US11722367B2 - Method and apparatus for providing a service with a plurality of service nodes - Google Patents
Method and apparatus for providing a service with a plurality of service nodes Download PDFInfo
- Publication number
- US11722367B2 US11722367B2 US14/569,358 US201414569358A US11722367B2 US 11722367 B2 US11722367 B2 US 11722367B2 US 201414569358 A US201414569358 A US 201414569358A US 11722367 B2 US11722367 B2 US 11722367B2
- Authority
- US
- United States
- Prior art keywords
- data message
- psn
- service
- group
- load
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
- H04L41/0813—Configuration setting characterised by the conditions triggering a change of settings
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0895—Configuration of virtualised networks or elements, e.g. virtualised network function or OpenFlow elements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/40—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using virtualisation of network functions or resources, e.g. SDN or NFV entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/50—Network service management, e.g. ensuring proper service fulfilment according to agreements
- H04L41/5041—Network service management, e.g. ensuring proper service fulfilment according to agreements characterised by the time relationship between creation and deployment of a service
- H04L41/5054—Automatic deployment of services triggered by the service manager, e.g. service implementation by automatic configuration of network components
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/74—Address processing for routing
- H04L45/745—Address table lookup; Address filtering
- H04L45/7453—Address table lookup; Address filtering using hashing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/10—Flow control; Congestion control
- H04L47/12—Avoiding congestion; Recovering from congestion
- H04L47/125—Avoiding congestion; Recovering from congestion by balancing the load, e.g. traffic engineering
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/50—Queue scheduling
- H04L47/62—Queue scheduling characterised by scheduling criteria
- H04L47/622—Queue service order
- H04L47/6225—Fixed service order, e.g. Round Robin
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1001—Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
- H04L67/1031—Controlling of the operation of servers by a load balancer, e.g. adding or removing servers that serve requests
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/22—Parsing or analysis of headers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
- H04L43/0805—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
- H04L43/0817—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking functioning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/16—Threshold monitoring
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1001—Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
- H04L67/1004—Server selection for load balancing
- H04L67/1008—Server selection for load balancing based on parameters of servers, e.g. available memory or workload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1001—Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
- H04L67/1027—Persistence of sessions during load balancing
Definitions
- Load balancers are commonly used in datacenters to spread the traffic load to a number of available computing resources that can handle a particular type of traffic. For instance, load balancers are topologically deployed at the edge of the network and between different types of VMs (e.g., between webservers and application servers, and between application servers and the database servers). The load balancers are in some deployments standalone machines (e.g., F5 machines) that perform load balancing functions. Also, in some deployments, the load balancers are service virtual machines (VMs) that execute on the same host computing devices that execute the different layers of servers that have their traffic balanced by the load balancers.
- VMs service virtual machines
- the load balancers serve as chokepoint locations in the network topology because they become network traffic bottlenecks as the traffic load increases. Also, these deployments do not seamlessly grow and shrink the number of the computing devices that receive the load balanced traffic, as the data traffic increases and decreases.
- Some embodiments provide an elastic architecture for providing a service in a computing system.
- the service architecture uses a service node (SN) group that includes one primary service node (PSN) and zero or more secondary service nodes (SSNs).
- PSN primary service node
- SSNs secondary service nodes
- the service can be performed on a data message by either the PSN or one of the SSN.
- the PSN also performs a load balancing operation that assesses the load on each service node (i.e., on the PSN or each SSN), and based on this assessment, has the data messages distributed to the service node(s) in its SN group.
- the PSN in some embodiments also has one or more SSNs added to or removed from its SN group.
- the PSN in some embodiments directs a set of controllers to add (e.g., instantiate or allocate) or remove an SSN to or from the SN group.
- the PSN in some embodiments receives message load data from the controller set, which collects such data from each service node. In other embodiments, the PSN receives such load data directly from the SSNs.
- the PSN has the data messages distributed among the service nodes in its SN group based on its assessment of the message traffic load on the service nodes of the SN group.
- the PSN uses different techniques in different embodiments to distribute the data messages to the service node(s) in its group.
- the PSN receives each data message for which the service has to be performed.
- the PSN either performs the service on the data message, or re-directs the data message to an SSN to perform the service on the data message.
- the PSN uses different techniques, such as MAC redirect (for L2 forwarding), IP destination network address translation (for L3 forwarding), port address translation (for L4 forwarding), L2/L3 tunneling, etc.
- the PSN has a connection data store that maintains the identity of the service node that it previously identified for each data message flow, in order to ensure that data messages that are part of the same flow are directed to the same service node (i.e., to the PSN or the same SSN).
- the PSN configures a set of one or more front-end load balancers (FLBs) that receives the data messages before the PSN, so that the FLB set can direct the data messages to the PSN or the SSN.
- FLBs front-end load balancers
- the PSN receives the first data message of a new data message flow that is received by the FLB set so that the PSN can figure out how the new flow should be distributed.
- the PSN in some embodiments directs the data message to the SSN, and configures the FLB set to direct the data message's flow to the SSN.
- the PSN in some embodiments may have to receive data messages that are part of this flow (i.e., the flow that is directed to the particular SSN). In such situation, the PSN of some embodiments direct the data messages to the particular SSN, until the load balancer set can directly forward subsequent data messages of this flow to the particular SSN.
- the PSN configures the FLB set differently. For instance, in some embodiments, the PSN configures the FLB set by simply providing the identity (e.g., the MAC and/or IP address) of each service node in the SN group, and the FLB set uses its own load balancing scheme (e.g., a standard equal cost multipath, ECMP, scheme) to distribute the data message flows to the service nodes in the SN group in a stateful or stateless manner. In other embodiments, the PSN configures the FLB set by providing to the FLB set a load balancing parameter set that provides a particular scheme for the FLB set to use to distribute the data message flows to the service nodes in the SN group.
- the identity e.g., the MAC and/or IP address
- ECMP a standard equal cost multipath
- the PSN provides to the FLB set a hash table that defines multiple hash value ranges and a service node for each hash value range.
- a load balancer in the FLB set generates a hash value from a header parameter set of a data message flow, identifies the hash range (in the hash table) that contains the hash value, and selects for the data message flow the service node that is associated with the identified hash range.
- the load balancer in some embodiments stores the identity of the identified service node for the data message flow in a flow connection-state storage, which the load balancer can subsequently access to select the identified service node for subsequent data messages of the flow.
- the service nodes (PSN and SSNs), as well as some or all of the source compute nodes (SCNs) and destination compute nodes (DCNs) that send and receive messages to and from the service nodes, are machines (e.g., virtual machines (VMs) or containers) that execute on host computing devices.
- a host computing device in some embodiments can execute an arbitrary combination of SCNs, DCNs and service nodes.
- the host also executes one or more software forwarding elements (e.g., software switches and/or software routers) to interconnect the machines that execute on the host and to interconnect these machines (through the network interface of the host and intervening forwarding elements outside of the host) with other SCNs, DCNs, and/or service nodes that operate outside of the host.
- one or more SCNs, DCNs, and service nodes are standalone devices (i.e., are not machines that execute on a host computing device with other machines).
- the elastic service architecture of some embodiments can be used to provide different services in a computer network.
- the services can be any one of the traditional middlebox services, such as load balancing, firewall, intrusion detection, intrusion protection, network address translation (NAT), WAN (wide area network) optimizer, etc.
- the PSN of the service node group that includes the PSN and one or more SSNs in some embodiments performs a load balancing service in addition to the service performed by all the service nodes in the group.
- the PSN in some embodiments performs this load balancing service in order to ensure that the SN group's service is distributed among the service nodes of the group (i.e., in order to distribute the data message load among these service nodes).
- the PSN performs different load balancing operations in different embodiments. These operations range from re-directing data message flows directly to the SSNs in some embodiments, to configuring a FLB set to direct the data message flows to the service nodes in other embodiments.
- the SN group's service is load balancing.
- the PSN performs two types of load balancing.
- the first type of load balancing is the same load balancing that is performed by all of the service nodes in the group, while the second type of load balancing is a load balancing operation that the PSN performs to ensure that the first type of load balancing is distributed among the group's service nodes (including the PSN).
- the first type load balancing operation is based on L3, L4 and/or L7 parameters of the data messages, and each SN of the group performs this load balancing operation.
- the PSN in some embodiments also performs a second load balancing operation, which is an L2 load balancing operation (e.g., a load balancing operation that relies on the data message L2 parameters and on MAC redirect) that distribute the data messages (on which it does not perform the first type load balancing) to one or more other service nodes of the SN group.
- a second load balancing operation which is an L2 load balancing operation (e.g., a load balancing operation that relies on the data message L2 parameters and on MAC redirect) that distribute the data messages (on which it does not perform the first type load balancing) to one or more other service nodes of the SN group.
- L2 load balancing operation e.g., a load balancing operation that relies on the data message L2 parameters and on MAC redirect
- the first type load balancing operation is based on L4 and/or L7 parameters of the data messages.
- Each SN of the group performs this L4 and/or L7 load balancing operation.
- the PSN of some embodiments also performs an L2 and/or L3 load balancing operation (e.g., a load balancing operation that relies on the data message L3 parameters and IP address DNAT) to distribute the data messages (on which it does not perform the first type load balancing) to one or more other service nodes of the SN group.
- the PSN second type of load balancing operation in some embodiments might not require the PSN to directly re-direct the data message flows to the SSN.
- the PSN's second type load balancing might simply configure an FLB set to direct the data message flows to the service nodes.
- the PSN can configure the FLB set differently in different embodiments, e.g., by providing to the FLB set only the SN group membership data, or providing to the FLB set a hash table that for each of several header-parameter, specifies hash-value ranges identifies a service node.
- the SSNs of a SN group also re-direct the data message flows that they receive.
- the PSN supplies to an FLB set a SN group update each time a service node is added to or removed from the group.
- each FLB in the FLB set distributes the data message flows in a stateless manner.
- the FLB might send a new data message flow to a first service node based on the FLB's old distribution scheme.
- the FLB might send the data message flow to the a second service node based on the FLB's new distribution scheme.
- the first service node needs to re-direct the data messages for the new flow to the second service node that needs to process these data messages based on the new distribution scheme.
- the FLB set distributes data message flows based on its own load balancing distribution scheme
- each service node needs to perform this load balancing distribution scheme so that they can predict the service node that should receive the new data message flow based on an updated SN group membership.
- each SSN When the FLB set distributes data message flows based on load balancing parameter (LBP) set provided by the PSN (e.g., based on the hash table provided by the PSN), each SSN in some embodiments either (1) obtains the LBP set form the PSN, or (2) performs the same load balancing operations as the PSN in order to independently derive the LBP set that the PSN will provide to the FLB set. In these embodiments, each SSN uses the LBP set in order to re-direct a new message flow to the correct service node when the FLB set forwards the message flow incorrectly to the SSN.
- LBP load balancing parameter
- a first service node e.g., a PSN or an SSN
- a second service node might also need to re-direct to a second service node an old data message flow that it receives from the FLB set, because the second service node has previously been processing the data message flow and the FLB set statelessly has begun forwarding the data message flow to the first service node based on an update that it has received from the PSN.
- the service nodes in some embodiments synchronize in real-time flow connection-state data that identifies the flows that each of them is handling at any time.
- the flow connection-state data is synchronized through control channel communication between the service nodes.
- FIG. 1 illustrates an example service architecture of some embodiments of the invention.
- FIG. 2 illustrates a multi-host computer system of some embodiments of the invention.
- FIG. 3 conceptually illustrates a process that a primary service node (PSN) performs whenever the PSN receives a data message in some embodiments.
- PSN primary service node
- FIG. 4 illustrates an example of how service nodes are added to a service node (SN) group and how the group's PSN distributes the data traffic among the service node of the SN group.
- SN service node
- FIG. 5 illustrates an example of the secondary service nodes (SSNs) of one SN group are PSNs or SSNs of another SN group.
- SSNs secondary service nodes
- FIG. 6 illustrates an example of two different service node groups performing two different services for data messages that are sent to the same set of destination compute nodes after they are processed by the service nodes of groups.
- FIG. 7 illustrates a process that the PSN of a load balancing SN group performs in some embodiments.
- FIG. 8 illustrates an example of how load balancers are added to a load-balancing service group, and how the group's PSN distributes the data traffic among the load balancers of the group.
- FIG. 9 illustrates a process of a PSN of some embodiments that configures a set of one or more front end load balancers (FLBs) to distribute data message flows that the PSN identifies as flows that should be processed by other service nodes of the PSN's SN group.
- FLBs front end load balancers
- FIG. 10 illustrates an example of a PSN working with an FLB as service nodes are added to a SN group.
- FIG. 11 illustrates an example of each service node having a load balancer that performs the secondary load balancing operation to direct messages to other service nodes.
- FIG. 12 illustrates a process that a load balancer of a PSN or an SSN performs in some embodiments that have the PSN configure a stateless FLB set with periodic LBP set updates.
- FIG. 13 presents an example that is similar to the example illustrated in FIG. 11 , except that the service operation of the SN group is a load balancing operation.
- FIG. 14 illustrates an architecture of a host that executes one or more SVMs and one or more load balancers of some embodiments of the invention.
- FIGS. 15 and 16 presents examples of load balancing rules that are stored in the LB rule storage.
- FIG. 17 illustrates a process that the LB agent performs in some embodiments each time that it receives updated group memberships and/or global statistics from a controller set.
- FIG. 18 illustrates a process that the LB agent of the PSN SVM performs in some embodiments to elastically adjust the membership of the PSN's SN group.
- FIG. 19 illustrates a process that one or more controllers in the controller set perform in some embodiments.
- FIG. 20 illustrates an elastic SN group of some embodiments being used to elastically provide services at an edge of a network.
- FIG. 21 conceptually illustrates a computer system with which some embodiments of the invention are implemented.
- data messages refer to a collection of bits in a particular format sent across a network.
- data message may be used herein to refer to various formatted collections of bits that may be sent across a network, such as Ethernet frames, IP packets, TCP segments, UDP datagrams, etc.
- the service architecture uses a service node (SN) group that includes one primary service node (PSN) and zero or more secondary service nodes (SSNs).
- the service can be performed on a data message by either the PSN or one of the SSN.
- the PSN also performs a load balancing operation that assesses the load on each service node (i.e., on the PSN or each SSN), and based on this assessment, has the data messages distributed to the service node(s) in its SN group.
- the PSN in some embodiments also has one or more SSNs added to or removed from its SN group.
- the PSN in some embodiments directs a set of controllers to add (e.g., instantiate or allocate) or remove the SSN to or from the SN group.
- the PSN in some embodiments receives message load data from the controller set, which collects such data from each service node. In other embodiments, the PSN receives such load data directly from the SSNs.
- the elastic service architecture of some embodiments can be used to provide different services in a computer network.
- the services can be any one of the traditional middlebox services, such as load balancing, firewall, intrusion detection, intrusion protection, network address translation (NAT), WAN optimizer, etc.
- the PSN of the service node group that includes the PSN and one or more SSNs in some embodiments performs a load balancing service in addition to the service performed by all the service nodes in the group. As mentioned above, the PSN performs this load balancing service in order to ensure that the SN group's service is distributed among the service nodes of the group.
- This load balancing service of the PSN is different in different embodiments. This service ranges from re-directing data message flows directly to the SSNs in some embodiments, to configuring a front-end load balancer (FLB) set to direct the data message flows to the service nodes in other embodiments, as further described below.
- FLB front-end load balancer
- the PSN when the SN group's service is load balancing, the PSN performs two types of load balancing.
- the first type of load balancing is the same load balancing that is performed by all of the service nodes in the group, while the second type of load balancing is a load balancing operation that the PSN performs to ensure that the first type of load balancing is distributed among the group's service nodes (including the PSN).
- the first type load balancing operation is an L3, L4 and/or L7 load balancing operation
- the second type of load balancing operation is an L2 load balancing operation
- the first type load balancing operation is an L4 and/or L7 load balancing operation
- the second type of load balancing operation is an L2 and/or L3 load balancing operation.
- references to L2, L3, L4, and L7 layers are references respectively to the second data link layer, the third network layer, the fourth transport layer, and the seventh application layer of the OSI (Open System Interconnection) layer model.
- the PSN uses different techniques to distribute the data messages to one or more SSNs.
- the PSN receives each data messages for which the service has to be performed, and either performs the service on the data message, or re-directs the data message to an SSN to perform the service on the data message.
- the PSN configures an FLB set that receives the data messages before the PSN, so that the FLB set can direct the data messages to the PSN or the SSN.
- the PSN can configure the FLB set differently in different embodiments, e.g., by providing to the FLB set only the SN group membership data, by configuring the FLB set for each flow, or by providing to the FLB set a hash table that identifies a service node for each of several header-parameter, hash-value ranges.
- FIGS. 3 - 8 illustrate several examples of a PSN that does not use an FLB set to distribute the data messages to SSNs in its SN group
- FIGS. 9 - 13 illustrate several examples of a PSN that uses an FLB set to do this task.
- the service nodes (PSN and SSNs) as well as some or all of the source compute nodes (SCNs) and destination compute nodes (DCNs) that send and receives messages from the service nodes, are machines (e.g., virtual machines (VMs) or containers) that execute on host computing devices.
- VMs virtual machines
- the elastic service architecture in some embodiments is used in computer networks that have one or more SCNs, DCNs, and service nodes (PSN and SSNs) operate as standalone devices (i.e., as machines that do not execute on a host computing device with other machines).
- FIG. 1 illustrates an example service architecture 100 of some embodiments of the invention.
- two different sets of elastically adjustable service node groups 150 and 155 are deployed between three groups 160 , 165 , and 170 of compute nodes.
- the compute nodes in each CN group and the service nodes in each SN groups are virtual machines that execute on six host computing devices 105 - 130 in a datacenter.
- the service nodes in SN group 150 are designated with the acronym SNG 1
- the service nodes in SN group 155 are designated with the acronym SNG 2 .
- the compute nodes are referred to as guest VMs (GVMs) while the service nodes are referred to as service VMs (SVMs).
- GVMs guest VMs
- SVMs service VMs
- the service node group 150 has three service nodes, while the service node group 155 has two service nodes. In each of these groups, one service node is a primary service node, with each other node being a secondary service node.
- the two SN groups 150 and 155 can perform the same service operation (e.g., load balancing operation) or can perform two different service operations (e.g., a firewall operation for SN group 150 and a load balancing operation for SN group 155 ). However, even when the two SN groups perform the same service operation, the service operation of one SN group is distinct and independent from the service operation of the other SN group (e.g., the SN groups perform two different firewall operations).
- Each CN group can include an arbitrary collection of compute nodes, or it can be a collection of a particular type of compute nodes.
- the CN groups 160 , 165 , and 170 in some deployments are a collection of web servers 160 , application servers 165 , and database server 170 , while in other embodiments one CN group (e.g., group 165 ) includes a collection of different types of servers.
- a host computing device in some embodiments can execute an arbitrary combination of SCN, DCN and SN virtual machines.
- FIG. 1 illustrates that in addition to the GVMs and SVMs that execute on the hosts, each host also executes a software forwarding element (SFE) 135 in some embodiments.
- the SFE 135 on a host communicatively couples the VMs of the host to each other, and to other devices outside of the host (e.g., VMs on other hosts) through a network interface card (NIC) of the host and the intervening network fabric (such as switches and routers) outside of the host.
- NIC network interface card
- Examples of SFEs include software switches, software routers, etc.
- the VMs execute on top of a hypervisor, which is a software layer that enables the virtualization of the shared hardware resources of the host.
- the hypervisor provides the SFE functionality on a host computing device, while in other embodiments, the forwarding element functionality is provided by another software module or hardware component (e.g., the network interface card) of the host computing device.
- each service node in an SN group maintains statistics regarding the message traffic load that it processes.
- Each service node in some embodiments forwards the collected statistics to a set of controllers, which aggregates these statistics and distributes aggregated load data to the PSN in the SN group.
- the SSNs directly forward their collected statistics to the PSN.
- the PSN of a SN group uses the aggregated load data to control how the data message flows are directed to different service nodes in its group.
- the aggregated load data are also used to determine when new service nodes should be added to or removed from a SN group.
- each SSN also receives the load data from the controller set or from other service nodes, in order to compute the load balancing parameters that the PSN will compute.
- FIG. 2 illustrates a multi-host system 200 of some embodiments that includes a controller set that gathers statistics from the service nodes and distributes aggregated statistics to the PSNs.
- this system includes multiple hosts 205 - 215 , a set of one or more controllers 225 , and a network 275 .
- the network 275 communicatively couples the hosts with each other and with the controller set.
- the network is a local area network (LAN), a wide area network (WAN), and/or a network of networks (e.g., Internet).
- LAN local area network
- WAN wide area network
- Internet a network of networks
- the hosts 205 - 215 are similar to the hosts 105 - 130 of FIG. 1 .
- the communicative couplings between each SFE on a host and the GVMs and SVMs on the host are conceptually illustrated.
- the SFE on the host communicatively couples the GVMs and SVMs of the host to each other, and to other devices outside of the host (e.g., VMs on other hosts) through the host's NIC and the intervening network 275 .
- FIG. 2 also shows each host 205 , 210 , or 215 having an SVM agent 260 for communicating with the controller set 225 .
- the SVM agent can receive configuration data for configuring the operation of the SVMs that operate on the agent's host. Also, in some embodiments, the SVM agent forwards message load statistics from the SVMs on the agent's host to the controller set 225 . In some embodiments, the SVM agent aggregates and/or analyzes some of the statistics before relaying processed statistics to the controller set, while in other embodiments the SVM agent relays collected raw statistics to the controller set.
- the SVM agent When a PSN executes on the agent's host, the SVM agent of some embodiments receives global load statistics or load balancing parameters from the controller set 225 to supply to any PSN that executes on its host. In some embodiments, the SVM agent receives aggregated statistics from the controller set, analyzes the aggregated statistics, and generates and/or to adjusts the load balancing parameters of the PSN that executes on the agent's hosts.
- the SVM agents are not used at all, or are used for only some of the above-described operations.
- the PSN and SSN SVMs directly send their load statistic data to the controller set 235 , and/or the PSN SVMs directly receive the global statistic data from the controller set 235 .
- the SVM agents are not used to compute or adjust the load balancing parameters of the PSNs, as the PSN SVMs compute or adjust these values.
- the SVM agents are not used to configure the SVMs.
- the controller set 225 communicates directly with the SVMs to configure their operations.
- the controller set 225 in some embodiments receives load statistic data from the SVMs of each SN group, generates global load statistic data from the received data, and distributes the global load statistic data to the PSN of the SN group.
- the SSNs send their load statistics data directly to the PSN of their group.
- the SVMs provide the load statistic data (e.g., to the controller set or to the PSN) in terms of different metrics. Examples of such metrics include number of data message flows currently being processed, number of data messages processed within a particular time period, number of payload bytes in the processed messages, etc.
- the controller set distributes the global load statistic data in different forms in different embodiments.
- global load data is in the same format as the format that the controller set receives the load data from the service nodes, except that the global load data is an aggregation of the received statistic data from the different service nodes.
- the controller set processes the load statistic data from the SVMs to produce processed global statistic data that is in a different format or is expressed in terms of different metrics than the load statistic data that it receives from the service nodes.
- the PSN of a SN group in some embodiments generates load balancing parameter (LBP) set for distributing the data message flows (e.g., new data message flows) to the service nodes of the group.
- LBP load balancing parameter
- the PSN then uses the LBP set to distribute the data message flows to the service nodes of its SN group, while in other embodiments, the PSN uses the LBP set to configure an FLB set to distribute the data message flows.
- the PSN in some embodiments uses the LBP set to distribute the data message flows (e.g., because the FLB set statelessly distributes the load or has not yet reconfigured for a new LBP set that is provided by the PSN).
- an SSN might also have to distribute the data message flows during this interim time period for similar reasons. To do this, each SSN of a SN group would have to receive the global load statistic data from the controller set, or the global load statistic data or LBP set from the PSN (directly from the PSN or indirectly through the controller set).
- the controller set 225 of some embodiments instead of distributing global load statistic data, the controller set 225 of some embodiments generates LBP set from the statistic data that it receives from the service nodes of an SN group, and distributes the load balancing parameter set to the PSN of the SN group. In some embodiments, the PSN then uses this load balancing parameter set to distribute the data message flows to the service nodes of its SN group, while in other embodiments, the PSN uses the load balancing parameter set to configure an FLB set to distribute the data message flows.
- the PSN in some embodiments might have to use the load balancing parameter set to distribute the data message flows.
- an SSN might also have to distribute the data message flows for the same reasons, and for this, the SSN would have to receive LBP set from the controller set.
- the controller set 225 in some embodiments also adds service nodes to an SN group, or removes service nodes from the SN group, based on the monitored load on the service nodes in the SN group. In some embodiments, the controller set 225 adds or removes a service node based on its own determination, while in other embodiments the controller set adds or removes a service node in response to a request from the PSN of the SN group. In some embodiments, the controller set 225 adds a service node by instantiating a new SVM and adding this SVM to the SN group. In other embodiments, the controller set 225 adds the service node by allocating a previously instantiated SVM to the SN group.
- the controller set 225 provide control and management functionality for defining (e.g., allocating or instantiating) and managing one or more VMs on the host computing devices 205 - 215 .
- the controller set 225 also provide control and management functionality for defining and managing multiple logical networks that are defined on the common software forwarding elements of the hosts.
- the controller set 225 includes multiple different sets of one or more controllers for performing different sets of the above-described controller operations.
- FIGS. 3 - 8 illustrate several examples of a PSN that directly distributes the data messages to the SSN of its SN group without the use of an FLB set.
- FIG. 3 conceptually illustrates a process 300 that such a PSN performs whenever the PSN receives a data message in some embodiments.
- the process 300 identifies one service node in the PSN's SN group that should process the received data message, and then directs the identified service node to perform the SN group's service for the received data message.
- the identified service node can be the PSN itself, or it can be an SSN in the SN group.
- the process 300 starts (at 305 ) when the PSN receives a data message.
- the received data message is addressed to the SN group.
- the received data message is a data packet that contains the virtual IP (VIP) address of the SN group as its destination address.
- VIP virtual IP
- the group address is not only defined by the VIP address, but also by the port number of the service.
- the SN group address is the address of the PSN of the group.
- the process determines (at 310 ) whether the received message is part of a particular data message flow for which the PSN has previously processed at least one data message. To make this determination, the process examines (at 310 ) a flow connection-state data storage that stores (1) the identity of each of several data message flows that the PSN previously processed, and (2) the identity of the service node that the PSN previously identified as the service node for processing the data messages of each identified flow. In some embodiments, the process identifies each flow in the connection-state data storage in terms of one or more flow attributes, e.g., the flow's five tuple header values, which are the source IP address, destination IP address, source port, destination port, and protocol.
- flow attributes e.g., the flow's five tuple header values
- connection-state data storage is hash indexed based on the hash of the flow attributes (e.g., of the flow's five tuple header values).
- the PSN generates a hash value from the header parameter set of a data message, and then uses this hash value to identify one or more locations in the storage to examine for a matching header parameter set (i.e., for a matching data message flow attribute set).
- the process When the process identifies (at 310 ) an entry in the flow connection-state data storage that matches the received data message flow's attributes (i.e., when the process determines that it previously processed another data message that is part of the same flow as the received data message), the process directs (at 315 ) the received data message to the service node (in the SN group) that is identified in the matching entry of the connection-state data storage (i.e., to the service node that the PSN previously identified for processing the data messages of the particular data message flow). This service node then performs the service on the data message, and augments the statistics that it maintains (e.g., the data message count, the byte count, etc.) regarding the data messages that it processes.
- This service node can be the PSN itself, or it can be an SSN in the SN group.
- the process determines (at 310 ) that the connection-state data storage does not store an entry for the received data message (i.e., determines that it previously did not process another data message that is part of the same flow as the received data message)
- the process transitions to 320 .
- the connection-state data storage periodically removes old entries that have not matched any received data messages in a given duration of time. Accordingly, in some embodiments, when the process determines (at 310 ) that the connection-state data storage does not store an entry for the received data message, the process may have previously identified a service node for the data message's flow, but the matching entry might have been removed from the connection-state data storage.
- the process determines whether the received data message should be processed locally by the PSN, or remotely by another service node of the SN group.
- the PSN in some embodiments performs a load balancing operation that identifies the service node for the received data message flow based, based on the load balancing parameter set that the PSN maintains for the SN group at the time that the data message is received.
- the load balancing parameter set is adjusted in some embodiments (1) based on updated statistic data regarding the traffic load on each service node in the SN group, and (2) based on service nodes that are added to or removed from the SN group.
- the process 300 performs different load balancing operations (at 320 ) in different embodiments.
- the load balancing operation relies on L2 parameters of the data message flows (e.g., generates hash values form the L2 parameters, such as source MAC addresses, to identify hash ranges that specify service nodes for the generated hash values) to distribute the data messages to service nodes, while in other embodiments, the load balancing operations relies on L3/L4 parameters of the flows (e.g., generates hash values form the L3/L4 parameters, such as five tuple header values, to identify hash ranges that specify service nodes for the generated hash values) to distribute the data messages to service nodes.
- the load balancing operations (at 320 ) use different techniques (e.g., round robin techniques) to distribute the load amongst the service nodes.
- the process determines (at 320 ) that the PSN should process the received data message, the process directs (at 325 ) a service module of the PSN to perform the SN group's service on the received data message. Based on this operation, the PSN's service module also augments (at 325 ) the statistics that it maintains (e.g., the data message count, the byte count, etc.) regarding the data messages that the PSN processes.
- the process 300 also creates an entry in the flow connection-state data storage to identify the PSN as the service node for processing data messages that are part of the same flow as the received data message. In some embodiments, this entry identifies the PSN and identifies the received data message header values (e.g., five tuple values) that specify the message's flow.
- the process determines (at 320 ) that based on its load balancing parameter set, the PSN should not process the received data message, the process identifies (at 320 ) another service node in the PSN's SN group to perform the service on the data message. Thus, in this situation, the process directs (at 330 ) the message to another service node in the PSN's SN group.
- the PSN in different embodiments uses different techniques, such as MAC redirect (for L2 forwarding), IP destination network address translation (for L3 forwarding), port address translation (for L4 forwarding), L2/L3 tunneling, etc.
- the process 300 changes the MAC address to a MAC address of the service node that it identifies at 320 .
- the process changes the MAC address to a MAC address of another SFE port in a port group that contains the SFE port connected with the PSN.
- the service nodes (e.g., SVMs) of a SN group are assigned ports of one port group that can be specified on the same host or different hosts.
- the PSN when the PSN wants to redirect the data message to another service node, it replaces the MAC address of the PSN's port in the data message with the MAC address of the port of the other service node, and then provides this data message to the SFE so that the SFE can forward it directly or indirectly (through other intervening forwarding elements) to the port of the other service node.
- the PSN replaces the destination IP address in the data message to the destination IP address of the other service node, and then provides this data message to the SFE so that the SFE can forward it directly or indirectly (through other intervening forwarding elements) to the other service node.
- the initial destination IP address in the data message that gets replaced is the VIP of the SN group. This VIP in some embodiments is the IP address of the PSN.
- the PSN To redirect the data message to the other service node through port address translation, the PSN replaces the destination port address in the data message to the destination port address of the other service node, and then uses this new port address to direct the data message to the other service node.
- the PSN's network address translation may include changes to two or more of the MAC address, IP address, and port address.
- the process After directing (at 330 ) the data message to the other service node, the process creates (at 335 ) an entry in the connection-state data storage to identify the other service node as the service node for processing data messages that are part of the same flow as the received data message. In some embodiments, this entry identifies (1) the other service node and (2) the received data message header values (e.g., five tuple values) that specify the message's flow. After 335 , the process ends.
- this entry identifies (1) the other service node and (2) the received data message header values (e.g., five tuple values) that specify the message's flow.
- FIG. 4 illustrates an example of how service nodes are added to a SN group 400 , and how the group's PSN distributes the data traffic among the service node of the SN group.
- This example is illustrated in three stages 405 - 415 that illustrate the operation of the SN group at three different instances in time.
- the first stage 405 illustrates that at a time T 1 , the SN group just includes the PSN 420 .
- the PSN 420 has a load balancer (LB) and a service virtual machine (SVM 1 ).
- LB load balancer
- SVM 1 service virtual machine
- the PSN receives all data messages on which the SN group has to perform its service, performs this service on these messages, and then directs these messages to their destination compute nodes 425 .
- the destination node for a data message after a service node performs a service on the data message is the source compute node that sent the data message directly or indirectly to the service node group.
- the service node is deployed at the edge of a network, and the destination node for a data message that a service node processes, is the compute node or forwarding element inside or outside of the network to which the service node is configured to send its processed messages.
- the service node identifies the destination node for a data message that it processes based on the data message's header parameters and based on the service node's configured rules that control its operation.
- the second stage 410 illustrates that a time T 2 , the SN group has been expanded to include another service node, SSN 1 , which is implemented by a second service virtual machine, SVM 2 .
- the service node SSN 1 is added to the group because the data message load on the group has exceeded a first threshold value.
- the controller set 225 in some embodiments adds SSN 1 when it detects that the data message load has exceeded the first threshold value, or when the PSN detects this condition and directs the controller set to add SSN 1 .
- the controller set or PSN in different embodiments quantify the data message load based on different metrics.
- these metrics include one or more of the following parameters: (1) number of flows being processed by the SN group or by individual service nodes in the group, (2) number of packets being processed by the SN group or by individual service nodes in the group, (3) amount of packet data being processed by the SN group or by individual service nodes in the group.
- the second stage 410 also illustrates that time T 2 the PSN performs the SN group's service on some of the data message flows, while directing other data message flows to SSN 1 so that this service node can perform this service on these other flows.
- the PSN or SSN 1 directs the data message to one of the destination compute nodes that should receive the data message after the SN group processes them.
- the PSN performs a load balancing (LB) operation before performing its own SN group service.
- the LB operation is the operation that determines which service node in the SN group should perform the group's service on each data message that the PSN receives.
- the LB operation is also the operation that determines when service nodes should be added to or removed from the SN group.
- the third stage 415 illustrates that a time T 3 , the SN group has been expanded to include yet another service node, SSN 2 , which is a third service virtual machine, SVM 3 .
- the service node SSN 2 is added to the group because the data message load on the group, or on SVM 1 and/or SVM 2 , has exceeded a second threshold value, which is the same as the first threshold value in some embodiments or is different than the first threshold value in other embodiments.
- the controller set 225 in some embodiments adds SSN 2 when it or the PSN detects that the data message load has exceeded the second threshold value.
- the third stage 415 also illustrates that time T 3 , the PSN performs the SN group's service on some of the data message flows, while directing other data message flows to SSN 1 or SSN 2 , so that these service nodes can perform this service on these other flows.
- the service node directs the data message to one of the destination compute nodes that should receive the data message after the SN group processes them.
- the SSNs of one SN group are PSNs or SSNs of another SN group.
- FIG. 5 illustrates an example of this by showing two operational stages 510 and 515 of two different SN groups 500 and 505 .
- the two operational stages 510 and 515 show the operation of each SN group at two different instances in time.
- the first stage 510 illustrates that at a time T 1 , the SN group 500 just includes PSN 1 , while SN group 505 just includes PSN 2 .
- the service operations of PSN 1 are performed by SVM 1
- the service operations of PSN 2 are performed by SVM 2 .
- each PSN has a load balancer to perform its load balancing operation to distribute the load among the service nodes in its SN group.
- PSN 1 receives all data messages on which the SN group 500 has to perform its service, performs this service on these messages, and then directs these messages to a first set of destination compute nodes 525 .
- PSN 2 receives all data messages on which the SN group 505 has to perform its service, performs this service on these messages, and then directs these messages to a second set of destination compute nodes 530 , which is different than the first set of compute nodes 525 .
- the second stage 515 illustrates that a time T 2 , the SN group 500 has been expanded to include SVM 2 as a service node SSN 1 . Accordingly, at this stage, SVM 2 performs the service operations of PSN 1 of SN group 505 , and the service operations of SSN 1 of SN group 500 .
- the controller set or PSN 1 decides to add SVM 2 as service node SSN 1 to SN group 500 because the data message load on this group (i.e., on PSN 1 ) has exceeded a first threshold value (as detected by the controller set or the PSN 1 ) and SVM 2 has excess capacity to handle service operations for SN group 500 .
- the second stage 515 also illustrates that time T 2 the PSN 1 performs the service of SN group 500 on some of the data message flows, while directing other data message flows to SVM 2 so that SVM 2 can perform the service of group 500 on these other flows.
- the SVM 2 not only performs the service of group 500 on the flows passed by the PSN 1 , but also performs the service of group 505 on the message flows that it receives for group 505 .
- the SVM directs the data message to one of the first set of destination compute nodes 525 .
- this SVM directs the data message to one of the second set of destination compute nodes 530 .
- Some embodiments do not allow one SN group to add an underutilized SVM of another SN group (i.e., to use the excess capacity of another service node group's underutilized SVM). However, some of these embodiments allow one SN group to add a service node by instantiating or utilizing a new SVM on a host that executes the PSN or SSN of another SN group. In this manner, these embodiments allow one SN group to capture the underutilized computational capacity of another group's host.
- FIG. 5 illustrates an example of two different service node groups 600 and 605 performing two different services for data messages that are sent to the same set of destination compute nodes 625 after they are processed by the service nodes of groups 600 and 605 .
- FIGS. 5 and 6 illustrate the only difference between the examples of FIGS. 5 and 6 is that in FIG. 5 , the SN groups 500 and 505 direct the processed data messages to two different sets of compute nodes 525 and 530 , while in FIG. 6 , the SN groups 600 and 605 direct the processed data messages to the same set of compute nodes 625 .
- the service of a SN group is load balancing traffic that a set of SCNs sends to a set of two or more DCNs.
- the SN group's PSN performs two types of load balancing.
- the first type of load balancing is the same load balancing that is performed by all of the service nodes in the group, while the second type of load balancing is a load balancing operation that the PSN performs to ensure that the first type of load balancing is distributed among the group's service nodes (including the PSN).
- the first type load balancing operation is an L3, L4 and/or L7 load balancing operation
- the second type of load balancing operation is an L2 load balancing operation
- the first type load balancing operation is an L4 and/or L7 load balancing operation
- the second type of load balancing operation is an L2 and/or L3 load balancing operation.
- An LN load balancing operation distributes the load amongst the DCNs based on LN header parameters of the data messages, where N is an integer that can be 2, 3, 4, or 7.
- the load balancing operation distributes the load amongst the DCNs based on different layer header parameters.
- the load balancer in some embodiments generates a hash of the L2 and L3 header values of the data message flow and identifies a DCN for the data message flow based on the L2 and L3 header values.
- the load balancer in some embodiments uses the flow's L2 and L3 header values to identify a load balancing rule that provides load balancing criteria for selecting a DCN for the data message flow (e.g., by using the criteria to pick the DCN in a round robin manner).
- FIG. 7 illustrates a process 700 that the PSN of a load balancing SN group performs in some embodiments.
- This process is similar to the process 300 of FIG. 3 , except that the service that is performed by the SN group is a load balancing operation that distributes data messages among the compute nodes of a DCN group.
- the PSN process 700 (1) performs a load balancing operation (referred to above and below as the second type of load balancing), to identify one load balancer in the SN group that should process the received data message, and then (2) directs the data message to the identified load balancer to perform another type of load balancing operation (referred to above and below as the first type of load balancing) on the data message.
- the identified load balancer can be the PSN itself, or it can be an SSN in the SN group.
- the process 700 starts (at 705 ) when the PSN receives a data message.
- the received data message is addressed to the SN group.
- the received data message is a data packet that contains the virtual IP (VIP) address of the SN group as its destination address.
- the SN group address is the IP address of the PSN of the group.
- the process determines (at 710 ) whether the received message is part of a particular data message flow for which the PSN has previously processed at least one data message. To make this determination, the process examines (at 710 ) a flow connection-state data storage that stores (1) the identity of each of several data message flows that the PSN previously processed, and (2) the identity of the load balancer that the PSN previously identified as the load balancer for processing the data messages of each identified flow.
- the process 700 identifies each flow in the connection-state data storage in terms of one or more flow attributes, e.g., the flow's five tuple header values.
- the connection-state data storage is hash indexed based on the hash of the flow attributes (e.g., of the flow's five tuple header values).
- the process When the process identifies (at 710 ) an entry in the connection-state data storage that matches the received data message flow's attributes (i.e., when the process determines that it previously processed another data message that is part of the same flow as the received data message), the process directs (at 715 ) the received data message to the load balancer (in the SN group) that is identified in the matching entry of the connection-state data storage (i.e., to the load balancer that the PSN previously identified for processing the data messages of the particular data message flow). This load balancer then performs the first type of load balancing operation on the data message to direct the received data message to one compute node in the DCN set.
- This load balancer also augments the statistics that it maintains (e.g., the data message count, the byte count, etc.) regarding the data messages that it processes.
- This load balancer can be the PSN itself, or it can be an SSN in the SN group. After 715 , the process ends.
- the process determines (at 720 ) whether the received data message should be processed locally by the PSN, or remotely by another load balancer of the SN group.
- the PSN in some embodiments performs the second type of load balancing operation that relies on a second set of load balancing parameters that the PSN maintains for the SN group at the time that the data message is received.
- the second type of load balancing operation is based on different load balancing parameter sets in different embodiments.
- the second type of load balancing operation is an L2 load balancing operation that relies on load balancing parameter set that are defined in terms of L2 parameters.
- the second type of load balancing operation is an L2 and/or L3 load balancing operation that relies on load balancing parameter set that are defined in terms of L2 and/or L3 parameters.
- the load balancing parameter set is adjusted in some embodiments (1) based on updated statistic data regarding the traffic load on each load balancer in the SN group, and (2) based on load balancers that are added to or removed from the SN group.
- the process determines (at 720 ) that the PSN should process the received data message
- the process directs (at 725 ) a load balancer module of the PSN to perform the first type of load balancing operation on the received data message.
- the first type of load balancing operation relies on a first set of load balancing parameter that the PSN maintains for the DCN group at the time that the data message is received.
- the first type of load balancing operation is based on different load balancing parameter sets in different embodiments.
- the first type load balancing operation is an L3, L4 and/or L7 load balancing operation and the load balancing parameter set is defined in terms of L3, L4 and/or L7 parameters.
- the first type load balancing operation is an L4 and/or L7 load balancing operation and the load balancing parameter set is defined in terms of L4 and/or L7 parameters.
- an LB parameter set includes load balancing criteria that the load balancer uses to select a destination for the message (e.g., to select a destination in a weighted round robin fashion).
- an LB parameter set includes a hash table that specifies several hash value ranges and a destination for each hash value range. The load balancer generates a hash value from a set of header values (e.g., the L3, L4 and/or L7 parameter) of a data message, and then selects for the message the destination that is associated with the hash-value range that contains the generated hash value.
- Some embodiments uses the same load balancing approaches (e.g., hashing approaches) for the first and second load balancing operations of the PSN, while other embodiments uses different load balancing approaches (e.g., a hashing approach and a round robin approach) sets for these load balancing operations of the PSN.
- load balancing approaches e.g., hashing approaches
- different load balancing approaches e.g., a hashing approach and a round robin approach
- the PSN also augments the statistics that it maintains (e.g., the data message count, the byte count, etc.) regarding the data messages that it distributes to the DCN identified at 725 .
- the process 700 also creates an entry in the connection-state data storage to identify the PSN as the load balancer for performing the first type of load balancing operation on the data messages that are part of the same flow as the received data message. In some embodiments, this entry identifies the PSN and identifies the received data message header values (e.g., five tuple values) that specify the message's flow.
- the process determines (at 720 ) that based on its second set of load balancing parameters, the PSN should not distribute the received data message to one of the DCNs, the process identifies (at 720 ) another load balancer in the PSN's SN group to distribute the data message to a DCN. Thus, in this situation, the process directs (at 730 ) the message to another load balancer in the PSN's SN group.
- the PSN uses different techniques, such as MAC redirect (for L2 forwarding), IP destination network address translation (for L3 forwarding), port address translation (for L4 forwarding), L2/L3 tunneling, etc. These techniques were described above by reference to operation 330 of the process 300 of FIG. 3 .
- the process After directing (at 730 ) the data message to the other load balancer, the process creates (at 735 ) an entry in the connection-state data storage to identify the other load balancer as the service node for load balancing the data messages that are part of the same flow as the received data message. In some embodiments, this entry identifies (1) the other service node and (2) the received data message header values (e.g., five tuple values) that specify the message's flow. After 735 , the process ends.
- this entry identifies (1) the other service node and (2) the received data message header values (e.g., five tuple values) that specify the message's flow.
- the PSN's distribution of the data messages to other load balancers in its load balancing service group is based on the second set of load balancing parameters that is adjusted based on message load data aggregated and distributed by the controller set in some embodiments.
- the data aggregated and distributed by the controller set also updates the first set of load balancing parameters that the load balancers in the PSN's load balancer group use to distribute the data messages amongst the DCNs in the DCN group. Examples of modifying such load balancing operations based on dynamically gathered and updated message load data is described in U.S. patent application Ser. No. 14/557,287 now issued as U.S. Pat. No. 10,320,679.
- FIG. 8 illustrates an example of how load balancers are added to a load-balancing service group 800 , and how the group's PSN distributes the data traffic among the load balancers of the group.
- This example is similar to the example illustrated in FIG. 4 , except that the service nodes are load balancers.
- FIG. 8 illustrated three operational stages 805 - 815 of the service group 800 at three different instances in time.
- the first stage 805 illustrates that at a time T 1 , the service group 800 just includes the PSN 820 .
- the PSN receives all the data messages that have to be load balanced, and based on a first set of load balancing parameters, distributes these messages among the compute nodes of a DCN group 825 .
- the PSN 820 is shown to include two load balancers, which are LB 1 _ 1 and LB 2 .
- LB 1 _ 1 is a first type load balancer that distributes the data messages between the compute nodes of the DCN group
- LB 2 is a second type load balancer that distributes the data messages between the first type load balancers of the service group 800 so that one of these load balancers can distribute the data messages between the compute nodes of the DCN group 825 .
- the PSN 820 is the only first type load balancer of the service group 800 , so the PSN's second type load balancer at this stage simply forwards all the data messages to the PSN's LB 1 _ 1 .
- the second stage 810 illustrates that a time T 2 , the service group 800 has been expanded to include a service node SSN 1 , which in this example is a load balancer LB 1 _ 2 .
- the LB 1 _ 2 is added to the group because the data message load on the group has exceeded a first threshold value.
- the controller set 225 in some embodiments adds LB 1 _ 2 when it detects that the data message load has exceeded the first threshold value, or when the PSN detects this condition and directs the controller set to add this secondary service node.
- the controller set or PSN in different embodiments quantify the data message load based on different metrics, such as the metrics described above (e.g., by reference to FIG. 4 ).
- the second stage 810 also illustrates that at time T 2 , the LB 1 _ 1 performs the group's load balancing on some of the data message flows, while directing other data message flows to LB 1 _ 2 so that this load balancer can perform this service on these other flows.
- the first type load balancing operation that either the LB 1 _ 1 or LB 1 _ 2 performs on a data message, directs the data message to one of the compute nodes in the DCN group 825 .
- the PSN's LB 2 performs the second load balancing operation before performing the first load balancing operation.
- the second load-balancing operation is the operation that determines which first type load balancer in the service group 800 should distribute each data message among the DCNs.
- the third stage 815 illustrates that a time T 3 , the SN group has been expanded to include yet another service node SSN 2 , which in this example is a load balancer LB 1 _ 3 .
- the load balancer LB 1 _ 3 is added to the group because the data message load on the group or on the PSN or SSN 1 has exceeded a second threshold value.
- the controller set 225 in some embodiments adds LB 1 _ 3 when it or the PSN detects that the data message load has exceeded the second threshold value.
- the third stage 815 also illustrates that at time T 3 , the PSN distributes some of the data message flows among the DCNs, while directing other data message flows to LB 1 _ 2 and LB 1 _ 3 so that these load balancers can distribute these other flows among the DCNs.
- FIG. 9 illustrates a process 900 of a PSN of some embodiments that configures a set of one or more FLBs to distribute data message flows that the PSN identifies as flows that should be processed by other service nodes of the PSN's SN group. This process is identical to the process 300 of FIG.
- the process 900 includes an operation 945 that sends configuration data to the FLB set to configure this set to forward data messages that are part of a message flow that should be processed by another service node (based on the determination at 320 ), to the other service node.
- the PSN After sending (at 945 ) the configuration data to the FLB set, the PSN might continue to receive data messages for a data message flow that should be directed to another service node because the FLB set has not yet been reconfigured based on the sent configuration data, and therefore continues to send data messages of the redirected flow to the PSN. In a subsequent iteration for a data message of a flow that should be directed to another service node, the process forwards the data message to the other service node at 315 .
- FIG. 10 illustrates an example of a PSN working with a front-end load balancer 1050 as service nodes are added to a SN group 1000 .
- This example is similar to the example illustrated in FIG. 4 except that in FIG. 10 , there is now the front-end load balancer 1050 that directs the data message flows to the service nodes in the SN group 1000 .
- the front-end load balancer 1050 is a hardware appliance (e.g., an F5 load balancer), standard switch, or high-end software switch, while the service nodes in the SN group 1000 are SVMs executing on host computing devices.
- two or more front-end load balancers are used in some embodiments of the invention to distribute the load among the service nodes of one or more SN groups.
- FIG. 10 illustrates three operational stages 1005 - 1015 of the SN group 1000 at three different instances in time.
- the first stage 1005 illustrates that at a time T 1 , the SN group just includes the PSN 1020 .
- the PSN is formed by (1) a service virtual machine SVM 1 , which performs the service of the SN group, and (2) a load balancer LB, which performs a load balancing operation that identifies the service node in the SN group that should perform the group's service on each data message that the PSN receives.
- the load balancer directs all the data messages to its SVM 1 , which performs the SN group's service on these messages and then directs these messages to their destination compute nodes 1025 .
- the second stage 1010 illustrates that at a time T 2 , the SN group 1000 has been expanded to include another service node, SSN 1 , which is the service virtual machine SVM 2 .
- the service node SSN 1 is added to the group because the data message load on the group has exceeded a first threshold value, as quantified by a set of metrics (such as those described above by reference to FIG. 4 ).
- the controller set 225 in some embodiments adds SSN 1 when it detects that the data message load has exceeded the first threshold value, or when the PSN detects this condition and directs the controller set to add SSN 1 .
- the second stage 1010 also illustrates that at time T 2 , the PSN configures the load balancer to direct some of the flows to the PSN while directing other flows to SSN 1 . Because of this configuration, the PSN performs the SN group's service on some of the data message flows, while SSN 1 performs this service on other data message flows.
- the second stage 1010 also shows that the load balancer LB of the PSN 1020 directs some of the data message flows to SSN 1 for this service node to process. These directed messages are those that the SSN 1 has to process, but the PSN receives because the front-end load balancer 1050 has not yet been configured to forward these data messages to SSN 1 . As shown, once either the PSN or SSN 1 performs the service on a data message, the PSN or SSN 1 directs the data message to one of the destination compute nodes 1025 that should receive the data message after the SN group processes them.
- the third stage 1015 illustrates that at time T 3 , the SN group 1000 has been expanded to include yet another service node, SSN 2 , which is the service virtual machine SVM 2 .
- the service node SSN 2 is added to the group because the data message load on the group, or on PSN and/or SSN 1 , has exceeded a second threshold value, as quantified by a set of metrics like those described above.
- the controller set 225 in some embodiments adds SSN 2 when it or the PSN detects that the data message load has exceeded the second threshold value.
- the third stage 1015 also illustrates that at time T 3 , the PSN configures the load balancer 1050 to distribute the flows amongst all the SN group members, i.e., amongst PSN, SSN 1 , and SSN 2 . Because of this configuration, the PSN performs the SN group's service on some of the data message flows, SSN 1 performs this service on other data message flows, and SSN 2 performs this service on yet other data message flows. As shown, once the PSN, SSN 1 or SSN 2 performs the service on a data message, the PSN, SSN 1 or SSN 2 directs the data message to one of the destination compute nodes that should receive the data message after the SN group processes them.
- the third stage 1015 also shows that the load balancer LB of the PSN 1020 directs some of the data message flows to SSN 1 and SSN 2 for these service nodes to process.
- These directed messages are those that SSN 1 or SSN 2 has to process, but the PSN receives because the front-end load balancer 1050 has not yet been configured to forward to these data messages to SSN 1 or SSN 2 .
- the PSN's load balancer does not direct the data message flows to SSNs during the second and third stages 1010 and 1015 .
- the FLB set queues a new data message flow until it receives instructions from the PSN as to which service node should process the new data message flow.
- the PSN's load balancer does not direct the data messages to other SSNs because the FLB set statefully distributes the data message flows to the service nodes, as further explained below.
- the FLB 1050 sends each new flow to the PSN 1020 , so that the PSN's LB 1080 can program (configure) the FLB 1050 to direct the flow to a SSN if an SSN needs to process this new flow. Absent receiving such instructions, the FLB 1050 will send all the data messages for the flow to the PSN. In other embodiments, the PSN does not configure the FLB for each new flow (i.e., on a flow-by-flow basis), but rather configures the FLB with a load balancing parameter (LBP) set that the FLB set analyzes to determine how to distribute data message flows to the service nodes of the SN group.
- LBP load balancing parameter
- the distributed LBP set includes the SN group membership (e.g., the network address (L2 and/or L3 address) of each service node in the SN group).
- the FLB uses its own load balancing scheme (e.g., its own equal cost multipath, ECMP, process) to distribute the data message flows amongst the service nodes of the SN group.
- the FLB set's ECMP process generates hash ranges based on the SN group membership that the PSN provides, and then uses the generated hash ranges to distribute the data message flows amongst the service nodes.
- the PSN's distributes LBP set includes the SN group membership and a distribution scheme for the FLB to use to distribute flows across the service nodes of the SN group.
- the PSN provides to the FLB a hash table that identifies each service node of a SN group and specifies a hash range for each service node of the group.
- the hash table e.g., a hash table the PSN generates for itself or for an FLB
- the FLB generates a hash value for each flow (e.g., from the flow's five tuple), and then uses the PSN-provided hash value to identify the service node for the flow (i.e., identifies the hash range in the supplied table that contains the generated hash value, and then identifies the service node associated with the identified hash range).
- the PSN distributes to the FLB set a new LBP set, which may include (i) an updated group membership to the FLB set and/or (ii) an updated distribution scheme (e.g., an updated hash table).
- an updated LBP set includes an updated hash table, which may have more hash ranges or new service nodes for previously specified hash ranges.
- a front-end load balancer and a PSN use stateful load balancing processes that ensure that flows that were previously processed with a service node, remain with that node even after a new service node is added to the SN group. This is because without the stateful nature of these load balancing processes, a flow that was processed by one service node might get directed to a new service node because the addition of a new node might affect a load balancing scheme or a load balancing computation (e.g., a hash computation) that the load balancers use to distribute the data message flows amongst the service nodes of the group.
- a load balancing scheme e.g., a hash computation
- One way that an FLB or PSN ensures stateful load balancing in some embodiments is to use a flow connection-state storage that stores the identity of the service node for a previously processed flow.
- the FLB set uses a stateless load balancing scheme.
- the FLB is a simple forwarding element (e.g., hardware or software switch) that receives the SN group membership, defines several hash value ranges and their associated service nodes based on the number of service nodes, and then performs a stateless ECMP process that distributes the data messages as it receives by generating hashes of the message header values and determining the hash ranges that contain the generated hashes.
- the FLB is a forwarding element (e.g., software or hardware switch) that (1) receives from the PSN a hash table containing several hash value ranges and their associated service nodes, and (2) performs a stateless ECMP process that distributes the data messages as it receives them by generating hashes of the message header values and determining the hash ranges that contain the generated hashes.
- a forwarding element e.g., software or hardware switch
- the FLB in either of these approaches does not maintain the flow connection states.
- the FLB may forward a flow that was previously processed by one service node to another service node.
- the service nodes of the SN group of some embodiments synchronize their flow connection states (e.g., through control channel communications) so that when an FLB forwards an old flow that was handled by a first service node to a second service node, the second service node can detect that the first service node was processing this flow and re-direct the flow to the second service node.
- a service node may also re-direct a new flow to another service node when the flow was not previously processed by the other service node. For example, in some cases, the service node detects that although the flow is new and has not been processed by any other service node, it should be handled by another service node once the FLB set reconfigures based on an updated LBP set that the PSN distributes.
- each service node i.e., the PSN and each SSN in a SN group in some embodiments includes a load balancer that performs the secondary load balancing operation to direct messages to other service nodes.
- FIG. 11 illustrates an example of one such approach. This example is similar to the example illustrated in FIG. 10 in that a SN group 1100 is shown to be growing from one service node (PSN 1020 ) to three service nodes (PSN, SSN 1 and SSN 2 ) in three operational stages 1105 - 1115 . Also, like the example of FIG. 10 , the service nodes provide their processed data messages to the compute nodes 1125 .
- the PSN does not configure the FLB on a flow-by-flow basis, but rather provides the FLB 1150 with an updated LBP set each time that it modifies the SN group.
- the updated LBP set includes just the SN group membership updated in some embodiments, while it also includes a distribution scheme (e.g., a hash table) in other embodiments.
- each service node includes a load balancer, which, as shown in the second and third stages 1110 and 1115 , allows each service node to forward to the other service nodes the data message flows that the FLB 1150 forwards to it that should really be processed by the other service nodes.
- One example of a data message flow that a first service node re-directs to a second service node includes a flow that was previously processed by the second service node but that after the LBP set updated, gets forwarded to the first service node by the FLB's stateless load balancing.
- the service nodes of some embodiments synchronize their flow connection states (e.g., through control channel communications).
- Another example for re-directing a data message flow is when the FLB has not yet reconfigured its operations based on a new LBP set from the PSN and forwards a new flow to a service node that determines based on the new LBP set another service node should process this new flow.
- the SSNs in some embodiments obtain the LBP set updates from the PSN, or derive the LBP set updates independently of the PSN by using similar update processes. To derive the LBP set updates independently, the SSNs receive the same global statistics (from the controller set or from the other service nodes) as the PSN in some embodiments.
- FIG. 12 illustrates a process 1200 that a load balancer of a PSN or an SSN (e.g., SSN 1 of FIG. 11 ) performs in some embodiments that have the PSN configure a stateless FLB set with periodic LBP set updates. This process ensures that the PSN or SSN processes data message flows that it should process, while directing other data message flows that other service nodes have to perform to other service nodes in the group.
- a load balancer of a PSN or an SSN e.g., SSN 1 of FIG. 11
- This process ensures that the PSN or SSN processes data message flows that it should process, while directing other data message flows that other service nodes have to perform to other service nodes in the group.
- the process 1200 starts (at 1205 ) when the service node (PSN or SSN) receives a data message (e.g., from the PSN or the FLB set).
- a data message e.g., from the PSN or the FLB set.
- the process determines (at 1210 ) whether the received message is part of a data message flow that one of the service nodes has previously processed. To make this determination, the process examines (at 1210 ) a flow connection-state data storage that stores (1) the identity of the data message flows that the service nodes previously processed, and (2) the identity of the service node that previously processed the identified flow.
- the flow connection-state storage includes the flows that are being currently processed by all the service nodes. To maintain this storage, the service nodes synchronize the records in the connection-state storage on a real-time basis in some embodiments. This synchronization is through control channel communications in some embodiments. Also, in some embodiments, the process identifies each flow in the connection-state data storage in terms of one or more flow attributes, e.g., the flow's five tuple header values. As mentioned above, the connection-state data storages in some embodiments are hash indexed storages.
- the process When the process identifies (at 1210 ) an entry in the connection-state data storage that matches the received data message flow's attributes (i.e., when it determines that the data message flow has been previously processed by one of the service nodes), the process then determines (at 1212 ) the identity of the service node that should process the data message from the matching connection-state data storage entry. When this matching entry specifies that another service node should process the received message, the process then directs (at 1214 ) the received data message to this other service node and then ends. The process 1200 re-directs the data messages to the other service node using one of the approaches mentioned above (e.g., MAC redirect, destination network address translation, etc.).
- the approaches mentioned above e.g., MAC redirect, destination network address translation, etc.
- the process determines (at 1212 ) that the matching entry identifies the process' associated SVM (e.g., SVM 1 of PSN or SVM 2 of SSN 1 in FIG. 11 ) as the service node for the received data message
- the process then directs (at 1215 ) its own SVM to perform this service.
- This SVM then performs the service on the data message, and augments the statistics that it maintains (e.g., the data message count, the byte count, etc.) regarding the data messages that it processes.
- the process ends.
- the process determines (at 1210 ) whether the connection-state data storage does not store an entry for the received data message (i.e., determines that the received data message flow is not a flow currently being processed by any service node)
- the process determines (at 1220 ) whether the received data message should be processed locally by its SVM, or remotely by another service node of the SN group.
- another service node should process the received data message's flow when the LBP set (e.g., SN group membership) has changed but the FLB set has yet to complete its reconfiguration for a new distribution scheme that accounts for LBP set update (e.g., an addition or removal of a service node to the SN group).
- the process needs to know of the LBP set update.
- the SSN would have to receive the LBP set update from the PSN, or would have to independently derive the LBP set update by using similar processes and similar input data as the PSN.
- the LBP set update identifies the service node that should process a new data message flow.
- the FLB set uses the LBP set to derive its load distribution scheme (e.g., to derive the hash values for its ECMP distribution scheme).
- a service node would need to generate a load distribution scheme (e.g., to generate a hash table) from the LBP set update in the same manner as the FLB set, and then use this generated distribution scheme to identify the service node that should receive a new data message load (e.g., to identify the service node associated with a hash table range that contains a hash that is derived from the data message's header values).
- a load distribution scheme e.g., to generate a hash table
- the process determines (at 1220 ) that its associated SVM should process the received data message
- the process directs (at 1225 ) its SVM to perform the SN group's service on the received data message. Based on this operation, the SVM also augments (at 1225 ) the statistics that it maintains (e.g., the data message count, the byte count, etc.) regarding the data messages that it processes.
- the process 1200 also creates an entry in the connection-state data storage to identify its SVM as the service node for processing data messages that are part of the same flow as the received data message. In some embodiments, this entry identifies the SVM and identifies the received data message header values (e.g., five tuple values) that specify the message's flow.
- the process determines (at 1220 ) that another service node should process the data message
- the process directs (at 1230 ) the message to another service node in the SN group.
- the process 1200 uses different techniques, such as MAC redirect (for L2 forwarding), IP destination network address translation (for L3 forwarding), port address translation (for L4 forwarding), L2/L3 tunneling, etc. These operations were described above by reference to FIG. 3 .
- the process After directing (at 1230 ) the data message to the other service node, the process creates (at 1235 ) an entry in the connection-state data storage to identify the other service node as the service node for processing data messages that are part of the same flow as the received data message. In some embodiments, this entry identifies (1) the other service node and (2) the received data message header values (e.g., five tuple values) that specify the message's flow. After 1235 , the process ends
- the service nodes of SN group 1000 or 1100 can be any type of service nodes, e.g., firewalls, intrusion detection systems, intrusion prevention systems, WAN optimizers, etc.
- the service that is provided by the SN group is a load balancing service.
- FIG. 13 presents an example that is identical to the example illustrated in FIG. 11 , except that the service operation of the SN group is a load balancing operation.
- each service node performs two types of load balancing operations. One operation is to distribute the data message flows to other the service nodes that need to process the flows, while the other operation is to distribute the processed data message load to the DCNs of a DCN group.
- the distribution of the data message load to the DCNs is referred to as the first type load balancing while the distribution of the data message load to the group's service nodes (so that each can perform the first type load balancing) is referred to as the second type load balancing.
- the PSN's second type load balancing in the system of FIG. 13 differs slightly from the SSN's second type load balancing in that this operation of the PSN also entails (1) directing the controller set to modify the SN group membership, and (2) informing the FLB of the change to the SN group (e.g., after receiving confirmation of this change from the controller set).
- one SVM performs both the load balancing operation and the service operation (which may be a non-load balancing service or a load balancing service) of a PSN or an SSN.
- the two operations of such a service node are performed by two different modules of the service node's associated host.
- the service node's service operation is performed by an SVM
- the service node's load balancing operation is performed by a load balancer that intercepts data messages from the datapath to the SVM.
- FIG. 14 illustrates an architecture of a host 1400 that executes one or more SVMs 1405 and one or more load balancers 1415 of some embodiments of the invention.
- each SVM 1405 in some embodiments pairs with a load balancer 1415 to form one service node of a SN group, as further described below.
- only the PSN is implemented by an associated pair of an SVM 1405 and a load balancer 1415 ; the SSNs in these embodiments are implemented by an SVM 1405 .
- the host 1400 executes one or more GVMs 1402 , a software forwarding element 1410 , an LB agent 1420 , and a publisher 1422 .
- the host also has LB rule storage 1440 and the STATs data storage 1445 , as well as group membership data storage 1484 , policy data storage 1482 , aggregated statistics data storage 1486 , and connection state storage 1490 .
- the software forwarding element (SFE) 1410 executes on the host to communicatively couple the VMs of the host to each other and to other devices outside of the host (e.g., other VMs on other hosts) through the host's physical NIC (PNIC) and one or more forwarding elements (e.g., switches and/or routers) that operate outside of the host.
- the SFE 1410 includes a port 1430 to connect to a PNIC (not shown) of the host.
- the SFE also includes a port 1435 to connect to the VM's VNIC 1425 .
- the VNICs are software abstractions of the PNIC that are implemented by the virtualization software (e.g., by a hypervisor).
- Each VNIC is responsible for exchanging packets between its VM and the SFE 1410 through its corresponding SFE port.
- a VM's egress datapath for its data messages includes (1) the VM's VNIC 1425 , (2) the SFE port 1435 that connects to this VNIC, (3) the SFE 1410 , and (4) the SFE port 1430 that connects to the host's PNIC.
- the VM's ingress datapath is the same except in the revere order (i.e., first the port 1430 , then the SFE 1410 , then the port 1435 , and finally the VNIC 1425 .
- the SFE 1410 is a software switch, while in other embodiments it is a software router or a combined software switch/router.
- the SFE 1410 in some embodiments implements one or more logical forwarding elements (e.g., logical switches or logical routers) with SFEs executing on other hosts in a multi-host environment.
- a logical forwarding element in some embodiments can span multiple hosts to connect VMs that execute on different hosts but belong to one logical network.
- different logical forwarding elements can be defined to specify different logical networks for different users, and each logical forwarding element can be defined by multiple SFEs on multiple hosts.
- Each logical forwarding element isolates the traffic of the VMs of one logical network from the VMs of another logical network that is serviced by another logical forwarding element.
- a logical forwarding element can connect VMs executing on the same host and/or different hosts.
- the SFE 1410 connects to the host's PNIC to send outgoing packets and to receive incoming packets.
- the SFE 1410 performs message-processing operations to forward messages that it receives on one of its ports to another one of its ports. For example, in some embodiments, the SFE tries to use header values in the VM data message to match the message to flow based rules, and upon finding a match, to perform the action specified by the matching rule (e.g., to hand the packet to one of its ports 1430 or 1435 , which directs the packet to be supplied to a destination VM or to the PNIC).
- the matching rule e.g., to hand the packet to one of its ports 1430 or 1435 , which directs the packet to be supplied to a destination VM or to the PNIC.
- the SFE extracts from a data message a virtual network identifier and a MAC address.
- the SFE in these embodiments uses the extracted VNI to identify a logical port group, and then uses the MAC address to identify a port within the port group.
- the SFE ports 1435 in some embodiments include one or more function calls to one or more modules that implement special input/output (I/O) operations on incoming and outgoing packets that are received at the ports.
- I/O input/output
- One of these function calls for a port is to a load balancer in the load balancer set 1415 .
- the load balancer performs the load balancing operations on incoming data messages that are addressed to load balancer's associated VM (e.g., the load balancer's SVM that has to perform a service on the data message).
- each port 1435 has its own load balancer 1415 .
- some or all of the ports 1435 share the same load balancer 1415 (e.g., all the ports share one load balancer, or all ports that are part of the same logical network share one load balancer).
- Examples of other I/O operations that are implemented by the ports 1435 include ARP proxy operations, message encapsulation operations (e.g., encapsulation operations needed for sending messages along tunnels to implement overlay logical network operations), etc.
- ARP proxy operations e.g., message encapsulation operations needed for sending messages along tunnels to implement overlay logical network operations
- message encapsulation operations e.g., encapsulation operations needed for sending messages along tunnels to implement overlay logical network operations
- the ports can implement a chain of I/O operations on incoming and/or outgoing messages in some embodiments.
- I/O operators including the load balancer set 1415
- other embodiments call these operators from the VM's VNIC or from the port 1430 of the SFE.
- a PSN of a SN group is formed by an SVM 1405 and the SVM's associated in-line load balancer 1415 .
- the SSN is formed by an SVM and the SVM's associated in-line load balancer 1415 .
- each SSN is implemented by only an SVM in some embodiments, while other embodiments implement each SSN with an SVM and an load balancer 1415 so that this load balancer can maintain statistics regarding the data message load on the SSN's SVM.
- an SVM's load balancer performs the load balancing operation needed to distribute data messages to its own SVM or to other SVMs in its SN group.
- the PSN's load balancer in some embodiments may one or more of the following operations: (1) directing the controller set to modify SN group membership, (2) supplying statistics to the controller set, (3) receiving global statistics from the controller set, (4) receiving statistics from the SSNs, and (5) providing LBP data (including group membership data) to the SSNs.
- the PSN's load balancer configures (e.g., provides LBP set to) the FLB set, so that the FLB set can perform its load balancing operation to distribute the load amongst the service nodes of the SN group 1300 .
- the PSN's load balancer configures the FLB differently in different embodiments. For instance, in some embodiments, the PSN simply provides the FLB with a list of service nodes in the SN group. In other embodiments, the PSN also provides the FLB with a specific distribution scheme (e.g., a hash lookup table, etc.). In still other embodiments, for each new flow that the FLB sends the PSN, the PSN configures the FLB with the identity of the service node for processing this new flow.
- a specific distribution scheme e.g., a hash lookup table, etc.
- the PSN's load balancer does not communicate with the controller set, does not send LBP data to its group's SSNs, and/or does not configure the FLB, because some or all of these operations are performed by the LB agent 1420 of the PSN's host.
- the LB agent 1420 of the host communicates with the controller set (1) to provide statistics regarding its hosts service nodes, and (2) to receive global statistics, group membership updates, and/or membership update confirmations for the SN group of any PSN that executes on its host.
- the LB agent 1420 provides the SSNs with LBP data and/or configures the FLB, as further described below.
- each SN group is associated with a VIP address and this address is associated with the SN group's PSN.
- the load balancer 1415 of the SN group's PSN handles ARP messages that are directed to the group's VIP. In this manner, the initial data messages of new data message flows to the group's VIP will be forwarded to the load balancer of the group's PSN.
- the PSN's load balancer does not handle the ARP messages to the group's VIP but another module that executes on the PSN's host handles the ARP messages and this module's response ensures that the initial data messages of new data message flows to the group's VIP are forwarded to the PSN's load balancer.
- an ARP proxy module is inserted in the datapath of the PSN's SVM in the same manner as the PSN's load balancer (i.e., the ARP proxy is called by the SVM's VNIC or SFE port).
- This ARP proxy then responds to the ARP messages for the SN group's VIP address. It should be noted that the ARP message response is disabled on all SSN of the SN group.
- the PSN's ARP module e.g., its load balancer or ARP proxy module
- a service node's load balancer 1415 performs its load balancing operations based on the LB rules that are specified in the LB rule storage 1440 .
- the LB rule storage 1440 stores a load balancing rule that specifies two or more physical addresses (e.g., MAC addresses) of service nodes of the group to which a data message can be directed.
- a PSN's associated load balancer may direct a data message to its SVM or to one or more SVMs that execute on the same host or different hosts.
- this load balancing rule also includes load balancing metrics for specifying how the load balancer should bias the spreading of traffic across the service nodes of the group associated with a virtual address.
- FIG. 15 presents examples of load balancing rules that are stored in the LB rule storage 1440 .
- this data storage includes multiple LB rules 1500 , with each LB rule associated with one load balanced SN group.
- each load balance rule includes (1) a set of data-message identifying tuples 1505 , (2) several MAC addresses 1510 of several SNs of the load balanced SN group, and (3) a weight value 1515 for each IP address.
- Each rule's tuple set 1505 includes the VIP address of the rule's associated SN group.
- the tuple set 1505 also includes other data message identifiers, such as source IP address, source port, destination port, and protocol.
- a load balancer examines a LB data storage by comparing one or more message identifier values (e.g., message five-tuple header values) to the rule tuple sets 1505 to identify a rule that has a tuple set that matches the message identifier values.
- the load balancer identifies the location in the data storage 1440 that may contain a potentially matching tuple set for a received data message by generating a hash of the received data message identifier values (e.g., the message five-tuple header values) and using this hash as an index that identifies one or more locations that may store a matching entry. The load balancer then examines the tuple set 1505 at an identified location to determine whether the tuple set 1505 stored at this location matches the received message's identifier values.
- a hash of the received data message identifier values e.g., the message five-tuple header values
- the MAC addresses 1510 of an LB rule are the MAC addresses of the SVMs of the SN group that has the VIP address specified in the rule's tuple set 1505 .
- the weight values 1515 for the MAC addresses of each LB rule provide the criteria for a load balancer to spread the traffic to the SVMs that are identified by the MAC addresses.
- the PSN's load balancer use a weighted round robin scheme to spread the traffic to the SVMs of the load balanced SN group. As one example, assume that the SN group has five SNs (i.e., five SVMs) and the weight values for the MAC addresses of these SNs are 1, 3, 1, 3, and 2.
- a load balancer would distribute data messages that are part of ten new flows as follows: 1 to the first MAC address, 3 to the second MAC address, 1 to the third MAC address, 3 to the fourth MAC address, and 2 to the fifth MAC address.
- the load balancer 1415 When the load balancer 1415 identifies an LB rule for a received data message and then based on the rule's LB criteria identifies an SVM for the data message, the load balancer then replaces the message's original destination MAC address with the identified SVM's MAC address when the message's original destination MAC address is not the identified SVM's MAC address (i.e., is not the MAC address of the load balancer's SVM). The load balancer then sends the data message along its datapath. In some embodiments, this operation entails returning a communication to the SFE port 1435 (that called the load balancer) to let the port know that the load balancer is done with its processing of the data message.
- the SFE port 1435 that called the load balancer
- the SFE port 1435 can then handoff the data message to the SFE 1410 or can call another I/O chain operator to perform another operation on the data message.
- the load balancers 1415 of some embodiments perform destination network address translation (DNAT) operations on the received data messages in order to direct the data messages to the correct SVMs.
- DNAT operations entail replacing the VIP address in the data message with the IP address of the identified SVM.
- the load balancers maintain statistics in the STAT data storage 1445 about the data messages that they direct to their associated SVM. To maintain such statistics for data message load on the SSNs, some embodiments have a load balancer 1415 for each SSN even when the SSNs do not have to distribute message flows to other service nodes. In such cases, other embodiments do not employ a load balancer 1415 for an SSN, but rather have the SSN's SVM maintain such statistics and have the LB agent of the SVM's host obtain these statistics from the SVM.
- the LB agent 1420 periodically supplies to the controller set the statistics that are gathered (e.g., by the load balancers 1415 or the SVMs 1405 of the service nodes) for a SN group and stored in the STAT data storage 1445 .
- LB agent 1420 generates and updates the LBP set (e.g., load balancing weight values or load balancing hash table) for a SN group with PSNs and/or SSNs on the agent's host.
- the host's LB agent 1420 in some embodiments performs some or all of its operations for all of the SN groups that execute on its host. Other embodiments, however, use different LB agents for different SN groups that have SVMs and load balancers executing on the same host.
- FIG. 16 illustrates examples of load balancing rules 1600 that are stored in the LB rule storage 1440 in some embodiments.
- Each load balancing rule 1600 has one message identifying tuple 1605 , one or more MAC address sets 1610 , and one weight value set 1615 for each MAC address set.
- Each MAC address set 1610 has two or more MAC addresses, and each weight value set has one weight value for each MAC address in its associated MAC address set.
- each pair of associated MAC address set and weight value set has a time period during which the MAC address set 1610 and its associated weight value set 1615 are valid. For instance, in a LB rule, the time value for one MAC address set might specify “before 1 pm on 9/1/2014,” while the time value for another MAC address set might specify “after 12:59 pm on 9/1/2014.” These two time periods allow the load balancers to seamlessly switch from using one MAC address set and its associated weight value set to another MAC address set and its associated weight value set at 1 pm on 9/1/2014. These two MAC address sets might be identical and they might only differ in their associated weight value sets, or the two MAC address sets might be different.
- Two MAC address sets might differ but have overlapping MAC addresses (e.g., one set might have five MAC addresses, while another set might have four of these five MAC addresses when one SN is removed from a SN group).
- two MAC address sets might differ by having no MAC addresses in common.
- the time period values and the weight values are used in the LB rules.
- the LB rules do include the weight values, but include the time values to allow the load balancer to gracefully switch between different LBP sets, e.g., switch between two different hash lookup tables.
- the host includes a connection state storage 1490 in which each load balancer 1415 stores data records that allow the load balancer to maintain connection state for data messages that are part of the same flow, and thereby to distribute statefully data messages that are part of the same flow to the same SVM.
- the load balancer identifies an SVM for a data message based on the message's group destination address (e.g., the destination VIP)
- the load balancer not only may replace the destination MAC address, but also stores a record in the connection state storage 1490 to identify the SVM for subsequent data messages that are part of the same flow.
- This record stores the MAC address of the identified SVM along with the data message's header values (e.g., source IP address, source port, destination port, destination VIP, protocol).
- the connection data storage 1490 is hash indexed based on the hash of the data message header values.
- the load balancer first checks the connection state storage 1490 to determine whether it has previously identified an SVM for receiving data messages that are in the same flow or flow hash range as the received message. If so, the load balancer uses the SVM that is identified in the connection state storage. Only when the load balancer does not find a connection record in the connection state storage 1490 , the load balancer in some embodiments examines the LB rule storage to try to identify an SVM for the data message.
- connection state storage 1490 In FIG. 14 , only one connection state storage 1490 is illustrated for all the load balancers 1415 . In other embodiments, each load balancer has its own connection state storage 1490 . In yet other embodiments, the host has several connection state storage 1490 , but two or more load balancers can share a connection state storage (e.g., two load balancers that are balancing the load for two VMs that are part of the same logical network).
- connection data storages for the service nodes of a SN group are synchronized in some embodiments, so that a PSN or an SSN can forward to another service node a data message flow that is sent by an FLB set, when the data message flow has to be processed by the other service node.
- the LB agent 1420 of some embodiments gathers (e.g., periodically collects) the statistics that the load balancers store in the STATs data storage(s) 1445 , and relays these statistics to the controller set. Based on statistics that the controller set gathers from various LB agents of various hosts, the LB controller set in some embodiments (1) distributes the aggregated statistics to each host's LB agent so that each LB agent can define and/or adjust its load balancing parameter set, and/or (2) analyzes the aggregated statistics to specify and distribute some or all of the load balancing parameter set for the load balancers to enforce. In some embodiments where the LB agent receives new load balancing parameter set from the LB controller set, the LB agent stores the parameter set in the host-level LB rule storage 1488 for propagation to the LB rule storage(s) 1440 .
- the LB agent stores the aggregated statistics in the global statistics data storage 1486 .
- the LB agent 1420 analyzes the aggregated statistics in this storage 1486 to define and/or adjust the LBP set (e.g., weight values or hash lookup tables), which it then stores in the LB rule storage 1488 for propagation to the LB rule storage(s) 1440 .
- the publisher 1422 retrieves each LB rule that the LB agent 1420 stores in the LB rule storage 1488 , and stores the retrieved rule in the LB rule storage 1440 of the load balancer 1415 that needs to enforce this rule.
- the LB agent 1420 not only propagates LB rule updates based on newly received aggregated statistics, but it also propagates LB rules or updates LB rules based on updates to SN groups.
- the controller set updates the SN group.
- the SN group's PSN modifies the SN group.
- the controller set updates the SN group at the direction of the group's PSN e.g., at the direction of the LB agent 1420 or the load balancer 1415 of the PSN SVM of the SN group).
- the LB agent 1420 stores each SN group's members in the group data storage 1484 .
- the LB agent 1420 stores this update in the group storage 1484 , and then formulates updates to the LB rules to add or remove the destination address of this SN from the LB rules that should include or already include this address.
- the LB agent 1420 stores such updated rules in the rule data storage 1488 , from where the publisher propagates them to the LB rule storage(s) 1440 of the load balancers that need to enforce these rules.
- the LB agent 1420 stores in the policy storage 1482 , LB policies that direct the operation of the LB agent in response to newly provisioned SVMs and their associated load balancers, and/or in response to updated global statistics and/or adjusted SN group membership.
- the policies in the policy storage 1482 in some embodiments are supplied by the controller set.
- FIG. 17 illustrates a process 1700 that the LB agent 1420 performs in some embodiments each time that it receives updated group memberships and/or global statistics from the controller set 225 .
- the process 1700 starts (at 1705 ) when it receives from the controller set 225 updated statistics for at least one SN group and/or updated membership to at least one SN group.
- the process 1700 determines whether the received update includes an update to the membership of at least one SN group for which the LB agents generates and/or maintains the LB rules.
- the PSN's load balancer 1415 or the LB agent 1420 direct the controller set to instantiate a new SVM for the SN group or to allocate a previously instantiated SVM to the SN group, when the load balancer 1415 or the LB agent 1420 determine that a new service node should be added to the SN group.
- the load balancer 1415 or the LB agent 1420 determine that the SN group should shrink, the load balancer 1415 or the LB agent 1420 direct the controller set to remove one or more SVMs from the SN group.
- the received group update is in response to a group adjustment request from the load balancer 1415 or the LB agent 1420 .
- the process determines (at 1710 ) that the received update does not include a membership update, the process transitions to 1720 . Otherwise, the process creates and/or updates (at 1715 ) one or more records in the group membership storage 1484 to store the updated group membership that the process received at 1705 . From 1715 , the process transitions to 1720 .
- the process 1700 determines whether the received update includes updated statistics for at least one SN group for which the LB agents generates and/or maintains the LB rules. If not, the process transitions to 1730 . Otherwise, the process creates and/or updates (at 1725 ) one or more records in the global statistics storage 1486 to store the updated global statistics that the process received at 1705 . From 1725 , the process transitions to 1730 .
- the process initiates a process to analyze the updated records in the group membership storage 1484 and/or the global statistics storage 1486 to update the group memberships (e.g., the IP addresses) and/or the load balancing parameter set (e.g., the weight values or hash lookup table) of one or more LB rules in the host-level LB rule data storage 1488 .
- the policies that are stored in the policy storage 1482 control how the LB agent 1420 updates the LB rules based on the updated group membership record(s) and/or the updated global statistics.
- the LB agent performs an identical or similar process (1) when the LB agent powers up (e.g., when its host powers up) to configure the LB rules of the load balancers on the host, and (2) when a new SVM 1405 is instantiated on the host and the LB agent needs to configure the LB rules of the instantiated SVM's associated load balancer 1415 .
- the process 1700 updates (at 1730 ) the load balancing parameter set differently. For instance, in some embodiments, the process updates weight values and/or time values for load balancing criteria, and/or updates the service nodes for one or more weight values. In other embodiments, the process updates hash tables by modifying hash ranges, adding new hash ranges, and/or specifying new service nodes for new or previous hash ranges. As mentioned before, multiple contiguous or non-contiguous hash ranges in some embodiments can map to the same service node. In some embodiments, updates to the hash table re-assign a hash range from one service node to another service node.
