2021 IEEE 29th International Conference on Network Protocols (ICNP) 2021
DOI: 10.1109/icnp52444.2021.9651935
|View full text |Cite
|
Sign up to set email alerts
|

StaR: Breaking the Scalability Limit for RDMA

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(7 citation statements)
references
References 14 publications
0
7
0
Order By: Relevance
“…RC is the most widely-used RDMA transport mode, but it is far from perfection because offloading the whole transport process from the host to the NIC has two drawbacks. The first is the scalability problem which is already discussed in previous literature [5]. The second is the availability problem which we discuss in this paper.…”
Section: Insightsmentioning
confidence: 79%
See 2 more Smart Citations
“…RC is the most widely-used RDMA transport mode, but it is far from perfection because offloading the whole transport process from the host to the NIC has two drawbacks. The first is the scalability problem which is already discussed in previous literature [5]. The second is the availability problem which we discuss in this paper.…”
Section: Insightsmentioning
confidence: 79%
“…The main reason is that RDMA implements a sophisticated network stack in the hardware, making it difficult to restore the NIC correctly and quickly in the cases of NIC hot upgrade and network failures in the NIC. The on-NIC RDMA engine maintains three kinds of states, all stored and accessed on the NIC: DMA-related, security-related, and networking-related [5]. For connectionoriented transport modes (i.e., RC and UC), many contexts reside on the RNIC, such as the source and destination QP numbers, the SQ and RQ states, and the transmission and retransmission states.…”
Section: B Rdma Lacks Of Ha In Cloud Data Centermentioning
confidence: 99%
See 1 more Smart Citation
“…Hardware Solutions: Various studies have explored hardware solutions, such as StaR [27], which deploys a novel receiving module on RDMA NICs. StaR employs an asymmetric state maintenance strategy to separate connection and retransmission states, thereby enhancing QP scalability.…”
Section: Related Workmentioning
confidence: 99%
“…While RDMA provides protection via rkeys (i.e., a node can access a remote region only if it has the respective rkey), this offers limited authentication capabilities for client requests. For example, having a single rkey for all files would not prevent clients from accessing data they do not own, while having a rkey for each file would require registering #f iles × #rights memory regions, which can lead to scalability issues [30]. On the other side, validating requests on the CPU of the storage nodes increases overhead, requiring either to buffer the full write before committing it to the storage target (losing the zero-copy benefit of RDMA) or to introduce an additional network round-trip before the RDMAwrite.…”
Section: Client Request Authenticationmentioning
confidence: 99%