US20130124702A1 - Method and System For Network Configuration And/Or Provisioning Based On Metadata - Google Patents

Method and System For Network Configuration And/Or Provisioning Based On Metadata Download PDF

Info

Publication number
US20130124702A1
US20130124702A1 US13/733,423 US201313733423A US2013124702A1 US 20130124702 A1 US20130124702 A1 US 20130124702A1 US 201313733423 A US201313733423 A US 201313733423A US 2013124702 A1 US2013124702 A1 US 2013124702A1
Authority
US
United States
Prior art keywords
template
port
virtual machine
profile database
metadata
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US13/733,423
Inventor
Hemal Shah
Uri Elzur
Patricia Ann Thaler
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Avago Technologies International Sales Pte Ltd
Original Assignee
Broadcom Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Broadcom Corp filed Critical Broadcom Corp
Priority to US13/733,423 priority Critical patent/US20130124702A1/en
Publication of US20130124702A1 publication Critical patent/US20130124702A1/en
Assigned to BROADCOM CORPORATION reassignment BROADCOM CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ELZUR, URI, THALER, PATRICIA ANN, SHAH, HEMAL
Assigned to BANK OF AMERICA, N.A., AS COLLATERAL AGENT reassignment BANK OF AMERICA, N.A., AS COLLATERAL AGENT PATENT SECURITY AGREEMENT Assignors: BROADCOM CORPORATION
Assigned to AVAGO TECHNOLOGIES GENERAL IP (SINGAPORE) PTE. LTD. reassignment AVAGO TECHNOLOGIES GENERAL IP (SINGAPORE) PTE. LTD. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BROADCOM CORPORATION
Assigned to BROADCOM CORPORATION reassignment BROADCOM CORPORATION TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENTS Assignors: BANK OF AMERICA, N.A., AS COLLATERAL AGENT
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F15/00Digital computers in general; Data processing equipment in general
    • G06F15/16Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
    • G06F15/177Initialisation or configuration control
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/23Updating
    • G06F17/30345
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/02Standardisation; Integration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45595Network integration; Enabling network access in virtual machine instances

