Communications in ISTORE Dan Hettena. Communication Goals Goals: Fault tolerance through redundancy Tolerate any single hardware failure High bandwidth.

Slides:



Advertisements
Similar presentations
Computer Networks TCP/IP Protocol Suite.
Advertisements

Dynamic Source Routing (DSR) algorithm is simple and best suited for high mobility nodes in wireless ad hoc networks. Due to high mobility in ad-hoc network,
IP Router Architectures. Outline Basic IP Router Functionalities IP Router Architectures.
System Area Network Abhiram Shandilya 12/06/01. Overview Introduction to System Area Networks SAN Design and Examples SAN Applications.
The TickerTAIP Parallel RAID Architecture P. Cao, S. B. Lim S. Venkatraman, J. Wilkes HP Labs.
U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science Emery Berger University of Massachusetts Amherst Operating Systems CMPSCI 377 Lecture.
Module 8: Concepts of a Network Load Balancing Cluster
Networking Theory (Part 1). Introduction Overview of the basic concepts of networking Also discusses essential topics of networking theory.
1 Version 3 Module 8 Ethernet Switching. 2 Version 3 Ethernet Switching Ethernet is a shared media –One node can transmit data at a time More nodes increases.
1 Link Layer & Network Layer Some slides are from lectures by Nick Mckeown, Ion Stoica, Frans Kaashoek, Hari Balakrishnan, and Sam Madden Prof. Dina Katabi.
Review on Networking Technologies Linda Wu (CMPT )
William Stallings Data and Computer Communications 7 th Edition Chapter 2 Protocols and Architecture.
A Scalable, Commodity Data Center Network Architecture Mohammad Al-Fares, Alexander Loukissas, Amin Vahdat Presented by Gregory Peaker and Tyler Maclean.
Prepared By E.Musa Alyaman1 Networking Theory Chapter 1.
COE 342: Data & Computer Communications (T042) Dr. Marwan Abu-Amara Chapter 2: Protocols and Architecture.
TCP/IP Reference Model Host To Network Layer Transport Layer Application Layer Internet Layer.
Ch. 28 Q and A IS 333 Spring Q1 Q: What is network latency? 1.Changes in delay and duration of the changes 2.time required to transfer data across.
Understanding Networks Charles Zangla. Network Models Before I can explain how connections are made from across the country, I would like to provide you.
Layer 2 Switch  Layer 2 Switching is hardware based.  Uses the host's Media Access Control (MAC) address.  Uses Application Specific Integrated Circuits.
RAID-x: A New Distributed Disk Array for I/O-Centric Cluster Computing Kai Hwang, Hai Jin, and Roy Ho.
Chapter 4 Queuing, Datagrams, and Addressing
Semester 1 Module 8 Ethernet Switching Andres, Wen-Yuan Liao Department of Computer Science and Engineering De Lin Institute of Technology
Network Redundancy Multiple paths may exist between systems. Redundancy is not a requirement of a packet switching network. Redundancy was part of the.
Wave Relay System and General Project Details. Wave Relay System Provides seamless multi-hop connectivity Operates at layer 2 of networking stack Seamless.
1 CISCO NETWORKING ACADEMY PROGRAM (CNAP) SEMESTER 1/ MODULE 8 Ethernet Switching.
Slide 1 DESIGN, IMPLEMENTATION, AND PERFORMANCE ANALYSIS OF THE ISCSI PROTOCOL FOR SCSI OVER TCP/IP By Anshul Chadda (Trebia Networks)-Speaker Ashish Palekar.
Chapter 2 – X.25, Frame Relay & ATM. Switched Network Stations are not connected together necessarily by a single link Stations are typically far apart.
High Performance Computing & Communication Research Laboratory 12/11/1997 [1] Hyok Kim Performance Analysis of TCP/IP Data.
SANE: A Protection Architecture for Enterprise Networks
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Introduction Slide 1 A Communications Model Source: generates.
Introduction to Networks CS587x Lecture 1 Department of Computer Science Iowa State University.
© 2010 IBM Corporation Plugging the Hypervisor Abstraction Leaks Caused by Virtual Networking Alex Landau, David Hadas, Muli Ben-Yehuda IBM Research –
