scispace - formally typeset
Search or ask a question
Topic

Fast packet switching

About: Fast packet switching is a research topic. Over the lifetime, 5641 publications have been published within this topic receiving 111603 citations.


Papers
More filters
Proceedings ArticleDOI
David T. Neilson1
01 Sep 2006
TL;DR: How photonics' primary role will be to provide interconnection between racks of electronic routing elements and how fast wavelength switching can provide a high-capacity distributed switch fabric that will allow these packet routers to scale to higher capacities are discussed.
Abstract: Packet switched networks face significant scaling challenges. We will discuss how fast wavelength switching can enable scaling of core routers and allow adaptive bandwidth circuit switching for a more efficient use of the optical network.

74 citations

Patent
29 Jul 2010
TL;DR: In this article, a service node can use a classification result to process other packets in a same packet flow, such that all packets of a flow do not need to be sent to an application node for processing.
Abstract: Packets are encapsulated and sent from a service node (e.g., packet switching device) using one or more services applied to a packet by an application node (e.g., a packet switching device and/or computing platform such as a Cisco ASR 1000) to generate a result, which is used by the service node to process packets of a flow of packets to which the packet belonged. An example of a service applied to a packet is a classification service, such as, but not limited to, using deep packet inspection on the packet to identify a classification result. The service node can, for example, use this classification result to process other packets in a same packet flow, such that all packets of a flow do not need to be, nor typically are, sent to an application node for processing.

74 citations

Patent
05 Jun 1998
TL;DR: In this article, a packet switching fabric includes a data ring, a control ring, and a plurality of network links each coupled to at least one network node, and the switching devices coupled together by the data ring and the control ring so that the network links can be selectively communicatively coupled.
Abstract: A packet switching fabric includes a data ring, a control ring, a plurality of network links each coupled to at least one network node, and a plurality of switching devices coupled together by the data ring and the control ring so that the network links can be selectively communicatively coupled. Each of the switching devices includes: a data ring sub-system for transmitting and receiving bursts of data via data ring channels concurrently active on the data ring; a network interface coupled to the data ring sub-system and having at least one network port for transmitting and receiving data packets to and from one of the network links, the network interface also having a packet buffer for storing the data packets, the packet buffer providing bursts of packet data to the data ring sub-system via a plurality of concurrently active packet buffer channels; and a control ring sub-system coupled to the data ring sub-system and to the network interface and being responsive to control messages received from an adjacent one of the devices via the control ring, and operative to develop and transmit the control messages to an adjacent one of the devices via the control ring, the control messages for reserving bandwidth resources used in setting up and controlling the data ring channels and the packet buffer channels, the control ring sub-system also being operative to perform queuing operations for controlling the transfer of the bursts of packet data from the packet buffer to the data ring sub-system.

74 citations

Patent
09 Dec 2002
TL;DR: In this article, a method and apparatuses are disclosed for handling digital data packets at a logical borderline that separates an untrusted packet-switched information network from a protected domain.
Abstract: A method and apparatuses are disclosed for handling digital data packets at a logical borderline that separates an untrusted packet-switched information network from a protected domain. A packet processor part intercepts a packet that is in transit between the untrusted packet-switched information network and the protected domain. The packet is examined at the packet processor part in order to determine, whether the packet contains digital data that pertains to a certain protocol. If the packet is not found to contain such digital data, it is processed at the packet processor part. If the packet is found to contain digital data that pertains to said certain protocol, it gets redirected to an application gateway part that processes the packet according to a set of processing rules based on obedience to said certain protocol. The packet processor part is a kernel mode process running in a computer device and the application gateway part is a user mode process running in a computer device.

74 citations

Patent
11 Jun 1993
TL;DR: In this paper, a method for measuring and analyzing the burstiness of network traffic based on the ratio of packet interarrival times is proposed, where each data burst includes a stream of data packets for travel over the network.
Abstract: Method, for use with a communications network, for measuring and analyzing the burstiness of network traffic based on the ratio of packet interarrival times. The network traffic includes at least one data burst, and each data burst includes a stream of data packets for travel over the network. The method includes (a) receiving a first data packet of the at least one data burst for travel over the network, the first data packet having an associated first packet interarrival time, and (b) consecutively receiving a second data packet for travel over the network, the second data packet having an associated second packet interarrival time. The method also includes (c) determining the ratio of the second packet interarrival time to the first packet interarrival time and (d) comparing the ratio of the second packet interarrival time and first packet interarrival time to at least one predetermined constant. Lastly, the method includes (e) determining whether the second data packet belongs to the at least one data burst based on the comparison, and (f) accumulating the second data packet with a data burst based on the comparison. A system for carrying out the method is also provided.

73 citations


Network Information
Related Topics (5)
Network packet
159.7K papers, 2.2M citations
88% related
Wireless network
122.5K papers, 2.1M citations
87% related
Wireless
133.4K papers, 1.9M citations
87% related
Wireless sensor network
142K papers, 2.4M citations
85% related
Wireless ad hoc network
49K papers, 1.1M citations
84% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20222
20191
20186
201749
201699
2015159