Knowledge-based processor


Knowledge-based processor

Knowledge-based processors are used for processing packets in computer networks. Knowledge-based processors are essential for the long term success of the IPv6 [http://www.ipv6.org/ network] . The buildout of the IPv6 network is inevitable as it provides the means to an improved and secure networking system. It has been built from the ground up to address the issues of available addressing and security concerns. [cite web
title =Technology & Structure are Evolving
publisher = Washington Technology
url =http://www.washingtontechnology.com/ad_sup/cp53-homeland/cp53-homeland4.html
accessdate = 2007-09-07
]

Standards

All networks are required to perform the following functions:
# IPv4/IPv6 multilayer packet/flow classification
# Policy-based routing and Policy enforcement (QoS)
# Longest Prefix Match (CIDR)
# Differentiated Services (DiffServ)
# IP Security (IPSec)
# Server Load Balancing
# Transaction verification

All of the above functions must occur at high speeds in advanced networks. Knowledge-based processors contain embedded databases that store information required to process [http://www.comsci.us/datacom/ippacket.html packets] that travelthrough a network at wireline speeds. Knowledge based processors are a new addition to intelligent networking that allow these functions to occur at high speeds and at the same time provide for lower power consumption.

Knowledge-based processors currently target the 3rd layer of the 7 layer OSI model which is devoted to packet processing. Knowledge-based processors may eventually be required at every node in the internet due to the demands placed upon it by the converging voice and video phenomena. Layer 7, where application functionality between browser, email, ftp download,and telnet applications occur, is likely the next layer that could make use of knowledge based processors.

Advantages

The advantages that knowledge based processors offer are the ability to execute multiple simultaneous decision making processes for a range of network-aware processing functions. These include routing, QOS (quality of service), access control for both security and billing, forwarding of voice/video packets. These functions improve the performance of advanced Internet applications in IPv6 networks such as VOD (Video on demand), VoIP (voice over Internet protocol), and streaming of video and audio.

Knowledge-based processors use a variety of techniques to improve network functioning such as parallel processing, deep pipelining and advanced power management techniques. Improvements in each of these areas allows for existing components to carry on their functions at wireline speeds more efficiently thus improving the performance of the overall network.

The databases in a knowledge-based processor include classification tables, forwarding tables, and exact match tables- all of which are utilized by the CPU and network processors. Some companies use a glueless process enabling the quick installation of the knowledge based processor to the network system.

Knowledge based processors mainly process packet headers (20% of the packet approximately) which enables network awareness. Content processors, by contrast, allow for packet payload inspection (80% of the packet is data) and therefore must search "deeper" into the packet.

References


Wikimedia Foundation. 2010.

Look at other dictionaries:

  • Content processor — Content processors are sometimes confused with network processors that inspect the packet payload of an IP packet travelling through a computer network. These components allow for the design and deployment of next generation networking systems… …   Wikipedia

  • Network processor — A network processor is an integrated circuit which has a feature set specifically targeted at the networking application domain. Network processors are typically software programmable devices and would have generic characteristics similar to… …   Wikipedia

  • XBMC — Media Center XBMC Media Center Home Screen Developer(s) …   Wikipedia

  • Folding@home — Original author(s) Vijay Pande Developer(s) Stanford University / Pande lab Initial release 2000 10 01 …   Wikipedia

  • artificial intelligence — the capacity of a computer to perform operations analogous to learning and decision making in humans, as by an expert system, a program for CAD or CAM, or a program for the perception and recognition of shapes in computer vision systems. Abbr.:… …   Universalium

  • ARM architecture — This article is about a computer processor architecture. For other uses, see ARM (disambiguation). Logo ARM Designer ARM Holdings Bits …   Wikipedia

  • Watson (computer) — IBM Watson redirects here. For the laboratory, see Thomas J. Watson Research Center. Watson s avatar, inspired by the IBM smarter planet logo[1] Watson is an artificial intelligence computer system capable of answering questions posed in …   Wikipedia

  • Strategic management — is a field that deals with the major intended and emergent initiatives taken by general managers on behalf of owners, involving utilization of resources, to enhance the performance of firms in their external environments.[1] It entails specifying… …   Wikipedia

  • Common Lisp — Paradigm(s) Multi paradigm: procedural, functional, object oriented, meta, reflective, generic Appeared in 1984, 1994 for ANSI Common Lisp Developer ANSI X3J13 committee Typing discipline …   Wikipedia

  • Two-factor authentication — (TFA, T FA or 2FA) is an approach to authentication which requires the presentation of two different kinds of evidence that someone is who they say they are. It is a part of the broader family of multi factor authentication, which is a defense in …   Wikipedia


Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”

We are using cookies for the best presentation of our site. Continuing to use this site, you agree with this.