WO2000060899A1 - Switching systems and process for automatic detection of and quality of service for multimedia applications - Google Patents

Switching systems and process for automatic detection of and quality of service for multimedia applications Download PDF

Info

Publication number
WO2000060899A1
WO2000060899A1 PCT/US2000/008949 US0008949W WO0060899A1 WO 2000060899 A1 WO2000060899 A1 WO 2000060899A1 US 0008949 W US0008949 W US 0008949W WO 0060899 A1 WO0060899 A1 WO 0060899A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
data packet
flow
packet
sequence
Prior art date
Application number
PCT/US2000/008949
Other languages
French (fr)
Inventor
Barry A. Spinney
Krishna Narayanaswamy
Original Assignee
Top Layer Networks, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Top Layer Networks, Inc. filed Critical Top Layer Networks, Inc.
Priority to EP00921677A priority Critical patent/EP1172017A1/en
Priority to JP2000610253A priority patent/JP2003524934A/en
Priority to AU41963/00A priority patent/AU4196300A/en
Publication of WO2000060899A1 publication Critical patent/WO2000060899A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems 
    • H04L12/56Packet switching systems
    • H04L12/5601Transfer mode dependent, e.g. ATM
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L49/00Packet switching elements
    • H04L49/10Packet switching elements characterised by the switching fabric construction
    • H04L49/104Asynchronous transfer mode [ATM] switching fabrics
    • H04L49/105ATM switching elements
    • H04L49/108ATM switching elements using shared central buffer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q11/00Selecting arrangements for multiplex systems
    • H04Q11/04Selecting arrangements for multiplex systems for time-division multiplexing
    • H04Q11/0428Integrated services digital network, i.e. systems for transmission of different types of digitised signals, e.g. speech, data, telecentral, television signals
    • H04Q11/0478Provisions for broadband connections
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems 
    • H04L12/56Packet switching systems
    • H04L12/5601Transfer mode dependent, e.g. ATM
    • H04L2012/5638Services, e.g. multimedia, GOS, QOS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems 
    • H04L12/56Packet switching systems
    • H04L12/5601Transfer mode dependent, e.g. ATM
    • H04L2012/5638Services, e.g. multimedia, GOS, QOS
    • H04L2012/5646Cell characteristics, e.g. loss, delay, jitter, sequence integrity
    • H04L2012/5651Priority, marking, classes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems 
    • H04L12/56Packet switching systems
    • H04L12/5601Transfer mode dependent, e.g. ATM
    • H04L2012/5638Services, e.g. multimedia, GOS, QOS
    • H04L2012/5665Interaction of ATM with other protocols
    • H04L2012/5667IP over ATM
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems 
    • H04L12/56Packet switching systems
    • H04L12/5601Transfer mode dependent, e.g. ATM
    • H04L2012/5678Traffic aspects, e.g. arbitration, load balancing, smoothing, buffer management
    • H04L2012/5681Buffer or queue management

