US20070223499A1 - Device for processing data packets without use of a microprocessor and a memory - Google Patents

Device for processing data packets without use of a microprocessor and a memory Download PDF

Info

Publication number
US20070223499A1
US20070223499A1 US11/754,698 US75469807A US2007223499A1 US 20070223499 A1 US20070223499 A1 US 20070223499A1 US 75469807 A US75469807 A US 75469807A US 2007223499 A1 US2007223499 A1 US 2007223499A1
Authority
US
United States
Prior art keywords
data packets
pertinent information
packet
pertinent
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/754,698
Inventor
Michael Timperman
Jason Waldeck
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lexmark International Inc
Original Assignee
Lexmark International Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lexmark International Inc filed Critical Lexmark International Inc
Priority to US11/754,698 priority Critical patent/US20070223499A1/en
Publication of US20070223499A1 publication Critical patent/US20070223499A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/22Parsing or analysis of headers

Definitions

  • the present invention relates to network communication, and, more particularly, to a packet processing node for network communication.
  • any transmission from one node is sent to a plurality of connected nodes.
  • the information may only be relevant to a single receiver, but all nodes must process the transmission to determine its intent.
  • Data on such networks are usually broken into pieces known as packets.
  • a packet is formed of consecutive bytes that may be marked by leading and/or trailing delimiters.
  • Protocols by which nodes communicate usually divide a packet into the protocol-relevant information (the header) and the data relevant to the receiving node (payload).
  • MAC Ethernet media access controllers
  • CPU general-purpose central processing unit
  • network frames that are addressed to the node either distinctly or by a shared address are still not relevant to a particular node.
  • the receiving equipment may be required to look at an entire packet to determine its relevance. Additional cost is inherent in networked systems because memory is required to store the entire packet while the processing elements perform the analysis.
  • the present invention provides a device for network communication using specialized hardware that eliminates the need for a microprocessor in the system.
  • the device processes information in a packetized communication system.
  • the result is a minimal-cost packet-processing node.
  • a hardware apparatus extracts only pertinent information from received packets and can generate response packets based on the same information. This processing is done in real time and without the use of an additional data processing system that might include a microprocessor or storage memory.
  • the invention comprises, in one form thereof, a method of processing data packets.
  • a plurality of the data packets are received at a selected node.
  • Pertinent information in the data packets is extracted.
  • the pertinent information is pertinent to the selected node.
  • a plurality of response data packets are generated based on the pertinent information.
  • the extracting and generating steps are performed without use of a microprocessor.
  • the invention comprises, in another form thereof, a data packet communication system including a peripheral device and a filter device connected to the peripheral device.
  • the filter device receives a plurality of data packets and identifies pertinent information in the data packets. The pertinent information is pertinent to the peripheral device.
  • An advantage of the present invention is that network packet processing is performed without the need for a microprocessor.
  • Another advantage is that the packet filter hardware not only identifies packets relevant to the receiving node, but also extracts any pertinent information contained in the data stream.
  • Yet another advantage is that signals are created by the filter hardware to indicate that a response packet should be generated using the extracted information.
  • a further advantage is that the packet filter hardware can be replicated and used in parallel to provide different protocols within the same network node.
  • FIG. 1 is a block diagram of one embodiment of a packet communication device of the present invention connected to a peripheral device and a packetized data network;
  • FIG. 2 is a block diagram of one embodiment of a data packet processed by the packet communication device of FIG. 1 ;
  • FIG. 3 is a block diagram of the hardware filter of FIG. 1 ;
  • FIG. 4 is a schematic diagram of the signaling logic of FIG. 3 ;
  • FIG. 5 is a block diagram of the packet generator of FIG. 1 .
  • Device 10 includes neither a microprocessor nor storage memory. That is, device 10 is microprocessorless and memoryless.
  • Device 10 includes a hardware filter 12 and a packet generator 14 connected to a packet data network 16 .
  • Hardware filter 12 and packet generator 14 are also connected via an interface 18 to a payload data consumer in the form of a peripheral device 20 .
  • An optional protocol state machine 22 may be necessary to convert filter indications into transmit requests to packet generator 14 .
  • Network 16 may be any of the common serial network architectures (such as Ethernet or Token Ring) or generally any packetized data stream
  • Peripheral device 20 can be any data consumer system that utilizes information, e.g., a computer, printer, set-top box, or other peripheral.
  • Interface 18 may be in the form of a first in first out (FIFO) memory or data buffer.
  • FIG. 2 The format of one embodiment of a network data packet processed by device 10 is shown in FIG. 2 .
  • fields of interest i.e., pertinent
  • the pertinent information is the minimum amount of information needed to correctly implement the protocol. That is, the pertinent information is what is mandatory for a minimal implementation of the protocol.
  • Bytes of interest i.e., pertinent data, include the payload data as well as header data that might identify the packet type, the intended receiver, sequencing information, and so forth.
  • Such pertinent fields include a sequence number field, which indicates the order the data is in, a destination address (DA) and a source address (SA).
  • DA destination address
  • SA source address
  • information pertinent to the receiving node includes selected bytes within the data packets.
  • Non-pertinent fields include a checksum field, a priority field, start-of-packet delimiter (SOP) and end-of-packet delimiter (EOP).
  • Hardware filter 12 receives packetized data from network 16 and includes an offset counter 24 ( FIG. 3 ), pattern generator 26 , mask generator 28 , multiplexer 30 . maskable comparator 32 , event decoder 34 and signaling logic 36 . All of these blocks are easily constructed by someone skilled in the art.
  • the incoming packet data stream is assumed to be a stream of words (of fixed bit-width W) with start-of-packet (SOP) and end-of-packet (EOP) indicators that are synchronous to a common receive clock. This is a common interface for media access control (MAC) hardware.
  • the outputs of hardware filter 12 include an extracted payload data stream (payload word), protocol parameters, and indicators of a successfully accepted packet.
  • Offset counter 24 includes an N-bit counter that tracks the number of words from the start of a packet. Counter 24 is wide enough to accommodate a maximum-length packet for the particular network medium. Offset counter 24 is cleared upon receiving the SOP indication and increments by one with each packet word received.
  • Packet generator 26 is a special case of an N to M decoder. Given an input value of width N, pattern generator 26 outputs a predetermined corresponding word of width M. The decoder is designed so that, given the input packet offset, the output of the decoder is the corresponding word required for packet acceptance.
  • Mask generator 28 is similar to pattern generator 26 .
  • Mask generator 28 decodes offset counter 24 and produces a bit-mask. The mask indicates which bits within the word are compared.
  • An additional set of outputs is routed to multiplexer 30 . These outputs determine whether multiplexer 30 should pass the output of pattern generator 26 or one of the external comparison values to comparator 32 .
  • the external comparison values are specific to the receiving node (peripheral device 20 ), such as its network address, or are states within the protocol. For protocols where it is only necessary to examine entire words, only the multiplexer control outputs are necessary.
  • Maskable comparator 32 indicates whether the bits in the received packet work unmasked by mask generator 28 are equal to the corresponding bits in the output of multiplexer 30 . A logical “0” on the output of comparator 32 indicates that all unmasked bits match. If the word is a don't care (all bits masked), the output is also a “0”.
  • Event decoder 34 indicates when header information needs to be stored into memory elements (flip-flops). This allows protocol state machine 22 to use the information when updating its state or transmitting a response. Event decoder 34 is also used to generate a Payload Start (PS) signal to indicate where in the packet payload data should be extracted.
  • PS Payload Start
  • Signaling logic 36 generates indicators to outside entities.
  • a signal, RELEVANT ( FIG. 4 ), is generated with an R-S flip-flop 38 .
  • the start-of-packet (SOP) signal is connected to the “S” input of flip-flop 38 , with the “R” input connected to the output of maskable comparator 32 .
  • SOP start-of-packet
  • the RELEVANT signal goes high at the start of a packet and remains high until comparator 32 finds a problem with the packet.
  • the RELEVANT signal is logically AND'ed with the end-of-packet (EOP) signal to create a PACKET GOOD signal for use outside filter 12 .
  • Another R-S flip-flop 40 generates a PAYLOAD VALID signal.
  • the PAYLOAD START signal is AND'ed with the RELEVANT signal, and the result is connected to the “S” input of flip-flop 40 .
  • the end-of-packet (EOP) signal is connected to the “R” input of flip-flop 40 . This creates a signal that is active for the entire payload of packets whose header matches the acceptable criteria.
  • SOP start-of-packet
  • offset counter 24 is cleared and the RELEVANT signal is set active.
  • Packet data starts entering filter 12 , with counter 24 incrementing with each word.
  • mask generator 28 determines whether any part of the word is necessary for comparison.
  • Mask generator 28 also determines which value should be used for the comparison. i.e., the output of pattern generator 26 or one of the external comparison values.
  • the output of pattern generator 26 is a “don't care” condition whenever a comparison is not performed.
  • Multiplexer 30 steers the appropriate compare word to comparator 32 , and comparator 32 indicates if a necessary match is missing.
  • the RELEVANT signal drops inactive and processing is ignored for the remainder of the packet, although the processing does continue. If the header is successfully processed, i.e. the PAYLOAD START signal is generated, then the PAYLOAD VALID signal activates and the packet payload data is passed to peripheral device 20 for consumption. This continues until the end-of-packet (EOP) signal is indicated, which causes the PAYLOAD VALID signal to deactivate and the PACKET GOOD signal to be pulsed.
  • EOP end-of-packet
  • event decoder 34 extracts header data, e.g., extracted elements 41 , by activating the enable inputs of storage flip-flops attached to the data stream.
  • protocol state machine 22 can determine if a response is necessary. If such a response is called for, the extracted header information is then available to packet generator 14 as header input data for transmission.
  • the comparator could include more arithmetic logic unit (ALU)-like functions (less than, greater than, etc.) than merely the “equals” operation.
  • Pattern generator 26 , mask generator 28 and event decoder 34 could be replicated and connected in parallel to identify various types of packets.
  • Multiple hardware filters 12 could be used in parallel to detect different protocols, or might be cascaded serially to allow for the stripping of the individual protocol layers, as needed.
  • Packet generator 14 transmits packets to network 16 . As shown in FIG. 5 , packet generator 14 includes the same building blocks as those found in hardware filter 12 . Packet generator 14 includes an offset counter 42 , a pattern generator 44 , a multiplexer 46 , an event decoder 48 , and a mask generator 50 .
  • Offset counter 42 , pattern generator 44 , event decoder 48 , and multiplexer 46 perform the same functions as offset counter 24 , pattern generator 26 , event decoder 34 , and multiplexer 30 , respectively.
  • Pattern generator 44 may or may not have the exact same patterns as pattern generator 26 .
  • Pattern generator 44 is protocol-dependent.
  • Mask generator 50 is only used to create the multiplexer steering controls. The masks need not be generated since no comparisons are performed on the transmit side of device 10 i.e., within packet generator 14
  • Packet generator 14 operates exactly as the logic used to create the comparison word in filter hardware 12 .
  • offset counter 42 is cleared and pattern generator 44 , mask generator 50 and event decoder 48 decode the offset into a transmission word. This word is sent to media access controller 52 for transmission. When media access controller 52 requires the next word, offset counter 42 is incremented and the process continues until all words of a packet have been sent.
  • Event decoder 48 creates the necessary framing signals SOP and EOP.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

