Photo by Victor Freitas on Unsplash

Photo by Victor Freitas on Unsplash

Let the hardware do the heavy lifting

Iron Power

Article from ADMIN 45/2018
By
Inline hardware-assisted TLS reduces latency and saves valuable host CPU cycles.

Ethernet has been scaling faster recently. Whereas each successive Ethernet speed bump used to take seven to 10 years, it now happens in two to three years. Furthermore, the migration to flash and persistent memory is proving to be the killer app for this increase in Ethernet speed. Today, it takes only three NVMe SSD adapters to fill up 100GB – something that was unthinkable just three years ago. In the midst of all of this, the processors have had a difficult time keeping pace.

As a result, system performance and cost can benefit by offloading some repetitive, well-defined CPU-intensive data path tasks into dedicated hardware. This trend will only exacerbate with the arrival of 200/400-gigabit Ethernet (GbE) in 2019, and 800GbE shortly after that; hence, the window for CPU offload will remain open for the foreseeable future. Hardware assistance with tasks has the additional benefit of lowering system costs tremendously (every 10% increase in CPU ~ $500 in acquisition costs) and allowing the user to trade CPU costs against other components or against scale of an installation for no net loss to performance.

Network adapters these days do much more than Ethernet processing and have become feature-rich with each passing generation. What started as a transport layer checksum, large send offload (LSO) and large receive offload (LRO) have evolved into the integration of well-known protocols, such as remote direct memory access (RDMA), Internet small computer systems interface (iSCSI), transport layer security (TLS), and so on. As the roadmap for neuronal processing units (NPUs) and network adapters converge (you can now find a number of ARM cores in most network adapters), this opportunity for hardware assist is only enhanced. By using dedicated hardware, the system's overall power consumption is further reduced by providing the opportunity to use smaller CPUs.

It is important to note that hardware does not substitute for a software implementation

...
Use Express-Checkout link below to read the full article (PDF).

Buy this article as PDF

Express-Checkout as PDF
Price $2.95
(incl. VAT)

Buy ADMIN Magazine

SINGLE ISSUES
 
SUBSCRIPTIONS
 
TABLET & SMARTPHONE APPS
Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

  • TLS 1.3 and the return of common sense
    After a decade in service, TLS 1.2 is showing many signs of aging. Its immediate successor, TLS 1.3, has earned the approval of the IETF. Some major changes are on the way.
  • SSH Communications Launches CryptoAuditor
  • Encrypting files
    Encrypting your data is becoming increasingly important, but you don't always have to use an encrypted filesystem. Sometimes just encrypting files is enough.
  • Safe Files

    Encrypting your data is becoming increasingly important, but you don’t always have to use an encrypted filesystem. Sometimes just encrypting files is enough.

  • Filesystem Encryption

    The revelation of wide-spread government snooping has sparked a renewed interest in data storage security via encryption. In this article, we review some options for encrypting files, directories, and filesystems on Linux.

comments powered by Disqus
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=