SlideShare a Scribd company logo
1 of 31
Download to read offline
UsingRDMAEfficientlyforKey‑Value
Services
ReadingCircleinTauraLaboratory
M1TakuyaFukuoka
January23,2020
1
Aboutthispaper
Author:AnujKalia,MichaelKaminskyandDavidG.Andersen
Thefirstauthoriscurrentlyafinal‑yearPhDstudentwithmany
publicationsrelatedtoRDMAandRPC.
ThispaperispublishedinSIGCOMM'14.
ItintroducesHERD,newdesignofRDMA‑basedkey‑value
systems.
Theauthorswroteanotherpaper[1],whichdescribeshowto
improvetheperformanceofHERD
Usingdoorbellmechanismtopostabatchofrequests
SourcecodeofHERDisavailablehere
[1]Kalia,A.,Kaminsky,M.,Labs,I.,Andersen,D.G.,Kaminsky,M.,&Andersen,D.G.(2016).DesignGuidelinesforHighPerformanceRDMA
Systems.InUSENIXATC’16(p.437).
2
Introduction
Thispaperfucusonanewkey‑valuestoresystemcalledHERD
withdetailedanaysistomakebestofRDMA
HERDadopttwounconventionaldecisionstoavoidroundtrips
ItdoesnotuseRDMAreads
ItusesamixofRDMAandtwo‑sidedverbs
Toverifytheidea,plentifulpreliminaryexperimentsareconducted
TheresultsshowHERDachivesthroughputsimilartonativeRDMA
readthroughput,whichisabout2xthanexistingsystems
HERDborrowsexistingback‑endkey‑valuestructuresfromMICA
[1]
Inthispresentation,Idon'tfocusonitsomuch.
[1]Lim,H.,Han,D.,Andersen,D.G.,&Kaminsky,M.(2014).MICA:Aholisticapproachtofastin‑memorykey‑valuestorage.InProceedings
ofthe11thUSENIXSymposiumonNetworkedSystemsDesignandImplementation,NSDI2014(pp.429–444).
3
Background
Key‑valuestore(KVS)
RDMA
4
Key‑valuestore(KVS)
KVSisoneofNoSQLswhichfitswellfortheeraofBigData
Redisandmemcachedisexamplesofsuchsystemusedfor
cachesofdatabases
Ifocusonin‑memoryKVSssystemwithasingleservermachine
5
Back‑endofkey‑valuestoresystem
(MICA)
Hereiskey‑valuedatastructuresofMICA,whichHERDborrows
ItisonlyoneexampleinmanydesignchoiceforKVSbackend
implementations
Theyarecomposeofhashindexand(circular)log
Youneedtoaccesstwice
Afigureisfromhttps://www.usenix.org/sites/default/files/conference/protected‑files/nsdi14_slides_lim.pdf 6
RDMA(RemoteDirectMemoryAccess)
One‑sidedoperationtoread/writeremotememorywhilethe
remoteCPUsareunawareofcommunication
ReducelatencyandCPUoverhead
Typicaloperations
RDMAread(READ)
RDMAwrite(WRITE)
(<=>two‑sidedoperation,notRDMA)
SEND
RECEIVE
7
RDMAPath
WRITEhavethreechancesofoptimizations
WhileREADneedsaroundtrip,optimizedWRITEonlyneedsone‑
waytrip 8
RDMApathofoptimizedWRITE
Afigureisfromhttps://conferences.sigcomm.org/sigcomm/2014/doc/slides/51.pdf
9
ExistingRDMA‑basedkey‑valuestore
DesigningKVSsystemsinwhicheachGETrequestrequiresonly1
smallRDMAreadisverydifficult
Typically,youneedtoaccesstheservertwicetogetavalue
Getapointerfromtheindex
Getavaluefromthelogs
ItisbelievedthatdoubleREADsisefficientbecauseitnever
involvesremoteCPUs
Isittruelyefficient?? 10
HERD'sdesign
11
HERD'smainidea
UseWRITEinsteadofREAD
ButthisdesignmustinvolveremoteCPUs
SoitshouldbeverifiedthatWRITEissuperiorthanREADnot
onlyinlatencyandbutalsointhroughput
Forresponse,useSENDinsteadofWRITE
Buttwo‑sidedverbsisknowntoperformworsethanone‑
sided
SotheremustbesomevirtueinSENDwhichWRITEdoesnot
have
Scalabilityforresponse
12
HowHERDworks
WRITEforrequestandSENDforresponse
ServerCPUsdolookupfromakeytoavalue
13
Preliminaryexperiments
WRITEperformsbetterthanREAD
Latency
InboundThroughput
OutboundThroughput
Forresponse,SENDperformsbetterthanWRITE
Scalability
14
LatencyofREADand(optimized)WRITE
Youcansee(ECHO/2)togetfull‑optimizedWRITElatency
ThesendercannotrecognizewhenoptimizedWRITEfinishes
(ECHO/2)performsbetterthanREAD
Itisduetothediffrenceofthelengthofcommunicationpath
15
RDMApath(again)
16
InboundthroughputofREADandWRITE
WRITErepresents(maybe)inlinedWRITE
(Nodiscriptionaboutinliningonthepaper)
WRITEperformsbetterthanREADininboundthroughput
Theauthorexplainthereasonas"inboundREADsrequireaDMA
readbytheRNICfollowedbyapackettransmission,whereas
inboundWRITEsonlyrequireaDMAwrite"
17
RDMApath(again)
(IfWRITEisnotinlined,thesamephenomenonshouldoccurand
performworse)
(TherearenodescriptionaboutinliningofWRITE,butIassume
inliningisadopted) 18
OutboundthroughputofREADandWRITE
Forsmallsizes,inlinedWRITEhashigherthroughputthanREAD
ItisexplainedbythedifferenceofpathsofinlinedWRITEand
READ
Forlargesizes,inlineWRITEhaslowerthroughputthanREAD
Thesharpdecreasesisexplainedbytheuseofwrite‑
combiningbuffersforPIOacceleration.
Inmyopinion,youcannotsaythatasingleWRITEperformsbetter
thanasingleREADfromthisresult
Ithinkthesizepayloadinoutboundwritetendstobelarger 19
PreliminaryExperiments
WRITEperformsbetterthanREAD
Latency
InboundThroughput
OutboundThroughput
Forresponse,SENDperformsbetterthanWRITE
Scalability
20
ScalabilityofWRITEandSEND
Inall‑to‑allcommunication
Clientprocessesselectaserverprocessatrandomandissue
aWRITEtoit
OutboundWRITE(Out‑write‑UC)doesnotscalewiththe
increasingnumberofclientprocesses
Thisisbecauseoftheoverheadofconnections
Thenumberofconnectionsis(N_client)x(N_server)
YoucansolveitbyusingUD(UnreliableDatagram)modewhich
onlySENDsupports 21
Evaluation
22
Experimentalenvironment
17clientmachinesrunupto3clientprocesseseach
oneservermachineruns6serverprocesses
EmulatingexistingRDMA‑basedKVSsystems
Pilaf[1]
FaRM[2]
Itonlysupportsfixedvaluesize
FaRM‑VAR
FaRMwhichcansupportvariablevaluesizes
Basically,GETsofPilafandFaRM‑VARusesmultipleREADs
[1]Mitchell,C.,Geng,Y.,&Li,J.(2013).Usingone‑sidedRDMAreadstobuildafast,CPU‑efficientkey‑valuestore.InProceedingsofthe
2013USENIXAnnualTechnicalConference,USENIXATC2013(pp.103–114).
[2]Dragojević,A.,Narayanan,D.,Castro,M.,&Hodson,O.(2014).FaRM:FastRemoteMemory.Proceedingsofthe11thUSENIXSymposium
onNetworkedSystemsDesignandImplementation(NSDI14),401–414. 23
Thoughputcomparion
HERDachieves26Mopswhichisslightlylargerthanthe
throughputofnativeRDMAreads
ThethroughputofPilafandFaRMisdeterminedbythethroughput
ofREADs
GETthroughputis9.9MopsinPilaf,whichneeds2.6READs
GETthroughputis17.2MopsinFaRM,whichisnearthemax
throughputwith288byteREADs 24
Throughputcomparisonwithvarioussizes
95%GET,5%PUT
HERDperformsbetterthanothersystems
25
Latencycomparsion
95%GET,5%PUT
Increasetheloadontheserverbyaddingmoreclientsuntilthe
serverissaturated.
FaRMprovidesthelowestlatencybecauseitrequiresonlyoneone
networkroundtripandnocomputationattheserver
However,FaRMsupportsonlyfixedvaluesize. 26
Scalability
Onemachinetorun6serverprocessesandremaining186
machinesforclientsprocesses
ThedeclineisduetothecachemissesinserverRNIC
Theauthorsclaimsthatitcanbesolvedwiththeintroductionof
DynamicallyConnectedTransportinthenewConnect‑IBcards
27
HERDCPUUse
DrawbackofHERDismoreCPUinvolvement
However,theresultshowsexistingsystemsalsohavesignificant
sourcesofCPUusage
Ialsowanttoseetheresultsinread‑intensive
28
Resistancetoskew
AworkloadwherethekeysaredrawnfromaZipfdistributionwhen
Zipfparameteris.99
95%GET,5%PUT,48bytesitems
HERD'sresistancetoskewcomesfromtwofactors
Back‑endMICAarchitecture
CPUcoressharetheRNICandloadbalancingworks
29
Conclusion
ThispaperproposedHERD,newdesignofKVSsystemwhichuse
asingleroundtripcombiningRDMAwriteforrequestandtwo‑
sidedsendforresponse
TheresultsshowHERDachivesthroughputsimilartonativeRDMA
readthroughput,whichisabout2xthanexistingsystems
ThisworkimprovedunderstandingofhowtouseRDMAtocostruct
notonlyforKVSsystemsbutalsoforfutureDRAM‑basedstorage
services
30
Mythought
Ilikethestory‑tellingofthispaperwithstrongtone
Ifeeltheauthors'spritstoinfluencetheusegeofRDMAinthe
world
However,Ithinkwesholudexaminewhetherthepreliminary
experimentstruelyfitforHERDsystem.Especially,Iwanttosee
theresultsofmicro‑benchmarksofthroughputinsuchasituation
All‑to‑allcommunication
Useallcoresinclientmachines
WRITEswithfull‑optimization
(ButImightthinkitisnotnecessarybecausetheyshowedHERD
performedtothelimitofRNIC)
IalsowanttoseethecomparisonbetweenHERDandstate‑of‑
the‑artKVSsystemswithnoRDMA
IthinkHERDcannotproveitsmeritswithlargevaluesizes 31

