Date: Sat, 1 Mar 1997 19:49:54 -0500 From: "David S. Miller" <davem@jenolan.rutgers.edu> To: bakul@chai.plexuscom.com Cc: dennis@etinc.com, dg@root.com, proff@iq.org, hackers@FreeBSD.ORG Subject: Re: optimised ip_input Message-ID: <199703020049.TAA09426@jenolan.caipgeneral> In-Reply-To: <199703012242.RAA04265@chai.plexuscom.com> (message from Bakul Shah on Sat, 01 Mar 1997 17:42:33 -0500)
next in thread | previous in thread | raw e-mail | index | archive | help
Date: Sat, 01 Mar 1997 17:42:33 -0500
From: Bakul Shah <bakul@chai.plexuscom.com>
2) Profiling the networking code in a production environment ought
to point out the `hot spots' where much of the time is spent
under various conditions. Measure various costs by changing data
structure sizes and feeding similar traffic. Find out *why* the
hot spots are the way they are; gain a deeper understanding of
the structure and behavior of the networking code.
Just a heads up, and this is from my own experience profiling this
stuff. For freely running connections (ie. application at receiving
end or sending end is continually filling a healthy pipe which is
being kept reasonably full) the kernel spends a significant portion of
time in soreceive() and sosend(). Unfortunatly, last time I checked,
those are not fun functions to hack on and optimize due to their
complexity.
---------------------------------------------////
Yow! 11.26 MB/s remote host TCP bandwidth & ////
199 usec remote TCP latency over 100Mb/s ////
ethernet. Beat that! ////
-----------------------------------------////__________ o
David S. Miller, davem@caip.rutgers.edu /_____________/ / // /_/ ><
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199703020049.TAA09426>
