摘要:
A method includes reading content of network traffic that arrives at a network port of a network switch of a mesh of network switches. A hash algorithm is applied to the read content to indicate a path to a destination network switch of the mesh, the hash algorithm being common to all network switches of the mesh. The network traffic is forwarded via a network port that is associated with the indicated path.
摘要:
Network devices, systems, and methods are provided for packet processing. One network device includes a network chip including logic and a number of network ports for the device for receiving and transmitting packets therefrom. The logic is operable to mirror packets on a per port per virtual local area network (VLAN) membership basis.
摘要:
Systems, devices, and methods, including executable instructions are provided for content addressable memory (CAM). One method includes defining the CAM into an array of data words having M rows and N columns, with each of N and M being greater than one. The data words of the CAM are arranged according to a 2-dimensional priority scheme. Data words outside a selected 1×M column are masked to be ignored in determining a match, and the CAM is searched. Each search includes N compare cycles and each compare cycle having a different 1×M column selected. A highest priority match per compare cycle is pipelined from a priority encoder with the pipelined matches arranged to communicate a priority order in a first dimension of the 2-dimensional priority scheme.
摘要:
A method for remedying data corruption in a first circuit, which may be a CAM or a TCAM. The method includes providing a RAM circuit external to the first circuit, the RAM circuit being configured for storing error detection information for data stored in the first circuit. The method also includes scrubbing the data stored in the first circuit during scrubbing cycles of the first circuit. The scrubbing corrects stored bit patterns read from the first circuit that fail an error detection test using error detection information corresponding to individual ones of the stored bit patterns. In an embodiment, ECC may be employed for the error detection test and also to correct any single bit error found.
摘要:
A method for remedying data corruption in a first circuit, which may be a CAM or a TCAM. The method includes providing a RAM circuit external to the first circuit, the RAM circuit being configured for storing error detection information for data stored in the first circuit. The method also includes scrubbing the data stored in the first circuit during scrubbing cycles of the first circuit. The scrubbing corrects stored bit patterns read from the first circuit that fail an error detection test using error detection information corresponding to individual ones of the stored bit patterns. In an embodiment, ECC may be employed for the error detection test and also to correct any single bit error found.
摘要:
One embodiment disclosed relates to a method for mirroring of select network traffic. A data packet is received by a network device. A determination is made as to whether a designated aspect of the packet matches a flagged entry in a look-up table on the network device. If a match is found, then copy of the packet is sent to an associated mirror destination. Another embodiment disclosed relates to a networking apparatus. The apparatus includes at least an operating system, a look-up table, and a mirroring engine. The operating system includes routines utilized to control the apparatus, and the look-up table includes selection information for mirror sources. The mirroring engine forwards copies of selected packets to a corresponding mirror destination. Another embodiment disclosed relates to a method of selecting packets to mirror that includes checking state information relating to the network traffic against dynamic mirroring criteria.
摘要:
An embodiment of the invention evaluates the suitability of routes for use in a network route cache. An embodiment of the invention allows the use of network routing caches to be optimized such that routes that are not used to route to a large number of destinations can be offloaded into a less expensive host route cache.
摘要:
An example method includes creating a plurality of redundant, non-looping paths to a plurality of switches, and providing information to the plurality of switches about the plurality of redundant, non-looping paths. The method further comprises assigning each of a plurality of clients to one of the plurality of redundant, non-looping paths, and providing information to the plurality of switches about which of the plurality of redundant, non-looping paths each client of the plurality of clients is assigned to. Then, in response to receiving a packet from a client of the plurality of clients, the method comprises transmitting the packet on one of the plurality of redundant, non-looping paths to one of the plurality of switches based at least in part on which of the plurality of redundant, non-looping paths the client is assigned to.
摘要:
A method includes reading content of network traffic that arrives at a network port of a network switch of a mesh of network switches. A hash algorithm is applied to the read content to indicate a path to a destination network switch of the mesh, the hash algorithm being common to all network switches of the mesh. The network traffic is forwarded via a network port that is associated with the indicated path.
摘要:
In one embodiment of the invention, a method for prioritizing network packets, includes: comparing a packet with at least one copy rule; and if the packet matches the copy rule, then buffering the packet in a queue. The method further includes: processing the packet after buffering the packet in the queue.