beautypg.com

Intel NETWORK PROCESSOR IXP2800 User Manual

Page 240

background image

240

Hardware Reference Manual

Intel

®

IXP2800 Network Processor

SHaC — Unit Expansion

Equation 7.

(48-bit hash operation)

Equation 8.

(64-bit hash operation)

Equation 9.

(128-bit hash operation)

The division results in a quotient Q(x), a polynomial of order-46, order-62, or order-126, and a
remainder R(x), and a polynomial of order-47, order-63, or order-127. The operands are related by

the equation:

Equation 10.

The generator polynomial has the property of irreducibility. As a result, for a fixed multiplier M(x),

there is a unique remainder R(x) for every input A(x). The quotient Q(x), can then be discarded,
since input A(x) can be derived from its corresponding remainder R(x). A given bounded set of

input values A(x) — for example, 8K or 16K table entries — with bit weights of an arbitrary

density function can be mapped one-to-one into a set of remainders R(x) such that the bit weights
of the resulting Hashed Arguments (a subset of all values of R(x) polynomials) are all

approximately equal.

In other words, there is a high likelihood that the low-order set of bits from the Hash Arguments are

unique, so they can be used to build an index into the table. If the hash algorithm does not provide
a uniform hash distribution for a given set of data, the programmable hash multiplier (M(x)) may

be modified to provide better results.

G

48

x

( )

1 x

10

x

25

x

36

x

48

+

+

+

+

=

G

64

x

( )

1 x

17

x

35

x

54

x

64

+

+

+

+

=

G

128

x

( )

1 x

33

x

69

x

98

x

128

+

+

+

+

=

A x

( )

M x

( )

Q x

( )

G x

( )

R x

( )

+

=