24. March 2025

RoCE compatible

For virtually interconnecting the memory of individual nodes in a network infrastructure, the RoCE transfer protocol is a feasible solution (RDMA/ Remote Direct Memory Access over Converged Ethernet). It is useful for memory-intensive applications such as AI, which require high performance or for data storage solutions in general. The protocol enables easy access to memory capacities which extend across several nodes in a network.

How is the protocol related to Pan Dacom Direkt's WDM technology? WDM technology is used to connect data centers for enhancing an IT infrastructure. The RoCE protocol is typically used over short distances (max. 100 kilometers). WDM technology enables the protocol to work between data centers which are physically separated from each other. Via the RoCE protocol tunneled over a WDM system it is easily possible to make use of RAM capacity which is available in other locations of a connected data centers network.

If a customer has planned an infrastructure with a certain capacity which later points out to be not enough regarding storage or memory, the RoCE protocol over WDM is a possible way out by upgrading and extending respective capacities though adding connected data centers later.

The bottom line: Wherever the SPEED-OTS 5000 with its module cards is installed or is to be installed in data center infrastructures, the RoCE protocol can also be used: Pan Dacom transponder and muxponder cards are compatible with all versions of the RoCE protocol V1.0/V1.5/V2.0 as it operates on layer 3, i.e. above the layers of the Pan Dacom direct products. Pan Dacom technology perceives layer 3 simply as data packets. All the technological benefits of the protocol can be used without restrictions.

The benefits at a glance

Latency times are lower for remote memory accesses: Thanks to the efficient implementation of RoCE, access to memory in other nodes of the network is transparent and therefore faster than with other network protocols, as there are no unnecessary conversion or transformation steps required.

Extend RAM virtually: The aim of the protocol is to ensure transparent network-tunneled memory access. This allows remote access to RAM of a connected unit. Through this, memory-intensive applications can be executed, even if the available memory of the local node is not sufficient.

Use bandwidth more efficiently: One advantage of the protocol is the very little amount of required management data overhead. This means the usable relative capacity for the actual payload is higher compared to other protocols. This is especially important for bandwidth intensive applications.