More Related Content

Similar to Using RDMA Efficiently for Key-Value Services

Robust Algorithm for Discrete Tomography with Gray Value Estimation
Robust Algorithm for Discrete Tomography with Gray Value EstimationRobust Algorithm for Discrete Tomography with Gray Value Estimation
Robust Algorithm for Discrete Tomography with Gray Value Estimation
Association of Scientists, Developers and Faculties
 
Taste Java In The Clouds
Taste Java In The CloudsTaste Java In The Clouds
Taste Java In The Clouds
Jacky Chu
 
Screening of Mental Health in Adolescents using ML.pptx
Screening of Mental Health in Adolescents using ML.pptxScreening of Mental Health in Adolescents using ML.pptx
Screening of Mental Health in Adolescents using ML.pptx
NitishChoudhary23
 

Similar to Using RDMA Efficiently for Key-Value Services (20)

Angstrom advanced adx 8000 mini θ - θ powder x-ray diffraction instrument
Angstrom advanced adx 8000 mini θ - θ powder x-ray diffraction instrumentAngstrom advanced adx 8000 mini θ - θ powder x-ray diffraction instrument
Angstrom advanced adx 8000 mini θ - θ powder x-ray diffraction instrument
 
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
 
Robust Algorithm for Discrete Tomography with Gray Value Estimation
Robust Algorithm for Discrete Tomography with Gray Value EstimationRobust Algorithm for Discrete Tomography with Gray Value Estimation
Robust Algorithm for Discrete Tomography with Gray Value Estimation
 
R programming analysis
R programming analysisR programming analysis
R programming analysis
 
IRJET- K-SVD: Dictionary Developing Algorithms for Sparse Representation ...
IRJET-  	  K-SVD: Dictionary Developing Algorithms for Sparse Representation ...IRJET-  	  K-SVD: Dictionary Developing Algorithms for Sparse Representation ...
IRJET- K-SVD: Dictionary Developing Algorithms for Sparse Representation ...
 
