Exploiting Two-Case Delivery for Fast Protected Messaging

نویسندگان

  • Kenneth Mackenzie
  • John Kubiatowicz
  • Matthew I. Frank
  • Walter Lee
  • Victor Lee
  • Anant Agarwal
  • M. Frans Kaashoek
چکیده

We propose and evaluate two complementary techniques to protect and virtualize a tightly-coupled network interface in a multicomputer. The techniques allow efficient, direct application access to network hardware in a multiprogrammed environment while gaining most of the benefits of a memory-basednetwork interface. First, two-case delivery allows an application to receive a message directly from the network hardware in ordinary circumstances, but provides buffering transparently when required for protection. Second, virtual buffering stores messages in virtual memory on demand, providing the convenience of effectively unlimited buffer capacity while keeping actual physical memory consumption low. The evaluation is based on workloads of real and synthetic applications running on a simulator and partly on emulated hardware. The results show that the direct path is also the common path, justifying the use of software buffering. Further results show that physical buffering requirements remain low in our applications despite the use of unacknowledged messages and despite adverse scheduling conditions.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

UDM: User Direct Messaging for General-Purpose Multiprocessing

User Direct Messaging (UDM) allows user-level, processor-to-processor messaging to coexist with general multiprogramming and virtual memory. Direct messaging, where processors launch and receive messages in tens of cycles directly via network interface FIFOs as opposed to indirectly via memory, offers high message bandwidth and low delivery latency by avoiding memory delay and buffer management...

متن کامل

Identifying and determining protected zone, rehabilitation and special Use in Geno protected area and Investigating of intensity of sediment delivery

Because Geno protected area didn’t protect enough, it cause to use lots of part for domestic animal productivity and this ecosystem with special plant and animal species degrade. This study was down with this goal: determining of proper region for soil protection, rehabilitation and special use according dry region potentials. We use these maps: slope, aspect, elevation, soil, plant cover and r...

متن کامل

Exploiting Failure Recovery for the Robust Support of two Service Classes in IP over WDM Networks

We analyze the gain obtained by deploying, in an IP-over-WDM network, two classes of service differentiated by their type of protection. The first one, called FP (Fully Protected), is protected at the WDM or SONET layer by a 1:1 protection strategy, while the second one, called BEP (Best Effort protected), offers no specific guarantee on service disruption is provided. In case of failure it off...

متن کامل

More is Less: On the End-to-End Security of Group Chats in Signal, WhatsApp, and Threema

Secure instant messaging is utilized in two variants: one-to-one communication and group communication. While the first variant has received much attention lately (Frosch et al., EuroS&P16; Cohn-Gordon et al., EuroS&P17; Kobeissi et al., EuroS&P17), little is known about the cryptographic mechanisms and security guarantees of secure group communication in instant messaging. To approach an inves...

متن کامل

Land Capability Analysis for Solar Farms Exploitation Considering Claimatic Factors: Case of Ilam Province

Considering the geographical location and climatic conditions solar energy can be used in Ilam province. The main objective of this study is prioritization of various districts of Ilam province for exploiting solar energy. Because of the necessity of taking economic, technical, social, and environmental constraints into account in solar site analysis, the map of Nan exploitable regions is extra...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1998