Sample Applications User Guides
- 1. Introduction to the DPDK Sample Applications
- 2. Compiling the Sample Applications
- 3. Command Line Sample Application
- 4. Ethtool Sample Application
- 5. Exception Path Sample Application
- 6. Hello World Sample Application
- 7. Basic Forwarding Sample Application
- 8. RX/TX Callbacks Sample Application
- 9. Flow Classify Sample Application
- 10. Basic RTE Flow Filtering Sample Application
- 11. IP Fragmentation Sample Application
- 12. IPv4 Multicast Sample Application
- 13. IP Reassembly Sample Application
- 13.1. Overview
- 13.2. The Longest Prefix Match (LPM for IPv4, LPM6 for IPv6) table is used to store/lookup an outgoing port number, associated with that IPv4 address. Any unmatched packets are forwarded to the originating port.Compiling the Application
- 13.3. Compiling the Application
- 13.4. Running the Application
- 13.5. Explanation
- 14. Kernel NIC Interface Sample Application
- 15. Keep Alive Sample Application
- 16. L2 Forwarding with Crypto Sample Application
- 17. L2 Forwarding Sample Application (in Real and Virtualized Environments) with core load statistics.
- 18. L2 Forwarding Sample Application (in Real and Virtualized Environments)
- 19. L2 Forwarding Sample Application with Cache Allocation Technology (CAT)
- 20. L3 Forwarding Sample Application
- 21. L3 Forwarding with Power Management Sample Application
- 22. L3 Forwarding with Access Control Sample Application
- 23. L3 Forwarding in a Virtualization Environment Sample Application
- 24. Link Status Interrupt Sample Application
- 25. Load Balancer Sample Application
- 26. Server-Node EFD Sample Application
- 27. Service Cores Sample Application
- 28. Multi-process Sample Application
- 29. QoS Metering Sample Application
- 30. QoS Scheduler Sample Application
- 31. Quota and Watermark Sample Application
- 32. Timer Sample Application
- 33. Packet Ordering Application
- 34. VMDQ and DCB Forwarding Sample Application
- 35. Vhost Sample Application
- 36. Vhost_scsi Sample Application
- 37. Netmap Compatibility Sample Application
- 38. Internet Protocol (IP) Pipeline Application
- 39. Test Pipeline Application
- 40. Eventdev Pipeline SW PMD Sample Application
- 41. Distributor Sample Application
- 42. VM Power Management Application
- 43. TEP termination Sample Application
- 44. PTP Client Sample Application
- 45. Performance Thread Sample Application
- 46. IPsec Security Gateway Sample Application
Figures
Figure Kernel NIC Application Packet Flow
Figure Performance Benchmark Setup (Basic Environment)
Figure Performance Benchmark Setup (Virtualized Environment)
Figure Performance Benchmark Setup (Basic Environment)
Figure Performance Benchmark Setup (Virtualized Environment)
Figure Encryption flow Through the L2 Forwarding with Crypto Application
Figure A typical IPv4 ACL rule
Figure Load Balancer Application Architecture
Figure Example Data Flow in a Symmetric Multi-process Application
Figure Example Data Flow in a Client-Server Symmetric Multi-process Application
Figure Master-slave Process Workflow
Figure Slave Process Recovery Process Flow
Figure QoS Scheduler Application Architecture
Figure Ring-based Processing Pipeline Performance Setup
Figure Packet Flow Through the VMDQ and DCB Sample Application
Figure Test Pipeline Application
Figure Performance Benchmarking Setup (Basic Environment)
Figure Distributor Sample Application Layout
Figure VM request to scale frequency Figure Overlay Networking. Figure TEP termination Framework Overview
Figure PTP Synchronization Protocol
Figure Using EFD as a Flow-Level Load Balancer
Tables