NEW APPROACHES WITH CHORD IN EFFICIENT P2P GRID RESOURCE DISCOVERY
NEW APPROACHES WITH CHORD IN EFFICIENT P2P GRID RESOURCE DISCOVERYNEW APPROACHES WITH CHORD IN EFFICIENT P2P GRID RESOURCE DISCOVERY
NEW APPROACHES WITH CHORD IN EFFICIENT P2P GRID RESOURCE DISCOVERY
 
New approaches with chord in efficient p2p grid resource discovery
New approaches with chord in efficient p2p grid resource discoveryNew approaches with chord in efficient p2p grid resource discovery
New approaches with chord in efficient p2p grid resource discovery
 
Taste Java In The Clouds
Taste Java In The CloudsTaste Java In The Clouds
Taste Java In The Clouds
 
Ijsws14 423 (1)-paper-17-normalization of data in (1)
Ijsws14 423 (1)-paper-17-normalization of data in (1)Ijsws14 423 (1)-paper-17-normalization of data in (1)
Ijsws14 423 (1)-paper-17-normalization of data in (1)
 
IRJET- Performance Analysis of RSA Algorithm with CUDA Parallel Computing
IRJET- Performance Analysis of RSA Algorithm with CUDA Parallel ComputingIRJET- Performance Analysis of RSA Algorithm with CUDA Parallel Computing
IRJET- Performance Analysis of RSA Algorithm with CUDA Parallel Computing
 
factorization methods
factorization methodsfactorization methods
factorization methods
 
IRJET- Review of Existing Methods in K-Means Clustering Algorithm
IRJET- Review of Existing Methods in K-Means Clustering AlgorithmIRJET- Review of Existing Methods in K-Means Clustering Algorithm
IRJET- Review of Existing Methods in K-Means Clustering Algorithm
 
IRJET - A Review on Crypto-Algorithm using Different Hardware
IRJET -  	  A Review on Crypto-Algorithm using Different HardwareIRJET -  	  A Review on Crypto-Algorithm using Different Hardware
IRJET - A Review on Crypto-Algorithm using Different Hardware
 
Optimal Clustering Technique for Handwritten Nandinagari Character Recognition
Optimal Clustering Technique for Handwritten Nandinagari Character RecognitionOptimal Clustering Technique for Handwritten Nandinagari Character Recognition
Optimal Clustering Technique for Handwritten Nandinagari Character Recognition
 
Jf3416691674
Jf3416691674Jf3416691674
Jf3416691674
 
The pertinent single-attribute-based classifier for small datasets classific...
The pertinent single-attribute-based classifier  for small datasets classific...The pertinent single-attribute-based classifier  for small datasets classific...
The pertinent single-attribute-based classifier for small datasets classific...
 
Screening of Mental Health in Adolescents using ML.pptx
Screening of Mental Health in Adolescents using ML.pptxScreening of Mental Health in Adolescents using ML.pptx
Screening of Mental Health in Adolescents using ML.pptx
 
Ppt for paper id 696 a review of hybrid data mining algorithm for big data mi...
Ppt for paper id 696 a review of hybrid data mining algorithm for big data mi...Ppt for paper id 696 a review of hybrid data mining algorithm for big data mi...
Ppt for paper id 696 a review of hybrid data mining algorithm for big data mi...
 
1855 1860
1855 18601855 1860
1855 1860
 
1855 1860
1855 18601855 1860
1855 1860
 

More from TakuyaFukuoka2

A Survey on Performance Analytical Tools for Partitioned Global Address Space
A Survey on Performance Analytical Tools for Partitioned Global Address SpaceA Survey on Performance Analytical Tools for Partitioned Global Address Space
A Survey on Performance Analytical Tools for Partitioned Global Address Space
TakuyaFukuoka2
 
Loom: flexible and efficient NIC packet scheduling
Loom: flexible and efficient NIC packet schedulingLoom: flexible and efficient NIC packet scheduling
Loom: flexible and efficient NIC packet scheduling
TakuyaFukuoka2
 
LITE Kernel RDMA Support for Datacenter Applications
LITE Kernel RDMA Support for Datacenter ApplicationsLITE Kernel RDMA Support for Datacenter Applications
LITE Kernel RDMA Support for Datacenter Applications
TakuyaFukuoka2
 
Tardis: Time Traveling Coherence Algorithm for Distributed Shared Memory
Tardis: Time Traveling Coherence Algorithm for Distributed Shared MemoryTardis: Time Traveling Coherence Algorithm for Distributed Shared Memory
Tardis: Time Traveling Coherence Algorithm for Distributed Shared Memory
TakuyaFukuoka2
 
Hybrid MPI: Efficient Message Passing for Multi-core Systems
Hybrid MPI: Efficient Message Passing for Multi-core Systems Hybrid MPI: Efficient Message Passing for Multi-core Systems
Hybrid MPI: Efficient Message Passing for Multi-core Systems
TakuyaFukuoka2
 
Overlapping Communication and Computation by Using a Hybrid MPI/SMPSs Approach
Overlapping Communication and Computation by Using a Hybrid MPI/SMPSs ApproachOverlapping Communication and Computation by Using a Hybrid MPI/SMPSs Approach
Overlapping Communication and Computation by Using a Hybrid MPI/SMPSs Approach
TakuyaFukuoka2
 

More from TakuyaFukuoka2 (10)

業務で ISUCON することになった話.pdf
業務で ISUCON することになった話.pdf業務で ISUCON することになった話.pdf
業務で ISUCON することになった話.pdf
 
A Survey on Performance Analytical Tools for Partitioned Global Address Space
A Survey on Performance Analytical Tools for Partitioned Global Address SpaceA Survey on Performance Analytical Tools for Partitioned Global Address Space
A Survey on Performance Analytical Tools for Partitioned Global Address Space
 
Loom: flexible and efficient NIC packet scheduling
Loom: flexible and efficient NIC packet schedulingLoom: flexible and efficient NIC packet scheduling
Loom: flexible and efficient NIC packet scheduling
 
LITE Kernel RDMA Support for Datacenter Applications
LITE Kernel RDMA Support for Datacenter ApplicationsLITE Kernel RDMA Support for Datacenter Applications
LITE Kernel RDMA Support for Datacenter Applications
 
Page Fault Support for Network Controllers
Page Fault Support for Network ControllersPage Fault Support for Network Controllers
Page Fault Support for Network Controllers
 
Hyperbolic Caching: Flexible Caching for Web Applications
Hyperbolic Caching: Flexible Caching for Web ApplicationsHyperbolic Caching: Flexible Caching for Web Applications
Hyperbolic Caching: Flexible Caching for Web Applications
 
Latency-Tolerant Software Distributed Shared Memory
Latency-Tolerant Software Distributed Shared MemoryLatency-Tolerant Software Distributed Shared Memory
Latency-Tolerant Software Distributed Shared Memory
 
Tardis: Time Traveling Coherence Algorithm for Distributed Shared Memory
Tardis: Time Traveling Coherence Algorithm for Distributed Shared MemoryTardis: Time Traveling Coherence Algorithm for Distributed Shared Memory
Tardis: Time Traveling Coherence Algorithm for Distributed Shared Memory
 
Hybrid MPI: Efficient Message Passing for Multi-core Systems
Hybrid MPI: Efficient Message Passing for Multi-core Systems Hybrid MPI: Efficient Message Passing for Multi-core Systems
Hybrid MPI: Efficient Message Passing for Multi-core Systems
 
Overlapping Communication and Computation by Using a Hybrid MPI/SMPSs Approach
Overlapping Communication and Computation by Using a Hybrid MPI/SMPSs ApproachOverlapping Communication and Computation by Using a Hybrid MPI/SMPSs Approach
Overlapping Communication and Computation by Using a Hybrid MPI/SMPSs Approach
 

Recently uploaded

dkNET Webinar "Texera: A Scalable Cloud Computing Platform for Sharing Data a...
dkNET Webinar "Texera: A Scalable Cloud Computing Platform for Sharing Data a...dkNET Webinar "Texera: A Scalable Cloud Computing Platform for Sharing Data a...
dkNET Webinar "Texera: A Scalable Cloud Computing Platform for Sharing Data a...
dkNET
 
biology HL practice questions IB BIOLOGY
biology HL practice questions IB BIOLOGYbiology HL practice questions IB BIOLOGY
biology HL practice questions IB BIOLOGY
1301aanya
 
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdfPests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
PirithiRaju
 
Bacterial Identification and Classifications
Bacterial Identification and ClassificationsBacterial Identification and Classifications
Bacterial Identification and Classifications
Areesha Ahmad
 
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 bAsymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Sérgio Sacani
 
SCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptx
SCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptxSCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptx
SCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptx
RizalinePalanog2
 
Introduction,importance and scope of horticulture.pptx
Introduction,importance and scope of horticulture.pptxIntroduction,importance and scope of horticulture.pptx
Introduction,importance and scope of horticulture.pptx
Bhagirath Gogikar
 

Recently uploaded (20)

STS-UNIT 4 CLIMATE CHANGE POWERPOINT PRESENTATION
STS-UNIT 4 CLIMATE CHANGE POWERPOINT PRESENTATIONSTS-UNIT 4 CLIMATE CHANGE POWERPOINT PRESENTATION
STS-UNIT 4 CLIMATE CHANGE POWERPOINT PRESENTATION
 
Dopamine neurotransmitter determination using graphite sheet- graphene nano-s...
Dopamine neurotransmitter determination using graphite sheet- graphene nano-s...Dopamine neurotransmitter determination using graphite sheet- graphene nano-s...
Dopamine neurotransmitter determination using graphite sheet- graphene nano-s...
 
9999266834 Call Girls In Noida Sector 22 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 22 (Delhi) Call Girl Service9999266834 Call Girls In Noida Sector 22 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 22 (Delhi) Call Girl Service
 
pumpkin fruit fly, water melon fruit fly, cucumber fruit fly
pumpkin fruit fly, water melon fruit fly, cucumber fruit flypumpkin fruit fly, water melon fruit fly, cucumber fruit fly
pumpkin fruit fly, water melon fruit fly, cucumber fruit fly
 
dkNET Webinar "Texera: A Scalable Cloud Computing Platform for Sharing Data a...
dkNET Webinar "Texera: A Scalable Cloud Computing Platform for Sharing Data a...dkNET Webinar "Texera: A Scalable Cloud Computing Platform for Sharing Data a...
dkNET Webinar "Texera: A Scalable Cloud Computing Platform for Sharing Data a...
 
GBSN - Microbiology (Unit 3)
GBSN - Microbiology (Unit 3)GBSN - Microbiology (Unit 3)
GBSN - Microbiology (Unit 3)
 
biology HL practice questions IB BIOLOGY
biology HL practice questions IB BIOLOGYbiology HL practice questions IB BIOLOGY
biology HL practice questions IB BIOLOGY
 
COMPUTING ANTI-DERIVATIVES (Integration by SUBSTITUTION)
COMPUTING ANTI-DERIVATIVES(Integration by SUBSTITUTION)COMPUTING ANTI-DERIVATIVES(Integration by SUBSTITUTION)
COMPUTING ANTI-DERIVATIVES (Integration by SUBSTITUTION)
 
IDENTIFICATION OF THE LIVING- forensic medicine
IDENTIFICATION OF THE LIVING- forensic medicineIDENTIFICATION OF THE LIVING- forensic medicine
IDENTIFICATION OF THE LIVING- forensic medicine
 
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdfPests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
 
Connaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verified
Connaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verifiedConnaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verified
Connaught Place, Delhi Call girls :8448380779 Model Escorts | 100% verified
 
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
 
Bacterial Identification and Classifications
Bacterial Identification and ClassificationsBacterial Identification and Classifications
Bacterial Identification and Classifications
 
Proteomics: types, protein profiling steps etc.
Proteomics: types, protein profiling steps etc.Proteomics: types, protein profiling steps etc.
Proteomics: types, protein profiling steps etc.
 
Factory Acceptance Test( FAT).pptx .
Factory Acceptance Test( FAT).pptx       .Factory Acceptance Test( FAT).pptx       .
Factory Acceptance Test( FAT).pptx .
 
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 bAsymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
Asymmetry in the atmosphere of the ultra-hot Jupiter WASP-76 b
 
Zoology 5th semester notes( Sumit_yadav).pdf
Zoology 5th semester notes( Sumit_yadav).pdfZoology 5th semester notes( Sumit_yadav).pdf
Zoology 5th semester notes( Sumit_yadav).pdf
 
Unit5-Cloud.pptx for lpu course cse121 o
Unit5-Cloud.pptx for lpu course cse121 oUnit5-Cloud.pptx for lpu course cse121 o
Unit5-Cloud.pptx for lpu course cse121 o
 
SCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptx
SCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptxSCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptx
SCIENCE-4-QUARTER4-WEEK-4-PPT-1 (1).pptx
 
Introduction,importance and scope of horticulture.pptx
Introduction,importance and scope of horticulture.pptxIntroduction,importance and scope of horticulture.pptx
Introduction,importance and scope of horticulture.pptx
 

Using RDMA Efficiently for Key-Value Services