1. Field of the Invention
The present invention relates generally to communication networks. More specifically, the present invention relates to network switches and switch-to-switch protocols.
2. Description of the Background Art
It is common in conventional computing environments to connect a plurality of computing systems and devices through a communication medium often referred to as a network. Such networks among communicating devices permit devices (or users of devices) to easily exchange and share information among the various devices. The Internet is a presently popular example of such networking on a global scale. Individual users attach their computers to the Internet, thereby enabling sharing of vast quantities of data on other computers geographically dispersed throughout the world.
Networked computing systems may be configured and graphically depicted in a wide variety of common topologies. In other words, the particular configurations of network communication links (also referred to as paths) and devices between a particular pair of devices wishing to exchange information may be widely varied. Any particular connection between two computers attached to a network may be direct or may pass through a large number of intermediate devices in the network. In addition, there may be a plurality of alternative paths through the network connecting any two network devices. Computing networks are therefore complex and vary in their configurations and topologies.
Certain network communication media and protocols are referred to as packet oriented. A protocol or communication medium may be said to be packet oriented in that information to be exchanged over the network is broken into discrete sized packets of information. A block of information to be transferred over the network is decomposed into one or more packets for purposes of transmission over the network. At the receiving end of the network transmission, the packets are re-assembled into the original block of data.
In general, each packet includes embedded control and addressing information that identifies the source device which originated the transmission of the packet and which identifies the destination device to which the packet is transmitted. Identification of source and destination devices is by means of an address associated with each device. An address is an identifier which is unique within the particular computing network to identify each device associated with the network. Such addresses may be unique to only a particular network environment (i.e., a network used to interconnect a single, self-contained computing environment) or may be generated and assigned to devices so as to be globally unique in co-operation with networking standards organizations.
In the networking layer 2 level of network communication, such addresses are often referred to as MAC address (Media ACcess address). Network protocols operable above this level of communication may use other addresses for other purposes in the higher-level communication techniques.
In many conventional commercially-available network environments, the network communication medium is in essence a bus commonly attached to a plurality of devices over which the devices exchange. In a simple networking topology, all devices may be attached to such a bus-structured common network medium. Any particular single network medium has a maximum data exchange bandwidth associated therewith. The maximum data exchange bandwidth of a medium is determined by a number of electrical and physical properties of the medium and protocols used to communicate over that medium. For example, a popular family of related network media and protocols are collectively referred to as Ethernet. Ethernet defines a standard protocol for the exchange of messages over the communication medium. A variety of communication media are also defined as part of the Ethernet family. The communication bandwidth of the Ethernet family of standards may change over time, but conventionally ranges from approximately 10 Mbit (megabits or million bits of information) per second to 1 Gbit (gigabits or billion bits of information) per second. Therefore, a single (slow) Ethernet connection, for example, has a maximum data exchange bandwidth of approximately 10 Mbit per second.
In conventional network computing environments, a number of devices are used in addition to interconnected computing systems to efficiently transfer data over the network. Routers and switches are in general network devices which segregate information flows over various segments of a computer network. A segment may be any subset of the network computing environment, including devices and their respective interconnecting communication links. A single computer network communication link may have a maximum data transfer bandwidth parameter defining the maximum rate of information exchange over that network. Where all devices on a computer network share a common network medium, the maximum bandwidth of the computer network may be rapidly reached. The overall performance of the networked computing environment may be thereby reduced because information exchange requests may have to await completion of earlier information exchange requests presently utilizing the communication link.
In particular, a switch device is a device that filters out packets on the network destined for devices outside a defined subset (segment) and forwards information directed between computing devices on different segments of a networked computing environment. The filtering and forwarding of such information is based on configuration information within the switch that describes the data packets to be filtered and forwarded in terms of source and/or destination address information (once address locations are “learned” by the switch(es)).
Network switch devices and protocols associated therewith are also used to manage redundant paths between network devices. Where there is but a single path connecting two network devices, that single path, including all intermediate devices between the source and destination devices, represent a single point of failure in network communications between that source and destination device. It is therefore common in network computing environments to utilize a plurality of redundant paths to enhance reliability of the network. One type of network with redundant paths is a network mesh or switching mesh.
It is desirable to improve networking and communications apparatus and methods.
