Architectural considerations for a new generation of protocols
SIGCOMM '90 Proceedings of the ACM symposium on Communications architectures & protocols
Multiplexing issues in communication system design
SIGCOMM '90 Proceedings of the ACM symposium on Communications architectures & protocols
UNIX password security—ten years later
CRYPTO '89 Proceedings on Advances in cryptology
Fbufs: a high-bandwidth cross-domain transfer facility
SOSP '93 Proceedings of the fourteenth ACM symposium on Operating systems principles
Protocol service decomposition for high-performance networking
SOSP '93 Proceedings of the fourteenth ACM symposium on Operating systems principles
IEEE/ACM Transactions on Networking (TON)
Implementing network protocols at user level
IEEE/ACM Transactions on Networking (TON)
Increasing network throughput by integrating protocol layers
IEEE/ACM Transactions on Networking (TON)
Reducing Protocol Ordering Constraints to Improve Performance
Proceedings of the IFIP WG6.1/WG6.4 Third International Workshop on Protocols for High-Speed Networks III
SAFER K-64: A Byte-Oriented Block-Ciphering Algorithm
Fast Software Encryption, Cambridge Security Workshop
U-Net: a user-level network interface for parallel and distributed computing
SOSP '95 Proceedings of the fifteenth ACM symposium on Operating systems principles
Trading packet headers for packet processing
IEEE/ACM Transactions on Networking (TON)
ASHs: Application-specific handlers for high-performance messaging
Conference proceedings on Applications, technologies, architectures, and protocols for computer communications
Measuring and Optimizing CORBA Latency and Scalability Over High-Speed Networks
IEEE Transactions on Computers
Using metalevel techniques in a flexible toolkit for CSCW applications
ACM Transactions on Computer-Human Interaction (TOCHI)
Migrating sockets—end system support for networking with quality of service guarantees
IEEE/ACM Transactions on Networking (TON)
Building reliable, high-performance communication systems from components
Proceedings of the seventeenth ACM symposium on Operating systems principles
The transport layer: tutorial and survey
ACM Computing Surveys (CSUR)
An implementation and analysis of the virtual interface architecture
SC '98 Proceedings of the 1998 ACM/IEEE conference on Supercomputing
Queue pair IP: a hybrid architecture for system area networks
ISCA '02 Proceedings of the 29th annual international symposium on Computer architecture
Evaluation of Well-Known Protocol Implementation Techniques for Application in Wireless Networks
The Journal of Supercomputing
A Framework for High Quality/Low Cost Conferencing Systems
IDMS '99 Proceedings of the 6th International Workshop on Interactive Distributed Multimedia Systems and Telecommunication Services
ALFred, a protocol compiler for the automated implementation of distributed applications
HPDC '96 Proceedings of the 5th IEEE International Symposium on High Performance Distributed Computing
Application provided checksums
ICCC '02 Proceedings of the 15th international conference on Computer communication
Experiences in Design and Implementation of a High Performance Transport Protocol
Proceedings of the 2004 ACM/IEEE conference on Supercomputing
An aspect-oriented approach to bypassing middleware layers
Proceedings of the 6th international conference on Aspect-oriented software development
Multimedia data transmission and control using active networks
Computer Communications
Improving the efficiency of automated protocol implementations using a configurable FDT compiler
Computer Communications
Hi-index | 0.00 |
Integrated Layer Processing (ILP) is an implementation concept which "permit[s] the implementor the option of performing all the [data] manipulation steps in one or two integrated processing loops" [1]. To estimate the achievable benefits of ILP a file transfer application with an encryption function on top of a user-level TCP has been implemented and the performance of the application in terms of throughput and packet processing times has been measured. The results show that it is possible to obtain performance benefits by integrating marshalling, encryption and TCP checksum calculation. They also show that the benefits are smaller than in simple experiments, where ILP effects have not been evaluated in a complete protocol environment. Simulations of memory access and cache hit rate show that the main benefit of ILP is reduced memory accesses rather than an improved cache hit rate. The results further show that data manipulation characteristics may significantly influence the cache behavior and the achievable performance gain of ILP.