会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 7. 发明授权
    • Policy control list keys for network devices
    • 网络设备的策略控制列表键
    • US09210103B1
    • 2015-12-08
    • US14175963
    • 2014-02-07
    • Marvell Israel (M.I.S.L) Ltd.
    • Uri SafraiGil Levy
    • H04L29/06H04L12/931
    • H04L41/5041H04L49/00
    • A packet is received at an ingress port of a network device. A set of user defined bytes corresponding to the packet are populated with data included in or associated with the packet. One or more user defined bytes are selected, from the set of user defined bytes, to be used in a key for the packet. An ordering of the selected user defined bytes to be used for generating the key is specified. The key is generated using the selected user defined bytes and according to the ordering of the selected user defined bytes specified for the key. A processing action for the packet is determined based on the key. The network device processes the packet using the processing action.
    • 在网络设备的入口端口接收到分组。 与数据包对应的一组用户定义的字节由包含在数据包中或与数据包相关联的数据填充。 从用户定义的字节集合中选择一个或多个用户定义的字节,以在分组的密钥中使用。 指定用于生成密钥的所选用户定义字节的排序。 密钥使用所选择的用户定义的字节并根据为密钥指定的所选择的用户定义的字节的顺序生成。 基于密钥确定分组的处理动作。 网络设备使用处理动作处理数据包。
    • 8. 发明授权
    • Exact match lookup in network switch devices
    • 网络交换机设备中的精确匹配查找
    • US09171030B1
    • 2015-10-27
    • US13737608
    • 2013-01-09
    • Marvell Israel (M.I.S.L) Ltd.
    • Carmi AradGil Levy
    • G06F17/30
    • G06F17/3033H04L45/74H04L45/7453
    • In a method for populating a lookup table, a plurality of hash tables are provided. Each hash table is accessed by a respective hash function. A plurality of hashed values for a key are generated using the hash functions corresponding to the plurality of hash tables. The plurality of hashed values are used to determine whether the key can be inserted into one or more hash tables of the plurality of hash tables without colliding with keys previously stored at respective locations corresponding to the determined hashed values. When it is determined that the key can be inserted into multiple hash tables, it is then determined which one of the multiple hash tables is populated with the greatest number of keys. The hash table that is populated with the greatest number of keys is selected for insertion of the key, and the key is inserted into the selected hash table.
    • 在用于填充查找表的方法中,提供多个哈希表。 每个散列表都由相应的散列函数访问。 使用与多个哈希表相对应的哈希函数来生成密钥的多个散列值。 多个散列值用于确定密钥是否可以被插入到多个散列表的一个或多个哈希表中,而不会与先前存储在与确定的散列值对应的各个位置处的密钥相冲突。 当确定可以将密钥插入到多个散列表中时,则确定用最大数量的密钥填充多个散列表中的哪一个。 选择填充有最大数量的密钥的哈希表用于插入密钥,并将密钥插入到所选择的散列表中。
    • 9. 发明申请
    • EXACT MATCH HASH LOOKUP DATABASES IN NETWORK SWITCH DEVICES
    • 网络切换设备中快速匹配的查询数据库
    • US20140301394A1
    • 2014-10-09
    • US14012834
    • 2013-08-28
    • Marvell Israel (M.I.S.L) Ltd.
    • Carmi AradGil Levy
    • H04L12/743
    • H04L45/7453G06F17/303G06F17/30424H04L49/3009
    • In a method for forwarding packets in a network device a plurality of hash values is generated based on a lookup key. The plurality of hash values includes at least a first hash value generated using a first hash function, a second hash value generated using a second hash function and a third hash value generated using a third hash function. The third hash function is different from the first hash function and the second hash function. A lookup table is searched using the first hash value and the second hash value to determine an offset for the lookup key. Then, a forwarding table is searched using the third hash value and the offset determined for the lookup key to select a forwarding entry corresponding to the lookup key. The packet is forwarded to one or more ports of the network device based on the selected forwarding entry.
    • 在网络设备中转发分组的方法中,基于查找密钥生成多个哈希值。 多个散列值至少包括使用第一散列函数生成的第一散列值,使用第二散列函数生成的第二散列值和使用第三散列函数生成的第三散列值。 第三散列函数不同于第一散列函数和第二散列函数。 使用第一散列值和第二散列值来搜索查找表以确定查找关键字的偏移量。 然后,使用第三哈希值和为查找密钥确定的偏移来搜索转发表,以选择与查找密钥对应的转发条目。 基于所选择的转发条目将分组转发到网络设备的一个或多个端口。