Definitions

  • Certain embodiments of the invention relate to networking. More specifically, certain embodiments of the invention relate to a method and system for network configuration and/or provisioning based on open virtualization format (OVF) metadata.
  • OVF open virtualization format
  • IT management may require performing remote management operations of remote systems to perform inventory, monitoring, control, and/or to determine whether remote systems are up-to-date.
  • management devices and/or consoles may perform such operations as discovering and/or navigating management resources in a network, manipulating and/or administrating management resources, requesting and/or controlling subscribing and/or unsubscribing operations, and executing specific management methods and/or procedures.
  • Management devices and/or consoles may communicate with devices in a network to ensure availability of remote systems, to monitor and/or control remote systems, to validate that systems may be up-to-date, and/or to perform any security patch updates that may be necessary.
  • Ethernet networks are becoming an increasingly popular means of exchanging data of various types and sizes for a variety of applications.
  • Ethernet networks are increasingly being utilized to carry, for example, voice, data, and multimedia. Accordingly more and more devices are being equipped to interface with Ethernet networks.
  • NICs converged network interface controllers
  • NIC network interface controller
  • NICs may provide improved application performance, scalability and server cost of ownership.
  • the unified Ethernet network architecture enabled by NIC may be non-disruptive to existing networking and server infrastructure, and may provide significantly better performance at reduced cost alternatives.
  • a server I/O bottleneck may significantly impact data center application performance and scalability.
  • the network bandwidth and traffic loads for client/server, clustering and storage traffic have outpaced and may continue to consistently outpace CPU performance increases and may result in a growing mismatch of capabilities.
  • a system and/or method is provided for network configuration and/or provisioning based on open virtualization format (OVF) metadata, substantially as shown in and/or described in connection with at least one of the figures, as set forth more completely in the claims.
  • OVF open virtualization format
  • FIG. 1 is a block diagram of an exemplary virtualized platform, in accordance with an embodiment of the invention.
  • FIG. 2 is a block diagram illustrating exemplary network configuration and/or provisioning based on open virtualization format (OVF) metadata, in accordance with an embodiment of the invention.
  • OVF open virtualization format
  • FIG. 3 is a flowchart illustrating exemplary steps for network configuration and/or provisioning based on a uniform resource identifier (URI) in OVF metadata, in accordance with an embodiment of the invention.
  • URI uniform resource identifier
  • FIG. 4 is a flowchart illustrating exemplary steps for network configuration based on including port profile configuration in OVF metadata, in accordance with an embodiment of the invention.
  • FIG. 5 is a flowchart illustrating exemplary steps for network configuration and/or provisioning based on including port profile configuration in OVF metadata when the network is not pre-provisioned with the set of port profiles, in accordance with an embodiment of the invention.
  • Certain embodiments of the invention may be found in a system and/or method for network configuration and/or provisioning based on open virtualization format (OVF) metadata.
  • OVF open virtualization format
  • Various aspects of the invention may enable accessing a set of port profiles for one or more virtual machines from a port profile database based on OVF metadata.
  • One or more virtual machines may be configured, deployed, and/or managed based on the accessed set of port profiles.
  • One or both of a uniform resource identifier (URI) to the profile data base and/or a port profile identification may be included in the OVF metadata to allow a virtual machine (VM) administrator device to access the set of port profiles for the one or more virtual machines from the port profile database.
  • the set of port profiles may be included in the OVF metadata to allow the VM administrator device to access the set of port profiles for the one or more virtual machines from the port profile database.
  • the port profile database may comprise one or more of: unicast MAC addresses, multicast MAC addresses, promiscuous mode configuration, VLANs, for example, permitted VLANs, default VLAN, MAC address and/or VLAN combinations.
  • the port profile database may also comprise one or more of: traffic priority information, for example, permitted priorities, default priority, and/or application to priority mapping.
  • the port profile database may further comprise one or more of: flow control information, for example, XON/XOFF enabled/disabled, priority-based flow control settings, bandwidth settings, for example, minimum or maximum transmit and/or receive bandwidths, allocated bandwidth per traffic priority group, and/or access control lists (ACLs).
  • ACLs access control lists
  • FIG. 1 is a block diagram of an exemplary virtualized platform, in accordance with an embodiment of the invention.
  • a plurality of virtual machines (VMs) VM 1 102 1 , VM 2 102 2 , VM 3 102 3 . . . VM N 102 N , a hypervisor 106 , a physical network interface controller (NIC) 108 , and a network switch 110 .
  • VMs virtual machines
  • VM 1 102 1 VM 1
  • VM 2 102 2 VM 3 102 3 . . . VM N 102 N
  • hypervisor 106 a virtual network interface controller
  • NIC physical network interface controller
  • NIC physical network interface controller
  • network switch 110 a network switch
  • VM 1 102 1 may comprise a vNIC 1 104 1
  • VM 2 102 2 may comprise a vNIC 2 104 2
  • VM 3 102 3 may comprise a vNIC 3 104 3
  • VM N 102 N may comprise a vNIC N 104 N
  • the hypervisor 106 may comprise a virtual Ethernet bridge (VEB) that may be implemented as a virtual switch (vSwitch) 112 .
  • VEB virtual Ethernet bridge
  • vSwitch virtual switch
  • the physical NIC 108 may comprise a VEB that may be implemented as a hardware switch (eSwitch) 114 , a virtual Ethernet port aggregator (VEPA) 116 , a plurality of virtual functions (VFs) 118 1 and 118 2 , and a plurality of physical functions (PFs) 120 1 and 120 2 .
  • eSwitch hardware switch
  • VEPA virtual Ethernet port aggregator
  • VFs virtual functions
  • PFs physical functions
  • the hypervisor 106 may be enabled to operate as a software layer that may enable the plurality of VMs, VM 1 102 1 , VM 2 102 2 , VM 3 102 3 . . . VM N 102 N to share common hardware and implement OS virtualization of hardware resources and/or virtualization of hardware resources in the physical NIC 108 , for example.
  • the hypervisor 106 may also be operable to enable data communication between the VMs, VM 1 102 1 , VM 2 102 2 , VM 3 102 3 . . . VM N 102 N and hardware resources in the physical NIC 108 .
  • the physical NIC 108 may comprise suitable logic, circuitry, interfaces, and/or code that may enable communication of data with a network.
  • the physical NIC 108 may enable level 2 (L2) switching operations, for example.
  • L2 level 2
  • a stateful network interface, for example, routers may be operable to maintain per flow state.
  • the network switch 110 may comprise suitable logic, circuitry, interfaces, and/or code that may enable posting of data for transmission via the physical NIC 108 and posting of data or work requests received via the physical NIC 108 for processing by a host system.
  • the physical NIC 108 may be operable to post data or work requests received from the network switch 110 , and may retrieve data posted by the host for transmission to the network switch 110 .
  • the plurality of VMs, VM 1 102 1 , VM 2 102 2 , VM 3 102 3 . . . VM N 102 N may be operable to enable the running or execution of operations or services such as applications, email server operations, database server operations, and/or exchange server operations, for example.
  • the plurality of vNICs, vNIC 1 104 1 , vNIC 2 104 2 , vNIC 3 104 3 . . . vNIC N 104 N may correspond to or emulate software representations of the physical NIC 108 resources, for example.
  • the virtualization of the physical NIC 108 resources via the plurality of vNICs, vNIC 1 104 1 , vNIC 2 104 2 , vNIC 3 104 3 . . . vNIC N 104 N may enable the hypervisor 106 to provide L2 switching support provided by the physical NIC 108 to the plurality of VMs, VM 1 102 1 , VM 2 102 2 , VM 3 102 3 . . . VM N 102 N .
  • the VEB vSwitch 112 may be implemented in software within the hypervisor 106 , for example.
  • the VEB vSwitch 112 may be operable to support the physical NIC 108 and one or more vNICs, for example, vNIC 2 104 2 and vNIC 3 104 3 .
  • the VEB eSwitch 114 may comprise suitable logic, circuitry, interfaces, and/or code that may enable direct I/O support for one or more vNICs, for example, vNIC 1 104 1 via one or more VFs, for example, VF 1 118 1 .
  • the VEB eSwitch 114 may be operable to allow a VM, for example, VM 1 102 1 to bypass the hypervisor 106 and directly access the physical NIC 108 to send and/or receive packets.
  • the VEB eSwitch 114 may be operable to allow a VM, for example, VM 1 102 1 to access the physical NIC 108 via the hypervisor 106 based on one or more PFs, for example, PF 1 120 1 .
  • the VEB eSwitch 114 may be operable to forward packets based on a MAC address and/or a virtual local area network (VLAN) identifier.
  • VLAN virtual local area network
  • the VEPA 116 may comprise suitable logic, circuitry, interfaces, and/or code that may enable collaboration with an adjacent bridge to provide frame relay services between the plurality of VMs, VM 1 102 1 , VM 2 102 2 , VM 3 102 3 . . . VM N 102 N and an external network.
  • the VEPA 116 may be operable to forward one or more station-originated frames to an adjacent bridge for frame processing and frame relay.
  • the VEPA 116 may be operable to steer one or more frames and replicate multicast and broadcast frames received from the adjacent bridge to the appropriate VM destinations.
  • transmission of the packet may be controlled at least in part by the hypervisor 106 .
  • the hypervisor 106 may be operable to arbitrate access to the physical NIC 108 resources when more than one VM needs to send a packet to the network.
  • the hypervisor 106 may utilize one or more vNICs to indicate to the corresponding VM regarding the current availability of the physical NIC 108 transmission resources as a result of the arbitration.
  • the hypervisor 106 may be operable to coordinate the transmission of packets from the plurality of VMs, VM 1 102 1 , VM 2 102 2 , VM 3 102 3 . . . VM N 102 N by posting the packets in a PCIe bus, for example, in accordance with the results of the arbitration operation.
  • the hypervisor 106 may be operable to determine the media access control (MAC) address associated with the packet in order to transfer the received packet to the appropriate VM.
  • the hypervisor 106 may receive the packets from the PCIe bus, for example, and may demultiplex the packets for transfer to the appropriate VM.
  • the hypervisor 106 may transfer the received packet from a buffer in the hypervisor 106 controlled portion of the host memory to a buffer in the portion of the host memory that corresponds to each of the appropriate VMs, VM 1 102 1 , VM 2 102 2 , VM 3 102 3 . . . VM N 102 N .
  • FIG. 2 is a block diagram illustrating exemplary network configuration and/or provisioning based on open virtualization format (OVF) metadata, in accordance with an embodiment of the invention.
  • OVF open virtualization format
  • FIG. 2 there is shown a plurality of VMs, VM 1 202 1 , VM 2 202 2 , VM 3 202 3 . . . VM N 202 N , a hypervisor 206 , a physical NIC 208 , a network switch 210 , a OVF templates repository 218 , a VM administrator device 220 , a port profile database 222 , and a network administrator device 224 .
  • Each of the VMs may comprise one or more vNICs.
  • VM 1 202 1 may comprise a vNIC 1 204 1
  • VM 2 202 2 may comprise a vNIC 2 204 2
  • VM 3 202 3 may comprise a vNIC 3 204 3
  • VM N 202 N may comprise a vNIC N 204 N
  • the hypervisor 206 may comprise a VEB that may be implemented as a vSwitch 212
  • the physical NIC 208 may comprise a VEB that may be implemented as an eSwitch 214 , a VEPA 216 , a plurality of VFs 218 1 and 218 2 , and a plurality of PFs 220 1 and 220 2 .
  • the plurality of blocks in FIG. 2 may be substantially similar to the plurality of corresponding blocks as described with respect to FIG. 1 , for example.
  • the OVF templates repository 218 may comprise one or more OVF templates for packaging and distribution of software that may be operable to run in one or more of the plurality of VMs, VM 1 202 1 , VM 2 202 2 , VM 3 202 3 . . . VM N 202 N .
  • the port profile database 222 may comprise suitable logic, interfaces, and/or code that may comprise configuration and/or provisioning information relating to network, quality of service (QoS) and/or storage properties of the plurality of VMs, VM 1 202 1 , VM 2 202 2 , VM 3 202 3 . . . VM N 202 N .
  • the port profile database 222 may comprise port profiles for the plurality of VMs based on attributes such as bandwidth allocation, MAC address, VLAN IDs, traffic priorities, flow control information, and/or access control lists (ACLs), for example.