Definitions

  • This invention relates generally to computer networks and more particularly to a switchable connection of Local Area Networks ("LANs”) such as those supported by the Ethernet protocol and Wide Area Networks ("WANs”) such as those supported by the Asynchronous Transfer Mode (“ATM”) protocol.
  • LANs Local Area Networks
  • WANs Wide Area Networks
  • ATM Asynchronous Transfer Mode
  • a problem with existing data communications switches is the inability to distinguish between different types of data flows.
  • a switch or node may become overloaded or congested with low-priority e-mail or file transfer traffic. This congestion of a switch may disrupt more time-sensitive traffic such as video or audio streaming, which is becoming more important with the advance of Internet telephony, video conferencing, and video on demand.
  • bridges connect different networks at the "data link” layer or Layer 2 of the OSI Network model, see Schwartz, Mischa,
  • Multimedia communication consists of a mix of audio, video and control signals transmitted between a sender and a receiver or a set of receivers.
  • the control functions include signaling for call setup, capability exchange, messages to open and describe the content of other logical channels that are used for audio and video.
  • Audio signals consist of digitized and compressed speech. There are different standards for digitizing and compressing speech signals based on tradeoffs between speech quality, bit rate, signal delay etc.
  • Video information passes through a codec that either fully encodes a frame or encodes only the difference between the current frame and the previous one. Video signals also optionally carry information for motion compensation that improves image quality. It should be noted that Data Conferencing, which includes applications like shared whiteboards, and application sharing are also considered to be multimedia communications .
  • Multimedia applications use both reliable and unreliable forms of communication over data networks. Specifically, control signals must be received in the order they are sent.
  • TCP Transmission Control Protocol
  • UDP User Datagram Protocol
  • RTCP Real Time Control Protocol
  • RTP Real Time Protocol
  • These protocols provide a thin shim over the TCP and UDP transport layers to support multimedia communications.
  • the RTP header consists of a timestamp and sequence number.
  • the receiving station (s) can thus eliminate duplicate packets, out of sequence packets, synchronize sound, video and data and achieve continuous playback.
  • the sender uses IP (Internet Protocol) Multicast instead of replicating the packets to each receiver.
  • IP Internet Protocol
  • the receivers join the IP multicast group that is exchanged in the control channel to receive the packets.
  • the H323 standard uses the RTP protocols for transport.
  • Layer 4 switches Network switching schemes that consider information above the network layer, so-called “Layer 4 switches,” are just coming on the market and appear typically to involve software implementations that are slow and only consider a portion of the Layer 4 or transport layer header (the "TCP" part of TCP/IP or transport control protocol/internetwork protocol) . It remains desirable to have a method and apparatus for adjusting quality of service received by a particular data stream so that multimedia data streams can be effectively processed.
  • the problems of handling multimedia data streams in data networks are solved by the present invention of an application-level data communications switch for automatic detection of and quality of service adjustment for multimedia streaming applications.
  • a data communication switch and process for automatically providing the appropriate quality of service (such as guaranteed bandwidth) for multimedia streaming applications such as video conferencing under the International Telecommunication Union (ITU) H.323 standard.
  • the switch examines and interprets the H.225 and H.245 setup messages to determine the characteristics of the subsequent G.7xx and H.26x audio and video streams, and automatically sets up entries in a flow table defining the quality of service, applying the appropriate priorities to these streams .
  • the present invention connects networks at the application layer, and uses more information above Layer 3 of the OSI model, than other network switches in the present state of the art.
  • the invention performs "flow switching" or connection, wherein, based on the information in a received data packet at Layer 4 and above, the invention identifies a "flow,” that is, a sequence of network messages that occur as a result of a requested process such as reading a file, sending an e-mail message, browsing a web site, initiating a file transfer, making a database query, etc., and routes the packet accordingly, thereby establishing a "virtual connection" at Layer 4 and above.
  • the invention is further adapted for "application flow switching, " wherein the invention classifies received frames into flows based not only on the Layer 2 MAC or Layer 3 network address, but also on the information contained in higher layers , even up to "Application" Layer 7 of the OSI model.
  • the invention can differentiate between flows that result from web browsing and flows that result from a file transfer or database query, even though both may use the same Layer 3 protocol.
  • the application flow switch of the present invention is a "stateful" switch in that it maintains the evolving states of the applications that are communicating through the switch.
  • the application flow switch detects new control connections that are set up between the sender and the receiver (s) .
  • the switch then adjusts the quality of service (QOS) that the particular application receives accordingly.
  • QOS quality of service
  • differentiation between flows is accomplished using a combination of hardware and software optimized for speed or for flexibility at their respective functions.
  • dedicated "silicon" or gates at the chip level are employed to extract rapidly information from the data link headers corresponding to the relatively few data link protocols such as Ethernet, Fast Ethernet, and Frame Relay, and from the network headers of the relatively few network protocols such as Internet (IPv4, IPX, IPv6) , SNA, and DECNet, while application protocols in up to 128 bytes of header information are recognized by fast pattern matching software.
  • the switch can make "intelligent" decisions about quality of service to be applied to a particular flow or stream of packets (such as e-mail, which is priority-based, as opposed to multimedia, which is bandwidth-guarantee-based) and can keep all connections while backing off of all applications fairly.
  • a particular flow or stream of packets such as e-mail, which is priority-based, as opposed to multimedia, which is bandwidth-guarantee-based
  • the switch By looking at the application header, the switch can make "intelligent" decisions about quality of service to be applied to a particular flow or stream of packets (such as e-mail, which is priority-based, as opposed to multimedia, which is bandwidth-guarantee-based) and can keep all connections while backing off of all applications fairly.
  • the invention very efficiently establishes a virtual connection between the appropriate ports associated with a given flow. This feature allows the system to be "frame or cell "-independent and to route ATM traffic as not heretofore done.
  • thousands of transmit queues are possible (
  • the "intelligence" of the system in tracking packets according to the flow allows "cut through” flow, that is, the output from a port of portions of a data packet stream even as portions of the data packet stream are entering a port.
  • Many other intelligent functions are possible because of the flexible and scalable architecture of the system using interface ASICs (application-specific integrated circuits) to "canonicalize" Layer 2 and 3 header information, a high speed bus, a queue manager ASIC which rapidly implements queuing decisions of a fast relay engine ASIC, and a background engine ASIC that monitors the flow connections .
  • interface ASICs application-specific integrated circuits
  • FIG. 1 is a block diagram of a preferred embodiment of the invention
  • FIG. 2 is a block diagram of the media interface ASIC (MOM) of the preferred embodiment of the invention.
  • MOM media interface ASIC
  • FIG. 3 is a block diagram of the queue manager ASIC (QM) of the preferred embodiment of the invention.
  • FIG. 4 is a block diagram of the relay engine ASIC (RE) of the preferred embodiment of the invention
  • FIG. 5 is a schematic diagram of the data flow of the preferred embodiment of the invention
  • FIG. 6 is a general flow diagram of the processes used in the preferred embodiment of the invention
  • FIG. 7A shows the data structure of a canonical header used in the preferred embodiment of the invention
  • FIG. 7B shows the data structure of a portion of the canonical header used in the preferred embodiment of the invention.
  • FIG. 7C shows the data structure and possible entries of another portion of the canonical header used in the preferred embodiment of the invention.
  • FIG. 7D shows the data structure and possible entries of another portion of the canonical header used in the preferred embodiment of the invention.
  • FIG. 8A shows the data structure of another portion of the canonical header used in the preferred embodiment of the invention
  • FIG. 8B shows the data structure and possible entries of another portion of the canonical header used in the preferred embodiment of the invention
  • FIG. 8C shows the data structure and possible entries of another portion of the canonical header used in the preferred embodiment of the invention.
  • FIG. 9 is a block diagram of the high-speed bus used in the preferred embodiment of the invention.
  • FIG. 10 shows the differential character of the bus lines of FIG. 9
  • FIG. 11 is a schematic of a transmit circuit used on the bus shown in FIG . 9 ;
  • FIG. 12 is a timing diagram of the transmit circuit of FIG. 11;
  • FIG. 12A is a composite timing of the transmit circuit of FIG. 11;
  • FIG. 13 is a schematic of a clock delay circuit used in transmission on the bus shown in FIG. 9;
  • FIG. 13A is a timing diagram of signals on the circuit shown in FIG. 13;
  • FIG. 14 is a detail of the circuit shown in FIG. 13;
  • FIG. 15 (Table 1) shows the possible values and meanings of a control bit used in the bus shown in FIG. 9;
  • FIG. 16 shows a sequence of control bits shown in FIG. 15;
  • FIG. 17 is a block diagram showing the token ring arbitration used between the interface chips shown in FIG. 1;
  • FIG. 18 shows a sequence of cell transmissions used in the preferred embodiment of the invention;
  • FIG. 19 shows a pointer-register structure used in the preferred embodiment of the invention.
  • FIG. 20A shows the data structure of a hash table entry used in the preferred embodiment of the invention
  • FIG. 2OB shows the data structure of another hash table entry used in the preferred embodiment of the invention.
  • FIG. 21 is a timing diagram for the control signals used on the bus shown in FIG . 9 ;
  • FIG. 22 shows possible values and meanings of control bits used on the bus shown in FIG. 9 ;
  • FIG. 23 shows as an example a sequence of control bits that may be seen on the bus shown in FIG. 9;
  • FIG. 24 shows diagrammatically the cell transmissions for possible cells transmitted on the bus shown in FIG. 9;
  • FIG. 25 shows the possible values and meanings for codes used on the bus shown in FIG. 9;
  • FIG. 26 shows the data structure of a field of the canonical header used in the preferred embodiment at different times
  • FIG. 27 shows details of the data structure of one of the subfields shown in FIG. 26;
  • FIG. 28 shows the data structure of a temporary "burst" header used in the preferred embodiment of the invention
  • FIG. 29 shows a set of linked descriptors mapped to a data packet used in the preferred embodiment
  • FIG. 29B shows a set of linked descriptors used in the preferred embodiment to describe an incomplete packet
  • FIG. 30 shows the linking of descriptors used in the preferred embodiment to establish virtual queues
  • FIG. 30B shows the linking to buffer descriptors of receive and transmit context tables used in the preferred embodiment to track data cells forming a packet
  • FIG. 31 is a representation of a credit-managed transmission system used in the preferred embodiment of the invention
  • FIG. 32 is a representation of a ring-pointer system used in the preferred embodiment of the invention to determine whether credits should be issued in the system represented in FIG. 31;
  • FIG. 33 is a more detailed representation of the system represented in FIG. 31;
  • FIG. 34 is a representation of a hierarchical queue system used in a preferred embodiment of the invention.
  • FIG. 35 shows the data structure of a transmit context table entry used in a preferred embodiment of the invention.
  • FIG. 35A shows the data structure of a field of the data structure shown in FIG. 35;
  • FIG. 35B shows the possible service policies encoded in the Q SVC Policy field of the data structure shown in FIG. 35;
  • FIG. 36 shows the data structure of the queue table used in the preferred embodiment
  • FIG. 37 represents possible links and queues in the transmission phase of the preferred embodiment
  • FIG. 38 shows the operation of the standby scheduler used in a preferred embodiment of the invention.
  • FIG. 39A represents a linked descriptor set representing a complete packet in memory in the preferred embodiment
  • FIG. 39B represents the delinking of the descriptor set shown in FIG. 39A to free the buffers described by the linked descriptor set shown in FIG. 39A;
  • FIG. 40 is a block diagram of a DRAM control system used in the preferred embodiment of the invention.
  • FIG. 41 is a diagram of flow information data structures 1100, 1102 located in the forwarding engine (FE) code and data DRAM 45 ( Figure 1), according to principles of the present invention
  • FIG. 42 is a flow chart of the control connection process in the application switch according to principles of the present invention
  • FIG. 43 is a flow chart of the video and voice connection data flow according to principles of the present invention.
  • FE forwarding engine
  • the architecture of the invention comprises application layer flow switching or connection performed by virtually allocating (by pointers to high speed data buffers) incoming data packets to one or more of a large number of virtual queues according to decisions made on the basis of information in the application header of the packets characterizing their membership in a particular flow.
  • the AppSwitchTM application flow switch makes decisions according to the initial packet (s) of the flow and matches a hashed version of the header information to identify subsequent packets of the flow.
  • the architecture is implemented in the BlazeFireTM chipset connected by the BlazeWireTM MAC Bus 60.
  • the architecture is centered around a 287k-gate Queue Manager (“QM”) ASIC 30 operating at 100 MHz which implements the queue-pointer scheme allowing 16,000,000 queues for pointers (24-bit definition) to locations in a high-speed data buffer 35 and 36 connected to the QM 30 in which incoming packets are temporarily stored.
  • QM Queue Manager
  • the queues are loaded based on decisions made by the 410k-gate Relay Engine (“RE") or Forwarding Engine (“FE”) ASIC 40 operating at 100 MHz which includes an Argonaut RISC (ARC) central processing unit 387 and a FIFO 394 for packet headers to be examined.
  • RE Relay Engine
  • FE Forwarding Engine
  • FIG. 2 is a block diagram of the MOM chip, for example MOM chip 10, used in the preferred embodiment of the invention. Generally, the diagram shows Mil interfaces 65 providing eight duplexed Ethernet ports.
  • the receive interfaces 11 and parsers 12 receive the data packets, rewrite the frame headers as the canonical headers described in
  • Section 2 and divide the resulting packets into 128- byte cells, which are placed in FIFO 15 by producers 13 and the FIFO arbiter 14, in round robin arbitration among the eight ports.
  • Data cells not bearing a canonical header (packet cells following the first cell of the packet) have a burst header added by burst logic 17 for internal tagging of the data.
  • RX Credit Manager 19 adds transmission credits (discussed in Section 8 below) to the headers as appropriate to inform QM 30 that the transmit FIFO 24 can accept more data to be transmitted.
  • a token arbiter 18 determines when the data is to be sent to the MAC Bus TX cell 76 to be transmitted on the MAC bus 60 to QM 30. Still referring to FIG. 2, data cells incoming on MAC Bus 60 are directed to the transmit consumers 26 and according to the circuit identifiers in their canonical/burst headers. The data packet headers are reconstructed and transmitted by the transmit consumers 26 and interfaces 27, and TX Credit Manager
  • FIG. 3 is a block diagram of the QM 30 used in the preferred embodiment of the invention.
  • QM 30 is a collection of gates and state machines designed to rapidly execute the placing of data cells on appropriate queues (implemented virtually by linked lists of pointers to data buffers) and to apply queue policies as directed by the RE 40.
  • the QM 30 is divided into three clock regimes.
  • the interface with the MAC bus 60 through Digital Delay Locked Loop 302 and Receive Interface 304, supplying Receive Data FIFO 306 and Receive Command FIFO 312, and through Digital Delay Locked Loop 301 and Transmit Interface 303 draining Transmit Data FIFO 305, is on the MAC bus clock. Data cells received are channeled directly through Dual RAMBUS® Access Cell 308 into the DRAMs 35 and 36 as discussed below.
  • Header In FIFO 310 contains canonical headers rewritten at the Relay engine Data Interface 313 with appropriate routing information
  • DRAM Command FIFO 311 contains the decisions of the RE as implemented by the QM logic shown in the network of functions under the SRAM clock domain.
  • Transmit Engine 316 and Header Prefetch Engine 324 direct the function of DRAM Arbiter 314 to provide instructions to the DRAM Interface 307 to move data in and out of DRAMs 35 and 36.
  • Receive Engine 315 and Transmit Engine 316 also coordinate with Free Buffer Manager 318 to allocate buffers in DRAMs 35 and 36 to incoming data.
  • EnQueue Manager 319 and DeQueue Manager 312 coordinate with Header Prefetch Engine and the Receive Queue State (head and tail of receive queue pointers, discussed in Section 5 below) 320, to determine, among other things, when cells containing canonical header data should be sent to the RE 40 for pattern-matching and the corresponding packets taken off the receive queue.
  • the Header Prefetch engine 324 coordinates with the Relay Engine Context 326 and the Instruction Dispatch Manager 327, which receives instructions from RE 40 via interface 75, Relay Engine Instruction Interface 329 and the Relay Engine Instruction FIFO 328.
  • Circuit Poller 317 polls the Transmit Engine 316 circuit by circuit to transmit cells and coordinates with the SRAM Arbiter 322, which through the SRAM Interface 323, accesses linked lists of buffer pointers ("descriptors") in SRAM 32 to track component cells of the packets as they are received and transmitted on one or more queues.
  • FIG. 4 is a block diagram of RE 40.
  • a primary function of the RE 40 is to examine canonicalized packet headers received at interface 74 from the QM 30 and to determine rapidly whether the packet belongs to a known flow and to provide instructions accordingly on interface 75 for appropriate scheduling (quality of service) .
  • a CPU Core 387 (implemented with the ARC processor) contains an instruction cache 386 and a data cache 385 and communicates with the Code and Data DRAM 42 through the DRAM Interface 384 (which also accepts instructions from the BE 50 over a low speed bus 62 and the DMA 383 at initialization) .
  • String Compare Coprocessor 389 is used to aid the pattern recognition used to match a packet and flow.
  • a canonicalized packet header entering the RE 40 is pre-processed by the Hash Preprocessor 399 in parallel with being MUXed into Data FIFO 394 by MUXIn 394.
  • the results of the parallel hashing are placed in Hash FIFO 393 and compared by the Hash Lookup Engine 392 with contents of the on-board Ll Cache of the Hash Table (of known hashes of header information associated with particular flow characteristics) 391. If no match is found in the Ll Cache 391, the Hash Lookup Engine 392 will look to the entire Hash Table stored in Lookup SRAM 45, accessed through SRAM Interface and Arbitrator 388.
  • Trie Search Coprocessor 390 is used to find the proper flow parameters in situations (discussed below) where the fast pattern matching is not appropriate or fails. With the flow parameters determined, an appropriate instruction is issued by CPU 387 into the Instruction FIFO 395 and processed by Instruction Push 396 multiplexed with any data from Data FIFO 394 by MUXOut 397 across interface 75 into the QM 30.
  • FIG. 5 shows a general schematic of the operation of the preferred embodiment of the invention from the queue management point of view.
  • Data on MOM Receive Ports 15' are directed into the QM Main Receive FIFO 330.
  • Also enqueued are data from WAN (Tl and POTS) port receive queues 69' processed under protocols 66' and under the direction of DAD Management 66" into a DAD Ethernet transmit queue 348' to appear on a MOM receive port 348.
  • WAN Tl and POTS
  • Data cells in the Receive FIFO 330 are placed in the main system packet memory DRAMs 35 and 36 while the canonical headers are forwarded in a FIFO 394 to the QM 30 where FastPathTM processes are applied to enable appropriate queuing of packets on per flow, per priority and per port queues 332 (static priority, as discussed below) and 333 (weighted robin priority, as discussed below) to be transmitted to the MOM Transmit Ports 24' (or the DAD 66 to be distributed on circuit queues 350 for further distribution to Tl and POTS Port Transmit Queues 69") for transmission.
  • FastPathTM processes are applied to enable appropriate queuing of packets on per flow, per priority and per port queues 332 (static priority, as discussed below) and 333 (weighted robin priority, as discussed below) to be transmitted to the MOM Transmit Ports 24' (or the DAD 66 to be distributed on circuit queues 350 for further distribution to Tl and POTS Port Transmit Queues 69
  • Fine tuning of scheduling may be achieved using Quality of Service Scheduling Process 336 relative to per flow queuing using Scheduled Queues 335 as "intermediate" queues.
  • a Management Queue 337 is also provided with a Management Operations Process 338 operating on weighted round robin queues 333.
  • a Monitor Queue 334 is also provided for network monitoring information to be transmitted over Mils 24'.
  • data placed on the MOM Port Transmit Queue 339 is transmitted over Mil (100 Mbit Ethernet) link 64 into the BE Receive Queue 341.
  • the Background Engine Main Forwarding Process 342 passes information into the BE Transmit Low Priority Queue 346 or the Management Queue 343 which is serviced by Management Operations Process 344 to develop data (including instructions) to be placed on BE Transmit High Priority Queue 345. Both BE Transmit Queues are drained into the MOM Port Receive Queue 347 via link 64 to be placed on the QM Receive Queue 330.
  • FIG. 6 is a generalized flow diagram for the process of the invention. It is to be understood that the processes occur simultaneously along various points in the diagram for different cells. Because the preferred embodiment of the invention divides often lengthy incoming Ethernet frames into cells for subsequent reassembly, it is important in the embodiment to characterize the cells relative to the packet from which it originated.
  • a received cell may be a "start of packet” (“SOP") a “middle of packet” (“MOP”), an “end of packet” (“EOP”), or include a single packet as a “start and end of packet” (“SEP”).
  • SOP start of packet
  • MOP middle of packet
  • EOP end of packet
  • SEP start and end of packet
  • a packet is received at an Mil and is split at operation 352 into cells by MOM 10 or 20 (referring to FIG. 1) which also adds canonical headers (and possibly burst headers) .
  • the cells in MOM Transmit buffers are arbitrated on the MAC bus in operation 353 and stored in DRAM for later transmission in operation 354, which also includes the development of a procedure to associate the cells with the original packets, such as the link-list of virtual packets used in the preferred embodiment of the invention. If the cell is an SOP, a decision 355 is made to send the cell to a pattern matching procedure wherein the cell is hashed 356 and then matched 357 against known hash results associated with previously identified flows.
  • an appropriate header is written 354 to appropriately schedule and route the packet.
  • the scheduling is done by assignment of the packet to a queue associated with a specified quality of service and a particular circuit.
  • a cell on a queue is transmitted 360 at the appropriate time, the process possibly including a rewriting of the headers . If the transmitted cell was an EOP, the packet is dequeued 361 from the circuit and if there are no other requirements for transmission of the packet (no more owners 362), the data buffer is released 363. This process may be further generalized and implemented in a diverse ways.
  • the inventive network switch Upon receiving a data packet on a physical link, the inventive network switch takes the Layers 2 and 3 headers of incoming packets (dropping any Layer 1 packet preamble) and converts it to canonical form.
  • the invention further breaks variable-length packets into "cells" of a maximum convenient length for communication on the high-speed internal bus. This allows data packets of different lengths with different Layer 2 and 3 header formats, such as Ethernet "frames" or ATM "cells,” to be routed by the same switching process and apparatus.
  • the "canonicalization" of the header also aligns the header along 4-byte boundaries that are convenient for processing.
  • the example here is for Ethernet frames, but is applicable to ATM cells with appropriate modification in the terminology and the interface ASIC. Referring to FIG.
  • a frame of information is received by the MOM 1 chip 10 via one of the eight ports shown.
  • the physical link Layer 1 processing is handled in the preferred embodiment by dual "off-the-shelf" Quad PHY integrated circuits (such as available from Lucent Technologies), each handling the transmit/ receive electronics of 10-Base-T (10 Mbit/sec) or 100-Base-TX (100 Mbit/sec) Ethernet.
  • One of the ports e.g., from MOM 2
  • FIG. 18 schematically illustrates the organization of a typical packet format.
  • the headers are followed by the data itself 625, and, occasionally, there is a trailer 626, which usually is superfluous and not used.
  • the MOM 1 chip preprogrammed in hardware in the preferred embodiment to recognize a variety of Ethernet protocols, drops the preamble and trailer, reads the Layers 2 and 3 headers from the received frame, and generates a canonical header of twenty-eight bytes, FIG. 7A. Having a buffer capacity of 256 bytes per port, the MOM 1 segments the frame data into cells of 128 bytes each (other cell lengths may be used in other embodiments) . Immediately adjoining the canonical header, Layer 3
  • the Layer 3 header always starts at a multiple of four bytes from the start of the cell because the canonical header is 28 bytes. Important fields within the Layer 3 header are aligned at four-byte boundaries generally. This makes the processing of these fields very efficient for 32-bit processor/memory architectures .
  • the canonical header is placed at the beginning of the first cell of each frame or packet received and is used by the RE 40 to route or bridge the packet.
  • the MOM When a packet in the form of a stream of cells is sent to the MOM for transmission, the MOM reconstructs the appropriate headers, preambles and trailers according to the destination and protocol information in the transmit canonical header and begins transmitting the reconstructed packet on the line connected to the designated port.
  • FIG. 7A shows the organization and content of the canonical header in a preferred embodiment.
  • the first two bytes 430 hold the circuit identification of the circuit on which the data packet was received, Byte 432, DL Info, provides information about the Data Link (Layer 2) header from the original received header.
  • FIG. 7B shows the specific assignments to these bits. Bit 7 indicates whether the received frame was VLAN (virtual local area network) tagged on reception. On transmission, if this bit is set, the outgoing packet is encapsulated with a VLAN header by the MOM chip handling the transmission. It should be noted, however, that packets received with VLAN tags are not necessarily sent out with VLAN tags and vice-versa.
  • Bits 6 and 5 of FIG. 7B indicate how CRCs (cyclical redundancy checks) are to be handled.
  • FIG. 7C is self- explanatory. Of note is that when the outgoing frame is different from the received frame, then a new CRC must be generated, but if the original frame is simply forwarded, then the CRC may not change, hence there is need to retain the old CRC or generate another CRC. Bits 4 and 3 are unused and left as zeros.
  • FIG. 7D shows the encoding for bits 2, 1, and 0 which identify the data link packet format.
  • the canonical header NL Info field 434 contains network layer information.
  • FIG. 8A shows the meaning of the eight bits in the NL Info.
  • bit 7 true indicates that the destination address (DA) of the received information is the address of the bridge group associated with the circuit on which the packet was received;
  • bit 6 true indicates that the DA is the system's address for the port;
  • bit 5 true indicates that the DA is an address that has been pre-configured by the invention as a "well-known address,” such as one associated with a network control protocol. On transmission this bit is ignored. On transmission, if bits 7 and 6 are set, the appropriate source address is put on the SA field.
  • Bits 4-0 identify the Layer 3 protocol of the packet.
  • FIG. 8B identifies those protocols preprogrammed into the invention. These can be extended as new protocols are developed and need to be handled efficiently by the system.
  • the Time Stamp four bytes 138 contain the time at which the packet will expire.
  • the QM 30 enters the time that the packet will expire when it receives the canonical header as part of the first cell of a packet.
  • the QM 30 upon transmitting a packet will check if the current time is greater than the time stamp value in the canonical header. If so, the data link device is directed to not transmit the packet and count it instead.
  • this field contains cell information described in the "Data Flow In" section below.
  • the two-byte receive circuit identification (Rx Ckt Id) identifies the circuit on which the packet is received.
  • the QM copies the receive circuit identification from the Ckt Id field 430 first supplied by MOM 1 before overwriting the Ckt Id field 430 with the circuit identification of the circuit on which the data is retransmitted.
  • the receive circuit identification is thus retained for later use (such as for management and RMON functions by the BE 50) .
  • DA is a 48-bit Layer 2 (MAC) destination address of the received packet .
  • SA is a 48-bit Layer 2 (MAC) source address of the received packet .
  • VLAN tag is a two-byte field to accommodate a packet received with an Ethernet 802.1Q tag.
  • the VLAN tag bit in the DL Info field is also set, as described above.
  • the MOM chip handling the transmission of this packet will tag the outgoing packet .
  • P-Type/len is a two-byte field containing the protocol type/length field. In this preferred embodiment, if the value is greater than 1500 (decimal) , this field represents a protocol, and if the value is less than or equal to 1500, this field represents a length. Protocol is captured in the Protocol Kind subfield of the NL Info field. If the protocol is not so configured, the Protocol Kind subfield of the NL Info field would indicate Unknown (0) and the P-Type/len field would have the value. For example, if the packet was in the Ethernet 802.3 format, this field would contain the length which could be used for validity checks with length in the Layer 3 header . The XX bytes may have other information based on the packet format of the received packet. FIG. 8C shows the contents of the XX bytes for the different DL format types. 3. BlazeWireTM High Speed MAC Bus
  • the received frame reorganized into one or more cells, the first cell containing the canonical header and higher layer headers, is communicated to and from the QM on a high speed MAC bus called BlazeWireTM.
  • BlazeWireTM is a full-duplex, clocked bus of ten signals and a clock signal each way between two large integrated circuit chips.
  • the clocking protocol allows data transmission on the bus to be self-fra ing, asynchronous and non-aliasing. All the signals are differential signals between two conductor runs with the inherent transmission lines properly terminated.
  • the electrical characteristics of the differential drivers and receivers are as substantially described in the low voltage differential standard (LVDS) ANSI/TIA/EIA-644.
  • the differential signal voltage is about two hundred and fifty millivolts (250 v) , and the cable terminations and physical signal paths are arranged and designed to accommodate high speed operations over the bus.
  • the bus is organized as a chain running from one large chip (MOM or QM) to another.
  • MOM large chip
  • QM QM
  • a separate daisy chain token passing scheme is implemented as discussed below to control the access of the chips to the bus.
  • the electronic design of the bus compensates for the practical variations inherent in different production runs of chips from possibly different manufacturers, supply voltage variations, and temperature variations .
  • the speed of the bus can run upwards to the gigaHertz range.
  • the ten signals are composed of eight data, one parity, and one control.
  • the data are placed on the lines on both the rising and falling edges of the clock signal. Since the data is placed on the signal lines at the clock transitions, the signals should be read at the receiving end at or very near the center of the clock signal. This allows any overshoots and any other signal delays or other anomalies to settle. Since the data is loaded onto the signal lines at both clock signal transitions, it is critical to have a symmetrical clock with minimum skew between the clock edges and the data being placed on the bus.
  • the present circuitry provides a feedback mechanism for monitoring and finding the center of both phases of the clock signal, and furthermore to provide a symmetrical clock for the signals being sent out on the continuation of the bus through the chip .
  • FIG. 9 diagrammatically shows the basic signal flows between two sub-systems represented as MOM 1 and MOM 2 with twenty signal lines, a group of ten each way, and a clock with each group.
  • FIG. 10 shows the differential character of each of the twenty-two lines. Differential drivers and receivers as known in the art are properly terminating the transmission lines in their characteristic impedance to maximize signal fidelity and minimize ringing. Other termination schemes such as schemes implemented on the drive side may be used to advantage in other embodiments .
  • FIG. 11 is a schematic of the circuitry by which one of the ten data bits is output from one of the MOMs . The circuitry is essentially duplicated for the other data bits. This circuit implementation maximizes clock symmetry and minimizes skew.
  • the A data 462 is to be placed on the output 466 followed by the B data 464.
  • the A data is latched in the flop 468 and presented to the logic array.
  • the prior B data has remained in the latch 472 and is input to the logic array 460.
  • the logic array is arranged to load a signal into the latch 474 which provides, when it is "exclusive or'ed” with the signal that remained in latch 476, the A signal at the output of the gate 466.
  • FIG. 12 is a simplified timing diagram of the above.
  • FIG. 12A shows a composite timing chart of the bus clock and the ten data lines on the bus between MOMs 1 and 2.
  • FIG. 12A shows the transferring of eight consecutive bytes (plus parity and control) on each edge of the clock signal.
  • FIG. 13 shows the MOM's circuitry which is used to provide a delayed clock with an edge at the center of one phase of the received clock. Another similar circuit is used to provide a delayed clock with an edge at the center of the other phase of the received clock. These centered clocks are used to latch the data into the receive MOM and will be the basis for the symmetrical clock used to send out signals from the MOM.
  • the received clock 80 becomes the data input to the latch 482 and latch 484.
  • a delayed clock DLYA (a delay version of the input clock) latches the clock signal 480 into the latch 482 whose output is SAMPLE CLK A
  • a delayed clock DLYB latches the clock signal 480 into the latch 484 with an output SAMPLE CLK B.
  • the DLYA and DLYB are delayed by the control logic by a programmable amount . Both of these SAMPLE CLKs are fed back to a control logic array 90 through circuitry designed to synchronize the signals.
  • the control logic can program when the DLYA occurs. In this way, the DLYA might latch the clock 480 signal when it is low which the control logic can determine by the SAMPLE CLK A signal.
  • the control logic continues to set different delays until the clock 480 signal goes high.
  • the control logic continues to set different delays until the clock signal goes back low. As before, the control logic determines this condition from monitoring the SAMPLE CLK A signal. With reference to FIG. 13A, once the control logic has found the first rising edge 480' and the falling edge 480" of the clock signal 480, the control logic "knows” and can set the DLYA rising edge 486 at the center of the positive phase of the clock 480. This DLYA rising signal will be, effectively, the rising edge 486' used to latch data on the next successive positive phase of the clock 480. During the time that the centering of the DLYA signal, the actual data being received at the time 486, FIG. 13A, is latched by the DLYB, FIG.
  • FIG. 13 shows the DLYC rising edge 489 precisely at the center of the negative phase of the received clock.
  • the DLYC clock is being centered during one negative phase of the clock 480 while the other (DLYD not shown) is latching data, and the DLYD will be centered while the DLYC clock latches data.
  • FIG. 14 shows parts of the delay circuitry.
  • the IN signal 494 is delayed by one gate 495 and input to the "and" gate 496.
  • control 1 signal is a logic one
  • the signal traverses 96 and is output via the "or" structure 498 and becomes the output signal delayed by the three gate delays -- 495, 496, and 498. This delay is considered as a one unit delay.
  • control 1 signal is a logic "0” and control 2 signal is a logic "1”
  • the IN signal travels through gates 495 , 495', 496', 498' and 498. This path is longer by two gates, and the IN signal is considered to have gone through two single unit delay circuits. Each single delay unit adds two gate delays.
  • control logic allows the IN signal to reach the three gates 500, and the control X signal is a logic one, the IN signal will go through an incremental of four gates -- the three gates 500 and the gate 504 (gate 502 being the common path duplicated in each delay circuit and disabled in prior delay circuits) .
  • This circuit adds four gate delays and forms a two unit delay.
  • a four-unit delay (not shown) will replace the three gates 500 with seven gates, therefore adding an increment of eight gate delays or four unit delays .
  • the arrangement in this preferred embodiment allows an arithmetic-like progression of delays up to a total of 128 unit delays which may be selected.
  • FIG. 15 (Table 1) is a table indicating the use of the control bit in this preferred embodiment. The bit is used for framing purposes. In the timing diagram of FIG. 12A, eight bytes are transferred on each clock transition marked by eO- e7. Table 1 shows the value of the control bit for the even numbers transitions, eO, e2 , e4, and e6.
  • the combinations indicate the allowable functions shown in the right most column. If the control bit is zero in each of the even transitions, the bus is idling. Any of the combinations shown in rows 510 signal that the data on the data lines is a valid frame. In particular, since the value at the e6 time is always zero and the value at eO time is always one for a valid frame of data, the system looks for a zero to one time sequence of the control bit. The one is assumed at eO, and if the combinations shown in rows 510 exists, the framing of the data shows a valid set of eight bytes .
  • the values of rows 510 are selected to ensure that no aliasing of valid frames of eight data bytes can occur.
  • the valid control bit sequence combinations -- the rows 510, in FIG. 15 -- will always have a zero then a one, with no other zero/one patterns in a valid frame.
  • FIG. 16 shows that the pattern of control bit values at the even clock transition shows frame 512 as invalid since there is another zero/one at e2 and e4 for that frame 512.
  • the frame 514 is valid as is frame 516.
  • the value of the control bit is measured at each receive clock phase and a zero to one transition separated by a clock phase is monitored. When such a transition occurs, the one is treated as being in the eO time slot and the monitoring of frame validity is based on that relative timing.
  • a token ring arbitration path 61 is shown between MOM 1 and MOM 2.
  • the token ring is a looped signal where a chip has the token when there is a logic difference between the incoming token signal and the outgoing token signal.
  • FIG. 17 there is no net inversion within the chips, so there is an inverter in the path so that at initialization one chip, in this case MOM 1, will be guaranteed to have the token and be in control of the bus.
  • the MOM 1 chip 10 can store or buffer up to two cells or 256 bytes of received data for each of the eight ports. As described in the "Header Canonicalization" section above, the MOM chip reads the Layer 2 and 3 headers from the received frame or packet and generates an initial canonical header of twenty-eight bytes (described further in this section) , followed by the network Layer 3 header and the application layer header in the first cell processed.
  • the MOM 10 (or 20) transmits the cell on the high-speed MAC bus 60 to the QM 30 when the MOM holds the token of the token ring arbitration path described above. Between the eight ports of a MOM, arbitration is round robin.
  • the QM receives the cell and stores the cell in dynamic RAMs 35 and 36, in this preferred embodiment a RAMBUS® DRAM having two banks of DRAMs rapidly accessed as described in Section 9 below.
  • Information describing a received, stored cell is placed in SRAM 32 and is called "descriptors.”
  • the canonical header is modified to include the Time Stamp.
  • the modified canonical header and the rest of the header information in the first cell of the packet is placed in a Header Out FIFO 309 for transfer to the RE 40.
  • subsequent cells of a packet received on a circuit may be interleaved with cells of other packets received on other circuits.
  • the MOM writes an eight-byte (octbyte) "burst" header added to subsequent cells of the same packet (making up to 17 octbytes) , corresponding to the first octbyte of the initial canonical header of the first cell of the packet. Additional information is sent on the control signal line or bit of the high-speed MAC bus that allows identification of the boundaries of the cell and the type of information contained in the cell.
  • control bit 700 over eight consecutive clock phases frames eight bytes and distinguishes the data.
  • the value of the control bit is shown as eO through e7 in the table FIG. 22.
  • the even control bits, eO, e2 , e4 , and e6 are encoded as follows: eO is always a one and e6 is always a zero to indicate that a valid group of eight bytes is received. To prevent aliasing of this encoding, the only values indicating a valid group are (for the even control bits, eO through e6) : 1000; 1100; and 1110. The bit e2 indicates the start of a cell, and e4 indicates the start of a packet.
  • FIG. 23 shows a possible sequence of the even control bits: group 702 is not a valid group, while groups 704, 708 and 710 are valid. The circled zero/one 708 indicates that the only possible beginning to a valid group must have a zero followed directly by a one, and there cannot be another zero/one in the next two bits (e2 and e4) .
  • the odd control bits are encoded as follows: el indicates a transmission credit (see discussion below) exists, e3 (code bit 0) and e5 (code bit 1) form a two-bit end code, and e7 (short word) indicates an octbyte containing fewer than eight meaningful bytes.
  • the short word can be used at the start of a cell or at the end of a cell.
  • FIG. 24 is a chart of several packet types that may be encountered.
  • the first cell 720 of the packet may have up to sixteen octbytes, or 128 bytes.
  • the even control bits 722 for the first 32-bit word (octbyte) is 1110. As shown in FIG. 22, this code means that this octbyte is part of a valid first cell of a packet.
  • eO equal to "1" is required for a valid cell; e2 equal to "1” means this eight-byte transfer is the start of a cell, e4 equal to "1” means it is the start of a packet, and e6 must be zero for a valid cell.
  • the odd control bits are all zeros except for bit e5 of the last eight-byte transfer, which is a "1".
  • FIG. 25 shows the encoding of the control bits el, e3 , e5, and e7 -- the odd control bits.
  • e5 is a "1”
  • e3 is a "0” which decodes into "end of packet.”
  • cell 720 is a one-cell packet (SEP) . It should be noted that this cell need not be a full 128 bytes long.
  • Cell 724 is a valid starting cell of a packet, and here e3 of the odd control bits 726 is set meaning "end of cell” but not "end of packet”; thus, it is an SOP cell.
  • the next cell 728 is the second cell of a packet (MOP) , and all the cells following an SOP cell will have up to seventeen octbytes, including an octbyte burst header 330 added to the beginning of each cell.
  • the last octbyte e3 is set meaning this cell is the end of a cell, but not the end of the packet.
  • the cell 734 has e5 set in the last eight byte group, meaning that this cell is the end of the packet (EOP), and in this instance, e7 is also set.
  • the bit e7 means that the last group of eight was not filled and was a "short word" (as so labeled in FIG. 25) , and when this happens, the last byte 338 contains the number of valid bytes in the last eight byte group. For example, if there were only three valid bytes in the last group, the last byte (concurrent with the e7 control bit), would contain 0011, or decimal three .
  • the first octbyte at the start of the first cell contains a portion of the canonical header that is modified by the QM to include the Time Stamp.
  • the entire canonical header is stored in the DRAM with the other headers and such frame data as may fit in the remainder of the 128 bytes.
  • FIG. 26 shows the transformation of the first octbyte of the canonical header by the QM.
  • the initial four bytes 740 written by the MOM, the Ckt Id, DL Info and NL Info are carried forward by the QM.
  • the second four bytes 742, including cell information, is overwritten by the QM with the Time Stamp 748.
  • the canonical header is sent to the RE, which deals only with packet policy and is unconcerned with cell information.
  • the first byte 744 of the cell information bytes 742 contains the number of transmission credits being reported from the QM (described in the "Transmission Credit Scheme” section below) .
  • the second byte contains credit flags, bit 7 being a SYNCH flag (for initialization) and bit 6 a "parent” flag (described in Section 8 below) .
  • the third byte provides cell information whose meanings are shown in FIG. 27. The bit meanings are: bit 7 indicates cell error; bit 6 packet time out; bit 5 a packet from the bad packet queue; bit 4 from the monitor queue; and bits 3-0 are selected bits from the control described above.
  • Bit 3 is the packet end bit
  • bit 2 is the start of packet bit
  • bit 1 is the data cell bit
  • bit zero is the transmit credit bit.
  • the last byte in the cell information bytes 742 provides the cell length in number of bytes .
  • the octbyte-long burst header used to track cells without canonical headers is shown in FIG. 28. Its fields are identical to those of the first octbyte of the initial canonical header except that DL Info and NL Info (used by the RE which only sees the SOP) is replaced by the cell sequence number 752 and unused space.
  • the Ckt Id 750 is used to match the cell (or more specifically, its proxy, the buffer descriptor) with preceding cells having the same Ckt Id, which should have sequential sequence numbers (unless a cell has been discarded) .
  • the burst header is no longer needed and is dropped. (A cell may be discarded if parity information detects an error. In such cases, at this time the cell and finally the packet is aborted by signaling the MOM chip.)
  • a new burst header is created for the cell by the QM in the transmit phase, where the CKT ID shows where the packet is being sent . 5.
  • Data cells received on the MAC bus by the QM are individually stored in the RAMBUS® DRAMs according to the fast-access operation described in Section 9 below, in addressable 128-byte data buffers, with the canonical header intact but rewritten to include the Time Stamp, and with the burst header octbyte dropped. Address 00000 does not contain cell information and corresponds to a null-pointer.
  • All data cells received on the MAC bus and stored in data buffers are organized in a single virtual receive queue using a descriptor/pointer scheme that is used for all but a handful of specialized queues for exceptions.
  • the scheme allows a receive queue corresponding to up to 1 Gbytes of data.
  • data buffer "descriptors" in the QM SRAM comprising two 4-byte words, are surrogates for the actual data stored in the buffers and are linked to form logical packets.
  • a descriptor assigned to a data buffer with data has a field in the first word indicating the address of the buffer in the DRAM in which the associated cell is stored and a field in the second word containing a pointer to another descriptor 802 in the SRAM associated with the next cell of the same packet.
  • a complete multi-cell packet is described by a descriptor "link-list, " with the second word of the SOP buffer descriptor 801 pointing to the MOP buffer descriptor 802, the second word of descriptor 802 pointing to EOP buffer descriptor 803 and the second word of descriptor 803, associated with the last cell of the packet, containing a pointer pointing to descriptor 801, associated with the first cell of the packet.
  • an incomplete packet has a null pointer in the second word of descriptor 805.
  • Queues are formed in the invention by a queue head pointer pointing to the first word of the descriptor associated with the first cell of the first packet in the queue and with a field in that first word pointing to the first word of the descriptor associated with the first cell of the next packet in the queue, and so linked reiteratively until the last packet in the queue, which has a queue tail pointer pointing to it, as shown in FIG. 30 with the receive queue head pointer pointing to the designator 812 associated with the first cell of the first packet in the queue and tail 811 pointing to the designator 815 associated with the first cell of the last packet of the receive queue (the descriptors each map to a 128-byte buffer in DRAMs 35 or 36) .
  • the queued packets are not necessarily complete, but in this packet-oriented implementation, data cells received from the MAC bus are "added" to the packet to which it is identified by Rev Ckt Id in the burst header, rather than at the end of the queue .
  • the QM Descriptor SRAM is organized into a buffer descriptor table and a receive context (or circuit) table.
  • the buffer table or list has descriptors containing two 4-byte words, with word 0 containing a buffer address of a data buffer in the RAMBUS® DRAM (hence the buffer table entry is an implicit buffer) , and word 1 containing a pointer to another descriptor in the buffer table.
  • the buffer table is a "free buffer table" the designator of the first free buffer to which the QM hardware by a head pointer points and the second word of which points to the next free buffer descriptor, and so reiterated in a link until the last free buffer designator which contains a null terminator in its second word.
  • the QM extracts its circuit id from its canonical or burst header and checks for an entry in the receive context (circuit) table which yields information on the activity of that circuit.
  • receive context circuit
  • an entry on the receive context table (8 bytes/circuit) is created and a pointer (current buffer) is entered pointing to the next free buffer designator.
  • the cell data is written into the associated RAMBUS® DRAM buffer.
  • the free buffer list pointer is moved to the next free buffer designator after the "current buffer" is allocated.
  • the second word in the buffer designator points to the next free buffer designator, preallocating the associated buffer, and a "0" is written in the second word of that next buffer entry.
  • the second word in the buffer descriptor is set to point to the first buffer descriptor for the packet, and the resulting link-list defining the packet is de-linked from the receive context table.
  • the cells received with the same circuit id which may be interleaved on the MAC bus, are thus virtually reorganized by link-lists into packets, some of which may be incomplete even when leading cells are transmitted in cut-through operation.
  • the current buffer of the receive context table 820 points to the next buffer descriptor 833 corresponding to the buffer into which the data cell is to be loaded, and the buffer descriptor 833 is linked to the descriptors 832, 822, and 821 of the other cells of the packet, one of which, descriptor 832, is linked as the current buffer 821 of a circuit entry in the transmit context table.
  • the RE operation centers around a four-stage pipeline. Pipelining is a term of art used for many years, especially in high speed hardware designs, and will not be further discussed herein except incidentally.
  • the RE's task is to determine how to best forward a frame flow and to provide forwarding information accordingly to the QM to route and schedule retransmission of stored packets.
  • the four stages are briefly described here, followed by a more detailed description of the hashing and signature functions used to perform pattern matching to identify a flow.
  • the first stage stores the full header information (the entire SOP cell) in a "circular" data FIFO, in parallel as the header is processed by a hash engine to compute a hash and a signature value to perform a pattern-matching function to check whether the packet is part of an existing flow for which routing and scheduling information has already been developed.
  • the second stage receives the Hash value which is used to address a Hash Table Ll 391. If a valid entry is found in this table, the signature from the Ll Table is compared to the computed signature of the Hashed data. If consistent, then a Flow Tag (not shown) from the Hash Table is presented to the next stage of the pipelined FE/RE hardware design together with an indication that a valid hit was found.
  • the Flow Tag is a 24-bit index into a table in memory where information about the flow is stored. This information will include the circuit or circuits on which to forward the packet along with other flow related information as described elsewhere herein.
  • a valid Flow Tag pointer (linking the contents pointed to) is the preferred result of the pattern matching functions described in this preferred embodiment
  • the search is performed on the off-chip L2 Table 45. Signatures are compared as above and the Flow Tag from the L2 table is presented to the next stage. To facilitate the next search, the L2 entry is written into the Ll table .
  • the third stage receives the above information and determines if the header look-up was successful. If successful, the header data is updated according to the protocol rules that apply and the packet is forwarded according to the flow information. If, however, the header is found to be a TCP (Layer 4 Transport Control Protocol) SYN packet, or an equivalent start of connection packet in another protocol, or if the frame is not part of a known connection flow, the packet is not forwarded according to the flow information. In these instances the RE acts to route the frame by decoding the full pre-hashed header. In the process, it creates useful flow information and inserts a tag that points to it in the L2 Hash Table using the hash and signature values obtained by the hardware in stage one.
  • TCP Layer 4 Transport Control Protocol
  • the header is passed back to the QM to be queued for transmitting on the specified queue according to the information supplied by the Flow Tag or the routing information supplied by the RE's decoding of the full pre- hashed header.
  • the RE examines the application layer data in addition to the Layer 2 and Layer 3 headers .
  • the QM 30 provides a useful header (as determined from the NL field) which may be as long as 128 bytes to the FE/RE by loading that header data onto a dual ported circular buffer in the RE.
  • the header data is sent from the QM 100 to the MUXIn 102 and placed on a FIFO stack DF in the RE 40.
  • the RE uses the network link byte to index into a previously stored ordered data array of 128-bit entries, where each bit corresponds to one of the full received header data bytes.
  • the bytes that correspond to the bits with a one are extracted and processed by the hash and signature functions.
  • the byte string is padded at the end with zeroes to provide a string that is an even multiple of four bytes.
  • up to 64 of the 128 header bytes can be processed by the hash/signature operation, but fewer or more can be used to advantage in other preferred embodiments .
  • the hash and the signature functions are identical except that different multipliers are used. But, in other preferred embodiment, other combinations of different multipliers and different divisors may be used to advantage.
  • the Hash Preprocessor 399 inputs the selected bytes from the 128 bytes of the header data.
  • the selected bytes form a number (n) of 32-bit words (multiples of 4 bytes, as noted above) .
  • the bits in this sequence of 32 bit words are treated as a polynomial in the Galois Field, GF[2] -- a Galois Field of 2 (Galois Field is known in the art) .
  • the polynomial is multiplied by a random 32-bit polynomial, and then divided by a carefully chosen polynomial of order 32 resulting in a 32-bit remainder.
  • the divisor used above is selected to be both irreducible and primitive (irreducible and primitive are terms known in the art) .
  • a subset of the remainder bits are used as the actual index into the hash table.
  • Bits 5 down to 0 are addresses directed into the on- chip Ll cache 391.
  • Bits 16 to 1 are used to address the 64K locations in the off-chip L2 RAM 45.
  • the divisor used in this preferred embodiment is x 32 +x 7 +x 5 4-x 3 + ⁇ +x+l , although others may be used provided they are both irreducible and primitive.
  • Hash Table 1 contains 64 words each of 64 bits, and it exists on chip to optimize the return of the value in the common occurrence where only a small number of flows are active. Larger tables can be used.
  • bits 31-24 form a status where bit 31 being true indicates a valid entry.
  • Bits 0-23 form a 24-bit Flow Tag where information about the particular flow is stored. The tag is a pointer to information about the circuit or circuits to which the packet will be forwarded. Obtaining the Flow Tag is the primary task of the RE.
  • the Hash table also contains the 32-bit signature at bits 63-32, which is used to ensure that no collision has occurred and the result is valid. In order to further ensure the validity of the Flow Tag look up, the pre-hashed header data is stored so that unambiguous identification may be performed.
