Technical Report: Benchmarking tunnel and encryption methodologies in cloud environments

Mar 4, 2022 | Blog, IBM

The recent past has seen the adoption of multi-cloud deployments by enterprises due to availability, features and regulatory requirements. A typical deployment involves parts of an application/workloads running inside a private cloud with the other parts spread across multiple on-prem/public clouds. Typical cluster-to-cluster networking in such deployments involve the establishment of site-to-site encrypted tunnels to connect the workloads.

We systematically evaluate popular overlay tunnelling and encryption mechanisms over different setups (inter-DC VMs over WAN, intra-DC VMs within a data-center and an on-prem intra-rack bare-metal setup) to provide insights on their performance (throughput & latency) and the overhead (CPU utilization) incurred. We performed the experiments using standard open-source performance benchmarking tools. Based on the various experiments conducted on three different testbeds, we present quantifiable data which can be leveraged by operators and cloud providers tasked with design and development decisions.

Authors: Pravein Govindan Kannan (1), Brent Salisbury (2), Palanivel Kodeswaran (1), Sayandeep Sen (1) ((1) IBM Research – India, (2) Red Hat)

Related Stories

The (open) source of cutting-edge innovation

The (open) source of cutting-edge innovation

by Gordon Haff, technology advocate at Red Hat Where do people come together to make cutting-edge invention and innovation happen? The corporate lab One possible answer is the corporate research lab. More long-term focused than most company product development...

Intern Spotlight: Rohan Devasthale, Red Hat Research Boston

Intern Spotlight: Rohan Devasthale, Red Hat Research Boston

This blog post spotlights Rohan Devasthale, a Software Engineering Intern. Rohan spoke with us about his contributions to the Elastic Secure Infrastructure (ESI) project, how his experience as a Red Hat Research Intern enhanced his technical skills, and his passion for badminton.

Explore project updates with new project posters

Explore project updates with new project posters

Red Hat Research is excited to share its new series of research posters designed to visually share details of 17 active research collaborations and spur new collaborations between Red Hat engineers and existing project teams. The posters have been printed for display...

Getting started with data science and machine learning

Getting started with data science and machine learning

Data science has exploded in popularity (and sometimes, hype) in recent years. This has led to an increased interest in learning the subject. With so many possible directions, it can be hard to know where to start. This blog post is here to help.

Robust LSM tuning research paper published

Robust LSM tuning research paper published

Congratulations to Andy Hyunh, IBM PhD Fellowship intern and PhD candidate, Boston University; Harshal Chaudhari, PhD candidate, Boston University; Evimaria Terzi, Professor, Computer Science, Boston University; and Manos Athanassoulis, Assistant Professor, Computer...

Beyond Cyber 01 course with The Academic College of Tel Aviv-Yaffo

Beyond Cyber 01 course with The Academic College of Tel Aviv-Yaffo

Red Hat Project Security engineers Haim Krasniker, Or Asaf, and Luiza Nacshon have completed the first Red Hat Beyond-Cyber-01 course with MTA (The Academic College of Tel Aviv-Yaffo). The course took place in the Ra’anana Red Hat Office, which allowed teachers and students the opportunity to collaborate face to face.