  • the VM administrator device 220 may comprise suitable logic, interfaces, processors, circuitry, and/or code that may be operable to access a set of port profiles for one or more virtual machines (VMs), for example, VM 1 202 1 , VM 2 202 2 , VM 3 202 3 . . . VM N 202 N from the port profile database 222 based on OVF metadata.
  • VMs virtual machines
  • One or more processors and/or circuits in the VM administrator device 220 may be operable to configure, deploy, manage, and/or monitor the one or more VMs, for example, VM 1 202 1 , VM 2 202 2 , VM 3 202 3 . . . VM N 202 N based on the accessed set of port profiles from the port profile database 222 .
  • the network administrator device 224 may comprise suitable logic, interfaces, processors, circuitry, and/or code that may be operable to access a set of port profiles from the port profile database 222 .
  • the network administrator device 224 may be operable to configure, manage, and/or monitor one or more switches, for example, network switch 210 based on the accessed set of port profiles.
  • a VM administrator device 220 may be operable to package an OVF template in the OVF templates repository 218 by including a port profile identifier and/or a uniform resource identifier (URI) to the port profile database 222 in the OVF metadata.
  • the port profile identifier and/or the URI may reside in the global namespace for port profiles in the port profile database 222 .
  • the port profile identifier and/or the URI may be described inside a VirtualSystem element utilizing PortProfileSection, for example.
  • the VM administrator device 220 may be operable to access a set of port profiles from the port profile database 222 based on the URI and/or the port identifier, and read the port profile corresponding to a particular VM, for example, VM 1 202 1 .
  • the VM administrator device 220 may be operable to apply port profile specific configuration to the particular VM, for example, VM 1 202 1 at the time of deployment. Accordingly, an OVF template need not comprise port profile specific metadata and may allow changing port profile configuration parameters in the port profile database 222 without requiring changes to the OVF templates that reference the port profile database 222 .
  • one or more VM administrator devices 220 for different domains may coordinate deployment of VMs, and each domain may translate a port profile URI to domain specific database schema, for example.
  • the URI access may be redirected to an appropriate database schema based on the domain, for example.
  • the port profiles in the port profile database 222 may be represented by an identification number, a URI, and/or a database location in the OVF metadata.
  • the set of port profiles may be included in the OVF metadata, for example, as extensions or attributes.
  • the VM administrator device 220 may be operable to apply port profile specific configuration to the particular VM, for example, VM S 202 1 at the time of deployment based on the set of port profiles included in the OVF metadata, for example.
  • FIG. 3 is a flowchart illustrating exemplary steps for network configuration and/or provisioning based on a uniform resource identifier (URI) in OVF metadata, in accordance with an embodiment of the invention.
  • exemplary steps may begin at step 302 .
  • the VM administrator device 220 may access an OVF template from the OVF templates repository 218 .
  • the VM administrator device 220 may package the OVF template by including in the OVF metadata, one or both of a uniform URI to the port profile database 222 and/or a port profile identification.
  • the OVF templates repository 218 may distribute the packaged OVF template to the VM administrator device 220 .
  • the VM administrator device 220 may access a set of port profiles for a particular VM, for example, VM N 202 N from the port profile database 222 based on the URI and/or port profile identification in the OVF metadata.
  • the network administrator device 224 may access a set of port profiles from the port profile database 222 .
  • the network administrator device 224 may configure the network switch 210 based on the accessed set of port profiles.
  • the network administrator device 224 may manage and/or monitor the network switch 210 .
  • the VM administrator device 220 may configure vSwitch 212 , eSwitch 214 and/or the physical NIC 208 based on the OVF metadata.
  • the VM administrator device 220 may configure and/or deploy the particular VM, for example, VM N 202 N based on the accessed set of port profiles from the port profile database 222 .
  • the VM administrator device 220 may manage and/or monitor the particular VM, for example, VM N 202 N . Control then proceeds to end step 324 .
  • FIG. 4 is a flowchart illustrating exemplary steps for network configuration based on including port profile configuration in OVF metadata, in accordance with an embodiment of the invention.
  • exemplary steps may begin at step 402 .
  • the VM administrator device 220 may access an OVF template from the OVF templates repository 218 .
  • the VM administrator device 220 may access a set of port profiles for a particular VM, for example, VM N 202 N from the port profile database 222 based on the OVF metadata.
  • the VM administrator device 220 may package the OVF template by including the set of port profiles in the OVF metadata.
  • the OVF templates repository 218 may distribute the packaged OVF template to the VM administrator device 220 .
  • the network administrator device 224 may access a set of port profiles from the port profile database 222 .
  • the network administrator device 224 may configure the network switch 210 based on the accessed set of port profiles.
  • the network administrator device 224 may manage and/or monitor the network switch 210 .
  • the VM administrator device 220 may configure vSwitch 212 , eSwitch 214 and/or the physical NIC 208 based on the OVF metadata.
  • the VM administrator device 220 may configure and/or deploy the particular VM, for example, VM N 202 N based on the accessed set of port profiles from the port profile database 222 .
  • the VM administrator device 220 may manage and/or monitor the particular VM, for example, VM N 202 N . Control then proceeds to end step 424 .
  • FIG. 5 is a flowchart illustrating exemplary steps for network configuration and/or provisioning based on including port profile configuration in OVF metadata when the network is not pre-provisioned with the set of port profiles, in accordance with an embodiment of the invention.
  • exemplary steps may begin at step 502 .
  • the VM administrator device 220 may access an OVF template from the OVF templates repository 218 .
  • the VM administrator device 220 may access a set of port profiles for a particular VM, for example, VM N 202 N from the port profile database 222 based on the OVF metadata.
  • the VM administrator device 220 may package the OVF template by including the set of port profiles in the OVF metadata.
  • the OVF templates repository 218 may distribute the packaged OVF template to the VM administrator device 220 .
  • the VM administrator device 220 may pre-associate a VM, for example, VM N 202 N to a network, for example, Ethernet, based on the OVF metadata, if the network is not pre-provisioned with the set of port profiles.
  • the network switch 210 may pre-associate a VM, for example, VM N 202 N to the network.
  • the network switch may access a set of port profiles for the VM, for example, VM N 202 N from the port profile database 222 .
  • the VM administrator device 220 may confirm the pre-association of the VM, for example, VM N 202 N to the network, for example, Ethernet.
  • the VM administrator device 220 may configure vSwitch 212 , eSwitch 214 and/or the physical NIC 208 based on the OVF metadata.
  • the VM administrator device 220 may configure and/or deploy the particular VM, for example, VM N 202 N based on the accessed set of port profiles from the port profile database 222 .
  • the network switch 210 may associate the VM, for example, VM N 202 N to the network.
  • the VM administrator device 220 may manage and/or monitor the particular VM, for example, VM N 202 N . Control then proceeds to end step 528 .
  • a method and system for network configuration and/or provisioning based on OVF metadata may comprise one or more processors and/or circuits for use in a virtual machine (VM) administrator device 220 , which may be operable to access a set of port profiles for one or more virtual machines (VMs), for example, VM 1 202 1 , VM 2 202 2 , VM 3 202 3 . . . VM N 202 N ( FIG. 2 ) from a port profile database 222 ( FIG. 2 ) based on open virtualization format (OVF) metadata.
  • VM virtual machine
  • OVF open virtualization format
  • One or more processors and/or circuits in the VM administrator device 220 may be operable to configure, deploy, manage, and/or monitor the one or more VMs, for example, VM 1 202 1 , VM 2 202 2 , VM 3 202 3 . . . VM N 202 N based on the accessed set of port profiles from the port profile database 222 .
  • One or more processors and/or circuits in the VM administrator device 220 may be operable to package one or more OVF templates in the OVF template repository 218 ( FIG. 2 ) by including in the OVF metadata, one or both of a uniform resource identifier (URI) to the port profile database 222 and/or the port profile identification.
  • URI uniform resource identifier
  • One or more processors and/or circuits in the VM administrator device 220 may be operable to access the set of port profiles for the one or more VMs, for example, VM 1 202 1 , VM 2 202 2 , VM 3 202 3 . . . VM N 202 N from the port profile database 222 based on including in the OVF metadata, one or both of the URI to the port profile database 222 and/or the port profile identification.
  • One or more processors and/or circuits in the VM administrator device 220 may be operable to access the set of port profiles for the one or more VMs, for example, VM 1 202 1 , VM 2 202 2 , VM 3 202 3 . . . VM N 202 N from the port profile database 222 based on including the set of port profiles in the OVF metadata.
  • One or more processors and/or circuits in the VM administrator device 220 may be operable to package one or more OVF templates in the OVF template repository 218 by including the accessed set of port profiles in the OVF metadata.
  • One or more processors and/or circuits in the VM administrator device 220 may be operable to configure one or more of virtual switches, for example, vSwitch 212 ( FIG. 2 ), physical switches, for example, eSwitch 214 ( FIG. 2 ), and/or network interface controllers (NICs), for example, physical NIC 208 ( FIG. 2 ) based on the OVF metadata.
  • One or more processors and/or circuits in the VM administrator device 220 may be operable to pre-associate the one or more VMs, for example, VM 1 202 1 , VM 2 202 2 , VM 3 202 3 . . .
  • VM N 202 N to a network, for example, Ethernet, based on the OVF metadata, if the network is not pre-provisioned with the set of port profiles.
  • One or more processors and/or circuits in the VM administrator device 220 may be operable to confirm the pre-association of the one or more VMs, for example, VM 1 202 1 , VM 2 202 2 , VM 3 202 3 . . . VM N 202 N to the network, for example, Ethernet.
  • the set of port profiles may comprise one or more of networking attributes, storage attributes, quality of service attributes, medium access control (MAC) identification, virtual local area network (VLAN) identification, bandwidth allocation, traffic priorities, flow control information, and/or access control lists (ACLs), for example.
  • MAC medium access control
  • VLAN virtual local area network
  • FIG. 1 may depict a non-transitory computer readable medium and/or storage medium, and/or a non-transitory machine readable medium and/or storage medium, having stored thereon, a machine code and/or a computer program having at least one code section executable by a machine and/or a computer, thereby causing the machine and/or computer to perform the steps as described herein for network configuration and/or provisioning based on open virtualization format (OVF) metadata.
  • OVF open virtualization format
  • the present invention may be realized in hardware or a combination of hardware and software.
  • the present invention may be realized in a centralized fashion in at least one computer system, or in a distributed fashion where different elements may be spread across several interconnected computer systems. Any kind of computer system or other apparatus adapted for carrying out the methods described herein may be suited.
  • a typical combination of hardware and software may be a general-purpose computer system with a computer program that, when being loaded and executed, may control the computer system such that it carries out the methods described herein.
  • the present invention may be realized in hardware that comprises a portion of an integrated circuit that also performs other functions.
  • the present invention may also be embedded in a computer program product, which comprises all the features enabling the implementation of the methods described herein, and which when loaded in a computer system is able to carry out these methods.
  • Computer program in the present context means any expression, in any language, code or notation, of a set of instructions intended to cause a system having an information processing capability to perform a particular function either directly or after either or both of the following: a) conversion to another language, code or notation; b) reproduction in a different material form.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Multimedia (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

