Evaluating the Available Bandwidth between Leaf Switches in a Fat-Tree Network

    公开(公告)号:US20250158890A1

    公开(公告)日:2025-05-15

    申请号:US18508287

    申请日:2023-11-14

    Inventor: Eitan Zahavi

    Abstract: A system for bandwidth estimation includes an interface and a processor. The interface communicates with a fat-tree (FT) network including leaf switches belonging to a bottom level, spine switches belonging to a top level and intermediate switches belonging to one or more intermediate levels. The processor estimates an available bandwidth between first and second leaf switches, by identifying a first bottom-to-top sub-tree to which the first leaf switch belongs, and a second bottom-to-top sub-tree to which the second leaf switch belongs, determining path counts for at least some of the switches in the intermediate levels, wherein a path count for a switch is indicative of a number of paths that each passes via the switch, reaches the first leaf switch via the first bottom-to-top sub-tree, and reaches the second leaf switch via the second bottom-to-top sub-tree, and estimating the available bandwidth based on the path counts.

    SYSTEMS AND METHODS OF INITIATING RETRANSMISSION REQUESTS

    公开(公告)号:US20250158739A1

    公开(公告)日:2025-05-15

    申请号:US19026299

    申请日:2025-01-16

    Abstract: A communication system is described, among other things. An illustrative system is disclosed to include one or more decoding circuits to perform forward error correction for a received data block in a physical layer and one or more cyclic redundancy check circuits to perform a cyclic redundancy check based on a first output of the decoding circuits and a cyclic redundancy check code generated in the physical layer based on the received data block. In response to one or more of a second output of the decoding circuits and an output of the cyclic redundancy check circuits, a retransmission request of the data block is initiated.

    SYSTEMS, METHODS, AND APPARATUSES FOR SECURING OWNERSHIP OF OBJECTS IN A DIGITAL LEDGER

    公开(公告)号:US20250150270A1

    公开(公告)日:2025-05-08

    申请号:US19018806

    申请日:2025-01-13

    Abstract: Various embodiments of the present disclosure provide for generating and managing a digital ledger access system and its associated objects. An example method is configured for securing objects in a digital ledger of objects by identifying an object from amongst a plurality of objects in the digital ledger of objects and generating a quantum token for attachment with the object. The method includes deriving one or more classical public keys associated with the quantum token and determining an attempt to access the object. The method provides access to the object in response to a validation of the classical public key based on the quantum token, and the method precludes access to the object in response to an invalidation of the classical public key based on the quantum token.

    Dynamic fabric reaction for optimized collective communication

    公开(公告)号:US12294518B2

    公开(公告)日:2025-05-06

    申请号:US17882063

    申请日:2022-08-05

    Abstract: A networking device and system are described, among other things. An illustrative system is disclosed to include a congestion controller that manages traffic across a network fabric using receiver-based packet scheduling and a networking device that employs the congestion controller for data flows qualified as a large data flow but bypasses the congestion controller for data flows qualified as a small data flow. For example, the networking device may receive information describing a data flow directed toward a processing network; determine, based on the information describing the data flow, a size of the data flow; determine the size of the data flow is below a predetermined flow threshold; and in response to determining that the size of the data flow is below a predetermined threshold, bypass the congestion controller.

    SESSION SHARING WITH REMOTE DIRECT MEMORY ACCESS CONNECTIONS

    公开(公告)号:US20250141961A1

    公开(公告)日:2025-05-01

    申请号:US19012523

    申请日:2025-01-07

    Abstract: Systems and methods enable session sharing for session-based remote direct memory access (RDMA). Multiple queue pairs (QPs) can be added to a single session and/or session group where each of the QPs has a common remote. Systems and methods may query a session ID for an existing session group and then use the session ID with an add QP request to join additional QPs to an existing session. Newly added QPs may share one or more features with existing QPs of the session group, such as encryption parameters. Additionally, newly added QPs may be configured with different performance or quality of service requirements, thereby isolating performance, and permitting true scaling for high performance computing applications.

    Traveling wave cascaded micro ring modulators

    公开(公告)号:US12287537B2

    公开(公告)日:2025-04-29

    申请号:US17993296

    申请日:2022-11-23

    Abstract: Traveling wave cascaded micro ring modulators (TW-CMRMs) are provided. An example TW-CMRM includes an optical bus, an electrical transmission line, and at least two micro ring modulators (MRMs) operatively coupled to the optical bus and the electrical transmission line. The electrical transmission line includes a cathode transmission line and an anode transmission line. The at least two MRMs are cascaded in a series connection, and the at least two cascaded MRMs include a first terminal and a second terminal respectively. The at least two cascaded MRMs collectively modulate a phase and/or an amplitude of an optical input signal received from an optical signal source.

    Flow/application-based packet marking by network-adapter

    公开(公告)号:US12284120B2

    公开(公告)日:2025-04-22

    申请号:US17988799

    申请日:2022-11-17

    Abstract: A network adapter includes a host interface, a network interface, a packet processor, and a telemetry handler. The host interface is to communicate with a host. The network interface is to send packets to a network. The packet processor is to process the packets prior to sending the packets to the network. The telemetry handler is to receive from the host, over the host interface, an indication specifying a flow or application, to mark one or more packets associated with the flow or application with a specified identifier in response to the indication, and to send the marked packets using the packet processor to the network via the network interface.

    INTERRUPT EMULATION ON NETWORK DEVICES

    公开(公告)号:US20250123980A1

    公开(公告)日:2025-04-17

    申请号:US18988345

    申请日:2024-12-19

    Abstract: Methods, systems, and devices for message signaled interrupt (MSI-X) tunneling on a host device exposed by a bridge connection are described. A device may receive data and a first interrupt signal from a remote destination over a network protocol. The device may receive the data and/or the first interrupt signal over the bridge connection, via a tunneled communication from the remote destination. The device may generate a second interrupt signal based on the first interrupt signal and a local interrupt configuration provided by a system bus driver of the device. The device may inject the data and the second interrupt signal over the system bus. Injecting the data and injecting the second interrupt signal may include ensuring the data is made available to the system bus driver, prior to the interrupt handler receiving the second interrupt signal.

    AI-supported network telemetry using data processing unit

    公开(公告)号:US12273380B2

    公开(公告)日:2025-04-08

    申请号:US17550867

    申请日:2021-12-14

    Abstract: A device receives a packet from a local network. The packet may be directed toward a cloud computing resource. The device determines that the packet is associated with a new packet flow. In response to determining that the packet is associated with the new packet flow, the device provides one or more packets from the new packet flow to a machine learning model for packet inspection. The device receives an output from the machine learning model and routes the new packet flow based on the output received from the machine learning model. The output indicates whether or not the new packet flow is associated with a network attack.

Patent Agency Ranking