System and method for management of memory access in a communication network

ABSTRACT

A method and system for memory access comprising address transformation means for generating a single value of memory address (y) from one or more corresponding values of an input quantity in which the number of values of the input quantity that correspond to a single value of the memory address varies across the range of values of the input quantity. The relationship between an input quantity and the corresponding memory address may be characterised as a hyperbolic function.

[0001] The present invention relates to the field of memories in general and the management of memory access in particular.

[0002] The open systems interconnection (OSI) reference model adopted by the International Standards Organisation (ISO) provides a structured architectural model for inter-computer communications.

[0003] Packet networks such as internet protocol (IP) are typically organised into a layered structure following the OSI 7 layer reference model. According to this model layer 1 comprises the physical medium, layer 2 is the link layer (point-to-point framing, e.g. IEEE 802 or media access control (MAC)), layer 3 is the network layer (e.g. IP), layer 4 is the transport layer (e.g. UDP, TCP, ICMP, etc.) and layer 5 is the session layer (e.g. RTP).

[0004] The above abbreviations are explained in the IETF RFC publications referred to below.

[0005] The upper layer, layer 5 adds a header to the payload or data being transmitted across the network. Each successively lower layer treats the payload and header of the immediately higher layer as its own payload and adds its own header to this payload. The combination of the original (data) payload with the headers will be referred to here as a “packet”.

[0006] The internet protocol (IP) is a network layer protocol, i.e. corresponding to layer 3 of the OSI reference model. The IP layer is concerned with addressing information and control information that is included in the header of a packet to enable that packet to be successfully routed.

[0007] The layer 3 header is often referred to as the “internet protocol” or IP header, whereas the layer 4 header is referred to as the “protocol” header. It is to be noted that these are distinct entities and for the avoidance of confusion the terms ‘layer 3 header’ and ‘layer 4 header’ will be used here.

[0008] A typical internet protocol communications network is divided into secure and insecure areas. A secure area is protected from unauthorised access by users within insecure areas by a so-called firewall. This is a node that acts at the boundary between a secure and an insecure area to filter traffic coming into the secure area from the insecure area and vice versa. A basic principle of filtering is to hide the actual IP addresses and ports of the secure network from the insecure network. The ‘ports’ are not physical ports but fields in a header of a packet that can be used as address extensions. Two such ports are defined both occurring in the layer 4 header: a source port and destination port. Either or both ports may be used in this way, and for simplicity the term “port” is used in the following to cover all possibilities. The initiator of the call is unaware of the real destination address and port related to the destination node. When a call to a node in the secure network is initiated from the insecure network, the caller uses a “dummy” destination address and port available on the firewall instead of the actual destination address and port related to the true destination node.

[0009] Although the port may typically be used to identify the type of session layer, the firewall treats the port as an extension of the destination address. On receipt of a valid call (i.e. a call that is not rejected by the firewall) from the insecure network, the firewall translates the received destination address and port used by the caller into the actual destination and address of the called node within the secure network. For traffic in the opposite direction, the translation is effected in reverse.

[0010] In the layer 3 header, the source of a packet is identified by the source address, destination address, protocol and fragment identification fields. The source address is the address of the originator of the packet; and is made up of a network number (which forms the more significant part) and a node number (which form the less significant part): the destination address is the address of the intended recipient of the packet, the fragment offset is the offset in numbers of 8 bit octets relative to the start of the original layer 3 payload data in the fragment; the fragment identification field holds a value created by the source to characterise a packet so as to aid in reassembling the fragments of that packet; the protocol field identifies the type of layer 4 header (e.g. UDP, TCP, ICMP, etc.) associated with that packet. In order to provide an acceptable level of security, the firewall also needs to be able to identify the application associated with a particular Packet. Hence, in addition to the above layer 3 fields, the firewall needs access to the port of the layer 4 header.

[0011] When fragments are reassembled at the destination of the call, they are reassembled per application as indicated by the port as well as per source as indicated by the layer 3 header fields.

