Abstract. High end routers are targeted at providing worst case through-put guarantees over latency. Caches on the other hand are meant to help latency not throughput in a traditional processor, and provide no addi-tional throughput for a balanced network processor design. This is why most high end routers do not use caches for their data plane algorithms. In this paper we examine how to use a cache for a balanced high band-width network processor. We focus on using a cache not as a latency saving mechanism, but as an energy saving device. We propose using a Computation Reuse Cache that caches the answer to a query for data-plane algorithms, where the tags are the inputs to the query and the block the result of the query. This allows the da...
Routing algorithms are known to be potential bottlenecks for packet processing. Network ow caching c...
The performance gap between processor and memory continues to remain a major performance bottleneck ...
The performance of distributed key-value stores is usually dependent on its underlying network, and ...
Abstract. High end routers are targeted at providing worst case through-put guarantees over latency....
Exponential link bandwidth increase over the past decade has sparked off interest in increasingly co...
Earlier research has shown that the route lookup performance of a network processor can be significa...
Abstract—High performance routers are mostly implemented with network processors because of their so...
Abstract — In this paper, we propose a novel supernode caching scheme to reduce IP lookup latencies ...
Abstract — Conventional routing cache systems store destina-tion IP addresses in their cache directo...
Digest caches have been proposed as an effective method tospeed up packet classification in network ...
Caching mechanism has achieved great success in general purpose processor; however, its deployment i...
Abstract—Many network devices such as routers and firewalls employ caches to take advantage of tempo...
none1noA promising solution in order to cope with the massive request of wireless data traffic cons...
The rapid advances in telecommunication and Internet technologies is the driving force behind the em...
As network traffic continues to increase and with the requirement to process packets at line rates, ...
Routing algorithms are known to be potential bottlenecks for packet processing. Network ow caching c...
The performance gap between processor and memory continues to remain a major performance bottleneck ...
The performance of distributed key-value stores is usually dependent on its underlying network, and ...
Abstract. High end routers are targeted at providing worst case through-put guarantees over latency....
Exponential link bandwidth increase over the past decade has sparked off interest in increasingly co...
Earlier research has shown that the route lookup performance of a network processor can be significa...
Abstract—High performance routers are mostly implemented with network processors because of their so...
Abstract — In this paper, we propose a novel supernode caching scheme to reduce IP lookup latencies ...
Abstract — Conventional routing cache systems store destina-tion IP addresses in their cache directo...
Digest caches have been proposed as an effective method tospeed up packet classification in network ...
Caching mechanism has achieved great success in general purpose processor; however, its deployment i...
Abstract—Many network devices such as routers and firewalls employ caches to take advantage of tempo...
none1noA promising solution in order to cope with the massive request of wireless data traffic cons...
The rapid advances in telecommunication and Internet technologies is the driving force behind the em...
As network traffic continues to increase and with the requirement to process packets at line rates, ...
Routing algorithms are known to be potential bottlenecks for packet processing. Network ow caching c...
The performance gap between processor and memory continues to remain a major performance bottleneck ...
The performance of distributed key-value stores is usually dependent on its underlying network, and ...