US20170331684A1 - System and method for network address administration and management in federataed cloud computing networks - Google Patents
System and method for network address administration and management in federataed cloud computing networks Download PDFInfo
- Publication number
- US20170331684A1 US20170331684A1 US15/607,665 US201715607665A US2017331684A1 US 20170331684 A1 US20170331684 A1 US 20170331684A1 US 201715607665 A US201715607665 A US 201715607665A US 2017331684 A1 US2017331684 A1 US 2017331684A1
- Authority
- US
- United States
- Prior art keywords
- network
- remote
- local
- cloud
- management
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000000034 method Methods 0.000 title claims abstract description 37
- 238000004891 communication Methods 0.000 description 40
- 238000007726 management method Methods 0.000 description 29
- 230000008569 process Effects 0.000 description 18
- 238000010586 diagram Methods 0.000 description 7
- 238000005516 engineering process Methods 0.000 description 5
- 230000000903 blocking effect Effects 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000013508 migration Methods 0.000 description 2
- 230000005012 migration Effects 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000000354 decomposition reaction Methods 0.000 description 1
- 239000004744 fabric Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000013468 resource allocation Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
- H04L41/0806—Configuration setting for initial configuration or provisioning, e.g. plug-and-play
- H04L41/0809—Plug-and-play configuration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0895—Configuration of virtualised networks or elements, e.g. virtualised network function or OpenFlow elements
-
- H04L61/2007—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/50—Address allocation
- H04L61/5007—Internet protocol [IP] addresses
-
- H04L61/2046—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/50—Address allocation
- H04L61/5046—Resolving address allocation conflicts; Testing of addresses
Definitions
- Cloud computing is the provision of dynamically scalable and often virtualized resources as a service over the Internet on a utility basis. Users do not have to have any knowledge of, expertise in, or control over the technology infrastructure in the “cloud” that supports them. Typically, users only pay for what they use, and can increase and decrease usage at any minute. Cloud computing services often provide common business applications online that are accessed from a web browser, while the software and data are stored on the servers.
- Cloud computing customers do not generally own the physical infrastructure serving as host to the software platform in question. They typically consume resources as a service and pay only for resources that they use.
- the majority of cloud computing infrastructures consist of reliable services delivered through data centers and built on servers employing various virtualization technologies. The services are accessible anywhere that provides access to networking infrastructure. Clouds often appear as single points of access for all consumers' computing needs.
- a virtual machine is a software abstraction of a physical computer system.
- Each VM may function as a self-contained platform, running its own guest operating system (OS) and guest software applications (processes).
- Virtualization software manages physical computer resources and redirects input/outputs (IO) from each VM running on the physical computing system from virtual devices provided by the virtualization software to underlying physical resources. Because VMs, as software constructs, are relatively easy to create, manage, and destroy, they are commonly used to provide computing resources in cloud computing environments.
- L2 layer-2
- IP Internet Protocol
- IP Internet Protocol
- the above solution may form new IP addresses for devices located in the remote cloud that are within the same range, as that of the devices that are located in local cloud before they expire due to lack of communication between the remotely located machine and the local machine.
- the above solution may not reserve leases or expire them on a remote cloud.
- the above solution may not generate reports for IP addresses rolled out at a remote cloud.
- the above solution may not delegate IPAM to remote server.
- the above solution may not support dynamic host configuration protocol (DHCP) and may not perform location aware packet routing (domain name system (DNS), Internet traffic steering, file transfer protocol (FTP), file share and the like).
- DNS domain name system
- FTP file transfer protocol
- FIG. 1 is a block diagram illustrating federated cloud computing networks including a system for performing network address allocation, administration and management, according to an example embodiment.
- FIG. 2 is a flow diagram of a process for performing network address allocation, administration and management in federated cloud computing networks, according to an example embodiment.
- FIG. 3 is a block diagram of a computing system for implementing network address allocation, administration and management in federated cloud computing networks, according to an example embodiment.
- Embodiments described herein provide enhanced computer- and network-based methods, techniques, and systems for performing network address allocation, administration and management in federated cloud computing networks.
- the network address allocation, administration and management of federated cloud computing networks includes redirecting all incoming packets with unclaimed network address by the local network services appliance to remote network services appliance and vice versa and sharing network address management information with remote network services appliance.
- the local and remote network service appliances can share, negotiate, broadcast internet protocol (IP) allocation requests to avoid allocating duplicate IPs, assign new network addresses to virtual machines (VMs) by requesting a network address from a master arbitrator, assign new network addresses to VMs by blocking an IP address from a delegated range and communicating it back to the master arbitrator, expire leases on relinquished network addresses or renew leases on existing network addresses, unallocate network address blocks for VMs that are no longer available/deleted/suspended/network interface card (NIC) deleted, address remote dynamic host configuration protocol (DHCP) requests, and perform location aware packet routing.
- IP internet protocol
- VMs virtual machines
- NIC network interface card
- DHCP remote dynamic host configuration protocol
- the master arbitrator frees network address blocks for VMs that are no longer available/deleted/suspended/NIC deleted.
- Example embodiments provide an admin/communication engine that performs at least some of the described techniques.
- the admin/communication engine registers NICs in the local network services appliance and the remote network services appliance with the local cloud network and remote cloud network, respectively, for redirecting the incoming packets with unclaimed network address to the remote network services appliance and vice versa.
- the admin/communication engine then forms a layer-2 (L2) network tunnel including a data channel and a control channel between the local network services appliance and the remote network services appliance by stitching the local cloud network and the remote cloud network upon registering the NICs in the local network services appliance and the remote network services appliance for performing the network address allocation, administration and management in the federated cloud computing networks via the formed control channel in the L2 network tunnel.
- the admin/communication engine may then obtain the incoming packets with unclaimed network address from the local cloud network and tunnel the obtained packets via the formed data channel in the L2 network tunnel to the remote network services appliance and vice versa.
- FIG. 1 is a block diagram illustrating system 100 for performing network address allocation, administration and management in federated cloud computing networks, according to an example embodiment.
- system 100 includes local cloud network 130 and remote cloud network 140 .
- Local cloud network 130 and remote cloud network 140 may be datacenters including both physical and virtual networks.
- local cloud network 130 and remote cloud network 140 include physical computing systems 115 A-N and 125 A-N hosting associated VMs 185 A-N and 190 A-N, respectively.
- local subnets 110 A-N and remote subnets 120 A-N are virtual networks overlaid on a physical network associated with VMs 185 A-N and 190 A-N, respectively .
- FIG. 1 is a block diagram illustrating system 100 for performing network address allocation, administration and management in federated cloud computing networks, according to an example embodiment.
- system 100 includes local cloud network 130 and remote cloud network 140 .
- Local cloud network 130 and remote cloud network 140 may be datacenters including both physical and virtual networks.
- each of local cloud network 130 and remote cloud network 140 includes virtual management software (VMS) 195 A and 195 B that is communicatively coupled to physical computing systems 115 A-N and 125 A-N hosting associated VMs 185 A-N and 190 A-N, respectively.
