摘要:
Methods and apparatus are disclosed for performing lookup operations using associative memories, including, but not limited to modifying search keys within an associative memory based on modification mappings, forcing a no-hit condition in response to a highest-priority matching entry including a force no-hit indication, selecting among various sets or banks of associative memory entries in determining a lookup result, and detecting and propagating error conditions. In one implementation, each block retrieves a modification mapping from a local memory and modifies a received search key based on the mapping and received modification data. In one implementation, each of the associative memory entries includes a field for indicating that a successful match on the entry should or should not force a no-hit result. In one implementation, an indication of which associative memory blocks or sets of entries to use in a particular lookup operation is retrieved from a memory.
摘要:
Methods and apparatus are disclosed for performing lookup operations using associative memories, including, but not limited to modifying search keys within an associative memory based on modification mappings, forcing a no-hit condition in response to a highest-priority matching entry including a force no-hit indication, selecting among various sets or banks of associative memory entries in determining a lookup result, and detecting and propagating error conditions. In one implementation, each block retrieves a modification mapping from a local memory and modifies a received search key based on the mapping and received modification data. In one implementation, each of the associative memory entries includes a field for indicating that a successful match on the entry should or should not force a no-hit result. In one implementation, an indication of which associative memory blocks or sets of entries to use in a particular lookup operation is retrieved from a memory.
摘要:
Methods and apparatus are disclosed for performing lookup operations using associative memories, including, but not limited to modifying search keys within an associative memory based on modification mappings, forcing a no hit condition in response to a highest priority matching entry including a force no hit indication, selecting among various blocks or sets of associative memory entries in determining a lookup result, and detecting and propagating error conditions. In one implementation, indications of which associative memory blocks to use and/or enable in a particular lookup operation are retrieved from one or more memories, such as that based on received a profile ID. In one implementation, which may or may not be in a cascaded configuration, one or more identified or received error conditions are propagated in such a manner as to identify a source of each error condition.
摘要:
Methods and apparatus are disclosed for, inter alia, managing idle time and performing lookup operations to adapt to refresh requirements and/or operational rates of the particular associative memory or other devices used to implement the system. A system typically a controller coupled to a circuit including includes multiple associative memories. The controller receives performance information from at least one of the associative memories and generates idle time corresponding to the performance information. This performance information may include an actual refresh requirement for each of the associate memories or the worst-case requirement of one of the associative memories, so that the controller can intermittently provide the actual refresh cycles required, if any, by a particular implementation. This performance information may indicate for some or all instructions the actual time required by a particular instruction, so that the controller can operate based on the actual time required, rather than inefficiently operating on a worst-case time defined in a specification or data sheet.
摘要:
A method for supporting a communication application between a plurality of enterprises in a secure manner, where each enterprise includes a plurality of clients, includes providing a distributed instant multimedia communication (IMC) system that includes a plurality of autonomous networks communicatively coupled to one another via a network. Each autonomous network is associated with an enterprise and includes an IMC server that manages IMC services for a plurality of clients in the enterprise, The IMC server is configured to support a private channel that allows each client in the enterprise to share its presence information with other clients in other enterprises. The method also includes providing the communication application in a first client in a first enterprise such that a user of the first client is allowed to invoke and control the communication application locally, and allowing the user of the first client to invoke the communication application to create application specific data and to create a recipient list comprising a recipient client in a second enterprise. The application specific data and the recipient list are received by a first IMC server associated with the first enterprise, and in response to receiving the application specific data and recipient list, utilizes the private channel to transmit the application specific data to the recipient client in the second enterprise.
摘要:
A source-synchronous parallel interface divides a wide data bus into clock-groups including a sub-group of the data lines and a clock line carrying a copy of the transmit clock. The traces in a clock-group are located physically close together to minimize skew between the signals carried on the traces of the clock-group. Deskew logic on the receiver compensates for skew between received clock-group signals.
摘要:
Methods, computer products, and systems are described for providing terminal view access of a client device in a secure enterprise network. One method includes receiving a request from a first client device within the secure enterprise network and/or a second client device for providing terminal view access of the first and/or second client device to the second and/or first client device respectively. A security check on the request is performed to enforce a security policy of the secure enterprise network. When the security policy is satisfied, a secure data transport channel is established between the first client device and the second client device. Terminal view data corresponding to a desktop associated with the first and/or second client device is received from the first and/or second client device respectively via the data transport channel and is provided to the second and/or first client device respectively via the data transport channel.
摘要:
A distributed instant multimedia communication (IMC) system that allows users to communicate with one another in real-time includes a plurality of autonomous networks. Each autonomous network includes at least one server that supports (IMC) sessions for a plurality of clients registered on the server, and a multi-point switch unit coupled to the server(s) that sends data out of and receives data into the autonomous network, and routes data within the autonomous network through the server(s). In addition the IMC system includes a network coupled to the autonomous networks. The network sends data between the autonomous networks so that the autonomous networks can communicate with one another. Because each autonomous network is capable of communicating with other autonomous networks in a secure manner over the network, two or more clients in one or more autonomous networks can conduct a secure IMC session with one another without requiring an independent service provider.
摘要:
Methods and systems are described for providing a lock-down community. In one aspect, a system comprises an indication handler component in a host node device managing a lock-down community of a computer node device, the lock-down community comprising a plurality of resources where the computer node device is configured to communicate only with a resource in the lock-down community via a network. The host node device hosts an operating system that maintains an approved resource list that identifies the plurality of resources in the lock-down community of the computer node device. The indication handler component is configured to receive an indication to update the approved resource list, wherein the indication identifies a target resource. The system also includes an update handler component configured to update the approved resource list based on the received indication, thereby modifying the lock-down community of the computer node device.
摘要:
Methods, computer products, and systems are described for providing remote access to resources in a secure data center protected by at least one firewall. One method includes sending by an internal server within the secure data center a request to an external server outside of the secure data center to establish a secure data transport channel between the internal server and the external server. The request travels through at least one firewall protecting the secure data center and over a public network, a private network, and/or a second firewall. The internal server receives a reply to the request from the external server granting the request and confirming the establishment of the secure data transport channel. When a first message from the external server instructing the internal server to create a first data access point associated with a first session is received via the established secure data transport channel, the internal server instantiates the first data access point for the first session and visual data corresponding to the resources in the secure data center is sent from the first data access point to the external server via the secure data transport channel. The visual data is received by the external server and then sent to a first client associated with the first session so that the first client is provided visual access to the resources in the secure data center while the resources remain protected within the secure data center.