Disclosed are various embodiments for configuring a virtual machine. A template for a virtual machine may be generated. The template may include metadata that references data for port profiles for the virtual machine. The template for the virtual machine may be stored in a template repository, and the data for the port profiles may be stored in a port profile database that is separate from the template.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS/INCORPORATION BY REFERENCE
  • This application is a continuation of, claims priority to, and claims benefit of United State application Ser. No. 12/854,333, filed on Aug. 11, 2010, which makes reference to, claims priority to, and claims benefit of U.S. Provisional Application Ser. No. 61/365,137, filed Jul. 16, 2010.
  • FIELD OF THE INVENTION
  • Certain embodiments of the invention relate to networking. More specifically, certain embodiments of the invention relate to a method and system for network configuration and/or provisioning based on open virtualization format (OVF) metadata.
  • BACKGROUND OF THE INVENTION
  • Information Technology (IT) management may require performing remote management operations of remote systems to perform inventory, monitoring, control, and/or to determine whether remote systems are up-to-date. For example, management devices and/or consoles may perform such operations as discovering and/or navigating management resources in a network, manipulating and/or administrating management resources, requesting and/or controlling subscribing and/or unsubscribing operations, and executing specific management methods and/or procedures. Management devices and/or consoles may communicate with devices in a network to ensure availability of remote systems, to monitor and/or control remote systems, to validate that systems may be up-to-date, and/or to perform any security patch updates that may be necessary.
  • With the increasing popularity of electronics such as desktop computers, laptop computers, and handheld devices such as smart phones and PDA's, communication networks, and in particular Ethernet networks, are becoming an increasingly popular means of exchanging data of various types and sizes for a variety of applications. In this regard, Ethernet networks are increasingly being utilized to carry, for example, voice, data, and multimedia. Accordingly more and more devices are being equipped to interface with Ethernet networks.
  • The emergence of converged network interface controllers (CNICs) have provided accelerated client/server, clustering, and/or storage networking, and have enabled the use of unified TCP/IP Ethernet communications. The breadth and importance of server applications that may benefit from network interface controller (NIC) capabilities, together with the emergence of server operating systems interfaces enabling highly integrated network acceleration capabilities, may make NICs a standard feature of, for example, volume server configurations.
  • The deployment of NICs may provide improved application performance, scalability and server cost of ownership. The unified Ethernet network architecture enabled by NIC may be non-disruptive to existing networking and server infrastructure, and may provide significantly better performance at reduced cost alternatives. A server I/O bottleneck may significantly impact data center application performance and scalability. The network bandwidth and traffic loads for client/server, clustering and storage traffic have outpaced and may continue to consistently outpace CPU performance increases and may result in a growing mismatch of capabilities.
  • Further limitations and disadvantages of conventional and traditional approaches will become apparent to one of skill in the art, through comparison of such systems with some aspects of the present invention as set forth in the remainder of the present application with reference to the drawings.
  • BRIEF SUMMARY OF THE INVENTION
  • A system and/or method is provided for network configuration and/or provisioning based on open virtualization format (OVF) metadata, substantially as shown in and/or described in connection with at least one of the figures, as set forth more completely in the claims.
  • These and other features and advantages of the present invention may be appreciated from a review of the following detailed description of the present invention, along with the accompanying figures in which like reference numerals refer to like parts throughout.
  • BRIEF DESCRIPTION OF SEVERAL VIEWS OF THE DRAWINGS
  • FIG. 1 is a block diagram of an exemplary virtualized platform, in accordance with an embodiment of the invention.
  • FIG. 2 is a block diagram illustrating exemplary network configuration and/or provisioning based on open virtualization format (OVF) metadata, in accordance with an embodiment of the invention.
  • FIG. 3 is a flowchart illustrating exemplary steps for network configuration and/or provisioning based on a uniform resource identifier (URI) in OVF metadata, in accordance with an embodiment of the invention.
  • FIG. 4 is a flowchart illustrating exemplary steps for network configuration based on including port profile configuration in OVF metadata, in accordance with an embodiment of the invention.
  • FIG. 5 is a flowchart illustrating exemplary steps for network configuration and/or provisioning based on including port profile configuration in OVF metadata when the network is not pre-provisioned with the set of port profiles, in accordance with an embodiment of the invention.
  • DETAILED DESCRIPTION OF THE INVENTION
  • Certain embodiments of the invention may be found in a system and/or method for network configuration and/or provisioning based on open virtualization format (OVF) metadata. Various aspects of the invention may enable accessing a set of port profiles for one or more virtual machines from a port profile database based on OVF metadata. One or more virtual machines may be configured, deployed, and/or managed based on the accessed set of port profiles. One or both of a uniform resource identifier (URI) to the profile data base and/or a port profile identification may be included in the OVF metadata to allow a virtual machine (VM) administrator device to access the set of port profiles for the one or more virtual machines from the port profile database. Alternatively, the set of port profiles may be included in the OVF metadata to allow the VM administrator device to access the set of port profiles for the one or more virtual machines from the port profile database.
  • The port profile database may comprise one or more of: unicast MAC addresses, multicast MAC addresses, promiscuous mode configuration, VLANs, for example, permitted VLANs, default VLAN, MAC address and/or VLAN combinations. The port profile database may also comprise one or more of: traffic priority information, for example, permitted priorities, default priority, and/or application to priority mapping. The port profile database may further comprise one or more of: flow control information, for example, XON/XOFF enabled/disabled, priority-based flow control settings, bandwidth settings, for example, minimum or maximum transmit and/or receive bandwidths, allocated bandwidth per traffic priority group, and/or access control lists (ACLs).
  • FIG. 1 is a block diagram of an exemplary virtualized platform, in accordance with an embodiment of the invention. Referring to FIG. 1, there is shown a plurality of virtual machines (VMs), VM1 102 1, VM2 102 2, VM3 102 3 . . . VMN 102 N, a hypervisor 106, a physical network interface controller (NIC) 108, and a network switch 110. Each of the VMs may comprise one or more virtual NICs (vNICs). For example, VM1 102 1 may comprise a vNIC1 104 1, VM2 102 2 may comprise a vNIC2 104 2, VM3 102 3 may comprise a vNIC3 104 3, and VMN 102 N may comprise a vNICN 104 N. The hypervisor 106 may comprise a virtual Ethernet bridge (VEB) that may be implemented as a virtual switch (vSwitch) 112. The physical NIC 108 may comprise a VEB that may be implemented as a hardware switch (eSwitch) 114, a virtual Ethernet port aggregator (VEPA) 116, a plurality of virtual functions (VFs) 118 1 and 118 2, and a plurality of physical functions (PFs) 120 1 and 120 2.
  • The hypervisor 106 may be enabled to operate as a software layer that may enable the plurality of VMs, VM1 102 1, VM2 102 2, VM3 102 3 . . . VMN 102 N to share common hardware and implement OS virtualization of hardware resources and/or virtualization of hardware resources in the physical NIC 108, for example. The hypervisor 106 may also be operable to enable data communication between the VMs, VM1 102 1, VM2 102 2, VM3 102 3 . . . VMN 102 N and hardware resources in the physical NIC 108.
  • The physical NIC 108 may comprise suitable logic, circuitry, interfaces, and/or code that may enable communication of data with a network. The physical NIC 108 may enable level 2 (L2) switching operations, for example. A stateful network interface, for example, routers may be operable to maintain per flow state.
  • The network switch 110 may comprise suitable logic, circuitry, interfaces, and/or code that may enable posting of data for transmission via the physical NIC 108 and posting of data or work requests received via the physical NIC 108 for processing by a host system. In this regard, the physical NIC 108 may be operable to post data or work requests received from the network switch 110, and may retrieve data posted by the host for transmission to the network switch 110.
  • The plurality of VMs, VM1 102 1, VM2 102 2, VM3 102 3 . . . VMN 102 N may be operable to enable the running or execution of operations or services such as applications, email server operations, database server operations, and/or exchange server operations, for example. The plurality of vNICs, vNIC1 104 1, vNIC2 104 2, vNIC3 104 3 . . . vNICN 104 N may correspond to or emulate software representations of the physical NIC 108 resources, for example. The virtualization of the physical NIC 108 resources via the plurality of vNICs, vNIC1 104 1, vNIC2 104 2, vNIC3 104 3 . . . vNICN 104 N may enable the hypervisor 106 to provide L2 switching support provided by the physical NIC 108 to the plurality of VMs, VM1 102 1, VM2 102 2, VM3 102 3 . . . VMN 102 N.
  • The VEB vSwitch 112 may be implemented in software within the hypervisor 106, for example. The VEB vSwitch 112 may be operable to support the physical NIC 108 and one or more vNICs, for example, vNIC2 104 2 and vNIC3 104 3.
  • The VEB eSwitch 114 may comprise suitable logic, circuitry, interfaces, and/or code that may enable direct I/O support for one or more vNICs, for example, vNIC1 104 1 via one or more VFs, for example, VF1 118 1. The VEB eSwitch 114 may be operable to allow a VM, for example, VM1 102 1 to bypass the hypervisor 106 and directly access the physical NIC 108 to send and/or receive packets. The VEB eSwitch 114 may be operable to allow a VM, for example, VM1 102 1 to access the physical NIC 108 via the hypervisor 106 based on one or more PFs, for example, PF1 120 1. The VEB eSwitch 114 may be operable to forward packets based on a MAC address and/or a virtual local area network (VLAN) identifier.
  • The VEPA 116 may comprise suitable logic, circuitry, interfaces, and/or code that may enable collaboration with an adjacent bridge to provide frame relay services between the plurality of VMs, VM1 102 1, VM2 102 2, VM3 102 3 . . . VMN 102 N and an external network. The VEPA 116 may be operable to forward one or more station-originated frames to an adjacent bridge for frame processing and frame relay. The VEPA 116 may be operable to steer one or more frames and replicate multicast and broadcast frames received from the adjacent bridge to the appropriate VM destinations.
  • In operation, when a VM needs to send a packet to the network, transmission of the packet may be controlled at least in part by the hypervisor 106. The hypervisor 106 may be operable to arbitrate access to the physical NIC 108 resources when more than one VM needs to send a packet to the network. In this regard, the hypervisor 106 may utilize one or more vNICs to indicate to the corresponding VM regarding the current availability of the physical NIC 108 transmission resources as a result of the arbitration. The hypervisor 106 may be operable to coordinate the transmission of packets from the plurality of VMs, VM1 102 1, VM2 102 2, VM3 102 3 . . . VMN 102 N by posting the packets in a PCIe bus, for example, in accordance with the results of the arbitration operation.
  • When receiving packets from the network switch 110 via the physical NIC 108, the hypervisor 106 may be operable to determine the media access control (MAC) address associated with the packet in order to transfer the received packet to the appropriate VM. In this regard, the hypervisor 106 may receive the packets from the PCIe bus, for example, and may demultiplex the packets for transfer to the appropriate VM. After a determination of the MAC address and appropriate VM for a received packet, the hypervisor 106 may transfer the received packet from a buffer in the hypervisor 106 controlled portion of the host memory to a buffer in the portion of the host memory that corresponds to each of the appropriate VMs, VM1 102 1, VM2 102 2, VM3 102 3 . . . VMN 102 N.
  • FIG. 2 is a block diagram illustrating exemplary network configuration and/or provisioning based on open virtualization format (OVF) metadata, in accordance with an embodiment of the invention. Referring to FIG. 2, there is shown a plurality of VMs, VM1 202 1, VM2 202 2, VM3 202 3 . . . VMN 202 N, a hypervisor 206, a physical NIC 208, a network switch 210, a OVF templates repository 218, a VM administrator device 220, a port profile database 222, and a network administrator device 224. Each of the VMs may comprise one or more vNICs. For example, VM1 202 1 may comprise a vNIC1 204 1, VM2 202 2 may comprise a vNIC2 204 2, VM3 202 3 may comprise a vNIC3 204 3, and VMN 202 N may comprise a vNICN 204 N. The hypervisor 206 may comprise a VEB that may be implemented as a vSwitch 212. The physical NIC 208 may comprise a VEB that may be implemented as an eSwitch 214, a VEPA 216, a plurality of VFs 218 1 and 218 2, and a plurality of PFs 220 1 and 220 2. The plurality of blocks in FIG. 2 may be substantially similar to the plurality of corresponding blocks as described with respect to FIG. 1, for example.
  • The OVF templates repository 218 may comprise one or more OVF templates for packaging and distribution of software that may be operable to run in one or more of the plurality of VMs, VM1 202 1, VM2 202 2, VM3 202 3 . . . VMN 202 N.
  • The port profile database 222 may comprise suitable logic, interfaces, and/or code that may comprise configuration and/or provisioning information relating to network, quality of service (QoS) and/or storage properties of the plurality of VMs, VM1 202 1, VM2 202 2, VM3 202 3 . . . VMN 202 N. For example, the port profile database 222 may comprise port profiles for the plurality of VMs based on attributes such as bandwidth allocation, MAC address, VLAN IDs, traffic priorities, flow control information, and/or access control lists (ACLs), for example.
