Flexible and extensible receive side scaling
First Claim
Patent Images
1. A method comprising:
- in response to receiving a packet, looking up a packet characteristic in one of at least one protocol table to determine one or more fields of the packet to use as a hash value;
applying a hash function to the hash value to obtain a hash result; and
using the hash result to determine one of a plurality of processors on which to process the packet.
1 Assignment
0 Petitions
Accused Products
Abstract
In an embodiment, a method is provided. The method of this embodiment provides in response to receiving a packet, looking up a packet characteristic in one of at least one protocol table to determine one or more fields of the packet to use as a hash value, applying a hash function to the hash value to obtain a hash result, and using the hash result to determine one of a plurality of processors on which to process the packet.
-
Citations
28 Claims
-
1. A method comprising:
-
in response to receiving a packet, looking up a packet characteristic in one of at least one protocol table to determine one or more fields of the packet to use as a hash value; applying a hash function to the hash value to obtain a hash result; and using the hash result to determine one of a plurality of processors on which to process the packet. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 12)
-
-
9. A method comprising:
-
in response to receiving a packet, determining if a first layer protocol associated with the packet is a supported first layer protocol; and if the first layer protocol is not associated with a supported first layer protocol; looking up the first layer protocol in a first protocol table to determine which bits of the packets to use as a hash value; applying a hash function to the hash value to obtain a hash result; and using the hash result to determine one of a plurality of processors on which to process the packet. - View Dependent Claims (10, 11, 13)
-
-
14. An apparatus comprising:
-
logic to; in response to receiving a packet, look up a packet characteristic in one of at least one protocol table to determine one or more fields of the packet to use as a hash value; apply a hash function to the hash value to obtain a hash result; and use the hash result to determine one of a plurality of processors on which to process the packet. - View Dependent Claims (15, 16, 17, 18)
-
-
19. A system comprising:
-
a circuit board that includes a circuit card slot; and a circuit card that is capable of being coupled to the circuit board via the circuit card slot, the circuit card including logic operable to; in response to receiving a packet, look up a packet characteristic in one of at least one protocol table to determine one or more fields of the packet to use as a hash value; apply a hash function to the hash value to obtain a hash result; and use the hash result to determine one of a plurality of processors on which to process the packet. - View Dependent Claims (20, 21, 22, 23)
-
-
24. An article of manufacture having stored thereon instructions, the instructions when executed by a machine, result in the following:
-
in response to receiving a packet, looking up a packet characteristic in one of at least one protocol table to determine one or more fields of the packet to use as a hash value; applying a hash function to the hash value to obtain a hash result; and using the hash result to determine one of a plurality of processors on which to process the packet - View Dependent Claims (25, 26, 27, 28)
-
Specification