US20150135177A1 - Method and system for virtual port communications - Google Patents

Method and system for virtual port communications Download PDF

Info

Publication number
US20150135177A1
US20150135177A1 US14/319,570 US201414319570A US2015135177A1 US 20150135177 A1 US20150135177 A1 US 20150135177A1 US 201414319570 A US201414319570 A US 201414319570A US 2015135177 A1 US2015135177 A1 US 2015135177A1
Authority
US
United States
Prior art keywords
virtual machine
data frame
host
virtual
tag
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US14/319,570
Inventor
Ilango S. Ganga
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Intel Corp
Original Assignee
Intel Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Intel Corporation filed Critical Intel Corporation
Priority to US14/319,570 priority Critical patent/US20150135177A1/en
Publication of US20150135177A1 publication Critical patent/US20150135177A1/en
Priority to US15/396,505 priority patent/US11716285B2/en
Priority to US15/396,514 priority patent/US11711300B2/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F15/00Digital computers in general; Data processing equipment in general
    • G06F15/16Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/74Address processing for routing
    • H04L45/745Address table lookup; Address filtering
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/66Layer 2 routing, e.g. in Ethernet based MAN's
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45591Monitoring or debugging support
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45595Network integration; Enabling network access in virtual machine instances

Definitions

  • a virtual machine may be or include a framework or environment created by for example a virtual machine monitor (VMM) on a host system.
  • VMM virtual machine monitor
  • a VMM may provide facilities or resources on the host system for an application, firmware or guest operating system that may execute or run in the VM. This execution may require communication with one or more other entities including for example another VM hosted on the same computing platform or a separate entity linked to the host computing platform by a network connection.
  • FIG. 1 is a schematic illustration of a virtual machine host and edge switch system according to an embodiment of the invention.
  • FIGS. 2A and 2B are representative illustrations of a data frame format and a database according to an embodiment of the invention.
  • FIG. 3 is a flowchart of a method for inbound virtual port communications according to an embodiment of the invention.
  • FIG. 4 is a flowchart of a method for outbound virtual port communications according to an embodiment of the invention.
  • Embodiments of the invention may provide a method and system for virtual port communications.
  • a data frame containing a destination identifier in a destination field and a payload, may be modified by inserting a first virtual machine tag therein.
  • the first virtual machine tag may include a first virtual port identifier for identifying a first logical interface of a first virtual machine on a virtual machine host.
  • VM host and edge switch system 100 may include a VM host 110 and an edge switch 120 that may be connected to network 130 .
  • VM host 110 may include or may be, for example, a personal computer, a desktop computer, a mobile computer, a laptop computer, a notebook computer, a terminal, a workstation, a server computer, a personal digital assistant (PDA) device, a network device, or other suitable computing device capable of hosting a VM.
  • PDA personal digital assistant
  • VM host 110 may include for example a virtual machine monitor (VMM) 112 , one or more VMs 111 , a network interface controller (NIC) 113 , a physical port 114 , a memory unit 115 , and a processor 116 in accordance with embodiments of the invention.
  • Edge switch 120 may include for example one or more physical ports 121 and a forwarding database 122 .
  • VM 111 may include, for example, one or more environments able to emulate, simulate, virtualize, execute, directly execute, or invoke a hardware component, a software component, an operating system (OS), an application, a code, a set of instructions, or the like.
  • OS operating system
  • VM 111 may be implemented using hardware components and/or software components.
  • VM 111 may be implemented as a software application executed in a component of or in VM host 110 or as a hardware component integrated within VM host 110 or as a hardware component of some other hardware component of VM host 110 .
  • VM host 110 may be capable of hosting a plurality of VM 111 's which, in some embodiments, may operate substantially in parallel.
  • VM 111 may simulate one or more components of a computing platform with access to a network, another network entity, or other computing device either virtualized or not.
  • VM 111 may have associated with it a unique media access control (MAC) address or other address(es) or name(s) that may uniquely identify VM 111 .
  • the MAC address may be assigned to VM 111 for example in accordance with one more Institute of Electronic and Electrical Engineers (IEEE) standards.
  • IEEE Institute of Electronic and Electrical Engineers
  • VMM 112 may create and manage one or more VM's such as for example VM 111 and allocate resources within for example VM host 110 to support one or more VM 111 's.
  • VMM 112 may be implemented using hardware components and/or software components.
  • VMM 112 may be implemented as a software application executed in a component of or in VM host 110 or as a hardware component integrated within VM host 110 or as a hardware component of some other hardware component of VM host 110 .
  • VMM 112 may also be referred to for example as virtualization software, a hypervisor, or an I/O partition depending on the virtualization architecture or models.
  • VMM 112 may include for example one or more software and/or hardware components able to create VM 111 , set or modify a property of VM 111 , configure VM 111 , monitor the operation of VM 111 , and/or control the operation of VM 111 .
  • VMM 112 may have, for example, system-level privileges, administrator-level privileges, and/or root-level privileges, and may control the operation of VM 112 and/or other components of VM host 110 such as for example NIC 113 .
  • VMM 112 may be able use, directly and/or indirectly, one or more resources or components of VM host 110 such as for example NIC 113 .
  • NIC 113 may operate as a physical layer (e.g., Open System Interconnection (OSI) layer 1) and a data layer (e.g., OSI layer 2) component providing a physical access networking medium and low-level addressing such as for example through MAC addresses.
  • OSI layer 1 Open System Interconnection (OSI) layer 1
  • OSI layer 2 data layer
  • NIC 113 may be implemented as a software application executed in a component of or in VM host 110 or a hardware component integrated within VM host 110 or as a hardware component of some other hardware component of VM host 110 .
  • NIC 113 may also be implemented as for example an intelligent NIC and may include a processor and memory.
  • NIC 113 may for example be virtualized.
  • NIC 113 may operate using for example Ethernet technology and may utilize MAC addressing in accordance with one more IEEE standards.
  • NIC 113 may communicate with devices external to VM host 110 via for example physical port 114 .
  • Physical port 114 may be a component of VM host 110 that may act as an interface between VM host 110 and any external device or network. In some embodiments, physical port 114 may be an internal component of NIC 113 .
  • VM 111 may communicate with other network entities such as for example other VM 111 's hosted on VM host 110 or other computing platforms or network entities outside of VM host 110 . In these instances, VM 111 may communicate with these network entities through NIC 113 .
  • NIC 113 For such network communications, each instance of a VM 111 in VM host 110 may be assigned a logical network interface referred to herein as a “virtual port” controllable by NIC 113 .
  • the number of virtual ports in a NIC 113 may be equal to the number of VM 111 's assigned to NIC 113 .
  • VM host 110 may include more than one VM 111 and more than one NIC 113 with the virtual port assignments of each VM 111 allocated among the number of NIC 113 's. Furthermore, in some embodiments one or more VM 111 's may have more than one logical network interface and correspondingly more than one virtual port for assignment to the one or more NIC(s) 113 present.
  • NIC 113 may present or indicate a number of virtual interfaces or virtual functions to VMM 112 such that each virtual port is associated with a virtual interface.
  • VMM 112 may assign each virtual interface to a VM 111 .
  • a direct assignment or pass through model may be used to assign each virtual interface directly to a VM 111 .
  • an emulated model may be used to assign virtual ports to different VMs 111 or different queues in NIC 113 .
  • each queue or set of queues may be associated with a virtual port. The associated queues may then be assigned to the respective VMs 111 .
  • FIG. 1 shows VMM 112 , VM 111 , and NIC 113 as separate components of VM host 110 , the present invention is not limited in this regard.
  • VMM 112 , VM 111 , and NIC 113 may be implemented, for example, as software components stored within memory 115 of VM host 110 , as a controller and/or processors and/or hardware units integrated within or coupled to one or more processors such as processor 116 within VM host 110 , or the like.
  • Memory 115 may include, for example, one or more memories such as a random access memory (RAM), a read only memory (ROM), a dynamic RAM (DRAM), a synchronous DRAM (SD-RAM), a Flash memory, a volatile memory, a non-volatile memory, a cache memory, a buffer, a short term memory unit, a long term memory unit, or other suitable memory units for storing data and or software components such as VM 111 , VMM 112 , and/or NIC 113 .
  • RAM random access memory
  • ROM read only memory
  • DRAM dynamic RAM
  • SD-RAM synchronous DRAM
  • Processor 116 may be or include for example a central processing unit (CPU), a digital signal processor (DSP), a microprocessor, a controller, a chip, a microchip, or any suitable multi-purpose or specific processor or controller.
  • processor 111 may perform calculation operations or processing operations which may be used in the operation of VM 111 , VMM 112 , and/or NIC 113 .
  • NIC 113 may be connected to edge switch 120 .
  • Edge switch 120 may be a router, switch, routing switch, data center interconnect, or any local area network (LAN), metropolitan area network (MAN), wide area network (WAN), or other network access device for providing an entry point or access to a LAN, MAN, WAN or other such network such as for example network 130 external to VM 111 .
  • network 130 may be a LAN, MAN, WAN or other similar network with communications links between two or more network nodes or stations such as for example VM 111 or VM host 110 .
  • Physical port 121 may be a component of edge switch 120 that may act as an interface between edge switch 120 and any network or external device such as for example VM host 110 and/or network 130 .
  • edge switch 120 may be configured to have one or more virtual ports for each physical port 121 connected to physical port 114 on VM host 110 . Because virtual ports may be configured on both ends of a link such as e.g. between VM host 110 and edge switch 120 , each of the virtual ports on edge switch 120 may be connected logically to a VM 111 via NIC 113 and physical port 114 .
  • edge switch 120 may operate with the same communications technology and protocols as VM host 120 such as for example using Ethernet technology and may also utilize MAC addressing.
  • each virtual port may be assigned a virtual port identifier (VPID).
  • the VPID may facilitate routing of traffic to and from the VM 111 's.
  • the VPID may be associated with an IP or network address even though the VPID may be associated with a MAC address for layer 2 forwarding.
  • a VPID may be inserted into one or more data frames or packets used by VM 111 's for communications with external devices to act as a source and/or destination identifier. These data frames may be carried between VM host 110 and edge switch 120 . In some embodiments, these data frames may be formatted according to a standard format such as for example Ethernet framing Other data frame formats may also be used.
  • a data frame in the format of data frame 201 may include a destination address (DA), a source address (SA), a payload, a VM tag, and a VLAN tag in accordance with IEEE standards 802.3, 802.1, 802.1Q or other such standard, although the invention is not limited in this respect.
  • the Ethernet frame used for communication between VM 111 and edge switch 120 may contain a VM tag without a VLAN tag.
  • the DA and the SA may include the MAC addresses of the corresponding destination and source network entities.
  • the payload and VLAN tag and its associated Ethertype (Etype) field may be referred to as a VLAN tagged packet.
  • the VM tag of the data frame may be inserted into the data frame such as the Ethernet data frame and may include for example an Ethertype field and a VMTAG field.
  • the VM tag may be for example 32 bits long and may include a 16 bit Ethertype field and a 16 bit VMTAG field. Other fields may also be included in the VM tag.
  • the Ethertype field of the VM tag may indicate that the Ethernet frame is VM tagged, while the VMTAG field may carry the VPID of the virtual port associated with the data frame.
  • the VMTAG field may include a source identifier of VM 111
  • the VMTAG field may include a destination identifier.
  • the frame format of data frame 201 may be one scheme for identifying virtual ports when communicating between a NIC 113 and an edge switch 120 , it is to be understood that other framing formats may be used to identify virtual ports to both NIC 113 and edge switch 120 .
  • an alternative special field may be established in an Ethernet frame that carries a unique identifier for a virtual port.
  • NIC 113 and edge switch 120 may each be configured to receive and read data frames that include a VM tag such as that shown in FIG. 2A .
  • VM 111 may send to NIC 113 an Ethernet frame according to for example IEEE 802.1Q.
  • NIC 113 may modify the Ethernet frame by inserting a VM tag corresponding to the virtual port assignment of VM 111 into the Ethernet frame and forward the packet to edge switch 120 via physical port 114 .
  • VMM 112 or VMM 111 may insert the VM tag into the Ethernet frame possibly allowing inclusion of a standard NIC interface.
  • edge switch 120 may remove the VM tag before routing the Ethernet frame to its destination.
  • edge switch may use information in the VM tag in forwarding decisions, applying network access control lists for security, quality of service decisions, and/or for collecting statistics for network management purposes.
  • edge switch 120 may be implemented as a stackable switch, e.g., as multiple switches stacked to operate as a single logical entity. Switches in the stack may forward the frames with the VM tag included until the frame reaches the last switch in the stack which may strip the VM tag before forwarding the frame to the network.
  • edge switch 120 may read a MAC address in the DA field of an Ethernet frame. Edge switch may use this MAC address to determine whether the destination of the data frame is VM 111 by performing an address lookup in forwarding database 122 .
  • Forwarding database 122 may be any tabular database or functionally similar software application known in the art, or another suitable database or table, for storing network addresses and related information in a searchable or retrievable form.
  • forwarding database 202 may be the same as or have the same functions and/or format as forwarding database 122 .
  • each entry in forwarding database 202 may represent a VM 111 hosted in VM host 110 and may be of a format having a number of fields for example as follows:
  • edge switch 120 may modify the data frame by inserting the VM tag corresponding to VM 111 's VPID into the data frame. Edge switch may then forward the modified data frame to NIC 113 via physical port 114 . NIC 113 may remove the VM tag and forward the data frame to VM 111 . Alternatively, in some embodiments VMM 112 may remove the VM tag or VM 111 may be capable of receiving the data frame with the VM tag.
  • edge switch 120 may also forward data frames for communication among virtual entities having virtual ports on VM host 110 such as for example two or more VM 111 's.
  • NIC 113 may forward an outbound data frame from for example one VM 111 to edge switch 120 .
  • edge switch 120 may perform an address lookup on the MAC address in the DA field using forwarding database 122 .
  • edge switch 120 may insert a new VM Tag with the corresponding VPID into the data frame and forward the modified data frame back to NIC 113 which may remove the new VM Tag before forwarding the data frame on to the destination VM 111 .
  • Performing the routing of all traffic to and from VM 111 at edge switch 120 with the invented virtual port communications may have several advantages. Some embodiments of the present invention may eliminate the need for any virtualized switching associated with any virtualized entities such as VM 111 which may not be visible to some or all other parts of a network's infrastructure. Eliminating virtualized switching may enable consistent application of network traffic and security policies among virtual entities such as for example VM 111 and other entities on a network by bringing awareness of the virtual machine infrastructure out to the edge switch. Network and security policies may then be applied in the edge switch independently of the virtualization. In some embodiments, it may be possible to have all switches of a network operate in a single management domain, easing the burden of network management and lowering maintenance costs. Other or different benefits may occur.
  • the virtual port communications may also allow data frame forwarding between virtual ports on the same physical port consistent with the IEED 802.1D Bridging standard (“IEEE Standard for Local and Metropolitan Area Networks, Media Access Control (MAC) Bridges”, Jun. 9, 2004).
  • IEED 802.1D Bridging IEEE Standard for Local and Metropolitan Area Networks, Media Access Control (MAC) Bridges”, Jun. 9, 2004.
  • MAC Media Access Control
  • 802.1D bridging a frame may not be sent back to the port that sent the frame because packet duplication may result.
  • incorporation of virtual port communications technology in a VM host and associated edge switch may avoid this by assigning different virtual ports to different VMs on a given physical port.
  • forwarding database 122 may be configured to enable edge switch 120 to handle multicast and broadcast forwarding to virtual ports.
  • additional fields corresponding to the various VPIDs of for example various VM 111 's may be added to the database entry.
  • a multicast data frame or packet may then be forwarded to all member virtual ports in the same VLAN with the multicast data frame replicated once for every VPID and then sent to the respective member virtual ports and corresponding VMs.
  • removing and forwarding may be repeated for each of the members of a group such as a multicast group.
  • multicasting replication may also be performed at NIC 113 by including a field in the VM tag to indicate that the data frame is a multicast frame.
  • the implementation for broadcast forwarding may be the same as or similar to that for multicast forwarding.
  • FIG. 3 is a flowchart of a method for inbound virtual port communications according to an embodiment of the invention.
  • Embodiments of the method may be used by, or may be implemented by, for example, VM host and edge switch system 100 of FIG. 1 or by other suitable wired and/or wireless communication devices, stations, nodes, systems and/or networks.
  • Embodiments of the method may also use the frame format and forwarding database structure of FIG. 2 or other suitable data frame formats and forwarding database structures.
  • an edge switch such as edge switch 120 configured in accordance with an embodiment of the invention may receive a data frame from for example network 130 .
  • the data frame may be in an Ethernet frame format or other frame format known in the art with a DA field containing a MAC address or other destination identifier.
  • Edge switch 120 may perform in operation 302 a destination lookup of the MAC address in a forwarding database such as database 122 .
  • the edge switch may determine if the MAC address of the DA field matches the MAC address corresponding to a VPID of a virtual machine such as for example VM 111 or other virtual network entity on or internal to VM host 110 .
  • edge switch 120 may modify the data frame by inserting into the data frame a VM tag containing the VPID corresponding to VM 111 (operation 304 ). Edge switch 120 may then forward the modified data frame to NIC 113 of VM host 110 (operation 305 ).
  • NIC 113 may remove the VM tag in the modified data frame received from edge switch 120 , and may forward the data frame on to VM 111 (operation 307 ).
  • Edge switch 120 may forward the data frame on to another network entity on for example network 130 such as for example other non-virtualized hosts or network nodes (operation 308 ).
  • FIG. 4 is a flowchart of a method for outbound virtual port communications according to an embodiment of the invention.
  • Embodiments of the method may be used by, or may be implemented by, for example, VM host and edge switch system 100 of FIG. 1 or by other suitable wired and/or wireless communication devices, stations, nodes, systems and/or networks.
  • Embodiments of the method may also use the frame format and forwarding database structure of FIG. 2 or other suitable data frame formats and forwarding database structures.
  • a VM or virtualized entity on a VM host such as for example VM 111 on VM host 110 forwards a data frame to NIC 113 .
  • NIC 113 may modify the data frame by inserting into the data frame a VM Tag containing a VPID corresponding to the virtual port associated with VM 111 (operation 402 ) and may forward the modified data frame to an edge switch such as for example edge switch 120 (operation 403 ).
  • edge switch 120 may remove the VM Tag in the modified data frame received from NIC 113 .
  • Operations 405 and 406 may proceed as operations 302 and 303 of FIG. 3 in that edge switch 120 may perform a destination lookup of the MAC address in a forwarding database and determine if the MAC address corresponds to a VPID of a virtual machine on VM host 110 .
  • the communication may be internal to VM host 110 . Routing such internal communications through edge switch 120 may allow network policies such as access control or security to be consistently maintained for communications internal to and external to VM host 110 .
  • Edge switch 120 may modify the data frame by inserting into the data frame a VM tag containing the VPID corresponding to the second VM 111 (operation 407 ). Operations 408 - 410 may proceed correspondingly as operations 305 - 307 of FIG. 3 .
  • Edge switch 120 may forward the data frame on to another network entity on for example network 130 (operation 411 ).
  • multiple VM hosts 110 may be connected to edge switch 120 . In these instances, forwarding the data frame to a second VM host 110 may proceed according to operations 305 - 307 .
  • Management of virtual ports may be handled by for example a fixed configuration or an auto configuration such as by advertisement or discovery when a VM host such as VM host 110 is connected to a virtualized edge switch such as edge switch 120 .
  • a VM host When a VM host is first connected to an edge switch, both nodes or ends of the link may send advertisement and/or discovery messages to identify their respective peer capabilities. If both nodes are capable of virtual port communications, then other parameters may be exchanged. These parameters may include for example the number of virtual ports, range for VPID's, and other pertinent virtual port communications parameters. Control messages may be exchanged periodically among nodes. If a change in virtualized network configuration occurs such as for example the addition of a new VM, additional control messages may be sent to for example reconfigure the nodes, configure the new virtual port, etc.
  • all network policies and privileges belonging to a VM such as VM 111 may be preserved when moving the VM from one physical host such as VM host 110 to another host on a network because embodiments of the invention enable network policies to be applied in network switches based on VM identity not physical presence. The edge switches of the network may thus re-learn the MAC address of the new virtual port/physical port combination.
  • virtual port communications may also be used for legacy hardware NICs.
  • virtual ports may be implemented in software in for example an Input/Output (IO) partition and/or in VMM 112 .
  • IO Input/Output
  • a virtual switch in the IO partition may not be required, and instead may be replace by a software multiplexer/demultiplexer that may be lighter than a virtual switch.

Abstract

A method and system may provide virtual port communications. A data frame, containing a destination identifier in a destination field and payload, may be modified by inserting a first virtual machine tag therein. The first virtual machine tag may include a first virtual port identifier for identifying a first logical interface of a first virtual machine on a virtual machine host.

Description

    CROSS REFERENCE TO RELATED PATENT APPLICATION
  • The present application is a continuation of U.S. patent application Ser. No. 11/902,661, filed Sep. 24, 2007, and claims priority there from. The Ser. No. 11/902,661 application is incorporated in its entirety herein.
  • BACKGROUND OF THE INVENTION
  • A virtual machine (VM) may be or include a framework or environment created by for example a virtual machine monitor (VMM) on a host system. A VMM may provide facilities or resources on the host system for an application, firmware or guest operating system that may execute or run in the VM. This execution may require communication with one or more other entities including for example another VM hosted on the same computing platform or a separate entity linked to the host computing platform by a network connection.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The subject matter regarded as the invention is particularly pointed out and distinctly claimed in the concluding portion of the specification. The invention, however, both as to organization and method of operation, together with objects, features and advantages thereof, may best be understood by reference to the following detailed description when read with the accompanied drawings in which:
  • FIG. 1 is a schematic illustration of a virtual machine host and edge switch system according to an embodiment of the invention.
  • FIGS. 2A and 2B are representative illustrations of a data frame format and a database according to an embodiment of the invention.
  • FIG. 3 is a flowchart of a method for inbound virtual port communications according to an embodiment of the invention.
  • FIG. 4 is a flowchart of a method for outbound virtual port communications according to an embodiment of the invention.
  • It will be appreciated that for simplicity and clarity of illustration, elements shown in the drawings have not necessarily been drawn accurately or to scale. For example, the dimensions of some of the elements may be exaggerated relative to other elements for clarity or several physical components included in one functional block or element. Further, where considered appropriate, reference numerals may be repeated among the drawings to indicate corresponding or analogous elements. Moreover, some of the blocks depicted in the drawings may be combined into a single function.
  • DETAILED DESCRIPTION OF THE INVENTION
  • In the following detailed description, numerous specific details are set forth in order to provide a thorough understanding of the invention. However it will be understood by those of ordinary skill in the art that the present invention may be practiced without these specific details. In other instances, well-known methods, procedures, components and circuits have not been described in detail so as not to obscure the present invention.
  • Unless specifically stated otherwise, as apparent from the following discussions, it is appreciated that throughout the specification discussions utilizing terms such as “processing,” “computing,” “calculating,” “determining,” or the like, refer to the action and/or processes of a computer or computing system, or similar electronic computing device, that manipulate and/or transform data represented as physical, such as electronic, quantities within the computing system's registers and/or memories into other data similarly represented as physical quantities within the computing system's memories, registers or other such information storage, transmission or display devices. In addition, the term “plurality” may be used throughout the specification to describe two or more components, devices, elements, parameters and the like.
  • Embodiments of the invention may provide a method and system for virtual port communications. In one embodiment, a data frame, containing a destination identifier in a destination field and a payload, may be modified by inserting a first virtual machine tag therein. The first virtual machine tag may include a first virtual port identifier for identifying a first logical interface of a first virtual machine on a virtual machine host.
  • Reference is now made to FIG. 1, a schematic illustration of a VM host and edge switch system 100 capable of implementing virtual port communications according to an embodiment of the invention. Although the invention is not limited in this respect, VM host and edge switch system 100 may include a VM host 110 and an edge switch 120 that may be connected to network 130. In some embodiments, VM host 110 may include or may be, for example, a personal computer, a desktop computer, a mobile computer, a laptop computer, a notebook computer, a terminal, a workstation, a server computer, a personal digital assistant (PDA) device, a network device, or other suitable computing device capable of hosting a VM.
  • VM host 110 may include for example a virtual machine monitor (VMM) 112, one or more VMs 111, a network interface controller (NIC) 113, a physical port 114, a memory unit 115, and a processor 116 in accordance with embodiments of the invention. Edge switch 120 may include for example one or more physical ports 121 and a forwarding database 122.
  • VM 111 may include, for example, one or more environments able to emulate, simulate, virtualize, execute, directly execute, or invoke a hardware component, a software component, an operating system (OS), an application, a code, a set of instructions, or the like. VM 111 may be implemented using hardware components and/or software components. For example, VM 111 may be implemented as a software application executed in a component of or in VM host 110 or as a hardware component integrated within VM host 110 or as a hardware component of some other hardware component of VM host 110. Although FIG. 1 shows a single VM 111 component, the present invention is not limited in this regard, and VM host 110 may be capable of hosting a plurality of VM 111's which, in some embodiments, may operate substantially in parallel. In some embodiments VM 111 may simulate one or more components of a computing platform with access to a network, another network entity, or other computing device either virtualized or not. VM 111 may have associated with it a unique media access control (MAC) address or other address(es) or name(s) that may uniquely identify VM 111. The MAC address may be assigned to VM 111 for example in accordance with one more Institute of Electronic and Electrical Engineers (IEEE) standards.
  • VMM 112 may create and manage one or more VM's such as for example VM 111 and allocate resources within for example VM host 110 to support one or more VM 111's. VMM 112 may be implemented using hardware components and/or software components. For example, VMM 112 may be implemented as a software application executed in a component of or in VM host 110 or as a hardware component integrated within VM host 110 or as a hardware component of some other hardware component of VM host 110. VMM 112 may also be referred to for example as virtualization software, a hypervisor, or an I/O partition depending on the virtualization architecture or models. VMM 112 may include for example one or more software and/or hardware components able to create VM 111, set or modify a property of VM 111, configure VM 111, monitor the operation of VM 111, and/or control the operation of VM 111. In some embodiments, VMM 112 may have, for example, system-level privileges, administrator-level privileges, and/or root-level privileges, and may control the operation of VM 112 and/or other components of VM host 110 such as for example NIC 113. VMM 112 may be able use, directly and/or indirectly, one or more resources or components of VM host 110 such as for example NIC 113.
  • NIC 113 may operate as a physical layer (e.g., Open System Interconnection (OSI) layer 1) and a data layer (e.g., OSI layer 2) component providing a physical access networking medium and low-level addressing such as for example through MAC addresses. NIC 113 may be implemented as a software application executed in a component of or in VM host 110 or a hardware component integrated within VM host 110 or as a hardware component of some other hardware component of VM host 110. In some embodiments, NIC 113 may also be implemented as for example an intelligent NIC and may include a processor and memory. NIC 113 may for example be virtualized. In some embodiments, NIC 113 may operate using for example Ethernet technology and may utilize MAC addressing in accordance with one more IEEE standards.
  • NIC 113 may communicate with devices external to VM host 110 via for example physical port 114. Physical port 114 may be a component of VM host 110 that may act as an interface between VM host 110 and any external device or network. In some embodiments, physical port 114 may be an internal component of NIC 113.
  • In some embodiments, VM 111 may communicate with other network entities such as for example other VM 111's hosted on VM host 110 or other computing platforms or network entities outside of VM host 110. In these instances, VM 111 may communicate with these network entities through NIC 113. For such network communications, each instance of a VM 111 in VM host 110 may be assigned a logical network interface referred to herein as a “virtual port” controllable by NIC 113. The number of virtual ports in a NIC 113 may be equal to the number of VM 111's assigned to NIC 113. In some embodiments, VM host 110 may include more than one VM 111 and more than one NIC 113 with the virtual port assignments of each VM 111 allocated among the number of NIC 113's. Furthermore, in some embodiments one or more VM 111's may have more than one logical network interface and correspondingly more than one virtual port for assignment to the one or more NIC(s) 113 present.
  • For embodiments in which NIC 113 may be virtualized, NIC 113 may present or indicate a number of virtual interfaces or virtual functions to VMM 112 such that each virtual port is associated with a virtual interface. VMM 112 may assign each virtual interface to a VM 111. In some embodiments, a direct assignment or pass through model may be used to assign each virtual interface directly to a VM 111. Alternatively, an emulated model may be used to assign virtual ports to different VMs 111 or different queues in NIC 113. In a multi-queue NIC model, for example, each queue or set of queues may be associated with a virtual port. The associated queues may then be assigned to the respective VMs 111.
  • Although FIG. 1 shows VMM 112, VM 111, and NIC 113 as separate components of VM host 110, the present invention is not limited in this regard. VMM 112, VM 111, and NIC 113 may be implemented, for example, as software components stored within memory 115 of VM host 110, as a controller and/or processors and/or hardware units integrated within or coupled to one or more processors such as processor 116 within VM host 110, or the like.
  • Memory 115 may include, for example, one or more memories such as a random access memory (RAM), a read only memory (ROM), a dynamic RAM (DRAM), a synchronous DRAM (SD-RAM), a Flash memory, a volatile memory, a non-volatile memory, a cache memory, a buffer, a short term memory unit, a long term memory unit, or other suitable memory units for storing data and or software components such as VM 111, VMM 112, and/or NIC 113.
  • Processor 116 may be or include for example a central processing unit (CPU), a digital signal processor (DSP), a microprocessor, a controller, a chip, a microchip, or any suitable multi-purpose or specific processor or controller. In some embodiments, for example, processor 111 may perform calculation operations or processing operations which may be used in the operation of VM 111, VMM 112, and/or NIC 113.
  • In some embodiments, NIC 113 may be connected to edge switch 120. Edge switch 120 may be a router, switch, routing switch, data center interconnect, or any local area network (LAN), metropolitan area network (MAN), wide area network (WAN), or other network access device for providing an entry point or access to a LAN, MAN, WAN or other such network such as for example network 130 external to VM 111. Correspondingly, network 130 may be a LAN, MAN, WAN or other similar network with communications links between two or more network nodes or stations such as for example VM 111 or VM host 110.
  • Physical port 121 may be a component of edge switch 120 that may act as an interface between edge switch 120 and any network or external device such as for example VM host 110 and/or network 130. In some embodiments of the present invention, edge switch 120 may be configured to have one or more virtual ports for each physical port 121 connected to physical port 114 on VM host 110. Because virtual ports may be configured on both ends of a link such as e.g. between VM host 110 and edge switch 120, each of the virtual ports on edge switch 120 may be connected logically to a VM 111 via NIC 113 and physical port 114.
  • In some embodiments, edge switch 120 may operate with the same communications technology and protocols as VM host 120 such as for example using Ethernet technology and may also utilize MAC addressing. To distinguish among the various virtual ports each associated with a VM 111, each virtual port may be assigned a virtual port identifier (VPID). The VPID may facilitate routing of traffic to and from the VM 111's. In some embodiments, the VPID may be associated with an IP or network address even though the VPID may be associated with a MAC address for layer 2 forwarding.
  • In some embodiments, a VPID may be inserted into one or more data frames or packets used by VM 111's for communications with external devices to act as a source and/or destination identifier. These data frames may be carried between VM host 110 and edge switch 120. In some embodiments, these data frames may be formatted according to a standard format such as for example Ethernet framing Other data frame formats may also be used.
  • Reference is now made to FIG. 2A which shows a data frame 201 according to an embodiment of the invention. A data frame in the format of data frame 201 may include a destination address (DA), a source address (SA), a payload, a VM tag, and a VLAN tag in accordance with IEEE standards 802.3, 802.1, 802.1Q or other such standard, although the invention is not limited in this respect. For example, the Ethernet frame used for communication between VM 111 and edge switch 120 may contain a VM tag without a VLAN tag. In some embodiments, the DA and the SA may include the MAC addresses of the corresponding destination and source network entities. The payload and VLAN tag and its associated Ethertype (Etype) field may be referred to as a VLAN tagged packet. For communications according to some embodiments of the invention, the VM tag of the data frame may be inserted into the data frame such as the Ethernet data frame and may include for example an Ethertype field and a VMTAG field. In some embodiments, the VM tag may be for example 32 bits long and may include a 16 bit Ethertype field and a 16 bit VMTAG field. Other fields may also be included in the VM tag. The Ethertype field of the VM tag may indicate that the Ethernet frame is VM tagged, while the VMTAG field may carry the VPID of the virtual port associated with the data frame. In some embodiments, for outbound traffic from VM 111, the VMTAG field may include a source identifier of VM 111, while for traffic inbound to VM 111, the VMTAG field may include a destination identifier.
  • Although the frame format of data frame 201 may be one scheme for identifying virtual ports when communicating between a NIC 113 and an edge switch 120, it is to be understood that other framing formats may be used to identify virtual ports to both NIC 113 and edge switch 120. For example, an alternative special field may be established in an Ethernet frame that carries a unique identifier for a virtual port.
  • In some embodiments, NIC 113 and edge switch 120 may each be configured to receive and read data frames that include a VM tag such as that shown in FIG. 2A. For outbound traffic, VM 111 may send to NIC 113 an Ethernet frame according to for example IEEE 802.1Q. NIC 113 may modify the Ethernet frame by inserting a VM tag corresponding to the virtual port assignment of VM 111 into the Ethernet frame and forward the packet to edge switch 120 via physical port 114. Alternatively, VMM 112 or VMM 111 may insert the VM tag into the Ethernet frame possibly allowing inclusion of a standard NIC interface. Once the modified Ethernet frame is received via physical port 121, edge switch 120 may remove the VM tag before routing the Ethernet frame to its destination. In some embodiments, edge switch may use information in the VM tag in forwarding decisions, applying network access control lists for security, quality of service decisions, and/or for collecting statistics for network management purposes.
  • In some embodiments edge switch 120 may be implemented as a stackable switch, e.g., as multiple switches stacked to operate as a single logical entity. Switches in the stack may forward the frames with the VM tag included until the frame reaches the last switch in the stack which may strip the VM tag before forwarding the frame to the network.
  • For inbound data frames, edge switch 120 may read a MAC address in the DA field of an Ethernet frame. Edge switch may use this MAC address to determine whether the destination of the data frame is VM 111 by performing an address lookup in forwarding database 122. Forwarding database 122 may be any tabular database or functionally similar software application known in the art, or another suitable database or table, for storing network addresses and related information in a searchable or retrievable form.
  • Reference is now made to FIG. 2B which is a representative illustration of a forwarding database 202 according to an embodiment of the invention. In some embodiments, forwarding database 202 may be the same as or have the same functions and/or format as forwarding database 122. Although the invention is not limited in this respect, each entry in forwarding database 202 may represent a VM 111 hosted in VM host 110 and may be of a format having a number of fields for example as follows:
      • {VLAN, MAC_Address}->{Physical Port_Num, VPID}
        where VLAN may be a network identifier, MAC_Address may be the MAC address of the respective VM 111, Physical Port_Num may be the physical port number through which the VM 111 communicates, and VPID may be the virtual port identifier corresponding to the VM 111. Additional and/or alternative data fields may be included in the entries of forwarding database 202.
  • If edge switch 120 determines from an address lookup that VM 111 is the destination of an inbound data frame, then edge switch 120 may modify the data frame by inserting the VM tag corresponding to VM 111's VPID into the data frame. Edge switch may then forward the modified data frame to NIC 113 via physical port 114. NIC 113 may remove the VM tag and forward the data frame to VM 111. Alternatively, in some embodiments VMM 112 may remove the VM tag or VM 111 may be capable of receiving the data frame with the VM tag.
  • In some embodiments, edge switch 120 may also forward data frames for communication among virtual entities having virtual ports on VM host 110 such as for example two or more VM 111's. NIC 113 may forward an outbound data frame from for example one VM 111 to edge switch 120. After stripping the existing VM Tag from the data frame, edge switch 120 may perform an address lookup on the MAC address in the DA field using forwarding database 122. If the destination's MAC address corresponds to a second VM 111 or other entity in VM host 110 having a VPID, edge switch 120 may insert a new VM Tag with the corresponding VPID into the data frame and forward the modified data frame back to NIC 113 which may remove the new VM Tag before forwarding the data frame on to the destination VM 111.
  • Performing the routing of all traffic to and from VM 111 at edge switch 120 with the invented virtual port communications may have several advantages. Some embodiments of the present invention may eliminate the need for any virtualized switching associated with any virtualized entities such as VM 111 which may not be visible to some or all other parts of a network's infrastructure. Eliminating virtualized switching may enable consistent application of network traffic and security policies among virtual entities such as for example VM 111 and other entities on a network by bringing awareness of the virtual machine infrastructure out to the edge switch. Network and security policies may then be applied in the edge switch independently of the virtualization. In some embodiments, it may be possible to have all switches of a network operate in a single management domain, easing the burden of network management and lowering maintenance costs. Other or different benefits may occur.
  • The virtual port communications may also allow data frame forwarding between virtual ports on the same physical port consistent with the IEED 802.1D Bridging standard (“IEEE Standard for Local and Metropolitan Area Networks, Media Access Control (MAC) Bridges”, Jun. 9, 2004). Typically, in 802.1D bridging a frame may not be sent back to the port that sent the frame because packet duplication may result. However, incorporation of virtual port communications technology in a VM host and associated edge switch may avoid this by assigning different virtual ports to different VMs on a given physical port.
  • In some embodiments, forwarding database 122 may be configured to enable edge switch 120 to handle multicast and broadcast forwarding to virtual ports. Although not shown in FIG. 2B, for a multicast destination having a particular MAC address to be looked up, additional fields corresponding to the various VPIDs of for example various VM 111's may be added to the database entry. A multicast data frame or packet may then be forwarded to all member virtual ports in the same VLAN with the multicast data frame replicated once for every VPID and then sent to the respective member virtual ports and corresponding VMs. In one embodiment, removing and forwarding may be repeated for each of the members of a group such as a multicast group. Alternatively, multicasting replication may also be performed at NIC 113 by including a field in the VM tag to indicate that the data frame is a multicast frame. In some embodiments, the implementation for broadcast forwarding may be the same as or similar to that for multicast forwarding.
  • Reference is now made to FIG. 3 which is a flowchart of a method for inbound virtual port communications according to an embodiment of the invention. Embodiments of the method may be used by, or may be implemented by, for example, VM host and edge switch system 100 of FIG. 1 or by other suitable wired and/or wireless communication devices, stations, nodes, systems and/or networks. Embodiments of the method may also use the frame format and forwarding database structure of FIG. 2 or other suitable data frame formats and forwarding database structures.
  • As indicated at operation 301, an edge switch such as edge switch 120 configured in accordance with an embodiment of the invention may receive a data frame from for example network 130. The data frame may be in an Ethernet frame format or other frame format known in the art with a DA field containing a MAC address or other destination identifier. Edge switch 120 may perform in operation 302 a destination lookup of the MAC address in a forwarding database such as database 122. In operation 303 the edge switch may determine if the MAC address of the DA field matches the MAC address corresponding to a VPID of a virtual machine such as for example VM 111 or other virtual network entity on or internal to VM host 110.
  • If the MAC address of the DA field does match the MAC address of VM 111, edge switch 120 may modify the data frame by inserting into the data frame a VM tag containing the VPID corresponding to VM 111 (operation 304). Edge switch 120 may then forward the modified data frame to NIC 113 of VM host 110 (operation 305).
  • In operation 306, NIC 113 may remove the VM tag in the modified data frame received from edge switch 120, and may forward the data frame on to VM 111 (operation 307).
  • If the MAC address of the DA field does not match the MAC address of VM 111, the destination for the data frame may not be a virtual entity on VM host 110. Edge switch 120 may forward the data frame on to another network entity on for example network 130 such as for example other non-virtualized hosts or network nodes (operation 308).
  • Other operations or series of operations may be used.
  • Reference is now made to FIG. 4 which is a flowchart of a method for outbound virtual port communications according to an embodiment of the invention. Embodiments of the method may be used by, or may be implemented by, for example, VM host and edge switch system 100 of FIG. 1 or by other suitable wired and/or wireless communication devices, stations, nodes, systems and/or networks. Embodiments of the method may also use the frame format and forwarding database structure of FIG. 2 or other suitable data frame formats and forwarding database structures.
  • In operation 401, a VM or virtualized entity on a VM host such as for example VM 111 on VM host 110 forwards a data frame to NIC 113. NIC 113 may modify the data frame by inserting into the data frame a VM Tag containing a VPID corresponding to the virtual port associated with VM 111 (operation 402) and may forward the modified data frame to an edge switch such as for example edge switch 120 (operation 403).
  • In operation 404, edge switch 120 may remove the VM Tag in the modified data frame received from NIC 113. Operations 405 and 406 may proceed as operations 302 and 303 of FIG. 3 in that edge switch 120 may perform a destination lookup of the MAC address in a forwarding database and determine if the MAC address corresponds to a VPID of a virtual machine on VM host 110.
  • If the MAC address of the DA field does match the MAC address of a virtual entity on VM host 110 such as for example a second VM 111, the communication may be internal to VM host 110. Routing such internal communications through edge switch 120 may allow network policies such as access control or security to be consistently maintained for communications internal to and external to VM host 110. Edge switch 120 may modify the data frame by inserting into the data frame a VM tag containing the VPID corresponding to the second VM 111 (operation 407). Operations 408-410 may proceed correspondingly as operations 305-307 of FIG. 3.
  • If the MAC address of the DA field does not match the MAC address of VM 111, the destination for the data frame may not be a virtual entity on VM host 110. Edge switch 120 may forward the data frame on to another network entity on for example network 130 (operation 411). In some embodiments, multiple VM hosts 110 may be connected to edge switch 120. In these instances, forwarding the data frame to a second VM host 110 may proceed according to operations 305-307.
  • Other operations or series of operations may be used.
  • Management of virtual ports may be handled by for example a fixed configuration or an auto configuration such as by advertisement or discovery when a VM host such as VM host 110 is connected to a virtualized edge switch such as edge switch 120. When a VM host is first connected to an edge switch, both nodes or ends of the link may send advertisement and/or discovery messages to identify their respective peer capabilities. If both nodes are capable of virtual port communications, then other parameters may be exchanged. These parameters may include for example the number of virtual ports, range for VPID's, and other pertinent virtual port communications parameters. Control messages may be exchanged periodically among nodes. If a change in virtualized network configuration occurs such as for example the addition of a new VM, additional control messages may be sent to for example reconfigure the nodes, configure the new virtual port, etc.
  • In some embodiments, all network policies and privileges belonging to a VM such as VM 111 may be preserved when moving the VM from one physical host such as VM host 110 to another host on a network because embodiments of the invention enable network policies to be applied in network switches based on VM identity not physical presence. The edge switches of the network may thus re-learn the MAC address of the new virtual port/physical port combination.
  • In some embodiments, virtual port communications may also be used for legacy hardware NICs. For these instances, virtual ports may be implemented in software in for example an Input/Output (IO) partition and/or in VMM 112. A virtual switch in the IO partition may not be required, and instead may be replace by a software multiplexer/demultiplexer that may be lighter than a virtual switch.
  • While the invention has been described with respect to a limited number of embodiments, it will be appreciated that many variations, modifications and other applications of the invention may be made. Embodiments of the present invention may include other apparatuses for performing the operations herein. Such apparatuses may integrate the elements discussed, or may comprise alternative components to carry out the same purpose. It will be appreciated by persons skilled in the art that the appended claims are intended to cover all such modifications and changes as fall within the true spirit of the invention.

Claims (15)

1. A method comprising:
modifying a data frame by inserting a first virtual machine tag therein;
wherein the data frame comprises a destination identifier in a destination field and a payload, and the first virtual machine tag comprises a first virtual port identifier for identifying a first logical interface of a first virtual machine on a virtual machine host.
2. The method of claim 1, comprising:
forwarding the data frame from the first virtual machine to a network interface controller on the virtual machine host;
and modifying the data frame by inserting the first virtual machine tag therein.
3. The method of claim 2, comprising:
forwarding the modified data frame from the network interface controller via a physical port on the virtual machine host to an edge switch, the edge switch being connected to the virtual machine host and to a network and comprising a forwarding database; and
removing the virtual machine tag from the modified data frame.
4. The method of claim 3, comprising:
performing an address lookup in the forwarding database on the destination identifier;
determining if the destination identifier corresponds to a virtual port internal to the virtual machine host;
modifying the data frame by inserting a second virtual machine tag in the data frame if the destination identifier matches the destination identifier corresponding to a second virtual machine on the virtual machine host, said second virtual machine tag comprising a second virtual port identifier for identifying a second logical interface of the second virtual machine on the virtual machine host;
forwarding the modified data frame containing the second virtual machine tag from the edge switch to the network interface controller via the physical port on the virtual machine host;
removing the second virtual machine tag from the modified data frame containing the second virtual machine tag; and
forwarding the data frame to the second virtual machine.
5. The method of claim 3, comprising:
performing an address lookup in the forwarding database on the destination identifier;
determining if the destination identifier corresponds to a virtual port internal to the virtual machine host; and
forwarding the data frame on the network if the destination identifier of the data frame corresponds to a location external to the virtual machine host.
6. The method of claim 1, comprising:
performing an address lookup on the destination identifier in a forwarding database at an edge switch comprising the forwarding database;
determining if the destination identifier corresponds to the first virtual machine; and
forwarding the modified data frame from the edge switch to a network interface controller on the virtual machine host via a physical port on the virtual machine host, wherein the edge switch is connected to the virtual machine host and a network, the data frame is modified by the edge switch, and the destination of the data frame is the first virtual machine.
7. The method of claim 6, comprising
removing the virtual machine tag from the modified data frame; and
forwarding the data frame to the first virtual machine.
8. The method of claim 7, wherein the removing and said forwarding operations are repeated for each of the members of a multicast group that are virtual machines on the virtual machine host.
9. A system comprising:
a virtual machine host to host one or more virtual machines, the virtual machine host comprising
a first virtual machine to forward a data frame, the virtual machine having a first logical interface and having associated therewith a first virtual port identifier to identify the first logical interface;
wherein the data frame comprises a destination identifier in a destination field and a payload.
10. The system of claim 9, wherein the virtual machine host comprises:
a network interface controller, connected to the first virtual machine to modify the data frame by inserting a first virtual machine tag therein, the first virtual machine tag comprising the first virtual port identifier; and
a physical port, connected to the network controller, to interface with an external device;
wherein the first virtual machine is configured to forward the data frame to the network controller.
11. The system of claim 10, comprising:
a edge switch, connected to a network and the virtual machine host via the physical port, to remove the first virtual machine tag from the modified data frame, the edge switch comprising a forwarding database;
wherein the network interface controller is configured to forward the modified data frame to the edge switch via the physical port.
12. The system of claim 11, wherein the edge switch is configured:
to perform an address lookup in the forwarding database on the destination identifier;
to determine if the destination identifier corresponds to a virtual port internal to the virtual machine host;
to modify the data frame by inserting a second virtual machine tag in the data frame if the destination identifier matches a destination identifier corresponding to a second virtual machine on the virtual machine host, said second virtual machine tag comprising a second virtual port identifier for identifying a second logical interface of the second virtual machine on the virtual machine host; and
to forward the modified data frame containing the second virtual machine tag from the edge switch to the network interface controller via the physical port on the virtual machine host;
wherein the network interface controller is configured to remove the second virtual machine tag from the modified data frame containing the second virtual machine tag and to forward the data frame to the second virtual machine.
13. The system of claim 11, wherein the edge switch is configured:
to perform an address lookup in the forwarding database on the destination identifier database;
to determine if the destination identifier corresponds to a virtual port internal to the virtual machine host; and
to forward the data frame on the network if the destination identifier of the data frame corresponds to a location external to the virtual machine host.
14. A system comprising:
an edge switch, connected to a network and a virtual machine host via a physical port on the virtual machine host, comprising a forwarding database, the edge switch configured to receive from the network a data frame, the data frame comprising a destination identifier in a destination field and a payload, to perform an address lookup in the forwarding database on the destination identifier, to determine if the destination identifier corresponds to a virtual port internal to the virtual machine host; and to modify the data frame by inserting a virtual machine tag therein if the destination identifier corresponds to a virtual port identifier of a virtual machine internal to the virtual machine host;
wherein the virtual machine host is to host the virtual machine and comprises the virtual machine, the virtual machine having a logical interface and having associated therewith a virtual port identifier to identify the logical interface.
15. The system of claim 14, wherein the virtual machine host comprises:
a physical port, connected to the edge switch, to interface with the edge switch; and
a network interface controller, connected to the physical port, to receive the modified data frame, to remove the virtual machine tag from the modified data frame, and to forward the data frame to the virtual machine.
US14/319,570 2007-09-24 2014-06-30 Method and system for virtual port communications Abandoned US20150135177A1 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
US14/319,570 US20150135177A1 (en) 2007-09-24 2014-06-30 Method and system for virtual port communications
US15/396,505 US11716285B2 (en) 2007-09-24 2016-12-31 Method and system for virtual port communications
US15/396,514 US11711300B2 (en) 2007-09-24 2016-12-31 Method and system for virtual port communications

