Method and apparatus for emulating ethernet functionality over a serial bus
First Claim
1. A computer-readable medium having computer-executable instructions for emulating an Ethernet protocol in a network that uses a non-Ethernet protocol:
- (1) converting a first request to transmit a packet using an Ethernet protocol into a second request to transmit the packet using the non-Ethernet protocol, wherein the conversion is based on a stored mapping between Ethernet and non-Ethernet addresses;
(2) encapsulating the packet into a second packet compatible with the non-Ethernet protocol;
(3) transmitting the second packet over the network to a destination node in the network; and
(4) prior to converting, generating an Ethernet address derived from node addressing information using a digital signature algorithm.
1 Assignment
0 Petitions
Accused Products
Abstract
Applications can transparently use a bus, such as the IEEE-1394 serial bus, as if it were an Ethernet (IEEE 802.3). In a conventional Ethernet, each node is assigned a unique 6-byte MAC address in order to receive frames addressed to it over the LAN. According to the invention, IEEE-1394 bus node identifiers are mapped to Ethernet MAC addresses using for example a digital signature algorithm. Ethernet frames are then “wrapped” into 1394 bus packets and addressed to the destination node using the hashed address. The receiver unwraps the 1394 packet and restores the Ethernet frame to its original form. An optimum packet size for transmission of Ethernet packets over the 1394 bus is selected with reference to speed topology maps in the 1394 bus nodes, and this optimum size is transmitted to bus nodes. This packet size is reported to TCP to specify the packet size, and all packets larger than that size are fragmented and reassembled at the receiving node. The protocol works transparently across networks that are linked via bridges.
-
Citations
8 Claims
-
1. A computer-readable medium having computer-executable instructions for emulating an Ethernet protocol in a network that uses a non-Ethernet protocol:
-
(1) converting a first request to transmit a packet using an Ethernet protocol into a second request to transmit the packet using the non-Ethernet protocol, wherein the conversion is based on a stored mapping between Ethernet and non-Ethernet addresses;
(2) encapsulating the packet into a second packet compatible with the non-Ethernet protocol;
(3) transmitting the second packet over the network to a destination node in the network; and
(4) prior to converting, generating an Ethernet address derived from node addressing information using a digital signature algorithm. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A computer-readable medium having computer-executable instructions for emulating an Ethernet protocol in a network that uses a non-Ethernet protocol, comprising:
-
(1) converting a first request to transmit a packet using an Ethernet protocol into a second request to transmit the packet using the non-Ethernet protocol, wherein the conversion is based on a stored mapping between Ethernet and non-Ethernet addresses, the step of converting further including converting the first request to transmit the packet into an IEEE-1394 serial bus request;
(2) encapsulating the packet into a second packet compatible with the non-Ethernet protocol; and
(3) transmitting the second packet over the network to a destination node in the network including transmitting the second packet over an asynchronous data channel or an isochronous channel on the serial bus.
-
-
7. A computer-readable medium having computer-executable instructions for emulating an Ethernet protocol in a network that uses a non-Ethernet protocol, comprising:
-
(1) converting a first request to transmit a packet using an Ethernet protocol into a second request to transmit the packet using the non-Ethernet protocols wherein the conversion is based on a stored mapping between Ethernet and non-Ethernet addresses;
(2) encapsulating the packet into a second packet compatible with the non-Ethernet protocol;
(3) transmitting the second packet over the network to a destination node in the network; and
(4) determining an optimum packet size for use in transmitting packets over the network, wherein the step of determining the optimum packet size is performed by consulting speed topology maps for heterogeneous nodes on the network. - View Dependent Claims (8)
-
Specification