Javascript must be enabled to continue!
TCAM Network Memory Error Detection and Correction Method
View through CrossRef
Ternary content addressable memories (TCAMs) are widelyused in network devices to implement
packet classification. They are used, for example, for packet forwarding, for security, and to implement
software-defined networks (SDNs). TCAMs are commonly implemented as standalone devices or as an
intellectual property block that is integrated on networking application-specific integrated circuits. On the other
hand, field-programmable gate arrays (FPGAs) do not include TCAM blocks. However, the flexibility of FPGAs
makes them attractive for SDN implementations, and most FPGA vendors provide development kits for SDN.
Those need to support TCAM functionality and, therefore, there is a need to emulate TCAMs using the logic
blocks available in the FPGA. In recent years, a number of schemes to emulate TCAMs on FPGAs have been
proposed. Some of them take advantage of the large number of memory blocks available inside modern FPGAs
to use them to implement TCAMs. A problem when using memories is that they can be affected by soft errors
that corrupt the stored bits. The memories can be protected with a parity check to detect errors or with an error
correction code to correct them, but this requires additional memory bits per word. In this brief, the protection
of the memories used to emulate TCAMs is considered. In particular, it is shown that by exploiting the fact that
only a subset of the possible memory contents are valid, most single-bit errors can be corrected when the
memories are protected with a parity bit.
International Journal of Engineering Technology and Management Sciences
Title: TCAM Network Memory Error Detection and Correction Method
Description:
Ternary content addressable memories (TCAMs) are widelyused in network devices to implement
packet classification.
They are used, for example, for packet forwarding, for security, and to implement
software-defined networks (SDNs).
TCAMs are commonly implemented as standalone devices or as an
intellectual property block that is integrated on networking application-specific integrated circuits.
On the other
hand, field-programmable gate arrays (FPGAs) do not include TCAM blocks.
However, the flexibility of FPGAs
makes them attractive for SDN implementations, and most FPGA vendors provide development kits for SDN.
Those need to support TCAM functionality and, therefore, there is a need to emulate TCAMs using the logic
blocks available in the FPGA.
In recent years, a number of schemes to emulate TCAMs on FPGAs have been
proposed.
Some of them take advantage of the large number of memory blocks available inside modern FPGAs
to use them to implement TCAMs.
A problem when using memories is that they can be affected by soft errors
that corrupt the stored bits.
The memories can be protected with a parity check to detect errors or with an error
correction code to correct them, but this requires additional memory bits per word.
In this brief, the protection
of the memories used to emulate TCAMs is considered.
In particular, it is shown that by exploiting the fact that
only a subset of the possible memory contents are valid, most single-bit errors can be corrected when the
memories are protected with a parity bit.
Related Results
Towards integrated care of the breast cancer patient : perspectives on the challenges and opportunities of medical pluralism in a disparate society
Towards integrated care of the breast cancer patient : perspectives on the challenges and opportunities of medical pluralism in a disparate society
“Medical Pluralism” refers to the co-existence of many different medical systems,
practices and products within a healthcare landscape. Whilst in most countries,
mainstream biomedi...
EE-TCAM: An Energy-Efficient SRAM-Based TCAM on FPGA
EE-TCAM: An Energy-Efficient SRAM-Based TCAM on FPGA
Ternary content-addressable memories (TCAMs) are used to design high-speed search engines. TCAM is implemented on application-specific integrated circuit (native TCAMs) and field-p...
The m6A Methyltransferase METTL3 Promotes Cisplatin Resistance and Invasion in Testicular Seminoma via BCL2
The m6A Methyltransferase METTL3 Promotes Cisplatin Resistance and Invasion in Testicular Seminoma via BCL2
Abstract
Background: Methyltransferase-like 3 (METTL3) involves in promoting tumor progression through tumor-related genes N6-methyladenosine (m6A) modification. Our previo...
The management of chronic pain in HIV by traditional complementary alternative medicine practitioners : guidelines for treatment and management
The management of chronic pain in HIV by traditional complementary alternative medicine practitioners : guidelines for treatment and management
Background
Chronic pain is a common clinical complaint and comorbidity that negatively affects the
health-related quality of life of people with HIV across the world. The prevalenc...
Complementary and Alternative Medicine Education for Medical Profession: Systematic Review
Complementary and Alternative Medicine Education for Medical Profession: Systematic Review
Purpose. To help integrate traditional, complementary and alternative medicine (TCAM) into health systems, efforts are being made to educate biomedical doctors (BMD) and medical st...
Deep Learning Phase Error Correction for Cerebrovascular 4D Flow MRI
Deep Learning Phase Error Correction for Cerebrovascular 4D Flow MRI
Abstract
Background and Purpose
Background phase errors in 4D Flow MRI may negatively impact blood flow quantification. In this study, we assessed their impact on cerebrov...
Deep learning phase error correction for cerebrovascular 4D flow MRI
Deep learning phase error correction for cerebrovascular 4D flow MRI
Abstract
Background phase errors in 4D Flow MRI may negatively impact blood flow quantification. In this study, we assessed their impact on c...
Hybrid Energy-Aware Multi-Match Network Intrusion Detection System (HEAMC-NIDS)
Hybrid Energy-Aware Multi-Match Network Intrusion Detection System (HEAMC-NIDS)
Network Intrusion Detection Systems (NIDS) depend on accurate and high-speed packet inspection to detect malicious activity. The increasing size of Snort databases and rising netwo...

