US9270602B1 - Transmit rate pacing of large network traffic bursts to reduce jitter, buffer overrun, wasted bandwidth, and retransmissions - Google Patents

Transmit rate pacing of large network traffic bursts to reduce jitter, buffer overrun, wasted bandwidth, and retransmissions Download PDF

Info

Publication number
US9270602B1
US9270602B1 US13/732,337 US201213732337A US9270602B1 US 9270602 B1 US9270602 B1 US 9270602B1 US 201213732337 A US201213732337 A US 201213732337A US 9270602 B1 US9270602 B1 US 9270602B1
Authority
US
United States
Prior art keywords
data packets
subset
another
buckets
send ring
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active, expires
Application number
US13/732,337
Inventor
Alan B. Mimms
Timothy S. Michels
Jonathan M. Hawthorne
William R. Baumann
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
F5 Inc
Original Assignee
F5 Networks Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by F5 Networks Inc filed Critical F5 Networks Inc
Priority to US13/732,337 priority Critical patent/US9270602B1/en
Assigned to F5 NETWORKS, INC. reassignment F5 NETWORKS, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: HAWTHORNE, JONATHAN M., MICHELS, TIMOTHY S., BAUMANN, WILLIAM R., MIMMS, ALAN B.
Application granted granted Critical
Publication of US9270602B1 publication Critical patent/US9270602B1/en
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/21Flow control; Congestion control using leaky-bucket
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/22Traffic shaping
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F13/00Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
    • G06F13/14Handling requests for interconnection or transfer
    • G06F13/20Handling requests for interconnection or transfer for access to input/output bus
    • G06F13/28Handling requests for interconnection or transfer for access to input/output bus using burst mode transfer, e.g. direct memory access DMA, cycle steal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L49/00Packet switching elements
    • H04L49/90Buffering arrangements
    • H04L49/901Buffering arrangements using storage descriptor, e.g. read or write pointers

Definitions

  • This technology relates to a system and method for pacing network traffic between network devices.
  • a method for pacing data packets from one or more sessions comprises selecting, at a software component of a network traffic management device, a first bucket having a first predetermined transmit time.
  • the method comprises populating one or more selected data packet descriptors associated with one or more corresponding data packets in the first bucket.
  • the method comprises releasing the first bucket to a hardware component of the network traffic management device, wherein the hardware component processes the one or more data packet descriptors of the first bucket for the first predetermined transmit time.
  • a processor readable medium having stored thereon instructions for pacing data packets from one or more sessions, comprising machine executable code which when executed by at least one processor and/or network interface a network traffic management device to perform a method comprising selecting a first bucket having a first predetermined transmit time; populating one or more selected data packet descriptors associated with one or more corresponding data packets in the first bucket; releasing the first bucket to a hardware component of the network traffic management device, wherein the hardware component processes the one or more data packet descriptors of the first bucket for the first predetermined transmit time.
  • a network traffic management device comprises a memory containing non-transitory machine readable medium comprising machine executable code having stored thereon instructions for pacing data packets from one or more sessions.
  • a network interface configured to communicate with one or more servers over a network.
  • a processor coupled to the network interface and the memory, the processor configured to execute the code which causes the processor to perform, with the network interface, a method comprising: selecting a first bucket having a first predetermined transmit time; populating one or more selected data packet descriptors associated with one or more corresponding data packets in the first bucket; releasing the first bucket to a hardware component of the network traffic management device, wherein the hardware component processes the one or more data packet descriptors of the first bucket for the first predetermined transmit time.
  • the method performs comprises selecting, at the software component, a second bucket having a second predetermined transmit time that is the same as the first transmit time of the first bucket; populating one or more selected data packet descriptors associated with one or more corresponding data packets in the second bucket; releasing the second bucket to the hardware component of the network traffic management device, wherein the hardware component processes the one or more data packet descriptors of the second bucket for the second predetermined transmit time quanta.
  • FIG. 1 is a diagram of an example system environment that includes a network traffic management device in accordance with an aspect of the present disclosure.
  • FIG. 2A is a block diagram of the network traffic management device in accordance with an aspect of the present disclosure.
  • FIG. 2B illustrates a block diagram of the network interface in accordance with an aspect of the present disclosure.
  • FIG. 2C illustrates further details of the network traffic management device in accordance with an aspect of the present disclosure.
  • FIG. 3 illustrates an example transmit ring or bucket in accordance with an aspect of the present disclosure.
  • FIG. 4 illustrates a time line of an example transmit ring or bucket in accordance with an aspect of the present disclosure.
  • FIG. 5 illustrates a block diagram of hardware based time enforcement in performed by a high speed bridge (HSB) priority mechanism in accordance with an aspect of the present disclosure.
  • HSA high speed bridge
  • FIG. 6 illustrates an example transmit time line in accordance with an aspect of the present disclosure.
  • FIG. 7 illustrates a flow chart of the software implementation of populating buckets with data packet descriptors in accordance with an aspect of the present disclosure.
  • FIG. 8 illustrates a flow chart of the software implementation of populating buckets with data packet descriptors in accordance with an aspect of the present disclosure.
  • FIG. 1 is a diagram of an example system environment that includes a network traffic management device in accordance with an aspect of the present disclosure.
  • the example system environment 100 includes one or more Web and/or non Web application servers 102 (referred generally as “servers”), one or more client devices 106 and one or more network traffic management devices 110 , although the environment 100 can include other numbers and types of devices in other arrangements.
  • the network traffic management device 110 is coupled to the servers 102 via local area network (LAN) 104 and client devices 106 via a wide area network 108 .
  • LAN local area network
  • client device requests are sent over the network 108 to the servers 102 which are received or intercepted by the network traffic management device 110 .
  • Client devices 106 comprise network computing devices capable of connecting to other network computing devices, such as network traffic management device 110 and/or servers 102 . Such connections are performed over wired and/or wireless networks, such as network 108 , to send and receive data, such as for Web-based requests, receiving server responses to requests and/or performing other tasks.
  • client devices 106 include personal computers (e.g., desktops, laptops), tablets, smart televisions, video game devices, mobile and/or smart phones and the like.
  • client devices 106 can run one or more Web browsers that provide an interface for operators, such as human users, to interact with for making requests for resources to different web server-based applications and/or Web pages via the network 108 , although other server resources may be requested by client devices.
  • operators such as human users
  • the servers 102 comprise one or more server network devices or machines capable of operating one or more Web-based and/or non Web-based applications that may be accessed by other network devices (e.g. client devices, network traffic management devices) in the environment 100 .
  • the servers 102 can provide web objects and other data representing requested resources, such as particular Web page(s), image(s) of physical objects, JavaScript and any other objects, that are responsive to the client devices' requests. It should be noted that the servers 102 may perform other tasks and provide other types of resources. It should be noted that while only two servers 102 are shown in the environment 100 depicted in FIG. 1B , other numbers and types of servers may be utilized in the environment 100 .
  • one or more of the servers 102 may comprise a cluster of servers managed by one or more network traffic management devices 110 .
  • the servers 102 may be configured implement to execute any version of Microsoft® IIS server, RADIUS server, DIAMETER server and/or Apache® server, although other types of servers may be used.
  • Network 108 comprises a publicly accessible network, such as the Internet, which is connected to the servers 102 , client devices 106 , and network traffic management devices 110 .
  • the network 108 may comprise other types of private and public networks that include other devices.
  • Communications, such as requests from clients 106 and responses from servers 102 take place over the network 108 according to standard network protocols, such as the HTTP, UDP and/or TCP/IP protocols, as well as other protocols.
  • requests from the requesting client devices 106 may be sent as one or more streams of data packets over network 108 to the network traffic management device 110 and/or the servers 102 .
  • Such protocols can be utilized by the client devices 106 , network traffic management device 110 and the servers 102 to establish connections, send and receive data for existing connections, and the like.
  • network 108 may include local area networks (LANs), wide area networks (WANs), direct connections and any combination thereof, as well as other types and numbers of network types.
  • LANs local area networks
  • WANs wide area networks
  • Network devices such as client devices, 106 , servers 102 , network traffic management devices 110 , routers, switches, hubs, gateways, bridges, cell towers and other intermediate network devices may act within and between LANs and other networks to enable messages and other data to be sent between network devices.
  • communication links within and between LANs and other networks typically include twisted wire pair (e.g., Ethernet), coaxial cable, analog telephone lines, full or fractional dedicated digital lines including T1, T2, T3, and T4, Integrated Services Digital Networks (ISDNs), Digital Subscriber Lines (DSLs), wireless links including satellite links and other communications links known to those skilled in the relevant arts.
  • the network 108 is configured to handle any communication method by which data may travel between network devices.
  • LAN 104 comprises a private local area network that allows communications between the one or more network traffic management devices 110 and one or more servers 102 in the secured network. It is contemplated, however, that the LAN 104 may comprise other types of private and public networks with other devices. Networks, including local area networks, besides being understood by those skilled in the relevant arts, have already been generally described above in connection with network 108 and thus will not be described further.
  • the one or more network traffic management devices 110 is interposed between client devices 106 with which it communicates with via network 108 and servers 102 with which it communicates with via LAN 104 .
  • the network traffic management device 110 operates in conjunction with a clustered multi-processing (CMP) system which includes one or more network traffic management devices 110 , each of which having one or more cores or processors 200 ( FIG. 2A ).
  • CMP clustered multi-processing
  • the network traffic management device 110 manages network communications, which may include one or more client requests and server responses, via the network 108 between the client devices 106 and one or more of the servers 102 .
  • the network traffic management device 110 may manage the network communications by performing several network traffic related functions involving the communications. Some functions include, but are not limited to, load balancing, access control, and validating HTTP requests using JavaScript code that are sent back to requesting client devices 106 .
  • FIG. 2A is a block diagram of the network traffic management device in accordance with an aspect of the present disclosure.
  • the example network traffic management device 110 includes one or more device processors or cores 200 , one or more device I/O interfaces 202 , one or more network interfaces 204 , and one or more device memories 206 , which are coupled together by one or more bus 208 .
  • the network traffic management device 110 can be configured to include other types and/or numbers of components and is thus not limited to the configuration shown in FIG. 2A .
  • Device processor 200 of the network traffic management device 110 comprises one or more microprocessors configured to execute computer/machine readable and executable instructions stored in the device memory 206 . Such instructions, when executed by one or more processors 200 , implement general and specific functions of the network traffic management device 110 , including the inventive process described in more detail below. It is understood that the processor 200 may comprise other types and/or combinations of processors, such as digital signal processors, micro-controllers, application specific integrated circuits (“ASICs”), programmable logic devices (“PLDs”), field programmable logic devices (“FPLDs”), field programmable gate arrays (“FPGAs”), and the like. The processor 200 is programmed or configured according to the teachings as described and illustrated herein.
  • Device I/O interfaces 202 comprise one or more user input and output device interface mechanisms.
  • the interface may include a computer keyboard, mouse, display device, and the corresponding physical ports and underlying supporting hardware and software to enable the network traffic management device 110 to communicate with other network devices in the environment 100 .
  • Such communications may include accepting user data input and providing user output, although other types and numbers of user input and output devices may be used.
  • the network traffic management device 110 may communicate with the outside environment for certain types of operations (e.g. smart load balancing) via one or more network management ports.
  • Network interface 204 comprises one or more mechanisms that enable the network traffic management device 110 to engage in network communications over the LAN 104 and the network 108 using one or more of a number of protocols, such as TCP/IP, HTTP, UDP, RADIUS and DNS. However, it is contemplated that the network interface 204 may be constructed for use with other communication protocols and types of networks. Network interface 204 is sometimes referred to as a transceiver, transceiving device, or network interface card (NIC), which transmits and receives network data packets over one or more networks, such as the LAN 104 and the network 108 .
  • NIC network interface card
  • each processor 200 may use the same single network interface 204 or a plurality of network interfaces 204 .
  • the network interface 204 may include one or more physical ports, such as Ethernet ports, to couple the network traffic management device 110 with other network devices, such as servers 102 .
  • the interface 204 may include certain physical ports dedicated to receiving and/or transmitting certain types of network data, such as device management related data for configuring the network traffic management device 110 or client request/server response related data.
  • Bus 208 may comprise one or more internal device component communication buses, links, bridges and supporting components, such as bus controllers and/or arbiters.
  • the bus 208 enables the various components of the network traffic management device 110 , such as the processor 200 , device I/O interfaces 202 , network interface 204 , and device memory 206 , to communicate with one another.
  • the bus 208 may enable one or more components of the network traffic management device 110 to communicate with one or more components in other network devices as well.
  • Example buses include HyperTransport, PCI, PCI Express, InfiniBand, USB, Firewire, Serial ATA (SATA), SCSI, IDE and AGP buses.
  • SATA Serial ATA
  • IDE Integrated Circuit ATA
  • Device memory 206 comprises computer readable media, namely computer readable or processor readable storage media, which are examples of machine-readable storage media.
  • Computer readable storage/machine-readable storage media may include volatile, nonvolatile, removable, and non-removable media implemented in any method or technology for storage of information. Examples of computer readable storage media include RAM, BIOS, ROM, EEPROM, flash/firmware memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the information, which can be accessed by a computing or specially programmed network device, such as the network traffic management device 110 .
  • Such storage media includes computer readable/processor-executable instructions, data structures, program modules, or other data, which may be obtained and/or executed by one or more processors, such as device processor 200 . Such instructions, when executed, allow or cause the processor 200 to perform actions, including performing the inventive processes described below.
  • the memory 206 may contain other instructions relating to the implementation and operation of an operating system for controlling the general operation and other tasks performed by the network traffic management device 110 .
  • FIG. 2B illustrates a block diagram of the network interface in accordance with an aspect of the present disclosure.
  • FIG. 2B shows the DMA processes used by network interface 204 for using multiple independent DMA channels with corresponding multiple applications, where each application has its own driver, and for sending packets.
  • the host system 111 can send a network data packet stored in host memory 212 to the network 108 via network interface controller 204 and Ethernet port 236 .
  • a send DMA operation is performed when the host system 111 uses a DMA channel to move a block of data from host memory 22 to a network interface controller peripheral (not shown) via network 108 .
  • the host processor 200 places the target network data packet into DMA packet buffer 216 and creates a DMA send descriptor (not shown separately) in send DMA descriptor rings 218 .
  • the DMA send descriptor is jointly managed by the host system 111 and the network interface controller 204 .
  • the DMA send descriptor includes an address field and length field.
  • the address field points to the start of the target network data packet in DMA packet buffer 216 .
  • the length field declares how many bytes of target data are present in the DMA packet buffer 216 .
  • the DMA send descriptor also has a set of bit flags (not shown) used to signal additional target data control and status information.
  • return DMA descriptor rings and send DMA descriptor rings 218 can be physically in the same hardware memory blocks functioning as return and send DMA rings, respectively, at different times.
  • separate and distinct memory blocks within host memory 212 DMA memory resources 214 may be reserved for each return DMA descriptor rings and send DMA descriptor rings 218 .
  • Host system 111 places the send descriptor on the send DMA descriptor rings 218 in host system memory 212 .
  • the host processor 200 determines the QoS of the network packet to be transferred to the network 108 and moves the network packet to the appropriate DMA packet buffer 216 and places the descriptor on the appropriate descriptor rings 1-4 in send DMA descriptor rings 218 .
  • the descriptor ring in send DMA descriptor rings 218 is chosen by the host system 111 which selects the DMA channel, its associated peripheral, and the QoS level within the DMA channel.
  • Send descriptors created by host system 111 in send DMA descriptor rings 218 can be of variable types, where each descriptor type can have a different format and size.
  • the send DMA descriptor rings 218 are capable of holding descriptors of variable type.
  • the host processor 200 writes one or more mailbox registers 230 of the network interface controller 204 to notify the network interface controller 204 that the packet is ready. In performing this notification, the host processor 200 performs a write operation to a memory mapped network interface controller register (mailbox register 230 ).
  • the host processor 200 can report the addition of multiple descriptors onto the send DMA ring in a single update, or alternatively, in multiple updates.
  • the appropriate packet DMA engine within DMA engine 224 is notified that the packet is ready.
  • the packet DMA engine 224 can be selected from available DMA channels, or if a specific application has a dedicated DMA channel, the associated packet DMA engine 224 for that channel is used.
  • the DMA engine 224 retrieves the DMA descriptor from the send DMA descriptor rings 218 . When multiple descriptors are outstanding in the send DMA descriptor rings 218 , the DMA Engine 224 may retrieve more than one descriptor. Retrieving multiple descriptors at a time maximizes bus bandwidth and hardware efficiency.
  • the DMA engine 224 is capable of receiving and processing send descriptors of variable type, format, and size.
  • the packet DMA engine 224 monitors the progress of the host DMA operations via a set of mailbox registers 230 .
  • Each packet DMA engine 224 supports its own set of mailbox registers 230 .
  • the mailbox registers 230 reside in a mapped address space of the network interface controller 204 .
  • the host processor 200 accesses the mailbox registers 230 by performing memory mapped read and write transactions to the appropriate target address.
  • the mailbox registers 230 also contain ring status information for the Ring to QoS Mapper 228 .
  • the packet DMA engine 224 reads the send descriptor, performs the DMA operation defined by it, and reports to the host system 111 that the DMA operation is complete.
  • data is received from one or more CPU Bus read transactions (e.g., HyperTransport or PCI Express read transactions).
  • DMA scheduler 226 chooses packets out of packet buffers 216 based upon the priority of the queued network data packets and schedules the transfer to the appropriate packet DMA engine 224 .
  • packet DMA engine 224 For clarity and brevity, only a single packet buffer, a single DMA scheduler, and DMA engine are shown in FIG. 2B , but it should be understood that additional packet buffers, DMA schedulers, and DMA engines supporting the independent DMA channels 1-n and associated applications App(1)-App(n) can be included in network interface controller 204 .
  • the packet buffers 216 are selected based on the novel scheme (discussed below) using DMA scheduler 226 .
  • the DMA scheduler 226 selects which descriptor ring 1-4 out of return DMA descriptor rings (also referred to as return DMA rings, or send rings) within DMA memory resources 212 to service and the matching packet buffer 216 is accessed for a single packet. The scheduling process is then repeated for the next packet.
  • Each network packet retrieved from a packet buffer 216 is routed to the appropriate DMA channel controlled by the respective packet DMA engine such as the packet DMA engine 224 .
  • the DMA channel segments the network packet for delivery to host memory 212 via several, smaller, HyperTransport packets. These HyperTransport packets are interleaved with HyperTransport packets from the other DMA channels in the network interface controller 204 .
  • Ring to QoS Mapper 228 examines the assigned send DMA ring in send DMA descriptor rings 218 and receives packet data and packet control information from the packet DMA engine 224 . Using the control information, the Ring to QoS Mapper 228 stamps the appropriate QoS onto the network data packet, thereby allowing host system 111 to send the network data packet back to the network 108 . For example, using the control information, the Ring to QoS Mapper 228 can create and prepend a HiGig header to the packet data.
  • An egress DMA routing interface 232 arbitrates access to the network for DMA send packets.
  • the egress DMA routing interface 232 arbitrates its access to the Ethernet port 236 and routes the packet to the correct interface if there is more than one present in the network interface controller 204 .
  • the egress DMA routing interface 232 behaves like a crossbar switch and monitors its attached interfaces for available packets.
  • the egress DMA routing interface 232 reads the packet from the selected ring to QoS mapper 228 and writes it to the destination interface.
  • the egress DMA routing interface 232 moves complete packets to Ethernet MACs 234 .
  • the egress DMA routing interface 232 uses a weighted arbitration scheme as discussed in more detail below.
  • the network interface controller 204 provides DMA services to a host complex such as the host system 111 on behalf of its attached I/O devices such as the Ethernet port 236 .
  • DMA operations involve the movement of data between the host memory 212 and the network interface controller 204 .
  • the network interface controller 204 creates and manages HyperTransport or other types of CPU Bus read/write transactions targeting host memory 22 . Data transfer sizes supported by DMA channels maintained by various components of application delivery controller 110 are much larger than the maximum HyperTransport or CPU bus transaction size.
  • the network interface controller 204 segments single DMA operations into multiple smaller CPU Bus or HyperTransport transactions. Additionally, the network interface controller 204 creates additional CPU bus or HyperTransport transactions to support the transfer of data structures between the network interface controller 204 and host memory 212 .
  • FIG. 2C illustrates further details of the network traffic management device in accordance with an aspect of the present disclosure.
  • the network traffic management device 110 is shown handling a plurality of independent applications App( 1 )-App(n) being executed by one or more processors (e.g., host processor 200 ) in host system 111 .
  • Each application in the plurality of applications App(1)-App(n) has its own respective application driver shown as Driver 1, Driver 2, . . . , Driver ‘n’ associated with the respective application, where the index n denotes an unlimited number of executing applications and drivers.
  • Applications App(1)-App(n) send and receive data packets from and to the network 108 (and/or LAN 104 ), respectively, using respective DMA channels (e.g., DMA channels 1-n).
  • DMA channels 1-n are uniquely assigned to individual applications out of App(1)-App(n).
  • drivers 1-n manage access to respective DMA channels 1-n and do not require knowledge of each other or a common management database or entity (e.g., a hypervisor).
  • each of applications App(1)-App(n) can be independent instances of different applications, or alternatively, may be independent instances of the same application, or further, may be different operating systems supported by different processors in host system 111 (e.g., host processor 200 ).
  • DMA channels 1-n each have unique independent resources allotted to them, for example, a unique PCI bus identity including a configuration space and base address registers, an independent view of host system memory 212 , a unique set of DMA descriptor ring buffers, a unique set of packet buffers 216 , unique DMA request/completion signaling (through interrupts or polled memory structures), and other resources.
  • Each of DMA channels 1-n is unique and independent thereby permitting management by separate unique drivers 1-n.
  • the network interface controller 204 classifies received packets to determine destination application selected from applications App(1)-App(n) and thereby selects the matching DMA channel to deliver the packet to the corresponding application.
  • packet classification includes reading packet header fields thereby permitting application identification.
  • packet classification includes hash calculation for distribution of packets across multiple instances of the same application, and/or reading a cookie stored, for example, in the network interface controller 204 associated with the application and the received network packet.
  • the present disclosure utilizes hardware and software in the network traffic management device when pacing network traffic being sent to another network device (e.g. client, server).
  • the purpose is for the network traffic management device to pace delivery of session data to the client to match the rate at which the client consumes the data, which adds value for mobile clients and networks.
  • the network traffic management device utilizes a transmit time calendar having a plurality of quanta of transmit times. For example, one quanta may be 1 microsecond, although other time durations are contemplated.
  • FIG. 3 illustrates an example transmit ring or bucket in accordance with an aspect of the present disclosure.
  • the bucket 300 is a software based data construct which holds a plurality of data packet DMA descriptors which point to the pending transmit packets and has packets from a plurality of various, different sessions.
  • the bucket 300 has a fence 302 which marks the last descriptor in the bucket.
  • Software determines what data packets to send and when to send those data packets.
  • the software communicates with the hardware component wherein the software enhances the data structures to communicate a time component with regard to when the selected data packets are to be sent.
  • the software component divides session data into multiple maximum segment sized (MSS) or smaller sized packets.
  • MSS maximum segment sized
  • the software component distributes the packets in buckets separated by fixed transmit times, wherein the buckets are then handed off to the hardware component, such as a DMA ring, to handle the delivery of the data packets populated in the buckets, by processing the buckets themselves
  • FIG. 4 illustrates a time line of an example transmit ring or bucket in accordance with an aspect of the present disclosure.
  • the transmit time calendar utilizes a plurality of buckets 300 where session data 400 , such as data packet DMA descriptors is populated into the buckets 300 .
  • Each bucket has a predetermined size and adjacent buckets are separate by a transmit time or quanta that is fixed (shown as T1-T4).
  • T1-T4 transmit time or quanta
  • the time calendar is configured to have a finite number of buckets, wherein the calendar effectively wraps around to the first bucket after the last bucket has been handled.
  • multiple packet descriptors can be placed in the same bucket to increase bandwidth.
  • the software component may decide whether to pace a data packet, as opposed to being bulk data ( FIG. 5 ) based on size, type of traffic the data packet is associated with, QoS parameters (based on flow) and the like.
  • one or more buckets 300 can be skipped for distribution, by the software component, to increase intra-packet spacing.
  • One way for determining how many buckets to skip before placing a data packet descriptor in a bucket 300 can be based on the type or class of application in which the data is delivered (e.g. video streaming). For example, video streaming applications would benefit from a constant rate of data delivery. Another way of determining (based on speed) would be using TCP congestion control algorithms which calculate how many packets are to be sent over time.
  • the software does not have to hunt for holes where packet descriptors can be inserted. Instead, the software component need only to drop packet descriptors into the one or more buckets 300 .
  • the software component releases the bucket to the hardware component, such as the network interface 204 .
  • the bucket contents are written into the network interface's 204 DMA ring 218 en-mass.
  • the hardware component can determine whether the size of a particular data packet in a bucket is of a threshold size such that the data packet can be processed within the allotted time quanta.
  • a gross timer is applied by the hardware component in writing the packets into the DMA ring 218 , wherein the poll loop time of the processor 200 of the network traffic management device 110 is used as the gross timer.
  • the sum of released bucket time quanta's must excel poll loop time.
  • the fence 304 marking at the end of a particular bucket 300 serves as a timing boundary at the end of the bucket to allow the hardware component to do precise bucket to bucket timing.
  • the pacing send ring 500 is given higher priority in terms of being sent to the ring arbitrator 506 .
  • the bulk traffic in the bulk send ringer 502 advances to the arbitrator 506 when the paced traffic (from the pacing send ring 500 ) is blocked or is absent.
  • a pacing timer 504 in coupled to the pacing send ring 500 and the arbitrator 506 , wherein the pacing timer is reset at the start of a new bucket 300 .
  • the pacing timer 504 also blocks traffic at bucket boundaries until the bucket quanta time expires.
  • FIG. 6 illustrates an example transmit time line in accordance with an aspect of the present disclosure.
  • the hardware component consumes the data packets in the first bucket 602 for the entire time quanta which ends at boundary A.
  • the hardware component finishes writing the paced data packets such that additional time remains for the allotted time.
  • the hardware component thereafter processes bulk data for the remaining amount of time in the time quanta until reaching boundary B.
  • the same occurs in bucket 606 .
  • bucket 608 there is a period of time where no data is written, which can result in no bulk data or paced data being available for writing to the DMA engine.
  • FIG. 7 illustrates a flow chart of the software implementation of populating buckets with data packet descriptors in accordance with an aspect of the present disclosure.
  • the process 700 occurs when a first bucket of a plurality of buckets is selected by the application module 210 of the network traffic management device (Block 702 ).
  • the application module 210 thereafter populates the first bucket with one or more data packet descriptors associated with data packets to be released to the network interface 204 (Block 704 ).
  • the application module 210 thereafter determines whether there are additional paced or bulk data packets that can be added to the current selected bucket (Block 706 ). If so, the process repeats back to Block 704 . If not, the process proceeds to Block 708 .
  • the application module 210 applies a fence which represents the last data packet for that bucket (Block 708 ).
  • the application module 210 thereafter determines if the selected bucket is the last bucket in the time calendar (Block 710 ). If so, the application module 210 effectively wraps around the time calendar and selects the first bucket (Block 702 ). If not, the application module 210 selects the next bucket in the time calendar (Block 712 ), wherein the process proceeds back to Block 704 .
  • FIG. 8 illustrates a flow chart of the software implementation of populating buckets with data packet descriptors in accordance with an aspect of the present disclosure.
  • the process 800 occurs when a first bucket of a plurality of buckets is selected by the network interface 204 of the network traffic management device (Block 802 ).
  • the network interface 204 thereafter processes paced data packet(s) for the selected bucket (Block 804 ).
  • the network interface 204 thereafter determines whether additional time is available for the selected bucket (Block 806 ). If so, the network interface 204 determines if bulk data packets are present in the bucket (Block 808 ). If so, the network interface 204 processes the bulk data for the bucket (Block 810 ). The process then repeats back to Block 806 .
  • the network interface 204 selects the next bucket 812 and the process proceeds back to Block 804 .
  • the network interface 204 does not write any data packets and allows the remaining time for the bucket quanta to expire (Block 814 ). The process then proceeds to Block 812 .

