摘要:
A system includes a host and a network controller coupled to the host by a bus. The system includes logic to classify Transmission Control Protocol/Internet Protocol (TCP/IP) receive packets based on the network source, network destination, port source, and port destination of the respective receive packets; and cause queuing of the receive packets in a one of multiple receive queues based on the classifying such that receive packets having the same network source, network destination, port source, and port destination are to be queued to the same one of the multiple queues for processing.
摘要:
A method and system for managing a power state of a processor are described herein. The method includes receiving, at the processor, a signal indicating that an interrupt is to be sent to the processor. The method also includes transitioning the processor from the deep idle state to the shallow idle state in response to receiving the signal and transitioning the processor from the shallow idle state to an active state in response to receiving the interrupt.
摘要:
Methods and systems may provide for determining a plurality of buffer-related settings for a corresponding plurality of idle states and outputting the plurality of buffer-related settings to a device on a platform. The device may determine an observed bandwidth for a channel associated with a receive buffer and identify a selection of a buffer-related setting from the plurality of buffer-related settings based at least in part on the observed bandwidth. In one example, each buffer-related setting includes a latency tolerance and a corresponding idle duration.
摘要:
A technique to process interrupts on a virtualized platform. A plurality of virtual machines (VMs) runs on the virtualized platform having at least a processor. The VMs include a power VM. A VM scheduler schedules the VMs for execution on the virtualized platform according a scheduling policy. A virtualized interrupt mask controller controls masking an interrupt from an interrupting source according to the scheduling policy. An interrupt is masked from an interrupting source according to the scheduling policy for at least one of the VMs; and the at least one of the VMs is caused to get the interrupt when the at least one of the VMs is enabled according to the scheduling policy.
摘要:
Provided are a method, system, and article of manufacture for managing network throughput. An application identifies at least one network connection of a plurality of network connections, wherein packets arriving via the one network connection require greater resources at a computational device relative to resources required by other network connections. The application determines if resources required at the computational device by the plurality of network connections exceed a threshold and eliminates the at least one network connection to the computational device.
摘要:
An embodiment may include circuitry to determine at a first hierarchy level of a compute hierarchy, whether to consolidate, at least in part, respective workloads of respective compute entities at the first hierarchy level. The respective workloads may involve one or more respective processes of the respective compute entities. The circuitry may determine whether to consolidate, at least in part, the respective workloads based at least in part upon whether at least one migration condition involving at least one of the one or more respective processes is satisfied. After determining whether to consolidate, at least in part, the respective workloads, the circuitry may determine at a second hierarchy level of the compute hierarchy, whether to consolidate, at least in part, other respective workloads of other respective compute entities at the second hierarchy level. The second hierarchy level may be relatively lower in the compute hierarchy than the first hierarchy level.
摘要:
An embodiment of the present invention is a technique to tag network transactions. A virtual queue stores packets received from and transmitted to a network interface card (NIC). A global session manager manages packet communication with a capability operating system (COS). A global virtual machine (VM) database stores global session identifiers (SIDs) of the packets and associated metadata. The global SIDs are used by the global session manager to track network sessions. The metadata describe characteristics of session connections. A VM tunnel connection encapsulates the packets passing to and from the COS.
摘要:
A system includes logic to store multiple descriptors, each of the multiple descriptors to be associated with a different set of multiple Transmission Control Protocol/Internet Protocol (TCP/IP) packets received by the network controller, each of the multiple descriptors including a count of the number of packets in the set of multiple packets associated with a respective descriptor. For each of the respective receive packets, the system determines a one of the multiple descriptors based on the network source address, network destination address, source port, and destination port of the respective packet; includes the respective packet in the set of multiple packets associated with the determine one of the multiple descriptors; and updates the one of the multiple descriptors by incrementing the count of the number of packets in the set of multiple packets; and provides data from within the packets to the host.
摘要:
An arrangement is provided for ingress processing optimization via traffic classification and grouping. A plurality of packets are classified according to a classification criterion. The classified packets are used to generate a packet bundle containing packets that are uniform with respect to the classification criterion. The packet bundle and its corresponding packet bundle descriptor are transferred to a host which then processes the packet bundle as a whole according to the information contained in the packet bundle descrptor.
摘要:
A method and apparatus for performing network-based control functions on an alert-enabled managed client. An alert proxy translates generic, management-based command data received from a management application/agent into specific client-based hardware control data. The alert proxy transmits a data packet containing the hardware control data over a network to an alert-enabled managed client. Alert hardware within the alert-enabled managed client parses the hardware control data into control bits and utilizes the control bits to set or clear registers within the alert-enabled managed client so as to effectuate the specified control operations. The control operations may be performed on the alert-enabled managed client independent of the operational status of the alert-enabled managed client's operating system.