Method for fast searching, positioning and matching access control list

An access control list, fast technology, applied in the field of computer communication, can solve problems such as not supporting fast matching well, achieve fast search, positioning and matching access control list, high efficiency, and reduce product cost

Inactive Publication Date: 2009-01-14
SHANGHAI BROADBAND TECH
View PDF0 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method does not support fast matching of other extended domains in ACL rules, and it takes a lot of time to build this binary tree

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for fast searching, positioning and matching access control list
  • Method for fast searching, positioning and matching access control list
  • Method for fast searching, positioning and matching access control list

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] According to the hash principle, there are three ways to avoid hash conflicts: first, make the bucket capacity of the hash table much larger than the actual entries that need to be accommodated; second, maintain a linked list for the hash table to save all conflicting entries; Third, design a hash function that can correspond one-to-one. Usually for the above method 1, we choose the parameters in this way, if the key value space of the hash table is K, and the value space of the actual key value is A ( A ⊆ K ) , The bucket size space of the hash table is T, then the hash should satisfy the relationship of |A|

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method of fast finding fixing and matching an access control list, comprising: serializing information character strings in all matching fields of ACL rule to be arranged, initializing hash table [MAX LEN] table; using the ACL rule character string sequence as a Key of a hash function, carrying corresponding character string Key and hash basket size prime into the function for computation, obtaining has function hashed value (index); indexing corresponding items of the ACL rule in the hash_table according to the computing result. According to the invention, hash algorithm is simple, efficiency is high, hash distributing performance is excellent. In addition, a chain table is maintained for HASH table, a method of storing all conflicting list items can better solve the problem of balancing space and time in practical application, thereby excellently advancing system efficiency without wasting huge space.

Description

technical field [0001] The invention provides a method for quickly searching, locating and matching an access control list, which belongs to the technical field of computer communication. Background technique [0002] Use the rules (Rule) composed of some specific fields of the message to divide the message into different flows. For example, we can divide packets from a certain network (source IP address) and packets destined for a certain network (identified by the destination IP address) into a flow. After being divided into streams, streams can be processed, such as increasing priority, guaranteeing bandwidth, limiting bandwidth, discarding, etc. This processing is called an action. Usually, a rule plus a corresponding action is called an access control list (ACL: Access Control List, hereinafter collectively referred to as ACL). [0003] Generally, there are 5 domains in the composition rules of the industry standard, usually also called 5-tuples. These 5 domains are: ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/56G06F17/30H04L12/743
Inventor 李杰高守玮
Owner SHANGHAI BROADBAND TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products