Skip to content
Define The Cloud

The Intersection of Technology and Reality

Define The Cloud

The Intersection of Technology and Reality

Stateless Transport Tunneling (STT)

Joe Onisick (@JoeOnisick), November 15, 2012May 18, 2020

STT is another tunneling protocol along the lines of the VXLAN and NVGRE proposals.  As with both of those the intent of STT is to provide a network overlay, or virtual network running on top of a physical network.  STT was proposed by Nicira and is therefore not surprisingly written from a software centric view rather than other proposals written from a network centric view.  The main advantage of the STT proposal is it’s ability to be implemented in a software switch while still benefitting from NIC hardware acceleration.  The other advantage of STT is its use of a 64 bit network ID rather than the 32 bit IDs used by NVGRE and VXLAN.

The hardware offload STT grants relieves the server CPU of a significant workload in high bandwidth systems (10G+.)  This separates it from it’s peers that use an IP encapsulation in the soft switch which negate the NIC’s LSO and LRO functions.   The way STT goes about this is by having the software switch inserts header information into the packet to make it look like a TCP packet, as well as the required network virtualization features.  This allows the guest OS to send frames up to 64k to the hypervisor which are encapsulated and sent to the NIC for segmentation.  While this does allow for the HW offload to be utilized it causes several network issues due to it’s use of valid TCP headers it causes issues for many network appliances or “middle boxes.” 

STT is not expected to be ratified and is considered by some to have been proposed for informational purposes, rather than with the end goal of a ratified standard.  With its misuse of a valid TCP header it would be hard pressed for ratification.  STT does bring up the interesting issue of hardware offload.  The IP tunneling protocols mentioned above create extra overhead on host CPUs due to their inability to benefit from NIC acceleration techniques.  VXLAN and NVGRE are intended to be implemented in hardware to solve this problem.  Both VXLAN and NVGRE use a 32 bit network ID because they are intended to be implemented in hardware, this space provides for 16 million tenants.  Hardware implementation is coming quickly in the case of VXLAN with vendors announcing VXLAN capable switches and NICs. 

Share this:

  • Facebook
  • X

Related posts:

  1. VXLAN Deep Dive
  2. Network Overlays: An Introduction
  3. Something up Brocade’s Sleeve, and it looks Good
  4. VXLAN Deep Dive – Part II
  5. Forget Multiple Hypervisors
Concepts Data CenterNetwork virtualizationPrivate CloudSTTVirtualization

Post navigation

Previous post
Next post

Related Posts

NVGRE

November 19, 2012May 18, 2020

The most viable competitor to VXLAN is NVGRE which was proposed by Microsoft, Intel, HP and Dell.  It is another encapsulation technique intended to allow virtual network overlays across the physical network.  Both techniques also remove the scalability issues with VLANs which are bound at a max of 4096.  NVGRE…

Share this:

  • Facebook
  • X
Read More
Cloud

Driving Digital Transformation

June 21, 2019May 18, 2020

Driving Digital Transformation “Digital, Digitization, Digital, Digital, Digital Transformation. There, I’ve hit my mandatory quota of 5 digital mentions for my presentation, now we can get to something interesting.” That was my opening line at a large data center and cloud conference in Rome. It wasn’t the one I’d planned,…

Share this:

  • Facebook
  • X
Read More

Network Overlays: An Introduction

December 13, 2012May 18, 2020

While network overlays are not a new concept, they have come back into the limelight, thanks to drivers brought on by large-scale virtualization. Several standards have been proposed to enable virtual networks to be layered over a physical network infrastructure: VXLAN, NVGRE, and SST. While each proposed standard uses different…

Share this:

  • Facebook
  • X
Read More

Comments (15)

  1. Brad Hedlund says:
    November 16, 2012 at 10:28 pm

    Hi Joe,
    Nice write up.
    Just a couple of drive-by comments:

    -STT traffic wouldnt be traversing middle boxes in most cases. Rather, the middle box would likely terminate and originate STT tunnels. And if the middle box is an x86 machine (likely) (virtual or physical) running OVS, no problem.

    -Its one thing for a NIC vendor to announce/ship VXLAN aware adapters. That’s a good start. But its another thing to have VXLAN aware LOM (probably still quite a way out). STT works with the common server LOMs we have today.

    1. Joe Onisick says:
      November 19, 2012 at 9:26 am

      Brad,

      Thanks for dropping by and the comments, both are excellent points. As far as LOM is concerned I agree it will be a while before we see the functionality added there, but in the meantime a decision can be made to add a VXLAN capable NIC or accept the performance overhead of losing LSO and LRO capabilities on the NIC.

