Hash Technology for Connection Management in High-Speed Networks

Article Preview

Abstract:

Connection management uses hash table. Hash function and data structure are both the bottleneck technology. For balancing computation cost and uniformity of hash function, three new hash functions were devised——the Random number Mapping Xor (RMX) function based on random number table mapping, the Segment Sampling Xor (SSX) function and Byte by Byte Shift Xor (BBSX) function based on segment generation and bit operations. The results show that these three functions are all better than IPSX on uniformity. This paper analyzed memory access performance and miss rate of multiple slots hash table, and presented the technical idea for shorting packet process time in connection management. Simulation is described.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 998-999)

Pages:

1151-1156

Citation:

Online since:

July 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] CNNIC. The 31th Chinese Internet Development Statistical Report[M]. (2013).

Google Scholar

[2] M ROESCH. Snort: Lightweight Intrusion Detection for Networks[C]. In: Proceedings of the 13th USENIX Conference on System Administration, 1999: 229-238.

Google Scholar

[3] V PAXSON. Bro: A System for Detecting Network Intruders in Real Time[J]. Computer Networks, 1999, 31(23): 2435-2463.

DOI: 10.1016/s1389-1286(99)00112-7

Google Scholar

[4] XIONG Bing. Research on Some Key Problems of High-speed Network Traffic Analysis[D]. Wuhan: Huazhong University of Science and Technology, 2009. (In Chinese).

Google Scholar

[5] ZSEBY T, MOLINA M, RASPALL F, et al. Sampling and Filtering Techniques for IP Packet Selection [EB/OL]. http: /tools. ietf. org/html/draft-ietf-psamp-sample-tech-05#section-17.

DOI: 10.17487/rfc5475

Google Scholar

[6] ZHAO Guo-feng, YAN Liang. Keywords Decompound Hash Algorithm for Quick Flow Classification[J]. Computer Engineering, 2010, 36(16): 79-81. (In Chinese).

Google Scholar

[7] HDL Design House. HCR MDS: MD5 crypto core family[M]. December (2002).

Google Scholar