2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing 2014
DOI: 10.1109/ucc.2014.123
|View full text |Cite
|
Sign up to set email alerts
|

On the Cost of Tunnel Endpoint Processing in Overlay Virtual Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 5 publications
0
6
0
Order By: Relevance
“…First, many researchers propose to reduce unnecessary work to improve the performance. Systems can offload CPU-intensive work, such as checksum computing, onto hardwares [12,14,18,71] or bypass inefficient parts inside kernel [22,71] to improve the container network processing. As a concrete example, advanced offloading techniques, e.g., Mellanox ASAP2 [19], allow for the offloading of virtual switches and packet transformation entirely to the NIC hardware.…”
Section: Container Network Accelerationmentioning
confidence: 99%
“…First, many researchers propose to reduce unnecessary work to improve the performance. Systems can offload CPU-intensive work, such as checksum computing, onto hardwares [12,14,18,71] or bypass inefficient parts inside kernel [22,71] to improve the container network processing. As a concrete example, advanced offloading techniques, e.g., Mellanox ASAP2 [19], allow for the offloading of virtual switches and packet transformation entirely to the NIC hardware.…”
Section: Container Network Accelerationmentioning
confidence: 99%
“…Adding and removing encapsulation headers increases overhead, may decrease application goodput, and may increase end-to-end latency, depending on whether the hardware supports tunnelling. Specialised hardware may be needed to support line rate forwarding of tunnel traffic [14][15][16]. Encapsulation and de-encapsulation performed in software provide flexibility but consume CPU resources, which can be used to host more VMs [14,15].…”
Section: Packet Forwarding In Dcnetmentioning
confidence: 99%
“…Specialised hardware may be needed to support line rate forwarding of tunnel traffic [14][15][16]. Encapsulation and de-encapsulation performed in software provide flexibility but consume CPU resources, which can be used to host more VMs [14,15]. Instead of encapsulation, DCnet uses address rewriting in which the ToR switch replaces the destination UID-MAC address in each outgoing packet with the current location address (RMAC) of the destination.…”
Section: Packet Forwarding In Dcnetmentioning
confidence: 99%
See 2 more Smart Citations