Abstract

A system, method and medium is disclosed which includes selecting, at a software component of a network traffic management device, a first bucket having a first predetermined transmit time. The disclosure includes populating one or more selected data packet descriptors associated with one or more corresponding data packets in the first bucket. The disclosure includes releasing the first bucket to a hardware component of the network traffic management device, wherein the hardware component processes the one or more data packet descriptors of the first bucket for the first predetermined transmit time.

Description

FIELD
This technology relates to a system and method for pacing network traffic between network devices.
BACKGROUND
It is very common for a modern server to transmit large blocks of data in one burst to a single destination where the network path to the destination has much lower bandwidth than the really large bandwidth of the server's path within the data center and the first few hops along that path. Often these bursts are in response to a request for data, and the data is read from a storage medium (e.g., a disk) in a large block to help amortize the cost of the read operation. The large chunk of data is then dumped by the server's OS into the network at full speed, adding latency for other traffic following some portion of the same path through the network. This latency is unnecessary since other traffic could easily have been interleaved with the packets of the burst if the packets of the burst were spaced in time to match the true bandwidth of the full path to the destination. Further, such bursts can result in loss of some of the burst data due to overruns in of the buffering in the network path to the destination. Such losses necessitate retransmission of some of the large chunk of data—effectively reducing the gains that were hoped to be achieved by the batching of the read operation into a large chunk and reducing the overall throughput of the server. If the packets in these bursts were, instead, spread out in time at a pace matching the full network path data rate, both of these problems are easily solved
What is needed is a system and method which overcomes these disadvantages.
SUMMARY
In an aspect, a method for pacing data packets from one or more sessions comprises selecting, at a software component of a network traffic management device, a first bucket having a first predetermined transmit time. The method comprises populating one or more selected data packet descriptors associated with one or more corresponding data packets in the first bucket. The method comprises releasing the first bucket to a hardware component of the network traffic management device, wherein the hardware component processes the one or more data packet descriptors of the first bucket for the first predetermined transmit time.
In an aspect, a processor readable medium having stored thereon instructions for pacing data packets from one or more sessions, comprising machine executable code which when executed by at least one processor and/or network interface a network traffic management device to perform a method comprising selecting a first bucket having a first predetermined transmit time; populating one or more selected data packet descriptors associated with one or more corresponding data packets in the first bucket; releasing the first bucket to a hardware component of the network traffic management device, wherein the hardware component processes the one or more data packet descriptors of the first bucket for the first predetermined transmit time.
In an aspect, a network traffic management device comprises a memory containing non-transitory machine readable medium comprising machine executable code having stored thereon instructions for pacing data packets from one or more sessions. A network interface configured to communicate with one or more servers over a network. A processor coupled to the network interface and the memory, the processor configured to execute the code which causes the processor to perform, with the network interface, a method comprising: selecting a first bucket having a first predetermined transmit time; populating one or more selected data packet descriptors associated with one or more corresponding data packets in the first bucket; releasing the first bucket to a hardware component of the network traffic management device, wherein the hardware component processes the one or more data packet descriptors of the first bucket for the first predetermined transmit time.
In one or more of the above aspects, the method performs comprises selecting, at the software component, a second bucket having a second predetermined transmit time that is the same as the first transmit time of the first bucket; populating one or more selected data packet descriptors associated with one or more corresponding data packets in the second bucket; releasing the second bucket to the hardware component of the network traffic management device, wherein the hardware component processes the one or more data packet descriptors of the second bucket for the second predetermined transmit time quanta.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 is a diagram of an example system environment that includes a network traffic management device in accordance with an aspect of the present disclosure.
FIG. 2A is a block diagram of the network traffic management device in accordance with an aspect of the present disclosure.
FIG. 2B illustrates a block diagram of the network interface in accordance with an aspect of the present disclosure.
FIG. 2C illustrates further details of the network traffic management device in accordance with an aspect of the present disclosure.
FIG. 3 illustrates an example transmit ring or bucket in accordance with an aspect of the present disclosure.
FIG. 4 illustrates a time line of an example transmit ring or bucket in accordance with an aspect of the present disclosure.
FIG. 5 illustrates a block diagram of hardware based time enforcement in performed by a high speed bridge (HSB) priority mechanism in accordance with an aspect of the present disclosure.
FIG. 6 illustrates an example transmit time line in accordance with an aspect of the present disclosure.
FIG. 7 illustrates a flow chart of the software implementation of populating buckets with data packet descriptors in accordance with an aspect of the present disclosure.
FIG. 8 illustrates a flow chart of the software implementation of populating buckets with data packet descriptors in accordance with an aspect of the present disclosure.
While these examples are susceptible of embodiment in many different forms, there is shown in the drawings and will herein be described in detail preferred examples with the understanding that the present disclosure is to be considered as an exemplification and is not intended to limit the broad aspect to the embodiments illustrated.
DETAILED DESCRIPTION
FIG. 1 is a diagram of an example system environment that includes a network traffic management device in accordance with an aspect of the present disclosure. The example system environment 100 includes one or more Web and/or non Web application servers 102 (referred generally as “servers”), one or more client devices 106 and one or more network traffic management devices 110, although the environment 100 can include other numbers and types of devices in other arrangements. The network traffic management device 110 is coupled to the servers 102 via local area network (LAN) 104 and client devices 106 via a wide area network 108. Generally, client device requests are sent over the network 108 to the servers 102 which are received or intercepted by the network traffic management device 110.
Client devices 106 comprise network computing devices capable of connecting to other network computing devices, such as network traffic management device 110 and/or servers 102. Such connections are performed over wired and/or wireless networks, such as network 108, to send and receive data, such as for Web-based requests, receiving server responses to requests and/or performing other tasks. Non-limiting and non-exhausting examples of such client devices 106 include personal computers (e.g., desktops, laptops), tablets, smart televisions, video game devices, mobile and/or smart phones and the like. In an example, client devices 106 can run one or more Web browsers that provide an interface for operators, such as human users, to interact with for making requests for resources to different web server-based applications and/or Web pages via the network 108, although other server resources may be requested by client devices.
The servers 102 comprise one or more server network devices or machines capable of operating one or more Web-based and/or non Web-based applications that may be accessed by other network devices (e.g. client devices, network traffic management devices) in the environment 100. The servers 102 can provide web objects and other data representing requested resources, such as particular Web page(s), image(s) of physical objects, JavaScript and any other objects, that are responsive to the client devices' requests. It should be noted that the servers 102 may perform other tasks and provide other types of resources. It should be noted that while only two servers 102 are shown in the environment 100 depicted in FIG. 1B, other numbers and types of servers may be utilized in the environment 100. It is contemplated that one or more of the servers 102 may comprise a cluster of servers managed by one or more network traffic management devices 110. In one or more aspects, the servers 102 may be configured implement to execute any version of Microsoft® IIS server, RADIUS server, DIAMETER server and/or Apache® server, although other types of servers may be used.
Network 108 comprises a publicly accessible network, such as the Internet, which is connected to the servers 102, client devices 106, and network traffic management devices 110. However, it is contemplated that the network 108 may comprise other types of private and public networks that include other devices. Communications, such as requests from clients 106 and responses from servers 102, take place over the network 108 according to standard network protocols, such as the HTTP, UDP and/or TCP/IP protocols, as well as other protocols. As per TCP/IP protocols, requests from the requesting client devices 106 may be sent as one or more streams of data packets over network 108 to the network traffic management device 110 and/or the servers 102. Such protocols can be utilized by the client devices 106, network traffic management device 110 and the servers 102 to establish connections, send and receive data for existing connections, and the like.
Further, it should be appreciated that network 108 may include local area networks (LANs), wide area networks (WANs), direct connections and any combination thereof, as well as other types and numbers of network types. On an interconnected set of LANs or other networks, including those based on differing architectures and protocols. Network devices such as client devices, 106, servers 102, network traffic management devices 110, routers, switches, hubs, gateways, bridges, cell towers and other intermediate network devices may act within and between LANs and other networks to enable messages and other data to be sent between network devices. Also, communication links within and between LANs and other networks typically include twisted wire pair (e.g., Ethernet), coaxial cable, analog telephone lines, full or fractional dedicated digital lines including T1, T2, T3, and T4, Integrated Services Digital Networks (ISDNs), Digital Subscriber Lines (DSLs), wireless links including satellite links and other communications links known to those skilled in the relevant arts. Thus, the network 108 is configured to handle any communication method by which data may travel between network devices.
LAN 104 comprises a private local area network that allows communications between the one or more network traffic management devices 110 and one or more servers 102 in the secured network. It is contemplated, however, that the LAN 104 may comprise other types of private and public networks with other devices. Networks, including local area networks, besides being understood by those skilled in the relevant arts, have already been generally described above in connection with network 108 and thus will not be described further.
As shown in the example environment 100 depicted in FIG. 1B, the one or more network traffic management devices 110 is interposed between client devices 106 with which it communicates with via network 108 and servers 102 with which it communicates with via LAN 104. In particular to the present disclosure, the network traffic management device 110 operates in conjunction with a clustered multi-processing (CMP) system which includes one or more network traffic management devices 110, each of which having one or more cores or processors 200 (FIG. 2A). Generally, the network traffic management device 110 manages network communications, which may include one or more client requests and server responses, via the network 108 between the client devices 106 and one or more of the servers 102. In any case, the network traffic management device 110 may manage the network communications by performing several network traffic related functions involving the communications. Some functions include, but are not limited to, load balancing, access control, and validating HTTP requests using JavaScript code that are sent back to requesting client devices 106.
FIG. 2A is a block diagram of the network traffic management device in accordance with an aspect of the present disclosure. As shown in FIG. 2A, the example network traffic management device 110 includes one or more device processors or cores 200, one or more device I/O interfaces 202, one or more network interfaces 204, and one or more device memories 206, which are coupled together by one or more bus 208. It should be noted that the network traffic management device 110 can be configured to include other types and/or numbers of components and is thus not limited to the configuration shown in FIG. 2A.
Device processor 200 of the network traffic management device 110 comprises one or more microprocessors configured to execute computer/machine readable and executable instructions stored in the device memory 206. Such instructions, when executed by one or more processors 200, implement general and specific functions of the network traffic management device 110, including the inventive process described in more detail below. It is understood that the processor 200 may comprise other types and/or combinations of processors, such as digital signal processors, micro-controllers, application specific integrated circuits (“ASICs”), programmable logic devices (“PLDs”), field programmable logic devices (“FPLDs”), field programmable gate arrays (“FPGAs”), and the like. The processor 200 is programmed or configured according to the teachings as described and illustrated herein.
Device I/O interfaces 202 comprise one or more user input and output device interface mechanisms. The interface may include a computer keyboard, mouse, display device, and the corresponding physical ports and underlying supporting hardware and software to enable the network traffic management device 110 to communicate with other network devices in the environment 100. Such communications may include accepting user data input and providing user output, although other types and numbers of user input and output devices may be used. Additionally or alternatively, as will be described in connection with network interface 204 below, the network traffic management device 110 may communicate with the outside environment for certain types of operations (e.g. smart load balancing) via one or more network management ports.
Network interface 204 comprises one or more mechanisms that enable the network traffic management device 110 to engage in network communications over the LAN 104 and the network 108 using one or more of a number of protocols, such as TCP/IP, HTTP, UDP, RADIUS and DNS. However, it is contemplated that the network interface 204 may be constructed for use with other communication protocols and types of networks. Network interface 204 is sometimes referred to as a transceiver, transceiving device, or network interface card (NIC), which transmits and receives network data packets over one or more networks, such as the LAN 104 and the network 108. In an example, where the network traffic management device 110 includes more than one device processor 200 (or a processor 200 has more than one core), each processor 200 (and/or core) may use the same single network interface 204 or a plurality of network interfaces 204. Further, the network interface 204 may include one or more physical ports, such as Ethernet ports, to couple the network traffic management device 110 with other network devices, such as servers 102. Moreover, the interface 204 may include certain physical ports dedicated to receiving and/or transmitting certain types of network data, such as device management related data for configuring the network traffic management device 110 or client request/server response related data.
Bus 208 may comprise one or more internal device component communication buses, links, bridges and supporting components, such as bus controllers and/or arbiters. The bus 208 enables the various components of the network traffic management device 110, such as the processor 200, device I/O interfaces 202, network interface 204, and device memory 206, to communicate with one another. However, it is contemplated that the bus 208 may enable one or more components of the network traffic management device 110 to communicate with one or more components in other network devices as well. Example buses include HyperTransport, PCI, PCI Express, InfiniBand, USB, Firewire, Serial ATA (SATA), SCSI, IDE and AGP buses. However, it is contemplated that other types and numbers of buses may be used, whereby the particular types and arrangement of buses will depend on the particular configuration of the network traffic management device 110.
Device memory 206 comprises computer readable media, namely computer readable or processor readable storage media, which are examples of machine-readable storage media. Computer readable storage/machine-readable storage media may include volatile, nonvolatile, removable, and non-removable media implemented in any method or technology for storage of information. Examples of computer readable storage media include RAM, BIOS, ROM, EEPROM, flash/firmware memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the information, which can be accessed by a computing or specially programmed network device, such as the network traffic management device 110.
Such storage media includes computer readable/processor-executable instructions, data structures, program modules, or other data, which may be obtained and/or executed by one or more processors, such as device processor 200. Such instructions, when executed, allow or cause the processor 200 to perform actions, including performing the inventive processes described below. The memory 206 may contain other instructions relating to the implementation and operation of an operating system for controlling the general operation and other tasks performed by the network traffic management device 110.
FIG. 2B illustrates a block diagram of the network interface in accordance with an aspect of the present disclosure. In particular, FIG. 2B shows the DMA processes used by network interface 204 for using multiple independent DMA channels with corresponding multiple applications, where each application has its own driver, and for sending packets.
As illustrated in FIG. 2B, the host system 111 can send a network data packet stored in host memory 212 to the network 108 via network interface controller 204 and Ethernet port 236. A send DMA operation is performed when the host system 111 uses a DMA channel to move a block of data from host memory 22 to a network interface controller peripheral (not shown) via network 108. To perform a send DMA operation, the host processor 200 places the target network data packet into DMA packet buffer 216 and creates a DMA send descriptor (not shown separately) in send DMA descriptor rings 218. The DMA send descriptor is jointly managed by the host system 111 and the network interface controller 204. The DMA send descriptor includes an address field and length field. The address field points to the start of the target network data packet in DMA packet buffer 216. The length field declares how many bytes of target data are present in the DMA packet buffer 216. The DMA send descriptor also has a set of bit flags (not shown) used to signal additional target data control and status information.
By way of example only, return DMA descriptor rings and send DMA descriptor rings 218 can be physically in the same hardware memory blocks functioning as return and send DMA rings, respectively, at different times. Alternatively, separate and distinct memory blocks within host memory 212 DMA memory resources 214 may be reserved for each return DMA descriptor rings and send DMA descriptor rings 218.
Host system 111 places the send descriptor on the send DMA descriptor rings 218 in host system memory 212. The host processor 200 determines the QoS of the network packet to be transferred to the network 108 and moves the network packet to the appropriate DMA packet buffer 216 and places the descriptor on the appropriate descriptor rings 1-4 in send DMA descriptor rings 218. The descriptor ring in send DMA descriptor rings 218 is chosen by the host system 111 which selects the DMA channel, its associated peripheral, and the QoS level within the DMA channel. Send descriptors created by host system 111 in send DMA descriptor rings 218 can be of variable types, where each descriptor type can have a different format and size. The send DMA descriptor rings 218 are capable of holding descriptors of variable type.
The host processor 200 writes one or more mailbox registers 230 of the network interface controller 204 to notify the network interface controller 204 that the packet is ready. In performing this notification, the host processor 200 performs a write operation to a memory mapped network interface controller register (mailbox register 230). The host processor 200 can report the addition of multiple descriptors onto the send DMA ring in a single update, or alternatively, in multiple updates.
The appropriate packet DMA engine within DMA engine 224 is notified that the packet is ready. The packet DMA engine 224 can be selected from available DMA channels, or if a specific application has a dedicated DMA channel, the associated packet DMA engine 224 for that channel is used. The DMA engine 224 retrieves the DMA descriptor from the send DMA descriptor rings 218. When multiple descriptors are outstanding in the send DMA descriptor rings 218, the DMA Engine 224 may retrieve more than one descriptor. Retrieving multiple descriptors at a time maximizes bus bandwidth and hardware efficiency. The DMA engine 224 is capable of receiving and processing send descriptors of variable type, format, and size.
As outlined above, the packet DMA engine 224 monitors the progress of the host DMA operations via a set of mailbox registers 230. Each packet DMA engine 224 supports its own set of mailbox registers 230. The mailbox registers 230 reside in a mapped address space of the network interface controller 204. When appropriate, the host processor 200 accesses the mailbox registers 230 by performing memory mapped read and write transactions to the appropriate target address. The mailbox registers 230 also contain ring status information for the Ring to QoS Mapper 228. In this send DMA example, the packet DMA engine 224 reads the send descriptor, performs the DMA operation defined by it, and reports to the host system 111 that the DMA operation is complete. During the DMA operation, data is received from one or more CPU Bus read transactions (e.g., HyperTransport or PCI Express read transactions).
DMA scheduler 226 chooses packets out of packet buffers 216 based upon the priority of the queued network data packets and schedules the transfer to the appropriate packet DMA engine 224. For clarity and brevity, only a single packet buffer, a single DMA scheduler, and DMA engine are shown in FIG. 2B, but it should be understood that additional packet buffers, DMA schedulers, and DMA engines supporting the independent DMA channels 1-n and associated applications App(1)-App(n) can be included in network interface controller 204.
The packet buffers 216 are selected based on the novel scheme (discussed below) using DMA scheduler 226. The DMA scheduler 226 selects which descriptor ring 1-4 out of return DMA descriptor rings (also referred to as return DMA rings, or send rings) within DMA memory resources 212 to service and the matching packet buffer 216 is accessed for a single packet. The scheduling process is then repeated for the next packet.
Each network packet retrieved from a packet buffer 216 is routed to the appropriate DMA channel controlled by the respective packet DMA engine such as the packet DMA engine 224. The DMA channel segments the network packet for delivery to host memory 212 via several, smaller, HyperTransport packets. These HyperTransport packets are interleaved with HyperTransport packets from the other DMA channels in the network interface controller 204.
Ring to QoS Mapper 228 examines the assigned send DMA ring in send DMA descriptor rings 218 and receives packet data and packet control information from the packet DMA engine 224. Using the control information, the Ring to QoS Mapper 228 stamps the appropriate QoS onto the network data packet, thereby allowing host system 111 to send the network data packet back to the network 108. For example, using the control information, the Ring to QoS Mapper 228 can create and prepend a HiGig header to the packet data.
An egress DMA routing interface 232 arbitrates access to the network for DMA send packets. When a Ring to QoS Mapper 228 has a network packet ready to send, the egress DMA routing interface 232 arbitrates its access to the Ethernet port 236 and routes the packet to the correct interface if there is more than one present in the network interface controller 204. The egress DMA routing interface 232 behaves like a crossbar switch and monitors its attached interfaces for available packets. When a packet becomes available, the egress DMA routing interface 232 reads the packet from the selected ring to QoS mapper 228 and writes it to the destination interface. The egress DMA routing interface 232 moves complete packets to Ethernet MACs 234. When multiple sources are contending for egress DMA routing interface 232, the egress DMA routing interface 232 uses a weighted arbitration scheme as discussed in more detail below.
The network interface controller 204 provides DMA services to a host complex such as the host system 111 on behalf of its attached I/O devices such as the Ethernet port 236. DMA operations involve the movement of data between the host memory 212 and the network interface controller 204. The network interface controller 204 creates and manages HyperTransport or other types of CPU Bus read/write transactions targeting host memory 22. Data transfer sizes supported by DMA channels maintained by various components of application delivery controller 110 are much larger than the maximum HyperTransport or CPU bus transaction size. The network interface controller 204 segments single DMA operations into multiple smaller CPU Bus or HyperTransport transactions. Additionally, the network interface controller 204 creates additional CPU bus or HyperTransport transactions to support the transfer of data structures between the network interface controller 204 and host memory 212.
FIG. 2C illustrates further details of the network traffic management device in accordance with an aspect of the present disclosure. In particular, the network traffic management device 110 is shown handling a plurality of independent applications App(1)-App(n) being executed by one or more processors (e.g., host processor 200) in host system 111. Each application in the plurality of applications App(1)-App(n) has its own respective application driver shown as Driver 1, Driver 2, . . . , Driver ‘n’ associated with the respective application, where the index n denotes an unlimited number of executing applications and drivers. Applications App(1)-App(n) send and receive data packets from and to the network 108 (and/or LAN 104), respectively, using respective DMA channels (e.g., DMA channels 1-n). DMA channels 1-n are uniquely assigned to individual applications out of App(1)-App(n). In this example, drivers 1-n manage access to respective DMA channels 1-n and do not require knowledge of each other or a common management database or entity (e.g., a hypervisor). By way of example only, each of applications App(1)-App(n) can be independent instances of different applications, or alternatively, may be independent instances of the same application, or further, may be different operating systems supported by different processors in host system 111 (e.g., host processor 200).
DMA channels 1-n each have unique independent resources allotted to them, for example, a unique PCI bus identity including a configuration space and base address registers, an independent view of host system memory 212, a unique set of DMA descriptor ring buffers, a unique set of packet buffers 216, unique DMA request/completion signaling (through interrupts or polled memory structures), and other resources. Each of DMA channels 1-n is unique and independent thereby permitting management by separate unique drivers 1-n.
The network interface controller 204 classifies received packets to determine destination application selected from applications App(1)-App(n) and thereby selects the matching DMA channel to deliver the packet to the corresponding application. By way of example only, packet classification includes reading packet header fields thereby permitting application identification. Further by way of example only, packet classification includes hash calculation for distribution of packets across multiple instances of the same application, and/or reading a cookie stored, for example, in the network interface controller 204 associated with the application and the received network packet.
In general, the present disclosure utilizes hardware and software in the network traffic management device when pacing network traffic being sent to another network device (e.g. client, server). The purpose is for the network traffic management device to pace delivery of session data to the client to match the rate at which the client consumes the data, which adds value for mobile clients and networks. The network traffic management device utilizes a transmit time calendar having a plurality of quanta of transmit times. For example, one quanta may be 1 microsecond, although other time durations are contemplated.
FIG. 3 illustrates an example transmit ring or bucket in accordance with an aspect of the present disclosure. As shown in FIG. 3, the bucket 300 is a software based data construct which holds a plurality of data packet DMA descriptors which point to the pending transmit packets and has packets from a plurality of various, different sessions. The bucket 300 has a fence 302 which marks the last descriptor in the bucket. Software determines what data packets to send and when to send those data packets. The software communicates with the hardware component wherein the software enhances the data structures to communicate a time component with regard to when the selected data packets are to be sent. In particular, the software component divides session data into multiple maximum segment sized (MSS) or smaller sized packets. The software component distributes the packets in buckets separated by fixed transmit times, wherein the buckets are then handed off to the hardware component, such as a DMA ring, to handle the delivery of the data packets populated in the buckets, by processing the buckets themselves.
FIG. 4 illustrates a time line of an example transmit ring or bucket in accordance with an aspect of the present disclosure. As can be seen in FIG. 4, the transmit time calendar utilizes a plurality of buckets 300 where session data 400, such as data packet DMA descriptors is populated into the buckets 300. Each bucket has a predetermined size and adjacent buckets are separate by a transmit time or quanta that is fixed (shown as T1-T4). It should be noted the time calendar is configured to have a finite number of buckets, wherein the calendar effectively wraps around to the first bucket after the last bucket has been handled. In addition, multiple packet descriptors can be placed in the same bucket to increase bandwidth. The software component may decide whether to pace a data packet, as opposed to being bulk data (FIG. 5) based on size, type of traffic the data packet is associated with, QoS parameters (based on flow) and the like.
In an aspect, one or more buckets 300 can be skipped for distribution, by the software component, to increase intra-packet spacing. One way for determining how many buckets to skip before placing a data packet descriptor in a bucket 300 can be based on the type or class of application in which the data is delivered (e.g. video streaming). For example, video streaming applications would benefit from a constant rate of data delivery. Another way of determining (based on speed) would be using TCP congestion control algorithms which calculate how many packets are to be sent over time. The software does not have to hunt for holes where packet descriptors can be inserted. Instead, the software component need only to drop packet descriptors into the one or more buckets 300.
Once a bucket 300 is populated by the software component, the software component releases the bucket to the hardware component, such as the network interface 204. In particular, the bucket contents are written into the network interface's 204 DMA ring 218 en-mass. In an aspect, the hardware component can determine whether the size of a particular data packet in a bucket is of a threshold size such that the data packet can be processed within the allotted time quanta.
A gross timer is applied by the hardware component in writing the packets into the DMA ring 218, wherein the poll loop time of the processor 200 of the network traffic management device 110 is used as the gross timer. The sum of released bucket time quanta's must excel poll loop time.
The fence 304 marking at the end of a particular bucket 300 serves as a timing boundary at the end of the bucket to allow the hardware component to do precise bucket to bucket timing.
FIG. 5 illustrates a block diagram of hardware based time enforcement in performed by a high speed bridge (HSB) priority mechanism in accordance with an aspect of the present disclosure. As shown in FIG. 5, data packets that are written to buckets that are released to the hardware are received in a pacing send ring 500. In contrast, non-paced data (data not written to buckets) are received in a bulk send ring 502.
In an aspect, the pacing send ring 500 is given higher priority in terms of being sent to the ring arbitrator 506. Thus, the bulk traffic in the bulk send ringer 502 advances to the arbitrator 506 when the paced traffic (from the pacing send ring 500) is blocked or is absent. A pacing timer 504 in coupled to the pacing send ring 500 and the arbitrator 506, wherein the pacing timer is reset at the start of a new bucket 300. The pacing timer 504 also blocks traffic at bucket boundaries until the bucket quanta time expires.
FIG. 6 illustrates an example transmit time line in accordance with an aspect of the present disclosure. As shown in the time line 600, the hardware component consumes the data packets in the first bucket 602 for the entire time quanta which ends at boundary A. In the second bucket 604, it is shown that the hardware component finishes writing the paced data packets such that additional time remains for the allotted time. The hardware component thereafter processes bulk data for the remaining amount of time in the time quanta until reaching boundary B. The same occurs in bucket 606. In bucket 608, there is a period of time where no data is written, which can result in no bulk data or paced data being available for writing to the DMA engine.
FIG. 7 illustrates a flow chart of the software implementation of populating buckets with data packet descriptors in accordance with an aspect of the present disclosure. As shown in FIG. 7, the process 700 occurs when a first bucket of a plurality of buckets is selected by the application module 210 of the network traffic management device (Block 702). The application module 210 thereafter populates the first bucket with one or more data packet descriptors associated with data packets to be released to the network interface 204 (Block 704). The application module 210 thereafter determines whether there are additional paced or bulk data packets that can be added to the current selected bucket (Block 706). If so, the process repeats back to Block 704. If not, the process proceeds to Block 708.
Once the application module 210 has populated the bucket with the last data packet, the application module 210 applies a fence which represents the last data packet for that bucket (Block 708). The application module 210 thereafter determines if the selected bucket is the last bucket in the time calendar (Block 710). If so, the application module 210 effectively wraps around the time calendar and selects the first bucket (Block 702). If not, the application module 210 selects the next bucket in the time calendar (Block 712), wherein the process proceeds back to Block 704.
FIG. 8 illustrates a flow chart of the software implementation of populating buckets with data packet descriptors in accordance with an aspect of the present disclosure. As shown in FIG. 8, the process 800 occurs when a first bucket of a plurality of buckets is selected by the network interface 204 of the network traffic management device (Block 802). The network interface 204 thereafter processes paced data packet(s) for the selected bucket (Block 804). The network interface 204 thereafter determines whether additional time is available for the selected bucket (Block 806). If so, the network interface 204 determines if bulk data packets are present in the bucket (Block 808). If so, the network interface 204 processes the bulk data for the bucket (Block 810). The process then repeats back to Block 806.
If no additional allotted time is left, the network interface 204 selects the next bucket 812 and the process proceeds back to Block 804. Referring back to Block 808, if no bulk data is available for processing for a particular bucket, the network interface 204 does not write any data packets and allows the remaining time for the bucket quanta to expire (Block 814). The process then proceeds to Block 812.
Having thus described the basic concepts, it will be rather apparent to those skilled in the art that the foregoing detailed disclosure is intended to be presented by way of example only, and is not limiting. Various alterations, improvements, and modifications will occur and are intended to those skilled in the art, though not expressly stated herein. These alterations, improvements, and modifications are intended to be suggested hereby, and are within the spirit and scope of the examples. Additionally, the recited order of processing elements or sequences, or the use of numbers, letters, or other designations therefore, is not intended to limit the claimed system and/or processes to any order except as may be specified in the claims. Accordingly, the system and method is limited only by the following claims and equivalents thereto.

