Technical Report: Benchmarking tunnel and encryption methodologies in cloud environments

Mar 4, 2022 | Blog, IBM

The recent past has seen the adoption of multi-cloud deployments by enterprises due to availability, features and regulatory requirements. A typical deployment involves parts of an application/workloads running inside a private cloud with the other parts spread across multiple on-prem/public clouds. Typical cluster-to-cluster networking in such deployments involve the establishment of site-to-site encrypted tunnels to connect the workloads.

We systematically evaluate popular overlay tunnelling and encryption mechanisms over different setups (inter-DC VMs over WAN, intra-DC VMs within a data-center and an on-prem intra-rack bare-metal setup) to provide insights on their performance (throughput & latency) and the overhead (CPU utilization) incurred. We performed the experiments using standard open-source performance benchmarking tools. Based on the various experiments conducted on three different testbeds, we present quantifiable data which can be leveraged by operators and cloud providers tasked with design and development decisions.

Authors: Pravein Govindan Kannan (1), Brent Salisbury (2), Palanivel Kodeswaran (1), Sayandeep Sen (1) ((1) IBM Research – India, (2) Red Hat)

Related Stories

CODECO: a deeper dive into the novel edge-cloud framework

CODECO: a deeper dive into the novel edge-cloud framework

CODECO stands for Cognitive Decentralized Edge to Cloud Orchestration. The open source software framework, pluggable to Kubernetes, aims to improve the energy efficiency and robustness of edge-cloud infrastructure by improving application deployment and runtime. by...

QUBIP for post-quantum cryptography demos pilots for IoT, telco

QUBIP for post-quantum cryptography demos pilots for IoT, telco

By Dmitry Belyavskiy, Red Hat Principal Software Engineer The transition to post-quantum cryptography (PQC) has been one of the hottest security topics of the last several years, as expected advancements in quantum computing continue to increase the risk of quantum...

Choosing LLMs to generate high-quality unit tests for code

Choosing LLMs to generate high-quality unit tests for code

Student research spotlight—Alexandra Skysľaková Not all large language models (LLMs) are equally good at generating tests for all programming languages. Alexandra Skysľaková, a recent graduate from the Faculty of Informatics at Masaryk University (MUNI), focused her...

What the Massachusetts AI Hub could mean for AI innovation

What the Massachusetts AI Hub could mean for AI innovation

High-impact AI solutions to global challenges are within reach. Here’s how Massachusetts’ big bet on equity and collaboration helps. By Orran Krieger Opportunities for AI development in open source got a big boost in December when Massachusetts Governor Maura Healey...

Fedora Linux transition for quantum resistant cryptography

Fedora Linux transition for quantum resistant cryptography

By Dmitry Belyavskiy While numerous robust post-quantum (PQ) standards exist, along with various projects implementing them, widespread adoption for communication and data protection hinges on their integration into mainstream OS distributions. By incorporating these...

Intern spotlight: Eric Munson builds guitars and Unikernel Linux

Intern spotlight: Eric Munson builds guitars and Unikernel Linux

PhD interns at Red Hat Research’s partner universities play a pivotal role in bringing together the cutting-edge thinking of research institutions with the real-world expertise of industry. The PhD program enables long-term research partnerships that provide greater...