1998
DOI: 10.1109/40.671404
|View full text |Cite
|
Sign up to set email alerts
|

The Virtual Interface Architecture

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
94
0

Year Published

2000
2000
2015
2015

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 206 publications
(94 citation statements)
references
References 11 publications
0
94
0
Order By: Relevance
“…By implementing a network stack at the user level, we have control over the behaviors of various communication protocols. In effect, this is similar to U-Net [von Eicken et al 1995], Ethernet Message Passing (EMP) [Shivam et al 2001], and the Virtual Interface Architecture (VIA) [Dunning et al 1998], which all provide abstractions for user-level network implementation. In contrast, our work allows user-level extensions to run efficiently enough to be invoked as handlers for networking events, without the need for special hardware support.…”
Section: User-level Networking In the Sandboxmentioning
confidence: 99%
“…By implementing a network stack at the user level, we have control over the behaviors of various communication protocols. In effect, this is similar to U-Net [von Eicken et al 1995], Ethernet Message Passing (EMP) [Shivam et al 2001], and the Virtual Interface Architecture (VIA) [Dunning et al 1998], which all provide abstractions for user-level network implementation. In contrast, our work allows user-level extensions to run efficiently enough to be invoked as handlers for networking events, without the need for special hardware support.…”
Section: User-level Networking In the Sandboxmentioning
confidence: 99%
“…An interesting and efficient approach on this direction, is the development of the Virtual Interface Architecture (Dunning, 1998) that defines mechanisms allowing the bypass of the layers of the protocol stack, avoiding thus the generation of the intermediate copies of data during sending and receiving messages. This bypass improves significantly the application performance, not only because eliminates this overhead, but because decreases the processor utilization by the communication subsystem.…”
Section: Lam Performancementioning
confidence: 99%
“…A multi-threaded SDSM and a message-passing library compose the runtime system. To provide thread-safe communication, we implemented a subset of MPI [8] library for Virtual Interface Architecture (VIA) [9]. We also developed our own SDSM system, which provides a home-based lazy release consistency (HLRC) [10] with migratory home to exploit data locality.…”
Section: The Atomic Page Update Problemmentioning
confidence: 99%