A method of processing data packets includes receiving a plurality of the data packets at a selected node. Pertinent information in the data packets is extracted. The pertinent information is pertinent to the selected node. A plurality of response data packets are generated based on the pertinent information. The extracting and generating steps are performed without use of a microprocessor.

Description

    BACKGROUND OF THE INVENTION
  • 1. Field of the Invention
  • The present invention relates to network communication, and, more particularly, to a packet processing node for network communication.
  • 2. Description of the Related Art
  • In many communication systems, any transmission from one node is sent to a plurality of connected nodes. In such broadcast systems, the information may only be relevant to a single receiver, but all nodes must process the transmission to determine its intent. Data on such networks are usually broken into pieces known as packets. A packet is formed of consecutive bytes that may be marked by leading and/or trailing delimiters. Protocols by which nodes communicate usually divide a packet into the protocol-relevant information (the header) and the data relevant to the receiving node (payload).
  • It is known for the protocols to be “layered” so that the payload area of a lower protocol contains a packet of the next higher layer protocol. Most communication environments require that addressing information be contained at fixed locations (in the first few bytes) of the lowest layer protocol header so that hardware can help discard unwanted packets by simple filtering.
  • There are many examples of commercially available network devices that perform such filtering. Practically all Ethernet media access controllers (MAC's), for instance, provide for filtering based on an exact match of the first six bytes of a packet header to a programmed value (the network address). This greatly reduces the load of the general-purpose central processing unit (CPU). However, many network frames that are addressed to the node either distinctly or by a shared address are still not relevant to a particular node. The receiving equipment may be required to look at an entire packet to determine its relevance. Additional cost is inherent in networked systems because memory is required to store the entire packet while the processing elements perform the analysis.
  • Most of the existing patents relating to packet filtering are a result of the very competitive commercial network switch and router market. Routers must sort received frames into subsets based on different byte fields within a packet. To achieve high throughput, specialized hardware can be used to perform this sorting. In all known cases, an assumption is made that a CPU is present and only assists the microprocessor in performing its task. A problem is that a microprocessor adds significant cost to the product.
  • What is needed in the art is a device for network communication that does not require a microprocessor.
  • SUMMARY OF THE INVENTION
  • The present invention provides a device for network communication using specialized hardware that eliminates the need for a microprocessor in the system. The device processes information in a packetized communication system. The result is a minimal-cost packet-processing node.
  • A hardware apparatus extracts only pertinent information from received packets and can generate response packets based on the same information. This processing is done in real time and without the use of an additional data processing system that might include a microprocessor or storage memory.
  • The invention comprises, in one form thereof, a method of processing data packets. A plurality of the data packets are received at a selected node. Pertinent information in the data packets is extracted. The pertinent information is pertinent to the selected node. A plurality of response data packets are generated based on the pertinent information. The extracting and generating steps are performed without use of a microprocessor.
  • The invention comprises, in another form thereof, a data packet communication system including a peripheral device and a filter device connected to the peripheral device. The filter device receives a plurality of data packets and identifies pertinent information in the data packets. The pertinent information is pertinent to the peripheral device.
  • An advantage of the present invention is that network packet processing is performed without the need for a microprocessor.
  • Another advantage is that the packet filter hardware not only identifies packets relevant to the receiving node, but also extracts any pertinent information contained in the data stream.
  • Yet another advantage is that signals are created by the filter hardware to indicate that a response packet should be generated using the extracted information.
  • A further advantage is that the packet filter hardware can be replicated and used in parallel to provide different protocols within the same network node.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The above-mentioned and other features and advantages of this invention, and the manner of attaining them, will become more apparent and the invention will be better understood by reference to the following description of embodiments of the invention taken in conjunction with the accompanying drawings, wherein:
  • FIG. 1 is a block diagram of one embodiment of a packet communication device of the present invention connected to a peripheral device and a packetized data network;
  • FIG. 2 is a block diagram of one embodiment of a data packet processed by the packet communication device of FIG. 1;
  • FIG. 3 is a block diagram of the hardware filter of FIG. 1;
  • FIG. 4 is a schematic diagram of the signaling logic of FIG. 3; and
  • FIG. 5 is a block diagram of the packet generator of FIG. 1.
  • Corresponding reference characters indicate corresponding parts throughout the several views. The exemplifications set out herein illustrate one preferred embodiment of the invention, in one form, and such exemplifications are not to be construed as limiting the scope of the invention in any manner.
  • DETAILED DESCRIPTION OF THE INVENTION
  • Referring now to the drawings and particularly to FIG. 1, there is shown one embodiment of a packet communication device 10 of the present invention. Device 10 includes neither a microprocessor nor storage memory. That is, device 10 is microprocessorless and memoryless. Device 10 includes a hardware filter 12 and a packet generator 14 connected to a packet data network 16. Hardware filter 12 and packet generator 14 are also connected via an interface 18 to a payload data consumer in the form of a peripheral device 20. An optional protocol state machine 22 may be necessary to convert filter indications into transmit requests to packet generator 14. Network 16 may be any of the common serial network architectures (such as Ethernet or Token Ring) or generally any packetized data stream Peripheral device 20 can be any data consumer system that utilizes information, e.g., a computer, printer, set-top box, or other peripheral. Interface 18 may be in the form of a first in first out (FIFO) memory or data buffer.
  • The format of one embodiment of a network data packet processed by device 10 is shown in FIG. 2. Only fields of interest, i.e., pertinent, to the receiving node, i.e., peripheral device 20, are important and are therefore processed. The pertinent information is the minimum amount of information needed to correctly implement the protocol. That is, the pertinent information is what is mandatory for a minimal implementation of the protocol. Bytes of interest, i.e., pertinent data, include the payload data as well as header data that might identify the packet type, the intended receiver, sequencing information, and so forth. Such pertinent fields include a sequence number field, which indicates the order the data is in, a destination address (DA) and a source address (SA). Thus, information pertinent to the receiving node includes selected bytes within the data packets.
  • Other packet bytes not of interest to peripheral device 20, such as diagnostic information, are treated as “don't care” information and are ignored. Such non-pertinent fields include a checksum field, a priority field, start-of-packet delimiter (SOP) and end-of-packet delimiter (EOP).
  • Hardware filter 12 receives packetized data from network 16 and includes an offset counter 24 (FIG. 3), pattern generator 26, mask generator 28, multiplexer 30. maskable comparator 32, event decoder 34 and signaling logic 36. All of these blocks are easily constructed by someone skilled in the art. The incoming packet data stream is assumed to be a stream of words (of fixed bit-width W) with start-of-packet (SOP) and end-of-packet (EOP) indicators that are synchronous to a common receive clock. This is a common interface for media access control (MAC) hardware. The outputs of hardware filter 12 include an extracted payload data stream (payload word), protocol parameters, and indicators of a successfully accepted packet.
  • Offset counter 24 includes an N-bit counter that tracks the number of words from the start of a packet. Counter 24 is wide enough to accommodate a maximum-length packet for the particular network medium. Offset counter 24 is cleared upon receiving the SOP indication and increments by one with each packet word received.
  • Packet generator 26 is a special case of an N to M decoder. Given an input value of width N, pattern generator 26 outputs a predetermined corresponding word of width M. The decoder is designed so that, given the input packet offset, the output of the decoder is the corresponding word required for packet acceptance.
  • Mask generator 28 is similar to pattern generator 26. Mask generator 28 decodes offset counter 24 and produces a bit-mask. The mask indicates which bits within the word are compared. An additional set of outputs is routed to multiplexer 30. These outputs determine whether multiplexer 30 should pass the output of pattern generator 26 or one of the external comparison values to comparator 32. The external comparison values are specific to the receiving node (peripheral device 20), such as its network address, or are states within the protocol. For protocols where it is only necessary to examine entire words, only the multiplexer control outputs are necessary.
  • Maskable comparator 32 indicates whether the bits in the received packet work unmasked by mask generator 28 are equal to the corresponding bits in the output of multiplexer 30. A logical “0” on the output of comparator 32 indicates that all unmasked bits match. If the word is a don't care (all bits masked), the output is also a “0”.
  • Event decoder 34 indicates when header information needs to be stored into memory elements (flip-flops). This allows protocol state machine 22 to use the information when updating its state or transmitting a response. Event decoder 34 is also used to generate a Payload Start (PS) signal to indicate where in the packet payload data should be extracted.
  • Signaling logic 36 generates indicators to outside entities. A signal, RELEVANT (FIG. 4), is generated with an R-S flip-flop 38. The start-of-packet (SOP) signal is connected to the “S” input of flip-flop 38, with the “R” input connected to the output of maskable comparator 32. Thus, the RELEVANT signal goes high at the start of a packet and remains high until comparator 32 finds a problem with the packet. The RELEVANT signal is logically AND'ed with the end-of-packet (EOP) signal to create a PACKET GOOD signal for use outside filter 12. Another R-S flip-flop 40 generates a PAYLOAD VALID signal. The PAYLOAD START signal is AND'ed with the RELEVANT signal, and the result is connected to the “S” input of flip-flop 40, The end-of-packet (EOP) signal is connected to the “R” input of flip-flop 40. This creates a signal that is active for the entire payload of packets whose header matches the acceptable criteria.
  • In operation, when the start-of-packet (SOP) indicator is given, offset counter 24 is cleared and the RELEVANT signal is set active. Packet data starts entering filter 12, with counter 24 incrementing with each word. At each word, mask generator 28 determines whether any part of the word is necessary for comparison. Mask generator 28 also determines which value should be used for the comparison. i.e., the output of pattern generator 26 or one of the external comparison values. The output of pattern generator 26 is a “don't care” condition whenever a comparison is not performed. Multiplexer 30 steers the appropriate compare word to comparator 32, and comparator 32 indicates if a necessary match is missing. If it is so indicated, the RELEVANT signal drops inactive and processing is ignored for the remainder of the packet, although the processing does continue. If the header is successfully processed, i.e. the PAYLOAD START signal is generated, then the PAYLOAD VALID signal activates and the packet payload data is passed to peripheral device 20 for consumption. This continues until the end-of-packet (EOP) signal is indicated, which causes the PAYLOAD VALID signal to deactivate and the PACKET GOOD signal to be pulsed.
  • Meanwhile, event decoder 34 extracts header data, e.g., extracted elements 41, by activating the enable inputs of storage flip-flops attached to the data stream. When the PACKET GOOD signal is pulsed, protocol state machine 22 can determine if a response is necessary. If such a response is called for, the extracted header information is then available to packet generator 14 as header input data for transmission.
  • Other embodiments of the hardware filter might be needed for difficult protocols. The comparator could include more arithmetic logic unit (ALU)-like functions (less than, greater than, etc.) than merely the “equals” operation. Pattern generator 26, mask generator 28 and event decoder 34 could be replicated and connected in parallel to identify various types of packets.
  • Multiple hardware filters 12 could be used in parallel to detect different protocols, or might be cascaded serially to allow for the stripping of the individual protocol layers, as needed.
  • Packet generator 14 transmits packets to network 16. As shown in FIG. 5, packet generator 14 includes the same building blocks as those found in hardware filter 12. Packet generator 14 includes an offset counter 42, a pattern generator 44, a multiplexer 46, an event decoder 48, and a mask generator 50.
  • Offset counter 42, pattern generator 44, event decoder 48, and multiplexer 46 perform the same functions as offset counter 24, pattern generator 26, event decoder 34, and multiplexer 30, respectively. Pattern generator 44 may or may not have the exact same patterns as pattern generator 26. Pattern generator 44 is protocol-dependent.
  • Mask generator 50 is only used to create the multiplexer steering controls. The masks need not be generated since no comparisons are performed on the transmit side of device 10 i.e., within packet generator 14
  • Packet generator 14 operates exactly as the logic used to create the comparison word in filter hardware 12. When a packet is to be sent, offset counter 42 is cleared and pattern generator 44, mask generator 50 and event decoder 48 decode the offset into a transmission word. This word is sent to media access controller 52 for transmission. When media access controller 52 requires the next word, offset counter 42 is incremented and the process continues until all words of a packet have been sent. Event decoder 48 creates the necessary framing signals SOP and EOP.
  • While this invention has been described as having a preferred design, the present invention can be further modified within the spirit and scope of this disclosure. This application is therefore intended to cover any variations, uses, or adaptations of the invention using its general principles. Further, this application is intended to cover such departures from the present disclosure as come within known or customary practice in the art to which this invention pertains and which fall within the limits of the appended claims.

Claims (31)

1. A method of processing data packets, comprising:
receiving, from a source address, a plurality of the data packets at a selected node;
extracting only pertinent information from the data packets while ignoring non-pertinent information from the data packets, the pertinent information being pertinent to said selected node; and
generating a plurality of response data packets directed to said source address based on the pertinent information, wherein said extracting and generating steps are performed without use of a microprocessor.
2. The method of claim 1, wherein said extracting and generating steps are performed without use of a storage memory.
3. The method of claim 1, wherein said selected node includes a peripheral device, the pertinent information being pertinent to said peripheral device.
4. (canceled)
5. The method of claim 1, comprising the further step of transmitting the response data packets to a packetized data network.
6. The method of claim 1, wherein said receiving step includes receiving the data packets from a packetized data network.
7. The method of claim 1, wherein said pertinent information includes a packet payload.
8. The method of claim 7, comprising the further step of passing the packet payload to a peripheral device.
9. The method of claim 1, wherein said extracting step includes extracting header information.
10. The method of claim 9, wherein said response data packets include the header information.
11. A data packet communication system, comprising:
a peripheral device; and
a filter device connected to said peripheral device, said filter device being configured to receive a plurality of data packets from a source address and identify only pertinent information in said data packets while ignoring non-pertinent information from said data packets, said pertinent information being pertinent to said peripheral device.
12. The system of claim 11, wherein said filter device is microprocessorless.
13. The system of claim 12, wherein said filter device is memoryless.
14. The system of claim 11, further comprising a packet generator connected to said peripheral device and said filter device, said packet generator being configured to generate a plurality of response data packets directed to said source address based on said pertinent information.
15. The system of claim 14, wherein said packet generator is configured to transmit said response data packets.
16. (canceled)
17. (canceled)
18. (canceled)
19. The system of claim 11, wherein said filter device is configured to receive the data packets from a packetized data network.
20. The system of claim 11, further comprising an interface interconnecting said peripheral device and said filter device.
21. A data packet communication device, comprising:
a filter device configured to receive a plurality of data packets from a source address and identify only pertinent information in said data packets while ignoring non-pertinent information from said data packets; and
a packet generator configured to generate a plurality of response data packets directed to said source address based on said pertinent information.
22. The device of claim 21, wherein each of said filter device and said packet generator is microprocessorless.
23. The device of claim 22, wherein each of said filter device and said packet generator is memoryless.
24. The device of claim 21, wherein said packet generator is configured to transmit said response data packets.
25. The device of claim 24, wherein said packet generator is configured to transmit said response data packets to a packetized data network.
26. (canceled)
27. (canceled)
28. The device of claim 21, wherein said filter device is configured to receive the data packets from a packetized data network.
29. The device of claim 21, wherein said packet generator comprises an N to M decoder.
30. The device of claim 21, wherein said pertinent information comprises selected bytes within said data packets.
31. A method of processing data packets, comprising:
receiving a plurality of said data packets at a payload data consumer;
extracting only pertinent information from said data packets while ignoring non-pertinent information from said data packets, said pertinent information being pertinent to said payload data consumer, wherein said pertinent information includes payload data; and
consuming said payload data at said payload data consumer.
US11/754,698 2001-09-20 2007-05-29 Device for processing data packets without use of a microprocessor and a memory Abandoned US20070223499A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/754,698 US20070223499A1 (en) 2001-09-20 2007-05-29 Device for processing data packets without use of a microprocessor and a memory

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US09/957,008 US7515587B2 (en) 2001-09-20 2001-09-20 Device for processing data packets without use of a microprocessor and a memory
US11/754,698 US20070223499A1 (en) 2001-09-20 2007-05-29 Device for processing data packets without use of a microprocessor and a memory

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US09/957,008 Continuation US7515587B2 (en) 2001-09-20 2001-09-20 Device for processing data packets without use of a microprocessor and a memory

Publications (1)

Publication Number Publication Date
US20070223499A1 true US20070223499A1 (en) 2007-09-27

Family

ID=25498954

Family Applications (2)

Application Number Title Priority Date Filing Date
US09/957,008 Expired - Fee Related US7515587B2 (en) 2001-09-20 2001-09-20 Device for processing data packets without use of a microprocessor and a memory
US11/754,698 Abandoned US20070223499A1 (en) 2001-09-20 2007-05-29 Device for processing data packets without use of a microprocessor and a memory

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US09/957,008 Expired - Fee Related US7515587B2 (en) 2001-09-20 2001-09-20 Device for processing data packets without use of a microprocessor and a memory

Country Status (1)

Country Link
US (2) US7515587B2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20140035409A (en) * 2011-06-02 2014-03-21 마이크로칩 테크놀로지 인코포레이티드 Standalone radio frequency wireless device having data acquisition capabilities

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8166156B2 (en) * 2006-11-30 2012-04-24 Nokia Corporation Failure differentiation and recovery in distributed systems
US9760146B2 (en) * 2007-01-08 2017-09-12 Imagination Technologies Limited Conditional activation and deactivation of a microprocessor
US9124920B2 (en) 2011-06-29 2015-09-01 The Nielson Company (Us), Llc Methods, apparatus, and articles of manufacture to identify media presentation devices
US20150358289A1 (en) * 2014-06-10 2015-12-10 Christopher Michael Ball Preconfigured transparent firewall with stateful inspection for embedded devices

Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5506993A (en) * 1993-03-02 1996-04-09 International Business Machines Corporation Message packet transmitter
US5790786A (en) * 1995-06-28 1998-08-04 National Semiconductor Corporation Multi-media-access-controller circuit for a network hub
US5842224A (en) * 1989-06-16 1998-11-24 Fenner; Peter R. Method and apparatus for source filtering data packets between networks of differing media
US5898687A (en) * 1996-07-24 1999-04-27 Cisco Systems, Inc. Arbitration mechanism for a multicast logic engine of a switching fabric circuit
US5943604A (en) * 1997-10-31 1999-08-24 Cisco Technology, Inc. Echo device method for locating upstream ingress noise gaps at cable television head ends
US5951651A (en) * 1997-07-23 1999-09-14 Lucent Technologies Inc. Packet filter system using BITMAP vector of filter rules for routing packet through network
US5959976A (en) * 1996-12-09 1999-09-28 Kuo; Yung-Tien Method and device for filtering transmission
US6034963A (en) * 1996-10-31 2000-03-07 Iready Corporation Multiple network protocol encoder/decoder and data processor
US6097729A (en) * 1997-05-01 2000-08-01 Winbond Electronics Corp. Network switcher
US6122281A (en) * 1996-07-22 2000-09-19 Cabletron Systems, Inc. Method and apparatus for transmitting LAN data over a synchronous wide area network
US6128313A (en) * 1997-09-11 2000-10-03 Cisco Technology, Inc. Apparatus and method for filtering line noise and improper packet formatting
US6154796A (en) * 1998-09-03 2000-11-28 Advanced Micro Devices, Inc. Apparatus and method in a network interface device for storing receiving frame status in a holding register
US6381648B1 (en) * 1999-05-06 2002-04-30 International Business Machines Corporation Method and apparatus for filtering ethernet frames
US20020133782A1 (en) * 1998-04-28 2002-09-19 Makoto Noda Code state determining method and encoding apparatus
US20030007489A1 (en) * 2001-07-09 2003-01-09 Ram Krishnan Data extraction system for packet analysis
US6636509B1 (en) * 1999-05-11 2003-10-21 Cisco Technology, Inc. Hardware TOS remapping based on source autonomous system identifier
US6700888B1 (en) * 1999-09-28 2004-03-02 Telefonaktiebolaget Lm Ericsson (Publ) Manipulating header fields for improved performance in packet communications
US6876653B2 (en) * 1998-07-08 2005-04-05 Broadcom Corporation Fast flexible filter processor based architecture for a network device

Patent Citations (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5842224A (en) * 1989-06-16 1998-11-24 Fenner; Peter R. Method and apparatus for source filtering data packets between networks of differing media
US5506993A (en) * 1993-03-02 1996-04-09 International Business Machines Corporation Message packet transmitter
US5790786A (en) * 1995-06-28 1998-08-04 National Semiconductor Corporation Multi-media-access-controller circuit for a network hub
US6122281A (en) * 1996-07-22 2000-09-19 Cabletron Systems, Inc. Method and apparatus for transmitting LAN data over a synchronous wide area network
US5898687A (en) * 1996-07-24 1999-04-27 Cisco Systems, Inc. Arbitration mechanism for a multicast logic engine of a switching fabric circuit
US6034963A (en) * 1996-10-31 2000-03-07 Iready Corporation Multiple network protocol encoder/decoder and data processor
US5959976A (en) * 1996-12-09 1999-09-28 Kuo; Yung-Tien Method and device for filtering transmission
US6097729A (en) * 1997-05-01 2000-08-01 Winbond Electronics Corp. Network switcher
US5951651A (en) * 1997-07-23 1999-09-14 Lucent Technologies Inc. Packet filter system using BITMAP vector of filter rules for routing packet through network
US6128313A (en) * 1997-09-11 2000-10-03 Cisco Technology, Inc. Apparatus and method for filtering line noise and improper packet formatting
US5943604A (en) * 1997-10-31 1999-08-24 Cisco Technology, Inc. Echo device method for locating upstream ingress noise gaps at cable television head ends
US6032019A (en) * 1997-10-31 2000-02-29 Cisco Technologies, Inc. Echo device method for locating upstream ingress noise gaps at cable television head ends
US20020133782A1 (en) * 1998-04-28 2002-09-19 Makoto Noda Code state determining method and encoding apparatus
US6876653B2 (en) * 1998-07-08 2005-04-05 Broadcom Corporation Fast flexible filter processor based architecture for a network device
US6154796A (en) * 1998-09-03 2000-11-28 Advanced Micro Devices, Inc. Apparatus and method in a network interface device for storing receiving frame status in a holding register
US6381648B1 (en) * 1999-05-06 2002-04-30 International Business Machines Corporation Method and apparatus for filtering ethernet frames
US6636509B1 (en) * 1999-05-11 2003-10-21 Cisco Technology, Inc. Hardware TOS remapping based on source autonomous system identifier
US6700888B1 (en) * 1999-09-28 2004-03-02 Telefonaktiebolaget Lm Ericsson (Publ) Manipulating header fields for improved performance in packet communications
US20030007489A1 (en) * 2001-07-09 2003-01-09 Ram Krishnan Data extraction system for packet analysis

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20140035409A (en) * 2011-06-02 2014-03-21 마이크로칩 테크놀로지 인코포레이티드 Standalone radio frequency wireless device having data acquisition capabilities
KR101891674B1 (en) * 2011-06-02 2018-08-24 마이크로칩 테크놀로지 인코포레이티드 Standalone radio frequency wireless device having data acquisition capabilities

Also Published As

Publication number Publication date
US20030053452A1 (en) 2003-03-20
US7515587B2 (en) 2009-04-07

Similar Documents

Publication Publication Date Title
US5949786A (en) Stochastic circuit identification in a multi-protocol network switch
US5390173A (en) Packet format in hub for packet data communications system
EP0594196B1 (en) Address lookup in packet data communications link, using hashing and content-addressable memory
EP3085036B1 (en) Increasing packet process rate in a network device
US7467406B2 (en) Embedded data set processing
EP1103129B1 (en) System and method for filtering data
JP5221685B2 (en) Method and filter arrangement for filtering messages arriving at a subscriber of a network via a serial data bus of a communication network
US20040125807A1 (en) Multi-level register bank based configurable etherner frame parser
EP0469812A1 (en) Detection of duplicate alias addresses
US8599859B2 (en) Iterative parsing and classification
US20070223499A1 (en) Device for processing data packets without use of a microprocessor and a memory
WO1996034479A1 (en) Packet switching engine
US7516364B2 (en) Method for testing network devices using breakpointing
US7451216B2 (en) Content intelligent network recognition system and method
EP0223459A2 (en) Runt packet filter
JP2582536B2 (en) System for monitoring and controlling data communication networks
EP0522743B1 (en) Combined hash table and CAM address recognition in a network
JP2005142976A (en) Communication tester
US7971008B2 (en) Flexible queue and stream mapping systems and methods
JPH0767109B2 (en) Hub device
JPH07221753A (en) Dynamic routing device
US5594728A (en) Realtime addressing for high speed serial bit stream
US6047333A (en) Node adapter including hardware arrangement for filtering broadcast data on network
US6295616B1 (en) Analysis of data streams
JP2003046566A (en) Packet-processing unit and method

Legal Events

Date Code Title Description
STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION