Supercharge Your Innovation With Domain-Expert AI Agents!

Efficient CAM-based techniques to perform string searches in packet payloads

A payload and search string hash value technology, which is applied in digital transmission systems, instruments, data exchange networks, etc., can solve the problems of not supporting efficient string search function and maintaining line rate speed, etc.

Inactive Publication Date: 2006-06-28
INTEL CORP
View PDF0 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

As a result, it is currently not feasible to perform string searches of packet payloads and maintain line rate speeds
In addition, the current calculation engine architecture does not support efficient string search functions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Efficient CAM-based techniques to perform string searches in packet payloads
  • Efficient CAM-based techniques to perform string searches in packet payloads
  • Efficient CAM-based techniques to perform string searches in packet payloads

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0086] Under one embodiment, the remaining L of the string KEY A substring of bytes is compared to the hash key of an existing CAM entry. If there is a match, the CAM entry is offset by n(L HOP +L KEY )-L KEY bytes (the number of skipped bytes shown in Figure 8), where n is an integer greater than zero. In this instance, the term "offset" represents the distance (in bytes) between the end of a given hash key and the beginning of the matching hash key. For example, if n=1, one can remove the L offset from the matching hash key HOP The hash key of CAM entry C in Figure 8 33 shown. The reason it works is that if the packet payload search is to consider the hash key corresponding to the removed CAM entry, then the subsequent hops of the search one of the (e.g., the next hop when n=1, the next hop when n=2 The second hop at the time, etc.) will land on another CAM entry, yielding a CAM hit.

[0087] Another optimization involves the adjustment of the "effective" size of the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This paper discloses efficient CAM-based techniques for string searching in packet payloads. The hash keys of overlapping substrings included in the one or more search strings are hashed. Store the obtained hash value in CAM. In a packet processing operation, the packet payload data is searched to determine if any search string exists. Non-overlapping substrings in the payload data are hashed, and the hash results are submitted to the CAM for comparison with previously generated search string hashes. If there is no CAM hit result, the payload data does not contain any search strings, and a CAM hit indicates that at least one of the search strings is present in the payload data. In this example, a full string comparison is performed between the search string (or identified search string) and the string of payload data to verify that the search string actually exists.

Description

technical field [0001] The field of the invention relates generally to computers and communication networks, and more specifically, but not exclusively, to techniques for string searching within packet payloads. Background technique [0002] Networking devices such as switches and routers are designed to forward network traffic at high line rates and in packets. One of the most important considerations in handling network traffic is packet throughput. To this end, special purpose processors known as network processors have been developed to efficiently process very large numbers of packets per second. To process a packet, a network processor (and / or a network device employing a network processor) needs to extract data from the packet header indicating the packet's destination, class of service, etc., store the payload data in memory, perform packet classification and queuing operation, determining the next hop for the packet, selecting the appropriate network port through ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30H04L12/56
CPCH04L45/00H04L63/0245H04L63/145H04L67/1023H04L69/12H04L67/1001
Inventor 尤达亚·尚卡拉曼诺贾·保罗
Owner INTEL CORP
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More