- VMS virtual management software
- local network services appliances 150 A-N are communicatively coupled between router 175 A and associated local subnets 110 A-N.
- remote network services appliances 160 A-N are communicatively coupled between router 175 B and associated remote subnets 120 A-N.
- Routers 175 A and 175 B may be realized as physical routers or virtual routers. Virtual routers may be realized as virtual appliances or virtual switches embedded with appropriate routing logic.
- local and remote network services appliances 150 A-N and 160 A-N include associated admin/communication engines 155 A-N and 165 A-N, respectively.
- admin/communication engines 155 A-N are shown acting as masters and admin/communication engines 165 A-N are shown acting as slaves, based on the operation, one can envision that the roles of masters and slaves can be vice versa.
- admin/communication engines 155 A-N and 165 A-N are exactly same and are capable of acting as masters and/or slaves based on the operational needs of system 100 .
- local and remote network services appliances 150 A-N and 160 A-N may be realized as physical appliances or virtual appliances.
- L2 network tunnel 170 including data and control channels communicatively couples local cloud network 130 and remote cloud network 140 via Internet (or network fabric) 180 by stitching local network services appliances 150 A-N and remote network services appliances 160 A-N.
- VMs 185 A-N and 190 A-N are part of virtual networks in the local subnets 110 A-N and remote subnets 120 A-N are communicatively connected to local network services appliances 150 A-N and remote network services appliances 160 A-N, respectively.
- 10.0.0.1 are virtual network addresses for network interface cards (NICs) 151 A-N are not visible outside of local subnets 110 A-N.
- Example L2 network tunnel 170 is a VLAN on a physical network.
- each of local network services appliances 150 A-N and remote network services appliance 160 A-N identifies all the other entities on the respective local subnets 110 A-N and remote subnets 120 A-N, respectively. Further each of local network services appliances 150 A-N and remote network services appliance 160 A-N is configured to receive multicast, unicast, and/or unknown unicast traffic for forwarding to any other network services appliance that may host the targeted VM according to the registration.
- each of VMs 185 A-N may reside on same or different physical hosts 115 A-N within local cloud network 130 . Similarly, each of VMs 190 A-N may reside on same or different physical hosts 125 A-N within remote cloud network 140 .
- admin/communication engines 155 A-N or 165 A-N residing in one of local or remote network services appliances, 150 A-N and 160 A-N, respectively, and acting as a master arbitrator, registers NICs 151 A-N and 161 A-N disposed in local network services appliances 150 A-N and remote network services appliances 160 A-N with local cloud network 130 and remote cloud network 140 , respectively.
- Registering a NIC to a network is well known in the art and may be performed using any of the well known registration processes.
- admin/communication engines 155 A-N or 165 A-N then configures local cloud network 130 and remote cloud network 140 to send packets with unclaimed network address to associated registered NICs 151 A-N and 161 A-N of local network services appliances 150 A-N and remote network services appliances 160 A-N.
- Configuring a network to send all the packets with unclaimed network address for example, a media access control (MAC) address, can be performed using various known techniques.
- MAC media access control
- a network switch connects all physical devices. For example, registering a NIC to a network typically means connecting the NIC of a physical machine to the network switch using an Ethernet cable. Network switches have ports for connecting the NICs via an Ethernet cable.
- each NIC may have a unique MAC address (also referred to as L2 address).
- L2 address also referred to as L2 address.
- Connecting a NIC to a network switch port via the Ethernet cable also means that the MAC address of the NIC is communicated to the network switch.
- This association of network switch's port and NIC's MAC address is also well known as MAC learning and a table in which this association information is stored in the network switch is generally referred to as a MAC learning table. Therefore, when a packet arrives at a network switch via any other network switch port and has a destination MAC address then it will be sent to the associated MC via the connected network switch port which the network switch has associated in the MAC learning table.
- any packet that comes to the network switch having a destination MAC address that the network switch has not learned is referred to as “packet with unclaimed MAC address”.
- the NIC, the network switch, ports of the network switch and the Ethernet cable are all virtual and configuring properties of the network, in such a virtual environment, typically refers to configuring properties of the network switch.
- VMware' s DVSTM Distributed Virtual Switch
- a switch port to which the MC of a computing device is connected may be set with this property.
- Admin/communication engines 155 A_N acting as the master arbitrator forms L2 network tunnel 170 including the data channel and the control channel between associated local network services appliances 150 A-N and remote network services appliances 160 A-N by stitching local cloud network 130 and remote cloud network 140 upon registering and configuring associated NICs 151 A-N and 161 A-N in local network services appliances 150 A-N and remote network services appliances 160 A-N.
- the process of stitching refers to the local edge router placing a packet, such as the one described above with reference to registering and configuring, over a formed tunnel, such as the L2 network tunnel 170 and sending it to a remote edge router.
- the remote edge router then sends the received packet to a remote network switch.
- the remote network switch learns the MAC address of that network device.
- the remote network switch receives the packet from the remote edge router it already knows that this packet needs to be sent via the associated port based on its associated MAC learning table. This is generally how a packet reaches from a physical machine in the local cloud network to a machine in the remote cloud network.
- Admin/communication engines 155 A-N acting as the master arbitrators then perform the network address allocation, administration and management in the federated cloud computing networks using the formed control channel of L2 network tunnel 170 via Internet 180 .
- Exemplary network address includes an IP address, a MAC address and the like.
- Exemplary control channel in the L2 network tunnel 170 includes a secure socket layer (SSL) virtual private network (VPN) tunnel and the like.
- Example local and remote network services appliance include an edge router, edge gateway and the like.
- formed L2 network tunnel 170 including the data channel and the control channel is capable of carrying both data signals and control signals for migrating VMs 185 A-N from local cloud network 130 to remote cloud network 140 .
- Example network address administration and management information includes IP address administration and management (IPAM) information and/or MAC address administration and management information.
- IPAM IP address administration and management
- each of admin/communication engines 155 A-N obtains the incoming packets with unclaimed network address from local cloud network 130 and tunnels the obtained packets, via the formed data channel in L2 network tunnel 170 , to associated one of remote network services appliances 160 A-N.
- each of admin/communication engines 155 B obtains the incoming packets with unclaimed network address from remote cloud network 140 and tunnels the obtained packets, via the formed data channel in L2 network tunnel 170 , to associated one of local network services appliances 150 A-N.
- one of local network services appliances 150 A-N and remote network services appliances 160 A-N taking on a master arbitrator role, shares, negotiates, and/or broadcasts network address allocation requests and ensures non-allocation of duplicate network addresses in local cloud network 130 and remote cloud network 140 via the control channel in L2 network tunnel 170 .
- the master arbitrator shares the network address administration and management information between local network services appliances 150 A-N and associated remote network services appliances 160 A-N via formed control channel in L2 network tunnel 170 .
- any of admin/communication engines 155 A N acting as the master arbitrator assigns new network addresses to VMs 185 A-N in local cloud network 130 and/or remote cloud network 140 upon receiving a request from associated one of remote network services appliances 160 A-N not acting as the master arbitrator.
- any of admin/communication engines 155 A_N acting as master arbitrator assigns new network addresses to VMs 185 A-N in local cloud network 130 and/or remote cloud network 140 by blocking a network address from a delegated range upon receiving a request from admin/communication engine 155 B residing in associated one of remote network services appliances 160 A-N not acting as the master arbitrator.
- any of admin/communication engines 155 A-N acting as the master arbitrator expires leases of relinquished network addresses and renews leases of any existing network addresses. Further in some embodiments, any of admin/communication engines 155 A-N acting as the master arbitrator unallocates network address blocks for VMs 185 A-N that are no longer available, deleted, suspended and/or for which the NIC deleted by the master arbitrator via the control channel in L2 network tunnel 170 .
- any of admin/communication engines 155 A-N acting as the master arbitrator addresses remote DHCP requests via the control channel in L2network tunnel 170 .
- any of admin/communication engines 155 A-N acting as the master arbitrator resolves names locally, if local domain name system (DNS) cache has a forwarding network, via the control channel in L2 network tunnel 170 .
- DNS domain name system
- any of admin/communication engines 155 A-N acting as the master arbitrator routes the packets to Internet 180 via a local Internet gateway.
- any of admin/communication engines 155 A-N acting as the master arbitrator routes file transfer protocol (FTP)/file share requests to an available local server.
- FTP file transfer protocol
- IP allocation and expiration can be implemented using well known protocols.
- the term “physical computing system” may be used interchangeably with “physical machine” or “physical device”.
- the terms “local cloud network” and “remote cloud network” are well-known and that equivalent terms such as “local data center” and “remote data center”, respectively, could be substituted.
- equivalent terms in the field of system virtualization or similar or related fields could be substituted for such terms as “physical computer,” “hypervisor,” “virtual machine,” or the like.
- the terms “data channel” and “control channel” may be used interchangeably with “data path” and “control path” and “data signal” and “control signal”, respectively.
- FIG. 2 is a flow diagram of a process 200 for performing network address allocation, administration and management in federated cloud computing networks, according to an example embodiment.
- FIG. 2 illustrates the network address allocation, administration and management in the federated cloud computing networks that may be performed by, for example, one or more modules of an admin/communication engine described above.
- the illustrated process 200 dynamically and/or statically allocates, administers, and manages network address in the federated cloud computing networks.
- process 200 registers NICs in a local network services appliance and a remote network services appliance with a local cloud network and a remote cloud network, respectively.
- the local and remote network services appliances include an edge router, edge gateway and the like.
- the local cloud network and the remote cloud network have one or more physical computing systems hosting multiple VMs.
- process 200 configures the local cloud network and the remote cloud network to send incoming packets with unclaimed network address to the associated registered NICs in the local network services appliance and the remote network services appliance.
- process 200 forms a L2 network tunnel including a data channel and a control channel between the local network services appliance and the remote network services appliance by stitching the local cloud network and the remote cloud network upon registering and configuring the NICs in the local network services appliance and the remote network services appliance.
- process 200 performs the network address allocation, administration and management in the federated cloud computing networks using the formed control channel in the L2 network tunnel.
- Exemplary network address includes an IP address, a MAC address and the like.
- Exemplary control channel in the L2 network tunnel includes a SSL VPN tunnel and the like.
- the formed L2 network tunnel including the data channel and the control channel is capable of carrying both data signals and control signals.
- the L2 network tunnel including the data channel and the control channel facilitates migration of VMs from the local cloud network to the remote cloud network. Further, allows allocation, administration, and management of the VMs between the local cloud network and the remote cloud network.
- Exemplary network address administration and management information includes IP address administration and management (IPAM) information and/or media access control (MAC) address administration and management information.
- IPAM IP address administration and management
- MAC media access control
- Process 200 may perform additional operations. For example, after block 208 , according to process 200 , the admin/communication engine obtains the incoming packets with unclaimed network address from the local cloud network and tunnels the obtained packets, via the formed data channel in the L2 network tunnel, to the remote network services appliance by the local network services appliance. Similarly, accordingly to process 200 , the admin/communication engine obtains the incoming packets with unclaimed network address from the remote cloud network and tunnels the obtained packets, via the formed data channel in the L2 network tunnel, to the local network services appliance by the remote network services appliance.
- process 200 may assign a master arbitrator role to one of the local network services appliance and the remote network services appliance for sharing, negotiating, and/or broadcasting network address allocation requests and for ensuring non-allocation of duplicate network addresses in the local cloud network and the remote cloud network via the control channel in the L2 network tunnel.
- process 200 may share the network address administration and management information between the local network services appliance and the remote network services appliance via the formed control channel in the L2 network tunnel.
- Process 200 for performing network address allocation, administration and management in the federated cloud computing networks is explained in more detail above with reference to the system diagram in FIG. 1 .
- FIG. 3 is block diagram 300 of an example computing system for performing network address allocation, administration and management in federated cloud computing networks, according to an example embodiment.
- FIG. 3 shows computing system 302 that may be utilized to implement admin/communication engine 155 (e.g., admin/communication engines 155 A and 155 B shown in FIG. 1 ).
- the admin/communication engine 155 may be implemented in software, hardware, firmware, or in some combination to achieve the capabilities described herein.
- computing system 302 may comprise computer memory (“memory”) 304 , display 306 , one or more central processing units (“CPU”) 308 , Input/Output devices 310 (e.g., a keyboard, a mouse, etc.), other computer-readable media 312 , and network connections 314 .
- Admin/communication engine 155 is shown residing in memory 304 .
- the components of admin/communication engine 155 may execute on one or more CPUs 308 and implement techniques described herein.
- Other code or programs 318 e.g., an administrative interface, a Web server, and the like
- data repositories such as data store 316
- One or more of the components in FIG. 3 may not be present in any specific implementation. For example, some embodiments may not provide other computer readable media 312 or display 306 .
- Admin/communication engine 155 interacts via network 320 with client devices 322 , physical computers 326 , and/or third-party systems/applications 324 .
- the third-party systems/applications 355 may include any systems that provide data to, or utilize data from, admin/communication engine 155 , including remote management/monitoring consoles, performance profilers, activity trackers, or the like.
- admin/communication engine 155 dynamically allocates, administers, and manages network address in federated cloud computing network ( FIG. 1 ) amongst multiple VMs executing thereon.
- the architecture shown in FIG. 3 may in some embodiments be partially or fully virtualized.
- computer system 302 may be one or possibly many VMs executing on physical hardware and managed by a hypervisor, virtual machine monitor, or similar technology.
- physical computers 326 may include virtualization logic to manage multiple VMs.
- components/modules of admin/communication engine 155 are implemented using standard programming techniques.
- admin/communication engine 155 may be implemented as instructions processed by a VM that executes as one of other programs 318 .
- admin/communication engine 155 may be implemented or provided in other manners, such as at least partially in firmware and/or hardware, including, but not limited to one or more application-specific integrated circuits (“ASICs”), standard integrated circuits, controllers executing appropriate instructions, and including microcontrollers and/or embedded controllers, field-programmable gate arrays (“FPGAs”), complex programmable logic devices (“CPLDs”), and the like.
- ASICs application-specific integrated circuits
- FPGAs field-programmable gate arrays
- CPLDs complex programmable logic devices
- system components and/or data structures may also be stored as contents (e.g., as executable or other machine-readable software instructions or structured data) on a computer-readable medium (e.g., as a hard disk; a memory; a computer network or cellular wireless network or other data transmission medium; or a portable media article to be read by an appropriate drive or via an appropriate connection, such as a DVD or flash memory device) so as to enable or configure the computer-readable medium and/or one or more associated computing systems or devices to execute or otherwise use or provide the contents to perform at least some of the described techniques.
- a computer-readable medium e.g., as a hard disk; a memory; a computer network or cellular wireless network or other data transmission medium; or a portable media article to be read by an appropriate drive or via an appropriate connection, such as a DVD or flash memory device
- the methods, techniques, and systems for dynamic resource allocation are applicable to other architectures or in other settings.
- the described techniques may be employed as part of a cloud-based computing resource offering, wherein customers may pay to have higher importance levels associated with their activities, in order to obtain higher levels of service or availability.
- the described techniques may be employed to allocate resources or schedule CPU time at the process level within an operating system.
- the methods, techniques, and systems discussed herein are applicable to differing protocols, communication media (optical, wireless, cable, etc.) and devices (e.g., desktop computers, wireless handsets, electronic organizers, personal digital assistants, tablet computers, portable email machines, game machines, pagers, navigation devices, etc.).
- devices e.g., desktop computers, wireless handsets, electronic organizers, personal digital assistants, tablet computers, portable email machines, game machines, pagers, navigation devices, etc.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Techniques for performing network address allocation, administration and management in federated cloud computing networks are described. In one example embodiment, network interface cards (NICs) in a local network services appliance and a remote network services appliance register with an associated local network cloud and remote network cloud in the federated cloud computing networks. The local cloud network and the remote cloud network are then configured to send packets with unclaimed network address to the associated registered NICs. A layer-2 (L2) network tunnel including a data channel and a control channel is then formed between the local network services appliance and the remote network services appliance by stitching the local cloud network and the remote cloud network. Network address allocation, administration and management in the federated cloud computing networks are then performed using the formed L2 network tunnel.
Description
- This application is a continuation of U.S. patent application Ser. No. 14/014,389, entitled “Configuration Management of Distributed Virtual Switch”, filed Aug. 30, 2013, the entirety of which is incorporated herein by reference.
- Federated computing is an approach to an enterprise architecture that allows interoperability between semi-autonomous decentralized lines of businesses, information technology systems, and applications. Typically, this is achieved by coordinated sharing and exchange of information which is organized by models, which describe common concepts and behavior. A federated cloud computing is the deployment and management of multiple external and internal services to match business needs. A federation is a union of several smaller parts that perform a common action.
- Cloud computing is the provision of dynamically scalable and often virtualized resources as a service over the Internet on a utility basis. Users do not have to have any knowledge of, expertise in, or control over the technology infrastructure in the “cloud” that supports them. Typically, users only pay for what they use, and can increase and decrease usage at any minute. Cloud computing services often provide common business applications online that are accessed from a web browser, while the software and data are stored on the servers.
- Cloud computing customers do not generally own the physical infrastructure serving as host to the software platform in question. They typically consume resources as a service and pay only for resources that they use. The majority of cloud computing infrastructures consist of reliable services delivered through data centers and built on servers employing various virtualization technologies. The services are accessible anywhere that provides access to networking infrastructure. Clouds often appear as single points of access for all consumers' computing needs.
- A virtual machine (VM) is a software abstraction of a physical computer system. Each VM may function as a self-contained platform, running its own guest operating system (OS) and guest software applications (processes). Virtualization software manages physical computer resources and redirects input/outputs (IO) from each VM running on the physical computing system from virtual devices provided by the virtualization software to underlying physical resources. Because VMs, as software constructs, are relatively easy to create, manage, and destroy, they are commonly used to provide computing resources in cloud computing environments.
- Existing technology allows VMs to migrate from one cloud to the other. Each cloud is a collection of managed infrastructure supporting deployment and management of workloads such as VMs. One current solution establishes a layer-2 (L2) network tunnel between a private cloud and a public cloud, referred to as a stitched L2 network for inter-cloud VM workload migration. However, such a stitched network may not perform the needed Internet protocol allocation, Internet Protocol administration and management (IPAM), which can result in Internet protocol (IP) conflicts and/or duplicate IP addresses. Further, the above solution may form new IP addresses for devices located in the remote cloud that are within the same range, as that of the devices that are located in local cloud before they expire due to lack of communication between the remotely located machine and the local machine. Furthermore, the above solution may not reserve leases or expire them on a remote cloud. In addition, the above solution may not generate reports for IP addresses rolled out at a remote cloud. Also, the above solution may not delegate IPAM to remote server. Moreover, the above solution may not support dynamic host configuration protocol (DHCP) and may not perform location aware packet routing (domain name system (DNS), Internet traffic steering, file transfer protocol (FTP), file share and the like).
-
FIG. 1 is a block diagram illustrating federated cloud computing networks including a system for performing network address allocation, administration and management, according to an example embodiment. -
FIG. 2 is a flow diagram of a process for performing network address allocation, administration and management in federated cloud computing networks, according to an example embodiment. -
FIG. 3 is a block diagram of a computing system for implementing network address allocation, administration and management in federated cloud computing networks, according to an example embodiment. - Embodiments described herein provide enhanced computer- and network-based methods, techniques, and systems for performing network address allocation, administration and management in federated cloud computing networks. The network address allocation, administration and management of federated cloud computing networks includes redirecting all incoming packets with unclaimed network address by the local network services appliance to remote network services appliance and vice versa and sharing network address management information with remote network services appliance. Further, the local and remote network service appliances can share, negotiate, broadcast internet protocol (IP) allocation requests to avoid allocating duplicate IPs, assign new network addresses to virtual machines (VMs) by requesting a network address from a master arbitrator, assign new network addresses to VMs by blocking an IP address from a delegated range and communicating it back to the master arbitrator, expire leases on relinquished network addresses or renew leases on existing network addresses, unallocate network address blocks for VMs that are no longer available/deleted/suspended/network interface card (NIC) deleted, address remote dynamic host configuration protocol (DHCP) requests, and perform location aware packet routing. In this embodiment, the master arbitrator frees network address blocks for VMs that are no longer available/deleted/suspended/NIC deleted.
- Example embodiments provide an admin/communication engine that performs at least some of the described techniques. In one embodiment, the admin/communication engine registers NICs in the local network services appliance and the remote network services appliance with the local cloud network and remote cloud network, respectively, for redirecting the incoming packets with unclaimed network address to the remote network services appliance and vice versa. The admin/communication engine then forms a layer-2 (L2) network tunnel including a data channel and a control channel between the local network services appliance and the remote network services appliance by stitching the local cloud network and the remote cloud network upon registering the NICs in the local network services appliance and the remote network services appliance for performing the network address allocation, administration and management in the federated cloud computing networks via the formed control channel in the L2 network tunnel. The admin/communication engine may then obtain the incoming packets with unclaimed network address from the local cloud network and tunnel the obtained packets via the formed data channel in the L2 network tunnel to the remote network services appliance and vice versa.
-
FIG. 1 is a blockdiagram illustrating system 100 for performing network address allocation, administration and management in federated cloud computing networks, according to an example embodiment. As shown inFIG. 1 ,system 100 includeslocal cloud network 130 andremote cloud network 140.Local cloud network 130 andremote cloud network 140 may be datacenters including both physical and virtual networks. Further as shown inFIG. 1 local cloud network 130 andremote cloud network 140 includephysical computing systems 115A-N and 125 A-N hosting associatedVMs 185A-N and 190 A-N, respectively. Further as shown inFIG. 1 , local subnets 110 A-N and remote subnets 120 A-N are virtual networks overlaid on a physical network associated with VMs 185 A-N and 190 A-N, respectively . Furthermore as shown inFIG. 1 , each oflocal cloud network 130 andremote cloud network 140 includes virtual management software (VMS) 195 A and 195B that is communicatively coupled tophysical computing systems 115A-N and 125 A-N hosting associatedVMs 185A-N and 190 A-N, respectively. - Also as shown in
FIG. 1 , localnetwork services appliances 150A-N are communicatively coupled betweenrouter 175A and associated local subnets 110 A-N. Furthermore as shown inFIG. 1 , remote network services appliances 160 A-N are communicatively coupled betweenrouter 175B and associated remote subnets 120 A-N.Routers FIG. 1 , local and remote network services appliances 150 A-N and 160 A-N include associated admin/communication engines 155A-N and 165 A-N, respectively. Although in the example embodiment shown inFIG. 1 , admin/communication engines 155A-N are shown acting as masters and admin/communication engines 165 A-N are shown acting as slaves, based on the operation, one can envision that the roles of masters and slaves can be vice versa. Moreover, in one embodiment, admin/communication engines 155A-N and 165 A-N are exactly same and are capable of acting as masters and/or slaves based on the operational needs ofsystem 100. Also, one skilled in the art can envision that local and remote network services appliances 150 A-N and 160 A-N may be realized as physical appliances or virtual appliances. - In addition as shown in
FIG. 1 ,L2 network tunnel 170 including data and control channels (not separately shown) communicatively coupleslocal cloud network 130 andremote cloud network 140 via Internet (or network fabric) 180 by stitching local network services appliances 150 A-N and remote network services appliances 160 A-N. Moreover VMs 185 A-N and 190 A-N are part of virtual networks in the local subnets 110 A-N and remote subnets 120 A-N are communicatively connected to local network services appliances 150 A-N and remote network services appliances 160 A-N, respectively. For example, as shown inFIG. 1 , 10.0.0.1 are virtual network addresses for network interface cards (NICs) 151 A-N are not visible outside of local subnets 110 A-N. In this example, for one VM to send a packet to another VM, which has an IP address 10.0.0.0/24 in each of local subnets 110 A-N, the packet needs to be wrapped in an outer packet by associated local network services appliances 150 A-N. Further in this example, the local network services appliances 150 A-N encapsulates outgoing packets and de-encapsulates incoming packets, so that the VMs 185 A-N only see the virtual network in local subnets 110 A-N although, the physical locations of the VMs 185 A-N may be completely arbitrary. ExampleL2 network tunnel 170 is a VLAN on a physical network. Furthermore in this example, each of local network services appliances 150 A-N and remote network services appliance 160 A-N identifies all the other entities on the respective local subnets 110 A-N and remote subnets 120 A-N, respectively. Further each of local network services appliances 150 A-N and remote network services appliance 160 A-N is configured to receive multicast, unicast, and/or unknown unicast traffic for forwarding to any other network services appliance that may host the targeted VM according to the registration. In addition, each of VMs 185 A-N may reside on same or different physical hosts 115 A-N withinlocal cloud network 130. Similarly, each of VMs 190 A-N may reside on same or different physical hosts 125 A-N withinremote cloud network 140. - In operation, admin/
communication engines 155A-N or 165 A-N residing in one of local or remote network services appliances, 150 A-N and 160 A-N, respectively, and acting as a master arbitrator, registers NICs 151 A-N and 161 A-N disposed in local network services appliances 150 A-N and remote network services appliances 160 A-N withlocal cloud network 130 andremote cloud network 140, respectively. Registering a NIC to a network is well known in the art and may be performed using any of the well known registration processes. - Further in operation, admin/
communication engines 155A-N or 165 A-N then configureslocal cloud network 130 andremote cloud network 140 to send packets with unclaimed network address to associated registered NICs 151 A-N and 161 A-N of local network services appliances 150 A-N and remote network services appliances 160 A-N. Configuring a network to send all the packets with unclaimed network address, for example, a media access control (MAC) address, can be performed using various known techniques. In a network, a network switch connects all physical devices. For example, registering a NIC to a network typically means connecting the NIC of a physical machine to the network switch using an Ethernet cable. Network switches have ports for connecting the NICs via an Ethernet cable. Typically, each NIC may have a unique MAC address (also referred to as L2 address). Connecting a NIC to a network switch port via the Ethernet cable also means that the MAC address of the NIC is communicated to the network switch. This association of network switch's port and NIC's MAC address is also well known as MAC learning and a table in which this association information is stored in the network switch is generally referred to as a MAC learning table. Therefore, when a packet arrives at a network switch via any other network switch port and has a destination MAC address then it will be sent to the associated MC via the connected network switch port which the network switch has associated in the MAC learning table. Any packet that comes to the network switch having a destination MAC address that the network switch has not learned is referred to as “packet with unclaimed MAC address”. In a virtual environment, the NIC, the network switch, ports of the network switch and the Ethernet cable are all virtual and configuring properties of the network, in such a virtual environment, typically refers to configuring properties of the network switch. For example, VMware' s DVSTM (Distributed Virtual Switch) provides a property called as “SINK PORT”. A switch port to which the MC of a computing device is connected may be set with this property. When a packet with unclaimed MAC address arrives at the network switch, the packet is then sent to the port to which SINK PORT property is set to “true” state. - Admin/communication engines 155A_N acting as the master arbitrator forms
