Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method for implementing an access control list circuit and its circuit

An access control list, circuit technology, applied in CAD circuit design, memory address/allocation/relocation, climate sustainability, etc., can solve the problems of high manufacturing cost, limited size of rule base, expensive, etc., to achieve flexible application, The effect of reducing search power consumption

Active Publication Date: 2021-06-29
芯启源(南京)半导体科技有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Because TCAM will access all stored entries in one clock cycle, its search power consumption is a big disadvantage, and the manufacturing cost of TCAM is more expensive than that of general storage devices, and the size of the rule base that can be stored is limited, so it is necessary to use TCAM to implement ACL relatively expensive solution

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for implementing an access control list circuit and its circuit
  • A method for implementing an access control list circuit and its circuit
  • A method for implementing an access control list circuit and its circuit

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0033] Embodiment 1, according to figure 2 An access control list circuit includes 8 Module circuits, 8 priority RAMs, 8 grouping and merging logic modules and a configuration control RAM.

[0034] By cascading several Module circuits according to different configuration information, keywords of different bit widths are searched.

[0035] The Module circuit includes a bit selection module, a Hash RAM, a data RAM, a keyword selection logic module, and a number of logic operation units; the bit selection module generates the address of the Hash RAM according to configuration information; the Hash RAM is in the figure The Hash RAM is used to store the storage address of the rule base entries; the data RAM is the Data RAM in the figure, and is used to store the rule base.

Embodiment 2

[0036] Embodiment 2, according to image 3 , Module circuit includes bit selection module, hash RAM, 40 data RAMs, keyword selection logic module and several logic operation units.

[0037] The data RAM is composed of several BinRAMs, and the BinRAM stores 2-bit-wide rule information, and the bit width of the rule base entries stored in the data RAM is determined by the number of BinRAMs contained therein.

Embodiment 3

[0038] Example 3, Figure 5 The mapping method between the 2bit rule and the 2bit keyword is given. The keyword 00 hits 00, 0X, X0 and XX in the rule, where "X" means "don't care", that is, the bit status is not considered when matching, so for There are multiple hits in keyword search; the rule base is the hit result of combining rules with keywords, and the rule base will be delivered to 40 Bin RAMs in the data RAM in advance.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for implementing an access control list circuit. S1. The input keyword is mapped through a hash algorithm to obtain a hash keyword; S2. According to the hash keyword in step S1, the storage address of the corresponding rule entry is retrieved in Hash RAM ; S3, the storage address of the rule entry retrieved in step S2 is retrieved in the rule base storage RAM, and the corresponding storage rule is obtained after the retrieval; S4, the grouping and merging logic is retrieved in step S3 by configuring the grouping and merging information in the control RAM The results of the calculation are grouped to obtain multiple groups of search results; S5, the priority RAM provides the highest priority search results according to each group of search results and configuration information. Compared with the prior art, the present invention no longer needs to access all rule bases, reducing In order to search for power consumption; search for keywords with different bit widths according to different configuration information, and support configurable priority options.

Description

technical field [0001] The invention relates to the field of integrated circuit design, in particular to an access control list circuit realization method and a circuit thereof. Background technique [0002] In the current network technology, with the rapid development of optical fiber communication technology, the link transmission rate is no longer the main obstacle to the rate increase, and the classified forwarding rate of network devices such as security gateways and routers is becoming the main bottleneck for improving the network rate. In the future communication technology, not only the communication rate, but also the communication service quality such as firewall, VPN, differentiated service and other mechanisms are more concerned about the development trend. Most of these necessary communication services are based on access control list (ACL) technology. [0003] ACL is the English abbreviation of Access Control List, and the Chinese name is Access Control List. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F12/06G06F30/31G06F111/20
CPCY02D10/00
Inventor 夏磊项禹陈盈安卢笙
Owner 芯启源(南京)半导体科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products