14th ANNUAL WORKSHOP 2018 A NEW APPROACH TO SWITCHING NETWORK IMPLEMENTATION. Harold E. Cook. Director of Software Engineering Lightfleet Corporation

Similar documents
Messaging Overview. Introduction. Gen-Z Messaging

CSCI Computer Networks

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ

NFS/RDMA over 40Gbps iwarp Wael Noureddine Chelsio Communications

Lecture 3. The Network Layer (cont d) Network Layer 1-1

Lecture 8: February 19

Switching & ARP Week 3

Master Course Computer Networks IN2097

UDP: Datagram Transport Service

Informatix Solutions INFINIBAND OVERVIEW. - Informatix Solutions, Page 1 Version 1.0

19: Networking. Networking Hardware. Mark Handley

LAN Overview (part 2) Interconnecting LANs - Hubs

Introduction to Protocols

Meltdown and Spectre Interconnect Performance Evaluation Jan Mellanox Technologies

Lecture 8. Network Layer (cont d) Network Layer 1-1

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 11

CYBER ATTACKS EXPLAINED: PACKET SPOOFING

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

Communication has significant impact on application performance. Interconnection networks therefore have a vital role in cluster systems.

Layer 2 functionality bridging and switching

CS-461 Internetworking. Dr. Mohamed Aboutabl

Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP BLM431 Computer Networks Dr.

Summary of MAC protocols

Example: Configuring DHCP Snooping and DAI to Protect the Switch from ARP Spoofing Attacks

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

A Review on ICMPv6 Vulnerabilities and its Mitigation Techniques: Classification and Art

Chapter 4 Network Layer

Local Area Networks and the Network Protocol Stack

Chelsio Communications. Meeting Today s Datacenter Challenges. Produced by Tabor Custom Publishing in conjunction with: CUSTOM PUBLISHING

Configuring Dynamic ARP Inspection

Chapter 24. Transport-Layer Protocols

CMSC 332 Computer Networks Network Layer

Protecting Network Quality of Service Against Denial of Service Attacks

Department of Computer Science and Engineering. Final Examination. Instructor: N. Vlajic Date: April 15, 2011

Lecture 7: February 10

WINDOWS RDMA (ALMOST) EVERYWHERE

Ethernet. Network Fundamentals Chapter Cisco Systems, Inc. All rights reserved. Cisco Public 1

CCNA Exploration1 Chapter 7: OSI Data Link Layer

End-to-End Adaptive Packet Aggregation for High-Throughput I/O Bus Network Using Ethernet

OpenFabrics Interface WG A brief introduction. Paul Grun co chair OFI WG Cray, Inc.

Homework 1. Question 1 - Layering. CSCI 1680 Computer Networks Fonseca

Problem 7. Problem 8. Problem 9

OpenOnload. Dave Parry VP of Engineering Steve Pope CTO Dave Riddoch Chief Software Architect

Chapter 6 Connecting Device

CSE398: Network Systems Design

Internetworking Over SpaceWire: A Link-Layer Layer Broadcast Service for Network Stack Support

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

Virtual Dispersive Networking Spread Spectrum IP

CS519: Computer Networks. Lecture 1 (part 2): Jan 28, 2004 Intro to Computer Networking

The aim of this unit is to review the main concepts related to TCP and UDP transport protocols, as well as application protocols. These concepts are

THE TRANSPORT LAYER UNIT IV

CS610 Computer Network Final Term Papers Solved MCQs with reference by Virtualians Social Network

Lecture 8: February 17

Implementation of a Reliable Multicast Transport Protocol (RMTP)

Birds of a Feather Presentation

AN ENGINEER S GUIDE TO TMoIP

Transparent TCP Recovery

The Best Protocol for Real-time Data Transport

Ethernet: The High Bandwidth Low-Latency Data Center Switching Fabric

Underlying Technologies -Continued-

Advanced Computer Networks. End Host Optimization

BlueGene/L. Computer Science, University of Warwick. Source: IBM

Configuring Dynamic ARP Inspection

Chapter 7. The Transport Layer

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,

Hardened Security in the Cloud Bob Doud, Sr. Director Marketing March, 2018

Multicast EECS 122: Lecture 16

HyperIP : SRDF Application Note

IP Address Assignment

iscsi or iser? Asgeir Eiriksson CTO Chelsio Communications Inc

CCNA2 Chapter 1 Practice

1. Data Link Layer (Layer 2)

Switched Network Latency Problems Solved

Quality of Service in the Internet

CHAPTER 18 INTERNET PROTOCOLS ANSWERS TO QUESTIONS

CS 4390 Computer Networks. Transport Services and Protocols

TDT Appendix E Interconnection Networks

ELEC5616 COMPUTER & NETWORK SECURITY

Networks. Other Matters: draft Assignment 2 up (Labs 7 & 8 v. important!!) Ref: [Coulouris&al Ch 3, 4] network performance and principles

A Framework for Optimizing IP over Ethernet Naming System

Connecting to the Network

Quality of Service in the Internet

NETWORK PROBLEM SET Solution

AN INTRODUCTION TO ARP SPOOFING

Guide To TCP/IP, Second Edition UDP Header Source Port Number (16 bits) IP HEADER Protocol Field = 17 Destination Port Number (16 bit) 15 16

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

Access Technologies! Fabio Martignon

CSC 6575: Internet Security Fall Attacks on Different OSI Layer Protocols OSI Layer Basic Attacks at Lower Layers

Lecture 16: Network Layer Overview, Internet Protocol

Network Layer: Control/data plane, addressing, routers

The Transformation of Media & Broadcast Video Production to a Professional Media Network

Goals and topics. Verkkomedian perusteet Fundamentals of Network Media T Circuit switching networks. Topics. Packet-switching networks

Chapter 4. Computer Networking: A Top Down Approach 5 th edition. Jim Kurose, Keith Ross Addison-Wesley, sl April 2009.

RapidIO.org Update. Mar RapidIO.org 1

Chapter 6. (Week 12) The Transport Layer (CONTINUATION) ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP

CSE 1 23: Computer Networks

RoCE vs. iwarp Competitive Analysis

CHAPTER 1: VLANS. Routing & Switching

In modern computers data is usually stored in files, that can be small or very, very large. One might assume that, when we transfer a file from one

Transcription:

14th ANNUAL WORKSHOP 2018 A NEW APPROACH TO SWITCHING NETWORK IMPLEMENTATION Harold E. Cook Director of Software Engineering Lightfleet Corporation April 9, 2018

OBJECTIVES Discuss efficiency and reliability issues in routable networks due to packet structures and software required to move them through the fabric Present a new approach which overcomes issues in typical software based routing and delivers new levels of performance and flexibility 2 OpenFabrics Alliance Workshop 2018

PACKET STRUCTURES In general, routable network packets consist of: Control information 1 or more packet headers depending on protocols Verification information (checksums) Data or payload 3 OpenFabrics Alliance Workshop 2018

PACKET SWITCHING Switches use software stacks to examine control information to determine packet routing In many cases, Software based table lookups Overhead varies depending upon Packet type Unicast, Multicast or Broadcast Pass-through mode of the switch Store-and-forward or Cut-through 4 OpenFabrics Alliance Workshop 2018

PACKET SWITCHING SPECIAL CASE: MULTICAST Multicast packets are especially onerous Generally need to be replicated on a subset of the available ports serial retransmission to each port Skew and jitter in transit times from first port to last port Creates opportunity for congestion in the network that will result in dropped packets in switches under load 5 OpenFabrics Alliance Workshop 2018

MULTICAST SKEW AND JITTER 6 OpenFabrics Alliance Workshop 2018

CONGESTION AND PACKET LOSS Congestion and packet loss is reality in software oriented switches Lost/dropped packets must be detected in protocol software stacks Recovery incurs additional overhead 7 OpenFabrics Alliance Workshop 2018

NETWORK SECURITY Software Stack based switches are vulnerable to cyber attacks, including: Denial of Service Malicious code attacks targeted at the processors in switches, e.g., Spectre and Meltdown Spoofed protocol packets or man in the middle Others 8 OpenFabrics Alliance Workshop 2018

ROUTABLE NETWORK SUMMARY Packets carry everything necessary to be routed to their destination Packets examined by every switch along the way to determine where the packet is going Software table look-up latency Multicast poorly handled in switch software 9 OpenFabrics Alliance Workshop 2018

A NEW APPROACH 10 OpenFabrics Alliance Workshop 2018

A NEW APPROACH SWITCHLESS NETWORKING Use a protocol to enable hardware routing and eliminate the software overhead from the switch 11 OpenFabrics Alliance Workshop 2018

SHIFT IN NETWORKING PARADIGM Move from: Packets carry everything necessary for the network to figure out where the packet goes Requires significant software overhead Network switching and routing software OS based network stack To: The application defines its needs (i.e. groups) and the network adapts to fulfill these needs 12 OpenFabrics Alliance Workshop 2018

FOR YOUR CONSIDERATION Many applications involve a set of hosts, working together in a bounded environment to provide services In this type of environment why tolerate: Throughput penalty of generalized network protocol(s), and The software overhead that is required to support them 13 OpenFabrics Alliance Workshop 2018

EXAMPLES Supercomputers, HPC clusters, Big Data Analytics clusters, etc. Multi-host applications which run long periods e.g. market analysis/trading, billing, inventory systems, microservice environments, etc. Storage networks Front side or back end of large storage arrays NVMe fabrics 14 OpenFabrics Alliance Workshop 2018

THE ALTERNATIVE A connectionoriented protocol Deterministic packet routing at hardware speeds Reliable data transmission Zero Lost Packets Hardware flow control 15 OpenFabrics Alliance Workshop 2018

THE ALTERNATIVE Everything is inherently multicast No skew in end point arrival time Unicast is simplified multicast case 16 OpenFabrics Alliance Workshop 2018

THE ALTERNATIVE Kernel bypass architecture User space memory transfers Supports standard APIs and frameworks 17 OpenFabrics Alliance Workshop 2018

CONNECTION-ORIENTED PROTOCOL Application defines groups of one or more servers that receive data Data written to the group is transferred to all members of the group Groups are dynamic Nodes enter & leave as needed 18 OpenFabrics Alliance Workshop 2018

PACKET ROUTING AT HARDWARE SPEEDS Packet routing determined by group identifier Lookup is done in hardware not software Latency greatly reduced! 19 OpenFabrics Alliance Workshop 2018

EVERYTHING IS INHERENTLY MULTICAST Data moved to all exit ports simultaneously No skew and no jitter! Critically important in time sensitive applications True multicast was lost in the transition from bus based networks to star topologies Ongoing research & investigation into applications and benefits of Multicast. Examples: High Performance Multicast, AFRL, 2012, Birman, et al Building Smart memories and Cloud Services with Derecho, Sagar Jha, et al, Cornell University 20 OpenFabrics Alliance Workshop 2018

RECALL THIS SLIDE FROM EARLIER 21 OpenFabrics Alliance Workshop 2018

SKEW-LESS AND JITTER-LESS MULTICAST Multicast with no skew, no jitter and 12x faster* *SOURCE: Tolly Report #216157, Nov. 2016 22 OpenFabrics Alliance Workshop 2018

KERNEL BYPASS ARCHITECTURE Improved latency and throughput No kernel or network stack overhead User space to user space transfers Zero copy Kernel drivers are used to initialize hardware and manage group subscription tables 23 OpenFabrics Alliance Workshop 2018

API AND FRAMEWORK SUPPORT OFED, LibFabric, Verbs MPI and other Clustering Netty Big Data Analytics & JAVA environments Aeron, 29West, Informatica, Derecho Messaging based applications Network emulation (i.e. Ethernet) Access standard networking interfaces 24 OpenFabrics Alliance Workshop 2018

PERSISTENT MEMORY Highest and best use cases for persistent memory are: Expanded front side memory bus architecture for local access such as Gen-Z, etc. Lowest Latency, highest throughput reliable network for NVMeoF 25 OpenFabrics Alliance Workshop 2018

NETWORK SECURITY Hardware implementation means that there are no processors to attack All data is encapsulated by hardware, there is no point at which a protocol packets or headers can be spoofed No man in the middle opportunities Denial of service not possible due to flow control implementation. 26 OpenFabrics Alliance Workshop 2018

CONCLUSION By enabling hardware routing with a new protocol and eliminating software overhead, networking becomes: Faster Simpler More reliable and secure 27 OpenFabrics Alliance Workshop 2018

14th ANNUAL WORKSHOP 2018 THANK YOU Harold E. Cook hcook@lightfleet.com http://www.lightfleet.com