Chapter 6: Transferring control
Control thy passions, lest they take vengeance on thee.
—Epictetus
Abstract
While Chapter 5 concentrated on reducing the overhead of operations that touch the data in a packet (e.g., copying, checksumming), this chapter concentrates on reducing the control overheads involved in processing a packet. As in Chapter 5, we start by examining the control overheads involved in sending or receiving a packet. We then broaden to our canonical network application, a Web server. In this edition, we have updated this chapter with solutions for controlling overheads in the use of new technologies that have emerged in the past two decades including (1) multicore CPUs; (2) hypervisors and virtual switches; (3) a kernel bypassing ...
Get Network Algorithmics, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.