The challenges of computing at astronomical scale

Size: px
Start display at page:

Download "The challenges of computing at astronomical scale"

Transcription

1 Netherlands Institute for Radio Astronomy The challenges of computing at astronomical scale Chris Broekema Thursday 15th February, 2018, New Zealand SKA Forum 2018, Auckland, New Zealand ASTRON is part of the Netherlands Organisation for Scientific Research (NWO)

2 Introduction A whirlwind tour through the trials and tribulations of more than a decade of compute system design for radio astronomy. What are we trying to achieve? Tools in our inventory That s the theory, how does it work in practice? Some future work 2

3 What is our business goal? Modern radio telescopes rely heavily on compute power 3

4 What is our business goal? Modern radio telescopes rely heavily on compute power Budgets are limited 4

5 What is our business goal? Modern radio telescopes rely heavily on compute power Budgets are limited Computing is only a small fraction of these 5

6 What is our business goal? Modern radio telescopes rely heavily on compute power Budgets are limited Computing is only a small fraction of these So we want to maximize the scientific value of our investment 6

7 Costs of a compute system Compute systems are cost bound by limited capital and, more recently, energy budgets. The total cost of a compute system can be divided into: Capital investment Development cost Porting of existing applications to a new platform Implementing new science capabilities Operational cost Operational staff cost Maintenance cost (both parts and labour) Energy consumption (excluding cooling) Cooling Infrastructure (rack- and floor-space) These combined are the total cost of ownership (TCO) of the system. 7

8 Costs of a compute system Compute systems are cost bound by limited capital and, more recently, energy budgets. The total cost of a compute system can be divided into: Capital investment Development cost Porting of existing applications to a new platform Implementing new science capabilities Operational cost Operational staff cost Maintenance cost (both parts and labour) Energy consumption (excluding cooling) Cooling Infrastructure (rack- and floor-space) These combined are the total cost of ownership (TCO) of the system. 8

9 Costs of a compute system Compute systems are cost bound by limited capital and, more recently, energy budgets. The total cost of a compute system can be divided into: Capital investment Development cost Porting of existing applications to a new platform Implementing new science capabilities Operational cost Operational staff cost Maintenance cost (both parts and labour) Energy consumption (excluding cooling) Cooling Infrastructure (rack- and floor-space) These combined are the total cost of ownership (TCO) of the system. 9

10 Costs of a compute system Compute systems are cost bound by limited capital and, more recently, energy budgets. The total cost of a compute system can be divided into: Capital investment Development cost Porting of existing applications to a new platform Implementing new science capabilities Operational cost Operational staff cost Maintenance cost (both parts and labour) Energy consumption (excluding cooling) Cooling Infrastructure (rack- and floor-space) These combined are the total cost of ownership (TCO) of the system. 10

11 Costs of a compute system Compute systems are cost bound by limited capital and, more recently, energy budgets. The total cost of a compute system can be divided into: Capital investment Development cost Porting of existing applications to a new platform Implementing new science capabilities Operational cost Operational staff cost Maintenance cost (both parts and labour) Energy consumption (excluding cooling) Cooling Infrastructure (rack- and floor-space) These combined are the total cost of ownership (TCO) of the system. 11

12 Costs of a compute system Compute systems are cost bound by limited capital and, more recently, energy budgets. The total cost of a compute system can be divided into: Capital investment Development cost Porting of existing applications to a new platform Implementing new science capabilities Operational cost Operational staff cost Maintenance cost (both parts and labour) Energy consumption (excluding cooling) Cooling Infrastructure (rack- and floor-space) These combined are the total cost of ownership (TCO) of the system. 12

13 Costs of a compute system Compute systems are cost bound by limited capital and, more recently, energy budgets. The total cost of a compute system can be divided into: Capital investment Development cost Porting of existing applications to a new platform Implementing new science capabilities Operational cost Operational staff cost Maintenance cost (both parts and labour) Energy consumption (excluding cooling) Cooling Infrastructure (rack- and floor-space) These combined are the total cost of ownership (TCO) of the system. 13

14 Costs of a compute system Compute systems are cost bound by limited capital and, more recently, energy budgets. The total cost of a compute system can be divided into: Capital investment Development cost Porting of existing applications to a new platform Implementing new science capabilities Operational cost Operational staff cost Maintenance cost (both parts and labour) Energy consumption (excluding cooling) Cooling Infrastructure (rack- and floor-space) These combined are the total cost of ownership (TCO) of the system. 14

15 Costs of a compute system Compute systems are cost bound by limited capital and, more recently, energy budgets. The total cost of a compute system can be divided into: Capital investment Development cost Porting of existing applications to a new platform Implementing new science capabilities Operational cost Operational staff cost Maintenance cost (both parts and labour) Energy consumption (excluding cooling) Cooling Infrastructure (rack- and floor-space) These combined are the total cost of ownership (TCO) of the system. 15

16 Costs of a compute system Compute systems are cost bound by limited capital and, more recently, energy budgets. The total cost of a compute system can be divided into: Capital investment Development cost Porting of existing applications to a new platform Implementing new science capabilities Operational cost Operational staff cost Maintenance cost (both parts and labour) Energy consumption (excluding cooling) Cooling Infrastructure (rack- and floor-space) These combined are the total cost of ownership (TCO) of the system. 16

17 Total value of a compute system The sum of the science results can considered the value of the system. These are difficult to quantify, especially a priori. We can identify some elements that impact system effectiveness in this respect. Peak performance Efficiency Robustness Programmability Flexibility Suitability / fitness for purspose The combination of these elements define the total value of ownership (TVO) 17

18 Total value of a compute system The sum of the science results can considered the value of the system. These are difficult to quantify, especially a priori. We can identify some elements that impact system effectiveness in this respect. Peak performance Efficiency Robustness Programmability Flexibility Suitability / fitness for purspose The combination of these elements define the total value of ownership (TVO) 18

19 Total value of a compute system The sum of the science results can considered the value of the system. These are difficult to quantify, especially a priori. We can identify some elements that impact system effectiveness in this respect. Peak performance Efficiency Robustness Programmability Flexibility Suitability / fitness for purspose The combination of these elements define the total value of ownership (TVO) 19

20 Total value of a compute system The sum of the science results can considered the value of the system. These are difficult to quantify, especially a priori. We can identify some elements that impact system effectiveness in this respect. Peak performance Efficiency Robustness Programmability Flexibility Suitability / fitness for purspose The combination of these elements define the total value of ownership (TVO) 20

21 Total value of a compute system The sum of the science results can considered the value of the system. These are difficult to quantify, especially a priori. We can identify some elements that impact system effectiveness in this respect. Peak performance Efficiency Robustness Programmability Flexibility Suitability / fitness for purspose The combination of these elements define the total value of ownership (TVO) 21

22 Total value of a compute system The sum of the science results can considered the value of the system. These are difficult to quantify, especially a priori. We can identify some elements that impact system effectiveness in this respect. Peak performance Efficiency Robustness Programmability Flexibility Suitability / fitness for purspose The combination of these elements define the total value of ownership (TVO) 22

23 Scientific value Our challenge is to design a system and associated software stack that offers the most scientific output for a given investment. Or, more formally, we want to find the maximum of: Scientific value of a system SV = TVO TCO 23

24 The tools we can use Reduce cost per Flop? (double precision, single precision, half precision?) Gbps? PByte? Nature publication? Nobel prize? Increase and / or protect value 24

25 The tools we can use Reduce cost per Flop? (double precision, single precision, half precision?) Gbps? PByte? Nature publication? Nobel prize? Increase and / or protect value 25

26 The tools we can use Reduce cost per Flop? (double precision, single precision, half precision?) Gbps? PByte? Nature publication? Nobel prize? Increase and / or protect value 26

27 The tools we can use Reduce cost per Flop? (double precision, single precision, half precision?) Gbps? PByte? Nature publication? Nobel prize? Increase and / or protect value 27

28 The tools we can use Reduce cost per Flop? (double precision, single precision, half precision?) Gbps? PByte? Nature publication? Nobel prize? Increase and / or protect value 28

29 The tools we can use Reduce cost per Flop? (double precision, single precision, half precision?) Gbps? PByte? Nature publication? Nobel prize? Increase and / or protect value 29

30 The tools we can use Reduce cost per Flop? (double precision, single precision, half precision?) Gbps? PByte? Nature publication? Nobel prize? Increase and / or protect value 30

31 Reduce cost Drives the desire off-the-shelf components Economy of scale Limits operational and maintenance costs Software availability and quality 31

32 Reduce cost Drives the desire off-the-shelf components Economy of scale Limits operational and maintenance costs Software availability and quality 32

33 Reduce cost Drives the desire off-the-shelf components Economy of scale Limits operational and maintenance costs Software availability and quality 33

34 Reduce cost Drives the desire off-the-shelf components Economy of scale Limits operational and maintenance costs Software availability and quality 34

35 Reduce cost Drives the desire off-the-shelf components Economy of scale Limits operational and maintenance costs Software availability and quality Focus on energy efficiency Reduces operational cost, Or Allows larger installation Dynamic clocking / energy aware code 35

36 Reduce cost Drives the desire off-the-shelf components Economy of scale Limits operational and maintenance costs Software availability and quality Focus on energy efficiency Reduces operational cost, Or Allows larger installation Dynamic clocking / energy aware code 36

37 Reduce cost Drives the desire off-the-shelf components Economy of scale Limits operational and maintenance costs Software availability and quality Focus on energy efficiency Reduces operational cost, Or Allows larger installation Dynamic clocking / energy aware code 37

38 Reduce cost Drives the desire off-the-shelf components Economy of scale Limits operational and maintenance costs Software availability and quality Focus on energy efficiency Reduces operational cost, Or Allows larger installation Dynamic clocking / energy aware code 38

39 Reduce cost Drives the desire off-the-shelf components Economy of scale Limits operational and maintenance costs Software availability and quality Focus on energy efficiency Reduces operational cost, Or Allows larger installation Dynamic clocking / energy aware code Software environment Quality software environment reduces development cost Small install base often translates to poor software quality Recruitment 39

40 Reduce cost Drives the desire off-the-shelf components Economy of scale Limits operational and maintenance costs Software availability and quality Focus on energy efficiency Reduces operational cost, Or Allows larger installation Dynamic clocking / energy aware code Software environment Quality software environment reduces development cost Small install base often translates to poor software quality Recruitment 40

41 Reduce cost Drives the desire off-the-shelf components Economy of scale Limits operational and maintenance costs Software availability and quality Focus on energy efficiency Reduces operational cost, Or Allows larger installation Dynamic clocking / energy aware code Software environment Quality software environment reduces development cost Small install base often translates to poor software quality Recruitment 41

42 Reduce cost Drives the desire off-the-shelf components Economy of scale Limits operational and maintenance costs Software availability and quality Focus on energy efficiency Reduces operational cost, Or Allows larger installation Dynamic clocking / energy aware code Software environment Quality software environment reduces development cost Small install base often translates to poor software quality Recruitment 42

43 Increase and / or protect value Algorithmic advances 43

44 Increase and / or protect value Algorithmic advances Computational efficiency 44

45 Increase and / or protect value Algorithmic advances Computational efficiency Scientific improvements 45

46 Increase and / or protect value Algorithmic advances Computational efficiency Scientific improvements Hardware co-design focused on computational efficiency 46

47 Increase and / or protect value Algorithmic advances Computational efficiency Scientific improvements Hardware co-design focused on computational efficiency Amdahl s law 47

48 Increase and / or protect value Algorithmic advances Computational efficiency Scientific improvements Hardware co-design focused on computational efficiency Amdahl s law Amdahl s rules for a balanced system A system needs a bit of IO per second and one byte of main memory for each instruction per second 48

49 Increase and / or protect value Algorithmic advances Computational efficiency Scientific improvements Hardware co-design focused on computational efficiency Amdahl s law Amdahl s rules for a balanced system A system needs a bit of IO per second and one byte of main memory for each instruction per second Improve operational robustness 49

50 Increase and / or protect value Algorithmic advances Computational efficiency Scientific improvements Hardware co-design focused on computational efficiency Amdahl s law Amdahl s rules for a balanced system A system needs a bit of IO per second and one byte of main memory for each instruction per second Improve operational robustness Scheduling of compute tasks 50

51 Increase and / or protect value Algorithmic advances Computational efficiency Scientific improvements Hardware co-design focused on computational efficiency Amdahl s law Amdahl s rules for a balanced system A system needs a bit of IO per second and one byte of main memory for each instruction per second Improve operational robustness Scheduling of compute tasks Reduce required size of system (buffer expensive experiments) 51

52 Increase and / or protect value Algorithmic advances Computational efficiency Scientific improvements Hardware co-design focused on computational efficiency Amdahl s law Amdahl s rules for a balanced system A system needs a bit of IO per second and one byte of main memory for each instruction per second Improve operational robustness Scheduling of compute tasks Reduce required size of system (buffer expensive experiments) Hiding inefficiencies by multi-tennancy 52

53 Increase and / or protect value Algorithmic advances Computational efficiency Scientific improvements Hardware co-design focused on computational efficiency Amdahl s law Amdahl s rules for a balanced system A system needs a bit of IO per second and one byte of main memory for each instruction per second Improve operational robustness Scheduling of compute tasks Reduce required size of system (buffer expensive experiments) Hiding inefficiencies by multi-tennancy Security 53

54 Increase and / or protect value Algorithmic advances Computational efficiency Scientific improvements Hardware co-design focused on computational efficiency Amdahl s law Amdahl s rules for a balanced system A system needs a bit of IO per second and one byte of main memory for each instruction per second Improve operational robustness Scheduling of compute tasks Reduce required size of system (buffer expensive experiments) Hiding inefficiencies by multi-tennancy Security Explore use of non-conventional hardware 54

55 Co-design of communication and compute systems Audience participation bit: By default, what does an Ethernet switch do with network packets it does not recognize? By default, what does a (Linux) node do with network packets it does not recognize? 55

56 Co-design of communication and compute systems Audience participation bit: By default, what does an Ethernet switch do with network packets it does not recognize? By default, what does a (Linux) node do with network packets it does not recognize? 56

57 Challenges in networking for radio astronomy The combination of very high bandwidth communication with a mix of highly specialized custom designed hardware and general purpose systems is often challenging. These can be categorized into three areas: 1 Packets are forwarded on ALL ports, causing performance and packet loss (flood) 2 Packets are handled by the switch software, not hardware, causing significant performance and packet loss (loss) 3 Packets arrive on the correct node, but the wrong Ethernet port (flux) 57

58 Software-defined networks In a software-defined network the control-plane is seperated from the data-plane. A programmable network controller is added to the network that explicitly controls the behavior of the switch data-plane. Controller OpenFlow Protocol Secure Channel Group Table Flow Table Flow Table OpenFlow switch 58

59 Software-defined networks A software-defined network breaks the tigh coupling between sender and receiver. the network controller has explicit control over the data flow the network controller can rewrite IP headers to the sender does not need to know the address of the receiver, it could send to any address 59

60 Robustness of a software-defined telescope Configurable behavior for unknown packets: drop or forward header to controller. Neither will flood the network. Explicit control over the forwarding to physical ports. Control plane is seperated from the switch, mitigating performance issues for software handled traffic. 60

61 Added functionality Conceptually we can make a publish/subscribe system producers Station A A Network Controller OpenFlow B consumers Node 1 SUB B SUB C SUB C Station B B Switch C Node 2 C C Station C Node 3 61

62 So you ve carefully sized your system December last year the internet started to notice heavy and obvuscated development in the Linux kernel tree. On January 3rd Meltdown and Spectre were made public. For radio astronomy the impact may be immense: Meltdown mitigation makes context switches much more expensive Spectre mitigation impact is less obvious, but less likely to be avoidable I/O heavy workloads (such as ours) are context switch heavy Initial Lustre benchmarks showed 40% reduced throughput 62

63 So now what? The choice is simple, either: 1 Patch all systems and accept excessive performance impact 2 Or accept internal systems are trivially exploitable and secure only at the door 63

64 SKA SDP construction timeline 64

65 More Moore 65

66 More Moore 66

67 Beyond Moore 67

68 Conclusions consider how to maximize scientific value the real-world will interfere with your design SKA1 roll-out coincides with disruptive period in semi-conductor industry non-conventional hardware is coming: need to prepare 68

69 Questions 69

70 Backup slides I

71 Normal host sending a packet Packet received, with interface and destination IP Is destination IP in cache? No Enqueue packet Have we recently sent an ARP request for this IP? No Send an ARP request for this IP Yes Yes Retrieve MAC address from cache and write to Ethernet header Wait for ARP reply or timeout Send packet / Send all packets in queue which are for this IP Add IP and MAC to cache Reply ARP reply or timeout Timeout Reply to all packets in queue with ICMP host unreachable Figure: A host sending a packet II

72 LOFAR station sending a packet Packet received Retrieve static header from SRAM and write to Ethernet header Send packet Figure: LOFAR RSP board sending a packet III

73 Flooding A switch will forward a packet to all physical ports, unless it knows which port is connected to the destination host. In a radio telescope data flows are strictly uni-directional Dedicated processing boards have no need to implement protocols like ARP. IV

74 Loss due to packet handling in software The vast majority of switching is done by a dedicated ASIC. Switches also have a more general purpose CPU running the switch OS and tasks that cannot be handled by the ASIC. Packets not recognized by the ASIC are forwarded to the CPU for inspection. This is orders of magnitude slower. V

75 ARP-flux Multi-homed nodes (nodes with multiple Ethernet ports in the same network) are not uncommon in radio astronomy. A Linux will answer ARP requests for a MAC it hosts on any device it receives it on Switches will learn based on ARP replies and the port it is received on node eth :00:00:00:00:AA eth :00:00:00:00:AB ARP request:who-has ? ARP reply: is at 00:00:00:00:00:AB ARP request:who-has ? switch A B Port/MAC table: A: -/- B: -/- A: 00:00:00:00:00:AB B: -/- VI

Energy-Efficient Data Transfers in Radio Astronomy with Software UDP RDMA Third Workshop on Innovating the Network for Data-Intensive Science, INDIS16

Energy-Efficient Data Transfers in Radio Astronomy with Software UDP RDMA Third Workshop on Innovating the Network for Data-Intensive Science, INDIS16 Energy-Efficient Data Transfers in Radio Astronomy with Software UDP RDMA Third Workshop on Innovating the Network for Data-Intensive Science, INDIS16 Przemek Lenkiewicz, Researcher@IBM Netherlands Bernard

More information

Cisco 4000 Series Integrated Services Routers: Architecture for Branch-Office Agility

Cisco 4000 Series Integrated Services Routers: Architecture for Branch-Office Agility White Paper Cisco 4000 Series Integrated Services Routers: Architecture for Branch-Office Agility The Cisco 4000 Series Integrated Services Routers (ISRs) are designed for distributed organizations with

More information

THE SQUARE KILOMETER ARRAY (SKA) ESD USE CASE

THE SQUARE KILOMETER ARRAY (SKA) ESD USE CASE THE SQUARE KILOMETER ARRAY (SKA) ESD USE CASE Ronald Nijboer Head ASTRON R&D Computing Group With material from Chris Broekema (ASTRON) John Romein (ASTRON) Nick Rees (SKA Office) Miles Deegan (SKA Office)

More information

6WINDGate. White Paper. Packet Processing Software for Wireless Infrastructure

6WINDGate. White Paper. Packet Processing Software for Wireless Infrastructure Packet Processing Software for Wireless Infrastructure Last Update: v1.0 - January 2011 Performance Challenges for Wireless Networks As advanced services proliferate and video consumes an ever-increasing

More information

COMPARING COST MODELS - DETAILS

COMPARING COST MODELS - DETAILS COMPARING COST MODELS - DETAILS SOFTLAYER TOTAL COST OF OWNERSHIP (TCO) CALCULATOR APPROACH The Detailed comparison tab in the TCO Calculator provides a tool with which to do a cost comparison between

More information

Forwarding Architecture

Forwarding Architecture Forwarding Architecture Brighten Godfrey CS 538 February 14 2018 slides 2010-2018 by Brighten Godfrey unless otherwise noted Building a fast router Partridge: 50 Gb/sec router A fast IP router well, fast

More information

IX: A Protected Dataplane Operating System for High Throughput and Low Latency

IX: A Protected Dataplane Operating System for High Throughput and Low Latency IX: A Protected Dataplane Operating System for High Throughput and Low Latency Belay, A. et al. Proc. of the 11th USENIX Symp. on OSDI, pp. 49-65, 2014. Reviewed by Chun-Yu and Xinghao Li Summary In this

More information

DragonWave, Horizon and Avenue are registered trademarks of DragonWave Inc DragonWave Inc. All rights reserved

DragonWave, Horizon and Avenue are registered trademarks of DragonWave Inc DragonWave Inc. All rights reserved NOTICE This document contains DragonWave proprietary information. Use, disclosure, copying or distribution of any part of the information contained herein, beyond that for which it was originally furnished,

More information

CSC 401 Data and Computer Communications Networks

CSC 401 Data and Computer Communications Networks CSC 401 Data and Computer Communications Networks Link Layer, Switches, VLANS, MPLS, Data Centers Sec 6.4 to 6.7 Prof. Lina Battestilli Fall 2017 Chapter 6 Outline Link layer and LANs: 6.1 introduction,

More information

Switching & ARP Week 3

Switching & ARP Week 3 Switching & ARP Week 3 Module : Computer Networks Lecturer: Lucy White lbwhite@wit.ie Office : 324 Many Slides courtesy of Tony Chen 1 Ethernet Using Switches In the last few years, switches have quickly

More information

Understanding timeout settings in Digi One IAP. February

Understanding timeout settings in Digi One IAP. February Understanding timeout settings in Digi One IAP February 2018 90000649 Contents 1 Introduction... 3 1.1 Overview... 3 1.1.1 Multi-master queuing... 3 2 Examining time out dynamic... 3 2.1 Following a single

More information

Informal Quiz #01: SOLUTIONS

Informal Quiz #01: SOLUTIONS ECSE-6600: Internet Protocols Informal Quiz #01: SOLUTIONS : GOOGLE: Shiv RPI shivkuma@ecse.rpi.edu 1 Review of Networking Concepts (I): Informal Quiz SOLUTIONS For each T/F question: Replace the appropriate

More information

John W. Romein. Netherlands Institute for Radio Astronomy (ASTRON) Dwingeloo, the Netherlands

John W. Romein. Netherlands Institute for Radio Astronomy (ASTRON) Dwingeloo, the Netherlands Signal Processing on GPUs for Radio Telescopes John W. Romein Netherlands Institute for Radio Astronomy (ASTRON) Dwingeloo, the Netherlands 1 Overview radio telescopes six radio telescope algorithms on

More information

Fast packet processing in the cloud. Dániel Géhberger Ericsson Research

Fast packet processing in the cloud. Dániel Géhberger Ericsson Research Fast packet processing in the cloud Dániel Géhberger Ericsson Research Outline Motivation Service chains Hardware related topics, acceleration Virtualization basics Software performance and acceleration

More information

Introducing the Cray XMT. Petr Konecny May 4 th 2007

Introducing the Cray XMT. Petr Konecny May 4 th 2007 Introducing the Cray XMT Petr Konecny May 4 th 2007 Agenda Origins of the Cray XMT Cray XMT system architecture Cray XT infrastructure Cray Threadstorm processor Shared memory programming model Benefits/drawbacks/solutions

More information

Application of SDN: Load Balancing & Traffic Engineering

Application of SDN: Load Balancing & Traffic Engineering Application of SDN: Load Balancing & Traffic Engineering Outline 1 OpenFlow-Based Server Load Balancing Gone Wild Introduction OpenFlow Solution Partitioning the Client Traffic Transitioning With Connection

More information

FPGA Augmented ASICs: The Time Has Come

FPGA Augmented ASICs: The Time Has Come FPGA Augmented ASICs: The Time Has Come David Riddoch Steve Pope Copyright 2012 Solarflare Communications, Inc. All Rights Reserved. Hardware acceleration is Niche (With the obvious exception of graphics

More information

Got Loss? Get zovn! Daniel Crisan, Robert Birke, Gilles Cressier, Cyriel Minkenberg, and Mitch Gusat. ACM SIGCOMM 2013, August, Hong Kong, China

Got Loss? Get zovn! Daniel Crisan, Robert Birke, Gilles Cressier, Cyriel Minkenberg, and Mitch Gusat. ACM SIGCOMM 2013, August, Hong Kong, China Got Loss? Get zovn! Daniel Crisan, Robert Birke, Gilles Cressier, Cyriel Minkenberg, and Mitch Gusat ACM SIGCOMM 2013, 12-16 August, Hong Kong, China Virtualized Server 1 Application Performance in Virtualized

More information

To see how ARP (Address Resolution Protocol) works. ARP is an essential glue protocol that is used to join Ethernet and IP.

To see how ARP (Address Resolution Protocol) works. ARP is an essential glue protocol that is used to join Ethernet and IP. Lab Exercise ARP Objective To see how ARP (Address Resolution Protocol) works. ARP is an essential glue protocol that is used to join Ethernet and IP. Requirements Wireshark: This lab uses the Wireshark

More information

AN INTRODUCTION TO ARP SPOOFING

AN INTRODUCTION TO ARP SPOOFING AN INTRODUCTION TO ARP SPOOFING April, 2001 Sean Whalen Sophie Engle Dominic Romeo GENERAL INFORMATION Introduction to ARP Spoofing (April 2001) Current Revision: 1.8 Available: http://chocobospore.org

More information

Spectre and Meltdown. Clifford Wolf q/talk

Spectre and Meltdown. Clifford Wolf q/talk Spectre and Meltdown Clifford Wolf q/talk 2018-01-30 Spectre and Meltdown Spectre (CVE-2017-5753 and CVE-2017-5715) Is an architectural security bug that effects most modern processors with speculative

More information

Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs.

Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Internetworking Multiple networks are a fact of life: Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Fault isolation,

More information

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ Networking for Data Acquisition Systems Fabrice Le Goff - 14/02/2018 - ISOTDAQ Outline Generalities The OSI Model Ethernet and Local Area Networks IP and Routing TCP, UDP and Transport Efficiency Networking

More information

Duke University CompSci 356 Midterm Spring 2016

Duke University CompSci 356 Midterm Spring 2016 Duke University CompSci 356 Midterm Spring 2016 Name (Print):, (Family name) (Given name) Student ID Number: Date of Exam: Feb 25, 2016 Time Period: 11:45am-1pm Number of Exam Pages: 15 (including this

More information

Chapter 17: Distributed Systems (DS)

Chapter 17: Distributed Systems (DS) Chapter 17: Distributed Systems (DS) Silberschatz, Galvin and Gagne 2013 Chapter 17: Distributed Systems Advantages of Distributed Systems Types of Network-Based Operating Systems Network Structure Communication

More information

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 18

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 18 CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 18 1 Final project demo Please do the demo THIS week to the TAs. Or you are allowed to use

More information

Access control with OpenFlow

Access control with OpenFlow Access control with OpenFlow Student: Nguyen Bao Tri Supervisor: Dr Lee Bu Sung Francis APAN 38 th Nantou, Taiwan 2014 Presentation outline 1.Introduction: OpenFlow? Science-DMZ and project s objective

More information

Building a Fast, Virtualized Data Plane with Programmable Hardware. Bilal Anwer Nick Feamster

Building a Fast, Virtualized Data Plane with Programmable Hardware. Bilal Anwer Nick Feamster Building a Fast, Virtualized Data Plane with Programmable Hardware Bilal Anwer Nick Feamster 1 Network Virtualization Network virtualization enables many virtual networks to share the same physical network

More information

Programmable Software Switches. Lecture 11, Computer Networks (198:552)

Programmable Software Switches. Lecture 11, Computer Networks (198:552) Programmable Software Switches Lecture 11, Computer Networks (198:552) Software-Defined Network (SDN) Centralized control plane Data plane Data plane Data plane Data plane Why software switching? Early

More information

Distributed Data Infrastructures, Fall 2017, Chapter 2. Jussi Kangasharju

Distributed Data Infrastructures, Fall 2017, Chapter 2. Jussi Kangasharju Distributed Data Infrastructures, Fall 2017, Chapter 2 Jussi Kangasharju Chapter Outline Warehouse-scale computing overview Workloads and software infrastructure Failures and repairs Note: Term Warehouse-scale

More information

Cisco Wide Area Application Services and Cisco Nexus Family Switches: Enable the Intelligent Data Center

Cisco Wide Area Application Services and Cisco Nexus Family Switches: Enable the Intelligent Data Center Cisco Wide Area Application Services and Cisco Nexus Family Switches: Enable the Intelligent Data Center What You Will Learn IT departments are facing increasing pressure to accommodate numerous changing

More information

CSE398: Network Systems Design

CSE398: Network Systems Design CSE398: Network Systems Design Instructor: Dr. Liang Cheng Department of Computer Science and Engineering P.C. Rossin College of Engineering & Applied Science Lehigh University February 23, 2005 Outline

More information

SKA SDP : A snapshot of recent technical directions and conclusions

SKA SDP : A snapshot of recent technical directions and conclusions SKA SDP : A snapshot of recent technical directions and conclusions Chris Broekema ASTRON Netherlands Institute for Radio Astronomy Highlights A whirlwind overview of recent prototyping and design work

More information

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Reminder: Datalink Functions Computer Networking. Datalink Architectures Reminder: Datalink Functions 15-441 15 441 15-641 Computer Networking Lecture 5 Media Access Control Peter Steenkiste Fall 2015 www.cs.cmu.edu/~prs/15-441-f15 Framing: encapsulating a network layer datagram

More information

CSE 123A Computer Networks

CSE 123A Computer Networks CSE 123A Computer Networks Winter 2005 Lecture 8: IP Router Design Many portions courtesy Nick McKeown Overview Router basics Interconnection architecture Input Queuing Output Queuing Virtual output Queuing

More information

Meet the Increased Demands on Your Infrastructure with Dell and Intel. ServerWatchTM Executive Brief

Meet the Increased Demands on Your Infrastructure with Dell and Intel. ServerWatchTM Executive Brief Meet the Increased Demands on Your Infrastructure with Dell and Intel ServerWatchTM Executive Brief a QuinStreet Excutive Brief. 2012 Doing more with less is the mantra that sums up much of the past decade,

More information

Internet Control Message Protocol

Internet Control Message Protocol Internet Control Message Protocol The Internet Control Message Protocol is used by routers and hosts to exchange control information, and to inquire about the state and configuration of routers and hosts.

More information

Scalable Enterprise Networks with Inexpensive Switches

Scalable Enterprise Networks with Inexpensive Switches Scalable Enterprise Networks with Inexpensive Switches Minlan Yu minlanyu@cs.princeton.edu Princeton University Joint work with Alex Fabrikant, Mike Freedman, Jennifer Rexford and Jia Wang 1 Enterprises

More information

CS 3640: Introduction to Networks and Their Applications

CS 3640: Introduction to Networks and Their Applications CS 3640: Introduction to Networks and Their Applications Fall 2018, Lecture 5: The Link Layer I Errors and medium access Instructor: Rishab Nithyanand Teaching Assistant: Md. Kowsar Hossain 1 You should

More information

Optimizing Web and Application Infrastructure on a Limited IT Budget

Optimizing Web and Application Infrastructure on a Limited IT Budget Optimizing Web and Application Infrastructure on a Limited IT Budget Costs associates with deploying, maintaining and supporting web application infrastructure can be dramatically reduced with ADCs. Today

More information

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition ELEC / COMP 177 Fall 2016 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Presentation 2 Security/Privacy Presentations Nov 3 rd, Nov 10 th, Nov 15 th Upload slides to Canvas by midnight

More information

Dell EMC Networking: the Modern Infrastructure Platform

Dell EMC Networking: the Modern Infrastructure Platform Dell EMC Networking: the Modern Infrastructure Platform From Core to Edge to Campus. Fabio Bellini Network Sales Engineer CIO challenge: next-gen infrastructures are needed Traditional Open-Networking

More information

H

H H12-711 Number: H12-711 Passing Score: 600 Time Limit: 120 min File Version: 1.0 Exam A QUESTION 1 The network administrator wants to improve the performance of network transmission, what steps can the

More information

Certified NCIA Network Basic v0.1

Certified NCIA Network Basic v0.1 Certified NCIA Network Basic v0.1 Chapter 2. EtherNet 1 Network Basic v0.1 Chapter 2 EtherNet 2. LAN switching - HUB vs Switch -Switch Operation 3. Ethernet Troubleshooting - ARP protocol - ARP Troubleshooting

More information

VXLAN Overview: Cisco Nexus 9000 Series Switches

VXLAN Overview: Cisco Nexus 9000 Series Switches White Paper VXLAN Overview: Cisco Nexus 9000 Series Switches What You Will Learn Traditional network segmentation has been provided by VLANs that are standardized under the IEEE 802.1Q group. VLANs provide

More information

19: Networking. Networking Hardware. Mark Handley

19: Networking. Networking Hardware. Mark Handley 19: Networking Mark Handley Networking Hardware Lots of different hardware: Modem byte at a time, FDDI, SONET packet at a time ATM (including some DSL) 53-byte cell at a time Reality is that most networking

More information

Wireless Networks (CSC-7602) Lecture 8 (15 Oct. 2007)

Wireless Networks (CSC-7602) Lecture 8 (15 Oct. 2007) Wireless Networks (CSC-7602) Lecture 8 (15 Oct. 2007) Seung-Jong Park (Jay) http://www.csc.lsu.edu/~sjpark 1 Today Wireline Fair Schedulling Why? Ideal algorithm Practical algorithms Wireless Fair Scheduling

More information

Lecture 9. Reminder: Homework 3, Programming Project 2 due today. Questions? Thursday, September 22 CS 475 Networks - Lecture 9 1

Lecture 9. Reminder: Homework 3, Programming Project 2 due today. Questions? Thursday, September 22 CS 475 Networks - Lecture 9 1 Lecture 9 Reminder: Homework 3, Programming Project 2 due today. Questions? Thursday, September 22 CS 475 Networks - Lecture 9 1 Outline Chapter 3 - Internetworking 3.1 Switching and Bridging 3.2 Basic

More information

Final Lecture. A few minutes to wrap up and add some perspective

Final Lecture. A few minutes to wrap up and add some perspective Final Lecture A few minutes to wrap up and add some perspective 1 2 Instant replay The quarter was split into roughly three parts and a coda. The 1st part covered instruction set architectures the connection

More information

IsoStack Highly Efficient Network Processing on Dedicated Cores

IsoStack Highly Efficient Network Processing on Dedicated Cores IsoStack Highly Efficient Network Processing on Dedicated Cores Leah Shalev Eran Borovik, Julian Satran, Muli Ben-Yehuda Outline Motivation IsoStack architecture Prototype TCP/IP over 10GE on a single

More information

FIVE REASONS YOU SHOULD RUN CONTAINERS ON BARE METAL, NOT VMS

FIVE REASONS YOU SHOULD RUN CONTAINERS ON BARE METAL, NOT VMS WHITE PAPER FIVE REASONS YOU SHOULD RUN CONTAINERS ON BARE METAL, NOT VMS Over the past 15 years, server virtualization has become the preferred method of application deployment in the enterprise datacenter.

More information

CS 356: Computer Network Architectures. Lecture 10: IP Fragmentation, ARP, and ICMP. Xiaowei Yang

CS 356: Computer Network Architectures. Lecture 10: IP Fragmentation, ARP, and ICMP. Xiaowei Yang CS 356: Computer Network Architectures Lecture 10: IP Fragmentation, ARP, and ICMP Xiaowei Yang xwy@cs.duke.edu Overview Homework 2-dimension parity IP fragmentation ARP ICMP Fragmentation and Reassembly

More information

LAN Interconnection and Other Link Layer Protocols

LAN Interconnection and Other Link Layer Protocols LAN Interconnection and Other Link Layer Protocols Ethernet dominant link layer technology for local-area networks Ethernet frame structure Kai Shen Dept. of Computer Science, University of Rochester Ethernet

More information

Network Management & Monitoring

Network Management & Monitoring Network Management & Monitoring Network Delay These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) End-to-end

More information

NIC TEAMING IEEE 802.3ad

NIC TEAMING IEEE 802.3ad WHITE PAPER NIC TEAMING IEEE 802.3ad NIC Teaming IEEE 802.3ad Summary This tech note describes the NIC (Network Interface Card) teaming capabilities of VMware ESX Server 2 including its benefits, performance

More information

CS 426 Parallel Computing. Parallel Computing Platforms

CS 426 Parallel Computing. Parallel Computing Platforms CS 426 Parallel Computing Parallel Computing Platforms Ozcan Ozturk http://www.cs.bilkent.edu.tr/~ozturk/cs426/ Slides are adapted from ``Introduction to Parallel Computing'' Topic Overview Implicit Parallelism:

More information

Cisco SAN Analytics and SAN Telemetry Streaming

Cisco SAN Analytics and SAN Telemetry Streaming Cisco SAN Analytics and SAN Telemetry Streaming A deeper look at enterprise storage infrastructure The enterprise storage industry is going through a historic transformation. On one end, deep adoption

More information

Developing deterministic networking technology for railway applications using TTEthernet software-based end systems

Developing deterministic networking technology for railway applications using TTEthernet software-based end systems Developing deterministic networking technology for railway applications using TTEthernet software-based end systems Project n 100021 Astrit Ademaj, TTTech Computertechnik AG Outline GENESYS requirements

More information

Introducing Campus Networks

Introducing Campus Networks Cisco Enterprise Architecture Introducing Campus Networks 2003, Cisco Systems, Inc. All rights reserved. 2-1 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0 2-2 Campus Data Center Combines switching

More information

Performance COE 403. Computer Architecture Prof. Muhamed Mudawar. Computer Engineering Department King Fahd University of Petroleum and Minerals

Performance COE 403. Computer Architecture Prof. Muhamed Mudawar. Computer Engineering Department King Fahd University of Petroleum and Minerals Performance COE 403 Computer Architecture Prof. Muhamed Mudawar Computer Engineering Department King Fahd University of Petroleum and Minerals What is Performance? How do we measure the performance of

More information

White Paper. Massive Capacity Can Be Easier with 4G-Optimized Microwave Backhaul

White Paper. Massive Capacity Can Be Easier with 4G-Optimized Microwave Backhaul White Paper Massive Capacity Can Be Easier with 4G-Optimized Microwave Backhaul Massive Capacity Can Be Easier with 4G-Optimized Microwave Backhaul End user demand for ubiquitous broadband connectivity,

More information

Denial of Service, Traceback and Anonymity

Denial of Service, Traceback and Anonymity Purdue University Center for Education and Research in Information Assurance and Security Denial of Service, Traceback and Anonymity Clay Shields Assistant Professor of Computer Sciences CERIAS Network

More information

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD Review Error Detection: CRC Multiple access protocols Slotted ALOHA CSMA/CD LAN addresses and ARP Ethernet Some slides are in courtesy of J. Kurose and K. Ross Overview Ethernet Hubs, bridges, and switches

More information

CHAPTER 17 - NETWORK AMD DISTRIBUTED SYSTEMS

CHAPTER 17 - NETWORK AMD DISTRIBUTED SYSTEMS CHAPTER 17 - NETWORK AMD DISTRIBUTED SYSTEMS OBJECTIVES Provide a high-level overview of distributed systems and the networks that interconnect them Discuss the general structure of distributed operating

More information

Chapter 11: Networks

Chapter 11: Networks Chapter 11: Networks Devices in a Small Network Small Network A small network can comprise a few users, one router, one switch. A Typical Small Network Topology looks like this: Device Selection Factors

More information

Lecture 3. The Network Layer (cont d) Network Layer 1-1

Lecture 3. The Network Layer (cont d) Network Layer 1-1 Lecture 3 The Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router? Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets

More information

Managing and Securing Computer Networks. Guy Leduc. Chapter 2: Software-Defined Networks (SDN) Chapter 2. Chapter goals:

Managing and Securing Computer Networks. Guy Leduc. Chapter 2: Software-Defined Networks (SDN) Chapter 2. Chapter goals: Managing and Securing Computer Networks Guy Leduc Chapter 2: Software-Defined Networks (SDN) Mainly based on: Computer Networks and Internets, 6 th Edition Douglas E. Comer Pearson Education, 2015 (Chapter

More information

REAL SPEED. Neterion : The Leader in 10 Gigabit Ethernet adapters

REAL SPEED. Neterion : The Leader in 10 Gigabit Ethernet adapters experience10 GbE REAL SPEED Neterion : The Leader in 10 Gigabit Ethernet adapters With data volumes growing at explosive rates, network bandwidth has become a critical factor in the IT infrastructure of

More information

Configuring Dynamic ARP Inspection

Configuring Dynamic ARP Inspection 21 CHAPTER This chapter describes how to configure dynamic Address Resolution Protocol inspection (dynamic ARP inspection) on the Catalyst 3560 switch. This feature helps prevent malicious attacks on the

More information

ALMA Correlator Enhancement

ALMA Correlator Enhancement ALMA Correlator Enhancement Technical Perspective Rodrigo Amestica, Ray Escoffier, Joe Greenberg, Rich Lacasse, J Perez, Alejandro Saez Atacama Large Millimeter/submillimeter Array Karl G. Jansky Very

More information

The Missing Piece of Virtualization. I/O Virtualization on 10 Gb Ethernet For Virtualized Data Centers

The Missing Piece of Virtualization. I/O Virtualization on 10 Gb Ethernet For Virtualized Data Centers The Missing Piece of Virtualization I/O Virtualization on 10 Gb Ethernet For Virtualized Data Centers Agenda 10 GbE Adapters Built for Virtualization I/O Throughput: Virtual & Non-Virtual Servers Case

More information

ARP Inspection and the MAC Address Table for Transparent Firewall Mode

ARP Inspection and the MAC Address Table for Transparent Firewall Mode ARP Inspection and the MAC Address Table for Transparent Firewall Mode This chapter describes how to customize the MAC address table and configure ARP Inspection for bridge groups. About ARP Inspection

More information

PARALLEL PROGRAMMING MANY-CORE COMPUTING: THE LOFAR SOFTWARE TELESCOPE (5/5)

PARALLEL PROGRAMMING MANY-CORE COMPUTING: THE LOFAR SOFTWARE TELESCOPE (5/5) PARALLEL PROGRAMMING MANY-CORE COMPUTING: THE LOFAR SOFTWARE TELESCOPE (5/5) Rob van Nieuwpoort Vrije Universiteit Amsterdam & Astron, the Netherlands Institute for Radio Astronomy Why Radio? Credit: NASA/IPAC

More information

ECE 461 Internetworking Fall Quiz 1

ECE 461 Internetworking Fall Quiz 1 ECE 461 Internetworking Fall 2013 Quiz 1 Instructions (read carefully): The time for this quiz is 50 minutes. This is a closed book and closed notes in-class exam. Non-programmable (Type 2) calculators

More information

Chapter 8 ARP(Address Resolution Protocol) Kyung Hee University

Chapter 8 ARP(Address Resolution Protocol) Kyung Hee University Chapter 8 ARP(Address Resolution Protocol) 1 Logical address 8.1 Address Mapping The hosts and routers are recognized at the network level by their logical address Logical address is unique universal IP

More information

Local Area Network Overview

Local Area Network Overview Local Area Network Overview Chapter 15 CS420/520 Axel Krings Page 1 LAN Applications (1) Personal computer LANs Low cost Limited data rate Back end networks Interconnecting large systems (mainframes and

More information

Hubs. twisted pair. hub. 5: DataLink Layer 5-1

Hubs. twisted pair. hub. 5: DataLink Layer 5-1 Hubs Hubs are essentially physical-layer repeaters: bits coming from one link go out all other links at the same rate no frame buffering no CSMA/CD at : adapters detect collisions provides net management

More information

DeTail Reducing the Tail of Flow Completion Times in Datacenter Networks. David Zats, Tathagata Das, Prashanth Mohan, Dhruba Borthakur, Randy Katz

DeTail Reducing the Tail of Flow Completion Times in Datacenter Networks. David Zats, Tathagata Das, Prashanth Mohan, Dhruba Borthakur, Randy Katz DeTail Reducing the Tail of Flow Completion Times in Datacenter Networks David Zats, Tathagata Das, Prashanth Mohan, Dhruba Borthakur, Randy Katz 1 A Typical Facebook Page Modern pages have many components

More information

EECS 122, Lecture 13. Multicast Delivery. Multicast Delivery. Reasons for Multicast. Why not just Machine Gun? Multicast Example

EECS 122, Lecture 13. Multicast Delivery. Multicast Delivery. Reasons for Multicast. Why not just Machine Gun? Multicast Example EEC 122, Lecture 13 Kevin Fall kfall@cs.berkeley.edu edu Delivery How to send one thing to many receivers. Why do this? TV/entertainment, software updates eal-time info delivery (news, stock quotes) Teleconferencing

More information

Module 15: Network Structures

Module 15: Network Structures Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and

More information

Use of the Internet SCSI (iscsi) protocol

Use of the Internet SCSI (iscsi) protocol A unified networking approach to iscsi storage with Broadcom controllers By Dhiraj Sehgal, Abhijit Aswath, and Srinivas Thodati In environments based on Internet SCSI (iscsi) and 10 Gigabit Ethernet, deploying

More information

Address Resolution Protocol (ARP), RFC 826

Address Resolution Protocol (ARP), RFC 826 Address Resolution Protocol (ARP), RFC 826 Prof. Lin Weiguo Copyleft 2009~2017, School of Computing, CUC Sept. 2017 ARP & RARP } Note: } The Internet is based on IP addresses } Data link protocols (Ethernet,

More information

Write a technical report Present your results Write a workshop/conference paper (optional) Could be a real system, simulation and/or theoretical

Write a technical report Present your results Write a workshop/conference paper (optional) Could be a real system, simulation and/or theoretical Identify a problem Review approaches to the problem Propose a novel approach to the problem Define, design, prototype an implementation to evaluate your approach Could be a real system, simulation and/or

More information

Advanced Computer Networks Exercise Session 7. Qin Yin Spring Semester 2013

Advanced Computer Networks Exercise Session 7. Qin Yin Spring Semester 2013 Advanced Computer Networks 263-3501-00 Exercise Session 7 Qin Yin Spring Semester 2013 1 LAYER 7 SWITCHING 2 Challenge: accessing services Datacenters are designed to be scalable Datacenters are replicated

More information

ARP Inspection and the MAC Address Table

ARP Inspection and the MAC Address Table This chapter describes how to customize the MAC address table and configure ARP Inspection for bridge groups. About, page 1 Default Settings, page 2 Guidelines for, page 2 Configure ARP Inspection and

More information

Microsoft Network Load Balancing on UCS B Series Servers Deployment Configuration Example

Microsoft Network Load Balancing on UCS B Series Servers Deployment Configuration Example Microsoft Network Load Balancing on UCS B Series Servers Deployment Configuration Example Document ID: 118262 Contributed by Charles Stizza, Vishal Mehta, and Vincent La Bua, Cisco TAC Engineers. Aug 14,

More information

CS551 Ad-hoc Routing

CS551 Ad-hoc Routing CS551 Ad-hoc Routing Bill Cheng http://merlot.usc.edu/cs551-f12 1 Mobile Routing Alternatives Why not just assume a base station? good for many cases, but not some (military, disaster recovery, sensor

More information

PoS(EXPReS09)036. e-vlbi Networking Tricks. Paul Boven, for the EXPReS team Joint Institute for VLBI in Europe (JIVE)

PoS(EXPReS09)036. e-vlbi Networking Tricks. Paul Boven, for the EXPReS team Joint Institute for VLBI in Europe (JIVE) , for the EXPReS team Joint Institute for VLBI in Europe (JIVE) E-mail: boven@jive.nl Real-time e-vlbi is made possible by having access to long-distance, high-performance networks - straight from the

More information

Seven Criteria for a Sound Investment in WAN Optimization

Seven Criteria for a Sound Investment in WAN Optimization Seven Criteria for a Sound Investment in WAN Optimization Introduction WAN optimization technology brings three important business benefits to IT organizations: Reduces branch office infrastructure costs

More information

CCNA 1 Chapter 5 v5.0 Exam Answers 2013

CCNA 1 Chapter 5 v5.0 Exam Answers 2013 CCNA 1 Chapter 5 v5.0 Exam Answers 2013 1 2 A host is trying to send a packet to a device on a remote LAN segment, but there are currently no mappings in its ARP cache. How will the device obtain a destination

More information

Lecture 15: TCP over wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 13, Thursday

Lecture 15: TCP over wireless networks. Mythili Vutukuru CS 653 Spring 2014 March 13, Thursday Lecture 15: TCP over wireless networks Mythili Vutukuru CS 653 Spring 2014 March 13, Thursday TCP - recap Transport layer TCP is the dominant protocol TCP provides in-order reliable byte stream abstraction

More information

Module 16: Distributed System Structures

Module 16: Distributed System Structures Chapter 16: Distributed System Structures Module 16: Distributed System Structures Motivation Types of Network-Based Operating Systems Network Structure Network Topology Communication Structure Communication

More information

Network Processors and their memory

Network Processors and their memory Network Processors and their memory Network Processor Workshop, Madrid 2004 Nick McKeown Departments of Electrical Engineering and Computer Science, Stanford University nickm@stanford.edu http://www.stanford.edu/~nickm

More information

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided.

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided. 223 Chapter 19 Inter mediate TCP The Transmission Control Protocol/Internet Protocol (TCP/IP) suite of protocols was developed as part of the research that the Defense Advanced Research Projects Agency

More information

Fit for Purpose Platform Positioning and Performance Architecture

Fit for Purpose Platform Positioning and Performance Architecture Fit for Purpose Platform Positioning and Performance Architecture Joe Temple IBM Monday, February 4, 11AM-12PM Session Number 12927 Insert Custom Session QR if Desired. Fit for Purpose Categorized Workload

More information

PCnet-FAST Buffer Performance White Paper

PCnet-FAST Buffer Performance White Paper PCnet-FAST Buffer Performance White Paper The PCnet-FAST controller is designed with a flexible FIFO-SRAM buffer architecture to handle traffic in half-duplex and full-duplex 1-Mbps Ethernet networks.

More information

Course web site: teaching/courses/car. Piazza discussion forum:

Course web site:   teaching/courses/car. Piazza discussion forum: Announcements Course web site: http://www.inf.ed.ac.uk/ teaching/courses/car Lecture slides Tutorial problems Courseworks Piazza discussion forum: http://piazza.com/ed.ac.uk/spring2018/car Tutorials start

More information

OPEN COMPUTE PLATFORMS POWER SOFTWARE-DRIVEN PACKET FLOW VISIBILITY, PART 2 EXECUTIVE SUMMARY. Key Takeaways

OPEN COMPUTE PLATFORMS POWER SOFTWARE-DRIVEN PACKET FLOW VISIBILITY, PART 2 EXECUTIVE SUMMARY. Key Takeaways OPEN COMPUTE PLATFORMS POWER SOFTWARE-DRIVEN PACKET FLOW VISIBILITY, PART 2 EXECUTIVE SUMMARY This is the second of two white papers that describe how the shift from monolithic, purpose-built, network

More information

Configuring IGMP Snooping

Configuring IGMP Snooping This chapter describes how to configure Internet Group Management Protocol (IGMP) snooping on a Cisco NX-OS device. About IGMP Snooping, page 1 Licensing Requirements for IGMP Snooping, page 4 Prerequisites

More information

Midterm II December 4 th, 2006 CS162: Operating Systems and Systems Programming

Midterm II December 4 th, 2006 CS162: Operating Systems and Systems Programming Fall 2006 University of California, Berkeley College of Engineering Computer Science Division EECS John Kubiatowicz Midterm II December 4 th, 2006 CS162: Operating Systems and Systems Programming Your

More information