This presentation covers the basic elements of the Gen Z protocol.

Similar documents
Gen-Z Identifiers September Copyright 2016 by Gen-Z. All rights reserved.

This presentation provides a high level overview of Gen Z unicast and multicast operations.

This presentation covers Gen Z Operation Classes, also referred to as OpClasses.

This presentation covers Gen Z s Security capabilities.

This presentation covers Gen Z Bank and Component Media structures. Gen Z Bank structures apply only to components that support P2P Core OpClass.

This presentation covers Gen Z Memory Management Unit (ZMMU) and memory interleave capabilities.

This presentation cover Gen Z Access Control.

This presentation covers Unsolicited Events notification and handling, and standalone acknowledgments used to confirm reliable delivery or

IPv6 is Internet protocol version 6. Following are its distinctive features as compared to IPv4. Header format simplification Expanded routing and

Chapter 6 Addressing the Network- IPv4

Connecting to the Network

QUESTION BANK EVEN SEMESTER

Networking: Network layer

Internet Protocol version 6

IPv6 Next generation IP

IPv6. IPv4 & IPv6 Header Comparison. Types of IPv6 Addresses. IPv6 Address Scope. IPv6 Header. IPv4 Header. Link-Local

IPv6 Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land

GEN-Z AN OVERVIEW AND USE CASES

MODULE: NETWORKS MODULE CODE: CAN1102C. Duration: 2 Hours 15 Mins. Instructions to Candidates:

IP - The Internet Protocol

MPLS Label Distribution Protocol (LDP)

Table of Contents. Cisco MPLS FAQ For Beginners

EE 610 Part 2: Encapsulation and network utilities

The Interconnection Structure of. The Internet. EECC694 - Shaaban

Network Working Group. Category: Standards Track BBN September 1997

INTRODUCTION OF IPV6. Ravikumar Naik 21/11/2011

Implementing RapidIO. Travis Scheckel and Sandeep Kumar. Communications Infrastructure Group, Texas Instruments

Messaging Overview. Introduction. Gen-Z Messaging

Chapter 24 Congestion Control and Quality of Service 24.1

Internet Protocols (chapter 18)

Scalability Considerations

Internetworking Part 1

CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 5 OSI MODEL NETWORK LAYER

Router and ACL ACL Filter traffic ACL: The Three Ps One ACL per protocol One ACL per direction One ACL per interface

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

The Internet. 9.1 Introduction. The Internet is a global network that supports a variety of interpersonal and interactive multimedia applications.

Virtual Private Networks Advanced Technologies

TCP /IP Fundamentals Mr. Cantu

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

IPsec NAT Transparency

Cisco Firewall Services Module Release 4.0

This presentation covers Gen Z coherency operations and semantics.

Transport Protocol (IEX-TP)

Modification to Ipv6 Neighbor Discovery and Mobile Node Operation

Chapter 4 Network Layer: The Data Plane

CHAPTER 18 INTERNET PROTOCOLS ANSWERS TO QUESTIONS

Network Working Group. Category: Standards Track Juniper Networks J. Moy Sycamore Networks December 1999

MPLS AToM Overview. Documentation Specifics. Feature Overview

Internet Engineering Task Force (IETF) Request for Comments: March 2012

IPv6. IPv6, MPLS. IPv6. IPv6 Addresses. IPv4 Packet Format. IPv6. History

ET4254 Communications and Networking 1

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061. Lecture 2. Internetworking IPv4, IPv6

MPLS Label Distribution Protocol (LDP)

Networks Homework # 2

IEEE P1722 AVBTP. Version 0.01, Alan K. Bartky Bartky Networks Send comments to

Request for Comments: 4755 Category: Standards Track December 2006

DMVPN for R&S CCIE Candidates

William Stallings Computer Organization and Architecture 10 th Edition Pearson Education, Inc., Hoboken, NJ. All rights reserved.

Configuring RTP Header Compression

Multiprotocol Label Switching (MPLS) on Cisco Routers

MPLS Core Networks Николай Милованов/Nikolay Milovanov

Lecture 3: Flow-Control

IPsec NAT Transparency

Virtual Private Networks Advanced Technologies

Networking interview questions

Chapter 3 Managing System Settings

DMVPN for R&S CCIE Candidates Johnny Bass CCIE #6458

Networks. an overview. dr. C. P. J. Koymans. Informatics Institute University of Amsterdam. February 4, 2008

n Describe sniffing concepts, including active and passive sniffing n Describe sniffing countermeasures n Describe signature analysis within Snort

Layer 2 functionality bridging and switching

[MS-TURNBWM]: Traversal using Relay NAT (TURN) Bandwidth Management Extensions

SEN366 (SEN374) (Introduction to) Computer Networks

IP Enhanced IGRP Commands

PUCPR. Internet Protocol. Edgard Jamhour E N G L I S H S E M E S T E R

University of Toronto Faculty of Applied Science and Engineering. Final Exam, December ECE 461: Internetworking Examiner: J.

PART X. Internetworking Part 1. (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution)

IPng (IPv6) Motivation. Currently: mainly servers, workstations, SLIP/PPP Address space exhaustion + new uses:

Configuring IPv6 ACLs

MPLS Label Distribution Protocol (LDP)

Internet Protocol Addressing and Routing. Redes TCP/IP

ICC. EtherNet/IP Client Driver Manual INDUSTRIAL CONTROL COMMUNICATIONS, INC Industrial Control Communications, Inc.

Communication Systems DHCP

CSCI Spring Final Exam Solution

Computer Network Architectures and Multimedia. Guy Leduc. Chapter 2 MPLS networks. Chapter 2: MPLS

Chapter 4 Network Layer: The Data Plane

Agenda DUAL STACK DEPLOYMENT. IPv6 Routing Deployment IGP. MP-BGP Deployment. OSPF ISIS Which one?

TCP/IP Protocol Suite

This Lecture. BUS Computer Facilities Network Management. Internetworking. Internetworking

Configuring RTP Header Compression

3. (a) What is bridge? Explain the operation of a LAN bridge from to (b) Explain the operation of transparent bridge.

ECE 461 Internetworking Fall Quiz 1

Cisco Service Advertisement Framework Fundamentals

Network Security Fundamentals. Network Security Fundamentals. Roadmap. Security Training Course. Module 2 Network Fundamentals

Configuring Quality of Service

The desire for higher interconnect speeds between

Master Course Computer Networks IN2097

An Industry view of IPv6 Advantages

IPv6 : Internet Protocol Version 6

History. IPv6 : Internet Protocol Version 6. IPv4 Year-Wise Allocation (/8s)

Transcription:

This presentation covers the basic elements of the Gen Z protocol. 1

2

Gen Z specifies five basic protocol packet formats: Link local, P2P Core, P2P Coherency, P2P Vendor defined, and Explicit. Link local packets are used to manage the link. These are small, fixed sized packets. P2P Core packets are optimized to connect a processor with memory in a point to point daisy chained topology. P2P Coherency packets are optimized to attach coherent components, e.g., a processor and an accelerator in point to point or mesh topologies. P2P Vendor defined packets are optimized to carry a vendor specific protocol in a point topoint or mesh topology. Explicit OpClass packets are optimized for use in point to point and switch based topologies at any scale. 3

Link local packets are fixed sized. With the exception of Link Idle, all link local packets are 128b in length. The packet is protected by two CRCs the PCRC protects the length and OpCode, and the ECRC protects the entire packet sans the ECRC field. 4

P2P Core packets vary in length based on the presence of payload data or OpCode specific fields. The Tag field within request packets is encoded to identify the component (if in a daisy chain topology) and the logical bank. The length field indicate the length; actual length is LEN * 4B. The Address field represents a byte offset within the identified logical bank. 5

P2P Coherency packets contain a VC field. This is required to prevent protocol deadlocks and to enable differentiated traffic. Unlike P2P Core, the Tag field is not encoded since coherency operations do not target logical banks. Similarly, the Address field is not associated with a logical bank; it can address up to 64b of addressable resources. 6

Explicit OpClass packets contain additional fields. These include component identifiers, OpClass labels to identify the specific explicit OpClass, Access Keys to validate whether a packet can communicate across a given interface, a Congestion field to communicate congestion and packet deadline values, a forward progress field (FPS) to indicate if a request packet was previously rejected due to a lack of resources required to execute the request, etc. The packet also includes at least 3 1 bit fields that indicate whether a multisubnet header is present, whether the Next Header field is present, and whether an application wants performance records to be generated as the packet traverses the topology. 7

Interpretation of the Address field within a packet depends upon the OpClass. For P2P Core, the Address field represents an offset within the indicated logical bank. The Address represent an integer 16 byte multiple, i.e., the lower 4 bits of the address are implicit and treated as 0000b. For P2P Coherency, the Address field represents a component wide address with byteaddress granularity. Explicit OpClass packets support two Address field sizes depending upon the targeted address space. If the request packet is a non Control OpClass packet, then it targets the component wide Data Space with byte address granularity. If the request packet is a Control OpClass packet, then it targets the component wide Control Space with byteaddress granularity. 8

With the exception of P2P Core, all Tags are opaque, un encoded handles used to correlate request packets with response packets. Tags are managed solely by the Requester. P2P Core uses a single, encoded 13 bit Tag space per component interface. The Tag is encoded to identify the component (if in a daisy chain) and the logical bank. For example, if a point to point topology and the memory component supports 128 logical banks, then the Requester may schedule up to 64 outstanding request packets per logical bank per component interface. P2P Coherency uses a single un encoded 11 bit Tag space per component interface, i.e., up to 2048 outstanding request packets per component interface. Explicit OpClass packets uses a single un encoded 12 bit Tag space per source / destination component pair. This enables up to 4096 outstanding request packets per communicating peer component. 9

The GC field is present in all Explicit OpClass packets. If GC == 1b, then this indicates an optional 4 byte field is present as illustrated. If a unicast packet, then this 4 byte field contains the source and destination component subnet identifiers (SID). If a multicast packet, then the SSID contains the subnet identifier of the source component, and, instead of a DSID, the field is interpreted as the Global Multicast Prefix. 10

The NH field is present in all explicit OpClass packets. If NH == 1b, then this indicates an additional 16 byte Next Header field is present as illustrated. The Next Header field is used to transport packet authentication fields (HMAC and ART) or a precision timestamp. 11

The RK field is present in some explicit OpClass request packets. If RK == 1b, then it indicates an additional 32 bit R Key field is present as illustrated. The R Key field is used to validate access permission to the addressed resource. 12

The LP field is present in some explicit OpClass packets. If LP == 1b, then this indicates the LPD (Logical PCI Device) field is present. The LPD field contains sub fields used to communicate PCI / PCIe specific information. 13

This concludes this presentation. Thank you. 14