|FQTSS Overview||William Gravelle||
FQTSS is defined in the IEEE standard 801.Q Clause 34; Forwarding and Queuing Enhancements for Time-Sensitive Streams. The term FQTSS is used to describe a set of tools which are used to forward and queue time-sensitive streams. Since AVB frames cannot be dropped, there must be a mechanism in place to forward AVB frames quickly and efficiently. This is where FQTSS (aka Qav) comes into play. This paper goes into the components that make up FQTSS.
|White Papers||July 16, 2013|
|Mellanox IB DDR Auto-negotiation Specification 1.0||
The specification for the Mellanox DDR Proprietary Auto-negotiation protocol.
|White Papers||July 11, 2013|
|Neighbor Discovery State Machine for the Reachability State||Andrew Gadzik, Thomas Peterson, Chris Cavanaugh||
This state machine flow chart covers a summary of the rules specified in RFC 4861 Sections 7.2 and 7.3.
|Tutorials||July 2, 2013|
|Testing TRILL (TRansparent Interconnect for Lots of Links)||Christina Dube||
The University of New Hampshire InterOperability Laboratory (UNH-IOL) hosted its second TRansparent Interconnect of Lots of Links (TRILL) Interoperability Test Event the week of November 26 Ã¢Â€Â“ December 1, 2012 at its 32,000+ square-foot facility in Durham, New Hampshire. The test event brought together implementers of TRILL as well as test equipment manufacturers that support TRILL. The purpose of the test event was to gain a perspective on the current status of TRILL implementation and interoperability. Participants included Hewlett-Packard Networking, Extreme Networks, Ixia and Spirent Communications.
|White Papers||February 18, 2013|
|A Performance Study to Guide RDMA Programming Decisions||Patrick MacArthur and Dr. Robert Russell||
This paper describes a performance study of Remote Direct Memory Access (RDMA) programming techniques. Its goal is to use these results as a guide for making "best practice" RDMA programming decisions. Infiniband RDMA is widely used in scientific high performance computing (HPC) clusters as a low-latency, high-bandwidth, reliable interconnect accessed via MPI. Recently it is gaining adherents outside scientific HPC as high-speed clusters appear in other application areas for which MPI is not suitable. RDMA enables user applications to move data
|White Papers||January 18, 2013|
|UNH-IOL, OPEN Alliance target 100 Mbps Ethernet for cars||
The University of New Hampshire InterOperability Laboratory (UNH-IOL) in partnership with the OPEN Alliance Special Interest Group (SIG) on Monday unveiled the Automotive Ethernet Consortium.
This consortium is charged with testing and promoting BroadR-Reach, a 100 Mbps Ethernet connectivity specification for the automotive industry. UNH-IOL will be the first lab to conduct tests on the emerging standard.
|External Links||January 2, 2013|
The OPEN (One-Pair Ether-Net) Alliance is designed to encourage wide scale adoption of Ethernet-based, single pair unshielded networks as the standard in automotive applications. The jointly developed OPEN Alliance SIG (Special Interest Group) will address industry requirements for improving in-vehicle safety, comfort, and infotainment, while significantly reducing network complexity and cabling costs.
|External Links||January 2, 2013|
|10 Gigabit Ethernet Clause 50 Tutorial||Andy Baldman||
|Tutorials||December 13, 2012|
|A General-Purpose API for iWARP and InfiniBand||Dr. Robert Russell||
Remote Direct Memory Access (RDMA) allows data to be transferred over a network directly from the memory of one computer to the memory of another computer without CPU intervention. There are two major types of RDMA hardware on the market today: InfiniBand, and RDMA over IP, also known as iWARP. This hardware is supported by open software that was developed by the OpenFabrics Alliance (OFA) and that is known as
The UNH-EXS interface is a multi-threaded implementation of the ES-API plus additional extensions, which enables programmers to utilize RDMA hardware via the OFED stack in a convenient, relatively familiar manner. The UNH-EXS interface is implemented entirely in user space on the Linux operating system. This provides easy porting, modification and adoption of UNH-EXS, since it requires no changes to existing Linux kernels. We present results on the performance of some benchmark applications using the UNH-EXS interface on both iWARP and InfiniBand hardware.
|White Papers||December 13, 2012|
|The Extended Sockets Interface for Accessing RDMA Hardware||Dr. Robert Russell||
The Extended Sockets API (ES-API) is a specification published by the OpenGroup that defines extensions to the
|White Papers||December 7, 2012|
|Fairness in a data center||Mikkel Hagen||
Existing data centers utilize several networking technologies in order to handle the performance requirements of different workloads. Maintaining diverse networking technologies increases complexity and is not cost effective. This results in the current trend to converge all traffic into a single networking fabric. Ethernet is both cost-effective and ubiquitous, and as such it has been chosen as the technology of choice for the converged fabric. However, traditional Ethernet does not satisfy the needs of all traffic workloads, for the most part, due to its lossy nature and, therefore, has to be enhanced to allow for full convergence. The resulting technology, Data Center Bridging (DCB), is a new set of standards defined by the IEEE to make Ethernet lossless even in the presence of congestion. As with any new networking technology, it is critical to analyze how the different protocols within DCB interact with each other as well as how each protocol interacts with existing technologies in other layers of the protocol stack.
This dissertation presents two novel schemes that address critical issues in DCB networks: fairness with respect to packet lengths and fairness with respect to flow control and bandwidth utilization. The Deficit Round Robin with Adaptive Weight Control (DRR-AWC) algorithm actively monitors the incoming streams and adjusts the scheduling weights of the outbound port. The algorithm was implemented on a real DCB switch and shown to increase fairness for traffic consisting of mixed-length packets. Targeted Priority-based Flow Control (TPFC) provides a hop-by-hop flow control mechanism that restricts the flow of aggressor streams while allowing victim streams to continue unimpeded. Two variants of the targeting mechanism within TPFC are presented and their performance evaluated through simulation.
|Theses||December 7, 2012|
|Space-Time Diagrams (PPT)||Jeff Laird||
used at UNH-IOL for training and discussion
|White Papers||December 6, 2012|
|Advantages and Testing Considerations of a Converged DCB Network Presentation||Peter J. Scruton||
Peter participated in the 2012 Ethernet Technology Summit in San Jose, California as a panelist in one of the Sessions. The Session focus was on the Continuing Role of Ethernet in Storage.
|External Links||December 4, 2012|
|Comparison of DCBX Versions||Daniel Shea||
A comparison of the baseline versus the IEEE standard versions of Data Center Bridging Capabilities Exchange.
|Tutorials||September 11, 2012|
|Testing Home Routers for World IPv6 Launch||Timothy Winters||
The University of New Hampshire InterOperability Laboratory (UNH-IOL) hosted its fourth IPv6 Customer Edge (CE) Router Interoperability Test Event the week of April 16 - April 20, 2012 at its 32,000+ square-foot facility in Durham, New Hampshire. The test event brought together both users and suppliers of CE routers, also known as home router equipment. The purpose of the test event was to gain a perspective on the current status of IPv6 interoperability against the Internet Engineering Task Force (IETF) Basic Requirements for IPv6 Customer Edge Routers and support the Internet Society (ISOC) World IPv6 Launch. The eight participating vendor companies tested a total of ten distinct home router implementations throughout the week using publicly routable IPv6 addresses. Participants included Broadcom, CHT-TL IPv6 Testing Lab, D-Link, NDM Systems, Motorola Mobility LLC, Netgear, Time Warner and ZyXEL.
Observations discussed in this paper include:
|White Papers||August 31, 2012|
|Demystifying the IPsec Puzzle||Sheila Frankel||
Now that the Internet has blossomed into the "Information Superhighway" with its traffic and drivers becoming increasingly diverse, security has emerged as a primary concern. This book offers the reader a global, integrated approach to providing internet security at the network layer. The author gives a detailed presentation of the revolutionary IPsec technology used today to create Virtual Private Networks and, in the near future, to protect the infrastructure of the Internet itself. The book addresses IPsec's major aspects and components to help the reader evaluate and compare features of different implementations. It provides a detailed understanding of this cutting-edge technology from the inside, which enables the reader to more effectively troubleshoot problems with specific products. Based on standards documents, discussion list archives, and practitioners' lore, this resource collects all the current knowledge of IPsec and describes it in a literate, clear manner.
|Recommended Textbooks||July 10, 2012|
|IPv6 Essentials||Silvia Hagen||
IPv6 Essentials, Second Edition provides a succinct, in-depth tour of all the new features and functions in IPv6. It guides you through everything you need to know to get started, including how to configure IPv6 on hosts and routers and which applications currently support IPv6. The new IPv6 protocols offers extended address space, scalability, improved support for security, real-time traffic support, and auto-configuration so that even a novice user can connect a machine to the Internet. Aimed at system and network administrators, engineers, network designers, and IT managers, this book will help you understand, plan for, design, and integrate IPv6 into your current IPv4 infrastructure.
|Recommended Textbooks||July 10, 2012|
|10BASE-T Medium Attachment Unit||
An overview of the 10BASE-T Medium Attachment Unit.
|Tutorials||July 5, 2012|
|40 Gigabit Ethernet and 100 Gigabit Ethernet Technology Overview||John Dâ€™Ambrosia, Force10 Networks, David Law, 3COM, and Mark Nowell, Cisco Systems||
Overview of 40 and 100 Gigabit Ethernet Technology; provided by the Ethernet Alliance, June 2010
|External Links||July 5, 2012|
|SIP Trunk Interworking: How the SIP Forum is Improving Interoperability between SIP-PBXs and Service Providers||James Swan (UNH-IOL), John Berg (CableLabs), David Hancock (CableLabs)||
Interworking issues continue to be an obstacle to achieving scale on SIP Trunk deployments. Due to variances in the SIP profiles supported by different SIP Trunk products, Service Providers and vendors are forced to spend significant time and people resources to identify and resolve interworking issues for each new SIP-PBX/SSP-network combination. The SIP Forum has been actively working on multiple fronts to resolve this interworking roadblock, and to move the rollout of SIP Trunking service toward more of a plug-and-play deployment model.
This session provides a status update on two important SIP Forum initiatives in this area:
1. The SIPconnect 1.1 Recommendation: This recommendation defines a SIP profile for the SIP Trunk interface between a SIP-PBX and Service Provider network. It defines procedures to resolve common interworking issues at the SIP Trunk interface for capabilities such as security, PBX registration, and call features.
2. The SIPconnect 1.1 Interop and Compliance Program: The focus of this program is to encourage the adoption of SIPconnect 1.1 through a series on interop events, and ultimately to develop a rigorous test-platform-based compliance program that will enable vendors to indicate product compliance with SIPconnect 1.1.
|External Links||July 3, 2012|
|Proceedings of the 5th Annual Linux Showcase & Conference||Ashish Palekar, Narendran Ganapathy, Anshul Chadda, Robert D. Russell||
Design And Implementation Of A Linux SCSI Target For Storage Area Networks.
|White Papers||June 29, 2012|
A brief list of acronyms used in the Ethernet, Fast Ethernet, Gigabit Ethernet, 10Gigabit Ethernet and Power over Ethernet consortia.
|Tutorials||June 29, 2012|
|Implementation and Comparison of iSCSI Over RDMA||Ethan Burns||
iSCSI is an emerging storage network technology that allows for block-level access to disk drives over a computer network. Since iSCSI runs over the very ubiquitous TCP/IP protocol it has many advantages over its more proprietary alternatives. Due to the recent movement toward 10 gigabit Ethernet, storage vendors are interested to see how this large increase in network bandwidth could benefit the iSCSI protocol.
In order to make full use of the bandwidth provided by a 10 gigabit Ethernet link, specialized Remote Direct Memory Access hardware is being developed to offload processing and reduce the data-copy-overhead found in a standard TCP/IP network stack. This thesis focuses on the development of an iSCSI implementation that is capable of supporting this new hardware and the evaluation of its performance.
This thesis depicts the approach used to implement the iSCSI Extensions for Remote Direct Memory Access (iSER) with the UNH iSCSI reference implementation. This approach involves a three step process: moving UNH-iSCSI from the Linux kernel to the Linux user-space, adding support for the iSER extensions to our user-space iSCSI and finally moving everything back into the Linux kernel. In addition to a description of the implementation, results are given that demonstrate the performance of the completed iSER-assisted iSCSI implementation.
|Theses||June 29, 2012|
|BER Testing: How Many Bits Are Enough?||Andy Baldman||
The purpose of this article is to discuss the concept of Bit Error Ratio testing, and will explain, using a minimum amount of math, the answer to the fairly common question: "How many bits do I need to send in order to verify that a devices exceeds a given BER?"
|Theses||June 29, 2012|
|Technical Report - TR0101||Ashish Palekar||
Design and Implementation of a SCSI Target for Storage Area Networks.
|Theses||June 29, 2012|