  • Bit 30 is a Hash Bucket pointer wherein, if this bit is a zero, the bits in L2 table are organized functionally as in the Ll table. If there is one valid entry at this Hash Address, the system takes L2 bits 0-23 to be an index into a flow table to obtain a flow tag. See FIG. 2OB. If there are no valid entries at this Hash Address, L2 bit 31, the Valid Bit, is set to a zero. If there are two or more entries at this hash address, then status word bit 30 is set to a one and the system takes the L2 bits 55-36 as a pointer to the Hash Bucket .
  • the Hash Bucket holds up to eight aliased addresses of 64-bit words. If the collision bit 29 is a one, an aliased condition persists for both the hash and the signature operations and no further resolution will be performed by the hash mechanism, as no useful information can be obtained. At this point the two conflicting flows are handed back to the processor to perform a Trie search for routing information. The eight words in the Hash Bucket are searched sequentially, and to facilitate this search the addresses are sequential starting at the lowest index into the table. If more than eight entries are directed to the Hash Bucket, the system reverts and the overflow are searched via the Trie routine.
  • the Trie search uses a co-processor 390 and is organized as a large Trie database for routing and bridging. The occurrence of signature and/or hash collisions can be monitored, and if excessive, the respective multipliers can be changed. Such changing results in a better randomization for the given set of addresses encountered in the network.
  • the hashing and signature routine results are not used in certain circumstances: when a connection is initiated, as when a TCP SYN or an equivalent "start of connection" packet arrives, or when a packet is found that does not belong to a connection flow, or the packet is part of a high security or other special mode. When such conditions are found the system can revert to the Trie search.
  • the RE returns information with instructions indicating which queue the cells are to be placed for forwarding along with the addressing.
  • the QM receives the information and places the cells, which are stored in linked lists forming the contents of the packet which is being or was received, on a list to be transmitted. 7. Transmission Scheduling
  • the core of the transmission phase is the Transmit Context Table, which is organized by circuit, four four-byte words for each circuit as shown in FIG. 35.
  • Word 0 contains a credit sync bit, seven bits 812 for transmit credits (no transmission unless a credit exists for the circuit) , a start of packet bit 814, and 23 bits designating the next buffer to transmit (next buffer ID) .
  • Word 1 816 contains eight flag bits 818.
  • Bit 7 indicates that the packet is a single buffer; bit 6 indicates that the packet is bad, usually from a CRC error, and that the MOM should abort this packet; bit 5 indicates that the packet was dequeued from the monitor queue wherein the packet can be off loaded at some other port or to the background engine for traffic analysis; bit 4 indicates that the packet is "multi- owned" or may be transmitted to more than one circuit; bits 3- 0 indicate the buffer length in bytes up to 128 bytes in groups of sixteen bytes.
  • the remaining 24 bits of Word 1 contain the address of the first queue (each circuit may have 1, 2, 4, 8, or 16 associated queues) .
  • Word 2 820 in the transmit context table contains one bit 822 that indicates that a monitor queue is attached, four bits that indicate the queue service policy, and three bits that indicate a reference count.
  • FIG. 35B shows the meanings of the four queue service policy bits. The possible designations are: one queue; two, four, eight or sixteen static queues; two, four, or eight weighted round robin queues; or two, four, eight and sixteen one-half static and one-half weighted round robin queues. As described below, the static queues have the highest priority, followed by the weighted round robin queues.
  • Word 3 contains the stand-by scheduler control word, which consists of "next cct Id, " "parent cct Id” (used only for stand-by scheduler circuits), a state bit (active or idle) and a stand-by scheduler interval .
  • the Queue Table shown at FIG. 36 which coordinates with the Transmit Context Table, contains four four-byte words for each queue.
  • Word 0 contains a 2-byte standby circuit ID (discussed below) and two bytes of queue summary bits (only in every sixteenth queue number) .
  • Word 1 contains two bytes indicating the queue size and a 2-byte overflow counter ID.
  • Word 2 contains a five-bit field indicating the number of standby queues and 24 bits for the head-of-queue pointer.
  • Word 3 contains a 24-bit tail-of-queue pointer.
  • a queue is formed by linking the SOP cells starting with a head-of-queue pointer to the first SOP (and a tail pointer to the last SOP) , and new cells of a packet are added to the cell of the packet.
  • SOPs there are four SOPs in queue 16 of Queue Table 850, represented by linked descriptors 863, and two SOPs or "packets" in queue 17 represented by linked descriptors 864.
  • Incomplete packets such as that represented by linked descriptors 862 may nonetheless be transmitted (allowing "cut-through” ) , but transmission will stop on the circuit when the last descriptor indicates that its associated buffer is empty, thereby preserving the rule that packet order is preserved on a circuit.
  • the queue policy allows prioritizing and scheduling of transmission of data packets. Thus, under a fixed static priority, all the packets on a particular queue are transmitted before those on another. In a weighted round robin scheme, a certain number of packets on one queue are transmitted, then a certain number of packets on the next queue are transmitted, and so forth, this allows classes (queues) of traffic to have relative priorities without "starving" the lower priority classes.
  • a “half-and-half" scheme is provided in which the static queues have priority, and when they are served.
  • a Schedule Table for the circuits in use is scanned continuously. As shown in FIG. 37, this is composed of a Primary Schedule Table with a Primary Schedule Table A 865 and a Primary Schedule Table B 866 and a Secondary Schedule Table 870.
  • the Primary Schedule Table is located on-chip and consists of the two mentioned subtables, each with 64 entries. Slots in Primary Schedule Table A are visited once every Schedule Table time "tick."
  • a Primary Table A entry contains a 6-bit index to an entry in Primary Schedule Table B. As shown in FIG. 37, any given Table B entry may have more than one Table A entry pointing to it.
  • Primary Table B entries contain the size of the secondary table, and if the size is not equal to "0", then it also contains an offset into the secondary table 867 and the base address of the secondary table 868.
  • the remaining fields are the "Use Parent Circuit” bit 871, the Parent Circuit ID 872 and the Circuit ID 873.
  • a cell transmission event is triggered when a schedule table entry with a Circuit ID is found. By entering the appropriate Circuit Ids in the Schedule Table, a cell transmission ordering pattern is created which effectively allocates bandwidth to circuits according to their respective proportion of transmission events.
  • the hierarchical nature of the Schedule Table allows a wide range of rates to be programmed. This is done by "chaining" up to 3 levels of subtables. If the size field of a Primary Table B entry is not zero, this entry contains a pointer to a Secondary Table which is located off-chip.
  • Secondary Table 870 may have up to 255 entries, each of which may point to a Tertiary Table or may contain a Circuit ID.
  • the offset field 867 is used to keep track of which entry is to be accessed in the lower-level table. At each visitation, the offset is incremented, modulo the table size.
  • the Stand-by Scheduler is a secondary scheduling mechanism. As its name implies, it schedules traffic for bandwidth left over from the Schedule Table. There are 2 cases where stand-by traffic can be transmitted: (1) a transmit event resulted in no data sent for a circuit (lack of credits or lack of data); and (2) the Circuit ID programmed in the Schedule Table is zero, thereby pre-allocating a certain amount of bandwidth to stand-by traffic.
  • the SBS uses a version of the Calendar Queue algorithm, essentially a slotted time ring implemented as an array of linked lists. Each element of the array corresponds to a different time slot. Attached to each time slot is a list of circuits which are scheduled to send a cell at this time. A slot index advances with time. When a populated slot is found, a cell for the circuit at the head of the list at that slot can be transmitted. When a cell is transmitted for a particular circuit, the eligibility time for the next cell on that circuit is calculated and mapped to another time slot.
  • the Stand By Scheduler Calendar Table 878 is an on-chip table consisting of 64 entries. Each entry contains a head and tail index to describe a linked list of circuits attached to a particular slot.
  • the links are stored in the Next CCtld field of word 3 in the Transmit Context Table 860.
  • the slot index 877 advances with periods corresponding to the QM core clock.
  • the next circuit to transmit is found by scanning forward from the point in time represented by the current value of the slot index.
  • the next circuit to send is the one at the head of the list for the next populated slot. Once the next circuit is found, it is dequeued from the list and rescheduled. Rescheduling is performed by calculating the next slot at which the circuit should be sent.
  • the calculation of the next slot is based on the SBS Interval field of Word 3 in the Transmit Context Table. This field is a 6-bit number representing the number of Calendar Table slots between successive transmission events for the circuit.
  • the next slot for a circuit is the current slot plus this interval, modulo the table size.
  • the net effect of the SBS is an approximation of the Weighted Fair Queueing algorithm.
  • the weight of a given circuit is the inverse of its SBS Interval.
  • Stand-by Scheduler Another aspect of the Stand-by Scheduler is its ability to perform dynamic bandwidth allocation based on only the circuits which are "active," i.e., have data to send. Thousands of circuits may be enabled for stand-by bandwidth.
  • the SBS keeps only active circuits in the scheduler. It receives messages from the process managing the Queue Table when a circuit becomes active or goes idle. The transition from active to idle occurs when a packet is dequeued resulting in all queues for the circuit becoming empty. The transition from idle to active occurs when a packet is enqueued to a circuit which has all empty queues . Any circuit may be scheduled using both the Schedule Table and the SBS simultaneously. This is useful for ATM Available Bit Rate ( "ABR" ) traffic .
  • ABR ATM Available Bit Rate
  • the "sending" in the preferred embodiment starts with the delinking of a packet string (which may be incomplete) from its queue ( “dequeueing” ) and its linking to the current buffer of the Transmit Context Table 860 (as shown in FIG. 37) .
  • the circuit entries of the Transmit Context Table are then polled to send the buffer contents of the current buffer (if not empty) to the corresponding "circuit" 63'.
  • Cell data is read from the RAMBUS® DRAMs according to the "ping-pong" scheme described below.
  • descriptor 880 of the SOP increments the free counter 890 by the buffer count 891 in the second word of descriptor 890. It moves the free buffer list head pointer 895 from the head of the free buffer list 896 to the descriptor to which descriptor 880 points, namely descriptor
  • a hierarchical flow and congestion control scheme is provided by the use of multiple credit loops.
  • a system of credits is established that indicates the ability of the MOM chip, for each of the eight output channels, to accept cells for transmission.
  • the MOM for a particular channel is sending a packet, cell by cell, and as each cell is sent the MOM indicates, through the credit bits described above, that another cell can be transferred to the MOM chip. As shown in FIG.
  • the MOM upon sending out a cell will increment the credit count 760, and as the QM transfers cells 762 to the MOM, the QM decrements the credit count 764.
  • the credits have a circuit ID such that the proper MOM channel credit is retained. In this preferred embodiment, as many as four transmit cells can be stored.
  • the MOM has a FIFO in which the packet is reassembled from the cells.
  • FIG. 32 which is duplicated for each output channel associated with the MOM chips, diagrammatically shows the mechanism by which the credits are processed in the MOM chip.
  • the FIFO is empty, and the virtual tail is incremented, moving it through the FIFO locations.
  • the virtual tail pointer stops when it reaches or attempts to reach the head pointer.
  • Each time the virtual tail pointer increments a single credit is sent via the transmit and receive credit managers in the MOM chip. These credits are accumulated in the QM for this circuit.
  • the tail pointer (this pointer points to real information representing actual cell lengths) is incremented. If the QM sends less than a full cell, the virtual tail pointer is corrected. When the MOM actually transmits the cells the head pointer is incremented.
  • the head pointer moves away from the virtual and the real tail pointers, opening up room in the FIFO.
  • the virtual tail pointer which might have been corrected by the QM sending less than maximum cells, can increment a maximum cell length in the transmit FIFO, without wrapping the head pointer, a credit is sent and established in the QM.
  • the other remaining pointer, the start of packet pointer 776, has one important function. That function is to retain the starting location of the start of the packet, so that if there is a collision on an Ethernet cable, the packet that was collided with can be retransmitted, in accordance with the published specification.
  • the virtual tail pointers are controlled by the transmit credit manager and the real tail pointers are controlled by the transmit FIFO "producer, " and the "consumer” controls the header and the start of packet pointers. All the pointers are accessible to all the transmit credit manager for comparison and for issuing credits .
  • FIG. 33 indicates how the MOM FIFO, a two-port, 64- octbyte memory, is controlled.
  • An arbiter 780 controls the most significant three address bits of the FIFO from the "producer" side to keep track of the cells loaded from the QM, and the lower six bits, the total of nine bits needed to address the 512 locations, are controlled by the tail pointer 782 (one shown of eight) .
  • the virtual tail pointer 784 does not point to real data; it is a counter mechanism by which the credit manager can determine the number of credits to send to the QM.
  • Another arbiter 786 and head pointers (one shown of eight) control the unloading and freeing up of the FIFO as packets are physically sent out by the MOM chip.
  • the head pointer 788 controls the lower six bits of the FIFO from the unloading side of the FIFO. The consumer increments the head pointer as the data is sent out.
  • the head, tail and start of header pointers are available to the transmit credit circuitry.
  • a portion 742 of the first octbyte of the initial canonical header and, referring to FIG. 27, the burst header contain two credit flags, the "synch" flag and the "parent” flag.
  • the synch flag is used at power up to properly establish the credit cycle operation described above.
  • the MOM sends synch flags to the QM about every 10 milliseconds.
  • the QM looks for the synch flag, and when found the QM sends a synch acknowledge to the MOM. The MOM then will send up any credits as described above with the assurance that the QM is ready to accept the credits.
  • FIG. 34 shows two FIFO channels in a MOM chip.
  • FIFO 800 operates with a single communications path.
  • the MOM FIFO 800 is termed a leaf to indicate its operation with a single communications circuit.
  • FIFO 802 is associated with a FIFO channel that is connected to another chip, for example, a DAD chip 804 in this preferred embodiment, where the DAD is further connected to eight other communication circuits 804.
  • the FIFO 802 is termed a "parent" and the eight communications circuits connected to the DAD are the leaves.
  • the QM maintains a credit for the individual leaves attached to the parent FIFO in the MOM. In this way the QM knows when the transmit FIFOs are filled and can accept no further cells. The QM can subsequently transfer cells to the other leaf by simply polling the credits in the parent and the leaves and transmit cells accordingly. In this manner one leaf cannot prevent the servicing of the other leaves.
  • the Schedule Table 866 in the QM there is an indication 871 whether there is a parent associated with that particular circuit.
  • the MOM acting as a parent, sends up credits for the parent FIFO and for each of the leaves associated with that parent.
  • the Parent Credit Table 875 is a 64-entry on-chip table in the QM. Each entry contains a credit count for what is treated as a "parent circuit." When a circuit is bound to a parent circuit, it can only transmit cells onto the MAC bus if it has credits available in both its Transmit Context Table credit field and in its parents credit field in the Parent Credit Table.
  • both the Transmit Context Table credits and the associated parent credits are decremented.
  • Parent credit update cells from the parent channels are sent back to the QM which causes the parent credits to be incremented.
  • the Schedule Table is used to bind a circuit to a given parent circuit.
  • the Use Parent Circuit Bit (P) 871 and the Parent Circuit ID field 872 are used for this purpose. If the schedule table entry has the P bit set, this means that this circuit has a parent and should use the Parent Circuit ID 872 to index the Parent Credit Table 875.
  • P Use Parent Circuit Bit
  • URAMs 35 and 36 are off-the-shelf items. In the present invention they are used in a unique manner that maximizes the reading and writing bandwidth of the RAMBUS® for this data communication application.
  • the invention provides an interface 308 to the RAMBUS® which utilizes the dual bank organization of a RAMBUS® to increase the useful bandwidth of the RAMBUS® memory.
  • Dual FIFO stacks are used with a controller to alternately address the separate DRAM banks within the RAMBUS®.
  • the FIFOs increase the latency and increase the hardware overhead of the RAMBUS® controlling electronics, but attempts to guarantee that the sequential data written or read comes from the alternate banks. In this manner, one bank is precharging while the other is being accessed, and then the other bank is precharging while the first bank is accessed. Referring to FIG.
  • a RAMBUS® 900 is shown in block form showing the phase-locked loop, PLL, and the two dynamic RAM banks DRAM 1 and 2 (36, 37 respectively) .
  • the multiplexed data/address bus into and out of the RAMBUS® is essentially an eight-bit wide serial port with an accompanying clock.
  • the organization of data buffers in DRAMs 35 and 36 is such that all even data buffers (of 128 bytes) are on one bank and all odd data buffers are on the other.
  • the arbiter 902 determines the order in which various requests for data are loaded onto FIFO stacks 904 and 906.
  • the buffer addresses in the requests are either even or odd, and the requests with even buffers are loaded into FIFO 904 and the odd buffers into FIFO 906.
  • the requests are loaded into the even or odd FIFO and the interleaver 908 transfers the request to the controller 910.
  • the interleaver 908 takes the requests alternately from one FIFO and then the other ("ping-ponging") . Since these buffer addresses are alternately even and then odd, the controller accesses the two different banks in the RAMBUS® in an alternate or interleaved manner. In this operation, the first bank is being accessed while the second bank is being precharged, and, on the next access, the second bank will be accessed while the first bank is being precharged.
  • This alternative accessing substantially provides the fastest accessing for either writing or reading of the RAMBUS® and maximizes the throughput of the RAMBUS® memory as long as there are requests in both FIFO stacks, which is likely in high traffic situations.
  • requests presented on a purely FIFO basis likely will have a fractional number with back-to-back even or back-to-back odd requests causing a fractional number of time-outs to allow precharging.
  • An important part of the invention is the use of the BE, interfaced on a MOM port during operation to perform monitoring and other higher-layer decision making. This allows for the BlazeWatchTM and Learn-and-Lock security systems to access configuration and control functions, among other applications .
  • a Boot FLASH ROM 51 is provided that is accessible to BE 50 for initialization and start up of the system.
  • the boot ROM instructions will run when there is a power up or a complete system reset.
  • the boot will test and verify that the section of the BE DRAM 53 is operational and reliable. This section is where the ISB code and the BlazeNet Runtime Kernel (BeRT) will reside.
  • the first IF (hex) or 32 (decimal) addresses of ROM 51 hold the initial interrupt vectors.
  • the remaining BE DRAM 53 will be tested in parallel with running the BeRT initialization process.
  • the boot also tests the interrupt structure and operation to insure that the BARK (the background engine kernel) can receive interrupts, for example, from timers.
  • the boot will initialize the I2C bus 62 and assign addresses to the chips attached to the I2C bus .
  • the boot determines the ID of chips on the bus, including revision level.
  • the boot looks up the ID of the chips found, and an initializer is found in the boot directory which is downloaded and executed.
  • the main system image is in the Nonvolatile Storage 52 in a compact flash card containing, for example 10 Mbytes of system software.
  • Basic information is transferred on the I2C bus to the RE 40 and MOMs 10 and 20.
  • the complete image is subsequently transferred on the DMA channel 64.
  • Multimedia applications use both reliable and unreliable forms of communication over data networks. Control signals must be received in the order in which they are sent and cannot be lost. Hence, control signals require a reliable form of communication. Audio and video data are usually carried over unreliable best-effort delivery protocols such as UDP.
  • the Real Time Protocol standard consists of two protocols, Real Time Control Protocol (RTCP) that runs above TCP, and Real Time Protocol (RTP) that runs above UDP. These protocols provide a thin shim over the TCP and UDP transport layers to support multimedia communications. For example, the RTP header consists of a timestamp and sequence number.
  • the receiving station (s) can thus eliminate duplicate packets, out of sequence packets, synchronize sound, video, and data and achieve continuous playback.
  • the sender uses IP Multicast instead of replicating the packets to each receiver. The receivers join the IP multicast group that is exchanged in the control channel to receive packets.
  • the H.323 standard generally uses the RTP protocols for transport.
  • Multimedia applications require quality of service policies such as guaranteed bandwidth and weighted priority to ensure timely delivery of packets. Having sufficient bandwidth for multimedia applications is critical to application integrity but is difficult to achieve in large data networks. In addition, the multimedia data has to contend with all the other data packets from non-real time applications that easily congest internetworking switches.
  • Figure 41 is a diagram of flow information data structures 1100, 1102 located in the forwarding engine (FE) code and data DRAM 45 ( Figure 1) , and a portion of an application policy record 1110, also located in the forwarding engine code and data DRAM 45.
  • Each flow has two flow information data structures 1100, 1102.
  • a first flow information data structure 1100 is for the sender to receiver flow direction.
  • a second flow information data structure 1102 is for the receiver to sender flow direction.
  • the flow information data structures 1100, 1102 have a plurality of fields.
  • a prehash data field 1115 holds information extracted from a data packet before hashing takes place. The data extracted is that which is used in the flow identification process.
  • the flow handler field 1120 is a pointer to a software routine that completes any additional processing required for a flow of a given type.
  • the flow queue instructions field 1125 contains the instruction for placing the flow on a particular queue and the number of the particular queue is stored in the flow queue number field 1130.
  • the flow byte and packet counter field 1135 holds the byte and packets counts for the flow.
  • the reverse flow data field 1137 links the two flow information data structures 1100, 1102 together.
  • the reverse flow data field of the sender/receiver flow information data structure 1100 has a pointer to the receiver/sender flow information data structure 1102 and vice versa.
  • the application data field 1140 holds a pointer that points to the application policy record 1110.
  • the application data field 1140 of both the flow information data structures points to the same policy record, however, they may each point to different policy records in alternative embodiments of the invention.
  • the flow maintenance data field 1145 contains software overhead that keeps the data structures consistent within the switch.
  • the application policy record 1110 holds handling data and parameters for each type of flow that may come through the switch.
  • the portion of the application policy record shown in Figure 41 has ten fields, a multimedia application ID 1150, a control policy ID 1155, a sender IP address 1160, a receiver IP address 1165, a voice-sender port number field 1170, a voice-receiver port number field 1175, a video-sender port number field 1180, a video-receiver port number field 1185, a voice policy ID 1190, and a video policy ID 1195.
  • the application switch watches for new control connections that are set up between a sender and one or more receivers.
  • An example of a set up standard that may be used is the ITU H.245 protocol for multimedia data.
  • the switch creates a new flow record for each direction of the flow (sender to receiver and receiver to sender) 1100, 1102.
  • the flow records are linked together at the reverse flow data fields 1137.
  • the switch eavesdrops on the exchange between the source and destination establishing the connection between them.
  • the information about the source and destination and the exchange is stored in the application data fields 1140 of the flow records 1100, 1102.
  • the application switch When the sender indicates the addresses (UDP port numbers) for the audio and video channels in the control channel, the application switch stores this information in the flow record 1100, 1102, looks up the policy that is configured for this application and prepares for the subsequent portions of the transaction by creating new lookup records for the connection set-up handler for switching the audio and video data that will follow.
  • the application switch would obtain the IP Multicast group for the audio/video data from the control connection and set up a single flow record that would be used when the packets from the application arrives. Instead of a flow queue number in the record, it has a list of queues, one for each receiver. It would then instruct the queue manager to queue the packet to each one of the queues. This together with the multicast transmission capability of the queue manager would eliminate any need for making a separate copy of the packet for each receiver.
  • Figure 42 is a flow chart of the control connection process in the application switch. The receive process in the application switch dispatches the packets received from the queue manager to different handlers that forward the packets by instructing the queue manager to place them on specific outgoing queues.
  • the handlers are: the connection setup handler, the multimedia control connection handler, and the policy handler for the multimedia data.
  • the switch dispatches these packets to the connection setup handler, block 1205.
  • the first packet is the one that indicates the opening of the control connection between the sender and the receiver.
  • the connection setup handler identifies this packet by matching the destination port number field of the TCP header to a well known port number that is assigned by the IETF, block 1210.
  • the connection setup handler creates two new flow records, block 1220, -- one for the flow between the sender and the receiver and the other for the flow between the receiver and the sender. It assigns the multimedia control connection handler to these two new flows and programs the relay engine hash table with the flow tags for the flow records that were created, block 1220. All subsequent packets that are received from both the sender and receiver are now dispatched to the multimedia control connection handler, block 1225. This handler eavesdrops into the packets and stores information from them into the application data field of the flow record.
  • the multimedia control connection handler stores the information locally and consults the policy database to find the policy that is configured for the voice and video data, blocks 1230, 1235. It then creates new entries in the transport lookup table that is used by the connection setup handler indicating the policy to be used when the voice and video connections are initiated, block 1240.
  • Figure 43 is a flow chart of the video and voice connection data flow.
  • connection setup handler Since the connection setup handler has been primed by the multimedia control connection handler, it finds the policy that is to be applied to these new flows, block 1305. It then creates a flow record, assigns the policy handler based on the policy that is configured for the application and programs the hash table with the flow tag for the flow record, block 1310. Subsequently, when the voice and video connection packets arrive, the receive process directly dispatches them to the policy handler which forward the packet, block 1315. All the flows remain active until an end-of-flow indication is received when the flow records are torn down and hash table entries are removed, blocks 1320, 1325.

