Claims
- 1. A method adapted to be used in hashing algorithm for reducing conflict probability, comprising the steps of:
- receiving a first physical address of a frame;
- generating a hashing address corresponding to said first physical address;
- comparing a second physical address corresponding to said hashing address with said first physical address to determine if said first and said second physical addresses match with each other;
- completing a packet calling process when said first and said second physical addresses match with each other, but going back to said comparing process when said first and said second physical addresses do not match with each other, to determine whether there is another second physical address corresponding to said hashing address and matching with said first physical address;
- ending said packet calling process when a number of times that said comparing process is proceeded is greater than a reference value; and the resulting conflict probability is less than a designated value, which is substantially equal to ##EQU9## wherein m is the length of said first physical address;
- n is the length of said hashing address;
- .sup. m is the total number of said second physical addresses;
- 2.sup.n is the number of hashing addresses to be held in a routing table; and therefore
- 1/2.sup.n is the probability that a specific address in the routing table is selected;
- .sup. m-n is the number of physical addresses that hash to the same address in the routing table; and therefore ##EQU10## is the probability that an address hashes to a selected address in the routing table;
- N is the total number of routing tables; and
- N-1 is number of a back-up routing table.
- 2. A method according to claim 1, wherein a definition that said second physical address and said first physical address match with each other is that said second physical address and said first physical address are identical.
- 3. A method according to claim 1, wherein said packet calling process is a learning procedure.
- 4. A method according to claim 3, wherein said completing said packet calling process is to complete a learning procedure which records a source address in a routing table to identify from which port said source address comes.
- 5. A method according to claim 3, wherein said ending packet calling process is to execute a modifying step which substitutes a physical address for another physical address in a routing table.
- 6. A method according to claim 3, wherein said first physical address is a source address of said frame.
- 7. A method according to claim 1, wherein said packet calling process is a routing procedure which requests a destination address from a routing table to identify to which port said source address goes.
- 8. A method according to claim 7, wherein said completing said packet calling process is to complete a routing procedure.
- 9. A method according to claim 7, wherein ending said packet calling process is to execute a broadcasting step which sends a packet to every port except the source port itself.
- 10. A method according to claim 7, wherein said first physical address is a destination address of said frame.
- 11. A method adapted to be used with hashing algorithm for reducing conflict probability, comprising the steps of:
- receiving a first physical address of a frame;
- generating a hashing address corresponding to said first physical address;
- comparing a second physical address corresponding to said hashing address with said first physical address to determine if said first and said second physical addresses match with each other;
- completing a packet calling process when said second physical address and said first physical address match with each other, but going back to said generating and comparing processes when said second physical address and said first physical address do not match with each other, to determine whether there is another second physical address corresponding to said hashing address and matching with said first physical address; and
- ending said packet calling process when a number of times that said generating and comparing processes are proceeded is greater than a reference value; and
- the resulting conflict probability is less than a designated value, which is substantially equal to ##EQU11## wherein m is the length of said first physical address;
- n is the length of said hashing address;
- .sup. m is the total number of said second physical addresses;
- 2.sup.n is the number of hashing addresses to be held in a routing table; and therefore 1/2.sup.n is the probability that a specific address in the routing table is selected;
- 2.sup.m-n is the number of physical addresses that hash to the same address in the routing table; and therefore ##EQU12## is the probability that an address hashes to a selected address in the routing table;
- N is the total number of routing tables; and
- N-1 is number of a back-up routing table.
- 12. A method according to claim 1, wherein said second physical address is stored in a routing table and said reference value is equal to a number of routing tables.
- 13. A method according to claim 12, wherein said number of said routing tables is at least two, and the volumes of said at least two routing tables are the same.
- 14. A method according to claim 12, wherein said number of said routing tables is at least two, the volumes of said at least two routing tables are different, and a number of bits of said hashing address matches with a volume of the routing table having the largest volume.
- 15. A method according to claim 1, wherein said hashing address is generated by an XOR method.
- 16. A method according to claim 1, wherein said hashing address is generated by a cyclic redundancy coating (CRC) method.
- 17. A method according to claim 1, further comprising a step of determining whether said frame is effective after receiving said first physical address of said frame, and executing said comparing step when said frame is effective, but ending said packet calling process when said frame is ineffective.
- 18. A method according to claim 5, further comprising a step of comparing agings of all of the second physical addresses which have been compared with said first physical address when there is no second physical address matching with said first physical address.
- 19. A method according to claim 18, wherein said ending packet calling process is to execute said modifying step by substituting said first physical address for the second physical address with the largest aging.
- 20. A method adapted to be used in a hashing algorithm for reducing conflict probability, comprising the steps of:
- receiving a first physical address of a frame;
- generating a single hashing address corresponding to said first physical address;
- comparing at least two second physical addresses corresponding to said hashing address with said first physical address simultaneously to determine if said first and any of said second physical addresses match with each other;
- completing a packet calling process when said first and one of said second physical addresses match with each other;
- ending said packet calling process when there is non of said second physical addresses matching with said first physical address; and the resulting conflict probability is less than a designated values, which is substantially equal to ##EQU13## wherein m is the length of said first physical address;
- n is the length of said hashing address;
- .sup. m is the total number of said second physical addresses;
- 2.sup.n is the number of hashing addresses to be held in a routing table; and therefore
- 1/2.sup.n is the probability that a specific address in the routing table is selected;
- 2.sup.m-n is the number of physical addresses that hash to the same address in the routing table; and therefore ##EQU14## is the probability that an address hashes to a selected address in the routing table;
- N is the total number of routing tables; and
- N-1 is number of a back-up routing table.
Parent Case Info
The present invention is a CIP application of the parent application bearing the Ser. No. 08/282,031 and filed on Jul. 28, 1994, now abandoned.
US Referenced Citations (10)
Continuation in Parts (1)
|
Number |
Date |
Country |
Parent |
282031 |
Jul 1994 |
|