摘要:
Technologies for identifying a cache line of a network packet for eviction from an on-processor cache of a network device communicatively coupled to a network controller. The network device is configured to determine whether a cache line of the cache corresponding to the network packet is to be evicted from the cache based on a determination that the network packet is not needed subsequent to processing the network packet, and provide an indication that the cache line is to be evicted from the cache based on an eviction policy received from the network controller.
摘要:
Devices and methods for optimizing semi-active workloads are described herein. A network interface device may be configured to offload data packet acknowledgment responsibilities of a host platform by transmitting, to the sender of the packets, acknowledgements of packets received throughout a time duration. Upon completion of the time duration, the network interface device may trigger the host platform to perform batch processing of the data packets received during the time duration.
摘要:
Methods that enable the detection and handling of lost messages during load-balancing routing protocols are disclosed. In accordance with the illustrative embodiment, when a candidate intermediate node N receives a routing-protocol message, node N performs: (1) a first procedure that is capable of detecting some lost routing-protocol messages that were previously transmitted by node N, and (2) a second procedure that is capable of detecting some lost routing-protocol messages that were previously transmitted by a neighbor of node N.
摘要:
Apparatus, methods, and systems for tuple space search-based flow classification using cuckoo hash tables and unmasked packet headers are described herein. A device can communicate with one or more hardware switches. The device can include memory to store hash table entries of a hash table. The device can include processing circuitry to perform a hash lookup in the hash table. The lookup can be based on an unmasked key include in a packet header corresponding to a received data packet. The processing circuitry can retrieve an index pointing to a sub-table, the sub-table including a set of rules for handling the data packet. Other embodiments are also described.
摘要:
Technologies for bridging between coarse-grained and fine-grained load balancing include a computing node of a cluster computing device and a network controller. The computing node may add a flow entry to a local flow table based on flow information received from the network controller. The computing node may transmit a multicast network packet including the flow information and next hop information to other computing nodes of the cluster device. The computing node may also add a different flow entry to the local flow table and a next hop entry to a local next hop table based on a multicast network packet received from another computing node of the cluster device. The computing node may locally process a network packet received from a remote computing device or forward the received network packet to another computing node of the cluster device based on the flow entries added to the local flow table.
摘要:
Embodiments of methods, systems, and storage medium associated with are disclosed herein. In one instance, the method may include: first determining whether the computing device is connected to a network, based on a result of the first determining, monitoring data traffic between the computing device and the network, wherein the data traffic is associated with at least one application residing on the computing device, based on the monitoring, second determining whether the at least one application has been updated, and initiating a transition of the computing device to a sleep mode upon a result of the second determining that indicates that the at least one application has been updated. Other embodiments may be described and/or claimed.
摘要:
Methods that enable the detection and handling of lost messages during load-balancing routing protocols are disclosed. In accordance with the illustrative embodiment, when a candidate intermediate node N receives a routing-protocol message, node N performs: (1) a first procedure that is capable of detecting some lost routing-protocol messages that were previously transmitted by node N, and (2) a second procedure that is capable of detecting some lost routing-protocol messages that were previously transmitted by a neighbor of node N.
摘要:
Technologies for supporting concurrency of a flow lookup table at a network device. The flow lookup table includes a plurality of candidate buckets that each includes one or more entries. The network device includes a flow lookup table write module configured to perform a displacement operation of a key/value pair to move the key/value pair from one bucket to another bucket via an atomic instruction and increment a version counter associated with the buckets affected by the displacement operation. The network device additionally includes a flow lookup table read module to check the version counters during a lookup operation on the flow lookup table to determine whether a displacement operation is affecting the presently read value of the buckets. Other embodiments are described herein and claimed.
摘要:
Systems and techniques for reduced host sleep interruption are described herein. A first packet received via a receive chain may be placed into a buffer. The first packet may be of a first preliminary type. The first packet may be processed from the buffer without communication with the host machine. The first packet may also be of a first secondary type. Processing the first packet may include an operation chosen from the group of dropping the packet and responding to the packet. A second packet received via the receive chain may be placed into the buffer. The second packet may be of a first preliminary type and a second secondary type. The second packet may be communicated from the buffer to the machine. A third packet received via the receive chain may be communicated to the machine. The third packet may be of a second preliminary type.
摘要:
Technologies for distributed table lookup via a distributed router includes an ingress computing node, an intermediate computing node, and an egress computing node. Each computing node of the distributed router includes a forwarding table to store a different set of network routing entries obtained from a routing table of the distributed router. The ingress computing node generates a hash key based on the destination address included in a received network packet. The hash key identifies the intermediate computing node of the distributed router that stores the forwarding table that includes a network routing entry corresponding to the destination address. The ingress computing node forwards the received network packet to the intermediate computing node for routing. The intermediate computing node receives the forwarded network packet, determines a destination address of the network packet, and determines the egress computing node for transmission of the network packet from the distributed router.