Evolution of the Virtual Interface Architecture
نویسندگان
چکیده
T o provide a faster path between applications and the network, most researchers have advocated removing the operating system kernel and its centralized networking stack from the critical path and creating a user-level network interface. With these interfaces, designers can tailor the communication layers each process uses to the demands of that process. Consequently, applications can send and receive network packets without operating system intervention, which greatly decreases communication latency and increases network throughput. Unfortunately, the diversity of approaches and lack of consensus has stalled progress in refining research results into products—a prerequisite to the widespread adoption of these interfaces. Recently, however, Intel, Microsoft, and Compaq have introduced the Virtual Interface Architecture, 1 an emerging standard for cluster or system-area networks. Products based on the VIA have already surfaced, notably GigaNet's GNN1000 network interface (http://www.giganet. com). As more products appear, research into application level issues can proceed and the technology of user-level network interfaces should mature. Several prototypes—among them Cornell University's U-Net 2 —have heavily influenced the VIA. In this article, we describe the architectural issues and design trade-offs at the core of these prototype designs, including • How to provide applications with direct access to the network interface hardware, yet retain sufficient protection to ensure that applications can't interfere with each other. • How to design an efficient, yet versatile programming interface. Applications must be able to access the network interface and still control buffering, scheduling, and addressing. The programming interface, on the other hand, must accommodate a wide variety of hardware implementations. • How to manage resources, in particular memory. Applications must consider the costs of DMA transfers that map a virtual address to a physical one. At the same time, implementation-specific details must be hidden from the application, and the operating system must ultimately control all resource allocation. • How to manage fair access to the network without a kernel path which, in traditional protocol stacks, acts as a central point of control and scheduling. Network performance is traditionally described by the bandwidth achieved when an infinite stream is transmitted. However, an increasing number of applications are more sensitive to the network's round-trip time, or communication latency, and the bandwidth when sending many small messages. Communication latency is due mainly to processing overhead—the time the processor spends handling messages at the sending and receiving ends. This may include managing the buffers, copying the message, computing checksums, handling …
منابع مشابه
Using a Virtual Reality Environment to Simulate the Pushing of Cylindrical Nanoparticles
With the rise in the use of AFM (Atomic Force Microscope), we have witnessed a growing use of atomic microscope based nanorobots in the precise displacement of various particles. There are certain limitations to the application of nanorobots in the moving of nanoparticles. One of the most important of these limitations is the lack of an appropriate image feedback concurrent with the displaci...
متن کاملAn Analytical Study of the Evolution of Qajar Palaces
The political and social system involved in the limbo between tradition and modernity of the Qajar Era caused widespread and quick developments in Iranian culture, art, and architecture as well as a challenge between tradition and modernity. Relatively numerous palaces built in this era were signs of greatness and distinction-seeking of the Qajar kings and aristocrats, who embraced all transfor...
متن کاملProposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface
Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...
متن کاملHistorical Evolution of Qajar House of Baqeri in Gorgan
Iranian historical houses constitute a significant part of the architectural heritage of the country both qualitatively and quantitatively though due research is not conducted on them. This study investigates t0he physical evolution of Qajar House of Baqeri in Gorganand attempts to monitor life stream over its lifespan. The study also investigates the effect of external transformations on archi...
متن کاملThe Study in Architects’ Thoughts Evolution in Pahlavi Era by Using Content Analysis
The study of the architectural history is a critical attempt to understanding the architecture. Our expectation of studying history of architecture is not just understanding past, but the relationship between past and future. Contemporary architectural scholars should not consider architecture as changing and renewing phenomenon, but pinpoint its nature, beginning and the process of its transfo...
متن کاملOrigami: Japanese Architecture and its Aesthetic Adaptability with the Western Theorists’ Point of View
In terms of specialized vocabulary, origami is a pattern with a fixed structure created by smooth folded surfaces. Today, the origami art pattern, or folded paper, has become a source of inspiration for architects, designers, and researchers. The definition of beauty in specialized lexicography includes the evolution of rational features, sounds, and concepts, and in a broader sense examines th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IEEE Computer
دوره 31 شماره
صفحات -
تاریخ انتشار 1998