摘要:
Methods and apparatus for randomizing selection of a next-hop path/link in a network are disclosed. An example method includes receiving, at the network device, a data packet. The example method further includes generating a first hash key based on the data packet and generating a first hash value from the first hash key using a first hash function. The example method also includes generating a second hash key based on the data packet and the first hash value and generating a second hash value from the second hash key using a second hash function. The example method still further includes selecting a next-hop path based on the second hash value.
摘要:
Methods and apparatus for improving hash-based load balancing with randomized seed selection are disclosed. The methods and apparatus described herein increase the number of unique fields in a hash key before the hash key is presented to a hash function. The methods include selecting one or more seed values based the output of a first arbitrary function having a first set of packet fields as input. The one or more seed values are combined with a second set of packet fields. A second arbitrary function generates a hash value based on the one or more seed values and the second set of packet fields. The hash value is applied as input to a hash function in a member selection module. The method enables per flow randomization attributes based on per packet attributes to perform aggregate member selection while remaining deterministic from a root-node or network perspective.
摘要:
Methods and apparatus for randomizing selection of a next-hop path/link in a network are disclosed. An example method includes receiving, at the network device, a data packet. The example method further includes generating a first hash key based on the data packet and generating a first hash value from the first hash key using a first hash function. The example method also includes generating a second hash key based on the data packet and the first hash value and generating a second hash value from the second hash key using a second hash function. The example method still further includes selecting a next-hop path based on the second hash value.
摘要:
A system transfers data. The system includes an ingress node transferring data at a determined bandwidth. The ingress node includes a buffer and operates based on a monitored node parameter. The system includes a controller in communication with the ingress node. The controller is configured to allocate, based on the monitored node parameter, an amount of the determined bandwidth for directly transferring data to bypass the buffer of the ingress node.
摘要:
Methods and apparatus for improving hash-based load balancing using flow identifier remapping are disclosed. The node-based remapping of flow identifiers introduces additional information into the hash function by injecting new values into the hash key on a per node basis. The methods and apparatus described herein perform a remapping operation on a fixed per-flow attribute such as one or more packet fields. Upon receipt of a packet, a set of the packet fields is selected as a hash key. From these selected packet fields, one or more fields are selected and remapped using a remapping operation. A transformed hash key is formed using the one or more remapped values along with other packet fields. The transformed hash key is then presented as an input to an arbitrary hash function. The hash function generates a hash value that is then used for path selection.
摘要:
Methods and apparatus for improving hash-based load balancing with per-hop seeding are disclosed. The methods and apparatus described herein provide a set of techniques that enable nodes to perform differing mathematical transformations when selecting a destination link. The techniques include manipulation of seeds, hash configuration mode randomization at a per node basis, per node/microflow basis or per microflow basis, seed index generation, and member selection. A node can utilize any, or all, of the techniques presented in this disclosure simultaneously to improve traffic distribution and avoid path starvation with a degree of determinism.
摘要:
Methods and apparatus for randomizing selection of a next-hop path/link in a network are disclosed. An example method includes randomly selecting one or more path-selection randomization options to be applied to data packets processed in the network device. The example method further includes receiving a data packet and applying, by the network device, the one or more path-selection randomization operations to the data packet. The example method also includes determining a next-hop path for the data packet based on the one or more path-selection randomization operations and transmitting the data packet to a next-hop network device using the determined next-hop path.
摘要:
Methods and apparatus for randomizing selection of a next-hop path/link in a network are disclosed. An example method includes receiving, at the network device, a data packet. The example method further includes generating a first hash key based on the data packet and generating a first hash value from the first hash key using a first hash function. The example method also includes generating a second hash key based on the data packet and generating a second hash value from the second hash key using a second hash function. The method still further includes combining the first hash value and the second hash value to produce a combined hash value and selecting a next-hop path based on the combined hash value.
摘要:
Methods and apparatus for randomizing selection of a next-hop path/link in a network are disclosed. An example method includes randomly selecting one or more path-selection randomization options to be applied to data packets processed in the network device. The example method further includes receiving a data packet and applying, by the network device, the one or more path-selection randomization operations to the data packet. The example method also includes determining a next-hop path for the data packet based on the one or more path-selection randomization operations and transmitting the data packet to a next-hop network device using the determined next-hop path.
摘要:
A system and method for hierarchical adaptive dynamic egress port and queue buffer management. Efficient utilization of buffering resources in a commodity shared memory buffer switch is key to minimizing packet loss. Efficient utilization of buffering resources is enabled through adaptive queue limits that are derived from an adaptive port limit.