Influence of the direct message search mechanism based on the TCP protocols on the exchange process
DOI:
https://doi.org/10.15587/1729-4061.2019.167995Keywords:
ТСР sockets, message search, interface expansion, performance.Abstract
The direct search mechanism is implemented with the expansion of the traditional socket TCP interface for receiving messages while bypassing the traditional order of the established queue. This mechanism can be used for high-performance and clustered computer systems in order to intensify data exchange and continuous support of a maximum load on computing machines. The interface for direct message search is implemented on the base of the Linux kernel. The experimental test results are obtained by using a set of simple microbenchmarks. During the test, the sender sends the required number of fixed-size messages via an established connection, and the receiver skips unexpected messages and reads the expected one into the user's space. The approach to finding the expected messages is realized with multiple searches for a case where the socket application treats the TCP socket as a list of messages with the ability to receive and delete the data not only from the buffer top but from any place in it. All expected messages are recognized and processed by the developed seek_recv() call. Each test contains ~80 repetitions, which include such operations as socket opening, sending 800–1000 messages according to the acceptance politics, and socket closure. The system only uses one active socket at the same time.
The received results confirm a noticeable decrease in message processing CPU time by 36–40 % and overall productivity growth. However, when the volume of messages is approaching 1000 bytes, i.e. close to the typical size of the TCP packet useful load, there is a productivity decrease in the message exchange process.
References
- Beynon, M. D., Kurc, T., Catalyurek, U., Chang, C., Sussman, A., Saltz, J. (2001). Distributed processing of very large datasets with DataCutter. Parallel Computing, 27 (11), 1457–1578. doi: https://doi.org/10.1016/s0167-8191(01)00099-0
- Carns, P., Lang, S., Ross, R., Vilayannur, M., Kunkel, J., Ludwig, T. (2009). Small-file access in parallel file systems. 2009 IEEE International Symposium on Parallel & Distributed Processing. doi: https://doi.org/10.1109/ipdps.2009.5161029
- Pasquier, T. F. J.-M., Singh, J., Bacon, J., Hermant, O. (2015). Managing Big Data with Information Flow Control. Available at: http://tfjmp.org/files/publications/cloud-2015.pdf
- Melnyk, V. M., Bahniuk, N. V., Melnyk, K. V. (2015). Influence of high performance sockets on data processing intensity. ScienceRise, 6 (2 (11)), 38–48. doi: https://doi.org/10.15587/2313-8416.2015.44380
- Infiniband Trade Association. Available at: http://www.infinibandta.org
- Hoefler, T., Mehlan, T., Lumsdaine, A., Rehm, W. (2007). Netgauge: A Network Performance Measurement Framework. High Performance Computing and Communications, 659–671. doi: https://doi.org/10.1007/978-3-540-75444-2_62
- Majumder, S., Rixner, S., Pai, V. S. (2010). An Event-driven Architecture for MPI Libraries. In Proceedings of the 2010 Los Alamos Computer Science Institute Symposium. Available at: https://vjpai.github.io/Publications/majumder-lacsi04.pdf
- Gilfeather, P., Maccab, A. B. An Extensible Message-Oriented Offload Model for High-Performance Applications. Los Alamos Computer Science Institute SC R71700H29200001. Available at: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.217.1085&rep=rep1&type=pdf
- Veeraraghavan, M., Jukan, A. (2010). A hybrid networking architecture. University of Virginia. Available at: https://pdfs.semanticscholar.org/62bb/a7fcb0e97adbf623a569c160d20843022b08.pdf
- Aydin, S., Bay, O. F. (2009). Building a high performance computing clusters to use in computing course applications. Procedia – Social and Behavioral Sciences, 1 (1), 2396–2401. doi: https://doi.org/10.1016/j.sbspro.2009.01.420
- Pratt, I., Fraser, K. (2001). Arsenic: a user-accessible gigabit Ethernet interface. Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213). doi: https://doi.org/10.1109/infcom.2001.916688
- Fenech, K. (2005). Low-latency inter-thread communication over Gigabit Ethernet. University of Malta, 180. Available at: http://citeseerx.ist.psu.edu/viewdoc/download?DOI=10.1.1.192.2018&rep=rep1&type=pdf
- Ethernet Networking Interface (2019). Techopedia. Available at: https://www.techopedia.com/definition/24959/ethernet-networking-interface
- Stewart, R., Xie, Q., Morneault, K., Sharp, C., Schwarzbauer, H., Taylor, T. et. al. (2000). Stream Control Transmission Protocol. doi: https://doi.org/10.17487/rfc2960
- Stewart, R., Xie, Q., Yarroll, L., Wood, J., Poon, K., Tuexen, M. (2005). Sockets API Extensions for Stream Control Transmission Protocol (SCTP). IETF Internet Draft. Available at: https://tools.ietf.org/pdf/draft-ietf-tsvwg-sctpsocket-06.pdf
- Melnyk, V. (2017). Modeling of the messages search mechanism in the messaging process on basis of TCP protocols. Naukovyi zhurnal "Kompiuterno-intehrovani tekhnolohiyi: osvita, nauka, vyrobnytstvo", 28-29, 20–24.
- Liyanage, M., Ylianttila, M., Gurtov, A. (2017). Fast Transmission Mechanism for Secure VPLS Architectures. 2017 IEEE International Conference on Computer and Information Technology (CIT). doi: https://doi.org/10.1109/cit.2017.46
- Bethune, I., Bull, J. M., Dingle, N. J., Higham, N. J. (2014). Performance analysis of asynchronous Jacobi’s method implemented in MPI, SHMEM and OpenMP. The International Journal of High Performance Computing Applications, 28 (1), 97–111. doi: https://doi.org/10.1177/1094342013493123
- Melnyk, V., Bahnyuk, N., Melnyk, K., Zhyharevych, O., Panasyuk, N. (2017). Implementation of the simplified communication mechanism in the cloud of high performance computations. Eastern-European Journal of Enterprise Technologies, 2 (2 (86)), 24–32. doi: https://doi.org/10.15587/1729-4061.2017.98896
- Obzor nekotoryh paketov izmereniya proizvoditel'nosti klasternyh sistem. Available at: https://www.ixbt.com/cpu/cluster-benchtheory.shtml
- Computer Network & TCP Congestion Control. Available at: https://www.geeksforgeeks.org/computer-network-tcp-congestion-control/
- Steps Needed for Successful Benchmarking, using the COMPARE Method. Available at: https://www.compare2compete.com/en/blog/7-steps-needed-for-successful-benchmarking-using-the-compare-method/
- HTTP Definition. Available at: https://techterms.com/definition/http
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2019 Vasyl Melnyk, Kateryna Melnyk, Svitlana Lavrenchuk, Ihor Burchak, Oleksii Kaganiuk
This work is licensed under a Creative Commons Attribution 4.0 International License.
The consolidation and conditions for the transfer of copyright (identification of authorship) is carried out in the License Agreement. In particular, the authors reserve the right to the authorship of their manuscript and transfer the first publication of this work to the journal under the terms of the Creative Commons CC BY license. At the same time, they have the right to conclude on their own additional agreements concerning the non-exclusive distribution of the work in the form in which it was published by this journal, but provided that the link to the first publication of the article in this journal is preserved.
A license agreement is a document in which the author warrants that he/she owns all copyright for the work (manuscript, article, etc.).
The authors, signing the License Agreement with TECHNOLOGY CENTER PC, have all rights to the further use of their work, provided that they link to our edition in which the work was published.
According to the terms of the License Agreement, the Publisher TECHNOLOGY CENTER PC does not take away your copyrights and receives permission from the authors to use and dissemination of the publication through the world's scientific resources (own electronic resources, scientometric databases, repositories, libraries, etc.).
In the absence of a signed License Agreement or in the absence of this agreement of identifiers allowing to identify the identity of the author, the editors have no right to work with the manuscript.
It is important to remember that there is another type of agreement between authors and publishers – when copyright is transferred from the authors to the publisher. In this case, the authors lose ownership of their work and may not use it in any way.