SlideShare une entreprise Scribd logo
1  sur  18
Télécharger pour lire hors ligne
©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted,
confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization.
#moveforward
Design Considerations for a High-Performing
Virtualized LTE Core Infrastructure
Arun Rajagopal
Sprint CTO Office
Sameh Gobriel
Intel Labs
©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted,
confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization.
Current EPC Network Infrastructure
#moveforward
©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted,
confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization.
Carrier Business Problems
Rigid capacity models lead to inefficient utilization of
network resources
Capacity added when one dimension exhausts (e.g., signaling vs. bearer capacity on
SBC)
Difficult to align service revenue with costs (e.g., low volume M2M)
No means to re-use stranded capacity on platforms
Long time-to-market intervals for new products/services
Long service development processes with limited service agility
Limited fast fail opportunities and platform re-usability
Rapid service scaling is a challenge
Adding new capacity to existing services takes time
Managing scale by adding additional hardware and using load balancing mechanisms is
complex
More nodes/elements to manage as the function scales
Lack of
Service
Agility
Rapid and just-in-
time service scaling
Rigid
network
build models
#moveforward
©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted,
confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization.
©2014 Sprint This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain
restricted, confidential or privileged materials intended for the sole use of the intended recipient Any review, use, distribution or disclosure is
prohibited without authorization
The Case for NFV
Simplifies Network
Architecture
• Common hardware
• Independent scaling of components
• Standard and repeatable
configurations
Simplifies Network
Operations
• Just-in-time allocation
• Automated deployment
• Automated capacity add
• Agile, high velocity service creation
environment
Creates New Revenue
Opportunities
• Combine Mobility and call control
with cloud technologies
• Monetize network based on service
value
Lower Capex Lower Opex Higher Revenue
#moveforward
©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted,
confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization.
#moveforward
From Purpose Built ASICs to General Purpose IA
1850R
PROLIANT
1850R
PROLIANT
1850R
PROLIANT
1850R
PROLIANT
SGW
PDN
GW
MME
PCRF
vEPC
SGW
PDN
GW
vEPC
SGW
PDN
GW
vEPC
SGW
PDN
GW
vEPC
Internet
eNode B
How to build a scalable EPC cluster on
IA servers?
 Fully programmable control &
data planes
 Incrementally scalable as needed
by adding nodes to the cluster
 S/P GW ported as DPDK Apps on
top of IA Cluster.
 Leverages multi-core/socket,
DDIO, SSE instructions, ..etc.
A first step towards a flexible network
infrastructure
©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted,
confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization.
Flow Table Size and Packet Classification Bottleneck
• EPC SGW session table size grow significantly (millions of entries) with the number of
subscribers/bearers/flows.
• Flow lookup and Packet classification is common for many VNFs.
• Distributed flow table as a single entity to control/management plane.
1850R
PROLIANT
1850R
PROLIANT
1850R
PROLIANT
1850R
PROLIANT
SGW
PDN
GW
MME
PCRF
vEPC
SGW
PDN
GW
vEPC
SGW
PDN
GW
vEPC
SGW
PDN
GW
vEPC
Internet
eNode B
(1) Single Node
Optimization
(2) Cluster Level
Optimization
#moveforward
©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted,
confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization.
Flow Lookup & Classification Bottleneck for NFV
• Flow lookup and Classification a common operation for many network functions.
• NFV workload will typically have large flow table sizes
M1[1]
Q[1] Q[2] Q[3]
M2[1]
M3[1]
M1[2] M1[3]
M2[2] M2[3]
M3[2] M3[3]
search lines
match lines
search word
encoder
• ASICs, NPUs uses TCAM to address this bottleneck.
• TCAMs sizes are very limited
#moveforward
©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted,
confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization.
Flow Lookup & Classification Bottleneck for NFV
Cuckoo Hashing
IP A IP H
IP P
IP J IP B
IP Q
IP D IP W
Traditional Hashing
IP Y
IP Z
IP X
1
2
3
H1 H2
Traditional J-hash library:
• relies on a “sparse” hash table
implementation
• Simple exact match implementation
• Significant performance degradation with
increased table sizes.
Cuckoo Hashing – Better Scalability:
• Denser tables fit in cache.
• Can scale to millions of entries.
• Significant throughput improvement
Available for DPDK v2.1
#moveforward
©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted,
confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization.
Cuckoo Hashing [Pagh ‘01]
B C
D
F
F
G
E
A
#moveforward
©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted,
confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization.
Performance benefits of CH w/ DPDK
Improvement on table efficiency ~40% Throughput increase
Memory bandwidth significantly reduced due to higher cache utilization
Traditional hash
0.00
500.00
1,000.00
1,500.00
2,000.00
2,500.00
3,000.00
10 1M 4M
Memory bandwidth vs. # of entries
rte_hash
Cuckoo
Traditional hash
0.00
2.00
4.00
6.00
8.00
10.00
12.00
14.00
16.00
18.00
1M 2M 4M 8M 16M 32M
Throughput vs. # of entries
rte_hash
Cuckoo
Traditional hash
Single Core Table Insertions per second
0
1
2
3
4
5
6
7
8
9
0% 10% 20% 30% 40% 50% 60% 70% 80%
Inserts/Second
Millions
Table Load
Cuckoo Hash Insert Performance
32M Random
8M Random
2M Random
32M Sequential
15X
#moveforward
©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted,
confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization.
Distributed software flow lookup
A C
B
D
Partial FIB
Full Duplication Hash Partitioning Scalable Switch Route
Forward (S2RF)
Nodes store FULL copy of FIB
Pros: Design simplicity, scales
throughput
Cons: FIB does not scale as FIB
capacity does not increase with the
number of nodes in the cluster
Node stores ONLY a portion of the FIB based
on the hash of the keys (destination address,
flow identifier …)
Pros: Design simplicity, near linear scalability
Cons: Latency w/ extra hop, increased
interconnect load and CPU load for IO
bouncing, potential traffic hot spots (w/
elephant flows)
Nodes keep globally-replicated but extremely
compact, and fast, table (Global Partition Table)
mapping keys to lookup nodes
FIB partitioned so lookup node for packet is
also its egress node
Pros: No extra latency and interconnect load,
min resources required
A C
B
D
Full FIB
“Improving Clustered Network Appliances with
Xbricks”, Sigcomm ‘15
A C
B
D
GPT +
Partial FIB
#moveforward
©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted,
confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization.
Lookup Table Space Optimization for GPT
Main Idea:
Throw away keys (from cache), Use perfect hashing to avoid collision
For k-bit keys and v-bit values can we use O(v)
instead of O(k + v) bits/entry ?
KEY: k bits VAL: vbits
Ren
Dave
Christian
Dong
Sameh
Online/offline Status
Christian 0
Dong 1
Dave 0
Sameh 1
Ren 1
Ren
Dong
Sameh
Christian
Dave
H(Ren) = 1
H(Dave) = 0
H(Dong) = 1
H(Sameh) = 1
H(Christian) = 0
Ren
Dave
Christian
Dong
Sameh
Online/offline Status
#moveforward
©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted,
confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization.
Store m for this group of keys
Target
Value
H1(x) H2(x) … Hm(x)
key1 0 0 1 0
key2 1 0 1 1
…
key16 0 0 0 0
GPT: From One Group to Many Groups
All keys
group1 group2 group3 group4
H376
Store hash function index for each
group of keys
H97 H62H7
#moveforward
©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted,
confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization.
S2RF Code Snippet
void NxtHopTableUpdate(tNxtHopTable *table, U32 key, U8 value)
{
U32 h = CheapHash(key);
U32 chunkId = h % table->numChunks;
U32 binId = (h / table->numChunks) % NXTHOPTABLE_CHUNK_NUM_BINS;
U8 choice_chunk = table->chunks[chunkId].choiceList[binId / 4];
int i, offset = (binId & 0x3) * 2;
U8 choice = (U8)((choice_chunk >> offset) & 0x3);
U32 groupId = binPerm[choice][binId];
for (i = 0; i < table->chunkRuleList[chunkId].groupSize[groupId]; ++i)
if (table->chunkRuleList[chunkId].groupRuleList[groupId][i].ip == key)
{
table->chunkRuleList[chunkId].groupRuleList[groupId][i].Id = value;
break;
}
int ret = SearchHash(table, table->chunkRuleList[chunkId].groupSize[groupId],
table->chunkRuleList[chunkId].groupRuleList[groupId])}
GPT Update
void NxtHopTableLookupMulti(tNxtHopTable *table, int numKeys, U32 *keyList, U8
*valueList) {
…
for (i = 0; i < numKeys; i++) {
U32 h = CheapHash(keyList[i]);
chunkIdList[i] = h % table->numChunks;
binIdList[i] = (h / table->numChunks) % NXTHOPTABLE_CHUNK_NUM_BINS;
rte_prefetch0(&table->chunks[chunkIdList[i]].choiceList[binIdList[i]); }
for (i = 0; i < numKeys; i++) {
choiceList[i] = GetChoice(table, chunkIdList[i], binIdList[i]);
groupIdList[i] = BinToGroup(binIdList[i], choiceList[i]);
rte_prefetch0(&table->chunks[chunkIdList[i]].groups[groupIdList[i]]); }
for (i = 0; i < numKeys; i++) {
hashValA[i] = NXTHOPTABLE_HASHFUNCA(keyList[i]);
hashValB[i] = NXTHOPTABLE_HASHFUNCB(keyList[i]);
valueList[i] = 0;
for (bit = 0; bit < NXTHOPTABLE_VALUE_SIZE_MAX; bit++) {
U16 hashFuncIdx;
U16 lookupTbl;
GetGroup(
&table->chunks[chunkIdList[i]].groups[groupIdList[i]],
NXTHOPTABLE_VALUE_SIZE_MAX - bit - 1,
&hashFuncIdx, &lookupTbl)
valueList[i] = LookupBit(table, hashFuncIdx, lookupTbl);
}
Update  finding a new hash function that
satisfies the new value
GPT Lookup
Lookup  hash computation knowing the
group hash index
Find group_id using
cheap hash
Using hash index do
lookup
#moveforward
©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted,
confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization.
S2RF Performance Quantification
• SNB @ 2.2Ghz, 20 MB LLC
• 4-Node Cluster, 16*10 Gbps Niantic vector driver/DPDK
• IPv4 random traffic, i.e. 1/N on local node, ¾ on remote node
Single Core Table Insertions per second
Scales Linearly with number of cores
~35% Better Throughput
0
1
2
3
4
5
6
7
8
9
0% 10% 20% 30% 40% 50% 60% 70%
Inserts/Second
Millions
Table Load
Global Table Insert Performance
32M Sequential
8M Sequential
2M Sequential
Full
Duplication
#moveforward
©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted,
confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization.
Best Practices for Efficient Packet processing
Avoiding serialization in the packet-processing pipeline, including serializing events
such as locks, special instructions such as CLFLUSH, and large critical sections
Accessing data from the cache where possible by making use of prefetch
instructions and observing best practices in design of the software pipeline
Designing data structures to be cache-aligned and avoiding occurrences of data
being spread across two cache lines, partial writes, and contention between write
and read operations
Maintaining affinity between software threads and hardware threads, as well as
isolating software threads from one another with regard to scheduling relative to
hardware threads
Breaking down user-plane functionality so that it can be implemented with a
combination of RTC (Run to Completion) and pipeline methods
Use of pre-tuned open source optimized software components like DPDK
#moveforward
©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted,
confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization.
Summary
Lack of
Service Agility
Rapid and just-in-
time service scaling
Rigid network
build models
• Scalable Switch Route Forward
(S2RF) helps address some of the
scaling challenges in carrier networks
 Scales linearly the number of ports and
flow classification size with the number of
nodes in a cluster
 Uses DPDK and IA optimizations for
efficient packet processing and I/O
performance
#moveforward
©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted,
confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization.
Questions
#moveforward

Contenu connexe

Tendances

Netsft2017 day in_life_of_nfv
Netsft2017 day in_life_of_nfvNetsft2017 day in_life_of_nfv
Netsft2017 day in_life_of_nfvIntel
 
High Performance Networking Leveraging the DPDK and Growing Community
High Performance Networking Leveraging the DPDK and Growing CommunityHigh Performance Networking Leveraging the DPDK and Growing Community
High Performance Networking Leveraging the DPDK and Growing Community6WIND
 
DPDK Summit 2015 - Intel - Keith Wiles
DPDK Summit 2015 - Intel - Keith WilesDPDK Summit 2015 - Intel - Keith Wiles
DPDK Summit 2015 - Intel - Keith WilesJim St. Leger
 
DPDK Summit - 08 Sept 2014 - 6WIND - High Perf Networking Leveraging the DPDK...
DPDK Summit - 08 Sept 2014 - 6WIND - High Perf Networking Leveraging the DPDK...DPDK Summit - 08 Sept 2014 - 6WIND - High Perf Networking Leveraging the DPDK...
DPDK Summit - 08 Sept 2014 - 6WIND - High Perf Networking Leveraging the DPDK...Jim St. Leger
 
DPDK Summit - 08 Sept 2014 - Futurewei - Jun Xu - Revisit the IP Stack in Lin...
DPDK Summit - 08 Sept 2014 - Futurewei - Jun Xu - Revisit the IP Stack in Lin...DPDK Summit - 08 Sept 2014 - Futurewei - Jun Xu - Revisit the IP Stack in Lin...
DPDK Summit - 08 Sept 2014 - Futurewei - Jun Xu - Revisit the IP Stack in Lin...Jim St. Leger
 
Inside Microsoft's FPGA-Based Configurable Cloud
Inside Microsoft's FPGA-Based Configurable CloudInside Microsoft's FPGA-Based Configurable Cloud
Inside Microsoft's FPGA-Based Configurable Cloudinside-BigData.com
 
Install FD.IO VPP On Intel(r) Architecture & Test with Trex*
Install FD.IO VPP On Intel(r) Architecture & Test with Trex*Install FD.IO VPP On Intel(r) Architecture & Test with Trex*
Install FD.IO VPP On Intel(r) Architecture & Test with Trex*Michelle Holley
 
DPDK Summit - 08 Sept 2014 - Intel - Networking Workloads on Intel Architecture
DPDK Summit - 08 Sept 2014 - Intel - Networking Workloads on Intel ArchitectureDPDK Summit - 08 Sept 2014 - Intel - Networking Workloads on Intel Architecture
DPDK Summit - 08 Sept 2014 - Intel - Networking Workloads on Intel ArchitectureJim St. Leger
 
DPDK IPSec performance benchmark ~ Georgii Tkachuk
DPDK IPSec performance benchmark ~ Georgii TkachukDPDK IPSec performance benchmark ~ Georgii Tkachuk
DPDK IPSec performance benchmark ~ Georgii TkachukIntel
 
DPDK Summit 2015 - HP - Al Sanders
DPDK Summit 2015 - HP - Al SandersDPDK Summit 2015 - HP - Al Sanders
DPDK Summit 2015 - HP - Al SandersJim St. Leger
 
Performance challenges in software networking
Performance challenges in software networkingPerformance challenges in software networking
Performance challenges in software networkingStephen Hemminger
 
LF_DPDK17_Serverless DPDK - How SmartNIC resident DPDK Accelerates Packet Pro...
LF_DPDK17_Serverless DPDK - How SmartNIC resident DPDK Accelerates Packet Pro...LF_DPDK17_Serverless DPDK - How SmartNIC resident DPDK Accelerates Packet Pro...
LF_DPDK17_Serverless DPDK - How SmartNIC resident DPDK Accelerates Packet Pro...LF_DPDK
 
redGuardian DP100 large scale DDoS mitigation solution
redGuardian DP100 large scale DDoS mitigation solutionredGuardian DP100 large scale DDoS mitigation solution
redGuardian DP100 large scale DDoS mitigation solutionRedge Technologies
 
DPDK Summit - 08 Sept 2014 - Ericsson - A Multi-Socket Ferrari for NFV
DPDK Summit - 08 Sept 2014 - Ericsson - A Multi-Socket Ferrari for NFVDPDK Summit - 08 Sept 2014 - Ericsson - A Multi-Socket Ferrari for NFV
DPDK Summit - 08 Sept 2014 - Ericsson - A Multi-Socket Ferrari for NFVJim St. Leger
 
Learning from ZFS to Scale Storage on and under Containers
Learning from ZFS to Scale Storage on and under ContainersLearning from ZFS to Scale Storage on and under Containers
Learning from ZFS to Scale Storage on and under Containersinside-BigData.com
 
DPDK Summit 2015 - Intro - Tim O'Driscoll
DPDK Summit 2015 - Intro - Tim O'DriscollDPDK Summit 2015 - Intro - Tim O'Driscoll
DPDK Summit 2015 - Intro - Tim O'DriscollJim St. Leger
 
DPDK: Multi Architecture High Performance Packet Processing
DPDK: Multi Architecture High Performance Packet ProcessingDPDK: Multi Architecture High Performance Packet Processing
DPDK: Multi Architecture High Performance Packet ProcessingMichelle Holley
 
Scaling the Container Dataplane
Scaling the Container Dataplane Scaling the Container Dataplane
Scaling the Container Dataplane Michelle Holley
 
LF_DPDK17_ OpenVswitch hardware offload over DPDK
LF_DPDK17_ OpenVswitch hardware offload over DPDKLF_DPDK17_ OpenVswitch hardware offload over DPDK
LF_DPDK17_ OpenVswitch hardware offload over DPDKLF_DPDK
 

Tendances (20)

Netsft2017 day in_life_of_nfv
Netsft2017 day in_life_of_nfvNetsft2017 day in_life_of_nfv
Netsft2017 day in_life_of_nfv
 
High Performance Networking Leveraging the DPDK and Growing Community
High Performance Networking Leveraging the DPDK and Growing CommunityHigh Performance Networking Leveraging the DPDK and Growing Community
High Performance Networking Leveraging the DPDK and Growing Community
 
DPDK Summit 2015 - Intel - Keith Wiles
DPDK Summit 2015 - Intel - Keith WilesDPDK Summit 2015 - Intel - Keith Wiles
DPDK Summit 2015 - Intel - Keith Wiles
 
DPDK Summit - 08 Sept 2014 - 6WIND - High Perf Networking Leveraging the DPDK...
DPDK Summit - 08 Sept 2014 - 6WIND - High Perf Networking Leveraging the DPDK...DPDK Summit - 08 Sept 2014 - 6WIND - High Perf Networking Leveraging the DPDK...
DPDK Summit - 08 Sept 2014 - 6WIND - High Perf Networking Leveraging the DPDK...
 
DPDK Summit - 08 Sept 2014 - Futurewei - Jun Xu - Revisit the IP Stack in Lin...
DPDK Summit - 08 Sept 2014 - Futurewei - Jun Xu - Revisit the IP Stack in Lin...DPDK Summit - 08 Sept 2014 - Futurewei - Jun Xu - Revisit the IP Stack in Lin...
DPDK Summit - 08 Sept 2014 - Futurewei - Jun Xu - Revisit the IP Stack in Lin...
 
Inside Microsoft's FPGA-Based Configurable Cloud
Inside Microsoft's FPGA-Based Configurable CloudInside Microsoft's FPGA-Based Configurable Cloud
Inside Microsoft's FPGA-Based Configurable Cloud
 
Install FD.IO VPP On Intel(r) Architecture & Test with Trex*
Install FD.IO VPP On Intel(r) Architecture & Test with Trex*Install FD.IO VPP On Intel(r) Architecture & Test with Trex*
Install FD.IO VPP On Intel(r) Architecture & Test with Trex*
 
DPDK Summit - 08 Sept 2014 - Intel - Networking Workloads on Intel Architecture
DPDK Summit - 08 Sept 2014 - Intel - Networking Workloads on Intel ArchitectureDPDK Summit - 08 Sept 2014 - Intel - Networking Workloads on Intel Architecture
DPDK Summit - 08 Sept 2014 - Intel - Networking Workloads on Intel Architecture
 
DPDK IPSec performance benchmark ~ Georgii Tkachuk
DPDK IPSec performance benchmark ~ Georgii TkachukDPDK IPSec performance benchmark ~ Georgii Tkachuk
DPDK IPSec performance benchmark ~ Georgii Tkachuk
 
DPDK Summit 2015 - HP - Al Sanders
DPDK Summit 2015 - HP - Al SandersDPDK Summit 2015 - HP - Al Sanders
DPDK Summit 2015 - HP - Al Sanders
 
Performance challenges in software networking
Performance challenges in software networkingPerformance challenges in software networking
Performance challenges in software networking
 
LF_DPDK17_Serverless DPDK - How SmartNIC resident DPDK Accelerates Packet Pro...
LF_DPDK17_Serverless DPDK - How SmartNIC resident DPDK Accelerates Packet Pro...LF_DPDK17_Serverless DPDK - How SmartNIC resident DPDK Accelerates Packet Pro...
LF_DPDK17_Serverless DPDK - How SmartNIC resident DPDK Accelerates Packet Pro...
 
redGuardian DP100 large scale DDoS mitigation solution
redGuardian DP100 large scale DDoS mitigation solutionredGuardian DP100 large scale DDoS mitigation solution
redGuardian DP100 large scale DDoS mitigation solution
 
DPDK Summit - 08 Sept 2014 - Ericsson - A Multi-Socket Ferrari for NFV
DPDK Summit - 08 Sept 2014 - Ericsson - A Multi-Socket Ferrari for NFVDPDK Summit - 08 Sept 2014 - Ericsson - A Multi-Socket Ferrari for NFV
DPDK Summit - 08 Sept 2014 - Ericsson - A Multi-Socket Ferrari for NFV
 
Learning from ZFS to Scale Storage on and under Containers
Learning from ZFS to Scale Storage on and under ContainersLearning from ZFS to Scale Storage on and under Containers
Learning from ZFS to Scale Storage on and under Containers
 
DPDK Summit 2015 - Intro - Tim O'Driscoll
DPDK Summit 2015 - Intro - Tim O'DriscollDPDK Summit 2015 - Intro - Tim O'Driscoll
DPDK Summit 2015 - Intro - Tim O'Driscoll
 
DPDK: Multi Architecture High Performance Packet Processing
DPDK: Multi Architecture High Performance Packet ProcessingDPDK: Multi Architecture High Performance Packet Processing
DPDK: Multi Architecture High Performance Packet Processing
 
Cloud Networking Trends
Cloud Networking TrendsCloud Networking Trends
Cloud Networking Trends
 
Scaling the Container Dataplane
Scaling the Container Dataplane Scaling the Container Dataplane
Scaling the Container Dataplane
 
LF_DPDK17_ OpenVswitch hardware offload over DPDK
LF_DPDK17_ OpenVswitch hardware offload over DPDKLF_DPDK17_ OpenVswitch hardware offload over DPDK
LF_DPDK17_ OpenVswitch hardware offload over DPDK
 

En vedette

David_Amzallag _NFV and the future of the OSS - TMF2013
David_Amzallag  _NFV and the future of the OSS - TMF2013David_Amzallag  _NFV and the future of the OSS - TMF2013
David_Amzallag _NFV and the future of the OSS - TMF2013David Amzallag
 
2014 Interns Prototypes vFinal
2014 Interns Prototypes vFinal2014 Interns Prototypes vFinal
2014 Interns Prototypes vFinalAmeya Parab
 
Sprint - Cloud Services
Sprint - Cloud ServicesSprint - Cloud Services
Sprint - Cloud ServicesStephen Eilers
 
Migrating to netcool precision for ip networks --best practices for migrating...
Migrating to netcool precision for ip networks --best practices for migrating...Migrating to netcool precision for ip networks --best practices for migrating...
Migrating to netcool precision for ip networks --best practices for migrating...Banking at Ho Chi Minh city
 
Gaining Support for Hadoop in a Large Corporate Environment
Gaining Support for Hadoop in a Large Corporate EnvironmentGaining Support for Hadoop in a Large Corporate Environment
Gaining Support for Hadoop in a Large Corporate EnvironmentDataWorks Summit
 
Network Vision Sprint Direct Connect
Network Vision   Sprint Direct ConnectNetwork Vision   Sprint Direct Connect
Network Vision Sprint Direct Connectudiazdeleon
 
Building A Winning Strategy For Open Source Company Beijing Nov2009
Building A Winning Strategy For Open Source Company Beijing Nov2009Building A Winning Strategy For Open Source Company Beijing Nov2009
Building A Winning Strategy For Open Source Company Beijing Nov2009OpenSourceCamp
 
Carrier Strategies for Backbone Traffic Engineering and QoS
Carrier Strategies for Backbone Traffic Engineering and QoSCarrier Strategies for Backbone Traffic Engineering and QoS
Carrier Strategies for Backbone Traffic Engineering and QoSVishal Sharma, Ph.D.
 
Sprint 48 review
Sprint 48 reviewSprint 48 review
Sprint 48 reviewManageIQ
 
The State of Open Source BI Adoption
The State of Open Source BI AdoptionThe State of Open Source BI Adoption
The State of Open Source BI Adoptionmark madsen
 
Sprint 38 review
Sprint 38 reviewSprint 38 review
Sprint 38 reviewManageIQ
 
NFV management and orchestration framework architecture
NFV management and orchestration framework architectureNFV management and orchestration framework architecture
NFV management and orchestration framework architecturesidneel
 
Case Study: Sprint Monitors Its Mega-Network for Voice/Video/Data Service Ass...
Case Study: Sprint Monitors Its Mega-Network for Voice/Video/Data Service Ass...Case Study: Sprint Monitors Its Mega-Network for Voice/Video/Data Service Ass...
Case Study: Sprint Monitors Its Mega-Network for Voice/Video/Data Service Ass...CA Technologies
 
Latest trends in information technology
Latest trends in information technologyLatest trends in information technology
Latest trends in information technologyEldos Kuriakose
 

En vedette (16)

David_Amzallag _NFV and the future of the OSS - TMF2013
David_Amzallag  _NFV and the future of the OSS - TMF2013David_Amzallag  _NFV and the future of the OSS - TMF2013
David_Amzallag _NFV and the future of the OSS - TMF2013
 
StartPoint - Sprint 1
StartPoint - Sprint 1StartPoint - Sprint 1
StartPoint - Sprint 1
 
2014 Interns Prototypes vFinal
2014 Interns Prototypes vFinal2014 Interns Prototypes vFinal
2014 Interns Prototypes vFinal
 
Sprint - Cloud Services
Sprint - Cloud ServicesSprint - Cloud Services
Sprint - Cloud Services
 
Migrating to netcool precision for ip networks --best practices for migrating...
Migrating to netcool precision for ip networks --best practices for migrating...Migrating to netcool precision for ip networks --best practices for migrating...
Migrating to netcool precision for ip networks --best practices for migrating...
 
Gaining Support for Hadoop in a Large Corporate Environment
Gaining Support for Hadoop in a Large Corporate EnvironmentGaining Support for Hadoop in a Large Corporate Environment
Gaining Support for Hadoop in a Large Corporate Environment
 
Network Vision Sprint Direct Connect
Network Vision   Sprint Direct ConnectNetwork Vision   Sprint Direct Connect
Network Vision Sprint Direct Connect
 
Building A Winning Strategy For Open Source Company Beijing Nov2009
Building A Winning Strategy For Open Source Company Beijing Nov2009Building A Winning Strategy For Open Source Company Beijing Nov2009
Building A Winning Strategy For Open Source Company Beijing Nov2009
 
Carrier Strategies for Backbone Traffic Engineering and QoS
Carrier Strategies for Backbone Traffic Engineering and QoSCarrier Strategies for Backbone Traffic Engineering and QoS
Carrier Strategies for Backbone Traffic Engineering and QoS
 
Sprint 48 review
Sprint 48 reviewSprint 48 review
Sprint 48 review
 
Rws 120032 final
Rws 120032 finalRws 120032 final
Rws 120032 final
 
The State of Open Source BI Adoption
The State of Open Source BI AdoptionThe State of Open Source BI Adoption
The State of Open Source BI Adoption
 
Sprint 38 review
Sprint 38 reviewSprint 38 review
Sprint 38 review
 
NFV management and orchestration framework architecture
NFV management and orchestration framework architectureNFV management and orchestration framework architecture
NFV management and orchestration framework architecture
 
Case Study: Sprint Monitors Its Mega-Network for Voice/Video/Data Service Ass...
Case Study: Sprint Monitors Its Mega-Network for Voice/Video/Data Service Ass...Case Study: Sprint Monitors Its Mega-Network for Voice/Video/Data Service Ass...
Case Study: Sprint Monitors Its Mega-Network for Voice/Video/Data Service Ass...
 
Latest trends in information technology
Latest trends in information technologyLatest trends in information technology
Latest trends in information technology
 

Similaire à DPDK Summit 2015 - Sprint - Arun Rajagopal

Hp helion meetup_networking_sdn
Hp helion meetup_networking_sdnHp helion meetup_networking_sdn
Hp helion meetup_networking_sdnMarton Kiss
 
Software Defined Networks: A Carrier Perspective
Software Defined Networks: A Carrier PerspectiveSoftware Defined Networks: A Carrier Perspective
Software Defined Networks: A Carrier PerspectiveOpen Networking Summits
 
About Brain4Net, Inc. - July 2015
About Brain4Net, Inc. - July 2015About Brain4Net, Inc. - July 2015
About Brain4Net, Inc. - July 2015Brain4Net, Inc.
 
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...Cisco Russia
 
CISCO: Accelerating Small Cell Deployments in the Enterprise
CISCO: Accelerating Small Cell Deployments in the EnterpriseCISCO: Accelerating Small Cell Deployments in the Enterprise
CISCO: Accelerating Small Cell Deployments in the EnterpriseSmall Cell Forum
 
Achieving Network Deployment Flexibility with Mirantis OpenStack
Achieving Network Deployment Flexibility with Mirantis OpenStackAchieving Network Deployment Flexibility with Mirantis OpenStack
Achieving Network Deployment Flexibility with Mirantis OpenStackEric Zhaohui Ji
 
Application Centric Infrastructure (ACI), the policy driven data centre
Application Centric Infrastructure (ACI), the policy driven data centreApplication Centric Infrastructure (ACI), the policy driven data centre
Application Centric Infrastructure (ACI), the policy driven data centreCisco Canada
 
07 (IDNOG02) SDN Research activity in Institut Teknologi Bandung by Affan Bas...
07 (IDNOG02) SDN Research activity in Institut Teknologi Bandung by Affan Bas...07 (IDNOG02) SDN Research activity in Institut Teknologi Bandung by Affan Bas...
07 (IDNOG02) SDN Research activity in Institut Teknologi Bandung by Affan Bas...Indonesia Network Operators Group
 
Peering and Transit Tutorials: Path to IPv4 Exhaustion
Peering and Transit Tutorials: Path to IPv4 Exhaustion Peering and Transit Tutorials: Path to IPv4 Exhaustion
Peering and Transit Tutorials: Path to IPv4 Exhaustion Internet Society
 
Introducing Application Engineered Routing Powered by Segment Routing
Introducing Application Engineered Routing Powered by Segment RoutingIntroducing Application Engineered Routing Powered by Segment Routing
Introducing Application Engineered Routing Powered by Segment RoutingCisco Service Provider
 
Обеспечение сетевой безопасности с помощью многоцелевого адаптируемого межсет...
Обеспечение сетевой безопасности с помощью многоцелевого адаптируемого межсет...Обеспечение сетевой безопасности с помощью многоцелевого адаптируемого межсет...
Обеспечение сетевой безопасности с помощью многоцелевого адаптируемого межсет...TechExpert
 
Cisco Digital Network Architecture - Introducing the Network Intuitive
Cisco Digital Network Architecture - Introducing the Network IntuitiveCisco Digital Network Architecture - Introducing the Network Intuitive
Cisco Digital Network Architecture - Introducing the Network IntuitiveCisco Canada
 
Enterprise Networks - Cisco Digital Network Architecture - Introducing the Ne...
Enterprise Networks - Cisco Digital Network Architecture - Introducing the Ne...Enterprise Networks - Cisco Digital Network Architecture - Introducing the Ne...
Enterprise Networks - Cisco Digital Network Architecture - Introducing the Ne...Cisco Canada
 
LTE Asia 2013 - Policy Control & Abstraction
LTE Asia 2013 - Policy Control & AbstractionLTE Asia 2013 - Policy Control & Abstraction
LTE Asia 2013 - Policy Control & AbstractionPatrick Nijsters
 
Flexpod with SAP HANA and SAP Applications
Flexpod with SAP HANA and SAP ApplicationsFlexpod with SAP HANA and SAP Applications
Flexpod with SAP HANA and SAP ApplicationsLishantian
 
HTTP/2 Comes to Java - What Servlet 4.0 Means to You
HTTP/2 Comes to Java - What Servlet 4.0 Means to YouHTTP/2 Comes to Java - What Servlet 4.0 Means to You
HTTP/2 Comes to Java - What Servlet 4.0 Means to YouDavid Delabassee
 
PLNOG 5: Joerg Ammon - THE VIRTUALIZED SP DATA CENTER
PLNOG 5: Joerg Ammon - THE VIRTUALIZED SP DATA CENTERPLNOG 5: Joerg Ammon - THE VIRTUALIZED SP DATA CENTER
PLNOG 5: Joerg Ammon - THE VIRTUALIZED SP DATA CENTERPROIDEA
 
CisCon 2018 - Analytics per Storage Area Networks
CisCon 2018 - Analytics per Storage Area NetworksCisCon 2018 - Analytics per Storage Area Networks
CisCon 2018 - Analytics per Storage Area NetworksAreaNetworking.it
 

Similaire à DPDK Summit 2015 - Sprint - Arun Rajagopal (20)

Hp helion meetup_networking_sdn
Hp helion meetup_networking_sdnHp helion meetup_networking_sdn
Hp helion meetup_networking_sdn
 
Software Defined Networks: A Carrier Perspective
Software Defined Networks: A Carrier PerspectiveSoftware Defined Networks: A Carrier Perspective
Software Defined Networks: A Carrier Perspective
 
SDN in Google
SDN in GoogleSDN in Google
SDN in Google
 
About Brain4Net, Inc. - July 2015
About Brain4Net, Inc. - July 2015About Brain4Net, Inc. - July 2015
About Brain4Net, Inc. - July 2015
 
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
Решения конвергентного доступа Cisco. Обновление продуктовой линейки коммутат...
 
CISCO: Accelerating Small Cell Deployments in the Enterprise
CISCO: Accelerating Small Cell Deployments in the EnterpriseCISCO: Accelerating Small Cell Deployments in the Enterprise
CISCO: Accelerating Small Cell Deployments in the Enterprise
 
Achieving Network Deployment Flexibility with Mirantis OpenStack
Achieving Network Deployment Flexibility with Mirantis OpenStackAchieving Network Deployment Flexibility with Mirantis OpenStack
Achieving Network Deployment Flexibility with Mirantis OpenStack
 
Application Centric Infrastructure (ACI), the policy driven data centre
Application Centric Infrastructure (ACI), the policy driven data centreApplication Centric Infrastructure (ACI), the policy driven data centre
Application Centric Infrastructure (ACI), the policy driven data centre
 
07 (IDNOG02) SDN Research activity in Institut Teknologi Bandung by Affan Bas...
07 (IDNOG02) SDN Research activity in Institut Teknologi Bandung by Affan Bas...07 (IDNOG02) SDN Research activity in Institut Teknologi Bandung by Affan Bas...
07 (IDNOG02) SDN Research activity in Institut Teknologi Bandung by Affan Bas...
 
Peering and Transit Tutorials: Path to IPv4 Exhaustion
Peering and Transit Tutorials: Path to IPv4 Exhaustion Peering and Transit Tutorials: Path to IPv4 Exhaustion
Peering and Transit Tutorials: Path to IPv4 Exhaustion
 
Introducing Application Engineered Routing Powered by Segment Routing
Introducing Application Engineered Routing Powered by Segment RoutingIntroducing Application Engineered Routing Powered by Segment Routing
Introducing Application Engineered Routing Powered by Segment Routing
 
Обеспечение сетевой безопасности с помощью многоцелевого адаптируемого межсет...
Обеспечение сетевой безопасности с помощью многоцелевого адаптируемого межсет...Обеспечение сетевой безопасности с помощью многоцелевого адаптируемого межсет...
Обеспечение сетевой безопасности с помощью многоцелевого адаптируемого межсет...
 
Cisco Digital Network Architecture - Introducing the Network Intuitive
Cisco Digital Network Architecture - Introducing the Network IntuitiveCisco Digital Network Architecture - Introducing the Network Intuitive
Cisco Digital Network Architecture - Introducing the Network Intuitive
 
Path to NFV Nirvana
Path to NFV NirvanaPath to NFV Nirvana
Path to NFV Nirvana
 
Enterprise Networks - Cisco Digital Network Architecture - Introducing the Ne...
Enterprise Networks - Cisco Digital Network Architecture - Introducing the Ne...Enterprise Networks - Cisco Digital Network Architecture - Introducing the Ne...
Enterprise Networks - Cisco Digital Network Architecture - Introducing the Ne...
 
LTE Asia 2013 - Policy Control & Abstraction
LTE Asia 2013 - Policy Control & AbstractionLTE Asia 2013 - Policy Control & Abstraction
LTE Asia 2013 - Policy Control & Abstraction
 
Flexpod with SAP HANA and SAP Applications
Flexpod with SAP HANA and SAP ApplicationsFlexpod with SAP HANA and SAP Applications
Flexpod with SAP HANA and SAP Applications
 
HTTP/2 Comes to Java - What Servlet 4.0 Means to You
HTTP/2 Comes to Java - What Servlet 4.0 Means to YouHTTP/2 Comes to Java - What Servlet 4.0 Means to You
HTTP/2 Comes to Java - What Servlet 4.0 Means to You
 
PLNOG 5: Joerg Ammon - THE VIRTUALIZED SP DATA CENTER
PLNOG 5: Joerg Ammon - THE VIRTUALIZED SP DATA CENTERPLNOG 5: Joerg Ammon - THE VIRTUALIZED SP DATA CENTER
PLNOG 5: Joerg Ammon - THE VIRTUALIZED SP DATA CENTER
 
CisCon 2018 - Analytics per Storage Area Networks
CisCon 2018 - Analytics per Storage Area NetworksCisCon 2018 - Analytics per Storage Area Networks
CisCon 2018 - Analytics per Storage Area Networks
 

Plus de Jim St. Leger

DPDK Summit - 08 Sept 2014 - Intel - Closing Remarks
DPDK Summit - 08 Sept 2014 - Intel - Closing RemarksDPDK Summit - 08 Sept 2014 - Intel - Closing Remarks
DPDK Summit - 08 Sept 2014 - Intel - Closing RemarksJim St. Leger
 
DPDK Summit - 08 Sept 2014 - NTT - High Performance vSwitch
DPDK Summit - 08 Sept 2014 - NTT - High Performance vSwitchDPDK Summit - 08 Sept 2014 - NTT - High Performance vSwitch
DPDK Summit - 08 Sept 2014 - NTT - High Performance vSwitchJim St. Leger
 
DPDK Summit - 08 Sept 2014 - Microsoft- PacketDirect
DPDK Summit - 08 Sept 2014 - Microsoft- PacketDirectDPDK Summit - 08 Sept 2014 - Microsoft- PacketDirect
DPDK Summit - 08 Sept 2014 - Microsoft- PacketDirectJim St. Leger
 
DPDK Summit - 08 Sept 2014 - Introduction - St Leger
DPDK Summit - 08 Sept 2014 - Introduction - St LegerDPDK Summit - 08 Sept 2014 - Introduction - St Leger
DPDK Summit - 08 Sept 2014 - Introduction - St LegerJim St. Leger
 
Transforming Communications Networks
Transforming Communications NetworksTransforming Communications Networks
Transforming Communications NetworksJim St. Leger
 
3D Printing Overview
3D Printing Overview3D Printing Overview
3D Printing OverviewJim St. Leger
 

Plus de Jim St. Leger (6)

DPDK Summit - 08 Sept 2014 - Intel - Closing Remarks
DPDK Summit - 08 Sept 2014 - Intel - Closing RemarksDPDK Summit - 08 Sept 2014 - Intel - Closing Remarks
DPDK Summit - 08 Sept 2014 - Intel - Closing Remarks
 
DPDK Summit - 08 Sept 2014 - NTT - High Performance vSwitch
DPDK Summit - 08 Sept 2014 - NTT - High Performance vSwitchDPDK Summit - 08 Sept 2014 - NTT - High Performance vSwitch
DPDK Summit - 08 Sept 2014 - NTT - High Performance vSwitch
 
DPDK Summit - 08 Sept 2014 - Microsoft- PacketDirect
DPDK Summit - 08 Sept 2014 - Microsoft- PacketDirectDPDK Summit - 08 Sept 2014 - Microsoft- PacketDirect
DPDK Summit - 08 Sept 2014 - Microsoft- PacketDirect
 
DPDK Summit - 08 Sept 2014 - Introduction - St Leger
DPDK Summit - 08 Sept 2014 - Introduction - St LegerDPDK Summit - 08 Sept 2014 - Introduction - St Leger
DPDK Summit - 08 Sept 2014 - Introduction - St Leger
 
Transforming Communications Networks
Transforming Communications NetworksTransforming Communications Networks
Transforming Communications Networks
 
3D Printing Overview
3D Printing Overview3D Printing Overview
3D Printing Overview
 

Dernier

VictoriaMetrics Q1 Meet Up '24 - Community & News Update
VictoriaMetrics Q1 Meet Up '24 - Community & News UpdateVictoriaMetrics Q1 Meet Up '24 - Community & News Update
VictoriaMetrics Q1 Meet Up '24 - Community & News UpdateVictoriaMetrics
 
Large Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLarge Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLionel Briand
 
Pros and Cons of Selenium In Automation Testing_ A Comprehensive Assessment.pdf
Pros and Cons of Selenium In Automation Testing_ A Comprehensive Assessment.pdfPros and Cons of Selenium In Automation Testing_ A Comprehensive Assessment.pdf
Pros and Cons of Selenium In Automation Testing_ A Comprehensive Assessment.pdfkalichargn70th171
 
Osi security architecture in network.pptx
Osi security architecture in network.pptxOsi security architecture in network.pptx
Osi security architecture in network.pptxVinzoCenzo
 
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...OnePlan Solutions
 
Ronisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited CatalogueRonisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited Catalogueitservices996
 
2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shards2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shardsChristopher Curtin
 
Data modeling 101 - Basics - Software Domain
Data modeling 101 - Basics - Software DomainData modeling 101 - Basics - Software Domain
Data modeling 101 - Basics - Software DomainAbdul Ahad
 
Zer0con 2024 final share short version.pdf
Zer0con 2024 final share short version.pdfZer0con 2024 final share short version.pdf
Zer0con 2024 final share short version.pdfmaor17
 
UI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptxUI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptxAndreas Kunz
 
Amazon Bedrock in Action - presentation of the Bedrock's capabilities
Amazon Bedrock in Action - presentation of the Bedrock's capabilitiesAmazon Bedrock in Action - presentation of the Bedrock's capabilities
Amazon Bedrock in Action - presentation of the Bedrock's capabilitiesKrzysztofKkol1
 
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full RecordingOpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full RecordingShane Coughlan
 
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...Bert Jan Schrijver
 
SAM Training Session - How to use EXCEL ?
SAM Training Session - How to use EXCEL ?SAM Training Session - How to use EXCEL ?
SAM Training Session - How to use EXCEL ?Alexandre Beguel
 
Copilot para Microsoft 365 y Power Platform Copilot
Copilot para Microsoft 365 y Power Platform CopilotCopilot para Microsoft 365 y Power Platform Copilot
Copilot para Microsoft 365 y Power Platform CopilotEdgard Alejos
 
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4jGraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4jNeo4j
 
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...OnePlan Solutions
 
Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Rob Geurden
 
Best Angular 17 Classroom & Online training - Naresh IT
Best Angular 17 Classroom & Online training - Naresh ITBest Angular 17 Classroom & Online training - Naresh IT
Best Angular 17 Classroom & Online training - Naresh ITmanoharjgpsolutions
 
Strategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero resultsStrategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero resultsJean Silva
 

Dernier (20)

VictoriaMetrics Q1 Meet Up '24 - Community & News Update
VictoriaMetrics Q1 Meet Up '24 - Community & News UpdateVictoriaMetrics Q1 Meet Up '24 - Community & News Update
VictoriaMetrics Q1 Meet Up '24 - Community & News Update
 
Large Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and RepairLarge Language Models for Test Case Evolution and Repair
Large Language Models for Test Case Evolution and Repair
 
Pros and Cons of Selenium In Automation Testing_ A Comprehensive Assessment.pdf
Pros and Cons of Selenium In Automation Testing_ A Comprehensive Assessment.pdfPros and Cons of Selenium In Automation Testing_ A Comprehensive Assessment.pdf
Pros and Cons of Selenium In Automation Testing_ A Comprehensive Assessment.pdf
 
Osi security architecture in network.pptx
Osi security architecture in network.pptxOsi security architecture in network.pptx
Osi security architecture in network.pptx
 
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
 
Ronisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited CatalogueRonisha Informatics Private Limited Catalogue
Ronisha Informatics Private Limited Catalogue
 
2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shards2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shards
 
Data modeling 101 - Basics - Software Domain
Data modeling 101 - Basics - Software DomainData modeling 101 - Basics - Software Domain
Data modeling 101 - Basics - Software Domain
 
Zer0con 2024 final share short version.pdf
Zer0con 2024 final share short version.pdfZer0con 2024 final share short version.pdf
Zer0con 2024 final share short version.pdf
 
UI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptxUI5ers live - Custom Controls wrapping 3rd-party libs.pptx
UI5ers live - Custom Controls wrapping 3rd-party libs.pptx
 
Amazon Bedrock in Action - presentation of the Bedrock's capabilities
Amazon Bedrock in Action - presentation of the Bedrock's capabilitiesAmazon Bedrock in Action - presentation of the Bedrock's capabilities
Amazon Bedrock in Action - presentation of the Bedrock's capabilities
 
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full RecordingOpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
OpenChain AI Study Group - Europe and Asia Recap - 2024-04-11 - Full Recording
 
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
 
SAM Training Session - How to use EXCEL ?
SAM Training Session - How to use EXCEL ?SAM Training Session - How to use EXCEL ?
SAM Training Session - How to use EXCEL ?
 
Copilot para Microsoft 365 y Power Platform Copilot
Copilot para Microsoft 365 y Power Platform CopilotCopilot para Microsoft 365 y Power Platform Copilot
Copilot para Microsoft 365 y Power Platform Copilot
 
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4jGraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
GraphSummit Madrid - Product Vision and Roadmap - Luis Salvador Neo4j
 
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
 
Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...
 
Best Angular 17 Classroom & Online training - Naresh IT
Best Angular 17 Classroom & Online training - Naresh ITBest Angular 17 Classroom & Online training - Naresh IT
Best Angular 17 Classroom & Online training - Naresh IT
 
Strategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero resultsStrategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero results
 

DPDK Summit 2015 - Sprint - Arun Rajagopal

  • 1. ©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted, confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization. #moveforward Design Considerations for a High-Performing Virtualized LTE Core Infrastructure Arun Rajagopal Sprint CTO Office Sameh Gobriel Intel Labs
  • 2. ©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted, confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization. Current EPC Network Infrastructure #moveforward
  • 3. ©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted, confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization. Carrier Business Problems Rigid capacity models lead to inefficient utilization of network resources Capacity added when one dimension exhausts (e.g., signaling vs. bearer capacity on SBC) Difficult to align service revenue with costs (e.g., low volume M2M) No means to re-use stranded capacity on platforms Long time-to-market intervals for new products/services Long service development processes with limited service agility Limited fast fail opportunities and platform re-usability Rapid service scaling is a challenge Adding new capacity to existing services takes time Managing scale by adding additional hardware and using load balancing mechanisms is complex More nodes/elements to manage as the function scales Lack of Service Agility Rapid and just-in- time service scaling Rigid network build models #moveforward
  • 4. ©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted, confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization. ©2014 Sprint This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted, confidential or privileged materials intended for the sole use of the intended recipient Any review, use, distribution or disclosure is prohibited without authorization The Case for NFV Simplifies Network Architecture • Common hardware • Independent scaling of components • Standard and repeatable configurations Simplifies Network Operations • Just-in-time allocation • Automated deployment • Automated capacity add • Agile, high velocity service creation environment Creates New Revenue Opportunities • Combine Mobility and call control with cloud technologies • Monetize network based on service value Lower Capex Lower Opex Higher Revenue #moveforward
  • 5. ©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted, confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization. #moveforward From Purpose Built ASICs to General Purpose IA 1850R PROLIANT 1850R PROLIANT 1850R PROLIANT 1850R PROLIANT SGW PDN GW MME PCRF vEPC SGW PDN GW vEPC SGW PDN GW vEPC SGW PDN GW vEPC Internet eNode B How to build a scalable EPC cluster on IA servers?  Fully programmable control & data planes  Incrementally scalable as needed by adding nodes to the cluster  S/P GW ported as DPDK Apps on top of IA Cluster.  Leverages multi-core/socket, DDIO, SSE instructions, ..etc. A first step towards a flexible network infrastructure
  • 6. ©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted, confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization. Flow Table Size and Packet Classification Bottleneck • EPC SGW session table size grow significantly (millions of entries) with the number of subscribers/bearers/flows. • Flow lookup and Packet classification is common for many VNFs. • Distributed flow table as a single entity to control/management plane. 1850R PROLIANT 1850R PROLIANT 1850R PROLIANT 1850R PROLIANT SGW PDN GW MME PCRF vEPC SGW PDN GW vEPC SGW PDN GW vEPC SGW PDN GW vEPC Internet eNode B (1) Single Node Optimization (2) Cluster Level Optimization #moveforward
  • 7. ©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted, confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization. Flow Lookup & Classification Bottleneck for NFV • Flow lookup and Classification a common operation for many network functions. • NFV workload will typically have large flow table sizes M1[1] Q[1] Q[2] Q[3] M2[1] M3[1] M1[2] M1[3] M2[2] M2[3] M3[2] M3[3] search lines match lines search word encoder • ASICs, NPUs uses TCAM to address this bottleneck. • TCAMs sizes are very limited #moveforward
  • 8. ©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted, confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization. Flow Lookup & Classification Bottleneck for NFV Cuckoo Hashing IP A IP H IP P IP J IP B IP Q IP D IP W Traditional Hashing IP Y IP Z IP X 1 2 3 H1 H2 Traditional J-hash library: • relies on a “sparse” hash table implementation • Simple exact match implementation • Significant performance degradation with increased table sizes. Cuckoo Hashing – Better Scalability: • Denser tables fit in cache. • Can scale to millions of entries. • Significant throughput improvement Available for DPDK v2.1 #moveforward
  • 9. ©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted, confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization. Cuckoo Hashing [Pagh ‘01] B C D F F G E A #moveforward
  • 10. ©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted, confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization. Performance benefits of CH w/ DPDK Improvement on table efficiency ~40% Throughput increase Memory bandwidth significantly reduced due to higher cache utilization Traditional hash 0.00 500.00 1,000.00 1,500.00 2,000.00 2,500.00 3,000.00 10 1M 4M Memory bandwidth vs. # of entries rte_hash Cuckoo Traditional hash 0.00 2.00 4.00 6.00 8.00 10.00 12.00 14.00 16.00 18.00 1M 2M 4M 8M 16M 32M Throughput vs. # of entries rte_hash Cuckoo Traditional hash Single Core Table Insertions per second 0 1 2 3 4 5 6 7 8 9 0% 10% 20% 30% 40% 50% 60% 70% 80% Inserts/Second Millions Table Load Cuckoo Hash Insert Performance 32M Random 8M Random 2M Random 32M Sequential 15X #moveforward
  • 11. ©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted, confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization. Distributed software flow lookup A C B D Partial FIB Full Duplication Hash Partitioning Scalable Switch Route Forward (S2RF) Nodes store FULL copy of FIB Pros: Design simplicity, scales throughput Cons: FIB does not scale as FIB capacity does not increase with the number of nodes in the cluster Node stores ONLY a portion of the FIB based on the hash of the keys (destination address, flow identifier …) Pros: Design simplicity, near linear scalability Cons: Latency w/ extra hop, increased interconnect load and CPU load for IO bouncing, potential traffic hot spots (w/ elephant flows) Nodes keep globally-replicated but extremely compact, and fast, table (Global Partition Table) mapping keys to lookup nodes FIB partitioned so lookup node for packet is also its egress node Pros: No extra latency and interconnect load, min resources required A C B D Full FIB “Improving Clustered Network Appliances with Xbricks”, Sigcomm ‘15 A C B D GPT + Partial FIB #moveforward
  • 12. ©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted, confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization. Lookup Table Space Optimization for GPT Main Idea: Throw away keys (from cache), Use perfect hashing to avoid collision For k-bit keys and v-bit values can we use O(v) instead of O(k + v) bits/entry ? KEY: k bits VAL: vbits Ren Dave Christian Dong Sameh Online/offline Status Christian 0 Dong 1 Dave 0 Sameh 1 Ren 1 Ren Dong Sameh Christian Dave H(Ren) = 1 H(Dave) = 0 H(Dong) = 1 H(Sameh) = 1 H(Christian) = 0 Ren Dave Christian Dong Sameh Online/offline Status #moveforward
  • 13. ©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted, confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization. Store m for this group of keys Target Value H1(x) H2(x) … Hm(x) key1 0 0 1 0 key2 1 0 1 1 … key16 0 0 0 0 GPT: From One Group to Many Groups All keys group1 group2 group3 group4 H376 Store hash function index for each group of keys H97 H62H7 #moveforward
  • 14. ©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted, confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization. S2RF Code Snippet void NxtHopTableUpdate(tNxtHopTable *table, U32 key, U8 value) { U32 h = CheapHash(key); U32 chunkId = h % table->numChunks; U32 binId = (h / table->numChunks) % NXTHOPTABLE_CHUNK_NUM_BINS; U8 choice_chunk = table->chunks[chunkId].choiceList[binId / 4]; int i, offset = (binId & 0x3) * 2; U8 choice = (U8)((choice_chunk >> offset) & 0x3); U32 groupId = binPerm[choice][binId]; for (i = 0; i < table->chunkRuleList[chunkId].groupSize[groupId]; ++i) if (table->chunkRuleList[chunkId].groupRuleList[groupId][i].ip == key) { table->chunkRuleList[chunkId].groupRuleList[groupId][i].Id = value; break; } int ret = SearchHash(table, table->chunkRuleList[chunkId].groupSize[groupId], table->chunkRuleList[chunkId].groupRuleList[groupId])} GPT Update void NxtHopTableLookupMulti(tNxtHopTable *table, int numKeys, U32 *keyList, U8 *valueList) { … for (i = 0; i < numKeys; i++) { U32 h = CheapHash(keyList[i]); chunkIdList[i] = h % table->numChunks; binIdList[i] = (h / table->numChunks) % NXTHOPTABLE_CHUNK_NUM_BINS; rte_prefetch0(&table->chunks[chunkIdList[i]].choiceList[binIdList[i]); } for (i = 0; i < numKeys; i++) { choiceList[i] = GetChoice(table, chunkIdList[i], binIdList[i]); groupIdList[i] = BinToGroup(binIdList[i], choiceList[i]); rte_prefetch0(&table->chunks[chunkIdList[i]].groups[groupIdList[i]]); } for (i = 0; i < numKeys; i++) { hashValA[i] = NXTHOPTABLE_HASHFUNCA(keyList[i]); hashValB[i] = NXTHOPTABLE_HASHFUNCB(keyList[i]); valueList[i] = 0; for (bit = 0; bit < NXTHOPTABLE_VALUE_SIZE_MAX; bit++) { U16 hashFuncIdx; U16 lookupTbl; GetGroup( &table->chunks[chunkIdList[i]].groups[groupIdList[i]], NXTHOPTABLE_VALUE_SIZE_MAX - bit - 1, &hashFuncIdx, &lookupTbl) valueList[i] = LookupBit(table, hashFuncIdx, lookupTbl); } Update  finding a new hash function that satisfies the new value GPT Lookup Lookup  hash computation knowing the group hash index Find group_id using cheap hash Using hash index do lookup #moveforward
  • 15. ©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted, confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization. S2RF Performance Quantification • SNB @ 2.2Ghz, 20 MB LLC • 4-Node Cluster, 16*10 Gbps Niantic vector driver/DPDK • IPv4 random traffic, i.e. 1/N on local node, ¾ on remote node Single Core Table Insertions per second Scales Linearly with number of cores ~35% Better Throughput 0 1 2 3 4 5 6 7 8 9 0% 10% 20% 30% 40% 50% 60% 70% Inserts/Second Millions Table Load Global Table Insert Performance 32M Sequential 8M Sequential 2M Sequential Full Duplication #moveforward
  • 16. ©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted, confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization. Best Practices for Efficient Packet processing Avoiding serialization in the packet-processing pipeline, including serializing events such as locks, special instructions such as CLFLUSH, and large critical sections Accessing data from the cache where possible by making use of prefetch instructions and observing best practices in design of the software pipeline Designing data structures to be cache-aligned and avoiding occurrences of data being spread across two cache lines, partial writes, and contention between write and read operations Maintaining affinity between software threads and hardware threads, as well as isolating software threads from one another with regard to scheduling relative to hardware threads Breaking down user-plane functionality so that it can be implemented with a combination of RTC (Run to Completion) and pipeline methods Use of pre-tuned open source optimized software components like DPDK #moveforward
  • 17. ©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted, confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization. Summary Lack of Service Agility Rapid and just-in- time service scaling Rigid network build models • Scalable Switch Route Forward (S2RF) helps address some of the scaling challenges in carrier networks  Scales linearly the number of ports and flow classification size with the number of nodes in a cluster  Uses DPDK and IA optimizations for efficient packet processing and I/O performance #moveforward
  • 18. ©2015 Sprint. This information is subject to Sprint policies regarding use and is the property of Sprint and/or its relevant affiliates and may contain restricted, confidential or privileged materials intended for the sole use of the intended recipient. Any review, use, distribution or disclosure is prohibited without authorization. Questions #moveforward