摘要:
Techniques to load balance traffic in a communication network include a network switch or device having an interface to receive a data unit or packet. The network device includes a hash value generator configured to generate a symmetric key from an initial key that is based on the packet, and configured to generate a hash value based on the symmetric key and the packet. The hash value may be optionally modified to load balance egress traffic of the network device. The network device selects an egress link or port, such as by determining an index into an egress table based on the (modified) hash value. The techniques described herein allow packets or data units of a particular flow to travel in both directions along a same path through the communication network.
摘要:
Techniques to load balance traffic in a network device or switch include a network device or switch having a first interface to receive a data unit or packet, a second interface to transmit the packet, and a mapper to map between virtual ports and physical ports. The network device includes hash value generator configured to generate a hash value based on information included in the packet and based on at least one virtual port. The hash value may be optionally modified to load balance egress traffic of the network device. The network device selects a particular virtual port for egress of the packet, such as by determining an index into an egress table based on the (modified) hash value. The packet is transmitted from the network device using a physical port mapped to the particular virtual port.
摘要:
An agent selected from: (a) a pathogenic self-antigen associated with a T-cell-mediated specific autoimmune disease of an organ; (b) a peptide which sequence is comprised within the sequence of (a); (c) a peptide obtained by modification of (b), by replacement of one or more amino acid residues by different amino acid residues, said modified peptide still being capable of recognizing the T-cell receptor recognized by the parent peptide but with less affinity; (d) a nucleotide sequence encoding (a), (b), or (c); and (e) T cells activated by a pathogenic self-antigen of (a), a peptide of (b), or a modified peptide of (c), can be used for treatment of a non-autoimmune disease, disorder or injury in said organ. For example, uveitogenic antigens or peptides thereof can be used for treatment of a non-autoimmune disease, disorder or injury in the eye.
摘要:
A method for forwarding FCoE packets in a network switching device includes receiving a first packet at the network switching device via an Ethernet link, determining, in the network switching device, an FC destination identifier included in the first packet, updating, in the network switching device, an Ethernet address based on the FC destination identifier, generating, in the network switching device, a first TRILL destination identifier based on the updated Ethernet address, and causing, in the network switching device, the first packet to be forwarded to a different device based on the first TRILL destination identifier.
摘要:
In a method for processing data packets in accordance with a timing protocol, a data packet that includes i) a checksum and ii) a timestamp is received. The timestamp is modified to generate a modified timestamp and a checksum trailer value is determined to maintain correctness of the checksum in the data packet having the modified timestamp. Additionally, at least a portion of a field of the data packet is set to the checksum trailer value, where the field is defined by the timing protocol for use other than a checksum trailer.
摘要:
Techniques to avoid polarization in a communication network include a network switch or device having a first interface to receive a data unit or packet, and a second interface via which the packet is transmitted from the network device. The network device includes a hash value generator configured to generate, using a depolarizer, a depolarized key from an initial key (where the initial key is based on contents of the packet and the depolarizer is unique to the network device), and to generate a hash value based on the depolarized key and the packet by using a hash function that is common to all network devices in the network. The hash value may be optionally modified to load balance egress traffic of the network device. The network device selects an egress link or port, such as by determining an index into an egress table based on the (modified) hash value.
摘要:
Techniques to load balance traffic in a network device or switch include a network device or switch having a first interface to receive a data unit or packet, a second interface to transmit the packet, and a mapper to map between virtual ports and physical ports. The network device includes hash value generator configured to generate a hash value based on information included in the packet and based on at least one virtual port. The hash value may be optionally modified to load balance egress traffic of the network device. The network device selects a particular virtual port for egress of the packet, such as by determining an index into an egress table based on the (modified) hash value. The packet is transmitted from the network device using a physical port mapped to the particular virtual port.
摘要:
A packet processor is described that performs keep alive message processing using a bifurcated aging table approach. The packet processor includes an aging table, a binding module and an aging daemon. The aging table includes a plurality of records corresponding to a plurality of network links supported by the packet processor. Each record in the aging table is used to track an aging status of a corresponding network link. The binding module associates a received message with a record in the aging table based on information in the received message. The aging daemon scans the aging table, updates the aging status of each network link, and determines that a network link has failed when the updated status for the respective network link exceeds a predetermined threshold. In an embodiment, the aging table includes a base aging table that uses a first number of bits to track the aging status of each network link and an extended aging table that uses a second number of bits that is larger than the first number of bits to track an aging status of a network link on which a number of not received keep alive messages exceeds a threshold.
摘要:
A method for processing packets, in a network device including at least one processing engine that i) is not configured to process destination information that conforms to a first protocol and ii) is configured to process destination information that conforms to a second protocol, includes receiving a packet at the network device, and determining, in the network device, first destination information included in the packet. The first destination information conforms to the first protocol. The method also includes generating, in the network device, second destination information conforming to a third protocol based on the first destination information. The method also includes generating, in the network device, third destination information conforming to the second protocol based on the second destination information. The method also includes processing the packet with the at least one processing engine included in the network device using the third destination information.