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US11/902,661 US8798056B2 (en) 2007-09-24 2007-09-24 Method and system for virtual port communications
US14/319,570 US20150135177A1 (en) 2007-09-24 2014-06-30 Method and system for virtual port communications

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US11/902,661 Continuation US8798056B2 (en) 2007-09-24 2007-09-24 Method and system for virtual port communications

Related Child Applications (2)

Application Number Title Priority Date Filing Date
US15/396,505 Continuation US11716285B2 (en) 2007-09-24 2016-12-31 Method and system for virtual port communications
US15/396,514 Continuation US11711300B2 (en) 2007-09-24 2016-12-31 Method and system for virtual port communications

Publications (1)

Publication Number Publication Date
US20150135177A1 true US20150135177A1 (en) 2015-05-14

Family

ID=40472925

Family Applications (4)

Application Number Title Priority Date Filing Date
US11/902,661 Active 2028-12-23 US8798056B2 (en) 2007-09-24 2007-09-24 Method and system for virtual port communications
US14/319,570 Abandoned US20150135177A1 (en) 2007-09-24 2014-06-30 Method and system for virtual port communications
US15/396,514 Active 2028-04-29 US11711300B2 (en) 2007-09-24 2016-12-31 Method and system for virtual port communications
US15/396,505 Active 2027-09-27 US11716285B2 (en) 2007-09-24 2016-12-31 Method and system for virtual port communications

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US11/902,661 Active 2028-12-23 US8798056B2 (en) 2007-09-24 2007-09-24 Method and system for virtual port communications

Family Applications After (2)

Application Number Title Priority Date Filing Date
US15/396,514 Active 2028-04-29 US11711300B2 (en) 2007-09-24 2016-12-31 Method and system for virtual port communications
US15/396,505 Active 2027-09-27 US11716285B2 (en) 2007-09-24 2016-12-31 Method and system for virtual port communications

Country Status (4)

Country Link
US (4) US8798056B2 (en)
CN (2) CN103793359B (en)
DE (1) DE112008002550B4 (en)
WO (1) WO2009042397A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130219393A1 (en) * 2010-10-28 2013-08-22 Hewlett-Packard Development Company, L.P. Zoning data to a virtual machine
CN107864126A (en) * 2017-10-30 2018-03-30 国云科技股份有限公司 A kind of cloud platform virtual network behavioral value method