      Joe

  2. Mike Aossey says:
    March 14, 2014 at 12:27 am

    Great stuff as always Joe!

  3. Google says:
    August 26, 2014 at 9:24 pm

    Hi to every one, because I am actually keen of reading this webpage’s post to be updated regularly.
    It carries nice stuff.

  4. Executive Virtual Offices San Francisco CA says:
    September 24, 2014 at 1:54 pm

    This is my first time visit at here and i am truly pleassant
    to read all at single place.

  5. boom beach hack iphone cydia,boom beach ios hack download,boom beach hack tool ios,boom beach diamants illimités cydia,boom beach hack apk gratuit,boom beach triche apk,boom beach triche astuce,telecharger boom beach hack gratuit,boom beach diamond says:
    October 4, 2015 at 6:40 pm

    L’ astuce Rate of growth Beach représente enfaite este générateur sur internet qui vous-même générera parfois des
    ressources durante illimité.

  6. Pingback: Network Abstraction and Virtualization: Where to Start? | Best cloud server computing
  7. boom beach hack tool apk,telecharger boom beach hack apk,download boom beach hack tool v3.19,Telecharger Boom Beach Hack,boom beach hack iphone,boom beach hack ios,boom beach triche apk,boom beach hack tool android,download boom beach hack tool,boom beach says:
    October 8, 2015 at 9:13 am

    Des diamants peut également être utilisé ici pour increaser
    vos réserves de Calcul.

  8. agar.io hack bot github,agar.io cheats ios,agar.io cheats for ipad mini,agario cheats,agario cheats reddit,agar.io skins mode,agario hack bot no survey,agar.io cheats cydia,agario cheats without download,agar.io hack bot tampermonkey,agar.io skins mobile says:
    December 2, 2015 at 2:31 am

    There are installed many agario android mobile phone
    app most of options buggy or perhaps is to an easy task to play with no
    features of browser variation.

  9. Pingback: SDN (Software Defined Networks) | Thinking about Data Center SolutionsThinking about Data Center Solutions
  10. agario hacks says:
    March 20, 2016 at 8:40 am

    nuclear familyZipXrevolting disgusting twoisrevolting disgustingextended familytwo twonuclear familyrevolting disgustingarevolting disgustingextended familytwofive hundred
    five hundredtwonuclear familyrevolting disgustingsinglerevolting disgustingnuclear familytwo five hundrednuclear
    familyagariorevolting disgustingextended familytwo extended familybotrevolting disgustingfive hundred five hundredextended familyrevolting disgustinghackrevolting disgustingtwofive hundred five hundredtwonoextended
    family obtain five hundredextended familyforrevolting disgusting cases, but
    twonuclear familyextranuclear family five hundredEnglishrevolting disgustingnuclear familytwo parts five hundredtwonuclear
    familyrevolting disgustingwillrevolting disgustingnuclear familytwofive hundred five hundredtwonuclear familyBurnextended family all the five
    hundredinhabitants five hundredtwoextended familyrevolting disgustingandrevolting disgustingfive hundred features five hundredtwogotnuclear familytwofive hundred five hundredextended familyinrevolting disgustingtwofive hundred twoaextended familytwofive hundred revolting disgustingbulkrevolting disgusting
    anything revolting disgustingblood.

  11. college football picks says:
    May 22, 2016 at 2:59 am

    Hi there all, here every person is sharing these kinds of familiarity, therefore it’s nice to read this weblog, and I used to pay a quick visit this blog daily.

  12. football betting tips says:
    August 1, 2016 at 7:32 pm

    Admiring the time and effort you put into your website and in depth information you present.
    It’s good to come across a blog every once in a while that isn’t the same outdated rehashed material.
    Fantastic read! I’ve saved your site and I’m adding your RSS feeds to my Google account.

  13. msphack.tips says:
    October 4, 2016 at 3:38 pm

    Helâ…¼o, i thÑ–nk that i saw you visited my blog so i came to return the favor.I’m
    tгying tߋ find things tο improve my website!ӏ
    suppose its oҝ to use somе оf yοur ideas!!

  14. Pingback: Network Abstraction and Virtualization: Where to Start? – Define The Cloud

Comments are closed.

Creative Commons License
This work by Joe Onisick and Define the Cloud, LLC is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License

Disclaimer

All brand and company names are used for identification purposes only. These pages are not sponsored or sanctioned by any of the companies mentioned; they are the sole work and property of the authors. While the author(s) may have professional connections to some of the companies mentioned, all opinions are that of the individuals and may differ from official positions of those companies. This is a personal blog of the author, and does not necessarily represent the opinions and positions of his employer or their partners.
©2025 Define The Cloud | WordPress Theme by SuperbThemes