摘要:
A method and system for downloading software managed trees (SMTs) in a network processing system provides dynamic update of frame classifiers while maintaining proper network protocol processing. The network processing system includes a general purpose processor acting as control point processor and a plurality of network processors. The new SMT is built by an application on the control point processor and downloaded to one or more of the network processors. The new SMT is placed in a separate memory location accessible to the network processors, rather then overwriting the existing SMT. The active tree pointers are then changed to transfer control to the new SMT.
摘要:
This process accepts rule domination declarations and subjects rules to a computer program which either finds a type of administrative error (cyclic domination) or assigns a priority number to each rule so that any two rules which intersect (some key fits both rules) have necessarily different priority numbers. In the case that priority numbers are assigned, the process goes on to check for a second type of administrative error, namely inclusion of a first rule in a second (every key which fits the first rule also fits the second), and with the second having higher priority (so that the first is never referenced). If neither error occurs, then the number of different priority numbers is minimized. Every key when tested by such a rule set with neither error must fit either no rules at all or must fit exactly one rule with highest priority. In the latter case, the action of the unambiguously determined rule can then be applied to the packet represented by the key.
摘要:
A classification system includes a software managed tree testing bits from a key which labels an item. The bits are chosen by application of the Choice Bit Algorithm to the Rules in a Database of Rules. A controller including logic parses an unknown Key for bits to be tested in the decision nodes of a binary tree. Tests dictated by the tree are conducted in a predetermined way until all but one Rule from the database or all but a few Rules from the database are eliminated from consideration, whereupon the Key is fully tested by the one remaining Rule or in a lattice constructed of the remaining plurality of Rules, to determine an action to enforce on the item. Certain compare tests are used in the binary tree for the case that otherwise identical or similar rules are applied to integer ranges of key values which do not fall upon power of 2 boundaries. Furthermore, some very frequently occurring rules in such final tests might be designated as secondary rules, the remaining rules designated as primary rules, the entire decision tree recalculated using only primary rules, and the primary rules then connected to secondary rules only when logically necessary by means of a system of pointers making use of relative priorities of rules.
摘要:
A method and system for memory management in a network processing system provides for allocation of physical memory areas within network processors coupled to a control point processor by a bus. The allocation scheme provides a memory management layer without requiring a complete operating system interface and supports asynchronous completion of the allocation requests. Multicast allocation is supported allowing an allocation to be simultaneously requested on multiple network processors. The allocation mechanism returns a token, which may then be used to access the memory location via a protocol over the bus, and a single token may refer to an allocation made on several network processors where the actual physical addresses and memory configurations are different.
摘要:
A method and apparatus for processing network frames by embedding control information achieves an efficient frame processing system within a network processor (NP). The layer type of the frame can be quickly determined by the layer processing components of picocode running on the NP by examining control information that is written by ingress processing layers to produce a modified frame format. The frames are routed to appropriate layer processors and processing for certain layers may be bypassed if the picocode determines that no processing is required at that layer. The frame may also be discarded completely by any of the layer processors.
摘要:
A system for controlling multicast traffic in a multiprocessing system is disclosed. The multiprocessing system includes a general-purpose processor, a plurality of network processors and a switch fabric. The system comprises a multicast identifier (MID) manager to manage a distributed database of MIDs. The distributed database includes at least one compound MID. The at least one compound MID structure further comprises a plurality of MIDs representing at least two multicast groups. The system also includes a MID processor which traverses the at least one compound MID and resolves it into its associated simple MIDs. Accordingly, the present invention provides for a system and method for efficiently controlling multicast transmissions when different types of multicast groups are to receive the multicast transmissions. In this system and method a new type of multicast identifier (MID) is provided, a compound MID. The compound MID is a single MID but references multiple MIDs. The system includes a MID manager which manages a distributed database of MIDS. Finally, the system and method includes at least one MID processor which accesses the appropriate compound MIDs and resolves them into the simple member MIDs to allow a router to provide the information to an appropriate bridge.
摘要:
A controllable mechanism for by-passing Layer 4 (L4) classification is based on the insertion into a set of Layer 3 (L3) rules in an L3 lookup tree set of Layer 4 (L4) Classification Required Flags. The state of the L4 classification flag is set by comparing the L4 classification rule to an IP (Internet Protocol) lookup rule. Routing is accomplished by selecting which rule to apply to the data packet and reading the state of the corresponding L4 Classification Required Flag. In response to a first state of the corresponding L4 Classification Required Flag, an L4 classification is performed followed by a routing of the data packet. In response to a second state of the corresponding L4 Classification Required Flag performing a routing of said data packet. In a second embodiment, the method inserts into a set of L3 rules in L3 lookup means a set L4 Classification Required Flags and Global Flags. A first state of the L4 Classification Required Flag is set when a new rule is added to L4 classification means, the new rule being correlatable to a single entry in L3 lookup means. Routing is accomplished by selecting which rule to apply to the data packet and reading the state of the corresponding L4 classification required flag. In response to a first state of the corresponding L4 classification flag, a L4 classification is performed followed by a routing of the data packet. In response to a second state of the corresponding L4 classification flag, the state of the Global Flag is read, and in response to a first state of the Global flag, a L4 classification is performed followed by a routing of the data packet. In response to a second state of the Global Flag, the data packet is routed.
摘要:
A method and system for finding a longest matching prefix for an input keyword from among multiple prefixes. The prefixes are data strings of varying lengths wherein prefixes of length n or greater are probabilistically a longest prefix match. The method of the present invention begins by mapping the prefixes of length greater than or equal to n1, that is, in the interval [n1, L], into a first lookup system. Remaining prefixes of length less than n1 but greater than or equal to n2, that is, in the interval [n2, n1−1], are mapped into a second index utilizing a second hash function, wherein n2 is less than n1. Further lookup systems on prefixes having lengths in the intervals [n3, n2−1], [n4, n3−1], and so on, may also be utilized, as determined by optimization studies and the statistics of routing tables.
摘要:
A controllable mechanism for by-passing Layer 4 (L4) classification is based on the insertion into a set of MAC rules in SA MAC lookup means a set of Layer 4 (L4) Skip Classification Flags. Routing is accomplished by selecting which rule to apply to the packet and reading the state of the corresponding L4 Skip Classification Flag. In response to a first state of said corresponding L4 Skip Classification Flag, performing an L4 classification followed by a routing of the data packet. In response to a second state of said corresponding L4 Skip Classification Flag, reading the state of a Global Classification Flag. In response to a first state of said Global Classification Flag, performing an L4 classification followed by a routing of said data packet. In response to a second state of said Global Classification Flag performing a routing of the data packet. The L4 Skip option change does not use the option change of reading the L4 Skip Classification Flag from the port table, whereas the second embodiment uses this option. The third and fourth embodiments are similar to the first and second embodiments but with the. addition of inserting into a set of Layer 3 (L3) rules in L3 lookup means a set of Layer 4 (L4) Classification Required Flags. The third embodiment does not use the option of reading the L4 Skip Classification Flag from the port table, whereas the fourth embodiment uses this option.
摘要:
The transport protocol for communicating between general purpose processors acting as contact points and network processors in a packet processing environment such as Ethernet is provided. In such an environment, there is at least one single control point processor (CP) and a plurality of network processors (NP), sometimes referred to as blades. A typical system could contain two to sixteen network processors, and each network processor connects to a plurality of devices which communicate with each other over a network transport, such as Ethernet. The CP typically controls the functionality and the functioning of the network processors to function in a way that connects one end user with another, whether or not the end user is on the same network processor or a different network processor. There are three types of communication provided; first, there is communication generally referred to as control services and normally there will be only one pico processor which operates as a GCH (guided cell handler) and only one that operates as a guided tree handler (GTH). A path is provided for the controls to the GCH and the GTH commands, and a separate path is provided for the data frames between the GDH's (general data handler) and the CP.