Families Citing this family (254)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9712443B1 (en) 2004-06-25 2017-07-18 InMon Corp. Distributed traffic quota measurement and enforcement
US9485144B2 (en) * 2004-06-25 2016-11-01 InMon Corp. Network traffic optimization
US8924524B2 (en) 2009-07-27 2014-12-30 Vmware, Inc. Automated network configuration of virtual machines in a virtual lab data environment
US8619771B2 (en) 2009-09-30 2013-12-31 Vmware, Inc. Private allocated networks over shared communications infrastructure
US8892706B1 (en) 2010-06-21 2014-11-18 Vmware, Inc. Private ethernet overlay networks over a shared ethernet in a virtual environment
IL189514A (en) 2007-02-14 2011-12-29 Marvell Israel Misl Ltd Logical bridging system and method
US9270594B2 (en) * 2007-06-01 2016-02-23 Cisco Technology, Inc. Apparatus and method for applying network policy at virtual interfaces
US8798056B2 (en) 2007-09-24 2014-08-05 Intel Corporation Method and system for virtual port communications
EP2193630B1 (en) 2007-09-26 2015-08-26 Nicira, Inc. Network operating system for managing and securing networks
US8036229B2 (en) * 2007-10-08 2011-10-11 Cisco Technology, Inc. Switch with virtual network identifier re-write capability
US8429739B2 (en) * 2008-03-31 2013-04-23 Amazon Technologies, Inc. Authorizing communications between computing nodes
US8195774B2 (en) 2008-05-23 2012-06-05 Vmware, Inc. Distributed virtual switch for virtualized computer systems
US9426095B2 (en) * 2008-08-28 2016-08-23 International Business Machines Corporation Apparatus and method of switching packets between virtual ports
US8565118B2 (en) * 2008-12-30 2013-10-22 Juniper Networks, Inc. Methods and apparatus for distributed dynamic network provisioning
US8255496B2 (en) * 2008-12-30 2012-08-28 Juniper Networks, Inc. Method and apparatus for determining a network topology during network provisioning
US8331362B2 (en) * 2008-12-30 2012-12-11 Juniper Networks, Inc. Methods and apparatus for distributed dynamic network provisioning
US8054832B1 (en) * 2008-12-30 2011-11-08 Juniper Networks, Inc. Methods and apparatus for routing between virtual resources based on a routing location policy
US8190769B1 (en) 2008-12-30 2012-05-29 Juniper Networks, Inc. Methods and apparatus for provisioning at a network device in response to a virtual resource migration notification
TW201025974A (en) * 2008-12-31 2010-07-01 Ralink Technology Corp Electronic device and related method for controlling heterogeneous iNIC devices
US8665886B2 (en) 2009-03-26 2014-03-04 Brocade Communications Systems, Inc. Redundant host connection in a routed network
AU2014233640B2 (en) * 2009-04-01 2017-02-02 Nicira, Inc. Method and apparatus for implementing and managing virtual switches
KR101460848B1 (en) 2009-04-01 2014-11-20 니시라, 인크. Method and apparatus for implementing and managing virtual switches
US8799894B2 (en) * 2009-04-22 2014-08-05 International Business Machines Corporation End-to-end mapping from operating system running on virtual machine to storage volume of storage-array network (SAN)
US8589919B2 (en) * 2009-04-28 2013-11-19 Cisco Technology, Inc. Traffic forwarding for virtual machines
US8644188B1 (en) * 2009-06-25 2014-02-04 Amazon Technologies, Inc. Providing virtual networking functionality for managed computer networks
CN101630270B (en) * 2009-07-22 2013-06-26 成都市华为赛门铁克科技有限公司 Data processing system and method therefor
US9733962B2 (en) 2009-07-23 2017-08-15 Brocade Communications Systems, Inc. Method and apparatus for determining the identity of a virtual machine
CN104065555B (en) * 2009-09-24 2018-09-18 日本电气株式会社 Communication identification method between communication identification system and virtual server between virtual server
US8719567B2 (en) * 2009-10-14 2014-05-06 Cisco Technology, Inc. Enabling QoS for MACsec protected frames
US8953603B2 (en) 2009-10-28 2015-02-10 Juniper Networks, Inc. Methods and apparatus related to a distributed switch fabric
CN102474449B (en) * 2009-11-02 2016-05-04 马维尔国际贸易有限公司 Switch based on virtual interface and method
US8537860B2 (en) * 2009-11-03 2013-09-17 International Business Machines Corporation Apparatus for switching traffic between virtual machines
US8442048B2 (en) 2009-11-04 2013-05-14 Juniper Networks, Inc. Methods and apparatus for configuring a virtual network switch
US8406152B1 (en) 2010-03-23 2013-03-26 Qlogic, Corporation System and methods for presenting storage
US8369335B2 (en) 2010-03-24 2013-02-05 Brocade Communications Systems, Inc. Method and system for extending routing domain to non-routing end stations
US9461840B2 (en) * 2010-06-02 2016-10-04 Brocade Communications Systems, Inc. Port profile management for virtual cluster switching
US9769016B2 (en) 2010-06-07 2017-09-19 Brocade Communications Systems, Inc. Advanced link tracking for virtual cluster switching
US9231890B2 (en) 2010-06-08 2016-01-05 Brocade Communications Systems, Inc. Traffic management for virtual cluster switching
US9001824B2 (en) 2010-05-18 2015-04-07 Brocade Communication Systems, Inc. Fabric formation for virtual cluster switching
US8867552B2 (en) 2010-05-03 2014-10-21 Brocade Communications Systems, Inc. Virtual cluster switching
US9716672B2 (en) 2010-05-28 2017-07-25 Brocade Communications Systems, Inc. Distributed configuration management for virtual cluster switching
US9270486B2 (en) 2010-06-07 2016-02-23 Brocade Communications Systems, Inc. Name services for virtual cluster switching
US8625616B2 (en) 2010-05-11 2014-01-07 Brocade Communications Systems, Inc. Converged network extension
US8989186B2 (en) 2010-06-08 2015-03-24 Brocade Communication Systems, Inc. Virtual port grouping for virtual cluster switching
US8634308B2 (en) 2010-06-02 2014-01-21 Brocade Communications Systems, Inc. Path detection in trill networks
US8885488B2 (en) 2010-06-02 2014-11-11 Brocade Communication Systems, Inc. Reachability detection in trill networks
US9628293B2 (en) 2010-06-08 2017-04-18 Brocade Communications Systems, Inc. Network layer multicasting in trill networks
US9608833B2 (en) 2010-06-08 2017-03-28 Brocade Communications Systems, Inc. Supporting multiple multicast trees in trill networks
US8446914B2 (en) 2010-06-08 2013-05-21 Brocade Communications Systems, Inc. Method and system for link aggregation across multiple switches
US9246703B2 (en) 2010-06-08 2016-01-26 Brocade Communications Systems, Inc. Remote port mirroring
US9806906B2 (en) 2010-06-08 2017-10-31 Brocade Communications Systems, Inc. Flooding packets on a per-virtual-network basis
ES2639643T3 (en) 2010-06-23 2017-10-27 Telefonaktiebolaget Lm Ericsson (Publ) Interference management of reference signals in deployments of heterogeneous networks
US9525647B2 (en) 2010-07-06 2016-12-20 Nicira, Inc. Network control apparatus and method for creating and modifying logical switching elements
US8964528B2 (en) 2010-07-06 2015-02-24 Nicira, Inc. Method and apparatus for robust packet distribution among hierarchical managed switching elements
US10103939B2 (en) 2010-07-06 2018-10-16 Nicira, Inc. Network control apparatus and method for populating logical datapath sets
US8966040B2 (en) 2010-07-06 2015-02-24 Nicira, Inc. Use of network information base structure to establish communication between applications
US9680750B2 (en) 2010-07-06 2017-06-13 Nicira, Inc. Use of tunnels to hide network addresses
US9807031B2 (en) 2010-07-16 2017-10-31 Brocade Communications Systems, Inc. System and method for network configuration
US8964742B1 (en) 2010-07-28 2015-02-24 Marvell Israel (M.I.S.L) Ltd. Linked list profiling and updating
US8774201B2 (en) * 2010-09-10 2014-07-08 Fujitsu Limited Method and system for providing contextualized flow tags
US8885475B2 (en) * 2010-09-10 2014-11-11 Fujitsu Limited Method and system for virtualized forwarding
CN102136931B (en) 2010-09-20 2013-12-04 华为技术有限公司 Method for configuring virtual port network strategies, network management center and related equipment
US8804747B2 (en) * 2010-09-23 2014-08-12 Cisco Technology, Inc. Network interface controller for virtual and distributed services
US8644194B2 (en) 2010-10-15 2014-02-04 International Business Machines Corporation Virtual switching ports on high-bandwidth links
CN102148749B (en) * 2010-11-05 2013-11-06 华为技术有限公司 Method and device for extending switch port
CN102025535B (en) * 2010-11-17 2012-09-12 福建星网锐捷网络有限公司 Virtual machine management method and device and network equipment
CN102480410B (en) * 2010-11-22 2015-06-10 杭州华三通信技术有限公司 Single board for centralized business processing and virtualized resource dividing method
US8891406B1 (en) 2010-12-22 2014-11-18 Juniper Networks, Inc. Methods and apparatus for tunnel management within a data center
US10142218B2 (en) 2011-01-14 2018-11-27 International Business Machines Corporation Hypervisor routing between networks in a virtual networking environment
US20120182993A1 (en) * 2011-01-14 2012-07-19 International Business Machines Corporation Hypervisor application of service tags in a virtual networking environment
US8566838B2 (en) * 2011-03-11 2013-10-22 Novell, Inc. Techniques for workload coordination
CN103444143B (en) * 2011-03-18 2016-04-20 日本电气株式会社 Network system and policy route configuration method
US9270572B2 (en) 2011-05-02 2016-02-23 Brocade Communications Systems Inc. Layer-3 support in TRILL networks
US9043452B2 (en) 2011-05-04 2015-05-26 Nicira, Inc. Network control apparatus and method for port isolation
US9276953B2 (en) 2011-05-13 2016-03-01 International Business Machines Corporation Method and apparatus to detect and block unauthorized MAC address by virtual machine aware network switches
US20120287931A1 (en) * 2011-05-13 2012-11-15 International Business Machines Corporation Techniques for securing a virtualized computing environment using a physical network switch
US8948056B2 (en) 2011-06-28 2015-02-03 Brocade Communication Systems, Inc. Spanning-tree based loop detection for an ethernet fabric switch
US9401861B2 (en) 2011-06-28 2016-07-26 Brocade Communications Systems, Inc. Scalable MAC address distribution in an Ethernet fabric switch
US9407533B2 (en) 2011-06-28 2016-08-02 Brocade Communications Systems, Inc. Multicast in a trill network
US8879549B2 (en) 2011-06-28 2014-11-04 Brocade Communications Systems, Inc. Clearing forwarding entries dynamically and ensuring consistency of tables across ethernet fabric switch
US9007958B2 (en) 2011-06-29 2015-04-14 Brocade Communication Systems, Inc. External loop detection for an ethernet fabric switch
US8954961B2 (en) 2011-06-30 2015-02-10 International Business Machines Corporation Geophysical virtual machine policy allocation using a GPS, atomic clock source or regional peering host
US8885641B2 (en) 2011-06-30 2014-11-11 Brocade Communication Systems, Inc. Efficient trill forwarding
CN103621048B (en) * 2011-07-11 2016-08-17 甲骨文国际公司 Utilize at least one in multicast group and packet transaction agency to support the System and method for of flooding mechanism in middleware machine environment
CN102318291B (en) * 2011-07-14 2014-02-19 华为技术有限公司 Business flow processing method, device and system
JP5870192B2 (en) 2011-08-17 2016-02-24 ニシラ, インコーポレイテッド Logical L3 routing
US9288081B2 (en) 2011-08-17 2016-03-15 Nicira, Inc. Connecting unmanaged segmented networks by managing interconnection switching elements
US9736085B2 (en) 2011-08-29 2017-08-15 Brocade Communications Systems, Inc. End-to end lossless Ethernet in Ethernet fabric
US9203701B2 (en) 2011-10-25 2015-12-01 Nicira, Inc. Network virtualization apparatus and method with scheduling capabilities
US9154433B2 (en) 2011-10-25 2015-10-06 Nicira, Inc. Physical controller
US9137107B2 (en) 2011-10-25 2015-09-15 Nicira, Inc. Physical controllers for converting universal flows
US9288104B2 (en) 2011-10-25 2016-03-15 Nicira, Inc. Chassis controllers for converting universal flows
US9699117B2 (en) 2011-11-08 2017-07-04 Brocade Communications Systems, Inc. Integrated fibre channel support in an ethernet fabric switch
US9450870B2 (en) 2011-11-10 2016-09-20 Brocade Communications Systems, Inc. System and method for flow management in software-defined networks
EP2748750B1 (en) 2011-11-15 2020-03-18 Nicira Inc. Firewalls in logical networks
US8995272B2 (en) 2012-01-26 2015-03-31 Brocade Communication Systems, Inc. Link aggregation in software-defined networks
US9742693B2 (en) 2012-02-27 2017-08-22 Brocade Communications Systems, Inc. Dynamic service insertion in a fabric switch
US9154416B2 (en) 2012-03-22 2015-10-06 Brocade Communications Systems, Inc. Overlay tunnel in a fabric switch
CN103326997B (en) * 2012-03-23 2016-06-01 百度在线网络技术(北京)有限公司 A kind of method accessing virtual server and virtual server system
US9432304B2 (en) 2012-03-26 2016-08-30 Oracle International Corporation System and method for supporting live migration of virtual machines based on an extended host channel adaptor (HCA) model
US9311122B2 (en) * 2012-03-26 2016-04-12 Oracle International Corporation System and method for providing a scalable signaling mechanism for virtual machine migration in a middleware machine environment
WO2013158917A2 (en) 2012-04-18 2013-10-24 Nicira, Inc. Using transactions to compute and propagate network forwarding state
US9374301B2 (en) 2012-05-18 2016-06-21 Brocade Communications Systems, Inc. Network feedback in software-defined networks
US10277464B2 (en) 2012-05-22 2019-04-30 Arris Enterprises Llc Client auto-configuration in a multi-switch link aggregation
EP2853066B1 (en) 2012-05-23 2017-02-22 Brocade Communications Systems, Inc. Layer-3 overlay gateways
CN103516822A (en) * 2012-06-29 2014-01-15 同方股份有限公司 Virtualization data exchange safety system for virtualization network
JP5958164B2 (en) * 2012-08-07 2016-07-27 富士通株式会社 Control apparatus, method and program, system, and information processing method
US9210079B2 (en) 2012-08-14 2015-12-08 Vmware, Inc. Method and system for virtual and physical network integration
CN103593246B (en) * 2012-08-15 2017-07-11 中国电信股份有限公司 Communication means, host and dummy machine system between virtual machine and host
US9602430B2 (en) 2012-08-21 2017-03-21 Brocade Communications Systems, Inc. Global VLANs for fabric switches
US8989183B2 (en) * 2012-10-10 2015-03-24 Microsoft Technology Licensing, Llc Virtual machine multicast/broadcast in virtual network
US9092583B2 (en) * 2012-11-16 2015-07-28 Dell Products L.P. Systems and methods for communication between modular information handling systems in a chassis
US9401872B2 (en) 2012-11-16 2016-07-26 Brocade Communications Systems, Inc. Virtual link aggregations across multiple fabric switches
US9413691B2 (en) 2013-01-11 2016-08-09 Brocade Communications Systems, Inc. MAC address synchronization in a fabric switch
US9548926B2 (en) 2013-01-11 2017-01-17 Brocade Communications Systems, Inc. Multicast traffic load balancing over virtual link aggregation
US9350680B2 (en) 2013-01-11 2016-05-24 Brocade Communications Systems, Inc. Protection switching over a virtual link aggregation
US9503397B2 (en) 2013-01-15 2016-11-22 International Business Machines Corporation Applying a client policy to a group of channels
US9565113B2 (en) 2013-01-15 2017-02-07 Brocade Communications Systems, Inc. Adaptive link aggregation and virtual link aggregation
US9565099B2 (en) 2013-03-01 2017-02-07 Brocade Communications Systems, Inc. Spanning tree in fabric switches
US9990221B2 (en) 2013-03-15 2018-06-05 Oracle International Corporation System and method for providing an infiniband SR-IOV vSwitch architecture for a high performance cloud computing environment
US9401818B2 (en) 2013-03-15 2016-07-26 Brocade Communications Systems, Inc. Scalable gateways for a fabric switch
US10230794B2 (en) 2013-03-15 2019-03-12 Oracle International Corporation System and method for efficient virtualization in lossless interconnection networks
JP6011401B2 (en) * 2013-03-18 2016-10-19 富士通株式会社 Information processing apparatus and method for generating connection information
JP6036506B2 (en) * 2013-04-15 2016-11-30 富士通株式会社 Program and information processing apparatus for specifying fault influence range
CN104144130B (en) * 2013-05-10 2019-04-12 中国电信股份有限公司 Method, system and the access switch of virtual machine system interconnection
US9565028B2 (en) 2013-06-10 2017-02-07 Brocade Communications Systems, Inc. Ingress switch multicast distribution in a fabric switch
US9699001B2 (en) 2013-06-10 2017-07-04 Brocade Communications Systems, Inc. Scalable and segregated network virtualization
US20150033222A1 (en) * 2013-07-25 2015-01-29 Cavium, Inc. Network Interface Card with Virtual Switch and Traffic Flow Policy Enforcement
US9952885B2 (en) 2013-08-14 2018-04-24 Nicira, Inc. Generation of configuration files for a DHCP module executing within a virtualized container
US9887960B2 (en) 2013-08-14 2018-02-06 Nicira, Inc. Providing services for logical networks
US9843540B2 (en) * 2013-08-26 2017-12-12 Vmware, Inc. Traffic and load aware dynamic queue management
US9503371B2 (en) 2013-09-04 2016-11-22 Nicira, Inc. High availability L3 gateways for logical networks
US9577845B2 (en) 2013-09-04 2017-02-21 Nicira, Inc. Multiple active L3 gateways for logical networks
US9806949B2 (en) 2013-09-06 2017-10-31 Brocade Communications Systems, Inc. Transparent interconnection of Ethernet fabric switches
US9977685B2 (en) 2013-10-13 2018-05-22 Nicira, Inc. Configuration of logical router
US10063458B2 (en) 2013-10-13 2018-08-28 Nicira, Inc. Asymmetric connection with external networks
US9912612B2 (en) 2013-10-28 2018-03-06 Brocade Communications Systems LLC Extended ethernet fabric switches
CN105264837B (en) * 2013-12-05 2019-03-08 华为技术有限公司 A kind of Transmission system of data message, transmission method and equipment
US9860117B2 (en) 2014-02-03 2018-01-02 Sprint Communications Company, L.P. Automatically generated virtual network elements for virtualized packet networks
US9876689B1 (en) 2014-02-03 2018-01-23 Sprint Communications Company L.P. Automatically generated virtual network elements for virtualized local area networks
US9548873B2 (en) 2014-02-10 2017-01-17 Brocade Communications Systems, Inc. Virtual extensible LAN tunnel keepalives
US10264025B2 (en) 2016-06-24 2019-04-16 Varmour Networks, Inc. Security policy generation for virtualization, bare-metal server, and cloud computing environments
US10091238B2 (en) 2014-02-11 2018-10-02 Varmour Networks, Inc. Deception using distributed threat detection
US9973472B2 (en) 2015-04-02 2018-05-15 Varmour Networks, Inc. Methods and systems for orchestrating physical and virtual switches to enforce security boundaries
US9590901B2 (en) 2014-03-14 2017-03-07 Nicira, Inc. Route advertisement by managed gateways
US9313129B2 (en) 2014-03-14 2016-04-12 Nicira, Inc. Logical router processing by network controller
US9225597B2 (en) 2014-03-14 2015-12-29 Nicira, Inc. Managed gateways peering with external router to attract ingress packets
US9419855B2 (en) 2014-03-14 2016-08-16 Nicira, Inc. Static routes for logical routers
US10581758B2 (en) 2014-03-19 2020-03-03 Avago Technologies International Sales Pte. Limited Distributed hot standby links for vLAG
US10476698B2 (en) 2014-03-20 2019-11-12 Avago Technologies International Sales Pte. Limited Redundent virtual link aggregation group
US9503321B2 (en) 2014-03-21 2016-11-22 Nicira, Inc. Dynamic routing for logical routers
US9647883B2 (en) 2014-03-21 2017-05-09 Nicria, Inc. Multiple levels of logical routers
US9413644B2 (en) 2014-03-27 2016-08-09 Nicira, Inc. Ingress ECMP in virtual distributed routing environment
CN103873374B (en) * 2014-03-27 2017-08-11 新华三技术有限公司 Message processing method and device in virtualization system
US9893988B2 (en) 2014-03-27 2018-02-13 Nicira, Inc. Address resolution using multiple designated instances of a logical router
CN103945015A (en) * 2014-04-09 2014-07-23 上海华为技术有限公司 Node logic ID distribution device and method and communication system
US10063473B2 (en) 2014-04-30 2018-08-28 Brocade Communications Systems LLC Method and system for facilitating switch virtualization in a network of interconnected switches
US9800471B2 (en) 2014-05-13 2017-10-24 Brocade Communications Systems, Inc. Network extension groups of global VLANs in a fabric switch
CN104092661B (en) * 2014-06-10 2017-09-26 深信服科技股份有限公司 The communication means and device of virtual machine serial ports
US9742881B2 (en) 2014-06-30 2017-08-22 Nicira, Inc. Network virtualization using just-in-time distributed capability for classification encoding
US10291521B1 (en) * 2014-06-30 2019-05-14 Juniper Networks, Inc. Multi-chassis link aggregation groups with more than two chassis
CN105262685B (en) * 2014-07-14 2018-10-09 新华三技术有限公司 A kind of message processing method and device
US10616108B2 (en) 2014-07-29 2020-04-07 Avago Technologies International Sales Pte. Limited Scalable MAC address virtualization
US9544219B2 (en) 2014-07-31 2017-01-10 Brocade Communications Systems, Inc. Global VLAN services
US9807007B2 (en) 2014-08-11 2017-10-31 Brocade Communications Systems, Inc. Progressive MAC address learning
US9723008B2 (en) 2014-09-09 2017-08-01 Oracle International Corporation System and method for providing an integrated firewall for secure network communication in a multi-tenant environment
US10511458B2 (en) 2014-09-30 2019-12-17 Nicira, Inc. Virtual distributed bridging
US10020960B2 (en) 2014-09-30 2018-07-10 Nicira, Inc. Virtual distributed bridging
US10250443B2 (en) 2014-09-30 2019-04-02 Nicira, Inc. Using physical location to modify behavior of a distributed virtual network element
US9768980B2 (en) 2014-09-30 2017-09-19 Nicira, Inc. Virtual distributed bridging
US9524173B2 (en) 2014-10-09 2016-12-20 Brocade Communications Systems, Inc. Fast reboot for a switch
US9699029B2 (en) 2014-10-10 2017-07-04 Brocade Communications Systems, Inc. Distributed configuration management in a switch group
US9626255B2 (en) 2014-12-31 2017-04-18 Brocade Communications Systems, Inc. Online restoration of a switch snapshot
US9628407B2 (en) 2014-12-31 2017-04-18 Brocade Communications Systems, Inc. Multiple software versions in a switch group
US10003552B2 (en) 2015-01-05 2018-06-19 Brocade Communications Systems, Llc. Distributed bidirectional forwarding detection protocol (D-BFD) for cluster of interconnected switches
US9942097B2 (en) 2015-01-05 2018-04-10 Brocade Communications Systems LLC Power management in a network of interconnected switches
US10503442B2 (en) 2015-01-28 2019-12-10 Avago Technologies International Sales Pte. Limited Method and apparatus for registering and storing virtual machine unique information capabilities
US10437770B2 (en) * 2015-01-28 2019-10-08 Avago Technologies International Sales Pte. Limited Method and apparatus for providing virtual machine information to a network interface
US10079779B2 (en) 2015-01-30 2018-09-18 Nicira, Inc. Implementing logical router uplinks
US10193929B2 (en) 2015-03-13 2019-01-29 Varmour Networks, Inc. Methods and systems for improving analytics in distributed networks
US10038592B2 (en) 2015-03-17 2018-07-31 Brocade Communications Systems LLC Identifier assignment to a new switch in a switch group
US9807005B2 (en) 2015-03-17 2017-10-31 Brocade Communications Systems, Inc. Multi-fabric manager
US9380027B1 (en) 2015-03-30 2016-06-28 Varmour Networks, Inc. Conditional declarative policies
US10009381B2 (en) 2015-03-30 2018-06-26 Varmour Networks, Inc. System and method for threat-driven security policy controls
US10038628B2 (en) 2015-04-04 2018-07-31 Nicira, Inc. Route server mode for dynamic routing between logical and physical networks
US9967134B2 (en) 2015-04-06 2018-05-08 Nicira, Inc. Reduction of network churn based on differences in input state
US10579406B2 (en) 2015-04-08 2020-03-03 Avago Technologies International Sales Pte. Limited Dynamic orchestration of overlay tunnels
US9558029B2 (en) 2015-05-17 2017-01-31 Nicira, Inc. Logical processing for containers
US10361952B2 (en) 2015-06-30 2019-07-23 Nicira, Inc. Intermediate logical interfaces in a virtual distributed router environment
CN105007188A (en) * 2015-07-28 2015-10-28 上海斐讯数据通信技术有限公司 Method for configuring switches and applicable virtual switching network
US10439929B2 (en) 2015-07-31 2019-10-08 Avago Technologies International Sales Pte. Limited Graceful recovery of a multicast-enabled switch
US10230629B2 (en) 2015-08-11 2019-03-12 Nicira, Inc. Static route configuration for logical router
US10057157B2 (en) 2015-08-31 2018-08-21 Nicira, Inc. Automatically advertising NAT routes between logical routers
US9960987B2 (en) * 2015-09-01 2018-05-01 Dell Products, Lp System and method for using open source management modules on hardware switch elements
US10171303B2 (en) 2015-09-16 2019-01-01 Avago Technologies International Sales Pte. Limited IP-based interconnection of switches with a logical chassis
JP6591843B2 (en) * 2015-09-29 2019-10-16 APRESIA Systems株式会社 Relay device and relay system
US10204122B2 (en) 2015-09-30 2019-02-12 Nicira, Inc. Implementing an interface between tuple and message-driven control entities
US10095535B2 (en) 2015-10-31 2018-10-09 Nicira, Inc. Static route types for logical routers
US10078527B2 (en) 2015-11-01 2018-09-18 Nicira, Inc. Securing a managed forwarding element that operates within a data compute node
US10334041B2 (en) * 2015-11-23 2019-06-25 Intel Corporation Network interface device facilitating transaction assurance
US9912614B2 (en) 2015-12-07 2018-03-06 Brocade Communications Systems LLC Interconnection of switches based on hierarchical overlay tunneling
US10191758B2 (en) * 2015-12-09 2019-01-29 Varmour Networks, Inc. Directing data traffic between intra-server virtual machines
US9998371B2 (en) * 2015-12-16 2018-06-12 Nicira, Inc. Packet communication between container data compute nodes and a managed forwarding element
US10063469B2 (en) 2015-12-16 2018-08-28 Nicira, Inc. Forwarding element implementation for containers
US9680852B1 (en) 2016-01-29 2017-06-13 Varmour Networks, Inc. Recursive multi-layer examination for computer network security remediation
US9762599B2 (en) 2016-01-29 2017-09-12 Varmour Networks, Inc. Multi-node affinity-based examination for computer network security remediation
US9521115B1 (en) 2016-03-24 2016-12-13 Varmour Networks, Inc. Security policy generation using container metadata
US10333849B2 (en) 2016-04-28 2019-06-25 Nicira, Inc. Automatic configuration of logical routers on edge nodes
US10484515B2 (en) 2016-04-29 2019-11-19 Nicira, Inc. Implementing logical metadata proxy servers in logical networks
US10841273B2 (en) 2016-04-29 2020-11-17 Nicira, Inc. Implementing logical DHCP servers in logical networks
US11019167B2 (en) 2016-04-29 2021-05-25 Nicira, Inc. Management of update queues for network controller
US10091161B2 (en) 2016-04-30 2018-10-02 Nicira, Inc. Assignment of router ID for logical routers
US10560320B2 (en) 2016-06-29 2020-02-11 Nicira, Inc. Ranking of gateways in cluster
US10153973B2 (en) 2016-06-29 2018-12-11 Nicira, Inc. Installation of routing tables for logical router in route server mode
US10755334B2 (en) 2016-06-30 2020-08-25 Varmour Networks, Inc. Systems and methods for continually scoring and segmenting open opportunities using client data and product predictors
US10454758B2 (en) 2016-08-31 2019-10-22 Nicira, Inc. Edge node cluster network redundancy and fast convergence using an underlay anycast VTEP IP
US10341236B2 (en) 2016-09-30 2019-07-02 Nicira, Inc. Anycast edge service gateways
US10237090B2 (en) 2016-10-28 2019-03-19 Avago Technologies International Sales Pte. Limited Rule-based network identifier mapping
US10237123B2 (en) 2016-12-21 2019-03-19 Nicira, Inc. Dynamic recovery from a split-brain failure in edge nodes
US10212071B2 (en) 2016-12-21 2019-02-19 Nicira, Inc. Bypassing a load balancer in a return path of network traffic
US10742746B2 (en) 2016-12-21 2020-08-11 Nicira, Inc. Bypassing a load balancer in a return path of network traffic
US10616045B2 (en) 2016-12-22 2020-04-07 Nicira, Inc. Migration of centralized routing components of logical router
US11405335B2 (en) * 2017-01-13 2022-08-02 Nicira, Inc. Managing network traffic in virtual switches based on logical port identifiers
US10257152B2 (en) * 2017-03-10 2019-04-09 Nicira, Inc. Suppressing ARP broadcasting in a hypervisor
US10666766B2 (en) * 2017-04-05 2020-05-26 Cisco Technology, Inc. Application descriptive language for network gateways
US10637800B2 (en) 2017-06-30 2020-04-28 Nicira, Inc Replacement of logical network addresses with physical network addresses
US10681000B2 (en) 2017-06-30 2020-06-09 Nicira, Inc. Assignment of unique physical network addresses for logical network addresses
US10511459B2 (en) 2017-11-14 2019-12-17 Nicira, Inc. Selection of managed forwarding element for bridge spanning multiple datacenters
US10374827B2 (en) 2017-11-14 2019-08-06 Nicira, Inc. Identifier that maps to different networks at different datacenters
US10462912B1 (en) * 2017-12-21 2019-10-29 Klas Technologies Limited Tactical data center system
EP3620877A1 (en) * 2018-09-06 2020-03-11 Siemens Aktiengesellschaft Method for simulating a technical installation, apparatus, system, computer program and a computer program product
JP7010804B2 (en) * 2018-11-22 2022-01-26 株式会社東芝 Relay device, network system, relay method and program
US10931560B2 (en) 2018-11-23 2021-02-23 Vmware, Inc. Using route type to determine routing protocol behavior
US10797998B2 (en) 2018-12-05 2020-10-06 Vmware, Inc. Route server for distributed routers using hierarchical routing protocol
US10938788B2 (en) 2018-12-12 2021-03-02 Vmware, Inc. Static routes for policy-based VPN
US11711374B2 (en) 2019-05-31 2023-07-25 Varmour Networks, Inc. Systems and methods for understanding identity and organizational access to applications within an enterprise environment
US11575563B2 (en) 2019-05-31 2023-02-07 Varmour Networks, Inc. Cloud security management
US11290494B2 (en) 2019-05-31 2022-03-29 Varmour Networks, Inc. Reliability prediction for cloud security policies
US11310284B2 (en) 2019-05-31 2022-04-19 Varmour Networks, Inc. Validation of cloud security policies
US11290493B2 (en) 2019-05-31 2022-03-29 Varmour Networks, Inc. Template-driven intent-based security
US11863580B2 (en) 2019-05-31 2024-01-02 Varmour Networks, Inc. Modeling application dependencies to identify operational risk
CN110572487B (en) * 2019-08-21 2022-04-29 烽火通信科技股份有限公司 Method and system for virtualizing any port of switch
US11095480B2 (en) 2019-08-30 2021-08-17 Vmware, Inc. Traffic optimization using distributed edge services
CN111355805A (en) * 2020-03-06 2020-06-30 苏州浪潮智能科技有限公司 Network communication method, device, equipment and storage medium
US11616755B2 (en) 2020-07-16 2023-03-28 Vmware, Inc. Facilitating distributed SNAT service
US11606294B2 (en) 2020-07-16 2023-03-14 Vmware, Inc. Host computer configured to facilitate distributed SNAT service
US11611613B2 (en) 2020-07-24 2023-03-21 Vmware, Inc. Policy-based forwarding to a load balancer of a load balancing cluster
US11902050B2 (en) 2020-07-28 2024-02-13 VMware LLC Method for providing distributed gateway service at host computer
US11451413B2 (en) 2020-07-28 2022-09-20 Vmware, Inc. Method for advertising availability of distributed gateway service and machines at host computer
US11876817B2 (en) 2020-12-23 2024-01-16 Varmour Networks, Inc. Modeling queue-based message-oriented middleware relationships in a security system
US11818152B2 (en) 2020-12-23 2023-11-14 Varmour Networks, Inc. Modeling topic-based message-oriented middleware within a security system
CN114915580B (en) * 2021-01-28 2023-06-02 中国电信股份有限公司 Data packet routing method and system
US11777978B2 (en) 2021-01-29 2023-10-03 Varmour Networks, Inc. Methods and systems for accurately assessing application access risk
US11734316B2 (en) 2021-07-08 2023-08-22 Varmour Networks, Inc. Relationship-based search in a computing environment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020013802A1 (en) * 2000-07-26 2002-01-31 Toshiaki Mori Resource allocation method and system for virtual computer system
US6438612B1 (en) * 1998-09-11 2002-08-20 Ssh Communications Security, Ltd. Method and arrangement for secure tunneling of data between virtual routers
US20030037163A1 (en) * 2001-08-15 2003-02-20 Atsushi Kitada Method and system for enabling layer 2 transmission of IP data frame between user terminal and service provider
US20080002736A1 (en) * 2006-06-30 2008-01-03 Sun Microsystems, Inc. Virtual network interface cards with VLAN functionality

Family Cites Families (47)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2066538C (en) * 1991-07-09 1997-12-23 Brian David Bolliger Mobile-telephone system call processing arrangement
US5313454A (en) * 1992-04-01 1994-05-17 Stratacom, Inc. Congestion control for cell networks
US5793763A (en) 1995-11-03 1998-08-11 Cisco Technology, Inc. Security system for network address translation systems
US5959990A (en) * 1996-03-12 1999-09-28 Bay Networks, Inc. VLAN frame format
US6701361B1 (en) 1996-08-22 2004-03-02 Intermec Ip Corp. Enhanced mobility and address resolution in a wireless premises based network
US5970066A (en) * 1996-12-12 1999-10-19 Paradyne Corporation Virtual ethernet interface
US6847620B1 (en) 1999-05-13 2005-01-25 Intermec Ip Corp. Mobile virtual LAN
AU2001288640A1 (en) * 2000-09-01 2002-03-13 Tut Systems, Inc. A method and system to pre-compile configuration information for a data communications device
WO2002061599A1 (en) * 2001-01-25 2002-08-08 Crescent Networks, Inc. Extension of address resolution protocol (arp) for internet protocol (ip) virtual networks
US8713185B2 (en) 2001-12-07 2014-04-29 Rockstar Bidco, LP Methods of establishing virtual circuits and of providing a virtual private network service through a shared network, and provider edge device for such network
US7411980B2 (en) * 2001-12-14 2008-08-12 Broadcom Corporation Filtering and forwarding frames within an optical network
US20030145069A1 (en) 2002-01-31 2003-07-31 Lau Richard C. Virtual network configuration verification
US7006467B2 (en) * 2002-04-29 2006-02-28 Hereuare Communications, Inc. Method and system for simulating multiple independent client devices in a wired or wireless network
US7111303B2 (en) 2002-07-16 2006-09-19 International Business Machines Corporation Virtual machine operating system LAN
US7515592B2 (en) * 2002-10-07 2009-04-07 Broadcom Corporation Fast-path implementation for transparent LAN services using double tagging
CN1302642C (en) 2003-04-09 2007-02-28 华为技术有限公司 Group broadcast implementing method based on virtual local area network
US7356818B2 (en) 2003-06-24 2008-04-08 International Business Machines Corporation Virtual machine communicating to external device without going through other virtual machines by using a list of IP addresses managed only by a single virtual machine monitor
US7734736B2 (en) 2003-08-19 2010-06-08 Alcatel Lucent Configuring virtual LANs on layer 2
US8776050B2 (en) * 2003-08-20 2014-07-08 Oracle International Corporation Distributed virtual machine monitor for managing multiple virtual resources across multiple physical nodes
US7633937B2 (en) * 2003-09-19 2009-12-15 Cisco Technology, Inc. Methods and apparatus for switching between Metro Ethernet networks and external networks
KR100661637B1 (en) 2003-12-22 2006-12-27 한국전자통신연구원 System method for an environment execution to run multiple virtual machines on the mobile phone
US7565436B2 (en) * 2003-12-24 2009-07-21 Nortel Networks Limited Ethernet to frame relay interworking with multiple quality of service levels
US7283524B2 (en) * 2004-01-23 2007-10-16 Metro Packet Systems Inc. Method of sending a packet through a node
US7440467B2 (en) 2004-05-05 2008-10-21 Gigamon Systems Llc Asymmetric packet switch and a method of use
JP4373271B2 (en) 2004-05-14 2009-11-25 富士通株式会社 Method and program for grasping network configuration of virtual LAN in node network
JP2006005437A (en) * 2004-06-15 2006-01-05 Fujitsu Ltd Traffic distributed control unit
US7454748B2 (en) 2004-07-27 2008-11-18 Nokia Corporation System and method for specifying virtual machines
US7515589B2 (en) * 2004-08-27 2009-04-07 International Business Machines Corporation Method and apparatus for providing network virtualization
GB2418326B (en) 2004-09-17 2007-04-11 Hewlett Packard Development Co Network vitrualization
GB2419703A (en) * 2004-10-29 2006-05-03 Hewlett Packard Development Co Isolated virtual overlay infrastructures each having an interface to control interaction with others
GB2419702A (en) * 2004-10-29 2006-05-03 Hewlett Packard Development Co Virtual overlay infrastructures which can be suspended and later reactivated
US9043792B1 (en) * 2004-11-17 2015-05-26 Vmware, Inc. Virtual local area network (vlan) coordinator providing access to vlans
US8799891B2 (en) 2005-03-02 2014-08-05 Hewlett-Packard Development Company, L.P. System and method for attributing CPU usage of a virtual machine monitor to a corresponding virtual machine
US8194656B2 (en) * 2005-04-28 2012-06-05 Cisco Technology, Inc. Metro ethernet network with scaled broadcast and service instance domains
US20060294517A1 (en) 2005-06-28 2006-12-28 Zimmer Vincent J Network interface sharing among multiple virtual machines
JP4622835B2 (en) 2005-12-07 2011-02-02 株式会社日立製作所 Virtual computer system and network communication method thereof
US20070192518A1 (en) 2006-02-14 2007-08-16 Aarohi Communications, Inc., A California Corporation Apparatus for performing I/O sharing & virtualization
US7522595B2 (en) * 2006-06-16 2009-04-21 Cisco Technology, Inc. Communicating packets between forwarding contexts using virtual interfaces
US8116320B2 (en) 2006-08-07 2012-02-14 Adc Telecommunications, Inc. Mapping external port using virtual local area network
WO2008032885A1 (en) * 2006-09-13 2008-03-20 Kt Corporation Network intermediate apparatus and method for ubiquitous network and ubiquitous network system using the intermediary apparatus
US7657659B1 (en) * 2006-11-30 2010-02-02 Vmware, Inc. Partial copying of data to transmit buffer for virtual network device
US7921276B2 (en) 2007-03-21 2011-04-05 Intel Corporation Applying quality of service (QoS) to a translation lookaside buffer (TLB)
US8055789B2 (en) * 2007-03-27 2011-11-08 Amazon Technologies, Inc. Configuring intercommunications between computing nodes
US20080285437A1 (en) * 2007-05-18 2008-11-20 Adc Dsl Systems, Inc. Ethernet protection switching system
US20090025011A1 (en) 2007-07-17 2009-01-22 Tim Neil Inter-process communication at a mobile device
US8798056B2 (en) 2007-09-24 2014-08-05 Intel Corporation Method and system for virtual port communications
US9575786B2 (en) 2009-01-06 2017-02-21 Dell Products L.P. System and method for raw device mapping in traditional NAS subsystems

