SYNOPSIS
See Net::IPTrie
DESCRIPTION
See Net::IPTrie
CLASS METHODS
new - Constructor
Arguments: up - Parent node left - Left child node right - Right child node address - Address string prefix - IP prefix (defaults to host mask) iaddress - Integer address data - Scalar (could be a reference to any data structure) Returns: New Net::IPTrie::Node object Examples: my $n = Net::IPTrie::Node->new(up=>$up, address=>"10.0.0.1")
INSTANCE METHODS
parent - Find closest parent node with IP information
Arguments: None Returns: Node object with address, or undef Examples: my $parent = $node->parent;
delete - Delete an IP node from the tree
Note: The node is actually emptied, not deleted Arguments: None Returns: Deleted (empty) Node object Examples: my $n = $tr->find("10.0.0.1"); $n->delete();
AUTHOR
Carlos Vicente <[email protected]>LICENCE AND COPYRIGHT
Copyright (c) 2007-2010, Carlos Vicente <[email protected]>. All rights reserved.This module is free software; you can redistribute it and/or modify it under the same terms as Perl itself. See perlartistic.
DISCLAIMER OF WARRANTY
BECAUSE THIS SOFTWARE IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE SOFTWARE, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE SOFTWARE ``AS IS'' WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE SOFTWARE IS WITH YOU. SHOULD THE SOFTWARE PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR, OR CORRECTION.IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE SOFTWARE AS PERMITTED BY THE ABOVE LICENCE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE SOFTWARE (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE SOFTWARE TO OPERATE WITH ANY OTHER SOFTWARE), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.