Abstract:
Methods and apparatus for secure networking protocol optimization via NIC hardware offloading. Under a method, security offload entries are cached in a flow table or a security database offload table on a network interface coupled to a host that implements a host security database mapping flows to Security Association (SA) contexts. Each security offload entry includes information identify a flow and information, such as an offset value, to locate a corresponding entry for the flow in the host security database. Hardware descriptors for received packets that belong to flows with matching security offload entries are generated and marked with the information used to locate the corresponding entries in the host security database. The hardware descriptors are processed by software on the host and the location information is used to de-reference the location of applicable entries in the host security database. In effect, the lookup of matching flows in the host security database is offloaded to the network hardware device.
Abstract:
An intelligent cloud aware computing distribution architecture for a device. A network conditions monitor is to observe and identify decision impact factors of tasks in a runtime environment. A dynamic profiler, coupled to the network conditions monitor, is to receive runtime information regarding the decision impact factors identified by the network conditions monitor and produce a profile based on the decision impact factors. Runtime offload decision making logic is to process the profile produced by the dynamic profiler based on the received decision impact factors according a predetermined policy and to determine final offloading decisions based on the predetermined policy and the processed decision impact factors. The runtime offload decision making logic is to provide the final offloading decisions to the applications on the device for executing the tasks locally or remotely based on the determined final offloading decision.