Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 13

Vignan Institute Of Management & Technology

For Women

Department of AIML
Technical Seminar Topic:Speed Protocol Processors

Name:L.Nagavalli
Roll number:20UP1A6628
Abstract:
The use of Internet becomes increased and the transmission gap become increased so in order to
increase the speed special processors are used here mainly explaining the TRIPOD registers
structure .By using this register we can increase the speed.

The architecture of the TRIPOD has three register files .

The basic mechanism for transmitting information and for the receiver to detect the presence of
any transmission errors. When a transmission error is detected, even if it is only a single bit, then
the complete data block must be discarded. This type of scheme is thus known as best try
transmission or connectionless transmission.
What is a speed protocol processor:

The use of internet become increased and the speed become reduced, and the
transmission gap increased ,so in order to increase the speed special network
processors are used for example TRIPOD register structure is being
implemented here, it consists of three registers the first is used by the IP
header, and the other two are used for loading and storing. The protocol
processing is oblivious and the transparency originates in a simple mechanism
that changes the working of the register file. It uses RF-index register files and
they are numbered identically and they have the same IP address.
The TRIPOD register structure is mainly implemented in RISC processor and
they will have high performance
Protocols:

Protocol is an agreement between user and interface. The basic


mechanism for transmitting information and for the receiver to
detect the presence of any transmission errors. When a
transmission error is detected, even if it is only a single bit, then the
complete data block must be discarded. This type of scheme is
thus known as best try transmission or connectionless
transmission.
Closing the gap:
Network systems have employed embedded processors to offload protocol
processing and computationally expensive operations for more than a decade. In the
past few years, however, the computer industry has been developing specialized
network processors to close the transmission-processing gap in network systems.

Today, network processors are an important class of embedded processors, used all
across the network systems space from personal to local and wide area networks.
They accommodate both the Internet's explosive growth and the proliferation of
network-centric system architectures in environments ranging from embedded
networks for cars and surveillance systems to mobile enterprise and consumer
networks.
Protocol Processing:

The protocol processing is oblivious to register file


management because the register file structure is transparent
to the protocol code. The transparency originates in a simple
mechanism that changes the working of register file.
Memory Management:

The memory system includes all parts of the computer that store
information. It consists of primary and secondary memory. The
primary memory can be referenced one byte at a time, has
relatively fast access time, and is usually volatile. The secondary
memory refers to collection of storage devices. The modern
memory managers automatically transfer information back and
forth between the primary and secondary memory using virtual
memory.
Scheduling:

CPU scheduling refers to the task of managing CPU sharing among a


community of processors. The scheduling policy would be selected by
each system administrator so it reflects the way that particular computer
will be used. Two types of scheduling are preemptive and non-preemptive
scheduling. in preemptive scheduling use the interval timer and scheduler
to interrupt a running process in order to reallocate the CPU to a higher
priority ready process. In non-preemptive scheduling algorithm allow a
process to run to completion once it obtains the processor.
D ia g ra m :
Advantages:

1.Good failure recovery


2.Ability to add networks without disturbing the existing
services
3.High error rate handling
4.Low data overhead
5.No connection establishment and state
6.Platform independency
Disadvantages:

There are two types of disasters that may occur.They are:


1.Data Hazard

2.Control Hazard
Conclusion:

1.Task analysis to find suitable accelerators


2.Evaluation of parellalization schemes
3.Interprocessor communication
4.Devolopement of data path and signalling interfaces
Thank You

You might also like