摘要:
A computer-implemented method classifies a packet received from a network. The method comprises receiving the packet having header information and a rule-set that indicates a plurality of actions to perform on the packet. A geometric representation of the rule-set is constructed having a plurality of dimensions and rule boundaries. At least one rule boundary and dimension of the geometric representation is split to form a search structure having a plurality of nodes. Each node in the plurality of nodes is constrained to a predetermined memory threshold. The search structure is searched using the header information to obtain a rule in the rule-set that indicates an action to take on the packet.
摘要:
The disclosure relates to technology performing a cyclic redundancy check (CRC). Data is divided into a plurality of blocks, each of the plurality of blocks having a fixed size equal to a degree of a generator polynomial. A CRC computation is independently performed on each of the plurality of blocks, and the CRC computation for each of the plurality of blocks is combined by application of an exclusive or (XOR) operation.
摘要:
A service level agreement (SLA) system is provided for multi-tenant cloud computing to enable provisioning of computing instances for tenants with a networking SLA. A networking SLA may specify a bandwidth requirement, for example, between instances to be scheduled for a tenant in a datacenter. The SLA system evaluates nodes in the datacenter based on a remaining capacity of links associated with nodes implementing the networking SLA. A modular system is provided to enable integration of the SLA system into existing cloud computing infrastructures. The cloud management system may query the SLA system to determine nodes in the datacenter capable of meeting a networking SLA. The list may be ordered to indicate nodes having better capacity to fulfill the networking SLA. The cloud management system can utilize the ordered list of nodes in scheduling instance deployments for tenant requests.
摘要:
A computer-implemented method classifies a packet received from a network. The method comprises receiving the packet having header information and a rule-set that indicates a plurality of actions to perform on the packet. A geometric representation of the rule-set is constructed having a plurality of dimensions and rule boundaries. At least one rule boundary and dimension of the geometric representation is split to form a search structure having a plurality of nodes. Each node in the plurality of nodes is constrained to a predetermined memory threshold. The search structure is searched using the header information to obtain a rule in the rule-set that indicates an action to take on the packet.
摘要:
An apparatus, such as a network element, comprises a receiver to receive a plurality of packets. A memory stores instructions and forms a first and second set of virtual queues to store the plurality of packets. A processor having one or more cores with one or more packet classifiers provides a classification of a packet in the plurality of packets. The processor in communication with the memory executes instructions to transfer the packet from the receiver to a virtual queue in the first set of virtual queues based on the classification. The processor also transfers the packet from the virtual queue to a transmitter based on a demand rate value and supply rate value associated with the virtual queue.
摘要:
A network state is verified in real-time by precomputing a data structure representing header spaces of data packets in respective equivalence classes (ECs) in a first snapshot of the network and in a second snapshot of the network at a later time. The data structure includes respective bitmaps indicating for each data packet forwarding rule for each node in the network a forwarding action to be taken for each EC in the network. The respective bitmaps store bits indicating for each data packet forwarding rule whether the data packet forwarding rule applies to the respective ECs in the network. The snapshots are compared to identify network paths that have changed between a time of the first snapshot and the second snapshot of the network and network verification operations are performed on the changed network paths as a logical function of a bitmap corresponding to each changed network path.
摘要:
A network state is verified in real-time by precomputing a data structure representing header spaces of data packets in respective equivalence classes (ECs) in a first snapshot of the network and in a second snapshot of the network at a later time. The data structure includes respective bitmaps indicating for each data packet forwarding rule for each node in the network a forwarding action to be taken for each EC in the network. The respective bitmaps store bits indicating for each data packet forwarding rule whether the data packet forwarding rule applies to the respective ECs in the network. The snapshots are compared to identify network paths that have changed between a time of the first snapshot and the second snapshot of the network and network verification operations are performed on the changed network paths as a logical function of a bitmap corresponding to each changed network path.
摘要:
The disclosure relates to technology performing a cyclic redundancy check (CRC). Data is divided into a plurality of blocks, each of the plurality of blocks having a fixed size equal to a degree of a generator polynomial. A CRC computation is independently performed on each of the plurality of blocks, and the CRC computation for each of the plurality of blocks is combined by application of an exclusive or (XOR) operation.
摘要:
A packet classification system is provided, including a first security database and a second security database for use in connection with packet classification in accordance with an Internet security protocol. The packet classification system further includes processing circuitry in communication with the first security database and the second security database, with the processing circuitry configured to identify at least one aspect of at least one packet received by the processing circuitry, select either the first security database or the second security database as a selected security database, based on the at least one aspect of the at least one packet, select at least one of a plurality of algorithms to classify the at least one packet, wherein the selection of the at least one algorithm is based on a criteria related to the at least one packet, and classify the at least one packet, utilizing the selected security database.
摘要:
Methods and apparatuses for insertion, searching, deletion, and load balancing using a hierarchical series of hash tables are described herein. The techniques disclosed provide nearly collision free or deterministic hash functions using a bitmap as a pre-filter. The hash functions have different priorities and one hashing result will be used to perform main memory access. For the hash functions, two hash bitmaps are used to store valid data and collision information. There is no collision allowed in the hash tables except for the hash table with the lowest priority. The hash tables and bitmaps may be stored in one or more caches in (e.g., a cache of a CPU, Block RAMs in FPGAs, etc.) which perform much faster than main memory.