Scaling Acceleration Capacity from 5 to 50 Gbps and Beyond with Intel QuickAssist Technology

Similar documents
How to abstract hardware acceleration device in cloud environment. Maciej Grochowski Intel DCG Ireland

Notices and Disclaimers

ISA-L Performance Report Release Test Date: Sept 29 th 2017

Intel QuickAssist for Windows*

Comparing TCP performance of tunneled and non-tunneled traffic using OpenVPN. Berry Hoekstra Damir Musulin OS3 Supervisor: Jan Just Keijser Nikhef

Jonathan Stern, Solutions Architect

Intel Cluster Ready Allowed Hardware Variances

Density Optimized System Enabling Next-Gen Performance

About FIPS, NGE, and AnyConnect

Cisco VPN Internal Service Module for Cisco ISR G2

Transport Level Security

Maximize Performance and Scalability of RADIOSS* Structural Analysis Software on Intel Xeon Processor E7 v2 Family-Based Platforms

Executive Summary. Introduction. Test Highlights

Flexible General-Purpose Server Board in a Standard Form Factor

Intel QuickAssist Technology

Security IP-Cores. AES Encryption & decryption RSA Public Key Crypto System H-MAC SHA1 Authentication & Hashing. l e a d i n g t h e w a y

Survey of Commercially available chips and IP cores implementing cryptographic algorithms

Hardware Cryptography and z/tpf

Intel Select Solution for ucpe

POWER YOUR CREATIVITY WITH THE INTEL CORE X-SERIES PROCESSOR FAMILY

Hardware Based Compression in Ceph OSD with BTRFS

Intel QuickAssist Technology

Programming Intel QuickAssist Technology Hardware Accelerators for Optimal Performance

Secure Key Management and Data Privacy on z/tpf

DPDK Performance Report Release Test Date: Nov 16 th 2016

Performance Implications of Security Protocols

Cubro Network Security Series

Meet the Increased Demands on Your Infrastructure with Dell and Intel. ServerWatchTM Executive Brief

Satisfying CC Cryptography Requirements through CAVP/CMVP Certifications. International Crypto Module Conference May 19, 2017

DataON and Intel Select Hyper-Converged Infrastructure (HCI) Maximizes IOPS Performance for Windows Server Software-Defined Storage

IBM System x High Performance Servers(R) Technical Support V4.

Performance implication of elliptic curve TLS

Accelerating HPC. (Nash) Dr. Avinash Palaniswamy High Performance Computing Data Center Group Marketing

Protect Yourself Against Security Challenges with Next-Generation Encryption

unleashed the future Intel Xeon Scalable Processors for High Performance Computing Alexey Belogortsev Field Application Engineer

BCA III Network security and Cryptography Examination-2016 Model Paper 1

Intel QuickAssist for Windows*

Parallelizing IPsec: switching SMP to On is not even half the way

Intel s Architecture for NFV

IBM z13 Performance of Cryptographic Operations (Cryptographic Hardware: CPACF, CEX5S)

Chapter 8 Web Security

Cisco HyperFlex HX220c M4 Node

DPDK Intel Cryptodev Performance Report Release 17.11

AMD EPYC Processors Showcase High Performance for Network Function Virtualization (NFV)

FlashGrid Software Enables Converged and Hyper-Converged Appliances for Oracle* RAC

Cisco Unified Computing System Delivering on Cisco's Unified Computing Vision

IBM Power Systems solution for SugarCRM

Intel Workstation Technology

Hughes Network Systems, LLC Hughes Crypto Kernel Firmware Version: FIPS Non-Proprietary Security Policy

Intel Select Solution for NFVI with Advantech Servers & Appliances

Data center: The center of possibility

Acronyms. International Organization for Standardization International Telecommunication Union ITU Telecommunication Standardization Sector

Intel PRO/1000 PT and PF Quad Port Bypass Server Adapters for In-line Server Appliances

FIPS Non-Proprietary Security Policy. Level 1 Validation Version 1.2

Cryptography and Network Security

FAST FORWARD TO YOUR <NEXT> CREATION

This version of the des Secure Enterprise MAC Client can be used on Mac OS X 10.7 Lion platform.

The Linux Kernel Cryptographic API

SU Dual and Quad-Core Xeon UP Server

MongoDB on Kaminario K2

Intel Server Board S5520HC

DPDK Intel Cryptodev Performance Report Release 18.08

RACKSPACE ONMETAL I/O V2 OUTPERFORMS AMAZON EC2 BY UP TO 2X IN BENCHMARK TESTING

Pactron FPGA Accelerated Computing Solutions

Cisco UCS B460 M4 Blade Server

Data Sheet. NCP Secure Entry Mac Client. Next Generation Network Access Technology

Extremely Fast Distributed Storage for Cloud Service Providers

Cipher Suite Configuration Mode Commands

Protocol Comparisons: OpenSSH, SSL/TLS (AT-TLS), IPSec

Oracle Solaris Userland Cryptographic Framework Software Version 1.0 and 1.1

TLS 1.1 Security fixes and TLS extensions RFC4346

9 GENERATION INTEL CORE DESKTOP PROCESSORS

Oracle B2B 11g Technical Note. Technical Note: 11g_006 Security. Table of Contents

ARISTA: Improving Application Performance While Reducing Complexity

Entry-level Intel RAID RS3 Controller Family

Munara Tolubaeva Technical Consulting Engineer. 3D XPoint is a trademark of Intel Corporation in the U.S. and/or other countries.

Fast-track Hybrid IT Transformation with Intel Data Center Blocks for Cloud

Security for VPNs with IPsec Configuration Guide, Cisco IOS Release 15S

Fast packet processing in the cloud. Dániel Géhberger Ericsson Research

Supra-linear Packet Processing Performance with Intel Multi-core Processors

COMPUTING. SharpStreamer Platform. 2U Video Transcode Acceleration Appliance

Performance and Energy Efficiency of the 14 th Generation Dell PowerEdge Servers

TOLLY. VPN Gateway 3070 SSL VPN Throughput, Scalability and Voice Quality Benchmark Evaluation. Test Summary. Test Highlights

NetScaler 2048-bit SSL Performance

INTERNET PROTOCOL SECURITY (IPSEC) GUIDE.

TALK THUNDER SOFTWARE FOR BARE METAL HIGH-PERFORMANCE SOFTWARE FOR THE MODERN DATA CENTER WITH A10 DATASHEET YOUR CHOICE OF HARDWARE

Intel Select Solutions for Professional Visualization with Advantech Servers & Appliances

vstart 50 VMware vsphere Solution Specification

Full Featured with Maximum Flexibility for Expansion

Cisco HyperFlex HX220c M4 and HX220c M4 All Flash Nodes

Intel Architecture 2S Server Tioga Pass Performance and Power Optimization

Cisco HyperFlex HX220c M4 and HX220c M4 All Flash Nodes

Graphics Performance Analyzer for Android

DPDK Vhost/Virtio Performance Report Release 18.05

Infrastructure Matters: POWER8 vs. Xeon x86

E-commerce security: SSL/TLS, SET and others. 4.1

Cisco UCS Virtual Interface Card 1225

Red Hat and Intel: Driving a New Era for the Data Center

How to Configure a Site-To-Site IPsec VPN to the Amazon AWS VPN Gateway

Enhancing Analysis-Based Design with Quad-Core Intel Xeon Processor-Based Workstations

Transcription:

SOLUTION BRIEF Intel QuickAssist Technology Scaling Acceleration Capacity from 5 to 5 Gbps and Beyond with Intel QuickAssist Technology Equipment manufacturers can dial in the right capacity by choosing from a family of Intel chipsets or designing in multiple chipsets. Highly Scalable Solution Intel is making it easier to scale compression and cryptography capacity with the Intel Platform for Communications Infrastructure that has built-in acceleration for common workloads... Compression and cryptography are becoming check-off requirements for network equipment deployed in wireless, telecom, cloud, data centers, and enterprises. While there is a universal need to preserve network bandwidth and better protect traffic, the amount of processing required for these functions varies considerably among different network operators. This presents a challenge for equipment manufacturers who want to serve multiple market segments with cost-effective products that deliver the right level of performance. Intel is making it easier to scale compression and cryptography capacity with the Intel Platform for Communications Infrastructure that has builtin acceleration for common workloads, including packet forwarding, bulk cryptography, and compression. These capabilities, available on commercial off-the-shelf (COTS) servers, are a more flexible alternative to purpose-built hardware. Performance throughput of approximately 255 million packets per second (MPPS) of L3 forwarding and 8 gigabits (Gbps) per second of IPsec acceleration 1,2 have been demonstrated on servers with dual Intel Xeon processor E5-26 v2 product family series and. This solution brief discusses how to scale cryptographic and compression workloads on Intel architecture, and is one in a series of five briefs describing how to maximize the benefits from Intel QuickAssist Technology. Please see the Resources section for links to the series.

Figure 1. Two Possible Platform Configurations 2x1G MAC 2x1G MAC PCIe* x8 Platform Configuration Examples Figure 1 illustrates a high-end configuration with dual, ten-core processors and four chipsets, and a low-end configuration with a single-core processor and one chipset. Along with scaling compression and cryptography capacity by adding chipsets, equipment manufacturers can fine-tune capacity by selecting from a family of pin-compatible Intel chipsets that support different levels of workload acceleration. Intel Xeon processor E5-26 v2 product family Intel QuickPath Interconnect (Intel QPI) Intel Xeon processor E5-26 v2 product family High-end: Dual Processor 2x1G MAC 2x1G MAC IPsec Workload Performance Figure 2 shows the IPsec throughput of an Intel QuickAssist Technology-enabled system featuring a ten-core Intel Xeon processor E5-268 v2 running the Wind River * Intelligent Network Platform *. The platform enables equipment providers to build high-performance, high-value products that Low-end: Single Processor 4 Gb/s IPSec L3Forwarding Throughput Quad PHY 4 x 1-Gigabit DMI Intel Xeon Processor E5-26 v2 product family 9 8 7 6 5 4 3 2 1 IPsec ESP Encrypted Traffic Number of Chipset Series 895 accelerate, analyze, and secure network traffic and applications. It is an integrated and optimized software system, consisting of the critical run-time components and life cycle development tools needed to build intelligent network elements. Using the cryptographic acceleration from a single Intel Communications Chipset 895, the system sustained a throughput of nearly 4 Gbps while using as few as two processor cores. When a second Intel chipset was added, the throughput scaled linearly to nearly 8Gbps. Figure 2. Scalable IPsec Performance 2

SSL Workload Performance The Intel Communications Chipset 89xx Series has built-in cryptographic acceleration to speed up SSL/TLS workloads. It encrypts/ decrypts SSL/TLS records, helps establish SSL/TLS connections by generating random numbers, and accelerates public key cryptographic algorithms such as RSA, DSA, Diffie-Hellman, ECDH, and ECDSA. SSL/TLS record encryption/decryption is supported through the acceleration of all common SSL/TLS cipher suites used for ciphering and MAC digest generation and verification. Digest and ciphering operations can be performed in parallel, on the same record, in a single pass through the accelerator on the Intel Communications. 11 1 9 8 7 6 5 4 3 2 1 SSL/TLS Encryption Number of Chipset Series 895 Figure 3. Scalable SSL/TLS Encryption Performance (AES128-CBC and SHA1-HMAC measured using OpenSSL * speed) Operations/sec RSA-2K Sign Performance 8 7 6 5 4 3 2 1 Number of Chipset Series 895 Figure 4. Scalable RSA-2K Sign Performance Figure 3 shows one chipset supported an SSL/TLS encryption throughput rate of nearly 5 Gbps, and adding a second chipset doubled the performance. Public key cryptographic performance was also measured, and one chipset delivered approximately 35 thousand RSA-2K operations per second, while two chipsets provided twice the performance (Figure 4). Compression Workload Performance Intel Communications performs lossless data compression and decompression using the LZ77 and LZS 3

algorithms. This acceleration functionality is available to applications via either an accelerated version of the popular zlib library or by directly accessing the Intel QuickAssist Technology API. Figure 5 illustrates the accelerated zlib performance of a single Intel Communications Chipset 895 Series operating on the Calgary Corpus * data set. This performance scales linearly as more chipsets are added to a platform. 25 2 15 1 5 Accelerated zlib Performance Two Scalability Vectors With Intel QuickAssist Technology, equipment manufacturers have two ways to linearly scale compression and cryptography performance by choosing between chipset family members or by adding up to four chipsets to a dual-processor platform, as illustrated in Table 1. This flexibility enables manufacturers to meet multiple price-performance targets for different customer sets while using a common code base running on Intel architecture processors. SSL (Gbps) zlib Deflate zlib Inflate Figure 5. Accelerated zlib Performance for Compression and Decompression (Using a single Chipset 895) Table 1. Two Ways to Scale Capacity with Intel QuickAssist Technology SKU One Chipset Two Chipsets Three Chipsets Four Chipsets 89 893 891 892 8925 895 5G 1G 2G 25G 5G 1G 15G 2G 4

Resources Solution Brief Series: Intel QuickAssist Technology Part 1: Integrated Cryptographic and Compression Accelerators on Intel Architecture Platforms Part 2: Bridging Open Source Applications and Intel QuickAssist Technology Acceleration Part 3: Accelerating OpenSSL* Using Intel QuickAssist Technology Part 4: Accelerating Hadoop* Applications Using Intel QuickAssist Technology Part 5: Scaling Acceleration Capacity from 5 to 5 Gbps Intel QuickAssist Technology Appendix A: Platform Configuration Hardware Platform Configuration Processor Chipset Memory Networking Card Operating System Compiler Dual socket Intel Xeon processor E5-268 v2 Chipset 895 (Intel DH895 PCH) 32GB DDR3 @ 1333MHz Dual Port Intel 82599ES 1 Gigabit Ethernet Controller Wind River* Linux* v5..1.6 gcc v4.6.3 For more information About Intel QuickAssist Technology, visit http://www.intel.com/content/www/us/en/io/quickassist-technology/quickassist-technology-developer.html 1 Performance estimates are based on internal Intel analysis and are provided for informational purposes only. 2 Performance tests and ratings are measured using specific computer systems and/or components and reflect the approximate performance of Intel products as measured by those tests. Any difference in system hardware or software design or configuration may affect actual performance. Buyers should consult other sources of information to evaluate the performance of systems or components they are considering purchasing. For more information on performance tests and on the performance of Intel products, visit http://www.intel.com/performance/resources/limits.htm Copyright 213 Intel Corporation. All rights reserved. Intel, the Intel logo, and Xeon are trademarks of Intel Corporation in the United States and/or other countries. *Other names and brands may be claimed as the property of others. Printed in USA MS/VC/1113 Order No. 329878-1US 5