheme that defines multi-length fields to compactly store IP prefixes | |
US7809701B2 (en) | Method and system for performing exact match searches using multiple hash tables | |
US6631419B1 (en) | Method and apparatus for high-speed longest prefix and masked prefix table search | |
CN102377664B (en) | TCAM (ternary content addressable memory)-based range matching device and method | |
US7415472B2 (en) | Comparison tree data structures of particular use in performing lookup operations | |
CN101094179A (en) | Method and device for looking up route indexed in multiple stages | |
US7019674B2 (en) | Content-based information retrieval architecture | |
CN101667958B (en) | Method for selecting hash function, and method and device for storing and searching routing table | |
US8010557B2 (en) | Retrieving method for fixed length data | |
CN1564989A (en) | High speed MAC address search engine | |
CN1838124A (en) | Method for rapidly positioning grid + T tree index in mass data memory database | |
CN1504912A (en) | Performance and memory bandwidth utilization for tree searches using tree fragmentation | |
CN1655533A (en) | Filter based on longest prefix match algorithm | |
Pao et al. | Efficient hardware architecture for fast IP address lookup | |
US8364803B2 (en) | Method, device, computer program product and system for representing a partition of N W-bit intervals associated to D-bit data in a data communications network | |
CN1924851A (en) | Data storage method and data storage structure | |
US6785278B1 (en) | Methods, systems and computer program products for hashing address values | |
CN100426791C (en) | Engine apparatus for route forwarding table address searching | |
US20030009474A1 (en) | Binary search trees and methods for establishing and operating them | |
CN113139100A (en) | Network flow real-time indexing method and system | |
JP2006246488A (en) | Network router, address processing method, and computer program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20070530 Termination date: 20150416 |
|
EXPY | Termination of patent right or utility model |