Hash conflict processing method and system

A hash collision and processing method technology, applied in the field of data processing, can solve problems such as hash collisions, achieve the effects of reducing cost and power consumption, solving hash collisions, and improving utilization

Pending Publication Date: 2020-12-29
SUZHOU CENTEC COMM CO LTD
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the number of hash buckets in this solution cannot be infinite, so there will still be hash collisions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hash conflict processing method and system
  • Hash conflict processing method and system
  • Hash conflict processing method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] In order to enable those skilled in the art to better understand the technical solutions in the present invention, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described The embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0054] ginseng figure 1 As shown, the present invention discloses a hash conflict processing method, the method comprising:

[0055] S1. Determine whether a hash conflict occurs in the keyword corresponding to the data to be added;

[0056] S2. If so, calculate the hash values ​​corresponding to the keywords in multiple hash buckets, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a hash conflict processing method and system. The method comprises the steps of S1, judging whether a hash conflict occurs in a keyword corresponding to data needing to be added or not; s2, if yes, respectively calculating hash values corresponding to the keywords in a plurality of hash buckets, and obtaining a plurality of conflicting data in the plurality of hash buckets;and S3, selecting a hash bucket, and moving one piece of conflicting data in the hash bucket to another hash bucket. According to the invention, the hash conflict can be effectively solved by using data migration of depth-first search, so that the utilization rate of the storage space is improved, the use of a hash conflict solution table is reduced, and the cost and the power consumption are greatly reduced.

Description

technical field [0001] The invention belongs to the technical field of data processing, and in particular relates to a hash conflict processing method and system. Background technique [0002] In fields such as the lookup of the second-layer and third-layer forwarding tables in the switching chip, the use of the hash algorithm is usually involved. First, a brief introduction to the hash algorithm. Hash is also called hash. An index value is obtained by calculating the keyword Key through the hash function F. This index value is called the hash value. Use the hash value as the index of the storage space, and record the data into the storage space. When performing a hash search, the hash function is used to perform hash calculation on the searched keyword Key, and the calculated index is used to retrieve data from the storage space. Hash algorithm lookup is very fast, but has a fatal shortcoming that is hash collision. [0003] When two different keywords key1 and key2 have...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F16/22G06F16/2453G06F3/06
CPCG06F16/2255G06F16/2453G06F3/0607G06F3/064Y02D10/00
Inventor 赵子苍李磊
Owner SUZHOU CENTEC COMM CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products