Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for processing Hash collision

A hash collision and hash technology, which is applied in the direction of electrical digital data processing, special data processing applications, instruments, etc., can solve the problems of nowhere to store table items, insufficient TCAM space, high cost, etc., to reduce hash conflicts The effect of incidence

Inactive Publication Date: 2013-01-16
SUZHOU CENTEC COMM CO LTD
View PDF3 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the prior art, in addition to expanding the entry space and constructing a more suitable hash function, the commonly used method to resolve hash conflicts is to "establish a common overflow area". This method stores the data that has hash conflicts in TCAM (three state addressable register), however, although the above method can avoid the occurrence of hash collisions to a certain extent, due to the limited TCAM space and high cost, if the hash collision rate is high and the TCAM space is insufficient, it will lead to conflicts There is nowhere to store the table items, and additional TCAM will inevitably increase the cost of the entire equipment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for processing Hash collision
  • Method and system for processing Hash collision
  • Method and system for processing Hash collision

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The present invention will be described in detail below in conjunction with specific embodiments shown in the accompanying drawings. But these embodiments do not limit the present invention. Based on the various embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work should be included in the protection scope of the present invention .

[0031] Please refer to Figure 1 to Figure 4 As shown, it describes some specific embodiments of the hash collision processing method of the present invention. Among them, such as figure 1 As shown, in one embodiment of the present invention, the method for processing hash conflicts mainly includes the step of dividing table entries (step S1), storing the hash key (step S2) and searching for hash entries (step S3). Specifically, the above steps include:

[0032] S1. Split an entry for storing hash data, where the entry includes a first entry corresponding to th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and a system for processing Hash collision. The method includes separating list items which include a first list item corresponding a first Hash function and a second list item corresponding to a second Hash function and store Hash data; receiving Hash key words and judging whether the Hash collision exists or not, if collision exists in the first list item, storing the Hash key words to the corresponding position of the second list item according to the second Hash function; if no collision exists, storing the Hash key words into the corresponding position of the first list item according to the first Hash function; searching clauses corresponding to the Hash key words sequentially in the first list item and the second list item according to the first Hash function and the second Hash function. On the basis of keeping hardware cost constant, incidence rate of the Hash collision is decrease effectively.

Description

technical field [0001] The invention relates to the technology in the field of network communication, in particular to a method and system for processing hash conflicts. Background technique [0002] Hash (Hash) table is a data structure that is directly accessed according to the key value (key). It stores the key code value by mapping it to a position (index) in the table entry to speed up data lookup. Among them, this mapping function is called a hash function (f), and the array storing records is a hash table. The mathematical expression of the hash table is: index=f(key). In the field of network communication, taking route lookup as an example, the valid range of the hash function input value (key) is the entire address space, and the valid range of the hash function output value (Index) is the maximum specification supported by the system. Obviously, the valid range of the output value is far smaller than the valid range of the input value. Under this premise, no matte...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30
Inventor 黄娴婷顾祥洪
Owner SUZHOU CENTEC COMM CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products