- the publisher 1422 propagates each new or updated LB rule to the LB rule data storages 1440 of the individual load balancers 1415 (on the same host) that need to process the new or updated LB rule.
- the publisher 1422 does not publish the LB rule to the rule data storage 1440 of a load balancer (on the same host) that does not need to process the rule.
- the updated LB rules also have to be supplied the load balancers of the SSNs.
- the updated LB rules are distributed by the LB agent 1420 or publisher 1422 of the PSN's host to the host-level data storage 1488 of other hosts that execute SSNs of the PSN's SN group.
- the LB agent 1420 on these other hosts follows the same LB policies to generate the same LB rule updates on these other hosts, and the publisher on these hosts pushes these updated LB rules to the LB rule data storages 1440 of the SSNs' load balancers 1415 . Accordingly, in these embodiments, the updated rules do not need to be distributed from the PSN's host to the hosts that execute SSNs of the PSN's SN group.
- FIG. 18 illustrates a process 1800 that the LB agent 1420 of the PSN SVM performs in some embodiments to elastically adjust the membership of the PSN's SN group.
- the LB agent periodically performs this process to analyze global statistics regarding the message load on the SN group's service nodes and when necessary to adjust the SN group membership to alleviate load on the service nodes or eliminate unused excess capacity on the service nodes.
- the process 1800 initially analyzes (at 1805 ) the data message load on the service nodes of the SN group.
- the process determines whether the SN group membership should be updated in view of analyzed message load data. In some embodiments, when the message load on the SN group as a whole exceeds a first threshold, the process determines (at 1810 ) that a service node should be added to the SN group. In other embodiments, the process decides (at 1810 ) to add a service node to the SN group when the message load on one or more service nodes in the SN group exceeds the first threshold.
- the process determines (at 1810 ) to remove a service node from the SN group when it determines that the message load on the SN group as a whole, or on one or more service nodes individually, is below a second threshold value.
- the second threshold value is different than the first threshold value in some embodiments, while it is the same as the first threshold value in other embodiments.
- the process determines (at 1810 ) that it does not need to adjust the group membership, the process ends. Otherwise, the process transitions to 1815 , where it performs the set of operations for adding one or more service nodes to, or removing one or more service nodes from, the SN group.
- the sequence of operations for adding a service node is the same as the sequence of operations for removing a service node.
- the process 1800 to add a service node, the process 1800 initially directs the controller set to add the service node, and then after receiving notification from the controller set regarding the addition of the service node, the process updates the load balancing rules of the PSN, and when applicable, the SSNs and FLBs.
- the process 1800 of some embodiments removes a service node by (1) initially directing the PSN (and when applicable, the SSNs and FLBs) to stop sending new flows to the service node, and then (2) after a transient delay or a sufficient reduction in the usage of the service node, directing the controller set to remove the service node from the SN group.
- the process 1800 can follow other sequences of operations to add a service node to, or remove a service node from, the SN group.
- the PSN's LB agent does not perform the elastic adjustment process 1800 .
- the PSN's load balancer performs this process.
- the controller set performs this process.
- FIG. 19 illustrates a process 1900 that one or more controllers in the controller set perform in some embodiments.
- the controller set performs this process to distribute global statistics and/or group membership updates for a SN group.
- the process 1900 starts (at 1905 ) when it (1) receives statistics from one or more LB agents 1420 or load balancers 1415 , and/or (2) receives membership updates for a SN group.
- the process 1900 receives the group membership updates from another process of the controller set. For instance, in some embodiments, a virtualization manager informs the process 1900 that a new SVM has been added to an SN group when a new SVM has been created for the SN group, or has been removed from the SN group when the SVM has been terminated or has failed in the SN group. In some embodiments, the virtualization manager instantiates a new SVM or allocates a previously instantiated SVM to the SN group at the behest of the process 1900 , as further described below.
- the process updates (1) the global statistics that the controller set maintains for the SN group based on the statistics received at 1905 , and/or (2) the SN group's membership that the controller set maintains based on the group updates received at 1905 .
- the process determines based on the updated statistics whether it should have one or more SVM specified or removed for the group. For instance, when the updated statistics causes the aggregated statistics for the SN group to exceed a threshold load value for one or more SNs in the group, the process 1900 determines that one or more new SVMs have to be specified (e.g., allotted or instantiated) for the SN group to reduce the load on SVMs previously specified for the group.
- process 1900 determines (at 1915 ) that the SVM has to be removed for the SN group. In some embodiments, process 1900 also determines that SN group membership should be modified when it receives such a request from the PSN (e.g., through the PSN's LB agent or load balancer).
- a virtualization manager is a process that one or more controllers in the controller set execute, while in other embodiments, the virtualization manager is a process that is executed by one or more servers that are outside of the controller set that handles the LB data collection and data distribution.
- the process 1900 also transitions to 1925 when it determines (at 1915 ) that no SVM needs to be added to or removed from the SN group.
- the process determines whether the time has reached for it to distribute membership update and/or global statistics to one or more LB agents executing on one or more hosts.
- the process 1900 distributes membership updates and/or global statistics on a periodic basis. In other embodiments, however, the process 1900 distributes membership update and/or global statistics for the SN group whenever this data is modified.
- the process 1900 distributes updated statistics and/or group membership to only the LB agent of the SN group's PSN, while in other embodiments, the process distributes the updated statistics and/or group membership to the LB agent of each host that executes the SVM of the PSN and/or an SSN of the group.
- the process distributes statistic and membership updates to only the LB agent of the group's PSN
- one or more modules on the PSN's host distribute the updated LB rules and/or group membership to the SSNs if the SSNs need such data.
- the process determines (at 1925 ) that it does not need to distribute new data, it transitions to 1930 to determine whether it has received any more statistic and/or membership updates for which it needs to update its records. If so, the process transitions back to 1910 to process the newly received statistic and/or membership updates. If not, the process transitions back to 1925 to determine again whether it should distribute new data to one or more LB agents.
- the process determines (at 1925 ) that should distribute membership update(s) and/or global statistics, it distributes (at 1935 ) this data to one or more LB agents that need to process this data to specify and/or update the load balancing rules that they maintain for their load balancers on their hosts.
- the process determines (at 1940 ) whether it has received any more statistic and/or membership updates for which it needs to update its records. If not, the process remains at 1940 until it receives statistics and/or membership updates, at which time it transitions back to 1910 to process the newly received statistic and/or membership updates.
- the controller set distributes global statistics to the LB agents, which analyze this data to specify and/or adjust the LB rules that they maintain. In other embodiments, however, the controller set analyzes the global statistics that it gathers, and based on this analysis specifies and/or adjusts LBP sets or LB rules, which it then distributes to the LB agents 1420 or load balancers 1415 .
- the elastic SN groups of some embodiments are used to elastically provide services (e.g., load balancing, firewall, etc.) at the edge of a network.
- FIG. 20 illustrates one such example.
- three layers of load balancers are topologically positioned before three layers of compute nodes of a compute cluster 2000 .
- the three layers of compute nodes are a web server layer 2005 , an application server layer 2010 , and a data storage layer 2015 .
- the first load balancing layer 2020 is implemented by using an elastic load balancing group of some embodiments of the invention.
- This elastic group is identical to the group that was described above by reference to FIG. 13 .
- the elastic LB group 2020 is deployed at the edge the network of the compute cluster 2000 .
- the cluster's network interconnects the compute nodes of the cluster with each other and with other devices outside of the cluster's network.
- the compute cluster 2000 is a shared-cloud datacenter or an entity's datacenter, while in other embodiments, the cluster is a portion of a datacenter.
- the second and third layers 2025 and 2030 of load balancers are implemented by the inline load balancers of the web server and application server VMs of some embodiments.
- these inline load balancers are implemented like the load balancers 1415 of FIG. 14 , except that they intercept the data messages on the egress path of their associated sever VMs in order to spread these messages to the VMs of the next stage of servers.
- This distributed in-line load balancing is further described in U.S. patent application Ser. No. 14/557,287, now issued as U.S. Pat. No. 10,320,679.
- Computer readable storage medium also referred to as computer readable medium.
- processing unit(s) e.g., one or more processors, cores of processors, or other processing units
- processing unit(s) e.g., one or more processors, cores of processors, or other processing units
- Examples of computer readable media include, but are not limited to, CD-ROMs, flash drives, RAM chips, hard drives, EPROMs, etc.
- the computer readable media does not include carrier waves and electronic signals passing wirelessly or over wired connections.
- the term “software” is meant to include firmware residing in read-only memory or applications stored in magnetic storage, which can be read into memory for processing by a processor.
- multiple software inventions can be implemented as sub-parts of a larger program while remaining distinct software inventions.
- multiple software inventions can also be implemented as separate programs.
- any combination of separate programs that together implement a software invention described here is within the scope of the invention.
- the software programs when installed to operate on one or more electronic systems, define one or more specific machine implementations that execute and perform the operations of the software programs.
- FIG. 21 conceptually illustrates a computer system 2100 with which some embodiments of the invention are implemented.
- the computer system 2100 can be used to implement any of the above-described hosts, controllers, and managers. As such, it can be used to execute any of the above described processes.
- This computer system includes various types of non-transitory machine readable media and interfaces for various other types of machine readable media.
- Computer system 2100 includes a bus 2105 , processing unit(s) 2110 , a system memory 2125 , a read-only memory 2130 , a permanent storage device 2135 , input devices 2140 , and output devices 2145 .
- the bus 2105 collectively represents all system, peripheral, and chipset buses that communicatively connect the numerous internal devices of the computer system 2100 .
- the bus 2105 communicatively connects the processing unit(s) 2110 with the read-only memory 2130 , the system memory 2125 , and the permanent storage device 2135 .
- the processing unit(s) 2110 retrieve instructions to execute and data to process in order to execute the processes of the invention.
- the processing unit(s) may be a single processor or a multi-core processor in different embodiments.
- the read-only-memory (ROM) 2130 stores static data and instructions that are needed by the processing unit(s) 2110 and other modules of the computer system.
- the permanent storage device 2135 is a read-and-write memory device. This device is a non-volatile memory unit that stores instructions and data even when the computer system 2100 is off. Some embodiments of the invention use a mass-storage device (such as a magnetic or optical disk and its corresponding disk drive) as the permanent storage device 2135 .
- the system memory 2125 is a read-and-write memory device. However, unlike storage device 2135 , the system memory is a volatile read-and-write memory, such a random access memory.
- the system memory stores some of the instructions and data that the processor needs at runtime.
- the invention's processes are stored in the system memory 2125 , the permanent storage device 2135 , and/or the read-only memory 2130 . From these various memory units, the processing unit(s) 2110 retrieve instructions to execute and data to process in order to execute the processes of some embodiments.
- the bus 2105 also connects to the input and output devices 2140 and 2145 .
- the input devices enable the user to communicate information and select commands to the computer system.
- the input devices 2140 include alphanumeric keyboards and pointing devices (also called “cursor control devices”).
- the output devices 2145 display images generated by the computer system.
- the output devices include printers and display devices, such as cathode ray tubes (CRT) or liquid crystal displays (LCD). Some embodiments include devices such as a touchscreen that function as both input and output devices.
- bus 2105 also couples computer system 2100 to a network 2165 through a network adapter (not shown).
- the computer can be a part of a network of computers (such as a local area network (“LAN”), a wide area network (“WAN”), or an Intranet, or a network of networks, such as the Internet. Any or all components of computer system 2100 may be used in conjunction with the invention.
- Some embodiments include electronic components, such as microprocessors, storage and memory that store computer program instructions in a machine-readable or computer-readable medium (alternatively referred to as computer-readable storage media, machine-readable media, or machine-readable storage media).
- computer-readable media include RAM, ROM, read-only compact discs (CD-ROM), recordable compact discs (CD-R), rewritable compact discs (CD-RW), read-only digital versatile discs (e.g., DVD-ROM, dual-layer DVD-ROM), a variety of recordable/rewritable DVDs (e.g., DVD-RAM, DVD-RW, DVD+RW, etc.), flash memory (e.g., SD cards, mini-SD cards, micro-SD cards, etc.), magnetic and/or solid state hard drives, read-only and recordable Blu-Ray® discs, ultra density optical discs, any other optical or magnetic media, and floppy disks.
- CD-ROM compact discs
- CD-R recordable compact discs
- the computer-readable media may store a computer program that is executable by at least one processing unit and includes sets of instructions for performing various operations.
- Examples of computer programs or computer code include machine code, such as is produced by a compiler, and files including higher-level code that are executed by a computer, an electronic component, or a microprocessor using an interpreter.
- ASICs application specific integrated circuits
- FPGAs field programmable gate arrays
- integrated circuits execute instructions that are stored on the circuit itself.
- the terms “computer”, “server”, “processor”, and “memory” all refer to electronic or other technological devices. These terms exclude people or groups of people.
- display or displaying means displaying on an electronic device.
- the terms “computer readable medium,” “computer readable media,” and “machine readable medium” are entirely restricted to tangible, physical objects that store information in a form that is readable by a computer. These terms exclude any wireless signals, wired download signals, and any other ephemeral or transitory signals.
- DCNs data compute nodes
- addressable nodes may include non-virtualized physical hosts, virtual machines, containers that run on top of a host operating system without the need for a hypervisor or separate operating system, and hypervisor kernel network interface modules.
- VMs in some embodiments, operate with their own guest operating systems on a host using resources of the host virtualized by virtualization software (e.g., a hypervisor, virtual machine monitor, etc.).
- the tenant i.e., the owner of the VM
- Some containers are constructs that run on top of a host operating system without the need for a hypervisor or separate guest operating system.
- the host operating system uses name spaces to isolate the containers from each other and therefore provides operating-system level segregation of the different groups of applications that operate within different containers.
- This segregation is akin to the VM segregation that is offered in hypervisor-virtualized environments that virtualize system hardware, and thus can be viewed as a form of virtualization that isolates different groups of applications that operate in different containers.
- Such containers are more lightweight than VMs.
- Hypervisor kernel network interface module in some embodiments, is a non-VM DCN that includes a network stack with a hypervisor kernel network interface and receive/transmit threads.
- a hypervisor kernel network interface module is the vmknic module that is part of the ESXiTM hypervisor of VMware, Inc.
- VMs any type of DCNs, including physical hosts, VMs, non-VM containers, and hypervisor kernel network interface modules.
- example networks could include combinations of different types of DCNs in some embodiments.
- FIGS. 3 , 7 , 9 , 12 , and 17 - 19 conceptually illustrate processes.
- the specific operations of these processes may not be performed in the exact order shown and described.
- the specific operations may not be performed in one continuous series of operations, and different specific operations may be performed in different embodiments.
- the process could be implemented using several sub-processes, or as part of a larger macro process.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims (19)
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/569,358 US11722367B2 (en) | 2014-09-30 | 2014-12-12 | Method and apparatus for providing a service with a plurality of service nodes |
US18/211,580 US20230336413A1 (en) | 2014-09-30 | 2023-06-19 | Method and apparatus for providing a service with a plurality of service nodes |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201462058044P | 2014-09-30 | 2014-09-30 | |
US201462083453P | 2014-11-24 | 2014-11-24 | |
US201462086136P | 2014-12-01 | 2014-12-01 | |
US14/569,358 US11722367B2 (en) | 2014-09-30 | 2014-12-12 | Method and apparatus for providing a service with a plurality of service nodes |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US18/211,580 Continuation US20230336413A1 (en) | 2014-09-30 | 2023-06-19 | Method and apparatus for providing a service with a plurality of service nodes |
Publications (2)
Publication Number | Publication Date |
---|---|
US20160094454A1 US20160094454A1 (en) | 2016-03-31 |
US11722367B2 true US11722367B2 (en) | 2023-08-08 |
Family
ID=55585631
Family Applications (6)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/569,358 Active US11722367B2 (en) | 2014-09-30 | 2014-12-12 | Method and apparatus for providing a service with a plurality of service nodes |
US14/569,249 Active US9531590B2 (en) | 2014-09-30 | 2014-12-12 | Load balancing across a group of load balancers |
US14/569,476 Active 2036-01-26 US9935827B2 (en) | 2014-09-30 | 2014-12-12 | Method and apparatus for distributing load among a plurality of service nodes |
US14/569,452 Active 2035-02-06 US9755898B2 (en) | 2014-09-30 | 2014-12-12 | Elastically managing a service node group |
US14/569,405 Active 2035-08-06 US9825810B2 (en) | 2014-09-30 | 2014-12-12 | Method and apparatus for distributing load among a plurality of service nodes |
US18/211,580 Pending US20230336413A1 (en) | 2014-09-30 | 2023-06-19 | Method and apparatus for providing a service with a plurality of service nodes |
Family Applications After (5)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/569,249 Active US9531590B2 (en) | 2014-09-30 | 2014-12-12 | Load balancing across a group of load balancers |
US14/569,476 Active 2036-01-26 US9935827B2 (en) | 2014-09-30 | 2014-12-12 | Method and apparatus for distributing load among a plurality of service nodes |
US14/569,452 Active 2035-02-06 US9755898B2 (en) | 2014-09-30 | 2014-12-12 | Elastically managing a service node group |
US14/569,405 Active 2035-08-06 US9825810B2 (en) | 2014-09-30 | 2014-12-12 | Method and apparatus for distributing load among a plurality of service nodes |
US18/211,580 Pending US20230336413A1 (en) | 2014-09-30 | 2023-06-19 | Method and apparatus for providing a service with a plurality of service nodes |
Country Status (1)
Country | Link |
---|---|
US (6) | US11722367B2 (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US12068961B2 (en) | 2014-09-30 | 2024-08-20 | Nicira, Inc. | Inline load balancing |
US12132780B2 (en) | 2019-10-30 | 2024-10-29 | VMware LLC | Distributed service chain across multiple clouds |
US12177067B2 (en) | 2018-09-02 | 2024-12-24 | VMware LLC | Service insertion at logical network gateway |
US12231252B2 (en) | 2020-01-13 | 2025-02-18 | VMware LLC | Service insertion for multicast traffic at boundary |
US12254340B2 (en) | 2019-02-22 | 2025-03-18 | VMware LLC | Providing services with guest VM mobility |
Families Citing this family (105)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9736065B2 (en) | 2011-06-24 | 2017-08-15 | Cisco Technology, Inc. | Level of hierarchy in MST for traffic localization and load balancing |
US8908698B2 (en) | 2012-01-13 | 2014-12-09 | Cisco Technology, Inc. | System and method for managing site-to-site VPNs of a cloud managed network |
US10367914B2 (en) | 2016-01-12 | 2019-07-30 | Cisco Technology, Inc. | Attaching service level agreements to application containers and enabling service assurance |
US9225638B2 (en) | 2013-05-09 | 2015-12-29 | Vmware, Inc. | Method and system for service switching using service tags |
US9276904B2 (en) | 2014-02-20 | 2016-03-01 | Nicira, Inc. | Specifying point of enforcement in a firewall rule |
CN105337881B (en) * | 2014-06-27 | 2019-10-01 | 华为技术有限公司 | A kind of processing method of data message, service node and drainage point |
US10122605B2 (en) | 2014-07-09 | 2018-11-06 | Cisco Technology, Inc | Annotation of network activity through different phases of execution |
US11722367B2 (en) | 2014-09-30 | 2023-08-08 | Nicira, Inc. | Method and apparatus for providing a service with a plurality of service nodes |
US11296930B2 (en) | 2014-09-30 | 2022-04-05 | Nicira, Inc. | Tunnel-enabled elastic service model |
US11533255B2 (en) | 2014-11-14 | 2022-12-20 | Nicira, Inc. | Stateful services on stateless clustered edge |
US10609091B2 (en) | 2015-04-03 | 2020-03-31 | Nicira, Inc. | Method, apparatus, and system for implementing a content switch |
US10476982B2 (en) | 2015-05-15 | 2019-11-12 | Cisco Technology, Inc. | Multi-datacenter message queue |
US9680706B2 (en) | 2015-06-30 | 2017-06-13 | Nicira, Inc. | Federated firewall management for moving workload across data centers |
US10034201B2 (en) * | 2015-07-09 | 2018-07-24 | Cisco Technology, Inc. | Stateless load-balancing across multiple tunnels |
US9781081B1 (en) * | 2015-10-02 | 2017-10-03 | Amazon Technologies, Inc. | Leveraging transport-layer cryptographic material |
US10069904B2 (en) * | 2015-10-26 | 2018-09-04 | Cisco Technology, Inc. | IP routing pool distribution among forwarding elements in SDN service core deployment |
US10205677B2 (en) | 2015-11-24 | 2019-02-12 | Cisco Technology, Inc. | Cloud resource placement optimization and migration execution in federated clouds |
US10084703B2 (en) | 2015-12-04 | 2018-09-25 | Cisco Technology, Inc. | Infrastructure-exclusive service forwarding |
US10079693B2 (en) | 2015-12-28 | 2018-09-18 | Netapp, Inc. | Storage cluster management proxy |
US10348685B2 (en) | 2016-04-29 | 2019-07-09 | Nicira, Inc. | Priority allocation for distributed service rules |
US10135727B2 (en) * | 2016-04-29 | 2018-11-20 | Nicira, Inc. | Address grouping for distributed service rules |
US11171920B2 (en) | 2016-05-01 | 2021-11-09 | Nicira, Inc. | Publication of firewall configuration |
US11425095B2 (en) | 2016-05-01 | 2022-08-23 | Nicira, Inc. | Fast ordering of firewall sections and rules |
US11088990B2 (en) | 2016-06-29 | 2021-08-10 | Nicira, Inc. | Translation cache for firewall configuration |
US11258761B2 (en) | 2016-06-29 | 2022-02-22 | Nicira, Inc. | Self-service firewall configuration |
US10432532B2 (en) | 2016-07-12 | 2019-10-01 | Cisco Technology, Inc. | Dynamically pinning micro-service to uplink port |
US10382597B2 (en) | 2016-07-20 | 2019-08-13 | Cisco Technology, Inc. | System and method for transport-layer level identification and isolation of container traffic |
US10129099B2 (en) | 2016-08-16 | 2018-11-13 | International Business Machines Corporation | Differentiated services for protocol suitable network virtualization overlays |
US10567344B2 (en) | 2016-08-23 | 2020-02-18 | Cisco Technology, Inc. | Automatic firewall configuration based on aggregated cloud managed information |
US11824863B2 (en) * | 2016-11-03 | 2023-11-21 | Nicira, Inc. | Performing services on a host |
TWI746726B (en) | 2016-12-15 | 2021-11-21 | 美商康寧公司 | Methods and apparatuses for controlling glass flow into glass forming machines |
US11178217B2 (en) * | 2017-01-09 | 2021-11-16 | International Business Machines Corporation | DNS-based in-packet service version tagging |
US10320683B2 (en) | 2017-01-30 | 2019-06-11 | Cisco Technology, Inc. | Reliable load-balancer using segment routing and real-time application monitoring |
US10671571B2 (en) | 2017-01-31 | 2020-06-02 | Cisco Technology, Inc. | Fast network performance in containerized environments for network function virtualization |
US11005731B2 (en) | 2017-04-05 | 2021-05-11 | Cisco Technology, Inc. | Estimating model parameters for automatic deployment of scalable micro services |
US10439877B2 (en) | 2017-06-26 | 2019-10-08 | Cisco Technology, Inc. | Systems and methods for enabling wide area multicast domain name system |
US10382274B2 (en) | 2017-06-26 | 2019-08-13 | Cisco Technology, Inc. | System and method for wide area zero-configuration network auto configuration |
US10425288B2 (en) | 2017-07-21 | 2019-09-24 | Cisco Technology, Inc. | Container telemetry in data center environments with blade servers and switches |
US10601693B2 (en) | 2017-07-24 | 2020-03-24 | Cisco Technology, Inc. | System and method for providing scalable flow monitoring in a data center fabric |
US10541866B2 (en) | 2017-07-25 | 2020-01-21 | Cisco Technology, Inc. | Detecting and resolving multicast traffic performance issues |
US10951584B2 (en) | 2017-07-31 | 2021-03-16 | Nicira, Inc. | Methods for active-active stateful network service cluster |
US11570092B2 (en) * | 2017-07-31 | 2023-01-31 | Nicira, Inc. | Methods for active-active stateful network service cluster |
US11296984B2 (en) | 2017-07-31 | 2022-04-05 | Nicira, Inc. | Use of hypervisor for active-active stateful network service cluster |
CN109327400B (en) | 2017-08-01 | 2022-04-26 | 华为技术有限公司 | Data communication method and data communication network |
US10642739B2 (en) * | 2017-09-11 | 2020-05-05 | Cisco Technology, Inc. | Distributed coordination of caching and processing by networking devices |
US10797966B2 (en) | 2017-10-29 | 2020-10-06 | Nicira, Inc. | Service operation chaining |
US11012420B2 (en) | 2017-11-15 | 2021-05-18 | Nicira, Inc. | Third-party service chaining using packet encapsulation in a flow-based forwarding element |
US10705882B2 (en) | 2017-12-21 | 2020-07-07 | Cisco Technology, Inc. | System and method for resource placement across clouds for data intensive workloads |
US10616321B2 (en) * | 2017-12-22 | 2020-04-07 | At&T Intellectual Property I, L.P. | Distributed stateful load balancer |
US11595474B2 (en) | 2017-12-28 | 2023-02-28 | Cisco Technology, Inc. | Accelerating data replication using multicast and non-volatile memory enabled nodes |
US10659252B2 (en) | 2018-01-26 | 2020-05-19 | Nicira, Inc | Specifying and utilizing paths through a network |
US10797910B2 (en) | 2018-01-26 | 2020-10-06 | Nicira, Inc. | Specifying and utilizing paths through a network |
US10817274B2 (en) * | 2018-01-31 | 2020-10-27 | Salesforce.Com, Inc. | Techniques for distributing software packages |
US10922310B2 (en) * | 2018-01-31 | 2021-02-16 | Red Hat, Inc. | Managing data retrieval in a data grid |
US11153122B2 (en) | 2018-02-19 | 2021-10-19 | Nicira, Inc. | Providing stateful services deployed in redundant gateways connected to asymmetric network |
US10728174B2 (en) | 2018-03-27 | 2020-07-28 | Nicira, Inc. | Incorporating layer 2 service between two interfaces of gateway device |
US10805192B2 (en) | 2018-03-27 | 2020-10-13 | Nicira, Inc. | Detecting failure of layer 2 service using broadcast messages |
US11128530B2 (en) | 2018-03-29 | 2021-09-21 | Hewlett Packard Enterprise Development Lp | Container cluster management |
US10848552B2 (en) * | 2018-03-29 | 2020-11-24 | Hewlett Packard Enterprise Development Lp | Determining whether to perform address translation to forward a service request or deny a service request based on blocked service attributes in an IP table in a container-based computing cluster management system |
US10511534B2 (en) | 2018-04-06 | 2019-12-17 | Cisco Technology, Inc. | Stateless distributed load-balancing |
US10728361B2 (en) | 2018-05-29 | 2020-07-28 | Cisco Technology, Inc. | System for association of customer information across subscribers |
US10904322B2 (en) | 2018-06-15 | 2021-01-26 | Cisco Technology, Inc. | Systems and methods for scaling down cloud-based servers handling secure connections |
US10942788B2 (en) | 2018-06-15 | 2021-03-09 | Vmware, Inc. | Policy constraint framework for an sddc |
US10812337B2 (en) | 2018-06-15 | 2020-10-20 | Vmware, Inc. | Hierarchical API for a SDDC |
US10764266B2 (en) | 2018-06-19 | 2020-09-01 | Cisco Technology, Inc. | Distributed authentication and authorization for rapid scaling of containerized services |
US11019083B2 (en) | 2018-06-20 | 2021-05-25 | Cisco Technology, Inc. | System for coordinating distributed website analysis |
US10819571B2 (en) | 2018-06-29 | 2020-10-27 | Cisco Technology, Inc. | Network traffic optimization using in-situ notification system |
US10904342B2 (en) | 2018-07-30 | 2021-01-26 | Cisco Technology, Inc. | Container networking using communication tunnels |
CN108769271A (en) * | 2018-08-20 | 2018-11-06 | 北京百度网讯科技有限公司 | Method, apparatus, storage medium and the terminal device of load balancing |
US11086700B2 (en) | 2018-08-24 | 2021-08-10 | Vmware, Inc. | Template driven approach to deploy a multi-segmented application in an SDDC |
US10855531B2 (en) | 2018-08-30 | 2020-12-01 | Juniper Networks, Inc. | Multiple networks for virtual execution elements |
US10728145B2 (en) | 2018-08-30 | 2020-07-28 | Juniper Networks, Inc. | Multiple virtual network interface support for virtual execution elements |
US10944673B2 (en) | 2018-09-02 | 2021-03-09 | Vmware, Inc. | Redirection of data messages at logical network gateway |
US11627049B2 (en) * | 2019-01-31 | 2023-04-11 | Hewlett Packard Enterprise Development Lp | Failsafe firmware upgrade for cloud-managed devices |
US11310202B2 (en) | 2019-03-13 | 2022-04-19 | Vmware, Inc. | Sharing of firewall rules among multiple workloads in a hypervisor |
US11240155B2 (en) * | 2019-03-29 | 2022-02-01 | Intel Corporation | Technologies for network device load balancers for accelerated functions as a service |
US10841226B2 (en) | 2019-03-29 | 2020-11-17 | Juniper Networks, Inc. | Configuring service load balancers with specified backend virtual networks |
CN112532675B (en) | 2019-09-19 | 2023-04-18 | 贵州白山云科技股份有限公司 | Method, device and medium for establishing network edge computing system |
US11283717B2 (en) | 2019-10-30 | 2022-03-22 | Vmware, Inc. | Distributed fault tolerant service chain |
US11165860B2 (en) * | 2019-11-01 | 2021-11-02 | Uber Technologies, Inc. | Dynamically computing load balancer subset size in a distributed computing system |
US20210144515A1 (en) * | 2019-11-12 | 2021-05-13 | Verizon Patent And Licensing Inc. | Systems and methods for multi-access edge computing node selection |
CN111010342B (en) * | 2019-11-21 | 2023-04-07 | 天津卓朗科技发展有限公司 | Distributed load balancing implementation method and device |
US11153406B2 (en) | 2020-01-20 | 2021-10-19 | Vmware, Inc. | Method of network performance visualization of service function chains |
US11659061B2 (en) | 2020-01-20 | 2023-05-23 | Vmware, Inc. | Method of adjusting service function chains to improve network performance |
CN115380514B (en) | 2020-04-01 | 2024-03-01 | 威睿有限责任公司 | Automatic deployment of network elements for heterogeneous computing elements |
US11368387B2 (en) | 2020-04-06 | 2022-06-21 | Vmware, Inc. | Using router as service node through logical service plane |
US11803408B2 (en) | 2020-07-29 | 2023-10-31 | Vmware, Inc. | Distributed network plugin agents for container networking |
US11863352B2 (en) | 2020-07-30 | 2024-01-02 | Vmware, Inc. | Hierarchical networking for nested container clusters |
US11445012B2 (en) | 2020-11-25 | 2022-09-13 | Seagate Technology Llc | Proactive load balancer for data storage system |
US11611625B2 (en) | 2020-12-15 | 2023-03-21 | Vmware, Inc. | Providing stateful services in a scalable manner for machines executing on host computers |
US11734043B2 (en) | 2020-12-15 | 2023-08-22 | Vmware, Inc. | Providing stateful services in a scalable manner for machines executing on host computers |
WO2022167090A1 (en) * | 2021-02-05 | 2022-08-11 | Regis24 Gmbh | Database system, database structure, and associated methods |
US12063159B2 (en) | 2021-05-04 | 2024-08-13 | Red Hat, Inc. | Memory-efficient technique for weighted round-robin load balancing |
US11606254B2 (en) | 2021-06-11 | 2023-03-14 | Vmware, Inc. | Automatic configuring of VLAN and overlay logical switches for container secondary interfaces |
US11799761B2 (en) | 2022-01-07 | 2023-10-24 | Vmware, Inc. | Scaling edge services with minimal disruption |
US12231398B2 (en) | 2022-01-14 | 2025-02-18 | VMware LLC | Per-namespace IP address management method for container networks |
US11962564B2 (en) | 2022-02-15 | 2024-04-16 | VMware LLC | Anycast address for network address translation at edge |
WO2023173404A1 (en) | 2022-03-18 | 2023-09-21 | Vmware Information Technology (China) Co., Ltd. | Mapping vlan of container network to logical network in hypervisor to support flexible ipam and routing container traffic |
US12177124B2 (en) | 2022-10-04 | 2024-12-24 | VMware LLC | Using CRDs to create externally routable addresses and route records for pods |
US11848910B1 (en) | 2022-11-11 | 2023-12-19 | Vmware, Inc. | Assigning stateful pods fixed IP addresses depending on unique pod identity |
US12267212B2 (en) | 2022-11-29 | 2025-04-01 | VMware LLC | Implementing defined service policies in a third-party container cluster |
US12199833B2 (en) | 2022-11-29 | 2025-01-14 | VMware LLC | Network controller as a service (NCaaS) to define network policies for third-party container clusters |
US11831511B1 (en) | 2023-01-17 | 2023-11-28 | Vmware, Inc. | Enforcing network policies in heterogeneous systems |
US11936560B1 (en) * | 2023-05-09 | 2024-03-19 | The Adt Security Corporation | Systems and methods for data flow between mobile applications and customer premises equipment, using a consistent server hash |
WO2024254734A1 (en) | 2023-06-12 | 2024-12-19 | Vmware Information Technology (China) Co., Ltd. | Layer 7 network security for container workloads |
Citations (634)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1999018534A2 (en) | 1997-10-06 | 1999-04-15 | Web Balance, Inc. | System for balancing loads among network servers |
US6006264A (en) | 1997-08-01 | 1999-12-21 | Arrowpoint Communications, Inc. | Method and system for directing a flow between a client and a server |
US6104700A (en) | 1997-08-29 | 2000-08-15 | Extreme Networks | Policy based quality of service |
US6154448A (en) | 1997-06-20 | 2000-11-28 | Telefonaktiebolaget Lm Ericsson (Publ) | Next hop loopback |
US20020010783A1 (en) | 1999-12-06 | 2002-01-24 | Leonard Primak | System and method for enhancing operation of a web server cluster |
US20020078370A1 (en) | 2000-12-18 | 2002-06-20 | Tahan Thomas E. | Controlled information flow between communities via a firewall |
US20020097724A1 (en) | 2001-01-09 | 2002-07-25 | Matti Halme | Processing of data packets within a network element cluster |
US20020194350A1 (en) | 2001-06-18 | 2002-12-19 | Lu Leonard L. | Content-aware web switch without delayed binding and methods thereof |
US20030065711A1 (en) | 2001-10-01 | 2003-04-03 | International Business Machines Corporation | Method and apparatus for content-aware web switching |
US20030093481A1 (en) | 2001-11-09 | 2003-05-15 | Julian Mitchell | Middlebox control |
US20030097429A1 (en) | 2001-11-20 | 2003-05-22 | Wen-Che Wu | Method of forming a website server cluster and structure thereof |
US20030105812A1 (en) | 2001-08-09 | 2003-06-05 | Gigamedia Access Corporation | Hybrid system architecture for secure peer-to-peer-communications |
US20030188026A1 (en) | 2001-05-18 | 2003-10-02 | Claude Denton | Multi-protocol networking processor with data traffic support spanning local, regional and wide area networks |
US20030236813A1 (en) | 2002-06-24 | 2003-12-25 | Abjanic John B. | Method and apparatus for off-load processing of a message stream |
US20040066769A1 (en) | 2002-10-08 | 2004-04-08 | Kalle Ahmavaara | Method and system for establishing a connection via an access network |
US6779030B1 (en) | 1997-10-06 | 2004-08-17 | Worldcom, Inc. | Intelligent network |
US20040210670A1 (en) | 1999-03-05 | 2004-10-21 | Nikolaos Anerousis | System, method and apparatus for network service load and reliability management |
US20040215703A1 (en) | 2003-02-18 | 2004-10-28 | Xiping Song | System supporting concurrent operation of multiple executable application operation sessions |