L2 network tunnel 170 including the data channel and the control channel between associated local network services appliances 150 A-N and remote network services appliances 160 A-N by stitchinglocal cloud network 130 andremote cloud network 140 upon registering and configuring associated NICs 151 A-N and 161 A-N in local network services appliances 150 A-N and remote network services appliances 160 A-N. The process of stitching refers to the local edge router placing a packet, such as the one described above with reference to registering and configuring, over a formed tunnel, such as theL2 network tunnel 170 and sending it to a remote edge router. The remote edge router then sends the received packet to a remote network switch. If there is a network device including a NIC having a MAC address same as the destination MAC address in the packet, the remote network switch learns the MAC address of that network device. When the remote network switch receives the packet from the remote edge router it already knows that this packet needs to be sent via the associated port based on its associated MAC learning table. This is generally how a packet reaches from a physical machine in the local cloud network to a machine in the remote cloud network. - Admin/
communication engines 155A-N acting as the master arbitrators then perform the network address allocation, administration and management in the federated cloud computing networks using the formed control channel ofL2 network tunnel 170 via Internet 180. Exemplary network address includes an IP address, a MAC address and the like. Exemplary control channel in theL2 network tunnel 170 includes a secure socket layer (SSL) virtual private network (VPN) tunnel and the like. Example local and remote network services appliance include an edge router, edge gateway and the like. For example, formedL2 network tunnel 170 including the data channel and the control channel is capable of carrying both data signals and control signals for migrating VMs 185 A-N fromlocal cloud network 130 toremote cloud network 140. Further, admin/communication engines 155A-N acting as the master arbitrators allow allocation, administration, and management of VMs VM1-VMN betweenlocal cloud network 130 andremote cloud network 140. Example network address administration and management information includes IP address administration and management (IPAM) information and/or MAC address administration and management information. - Further in operation, each of admin/
communication engines 155A-N obtains the incoming packets with unclaimed network address fromlocal cloud network 130 and tunnels the obtained packets, via the formed data channel inL2 network tunnel 170, to associated one of remote network services appliances 160 A-N. Similarly, each of admin/communication engines 155B obtains the incoming packets with unclaimed network address fromremote cloud network 140 and tunnels the obtained packets, via the formed data channel inL2 network tunnel 170, to associated one of local network services appliances 150 A-N. - Furthermore in operation, one of local network services appliances 150 A-N and remote network services appliances 160 A-N taking on a master arbitrator role, shares, negotiates, and/or broadcasts network address allocation requests and ensures non-allocation of duplicate network addresses in
local cloud network 130 andremote cloud network 140 via the control channel inL2 network tunnel 170. In some embodiments, the master arbitrator shares the network address administration and management information between local network services appliances 150 A-N and associated remote network services appliances 160 A-N via formed control channel inL2 network tunnel 170. - In some embodiments, any of admin/
communication engines 155A N acting as the master arbitrator assigns new network addresses to VMs 185 A-N inlocal cloud network 130 and/orremote cloud network 140 upon receiving a request from associated one of remote network services appliances 160 A-N not acting as the master arbitrator. - In some embodiments, any of admin/communication engines 155A_N acting as master arbitrator assigns new network addresses to VMs 185 A-N in
local cloud network 130 and/orremote cloud network 140 by blocking a network address from a delegated range upon receiving a request from admin/communication engine 155B residing in associated one of remote network services appliances 160 A-N not acting as the master arbitrator. - In some embodiments, any of admin/
communication engines 155A-N acting as the master arbitrator expires leases of relinquished network addresses and renews leases of any existing network addresses. Further in some embodiments, any of admin/communication engines 155A-N acting as the master arbitrator unallocates network address blocks for VMs 185 A-N that are no longer available, deleted, suspended and/or for which the NIC deleted by the master arbitrator via the control channel inL2 network tunnel 170. - Furthermore in some embodiments, any of admin/
communication engines 155A-N acting as the master arbitrator addresses remote DHCP requests via the control channel inL2network tunnel 170. Also in some embodiments, any of admin/communication engines 155A-N acting as the master arbitrator resolves names locally, if local domain name system (DNS) cache has a forwarding network, via the control channel inL2 network tunnel 170. In addition, any of admin/communication engines 155A-N acting as the master arbitrator routes the packets to Internet 180 via a local Internet gateway. Also in these embodiments, any of admin/communication engines 155A-N acting as the master arbitrator routes file transfer protocol (FTP)/file share requests to an available local server. - One skilled in the art can envision that the above described IP allocation and expiration, DNS resolution, addressing DHCP requests and the like can be implemented using well known protocols.
- Also, although certain terms are used primarily herein, other terms could be used interchangeably to yield equivalent embodiments and examples. For example, the term “physical computing system” may be used interchangeably with “physical machine” or “physical device”. Likewise, the terms “local cloud network” and “remote cloud network” are well-known and that equivalent terms such as “local data center” and “remote data center”, respectively, could be substituted. Further for example, it is well-known that equivalent terms in the field of system virtualization or similar or related fields could be substituted for such terms as “physical computer,” “hypervisor,” “virtual machine,” or the like. Further, the terms “data channel” and “control channel” may be used interchangeably with “data path” and “control path” and “data signal” and “control signal”, respectively.
- Numerous specific details are set forth herein, such as data formats and code sequences, and the like, in order to provide a thorough understanding of the described techniques. The embodiments described also can be practiced without some of the specific details described herein, or with other specific details, such as changes with respect to the ordering of the logic, different logic, different architectures, or the like. Thus, the scopes of the techniques and/or functions described are not limited by the particular order, selection, or decomposition of aspects described with reference to any particular routine, module, component, or the like.