Other ports on the switches 102 are “non-mesh” ports in that they connect the switch 102 to a network device outside of the mesh 101. For example, port 11 of switch A 102-A is a non-mesh switch that connects to network device X. As another example, port 7 of switch D 102-D connects to network device Z. Of course, while the illustration of
An example of a broadcast packet 300 is shown in
Regarding the procedure 200 of the originating mesh switch 102 per
Regarding the procedure 210 of a non-originating mesh switch 102 per
As a concrete example, consider that the originating mesh switch is switch A 102-A of
Switch B 102-B receives 212 the forwarded packet 300 on its port 4, and switch C 102-C receives 212 the forwarded packet 300 on its port 7. In this specific example, the broadcast map data at switch B 102-B for packets 300 originating from switch A 102-A indicates that there is no next switch. However, the broadcast map data at switch C 102-C for packets 300 originating from switch A 102-A indicates that there is a next mesh switch, and the next mesh switch is indicated to be switch D 102-D. As such, the packet is forwarded 222 from switch C 102-C (via port 9) to switch D 102-D, as indicated by the arrow labeled 222 in
Multiple meta-meshing switches 402 are shown which implement the meta-meshing protocol. Although there are four such switches (402-1, 402-2, 402-3, and 402-4) in the example shown, there need not be a one-to-one correspondence between the number of meta-meshing switches 402 and the number of meshes 101 in the meta-mesh 400. In the example illustrated, each meta-meshing switch 402 is interconnected with each of the other meta-meshing switches 402 and also is interconnected with each of the meshes 101. In other implementations, each meta-meshing switch 402 need not be interconnected with each of other meta-meshing switches 402 and also need not be interconnected with each of the meshes 101.
Multiple meta2-meshing switches 502 are shown which implement the meta 2-meshing protocol. Although there are four such switches (502-1, 502-2, 502-3, and 502-4) in the example shown, there need not be a one-to-one correspondence between the number of meta2-meshing switches 502 and the number of meta-meshes 400 in the meta2-mesh 500. In the example illustrated, each meta2-meshing switch 502 is interconnected with each of the other meta2-mesh switches 502 and also is interconnected with each of the meta-meshes 400. In other implementations, each meta2-meshing switch 502 need not be interconnected with each of other meta2-meshing switches 502 and also need not be interconnected with each of the meta-meshes 400.
Together,
In this example with three-levels of stacked tags, the first tag pre-pended to the broadcast packet 300 is the mesh tag 602. The mesh tag 602 is used to determine the broadcast path of the packet through switches 102 forming a mesh 101. In one embodiment, the mesh tag 602 may comprise an originating switch identifier, and that identifier may be used to determine the broadcast path through the mesh 101.
The second tag “stacked on top of” the first tag 606 is the meta-mesh tag 604. The meta-mesh tag 604 is used to determine the broadcast path of the packet through the meshes 101 forming a meta-mesh 400. In one embodiment, the meta-mesh tag 604 may comprise an originating mesh identifier, and that identifier may be used to determine the broadcast path through the meta-mesh 400.
The third tag “stacked on top of” the second tag 604 is the meta-meta-mesh tag 606. The meta2-mesh tag 606 is used to determine the broadcast path of the packet through the meta-meshes 400 forming a meta2-mesh 500. In one embodiment, the meta2-mesh tag 606 may comprise an originating meta-mesh identifier, and that identifier may be used to determine the broadcast path through the meta2-mesh 500.
In the first block 702, the originating switch inserts a mesh tag 602 prior to sending out the broadcast packet. This mesh tag 602 is then used by the other meshing switches to determine the broadcast path through the mesh, as indicated in the second block 704.
In the third block 706, a meta-mesh tag 604 is inserted into the packet before forwarding the packet to a meta-meshing switch 402. This meta-mesh tag 604 is then used by the meta-meshing switches 402 to determine the broadcast path through the meta-mesh 400, as indicated in the fourth block 708. Before the packet enters another mesh 101 of the meta-mesh 400, the meta-mesh tag 604 is removed, as shown in the fifth block 710.
In a sixth block 712, a meta2-mesh tag 606 is inserted into the packet before forwarding the packet to a meta2-meshing switch 502. This meta2-mesh tag 606 is then used by the meta2-meshing switches 502 to determine the broadcast path through the meta2-mesh 500, as indicated in the seventh block 714. Before the packet enters another meta-mesh 400 of the meta2-mesh 500, the meta -mesh tag 606 is removed, as shown in the eighth block 716.
A determination is then made 804 as to whether the packet is from another switch in the same mesh. If the packet is from another switch in the same mesh, then the packet may be flooded 806 to appropriate destination ports based on a flood (broadcast) map for the current tag (i.e. the current mesh tag).
Otherwise, if the packet is not from another switch in the same mesh, then a further determination is made 808 as to whether the packet is from an end node such that the packet is just entering the mesh. If the packet is from an end node, then a mesh tag is added 810 to identify this switch as the entry point to the mesh. Thereafter, the packet may be flooded 806 to appropriate destination ports based on a flood map for that tag.
On the other hand, if the packet is not from an end node (and not from another switch in the mesh), then the packet is from the meta-mesh. In that case, the switch strips 812 the meta-mesh tag from the packet and modifies 814 the mesh tag to identify this switch as the entry point to the mesh. Thereafter, the packet may be flooded 806 to appropriate destination ports based on a flood map for that tag.
For each destination port to which the packet is flooded 806, a determination is made 822 as to whether the port is connected to a meta-mesh. If the port is connected to a meta-mesh, then a meta-mesh tag is added to the packet and the packet is sent out 824 with the meta mesh tag.
Otherwise, if the port is not connected to a meta-mesh, then a further determination is made 826 as to whether the port is connected to an end node. If the port is connected to an end node, then all the mesh tags (i.e. any mesh tag, any meta-mesh tag, and so on) are stripped from the packet, and the packet is sent out 828 without any such mesh tags.
On the other hand, if the port is not connected to an end node, then the packet is forwarded 830 with the existing mesh tags in place.
A central processing unit (CPU) 902 performs overall configuration and control of the switch 900 operation. The CPU 902 operates in cooperation with switch control 904, an application specific integrated circuit (ASIC) designed to assist CPU 902 in performing packet switching at high speeds required by modern networks.
The switch control 904 controls the “forwarding” of received packets to appropriate locations within the switch for further processing and/or for transmission out another switch port. Inbound and outbound high speed FIFOs (906 and 908, respectively) may be included with the switch control 904 for exchanging data over switch bus 952 with port modules. In accordance with an embodiment of the invention, the switch control ASIC 904 is configured to insert and remove tags from fixed locations in a packet, as may be necessary. For example, the aforementioned mesh and meta-mesh tags may be added to and/or removed from the broadcast packets.
Memory 910 may include a high and low priority inbound queue (912 and 914, respectively) and outbound queue 916. High priority inbound queue 912 holds received switch control packets awaiting processing by CPU 902 while low priority inbound queue 914 holds other packets awaiting processing by CPU 902. Outbound queue 916 holds packets awaiting transmission to switch bus 920 via switch control 904 through its outbound FIFO 908. CPU 902, switch control 904 and memory 910 may be configured to exchange information over processor bus 952 largely independent of activity on switch bus 920.
The ports of the switch may be embodied as plug-in modules that connect to switch bus 920. Each such module may be, for example, a multi-port module 918 having a plurality of ports in a single module or may be a single port module 936. A multi-port module provides an aggregate packet switch performance capable of handling a number of slower individual ports. For example, in one embodiment, both the single port module 936 and the multi-port module 918 may be configured to provide, for example, approximately 1 Gbit per second packet switching performance. The single port module 936 therefore can process packet switching on a single port at speeds up to 1 Gbit per second. The multi-port module 918 provides similar aggregate performance but distributes the bandwidth over, preferably, eight ports each operating at speeds, for example, of up to 100 Mbit per second.
Each port may include high speed FIFOs for exchanging data over its respective port. Specifically, each port, 920, 928, and 937, preferably includes an inbound FIFO 922, 930, and 938, respectively for receiving packets from the network medium connected to the port. Further, each port 920, 928, and 937, may include a high priority outbound FIFO 924, 932, and 910, respectively, and a low priority outbound FIFO 926, 934, and 942, respectively. The low priority outbound FIFOs may be used to queue data associated with transmission of normal packets while the high priority outbound FIFO is used to queue data associated with transmission of control packets. Each module (918 and 936) may include circuits (not specifically shown) to connect its port FIFOs to the switch bus 920.
As packets are received from a port, the packet data may be applied to the switch bus 920 in such a manner as to permit monitoring of the packet data by switch control 904. The switch control 904 may be configured to manage access to switch bus 920 by all port modules (i.e., 918 and 936). All port modules may “listen” to packets as they are received and applied by a receiving port module to switch bus 920. If a packet is to be forwarded to another port, switch control 904 may apply a trailer message to switch bus 920 following the end of the packet to identify which port should accept the received packet for forwarding to its associated network link.
Note that the above-described stacked tagging for switching is performed by network switches at the network layer 2. This advantageously provides a basis for increased performance in relation to routing which is performed at the network layer 3.
In the above description, numerous specific details are given to provide a thorough understanding of embodiments of the invention. However, the above description of illustrated embodiments of the invention is not intended to be exhaustive or to limit the invention to the precise forms disclosed. One skilled in the relevant art will recognize that the invention can be practiced without one or more of the specific details, or with other methods, components, etc. In other instances, well-known structures or operations are not shown or described in detail to avoid obscuring aspects of the invention. While specific embodiments of, and examples for, the invention are described herein for illustrative purposes, various equivalent modifications are possible within the scope of the invention, as those skilled in the relevant art will recognize.
These modifications can be made to the invention in light of the above detailed description. The terms used in the following claims should not be construed to limit the invention to the specific embodiments disclosed in the specification and the claims. Rather, the scope of the invention is to be determined by the following claims, which are to be construed in accordance with established doctrines of claim interpretation.