US6826694B1 (en) | 1998-10-22 | 2004-11-30 | At&T Corp. | High resolution access control |
US20040249776A1 (en) | 2001-06-28 | 2004-12-09 | Microsoft Corporation | Composable presence and availability services |
US6880089B1 (en) | 2000-03-31 | 2005-04-12 | Avaya Technology Corp. | Firewall clustering for multiple network servers |
US20050091396A1 (en) | 2003-08-05 | 2005-04-28 | Chandrasekharan Nilakantan | Method and apparatus for achieving dynamic capacity and high availability in multi-stage data networks using adaptive flow-based routing |
US20050089327A1 (en) | 2003-10-22 | 2005-04-28 | Shlomo Ovadia | Dynamic route discovery for optical switched networks |
US20050114429A1 (en) | 2003-11-25 | 2005-05-26 | Caccavale Frank S. | Method and apparatus for load balancing of distributed processing units based on performance metrics |
US20050114648A1 (en) | 2003-11-24 | 2005-05-26 | Cisco Technology, Inc., A Corporation Of California | Dual mode firewall |
US20050132030A1 (en) | 2003-12-10 | 2005-06-16 | Aventail Corporation | Network appliance |
US20050198200A1 (en) | 2004-03-05 | 2005-09-08 | Nortel Networks Limited | Method and apparatus for facilitating fulfillment of web-service requests on a communication network |
JP2005311863A (en) | 2004-04-23 | 2005-11-04 | Hitachi Ltd | Traffic distribution control method, control device, and network system |
US20050249199A1 (en) | 1999-07-02 | 2005-11-10 | Cisco Technology, Inc., A California Corporation | Load balancing using distributed forwarding agents with application based feedback for different virtual machines |
US6985956B2 (en) | 2000-11-02 | 2006-01-10 | Sun Microsystems, Inc. | Switching system |
US7013389B1 (en) | 1999-09-29 | 2006-03-14 | Cisco Technology, Inc. | Method and apparatus for creating a secure communication channel among multiple event service nodes |
US20060069776A1 (en) | 2004-09-15 | 2006-03-30 | Shim Choon B | System and method for load balancing a communications network |
US20060112297A1 (en) | 2004-11-17 | 2006-05-25 | Raytheon Company | Fault tolerance and recovery in a high-performance computing (HPC) system |
US20060130133A1 (en) * | 2004-12-14 | 2006-06-15 | International Business Machines Corporation | Automated generation of configuration elements of an information technology system |
US20060155862A1 (en) | 2005-01-06 | 2006-07-13 | Hari Kathi | Data traffic load balancing based on application layer messages |
US20060195896A1 (en) | 2004-12-22 | 2006-08-31 | Wake Forest University | Method, systems, and computer program products for implementing function-parallel network firewall |
US20060233155A1 (en) * | 2002-03-19 | 2006-10-19 | Srivastava Sunil K | Server load balancing using IP option field approach to identify route to selected server |
US20070061492A1 (en) | 2005-08-05 | 2007-03-15 | Red Hat, Inc. | Zero-copy network i/o for virtual hosts |
US20070121615A1 (en) | 2005-11-28 | 2007-05-31 | Ofer Weill | Method and apparatus for self-learning of VPNS from combination of unidirectional tunnels in MPLS/VPN networks |
US7239639B2 (en) | 2001-12-27 | 2007-07-03 | 3Com Corporation | System and method for dynamically constructing packet classification rules |
US20070153782A1 (en) | 2005-12-30 | 2007-07-05 | Gregory Fletcher | Reliable, high-throughput, high-performance transport and routing mechanism for arbitrary data flows |
US20070214282A1 (en) * | 2006-03-13 | 2007-09-13 | Microsoft Corporation | Load balancing via rotation of cluster identity |
US20070248091A1 (en) | 2006-04-24 | 2007-10-25 | Mohamed Khalid | Methods and apparatus for tunnel stitching in a network |
US20070260750A1 (en) | 2006-03-09 | 2007-11-08 | Microsoft Corporation | Adaptable data connector |
US20070288615A1 (en) | 2006-06-09 | 2007-12-13 | Cisco Technology, Inc. | Technique for dispatching data packets to service control engines |
US20070291773A1 (en) | 2005-12-06 | 2007-12-20 | Shabbir Khan | Digital object routing based on a service request |
US20080005293A1 (en) | 2006-06-30 | 2008-01-03 | Telefonaktiebolaget Lm Ericsson (Publ) | Router and method for server load balancing |
US20080031263A1 (en) | 2006-08-07 | 2008-02-07 | Cisco Technology, Inc. | Method and apparatus for load balancing over virtual network links |
US20080046400A1 (en) * | 2006-08-04 | 2008-02-21 | Shi Justin Y | Apparatus and method of optimizing database clustering with zero transaction loss |
US20080049786A1 (en) | 2006-08-22 | 2008-02-28 | Maruthi Ram | Systems and Methods for Providing Dynamic Spillover of Virtual Servers Based on Bandwidth |
US20080049614A1 (en) | 2006-08-23 | 2008-02-28 | Peter John Briscoe | Capacity Management for Data Networks |
US20080049619A1 (en) | 2004-02-09 | 2008-02-28 | Adam Twiss | Methods and Apparatus for Routing in a Network |
US20080072305A1 (en) | 2006-09-14 | 2008-03-20 | Ouova, Inc. | System and method of middlebox detection and characterization |
US20080084819A1 (en) | 2006-10-04 | 2008-04-10 | Vladimir Parizhsky | Ip flow-based load balancing over a plurality of wireless network links |
US20080095153A1 (en) | 2006-10-19 | 2008-04-24 | Fujitsu Limited | Apparatus and computer product for collecting packet information |
US20080104608A1 (en) | 2006-10-27 | 2008-05-01 | Hyser Chris D | Starting up at least one virtual machine in a physical machine by a load balancer |
US7379465B2 (en) | 2001-12-07 | 2008-05-27 | Nortel Networks Limited | Tunneling scheme optimized for use in virtual private networks |
WO2008095010A1 (en) | 2007-02-01 | 2008-08-07 | The Board Of Trustees Of The Leland Stanford Jr. University | Secure network switching infrastructure |
US20080195755A1 (en) | 2007-02-12 | 2008-08-14 | Ying Lu | Method and apparatus for load balancing with server state change awareness |
US20080225714A1 (en) | 2007-03-12 | 2008-09-18 | Telefonaktiebolaget Lm Ericsson (Publ) | Dynamic load balancing |
US20080239991A1 (en) | 2003-03-13 | 2008-10-02 | David Lee Applegate | Method and apparatus for efficient routing of variable traffic |
US20080247396A1 (en) | 2007-04-06 | 2008-10-09 | Ludovic Hazard | Method, system and computer processing an ip packet, routing a structured data carrier, preventing broadcast storms, load-balancing and converting a full broadcast ip packet |
US7447775B1 (en) | 2003-11-07 | 2008-11-04 | Cisco Technology, Inc. | Methods and apparatus for supporting transmission of streaming data |
US20080276085A1 (en) | 2007-05-02 | 2008-11-06 | Cisco Technology, Inc. | Allowing differential processing of encrypted tunnels |
US20080279196A1 (en) | 2004-04-06 | 2008-11-13 | Robert Friskney | Differential Forwarding in Address-Based Carrier Networks |
US20090003349A1 (en) | 2007-06-29 | 2009-01-01 | Martin Havemann | Network system having an extensible forwarding plane |
US20090003375A1 (en) | 2007-06-29 | 2009-01-01 | Martin Havemann | Network system having an extensible control plane |
US20090003364A1 (en) | 2007-06-29 | 2009-01-01 | Kerry Fendick | Open platform architecture for integrating multiple heterogeneous network functions |
US20090019135A1 (en) | 2007-07-09 | 2009-01-15 | Anand Eswaran | Method, Network and Computer Program For Processing A Content Request |
US7480737B2 (en) | 2002-10-25 | 2009-01-20 | International Business Machines Corporation | Technique for addressing a cluster of network servers |
US7487250B2 (en) | 2000-12-19 | 2009-02-03 | Cisco Technology, Inc. | Methods and apparatus for directing a flow of data between a client and multiple servers |
US20090037713A1 (en) | 2007-08-03 | 2009-02-05 | Cisco Technology, Inc. | Operation, administration and maintenance (oam) for chains of services |
US7499463B1 (en) | 2005-04-22 | 2009-03-03 | Sun Microsystems, Inc. | Method and apparatus for enforcing bandwidth utilization of a virtual serialization queue |
US20090063706A1 (en) * | 2007-08-30 | 2009-03-05 | International Business Machines Corporation | Combined Layer 2 Virtual MAC Address with Layer 3 IP Address Routing |
US20090129271A1 (en) | 2007-11-19 | 2009-05-21 | Rajesh Ramankutty | Providing services to packet flows in a network |
US20090172666A1 (en) | 2007-12-31 | 2009-07-02 | Netapp, Inc. | System and method for automatic storage load balancing in virtual server environments |
US20090190506A1 (en) | 2006-05-05 | 2009-07-30 | Nokia Siemens Networks Gmbh & Co. Kg | Method for Allowing Control of the Quality of Service and/or of the Service Fees for Telecommunication Services |
US20090199268A1 (en) | 2008-02-06 | 2009-08-06 | Qualcomm, Incorporated | Policy control for encapsulated data flows |
US20090235325A1 (en) | 2006-03-02 | 2009-09-17 | Theo Dimitrakos | Message processing methods and systems |
US20090238084A1 (en) | 2008-03-18 | 2009-09-24 | Cisco Technology, Inc. | Network monitoring using a proxy |
US20090249472A1 (en) | 2008-03-27 | 2009-10-01 | Moshe Litvin | Hierarchical firewalls |
US20090265467A1 (en) | 2008-04-17 | 2009-10-22 | Radware, Ltd. | Method and System for Load Balancing over a Cluster of Authentication, Authorization and Accounting (AAA) Servers |
US20090271586A1 (en) | 1998-07-31 | 2009-10-29 | Kom Networks Inc. | Method and system for providing restricted access to a storage medium |
CN101594358A (en) | 2009-06-29 | 2009-12-02 | 北京航空航天大学 | Layer-3 switching method, device, system and host |
US20090300210A1 (en) | 2008-05-28 | 2009-12-03 | James Michael Ferris | Methods and systems for load balancing in cloud-based networks |
US20090299791A1 (en) | 2003-06-25 | 2009-12-03 | Foundry Networks, Inc. | Method and system for management of licenses |
US20090307334A1 (en) | 2008-06-09 | 2009-12-10 | Microsoft Corporation | Data center without structural bottlenecks |
US20090303880A1 (en) | 2008-06-09 | 2009-12-10 | Microsoft Corporation | Data center interconnect and traffic engineering |
US20090327464A1 (en) | 2008-06-26 | 2009-12-31 | International Business Machines Corporation | Load Balanced Data Processing Performed On An Application Message Transmitted Between Compute Nodes |
US7649890B2 (en) | 2005-02-22 | 2010-01-19 | Hitachi Communication Technologies, Ltd. | Packet forwarding apparatus and communication bandwidth control method |
US20100031360A1 (en) | 2008-07-31 | 2010-02-04 | Arvind Seshadri | Systems and methods for preventing unauthorized modification of an operating system |
US20100036903A1 (en) | 2008-08-11 | 2010-02-11 | Microsoft Corporation | Distributed load balancer |
US7698458B1 (en) | 2004-10-29 | 2010-04-13 | Akamai Technologies, Inc. | Load balancing network traffic using race methods |
US20100100616A1 (en) | 2004-09-14 | 2010-04-22 | 3Com Corporation | Method and apparatus for controlling traffic between different entities on a network |
US20100131638A1 (en) | 2008-11-25 | 2010-05-27 | Ravi Kondamuru | Systems and Methods for GSLB Remote Service Monitoring |
CN101729412A (en) | 2009-11-05 | 2010-06-09 | 北京超图软件股份有限公司 | Distributed level cluster method and system of geographic information service |
US20100165985A1 (en) | 2008-12-29 | 2010-07-01 | Cisco Technology, Inc. | Service Selection Mechanism In Service Insertion Architecture Data Plane |
US20100223621A1 (en) | 2002-08-01 | 2010-09-02 | Foundry Networks, Inc. | Statistical tracking for global server load balancing |
US20100223364A1 (en) | 2009-02-27 | 2010-09-02 | Yottaa Inc | System and method for network traffic management and load balancing |
US20100235915A1 (en) | 2009-03-12 | 2010-09-16 | Nasir Memon | Using host symptoms, host roles, and/or host reputation for detection of host infection |
US20100254385A1 (en) | 2009-04-07 | 2010-10-07 | Cisco Technology, Inc. | Service Insertion Architecture (SIA) in a Virtual Private Network (VPN) Aware Network |
US20100257278A1 (en) | 2003-12-10 | 2010-10-07 | Foundry Networks, Inc. | Method and apparatus for load balancing based on packet header content |
US7818452B2 (en) | 2000-09-13 | 2010-10-19 | Fortinet, Inc. | Distributed virtual system to support managed, network-based services |
US20100265824A1 (en) | 2007-11-09 | 2010-10-21 | Blade Network Technologies, Inc | Session-less Load Balancing of Client Traffic Across Servers in a Server Group |
US20100281482A1 (en) | 2009-04-30 | 2010-11-04 | Microsoft Corporation | Application efficiency engine |
US20100332595A1 (en) | 2008-04-04 | 2010-12-30 | David Fullagar | Handling long-tail content in a content delivery network (cdn) |
US20110010578A1 (en) | 2007-02-22 | 2011-01-13 | Agundez Dominguez Jose Luis | Consistent and fault tolerant distributed hash table (dht) overlay network |
US20110016348A1 (en) | 2000-09-01 | 2011-01-20 | Pace Charles P | System and method for bridging assets to network nodes on multi-tiered networks |
US20110022695A1 (en) | 2009-07-27 | 2011-01-27 | Vmware, Inc. | Management and Implementation of Enclosed Local Networks in a Virtual Lab |
US20110022812A1 (en) | 2009-05-01 | 2011-01-27 | Van Der Linden Rob | Systems and methods for establishing a cloud bridge between virtual storage resources |
US20110035494A1 (en) | 2008-04-15 | 2011-02-10 | Blade Network Technologies | Network virtualization for a virtualized server data center environment |
US20110040893A1 (en) | 2009-08-14 | 2011-02-17 | Broadcom Corporation | Distributed Internet caching via multiple node caching management |
US7898959B1 (en) | 2007-06-28 | 2011-03-01 | Marvell Israel (Misl) Ltd. | Method for weighted load-balancing among network interfaces |
US20110055845A1 (en) * | 2009-08-31 | 2011-03-03 | Thyagarajan Nandagopal | Technique for balancing loads in server clusters |
US20110058563A1 (en) | 2007-12-17 | 2011-03-10 | Girish Prabhakar Saraph | Architectural framework of communication network and a method of establishing qos connection |
US7921174B1 (en) | 2009-07-24 | 2011-04-05 | Jason Adam Denise | Electronic communication reminder technology |
US20110090912A1 (en) | 2009-10-15 | 2011-04-21 | International Business Machines Corporation | Steering Data Communications Packets Among Service Applications With Server Selection Modulus Values |
US7948986B1 (en) | 2009-02-02 | 2011-05-24 | Juniper Networks, Inc. | Applying services within MPLS networks |
US20110164504A1 (en) | 2008-09-03 | 2011-07-07 | Nokia Siemens Networks Oy | Gateway network element, a method, and a group of load balanced access points configured for load balancing in a communications network |
US20110194563A1 (en) | 2010-02-11 | 2011-08-11 | Vmware, Inc. | Hypervisor Level Distributed Load-Balancing |
US20110211463A1 (en) | 2010-02-26 | 2011-09-01 | Eldad Matityahu | Add-on module and methods thereof |
US20110225293A1 (en) | 2005-07-22 | 2011-09-15 | Yogesh Chunilal Rathod | System and method for service based social network |
US20110235508A1 (en) | 2010-03-26 | 2011-09-29 | Deepak Goel | Systems and methods for link load balancing on a multi-core device |
US20110261811A1 (en) * | 2010-04-26 | 2011-10-27 | International Business Machines Corporation | Load-balancing via modulus distribution and tcp flow redirection due to server overload |
US20110268118A1 (en) | 2010-04-30 | 2011-11-03 | Michael Schlansker | Method for routing data packets using vlans |
US20110271007A1 (en) | 2010-04-28 | 2011-11-03 | Futurewei Technologies, Inc. | System and Method for a Context Layer Switch |
US20110276695A1 (en) | 2010-05-06 | 2011-11-10 | Juliano Maldaner | Continuous upgrading of computers in a load balanced environment |
US20110283013A1 (en) | 2010-05-14 | 2011-11-17 | Grosser Donald B | Methods, systems, and computer readable media for stateless load balancing of network traffic flows |
US20110295991A1 (en) * | 2010-02-01 | 2011-12-01 | Nec Corporation | Network system, controller, and network control method |
US8078903B1 (en) | 2008-11-25 | 2011-12-13 | Cisco Technology, Inc. | Automatic load-balancing and seamless failover of data flows in storage media encryption (SME) |
US20110317708A1 (en) | 2010-06-28 | 2011-12-29 | Alcatel-Lucent Usa, Inc. | Quality of service control for mpls user access |
US20120005265A1 (en) | 2010-06-30 | 2012-01-05 | Sony Corporation | Information processing device, content providing method and program |
US8094575B1 (en) | 2009-03-24 | 2012-01-10 | Juniper Networks, Inc. | Routing protocol extension for network acceleration service-aware path selection within computer networks |
US20120011281A1 (en) | 2010-07-07 | 2012-01-12 | Fujitsu Limited | Content conversion system and content conversion server |
US20120014386A1 (en) | 2010-06-29 | 2012-01-19 | Futurewei Technologies, Inc. | Delegate Gateways and Proxy for Target Hosts in Large Layer 2 and Address Resolution with Duplicated Internet Protocol Addresses |
US20120023231A1 (en) * | 2009-10-23 | 2012-01-26 | Nec Corporation | Network system, control method for the same, and controller |
US20120054266A1 (en) | 2010-09-01 | 2012-03-01 | Kazerani Alexander A | Optimized Content Distribution Based on Metrics Derived from the End User |
EP2426956A1 (en) | 2009-04-27 | 2012-03-07 | China Mobile Communications Corporation | Data transferring method, system and related network device based on proxy mobile (pm) ipv6 |
US20120089664A1 (en) | 2010-10-12 | 2012-04-12 | Sap Portals Israel, Ltd. | Optimizing Distributed Computer Networks |
US8175863B1 (en) | 2008-02-13 | 2012-05-08 | Quest Software, Inc. | Systems and methods for analyzing performance of virtual environments |
US8190767B1 (en) | 2003-06-24 | 2012-05-29 | Nvidia Corporation | Data structures and state tracking for network protocol processing |
US20120137004A1 (en) | 2000-07-17 | 2012-05-31 | Smith Philip S | Method and System for Operating a Commissioned E-Commerce Service Prover |
US20120144014A1 (en) | 2010-12-01 | 2012-06-07 | Cisco Technology, Inc. | Directing data flows in data centers with clustering services |
US8201219B2 (en) | 2007-09-24 | 2012-06-12 | Bridgewater Systems Corp. | Systems and methods for server load balancing using authentication, authorization, and accounting protocols |
US20120147894A1 (en) | 2010-12-08 | 2012-06-14 | Mulligan John T | Methods and apparatus to provision cloud computing network elements |
US20120155266A1 (en) | 2010-12-17 | 2012-06-21 | Microsoft Corporation | Synchronizing state among load balancer components |
US20120176932A1 (en) | 2009-09-17 | 2012-07-12 | Zte Corporation | Communication method, method for forwarding data message during the communication process and communication node thereof |
US8223634B2 (en) | 2004-02-18 | 2012-07-17 | Fortinet, Inc. | Mechanism for implementing load balancing in a network |
US8224885B1 (en) | 2009-01-26 | 2012-07-17 | Teradici Corporation | Method and system for remote computing session management |
US20120185588A1 (en) | 2002-01-30 | 2012-07-19 | Brett Error | Distributed Data Collection and Aggregation |
US20120195196A1 (en) | 2010-08-11 | 2012-08-02 | Rajat Ghai | SYSTEM AND METHOD FOR QoS CONTROL OF IP FLOWS IN MOBILE NETWORKS |
US20120207174A1 (en) | 2011-02-10 | 2012-08-16 | Choung-Yaw Michael Shieh | Distributed service processing of network gateways using virtual machines |
US20120213074A1 (en) | 2011-01-27 | 2012-08-23 | Verint Systems Ltd. | System and method for flow table management |
US8266261B2 (en) * | 2009-03-27 | 2012-09-11 | Nec Corporation | Server system, collective server apparatus, and MAC address management method |
US20120230187A1 (en) | 2011-03-09 | 2012-09-13 | Telefonaktiebolaget L M Ericsson (Publ) | Load balancing sctp associations using vtag mediation |
US20120239804A1 (en) | 2009-11-26 | 2012-09-20 | Chengdu Huawei Symantec Technologies Co., Ltd | Method, device and system for backup |
US20120246637A1 (en) | 2011-03-22 | 2012-09-27 | Cisco Technology, Inc. | Distributed load balancer in a virtual machine environment |
US20120266252A1 (en) | 2011-04-18 | 2012-10-18 | Bank Of America Corporation | Hardware-based root of trust for cloud environments |
US20120281540A1 (en) | 2011-05-03 | 2012-11-08 | Cisco Technology, Inc. | Mobile service routing in a network environment |
US20120287789A1 (en) | 2008-10-24 | 2012-11-15 | Juniper Networks, Inc. | Flow consistent dynamic load balancing |
US20120303784A1 (en) | 1998-07-15 | 2012-11-29 | Radware, Ltd. | Load balancing |
US20120303809A1 (en) | 2011-05-25 | 2012-11-29 | Microsoft Corporation | Offloading load balancing packet modification |
US20120311568A1 (en) | 2011-05-31 | 2012-12-06 | Jansen Gerardus T | Mechanism for Inter-Cloud Live Migration of Virtualization Systems |
US20120317570A1 (en) | 2011-06-08 | 2012-12-13 | Dalcher Gregory W | System and method for virtual partition monitoring |
US20120317260A1 (en) | 2011-06-07 | 2012-12-13 | Syed Mohammad Amir Husain | Network Controlled Serial and Audio Switch |
US8339959B1 (en) | 2008-05-20 | 2012-12-25 | Juniper Networks, Inc. | Streamlined packet forwarding using dynamic filters for routing and security in a shared forwarding plane |
US20120331188A1 (en) | 2010-06-29 | 2012-12-27 | Patrick Brian Riordan | Techniques for path selection |
US20130003735A1 (en) | 2011-06-28 | 2013-01-03 | Chao H Jonathan | Dynamically provisioning middleboxes |
US20130021942A1 (en) | 2011-07-18 | 2013-01-24 | Cisco Technology, Inc. | Granular Control of Multicast Delivery Services for Layer-2 Interconnect Solutions |
US20130031544A1 (en) | 2011-07-27 | 2013-01-31 | Microsoft Corporation | Virtual machine migration to minimize packet loss in virtualized network |
US20130039218A1 (en) | 2010-10-25 | 2013-02-14 | Force 10 Networks | Limiting mac address learning on access network switches |
US20130044636A1 (en) | 2011-08-17 | 2013-02-21 | Teemu Koponen | Distributed logical l3 routing |
US20130058346A1 (en) | 2011-09-07 | 2013-03-07 | Microsoft Corporation | Distributed Routing Domains in Multi-Tenant Datacenter Virtual Networks |
US20130073743A1 (en) | 2011-09-19 | 2013-03-21 | Cisco Technology, Inc. | Services controlled session based flow interceptor |
US20130100851A1 (en) | 2011-10-25 | 2013-04-25 | Cisco Technology, Inc. | Multicast Source Move Detection for Layer-2 Interconnect Solutions |
US20130125120A1 (en) | 2011-11-15 | 2013-05-16 | Nicira, Inc. | Migrating middlebox state for distributed middleboxes |
US8451735B2 (en) | 2009-09-28 | 2013-05-28 | Symbol Technologies, Inc. | Systems and methods for dynamic load balancing in a wireless network |
US20130136126A1 (en) | 2011-11-30 | 2013-05-30 | Industrial Technology Research Institute | Data center network system and packet forwarding method thereof |
US20130159487A1 (en) | 2011-12-14 | 2013-06-20 | Microsoft Corporation | Migration of Virtual IP Addresses in a Failover Cluster |
US20130160024A1 (en) | 2011-12-20 | 2013-06-20 | Sybase, Inc. | Dynamic Load Balancing for Complex Event Processing |
US20130166703A1 (en) | 2011-12-27 | 2013-06-27 | Michael P. Hammer | System And Method For Management Of Network-Based Services |
US20130163594A1 (en) | 2011-12-21 | 2013-06-27 | Cisco Technology, Inc. | Overlay-Based Packet Steering |
US20130170501A1 (en) | 2011-12-28 | 2013-07-04 | Futurewei Technologies, Inc. | Service Router Architecture |
US8488577B1 (en) | 2012-06-06 | 2013-07-16 | Google Inc. | Apparatus for controlling the availability of internet access to applications |
US20130201989A1 (en) * | 2012-02-08 | 2013-08-08 | Radisys Corporation | Stateless load balancer in a multi-node system for transparent processing with packet preservation |
US8521879B1 (en) | 2008-03-11 | 2013-08-27 | United Services Automobile Assocation (USAA) | Systems and methods for a load balanced interior gateway protocol intranet |
US20130227550A1 (en) | 2012-02-27 | 2013-08-29 | Computer Associates Think, Inc. | System and method for isolated virtual image and appliance communication within a cloud environment |
US20130227097A1 (en) | 2010-09-14 | 2013-08-29 | Hitachi, Ltd. | Multi-tenancy information processing system, management server, and configuration management method |
US20130287036A1 (en) | 2012-04-30 | 2013-10-31 | International Business Machines Corporation | Providing services to virtual overlay network traffic |
US20130291088A1 (en) | 2012-04-11 | 2013-10-31 | Choung-Yaw Michael Shieh | Cooperative network security inspection |
US20130287026A1 (en) | 2012-04-13 | 2013-10-31 | Nicira Inc. | Extension of logical networks across layer 3 virtual private networks |
US20130297798A1 (en) | 2012-05-04 | 2013-11-07 | Mustafa Arisoylu | Two level packet distribution with stateless first level packet distribution to a group of servers and stateful second level packet distribution to a server within the group |
US20130301472A1 (en) | 2012-05-10 | 2013-11-14 | David Ian Allan | 802.1aq support over ietf evpn |
US20130311637A1 (en) | 2012-05-15 | 2013-11-21 | International Business Machines Corporation | Overlay tunnel information exchange protocol |
US20130318219A1 (en) | 2012-05-23 | 2013-11-28 | Brocade Communications Systems, Inc | Layer-3 overlay gateways |
US20130322446A1 (en) | 2012-06-05 | 2013-12-05 | International Business Machines Corporation | Virtual ethernet port aggregation (vepa)-enabled multi-tenant overlay network |
US20130332983A1 (en) | 2012-06-12 | 2013-12-12 | TELEFONAKTIEBOLAGET L M ERRICSSON (publ) | Elastic Enforcement Layer for Cloud Security Using SDN |
US20130336319A1 (en) | 2012-06-14 | 2013-12-19 | Liwu Liu | Multicast to unicast conversion technique |
US8615009B1 (en) | 2010-01-25 | 2013-12-24 | Juniper Networks, Inc. | Interface for extending service capabilities of a network device |
US20130343378A1 (en) | 2012-06-21 | 2013-12-26 | Mark Veteikis | Virtual data loopback and/or data capture in a computing system |
US20130343174A1 (en) | 2012-06-26 | 2013-12-26 | Juniper Networks, Inc. | Service plane triggered fast reroute protection |
US20140003232A1 (en) | 2012-06-27 | 2014-01-02 | Juniper Networks, Inc. | Feedback loop for service engineered paths |
US20140003422A1 (en) | 2012-06-29 | 2014-01-02 | Jeffrey C. Mogul | Implementing a software defined network using event records that are transmitted from a network switch |
US20140010085A1 (en) | 2012-07-09 | 2014-01-09 | Arun Kavunder | System and method associated with a service flow router |
CN103516807A (en) | 2013-10-14 | 2014-01-15 | 中国联合网络通信集团有限公司 | Cloud computing platform server load balancing system and method |
US20140029447A1 (en) | 2012-07-25 | 2014-01-30 | Qualcomm Atheros, Inc. | Forwarding tables for hybrid communication networks |
US20140046998A1 (en) | 2012-08-09 | 2014-02-13 | International Business Machines Corporation | Service management modes of operation in distributed node service management |
US20140046997A1 (en) | 2012-08-09 | 2014-02-13 | International Business Machines Corporation | Service management roles of processor nodes in distributed node service management |
US20140052844A1 (en) | 2012-08-17 | 2014-02-20 | Vmware, Inc. | Management of a virtual machine in a storage area network environment |
US20140059204A1 (en) | 2012-08-24 | 2014-02-27 | Filip Nguyen | Systems and methods for providing message flow analysis for an enterprise service bus |
US20140059544A1 (en) | 2012-08-27 | 2014-02-27 | Vmware, Inc. | Framework for networking and security services in virtual networks |
US20140068602A1 (en) | 2012-09-04 | 2014-03-06 | Aaron Robert Gember | Cloud-Based Middlebox Management System |
US20140092914A1 (en) | 2012-10-02 | 2014-04-03 | Lsi Corporation | Method and system for intelligent deep packet buffering |
US20140092738A1 (en) | 2012-09-28 | 2014-04-03 | Juniper Networks, Inc. | Maintaining load balancing after service application with a netwok device |
US20140096183A1 (en) | 2012-10-01 | 2014-04-03 | International Business Machines Corporation | Providing services to virtual overlay network traffic |
US20140101226A1 (en) | 2012-10-08 | 2014-04-10 | Motorola Mobility Llc | Methods and apparatus for performing dynamic load balancing of processing resources |
US20140101656A1 (en) | 2012-10-10 | 2014-04-10 | Zhongwen Zhu | Virtual firewall mobility |
US20140108665A1 (en) | 2012-10-16 | 2014-04-17 | Citrix Systems, Inc. | Systems and methods for bridging between public and private clouds through multilevel api integration |
US8707383B2 (en) | 2006-08-16 | 2014-04-22 | International Business Machines Corporation | Computer workload management with security policy enforcement |
US20140115578A1 (en) | 2012-10-21 | 2014-04-24 | Geoffrey Howard Cooper | Providing a virtual security appliance architecture to a virtual cloud infrastructure |
US20140129715A1 (en) | 2012-11-07 | 2014-05-08 | Yahoo! Inc. | Method and system for work load balancing |
CN103795805A (en) | 2014-02-27 | 2014-05-14 | 中国科学技术大学苏州研究院 | Distributed server load balancing method based on SDN |
US8738702B1 (en) | 2005-07-13 | 2014-05-27 | At&T Intellectual Property Ii, L.P. | Method and system for a personalized content dissemination platform |
US20140149696A1 (en) | 2012-11-28 | 2014-05-29 | Red Hat Israel, Ltd. | Virtual machine backup using snapshots and current configuration |
US20140164477A1 (en) | 2012-12-06 | 2014-06-12 | Gary M. Springer | System and method for providing horizontal scaling of stateful applications |
US20140169168A1 (en) | 2012-12-06 | 2014-06-19 | A10 Networks, Inc. | Configuration of a virtual service network |
US20140195666A1 (en) | 2011-08-04 | 2014-07-10 | Midokura Sarl | System and method for implementing and managing virtual networks |
US20140207968A1 (en) | 2013-01-23 | 2014-07-24 | Cisco Technology, Inc. | Server Load Balancer Traffic Steering |
US8804746B2 (en) | 2009-09-17 | 2014-08-12 | Zte Corporation | Network based on identity identifier and location separation architecture backbone network, and network element thereof |
US8804720B1 (en) | 2010-12-22 | 2014-08-12 | Juniper Networks, Inc. | Pass-through multicast admission control signaling |
US8832683B2 (en) | 2009-11-30 | 2014-09-09 | Red Hat Israel, Ltd. | Using memory-related metrics of host machine for triggering load balancing that migrate virtual machine |
US20140254374A1 (en) | 2013-03-11 | 2014-09-11 | Cisco Technology, Inc. | Methods and devices for providing service clustering in a trill network |
US20140254591A1 (en) | 2013-03-08 | 2014-09-11 | Dell Products L.P. | Processing of multicast traffic in computer networks |
US20140280896A1 (en) | 2013-03-15 | 2014-09-18 | Achilleas Papakostas | Methods and apparatus to credit usage of mobile devices |
US20140282526A1 (en) | 2013-03-15 | 2014-09-18 | Avi Networks | Managing and controlling a distributed network service platform |
US20140269487A1 (en) | 2013-03-15 | 2014-09-18 | Vivint, Inc. | Multicast traffic management within a wireless mesh network |
US20140269717A1 (en) | 2013-03-15 | 2014-09-18 | Cisco Technology, Inc. | Ipv6/ipv4 resolution-less forwarding up to a destination |
US20140269724A1 (en) | 2013-03-04 | 2014-09-18 | Telefonaktiebolaget L M Ericsson (Publ) | Method and devices for forwarding ip data packets in an access network |
US20140281029A1 (en) | 2013-03-14 | 2014-09-18 | Time Warner Cable Enterprises Llc | System and method for automatic routing of dynamic host configuration protocol (dhcp) traffic |
US8849746B2 (en) | 2006-12-19 | 2014-09-30 | Teradata Us, Inc. | High-throughput extract-transform-load (ETL) of program events for subsequent analysis |
US20140301388A1 (en) | 2013-04-06 | 2014-10-09 | Citrix Systems, Inc. | Systems and methods to cache packet steering decisions for a cluster of load balancers |
US20140304231A1 (en) | 2013-04-06 | 2014-10-09 | Citrix Systems, Inc. | Systems and methods for application-state distributed replication table hunting |
US8862883B2 (en) | 2012-05-16 | 2014-10-14 | Cisco Technology, Inc. | System and method for secure cloud service delivery with prioritized services in a network environment |
US20140310391A1 (en) | 2013-04-16 | 2014-10-16 | Amazon Technologies, Inc. | Multipath routing in a distributed load balancer |
US20140310418A1 (en) | 2013-04-16 | 2014-10-16 | Amazon Technologies, Inc. | Distributed load balancer |
US20140307744A1 (en) | 2013-04-12 | 2014-10-16 | Futurewei Technologies, Inc. | Service Chain Policy for Distributed Gateways in Virtual Overlay Networks |
US8868711B2 (en) | 2012-02-03 | 2014-10-21 | Microsoft Corporation | Dynamic load balancing in a scalable environment |
US20140317677A1 (en) | 2013-04-19 | 2014-10-23 | Vmware, Inc. | Framework for coordination between endpoint security and network security services |
US8874789B1 (en) | 2007-09-28 | 2014-10-28 | Trend Micro Incorporated | Application based routing arrangements and method thereof |
US20140321459A1 (en) | 2013-04-26 | 2014-10-30 | Cisco Technology, Inc. | Architecture for agentless service insertion |
US20140334485A1 (en) | 2013-05-09 | 2014-11-13 | Vmware, Inc. | Method and system for service switching using service tags |
US20140334488A1 (en) | 2013-05-10 | 2014-11-13 | Cisco Technology, Inc. | Data Plane Learning of Bi-Directional Service Chains |
US8892706B1 (en) | 2010-06-21 | 2014-11-18 | Vmware, Inc. | Private ethernet overlay networks over a shared ethernet in a virtual environment |
US20140341029A1 (en) | 2013-05-20 | 2014-11-20 | Telefonaktiebolaget L M Ericsson (Publ) | Encoding a payload hash in the da-mac to facilitate elastic chaining of packet processing elements |
US20140351452A1 (en) | 2013-05-21 | 2014-11-27 | Cisco Technology, Inc. | Chaining Service Zones by way of Route Re-Origination |
US20140362705A1 (en) | 2013-06-07 | 2014-12-11 | The Florida International University Board Of Trustees | Load-balancing algorithms for data center networks |
US20140362682A1 (en) | 2013-06-07 | 2014-12-11 | Cisco Technology, Inc. | Determining the Operations Performed Along a Service Path/Service Chain |
US8914406B1 (en) | 2012-02-01 | 2014-12-16 | Vorstack, Inc. | Scalable network security with fast response protocol |
US20140372567A1 (en) | 2013-06-17 | 2014-12-18 | Telefonaktiebolaget L M Ericsson (Publ) | Methods of forwarding data packets using transient tables and related load balancers |
US20140372702A1 (en) | 2013-06-12 | 2014-12-18 | Oracle International Corporation | Handling memory pressure in an in-database sharded queue |
US20140369204A1 (en) | 2013-06-17 | 2014-12-18 | Telefonaktiebolaget L M Ericsson (Publ) | Methods of load balancing using primary and stand-by addresses and related load balancers and servers |
US20140372616A1 (en) | 2013-06-17 | 2014-12-18 | Telefonaktiebolaget L M Ericsson (Publ) | Methods of forwarding/receiving data packets using unicast and/or multicast communications and related load balancers and servers |
US20150003455A1 (en) | 2012-07-24 | 2015-01-01 | Telefonaktiebolaget L M Ericsson (Publ) | System and method for enabling services chaining in a provider network |
US20150003453A1 (en) | 2013-06-28 | 2015-01-01 | Vmware, Inc. | Network service slotting |
US20150009995A1 (en) | 2013-07-08 | 2015-01-08 | Nicira, Inc. | Encapsulating Data Packets Using an Adaptive Tunnelling Protocol |
US20150016279A1 (en) | 2013-07-09 | 2015-01-15 | Nicira, Inc. | Using Headerspace Analysis to Identify Classes of Packets |
US20150023354A1 (en) | 2012-11-19 | 2015-01-22 | Huawei Technologies Co., Ltd. | Method and device for allocating packet switching resource |
US20150026362A1 (en) | 2013-07-17 | 2015-01-22 | Cisco Technology, Inc. | Dynamic Service Path Creation |
US20150026345A1 (en) | 2013-07-22 | 2015-01-22 | Vmware, Inc. | Managing link aggregation traffic in a virtual environment |
US20150030024A1 (en) | 2013-07-23 | 2015-01-29 | Dell Products L.P. | Systems and methods for a data center architecture facilitating layer 2 over layer 3 communication |
US20150052522A1 (en) | 2013-08-14 | 2015-02-19 | Nicira, Inc. | Generation of DHCP Configuration Files |
US20150052262A1 (en) | 2013-08-14 | 2015-02-19 | Nicira, Inc. | Providing Services for Logical Networks |
US8971345B1 (en) | 2010-03-22 | 2015-03-03 | Riverbed Technology, Inc. | Method and apparatus for scheduling a heterogeneous communication flow |
US20150063364A1 (en) | 2013-09-04 | 2015-03-05 | Nicira, Inc. | Multiple Active L3 Gateways for Logical Networks |
US20150063102A1 (en) | 2013-08-30 | 2015-03-05 | Cisco Technology, Inc. | Flow Based Network Service Insertion |
US20150073967A1 (en) | 2012-09-12 | 2015-03-12 | Iex Group, Inc. | Transmission latency leveling apparatuses, methods and systems |
US20150078384A1 (en) | 2013-09-15 | 2015-03-19 | Nicira, Inc. | Tracking Prefixes of Values Associated with Different Rules to Generate Flows |
US8989192B2 (en) | 2012-08-15 | 2015-03-24 | Futurewei Technologies, Inc. | Method and system for creating software defined ordered service patterns in a communications network |
US8996610B1 (en) | 2010-03-15 | 2015-03-31 | Salesforce.Com, Inc. | Proxy system, method and computer program product for utilizing an identifier of a request to route the request to a networked device |
US20150092551A1 (en) | 2013-09-30 | 2015-04-02 | Juniper Networks, Inc. | Session-aware service chaining within computer networks |
US20150092564A1 (en) | 2013-09-27 | 2015-04-02 | Futurewei Technologies, Inc. | Validation of Chained Network Services |
US9009289B1 (en) | 2014-03-31 | 2015-04-14 | Flexera Software Llc | Systems and methods for assessing application usage |
US20150103679A1 (en) | 2013-10-13 | 2015-04-16 | Vmware, Inc. | Tracing Host-Originated Logical Network Packets |
US20150103645A1 (en) | 2013-10-10 | 2015-04-16 | Vmware, Inc. | Controller side method of generating and updating a controller assignment list |
US20150103827A1 (en) | 2013-10-14 | 2015-04-16 | Cisco Technology, Inc. | Configurable Service Proxy Mapping |
US20150109901A1 (en) | 2012-06-30 | 2015-04-23 | Huawei Technologies Co., Ltd. | Method for managing forwarding plane tunnel resource under control and forwarding decoupled architecture |
US20150124840A1 (en) | 2013-11-03 | 2015-05-07 | Ixia | Packet flow modification |
US20150124622A1 (en) | 2013-11-01 | 2015-05-07 | Movik Networks, Inc. | Multi-Interface, Multi-Layer State-full Load Balancer For RAN-Analytics Deployments In Multi-Chassis, Cloud And Virtual Server Environments |
US20150124608A1 (en) | 2013-11-05 | 2015-05-07 | International Business Machines Corporation | Adaptive Scheduling of Data Flows in Data Center Networks for Efficient Resource Utilization |
US20150138973A1 (en) | 2013-11-15 | 2015-05-21 | Cisco Technology, Inc. | Shortening of service paths in service chains in a communications network |
US20150139041A1 (en) | 2013-11-21 | 2015-05-21 | Cisco Technology, Inc. | Subscriber dependent redirection between a mobile packet core proxy and a cell site proxy in a network environment |
US20150146539A1 (en) | 2013-11-25 | 2015-05-28 | Versa Networks, Inc. | Flow distribution table for packet flow load balancing |
US20150188770A1 (en) | 2013-12-27 | 2015-07-02 | Big Switch Networks, Inc. | Systems and methods for performing network service insertion |
US20150195197A1 (en) | 2014-01-06 | 2015-07-09 | Futurewei Technologies, Inc. | Service Function Chaining in a Packet Network |
US9094464B1 (en) | 2014-12-18 | 2015-07-28 | Limelight Networks, Inc. | Connection digest for accelerating web traffic |
US20150215819A1 (en) | 2014-01-24 | 2015-07-30 | Cisco Technology, Inc. | Method for Providing Sticky Load Balancing |
US20150213087A1 (en) | 2014-01-28 | 2015-07-30 | Software Ag | Scaling framework for querying |
US20150222640A1 (en) | 2014-02-03 | 2015-08-06 | Cisco Technology, Inc. | Elastic Service Chains |
US20150236948A1 (en) | 2014-02-14 | 2015-08-20 | Futurewei Technologies, Inc. | Restoring service functions after changing a service chain instance path |
US20150237013A1 (en) | 2014-02-20 | 2015-08-20 | Nicira, Inc. | Specifying point of enforcement in a firewall rule |
US20150244617A1 (en) | 2012-06-06 | 2015-08-27 | Juniper Networks, Inc. | Physical path determination for virtual network packet flows |
US20150242197A1 (en) | 2014-02-25 | 2015-08-27 | Red Hat, Inc. | Automatic Installing and Scaling of Application Resources in a Multi-Tenant Platform-as-a-Service (PaaS) System |
US20150263901A1 (en) | 2014-03-13 | 2015-09-17 | Cisco Technology, Inc. | Service node originated service chains in a network environment |
US20150263946A1 (en) | 2014-03-14 | 2015-09-17 | Nicira, Inc. | Route advertisement by managed gateways |
US20150271102A1 (en) | 2014-03-21 | 2015-09-24 | Juniper Networks, Inc. | Selectable service node resources |
US9148367B2 (en) | 2012-10-02 | 2015-09-29 | Cisco Technology, Inc. | System and method for binding flows in a service cluster deployment in a network environment |
US20150281098A1 (en) | 2014-03-31 | 2015-10-01 | Nicira, Inc. | Flow Cache Hierarchy |
US20150281089A1 (en) | 2014-03-31 | 2015-10-01 | Sandvine Incorporated Ulc | System and method for load balancing in computer networks |
US20150281179A1 (en) | 2014-03-31 | 2015-10-01 | Chids Raman | Migrating firewall connection state for a firewall service virtual machine |
US20150280959A1 (en) | 2014-03-31 | 2015-10-01 | Amazon Technologies, Inc. | Session management in distributed storage systems |
US20150281180A1 (en) | 2014-03-31 | 2015-10-01 | Nicira, Inc. | Method and apparatus for integrating a service virtual machine |
US20150288671A1 (en) | 2012-11-02 | 2015-10-08 | Silverlake Mobility Ecosystem Sdn Bhd | Method of processing requests for digital services |
US20150288679A1 (en) | 2014-04-02 | 2015-10-08 | Cisco Technology, Inc. | Interposer with Security Assistant Key Escrow |
US20150295831A1 (en) | 2014-04-10 | 2015-10-15 | Cisco Technology, Inc. | Network address translation offload to network infrastructure for service chains in a network environment |
US9178709B2 (en) | 2004-03-30 | 2015-11-03 | Panasonic Intellectual Property Management Co., Ltd. | Communication system and method for distributing content |
US20150319096A1 (en) | 2014-05-05 | 2015-11-05 | Nicira, Inc. | Secondary input queues for maintaining a consistent network state |
US20150319078A1 (en) | 2014-05-02 | 2015-11-05 | Futurewei Technologies, Inc. | Computing Service Chain-Aware Paths |
US9191293B2 (en) | 2008-12-22 | 2015-11-17 | Telefonaktiebolaget L M Ericsson (Publ) | Method and device for handling of connections between a client and a server via a communication network |
US9203748B2 (en) | 2012-12-24 | 2015-12-01 | Huawei Technologies Co., Ltd. | Software defined network-based data processing method, node, and system |
US20150358235A1 (en) | 2014-06-05 | 2015-12-10 | Futurewei Technologies, Inc. | Service Chain Topology Map Construction |
US20150358294A1 (en) | 2014-06-05 | 2015-12-10 | Cavium, Inc. | Systems and methods for secured hardware security module communication with web service hosts |
US20150365322A1 (en) | 2014-06-13 | 2015-12-17 | Cisco Technology, Inc. | Providing virtual private service chains in a network environment |
US20150372840A1 (en) | 2014-06-23 | 2015-12-24 | International Business Machines Corporation | Servicing packets in a virtual network and a software-defined network (sdn) |
US20150370586A1 (en) | 2014-06-23 | 2015-12-24 | Intel Corporation | Local service chaining with virtual machines and virtualized containers in software defined networking |
US20150370596A1 (en) | 2014-06-20 | 2015-12-24 | Google Inc. | System and method for live migration of a virtualized networking stack |
US20150372911A1 (en) | 2013-01-31 | 2015-12-24 | Hitachi, Ltd. | Communication path management method |
US20150381495A1 (en) | 2014-06-30 | 2015-12-31 | Nicira, Inc. | Methods and systems for providing multi-tenancy support for single root i/o virtualization |
US20150381494A1 (en) | 2014-06-30 | 2015-12-31 | Nicira, Inc. | Methods and systems to offload overlay network packet encapsulation to hardware |
US20150381493A1 (en) | 2014-06-30 | 2015-12-31 | Juniper Networks, Inc. | Service chaining across multiple networks |
US20150379277A1 (en) | 2014-06-30 | 2015-12-31 | Leonard Heyman | Encryption Architecture |
US9232342B2 (en) | 2011-10-24 | 2016-01-05 | Interdigital Patent Holdings, Inc. | Methods, systems and apparatuses for application service layer (ASL) inter-networking |
US20160006654A1 (en) | 2014-07-07 | 2016-01-07 | Cisco Technology, Inc. | Bi-directional flow stickiness in a network environment |
US9237098B2 (en) | 2012-07-03 | 2016-01-12 | Cisco Technologies, Inc. | Media access control (MAC) address summation in Datacenter Ethernet networking |
US20160028640A1 (en) | 2014-07-22 | 2016-01-28 | Futurewei Technologies, Inc. | Service Chain Header and Metadata Transport |
US9256467B1 (en) | 2014-11-11 | 2016-02-09 | Amazon Technologies, Inc. | System for managing and scheduling containers |
US9258742B1 (en) | 2013-09-30 | 2016-02-09 | Juniper Networks, Inc. | Policy-directed value-added services chaining |
US20160043901A1 (en) | 2012-09-25 | 2016-02-11 | A10 Networks, Inc. | Graceful scaling in software driven networks |
US20160043952A1 (en) | 2014-08-06 | 2016-02-11 | Futurewei Technologies, Inc. | Mechanisms to support service chain graphs in a communication network |
US9264313B1 (en) | 2013-10-31 | 2016-02-16 | Vmware, Inc. | System and method for performing a service discovery for virtual networks |
US20160057687A1 (en) | 2014-08-19 | 2016-02-25 | Qualcomm Incorporated | Inter/intra radio access technology mobility and user-plane split measurement configuration |
US20160057050A1 (en) | 2012-10-05 | 2016-02-25 | Stamoulis & Weinblatt LLC | Devices, methods, and systems for packet reroute permission based on content parameters embedded in packet header or payload |
US9277412B2 (en) | 2009-11-16 | 2016-03-01 | Interdigital Patent Holdings, Inc. | Coordination of silent periods for dynamic spectrum manager (DSM) |
US20160065503A1 (en) | 2014-08-29 | 2016-03-03 | Extreme Networks, Inc. | Methods, systems, and computer readable media for virtual fabric routing |
US20160080253A1 (en) | 2013-05-23 | 2016-03-17 | Huawei Technologies Co. Ltd. | Service routing system, device, and method |
US20160094642A1 (en) | 2014-09-30 | 2016-03-31 | Nicira, Inc. | Dynamically adjusting load balancing |
US20160094384A1 (en) | 2014-09-30 | 2016-03-31 | Nicira, Inc. | Controller Driven Reconfiguration of a Multi-Layered Application or Service Model |
US20160094456A1 (en) | 2014-09-30 | 2016-03-31 | Nicira, Inc. | Method and apparatus for distributing load among a plurality of service nodes |
US20160099948A1 (en) | 2013-06-14 | 2016-04-07 | Tocario Gmbh | Method and system for enabling access of a client device to a remote desktop |
US20160105333A1 (en) | 2014-10-10 | 2016-04-14 | Nicira, Inc. | Logical network traffic analysis |
US20160119226A1 (en) | 2014-10-24 | 2016-04-28 | Cisco Technology, Inc. | Transparent Network Service Header Path Proxies |
US20160127564A1 (en) | 2014-10-29 | 2016-05-05 | Alcatel-Lucent Usa Inc. | Policy decisions based on offline charging rules when service chaining is implemented |
US20160127306A1 (en) | 2013-07-11 | 2016-05-05 | Huawei Technologies Co., Ltd. | Packet Transmission Method, Apparatus, and System in Multicast Domain Name System |
US20160134528A1 (en) | 2014-11-10 | 2016-05-12 | Juniper Networks, Inc. | Signaling aliasing capability in data centers |
US20160149784A1 (en) | 2014-11-20 | 2016-05-26 | Telefonaktiebolaget L M Ericsson (Publ) | Passive Performance Measurement for Inline Service Chaining |
US20160149828A1 (en) | 2014-11-25 | 2016-05-26 | Netapp, Inc. | Clustered storage system path quiescence analysis |
US20160149816A1 (en) | 2013-06-14 | 2016-05-26 | Haitao Wu | Fault Tolerant and Load Balanced Routing |
US20160164776A1 (en) | 2014-12-09 | 2016-06-09 | Aol Inc. | Systems and methods for software defined networking service function chaining |
US20160164787A1 (en) | 2014-06-05 | 2016-06-09 | KEMP Technologies Inc. | Methods for intelligent data traffic steering |
US20160164826A1 (en) | 2014-12-04 | 2016-06-09 | Cisco Technology, Inc. | Policy Implementation at a Network Element based on Data from an Authoritative Source |
US20160173373A1 (en) | 2014-12-11 | 2016-06-16 | Cisco Technology, Inc. | Network service header metadata for load balancing |
US20160182684A1 (en) | 2014-12-23 | 2016-06-23 | Patrick Connor | Parallel processing of service functions in service function chains |
US20160197839A1 (en) | 2015-01-05 | 2016-07-07 | Futurewei Technologies, Inc. | Method and system for providing qos for in-band control traffic in an openflow network |
US20160197831A1 (en) | 2013-08-16 | 2016-07-07 | Interdigital Patent Holdings, Inc. | Method and apparatus for name resolution in software defined networking |
US20160205015A1 (en) | 2015-01-08 | 2016-07-14 | Openwave Mobility Inc. | Software defined network and a communication network comprising the same |
US20160203817A1 (en) | 2012-02-28 | 2016-07-14 | Ten Eight Technology, Inc. | Automated voice-to-reporting/management system and method for voice call-ins of events/crimes |
US9397946B1 (en) | 2013-11-05 | 2016-07-19 | Cisco Technology, Inc. | Forwarding to clusters of service nodes |
US20160212048A1 (en) | 2015-01-15 | 2016-07-21 | Hewlett Packard Enterprise Development Lp | Openflow service chain data packet routing using tables |
US20160212237A1 (en) | 2015-01-16 | 2016-07-21 | Fujitsu Limited | Management server, communication system and path management method |
US20160218918A1 (en) | 2015-01-27 | 2016-07-28 | Xingjun Chu | Network virtualization for network infrastructure |
US9407540B2 (en) | 2013-09-06 | 2016-08-02 | Cisco Technology, Inc. | Distributed service chaining in a network environment |
US20160226754A1 (en) | 2015-01-30 | 2016-08-04 | Nicira, Inc. | Logical router with multiple routing components |
US20160232019A1 (en) | 2015-02-09 | 2016-08-11 | Broadcom Corporation | Network Interface Controller with Integrated Network Flow Processing |
US20160248685A1 (en) | 2015-02-25 | 2016-08-25 | Cisco Technology, Inc. | Metadata augmentation in a service function chain |
US9442752B1 (en) | 2014-09-03 | 2016-09-13 | Amazon Technologies, Inc. | Virtual secure execution environments |
US20160277210A1 (en) | 2015-03-18 | 2016-09-22 | Juniper Networks, Inc. | Evpn inter-subnet multicast forwarding |
US20160277294A1 (en) | 2013-08-26 | 2016-09-22 | Nec Corporation | Communication apparatus, communication method, control apparatus, and management apparatus in a communication system |
US20160294933A1 (en) | 2015-04-03 | 2016-10-06 | Nicira, Inc. | Method, apparatus, and system for implementing a content switch |
US20160294612A1 (en) | 2015-04-04 | 2016-10-06 | Nicira, Inc. | Route Server Mode for Dynamic Routing Between Logical and Physical Networks |
US20160308961A1 (en) | 2014-01-06 | 2016-10-20 | Tencent Technology (Shenzhen) Company Limited | Methods, Devices, and Systems for Allocating Service Nodes in a Network |
US20160308758A1 (en) | 2015-04-17 | 2016-10-20 | Huawei Technologies Co., Ltd | Software Defined Network (SDN) Control Signaling for Traffic Engineering to Enable Multi-type Transport in a Data Plane |
US9479358B2 (en) | 2009-05-13 | 2016-10-25 | International Business Machines Corporation | Managing graphics load balancing strategies |
US20160337249A1 (en) | 2014-01-29 | 2016-11-17 | Huawei Technologies Co., Ltd. | Communications network, device, and control method |
US20160337189A1 (en) | 2013-12-19 | 2016-11-17 | Rainer Liebhart | A method and apparatus for performing flexible service chaining |
US20160337317A1 (en) | 2015-05-13 | 2016-11-17 | International Business Machines Corporation | Automated Migration Planning for Moving into a Setting of Multiple Firewalls |
US9503530B1 (en) | 2008-08-21 | 2016-11-22 | United Services Automobile Association (Usaa) | Preferential loading in data centers |
US20160344621A1 (en) | 2014-12-17 | 2016-11-24 | Telefonaktiebolaget L M Ericsson (Publ) | Method and arrangement for relocating packet processing functions |
US20160344565A1 (en) | 2015-05-20 | 2016-11-24 | Cisco Technology, Inc. | System and method to facilitate the assignment of service functions for service chains in a network environment |
US20160352866A1 (en) | 2015-05-25 | 2016-12-01 | Juniper Networks, Inc. | Selecting and monitoring a plurality of services key performance indicators using twamp |
US20160366046A1 (en) | 2015-06-09 | 2016-12-15 | International Business Machines Corporation | Support for high availability of service appliances in a software-defined network (sdn) service chaining infrastructure |
US20160373364A1 (en) | 2014-03-04 | 2016-12-22 | Nec Corporation | Packet processing device, packet processing method and program |
US20160378537A1 (en) | 2014-03-12 | 2016-12-29 | Huawei Technologies Co., Ltd. | Method and Apparatus for Controlling Virtual Machine Migration |
US20170005882A1 (en) | 2014-01-24 | 2017-01-05 | Zte Corporation | Service Chain Management Method, System and Device |
US20170005988A1 (en) | 2015-06-30 | 2017-01-05 | Nicira, Inc. | Global objects for federated firewall rule management |
US20170005923A1 (en) | 2015-06-30 | 2017-01-05 | Vmware, Inc. | Dynamic virtual machine network policy for ingress optimization |
US20170005920A1 (en) | 2015-07-01 | 2017-01-05 | Cisco Technology, Inc. | Forwarding packets with encapsulated service chain headers |
US20170019341A1 (en) | 2014-04-01 | 2017-01-19 | Huawei Technologies Co., Ltd. | Service link selection control method and device |
US20170019329A1 (en) | 2015-07-15 | 2017-01-19 | Argela-USA, Inc. | Method for forwarding rule hopping based secure communication |
US20170019303A1 (en) | 2015-07-14 | 2017-01-19 | Microsoft Technology Licensing, Llc | Service Chains for Network Services |
US20170019331A1 (en) | 2015-07-13 | 2017-01-19 | Futurewei Technologies, Inc. | Internet Control Message Protocol Enhancement for Traffic Carried by a Tunnel over Internet Protocol Networks |
US20170026417A1 (en) | 2015-07-23 | 2017-01-26 | Cisco Technology, Inc. | Systems, methods, and devices for smart mapping and vpn policy enforcement |
US20170033939A1 (en) | 2015-07-28 | 2017-02-02 | Ciena Corporation | Multicast systems and methods for segment routing |
US20170064749A1 (en) | 2015-08-28 | 2017-03-02 | Nicira, Inc. | Associating Service Tags with Remote Data Message Flows Based on Remote Device Management Attributes |
US20170064048A1 (en) | 2015-08-28 | 2017-03-02 | Nicira, Inc. | Packet Data Restoration for Flow-Based Forwarding Element |
US20170063683A1 (en) | 2015-08-28 | 2017-03-02 | Nicira, Inc. | Traffic forwarding between geographically dispersed sites |
US20170078961A1 (en) | 2015-09-10 | 2017-03-16 | Qualcomm Incorporated | Smart co-processor for optimizing service discovery power consumption in wireless service platforms |
US20170078176A1 (en) | 2015-09-11 | 2017-03-16 | Telefonaktiebolaget L M Ericsson (Publ) | Method and system for delay measurement of a traffic flow in a software-defined networking (sdn) system |
US9602380B2 (en) | 2014-03-28 | 2017-03-21 | Futurewei Technologies, Inc. | Context-aware dynamic policy selection for load balancing behavior |
US20170093698A1 (en) | 2015-09-30 | 2017-03-30 | Huawei Technologies Co., Ltd. | Method and apparatus for supporting service function chaining in a communication network |
US20170093758A1 (en) | 2015-09-30 | 2017-03-30 | Nicira, Inc. | Ip aliases in logical networks with hardware switches |
US20170099194A1 (en) | 2014-06-17 | 2017-04-06 | Huawei Technologies Co., Ltd. | Service flow processing method, apparatus, and device |
US20170126522A1 (en) | 2015-10-30 | 2017-05-04 | Oracle International Corporation | Methods, systems, and computer readable media for remote authentication dial in user service (radius) message loop detection and mitigation |
US20170126497A1 (en) | 2015-10-31 | 2017-05-04 | Nicira, Inc. | Static Route Types for Logical Routers |
US20170126726A1 (en) | 2015-11-01 | 2017-05-04 | Nicira, Inc. | Securing a managed forwarding element that operates within a data compute node |
US20170134538A1 (en) | 2015-11-10 | 2017-05-11 | Telefonaktiebolaget L M Ericsson (Publ) | Systems and methods of an enhanced state-aware proxy device |
US20170149675A1 (en) | 2015-11-25 | 2017-05-25 | Huawei Technologies Co., Ltd. | Packet retransmission method and apparatus |
US20170147399A1 (en) | 2015-11-25 | 2017-05-25 | International Business Machines Corporation | Policy-based virtual machine selection during an optimization cycle |
US20170149582A1 (en) | 2015-11-20 | 2017-05-25 | Oracle International Corporation | Redirecting packets for egress from an autonomous system using tenant specific routing and forwarding tables |
US20170163531A1 (en) | 2015-12-04 | 2017-06-08 | Cisco Technology, Inc. | Infrastructure-exclusive service forwarding |
US20170163724A1 (en) | 2015-12-04 | 2017-06-08 | Microsoft Technology Licensing, Llc | State-Aware Load Balancing |
US20170171159A1 (en) | 2015-12-14 | 2017-06-15 | Nicira, Inc. | Packet tagging for improved guest system security |
US20170180240A1 (en) | 2015-12-16 | 2017-06-22 | Telefonaktiebolaget Lm Ericsson (Publ) | Openflow configured horizontally split hybrid sdn nodes |
US20170195255A1 (en) | 2015-12-31 | 2017-07-06 | Fortinet, Inc. | Packet routing using a software-defined networking (sdn) switch |
US9705775B2 (en) | 2014-11-20 | 2017-07-11 | Telefonaktiebolaget Lm Ericsson (Publ) | Passive performance measurement for inline service chaining |
US20170208532A1 (en) | 2014-09-30 | 2017-07-20 | Huawei Technologies Co., Ltd. | Service path generation method and apparatus |
US20170208000A1 (en) | 2016-01-15 | 2017-07-20 | Cisco Technology, Inc. | Leaking routes in a service chain |
US20170208011A1 (en) | 2016-01-19 | 2017-07-20 | Cisco Technology, Inc. | System and method for hosting mobile packet core and value-added services using a software defined network and service chains |
US20170214627A1 (en) | 2016-01-21 | 2017-07-27 | Futurewei Technologies, Inc. | Distributed Load Balancing for Network Service Function Chaining |
US20170220306A1 (en) | 2016-02-03 | 2017-08-03 | Google Inc. | Systems and methods for automatic content verification |
US20170230467A1 (en) | 2016-02-09 | 2017-08-10 | Cisco Technology, Inc. | Adding cloud service provider, could service, and cloud tenant awareness to network service chains |
US20170230333A1 (en) | 2016-02-08 | 2017-08-10 | Cryptzone North America, Inc. | Protecting network devices by a firewall |
US20170237656A1 (en) | 2016-02-12 | 2017-08-17 | Huawei Technologies Co., Ltd. | Method and apparatus for service function forwarding in a service domain |
CN107105061A (en) | 2017-05-31 | 2017-08-29 | 北京中电普华信息技术有限公司 | A kind of service registry method and device |
US20170250902A1 (en) | 2014-09-23 | 2017-08-31 | Nokia Solutions And Networks Oy | Control of communication using service function chaining |
US20170251065A1 (en) | 2016-02-29 | 2017-08-31 | Cisco Technology, Inc. | System and Method for Data Plane Signaled Packet Capture in a Service Function Chaining Network |
US20170250917A1 (en) | 2014-09-19 | 2017-08-31 | Nokia Solutions And Networks Oy | Chaining of network service functions in a communication network |
US20170250869A1 (en) | 2014-09-12 | 2017-08-31 | Andreas Richard Voellmy | Managing network forwarding configurations using algorithmic policies |
US9755971B2 (en) | 2013-08-12 | 2017-09-05 | Cisco Technology, Inc. | Traffic flow redirection between border routers using routing encapsulation |
US20170257432A1 (en) | 2011-02-09 | 2017-09-07 | Cliqr Technologies Inc. | Apparatus, systems and methods for container based service deployment |
US20170264677A1 (en) | 2014-11-28 | 2017-09-14 | Huawei Technologies Co., Ltd. | Service Processing Apparatus and Method |
US20170273099A1 (en) | 2014-12-09 | 2017-09-21 | Huawei Technologies Co., Ltd. | Method and apparatus for processing adaptive flow table |
CN107204941A (en) | 2016-03-18 | 2017-09-26 | 中兴通讯股份有限公司 | The method and apparatus that a kind of flexible Ethernet path is set up |
US20170279938A1 (en) | 2014-12-11 | 2017-09-28 | Huawei Technologies Co., Ltd. | Packet processing method and apparatus |
US9787559B1 (en) | 2014-03-28 | 2017-10-10 | Juniper Networks, Inc. | End-to-end monitoring of overlay networks providing virtualized network services |
US20170295100A1 (en) | 2016-04-12 | 2017-10-12 | Nicira, Inc. | Virtual tunnel endpoints for congestion-aware load balancing |
US20170295021A1 (en) | 2016-04-07 | 2017-10-12 | Telefonica, S.A. | Method to assure correct data packet traversal through a particular path of a network |
US20170310588A1 (en) | 2014-12-17 | 2017-10-26 | Huawei Technologies Co., Ltd. | Data forwarding method, device, and system in software-defined networking |
US20170310611A1 (en) | 2016-04-26 | 2017-10-26 | Cisco Technology, Inc. | System and method for automated rendering of service chaining |
US9804797B1 (en) | 2014-09-29 | 2017-10-31 | EMC IP Holding Company LLC | Using dynamic I/O load differential for load balancing |
US20170317887A1 (en) | 2016-04-29 | 2017-11-02 | Deutsche Telekom Ag | Versioning system for network states in a software-defined network |
US20170317926A1 (en) | 2016-04-27 | 2017-11-02 | Cisco Technology, Inc. | Generating packets in a reverse direction of a service function chain |
US20170317969A1 (en) | 2016-04-29 | 2017-11-02 | Nicira, Inc. | Implementing logical dhcp servers in logical networks |
US20170317936A1 (en) | 2016-04-28 | 2017-11-02 | Cisco Technology, Inc. | Selective steering network traffic to virtual service(s) using policy |
US20170318097A1 (en) | 2016-04-29 | 2017-11-02 | Hewlett Packard Enterprise Development Lp | Virtualized network function placements |
US20170317954A1 (en) | 2016-04-28 | 2017-11-02 | Nicira, Inc. | Automatic configuration of logical routers on edge nodes |
US20170324651A1 (en) | 2016-05-09 | 2017-11-09 | Cisco Technology, Inc. | Traceroute to return aggregated statistics in service chains |
US20170331672A1 (en) | 2016-05-11 | 2017-11-16 | Hewlett Packard Enterprise Development Lp | Filter tables for management functions |
US20170339110A1 (en) | 2015-02-13 | 2017-11-23 | Huawei Technologies Co., Ltd. | Access Control Apparatus, System, and Method |
US20170339600A1 (en) | 2014-12-19 | 2017-11-23 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and appratus for relocating packet processing functions |
US20170346764A1 (en) | 2012-06-29 | 2017-11-30 | Huawei Technologies Co., Ltd. | Method for Processing Information, Forwarding Plane Device and Control Plane Device |
US20170353387A1 (en) | 2016-06-07 | 2017-12-07 | Electronics And Telecommunications Research Institute | Distributed service function forwarding system |
US20170364794A1 (en) | 2016-06-20 | 2017-12-21 | Telefonaktiebolaget Lm Ericsson (Publ) | Method for classifying the payload of encrypted traffic flows |
US20170366605A1 (en) | 2016-06-16 | 2017-12-21 | Alcatel-Lucent Usa Inc. | Providing data plane services for applications |
US20170373990A1 (en) | 2016-06-23 | 2017-12-28 | Cisco Technology, Inc. | Transmitting network overlay information in a service function chain |
US20180004954A1 (en) | 2016-06-30 | 2018-01-04 | Amazon Technologies, Inc. | Secure booting of virtualization managers |
US20180006935A1 (en) | 2016-06-30 | 2018-01-04 | Juniper Networks, Inc. | Auto discovery and auto scaling of services in software-defined network environment |
US20180026911A1 (en) | 2016-07-25 | 2018-01-25 | Cisco Technology, Inc. | System and method for providing a resource usage advertising framework for sfc-based workloads |
US20180041470A1 (en) | 2016-08-08 | 2018-02-08 | Talari Networks Incorporated | Applications and integrated firewall design in an adaptive private network (apn) |
US20180041425A1 (en) | 2016-08-05 | 2018-02-08 | Huawei Technologies Co., Ltd. | Service-based traffic forwarding in virtual networks |
US20180041524A1 (en) | 2016-08-02 | 2018-02-08 | Cisco Technology, Inc. | Steering of cloned traffic in a service function chain |
US20180063018A1 (en) | 2016-08-30 | 2018-03-01 | Cisco Technology, Inc. | System and method for managing chained services in a network environment |
US20180063087A1 (en) | 2016-08-27 | 2018-03-01 | Nicira, Inc. | Managed forwarding element executing in separate namespace of public cloud data compute node than workload application |
CA3034809A1 (en) | 2016-08-27 | 2018-03-08 | Nicira, Inc. | Extension of network control system into public cloud |
US20180091420A1 (en) | 2016-09-26 | 2018-03-29 | Juniper Networks, Inc. | Distributing service function chain data and service function instance data in a network |
US20180102965A1 (en) | 2016-10-07 | 2018-04-12 | Alcatel-Lucent Usa Inc. | Unicast branching based multicast |
US20180102919A1 (en) | 2015-06-10 | 2018-04-12 | Huawei Technologies Co., Ltd. | Method for implementing service chain, device, and system |
US20180115471A1 (en) | 2015-04-23 | 2018-04-26 | Hewlett Packard Enterprise Development Lp | Network infrastructure device to implement pre-filter rules |
US20180124061A1 (en) | 2016-11-03 | 2018-05-03 | Nicira, Inc. | Performing services on a host |
US20180123950A1 (en) | 2016-11-03 | 2018-05-03 | Parallel Wireless, Inc. | Traffic Shaping and End-to-End Prioritization |
US20180139098A1 (en) | 2016-11-14 | 2018-05-17 | Futurewei Technologies, Inc. | Integrating physical and virtual network functions in a service-chained network environment |
US20180145899A1 (en) | 2016-11-22 | 2018-05-24 | Gigamon Inc. | Dynamic Service Chaining and Late Binding |
US20180159943A1 (en) | 2016-12-06 | 2018-06-07 | Nicira, Inc. | Performing context-rich attribute-based services on a host |
US20180159801A1 (en) | 2016-12-07 | 2018-06-07 | Nicira, Inc. | Service function chain (sfc) data communications with sfc data in virtual local area network identifier (vlan id) data fields |
US20180176177A1 (en) | 2016-12-20 | 2018-06-21 | Thomson Licensing | Method for managing service chaining at a network equipment, corresponding network equipment |
US20180176294A1 (en) | 2015-06-26 | 2018-06-21 | Hewlett Packard Enterprise Development Lp | Server load balancing |
US20180183764A1 (en) | 2016-12-22 | 2018-06-28 | Nicira, Inc. | Collecting and processing contextual attributes on a host |
US20180184281A1 (en) | 2015-06-10 | 2018-06-28 | Soracom, Inc. | Communication System And Communication Method For Providing IP Network Access To Wireless Terminals |
US20180191600A1 (en) | 2015-08-31 | 2018-07-05 | Huawei Technologies Co., Ltd. | Redirection of service or device discovery messages in software-defined networks |
US20180198705A1 (en) | 2015-07-02 | 2018-07-12 | Zte Corporation | Method and apparatus for implementing service function chain |
US20180198692A1 (en) | 2006-12-29 | 2018-07-12 | Kip Prod P1 Lp | Multi-services application gateway and system employing the same |
US20180198791A1 (en) | 2017-01-12 | 2018-07-12 | Zscaler, Inc. | Systems and methods for cloud-based service function chaining using security assertion markup language (saml) assertion |
US20180203736A1 (en) | 2017-01-13 | 2018-07-19 | Red Hat, Inc. | Affinity based hierarchical container scheduling |
US20180205637A1 (en) | 2015-09-14 | 2018-07-19 | Huawei Technologies Co., Ltd. | Method for obtaining information about service chain in cloud computing system and apparatus |
US20180213040A1 (en) | 2016-12-15 | 2018-07-26 | Arm Ip Limited | Enabling Communications Between Devices |
US20180219762A1 (en) | 2017-02-02 | 2018-08-02 | Fujitsu Limited | Seamless service function chaining across domains |
US10042722B1 (en) | 2015-06-23 | 2018-08-07 | Juniper Networks, Inc. | Service-chain fault tolerance in service virtualized environments |
US20180227216A1 (en) | 2017-02-06 | 2018-08-09 | Silver Peak Systems, Inc. | Multi-level Learning For Classifying Traffic Flows From First Packet Data |
US20180234360A1 (en) | 2017-02-16 | 2018-08-16 | Netscout Systems, Inc | Flow and time based reassembly of fragmented packets by ip protocol analyzers |
US20180247082A1 (en) | 2016-08-11 | 2018-08-30 | Intel Corporation | Secure Public Cloud with Protected Guest-Verified Host Control |
US20180248790A1 (en) | 2015-10-31 | 2018-08-30 | Huawei Technologies Co., Ltd. | Route determining method, and corresponding apparatus and system |
US20180248713A1 (en) | 2015-02-24 | 2018-08-30 | Nokia Solutions And Networks Oy | Integrated services processing for mobile networks |
US20180248755A1 (en) | 2015-10-28 | 2018-08-30 | Huawei Technologies Co., Ltd. | Control traffic in software defined networks |
US20180278530A1 (en) | 2017-03-24 | 2018-09-27 | Intel Corporation | Load balancing systems, devices, and methods |
US10091276B2 (en) | 2013-09-27 | 2018-10-02 | Transvoyant, Inc. | Computer-implemented systems and methods of analyzing data in an ad-hoc network for predictive decision-making |
US20180288129A1 (en) | 2017-03-29 | 2018-10-04 | Ca, Inc. | Introspection driven monitoring of multi-container applications |
US20180295036A1 (en) | 2017-04-07 | 2018-10-11 | Nicira, Inc. | Application/context-based management of virtual networks using customizable workflows |
US20180295053A1 (en) | 2017-04-10 | 2018-10-11 | Cisco Technology, Inc. | Service-function chaining using extended service-function chain proxy for service-function offload |
US10104169B1 (en) | 2013-12-18 | 2018-10-16 | Amazon Technologies, Inc. | Optimizing a load balancer configuration |
US20180302242A1 (en) | 2015-12-31 | 2018-10-18 | Huawei Technologies Co., Ltd. | Packet processing method, related apparatus, and nvo3 network system |
US20180309632A1 (en) | 2017-04-20 | 2018-10-25 | Cisco Technology, Inc. | Policy assurance for service chaining |
US10135636B2 (en) | 2014-03-25 | 2018-11-20 | Huawei Technologies Co., Ltd. | Method for generating forwarding information, controller, and service forwarding entity |
US20180337849A1 (en) | 2017-05-16 | 2018-11-22 | Sonus Networks, Inc. | Communications methods, apparatus and systems for providing scalable media services in sdn systems |
US20180351874A1 (en) | 2017-05-30 | 2018-12-06 | At&T Intellectual Property I, L.P. | Creating Cross-Service Chains of Virtual Network Functions in a Wide Area Network |
US20180349212A1 (en) | 2017-06-06 | 2018-12-06 | Shuhao Liu | System and method for inter-datacenter communication |
US10158573B1 (en) | 2017-05-01 | 2018-12-18 | Barefoot Networks, Inc. | Forwarding element with a data plane load balancer |
US20190007382A1 (en) | 2017-06-29 | 2019-01-03 | Vmware, Inc. | Ssh key validation in a hyper-converged computing environment |
CN109213573A (en) | 2018-09-14 | 2019-01-15 | 珠海国芯云科技有限公司 | The equipment blocking method and device of virtual desktop based on container |
US20190020684A1 (en) | 2017-07-13 | 2019-01-17 | Nicira, Inc. | Systems and methods for storing a security parameter index in an options field of an encapsulation header |
US20190020580A1 (en) | 2017-07-14 | 2019-01-17 | Nicira, Inc. | Asymmetric network elements sharing an anycast address |
US10187306B2 (en) | 2016-03-24 | 2019-01-22 | Cisco Technology, Inc. | System and method for improved service chaining |
US20190028577A1 (en) | 2016-02-26 | 2019-01-24 | Telefonaktiebolaget Lm Ericsson (Publ) | Dynamic re-route in a redundant system of a packet network |
US20190028384A1 (en) | 2015-10-15 | 2019-01-24 | Cisco Technology, Inc. | Application identifier in service function chain metadata |
US20190028347A1 (en) | 2017-07-21 | 2019-01-24 | Cisco Technology, Inc. | Service function chain optimization using live testing |
US20190036819A1 (en) | 2017-07-31 | 2019-01-31 | Nicira, Inc. | Use of hypervisor for active-active stateful network service cluster |
US10200493B2 (en) | 2011-10-17 | 2019-02-05 | Microsoft Technology Licensing, Llc | High-density multi-tenant distributed cache as a service |
US10212071B2 (en) | 2016-12-21 | 2019-02-19 | Nicira, Inc. | Bypassing a load balancer in a return path of network traffic |
US20190068500A1 (en) | 2017-08-27 | 2019-02-28 | Nicira, Inc. | Performing in-line service in public cloud |
US10237379B2 (en) | 2013-04-26 | 2019-03-19 | Cisco Technology, Inc. | High-efficiency service chaining with agentless service nodes |
US20190089679A1 (en) | 2017-09-17 | 2019-03-21 | Mellanox Technologies, Ltd. | NIC with stateful connection tracking |
US20190097838A1 (en) | 2017-09-26 | 2019-03-28 | Oracle International Corporation | Virtual interface system and method for multi-tenant cloud networking |
US10250501B2 (en) | 2014-07-23 | 2019-04-02 | Huawei Technologies Co., Ltd. | Service packet forwarding method and apparatus |
US20190102280A1 (en) | 2017-09-30 | 2019-04-04 | Oracle International Corporation | Real-time debugging instances in a deployed container platform |
US20190116063A1 (en) | 2016-04-29 | 2019-04-18 | Hewlett Packard Enterprise Development Lp | Transforming a service packet from a first domain to a second domain |
US20190124096A1 (en) | 2016-07-29 | 2019-04-25 | ShieldX Networks, Inc. | Channel data encapsulation system and method for use with client-server data channels |
US20190121961A1 (en) | 2017-10-23 | 2019-04-25 | L3 Technologies, Inc. | Configurable internet isolation and security for laptops and similar devices |
US20190132221A1 (en) | 2017-10-29 | 2019-05-02 | Nicira, Inc. | Service operation chaining |
US10284390B2 (en) | 2016-06-08 | 2019-05-07 | Cisco Technology, Inc. | Techniques for efficient service chain analytics |
US20190140950A1 (en) | 2016-07-01 | 2019-05-09 | Huawei Technologies Co., Ltd. | Method, apparatus, and system for forwarding packet in service function chaining sfc |
US20190140947A1 (en) | 2016-07-01 | 2019-05-09 | Huawei Technologies Co., Ltd. | Service Function Chaining SFC-Based Packet Forwarding Method, Apparatus, and System |
US20190140863A1 (en) | 2017-11-06 | 2019-05-09 | Cisco Technology, Inc. | Dataplane signaled bidirectional/symmetric service chain instantiation for efficient load balancing |
US20190149512A1 (en) | 2017-11-15 | 2019-05-16 | Nicira, Inc. | Third-party service chaining using packet encapsulation in a flow-based forwarding element |
US20190149516A1 (en) | 2017-11-15 | 2019-05-16 | Nicira, Inc. | Stateful connection policy filtering |
US20190149518A1 (en) | 2017-11-15 | 2019-05-16 | Nicira, Inc. | Packet induced revalidation of connection tracker |
US10305822B2 (en) | 2014-04-04 | 2019-05-28 | Zte Corporation | Service chain routing method and system, and equipment in system |
US20190166045A1 (en) | 2016-07-27 | 2019-05-30 | Zte Corporation | Packet forwarding method and device |
US20190173850A1 (en) | 2017-12-04 | 2019-06-06 | Nicira, Inc. | Scaling gateway to gateway traffic using flow hash |
US20190173851A1 (en) | 2017-12-04 | 2019-06-06 | Nicira, Inc. | Scaling gateway to gateway traffic using flow hash |
US20190173778A1 (en) | 2016-08-26 | 2019-06-06 | Telefonaktiebolaget Lm Ericsson (Publ) | Improving sf proxy performance in sdn networks |
US10333822B1 (en) | 2017-05-23 | 2019-06-25 | Cisco Technology, Inc. | Techniques for implementing loose hop service function chains price information |
US10341427B2 (en) | 2012-12-06 | 2019-07-02 | A10 Networks, Inc. | Forwarding policies on a virtual service network |
US20190222538A1 (en) | 2016-09-30 | 2019-07-18 | Huawei Technologies Co., Ltd. | Packet Processing Method, Computing Device, and Packet Processing Apparatus |
US20190229937A1 (en) | 2018-01-25 | 2019-07-25 | Juniper Networks, Inc. | Multicast join message processing by multi-homing devices in an ethernet vpn |
US20190230126A1 (en) | 2018-01-24 | 2019-07-25 | Nicira, Inc. | Flow-based forwarding element configuration |
US20190238364A1 (en) | 2018-01-26 | 2019-08-01 | Nicira, Inc. | Specifying and utilizing paths through a network |
WO2019147316A1 (en) | 2018-01-26 | 2019-08-01 | Nicira, Inc. | Specifying and utilizing paths through a network |
US20190238363A1 (en) | 2018-01-26 | 2019-08-01 | Nicira, Inc. | Specifying and utilizing paths through a network |
US10375155B1 (en) | 2013-02-19 | 2019-08-06 | F5 Networks, Inc. | System and method for achieving hardware acceleration for asymmetric flow connections |
WO2019157955A1 (en) | 2018-02-13 | 2019-08-22 | 华为技术有限公司 | Device access method, related platform and computer storage medium |
US20190268384A1 (en) | 2016-08-05 | 2019-08-29 | Alcatel Lucent | Security-on-demand architecture |
WO2019168532A1 (en) | 2018-03-01 | 2019-09-06 | Google Llc | High availability multi-single-tenant services |
US20190286475A1 (en) | 2018-03-14 | 2019-09-19 | Microsoft Technology Licensing, Llc | Opportunistic virtual machine migration |
US20190288915A1 (en) | 2018-03-19 | 2019-09-19 | Secure-24, Llc | Discovery and migration planning techniques optimized by environmental analysis and criticality |
US20190306086A1 (en) | 2018-03-27 | 2019-10-03 | Nicira, Inc. | Incorporating layer 2 service between two interfaces of gateway device |
US20190306036A1 (en) | 2018-03-27 | 2019-10-03 | Nicira, Inc. | Detecting failure of layer 2 service using broadcast messages |
US20190342175A1 (en) | 2018-05-02 | 2019-11-07 | Nicira, Inc. | Application of profile setting groups to logical network entities |
US10484334B1 (en) | 2013-02-26 | 2019-11-19 | Zentera Systems, Inc. | Distributed firewall security system that extends across different cloud computing networks |
WO2019226327A1 (en) | 2018-05-23 | 2019-11-28 | Microsoft Technology Licensing, Llc | Data platform fabric |
US20190379579A1 (en) | 2018-06-11 | 2019-12-12 | Nicira, Inc. | Providing shared memory for access by multiple network service containers executing on single service machine |
US20190377604A1 (en) | 2018-06-11 | 2019-12-12 | Nuweba Labs Ltd. | Scalable function as a service platform |
US20190379578A1 (en) | 2018-06-11 | 2019-12-12 | Nicira, Inc. | Configuring a compute node to perform services on a host |
US20200007388A1 (en) | 2018-06-29 | 2020-01-02 | Cisco Technology, Inc. | Network traffic optimization using in-situ notification system |
US10547508B1 (en) | 2016-06-29 | 2020-01-28 | Juniper Networks, Inc. | Network services using pools of pre-configured virtualized network functions and service chains |
US20200036629A1 (en) | 2015-06-15 | 2020-01-30 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and network nodes for scalable mapping of tags to service function chain encapsulation headers |
US10554484B2 (en) | 2015-06-26 | 2020-02-04 | Nicira, Inc. | Control plane integration with hardware switches |
US20200059761A1 (en) | 2018-08-17 | 2020-02-20 | Huawei Technologies Co., Ltd. | Systems and methods for enabling private communication within a user equipment group |
US20200067828A1 (en) | 2018-08-23 | 2020-02-27 | Agora Lab, Inc. | Large-Scale Real-Time Multimedia Communications |
US20200076684A1 (en) | 2018-09-02 | 2020-03-05 | Vmware, Inc. | Service insertion at logical network gateway |
US20200076734A1 (en) | 2018-09-02 | 2020-03-05 | Vmware, Inc. | Redirection of data messages at logical network gateway |
WO2020046686A1 (en) | 2018-09-02 | 2020-03-05 | Vmware, Inc. | Service insertion at logical network gateway |
US20200073739A1 (en) | 2018-08-28 | 2020-03-05 | Amazon Technologies, Inc. | Constraint solver execution service and infrastructure therefor |
US20200084147A1 (en) | 2018-09-11 | 2020-03-12 | Cisco Technology, Inc. | In-situ passive performance measurement in a network environment |
US20200084141A1 (en) | 2018-09-12 | 2020-03-12 | Corsa Technology Inc. | Methods and systems for network security universal control point |
US10609122B1 (en) | 2015-06-29 | 2020-03-31 | Amazon Technologies, Inc. | Instance backed building or place |
US10623309B1 (en) | 2016-12-19 | 2020-04-14 | International Business Machines Corporation | Rule processing of packets |
US10637750B1 (en) | 2017-10-18 | 2020-04-28 | Juniper Networks, Inc. | Dynamically modifying a service chain based on network traffic information |
US20200136960A1 (en) | 2018-10-27 | 2020-04-30 | Cisco Technology, Inc. | Software version aware networking |
US10645060B2 (en) | 2015-05-28 | 2020-05-05 | Xi'an Zhongxing New Software Co., Ltd | Method, device and system for forwarding message |
US10645201B2 (en) | 2018-07-31 | 2020-05-05 | Vmware, Inc. | Packet handling during service virtualized computing instance migration |
US20200145331A1 (en) | 2018-11-02 | 2020-05-07 | Cisco Technology, Inc., A California Corporation | Using In-Band Operations Data to Signal Packet Processing Departures in a Network |
US20200162318A1 (en) | 2018-11-20 | 2020-05-21 | Cisco Technology, Inc. | Seamless automation of network device migration to and from cloud managed systems |
US20200162352A1 (en) | 2011-07-15 | 2020-05-21 | Inetco Systems Limited | Method and system for monitoring performance of an application system |
US20200183724A1 (en) | 2018-12-11 | 2020-06-11 | Amazon Technologies, Inc. | Computing service with configurable virtualization control levels and accelerated launches |
US20200195711A1 (en) | 2018-12-17 | 2020-06-18 | At&T Intellectual Property I, L.P. | Model-based load balancing for network data plane |
US20200204492A1 (en) | 2018-12-21 | 2020-06-25 | Juniper Networks, Inc. | Facilitating flow symmetry for service chains in a computer network |
US20200220805A1 (en) | 2019-01-03 | 2020-07-09 | Citrix Systems, Inc. | Method for optimal path selection for data traffic undergoing high processing or queuing delay |
US20200274795A1 (en) | 2019-02-22 | 2020-08-27 | Vmware, Inc. | Service control plane messaging in service data plane |
US20200274801A1 (en) | 2019-02-22 | 2020-08-27 | Vmware, Inc. | Service path computation for service insertion |
US20200287962A1 (en) | 2019-03-05 | 2020-09-10 | Cisco Technology, Inc. | Load balancing in a distributed system |
US20200344088A1 (en) | 2019-04-29 | 2020-10-29 | Vmware, Inc. | Network interoperability support for non-virtualized entities |
US10834004B2 (en) | 2018-09-24 | 2020-11-10 | Netsia, Inc. | Path determination method and system for delay-optimized service function chaining |
US20200358696A1 (en) | 2018-02-01 | 2020-11-12 | Nokia Solutions And Networks Oy | Method and device for interworking between service function chain domains |
US10853111B1 (en) | 2015-09-30 | 2020-12-01 | Amazon Technologies, Inc. | Virtual machine instance migration feedback |
US20200382412A1 (en) | 2019-05-31 | 2020-12-03 | Microsoft Technology Licensing, Llc | Multi-Cast Support for a Virtual Network |
US20200382420A1 (en) | 2019-05-31 | 2020-12-03 | Juniper Networks, Inc. | Inter-network service chaining |
US20200389401A1 (en) | 2019-06-06 | 2020-12-10 | Cisco Technology, Inc. | Conditional composition of serverless network functions using segment routing |
CN112181632A (en) | 2019-07-02 | 2021-01-05 | 慧与发展有限责任合伙企业 | Deploy the service container in the adapter device |
US20210011816A1 (en) | 2019-07-10 | 2021-01-14 | Commvault Systems, Inc. | Preparing containerized applications for backup using a backup services container in a container-orchestration pod |
US20210029088A1 (en) | 2015-04-13 | 2021-01-28 | Nicira, Inc. | Method and system of establishing a virtual private network in a cloud service for branch networking |
US10938668B1 (en) | 2016-09-30 | 2021-03-02 | Amazon Technologies, Inc. | Safe deployment using versioned hash rings |
US10938716B1 (en) | 2017-11-29 | 2021-03-02 | Riverbed Technology, Inc. | Preserving policy with path selection |
US20210067439A1 (en) | 2019-08-26 | 2021-03-04 | Vmware, Inc. | Forwarding element with physical and virtual data planes |
WO2021041440A1 (en) | 2019-08-26 | 2021-03-04 | Microsoft Technology Licensing, Llc | Computer device including nested network interface controller switches |
US20210073736A1 (en) | 2019-09-10 | 2021-03-11 | Alawi Holdings LLC | Computer implemented system and associated methods for management of workplace incident reporting |
US20210117217A1 (en) | 2019-10-21 | 2021-04-22 | ForgeRock, Inc. | Systems and methods for tuning containers in a high availability environment |
US10997177B1 (en) | 2018-07-27 | 2021-05-04 | Workday, Inc. | Distributed real-time partitioned MapReduce for a data fabric |
US20210136147A1 (en) | 2019-10-31 | 2021-05-06 | Keysight Technologies, Inc. | Methods, systems and computer readable media for self-replicating cluster appliances |
US11026047B2 (en) | 2016-07-21 | 2021-06-01 | International Business Machines Corporation | Associating multiple user devices with a single user |
US11055273B1 (en) | 2016-11-04 | 2021-07-06 | Amazon Technologies, Inc. | Software container event monitoring systems |
US20210240734A1 (en) | 2020-02-03 | 2021-08-05 | Microstrategy Incorporated | Deployment of container-based computer environments |
US20210266295A1 (en) | 2020-02-25 | 2021-08-26 | Uatc, Llc | Deterministic Container-Based Network Configurations for Autonomous Vehicles |
US20210271565A1 (en) | 2020-03-02 | 2021-09-02 | Commvault Systems, Inc. | Platform-agnostic containerized application data protection |
US20210314310A1 (en) | 2020-04-02 | 2021-10-07 | Vmware, Inc. | Secured login management to container image registry in a virtualized computer system |
US20210311758A1 (en) | 2020-04-02 | 2021-10-07 | Vmware, Inc. | Management of a container image registry in a virtualized computer system |
US11153190B1 (en) | 2021-01-21 | 2021-10-19 | Zscaler, Inc. | Metric computation for traceroute probes using cached data to prevent a surge on destination servers |
US20210328913A1 (en) | 2020-04-20 | 2021-10-21 | Cisco Technology, Inc. | Service aware virtual private network for optimized forwarding in cloud native environment |
US11157304B2 (en) | 2019-11-01 | 2021-10-26 | Dell Products L.P. | System for peering container clusters running on different container orchestration systems |
US20210349767A1 (en) | 2020-05-05 | 2021-11-11 | Red Hat, Inc. | Migrating virtual machines between computing environments |
US11184397B2 (en) | 2018-08-20 | 2021-11-23 | Vmware, Inc. | Network policy migration to a public cloud |
US20210377160A1 (en) | 2018-01-12 | 2021-12-02 | Telefonaktiebolaget Lm Ericsson (Publ) | Mechanism for control message redirection for sdn control channel failures |
US20220019698A1 (en) | 2016-08-11 | 2022-01-20 | Intel Corporation | Secure Public Cloud with Protected Guest-Verified Host Control |
US20220038310A1 (en) | 2020-07-28 | 2022-02-03 | Vmware, Inc. | Method for providing distributed gateway service at host computer |
US20220060467A1 (en) | 2020-08-24 | 2022-02-24 | Just One Technologies LLC | Systems and methods for phone number certification and verification |
US11316900B1 (en) | 2018-06-29 | 2022-04-26 | FireEye Security Holdings Inc. | System and method for automatically prioritizing rules for cyber-threat detection and mitigation |
US11398983B2 (en) | 2018-11-04 | 2022-07-26 | Cisco Technology, Inc. | Processing packets by an offload platform adjunct to a packet switching device |
US11528213B2 (en) | 2020-12-30 | 2022-12-13 | Juniper Networks, Inc. | Sharing routes using an in-memory data store in a distributed network system |
-
2014
- 2014-12-12 US US14/569,358 patent/US11722367B2/en active Active
- 2014-12-12 US US14/569,249 patent/US9531590B2/en active Active
- 2014-12-12 US US14/569,476 patent/US9935827B2/en active Active
- 2014-12-12 US US14/569,452 patent/US9755898B2/en active Active
- 2014-12-12 US US14/569,405 patent/US9825810B2/en active Active
-
2023
- 2023-06-19 US US18/211,580 patent/US20230336413A1/en active Pending
Patent Citations (754)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6154448A (en) | 1997-06-20 | 2000-11-28 | Telefonaktiebolaget Lm Ericsson (Publ) | Next hop loopback |
US6006264A (en) | 1997-08-01 | 1999-12-21 | Arrowpoint Communications, Inc. | Method and system for directing a flow between a client and a server |
US6104700A (en) | 1997-08-29 | 2000-08-15 | Extreme Networks | Policy based quality of service |
US6779030B1 (en) | 1997-10-06 | 2004-08-17 | Worldcom, Inc. | Intelligent network |
WO1999018534A2 (en) | 1997-10-06 | 1999-04-15 | Web Balance, Inc. | System for balancing loads among network servers |
US20050021713A1 (en) | 1997-10-06 | 2005-01-27 | Andrew Dugan | Intelligent network |
US20140330983A1 (en) * | 1998-07-15 | 2014-11-06 | Radware Ltd. | Load balancing |
US20120303784A1 (en) | 1998-07-15 | 2012-11-29 | Radware, Ltd. | Load balancing |
US20090271586A1 (en) | 1998-07-31 | 2009-10-29 | Kom Networks Inc. | Method and system for providing restricted access to a storage medium |
US6826694B1 (en) | 1998-10-22 | 2004-11-30 | At&T Corp. | High resolution access control |
US20040210670A1 (en) | 1999-03-05 | 2004-10-21 | Nikolaos Anerousis | System, method and apparatus for network service load and reliability management |
US20050249199A1 (en) | 1999-07-02 | 2005-11-10 | Cisco Technology, Inc., A California Corporation | Load balancing using distributed forwarding agents with application based feedback for different virtual machines |
US7013389B1 (en) | 1999-09-29 | 2006-03-14 | Cisco Technology, Inc. | Method and apparatus for creating a secure communication channel among multiple event service nodes |
US20020010783A1 (en) | 1999-12-06 | 2002-01-24 | Leonard Primak | System and method for enhancing operation of a web server cluster |
US6880089B1 (en) | 2000-03-31 | 2005-04-12 | Avaya Technology Corp. | Firewall clustering for multiple network servers |
US20120137004A1 (en) | 2000-07-17 | 2012-05-31 | Smith Philip S | Method and System for Operating a Commissioned E-Commerce Service Prover |
US20110016348A1 (en) | 2000-09-01 | 2011-01-20 | Pace Charles P | System and method for bridging assets to network nodes on multi-tiered networks |
US7818452B2 (en) | 2000-09-13 | 2010-10-19 | Fortinet, Inc. | Distributed virtual system to support managed, network-based services |
US6985956B2 (en) | 2000-11-02 | 2006-01-10 | Sun Microsystems, Inc. | Switching system |
US20020078370A1 (en) | 2000-12-18 | 2002-06-20 | Tahan Thomas E. | Controlled information flow between communities via a firewall |
US7487250B2 (en) | 2000-12-19 | 2009-02-03 | Cisco Technology, Inc. | Methods and apparatus for directing a flow of data between a client and multiple servers |
US20020097724A1 (en) | 2001-01-09 | 2002-07-25 | Matti Halme | Processing of data packets within a network element cluster |
US20030188026A1 (en) | 2001-05-18 | 2003-10-02 | Claude Denton | Multi-protocol networking processor with data traffic support spanning local, regional and wide area networks |
US6772211B2 (en) | 2001-06-18 | 2004-08-03 | Transtech Networks Usa, Inc. | Content-aware web switch without delayed binding and methods thereof |
US20020194350A1 (en) | 2001-06-18 | 2002-12-19 | Lu Leonard L. | Content-aware web switch without delayed binding and methods thereof |
US20040249776A1 (en) | 2001-06-28 | 2004-12-09 | Microsoft Corporation | Composable presence and availability services |
US20030105812A1 (en) | 2001-08-09 | 2003-06-05 | Gigamedia Access Corporation | Hybrid system architecture for secure peer-to-peer-communications |
US7406540B2 (en) | 2001-10-01 | 2008-07-29 | International Business Machines Corporation | Method and apparatus for content-aware web switching |
US20030065711A1 (en) | 2001-10-01 | 2003-04-03 | International Business Machines Corporation | Method and apparatus for content-aware web switching |
US7209977B2 (en) | 2001-10-01 | 2007-04-24 | International Business Machines Corporation | Method and apparatus for content-aware web switching |
US20030093481A1 (en) | 2001-11-09 | 2003-05-15 | Julian Mitchell | Middlebox control |
US20030097429A1 (en) | 2001-11-20 | 2003-05-22 | Wen-Che Wu | Method of forming a website server cluster and structure thereof |
US7379465B2 (en) | 2001-12-07 | 2008-05-27 | Nortel Networks Limited | Tunneling scheme optimized for use in virtual private networks |
US7239639B2 (en) | 2001-12-27 | 2007-07-03 | 3Com Corporation | System and method for dynamically constructing packet classification rules |
US20120185588A1 (en) | 2002-01-30 | 2012-07-19 | Brett Error | Distributed Data Collection and Aggregation |
US20060233155A1 (en) * | 2002-03-19 | 2006-10-19 | Srivastava Sunil K | Server load balancing using IP option field approach to identify route to selected server |
US20030236813A1 (en) | 2002-06-24 | 2003-12-25 | Abjanic John B. | Method and apparatus for off-load processing of a message stream |
US20100223621A1 (en) | 2002-08-01 | 2010-09-02 | Foundry Networks, Inc. | Statistical tracking for global server load balancing |
CN1689369A (en) | 2002-10-08 | 2005-10-26 | 诺基亚公司 | Method and system for establishing a connection via an access network |
US20040066769A1 (en) | 2002-10-08 | 2004-04-08 | Kalle Ahmavaara | Method and system for establishing a connection via an access network |
US7480737B2 (en) | 2002-10-25 | 2009-01-20 | International Business Machines Corporation | Technique for addressing a cluster of network servers |
US20040215703A1 (en) | 2003-02-18 | 2004-10-28 | Xiping Song | System supporting concurrent operation of multiple executable application operation sessions |
US20080239991A1 (en) | 2003-03-13 | 2008-10-02 | David Lee Applegate | Method and apparatus for efficient routing of variable traffic |
US8190767B1 (en) | 2003-06-24 | 2012-05-29 | Nvidia Corporation | Data structures and state tracking for network protocol processing |
US20090299791A1 (en) | 2003-06-25 | 2009-12-03 | Foundry Networks, Inc. | Method and system for management of licenses |
US20050091396A1 (en) | 2003-08-05 | 2005-04-28 | Chandrasekharan Nilakantan | Method and apparatus for achieving dynamic capacity and high availability in multi-stage data networks using adaptive flow-based routing |
US20050089327A1 (en) | 2003-10-22 | 2005-04-28 | Shlomo Ovadia | Dynamic route discovery for optical switched networks |
US7447775B1 (en) | 2003-11-07 | 2008-11-04 | Cisco Technology, Inc. | Methods and apparatus for supporting transmission of streaming data |
US20050114648A1 (en) | 2003-11-24 | 2005-05-26 | Cisco Technology, Inc., A Corporation Of California | Dual mode firewall |
US20050114429A1 (en) | 2003-11-25 | 2005-05-26 | Caccavale Frank S. | Method and apparatus for load balancing of distributed processing units based on performance metrics |
US20100257278A1 (en) | 2003-12-10 | 2010-10-07 | Foundry Networks, Inc. | Method and apparatus for load balancing based on packet header content |
US20050132030A1 (en) | 2003-12-10 | 2005-06-16 | Aventail Corporation | Network appliance |
US20080049619A1 (en) | 2004-02-09 | 2008-02-28 | Adam Twiss | Methods and Apparatus for Routing in a Network |
US8223634B2 (en) | 2004-02-18 | 2012-07-17 | Fortinet, Inc. | Mechanism for implementing load balancing in a network |
US20050198200A1 (en) | 2004-03-05 | 2005-09-08 | Nortel Networks Limited | Method and apparatus for facilitating fulfillment of web-service requests on a communication network |
US8484348B2 (en) | 2004-03-05 | 2013-07-09 | Rockstar Consortium Us Lp | Method and apparatus for facilitating fulfillment of web-service requests on a communication network |
US9178709B2 (en) | 2004-03-30 | 2015-11-03 | Panasonic Intellectual Property Management Co., Ltd. | Communication system and method for distributing content |
US20080279196A1 (en) | 2004-04-06 | 2008-11-13 | Robert Friskney | Differential Forwarding in Address-Based Carrier Networks |
JP2005311863A (en) | 2004-04-23 | 2005-11-04 | Hitachi Ltd | Traffic distribution control method, control device, and network system |
US20100100616A1 (en) | 2004-09-14 | 2010-04-22 | 3Com Corporation | Method and apparatus for controlling traffic between different entities on a network |
US20060069776A1 (en) | 2004-09-15 | 2006-03-30 | Shim Choon B | System and method for load balancing a communications network |
US7698458B1 (en) | 2004-10-29 | 2010-04-13 | Akamai Technologies, Inc. | Load balancing network traffic using race methods |
US20060112297A1 (en) | 2004-11-17 | 2006-05-25 | Raytheon Company | Fault tolerance and recovery in a high-performance computing (HPC) system |
US20060130133A1 (en) * | 2004-12-14 | 2006-06-15 | International Business Machines Corporation | Automated generation of configuration elements of an information technology system |
US20060195896A1 (en) | 2004-12-22 | 2006-08-31 | Wake Forest University | Method, systems, and computer program products for implementing function-parallel network firewall |
US20060155862A1 (en) | 2005-01-06 | 2006-07-13 | Hari Kathi | Data traffic load balancing based on application layer messages |
US7649890B2 (en) | 2005-02-22 | 2010-01-19 | Hitachi Communication Technologies, Ltd. | Packet forwarding apparatus and communication bandwidth control method |
US7499463B1 (en) | 2005-04-22 | 2009-03-03 | Sun Microsystems, Inc. | Method and apparatus for enforcing bandwidth utilization of a virtual serialization queue |
US8738702B1 (en) | 2005-07-13 | 2014-05-27 | At&T Intellectual Property Ii, L.P. | Method and system for a personalized content dissemination platform |
US20110225293A1 (en) | 2005-07-22 | 2011-09-15 | Yogesh Chunilal Rathod | System and method for service based social network |
US20070061492A1 (en) | 2005-08-05 | 2007-03-15 | Red Hat, Inc. | Zero-copy network i/o for virtual hosts |
US20070121615A1 (en) | 2005-11-28 | 2007-05-31 | Ofer Weill | Method and apparatus for self-learning of VPNS from combination of unidirectional tunnels in MPLS/VPN networks |
US20070291773A1 (en) | 2005-12-06 | 2007-12-20 | Shabbir Khan | Digital object routing based on a service request |
US20070153782A1 (en) | 2005-12-30 | 2007-07-05 | Gregory Fletcher | Reliable, high-throughput, high-performance transport and routing mechanism for arbitrary data flows |
US20090235325A1 (en) | 2006-03-02 | 2009-09-17 | Theo Dimitrakos | Message processing methods and systems |
US20070260750A1 (en) | 2006-03-09 | 2007-11-08 | Microsoft Corporation | Adaptable data connector |
US20070214282A1 (en) * | 2006-03-13 | 2007-09-13 | Microsoft Corporation | Load balancing via rotation of cluster identity |
US20070248091A1 (en) | 2006-04-24 | 2007-10-25 | Mohamed Khalid | Methods and apparatus for tunnel stitching in a network |
US20150071301A1 (en) | 2006-05-01 | 2015-03-12 | Vmware, Inc. | Private ethernet overlay networks over a shared ethernet in a virtual environment |
US9900410B2 (en) | 2006-05-01 | 2018-02-20 | Nicira, Inc. | Private ethernet overlay networks over a shared ethernet in a virtual environment |
US20090190506A1 (en) | 2006-05-05 | 2009-07-30 | Nokia Siemens Networks Gmbh & Co. Kg | Method for Allowing Control of the Quality of Service and/or of the Service Fees for Telecommunication Services |
US20070288615A1 (en) | 2006-06-09 | 2007-12-13 | Cisco Technology, Inc. | Technique for dispatching data packets to service control engines |
US20080005293A1 (en) | 2006-06-30 | 2008-01-03 | Telefonaktiebolaget Lm Ericsson (Publ) | Router and method for server load balancing |
US20080046400A1 (en) * | 2006-08-04 | 2008-02-21 | Shi Justin Y | Apparatus and method of optimizing database clustering with zero transaction loss |
US20080031263A1 (en) | 2006-08-07 | 2008-02-07 | Cisco Technology, Inc. | Method and apparatus for load balancing over virtual network links |
US8707383B2 (en) | 2006-08-16 | 2014-04-22 | International Business Machines Corporation | Computer workload management with security policy enforcement |
US20080049786A1 (en) | 2006-08-22 | 2008-02-28 | Maruthi Ram | Systems and Methods for Providing Dynamic Spillover of Virtual Servers Based on Bandwidth |
US20080049614A1 (en) | 2006-08-23 | 2008-02-28 | Peter John Briscoe | Capacity Management for Data Networks |
US20080072305A1 (en) | 2006-09-14 | 2008-03-20 | Ouova, Inc. | System and method of middlebox detection and characterization |
US20080084819A1 (en) | 2006-10-04 | 2008-04-10 | Vladimir Parizhsky | Ip flow-based load balancing over a plurality of wireless network links |
US20080095153A1 (en) | 2006-10-19 | 2008-04-24 | Fujitsu Limited | Apparatus and computer product for collecting packet information |
US20080104608A1 (en) | 2006-10-27 | 2008-05-01 | Hyser Chris D | Starting up at least one virtual machine in a physical machine by a load balancer |
US8849746B2 (en) | 2006-12-19 | 2014-09-30 | Teradata Us, Inc. | High-throughput extract-transform-load (ETL) of program events for subsequent analysis |
US20180198692A1 (en) | 2006-12-29 | 2018-07-12 | Kip Prod P1 Lp | Multi-services application gateway and system employing the same |
WO2008095010A1 (en) | 2007-02-01 | 2008-08-07 | The Board Of Trustees Of The Leland Stanford Jr. University | Secure network switching infrastructure |
US20080195755A1 (en) | 2007-02-12 | 2008-08-14 | Ying Lu | Method and apparatus for load balancing with server state change awareness |
US20110010578A1 (en) | 2007-02-22 | 2011-01-13 | Agundez Dominguez Jose Luis | Consistent and fault tolerant distributed hash table (dht) overlay network |
US20080225714A1 (en) | 2007-03-12 | 2008-09-18 | Telefonaktiebolaget Lm Ericsson (Publ) | Dynamic load balancing |
US20080247396A1 (en) | 2007-04-06 | 2008-10-09 | Ludovic Hazard | Method, system and computer processing an ip packet, routing a structured data carrier, preventing broadcast storms, load-balancing and converting a full broadcast ip packet |
US8230493B2 (en) | 2007-05-02 | 2012-07-24 | Cisco Technology, Inc. | Allowing differential processing of encrypted tunnels |
US20080276085A1 (en) | 2007-05-02 | 2008-11-06 | Cisco Technology, Inc. | Allowing differential processing of encrypted tunnels |
US7898959B1 (en) | 2007-06-28 | 2011-03-01 | Marvell Israel (Misl) Ltd. | Method for weighted load-balancing among network interfaces |
US20090003375A1 (en) | 2007-06-29 | 2009-01-01 | Martin Havemann | Network system having an extensible control plane |
US20090003349A1 (en) | 2007-06-29 | 2009-01-01 | Martin Havemann | Network system having an extensible forwarding plane |
US20090003364A1 (en) | 2007-06-29 | 2009-01-01 | Kerry Fendick | Open platform architecture for integrating multiple heterogeneous network functions |
US20090019135A1 (en) | 2007-07-09 | 2009-01-15 | Anand Eswaran | Method, Network and Computer Program For Processing A Content Request |
US20090037713A1 (en) | 2007-08-03 | 2009-02-05 | Cisco Technology, Inc. | Operation, administration and maintenance (oam) for chains of services |
US20090063706A1 (en) * | 2007-08-30 | 2009-03-05 | International Business Machines Corporation | Combined Layer 2 Virtual MAC Address with Layer 3 IP Address Routing |
US8201219B2 (en) | 2007-09-24 | 2012-06-12 | Bridgewater Systems Corp. | Systems and methods for server load balancing using authentication, authorization, and accounting protocols |
US8874789B1 (en) | 2007-09-28 | 2014-10-28 | Trend Micro Incorporated | Application based routing arrangements and method thereof |
US20100265824A1 (en) | 2007-11-09 | 2010-10-21 | Blade Network Technologies, Inc | Session-less Load Balancing of Client Traffic Across Servers in a Server Group |
US20090129271A1 (en) | 2007-11-19 | 2009-05-21 | Rajesh Ramankutty | Providing services to packet flows in a network |
US20110058563A1 (en) | 2007-12-17 | 2011-03-10 | Girish Prabhakar Saraph | Architectural framework of communication network and a method of establishing qos connection |
US20090172666A1 (en) | 2007-12-31 | 2009-07-02 | Netapp, Inc. | System and method for automatic storage load balancing in virtual server environments |
US20090199268A1 (en) | 2008-02-06 | 2009-08-06 | Qualcomm, Incorporated | Policy control for encapsulated data flows |
US8175863B1 (en) | 2008-02-13 | 2012-05-08 | Quest Software, Inc. | Systems and methods for analyzing performance of virtual environments |
US8521879B1 (en) | 2008-03-11 | 2013-08-27 | United Services Automobile Assocation (USAA) | Systems and methods for a load balanced interior gateway protocol intranet |
US20090238084A1 (en) | 2008-03-18 | 2009-09-24 | Cisco Technology, Inc. | Network monitoring using a proxy |
US20090249472A1 (en) | 2008-03-27 | 2009-10-01 | Moshe Litvin | Hierarchical firewalls |
US20100332595A1 (en) | 2008-04-04 | 2010-12-30 | David Fullagar | Handling long-tail content in a content delivery network (cdn) |
US20110035494A1 (en) | 2008-04-15 | 2011-02-10 | Blade Network Technologies | Network virtualization for a virtualized server data center environment |
US20090265467A1 (en) | 2008-04-17 | 2009-10-22 | Radware, Ltd. | Method and System for Load Balancing over a Cluster of Authentication, Authorization and Accounting (AAA) Servers |
US8339959B1 (en) | 2008-05-20 | 2012-12-25 | Juniper Networks, Inc. | Streamlined packet forwarding using dynamic filters for routing and security in a shared forwarding plane |
US20090300210A1 (en) | 2008-05-28 | 2009-12-03 | James Michael Ferris | Methods and systems for load balancing in cloud-based networks |
US20090303880A1 (en) | 2008-06-09 | 2009-12-10 | Microsoft Corporation | Data center interconnect and traffic engineering |
US20090307334A1 (en) | 2008-06-09 | 2009-12-10 | Microsoft Corporation | Data center without structural bottlenecks |
US20090327464A1 (en) | 2008-06-26 | 2009-12-31 | International Business Machines Corporation | Load Balanced Data Processing Performed On An Application Message Transmitted Between Compute Nodes |
US20100031360A1 (en) | 2008-07-31 | 2010-02-04 | Arvind Seshadri | Systems and methods for preventing unauthorized modification of an operating system |
US20100036903A1 (en) | 2008-08-11 | 2010-02-11 | Microsoft Corporation | Distributed load balancer |
US9503530B1 (en) | 2008-08-21 | 2016-11-22 | United Services Automobile Association (Usaa) | Preferential loading in data centers |
US20110164504A1 (en) | 2008-09-03 | 2011-07-07 | Nokia Siemens Networks Oy | Gateway network element, a method, and a group of load balanced access points configured for load balancing in a communications network |
US8873399B2 (en) | 2008-09-03 | 2014-10-28 | Nokia Siemens Networks Oy | Gateway network element, a method, and a group of load balanced access points configured for load balancing in a communications network |
US20120287789A1 (en) | 2008-10-24 | 2012-11-15 | Juniper Networks, Inc. | Flow consistent dynamic load balancing |
US20100131638A1 (en) | 2008-11-25 | 2010-05-27 | Ravi Kondamuru | Systems and Methods for GSLB Remote Service Monitoring |
US8078903B1 (en) | 2008-11-25 | 2011-12-13 | Cisco Technology, Inc. | Automatic load-balancing and seamless failover of data flows in storage media encryption (SME) |
US9191293B2 (en) | 2008-12-22 | 2015-11-17 | Telefonaktiebolaget L M Ericsson (Publ) | Method and device for handling of connections between a client and a server via a communication network |
US20100165985A1 (en) | 2008-12-29 | 2010-07-01 | Cisco Technology, Inc. | Service Selection Mechanism In Service Insertion Architecture Data Plane |
US8224885B1 (en) | 2009-01-26 | 2012-07-17 | Teradici Corporation | Method and system for remote computing session management |
US7948986B1 (en) | 2009-02-02 | 2011-05-24 | Juniper Networks, Inc. | Applying services within MPLS networks |
US20100223364A1 (en) | 2009-02-27 | 2010-09-02 | Yottaa Inc | System and method for network traffic management and load balancing |
US20100235915A1 (en) | 2009-03-12 | 2010-09-16 | Nasir Memon | Using host symptoms, host roles, and/or host reputation for detection of host infection |
US8094575B1 (en) | 2009-03-24 | 2012-01-10 | Juniper Networks, Inc. | Routing protocol extension for network acceleration service-aware path selection within computer networks |
US8266261B2 (en) * | 2009-03-27 | 2012-09-11 | Nec Corporation | Server system, collective server apparatus, and MAC address management method |
US20100254385A1 (en) | 2009-04-07 | 2010-10-07 | Cisco Technology, Inc. | Service Insertion Architecture (SIA) in a Virtual Private Network (VPN) Aware Network |
EP2426956A1 (en) | 2009-04-27 | 2012-03-07 | China Mobile Communications Corporation | Data transferring method, system and related network device based on proxy mobile (pm) ipv6 |
US20120140719A1 (en) | 2009-04-27 | 2012-06-07 | Min Hui | Data transmission method, system and related network device based on proxy mobile (pm) ipv6 |
US20100281482A1 (en) | 2009-04-30 | 2010-11-04 | Microsoft Corporation | Application efficiency engine |
US20110022812A1 (en) | 2009-05-01 | 2011-01-27 | Van Der Linden Rob | Systems and methods for establishing a cloud bridge between virtual storage resources |
US9479358B2 (en) | 2009-05-13 | 2016-10-25 | International Business Machines Corporation | Managing graphics load balancing strategies |
CN101594358A (en) | 2009-06-29 | 2009-12-02 | 北京航空航天大学 | Layer-3 switching method, device, system and host |
US7921174B1 (en) | 2009-07-24 | 2011-04-05 | Jason Adam Denise | Electronic communication reminder technology |
US20110022695A1 (en) | 2009-07-27 | 2011-01-27 | Vmware, Inc. | Management and Implementation of Enclosed Local Networks in a Virtual Lab |
US20110040893A1 (en) | 2009-08-14 | 2011-02-17 | Broadcom Corporation | Distributed Internet caching via multiple node caching management |
US20110055845A1 (en) * | 2009-08-31 | 2011-03-03 | Thyagarajan Nandagopal | Technique for balancing loads in server clusters |
US20120176932A1 (en) | 2009-09-17 | 2012-07-12 | Zte Corporation | Communication method, method for forwarding data message during the communication process and communication node thereof |
US8804746B2 (en) | 2009-09-17 | 2014-08-12 | Zte Corporation | Network based on identity identifier and location separation architecture backbone network, and network element thereof |
US8451735B2 (en) | 2009-09-28 | 2013-05-28 | Symbol Technologies, Inc. | Systems and methods for dynamic load balancing in a wireless network |
US20110090912A1 (en) | 2009-10-15 | 2011-04-21 | International Business Machines Corporation | Steering Data Communications Packets Among Service Applications With Server Selection Modulus Values |
US8811412B2 (en) | 2009-10-15 | 2014-08-19 | International Business Machines Corporation | Steering data communications packets among service applications with server selection modulus values |
US20120023231A1 (en) * | 2009-10-23 | 2012-01-26 | Nec Corporation | Network system, control method for the same, and controller |
CN101729412A (en) | 2009-11-05 | 2010-06-09 | 北京超图软件股份有限公司 | Distributed level cluster method and system of geographic information service |
US9277412B2 (en) | 2009-11-16 | 2016-03-01 | Interdigital Patent Holdings, Inc. | Coordination of silent periods for dynamic spectrum manager (DSM) |
US20120239804A1 (en) | 2009-11-26 | 2012-09-20 | Chengdu Huawei Symantec Technologies Co., Ltd | Method, device and system for backup |
US8832683B2 (en) | 2009-11-30 | 2014-09-09 | Red Hat Israel, Ltd. | Using memory-related metrics of host machine for triggering load balancing that migrate virtual machine |
US8615009B1 (en) | 2010-01-25 | 2013-12-24 | Juniper Networks, Inc. | Interface for extending service capabilities of a network device |
US20110295991A1 (en) * | 2010-02-01 | 2011-12-01 | Nec Corporation | Network system, controller, and network control method |
US20110194563A1 (en) | 2010-02-11 | 2011-08-11 | Vmware, Inc. | Hypervisor Level Distributed Load-Balancing |
US20110211463A1 (en) | 2010-02-26 | 2011-09-01 | Eldad Matityahu | Add-on module and methods thereof |
US8996610B1 (en) | 2010-03-15 | 2015-03-31 | Salesforce.Com, Inc. | Proxy system, method and computer program product for utilizing an identifier of a request to route the request to a networked device |
US9225659B2 (en) | 2010-03-22 | 2015-12-29 | Riverbed Technology, Inc. | Method and apparatus for scheduling a heterogeneous communication flow |
US8971345B1 (en) | 2010-03-22 | 2015-03-03 | Riverbed Technology, Inc. | Method and apparatus for scheduling a heterogeneous communication flow |
US20110235508A1 (en) | 2010-03-26 | 2011-09-29 | Deepak Goel | Systems and methods for link load balancing on a multi-core device |
US20110261811A1 (en) * | 2010-04-26 | 2011-10-27 | International Business Machines Corporation | Load-balancing via modulus distribution and tcp flow redirection due to server overload |
US20110271007A1 (en) | 2010-04-28 | 2011-11-03 | Futurewei Technologies, Inc. | System and Method for a Context Layer Switch |
US20110268118A1 (en) | 2010-04-30 | 2011-11-03 | Michael Schlansker | Method for routing data packets using vlans |
US20110276695A1 (en) | 2010-05-06 | 2011-11-10 | Juliano Maldaner | Continuous upgrading of computers in a load balanced environment |
US20110283013A1 (en) | 2010-05-14 | 2011-11-17 | Grosser Donald B | Methods, systems, and computer readable media for stateless load balancing of network traffic flows |
US8892706B1 (en) | 2010-06-21 | 2014-11-18 | Vmware, Inc. | Private ethernet overlay networks over a shared ethernet in a virtual environment |
US20180248986A1 (en) | 2010-06-21 | 2018-08-30 | Nicira, Inc. | Private ethernet overlay networks over a shared ethernet in a virtual environment |
US20110317708A1 (en) | 2010-06-28 | 2011-12-29 | Alcatel-Lucent Usa, Inc. | Quality of service control for mpls user access |
US20120014386A1 (en) | 2010-06-29 | 2012-01-19 | Futurewei Technologies, Inc. | Delegate Gateways and Proxy for Target Hosts in Large Layer 2 and Address Resolution with Duplicated Internet Protocol Addresses |
US20120331188A1 (en) | 2010-06-29 | 2012-12-27 | Patrick Brian Riordan | Techniques for path selection |
US20120005265A1 (en) | 2010-06-30 | 2012-01-05 | Sony Corporation | Information processing device, content providing method and program |
US20120011281A1 (en) | 2010-07-07 | 2012-01-12 | Fujitsu Limited | Content conversion system and content conversion server |
US20120195196A1 (en) | 2010-08-11 | 2012-08-02 | Rajat Ghai | SYSTEM AND METHOD FOR QoS CONTROL OF IP FLOWS IN MOBILE NETWORKS |
US20120054266A1 (en) | 2010-09-01 | 2012-03-01 | Kazerani Alexander A | Optimized Content Distribution Based on Metrics Derived from the End User |
US20130227097A1 (en) | 2010-09-14 | 2013-08-29 | Hitachi, Ltd. | Multi-tenancy information processing system, management server, and configuration management method |
US20120089664A1 (en) | 2010-10-12 | 2012-04-12 | Sap Portals Israel, Ltd. | Optimizing Distributed Computer Networks |
US20130039218A1 (en) | 2010-10-25 | 2013-02-14 | Force 10 Networks | Limiting mac address learning on access network switches |
US20120144014A1 (en) | 2010-12-01 | 2012-06-07 | Cisco Technology, Inc. | Directing data flows in data centers with clustering services |
US20120147894A1 (en) | 2010-12-08 | 2012-06-14 | Mulligan John T | Methods and apparatus to provision cloud computing network elements |
US20120155266A1 (en) | 2010-12-17 | 2012-06-21 | Microsoft Corporation | Synchronizing state among load balancer components |
US8804720B1 (en) | 2010-12-22 | 2014-08-12 | Juniper Networks, Inc. | Pass-through multicast admission control signaling |
US20120213074A1 (en) | 2011-01-27 | 2012-08-23 | Verint Systems Ltd. | System and method for flow table management |
US20170257432A1 (en) | 2011-02-09 | 2017-09-07 | Cliqr Technologies Inc. | Apparatus, systems and methods for container based service deployment |
US20120207174A1 (en) | 2011-02-10 | 2012-08-16 | Choung-Yaw Michael Shieh | Distributed service processing of network gateways using virtual machines |
US20120230187A1 (en) | 2011-03-09 | 2012-09-13 | Telefonaktiebolaget L M Ericsson (Publ) | Load balancing sctp associations using vtag mediation |
US20120246637A1 (en) | 2011-03-22 | 2012-09-27 | Cisco Technology, Inc. | Distributed load balancer in a virtual machine environment |
US20120266252A1 (en) | 2011-04-18 | 2012-10-18 | Bank Of America Corporation | Hardware-based root of trust for cloud environments |
US8743885B2 (en) | 2011-05-03 | 2014-06-03 | Cisco Technology, Inc. | Mobile service routing in a network environment |
US20140169375A1 (en) | 2011-05-03 | 2014-06-19 | Cisco Technology, Inc. | Mobile service routing in a network environment |
US20120281540A1 (en) | 2011-05-03 | 2012-11-08 | Cisco Technology, Inc. | Mobile service routing in a network environment |
US20120303809A1 (en) | 2011-05-25 | 2012-11-29 | Microsoft Corporation | Offloading load balancing packet modification |
US20120311568A1 (en) | 2011-05-31 | 2012-12-06 | Jansen Gerardus T | Mechanism for Inter-Cloud Live Migration of Virtualization Systems |
US20120317260A1 (en) | 2011-06-07 | 2012-12-13 | Syed Mohammad Amir Husain | Network Controlled Serial and Audio Switch |
US20120317570A1 (en) | 2011-06-08 | 2012-12-13 | Dalcher Gregory W | System and method for virtual partition monitoring |
US20130003735A1 (en) | 2011-06-28 | 2013-01-03 | Chao H Jonathan | Dynamically provisioning middleboxes |
US20200162352A1 (en) | 2011-07-15 | 2020-05-21 | Inetco Systems Limited | Method and system for monitoring performance of an application system |
US20130021942A1 (en) | 2011-07-18 | 2013-01-24 | Cisco Technology, Inc. | Granular Control of Multicast Delivery Services for Layer-2 Interconnect Solutions |
US20130031544A1 (en) | 2011-07-27 | 2013-01-31 | Microsoft Corporation | Virtual machine migration to minimize packet loss in virtualized network |
US20140195666A1 (en) | 2011-08-04 | 2014-07-10 | Midokura Sarl | System and method for implementing and managing virtual networks |
US20130044636A1 (en) | 2011-08-17 | 2013-02-21 | Teemu Koponen | Distributed logical l3 routing |
US20130151661A1 (en) | 2011-08-17 | 2013-06-13 | Nicira, Inc. | Handling nat migration in logical l3 routing |
US9407599B2 (en) | 2011-08-17 | 2016-08-02 | Nicira, Inc. | Handling NAT migration in logical L3 routing |
US20130148505A1 (en) | 2011-08-17 | 2013-06-13 | Nicira, Inc. | Load balancing in a logical pipeline |
US20130142048A1 (en) | 2011-08-17 | 2013-06-06 | Nicira, Inc. | Flow templating in logical l3 routing |
US20130058346A1 (en) | 2011-09-07 | 2013-03-07 | Microsoft Corporation | Distributed Routing Domains in Multi-Tenant Datacenter Virtual Networks |
US8856518B2 (en) | 2011-09-07 | 2014-10-07 | Microsoft Corporation | Secure and efficient offloading of network policies to network interface cards |
US20130073743A1 (en) | 2011-09-19 | 2013-03-21 | Cisco Technology, Inc. | Services controlled session based flow interceptor |
US10200493B2 (en) | 2011-10-17 | 2019-02-05 | Microsoft Technology Licensing, Llc | High-density multi-tenant distributed cache as a service |
US9232342B2 (en) | 2011-10-24 | 2016-01-05 | Interdigital Patent Holdings, Inc. | Methods, systems and apparatuses for application service layer (ASL) inter-networking |
US20130100851A1 (en) | 2011-10-25 | 2013-04-25 | Cisco Technology, Inc. | Multicast Source Move Detection for Layer-2 Interconnect Solutions |
US20130125120A1 (en) | 2011-11-15 | 2013-05-16 | Nicira, Inc. | Migrating middlebox state for distributed middleboxes |