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 3.
1 Next Few Classes Networking basics Protection & Security.
Design and Implementation of a Multi-Channel Multi-Interface Network Chandrakanth Chereddi Pradeep Kyasanur Nitin H. Vaidya University of Illinois at Urbana-Champaign.
Module 8: Ethernet Switching
William Stallings Data and Computer Communications 7 th Edition Chapter 1 Data Communications and Networks Overview.
11 NETWORK CONNECTION HARDWARE Chapter 3. Chapter 3: NETWORK CONNECTION HARDWARE2 NETWORK INTERFACE ADAPTER  Provides the link between a computer and.
By: Aleksandr Movsesyan Advisor: Hugh Smith. OSI Model.
Review: –Ethernet What is the MAC protocol in Ethernet? –CSMA/CD –Binary exponential backoff Is there any relationship between the minimum frame size and.
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 13.
FireProof. The Challenge Firewall - the challenge Network security devices Critical gateway to your network Constant service The Challenge.
Sem1 - Module 8 Ethernet Switching. Shared media environments Shared media environment: –Occurs when multiple hosts have access to the same medium. –For.
Networking Fundamentals. Basics Network – collection of nodes and links that cooperate for communication Nodes – computer systems –Internal (routers,
An Architecture and Prototype Implementation for TCP/IP Hardware Support Mirko Benz Dresden University of Technology, Germany TERENA 2001.
1 Presented By: Eyal Enav and Tal Rath Eyal Enav and Tal Rath Supervisor: Mike Sumszyk Mike Sumszyk.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 9 Virtual Trunking Protocol.
Lecture 12: Reconfigurable Systems II October 20, 2004 ECE 697F Reconfigurable Computing Lecture 12 Reconfigurable Systems II: Exploring Programmable Systems.
LRPC Firefly RPC, Lightweight RPC, Winsock Direct and VIA.
Chapter 4 Version 1 Virtual LANs. Introduction By default, switches forward broadcasts, this means that all segments connected to a switch are in one.
Mapping IP Addresses to Hardware Addresses Chapter 5.
Interconnect Networks Basics. Generic parallel/distributed system architecture On-chip interconnects (manycore processor) Off-chip interconnects (clusters.
1 Layer 2 Technologies Honolulu Community College Cisco Academy Training Center Semester 1 Version
Computer Communication: An example What happens when I click on
An Efficient Gigabit Ethernet Switch Model for Large-Scale Simulation Dong (Kevin) Jin.
5: DataLink Layer 5a-1 Bridges and spanning tree protocol Reference: Mainly Peterson-Davie.
5: DataLink Layer5-1 Hubs Hubs are essentially physical-layer repeaters: m bits coming from one link go out all other links m at the same rate m no frame.
J. Liebeher (modified by M. Veeraraghavan) 1 Introduction Complexity of networking: An example Layered communications The TCP/IP protocol suite.
COMPUTER NETWORKS Hwajung Lee. Image Source:
Introduction and Overview of Network and Telecommunications.
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
BASICS Gabriella Paolini (GARR) 27/05/11 - ICCU Roma 1 How INTERNET works !
Ad Hoc – Wireless connection between two devices Backbone – The hardware used in networking Bandwidth – The speed at which the network is capable of sending.
CIS 700-5: The Design and Implementation of Cloud Networks
A quick intro to networking
Layered Architectures
NTHU CS5421 Cloud Computing
EEC4113 Data Communication & Multimedia System Chapter 1: Introduction by Muhazam Mustapha, July 2010.
Unit – III Network Essentials
Presentation transcript:

Communications in ISTORE Dan Hettena

Communication Goals Goals: Fault tolerance through redundancy Tolerate any single hardware failure High bandwidth with commodity hardware Use redundancy for extra bandwidth Lower latency alternative For latency-sensitive apps, such as Titanium Provide Active Messages interface

Outline ISTORE Network Hardware IP Communication Actives Messages Communication

ISTORE Network Hardware Components 64 ISTORE Bricks, each with: Pentium II 266MHz IBM 10kRPM SCSI disk Can sometimes be read faster than 30MB/s 4 100Mbps ethernet interfaces Intel EtherExpress Pro/100 (82557/8) Total bandwidth = 4*100Mbps = 40MB/s

ISTORE Networking Hardware Components (continued) 14 “Little” Routing Switches PacketEngine/Alcatel PowerRail Mbps interfaces (copper) 2 1Gbps interfaces (fiber) 2 “Big” Routing Switches PacketEngine/Alcatel PowerRail 5200 More-than-enough 1Gbps interfaces (fiber)

ISTORE Networking Hardware Routes between bricks

ISTORE Networking Hardware Routes between bricks (continued) Short routes Only if connected to the same “little” switches No need to go through a “big” switch 2 hops

ISTORE Networking Hardware Routes between bricks (continued) Long routes Must choose a big switch 4 hops

ISTORE Networking Hardware Performance observations Switches are store-and-forward Ethernet packets are all at least 60 bytes 0-padded by sender if necessary Time per 100Mbps copper hop is 15  s + (10ns/bit)(size – 60 bytes)

ISTORE Networking Hardware Future work Plug in the wires

IP Communication Goals Stripe packets across all 4 interfaces 4x increase in available TCP/UDP bandwidth Automatically handle link and router faults Transparent to TCP/UDP applications Transparent backward-compatibility with hosts that do not support striping

IP Communication Nested outline Previous work Kernel driver overview Providing fault tolerance Providing backward compatibility Making sure it scales

IP Communication Previous work Linux bonding driver (net/drivers/bonding.c) Generic driver to “bond” links Ignores faults Does not prevent packet reordering Only supports one remote host “An Architecture for Packet-Striping Protocols” (Hari, Varghese, Parulkar)

IP Communication Kernel striping driver Cooperates with ethernet driver Use special MAC addresses 49:53:54:4F: : Easy to determine if host supports striping Store striping information in headers Link status Reordering data

IP Communication Fault tolerance User process periodically tests links Notifies striping driver Striping driver will not use broken links Need to detect performance faults, too Backward compatibility Same IP address for both modes

IP Communication Scales automatically, unless packets arrive out of order Possible with multiple routes (e.g. striping) TCP relies on a consistent round-trip time Packet reordering confuses TCP Result is unnecessary retransmissions This will be an issue in ISTORE

IP Communication Scaling (continued) Need to reorder packets before handing them up to IP Solution (almost implemented) Clever use of queuing algorithms on sender and receiver Makes it unlikely that the receiver will dequeue packets out of order This is previous work (Hari et al)

IP Communication Future Work Complete reordering support Automatic detection of node ID Automatic detection of incorrect wiring Automatic configuration of the switches By the Diagnostic Processors

Active Messages Support Goals Support latency-sensitive apps Titanium, for example This is not a primary goal for ISTORE As reflected in the networking hardware Non-goals Transparency Support for malicious users

Active Messages Support Problem: kernel ruins latency Protocol stacks (UDP, TCP) are slow User-kernel interaction is slow Solution: remove kernel from critical path Previous work: U-Net User level ethernet driver Cooperates with kernel driver Only accessible to trusted users

Active Messages Support Custom AM implementation By Dan Bonachea (not me) Based on HPAM But also supports big bulk transfers Supports ISTORE user-level networking Automatically gets a new network card (if a link dies) Also supports UDP

Active Messages Support Performance comparison Using a ping program (client of AM) Using short route (four hops) Ethernet latency = 4*(17  s)=68  s UDP mean round-trip time is 160  s User-level ethernet mean is 80  s Includes check-summing and AM overhead

Active Messages Support Future work Compile Titanium for ISTORE and see what happens.

Conclusions Kernel hacking is fun And my talking is done.