Claims (18)

What is claimed is:
1. A method for transmitting data packets at an optimized rate, the method comprising:
populating, by the network traffic management computing device, a plurality of buckets with one or more selected data packet descriptors associated with one or more corresponding ones of a subset of a plurality of data packets to be transmitted as paced and another subset of the data packets to be transmitted as bulk;
releasing, by the network traffic management computing device, one of the buckets to a hardware component comprising a pacing send ring and a bulk send ring, the releasing comprising writing one or more of the subset of the data packets to the pacing send ring and one or more of the another subset of the data packets to the bulk send ring; and
transmitting, by the network traffic management computing device, the one or more of the subset of the data packets from the pacing send ring and the one or more of the another subset of the data packets from the bulk send ring for a predetermined transmit time, wherein the subset of the data packets are strictly prioritized over the another subset of the data packets and the one or more of the another subset of the data packets are only transmitted within the predetermined transmit time when the pacing send ring is emptied during the predetermined transmit time.
2. The method as set forth in claim 1, further comprising repeating, by the network traffic management computing device, the releasing and transmitting for each other of the buckets.
3. The method as set forth in claim 1, wherein the one or more of the subset of the data packets from the pacing send ring and the one or more of the another subset of the data packets from the bulk send ring are transmitted by a direct memory access (DMA) transmit engine.
4. The method as set forth in claim 1, wherein the subset of the data packets to be transmitted is identified as paced and the another subset of the data packets is identified as bulk based on a data packet size, an associated type of traffic, or a quality of service (QoS) parameter.
5. The method as set forth in claim 1, further comprising:
determining, by the network traffic management computing device, when another one of the buckets should be skipped based on a type of application from which the ones of the data packets associated with the selected data packet descriptors populated therein originated; and
skipping, by the network traffic management computing device, the another one of the buckets such that the releasing and transmitting are not repeated for the another one of the buckets, when the determining indicates that the another one of the buckets should be skipped.
6. The method as set forth in claim 1, further comprising waiting, by the network traffic management computing device, to release another one of the buckets when the one or more of the subset of the data packets are transmitted from the pacing send ring and the one or more of the another subset of the data packets are transmitted from the bulk send ring prior to the expiration of the predetermined transmit time.
7. A non-transitory computer readable medium having stored thereon instructions for transmitting data packets at an optimized rate, comprising executable code which when executed by at least one processor and/or network interface causes the processor and/or network interface to perform steps comprising:
populating a plurality of buckets with one or more selected data packet descriptors associated with one or more corresponding ones of a subset of a plurality of data packets to be transmitted as paced and another subset of the data packets to be transmitted as bulk;
releasing one of the buckets to a hardware component comprising a pacing send ring and a bulk send ring, the releasing comprising writing one or more of the subset of the data packets to the pacing send ring and one or more of the another subset of the data packets to the bulk send ring; and
transmitting the one or more of the subset of the data packets from the pacing send ring and the one or more of the another subset of the data packets from the bulk send ring for a predetermined transmit time, wherein the subset of the data packets are strictly prioritized over the another subset of the data packets and the one or more of the another subset of the data packets are only transmitted within the predetermined transmit time when the pacing send ring is emptied during the predetermined transmit time.
8. The non-transitory computer readable medium as set forth in claim 7, wherein the executable code when executed by the processor and/or the network interface further causes the processor and/or the network interface to perform at least one additional step comprising repeating the releasing and transmitting for each other of the buckets.
9. The non-transitory computer readable medium as set forth in claim 7, wherein the one or more of the subset of the data packets from the pacing send ring and the one or more of the another subset of the data packets from the bulk send ring are transmitted by a direct memory access (DMA) transmit engine.
10. The non-transitory computer readable medium as set forth in claim 7, wherein the subset of the data packets to be transmitted is identified as paced and the another subset of the data packets is identified as bulk based on a data packet size, an associated type of traffic, or a quality of service (QoS) parameter.
11. The non-transitory computer readable medium as set forth in claim 7, wherein the executable code when executed by the processor and/or the network interface further causes the processor and/or the network interface to perform at least one additional step comprising:
determining when another one of the buckets should be skipped based on a type of application from which the ones of the data packets associated with the selected data packet descriptors populated therein originated; and
skipping the another one of the buckets such that the releasing and transmitting are not repeated for the another one of the buckets, when the determining indicates that the another one of the buckets should be skipped.
12. The non-transitory computer readable medium as set forth in claim 7, wherein the executable code when executed by the processor and/or the network interface further causes the processor and/or the network interface to perform at least one additional step comprising waiting to release another one of the buckets when the one or more of the subset of the data packets are transmitted from the pacing send ring and the one or more of the another subset of the data packets are transmitted from the bulk send ring prior to the expiration of the predetermined transmit time.
13. A network traffic management computing device comprising at least one processor and/or network interface and a memory coupled to the processor and/or network interface which is configured to be capable of executing programmed instructions comprising and stored in the memory to:
populate a plurality of buckets with one or more selected data packet descriptors associated with one or more corresponding ones of a subset of a plurality of data packets to be transmitted as paced and another subset of the data packets to be transmitted as bulk;
release one of the buckets to a hardware component comprising a pacing send ring and a bulk send ring, the releasing comprising writing one or more of the subset of the data packets to the pacing send ring and one or more of the another subset of the data packets to the bulk send ring; and
transmit the one or more of the subset of the data packets from the pacing send ring and the one or more of the another subset of the data packets from the bulk send ring for a predetermined transmit time, wherein the subset of the data packets are strictly prioritized over the another subset of the data packets and the one or more of the another subset of the data packets are only transmitted within the predetermined transmit time when the pacing send ring is emptied during the predetermined transmit time.
14. The network traffic management computing device as set forth in claim 13, wherein the processor and/or network interface coupled to the memory is further configured to be capable of executing at least one additional programmed instruction comprising and stored in the memory to repeat the releasing and transmitting for each other of the buckets.
15. The network traffic management computing device as set forth in claim 13, wherein the one or more of the subset of the data packets from the pacing send ring and the one or more of the another subset of the data packets from the bulk send ring are transmitted by a direct memory access (DMA) transmit engine.
16. The network traffic management computing device as set forth in claim 13, wherein the subset of the data packets to be transmitted is identified as paced and the another subset of the data packets is identified as bulk based on a data packet size, an associated type of traffic, or a quality of service (QoS) parameter.
17. The network traffic management computing device as set forth in claim 13, wherein the processor and/or network interface coupled to the memory is further configured to be capable of executing at least one additional programmed instruction comprising and stored in the memory to:
determine when another one of the buckets should be skipped based on a type of application from which the ones of the data packets associated with the selected data packet descriptors populated therein originated; and
skip the another one of the buckets such that the releasing and transmitting are not repeated for the another one of the buckets, when the determining indicates that the another one of the buckets should be skipped.
18. The network traffic management computing device as set forth in claim 13, wherein the processor and/or network interface coupled to the memory is further configured to be capable of executing at least one additional programmed instruction comprising and stored in the memory to wait to release another one of the buckets when the one or more of the subset of the data packets are transmitted from the pacing send ring and the one or more of the another subset of the data packets are transmitted from the bulk send ring prior to the expiration of the predetermined transmit time.
US13/732,337 2012-12-31 2012-12-31 Transmit rate pacing of large network traffic bursts to reduce jitter, buffer overrun, wasted bandwidth, and retransmissions Active 2033-09-15 US9270602B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US13/732,337 US9270602B1 (en) 2012-12-31 2012-12-31 Transmit rate pacing of large network traffic bursts to reduce jitter, buffer overrun, wasted bandwidth, and retransmissions

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US13/732,337 US9270602B1 (en) 2012-12-31 2012-12-31 Transmit rate pacing of large network traffic bursts to reduce jitter, buffer overrun, wasted bandwidth, and retransmissions

Publications (1)

Publication Number Publication Date
US9270602B1 true US9270602B1 (en) 2016-02-23

Family

ID=55314794

Family Applications (1)

Application Number Title Priority Date Filing Date
US13/732,337 Active 2033-09-15 US9270602B1 (en) 2012-12-31 2012-12-31 Transmit rate pacing of large network traffic bursts to reduce jitter, buffer overrun, wasted bandwidth, and retransmissions

Country Status (1)

Country Link
US (1) US9270602B1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170104697A1 (en) * 2015-10-12 2017-04-13 Mellanox Technologies Ltd. Dynamic Optimization for IP Forwarding Performance
US20170269853A1 (en) * 2015-06-30 2017-09-21 International Business Machines Corporation Statistic-based isolation of lethargic drives
US10958248B1 (en) 2020-05-27 2021-03-23 International Business Machines Corporation Jitter attenuation buffer structure
US11855898B1 (en) 2018-03-14 2023-12-26 F5, Inc. Methods for traffic dependent direct memory access optimization and devices thereof

Citations (109)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4914650A (en) * 1988-12-06 1990-04-03 American Telephone And Telegraph Company Bandwidth allocation and congestion control scheme for an integrated voice and data network
US5388237A (en) 1991-12-30 1995-02-07 Sun Microsystems, Inc. Method of and apparatus for interleaving multiple-channel DMA operations
US5477541A (en) * 1989-09-29 1995-12-19 White; Richard E. Addressing technique for storing and referencing packet data
US5699361A (en) * 1995-07-18 1997-12-16 Industrial Technology Research Institute Multimedia channel formulation mechanism
US5761534A (en) 1996-05-20 1998-06-02 Cray Research, Inc. System for arbitrating packetized data from the network to the peripheral resources and prioritizing the dispatching of packets onto the network
US5828835A (en) 1995-05-10 1998-10-27 3Com Corporation High throughput message passing process using latency and reliability classes
US5941988A (en) 1997-01-27 1999-08-24 International Business Machines Corporation Session and transport layer proxies via TCP glue
US6026443A (en) 1992-12-22 2000-02-15 Sun Microsystems, Inc. Multi-virtual DMA channels, multi-bandwidth groups, host based cellification and reassembly, and asynchronous transfer mode network interface
US6026090A (en) * 1997-11-14 2000-02-15 Fore System, Inc. Method and system for receiving ATM cells from an ATM network by a host
US6070219A (en) * 1996-10-09 2000-05-30 Intel Corporation Hierarchical interrupt structure for event notification on multi-virtual circuit network interface controller
US6115802A (en) 1995-10-13 2000-09-05 Sun Mircrosystems, Inc. Efficient hash table for use in multi-threaded environments
US20010038629A1 (en) * 2000-03-29 2001-11-08 Masayuki Shinohara Arbiter circuit and method of carrying out arbitration
US6347337B1 (en) * 1999-01-08 2002-02-12 Intel Corporation Credit based flow control scheme over virtual interface architecture for system area networks
US6388989B1 (en) * 1998-06-29 2002-05-14 Cisco Technology Method and apparatus for preventing memory overrun in a data transmission system
US20020156927A1 (en) 2000-12-26 2002-10-24 Alacritech, Inc. TCP/IP offload network interface device
US6529508B1 (en) 1999-02-01 2003-03-04 Redback Networks Inc. Methods and apparatus for packet classification with multiple answer sets
US20030067930A1 (en) 2001-10-05 2003-04-10 International Business Machines Corporation Packet preprocessing interface for multiprocessor network handler
US6574220B1 (en) * 1999-07-06 2003-06-03 Avaya Technology Corp. Traffic shaper that accommodates maintenance cells without causing jitter or delay
US20030204636A1 (en) 2001-07-02 2003-10-30 Globespanvirata Incorporated Communications system using rings architecture
US20040032830A1 (en) * 2002-08-19 2004-02-19 Bly Keith Michael System and method for shaping traffic from a plurality of data streams using hierarchical queuing
US6700871B1 (en) 1999-05-04 2004-03-02 3Com Corporation Increased throughput across data network interface by dropping redundant packets
US20040062245A1 (en) * 2002-04-22 2004-04-01 Sharp Colin C. TCP/IP offload device
US6748457B2 (en) 2000-02-03 2004-06-08 Realtime Data, Llc Data storewidth accelerator
US6781990B1 (en) 2002-02-11 2004-08-24 Extreme Networks Method and system for managing traffic in a packet network environment
US6785236B1 (en) * 2000-05-28 2004-08-31 Lucent Technologies Inc. Packet transmission scheduling with threshold based backpressure mechanism
US20040202161A1 (en) 1998-08-28 2004-10-14 Stachura Thomas L. Method and apparatus for transmitting and receiving network protocol compliant signal packets over a platform bus
US6820133B1 (en) 2000-02-07 2004-11-16 Netli, Inc. System and method for high-performance delivery of web content using high-performance communications protocol between the first and second specialized intermediate nodes to optimize a measure of communications performance between the source and the destination
US20040249948A1 (en) 2003-03-07 2004-12-09 Sethi Bhupinder S. Performing application layer transactions during the connection establishment phase of connection-oriented protocols
US20040249881A1 (en) 2003-06-05 2004-12-09 Jha Ashutosh K. Transmitting commands and information between a TCP/IP stack and an offload unit
US20040267897A1 (en) 2003-06-24 2004-12-30 Sychron Inc. Distributed System Providing Scalable Methodology for Real-Time Control of Server Pools and Data Centers
US20050007991A1 (en) 2003-07-10 2005-01-13 Dat Ton Bandwidth allocation method and apparatus for fixed wireless networks
US20050022623A1 (en) 2002-06-18 2005-02-03 Carl Reiche Steering shaft for motor vehicles
US20050083952A1 (en) 2003-10-15 2005-04-21 Texas Instruments Incorporated Flexible ethernet bridge
US20050091390A1 (en) * 2003-10-24 2005-04-28 International Business Machines Corporation Speculative method and system for rapid data communications
US20050114559A1 (en) 2003-11-20 2005-05-26 Miller George B. Method for efficiently processing DMA transactions
US20050141427A1 (en) * 2003-12-30 2005-06-30 Bartky Alan K. Hierarchical flow-characterizing multiplexor
US20050175014A1 (en) 2000-09-25 2005-08-11 Patrick Michael W. Hierarchical prioritized round robin (HPRR) scheduling
US6934776B2 (en) * 2002-07-16 2005-08-23 Intel Corporation Methods and apparatus for determination of packet sizes when transferring packets via a network
US20050213570A1 (en) 2004-03-26 2005-09-29 Stacy John K Hardware filtering support for denial-of-service attacks
US20050226234A1 (en) * 2001-11-20 2005-10-13 Sano Barton J System having interfaces and switch that separates coherent and packet traffic
US20060007928A1 (en) 2004-07-08 2006-01-12 Michael Sangillo Flexible traffic rating interworking
US7046628B2 (en) * 2001-09-24 2006-05-16 Intel Corporation Apparatus and method for just-in-time transfer of transmit commands to a network interface
US20060104303A1 (en) 2004-11-16 2006-05-18 Srihari Makineni Packet coalescing
US7065630B1 (en) 2003-08-27 2006-06-20 Nvidia Corporation Dynamically creating or removing a physical-to-virtual address mapping in a memory of a peripheral device
US7107348B2 (en) 2001-03-27 2006-09-12 Fujitsu Limited Packet relay processing apparatus
US20060224820A1 (en) * 2005-04-01 2006-10-05 Hyun-Duk Cho Flash memory device supporting cache read operation
US20060221832A1 (en) 2005-04-04 2006-10-05 Sun Microsystems, Inc. Virtualized partitionable shared network interface
US20060221835A1 (en) 2005-03-30 2006-10-05 Cisco Technology, Inc. Converting a network device from data rate traffic management to packet rate
US7124196B2 (en) * 2002-08-07 2006-10-17 Intel Corporation Processing a network packet using queues
US20060235996A1 (en) 2005-04-19 2006-10-19 Alcatel Method for operating a packet based data network
US7142540B2 (en) 2002-07-18 2006-11-28 Sun Microsystems, Inc. Method and apparatus for zero-copy receive buffer management
US20060288128A1 (en) 2005-06-16 2006-12-21 Agere Systems Inc. Emulation of independent active DMA channels with a single DMA capable bus master hardware and firmware
US7164678B2 (en) * 2001-06-25 2007-01-16 Intel Corporation Control of processing order for received network packets
US7236491B2 (en) 2000-11-30 2007-06-26 Industrial Technology Research Institute Method and apparatus for scheduling for packet-switched networks
US20070162619A1 (en) * 2006-01-12 2007-07-12 Eliezer Aloni Method and System for Zero Copy in a Virtualized Network Environment
US7281030B1 (en) 1999-09-17 2007-10-09 Intel Corporation Method of reading a remote memory
US7324525B2 (en) 2004-12-09 2008-01-29 International Business Machines Corporation Method and apparatus for coalescing acknowledge packets within a server
US7327674B2 (en) * 2002-06-11 2008-02-05 Sun Microsystems, Inc. Prefetching techniques for network interfaces
US7349405B2 (en) * 2003-06-23 2008-03-25 Transwitch Corporation Method and apparatus for fair queueing of data packets
US7355977B1 (en) 2002-08-16 2008-04-08 F5 Networks, Inc. Method and system for a weighted allocation table
US7376772B2 (en) 2000-02-03 2008-05-20 Realtime Data Llc Data storewidth accelerator
US20080126509A1 (en) 2006-11-06 2008-05-29 Viswanath Subramanian Rdma qp simplex switchless connection
US7403542B1 (en) 2002-07-19 2008-07-22 Qlogic, Corporation Method and system for processing network data packets
US20080184248A1 (en) 2007-01-29 2008-07-31 Yahoo! Inc. Optimization of job scheduling for resource clusters with access control and usage reporting
US20080201772A1 (en) * 2007-02-15 2008-08-21 Maxim Mondaeev Method and Apparatus for Deep Packet Inspection for Network Intrusion Detection
US7420931B2 (en) 2003-06-05 2008-09-02 Nvidia Corporation Using TCP/IP offload to accelerate packet filtering
US20080219279A1 (en) 2007-03-06 2008-09-11 Yen Hsiang Chew Scalable and configurable queue management for network packet traffic quality of service
US20090003204A1 (en) 2007-06-29 2009-01-01 Packeteer, Inc. Lockless Bandwidth Management for Multiprocessor Networking Devices
US7475122B2 (en) 2000-10-04 2009-01-06 Jean-Patrick Azpitarte System for remotely managing maintenance of a set of facilities
US7478186B1 (en) 2004-06-03 2009-01-13 Integrated Device Technology, Inc. Interrupt coalescer for DMA channel
US20090016217A1 (en) 2007-07-13 2009-01-15 International Business Machines Corporation Enhancement of end-to-end network qos
US7496695B2 (en) 2005-09-29 2009-02-24 P.A. Semi, Inc. Unified DMA
US7500028B2 (en) 2003-03-20 2009-03-03 Panasonic Corporation DMA controller providing for ring buffer and rectangular block transfers
US7512721B1 (en) 2004-05-25 2009-03-31 Qlogic, Corporation Method and apparatus for efficient determination of status from DMA lists
US20090089619A1 (en) 2007-09-27 2009-04-02 Kung-Shiuh Huang Automatic detection of functional defects and performance bottlenecks in network devices
US7533197B2 (en) 2006-11-08 2009-05-12 Sicortex, Inc. System and method for remote direct memory access without page locking by the operating system
US20090154459A1 (en) * 2001-04-13 2009-06-18 Freescale Semiconductor, Inc. Manipulating data streams in data stream processors
US7558910B2 (en) 1998-11-13 2009-07-07 Cray Inc. Detecting access to a memory location in a multithreaded environment
US7571299B2 (en) 2006-02-16 2009-08-04 International Business Machines Corporation Methods and arrangements for inserting values in hash tables
US20090222598A1 (en) 2004-02-25 2009-09-03 Analog Devices, Inc. Dma controller for digital signal processors
US20090248911A1 (en) 2008-03-27 2009-10-01 Apple Inc. Clock control for dma busses
US20090279559A1 (en) * 2004-03-26 2009-11-12 Foundry Networks, Inc., A Delaware Corporation Method and apparatus for aggregating input data streams
US7647416B2 (en) 2004-03-02 2010-01-12 Industrial Technology Research Institute Full hardware based TCP/IP traffic offload engine(TOE) device and the method thereof
US7649882B2 (en) * 2002-07-15 2010-01-19 Alcatel-Lucent Usa Inc. Multicast scheduling and replication in switches
US7657659B1 (en) 2006-11-30 2010-02-02 Vmware, Inc. Partial copying of data to transmit buffer for virtual network device
US7668727B2 (en) 2005-04-29 2010-02-23 Kimberly-Clark Worldwide, Inc. System and method for building loads from requisitions
US7668851B2 (en) 2006-11-29 2010-02-23 International Business Machines Corporation Lockless hash table lookups while performing key update on hash table element
US20100082849A1 (en) 2008-09-30 2010-04-01 Apple Inc. Data filtering using central DMA mechanism
US20100085875A1 (en) * 2008-10-08 2010-04-08 Richard Solomon Methods and apparatuses for processing packets in a credit-based flow control scheme
US20100094945A1 (en) 2004-11-23 2010-04-15 Cisco Technology, Inc. Caching content and state data at a network element
US7729239B1 (en) 2004-12-27 2010-06-01 Emc Corporation Packet switching network end point controller
US7735099B1 (en) 2005-12-23 2010-06-08 Qlogic, Corporation Method and system for processing network data
US7734809B2 (en) 2003-06-05 2010-06-08 Meshnetworks, Inc. System and method to maximize channel utilization in a multi-channel wireless communication network
US7742412B1 (en) 2004-09-29 2010-06-22 Marvell Israel (M.I.S.L.) Ltd. Method and apparatus for preventing head of line blocking in an ethernet system
US7784093B2 (en) 1999-04-01 2010-08-24 Juniper Networks, Inc. Firewall including local bus
US7826487B1 (en) 2005-05-09 2010-11-02 F5 Network, Inc Coalescing acknowledgement responses to improve network communications
US7877524B1 (en) 2007-11-23 2011-01-25 Pmc-Sierra Us, Inc. Logical address direct memory access with multiple concurrent physical ports and internal switching
US7916728B1 (en) 2007-09-28 2011-03-29 F5 Networks, Inc. Lockless atomic table update
US7975025B1 (en) 2008-07-08 2011-07-05 F5 Networks, Inc. Smart prefetching of data over a network
US8006016B2 (en) 2005-04-04 2011-08-23 Oracle America, Inc. Hiding system latencies in a throughput networking systems
US20110228781A1 (en) * 2010-03-16 2011-09-22 Erez Izenberg Combined Hardware/Software Forwarding Mechanism and Method
US8103809B1 (en) 2009-01-16 2012-01-24 F5 Networks, Inc. Network devices with multiple direct memory access channels and methods thereof
US8112491B1 (en) 2009-01-16 2012-02-07 F5 Networks, Inc. Methods and systems for providing direct DMA
US8112594B2 (en) 2007-04-20 2012-02-07 The Regents Of The University Of Colorado Efficient point-to-point enqueue and dequeue communications
US8306036B1 (en) 2008-06-20 2012-11-06 F5 Networks, Inc. Methods and systems for hierarchical resource allocation through bookmark allocation
US8447884B1 (en) 2008-12-01 2013-05-21 F5 Networks, Inc. Methods for mapping virtual addresses to physical addresses in a network device and systems thereof
US20130250777A1 (en) * 2012-03-26 2013-09-26 Michael L. Ziegler Packet descriptor trace indicators
US8880696B1 (en) 2009-01-16 2014-11-04 F5 Networks, Inc. Methods for sharing bandwidth across a packetized bus and systems thereof
US8880632B1 (en) 2009-01-16 2014-11-04 F5 Networks, Inc. Method and apparatus for performing multiple DMA channel based network quality of service

Patent Citations (114)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4914650A (en) * 1988-12-06 1990-04-03 American Telephone And Telegraph Company Bandwidth allocation and congestion control scheme for an integrated voice and data network
US5477541A (en) * 1989-09-29 1995-12-19 White; Richard E. Addressing technique for storing and referencing packet data
US5388237A (en) 1991-12-30 1995-02-07 Sun Microsystems, Inc. Method of and apparatus for interleaving multiple-channel DMA operations
US6026443A (en) 1992-12-22 2000-02-15 Sun Microsystems, Inc. Multi-virtual DMA channels, multi-bandwidth groups, host based cellification and reassembly, and asynchronous transfer mode network interface
US5828835A (en) 1995-05-10 1998-10-27 3Com Corporation High throughput message passing process using latency and reliability classes
US5699361A (en) * 1995-07-18 1997-12-16 Industrial Technology Research Institute Multimedia channel formulation mechanism
US6115802A (en) 1995-10-13 2000-09-05 Sun Mircrosystems, Inc. Efficient hash table for use in multi-threaded environments
US5761534A (en) 1996-05-20 1998-06-02 Cray Research, Inc. System for arbitrating packetized data from the network to the peripheral resources and prioritizing the dispatching of packets onto the network
US6070219A (en) * 1996-10-09 2000-05-30 Intel Corporation Hierarchical interrupt structure for event notification on multi-virtual circuit network interface controller
US5941988A (en) 1997-01-27 1999-08-24 International Business Machines Corporation Session and transport layer proxies via TCP glue
US6026090A (en) * 1997-11-14 2000-02-15 Fore System, Inc. Method and system for receiving ATM cells from an ATM network by a host
US6388989B1 (en) * 1998-06-29 2002-05-14 Cisco Technology Method and apparatus for preventing memory overrun in a data transmission system
US20040202161A1 (en) 1998-08-28 2004-10-14 Stachura Thomas L. Method and apparatus for transmitting and receiving network protocol compliant signal packets over a platform bus
US7558910B2 (en) 1998-11-13 2009-07-07 Cray Inc. Detecting access to a memory location in a multithreaded environment
US6347337B1 (en) * 1999-01-08 2002-02-12 Intel Corporation Credit based flow control scheme over virtual interface architecture for system area networks
US6529508B1 (en) 1999-02-01 2003-03-04 Redback Networks Inc. Methods and apparatus for packet classification with multiple answer sets
US7784093B2 (en) 1999-04-01 2010-08-24 Juniper Networks, Inc. Firewall including local bus
US6700871B1 (en) 1999-05-04 2004-03-02 3Com Corporation Increased throughput across data network interface by dropping redundant packets
US6574220B1 (en) * 1999-07-06 2003-06-03 Avaya Technology Corp. Traffic shaper that accommodates maintenance cells without causing jitter or delay
US7281030B1 (en) 1999-09-17 2007-10-09 Intel Corporation Method of reading a remote memory
US6748457B2 (en) 2000-02-03 2004-06-08 Realtime Data, Llc Data storewidth accelerator
US7376772B2 (en) 2000-02-03 2008-05-20 Realtime Data Llc Data storewidth accelerator
US6820133B1 (en) 2000-02-07 2004-11-16 Netli, Inc. System and method for high-performance delivery of web content using high-performance communications protocol between the first and second specialized intermediate nodes to optimize a measure of communications performance between the source and the destination
US20010038629A1 (en) * 2000-03-29 2001-11-08 Masayuki Shinohara Arbiter circuit and method of carrying out arbitration
US6785236B1 (en) * 2000-05-28 2004-08-31 Lucent Technologies Inc. Packet transmission scheduling with threshold based backpressure mechanism
US20050175014A1 (en) 2000-09-25 2005-08-11 Patrick Michael W. Hierarchical prioritized round robin (HPRR) scheduling
US7475122B2 (en) 2000-10-04 2009-01-06 Jean-Patrick Azpitarte System for remotely managing maintenance of a set of facilities
US7236491B2 (en) 2000-11-30 2007-06-26 Industrial Technology Research Institute Method and apparatus for scheduling for packet-switched networks
US20020156927A1 (en) 2000-12-26 2002-10-24 Alacritech, Inc. TCP/IP offload network interface device
US7107348B2 (en) 2001-03-27 2006-09-12 Fujitsu Limited Packet relay processing apparatus
US7929433B2 (en) * 2001-04-13 2011-04-19 Freescale Semiconductor, Inc. Manipulating data streams in data stream processors
US20090154459A1 (en) * 2001-04-13 2009-06-18 Freescale Semiconductor, Inc. Manipulating data streams in data stream processors
US7164678B2 (en) * 2001-06-25 2007-01-16 Intel Corporation Control of processing order for received network packets
US20030204636A1 (en) 2001-07-02 2003-10-30 Globespanvirata Incorporated Communications system using rings architecture
US7046628B2 (en) * 2001-09-24 2006-05-16 Intel Corporation Apparatus and method for just-in-time transfer of transmit commands to a network interface
US20030067930A1 (en) 2001-10-05 2003-04-10 International Business Machines Corporation Packet preprocessing interface for multiprocessor network handler
US20050226234A1 (en) * 2001-11-20 2005-10-13 Sano Barton J System having interfaces and switch that separates coherent and packet traffic
US6781990B1 (en) 2002-02-11 2004-08-24 Extreme Networks Method and system for managing traffic in a packet network environment
US20040062245A1 (en) * 2002-04-22 2004-04-01 Sharp Colin C. TCP/IP offload device
US7327674B2 (en) * 2002-06-11 2008-02-05 Sun Microsystems, Inc. Prefetching techniques for network interfaces
US20050022623A1 (en) 2002-06-18 2005-02-03 Carl Reiche Steering shaft for motor vehicles
US7649882B2 (en) * 2002-07-15 2010-01-19 Alcatel-Lucent Usa Inc. Multicast scheduling and replication in switches
US6934776B2 (en) * 2002-07-16 2005-08-23 Intel Corporation Methods and apparatus for determination of packet sizes when transferring packets via a network
US7142540B2 (en) 2002-07-18 2006-11-28 Sun Microsystems, Inc. Method and apparatus for zero-copy receive buffer management
US7403542B1 (en) 2002-07-19 2008-07-22 Qlogic, Corporation Method and system for processing network data packets
US7124196B2 (en) * 2002-08-07 2006-10-17 Intel Corporation Processing a network packet using queues
US7355977B1 (en) 2002-08-16 2008-04-08 F5 Networks, Inc. Method and system for a weighted allocation table
US20040032830A1 (en) * 2002-08-19 2004-02-19 Bly Keith Michael System and method for shaping traffic from a plurality of data streams using hierarchical queuing
US20040249948A1 (en) 2003-03-07 2004-12-09 Sethi Bhupinder S. Performing application layer transactions during the connection establishment phase of connection-oriented protocols
US7500028B2 (en) 2003-03-20 2009-03-03 Panasonic Corporation DMA controller providing for ring buffer and rectangular block transfers
US7734809B2 (en) 2003-06-05 2010-06-08 Meshnetworks, Inc. System and method to maximize channel utilization in a multi-channel wireless communication network
US7420931B2 (en) 2003-06-05 2008-09-02 Nvidia Corporation Using TCP/IP offload to accelerate packet filtering
US20040249881A1 (en) 2003-06-05 2004-12-09 Jha Ashutosh K. Transmitting commands and information between a TCP/IP stack and an offload unit
US7349405B2 (en) * 2003-06-23 2008-03-25 Transwitch Corporation Method and apparatus for fair queueing of data packets
US20040267897A1 (en) 2003-06-24 2004-12-30 Sychron Inc. Distributed System Providing Scalable Methodology for Real-Time Control of Server Pools and Data Centers
US20050007991A1 (en) 2003-07-10 2005-01-13 Dat Ton Bandwidth allocation method and apparatus for fixed wireless networks
US7065630B1 (en) 2003-08-27 2006-06-20 Nvidia Corporation Dynamically creating or removing a physical-to-virtual address mapping in a memory of a peripheral device
US20050083952A1 (en) 2003-10-15 2005-04-21 Texas Instruments Incorporated Flexible ethernet bridge
US20050091390A1 (en) * 2003-10-24 2005-04-28 International Business Machines Corporation Speculative method and system for rapid data communications
US20050114559A1 (en) 2003-11-20 2005-05-26 Miller George B. Method for efficiently processing DMA transactions
US20050141427A1 (en) * 2003-12-30 2005-06-30 Bartky Alan K. Hierarchical flow-characterizing multiplexor
US20090222598A1 (en) 2004-02-25 2009-09-03 Analog Devices, Inc. Dma controller for digital signal processors
US7647416B2 (en) 2004-03-02 2010-01-12 Industrial Technology Research Institute Full hardware based TCP/IP traffic offload engine(TOE) device and the method thereof
US20090279559A1 (en) * 2004-03-26 2009-11-12 Foundry Networks, Inc., A Delaware Corporation Method and apparatus for aggregating input data streams
US20050213570A1 (en) 2004-03-26 2005-09-29 Stacy John K Hardware filtering support for denial-of-service attacks
US7512721B1 (en) 2004-05-25 2009-03-31 Qlogic, Corporation Method and apparatus for efficient determination of status from DMA lists
US7478186B1 (en) 2004-06-03 2009-01-13 Integrated Device Technology, Inc. Interrupt coalescer for DMA channel
US20060007928A1 (en) 2004-07-08 2006-01-12 Michael Sangillo Flexible traffic rating interworking
US7742412B1 (en) 2004-09-29 2010-06-22 Marvell Israel (M.I.S.L.) Ltd. Method and apparatus for preventing head of line blocking in an ethernet system
EP1813084A1 (en) 2004-11-16 2007-08-01 Intel Corporation Packet coalescing
WO2006055494A1 (en) 2004-11-16 2006-05-26 Intel Corporation Packet coalescing
US20060104303A1 (en) 2004-11-16 2006-05-18 Srihari Makineni Packet coalescing
US20100094945A1 (en) 2004-11-23 2010-04-15 Cisco Technology, Inc. Caching content and state data at a network element
US7324525B2 (en) 2004-12-09 2008-01-29 International Business Machines Corporation Method and apparatus for coalescing acknowledge packets within a server
US7729239B1 (en) 2004-12-27 2010-06-01 Emc Corporation Packet switching network end point controller
US20060221835A1 (en) 2005-03-30 2006-10-05 Cisco Technology, Inc. Converting a network device from data rate traffic management to packet rate
US20060224820A1 (en) * 2005-04-01 2006-10-05 Hyun-Duk Cho Flash memory device supporting cache read operation
US8006016B2 (en) 2005-04-04 2011-08-23 Oracle America, Inc. Hiding system latencies in a throughput networking systems
US20060221832A1 (en) 2005-04-04 2006-10-05 Sun Microsystems, Inc. Virtualized partitionable shared network interface
US20060235996A1 (en) 2005-04-19 2006-10-19 Alcatel Method for operating a packet based data network
US7668727B2 (en) 2005-04-29 2010-02-23 Kimberly-Clark Worldwide, Inc. System and method for building loads from requisitions
US7826487B1 (en) 2005-05-09 2010-11-02 F5 Network, Inc Coalescing acknowledgement responses to improve network communications
US20060288128A1 (en) 2005-06-16 2006-12-21 Agere Systems Inc. Emulation of independent active DMA channels with a single DMA capable bus master hardware and firmware
US7496695B2 (en) 2005-09-29 2009-02-24 P.A. Semi, Inc. Unified DMA
US7735099B1 (en) 2005-12-23 2010-06-08 Qlogic, Corporation Method and system for processing network data
US20070162619A1 (en) * 2006-01-12 2007-07-12 Eliezer Aloni Method and System for Zero Copy in a Virtualized Network Environment
US7571299B2 (en) 2006-02-16 2009-08-04 International Business Machines Corporation Methods and arrangements for inserting values in hash tables
US20080126509A1 (en) 2006-11-06 2008-05-29 Viswanath Subramanian Rdma qp simplex switchless connection
US7533197B2 (en) 2006-11-08 2009-05-12 Sicortex, Inc. System and method for remote direct memory access without page locking by the operating system
US7668851B2 (en) 2006-11-29 2010-02-23 International Business Machines Corporation Lockless hash table lookups while performing key update on hash table element
US7657659B1 (en) 2006-11-30 2010-02-02 Vmware, Inc. Partial copying of data to transmit buffer for virtual network device
US20080184248A1 (en) 2007-01-29 2008-07-31 Yahoo! Inc. Optimization of job scheduling for resource clusters with access control and usage reporting
US20080201772A1 (en) * 2007-02-15 2008-08-21 Maxim Mondaeev Method and Apparatus for Deep Packet Inspection for Network Intrusion Detection
US20080219279A1 (en) 2007-03-06 2008-09-11 Yen Hsiang Chew Scalable and configurable queue management for network packet traffic quality of service
US8279865B2 (en) 2007-04-20 2012-10-02 John Giacomoni Efficient pipeline parallelism using frame shared memory
US8112594B2 (en) 2007-04-20 2012-02-07 The Regents Of The University Of Colorado Efficient point-to-point enqueue and dequeue communications
US20090003204A1 (en) 2007-06-29 2009-01-01 Packeteer, Inc. Lockless Bandwidth Management for Multiprocessor Networking Devices
US20090016217A1 (en) 2007-07-13 2009-01-15 International Business Machines Corporation Enhancement of end-to-end network qos
US20090089619A1 (en) 2007-09-27 2009-04-02 Kung-Shiuh Huang Automatic detection of functional defects and performance bottlenecks in network devices
US7916728B1 (en) 2007-09-28 2011-03-29 F5 Networks, Inc. Lockless atomic table update
US7877524B1 (en) 2007-11-23 2011-01-25 Pmc-Sierra Us, Inc. Logical address direct memory access with multiple concurrent physical ports and internal switching
US20090248911A1 (en) 2008-03-27 2009-10-01 Apple Inc. Clock control for dma busses
US8306036B1 (en) 2008-06-20 2012-11-06 F5 Networks, Inc. Methods and systems for hierarchical resource allocation through bookmark allocation
US7975025B1 (en) 2008-07-08 2011-07-05 F5 Networks, Inc. Smart prefetching of data over a network
US20100082849A1 (en) 2008-09-30 2010-04-01 Apple Inc. Data filtering using central DMA mechanism
US20100085875A1 (en) * 2008-10-08 2010-04-08 Richard Solomon Methods and apparatuses for processing packets in a credit-based flow control scheme
US8447884B1 (en) 2008-12-01 2013-05-21 F5 Networks, Inc. Methods for mapping virtual addresses to physical addresses in a network device and systems thereof
US8112491B1 (en) 2009-01-16 2012-02-07 F5 Networks, Inc. Methods and systems for providing direct DMA
US8103809B1 (en) 2009-01-16 2012-01-24 F5 Networks, Inc. Network devices with multiple direct memory access channels and methods thereof
US8346993B2 (en) 2009-01-16 2013-01-01 F5 Networks, Inc. Network devices with multiple direct memory access channels and methods thereof
US8880696B1 (en) 2009-01-16 2014-11-04 F5 Networks, Inc. Methods for sharing bandwidth across a packetized bus and systems thereof
US8880632B1 (en) 2009-01-16 2014-11-04 F5 Networks, Inc. Method and apparatus for performing multiple DMA channel based network quality of service
US20110228781A1 (en) * 2010-03-16 2011-09-22 Erez Izenberg Combined Hardware/Software Forwarding Mechanism and Method
US20130250777A1 (en) * 2012-03-26 2013-09-26 Michael L. Ziegler Packet descriptor trace indicators

Non-Patent Citations (23)

* Cited by examiner, † Cited by third party
Title
"Chapter 15, Memory Mapping and DMA," Memory Management in Linux, ch15.13676, accessed on Jan. 25, 2005, pp. 412-463.
"Plan 9 kernel history: overview / file list / diff list," , accessed Oct. 22, 2007, pp. 1-16.
"Plan 9 kernel history: overview / file list / diff list," <http://switch.com/cgi-bin/plan9history.cgi?f=2001/0126/pc/etherga620.com>, accessed Oct. 22, 2007, pp. 1-16.
Alteon Websystems Inc., "Gigabit Ethernet/PCI Network Interface Card; Host/NIC Software Interface Definition," Jul. 1999, pp. 1-80, Revision 12.4.13, P/N 020001, San Jose, California.
Cavium Networks, "Cavium Networks Product Selector Guide-Single & Multi-Core MIPS Processors, Security Processors and Accelerator Boards," 2008, pp. 1-44, Mountain View, CA, US.
Cavium Networks, "NITROX(TM) XL Security Acceleration Modules PCI 3V or 3V/5V-Universal Boards for SSL and IPSec," at http://www.Caviumnetworks.com, 2002, pp. 1, Mountain View, CA USA.
Cavium Networks, "NITROX™ XL Security Acceleration Modules PCI 3V or 3V/5V-Universal Boards for SSL and IPSec," at http://www.Caviumnetworks.com, 2002, pp. 1, Mountain View, CA USA.
Cavium Networks, "PCI, PCI-X," at (http://www.cavium.com/acceleration-boards-PCI-PCI-X.htm (Downloaded Oct. 2008), Cavium Networks-Products > Acceleration Boards > PCI, PCI-X).
Comtech AHA Corporation, "Comtech AHA Announces 3.0 Gbps GZIP Compression/Decompression Accelerator AHA362-PCIX offers high-speed GZIP compression and decompression," www.aha.com, Apr. 20, 2005, pp. 1-2, Moscow, ID, USA.
Comtech AHA Corporation, "Comtech AHA Announces GZIP Compression and Decompression IC Offers the highest speed and compression ratio performance in hardware on the market," www.aha.com, Jun. 26, 2007, pp. 1-2, Moscow, ID, USA.
EventHelix, "DMA and Interrupt Handling," , Jan. 29, 2010, pp. 1-4, EventHelix.com.
EventHelix, "DMA and Interrupt Handling," <http://www.eventhelix.com/RealtimeMantra/FaultHandling/dma-interrupt-handling.htm>, Jan. 29, 2010, pp. 1-4, EventHelix.com.
EventHelix, "TCP-Transmission Control Protocol (TCP Fast Retransmit and Recovery)," Mar. 28, 2002, pp. 1-5, EventHelix.com.
Harvey et al., "DMA Fundamentals on Various PC Platforms," Application Note 011, Apr. 1999, pp. 1-20, National Instruments Corporation.
Mangino, John, "Using DMA with High Performance Peripherals to Maximize System Performance," WW TMS470 Catalog Applications, SPNA105 Jan. 2007, pp. 1-23.
Mogul, Jeffrey C., "The Case for Persistent-Connection HTTP," SIGCOMM '95, Digital Equipment Corporation Western Research Laboratory, 1995, pp. 1-15, Cambridge, Maine.
Rabinovich et al., "DHTTP: An Efficient and Cache-Friendly Transfer Protocol for the Web," IEEE/ACM Transactions on Networking, Dec. 2004, pp. 1007-1020, vol. 12, No. 6.
Salchow, Jr., KJ, "Clustered Multiprocessing: Changing the Rules of the Performance Game," F5 White Paper, Jan. 2008, pp. 1-11, F5 Networks, Inc.
Stevens, W., "TCP Slow Start, Congestion Avoidance, Fast Retransmit, and Fast Recovery Algorithms," Network Working Group, RFC 2001, Jan. 1997, pp. 1-6.
Wadge, Wallace, "Achieving Gigabit Performance on Programmable Ethernet Network Interface Cards," May 29, 2001, pp. 1-9.
Welch, Von, "A User's Guide to TCP Windows," http://www.vonwelch.com/report/tcp-windows, updated 1996, last accessed Jan. 29, 2010, pp. 1-5.
Wikipedia, "Direct memory access," , accessed Jan. 29, 2010, pp. 1-6.
Wikipedia, "Direct memory access," <http://en.wikipedia.org/wiki/Direct-memory-access>, accessed Jan. 29, 2010, pp. 1-6.

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170269853A1 (en) * 2015-06-30 2017-09-21 International Business Machines Corporation Statistic-based isolation of lethargic drives
US10162535B2 (en) * 2015-06-30 2018-12-25 International Business Machines Corporation Statistic-based isolation of lethargic drives
US20170104697A1 (en) * 2015-10-12 2017-04-13 Mellanox Technologies Ltd. Dynamic Optimization for IP Forwarding Performance
US10284502B2 (en) * 2015-10-12 2019-05-07 Mellanox Technologies, Ltd. Dynamic optimization for IP forwarding performance
US11855898B1 (en) 2018-03-14 2023-12-26 F5, Inc. Methods for traffic dependent direct memory access optimization and devices thereof
US10958248B1 (en) 2020-05-27 2021-03-23 International Business Machines Corporation Jitter attenuation buffer structure

Similar Documents

Publication Publication Date Title
US20220231962A1 (en) System and method for facilitating data request management in a network interface controller (nic)
US10382362B2 (en) Network server having hardware-based virtual router integrated circuit for virtual networking
CN109768939B (en) Priority-supporting labeling network stack method and system
US8880632B1 (en) Method and apparatus for performing multiple DMA channel based network quality of service
US20150278148A1 (en) PCIe-BASED HOST NETWORK ACCELERATORS (HNAS) FOR DATA CENTER OVERLAY NETWORK
US9639403B2 (en) Receive-side scaling in a computer system using sub-queues assigned to processing cores
US20190044879A1 (en) Technologies for reordering network packets on egress
KR20070030285A (en) Apparatus and method for supporting memory management in an offload of network protocol processing
US9485191B2 (en) Flow-control within a high-performance, scalable and drop-free data center switch fabric
US9270602B1 (en) Transmit rate pacing of large network traffic bursts to reduce jitter, buffer overrun, wasted bandwidth, and retransmissions
US10536385B2 (en) Output rates for virtual output queses
KR20140004743A (en) An apparatus and a method for receiving and forwarding data packets
US20160173451A1 (en) Dynamic Denial of Service Protection
WO2021041622A1 (en) Methods, systems, and devices for classifying layer 4-level data from data queues
US10616116B1 (en) Network traffic load balancing using rotating hash
US20130329556A1 (en) Flow control for network packets from applications in electronic devices
US20200348989A1 (en) Methods and apparatus for multiplexing data flows via a single data structure
US11218412B2 (en) Method and system for managing the download of data
EP3275139B1 (en) Technologies for network packet pacing during segmentation operations
US11228532B2 (en) Method of executing QoS policy and network device
KR101463783B1 (en) Packet processing device and method thereof
JP6620760B2 (en) Management node, terminal, communication system, communication method, and program
Meyer et al. Low latency packet processing in software routers
US11909841B2 (en) System, apparatus and method for adaptive peer-to-peer communication with edge platform
WO2022188807A1 (en) Data transmission system and related device

Legal Events

Date Code Title Description
AS Assignment

Owner name: F5 NETWORKS, INC., WASHINGTON

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:MICHELS, TIMOTHY S.;HAWTHORNE, JONATHAN M.;MIMMS, ALAN B.;AND OTHERS;SIGNING DATES FROM 20150107 TO 20150405;REEL/FRAME:035472/0678

STCF Information on status: patent grant

Free format text: PATENTED CASE

FEPP Fee payment procedure

Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 4

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 8