SlideShare a Scribd company logo
Ajay Kharat (2019H1030011G)
BITS-Pilani
Memory and Performance Isolation for a
Multi-tenant Function-based Data-plane
Motivation
Current Implementation of software data-plane that uses virtualization eats a
lot of CPU cores.
Problem statement
A function-based dataplane, despite its advantages, faces two key challenges in
supporting multi-tenancy:
• Memory isolation
• Performance isolation
Approach And Solution
 How performance isolation is achieved through FastPass?
• Multiple process from multiple tenants comes to FastPass
• FastPass controller configures NIC to decide upon resource management and
scheduling decision.
• It uses round-robin scheduling
• In FastPass , processing cost varies depending upon nature and path taken by a
packet, thus it provides fairness to tenants
• FastPaas tracks the CPU consumption of each tenant.
• FastPass contains primitives to calculate the processing cost of individual modules
as well as for a service chain
• NIC controller able to control scheduling of NF’s hence fairness is achieved , initially
it was done by OS which was difficult to manage
Fastpass Architecture
 How Memory Protection is achieved through FastPass?
3 approaches to memory protection are as follows:
• Memory safe language: Writing modules in memory safe language like Rust
automatically manages memory but already there are NF’s written in C/C++ ,
rewriting them from scratch with Rust will takes lots of effort.
• Hardware-based memory protection(fine-grained approach): overhead of MPX
comes from loading/storing the individual bounds for every pointers in a program
• Coarse-grained hardware protection: Divides memory space into modules based on
tenancy , having 2 advantages:
• Tenants cant access each other modules and reduces the size of bound table thus
reducing lookup overhead.
Memory and Performance Isolation for a Multi-tenant Function-based Data-plane
Evaluation of the solution
• We evaluate two NFs with different processing costs per packet
1. macswap(less costly)
2. traffic policer (more costly)
• FastPaas/RW achieve a throughput of 86% for macswap and 82% for the traffic policer compared to
the unprotected module.
• FastPaas/WOnly acheives an even higher throughput of 96% and 98% of the unprotected module.
1.Macswap Preallocated pkts Policer Preallocated pkts Policer real pkts
Related Work
 SafeCode provides memory isolation using a combination of static
analysis and minimal runtime but it is unable to protect packets
declared by DPDK in our tests.
 FastPass fairly distribute CPU resources but it does not balance the
CPU usage across cores so we use FlexNIC below FastPass which
automatically compute the load balancing filters based on packet
processing graph specifications and traffic measurements.
Future Work
• The weight of a queue is statically defined based on the priority of a
tenant. Further study of scheduling strategies (including strict priority
classes) is ongoing.
• Comparing Rust with FastPaas for policer and other modules is a topic
of our ongoing work

More Related Content

PDF
Recent advancements in cache technology
PPTX
Scope of parallelism
PPTX
Warehouse scale computer
PPTX
High Performance Computer
PPTX
Dichotomy of parallel computing platforms
PPTX
Load balancing In cloud - In a semi distributed system
PPT
Parallel processing extra
PDF
An introduction to the Design of Warehouse-Scale Computers
Recent advancements in cache technology
Scope of parallelism
Warehouse scale computer
High Performance Computer
Dichotomy of parallel computing platforms
Load balancing In cloud - In a semi distributed system
Parallel processing extra
An introduction to the Design of Warehouse-Scale Computers

What's hot (20)

PPTX
Load balancing
PPTX
Introduction to parallel processing
PPT
Paralle programming 2
PPTX
Painless Cache Allocation in Cloud
PPTX
Parallel computing
PPT
Parallel processing
PPTX
parallel processing
PPTX
Webinar: Backups and Disaster Recovery
PPTX
Lecture5
PPTX
Sql disaster recovery
PPTX
CloudLightning Simulator
PPTX
network ram parallel computing
PPTX
Parallel architecture-programming
PPTX
FIne Grain Multithreading
PDF
Cluster Computing
PPTX
Lecture1
PPTX
Lecture4
PPT
Parallel architecture
PDF
Multithreaded processors ppt
PPT
Parallel processing
Load balancing
Introduction to parallel processing
Paralle programming 2
Painless Cache Allocation in Cloud
Parallel computing
Parallel processing
parallel processing
Webinar: Backups and Disaster Recovery
Lecture5
Sql disaster recovery
CloudLightning Simulator
network ram parallel computing
Parallel architecture-programming
FIne Grain Multithreading
Cluster Computing
Lecture1
Lecture4
Parallel architecture
Multithreaded processors ppt
Parallel processing
Ad

Similar to Memory and Performance Isolation for a Multi-tenant Function-based Data-plane (20)

PPTX
PPTX
Cloud infrastructure, Virtualization tec
PPTX
참여기관_발표자료-국민대학교 201301 정기회의
PDF
Technical Report NetApp Clustered Data ONTAP 8.2: An Introduction
PDF
DPDK Summit 2015 - Aspera - Charles Shiflett
PDF
Ensuring performance for real time packet processing in open stack white paper
PDF
IBM Netezza
PPT
FAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDS
PPTX
Microx - A Unix like kernel for Embedded Systems written from scratch.
PDF
Cad report
PPTX
Introduction to embedded System.pptx
PDF
Approximation techniques used for general purpose algorithms
PPTX
HPC and cloud distributed computing, as a journey
PPTX
Cassandra in Operation
PDF
Ceph Day Beijing - Ceph All-Flash Array Design Based on NUMA Architecture
PDF
Ceph Day Beijing - Ceph all-flash array design based on NUMA architecture
PPTX
CPN302 your-linux-ami-optimization-and-performance
PPTX
Webinar: OpenEBS - Still Free and now FASTEST Kubernetes storage
PDF
chap2_slidesforparallelcomputingananthgarama
PPTX
Cluster Technique used in Advanced Computer Architecture.pptx
Cloud infrastructure, Virtualization tec
참여기관_발표자료-국민대학교 201301 정기회의
Technical Report NetApp Clustered Data ONTAP 8.2: An Introduction
DPDK Summit 2015 - Aspera - Charles Shiflett
Ensuring performance for real time packet processing in open stack white paper
IBM Netezza
FAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDS
Microx - A Unix like kernel for Embedded Systems written from scratch.
Cad report
Introduction to embedded System.pptx
Approximation techniques used for general purpose algorithms
HPC and cloud distributed computing, as a journey
Cassandra in Operation
Ceph Day Beijing - Ceph All-Flash Array Design Based on NUMA Architecture
Ceph Day Beijing - Ceph all-flash array design based on NUMA architecture
CPN302 your-linux-ami-optimization-and-performance
Webinar: OpenEBS - Still Free and now FASTEST Kubernetes storage
chap2_slidesforparallelcomputingananthgarama
Cluster Technique used in Advanced Computer Architecture.pptx
Ad

More from AJAY KHARAT (12)

PPTX
Uncovering Bugs in P4 Programs with Assertion-based Verification
PPTX
SDPROBER: A SOFTWARE DEFINED PROBER FOR SDN
PPTX
Instrumenting Open vSwitch with Monitoring Capabilities: Designs and Challenges
PPTX
NS4: Enabling Programmable Data Plane Simulation
PPTX
YATES: Rapid Prototyping for Traffic Engineering Systems
PPTX
Life in the Fast Lane: A Line-Rate Linear Road
PPTX
How to implement complex policies on existing network infrastructure
PPTX
Network-Wide Heavy-Hitter Detection with Commodity Switches
PPTX
p4pktgen: Automated Test Case Generation for P4 Programs
PPTX
Mutual exclusion in distributed systems
PDF
virtual memory management in multi processor mach os
PPTX
Solutions to byzantine agreement problem
Uncovering Bugs in P4 Programs with Assertion-based Verification
SDPROBER: A SOFTWARE DEFINED PROBER FOR SDN
Instrumenting Open vSwitch with Monitoring Capabilities: Designs and Challenges
NS4: Enabling Programmable Data Plane Simulation
YATES: Rapid Prototyping for Traffic Engineering Systems
Life in the Fast Lane: A Line-Rate Linear Road
How to implement complex policies on existing network infrastructure
Network-Wide Heavy-Hitter Detection with Commodity Switches
p4pktgen: Automated Test Case Generation for P4 Programs
Mutual exclusion in distributed systems
virtual memory management in multi processor mach os
Solutions to byzantine agreement problem

Recently uploaded (20)

PDF
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PDF
medical staffing services at VALiNTRY
PPTX
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
PPTX
ai tools demonstartion for schools and inter college
PDF
Navsoft: AI-Powered Business Solutions & Custom Software Development
PDF
Upgrade and Innovation Strategies for SAP ERP Customers
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PPTX
Embracing Complexity in Serverless! GOTO Serverless Bengaluru
PDF
Designing Intelligence for the Shop Floor.pdf
PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PDF
wealthsignaloriginal-com-DS-text-... (1).pdf
PDF
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PDF
top salesforce developer skills in 2025.pdf
PPTX
Reimagine Home Health with the Power of Agentic AI​
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
Adobe Premiere Pro 2025 (v24.5.0.057) Crack free
Wondershare Filmora 15 Crack With Activation Key [2025
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
medical staffing services at VALiNTRY
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
ai tools demonstartion for schools and inter college
Navsoft: AI-Powered Business Solutions & Custom Software Development
Upgrade and Innovation Strategies for SAP ERP Customers
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
Embracing Complexity in Serverless! GOTO Serverless Bengaluru
Designing Intelligence for the Shop Floor.pdf
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
Odoo Companies in India – Driving Business Transformation.pdf
wealthsignaloriginal-com-DS-text-... (1).pdf
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
Adobe Illustrator 28.6 Crack My Vision of Vector Design
top salesforce developer skills in 2025.pdf
Reimagine Home Health with the Power of Agentic AI​
Internet Downloader Manager (IDM) Crack 6.42 Build 41

Memory and Performance Isolation for a Multi-tenant Function-based Data-plane

  • 1. Ajay Kharat (2019H1030011G) BITS-Pilani Memory and Performance Isolation for a Multi-tenant Function-based Data-plane
  • 2. Motivation Current Implementation of software data-plane that uses virtualization eats a lot of CPU cores.
  • 3. Problem statement A function-based dataplane, despite its advantages, faces two key challenges in supporting multi-tenancy: • Memory isolation • Performance isolation
  • 4. Approach And Solution  How performance isolation is achieved through FastPass? • Multiple process from multiple tenants comes to FastPass • FastPass controller configures NIC to decide upon resource management and scheduling decision. • It uses round-robin scheduling • In FastPass , processing cost varies depending upon nature and path taken by a packet, thus it provides fairness to tenants • FastPaas tracks the CPU consumption of each tenant. • FastPass contains primitives to calculate the processing cost of individual modules as well as for a service chain • NIC controller able to control scheduling of NF’s hence fairness is achieved , initially it was done by OS which was difficult to manage
  • 6.  How Memory Protection is achieved through FastPass? 3 approaches to memory protection are as follows: • Memory safe language: Writing modules in memory safe language like Rust automatically manages memory but already there are NF’s written in C/C++ , rewriting them from scratch with Rust will takes lots of effort. • Hardware-based memory protection(fine-grained approach): overhead of MPX comes from loading/storing the individual bounds for every pointers in a program • Coarse-grained hardware protection: Divides memory space into modules based on tenancy , having 2 advantages: • Tenants cant access each other modules and reduces the size of bound table thus reducing lookup overhead.
  • 8. Evaluation of the solution • We evaluate two NFs with different processing costs per packet 1. macswap(less costly) 2. traffic policer (more costly) • FastPaas/RW achieve a throughput of 86% for macswap and 82% for the traffic policer compared to the unprotected module. • FastPaas/WOnly acheives an even higher throughput of 96% and 98% of the unprotected module. 1.Macswap Preallocated pkts Policer Preallocated pkts Policer real pkts
  • 9. Related Work  SafeCode provides memory isolation using a combination of static analysis and minimal runtime but it is unable to protect packets declared by DPDK in our tests.  FastPass fairly distribute CPU resources but it does not balance the CPU usage across cores so we use FlexNIC below FastPass which automatically compute the load balancing filters based on packet processing graph specifications and traffic measurements.
  • 10. Future Work • The weight of a queue is statically defined based on the priority of a tenant. Further study of scheduling strategies (including strict priority classes) is ongoing. • Comparing Rust with FastPaas for policer and other modules is a topic of our ongoing work