SlideShare uma empresa Scribd logo
1 de 15
MPA update (-00) ( Marker PDU Aligned Framing for TCP) draft-ietf-rddp-mpa-00 Paul R. Culley HP 11-11-2003
Draft-ietf-rddp-mpa-00 ,[object Object],[object Object],[object Object]
Changes ,[object Object],[object Object],[object Object],[object Object]
Issues ,[object Object],[object Object],[object Object],[object Object]
Issues ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Issues ,[object Object],[object Object],[object Object]
Minor Issues ,[object Object],[object Object],[object Object],[object Object],[object Object]
IWarp Startup sequence* Initiator ULP says “Are you OK with going to iWARP?” in streaming mode This message is optional! ULP gets message; enables MPA in “Responder” mode and sends optional last streaming  “Yes, I'm in iWARP now”, message. MPA waits for incoming  <MPA Request Frame> ULP gets message; enables MPA in “Initiator” mode. MPA sends “MPA Request Frame” and waits for the “MPA Reply Frame” Responder MPA gets MPA Reply Frame, Consumer binds MPA to DDP, MPA and DDP go into full operation. First iWARP message sent by RNIC (When WQE is posted) MPA gets MPA Request Frame, Consumer binds MPA to DDP, MPA sends MPA Reply Frame, FPDU decoding enabled. MPA gets first FPDU; Goes into Full iWARP mode. First iWARP message sent by RNIC (When WQE is posted) * No private data interactions shown
IWarp Startup sequence with TCP MPA gets MPA Reply Frame, passes “private data” to consumer, Consumer binds MPA to DDP, MPA and DDP go into full operation. First iWARP message sent by RNIC (When WQE is posted) Initiator TCP SYN sent TCP to “Established”, Consumer enables MPA in responder mode, MPA waits for incoming  <MPA Request Frame> As TCP enters “established”, Consumer enables MPA in “Initiator” mode. MPA sends “MPA Request Frame” with “private data” and waits for the “MPA Reply Frame” Responder MPA gets MPA Request Frame, passes “private data” to consumer, Consumer binds MPA to DDP, MPA sends MPA Reply Frame, FPDU decoding enabled. MPA gets first FPDU; Goes into Full iWARP mode. First iWARP message sent by RNIC (When WQE is posted) TCP gets SYN Sends SYN-Ack TCP gets SYN-Ack Sends Ack Note Note: The Ack may be in the same segment as the MPA Request Frame in some implementations!
MPA Request Frame ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Key (“MPA ID Req Frame”) 16 bytes M 1b C 1b Res(0) 6b Rev (0) 8b PD_Length 16b Private Data “PD_Length” bytes
MPA Response Frame ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Key (“MPA ID Rep Frame”) 16 bytes M 1b C 1b Res(0) 6b Rev (0) 8b PD_Length 16b Private Data “PD_Length” bytes
Faq ,[object Object],[object Object],[object Object],[object Object],[object Object]
Faq ,[object Object],[object Object]
Faq ,[object Object],[object Object],[object Object],[object Object],[object Object]
End

Mais conteúdo relacionado

Mais procurados (20)

CoAP in Reactive Blocks
CoAP in Reactive BlocksCoAP in Reactive Blocks
CoAP in Reactive Blocks
 
New Creators
New CreatorsNew Creators
New Creators
 
Wmc 023
Wmc  023Wmc  023
Wmc 023
 
Master Class : TCP/IP Mechanics from Scratch to Expert
Master Class : TCP/IP Mechanics from Scratch to ExpertMaster Class : TCP/IP Mechanics from Scratch to Expert
Master Class : TCP/IP Mechanics from Scratch to Expert
 
transport protocols
transport protocolstransport protocols
transport protocols
 
Tcp and udp.transmission control protocol.user datagram protocol
Tcp and udp.transmission control protocol.user datagram protocolTcp and udp.transmission control protocol.user datagram protocol
Tcp and udp.transmission control protocol.user datagram protocol
 
ICMP
ICMPICMP
ICMP
 
(Icmp) internet control message protocol version 4
(Icmp) internet control message protocol version 4(Icmp) internet control message protocol version 4
(Icmp) internet control message protocol version 4
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocol
 
Transaction TCP
Transaction TCPTransaction TCP
Transaction TCP
 
Icmp V4 And Icmp V6
Icmp V4 And Icmp V6Icmp V4 And Icmp V6
Icmp V4 And Icmp V6
 
Computer network by uttam
Computer network by uttamComputer network by uttam
Computer network by uttam
 
Keynote: Idiomatic RabbitMQ - Gavin M Roy
Keynote: Idiomatic RabbitMQ - Gavin M RoyKeynote: Idiomatic RabbitMQ - Gavin M Roy
Keynote: Idiomatic RabbitMQ - Gavin M Roy
 
Ctp
CtpCtp
Ctp
 
ICMP
ICMPICMP
ICMP
 
MPLS Layer 3 VPN
MPLS Layer 3 VPN MPLS Layer 3 VPN
MPLS Layer 3 VPN
 
csma ca
 csma ca csma ca
csma ca
 
RTP.ppt
RTP.pptRTP.ppt
RTP.ppt
 
Icmp
IcmpIcmp
Icmp
 
Mobile transport layer
Mobile transport layerMobile transport layer
Mobile transport layer
 

Destaque

WSA_FolderTemplate2
WSA_FolderTemplate2WSA_FolderTemplate2
WSA_FolderTemplate2Nick Preston
 
Τσικνοπέμπτη
ΤσικνοπέμπτηΤσικνοπέμπτη
Τσικνοπέμπτηinslide1
 
Επίσκεψη Ερυθρού Σταυρού
Επίσκεψη Ερυθρού ΣταυρούΕπίσκεψη Ερυθρού Σταυρού
Επίσκεψη Ερυθρού Σταυρούinslide1
 
Propagacion henry lopez
Propagacion henry lopezPropagacion henry lopez
Propagacion henry lopezelhierro1307
 
Competitive PR and Advertising Analysis
Competitive PR and Advertising AnalysisCompetitive PR and Advertising Analysis
Competitive PR and Advertising AnalysisDemand Metric
 
Product development maturity assessment
Product development maturity assessmentProduct development maturity assessment
Product development maturity assessmentDemand Metric
 
Elements of UX Design
Elements of UX DesignElements of UX Design
Elements of UX DesignOodlesstudio
 
20160823 kruk resume_ncv_sharepoint dev
20160823  kruk resume_ncv_sharepoint dev20160823  kruk resume_ncv_sharepoint dev
20160823 kruk resume_ncv_sharepoint devFrank Kruk
 
100 Guerilla marketing examples
100 Guerilla marketing examples100 Guerilla marketing examples
100 Guerilla marketing examplesEldad Sahar
 
Using competitive analysis to project your marketing budget
Using competitive analysis to project your marketing budgetUsing competitive analysis to project your marketing budget
Using competitive analysis to project your marketing budgetJeff Sauer
 

Destaque (18)

QUE ES RSS
QUE   ES  RSSQUE   ES  RSS
QUE ES RSS
 
WSA_FolderTemplate2
WSA_FolderTemplate2WSA_FolderTemplate2
WSA_FolderTemplate2
 
Transync P2 New
Transync P2 NewTransync P2 New
Transync P2 New
 
Fiera di Sant'Orso 2016
Fiera di Sant'Orso 2016Fiera di Sant'Orso 2016
Fiera di Sant'Orso 2016
 
Salvador Ferrero RESUME1
Salvador Ferrero RESUME1Salvador Ferrero RESUME1
Salvador Ferrero RESUME1
 
Τσικνοπέμπτη
ΤσικνοπέμπτηΤσικνοπέμπτη
Τσικνοπέμπτη
 
Επίσκεψη Ερυθρού Σταυρού
Επίσκεψη Ερυθρού ΣταυρούΕπίσκεψη Ερυθρού Σταυρού
Επίσκεψη Ερυθρού Σταυρού
 
Xamoute
XamouteXamoute
Xamoute
 
Propagación de las ondas
Propagación de las ondasPropagación de las ondas
Propagación de las ondas
 
Propagacion henry lopez
Propagacion henry lopezPropagacion henry lopez
Propagacion henry lopez
 
Competitive PR and Advertising Analysis
Competitive PR and Advertising AnalysisCompetitive PR and Advertising Analysis
Competitive PR and Advertising Analysis
 
Product development maturity assessment
Product development maturity assessmentProduct development maturity assessment
Product development maturity assessment
 
