IP quintuple based Hash storage method
A quintuple, hash technology, applied in the field of network session statistical analysis, can solve the problems of uneven hash distribution, slow addition and search speed, etc., to reduce hash collisions, hash storage evenly distributed, improve hash The effect of wishing on storage efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0022] figure 1 It is a schematic flowchart of an IP quintuple-based hash storage method provided by Embodiment 1. This method is applicable to the case of converting larger data information into smaller data information and storing them in a large-traffic network environment, which is convenient for access and statistical analysis. The method is executed by a device based on an IP quintuple hash storage method, the device can be set in a terminal, and can be realized in the form of software and / or hardware. For example, operators such as Internet Service Providers (ISP, InternetServiceProvider), Internet Content Providers (ICP, InternetContentProvider), Internet Data Centers (IDC, InternetDataCenter) and other operators can use this method to detect and clean the traffic to ensure that the network is normal and stable. operation and the normal conduct of business.
[0023] Such as figure 1 As shown, the method includes:
[0024] S110. Receive a session information query r...
Embodiment 2
[0049] This embodiment is based on Embodiment 1, and further performs the following operations after traversing all session storage units pointed to by the current second hash array and searching for the session storage unit corresponding to the IP quintuple:
[0050] If the session storage unit corresponding to the IP quintuple is not found, then apply for a new session storage unit in the storage space, store the IP quintuple information in the new session storage unit, and use according to the first hash The first unit identifier and the second unit identifier calculated by the Hive function and the second hash function determine a final second hash array, and the final second hash array is used to point to the new session storage unit.
[0051] Further, if the final second hash array does not point to the session storage unit, directly make the final second hash array point to the new session storage unit, and then return to the new session storage unit session information...
Embodiment 3
[0056] figure 2 It is a schematic flowchart of an IP quintuple-based hash storage method provided by Embodiment 3. In this embodiment, on the basis of the foregoing embodiments, the entire solution is embodied and described in a complete manner for easy understanding. This embodiment only describes the hash storage method based on the IP quintuple but does not limit the method.
[0057] First, in this embodiment, the first hash function is set to F, and the second hash function is set to f. The length of the first hash array H is A, and the length of the second hash array h is a. Set the storage unit structure M{link[sip,dip,sport,dport,protocol],prev,next,count} to store IP quintuple information.
[0058] Such as figure 2 As shown, the method includes:
[0059] S210. Find the session according to the IP quintuple.
[0060] S220. Calculate and obtain the hash position H[h] through the function F and the function f.
[0061] Obtain the first unit ID and the second unit...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com