-
FIG. 2 is a flow diagram of aprocess 200 for performing network address allocation, administration and management in federated cloud computing networks, according to an example embodiment.FIG. 2 illustrates the network address allocation, administration and management in the federated cloud computing networks that may be performed by, for example, one or more modules of an admin/communication engine described above. The illustratedprocess 200 dynamically and/or statically allocates, administers, and manages network address in the federated cloud computing networks. - At
block 202,process 200 registers NICs in a local network services appliance and a remote network services appliance with a local cloud network and a remote cloud network, respectively. For example, the local and remote network services appliances include an edge router, edge gateway and the like. In one example, the local cloud network and the remote cloud network have one or more physical computing systems hosting multiple VMs. - At
block 204,process 200 configures the local cloud network and the remote cloud network to send incoming packets with unclaimed network address to the associated registered NICs in the local network services appliance and the remote network services appliance. - At
block 206,process 200 forms a L2 network tunnel including a data channel and a control channel between the local network services appliance and the remote network services appliance by stitching the local cloud network and the remote cloud network upon registering and configuring the NICs in the local network services appliance and the remote network services appliance. - At
block 208,process 200 performs the network address allocation, administration and management in the federated cloud computing networks using the formed control channel in the L2 network tunnel. Exemplary network address includes an IP address, a MAC address and the like. Exemplary control channel in the L2 network tunnel includes a SSL VPN tunnel and the like. For example, the formed L2 network tunnel including the data channel and the control channel is capable of carrying both data signals and control signals. The L2 network tunnel including the data channel and the control channel facilitates migration of VMs from the local cloud network to the remote cloud network. Further, allows allocation, administration, and management of the VMs between the local cloud network and the remote cloud network. Exemplary network address administration and management information includes IP address administration and management (IPAM) information and/or media access control (MAC) address administration and management information. -
Process 200 may perform additional operations. For example, afterblock 208, according toprocess 200, the admin/communication engine obtains the incoming packets with unclaimed network address from the local cloud network and tunnels the obtained packets, via the formed data channel in the L2 network tunnel, to the remote network services appliance by the local network services appliance. Similarly, accordingly to process 200, the admin/communication engine obtains the incoming packets with unclaimed network address from the remote cloud network and tunnels the obtained packets, via the formed data channel in the L2 network tunnel, to the local network services appliance by the remote network services appliance. - As another example,
process 200 may assign a master arbitrator role to one of the local network services appliance and the remote network services appliance for sharing, negotiating, and/or broadcasting network address allocation requests and for ensuring non-allocation of duplicate network addresses in the local cloud network and the remote cloud network via the control channel in the L2 network tunnel. As another example,process 200 may share the network address administration and management information between the local network services appliance and the remote network services appliance via the formed control channel in the L2 network tunnel. -
Process 200 for performing network address allocation, administration and management in the federated cloud computing networks is explained in more detail above with reference to the system diagram inFIG. 1 . -
FIG. 3 is block diagram 300 of an example computing system for performing network address allocation, administration and management in federated cloud computing networks, according to an example embodiment. In particular,FIG. 3 showscomputing system 302 that may be utilized to implement admin/communication engine 155 (e.g., admin/communication engines FIG. 1 ). The admin/communication engine 155 may be implemented in software, hardware, firmware, or in some combination to achieve the capabilities described herein. - In the embodiment shown,
computing system 302 may comprise computer memory (“memory”) 304,display 306, one or more central processing units (“CPU”) 308, Input/Output devices 310 (e.g., a keyboard, a mouse, etc.), other computer-readable media 312, andnetwork connections 314. Admin/communication engine 155 is shown residing inmemory 304. The components of admin/communication engine 155 may execute on one ormore CPUs 308 and implement techniques described herein. Other code or programs 318 (e.g., an administrative interface, a Web server, and the like) and potentially other data repositories, such asdata store 316, may also reside inmemory 304, and execute on one ormore CPUs 308. One or more of the components inFIG. 3 may not be present in any specific implementation. For example, some embodiments may not provide other computerreadable media 312 ordisplay 306. - Admin/communication engine 155 interacts via
network 320 withclient devices 322,physical computers 326, and/or third-party systems/applications 324. The third-party systems/applications 355 may include any systems that provide data to, or utilize data from, admin/communication engine 155, including remote management/monitoring consoles, performance profilers, activity trackers, or the like. - As discussed, admin/communication engine 155 dynamically allocates, administers, and manages network address in federated cloud computing network (
FIG. 1 ) amongst multiple VMs executing thereon. - The architecture shown in
FIG. 3 may in some embodiments be partially or fully virtualized. For example,computer system 302 may be one or possibly many VMs executing on physical hardware and managed by a hypervisor, virtual machine monitor, or similar technology. Also,physical computers 326 may include virtualization logic to manage multiple VMs. - In an example embodiment, components/modules of admin/communication engine 155 are implemented using standard programming techniques. In other embodiments, admin/communication engine 155 may be implemented as instructions processed by a VM that executes as one of
other programs 318. - Furthermore, in some embodiments, some or all of the components of admin/communication engine 155 may be implemented or provided in other manners, such as at least partially in firmware and/or hardware, including, but not limited to one or more application-specific integrated circuits (“ASICs”), standard integrated circuits, controllers executing appropriate instructions, and including microcontrollers and/or embedded controllers, field-programmable gate arrays (“FPGAs”), complex programmable logic devices (“CPLDs”), and the like. Some or all of the system components and/or data structures may also be stored as contents (e.g., as executable or other machine-readable software instructions or structured data) on a computer-readable medium (e.g., as a hard disk; a memory; a computer network or cellular wireless network or other data transmission medium; or a portable media article to be read by an appropriate drive or via an appropriate connection, such as a DVD or flash memory device) so as to enable or configure the computer-readable medium and/or one or more associated computing systems or devices to execute or otherwise use or provide the contents to perform at least some of the described techniques.
- Further, from the foregoing it will be appreciated that, although specific embodiments have been described herein for purposes of illustration, various modifications may be made without deviating from the spirit and scope of this disclosure. For example, the methods, techniques, and systems for dynamic resource allocation are applicable to other architectures or in other settings. For example, the described techniques may be employed as part of a cloud-based computing resource offering, wherein customers may pay to have higher importance levels associated with their activities, in order to obtain higher levels of service or availability. As another example, the described techniques may be employed to allocate resources or schedule CPU time at the process level within an operating system. Also, the methods, techniques, and systems discussed herein are applicable to differing protocols, communication media (optical, wireless, cable, etc.) and devices (e.g., desktop computers, wireless handsets, electronic organizers, personal digital assistants, tablet computers, portable email machines, game machines, pagers, navigation devices, etc.).
