Bit Indexed Explicit Replication Forwarding Optimization
First Claim
Patent Images
1. A method comprising:
- receiving a packet at a node, whereinthe packet comprises a bit string;
selecting an entry in an bit indexed forwarding table (BIFT), whereinthe selecting comprises traversing the bit string, andthe entry comprises a forwarding bit mask; and
forwarding the packet based on the forwarding bit mask and the bit string.
1 Assignment
0 Petitions
Accused Products
Abstract
Various systems and methods for performing bit indexed explicit replication (BIER). For example, one method involves receiving a packet at a node. The packet includes a bit string. The node traverses the bit string and selects an entry in a bit indexed forwarding table (BIFT). The entry includes a forwarding bit mask. Based on the forwarding bit mask and the bit string, the node forwards the packet.
64 Citations
20 Claims
-
1. A method comprising:
-
receiving a packet at a node, wherein the packet comprises a bit string; selecting an entry in an bit indexed forwarding table (BIFT), wherein the selecting comprises traversing the bit string, and the entry comprises a forwarding bit mask; and forwarding the packet based on the forwarding bit mask and the bit string. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A network device comprising:
-
a memory storing a bit indexed forwarding table (BIFT); a network interface configured to receive a packet, wherein the packet comprises a bit string; and a processor configured to select an entry in the BIFT, wherein selecting the entry comprises traversing the bit string, and the entry comprises a forwarding bit mask, and forward the packet based on the forwarding bit mask and the bit string. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A system comprising:
-
storage means for storing a bit indexed forwarding table (BIFT); network interface means for receiving a packet, wherein the packet comprises a bit string; and processing means for selecting an entry in the BIFT, wherein the selecting the entry comprises traversing the bit string, and the entry comprises a forwarding bit mask, and forwarding the packet based on the forwarding bit mask and the bit string. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification