Technical Report: Benchmarking tunnel and encryption methodologies in cloud environments

Mar 4, 2022 | Blog, IBM

The recent past has seen the adoption of multi-cloud deployments by enterprises due to availability, features and regulatory requirements. A typical deployment involves parts of an application/workloads running inside a private cloud with the other parts spread across multiple on-prem/public clouds. Typical cluster-to-cluster networking in such deployments involve the establishment of site-to-site encrypted tunnels to connect the workloads.

We systematically evaluate popular overlay tunnelling and encryption mechanisms over different setups (inter-DC VMs over WAN, intra-DC VMs within a data-center and an on-prem intra-rack bare-metal setup) to provide insights on their performance (throughput & latency) and the overhead (CPU utilization) incurred. We performed the experiments using standard open-source performance benchmarking tools. Based on the various experiments conducted on three different testbeds, we present quantifiable data which can be leveraged by operators and cloud providers tasked with design and development decisions.

Authors: Pravein Govindan Kannan (1), Brent Salisbury (2), Palanivel Kodeswaran (1), Sayandeep Sen (1) ((1) IBM Research – India, (2) Red Hat)

Related Stories

Red Hat Collaboratory Announces 2022 Student Research Projects

Red Hat Collaboratory Announces 2022 Student Research Projects

On April 14, the Red Hat Collaboratory announced five newly funded Student Research Projects. As part of Boston University’s expanded partnership with Red Hat, the Student Research Projects aim to provide BU students with research and experiential learning...

Getting started with data science and machine learning

Getting started with data science and machine learning

Data science has exploded in popularity (and sometimes, hype) in recent years. This has led to an increased interest in learning the subject. With so many possible directions, it can be hard to know where to start. This blog post is here to help.

Robust LSM tuning research paper published

Robust LSM tuning research paper published

Congratulations to Andy Hyunh, IBM PhD Fellowship intern and PhD candidate, Boston University; Harshal Chaudhari, PhD candidate, Boston University; Evimaria Terzi, Professor, Computer Science, Boston University; and Manos Athanassoulis, Assistant Professor, Computer...

Beyond Cyber 01 course with The Academic College of Tel Aviv-Yaffo

Beyond Cyber 01 course with The Academic College of Tel Aviv-Yaffo

Red Hat Project Security engineers Haim Krasniker, Or Asaf, and Luiza Nacshon have completed the first Red Hat Beyond-Cyber-01 course with MTA (The Academic College of Tel Aviv-Yaffo). The course took place in the Ra’anana Red Hat Office, which allowed teachers and students the opportunity to collaborate face to face.

Encouraging mentees to thrive: How to be a good mentor

Encouraging mentees to thrive: How to be a good mentor

An internship is a great opportunity for a company to evaluate candidates in a time-limited job role, but it is also a chance for interns to learn, gain work experience, and evaluate that company as a potential future employer; this is an equally important part of the position.