USRE45070E1 - Receive processing with network protocol bypass - Google Patents
Receive processing with network protocol bypass Download PDFInfo
- Publication number
- USRE45070E1 USRE45070E1 US13/891,049 US201313891049A USRE45070E US RE45070 E1 USRE45070 E1 US RE45070E1 US 201313891049 A US201313891049 A US 201313891049A US RE45070 E USRE45070 E US RE45070E
- Authority
- US
- United States
- Prior art keywords
- data
- packet
- block
- network interface
- network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L49/00—Packet switching elements
- H04L49/90—Buffering arrangements
- H04L49/901—Buffering arrangements using storage descriptor, e.g. read or write pointers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L49/00—Packet switching elements
- H04L49/90—Buffering arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L49/00—Packet switching elements
- H04L49/90—Buffering arrangements
- H04L49/9042—Separate storage for different parts of the packet, e.g. header and payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/16—Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/16—Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
- H04L69/161—Implementation details of TCP/IP or UDP/IP stack architecture; Specification of modified or new header fields
Definitions
- the present invention relates to processing of data in communication networks, and more particularly to the process of receiving a plurality of packets of data which relate to a common block of data, and efficiently providing such data to an application.
- Network communications are often described with respect to layers of network protocols.
- the layers include the physical layer, the datalink layer, the network layer (also called routing layer), the transport layer, and the application layer.
- modem communication standards such as the Transport Control Protocol TCP, the Internet Protocol IP, and IEEE 802 standards, can be understood as organizing the tasks necessary for data communications into layers.
- protocol stacks or protocol suites for operation of a given communication channel.
- the protocol stacks typically operate in a host system which includes a network adapter comprised of hardware that provides a physical connection to a network medium, and software instructions referred to as medium access control MAC drivers for managing the communication between the adapter hardware and the protocol stack in the host system.
- the adapter generally includes circuitry and connectors for communication over a communication medium, and translates the data to and from the digital form used by the protocol stack and the MAC driver, and a form that may be transmitted over the communication medium.
- processes at the application layer rely on the lower layers of the communication protocol stack for transferring the data between stations in the network.
- the application layer requests services from the protocol stack which includes transport layer, network layer and datalink layer processes distributed between the MAC driver and other components of the stack.
- data which is received across the network is passed up the protocol stack to the application layer at which actual work on the data involved is accomplished.
- received packets are generally moved sequentially into host buffers allocated by the MAC driver for the adapter, as they arrive. These buffers are then provided to the host protocol stack, which generally copies them once or twice to internal buffers of its own before the payload data finally gets copied to the application or the file system buffer.
- This sequential passing of the data up the protocol stack is required so that the processes in the particular protocol suite are able to individually handle the tasks necessary according to the protocol at each layer.
- these multiple copies of the data hurt performance of the system.
- the CPU of the computer is used for each copy of the packet, and a significant load is placed on the memory subsystem in the computer. With technologies like gigabit Ethernet, and other technology in which the data rates of the physical layer of the network is increasing, these copy operations may become an important limiting factor in improving performance of personal computer architectures to levels approaching the capability of the networks to which they are connected.
- an adapter is provided with intelligence that allows it to separate the header parts of a packet being received from the payload it carries, and in most cases move the payload directly into a destination buffer at a higher layer, such as the application layer.
- a higher layer such as the application layer.
- the invention can be characterized as a method for transferring data on a network from the data source to an application executing in an end station.
- the application operates according to a multi-layer network protocol which includes a process for generating packet control data (e.g. headers) for packets according to the multi-layer network protocol. Packets are received at the network interface in a sequence carrying respective data payloads from the data source.
- the control data of the packet is read in the network interface, and if the packet belongs to a flow specification subject of the bypass, the data payload of the packet is transferred to a buffer assigned by a layer higher in the stack, preferably by the application or file system, bypassing one or more intermediate buffers of the protocol stack.
- the process involves establishing a connection between the end station and the source of data, such as a file server on a network, for example according to the TCP/IP protocol suite.
- a request is transmitted from the application through the network interface which asks for transfer of the data from the data source.
- the request and the protocol suite provide a flow specification to identify the block of data and an identifier of the target buffer.
- the plurality of packets is received, and their control fields, such as TCP/IP headers, are read. If they fall within the set up flow specification, the payloads are bypassed directly into the target buffer.
- the network interface device identifies the packets which are in the sequence of packets carrying payload to be stored in the target buffer by the control data in headers carried with such packets.
- the packets carrying data payload for the block of data include a sequence number or other identifier by which the network interface is able to determine the offset within the target buffer to which the payload of the packet is to be stored.
- the flow specification includes a range of sequence numbers for the block of data, such as by a starting number and a length number.
- the network protocol executed by the protocol stack includes TCP/IP, and the process for requesting the transfer of a file from a data source involves issuing a read request according to higher layer protocol, such as the READ RAW SMB (server message block) command specified according to the Common Internet File System protocol (See, paragraph 3.9.35 of CIFS/1.0 draft dated Jun. 13, 1996) executed in Windows platforms.
- the target buffer is assigned by the host application using an interface like WINSOCK, or a file system, in a preferred system.
- the target buffer is assigned by a transport layer process like TCP, to provide for bypassing of a copy in a network layer process like IP.
- the present invention provides a technique by which the performance and scalability of a network installation, like a TCP/IP installation, can be improved, especially for high physical layer speeds of 100 megabits per second or higher. Also, the invention is extendable to other protocol stacks in which a read bypass operation could be executed safely.
- FIG. 1 is a simplified diagram of an end station in a network including receive bypass support according to the present invention.
- FIG. 2 is a simplified diagram of a network interface card supporting the receive bypass processes of the present invention.
- FIG. 3 is a heuristic diagram of a protocol stack including the read bypass process of the present invention.
- FIG. 4 is a diagram illustrating the packet structure and processing according to the read bypass operation of the present invention.
- FIG. 5 is a flow diagram of the process executed for setting up and receiving packets in response to a READ RAW request.
- FIGS. 1-5 A detailed description of the present invention is provided with respect to FIGS. 1-5 , in which FIGS. 1 and 2 illustrate a hardware system environment.
- FIG. 1 shows a data processing system 10 which includes a host central processing unit 11 , host memory 12 , host input/output 13 , such as keyboards, displays, printers, a pointing device and the like.
- the system also includes program memory 14 (usually part of the host memory block) and a network interface card 15 . All of these elements are interconnected by a host system bus 16 .
- the network interface card 15 provides for connection to a network medium as indicated at line 17 .
- FIG. 1 is a simplified diagram of a computer such as a personal computer or workstation.
- the actual architecture of such system is quite varied.
- This system for one example corresponds to a personal computer based on the Intel microprocessor running a Microsoft Windows operating system. Other combinations of processor and operating system are also suitable.
- the program memory includes a TCP/IP protocol stack with a receive bypass mode according to the present invention.
- a MAC driver is also included in the program memory which supports the receive bypass mode.
- Other programs are also stored in program memory to suit the needs of a particular system.
- the network interface card 15 includes resources to manage TCP/IP processing and bypass according to the present invention.
- FIG. 2 provides a simplified block diagram of a network interface card 15 capable of supporting the present invention.
- the network interface card 15 includes a bus interface 20 coupled to the host bus 16 .
- a memory composed of random access memory RAM 21 is included on the card 15 .
- a medium access control unit 22 is coupled to the card which is coupled to the network medium 17 .
- In the path from the host bus interface 20 to the RAM 21 includes appropriate buffering 25 and a direct memory access (DMA) engine 26 in order to offload processing from the host system for transferring data packets into the RAM 21 .
- DMA direct memory access
- the data path from the RAM 21 to the medium access control unit 22 includes appropriate data path and buffering logic 27 to support efficient transmission and reception of packets.
- a DMA engine 28 is also included on this path to provide for efficient transferring of data between the network medium 17 and the RAM 21 .
- a central processing unit 30 having a program memory 31 .
- the CPU 30 is coupled to the host bus 16 and to the RAM 21 on line 32 . Also the CPU 30 generates control signals represented by the arrow 33 for controlling other elements in the network interface card 15 .
- TCP/IP checksum logic 34 is coupled to the data path and the buffering logic 27 in the path from the RAM 21 to the network medium 17 .
- the program memory for the CPU 30 includes transmit, receive, TCP/IP receive bypass control and other processes which manage the operation of the smart network interface card.
- FIG. 2 provides a simplified overview of the functional units in a network interface according to the present invention.
- DMA engines 26 , 28 are not strictly required here.
- State machines hand-shaking with each other, or other data processing resources could move data from one block to the next.
- all of these elements are implemented on a single integrated circuit. In another embodiment, all elements of the network interface card except for the RAM 21 are implemented on a single integrated circuit. Other embodiments include discreet components for all of the major functional blocks of the network interface card.
- FIG. 3 is a simplified diagram of the network protocol layers implemented according to the present invention.
- the protocol layers in this example include a data application 48 such as an application layer program, coupled by path 49 to a file system 50 running CIFS in an end station.
- the file system 50 is coupled by a path 51 to the TCP/IP stack 52 .
- the TCP/IP stack 52 is coupled by path 53 to the MAC driver 54 .
