1. Technical Field
The present invention relates generally to data storage and communications and more particularly to data matching using flow based packet data storage.
2. Description of Related Art
For transmission over communications networks, data has been organized into packets, frames, and cells. Bundling data into these packets, frames, and cells assists routers and switches in the communication network to handle a manageable amount of data. Large amounts of data such as files may be separated into hundreds of packets. Thus, messages such as data requests or data responses for these large amounts of data may also span over hundreds of packets. When packets get misordered or retransmitted, reassembling the packets into the messages can be difficult and time consuming.
In some situations, incoming data needs to be matched with data stored in memory. In one example, in order to prevent redundancy and reduce communication bandwidth, a request for data is matched with data stored in local memory and retrieved from the memory without transmitting the request for data to retrieve the data over the communications network. However, matching the data may be problematic when the packets for related data are stored in different locations in the memory.
A Transmission Control Protocol (TCP) stack does reassemble and sort out packets. The TCP stack does handle packets destined to a socket and then sequentially stores the packets from the socket in pages of memory. The TCP stack also strips the header of the packet and transfers the payload data of the packet to the applications in the application layer. Ethernet switches and IP routers also perform flow based queuing, where packets for a flow are stored in queues. The packets for a flow may be organized on the same page of memory or by linked lists.
These protocols, switches, and routers may have stored packets in memory based on a flow to solve different problems such as buffering and queuing. However, none of the prior art systems have stored the packets in memory based on flow to match data.
The invention addresses the above problems by providing data matching by using flow based packet data storage. A system for processing packets includes a communications interface and a processor. The communications interface receives a packet between a source and a destination. The processor identifies a flow between the source and the destination based on the packet. The processor determines whether some of packet data of the packet matches to storage data in storage using hashes. If the packet data does not match the storage data, the processor then stores the packet data in a block of memory in the storage based on the flow.
The storage may comprise short term memory and long term memory. The flow may comprise a session between a source and a destination. The block of memory may comprise a page of the contiguous memory. In some embodiments, the processor computes the hashes for the flow. The processor may also determine the hashes for the flow and store the hashes for the flow. The hashes can be rolling.
A method for processing packets includes the steps of receiving a packet between a source and a destination and identifying a flow between the source and the destination based on the packet. The method also includes the step of determining whether packet data of the packet matches to storage data in storage using hashes. The method also includes storing the packet data in a block of memory in the storage based on the flow and if the packet data does not match the storage data.
The system advantageously provides an organization of data in memory by flow for easier matching of data through hashes and retrieval of that data. By storing the packets for a flow in the same block of memory, accessing the data for the flow is easier than having different flows interleaved with each other in memory. Also, data can be matched to data in the flow regardless of how data may have been separated into packets. Thus, any issues with packet boundaries for data are eliminated.
The embodiments discussed herein are illustrative of one example of the present invention. As these embodiments of the present invention are described with reference to illustrations, various modifications or adaptations of the methods and/or specific structures described may become apparent to those skilled in the art. All such modifications, adaptations, or variations that rely upon the teachings of the present invention, and through which these teachings have advanced the art, are considered to be within the scope of the present invention. Hence, these descriptions and drawings should not be considered in a limiting sense, as it is understood that the present invention is in no way limited to only the embodiments illustrated.
A system for processing packets includes a communications interface and a processor. A communications interface receives a packet between a source and a destination. The processor identifies a flow between the source and the destination based on the packet. The processor determines whether some of packet data of the packet matches to storage data in storage using hashes. The processor then stores the packet data in a block of memory in the storage based on the flow and if the packet data does not match the storage data.
The system advantageously provides an organization of data in memory by flow for easier matching of data through hashes and retrieval of that data. By storing the packets for a flow in the same block of memory, accessing the data for the flow is easier than having different flows interleaved with each other in memory. Also, data can be matched to data in the flow regardless of how data may have been separated into packets. Thus, any issues with packet boundaries for data are eliminated. The system can handle different types of data requests and responses and still match data within the packets.
The system minimizes delay by storing packets in a flow on a packet-by-packet basis. Thus, higher throughput is realized because the system does not have to wait for the next packet in the flow. As soon as packets are received, the system determines where to store the packet and whether to store the packet.
The embodiments in
The network device 120 and the network device 140 are any device or system configured to process packets and exchange packets over the communication network 130. The configuration of the network device 120 is described in further detail below in
The communications 220 organized by flow include the flow A 222, flow B 224, and flow C 226. A flow is a communications session between two devices over a communications network. One example of a flow is an Internet Protocol (IP) flow. In one example, the flow is uniquely identified by the source IP address, the destination IP address, the IP protocol, the source port, and the destination port. The packets for a flow are advantageously stored in a same block of memory for easy retrieval and matching.
The memory 122 includes memory blocks 240 and flow state information 250. The memory 122 may comprise Random Access Memory (RAM), disk drives, hard disks, optical disks, and any of a combination of these elements. The memory 122 may comprise two levels of memory. One level is a more temporary or short term memory such as RAM, and the other level is a more permanent or long term memory such as disk. Typically, the temporary memory has faster read and write access than the slower read and write access of permanent memory.
The memory blocks 240 include block 1 242, block 2 244, and block 3 246. The memory blocks 240 are blocks of contiguous memory. A block of memory is a contiguous section or portion of memory.
The flow state information 250 is any data or information that relate to the characteristics, status, or state of the flow.
Message B 340 includes data 342. The message B 340 also is then separated into packets for communication. The message B 340 is delineated into packet C 350 and packet D 355. The packet C 350 comprises a payload 351 and the header 353. The packet D 355 comprises a payload 356 and the header 358. The data 342 in message B 340 is separated into data 352 in the payload 351 of packet C 350 and data 357 in the payload 356 of packet D 355. Using hashes and storing states of hashes across packet boundaries as discussed in further detail below in
In step 408, the network device 120 determines whether there is unhashed data remaining. If there is no unhashed data remaining, the process ends in step 410. If there is unhashed data remaining, the network device 120 computes byte-wise rolling hashes over packets in the same flow in step 412. A hash is a scheme for providing rapid access to data items which are distinguished by some key. These hashes provide a type of “fingerprinting” over the data to make matching the data easier. One example of a rolling hash is a checksum where the oldest byte in the window is subtracted and new bytes are added. The rolling hash may be over at least one packet. Thus, the rolling hash can run over packet boundaries. When the hash rolls over the end of a packet, the hash state or the remaining portion of the packet (e.g. the last 100 bytes of a packet) that has not been hashed can be saved and retrieved when the next sequential packet for the flow has been received. This hash or the remaining portion of the packet can be saved per flow and can be saved with the state information for the flow. The network device 120 may calculate the hash to the end of the packet.
In one example, cyclic redundancy check (CRC) is used for hashing, where one byte is added and one byte is taken off. CRC provides a stronger fingerprint (e.g. more collision resistant) than checksums. In another example, the hashes are based on the following equation:
new hash=old hash×2×P+new data×Q;
In step 414, the network device 120 checks whether the filter criteria have been passed. The network device 120 may use fine and coarse hashes as filters. Fine and coarse hashes are described in further detail in U.S. patent application Ser. No. 11/202,697 entitled “Network Memory Architecture for Providing Data Based on Local Accessibility” filed on Aug. 12, 2005. If the filter criteria have not been passed, the process returns to step 408. If the filter criteria have been passed, the network device 120 adds the index to the list of possible matches in step 416 and returns to step 408.
If the next entry is at the end of the list of possible matches, the network device 120 verifies the match sizes of the most likely and the second most likely matches in step 510. The network device 120 then determines whether both match sizes are small in step 512. The network device 120 advantageously can match data using hashes regardless of how the data was delineated into different packet boundaries.
If both match sizes are small, the network device 120 stores the data in blocks of memory based on the flow in step 514. Thus, as packets are received, the network device 120 sorts and stores the packets by flow, which provides an organization of data by flow making matching the data by hashes easier. For example, writing and retrieving the data for a flow in one portion of memory is easier and faster than retrieving data for a flow that is scattered in various locations in the memory. In some embodiments that have two levels of memory such as RAM and disk, moving data in one portion of disk to RAM can especially save access time to the data. Step 514 is described in more detail below in
The network device 120 also transmits a store instruction with the data in step 516. The store instruction causes the network device 140 to store the data in the memory 142 of the network device 140. In step 518, the network device 120 then updates the hash table before proceeding to step 522.
If at least one match size is not small, the network device 120 transmits a retrieve instruction with the index of the data for the match with the larger match size in step 520 before proceeding to step 522. The retrieve instruction causes the network device 140 to retrieve the data from its own memory 142. Thus, the data does not have to be transmitted over the communication network 130 but still can be accessed by the network device 140. The network device 120 saves the state information for the flow in step 522.
Once data is matched, the network device 120 may match subsequent data by requesting the next packet for the flow. The network device 120 can then iteratively (i.e., going on a “run”) match data and request the next packet for the flow. For example, the network device 120 can match data in a big file until the end of the file. Since the data is stored sequentially by flow in the memory, the network device 120 can just read the next portion of data in the memory. Thus, the data can be coalesced or reconstituted and the one instruction such as a retrieve instruction or store instruction per one packet may be avoided. Store and retrieve instructions are described in further detail in U.S. patent application Ser. No. 11/202,697 entitled “Network Memory Architecture for Providing Data Based on Local Accessibility” filed on Aug. 12, 2005.
In step 608, the network device 120 writes the packet data to the block of memory excluding the packet header. In step 610, the network device 120 updates the hash table. In step 612, the network device 120 checks whether the block of memory is full. If the block of memory is not full, the network device 120 proceeds to step 616. If the block of memory is full, the network device 120 allocates a new block of memory for the flow or allocates a block of memory from a list of partially filled blocks of memory in step 614. The block of memory does not have to be completely full. A threshold such as 90% full may be set up to indicate that the block of memory is full.
In step 616, the network device 120 checks whether all the packet data has been written. When the network device 120 determines that the flow finishes, the network device 120 can relinquish the block of memory for the flow, so another flow can use the block of memory. In some embodiments that have two levels of memory such as RAM and disk, when the RAM is first used, the block in the RAM is saved to disk. The network device 120 can relinquish the block of memory by adding the block of memory to the list of partially full blocks of memory. The network device 120 may determine that the flow has ended by a TCP reset or finish (FIN) indicator or another termination message that indicates an explicit ending for the flow. The network device 120 may also determine that the flow has ended for this matching technique when after a period of time (e.g., 10 seconds) there is no activity on the flow.
If all the packet data has not been written, the process returns to step 608 to write the remaining packet data. If all the packet data has been written,
In step 708, the network device 140 checks whether a store instruction with data has been received. If the store instruction with data has not been received, the process continues to step 712. If the store instruction with data has been received, the network device 140 stores the data in the blocks of memory based on the flow in step 710. In step 712, the network device 140 forwards the data to the destination.
The communications interface 820 is coupled to the communications network 130 and the source 110 via the link 825. The communications interface 820 is configured to exchange communications between the source 110, the communications network 130, and the other elements in the network device 120. In some embodiments, the communications interface 820 may comprise a Local Area Network interface for the source 110 and a Wide Area Network interface for the communications network 130. The memory 830 is any memory configured to store data. Some examples of the memory 830 are storage devices, such as RAM, hard drives, optical drives, flash memory, and magnetic tape. As discussed above, the memory 830 may comprise two levels of memory. One level is a more temporary or short term memory such as RAM, and the other level is a more permanent or long term memory such as disk.
The above-described functions can be comprised of executable instructions that are stored on storage media. The executable instructions can be retrieved and executed by a processor. Some examples of executable instructions are software, program code, and firmware. Some examples of storage media are memory devices, tape, disks, integrated circuits, and servers. The executable instructions are operational when executed by the processor to direct the processor to operate in accord with the invention. Those skilled in the art are familiar with executable instructions, processor(s), and storage media.
The above description is illustrative and not restrictive. Many variations of the invention will become apparent to those of skill in the art upon review of this disclosure. The scope of the invention should, therefore, be determined not with reference to the above description, but instead should be determined with reference to the appended claims along with their full scope of equivalents.
The present application is a continuation and claims the priority benefit of U.S. patent application Ser. No. 11/498,473 filed Aug. 2, 2006 and entitled “Data Matching Using Flow Based Packet Data Storage,” now U.S. Pat. No. 8,755,381 issued on Jun. 17, 2014. The above-referenced application is incorporated herein by reference in its entirety including all references cited therein.
Number | Name | Date | Kind |
---|---|---|---|
4494108 | Langdon, Jr. et al. | Jan 1985 | A |
4612532 | Bacon et al. | Sep 1986 | A |
5023611 | Chamzas et al. | Jun 1991 | A |
5243341 | Seroussi et al. | Sep 1993 | A |
5307413 | Denzer | Apr 1994 | A |
5357250 | Healey et al. | Oct 1994 | A |
5359720 | Tamura et al. | Oct 1994 | A |
5483556 | Pillan et al. | Jan 1996 | A |
5592613 | Miyazawa et al. | Jan 1997 | A |
5611049 | Pitts | Mar 1997 | A |
5627533 | Clark | May 1997 | A |
5635932 | Shinagawa et al. | Jun 1997 | A |
5652581 | Furlan et al. | Jul 1997 | A |
5659737 | Matsuda | Aug 1997 | A |
5675587 | Okuyama et al. | Oct 1997 | A |
5710562 | Gormish et al. | Jan 1998 | A |
5748122 | Shinagawa et al. | May 1998 | A |
5754774 | Bittinger et al. | May 1998 | A |
5802106 | Packer | Sep 1998 | A |
5883891 | Williams et al. | Mar 1999 | A |
5955976 | Heath | Sep 1999 | A |
6000053 | Levine et al. | Dec 1999 | A |
6003087 | Housel, III et al. | Dec 1999 | A |
6054943 | Lawrence | Apr 2000 | A |
6081883 | Popelka et al. | Jun 2000 | A |
6295541 | Bodnar et al. | Sep 2001 | B1 |
6308148 | Bruins et al. | Oct 2001 | B1 |
6311260 | Stone et al. | Oct 2001 | B1 |
6374266 | Shnelvar | Apr 2002 | B1 |
6434662 | Greene et al. | Aug 2002 | B1 |
6438664 | McGrath et al. | Aug 2002 | B1 |
6452915 | Jorgensen | Sep 2002 | B1 |
6489902 | Heath | Dec 2002 | B2 |
6587985 | Fukushima et al. | Jul 2003 | B1 |
6618397 | Huang | Sep 2003 | B1 |
6633953 | Stark | Oct 2003 | B2 |
6643259 | Borella et al. | Nov 2003 | B1 |
6650644 | Colley et al. | Nov 2003 | B1 |
6667700 | McCanne et al. | Dec 2003 | B1 |
6674769 | Viswanath | Jan 2004 | B1 |
6718361 | Basani et al. | Apr 2004 | B1 |
6738379 | Balazinski et al. | May 2004 | B1 |
6769048 | Goldberg et al. | Jul 2004 | B2 |
6791945 | Levenson et al. | Sep 2004 | B1 |
6856651 | Singh | Feb 2005 | B2 |
6859842 | Nakamichi et al. | Feb 2005 | B1 |
6862602 | Guha | Mar 2005 | B2 |
6910106 | Sechrest et al. | Jun 2005 | B2 |
6968374 | Lemieux et al. | Nov 2005 | B2 |
6978384 | Milliken | Dec 2005 | B1 |
7007044 | Rafert et al. | Feb 2006 | B1 |
7020750 | Thiyagaranjan et al. | Mar 2006 | B2 |
7035214 | Seddigh et al. | Apr 2006 | B1 |
7069342 | Biederman | Jun 2006 | B1 |
7113962 | Kee et al. | Sep 2006 | B1 |
7120666 | McCanne et al. | Oct 2006 | B2 |
7145889 | Zhang et al. | Dec 2006 | B1 |
7197597 | Scheid et al. | Mar 2007 | B1 |
7200847 | Straube et al. | Apr 2007 | B2 |
7215667 | Davis | May 2007 | B1 |
7242681 | Van Bokkelen et al. | Jul 2007 | B1 |
7243094 | Tabellion et al. | Jul 2007 | B2 |
7266645 | Garg et al. | Sep 2007 | B2 |
7318100 | Demmer et al. | Jan 2008 | B2 |
7366829 | Luttrell et al. | Apr 2008 | B1 |
7380006 | Srinivas et al. | May 2008 | B2 |
7383329 | Erickson | Jun 2008 | B2 |
7383348 | Seki et al. | Jun 2008 | B2 |
7388844 | Brown et al. | Jun 2008 | B1 |
7389357 | Duffie, III et al. | Jun 2008 | B2 |
7389393 | Karr et al. | Jun 2008 | B1 |
7417991 | Crawford et al. | Aug 2008 | B1 |
7420992 | Fang et al. | Sep 2008 | B1 |
7428573 | McCanne et al. | Sep 2008 | B2 |
7451237 | Takekawa et al. | Nov 2008 | B2 |
7453379 | Plamondon | Nov 2008 | B2 |
7457315 | Smith | Nov 2008 | B1 |
7460473 | Kodama et al. | Dec 2008 | B1 |
7471629 | Melpignano | Dec 2008 | B2 |
7532134 | Samuels et al. | May 2009 | B2 |
7555484 | Kulkarni et al. | Jun 2009 | B2 |
7571343 | Xiang et al. | Aug 2009 | B1 |
7571344 | Hughes et al. | Aug 2009 | B2 |
7619545 | Samuels et al. | Nov 2009 | B2 |
7620870 | Srinivasan et al. | Nov 2009 | B2 |
7624446 | Wilhelm | Nov 2009 | B1 |
7630295 | Hughes et al. | Dec 2009 | B2 |
7639700 | Nabhan et al. | Dec 2009 | B1 |
7643426 | Lee et al. | Jan 2010 | B1 |
7644230 | Hughes et al. | Jan 2010 | B1 |
7676554 | Malmskog et al. | Mar 2010 | B1 |
7698431 | Hughes | Apr 2010 | B1 |
7714747 | Fallon | May 2010 | B2 |
7746781 | Xiang | Jun 2010 | B1 |
7764606 | Ferguson et al. | Jul 2010 | B1 |
7849134 | McCanne et al. | Dec 2010 | B2 |
7853699 | Wu et al. | Dec 2010 | B2 |
7873786 | Singh et al. | Jan 2011 | B1 |
7941606 | Pullela et al. | May 2011 | B1 |
7945736 | Hughes et al. | May 2011 | B2 |
7948921 | Hughes et al. | May 2011 | B1 |
7953869 | Demmer et al. | May 2011 | B2 |
7970898 | Clubb et al. | Jun 2011 | B2 |
8069225 | McCanne et al. | Nov 2011 | B2 |
8072985 | Golan et al. | Dec 2011 | B2 |
8095774 | Hughes et al. | Jan 2012 | B1 |
8140757 | Singh et al. | Mar 2012 | B1 |
8171238 | Hughes et al. | May 2012 | B1 |
8225072 | Hughes et al. | Jul 2012 | B2 |
8307115 | Hughes | Nov 2012 | B1 |
8312226 | Hughes | Nov 2012 | B2 |
8370583 | Hughes | Feb 2013 | B2 |
8392684 | Hughes | Mar 2013 | B2 |
8442052 | Hughes | May 2013 | B1 |
8473714 | Hughes et al. | Jun 2013 | B2 |
8489562 | Hughes et al. | Jul 2013 | B1 |
8595314 | Hughes | Nov 2013 | B1 |
8706947 | Vincent | Apr 2014 | B1 |
8725988 | Hughes et al. | May 2014 | B2 |
8732423 | Hughes | May 2014 | B1 |
8738865 | Hughes et al. | May 2014 | B1 |
8743683 | Hughes | Jun 2014 | B1 |
8755381 | Hughes et al. | Jun 2014 | B2 |
8811431 | Hughes | Aug 2014 | B2 |
20010054084 | Kosmynin | Dec 2001 | A1 |
20020007413 | Garcia-Luna-Aceves et al. | Jan 2002 | A1 |
20020040475 | Yap et al. | Apr 2002 | A1 |
20020061027 | Abiru et al. | May 2002 | A1 |
20020065998 | Buckland | May 2002 | A1 |
20020071436 | Border et al. | Jun 2002 | A1 |
20020078242 | Viswanath | Jun 2002 | A1 |
20020101822 | Ayyagari et al. | Aug 2002 | A1 |
20020107988 | Jordan | Aug 2002 | A1 |
20020116424 | Radermacher et al. | Aug 2002 | A1 |
20020131434 | Vukovic et al. | Sep 2002 | A1 |
20020150041 | Reinshmidt et al. | Oct 2002 | A1 |
20020163911 | Wee et al. | Nov 2002 | A1 |
20020169818 | Stewart et al. | Nov 2002 | A1 |
20020181494 | Rhee | Dec 2002 | A1 |
20020188871 | Noehring et al. | Dec 2002 | A1 |
20020194324 | Guha | Dec 2002 | A1 |
20030002664 | Anand | Jan 2003 | A1 |
20030009558 | Ben-Yehezkel | Jan 2003 | A1 |
20030012400 | McAuliffe et al. | Jan 2003 | A1 |
20030123481 | Neale et al. | Jul 2003 | A1 |
20030133568 | Stein et al. | Jul 2003 | A1 |
20030142658 | Ofuji et al. | Jul 2003 | A1 |
20030149661 | Mitchell et al. | Aug 2003 | A1 |
20030149869 | Gleichauf | Aug 2003 | A1 |
20030233431 | Reddy et al. | Dec 2003 | A1 |
20040008711 | Lahti et al. | Jan 2004 | A1 |
20040047308 | Kavanagh et al. | Mar 2004 | A1 |
20040083299 | Dietz et al. | Apr 2004 | A1 |
20040086114 | Rarick | May 2004 | A1 |
20040088376 | McCanne et al. | May 2004 | A1 |
20040114569 | Naden et al. | Jun 2004 | A1 |
20040117571 | Chang et al. | Jun 2004 | A1 |
20040123139 | Aiello et al. | Jun 2004 | A1 |
20040179542 | Murakami et al. | Sep 2004 | A1 |
20040199771 | Morten et al. | Oct 2004 | A1 |
20040202110 | Kim | Oct 2004 | A1 |
20040203820 | Billhartz | Oct 2004 | A1 |
20040205332 | Bouchard et al. | Oct 2004 | A1 |
20040243571 | Judd | Dec 2004 | A1 |
20040255048 | Lev Ran et al. | Dec 2004 | A1 |
20050010653 | McCanne | Jan 2005 | A1 |
20050044270 | Grove et al. | Feb 2005 | A1 |
20050053094 | Cain et al. | Mar 2005 | A1 |
20050091234 | Hsu et al. | Apr 2005 | A1 |
20050111460 | Sahita | May 2005 | A1 |
20050131939 | Douglis et al. | Jun 2005 | A1 |
20050132252 | Fifer et al. | Jun 2005 | A1 |
20050141425 | Foulds | Jun 2005 | A1 |
20050171937 | Hughes et al. | Aug 2005 | A1 |
20050177603 | Shavit | Aug 2005 | A1 |
20050190694 | Ben-Nun et al. | Sep 2005 | A1 |
20050207443 | Kawamura et al. | Sep 2005 | A1 |
20050210151 | Abdo et al. | Sep 2005 | A1 |
20050220019 | Melpignano | Oct 2005 | A1 |
20050235119 | Sechrest et al. | Oct 2005 | A1 |
20050243743 | Kimura | Nov 2005 | A1 |
20050243835 | Sharma et al. | Nov 2005 | A1 |
20050256972 | Cochran et al. | Nov 2005 | A1 |
20050278459 | Boucher et al. | Dec 2005 | A1 |
20050286526 | Sood et al. | Dec 2005 | A1 |
20060013210 | Bordogna et al. | Jan 2006 | A1 |
20060026425 | Douceur et al. | Feb 2006 | A1 |
20060031936 | Nelson et al. | Feb 2006 | A1 |
20060036901 | Yang et al. | Feb 2006 | A1 |
20060039354 | Rao et al. | Feb 2006 | A1 |
20060059171 | Borthakur et al. | Mar 2006 | A1 |
20060059173 | Hirsch et al. | Mar 2006 | A1 |
20060117385 | Mester et al. | Jun 2006 | A1 |
20060143497 | Zohar et al. | Jun 2006 | A1 |
20060195547 | Sundarrajan et al. | Aug 2006 | A1 |
20060195840 | Sundarrajan et al. | Aug 2006 | A1 |
20060212426 | Shakara et al. | Sep 2006 | A1 |
20060218390 | Loughran et al. | Sep 2006 | A1 |
20060227717 | van den Berg et al. | Oct 2006 | A1 |
20060250965 | Irwin | Nov 2006 | A1 |
20060268932 | Singh et al. | Nov 2006 | A1 |
20060280205 | Cho | Dec 2006 | A1 |
20070002804 | Xiong et al. | Jan 2007 | A1 |
20070011424 | Sharma et al. | Jan 2007 | A1 |
20070038815 | Hughes | Feb 2007 | A1 |
20070038816 | Hughes et al. | Feb 2007 | A1 |
20070038858 | Hughes | Feb 2007 | A1 |
20070050475 | Hughes | Mar 2007 | A1 |
20070076693 | Krishnaswamy | Apr 2007 | A1 |
20070097874 | Hughes et al. | May 2007 | A1 |
20070110046 | Farrell et al. | May 2007 | A1 |
20070115812 | Hughes | May 2007 | A1 |
20070127372 | Khan et al. | Jun 2007 | A1 |
20070130114 | Li et al. | Jun 2007 | A1 |
20070140129 | Bauer et al. | Jun 2007 | A1 |
20070174428 | Lev Ran et al. | Jul 2007 | A1 |
20070195702 | Yuen et al. | Aug 2007 | A1 |
20070198523 | Hayim | Aug 2007 | A1 |
20070226320 | Hager et al. | Sep 2007 | A1 |
20070244987 | Pedersen et al. | Oct 2007 | A1 |
20070245079 | Bhattacharjee et al. | Oct 2007 | A1 |
20070248084 | Whitehead | Oct 2007 | A1 |
20070258468 | Bennett | Nov 2007 | A1 |
20070263554 | Finn | Nov 2007 | A1 |
20070276983 | Zohar et al. | Nov 2007 | A1 |
20070280245 | Rosberg | Dec 2007 | A1 |
20080005156 | Edwards et al. | Jan 2008 | A1 |
20080013532 | Garner et al. | Jan 2008 | A1 |
20080016301 | Chen | Jan 2008 | A1 |
20080028467 | Kommareddy et al. | Jan 2008 | A1 |
20080031149 | Hughes et al. | Feb 2008 | A1 |
20080031240 | Hughes et al. | Feb 2008 | A1 |
20080095060 | Yao | Apr 2008 | A1 |
20080133536 | Bjorner et al. | Jun 2008 | A1 |
20080184081 | Hama et al. | Jul 2008 | A1 |
20080205445 | Kumar et al. | Aug 2008 | A1 |
20080229137 | Samuels et al. | Sep 2008 | A1 |
20080243992 | Jardetzky et al. | Oct 2008 | A1 |
20080313318 | Vermeulen et al. | Dec 2008 | A1 |
20080320151 | McCanne et al. | Dec 2008 | A1 |
20090024763 | Stepin et al. | Jan 2009 | A1 |
20090060198 | Little | Mar 2009 | A1 |
20090063696 | Wang et al. | Mar 2009 | A1 |
20090100483 | McDowell | Apr 2009 | A1 |
20090158417 | Khanna et al. | Jun 2009 | A1 |
20090175172 | Prytz et al. | Jul 2009 | A1 |
20090234966 | Samuels et al. | Sep 2009 | A1 |
20090265707 | Goodman et al. | Oct 2009 | A1 |
20090274294 | Itani | Nov 2009 | A1 |
20090279550 | Romrell et al. | Nov 2009 | A1 |
20100005222 | Brant et al. | Jan 2010 | A1 |
20100011125 | Yang et al. | Jan 2010 | A1 |
20100020693 | Thakur | Jan 2010 | A1 |
20100054142 | Moiso et al. | Mar 2010 | A1 |
20100070605 | Hughes et al. | Mar 2010 | A1 |
20100077251 | Liu et al. | Mar 2010 | A1 |
20100115137 | Kim et al. | May 2010 | A1 |
20100121957 | Roy et al. | May 2010 | A1 |
20100124239 | Hughes | May 2010 | A1 |
20100131957 | Kami | May 2010 | A1 |
20100246584 | Ferguson et al. | Sep 2010 | A1 |
20100290364 | Black | Nov 2010 | A1 |
20100318892 | Teevan et al. | Dec 2010 | A1 |
20110154329 | Arcese et al. | Jun 2011 | A1 |
20110219181 | Hughes et al. | Sep 2011 | A1 |
20120036325 | Mashtizadeh et al. | Feb 2012 | A1 |
20120221611 | Watanabe et al. | Aug 2012 | A1 |
20120239872 | Hughes et al. | Sep 2012 | A1 |
20130080619 | Assuncao et al. | Mar 2013 | A1 |
20130086236 | Baucke et al. | Apr 2013 | A1 |
20130094501 | Hughes | Apr 2013 | A1 |
20130117494 | Hughes et al. | May 2013 | A1 |
20130282970 | Hughes et al. | Oct 2013 | A1 |
20140181381 | Hughes et al. | Jun 2014 | A1 |
Number | Date | Country |
---|---|---|
1507353 | Feb 2005 | EP |
Entry |
---|
“IPsec Anti-Replay Window: Expanding and Disabling,” Cisco IOS Security Configuration Guide. 2005-2006 Cisco Systems, Inc. Last updated: Sep. 12, 2006, 14 pages. |
Singh et al. ; “Future of Internet Security—IPSEC”; 2005; pp. 1-8. |
Muthitacharoen, Athicha et al., “A Low-bandwidth Network File System,” 2001, in Proc. of the 18th ACM Symposium on Operating Systems Principles, Banff, Canada, pp. 174-187. |
“Shared LAN Cache Datasheet”, 1996, <http://www.lancache.com/slcdata.htm>. |
Spring et al., “A protocol-independent technique for eliminating redundant network traffic”, ACM SIGCOMM Computer Communication Review, vol. 30, Issue 4 (Oct. 2000) pp. 87-95, Year of Publication: 2000. |
Hong, B et al. “Duplicate data elimination in a SAN file system”, In Proceedings of the 21st Symposium on Mass Storage Systems (MSS '04), Goddard, MD, Apr. 2004, IEEE. |
You, L. L. and Karamanolis, C. 2004. “Evaluation of efficient archival storage techniques”, In Proceedings of the 21st IEEE Symposium on Mass Storage Systems and Technologies (MSST). |
Douglis, F. et al., “Application specific Delta-encoding via Resemblance Detection”, Published in the 2003 USENIX Annual Technical Conference. |
You, L. L. et al., “Deep Store An Archival Storage System Architecture” Data Engineering, 2005. ICDE 2005. Proceedings of the 21st Intl. Conf. on Data Eng.,Tokyo, Japan, Apr. 5-8,, 2005, pp. 12. |
Manber, Udi, “Finding Similar Files in a Large File System”, TR 93-33 Oct. 1994, Department of Computer Science, University of Arizona. <http://webglimpse.net/pubs/TR93-33.pdf>. Also appears in the 1994 winter USENIX Technical Conference. |
Knutsson, Bjom et al., “Transparent Proxy Signalling”, Journal of Communications and Networks, vol. 3, No. 2, Jun. 2001. |
Definition memory (n), Webster's Third New International Dictionary, Unabridged (1993), available at <http://lionreference.chadwyck.com> (Dictionaries/Webster's Dictionary). Copy not provided in IPR2013-00402 proceedings. |
Definition appliance, 2c, Webster's Third New International Dictionary, Unabridged (1993), available at <http://lionreference.chadwyck.com> (Dictionaries/Webster's Dictionary). Copy not provided in IPR2013-00402 proceedings. |
Newton, “Newton's Telecom Dictionary”, 17th Ed., 2001, pp. 38, 201, and 714. |
Silver Peak Systems, “The Benefits of Byte-level WAN Deduplication” (2008). |
Number | Date | Country | |
---|---|---|---|
Parent | 11498473 | Aug 2006 | US |
Child | 14270101 | US |