Elements of UX Design
Elements of UX DesignElements of UX Design
Elements of UX Design
 
20160823 kruk resume_ncv_sharepoint dev
20160823  kruk resume_ncv_sharepoint dev20160823  kruk resume_ncv_sharepoint dev
20160823 kruk resume_ncv_sharepoint dev
 
marketing management
marketing managementmarketing management
marketing management
 
100 Guerilla marketing examples
100 Guerilla marketing examples100 Guerilla marketing examples
100 Guerilla marketing examples
 
Using competitive analysis to project your marketing budget
Using competitive analysis to project your marketing budgetUsing competitive analysis to project your marketing budget
Using competitive analysis to project your marketing budget
 
Daun Muda Entry 2012
Daun Muda Entry 2012Daun Muda Entry 2012
Daun Muda Entry 2012
 

Semelhante a 香港六合彩 » SlideShare

Introduction to SCTP and it's benefits over TCP and UDP
Introduction to SCTP and it's benefits over TCP and UDPIntroduction to SCTP and it's benefits over TCP and UDP
Introduction to SCTP and it's benefits over TCP and UDPVIJAY SHARMA
 
Web and internet technology notes for BCA students
Web and internet technology notes for BCA studentsWeb and internet technology notes for BCA students
Web and internet technology notes for BCA studentsnawejakhatar10063
 
Stupid iptables tricks
Stupid iptables tricksStupid iptables tricks
Stupid iptables tricksJim MacLeod
 
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 FinalExploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Finalmasoodnt10
 
PLNOG 7: Emil Gągała, Sławomir Janukowicz - carrier grade NAT
PLNOG 7: Emil Gągała,  Sławomir Janukowicz - carrier grade NAT PLNOG 7: Emil Gągała,  Sławomir Janukowicz - carrier grade NAT
PLNOG 7: Emil Gągała, Sławomir Janukowicz - carrier grade NAT PROIDEA
 
Tcp Ip Overview
Tcp Ip OverviewTcp Ip Overview
Tcp Ip OverviewAmir Malik
 
How does ping_work_style_1_gv
How does ping_work_style_1_gvHow does ping_work_style_1_gv
How does ping_work_style_1_gvvgy_a
 
CoAP Course for m2m and Internet of Things scenarios
CoAP Course for m2m and Internet of Things scenariosCoAP Course for m2m and Internet of Things scenarios
CoAP Course for m2m and Internet of Things scenarioscarlosralli
 
UAV Data Link Design for Dependable Real-Time Communications
UAV Data Link Design for Dependable Real-Time CommunicationsUAV Data Link Design for Dependable Real-Time Communications
UAV Data Link Design for Dependable Real-Time CommunicationsGerardo Pardo-Castellote
 
Udp length 519 computer networks transport
Udp length 519 computer networks transportUdp length 519 computer networks transport
Udp length 519 computer networks transportBrand Xanh
 
Pt using packettracer
Pt using packettracerPt using packettracer
Pt using packettracerssusera4b34f
 
Tcp header/IP Header/Authentication header
Tcp header/IP Header/Authentication headerTcp header/IP Header/Authentication header
Tcp header/IP Header/Authentication headerFaizan Shaikh
 
tcpheader-151221111244.pdf
tcpheader-151221111244.pdftcpheader-151221111244.pdf
tcpheader-151221111244.pdfEnumulaBhargava1
 
Lecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignmentsLecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignmentsSerious_SamSoul
 

Semelhante a 香港六合彩 » SlideShare (20)

Introduction to SCTP and it's benefits over TCP and UDP
Introduction to SCTP and it's benefits over TCP and UDPIntroduction to SCTP and it's benefits over TCP and UDP
Introduction to SCTP and it's benefits over TCP and UDP
 
Bc0055, tcpip
Bc0055, tcpipBc0055, tcpip
Bc0055, tcpip
 
Np unit iv ii
Np unit iv iiNp unit iv ii
Np unit iv ii
 
Web and internet technology notes for BCA students
Web and internet technology notes for BCA studentsWeb and internet technology notes for BCA students
Web and internet technology notes for BCA students
 
Stupid iptables tricks
Stupid iptables tricksStupid iptables tricks
Stupid iptables tricks
 
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 FinalExploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
 
PLNOG 7: Emil Gągała, Sławomir Janukowicz - carrier grade NAT
PLNOG 7: Emil Gągała,  Sławomir Janukowicz - carrier grade NAT PLNOG 7: Emil Gągała,  Sławomir Janukowicz - carrier grade NAT
PLNOG 7: Emil Gągała, Sławomir Janukowicz - carrier grade NAT
 
Tcp Ip Overview
Tcp Ip OverviewTcp Ip Overview
Tcp Ip Overview
 
TCP/IP and UDP protocols
TCP/IP and UDP protocolsTCP/IP and UDP protocols
TCP/IP and UDP protocols
 
How does ping_work_style_1_gv
How does ping_work_style_1_gvHow does ping_work_style_1_gv
How does ping_work_style_1_gv
 
Internet
InternetInternet
Internet
 
CoAP Course for m2m and Internet of Things scenarios
CoAP Course for m2m and Internet of Things scenariosCoAP Course for m2m and Internet of Things scenarios
CoAP Course for m2m and Internet of Things scenarios
 
UAV Data Link Design for Dependable Real-Time Communications
UAV Data Link Design for Dependable Real-Time CommunicationsUAV Data Link Design for Dependable Real-Time Communications
UAV Data Link Design for Dependable Real-Time Communications
 
Udp length 519 computer networks transport
Udp length 519 computer networks transportUdp length 519 computer networks transport
Udp length 519 computer networks transport
 
Pt using packettracer
Pt using packettracerPt using packettracer
Pt using packettracer
 
Tcp header/IP Header/Authentication header
Tcp header/IP Header/Authentication headerTcp header/IP Header/Authentication header
Tcp header/IP Header/Authentication header
 
tcpheader-151221111244.pdf
tcpheader-151221111244.pdftcpheader-151221111244.pdf
tcpheader-151221111244.pdf
 
Lecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignmentsLecture 5 internet-protocol_assignments
Lecture 5 internet-protocol_assignments
 
ENCOR_Capitulo 2.pptx
ENCOR_Capitulo 2.pptxENCOR_Capitulo 2.pptx
ENCOR_Capitulo 2.pptx
 
transport protocols
transport protocolstransport protocols
transport protocols
 

Último

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Último (20)

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 

香港六合彩 » SlideShare

  • 1. MPA update (-00) ( Marker PDU Aligned Framing for TCP) draft-ietf-rddp-mpa-00 Paul R. Culley HP 11-11-2003
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. IWarp Startup sequence* Initiator ULP says “Are you OK with going to iWARP?” in streaming mode This message is optional! ULP gets message; enables MPA in “Responder” mode and sends optional last streaming “Yes, I'm in iWARP now”, message. MPA waits for incoming <MPA Request Frame> ULP gets message; enables MPA in “Initiator” mode. MPA sends “MPA Request Frame” and waits for the “MPA Reply Frame” Responder MPA gets MPA Reply Frame, Consumer binds MPA to DDP, MPA and DDP go into full operation. First iWARP message sent by RNIC (When WQE is posted) MPA gets MPA Request Frame, Consumer binds MPA to DDP, MPA sends MPA Reply Frame, FPDU decoding enabled. MPA gets first FPDU; Goes into Full iWARP mode. First iWARP message sent by RNIC (When WQE is posted) * No private data interactions shown
  • 9. IWarp Startup sequence with TCP MPA gets MPA Reply Frame, passes “private data” to consumer, Consumer binds MPA to DDP, MPA and DDP go into full operation. First iWARP message sent by RNIC (When WQE is posted) Initiator TCP SYN sent TCP to “Established”, Consumer enables MPA in responder mode, MPA waits for incoming <MPA Request Frame> As TCP enters “established”, Consumer enables MPA in “Initiator” mode. MPA sends “MPA Request Frame” with “private data” and waits for the “MPA Reply Frame” Responder MPA gets MPA Request Frame, passes “private data” to consumer, Consumer binds MPA to DDP, MPA sends MPA Reply Frame, FPDU decoding enabled. MPA gets first FPDU; Goes into Full iWARP mode. First iWARP message sent by RNIC (When WQE is posted) TCP gets SYN Sends SYN-Ack TCP gets SYN-Ack Sends Ack Note Note: The Ack may be in the same segment as the MPA Request Frame in some implementations!
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15. End

Notas do Editor

  1. Marker (Protocol Data Unit) Aligned Framing, or MPA.