IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012) 2012
DOI: 10.1109/dsn.2012.6263933
|View full text |Cite
|
Sign up to set email alerts
|

Keep net working - on a dependable and fast networking stack

Abstract: For many years, multiserver 1 operating systems have been demonstrating, by their design, high dependability and reliability. However, the design has inherent performance implications which were not easy to overcome. Until now the context switching and kernel involvement in the message passing was the performance bottleneck for such systems to get broader acceptance beyond niche domains. In contrast to other areas of software development where fitting the software to the parallelism is difficult, the new multi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 21 publications
0
2
0
Order By: Relevance
“…Hruby et al [12] agree that dedicating cores to I/O functionality is worthwhile and rearchitect a TCP/IP stack by putting the different layers onto different cores. In contrast to sv3, which follows the run-to-completion philosophy, each networking stack layer is a single threaded program.…”
Section: Related Workmentioning
confidence: 99%
“…Hruby et al [12] agree that dedicating cores to I/O functionality is worthwhile and rearchitect a TCP/IP stack by putting the different layers onto different cores. In contrast to sv3, which follows the run-to-completion philosophy, each networking stack layer is a single threaded program.…”
Section: Related Workmentioning
confidence: 99%
“…In a straightforward implementation, this would several extra context switches compared to the other architectures. Future research will have to reveal to which extent any resulting overheads can be alleviated, for example with a small domain-local cache, memory mapping based approaches, or asynchronous operations [24,41,47]. For the host system, the resulting size of the trusted computing base (TCB) will be somewhere between that of hardwarelevel and OS-level virtualization.…”
Section: Performance Versus Subsystem Isolationmentioning
confidence: 99%