text
hidden text to trigger early load of fonts ПродукцияПродукцияПродукцияПродукция Các sản phẩmCác sản phẩmCác sản phẩmCác sản phẩm المنتجاتالمنتجاتالمنتجاتالمنتجات מוצריםמוצריםמוצריםמוצרים
Banner Image

Document Library

Reference architectures, white papers, and solutions briefs to help build and enhance your network infrastructure, at any level of deployment.

Related Content

Galois Fields New Instructions - Method for Calculating Toeplitz Hash Using GFNI Technology Guide

Last Updated: May 20, 2022

The Toeplitz hash function is used for hash calculation to distribute packets across the queues with RSS (Receive Side Scaling) in Ethernet devices. The Toeplitz hash function is frequently implemented in hardware of modern Network Interface Cards (NIC) but it can also be used to calculate hash values in software use cases. Software implementations of the Toeplitz hash function require a lot of CPU cycles, and calculation time is non-deterministic, for example due to the multiple branching involved in different implementations. The proposed solution outlined in this guide allows the elimination of branches and dramatically reduces the number of CPU cycles needed to calculate the Toeplitz hash signature.

Download PDF

Your browser does not support PDFs. Download the PDF.

Categories
Categories - Hardware Platforms Categories - NFVI Hardware Categories - NFVI OS/Virtualization Intel Technologies and Platforms - 3rd gen Intel Xeon Scalable processor Network Location - Core Network Network Location - Data Center Network Location - Device Edge Network Location - Hybrid Cloud Network Location - On Premises Network Location - Radio Access Network (RAN) Network Technologies - 4G and 3G Network Technologies - 5G Network Technologies - Cloud Native/NFV Network Technologies - Network Edge Network Technologies - Network Security Network Technologies - Next Generation Central Office (NGCO) Network Technologies - SD-WAN/uCPE Network Technologies - SDN Network Technologies - vRAN Optimizations - DPDK Optimizations - OVS-DPDK Verticals/Industries - Automotive Verticals/Industries - Cloud Service Providers Verticals/Industries - Enterprise Verticals/Industries - Financial Services Verticals/Industries - Government Verticals/Industries - Hospitality Verticals/Industries - Industrial Verticals/Industries - Manufacturing Verticals/Industries - Media and Entertainment Verticals/Industries - Medical and Healthcare Verticals/Industries - Retail Verticals/Industries - System Integration Verticals/Industries - Telecommunications Verticals/Industries - Transportation VNFS and CNFs - Application Delivery Controller (ADC) VNFS and CNFs - Broadband Remote Access Server (BRAS) VNFS and CNFs - Content Delivery Networks (CDN) VNFS and CNFs - IP Multimedia Subsystems (IMS) VNFS and CNFs - Load Balancer (LB) VNFS and CNFs - Session Border Controller (SBC) VNFS and CNFs - Virtualized Evolved Packet Core (vEPC) VNFS and CNFs - Virtualized Radio Access Network (vRAN) VNFS and CNFs - Wide Area Network (WAN) Optimization Workloads and Use cases - 5G Control Plane and Data Plane Workloads and Use cases - Artificial Intelligence (AI) Workloads and Use cases - Augmented/Virtual Reality (AR/VR) Workloads and Use cases - Cloud Gaming Workloads and Use cases - Computer Vision Workloads and Use cases - Connected Cars Workloads and Use cases - Content Distribution (CDN) Workloads and Use cases - Emergency Response Workloads and Use cases - Media Analytics Workloads and Use cases - Network Security (Nginx, Next-Gen Firewalls, etc.) Workloads and Use cases - SD-WAN and uCPE Workloads and Use cases - Security Workloads and Use cases - Smart Cities Workloads and Use cases - Smart Factory Workloads and Use cases - Smart Retail Workloads and Use cases - Storage as a Service (SaaS) Workloads and Use cases - Video Surveillance Workloads and Use cases - Virtualized Small Cell Gateway