  • The VM administrator device 220 may comprise suitable logic, interfaces, processors, circuitry, and/or code that may be operable to access a set of port profiles for one or more virtual machines (VMs), for example, VM1 202 1, VM2 202 2, VM3 202 3 . . . VMN 202 N from the port profile database 222 based on OVF metadata. One or more processors and/or circuits in the VM administrator device 220 may be operable to configure, deploy, manage, and/or monitor the one or more VMs, for example, VM1 202 1, VM2 202 2, VM3 202 3 . . . VMN 202 N based on the accessed set of port profiles from the port profile database 222.
  • The network administrator device 224 may comprise suitable logic, interfaces, processors, circuitry, and/or code that may be operable to access a set of port profiles from the port profile database 222. The network administrator device 224 may be operable to configure, manage, and/or monitor one or more switches, for example, network switch 210 based on the accessed set of port profiles.
  • In operation, a VM administrator device 220 may be operable to package an OVF template in the OVF templates repository 218 by including a port profile identifier and/or a uniform resource identifier (URI) to the port profile database 222 in the OVF metadata. The port profile identifier and/or the URI may reside in the global namespace for port profiles in the port profile database 222. The port profile identifier and/or the URI may be described inside a VirtualSystem element utilizing PortProfileSection, for example.
  • <VirtualSystem ovf:id=“simple-app”>
     <Info>A virtual machine</Info>
     <Name>Simple Appliance</Name>
     <PortProfileSection>
      <evb:PortProfile>
       xs:AnyURI or xs:string
      </evb:PortProfile>
     </PortProfileSection>
    </VirtualSystem>
  • The VM administrator device 220 may be operable to access a set of port profiles from the port profile database 222 based on the URI and/or the port identifier, and read the port profile corresponding to a particular VM, for example, VM1 202 1. The VM administrator device 220 may be operable to apply port profile specific configuration to the particular VM, for example, VM1 202 1 at the time of deployment. Accordingly, an OVF template need not comprise port profile specific metadata and may allow changing port profile configuration parameters in the port profile database 222 without requiring changes to the OVF templates that reference the port profile database 222.
  • In accordance with an embodiment of the invention, one or more VM administrator devices 220 for different domains may coordinate deployment of VMs, and each domain may translate a port profile URI to domain specific database schema, for example. The URI access may be redirected to an appropriate database schema based on the domain, for example. The port profiles in the port profile database 222 may be represented by an identification number, a URI, and/or a database location in the OVF metadata.
  • In accordance with another embodiment of the invention, the set of port profiles may be included in the OVF metadata, for example, as extensions or attributes. The VM administrator device 220 may be operable to apply port profile specific configuration to the particular VM, for example, VMS 202 1 at the time of deployment based on the set of port profiles included in the OVF metadata, for example.
  • <VirtualSystem ovf:id=“simple-app”>
     <Info>A virtual machine</Info>
     <Name>Simple Appliance</Name>
     <PortProfileSection>
      <evb:PortProfile>
       <evb:DCBConfiguration>
        <evb:PFCEnabled> . . . </evb:PFCEnabled>
        <evb:Priority> . . . </evb:Priority>
        <evb:MinBandwidth> . . . </evb:MinBandwidth>
        <evb:MaxBandwidth> . . . </evb:MaxBandwidth>
        . . .
       </evb: DCBConfgiuration>
       <evb:AccessControlList>
       . . .
       </evb:AccessControlList>
      </evb:PortProfile>
     </PortProfileSection>
    </VirtualSystem>
  • FIG. 3 is a flowchart illustrating exemplary steps for network configuration and/or provisioning based on a uniform resource identifier (URI) in OVF metadata, in accordance with an embodiment of the invention. Referring to FIG. 3, exemplary steps may begin at step 302. In step 304, the VM administrator device 220 may access an OVF template from the OVF templates repository 218. In step 306, the VM administrator device 220 may package the OVF template by including in the OVF metadata, one or both of a uniform URI to the port profile database 222 and/or a port profile identification. In step 308, the OVF templates repository 218 may distribute the packaged OVF template to the VM administrator device 220.
  • In step 310, the VM administrator device 220 may access a set of port profiles for a particular VM, for example, VMN 202 N from the port profile database 222 based on the URI and/or port profile identification in the OVF metadata. In step 312, the network administrator device 224 may access a set of port profiles from the port profile database 222. In step 314, the network administrator device 224 may configure the network switch 210 based on the accessed set of port profiles. In step 316, the network administrator device 224 may manage and/or monitor the network switch 210.
  • In step 318, the VM administrator device 220 may configure vSwitch 212, eSwitch 214 and/or the physical NIC 208 based on the OVF metadata. In step 320, the VM administrator device 220 may configure and/or deploy the particular VM, for example, VMN 202 N based on the accessed set of port profiles from the port profile database 222. In step 322, the VM administrator device 220 may manage and/or monitor the particular VM, for example, VMN 202 N. Control then proceeds to end step 324.
  • FIG. 4 is a flowchart illustrating exemplary steps for network configuration based on including port profile configuration in OVF metadata, in accordance with an embodiment of the invention. Referring to FIG. 4, exemplary steps may begin at step 402. In step 404, the VM administrator device 220 may access an OVF template from the OVF templates repository 218. In step 406, the VM administrator device 220 may access a set of port profiles for a particular VM, for example, VMN 202 N from the port profile database 222 based on the OVF metadata. In step 408, the VM administrator device 220 may package the OVF template by including the set of port profiles in the OVF metadata.
  • In step 410, the OVF templates repository 218 may distribute the packaged OVF template to the VM administrator device 220. In step 412, the network administrator device 224 may access a set of port profiles from the port profile database 222. In step 414, the network administrator device 224 may configure the network switch 210 based on the accessed set of port profiles. In step 416, the network administrator device 224 may manage and/or monitor the network switch 210.
  • In step 418, the VM administrator device 220 may configure vSwitch 212, eSwitch 214 and/or the physical NIC 208 based on the OVF metadata. In step 420, the VM administrator device 220 may configure and/or deploy the particular VM, for example, VMN 202 N based on the accessed set of port profiles from the port profile database 222. In step 422, the VM administrator device 220 may manage and/or monitor the particular VM, for example, VMN 202 N. Control then proceeds to end step 424.
  • FIG. 5 is a flowchart illustrating exemplary steps for network configuration and/or provisioning based on including port profile configuration in OVF metadata when the network is not pre-provisioned with the set of port profiles, in accordance with an embodiment of the invention. Referring to FIG. 5, exemplary steps may begin at step 502. In step 504, the VM administrator device 220 may access an OVF template from the OVF templates repository 218. In step 506, the VM administrator device 220 may access a set of port profiles for a particular VM, for example, VMN 202 N from the port profile database 222 based on the OVF metadata. In step 508, the VM administrator device 220 may package the OVF template by including the set of port profiles in the OVF metadata.
  • In step 510, the OVF templates repository 218 may distribute the packaged OVF template to the VM administrator device 220. In step 512, the VM administrator device 220 may pre-associate a VM, for example, VMN 202 N to a network, for example, Ethernet, based on the OVF metadata, if the network is not pre-provisioned with the set of port profiles. In step 514, the network switch 210 may pre-associate a VM, for example, VMN 202 N to the network. In step 516, the network switch may access a set of port profiles for the VM, for example, VMN 202 N from the port profile database 222. In step 518, the VM administrator device 220 may confirm the pre-association of the VM, for example, VMN 202 N to the network, for example, Ethernet.
  • In step 520, the VM administrator device 220 may configure vSwitch 212, eSwitch 214 and/or the physical NIC 208 based on the OVF metadata. In step 522, the VM administrator device 220 may configure and/or deploy the particular VM, for example, VMN 202 N based on the accessed set of port profiles from the port profile database 222. In step 524, the network switch 210 may associate the VM, for example, VMN 202 N to the network. In step 526, the VM administrator device 220 may manage and/or monitor the particular VM, for example, VMN 202 N. Control then proceeds to end step 528.
  • In accordance with an embodiment of the invention, a method and system for network configuration and/or provisioning based on OVF metadata may comprise one or more processors and/or circuits for use in a virtual machine (VM) administrator device 220, which may be operable to access a set of port profiles for one or more virtual machines (VMs), for example, VM1 202 1, VM2 202 2, VM3 202 3 . . . VMN 202 N (FIG. 2) from a port profile database 222 (FIG. 2) based on open virtualization format (OVF) metadata. One or more processors and/or circuits in the VM administrator device 220 may be operable to configure, deploy, manage, and/or monitor the one or more VMs, for example, VM1 202 1, VM2 202 2, VM3 202 3 . . . VMN 202 N based on the accessed set of port profiles from the port profile database 222. One or more processors and/or circuits in the VM administrator device 220 may be operable to package one or more OVF templates in the OVF template repository 218 (FIG. 2) by including in the OVF metadata, one or both of a uniform resource identifier (URI) to the port profile database 222 and/or the port profile identification. One or more processors and/or circuits in the VM administrator device 220 may be operable to access the set of port profiles for the one or more VMs, for example, VM1 202 1, VM2 202 2, VM3 202 3 . . . VMN 202 N from the port profile database 222 based on including in the OVF metadata, one or both of the URI to the port profile database 222 and/or the port profile identification.
  • One or more processors and/or circuits in the VM administrator device 220 may be operable to access the set of port profiles for the one or more VMs, for example, VM1 202 1, VM2 202 2, VM3 202 3 . . . VMN 202 N from the port profile database 222 based on including the set of port profiles in the OVF metadata. One or more processors and/or circuits in the VM administrator device 220 may be operable to package one or more OVF templates in the OVF template repository 218 by including the accessed set of port profiles in the OVF metadata. One or more processors and/or circuits in the VM administrator device 220 may be operable to configure one or more of virtual switches, for example, vSwitch 212 (FIG. 2), physical switches, for example, eSwitch 214 (FIG. 2), and/or network interface controllers (NICs), for example, physical NIC 208 (FIG. 2) based on the OVF metadata. One or more processors and/or circuits in the VM administrator device 220 may be operable to pre-associate the one or more VMs, for example, VM1 202 1, VM2 202 2, VM3 202 3 . . . VMN 202 N to a network, for example, Ethernet, based on the OVF metadata, if the network is not pre-provisioned with the set of port profiles. One or more processors and/or circuits in the VM administrator device 220 may be operable to confirm the pre-association of the one or more VMs, for example, VM1 202 1, VM2 202 2, VM3 202 3 . . . VMN 202 N to the network, for example, Ethernet. The set of port profiles may comprise one or more of networking attributes, storage attributes, quality of service attributes, medium access control (MAC) identification, virtual local area network (VLAN) identification, bandwidth allocation, traffic priorities, flow control information, and/or access control lists (ACLs), for example.
  • Other embodiments of the invention may provide a non-transitory computer readable medium and/or storage medium, and/or a non-transitory machine readable medium and/or storage medium, having stored thereon, a machine code and/or a computer program having at least one code section executable by a machine and/or a computer, thereby causing the machine and/or computer to perform the steps as described herein for network configuration and/or provisioning based on open virtualization format (OVF) metadata.
  • Accordingly, the present invention may be realized in hardware or a combination of hardware and software. The present invention may be realized in a centralized fashion in at least one computer system, or in a distributed fashion where different elements may be spread across several interconnected computer systems. Any kind of computer system or other apparatus adapted for carrying out the methods described herein may be suited. A typical combination of hardware and software may be a general-purpose computer system with a computer program that, when being loaded and executed, may control the computer system such that it carries out the methods described herein. The present invention may be realized in hardware that comprises a portion of an integrated circuit that also performs other functions.
  • The present invention may also be embedded in a computer program product, which comprises all the features enabling the implementation of the methods described herein, and which when loaded in a computer system is able to carry out these methods. Computer program in the present context means any expression, in any language, code or notation, of a set of instructions intended to cause a system having an information processing capability to perform a particular function either directly or after either or both of the following: a) conversion to another language, code or notation; b) reproduction in a different material form.
  • While the present invention has been described with reference to certain embodiments, it will be understood by those skilled in the art that various changes may be made and equivalents may be substituted without departing from the scope of the present invention. In addition, many modifications may be made to adapt a particular situation or material to the teachings of the present invention without departing from its scope. Therefore, it is intended that the present invention not be limited to the particular embodiment disclosed, but that the present invention will include all embodiments falling within the scope of the appended claims.

Claims (20)

What is claimed is:
1. A method, comprising:
generating, using at least one computing device, a template for a virtual machine, the template comprising metadata that references data for a plurality of port profiles for the virtual machine;
storing, using the at least one computing device, the template for the virtual machine in a template repository; and
storing, using the at least one computing device, the data for the port profiles for the virtual machine in a port profile database that is separate from the template.
2. The method of claim 1, wherein the template repository is in a first device, and the port profile database is in a second device that is separate from the first device.
3. The method of claim 1, further comprising storing an updated version of the data for the port profiles in the port profile database.
4. The method of claim 1, further comprising storing an updated version of the data for the port profiles in the port profile database without modifying the template for the virtual machine.
5. The method of claim 1, wherein the metadata comprises an identifier that references the port profile database.
6. The method of claim 1, wherein the metadata comprises a configuration parameter for a virtual switch, a physical switch, a network interface controller, or any combination thereof.
7. The method of claim 1, wherein the port profiles comprise a networking attribute, a storage attribute, a quality of service attribute, a medium access control identification, a virtual local area network identification, a bandwidth allocation, a traffic priority, a flow control attribute, an access control list, or any combination thereof.
8. A system, comprising:
at least one computing device configured to:
obtain a template for a virtual machine from a virtual machine template repository, the template comprising metadata;
obtain data for a plurality of port profiles for the virtual machine from a port profile database using the metadata in the template, the port profile database being separate from the virtual machine template repository; and
configure the virtual machine using the port profiles.
9. The system of claim 8, wherein the template is an open virtualization format template.
10. The system of claim 8, wherein the virtual machine template repository is an open virtualization format templates repository.
11. The system of claim 8, wherein the at least one computing device is configured to:
obtain the template for the virtual machine from a first device; and
obtain the data for the port profiles for the virtual machine from a second device that is separate from the first device.
12. The system of claim 8, wherein the at least one computing device is configured to:
generate the template; and
store the template in the virtual machine template repository.
13. The system of claim 8, further comprising configuring a virtual switch, a physical switch, a network interface controller, or any combination thereof using the metadata.
14. The system of claim 8, wherein the metadata comprises an identifier that references the port profile database.
15. A method, comprising:
generating, using at least one computing device, a template for a virtual machine, the template comprising metadata that references data for a plurality of port profiles;
storing, using the at least one computing device, the data for the port profiles in a port profile database; and
storing, using the at least one computing device, the template in a template repository, the template repository being separate from the port profile database.
16. The method of claim 15, comprising:
storing the data for the port profiles in the port profile database in a first device; and
storing the template in the template repository in a second device that is separate from the first device.
17. The method of claim 15, wherein the template is an open virtualization format template.
18. The method of claim 15, further comprising storing an updated version of the data for the port profiles in the port profile database.
19. The method of claim 15, wherein the metadata comprises an identifier that references the port profile database.
20. The method of claim 15, wherein the metadata comprises a configuration parameter for a virtual switch, a physical switch, a network interface controller, or any combination thereof.
US13/733,423 2010-07-16 2013-01-03 Method and System For Network Configuration And/Or Provisioning Based On Metadata Abandoned US20130124702A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US13/733,423 US20130124702A1 (en) 2010-07-16 2013-01-03 Method and System For Network Configuration And/Or Provisioning Based On Metadata

