Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 1 Mar 1997 19:49:54 -0500
From:      "David S. Miller" <davem@jenolan.rutgers.edu>
To:        bakul@chai.plexuscom.com
Cc:        dennis@etinc.com, dg@root.com, proff@iq.org, hackers@FreeBSD.ORG
Subject:   Re: optimised ip_input
Message-ID:  <199703020049.TAA09426@jenolan.caipgeneral>
In-Reply-To: <199703012242.RAA04265@chai.plexuscom.com> (message from Bakul Shah on Sat, 01 Mar 1997 17:42:33 -0500)

next in thread | previous in thread | raw e-mail | index | archive | help
   Date: Sat, 01 Mar 1997 17:42:33 -0500
   From: Bakul Shah <bakul@chai.plexuscom.com>

   2) Profiling the networking code in a production environment ought
      to point out the `hot spots' where much of the time is spent
      under various conditions.  Measure various costs by changing data
      structure sizes and feeding similar traffic.  Find out *why* the
      hot spots are the way they are; gain a deeper understanding of
      the structure and behavior of the networking code.

Just a heads up, and this is from my own experience profiling this
stuff.  For freely running connections (ie. application at receiving
end or sending end is continually filling a healthy pipe which is
being kept reasonably full) the kernel spends a significant portion of
time in soreceive() and sosend().  Unfortunatly, last time I checked,
those are not fun functions to hack on and optimize due to their
complexity.

---------------------------------------------////
Yow! 11.26 MB/s remote host TCP bandwidth & ////
199 usec remote TCP latency over 100Mb/s   ////
ethernet.  Beat that!                     ////
-----------------------------------------////__________  o
David S. Miller, davem@caip.rutgers.edu /_____________/ / // /_/ ><



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199703020049.TAA09426>