X

The browser version you are using is not recommended for this site.
Please consider upgrading to the latest version of your browser by clicking one of the following links.

Document Library

Reference architectures, white papers, and solutions briefs to help build and enhance your network infrastructure, at any level of deployment.

Related Content

Galois Fields New Instructions - Method for Calculating Toeplitz Hash Using GFNI Technology Guide

Last Updated: May 20, 2022

The Toeplitz hash function is used for hash calculation to distribute packets across the queues with RSS (Receive Side Scaling) in Ethernet devices. The Toeplitz hash function is frequently implemented in hardware of modern Network Interface Cards (NIC) but it can also be used to calculate hash values in software use cases. Software implementations of the Toeplitz hash function require a lot of CPU cycles, and calculation time is non-deterministic, for example due to the multiple branching involved in different implementations. The proposed solution outlined in this guide allows the elimination of branches and dramatically reduces the number of CPU cycles needed to calculate the Toeplitz hash signature.

Download PDF

Your browser does not support PDFs. Download the PDF.

Categories
Categories Hardware Platforms NFVI Hardware NFVI OS/Virtualization Intel Technologies and Platforms 3rd gen Intel Xeon Scalable processor Network Location Radio Access Network (RAN) Hybrid Cloud Data Center Device Edge On Premises Core Network Network Technologies 5G 4G and 3G vRAN Network Edge Cloud Native/NFV Next Generation Central Office (NGCO) SDN SD-WAN/uCPE Network Security Optimizations DPDK OVS-DPDK Verticals/Industries Telecommunications Enterprise System Integration Automotive Financial Services Industrial Manufacturing Media and Entertainment Medical and Healthcare Retail Transportation Cloud Service Providers Government Hospitality VNFS and CNFs Load Balancer (LB) Wide Area Network (WAN) Optimization Broadband Remote Access Server (BRAS) Session Border Controller (SBC) IP Multimedia Subsystems (IMS) Application Delivery Controller (ADC) Virtualized Radio Access Network (vRAN) Virtualized Evolved Packet Core (vEPC) Content Delivery Networks (CDN) Workloads and Use cases 5G Control Plane and Data Plane Network Security (Nginx, Next-Gen Firewalls, etc.) Artificial Intelligence (AI) Augmented/Virtual Reality (AR/VR) Connected Cars Computer Vision Content Distribution (CDN) Emergency Response Security Smart Cities Smart Factory Smart Retail Video Surveillance Media Analytics Virtualized Small Cell Gateway Storage as a Service (SaaS) SD-WAN and uCPE Cloud Gaming