Professional Documents
Culture Documents
20UP1A6628
20UP1A6628
For Women
Department of AIML
Technical Seminar Topic:Speed Protocol Processors
Name:L.Nagavalli
Roll number:20UP1A6628
Abstract:
The use of Internet becomes increased and the transmission gap become increased so in order to
increase the speed special processors are used here mainly explaining the TRIPOD registers
structure .By using this register we can increase the speed.
The basic mechanism for transmitting information and for the receiver to detect the presence of
any transmission errors. When a transmission error is detected, even if it is only a single bit, then
the complete data block must be discarded. This type of scheme is thus known as best try
transmission or connectionless transmission.
What is a speed protocol processor:
The use of internet become increased and the speed become reduced, and the
transmission gap increased ,so in order to increase the speed special network
processors are used for example TRIPOD register structure is being
implemented here, it consists of three registers the first is used by the IP
header, and the other two are used for loading and storing. The protocol
processing is oblivious and the transparency originates in a simple mechanism
that changes the working of the register file. It uses RF-index register files and
they are numbered identically and they have the same IP address.
The TRIPOD register structure is mainly implemented in RISC processor and
they will have high performance
Protocols:
Today, network processors are an important class of embedded processors, used all
across the network systems space from personal to local and wide area networks.
They accommodate both the Internet's explosive growth and the proliferation of
network-centric system architectures in environments ranging from embedded
networks for cars and surveillance systems to mobile enterprise and consumer
networks.
Protocol Processing:
The memory system includes all parts of the computer that store
information. It consists of primary and secondary memory. The
primary memory can be referenced one byte at a time, has
relatively fast access time, and is usually volatile. The secondary
memory refers to collection of storage devices. The modern
memory managers automatically transfer information back and
forth between the primary and secondary memory using virtual
memory.
Scheduling:
2.Control Hazard
Conclusion: