SlideShare a Scribd company logo
Ethernet: Hidden Secrets
Jeff Squyres




© 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   1
First: some background
      information…
Using lots and lots and lots of servers simultaneously
                             to solve one computational problem

© 2012 Cisco and/or its affiliates. All rights reserved.               Cisco Confidential   3
Racks of
 36 1U
servers




                    Tend to send lots and lots and lots of small messages
                      across the network to stay in sync with each other

 © 2012 Cisco and/or its affiliates. All rights reserved.             Cisco Confidential   4
Send a                                  A                        B   Receive the
                  message                                                                message




                                                               Underlying network




© 2012 Cisco and/or its affiliates. All rights reserved.                                         Cisco Confidential   5
Today’s fastest networks:
                                                                   1-3μs (!)
                   Send a                                  A                        B   Receive the
                  message                                                                message




                                                               Underlying network




© 2012 Cisco and/or its affiliates. All rights reserved.                                         Cisco Confidential   6
• Typically not Ethernet networks

• Usually have supercomputer-specific networks
            Example: highly tuned for short message latency

• …but that is changing




                                              Ethernet        Ethernot




© 2012 Cisco and/or its affiliates. All rights reserved.                 Cisco Confidential   7
• Userspace NIC (“USNIC”)
            Expose Cisco NIC hardware directly to Linux userspace
            Bypass the OS
            Bypass the TCP stack

• Send raw Ethernet frames directly from user applications
            Much, much faster than traditional TCP-based networking
            Especially for latency of short messages




© 2012 Cisco and/or its affiliates. All rights reserved.              Cisco Confidential   8
Application

                                                                  MPI library

                                                           Userspace sockets library
                      Userspace

                      Kernel

                                                                TCP / IP stack



                                                               Cisco VIC driver



                                                             Cisco VIC hardware


© 2012 Cisco and/or its affiliates. All rights reserved.                               Cisco Confidential   9
Application

                                                                           MPI library

                                                                   Userspace verbs library
                      Userspace

                      Kernel
                                                           Bootstrapping                     Send and receive
                                                              and setup                         fast path
                                                                  Verbs IB core


                                                               Cisco USNIC driver


                                                                     Cisco VIC hardware


© 2012 Cisco and/or its affiliates. All rights reserved.                                                        Cisco Confidential   10
With all that background…
Two servers




© 2012 Cisco and/or its affiliates. All rights reserved.                 Cisco Confidential   12
Two servers




                                                           Each with a 2 x 10Gb NIC




© 2012 Cisco and/or its affiliates. All rights reserved.                              Cisco Confidential   13
Two servers




                                                           Each with a 2 x 10Gb NIC
                                                           Connected back-to-back




© 2012 Cisco and/or its affiliates. All rights reserved.                              Cisco Confidential   14
Send a message                                                     Receive the message
   from here                                                               here




                                                           Ping!




© 2012 Cisco and/or its affiliates. All rights reserved.                                 Cisco Confidential   15
Get the message                                                    Send the message
      back                                                               back




                                                           Pong!




© 2012 Cisco and/or its affiliates. All rights reserved.                              Cisco Confidential   16
Because each ping and pong are soooo short,
                                 do this ping-pong exchange N times




                                                           Ping! / Pong!




© 2012 Cisco and/or its affiliates. All rights reserved.                   Cisco Confidential   17
Total time for N ping-pongs


                                                           N

                       Time for one ping-pong




© 2012 Cisco and/or its affiliates. All rights reserved.       Cisco Confidential   18
Total time for N ping-pongs


                                                           N

                       Time for one ping-pong

                                                           2


                                    Time for one ping


© 2012 Cisco and/or its affiliates. All rights reserved.       Cisco Confidential   19
Time for one ping
                                                                  =
                                            Half-round trip (HRT)
                                             ping pong latency


© 2012 Cisco and/or its affiliates. All rights reserved.                       Cisco Confidential   20
TCP NetPIPE latency times: 1 10G Ethernet port
                              0.1
                                                  1 10Gb Ethernet port
                                                                                                                                8MB
                                                                                                                               ~150ms
                            0.01
Time (seconds)




                         0.001
                                                    1 byte
                                                    ~60μs

                      0.0001




                         1e-05
                                       1                                10   100           1000                 10000     100000   1e+06                     1e+07
                                                                                                  Buffer size


                 © 2012 Cisco and/or its affiliates. All rights reserved.                                                               Cisco Confidential    21
TCP NetPIPE latency times: 2 10G Ethernet ports
                              0.1
                                                   1 10Gb Ethernet port
                                                  2 10Gb Ethernet ports                                                               8MB
                                                                                                                                     ~150ms
                            0.01
Time (seconds)




                         0.001
                                                    1 byte
                                                    ~60μs                                                                                8MB
                                                                             1 byte
                      0.0001                                                ~30μs (!)                                                   ~8.3ms


                         1e-05
                                       1                                10        100           1000                 10000     100000    1e+06                     1e+07
                                                                                                       Buffer size


                 © 2012 Cisco and/or its affiliates. All rights reserved.                                                                     Cisco Confidential    22
TCP NetPIPE latency times: 2 10G Ethernet ports
                              0.1
                                                   1 10Gb Ethernet port
                                                  2 10Gb Ethernet ports                                                               8MB
                                                                                                                                     ~150ms
                            0.01
Time (seconds)




                         0.001
                                                    1 byte
                                                    ~60μs                                                                                8MB
                                                                             1 byte
                      0.0001                                                ~30μs (!)                                                   ~8.3ms


                         1e-05
                                       1                                10        100           1000                 10000     100000    1e+06                     1e+07
                                                                                                       Buffer size


                 © 2012 Cisco and/or its affiliates. All rights reserved.                                                                     Cisco Confidential    23
TCP NetPIPE latency times: 2 10G Ethernet ports
                         0.001
                                                   1 10Gb Ethernet port
                                                  2 10Gb Ethernet ports



                                                                                      The facts:
                                                                            From 1-1024 bytes: flat latency
                                                                               Using 1 interface: ~60μs
Time (seconds)




                       0.0001
                                                                              Using 2 interfaces: ~30μs
                                             ~60μs
                                             ~30μs



                         1e-05
                                       1                                         10                              100               1000
                                                                                                   Buffer size


                 © 2012 Cisco and/or its affiliates. All rights reserved.                                                             Cisco Confidential   24
TCP NetPIPE latency times: 2 10G Ethernet ports
                         0.001
                                                   1 10Gb Ethernet port
                                                  2 10Gb Ethernet ports



                                                                                      The facts:
                                                                            From 1-1024 bytes: flat latency
                                                                               Using 1 interface: ~60μs
Time (seconds)




                       0.0001
                                                                              Using 2 interfaces: ~30μs
                                             ~60μs
                                             ~30μs



                         1e-05
                                       1                                         10                              100               1000
                                                                                                   Buffer size


                 © 2012 Cisco and/or its affiliates. All rights reserved.                                                             Cisco Confidential   25
1. Ethernet frame
      arrives




© 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   26
1. Ethernet frame
      arrives




          2. NIC sends interrupt
          to OS Ethernet driver




© 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   27
1. Ethernet frame
      arrives




          2. NIC sends interrupt
          to OS Ethernet driver


                                                             3. OS Ethernet driver
                                                           copies the packet to RAM

© 2012 Cisco and/or its affiliates. All rights reserved.                      Cisco Confidential   28
1. Ethernet frame
      arrives


                                                            4. OS TCP stack hands
                                                            packet off to (whatever)
          2. NIC sends interrupt
          to OS Ethernet driver


                                                             3. OS Ethernet driver
                                                           copies the packet to RAM

© 2012 Cisco and/or its affiliates. All rights reserved.                       Cisco Confidential   29
It’s always better in bulk




© 2012 Cisco and/or its affiliates. All rights reserved.    Cisco Confidential   30
Let’s optimize
                                  this part 




© 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   31
1. Copy a bunch of
                                                           packets across PCI
                                                               at one time




© 2012 Cisco and/or its affiliates. All rights reserved.                   Cisco Confidential   32
1. Copy a bunch of
                                                           packets across PCI
                                                               at one time
  2. Only raise one
  interrupt for all of
those packet copies




© 2012 Cisco and/or its affiliates. All rights reserved.                   Cisco Confidential   33
A.k.a. “Interrupt Coalescing”

                                                           1. Copy a bunch of
                                                           packets across PCI
                                                               at one time
  2. Only raise one
  interrupt for all of
those packet copies




© 2012 Cisco and/or its affiliates. All rights reserved.                   Cisco Confidential   34
1. Ethernet frame
      arrives




© 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   35
1. Ethernet frame
      arrives



           2. Has N time passed
              since we sent an
            interrupt to the OS?




© 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   36
1. Ethernet frame
      arrives



           2. Has N time passed
              since we sent an
            interrupt to the OS?

✖ No: queue up the frame

© 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   37
1. Ethernet frame
      arrives



            2. Has N time passed
               since we sent an
             interrupt to the OS?

✖ No: queue up the frame
✔ Yes: Send all queued frames and interrupt
 © 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   38
Ok… So what?
© 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   40
Periodic interrupt
                          1. A sends ping frame             coalescing timeout
NIC A


                                                                  125μs

NIC B
                          2. B receives ping frame




 © 2012 Cisco and/or its affiliates. All rights reserved.                     Cisco Confidential   41
NIC A




NIC B

                                              3. Coalesce timer expires; B sends interrupt
                                              4. B sends pong frame


 © 2012 Cisco and/or its affiliates. All rights reserved.                                    Cisco Confidential   42
5. Coalesce timer expires; A sends interrupt
                                                            6. A sends ping frame
                                                            7. Rinse, repeat
NIC A




NIC B




 © 2012 Cisco and/or its affiliates. All rights reserved.                                          Cisco Confidential   43
4 ping-pongs in ~8x timer duration


NIC A




NIC B




 © 2012 Cisco and/or its affiliates. All rights reserved.                                        Cisco Confidential   44
NIC A




NIC B


         In general, coalescing interrupts is a very Very Good Thing



 © 2012 Cisco and/or its affiliates. All rights reserved.      Cisco Confidential   45
NIC A




NIC B


                                                     But it definitely hurts low-latency traffic



 © 2012 Cisco and/or its affiliates. All rights reserved.                                          Cisco Confidential   46
How do we reduce
those artificial delays?
NIC A
  Port 0




NIC B

NIC A
  Port 1




NIC B


 © 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   48
NIC A
  Port 0




NIC B

NIC A
  Port 1




NIC B


 © 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   49
NIC A
  Port 0




                                           In reality, sender and receiver timers on each
NIC B                                       port are wholly unrelated; they don’t line up
                                                nicely like I used in these examples.
NIC A
                                             Meaning: in general, you actually usually get
  Port 1




                                                           better overlap

NIC B


 © 2012 Cisco and/or its affiliates. All rights reserved.                                    Cisco Confidential   50
TCP NetPIPE latency times: 2 10G Ethernet ports
                         0.001
                                                   1 10Gb Ethernet port
                                                  2 10Gb Ethernet ports


                                                       In this case, we got such good asymmetry, that
                                                      the 2 port case is ~2x as fast (i.e., roughly twice
                                                      as many interrupts in the same amount of time)
Time (seconds)




                       0.0001

                                             ~60μs
                                             ~30μs



                         1e-05
                                       1                                    10                              100               1000
                                                                                              Buffer size


                 © 2012 Cisco and/or its affiliates. All rights reserved.                                                        Cisco Confidential   51
Remember:
                          these are AVERAGE
                               latencies!

        Individual ping-pong times
           are the same as the
      1 port case (from the network)

  …but you get higher throughput
   because we’re reducing the
  gaps between each ping-pong



© 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   52
Now let’s try
something else…
© 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   54
TCP NetPIPE latency times: 2 10G Ethernet ports
                           0.1
                                                            1 10Gb Ethernet port
                                                           2 10Gb Ethernet ports                                                    1 port
                                                    1 10GB Ethernet port, timer=0
                                                   2 10GB Ethernet ports, timer=0                                                  ~7.2ms
                        0.01
Time (seconds)




                                                 1 port                     2 ports
                      0.001
                                                ~10.5μs                     ~10.6μs
                                                                                                                                       2 ports
                   0.0001
                                                                                                                                       ~5.5ms


                     1e-05
                                   1                                 10      100           1000                 10000     100000      1e+06                        1e+07
                                                                                                  Buffer size

                 © 2012 Cisco and/or its affiliates. All rights reserved.                                                                     Cisco Confidential     55
Pros                                                 Cons
      • (Much) faster TCP latency                          • May not scale well for
                   …without changing app!                    case of MPI process
                                                             running on every core
      • Faster speeds seem to
              scale up to large                            • Lots and lots of interrupts
              messages, too                                 going to socket:0.core:0
      • Great for low-latency,                             • May need to run (N-1) MPI
              sparse comms apps                             processes…?
                                                              May also want to avoid
      • Best for NICs that are                                socket:0.core:0, or move IRQ
              dedicated to MPI comms                          affinity


© 2012 Cisco and/or its affiliates. All rights reserved.                             Cisco Confidential   56
• Some experimentation might be
       worth trying with real world HPC
       apps:
• Allow TCP to wholly utilize core 0
       (i.e., run MPI processes only on
       cores 1-15)
• Set the coalesce timer to something
       more than 0μs, but less than 125μs
       – there’s a whole spectrum with
       which to play




© 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   58
• Many in HPC have Ethernot networks
            …but as HPC continues to commoditize itself, lots of HPC users have
            Ethernet-based environments

• Today’s Ethernet switches and NICs are actually quite a bit faster
       and more advanced than what we old-time-HPCers grew up with
• Even good ol’ TCP is amazingly fast and optimized today

• You may be able to tune your NIC and/or fabric to extract pretty
       darn good MPI TCP performance
            The default settings on your Ethernet NIC / fabric are likely set for general TCP
            traffic – which effect very different performance characteristics than what HPC
            applications typically need




© 2012 Cisco and/or its affiliates. All rights reserved.                            Cisco Confidential   59
Thank you.

More Related Content

What's hot

Cisco 640-864 Complete Study Guide
Cisco 640-864 Complete Study GuideCisco 640-864 Complete Study Guide
Cisco 640-864 Complete Study Guide
nustouch
 
Redundant Internet service provision - customer viewpoint
Redundant Internet service provision - customer viewpointRedundant Internet service provision - customer viewpoint
Redundant Internet service provision - customer viewpointKae Hsu
 
ccmigration_09186a008033a3b4
ccmigration_09186a008033a3b4ccmigration_09186a008033a3b4
ccmigration_09186a008033a3b4guest66dc5f
 
Ccna prep from networkers
Ccna prep from networkersCcna prep from networkers
Ccna prep from networkersIvana Veljkovic
 

What's hot (8)

Cisco 640-864 Complete Study Guide
Cisco 640-864 Complete Study GuideCisco 640-864 Complete Study Guide
Cisco 640-864 Complete Study Guide
 
Cim 20070701 jul_2007
Cim 20070701 jul_2007Cim 20070701 jul_2007
Cim 20070701 jul_2007
 
Redundant Internet service provision - customer viewpoint
Redundant Internet service provision - customer viewpointRedundant Internet service provision - customer viewpoint
Redundant Internet service provision - customer viewpoint
 
Cim 20071101 nov_2007
Cim 20071101 nov_2007Cim 20071101 nov_2007
Cim 20071101 nov_2007
 
Day @ cio-gipfel 2007
Day @ cio-gipfel 2007Day @ cio-gipfel 2007
Day @ cio-gipfel 2007
 
ccmigration_09186a008033a3b4
ccmigration_09186a008033a3b4ccmigration_09186a008033a3b4
ccmigration_09186a008033a3b4
 
Ccna prep from networkers
Ccna prep from networkersCcna prep from networkers
Ccna prep from networkers
 
Cisco ios versions
Cisco ios versionsCisco ios versions
Cisco ios versions
 

Viewers also liked

I/O仮想化最前線〜ネットワークI/Oを中心に〜
I/O仮想化最前線〜ネットワークI/Oを中心に〜I/O仮想化最前線〜ネットワークI/Oを中心に〜
I/O仮想化最前線〜ネットワークI/Oを中心に〜
Ryousei Takano
 
Userspace networking
Userspace networkingUserspace networking
Userspace networking
Stephen Hemminger
 
Linux Ethernet device driver
Linux Ethernet device driverLinux Ethernet device driver
Linux Ethernet device driver
艾鍗科技
 
Hands-on ethernet driver
Hands-on ethernet driverHands-on ethernet driver
Hands-on ethernet driver
SUSE Labs Taipei
 
Understanding DPDK
Understanding DPDKUnderstanding DPDK
Understanding DPDK
Denys Haryachyy
 
DPDK KNI interface
DPDK KNI interfaceDPDK KNI interface
DPDK KNI interface
Denys Haryachyy
 
The linux networking architecture
The linux networking architectureThe linux networking architecture
The linux networking architecturehugo lu
 
The TCP/IP Stack in the Linux Kernel
The TCP/IP Stack in the Linux KernelThe TCP/IP Stack in the Linux Kernel
The TCP/IP Stack in the Linux Kernel
Divye Kapoor
 
Intel DPDK Step by Step instructions
Intel DPDK Step by Step instructionsIntel DPDK Step by Step instructions
Intel DPDK Step by Step instructions
Hisaki Ohara
 
Library Operating System for Linux #netdev01
Library Operating System for Linux #netdev01Library Operating System for Linux #netdev01
Library Operating System for Linux #netdev01
Hajime Tazaki
 
Direct Code Execution @ CoNEXT 2013
Direct Code Execution @ CoNEXT 2013Direct Code Execution @ CoNEXT 2013
Direct Code Execution @ CoNEXT 2013
Hajime Tazaki
 
NUSE (Network Stack in Userspace) at #osio
NUSE (Network Stack in Userspace) at #osioNUSE (Network Stack in Userspace) at #osio
NUSE (Network Stack in Userspace) at #osio
Hajime Tazaki
 
Recent advance in netmap/VALE(mSwitch)
Recent advance in netmap/VALE(mSwitch)Recent advance in netmap/VALE(mSwitch)
Recent advance in netmap/VALE(mSwitch)micchie
 
Рекомендованные Cisco архитектуры для различных вертикалей
Рекомендованные Cisco архитектуры для различных вертикалейРекомендованные Cisco архитектуры для различных вертикалей
Рекомендованные Cisco архитектуры для различных вертикалей
Cisco Russia
 
Time Sensitive Networking in the Linux Kernel
Time Sensitive Networking in the Linux KernelTime Sensitive Networking in the Linux Kernel
Time Sensitive Networking in the Linux Kernel
henrikau
 
Cisco systems hacking layer 2 ethernet switches
Cisco systems   hacking layer 2 ethernet switchesCisco systems   hacking layer 2 ethernet switches
Cisco systems hacking layer 2 ethernet switches
KJ Savaliya
 
OMFW 2012: Analyzing Linux Kernel Rootkits with Volatlity
OMFW 2012: Analyzing Linux Kernel Rootkits with VolatlityOMFW 2012: Analyzing Linux Kernel Rootkits with Volatlity
OMFW 2012: Analyzing Linux Kernel Rootkits with Volatlity
Andrew Case
 
A particle filter based scheme for indoor tracking on an Android Smartphone
A particle filter based scheme for indoor tracking on an Android SmartphoneA particle filter based scheme for indoor tracking on an Android Smartphone
A particle filter based scheme for indoor tracking on an Android Smartphone
Divye Kapoor
 
Cybermania Prelims
Cybermania PrelimsCybermania Prelims
Cybermania Prelims
Divye Kapoor
 

Viewers also liked (20)

I/O仮想化最前線〜ネットワークI/Oを中心に〜
I/O仮想化最前線〜ネットワークI/Oを中心に〜I/O仮想化最前線〜ネットワークI/Oを中心に〜
I/O仮想化最前線〜ネットワークI/Oを中心に〜
 
Userspace networking
Userspace networkingUserspace networking
Userspace networking
 
Linux Ethernet device driver
Linux Ethernet device driverLinux Ethernet device driver
Linux Ethernet device driver
 
Hands-on ethernet driver
Hands-on ethernet driverHands-on ethernet driver
Hands-on ethernet driver
 
Understanding DPDK
Understanding DPDKUnderstanding DPDK
Understanding DPDK
 
DPDK KNI interface
DPDK KNI interfaceDPDK KNI interface
DPDK KNI interface
 
The linux networking architecture
The linux networking architectureThe linux networking architecture
The linux networking architecture
 
The TCP/IP Stack in the Linux Kernel
The TCP/IP Stack in the Linux KernelThe TCP/IP Stack in the Linux Kernel
The TCP/IP Stack in the Linux Kernel
 
Intel DPDK Step by Step instructions
Intel DPDK Step by Step instructionsIntel DPDK Step by Step instructions
Intel DPDK Step by Step instructions
 
Library Operating System for Linux #netdev01
Library Operating System for Linux #netdev01Library Operating System for Linux #netdev01
Library Operating System for Linux #netdev01
 
Direct Code Execution @ CoNEXT 2013
Direct Code Execution @ CoNEXT 2013Direct Code Execution @ CoNEXT 2013
Direct Code Execution @ CoNEXT 2013
 
NUSE (Network Stack in Userspace) at #osio
NUSE (Network Stack in Userspace) at #osioNUSE (Network Stack in Userspace) at #osio
NUSE (Network Stack in Userspace) at #osio
 
Recent advance in netmap/VALE(mSwitch)
Recent advance in netmap/VALE(mSwitch)Recent advance in netmap/VALE(mSwitch)
Recent advance in netmap/VALE(mSwitch)
 
Рекомендованные Cisco архитектуры для различных вертикалей
Рекомендованные Cisco архитектуры для различных вертикалейРекомендованные Cisco архитектуры для различных вертикалей
Рекомендованные Cisco архитектуры для различных вертикалей
 
Time Sensitive Networking in the Linux Kernel
Time Sensitive Networking in the Linux KernelTime Sensitive Networking in the Linux Kernel
Time Sensitive Networking in the Linux Kernel
 
Cisco systems hacking layer 2 ethernet switches
Cisco systems   hacking layer 2 ethernet switchesCisco systems   hacking layer 2 ethernet switches
Cisco systems hacking layer 2 ethernet switches
 
Linux performance
Linux performanceLinux performance
Linux performance
 
OMFW 2012: Analyzing Linux Kernel Rootkits with Volatlity
OMFW 2012: Analyzing Linux Kernel Rootkits with VolatlityOMFW 2012: Analyzing Linux Kernel Rootkits with Volatlity
OMFW 2012: Analyzing Linux Kernel Rootkits with Volatlity
 
A particle filter based scheme for indoor tracking on an Android Smartphone
A particle filter based scheme for indoor tracking on an Android SmartphoneA particle filter based scheme for indoor tracking on an Android Smartphone
A particle filter based scheme for indoor tracking on an Android Smartphone
 
Cybermania Prelims
Cybermania PrelimsCybermania Prelims
Cybermania Prelims
 

Similar to Ethernet and TCP optimizations

Ole - Ipv4onlifesupport
Ole - Ipv4onlifesupportOle - Ipv4onlifesupport
Ole - Ipv4onlifesupportIPv6no
 
Ole Ipv4onlifesupport
Ole Ipv4onlifesupport Ole Ipv4onlifesupport
Ole Ipv4onlifesupport IPv6no
 
Eric Vyncke - IPv6 security in general
Eric Vyncke - IPv6 security in generalEric Vyncke - IPv6 security in general
Eric Vyncke - IPv6 security in general
IKT-Norge
 
Outsourcing your TDM Gateways: SIP Trunking as a Service Provider Cloud Service
Outsourcing your TDM Gateways: SIP Trunking as a Service Provider Cloud Service Outsourcing your TDM Gateways: SIP Trunking as a Service Provider Cloud Service
Outsourcing your TDM Gateways: SIP Trunking as a Service Provider Cloud Service
Cisco Canada
 
Daniel cornejo cisco. centros de datos unificados y su evolución hacia la nub...
Daniel cornejo cisco. centros de datos unificados y su evolución hacia la nub...Daniel cornejo cisco. centros de datos unificados y su evolución hacia la nub...
Daniel cornejo cisco. centros de datos unificados y su evolución hacia la nub...datacentersummit
 
Vbrownbag container networking for real workloads
Vbrownbag container networking for real workloadsVbrownbag container networking for real workloads
Vbrownbag container networking for real workloads
Cisco DevNet
 
Cisco X Factor 9.x Updates & More
Cisco X Factor 9.x Updates & MoreCisco X Factor 9.x Updates & More
Cisco X Factor 9.x Updates & More
ceriumnetworks
 
How Technology can help to facilitate Effective eLearning Space
How Technology can help to facilitate Effective eLearning SpaceHow Technology can help to facilitate Effective eLearning Space
How Technology can help to facilitate Effective eLearning Space
eLearning Consortium 電子學習聯盟
 
Cisco Cloud Briefing and Experiences for Cloud Slam 2011
Cisco Cloud Briefing and Experiences for Cloud Slam 2011Cisco Cloud Briefing and Experiences for Cloud Slam 2011
Cisco Cloud Briefing and Experiences for Cloud Slam 2011
Cisco Collaboration
 
High speed networks and Java (Ryan Sciampacone)
High speed networks and Java (Ryan Sciampacone)High speed networks and Java (Ryan Sciampacone)
High speed networks and Java (Ryan Sciampacone)
Chris Bailey
 
Michael Furminger
Michael  FurmingerMichael  Furminger
Michael Furminger
katero4ok
 
DEFCON 23 - Etienne Martineau - inter vm data exfiltration
DEFCON 23 - Etienne Martineau - inter vm data exfiltrationDEFCON 23 - Etienne Martineau - inter vm data exfiltration
DEFCON 23 - Etienne Martineau - inter vm data exfiltration
Felipe Prado
 
Basic Network Security_Primer
Basic Network Security_PrimerBasic Network Security_Primer
Basic Network Security_Primer
n|u - The Open Security Community
 
Sustainable Green IT, Cisco Systems
Sustainable Green IT, Cisco SystemsSustainable Green IT, Cisco Systems
Sustainable Green IT, Cisco Systems
Netzwerk GreenIT-BB
 
Webinar: Move Your Business Forward with Cisco VOIP for SMB
Webinar: Move Your Business Forward with Cisco VOIP for SMBWebinar: Move Your Business Forward with Cisco VOIP for SMB
Webinar: Move Your Business Forward with Cisco VOIP for SMB
Advanced Logic Industries
 
My harvard dream v3
My harvard dream v3My harvard dream v3
My harvard dream v3
Son Phan
 
Cloud Connect 2011 - Cisco and the Cloud: Within and Beyond the Data Center
Cloud Connect 2011 - Cisco and the Cloud: Within and Beyond the Data CenterCloud Connect 2011 - Cisco and the Cloud: Within and Beyond the Data Center
Cloud Connect 2011 - Cisco and the Cloud: Within and Beyond the Data Center
Cisco Service Provider
 
Cisco data center training for ibm
Cisco data center training for ibmCisco data center training for ibm
Cisco data center training for ibm
Christian Silva Espinoza
 

Similar to Ethernet and TCP optimizations (20)

Ole - Ipv4onlifesupport
Ole - Ipv4onlifesupportOle - Ipv4onlifesupport
Ole - Ipv4onlifesupport
 
Ole Ipv4onlifesupport
Ole Ipv4onlifesupport Ole Ipv4onlifesupport
Ole Ipv4onlifesupport
 
Cisco one pk basic
Cisco one pk basicCisco one pk basic
Cisco one pk basic
 
Cisco one pk basic
Cisco one pk basicCisco one pk basic
Cisco one pk basic
 
Eric Vyncke - IPv6 security in general
Eric Vyncke - IPv6 security in generalEric Vyncke - IPv6 security in general
Eric Vyncke - IPv6 security in general
 
Outsourcing your TDM Gateways: SIP Trunking as a Service Provider Cloud Service
Outsourcing your TDM Gateways: SIP Trunking as a Service Provider Cloud Service Outsourcing your TDM Gateways: SIP Trunking as a Service Provider Cloud Service
Outsourcing your TDM Gateways: SIP Trunking as a Service Provider Cloud Service
 
Daniel cornejo cisco. centros de datos unificados y su evolución hacia la nub...
Daniel cornejo cisco. centros de datos unificados y su evolución hacia la nub...Daniel cornejo cisco. centros de datos unificados y su evolución hacia la nub...
Daniel cornejo cisco. centros de datos unificados y su evolución hacia la nub...
 
Vbrownbag container networking for real workloads
Vbrownbag container networking for real workloadsVbrownbag container networking for real workloads
Vbrownbag container networking for real workloads
 
Cisco X Factor 9.x Updates & More
Cisco X Factor 9.x Updates & MoreCisco X Factor 9.x Updates & More
Cisco X Factor 9.x Updates & More
 
How Technology can help to facilitate Effective eLearning Space
How Technology can help to facilitate Effective eLearning SpaceHow Technology can help to facilitate Effective eLearning Space
How Technology can help to facilitate Effective eLearning Space
 
Cisco Cloud Briefing and Experiences for Cloud Slam 2011
Cisco Cloud Briefing and Experiences for Cloud Slam 2011Cisco Cloud Briefing and Experiences for Cloud Slam 2011
Cisco Cloud Briefing and Experiences for Cloud Slam 2011
 
High speed networks and Java (Ryan Sciampacone)
High speed networks and Java (Ryan Sciampacone)High speed networks and Java (Ryan Sciampacone)
High speed networks and Java (Ryan Sciampacone)
 
Michael Furminger
Michael  FurmingerMichael  Furminger
Michael Furminger
 
DEFCON 23 - Etienne Martineau - inter vm data exfiltration
DEFCON 23 - Etienne Martineau - inter vm data exfiltrationDEFCON 23 - Etienne Martineau - inter vm data exfiltration
DEFCON 23 - Etienne Martineau - inter vm data exfiltration
 
Basic Network Security_Primer
Basic Network Security_PrimerBasic Network Security_Primer
Basic Network Security_Primer
 
Sustainable Green IT, Cisco Systems
Sustainable Green IT, Cisco SystemsSustainable Green IT, Cisco Systems
Sustainable Green IT, Cisco Systems
 
Webinar: Move Your Business Forward with Cisco VOIP for SMB
Webinar: Move Your Business Forward with Cisco VOIP for SMBWebinar: Move Your Business Forward with Cisco VOIP for SMB
Webinar: Move Your Business Forward with Cisco VOIP for SMB
 
My harvard dream v3
My harvard dream v3My harvard dream v3
My harvard dream v3
 
Cloud Connect 2011 - Cisco and the Cloud: Within and Beyond the Data Center
Cloud Connect 2011 - Cisco and the Cloud: Within and Beyond the Data CenterCloud Connect 2011 - Cisco and the Cloud: Within and Beyond the Data Center
Cloud Connect 2011 - Cisco and the Cloud: Within and Beyond the Data Center
 
Cisco data center training for ibm
Cisco data center training for ibmCisco data center training for ibm
Cisco data center training for ibm
 

More from Jeff Squyres

Open MPI State of the Union X SC'16 BOF
Open MPI State of the Union X SC'16 BOFOpen MPI State of the Union X SC'16 BOF
Open MPI State of the Union X SC'16 BOF
Jeff Squyres
 
MPI Sessions: a proposal to the MPI Forum
MPI Sessions: a proposal to the MPI ForumMPI Sessions: a proposal to the MPI Forum
MPI Sessions: a proposal to the MPI Forum
Jeff Squyres
 
MPI Fourm SC'15 BOF
MPI Fourm SC'15 BOFMPI Fourm SC'15 BOF
MPI Fourm SC'15 BOF
Jeff Squyres
 
Open MPI SC'15 State of the Union BOF
Open MPI SC'15 State of the Union BOFOpen MPI SC'15 State of the Union BOF
Open MPI SC'15 State of the Union BOF
Jeff Squyres
 
Cisco's journey from Verbs to Libfabric
Cisco's journey from Verbs to LibfabricCisco's journey from Verbs to Libfabric
Cisco's journey from Verbs to Libfabric
Jeff Squyres
 
(Very) Loose proposal to revamp MPI_INIT and MPI_FINALIZE
(Very) Loose proposal to revamp MPI_INIT and MPI_FINALIZE(Very) Loose proposal to revamp MPI_INIT and MPI_FINALIZE
(Very) Loose proposal to revamp MPI_INIT and MPI_FINALIZE
Jeff Squyres
 
Fun with Github webhooks: verifying Signed-off-by
Fun with Github webhooks: verifying Signed-off-byFun with Github webhooks: verifying Signed-off-by
Fun with Github webhooks: verifying Signed-off-by
Jeff Squyres
 
Open MPI new version number scheme and roadmap
Open MPI new version number scheme and roadmapOpen MPI new version number scheme and roadmap
Open MPI new version number scheme and roadmap
Jeff Squyres
 
The State of libfabric in Open MPI
The State of libfabric in Open MPIThe State of libfabric in Open MPI
The State of libfabric in Open MPI
Jeff Squyres
 
Cisco usNIC libfabric provider
Cisco usNIC libfabric providerCisco usNIC libfabric provider
Cisco usNIC libfabric provider
Jeff Squyres
 
2014 01-21-mpi-community-feedback
2014 01-21-mpi-community-feedback2014 01-21-mpi-community-feedback
2014 01-21-mpi-community-feedback
Jeff Squyres
 
(Open) MPI, Parallel Computing, Life, the Universe, and Everything
(Open) MPI, Parallel Computing, Life, the Universe, and Everything(Open) MPI, Parallel Computing, Life, the Universe, and Everything
(Open) MPI, Parallel Computing, Life, the Universe, and Everything
Jeff Squyres
 
Cisco usNIC: how it works, how it is used in Open MPI
Cisco usNIC: how it works, how it is used in Open MPICisco usNIC: how it works, how it is used in Open MPI
Cisco usNIC: how it works, how it is used in Open MPI
Jeff Squyres
 
Cisco EuroMPI'13 vendor session presentation
Cisco EuroMPI'13 vendor session presentationCisco EuroMPI'13 vendor session presentation
Cisco EuroMPI'13 vendor session presentationJeff Squyres
 
Open MPI Explorations in Process Affinity (EuroMPI'13 presentation)
Open MPI Explorations in Process Affinity (EuroMPI'13 presentation)Open MPI Explorations in Process Affinity (EuroMPI'13 presentation)
Open MPI Explorations in Process Affinity (EuroMPI'13 presentation)
Jeff Squyres
 
MPI History
MPI HistoryMPI History
MPI History
Jeff Squyres
 
MOSSCon 2013, Cisco Open Source talk
MOSSCon 2013, Cisco Open Source talkMOSSCon 2013, Cisco Open Source talk
MOSSCon 2013, Cisco Open Source talk
Jeff Squyres
 
Friends don't let friends leak MPI_Requests
Friends don't let friends leak MPI_RequestsFriends don't let friends leak MPI_Requests
Friends don't let friends leak MPI_Requests
Jeff Squyres
 
MPI-3 Timer requests proposal
MPI-3 Timer requests proposalMPI-3 Timer requests proposal
MPI-3 Timer requests proposal
Jeff Squyres
 
MPI_Mprobe is good for you
MPI_Mprobe is good for youMPI_Mprobe is good for you
MPI_Mprobe is good for you
Jeff Squyres
 

More from Jeff Squyres (20)

Open MPI State of the Union X SC'16 BOF
Open MPI State of the Union X SC'16 BOFOpen MPI State of the Union X SC'16 BOF
Open MPI State of the Union X SC'16 BOF
 
MPI Sessions: a proposal to the MPI Forum
MPI Sessions: a proposal to the MPI ForumMPI Sessions: a proposal to the MPI Forum
MPI Sessions: a proposal to the MPI Forum
 
MPI Fourm SC'15 BOF
MPI Fourm SC'15 BOFMPI Fourm SC'15 BOF
MPI Fourm SC'15 BOF
 
Open MPI SC'15 State of the Union BOF
Open MPI SC'15 State of the Union BOFOpen MPI SC'15 State of the Union BOF
Open MPI SC'15 State of the Union BOF
 
Cisco's journey from Verbs to Libfabric
Cisco's journey from Verbs to LibfabricCisco's journey from Verbs to Libfabric
Cisco's journey from Verbs to Libfabric
 
(Very) Loose proposal to revamp MPI_INIT and MPI_FINALIZE
(Very) Loose proposal to revamp MPI_INIT and MPI_FINALIZE(Very) Loose proposal to revamp MPI_INIT and MPI_FINALIZE
(Very) Loose proposal to revamp MPI_INIT and MPI_FINALIZE
 
Fun with Github webhooks: verifying Signed-off-by
Fun with Github webhooks: verifying Signed-off-byFun with Github webhooks: verifying Signed-off-by
Fun with Github webhooks: verifying Signed-off-by
 
Open MPI new version number scheme and roadmap
Open MPI new version number scheme and roadmapOpen MPI new version number scheme and roadmap
Open MPI new version number scheme and roadmap
 
The State of libfabric in Open MPI
The State of libfabric in Open MPIThe State of libfabric in Open MPI
The State of libfabric in Open MPI
 
Cisco usNIC libfabric provider
Cisco usNIC libfabric providerCisco usNIC libfabric provider
Cisco usNIC libfabric provider
 
2014 01-21-mpi-community-feedback
2014 01-21-mpi-community-feedback2014 01-21-mpi-community-feedback
2014 01-21-mpi-community-feedback
 
(Open) MPI, Parallel Computing, Life, the Universe, and Everything
(Open) MPI, Parallel Computing, Life, the Universe, and Everything(Open) MPI, Parallel Computing, Life, the Universe, and Everything
(Open) MPI, Parallel Computing, Life, the Universe, and Everything
 
Cisco usNIC: how it works, how it is used in Open MPI
Cisco usNIC: how it works, how it is used in Open MPICisco usNIC: how it works, how it is used in Open MPI
Cisco usNIC: how it works, how it is used in Open MPI
 
Cisco EuroMPI'13 vendor session presentation
Cisco EuroMPI'13 vendor session presentationCisco EuroMPI'13 vendor session presentation
Cisco EuroMPI'13 vendor session presentation
 
Open MPI Explorations in Process Affinity (EuroMPI'13 presentation)
Open MPI Explorations in Process Affinity (EuroMPI'13 presentation)Open MPI Explorations in Process Affinity (EuroMPI'13 presentation)
Open MPI Explorations in Process Affinity (EuroMPI'13 presentation)
 
MPI History
MPI HistoryMPI History
MPI History
 
MOSSCon 2013, Cisco Open Source talk
MOSSCon 2013, Cisco Open Source talkMOSSCon 2013, Cisco Open Source talk
MOSSCon 2013, Cisco Open Source talk
 
Friends don't let friends leak MPI_Requests
Friends don't let friends leak MPI_RequestsFriends don't let friends leak MPI_Requests
Friends don't let friends leak MPI_Requests
 
MPI-3 Timer requests proposal
MPI-3 Timer requests proposalMPI-3 Timer requests proposal
MPI-3 Timer requests proposal
 
MPI_Mprobe is good for you
MPI_Mprobe is good for youMPI_Mprobe is good for you
MPI_Mprobe is good for you
 

Recently uploaded

Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 

Recently uploaded (20)

Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 

Ethernet and TCP optimizations

  • 1. Ethernet: Hidden Secrets Jeff Squyres © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1
  • 2. First: some background information…
  • 3. Using lots and lots and lots of servers simultaneously to solve one computational problem © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
  • 4. Racks of 36 1U servers Tend to send lots and lots and lots of small messages across the network to stay in sync with each other © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
  • 5. Send a A B Receive the message message Underlying network © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
  • 6. Today’s fastest networks: 1-3μs (!) Send a A B Receive the message message Underlying network © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
  • 7. • Typically not Ethernet networks • Usually have supercomputer-specific networks Example: highly tuned for short message latency • …but that is changing Ethernet Ethernot © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
  • 8. • Userspace NIC (“USNIC”) Expose Cisco NIC hardware directly to Linux userspace Bypass the OS Bypass the TCP stack • Send raw Ethernet frames directly from user applications Much, much faster than traditional TCP-based networking Especially for latency of short messages © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
  • 9. Application MPI library Userspace sockets library Userspace Kernel TCP / IP stack Cisco VIC driver Cisco VIC hardware © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
  • 10. Application MPI library Userspace verbs library Userspace Kernel Bootstrapping Send and receive and setup fast path Verbs IB core Cisco USNIC driver Cisco VIC hardware © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
  • 11. With all that background…
  • 12. Two servers © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
  • 13. Two servers Each with a 2 x 10Gb NIC © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
  • 14. Two servers Each with a 2 x 10Gb NIC Connected back-to-back © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
  • 15. Send a message Receive the message from here here Ping! © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
  • 16. Get the message Send the message back back Pong! © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
  • 17. Because each ping and pong are soooo short, do this ping-pong exchange N times Ping! / Pong! © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
  • 18. Total time for N ping-pongs N Time for one ping-pong © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
  • 19. Total time for N ping-pongs N Time for one ping-pong 2 Time for one ping © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
  • 20. Time for one ping = Half-round trip (HRT) ping pong latency © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
  • 21. TCP NetPIPE latency times: 1 10G Ethernet port 0.1 1 10Gb Ethernet port 8MB ~150ms 0.01 Time (seconds) 0.001 1 byte ~60μs 0.0001 1e-05 1 10 100 1000 10000 100000 1e+06 1e+07 Buffer size © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
  • 22. TCP NetPIPE latency times: 2 10G Ethernet ports 0.1 1 10Gb Ethernet port 2 10Gb Ethernet ports 8MB ~150ms 0.01 Time (seconds) 0.001 1 byte ~60μs 8MB 1 byte 0.0001 ~30μs (!) ~8.3ms 1e-05 1 10 100 1000 10000 100000 1e+06 1e+07 Buffer size © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
  • 23. TCP NetPIPE latency times: 2 10G Ethernet ports 0.1 1 10Gb Ethernet port 2 10Gb Ethernet ports 8MB ~150ms 0.01 Time (seconds) 0.001 1 byte ~60μs 8MB 1 byte 0.0001 ~30μs (!) ~8.3ms 1e-05 1 10 100 1000 10000 100000 1e+06 1e+07 Buffer size © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
  • 24. TCP NetPIPE latency times: 2 10G Ethernet ports 0.001 1 10Gb Ethernet port 2 10Gb Ethernet ports The facts: From 1-1024 bytes: flat latency Using 1 interface: ~60μs Time (seconds) 0.0001 Using 2 interfaces: ~30μs ~60μs ~30μs 1e-05 1 10 100 1000 Buffer size © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
  • 25. TCP NetPIPE latency times: 2 10G Ethernet ports 0.001 1 10Gb Ethernet port 2 10Gb Ethernet ports The facts: From 1-1024 bytes: flat latency Using 1 interface: ~60μs Time (seconds) 0.0001 Using 2 interfaces: ~30μs ~60μs ~30μs 1e-05 1 10 100 1000 Buffer size © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
  • 26. 1. Ethernet frame arrives © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
  • 27. 1. Ethernet frame arrives 2. NIC sends interrupt to OS Ethernet driver © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
  • 28. 1. Ethernet frame arrives 2. NIC sends interrupt to OS Ethernet driver 3. OS Ethernet driver copies the packet to RAM © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
  • 29. 1. Ethernet frame arrives 4. OS TCP stack hands packet off to (whatever) 2. NIC sends interrupt to OS Ethernet driver 3. OS Ethernet driver copies the packet to RAM © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
  • 30. It’s always better in bulk © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
  • 31. Let’s optimize this part  © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
  • 32. 1. Copy a bunch of packets across PCI at one time © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
  • 33. 1. Copy a bunch of packets across PCI at one time 2. Only raise one interrupt for all of those packet copies © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
  • 34. A.k.a. “Interrupt Coalescing” 1. Copy a bunch of packets across PCI at one time 2. Only raise one interrupt for all of those packet copies © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
  • 35. 1. Ethernet frame arrives © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
  • 36. 1. Ethernet frame arrives 2. Has N time passed since we sent an interrupt to the OS? © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
  • 37. 1. Ethernet frame arrives 2. Has N time passed since we sent an interrupt to the OS? ✖ No: queue up the frame © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
  • 38. 1. Ethernet frame arrives 2. Has N time passed since we sent an interrupt to the OS? ✖ No: queue up the frame ✔ Yes: Send all queued frames and interrupt © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
  • 40. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40
  • 41. Periodic interrupt 1. A sends ping frame coalescing timeout NIC A 125μs NIC B 2. B receives ping frame © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41
  • 42. NIC A NIC B 3. Coalesce timer expires; B sends interrupt 4. B sends pong frame © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42
  • 43. 5. Coalesce timer expires; A sends interrupt 6. A sends ping frame 7. Rinse, repeat NIC A NIC B © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43
  • 44. 4 ping-pongs in ~8x timer duration NIC A NIC B © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44
  • 45. NIC A NIC B In general, coalescing interrupts is a very Very Good Thing © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45
  • 46. NIC A NIC B But it definitely hurts low-latency traffic © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46
  • 47. How do we reduce those artificial delays?
  • 48. NIC A Port 0 NIC B NIC A Port 1 NIC B © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48
  • 49. NIC A Port 0 NIC B NIC A Port 1 NIC B © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 49
  • 50. NIC A Port 0 In reality, sender and receiver timers on each NIC B port are wholly unrelated; they don’t line up nicely like I used in these examples. NIC A Meaning: in general, you actually usually get Port 1 better overlap NIC B © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 50
  • 51. TCP NetPIPE latency times: 2 10G Ethernet ports 0.001 1 10Gb Ethernet port 2 10Gb Ethernet ports In this case, we got such good asymmetry, that the 2 port case is ~2x as fast (i.e., roughly twice as many interrupts in the same amount of time) Time (seconds) 0.0001 ~60μs ~30μs 1e-05 1 10 100 1000 Buffer size © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 51
  • 52. Remember: these are AVERAGE latencies! Individual ping-pong times are the same as the 1 port case (from the network) …but you get higher throughput because we’re reducing the gaps between each ping-pong © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 52
  • 54. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 54
  • 55. TCP NetPIPE latency times: 2 10G Ethernet ports 0.1 1 10Gb Ethernet port 2 10Gb Ethernet ports 1 port 1 10GB Ethernet port, timer=0 2 10GB Ethernet ports, timer=0 ~7.2ms 0.01 Time (seconds) 1 port 2 ports 0.001 ~10.5μs ~10.6μs 2 ports 0.0001 ~5.5ms 1e-05 1 10 100 1000 10000 100000 1e+06 1e+07 Buffer size © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 55
  • 56. Pros Cons • (Much) faster TCP latency • May not scale well for …without changing app! case of MPI process running on every core • Faster speeds seem to scale up to large • Lots and lots of interrupts messages, too going to socket:0.core:0 • Great for low-latency, • May need to run (N-1) MPI sparse comms apps processes…? May also want to avoid • Best for NICs that are socket:0.core:0, or move IRQ dedicated to MPI comms affinity © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 56
  • 57.
  • 58. • Some experimentation might be worth trying with real world HPC apps: • Allow TCP to wholly utilize core 0 (i.e., run MPI processes only on cores 1-15) • Set the coalesce timer to something more than 0μs, but less than 125μs – there’s a whole spectrum with which to play © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 58
  • 59. • Many in HPC have Ethernot networks …but as HPC continues to commoditize itself, lots of HPC users have Ethernet-based environments • Today’s Ethernet switches and NICs are actually quite a bit faster and more advanced than what we old-time-HPCers grew up with • Even good ol’ TCP is amazingly fast and optimized today • You may be able to tune your NIC and/or fabric to extract pretty darn good MPI TCP performance The default settings on your Ethernet NIC / fabric are likely set for general TCP traffic – which effect very different performance characteristics than what HPC applications typically need © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 59