[0012] A problem arises in trying to identify the source of an incoming call from the insecure network due to fragmentation of packets. A layer 3 packet may be up to 64 Kilobytes long, however this packet plus the layer 3 header form the payload for the MAC (layer 2) frames which can only handle ‘fragments’ of up to 1500 bytes in length. Hence a typical layer 3 Packet will be transported in a plurality of fragments or layer 2 frames. To make matters worse, the fragments related to a particular packet may arrive at the media firewall in a random order. In filtering the incoming traffic, the firewall needs to be able to identify the source of each fragment.

[0013] Each layer 2 frame starts with the layer 2 header followed by the layer 3 header from the layer 3 packet followed by a section of the layer 3 payload. The layer 4 header forms part of the layer 3 payload which is divided into sections, each section being carried in a different layer 2 frame. Although each layer 2 frame contains a copy of the layer 3 header, only the first frame in a packet should contain a copy of the layer 4 header. Hence the port field should only exist in one of the fragments of a packet.

[0014] If the port field does occur in practice in more than one fragment this is an indication of an attack on the secure network. There is therefore a need to store the contents of the port field contained in the first fragment for each source identified for the duration of a packet so that it may be used in combination with the layer 3 header fields listed above to check subsequent fragments relating to the same packet.

[0015] The port field should occur in the first fragment received for a particular packet and this fragment should not overlap subsequent fragments. If this is not the case, the attacking fragments will be discarded by the firewall. Detailed operations of a firewall filter are given in Internet Engineering Taskforce (IETF) requests for comment RFC 1858 “security considerations for IP fragment filtering” October 1995.

[0016] Although described here in detail with reference to network layer header Version 4 (IPv4), the present invention is also applicable to network layer version 6 (IPv6) header format: the main difference between these two forms of header with respect to the present invention being that the Version 4 fragment offset and fragment identification fields are not present in the Version 6 header. The Version 6 header has a “next header” field which may point to a succession of further headers eventually leading to a header which comprises fragment offset and fragment identification fields. The firewall filter process would recognise that it was dealing with a Version 6 header and would access the fragment offset and identification fields in the relevant further header.

[0017] Details of the operation of the internet protocol in general and of the Version 4 and Version 6 headers in particular are contained in IETF requests for comment RFC 791 “DARPA Internet Programme Protocol Specification” September 1981 and RFC 2460 “Internet Protocol, version 6 (IPv6) specification” December 1998, respectively.

[0018] Not all types of layer 4 header contain the port field. Whereas transmission control protocol (TCP) and user datagram protocol (UDP) layer 4 headers do contain the port field, other forms of Layer 4 protocol (e.g. network management protocols) have no equivalent to the port field and therefore identification of the source has to be achieved in different ways. For these protocols the network management function will generate a substitute value to take the place of the “missing” port.

[0019] In acting to separate the secure network from the insecure network and ensure the security of the secure network, the firewall provides three types of transaction regulated by the filter, as follows:

[0020] “Local Call”: voice/data call initiated by a source in the secure network and terminated at a destination in the same secure network;

[0021] “Outgoing Non-Local Call”: voice/data call initiated by a source in the secure network and terminated at a destination in the insecure network;

[0022] “Incoming Non-Local Call”: voice/data call initiated by a source in the insecure network and terminated at a destination inside the secure network.

[0023] It will be noted that two-thirds of all transactions types will have a node within the secure network identified in the source address. Each call/session transfers packets in both directions, so even if there were no local calls, half of the packets would have the secure network number in the IP Source Address Field.

[0024] The conventional approach to tracking the source for a succession of fragments associated with a particular packet is centred on processing in software. However, such implementations are slow due to processing bottlenecks.

[0025] The present invention provides a memory access system comprising a plurality of storage locations for the storage of data therein and addressing means for selecting a desired one of the locations on the basis of a memory address; in which the system also comprises address transformation means for generating a single value of the memory address from one or more corresponding values of an input quantity; in which the number of values of the input quantity that correspond to a single value of the memory address varies across the range of values of the input quantity.

[0026] The present invention also provides a source tracking memory for storing data for identifying fragments of a data structure received via a communication link comprising the system of any above claim.

[0027] The present invention also provides an internet protocol based communication system comprising a source tracking memory.

[0028] The present invention also provides an asynchronous transfer mode based communication system comprising a source tracking memory.

[0029] The present invention also provides a method for memory access in a memory system in which one or more values of an input quantity correspond to a single value of a memory address in which the method comprises the steps of transforming the input quantity to generate a corresponding value of the memory address in which the number of values of the input quantity that are transformed to a single value of the memory address varies across the range of values of the input quantity.

[0030] Embodiments of the invention will now be described by way of example with reference to the drawings in which:

[0031]FIG. 1 is a graphical representation of address mapping according to the present invention;

[0032]FIG. 2 is a schematic representation of a hardware implementation of the mapping function according to the present invention;

[0033]FIG. 3 comprises flow charts illustrating memory access based on a mapping function according to the present invention.

[0034] When a source is identified by the firewall filter it is necessary to store information to enable unambiguous identification of the source for use later in verifying the validity of subsequent fragments that appear to relate to the same IP packet.

[0035] A convenient way of storing and retrieving this information is to create an input address “x” by concatenating the contents of the source address, destination address, protocol and identification fields. In a preferred embodiment x will comprise a subset of the selected fields, i.e. comprising part or all of the source address, all or none of the destination address, protocol and fragmentation identity fields. In a preferred embodiment the contents of the identification field form the less significant end of the combined fields and the contents of the source address form the most significant end. The value of x will be unique for each source. At each location in this source tracking memory, the filter stores one or more source records each comprising, in addition to the contents of the port field of a packet, a so-called time stamp associated with that record and the value of the combined field corresponding to the value of x used to access that location. This is necessary in order to allow the filter to verify on subsequent accesses to that location that the value ‘x’ used to subsequently access it is the same as that used to originally write to it.

[0036] The source tracking memory is operated as follows. When a source sends a first fragment (i.e. with fragment offset (FO) set to zero and more fragments (MF) flag set to 1) to the firewall a source record is entered in the source tracking memory to identify that packet, as detailed above. The time stamp associated with that source record informs the filter that the memory location is ‘occupied’ until expiry of a set time period. For any subsequent fragments relating to the same packet i.e. with matching contents in the combined field the filter uses the contents of the memory location to run checks on the fragment. These checks include identifying subsequent fragments having a low value of FO and MF Flag set to 1: these will be discarded by the firewall. Some fragments relating to a packet may “overtake” the first fragment in passing through the network to arrive at the firewall before the true “first” fragment. These fragments will not have a corresponding entry in the source tracking memory and will be discarded.

[0037] The operation of the firewall filter may be simplified by monitoring the protocol field. In practice only packets transmitting TCP protocol should ever be fragmented. Real-time traffic carried by the UDP protocol should never exceed the 1500 byte limit on MAC frames and hence should not be fragmented. Similarly, signalling or messaging packets (e.g. internet control message protocol (ICMP)) should be small enough to obviate fragmentation. In the IP Version 4 header the protocol field identifies the type of protocol encapsulated in its payload. In IP Version 6 headers the protocol field is replaced with the next header field which is used to identify a string of additional headers, this string of headers eventually identifying a header that contains the identity of the protocol used i.e. the layer 4 protocol header.

[0038] Hence, as described above we can use the value of the input address x to create an address into the source tracking memory of the firewall. Typically, the filtering rules block a large number of destination addresses and can in fact block all destination addresses except one. In addition, the filtering rules will typically act to block all protocols except three (i.e. TCP,UDP and ICMP). Normally no fragmentation is necessary under UDP or ICMP so that the filter can consider any such fragmentation as an attack and discard any fragments received under these protocols without tracking them. With such blocking in force, the above definition of x will be unique for each source which meets the requirements of the filtering rules even if the range of blocked destination addresses and blocked protocols are left out of x.

[0039] By way of example, if the number of protocols is limited to only one, the number of destination addresses is limited to 64 we can then reduce the length of x by limiting the contents of the destination address to 6 bits and omitting the protocol fields from x. (e.g. each source record will comprise 54 bit x+16 bit port+32 bit timestamp).

[0040] According to a preferred embodiment more than 1 different source records may be stored at any one location in the source tracking memory. Advantageoulsy, the full depth of any one location can be read in one burst meaning that no additional clocks are needed to rerun the address generation algorithm, so it is more efficient. Here ‘burst’ is used to denote the reading the whole contents of one location in one go.

[0041] According to a preferred embodiment, all the source records corresponding to all allowed destination addresses for any one combination of source address and fragmentation identity and protocol are stored in one memory location and there is no need to use the destination address in the generation of the input address x.

[0042] With the destination address and protocol fields excluded, x will become a 48 bit number in IP Version 4 and a 160 bit number in IP Version 6 (due to the differing lengths of the fields according to each version). A problem with using even these reduced values of x as memory addresses is that they relate to memory sizes (i.e. 2⁴⁸ and 2¹⁶⁰) that are far too large to be practicable. There is therefore a need for a mapping function for efficiently mapping the excessively large address ranges generated from the combined fields into a manageable range corresponding to a memory address ‘y’. By way of example we shall set ‘y’ to 20 bits, i.e. corresponding to a range of 2²⁰.

[0043] The mapping function proposed is a hyperbolic distortion of input address x around s. s is defined as the network number of the secure network padded with zeros at the less significant end to match the length of x (e.g. 48 bit in Version 4 and 160 bit in Version 6). Most values of x will be close to the value s as their source address will contain the network number of the secure network. Hence the most frequently occurring values of x will fall in a range close to S. The distortion is of the form shown in equations EQ.1 and EQ.2 below. $\begin{matrix} {{{y_{x \geq s}(x)} = {\frac{A_{1}}{{C_{1}x} - D_{1}} - B_{1}}};} & \text{(EQ.~~1)} \\ {{y_{x < s}(x)} = {\frac{A_{2}}{{{- C_{2}}x} - D_{2}} - {B_{2}.}}} & \text{(EQ.~~2)} \end{matrix}$

[0044] All parameters (A₁, B₁, A₂, B₂, C₁, C₂, D₁, and D₂) may be positive or negative, integer or fraction). By selecting the parameter values, an arbitrary monotonic mapping profile can be generated with y decreasing at each side of the number line x=s. These mapping functions hold for x of any size.

[0045] For efficient use of memory space i.e. to reduce the probability of x values colliding in the y space, it is necessary to map x=s to one end of the range of y, i.e. to the minimum possible value (zero) or to the maximum possible y value (y_(max)), as illustrated in equations EQ.3 and EQ.4 for the case where x=s is mapped to y=y_(max): $\begin{matrix} {{y_{\max} = {\frac{A_{1}}{{C_{1}s} - D_{1}} - B_{1}}};} & \text{(EQ.~~3)} \\ {{y_{\max} = {\frac{A_{2}}{{{- C_{2}}s} - D_{2}} - B_{2}}};} & \text{(EQ.~~4)} \end{matrix}$

[0046] and to map the two extreme values of x (i.e. the ends of the range of x values (0, x_(max)) to the other end of the range of y, i.e. to y_(max) or to y=0, as illustrated in equations EQ.5 and EQ.6 for the case where the extreme values of x are mapped to y=0: $\begin{matrix} {{0 = {\frac{A_{1}}{{C_{1}x_{\max}} - D_{1}} - B_{1}}};} & \text{(EQ.~~5)} \\ {0 = {{- \frac{A_{2}}{D_{2}}} - {B_{2}.}}} & \text{(EQ.~~6)} \end{matrix}$

[0047] For the case where x=s is mapped to y=0, the above equations (EQ.1 to EQ.6) are modified by multiplying both sides by −1 and adding y_(max) to both sides.

[0048] Note that in the above methods, x=s divides the range of x (0,x_(max))into two segments. Reusing this concept, the range can be segmented further and the above method applied to each pair of neighbouring segments separately: e.g. dividing the range 0,x_(max) into two pairs of (i.e. 4) segments by lines x=s₁ and x=s₂ together with x=x₀ where x₀ is the border between the 2 pairs of segments e.g. x₀=(s₁+s₂)/2, we can arrive at the set mapping functions y_(x<s1), y_(s1≦x≦x0), y_(x0<x<s2), and y_(x≧s2),.

[0049] Graphically, the mapping has the type of form shown in FIG. 1. Referring to FIG. 1, s was generated by way of example from an arbitrary network number, y_(max) selected for 1M (2²⁰) locations in an SDRAM array, and x_(max) was set to the number of all possible IP v4 x values (2⁴⁸). The parameters were: A₁=2.8799×10²⁰, B₁=95, C₁=16384, D₁=1.6038×10¹⁸; A₂=4.6236×10³⁵, B₂=5.497520689×10¹¹, C₂=16384, D₂=−8.4104×10²³.

[0050] Hence the mapping is broadest around s (i.e. the gradient of the characteristic of y=f(x) is greatest for the range of x close to s) and more compressed (i.e. the gradient reduces) as x moves away from s. A mapping of this form advantageously minimises the chance of contention for memory locations.

[0051] A hardware implementation for the mapping according to a further preferred embodiment of the present invention is shown in FIG. 2. As shown in FIG. 2 the comparator compares the values of x and s and controls a bank of four multiplexers according to the result. Each of the four multiplexers has two inputs for selecting one of two constant values. Hence a first multiplexer (mux 1) selects between C₁ and −C₂, a second multiplexer (mux 2) selects between D₁ and D₂, a third multiplexer (mux 3) selects between A₁ and A₂ and the fourth multiplexer selects between B₁ and B₂. The constant value mentioned first in the above list for each multiplexer is selected if x is found to be greater than or equal to s with the second mentioned constant value being selected if x is found to be less than s. The first multiplexer feeds into a multiplier whose other input carries the value of x. The product of the constant selected by the first multiplexer and x is provided to the plus input of a summer whose minus input is supplied by the output of the second multiplexer. The output of the summer forms the divide input to a second multiplier whose multiply input is provided by the output from the third multiplexer. The output from the second multiplier forms the plus input to a second summer who negative input is provided by the fourth multiplexer. The output of the second summer provides the memory address y. Referring to FIG. 2, Σ indicates add/subtract logic, Π indicates multiply/divide logic. Multiplying x by C₁, C₂ may be reduced to padding m zeros to the less significant end of x if C₁, C₂ are powers of 2 (2^(m)). All negative numbers are 2's complements i.e. −x=invert_(bitwise)(x)+1. The circuits are preferably fixed point binary, but can be floating point if the higher cost and complexity is acceptable. According to a further preferred embodiment the hardware may be pipelined to increase throughput. The hardware would typically be implemented as a PLD or ASIC depending on requirements.

[0052] If input addresses x₁, x₂, . . . x_(n) collide in the memory address space y, links (denoted “=>”) are set up. Hence if two memory address values y,y₁ clash, i.e.=y₁, y₁=>y₂, . . . y_(n−1)=>y_(n), where y_(n) is the first free location found. That is when an entry x_(j+1) is in contention with another entry x_(j) (i.e. both values of x map on to a particular value of y, say y_(j)), then y will be incremented until a free location is found, say at y_(j+1). The entry for x_(j+1) will then be stored at location y_(j+1) and the value y_(j+1) recorded at memory location y_(j) in order to allow the x_(j+1) entry ‘diverted’ to y_(j+1) to be retrieved by means of the original address y_(j). In order to identify which entry resides at the contended address y_(j), the source record corresponding to x_(j) is recorded at memory location y_(j) to be retrieved by means of address y_(j). Every location of the source tracking memory in use (e.g. y_(k)) will hold a copy of the source record corresponding to x_(k). If a source record that is part of a link chain is cleared, the link pointing to it is also cleared (e.g. y_(k) cleared results in y_(k−1)=>y_(k+1)).

[0053] Advantageously, to reduce the number of links, a source tracking memory location can hold more than one entry, as described above.

[0054] Each entry and each link is provided with an individual (non-real time) time stamp from a free-running non-over-rolling counter. By non-over-rolling is meant that the counter comprises enough bits not to reach maximum count and ‘roll-over’ to zero during the lifetime of the product. By way of example, a 64 bit counter incrementing on a 30 ns (33 MHz) clock overrolls in 2⁶⁴×30 ns=18000 years. On receipt of the last fragment of an IP packet, the filter should clear the corresponding memory entry and reorganize the links as above, as required. If the last fragment does not arrive (i.e. is lost in the network), the entry will not clear in the normal way. This is where the time stamp can resolve the situation. If a new entry tries to access that same memory location, it will be allowed to overwrite the existing entry if the time stamp has expired. A time stamp is said to have expired when a set amount of time is passed since its creation. If a link points to a timed-out entry, that link is also described as timed-out. If a non-timed-out link exists from a memory location y, a subsequent write access will follow the existing link chain from location v to its end and then find a free location for the new entry.

[0055] Depending on the width of the memory data bus and the access burst length (i.e. the number of data words read in one burst where the word size is the width of the memory data bus) any one memory location y can have more than one entry. This reduces the number of links necessary. In the following, one entry per y location is assumed.

[0056] The compression of the address range resulting from the mapping (or transformation) of x to y will inevitably lead to contention for memory addresses. This contention has conventionally been handled in software typically by use of hashing techniques.

[0057] A state transition diagram representing a hardware state machine to lookup a source entry at the memory address y (i.e. the output of the mapping function described above) is shown in FIG. 3a. Referring to FIG. 3a, the hardware state machine checks if location y is occupied. If location y is not occupied an entry does not exist at that location. (Step 1) if that location is occupied, the hardware state machine reads the entry and compares it with the input (or calling) value of x. If the values of x and the source record match, the correct entry has been found. If there is no match, the hardware state machine checks if a link exists from that location. If no link exists an entry does not exist for that x. If a link does exist from that location, the hardware state machine follows the link to the indicated location and continues from step 1 above.

[0058]FIG. 3b shows how the hardware state machine creates a source entry. First the hardware state machine needs to find a empty location in the memory. A location is defined as empty if it either contains no entry or contains only an entry whose timestamp has expired. Referring to FIG. 3b, if an entry has not been found during the source look-up operation, i.e. the desired entry does not exist and location y_(k) indicated by the transformation performed on input value x_(k) is unoccupied, the hardware state machine will write the source location corresponding to x_(k) to location y_(k). If the desired entry does not exist but location y_(k) is occupied, the hardware state machine will increment y until an empty location is found (e.g. at y_(k+1)). The hardware state machine will then write the source record corresponding to x_(k), together with the time stamp into the location y_(k+1), and will record y_(k) at y_(k+1) to create the link to y_(k+1). If the hardware state machine has found an entry with an unexpired time stamp then the desired entry already exists and there is no need to create a new entry.

[0059]FIG. 3c shows how a hardware state machine clears a source entry. This state machine updates the link chain when an entry is cleared. As an alternative to the sequence of operations shown in FIG. 3c with the two blocks following the decision “both y_(k+1) and y_(k−1) links exist”, these two operations may be carried out in the reverse order, i.e. the “following link to y_(k−1)” operation may occur before the “following link to y_(k+1)” operation.

[0060] Referring to FIG. 3c, the hardware state machine will ‘look up’ the desired entry, as described above. If the entry does not exist (i.e. is not found) the hardware state machine will do nothing. If the desired entry is found at location y_(k), the hardware state machine will clear the entry at y_(k) and check if a link to location with a lower address (y_(k−1)) exists and will check if a link to a location with a higher address(y_(k−1)) exists. If no links are found the “entry clear” operation is complete. If only a link to y_(k−1) exists, the hardware state machine will delete the record of y_(k) at y_(k−1). If only a link to y_(k+1) exists, the hardware state machine will delete the record of y_(k) at y_(k+1). If links to both locations y_(k−1) and y_(k+1) exist, the hardware state machine will follow the link to y_(k+1) and change the record of y_(k) at y_(k+1) to y_(k−1). Either before or after the previous step the hardware state machine will follow the link to y_(k−1) and change the record of y_(k) at y_(k−1) to y_(k+1). 

1. A memory access system comprising a plurality of storage locations for the storage of data therein and addressing means for selecting a desired one of the locations on the basis of a memory address; in which the system also comprises address transformation means for generating a single value of the memory address from one or more corresponding values of an input quantity; in which the number of values of the input quantity that correspond to a single value of the memory address varies across the range of values of the input quantity.
 2. The system as claimed in claim 1 in which each value of the input quantity is related to the corresponding value of the memory address by a hyperbolic function.
 3. The system as claimed in any above claim for receiving various values of the input quantity over time in which the transformation means comprises means for generating a plurality of memory addresses forming a range of addresses and in which addresses at one end of the memory address range are selected to correspond to a range comprising the most frequently occurring values of the input quantity.
 4. The system as claimed in claim 3 in which the other end of the memory address range is selected to correspond to the extreme values of the input quantity.
 5. The system as claimed in any claim as dependent from claim 3 in which the range of values of the input quantity is divided by a value of the input quantity forming one end of the range of most frequently occurring values.
 6. The system as claimed in any above claim in which for a first part of a range of values of the input quantity each value of the input quantity is related to the corresponding value of the memory address by a first hyperbolic function; and for a second part of the range of values of the input quantity each value of the input quantity is related to the corresponding value of the memory address by a second hyperbolic function.
 7. The system as claimed in any above claim in which some values of the memory address correspond to a single value of the input quantity.
 8. A source tracking memory for storing data for identifying fragments of a data structure received via a communication link in which the memory comprises the system of any above claim.
 9. The memory as claimed in claim 8 in which the input quantity comprises a set of data for characterising the fragments.
 10. The memory as claimed in claim 9 in which the fragments comprise header information and in which the set of data is derived from the fragment header information.
 11. An internet protocol based communication system comprising the source tracking memory as claimed in any one of claims 8 to
 10. 12. An asynchronous transfer mode based communication system comprising the source tracking memory as claimed in any one of claims 8 to
 10. 13. A method for memory access in a memory system in which one or more values of an input quantity correspond to a single value of a memory address; in which the method comprises the steps of transforming the input quantity to generate a corresponding value of the memory address; in which the number of values of the input quantity that are transformed to a single value of the memory address varies across the range of values of the input quantity.
 14. The method as claimed in claim 13 in which the transformation is a hyperbolic function.
 15. The method as claimed in any one of claims 13 and 14 including the step of receiving various values of the input quantity over time and selecting one end of of the memory address range to correspond to a range comprising the most frequently occurring values of the input quantity.
 16. The method as claimed in claim 15 including the steps of selecting the minimum value of the memory address to correspond to the extreme values of the input quantity.
 17. The method as claimed in any claim as dependent from claim 15 in which the range of values of the input quantity is divided by a value of the input quantity forming one end of the range of most frequently occurring values.
 18. The method as claimed in any above claim as dependent from claim 13 including the steps of using a first hyperbolic function to transform each value of the input quantity to a corresponding value of the memory address for a first part of a range of values of the input quantity; and using a second hyperbolic function to transform each value of the input quantity to a corresponding value of the memory address for a second part of the range of values of the input quantity.
 19. A method for identifying fragments of a data structure received via a communication link using a source tracking memory for storing data; in which the method includes the method of any above claim.
 20. The method as claimed in claim 19 in which the input quantity comprises a set of data for characterising the fragments.
 21. The method as claimed in claim 20 in which the fragments comprise header information; in which the method includes the step of generating the set of data from the fragment header information.
 22. A circuit for performing an address transformation for generating a single value of a memory address from one or more corresponding values of an input quantity; in which the number of values of the input quantity that correspond to a single value of the memory address varies across the range of values of the input quantity.
 23. The circuit of claim 22 comprising a plurality of stages for pipelined operation. 