Skip to main content

How do programs work on a computer? (Part 1/2)

Let's take a very simple program for understanding how this system works. The following example is a very basic C code that assigns 2 variables (x and y) and then adds them to generate a value 'z'.  Note: We do not output anything in this program void main() { int x = 3; int y = 4; int z = x + y; } But we have a pressing question. Computers inherently work on electronics and logic, so how does it understand and execute the program? The answer is not very simple and you have to bear with me through a tiny journey. Basic Logic Circuits Let's first begin with a very basic Circuit which implements AND logic and OR logic (skip if you are familiar)  As seen in the circuits above, for the left circuit, the LED lights up only when both switches are on. This is AND logic as "Switch 1 AND Switch 2 need to be on". In the circuit on the right, either of the switch will switch on the LED. Note that in the

The future of Web Acceleration and Security: SmartNICs

Since 2016, India has been one of the fastest-growing markets for the internet. It almost doubled its internet penetration in half a decade (2016-2020), and the average broadband speeds increased by 77% in just one year (2016-2017), while mobile speeds improved by 42% in the same year (source).


In 2020, Amazon was hit with the then-largest known DDoS attack of 2.3Tbps, while the very next year, an attack of 2.4Tbps was defended by Microsoft. Have you ever wondered about the changes under the hood required to support such high bandwidths and mitigate such an attack? If yes, this post will introduce you to some of the technologies involved.

Note: This post is not comprehensive by any means and barely covers the beginning of the surface of the technologies involved.

The Bandwidth Problem

Let us first begin by understanding the most fundamental problem of the internet. Bandwidth. What is bandwidth?

Source and Attribution: https://commons.wikimedia.org/wiki/File:Bandwidth.png


The above image is a graph with frequency on the X-axis and amplitude on the Y-axis. Bandwidth is essentially the range of frequencies that someone can do something with. The bandwidth problem arises when too many people use the same small range of frequencies to communicate.

A real-life example might be a tiny overcrowded room where everyone is trying to talk. It becomes challenging to listen to anyone there. The same situation happens for computers when trying to talk to the internet. Some of you might have a broadband connection at home, and if it's one of the newer routers, you might have observed a 2.4GHz and a 5GHz option in it.

In reality, 2.4GHz ranges from 2,400 to 2,483.5 Mhz (approx, actual values depend on the country you live in). On the other hand, ranges from 5.15GHz to 5.35GHz and 5.725GHz to 5.85GHz. As you quickly notice, the total bandwidth for 2.4GHz is ~80MHz, while 5GHz is ~325MHz, about 4 times higher! But the problem with a higher frequency is that the signal strength drops more quickly (called signal attenuation), resulting in less range.



As you can see in the screen recording above, there are very few devices talking at 5GHz (because of the quick signal attenuation, and none of them overlaps. But the story is very different when we look at 2.4GHz (end of the recording).

While the above detail is WiFi Specific, the same applies even to Mobile Data and wired Broadband. This is one of the primary reasons India is still one of the lowest on the Speedtest Global Index - Mobile (source). Due to its large population, there are always too many people trying to use the same limited bandwidth available to them at any given time and place.

But while airwaves are a limited and costlier resource, wired systems are less resource-constrained in that aspect. Hence, India has been rising in average broadband speeds and penetration in the last half-decade. But this leads to another problem. If everyone has access to high-speed internet, you need systems that can simultaneously handle the high traffic load from all those users. In other words, you need a faster 'system'. And this 'system' should also be able to ensure security and mitigate attacks like the one on Microsoft and Amazon.

Addendum: While Internet Service Providers (ISPs) say they give you a particular package with some specific speed, you should note that they write the word 'upto' next to it. This exists due to a system called Thin Provisioning. Let us assume an ISP has 1Gbps of bandwidth. It can promise 5 users 200Mbps, always. But most normal consumers rarely utilise 200Mbps constantly. And hence, the ISP can promise 'upto 200Mbps' to 20 users (the exact number depends on the ISP and the demographic), knowing that these 20 users, on average, will never use >1Gbps at any given time.

