Efficient Checksum Calculation using Reduction Trees
نویسندگان
چکیده
As network traffic throughput requirements continue to increase dramatically, network processors are adding specialized instructions that accelerate the more common arithmetic operations. An example is the checksum, which appears in several popular protocols to guard against using corrupted packets. This paper presents two approaches to checksum calculation that provide significant performance improvement over conventional methods. These approaches use reduction trees similar to those found in parallel multipliers to produce two operands for final summation. Reduction trees are appropriate when an array of words is available to be summed at one time, in contrast to serial summing of word pairs. The two methods vary in the design of the reduction tree. The first approach, leveled reduction based checksumming, uses predefined array sizes of partial sums, leading to a single circuit design. This approach has the benefit of fixed, design-once circuit parameters. The second approach, 3-to-2 reduction based checksumming, takes a greedy approach to reducing as many application words as possible at each stage. This approach has the benefit of parameterized circuit design amenable to automatic generation of reduction stages to fit application array size. Both approaches are suitable for a variety of circuit implementations.
منابع مشابه
Improving the Efficiency of the ISO Checksum Calculation
In this paper we describe techniques for efficient calculation of the ISO checksum which, to our knowledge, are not discussed in current literature. We propose that future versions of the ISO protocols employ checksums computed using logical "bytes" twice as large as the actual ones. Measurements are presented comparing times required to calculate the XNSt, IP, and ISO checksums with and withou...
متن کاملError Detection Control System based on CheckSum using Orthogonal Systems of SAC functions
In this paper a new approach for increasing the efficiency of checksum error detection is proposed. In order to decrease the probability of undetected errors, it is suggested to use Avalanche transformation of codes before the checksum calculation. Analytical estimations of undetected error probabilities are presented. Comparative analysis indicated high effectiveness of the suggested approach....
متن کاملLatency Analysis of TCP on an ATM Network
In this paper we characterize the latency of the BSD 4.4 alpha implementation of TCP on an ATM network. Latency reduction is a difficult task, and careful analysis is the first step towards reduction. We investigate the impact of both the network controller and the protocol implementation on latency. We find that a low latency network controller has a significant impact on the overall latency o...
متن کاملIncremental updating of the Internet checksum
While the equation above is correct, it is not very useful for incremental updates since the equation above updates the checksum C, rather than the 1’s complement of the checksum, ̃C, which is the value stored in the checksum field. In addition, it suffers because the notation does not clearly specify that all arithmetic, including the unary negation, must be performed one’s complement, and so i...
متن کاملHierarchical Online Intrusion Detection for SCADA Networks
We propose a novel hierarchical online intrusion detection system (HOIDS) for supervisory control and data acquisition (SCADA) networks based on machine learning algorithms. By utilizing the server-client topology while keeping clients distributed for global protection, high detection rate is achieved with minimum network impact. We implement accurate models of normal-abnormal binary detection ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1992