Skip to main content

Architecture of Distributed Network Processors: Specifics of Application in Information Security Systems

  • Conference paper
Book cover Networking - ICN 2005 (ICN 2005)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 3421))

Included in the following conference series:

  • 542 Accesses

Abstract

Modern telematic networks or Internet are distributed hierarchical systems consisting of basic components: nodes and communication lines. Telematic network nodes are computers with network interfaces employed for data exchange. A node with several network interfaces is called the router or network processor (NP). Each NP interface is provided by one or several identifiers called addresses. There are several types of addresses: physical or MAC, network or IP, application or Port Number. The set of network addresses form specific spaces with its topology and metric. Topology is the measure of nearness in the network. The metric is defined by communication line. If the number of addresses that connected by the line is more than two, the communication line is termed broadcasting. The number of communication lines determines the distance between nodes. The distance between the nodes without network addresses is undefined. By combining nodes into a telematic network, one can provide information exchange among computer applications, which are executed at the network nodes. Information exchange is based on forwarding and receiving network packets. A packet is a specific logical sequential/recursive structure, which is formed at network nodes to execute information exchange. The sequential part of this structure consists of two, header and payload, fields. The recursiveness of a packet stems from the fact that the payload itself may be another packet with its specific structure and addresses (Fig.1). A packet originating from an application running on a node and destined to node in different network, arrives at an NP and is forwarded by it to the appropriate network on the basis of destination addresses in the packet’s header.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Intel Corp. Intel Second Generation Network Processor, http://www.intel.com/design/network/products/npfamily/ixp2400.htm

  • Zaborovsky, V.S.: «Multiscale Network Processes: Fractal and p-Adic analysis». In: Proceedings of 10-th International Conference on telecommunications ICT 2003, University of Haute Alsace, Colmar, France (2003)

    Google Scholar 

  • Zaborovsky, V.S., Shemanin, Y.A.: «Firewall Network Processors: Concept, Model and Platform». In: Proceedings of International Conference on Networking (ICN 2004), Guadeloupe (2004)

    Google Scholar 

  • Vil’chevskii, N.O., Zaborovsky, V.S., Klavdiev, V.E.: Methods of Evaluating the Efficiency of Control and Protection of Traffic Connections in High-Speed Computer Networks. In: Proc. Conf. Mathematics and the Security of Information Technologies (MaBIT 2003), Lomonosov MSU, October 23–24 (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zaborovskii, V.S., Shemanin, Y.A., Rudskoy, A. (2005). Architecture of Distributed Network Processors: Specifics of Application in Information Security Systems. In: Lorenz, P., Dini, P. (eds) Networking - ICN 2005. ICN 2005. Lecture Notes in Computer Science, vol 3421. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-31957-3_77

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-31957-3_77

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-25338-9

  • Online ISBN: 978-3-540-31957-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics