Current Status of Network Processors

نویسندگان

  • Neha Jain
  • Manoj Kumar Jain
چکیده

Number of internet users is increasing day by day. Demands for new application are also increasing. It is possible to create a network processor based on user’s demands. This paper shows some details about softwares which help in writing code for NPs. Some brief information about NPs is also shown in this paper, which is currently in market.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Effectiveness of Cassava Women Processors in Value Addition Technologies in Abia State, Nigeria

This study analyzed the effectiveness of cassava women processors in value addition technologies in Abia State, Nigeria. Purposive and simple random sampling techniques were used to select ninety (90) women. Data for the study were collected through a structured questionnaire and analyzed with descriptive statistics such as: frequency, mean scores and percentages and inferential statistics (Tob...

متن کامل

A novel sleep/wakeup power management in wireless sensor network: A Fuzzy TOPSIS approach

The wireless sensor network (WSN) is typically comprised many tiny nodes equipped with processors, sender/receiver antenna and limited battery in which it is impossible or not economic to recharge. Meanwhile, network lifespan is one of the most critical issues because of limited and not renewal used battery in WSN. Several mechanisms have been proposed to prolong network lifespan such as LEACH,...

متن کامل

A novel sleep/wakeup power management in wireless sensor network: A Fuzzy TOPSIS approach

The wireless sensor network (WSN) is typically comprised many tiny nodes equipped with processors, sender/receiver antenna and limited battery in which it is impossible or not economic to recharge. Meanwhile, network lifespan is one of the most critical issues because of limited and not renewal used battery in WSN. Several mechanisms have been proposed to prolong network lifespan such as LEACH,...

متن کامل

New High Secure Network Steganography Method Based on Packet Length

In network steganography methods based on packet length, the length of the packets is used as a carrier for exchanging secret messages. Existing methods in this area are vulnerable against detections due to abnormal network traffic behaviors. The main goal of this paper is to propose a method which has great resistance to network traffic detections. In the first proposed method, the sender embe...

متن کامل

Network Processors: Issues and Prospectives

In this paper, we first discuss the need for network processors. Consequently, relying on a “program to program” communications model, we briefly describe the functions that are found in the seven OSI layers and classify them using functional requirement criteria for a network processor. Subsequently, we summarize the current state of the art commercially developed network processors. Based on ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014