Data Center Network Throughput Analysis using Queueing Petri Nets
|
|
- Bertram Wiggins
- 6 years ago
- Views:
Transcription
1 Data Center Network Throughput Analysis using Queueing Petri Nets Piotr Rygielski, Samuel Kounev Karlsruhe Institute of Technology, Karlsruhe, Germany University of Würzburg, Würzburg, Germany DCPerf2104, Madrid, Spain,
2 Context Data center networks Performance Run- time 0
3 Motivation What if (dst_ip>*.*.*.128)? port1 : port0; What if (src_tcp==80)? port1 : port0; 1 What if Mo#va#on Approach Meta- model Results Conclusion
4 Motivation perf( (dst_ip>*.*.*.128)? port1 : port0; )= What if perf( (src_tcp==80)? port1 : port0; )=? perf(,,,, )=? 2 Mo#va#on Approach Meta- model Results Conclusion
5 Research Gap End- to- end (software- software) performance analysis not detailed enough Existing network models too coarse or too fine grained Other approaches focus only on selected technologies/protocols Flexibility in modeling is missing Time overhead Black-box models Detailed simulations Accuracy 3 Mo#va#on Approach Meta- model Results Conclusion
6 Approach Performance model(s) Model transformation(s) Descriptive model Real network Model extraction This paper: Queueing Petri Nets SimQPN 4
7 Approach Real network script Performance models Structure model Traffic model Configuration model to QN to OMNeT++ DNI model of a given network (DNI meta model instance) DNI meta model (the modeling language) single model to QPN to formulas to ns3 other... Model-to-model transformations 5
8 Descartes Network Infrastructures Meta- model DNI consists actually of three parts Structure Configuration Traffic 6
9 The DNI Meta Model Structure NetworkStructure 1 especification 1 Node 1..* forwarding performance PhysicalNode 1 VirtualNode hostedon PhysicalNetworkInterface 1..* NetworkInterface 1..* VirtualNetworkinterface 2 connects 2 connects PhysicalLink 0..* Link VirtualLink LinkPerformanceS 7
10 The DNI Meta Model Traffic Loop 100 times Wait 100 ms Send picture picture 400KB NetworkTraffic originatesfrom 0..* 1..* trafficsources WorkloadDescription 1..* TrafficSource GenericWorkload 0..* AbstractAction 0..* StartAction LoopAction 1 ONOFFFlow StopAction BranchAction 1..* WaitAction SequenceAction 1..* TransmitAction * SoftwareComponent 1..* destination FlowDescription 1 GenericFlow 8
11 The DNI Meta Model Configuration 0..* Route start 1 Hop NetworkConfiguration 1..* ProtocolStack 1..* ProtocolLayer 1..* NetworkProtocol protocol nexthop 0..1 iscarriedby $ traceroute google.pl 1 henry ( ) ( ) ( ) 4 * * * 9
12 Case study SBUS/PIRATES Traffic Management System Induction Loops GPS Sensors Traffic Cameras Traffic Light Sensors 11
13 Case study SBUS/PIRATES Cam Cam Cam... LPR 12
14 Transformation to QPNs Queue Depository Nested QPN EndNode-1 IntermediateNode-1 EndNode-2 Transition Token eth-rx-# Link-1-L Link-1-R EndNode-3 traffic-source-# eth-tx-# o o o o o o o o o Ordinary Place Queueing Place Subnet Place input-trans rx-to-sw sw-to-tx output-trans input output input workloadcontrol workload-stop loop output transmit-flow workload-start wait-action 17
15 Transformation to QPNs - Transition port-#-rx port-#-tx input-trans routingtransition output-trans input output 17
16 Transformation to QPNs Workload input workloadcontrol workload-stop loop output transmit-flow workload-start wait-action Loop loop-iter-left loop-control loop-iterdone num-loopiter-to-1 output Branch input workloadcontrol output input forwardgeneratedtraffic loopstop subworkload 1-tonum-loop-iter loopstart forkbranch subworkload forwardgenerated-traffic 17
17 Transformation to QPNs Colors Tokens are distinguishable only by colors! One color for every flow, route, and different message size. 17
18 Experiment 10ms 10ms 800kB 800kB 800kB H4 S3 H7 H1 H3 H2 H5 H8 S1 S2 Layer 2 Throughput [Mbps] uperf CI SimQPN Intergeneration time [ms] uperf CI SimQPN Intergeneration time [ms] 18
19 Experiment 18
20 Exemplary Results (SimQPN) Only 7 second simulation time (Scenario C) OMNeT++ up to 20 minutes (preliminary estimation) Difficult to mimic TCP- like behavior using QPNs Limited number of token colors Each flow (src- dst pair) consumes at least 1 color Coarse granularity enforcement 19
21 Conclusions Automa6cally generated predic6ve model Acceptable predic6on accuracy despite introduced abstrac6ons Run 6me relevant aspects Support for network virtualiza6on (OpenFlow planned) All traffic sources should be modeled 11 Context Mo6va6on Approach Meta- model Conclusion
22 Thank you Danke für eure Aufmerksamkeit Dziękuję za uwagę Спасибо за ваше внимание Takk for oppmerksomhet
QoS-aware resource allocation and load-balancing in enterprise Grids using online simulation
QoS-aware resource allocation and load-balancing in enterprise Grids using online simulation * Universität Karlsruhe (TH) Technical University of Catalonia (UPC) Barcelona Supercomputing Center (BSC) Samuel
More informationThe Descartes Modeling Language: Status Quo
The Descartes Modeling : Status Quo Samuel Kounev University of Würzburg http://se.informatik.uni-wuerzburg.de/ Symposium on Software Performance, Stuttgart, Nov 27, 2014 Credits Fabian Brosig Nikolaus
More informationAutomated Extraction of Network Traffic Models Suitable for Performance Simulation
Automated Extraction of Network Traffic Models Suitable for Performance Simulation Piotr Rygielski Institute of Computer Science University of Würzburg, Germany piotr.rygielski @uni-wuerzburg.de Doris
More informationIntroduction to Queueing Petri Nets: Modeling Formalism, Tool Support and Case Studies
Introduction to Queueing Petri Nets: Modeling Formalism, Tool Support and Case Studies Samuel Kounev Karlsruhe Institute of Technology Am Fasanengarten 5 Karlsruhe, Germany kounev@kit.edu Simon Spinner
More informationDRAFT. The Descartes Meta-Model. Samuel Kounev, Fabian Brosig, Nikolaus Huber
escartes The Descartes Meta-Model Samuel Kounev, Fabian Brosig, Nikolaus Huber Descartes Research Group Institute for Program Structures and Data Organization Karlsruhe Institute of Technology (KIT), Germany
More informationCE693: Adv. Computer Networking
CE693: Adv. Computer Networking L-10 Wireless Broadcast Fall 1390 Acknowledgments: Lecture slides are from the graduate level Computer Networks course thought by Srinivasan Seshan at CMU. When slides are
More informationAutomated Transformation of Component-based Software Architecture Models to Queueing Petri Nets
Automated Transformation of Component-based Software Architecture Models to Queueing Petri Nets Philipp Meier Karlsruhe Institute of Technology (KIT) 76131 Karlsruhe, Germany mail@philippmeier.com Samuel
More informationApplication Layer Switching: A Deployable Technique for Providing Quality of Service
Application Layer Switching: A Deployable Technique for Providing Quality of Service Raheem Beyah Communications Systems Center School of Electrical and Computer Engineering Georgia Institute of Technology
More informationPerformance Modeling and Analysis of Message-oriented Event-driven Systems
Software and Systems Modeling The final publication is available at www.springerlink.com Performance Modeling and Analysis of Message-oriented Event-driven Systems Kai Sachs, Samuel Kounev 2, Alejandro
More informationResource Sharing in QPN-based Performance Models
WDS'08 Proceedings of Contributed Papers, Part I, 202 207, 2008. ISBN 978-80-7378-065-4 MATFYZPRESS Resource Sharing in QPN-based Performance Models V. Babka Charles University Prague, Faculty of Mathematics
More informationExpeditus: Congestion-Aware Load Balancing in Clos Data Center Networks
Expeditus: Congestion-Aware Load Balancing in Clos Data Center Networks Peng Wang, Hong Xu, Zhixiong Niu, Dongsu Han, Yongqiang Xiong ACM SoCC 2016, Oct 5-7, Santa Clara Motivation Datacenter networks
More informationExamen final de Xarxes de Computadors (XC) 6/6/2011 NAME: SURNAME DNI:
Examen final de Xarxes de Computadors (XC) 6/6/2011 NAME: SURNAME DNI: Answer problems 1 amd 2 in the same questions sheet, and problem 3 en exams sheets.justify your answers. N2 N3 N1 f2 f4 N4 N7 f1 R1
More informationPerformance Queries for Architecture-Level Performance Models
Performance Queries for Architecture-Level Performance Models Fabian Gorsler Karlsruhe Institute of Technology (KIT) Am Fasanengarten 5 76131 Karlsruhe, Germany gorsler@ira.uka.de Fabian Brosig Karlsruhe
More informationSoftware-Defined Networking (Continued)
Software-Defined Networking (Continued) CS640, 2015-04-23 Announcements Assign #5 released due Thursday, May 7 at 11pm Outline Recap SDN Stack Layer 2 Learning Switch Control Application Design Considerations
More informationI Commands. iping, page 2 iping6, page 4 itraceroute, page 5 itraceroute6 vrf, page 6. itraceroute vrf encap vxlan, page 12
iping, page 2 iping6, page 4 itraceroute, page 5 itraceroute6 vrf, page 6 itraceroute6 vrf encap vlan, page 7 itraceroute6 vrf encap vxlan dst-mac, page 8 itraceroute vrf, page 9 itraceroute vrf encap
More informationSimulation with NS-2 and CPN tools. Ying-Dar Lin Department of Computer Science, National Chiao Tung University
Simulation with NS-2 and CPN tools Ying-Dar Lin Department of Computer Science, National Chiao Tung University Outline NS-2 simulator NS-2 basics Basic syntax Tracing a simple network Mini and term projects
More informationUsing SDN and NFV to Realize a Scalable and Resilient Omni-Present Firewall
Institute of Computer Science Chair of Communication Networks Prof. Dr.-Ing. P. Tran-Gia Using SDN and NFV to Realize a Scalable and Resilient Omni-Present Firewall comnet.informatik.uni-wuerzburg.de SarDiNe
More informationEvaluating the Performance of Transaction Workloads in Database Systems using Queueing Petri Nets
Imperial College of Science, Technology and Medicine Department of Computing Evaluating the Performance of Transaction Workloads in Database Systems using Queueing Petri Nets David Coulden Supervisor:
More informationInterdomain Routing Design for MobilityFirst
Interdomain Routing Design for MobilityFirst October 6, 2011 Z. Morley Mao, University of Michigan In collaboration with Mike Reiter s group 1 Interdomain routing design requirements Mobility support Network
More informationETHERNET OVER INFINIBAND
14th ANNUAL WORKSHOP 2018 ETHERNET OVER INFINIBAND Evgenii Smirnov and Mikhail Sennikovsky ProfitBricks GmbH April 10, 2018 ETHERNET OVER INFINIBAND: CURRENT SOLUTIONS mlx4_vnic Currently deprecated Requires
More informationBuilding Online Performance Models of Grid Middleware with Fine-Grained Load-Balancing: A Globus Toolkit Case Study
Building Online Performance Models of Grid Middleware with Fine-Grained Load-Balancing: A Globus Toolkit Case Study Ramon Nou 1, Samuel Kounev 2, and Jordi Torres 1 1 Barcelona Supercomputing Center (BSC),
More informationMID-TERM EXAM TCP/IP NETWORKING Duration: 2 hours With Solutions
MID-TERM EXAM TCP/IP NETWORKING Duration: 2 hours With Solutions Jean-Yves Le Boudec 2005 December 8 Do not forget to put your names on all sheets of your solution. If you need to make assumptions in order
More informationCSC 4900 Computer Networks: Network Layer
CSC 4900 Computer Networks: Network Layer Professor Henry Carter Fall 2017 Chapter 4: Network Layer 4. 1 Introduction 4.2 What s inside a router 4.3 IP: Internet Protocol Datagram format 4.4 Generalized
More informationMAD 12 Monitoring the Dynamics of Network Traffic by Recursive Multi-dimensional Aggregation. Midori Kato, Kenjiro Cho, Michio Honda, Hideyuki Tokuda
MAD 12 Monitoring the Dynamics of Network Traffic by Recursive Multi-dimensional Aggregation Midori Kato, Kenjiro Cho, Michio Honda, Hideyuki Tokuda 1 Background Traffic monitoring is important to detect
More informationOn the cost of tunnel endpoint processing in overlay virtual networks
J. Weerasinghe; NVSDN2014, London; 8 th December 2014 On the cost of tunnel endpoint processing in overlay virtual networks J. Weerasinghe & F. Abel IBM Research Zurich Laboratory Outline Motivation Overlay
More informationThis article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and
This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and education use, including for instruction at the authors institution
More informationCIS 551 / TCOM 401 Computer and Network Security. Spring 2006 Lecture 16
CIS 551 / TCOM 401 Computer and Network Security Spring 2006 Lecture 16 Announcements Midterm II March 21st (One week from today) In class Same format as last time Will cover all material since Midterm
More informationvswitch Acceleration with Hardware Offloading CHEN ZHIHUI JUNE 2018
x vswitch Acceleration with Hardware Offloading CHEN ZHIHUI JUNE 2018 Current Network Solution for Virtualization Control Plane Control Plane virtio virtio user space PF VF2 user space TAP1 SW Datapath
More informationMaking Friends with Broadcast. Administrivia
Making Friends with Broadcast CMU 15-744 David Andersen Administrivia Midterm Mean 66.5, Median 70, Stddev 13.7 Histo: 35-39 37 38 40-44 45-49 50-54 54 54 54 55-59 56 57 60-64 61 64 64 65-69 69 70-74 71
More informationAdvanced Lab in Computer Communications Meeting 6 QoS. Instructor: Tom Mahler
Advanced Lab in Computer Communications Meeting 6 QoS Instructor: Tom Mahler Motivation Internet provides only single class of best-effort service. Some applications can be elastic. Tolerate delays and
More informationInvestigating the Use of Synchronized Clocks in TCP Congestion Control
Investigating the Use of Synchronized Clocks in TCP Congestion Control Michele Weigle (UNC-CH) November 16-17, 2001 Univ. of Maryland Symposium The Problem TCP Reno congestion control reacts only to packet
More informationDelay Tolerant Networking. Thomas Plagemann Distributed Multimedia Systems Group Department of Informatics University of Oslo.
Delay Tolerant Networking Thomas Plagemann Distributed Multimedia Systems Group Department of Informatics University of Oslo Outline Background, motivation, overview Epidemic routing Message ferrying Mobility/density
More informationSpecification and Testing of Banknote Processing Systems with Coloured Petri Nets
Specification and Testing of Banknote Processing Systems with Coloured Petri Nets Munich, 06/17/2010 30th TAV Agenda Automated testing in the software development process Motivation for system specifications
More informationA Deployable Framework for Providing Better Than Best-Effort Quality of Service for Traffic Flows
A Deployable Framework for Providing Better Than Best-Effort Quality of Service for Traffic Flows Proposal Presentation Raheem A. Beyah July 10, 2002 Communications Systems Center Presentation Outline
More informationScalable Enterprise Networks with Inexpensive Switches
Scalable Enterprise Networks with Inexpensive Switches Minlan Yu minlanyu@cs.princeton.edu Princeton University Joint work with Alex Fabrikant, Mike Freedman, Jennifer Rexford and Jia Wang 1 Enterprises
More informationChapter 1. Computer Networks and the Internet
Chapter 1 Computer Networks and the Internet Internet traffic What s the Internet? (hardware) PC server wireless laptop cellular handheld wired links millions of connected computing devices: hosts = end
More informationInformatica Universiteit van Amsterdam. Distributed Load-Balancing of Network Flows using Multi-Path Routing. Kevin Ouwehand. September 20, 2015
Bachelor Informatica Informatica Universiteit van Amsterdam Distributed Load-Balancing of Network Flows using Multi-Path Routing Kevin Ouwehand September 20, 2015 Supervisor(s): Stavros Konstantaros, Benno
More informationModelling Replication in NoSQL Datastores
Modelling Replication in NoSQL Datastores Rasha Osman 1 and Pietro Piazzolla 1 Department of Computing, Imperial College London London SW7 AZ, UK rosman@imperial.ac.uk Dip. di Elettronica e Informazione,
More informationProgrammable Forwarding Planes at Terabit/s Speeds
Programmable Forwarding Planes at Terabit/s Speeds Patrick Bosshart HIEF TEHNOLOGY OFFIER, BREFOOT NETWORKS nd the entire Barefoot Networks team Hot hips 30, ugust 21, 2018 Barefoot Tofino : Domain Specific
More informationSolutions to Select Exercises
Solutions to Select Exercises CHAPTER. We will count the transfer as completed when the last data bit arrives at its destination (a). MB = 89 bits. initial RTTs (6 ms) +,8,9/,, bps (transmit) + RTT/ (propagation).8
More informationAdaptive packet scheduling for requests delay guaranties in packetswitched computer communication network
Paweł Świątek Institute of Computer Science Wrocław University of Technology Wybrzeże Wyspiańskiego 27 50-370 Wrocław, Poland Email: pawel.swiatek@pwr.wroc.pl Adam Grzech Institute of Computer Science
More informationSTUDY OF SOCKET PROGRAMMING AND CLIENT SERVER MODEL
STUDY OF SOCKET PROGRAMMING AND CLIENT SERVER MODEL AIM: To conduct an experiment to demonstrate the working of file transfer with the UDP Server and Client. APPARATUS REQUIRED: PC with network simulation
More informationQPME A Tool for Stochastic Modeling and Analysis using Queueing Petri Nets
QPME 2.0 - A Tool for Stochastic Modeling and Analysis using Queueing Petri Nets Samuel Kounev, Simon Spinner and Philipp Meier Karlsruhe Institute of Technology, 76131 Karlsruhe, Germany kounev@kit.edu,
More informationDonato Ba*aglino Lorenzo Bracciale
IP Donato Ba*aglino Lorenzo Bracciale Outline why IP (mo:va:on) IP architecture (router, LAN) IP addressing Sta:c IP (CIDR, host + net) DHCP Rou:ng IP ARP Why IP? There are many different LAN technologies
More informationComputer Systems Modelling Case Studies. Samuel Kounev Systems Research Group University of Cambridge Computer Laboratory
Computer Systems Modelling Case Studies Samuel Kounev Systems Research Group University of Cambridge Computer Laboratory Goals Present some practical performance modelling case studies demonstrating: Modelling
More informationTowards SDN-Defined Programmable BYOD (Bring Your Own Device) Security
Towards SDN-Defined Programmable BYOD (Bring Your Own Device) Security Sungmin Hong, Robert Baykov, Lei Xu, Srinath Nadimpalli, Guofei Gu SUCCESS Lab Texas A&M University Outline Introduction & Motivation
More informationDecision Forest: A Scalable Architecture for Flexible Flow Matching on FPGA
Decision Forest: A Scalable Architecture for Flexible Flow Matching on FPGA Weirong Jiang, Viktor K. Prasanna University of Southern California Norio Yamagaki NEC Corporation September 1, 2010 Outline
More informationExercise 1 INTERNET. x.x.x.254. net /24. net /24. x.x.x.33. x.x.x.254. x.x.x.52. x.x.x.254. x.x.x.254. x.x.x.
Exercise 1 Given the IP network below: Assign feasible IP addresses to the interfaces and write down a feasible routing table for routers A and B guaranteeing full connectivity x.x.x.33 x.x.x.254 net 131.175.16.0/24
More informationDevoFlow: Scaling Flow Management for High-Performance Networks
DevoFlow: Scaling Flow Management for High-Performance Networks Andy Curtis Jeff Mogul Jean Tourrilhes Praveen Yalagandula Puneet Sharma Sujata Banerjee Software-defined networking Software-defined networking
More informationLecture 3. The Network Layer (cont d) Network Layer 1-1
Lecture 3 The Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router? Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets
More informationInternet Protocol Addressing and Routing. Redes TCP/IP
Internet Protocol Addressing and Routing Redes TCP/IP Internet Topology Internet - WAN Gateway or router Physical Network (LAN) internet LAN LAN LAN Dotted Decimal Notation 2 7 2 6 2 5 2 4 2 3 2 2 2 1
More informationGoal: Set up and run traffic to test a firewall.
http://www.candelatech.com sales@candelatech.com +1 360 380 1618 [PST, GMT -8] Network Testing and Emulation Solutions Generating Traffic to a Firewall Goal: Set up and run traffic to test a firewall.
More informationEnhanced RFC 2544 Test
1 Enhanced RFC 2544 Report - Port 2: 10/100/1000 Eth Layer 2 Traffic Term Generated by JDSU 5800 MSAM Enhanced RFC 2544 Test Overall Test Result: Pass Mode Tests to Run Customer Name Technician ID Test
More informationWhat Is Congestion? Effects of Congestion. Interaction of Queues. Chapter 12 Congestion in Data Networks. Effect of Congestion Control
Chapter 12 Congestion in Data Networks Effect of Congestion Control Ideal Performance Practical Performance Congestion Control Mechanisms Backpressure Choke Packet Implicit Congestion Signaling Explicit
More informationIEEE P802.1Qcz Proposed Project for Congestion Isolation
IEEE P82.1Qcz Proposed Project for Congestion Isolation IETF 11 London ICCRG Paul Congdon paul.congdon@tallac.com Project Background P82.1Qcz Project Initiation November 217 - Agreed to develop a Project
More informationInitial motivation: 32-bit address space soon to be completely allocated. Additional motivation:
IPv6 Initial motivation: 32-bit address space soon to be completely allocated. Additional motivation: header format helps speed processing/forwarding header changes to facilitate QoS IPv6 datagram format:
More informationronny@mit.edu www.cag.lcs.mit.edu/scale Introduction Architectures are all about exploiting the parallelism inherent to applications Performance Energy The Vector-Thread Architecture is a new approach
More informationSoftware Defined Networking Security: Security for SDN and Security with SDN. Seungwon Shin Texas A&M University
Software Defined Networking Security: Security for SDN and Security with SDN Seungwon Shin Texas A&M University Contents SDN Basic Operation SDN Security Issues SDN Operation L2 Forwarding application
More informationKUPF: 2-Phase Selection Model of Classification Records
KUPF: 2-Phase Selection Model of Classification Records KAKIUCHI Masatoshi Nara Institute of Science and Technology Background Many Internet services classify the data to be handled according to rules
More informationMPLS-based Reduction of Flow Table Entries in SDN Switches Supporting Multipath Transmission
MPLS-based Reduction of Flow Table Entries in SDN Switches Supporting Multipath Transmission Zbigniew Duliński, Grzegorz Rzym, and Piotr Chołda arxiv:1805.07993v1 [cs.ni] 21 May 2018 Abstract In the paper,
More informationThis document describes how to perform datapath packet tracing for Cisco IOS -XE software via the Packet Trace feature.
Contents Introduction Prerequisites Requirements Components Used Reference Topology Packet Tracing in Use Quick Start Guide Enable Platform Conditional Debugs Enable Packet Trace Egress Condition Limitation
More informationToward a Reliable Data Transport Architecture for Optical Burst-Switched Networks
Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks Dr. Vinod Vokkarane Assistant Professor, Computer and Information Science Co-Director, Advanced Computer Networks Lab University
More informationCHAPTER 3: LITERATURE REVIEW 3.1 NEED FOR SIMULATION ENVIRONMENT IN WSN
26 CHAPTER 3: LITERATURE REVIEW 3.1 NEED FOR SIMULATION ENVIRONMENT IN WSN Due to the continuous research progress in the field of WSN, it is essential to verify the new hardware and software design and
More informationNetwork Function Virtualization in GTS
Nordic Infrastructure for Research & Education Network Function Virtualization in GTS Richard Cziva University of Glasgow NORDUnet Network Function Virtualization Moving network services from hardware
More informationCS 268: Integrated Services
Limitations of IP Architecture in Supporting Resource Management CS 268: Integrated Services Ion Stoica February 23, 2004 IP provides only best effort service IP does not participate in resource management
More informationPiotr Srebrny
Piotr Srebrny Part I: Multicasting in the Internet asis & critique Part II: CacheCast Internet redundancy Packet caching systems CacheCast design CacheCast evaluation Efficiency Computational complexity
More informationEnhanced RFC 2544 Test
Generated by JDSU 5800 MSAM Enhanced RFC 2544 Report - Port 1: 10/100/1000 Eth Layer 2 Traffic Term Enhanced RFC 2544 Test Overall Test Result: Pass Mode Tests to Run Symmetric Loopback Throughput, Latency,
More informationCONGA: Distributed Congestion-Aware Load Balancing for Datacenters
CONGA: Distributed Congestion-Aware Load Balancing for Datacenters By Alizadeh,M et al. Motivation Distributed datacenter applications require large bisection bandwidth Spine Presented by Andrew and Jack
More informationProviding Multi-tenant Services with FPGAs: Case Study on a Key-Value Store
Zsolt István *, Gustavo Alonso, Ankit Singla Systems Group, Computer Science Dept., ETH Zürich * Now at IMDEA Software Institute, Madrid Providing Multi-tenant Services with FPGAs: Case Study on a Key-Value
More informationSmart Transducer Networks. Embedded Systems Engineering Armin Wasicek
Smart Transducer Networks Embedded Systems Engineering Armin Wasicek Overview Motivation & Design Principles TTP/A Fieldbus Protocol Implementation Requirements Smart Transducer Interface Standard Conclusion
More informationDistributed Memory and Cache Consistency. (some slides courtesy of Alvin Lebeck)
Distributed Memory and Cache Consistency (some slides courtesy of Alvin Lebeck) Software DSM 101 Software-based distributed shared memory (DSM) provides anillusionofsharedmemoryonacluster. remote-fork
More informationTHE Internet system consists of a set of distributed nodes
Proceedings of the 2014 Federated Conference on Computer Science and Information Systems pp. 769 774 DOI: 10.15439/2014F366 ACSIS, Vol. 2 Performance Analysis of Distributed Internet System Models using
More informationTraffic Management over Satellite ATM Networks: Recent Issues
Traffic Management over Satellite ATM Networks: Recent Issues http://www.cis.ohio-state.edu/~jain/ TIA/CIS Meeting, October 7, 1997 1 Overview 1. Buffer size for satellite links 2. Guaranteed Frame Rate
More informationIX: A Protected Dataplane Operating System for High Throughput and Low Latency
IX: A Protected Dataplane Operating System for High Throughput and Low Latency Belay, A. et al. Proc. of the 11th USENIX Symp. on OSDI, pp. 49-65, 2014. Reviewed by Chun-Yu and Xinghao Li Summary In this
More informationImpact of Cache Coherence Protocols on the Processing of Network Traffic
Impact of Cache Coherence Protocols on the Processing of Network Traffic Amit Kumar and Ram Huggahalli Communication Technology Lab Corporate Technology Group Intel Corporation 12/3/2007 Outline Background
More informationComputer Architecture: Multithreading (I) Prof. Onur Mutlu Carnegie Mellon University
Computer Architecture: Multithreading (I) Prof. Onur Mutlu Carnegie Mellon University A Note on This Lecture These slides are partly from 18-742 Fall 2012, Parallel Computer Architecture, Lecture 9: Multithreading
More informationSoftware Defined Networking
CSE343/443 Lehigh University Fall 2015 Software Defined Networking Presenter: Yinzhi Cao Lehigh University Acknowledgement Many materials are borrowed from the following links: https://www.cs.duke.edu/courses/spring13/compsc
More informationCS 268: Computer Networking. Taking Advantage of Broadcast
CS 268: Computer Networking L-12 Wireless Broadcast Taking Advantage of Broadcast Opportunistic forwarding Network coding Assigned reading XORs In The Air: Practical Wireless Network Coding ExOR: Opportunistic
More informationResearch Article Response Time Analysis of Distributed Web Systems Using QPNs
Mathematical Problems in Engineering Volume 215, Article ID 49835, 1 pages http://dx.doi.org/1.1155/215/49835 Research Article Response Time Analysis of Distributed Web Systems Using QPNs Tomasz Rak Faculty
More informationQuantifying Violations of Destination-based Forwarding on the Internet
Quantifying Violations of Destination-based Forwarding on the Internet Tobias Flach, Ethan Katz-Bassett, and Ramesh Govindan University of Southern California November 14, 2012 Destination-based Routing
More informationEffect of Number of Drop Precedences in Assured Forwarding draft-goyal
Effect of Number of Drop Precedences in Assured Forwarding draft-goyal goyal-diffserv-dpstdy-01.txt Mukul Goyal, Padmini Misra, Columbus, OH 43210-1277 Jain@cis.ohio-state.edu These slides, ID, and a paper
More informationHigh Performance Packet Processing with FlexNIC
High Performance Packet Processing with FlexNIC Antoine Kaufmann, Naveen Kr. Sharma Thomas Anderson, Arvind Krishnamurthy University of Washington Simon Peter The University of Texas at Austin Ethernet
More informationProfiling and diagnosing large-scale decentralized systems David Oppenheimer
Profiling and diagnosing large-scale decentralized systems David Oppenheimer ROC Retreat Thursday, June 5, 2003 1 Why focus on P2P systems? There are a few real ones file trading, backup, IM Look a lot
More informationLecture 22: Buffering & Scheduling. CSE 123: Computer Networks Alex C. Snoeren
Lecture 22: Buffering & Scheduling CSE 123: Computer Networks Alex C. Snoeren Lecture 23 Overview Buffer Management FIFO RED Traffic Policing/Scheduling 2 Key Router Challenges Buffer management: which
More informationAn Effective Queuing Scheme to Provide Slim Fly topologies with HoL Blocking Reduction and Deadlock Freedom for Minimal-Path Routing
An Effective Queuing Scheme to Provide Slim Fly topologies with HoL Blocking Reduction and Deadlock Freedom for Minimal-Path Routing Pedro Yébenes 1, Jesús Escudero-Sahuquillo 1, Pedro J. García 1, Francisco
More informationKernel Korner. Analysis of the HTB Queuing Discipline. Yaron Benita. Abstract
1 of 9 6/18/2006 7:41 PM Kernel Korner Analysis of the HTB Queuing Discipline Yaron Benita Abstract Can Linux do Quality of Service in a way that both offers high throughput and does not exceed the defined
More informationAdvanced Computer Networks. Datacenter TCP
Advanced Computer Networks 263 3501 00 Datacenter TCP Spring Semester 2017 1 Oriana Riva, Department of Computer Science ETH Zürich Today Problems with TCP in the Data Center TCP Incast TPC timeouts Improvements
More informationSource Address Validation: from the Current Network Architecture to SDN-based Architecture
Source Address Validation: from the Current Network Architecture to SDN-based Architecture Jun Bi Tsinghua University/CERNET GFI 2013 Nov. 20, 2013 1 Content Source Address Validation Architecture (SAVA)
More informationDevoFlow: Scaling Flow Management for High Performance Networks
DevoFlow: Scaling Flow Management for High Performance Networks SDN Seminar David Sidler 08.04.2016 1 Smart, handles everything Controller Control plane Data plane Dump, forward based on rules Existing
More informationTinyOS meets IP -- finally
TinyOS meets IP -- finally David E. Culler THE Question If Wireless Sensor Networks represent a future of billions of information devices embedded in the physical world, why don t they run THE standard
More informationPacketExpert PDF Report Details
PacketExpert PDF Report Details July 2013 GL Communications Inc. 818 West Diamond Avenue - Third Floor Gaithersburg, MD 20878 Phone: 301-670-4784 Fax: 301-670-9187 Web page: http://www.gl.com/ E-mail:
More informationNetwork Simulator 2. Telematica I (CdL Ing. INF) Ing. Giuseppe Piro.
Network Simulator 2 Telematica I (CdL Ing. INF) Ing. Giuseppe Piro g.piro@poliba.it 1 NS-2 Goals NS-2 is a Network Simulator - version 2 Can setup network topologies Generate packet traffic similar to
More informationMulticomputer distributed system LECTURE 8
Multicomputer distributed system LECTURE 8 DR. SAMMAN H. AMEEN 1 Wide area network (WAN); A WAN connects a large number of computers that are spread over large geographic distances. It can span sites in
More informationDelay Tolerant Network Routing Sathya Narayanan, Ph.D. Computer Science and Information Technology Program California State University, Monterey Bay
Delay Tolerant Network Routing Sathya Narayanan, Ph.D. Computer Science and Information Technology Program California State University, Monterey Bay This work is supported by the Naval Postgraduate School
More informationCS 421: COMPUTER NETWORKS SPRING FINAL May 8, minutes
CS 421: COMPUTR NTWORKS SPRIN 2016 INL May 8, 2016 150 minutes Name: Student No: Q1 Q2 Q3 TOT 1) a) (6 pts) iven the following parameters for a datagram packet switching network: N: number of hops between
More informationNetwork Support for Multimedia
Network Support for Multimedia Daniel Zappala CS 460 Computer Networking Brigham Young University Network Support for Multimedia 2/33 make the best of best effort use application-level techniques use CDNs
More informationDeadlock-free Routing in InfiniBand TM through Destination Renaming Λ
Deadlock-free Routing in InfiniBand TM through Destination Renaming Λ P. López, J. Flich and J. Duato Dept. of Computing Engineering (DISCA) Universidad Politécnica de Valencia, Valencia, Spain plopez@gap.upv.es
More informationCOMP211 Chapter 4 Network Layer: The Data Plane
COMP211 Chapter 4 Network Layer: The Data Plane All material copyright 1996-2016 J.F Kurose and K.W. Ross, All Rights Reserved Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross
More informationSweet Little Lies: Fake Topologies for Flexible Routing
Sweet Little Lies: Fake Topologies for Flexible Routing Stefano Vissicchio University of Louvain HotNets 27th October 2014 Joint work with Laurent Vanbever (Princeton) and Jennifer Rexford (Princeton)
More information1 Connectionless Routing
UCSD DEPARTMENT OF COMPUTER SCIENCE CS123a Computer Networking, IP Addressing and Neighbor Routing In these we quickly give an overview of IP addressing and Neighbor Routing. Routing consists of: IP addressing
More information