Sample Applications User Guide


Fig. 4.15 Packet Flow

Fig. 11.1 Kernel NIC Application Packet Flow

Fig. 14.2 Performance Benchmark Setup (Basic Environment)

Fig. 14.3 Performance Benchmark Setup (Virtualized Environment)

Fig. 15.6 Performance Benchmark Setup (Basic Environment)

Fig. 15.7 Performance Benchmark Setup (Virtualized Environment)

Fig. 13.2 Encryption flow Through the L2 Forwarding with Crypto Application

Fig. 19.5 A typical IPv4 ACL rule

Fig. 19.6 Rules example

Fig. 22.1 Load Balancer Application Architecture

Fig. 23.1 Example Data Flow in a Symmetric Multi-process Application

Fig. 23.2 Example Data Flow in a Client-Server Symmetric Multi-process Application

Fig. 23.3 Master-slave Process Workflow

Fig. 23.4 Slave Process Recovery Process Flow

Fig. 25.1 QoS Scheduler Application Architecture

Fig. 26.1 Intel® QuickAssist Technology Application Block Diagram

Fig. 27.1 Pipeline Overview

Fig. 27.2 Ring-based Processing Pipeline Performance Setup

Fig. 27.3 Threads and Pipelines

Fig. 30.1 Packet Flow Through the VMDQ and DCB Sample Application

Fig. 31.1 System Architecture for Virtio-based Networking (virtio-net).

Fig. 31.2 Virtio with Linux

Fig. 31.3 Vhost-net Architectural Overview

Fig. 31.4 Packet Flow Through the vhost-net Sample Application

Fig. 31.5 Packet Flow on TX in DPDK-testpmd

Fig. 34.1 Test Pipeline Application

Fig. 35.1 Performance Benchmarking Setup (Basic Environment)

Fig. 35.2 Distributor Sample Application Layout

Fig. 36.1 Highlevel Solution

Fig. 36.2 VM request to scale frequency Fig. 37.1 Overlay Networking. Fig. 37.2 TEP termination Framework Overview

Fig. 39.1 PTP Synchronization Protocol


Table 24.18 Output Traffic Marking

Table 25.1 Entity Types

Table 34.1 Table Types