The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Dec. 07, 2021

Filed:

Dec. 21, 2017
Applicant:

Advanced Micro Devices, Inc., Sunnyvale, CA (US);

Inventors:

Vydhyanathan Kalyanasundharam, San Jose, CA (US);

Eric Christopher Morton, Austin, TX (US);

Alan Dodson Smith, Austin, TX (US);

Joe G. Cruz, North Grafton, MA (US);

Assignee:

Advanced Micro Devices, Inc., Santa Clara, CA (US);

Attorneys:
Primary Examiner:
Assistant Examiner:
Int. Cl.
CPC ...
H04L 12/751 (2013.01); G06F 13/42 (2006.01); G06F 13/364 (2006.01); H04L 12/933 (2013.01); H04L 12/741 (2013.01); G06F 13/40 (2006.01); G06F 16/901 (2019.01); G06F 16/9038 (2019.01); H04L 29/06 (2006.01); G06F 21/57 (2013.01);
U.S. Cl.
CPC ...
H04L 45/02 (2013.01); G06F 13/364 (2013.01); G06F 13/4022 (2013.01); G06F 13/4282 (2013.01); G06F 16/9024 (2019.01); G06F 16/9038 (2019.01); G06F 21/575 (2013.01); H04L 45/745 (2013.01); H04L 49/15 (2013.01); H04L 63/20 (2013.01); G06F 2213/0016 (2013.01);
Abstract

A system for automatically discovering fabric topology includes at least one or more processing units, one or more memory devices, a security processor, and a communication fabric with an unknown topology coupled to the processing unit(s), memory device(s), and security processor. The security processor queries each component of the fabric to retrieve various attributes associated with the component. The security processor utilizes the retrieved attributes to create a network graph of the topology of the components within the fabric. The security processor generates routing tables from the network graph and programs the routing tables into the fabric components. Then, the fabric components utilize the routing tables to determine how to route incoming packets.


Find Patent Forward Citations

Loading…