The present invention relates to data communication switching, and more particularly to receive processing in data communication switching architectures of the type which switch packets over dedicated transmission lines between a plurality of switching controllers.
Local area network (LAN) switches generally perform a switching function on an internal backplane operative between switching controllers supporting external network devices. Such switching has typically been accomplished by configuring the backplane as a shared packet bus and granting the switching controllers having packets for transmission control of the backplane in time-multiplexed fashion. A conventional LAN switch backplane is illustrated in FIG. 1. LAN switch 10 includes switching controllers 110, 120, 130, 140 performing a switching function by transmitting and receiving packets over shared packet bus 150. Time-multiplexing is known to have been accomplished in such conventional LAN switches several ways. One way is assigning the controllers different clock cycles within a repetitive timing cycle and granting control of the bus to the controllers round-robin in accordance with their assigned clock cycles. Another way involves conducting a priority-based arbitration among the controllers having packets for transmission and granting control of the bus to the controller which “wins” the arbitration. Regardless of which bus control strategy is favored, reliance on a shared packet bus, and its inherent requirement of time-multiplexing packets for release to guarantee contention-free transmission, has led to congestion at the transmit side of the bus and inefficient use of receive processing resources. For example, unicast packets transmitted across the backplane are destined for a network device supported by only one of the controllers. However, where the backplane is a shared packet bus, all controllers must wait for a unicast packet to clear the backplane before a subsequent packet can be transmitted. This often results in clock cycles in which the receive processing resources of many controllers are idle, even while congestion may be developing at the transmit side of the backplane.
A more efficient approach would obviate the need to time-multiplex data for release across the backplane and, under normal operating conditions, would allow all packets awaiting transmission across the backplane to be forwarded without delay. However, to reap the full benefit of such “on the fly” transmission requires receive processing resources capable of efficiently handling parallel traffic. Otherwise, the conventional problem of underutilization of receive processing resources and transmit side congestion may inadvertently become one of overutilization of receive processing resources and receive side congestion.
In its most basic feature, the present invention eliminates the inefficiencies of shared bandwidth switch backplanes by implementing a dedicated bandwidth switch backplane having efficient receive processing capable of handling highly parallel traffic. The contemplated switching architecture has a plurality of switching controllers for transmitting and receiving packets across a backplane, with each controller having a transmit interface, a receive interface and filtering logic. The backplane includes a dedicated transmission line for each transmit interface such that all transmit interfaces may simultaneously propagate data bursts to all receive interfaces. Each receive interface includes a dedicated receive port for each transmission line and an output queue. Packets must pass a filtering check and a watermark check before the receive port is allowed to release them to the output queue. Highly efficient algorithms are applied to conduct the checks on the packets in a way which expedites receive processing and avoids contention.
In one aspect of efficient receive processing, a hybrid priority/port-based arbitration algorithm is used to sequence filtering checks on packets. The hybrid algorithm prioritizes and sequences packets according to how soon their receive port would be able to begin delivering them to the output queue in the event the filtering check were allowed to proceed and the filtering and watermark checks were passed; however, the hybrid algorithm assigns all packets for which delivery could not begin within a threshold number of clock cycles the lowest priority and filtering checks are sequenced on such low priority packets according to their receive port.
In another aspect of efficient receive processing, the outcome-dependence of the current packet's watermark check on the queueing decision made on the preceding packet is addressed efficiently by a watermark comparison algorithm which performs preliminary calculations using “projected” output queue write addresses for each possible outcome of the queueing decision on the preceding packet and using the actual outcome, when available, to select from among preliminary calculations.
In another aspect of efficient receive processing, if a packet passes the filtering check but fails the watermark check, a stall condition is triggered to restrict the transmission of additional packets to the packet's receive port until the watermark check is passed.
In another aspect of efficient receive processing, receive ports are operatively divided into one or more full-write receive ports and one or more selective-write receive ports for delivering their packets to the output queue. The full-write receive ports always write data, if available, to the queue on the clock cycles during which they are assigned writing privileges. On the clock cycles during which the selective-write receive ports are assigned writing privileges, data is read from the queue, unless the selective-write receive ports have indicated they wish to write to the queue, in which case the selective-write receive ports write to the queue. By configuring relatively low-traffic ports as selective-write ports, dequeueing may accomplished during unutilized “write” clock cycles, obviating the need to designate “read only” clock cycles.
These and other aspects of the present invention can be understood by reference to the following detailed description, taken in conjunction with the accompanying drawings which are briefly described below. Of course, the actual scope of the invention is defined by the appended claims.
