Parallel lookup method for high-capacity access control list

An access control list and large-capacity technology, which is applied in the search field of large-capacity access control lists, can solve problems such as difficult to meet the needs of practical applications, low algorithm operation efficiency, complex data structure organization, etc., to achieve fast and flexible design, eliminate Technical bottlenecks and the effect of improving resource utilization

Active Publication Date: 2015-02-18
FENGHUO COMM SCI & TECH CO LTD
View PDF6 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, compared with the linear search algorithm, the data structure organization of this algorithm is complex, and the ability to support mask search is weak. At the same time, the operation efficiency of the algorithm is also not high in environments such as parallel search and frequent table item updates. These algorithms are generally only applicable to In a device environment with a single-core processor and a relatively stable table entry structure
[0007] The above search algorithms are suitable for different environments. Each algorithm is suitable for different occasions. It needs to be combined with specific environments to give full play to its performance advantages. However, the network environment where current network devices are located is complex, requiring parallel search and large-capacity tables. Under strict application requirements such as item storage, frequent table item updates, high search speed, and support for mask matching, it is difficult to meet the needs of practical applications simply by applying the above-mentioned traditional algorithms.
At the same time, the data plane of the network device is extremely sensitive to the average number of matching times in the algorithm search process. Doubling the number of matching times may directly reduce the performance of the device by 50%. Therefore, network data devices generally hope to control the number of matching times within 1 to 3 times. It is impossible for any of the above software algorithms to complete and realize in the case of large-capacity entries

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Parallel lookup method for high-capacity access control list
  • Parallel lookup method for high-capacity access control list
  • Parallel lookup method for high-capacity access control list

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments.

[0028] see figure 1 As shown, a parallel large-capacity access control list search method is implemented based on multi-core processors, including:

[0029] The linked list storage structure of the access control list is set as a two-way linked list, and the structural relationship between the entries in the access control list is established. Wherein, the linked list storage structure of the access control list can also be designed as a tree structure or a graph structure.

[0030] Multi-core processors (Cores) divide the first incoming data streams (P1, P2...Pj), establish flow tables (Flow tables), and search for appropriate access control list entries at the same time, and establish flow tables and access control list tables The association of items; wherein, the multi-core processor distributes the data packets (P) in the received data ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a parallel lookup method for a high-capacity access control list, and relates to the technical field of communication. The method comprises the following steps: setting the linked list storage structure of the access control list into a bidirectional linked list way, and establishing a structural relation among list items in the access control list; performing flow division on primarily entering data flow by using a multi-core processor to establish a flow table, and meanwhile, looking up an appropriate access control list item to establish correlation between the flow table and the list item of the access control list; acquiring the execution action of the access control list from the table items of the flow table by using subsequently entering data flow. By adopting the parallel lookup method, the matching efficiency of the access control list is increased, the technical bottleneck of the multi-core processor on the function item of the access control list is eliminated, and the resource utilization ratio and the task execution efficiency are increased.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to a method for searching a parallel large-capacity access control list. Background technique [0002] The processing capability of traditional single-core processors is restricted by factors such as main frequency and power consumption, and it is difficult to meet the increasing requirements of network data processing tasks in terms of performance. High-performance multi-core processors can achieve parallel processing in the data processing process, with low network delay and large data throughput, and are widely used in current routers, firewalls and other network devices. [0003] ACL (Access Control List, Access Control List) is one of the methods to solve and improve network security, and it is mostly used in network devices such as routers and firewalls. The access control list is applied to the interface of the network device. When the number of entries reaches a certa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62H04L29/06
CPCG06F21/6218G06F2221/2141H04L63/101
Inventor 范富明李念军黄杨琴侯冬兰
Owner FENGHUO COMM SCI & TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products