Figures
Figure Kernel NIC Application Packet Flow
Figure Performance Benchmark Setup (Basic Environment)
Figure Performance Benchmark Setup (Virtualized Environment)
Figure Performance Benchmark Setup (Basic Environment)
Figure Performance Benchmark Setup (Virtualized Environment)
Figure Encryption flow Through the L2 Forwarding with Crypto Application
Figure A typical IPv4 ACL rule
Figure Load Balancer Application Architecture
Figure Example Data Flow in a Symmetric Multi-process Application
Figure Example Data Flow in a Client-Server Symmetric Multi-process Application
Figure Master-slave Process Workflow
Figure Slave Process Recovery Process Flow
Figure QoS Scheduler Application Architecture
Figure Ring-based Processing Pipeline Performance Setup
Figure Packet Flow Through the VMDQ and DCB Sample Application
Figure Test Pipeline Application
Figure Performance Benchmarking Setup (Basic Environment)
Figure Distributor Sample Application Layout
Figure VM request to scale frequency Figure Overlay Networking. Figure TEP termination Framework Overview
Figure PTP Synchronization Protocol
Figure Using EFD as a Flow-Level Load Balancer
Tables