US20020099857A1 - Method and system for filtering multicast packets in a peripheral component environment - Google Patents
Method and system for filtering multicast packets in a peripheral component environment Download PDFInfo
- Publication number
- US20020099857A1 US20020099857A1 US09/282,311 US28231199A US2002099857A1 US 20020099857 A1 US20020099857 A1 US 20020099857A1 US 28231199 A US28231199 A US 28231199A US 2002099857 A1 US2002099857 A1 US 2002099857A1
- Authority
- US
- United States
- Prior art keywords
- hash
- peripheral component
- hash value
- multicast packet
- multicast packets
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F13/00—Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
- G06F13/38—Information transfer, e.g. on bus
- G06F13/382—Information transfer, e.g. on bus using universal interface adapter
- G06F13/385—Information transfer, e.g. on bus using universal interface adapter for adaptation of a particular data processing system to different peripheral devices
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
- The present invention generally pertains to the field of computer networking. More particularly, the present invention is related to multicast packet filtering in a peripheral component environment.
- Computers have become an integral tool used in a wide variety of different applications, such as in finance and commercial transactions, computer-aided design and manufacturing, health-care, telecommunication, education, etc. Computers are finding new applications as a result of advances in hardware technology and rapid development in software technology. Furthermore, a computer system's functionality is dramatically enhanced by coupling stand-alone computers together to form a computer network. In a computer network, users may readily exchange files, share information stored on a common database, pool resources, and communicate via e-mail and via video teleconferencing.
- One popular type of computer network is known as a local area network (LAN). LANs connect multiple computers together such that the users of the computers can access the same information and share data. Typically, in order to be connected to a LAN, a general purpose computer requires an expansion board generally known as a network interface card (NIC). Essentially, the NIC works with the operating system and central processing unit (CPU) of the host computer to control the flow of information over the LAN. Some NICs may also be used to connect a computer to the Internet.
- The NIC, like other hardware devices, requires a device driver which controls the physical functions of the NIC and coordinates data transfers between the NIC and the host operating system. An industry standard for interfacing between the device driver and the host operating system is known as the Network Device Interface Specification, or NDIS, which is developed by Microsoft Corporation of Redmond, Washington. The operating system layer implementing the NDIS interface is generally known as an NDIS wrapper. Functionally, the NDIS wrapper arbitrates the control of the device driver between various application programs and provides temporary storage for the data packets.
- Multicasting of packets in well known in the field of computer networking. A multicast packet is packet which is intended for receipt by more than one recipient. However, multicast packets, and the receipt thereof, can have a deleterious effect on many computer systems. Specifically, as the number of multicast packets continually increases, recipients (e.g. client computer systems) are forced to spend more and more time examining received multicast packets and determining whether or not they are wanted. That is, even when not requested, received multicast packets require intervention by the recipient. Thus, the recipient is often forced to store the multicast packet; examine the multicast packet; and the discard the multicast packet (when the multicast packet is unwanted) or keep the multicast packet (when the multicast packet is desired). Hence, considerable CPU (central processing unit) utilization can be wasted by receiving and handling unwanted multicast packets. Such wasted CPU utilization is especially prevalent in some conventional peripheral component environments. More specifically, in some conventional peripheral component environments, the peripheral component is forced to frequently interrupt the host computer to forward received multicast packets. Therefore, as network speeds increase (e.g. Gigabit Ethernet and the like), peripheral component interruptions of the host computer, due to received multicast packets, become a significant source CPU drain.
- In one attempt to reduce the CPU burden imposed by multicast packets, a filter is employed. In one such approach, referred to as a “perfect” filter system, the host computer (e.g. a driver operating thereon) constructs a list of desired destination addresses corresponding to respective multicast packets which the host computer wants to receive. Whenever a multicast packet is received, its destination address is compared to the previously constructed list of desired destination addresses. If the destination address of the received multicast packet is contained the list of desired destination addresses, the multicast packet is kept. On the other hand, if the destination address of the received multicast packet is not contained in the list of desired destination addresses, the multicast packet is discarded. Thus, by requiring the host computer to list each and every desired destination address, such prior art methods require extensive host computer intervention.
- There are additional substantial drawbacks to conventional “perfect” filtering methods. As one example, there are 247 potential destination addresses for multicast packets. Therefore, storing all desired multicast addresses potentially consumes a burdensome amount of storage space. That is, constructing a table containing as many as 247 desired destination addresses can exhaust an inordinate amount of valuable memory space.
- Thus, a need exists for a method and system for filtering multicast packets wherein the method and system does not require extensive host computer intervention. Still another need exists for a method and system for filtering multicast packets wherein the method and system meets the above-listed need and wherein the method and system does not consume burdensome amounts of storage space. Yet another need exists for a method and system for filtering multicast packets wherein the method and system meets the above-listed needs and wherein the method and system does not require extensive modifications to underlying peripheral component driver protocols.
- The present invention provides a method and system for filtering multicast packets wherein the method and system does not require extensive host computer intervention. The present invention further provides a method and system for filtering multicast packets wherein the method and system achieves the above-listed accomplishment and wherein the method and system does not consume burdensome amounts of storage space. The present invention also provides a method and system for filtering multicast packets wherein the method and system achieves the above-listed accomplishments and wherein the method and system does not require extensive modifications to underlying peripheral component driver protocols.
- Specifically, in one embodiment, the present invention uses a peripheral component driver to store in memory a selected hash values corresponding to desired multicast packets. In one embodiment, the peripheral component driver operates on a host computer to which a peripheral component is coupled. Next, when the peripheral component receives an incoming multicast packet, the present invention uses a hash value generator disposed on the peripheral component to determine a hash value for the received multicast packet. The present embodiment then compares the hash value for the received multicast packet with the selected hash values stored in memory. Provided the hash value for the received multicast packet does not match any of the selected hash values stored in the memory, the present embodiment discards the received multicast packet without interrupting the host computer. In so doing, the present embodiment effectively filters multicast packets without requiring constant intervention by the CPU (central processing unit) of the host computer.
- In another embodiment, the present invention includes the features of the above-listed embodiment and further recites that the hash value generator produces a 10 bit hash value. In so doing, the present embodiment is able to generate up to 1024 hash values which, in turn, can be compared to 1024 selected hash values corresponding to at least 1024 desired multicast packets.
- These and other advantages of the present invention will no doubt become obvious to those of ordinary skill in the art after having read the following detailed description of the preferred embodiments which are illustrated in the various drawing figures.
- The accompanying drawings, which are incorporated in and form a part of this specification, illustrate embodiments of the invention and, together with the description, serve to explain the principles of the invention:
- FIG. 1 is a schematic diagram of an exemplary computer system used to perform steps of the present imperfect filtering of multicast packets method in accordance with one embodiment of the present invention.
- FIG. 2 is a schematic diagram of different operating layers associated with the computer system as illustrated in FIG. 1 in furtherance of one embodiment of the present invention.
- FIG. 3 is a flow chart of steps performed in one implementation of an imperfect filtering of multicast packets method and system in accordance with one embodiment of the present claimed invention.
- FIG. 4 is a schematic diagram of a cyclic redundancy check system utilized in conjunction with an imperfect filtering of multicast packets method and system in accordance with one embodiment of the present claimed invention.
- FIG. 5 is a schematic diagram representing hash value storage arrangements used in an imperfect filtering of multicast packets method and system in accordance with one embodiment of the present claimed invention.
- The drawings referred to in this description should be understood as not being drawn to scale except if specifically noted.
- Reference will now be made in detail to the preferred embodiments of the invention, examples of which are illustrated in the accompanying drawings. While the invention will be described in conjunction with the preferred embodiments, it will be understood that they are not intended to limit the invention to these embodiments. On the contrary, the invention is intended to cover alternatives, modifications and equivalents, which may be included within the spirit and scope of the invention as defined by the appended claims. Furthermore, in the following detailed description of the present invention, numerous specific details are set forth in order to provide a thorough understanding of the present invention. However, it will be obvious to one of ordinary skill in the art that the present invention may be practiced without these specific details. In other instances, well known methods, procedures, components, and circuits have not been described in detail as not to unnecessarily obscure aspects of the present invention.
- Some portions of the detailed descriptions which follow are presented in terms of procedures, logic blocks, processing, and other symbolic representations of operations on data bits within a computer memory. These descriptions and representations are the means used by those skilled in the data processing arts to most effectively convey the substance of their work to others skilled in the art. In the present application, a procedure, logic block, process, etc., is conceived to be a self-consistent sequence of steps or instructions leading to a desired result. The steps are those requiring physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of electrical or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated in a computer system. It has proved convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers, or the like.
- It should be borne in mind, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities. Unless specifically stated otherwise as apparent from the following discussions, it is appreciated that throughout the present invention, discussions utilizing terms such as “storing”, “determining”, “comparing”, “discarding” or the like, refer to the actions and processes of a computer system, or similar electronic computing device. The computer system or similar electronic computing device manipulates and transforms data represented as physical (electronic) quantities within the computer system's registers and memories into other data similarly represented as physical quantities within the computer system memories or registers or other such information storage, transmission, or display devices. The present invention is also well suited to the use of other computer systems such as, for example, optical and mechanical computers.
- With reference now to FIG. 1, portions of the present hardware assisted polling for software drivers method and system are comprised of computer- readable and computer-executable instructions which reside, for example, in computer-usable media of a computer system. FIG. 1 illustrates an
exemplary computer system 100 used to perform the imperfect filtering of multicast packets method in accordance with one embodiment of the present invention. It is appreciated thatsystem 100 of FIG. 1 is exemplary only and that the present invention can operate within a number of different computer systems including general purpose networked computer systems, embedded computer systems, and stand alone computer systems. -
System 100 of FIG. 1 includes an address/data bus 102 for communicating information, and acentral processor unit 104 coupled tobus 102 for processing information and instructions.Central processor unit 104 may be an 80×86-family microprocessor.System 100 also includes data storage features such as a computer usablevolatile memory 106, e.g. random access memory (RAM), coupled tobus 102 for storing information and instructions forcentral processor unit 104, computer usablenon-volatile memory 108, e.g. read only memory (ROM), coupled tobus 102 for storing static information and instructions for thecentral processor unit 104, and a data storage unit 110 (e.g., a magnetic or optical disk and disk drive) coupled tobus 102 for storing information and instructions.System 100 of the present invention also includes an optionalalphanumeric input device 112 including alphanumeric and function keys is coupled tobus 102 for communicating information and command selections tocentral processor unit 104.System 100 also optionally includes acursor control device 114 coupled tobus 102 for communicating user input information and command selections tocentral processor unit 104.System 100 of the present embodiment also includes anoptional display device 116 coupled tobus 102 for displaying information. - Referring still to FIG. 1,
optional display device 116 of FIG. 1, may be a liquid crystal device, cathode ray tube, or other display device suitable for creating graphic images and alphanumeric characters recognizable to a user. Optionalcursor control device 114 allows the computer user to dynamically signal the two dimensional movement of a visible symbol (cursor) on a display screen ofdisplay device 116. Many implementations ofcursor control device 114 are known in the art including a trackball, mouse, touch pad, joystick or special keys onalphanumeric input device 112 capable of signaling movement of a given direction or manner of displacement. Alternatively, it will be appreciated that a cursor can be directed and/or activated via input fromalphanumeric input device 112 using special keys and key sequence commands. The present invention is also well suited to directing a cursor by other means such as, for example, voice commands. A more detailed discussion of the imperfect filtering of multicast packets method and system embodiments of the present invention are found below. - With reference still to FIG. 1, significantly, a network interface card (NIC)118 coupled to
bus 102 is connected to anetwork 120 and controls the flow of information overnetwork 120. Data packets, such as Ethernet packets, that are incoming arrive atNIC 118 vianetwork 120 and are stored in memory 140 ofNIC 118 before being transferred to other hardware and software ofcomputer system 100. Memory 140 ofNIC 118 is also well suited to storing, for example, selected hash values (generated by host computer 100) corresponding to desired multicast packets. It will be understood, thatNIC 118 is also well suited to transmitting data packets tonetwork 120.NIC 118 of FIG. 1 further includes ahash value generator 142, and a comparator 144. A more detailed discussion ofNIC 118 in furtherance of the present invention is found below. - Referring next to FIG. 2, a block diagram that represents the different layers of a
host operating system 200 operable oncomputer system 100 of FIG. 1 is shown.Host operating system 200 includes a networkinterface card driver 210 that operatesNIC 118 and moves data packets betweenNIC 118 and other hardware and software ofcomputer system 100. Implemented directly above networkinterface card driver 210 is a network device interface specification (NDIS)wrapper 220. FIG. 2 further includes a schematic representation of operating system layers 230.NDIS wrapper 220 primarily arbitrates the control of networkinterface card driver 210 between various application programs, typically shown as 260. - With reference next to FIG. 3, an
flow chart 300 of exemplary steps used by the present invention is shown.Flow chart 300 includes processes of the present invention which, in one embodiment, are carried out by a processor under the control of computer-readable and computer-executable instructions. The computer-readable and computer-executable instructions reside, for example, in data storage features such as computer usablevolatile memory 106 and/or computer usablenon-volatile memory 108 of FIG. 1. The computer-readable and computer-executable instructions are used to control or operate in conjunction with, for example,central processing unit 104 of FIG. 1,host operating system 200, andnetwork device driver 210 both of FIG. 2. Although specific steps are disclosed inflow chart 300 of FIG. 3, such steps are exemplary. That is, the present invention is well suited to performing various other steps or variations of the steps recited in FIG. 3. - In step302 of FIG. 3, in one embodiment, the present stores selected hash values in memory. In one embodiment
peripheral component driver 210 stores the selected hash values in memory 140 orNIC 118. In the following description of embodiments of the present invention, the peripheral component driver is a network interface card driver. Additionally, in the following description of embodiments of the present invention, the peripheral component is a network interface card. Although the present embodiments specifically recite a network interface card and a network interface card driver, the present invention is also well suited to an embodiment employing various other peripheral components and peripheral component drivers. That is, the present invention is well suited to an embodiment in which the peripheral component is, for example, a PCMCIA (personal computer memory card international association) card and the peripheral component driver is a corresponding PCMCIA driver. Similarly, the present invention is well suited to an embodiment in which the peripheral component is, for example, a compact form factor I/O (input/output) card and the peripheral component driver is a corresponding compact form factor I/O driver. - Referring again to step302 of FIG. 3, as mentioned above, network
interface card driver 210 of FIG. 2 is adapted, in one embodiment, to store selected hash values in memory 140 ofNIC 118, both of FIG. 1. In one embodimentperipheral component driver 210 employs an IEEE (Institute of Electronics and Electrical Engineers, Inc.) 802.3 32-bit CRC (cyclic redundancy check) approach to pare the 48 bit destination addresses of the desired multicast packets to 32 bits. Hence the present embodiment is able to use an existing CRC scheme often employed in NICs to pare the 48 bit destination addresses of the desired multicast packets to 32 bits. Considering the following generating polynomial: - G(x)=x 32 +x 26 +x 23 +x 22 +x 16 +x 12 +x 11 +x 10 +x 8 +x 7 +x 5 +x 4 +x 2 x1
- Mathematically, the CRC value corresponding to a given destination address is defined by the following procedure:
- a) The first 32 bits of the frame are complemented.
- b) The n bits of the frame are then considered to be the coefficients of a polynomial M(x) of degree n−1. (The first bit of the Destination Address field corresponds to the X(n−1) term and the last bit of the data field corresponds to the x0 term.)
- c) M(x) is multiplied by X32 and divided by G(x), producing a remainder R(x) of degree<31.
- d) The coefficients of R(x) are considered to be a 32-bit sequence.
- e) The bit sequence is complemented and the result is the CRC.
- The 32 bits of the CRC value are placed in the frame check sequence field so that the x31 term is the left most bit of the first octet, and the x0 term is the right most bit of the last octet. (The bits of the CRC are thus transmitted in the order x31, x30 , . . . , x1, x0.). Thus, the present embodiment does not require extensive modifications to existing protocols. Although such an approach is recited in the present embodiment, the present invention is also well suited to the use of various other approaches for paring the 48 bit destination addresses to a lesser number of bits. The present invention is also well suited to an embodiment in which
peripheral component driver 210 passes the destination addresses toNIC 118 andNIC 118 performs the CRC and then determines the hash values for the respective desired multicast addresses. In such an embodiment, CPU utilization ofhost computer 100 is kept to a minimum. - Referring still to step302, after the CRC, the present embodiment uses the lower 10 bits of the 32-bit CRC to determine the selected hash value corresponding to the destination address of the desired multicast packet. By using 10 bits of the CRC result, the present embodiment provides 1024 unique values which can represent corresponding multicast packet addresses. Thus, the present embodiment is well suited to environments such as Gigabit Ethernet environments where a large number of multicast packets may need to be filtered. That is, the present embodiment increases the quantity of multicast packets which can be designated as desired over conventional approaches, thereby rendering the method and system of the present invention well suited for use in present high-speed, large-bandwidth environments. Furthermore, the present method and system increases the quantity of multicast packets which can be designated as desired over conventional approaches and, by using a 1024 entry hash table, does not consume burdensome amounts of storage space. Although the present embodiment recites using the lower 10 bits of the 32-bit CRC to determine the selected hash value, the present invention is also well suited to an embodiment which uses various others of the 32-bits in the CRC result.
