ion-vpn

ion-vpn

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2103286-HA-IONVPN73462
Jump To Table - Results

View

Do Not Show Noisy Results
Do Not Show Results With Incomplete Data
Do Not Show Results With Little Change/Spread
List Notable Results

Statistics

Show Overall Harmonic Mean(s)
Show Overall Geometric Mean
Show Wins / Losses Counts (Pie Chart)
Normalize Results
Remove Outliers Before Calculating Averages

Graph Settings

Force Line Graphs Where Applicable
Convert To Scalar Where Applicable
Prefer Vertical Bar Graphs

Table

Show Detailed System Result Table

Run Management

Highlight
Result
Hide
Result
Result
Identifier
View Logs
Performance Per
Dollar
Date
Run
  Test
  Duration
ion-vpn
March 27 2021
  54 Minutes
ion-vpn-2
March 28 2021
  33 Minutes
Invert Hiding All Results Option
  44 Minutes


ion-vpnOpenBenchmarking.orgPhoronix Test SuiteIntel Core i3-2105 @ 3.10GHz (2 Cores / 4 Threads)ASUS Maximus IV Extreme-Z (0210 BIOS)16GB500GB Western Digital WDS500G2B0A + 2 x 4001GB Western Digital WD40EZRX-00S + 2 x 4001GB Western Digital WD40EZRZ-00W + 4001GB HGST HUS724040AL + 2 x 10001GB Seagate ST10000VX0004-1Z + 4001GB Seagate ST4000DM000-1F21 + 1000GB USB-SATA Bridgenouveaudrmfb (1100MHz)Realtek ALC8892 x Q2781Fedora 325.10.19-100.fc32.x86_64 (x86_64)GCC 10.2.1 20201125ext42560x1440systemd-nspawnProcessorMotherboardMemoryDiskGraphicsAudioMonitorOSKernelCompilerFile-SystemScreen ResolutionSystem LayerIon-vpn BenchmarksSystem Logs- Transparent Huge Pages: madvise- Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x17- itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Full generic retpoline STIBP: disabled RSB filling + srbds: Not affected + tsx_async_abort: Not affected

WireGuard + Linux Networking Stack Stress Test

This is a benchmark of the WireGuard secure VPN tunnel and Linux networking stack stress test. The test runs on the local host but does require root permissions to run. The way it works is it creates three namespaces. ns0 has a loopback device. ns1 and ns2 each have wireguard devices. Those two wireguard devices send traffic through the loopback device of ns0. The end result of this is that tests wind up testing encryption and decryption at the same time -- a pretty CPU and scheduler-heavy workflow. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgSeconds, Fewer Is BetterWireGuard + Linux Networking Stack Stress Testion-vpnion-vpn-2140280420560700SE +/- 6.90, N = 5SE +/- 0.68, N = 3640.50652.55
OpenBenchmarking.orgSeconds, Fewer Is BetterWireGuard + Linux Networking Stack Stress Testion-vpnion-vpn-2120240360480600Min: 614.16 / Avg: 640.5 / Max: 654.94Min: 651.23 / Avg: 652.55 / Max: 653.5