摘要:
A network device receives a packet that includes a plurality of sets of fields. Sets of fields of the packet are parsed and the field sets are evaluated as soon as they are available to determine whether a processing decision can be made on the packet. Additional field sets may be parsed from the packet and obtained in parallel with determining whether a processing decision can be made, but once it is determined that a processing decision can be made, the evaluating of field sets is terminated such that any further field sets of the packet are ignored for purposes of making a processing decision for the packet.
摘要:
Techniques are disclosed to transmit packets by a network switch and according to a link protocol while reducing incidence of intra-packet transmission gaps unsupported by the link protocol. Whether a packet satisfies an underflow risk condition is determined by evaluating, for each of one or more cycles since receipt of one or more flits of the packet, a respective count of flits of the packet received by the network switch in the respective cycle. Only upon determining that the packet satisfies the underflow risk condition is selective underflow protection performed for the packet, including buffering an increased count of flits of the packet, prior to commencing transmission of the packet.
摘要:
A data segment of a data packet destined for an egress port of an egress node may be received at a first ingress node. An egress statement vector and an ingress statement vector may be identified at the first ingress node. A determination may be made, based on the egress statement vector and ingress statement vector, whether the first ingress node is authorized to transfer the data segment to the egress port before the other data segments of the data packet are received at the first ingress node. The data segment may be transferred to the egress port before the other data segments of the data packet are received at the first ingress node when the determination indicates the first ingress node is authorized. The data segment may be stored in a buffer of the first ingress node when the determination indicates the first ingress node is not authorized.
摘要:
Processing techniques in a network switch help reduce latency in the delivery of data packets to a recipient. The processing techniques include speculative flow status messaging, for example. The speculative flow status messaging may alert an egress tile or output port of an incoming packet before the incoming packet is fully received. The processing techniques may also include implementing a separate accelerated credit pool which provides controlled push capability for the ingress tile or input port to send packets to the egress tile or output port without waiting for a bandwidth credit from the egress tile or output port.
摘要:
A system transfers data. The system includes an ingress node transferring data at a determined bandwidth. The ingress node includes a buffer and operates based on a monitored node parameter. The system includes a controller in communication with the ingress node. The controller is configured to allocate, based on the monitored node parameter, an amount of the determined bandwidth for directly transferring data to bypass the buffer of the ingress node.
摘要:
A system for transferring data includes an egress node including an egress port, and an ingress node configured to receive a data segment of a data packet destined for the egress port. The data packet is associated with a packet priority level. The ingress node is configured to receive an egress statement vector from the egress node indicating whether the egress port is or is not flow controlled for data associated with the packet priority level. The ingress node is configured to determine whether the egress port is available to receive the data segment from the ingress node before other data segments of the data packet are received at the ingress node based on the egress statement vector.
摘要:
A method and Bridge in a Provider Backbone Bridge Network (PBBN) for enabling frames from a Higher Layer Entity attached alternatively to a Provider Instance Port (PIP) on an I-Component of a Backbone Edge Bridge or to a Customer Backbone Port on a B-Component of the Backbone Edge Bridge, to reach an intended entity in the PBBN. A Virtual Instance Port Service Access Point (VIP SAP) is configured for every VIP and every Higher Layer Entity configured on the I-Component. An Enhanced VIP Port Connectivity function utilizes the VIP SAP to tunnel customer-initiated Layer 2 Control Protocols (L2CPs). A Special Multiplexed SAP handles the frames of the Higher Layer Entity. A Service Instance Multiplex Entity utilizes the Special Multiplexed SAP to transfer frames between the PIP or the Customer Backbone Port and the entity inside the PBBN.
摘要:
Systems, methods, devices, and network architectures are disclosed for creating and implementing secure wireless, wired, and/or optical stealth-enabled networks using specially modified packets, cells, frames, and/or other “stealth” information structures. This enables stealth packets to have a low probability of detection, a low probability of interception, and a low probability of interpretation. Stealth packets are only detected, intercepted, and correctly interpreted by stealth-enabled network equipment. In its simplest form, stealth packet switching modifies the packet structure, protocols, timing, synchronization, and other elements through various rule-violations. This creates stealth packets, which normal equipment cannot receive correctly, and hence normal equipment discards the stealth packets.Stealth packets may be further enhanced with encryption techniques which focus on encrypting the packet structure itself, as opposed to merely encrypting the data. Using encryption to modify the packet structure itself adds an entirely new level of encryption complexity, thus making the stealth communications orders of magnitude more difficult to decrypt than standard decryption techniques.Combining stealth packets with time-based reservation packet switching enables total encryption of the packet (including header and preamble encryption) capable of routing through multiple hops without decryption of headers and preamble at each hop. Time-based reservation packet switching can also guarantee real-time stealth packet delivery through a network that is totally congested from data storms, virus caused congestion, and/or denial of service attacks.
摘要:
In one embodiment, an apparatus includes a shared memory buffer including a lead memory bank and a write multiplexing module configured to send a leading segment from a set of segments to the lead memory bank. The set of segments includes bit values from a set of variable-sized cells. The write multiplexing module further configured to send each segment from the set of segments identified as a trailing segment to a portion of the shared memory mutually exclusive from the lead memory bank.
摘要:
A network device of is a network device that transfers frames by repeating, in a constant cycle, a reserved transfer interval and a free transfer interval. The network device includes a transmission port, a cycle timer, a mode switching control unit that monitors a transfer state of the transmission port and selects a store-and-forward system when the transmission port is in the transfer process and selects a cut-through system when the transmission port is not in the transfer process, and a transfer prohibition control unit that selects the cut-through system as a transfer system when a non-reserved frame is transmitted and switches a transfer method of the non-reserved frame to the store-and-forward system when a reserved transfer interval is established, with reference to the cycle timer.