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US36513710P 2010-07-16 2010-07-16
US12/854,333 US8417800B2 (en) 2010-07-16 2010-08-11 Method and system for network configuration and/or provisioning based on open virtualization format (OVF) metadata
US13/733,423 US20130124702A1 (en) 2010-07-16 2013-01-03 Method and System For Network Configuration And/Or Provisioning Based On Metadata

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US12/854,333 Continuation US8417800B2 (en) 2010-07-16 2010-08-11 Method and system for network configuration and/or provisioning based on open virtualization format (OVF) metadata

Publications (1)

Publication Number Publication Date
US20130124702A1 true US20130124702A1 (en) 2013-05-16

Family

ID=44512504

Family Applications (2)

Application Number Title Priority Date Filing Date
US12/854,333 Active 2030-09-17 US8417800B2 (en) 2010-07-16 2010-08-11 Method and system for network configuration and/or provisioning based on open virtualization format (OVF) metadata
US13/733,423 Abandoned US20130124702A1 (en) 2010-07-16 2013-01-03 Method and System For Network Configuration And/Or Provisioning Based On Metadata

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US12/854,333 Active 2030-09-17 US8417800B2 (en) 2010-07-16 2010-08-11 Method and system for network configuration and/or provisioning based on open virtualization format (OVF) metadata

Country Status (6)

Country Link
US (2) US8417800B2 (en)
EP (1) EP2407879A1 (en)
KR (1) KR101245213B1 (en)
CN (1) CN102340419B (en)
HK (1) HK1166892A1 (en)
TW (1) TWI521437B (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120331180A1 (en) * 2011-06-23 2012-12-27 Microsoft Corporation Failover mechanism
US20130336134A1 (en) * 2012-06-15 2013-12-19 Dell Products L.P. System and methods for open fabric management
US9282119B2 (en) 2012-11-13 2016-03-08 Intel Corporation Policy enforcement in computing environment
US9384025B2 (en) 2013-01-28 2016-07-05 Intel Corporation Traffic and/or workload processing
CN107005495A (en) * 2017-01-20 2017-08-01 华为技术有限公司 Method, network interface card, host device and computer system for forwarding packet
US9935841B2 (en) 2013-01-28 2018-04-03 Intel Corporation Traffic forwarding for processing in network environment
US20190026138A1 (en) * 2017-07-20 2019-01-24 Vmware, Inc. Intelligent deployment of virtual processing instances from ova templates
US20190028341A1 (en) * 2017-07-20 2019-01-24 Vmware, Inc. Mixed mode management
WO2019018782A1 (en) * 2017-07-20 2019-01-24 Vmware, Inc. Methods and apparatus to configure switches of a virtual rack
US20190215200A1 (en) * 2018-01-10 2019-07-11 Viasat, Inc. Methods and Apparatus for Enhancing Virtual Switch Capabilities In A Direct-Access Configured Network Interface Card
US10530678B2 (en) 2017-07-20 2020-01-07 Vmware, Inc Methods and apparatus to optimize packet flow among virtualized servers
US10841235B2 (en) 2017-07-20 2020-11-17 Vmware, Inc Methods and apparatus to optimize memory allocation in response to a storage rebalancing event
US11102063B2 (en) 2017-07-20 2021-08-24 Vmware, Inc. Methods and apparatus to cross configure network resources of software defined data centers
US20220272039A1 (en) * 2019-08-26 2022-08-25 Microsoft Technology Licensing, Llc Computer device including nested network interface controller switches

Families Citing this family (40)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110103396A1 (en) 2009-10-29 2011-05-05 International Business Machines Corporation Selective link aggregation in a virtualized environment
US8953621B2 (en) * 2010-09-10 2015-02-10 Futurewei Technologies, Inc. Specifying priority on a virtual station interface discovery and configuration protocol response
US8819235B2 (en) * 2010-10-20 2014-08-26 International Business Machines Corporation Multi-adapter link aggregation for adapters with hardware based virtual bridges
JP5500270B2 (en) * 2011-01-07 2014-05-21 富士通株式会社 Profile processing program, data relay apparatus, and profile control method
US8793685B2 (en) * 2011-05-13 2014-07-29 International Business Machines Corporation Techniques for operating virtual switches in a virtualized computing environment
US9110703B2 (en) * 2011-06-07 2015-08-18 Hewlett-Packard Development Company, L.P. Virtual machine packet processing
US9497073B2 (en) 2011-06-17 2016-11-15 International Business Machines Corporation Distributed link aggregation group (LAG) for a layer 2 fabric
US20130034015A1 (en) * 2011-08-05 2013-02-07 International Business Machines Corporation Automated network configuration in a dynamic virtual environment
US20130074066A1 (en) * 2011-09-21 2013-03-21 Cisco Technology, Inc. Portable Port Profiles for Virtual Machines in a Virtualized Data Center
US8750129B2 (en) 2011-10-06 2014-06-10 International Business Machines Corporation Credit-based network congestion management
US9065745B2 (en) 2011-10-06 2015-06-23 International Business Machines Corporation Network traffic distribution
CN107508767B (en) * 2012-03-29 2020-10-02 英特尔公司 Techniques for using assigned switch identifications in input/output devices
US8942237B2 (en) 2012-06-20 2015-01-27 International Business Machines Corporation Hypervisor independent network virtualization
US9413695B1 (en) * 2012-09-18 2016-08-09 Chelsio Communications, Inc. Multi-function interconnect having a plurality of switch building blocks
US9548920B2 (en) * 2012-10-15 2017-01-17 Cisco Technology, Inc. System and method for efficient use of flow table space in a network environment
US9069594B1 (en) 2012-12-27 2015-06-30 Emc Corporation Burst buffer appliance comprising multiple virtual machines
US9350558B2 (en) * 2013-01-09 2016-05-24 Dell Products L.P. Systems and methods for providing multicast routing in an overlay network
KR102020049B1 (en) * 2013-01-11 2019-11-04 한국전자통신연구원 Switch and method for supporting QOS of Multi-Tenant Cloud Service and System having the same switch
US9116727B2 (en) 2013-01-15 2015-08-25 Lenovo Enterprise Solutions (Singapore) Pte. Ltd. Scalable network overlay virtualization using conventional virtual switches
JP2014137614A (en) * 2013-01-15 2014-07-28 Fujitsu Ltd Information processing apparatus, device apparatus, and program
US9154376B2 (en) * 2013-01-23 2015-10-06 Cisco Technology, Inc. Multi-node virtual switching system
CN103970581B (en) * 2013-01-24 2017-09-12 国际商业机器公司 The method and apparatus for creating virtual resource bag
US9596182B2 (en) * 2013-02-12 2017-03-14 Adara Networks, Inc. Controlling non-congestion controlled flows
US9569241B2 (en) * 2013-02-22 2017-02-14 Red Hat Israel, Ltd. Sharing devices assigned to virtual machines using runtime exclusion
CN104021027B (en) 2013-02-28 2017-04-12 国际商业机器公司 Method and equipment for providing virtual device
US9529612B2 (en) * 2013-03-18 2016-12-27 International Business Machines Corporation Scalable policy assignment in an edge virtual bridging (EVB) environment
US9535728B2 (en) * 2013-03-18 2017-01-03 International Business Machines Corporation Scalable policy management in an edge virtual bridging (EVB) environment
JP6036506B2 (en) * 2013-04-15 2016-11-30 富士通株式会社 Program and information processing apparatus for specifying fault influence range
US10728171B2 (en) 2013-04-30 2020-07-28 Hewlett Packard Enterprise Development Lp Governing bare metal guests
US10282346B1 (en) * 2014-02-05 2019-05-07 Cisco Technology, Inc. Scalable network device self-configuration in large networks
US9569242B2 (en) * 2014-07-16 2017-02-14 International Business Machines Corporation Implementing dynamic adjustment of I/O bandwidth for virtual machines using a single root I/O virtualization (SRIOV) adapter
US10067800B2 (en) * 2014-11-06 2018-09-04 Vmware, Inc. Peripheral device sharing across virtual machines running on different host computing systems
US9699060B2 (en) * 2014-12-17 2017-07-04 Vmware, Inc. Specializing virtual network device processing to avoid interrupt processing for high packet rate applications
US9559898B2 (en) * 2014-12-19 2017-01-31 Vmware, Inc. Automatically configuring data center networks with neighbor discovery protocol support
US10015132B1 (en) * 2015-03-31 2018-07-03 EMC IP Holding Company LLC Network virtualization for container-based cloud computation using locator-identifier separation protocol
CN107302467A (en) * 2017-08-28 2017-10-27 迈普通信技术股份有限公司 The management method and access device of access device
US11271775B2 (en) * 2018-06-29 2022-03-08 Intel Corporation Technologies for hairpinning network traffic
US11265247B2 (en) * 2019-05-14 2022-03-01 Red Hat, Inc. Downtime reduction with VF MAC filter programming by hypervisors
US20220353348A1 (en) * 2021-04-28 2022-11-03 Arris Enterprises Llc Common-framework controller for multiple device types
WO2023239009A1 (en) * 2022-06-10 2023-12-14 엘지전자 주식회사 Vehicle signal processing device and vehicle communication device comprising same

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2244204A1 (en) * 2009-04-23 2010-10-27 Novell, Inc. Securely hosting workloads in virtual computing environments
US8539484B1 (en) * 2010-05-26 2013-09-17 HotLink Corporation Multi-platform computer system management for virtualized environments
US8612971B1 (en) * 2006-10-17 2013-12-17 Manageiq, Inc. Automatic optimization for virtual systems

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7168063B2 (en) 2003-06-10 2007-01-23 Microsoft Corporation Systems and methods for employing tagged types in a dynamic runtime environment
CN100373869C (en) * 2005-11-18 2008-03-05 华为技术有限公司 Managing method for network equipment
WO2009085977A2 (en) * 2007-12-20 2009-07-09 Virtual Computer, Inc. Virtual computing management systems and methods
CN101668022B (en) * 2009-09-14 2012-09-12 陈博东 Virtual network isolation system established on virtual machine and implementation method thereof
US9244716B2 (en) * 2009-10-30 2016-01-26 Avaya Inc. Generation of open virtualization framework package for solution installations and upgrades

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8612971B1 (en) * 2006-10-17 2013-12-17 Manageiq, Inc. Automatic optimization for virtual systems
EP2244204A1 (en) * 2009-04-23 2010-10-27 Novell, Inc. Securely hosting workloads in virtual computing environments
US8539484B1 (en) * 2010-05-26 2013-09-17 HotLink Corporation Multi-platform computer system management for virtualized environments

Cited By (30)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9753820B2 (en) 2011-06-23 2017-09-05 Microsoft Technology Licensing, Llc Failover mechanism
US8838837B2 (en) * 2011-06-23 2014-09-16 Microsoft Corporation Failover mechanism
US20120331180A1 (en) * 2011-06-23 2012-12-27 Microsoft Corporation Failover mechanism
US20130336134A1 (en) * 2012-06-15 2013-12-19 Dell Products L.P. System and methods for open fabric management
US8958340B2 (en) * 2012-06-15 2015-02-17 Dell Products L.P. System and methods for open fabric management
US9282119B2 (en) 2012-11-13 2016-03-08 Intel Corporation Policy enforcement in computing environment
US9282118B2 (en) 2012-11-13 2016-03-08 Intel Corporation Policy enforcement in computing environment
US9384025B2 (en) 2013-01-28 2016-07-05 Intel Corporation Traffic and/or workload processing
US9935841B2 (en) 2013-01-28 2018-04-03 Intel Corporation Traffic forwarding for processing in network environment
CN107005495A (en) * 2017-01-20 2017-08-01 华为技术有限公司 Method, network interface card, host device and computer system for forwarding packet
WO2018133035A1 (en) * 2017-01-20 2018-07-26 华为技术有限公司 Method, network card, host device and computer system for forwarding data packages
US11805058B2 (en) 2017-01-20 2023-10-31 Huawei Technologies Co., Ltd. Data packet forwarding method, network adapter, host device, and computer system
US11252087B2 (en) 2017-01-20 2022-02-15 Huawei Technologies Co., Ltd. Data packet forwarding method, network adapter, host device, and computer system
US10462056B2 (en) 2017-01-20 2019-10-29 Huawei Technologies Co., Ltd. Data packet forwarding method, network adapter, host device, and computer system
US10841235B2 (en) 2017-07-20 2020-11-17 Vmware, Inc Methods and apparatus to optimize memory allocation in response to a storage rebalancing event
WO2019018782A1 (en) * 2017-07-20 2019-01-24 Vmware, Inc. Methods and apparatus to configure switches of a virtual rack
US10530678B2 (en) 2017-07-20 2020-01-07 Vmware, Inc Methods and apparatus to optimize packet flow among virtualized servers
US11929875B2 (en) 2017-07-20 2024-03-12 VMware LLC Methods and apparatus to cross configure network resources of software defined data centers
US10628197B2 (en) * 2017-07-20 2020-04-21 Vmware, Inc. Intelligent deployment of virtual processing instances from open virtual appliance templates
US10630544B2 (en) * 2017-07-20 2020-04-21 Vmware, Inc. Mixed mode management
US10756967B2 (en) 2017-07-20 2020-08-25 Vmware Inc. Methods and apparatus to configure switches of a virtual rack
US20190026138A1 (en) * 2017-07-20 2019-01-24 Vmware, Inc. Intelligent deployment of virtual processing instances from ova templates
US11018932B2 (en) 2017-07-20 2021-05-25 Vmware, Inc. Mixed mode management
US11102063B2 (en) 2017-07-20 2021-08-24 Vmware, Inc. Methods and apparatus to cross configure network resources of software defined data centers
US20190028341A1 (en) * 2017-07-20 2019-01-24 Vmware, Inc. Mixed mode management
US11658868B2 (en) 2017-07-20 2023-05-23 Vmware, Inc. Mixed mode management
US20190215200A1 (en) * 2018-01-10 2019-07-11 Viasat, Inc. Methods and Apparatus for Enhancing Virtual Switch Capabilities In A Direct-Access Configured Network Interface Card
US10541842B2 (en) * 2018-01-10 2020-01-21 Viasat, Inc. Methods and apparatus for enhancing virtual switch capabilities in a direct-access configured network interface card
US20220272039A1 (en) * 2019-08-26 2022-08-25 Microsoft Technology Licensing, Llc Computer device including nested network interface controller switches
US12058046B2 (en) * 2019-08-26 2024-08-06 Microsoft Technology Licensing, Llc Computer device including nested network interface controller switches

Also Published As

Publication number Publication date
CN102340419A (en) 2012-02-01
TW201220198A (en) 2012-05-16
US8417800B2 (en) 2013-04-09
TWI521437B (en) 2016-02-11
CN102340419B (en) 2015-01-21
HK1166892A1 (en) 2012-11-09
EP2407879A1 (en) 2012-01-18
US20120016970A1 (en) 2012-01-19
KR101245213B1 (en) 2013-03-19
KR20120008474A (en) 2012-01-30

Similar Documents

Publication Publication Date Title
US8417800B2 (en) Method and system for network configuration and/or provisioning based on open virtualization format (OVF) metadata
US10742557B1 (en) Extending scalable policy management to supporting network devices
US11552937B2 (en) Distributed authentication and authorization for rapid scaling of containerized services
US10375015B2 (en) Methods and system for allocating an IP address for an instance in a network function virtualization (NFV) system
US9413554B2 (en) Virtual network overlays
US10824454B2 (en) 5G dynamic slice and network identity instantiation, termination, and access management system and method
US9548890B2 (en) Flexible remote direct memory access resource configuration in a network environment
US11316738B2 (en) Vendor agnostic profile-based modeling of service access endpoints in a multitenant environment
US9294349B2 (en) Host traffic driven network orchestration within data center fabric
US10880248B2 (en) Orchestrator agnostic application container visibility
WO2018028590A1 (en) Packet transmission
US9727386B2 (en) Method and apparatus for network resource virtual partitioning
US10572291B2 (en) Virtual network management
US20100287262A1 (en) Method and system for guaranteed end-to-end data flows in a local networking domain
US20150082301A1 (en) Multi-Tenant Network Stack
US20140359620A1 (en) Associating an Identifier for a Virtual Machine with a Published Network Configuration Service Type
WO2014063129A1 (en) Providing a virtual security appliance architecture to a virtual cloud infrastructure
TWI477110B (en) Method and system for nic-centric hyper-channel distributed network management
US9590855B2 (en) Configuration of transparent interconnection of lots of links (TRILL) protocol enabled device ports in edge virtual bridging (EVB) networks

Legal Events

Date Code Title Description
AS Assignment

Owner name: BROADCOM CORPORATION, CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SHAH, HEMAL;ELZUR, URI;THALER, PATRICIA ANN;SIGNING DATES FROM 20100730 TO 20100806;REEL/FRAME:030430/0369

AS Assignment

Owner name: BANK OF AMERICA, N.A., AS COLLATERAL AGENT, NORTH CAROLINA

Free format text: PATENT SECURITY AGREEMENT;ASSIGNOR:BROADCOM CORPORATION;REEL/FRAME:037806/0001

Effective date: 20160201

Owner name: BANK OF AMERICA, N.A., AS COLLATERAL AGENT, NORTH

Free format text: PATENT SECURITY AGREEMENT;ASSIGNOR:BROADCOM CORPORATION;REEL/FRAME:037806/0001

Effective date: 20160201

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

AS Assignment

Owner name: AVAGO TECHNOLOGIES GENERAL IP (SINGAPORE) PTE. LTD., SINGAPORE

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BROADCOM CORPORATION;REEL/FRAME:041706/0001

Effective date: 20170120

Owner name: AVAGO TECHNOLOGIES GENERAL IP (SINGAPORE) PTE. LTD

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BROADCOM CORPORATION;REEL/FRAME:041706/0001

Effective date: 20170120

AS Assignment

Owner name: BROADCOM CORPORATION, CALIFORNIA

Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:BANK OF AMERICA, N.A., AS COLLATERAL AGENT;REEL/FRAME:041712/0001

Effective date: 20170119