FLEXIBLE AND EXTENSIBLE RECEIVE SIDE SCALING
First Claim
Patent Images
1. A method comprising:
- in response to receiving a packet, looking up a packet characteristic in one of at least one protocol table to determine one or more fields of the packet to use as a hash value;
applying a hash function to the hash value to obtain a hash result; and
using the hash result to determine one of a plurality of processors on which to process the packet.
0 Assignments
0 Petitions
Accused Products
Abstract
In an embodiment, a method is provided. The method of this embodiment provides in response to receiving a packet, looking up a packet characteristic in one of at least one protocol table to determine one or more fields of the packet to use as a hash value, applying a hash function to the hash value to obtain a hash result, and using the hash result to determine one of a plurality of processors on which to process the packet.
17 Citations
20 Claims
-
1. A method comprising:
-
in response to receiving a packet, looking up a packet characteristic in one of at least one protocol table to determine one or more fields of the packet to use as a hash value; applying a hash function to the hash value to obtain a hash result; and using the hash result to determine one of a plurality of processors on which to process the packet. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system comprising one or more storage mediums having stored thereon, individually or in combination, instructions that when executed by one or more processors, results in the following:
-
in response to receiving a packet, looking up a packet characteristic in one of at least one protocol table to determine one or more fields of the packet to use as a hash value; applying a hash function to the hash value to obtain a hash result; and using the hash result to determine one of a plurality of processors on which to process the packet. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer implemented method comprising:
receiving a packet at a network controller; and determining which of a plurality of processors to select for processing the packet using a hash result that is obtained by applying a hash function with a hash value to a field of the packet, wherein the field of the packet is determined by looking up in at least one protocol table stored in computer readable memory. - View Dependent Claims (18, 19, 20)
Specification