The 'System'

First of all, this 'system' is not one piece of technology. It's a collection of many hardware and software technologies from many companies. Below is a non-comprehensive list of technologies definitely involved in giving you internet access.
  1. Routers
  2. Switches
  3. Carrier-Grade Network Address Translation (CGNAT)
  4. Proxies
  5. Load Balancers
  6. Firewalls
  7. Servers and their associated acceleration hardware and software.
There are enough resources on Routers and Switches, both on the internet and introductory networking textbooks. And the rest of them are exciting enough on their own to warrant a separate post (maybe someday). But for now, let the focus be on a relatively new hardware capable of doing most/all of the above-stated functions at a very high speed and low power consumption. This new technology is called a SmartNIC (a Smart Network Interface Card).

The SmartNIC

Before understanding a SmartNIC, the first step is to understand FPGAs, ASICs, and Microprocessors. Most of you have already heard of microprocessors. It's the same 'processor' on your laptop or phone, nothing new.

Source: https://www.researchgate.net/figure/1-Comparison-of-typical-microprocessor-FPGA-ASIC-and-GPU-designs-Partly-reproduced_tbl1_311845419


The above comparison shows that FPGAs are faster than microprocessors but consume more power than ASICs. While ASICs are the quickest and consume the least energy, but can (rarely) be modified. ASICs are usually designed for a specific purpose, and they are the most efficient in doing only that task.

With that overview, let us now understand what a NIC (Network Interface Card) is. As the name suggests, it's a piece of hardware that you use to communicate with the network. It could be your WiFi hardware, LAN/Ethernet Hardware or the hardware in your phone to communicate with the mobile towers. Most of these devices are 'dumb'. They only have some memory (buffer memory) to store the incoming and outgoing transmissions alongside hardware to encode/decode the signals on the chosen medium (WiFi, LAN etc.).

But SmartNICs are high-speed NICs specifically for wired transmissions (LAN, Fiber Optic etc.), which have a combination of any of the above 3 (ASIC, FPGA and Microprocessors) on them. Confused? That is expected! Why in the world would someone put a processor or something similar on a network card? What purpose does it serve? Let us understand.

The first thing we need to accept is that the internet-based network is designed to be highly parallel. Every transmission has the 7 layers of the OSI model. And each layer has multiple packets, each of which can be decoded separately, in parallel. So, in theory, for 1MB of data, divided into 10 packets of 100KB each, you can have 10 <acceleration hardware> to process each packet. The processor on your laptop has multiple cores, but it's limited to a small amount (1-12, usually). Servers go a bit higher with the core count in double digits and rarely, even three digits. But when we are talking about tens or even hundreds of Gb per second of network data pouring in, we need something that can be massively parallel, and general-purpose processors are just not designed for this job.

Each general-purpose processor in your phone, laptop, or server has a minimum frequency. The processor can not go below this frequency without entering 'deep sleep' mode to conserve power. Power consumption in a processor increases exponentially with the frequency. In the case of parallelly processing a large number of incoming packets, you need either specialised hardware or, at the least, a large number of cores. But having many cores also means a more significant power consumption.

This conundrum between the choice of ASICs, FPGAs and Microprocessors is why SmartNICs have a combination of any/all of the above. A SmartNIC with an ASIC and a microprocessor can essentially run a bare-bones Linux on the SmartNIC. This increases the ease of programmability for more complex tasks or solutions that were not conceived when the SmartNIC was built. While the ASIC on the SmartNIC can do the general/regular jobs at a fast rate, with very low power consumption. An example of this is Intel's QAT. QAT on a SmartNIC or an Infrastructure Processing Unit (IPU) can provide features like encryption/decryption of data at line rate (essentially without any delay), with speeds as high as 100-400 Gbps. The configuration of the QAT (or any ASIC) can be easily done by the onboard processor on the SmartNIC/IPU.