The present invention applies to a dedicated bandwidth switching architecture such as the LAN switching architecture shown in FIG. 2. The preferred connectivity pattern includes unidirectional data transmission lines 211-219 assigned to switching controllers 201-209, respectively. Each of switching controllers 201-209 transmits packets on its dedicated one of transmission lines 211-219 and receives packets from all controllers on transmission lines 211-219. Thus, on any particular clock cycle, all controllers 201-209 may transmit a single data burst and may receive a plurality of data bursts. It will be appreciated that by dedicating a transmission line to each one of controllers 201-209, the need to transfer data across backplane 200 at a reduced rate is obviated and, under normal operating conditions, all packets for transmission across backplane 200 may be forwarded without delay. Of course, the number of controller/transmission line pairs will vary depending on network requirements. However, provided the number is greater than one, efficient receive processing resources must be implemented in the controllers to process the parallel traffic. In a preferred embodiment of the invention, receive processing resources suitable for handling parallel traffic are provided and described hereinafter in greater detail.
Turning now to
Transmit interface 310 receives packets from network devices it supports (not shown), performs transmit processing on packets and selectively forwards packets across the backplane on its dedicated transmission line. Transmit interface 310 makes forwarding decisions in accordance with configured MAC bridging rules using the results of associative comparisons performed in filtering logic 330. By way of example, the following bridging rules may be enforced: Source and destination MAC addresses encoded in a received packet are compared for a match with addresses stored in filtering logic 330 known to be associated with network devices supported by transmit interface 310. If the filtering results indicate a match for the destination MAC address, filtering is indicated, in which case transmit interface 310 filters the packet. If the filtering results indicate no match for the destination MAC address, forwarding is indicated, in which case transmit interface 310 uses the filtering results as a pointer to a forwarding database, retrieves forwarding instructions for the packet and transmits the packet on the backplane with the forwarding instructions encoded. If the filtering results indicate no match for a source MAC address, transmit interface 310 subjects the address to a source learning process resulting in the address being added to the filtering logic. Of course, additional or different bridging rules may be implemented on transmit interface 310, such as a rule requiring that the source and destination MAC addresses of a packet share at least one virtual LAN (VLAN) as a condition for forwarding. Transmit interface 310 forwards packets for which forwarding is indicated on the backplane first in, first out (FIFO), in a series of data bursts.
Receive interface 320 receives packets from the backplane, performs receive processing on packets and selectively queues packets for forwarding to the network devices it supports (not shown). Receive interface 320 makes queueing decisions based on the results of filtering and watermark checks, which both must indicate queueing for queueing clearance to be granted. Filtering checks rely on associative comparisons conducted in filtering logic 330. The following MAC bridging rules may apply to filtering checks by way of example: Destination MAC addresses encoded in received packets are compared for a match with addresses stored in filtering logic 330 known to be associated with network devices it supports. If the filtering results indicate a match for the destination MAC address, queueing is indicated. If the filtering results indicate no match for the destination MAC address, filtering is indicated if no other switching controller claims the packet and queueing is indicated if another switching controller claims the packet. Naturally, additional or different bridging rules may be implemented on receive interface 320.
Filtering logic 330 may be implemented in content-addressable memory (CAM) integrated circuitry which conducts associative comparisons in a CAM on complete addresses, “pseudo CAM” integrated circuitry and software which resolves the most distinctive bits in addresses using a data hashing algorithm and conducts associative comparisons in a random access memory (RAM) on the most distinctive bits, or in conventional processor-driven software.
Turning now to
Filtering checks are initiated by engaging filtering check arbiter 420. In a preferred embodiment, filtering checks proceed as follows. When a sufficient number of data bursts for a packet have been received by one of receive ports 401-409, the receive port sends to arbiter 420 a request for control of bus 430 for the purpose of initiating an associative comparison in filtering logic 330. If arbiter 420 has only one request pending on a particular clock cycle, arbiter 420 automatically grants the request. If, however, arbiter 420 has multiple pending requests on a particular clock cycle, the competing requests are resolved by granting the pending request made by the one of receive ports 401-409 whose assigned “start release” clock cycle would enable it to initiate the release of its packet to output queue 440 the soonest if queueing clearance were granted, provided that a threshold latency would not be exceeded by such packet. If the threshold latency would be exceeded by all packets associated with pending requests, the requests are granted based on port number. It will be appreciated that by implementing the foregoing rules to resolve competing requests to initiate filtering checks, filtering checks are able to proceed contention-free while latency caused by the round-robin packet release initiation protocol is reduced. The filtering check arbitration algorithm implemented by arbiter 420 is illustrated in greater detail in the flow diagram of FIG. 5. When multiple requests are pending a check is made to determine if any of the requests is from a “zero clock latency” receive port, i.e., a receive port which would be able to initiate release of its packet on the first clock cycle after receiving forwarding clearance (510). If there is a “zero clock latency” request, the request is granted (520). If not, a check is made to determine if any of the requests is from a “one clock latency” receive port (530). If there is a “one clock latency” request, the request is granted (540). If not, arbiter 420 grants the request which is associated with the lowest-numbered receive port (550, 560, 570, 580). Because clock latency is a determinable constant for each clock cycle and port number pair, latency determinations may be made by consulting a pre-configured “look-up” table in arbiter 420.
Filtering checks are conducted by engaging filtering logic 330 over bus 430. The receive port whose request is granted transmits the destination MAC addresses of its packet to filtering logic 330 on bus 430. Filtering logic 330 eventually returns filtering results on bus 430 indicating whether a match for the destination MAC address was found. If the filtering results indicate that a match was found, the receive port will eventually queue the packet. Because MAC bridging rules indicate forwarding by all switching controllers if no controller claims a packet transmitted over the backplane, the receive port advises other controllers that it has claimed the packet. For this purpose, receive ports 401-409 have claim lines 421-429. The receive port which will eventually queue the packet asserts its claim line after learning that the filtering results indicate that a match was found. If the filtering results indicate that no match was found, the receive port checks whether any other controller has asserted the claim line. If either the filtering results indicate that a match was found, or the claim line has not been asserted, the packet has passed the filtering check and will eventually be queued. Otherwise, the packet has failed the filtering check and will be dropped.
Watermark checks are initiated by engaging input/output server 430. The condition for passing a watermark check is:
WM>(WADDR−RADDR)+SZ
where
The watermark check is complicated somewhat by its outcome-dependence on preceding queueing decisions. More particularly, to conduct an accurate watermark check on a current packet, it must be known how much output queue space has been definitively allocated to preceding packets, i.e., it must be known for each preceding packet whether queueing clearance was granted. To enable watermark checks to be conducted efficiently in integrated circuitry despite this outcome-dependence, the preferred watermark comparison algorithm makes preliminary calculations on the current request using “projected” output queue write addresses for each possible outcome of the queueing decision on the preceding packet and applies the actual outcome to select from among the preliminary calculations. The preferred watermark comparison algorithm is illustrated in greater detail by reference to
If a packet passes the filtering check but fails the watermark check, forwarding is indicated but the packet is delayed at its receive port to prevent output queue overflow. To avoid having the delayed packet overwritten by a subsequent packet transmitted to the receive port over the backplane, the receive port imposes a stall condition to suspend the transmission of subsequent packets until release of the current packet to output queue 440 is secured. Referring to
Receive ports 401-409 initiate release to output queue 440 of packets for which queueing clearance has been received on their assigned “start release” clock cycles. In a preferred embodiment, receive ports 401-408 are operative as full-write ports and receive port 409 is operative as a selective-write port for releasing packets to output queue 440. Each packet is released in a series of constant-bit words in accordance with a repetitive nine-clock timing cycle. Referring to
Turning now to
It will be appreciated by those of ordinary skill in the art that the invention can be embodied in other specific forms without departing from the spirit or essential character hereof. The present description is therefore considered in all respects illustrative and not restrictive. The scope of the invention is indicated by the appended claims, and all changes that come within the meaning and range of equivalents thereof are intended to be embraced therein.
This application is a continuation of U.S. Patent Application No. 09/063,493, filed on Apr. 20, 1998, now U.S. Pat. No. 6,314,106 the disclosure of which is incorporated fully herein by reference.
Number | Name | Date | Kind |
---|---|---|---|
4866702 | Shimizu et al. | Sep 1989 | A |
4985889 | Frankish et al. | Jan 1991 | A |
5127000 | Henrion | Jun 1992 | A |
5345447 | Noel | Sep 1994 | A |
5521923 | Willmann et al. | May 1996 | A |
5568476 | Sherer et al. | Oct 1996 | A |
5602850 | Wilkinson | Feb 1997 | A |
5682383 | Dahod et al. | Oct 1997 | A |
5729546 | Gupta et al. | Mar 1998 | A |
5910954 | Bronstein | Jun 1999 | A |
5914953 | Krause et al. | Jun 1999 | A |
5953340 | Scott et al. | Sep 1999 | A |
6023471 | Haddock et al. | Feb 2000 | A |
6026075 | Linville et al. | Feb 2000 | A |
6046982 | Ozveren et al. | Apr 2000 | A |
6084856 | Simmons et al. | Jul 2000 | A |
6092108 | DiPlacido et al. | Jul 2000 | A |
6115387 | Egbert et al. | Sep 2000 | A |
6141323 | Rusu et al. | Oct 2000 | A |
6442170 | Perlman et al. | Aug 2002 | B1 |
Number | Date | Country |
---|---|---|
WO 9744938 | Nov 1997 | WO |
Number | Date | Country | |
---|---|---|---|
20010022786 A1 | Sep 2001 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 09063493 | Apr 1998 | US |
Child | 09871868 | US |