Abstract

In a data communication switch, process and apparatus for automatically applying the appropriate quality of service for multimedia streaming applications. This switch examines and interprets multimedia setup messages to determine the characteristics of the subsequent audio and video streams, and automatically sets up entries in the flow table that will apply the appropriate priorities to these streams.

Description

SWITCHING SYSTEMS AND PROCESS FOR AUTOMATIC DETECTION OF AND QUALITY OF SERVICE FOR MULTIMEDIA APPLICATIONS
CROSS-REFERENCE TO RELATED APPLICATIONS This application claims priority of U.S. application Serial No. 09/285,617, entitled, "Application-Level Data Communication Switching System and Process for Automatic Detection of and Quality of Service Adjustment for Multimedia Streaming Applications," filed April 3, 1999 and assigned to the present applicant.
This application is a continuation-in-part of U.S. patent application Serial No. 09/058,448 entitled, "System and Process for Application-Level Flow Connection of Data
Processing Networks" filed April 10, 1998, and of U.S. patent application Serial No. 09/060,575 entitled "System and Process for Flexible Queuing of Data Packets in Network Switching" filed April 15, 1998, assigned to a common entity assigned to a common entity which has been renamed.
This application is being filed with application for United States Patent for "Application-level Data Communication Switching System and Process for Automatic Detection of and Quality of Service Adjustment for Bulk Data Transfers" by Barry Spinney and Krishna Narayanaswa y, filed on the same date and assigned to a common entity.
This application is also related to U.S. patent application Serial No. 09/058,629 entitled, "High-speed Data Bus for Network Switching" filed April 10, 1998, and U.S. patent application Serial No. 09/058,597 entitled, "System and Process for High-speed Pattern Matching for Application-level Switching of Data Packets" filed April 10, 1998.
FIELD OF THE INVENTION This invention relates generally to computer networks and more particularly to a switchable connection of Local Area Networks ("LANs") such as those supported by the Ethernet protocol and Wide Area Networks ("WANs") such as those supported by the Asynchronous Transfer Mode ("ATM") protocol. BACKGROUND OF THE INVENTION
A problem with existing data communications switches is the inability to distinguish between different types of data flows. Thus, a switch or node may become overloaded or congested with low-priority e-mail or file transfer traffic. This congestion of a switch may disrupt more time-sensitive traffic such as video or audio streaming, which is becoming more important with the advance of Internet telephony, video conferencing, and video on demand.
One of the major problems in the field of connecting networks is that the variety of different network protocols used to communicate between different data processing systems on particular networks makes communication between such networks difficult. Another major problem is that most network protocols require considerable configuration of parameters when adding computer systems or nodes, typically accomplished by manual input of device addresses by network professionals who nonetheless make mistakes. This problem may be exacerbated when connecting across network boundaries.
Current connection of networks, including the mechanisms used to connect the Internet, is accomplished using devices known as "bridges" and "routers." Roughly speaking, bridges connect different networks at the "data link" layer or Layer 2 of the OSI Network model, see Schwartz, Mischa,
Telecommunication Networks at 75-99 (Addison-Wesley 1987), and routers connect different networks at the "network" layer or Layer 3 of the OSI model, wherein a packet of data is preceded by headers corresponding to layers of communication, with the first in time header corresponding to the lowest Layer 1, the physical link, and proceeding up to Layer 7, the application layer (other models have fewer layers and the "application layer" may refer and here refers to functions at Layers 5-7 of the OSI model) . When packets of information are received at a bridge, the bridge processor forwards the packet on a data link according to the information in the data link header (following the physical link header) . When packets of information are received at a router, the packet is routed according to the information in the network header. These headers, however, do not contain information about the quality of service required by the application to which the data packet pertains ; thus , each packet is forwarded according to the data link or network protocol which may or may not include a priority flag, typically for network management operations.
The types of applications requiring data transmission on current networks call for a wide range of service. Thus, in communications with a file server, requests uploaded from a client for downloading of data require relatively little bandwidth, while downloading of massive amounts of data requires great bandwidth to be accomplished in a reasonable time. Streaming of audio-visual ("multimedia") information requires guaranteed bandwidth at regular intervals to avoid perceivable interruptions or "jitter". E-mail, file server requests, HTTP, word processing each have their own application protocols with associated header information that can be associated with their communication needs, including bandwidth. Multimedia communication consists of a mix of audio, video and control signals transmitted between a sender and a receiver or a set of receivers. The control functions include signaling for call setup, capability exchange, messages to open and describe the content of other logical channels that are used for audio and video. Audio signals consist of digitized and compressed speech. There are different standards for digitizing and compressing speech signals based on tradeoffs between speech quality, bit rate, signal delay etc. Video information passes through a codec that either fully encodes a frame or encodes only the difference between the current frame and the previous one. Video signals also optionally carry information for motion compensation that improves image quality. It should be noted that Data Conferencing, which includes applications like shared whiteboards, and application sharing are also considered to be multimedia communications .
There are several protocols that are used for multimedia communications over data networks. Some of them, like the International Telecommunication Union (ITU) H.323 Series Standard specify all the aspects of multimedia communication. The standards specified are used for the generating the control, audio and video signals. Other standards, like the IETF (Internet Engineering Task Force) Real Time Protocol (RTP) specify a transport mechanism for carrying control/audio/video data.
Multimedia applications use both reliable and unreliable forms of communication over data networks. Specifically, control signals must be received in the order they are sent.
In addition, control signals cannot be lost, and hence require a reliable form of communication. In order to provide the needed reliability, generally TCP (Transmission Control Protocol) is used. TCP guarantees sequenced, error-free, flow controlled transmission of packets. The audio and video data are usually carried over unreliable best effort delivery protocol like UDP (User Datagram Protocol) . The Real Time Protocol standard consists of two protocols - Real Time Control Protocol (RTCP) that runs above TCP, and the Real Time Protocol (RTP) that runs above UDP. These protocols provide a thin shim over the TCP and UDP transport layers to support multimedia communications. For example, the RTP header consists of a timestamp and sequence number. The receiving station (s) can thus eliminate duplicate packets, out of sequence packets, synchronize sound, video and data and achieve continuous playback. When there are multiple receivers the sender uses IP (Internet Protocol) Multicast instead of replicating the packets to each receiver. The receivers join the IP multicast group that is exchanged in the control channel to receive the packets. The H323 standard uses the RTP protocols for transport.
Network switching schemes that consider information above the network layer, so-called "Layer 4 switches," are just coming on the market and appear typically to involve software implementations that are slow and only consider a portion of the Layer 4 or transport layer header (the "TCP" part of TCP/IP or transport control protocol/internetwork protocol) . It remains desirable to have a method and apparatus for adjusting quality of service received by a particular data stream so that multimedia data streams can be effectively processed.
It is an object of the present invention to provide a method and apparatus to for scheduling multimedia data streams with guaranteed bandwidth at regular intervals .
SUMMARY OF THE INVENTION
The problems of handling multimedia data streams in data networks are solved by the present invention of an application-level data communications switch for automatic detection of and quality of service adjustment for multimedia streaming applications.
In the present invention, a data communication switch and process is provided for automatically providing the appropriate quality of service (such as guaranteed bandwidth) for multimedia streaming applications such as video conferencing under the International Telecommunication Union (ITU) H.323 standard. The switch examines and interprets the H.225 and H.245 setup messages to determine the characteristics of the subsequent G.7xx and H.26x audio and video streams, and automatically sets up entries in a flow table defining the quality of service, applying the appropriate priorities to these streams .
The present invention connects networks at the application layer, and uses more information above Layer 3 of the OSI model, than other network switches in the present state of the art. The invention performs "flow switching" or connection, wherein, based on the information in a received data packet at Layer 4 and above, the invention identifies a "flow," that is, a sequence of network messages that occur as a result of a requested process such as reading a file, sending an e-mail message, browsing a web site, initiating a file transfer, making a database query, etc., and routes the packet accordingly, thereby establishing a "virtual connection" at Layer 4 and above. The invention is further adapted for "application flow switching, " wherein the invention classifies received frames into flows based not only on the Layer 2 MAC or Layer 3 network address, but also on the information contained in higher layers , even up to "Application" Layer 7 of the OSI model. Thus, the invention can differentiate between flows that result from web browsing and flows that result from a file transfer or database query, even though both may use the same Layer 3 protocol.
The application flow switch of the present invention is a "stateful" switch in that it maintains the evolving states of the applications that are communicating through the switch. For multimedia applications, the application flow switch detects new control connections that are set up between the sender and the receiver (s) . The switch then adjusts the quality of service (QOS) that the particular application receives accordingly.
In the preferred embodiment, differentiation between flows is accomplished using a combination of hardware and software optimized for speed or for flexibility at their respective functions. Thus, dedicated "silicon" or gates at the chip level are employed to extract rapidly information from the data link headers corresponding to the relatively few data link protocols such as Ethernet, Fast Ethernet, and Frame Relay, and from the network headers of the relatively few network protocols such as Internet (IPv4, IPX, IPv6) , SNA, and DECNet, while application protocols in up to 128 bytes of header information are recognized by fast pattern matching software. By looking at the application header, the switch can make "intelligent" decisions about quality of service to be applied to a particular flow or stream of packets (such as e-mail, which is priority-based, as opposed to multimedia, which is bandwidth-guarantee-based) and can keep all connections while backing off of all applications fairly. By using internally standard or "canonical" headers including data link and network information deduced or inferred at the port interfaces, and comparing hashed versions of the canonical headers to identify the packets to flows with common flow rules, the invention very efficiently establishes a virtual connection between the appropriate ports associated with a given flow. This feature allows the system to be "frame or cell "-independent and to route ATM traffic as not heretofore done. In the preferred embodiment, thousands of transmit queues are possible (pointing to data packets in fast storage) that allow thousands of connections as well as different qualities of service to be attached to individual queues .
The "intelligence" of the system in tracking packets according to the flow allows "cut through" flow, that is, the output from a port of portions of a data packet stream even as portions of the data packet stream are entering a port. Many other intelligent functions are possible because of the flexible and scalable architecture of the system using interface ASICs (application-specific integrated circuits) to "canonicalize" Layer 2 and 3 header information, a high speed bus, a queue manager ASIC which rapidly implements queuing decisions of a fast relay engine ASIC, and a background engine ASIC that monitors the flow connections . The present invention together with the above and other advantages may best be understood from the following detailed description of the embodiments of the invention illustrated in the drawings, wherein:
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 is a block diagram of a preferred embodiment of the invention;
FIG. 2 is a block diagram of the media interface ASIC (MOM) of the preferred embodiment of the invention;
FIG. 3 is a block diagram of the queue manager ASIC (QM) of the preferred embodiment of the invention;
FIG. 4 is a block diagram of the relay engine ASIC (RE) of the preferred embodiment of the invention; FIG. 5 is a schematic diagram of the data flow of the preferred embodiment of the invention;
FIG. 6 is a general flow diagram of the processes used in the preferred embodiment of the invention; FIG. 7A shows the data structure of a canonical header used in the preferred embodiment of the invention;
FIG. 7B shows the data structure of a portion of the canonical header used in the preferred embodiment of the invention;
FIG. 7C shows the data structure and possible entries of another portion of the canonical header used in the preferred embodiment of the invention;
FIG. 7D shows the data structure and possible entries of another portion of the canonical header used in the preferred embodiment of the invention;
FIG. 8A shows the data structure of another portion of the canonical header used in the preferred embodiment of the invention; FIG. 8B shows the data structure and possible entries of another portion of the canonical header used in the preferred embodiment of the invention;
FIG. 8C shows the data structure and possible entries of another portion of the canonical header used in the preferred embodiment of the invention;
FIG. 9 is a block diagram of the high-speed bus used in the preferred embodiment of the invention;
FIG. 10 shows the differential character of the bus lines of FIG. 9; FIG. 11 is a schematic of a transmit circuit used on the bus shown in FIG . 9 ;
FIG. 12 is a timing diagram of the transmit circuit of FIG. 11;
FIG. 12A is a composite timing of the transmit circuit of FIG. 11;
FIG. 13 is a schematic of a clock delay circuit used in transmission on the bus shown in FIG. 9;
FIG. 13A is a timing diagram of signals on the circuit shown in FIG. 13; FIG. 14 is a detail of the circuit shown in FIG. 13;
FIG. 15 (Table 1) shows the possible values and meanings of a control bit used in the bus shown in FIG. 9; FIG. 16 shows a sequence of control bits shown in FIG. 15;
FIG. 17 is a block diagram showing the token ring arbitration used between the interface chips shown in FIG. 1; FIG. 18 shows a sequence of cell transmissions used in the preferred embodiment of the invention;
FIG. 19 shows a pointer-register structure used in the preferred embodiment of the invention;
FIG. 20A shows the data structure of a hash table entry used in the preferred embodiment of the invention;
FIG. 2OB shows the data structure of another hash table entry used in the preferred embodiment of the invention;
FIG. 21 is a timing diagram for the control signals used on the bus shown in FIG . 9 ; FIG. 22 shows possible values and meanings of control bits used on the bus shown in FIG. 9 ;
FIG. 23 shows as an example a sequence of control bits that may be seen on the bus shown in FIG. 9;
FIG. 24 shows diagrammatically the cell transmissions for possible cells transmitted on the bus shown in FIG. 9;
FIG. 25 shows the possible values and meanings for codes used on the bus shown in FIG. 9;
FIG. 26 shows the data structure of a field of the canonical header used in the preferred embodiment at different times;
FIG. 27 shows details of the data structure of one of the subfields shown in FIG. 26;
FIG. 28 shows the data structure of a temporary "burst" header used in the preferred embodiment of the invention; FIG. 29 shows a set of linked descriptors mapped to a data packet used in the preferred embodiment;
FIG. 29B shows a set of linked descriptors used in the preferred embodiment to describe an incomplete packet;
FIG. 30 shows the linking of descriptors used in the preferred embodiment to establish virtual queues;
FIG. 30B shows the linking to buffer descriptors of receive and transmit context tables used in the preferred embodiment to track data cells forming a packet; FIG. 31 is a representation of a credit-managed transmission system used in the preferred embodiment of the invention;
FIG. 32 is a representation of a ring-pointer system used in the preferred embodiment of the invention to determine whether credits should be issued in the system represented in FIG. 31;
FIG. 33 is a more detailed representation of the system represented in FIG. 31; FIG. 34 is a representation of a hierarchical queue system used in a preferred embodiment of the invention;
FIG. 35 shows the data structure of a transmit context table entry used in a preferred embodiment of the invention;
FIG. 35A shows the data structure of a field of the data structure shown in FIG. 35;
FIG. 35B shows the possible service policies encoded in the Q SVC Policy field of the data structure shown in FIG. 35;
FIG. 36 shows the data structure of the queue table used in the preferred embodiment,- FIG. 37 represents possible links and queues in the transmission phase of the preferred embodiment;
FIG. 38 shows the operation of the standby scheduler used in a preferred embodiment of the invention;
FIG. 39A represents a linked descriptor set representing a complete packet in memory in the preferred embodiment;
FIG. 39B represents the delinking of the descriptor set shown in FIG. 39A to free the buffers described by the linked descriptor set shown in FIG. 39A;
FIG. 40 is a block diagram of a DRAM control system used in the preferred embodiment of the invention;
FIG. 41 is a diagram of flow information data structures 1100, 1102 located in the forwarding engine (FE) code and data DRAM 45 (Figure 1), according to principles of the present invention; FIG. 42 is a flow chart of the control connection process in the application switch according to principles of the present invention; and FIG. 43 is a flow chart of the video and voice connection data flow according to principles of the present invention.
DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS
The specification will be organized as follows:
1. BlazePath™/BlazeFire™ Architecture/Chip Set
2. Header "Canonicalization" and Packet "Cellularization"
3. BlazeWire™ High-Speed MAC Bus 4. Data Flow In
5. Queue Pointer Management and Operation
6. Relay Engine Operations/Flow Matching (FastPath™)
7. Transmission Scheduling
8. Download to Interfaces/Transmission Credit Loops 9. Ultra-High Speed RAMBUS® Operation
10. Background Engine/Initialization/Monitoring
11. Scheduling for Multimedia Data Flows
1. BlazePathTM/BlazeFire™ Architecture/Chip Set The architecture of the invention, called the BlazePath™ architecture, comprises application layer flow switching or connection performed by virtually allocating (by pointers to high speed data buffers) incoming data packets to one or more of a large number of virtual queues according to decisions made on the basis of information in the application header of the packets characterizing their membership in a particular flow. To enhance the throughput or bandwidth of the system, a preferred embodiment, the AppSwitch™ application flow switch, makes decisions according to the initial packet (s) of the flow and matches a hashed version of the header information to identify subsequent packets of the flow. By "canonicalizing" the header information of the incoming flow and splitting lengthy frames into smaller internal cells (but keeping them logically connected) , the system is "cell or frame" independent .
Referring to Fig. 1, in a preferred embodiment, the architecture is implemented in the BlazeFire™ chipset connected by the BlazeWire™ MAC Bus 60. The architecture is centered around a 287k-gate Queue Manager ("QM") ASIC 30 operating at 100 MHz which implements the queue-pointer scheme allowing 16,000,000 queues for pointers (24-bit definition) to locations in a high-speed data buffer 35 and 36 connected to the QM 30 in which incoming packets are temporarily stored.
The queues are loaded based on decisions made by the 410k-gate Relay Engine ("RE") or Forwarding Engine ("FE") ASIC 40 operating at 100 MHz which includes an Argonaut RISC (ARC) central processing unit 387 and a FIFO 394 for packet headers to be examined. The input to and output from the system is performed using 359k-gate 60 MHz MOM (Mil [Media-Independent Interface] Octal MAC) ASICs 10 and 20 daisy-chained on the BlazeWire™ MAC Bus 60; the MOM chips 10 and 20 may each serve two Quad physical link chips (71 and 72, and 70 and 73, respectively) for local area Ethernets 63 or an interface for a wide area network such as the Distributed Access Device (DAD) WAN Processor 66 servicing Tl and POTS ("Plain Old Telephone Service") WAN lines 69 or for a Background Engine ("BE") 50. FIG. 2 is a block diagram of the MOM chip, for example MOM chip 10, used in the preferred embodiment of the invention. Generally, the diagram shows Mil interfaces 65 providing eight duplexed Ethernet ports. The receive interfaces 11 and parsers 12 receive the data packets, rewrite the frame headers as the canonical headers described in
Section 2 below, and divide the resulting packets into 128- byte cells, which are placed in FIFO 15 by producers 13 and the FIFO arbiter 14, in round robin arbitration among the eight ports. Data cells not bearing a canonical header (packet cells following the first cell of the packet) have a burst header added by burst logic 17 for internal tagging of the data. RX Credit Manager 19 adds transmission credits (discussed in Section 8 below) to the headers as appropriate to inform QM 30 that the transmit FIFO 24 can accept more data to be transmitted. A token arbiter 18 determines when the data is to be sent to the MAC Bus TX cell 76 to be transmitted on the MAC bus 60 to QM 30. Still referring to FIG. 2, data cells incoming on MAC Bus 60 are directed to the transmit consumers 26 and according to the circuit identifiers in their canonical/burst headers. The data packet headers are reconstructed and transmitted by the transmit consumers 26 and interfaces 27, and TX Credit Manager
28 is updated with credit information to be returned to the QM 30.
FIG. 3 is a block diagram of the QM 30 used in the preferred embodiment of the invention. Essentially, QM 30 is a collection of gates and state machines designed to rapidly execute the placing of data cells on appropriate queues (implemented virtually by linked lists of pointers to data buffers) and to apply queue policies as directed by the RE 40. The QM 30 is divided into three clock regimes. The interface with the MAC bus 60 through Digital Delay Locked Loop 302 and Receive Interface 304, supplying Receive Data FIFO 306 and Receive Command FIFO 312, and through Digital Delay Locked Loop 301 and Transmit Interface 303 draining Transmit Data FIFO 305, is on the MAC bus clock. Data cells received are channeled directly through Dual RAMBUS® Access Cell 308 into the DRAMs 35 and 36 as discussed below. The DRAM Interface
307, operating on the DRAM clock, coordinates the operation of MAC bus FIFOs 305 and 306 as well as Header Out FIFO 309
(containing canonical header cells to be sent to the RE 40 [not shown] on Header Data Interface 74), Header In FIFO 310 (containing canonical headers rewritten at the Relay engine Data Interface 313 with appropriate routing information) and DRAM Command FIFO 311. The latter contains the decisions of the RE as implemented by the QM logic shown in the network of functions under the SRAM clock domain. Receive Engine 315,
Transmit Engine 316 and Header Prefetch Engine 324 direct the function of DRAM Arbiter 314 to provide instructions to the DRAM Interface 307 to move data in and out of DRAMs 35 and 36. Receive Engine 315 and Transmit Engine 316 also coordinate with Free Buffer Manager 318 to allocate buffers in DRAMs 35 and 36 to incoming data. EnQueue Manager 319 and DeQueue Manager 312 coordinate with Header Prefetch Engine and the Receive Queue State (head and tail of receive queue pointers, discussed in Section 5 below) 320, to determine, among other things, when cells containing canonical header data should be sent to the RE 40 for pattern-matching and the corresponding packets taken off the receive queue. The Header Prefetch engine 324 coordinates with the Relay Engine Context 326 and the Instruction Dispatch Manager 327, which receives instructions from RE 40 via interface 75, Relay Engine Instruction Interface 329 and the Relay Engine Instruction FIFO 328. Circuit Poller 317 polls the Transmit Engine 316 circuit by circuit to transmit cells and coordinates with the SRAM Arbiter 322, which through the SRAM Interface 323, accesses linked lists of buffer pointers ("descriptors") in SRAM 32 to track component cells of the packets as they are received and transmitted on one or more queues. These operations, where appropriate field mappings are hard-wired, provide for a great deal of flexibility in scheduling and routing executed at very high speed.
FIG. 4 is a block diagram of RE 40. A primary function of the RE 40 is to examine canonicalized packet headers received at interface 74 from the QM 30 and to determine rapidly whether the packet belongs to a known flow and to provide instructions accordingly on interface 75 for appropriate scheduling (quality of service) . A CPU Core 387 (implemented with the ARC processor) contains an instruction cache 386 and a data cache 385 and communicates with the Code and Data DRAM 42 through the DRAM Interface 384 (which also accepts instructions from the BE 50 over a low speed bus 62 and the DMA 383 at initialization) . String Compare Coprocessor 389 is used to aid the pattern recognition used to match a packet and flow. Generally, a canonicalized packet header entering the RE 40 is pre-processed by the Hash Preprocessor 399 in parallel with being MUXed into Data FIFO 394 by MUXIn 394. The results of the parallel hashing are placed in Hash FIFO 393 and compared by the Hash Lookup Engine 392 with contents of the on-board Ll Cache of the Hash Table (of known hashes of header information associated with particular flow characteristics) 391. If no match is found in the Ll Cache 391, the Hash Lookup Engine 392 will look to the entire Hash Table stored in Lookup SRAM 45, accessed through SRAM Interface and Arbitrator 388. Trie Search Coprocessor 390 is used to find the proper flow parameters in situations (discussed below) where the fast pattern matching is not appropriate or fails. With the flow parameters determined, an appropriate instruction is issued by CPU 387 into the Instruction FIFO 395 and processed by Instruction Push 396 multiplexed with any data from Data FIFO 394 by MUXOut 397 across interface 75 into the QM 30.
FIG. 5 shows a general schematic of the operation of the preferred embodiment of the invention from the queue management point of view. Data on MOM Receive Ports 15' are directed into the QM Main Receive FIFO 330. Also enqueued are data from WAN (Tl and POTS) port receive queues 69' processed under protocols 66' and under the direction of DAD Management 66" into a DAD Ethernet transmit queue 348' to appear on a MOM receive port 348. Data cells in the Receive FIFO 330 are placed in the main system packet memory DRAMs 35 and 36 while the canonical headers are forwarded in a FIFO 394 to the QM 30 where FastPath™ processes are applied to enable appropriate queuing of packets on per flow, per priority and per port queues 332 (static priority, as discussed below) and 333 (weighted robin priority, as discussed below) to be transmitted to the MOM Transmit Ports 24' (or the DAD 66 to be distributed on circuit queues 350 for further distribution to Tl and POTS Port Transmit Queues 69") for transmission. Fine tuning of scheduling may be achieved using Quality of Service Scheduling Process 336 relative to per flow queuing using Scheduled Queues 335 as "intermediate" queues. A Management Queue 337 is also provided with a Management Operations Process 338 operating on weighted round robin queues 333. A Monitor Queue 334 is also provided for network monitoring information to be transmitted over Mils 24'. On the BE 50 side, data placed on the MOM Port Transmit Queue 339 is transmitted over Mil (100 Mbit Ethernet) link 64 into the BE Receive Queue 341. The Background Engine Main Forwarding Process 342 passes information into the BE Transmit Low Priority Queue 346 or the Management Queue 343 which is serviced by Management Operations Process 344 to develop data (including instructions) to be placed on BE Transmit High Priority Queue 345. Both BE Transmit Queues are drained into the MOM Port Receive Queue 347 via link 64 to be placed on the QM Receive Queue 330.
FIG. 6 is a generalized flow diagram for the process of the invention. It is to be understood that the processes occur simultaneously along various points in the diagram for different cells. Because the preferred embodiment of the invention divides often lengthy incoming Ethernet frames into cells for subsequent reassembly, it is important in the embodiment to characterize the cells relative to the packet from which it originated. A received cell may be a "start of packet" ("SOP") a "middle of packet" ("MOP"), an "end of packet" ("EOP"), or include a single packet as a "start and end of packet" ("SEP"). Because reception and transmission of data packets in the preferred embodiment is executed on a circuit-by-circuit basis, and a circuit is defined as a logical connection preserving the order of packets, cells of a packet on one circuit may be interleaved with cells of a packet on another circuit, for example on the MAC bus, but cells received on the same circuit must be transmitted in the same order. Thus, in FIG. 6A, with time going forward from top to bottom, an SOP 371 is received from Circuit 2, then an SEP 372 from Circuit 1, an SOP 373 from Circuit 3, an MOP 374 from Circuit 2, an EOP 376 from Circuit 3, an SOP 375 from Circuit 1 and an EOP 377 from Circuit 3, in order of appearance on the MAC bus . Referring to the generalized process shown in FIG. 6, in operation 351, a packet is received at an Mil and is split at operation 352 into cells by MOM 10 or 20 (referring to FIG. 1) which also adds canonical headers (and possibly burst headers) . The cells in MOM Transmit buffers are arbitrated on the MAC bus in operation 353 and stored in DRAM for later transmission in operation 354, which also includes the development of a procedure to associate the cells with the original packets, such as the link-list of virtual packets used in the preferred embodiment of the invention. If the cell is an SOP, a decision 355 is made to send the cell to a pattern matching procedure wherein the cell is hashed 356 and then matched 357 against known hash results associated with previously identified flows. If there is no match (possibly after several matching procedures) , a new flow or exception is noted 358. In either case, an appropriate header is written 354 to appropriately schedule and route the packet. In the preferred embodiment, the scheduling is done by assignment of the packet to a queue associated with a specified quality of service and a particular circuit. A cell on a queue is transmitted 360 at the appropriate time, the process possibly including a rewriting of the headers . If the transmitted cell was an EOP, the packet is dequeued 361 from the circuit and if there are no other requirements for transmission of the packet (no more owners 362), the data buffer is released 363. This process may be further generalized and implemented in a diverse ways.
The flow of data through a preferred embodiment of the invention is presented below in further detail, which includes additional inventions .
2. Header "Canonicalization" and Frame "Cellularization"
Upon receiving a data packet on a physical link, the inventive network switch takes the Layers 2 and 3 headers of incoming packets (dropping any Layer 1 packet preamble) and converts it to canonical form. The invention further breaks variable-length packets into "cells" of a maximum convenient length for communication on the high-speed internal bus. This allows data packets of different lengths with different Layer 2 and 3 header formats, such as Ethernet "frames" or ATM "cells," to be routed by the same switching process and apparatus. The "canonicalization" of the header also aligns the header along 4-byte boundaries that are convenient for processing. The example here is for Ethernet frames, but is applicable to ATM cells with appropriate modification in the terminology and the interface ASIC. Referring to FIG. 1, a frame of information is received by the MOM 1 chip 10 via one of the eight ports shown. The physical link Layer 1 processing is handled in the preferred embodiment by dual "off-the-shelf" Quad PHY integrated circuits (such as available from Lucent Technologies), each handling the transmit/ receive electronics of 10-Base-T (10 Mbit/sec) or 100-Base-TX (100 Mbit/sec) Ethernet. One of the ports, e.g., from MOM 2, may be connected by internal or external 10 Mbit Ethernet to a DAD integrated circuit including an off-the-shelf WAN processor (such as available from Motorola) , which in turn interfaces with Tl and POTS" lines via modem. Together, these form a QuadServe™ WAN access module.
Referring to FIG. 1, a frame or packet of information in the form of a data stream forming a message is input to a physical circuit 70 and then received by the MOM 1 chip 10 via one of its eight ports. FIG. 18 schematically illustrates the organization of a typical packet format. There may be a preamble 620, followed by a data link Layer 2 header 622, which contains information to bridge the packet, a network Layer 3 header 623, which contains information to route the message, and an application header 624, which contains information about the application for which the data is used. The headers are followed by the data itself 625, and, occasionally, there is a trailer 626, which usually is superfluous and not used.
The MOM 1 chip, preprogrammed in hardware in the preferred embodiment to recognize a variety of Ethernet protocols, drops the preamble and trailer, reads the Layers 2 and 3 headers from the received frame, and generates a canonical header of twenty-eight bytes, FIG. 7A. Having a buffer capacity of 256 bytes per port, the MOM 1 segments the frame data into cells of 128 bytes each (other cell lengths may be used in other embodiments) . Immediately adjoining the canonical header, Layer 3
(network) header information as received is stored. The Layer 3 header always starts at a multiple of four bytes from the start of the cell because the canonical header is 28 bytes. Important fields within the Layer 3 header are aligned at four-byte boundaries generally. This makes the processing of these fields very efficient for 32-bit processor/memory architectures . Other header information from the higher layers, including the application layer, follow the Layer 3 header. The canonical header is placed at the beginning of the first cell of each frame or packet received and is used by the RE 40 to route or bridge the packet. When a packet in the form of a stream of cells is sent to the MOM for transmission, the MOM reconstructs the appropriate headers, preambles and trailers according to the destination and protocol information in the transmit canonical header and begins transmitting the reconstructed packet on the line connected to the designated port.
FIG. 7A shows the organization and content of the canonical header in a preferred embodiment. The first two bytes 430 hold the circuit identification of the circuit on which the data packet was received, Byte 432, DL Info, provides information about the Data Link (Layer 2) header from the original received header. FIG. 7B shows the specific assignments to these bits. Bit 7 indicates whether the received frame was VLAN (virtual local area network) tagged on reception. On transmission, if this bit is set, the outgoing packet is encapsulated with a VLAN header by the MOM chip handling the transmission. It should be noted, however, that packets received with VLAN tags are not necessarily sent out with VLAN tags and vice-versa.
Bits 6 and 5 of FIG. 7B indicate how CRCs (cyclical redundancy checks) are to be handled. FIG. 7C is self- explanatory. Of note is that when the outgoing frame is different from the received frame, then a new CRC must be generated, but if the original frame is simply forwarded, then the CRC may not change, hence there is need to retain the old CRC or generate another CRC. Bits 4 and 3 are unused and left as zeros. FIG. 7D shows the encoding for bits 2, 1, and 0 which identify the data link packet format. The canonical header NL Info field 434 contains network layer information. FIG. 8A shows the meaning of the eight bits in the NL Info. Regarding reception: bit 7 true indicates that the destination address (DA) of the received information is the address of the bridge group associated with the circuit on which the packet was received; bit 6 true indicates that the DA is the system's address for the port; bit 5 true indicates that the DA is an address that has been pre-configured by the invention as a "well-known address," such as one associated with a network control protocol. On transmission this bit is ignored. On transmission, if bits 7 and 6 are set, the appropriate source address is put on the SA field.
Bits 4-0 identify the Layer 3 protocol of the packet. FIG. 8B identifies those protocols preprogrammed into the invention. These can be extended as new protocols are developed and need to be handled efficiently by the system.
The Time Stamp four bytes 138 contain the time at which the packet will expire. The QM 30 enters the time that the packet will expire when it receives the canonical header as part of the first cell of a packet. The QM 30 upon transmitting a packet will check if the current time is greater than the time stamp value in the canonical header. If so, the data link device is directed to not transmit the packet and count it instead. When first generated by the MOM, this field contains cell information described in the "Data Flow In" section below.
The two-byte receive circuit identification (Rx Ckt Id) identifies the circuit on which the packet is received. The QM copies the receive circuit identification from the Ckt Id field 430 first supplied by MOM 1 before overwriting the Ckt Id field 430 with the circuit identification of the circuit on which the data is retransmitted. The receive circuit identification is thus retained for later use (such as for management and RMON functions by the BE 50) .
DA is a 48-bit Layer 2 (MAC) destination address of the received packet . SA is a 48-bit Layer 2 (MAC) source address of the received packet .
VLAN tag is a two-byte field to accommodate a packet received with an Ethernet 802.1Q tag. The VLAN tag bit in the DL Info field is also set, as described above. The MOM chip handling the transmission of this packet will tag the outgoing packet .
P-Type/len is a two-byte field containing the protocol type/length field. In this preferred embodiment, if the value is greater than 1500 (decimal) , this field represents a protocol, and if the value is less than or equal to 1500, this field represents a length. Protocol is captured in the Protocol Kind subfield of the NL Info field. If the protocol is not so configured, the Protocol Kind subfield of the NL Info field would indicate Unknown (0) and the P-Type/len field would have the value. For example, if the packet was in the Ethernet 802.3 format, this field would contain the length which could be used for validity checks with length in the Layer 3 header . The XX bytes may have other information based on the packet format of the received packet. FIG. 8C shows the contents of the XX bytes for the different DL format types. 3. BlazeWire™ High Speed MAC Bus
The received frame, reorganized into one or more cells, the first cell containing the canonical header and higher layer headers, is communicated to and from the QM on a high speed MAC bus called BlazeWire™.
The present design of BlazeWire™ is a full-duplex, clocked bus of ten signals and a clock signal each way between two large integrated circuit chips. The clocking protocol allows data transmission on the bus to be self-fra ing, asynchronous and non-aliasing. All the signals are differential signals between two conductor runs with the inherent transmission lines properly terminated. In this preferred embodiment, the electrical characteristics of the differential drivers and receivers are as substantially described in the low voltage differential standard (LVDS) ANSI/TIA/EIA-644. The differential signal voltage is about two hundred and fifty millivolts (250 v) , and the cable terminations and physical signal paths are arranged and designed to accommodate high speed operations over the bus. The bus is organized as a chain running from one large chip (MOM or QM) to another. A separate daisy chain token passing scheme is implemented as discussed below to control the access of the chips to the bus. The electronic design of the bus compensates for the practical variations inherent in different production runs of chips from possibly different manufacturers, supply voltage variations, and temperature variations . In preferred embodiments the speed of the bus can run upwards to the gigaHertz range.
The ten signals are composed of eight data, one parity, and one control. The data are placed on the lines on both the rising and falling edges of the clock signal. Since the data is placed on the signal lines at the clock transitions, the signals should be read at the receiving end at or very near the center of the clock signal. This allows any overshoots and any other signal delays or other anomalies to settle. Since the data is loaded onto the signal lines at both clock signal transitions, it is critical to have a symmetrical clock with minimum skew between the clock edges and the data being placed on the bus. The present circuitry provides a feedback mechanism for monitoring and finding the center of both phases of the clock signal, and furthermore to provide a symmetrical clock for the signals being sent out on the continuation of the bus through the chip .
FIG. 9 diagrammatically shows the basic signal flows between two sub-systems represented as MOM 1 and MOM 2 with twenty signal lines, a group of ten each way, and a clock with each group. FIG. 10 shows the differential character of each of the twenty-two lines. Differential drivers and receivers as known in the art are properly terminating the transmission lines in their characteristic impedance to maximize signal fidelity and minimize ringing. Other termination schemes such as schemes implemented on the drive side may be used to advantage in other embodiments . FIG. 11 is a schematic of the circuitry by which one of the ten data bits is output from one of the MOMs . The circuitry is essentially duplicated for the other data bits. This circuit implementation maximizes clock symmetry and minimizes skew. The A data 462 is to be placed on the output 466 followed by the B data 464. The A data is latched in the flop 468 and presented to the logic array. Consider that the prior B data has remained in the latch 472 and is input to the logic array 460. The logic array is arranged to load a signal into the latch 474 which provides, when it is "exclusive or'ed" with the signal that remained in latch 476, the A signal at the output of the gate 466. On the next clock edge a similar operation provides the B data signal at the output, the B data 464 is latched 472 and "exclusive or'ed" with the prior signal in latch 474 such that the "exclusive or" of the data in latch 476 will provide the B signal at the output of the "exclusive or" 466. FIG. 12 is a simplified timing diagram of the above.
FIG. 12A shows a composite timing chart of the bus clock and the ten data lines on the bus between MOMs 1 and 2. FIG. 12A shows the transferring of eight consecutive bytes (plus parity and control) on each edge of the clock signal.
When the signals are received at the MOM or QM, FIG. 13 shows the MOM's circuitry which is used to provide a delayed clock with an edge at the center of one phase of the received clock. Another similar circuit is used to provide a delayed clock with an edge at the center of the other phase of the received clock. These centered clocks are used to latch the data into the receive MOM and will be the basis for the symmetrical clock used to send out signals from the MOM. The received clock 80 becomes the data input to the latch 482 and latch 484. A delayed clock DLYA (a delay version of the input clock) latches the clock signal 480 into the latch 482 whose output is SAMPLE CLK A, and a delayed clock DLYB latches the clock signal 480 into the latch 484 with an output SAMPLE CLK B. The DLYA and DLYB are delayed by the control logic by a programmable amount . Both of these SAMPLE CLKs are fed back to a control logic array 90 through circuitry designed to synchronize the signals. In operation, the control logic can program when the DLYA occurs. In this way, the DLYA might latch the clock 480 signal when it is low which the control logic can determine by the SAMPLE CLK A signal. The control logic continues to set different delays until the clock 480 signal goes high. In a similar manner, the control logic continues to set different delays until the clock signal goes back low. As before, the control logic determines this condition from monitoring the SAMPLE CLK A signal. With reference to FIG. 13A, once the control logic has found the first rising edge 480' and the falling edge 480" of the clock signal 480, the control logic "knows" and can set the DLYA rising edge 486 at the center of the positive phase of the clock 480. This DLYA rising signal will be, effectively, the rising edge 486' used to latch data on the next successive positive phase of the clock 480. During the time that the centering of the DLYA signal, the actual data being received at the time 486, FIG. 13A, is latched by the DLYB, FIG. 13, signal which had previously been centered to the positive phase of the clock 480. The previous centering of the DLYB was accomplished in the same manner as described above using the SAMPLE CLK B feedback signal and the DLYB delayed signal. In this embodiment, while one delayed clock is latching data, the other delayed clock is being centered for use at some later time.
The circuitry of FIG. 13 is duplicated to precisely measure the center of the negative phase of the input clock signal in order to latch in the data on the opposite phase. FIG. 13 shows the DLYC rising edge 489 precisely at the center of the negative phase of the received clock. As previously described, the DLYC clock is being centered during one negative phase of the clock 480 while the other (DLYD not shown) is latching data, and the DLYD will be centered while the DLYC clock latches data. FIG. 14 shows parts of the delay circuitry. The IN signal 494 is delayed by one gate 495 and input to the "and" gate 496. If the control 1 signal is a logic one, the signal traverses 96 and is output via the "or" structure 498 and becomes the output signal delayed by the three gate delays -- 495, 496, and 498. This delay is considered as a one unit delay. If the control 1 signal is a logic "0" and control 2 signal is a logic "1", the IN signal travels through gates 495 , 495', 496', 498' and 498. This path is longer by two gates, and the IN signal is considered to have gone through two single unit delay circuits. Each single delay unit adds two gate delays. If the control logic allows the IN signal to reach the three gates 500, and the control X signal is a logic one, the IN signal will go through an incremental of four gates -- the three gates 500 and the gate 504 (gate 502 being the common path duplicated in each delay circuit and disabled in prior delay circuits) . This circuit adds four gate delays and forms a two unit delay. A four-unit delay (not shown) will replace the three gates 500 with seven gates, therefore adding an increment of eight gate delays or four unit delays . In this preferred embodiment, there are thirty-two single-unit delays, sixteen two-unit delays, and sixteen four-unit delays. The arrangement in this preferred embodiment allows an arithmetic-like progression of delays up to a total of 128 unit delays which may be selected. In other embodiments other arrangements of delay circuits may be selected and other known delay circuits may be used to advantage. In this preferred embodiment, for expected manufacturing processes used to build the circuitry, and for expected temperature and supply voltage operation, a single unit delay will be about 0.15 nsec . It is expected that the variation of one unit delay may run from 0.08 to 0.3 nsec depending on the above mentioned parameters. FIG. 15 (Table 1) is a table indicating the use of the control bit in this preferred embodiment. The bit is used for framing purposes. In the timing diagram of FIG. 12A, eight bytes are transferred on each clock transition marked by eO- e7. Table 1 shows the value of the control bit for the even numbers transitions, eO, e2 , e4, and e6. The combinations indicate the allowable functions shown in the right most column. If the control bit is zero in each of the even transitions, the bus is idling. Any of the combinations shown in rows 510 signal that the data on the data lines is a valid frame. In particular, since the value at the e6 time is always zero and the value at eO time is always one for a valid frame of data, the system looks for a zero to one time sequence of the control bit. The one is assumed at eO, and if the combinations shown in rows 510 exists, the framing of the data shows a valid set of eight bytes .
The values of rows 510 are selected to ensure that no aliasing of valid frames of eight data bytes can occur. The valid control bit sequence combinations -- the rows 510, in FIG. 15 -- will always have a zero then a one, with no other zero/one patterns in a valid frame. FIG. 16 shows that the pattern of control bit values at the even clock transition shows frame 512 as invalid since there is another zero/one at e2 and e4 for that frame 512. The frame 514, however, is valid as is frame 516. In practice, the value of the control bit is measured at each receive clock phase and a zero to one transition separated by a clock phase is monitored. When such a transition occurs, the one is treated as being in the eO time slot and the monitoring of frame validity is based on that relative timing.
Transmission of data from the MOM chips to the QM is arbitrated by a token ring in the preferred embodiment. With reference back to the system block/schematic diagram FIG. 1, a token ring arbitration path 61 is shown between MOM 1 and MOM 2. The token ring is a looped signal where a chip has the token when there is a logic difference between the incoming token signal and the outgoing token signal. In FIG. 17, there is no net inversion within the chips, so there is an inverter in the path so that at initialization one chip, in this case MOM 1, will be guaranteed to have the token and be in control of the bus. When a chip has the token, it can send its own data over the bus , whereas when the chip does not have the token, it must wait for the token while other data are simply passed through the chip. When a chip has the token, it will send out all the data needing to be sent by that chip before releasing the token. If MOM 1 has the token, it is passed to MOM 2 by MOM 1 changing the state of its output signal 61. MOM 2 then has the token. This token passing may be extended to multiple devices by connection of the single token output signal of one device to the single token input signal of the next device. The last device's token output signal is inverted and then sent to the first device in the token passing chain.
Implementation of the token passing at an edge or change of state of the information facilitates synchronization between different clock domains. The token automatically, by virtue of the edge-based information passing, remains valid at a device until it is recognized and then passed on to the next device in the token passing chain. 4. Data Flow In
The MOM 1 chip 10 can store or buffer up to two cells or 256 bytes of received data for each of the eight ports. As described in the "Header Canonicalization" section above, the MOM chip reads the Layer 2 and 3 headers from the received frame or packet and generates an initial canonical header of twenty-eight bytes (described further in this section) , followed by the network Layer 3 header and the application layer header in the first cell processed.
The MOM 10 (or 20) transmits the cell on the high-speed MAC bus 60 to the QM 30 when the MOM holds the token of the token ring arbitration path described above. Between the eight ports of a MOM, arbitration is round robin. The QM receives the cell and stores the cell in dynamic RAMs 35 and 36, in this preferred embodiment a RAMBUS® DRAM having two banks of DRAMs rapidly accessed as described in Section 9 below. Information describing a received, stored cell is placed in SRAM 32 and is called "descriptors." The canonical header is modified to include the Time Stamp. The modified canonical header and the rest of the header information in the first cell of the packet is placed in a Header Out FIFO 309 for transfer to the RE 40.
Because of the segmentation of frames and the arbitration scheme, subsequent cells of a packet received on a circuit may be interleaved with cells of other packets received on other circuits. To provide information to allow the QM to keep track of the order of the cells of a packet, the MOM writes an eight-byte (octbyte) "burst" header added to subsequent cells of the same packet (making up to 17 octbytes) , corresponding to the first octbyte of the initial canonical header of the first cell of the packet. Additional information is sent on the control signal line or bit of the high-speed MAC bus that allows identification of the boundaries of the cell and the type of information contained in the cell. FIG. 21 shows the use of the control bit to delineate data in groups of octbytes. The control bit 700 over eight consecutive clock phases frames eight bytes and distinguishes the data. The value of the control bit is shown as eO through e7 in the table FIG. 22.
In FIG. 22, the even control bits, eO, e2 , e4 , and e6 are encoded as follows: eO is always a one and e6 is always a zero to indicate that a valid group of eight bytes is received. To prevent aliasing of this encoding, the only values indicating a valid group are (for the even control bits, eO through e6) : 1000; 1100; and 1110. The bit e2 indicates the start of a cell, and e4 indicates the start of a packet. FIG. 23 shows a possible sequence of the even control bits: group 702 is not a valid group, while groups 704, 708 and 710 are valid. The circled zero/one 708 indicates that the only possible beginning to a valid group must have a zero followed directly by a one, and there cannot be another zero/one in the next two bits (e2 and e4) .
Still referring to FIG. 22, the odd control bits are encoded as follows: el indicates a transmission credit (see discussion below) exists, e3 (code bit 0) and e5 (code bit 1) form a two-bit end code, and e7 (short word) indicates an octbyte containing fewer than eight meaningful bytes. The short word can be used at the start of a cell or at the end of a cell.
FIG. 24 is a chart of several packet types that may be encountered. The first cell 720 of the packet may have up to sixteen octbytes, or 128 bytes. The even control bits 722 for the first 32-bit word (octbyte) is 1110. As shown in FIG. 22, this code means that this octbyte is part of a valid first cell of a packet. As shown, eO equal to "1" is required for a valid cell; e2 equal to "1" means this eight-byte transfer is the start of a cell, e4 equal to "1" means it is the start of a packet, and e6 must be zero for a valid cell. For the cell 720, the odd control bits are all zeros except for bit e5 of the last eight-byte transfer, which is a "1". FIG. 25 shows the encoding of the control bits el, e3 , e5, and e7 -- the odd control bits. For cell 720, e5 is a "1" and e3 is a "0" which decodes into "end of packet." Thus cell 720 is a one-cell packet (SEP) . It should be noted that this cell need not be a full 128 bytes long.
Cell 724 is a valid starting cell of a packet, and here e3 of the odd control bits 726 is set meaning "end of cell" but not "end of packet"; thus, it is an SOP cell. The next cell 728 is the second cell of a packet (MOP) , and all the cells following an SOP cell will have up to seventeen octbytes, including an octbyte burst header 330 added to the beginning of each cell. For this second cell, the last octbyte e3 is set meaning this cell is the end of a cell, but not the end of the packet. The cell 734 has e5 set in the last eight byte group, meaning that this cell is the end of the packet (EOP), and in this instance, e7 is also set. The bit e7 means that the last group of eight was not filled and was a "short word" (as so labeled in FIG. 25) , and when this happens, the last byte 338 contains the number of valid bytes in the last eight byte group. For example, if there were only three valid bytes in the last group, the last byte (concurrent with the e7 control bit), would contain 0011, or decimal three .
Regarding the transmission of cells to the QM from the MOM chip, the first octbyte at the start of the first cell contains a portion of the canonical header that is modified by the QM to include the Time Stamp. The entire canonical header is stored in the DRAM with the other headers and such frame data as may fit in the remainder of the 128 bytes. FIG. 26 shows the transformation of the first octbyte of the canonical header by the QM. As shown, the initial four bytes 740 written by the MOM, the Ckt Id, DL Info and NL Info, are carried forward by the QM. The second four bytes 742, including cell information, is overwritten by the QM with the Time Stamp 748. (The canonical header is sent to the RE, which deals only with packet policy and is unconcerned with cell information. ) The first byte 744 of the cell information bytes 742 contains the number of transmission credits being reported from the QM (described in the "Transmission Credit Scheme" section below) . The second byte contains credit flags, bit 7 being a SYNCH flag (for initialization) and bit 6 a "parent" flag (described in Section 8 below) . The third byte provides cell information whose meanings are shown in FIG. 27. The bit meanings are: bit 7 indicates cell error; bit 6 packet time out; bit 5 a packet from the bad packet queue; bit 4 from the monitor queue; and bits 3-0 are selected bits from the control described above. Bit 3 is the packet end bit, bit 2 is the start of packet bit, bit 1 is the data cell bit, and bit zero is the transmit credit bit. The last byte in the cell information bytes 742 provides the cell length in number of bytes . The octbyte-long burst header used to track cells without canonical headers is shown in FIG. 28. Its fields are identical to those of the first octbyte of the initial canonical header except that DL Info and NL Info (used by the RE which only sees the SOP) is replaced by the cell sequence number 752 and unused space. The Ckt Id 750 is used to match the cell (or more specifically, its proxy, the buffer descriptor) with preceding cells having the same Ckt Id, which should have sequential sequence numbers (unless a cell has been discarded) . Once the cell is linked by the QM with preceding cells (as described below) , the credits entered, and action taken on the other cell information, the burst header is no longer needed and is dropped. (A cell may be discarded if parity information detects an error. In such cases, at this time the cell and finally the packet is aborted by signaling the MOM chip.) A new burst header is created for the cell by the QM in the transmit phase, where the CKT ID shows where the packet is being sent . 5. QM Buffer and Queue Structure and Operation
Data cells received on the MAC bus by the QM are individually stored in the RAMBUS® DRAMs according to the fast-access operation described in Section 9 below, in addressable 128-byte data buffers, with the canonical header intact but rewritten to include the Time Stamp, and with the burst header octbyte dropped. Address 00000 does not contain cell information and corresponds to a null-pointer.
All data cells received on the MAC bus and stored in data buffers are organized in a single virtual receive queue using a descriptor/pointer scheme that is used for all but a handful of specialized queues for exceptions. The scheme allows a receive queue corresponding to up to 1 Gbytes of data. In the descriptor/pointer scheme, data buffer "descriptors" in the QM SRAM, comprising two 4-byte words, are surrogates for the actual data stored in the buffers and are linked to form logical packets. Thus a descriptor assigned to a data buffer with data has a field in the first word indicating the address of the buffer in the DRAM in which the associated cell is stored and a field in the second word containing a pointer to another descriptor 802 in the SRAM associated with the next cell of the same packet. As shown in FIG. 29, a complete multi-cell packet is described by a descriptor "link-list, " with the second word of the SOP buffer descriptor 801 pointing to the MOP buffer descriptor 802, the second word of descriptor 802 pointing to EOP buffer descriptor 803 and the second word of descriptor 803, associated with the last cell of the packet, containing a pointer pointing to descriptor 801, associated with the first cell of the packet. As shown in FIG. 29B, an incomplete packet has a null pointer in the second word of descriptor 805.
Queues are formed in the invention by a queue head pointer pointing to the first word of the descriptor associated with the first cell of the first packet in the queue and with a field in that first word pointing to the first word of the descriptor associated with the first cell of the next packet in the queue, and so linked reiteratively until the last packet in the queue, which has a queue tail pointer pointing to it, as shown in FIG. 30 with the receive queue head pointer pointing to the designator 812 associated with the first cell of the first packet in the queue and tail 811 pointing to the designator 815 associated with the first cell of the last packet of the receive queue (the descriptors each map to a 128-byte buffer in DRAMs 35 or 36) . As shown, the queued packets are not necessarily complete, but in this packet-oriented implementation, data cells received from the MAC bus are "added" to the packet to which it is identified by Rev Ckt Id in the burst header, rather than at the end of the queue .
In the receive operation, the QM Descriptor SRAM is organized into a buffer descriptor table and a receive context (or circuit) table. The buffer table or list has descriptors containing two 4-byte words, with word 0 containing a buffer address of a data buffer in the RAMBUS® DRAM (hence the buffer table entry is an implicit buffer) , and word 1 containing a pointer to another descriptor in the buffer table. At initialization, the buffer table is a "free buffer table" the designator of the first free buffer to which the QM hardware by a head pointer points and the second word of which points to the next free buffer descriptor, and so reiterated in a link until the last free buffer designator which contains a null terminator in its second word.
As a data cell is presented by the MAC bus to the QM, the QM extracts its circuit id from its canonical or burst header and checks for an entry in the receive context (circuit) table which yields information on the activity of that circuit. When an SOP is detected, an entry on the receive context table (8 bytes/circuit) is created and a pointer (current buffer) is entered pointing to the next free buffer designator. The cell data is written into the associated RAMBUS® DRAM buffer. The free buffer list pointer is moved to the next free buffer designator after the "current buffer" is allocated.
If the received cell was not an SEP, the second word in the buffer designator points to the next free buffer designator, preallocating the associated buffer, and a "0" is written in the second word of that next buffer entry.
If the received cell was an SEP or an EOP, the second word in the buffer descriptor is set to point to the first buffer descriptor for the packet, and the resulting link-list defining the packet is de-linked from the receive context table.
The cells received with the same circuit id, which may be interleaved on the MAC bus, are thus virtually reorganized by link-lists into packets, some of which may be incomplete even when leading cells are transmitted in cut-through operation. In the latter case, as shown in FIG. 30B, the current buffer of the receive context table 820 points to the next buffer descriptor 833 corresponding to the buffer into which the data cell is to be loaded, and the buffer descriptor 833 is linked to the descriptors 832, 822, and 821 of the other cells of the packet, one of which, descriptor 832, is linked as the current buffer 821 of a circuit entry in the transmit context table. Since the circuit entry in the transmit context table provides routing information, the data subsequently placed in the buffer associated with descriptor 833 "knows where to go." This system of link management allows "cut-through, " that is, the transmission of portions of a packet while other portions are still being received. 6. Relay Engine Processing/Flow Matching (FastPath™) The receive queue of linked descriptors of SOPs waits for processing by the RE 40. The SOP cells themselves are loaded, as room is made available, into a "circular" FIFO 394 of 16 128-byte registers processed by the relay engine. This is implemented with a pointer system that follows the processing of the SOP cells, adding cells until the register is full (when the send pointer "catches up" to the receive pointer in FIG. 19) , then adding another cell only when processing of the cell pointed to by a head pointer is complete and dropped (and the receive pointer "falls behind" the transmit pointer) .
The RE operation centers around a four-stage pipeline. Pipelining is a term of art used for many years, especially in high speed hardware designs, and will not be further discussed herein except incidentally. The RE's task is to determine how to best forward a frame flow and to provide forwarding information accordingly to the QM to route and schedule retransmission of stored packets. The four stages are briefly described here, followed by a more detailed description of the hashing and signature functions used to perform pattern matching to identify a flow.
The first stage stores the full header information (the entire SOP cell) in a "circular" data FIFO, in parallel as the header is processed by a hash engine to compute a hash and a signature value to perform a pattern-matching function to check whether the packet is part of an existing flow for which routing and scheduling information has already been developed. The second stage receives the Hash value which is used to address a Hash Table Ll 391. If a valid entry is found in this table, the signature from the Ll Table is compared to the computed signature of the Hashed data. If consistent, then a Flow Tag (not shown) from the Hash Table is presented to the next stage of the pipelined FE/RE hardware design together with an indication that a valid hit was found. The Flow Tag is a 24-bit index into a table in memory where information about the flow is stored. This information will include the circuit or circuits on which to forward the packet along with other flow related information as described elsewhere herein. A valid Flow Tag pointer (linking the contents pointed to) is the preferred result of the pattern matching functions described in this preferred embodiment
If a match is not found in Ll, the search is performed on the off-chip L2 Table 45. Signatures are compared as above and the Flow Tag from the L2 table is presented to the next stage. To facilitate the next search, the L2 entry is written into the Ll table .
If there is no hit in either Ll or L2 , the computed hash and signature are presented to the next stage with an indication that no hit was found.
The third stage receives the above information and determines if the header look-up was successful. If successful, the header data is updated according to the protocol rules that apply and the packet is forwarded according to the flow information. If, however, the header is found to be a TCP (Layer 4 Transport Control Protocol) SYN packet, or an equivalent start of connection packet in another protocol, or if the frame is not part of a known connection flow, the packet is not forwarded according to the flow information. In these instances the RE acts to route the frame by decoding the full pre-hashed header. In the process, it creates useful flow information and inserts a tag that points to it in the L2 Hash Table using the hash and signature values obtained by the hardware in stage one.
In the fourth stage of the pipeline, the header is passed back to the QM to be queued for transmitting on the specified queue according to the information supplied by the Flow Tag or the routing information supplied by the RE's decoding of the full pre- hashed header. For putting together the information to forward subsequent packets of the flow, the RE examines the application layer data in addition to the Layer 2 and Layer 3 headers . In further detail, with reference to FIG. 4, when a packet is received, the QM 30 provides a useful header (as determined from the NL field) which may be as long as 128 bytes to the FE/RE by loading that header data onto a dual ported circular buffer in the RE. With reference to FIG. 4, the header data is sent from the QM 100 to the MUXIn 102 and placed on a FIFO stack DF in the RE 40. The RE uses the network link byte to index into a previously stored ordered data array of 128-bit entries, where each bit corresponds to one of the full received header data bytes. The bytes that correspond to the bits with a one are extracted and processed by the hash and signature functions. The byte string is padded at the end with zeroes to provide a string that is an even multiple of four bytes. In this preferred embodiment, up to 64 of the 128 header bytes can be processed by the hash/signature operation, but fewer or more can be used to advantage in other preferred embodiments .
The hash and the signature functions are identical except that different multipliers are used. But, in other preferred embodiment, other combinations of different multipliers and different divisors may be used to advantage.
With reference to FIG. 4, the Hash Preprocessor 399 inputs the selected bytes from the 128 bytes of the header data. The selected bytes form a number (n) of 32-bit words (multiples of 4 bytes, as noted above) . The bits in this sequence of 32 bit words are treated as a polynomial in the Galois Field, GF[2] -- a Galois Field of 2 (Galois Field is known in the art) . In this preferred embodiment, the polynomial is multiplied by a random 32-bit polynomial, and then divided by a carefully chosen polynomial of order 32 resulting in a 32-bit remainder. The divisor used above is selected to be both irreducible and primitive (irreducible and primitive are terms known in the art) . A subset of the remainder bits are used as the actual index into the hash table. Bits 5 down to 0 are addresses directed into the on- chip Ll cache 391. Bits 16 to 1 are used to address the 64K locations in the off-chip L2 RAM 45.
The divisor used in this preferred embodiment is x32+x7+x54-x3+χ+x+l , although others may be used provided they are both irreducible and primitive.
The contents of the Hash Tables which identify the Flow Tag and/or the destination of the incoming frame are organized as follows: Hash Table 1 contains 64 words each of 64 bits, and it exists on chip to optimize the return of the value in the common occurrence where only a small number of flows are active. Larger tables can be used. In each word, see FIGS. 20A and 20B, bits 31-24 form a status where bit 31 being true indicates a valid entry. Bits 0-23 form a 24-bit Flow Tag where information about the particular flow is stored. The tag is a pointer to information about the circuit or circuits to which the packet will be forwarded. Obtaining the Flow Tag is the primary task of the RE. The Hash table also contains the 32-bit signature at bits 63-32, which is used to ensure that no collision has occurred and the result is valid. In order to further ensure the validity of the Flow Tag look up, the pre-hashed header data is stored so that unambiguous identification may be performed.
If there is no match in the Ll Hash table, the system will use the hashed result bits 16-0 to index into the 64k Hash Table L2. Each location will have a 64 bit width. Bit 30 is a Hash Bucket pointer wherein, if this bit is a zero, the bits in L2 table are organized functionally as in the Ll table. If there is one valid entry at this Hash Address, the system takes L2 bits 0-23 to be an index into a flow table to obtain a flow tag. See FIG. 2OB. If there are no valid entries at this Hash Address, L2 bit 31, the Valid Bit, is set to a zero. If there are two or more entries at this hash address, then status word bit 30 is set to a one and the system takes the L2 bits 55-36 as a pointer to the Hash Bucket .
The Hash Bucket holds up to eight aliased addresses of 64-bit words. If the collision bit 29 is a one, an aliased condition persists for both the hash and the signature operations and no further resolution will be performed by the hash mechanism, as no useful information can be obtained. At this point the two conflicting flows are handed back to the processor to perform a Trie search for routing information. The eight words in the Hash Bucket are searched sequentially, and to facilitate this search the addresses are sequential starting at the lowest index into the table. If more than eight entries are directed to the Hash Bucket, the system reverts and the overflow are searched via the Trie routine. The Trie search uses a co-processor 390 and is organized as a large Trie database for routing and bridging. The occurrence of signature and/or hash collisions can be monitored, and if excessive, the respective multipliers can be changed. Such changing results in a better randomization for the given set of addresses encountered in the network.
The hashing and signature routine results are not used in certain circumstances: when a connection is initiated, as when a TCP SYN or an equivalent "start of connection" packet arrives, or when a packet is found that does not belong to a connection flow, or the packet is part of a high security or other special mode. When such conditions are found the system can revert to the Trie search.
Generally processing of subsequent packets in a flow is accelerated by the optimization of software pattern matching as described above .
The RE returns information with instructions indicating which queue the cells are to be placed for forwarding along with the addressing. The QM receives the information and places the cells, which are stored in linked lists forming the contents of the packet which is being or was received, on a list to be transmitted. 7. Transmission Scheduling
The RE programs the QM, developing virtually by linked pointers in the QM Descriptor SRAM up to 16,000,000 transmit queues (24 bits) with managed priority for the various circuits.
The core of the transmission phase is the Transmit Context Table, which is organized by circuit, four four-byte words for each circuit as shown in FIG. 35. Word 0 contains a credit sync bit, seven bits 812 for transmit credits (no transmission unless a credit exists for the circuit) , a start of packet bit 814, and 23 bits designating the next buffer to transmit (next buffer ID) . Word 1 816 contains eight flag bits 818. FIG. 35A shows the meaning of these flag bits: Bit 7 indicates that the packet is a single buffer; bit 6 indicates that the packet is bad, usually from a CRC error, and that the MOM should abort this packet; bit 5 indicates that the packet was dequeued from the monitor queue wherein the packet can be off loaded at some other port or to the background engine for traffic analysis; bit 4 indicates that the packet is "multi- owned" or may be transmitted to more than one circuit; bits 3- 0 indicate the buffer length in bytes up to 128 bytes in groups of sixteen bytes. The remaining 24 bits of Word 1 contain the address of the first queue (each circuit may have 1, 2, 4, 8, or 16 associated queues) . Word 2 820 in the transmit context table contains one bit 822 that indicates that a monitor queue is attached, four bits that indicate the queue service policy, and three bits that indicate a reference count. FIG. 35B shows the meanings of the four queue service policy bits. The possible designations are: one queue; two, four, eight or sixteen static queues; two, four, or eight weighted round robin queues; or two, four, eight and sixteen one-half static and one-half weighted round robin queues. As described below, the static queues have the highest priority, followed by the weighted round robin queues. Word 3 contains the stand-by scheduler control word, which consists of "next cct Id, " "parent cct Id" (used only for stand-by scheduler circuits), a state bit (active or idle) and a stand-by scheduler interval .
The Queue Table shown at FIG. 36, which coordinates with the Transmit Context Table, contains four four-byte words for each queue. Word 0 contains a 2-byte standby circuit ID (discussed below) and two bytes of queue summary bits (only in every sixteenth queue number) . Word 1 contains two bytes indicating the queue size and a 2-byte overflow counter ID. Word 2 contains a five-bit field indicating the number of standby queues and 24 bits for the head-of-queue pointer. Word 3 contains a 24-bit tail-of-queue pointer.
In the preferred embodiment, it should be remembered that a queue is formed by linking the SOP cells starting with a head-of-queue pointer to the first SOP (and a tail pointer to the last SOP) , and new cells of a packet are added to the cell of the packet. Thus, referring to FIG. 37, there are four SOPs in queue 16 of Queue Table 850, represented by linked descriptors 863, and two SOPs or "packets" in queue 17 represented by linked descriptors 864. Incomplete packets, such as that represented by linked descriptors 862 may nonetheless be transmitted (allowing "cut-through" ) , but transmission will stop on the circuit when the last descriptor indicates that its associated buffer is empty, thereby preserving the rule that packet order is preserved on a circuit. The queue policy allows prioritizing and scheduling of transmission of data packets. Thus, under a fixed static priority, all the packets on a particular queue are transmitted before those on another. In a weighted round robin scheme, a certain number of packets on one queue are transmitted, then a certain number of packets on the next queue are transmitted, and so forth, this allows classes (queues) of traffic to have relative priorities without "starving" the lower priority classes. A "half-and-half" scheme is provided in which the static queues have priority, and when they are served.
A Schedule Table for the circuits in use is scanned continuously. As shown in FIG. 37, this is composed of a Primary Schedule Table with a Primary Schedule Table A 865 and a Primary Schedule Table B 866 and a Secondary Schedule Table 870. The Primary Schedule Table is located on-chip and consists of the two mentioned subtables, each with 64 entries. Slots in Primary Schedule Table A are visited once every Schedule Table time "tick." A Primary Table A entry contains a 6-bit index to an entry in Primary Schedule Table B. As shown in FIG. 37, any given Table B entry may have more than one Table A entry pointing to it. Primary Table B entries contain the size of the secondary table, and if the size is not equal to "0", then it also contains an offset into the secondary table 867 and the base address of the secondary table 868. If the size is equal to "0", the remaining fields are the "Use Parent Circuit" bit 871, the Parent Circuit ID 872 and the Circuit ID 873. A cell transmission event is triggered when a schedule table entry with a Circuit ID is found. By entering the appropriate Circuit Ids in the Schedule Table, a cell transmission ordering pattern is created which effectively allocates bandwidth to circuits according to their respective proportion of transmission events.
The hierarchical nature of the Schedule Table allows a wide range of rates to be programmed. This is done by "chaining" up to 3 levels of subtables. If the size field of a Primary Table B entry is not zero, this entry contains a pointer to a Secondary Table which is located off-chip. A
Secondary Table 870 may have up to 255 entries, each of which may point to a Tertiary Table or may contain a Circuit ID. When table chaining is encountered, the offset field 867 is used to keep track of which entry is to be accessed in the lower-level table. At each visitation, the offset is incremented, modulo the table size.
The Stand-by Scheduler (SBS) is a secondary scheduling mechanism. As its name implies, it schedules traffic for bandwidth left over from the Schedule Table. There are 2 cases where stand-by traffic can be transmitted: (1) a transmit event resulted in no data sent for a circuit (lack of credits or lack of data); and (2) the Circuit ID programmed in the Schedule Table is zero, thereby pre-allocating a certain amount of bandwidth to stand-by traffic.
The SBS uses a version of the Calendar Queue algorithm, essentially a slotted time ring implemented as an array of linked lists. Each element of the array corresponds to a different time slot. Attached to each time slot is a list of circuits which are scheduled to send a cell at this time. A slot index advances with time. When a populated slot is found, a cell for the circuit at the head of the list at that slot can be transmitted. When a cell is transmitted for a particular circuit, the eligibility time for the next cell on that circuit is calculated and mapped to another time slot. Referring to FIG. 38, the Stand By Scheduler Calendar Table 878 is an on-chip table consisting of 64 entries. Each entry contains a head and tail index to describe a linked list of circuits attached to a particular slot. The links are stored in the Next CCtld field of word 3 in the Transmit Context Table 860. The slot index 877 advances with periods corresponding to the QM core clock. When a SBS opportunity arises, the next circuit to transmit is found by scanning forward from the point in time represented by the current value of the slot index. The next circuit to send is the one at the head of the list for the next populated slot. Once the next circuit is found, it is dequeued from the list and rescheduled. Rescheduling is performed by calculating the next slot at which the circuit should be sent. The calculation of the next slot is based on the SBS Interval field of Word 3 in the Transmit Context Table. This field is a 6-bit number representing the number of Calendar Table slots between successive transmission events for the circuit. The next slot for a circuit is the current slot plus this interval, modulo the table size. The net effect of the SBS is an approximation of the Weighted Fair Queueing algorithm. The weight of a given circuit is the inverse of its SBS Interval.
Another aspect of the Stand-by Scheduler is its ability to perform dynamic bandwidth allocation based on only the circuits which are "active," i.e., have data to send. Thousands of circuits may be enabled for stand-by bandwidth.
Only a small number, however, will likely be active at any one time. In order to more efficiently use stand-by bandwidth, the SBS keeps only active circuits in the scheduler. It receives messages from the process managing the Queue Table when a circuit becomes active or goes idle. The transition from active to idle occurs when a packet is dequeued resulting in all queues for the circuit becoming empty. The transition from idle to active occurs when a packet is enqueued to a circuit which has all empty queues . Any circuit may be scheduled using both the Schedule Table and the SBS simultaneously. This is useful for ATM Available Bit Rate ( "ABR" ) traffic .
The "sending" in the preferred embodiment starts with the delinking of a packet string (which may be incomplete) from its queue ( "dequeueing" ) and its linking to the current buffer of the Transmit Context Table 860 (as shown in FIG. 37) . The circuit entries of the Transmit Context Table are then polled to send the buffer contents of the current buffer (if not empty) to the corresponding "circuit" 63'. Cell data is read from the RAMBUS® DRAMs according to the "ping-pong" scheme described below.
When a packet is fully transmitted, its buffers are returned to the free buffer list. Completion of transmission of a packet is indicated when the next buffer of the transmit context table is directed to the descriptor 880 associated with the first buffer of the packet by the second word of the descriptor 882 of the last buffer of the packet, referring to pointer 883 in FIG. 39A. The free buffer manager (not shown) then checks whether there are other "owners" (such as for multicasting) by looking at the "owner" field of descriptor
880 of the SOP, and if none (if value is one, otherwise decrement) , as shown in FIG. 39B, it increments the free counter 890 by the buffer count 891 in the second word of descriptor 890. It moves the free buffer list head pointer 895 from the head of the free buffer list 896 to the descriptor to which descriptor 880 points, namely descriptor
881 of the buffer of the second cell, and enters in the next descriptor field of descriptor 880 a pointer to the previous head of the free buffer list 896. As seen in FIG. 39B, all three buffers are thus linked at the head of the free buffer list . 8. Transmission Credit Loops In the preferred embodiment, a hierarchical flow and congestion control scheme is provided by the use of multiple credit loops. A system of credits is established that indicates the ability of the MOM chip, for each of the eight output channels, to accept cells for transmission. As the MOM, for a particular channel is sending a packet, cell by cell, and as each cell is sent the MOM indicates, through the credit bits described above, that another cell can be transferred to the MOM chip. As shown in FIG. 31, the MOM, upon sending out a cell will increment the credit count 760, and as the QM transfers cells 762 to the MOM, the QM decrements the credit count 764. As noted above, the credits have a circuit ID such that the proper MOM channel credit is retained. In this preferred embodiment, as many as four transmit cells can be stored. The MOM has a FIFO in which the packet is reassembled from the cells.
When a cell is transmitted by the MOM chip, the credit sent back to the QM is a credit for a maximum length cell, which may be 17 octbytes when in cell mode or 16 octbytes when in packet mode (because the MOM deletes the burst header when in packet mode) . The QM, however, may send down something less than the maximum cell size. FIG. 32, which is duplicated for each output channel associated with the MOM chips, diagrammatically shows the mechanism by which the credits are processed in the MOM chip. There is a head pointer 770, a tail pointer 772, a virtual tail pointer 774, and a start of packet pointer 776. In this preferred embodiment there are 512, or four full 128-byte location in the transmit FIFO. In FIG. 32, there are 64 slots, each slot 778 representatively holding one octbyte. (The 64 octbytes equal the 512-byte storage capacity of the FIFO in this embodiment.)
At initialization the FIFO is empty, and the virtual tail is incremented, moving it through the FIFO locations. The virtual tail pointer stops when it reaches or attempts to reach the head pointer. Each time the virtual tail pointer increments, a single credit is sent via the transmit and receive credit managers in the MOM chip. These credits are accumulated in the QM for this circuit. As the MOM receives cells to this circuit, the tail pointer (this pointer points to real information representing actual cell lengths) is incremented. If the QM sends less than a full cell, the virtual tail pointer is corrected. When the MOM actually transmits the cells the head pointer is incremented. As the MOM sends out the cells the head pointer moves away from the virtual and the real tail pointers, opening up room in the FIFO. When the virtual tail pointer, which might have been corrected by the QM sending less than maximum cells, can increment a maximum cell length in the transmit FIFO, without wrapping the head pointer, a credit is sent and established in the QM.
The other remaining pointer, the start of packet pointer 776, has one important function. That function is to retain the starting location of the start of the packet, so that if there is a collision on an Ethernet cable, the packet that was collided with can be retransmitted, in accordance with the published specification.
With regard to FIG. 2, the virtual tail pointers are controlled by the transmit credit manager and the real tail pointers are controlled by the transmit FIFO "producer, " and the "consumer" controls the header and the start of packet pointers. All the pointers are accessible to all the transmit credit manager for comparison and for issuing credits . FIG. 33 indicates how the MOM FIFO, a two-port, 64- octbyte memory, is controlled. An arbiter 780 controls the most significant three address bits of the FIFO from the "producer" side to keep track of the cells loaded from the QM, and the lower six bits, the total of nine bits needed to address the 512 locations, are controlled by the tail pointer 782 (one shown of eight) . The virtual tail pointer 784 does not point to real data; it is a counter mechanism by which the credit manager can determine the number of credits to send to the QM. Another arbiter 786 and head pointers (one shown of eight) control the unloading and freeing up of the FIFO as packets are physically sent out by the MOM chip. The head pointer 788 controls the lower six bits of the FIFO from the unloading side of the FIFO. The consumer increments the head pointer as the data is sent out. The head, tail and start of header pointers are available to the transmit credit circuitry.
Referring to FIG. 26, a portion 742 of the first octbyte of the initial canonical header and, referring to FIG. 27, the burst header contain two credit flags, the "synch" flag and the "parent" flag. The synch flag is used at power up to properly establish the credit cycle operation described above. At power up, the MOM sends synch flags to the QM about every 10 milliseconds. When the QM has powered up, the QM looks for the synch flag, and when found the QM sends a synch acknowledge to the MOM. The MOM then will send up any credits as described above with the assurance that the QM is ready to accept the credits.
The parent flag is necessary because there can be a multiple of physical communication paths multiplexed into one channel of a MOM chip. When there is only one communication circuit connected to a MOM channel, as when the MOM is connected to an Ethernet, the credit system works as described above, but with many separate paths into one MOM channel, a method of maintaining credits for each of the paths connected to the one MOM channel was designed. One important aspect of this credit system is that it was necessary to ensure that none of the several communications paths connected to the one MOM channel could be blocked or locked out by another of the communication paths. In this embodiment, FIG. 34 shows two FIFO channels in a MOM chip. FIFO 800 operates with a single communications path. In this case, the MOM FIFO 800 is termed a leaf to indicate its operation with a single communications circuit. But FIFO 802 is associated with a FIFO channel that is connected to another chip, for example, a DAD chip 804 in this preferred embodiment, where the DAD is further connected to eight other communication circuits 804. In this case the FIFO 802 is termed a "parent" and the eight communications circuits connected to the DAD are the leaves. In this circumstance the QM maintains a credit for the individual leaves attached to the parent FIFO in the MOM. In this way the QM knows when the transmit FIFOs are filled and can accept no further cells. The QM can subsequently transfer cells to the other leaf by simply polling the credits in the parent and the leaves and transmit cells accordingly. In this manner one leaf cannot prevent the servicing of the other leaves.
Referring to FIG. 38, in the Schedule Table 866 in the QM, there is an indication 871 whether there is a parent associated with that particular circuit. The MOM, acting as a parent, sends up credits for the parent FIFO and for each of the leaves associated with that parent.
The Parent Credit Table 875 is a 64-entry on-chip table in the QM. Each entry contains a credit count for what is treated as a "parent circuit." When a circuit is bound to a parent circuit, it can only transmit cells onto the MAC bus if it has credits available in both its Transmit Context Table credit field and in its parents credit field in the Parent Credit Table.
When a cell is transmitted for a circuit with a parent, both the Transmit Context Table credits and the associated parent credits are decremented. Parent credit update cells from the parent channels are sent back to the QM which causes the parent credits to be incremented.
The Schedule Table is used to bind a circuit to a given parent circuit. The Use Parent Circuit Bit (P) 871 and the Parent Circuit ID field 872 are used for this purpose. If the schedule table entry has the P bit set, this means that this circuit has a parent and should use the Parent Circuit ID 872 to index the Parent Credit Table 875. 9. Ultra-High Speed Access on RAMBUS® RAMBUS® DRAMs 35 and 36 are off-the-shelf items. In the present invention they are used in a unique manner that maximizes the reading and writing bandwidth of the RAMBUS® for this data communication application.
The invention provides an interface 308 to the RAMBUS® which utilizes the dual bank organization of a RAMBUS® to increase the useful bandwidth of the RAMBUS® memory. Dual FIFO stacks are used with a controller to alternately address the separate DRAM banks within the RAMBUS®. The FIFOs increase the latency and increase the hardware overhead of the RAMBUS® controlling electronics, but attempts to guarantee that the sequential data written or read comes from the alternate banks. In this manner, one bank is precharging while the other is being accessed, and then the other bank is precharging while the first bank is accessed. Referring to FIG. 40, a RAMBUS® 900, is shown in block form showing the phase-locked loop, PLL, and the two dynamic RAM banks DRAM 1 and 2 (36, 37 respectively) . The multiplexed data/address bus into and out of the RAMBUS® is essentially an eight-bit wide serial port with an accompanying clock. The organization of data buffers in DRAMs 35 and 36 is such that all even data buffers (of 128 bytes) are on one bank and all odd data buffers are on the other. The arbiter 902 determines the order in which various requests for data are loaded onto FIFO stacks 904 and 906. The buffer addresses in the requests are either even or odd, and the requests with even buffers are loaded into FIFO 904 and the odd buffers into FIFO 906.
In the condition that the FIFOs are empty, the requests are loaded into the even or odd FIFO and the interleaver 908 transfers the request to the controller 910. As the requests become numerous, however, the requests in the FIFOs back up. When the requests have backed up into both FIFOs, the interleaver 908 takes the requests alternately from one FIFO and then the other ("ping-ponging") . Since these buffer addresses are alternately even and then odd, the controller accesses the two different banks in the RAMBUS® in an alternate or interleaved manner. In this operation, the first bank is being accessed while the second bank is being precharged, and, on the next access, the second bank will be accessed while the first bank is being precharged.
This alternative accessing substantially provides the fastest accessing for either writing or reading of the RAMBUS® and maximizes the throughput of the RAMBUS® memory as long as there are requests in both FIFO stacks, which is likely in high traffic situations. In contrast, requests presented on a purely FIFO basis likely will have a fractional number with back-to-back even or back-to-back odd requests causing a fractional number of time-outs to allow precharging.
Any latency relative to a particular request may in any case have occurred under normal access methods. The method here assures maximum usage of RAMBUS® resources under high traffic conditions. 10. Background Engine/Initialization
An important part of the invention is the use of the BE, interfaced on a MOM port during operation to perform monitoring and other higher-layer decision making. This allows for the BlazeWatch™ and Learn-and-Lock security systems to access configuration and control functions, among other applications .
With reference to FIG. 1, a Boot FLASH ROM 51 is provided that is accessible to BE 50 for initialization and start up of the system. The boot ROM instructions will run when there is a power up or a complete system reset. The boot will test and verify that the section of the BE DRAM 53 is operational and reliable. This section is where the ISB code and the BlazeNet Runtime Kernel (BeRT) will reside. The first IF (hex) or 32 (decimal) addresses of ROM 51 hold the initial interrupt vectors. Addresses 20-7F hold ROM information; 80-FF hold console support interface Routines, 100-4FF hold a MOM attribute table; 500-1FFFB hold the boot image; and 1FFFC- 1FFFF hold the boot image checksum of a cyclical redundancy check (CRC) . In this embodiment, the remaining BE DRAM 53 will be tested in parallel with running the BeRT initialization process. The boot also tests the interrupt structure and operation to insure that the BARK (the background engine kernel) can receive interrupts, for example, from timers. Next the boot will initialize the I2C bus 62 and assign addresses to the chips attached to the I2C bus . The boot then determines the ID of chips on the bus, including revision level. The boot then looks up the ID of the chips found, and an initializer is found in the boot directory which is downloaded and executed.
The main system image is in the Nonvolatile Storage 52 in a compact flash card containing, for example 10 Mbytes of system software. Basic information is transferred on the I2C bus to the RE 40 and MOMs 10 and 20. The complete image is subsequently transferred on the DMA channel 64.
The above discussion describes the preferred embodiment of the invention (s) at the time of filing. It should be clear that equivalent components and functions may be substituted without departing from the substance of the invention (s) . Various mixes of hardware and software implementation are possible while retaining the benefits of the invention (s) . Because the invention is intended to be highly flexible and scalable, it is the cooperation of the modules here disclosed that is important, rather than the number of modules and ports . 11. Scheduling for Multimedia Data Streams
Multimedia applications use both reliable and unreliable forms of communication over data networks. Control signals must be received in the order in which they are sent and cannot be lost. Hence, control signals require a reliable form of communication. Audio and video data are usually carried over unreliable best-effort delivery protocols such as UDP. The Real Time Protocol standard consists of two protocols, Real Time Control Protocol (RTCP) that runs above TCP, and Real Time Protocol (RTP) that runs above UDP. These protocols provide a thin shim over the TCP and UDP transport layers to support multimedia communications. For example, the RTP header consists of a timestamp and sequence number. The receiving station (s) can thus eliminate duplicate packets, out of sequence packets, synchronize sound, video, and data and achieve continuous playback. When there are multiple receivers the sender uses IP Multicast instead of replicating the packets to each receiver. The receivers join the IP multicast group that is exchanged in the control channel to receive packets. The H.323 standard generally uses the RTP protocols for transport.
Multimedia applications require quality of service policies such as guaranteed bandwidth and weighted priority to ensure timely delivery of packets. Having sufficient bandwidth for multimedia applications is critical to application integrity but is difficult to achieve in large data networks. In addition, the multimedia data has to contend with all the other data packets from non-real time applications that easily congest internetworking switches. These problems are solved by using a multimedia application switch, here presented, that maintains the evolving state of the applications that are communicating through it.
Figure 41 is a diagram of flow information data structures 1100, 1102 located in the forwarding engine (FE) code and data DRAM 45 (Figure 1) , and a portion of an application policy record 1110, also located in the forwarding engine code and data DRAM 45. Each flow has two flow information data structures 1100, 1102. A first flow information data structure 1100 is for the sender to receiver flow direction. A second flow information data structure 1102 is for the receiver to sender flow direction.
The flow information data structures 1100, 1102 have a plurality of fields. A prehash data field 1115 holds information extracted from a data packet before hashing takes place. The data extracted is that which is used in the flow identification process. The flow handler field 1120 is a pointer to a software routine that completes any additional processing required for a flow of a given type. The flow queue instructions field 1125 contains the instruction for placing the flow on a particular queue and the number of the particular queue is stored in the flow queue number field 1130. The flow byte and packet counter field 1135 holds the byte and packets counts for the flow. The reverse flow data field 1137 links the two flow information data structures 1100, 1102 together. The reverse flow data field of the sender/receiver flow information data structure 1100 has a pointer to the receiver/sender flow information data structure 1102 and vice versa. The application data field 1140 holds a pointer that points to the application policy record 1110. In the present embodiment, the application data field 1140 of both the flow information data structures points to the same policy record, however, they may each point to different policy records in alternative embodiments of the invention. The flow maintenance data field 1145 contains software overhead that keeps the data structures consistent within the switch.
The application policy record 1110 holds handling data and parameters for each type of flow that may come through the switch. The portion of the application policy record shown in Figure 41 has ten fields, a multimedia application ID 1150, a control policy ID 1155, a sender IP address 1160, a receiver IP address 1165, a voice-sender port number field 1170, a voice-receiver port number field 1175, a video-sender port number field 1180, a video-receiver port number field 1185, a voice policy ID 1190, and a video policy ID 1195.
The application switch watches for new control connections that are set up between a sender and one or more receivers. An example of a set up standard that may be used is the ITU H.245 protocol for multimedia data. When a control connection is opened, the switch creates a new flow record for each direction of the flow (sender to receiver and receiver to sender) 1100, 1102. The flow records are linked together at the reverse flow data fields 1137. The switch eavesdrops on the exchange between the source and destination establishing the connection between them. The information about the source and destination and the exchange is stored in the application data fields 1140 of the flow records 1100, 1102. When the sender indicates the addresses (UDP port numbers) for the audio and video channels in the control channel, the application switch stores this information in the flow record 1100, 1102, looks up the policy that is configured for this application and prepares for the subsequent portions of the transaction by creating new lookup records for the connection set-up handler for switching the audio and video data that will follow.
In the case where there are multiple receivers, the application switch would obtain the IP Multicast group for the audio/video data from the control connection and set up a single flow record that would be used when the packets from the application arrives. Instead of a flow queue number in the record, it has a list of queues, one for each receiver. It would then instruct the queue manager to queue the packet to each one of the queues. This together with the multicast transmission capability of the queue manager would eliminate any need for making a separate copy of the packet for each receiver. Figure 42 is a flow chart of the control connection process in the application switch. The receive process in the application switch dispatches the packets received from the queue manager to different handlers that forward the packets by instructing the queue manager to place them on specific outgoing queues. There are three different handlers that are used for handling multimedia application packets. The handlers are: the connection setup handler, the multimedia control connection handler, and the policy handler for the multimedia data. When the receive process in the application switch receives any packets for which there is no entry in the hash table, block 1200, the switch dispatches these packets to the connection setup handler, block 1205. When the multimedia application is invoked, the first packet is the one that indicates the opening of the control connection between the sender and the receiver. The connection setup handler identifies this packet by matching the destination port number field of the TCP header to a well known port number that is assigned by the IETF, block 1210. Once the packet is identified to be the start of a new multimedia flow, the connection setup handler creates two new flow records, block 1220, -- one for the flow between the sender and the receiver and the other for the flow between the receiver and the sender. It assigns the multimedia control connection handler to these two new flows and programs the relay engine hash table with the flow tags for the flow records that were created, block 1220. All subsequent packets that are received from both the sender and receiver are now dispatched to the multimedia control connection handler, block 1225. This handler eavesdrops into the packets and stores information from them into the application data field of the flow record. Among the information that is exchanged between the sender and receiver, vital for application switching, is the information on the port numbers that are to be used for sending the voice and video data. When this information is exchanged, the multimedia control connection handler stores the information locally and consults the policy database to find the policy that is configured for the voice and video data, blocks 1230, 1235. It then creates new entries in the transport lookup table that is used by the connection setup handler indicating the policy to be used when the voice and video connections are initiated, block 1240. Figure 43 is a flow chart of the video and voice connection data flow. When the first packet of the voice and video connection arrives at the switch, the receive process dispatches it to the connection setup handler, block 1300. Since the connection setup handler has been primed by the multimedia control connection handler, it finds the policy that is to be applied to these new flows, block 1305. It then creates a flow record, assigns the policy handler based on the policy that is configured for the application and programs the hash table with the flow tag for the flow record, block 1310. Subsequently, when the voice and video connection packets arrive, the receive process directly dispatches them to the policy handler which forward the packet, block 1315. All the flows remain active until an end-of-flow indication is received when the flow records are torn down and hash table entries are removed, blocks 1320, 1325.
It is to be understood that the above-described embodiments are simply illustrative of the principles of the invention. Various and other modifications and changes may be made by those skilled in the art which will embody the principles of the invention and fall within the spirit and scope thereof .

Claims

CLAIMSWhat is claimed is:
1. A process for flexibly connecting between a receive physical path and a transmit physical path a flow of data packets, said process comprising:
(a) receiving a data packet on said receive physical path; (b) determining whether said data packet is part of a set-up sequence associated with a class of multimedia stream data and identified with a particular flow, and if so, then applying a quality of service sequence for transmission of packets identified with said class of multimedia stream data; and,
(c) transmitting data packets that are part of said particular flow according to said applied quality of service sequence .
2. The process of Claim 1 wherein said step of determining whether said data packet is part of said set-up sequence comprises the step of comparing the contents of a field of said data packet with a particular pattern of information indicative of such a set-up sequence.
3. The process of Claim 1 wherein said step (c) of determining whether said data packet is identified with said particular flow further comprises comparing the contents of an identifying field of said data packet with the contents of a corresponding field in data packet previously determined to be part of a start-up sequence for said particular flow.
4. The process of Claim 3 wherein said step of comparing the contents of said fields is performed by comparing the results of hashing said fields.
5. The process of Claim 2 wherein said pattern of information corresponds to unique information in a set-up data packet under the ITU H.245 Protocol.
6. The process of Claim 1 further comprising the step (al) of dividing said received data packet into canonical cells upon receipt of said data packet.
7. The process of Claim 6 wherein step (d) of transmitting data packets is performed by transmitting sequentially the data in said respective canonical cells extracted from received data packets .
8. The process of Claim 6 further comprising the steps of storing each sequential one of said cells of said received data packet in a memory location; and logically linking and queuing said stored cells for transmission .
9. The process of Claim 8 wherein said logically linking and queuing are performed by linking queue pointers to the respective memory locations where said cells are stored.
10. The process of Claim 9 wherein said quality of service sequence is determined by a sequence of entries in a table of pointers to said queue pointers.
11. A process for flexibly connecting between a receive physical path and a transmit physical path the flow of data packets to be converted continuously by an end user into sense data for human perception, said process comprising:
(a) receiving a data packet on said receive physical path; (b) dividing said received data packet into canonical cells; (c) for each sequential one of said cells,
(i) storing said cell and logically linking it to a prior cell divided from the same data packet, if any; (ii) if said cell is the first cell of said data packet, determining whether said cell is part of a set-up sequence associated with a class of multimedia stream data by comparing the contents of a field of said cell with a particular pattern of information indicative of such a set-up sequence, if so, then applying a quality of service sequence for transmission of packets identified with said class of multimedia stream data; (iii) if said cell is the first cell of said data packet, determining whether said data packet is identified with a particular flow by comparing the contents of an identifying field of said cell with the contents of a corresponding field in a data packet previously determined to be part of a start- up sequence for said particular flow; and
(d) transmitting data packets that are part of said flow according to said linking of cells and said applied quality of service sequence.
12. The process of claim 11 wherein said particular pattern of information corresponds to unique information in a set-up packet under the ITU H.245 protocol.
13. The process of claim 11 wherein said quality of service sequence is determined by a sequence of entries in a table of pointers to pointers .
14. The process of claim 11 wherein said step of comparing the contents of said fields is performed by comparing the results of hashing said fields.
15. The process of claim 11 wherein each stored and linked cell is queued for transmission.
16. The process of claim 11 wherein step (c) (i) further comprises the step of queuing said stored and linked cells for transmission.
17. The process of claim 16 wherein said logically linking and queuing are performed by linking queue pointers to the respective memory locations where said cells are stored.
18. The process of claim 17 wherein said quality of service sequence is determined by a sequence of entries in a table of pointers to said queue pointers .
19. An apparatus for flexibly connecting between a receive physical path and a transmit physical path a flow of data packets, said apparatus comprising: receiving means for receiving a data packet on said receive physical path; set-up sequence means for determining whether said data packet is part of a set-up sequence associated with a class of multimedia stream data; quality of service means for applying a quality of service sequence to said data packet if it is a part of a setup sequence; flow determining means for determining whether said data packet is identified with a particular flow; and transmitting means for transmitting data packets of that particular flow according to said quality of service sequence.
20. The apparatus of Claim 19 wherein said set-up sequence means further comprises a first comparing means for comparing the contents of a field of said data packet with a particular pattern of information indicative of a particular set-up sequence.
21. The apparatus of Claim 19 wherein said flow determining means further comprises a second comparing means for comparing the contents of an identifying field of said data packet with the contents of a corresponding field in a data packet previously determined to be part of a start-up sequence for said particular flow.
22. The apparatus of Claim 21 wherein said second comparing means further comprises means for comparing the results of hashing said fields.
23. The apparatus of Claim 20 wherein said pattern of information corresponds to unique information in a set-up data packet under the ITU H.245 protocol.
24. The apparatus of Claim 19 wherein said receiving means further comprises means for dividing said received data packet into canonical cells upon receipt of said data packet.
25. The apparatus of Claim 24 wherein said transmitting means sequentially transmits that data in said respective canonical cells extracted from received data packets.
26. The apparatus of Claim 24 further comprising: storing means for storing each sequential one of said cells of said received packet in a memory location; and queuing means for logically linking and queuing said stored cells for transmission.
27. The apparatus of Claim 26 wherein said queuing means further comprises means for linking queue pointers to the respective memory locations where said cells are stored.
28. The apparatus of Claim 27 wherein said quality of service means further comprises a sequence of entries in a table of pointers to said queue pointers .
29. An apparatus for flexibly connecting between a receive physical path and a transmit physical path a flow of data packets, said apparatus comprising: an interface connected to the receive physical path and to the transmit physical path, said interface to receive a data packet; a multimedia data stream detector connected to said interface to determine whether said data packet is associated with a particular class of multimedia stream data; a flow detector connected to said interface to determine whether said data packet is part of a particular flow; a queue manager assigning transmission of said data packet to one of a plurality of queues in response to said flow detector and said multimedia data stream detector, said assigned queue providing a particular quality of service.
30. A network switch for flexibly connecting between a receive physical path and a transmit physical path a flow of data packets, comprising: a network interface connected to the receive physical path and the transmit physical path, said network interface to receive a data packet; a forwarding engine connected to said network interface to determine whether said data packet indicates a class of multimedia stream data and whether said data packet is part of a particular flow; and a queue manager connected to said forwarding engine for scheduling transmission of said data packet responsive to said determinations of said forwarding engine.
31. A network switch for flexibly connecting between a receive physical path and a transmit physical path a flow of data packets, comprising: a network interface to receive and to transmit a data packet ; a memory to store said data packet; a database having stored data about multimedia data streams; a microprocessor interacting with said memory to determine whether said data packet indicates a multimedia data stream using data stored in said database, said microprocessor also determining if said packet is part of a particular flow, said microprocessor determining a quality of service in response to said multimedia data stream and flow determinations; and, a queue manager to transmit said data packet according to said quality of service.
32. A process for flexibly connecting between a receive physical path and a transmit physical path a flow of data packets, said process comprising: a) receiving a data packet from a sender to a receiver on said receive physical path; b) identifying a multimedia data flow by determining whether said data packet is part of a set-up sequence by identifying at least one multimedia data flow port number in said data packet; c) eavesdropping on an exchange between said sender and receiver for audio and video port numbers to be used for transmitting data packets in said multimedia data flow, said exchange establishing a connection between said sender and said receiver; d) assigning a quality of service to be applied to subsequent data packets in said multimedia data flow in response to said audio and video port numbers; and e) transmitting subsequent data packets of said multimedia data flow according to said quality of service.
PCT/US2000/008949 1999-04-03 2000-04-01 Switching systems and process for automatic detection of and quality of service for multimedia applications WO2000060899A1 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
EP00921677A EP1172017A1 (en) 1999-04-03 2000-04-01 Switching system and process for automatic detection of and quality of service for multimedia applications
JP2000610253A JP2003524934A (en) 1999-04-03 2000-04-01 Automatic detection switch system and method for multimedia applications
AU41963/00A AU4196300A (en) 1999-04-03 2000-04-01 Switching systems and process for automatic detection of and quality of service for multimedia applications

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US28561799A 1999-04-03 1999-04-03
US09/285,617 1999-04-03

Publications (1)

Publication Number Publication Date
WO2000060899A1 true WO2000060899A1 (en) 2000-10-12

Family

ID=23095019

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2000/008949 WO2000060899A1 (en) 1999-04-03 2000-04-01 Switching systems and process for automatic detection of and quality of service for multimedia applications

Country Status (4)

Country Link
EP (1) EP1172017A1 (en)
JP (1) JP2003524934A (en)
AU (1) AU4196300A (en)
WO (1) WO2000060899A1 (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001019040A1 (en) 1999-09-03 2001-03-15 Broadcom Corporation Apparatus and method for enabling voice over ip support for a network switch
EP1202491A2 (en) * 2000-10-31 2002-05-02 Agilent Technologies, Inc. - a Delaware corporation - Measuring network performance parameters in data communication networks
WO2002041575A2 (en) * 2000-11-07 2002-05-23 Surgient Networks, Inc. Systems and method for managing differentiated service in inform ation management environments
WO2002084957A2 (en) * 2001-04-13 2002-10-24 Motorola, Inc., A Corporation Of The State Of Delaware Manipulating data streams in data stream processors
WO2005022847A1 (en) * 2003-09-02 2005-03-10 Koninklijke Philips Electronics N.V. Method for cell scheduling in a communication network
CN100401842C (en) * 2005-04-14 2008-07-09 华为技术有限公司 Method for identifying flow bisness
US10764201B2 (en) 2017-11-28 2020-09-01 Dornerworks, Ltd. System and method for scheduling communications
CN112347142A (en) * 2020-11-17 2021-02-09 上海幻电信息科技有限公司 Data processing method and device

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9063749B2 (en) 2011-05-27 2015-06-23 Qualcomm Incorporated Hardware support for hashtables in dynamic languages

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0710046A2 (en) * 1994-10-31 1996-05-01 International Business Machines Corporation ATM cell Scheduler
WO1997050276A1 (en) * 1996-06-21 1997-12-31 British Telecommunications Public Limited Company Atm partial cut-through
WO1998009409A1 (en) * 1996-08-30 1998-03-05 Mmc Networks, Inc. Cell queuing in atm switches

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH05227211A (en) * 1992-02-17 1993-09-03 Fujitsu Ltd Packet switching system
JP3290438B2 (en) * 1992-06-17 2002-06-10 アジレント・テクノロジーズ・インク Network monitoring method and apparatus
JP3151103B2 (en) * 1994-03-30 2001-04-03 株式会社日立製作所 Communication system and communication method
JPH10322392A (en) * 1997-05-16 1998-12-04 Hitachi Ltd Packet network system and communication controller

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0710046A2 (en) * 1994-10-31 1996-05-01 International Business Machines Corporation ATM cell Scheduler
WO1997050276A1 (en) * 1996-06-21 1997-12-31 British Telecommunications Public Limited Company Atm partial cut-through
WO1998009409A1 (en) * 1996-08-30 1998-03-05 Mmc Networks, Inc. Cell queuing in atm switches

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001019040A1 (en) 1999-09-03 2001-03-15 Broadcom Corporation Apparatus and method for enabling voice over ip support for a network switch
EP1202491A3 (en) * 2000-10-31 2004-01-21 Agilent Technologies, Inc. (a Delaware corporation) Measuring network performance parameters in data communication networks
EP1202491A2 (en) * 2000-10-31 2002-05-02 Agilent Technologies, Inc. - a Delaware corporation - Measuring network performance parameters in data communication networks
US6831890B1 (en) 2000-10-31 2004-12-14 Agilent Technologies, Inc. Measuring network performance parameters in data communication networks
WO2002041575A2 (en) * 2000-11-07 2002-05-23 Surgient Networks, Inc. Systems and method for managing differentiated service in inform ation management environments
WO2002041575A3 (en) * 2000-11-07 2003-12-18 Surgient Networks Inc Systems and method for managing differentiated service in inform ation management environments
WO2002084957A2 (en) * 2001-04-13 2002-10-24 Motorola, Inc., A Corporation Of The State Of Delaware Manipulating data streams in data stream processors
WO2002084957A3 (en) * 2001-04-13 2003-07-31 Motorola Inc Manipulating data streams in data stream processors
US7929433B2 (en) 2001-04-13 2011-04-19 Freescale Semiconductor, Inc. Manipulating data streams in data stream processors
WO2005022847A1 (en) * 2003-09-02 2005-03-10 Koninklijke Philips Electronics N.V. Method for cell scheduling in a communication network
CN100401842C (en) * 2005-04-14 2008-07-09 华为技术有限公司 Method for identifying flow bisness
US10764201B2 (en) 2017-11-28 2020-09-01 Dornerworks, Ltd. System and method for scheduling communications
CN112347142A (en) * 2020-11-17 2021-02-09 上海幻电信息科技有限公司 Data processing method and device
CN112347142B (en) * 2020-11-17 2024-03-01 上海幻电信息科技有限公司 Data processing method and device

Also Published As

Publication number Publication date
JP2003524934A (en) 2003-08-19
AU4196300A (en) 2000-10-23
EP1172017A1 (en) 2002-01-16

Similar Documents

Publication Publication Date Title
US6426943B1 (en) Application-level data communication switching system and process for automatic detection of and quality of service adjustment for bulk data transfers
US6714553B1 (en) System and process for flexible queuing of data packets in network switching
US6226267B1 (en) System and process for application-level flow connection of data processing networks
US6430184B1 (en) System and process for GHIH-speed pattern matching for application-level switching of data packets
US6522188B1 (en) High-speed data bus for network switching
JP3832816B2 (en) Network processor, memory configuration and method
US7100020B1 (en) Digital communications processor
JP2002541732A5 (en)
JP3872342B2 (en) Device for network and scalable network processor
JP4066382B2 (en) Network switch and component and method of operation
US6122279A (en) Asynchronous transfer mode switch
US5838904A (en) Random number generating apparatus for an interface unit of a carrier sense with multiple access and collision detect (CSMA/CD) ethernet data network
KR100334922B1 (en) Efficient output-request packet switch and method
CA1337664C (en) Packet switches, switching methods, protocols and networks
US5668809A (en) Single chip network hub with dynamic window filter
JP3817477B2 (en) VLSI network processor and method
JP3807980B2 (en) Network processor processing complex and method
US20030026267A1 (en) Virtual channels in a network switch
JPH10505977A (en) Asynchronous transfer mode adapter for desktop
WO1999059078A9 (en) Digital communications processor
EP1172017A1 (en) Switching system and process for automatic detection of and quality of service for multimedia applications
US7275117B2 (en) Fast pattern processor including a function interface system
WO2004062214A2 (en) System and method for providing quality of service in asynchronous transfer mode cell transmission
Adam et al. Experience with the vunet: A network architecture for a distributed multimedia system

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX NO NZ PL PT RO RU SD SE

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
ENP Entry into the national phase

Ref country code: JP

Ref document number: 2000 610253

Kind code of ref document: A

Format of ref document f/p: F

WWE Wipo information: entry into national phase

Ref document number: 2000921677

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 2000921677

Country of ref document: EP

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

WWW Wipo information: withdrawn in national office

Ref document number: 2000921677

Country of ref document: EP