期刊文献+

基于路由表哈希匹配算法的压缩策略 被引量:3

Compression strategy for hash match algorithm in route list
下载PDF
导出
摘要 哈希算法是一种最优的匹配算法。但是在现今的网络应用中,该匹配算法的应用有一定的局限性。在分析了路由表地址匹配的延迟过程之后,得出产生延迟的主要原因是现今的路由表容量比较有限,从而造成在路由表中无法找到IP目的地址。提出了一种以现实的最大路由表容量为准来解决路由匹配延迟的压缩策略。其目的是去掉无法找到路由表目的地址的现象,通过对压缩后路由表容量的仿真试验,结果显示,在路由表中查找目的地址失败的问题已经解决,所以该策略是可行的。 Hash algorithm is a traditionally optimal match algorithm. In present network applications, however, this kind of match algorithm has certain limitaions. After analyzing the procedure of delay in route list addresses, the main reason why route match is delayed is obtained. It is the finite capacity of the route list that causes the failure to find destination addresses. A novel compression strategy is proved in which the real maximal route list capacity is the yardstick of solving route match delay. Its purpose is to eliminate the failure to find destination addresses in route list. Simulation results show that the problem of failure to find destination addresses in route list is solved, thus the strategy is feasible.
作者 杜慧军 杨宁
出处 《系统工程与电子技术》 EI CSCD 北大核心 2007年第11期1945-1948,共4页 Systems Engineering and Electronics
基金 广东省自然科学基金资助课题(5006102)
关键词 核心交换机 路由表 哈希算法 数据流 core switches route list hash algorithm data flow
  • 相关文献

参考文献12

  • 1孙书韬,贺思敏,郑燕峰,高文.缓冲交叉开关交换结构多播调度算法研究[J].计算机研究与发展,2006,43(6):1036-1043. 被引量:1
  • 2高迎,程涛远,王珊.基于Hilbert曲线的许可证存储策略及查找算法[J].软件学报,2006,17(2):305-314. 被引量:20
  • 3Van Lunteren J.Searching very large routing tables in fast SRAM[J].Tenth International Conference Computer Communications and Networks,2001,10:4-11.
  • 4Lee P Y,Cheng A M K.HAL:a faster match algorithm[J].IEEE Trans.on Knowledge and Data Engineering,2002,14(5):1047-1058.
  • 5Jia J,Lin C,Liu W.A fast two-way IP lookup algorithm based multibit-trie[J].ICCNMC2003,2003,10:136-142.
  • 6Nie X,Wilson D J,Cornet J,et al.IP address lookup using a dynamic hash function[J].Elkctrical and Computer Engineering,2005,5:1646-1651.
  • 7Sangireddy R,Futamura N,Aluru S,et al.Scalable,memory efficient,high-speed IP lookup algorithms[J].Networking,IEEE/ACM Trans.on,2005,13(8):802-812.
  • 8Mohapatra S,Venkatasubramanian N.Proactive energy-aware video streaming to mobile handheld devices[D] // in IEEE MWCN,2003.
  • 9IP网络产品性能测试.网络世界,http://www.donews.com/content/200602/612a2676f0004b9aa311elc202a38757.shtm.2006-5-21.
  • 10李建中,郭龙江,张冬冬,王伟平.数据流上的预测聚集查询处理算法[J].软件学报,2005,16(7):1252-1261. 被引量:24

二级参考文献29

  • 1郭龙江,李建中,王伟平,张冬冬.数据流上的连续预测聚集查询[J].计算机研究与发展,2004,41(10):1690-1695. 被引量:4
  • 2Li NH,Winsborough WH,Mitchell JC.Distributed credential chain discovery in trust management.Journal of Computer Security,2003,11(1):35-86.
  • 3Li NH,Mitchell JC.RT:A role-based trust-management framework.In:Proc.of the 3rd DARPA Information Survivability Conf.and Exposition.Washington,IEEE Computer Society Press,2003.201-212.http://theory.stanford.edu/people/jcm/papers/rt_discex03.pdf
  • 4Clarke D,Elien JE,Ellison C,Fredette M,Morcos A,Rivest R.Certificate chain discovery in SPKI/SDSI.Journal of Computer Security,2001,9(4):285-322.
  • 5Aura T.Fast access control decisions from delegation certificate databases.In:Proc.of the 3rd Australasian Conf.on Information Security and Privacy (ACISP '98).Brisbane:Springer-Verlag,1998.284-295.http://research.microsoft.com/users/tuomaura/Publications/aura-acisp98.pdf
  • 6Ellison C,Frantz B,Lampson B,Rivest R,Thomas B,Ylonen T.SPKI certificate theory.Internet RFC 2693,1999.
  • 7Jim T.SD3:A trust management system with certificate evaluation.In:Proc.of the 2001 IEEE Symp.on Security and Privacy.Oakland:IEEE Computer Society Press,2001.106-115.
  • 8Li NH,Mitchell UC,Winsborough WH.Design of a role-based trust-management framework.In:Proc.of the 2002 IEEE Symp.on Security and Privacy.Los Alamitos:IEEE Computer Society Press,2002.114-130.http://www.cs.purdue.edu/homes/ninghui/papers/rt_oakland02.pdf
  • 9Ajmani S,Clarke DE,Moh CH,Richman S.ConChord:Cooperative SDSI certificate storage and name resolution.In:Proc.of the 1st Int'l Workshop on Peer-to-Peer Systems (IPTPS 2002).Cambridge:Springer-Verlag,2002.141-154.http://pmg.csail.mit.edu/~ajmani/papers/lncs2429.pdf
  • 10Ellison C.SPKI Requirements.Internet RFC 2692,1999.

共引文献42

同被引文献28

引证文献3

二级引证文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部