The process used by the described embodiments to analyze a DIV to determine where a vector should be broken is shown in pseudocode below. In some embodiments, processor 102 performs this calculation in parallel. For example: List = <empty>; for (x=STARTPOS; x<VECLEN; ++x) if...
A method for performing flow based address hash transformation in a network device to generate hash pointers. The method includes the steps of receiving a pair of addresses (source address input and destination address input) corresponding to one direction of a data flow. The destination address ...