SoNIC: Precise Realtime Software Access and Control of Wired Networks
نویسندگان
چکیده
The physical and data link layers of the network stack offer untapped potential to systems programmers and network researchers. In particular, idle characters that only reside in the physical layer can be used to accurately measure interpacket delays which are used for various network research [1]. Unfortunately, the physical and data link layers are usually implemented in hardware and not easily accessible to systems programmers. Further, systems programmers often treat these lower layers as a black box. Not to mention that commodity network interface cards (NICs) do not provide nor allow an interface for users to access the physical layer in any case. Consequently, operating systems cannot access the physical layer either. Software access to the PHY is only enabled via special tools such as BiFocals [1] which uses physics equipment, including a laser and an oscilloscope. In this poster, we will present SoNIC, Softwaredefined Network Interface Card [2] which provides users with unprecedented flexible realtime access to the 10 Gigabit Ethernet (GbE) physical layer from software. SoNIC consists of commodity off-the-shelf multi-core processors and a field-programmable gate array (FPGA) development board with peripheral component interconnect express (PCIe) Gen 2.0 bus. High-bandwidth PCIe interfaces and powerful FPGAs can support full bidirectional data transfer for two 10 GbE ports. Further, we created and implemented optimized techniques to achieve not only high-performance packet processing, but high-performance 10 GbE bitstream control in software. Parallelism and optimizations allow SoNIC to process multiple 10 GbE bitstreams at line-speed. With software access to the PHY, SoNIC provides the opportunity to improve upon and develop new network research applications which were not previously feasible. Along with the poster, we will demonstrate follow-
منابع مشابه
SoNIC over 1G
In standard environments, both Data Link and the Physical (PHY) layers are defined in the Network Interface Cards (NIC) and they cannot be accessed in real-time via software. However, these lower layers contain valuable information that can be used to measure and to improve the performance of the network. Recently, SoNIC [1] was proposed to provide realtime access to the Physical Layer and it w...
متن کاملAssessment of DSACC and QPART Algorithms in Ad Hoc Networks
The rapid advancement in wireless over wired has augmented the need for improving theQuality of Service (QoS) over such wireless links. However, the wireless ad hoc networkshave too low bandwidth, and establishing a QoS in these networks is a difficult issue. So,support of quality of service in ad hoc networks is the topical issue among the networkscience researchers. In this research we are go...
متن کاملNetwork Analysis using SoNIC
The physical and data link layer of the network stack contain valuable information. SoNIC (Software-defined Network Interface Card) provides software access to these layers by implementing them in software. It provides complete control over network stack in real-time. With SoNIC, we are able to perform precise network measurements. Also, GENI (Global Environment for Network Innovations) provide...
متن کاملAn Overview of 802.11 Wireless Network Security Standards & Mechanisms
The 802.11 wireless networks is one of the most attractive and fast growing networks. Because of its easy and fast deployment and installation, there are more and more users considering using this type of network than the wired version. In this document, you will find out how to secure an 802.11 wireless network by understanding its security protocols and mechanism. We will describe security pr...
متن کاملAn Overview of 802.11 Wireless Network Security Standards & Mechanisms
The 802.11 wireless networks is one of the most attractive and fast growing networks. Because of its easy and fast deployment and installation, there are more and more users considering using this type of network than the wired version. In this document, you will find out how to secure an 802.11 wireless network by understanding its security protocols and mechanism. We will describe security pr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013