摘要:
A forwarding database in a network switch is established and maintained by performing a look-up for a source address read from an incoming frame to find a match between the source address in the frame and the source address in an entry which includes that source address, a port number and an age field. New entries are made if matches are not found, so that the forwarding database facilitates the dispatch of frames to destination addresses corresponding to source addresses in the table. The performance of a source address look-up is inhibited in the absence of a token, a reservoir of tokens being decremented each time a source address look-up is performed and incremented from time to time, at a selectable rate. The process facilitates the performance of a destination address look-up for every received frame by restricting the bandwidth made available for source address look-ups.
摘要:
The occurrence of false positives and the post-processing of digital streams subjected to examination by a deterministic finite state machine for character strings are reduced by combining location-based pattern matching, e.g. on packet headers, and content-based pattern matching, e.g. on payloads of packets. One scheme allows automatic transition from a header match state into an initial state of a content matching machine. Another scheme is based on a rules graph defining strings of match states and the examination of a list of match states (rather than characters) which have been previously determined, for example by means of header matching and content matching. The latter is also capable of comparing offset and depth values associated with the match states with offset and depth criteria.
摘要:
A switching module has external ports for sending and receiving data packets and mesh interfaces for internal mesh connections with other modules. A switching engine directs packets to one or other of the mesh interfaces according to the port number of a ‘destination’ or egress port on another module, as determined by a lookup. The port numbers are programmable so that the distribution of traffic through the mesh connections can be modified.
摘要:
Network units such as switches for use in a cascaded stack are organised to provide a cascade connection in the form of a dual unidirectional connection so that, in its ordinary configuration, there is at least one and preferably more than one unidirectional ring for each direction around the cascade, each ring including a respective port on each unit. For each ring, each port on a unit is connected by a respective link to a corresponding port on the preceding unit and the following unit. The units provide a self-healing operation in the event of various kinds of operational failure. The self-healing operation includes loop-back of packets in units adjacent the failure and bypass of a packet switching process for other units. The units include control logic for passing control frames containing status information relating to the units and links between them and for co-operation with a CPU to control a switching engine to perform the self-healing operation in accordance with that status information. The units forward on the cascade packets with headers that identify a destination port and the unit on which that port is located and also indicate which units have and have not been traversed by a packet.
摘要:
A rules engine for the examination of selected fields in an addressed data packet, has an access control list table of which the entries each define an access control list rule, an action and a chain identifier. The access control list rule is a basic rule which refers to a TCP flow. The engine also has an extension rule table of which the entries each define an extension rule, a respective action and a respective rule identifier. The extension rule may refer to a particular flag in a TCP header. When a packet arrives the engine searches both tales. This search is made independently of the usual address lookup. If there is a match in both tables, and the chain identifier matches the extension rule identifier the engine prescribes the action associated with the extension rule. If the chain identifier of a matched access control list rule does not match a rule identifier of a matched extension rule the engine prescribes the action associates with the access control list rule. In the absence of a match with any access control list rule the action on a packet is based on the result from a lookup engine.
摘要:
A forwarding database in a network switch is established and maintained by performing a look-up for a source address read from an incoming frame to find a match between the source address in the frame and the source address in an entry which includes that source address, a port number and an age field. New entries are made if matches are not found, so that the forwarding database facilitates the dispatch of frames to destination addresses corresponding to source addresses in the table. The switch maintains a system age, such as a two-bit field, which is changed from time to time and the current system age is entered in the table as the age field when a source address entry is made. When said source address is found by a look-up process, it is updated with the current system age only if the age field of the entry and the current system age do not correspond. There is a saving of bandwidth arising from the avoidance of write cycles when an age field of an entry corresponds to the current system age.
摘要:
Port mirroring is achieved between ports on separate devices in a stack of communication devices by establishing a protocol for communications within a cascade connection forming the stack in which an indication is given of whether the communication is being sent to the mirror port in addition to its intended destination. This avoids increasing the volume of traffic in the cascade connection as would be the case if the original and mirror copy were sent separately.