- With reference now to FIG. 4, a schematic diagram400 of a cyclic redundancy check system is shown. More particularly, as shown in FIG. 4, an 802.3
CRC generator 402 produces a 32-bit result. The lower 10 bits (e.g. bits [4:0] and bits [9:5]) are then fed intohash value generator 142. Hash value generator uses bits [9:5] to compute first value, and bits [4:0] to compute a second value. The use of these values will be described in detail below. In the present embodiment, hasvalue generator 142 is implemented in hardware onNIC 118. More specifically, in the present embodiment,hash value generator 142 is implemented onNIC 118 in hardware as is described by the following Verilog code:input [9:0] rg_hash_index; output rg_multicast_hash; reg [31:0] rx_hash_table_reg_00, rx_hash_table_reg_01, rx_hash_table_reg_02, rx_hash_table_reg_03, rx_hash_table_reg_04, rx_hash_table_reg_05, rx_hash_table_reg_06, rx_hash_table_reg_07, rx_hash_table_reg_08, rx_hash_table_reg_09, rx_hash_table_reg_10, rx_hash_table_reg_11, rx_hash_table_reg_12, rx_hash_table_reg_13, rx_hash_table_reg_14, rx_hash_table_reg_15, rx_hash_table_reg_16, rx_hash_table_reg_17, rx_hash_table_reg_18, rx_hash_table_reg_19, rx_hash_table_reg_20, rx_hash_table_reg_21, rx_hash_table_reg_22, rx_hash_table_reg_23, rx_hash_table_reg_24, rx_hash_table_reg_25, rx_hash_table_reg_26, rx_hash_table_reg_27, rx_hash_table_reg_28, rx_hash_table_reg_29, rx_hash_table_reg_30, rx_hash_table_reg_31, rx_hash_table_reg_32, reg rg_multicast_hash; reg [31:0] rx_hash_result; wire [31:0] rg_hash_result_index wire [31:0] rx_hash_table mask; / / This block comb block determines if the bit specified in / / rg-hash_index_rclk is set in the multicast hash table. always @ (rx_hash_table_mask or rx_hash_table_reg_00 or rx_hash_table_reg_01 or rx_hash_table_reg_02 or rx_hash_table_reg_03 or rx_hash_table_reg_04 or rx_hash_table_reg_05 or rx_hash_table_reg_06 or rx_hash_table_reg_07 or rx_hash_table_reg_08 or rx_hash_table_reg_09 or rx_hash_table_reg_10 or rx_hash_table_reg_11 or rx_hash_table_reg_12 or rx_hash_table_reg_13 or rx_hash_table_reg_14 or rx_hash_table_reg_15 or rx_hash_table_reg_16 or rx_hash_table_reg_17 or rx_hash_table_reg_18 or rx_hash_table_reg_19 or rx_hash_table_reg_20 or rx_hash_table_reg_21 or rx_hash_table_reg_22 or rx_hash_table_reg_23 or rx_hash_table_reg_24 or rx_hash_table_reg_5 or rx_hash_table_reg_26 or rx_hash_table_reg_27 or rx_hash_table_reg_28 or rx_hash_table_reg_29 or rx_hash_table_reg_30 or rx_hash_table_reg_31 ) begin: rgm_is_multicast_hash_comb rx_hash_result = 32 hffffffff; / / Here we and the rx_hash_table_mask (which is the lower five bits / / of the hash index decoded into 32bit) against every 32bit entry / / of the hash table. The results of this and generates a new / / 32-bit value rx_hash_result. So this means rx_hash_result tells / / us if the result of the and operation between a particular hash / / table entry and the mask is true of false. / / if ( ( rx_hash_table_reg_00 & rx_hash_table_mask) == 0) begin rx_hash_result [0] = 0; end if ( ( rx_hash_table_reg_01 & rx_hash_table_mask) == 0) begin rx_hash_result [1] = 0; end if ( ( rx_hash_table_reg_02 & rx_hash_table_mask) == 0) begin rx_hash_result[2] = 0; end if ( ( rx_hash_table_reg_03 & rx[1 hash_table_mask) == 0) begin rx_hash_result[3] = 0; end if ( ( rx_hash_table_reg_04 & rx_hash_table_mask) == 0) begin rx_hash_result[4] = 0; end if ( ( rx_hash_table_reg_05 & rx_hash_table_mask) == 0) begin rx_hash_result[5] = 0; end if ( ( rx_hash_table_reg_06 & rx_hash_table_mask) == 0) begin rx_hash_result[6] = 0; end if ( ( rx_hash_table_reg_07 & rx_hash_tablemask) == 0) begin rx_hash_result[7] = 0; end if ( ( rx_hash_table_reg_08 & rx_hash_table_mask) == 0) begin rx_hash_result[8] = 0; end if ( rx_hash_table reg_09 & rx_hash_table_mask) == 0) begin rx_hash_result[9] = 0; end if ( ( rx hash_table_reg_10 & rx_hash_table_mask) == 0) begin rx_hash_result[10] = 0; end if ( ( rx_hash_table reg_11 & rx_hash_table_mask) == 0) begin rx_hash_result[11] = 0; end if ( ( rx_hash_table_reg_12 & rx_hash_table_mask) == 0) begin rx_hash_result[12] = 0; end if ( ( rx_hash_table_reg_13 & rx_hash_table_mask) == 0) begin rx_hash_result[13] = 0; end if ( ( rx_hash_table_reg_14 & rx_hash_table_mask) == 0) begin rx_hash_result[14] = 0; end if ( ( rx_hash_table_reg— 15 & rx_hash_table_mask) == 0) begin rx_hash_result [15] = 0; end if ( ( rx_hash_table_reg— 16 & rx_hash_table_mask) == 0) begin rx_hash_result [16] = 0; end if ( ( rx_hash_table_reg_17 & rx_hash_table_mask) == 0) begin rx_hash_result[17] = 0; end if ( ( rx_hash_table_reg_18 & rx_hash_table_mask) == 0) begin rx_hash_result[18] = 0; end if ( ( rx_hash_table_reg_19 & rx_hash_table_mask) == 0) begin rx_hash_result[19] = 0; end if ( ( rx_hash_table_reg_20 & rx_hash_table_mask) == 0) begin rx_hash_result[20] = 0; end if ( ( rx_hash_table_req_21 & rx_hash_table_mask) == 0) begin rx_hash_result[21] = 0; end if ( ( rx_hash_table_reg_22 & rx_hash_table_mask) == 0) begin rx_hash_result[22] = 0; end if ( ( rx_hash_table_reg_23 & rx_hash_table_mask) == 0) begin rx_hash_result[23] = 0; end if ( ( rx_hash_table_reg_24 & rx_hash_table_mask) == 0) begin rx_hash_result [24] = 0; end if ( ( rx_hash_table_reg_25 & rx_hash_table_mask) == 0) begin rx_hash_result [25] = 0; if ( ( rx_hash_table_reg_26 & rx_hash_table_mask) == 0) begin rx_hash_result[26] = 0; end if ( ( rx hash_table_reg_27 & rx_hash_table_mask) == 0) begin rx_hash_result[27] = 0 end if ( ( rx_hash_table_reg_28 & rx_hash_table_mask) == 0) begin rx_hash_result [28] = 0; end if ( ( rx_hash_table_reg_29 & rx_hash_table_mask) == 0) begin rx_hash_result(29) = 0; end if ( ( rx_hash_table_reg_30 & rx_hash_table_mask) == 0) begin rx_hash_result[30] = 0; end if ( ( rx_hash_table_reg_31 & rx_hash_table_mask) == 0) begin rx_hash_result[31] = 0; end end always @ (rx_hash_result or rg_hash_result_index) begin / /Here we and the rx_hash_result with the decoded value of the / / upper five bits or rg_hash_index_rclk. If the result != 0, then / / the bit specified by the 10 bit value of rg_hash_index_rclk / / was set in the multicast table. begin if ( ( rx hash_result & rg_hash_result_index_index) != 0) begin rg_multicast_hash = 1; end else begin rg_multicast_hash = 0 end end / /This is a 5x32 decoder. The output is used as a bit mask. / / which is and with the rg_ash_table reg_[rg.hash_index_rclk[9:5] / / to determine if the packet should be passed up. rgmDecoder rgmDecoder ( .rg_encoded_data)rg_hash_index [4:0]), 1 .rg_decoded_data (rx_hash_table_mask) 1 ); 1 rgmDecoder rgmHashMux ( 1 .rg_encoded)_data (rg_hash_index[9:5]), .rg_decoded_data (rg_hash_result_index) ); - Although such a hardware implementation is recited in the present embodiment, the present invention is well suited to various other implementations of
hash value generator 142, and to havinghash value generator 142 disposed other than onNIC 118. - With reference now to FIG. 5, a schematic diagram representing hash value storage arrangements used in one embodiment of the imperfect filtering of multicast packets method and system of the present claimed invention is shown. As shown in FIG. 5,
first value 406 determined from bits [9:5] of 802.2CRC generator 402 of FIG. 4 is used to designate one of the 32 rows in hash table 502 for received multicast packets, and in hash table 504 for selected desired multicast packets.Second value 408 determined from bits [4:0] of 802.2CRC generator 402 of FIG. 4 is used to designate one of the 32 entries per row of hash table 502 for received multicast packets, and in hash table 504 for selected desired multicast packets. The use of the storage arrangements of FIG. 5 will be described below in greater detail in conjunction with the steps of the present embodiment. In one embodiment, hash tables 502 and 504 reside, for example, in memory 140 ofNIC 118. The present invention is however, well suited to an embodiment in which hash tables 502 and 504 reside other than in memory 140 ofNIC 118. - Referring still to step302, in the present embodiment, the destination addresses of selected multicast packets are first subjected to a CRC. The lower 10 bits of the CRC result are then fed into a hash value generator to compute the corresponding selected hash value. As an example, if bits [9:5] had a hash value of 30 (assuming base 10) and bits [4:0] had a hash value of 6, table 504 would have a bit set (e.g. a one or high value) for the sixth entry of column 30. Thus, the present embodiment is well suited to providing a hash table (e.g. hash table 504) which stores values corresponding to at least 1024 desired multicast packet destination addresses. It will be understood that in some instances more than one desired multicast packet will generate the same hash value, or an undesired multicast packet may have the same hash value as desired packet. However, in such an instance, the present embodiment will still have the appropriate bit set in hash table 504. Although the present embodiment recites setting a bit high in hash table 504 for a desired multicast packet, the present invention is also well suited to an embodiment in which a bit is set, for example, low in hash table 504 for a desired multicast packet.
- Referring now to step304, upon receiving an incoming multicast packet, the present embodiment uses
hash value generator 142 to determine a hash value for the received multicast packet. More specifically, the present embodiment uses aCRC generator 402 to produce a 32-bit result from the 48-bit destination address of the received multicast packet. The lower 10 bits (e.g. bits [4:0] and bits [9:5]) are then fed intohash value generator 142. Hash value generator uses bits [9:5] to compute first value, and bits [4:0] to compute a second value.First value 406 determined from bits [9:5] of 802.2CRC generator 402 of FIG. 4 is used to designate one of the 32 rows in hash table 502.Second value 408 determined from bits [4:0] of 802.2CRC generator 402 of FIG. 4 is used to designate one of the 32 entries per row of hash table 502. - At
step 306, the present embodiment then compares the hash value for the received multicast packet with the selected hash values in table 504 corresponding to desired multicast packets. That is, determining the hash value for the received multicast packet, the present embodiment examines hash table 504 to see if the same hash value is present (i.e. is a bit set for the same entry in the same row). If the received multicast packet has the same destination address as a desired multicast packet (i.e. the same hash value is present in hash table 504), the present embodiment proceeds to step 308. If the received multicast packet does not have the same destination address as a desired multicast packet (i.e. the same hash value is not present in hash table 504), the present embodiment proceeds to step 310. - At
step 308, if the received multicast packet has the same destination address as a desired multicast packet (i.e. the same hash value that was determined for the received multicast packet is present in hash table 504), the present embodiment forwards the multicast packet fromNIC 118 tohost computer 100. - At
step 310, if the received multicast packet does not have the same destination address as a desired multicast packet (i.e. the same hash value that was determined for the received multicast packet is not present in hash table 504), the present embodiment discards the multicast packet fromNIC 118. That is,NIC 118 discards the received multicast packet without interruptinghost computer 100. BecauseNIC 118 is able to discard unwanted multicast packets before the multicast packets ever reachhost computer 100, the present invention does not require the extensive host computer intervention associated with conventional approaches wherein the host computer must evaluate its desire for received multicast packets. - Thus, the present invention provides a method and system for filtering multicast packets wherein the method and system does not consume burdensome amounts of storage space. The present invention further provides a method and system for filtering multicast packets wherein the method and system achieves the above-listed accomplishment and wherein the method and system does not require extensive host computer intervention. The present invention also provides a method and system for filtering multicast packets wherein the method and system achieves the above-listed accomplishments and wherein the method and system does not require extensive modifications to underlying peripheral component driver protocols.
- The foregoing descriptions of specific embodiments of the present invention have been presented for purposes of illustration and description. They are not intended to be exhaustive or to limit the invention to the precise forms disclosed, and obviously many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order best to explain the principles of the invention and its practical application, to thereby enable others skilled in the art best to utilize the invention and various embodiments with various modifications suited to the particular use contemplated. It is intended that the scope of the invention be defined by the Claims appended hereto and their equivalents.
Claims (19)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/282,311 US6442617B1 (en) | 1999-03-31 | 1999-03-31 | Method and system for filtering multicast packets in a peripheral component environment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/282,311 US6442617B1 (en) | 1999-03-31 | 1999-03-31 | Method and system for filtering multicast packets in a peripheral component environment |
Publications (2)
Publication Number | Publication Date |
---|---|
US20020099857A1 true US20020099857A1 (en) | 2002-07-25 |
US6442617B1 US6442617B1 (en) | 2002-08-27 |
Family
ID=23080927
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/282,311 Expired - Fee Related US6442617B1 (en) | 1999-03-31 | 1999-03-31 | Method and system for filtering multicast packets in a peripheral component environment |
Country Status (1)
Country | Link |
---|---|
US (1) | US6442617B1 (en) |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030131140A1 (en) * | 2001-12-26 | 2003-07-10 | Texas Instruments Incorporated | Data transfers in embedded systems |
US20040133669A1 (en) * | 2001-11-28 | 2004-07-08 | Esa Jalonen | Event or polling driven DVB-T filter detection |
US20050120378A1 (en) * | 2001-11-28 | 2005-06-02 | Esa Jalonen | Event driven filter monitoring for IP multicast services |
EP1668525A2 (en) * | 2003-09-18 | 2006-06-14 | Endace Technology Limited | Data transfer management method, software and system |
US7106894B1 (en) * | 1999-02-18 | 2006-09-12 | Ge Medical Systems Sa | Method for reducing X-ray noise |
WO2006103166A1 (en) * | 2005-04-01 | 2006-10-05 | International Business Machines Corporation | System anp method for reducing latency in a host ethernet adapter |
US20090310609A1 (en) * | 2007-06-26 | 2009-12-17 | Alvaro Fernandez Gutierrez | Method and device for managing multicast groups |
US20100014519A1 (en) * | 2007-10-15 | 2010-01-21 | Media Patents, S.L. | Methods for managing multicast traffic between sources sending data and hosts requesting data and network equipment used to implement the methods |
US20100046516A1 (en) * | 2007-06-26 | 2010-02-25 | Media Patents, S.L. | Methods and Devices for Managing Multicast Traffic |
US20100183008A1 (en) * | 2007-10-15 | 2010-07-22 | Fernandez Gutierrez Alvaro | Method for managing multicast traffic in a data network and network equipment using said method |
US20100254383A1 (en) * | 2007-10-30 | 2010-10-07 | Media Patents, S.L. | Method for managing multicast traffic between equipment in a multicast data network |
US20110010441A1 (en) * | 2008-03-05 | 2011-01-13 | Media Patents, S.L. | Equipment in a data network and methods for monitoring, configuring and/or managing the equipment |
US20110019673A1 (en) * | 2009-07-27 | 2011-01-27 | Media Patents, S.L. | Multicast traffic management in a network interface |
US20110058548A1 (en) * | 2008-02-01 | 2011-03-10 | Media Patents, S.L. | Methods and apparatus for managing multicast traffic through a switch |
US20110058551A1 (en) * | 2008-02-01 | 2011-03-10 | Media Patents, S.L. | Methods and apparatus for managing multicast traffic through a switch |
US20110149960A1 (en) * | 2009-12-17 | 2011-06-23 | Media Patents, S.L. | Method and apparatus for filtering multicast packets |
US8208418B1 (en) * | 2009-01-16 | 2012-06-26 | Extreme Networks, Inc. | Methods, systems, and computer readable media for conserving multicast port list resources in an internet protocol (IP) packet forwarding device |
EP2700194A1 (en) * | 2011-04-21 | 2014-02-26 | Hangzhou H3C Technologies Co., Ltd. | Forwarding a multicast message |
US9008091B1 (en) | 2010-11-19 | 2015-04-14 | Extreme Networks, Inc. | Methods, systems, and computer readable media for improved multicast scaling through policy based redirection |
Families Citing this family (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1912124B8 (en) * | 1999-10-14 | 2013-01-09 | Bluearc UK Limited | Apparatus and system for implementation of service functions |
US6785275B1 (en) | 2000-03-13 | 2004-08-31 | International Business Machines Corporation | Method and system for creating small group multicast over an existing unicast packet network |
US6757294B1 (en) * | 2000-03-13 | 2004-06-29 | International Business Machines Corporation | System and method for amicable small group multicast in a packet-switched network |
US6880090B1 (en) * | 2000-04-17 | 2005-04-12 | Charles Byron Alexander Shawcross | Method and system for protection of internet sites against denial of service attacks through use of an IP multicast address hopping technique |
US6934261B1 (en) * | 2000-11-17 | 2005-08-23 | Advanced Micro Devices, Inc. | Method to select dynamically between MACs of network device depending on network topology |
US7280540B2 (en) * | 2001-01-09 | 2007-10-09 | Stonesoft Oy | Processing of data packets within a network element cluster |
JP3827225B2 (en) * | 2001-10-29 | 2006-09-27 | ジャパンケーブルネット株式会社 | IP multicast relay system |
US7457822B1 (en) | 2002-11-01 | 2008-11-25 | Bluearc Uk Limited | Apparatus and method for hardware-based file system |
US8041735B1 (en) | 2002-11-01 | 2011-10-18 | Bluearc Uk Limited | Distributed file system and method |
US7720930B2 (en) * | 2003-12-30 | 2010-05-18 | Intel Corporation | Systems and methods using NIC-based prefetching for host TCP context lookup |
JP2007208632A (en) * | 2006-02-01 | 2007-08-16 | Sony Corp | Information processor and information processing method, program, and recording medium |
US7852851B2 (en) * | 2006-11-10 | 2010-12-14 | Broadcom Corporation | Method and system for hash table based routing via a prefix transformation |
US8549296B2 (en) * | 2007-11-28 | 2013-10-01 | Honeywell International Inc. | Simple authentication of messages |
US20110102157A1 (en) * | 2009-11-05 | 2011-05-05 | Nokia Corporation | Wake-Up For Wireless Devices Based On Requested Data |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5473607A (en) * | 1993-08-09 | 1995-12-05 | Grand Junction Networks, Inc. | Packet filtering for data networks |
JPH0946338A (en) * | 1995-07-28 | 1997-02-14 | Toshiba Corp | Multi-cast communication control system |
US5923654A (en) * | 1996-04-25 | 1999-07-13 | Compaq Computer Corp. | Network switch that includes a plurality of shared packet buffers |
US5862338A (en) * | 1996-12-30 | 1999-01-19 | Compaq Computer Corporation | Polling system that determines the status of network ports and that stores values indicative thereof |
US6018526A (en) * | 1997-02-20 | 2000-01-25 | Macronix America, Inc. | Bridge device with self learning between network media and integrated circuit and method based on the same |
US5935249A (en) * | 1997-02-26 | 1999-08-10 | Sun Microsystems, Inc. | Mechanism for embedding network based control systems in a local network interface device |
US6226680B1 (en) * | 1997-10-14 | 2001-05-01 | Alacritech, Inc. | Intelligent network interface system method for protocol processing |
US6085328A (en) * | 1998-01-20 | 2000-07-04 | Compaq Computer Corporation | Wake up of a sleeping computer using I/O snooping and imperfect packet filtering |
US6157955A (en) * | 1998-06-15 | 2000-12-05 | Intel Corporation | Packet processing system including a policy engine having a classification unit |
-
1999
- 1999-03-31 US US09/282,311 patent/US6442617B1/en not_active Expired - Fee Related
Cited By (44)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7106894B1 (en) * | 1999-02-18 | 2006-09-12 | Ge Medical Systems Sa | Method for reducing X-ray noise |
US7512084B2 (en) * | 2001-11-28 | 2009-03-31 | Nokia Corporation | Event driven filter monitoring for IP multicast services |
US20040133669A1 (en) * | 2001-11-28 | 2004-07-08 | Esa Jalonen | Event or polling driven DVB-T filter detection |
US20050120378A1 (en) * | 2001-11-28 | 2005-06-02 | Esa Jalonen | Event driven filter monitoring for IP multicast services |
US20030131140A1 (en) * | 2001-12-26 | 2003-07-10 | Texas Instruments Incorporated | Data transfers in embedded systems |
EP1668525A2 (en) * | 2003-09-18 | 2006-06-14 | Endace Technology Limited | Data transfer management method, software and system |
EP1668525A4 (en) * | 2003-09-18 | 2007-01-03 | Endace Technology Ltd | Data transfer management method, software and system |
WO2006103166A1 (en) * | 2005-04-01 | 2006-10-05 | International Business Machines Corporation | System anp method for reducing latency in a host ethernet adapter |
US20090310609A1 (en) * | 2007-06-26 | 2009-12-17 | Alvaro Fernandez Gutierrez | Method and device for managing multicast groups |
US8086716B2 (en) | 2007-06-26 | 2011-12-27 | Media Patents, S.L. | Methods and devices for managing multicast groups |
US20100046516A1 (en) * | 2007-06-26 | 2010-02-25 | Media Patents, S.L. | Methods and Devices for Managing Multicast Traffic |
US20100054248A1 (en) * | 2007-06-26 | 2010-03-04 | Media Patents, S.L. | Method and device for managing multicast groups |
US8094602B2 (en) | 2007-06-26 | 2012-01-10 | Media Patents, S.L. | Methods and apparatus for managing multicast groups |
US8416777B2 (en) * | 2007-10-15 | 2013-04-09 | Media Patents, S.L. | Method for managing multicast traffic in a data network and network equipment using said method |
US8416778B2 (en) * | 2007-10-15 | 2013-04-09 | Media Patents, S.L. | Method for managing multicast traffic in a data network and network equipment using said method |
US20100183008A1 (en) * | 2007-10-15 | 2010-07-22 | Fernandez Gutierrez Alvaro | Method for managing multicast traffic in a data network and network equipment using said method |
US20100172352A1 (en) * | 2007-10-15 | 2010-07-08 | Media Patents, S.L. | Methods for managing multicast traffic between sources sending data and hosts requesting data and network equipment used to implement the methods |
US8422499B2 (en) | 2007-10-15 | 2013-04-16 | Media Patents, S.L. | Methods and apparatus for managing multicast traffic |
US20100014519A1 (en) * | 2007-10-15 | 2010-01-21 | Media Patents, S.L. | Methods for managing multicast traffic between sources sending data and hosts requesting data and network equipment used to implement the methods |
US20130195107A1 (en) * | 2007-10-15 | 2013-08-01 | Media Patents, S. L. | Method for Managing Multicast Traffic in a Data Netwrok and Network Equipment Using Said Method |
US20120230331A1 (en) * | 2007-10-15 | 2012-09-13 | Media Patents, S.L. | Method for Managing Multicast Traffic in a Data Network and Network Equipment Using Said Method |
US8571028B2 (en) | 2007-10-15 | 2013-10-29 | Media Patents, S.L. | Methods and apparatus for managing multicast traffic |
US8582572B2 (en) | 2007-10-15 | 2013-11-12 | Media Paents, S.L. | Methods and apparatus for managing multicast traffic |
US8064449B2 (en) | 2007-10-15 | 2011-11-22 | Media Patents, S.L. | Methods and apparatus for managing multicast traffic |
US20100172353A1 (en) * | 2007-10-15 | 2010-07-08 | Media Patents, S.L. | Methods for managing multicast traffic between sources sending data and hosts requesting data and network equipment used to implement the methods |
US20100172351A1 (en) * | 2007-10-15 | 2010-07-08 | Media Patents, S.L. | Methods for managing multicast traffic between sources sending data and hosts requesting data and network equipment used to implement the methods |
US8184630B2 (en) | 2007-10-15 | 2012-05-22 | Media Patents, S.L. | Method for managing multicast traffic in a data network and network equipment using said method |
US8644310B2 (en) | 2007-10-30 | 2014-02-04 | Media Patents, S.L. | Method for managing multicast traffic between equipment in a multicast data network |
US20100254383A1 (en) * | 2007-10-30 | 2010-10-07 | Media Patents, S.L. | Method for managing multicast traffic between equipment in a multicast data network |
US20110058548A1 (en) * | 2008-02-01 | 2011-03-10 | Media Patents, S.L. | Methods and apparatus for managing multicast traffic through a switch |
US8565140B2 (en) | 2008-02-01 | 2013-10-22 | Media Patents, S.L. | Methods and apparatus for managing multicast traffic through a switch |
US20110058551A1 (en) * | 2008-02-01 | 2011-03-10 | Media Patents, S.L. | Methods and apparatus for managing multicast traffic through a switch |
US9031068B2 (en) | 2008-02-01 | 2015-05-12 | Media Patents, S.L. | Methods and apparatus for managing multicast traffic through a switch |
US8340095B2 (en) | 2008-03-05 | 2012-12-25 | Media Patents, S.L. | Equipment in a data network and methods for monitoring, configuring and/or managing the equipment |
US20110010441A1 (en) * | 2008-03-05 | 2011-01-13 | Media Patents, S.L. | Equipment in a data network and methods for monitoring, configuring and/or managing the equipment |
US8208418B1 (en) * | 2009-01-16 | 2012-06-26 | Extreme Networks, Inc. | Methods, systems, and computer readable media for conserving multicast port list resources in an internet protocol (IP) packet forwarding device |
US20120201246A1 (en) * | 2009-07-27 | 2012-08-09 | Media Patents, S.L. | Multicast Traffic Management in a Network Interface |
US8189584B2 (en) | 2009-07-27 | 2012-05-29 | Media Patents, S. L. | Multicast traffic management in a network interface |
WO2011012582A3 (en) * | 2009-07-27 | 2011-03-31 | Media Patents, S. L. | Multicast traffic management in a network interface |
US20110019673A1 (en) * | 2009-07-27 | 2011-01-27 | Media Patents, S.L. | Multicast traffic management in a network interface |
US20110149960A1 (en) * | 2009-12-17 | 2011-06-23 | Media Patents, S.L. | Method and apparatus for filtering multicast packets |
US9008091B1 (en) | 2010-11-19 | 2015-04-14 | Extreme Networks, Inc. | Methods, systems, and computer readable media for improved multicast scaling through policy based redirection |
EP2700194A1 (en) * | 2011-04-21 | 2014-02-26 | Hangzhou H3C Technologies Co., Ltd. | Forwarding a multicast message |
EP2700194A4 (en) * | 2011-04-21 | 2015-01-14 | Hangzhou H3C Tech Co Ltd | Forwarding a multicast message |
Also Published As
Publication number | Publication date |
---|---|
US6442617B1 (en) | 2002-08-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6442617B1 (en) | Method and system for filtering multicast packets in a peripheral component environment | |
US6526446B1 (en) | Hardware only transmission control protocol segmentation for a high performance network interface card | |
US6928478B1 (en) | Method and apparatus for implementing a MAC address pool for assignment to a virtual interface aggregate | |
US6757746B2 (en) | Obtaining a destination address so that a network interface device can write network data without headers directly into host memory | |
JP3384686B2 (en) | Method and apparatus for receiving information from a communication network | |
US7484005B2 (en) | Client device identification when communicating through a network address translator device | |
US6701432B1 (en) | Firewall including local bus | |
US6683882B1 (en) | Method and system for directing transmission of IPX control packets to influence reception of IPX data packets | |
CN104221331B (en) | The 2nd without look-up table layer packet switch for Ethernet switch | |
JP2006325054A (en) | Tcp/ip reception processing circuit and semiconductor integrated circuit provided with the same | |
US20110280243A1 (en) | TCP/IP Offload Device | |
US20110142050A1 (en) | Hashing packet contents to determine a processor | |
US6643710B1 (en) | Architecture to fragment transmitted TCP packets to a requested window size | |
US6266732B1 (en) | Interrupt events chaining | |
US7295534B2 (en) | Method and apparatus for a hybrid network device for performing in a virtual private network and a wireless local area network | |
US7561585B2 (en) | Manufacture and method for accelerating network address translation | |
US6567859B1 (en) | Device for translating medium access control dependent descriptors for a high performance network | |
US20020163917A1 (en) | Pre-lookup method for internet addressing | |
GB9510799D0 (en) | Computer network interface and interface protocol | |
US7363383B2 (en) | Running a communication protocol state machine through a packet classifier | |
US7814219B2 (en) | Method, apparatus, system, and article of manufacture for grouping packets | |
Socolofsky et al. | RFC1180: TCP/IP tutorial | |
US6606327B1 (en) | Method to dynamically adjust the maximum back off time of an ethernet controller in a half duplex network | |
US7961732B2 (en) | Method and hardware apparatus for implementing frame alteration commands | |
US7313139B2 (en) | Method for batch processing received message packets |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: 3COM CORPORATION, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:LOWE, GLEN H.;CHEN, EDMUND;HAYEK, CLAUDE G.;REEL/FRAME:009869/0878 Effective date: 19990331 |
|
AS | Assignment |
Owner name: LSI LOGIC CORPORATION, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:LSI LOGIC CORPORATION;CALIMETRICS, INC.;REEL/FRAME:014734/0956 Effective date: 20031121 |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
FPAY | Fee payment |
Year of fee payment: 8 |
|
AS | Assignment |
Owner name: HEWLETT-PACKARD COMPANY, CALIFORNIA Free format text: MERGER;ASSIGNOR:3COM CORPORATION;REEL/FRAME:024630/0820 Effective date: 20100428 |
|
AS | Assignment |
Owner name: HEWLETT-PACKARD COMPANY, CALIFORNIA Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE SEE ATTACHED;ASSIGNOR:3COM CORPORATION;REEL/FRAME:025039/0844 Effective date: 20100428 |
|
AS | Assignment |
Owner name: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P., TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:HEWLETT-PACKARD COMPANY;REEL/FRAME:027329/0044 Effective date: 20030131 |
|
AS | Assignment |
Owner name: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P., TEXAS Free format text: CORRECTIVE ASSIGNMENT PREVIUOSLY RECORDED ON REEL 027329 FRAME 0001 AND 0044;ASSIGNOR:HEWLETT-PACKARD COMPANY;REEL/FRAME:028911/0846 Effective date: 20111010 |
|
REMI | Maintenance fee reminder mailed | ||
LAPS | Lapse for failure to pay maintenance fees | ||
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20140827 |