Feeds

Neterion's NICs are virtually there

Spring kicks off with virtual migrations

HP ProLiant Gen8: Integrated lifecycle automation

10Gig Ethernet specialist Neterion is announcing its third generation of virtualisation-aware network adapters at VMworld Europe this week, with a claim that these NICs will greatly speed up network-intensive tasks such as migrating virtual machines (VMs) from one server to another.

The cards offload work normally done in the hypervisor - in most VMs, the network driver routes I/O to a virtual network within the hypervisor, which then controls the physical network interface.

In contrast, Neterion's X3100 series card behaves like multiple physical network cards, allowing each VM to have its own network interface.

"By offloading many of the hypervisor tasks from host to the X3100 adapters, virtualised applications on VMs can achieve over four times the performance levels of virtualised servers without the offload features," Neterion boss Dave Zabrowski said.

There are other ways to get around the problem of virtualising the network within the hypervisor. One is to allow the VM to cut through to the physical network card, but then the guest OS has to be virtualisation-aware. Or you can simply put in multiple network cards, one per VM - but that breaks the virtual model as your VMs are no longer hardware-independent.

So virtualising network cards from Neterion (and rivals such as Intel, NetXen, NextIO and Solarflare) offload the virtualisation work into hardware. For example, the new Neterion X3100 has 17 hardware-based bidirectional I/O paths, each of which can run at line rate. The idea is that this will match to a 16-core server, with one extra path for management.

The devices are compatible with VMware's ESX Server 3.5 and its NetQueue I/O virtualisation (IOV) spec, and can reduce CPU utilisation by up to 50 per cent via a new Large Receive Offload feature, Zabrowski said.

He claimed they are also the first of their kind to support the PCI-SIG's new SR-IOV (single-root IOV) standard, which allows one adapter to behave like multiple physical adapters in a virtualised server.

"This product is a watershed for the industry," he declared. "With the X3100 series supporting full IOV compliance with a silicon-based I/O path architecture, all applications become candidates to run on a virtualised server."

Dave Malcolm, engineering veep at US-based software developer Surgient, said Neterion's virtualising adapters have enabled his company's ESX 3.5 servers to run at more than 80 per cent utilisation.

"And with the 10Gig line rate performance, we have eliminated the I/O bottlenecks for server-to-server and server-to-storage networking applications," he added. ®

Reducing security risks from open source software

More from The Register

next story
Sysadmin Day 2014: Quick, there's still time to get the beers in
He walked over the broken glass, killed the thugs... and er... reconnected the cables*
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
SHOCK and AWS: The fall of Amazon's deflationary cloud
Just as Jeff Bezos did to books and CDs, Amazon's rivals are now doing to it
BlackBerry: Toss the server, mate... BES is in the CLOUD now
BlackBerry Enterprise Services takes aim at SMEs - but there's a catch
The triumph of VVOL: Everyone's jumping into bed with VMware
'Bandwagon'? Yes, we're on it and so what, say big dogs
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.