Abstract:
The present invention provides a protection protocol for fault recovery, such as a ring wrap, for a network, such as a two line bi-directional ring network. An embodiment of the present invention works in conjunction with a ring topology network in which a node in the network can identify a problem with a connection between the node and a first neighbor. The present invention provides 1 protection protocol which simplifies the coordination required by the nodes in a ring network. The nodes do not need to maintain a topology map of the ring, identifying and locating each node on the ring, for effective protection. Additionally, independently operating ring networks can be merged and the protection protocol will appropriately remove a protection, such as a ring wrap, to allow the formation of a single ring. It also provides for multiple levels of protection priority so that protection for a high priority failure, such as a physical break in a connection, would remove protection for a low priority failure, such as signal degrade, on another link.
Abstract:
In one embodiment, an apparatus generally comprises one or more input interfaces for receiving a plurality of flows, a plurality of output interfaces, and a processor operable to identify large flows and select one of the output interfaces for each of the large flows to load-balance the large flows over the output interfaces. The apparatus further includes memory for storing a list of the large flows, a pinning mechanism for pinning the large flows to the selected interfaces, and a load-balance mechanism for selecting one of the output interfaces for each of the remaining flows. A method for local placement of large flows to assist in load-balancing is also disclosed.
Abstract:
The rate at which a node transmits data is modified dependent on the receive rate by selecting one of a plurality of predetermined quantum values dependent on the difference between the number of bytes received and the number of bytes transmitted. An offset equal to the difference between the number of bytes transmitted and the number of bytes received is compared to a predetermined threshold value. A predetermined quantum value is selected dependent on the result of the comparison. Rate shaping is applied to the transmit data by halting data transmission for an inter-gap interval dependent on the selected quantum value.
Abstract:
The present invention provides a protection protocol for fault recovery, such as a ring wrap, for a network, such as a two line bidirectional ring network. An embodiment of the present invention works in conjunction with a ring topology network in which a node in the network can identify a problem with a connection between the node and a first neighbor. The present invention provides a protection protocol which simplifies the coordination required by the nodes in a ring network. The nodes do not need to maintain a topology map of the ring, identifying and locating each node on the ring, for effective protection. Additionally, independently operating ring networks can be merged and the protection protocol will appropriately remove a protection, such as a ring wrap, to allow the formation of a single ring. It also provides for multiple levels of protection priority so that protection for a high priority failure, such as a physical break in a connection, would remove protection for a low priority failure, such as a signal degrade, on another link.
Abstract:
A device for switching packets at high speed. For each packet, the A device matches packet data with protocols, to determine how to switch the packet. Matching of data with protocols is highly parallel; the device simultaneously retrieves a data byte, compares a data byte with a protocol byte, tests a comparison result, and executes a processor instruction. A switching engine having a comparator and a decision tree memory. The comparator includes three outputs for indicating a comparison result (less-than, equal-to, or greater-than). The tree memory includes three corresponding banks of addressable memory. Each memory location comprises an entry for a next location, an entry for a next protocol byte, and an entry for a processor instruction. A set of protocol tests are assembled into the tree memory, and a set of routing tables are dynamically generated into the tree memory.
Abstract:
The present invention provides a protection protocol for fault recovery, such as a ring wrap, for a network, such as a two line bi-directional ring network. An embodiment of the present invention works in conjunction with a ring topology network in which a node in the network can identify a problem with a connection between the node and a first neighbor. The present invention provides a protection protocol which simplifies the coordination required by the nodes in a ring network. The nodes do not need to maintain a topology map of the ring, identifying and locating each node on the ring, for effective protection. Additionally, independently operating ring networks can be merged and the protection protocol will appropriately remove a protection, such as a ring wrap, to allow the formation of a single ring. It also provides for multiple levels of protection priority so that protection for a high priority failure, such as a physical break in a connection, would remove protection for a low priority failure, such as a signal degrade, on another link.
Abstract:
In one embodiment, an apparatus generally comprises one or more input interfaces for receiving a plurality of flows, a plurality of output interfaces, and a processor operable to identify large flows and select one of the output interfaces for each of the large flows to load-balance the large flows over the output interfaces. The apparatus further includes memory for storing a list of the large flows, a pinning mechanism for pinning the large flows to the selected interfaces, and a load-balance mechanism for selecting one of the output interfaces for each of the remaining flows. A method for local placement of large flows to assist in load-balancing is also disclosed.
Abstract:
Disclosed are, inter alia, methods, apparatus, data structures, computer-readable media, and mechanisms, for scheduling items in a system, such as, but not limited to a computer or communications system. For example, in one implementation, each of the items in a set of items has an associated deficit and mini-deficit. A next particular item is selected from the set of items currently having enough deficit to process the particular item. One or more entities associated with the particular item is processed a commensurate amount corresponding to the mini-deficit associated with the particular item. This processing is repeatedly performed until there are no more entities associated with the particular item or until the deficit associated with the particular item does not allow any further processing at the current time.
Abstract:
The present invention provides a protection protocol for fault recovery, such as a ring wrap, for a network, such as a two line bi-directional ring network. An embodiment of the present invention works in conjunction with a ring topology network in which a node in the network can identify a problem with a connection between the node and a first neighbor. The present invention provides a protection protocol which simplifies the coordination required by the nodes in a ring network. The nodes do not need to maintain a topology map of the ring, identifying and locating each node on the ring, for effective protection. Additionally, independently operating ring networks can be merged and the protection protocol will appropriately remove a protection, such as a ring wrap, to allow the formation of a single ring. It also provides for multiple levels of protection priority so that protection for a high priority failure, such as a physical break in a connection, would remove protection for a low priority failure, such as a signal degrade, on another link.