Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jaroslaw J. Sydir is active.

Publication


Featured researches published by Jaroslaw J. Sydir.


Network Processor Design#R##N#Issues and Practices Volume 2 | 2004

Implementing Voice over AAL2 on a Network Processor

Jaroslaw J. Sydir; Prashant R. Chandra; Alok Kumar; Sridhar Lakshmanamurthy; Longsong Lin; Muthaiah Venkatachalam

Publisher Summary The flexibility and programmability of next-generation network-processing units (NPU) make them a key component of next-generation telecommunications equipment. NPUs can support a variety of packet-processing applications, with a variety of different requirements. This chapter discusses the special requirements and challenges presented by the Voice over AAL2 (VoAAL2) application. The architecture and design of a VoAAL2 application developed for the Intel IXP2400 processor is described, and the features of an NPU that are required to support this type of application are discussed. With strict quality of service requirements and asynchronous inputs, VoAAL2 can be performed on an NPU. The application is most naturally implemented using an asynchronous programming model. It is found that the IXP2400 naturally supports such a programming model. Support for asynchronous components that span microengines can be improved by adding support for a distributed lock manager.


Archive | 2011

Resource management and interference mitigation techniques for relay-based wireless networks

Ozgur Oyman; Qinghua Li; Nageen Himayat; Jaroslaw J. Sydir


Archive | 2009

Cooperative communications techniques

Ozgur Oyman; Jaroslaw J. Sydir


Archive | 2010

Multi-radio communication between wireless devices

Nageen Himayat; Shilpa Talwar; Kerstin Johnsson; Jaroslaw J. Sydir


Archive | 2009

Method and apparatus for scheduling the processing of commands for execution by cryptographic algorithm cores in a programmable network processor

Jaroslaw J. Sydir; Chen-Chi Kuo; Kamal J. Koshy; Wajdi K. Feghali; Bradley Burres; Gilbert Wolrich


Archive | 2009

Method and apparatus for performing an authentication after cipher operation in a network processor

Jaroslaw J. Sydir; Kamal J. Koshy; Wajdi K. Feghali; Bradley Burres; Gilbert Wolrich


Archive | 2003

Network processor having cryptographic processing including an authentication buffer

Jaroslaw J. Sydir; Kamal J. Koshy; Wajdi K. Feghali; Bradley Burres; Gilbert Wolrich


Archive | 2010

Multi-tier network interference mitigation

Shilpa Talwar; Kerstin Johnsson; Nageen Himayat; Shu-Ping Yeh; Jaroslaw J. Sydir


Archive | 2003

Method and apparatus for calculating CRC on data using a programmable CRC engine

Jaroslaw J. Sydir; Alok Mathur; Wajdi K. Feghali; Kamal J. Koshy; Eduard Lecha


Archive | 2003

Method and apparatus for aligning ciphered data

Jaroslaw J. Sydir; Kamal J. Koshy; Wajdi K. Feghali; Bradley Burres; Gilbert Wolrich

Researchain Logo
Decentralizing Knowledge