Sample Applications User Guides

Figures

Fig. 5.1 Packet Flow

Fig. 14.1 Kernel NIC Application Packet Flow

Fig. 17.1 Performance Benchmark Setup (Basic Environment)

Fig. 17.2 Performance Benchmark Setup (Virtualized Environment)

Fig. 18.1 Performance Benchmark Setup (Basic Environment)

Fig. 18.2 Performance Benchmark Setup (Virtualized Environment)

Fig. 16.1 Encryption flow Through the L2 Forwarding with Crypto Application

Fig. 22.1 A typical IPv4 ACL rule

Fig. 22.2 Rules example

Fig. 25.1 Load Balancer Application Architecture

Fig. 28.1 Example Data Flow in a Symmetric Multi-process Application

Fig. 28.2 Example Data Flow in a Client-Server Symmetric Multi-process Application

Fig. 28.3 Master-slave Process Workflow

Fig. 28.4 Slave Process Recovery Process Flow

Fig. 30.1 QoS Scheduler Application Architecture

Fig. 31.1 Pipeline Overview

Fig. 31.2 Ring-based Processing Pipeline Performance Setup

Fig. 31.3 Threads and Pipelines

Fig. 34.1 Packet Flow Through the VMDQ and DCB Sample Application

Fig. 39.1 Test Pipeline Application

Fig. 41.1 Performance Benchmarking Setup (Basic Environment)

Fig. 41.2 Distributor Sample Application Layout

Fig. 42.1 Highlevel Solution

Fig. 42.2 VM request to scale frequency Fig. 43.1 Overlay Networking. Fig. 43.2 TEP termination Framework Overview

Fig. 44.1 PTP Synchronization Protocol

Fig. 26.1 Using EFD as a Flow-Level Load Balancer

Tables

Table 29.1 Output Traffic Marking

Table 30.1 Entity Types

Table 39.1 Table Types