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6438612B1 (en) * 1998-09-11 2002-08-20 Ssh Communications Security, Ltd. Method and arrangement for secure tunneling of data between virtual routers
US20020013802A1 (en) * 2000-07-26 2002-01-31 Toshiaki Mori Resource allocation method and system for virtual computer system
US20030037163A1 (en) * 2001-08-15 2003-02-20 Atsushi Kitada Method and system for enabling layer 2 transmission of IP data frame between user terminal and service provider
US20080002736A1 (en) * 2006-06-30 2008-01-03 Sun Microsystems, Inc. Virtual network interface cards with VLAN functionality

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130219393A1 (en) * 2010-10-28 2013-08-22 Hewlett-Packard Development Company, L.P. Zoning data to a virtual machine
US9336032B2 (en) * 2010-10-28 2016-05-10 Hewlett Packard Enterprise Development Lp Zoning data to a virtual machine
CN107864126A (en) * 2017-10-30 2018-03-30 国云科技股份有限公司 A kind of cloud platform virtual network behavioral value method

Also Published As

Publication number Publication date
US8798056B2 (en) 2014-08-05
DE112008002550T5 (en) 2010-07-22
WO2009042397A1 (en) 2009-04-02
CN101809943B (en) 2014-04-02
US11716285B2 (en) 2023-08-01
US20090083445A1 (en) 2009-03-26
US20170149664A1 (en) 2017-05-25
DE112008002550B4 (en) 2019-10-17
CN103793359A (en) 2014-05-14
CN101809943A (en) 2010-08-18
CN103793359B (en) 2017-10-20
US20170147385A1 (en) 2017-05-25
US11711300B2 (en) 2023-07-25

Similar Documents

Publication Publication Date Title
US11716285B2 (en) Method and system for virtual port communications
US11516037B2 (en) Methods to optimize multicast routing in overlay networks
US10652129B2 (en) Specializing virtual network device processing to avoid interrupt processing for high packet rate applications
US8964600B2 (en) Methods of forming virtual network overlays
US10511528B2 (en) Fast software L2 switching using a caching technique
US8989187B2 (en) Method and system of scaling a cloud computing network
US9948579B1 (en) NIC-based packet assignment for virtual networks
US10057162B1 (en) Extending Virtual Routing and Forwarding at edge of VRF-aware network
US10616105B1 (en) Extending virtual routing and forwarding using source identifiers
US8929255B2 (en) System and method for input/output virtualization using virtualized switch aggregation zones
US11895030B2 (en) Scalable overlay multicast routing
US10581730B2 (en) Packet processing using service chains
US10877822B1 (en) Zero-copy packet transmission between virtualized computing instances
US11206212B2 (en) Disambiguating traffic in networking environments with multiple virtual routing and forwarding (VRF) logical routers
US20150139037A1 (en) Configuration of transparent interconnection of lots of links (trill) protocol enabled device ports in edge virtual bridging (evb) networks
US20200389399A1 (en) Packet handling in software-defined networking (sdn) environments
CN107547247B (en) IP address allocation method and device for three-layer management network in intelligent elastic architecture
CN110505095B (en) Method for building large-scale virtual data center by using small number of servers
Comer et al. DCnet: a data centre network architecture that supports live VM migration

Legal Events

Date Code Title Description
STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION