Existing designs for RDMA-based syste Commodity RNIC offloads
5
Alternative Design: Exploit RNIC Processing PL
6
Alternative Design: Exploit RNIC Processing Power
7
Conditional Branching - is it possible?
8
Branching with Self-Modifying Code
9
What about loops?
10
RedN Framework - Overview
11
Evaluation
12
Use case: Memcached Lookups
13
Results: Memcached get latency
14
Results: Memcached get contention
15
Conclusion
Description:
Explore the groundbreaking discovery of Remote Direct Memory Access (RDMA) Turing completeness in this 18-minute conference talk from NSDI '22. Dive into RedN, a novel approach for implementing complex RDMA offloads without hardware modifications, using self-modifying RDMA chains. Learn how this technique lifts the existing RDMA verbs interface to a Turing complete set of programming abstractions, enabling offload of complex tasks like key lookups in distributed systems. Discover the potential performance improvements, including reduced latency for key-value get operations, enhanced performance isolation, and failure resiliency. Gain insights into the evaluation of RedN, its application in Memcached lookups, and the significant latency reductions achieved in both normal and contentious scenarios.
RDMA Is Turing Complete, We Just Did Not Know It Yet