scispace - formally typeset
Search or ask a question
Author

Claudio DeSanti

Bio: Claudio DeSanti is an academic researcher from Cisco Systems, Inc.. The author has contributed to research in topics: Fibre Channel & Fibre Channel over Ethernet. The author has an hindex of 15, co-authored 45 publications receiving 862 citations.

Papers
More filters
Patent
02 Aug 2006
TL;DR: In this article, a system and method are employed for forwarding multicast packets among a plurality of interfaces, where a multicast packet having a scope value and multicast group identifier (ID) value is received on an inbound interface.
Abstract: A system and method are employed for forwarding multicast packets among a plurality of interfaces. A multicast packet having a scope value and a multicast group identifier (ID) value is received on an inbound interface. A VLAN designation associated with the inbound interface is identified. If the scope value in the received multicast packet indicates that the multicast packet has a link-local scope, a look-up address is generated that includes the identified VLAN designation and the multicast group ID value of the multicast packet. If the scope value in the received multicast packet indicates that the multicast packet has a site-local scope or an organization-local scope, the identified VLAN designation is used to retrieve a site identifier associated with the VLAN designation, and a look-up address is generated that includes the retrieved site identifier and the multicast group ID value. Finally, the look-up address is used to render a forwarding decision for the multicast packet.

119 citations

Patent
16 Jun 2008
TL;DR: In this paper, the authors discuss applying network policy at a network device, among other things, applying network policies at the network device to enforce a zoning policy on the fiber channel over Ethernet frames.
Abstract: This document discusses, among other things, applying network policy at a network device. In an example embodiment fibre channel hard zoning information may be received that indicates whether a fibre channel frame is permitted to be communicated between two fibre channel ports. Some example embodiments include identifying a media access control addresses associated with the fibre channel ports. An example embodiment may include generating one or more access control entries based on the fibre channel identifications of the fibre channel ports and the zoning information. The access control entries may be distributes to an Ethernet port to be inserted into an existing access control list and used to enforce a zoning policy upon fibre channel over Ethernet frames.

105 citations

Patent
26 Mar 2009
TL;DR: In this article, the discovery of Fibre Channel over Ethernet (FCoE) networks is performed by transmitting a solicitation message to the multicast MAC address "All-FCF-MACs" and each FCF replies with a unicast advertisement message that provides the ENode with a MAC address of the responding FCF.
Abstract: Techniques are provided for performing discovery in a Fibre Channel over Ethernet (FCoE) network. An FCoE Node (ENode) discovers the FCoE Forwarders (FCFs) connected to its network segment by transmitting a solicitation message to the multicast MAC address "All-FCF-MACs". All FCFs receive packets with this multicast MAC address including the solicitation message that announces the presence of the ENode. Each FCF replies with a unicast advertisement message that provides the ENode with a MAC address of the responding FCF. The ENode builds a list of the FCFs available on its network segment and may then establish a virtual link with one or more of the FCFs through a Fabric Login (FLOGI) exchange.

68 citations

Patent
25 Mar 2003
TL;DR: In this article, a static Fibre Channel Fabric that does not require a Principal Switch is defined, where the Switch detects which ports are connected to dynamically set Switches and then isolates them, while maintaining operational the ports connected to statically configured Switches.
Abstract: A storage area network and method for defining a static Fibre Channel Fabric that does not require a Principal Switch. The storage area network comprises one or more hosts, one or more storage devices, and a static Fabric connecting the one or more hosts and storage devices. Within the static Fabric, the Switches have their Domain_ID and Fabric_Name statically set. The method comprises accessing the Fabric, selecting a Switch in the Fabric, and statically configuring the Domain_ID and Fabric_Name for the selected Switch. The above sequence is repeated for each Switch in the static Fabric. In one embodiment, after being statically configured, the Switch is isolated from any dynamically set Switches in the Fabric. The Switch detects which of its Ports are connected to dynamically set Switches, and then isolates them, while maintaining operational the Ports connected to statically configured Switches.

57 citations

Patent
19 Mar 2008
TL;DR: In this paper, the authors present a method for implementing an access list key for accessing information associated with a packet from access list, where the packet includes an IP source address field and an IP destination address field, each having a number of bits (e.g. 128 bits).
Abstract: Methods and apparatus for implementing an access list key for accessing information associated with a packet from an access list are disclosed. The packet includes an IP source address field and an IP destination address field, the IP source address field including an IP source address and the IP destination address field including an IP destination address, the IP source address and the IP destination address each having a number of bits (e.g., 128 bits in the case of IPv6). An IP source address is obtained from the IP source address field of the packet and an IP destination address is obtained from the IP destination address field of the packet. A modified IP source address is generated from the obtained IP source address such that the number of bits in the modified IP source address is less than the number of bits in the obtained IP source address. In addition, a modified IP destination address is generated from the obtained IP destination address such that the number of bits in the modified IP destination address is less than the number of bits in the obtained IP destination address. The access list key is then composed from the modified IP source address and the modified IP destination address.

55 citations


Cited by
More filters
14 Jun 2011
TL;DR: Experiments on the Xen-based implementation of Gatekeeper in a datacenter cluster demonstrate effective and flexible control of ingress/egress link bandwidth for tenant virtual machines under both TCP and greedy unresponsive UDP traffic.
Abstract: Cloud environments should provide network performance isolation for co-located untrusted tenants in a virtualized datacenter. We present key properties that a performance isolation solution should satisfy, and present our progress on Gatekeeper, a system designed to meet these requirements. Experiments on our Xen-based implementation of Gatekeeper in a datacenter cluster demonstrate effective and flexible control of ingress/egress link bandwidth for tenant virtual machines under both TCP and greedy unresponsive UDP traffic.

211 citations

Patent
13 Mar 2013
TL;DR: In this article, the authors present a switch consisting of a tunnel management module, a packet processor, and a forwarding module that determines an output port for an inner packet in the data packet based on a destination address of the inner packet.
Abstract: One embodiment of the present invention provides a switch. The switch includes a tunnel management module, a packet processor, and a forwarding module. The tunnel management module operates the switch as a tunnel gateway capable of terminating an overlay tunnel. During operation, the packet processor, which is coupled to the tunnel management module, identifies in a data packet a virtual Internet Protocol (IP) address associated with a virtual tunnel gateway. This virtual tunnel gateway is associated with the switch and the data packet is associated with the overlay tunnel. The forwarding module determines an output port for an inner packet in the data packet based on a destination address of the inner packet.

157 citations

Patent
18 Apr 2011
TL;DR: In this article, a data extraction unit extracts first destination information from the header of the packet and generates second destination information that conforms to the recognized communication protocol, based on which the processing unit determines an egress interface to which the packet is to be forwarded.
Abstract: An apparatus for forwarding packets includes a packet processing pipeline having a processing unit that processes packets compliant with a recognized communication protocol. A first port coupled to the packet processing pipeline is configured to receive a packet that does not comply with the recognized communication protocol and has a header that conforms to a second communication protocol. A data extraction unit extracts first destination information from the header of the packet and, based on the first destination information, generates second destination information that conforms to the recognized communication protocol. The processing unit determines, based on the second destination information, an egress interface to which the packet is to be forwarded.

150 citations

Patent
27 Dec 2012
TL;DR: In this article, the authors present a server apparatus consisting of a plurality of server on a chip (SoC) nodes interconnected to each other through a node interconnect fabric, each one of the SoC nodes has respective memory resources integral therewith.
Abstract: A server apparatus comprises a plurality of server on a chip (SoC) nodes interconnected to each other through a node interconnect fabric. Each one of the SoC nodes has respective memory resources integral therewith. Each one of the SoC nodes has information computing resources accessible by one or more data processing systems. Each one of the SoC nodes configured with memory access functionality enabling allocation of at least a portion of said memory resources thereof to one or more other ones of the SoC nodes and enabling allocation of at least a portion of said memory resources of one or more other ones of the SoC nodes thereto based on a workload thereof.

124 citations