Sample Applications User Guides
- 1. Introduction
- 2. Command Line Sample Application
- 3. Ethtool Sample Application
- 4. Exception Path Sample Application
- 5. Hello World Sample Application
- 6. Basic Forwarding Sample Application
- 7. RX/TX Callbacks Sample Application
- 8. IP Fragmentation Sample Application
- 9. IPv4 Multicast Sample Application
- 10. IP Reassembly Sample Application
- 11. Kernel NIC Interface Sample Application
- 12. Keep Alive Sample Application
- 13. L2 Forwarding with Crypto Sample Application
- 14. L2 Forwarding Sample Application (in Real and Virtualized Environments) with core load statistics.
- 15. L2 Forwarding Sample Application (in Real and Virtualized Environments)
- 16. L2 Forwarding Sample Application with Cache Allocation Technology (CAT)
- 17. L3 Forwarding Sample Application
- 18. L3 Forwarding with Power Management Sample Application
- 19. L3 Forwarding with Access Control Sample Application
- 20. L3 Forwarding in a Virtualization Environment Sample Application
- 21. Link Status Interrupt Sample Application
- 22. Load Balancer Sample Application
- 23. Server-Node EFD Sample Application
- 24. Multi-process Sample Application
- 25. QoS Metering Sample Application
- 26. QoS Scheduler Sample Application
- 27. Quota and Watermark Sample Application
- 28. Timer Sample Application
- 29. Packet Ordering Application
- 30. VMDQ and DCB Forwarding Sample Application
- 31. Vhost Sample Application
- 32. Vhost_scsi Sample Application
- 33. Netmap Compatibility Sample Application
- 34. Internet Protocol (IP) Pipeline Application
- 35. Test Pipeline Application
- 36. Eventdev Pipeline SW PMD Sample Application
- 37. Distributor Sample Application
- 38. VM Power Management Application
- 39. TEP termination Sample Application
- 40. PTP Client Sample Application
- 41. Performance Thread Sample Application
- 42. IPsec Security Gateway Sample Application
Figures
Fig. 11.1 Kernel NIC Application Packet Flow
Fig. 14.1 Performance Benchmark Setup (Basic Environment)
Fig. 14.2 Performance Benchmark Setup (Virtualized Environment)
Fig. 15.1 Performance Benchmark Setup (Basic Environment)
Fig. 15.2 Performance Benchmark Setup (Virtualized Environment)
Fig. 13.1 Encryption flow Through the L2 Forwarding with Crypto Application
Fig. 19.1 A typical IPv4 ACL rule
Fig. 22.1 Load Balancer Application Architecture
Fig. 24.1 Example Data Flow in a Symmetric Multi-process Application
Fig. 24.2 Example Data Flow in a Client-Server Symmetric Multi-process Application
Fig. 24.3 Master-slave Process Workflow
Fig. 24.4 Slave Process Recovery Process Flow
Fig. 26.1 QoS Scheduler Application Architecture
Fig. 27.2 Ring-based Processing Pipeline Performance Setup
Fig. 27.3 Threads and Pipelines
Fig. 30.1 Packet Flow Through the VMDQ and DCB Sample Application
Fig. 35.1 Test Pipeline Application
Fig. 37.1 Performance Benchmarking Setup (Basic Environment)
Fig. 37.2 Distributor Sample Application Layout
Fig. 38.2 VM request to scale frequency Fig. 39.1 Overlay Networking. Fig. 39.2 TEP termination Framework Overview
Fig. 40.1 PTP Synchronization Protocol
Fig. 23.1 Using EFD as a Flow-Level Load Balancer
Tables