Hamlyn: a high-performance network interface with sender-based memory management
نویسندگان
چکیده
• automatic message reassembly even if packets arrive out of order, which allows use of adaptive-routing networks having greater throughput and fault-tolerance; • simple design: the interface can be implemented directly in hardware state machines for speed; • protection against node failures and rogue messages: eliminates need for per-message software checks; • a rich set of message-delivery notification schemes gives applications choices between minimizing latency and maximizing functionality. The first Hamlyn design incorporated most of these features [Wilkes92]. It was developed as a way to integrate a fast, packet-switched interconnect, known as FedEx, 1 which supported adaptive routing into a large-scale MIMD multicomputer. This work expands on that design by: • reporting performance data from software and hardware prototypes; • extending the schemes available for notification of message arrival; • extending the original packet-counting scheme to a more powerful one that supports generalized group-receive semantics; • presenting low-level protocols that sit atop the hardware interface. Hamlyn was designed with a RISC-like philosophy: make the common cases fast, and the less common ones 1. FedEx was the successor to the PostOffice switching chip developed by the HP Labs Mayfly project [Davis92].
منابع مشابه
Hamlyn — an interface for sender- based communications
Providing high performance, low-overhead inter-processor communication is a necessity if the promise of scalable distributed-memory multiprocessors is to be achieved. This paper uses a characterization of three different types of interconnect traffic to drive the development of an innovative high-speed interconnect interface. This uses sender-controlled message placement at the recipient, which...
متن کاملThe Feedback Based Mechanism for Video Streaming Over Multipath Ad Hoc Networks
Ad hoc networks are multi-hop wireless networks without a pre-installed infrastructure. Such networks are widely used in military applications and in emergency situations as they permit the establishment of a communication network at very short notice with a very low cost. Video is very sensitive for packet loss and wireless ad-hoc networks are error prone due to node mobility and weak links. H...
متن کاملNew High Secure Network Steganography Method Based on Packet Length
In network steganography methods based on packet length, the length of the packets is used as a carrier for exchanging secret messages. Existing methods in this area are vulnerable against detections due to abnormal network traffic behaviors. The main goal of this paper is to propose a method which has great resistance to network traffic detections. In the first proposed method, the sender embe...
متن کاملBu er Management in Shared - Memory Time Warp
Mechanisms for managing message buuers in Time Warp parallel simulations executing on cache-coherent shared-memory multiprocessors are studied. Two simple buuer management strategies called the sender pool and receiver pool mechanisms are examined with respect to their eeciency, and in particular, their interaction with multiprocessor cache-coherence protocols. Measurements of implementations o...
متن کاملScalable resource management for high-performance Web servers
Although many research efforts have been devoted to network congestion in the face of an increase in the Internet traffic, there is little recent discussion on performance improvements for endhosts. In this paper, we propose a new architecture, called Scalable Socket Buffer Tuning (SSBT), to provide high-performance and fair service for many TCP connections at Internet endhosts. SSBT has two ma...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1995