Another example of the feature set that a SmartNIC can provide you comes from the Mellanox (now, Nvidia) Bluefield 2. This SmartNIC has a host of features. One of them is the DMA capability. DMA stands for Direct Memory Access, meaning that the SmartNIC can directly access the RAM of the host server without the host processor as a mediator. And this does seem like a security vulnerability waiting to be exploited. But I believe that this is not any more vulnerable than having a regular server without the SmartNIC*. The DMA opens a host of possibilities. For example, you can theoretically offload TCP de-packetisation on the NIC. This means you can de-packetise all the way to Layer-4 of the OSI model on the NIC and then just put the de-packetised data in the application memory.

With these capabilities, a SmartNIC is an ideal drop-in solution to perform many networking-related tasks like hosting a proxy, load-balancing, running a CGNAT, performing encryption/decryption, running a firewall/protection service, hosting a service-mesh proxy sidecar of Kubernetes etc. And all of this can be done with no load on the host's CPU, which is free to carry out the actual Business logic the company desires to run.

* The purchase of SmartNICs is a B2B transaction, as ordinary consumers like you and me do not need this. So, the hardware trustworthiness is the same as trusting Nvidia for their GPUs or Intel/AMD/Qualcomm/Ampere for their processors. The OS on the Bluefield 2 is Linux, and you can configure it to be any Linux that your enterprise uses, thus reducing the vulnerability. And finally, the programs that run on these are written by the enterprise's employees.

Comments

Popular posts from this blog

How do programs work on a computer? (Part 1/2)

Let's take a very simple program for understanding how this system works. The following example is a very basic C code that assigns 2 variables (x and y) and then adds them to generate a value 'z'.  Note: We do not output anything in this program void main() { int x = 3; int y = 4; int z = x + y; } But we have a pressing question. Computers inherently work on electronics and logic, so how does it understand and execute the program? The answer is not very simple and you have to bear with me through a tiny journey. Basic Logic Circuits Let's first begin with a very basic Circuit which implements AND logic and OR logic (skip if you are familiar)  As seen in the circuits above, for the left circuit, the LED lights up only when both switches are on. This is AND logic as "Switch 1 AND Switch 2 need to be on". In the circuit on the right, either of the switch will switch on the LED. Note that in the

Photos to Photons

Heya there, Mike here! I hope you remember me from the previous story of "Photons to Photos". If not, please read that story here . Let's continue from where we left off! So, it turns out that the owners of the DSLR wanted to revisit us. For that, they had removed our permanent place of residence, the SD card, from the DSLR and put it in their laptop. So, now it was another entity who claimed it was from another DMA controller who would take us to another RAM, this time belonging to the laptop. And so we are off again, this time to meet the owners of the DSLR. In the RAM, we saw a lot of pictures already present alongside us. And more of them were coming in. We were all being loaded into some application that would enable the DSLR Owners to see us and even change us! The first contact As soon as the application had loaded us, it sent us to a chamber called "JPEG Decompression" (remember JPEG Compression chamber from the previous story?). We were asked to hand o

Dynamically extending the Linux Kernel! An introduction to eBPF

A simple Google search of "eBPF" will tell you that it stands for "extended Berkeley Packet Filter". The words "packet filter" in the name makes me think this has something to do with Computer Networks. But, while it started as a packet filter system, it has extended much beyond that functionality since then. Facebook also had Whatsapp, Instagram, Oculus etc., under its belt, and hence the board decided to rename the company to Meta to symbolise this. In the same way, maybe eBPF should be renamed to represent what it is! So, what exactly is eBPF? To understand eBPF, let us first understand why it is required. A short video explaining eBPF can be found here . Pre-requisites In this journey, the first thing to learn is the difference between userspace and kernel space. This  sub-section of my previous post gives you an overview. As mentioned there, you don't want your user application to have access to any data of any other running application unless spe