Abstract:
A secure repeater (20) implementing data packet masking includes a programmable and selective, on a per port basis, delay disrupt response. A delay disrupt controller (70) receives signals indicating retransmissions of fields from a data packet. These signals include a destination address field and a source address field. A plurality of memories, one associated with each port, determines the associated port's delay response to the data packet. Each memory stores a delay disrupt control code. When the delay disrupt control code for a particular port has a value indicating that the associated port is enabled to delay disruption of a data packet, security marking is disabled until the source address field is retransmitted from the particular port.
Abstract:
A media independent interface for interconnecting an integrated repeater front-end with one or more integrated interface devices, each having several physical layer devices for operation in conformance with IEEE 802.3u. The media independent interface, in a repeater implementation, shares transmit and receive data channels, and provides for dedicated control signals, thereby multiplexing shared channels across all of the physical layer devices in the integrated interface device.
Abstract:
A flow control enabled Ethernet switch that applies backpressure to input ports that attempt to transmit a data packet to a busy destination port. The backpressure is a phantom packet that activates the IEEE 802.3 collision detection system to abort transmission of the data packet. A subsequent series of phantom packets (that are invalid) provide carrier activity that inhibits retransmission of the packet. When the destination port is available, the phantom packets are stopped, permitting standard retransmission of the data packet. The switch includes prioritization mechanisms (e.g., a throttle count) to use when awarding priority to a port having backpressure applied.
Abstract:
In a repeater (10) having multiple ports (40) and receiving at a source port a data packet containing a received address, an address mapping system including a content addressable memory (CAM) with address registers containing stored addresses, and an address mapping matrix (100) coupled to said CAM, for perfectly mapping any of the address registers to any of the ports. According to one aspect of the invention, it operates in a repeater having an address compare and disrupt security system. The preferred embodiment of the present invention includes a content addressable memory having address registers containing stored individual and multicast addresses associated with each repeater port, and an address mapping matrix including a disrupt enable circuit (120) associated with each port, for enabling the disruption of the data packet at that port when the received destination address does not match the associated stored addresses, and for disabling the disruption of the data packet at that port when the received destination address matches the stored address in a particular register and that particular register is mapped to that port via an address mapping register (110).
Abstract:
A flow control enabled Ethernet switch that applies backpressure to input ports that attempt to transmit a data packet to a busy destination port. The backpressure is a phantom packet that activates to abort transmission of the data packet. When the destination port is available, the phantom packets control retransmission, permitting standard retransmission of the data packet. The switch may include prioritization mechanisms to use when awarding priority to a port having backpressure applied.
Abstract:
A secure repeater implementing data packet masking includes a programmable and selective, on a per port basis, multicast response. A multicast controller (70x) receives a multicast identifier extracted from a destination address field of a data packet. A plurality of memories, one associated with each port (85x), determines the associated ports response to the multicast identifier. Each memory stores a multicast control code. When the multicast control code for a particular port has a value indicating that the associated port is enabled to receive multicast packets, assertion of the multicast identifier to the multicast controller for the particular port results in disabling the security masking for the port and subsequent transmission of unmodified data from the particular port.
Abstract:
A secure repeater (20) implementing data packet masking includes a programmable and selective, on a per port basis, disrupt response responsive to any of several selectable qualifying conditions. A disrupt controller (70) receives signals indicating various characteristics of fields of a data packet, and other conditions. A register bank (76) includes a plurality of memories, one associated with each port and some of the conditions, assists the disrupt controller to determine the associated port's disrupt response to the data packet. Each memory stores a disrupt control code. When the disrupt control code for a particular port has a value indicating that the associated port is enabled, deassertion of a condition signal associated with that control code results in disruption of a data packet. A cell array (200) permits simple, efficient scaling and formation of integrated semiconductor structures to implement complex disrupt logic equations.
Abstract:
An integrated repeater (100) for implementing per-port Port Mobility is provided as part of a semiconductor integrated repeater package. The integrated repeater includes a number of Pseudo-AUI ports for connecting to transceiver devices (104). Each repeater device is coupled into a collision domain. By connecting one transceiver device to multiple repeaters in different collision domains, and controlling the connection to the repeater, the network port associated with the transceiver device is moved from one collision domain into another. Corresponding Pseudo-AUI ports on repeaters not part of the desired collision domain are isolated (using a tri-state gate). Various repeater resources are shared across the various network ports, even though they may be in different collision domains.
Abstract:
A method and arrangement for queuing data in a prioritized manner have a queue with a single queue write side in which data entries are input to the queue. The queue also has a plurality of queue read sides, with each read side having a different priority level. An entry exiting from the queue write side is examined to determine the priority level of the entry, and then placed into the queue read side with the matching priority level as the entry. The queue read sides form the output of the queue, and are polled and emptied so that the higher priority queues are emptied completely before emptying lower priority queues.
Abstract:
Management data is supplied to a management agent by a network switch by generating management packets having at least a portion of a received data packet, and management information specifying receive status and network switch response characteristics to the corresponding received data packet. The network switch includes a plurality of network ports, including network traffic ports and one management port for synthesizing the management frame. A network traffic port receiving a data packet generates receive status data specifying the reception status of the received data packet, including the presence of cyclic redundancy check (CRC) errors, frame alignment errors, and receive buffer overflow conditions. The received data packet and received status data are stored in a buffer memory, while switching logic generates port vectors specifying destination output ports and switching logic data specifying the switching logic response to the received data packet. The management port selectively compiles the received status data, the switching logic data, and at least a portion of the received data frame into a management frame, and outputs the synthesized management frame to a management agent according to a media access control (MAC) layer protocol. The generation of management frame provides detailed management information corresponding to characteristics of the received data packet and the corresponding network switch response, independent of the timing at which the data packet was received by the network switch.