Architectural considerations for a new generation of protocols
SIGCOMM '90 Proceedings of the ACM symposium on Communications architectures & protocols
The importance of non-data touching processing overheads in TCP/IP
SIGCOMM '93 Conference proceedings on Communications architectures, protocols and applications
IEEE/ACM Transactions on Networking (TON)
Implementing network protocols at user level
IEEE/ACM Transactions on Networking (TON)
Software support for outboard buffering and checksumming
SIGCOMM '95 Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
Protocol implementation using integrated layer processing
SIGCOMM '95 Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
The impact of a zero-scan Internet checksumming mechanism
ACM SIGCOMM Computer Communication Review
Application performance and flexibility on exokernel systems
Proceedings of the sixteenth ACM symposium on Operating systems principles
Performance of checksums and CRC's over real data
IEEE/ACM Transactions on Networking (TON)
IO-lite: a unified I/O buffering and caching system
OSDI '99 Proceedings of the third symposium on Operating systems design and implementation
When the CRC and TCP checksum disagree
Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
Trapeze/IP: TCP/IP at near-gigabit speeds
ATEC '99 Proceedings of the annual conference on USENIX Annual Technical Conference
Hi-index | 0.00 |
Transport protocol checksum computation is one of the main processing overheads in a TCP/IP stack. A number of techniques have been proposed to alleviate the cost of checksum computation. Most of them have concentrated on optimizing the checksum where it is implemented as part of the kernel. We argue that for performance it is better if application provides the checksum to the kernel rather than the kernel computing it. We describe the system call and its implementation using which an application can provide checksum to the kernel. We discuss various approaches that applications can use to come up with the checksums for their data buffers.