Patent application number | Description | Published |
20090316700 | CASCADED MEMORY TABLES FOR SEARCHING - Devices, systems, methods, and other embodiments associated with cascaded memory tables for searching are described. In one embodiment, an integrated chip is implemented with two or more address tables. The two or more address tables are implemented with separate memory tables to store addresses. The two or more address tables are comprised of a first address table and a second address table. Connection lines connect the first address table and the second address table to create a cascaded address table. Search logic initiates a search of the first address table for an address. If the address is not found, the search logic initiates a search of the second address table through the connection lines. | 12-24-2009 |
20110255540 | System and Method for Adapting a Packet Processing Pipeline - An apparatus for forwarding packets includes a packet processing pipeline having a processing unit that processes packets compliant with a recognized communication protocol. A first port coupled to the packet processing pipeline is configured to receive a packet that does not comply with the recognized communication protocol and has a header that conforms to a second communication protocol. A data extraction unit extracts first destination information from the header of the packet and, based on the first destination information, generates second destination information that conforms to the recognized communication protocol. The processing unit determines, based on the second destination information, an egress interface to which the packet is to be forwarded. | 10-20-2011 |
20120134266 | LOAD BALANCING HASH COMPUTATION FOR NETWORK SWITCHES - Techniques to load balance traffic in a network device or switch include a network device or switch having a first interface to receive a data unit or packet, a second interface to transmit the packet, and a mapper to map between virtual ports and physical ports. The network device includes hash value generator configured to generate a hash value based on information included in the packet and based on at least one virtual port. The hash value may be optionally modified to load balance egress traffic of the network device. The network device selects a particular virtual port for egress of the packet, such as by determining an index into an egress table based on the (modified) hash value. The packet is transmitted from the network device using a physical port mapped to the particular virtual port. | 05-31-2012 |
20120134497 | LOAD BALANCING HASH COMPUTATION FOR NETWORK SWITCHES - Techniques to load balance traffic in a communication network include a network switch or device having an interface to receive a data unit or packet. The network device includes a hash value generator configured to generate a symmetric key from an initial key that is based on the packet, and configured to generate a hash value based on the symmetric key and the packet. The hash value may be optionally modified to load balance egress traffic of the network device. The network device selects an egress link or port, such as by determining an index into an egress table based on the (modified) hash value. The techniques described herein allow packets or data units of a particular flow to travel in both directions along a same path through the communication network. | 05-31-2012 |
20120136999 | LOAD BALANCING HASH COMPUTATION FOR NETWORK SWITCHES - Techniques to avoid polarization in a communication network include a network switch or device having a first interface to receive a data unit or packet, and a second interface via which the packet is transmitted from the network device. The network device includes a hash value generator configured to generate, using a depolarizer, a depolarized key from an initial key (where the initial key is based on contents of the packet and the depolarizer is unique to the network device), and to generate a hash value based on the depolarized key and the packet by using a hash function that is common to all network devices in the network. The hash value may be optionally modified to load balance egress traffic of the network device. The network device selects an egress link or port, such as by determining an index into an egress table based on the (modified) hash value. | 05-31-2012 |
20120300779 | CASCADED MEMORY TABLES FOR SEARCHING - Devices, systems, methods, and other embodiments associated with cascaded memory tables for searching are described. In one embodiment, an integrated chip is implemented with two or more address tables. The two or more address tables are implemented with separate memory tables to store addresses. The two or more address tables are comprised of a first address table and a second address table. Connection lines connect the first address table and the second address table to create a cascaded address table. Search logic initiates a search of the first address table for an address. If the address is not found, the search logic initiates a search of the second address table through the connection lines. | 11-29-2012 |
20120327936 | FCOE OVER TRILL - A method for processing packets, in a network device including at least one processing engine that i) is not configured to process destination information that conforms to a first protocol and ii) is configured to process destination information that conforms to a second protocol, includes receiving a packet at the network device, and determining, in the network device, first destination information included in the packet. The first destination information conforms to the first protocol. The method also includes generating, in the network device, second destination information conforming to a third protocol based on the first destination information. The method also includes generating, in the network device, third destination information conforming to the second protocol based on the second destination information. The method also includes processing the packet with the at least one processing engine included in the network device using the third destination information. | 12-27-2012 |
20120327937 | FCOE OVER TRILL - A method for forwarding FCoE packets in a network switching device includes receiving a first packet at the network switching device via an Ethernet link, determining, in the network switching device, an FC destination identifier included in the first packet, updating, in the network switching device, an Ethernet address based on the FC destination identifier, generating, in the network switching device, a first TRILL destination identifier based on the updated Ethernet address, and causing, in the network switching device, the first packet to be forwarded to a different device based on the first TRILL destination identifier. | 12-27-2012 |
20130016723 | SCALING OF VIRTUAL MACHINE ADDRESSES IN DATACENTERS - A device in a server having a processor and a storage. The device has a downstream communication unit configured to receive a data packet. The device also has a protocol blind network path indication unit configured to obtain an indicator corresponding to a predetermined path to a data communication unit in the network, by accessing the protocol blind correlation structure using a destination address of the data packet. The device, furthermore, has an upstream communication unit configured to transmit a network protocol blind packet including the data packet and the indicator corresponding to the predetermined data path to the data communication unit in the network. The device also includes a combiner configured to bind the indicator to the data packet received by the downstream communication unit. | 01-17-2013 |
20130208735 | CLOCK SYNCHRONIZATION USING MULTIPLE NETWORK PATHS - In a network device communicatively coupled to a master clock via a plurality of different communication paths, a clock synchronization module is configured to determine a plurality of path time data sets corresponding to the plurality of different communication paths based on signals received from the master clock via the plurality of different communication paths between the network device and the master clock. A clock module is configured to determine a time of day as a function of the plurality of path time data sets. | 08-15-2013 |
20130259049 | CLOCK SYNCHRONIZATION USING MULTIPLE NETWORK PATHS - A network device includes one or more ports coupled to a network, and a time synchronization module. The time synchronization module processes (i) respective path information, and (ii) respective time synchronization information included in each of at least some of a plurality of time synchronization packets received from a master clock device over two or more different communication paths and via at least one of the one or more ports, wherein the respective path information indicates a respective communication path in the network via which the respective time synchronization packet was received. The time synchronization module determines a system time clock responsive to the processing of the path information and the time synchronization information included in the at least some of the plurality of time synchronization packets. | 10-03-2013 |
20130266011 | TRANSPARENT RBRIDGE - A transparent edge Routing Bridge (RBridge) including a first communication unit configured to receive a data packet from an access segment of a network, the data packet including an egress device nickname and at least one Virtual Local Area Network (VLAN) tag, a TRansparent Interconnection of Lots of Links (TRILL) header constructing unit configured to construct a TRILL header based on the VLAN tag, and a second communication unit that transmits the data packet, including the TRILL header, to an egress device corresponding to the egress device nickname via a TRILL compliant interconnection layer. | 10-10-2013 |
20140115167 | Load Balancing Hash Computation for Networks - A data unit is received at a network device associated with a link aggregate group. An initial key is determined based on information included in the data unit. Another key is generated based on a first field of the initial key and a second field of the initial key. A hash function is applied to the other key to generate a hash value. A communication link in the link aggregate group is determined based on the hash value, and the data unit is transmitted over the communication link. | 04-24-2014 |
20140160934 | LOAD BALANCING HASH COMPUTATION FOR NETWORK SWITCHES - Techniques to load balance traffic in a network device or switch include a network device or switch having a first interface to receive a data unit or packet, a second interface to transmit the packet, and a mapper to map between virtual ports and physical ports. The network device includes hash value generator configured to generate a hash value based on information included in the packet and based on at least one virtual port. The hash value may be optionally modified to load balance egress traffic of the network device. The network device selects a particular virtual port for egress of the packet, such as by determining an index into an egress table based on the (modified) hash value. The packet is transmitted from the network device using a physical port mapped to the particular virtual port. | 06-12-2014 |
20140161143 | Clock Synchronization Using Multiple Network Paths - A packet transmitted by a master clock via a network is received via a port of a network device. The packet includes a time stamp from the master clock. It is determined via which one of a plurality of communication path in the network the packet was received. An application layer module of the network device uses (i) the time stamp in the packet and (ii) the determination of the communication path to determine time information. | 06-12-2014 |
20140325228 | LOAD BALANCING HASH COMPUTATION FOR NETWORK SWITCHES - Techniques to avoid polarization in a communication network include a network switch or device having a first interface to receive a data unit or packet, and a second interface via which the packet is transmitted from the network device. The network device includes a hash value generator configured to generate, using a depolarizer, a depolarized key from an initial key (where the initial key is based on contents of the packet and the depolarizer is unique to the network device), and to generate a hash value based on the depolarized key and the packet by using a hash function that is common to all network devices in the network. The hash value may be optionally modified to load balance egress traffic of the network device. The network device selects an egress link or port, such as by determining an index into an egress table based on the (modified) hash value. | 10-30-2014 |