- the MAC driver is coupled by path 55 to the smart network interface card 56 .
- the smart network interface card 56 is coupled by path 57 to the network medium.
- application layer processes (like process 48 ) issue read requests through an application program interface (API) like WINSOCK for Windows platforms, rather than a file system (like CIFS).
- API application program interface
- the application layer process 48 issues a request 59 to read a file of data across the network from a data source such as by the equivalent of fget (buffer length), in the “C” programming language.
- the file system 50 sets up a bypass, then formats the READ RAW SMB request 60 and passes it down.
- Such a request 25 corresponds for example to the READ RAW SMB command found in the CIFS protocol.
- analogous commands and other application layer processes could be utilized.
- the READ RAW request is passed down the protocol stack to the driver and transferred across the network to the file server or other data source which is the source of the file to be retrieved.
- the file server then sends a sequence of packets according to the SMB READ RAW response protocol.
- the TCP/IP stack makes a call 61 to the MAC driver, passing to it the identification of a target buffer assigned by the application layer process, or by another process above the network layer.
- This identification may be an array of physical or virtual addresses, such as an address and a length, which can be utilized by the MAC driver to copy the data directly from the memory on the smart network interface card into the target buffer.
- the call made by the TCP/IP stack sends down to the MAC driver the flow specification established for this read beforehand, including the source and destination IP addresses, and the source and destination port numbers (i.e. sockets).
- the flow specification includes a SEQorigin and a SMBfirst flag in this example.
- the MAC driver provides the request and associated control information by a transfer 62 to the smart adapter 56 .
- the target buffer specifies where the payload should be stored when possible by the network interface card.
- the flow specification specifies how to identify packets that are part of this session.
- the SEQorigin specifies the sequence number of the first byte of the payload (excluding any SMB header) that should be stored in the target buffer.
- the SMBfirst flag tells the driver whether the first packet with that sequence SEQorigin will have a SMB header following its TCP header. This information is used so that the control data can be cut from the first packet in the plurality of packets which are received in response to the read request.
- the adapter uses this information to put the payload data directly (line 63 ) into the target buffer. There is no guarantee that the adapter will always do this; however it will be done most of the time when a target buffer has been supplied.
- Such received packets are passed up to the protocol one at a time as always, using the same interfacing data structures as always. The only difference is that the packet will be split across two fragments.
- the header (Ethernet, IP, TCP and possible SMB headers) will be the first fragment on line 64 , and will occupy a driver allocated buffer as always for use in identifying the packet, and for protocol maintenance functions.
- the payload will occupy a second fragment on line 63 which has been copied to the offset within the target buffer determined by the SEQ parameter in the header.
- the driver figures out the offset in the target buffer from the SEQ number in the header of the incoming packet.
- the offset into the target buffer is simply determined by the SEQ in the packet less the SEQorigin parameter which is provided with the READ RAW request.
- the packets which are responsive to the read request come to the adapter out of order, they will not be redirected to the target buffer until the first packet with the SMB header carried in is received. At that point, the size of the SMB header is easily calculated, and the amount to adjust the calculation for directly loading into the target buffer can be readily determined.
- the target buffers are assigned at the TCP layer rather than at the application layer.
- the TCP buffer target address is passed down to the MAC driver, allowing the packet to skip the copy at the IP layer.
- IPX IPX
- NetBEUI/Data Link Control (DLC) protocols IPX and NetBEUI/Data Link Control (DLC) protocols.
- DLC Data Link Control
- SEQ numbers SEQ numbers which act as byte counters
- packet numbers packet numbers as part of the flow specification provided to the adapter.
- the problem of calculating the offset into the target buffer is complicated. However, if all packets in the read request are constrained to the same size, except for the last packet, the target buffer offset can be easily determined. Alternatively, the bypass might only be performed on packets received in order. Additional calculations on the smart network adapter card can also provide the memory offsets.
- file system protocols other than CIFS are possible, such as FTP or NFS.
- the network adapter has resources which enable it to determine that a received packet has good data, such as checksum checking logic and the like, before transferring it up to the target buffer.
- the smart network adapter has the capability to maintain a record of the parts of the target buffer which have been filled in with good packets and not overwrite them. This addresses a feature of the TCP/IP protocol by which there is no guarantee that payload bytes will arrive in order, or that if they are retransmitted that they will be retransmitted in the same size chunks.
- the file server might send part of a previous packet along with some new data.
- the adapter in this embodiment is capable of properly handling this condition because of its record of the good data already stored in the target buffer.
- FIG. 4 illustrates the packet structure and the process of the present invention as the packets are received for a response to a READ RAW SMB request according to the CIFS protocol.
- a first packet in the sequence generally 100 which carries a header fragment 101 and a payload fragment 102 .
- the header fragment includes in this example an Ethernet header 103 , an Internet Protocol header 104 , a TCP header 105 , and a SMB header 106 .
- the data payload 107 makes up the payload fragment 102 .
- the payload will have about 1.5 kilobytes of data.
- the smart network adapter receives the packet 100 and ensures that it is a good packet by performing the IP and TCP checksum processes. Also, the header fragment 101 is cut off of the packet 100 and transferred to a control header buffer 110 which is stored in driver managed memory. The payload fragment 102 is transferred to the target buffer 111 in the application managed memory according to the target buffer addresses stored in the network interface card.
- subsequent packets in the sequence including packet 120 and packet 130 do not carry SMB headers like the header 106 in the first packet 100 .
- the subsequent packets are received by the smart network interface card and the TCP/IP flow specification is used to identify them as part of the READ RAW response. Once they are identified by the network interface card as part of the response, they are uploaded into the target buffer 111 at an offset determined by the SEQ parameter in the TCP header.
- the header fragments of the packets 120 and 130 can be passed up the protocol stack to ensure that the protocol stack is properly apprised of the sequence of packets being received.
- a received packet is placed in a buffer allocated by the driver and then passed up to the protocol stack in a data structure that consists of one or more fragments identified by respective pointers and lengths. The total sum of the fragments in order makes up the entire packet.
- the packet is passed up in one piece, and there is not a second fragment. But in some cases, such as in a transmit loop back, the packet is divided into several fragments which are passed back up to the protocol stack.
- the protocol stack is normally configured to handle packets which are passed up in several fragments.
- the packet is divided into two fragments, including the header which is placed in the buffer allocated by the driver identified by a pointer to the buffer location, and the payload which is placed in the target buffer and identified by a pointer to the target buffer.
- the identifiers of the two fragments are passed up the protocol stack by making a call to the receive function in the next layer, and passing the fragment identifiers up with the call. This allows the packet to be processed normally through the protocol stack.
- the protocol or the application would be modified according to one implementation of the invention to compare the address of the fragment with the address of the buffer into which this layer of the stack intends to copy the fragment. If these two addresses match, then the copy is not executed. The copy would not be necessary because the adapter had already copied the payload into the target buffer. Thus, very little modification of the protocol stack is necessary in order to execute the present invention.
- FIG. 5 illustrates the process executed by the network interface card and MAC driver according to the present invention.
- the bypass is set up by storing a flow specification for the block of data that will be subject of the receive bypass.
- the flow specification includes for example a sequence number range, socket numbers, and source and destination addresses, of packets which will be part of the flow, and a target buffer to which the payload is to be written (block 200 ).
- This data is provided to the network adapter from a higher layer in the protocol stack.
- the adapter is able to receive packets which are part of that flow specification. For example, in one example the packets are expected to be responses from a READ RAW request for a block of data (block 201 ).
- the network adapter upon receiving the packet, and before passing the packet up the stack determines whether the packet falls within the set up that defines the flow specification for this read bypass session (block 202 ). If not, then the packet is processed normally (block 203 ) and the algorithm ends (block 204 ). If the packet falls within the set up parameters at block 202 , then the header of the packet is stored in a working buffer accessible by the driver, including the sequence number and length parameters from the header (block 205 ). Using this data, the protocol stack is capable of performing protocol maintenance functions necessary for maintaining the session. Also the payload is moved directly to the target buffer (block 206 ). The payload move process may occur before, after or in parallel with storing the header in the working buffer. Next, if necessary for a given implementation, the set up data for the receive bypass is updated based on the information in the header (block 207 ). Finally the process ends (block 204 ).
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
An adapter is provided with intelligence that allows it to separate the header parts of a packet being received from the payload it carries, and in most cases move the payload directly into a destination buffer at the application layer or file system layer. Copies by the intermediate layers of the protocol stack are bypassed, reducing the number of times that the payload of a communication must be copied by the host system. At the network interface, a plurality of packets is received, and the payload of each is bypassed directly into the target destination buffer. The network interface device identifies the packets which are in the sequence of packets carrying payload to be stored in the target buffer by the flow specification carried with such packets. Also, the packets carrying data payload for the file include a sequence number or other identifier by which the network interface is able to determine the offset within the target buffer to which the packet is to be stored.
Description
This application is a reissue of U.S. patent application Ser. No 09/071,692 filed May 1, 1998, entitled “Receive Processing with Network Protocol Bypass” and issued as U.S. Pat. No. 6,246,683.
1. Field of the Invention
The present invention relates to processing of data in communication networks, and more particularly to the process of receiving a plurality of packets of data which relate to a common block of data, and efficiently providing such data to an application.
2. Description of Related Art
Network communications are often described with respect to layers of network protocols. According to a standard description, the layers include the physical layer, the datalink layer, the network layer (also called routing layer), the transport layer, and the application layer. Thus modem communication standards, such as the Transport Control Protocol TCP, the Internet Protocol IP, and IEEE 802 standards, can be understood as organizing the tasks necessary for data communications into layers. There are a variety of types of protocols that are executed at each layer according to this model. The particular protocols utilized at each layer are mixed and matched in order to provide so called protocol stacks or protocol suites for operation of a given communication channel.
The protocol stacks typically operate in a host system which includes a network adapter comprised of hardware that provides a physical connection to a network medium, and software instructions referred to as medium access control MAC drivers for managing the communication between the adapter hardware and the protocol stack in the host system. The adapter generally includes circuitry and connectors for communication over a communication medium, and translates the data to and from the digital form used by the protocol stack and the MAC driver, and a form that may be transmitted over the communication medium.
Generally according to this model, processes at the application layer, including applications and file systems, rely on the lower layers of the communication protocol stack for transferring the data between stations in the network. The application layer requests services from the protocol stack which includes transport layer, network layer and datalink layer processes distributed between the MAC driver and other components of the stack. In a similar way, data which is received across the network is passed up the protocol stack to the application layer at which actual work on the data involved is accomplished.
In current implementations, received packets are generally moved sequentially into host buffers allocated by the MAC driver for the adapter, as they arrive. These buffers are then provided to the host protocol stack, which generally copies them once or twice to internal buffers of its own before the payload data finally gets copied to the application or the file system buffer. This sequential passing of the data up the protocol stack is required so that the processes in the particular protocol suite are able to individually handle the tasks necessary according to the protocol at each layer. However, these multiple copies of the data hurt performance of the system. In particular, the CPU of the computer is used for each copy of the packet, and a significant load is placed on the memory subsystem in the computer. With technologies like gigabit Ethernet, and other technology in which the data rates of the physical layer of the network is increasing, these copy operations may become an important limiting factor in improving performance of personal computer architectures to levels approaching the capability of the networks to which they are connected.
Accordingly, it is desirable to provide techniques which avoid one or more of these copies of the packets as they pass up the protocol stacks. By eliminating multiple copies of the packet, the raw performance of the receiving end station can be increased, and the scalability of the receive process can be improved.
According to the present invention, an adapter is provided with intelligence that allows it to separate the header parts of a packet being received from the payload it carries, and in most cases move the payload directly into a destination buffer at a higher layer, such as the application layer. Thus reducing the number of times that the payload of a communication must be copied by the host system.
Accordingly, the invention can be characterized as a method for transferring data on a network from the data source to an application executing in an end station. The application operates according to a multi-layer network protocol which includes a process for generating packet control data (e.g. headers) for packets according to the multi-layer network protocol. Packets are received at the network interface in a sequence carrying respective data payloads from the data source. Upon receiving a packet, the control data of the packet is read in the network interface, and if the packet belongs to a flow specification subject of the bypass, the data payload of the packet is transferred to a buffer assigned by a layer higher in the stack, preferably by the application or file system, bypassing one or more intermediate buffers of the protocol stack.
Typically, to initiate the process of receiving a plurality of packets which make up a block of data for a particular application, the process involves establishing a connection between the end station and the source of data, such as a file server on a network, for example according to the TCP/IP protocol suite. A request is transmitted from the application through the network interface which asks for transfer of the data from the data source. The request and the protocol suite provide a flow specification to identify the block of data and an identifier of the target buffer. At the network interface, the plurality of packets is received, and their control fields, such as TCP/IP headers, are read. If they fall within the set up flow specification, the payloads are bypassed directly into the target buffer. The network interface device identifies the packets which are in the sequence of packets carrying payload to be stored in the target buffer by the control data in headers carried with such packets. Also, according to a preferred aspect of the invention, the packets carrying data payload for the block of data include a sequence number or other identifier by which the network interface is able to determine the offset within the target buffer to which the payload of the packet is to be stored. In this case, the flow specification includes a range of sequence numbers for the block of data, such as by a starting number and a length number.
According to yet another aspect of the invention, the network protocol executed by the protocol stack includes TCP/IP, and the process for requesting the transfer of a file from a data source involves issuing a read request according to higher layer protocol, such as the READ RAW SMB (server message block) command specified according to the Common Internet File System protocol (See, paragraph 3.9.35 of CIFS/1.0 draft dated Jun. 13, 1996) executed in Windows platforms. The target buffer is assigned by the host application using an interface like WINSOCK, or a file system, in a preferred system. In alternatives, the target buffer is assigned by a transport layer process like TCP, to provide for bypassing of a copy in a network layer process like IP.
Accordingly, the present invention provides a technique by which the performance and scalability of a network installation, like a TCP/IP installation, can be improved, especially for high physical layer speeds of 100 megabits per second or higher. Also, the invention is extendable to other protocol stacks in which a read bypass operation could be executed safely.
Other aspects and advantages of the present invention can be seen upon review of the figures, the detailed description and the claims which follow.
A detailed description of the present invention is provided with respect to FIGS. 1-5 , in which FIGS. 1 and 2 illustrate a hardware system environment.
According to the present invention, the program memory includes a TCP/IP protocol stack with a receive bypass mode according to the present invention. A MAC driver is also included in the program memory which supports the receive bypass mode. Other programs are also stored in program memory to suit the needs of a particular system. The network interface card 15 includes resources to manage TCP/IP processing and bypass according to the present invention.
The block diagram illustrated in FIG. 2 provides a simplified overview of the functional units in a network interface according to the present invention. A variety of other architectures could be implemented to achieve similar functions. For example, DMA engines 26, 28 are not strictly required here. State machines hand-shaking with each other, or other data processing resources could move data from one block to the next.
In one embodiment, all of these elements are implemented on a single integrated circuit. In another embodiment, all elements of the network interface card except for the RAM 21 are implemented on a single integrated circuit. Other embodiments include discreet components for all of the major functional blocks of the network interface card.
In alternative systems, application layer processes (like process 48) issue read requests through an application program interface (API) like WINSOCK for Windows platforms, rather than a file system (like CIFS).
According to the example in FIG. 3 , the application layer process 48 (such as Lotus Notes or others), issues a request 59 to read a file of data across the network from a data source such as by the equivalent of fget (buffer length), in the “C” programming language. The file system 50 sets up a bypass, then formats the READ RAW SMB request 60 and passes it down. Such a request 25 corresponds for example to the READ RAW SMB command found in the CIFS protocol. Of course, analogous commands and other application layer processes could be utilized. The READ RAW request is passed down the protocol stack to the driver and transferred across the network to the file server or other data source which is the source of the file to be retrieved. The file server then sends a sequence of packets according to the SMB READ RAW response protocol.
The TCP/IP stack according to the present invention makes a call 61 to the MAC driver, passing to it the identification of a target buffer assigned by the application layer process, or by another process above the network layer. This identification may be an array of physical or virtual addresses, such as an address and a length, which can be utilized by the MAC driver to copy the data directly from the memory on the smart network interface card into the target buffer. Also, the call made by the TCP/IP stack sends down to the MAC driver the flow specification established for this read beforehand, including the source and destination IP addresses, and the source and destination port numbers (i.e. sockets). Also the flow specification includes a SEQorigin and a SMBfirst flag in this example. In turn, the MAC driver provides the request and associated control information by a transfer 62 to the smart adapter 56. The target buffer specifies where the payload should be stored when possible by the network interface card. The flow specification specifies how to identify packets that are part of this session. The SEQorigin specifies the sequence number of the first byte of the payload (excluding any SMB header) that should be stored in the target buffer. The SMBfirst flag tells the driver whether the first packet with that sequence SEQorigin will have a SMB header following its TCP header. This information is used so that the control data can be cut from the first packet in the plurality of packets which are received in response to the read request.
Using this information, when the adapter receives packets in the session, it puts the payload data directly (line 63) into the target buffer. There is no guarantee that the adapter will always do this; however it will be done most of the time when a target buffer has been supplied. Such received packets are passed up to the protocol one at a time as always, using the same interfacing data structures as always. The only difference is that the packet will be split across two fragments. The header (Ethernet, IP, TCP and possible SMB headers) will be the first fragment on line 64, and will occupy a driver allocated buffer as always for use in identifying the packet, and for protocol maintenance functions. However, the payload will occupy a second fragment on line 63 which has been copied to the offset within the target buffer determined by the SEQ parameter in the header. The driver figures out the offset in the target buffer from the SEQ number in the header of the incoming packet. The offset into the target buffer is simply determined by the SEQ in the packet less the SEQorigin parameter which is provided with the READ RAW request. According to one implementation, if the packets which are responsive to the read request come to the adapter out of order, they will not be redirected to the target buffer until the first packet with the SMB header carried in is received. At that point, the size of the SMB header is easily calculated, and the amount to adjust the calculation for directly loading into the target buffer can be readily determined.
