The present invention concerns the processing of messages exchanged between installations by way of one or more packet data transmission networks. It relates more particularly to the filtering, by an installation, of the entirety of packets made available by the packet data transmission network or networks so as to retain only those belonging to messages whose installation is the destination and direct them, in the installation, to a suitable reception port.
The packets modulate the transmission signals conveyed by the physical transmission medium used by a network. They consist of longer or shorter datagrams or strings of binary elements separated into various successive fields, including a useful-data field encapsulating a message or a portion of message constituting the payload of the network and service information fields making it possible to route the packet within the network and to specify certain characteristics of the useful-data field so as to facilitate its utilization on exit from the network. The format of a packet, that is to say the decomposition into fields, of the datagram of which it consists, complies with precise rules known to the participants of the network and grouped together under the term physical layer protocol or else first level protocol.
The payload of the network occupying the useful-data field of a packet constitutes a datagram itself. It may be organized, in its turn, into various successive fields, including a useful-data field and service information fields relevant to the routing of the payload of the network, beyond the network itself, within an attached installation. Its format also complies with precise rules grouped together under the term logical layer protocol. There are two layers of protocol to be utilized to determine the complete destination address of a packet and extract therefrom the useful data. It may even happen that the logical layer is subdivided and that there are more than two layers of protocol, the destination address of the packet being specified from protocol layer to protocol layer.
Among the packet data transmission networks to which the invention relates mention may be made of the Ethernet networks using, at the first level of the physical transmission layer, a packet or frame format complying with a “MAC” protocol (the acronym standing for “Media Access Control”), defined in the standards 802.3 and/or 802.2 drawn up by the Institute of Electrical and Electronics Engineers.
In a packet complying with the MAC IEEE 802.3/802.2 protocol, there is a useful-data field, the so-called “Ethernet data field”, and various service information fields in particular, one called the “MAC Destination Address” and another called the “LLC” (the acronym standing for “Logical Link Control”) or else: “LPDU” (the acronym standing for “Logical Protocol Data Unit”). The MAC Destination Address service information field identifies on the network, the destination installation or installations of the packet. The LLC/LPDU service information field holds various information regarding the second level corresponding to the layer immediately above the physical layer, including the identity of the protocol used for the formatting of the Ethernet data field.
The so-called second level protocol, used for the formatting of an Ethernet data field, may be either a proprietary protocol, specific to the sender and receiver installations hooked up by the Ethernet data transmission network, or a standardized protocol, with a wider audience. The standardized protocols used most commonly for the formatting of an Ethernet data field are the Internet protocols complying with the RFC standards issued by the DARPA (the acronym standing for “Defense Advanced Research Project Agency”) and, from among those, the IP protocol (the acronym standing for “Internet Protocol”) which can be used alone or in combination with a third level of protocol such as the TCP protocol (the acronym standing for “Transport Control Protocol”), the UDP protocol (the acronym standing for “User Datagram Protocol”) or else the ICMP protocol (the acronym standing for “Internet Control Message Protocol”).
Access by an installation to a data transmission network is effected by way of a physical medium providing for the propagation of the transmission signals within the network, often the ambient medium or an electrical or optical cable, of a send/receive function often dubbed “Medium Dependant Interface and Physical Layer Device” and of a function often dubbed “Data Terminal Equipment”.
The send/receive function consists, in the receive direction, in receiving the signals from the propagation medium and extracting therefrom their binary content.
The DTE function consists, in the receive direction, in utilizing the binary content of the signals received from the network through the intermediary of the send/receive function so as to extract therefrom the messages pertaining to the installation concerned and to direct them within the installation, to the appropriate reception port or ports.
When the data transmission network is of packet transmission type, each signal borrowing the transmission medium transports a data packet. The recognition, in the signals arriving from the propagation medium, of a data packet is the remit of the send/receive function which, in addition to the extraction of the binary content of the signals received from the network, is responsible for the detection of the start and the end of each packet received.
The DTE function provides for the temporary storage of the binary data stream originating from the send/receive function between the detection by the latter of a start and of an end of packet, the utilization time for the destination address figuring in the service information contained in the packet so as, either if the packet pertains to the installation concerned, to select it and direct the useful data which it holds toward one or more reception ports of the installation concerned, or if the packet does not pertain to the installation concerned, to reject it. Very often, the DTE function furthermore checks the integrity of the data contained in a selected packet.
