Tunneling Protocols
In computer networks tunneling protocols are often used for a variety of reasons. For example, to pass private data (perhaps encrypted) through an open public network such as the Internet or to tunnel incompatible (e.g. IPv6 or private IP addresses) protocols over an IP network. In each case the protocol data of interest is embedded or “tunneled” inside the payload of an IP packet. The net result is that the outer network/transport addressing is not of real interest.
Each Accolade SmartNIC contains a powerful packet parser. The Accolade parser doesn’t just blindly separate the various header fields in the packet. It has a great deal of intelligence built in. For example, if a given packet is buried inside a tunneling protocol such as VLAN, VXLAN, MPLS, GTP or GRE, the parser is able to bypass the encapsulation and work on the inner header portion of the packet where the packet data is held. But at the same time, if some function requires the encapsulation fields (e.g. MPLS label) as an input, the parser keeps track of that information as well.
To test drive an Accolade SmartNIC please contact us at [email protected]