Academia.eduAcademia.edu

Network Processor

description1,099 papers
group50 followers
lightbulbAbout this topic
A network processor is a specialized microprocessor designed to manage and process network data packets at high speeds. It integrates multiple processing cores and hardware accelerators to perform tasks such as packet classification, routing, and traffic management, enabling efficient handling of network traffic in telecommunications and data center environments.
lightbulbAbout this topic
A network processor is a specialized microprocessor designed to manage and process network data packets at high speeds. It integrates multiple processing cores and hardware accelerators to perform tasks such as packet classification, routing, and traffic management, enabling efficient handling of network traffic in telecommunications and data center environments.
Network verification to detect router configuration errors typically requires an explicit correctness specification. Unfortunately, specifications often either do not exist, are incomplete, or are written informally in English. We... more
Network verification to detect router configuration errors typically requires an explicit correctness specification. Unfortunately, specifications often either do not exist, are incomplete, or are written informally in English. We... more
with the growth of Internet traffic and using Gb/s or 10 Gb/s links in backbone, the speed of forwarding packets in intermediate devices is crucial. Routers must be able to forward millions of packets per second on each of their... more
Regular expressions provide a flexible means for matching strings and they are often used in dataintensive applications. They are formally equivalent to either deterministic finite automata (DFAs) or nondeterministic finite automata... more
The battle between traffic demand and resource availability limits the efficiency of the existing cellular network. To overcome these limitations, the 5G needs to be scalable and flexible to allow multiple radio access technology. The... more
In this paper we present result f rom an app lication integrated congestion control mechanism designed for time-sensitive traffic based on the principle of direct protocol i nteractivity. In contrast t o classical t ransport protocols we... more
Applications requiring high-speed TCP/IP processing can easily saturate a modern server. We and others have previously suggested alleviating this problem in multiprocessor environments by dedicating a subset of the processors to perform... more
The ETA project at Intel Research and Development has developed a software prototype that uses one of the Intel® Xeon TM processors in a multi-processor server as a packet processing engine. The prototype is used as a vehicle for... more
Abstract—Multiple core processors have already became the dominant design for general purpose CPUs. Incarnations of this technology are present in solutions dedicated to such areas like computer graphics, signal processing and also... more
Contemporary data centers implement hybrid storage systems that consist of layers from solid-state drives (SSDs) and hard disk drives (HDDs). Due to their high data retrieval speed, SSDs layer is used to store important data blocks that... more
The High-Level Architecture (HLA) standard developed by the Department of Defense in the United States is a key technology to perform distributed simulation. Inside the HLA framework, many different simulators (termed federates) may be... more
Efficient management of concurrent access to shared resources is crucial in modern multi-threaded systems to avoid race conditions and performance bottlenecks. Traditional locking mechanisms, such as standard read-write locks, often... more
Managing peer-to-peer traffic is a major challenge for network administrators, because peer-to-peer applications tend to use dynamic port numbers and proprietary protocols. In view of this problem, we propose an approach that combines the... more
Software-based network packet processing on standard high volume servers promises better flexibility, manageability and scalability, thus gaining tremendous momentum in recent years. Numerous research efforts have focused on boosting... more
Software-based network packet processing on standard high volume servers promises better flexibility, manageability and scalability, thus gaining tremendous momentum in recent years. Numerous research efforts have focused on boosting... more
In this paper, we present a relatively primitive execution model for fine-grain parallelism, in which all synchronization, scheduling, and storage management is explicit and under compiler control. This is defined by a threaded abstract... more
The Ethernet speed has increased sending and receiving frames from 40 to 100 Gbps after the IEEE P802.3ba released. The industry and academia have focused scaling up the TCP/IP protocol processing for 40-100 Gbps. LSO is a de facto... more
Today major challenges are faced by server platforms while processing TCP/IP or UDP/IP. For instance, the speed of networks now exceeds the gigabit per sec Gbps, the design and implementations of high-performance Network Interfaces (NI)... more
2010-current-andfuture-challenges/the-memory-game-creating-reactive-interruptible-turn-taking-human-robot-interaction-forasimo
The design of a new high-performance computing platform to model biological neural networks requires scalable, layered communications in both hardware and software. SpiNNaker's hardware is based upon Multi-Processor System-on-Chips... more
Modern Network Intrusion Detection Systems (NIDS) inspect the network packet payload to check if it conforms to the security policies of the given network. This process, of-ten referred to as deep packet inspection, involves detection of... more
With significant advances in network interfaces, I/O bus, and processor architecture of end node, innovative approaches are required to achieve high network bandwidth by fully utilizing available system resources. The issues related can... more
The design of high performance application-specific processors is the bottleneck in many applications. In critical high data rate network devices such as modems and other end-user interfaces, the packet forwarding engine requires both... more
Data: 24 de febrer de 2006 Actualment, els serveis òptics són essencialment estàtics, en els que els usuaris sol•liciten als proveïdors o ISPs l'ample de banda que necessiten Durant un cer període de temps. Aquest serveis s'aprovisionen... more
In the Internet of things (IoT), network devices and mobile systems should exchange a considerable amount of data with negligible delays. For this purpose, the community has used the software-defined networking (SDN), which has provided... more
Modern network processors employs parallel processing engines (PEs) to keep up with explosive internet packet processing demands. Most network processors further allow processing engines to be organized in a pipelined fashion to enable... more
Network Processors (NPs) are emerging as a cost effective network element technology that can he more readily updated and evolved than custom hardware or ASIC-based designs. Moreover, NPs promise support for run-time reconfiguration of... more
Network Processors (NPs) are set to play a key role in the next generation of networking technology. They have the performance of ASIC-based routers whilst offering a high degree of programmability. However, the programmability potential... more
Some of the costs associated with system virtualization using a virtual machine monitor (VMM) or hypervisor (HV) can be attributed to the need to virtualize peripheral devices and to then manage the virtualized resources for large numbers... more
It monitors the network traffic to detect any unwanted attempts to compromise the security of the network by malicious users. Recently an Intrusion Prevention functionality was also added to it. IPS monitors network traffic inline and... more
Our work addresses protection of hardware IP at the mask level with the goal of preventing unauthorized manufacturing. The proposed protocol based on chip locking and activation is applicable to a broad category of electronic systems with... more
While general-purpose processors have only recently employed chip multiprocessor (CMP) architectures, network processors (NPs) have used heterogeneous multi-core architectures since the late 1990s. NPs differ qualitatively from... more
Network management tools must be able to monitor and analyze traffic flowing through network systems. According to the OpenFlow protocol applied in Software-Defined Networking (SDN), packets are classified into flows that are searched in... more
– The paper reports the tests conducted on a dedicated Transducer Independent Interface (TII) to check its compliance with standard IEEE 1451.2 specifications. The interface was built using a synchronous data transfer based on the Serial... more
Eq hash tables, which support arbitrary objects as keys, distinguish keys via pointer comparison and often employ hash functions that utilize the address of the object. When compacting garbage collectors move garbage collected objects,... more
Eq hash tables, which support arbitrary objects as keys, distinguish keys via pointer comparison and often employ hash functions that utilize the address of the object. When compacting garbage collec- tors move garbage collected objects,... more
Increasing on-chip wire delay along with the distributed nature of processing elements, makes instruction scheduling for tiled dataflow architectures very crucial. Our analysis reveals that careful placement of most frequently executed... more
All rights reserved by www.ijsrd.com 535 FPGA to PC Ethernet Communication using Media Independent Interface (MII) Mode Preeti Kumari Sidharth Kashyap Ajit Jain Lokesh Sharma Department of Electronics Engineering CDAC Noida, GGSIPU Delhi... more
Due to the significant growth of link speeds, amount of data that should be stored on router line cards are rapidly increasing. Therefore, a large number of memory modules are required for packet storage. In addition, a high performance... more
This research investigates the feasibility of developing low-cost, personal computer-based parallel processing procedures that can be applicable to real time simulation of freeway flows. Specific objectives include, * Development of a... more
The greatest threats against computer systems around the world come from the cyberspace in the form of cyber-attacks and the zero-day attack is one of such threats faced by computer systems around the world. A vulnerability in system... more
Cellular Neural Networks (CNN 1) can be embodied in the form of a focal-plane image processor. They represent a computing paradigm with evident advantages in terms of energy and resources. Their operation relies in the strong... more
The need for network processors capable of forwarding IP packets at OC-192 and higher data rates has been well established. At the same time, there is a growing need for complex tasks, like packet classification and differentiated... more
Download research papers for free!