SlideShare a Scribd company logo
Shaik. Mallika et al. Int. Journal of Engineering Research and Application www.ijera.com
Vol. 3, Issue 5, Sep-Oct 2013, pp.266-270
www.ijera.com 266 | P a g e
Design and Implementation of Robust Router Using Vlsi
Shaik. Mallika1, P. Srinivas2, Md. Taj3
1Dept.of ECE Nimra College of Engineering & Technology, Jupudi, Vijayawada, A.P-India.
2Assistant Professor Dept.of ECE Nimra College of Engineering & Technology, Vijayawada, A.P-India.
3Assistant Professor Dept.of ECE ,Bapatla engineering college, bapatla, Guntur dt, A.P-India.
Abstract
In his paper we attempt to give a networking solution by applying VLSI architecture techniques to router
design for networking systems to provide intelligent control over the network. Networking routers today have
limited input/output configurations, which we attempt to overcome by adopting bridging loops to reduce the
latency and security concerns. Other techniques we explore include the use of multiple protocols. We
attempt to overcome the security and latency issues with protocol switching technique embedded in the router
engine itself. The approach is based on hardware coding to reduce the impact of latency issues as the hardware
itself is designed according to the need. We attempt to provide a multipurpose networking router by means of
Verilog code, thus we can maintain the same switching speed with more security as we embed the packet
storage buffer on chip and generate the code as a self-independent VLSI Based router. Our main focus is the
implementation of hardware IP router. The approach enables the router to process multiple incoming IP
packets with different versions of protocols simultaneously, e.g. for IPv4 and IPv6. The approach will results
in increased switching speed of routing per packet for both current trend protocols, which we believe would
result in considerable enhancement in networking systems.
Keywords: Robust Router, packets, FPGA, RTL, IP
I. INTRODUCTION
Our approach here is to design a variable
hardware router code by using Verilog and the same
to be implemented for the SOC (System On Chip)
level router. In this paper we are making a VLSI
design for the implementation at the synthesizable
level the same can be further enhanced to SOC
level, but our main aim is limited to the NetList
generation level which would give the result
prediction and workable module vision. Our focus
being in this is to make this router as much variable
as we can which will give the robustness for the
design to be called even as a Robust Router in which
we can make the same router to not only go for N
number of connections but also to detect all variety of
packets and route the same. To do so we have to add
the code with specific case’s for every type of packets
we want to add to our router to route, with this paper
of hardware code our approach is to get the basic
packets routing with multiple protocols starting with
the IPv4 and IPv6.
II. LITERATURE SURVEY
In this we are comparing the existing
generic router architecture and our new robust router
architecture. This will give the difference in the
designing and would reflect our paper
enhancements that we are upgrading in our robust
router paper.
A. Generic Router Architecture
Figure 1 Generic architecture
In the architecture we can look that the
generic architecture is processing a single packet of a
specific protocol at a given time and the output
queue buffer also one for one egress channel ring by
which there is the
RESEARCH ARTICLE OPEN ACCESS
Shaik. Mallika et al. Int. Journal of Engineering Research and Application www.ijera.com
Vol. 3, Issue 5, Sep-Oct 2013, pp.266-270
www.ijera.com 267 | P a g e
overloading of the queue buffer and will result in the
congestion. The congestion flow is as shown below.
Figure 2 Congestion flow
III. A NEW ROBUST ROUTER
ARCHITECTURE
The architecture of robust router is totally
based on the Verilog code which would enable our
design in the implementation of parallel packet
processing for N number of channels. This intern
enables the multi packet processing at the same time.
With the Verilog code being the base of design we
have an option for the addition of protocol case and
respective look-up table makes us go for the Multi-
protocol processing at the same time. By which we
are unable to provide the multi-packet multi-
protocol routing at the same time with same speed.
Figure 3 Multi-protocal Multi packet processing at a
tree
While designing the robust router a
special concern is kept in the mind of the switching
speed issue to give the maximum speed with
parallelism being added.
The egress output buffer queuing problem
was also solved by providing a separate queue for
every ingress channel in the egress channel with N
vertical queue by which we can avoid the congestion
to a remarkable level which is as shown below.
Figure 4 Congestion flow with vertical queue
The size issue is another special feature of
our robust router which makes our robust router a
unique system. As discussed earlier in the paper we
are trying to make the Robust router on to the chip
level design so we further advance it to the level of
Ethernet based router which will make the router to
be implemented on the standalone systems, which
will be a revolutionary enhancement in size matter
from room full of router to just the PCI slot
operating Router and will make network work
more faster. It looks something like this below.
Generally, the router can be interfaced with ‘N’
number of I/O devices. Block diagram given below.
Figure 5 Block diagram
The paper design has the following modules.
A. Input Interface Block
This block is mainly responsible for
receiving the incoming IP packets over multiple
input channels. This block asserts the necessary
response signals in order to communicate with the IP
packet driver modules. After receiving the IP
packets, this block forward the same to the Ingress
Block for the further process. This block forwards
the same to packet store block as well as parser
block.
B. Packet Store Block
This is responsible for storing the error free
received packets. This module receives the packet
contents from Ingress block and dispatches the
same based on the request from Egress block.
Shaik. Mallika et al. Int. Journal of Engineering Research and Application www.ijera.com
Vol. 3, Issue 5, Sep-Oct 2013, pp.266-270
www.ijera.com 268 | P a g e
C. Parser Block
This block is mainly responsible for parsing
the complete packet into multiple set of data
according to its field. The parsed contents will be
inputted to the filer block.The above three blocks are
merged all together as IIB in code to single file.
D. Filer Block
This block is responsible for selecting the
egress ring. The block receives the parsed data from
the parser block. The parsed data will be forwarded
to the filer table. In response to this, the filer table
provides the output ring number. Then, the received
output from the filer table will be forwarded to the
egress block.
E. Filer Table
It is a user configurable table. This table
contains a set of data in its each slot, against which
the data sent by the filer block will be compared.
If the filer block inputted data matches with the
data of any slot of filer table, then that slot’s data
will be used as egress ring through which received
packet will be forwarded.
F. Egress Block
This block receives the data from filer block
as egress ring number through which the received
packet shall be forwarded. Upon receiving the egress
ring number, this block initiates the communication
with packet store block to fetch the packet to be
forwarded. Then, the fetched IP packet will be
forwarded to the output interface block with the
output channel details, over which the packet has to
be transmitted.
G. Output Interface Block
Upon receiving the packet with output port
details from the egress block, this block forwards the
IP packet over mentioned output channel. This block
is also responsible for asserting all the necessary
handshaking signals for the receiving device while
transmitting the packets. The Egress Block and
Output Interface Block are merged together in code as
single file.
Figure 6 Forwarding IP packet
IV. SYSTEM FLOW DIAGRAM
The system flow diagram is as shown below
which makes us to understand the flow of the
signals through the system from each block by
block and transaction carried between the blocks to
accomplish the task of the robust router. The flow
diagram described here is a brief one, which helps
us to understand the flow of every block. Every
block have the state machine cycle included in them
to enhance the system logical transaction to the level
of parallelism. The flow diagram is as shown in
Figure 7 below.
First the packet is received from the ingress
channel ring to the input interface block the packet
is parsed to data packet and header packet, the data
packet is stored in the parser queue and the header is
sent to the filer block. The flier block then checks
weather the packet is IPv4 or IPv6 and accordingly
send the request to the filer table to router the packet
to required destination. The filer table cross verifies
the egress ring channel with it Dest-IP address and
send the egress ring ID to the filer block. The filer
block send and enables the particular egress ring in
egress blocks and gives the command to the
particular egress ring in egress block. Then in
egress block the stored data packet in the parser
queue is added back with header and is sent out with
the specified egress ring channel. In this way the
every packet is processed and routed in robust
router.
Figure 7 System flow diagram
V. SIMULATION AND DISCUSSION
A.Net List of the Robust Router
The Net List is RTL level of the robust
router system, which is syntasizable and can be
extracted on the Xilinx tool. By which we can get
preface look of the system and a transition from the
frontend of the VLSI designing to backend of the
VLSI designing. Which means the same can run on
FPGA kit and test its robustness and errors of the
system can be debugged before it is taken to SOC
Level and to Fab-Labs.
The snap below is the Pin configuration of the
proposed Robust Router.
Shaik. Mallika et al. Int. Journal of Engineering Research and Application www.ijera.com
Vol. 3, Issue 5, Sep-Oct 2013, pp.266-270
www.ijera.com 269 | P a g e
Figure 8 Net List
The NetList level can further go after I/O
Padding get the exact pin configuration which can be
derived accordingly but will be similar one.
The Snap below is the Top level system view of the
system at the RTL.
Figure 9 View of the system at the RTL
B.SOC Designing
The further movements of the VLSI
Designing will require the sharp knowledge of the
VLSI backend designing and can be fabricated at the
45 nano technology using the Cadence Encounter
Tool which will enable us to take the system to SOC
level the steps are as shown below.
Figure 10 System to SOC level the steps
The RTL level of design which we get from the Net
List of the system will have gate delay, propagation
delay and wire delays included in them. These are all
calculated and made into an optimization level. Then
the design is fixed into LUT’S and the mapped
between the LUT’S further the placement of the
LUT’S are prissily done keeping mind the power
utilization and the delay calculated earlier. Then the
routing is done between the CLB’S. Further the bit-
stream is generated to test the system and
verification done across the Net List output to get the
exact design. Then the system design is masked and
made to the GDSSI Level further to be sent on to the
Fab-Labs for fabrication.
C. Design under Test
The design under test [DUT] is made to test
the system robustness under different cases.
The DUT
Figure 11 DUT architecture
For the testing of the robustness here we are
mixing theIPv4 and IPv6 packets and we testing the
system in different cases.
VI. CONCLUSIONS
We summarise the advantages and
applications below.
A. Advantages
architecture includes the Test case which
will define the test. The input driver block will
generate the test input signals for the system testing.
The input and output transacted will make the system
get the input and output according to the system core
requirement. The input and out monitor are placed to
compare the system testing. At last the Response
checker is to give the system testing pass or fail.
The DUT is as shown below.
General purpose router 
Shaik. Mallika et al. Int. Journal of Engineering Research and Application www.ijera.com
Vol. 3, Issue 5, Sep-Oct 2013, pp.266-270
www.ijera.com 270 | P a g e
 Router hardware code is variable 
 More secured 
 Robust router can handle all type of 
packets (Implemented on IPv4 and IPv6) 
B. Application
Can be used as public internetworking router 
 Can be used as corporate router 
 Software company private router (client to client, 
 developer to client) 
 Router for networking research 
 In other words one point networking solution
REFERENCES
[1] Y. Katsube, K. Nagami, and H. Esaki,
“Toshiba’s Router Architecture Extensions
for ATM: Overview,” IETF RFC2098,
April 1997.
[2] Y. Rekhter, B. Davie, D. Katz, E. Rosen,
and G. Swallow, “Cisco Systems’ Tag
Switching Architecture Overview,” IETF
RFC 2105, Feb. 1997. Amir.Palnitkar. 2
nd
Edition
[3] J. Moy, OSPF: Anatomy of an Internet
Routing Protocol, 1998
[4] Tobias Bjerregaard and Shankar
Mahadevan. A survey of research and
practices of network-on-chip. ACM
Comput. Surv., 38(1):1, 2006.
[5] Charles.H.Roth,Jr Digital System Design
Using VHDL
[6] Jenkins,jesse H.Designing with FPGAs and
CPLDs
[7] Abromovici,M,Breuer Digital System
Testing and Testable Design.
[8] James Balfour and William J. Dally. Design
tradeoffs for tiled cmp on-chip networks. In
ICS ’06: Proceedings of the 20th annual
international conference on
Supercomputing, pages 187–198, 2006.

More Related Content

What's hot

CCNA 200-120 Exam Questions
CCNA 200-120 Exam QuestionsCCNA 200-120 Exam Questions
CCNA 200-120 Exam Questions
Eng. Emad Al-Atoum
 
Introduction to IP
Introduction to IPIntroduction to IP
Introduction to IP
aibad ahmed
 
IP Routing
IP RoutingIP Routing
IP Routing
Peter R. Egli
 
Socket Programming w/ C# - IK
Socket Programming w/ C# - IKSocket Programming w/ C# - IK
Socket Programming w/ C# - IK
Ilgın Kavaklıoğulları
 
Addressing the Network – IPv4
Addressing the Network – IPv4Addressing the Network – IPv4
Addressing the Network – IPv4
Sachii Dosti
 
Arp config-arp
Arp config-arpArp config-arp
Arp config-arp
Raafat younis
 
CCNA/Networking
CCNA/NetworkingCCNA/Networking
ARP
ARPARP
Cn lab manual 150702
Cn lab manual 150702Cn lab manual 150702
Cn lab manual 150702
Hardiksinh Solanki
 
CCNA Dec, 2015 Questions
CCNA Dec, 2015 QuestionsCCNA Dec, 2015 Questions
CCNA Dec, 2015 Questions
Eng. Emad Al-Atoum
 
Internet Protocol version 6
Internet Protocol version 6Internet Protocol version 6
Internet Protocol version 6
Rekha Yadav
 
Cn lab-manual
Cn lab-manualCn lab-manual
Cn lab-manual
Anil Kumar
 
Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesBasic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notes
Vamsi Krishna Kalavala
 
Ccna 1 4
Ccna 1  4Ccna 1  4
Ccna 1 4
Vahdet Shehu
 
CCNA Routing Protocols
CCNA Routing Protocols CCNA Routing Protocols
CCNA Routing Protocols
Mansour Naslcheraghi
 
INTERNET PROTOCOL VERSION 6
INTERNET PROTOCOL VERSION 6INTERNET PROTOCOL VERSION 6
INTERNET PROTOCOL VERSION 6
Chaitanya Ram
 
Itn instructor ppt_chapter5_ethernet
Itn instructor ppt_chapter5_ethernetItn instructor ppt_chapter5_ethernet
Itn instructor ppt_chapter5_ethernet
Universitas Teknokrat Indonesia
 
Pipelining Architecture of AES Encryption and Key Generation with Search Base...
Pipelining Architecture of AES Encryption and Key Generation with Search Base...Pipelining Architecture of AES Encryption and Key Generation with Search Base...
Pipelining Architecture of AES Encryption and Key Generation with Search Base...
VLSICS Design
 

What's hot (18)

CCNA 200-120 Exam Questions
CCNA 200-120 Exam QuestionsCCNA 200-120 Exam Questions
CCNA 200-120 Exam Questions
 
Introduction to IP
Introduction to IPIntroduction to IP
Introduction to IP
 
IP Routing
IP RoutingIP Routing
IP Routing
 
Socket Programming w/ C# - IK
Socket Programming w/ C# - IKSocket Programming w/ C# - IK
Socket Programming w/ C# - IK
 
Addressing the Network – IPv4
Addressing the Network – IPv4Addressing the Network – IPv4
Addressing the Network – IPv4
 
Arp config-arp
Arp config-arpArp config-arp
Arp config-arp
 
CCNA/Networking
CCNA/NetworkingCCNA/Networking
CCNA/Networking
 
ARP
ARPARP
ARP
 
Cn lab manual 150702
Cn lab manual 150702Cn lab manual 150702
Cn lab manual 150702
 
CCNA Dec, 2015 Questions
CCNA Dec, 2015 QuestionsCCNA Dec, 2015 Questions
CCNA Dec, 2015 Questions
 
Internet Protocol version 6
Internet Protocol version 6Internet Protocol version 6
Internet Protocol version 6
 
Cn lab-manual
Cn lab-manualCn lab-manual
Cn lab-manual
 
Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesBasic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notes
 
Ccna 1 4
Ccna 1  4Ccna 1  4
Ccna 1 4
 
CCNA Routing Protocols
CCNA Routing Protocols CCNA Routing Protocols
CCNA Routing Protocols
 
INTERNET PROTOCOL VERSION 6
INTERNET PROTOCOL VERSION 6INTERNET PROTOCOL VERSION 6
INTERNET PROTOCOL VERSION 6
 
Itn instructor ppt_chapter5_ethernet
Itn instructor ppt_chapter5_ethernetItn instructor ppt_chapter5_ethernet
Itn instructor ppt_chapter5_ethernet
 
Pipelining Architecture of AES Encryption and Key Generation with Search Base...
Pipelining Architecture of AES Encryption and Key Generation with Search Base...Pipelining Architecture of AES Encryption and Key Generation with Search Base...
Pipelining Architecture of AES Encryption and Key Generation with Search Base...
 

Viewers also liked

20 Ideas for your Website Homepage Content
20 Ideas for your Website Homepage Content20 Ideas for your Website Homepage Content
20 Ideas for your Website Homepage Content
Barry Feldman
 
50 Essential Content Marketing Hacks (Content Marketing World)
50 Essential Content Marketing Hacks (Content Marketing World)50 Essential Content Marketing Hacks (Content Marketing World)
50 Essential Content Marketing Hacks (Content Marketing World)
Heinz Marketing Inc
 
Prototyping is an attitude
Prototyping is an attitudePrototyping is an attitude
Prototyping is an attitude
With Company
 
10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer Experience10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer Experience
Yuan Wang
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media Plan
Post Planner
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming Convention
In a Rocket
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting Personal
Kirsty Hulse
 

Viewers also liked (7)

20 Ideas for your Website Homepage Content
20 Ideas for your Website Homepage Content20 Ideas for your Website Homepage Content
20 Ideas for your Website Homepage Content
 
50 Essential Content Marketing Hacks (Content Marketing World)
50 Essential Content Marketing Hacks (Content Marketing World)50 Essential Content Marketing Hacks (Content Marketing World)
50 Essential Content Marketing Hacks (Content Marketing World)
 
Prototyping is an attitude
Prototyping is an attitudePrototyping is an attitude
Prototyping is an attitude
 
10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer Experience10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer Experience
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media Plan
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming Convention
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting Personal
 

Similar to Av35266270

A NOVEL ROBUST ROUTER ARCHITECTURE
A NOVEL ROBUST ROUTER ARCHITECTURE A NOVEL ROBUST ROUTER ARCHITECTURE
A NOVEL ROBUST ROUTER ARCHITECTURE
IJERA Editor
 
Internal Architecture of Junction Based Router
Internal Architecture of Junction Based RouterInternal Architecture of Junction Based Router
Internal Architecture of Junction Based Router
Editor IJCATR
 
Internal Architecture of Junction Based Router
Internal Architecture of Junction Based RouterInternal Architecture of Junction Based Router
Internal Architecture of Junction Based Router
Editor IJCATR
 
Internal Architecture of Junction Based Router
Internal Architecture of Junction Based RouterInternal Architecture of Junction Based Router
Internal Architecture of Junction Based Router
Editor IJCATR
 
Ieee 2015 project list_vlsi
Ieee 2015 project list_vlsiIeee 2015 project list_vlsi
Ieee 2015 project list_vlsi
igeeks1234
 
Ieee 2015 project list_vlsi
Ieee 2015 project list_vlsiIeee 2015 project list_vlsi
Ieee 2015 project list_vlsi
igeeks1234
 
Me,be ieee 2015 project list_vlsi
Me,be ieee 2015 project list_vlsiMe,be ieee 2015 project list_vlsi
Me,be ieee 2015 project list_vlsi
igeeks1234
 
IRJET- Design of Virtual Channel Less Five Port Network
IRJET- Design of Virtual Channel Less Five Port NetworkIRJET- Design of Virtual Channel Less Five Port Network
IRJET- Design of Virtual Channel Less Five Port Network
IRJET Journal
 
Power Analysis of Embedded Low Latency Network on Chip
Power Analysis of Embedded Low Latency Network on ChipPower Analysis of Embedded Low Latency Network on Chip
Power Analysis of Embedded Low Latency Network on Chip
Association of Scientists, Developers and Faculties
 
FPGA IMPLEMENTATION OF PRIORITYARBITER BASED ROUTER DESIGN FOR NOC SYSTEMS
FPGA IMPLEMENTATION OF PRIORITYARBITER BASED ROUTER DESIGN FOR NOC SYSTEMSFPGA IMPLEMENTATION OF PRIORITYARBITER BASED ROUTER DESIGN FOR NOC SYSTEMS
FPGA IMPLEMENTATION OF PRIORITYARBITER BASED ROUTER DESIGN FOR NOC SYSTEMS
IAEME Publication
 
FPGA IMPLEMENTATION OF PRIORITYARBITER BASED ROUTER DESIGN FOR NOC SYSTEMS
FPGA IMPLEMENTATION OF PRIORITYARBITER BASED ROUTER DESIGN FOR NOC SYSTEMSFPGA IMPLEMENTATION OF PRIORITYARBITER BASED ROUTER DESIGN FOR NOC SYSTEMS
FPGA IMPLEMENTATION OF PRIORITYARBITER BASED ROUTER DESIGN FOR NOC SYSTEMS
IAEME Publication
 
TCP/IP 3RD SEM.2012 AUG.ASSIGNMENT
TCP/IP 3RD SEM.2012 AUG.ASSIGNMENTTCP/IP 3RD SEM.2012 AUG.ASSIGNMENT
TCP/IP 3RD SEM.2012 AUG.ASSIGNMENT
mayank's it solution pvt.ltd
 
VERIFICATION OF FOUR PORT ROUTER FOR NETWORK ON CHIP
VERIFICATION OF FOUR PORT ROUTER FOR NETWORK ON CHIPVERIFICATION OF FOUR PORT ROUTER FOR NETWORK ON CHIP
VERIFICATION OF FOUR PORT ROUTER FOR NETWORK ON CHIP
Editor IJMTER
 
Serial interface module for ethernet based applications
Serial interface module for ethernet based applicationsSerial interface module for ethernet based applications
Serial interface module for ethernet based applications
eSAT Journals
 
6 weeks/months project training from CMC Faridabad - Ppt of ccna project from...
6 weeks/months project training from CMC Faridabad - Ppt of ccna project from...6 weeks/months project training from CMC Faridabad - Ppt of ccna project from...
6 weeks/months project training from CMC Faridabad - Ppt of ccna project from...
thesakshi12
 
IOT - Unit 3.pptx
IOT - Unit 3.pptxIOT - Unit 3.pptx
IOT - Unit 3.pptx
PallaviPatil580306
 
Verification of Four Port Router For NOC
Verification of Four Port Router For NOCVerification of Four Port Router For NOC
Verification of Four Port Router For NOC
ijsrd.com
 
ECET 465 help Making Decisions/Snaptutorial
ECET 465 help Making Decisions/SnaptutorialECET 465 help Making Decisions/Snaptutorial
ECET 465 help Making Decisions/Snaptutorial
pinck2329
 
Ijecet 06 08_004
Ijecet 06 08_004Ijecet 06 08_004
Ijecet 06 08_004
IAEME Publication
 
Implementation of Steganographic Method Based on IPv4 Identification Field ov...
Implementation of Steganographic Method Based on IPv4 Identification Field ov...Implementation of Steganographic Method Based on IPv4 Identification Field ov...
Implementation of Steganographic Method Based on IPv4 Identification Field ov...
IJERA Editor
 

Similar to Av35266270 (20)

A NOVEL ROBUST ROUTER ARCHITECTURE
A NOVEL ROBUST ROUTER ARCHITECTURE A NOVEL ROBUST ROUTER ARCHITECTURE
A NOVEL ROBUST ROUTER ARCHITECTURE
 
Internal Architecture of Junction Based Router
Internal Architecture of Junction Based RouterInternal Architecture of Junction Based Router
Internal Architecture of Junction Based Router
 
Internal Architecture of Junction Based Router
Internal Architecture of Junction Based RouterInternal Architecture of Junction Based Router
Internal Architecture of Junction Based Router
 
Internal Architecture of Junction Based Router
Internal Architecture of Junction Based RouterInternal Architecture of Junction Based Router
Internal Architecture of Junction Based Router
 
Ieee 2015 project list_vlsi
Ieee 2015 project list_vlsiIeee 2015 project list_vlsi
Ieee 2015 project list_vlsi
 
Ieee 2015 project list_vlsi
Ieee 2015 project list_vlsiIeee 2015 project list_vlsi
Ieee 2015 project list_vlsi
 
Me,be ieee 2015 project list_vlsi
Me,be ieee 2015 project list_vlsiMe,be ieee 2015 project list_vlsi
Me,be ieee 2015 project list_vlsi
 
IRJET- Design of Virtual Channel Less Five Port Network
IRJET- Design of Virtual Channel Less Five Port NetworkIRJET- Design of Virtual Channel Less Five Port Network
IRJET- Design of Virtual Channel Less Five Port Network
 
Power Analysis of Embedded Low Latency Network on Chip
Power Analysis of Embedded Low Latency Network on ChipPower Analysis of Embedded Low Latency Network on Chip
Power Analysis of Embedded Low Latency Network on Chip
 
FPGA IMPLEMENTATION OF PRIORITYARBITER BASED ROUTER DESIGN FOR NOC SYSTEMS
FPGA IMPLEMENTATION OF PRIORITYARBITER BASED ROUTER DESIGN FOR NOC SYSTEMSFPGA IMPLEMENTATION OF PRIORITYARBITER BASED ROUTER DESIGN FOR NOC SYSTEMS
FPGA IMPLEMENTATION OF PRIORITYARBITER BASED ROUTER DESIGN FOR NOC SYSTEMS
 
FPGA IMPLEMENTATION OF PRIORITYARBITER BASED ROUTER DESIGN FOR NOC SYSTEMS
FPGA IMPLEMENTATION OF PRIORITYARBITER BASED ROUTER DESIGN FOR NOC SYSTEMSFPGA IMPLEMENTATION OF PRIORITYARBITER BASED ROUTER DESIGN FOR NOC SYSTEMS
FPGA IMPLEMENTATION OF PRIORITYARBITER BASED ROUTER DESIGN FOR NOC SYSTEMS
 
TCP/IP 3RD SEM.2012 AUG.ASSIGNMENT
TCP/IP 3RD SEM.2012 AUG.ASSIGNMENTTCP/IP 3RD SEM.2012 AUG.ASSIGNMENT
TCP/IP 3RD SEM.2012 AUG.ASSIGNMENT
 
VERIFICATION OF FOUR PORT ROUTER FOR NETWORK ON CHIP
VERIFICATION OF FOUR PORT ROUTER FOR NETWORK ON CHIPVERIFICATION OF FOUR PORT ROUTER FOR NETWORK ON CHIP
VERIFICATION OF FOUR PORT ROUTER FOR NETWORK ON CHIP
 
Serial interface module for ethernet based applications
Serial interface module for ethernet based applicationsSerial interface module for ethernet based applications
Serial interface module for ethernet based applications
 
6 weeks/months project training from CMC Faridabad - Ppt of ccna project from...
6 weeks/months project training from CMC Faridabad - Ppt of ccna project from...6 weeks/months project training from CMC Faridabad - Ppt of ccna project from...
6 weeks/months project training from CMC Faridabad - Ppt of ccna project from...
 
IOT - Unit 3.pptx
IOT - Unit 3.pptxIOT - Unit 3.pptx
IOT - Unit 3.pptx
 
Verification of Four Port Router For NOC
Verification of Four Port Router For NOCVerification of Four Port Router For NOC
Verification of Four Port Router For NOC
 
ECET 465 help Making Decisions/Snaptutorial
ECET 465 help Making Decisions/SnaptutorialECET 465 help Making Decisions/Snaptutorial
ECET 465 help Making Decisions/Snaptutorial
 
Ijecet 06 08_004
Ijecet 06 08_004Ijecet 06 08_004
Ijecet 06 08_004
 
Implementation of Steganographic Method Based on IPv4 Identification Field ov...
Implementation of Steganographic Method Based on IPv4 Identification Field ov...Implementation of Steganographic Method Based on IPv4 Identification Field ov...
Implementation of Steganographic Method Based on IPv4 Identification Field ov...
 

Recently uploaded

How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
saastr
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
christinelarrosa
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
christinelarrosa
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
Fwdays
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 

Recently uploaded (20)

How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 

Av35266270

  • 1. Shaik. Mallika et al. Int. Journal of Engineering Research and Application www.ijera.com Vol. 3, Issue 5, Sep-Oct 2013, pp.266-270 www.ijera.com 266 | P a g e Design and Implementation of Robust Router Using Vlsi Shaik. Mallika1, P. Srinivas2, Md. Taj3 1Dept.of ECE Nimra College of Engineering & Technology, Jupudi, Vijayawada, A.P-India. 2Assistant Professor Dept.of ECE Nimra College of Engineering & Technology, Vijayawada, A.P-India. 3Assistant Professor Dept.of ECE ,Bapatla engineering college, bapatla, Guntur dt, A.P-India. Abstract In his paper we attempt to give a networking solution by applying VLSI architecture techniques to router design for networking systems to provide intelligent control over the network. Networking routers today have limited input/output configurations, which we attempt to overcome by adopting bridging loops to reduce the latency and security concerns. Other techniques we explore include the use of multiple protocols. We attempt to overcome the security and latency issues with protocol switching technique embedded in the router engine itself. The approach is based on hardware coding to reduce the impact of latency issues as the hardware itself is designed according to the need. We attempt to provide a multipurpose networking router by means of Verilog code, thus we can maintain the same switching speed with more security as we embed the packet storage buffer on chip and generate the code as a self-independent VLSI Based router. Our main focus is the implementation of hardware IP router. The approach enables the router to process multiple incoming IP packets with different versions of protocols simultaneously, e.g. for IPv4 and IPv6. The approach will results in increased switching speed of routing per packet for both current trend protocols, which we believe would result in considerable enhancement in networking systems. Keywords: Robust Router, packets, FPGA, RTL, IP I. INTRODUCTION Our approach here is to design a variable hardware router code by using Verilog and the same to be implemented for the SOC (System On Chip) level router. In this paper we are making a VLSI design for the implementation at the synthesizable level the same can be further enhanced to SOC level, but our main aim is limited to the NetList generation level which would give the result prediction and workable module vision. Our focus being in this is to make this router as much variable as we can which will give the robustness for the design to be called even as a Robust Router in which we can make the same router to not only go for N number of connections but also to detect all variety of packets and route the same. To do so we have to add the code with specific case’s for every type of packets we want to add to our router to route, with this paper of hardware code our approach is to get the basic packets routing with multiple protocols starting with the IPv4 and IPv6. II. LITERATURE SURVEY In this we are comparing the existing generic router architecture and our new robust router architecture. This will give the difference in the designing and would reflect our paper enhancements that we are upgrading in our robust router paper. A. Generic Router Architecture Figure 1 Generic architecture In the architecture we can look that the generic architecture is processing a single packet of a specific protocol at a given time and the output queue buffer also one for one egress channel ring by which there is the RESEARCH ARTICLE OPEN ACCESS
  • 2. Shaik. Mallika et al. Int. Journal of Engineering Research and Application www.ijera.com Vol. 3, Issue 5, Sep-Oct 2013, pp.266-270 www.ijera.com 267 | P a g e overloading of the queue buffer and will result in the congestion. The congestion flow is as shown below. Figure 2 Congestion flow III. A NEW ROBUST ROUTER ARCHITECTURE The architecture of robust router is totally based on the Verilog code which would enable our design in the implementation of parallel packet processing for N number of channels. This intern enables the multi packet processing at the same time. With the Verilog code being the base of design we have an option for the addition of protocol case and respective look-up table makes us go for the Multi- protocol processing at the same time. By which we are unable to provide the multi-packet multi- protocol routing at the same time with same speed. Figure 3 Multi-protocal Multi packet processing at a tree While designing the robust router a special concern is kept in the mind of the switching speed issue to give the maximum speed with parallelism being added. The egress output buffer queuing problem was also solved by providing a separate queue for every ingress channel in the egress channel with N vertical queue by which we can avoid the congestion to a remarkable level which is as shown below. Figure 4 Congestion flow with vertical queue The size issue is another special feature of our robust router which makes our robust router a unique system. As discussed earlier in the paper we are trying to make the Robust router on to the chip level design so we further advance it to the level of Ethernet based router which will make the router to be implemented on the standalone systems, which will be a revolutionary enhancement in size matter from room full of router to just the PCI slot operating Router and will make network work more faster. It looks something like this below. Generally, the router can be interfaced with ‘N’ number of I/O devices. Block diagram given below. Figure 5 Block diagram The paper design has the following modules. A. Input Interface Block This block is mainly responsible for receiving the incoming IP packets over multiple input channels. This block asserts the necessary response signals in order to communicate with the IP packet driver modules. After receiving the IP packets, this block forward the same to the Ingress Block for the further process. This block forwards the same to packet store block as well as parser block. B. Packet Store Block This is responsible for storing the error free received packets. This module receives the packet contents from Ingress block and dispatches the same based on the request from Egress block.
  • 3. Shaik. Mallika et al. Int. Journal of Engineering Research and Application www.ijera.com Vol. 3, Issue 5, Sep-Oct 2013, pp.266-270 www.ijera.com 268 | P a g e C. Parser Block This block is mainly responsible for parsing the complete packet into multiple set of data according to its field. The parsed contents will be inputted to the filer block.The above three blocks are merged all together as IIB in code to single file. D. Filer Block This block is responsible for selecting the egress ring. The block receives the parsed data from the parser block. The parsed data will be forwarded to the filer table. In response to this, the filer table provides the output ring number. Then, the received output from the filer table will be forwarded to the egress block. E. Filer Table It is a user configurable table. This table contains a set of data in its each slot, against which the data sent by the filer block will be compared. If the filer block inputted data matches with the data of any slot of filer table, then that slot’s data will be used as egress ring through which received packet will be forwarded. F. Egress Block This block receives the data from filer block as egress ring number through which the received packet shall be forwarded. Upon receiving the egress ring number, this block initiates the communication with packet store block to fetch the packet to be forwarded. Then, the fetched IP packet will be forwarded to the output interface block with the output channel details, over which the packet has to be transmitted. G. Output Interface Block Upon receiving the packet with output port details from the egress block, this block forwards the IP packet over mentioned output channel. This block is also responsible for asserting all the necessary handshaking signals for the receiving device while transmitting the packets. The Egress Block and Output Interface Block are merged together in code as single file. Figure 6 Forwarding IP packet IV. SYSTEM FLOW DIAGRAM The system flow diagram is as shown below which makes us to understand the flow of the signals through the system from each block by block and transaction carried between the blocks to accomplish the task of the robust router. The flow diagram described here is a brief one, which helps us to understand the flow of every block. Every block have the state machine cycle included in them to enhance the system logical transaction to the level of parallelism. The flow diagram is as shown in Figure 7 below. First the packet is received from the ingress channel ring to the input interface block the packet is parsed to data packet and header packet, the data packet is stored in the parser queue and the header is sent to the filer block. The flier block then checks weather the packet is IPv4 or IPv6 and accordingly send the request to the filer table to router the packet to required destination. The filer table cross verifies the egress ring channel with it Dest-IP address and send the egress ring ID to the filer block. The filer block send and enables the particular egress ring in egress blocks and gives the command to the particular egress ring in egress block. Then in egress block the stored data packet in the parser queue is added back with header and is sent out with the specified egress ring channel. In this way the every packet is processed and routed in robust router. Figure 7 System flow diagram V. SIMULATION AND DISCUSSION A.Net List of the Robust Router The Net List is RTL level of the robust router system, which is syntasizable and can be extracted on the Xilinx tool. By which we can get preface look of the system and a transition from the frontend of the VLSI designing to backend of the VLSI designing. Which means the same can run on FPGA kit and test its robustness and errors of the system can be debugged before it is taken to SOC Level and to Fab-Labs. The snap below is the Pin configuration of the proposed Robust Router.
  • 4. Shaik. Mallika et al. Int. Journal of Engineering Research and Application www.ijera.com Vol. 3, Issue 5, Sep-Oct 2013, pp.266-270 www.ijera.com 269 | P a g e Figure 8 Net List The NetList level can further go after I/O Padding get the exact pin configuration which can be derived accordingly but will be similar one. The Snap below is the Top level system view of the system at the RTL. Figure 9 View of the system at the RTL B.SOC Designing The further movements of the VLSI Designing will require the sharp knowledge of the VLSI backend designing and can be fabricated at the 45 nano technology using the Cadence Encounter Tool which will enable us to take the system to SOC level the steps are as shown below. Figure 10 System to SOC level the steps The RTL level of design which we get from the Net List of the system will have gate delay, propagation delay and wire delays included in them. These are all calculated and made into an optimization level. Then the design is fixed into LUT’S and the mapped between the LUT’S further the placement of the LUT’S are prissily done keeping mind the power utilization and the delay calculated earlier. Then the routing is done between the CLB’S. Further the bit- stream is generated to test the system and verification done across the Net List output to get the exact design. Then the system design is masked and made to the GDSSI Level further to be sent on to the Fab-Labs for fabrication. C. Design under Test The design under test [DUT] is made to test the system robustness under different cases. The DUT Figure 11 DUT architecture For the testing of the robustness here we are mixing theIPv4 and IPv6 packets and we testing the system in different cases. VI. CONCLUSIONS We summarise the advantages and applications below. A. Advantages architecture includes the Test case which will define the test. The input driver block will generate the test input signals for the system testing. The input and output transacted will make the system get the input and output according to the system core requirement. The input and out monitor are placed to compare the system testing. At last the Response checker is to give the system testing pass or fail. The DUT is as shown below. General purpose router 
  • 5. Shaik. Mallika et al. Int. Journal of Engineering Research and Application www.ijera.com Vol. 3, Issue 5, Sep-Oct 2013, pp.266-270 www.ijera.com 270 | P a g e  Router hardware code is variable   More secured   Robust router can handle all type of  packets (Implemented on IPv4 and IPv6)  B. Application Can be used as public internetworking router   Can be used as corporate router   Software company private router (client to client,   developer to client)   Router for networking research   In other words one point networking solution REFERENCES [1] Y. Katsube, K. Nagami, and H. Esaki, “Toshiba’s Router Architecture Extensions for ATM: Overview,” IETF RFC2098, April 1997. [2] Y. Rekhter, B. Davie, D. Katz, E. Rosen, and G. Swallow, “Cisco Systems’ Tag Switching Architecture Overview,” IETF RFC 2105, Feb. 1997. Amir.Palnitkar. 2 nd Edition [3] J. Moy, OSPF: Anatomy of an Internet Routing Protocol, 1998 [4] Tobias Bjerregaard and Shankar Mahadevan. A survey of research and practices of network-on-chip. ACM Comput. Surv., 38(1):1, 2006. [5] Charles.H.Roth,Jr Digital System Design Using VHDL [6] Jenkins,jesse H.Designing with FPGAs and CPLDs [7] Abromovici,M,Breuer Digital System Testing and Testable Design. [8] James Balfour and William J. Dally. Design tradeoffs for tiled cmp on-chip networks. In ICS ’06: Proceedings of the 20th annual international conference on Supercomputing, pages 187–198, 2006.