This approach allows both data that is targeted at the file system cache buffers to skip one or more copies or application layer reads. However, it need not be used to its full potential to be worthwhile. Even if one copy operation can be skipped the invention might be useful. Thus, according to an alternative embodiment the target buffers are assigned at the TCP layer rather than at the application layer. The TCP buffer target address is passed down to the MAC driver, allowing the packet to skip the copy at the IP layer.
Other protocols can be handled as well, such as the IPX and the NetBEUI/Data Link Control (DLC) protocols. Although these protocols do not use SEQ numbers which act as byte counters, but rather use packet numbers as part of the flow specification provided to the adapter. Thus, the problem of calculating the offset into the target buffer is complicated. However, if all packets in the read request are constrained to the same size, except for the last packet, the target buffer offset can be easily determined. Alternatively, the bypass might only be performed on packets received in order. Additional calculations on the smart network adapter card can also provide the memory offsets. Similarly file system protocols other than CIFS are possible, such as FTP or NFS.
According to some embodiments of the present invention, the network adapter has resources which enable it to determine that a received packet has good data, such as checksum checking logic and the like, before transferring it up to the target buffer. The smart network adapter has the capability to maintain a record of the parts of the target buffer which have been filled in with good packets and not overwrite them. This addresses a feature of the TCP/IP protocol by which there is no guarantee that payload bytes will arrive in order, or that if they are retransmitted that they will be retransmitted in the same size chunks. Thus, the file server might send part of a previous packet along with some new data. The adapter in this embodiment is capable of properly handling this condition because of its record of the good data already stored in the target buffer.
According to the READ RAW SMB process, subsequent packets in the sequence, including packet 120 and packet 130 do not carry SMB headers like the header 106 in the first packet 100. The subsequent packets are received by the smart network interface card and the TCP/IP flow specification is used to identify them as part of the READ RAW response. Once they are identified by the network interface card as part of the response, they are uploaded into the target buffer 111 at an offset determined by the SEQ parameter in the TCP header. The header fragments of the packets 120 and 130 can be passed up the protocol stack to ensure that the protocol stack is properly apprised of the sequence of packets being received.
Normally a received packet is placed in a buffer allocated by the driver and then passed up to the protocol stack in a data structure that consists of one or more fragments identified by respective pointers and lengths. The total sum of the fragments in order makes up the entire packet. Often, the packet is passed up in one piece, and there is not a second fragment. But in some cases, such as in a transmit loop back, the packet is divided into several fragments which are passed back up to the protocol stack. Thus the protocol stack is normally configured to handle packets which are passed up in several fragments. According to the present invention, the packet is divided into two fragments, including the header which is placed in the buffer allocated by the driver identified by a pointer to the buffer location, and the payload which is placed in the target buffer and identified by a pointer to the target buffer. The identifiers of the two fragments are passed up the protocol stack by making a call to the receive function in the next layer, and passing the fragment identifiers up with the call. This allows the packet to be processed normally through the protocol stack. At the application layer, or at the layer of the target buffer, the protocol or the application would be modified according to one implementation of the invention to compare the address of the fragment with the address of the buffer into which this layer of the stack intends to copy the fragment. If these two addresses match, then the copy is not executed. The copy would not be necessary because the adapter had already copied the payload into the target buffer. Thus, very little modification of the protocol stack is necessary in order to execute the present invention.
The foregoing description of a preferred embodiment of the invention has been presented for purposes of illustration and description. It is not intended to be exhaustive or to limit the invention to the precise forms disclosed. Obviously, many modifications and variations will be apparent to practitioners skilled in this art. It is intended that the scope of the invention be defined by the following claims and their equivalents.
Claims (28)
1. A method for transferring data on a network from a data source to an end station executing a multi-layer network protocol, including a network layer and at least one higher layer, through a network interface on the end station, comprising:
receiving in the network interface of the end station, from the at least one higher layer, a flow specification comprising an identifier of a protocol suite and an identifier of a block of data to be requested from the data source;
prior to receiving a first packet of a plurality of packets, wherein the plurality of packets includes the block of data, responsive to a request for the block of data, allocating a target buffer assigned by a process at a layer higher than the network layer for storing the block of data and notifying the network interface of the allocated target buffer;
receiving in the network interface a the first packet which carries a data payload from a the block of data in the data source, and a control field identifying the first packet; and
determining in the network interface whether the first packet carries a payload with at least a portion of the block of data based on matching the control field in the network interface whether the packet matches a with the identifier of the block of data in the flow specification, and if so transferring the data payload in the first packet directly to a the target buffer assigned by a process at a layer higher than the network layer based exclusively on the matching.
2. The method of claim 1 , wherein the control field in the first packet includes a packet header.
3. The method of claim 1 , wherein the multi-layer network protocol comprises TCP/IP, and the control field comprises a TCP/IP header.
4. The method of claim 1 , including prior to receiving the packet, allocating the target buffer for the plurality of packets, and notifying the network interface of the allocated target buffer.
5. The method of claim 1 , the network interface is coupled to a network medium supporting a maximum packet size, and including transmitting a the request from an application for transfer of a the block of data from the data source, the block of data having a length potentially greater than the maximum packet size for the medium.
6. The method of claim 5 , including notifying wherein the flow specification is provided to the network interface in response to the request of a flow specification for transfer of the block of data according to the multi-layer network protocol, and wherein the step of receiving the packet includes identifying packet using the flow specification.
7. The method of claim 6 , wherein the network protocol comprises TCP/IP, and the identifier in the flow specification includes a sequence number of a first byte from the plurality of packets to be stored in the target buffer.
8. The method of claim 1 , wherein the identifier in the flow specification includes a sequence number range for the block of data.
9. The method of claim 8 1, wherein the flow specification includes IP source and destination addresses and TCP port numbers.
10. A method for transferring data on a network from a data source to an end station executing a multi-layer network protocol through a network interface on the end station, including medium access control layer processes, comprising:
establishing a connection with a destination for a session according to a network protocol;
transmitting a request for transfer of a block of data from the data source, and providing a flow specification and an identifier of a target buffer to the network interface;
receiving in the network interface a plurality of packets which carry respective data payloads, packets in the plurality of packets including control fields identifying whether the packet falls within the flow specification of the block of data,
upon receiving a packet, determining in the network interface whether the packet falls within the flow specification, and if so transferring the data payload to the target buffer.
11. The method of claim 10 , wherein the control field in the first packet includes a packet header.
12. The method of claim 10 , wherein the network protocol comprises TCP/IP, and the packet control data comprises a TCP/IP header.
13. The method of claim 10 , wherein the network protocol comprises TCP/IP, and the flow specification includes a sequence number of a first byte from the plurality of packets to be stored in the target buffer.
14. The method of claim 10 , wherein the flow specification includes a sequence number for the block of data.
15. The method of claim 14 , wherein the flow specification includes IP source and destination addresses and TCP port numbers.
16. A method for transferring data on a network from a data source to an end station executing a TCP/IP network protocol through a network interface on the end station including medium access control layer processes below TCP/IP, comprising:
establishing a connection with a destination for a session according to the TCP/IP network protocol;
transmitting a request from a application, for transfer of a block of data from the data source, and providing a flow specification for the block of data and an identifier of a target buffer to the network interface;
receiving in the network interface a plurality of packets which carry respective data payloads from the block of data in the data source, and each packet in the plurality of packets including a TCP/IP header,
upon receiving each packet, determining in the network interface whether the packet falls within the flow specification, and if so transferring a data payload to the target buffer.
17. The method of claim 16 , wherein the flow specification includes a sequence number for bytes of data in the block of data.
18. The method of claim 17 , wherein the flow specification includes IP source and destination addresses and TCP port numbers.
19. The method of claim 16 , wherein the target buffer comprises a buffer assigned at the TCP layer or higher.
20. The method of claim 16 , wherein the target buffer comprises a buffer assigned at a layer higher than the TCP layer.
21. The method of claim 2, further comprising transferring at least a portion of the packet header to a buffer in the end station outside the network interface for processing using the multi-layer network protocol.
22. The method of claim 1, wherein the identifier in the flow specification includes packet numbers.
23. A method for transferring data on a network from a data source to an end station executing a multi-layer network protocol, including a network layer and at least one higher layer, through a network interface on the end station, comprising:
receiving in the network interface of the end station, from the at least one higher layer, a flow specification comprising an identifier of a protocol suite and an identifier of a block of data to be requested from the data source;
prior to receiving a first packet of a plurality of packets, wherein each packet of the plurality of packets carries a data payload from the block of data in the data source and a control field identifying that packet, responsive to a request for the block of data, allocating a target buffer assigned by a process at a layer higher than the network layer for storing the block of data and notifying the network interface of the allocated target buffer; and for each packet of the plurality of packets:
receiving in the network interface that packet; and
determining in the network interface whether that packet carries a payload with at least a portion of the block of data based on matching the control field of that packet with the identifier of the block of data in the flow specification, and if that packet matches the identifier of the block of data in the flow specification, transferring the data payload in that packet directly to the target buffer.
24. The method of claim 23, wherein the control field in each packet of the plurality of packets includes a packet header.
25. The method of claim 24, further comprising transferring at least a portion of the packet header to a buffer in the end station outside the network interface for processing using the multi-layer network protocol.
26. The method of claim 23, wherein the multi-layer network protocol comprises TCP/IP.
27. The method of claim 23, wherein the network interface is coupled to a network medium supporting a maximum packet size, and including transmitting the request from an application for transfer of the block of data from the data source, the block of data having a length greater than the maximum packet size for the medium.
28. The method of claim 27, wherein the flow specification is provided to the network interface in response to the request for transfer of the block of data according to the multi-layer network protocol.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/891,049 USRE45070E1 (en) | 1998-05-01 | 2013-05-09 | Receive processing with network protocol bypass |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/071,692 US6246683B1 (en) | 1998-05-01 | 1998-05-01 | Receive processing with network protocol bypass |
US13/891,049 USRE45070E1 (en) | 1998-05-01 | 2013-05-09 | Receive processing with network protocol bypass |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/071,692 Reissue US6246683B1 (en) | 1998-05-01 | 1998-05-01 | Receive processing with network protocol bypass |
Publications (1)
Publication Number | Publication Date |
---|---|
USRE45070E1 true USRE45070E1 (en) | 2014-08-12 |
Family
ID=22102958
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/071,692 Ceased US6246683B1 (en) | 1998-05-01 | 1998-05-01 | Receive processing with network protocol bypass |
US09/814,619 Expired - Lifetime US6956853B1 (en) | 1998-05-01 | 2001-03-22 | Receive processing with network protocol bypass |
US13/891,049 Expired - Lifetime USRE45070E1 (en) | 1998-05-01 | 2013-05-09 | Receive processing with network protocol bypass |
Family Applications Before (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/071,692 Ceased US6246683B1 (en) | 1998-05-01 | 1998-05-01 | Receive processing with network protocol bypass |
US09/814,619 Expired - Lifetime US6956853B1 (en) | 1998-05-01 | 2001-03-22 | Receive processing with network protocol bypass |
Country Status (1)
Country | Link |
---|---|
US (3) | US6246683B1 (en) |
Families Citing this family (153)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7133940B2 (en) * | 1997-10-14 | 2006-11-07 | Alacritech, Inc. | Network interface device employing a DMA command queue |
US7167927B2 (en) | 1997-10-14 | 2007-01-23 | Alacritech, Inc. | TCP/IP offload device with fast-path TCP ACK generating and transmitting mechanism |
US8782199B2 (en) | 1997-10-14 | 2014-07-15 | A-Tech Llc | Parsing a packet header |
US6427171B1 (en) | 1997-10-14 | 2002-07-30 | Alacritech, Inc. | Protocol processing stack for use with intelligent network interface device |
US7237036B2 (en) * | 1997-10-14 | 2007-06-26 | Alacritech, Inc. | Fast-path apparatus for receiving data corresponding a TCP connection |
US6389479B1 (en) | 1997-10-14 | 2002-05-14 | Alacritech, Inc. | Intelligent network interface device and system for accelerated communication |
US6226680B1 (en) * | 1997-10-14 | 2001-05-01 | Alacritech, Inc. | Intelligent network interface system method for protocol processing |
US8539112B2 (en) | 1997-10-14 | 2013-09-17 | Alacritech, Inc. | TCP/IP offload device |
US6427173B1 (en) | 1997-10-14 | 2002-07-30 | Alacritech, Inc. | Intelligent network interfaced device and system for accelerated communication |
US8621101B1 (en) | 2000-09-29 | 2013-12-31 | Alacritech, Inc. | Intelligent network storage interface device |
US6591302B2 (en) | 1997-10-14 | 2003-07-08 | Alacritech, Inc. | Fast-path apparatus for receiving data corresponding to a TCP connection |
US7089326B2 (en) * | 1997-10-14 | 2006-08-08 | Alacritech, Inc. | Fast-path processing for receiving data on TCP connection offload devices |
US7076568B2 (en) * | 1997-10-14 | 2006-07-11 | Alacritech, Inc. | Data communication apparatus for computer intelligent network interface card which transfers data between a network and a storage device according designated uniform datagram protocol socket |
US6757746B2 (en) | 1997-10-14 | 2004-06-29 | Alacritech, Inc. | Obtaining a destination address so that a network interface device can write network data without headers directly into host memory |
US6658480B2 (en) * | 1997-10-14 | 2003-12-02 | Alacritech, Inc. | Intelligent network interface system and method for accelerated protocol processing |
US7185266B2 (en) | 2003-02-12 | 2007-02-27 | Alacritech, Inc. | Network interface device for error detection using partial CRCS of variable length message portions |
US6697868B2 (en) * | 2000-02-28 | 2004-02-24 | Alacritech, Inc. | Protocol processing stack for use with intelligent network interface device |
US6687758B2 (en) * | 2001-03-07 | 2004-02-03 | Alacritech, Inc. | Port aggregation for network connections that are offloaded to network interface devices |
US6434620B1 (en) | 1998-08-27 | 2002-08-13 | Alacritech, Inc. | TCP/IP offload network interface device |
US7042898B2 (en) | 1997-10-14 | 2006-05-09 | Alacritech, Inc. | Reducing delays associated with inserting a checksum into a network message |
US7174393B2 (en) | 2000-12-26 | 2007-02-06 | Alacritech, Inc. | TCP/IP offload network interface device |
US7284070B2 (en) * | 1997-10-14 | 2007-10-16 | Alacritech, Inc. | TCP offload network interface device |
US6563836B1 (en) * | 1998-03-19 | 2003-05-13 | International Business Machines Corporation | Algorithm for dynamic prioritization in a queuing environment |
US6246683B1 (en) | 1998-05-01 | 2001-06-12 | 3Com Corporation | Receive processing with network protocol bypass |
US6765901B1 (en) * | 1998-06-11 | 2004-07-20 | Nvidia Corporation | TCP/IP/PPP modem |
US7664883B2 (en) * | 1998-08-28 | 2010-02-16 | Alacritech, Inc. | Network interface device that fast-path processes solicited session layer read commands |
US6493342B1 (en) * | 1998-09-11 | 2002-12-10 | Teledesic Llc | Method of data transmission in a data communication network |
DE69934852T2 (en) * | 1998-09-11 | 2007-10-18 | Hitachi, Ltd. | IP packet communication apparatus |
US6721379B1 (en) * | 1998-09-25 | 2004-04-13 | International Business Machines Corporation | DAC/Driver waveform generator with phase lock rise time control |
US7031904B1 (en) | 1999-01-26 | 2006-04-18 | Adaptec, Inc. | Methods for implementing an ethernet storage protocol in computer networks |
US6738821B1 (en) * | 1999-01-26 | 2004-05-18 | Adaptec, Inc. | Ethernet storage protocol networks |
US6453360B1 (en) * | 1999-03-01 | 2002-09-17 | Sun Microsystems, Inc. | High performance network interface |
US6516371B1 (en) * | 1999-05-27 | 2003-02-04 | Advanced Micro Devices, Inc. | Network interface device for accessing data stored in buffer memory locations defined by programmable read pointer information |
US6651117B1 (en) * | 1999-11-03 | 2003-11-18 | Adaptec, Inc. | Network stack layer interface |
DE10009570A1 (en) * | 2000-02-29 | 2001-08-30 | Partec Ag | Method for controlling the communication of individual computers in a computer network |
US6862276B1 (en) * | 2000-03-30 | 2005-03-01 | Qualcomm Incorporated | Method and apparatus for a mobile station application to receive and transmit raw packetized data |
US6988142B2 (en) * | 2000-08-24 | 2006-01-17 | Red Hat, Inc. | Method and apparatus for handling communication requests at a server without context switching |
US8019901B2 (en) | 2000-09-29 | 2011-09-13 | Alacritech, Inc. | Intelligent network storage interface system |
US20040073724A1 (en) * | 2000-10-03 | 2004-04-15 | Adaptec, Inc. | Network stack layer interface |
US6720074B2 (en) * | 2000-10-26 | 2004-04-13 | Inframat Corporation | Insulator coated magnetic nanoparticulate composites with reduced core loss and method of manufacture thereof |
US20020116532A1 (en) * | 2000-12-21 | 2002-08-22 | Berg Mitchell T. | Method and system for communicating an information packet and identifying a data structure |
US7546369B2 (en) * | 2000-12-21 | 2009-06-09 | Berg Mitchell T | Method and system for communicating a request packet in response to a state |
US7418522B2 (en) * | 2000-12-21 | 2008-08-26 | Noatak Software Llc | Method and system for communicating an information packet through multiple networks |
US7421505B2 (en) * | 2000-12-21 | 2008-09-02 | Noatak Software Llc | Method and system for executing protocol stack instructions to form a packet for causing a computing device to perform an operation |
US7512686B2 (en) * | 2000-12-21 | 2009-03-31 | Berg Mitchell T | Method and system for establishing a data structure of a connection with a client |
US7287090B1 (en) | 2000-12-21 | 2007-10-23 | Noatak Software, Llc | Method and system for identifying a computing device in response to a request packet |
US20020116397A1 (en) * | 2000-12-21 | 2002-08-22 | Berg Mitchell T. | Method and system for communicating an information packet through multiple router devices |
US20020116605A1 (en) * | 2000-12-21 | 2002-08-22 | Berg Mitchell T. | Method and system for initiating execution of software in response to a state |
US6976054B1 (en) * | 2000-12-29 | 2005-12-13 | Nortel Networks Limited | Method and system for accessing low-level resources in a network device |
US7203722B2 (en) * | 2001-05-24 | 2007-04-10 | International Business Machines Corporation | Optimistic processing of network frames to reduce latency |
US7398314B2 (en) | 2001-08-08 | 2008-07-08 | Flash Networks Ltd | System and a method for accelerating communication of TCP/IP based content through the use of fake host names |
US7149218B2 (en) * | 2001-12-05 | 2006-12-12 | International Business Machines Corporation | Cache line cut through of limited life data in a data processing system |
US20030115350A1 (en) * | 2001-12-14 | 2003-06-19 | Silverback Systems, Inc. | System and method for efficient handling of network data |
US7356012B2 (en) * | 2001-12-27 | 2008-04-08 | Anoto Ab | Method for transmitting information |
US20030121835A1 (en) * | 2001-12-31 | 2003-07-03 | Peter Quartararo | Apparatus for and method of sieving biocompatible adsorbent beaded polymers |
US7228550B1 (en) | 2002-01-07 | 2007-06-05 | Slt Logic, Llc | System and method for making communication streams available to processes executing under control of an operating system but without the intervention of the operating system |
US7149808B2 (en) * | 2002-01-14 | 2006-12-12 | Array Networks, Inc. | Application protocol offloading |
US6957281B2 (en) * | 2002-01-15 | 2005-10-18 | Intel Corporation | Ingress processing optimization via traffic classification and grouping |
US7269661B2 (en) | 2002-02-12 | 2007-09-11 | Bradley Richard Ree | Method using receive and transmit protocol aware logic modules for confirming checksum values stored in network packet |
US7899924B2 (en) * | 2002-04-19 | 2011-03-01 | Oesterreicher Richard T | Flexible streaming hardware |
US7496689B2 (en) * | 2002-04-22 | 2009-02-24 | Alacritech, Inc. | TCP/IP offload device |
US7543087B2 (en) | 2002-04-22 | 2009-06-02 | Alacritech, Inc. | Freeing transmit memory on a network interface device prior to receiving an acknowledgement that transmit data has been received by a remote device |
US7403542B1 (en) | 2002-07-19 | 2008-07-22 | Qlogic, Corporation | Method and system for processing network data packets |
US7319981B2 (en) * | 2002-08-27 | 2008-01-15 | Michael Schwartzman | Multi-picture online commerce feature |
US7397768B1 (en) | 2002-09-11 | 2008-07-08 | Qlogic, Corporation | Zone management in a multi-module fibre channel switch |
GB0221464D0 (en) * | 2002-09-16 | 2002-10-23 | Cambridge Internetworking Ltd | Network interface and protocol |
US7269171B2 (en) * | 2002-09-24 | 2007-09-11 | Sun Microsystems, Inc. | Multi-data receive processing according to a data communication protocol |
US7191241B2 (en) * | 2002-09-27 | 2007-03-13 | Alacritech, Inc. | Fast-path apparatus for receiving data corresponding to a TCP connection |
US7337241B2 (en) * | 2002-09-27 | 2008-02-26 | Alacritech, Inc. | Fast-path apparatus for receiving data corresponding to a TCP connection |
US7080148B2 (en) | 2002-09-30 | 2006-07-18 | America Online, Inc. | Translating switch and method |
US7242682B1 (en) | 2002-10-09 | 2007-07-10 | Storage Technology Corporation | Hardware frame modifier apparatus and method for storage virtualization |
US20040088262A1 (en) * | 2002-11-06 | 2004-05-06 | Alacritech, Inc. | Enabling an enhanced function of an electronic device |
JP2006505996A (en) * | 2002-11-08 | 2006-02-16 | コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ | Receiver, transmitter, method and system for processing network data units in a network stack |
US7649880B2 (en) * | 2002-11-12 | 2010-01-19 | Mark Adams | Systems and methods for deriving storage area commands |
CN101448012B (en) * | 2002-11-12 | 2013-04-24 | 雷特泽遥距管理有限责任公司 | Data storage devices having IP capablity partitions |
US7742473B2 (en) * | 2002-11-12 | 2010-06-22 | Mark Adams | Accelerator module |
US7170890B2 (en) * | 2002-12-16 | 2007-01-30 | Zetera Corporation | Electrical devices with improved communication |
US8005918B2 (en) | 2002-11-12 | 2011-08-23 | Rateze Remote Mgmt. L.L.C. | Data storage devices having IP capable partitions |
US7319669B1 (en) | 2002-11-22 | 2008-01-15 | Qlogic, Corporation | Method and system for controlling packet flow in networks |
US7386619B1 (en) * | 2003-01-06 | 2008-06-10 | Slt Logic, Llc | System and method for allocating communications to processors in a multiprocessor system |
US7657919B2 (en) * | 2003-01-21 | 2010-02-02 | Scientific—Atlanta, LLC | Single wire return device including a QAM modulator for downstream IP signals |
US8417852B2 (en) | 2003-06-05 | 2013-04-09 | Nvidia Corporation | Uploading TCP frame data to user buffers and buffers in system memory |
US7420991B2 (en) * | 2003-07-15 | 2008-09-02 | Qlogic, Corporation | TCP time stamp processing in hardware based TCP offload |
US7453802B2 (en) | 2003-07-16 | 2008-11-18 | Qlogic, Corporation | Method and apparatus for detecting and removing orphaned primitives in a fibre channel network |
US7646767B2 (en) | 2003-07-21 | 2010-01-12 | Qlogic, Corporation | Method and system for programmable data dependant network routing |
US7430175B2 (en) * | 2003-07-21 | 2008-09-30 | Qlogic, Corporation | Method and system for managing traffic in fibre channel systems |
US20050080920A1 (en) * | 2003-10-14 | 2005-04-14 | International Business Machines Corporation | Interpartition control facility for processing commands that effectuate direct memory to memory information transfer |
US7876757B2 (en) * | 2003-11-06 | 2011-01-25 | International Business Machines Corporation | Router-assisted fast processing of packet termination in host |
US7535898B2 (en) * | 2003-11-06 | 2009-05-19 | Intel Corporation | Distributed switch memory architecture |
US7509373B2 (en) * | 2003-11-24 | 2009-03-24 | At&T Intellectual Property I, L.P. | Methods for providing communications services |
US6996070B2 (en) * | 2003-12-05 | 2006-02-07 | Alacritech, Inc. | TCP/IP offload device with reduced sequential processing |
GB0408876D0 (en) * | 2004-04-21 | 2004-05-26 | Level 5 Networks Ltd | User-level stack |
US9210073B2 (en) * | 2004-04-30 | 2015-12-08 | Hewlett-Packard Development Company, L.P. | System and method for message routing in a network |
US7466699B2 (en) * | 2004-04-30 | 2008-12-16 | Hewlett-Packard Development Company, L.P. | System for communicating between network end-points using a payload offset and buffer pool handle |
US7669190B2 (en) | 2004-05-18 | 2010-02-23 | Qlogic, Corporation | Method and system for efficiently recording processor events in host bus adapters |
US8155117B2 (en) * | 2004-06-29 | 2012-04-10 | Qualcomm Incorporated | Filtering and routing of fragmented datagrams in a data network |
EP1772016A2 (en) * | 2004-07-23 | 2007-04-11 | Beach Unlimited LLC | Trickmodes and speed transitions |
US7522623B2 (en) * | 2004-09-01 | 2009-04-21 | Qlogic, Corporation | Method and system for efficiently using buffer space |
US7761608B2 (en) * | 2004-09-01 | 2010-07-20 | Qlogic, Corporation | Method and system for processing markers, data integrity fields and digests |
US7676611B2 (en) * | 2004-10-01 | 2010-03-09 | Qlogic, Corporation | Method and system for processing out of orders frames |
US7593997B2 (en) * | 2004-10-01 | 2009-09-22 | Qlogic, Corporation | Method and system for LUN remapping in fibre channel networks |
US8248939B1 (en) | 2004-10-08 | 2012-08-21 | Alacritech, Inc. | Transferring control of TCP connections between hierarchy of processing mechanisms |
TWI257790B (en) * | 2004-10-29 | 2006-07-01 | Ind Tech Res Inst | System for protocol processing engine |
US7620071B2 (en) * | 2004-11-16 | 2009-11-17 | Intel Corporation | Packet coalescing |
US7831749B2 (en) * | 2005-02-03 | 2010-11-09 | Solarflare Communications, Inc. | Including descriptor queue empty events in completion events |
EP2383658B1 (en) | 2005-02-03 | 2012-12-12 | Solarflare Communications Inc | Queue depth management for communication between host and peripheral device |
US7562366B2 (en) | 2005-02-03 | 2009-07-14 | Solarflare Communications, Inc. | Transmit completion event batching |
US7702850B2 (en) * | 2005-03-14 | 2010-04-20 | Thomas Earl Ludwig | Topology independent storage arrays and methods |
US7620981B2 (en) | 2005-05-26 | 2009-11-17 | Charles William Frank | Virtual devices and virtual bus tunnels, modules and methods |
WO2006134373A2 (en) | 2005-06-15 | 2006-12-21 | Solarflare Communications Incorporated | Reception according to a data transfer protocol of data directed to any of a plurality of destination entities |
US7743214B2 (en) | 2005-08-16 | 2010-06-22 | Mark Adams | Generating storage system commands |
US8819092B2 (en) | 2005-08-16 | 2014-08-26 | Rateze Remote Mgmt. L.L.C. | Disaggregated resources and access methods |
US7639715B1 (en) | 2005-09-09 | 2009-12-29 | Qlogic, Corporation | Dedicated application interface for network systems |
US9270532B2 (en) | 2005-10-06 | 2016-02-23 | Rateze Remote Mgmt. L.L.C. | Resource command messages and methods |
US7738500B1 (en) | 2005-12-14 | 2010-06-15 | Alacritech, Inc. | TCP timestamp synchronization for network connections that are offloaded to network interface devices |
US8116312B2 (en) * | 2006-02-08 | 2012-02-14 | Solarflare Communications, Inc. | Method and apparatus for multicast packet reception |
JP4713363B2 (en) * | 2006-02-17 | 2011-06-29 | Okiセミコンダクタ株式会社 | Data transmitting / receiving apparatus and received data analyzing method |
US7924881B2 (en) * | 2006-04-10 | 2011-04-12 | Rateze Remote Mgmt. L.L.C. | Datagram identifier management |
US20070258445A1 (en) * | 2006-05-02 | 2007-11-08 | Harris Corporation | Systems and methods for protocol filtering for quality of service |
US20070258459A1 (en) * | 2006-05-02 | 2007-11-08 | Harris Corporation | Method and system for QOS by proxy |
US20070291768A1 (en) * | 2006-06-16 | 2007-12-20 | Harris Corporation | Method and system for content-based differentiation and sequencing as a mechanism of prioritization for QOS |
US20070291767A1 (en) * | 2006-06-16 | 2007-12-20 | Harris Corporation | Systems and methods for a protocol transformation gateway for quality of service |
US8516153B2 (en) * | 2006-06-16 | 2013-08-20 | Harris Corporation | Method and system for network-independent QoS |
US8730981B2 (en) * | 2006-06-20 | 2014-05-20 | Harris Corporation | Method and system for compression based quality of service |
US20070291765A1 (en) * | 2006-06-20 | 2007-12-20 | Harris Corporation | Systems and methods for dynamic mode-driven link management |
US7876768B2 (en) | 2006-06-30 | 2011-01-25 | Ver Steeg William C | Systems and methods of assembling an elementary stream from an encapsulated multimedia transport stream |
US7895635B2 (en) * | 2006-06-30 | 2011-02-22 | Versteeg William C | Systems and methods of assembling an elementary stream from an encapsulated multimedia transport stream |
US20080013559A1 (en) * | 2006-07-14 | 2008-01-17 | Smith Donald L | Systems and methods for applying back-pressure for sequencing in quality of service |
US20100238801A1 (en) * | 2006-07-31 | 2010-09-23 | Smith Donald L | Method and system for stale data detection based quality of service |
US8300653B2 (en) * | 2006-07-31 | 2012-10-30 | Harris Corporation | Systems and methods for assured communications with quality of service |
US20080025318A1 (en) * | 2006-07-31 | 2008-01-31 | Harris Corporation | Systems and methods for dynamically customizable quality of service on the edge of a network |
US20100241759A1 (en) * | 2006-07-31 | 2010-09-23 | Smith Donald L | Systems and methods for sar-capable quality of service |
US8214509B2 (en) * | 2006-10-02 | 2012-07-03 | Microsoft Corporation | Receive coalescing and direct data placement |
US20080307102A1 (en) * | 2007-06-08 | 2008-12-11 | Galloway Curtis C | Techniques for communicating data between a host device and an intermittently attached mobile device |
US20080307109A1 (en) * | 2007-06-08 | 2008-12-11 | Galloway Curtis C | File protocol for transaction based communication |
US8539513B1 (en) | 2008-04-01 | 2013-09-17 | Alacritech, Inc. | Accelerating data transfer in a virtual computer system with tightly coupled TCP connections |
US8341286B1 (en) | 2008-07-31 | 2012-12-25 | Alacritech, Inc. | TCP offload send optimization |
US9306793B1 (en) | 2008-10-22 | 2016-04-05 | Alacritech, Inc. | TCP offload device that batches session layer headers to reduce interrupts as well as CPU copies |
US8307134B2 (en) * | 2010-01-15 | 2012-11-06 | Apple Inc. | Multiple communication interfaces on a portable storage device |
US8553693B2 (en) | 2010-03-10 | 2013-10-08 | Intel Corporation | Network controller circuitry to issue at least one portion of packet payload to device in manner that by-passes communication protocol stack involvement |
US9124541B2 (en) * | 2011-06-30 | 2015-09-01 | Cisco Technology, Inc. | Zero copy acceleration for session oriented protocols |
US9047417B2 (en) | 2012-10-29 | 2015-06-02 | Intel Corporation | NUMA aware network interface |
TWI590795B (en) * | 2012-11-29 | 2017-07-11 | 佛維爾克控股公司 | Electrical kitchen machine |
TR201820498T4 (en) | 2012-11-29 | 2019-01-21 | Vorwerk Co Interholding | Kitchen tool. |
US10073987B2 (en) * | 2013-04-02 | 2018-09-11 | Western Digital Technologies, Inc. | Methods and systems for privileged execution support for file system commands on a storage device |
CN104142867B (en) * | 2013-05-09 | 2018-01-09 | 华为技术有限公司 | Data processing equipment and data processing method |
US10684973B2 (en) | 2013-08-30 | 2020-06-16 | Intel Corporation | NUMA node peripheral switch |
KR102117515B1 (en) * | 2013-09-30 | 2020-06-01 | 엘지전자 주식회사 | Internet Portocol TeleVision and Operating Method thereof |
KR102195069B1 (en) * | 2014-08-06 | 2020-12-24 | 삼성전자주식회사 | Packet transmitter and interface device including the same |
US9998573B2 (en) | 2016-08-02 | 2018-06-12 | Qualcomm Incorporated | Hardware-based packet processing circuitry |
US10680977B1 (en) * | 2017-09-26 | 2020-06-09 | Amazon Technologies, Inc. | Splitting data into an information vector and a control vector and processing, at a stage of a control pipeline, the control vector and a data block of the information vector extracted from a corresponding stage of a data pipeline |
US10592447B1 (en) * | 2018-12-28 | 2020-03-17 | EMC IP Holding Company LLC | Accelerated data handling in cloud data storage system |
US11750534B2 (en) * | 2019-12-27 | 2023-09-05 | Texas Instruments Incorporated | Packet storage based on packet properties |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5867495A (en) * | 1996-11-18 | 1999-02-02 | Mci Communications Corporations | System, method and article of manufacture for communications utilizing calling, plans in a hybrid network |
US5917820A (en) * | 1996-06-10 | 1999-06-29 | Cisco Technology, Inc. | Efficient packet forwarding arrangement for routing packets in an internetwork |
US6046979A (en) * | 1998-05-04 | 2000-04-04 | Cabletron Systems, Inc. | Method and apparatus for controlling the flow of variable-length packets through a multiport switch |
US6226680B1 (en) | 1997-10-14 | 2001-05-01 | Alacritech, Inc. | Intelligent network interface system method for protocol processing |
US6246683B1 (en) | 1998-05-01 | 2001-06-12 | 3Com Corporation | Receive processing with network protocol bypass |
US6697868B2 (en) | 2000-02-28 | 2004-02-24 | Alacritech, Inc. | Protocol processing stack for use with intelligent network interface device |
US6757746B2 (en) | 1997-10-14 | 2004-06-29 | Alacritech, Inc. | Obtaining a destination address so that a network interface device can write network data without headers directly into host memory |
US7076568B2 (en) | 1997-10-14 | 2006-07-11 | Alacritech, Inc. | Data communication apparatus for computer intelligent network interface card which transfers data between a network and a storage device according designated uniform datagram protocol socket |
US7502869B2 (en) | 1997-10-14 | 2009-03-10 | Alacritech, Inc. | Intelligent network interface system and method for accelerated protocol processing |
US7664883B2 (en) | 1998-08-28 | 2010-02-16 | Alacritech, Inc. | Network interface device that fast-path processes solicited session layer read commands |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6504851B1 (en) * | 1997-11-21 | 2003-01-07 | International Business Machines Corporation | Dynamic detection of LAN network protocol |
-
1998
- 1998-05-01 US US09/071,692 patent/US6246683B1/en not_active Ceased
-
2001
- 2001-03-22 US US09/814,619 patent/US6956853B1/en not_active Expired - Lifetime
-
2013
- 2013-05-09 US US13/891,049 patent/USRE45070E1/en not_active Expired - Lifetime
Patent Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5917820A (en) * | 1996-06-10 | 1999-06-29 | Cisco Technology, Inc. | Efficient packet forwarding arrangement for routing packets in an internetwork |
US5867495A (en) * | 1996-11-18 | 1999-02-02 | Mci Communications Corporations | System, method and article of manufacture for communications utilizing calling, plans in a hybrid network |
US6757746B2 (en) | 1997-10-14 | 2004-06-29 | Alacritech, Inc. | Obtaining a destination address so that a network interface device can write network data without headers directly into host memory |
US6226680B1 (en) | 1997-10-14 | 2001-05-01 | Alacritech, Inc. | Intelligent network interface system method for protocol processing |
US7076568B2 (en) | 1997-10-14 | 2006-07-11 | Alacritech, Inc. | Data communication apparatus for computer intelligent network interface card which transfers data between a network and a storage device according designated uniform datagram protocol socket |
US7124205B2 (en) | 1997-10-14 | 2006-10-17 | Alacritech, Inc. | Network interface device that fast-path processes solicited session layer read commands |
US7461160B2 (en) | 1997-10-14 | 2008-12-02 | Alacritech, Inc. | Obtaining a destination address so that a network interface device can write network data without headers directly into host memory |
US7502869B2 (en) | 1997-10-14 | 2009-03-10 | Alacritech, Inc. | Intelligent network interface system and method for accelerated protocol processing |
US7945699B2 (en) | 1997-10-14 | 2011-05-17 | Alacritech, Inc. | Obtaining a destination address so that a network interface device can write network data without headers directly into host memory |
US20120202529A1 (en) | 1997-10-14 | 2012-08-09 | Alacritech, Inc. | Intelligent Network Interface System and Method for Accelerated Protocol Processing |
US6246683B1 (en) | 1998-05-01 | 2001-06-12 | 3Com Corporation | Receive processing with network protocol bypass |
US6956853B1 (en) | 1998-05-01 | 2005-10-18 | 3Com Corporation | Receive processing with network protocol bypass |
US6046979A (en) * | 1998-05-04 | 2000-04-04 | Cabletron Systems, Inc. | Method and apparatus for controlling the flow of variable-length packets through a multiport switch |
US7664883B2 (en) | 1998-08-28 | 2010-02-16 | Alacritech, Inc. | Network interface device that fast-path processes solicited session layer read commands |
US6697868B2 (en) | 2000-02-28 | 2004-02-24 | Alacritech, Inc. | Protocol processing stack for use with intelligent network interface device |
Non-Patent Citations (32)
Title |
---|
"CS410 Homepage," Computer Networks and Internets, 1998, 2 pages, can be retrieved at . |
"HP Completes Acquisition of 3Com Corporation, Accelerates Converged Infrastructure Strategy," Business Wire, Apr. 12, 2010, 2 pages. |
"CS410 Homepage," Computer Networks and Internets, 1998, 2 pages, can be retrieved at <URL:http://pheattarchive.emporia.edu/courses/1998/cs410f98/cs410.htm>. |
Alacritech "Alacritech Protocol Interface Card Software Development Plan" date unknown, 7 Pages. |
Alacritech Engineering, "Intelligent Network Interface Card (INIC) Overview," 1997, 10 Pages. |
Braden, R., RFC: 1644, T/TCP-CTCP Extensions for Transactions Functional Specification, Network Working Group, Jul. 1994, 39 Pages. |
Comer, D., et al., "Internetworking with TCP/IP vol. II Design, Implementation, and Internals," 1991, pp. 32-34, 166-171, Prentice-Hall, Inc. |
Craft, P., "Alacritech Simulation System Test Plan," Alacritech, 1997, 10 Pages. |
Craft, P., "Alacritech SMBTest Program Design Specification," Alacritech, 1997, 12 Pages. |
Craft, P., et al., "Alacritech TCP (ATCP) Design Specification," Alacritech, Feb. 22, 2011, Jul. 28, 1997, 21 Pages. |
Craft, P., et al., "Alacritech TCP (ATCP) Design Specification," Alacritech, Feb. 22, 2011, Jul. 28, 1997, 29 Pages, Modified. |
Craft, P., et al., "Alacritech TCP (ATCP) Design Specification," Alacritech, Jan. 11, 2011, 1997, 23 Pages. |
Ercolano, A., "Lance.C.txt" Microsoft Cororation, 1990, 80 Pages. |
Gholz, C., "Interference Practice Strategies," Copyright 2003 by Charles L. Gholz; Oblon, Spivak, McClelland, Maier, & Neustadt, P.C.; Alexandria, Virginia, 24 Pages. |
Gholz, C., "When Should a Patentability Motion be Deferred to the Second Phase?" Intellectual Property Today, Nov. 2010, pp. 7-9. |
Heizer, I., et al., CIFS 1.0, draft-heizer-cifs-v1-spec-00.txt, Microsoft, Jun. 13, 1996, 241 Pages. |
Host Interface Strategy for the Alacritech INIC, date unknown, 6 Pages. |
International Standard, "Information technology-Open Systems Interconnection-Basic Reference Model: The Basic Model," ISO/IEC 7498-1, Second Edition, Nov. 15, 1994, 68 Pages. |
Lam, S., et al., "Burst Scheduling Networks: Flow Specification and Performance Guarantees," 5th International Workshop, NOSSDAV' 95 Network and Operating Systems Support Digital Audio and Video, Apr. 19-21, 1995, 10 Pages. |
Metcalfe, R., "Computer/Network Interface Design: Lessons from Arpanet and Ethernet," IEEE Journal on Selected Areas in Communications, Feb. 1993, pp. 173-180, vol. IL, No. 2. |
Network Associates Guide to Communication Protocols, 1998, 1 page. |
Network Communication Protocols Map, 2004, 1 page, can be retrieved at . |
Network Communication Protocols Map, 2004, 1 page, can be retrieved at <URL:http://www.javvin.com/pics/map2004-medium.gif>. |
Partridge, C., RFC: 1363, A Proposed Flow Specification, Network Working Group, Sep. 1992, 20 Pges. |
Patent Interference No. 105,775: Connery v. Boucher, US Patent Application Nos. 09/071,692 v. 09/692,561; Declaration date Sep. 14, 2010; Judgment Date Jun. 18, 2012. |
Que Corporation, NDIS-Windows 95 Microsoft Certified Professional Guide, Examining Network Architecture, Chapter 15 Windows 95 Networking Introduction, 1995, pp. 247-248. |
RFC:793, "Transmission Control Protocol," DARPA Internet Program, Protocol Specification, Prepared for Defense Advanced Research Projects Agency, Sep. 1981, 93 Pages. |
Tanenbaum, A., "Computer Networks," Third Edition, 1996, pp. 28-38, Prentice Hall PTR, New Jersey. |
Windows DDK NDIS Object Identifiers, Nov. 19, 1999, 2 pages. |
Wood, A., et al., "NTDDNDIS.H," Microsoft Corporation, 1990, 26 Pages. |
Woodside, C.M., et al., "The Protocol Bypass Concept for High Speed OSI Data Transfer," Protocols for High-Speed Networks, II, 1991, pp. 107-122, Elsevier Science Publishers B.V. |
Zhang, L., et al., "RSVP: A New Resource ReSerVation Protocol," IEEE Network, Sep. 1993, pp. 8-18. |
Also Published As
Publication number | Publication date |
---|---|
US6246683B1 (en) | 2001-06-12 |
US6956853B1 (en) | 2005-10-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
USRE45070E1 (en) | Receive processing with network protocol bypass | |
US7461160B2 (en) | Obtaining a destination address so that a network interface device can write network data without headers directly into host memory | |
US8015303B2 (en) | High data rate stateful protocol processing | |
US7133902B2 (en) | Transmitting acknowledgements using direct memory access | |
US5752078A (en) | System for minimizing latency data reception and handling data packet error if detected while transferring data packet from adapter memory to host memory | |
US7631106B2 (en) | Prefetching of receive queue descriptors | |
US7142540B2 (en) | Method and apparatus for zero-copy receive buffer management | |
US7561573B2 (en) | Network adaptor, communication system and communication method | |
US9049218B2 (en) | Stateless fibre channel sequence acceleration for fibre channel traffic over Ethernet | |
EP1289221A2 (en) | Network communication method and system | |
US20050135395A1 (en) | Method and system for pre-pending layer 2 (L2) frame descriptors | |
US20060146814A1 (en) | Remote direct memory access segment generation by a network controller | |
US20060174058A1 (en) | Recirculation buffer for semantic processor | |
US8539112B2 (en) | TCP/IP offload device | |
US7539204B2 (en) | Data and context memory sharing | |
US6976149B1 (en) | Mapping technique for computing addresses in a memory of an intermediate network node | |
US7010548B2 (en) | Sparse and non-sparse data management method and system | |
US7213074B2 (en) | Method using receive and transmit protocol aware logic modules for confirming checksum values stored in network packet | |
US7596621B1 (en) | System and method for managing shared state using multiple programmed processors | |
CN110912969B (en) | High-speed file transmission source node, destination node device and system | |
US7532644B1 (en) | Method and system for associating multiple payload buffers with multidata message |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP, TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.;REEL/FRAME:037079/0001 Effective date: 20151027 |