|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] RE: A question on Zero CopyY.P. In Julian's defense, I suspect most targets will be dedicated appliances where memory handling is specialized to the point of not being influenced greatly by discontinuities created in blind placement of segments. I doubt there is anything within the protocol that would allow a target advanced knowledge of segment content. Otherwise, you are right about needing content directed zero copy witin the target as well. Doug > > From: owner-ips@ece.cmu.edu [mailto:owner-ips@ece.cmu.edu]On Behalf Of > > julian_satran@il.ibm.com > > Sent: Tuesday, December 05, 2000 8:58 PM > > > > Randall, > > > > What you want depends on what end and what application you are > looking at. > > A target (in most cases) can live with A while a complex > initiator (host, > > not an appliance) will want B. > > I question if target can live with A alone. While it is true for > unsolicited messages, for solicited messages resulting from resource > management, the target uses R2T and "target task tag" to direct incoming > messages to desired buffers. > > Y.P. Cheng > >
Home Last updated: Tue Sep 04 01:06:09 2001 6315 messages in chronological order |