US20130136126A1 (en) | 2011-11-30 | 2013-05-30 | Industrial Technology Research Institute | Data center network system and packet forwarding method thereof |
US20130159487A1 (en) | 2011-12-14 | 2013-06-20 | Microsoft Corporation | Migration of Virtual IP Addresses in a Failover Cluster |
US20130160024A1 (en) | 2011-12-20 | 2013-06-20 | Sybase, Inc. | Dynamic Load Balancing for Complex Event Processing |
US20130163594A1 (en) | 2011-12-21 | 2013-06-27 | Cisco Technology, Inc. | Overlay-Based Packet Steering |
US8830834B2 (en) | 2011-12-21 | 2014-09-09 | Cisco Technology, Inc. | Overlay-based packet steering |
US20130166703A1 (en) | 2011-12-27 | 2013-06-27 | Michael P. Hammer | System And Method For Management Of Network-Based Services |
US20130170501A1 (en) | 2011-12-28 | 2013-07-04 | Futurewei Technologies, Inc. | Service Router Architecture |
US8914406B1 (en) | 2012-02-01 | 2014-12-16 | Vorstack, Inc. | Scalable network security with fast response protocol |
US8868711B2 (en) | 2012-02-03 | 2014-10-21 | Microsoft Corporation | Dynamic load balancing in a scalable environment |
US20130201989A1 (en) * | 2012-02-08 | 2013-08-08 | Radisys Corporation | Stateless load balancer in a multi-node system for transparent processing with packet preservation |
US20130227550A1 (en) | 2012-02-27 | 2013-08-29 | Computer Associates Think, Inc. | System and method for isolated virtual image and appliance communication within a cloud environment |
US20160203817A1 (en) | 2012-02-28 | 2016-07-14 | Ten Eight Technology, Inc. | Automated voice-to-reporting/management system and method for voice call-ins of events/crimes |
US20130291088A1 (en) | 2012-04-11 | 2013-10-31 | Choung-Yaw Michael Shieh | Cooperative network security inspection |
US20130287026A1 (en) | 2012-04-13 | 2013-10-31 | Nicira Inc. | Extension of logical networks across layer 3 virtual private networks |
JP2015519822A (en) | 2012-04-30 | 2015-07-09 | インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation | A method, system, and computer program for servicing virtual overlay network traffic. |
US20130287036A1 (en) | 2012-04-30 | 2013-10-31 | International Business Machines Corporation | Providing services to virtual overlay network traffic |
US20130297798A1 (en) | 2012-05-04 | 2013-11-07 | Mustafa Arisoylu | Two level packet distribution with stateless first level packet distribution to a group of servers and stateful second level packet distribution to a server within the group |
US20130301472A1 (en) | 2012-05-10 | 2013-11-14 | David Ian Allan | 802.1aq support over ietf evpn |
CN104471899A (en) | 2012-05-10 | 2015-03-25 | 瑞典爱立信有限公司 | 802.1AQ support via IETF EVPN |
US20130311637A1 (en) | 2012-05-15 | 2013-11-21 | International Business Machines Corporation | Overlay tunnel information exchange protocol |
US8862883B2 (en) | 2012-05-16 | 2014-10-14 | Cisco Technology, Inc. | System and method for secure cloud service delivery with prioritized services in a network environment |
US20130318219A1 (en) | 2012-05-23 | 2013-11-28 | Brocade Communications Systems, Inc | Layer-3 overlay gateways |
US20130322446A1 (en) | 2012-06-05 | 2013-12-05 | International Business Machines Corporation | Virtual ethernet port aggregation (vepa)-enabled multi-tenant overlay network |
US20150244617A1 (en) | 2012-06-06 | 2015-08-27 | Juniper Networks, Inc. | Physical path determination for virtual network packet flows |
US8488577B1 (en) | 2012-06-06 | 2013-07-16 | Google Inc. | Apparatus for controlling the availability of internet access to applications |
US20130332983A1 (en) | 2012-06-12 | 2013-12-12 | TELEFONAKTIEBOLAGET L M ERRICSSON (publ) | Elastic Enforcement Layer for Cloud Security Using SDN |
US20130336319A1 (en) | 2012-06-14 | 2013-12-19 | Liwu Liu | Multicast to unicast conversion technique |
US20130343378A1 (en) | 2012-06-21 | 2013-12-26 | Mark Veteikis | Virtual data loopback and/or data capture in a computing system |
US20130343174A1 (en) | 2012-06-26 | 2013-12-26 | Juniper Networks, Inc. | Service plane triggered fast reroute protection |
US20140003232A1 (en) | 2012-06-27 | 2014-01-02 | Juniper Networks, Inc. | Feedback loop for service engineered paths |
US20140003422A1 (en) | 2012-06-29 | 2014-01-02 | Jeffrey C. Mogul | Implementing a software defined network using event records that are transmitted from a network switch |
US20170346764A1 (en) | 2012-06-29 | 2017-11-30 | Huawei Technologies Co., Ltd. | Method for Processing Information, Forwarding Plane Device and Control Plane Device |
US20150109901A1 (en) | 2012-06-30 | 2015-04-23 | Huawei Technologies Co., Ltd. | Method for managing forwarding plane tunnel resource under control and forwarding decoupled architecture |
US9237098B2 (en) | 2012-07-03 | 2016-01-12 | Cisco Technologies, Inc. | Media access control (MAC) address summation in Datacenter Ethernet networking |
US20140010085A1 (en) | 2012-07-09 | 2014-01-09 | Arun Kavunder | System and method associated with a service flow router |
US20150003455A1 (en) | 2012-07-24 | 2015-01-01 | Telefonaktiebolaget L M Ericsson (Publ) | System and method for enabling services chaining in a provider network |
US20140029447A1 (en) | 2012-07-25 | 2014-01-30 | Qualcomm Atheros, Inc. | Forwarding tables for hybrid communication networks |
US20140046997A1 (en) | 2012-08-09 | 2014-02-13 | International Business Machines Corporation | Service management roles of processor nodes in distributed node service management |
US20140046998A1 (en) | 2012-08-09 | 2014-02-13 | International Business Machines Corporation | Service management modes of operation in distributed node service management |
US8989192B2 (en) | 2012-08-15 | 2015-03-24 | Futurewei Technologies, Inc. | Method and system for creating software defined ordered service patterns in a communications network |
US9705702B2 (en) | 2012-08-15 | 2017-07-11 | Futurewei Technologies, Inc. | Method and system for creating software defined ordered service patterns in a communications network |
US20150156035A1 (en) | 2012-08-15 | 2015-06-04 | Futurewei Technologies, Inc. | Method and System for Creating Software Defined Ordered Service Patterns in a Communications Network |
US20140052844A1 (en) | 2012-08-17 | 2014-02-20 | Vmware, Inc. | Management of a virtual machine in a storage area network environment |
US20140059204A1 (en) | 2012-08-24 | 2014-02-27 | Filip Nguyen | Systems and methods for providing message flow analysis for an enterprise service bus |
US20140059544A1 (en) | 2012-08-27 | 2014-02-27 | Vmware, Inc. | Framework for networking and security services in virtual networks |
US20140068602A1 (en) | 2012-09-04 | 2014-03-06 | Aaron Robert Gember | Cloud-Based Middlebox Management System |
US20150073967A1 (en) | 2012-09-12 | 2015-03-12 | Iex Group, Inc. | Transmission latency leveling apparatuses, methods and systems |
US20160043901A1 (en) | 2012-09-25 | 2016-02-11 | A10 Networks, Inc. | Graceful scaling in software driven networks |
US20140092738A1 (en) | 2012-09-28 | 2014-04-03 | Juniper Networks, Inc. | Maintaining load balancing after service application with a netwok device |
US20140096183A1 (en) | 2012-10-01 | 2014-04-03 | International Business Machines Corporation | Providing services to virtual overlay network traffic |
US20140092914A1 (en) | 2012-10-02 | 2014-04-03 | Lsi Corporation | Method and system for intelligent deep packet buffering |
US9148367B2 (en) | 2012-10-02 | 2015-09-29 | Cisco Technology, Inc. | System and method for binding flows in a service cluster deployment in a network environment |
US20160057050A1 (en) | 2012-10-05 | 2016-02-25 | Stamoulis & Weinblatt LLC | Devices, methods, and systems for packet reroute permission based on content parameters embedded in packet header or payload |
US20140101226A1 (en) | 2012-10-08 | 2014-04-10 | Motorola Mobility Llc | Methods and apparatus for performing dynamic load balancing of processing resources |
US20140101656A1 (en) | 2012-10-10 | 2014-04-10 | Zhongwen Zhu | Virtual firewall mobility |
US20140108665A1 (en) | 2012-10-16 | 2014-04-17 | Citrix Systems, Inc. | Systems and methods for bridging between public and private clouds through multilevel api integration |
US20140115578A1 (en) | 2012-10-21 | 2014-04-24 | Geoffrey Howard Cooper | Providing a virtual security appliance architecture to a virtual cloud infrastructure |
US20150288671A1 (en) | 2012-11-02 | 2015-10-08 | Silverlake Mobility Ecosystem Sdn Bhd | Method of processing requests for digital services |
US20140129715A1 (en) | 2012-11-07 | 2014-05-08 | Yahoo! Inc. | Method and system for work load balancing |
US9104497B2 (en) | 2012-11-07 | 2015-08-11 | Yahoo! Inc. | Method and system for work load balancing |
US20150023354A1 (en) | 2012-11-19 | 2015-01-22 | Huawei Technologies Co., Ltd. | Method and device for allocating packet switching resource |
US20140149696A1 (en) | 2012-11-28 | 2014-05-29 | Red Hat Israel, Ltd. | Virtual machine backup using snapshots and current configuration |
US20140164477A1 (en) | 2012-12-06 | 2014-06-12 | Gary M. Springer | System and method for providing horizontal scaling of stateful applications |
US10341427B2 (en) | 2012-12-06 | 2019-07-02 | A10 Networks, Inc. | Forwarding policies on a virtual service network |
US20140169168A1 (en) | 2012-12-06 | 2014-06-19 | A10 Networks, Inc. | Configuration of a virtual service network |
US9203748B2 (en) | 2012-12-24 | 2015-12-01 | Huawei Technologies Co., Ltd. | Software defined network-based data processing method, node, and system |
US20140207968A1 (en) | 2013-01-23 | 2014-07-24 | Cisco Technology, Inc. | Server Load Balancer Traffic Steering |
US20150372911A1 (en) | 2013-01-31 | 2015-12-24 | Hitachi, Ltd. | Communication path management method |
US10375155B1 (en) | 2013-02-19 | 2019-08-06 | F5 Networks, Inc. | System and method for achieving hardware acceleration for asymmetric flow connections |
US10484334B1 (en) | 2013-02-26 | 2019-11-19 | Zentera Systems, Inc. | Distributed firewall security system that extends across different cloud computing networks |
US20140269724A1 (en) | 2013-03-04 | 2014-09-18 | Telefonaktiebolaget L M Ericsson (Publ) | Method and devices for forwarding ip data packets in an access network |
US20140254591A1 (en) | 2013-03-08 | 2014-09-11 | Dell Products L.P. | Processing of multicast traffic in computer networks |
US20140254374A1 (en) | 2013-03-11 | 2014-09-11 | Cisco Technology, Inc. | Methods and devices for providing service clustering in a trill network |
US20140281029A1 (en) | 2013-03-14 | 2014-09-18 | Time Warner Cable Enterprises Llc | System and method for automatic routing of dynamic host configuration protocol (dhcp) traffic |
US20140282526A1 (en) | 2013-03-15 | 2014-09-18 | Avi Networks | Managing and controlling a distributed network service platform |
US20140269487A1 (en) | 2013-03-15 | 2014-09-18 | Vivint, Inc. | Multicast traffic management within a wireless mesh network |
US20140269717A1 (en) | 2013-03-15 | 2014-09-18 | Cisco Technology, Inc. | Ipv6/ipv4 resolution-less forwarding up to a destination |
US20140280896A1 (en) | 2013-03-15 | 2014-09-18 | Achilleas Papakostas | Methods and apparatus to credit usage of mobile devices |
US20140304231A1 (en) | 2013-04-06 | 2014-10-09 | Citrix Systems, Inc. | Systems and methods for application-state distributed replication table hunting |
US20140301388A1 (en) | 2013-04-06 | 2014-10-09 | Citrix Systems, Inc. | Systems and methods to cache packet steering decisions for a cluster of load balancers |
US20140307744A1 (en) | 2013-04-12 | 2014-10-16 | Futurewei Technologies, Inc. | Service Chain Policy for Distributed Gateways in Virtual Overlay Networks |
US20140310418A1 (en) | 2013-04-16 | 2014-10-16 | Amazon Technologies, Inc. | Distributed load balancer |
US20140310391A1 (en) | 2013-04-16 | 2014-10-16 | Amazon Technologies, Inc. | Multipath routing in a distributed load balancer |
US10075470B2 (en) | 2013-04-19 | 2018-09-11 | Nicira, Inc. | Framework for coordination between endpoint security and network security services |
US20140317677A1 (en) | 2013-04-19 | 2014-10-23 | Vmware, Inc. | Framework for coordination between endpoint security and network security services |
US10237379B2 (en) | 2013-04-26 | 2019-03-19 | Cisco Technology, Inc. | High-efficiency service chaining with agentless service nodes |
US20140321459A1 (en) | 2013-04-26 | 2014-10-30 | Cisco Technology, Inc. | Architecture for agentless service insertion |
US20180262427A1 (en) | 2013-05-09 | 2018-09-13 | Nicira, Inc. | Method and system for service switching using service tags |
US9225638B2 (en) | 2013-05-09 | 2015-12-29 | Vmware, Inc. | Method and system for service switching using service tags |
US20160087888A1 (en) | 2013-05-09 | 2016-03-24 | Vmware, Inc. | Method and system for service switching using service tags |
US20140334485A1 (en) | 2013-05-09 | 2014-11-13 | Vmware, Inc. | Method and system for service switching using service tags |
WO2014182529A1 (en) | 2013-05-09 | 2014-11-13 | Vmware, Inc. | Method and system for service switching using service tags |
US9979641B2 (en) | 2013-05-09 | 2018-05-22 | Nicira, Inc. | Method and system for service switching using service tags |
US10693782B2 (en) | 2013-05-09 | 2020-06-23 | Nicira, Inc. | Method and system for service switching using service tags |
US20140334488A1 (en) | 2013-05-10 | 2014-11-13 | Cisco Technology, Inc. | Data Plane Learning of Bi-Directional Service Chains |
US20140341029A1 (en) | 2013-05-20 | 2014-11-20 | Telefonaktiebolaget L M Ericsson (Publ) | Encoding a payload hash in the da-mac to facilitate elastic chaining of packet processing elements |
US20140351452A1 (en) | 2013-05-21 | 2014-11-27 | Cisco Technology, Inc. | Chaining Service Zones by way of Route Re-Origination |
US20160080253A1 (en) | 2013-05-23 | 2016-03-17 | Huawei Technologies Co. Ltd. | Service routing system, device, and method |
US20140362705A1 (en) | 2013-06-07 | 2014-12-11 | The Florida International University Board Of Trustees | Load-balancing algorithms for data center networks |
US20140362682A1 (en) | 2013-06-07 | 2014-12-11 | Cisco Technology, Inc. | Determining the Operations Performed Along a Service Path/Service Chain |
US20140372702A1 (en) | 2013-06-12 | 2014-12-18 | Oracle International Corporation | Handling memory pressure in an in-database sharded queue |
US20160149816A1 (en) | 2013-06-14 | 2016-05-26 | Haitao Wu | Fault Tolerant and Load Balanced Routing |
US20160099948A1 (en) | 2013-06-14 | 2016-04-07 | Tocario Gmbh | Method and system for enabling access of a client device to a remote desktop |
US20140369204A1 (en) | 2013-06-17 | 2014-12-18 | Telefonaktiebolaget L M Ericsson (Publ) | Methods of load balancing using primary and stand-by addresses and related load balancers and servers |
US20140372567A1 (en) | 2013-06-17 | 2014-12-18 | Telefonaktiebolaget L M Ericsson (Publ) | Methods of forwarding data packets using transient tables and related load balancers |
US20140372616A1 (en) | 2013-06-17 | 2014-12-18 | Telefonaktiebolaget L M Ericsson (Publ) | Methods of forwarding/receiving data packets using unicast and/or multicast communications and related load balancers and servers |
US20150003453A1 (en) | 2013-06-28 | 2015-01-01 | Vmware, Inc. | Network service slotting |
US9686192B2 (en) | 2013-06-28 | 2017-06-20 | Niciria, Inc. | Network service slotting |
US20150009995A1 (en) | 2013-07-08 | 2015-01-08 | Nicira, Inc. | Encapsulating Data Packets Using an Adaptive Tunnelling Protocol |
US20150016279A1 (en) | 2013-07-09 | 2015-01-15 | Nicira, Inc. | Using Headerspace Analysis to Identify Classes of Packets |
US20160127306A1 (en) | 2013-07-11 | 2016-05-05 | Huawei Technologies Co., Ltd. | Packet Transmission Method, Apparatus, and System in Multicast Domain Name System |
US20150026362A1 (en) | 2013-07-17 | 2015-01-22 | Cisco Technology, Inc. | Dynamic Service Path Creation |
US20150026345A1 (en) | 2013-07-22 | 2015-01-22 | Vmware, Inc. | Managing link aggregation traffic in a virtual environment |
US20150030024A1 (en) | 2013-07-23 | 2015-01-29 | Dell Products L.P. | Systems and methods for a data center architecture facilitating layer 2 over layer 3 communication |
US9755971B2 (en) | 2013-08-12 | 2017-09-05 | Cisco Technology, Inc. | Traffic flow redirection between border routers using routing encapsulation |
US20150052262A1 (en) | 2013-08-14 | 2015-02-19 | Nicira, Inc. | Providing Services for Logical Networks |
US20150052522A1 (en) | 2013-08-14 | 2015-02-19 | Nicira, Inc. | Generation of DHCP Configuration Files |
US20160197831A1 (en) | 2013-08-16 | 2016-07-07 | Interdigital Patent Holdings, Inc. | Method and apparatus for name resolution in software defined networking |
US20160277294A1 (en) | 2013-08-26 | 2016-09-22 | Nec Corporation | Communication apparatus, communication method, control apparatus, and management apparatus in a communication system |
US20150063102A1 (en) | 2013-08-30 | 2015-03-05 | Cisco Technology, Inc. | Flow Based Network Service Insertion |
US20170142012A1 (en) | 2013-09-04 | 2017-05-18 | Nicira, Inc. | Multiple Active L3 Gateways for Logical Networks |
US20150063364A1 (en) | 2013-09-04 | 2015-03-05 | Nicira, Inc. | Multiple Active L3 Gateways for Logical Networks |
US9577845B2 (en) | 2013-09-04 | 2017-02-21 | Nicira, Inc. | Multiple active L3 gateways for logical networks |
US9407540B2 (en) | 2013-09-06 | 2016-08-02 | Cisco Technology, Inc. | Distributed service chaining in a network environment |
US20150078384A1 (en) | 2013-09-15 | 2015-03-19 | Nicira, Inc. | Tracking Prefixes of Values Associated with Different Rules to Generate Flows |
US20150092564A1 (en) | 2013-09-27 | 2015-04-02 | Futurewei Technologies, Inc. | Validation of Chained Network Services |
US10091276B2 (en) | 2013-09-27 | 2018-10-02 | Transvoyant, Inc. | Computer-implemented systems and methods of analyzing data in an ad-hoc network for predictive decision-making |
US20150092551A1 (en) | 2013-09-30 | 2015-04-02 | Juniper Networks, Inc. | Session-aware service chaining within computer networks |
US9258742B1 (en) | 2013-09-30 | 2016-02-09 | Juniper Networks, Inc. | Policy-directed value-added services chaining |
US20150103645A1 (en) | 2013-10-10 | 2015-04-16 | Vmware, Inc. | Controller side method of generating and updating a controller assignment list |
US20150103679A1 (en) | 2013-10-13 | 2015-04-16 | Vmware, Inc. | Tracing Host-Originated Logical Network Packets |
US20150103827A1 (en) | 2013-10-14 | 2015-04-16 | Cisco Technology, Inc. | Configurable Service Proxy Mapping |
CN103516807A (en) | 2013-10-14 | 2014-01-15 | 中国联合网络通信集团有限公司 | Cloud computing platform server load balancing system and method |
US9264313B1 (en) | 2013-10-31 | 2016-02-16 | Vmware, Inc. | System and method for performing a service discovery for virtual networks |
US20150124622A1 (en) | 2013-11-01 | 2015-05-07 | Movik Networks, Inc. | Multi-Interface, Multi-Layer State-full Load Balancer For RAN-Analytics Deployments In Multi-Chassis, Cloud And Virtual Server Environments |
US20150124840A1 (en) | 2013-11-03 | 2015-05-07 | Ixia | Packet flow modification |
US20150124608A1 (en) | 2013-11-05 | 2015-05-07 | International Business Machines Corporation | Adaptive Scheduling of Data Flows in Data Center Networks for Efficient Resource Utilization |
US9397946B1 (en) | 2013-11-05 | 2016-07-19 | Cisco Technology, Inc. | Forwarding to clusters of service nodes |
US20150138973A1 (en) | 2013-11-15 | 2015-05-21 | Cisco Technology, Inc. | Shortening of service paths in service chains in a communications network |
US20150139041A1 (en) | 2013-11-21 | 2015-05-21 | Cisco Technology, Inc. | Subscriber dependent redirection between a mobile packet core proxy and a cell site proxy in a network environment |
US20150146539A1 (en) | 2013-11-25 | 2015-05-28 | Versa Networks, Inc. | Flow distribution table for packet flow load balancing |
US10104169B1 (en) | 2013-12-18 | 2018-10-16 | Amazon Technologies, Inc. | Optimizing a load balancer configuration |
US20160337189A1 (en) | 2013-12-19 | 2016-11-17 | Rainer Liebhart | A method and apparatus for performing flexible service chaining |
US20150188770A1 (en) | 2013-12-27 | 2015-07-02 | Big Switch Networks, Inc. | Systems and methods for performing network service insertion |
US20150195197A1 (en) | 2014-01-06 | 2015-07-09 | Futurewei Technologies, Inc. | Service Function Chaining in a Packet Network |
US20160308961A1 (en) | 2014-01-06 | 2016-10-20 | Tencent Technology (Shenzhen) Company Limited | Methods, Devices, and Systems for Allocating Service Nodes in a Network |
US20170005882A1 (en) | 2014-01-24 | 2017-01-05 | Zte Corporation | Service Chain Management Method, System and Device |
US20150215819A1 (en) | 2014-01-24 | 2015-07-30 | Cisco Technology, Inc. | Method for Providing Sticky Load Balancing |
US20150213087A1 (en) | 2014-01-28 | 2015-07-30 | Software Ag | Scaling framework for querying |
US20160337249A1 (en) | 2014-01-29 | 2016-11-17 | Huawei Technologies Co., Ltd. | Communications network, device, and control method |
US20150222640A1 (en) | 2014-02-03 | 2015-08-06 | Cisco Technology, Inc. | Elastic Service Chains |
US20150236948A1 (en) | 2014-02-14 | 2015-08-20 | Futurewei Technologies, Inc. | Restoring service functions after changing a service chain instance path |
US20150237013A1 (en) | 2014-02-20 | 2015-08-20 | Nicira, Inc. | Specifying point of enforcement in a firewall rule |
US20150242197A1 (en) | 2014-02-25 | 2015-08-27 | Red Hat, Inc. | Automatic Installing and Scaling of Application Resources in a Multi-Tenant Platform-as-a-Service (PaaS) System |
CN103795805A (en) | 2014-02-27 | 2014-05-14 | 中国科学技术大学苏州研究院 | Distributed server load balancing method based on SDN |
US20160373364A1 (en) | 2014-03-04 | 2016-12-22 | Nec Corporation | Packet processing device, packet processing method and program |
US20160378537A1 (en) | 2014-03-12 | 2016-12-29 | Huawei Technologies Co., Ltd. | Method and Apparatus for Controlling Virtual Machine Migration |
US20150263901A1 (en) | 2014-03-13 | 2015-09-17 | Cisco Technology, Inc. | Service node originated service chains in a network environment |
US20150263946A1 (en) | 2014-03-14 | 2015-09-17 | Nicira, Inc. | Route advertisement by managed gateways |
US20150271102A1 (en) | 2014-03-21 | 2015-09-24 | Juniper Networks, Inc. | Selectable service node resources |
US10135636B2 (en) | 2014-03-25 | 2018-11-20 | Huawei Technologies Co., Ltd. | Method for generating forwarding information, controller, and service forwarding entity |
US9602380B2 (en) | 2014-03-28 | 2017-03-21 | Futurewei Technologies, Inc. | Context-aware dynamic policy selection for load balancing behavior |
US9787559B1 (en) | 2014-03-28 | 2017-10-10 | Juniper Networks, Inc. | End-to-end monitoring of overlay networks providing virtualized network services |
US20150281089A1 (en) | 2014-03-31 | 2015-10-01 | Sandvine Incorporated Ulc | System and method for load balancing in computer networks |
US20150281098A1 (en) | 2014-03-31 | 2015-10-01 | Nicira, Inc. | Flow Cache Hierarchy |
US9686200B2 (en) | 2014-03-31 | 2017-06-20 | Nicira, Inc. | Flow cache hierarchy |
US20150281125A1 (en) | 2014-03-31 | 2015-10-01 | Nicira, Inc. | Caching of service decisions |
US9009289B1 (en) | 2014-03-31 | 2015-04-14 | Flexera Software Llc | Systems and methods for assessing application usage |
US9985896B2 (en) | 2014-03-31 | 2018-05-29 | Nicira, Inc. | Caching of service decisions |
US20150281180A1 (en) | 2014-03-31 | 2015-10-01 | Nicira, Inc. | Method and apparatus for integrating a service virtual machine |
US20150280959A1 (en) | 2014-03-31 | 2015-10-01 | Amazon Technologies, Inc. | Session management in distributed storage systems |
US20150281179A1 (en) | 2014-03-31 | 2015-10-01 | Chids Raman | Migrating firewall connection state for a firewall service virtual machine |
US20180262434A1 (en) | 2014-03-31 | 2018-09-13 | Nicira, Inc. | Processing packets according to hierarchy of flow entry storages |
US20170019341A1 (en) | 2014-04-01 | 2017-01-19 | Huawei Technologies Co., Ltd. | Service link selection control method and device |
US20150288679A1 (en) | 2014-04-02 | 2015-10-08 | Cisco Technology, Inc. | Interposer with Security Assistant Key Escrow |
US10305822B2 (en) | 2014-04-04 | 2019-05-28 | Zte Corporation | Service chain routing method and system, and equipment in system |
US20150295831A1 (en) | 2014-04-10 | 2015-10-15 | Cisco Technology, Inc. | Network address translation offload to network infrastructure for service chains in a network environment |
US20150319078A1 (en) | 2014-05-02 | 2015-11-05 | Futurewei Technologies, Inc. | Computing Service Chain-Aware Paths |
US20150319096A1 (en) | 2014-05-05 | 2015-11-05 | Nicira, Inc. | Secondary input queues for maintaining a consistent network state |
US20160164787A1 (en) | 2014-06-05 | 2016-06-09 | KEMP Technologies Inc. | Methods for intelligent data traffic steering |
US20150358294A1 (en) | 2014-06-05 | 2015-12-10 | Cavium, Inc. | Systems and methods for secured hardware security module communication with web service hosts |
US20150358235A1 (en) | 2014-06-05 | 2015-12-10 | Futurewei Technologies, Inc. | Service Chain Topology Map Construction |
US20150365322A1 (en) | 2014-06-13 | 2015-12-17 | Cisco Technology, Inc. | Providing virtual private service chains in a network environment |
US20170099194A1 (en) | 2014-06-17 | 2017-04-06 | Huawei Technologies Co., Ltd. | Service flow processing method, apparatus, and device |
US10013276B2 (en) | 2014-06-20 | 2018-07-03 | Google Llc | System and method for live migration of a virtualized networking stack |
US20150370596A1 (en) | 2014-06-20 | 2015-12-24 | Google Inc. | System and method for live migration of a virtualized networking stack |
US20150370586A1 (en) | 2014-06-23 | 2015-12-24 | Intel Corporation | Local service chaining with virtual machines and virtualized containers in software defined networking |
US20150372840A1 (en) | 2014-06-23 | 2015-12-24 | International Business Machines Corporation | Servicing packets in a virtual network and a software-defined network (sdn) |
US20150381493A1 (en) | 2014-06-30 | 2015-12-31 | Juniper Networks, Inc. | Service chaining across multiple networks |
US20150379277A1 (en) | 2014-06-30 | 2015-12-31 | Leonard Heyman | Encryption Architecture |
US20150381495A1 (en) | 2014-06-30 | 2015-12-31 | Nicira, Inc. | Methods and systems for providing multi-tenancy support for single root i/o virtualization |
US10445509B2 (en) | 2014-06-30 | 2019-10-15 | Nicira, Inc. | Encryption architecture |
US20150381494A1 (en) | 2014-06-30 | 2015-12-31 | Nicira, Inc. | Methods and systems to offload overlay network packet encapsulation to hardware |
US20160006654A1 (en) | 2014-07-07 | 2016-01-07 | Cisco Technology, Inc. | Bi-directional flow stickiness in a network environment |
US20160028640A1 (en) | 2014-07-22 | 2016-01-28 | Futurewei Technologies, Inc. | Service Chain Header and Metadata Transport |
US10250501B2 (en) | 2014-07-23 | 2019-04-02 | Huawei Technologies Co., Ltd. | Service packet forwarding method and apparatus |
US20160043952A1 (en) | 2014-08-06 | 2016-02-11 | Futurewei Technologies, Inc. | Mechanisms to support service chain graphs in a communication network |
US20160057687A1 (en) | 2014-08-19 | 2016-02-25 | Qualcomm Incorporated | Inter/intra radio access technology mobility and user-plane split measurement configuration |
US20160065503A1 (en) | 2014-08-29 | 2016-03-03 | Extreme Networks, Inc. | Methods, systems, and computer readable media for virtual fabric routing |
US9442752B1 (en) | 2014-09-03 | 2016-09-13 | Amazon Technologies, Inc. | Virtual secure execution environments |
US20170250869A1 (en) | 2014-09-12 | 2017-08-31 | Andreas Richard Voellmy | Managing network forwarding configurations using algorithmic policies |
US20170250917A1 (en) | 2014-09-19 | 2017-08-31 | Nokia Solutions And Networks Oy | Chaining of network service functions in a communication network |
US20170250902A1 (en) | 2014-09-23 | 2017-08-31 | Nokia Solutions And Networks Oy | Control of communication using service function chaining |
US9804797B1 (en) | 2014-09-29 | 2017-10-31 | EMC IP Holding Company LLC | Using dynamic I/O load differential for load balancing |
US20160094632A1 (en) | 2014-09-30 | 2016-03-31 | Nicira, Inc. | Inline Service Switch |
US10129077B2 (en) | 2014-09-30 | 2018-11-13 | Nicira, Inc. | Configuring and operating a XaaS model in a datacenter |
US10320679B2 (en) | 2014-09-30 | 2019-06-11 | Nicira, Inc. | Inline load balancing |
US20160094456A1 (en) | 2014-09-30 | 2016-03-31 | Nicira, Inc. | Method and apparatus for distributing load among a plurality of service nodes |
US20170208532A1 (en) | 2014-09-30 | 2017-07-20 | Huawei Technologies Co., Ltd. | Service path generation method and apparatus |
US10257095B2 (en) | 2014-09-30 | 2019-04-09 | Nicira, Inc. | Dynamically adjusting load balancing |
US10341233B2 (en) | 2014-09-30 | 2019-07-02 | Nicira, Inc. | Dynamically adjusting a data compute node group |
US20160094661A1 (en) | 2014-09-30 | 2016-03-31 | Nicira, Inc. | Sticky Service Sessions in a Datacenter |
US20160094457A1 (en) | 2014-09-30 | 2016-03-31 | Nicira, Inc. | Tunnel-Enabled Elastic Service Model |
US9531590B2 (en) | 2014-09-30 | 2016-12-27 | Nicira, Inc. | Load balancing across a group of load balancers |
US20160094389A1 (en) | 2014-09-30 | 2016-03-31 | Nicira, Inc. | Elastically managing a service node group |
US10225137B2 (en) | 2014-09-30 | 2019-03-05 | Nicira, Inc. | Service node selection by an inline service switch |
US20160094453A1 (en) | 2014-09-30 | 2016-03-31 | Nicira, Inc. | Load balancer of load balancers |
US20190288947A1 (en) | 2014-09-30 | 2019-09-19 | Nicira, Inc. | Inline load balancing |
US20160094384A1 (en) | 2014-09-30 | 2016-03-31 | Nicira, Inc. | Controller Driven Reconfiguration of a Multi-Layered Application or Service Model |
US20160094642A1 (en) | 2014-09-30 | 2016-03-31 | Nicira, Inc. | Dynamically adjusting load balancing |
US10516568B2 (en) | 2014-09-30 | 2019-12-24 | Nicira, Inc. | Controller driven reconfiguration of a multi-layered application or service model |
US20160094633A1 (en) | 2014-09-30 | 2016-03-31 | Nicira, Inc. | Configuring and Operating a XaaS Model in a Datacenter |
US10135737B2 (en) | 2014-09-30 | 2018-11-20 | Nicira, Inc. | Distributed load balancing systems |
US20160094451A1 (en) | 2014-09-30 | 2016-03-31 | Nicira, Inc | Inline load balancing |
US20160094452A1 (en) | 2014-09-30 | 2016-03-31 | Nicira, Inc. | Distributed load balancing systems |
US9755898B2 (en) | 2014-09-30 | 2017-09-05 | Nicira, Inc. | Elastically managing a service node group |
US20160094455A1 (en) | 2014-09-30 | 2016-03-31 | Nicira, Inc. | Method and apparatus for distributing load among a plurality of service nodes |
US20160094631A1 (en) | 2014-09-30 | 2016-03-31 | Nicira, Inc. | Dynamically adjusting a data compute node group |
US20160094643A1 (en) | 2014-09-30 | 2016-03-31 | Nicira, Inc. | Dynamically adjusting load balancing |
WO2016054272A1 (en) | 2014-09-30 | 2016-04-07 | Nicira, Inc. | Inline service switch |
WO2016053373A1 (en) | 2014-09-30 | 2016-04-07 | Nicira, Inc. | Load balancing |
US9774537B2 (en) | 2014-09-30 | 2017-09-26 | Nicira, Inc. | Dynamically adjusting load balancing |
US9825810B2 (en) | 2014-09-30 | 2017-11-21 | Nicira, Inc. | Method and apparatus for distributing load among a plurality of service nodes |
US9935827B2 (en) | 2014-09-30 | 2018-04-03 | Nicira, Inc. | Method and apparatus for distributing load among a plurality of service nodes |
US20160105333A1 (en) | 2014-10-10 | 2016-04-14 | Nicira, Inc. | Logical network traffic analysis |
US20160119226A1 (en) | 2014-10-24 | 2016-04-28 | Cisco Technology, Inc. | Transparent Network Service Header Path Proxies |
US20160127564A1 (en) | 2014-10-29 | 2016-05-05 | Alcatel-Lucent Usa Inc. | Policy decisions based on offline charging rules when service chaining is implemented |
US20160134528A1 (en) | 2014-11-10 | 2016-05-12 | Juniper Networks, Inc. | Signaling aliasing capability in data centers |
US9996380B2 (en) | 2014-11-11 | 2018-06-12 | Amazon Technologies, Inc. | System for managing and scheduling containers |
US20160162320A1 (en) | 2014-11-11 | 2016-06-09 | Amazon Technologies, Inc. | System for managing and scheduling containers |
US9256467B1 (en) | 2014-11-11 | 2016-02-09 | Amazon Technologies, Inc. | System for managing and scheduling containers |
US20190108049A1 (en) | 2014-11-11 | 2019-04-11 | Amazon Technologies, Inc. | System for managing and scheduling containers |
US9705775B2 (en) | 2014-11-20 | 2017-07-11 | Telefonaktiebolaget Lm Ericsson (Publ) | Passive performance measurement for inline service chaining |
US20160149784A1 (en) | 2014-11-20 | 2016-05-26 | Telefonaktiebolaget L M Ericsson (Publ) | Passive Performance Measurement for Inline Service Chaining |
US20160149828A1 (en) | 2014-11-25 | 2016-05-26 | Netapp, Inc. | Clustered storage system path quiescence analysis |
US20170264677A1 (en) | 2014-11-28 | 2017-09-14 | Huawei Technologies Co., Ltd. | Service Processing Apparatus and Method |
US20160164826A1 (en) | 2014-12-04 | 2016-06-09 | Cisco Technology, Inc. | Policy Implementation at a Network Element based on Data from an Authoritative Source |
US20170273099A1 (en) | 2014-12-09 | 2017-09-21 | Huawei Technologies Co., Ltd. | Method and apparatus for processing adaptive flow table |
US20160164776A1 (en) | 2014-12-09 | 2016-06-09 | Aol Inc. | Systems and methods for software defined networking service function chaining |
US20170279938A1 (en) | 2014-12-11 | 2017-09-28 | Huawei Technologies Co., Ltd. | Packet processing method and apparatus |
US20160173373A1 (en) | 2014-12-11 | 2016-06-16 | Cisco Technology, Inc. | Network service header metadata for load balancing |
US20160344621A1 (en) | 2014-12-17 | 2016-11-24 | Telefonaktiebolaget L M Ericsson (Publ) | Method and arrangement for relocating packet processing functions |
US20170310588A1 (en) | 2014-12-17 | 2017-10-26 | Huawei Technologies Co., Ltd. | Data forwarding method, device, and system in software-defined networking |
US9094464B1 (en) | 2014-12-18 | 2015-07-28 | Limelight Networks, Inc. | Connection digest for accelerating web traffic |
US20170339600A1 (en) | 2014-12-19 | 2017-11-23 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and appratus for relocating packet processing functions |
US20160182684A1 (en) | 2014-12-23 | 2016-06-23 | Patrick Connor | Parallel processing of service functions in service function chains |
US20160197839A1 (en) | 2015-01-05 | 2016-07-07 | Futurewei Technologies, Inc. | Method and system for providing qos for in-band control traffic in an openflow network |
US20160205015A1 (en) | 2015-01-08 | 2016-07-14 | Openwave Mobility Inc. | Software defined network and a communication network comprising the same |
US20160212048A1 (en) | 2015-01-15 | 2016-07-21 | Hewlett Packard Enterprise Development Lp | Openflow service chain data packet routing using tables |
US20160212237A1 (en) | 2015-01-16 | 2016-07-21 | Fujitsu Limited | Management server, communication system and path management method |
US20160218918A1 (en) | 2015-01-27 | 2016-07-28 | Xingjun Chu | Network virtualization for network infrastructure |
US20160226700A1 (en) | 2015-01-30 | 2016-08-04 | Nicira, Inc. | Transit logical switch within logical router |
US20160226762A1 (en) | 2015-01-30 | 2016-08-04 | Nicira, Inc. | Implementing logical router uplinks |
US10079779B2 (en) | 2015-01-30 | 2018-09-18 | Nicira, Inc. | Implementing logical router uplinks |
US10129180B2 (en) | 2015-01-30 | 2018-11-13 | Nicira, Inc. | Transit logical switch within logical router |
US9787605B2 (en) | 2015-01-30 | 2017-10-10 | Nicira, Inc. | Logical router with multiple routing components |
US20160226754A1 (en) | 2015-01-30 | 2016-08-04 | Nicira, Inc. | Logical router with multiple routing components |
US20190020600A1 (en) | 2015-01-30 | 2019-01-17 | Nicira, Inc. | Logical router with multiple routing components |
US20160232019A1 (en) | 2015-02-09 | 2016-08-11 | Broadcom Corporation | Network Interface Controller with Integrated Network Flow Processing |
US20170339110A1 (en) | 2015-02-13 | 2017-11-23 | Huawei Technologies Co., Ltd. | Access Control Apparatus, System, and Method |
US20180248713A1 (en) | 2015-02-24 | 2018-08-30 | Nokia Solutions And Networks Oy | Integrated services processing for mobile networks |
US20160248685A1 (en) | 2015-02-25 | 2016-08-25 | Cisco Technology, Inc. | Metadata augmentation in a service function chain |
US20160277210A1 (en) | 2015-03-18 | 2016-09-22 | Juniper Networks, Inc. | Evpn inter-subnet multicast forwarding |
US20200213366A1 (en) | 2015-04-03 | 2020-07-02 | Nicira, Inc. | Method, apparatus, and system for implementing a content switch |
US20160294935A1 (en) | 2015-04-03 | 2016-10-06 | Nicira, Inc. | Method, apparatus, and system for implementing a content switch |
US20160294933A1 (en) | 2015-04-03 | 2016-10-06 | Nicira, Inc. | Method, apparatus, and system for implementing a content switch |
US10609091B2 (en) | 2015-04-03 | 2020-03-31 | Nicira, Inc. | Method, apparatus, and system for implementing a content switch |
US10594743B2 (en) | 2015-04-03 | 2020-03-17 | Nicira, Inc. | Method, apparatus, and system for implementing a content switch |
US20160294612A1 (en) | 2015-04-04 | 2016-10-06 | Nicira, Inc. | Route Server Mode for Dynamic Routing Between Logical and Physical Networks |
US20210029088A1 (en) | 2015-04-13 | 2021-01-28 | Nicira, Inc. | Method and system of establishing a virtual private network in a cloud service for branch networking |
US20160308758A1 (en) | 2015-04-17 | 2016-10-20 | Huawei Technologies Co., Ltd | Software Defined Network (SDN) Control Signaling for Traffic Engineering to Enable Multi-type Transport in a Data Plane |
US20180115471A1 (en) | 2015-04-23 | 2018-04-26 | Hewlett Packard Enterprise Development Lp | Network infrastructure device to implement pre-filter rules |
US20160337317A1 (en) | 2015-05-13 | 2016-11-17 | International Business Machines Corporation | Automated Migration Planning for Moving into a Setting of Multiple Firewalls |
US20160344565A1 (en) | 2015-05-20 | 2016-11-24 | Cisco Technology, Inc. | System and method to facilitate the assignment of service functions for service chains in a network environment |
US20160352866A1 (en) | 2015-05-25 | 2016-12-01 | Juniper Networks, Inc. | Selecting and monitoring a plurality of services key performance indicators using twamp |
US10645060B2 (en) | 2015-05-28 | 2020-05-05 | Xi'an Zhongxing New Software Co., Ltd | Method, device and system for forwarding message |
US20160366046A1 (en) | 2015-06-09 | 2016-12-15 | International Business Machines Corporation | Support for high availability of service appliances in a software-defined network (sdn) service chaining infrastructure |
US20180102919A1 (en) | 2015-06-10 | 2018-04-12 | Huawei Technologies Co., Ltd. | Method for implementing service chain, device, and system |
US20180184281A1 (en) | 2015-06-10 | 2018-06-28 | Soracom, Inc. | Communication System And Communication Method For Providing IP Network Access To Wireless Terminals |
US20200036629A1 (en) | 2015-06-15 | 2020-01-30 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and network nodes for scalable mapping of tags to service function chain encapsulation headers |
US10042722B1 (en) | 2015-06-23 | 2018-08-07 | Juniper Networks, Inc. | Service-chain fault tolerance in service virtualized environments |
US10554484B2 (en) | 2015-06-26 | 2020-02-04 | Nicira, Inc. | Control plane integration with hardware switches |
US20180176294A1 (en) | 2015-06-26 | 2018-06-21 | Hewlett Packard Enterprise Development Lp | Server load balancing |
US10609122B1 (en) | 2015-06-29 | 2020-03-31 | Amazon Technologies, Inc. | Instance backed building or place |
US20170005923A1 (en) | 2015-06-30 | 2017-01-05 | Vmware, Inc. | Dynamic virtual machine network policy for ingress optimization |
US20170005988A1 (en) | 2015-06-30 | 2017-01-05 | Nicira, Inc. | Global objects for federated firewall rule management |
US20170005920A1 (en) | 2015-07-01 | 2017-01-05 | Cisco Technology, Inc. | Forwarding packets with encapsulated service chain headers |
US20180198705A1 (en) | 2015-07-02 | 2018-07-12 | Zte Corporation | Method and apparatus for implementing service function chain |
US20170019331A1 (en) | 2015-07-13 | 2017-01-19 | Futurewei Technologies, Inc. | Internet Control Message Protocol Enhancement for Traffic Carried by a Tunnel over Internet Protocol Networks |
US20170019303A1 (en) | 2015-07-14 | 2017-01-19 | Microsoft Technology Licensing, Llc | Service Chains for Network Services |
US20170019329A1 (en) | 2015-07-15 | 2017-01-19 | Argela-USA, Inc. | Method for forwarding rule hopping based secure communication |
US20170026417A1 (en) | 2015-07-23 | 2017-01-26 | Cisco Technology, Inc. | Systems, methods, and devices for smart mapping and vpn policy enforcement |
US20170033939A1 (en) | 2015-07-28 | 2017-02-02 | Ciena Corporation | Multicast systems and methods for segment routing |
US20170063683A1 (en) | 2015-08-28 | 2017-03-02 | Nicira, Inc. | Traffic forwarding between geographically dispersed sites |
US20170064749A1 (en) | 2015-08-28 | 2017-03-02 | Nicira, Inc. | Associating Service Tags with Remote Data Message Flows Based on Remote Device Management Attributes |
US10397275B2 (en) | 2015-08-28 | 2019-08-27 | Nicira, Inc. | Creating and using remote device management attribute rule data store |
US20170064048A1 (en) | 2015-08-28 | 2017-03-02 | Nicira, Inc. | Packet Data Restoration for Flow-Based Forwarding Element |
US20170063928A1 (en) | 2015-08-28 | 2017-03-02 | Nicira, Inc. | Defining Network Rules Based on Remote Device Management Attributes |
US20180191600A1 (en) | 2015-08-31 | 2018-07-05 | Huawei Technologies Co., Ltd. | Redirection of service or device discovery messages in software-defined networks |
US20170078961A1 (en) | 2015-09-10 | 2017-03-16 | Qualcomm Incorporated | Smart co-processor for optimizing service discovery power consumption in wireless service platforms |
US20170078176A1 (en) | 2015-09-11 | 2017-03-16 | Telefonaktiebolaget L M Ericsson (Publ) | Method and system for delay measurement of a traffic flow in a software-defined networking (sdn) system |
US20180205637A1 (en) | 2015-09-14 | 2018-07-19 | Huawei Technologies Co., Ltd. | Method for obtaining information about service chain in cloud computing system and apparatus |
US20170093698A1 (en) | 2015-09-30 | 2017-03-30 | Huawei Technologies Co., Ltd. | Method and apparatus for supporting service function chaining in a communication network |
US20170093758A1 (en) | 2015-09-30 | 2017-03-30 | Nicira, Inc. | Ip aliases in logical networks with hardware switches |
US10853111B1 (en) | 2015-09-30 | 2020-12-01 | Amazon Technologies, Inc. | Virtual machine instance migration feedback |
US20190028384A1 (en) | 2015-10-15 | 2019-01-24 | Cisco Technology, Inc. | Application identifier in service function chain metadata |
US20180248755A1 (en) | 2015-10-28 | 2018-08-30 | Huawei Technologies Co., Ltd. | Control traffic in software defined networks |
US20170126522A1 (en) | 2015-10-30 | 2017-05-04 | Oracle International Corporation | Methods, systems, and computer readable media for remote authentication dial in user service (radius) message loop detection and mitigation |
US20170126497A1 (en) | 2015-10-31 | 2017-05-04 | Nicira, Inc. | Static Route Types for Logical Routers |
US20180248790A1 (en) | 2015-10-31 | 2018-08-30 | Huawei Technologies Co., Ltd. | Route determining method, and corresponding apparatus and system |
US20170126726A1 (en) | 2015-11-01 | 2017-05-04 | Nicira, Inc. | Securing a managed forwarding element that operates within a data compute node |
US20170134538A1 (en) | 2015-11-10 | 2017-05-11 | Telefonaktiebolaget L M Ericsson (Publ) | Systems and methods of an enhanced state-aware proxy device |
US20170149582A1 (en) | 2015-11-20 | 2017-05-25 | Oracle International Corporation | Redirecting packets for egress from an autonomous system using tenant specific routing and forwarding tables |
US9860079B2 (en) | 2015-11-20 | 2018-01-02 | Oracle International Corporation | Redirecting packets for egress from an autonomous system using tenant specific routing and forwarding tables |
US20170149675A1 (en) | 2015-11-25 | 2017-05-25 | Huawei Technologies Co., Ltd. | Packet retransmission method and apparatus |
US20170147399A1 (en) | 2015-11-25 | 2017-05-25 | International Business Machines Corporation | Policy-based virtual machine selection during an optimization cycle |
US20170163531A1 (en) | 2015-12-04 | 2017-06-08 | Cisco Technology, Inc. | Infrastructure-exclusive service forwarding |
US20170163724A1 (en) | 2015-12-04 | 2017-06-08 | Microsoft Technology Licensing, Llc | State-Aware Load Balancing |
US10084703B2 (en) | 2015-12-04 | 2018-09-25 | Cisco Technology, Inc. | Infrastructure-exclusive service forwarding |
US20170171159A1 (en) | 2015-12-14 | 2017-06-15 | Nicira, Inc. | Packet tagging for improved guest system security |
US20170180240A1 (en) | 2015-12-16 | 2017-06-22 | Telefonaktiebolaget Lm Ericsson (Publ) | Openflow configured horizontally split hybrid sdn nodes |
US20180302242A1 (en) | 2015-12-31 | 2018-10-18 | Huawei Technologies Co., Ltd. | Packet processing method, related apparatus, and nvo3 network system |
US20170195255A1 (en) | 2015-12-31 | 2017-07-06 | Fortinet, Inc. | Packet routing using a software-defined networking (sdn) switch |
US20170208000A1 (en) | 2016-01-15 | 2017-07-20 | Cisco Technology, Inc. | Leaking routes in a service chain |
US20170208011A1 (en) | 2016-01-19 | 2017-07-20 | Cisco Technology, Inc. | System and method for hosting mobile packet core and value-added services using a software defined network and service chains |
US20170214627A1 (en) | 2016-01-21 | 2017-07-27 | Futurewei Technologies, Inc. | Distributed Load Balancing for Network Service Function Chaining |
US20170220306A1 (en) | 2016-02-03 | 2017-08-03 | Google Inc. | Systems and methods for automatic content verification |
US20170230333A1 (en) | 2016-02-08 | 2017-08-10 | Cryptzone North America, Inc. | Protecting network devices by a firewall |
US20170230467A1 (en) | 2016-02-09 | 2017-08-10 | Cisco Technology, Inc. | Adding cloud service provider, could service, and cloud tenant awareness to network service chains |
US20170237656A1 (en) | 2016-02-12 | 2017-08-17 | Huawei Technologies Co., Ltd. | Method and apparatus for service function forwarding in a service domain |
US20190028577A1 (en) | 2016-02-26 | 2019-01-24 | Telefonaktiebolaget Lm Ericsson (Publ) | Dynamic re-route in a redundant system of a packet network |
US20170251065A1 (en) | 2016-02-29 | 2017-08-31 | Cisco Technology, Inc. | System and Method for Data Plane Signaled Packet Capture in a Service Function Chaining Network |
CN107204941A (en) | 2016-03-18 | 2017-09-26 | 中兴通讯股份有限公司 | The method and apparatus that a kind of flexible Ethernet path is set up |
US10812378B2 (en) | 2016-03-24 | 2020-10-20 | Cisco Technology, Inc. | System and method for improved service chaining |
US10187306B2 (en) | 2016-03-24 | 2019-01-22 | Cisco Technology, Inc. | System and method for improved service chaining |
US20170295021A1 (en) | 2016-04-07 | 2017-10-12 | Telefonica, S.A. | Method to assure correct data packet traversal through a particular path of a network |
US20170295100A1 (en) | 2016-04-12 | 2017-10-12 | Nicira, Inc. | Virtual tunnel endpoints for congestion-aware load balancing |
US20170310611A1 (en) | 2016-04-26 | 2017-10-26 | Cisco Technology, Inc. | System and method for automated rendering of service chaining |
US20170317926A1 (en) | 2016-04-27 | 2017-11-02 | Cisco Technology, Inc. | Generating packets in a reverse direction of a service function chain |
US20170317954A1 (en) | 2016-04-28 | 2017-11-02 | Nicira, Inc. | Automatic configuration of logical routers on edge nodes |
US20170317936A1 (en) | 2016-04-28 | 2017-11-02 | Cisco Technology, Inc. | Selective steering network traffic to virtual service(s) using policy |
US20170317887A1 (en) | 2016-04-29 | 2017-11-02 | Deutsche Telekom Ag | Versioning system for network states in a software-defined network |
US20190116063A1 (en) | 2016-04-29 | 2019-04-18 | Hewlett Packard Enterprise Development Lp | Transforming a service packet from a first domain to a second domain |
US20170317969A1 (en) | 2016-04-29 | 2017-11-02 | Nicira, Inc. | Implementing logical dhcp servers in logical networks |
US20170318097A1 (en) | 2016-04-29 | 2017-11-02 | Hewlett Packard Enterprise Development Lp | Virtualized network function placements |
US20170324651A1 (en) | 2016-05-09 | 2017-11-09 | Cisco Technology, Inc. | Traceroute to return aggregated statistics in service chains |
US20170331672A1 (en) | 2016-05-11 | 2017-11-16 | Hewlett Packard Enterprise Development Lp | Filter tables for management functions |
US20170353387A1 (en) | 2016-06-07 | 2017-12-07 | Electronics And Telecommunications Research Institute | Distributed service function forwarding system |
US10284390B2 (en) | 2016-06-08 | 2019-05-07 | Cisco Technology, Inc. | Techniques for efficient service chain analytics |
US20170366605A1 (en) | 2016-06-16 | 2017-12-21 | Alcatel-Lucent Usa Inc. | Providing data plane services for applications |
US20170364794A1 (en) | 2016-06-20 | 2017-12-21 | Telefonaktiebolaget Lm Ericsson (Publ) | Method for classifying the payload of encrypted traffic flows |
US20170373990A1 (en) | 2016-06-23 | 2017-12-28 | Cisco Technology, Inc. | Transmitting network overlay information in a service function chain |
US10547508B1 (en) | 2016-06-29 | 2020-01-28 | Juniper Networks, Inc. | Network services using pools of pre-configured virtualized network functions and service chains |
US20180006935A1 (en) | 2016-06-30 | 2018-01-04 | Juniper Networks, Inc. | Auto discovery and auto scaling of services in software-defined network environment |
US20180004954A1 (en) | 2016-06-30 | 2018-01-04 | Amazon Technologies, Inc. | Secure booting of virtualization managers |
US11075839B2 (en) | 2016-07-01 | 2021-07-27 | Huawei Technologies Co., Ltd. | Method, apparatus, and system for forwarding packet in service function chaining SFC |
US20190140950A1 (en) | 2016-07-01 | 2019-05-09 | Huawei Technologies Co., Ltd. | Method, apparatus, and system for forwarding packet in service function chaining sfc |
US20190140947A1 (en) | 2016-07-01 | 2019-05-09 | Huawei Technologies Co., Ltd. | Service Function Chaining SFC-Based Packet Forwarding Method, Apparatus, and System |
US11026047B2 (en) | 2016-07-21 | 2021-06-01 | International Business Machines Corporation | Associating multiple user devices with a single user |
US20180026911A1 (en) | 2016-07-25 | 2018-01-25 | Cisco Technology, Inc. | System and method for providing a resource usage advertising framework for sfc-based workloads |
US20190166045A1 (en) | 2016-07-27 | 2019-05-30 | Zte Corporation | Packet forwarding method and device |
US20190124096A1 (en) | 2016-07-29 | 2019-04-25 | ShieldX Networks, Inc. | Channel data encapsulation system and method for use with client-server data channels |
US20180041524A1 (en) | 2016-08-02 | 2018-02-08 | Cisco Technology, Inc. | Steering of cloned traffic in a service function chain |
US20180041425A1 (en) | 2016-08-05 | 2018-02-08 | Huawei Technologies Co., Ltd. | Service-based traffic forwarding in virtual networks |
US20190268384A1 (en) | 2016-08-05 | 2019-08-29 | Alcatel Lucent | Security-on-demand architecture |
US20180041470A1 (en) | 2016-08-08 | 2018-02-08 | Talari Networks Incorporated | Applications and integrated firewall design in an adaptive private network (apn) |
US20180247082A1 (en) | 2016-08-11 | 2018-08-30 | Intel Corporation | Secure Public Cloud with Protected Guest-Verified Host Control |
US20220019698A1 (en) | 2016-08-11 | 2022-01-20 | Intel Corporation | Secure Public Cloud with Protected Guest-Verified Host Control |
US20190173778A1 (en) | 2016-08-26 | 2019-06-06 | Telefonaktiebolaget Lm Ericsson (Publ) | Improving sf proxy performance in sdn networks |
US20180063087A1 (en) | 2016-08-27 | 2018-03-01 | Nicira, Inc. | Managed forwarding element executing in separate namespace of public cloud data compute node than workload application |
CA3034809A1 (en) | 2016-08-27 | 2018-03-08 | Nicira, Inc. | Extension of network control system into public cloud |
US20180063018A1 (en) | 2016-08-30 | 2018-03-01 | Cisco Technology, Inc. | System and method for managing chained services in a network environment |
US20180091420A1 (en) | 2016-09-26 | 2018-03-29 | Juniper Networks, Inc. | Distributing service function chain data and service function instance data in a network |
US20190222538A1 (en) | 2016-09-30 | 2019-07-18 | Huawei Technologies Co., Ltd. | Packet Processing Method, Computing Device, and Packet Processing Apparatus |
US10938668B1 (en) | 2016-09-30 | 2021-03-02 | Amazon Technologies, Inc. | Safe deployment using versioned hash rings |
US20180102965A1 (en) | 2016-10-07 | 2018-04-12 | Alcatel-Lucent Usa Inc. | Unicast branching based multicast |
US20180123950A1 (en) | 2016-11-03 | 2018-05-03 | Parallel Wireless, Inc. | Traffic Shaping and End-to-End Prioritization |
US20180124061A1 (en) | 2016-11-03 | 2018-05-03 | Nicira, Inc. | Performing services on a host |
US11055273B1 (en) | 2016-11-04 | 2021-07-06 | Amazon Technologies, Inc. | Software container event monitoring systems |
US20180139098A1 (en) | 2016-11-14 | 2018-05-17 | Futurewei Technologies, Inc. | Integrating physical and virtual network functions in a service-chained network environment |
US20180145899A1 (en) | 2016-11-22 | 2018-05-24 | Gigamon Inc. | Dynamic Service Chaining and Late Binding |
US20180159733A1 (en) | 2016-12-06 | 2018-06-07 | Nicira, Inc. | Performing context-rich attribute-based services on a host |
US20180159943A1 (en) | 2016-12-06 | 2018-06-07 | Nicira, Inc. | Performing context-rich attribute-based services on a host |
US20180159801A1 (en) | 2016-12-07 | 2018-06-07 | Nicira, Inc. | Service function chain (sfc) data communications with sfc data in virtual local area network identifier (vlan id) data fields |
US20180213040A1 (en) | 2016-12-15 | 2018-07-26 | Arm Ip Limited | Enabling Communications Between Devices |
US10623309B1 (en) | 2016-12-19 | 2020-04-14 | International Business Machines Corporation | Rule processing of packets |
US20180176177A1 (en) | 2016-12-20 | 2018-06-21 | Thomson Licensing | Method for managing service chaining at a network equipment, corresponding network equipment |
US10212071B2 (en) | 2016-12-21 | 2019-02-19 | Nicira, Inc. | Bypassing a load balancer in a return path of network traffic |
US20200364074A1 (en) | 2016-12-22 | 2020-11-19 | Nicira, Inc. | Collecting and processing contextual attributes on a host |
US20180183764A1 (en) | 2016-12-22 | 2018-06-28 | Nicira, Inc. | Collecting and processing contextual attributes on a host |
US20180198791A1 (en) | 2017-01-12 | 2018-07-12 | Zscaler, Inc. | Systems and methods for cloud-based service function chaining using security assertion markup language (saml) assertion |
US20180203736A1 (en) | 2017-01-13 | 2018-07-19 | Red Hat, Inc. | Affinity based hierarchical container scheduling |
US20180219762A1 (en) | 2017-02-02 | 2018-08-02 | Fujitsu Limited | Seamless service function chaining across domains |
US20180227216A1 (en) | 2017-02-06 | 2018-08-09 | Silver Peak Systems, Inc. | Multi-level Learning For Classifying Traffic Flows From First Packet Data |
US20180234360A1 (en) | 2017-02-16 | 2018-08-16 | Netscout Systems, Inc | Flow and time based reassembly of fragmented packets by ip protocol analyzers |
US20180278530A1 (en) | 2017-03-24 | 2018-09-27 | Intel Corporation | Load balancing systems, devices, and methods |
US20180288129A1 (en) | 2017-03-29 | 2018-10-04 | Ca, Inc. | Introspection driven monitoring of multi-container applications |
US20180295036A1 (en) | 2017-04-07 | 2018-10-11 | Nicira, Inc. | Application/context-based management of virtual networks using customizable workflows |
US20180295053A1 (en) | 2017-04-10 | 2018-10-11 | Cisco Technology, Inc. | Service-function chaining using extended service-function chain proxy for service-function offload |
US20180309632A1 (en) | 2017-04-20 | 2018-10-25 | Cisco Technology, Inc. | Policy assurance for service chaining |
CN110521169A (en) | 2017-04-20 | 2019-11-29 | 思科技术公司 | Strategy for service chaining guarantees |
US10158573B1 (en) | 2017-05-01 | 2018-12-18 | Barefoot Networks, Inc. | Forwarding element with a data plane load balancer |
US20180337849A1 (en) | 2017-05-16 | 2018-11-22 | Sonus Networks, Inc. | Communications methods, apparatus and systems for providing scalable media services in sdn systems |
US10333822B1 (en) | 2017-05-23 | 2019-06-25 | Cisco Technology, Inc. | Techniques for implementing loose hop service function chains price information |
US20180351874A1 (en) | 2017-05-30 | 2018-12-06 | At&T Intellectual Property I, L.P. | Creating Cross-Service Chains of Virtual Network Functions in a Wide Area Network |
CN107105061A (en) | 2017-05-31 | 2017-08-29 | 北京中电普华信息技术有限公司 | A kind of service registry method and device |
US20180349212A1 (en) | 2017-06-06 | 2018-12-06 | Shuhao Liu | System and method for inter-datacenter communication |
US20190007382A1 (en) | 2017-06-29 | 2019-01-03 | Vmware, Inc. | Ssh key validation in a hyper-converged computing environment |
US20190020684A1 (en) | 2017-07-13 | 2019-01-17 | Nicira, Inc. | Systems and methods for storing a security parameter index in an options field of an encapsulation header |
US20190020580A1 (en) | 2017-07-14 | 2019-01-17 | Nicira, Inc. | Asymmetric network elements sharing an anycast address |
US20190028347A1 (en) | 2017-07-21 | 2019-01-24 | Cisco Technology, Inc. | Service function chain optimization using live testing |
US20190036819A1 (en) | 2017-07-31 | 2019-01-31 | Nicira, Inc. | Use of hypervisor for active-active stateful network service cluster |
US20190068500A1 (en) | 2017-08-27 | 2019-02-28 | Nicira, Inc. | Performing in-line service in public cloud |
US20190089679A1 (en) | 2017-09-17 | 2019-03-21 | Mellanox Technologies, Ltd. | NIC with stateful connection tracking |
US20190097838A1 (en) | 2017-09-26 | 2019-03-28 | Oracle International Corporation | Virtual interface system and method for multi-tenant cloud networking |
US20190102280A1 (en) | 2017-09-30 | 2019-04-04 | Oracle International Corporation | Real-time debugging instances in a deployed container platform |
US10637750B1 (en) | 2017-10-18 | 2020-04-28 | Juniper Networks, Inc. | Dynamically modifying a service chain based on network traffic information |
US20190121961A1 (en) | 2017-10-23 | 2019-04-25 | L3 Technologies, Inc. | Configurable internet isolation and security for laptops and similar devices |
US20190132221A1 (en) | 2017-10-29 | 2019-05-02 | Nicira, Inc. | Service operation chaining |
WO2019084066A1 (en) | 2017-10-29 | 2019-05-02 | Nicira, Inc. | Service operation chaining methods and computer programs |
US20190132220A1 (en) | 2017-10-29 | 2019-05-02 | Nicira, Inc. | Service operation chaining |
US20190140863A1 (en) | 2017-11-06 | 2019-05-09 | Cisco Technology, Inc. | Dataplane signaled bidirectional/symmetric service chain instantiation for efficient load balancing |
US10757077B2 (en) | 2017-11-15 | 2020-08-25 | Nicira, Inc. | Stateful connection policy filtering |
US10708229B2 (en) | 2017-11-15 | 2020-07-07 | Nicira, Inc. | Packet induced revalidation of connection tracker |
US20190149512A1 (en) | 2017-11-15 | 2019-05-16 | Nicira, Inc. | Third-party service chaining using packet encapsulation in a flow-based forwarding element |
US20190149516A1 (en) | 2017-11-15 | 2019-05-16 | Nicira, Inc. | Stateful connection policy filtering |
US20190149518A1 (en) | 2017-11-15 | 2019-05-16 | Nicira, Inc. | Packet induced revalidation of connection tracker |
US10938716B1 (en) | 2017-11-29 | 2021-03-02 | Riverbed Technology, Inc. | Preserving policy with path selection |
US20190173850A1 (en) | 2017-12-04 | 2019-06-06 | Nicira, Inc. | Scaling gateway to gateway traffic using flow hash |
US20190173851A1 (en) | 2017-12-04 | 2019-06-06 | Nicira, Inc. | Scaling gateway to gateway traffic using flow hash |
US20210377160A1 (en) | 2018-01-12 | 2021-12-02 | Telefonaktiebolaget Lm Ericsson (Publ) | Mechanism for control message redirection for sdn control channel failures |
US20190230126A1 (en) | 2018-01-24 | 2019-07-25 | Nicira, Inc. | Flow-based forwarding element configuration |
US20190229937A1 (en) | 2018-01-25 | 2019-07-25 | Juniper Networks, Inc. | Multicast join message processing by multi-homing devices in an ethernet vpn |
US20190238364A1 (en) | 2018-01-26 | 2019-08-01 | Nicira, Inc. | Specifying and utilizing paths through a network |
WO2019147316A1 (en) | 2018-01-26 | 2019-08-01 | Nicira, Inc. | Specifying and utilizing paths through a network |
US20190238363A1 (en) | 2018-01-26 | 2019-08-01 | Nicira, Inc. | Specifying and utilizing paths through a network |
US10659252B2 (en) | 2018-01-26 | 2020-05-19 | Nicira, Inc | Specifying and utilizing paths through a network |
US20200358696A1 (en) | 2018-02-01 | 2020-11-12 | Nokia Solutions And Networks Oy | Method and device for interworking between service function chain domains |
WO2019157955A1 (en) | 2018-02-13 | 2019-08-22 | 华为技术有限公司 | Device access method, related platform and computer storage medium |
WO2019168532A1 (en) | 2018-03-01 | 2019-09-06 | Google Llc | High availability multi-single-tenant services |
US20190286475A1 (en) | 2018-03-14 | 2019-09-19 | Microsoft Technology Licensing, Llc | Opportunistic virtual machine migration |
US20190288915A1 (en) | 2018-03-19 | 2019-09-19 | Secure-24, Llc | Discovery and migration planning techniques optimized by environmental analysis and criticality |
US10728174B2 (en) | 2018-03-27 | 2020-07-28 | Nicira, Inc. | Incorporating layer 2 service between two interfaces of gateway device |
US20190306086A1 (en) | 2018-03-27 | 2019-10-03 | Nicira, Inc. | Incorporating layer 2 service between two interfaces of gateway device |
US20190306036A1 (en) | 2018-03-27 | 2019-10-03 | Nicira, Inc. | Detecting failure of layer 2 service using broadcast messages |
US20190342175A1 (en) | 2018-05-02 | 2019-11-07 | Nicira, Inc. | Application of profile setting groups to logical network entities |
WO2019226327A1 (en) | 2018-05-23 | 2019-11-28 | Microsoft Technology Licensing, Llc | Data platform fabric |
US20190379579A1 (en) | 2018-06-11 | 2019-12-12 | Nicira, Inc. | Providing shared memory for access by multiple network service containers executing on single service machine |
US20190377604A1 (en) | 2018-06-11 | 2019-12-12 | Nuweba Labs Ltd. | Scalable function as a service platform |
US20190379578A1 (en) | 2018-06-11 | 2019-12-12 | Nicira, Inc. | Configuring a compute node to perform services on a host |
US11316900B1 (en) | 2018-06-29 | 2022-04-26 | FireEye Security Holdings Inc. | System and method for automatically prioritizing rules for cyber-threat detection and mitigation |
US20200007388A1 (en) | 2018-06-29 | 2020-01-02 | Cisco Technology, Inc. | Network traffic optimization using in-situ notification system |
US10997177B1 (en) | 2018-07-27 | 2021-05-04 | Workday, Inc. | Distributed real-time partitioned MapReduce for a data fabric |
US10645201B2 (en) | 2018-07-31 | 2020-05-05 | Vmware, Inc. | Packet handling during service virtualized computing instance migration |
US20200059761A1 (en) | 2018-08-17 | 2020-02-20 | Huawei Technologies Co., Ltd. | Systems and methods for enabling private communication within a user equipment group |
US11184397B2 (en) | 2018-08-20 | 2021-11-23 | Vmware, Inc. | Network policy migration to a public cloud |
US20200067828A1 (en) | 2018-08-23 | 2020-02-27 | Agora Lab, Inc. | Large-Scale Real-Time Multimedia Communications |
US20200073739A1 (en) | 2018-08-28 | 2020-03-05 | Amazon Technologies, Inc. | Constraint solver execution service and infrastructure therefor |
WO2020046686A1 (en) | 2018-09-02 | 2020-03-05 | Vmware, Inc. | Service insertion at logical network gateway |
US20200076684A1 (en) | 2018-09-02 | 2020-03-05 | Vmware, Inc. | Service insertion at logical network gateway |
US20200076734A1 (en) | 2018-09-02 | 2020-03-05 | Vmware, Inc. | Redirection of data messages at logical network gateway |
US20200084147A1 (en) | 2018-09-11 | 2020-03-12 | Cisco Technology, Inc. | In-situ passive performance measurement in a network environment |
US20200084141A1 (en) | 2018-09-12 | 2020-03-12 | Corsa Technology Inc. | Methods and systems for network security universal control point |
CN109213573A (en) | 2018-09-14 | 2019-01-15 | 珠海国芯云科技有限公司 | The equipment blocking method and device of virtual desktop based on container |
US10834004B2 (en) | 2018-09-24 | 2020-11-10 | Netsia, Inc. | Path determination method and system for delay-optimized service function chaining |
US20200136960A1 (en) | 2018-10-27 | 2020-04-30 | Cisco Technology, Inc. | Software version aware networking |
US20200145331A1 (en) | 2018-11-02 | 2020-05-07 | Cisco Technology, Inc., A California Corporation | Using In-Band Operations Data to Signal Packet Processing Departures in a Network |
US11398983B2 (en) | 2018-11-04 | 2022-07-26 | Cisco Technology, Inc. | Processing packets by an offload platform adjunct to a packet switching device |
US20200162318A1 (en) | 2018-11-20 | 2020-05-21 | Cisco Technology, Inc. | Seamless automation of network device migration to and from cloud managed systems |
US20200183724A1 (en) | 2018-12-11 | 2020-06-11 | Amazon Technologies, Inc. | Computing service with configurable virtualization control levels and accelerated launches |
US20200195711A1 (en) | 2018-12-17 | 2020-06-18 | At&T Intellectual Property I, L.P. | Model-based load balancing for network data plane |
US20200204492A1 (en) | 2018-12-21 | 2020-06-25 | Juniper Networks, Inc. | Facilitating flow symmetry for service chains in a computer network |
US20200220805A1 (en) | 2019-01-03 | 2020-07-09 | Citrix Systems, Inc. | Method for optimal path selection for data traffic undergoing high processing or queuing delay |
US20200274945A1 (en) | 2019-02-22 | 2020-08-27 | Vmware, Inc. | Service control plane messaging in service data plane |
US20200272500A1 (en) | 2019-02-22 | 2020-08-27 | Vmware, Inc. | Service path generation in load balanced manner |
US20200274769A1 (en) | 2019-02-22 | 2020-08-27 | Vmware, Inc. | Specifying and distributing service chains |
US20200272501A1 (en) | 2019-02-22 | 2020-08-27 | Vmware, Inc. | Specifying service chains |
US20200274757A1 (en) | 2019-02-22 | 2020-08-27 | Vmware, Inc. | Providing services by using multiple service planes |
US20200272493A1 (en) | 2019-02-22 | 2020-08-27 | Vmware, Inc. | Providing services with service vm mobility |
US20200274944A1 (en) | 2019-02-22 | 2020-08-27 | Vmware, Inc. | Specifying service chains |
US20200274778A1 (en) | 2019-02-22 | 2020-08-27 | Vmware, Inc. | Providing services by using service insertion and service transport layers |
US20200272495A1 (en) | 2019-02-22 | 2020-08-27 | Vmware, Inc. | Using service data plane for service control plane messaging |
US20200274810A1 (en) | 2019-02-22 | 2020-08-27 | Vmware, Inc. | Distributed forwarding for performing service chain operations |
US20200274779A1 (en) | 2019-02-22 | 2020-08-27 | Vmware, Inc. | Service proxy operations |
US20200272499A1 (en) | 2019-02-22 | 2020-08-27 | Vmware, Inc. | Creating and distributing service chain descriptions |
US20200274795A1 (en) | 2019-02-22 | 2020-08-27 | Vmware, Inc. | Service control plane messaging in service data plane |
US20200274826A1 (en) | 2019-02-22 | 2020-08-27 | Vmware, Inc. | Providing services with guest vm mobility |
US20200272498A1 (en) | 2019-02-22 | 2020-08-27 | Vmware, Inc. | Distributed forwarding for performing service chain operations |
US20200272494A1 (en) | 2019-02-22 | 2020-08-27 | Vmware, Inc. | Segregated service and forwarding planes |
US20200272497A1 (en) | 2019-02-22 | 2020-08-27 | Vmware, Inc. | Configuring distributed forwarding for performing service chain operations |
US20200272496A1 (en) | 2019-02-22 | 2020-08-27 | Vmware, Inc. | Service rule processing and path selection at the source |
WO2020171937A1 (en) | 2019-02-22 | 2020-08-27 | Vmware, Inc. | Providing services with guest vm mobility |
US20200274808A1 (en) | 2019-02-22 | 2020-08-27 | Vmware, Inc. | Service path selection in load balanced manner |
US20200274809A1 (en) | 2019-02-22 | 2020-08-27 | Vmware, Inc. | Providing services by using service insertion and service transport layers |
US20200274801A1 (en) | 2019-02-22 | 2020-08-27 | Vmware, Inc. | Service path computation for service insertion |
US20200287962A1 (en) | 2019-03-05 | 2020-09-10 | Cisco Technology, Inc. | Load balancing in a distributed system |
US20200344088A1 (en) | 2019-04-29 | 2020-10-29 | Vmware, Inc. | Network interoperability support for non-virtualized entities |
US20200382420A1 (en) | 2019-05-31 | 2020-12-03 | Juniper Networks, Inc. | Inter-network service chaining |
US20200382412A1 (en) | 2019-05-31 | 2020-12-03 | Microsoft Technology Licensing, Llc | Multi-Cast Support for a Virtual Network |
US20200389401A1 (en) | 2019-06-06 | 2020-12-10 | Cisco Technology, Inc. | Conditional composition of serverless network functions using segment routing |
US20210004245A1 (en) | 2019-07-02 | 2021-01-07 | Hewlett Packard Enterprise Development Lp | Deploying service containers in an adapter device |
CN112181632A (en) | 2019-07-02 | 2021-01-05 | 慧与发展有限责任合伙企业 | Deploy the service container in the adapter device |
US20210011816A1 (en) | 2019-07-10 | 2021-01-14 | Commvault Systems, Inc. | Preparing containerized applications for backup using a backup services container in a container-orchestration pod |
US20210011812A1 (en) | 2019-07-10 | 2021-01-14 | Commvault Systems, Inc. | Preparing containerized applications for backup using a backup services container and a backup services container-orchestration pod |
WO2021041440A1 (en) | 2019-08-26 | 2021-03-04 | Microsoft Technology Licensing, Llc | Computer device including nested network interface controller switches |
US20210067439A1 (en) | 2019-08-26 | 2021-03-04 | Vmware, Inc. | Forwarding element with physical and virtual data planes |
US20210073736A1 (en) | 2019-09-10 | 2021-03-11 | Alawi Holdings LLC | Computer implemented system and associated methods for management of workplace incident reporting |
US20210117217A1 (en) | 2019-10-21 | 2021-04-22 | ForgeRock, Inc. | Systems and methods for tuning containers in a high availability environment |
US20210136147A1 (en) | 2019-10-31 | 2021-05-06 | Keysight Technologies, Inc. | Methods, systems and computer readable media for self-replicating cluster appliances |
US11157304B2 (en) | 2019-11-01 | 2021-10-26 | Dell Products L.P. | System for peering container clusters running on different container orchestration systems |
US20210240734A1 (en) | 2020-02-03 | 2021-08-05 | Microstrategy Incorporated | Deployment of container-based computer environments |
US20210266295A1 (en) | 2020-02-25 | 2021-08-26 | Uatc, Llc | Deterministic Container-Based Network Configurations for Autonomous Vehicles |
US20210271565A1 (en) | 2020-03-02 | 2021-09-02 | Commvault Systems, Inc. | Platform-agnostic containerized application data protection |
US20210311758A1 (en) | 2020-04-02 | 2021-10-07 | Vmware, Inc. | Management of a container image registry in a virtualized computer system |
US20210314310A1 (en) | 2020-04-02 | 2021-10-07 | Vmware, Inc. | Secured login management to container image registry in a virtualized computer system |
US20210328913A1 (en) | 2020-04-20 | 2021-10-21 | Cisco Technology, Inc. | Service aware virtual private network for optimized forwarding in cloud native environment |
US20210349767A1 (en) | 2020-05-05 | 2021-11-11 | Red Hat, Inc. | Migrating virtual machines between computing environments |
US20220038310A1 (en) | 2020-07-28 | 2022-02-03 | Vmware, Inc. | Method for providing distributed gateway service at host computer |
US20220060467A1 (en) | 2020-08-24 | 2022-02-24 | Just One Technologies LLC | Systems and methods for phone number certification and verification |
US11528213B2 (en) | 2020-12-30 | 2022-12-13 | Juniper Networks, Inc. | Sharing routes using an in-memory data store in a distributed network system |
US11153190B1 (en) | 2021-01-21 | 2021-10-19 | Zscaler, Inc. | Metric computation for traceroute probes using cached data to prevent a surge on destination servers |
Non-Patent Citations (26)
Title |
---|
Author Unknown, "AppLogic Features," Jul. 2007, 2 pages. 3TERA, Inc. |
Author Unknown, "Datagram," Jun. 22, 2012, 2 pages, retrieved from https://web.archive.org/web/20120622031055/https://en.wikipedia.org/wiki/datagram. |
Author Unknown, "Enabling Service Chaining on Cisco Nexus 1000V Series," Month Unknown, 2012, 25 pages, Cisco. |
Author Unknown, "MPLS," Mar. 3, 2008, 47 pages. |
Author Unknown, "Research on Multi-tenancy Network Technology for Datacenter Network," May 2015, 64 pages, Beijing Jiaotong University. |
Casado, Martin, et al., "Virtualizing the Network Forwarding Plane," Dec. 2010, 6 pages. |
Cianfrani, Antonio, et al., "Translating Traffic Engineering Outcome into Segment Routing Paths: the Encoding Problem," 2016 IEEE Conference on Computer Communications Workshops (Infocom Wkshps): GI 2016: 9th IEEE Global Internet Symposium, Apr. 10-14, 2016, 6 pages, IEEE, San Francisco, CA, USA. |
Dixon, Colin, et al., "An End to the Middle," Proceedings of the 12th Conference on Hot Topics in Operating Systems, May 2009, 5 pages, USENIX Association, Berkeley, CA, USA. |
Dumitriu, Dan Mihai, et al., (U.S. Appl. No. 61/514,990), filed Aug. 4, 2011, 31 pages. |
Greenberg, Albert, et al., "VL2: A Scalable and Flexible Data Center Network," SIGCOMM '09, Aug. 17-21, 2009, 12 pages, ACM, Barcelona, Spain. |
Guichard, J., et al., "Network Service Chaining Problem Statement," Network Working Group, Jun. 13, 2013, 14 pages, Cisco Systems, Inc. |
Halpern, J., et al., "Service Function Chaining (SFC) Architecture," draft-ietf-sfc-architecture-02, Sep. 20, 2014, 26 pages, IETF. |
Joseph, Dilip Anthony, et al., "A Policy-aware Switching Layer for Data Centers," Jun. 24, 2008, 26 pages, Electrical Engineering and Computer Sciences, University of California, Berkeley, CA, USA. |
Karakus, Murat, et al., "Quality of Service (QoS) in Software Defined Networking (SDN): A Survey," Journal of Network and Computer Applications, Dec. 9, 2016, 19 pages, vol. 80, Elsevier, Ltd. |
Kumar, S., et al., "Service Function Chaining Use Cases in Data Centers," draft-ietf-sfc-dc-use-cases-01, Jul. 21, 2014, 23 pages, IETF. |
Li, Qing-Gu, "Network Virtualization of Data Center Security," Information Security and Technology, Oct. 2012, 3 pages. |
Lin, Po-Ching, et al., "Balanced Service Chaining in Software-Defined Networks with Network Function Virtualization," Computer: Research Feature, Nov. 2016, 9 pages, vol. 49, No. 11, IEEE. |
Liu, W., et al., "Service Function Chaining (SFC) Use Cases," draft-liu-sfc-use-cases-02, Feb. 13, 2014, 17 pages, IETF. |
Non-Published Commonly Owned U.S. Appl. No. 16/905,909, filed Jun. 18, 2020, 36 pages, Nicira, Inc. |
Portions of prosecution history of U.S. Appl. No. 14/569,249, Apr. 4, 2016, Jain, Jayant, et al. |
Portions of prosecution history of U.S. Appl. No. 14/569,452, Jun. 14, 2016, Jain, Jayant, et al. |
Salsano, Stefano, et al., "Generalized Virtual Networking: An Enabler for Service Centric Networking and Network Function Virtualization," 2014 16th International Telecommunications Network Strategy and Planning Symposium, Sep. 17-19, 2014, 7 pages, IEEE, Funchal, Portugal. |
Sekar, Vyas, et al., "Design and Implementation of a Consolidated Middlebox Architecture," 9th USENIX Symposium on Networked Systems Design and Implementation, Apr. 25-27, 2012, 14 pages, USENIX, San Jose, CA, USA. |
Sherry, Justine, et al., "Making Middleboxes Someone Else's Problem: Network Processing as a Cloud Service," In Proc. of SIGCOMM '12, Aug. 13-17, 2012, 12 pages, Helsinki, Finland. |
Siasi, N., et al., "Container-Based Service Function Chain Mapping," 2019 SoutheastCon, Apr. 11-14, 2019, 6 pages, IEEE, Huntsville, AL, USA. |
Xiong, Gang, et al., "A Mechanism for Configurable Network Service Chaining and Its Implementation," KSII Transactions on Internet and Information Systems, Aug. 2016, 27 pages, vol. 10, No. 8, KSII. |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US12068961B2 (en) | 2014-09-30 | 2024-08-20 | Nicira, Inc. | Inline load balancing |
US12177067B2 (en) | 2018-09-02 | 2024-12-24 | VMware LLC | Service insertion at logical network gateway |
US12254340B2 (en) | 2019-02-22 | 2025-03-18 | VMware LLC | Providing services with guest VM mobility |
US12132780B2 (en) | 2019-10-30 | 2024-10-29 | VMware LLC | Distributed service chain across multiple clouds |
US12231252B2 (en) | 2020-01-13 | 2025-02-18 | VMware LLC | Service insertion for multicast traffic at boundary |
Also Published As
Publication number | Publication date |
---|---|
US20160094389A1 (en) | 2016-03-31 |
US20160094454A1 (en) | 2016-03-31 |
US9531590B2 (en) | 2016-12-27 |
US20230336413A1 (en) | 2023-10-19 |
US9755898B2 (en) | 2017-09-05 |
US20160094453A1 (en) | 2016-03-31 |
US9825810B2 (en) | 2017-11-21 |
US20160094456A1 (en) | 2016-03-31 |
US9935827B2 (en) | 2018-04-03 |
US20160094455A1 (en) | 2016-03-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20230336413A1 (en) | Method and apparatus for providing a service with a plurality of service nodes | |
US12068961B2 (en) | Inline load balancing | |
US20230052818A1 (en) | Controller driven reconfiguration of a multi-layered application or service model | |
US11405431B2 (en) | Method, apparatus, and system for implementing a content switch |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: NICIRA, INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:JAIN, JAYANT;SENGUPTA, ANIRBAN;PARTHASARATHY, MOHAN;REEL/FRAME:034499/0243 Effective date: 20141210 |
|
STCV | Information on status: appeal procedure |
Free format text: ON APPEAL -- AWAITING DECISION BY THE BOARD OF APPEALS |
|
STCV | Information on status: appeal procedure |
Free format text: BOARD OF APPEALS DECISION RENDERED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STCV | Information on status: appeal procedure |
Free format text: NOTICE OF APPEAL FILED |
|
STCV | Information on status: appeal procedure |
Free format text: NOTICE OF APPEAL FILED |
|
STCV | Information on status: appeal procedure |
Free format text: APPEAL BRIEF (OR SUPPLEMENTAL BRIEF) ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: TC RETURN OF APPEAL |
|
STCV | Information on status: appeal procedure |
Free format text: ON APPEAL -- AWAITING DECISION BY THE BOARD OF APPEALS |
|
STCV | Information on status: appeal procedure |
Free format text: BOARD OF APPEALS DECISION RENDERED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
AS | Assignment |
Owner name: VMWARE LLC, CALIFORNIA Free format text: MERGER;ASSIGNOR:NICIRA, INC.;REEL/FRAME:070187/0487 Effective date: 20240820 |