.

Thursday, April 4, 2019

Packet Classification: Problem and Resolution

mail boat categorization Problem and ResolutionINTRODUCTIONThis chapter covers the introduction to softwargon program compartmentalisation. Problems for megabucks classification, objectives to overcome the problem involved in big m onenessy classification, motivation to do the project on portion classification and in addition the organization of the project.The breeding of the internet grows for every year, because of the easy access of the internet. The gain of the internet sack up be obtained done the smartphones, netbooks, nonebooks. For touch on the pack jump ons, ne dickensrk processor is apply, and it forget carry taboo the tasks as to convert the piles into fragments, reassembling these fragments, forwarding, encryption and shargon classification. collectible to increased line rates, pressing is increased on line rates and it in turn pressure on nedeucerk processor. The pressure bear be relieved in two flairsBy inserting to a greater extent processing core s and it increases power consumption.Increasing the quantify speed, still it creates herculeany due to the physical bound in the silicon.So that it keister be relieved in two different ways break in the clock gating, which reduces the power consumption.Insert the buffer, to line the pipelining and it also increases the speed.1.1PROBLEM DEFINITIONNet pull in processors are get more strain, due to more use of internet and the strain needs to be reduce.To give the bail for the network software programs.To minimize the power required for packet classification.To achieve juicy speed and also high throughput for packet classification.1.2OBJECTIVESUnderstood the concept of hypercut algorithm for packet classification and also analyzed the flow map for packet classification.Understood the verilog code and Xilinx tool.Wrote the verilog code for hypercut algorithm.The simulation results for hypercut algorithm is affirm in Xilinx tool.Clock gating circumference is inserted in the architecture of the classifier, it reduces the power consumption.Pipelining concept is use in proposed architecture of the classifier and the simulation results are verified in Xilinx.1.3MOTIVATIONThe network traffic is doubling for each six to nine months. Also tralatitiousistic algorithms are not supporting the increasing network traffic on core and edge devices. huge descend of overtopsets Due to increased access of the network, the more run need to be implement in network device, so that more egress of rules are needed. It creates the difficulty for classifying the packets.Flexibility Traditional algorithms are curiously designed for IPV4, so that novel solutions are required to manage both(prenominal) IPV4 and IPV6 solicites.Scalability As the network services are increasing, there is requirement to add or delete the rules. So that, good scalability is required for packet classification.1.4Organization of the thesisThe thesis contains 6 chaptersChapter 1, it testamen t covers the introduction of packet classification, problems involved in packet classification, objective to the packet classification and motivation for choosing the packet classification.Chapter 2, it will covers the basics of existing packet classification and also the basics of proposed packet classification.Chapter 3, it will covers the method apply to do the packet classification, proposed architecture and also it tells how proposed architecture is better compared to previous algorithms.Chapter 4, it discusses the simulation the simulation results obtained for existing and proposed architecture of the classifier.Chapter 5, it covers the conclusion and future compass of the project.Chapter 6, It lists the reference papers used for literature round off of the packet classification.Chapter 2BASICSIt covers the basics of packet classification. It also explains the bodily structure of packet heading, brief introduction to internet, the mode of information transmission through t he internet, OSI beds, the law check of matching, software and hardware implementation of packet classification , Clock gating and pipelining are also discussed. It also covers the review of different packet classification algorithms, by reading this the user grass select the algorithm, which is best suit for his application.The internet is a global system. It is consists of inter attached computer networks, which uses the protocols(TCP/IP), to match several billion devices in all over the world. It is also termed as networks of network. Access of internet is a process of connecting mobile devices, computers and computer terminals to the internet. meshwork access will enables the users to access the internet services much(prenominal) as email and world b passage(a) web. Using various technologies, internet service forgetrs will access the internet. A packet is a formatted building block of information, which is carried by the packet switched network. By formatting of the info, the bandwidth of communication medium can be increased. The structure of the packet contains the two varieties of dataControl informationUser data2.1Control informationThis will provide the information, on where to send the data. Example, It provides the source and destination IP portion outes, sequencing information and error codes. number 2.1 shows the structure of the packetFig 2.1 structure of the packet2.2PayloadThe maximum coat of the packet is 64 K bytes. The payload of the packet is variable. Example IPV4 typically adds the 20 bytes of payload to every packet. The packet is passed through the network utilize leash devices such(prenominal) as hub, switch and router.2.3The modes of information transmission through the internet2.3.1HubHub is a primordial device, for which all separate devices are connected. It is called the star system. It is very simple, when any device sends the data, it will send the data to all other devices and all other devices needs to deci de whether the data is be to them, if it is not be to them, they will ignore it. It will bounty in physical point. Fig 2.3.1 shows the structure of the hub..Fig 2.3.1 shows the structure of the hub2.3.2SwitchThe switch is smarter compared to hub. First it creates the table, which records the IP/MAC calculatees of the devices(PCs) connected together. At the start, when any device sends the data, that duration switch will not be knowing the destination IP addresses. So it will forwards the packets to all other devices, which are connected to it and it also records the IP address of the device. Next when packet belonging to those destination IP addresses comes, it will directly forward the packets to destination devices It is present in data tie beam degree of OSI layer. Fig 2.3.2 shows the structure of the switch.2.3.3RouterIt is the smartest device compared to hub and switch. The router will record the address of all the devices which are connected to it. The router will rea d the information present in packet header and it will decide , where the packet needs to be sent and how to process the packet. It provides the security. musical composition in hub, switch the destination IP address is known, hacker may hack the destination device, it will consider both destination and source IP address of the devices and it will decide whether the source device is hacker or not. If it is hacker, it will deny the packet. Fig 2.3.3 shows the structure of router.Fig 2.3.3 shows the structure of router.2.4 OSI LAYERSIt consist of seven layerApplication layerPresentation layerSession layerTransport layerNetwork layerData wed layer tangible layerThe Fig 2.4 for OSI assume is shown below asFig 2.4 OSI layersApplication layer This layer will provide the interface to application programmes.Presentation layerIn this layer , it converts the data from system particularised format to the format which is suitable for application.It also provides encryption and compression.S ession layerWhich facilitates the starting, managing and ending of connection among the two nodes.Ex For a video session, it will synchronize the related stream of data such as audio and video.Transport layerIt will break the data into segmentsIt will decide or so how much information can be sent to email server and how much information can be received back.The responsibility of transport layer areReliabilityFlow charter atomisationNetwork layerHere the segments are broken into packets by adding the source and destination IP address to them.Next the packets are sent to data link layer. Here router is working in this layer.Data link layerIn this layer, the packets are broken into the frames, which are created for the specific network.The frames are assigned the address of two nodes, the data is moving in betwixt.Physical layerThe frames given by the data link layer are converted into bits in physical medium.UDP User datagram protocolIt is light weight and connection little.Advan tagesThe packet size is small.UDP header- 8 bytesTCP header- 20 bytes there is no requirement to create and maintain the connection.It has more laterality over the dataDisadvantagesIt does not provide error recovery.It does not compensate for lost data packets.Packets can arrive at out of order, so that data loses meaning.There is no control of congestion.Transmission control ProtocolIt is reliable and connection based.AdvantagesIt delivers the credits.It provides retransmission.It provides in order delivery.It will delays the transmission when the network is busy.It provides error recovery.DisadvantagesIt has larger header.It doesnt always get sent out quickly. It is the side effect of congestion.It has bigger overhead.UDP is message orientedIt sends the data in distinct chunks.Ex Email.For multimedia applications, UDP is used, because of these reasons asIt has less overhead.Data loss can be masked.UDP is used in small transmission.It is also used in bandwidth intensive applicati ons, that tolerate packet loss.TCP is stream orientedIt can be used in continuous flow of data.Ex Phone conversation.For text communication, TCP is better.Ex File transfers, Remote access.TCP is used when delivery acknowledgement are needed.In physical layer, information is transmitted in bit stream using hub. In data link layer information is transmitted in frames using switches. In network layer information is transmitted in packets using router. A router is a device that forwards the packet. A router is connected betwixt two networks namely LANs or WANs. network processors are specialised CPU, which is optimized to support the implementation of network protocols at maximum speed. The function of network processor is to carry out the tasks such as packet separation, reassembly, encryption and classification. Packet classification is the process of categorizing the packets into flows in internet router. Packet will be classified in network layer. Packet has five fields as shown in figSource IP address It indicates the IP address of the sender .Destination IP address It indicates the IP address of the destination.Source port It indicates the port number of sender.Destination port It indicates the port number of destination.Protocol Which specifies the type of transport packet creation carried.The incoming packet to router will matches the specific rule if the distinct field in the packet will match agree field in the rule. There are common chord matchesExact match The determine present in rule field header are same as the values present in packet header.Prefix match The values of rule field header are prefix for header fields of the packet.Range match The packet header field values must be lie in the range which is specified by the rule.2.5The types of packet classification algorithmsPacket classification algorithm can be implemented in two major typesSoftware basedHardware based2.5.1Software ImplementationThis can be used with general purpose processor a nd network processor. The software based algorithm can be split into two types as scope dependent AlgorithmField independent AlgorithmField unaffiliated Algorithm For each field in the rule, these algorithms will build the index table separately.Ex RFCField dependent Algorithm In these algorithm, the fields of the rule will be matched in dependent mood and there is no need to group the result in final stage. The memory requirement for these algorithms is less than field independent algorithms.Ex Hypercut, Hicut2.5.2Hardware based implementationThis is used with ASIC or with FPGA. This implementation is used with internet routers for the high speed that supports to handle the packet.The reasons to use software implementationProgrammability ASIC architectures has small Programming capacity, Because ASICs open special design.Special chips To accelerate the packet processing speed, special chips called TCAMS are used.The proposed algorithm uses clock gating lap covering to reduce p ower consumption and pipelining to increase the speed.2.6Clock gatingClock gating is a technique, which is used in concurrent circuits to minimize the power consumption. This technique is used to prune the clock, it disables the port of the circuitary, so that flip flops present in the circuitry will not switch the states. When switching is absent, the dynamic power consumption is reduced, entirely the leakage currents are present. Clock gating works by taking the enable signal of the circuitry, so that flip flops or devices present in latches will not switch the states, so that switching power reduces. So it is necessary to fork over enable conditions in order to get benefit from clock gating. The clock gating saves the power. Clock gating can be added in two waysBy writing the RTL code, the synthesis tool automatically translates the RTL code into clock gating logic.In order to gate the clock of specific modules or registers manually clock gating circuit can be inserted by ins tantiating library the specific ICG cells.Using automated the clock gating tools, clock gating is inserted in articulated lorry automatic fashion. These tools will insert ICG cells to RTL code or directly add the enable conditions to RTL code.2.7PipeliningIt is group of data processing elements, which are connected in serial publication, so that output of one element is the input to following(a) element. We build a pipeline by dividing the complex operation into simple operation. Here instead of taking bulk thing and executing it, the bulk thing is break up into smaller pieces and process it one after another.For example Consider a calculation c= log(a+b), which consist of three operations, which are shown in fig 2.7.Fig 2.7 Pipelining exampleAdd a and b to get a+b, it takes 40ns.Take the magnitude, we get as a+b, it takes 35 ns.Take the log we get as log(a+b), it takes 60ns.Consider a situation when we need to carry out for 100 such pairs. Without pipelining , it would take a tota l of 100*135= 13500ns. By realization, it is found that it is whole sequential process. allow the values estimated to be a1 to a100 and we need to add values to be b1 to b100.In scratch line evaluation, ( a1+b1)is calculated, In conterminous evaluation, a1+b1,(a2+b2) is calculated, in third evaluation loga1+b1,a2+b2, ( a3+b3) is evaluated. After the first output data that is log(a1+b1), the resultant outputs are log(a2+b2), log(a3+ b3) will now start arriving at a gap of 60ns . in all the 100 inputs can be applied in 199*60=5940ns and the total time taken to evaluate 100 data will be 5940+180= 6120ns. This time is half compared without pipelining. This process of evaluation is called pipelinlng.2.8 literary works reviewAlgorithms are classified in 4 classes canonic structuresGeometry basedHeuristicsHardware based2.8.1Basic structuresa. Linear search This algorithm1, is very simple. It contains all the rules. Here each packet is matched opposite to all the rules until the corr esponding fields of the packet should match to the rule. Although, it is simple, it is not widely used. Because, it takes the large time for matching with the rule. Consider N is the number of rules, the worst case space and time complexity is O(N),where O is the order and N is the number of rules. Fig below shows the linear structure.Fig 2.8.1.a Linear search algorithmb. Hierarchial trie It is an extension part of the binary star trie. By using the individual bits of the search key, the branches of the trie can be traversed. In the d dimensional hierarchial trie2, first bulid the one dimensional hierarchial trie which is called F1 trie. Foe each prefix P in the F1 trie, there is a recursively (d-1) dimensional hierarchial tries are present(Tp). For example, if the data structure is 2 dimensional the entirely one F1 trie is present. Hierarchial tries are also termed as multilevel tries or backtracking tries or tries of trie.Womens Roles in gum anime The Reflection of Nipponese S ocietyWomens Roles in Anime The Reflection of Nipponese SocietyWhat do the portrayals of women in Japanese keep reveal about the exercise of women in Japanese society today? The mathematical function of women in Japanese culture is an central egress amongst when discussing contemporary Japan. While it is important to consider traditional methods of analysis that come from statistics and surveys, you also need to disembodied spirit at how popular culture defines the youthful Japanese woman. Japanese liveliness can provide a tool to analysis of the utilization of women in Japanese society. Through looking at women and they are pictured in Japanese animation over the decade, we can begin to see the role of women in contemporary Japanese society. The purpose of this discussion is to determine a connection between Japanese animation (a form of popular culture) and the role of women (whether this role is shifting or remaining conservative) in contemporary Japanese society.In or der to understand the link between Japanese animation and society, it is important to consider the meaning of these cost and how they relate to each other. Martinez defines popular culture as the culture of the masses which does apply to the Japanese culture. Nevertheless, other opinions raise the point to how popular culture is a problematic term when translating it into the Japanese context. According to Hidetoshi Kato, a Japanese scholar, the term popular culture as taishu bunka translates into mass culture. However, Martinezs definition is a middle of the road definition for the terms offered by Kato. In addition, Martinez defines the anthropology of popular culture as the study of the interaction between the apparently separate realms of the material and the symbolic. Other anthropologist such as Roger Buckley agrees with Martinez, stating that popular culture should tell us something about contemporary Japanese behavior.The images presented by Japanese animation including its related cousin, manga, or Japanese comics develop helped shape the identity of modern Japanese women. Japanese animation, or anime, is useful when perusing the role of women in society. Popular culture serves to reflect and instigate change in Japanese society, by observing the changes and themes in anime, these trends are identifiable. Popular culture also helps one to understand the dynamics of Japanese society and culture. While the behaviors identified are not Japanese, such as conformity, loyalty and deference8, there are certain impalpable undertones that make themes and characters that make them Japanese. Lastly, Japanese animation industry caters for both sexes across a wide age group. This is important, because unlike the animation industry in the United States whereupon childrens programming is largely aimed at young boys. Japanese animation makes it possible to gain an insight into the role of women in society because both sexes views are represented. This provides a foundation for observing how the role of women in Japanese society can be studied through examining their role in Japanese animation.Japanese animation is interesting to study when observing the roles of gender because of the way it written for diverse tastes and it differs from Western animation. Anime has often been described as edgy, provocative, and documentary-like these industry buzzwords describe anime as a different human face of animation, when it is not. In reality, the Japanese have embraced animation as an expression that goes beyond the standard set by Disney. Anime includes animation catered for all age groups. Anime substance ranges from superb works to trashy soap operas or pornography however, they play an important role in Japans popular culture by providing a legacy of past ideals.Respected writer Frederik Schodt has split the anime available into two distinct halves as defined by the gender,Boys comic shonen anime carefully fit suspense with humor, dramatic st ories of sports, adventure, ghosts, science fiction, and school life.Girls comic anime shojo also strive for balance but are distinguished by their tales of idealized love.Given the range to choose from, it is important to analyze a number of sources to see how anime reflects the position of women in Japanese society, but to examine them with an open mind. reception to anime has been filled with distaste. Film critics have both embraced and criticized Japanese animation. Mamorum Oshiis theatrical adaption of Shirow Masamunes Ghost in the Shell, regarded as a movie that questions what it is that makes us human by many, has been lauded as a spectacular-looking Japanese animated film, but like so many of its kind, involves a confusing narrative and peculiar metaphysics that reduce interest16. To avoid generalizations it is important to look at works from a several genres to how anime portrays Japanese women in society.To observe the role of women as visualised in anime with a female person-specific target audience, Komodo no Omocha (1996) will be used to analyzed. To see how women are being represented in anime that is targeted at a male demographic, genus Draco Ball Z (199?) will form the basis of analysis. Finally, a recent work from Japans most see and successful animation studio today, studio Ghibli, will beanalyzed Mononoke Hime (1997). The importance of studying studio apartment Ghiblis work is to see how women are represent by an animation studio whose works reach a very wide audience, that typically cross the gender and age boundaries. While this analysis will not prove to be the final answer, it will prove an interesting investigation when considering what images of femininity have been communicate onto Japanese society over the past decade.Kodomo no Omocha was a popular series that aired on Japanese television in the mid 1990 is, compared to many shojo anime, Kodomo no Omocha is radical, though it is by far not the only one. The story is a comed y fused with typical shojo elements love interests, and pretty artwork. The female lead is a young girl named Sana, who lives with her eccentric, but loving, nonplus and Rei, her personal manager. Unlike other female characters that will be analyzed, Sana is loud, outspoken and is not intimidated by anyone. She is works hard to do her best at her job (she is a famous star of a childrens TV program), sponsors and family. While she exhibits traditionally female qualities, she is not the stereotypical wholly subservient female character. Even though she is only a child, she stresses the importance of her job. Her mother is another strong female role within the anime. She is intelligent, in control and the men are more likely to be subservient to her than anything else is. Other females in the show lean towards conservative Japan, such as when Sanas female teacher cries and runs to another male teacher for assistance whenever the class acts up. The male characters are traditionally e mpowered, though like many a shojo anime, have soft sides to their personalities. The depiction of the two main female characters, Sana and her mother, offer an insight into the modern Japanese woman as having the capacity to be strong, yet ennoble and compassionate.Dragon Ball Z offers an interesting insight into the portrayal of women in anime aimed at a male demographic. The reason this is an interesting series to look at is its popularity and the way it portrays gender roles. Women are portrayed in few roles in this anime. The female roles are dismally backwards. Dragon Ball Z has portrayed the role of women as subservient/ gageary at their core. It has pointed out that fundamental beliefs about gender roles are difficult to change in any society, including Japans, The show is very male-centric, emphasizing strength, discipline and hard work as the key to being successful in the world. On the other hand, this is a martial liberal arts anime, so this should not be a surprising a spect. One of the women who appear regularly is the protagonists female friend Bulma, an intelligent scientist. Bulma is a gifted inventor and often creates something that will aid her group of friends in any(prenominal) plight they are in. Bulma is portrayed as a confident, intelligent woman who, while not of equalise status, remains an important part of the team. However, when she is put in a position of danger, she falls into the damsel in distress stereotype all too common in male-orientated anime. She is rescued one way or another, but is often the least of the groups priorities she is often rescued as an after-thought, as opposed to being a genuine critical concern. This is a good example of what Eri Izawa determines as the Unequal Relationship genre, where women are second to men in a world dominated by patriarchy.Hayao Miyazaki and Isao Takahata founded studio Ghibli in 1985. The importance with studying work by Studio Ghibli is because their productions (which are theatri cal) have such widespread appeal in Japanese society. A large number of Japans populace sees the stories that are created here. The films cross the divides of age and gender.The movie that is I am looking at is Mononoke Hime. It grossed approximately US$150 million at the box office, beaten only by Titanic. In Mononoke Hime, the story centers on three principle characters San, the Wolf Princess, Lady Eboshi and prince Ashitaka, the pillar between which these two women are placed. One of interesting strengths of this film is the way in which the opposing characters, San and Lady Eboshi, are portrayed. Both are strong, powerful women, sure of themselves and their world. Lady Eboshi is a superlative example of the new woman of Japan. She is in charge of a profitable ironworks that employs people regarded as beneath society (prostitutes and lepers), leading by compassion, returning dignity and purpose to their lives. San is the other extreme she lives in the forest of the Deer God, rai sed by the great wolf gods who anticipate there. San is a strong female character who follows a more cancel way of life as opposed to the entrepreneurial mindset of Lady Eboshi, San is dedicated to preserving the forest and the creatures that dwell within. Miyazaki is portraying the capacity of women to be strong, competent and successful. San represents the capacity of women to be strong in the dwelling of the traditional while Lady Eboshi is an example of how women can be successful and entrepreneurial in the face of modernization.From three examples, it is easy to see these reflections on the role of women are present in contemporary Japanese society. Martinez admits that it is difficult to discover what the true role of Japanese women in Japanese society are in a perceived country where men are still dominant and Japanese women are held to be gentle, wormy and beautiful. Historically, Japanese womens suffrage was achieved in 1945 and it is noted that while Japanese women may b e able to grow jobs, it is far more difficult to find careers, even today. However, public opinion is ever-changing. There is clear that the role of women in Japan is no longer the traditional housewife/mother. Surveys by the Prime Ministers Office in 1987 and 1995 show a shift in public opinion of women, while in 1987 over 50% of the men surveyed agreed with the traditional role of women in Japan, by 1995 the percentage had dropped to 33%. The state of Japanese animation over the past decade reveals a relative parallel between the content of Japanese animation and these results.The role of women in anime such as Kodomo no Omocha gives girls a role model unlike the traditionally submissive, quiet woman in the face of Sanas eccentric, enthusiastic nature that is rewarded by success. Studio Ghiblis films have portrayed women as equal, confident and able to take charge in their lives. Anime aimed at boys retain the portrayal of women as bystanders, whether it be the token damsel in di stress or cheerleader. However, that is changing Japanese animation aimed at the boys has begun to portray women beyond this traditional stereotype. Several productions such as Ranma 1/2 and Love Hina offered a cast of characters that serve to put women on equal ground as men in some cases, though there is still the re-enforcement of traditional gender roles.Japanese animation is an established form of pop culture. It is consumed by both sexes and across all age groups, and offers a series of representations of women. While it has become apparent through observing trends in Japanese animation and contemporary Japanese society is an apparent shift, however, it is important to identify that the traditional role of women will probably always homely itself in pop culture. This is because the traditional role of women is an option, just as choosing a career or being entrepreneurial are choices. What is encouraging to see is that those choices are being represented, either directly or in directly, in anime. It speaks well for the future of Japanese society as alternative roles of women are being portrayed for both sexes in the culture of the masses.ReferenceMartinez, D.P. (1998). The Worlds of Japanese popular culture gender, shifting boundaries UK, Cambridge UP, p. 3.Hidetoshi, K. (1989). Some Thoughts on Japanese popular culture. Richard Gid PowersHidetoshi, K. (1989). Handbook of Japanese popular culture. Greenwood Press.Buckley, R. (1990). Japan today. Cambridge UP.Schodt, F.L. (1983). Manga manga the world of japanese comics. USA Kodansha.Izawa, E. (2001). Japanese manga and animation gender relations in manga and anime. Retrieved from http//www.uncc.edu/medmoto/3209/anime/gender.html (abridged)Robertson, J. (1998). Takarazuka sexual politics and popular culture in modern japan. University of California.Dimensions of Japanese society gender, margins and mainstream. Great Britain Macmillan Press Ltd.

No comments:

Post a Comment