Determination method and device for media access control (MAC) address Hash collision

A MAC address and hash collision technology, which is applied in the field of determination of media access control address hash collision, can solve the problems of high cost, high TCAM resource occupation, TCAM capacity and TCAM power consumption, etc., to reduce occupation and hash The effect of the probability of conflict

Active Publication Date: 2013-03-27
ZTE CORP
View PDF11 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In the prior art, as long as a hash conflict occurs, the entry is written into the hash conflict resolution table. The greater the hash conflict, the more TCAM resources are occupied, and increasing the TCAM capacity will be constrained by the high power consumption and high cost of the TCAM.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Determination method and device for media access control (MAC) address Hash collision
  • Determination method and device for media access control (MAC) address Hash collision
  • Determination method and device for media access control (MAC) address Hash collision

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In order to make the purpose, technical solution and advantages of the present invention more clear, the embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined arbitrarily with each other.

[0042] The hash conflict in the embodiment of the present invention mainly exists in the following two situations:

[0043] 1) When MAC is searched, the search key value has not been learned into the entry, but has a hash conflict with the key value that has been learned into the entry, and the same MAC table entry is found. At this time, it is necessary to use the search key value and Compare the Compare field in the table result to determine whether it is the entry corresponding to the search key value;

[0044] 2) Hash collision during MAC learning.

[0045] For the abov...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a determination method and device for media access control (MAC) address Hash collision. The method comprises performing N-order Hash on key values, obtaining N Hash values, enabling N to be an integer larger than 2; respectively using M Hash values to search M Hash tables in a one-to-one correspondence mode, obtaining M Hash table items, and enabling M to be smaller than N; using (N-M) Hash values in the N Hash values except the M Hash values to undergo ergodic comparison with the Hash values in the M Hash table items, and searching and / or studying MAC addresses where Hash collision exists. According to an embodiment, by performing multiple-order Hash on the key values, the probability of the Hash collision is effectively reduced, and accordingly occupation of a ternary content addressable memory (TCAM) space is greatly reduced.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a method and device for determining hash conflicts of Media Access Control (MAC) addresses. Background technique [0002] A hash table (Hash table, also called a hash table) accesses records by mapping a key value to a location in the table. This mapping function is called a hash function, and the array storing the records is called a hash table. The same hash address may be obtained for different keywords, that is, Key1≠Key2, and f(Key1)=f(Key2), this phenomenon is called hash collision. The advantage of the hash table lookup method is that the lookup is fast and the storage space utilization rate is high. The disadvantage is that the search time is not fixed, and the more conflicts, the longer the search time. [0003] The MAC (Media Access Control, Media Access Control) address is an identifier used to identify a LAN node and is globally unique. The MAC address is 48 bit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/743
Inventor 谢密
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products