$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Insertion of network data checksums by a network adapter 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-013/12
  • G06F-013/14
출원번호 US-0891505 (1992-05-29)
발명자 / 주소
  • Thompson Michael I. (Rocklin CA) Congdon Paul T. (Sacramento CA) Burnett John L. (Cupertino CA) Fiduccia
  • deceased Frank (late of Cupertino CA by Julie W. Wu
  • Rachel E. Fiduccia
  • heirs)
출원인 / 주소
  • Hewlett-Packard Company (Palo Alto CA 02)
인용정보 피인용 횟수 : 67  인용 특허 : 0

초록

A system implements checksumming of a network packet to be sent over a network. A processor constructs the network packet within a main memory. The network packet is transferred from the main memory to a packet storage memory within a network adapter. During the transfer, the network adapter calcula

대표청구항

In a computing system connected to a network, the computing system including a processor, a main memory and a network adapter coupled to the processor and the main memory, a method for implementing checksumming of a network packet sent over the network, the method comprising the steps of: (a) constr

이 특허를 인용한 특허 (67)

  1. Suzuki, Motoharu, Apparatus and method for calculating and storing checksums based on communication protocol.
  2. Bennett Toby D. ; Davis Donald J. ; Harris Jonathan C. ; Miller Ian D., Apparatus and method for constructing data for transmission within a reliable communication protocol by performing portions of the protocol suite concurrently.
  3. Basso, Claude; Calvignac, Jean Louis; Chang, Chih-Jen; Damon, Philippe; Fuhs, Ronald Edward; Vaidhyanathan, Natarajan; Verplanken, Fabrice Jean; Verrilli, Colin Beaton; Willenborg, Scott Michael, Apparatus for blind checksum and correction for network transmissions.
  4. Basso, Claude; Calvignac, Jean Louis; Chang, Chih-Jen; Damon, Philippe; Vaidhyanathan, Natarajan; Verplanken, Fabrice Jean; Verrilli, Colin Beaton, Configurable ports for a host ethernet adapter.
  5. Basso, Claude; Calvignac, Jean Louis; Chang, Chih-jen; Damon, Philippe; Vaidhyanathan, Natarajan; Verplanken, Fabrice Jean; Verrilli, Colin B., Configurable ports for a host ethernet adapter.
  6. Chu Hsiao-keng J., Cross-domain data transfer using deferred page remapping.
  7. Chu Hsiao-keng J., Cross-domain data transfer using deferred page remapping.
  8. Ni, Shih-Hsiung, Data path optimization algorithm.
  9. Odenwald ; Jr. Louis H., Data transfer method and apparatus that allocate storage based upon a received relative offset.
  10. Roesch, Martin Frederick; Novak, Judy Hollis; Sturges, Steven, Device, system and method for analysis of segments in a transmission control protocol (TCP) session.
  11. Sturges, Steven; Novak, Judy Hollis, Device, system and method for timestamp analysis of segments in a transmission control protocol (TCP) session.
  12. O'Gorman, Robert; Hiller, Dean; Drummond, Mark C., Enhanced claw packing protocol.
  13. Kidd Jeffrey W. ; Jennings William E., Ensuring accurate data checksum.
  14. Dowling Brian M. ; Warling Christian J. ; Wendt James G., Hardware checksum assist for network protocol stacks.
  15. Arimilli, Ravi Kumar; Basso, Claude; Calvignac, Jean Louis; Chang, Chih Jen; Damon, Philippe; Fuhs, Ronald Edward; Sharma, Satya Prakash; Vaidhyanathan, Natarajan; Verplanken, Fabrice Jean; Verrilli, Colin Beaton; Willenborg, Scott Michael, Host Ethernet adapter for networking offload in server environment.
  16. Melzer Clifford B. ; Rosen Jonathan ; O'Gorman Robert ; Wood Paul A. ; Drummond Mark C. ; Hiller Dean, IP checksum offload.
  17. Aggarwal Vijay K. ; Young Christopher R. ; Shah Himanshu C., Internet and related networks, a method of and system for substitute use of checksum field space in information processing datagram headers for obviating processing speed and addressing space limitat.
  18. Gustafson, Eric; Rittermann, Brian P., Intrusion event correlation with network discovery information.
  19. Greene, Spencer, Measuring network traffic based on predicted amount of padding.
  20. Ziai, Syrus; Jordan, Paul; Robson, Craig; Donohue, Ryan; Pong, Fong, Method and apparatus for calculating TCP and UDP checksums while preserving CPU resources.
  21. Slane Albert Alfonse, Method and apparatus for checksum verification with receive packet processing.
  22. Rosen Jonathan ; Hiller Dean ; O'Gorman Robert ; Drummond Mark C., Method and apparatus for dynamic link name negotiation.
  23. Labatte, Timothy E. W., Method and apparatus for offloading checksum.
  24. Basso, Claude; Calvignac, Jean Louis; Chang, Chih Jen; Damon, Philippe; Vaidhyanathan, Natarajan; Verplanken, Fabrice Jean; Verrilli, Colin Beaton, Method and apparatus for providing a network connection table.
  25. Brown, Deanna Lynn Quigg; Jain, Vinit; De Leon, III, Baltazar; Lucke, Kyle Alan, Method and apparatus for supporting checksum offload in partitioned data processing systems.
  26. Zak,Robert C.; Jackson,Christopher J., Method and device for off-loading message digest calculations.
  27. Finn Gregory G. ; Hotz Steven M. ; Rogers Craig M., Method and network interface logic for providing embedded checksums.
  28. Lorrain, Jean; Thubert, Pascal, Method and system for improving high speed internetwork data transfers.
  29. Basso,Claude; Calvignac,Jean Louis; Chang,Chih jen; Damon,Philippe; Fuhs,Ronald Edward; Vaidhyanathan,Natarajan; Verplanken,Fabrice Jean; Verrilli,Colin Beaton; Willenborg,Scott Michael, Method for performing a packet header lookup.
  30. Basso,Claude; Calvignac,Jean Louis; Chang,Chih jen; Damon,Philippe; Vaidhyanathan,Natarajan; Verplanken,Fabrice Jean; Verrilli,Colin Beaton, Method for reducing latency in a host ethernet adapter (HEA).
  31. Ree,Bradley Richard; Basil,Robert P.; Mai,Khanh; Pruitt,Donald, Method using receive and transmit protocol aware logic modules for confirming checksum values stored in network packet.
  32. Madukkarumukumana,Rajesh S.; Ni,Jie, Method, apparatus, system, and article of manufacture for processing control data by an offload adapter.
  33. Adiga, Narasimha Ramakrishna, Methods and arrangements for partial word stores in networking adapters.
  34. Norton, Marc A.; Roelker, Daniel J., Methods and systems for multi-pattern searching.
  35. Norton, Marc A.; Roelker, Daniel J., Methods and systems for multi-pattern searching.
  36. Nguyen,Tung; Pong,Fong; Jordan,Paul; Ziai,Syrus; Chang,Al; Grohoski,Greg, Methods and systems for processing network data.
  37. Basso, Claude; Calvignac, Jean Louis; Chang, Chih-jen; Damon, Philippe; Fuhs, Ronald Edward; Vaidhyanathan, Natarajan; Verplanken, Fabrice Jean; Verrilli, Colin Beaton; Willenborg, Scott Michael; Lucke, Kyle A.; Kiel, Harvey G., Network communications for operating system partitions.
  38. Beverly,Harlan T., One's complement pipelined checksum.
  39. Rosen Jonathan ; Hiller Dean ; O'Gorman Robert ; Drummond Mark C., Option request protocol.
  40. Rosen, Jonathan; Hiller, Dean; O'Gorman, Robert; Drummond, Mark C., Option request protocol.
  41. Fukumoto Keisuke,JPX ; Yamashita Mikiharu,JPX, Packet error detecting device in a DMA transfer.
  42. Reddin Timothy G. (Stockport GB3) Walsh David S. (Rossendale GB3) Round Jeremy S. (Warrington GB3), Parallel computer having MAC-relay layer snooped transport header to determine if a message should be routed directly to.
  43. Rittermann, Brian, Real-time user awareness for a computer network.
  44. Sturges, Steven; Norton, Marc, Speed and memory optimization of intrusion detection system (IDS) and intrusion prevention system (IPS) rule processing.
  45. Polley, Jonathan; Vogel, III, William Andrew, System and method for assigning network blocks to sensors.
  46. Polley, Jonathan; Vogel, III, William Andrew, System and method for assigning network blocks to sensors.
  47. Basso, Claude; Calvignac, Jean Louis; Chang, Chih jen; Damon, Philippe; Fuhs, Ronald Edward; Vaidhyanathan, Natarajan; Verplanken, Fabrice Jean; Verrilli, Colin Beaton; Willenborg, Scott Michael, System and method for computing a blind checksum in a host ethernet adapter (HEA).
  48. Huang Shay-Jan, System and method for computing and encoding error detection sequences.
  49. Olney, Matthew; Mullen, Patrick; Grenier, Lurene; Houghton, Nigel; Pentney, Ryan, System and method for near-real time network attack detection, and system and method for unified detection via detection routing.
  50. Basso, Claude; Calvignac, Jean Louis; Chang, Chih-Jen; Damon, Philippe; Vaidhyanathan, Natarajan; Verplanken, Fabrice Jean; Verrilli, Colin Beaton, System and method for parsing, filtering, and computing the checksum in a host Ethernet adapter (HEA).
  51. Roesch, Martin Frederick, System and method for real time data awareness.
  52. Roesch, Martin Frederick, System and method for real time data awareness.
  53. Roesch, Martin Frederick, System and method for real time data awareness.
  54. Vogel, III, William Andrew; Baker, Andrew, System and method for resolving operating system or service identity conflicts.
  55. Toby D. Bennett ; Donald J. Davis ; Jonathan C. Harris ; Ian D. Miller, System for transmitting and receiving data within a reliable communications protocol by concurrently processing portions of the protocol suite.
  56. Roesch, Martin; Dempster, Ronald A.; Novak, Judy, Systems and methods for determining characteristics of a network.
  57. Roesch, Martin; Vogel, III, William Andrew; Watchinski, Matt, Systems and methods for determining characteristics of a network and analyzing vulnerabilities.
  58. Roesch, Martin; Dempster, Ronald A.; Baker, Andrew; Gustafson, Eric, Systems and methods for determining characteristics of a network and enforcing policy.
  59. Roesch, Martin; Dempster, Ronald A., Systems and methods for determining characteristics of a network based on flow analysis.
  60. Roesch, Martin; Dempster, Ronald A., Systems and methods for identifying the services of a network.
  61. Venkatramani, Anjan, Systems and methods for implementing end-to-end checksum.
  62. Venkatramani,Anjan, Systems and methods for implementing end-to-end checksum.
  63. Vogel, III, William A.; Bruzek, Dina L., Systems and methods for modifying network map attributes.
  64. Vogel, III, William Andrew; Bruzek, Dina L., Systems and methods for modifying network map attributes.
  65. Wease, Kenneth Todd, Target-based SMB and DCE/RPC processing for an intrusion detection system or intrusion prevention system.
  66. Wease, Kenneth Todd, Target-based SMB and DCE/RPC processing for an intrusion detection system or intrusion prevention system.
  67. Wease, Kenneth Todd, Target-based SMB and DCE/RPC processing for an intrusion detection system or intrusion prevention system.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로