The send/receive function, which is very dependent on the physical properties of the transmission medium, is, in general, entrusted to one of the specialized circuits placed at the level of a network interface card mounted in the installation to be attached to the network, whereas the DTE function which implements only logic operations on binary data can either form the subject of an accessory task entrusted to a computer performing other tasks devolved to the installation attached to the network, or be entrusted to a microprocessor-based specialized automaton placed on the network interface card, on the side of the specialized circuits providing for the send/receive function.
When the packets made available to the installation by the transmission network or networks can form the subject of several protocol layers with a destination address apportioned between the service information fields of these various protocol layers, the DTE function must, for each packet made available, detect the various layers of protocols and utilize them to extract therefrom the final destination address of the packet, then compare this final destination address with those of the various reception ports of the installation concerned so as to retain the packet only when there is a match between its final destination address and one or more addresses of reception ports of the installation concerned.
To carry out these operations on each packet made available, it is customary for a DTE function to operate in two steps: a first step of determining the final destination address of the packet by detecting its various protocol layers and analyzing the service information fields relevant to the final destination address of the packet in the various protocol layers detected, and, a second step of searching for the matches between the final destination address read from the packet and addresses of the various reception ports of the -installation that are mustered in a directory of final addresses that is specific to the installation.
The desire for diversification of data transmission networks, for standardization of interfaces for accessing these networks and for increasing the variety of the messages exchanged between attached installations leads to a requirement for the DTE function to take into account packets of ever more varied nature, that may implement diverse second level and third level protocols and to take into account, in respect of an installation, greater numbers of reception ports adapted to the variety of the messages. This results in increased complexity of an operation of reading a packet final destination address because of the multiplicity of protocols to be taken into consideration and an increase in the complexity of the operation of searching for a match at the level of the directory of addresses, by reason of an increase in the length of the packet final destination addresses and of the complete addresses of reception ports that is imposed by the diversity of protocols to be processed, and by reason of an increase in the stored number of addresses in the directory of final addresses, consequent upon the increase in the number of reception ports of an installation.
Moreover, in embedded real-time applications, constraints regarding quality of service and guarantee of conveyance of messages to the reception ports within a bounded time span prohibit the creation of latency in case of saturation of the network by a large number of packets of small size. This requires the DTE function to be able to process a packet on each incoming path within the time necessary for the reception of the packet of minimum size.
All of this conspires to increase the computational capacities demanded of the attached installation or of its interface for access to the network for the DTE function, this amplification being further augmented by the constant increase in the bit rates of networks.
There is therefore a need for methods making it possible to fulfill a DTE function with a minimum of computational capacity.
The aim of the present invention is to meet this need.
Its subject is a method of selecting and sorting data packets made available to this installation, by at least one packet data transmission network employing a packet format able to comply with three levels of protocols:
This method is noteworthy in that it consists in:
when addressing information contained in the service information fields of the protocols of levels higher than the second are present,
when addressing information contained in the service information fields of the protocols of levels higher than the second are not present,
searching through the open allocated message descriptors for a match at the level of the compatibility link and of the value of a possible second level service information field assigned to a message fragment identification,
in the absence of matching elements,
in the presence of a matching element,
Advantageously, the searches for a match are made within the lists of the elements of the directories of lower level and of higher level addresses by following a dichotomy procedure in previously ordered lists, thereby making it possible to guarantee a minimum and bounded search time.
Advantageously, the elements of the directory of lower level addresses are stored in a first table, their addresses within this table identifying the compatibility links associated with them.
Advantageously, the elements of the directory of higher level addresses are stored within a second table, each of them being associated, within this second table with a compatibility link and with an assignment link.
Advantageously, when the reception of packets is done on several redundant paths, the search for an allocated message descriptor is done on all the paths so as to take account of the fact that the initial packet that gave rise to the creation of the allocated message descriptor may have been received previously on another path.
Advantageously, when the network is an Ethernet network with packets respecting a first level protocol of MAC type and a second level protocol of IP type, each element of the directory of lower level addresses holds at least one particular value of the MAC destination address field and one particular value of the IP destination address field.
Advantageously, when the network is an Ethernet network with packets respecting a first level protocol of MAC type imposing, among the service fields of a packet, a field identifying the protocols respected by the packets at the higher levels and a second level protocol of IP type, each element of the directory of lower level addresses holds at least one particular value of the MAC destination address field, one particular value of the IP destination address field and a flag for invalidating the particular value of the IP destination address field in case of non-recognition of an IP type second level protocol.
Advantageously, when the network is a duplicate network consisting of two independent Ethernet networks each having access to the installation, each of the two Ethernet networks having packets respecting a first level protocol of MAC type and a second level protocol of IP type, and when the installation is able to identify the network or networks of origin of the packet, each element of the directory of lower level addresses holds at least one particular value of the MAC destination address field, one particular value of the IP destination address field, an identifier of the network or networks of origin of the packet compatible with these particular values of MAC and IP destination address field, and a validation flag for the identifier of the network or networks of origin.
Advantageously, when the packets of the network respect a first level protocol of MAC type imposing, among the service fields of a packet, a field identifying the protocols respected by the packets at the second level, a second level protocol of IP type and a third level protocol belonging to a group of protocols containing the UDP and TCP protocols, each element of the directory of higher levels holds at least one particular value of destination port UDP/TCP address field and a double flag for validating the particular value of destination port UDP/TCP address field identifying at the same time a third level protocol compatible with said particular value of destination port UDP/TCP address field.
Advantageously, when the network is a duplicate network consisting of two independent Ethernet networks each having access to the installation, each of the two Ethernet-networks having packets respecting a first level protocol of MAC type, a second level protocol of IP type and a third level protocol belonging to a group of protocols containing the UDP and TCP protocols, and when the installation is able to identify the network or networks of origin of the packet, each element of the directory of higher levels holds at least one particular value of destination port UDP/TCP address field, a double flag for validating the particular value of destination port UDP/TCP address field identifying at the same time a third level protocol compatible with the particular value of destination port UDP/TCP address field, an identifier of the network or networks of origin of the packets that are compatible with this particular value of destination port UDP/TCP address field, and a validation flag for the identifier of the network or networks of origin.
Other characteristics and advantages of the invention will emerge from the description hereinbelow of an embodiment given by way of example. This description will be offered in conjunction with the drawing in which:
a
a
a
a
a
In
In the receive direction, which will be the only one described hereinbelow, the network interface 11 has the tasks of detecting the messages arriving at the network of accessways of installation 1, of selecting, from among the messages detected on the network accessways, those actually relevant to the installation and of sorting the messages selected as a function of their nature so as to present them in an ordered manner to the main circuit 10 of the installation 1.
The detection of the messages, at the level of the accessways to the networks 3, 4 on the physical propagation media used by the networks 3, 4 and their setting into binary form is down to analog reception circuits PHY A, PHY B indexed by 110, 111 whose composition is very dependent on the characteristics of the propagation media of the networks. The selection, from among the messages detected on the accessways of installation 1 to the transmission networks 3, 4 is set into binary form by the analog reception circuits 110, 111 for receiving messages relevant to installation 1 and their sorting as a function of their nature, implement purely logic processing of sequential and/or combinatorial types, which may be carried out, as represented, with the aid of a microprocessor-based logic automaton 112 harnessing a random access work memory 113 and a random access mail memory 114. The random access work memory 113 serves for the temporary storage of the binary elements of the messages detected on the network accessways of the installation 1, by the analog reception circuits 110, 111 for as long as the select and sort operations. In various slots called reception ports, the mail memory 114 gathers the messages resulting from the selection, sorted by nature. It is intended to serve as inbox for mail in respect of the main circuit 10 of the installation 1 which can consult it directly or through the logic automaton 112.
Within the framework of a packet data transmission network, the messages conveyed, at the level of the physical medium used for transmission within the network, the ambient medium (wireless transmission) or electrical or optical cables (wire transmission) have the form of packets constructed of strings of binary elements or datagrams modulating a transmission signal and flowing one behind another over the transmission links of the network.
The datagram constituting a packet holds useful or payload data of the network and service information allowing the routing of the packet within the transmission network and the signaling of certain characteristics of the packet that are useful for its utilization in the destination installations. Its format or organization complies with precise rules, the so-called physical layer or first level protocol that are known to all the participants in the network. The useful data of a packet are mustered within a so-called useful-data field that is itself subject to a precise organization, known to the destination installations, often of the same kind as that of a packet, with once again, a useful-data field and service information fields. This organization of the useful-data field of a packet complies with so-called logical layer or second level protocol rules. The useful-data field defined by the second level protocol can itself have a format defined by a third level protocol and so on and so forth, so that it often transpires that there is a packet format respecting several layers of protocols.
Within the more general framework, the packet data transmission networks 3, 4 convey several varieties of packets distinguished by their formats that do not respect, at one level or another, the same types of protocol and several varieties of packets are relevant to the attached installations 1, 2. Within this framework, the packets made available to an installation 1, 2 by the networks 3, 4 and relevant to this installation 1, 2 must be sorted by the automaton 112 as a function of their variety of membership and be found in the mail memory 114, in distinct storage queues subsequently referred to as reception ports.
The selection, from among the packets detected on the accessways of an installation 1, 2 to the transmission networks 3, 4 and set into binary form by the analog reception circuits 110, 111, of the packets relevant to the installation 1, 2 and their sorting as a function of their nature by the automation 112 are based on:
Customarily, the search for a match between the address of the destination party figuring in the service information of the packet and the network address of the installation concerned, and the installation addresses of the reception ports of this installation is done either, in steps, progressively, or globally.
The progressive way consists in taking account separately of the various protocol layers of a packet, commencing with the first level protocol of the physical layer. Each protocol is taken into account by extracting from the service information fields of the protocol considered the information regarding the destination address found therein, by searching for a match with a directory mustering the various values that said information can take when the packet is destined for one or more reception ports of the installation concerned and by rejecting the packet in the absence of a match or passing to the utilization of the protocol of immediately higher level in the presence of a match. The directory consulted at each protocol level is specific to this level and split into subsets of elements linked to the elements of the directory of immediately lower level. An ever more trimmed destination address is thus extracted from the packet until the exact address, networks and installation, of the destination reception port or ports is reached.
The global way consists in extracting a complete destination address, networks and installation, from the service information of the entire set of protocols of various levels applied to the packet and in comparing this complete destination address with a single directory holding the complete addresses, installation and networks, of the reception ports of the installation concerned.
The progressive procedure has the advantage of making it possible to break down the search for a match by dichotomy with, at each step, a consultation of a directory of addresses holding a small number of partial and simplified addresses reducing the complexity of the operations of comparison on which a search for a match is based but it multiplies up the intermediate steps whereas the global procedure has the advantage of being direct but requires the consultation of a single directory that can hold a large number of complete addresses, networks and installation, that may give rise to a significant number of complex comparison operations. Both procedures have the drawback of requiring considerable computational power when the bit rate of the transmission networks is high.
Proposed here is a middle procedure consisting in considering the protocols of first and second level as one whole forming a superprotocol, the protocols of levels higher than the second as another whole forming another superprotocol and in applying the progressive procedure at the level of the superprotocols, thereby limiting its steps to two in number. This approach is all the more justified when the service information of the protocols of high rank may not be present in the packet owing, in particular, to the fragmentation of the payload of the second level protocol into several packets.
Detailed hereinbelow is the application of this middle selection and sorting procedure to a packet format used by the networks 3, 4 respecting at the first level, that of the physical layer, an MAC Ethernet protocol complying with the IEEE802.3 standards, at the second level, an IP Internet protocol, preferably in its version 4, with, at the third level, several possibilities of protocol, either a proprietary protocol, or else an Internet protocol of TCP, UDP or ICMP type.
As shown by the upper array 5 of
The MAC header 5b is composed of a preamble 50 of eight bytes serving for synchronization, the packets being transmitted asynchronously, followed by a destination MAC address 51 of six bytes, a sender MAC address 52 of six bytes and a service information item 53 on two bytes, that is devoted either to the length of the packet in bytes if its value is less than 1536, or to the type, that is to say to the second level protocol respected by the MAC useful-data field 5a, when its value is greater than 1536. When the MAC useful-data field respects an IP protocol, the expected value of the service information item 53 is 0800 in hexadecimal.
When, as assumed, the MAC useful-data field 5a of a packet respects an IP protocol, the MAC header 5b holding a type information item 53 having the hexadecimal value 0800, the datagram of which it is composed is in turn broken down, as shown by the middle array 6 of
The IP header 6b comprises a first service information field 60, half a byte in length, identifying the version used of the IP protocol and having, for version 4, the expected binary value 0100. This first service information field 60 is followed by a set 61 of seven other service information fields occupying eight and a half bytes, including a fragment identifier field 66 of 2 bytes allowing the IP layer during reception to reconcile all the packets belonging to one and the same message, a “fragment offset” field 67 of 13 bits making it possible to reorder the information snippets contained in the reconciled packets and an MF flag 68 signaling by taking the value zero that the packet corresponds to a message final fragment, then by a service information field 62, one byte in length, identifying the third level protocol respected by the IP useful-data field 6a. When, as assumed here, the IP useful-data field 6a respects the UDP Internet protocol, the expected value of the service information item 62 is 17 in decimal. Following the service information field 62 identifying the third level protocol is another service information field 63, two bytes in length, then a service information field 64, four bytes in length, devoted to a sender IP address and a service information field 65, four bytes in length, devoted to a destination IP address.
When, as assumed, the IP useful-data field 6a respects a UDP protocol, the IP header 6b holding a third level protocol identifier 62 having the decimal value 17, the datagram of which it is composed is in its turn broken down, as shown by the lower array 7 of
The UDP header 7b comprises a first service information field 70, two bytes in length, devoted to a sender UDP address identifying a send port in the sender installation from which the payload contained in the UDP data field 7a originates, followed by a second server information field 71, two bytes in length, devoted to a destination UDP address identifying a reception port in the destination installation and by a set 72 of two other service information fields occupying the remaining four bytes.
An installation 1, 2 concerned with the variety of packets respecting the MAC/IPv4/UDP protocol layers whose format has just been detailed in
The select and sort operations then consist, in respect of the network interface 11 of an installation 1, 2 in selecting from the packets made available to the installation 1, 2 by the networks 3, 4 those that are destined for it and in directing them, as a function of their variety, toward the appropriate reception port or ports of the mail memory 114 of the installation. They are undertaken by the automaton 112 of the network interface of an installation 1, 2 on the binary versions or datagrams of the packets that are placed in the work memory 113 by the analog reception circuits 110, 111 interposed in front of the accessways of the installation 1, 2 to the networks 3, 4.
Since, in order to tag the start and end of a packet, the analog reception circuits 110, 111 utilize the preamble (50
Adherence to a first level MAC Ethernet protocol by the datagrams of packets supplied by the analog reception circuits 110, 111 having been effected, the select and sort operations performed by the automaton 112 begin, as represented in the logic chart of
When the check 21 fails, implying that the packet does not use an IP protocol at the second level, the packet is subjected to a search for a match 23 between the value of the service information field that are devoted to the destination MAC address (51
When the check 21 is positive, demonstrating the use by the packet, at the second level, of an IP protocol, the packet is subjected to a search for a match 25 between the combination of the values of the service information fields devoted to the destination MAC address (51
This identification of third level protocol is done by polling the value taken by the third level protocol identifier figuring, as packet header, in the service information field (62
When the third level protocol identifier present in the packet header has the value 17 in decimal corresponding to a UDP protocol, a message fragmentation investigation is superimposed on the search for a destination port since only a packet corresponding to a first fragment of a message is provided with a UDP destination address.
This fragmentation investigation is done by analyzing the fragment identification, fragment Offset and final fragment flag fields (66, 67, 68
If the analysis 27 of the fragment Offset field shows that it has the value zero indicating that the packet is a first message fragment containing a UDP destination address, the packet is subjected to a search for a match 28 between the value of the service information field of the packet devoted to the destination port UDP address (71
A message descriptor establishes the relation between all the packets respecting the UDP/IPv4/MAC protocol layers and having the same fragment identifier value. It is stored, with its fellows in the work memory. Created with a packet corresponding to a first message fragment, it is destroyed with the packet corresponding to the last message fragment signaled by an end of message flag MF (68,
For simplification, the UDP reception ports have been symbolized in
If the analysis 27 of the Offset fragment field shows that it has a value different from zero indicating that the packet is not a first message fragment and therefore does not comprise any destination UDP address, the packet is subjected to a search for membership in a message destined for the installation, by searching 31 for a message identifier allocated to the value taken by its fragment identification field (66
When the third level protocol identifier present in the packet header has the value 6 in decimal corresponding to a TCP protocol, the packet undergoes an analysis similar to that carried out in respect of a UDP third level protocol, the datagram of its useful-data field being deposited, should the result of the analysis be favorable, in one or more reception ports reserved for the TCP protocol in the mail memory 114 of the installation. For simplification, the TCP reception ports have been symbolized in
When the third level protocol identifier present in the packet header has the value 1 in decimal corresponding to an ICMP protocol, the datagram of the useful-data field of the ICMP protocol is deposited in a particular reception port 33, the so-called ICMP reception port, with no prior search for a match of destination address since this protocol does not specify one.
When the third level protocol identifier present in the packet header has none of the three previous values signaling the use by the packet of a third level protocol not corresponding to any of the UDP, TCP or ICMP previous protocols, the useful-data field of the IP protocol (6a,
During select and sort operations performed on a packet in accordance with the logic chart of
To facilitate and speed up the executions of these searches for a match, each installation harnesses two directories of addresses, the one of so-called lower levels, the other of so-called higher levels stored in two tables placed in the work memory 113.
The directory of lower level addresses catalogs the Destination MAC addresses and the combinations of Destination MAC and Destination IP addresses which may be in the header of a packet destined for the installation concerned.
The directory of higher level addresses catalogs the destination port UDP/TCP addresses which may be in the header of a packet destined for the installation considered, and destination port dummy UDP/TCP addresses used as directory exits in the absence of any second search for a match. Within the table which stores this directory of higher level addresses, each destination port dummy or non-dummy UDP/TCP address is accompanied by a compatibility link and by an assignment link.
A compatibility link targets, in the directory of lower level addresses, a Destination MAC address or a combination of Destination MAC and IP addresses. Taken together, the compatibility links target all the directory elements of lower level addresses and constitute an accessway to the directory of higher level addresses from the elements of the directory of lower level addresses. For convenience, a compatibility link is identified by the MAC/IP address No. of the element that it targets in the directory of lower level addresses. A compatibility link can be identified in another way but it is then necessary for it to be associated explicitly with each element of the directory of lower level address within the table which stores this directory.
The compatibility link of a destination port non-dummy UDP/TCP address targets the combination or combinations of the Destination MAC and Destination IP address with which this destination port UDP/TCP address may be found in the header of a packet. The compatibility link of a destination port dummy UDP/TCP address targets, in the directory of lower level addresses, either one or more destination MAC addresses not combined with a destination IP address, or one or more combinations of Destination MAC and Destination IP addresses.
An assignment link identifies the address or addresses of one or more reception ports within the mail memory 114 of the installation considered.
As a second search for a match on the destination port UDP/TCP addresses necessarily follows a first search for a match on the permitted combinations of Destination MAC and Destination IP addresses, the presence of the compatibility links relating all the elements of the directory of lower level addresses to elements of the directory of higher level addresses makes it possible to reduce the domain of the second search for a match to just the elements of the list of the directory of higher level addresses exhibiting a compatibility link targeting the first element of the directory of lower level addresses that appeared as matching during the first search for a match.
The first search for a match is done by reviewing the elements of the directory of lower level addresses, grouped together by values of destination MAC address, a group of elements corresponding to one and the same Destination MAC address value always beginning with an isolated MAC address so that it gives rise to the first match detected in case of a search for a match on the Destination MAC address alone (23
The second search for a match is done in a similar manner to the first, by reviewing the elements of the directory of higher level addresses.
When the destination IP address contained in the information field 81 is signaled as dummy by the flag 1, the directory element corresponds to an isolated destination MAC address relevant to the installation concerned and for which the IP layer processing service is not required. When the destination IP address contained in the information field 81 is signaled as actual by the flag 1, the directory element corresponds to a combination of a Destination MAC address and a Destination IP address relevant to the installation concerned.
In addition to these three information fields 80, 81, 82, a lower level addresses directory element 8 assigned to an installation can comprise other information fields such as information fields 83, 84 assigned to error correction codes EDC.
When, as described, the installations 1, 2 can converse by way of two different transmission networks 3, 4, the identity of the network or channel from which the packet examined originates can easily be tagged at the level of the network interface 11 and can constitute a useful information item for the utilization of the packet. In this case, the expected value C of the channel identity for a packet, whose destination MAC address or whose combination of Destination MAC and Destination IP address correspond to the directory element 8 concerned, is systematically added to this element 8 in a specific information field 85, with a flag Xc placed in another specific information field 86 signaling whether the channel information item C figuring in the information field 85 of the directory element 8 does or does not have to be taken into consideration during a search for a match.
The operations of selecting and sorting packets at the inputs of an installation may call upon, during the first search for a match in the lower level addresses directory assigned to the installation, a more thorough comparative analysis pertaining also to other service information of the first two protocol levels of the packet. In this case, other information fields may be incorporated into the lower level addresses directory element 8 assigned to an installation as signaled by the presence of empty slots in
In the case where a dichotomy search among the elements of the list of addresses of the directory of lower levels must be implemented, it is necessary to organize this list with a strict order relation making it possible, during the dichotomy search, to ascertain the direction in which the search should continue if the match is not achieved. The fields participating in this order relation are the fields 80, 81, 82, 85 and 86.
The double flag P signals the nature, actual or dummy, of a destination port UDP/TCP address through the assignment of the directory element 9 concerned to a determined type of third level protocol: UDP, TCP, ICMP or other. When it identifies a UDP or TCP protocol, it indicates an actual nature whereas when it identifies an ICMP or other protocol, it indicates a dummy nature.
In the case of a dichotomy search, the field 92 participates in the search and must be compared with an appropriate decoding of the type field 53 and possibly of the IP version field 60 as well as of the Protocol field 62 during the search for a match.
When the destination port UDP/TCP address contained in the information field 91 is signaled as dummy by the double flag P, the directory element 9 corresponds to a port for which it is unnecessary to take account of a UDP or TCP port address.
The reception ports address contained in the information field 93 makes it possible, as soon as the match is found on the destination port UDP/TCP address in the directory of higher level addresses, be this match trivial, the destination port UDP/TCP address being dummy, or otherwise, the destination port UDP/TCP address being actual, to assign the useful data of each packet having satisfied the searches for a match to the suitable reception port or ports of the mail memory 114 of the installation.
In addition to these four information fields 90, 91, 92, 93, a lower level addresses directory element 9 assigned to an installation may also comprise other information fields such as information fields 94, 95 assigned to error correction codes EDC or information fields 96, 97 assigned respectively to a channel value C or network of origin and to a flag Xc signaling whether this channel information item C figuring in the directory element 9 does or does not have to be taken into consideration during a search for a match.
As before, the operations of selecting and sorting the packets at the inputs of an installation may call upon, during the second search for a match in the directory of higher level addresses assigned to the installation, a more thorough comparative analysis pertaining also to other service information of the third level of the packet. In this case, other information fields may be incorporated into the lower level addresses directory element 9 assigned to an installation as signaled by the presence of empty slots in
It is observed that the directory of higher level addresses serves also as matching table for the destination port dummy or non-dummy UDP/TCP addresses of the packets, and for the local addresses, only valid within an installation, assigned to its various reception ports mustered within its mail memory 114. This enables the configuration of the reception ports of an installation to be altered in a manner that is relatively independent of the transmission networks to which it is connected, the effect of a modification being limited to an update of the directory of higher level addresses of the installation.
In the case where a dichotomy search among the elements of the list of addresses of the directory of higher levels has to be implemented, it is necessary to organize this list according to a strict order relation making it possible during the dichotomy search to ascertain the direction in which the search should continue if the match is not achieved. The fields participating in this order relation are the fields 90, 81, 82, 96 and 97.
Each element 121 possesses:
Number | Date | Country | Kind |
---|---|---|---|
02/03257 | Mar 2002 | FR | national |
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/FR03/00745 | 3/7/2003 | WO |