Claims (1)
1. A method for performing network address administration and management in federated cloud computing networks, the method comprising:
registering associated network interface cards (NICs) in a local network services appliance and a remote network services appliance with a local cloud network and a remote cloud network, respectively, wherein the local cloud network and the remote cloud network having at least one physical computing system hosting multiple virtual machines (VMs);
configuring the local cloud network and the remote cloud network to send packets with unclaimed network address to the associated registered NICs in the local network services appliance and the remote network services appliance;
forming a layer-2 (L2) network tunnel including a data channel and a control channel between the local network services appliance and the remote network services appliance by stitching the local cloud network and the remote cloud network upon registering and configuring the associated NICs in the local network services appliance and the remote network services appliance; and
performing the network address allocation, administration and management in the federated cloud computing networks using the formed control channel in the L2 network tunnel.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/607,665 US20170331684A1 (en) | 2013-08-30 | 2017-05-29 | System and method for network address administration and management in federataed cloud computing networks |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/014,389 US9667486B2 (en) | 2013-08-30 | 2013-08-30 | System and method for network address administration and management in federated cloud computing networks |
US15/607,665 US20170331684A1 (en) | 2013-08-30 | 2017-05-29 | System and method for network address administration and management in federataed cloud computing networks |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/014,389 Continuation US9667486B2 (en) | 2013-08-30 | 2013-08-30 | System and method for network address administration and management in federated cloud computing networks |
Publications (1)
Publication Number | Publication Date |
---|---|
US20170331684A1 true US20170331684A1 (en) | 2017-11-16 |
Family
ID=52584821
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/014,389 Active 2035-06-26 US9667486B2 (en) | 2013-08-30 | 2013-08-30 | System and method for network address administration and management in federated cloud computing networks |
US15/607,665 Abandoned US20170331684A1 (en) | 2013-08-30 | 2017-05-29 | System and method for network address administration and management in federataed cloud computing networks |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/014,389 Active 2035-06-26 US9667486B2 (en) | 2013-08-30 | 2013-08-30 | System and method for network address administration and management in federated cloud computing networks |
Country Status (1)
Country | Link |
---|---|
US (2) | US9667486B2 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI724406B (en) * | 2018-06-28 | 2021-04-11 | 日商萬代股份有限公司 | Programs, recording media and management systems |
Families Citing this family (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9984205B2 (en) * | 2013-11-27 | 2018-05-29 | General Electric Company | Cloud-based clinical information systems and methods of use |
US10757170B2 (en) * | 2014-10-13 | 2020-08-25 | Vmware, Inc. | Cross-cloud namespace management for multi-tenant environments |
US9723065B2 (en) * | 2014-10-13 | 2017-08-01 | Vmware, Inc. | Cross-cloud object mapping for hybrid clouds |
US9825905B2 (en) * | 2014-10-13 | 2017-11-21 | Vmware Inc. | Central namespace controller for multi-tenant cloud environments |
US10205701B1 (en) | 2014-12-16 | 2019-02-12 | Infoblox Inc. | Cloud network automation for IP address and DNS record management |
TW201624277A (en) | 2014-12-31 | 2016-07-01 | 萬國商業機器公司 | Method of facilitating live migration of virtual machines |
FR3032851A1 (en) * | 2015-02-13 | 2016-08-19 | Kerlink | METHOD FOR RESOLVING CORRESPONDING IP ADDRESS, SERVER AND COMPUTER PROGRAM |
US10142293B2 (en) | 2015-12-15 | 2018-11-27 | International Business Machines Corporation | Dynamically defined virtual private network tunnels in hybrid cloud environments |
US9571457B1 (en) | 2015-12-15 | 2017-02-14 | International Business Machines Corporation | Dynamically defined virtual private network tunnels in hybrid cloud environments |
US10108328B2 (en) | 2016-05-20 | 2018-10-23 | Vmware, Inc. | Method for linking selectable parameters within a graphical user interface |
US10063666B2 (en) | 2016-06-14 | 2018-08-28 | Futurewei Technologies, Inc. | Modular telecommunication edge cloud system |
US20180041578A1 (en) * | 2016-08-08 | 2018-02-08 | Futurewei Technologies, Inc. | Inter-Telecommunications Edge Cloud Protocols |
US10108447B2 (en) | 2016-08-30 | 2018-10-23 | Vmware, Inc. | Method for connecting a local virtualization infrastructure with a cloud-based virtualization infrastructure |
US10157071B2 (en) * | 2016-08-30 | 2018-12-18 | Vmware, Inc. | Method for migrating a virtual machine between a local virtualization infrastructure and a cloud-based virtualization infrastructure |
US10666606B2 (en) * | 2017-06-28 | 2020-05-26 | Amazon Technologies, Inc. | Virtual private network service endpoints |
US10693715B1 (en) * | 2017-10-26 | 2020-06-23 | Amazon Technologies, Inc. | Dynamic network address space allocation for virtual networks |
CN112292666A (en) * | 2018-06-06 | 2021-01-29 | 施耐德电气美国股份有限公司 | Distributed standard registry for cloud computing environment |
WO2022125456A1 (en) * | 2020-12-07 | 2022-06-16 | Intel Corporation | Mec federation broker and manager enabling secure cross-platform communication |
US11456987B1 (en) | 2021-05-07 | 2022-09-27 | State Farm Mutual Automobile Insurance Company | Systems and methods for automatic internet protocol address management |
US12058098B2 (en) * | 2022-11-17 | 2024-08-06 | At&T Intellectual Property I, L.P. | Validation of alignment of wireless and wireline network function configuration with domain name system records |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7467408B1 (en) * | 2002-09-09 | 2008-12-16 | Cisco Technology, Inc. | Method and apparatus for capturing and filtering datagrams for network security monitoring |
US7283544B2 (en) * | 2002-12-05 | 2007-10-16 | Hewlett-Packard Development Company, L.P. | Automatic network device route management |
US8065435B2 (en) * | 2006-05-29 | 2011-11-22 | China Mobile Communications Corporation | Method for assigning address to the intelligent information household appliance and the sub-equipment in the household network |
JP2010062738A (en) * | 2008-09-02 | 2010-03-18 | Fujitsu Ltd | Program, method and device for setting network |
FR2936387B1 (en) * | 2008-09-25 | 2016-01-08 | Canon Kk | METHOD FOR MANAGING ADDRESSING SPACES WHEN OPENING A COMMUNICATION TUNNEL, TUNNEL HEAD, COMPUTER PROGRAM PRODUCT, AND CORRESPONDING STORAGE MEDIUM. |
US8533312B2 (en) * | 2010-08-05 | 2013-09-10 | Citrix Systems, Inc. | Systems and methods for server initiated connection management in a multi-core system |
US8458786B1 (en) * | 2010-08-13 | 2013-06-04 | Zscaler, Inc. | Automated dynamic tunnel management |
WO2012154595A1 (en) * | 2011-05-06 | 2012-11-15 | Citrix Systems, Inc. | Systems and methods for cloud bridging between public and private clouds |
US9253252B2 (en) * | 2011-05-06 | 2016-02-02 | Citrix Systems, Inc. | Systems and methods for cloud bridging between intranet resources and cloud resources |
US9420619B2 (en) * | 2012-12-06 | 2016-08-16 | Cisco Technology, Inc. | Dynamic quality of service for wireless subscribers on a network |
-
2013
- 2013-08-30 US US14/014,389 patent/US9667486B2/en active Active
-
2017
- 2017-05-29 US US15/607,665 patent/US20170331684A1/en not_active Abandoned
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI724406B (en) * | 2018-06-28 | 2021-04-11 | 日商萬代股份有限公司 | Programs, recording media and management systems |
Also Published As
Publication number | Publication date |
---|---|
US20150067112A1 (en) | 2015-03-05 |
US9667486B2 (en) | 2017-05-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20170331684A1 (en) | System and method for network address administration and management in federataed cloud computing networks | |
JP7060636B2 (en) | Virtual network interface object | |
US12068889B2 (en) | Scalable tenant networks | |
US20220377045A1 (en) | Network virtualization of containers in computing systems | |
KR101371993B1 (en) | Method and apparatus for transparent cloud computing with a virtualized network infrastructure | |
US20220116271A1 (en) | Physical network orchestration for data centers | |
JP5953421B2 (en) | Management method of tenant network configuration in virtual server and non-virtual server mixed environment | |
WO2018112709A1 (en) | Data packet processing method, host and system | |
US8792502B2 (en) | Duplicate MAC address detection | |
US9935816B1 (en) | Border gateway protocol routing configuration | |
CN116803053A (en) | Mechanism for providing customer VCN network encryption using customer managed keys in a network virtualization device | |
US11743232B2 (en) | Software defined branch single internet protocol orchestration | |
CN116982306A (en) | Extending IP addresses in overlay networks | |
US10554552B2 (en) | Monitoring network addresses and managing data transfer | |
US20230133380A1 (en) | Transparent mounting of external endpoints between private networks | |
KR20240099366A (en) | Secure two-way network connectivity system between private networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |