US20230421511A1 - Distributed virtual switch for virtualized computer systems - Google Patents
Distributed virtual switch for virtualized computer systems Download PDFInfo
- Publication number
- US20230421511A1 US20230421511A1 US18/244,870 US202318244870A US2023421511A1 US 20230421511 A1 US20230421511 A1 US 20230421511A1 US 202318244870 A US202318244870 A US 202318244870A US 2023421511 A1 US2023421511 A1 US 2023421511A1
- Authority
- US
- United States
- Prior art keywords
- virtual
- virtual port
- host
- machine
- filtering
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 230000005012 migration Effects 0.000 claims abstract description 13
- 238000013508 migration Methods 0.000 claims abstract description 13
- 238000000034 method Methods 0.000 claims description 36
- 238000001914 filtration Methods 0.000 claims description 29
- 230000002085 persistent effect Effects 0.000 claims description 6
- 238000012544 monitoring process Methods 0.000 claims description 3
- 230000009466 transformation Effects 0.000 claims description 3
- 230000006399 behavior Effects 0.000 claims 22
- 230000008569 process Effects 0.000 description 16
- 238000012546 transfer Methods 0.000 description 4
- UPPPRUGHDBCPEF-UHFFFAOYSA-N Nic 17 Natural products CC(C(O)CC(=O)C)c1ccc2C3C4OC4C5(O)CC=CC(=O)C5(C)C3CCc2c1 UPPPRUGHDBCPEF-UHFFFAOYSA-N 0.000 description 2
- 230000008901 benefit Effects 0.000 description 2
- 238000013500 data storage Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 238000004891 communication Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000004321 preservation Methods 0.000 description 1
- 230000003252 repetitive effect Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L49/00—Packet switching elements
- H04L49/70—Virtual switches
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
- G06F2009/4557—Distribution of virtual machine instances; Migration and load balancing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
- G06F2009/45575—Starting, stopping, suspending or resuming virtual machine instances
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
- G06F2009/45579—I/O management, e.g. providing access to device drivers or storage
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
- G06F2009/45595—Network integration; Enabling network access in virtual machine instances
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2101/00—Indexing scheme associated with group H04L61/00
- H04L2101/60—Types of network addresses
- H04L2101/618—Details of network addresses
- H04L2101/622—Layer-2 addresses, e.g. medium access control [MAC] addresses
Definitions
- FIG. 1 shows one possible arrangement of computer system 70 that implements virtualization.
- a plurality of VMs 20 , . . . 20 - n is abstracted by virtualization software 15 on a host 10 .
- virtualization software 15 includes a VM kernel 60 and one or more VM monitors (VMMs) 50 .
- VMMs VM monitors
- Other configurations are possible to provide virtualization functionality as generally understood in the art.
- Host 10 typically includes one or more processors 11 , memory 13 , some form of mass data storage 14 , one or more network interface cards (NICs) 17 and various other devices 19 .
- NIC network interface cards
- the term “NIC” commonly refers to components implementing a network connection regardless as to whether it exists on a separate card or is integrated with a main computer board.
- Each VM 20 , . . . 20 - n can be thought of as including both virtual system hardware 22 and guest system software 30 .
- Virtual system hardware 22 typically includes one or more virtual processors 28 , virtual memory 23 , at least one virtual disk 24 , and one or more virtual network interface card(s) (VNICs) (only one shown).
- VNICs virtual network interface card
- One or more additional virtual devices 27 such as virtual user interface devices, universal serial bus (USB) ports, etc., may also be included.
- Virtual system hardware 22 is shown in FIG. 1 in a dashed box because it is merely a conceptualization that does not exist apart from virtualization software 15 and host 10 . This conceptualization is merely one representation of the execution environment of guest system software 30 . All of the virtual hardware components of VM 20 are actually implemented by virtualization software 15 using known techniques to emulate the corresponding physical components.
- virtualization software 15 includes one or more VM monitors (VMMs) 50 which each include device emulators 53 .
- VMMs
- Guest system software 30 includes guest operating system (OS) 32 and drivers 34 as needed for VNIC 25 , virtual disk 24 and other various virtual devices 27 .
- Guest OS 32 may be an off-the shelf OS designed to run directly on a hardware platform (i.e., not in a virtual machine) or it can be an OS specially modified to run in a para-virtualized environment, depending on what is required or permitted by the particular implementation of virtualization software 15 .
- the term “virtualization software” therefore refers herein to a software layer implanting either full virtualization or para-virtualization.
- “Full virtualization” refers to a system in which no software components of any form are included in the guest other than those that would be found in a non-virtualized computer; thus, the guest OS could be an off-the-shelf, commercially available OS with no components included specifically to support use in a virtualized environment.
- a “para-virtualized” system is not “fully” virtualized. Rather, the guest is configured in some way to provide certain features that facilitate virtualization.
- the term “virtualization” includes both full and para-virtualization.
- guest applications 36 execute “within” VM 20 , although those skilled in the art will understand that execution of guest OS and guest application instructions occurs via virtualization software 15 and host platform 10 .
- Guest application 36 may be any type of application designed to work with guest operating system 32 .
- user input and output to and from VM 20 may be redirected by virtualization software 15 to a remote terminal (not shown) or through a terminal application (not shown) executing on console operating system 40 .
- Virtualization software 15 may include one or more software components and/or layers, possibly including one or more of the software components known in the field of virtual machine technology as “virtual machine monitors” (VMMs), “hypervisors,” or virtualization kernels (referred to herein as “VM kernels”).
- VMMs virtual machine monitors
- VM kernels virtualization kernels
- VMMs 50 are deployed on top of VM kernel 60 .
- VM kernel 60 may be constructed specifically to provide efficient support for the VMs and directly (i.e., not using a general-purpose host OS, such as Linux or Windows) interfaces with the physical resources and devices making up host 10 .
- the VM kernel 60 is not the same as a kernel within the guest OS 32 .
- each typical operating system has its own OS kernel.
- VM kernel 60 can be viewed as being part of the host platform for the VM even though the configuration shown in FIG. 1 is commonly termed “non-hosted.”
- virtualization software 15 could include a general purpose operating system (not shown) instead of a VM kernel.
- a general purpose operating system (not shown)
- Such a configuration is often referred to as a “hosted” virtualization system, with the general purpose operating system as the host OS.
- the host OS is configured to perform certain device input/output (I/O) operations for the various VMs executing on the system, alongside and sometimes at the request of the VMM.
- the host OS may be considered to be part of the virtualization software that enables the virtualization.
- FIG. 2 illustrates VMs 20 - 1 , 20 - 2 and VMMs 50 - 1 , 50 - 2 transmitting network frames to network interface card (NIC) 17 of host 10 - 1 through virtual switch 65 .
- Virtualization software 15 transmits network frames from VMs 20 - 1 , 20 - 2 via virtual NICs (VNICs) 25 - 1 , 25 - 2 to physical NIC 17 of host computer 10 - 1 .
- Each VNICs 25 - 1 , 25 - 2 is communicatively coupled to a corresponding virtual port 62 , 64 of virtual switch 65 .
- Virtual switch 65 is a logical collection of virtual ports 62 , 64 , and maintains a forwarding database (not shown) of VNIC addresses, e.g., MAC addresses. Each virtual port 62 , 64 , 66 is a logical rendezvous point for a corresponding VNIC and the software components that forward traffic to and from the VNICs. In this manner, virtual switch 65 determines how and where to route network frames transmitted to and from VNICs 25 - 1 , 25 - 2 and NIC 17 . Thus, virtual switch 65 functions as a software bridge that allows multiple VMs to share zero, one, or multiple physical NICs. If zero (i.e., no) physical NICs are installed on host 10 - 1 , for example, then virtual switch 65 may function as a virtual network that connects VMs 20 - 1 , 20 - 2 running on host 10 - 1 .
- VNIC addresses e.g., MAC addresses.
- Each virtual port 62 , 64 , 66 is a logical
- Each VNIC 25 - 1 , 25 - 2 is an emulated network device, presented by virtualization software 15 to VMs 20 - 1 , 20 - 2 requiring network access.
- virtual switch 65 handles forwarding traffic between the VNICs 25 - 1 , 25 - 2 , connected to virtual switch 65 and possibly bridging to a physical network via one or more physical NICs.
- virtual switches are capable of determining, based on a network frame's header, whether or not the frame is locally destined, and if it is locally destined, which virtual machines should receive the frame.
- Network administrators are generally required to manage the virtual switches 65 to configure these features. Since the number of virtual switches 65 are typically greater in number than their physical counterparts, the network administrator may be required to perform repetitive tasks of configuring many virtual switches 65 .
- One advantage of virtualization technology is that it allows a VM to be migrated from one physical host to another by powering down or suspending the VM on one host, and powering up or resuming the VM a different physical host.
- “suspending,” refers to the execution of the VM being temporarily or permanently halted by the virtualization software. It should be noted that the execution of a VM is frequently suspended even though it is “running.” A VM may be momentarily suspended, for example, in order to allow execution of another co-running VM to proceed.
- “powering off” a VM refers to virtualizing the power-down procedure of a physical machine.
- a VM may be powered down in a methodical manner in which each process is notified by the OS of impending shut down, allowing each open application to save its data and exit, or the power down can be performed by simulating a power-off, in which case all running processes are terminated, losing any unsaved data or state associated with running processes.
- resumption of execution typically requires rebooting the guest OS and restarting any applications, whereas resuming execution of a suspended VM requires reloading the state into the VM and resuming execution.
- VM 20 - 2 may be migrated by suspending or powering off VM 20 - 2 on host 10 - 1 and resuming or powering on VM 20 - 2 on host 10 - 2 , as represented by arrow 75 .
- the term “migration” therefore refers to a process of moving a VM from one host to another by suspending or powering off a VM on one host and resuming or powering on that VM on a different host.
- migrating a VM from one host to another may involve some loss in state associated with the VNIC for the migrated VM.
- VM 20 - 2 is migrated from host 10 - 1 to host 10 - 2 (as indicated by arrow 75 )
- connection 56 between VNIC emulator 55 - 2 and virtual port 64 is lost, as indicated by cross 52 , and a new connection 58 is established between VNIC emulator 55 - 3 and virtual port 66 on virtual switch 65 ′ implemented by virtualization software 15 ′ on host 10 - 2 .
- the MAC address and other state information associated with VNIC 25 - 2 can be transferred to VNIC 25 - 3 as part of the attributes of the virtual devices making up VM 20 - 2 , so that resumed VM 20 - 2 maintains its position on the network.
- VM 20 - 2 further connects to virtual port 66 of virtual switch 65 ′ on host 10 - 2 , presuming new port 66 to offer similar network connectivity, but making no assumptions about any preservation of state not associated specifically with virtual NIC device 25 - 2 (e.g., MAC address, broadcast/multicast filter, etc).
- state information that may be accumulated on virtual switch port 64 is typically lost.
- a network administrator who is viewing a virtual network from the switch point of view has no consistent topology to work with if VMs are migrating while he attempts to view and/or reconfigure the virtual network.
- a virtual switch forwards network frames between the VM and the physical network interface via the virtual port.
- a runtime state of the virtual port is transferred to the destination host and applied at the second host to a virtual port associated with a second virtual switch at the destination host.
- the runtime state of the virtual port at the source host is then cleared, and the second virtual switch at the destination host forwards network frames between the migrated VM and the physical network interface of the destination host using the virtual port at the second host.
- FIG. 1 illustrates a non-hosted virtualized system.
- FIG. 2 illustrates the VMs and VMMs transmitting network frames to the network interface cards (NICs) of the system hardware through a virtual switch.
- NICs network interface cards
- FIG. 3 illustrates a distributed virtual switch (DVswitch), according to one embodiment.
- FIG. 4 illustrates how a distributed virtual port (DVport) of the DVswitch is configured, according to one embodiment.
- FIG. 5 illustrates how the DVswitch reconfigures a connection between a VNIC and a virtual switch during VM migration, according to one embodiment.
- FIG. 6 illustrates a process for creating and deleting a DVswitch, according to one embodiment.
- FIG. 7 illustrates a process for connecting or disconnecting a VNIC to or from a DVport of a DVswitch, according to one embodiment.
- FIG. 8 illustrates a process for DVport migration during VM migration, according to one embodiment.
- FIG. 9 illustrates a process for reconfiguring a DVswitch while powering down and powering up a host, according to one embodiment.
- FIG. 3 illustrates, by way of example, a managed collection 300 of virtualized computer systems.
- a distributed virtual switch (DVswitch) comprises DVswitch components 350 A, 350 B, and 350 C, according to one embodiment.
- the term “distributed” herein is used to describe objects which may migrate from one physical host to another or span multiple hosts in a managed collection of host computers.
- the DVswitch is therefore a software abstraction which binds similar virtual switches 602 , 602 ′ in the managed collection into a single logical configurable entity.
- FIG. 3 represents only two hosts 100 - 1 , 100 - 2 each having only a single VM 320 , 320 ′ and corresponding VNIC emulators 301 - 1 , 301 - 2 , only for purpose of illustration. It should be recognized that a DVswitch may span any number of hosts each having any number of VMs, each, in turn, having any number of VNICs, any of which may be limited in number by available hardware resources of the
- the DVswitch as a software abstraction, resides on a variety of hardware in a distributed manner, hence the term “distributed” virtual switch.
- DVswitch components 350 A, 350 B, and 350 C reside in hosts 100 - 1 , 100 - 2 as well as database 370 .
- DVswitch components 350 A, 350 B, and 350 C are illustrated in FIG. 3 with a dotted line box indicating portions of DVswitch 350 A, 350 B, and 350 C that make up a DVswitch.
- logic implementing DVswitch functionality is located in virtualization software 600 and database controller 372 as will be described in more detail below.
- each VNIC emulator 301 - 1 , 301 - 2 interacts with NIC drivers 224 - 1 , 224 - 2 in VMs 200 - 1 , 200 - 2 to send and receive data to and from VMs 320 , 320 ′.
- each VNIC emulator 301 - 1 , 301 - 2 may maintain the state for one or more VNICs for each VM 320 , 320 ′.
- VNIC emulators 301 - 1 , 301 - 2 may be instantiated within a virtualization software layer.
- a single VM may have one or more VNICs, which may be implemented by one or more VNIC emulators.
- FIG. 3 shows only one VNIC for each VM, and only one VM for each host.
- VNICs 215 - 1 , 215 - 2 is actually a discussion of a VNIC state implemented and maintained by each VNIC emulator 301 - 1 , 301 - 2 .
- VNICS 215 - 1 , 215 - 2 are software abstractions that are convenient to discuss as though part of VMs 200 - 1 , 200 - 2 , but are actually implemented by virtualization software 600 , 600 ′ using emulators 301 - 1 , 301 - 2 .
- the state of each VM 200 - 1 , 200 - 2 includes the state of its virtual devices, which is controlled and maintained by the underlying virtualization software 600 , 600 ′.
- its state which includes network settings such as the MAC addresses of any VNICS, are migrated along with the VM.
- Similar virtual switches 602 , 602 ′ that are connected to the same physical network 442 are managed using one DVswitch.
- Physical network 442 may be, e.g., a local area network.
- the DVswitch includes distributed virtual ports (DVports) 352 , 354 .
- a DVport is a software abstraction that encapsulates the “personality” (both configuration and runtime state) of a corresponding virtual port.
- DVport 352 contains one or more data structures representing the configuration and runtime state of virtual port 652 of a virtual switch 602 .
- DVport 354 contains one or more data structures representing the configuration and runtime sate of virtual port 654 of virtual switch 602 ′.
- DVports are created with a configuration predefined by a network administrator.
- Virtual ports 652 , 652 ′ are created and start with a blank configuration state, but once associated with a DVport, assume the configuration and runtime state of the associated DVport.
- connection between a DVport and a virtual NIC is not affected because the DVport persists and migrates with the VM to which it is connected.
- connection is used herein to describe an association of a virtual NIC with a DVport. In one embodiment, this association is maintained locally by virtualization software 600 , 600 ′ and in a table or other data structure within database 370 as described in more detail below.
- virtualization software 600 , 600 ′ When a connection to a DVport occurs, another virtual NIC cannot be connected to that DVport without explicitly disconnecting the already connected virtual NIC.
- Link Up is used herein to describe a state where a virtual NIC and a virtual port have been made ready to send and receive frames. If and only if both the virtual NIC and the virtual port agree on this link-up state, can the network traffic be forwarded to and from the virtual NIC by the virtual switch.
- filter is used herein to describe a software component that interposes on an Input Output (I/O) path between the virtual port and the virtual NIC.
- forwarding engine is used herein to describe a software component that is able to build and maintain tables mapping layer 2 hardware addresses (e.g., MAC addressees) to virtual ports, and to make forwarding decisions based on those tables.
- DVswitch 350 and its DVports 352 , 354 are created based on physical resources which should be available to physical NICs 172 , 172 ′ in the managed domain of hosts 100 - 1 , 100 - 2 .
- database 370 stores the state of DVswitch 350 and DVports 352 , 354 .
- Database 370 may be provided on database controller 372 connected to hosts 100 - 1 , 100 - 2 via physical network 442 .
- a second physical network connects database server 374 to hosts 100 - 1 , 100 - 2 , via second NICs (not shown) installed on each host 100 - 1 , 100 - 2 , to further isolate database server 374 from network resources (e.g., the Internet) that may pose a security risk.
- Hosts 100 - 1 , 100 - 2 in the managed domain therefore have access to the database 370 .
- the managed domain is a collection of hosts 100 - 1 , 100 - 2 covered by an instance of the database 370 . For states that are global to a given DVswitch 350 , database 370 pushes read-only copies to each of the hosts 100 - 1 , 100 - 2 in the managed domain.
- hosts 100 - 1 , 100 - 2 do not need to alter the data and updates to it are infrequent, pushing updates to all hosts 100 - 1 , 100 - 2 aggressively does not introduce unacceptable overhead. States that are specific to a given DVport 352 , 354 , however, do need to be altered by the host where the DVport's peer virtual port 652 , 654 is located, and updates are frequent. Thus, the database 370 pushes DVport state only to the necessary host and polls that host periodically and around certain critical events for updates in the states. In addition to being stored permanently in database 370 , some DVswitch state may be cached on each host in the managed domain to avoid unnecessary communication with database 370 .
- a process residing on database 370 is responsible for pushing relevant updates to each host's local storage 358 , 358 ′ in the managed domain.
- local storage should be interpreted broadly herein to reflect a data storage device or system that is readily accessible by the host.
- hosts 100 - 1 , 100 - 2 always assume that their local storage 358 , 358 ′ is up to date, and that any updates they make to the local storage will be pulled back to database 370 by a database server process of database controller 372 in a timely manner.
- database 370 is offline or a host loses connectivity to database 370 , the host can continue operations in the current state, albeit without updates from database 370 and without assurances that changes it makes to its local storage will be persisted.
- the risks associated with such a loss of connectivity are minimal (i.e., unlike a distributed file system where irretrievable data loss may occur if the synchronization mechanism is lost, here the only resources being shared are conceptual).
- a two-level ownership model is applied to the DVport state.
- the first level of ownership refers to which host currently has the rights to modify the state of a particular DVport.
- such ownership of a DVport state is granted implicitly by database controller 370 when it pushes the state of the DVport to a given host.
- Database controller 370 is responsible for granting and revoking host ownership of DVports 352 , 354 . Once a host 100 - 1 or 100 - 2 has been granted ownership of a DVport it retains ownership until database controller 372 explicitly revokes the ownership.
- the second level of ownership refers to which virtual NIC is currently connected to the DVport.
- virtual NIC 215 - 1 issues a request to database controller 372 for a connection identifier (ID) for DVport 352 .
- ID connection identifier
- virtual NIC 215 - 1 identifies DVport 352 by a DVport number (or other identifier) which may be manually selected by the user (i.e., administrator) or automatically assigned by a management application during configuration of the DVswitch. For example, a DVport number identifying a particular DVport by its number may be configured along with other configuration settings for a VM.
- connection ID field is empty for the requested DVport, then a new connection ID is generated by database controller 372 and returned to virtual NIC 215 - 1 .
- virtual NIC 215 - 1 receives the connection ID for DVport 352 , it owns rights to use network resources backing (i.e., associated with) DVport 352 .
- the connection ID and DVport number may be stored along with other configuration settings for the VM, thereby creating an association between the VM and the DVport.
- virtual NICs 215 - 1 , 215 - 2 are software abstractions of physical NICs implemented by virtual NIC emulators 301 - 1 , 301 - 2 , respectively.
- the code for requesting and obtaining a connection ID may reside in components of virtual NIC emulators 301 - 1 , 301 - 2 or other components of virtualization software 600 , 600 ′ layer of each host 100 - 1 , 100 - 2 .
- connection ID field for a particular DVport is not empty at the time of the connection request, then another virtual NIC currently owns connection rights and the new connection request will be denied.
- the virtual NIC stores the connection ID and uses that for future operations.
- the virtual NIC may release the connection at any time, at which point it becomes available for use by another virtual NIC. It is possible to revoke a connection by simply generating a new connection ID for the DVport or by clearing the current connection ID field of the DVport. Once a connection is revoked, attempts to use the old connection ID will fail.
- a DVport may be owned collectively by a cluster of hosts, without explicit assignment to a single host. Any conflicts arising from multiple hosts attempting to claim the same DVport can be resolved via a peer-to-peer election algorithm.
- the virtual NIC may attempt to bring the link up by making a call into system-level software on host 100 - 1 to request that DVport 352 be backed by a virtual port.
- the system-level software may be virtualization software such as virtualization software 600 or other system level software.
- the call may be made to a VMKernel, such as that described above with reference to FIGS. 1 and 2 .
- the system-level software may then associate DVport 352 with virtual port 652 of virtual switch 602 to provide access to the desired network.
- virtual NIC 215 - 1 is able to send and receive frames to and from network 442 .
- VNIC 215 - 1 calls into the system-level software to bring the link state down. This releases underlying virtual port 652 and resources associated with DVport 352 , but does not release ownership of DVport 352 . Before releasing virtual port 652 , the system synchronizes all registered port state back to DVport 352 . When the virtual machine powers on again or resumes, DVport 352 requests a new virtual port on host 100 - 1 and synchronizes all the registered port state back to it, and brings the link state up again if that is the state it was left in.
- FIG. 4 illustrates a conceptualization of a plurality of distributed virtual switches 350 , 350 ′, 350 ′′ each spanning a first and second host 100 - 1 , 100 - 2 .
- each VNIC is attached to one of three DVswitches, each of which is associated with a corresponding physical NIC for each host.
- VNICs 215 - 1 each of which may correspond to an individual VM, are each associated with a distributed virtual port, e.g., 352 , 354 , which are collectively managed by DVswitch 350 .
- DVswitch 350 in turn provides connectivity to VNICs 215 - 1 , 215 - 2 to network 442 via physical NICs 172 , 172 ′.
- the DVswitch represents a convenient abstraction of underlying logic implementing links between VNICs and virtual switches, allowing the user to manage the DVswitch as an abstraction of a physical switch connecting each of the VMs to a particular local area network (LAN).
- LAN local area network
- the “user” referred to above may be a network or host administrator. Because the DVswitch abstracts out the settings of individual virtual switches and virtual ports, the administrator only needs to concern him- or herself with attaching DVswitch to each VNIC and configuring same. Once that is done, virtual ports and switches that back the DVports and DVswitches will automatically be properly configured when restarting or suspending and resuming a VM, even if the resume or restart is on a different host in the managed collection.
- a single host 100 - 1 may interact with a plurality of DVswitches, each associated with a corresponding network.
- hosts 100 - 1 , 100 - 2 each interact with DVswitches 350 , 350 ′, 350 ′′ which in turn are connected to networks 442 , 446 , and 448 , respectively.
- Host 100 - 1 includes NIC 172 connecting DVswitch 350 to network 442 , NIC 174 connecting DVswitch 350 ′ to network 446 , and NIC 176 connecting DVswitch 350 ′′ to network 448 .
- Host 100 - 2 includes corresponding components, although many other configurations are possible, as would occur to those skilled in the art.
- FIG. 5 illustrates a simplified view of collection 300 shown previously in FIG. 3 , prior to a migration of VM 320 ′ from host 100 - 1 , to host 100 - 2 .
- VM 320 ′ migrates from source host 100 - 1 to destination host 100 - 2 , the connection between VNIC 215 - 2 and virtual port of the 654 of virtual switch 602 is lost, and VNIC 215 - 2 connects with a new virtual port 656 of virtual switch 602 ′ on destination host 100 - 2 .
- DVswitch 350 facilitates the transfer of the state and ownership of the DVport (e.g., 352 ) from the local storage 358 of source host 100 - 1 to the local storage 358 ′ of destination host 100 - 2 through the DVswitch 350 , state information that may be accumulated on virtual switch port 654 is not lost and is also migrated to virtual port 656 of virtual switch 602 ′.
- the DVswitch and DVport implementation is extensible at run time by means of registering filter and forwarding engine classes.
- One forwarding engine class (not shown herein) is associated with each DVswitch 350 , and zero or more filter classes are associated with DVswitch 350 .
- a forwarding class implements the basic frame forwarding logic for DVswitch 350 .
- the forwarding class includes rules for determining and indicating which DVport(s) should receive each frame that comes into the DVswitch. Since the forwarding class is responsible for making forwarding decisions, there is only one forwarding class associated with each DVswitch 350 .
- the forwarding class may register DVswitch and DVport specific context for configuration and runtime state.
- a filter class implements some type of monitoring, filtering, or transformation functionality for a DVport. Each filter class may be applied to one or more DVports and may register a port specific context for configuration and run time state.
- the forwarding engine class is assigned at DVswitch creation time. Filter classes can be added or removed at any time to or from DVports. Each forwarding engine class defines a set of callbacks to implement various required and optional functionalities. Each forwarding engine class may also optionally declare one or more opaque data types to be maintained by the system. These data will be appended to the DVswitch and DVport state which is migrated and persisted by the system.
- FIG. 6 illustrates, by way of example, a process for creating and deleting a DVswitch, according to one embodiment.
- database controller 372 creates a new DVswitch entry 350 C and DVports of the DVswitch in database 370 .
- DVswitch 350 is associated with a forwarding engine service class and class-specific DVswitch state.
- the DVport entry is associated with a given DVswitch, and the DVport state is initialized to default values.
- the “current connection ID” of the DVport may be set to the “DVPORT_NO_CONNECTION” to indicate that no virtual NIC is currently connected to the DVport.
- Database controller 372 pushes the new DVport information out to all hosts 100 - 1 , 100 - 2 in the managed domain, which store it in local storage 358 , 358 ′.
- database controller 372 may also install a DVport filter by associating an opaque class-defined state with the DVport's state.
- a host joins the created DVswitch 350 .
- this operation is initiated by database controller 372 , which (i) verifies that the host (e.g., 100 - 1 , 100 - 2 ) can provide appropriate network connectivity and services to host a portion of the given DVswitch, (ii) adds the host to the list of hosts associated with DVswitch 350 in database 370 , and (iii) pushes the current DVswitch data out to the to-be-connected host, which stores it in its local storage.
- a host leaves the DVswitch.
- this operation is initiated by database controller 372 , which (i) verifies that the host (e.g., 100 - 1 , 100 - 2 ) to leave the DVswitch does not currently have any DVports (e.g., 352 , 354 , . . .
- a host may join 604 and leave 608 a DVswitch multiple times over the lifetime of the DVswitch.
- database controller 372 deletes a DVswitch (e.g., 350 ) from database 370 .
- a DVswitch e.g., 350
- database controller 372 makes sure that all hosts have left the DVswitch and then removes all states corresponding to the DVswitch from database 370 .
- FIG. 7 illustrates a process for connecting or disconnecting a VNIC to or from a DVport of the DVswitch, according to one embodiment.
- a virtual NIC e.g., 215-1
- a requested DVport e.g., 352
- this operation is initiated via database controller 372 , which checks for existing connections on the requested DVport (e.g., 352 ) by ensuring that the current connection ID is DVPORT_NO_CONNECTION, indicating that no virtual NIC is currently connected to that requested DVport. If another virtual NIC is currently connected to the requested DVport, then the request to connect the VNIC to the requested DVport is denied.
- database controller 372 If the requested DVport is available, then database controller 372 generates a new connection ID and sets the “current connection ID” for the requested DVport (e.g., 352 ) to the new connection ID. Database controller 372 pushes the updated DVport data to the host (e.g., 100 - 1 ) which currently hosts the virtual NIC (e.g., 215 - 1 ) and sets the “connection ID” field of the virtual NIC configuration to the new connection ID as well.
- the host e.g., 100 - 1
- the virtual NIC e.g., 215 - 1
- a virtual port (e.g., 652 ) of the virtual switch 602 is “linked up” to the “connected” virtual NIC (e.g., 215 - 1 ).
- this operation occurs on the host (e.g., 100 - 1 ) where the virtual NIC (e.g., 215 - 1 ) is hosted and does not require participation from database controller 372 .
- the virtual NIC e.g., 215 - 1
- the DVswitch system validates that the DVport (e.g., 352 ) is in fact currently delegated to this host (e.g., 100 - 1 ). In one embodiment, the presence of DVport data with a current connection ID other than DVPORT_NO_CONNECTION is sufficient for validating that the DVport (e.g., 352 ) is delegated to this host (e.g., 100 - 1 ).
- the DVswitch system validates that the connection ID provided by the virtual NIC (e.g., 215 - 1 ) matches the current connection ID in the DVport data. If the connection ID data does not match, the request to bring the link up is denied.
- connection ID data does match, port resources on the local per-host virtual switch (e.g., 602 ) are allocated to the virtual NIC (e.g., 215 - 1 ), and the virtual NIC implementation is passed a handle to the resources.
- Class-defined callbacks for any installed forwarding classes or filtering classes are installed on the underlying virtual switch port (e.g., 652 ) and virtual switch port state is restored from the host's local storage using class-defined deserializers. As a result, the virtual switch port (e.g., 652 ) is enabled for IO.
- a virtual port of the virtual switch may also be “linked down” from the “connected” virtual NIC (e.g., 215 - 1 ). In one embodiment, this operation occurs on the host (e.g., 100 - 1 ) where the virtual NIC (e.g., 215 - 1 ) is hosted and does not require any participation from the database controller 372 .
- the virtual NIC e.g., 215 - 1
- the DVswitch system collects all transparent DVport state from the underlying virtual switch port (e.g., 652 ). Class-defined callbacks for any installed forwarding classes or filtering classes are removed from the underlying virtual switch port (e.g., 652 ) and state is checkpointed to the host's local storage using class-defined serializers. Note that a virtual port of a virtual switch may be linked up or linked down multiple times over the lifetime of a virtual NIC connection to the DVport of a DVswitch.
- the virtual NIC (e.g., 215 - 1 ) may be disconnected from a DVport (e.g., 352 ).
- this operation is initiated via the database controller 372 , which pushes an update of the current connection ID to the host (e.g., 100 - 1 ) to which the DVport (e.g., 352 ) is currently delegated, setting the current connection ID to DVPORT_NO_CONNECTION.
- the host e.g., 100 - 1
- FIG. 8 illustrates a process for DVport migration during VM migration, according to one embodiment.
- a DVport e.g., 354
- the hosts 100 - 1 , 100 - 2 in the same way virtual machines (e.g., 200 - 2 ) are migrated.
- DVports project their state onto an available virtual switch port to provide a consistent network connection for virtual NICs (e.g., 215 - 2 ) as they migrate from the source host (e.g., 100 - 1 ) to the destination host (e.g., 100 - 2 ).
- DVport migration is initiated via the database controller 372 , which performs the following operations for each virtual NIC in the affected virtual machine (e.g., 200 - 2 ) to be migrated.
- database controller 372 brings the DVport (e.g., 354 ) to be migrated down on the source host (e.g., 100 - 1 ) by performing “virtual port link down” on the source host (e.g., 100 - 1 ) as described above with reference to FIG. 7 .
- the serialized state for the DVport (e.g., 354 ) to be migrated from the local storage (e.g., 358 ) of the source host (e.g., 100 - 1 ) is transferred to the local storage (e.g., 358 ′) of the destination host (e.g., 100 - 2 ).
- database controller 372 delegating ownership of the DVport to the destination host.
- Database controller 372 clears the virtual port state on the source host (e.g., 100 - 1 ), thereby revoking its ownership of the DVport (e.g., 352 ).
- database controller 372 brings the DVport up on the destination host (e.g., 100 - 2 ) by applying the transferred state of the DVport (e.g., 354 ) to another virtual port of the virtual switch (e.g., 602 ′) on the destination host (e.g., 100 - 2 ) and performing virtual port “link up” on the destination host (e.g., 100 - 2 ) as described above.
- FIG. 9 illustrates, by way of example, a process for reconfiguring the DVswitch while powering down and powering up the host, according to one embodiment. These operations may occur with or without the participation of database controller 372 . If database controller 372 is aware of the imminent power down event, it may perform operation 902 , in which database controller 372 retrieve updates from the host's local storage just before shut down of the host (e.g., 100 - 1 ). In operation 904 , prior to power down, the host (e.g., 100 - 1 ) synchronizes its persistent local storage with its in-memory cache, if persistent storage is available.
- database controller 372 transfers copies of all relevant DVswitch and DVport state to the host (e.g., 100 - 1 ) as soon as it detects the host's presence.
- Database controller 372 may attempt to merge or otherwise resolve conflicts between stale data from the host's cache and data from database 370 .
- data from database 370 is considered authoritative and overwrites any state maintained in local storage.
- Database controller 372 pushes the resulting updates to the host (e.g., 100 - 1 ).
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Small-Scale Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
A runtime state of a virtual port associated with a virtual machine (“VM”) is persisted as the VM is migrated from a source host to a destination host. In certain embodiments, a virtual switch forwards network frames between the VM and the physical network interface via the virtual port. During migration of the VM, the runtime state of the virtual port is transferred to the destination host and applied at the second host to a virtual port associated with a second virtual switch at the destination host. The runtime state of the virtual port at the source host is then cleared, and the second virtual switch at the destination host forwards network frames between the migrated VM and the physical network interface of the destination host using the virtual port at the second host.
Description
- A virtual machine (VM) is an abstraction—a “virtualization”—of an actual physical computer system.
FIG. 1 shows one possible arrangement ofcomputer system 70 that implements virtualization. In this arrangement, a plurality ofVMs 20, . . . 20-n is abstracted byvirtualization software 15 on ahost 10. In the present example,virtualization software 15 includes aVM kernel 60 and one or more VM monitors (VMMs) 50. Other configurations are possible to provide virtualization functionality as generally understood in the art.Host 10 typically includes one ormore processors 11,memory 13, some form ofmass data storage 14, one or more network interface cards (NICs) 17 and variousother devices 19. As generally known, the term “NIC” commonly refers to components implementing a network connection regardless as to whether it exists on a separate card or is integrated with a main computer board. - Each
VM 20, . . . 20-n can be thought of as including bothvirtual system hardware 22 andguest system software 30.Virtual system hardware 22 typically includes one or morevirtual processors 28,virtual memory 23, at least onevirtual disk 24, and one or more virtual network interface card(s) (VNICs) (only one shown). One or more additionalvirtual devices 27, such as virtual user interface devices, universal serial bus (USB) ports, etc., may also be included.Virtual system hardware 22 is shown inFIG. 1 in a dashed box because it is merely a conceptualization that does not exist apart fromvirtualization software 15 andhost 10. This conceptualization is merely one representation of the execution environment ofguest system software 30. All of the virtual hardware components of VM 20 are actually implemented byvirtualization software 15 using known techniques to emulate the corresponding physical components. In the present example,virtualization software 15 includes one or more VM monitors (VMMs) 50 which each includedevice emulators 53. -
Guest system software 30 includes guest operating system (OS) 32 anddrivers 34 as needed for VNIC 25,virtual disk 24 and other variousvirtual devices 27. Guest OS 32 may be an off-the shelf OS designed to run directly on a hardware platform (i.e., not in a virtual machine) or it can be an OS specially modified to run in a para-virtualized environment, depending on what is required or permitted by the particular implementation ofvirtualization software 15. The term “virtualization software” therefore refers herein to a software layer implanting either full virtualization or para-virtualization. “Full virtualization” refers to a system in which no software components of any form are included in the guest other than those that would be found in a non-virtualized computer; thus, the guest OS could be an off-the-shelf, commercially available OS with no components included specifically to support use in a virtualized environment. In contrast, a “para-virtualized” system is not “fully” virtualized. Rather, the guest is configured in some way to provide certain features that facilitate virtualization. For the purposes herein, the term “virtualization” includes both full and para-virtualization. - In addition to
guest operating system 32, one or more guest applications 36 execute “within”VM 20, although those skilled in the art will understand that execution of guest OS and guest application instructions occurs viavirtualization software 15 andhost platform 10. Guest application 36 may be any type of application designed to work withguest operating system 32. As generally understood in the art of virtualization, user input and output to and fromVM 20 may be redirected byvirtualization software 15 to a remote terminal (not shown) or through a terminal application (not shown) executing onconsole operating system 40. -
Virtualization software 15 may include one or more software components and/or layers, possibly including one or more of the software components known in the field of virtual machine technology as “virtual machine monitors” (VMMs), “hypervisors,” or virtualization kernels (referred to herein as “VM kernels”). Because virtualization terminology has evolved over time and has not yet become fully standardized, these terms do not always provide clear distinctions between the software layers and components to which they refer. As used herein, the term, “virtualization software” is intended to generically refer to a software layer or component logically interposed between a virtual machine and the host platform. - In the virtualization system shown in
FIG. 1 , VMMs 50 are deployed on top ofVM kernel 60.VM kernel 60 may be constructed specifically to provide efficient support for the VMs and directly (i.e., not using a general-purpose host OS, such as Linux or Windows) interfaces with the physical resources and devices making uphost 10. Note that theVM kernel 60 is not the same as a kernel within theguest OS 32. As is well known, each typical operating system has its own OS kernel. Note also thatVM kernel 60 can be viewed as being part of the host platform for the VM even though the configuration shown inFIG. 1 is commonly termed “non-hosted.” - In a different, well-known configuration (not shown)
virtualization software 15 could include a general purpose operating system (not shown) instead of a VM kernel. Such a configuration is often referred to as a “hosted” virtualization system, with the general purpose operating system as the host OS. The host OS is configured to perform certain device input/output (I/O) operations for the various VMs executing on the system, alongside and sometimes at the request of the VMM. In this case, the host OS may be considered to be part of the virtualization software that enables the virtualization. The selection of the configuration of the virtualization software, i.e., whether hosted or not, or whether it is fully virtualized or para-virtualized, are made based on the relative advantages and disadvantages of each type, which are well known to those skilled in the art of virtualizing computer systems. -
FIG. 2 illustrates VMs 20-1, 20-2 and VMMs 50-1, 50-2 transmitting network frames to network interface card (NIC) 17 of host 10-1 throughvirtual switch 65.Virtualization software 15 transmits network frames from VMs 20-1, 20-2 via virtual NICs (VNICs) 25-1, 25-2 tophysical NIC 17 of host computer 10-1. Each VNICs 25-1, 25-2 is communicatively coupled to a correspondingvirtual port virtual switch 65.Virtual switch 65 is a logical collection ofvirtual ports virtual port virtual switch 65 determines how and where to route network frames transmitted to and from VNICs 25-1, 25-2 and NIC 17. Thus,virtual switch 65 functions as a software bridge that allows multiple VMs to share zero, one, or multiple physical NICs. If zero (i.e., no) physical NICs are installed on host 10-1, for example, thenvirtual switch 65 may function as a virtual network that connects VMs 20-1, 20-2 running on host 10-1. - Each VNIC 25-1, 25-2 is an emulated network device, presented by
virtualization software 15 to VMs 20-1, 20-2 requiring network access. Thus,virtual switch 65 handles forwarding traffic between the VNICs 25-1, 25-2, connected tovirtual switch 65 and possibly bridging to a physical network via one or more physical NICs. In general, virtual switches are capable of determining, based on a network frame's header, whether or not the frame is locally destined, and if it is locally destined, which virtual machines should receive the frame. Network administrators are generally required to manage thevirtual switches 65 to configure these features. Since the number ofvirtual switches 65 are typically greater in number than their physical counterparts, the network administrator may be required to perform repetitive tasks of configuring manyvirtual switches 65. - One advantage of virtualization technology is that it allows a VM to be migrated from one physical host to another by powering down or suspending the VM on one host, and powering up or resuming the VM a different physical host. In this context, “suspending,” refers to the execution of the VM being temporarily or permanently halted by the virtualization software. It should be noted that the execution of a VM is frequently suspended even though it is “running.” A VM may be momentarily suspended, for example, in order to allow execution of another co-running VM to proceed. In contrast, “powering off” a VM refers to virtualizing the power-down procedure of a physical machine. As with a physical computer, a VM may be powered down in a methodical manner in which each process is notified by the OS of impending shut down, allowing each open application to save its data and exit, or the power down can be performed by simulating a power-off, in which case all running processes are terminated, losing any unsaved data or state associated with running processes. After powering off a VM, resumption of execution typically requires rebooting the guest OS and restarting any applications, whereas resuming execution of a suspended VM requires reloading the state into the VM and resuming execution.
- When a VM is suspended, the processes are halted and the VM's state, including its memory contents, register settings, virtual device states, etc., may be written to a disk. In the example shown in
FIG. 2 , VM 20-2 may be migrated by suspending or powering off VM 20-2 on host 10-1 and resuming or powering on VM 20-2 on host 10-2, as represented byarrow 75. The term “migration” therefore refers to a process of moving a VM from one host to another by suspending or powering off a VM on one host and resuming or powering on that VM on a different host. - Unfortunately, migrating a VM from one host to another may involve some loss in state associated with the VNIC for the migrated VM. Conventionally, when VM 20-2 is migrated from host 10-1 to host 10-2 (as indicated by arrow 75),
connection 56 between VNIC emulator 55-2 andvirtual port 64 is lost, as indicated bycross 52, and anew connection 58 is established between VNIC emulator 55-3 andvirtual port 66 onvirtual switch 65′ implemented byvirtualization software 15′ on host 10-2. The MAC address and other state information associated with VNIC 25-2 can be transferred to VNIC 25-3 as part of the attributes of the virtual devices making up VM 20-2, so that resumed VM 20-2 maintains its position on the network. However, VM 20-2 further connects tovirtual port 66 ofvirtual switch 65′ on host 10-2, presumingnew port 66 to offer similar network connectivity, but making no assumptions about any preservation of state not associated specifically with virtual NIC device 25-2 (e.g., MAC address, broadcast/multicast filter, etc). Thus, in the course of this VM migration process, state information that may be accumulated onvirtual switch port 64 is typically lost. - In addition to these heretofore unrecognized problems, a network administrator who is viewing a virtual network from the switch point of view has no consistent topology to work with if VMs are migrating while he attempts to view and/or reconfigure the virtual network.
- Described herein is a method for persisting a state of a virtual port associated with a virtual machine (“VM”) as the VM is migrated from a source host to a destination host. In certain embodiments, a virtual switch forwards network frames between the VM and the physical network interface via the virtual port. During migration of the VM, a runtime state of the virtual port is transferred to the destination host and applied at the second host to a virtual port associated with a second virtual switch at the destination host. The runtime state of the virtual port at the source host is then cleared, and the second virtual switch at the destination host forwards network frames between the migrated VM and the physical network interface of the destination host using the virtual port at the second host.
-
FIG. 1 illustrates a non-hosted virtualized system. -
FIG. 2 illustrates the VMs and VMMs transmitting network frames to the network interface cards (NICs) of the system hardware through a virtual switch. -
FIG. 3 illustrates a distributed virtual switch (DVswitch), according to one embodiment. -
FIG. 4 illustrates how a distributed virtual port (DVport) of the DVswitch is configured, according to one embodiment. -
FIG. 5 illustrates how the DVswitch reconfigures a connection between a VNIC and a virtual switch during VM migration, according to one embodiment. -
FIG. 6 illustrates a process for creating and deleting a DVswitch, according to one embodiment. -
FIG. 7 illustrates a process for connecting or disconnecting a VNIC to or from a DVport of a DVswitch, according to one embodiment. -
FIG. 8 illustrates a process for DVport migration during VM migration, according to one embodiment. -
FIG. 9 illustrates a process for reconfiguring a DVswitch while powering down and powering up a host, according to one embodiment. - Reference will now be made in detail to several embodiments, examples of which are illustrated in the accompanying figures. It is noted that wherever practicable similar or like reference numbers may be used in the figures and may indicate similar or like functionality. The figures depict embodiments for purposes of illustration only. One skilled in the art will readily recognize from the following description that alternative embodiments of the structures and methods illustrated herein may be employed without departing from the principles described herein.
-
FIG. 3 illustrates, by way of example, a managedcollection 300 of virtualized computer systems. A distributed virtual switch (DVswitch) comprisesDVswitch components virtual switches FIG. 3 represents only two hosts 100-1, 100-2 each having only asingle VM - The DVswitch, as a software abstraction, resides on a variety of hardware in a distributed manner, hence the term “distributed” virtual switch. For example,
DVswitch components database 370.DVswitch components FIG. 3 with a dotted line box indicating portions ofDVswitch virtualization software 600 anddatabase controller 372 as will be described in more detail below. - As shown in
FIG. 3 , a singlevirtual port VMs VM FIG. 3 shows only one VNIC for each VM, and only one VM for each host. Those skilled in the art will recognize that discussion herein of VNICs 215-1, 215-2 is actually a discussion of a VNIC state implemented and maintained by each VNIC emulator 301-1, 301-2. As mentioned previously, virtual devices such as VNICS 215-1, 215-2 are software abstractions that are convenient to discuss as though part of VMs 200-1, 200-2, but are actually implemented byvirtualization software underlying virtualization software - Similar
virtual switches physical network 442 are managed using one DVswitch.Physical network 442, may be, e.g., a local area network. InFIG. 3 , the DVswitch includes distributed virtual ports (DVports) 352, 354. A DVport is a software abstraction that encapsulates the “personality” (both configuration and runtime state) of a corresponding virtual port. Thus,DVport 352 contains one or more data structures representing the configuration and runtime state ofvirtual port 652 of avirtual switch 602. Likewise,DVport 354 contains one or more data structures representing the configuration and runtime sate ofvirtual port 654 ofvirtual switch 602′. DVports are created with a configuration predefined by a network administrator.Virtual ports - The term “connection” is used herein to describe an association of a virtual NIC with a DVport. In one embodiment, this association is maintained locally by
virtualization software database 370 as described in more detail below. When a connection to a DVport occurs, another virtual NIC cannot be connected to that DVport without explicitly disconnecting the already connected virtual NIC. The term “Link Up” is used herein to describe a state where a virtual NIC and a virtual port have been made ready to send and receive frames. If and only if both the virtual NIC and the virtual port agree on this link-up state, can the network traffic be forwarded to and from the virtual NIC by the virtual switch. Note that the term “filter” is used herein to describe a software component that interposes on an Input Output (I/O) path between the virtual port and the virtual NIC. The term “forwarding engine” is used herein to describe a software component that is able to build and maintaintables mapping layer 2 hardware addresses (e.g., MAC addressees) to virtual ports, and to make forwarding decisions based on those tables. -
DVswitch 350 and itsDVports physical NICs database 370 stores the state ofDVswitch 350 andDVports Database 370 may be provided ondatabase controller 372 connected to hosts 100-1, 100-2 viaphysical network 442. In an alternate embodiment, a second physical network (not shown) connectsdatabase server 374 to hosts 100-1, 100-2, via second NICs (not shown) installed on each host 100-1, 100-2, to further isolatedatabase server 374 from network resources (e.g., the Internet) that may pose a security risk. Hosts 100-1, 100-2 in the managed domain therefore have access to thedatabase 370. The managed domain is a collection of hosts 100-1, 100-2 covered by an instance of thedatabase 370. For states that are global to a givenDVswitch 350,database 370 pushes read-only copies to each of the hosts 100-1, 100-2 in the managed domain. Because hosts 100-1, 100-2 do not need to alter the data and updates to it are infrequent, pushing updates to all hosts 100-1, 100-2 aggressively does not introduce unacceptable overhead. States that are specific to a givenDVport virtual port database 370 pushes DVport state only to the necessary host and polls that host periodically and around certain critical events for updates in the states. In addition to being stored permanently indatabase 370, some DVswitch state may be cached on each host in the managed domain to avoid unnecessary communication withdatabase 370. A process residing ondatabase 370 is responsible for pushing relevant updates to each host'slocal storage local storage database 370 by a database server process ofdatabase controller 372 in a timely manner. In the event thatdatabase 370 is offline or a host loses connectivity todatabase 370, the host can continue operations in the current state, albeit without updates fromdatabase 370 and without assurances that changes it makes to its local storage will be persisted. The risks associated with such a loss of connectivity are minimal (i.e., unlike a distributed file system where irretrievable data loss may occur if the synchronization mechanism is lost, here the only resources being shared are conceptual). - In one embodiment, a two-level ownership model is applied to the DVport state. The first level of ownership refers to which host currently has the rights to modify the state of a particular DVport. In one embodiment, such ownership of a DVport state is granted implicitly by
database controller 370 when it pushes the state of the DVport to a given host.Database controller 370 is responsible for granting and revoking host ownership ofDVports database controller 372 explicitly revokes the ownership. - The second level of ownership refers to which virtual NIC is currently connected to the DVport. When virtual NIC 215-1 makes a new “connection” to
DVport 352, virtual NIC 215-1 issues a request todatabase controller 372 for a connection identifier (ID) forDVport 352. In one embodiment, virtual NIC 215-1 identifiesDVport 352 by a DVport number (or other identifier) which may be manually selected by the user (i.e., administrator) or automatically assigned by a management application during configuration of the DVswitch. For example, a DVport number identifying a particular DVport by its number may be configured along with other configuration settings for a VM. If the connection ID field is empty for the requested DVport, then a new connection ID is generated bydatabase controller 372 and returned to virtual NIC 215-1. When virtual NIC 215-1 receives the connection ID forDVport 352, it owns rights to use network resources backing (i.e., associated with)DVport 352. The connection ID and DVport number may be stored along with other configuration settings for the VM, thereby creating an association between the VM and the DVport. As noted above, virtual NICs 215-1, 215-2 are software abstractions of physical NICs implemented by virtual NIC emulators 301-1, 301-2, respectively. Therefore, the code for requesting and obtaining a connection ID may reside in components of virtual NIC emulators 301-1, 301-2 or other components ofvirtualization software - If the current connection ID field for a particular DVport is not empty at the time of the connection request, then another virtual NIC currently owns connection rights and the new connection request will be denied. Each time a virtual NIC is granted a connection to a DVport, the virtual NIC stores the connection ID and uses that for future operations. The virtual NIC may release the connection at any time, at which point it becomes available for use by another virtual NIC. It is possible to revoke a connection by simply generating a new connection ID for the DVport or by clearing the current connection ID field of the DVport. Once a connection is revoked, attempts to use the old connection ID will fail.
- In another embodiment, a DVport may be owned collectively by a cluster of hosts, without explicit assignment to a single host. Any conflicts arising from multiple hosts attempting to claim the same DVport can be resolved via a peer-to-peer election algorithm.
- Once virtual NIC 215-1 is connected to
DVport 352, the virtual NIC may attempt to bring the link up by making a call into system-level software on host 100-1 to request thatDVport 352 be backed by a virtual port. The system-level software may be virtualization software such asvirtualization software 600 or other system level software. For example, in a non-hosted virtualization system, the call may be made to a VMKernel, such as that described above with reference toFIGS. 1 and 2 . In response to the call, the system-level software may then associateDVport 352 withvirtual port 652 ofvirtual switch 602 to provide access to the desired network. Once the link-up is successfully completed, virtual NIC 215-1 is able to send and receive frames to and fromnetwork 442. - As will be explained in more detail below with reference to
FIG. 9 , whenvirtual machine 320 powers off or is suspended, VNIC 215-1 calls into the system-level software to bring the link state down. This releases underlyingvirtual port 652 and resources associated withDVport 352, but does not release ownership ofDVport 352. Before releasingvirtual port 652, the system synchronizes all registered port state back toDVport 352. When the virtual machine powers on again or resumes,DVport 352 requests a new virtual port on host 100-1 and synchronizes all the registered port state back to it, and brings the link state up again if that is the state it was left in. - As will be explained in more detail below with reference to
FIG. 8 , whenvirtual machine 320 migrates from one host (e.g., 100-1) to another host (e.g., 100-2), the same sequence of steps as in powering down and up the VM is executed, except that the first half of the procedure for releasing the underlying virtual switch port happens on the source host and the second half of the procedure for acquiring a new underlying virtual switch port happens on the destination host. One additional step is required to transfer the DVport state to the destination host's local storage and invalidate it on the source host's local storage. Since the connection ID is part of the DVport state, VM migration causes transfer of ownership of the DVport from the source host to the destination host. -
FIG. 4 illustrates a conceptualization of a plurality of distributedvirtual switches DVswitch 350.DVswitch 350 in turn provides connectivity to VNICs 215-1, 215-2 to network 442 viaphysical NICs virtual ports virtual switches FIG. 3 , is unnecessary. In this way the DVswitch represents a convenient abstraction of underlying logic implementing links between VNICs and virtual switches, allowing the user to manage the DVswitch as an abstraction of a physical switch connecting each of the VMs to a particular local area network (LAN). In the present case, the “user” referred to above, may be a network or host administrator. Because the DVswitch abstracts out the settings of individual virtual switches and virtual ports, the administrator only needs to concern him- or herself with attaching DVswitch to each VNIC and configuring same. Once that is done, virtual ports and switches that back the DVports and DVswitches will automatically be properly configured when restarting or suspending and resuming a VM, even if the resume or restart is on a different host in the managed collection. - As suggested by
FIG. 4 , a single host 100-1 may interact with a plurality of DVswitches, each associated with a corresponding network. In the present example, hosts 100-1, 100-2 each interact withDVswitches networks NIC 172 connectingDVswitch 350 tonetwork 442,NIC 174 connectingDVswitch 350′ to network 446, andNIC 176 connectingDVswitch 350″ tonetwork 448. Host 100-2 includes corresponding components, although many other configurations are possible, as would occur to those skilled in the art. -
FIG. 5 illustrates a simplified view ofcollection 300 shown previously inFIG. 3 , prior to a migration ofVM 320′ from host 100-1, to host 100-2. According to one embodiment, whenVM 320′ migrates from source host 100-1 to destination host 100-2, the connection between VNIC 215-2 and virtual port of the 654 ofvirtual switch 602 is lost, and VNIC 215-2 connects with a newvirtual port 656 ofvirtual switch 602′ on destination host 100-2. BecauseDVswitch 350 facilitates the transfer of the state and ownership of the DVport (e.g., 352) from thelocal storage 358 of source host 100-1 to thelocal storage 358′ of destination host 100-2 through theDVswitch 350, state information that may be accumulated onvirtual switch port 654 is not lost and is also migrated tovirtual port 656 ofvirtual switch 602′. - The DVswitch and DVport implementation is extensible at run time by means of registering filter and forwarding engine classes. One forwarding engine class (not shown herein) is associated with each
DVswitch 350, and zero or more filter classes are associated withDVswitch 350. A forwarding class implements the basic frame forwarding logic forDVswitch 350. The forwarding class includes rules for determining and indicating which DVport(s) should receive each frame that comes into the DVswitch. Since the forwarding class is responsible for making forwarding decisions, there is only one forwarding class associated with eachDVswitch 350. The forwarding class may register DVswitch and DVport specific context for configuration and runtime state. A filter class implements some type of monitoring, filtering, or transformation functionality for a DVport. Each filter class may be applied to one or more DVports and may register a port specific context for configuration and run time state. - The forwarding engine class is assigned at DVswitch creation time. Filter classes can be added or removed at any time to or from DVports. Each forwarding engine class defines a set of callbacks to implement various required and optional functionalities. Each forwarding engine class may also optionally declare one or more opaque data types to be maintained by the system. These data will be appended to the DVswitch and DVport state which is migrated and persisted by the system.
-
FIG. 6 illustrates, by way of example, a process for creating and deleting a DVswitch, according to one embodiment. Referring now toFIGS. 3 and 6 , inoperation 601,database controller 372 creates anew DVswitch entry 350C and DVports of the DVswitch indatabase 370. In this regard,DVswitch 350 is associated with a forwarding engine service class and class-specific DVswitch state. In order to create a new DVport entry indatabase 370, the DVport entry is associated with a given DVswitch, and the DVport state is initialized to default values. For example, the “current connection ID” of the DVport may be set to the “DVPORT_NO_CONNECTION” to indicate that no virtual NIC is currently connected to the DVport.Database controller 372 pushes the new DVport information out to all hosts 100-1, 100-2 in the managed domain, which store it inlocal storage database controller 372 may also install a DVport filter by associating an opaque class-defined state with the DVport's state. - In
operation 604, a host joins the createdDVswitch 350. In one embodiment, this operation is initiated bydatabase controller 372, which (i) verifies that the host (e.g., 100-1, 100-2) can provide appropriate network connectivity and services to host a portion of the given DVswitch, (ii) adds the host to the list of hosts associated withDVswitch 350 indatabase 370, and (iii) pushes the current DVswitch data out to the to-be-connected host, which stores it in its local storage. - In
operation 606, a host leaves the DVswitch. In one embodiment, this operation is initiated bydatabase controller 372, which (i) verifies that the host (e.g., 100-1, 100-2) to leave the DVswitch does not currently have any DVports (e.g., 352, 354, . . . , 362) from the given DVswitch delegated to it, (ii) contacts the host (e.g., 100-1, 100-2) to indicate that it should clear its local storage of any data associated with the given DVswitch, and (iii) removes the host from the list of hosts associated with theDVswitch 350 indatabase 370. Note that a host may join 604 and leave 608 a DVswitch multiple times over the lifetime of the DVswitch. - In
operation 608,database controller 372 deletes a DVswitch (e.g., 350) fromdatabase 370. To delete the DVswitch (e.g., 350),database controller 372 makes sure that all hosts have left the DVswitch and then removes all states corresponding to the DVswitch fromdatabase 370. -
FIG. 7 illustrates a process for connecting or disconnecting a VNIC to or from a DVport of the DVswitch, according to one embodiment. Instep 702, a virtual NIC (e.g., 215-1) is connected to a requested DVport (e.g., 352) ofDVswitch 350. In one embodiment, this operation is initiated viadatabase controller 372, which checks for existing connections on the requested DVport (e.g., 352) by ensuring that the current connection ID is DVPORT_NO_CONNECTION, indicating that no virtual NIC is currently connected to that requested DVport. If another virtual NIC is currently connected to the requested DVport, then the request to connect the VNIC to the requested DVport is denied. If the requested DVport is available, thendatabase controller 372 generates a new connection ID and sets the “current connection ID” for the requested DVport (e.g., 352) to the new connection ID.Database controller 372 pushes the updated DVport data to the host (e.g., 100-1) which currently hosts the virtual NIC (e.g., 215-1) and sets the “connection ID” field of the virtual NIC configuration to the new connection ID as well. - In
step 704, a virtual port (e.g., 652) of thevirtual switch 602 is “linked up” to the “connected” virtual NIC (e.g., 215-1). In one embodiment, this operation occurs on the host (e.g., 100-1) where the virtual NIC (e.g., 215-1) is hosted and does not require participation fromdatabase controller 372. The virtual NIC (e.g., 215-1) calls into the host system level software (e.g., virtualization software 600) identifying the DVport (e.g., 352) it is connected to and provides a connection ID. The DVswitch system validates that the DVport (e.g., 352) is in fact currently delegated to this host (e.g., 100-1). In one embodiment, the presence of DVport data with a current connection ID other than DVPORT_NO_CONNECTION is sufficient for validating that the DVport (e.g., 352) is delegated to this host (e.g., 100-1). The DVswitch system validates that the connection ID provided by the virtual NIC (e.g., 215-1) matches the current connection ID in the DVport data. If the connection ID data does not match, the request to bring the link up is denied. If the connection ID data does match, port resources on the local per-host virtual switch (e.g., 602) are allocated to the virtual NIC (e.g., 215-1), and the virtual NIC implementation is passed a handle to the resources. Class-defined callbacks for any installed forwarding classes or filtering classes are installed on the underlying virtual switch port (e.g., 652) and virtual switch port state is restored from the host's local storage using class-defined deserializers. As a result, the virtual switch port (e.g., 652) is enabled for IO. - In
step 706, a virtual port of the virtual switch may also be “linked down” from the “connected” virtual NIC (e.g., 215-1). In one embodiment, this operation occurs on the host (e.g., 100-1) where the virtual NIC (e.g., 215-1) is hosted and does not require any participation from thedatabase controller 372. The virtual NIC (e.g., 215-1) calls into the system indicating that it would like to release the virtual switch port (e.g., 652) resources on the host (e.g., 100-1). As a result, all IO and other activity on the virtual switch port (e.g., 652) is quiesced. The DVswitch system collects all transparent DVport state from the underlying virtual switch port (e.g., 652). Class-defined callbacks for any installed forwarding classes or filtering classes are removed from the underlying virtual switch port (e.g., 652) and state is checkpointed to the host's local storage using class-defined serializers. Note that a virtual port of a virtual switch may be linked up or linked down multiple times over the lifetime of a virtual NIC connection to the DVport of a DVswitch. - In
step 708, the virtual NIC (e.g., 215-1) may be disconnected from a DVport (e.g., 352). In one embodiment, this operation is initiated via thedatabase controller 372, which pushes an update of the current connection ID to the host (e.g., 100-1) to which the DVport (e.g., 352) is currently delegated, setting the current connection ID to DVPORT_NO_CONNECTION. Upon receiving this update, the host (e.g., 100-1) brings the virtual port link state down if the link state is not already down, and pulls the DVport state back from the host's local storage to synchronize thedatabase 370. -
FIG. 8 illustrates a process for DVport migration during VM migration, according to one embodiment. Referring toFIGS. 5 and 8 , a DVport (e.g., 354) may be migrated between the hosts 100-1, 100-2 in the same way virtual machines (e.g., 200-2) are migrated. At a high level, DVports project their state onto an available virtual switch port to provide a consistent network connection for virtual NICs (e.g., 215-2) as they migrate from the source host (e.g., 100-1) to the destination host (e.g., 100-2). - In one embodiment, DVport migration is initiated via the
database controller 372, which performs the following operations for each virtual NIC in the affected virtual machine (e.g., 200-2) to be migrated. Inoperation 802,database controller 372 brings the DVport (e.g., 354) to be migrated down on the source host (e.g., 100-1) by performing “virtual port link down” on the source host (e.g., 100-1) as described above with reference toFIG. 7 . Inoperation 804, the serialized state for the DVport (e.g., 354) to be migrated from the local storage (e.g., 358) of the source host (e.g., 100-1) is transferred to the local storage (e.g., 358′) of the destination host (e.g., 100-2). In pushing the state for the DVport to the destination host,database controller 372 delegating ownership of the DVport to the destination host. Inoperation 806,Database controller 372 clears the virtual port state on the source host (e.g., 100-1), thereby revoking its ownership of the DVport (e.g., 352). Inoperations database controller 372 brings the DVport up on the destination host (e.g., 100-2) by applying the transferred state of the DVport (e.g., 354) to another virtual port of the virtual switch (e.g., 602′) on the destination host (e.g., 100-2) and performing virtual port “link up” on the destination host (e.g., 100-2) as described above. -
FIG. 9 illustrates, by way of example, a process for reconfiguring the DVswitch while powering down and powering up the host, according to one embodiment. These operations may occur with or without the participation ofdatabase controller 372. Ifdatabase controller 372 is aware of the imminent power down event, it may performoperation 902, in whichdatabase controller 372 retrieve updates from the host's local storage just before shut down of the host (e.g., 100-1). Inoperation 904, prior to power down, the host (e.g., 100-1) synchronizes its persistent local storage with its in-memory cache, if persistent storage is available. In operation 906, the contents of the DVswitch and DVport state are restored from the local storage to the host's in-memory cache immediately upon reboot if the host has a copy of its local DVswitch and DVport state cache on persistent local storage. Inoperation 908,database controller 372 transfers copies of all relevant DVswitch and DVport state to the host (e.g., 100-1) as soon as it detects the host's presence.Database controller 372 may attempt to merge or otherwise resolve conflicts between stale data from the host's cache and data fromdatabase 370. In one embodiment, data fromdatabase 370 is considered authoritative and overwrites any state maintained in local storage.Database controller 372 pushes the resulting updates to the host (e.g., 100-1). - Upon reading this disclosure, those of skill in the art will appreciate still additional alternative structural and functional designs for a distributed virtual switch through the disclosed principles herein. Certain method operations described above may be performed concurrently or in different orders than that described. While particular embodiments and applications have been illustrated and described, it is to be understood that that various modifications, changes and variations which will be apparent to those skilled in the art may be made in the arrangement, operation and details of the method and apparatus of the embodiments disclosed herein without departing from the spirit and scope of the invention as defined in the appended claims.
Claims (21)
1. (canceled)
2. A method of configuring a first virtual port of a virtual switch executing on a host computer for a first machine executing on the host computer, the method comprising:
receiving a set of forwarding rules and a set of input/output (I/O) path filtering behaviors for the first machine;
storing, as a persisted second virtual port that is associated with the first machine, the set of forwarding rules and the set of I/O path filtering behaviors;
when the first virtual port is associated with the first machine in order to forward data messages from the first machine to other machines executing on the host computer or to devices operating outside of the host computer, configuring the first virtual port with the set of forwarding rules and the set of I/O path filtering behaviors of the persisted second virtual port based on the second virtual port's association with the first machine.
3. The method of claim 2 , wherein second virtual port is a port of a distributed virtual switch (DVS) for which the set of forwarding rules and the set of I/O path filtering behaviors are received and stored.
4. The method of claim 3 , wherein the set of forwarding rules and the set of filtering behavior are received for the DVS through a management application, and the DVS spans multiple host computers and is an abstraction provided by the management application to allow an administrator to manage the set of forwarding rules and the set of filtering behaviors for multiple machines executing on the multiple host computers in order to allow data messages to be exchanged between the multiple machines executing on the multiple host computers.
5. The method of claim 4 , wherein the set of filtering rules and the set of filtering behaviors are stored for the second virtual port in a persistent storage of the first host computer.
6. The method of claim 2 , wherein the set of forwarding rules is part of one forwarding class that defines forwarding behavior of the second virtual port.
7. The method of claim 2 , wherein the set of filtering behaviors is part of one filtering class that defines filtering behavior along the first machine's I/O path.
8. The method of claim 7 , wherein the set of filtering behaviors comprises at least one of monitoring operation, filtering operation, and transformation operation of the first distributed port.
9. The method of claim 2 , wherein the second virtual port is associated with the first machine by providing to the first host computer a connection identifier that associates the first machine with the second virtual port.
10. The method of claim 9 , wherein
the first machine comprises a first virtual network interface card (VNIC);
providing the connection identifier comprises assigning the connection identifier to the first VNIC to specify that the first VNIC has the right to use network resources associated with the second virtual port.
11. The method of claim 2 further comprising configuring the first host computer to store runtime state of first virtual port with the second virtual port.
12. The method of claim 11 further comprising:
collecting the runtime state from the second virtual port;
migrating the first machine from the first host computer to a second host computer;
associating the second virtual port with a third virtual port of a second virtual switch executing on the second host computer;
providing the collected and stored runtime state to the third virtual port so that state associated with the migrated first machine is not lost because of the migration.
13. A non-transitory machine readable medium storing a program for execution by at least one processing unit of a computer to configure a first virtual port of a virtual switch executing on a host computer for a first machine executing on the host computer, the program comprising sets of instructions for:
receiving a set of forwarding rules and a set of input/output (I/O) path filtering behaviors for the first machine;
storing, as a persisted second virtual port that is associated with the first machine, the set of forwarding rules and the set of I/O path filtering behaviors;
when the first virtual port is associated with the first machine in order to forward data messages from the first machine to other machines executing on the host computer or to devices operating outside of the host computer, configuring the first virtual port with the set of forwarding rules and the set of I/O path filtering behaviors of the persisted second virtual port based on the second virtual port's association with the first machine.
14. The non-transitory machine readable medium of claim 13 , wherein second virtual port is a port of a distributed virtual switch (DVS) for which the set of forwarding rules and the set of I/O path filtering behaviors are received and stored.
15. The non-transitory machine readable medium of claim 14 , wherein the set of forwarding rules and the set of filtering behavior are received for the DVS through a management application, and the DVS spans multiple host computers and is an abstraction provided by the management application to allow an administrator to manage the set of forwarding rules and the set of filtering behaviors for multiple machines executing on the multiple host computers in order to allow data messages to be exchanged between the multiple machines executing on the multiple host computers.
16. The non-transitory machine readable medium of claim 15 , wherein the set of filtering rules and the set of filtering behaviors are stored for the second virtual port in a persistent storage of the first host computer.
17. The non-transitory machine readable medium of claim 13 , wherein the set of forwarding rules is part of one forwarding class that defines forwarding behavior of the second virtual port.
18. The non-transitory machine readable medium of claim 13 , wherein the set of filtering behaviors is part of one filtering class that defines filtering behavior along the first machine's I/O path.
19. The non-transitory machine readable medium of claim 18 , wherein the set of filtering behaviors comprises at least one of monitoring operation, filtering operation, and transformation operation of the first distributed port.
20. The non-transitory machine readable medium of claim 13 , wherein the second virtual port is associated with the first machine by providing to the first host computer a connection identifier that associates the first machine with the second virtual port.
21. The non-transitory machine readable medium of claim 20 , wherein the first machine comprises a first virtual network interface card (VNIC), and the connection identifier is provided by assigning the connection identifier to the first VNIC to specify that the first VNIC has the right to use network resources associated with the second virtual port.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US18/244,870 US20230421511A1 (en) | 2008-05-23 | 2023-09-11 | Distributed virtual switch for virtualized computer systems |
Applications Claiming Priority (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/126,777 US8195774B2 (en) | 2008-05-23 | 2008-05-23 | Distributed virtual switch for virtualized computer systems |
US13/470,560 US9160612B2 (en) | 2008-05-23 | 2012-05-14 | Management of distributed virtual switch and distributed virtual ports |
US14/876,484 US9838339B2 (en) | 2008-05-23 | 2015-10-06 | Distributed virtual switch for virtualized computer systems |
US15/818,398 US10637803B2 (en) | 2008-05-23 | 2017-11-20 | Distributed virtual switch for virtualized computer systems |
US16/859,176 US11190463B2 (en) | 2008-05-23 | 2020-04-27 | Distributed virtual switch for virtualized computer systems |
US17/537,415 US11757797B2 (en) | 2008-05-23 | 2021-11-29 | Distributed virtual switch for virtualized computer systems |
US18/244,870 US20230421511A1 (en) | 2008-05-23 | 2023-09-11 | Distributed virtual switch for virtualized computer systems |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/537,415 Continuation US11757797B2 (en) | 2008-05-23 | 2021-11-29 | Distributed virtual switch for virtualized computer systems |
Publications (1)
Publication Number | Publication Date |
---|---|
US20230421511A1 true US20230421511A1 (en) | 2023-12-28 |
Family
ID=41340447
Family Applications (7)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/126,777 Active 2030-03-04 US8195774B2 (en) | 2008-05-23 | 2008-05-23 | Distributed virtual switch for virtualized computer systems |
US13/470,560 Active 2030-08-10 US9160612B2 (en) | 2008-05-23 | 2012-05-14 | Management of distributed virtual switch and distributed virtual ports |
US14/876,484 Active 2032-11-07 US9838339B2 (en) | 2008-05-23 | 2015-10-06 | Distributed virtual switch for virtualized computer systems |
US15/818,398 Active 2028-12-12 US10637803B2 (en) | 2008-05-23 | 2017-11-20 | Distributed virtual switch for virtualized computer systems |
US16/859,176 Active US11190463B2 (en) | 2008-05-23 | 2020-04-27 | Distributed virtual switch for virtualized computer systems |
US17/537,415 Active US11757797B2 (en) | 2008-05-23 | 2021-11-29 | Distributed virtual switch for virtualized computer systems |
US18/244,870 Pending US20230421511A1 (en) | 2008-05-23 | 2023-09-11 | Distributed virtual switch for virtualized computer systems |
Family Applications Before (6)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/126,777 Active 2030-03-04 US8195774B2 (en) | 2008-05-23 | 2008-05-23 | Distributed virtual switch for virtualized computer systems |
US13/470,560 Active 2030-08-10 US9160612B2 (en) | 2008-05-23 | 2012-05-14 | Management of distributed virtual switch and distributed virtual ports |
US14/876,484 Active 2032-11-07 US9838339B2 (en) | 2008-05-23 | 2015-10-06 | Distributed virtual switch for virtualized computer systems |
US15/818,398 Active 2028-12-12 US10637803B2 (en) | 2008-05-23 | 2017-11-20 | Distributed virtual switch for virtualized computer systems |
US16/859,176 Active US11190463B2 (en) | 2008-05-23 | 2020-04-27 | Distributed virtual switch for virtualized computer systems |
US17/537,415 Active US11757797B2 (en) | 2008-05-23 | 2021-11-29 | Distributed virtual switch for virtualized computer systems |
Country Status (9)
Country | Link |
---|---|
US (7) | US8195774B2 (en) |
EP (2) | EP3026855B1 (en) |
JP (1) | JP5183802B2 (en) |
KR (1) | KR101242908B1 (en) |
CN (1) | CN102037452B (en) |
AU (1) | AU2009249516B2 (en) |
CA (2) | CA2724237C (en) |
RU (1) | RU2451991C1 (en) |
WO (1) | WO2009142826A1 (en) |
Families Citing this family (357)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8924524B2 (en) | 2009-07-27 | 2014-12-30 | Vmware, Inc. | Automated network configuration of virtual machines in a virtual lab data environment |
US8892706B1 (en) | 2010-06-21 | 2014-11-18 | Vmware, Inc. | Private ethernet overlay networks over a shared ethernet in a virtual environment |
US8619771B2 (en) | 2009-09-30 | 2013-12-31 | Vmware, Inc. | Private allocated networks over shared communications infrastructure |
EP2597816B1 (en) | 2007-09-26 | 2019-09-11 | Nicira Inc. | Network operating system for managing and securing networks |
US8195774B2 (en) * | 2008-05-23 | 2012-06-05 | Vmware, Inc. | Distributed virtual switch for virtualized computer systems |
US20090296726A1 (en) * | 2008-06-03 | 2009-12-03 | Brocade Communications Systems, Inc. | ACCESS CONTROL LIST MANAGEMENT IN AN FCoE ENVIRONMENT |
JP5268469B2 (en) * | 2008-07-23 | 2013-08-21 | 株式会社東芝 | High availability system and execution state control method |
US8281305B2 (en) * | 2008-10-17 | 2012-10-02 | Hitachi, Ltd. | Method and apparatus for resource provisioning |
US8331362B2 (en) | 2008-12-30 | 2012-12-11 | Juniper Networks, Inc. | Methods and apparatus for distributed dynamic network provisioning |
US8565118B2 (en) * | 2008-12-30 | 2013-10-22 | Juniper Networks, Inc. | Methods and apparatus for distributed dynamic network provisioning |
US8255496B2 (en) | 2008-12-30 | 2012-08-28 | Juniper Networks, Inc. | Method and apparatus for determining a network topology during network provisioning |
US8190769B1 (en) | 2008-12-30 | 2012-05-29 | Juniper Networks, Inc. | Methods and apparatus for provisioning at a network device in response to a virtual resource migration notification |
US8054832B1 (en) | 2008-12-30 | 2011-11-08 | Juniper Networks, Inc. | Methods and apparatus for routing between virtual resources based on a routing location policy |
US8213336B2 (en) * | 2009-02-23 | 2012-07-03 | Cisco Technology, Inc. | Distributed data center access switch |
CN102334112B (en) * | 2009-02-27 | 2014-06-11 | 美国博通公司 | Method and system for virtual machine networking |
US8665886B2 (en) | 2009-03-26 | 2014-03-04 | Brocade Communications Systems, Inc. | Redundant host connection in a routed network |
AU2014233640B2 (en) * | 2009-04-01 | 2017-02-02 | Nicira, Inc. | Method and apparatus for implementing and managing virtual switches |
CA3081255C (en) * | 2009-04-01 | 2023-08-22 | Nicira, Inc. | Method and apparatus for implementing and managing virtual switches |
US9588803B2 (en) | 2009-05-11 | 2017-03-07 | Microsoft Technology Licensing, Llc | Executing native-code applications in a browser |
US8266256B2 (en) * | 2009-07-21 | 2012-09-11 | Empire Technology Development Llc | Virtualization for low-power networks |
US8335854B2 (en) * | 2009-07-21 | 2012-12-18 | Empire Technology Development Llc | Performing services on behalf of low-power devices |
US8566822B2 (en) | 2009-07-22 | 2013-10-22 | Broadcom Corporation | Method and system for distributing hypervisor functionality over multiple physical devices in a network and configuring sub-hypervisor to control the virtual machines |
US8873375B2 (en) | 2009-07-22 | 2014-10-28 | Broadcom Corporation | Method and system for fault tolerance and resilience for virtualized machines in a network |
US8639783B1 (en) | 2009-08-28 | 2014-01-28 | Cisco Technology, Inc. | Policy based configuration of interfaces in a virtual machine environment |
US8693485B2 (en) * | 2009-10-14 | 2014-04-08 | Dell Products, Lp | Virtualization aware network switch |
US8953603B2 (en) | 2009-10-28 | 2015-02-10 | Juniper Networks, Inc. | Methods and apparatus related to a distributed switch fabric |
US8442048B2 (en) | 2009-11-04 | 2013-05-14 | Juniper Networks, Inc. | Methods and apparatus for configuring a virtual network switch |
WO2011068091A1 (en) * | 2009-12-04 | 2011-06-09 | 日本電気株式会社 | Server and flow control program |
US8274973B2 (en) * | 2010-03-24 | 2012-09-25 | Cisco Technology, Inc. | Virtual service domains |
US8369335B2 (en) | 2010-03-24 | 2013-02-05 | Brocade Communications Systems, Inc. | Method and system for extending routing domain to non-routing end stations |
US8599854B2 (en) * | 2010-04-16 | 2013-12-03 | Cisco Technology, Inc. | Method of identifying destination in a virtual environment |
US8989186B2 (en) | 2010-06-08 | 2015-03-24 | Brocade Communication Systems, Inc. | Virtual port grouping for virtual cluster switching |
US9461840B2 (en) * | 2010-06-02 | 2016-10-04 | Brocade Communications Systems, Inc. | Port profile management for virtual cluster switching |
US9231890B2 (en) | 2010-06-08 | 2016-01-05 | Brocade Communications Systems, Inc. | Traffic management for virtual cluster switching |
US9270486B2 (en) | 2010-06-07 | 2016-02-23 | Brocade Communications Systems, Inc. | Name services for virtual cluster switching |
US9716672B2 (en) | 2010-05-28 | 2017-07-25 | Brocade Communications Systems, Inc. | Distributed configuration management for virtual cluster switching |
US8867552B2 (en) | 2010-05-03 | 2014-10-21 | Brocade Communications Systems, Inc. | Virtual cluster switching |
US8625616B2 (en) | 2010-05-11 | 2014-01-07 | Brocade Communications Systems, Inc. | Converged network extension |
US9769016B2 (en) | 2010-06-07 | 2017-09-19 | Brocade Communications Systems, Inc. | Advanced link tracking for virtual cluster switching |
US9001824B2 (en) | 2010-05-18 | 2015-04-07 | Brocade Communication Systems, Inc. | Fabric formation for virtual cluster switching |
US8407366B2 (en) * | 2010-05-14 | 2013-03-26 | Microsoft Corporation | Interconnecting members of a virtual network |
US8634308B2 (en) | 2010-06-02 | 2014-01-21 | Brocade Communications Systems, Inc. | Path detection in trill networks |
US8885488B2 (en) | 2010-06-02 | 2014-11-11 | Brocade Communication Systems, Inc. | Reachability detection in trill networks |
US9608833B2 (en) | 2010-06-08 | 2017-03-28 | Brocade Communications Systems, Inc. | Supporting multiple multicast trees in trill networks |
US8446914B2 (en) | 2010-06-08 | 2013-05-21 | Brocade Communications Systems, Inc. | Method and system for link aggregation across multiple switches |
US9806906B2 (en) | 2010-06-08 | 2017-10-31 | Brocade Communications Systems, Inc. | Flooding packets on a per-virtual-network basis |
US9628293B2 (en) | 2010-06-08 | 2017-04-18 | Brocade Communications Systems, Inc. | Network layer multicasting in trill networks |
US9246703B2 (en) | 2010-06-08 | 2016-01-26 | Brocade Communications Systems, Inc. | Remote port mirroring |
US9396000B2 (en) * | 2010-06-25 | 2016-07-19 | Intel Corporation | Methods and systems to permit multiple virtual machines to separately configure and access a physical device |
US8743888B2 (en) | 2010-07-06 | 2014-06-03 | Nicira, Inc. | Network control apparatus and method |
US10103939B2 (en) * | 2010-07-06 | 2018-10-16 | Nicira, Inc. | Network control apparatus and method for populating logical datapath sets |
US8964528B2 (en) | 2010-07-06 | 2015-02-24 | Nicira, Inc. | Method and apparatus for robust packet distribution among hierarchical managed switching elements |
US9680750B2 (en) | 2010-07-06 | 2017-06-13 | Nicira, Inc. | Use of tunnels to hide network addresses |
US9525647B2 (en) | 2010-07-06 | 2016-12-20 | Nicira, Inc. | Network control apparatus and method for creating and modifying logical switching elements |
US9323921B2 (en) | 2010-07-13 | 2016-04-26 | Microsoft Technology Licensing, Llc | Ultra-low cost sandboxing for application appliances |
US8782434B1 (en) | 2010-07-15 | 2014-07-15 | The Research Foundation For The State University Of New York | System and method for validating program execution at run-time |
US9807031B2 (en) | 2010-07-16 | 2017-10-31 | Brocade Communications Systems, Inc. | System and method for network configuration |
US10353722B2 (en) * | 2010-07-21 | 2019-07-16 | Nec Corporation | System and method of offloading cryptography processing from a virtual machine to a management module |
US9118591B2 (en) * | 2010-07-30 | 2015-08-25 | Broadcom Corporation | Distributed switch domain of heterogeneous components |
US8954962B2 (en) * | 2010-09-22 | 2015-02-10 | Juniper Networks, Inc. | Automatically reconfiguring physical switches to be in synchronization with changes made to associated virtual system |
US8903705B2 (en) | 2010-12-17 | 2014-12-02 | Microsoft Corporation | Application compatibility shims for minimal client computers |
US8891406B1 (en) | 2010-12-22 | 2014-11-18 | Juniper Networks, Inc. | Methods and apparatus for tunnel management within a data center |
US9223611B2 (en) * | 2010-12-28 | 2015-12-29 | Microsoft Technology Licensing, Llc | Storing and resuming application runtime state |
JP5500270B2 (en) * | 2011-01-07 | 2014-05-21 | 富士通株式会社 | Profile processing program, data relay apparatus, and profile control method |
US9891939B2 (en) * | 2011-03-03 | 2018-02-13 | Microsoft Technology Licensing, Llc | Application compatibility with library operating systems |
JP5395833B2 (en) * | 2011-03-14 | 2014-01-22 | 株式会社東芝 | Virtual network system and virtual communication control method |
US8825900B1 (en) | 2011-04-05 | 2014-09-02 | Nicira, Inc. | Method and apparatus for stateless transport layer tunneling |
US9270572B2 (en) | 2011-05-02 | 2016-02-23 | Brocade Communications Systems Inc. | Layer-3 support in TRILL networks |
US8743885B2 (en) | 2011-05-03 | 2014-06-03 | Cisco Technology, Inc. | Mobile service routing in a network environment |
US9043452B2 (en) | 2011-05-04 | 2015-05-26 | Nicira, Inc. | Network control apparatus and method for port isolation |
KR101230009B1 (en) * | 2011-05-06 | 2013-02-13 | (주) 시스메이트 | Network information security service system based on cloud computing |
US8635614B2 (en) * | 2011-05-14 | 2014-01-21 | International Business Machines Corporation | Method for providing location independent dynamic port mirroring on distributed virtual switches |
US9495183B2 (en) | 2011-05-16 | 2016-11-15 | Microsoft Technology Licensing, Llc | Instruction set emulation for guest operating systems |
US8590005B2 (en) * | 2011-06-08 | 2013-11-19 | Adventium Enterprises, Llc | Multi-domain information sharing |
US9191454B2 (en) * | 2011-06-27 | 2015-11-17 | Microsoft Technology Licensing, Llc | Host enabled management channel |
US9407533B2 (en) | 2011-06-28 | 2016-08-02 | Brocade Communications Systems, Inc. | Multicast in a trill network |
US9401861B2 (en) | 2011-06-28 | 2016-07-26 | Brocade Communications Systems, Inc. | Scalable MAC address distribution in an Ethernet fabric switch |
US8879549B2 (en) | 2011-06-28 | 2014-11-04 | Brocade Communications Systems, Inc. | Clearing forwarding entries dynamically and ensuring consistency of tables across ethernet fabric switch |
US8948056B2 (en) | 2011-06-28 | 2015-02-03 | Brocade Communication Systems, Inc. | Spanning-tree based loop detection for an ethernet fabric switch |
US9007958B2 (en) | 2011-06-29 | 2015-04-14 | Brocade Communication Systems, Inc. | External loop detection for an ethernet fabric switch |
US8885641B2 (en) | 2011-06-30 | 2014-11-11 | Brocade Communication Systems, Inc. | Efficient trill forwarding |
CN103026660B (en) * | 2011-08-01 | 2015-11-25 | 华为技术有限公司 | Network policy configuration method, management equipment and network management centre device |
US20130034015A1 (en) * | 2011-08-05 | 2013-02-07 | International Business Machines Corporation | Automated network configuration in a dynamic virtual environment |
EP3407547B1 (en) | 2011-08-17 | 2020-01-22 | Nicira, Inc. | Hierarchical controller clusters for interconnecting different logical domains |
EP2745208B1 (en) | 2011-08-17 | 2018-11-28 | Nicira, Inc. | Distributed logical l3 routing |
US8656389B2 (en) * | 2011-08-22 | 2014-02-18 | Vmware, Inc. | Virtual port command processing during migration of virtual machine |
US9736085B2 (en) | 2011-08-29 | 2017-08-15 | Brocade Communications Systems, Inc. | End-to end lossless Ethernet in Ethernet fabric |
US8797914B2 (en) * | 2011-09-12 | 2014-08-05 | Microsoft Corporation | Unified policy management for extensible virtual switches |
US9288104B2 (en) | 2011-10-25 | 2016-03-15 | Nicira, Inc. | Chassis controllers for converting universal flows |
US9137107B2 (en) * | 2011-10-25 | 2015-09-15 | Nicira, Inc. | Physical controllers for converting universal flows |
US9203701B2 (en) | 2011-10-25 | 2015-12-01 | Nicira, Inc. | Network virtualization apparatus and method with scheduling capabilities |
US9154433B2 (en) | 2011-10-25 | 2015-10-06 | Nicira, Inc. | Physical controller |
US9699117B2 (en) | 2011-11-08 | 2017-07-04 | Brocade Communications Systems, Inc. | Integrated fibre channel support in an ethernet fabric switch |
US9450870B2 (en) | 2011-11-10 | 2016-09-20 | Brocade Communications Systems, Inc. | System and method for flow management in software-defined networks |
US9294351B2 (en) | 2011-11-10 | 2016-03-22 | Cisco Technology, Inc. | Dynamic policy based interface configuration for virtualized environments |
CN103930882B (en) | 2011-11-15 | 2017-10-03 | Nicira股份有限公司 | The network architecture with middleboxes |
US8995435B2 (en) * | 2011-12-09 | 2015-03-31 | Brocade Communication Systems, Inc. | Port profile analytics |
US9389933B2 (en) | 2011-12-12 | 2016-07-12 | Microsoft Technology Licensing, Llc | Facilitating system service request interactions for hardware-protected applications |
US9413538B2 (en) | 2011-12-12 | 2016-08-09 | Microsoft Technology Licensing, Llc | Cryptographic certification of secure hosted execution environments |
JP6010906B2 (en) * | 2011-12-27 | 2016-10-19 | 富士通株式会社 | Computer network system, configuration management method, configuration management program, and recording medium |
US8995272B2 (en) | 2012-01-26 | 2015-03-31 | Brocade Communication Systems, Inc. | Link aggregation in software-defined networks |
US9742693B2 (en) | 2012-02-27 | 2017-08-22 | Brocade Communications Systems, Inc. | Dynamic service insertion in a fabric switch |
US9154416B2 (en) | 2012-03-22 | 2015-10-06 | Brocade Communications Systems, Inc. | Overlay tunnel in a fabric switch |
CN107508767B (en) * | 2012-03-29 | 2020-10-02 | 英特尔公司 | Techniques for using assigned switch identifications in input/output devices |
US8954620B2 (en) * | 2012-03-29 | 2015-02-10 | Intel Corporation | Techniques for using an assigned switch identification at an input/output device |
US8923149B2 (en) * | 2012-04-09 | 2014-12-30 | Futurewei Technologies, Inc. | L3 gateway for VXLAN |
WO2013158920A1 (en) | 2012-04-18 | 2013-10-24 | Nicira, Inc. | Exchange of network state information between forwarding elements |
WO2013164403A1 (en) * | 2012-05-02 | 2013-11-07 | Nokia Siemens Networks Oy | Methods and apparatus |
US8949931B2 (en) | 2012-05-02 | 2015-02-03 | Cisco Technology, Inc. | System and method for monitoring application security in a network environment |
US9019977B2 (en) | 2012-05-16 | 2015-04-28 | Vmware, Inc. | Configuration management of distributed virtual switch |
US9374301B2 (en) | 2012-05-18 | 2016-06-21 | Brocade Communications Systems, Inc. | Network feedback in software-defined networks |
US9461938B2 (en) | 2012-05-22 | 2016-10-04 | International Business Machines Corporation | Large distributed fabric-based switch using virtual switches and virtual controllers |
US10277464B2 (en) | 2012-05-22 | 2019-04-30 | Arris Enterprises Llc | Client auto-configuration in a multi-switch link aggregation |
US10454760B2 (en) | 2012-05-23 | 2019-10-22 | Avago Technologies International Sales Pte. Limited | Layer-3 overlay gateways |
US9710762B2 (en) * | 2012-06-06 | 2017-07-18 | Juniper Networks, Inc. | Dynamic logging |
US9342326B2 (en) * | 2012-06-19 | 2016-05-17 | Microsoft Technology Licensing, Llc | Allocating identified intermediary tasks for requesting virtual machines within a trust sphere on a processing goal |
CN102760047B (en) * | 2012-06-21 | 2015-03-18 | 杭州华三通信技术有限公司 | Method for virtualizing migration of equipment port and port plate |
US8806025B2 (en) * | 2012-06-25 | 2014-08-12 | Advanced Micro Devices, Inc. | Systems and methods for input/output virtualization |
WO2014006795A1 (en) * | 2012-07-03 | 2014-01-09 | 日本電気株式会社 | Mutual connection management device, mutual connection setting method, and non-transitory computer-readable medium having stored program |
CN103532731B (en) * | 2012-07-06 | 2016-12-21 | 杭州华三通信技术有限公司 | A kind of method and apparatus preventing virtual machine network configuration loss |
US9231892B2 (en) | 2012-07-09 | 2016-01-05 | Vmware, Inc. | Distributed virtual switch configuration and state management |
US9519516B2 (en) * | 2012-07-11 | 2016-12-13 | Nec Corporation | Migration system, migration method and non-transitory computer-readable medium storing control program |
KR101239290B1 (en) * | 2012-07-23 | 2013-03-06 | (주)엔텍 | A system and method for setting virtual machines in a virtual server supporting zero clients |
CN102790777B (en) * | 2012-08-07 | 2016-06-15 | 华为技术有限公司 | Network interface adapter register method and driving equipment, server |
US9210079B2 (en) | 2012-08-14 | 2015-12-08 | Vmware, Inc. | Method and system for virtual and physical network integration |
US9602430B2 (en) | 2012-08-21 | 2017-03-21 | Brocade Communications Systems, Inc. | Global VLANs for fabric switches |
WO2014030229A1 (en) * | 2012-08-22 | 2014-02-27 | 株式会社日立製作所 | Virtual computer system for restoring network connection of virtual computer for which live migration has been performed |
US10203972B2 (en) | 2012-08-27 | 2019-02-12 | Vmware, Inc. | Framework for networking and security services in virtual networks |
US8918582B2 (en) | 2012-09-11 | 2014-12-23 | International Business Machines Corporation | Simulating EEPROM in virtual distributed switches |
US9063721B2 (en) | 2012-09-14 | 2015-06-23 | The Research Foundation For The State University Of New York | Continuous run-time validation of program execution: a practical approach |
JP6042549B2 (en) * | 2012-09-19 | 2016-12-14 | ローベルト ボツシユ ゲゼルシヤフト ミツト ベシユレンクテル ハフツングRobert Bosch Gmbh | How to run a computer network |
US9069782B2 (en) | 2012-10-01 | 2015-06-30 | The Research Foundation For The State University Of New York | System and method for security and privacy aware virtual machine checkpointing |
US9727386B2 (en) * | 2012-10-12 | 2017-08-08 | Futurewei Technologies, Inc. | Method and apparatus for network resource virtual partitioning |
US9571507B2 (en) * | 2012-10-21 | 2017-02-14 | Mcafee, Inc. | Providing a virtual security appliance architecture to a virtual cloud infrastructure |
US9065678B2 (en) * | 2012-10-24 | 2015-06-23 | Cisco Technology, Inc. | System and method for pinning virtual machine adapters to physical adapters in a network environment |
CN102970204B (en) * | 2012-10-24 | 2017-09-01 | 曙光信息产业(北京)有限公司 | A kind of distribution switch system and its implementation based on xen virtual platforms |
US9401872B2 (en) | 2012-11-16 | 2016-07-26 | Brocade Communications Systems, Inc. | Virtual link aggregations across multiple fabric switches |
US9413691B2 (en) | 2013-01-11 | 2016-08-09 | Brocade Communications Systems, Inc. | MAC address synchronization in a fabric switch |
US9350680B2 (en) | 2013-01-11 | 2016-05-24 | Brocade Communications Systems, Inc. | Protection switching over a virtual link aggregation |
US9548926B2 (en) | 2013-01-11 | 2017-01-17 | Brocade Communications Systems, Inc. | Multicast traffic load balancing over virtual link aggregation |
US9565113B2 (en) | 2013-01-15 | 2017-02-07 | Brocade Communications Systems, Inc. | Adaptive link aggregation and virtual link aggregation |
US9565099B2 (en) | 2013-03-01 | 2017-02-07 | Brocade Communications Systems, Inc. | Spanning tree in fabric switches |
KR102043276B1 (en) * | 2013-03-12 | 2019-11-12 | 삼성전자 주식회사 | Apparatus and method for dynamic resource allocation based on interconnect fabric switching |
CN104052776B (en) * | 2013-03-14 | 2017-11-21 | 华为技术有限公司 | VM starting-up methods, VMM, shared memory systems, VDI systems and physical host |
US9628328B2 (en) * | 2013-03-15 | 2017-04-18 | Rackspace Us, Inc. | Network controller with integrated resource management capability |
US9141416B2 (en) | 2013-03-15 | 2015-09-22 | Centurylink Intellectual Property Llc | Virtualization congestion control framework for modifying execution of applications on virtual machine based on mass congestion indicator in host computing system |
US9401818B2 (en) | 2013-03-15 | 2016-07-26 | Brocade Communications Systems, Inc. | Scalable gateways for a fabric switch |
US9130872B2 (en) * | 2013-03-15 | 2015-09-08 | Cisco Technology, Inc. | Workload based service chain insertion in a network environment |
US9430259B2 (en) | 2013-03-15 | 2016-08-30 | Centurylink Intellectual Property Llc | Virtualization congestion control framework for modifying execution of applications on virtual machine based on mass congestion indicator in host computing system |
JP6036506B2 (en) * | 2013-04-15 | 2016-11-30 | 富士通株式会社 | Program and information processing apparatus for specifying fault influence range |
US9794379B2 (en) | 2013-04-26 | 2017-10-17 | Cisco Technology, Inc. | High-efficiency service chaining with agentless service nodes |
CN104135379B (en) * | 2013-05-03 | 2017-05-10 | 新华三技术有限公司 | Port control method and device based on OpenFlow protocol |
US9565028B2 (en) | 2013-06-10 | 2017-02-07 | Brocade Communications Systems, Inc. | Ingress switch multicast distribution in a fabric switch |
US9699001B2 (en) | 2013-06-10 | 2017-07-04 | Brocade Communications Systems, Inc. | Scalable and segregated network virtualization |
CN104253770B (en) * | 2013-06-27 | 2017-07-14 | 新华三技术有限公司 | Realize the method and apparatus of the distributed virtual switch system |
US9571386B2 (en) | 2013-07-08 | 2017-02-14 | Nicira, Inc. | Hybrid packet processing |
US9282019B2 (en) | 2013-07-12 | 2016-03-08 | Nicira, Inc. | Tracing logical network packets through physical network |
US9344349B2 (en) | 2013-07-12 | 2016-05-17 | Nicira, Inc. | Tracing network packets by a cluster of network controllers |
US9407580B2 (en) | 2013-07-12 | 2016-08-02 | Nicira, Inc. | Maintaining data stored with a packet |
US9781041B2 (en) * | 2013-07-24 | 2017-10-03 | Dell Products Lp | Systems and methods for native network interface controller (NIC) teaming load balancing |
US20150033222A1 (en) * | 2013-07-25 | 2015-01-29 | Cavium, Inc. | Network Interface Card with Virtual Switch and Traffic Flow Policy Enforcement |
US10389577B2 (en) | 2013-08-14 | 2019-08-20 | Centurylink Intellectual Property Llc | Ethernet carrier group alarm (CGA) |
US9952885B2 (en) | 2013-08-14 | 2018-04-24 | Nicira, Inc. | Generation of configuration files for a DHCP module executing within a virtualized container |
US9887960B2 (en) | 2013-08-14 | 2018-02-06 | Nicira, Inc. | Providing services for logical networks |
US9577845B2 (en) | 2013-09-04 | 2017-02-21 | Nicira, Inc. | Multiple active L3 gateways for logical networks |
US9503371B2 (en) | 2013-09-04 | 2016-11-22 | Nicira, Inc. | High availability L3 gateways for logical networks |
US9806949B2 (en) | 2013-09-06 | 2017-10-31 | Brocade Communications Systems, Inc. | Transparent interconnection of Ethernet fabric switches |
US9680772B2 (en) | 2013-09-09 | 2017-06-13 | Vmware, Inc. | System and method for managing configuration of virtual switches in a virtual machine network |
US9641389B2 (en) * | 2013-09-09 | 2017-05-02 | Vmware, Inc. | Method and system for recovering from network disconnects by cloning a virtual port |
US9602398B2 (en) | 2013-09-15 | 2017-03-21 | Nicira, Inc. | Dynamically generating flows with wildcard fields |
US9674087B2 (en) | 2013-09-15 | 2017-06-06 | Nicira, Inc. | Performing a multi-stage lookup to classify packets |
KR102266051B1 (en) * | 2013-09-17 | 2021-06-18 | 김정호 | Method for processing huge data and constructing high performance nfv system |
US9575782B2 (en) | 2013-10-13 | 2017-02-21 | Nicira, Inc. | ARP for logical router |
US10063458B2 (en) | 2013-10-13 | 2018-08-28 | Nicira, Inc. | Asymmetric connection with external networks |
CN104580011B (en) * | 2013-10-23 | 2017-12-15 | 新华三技术有限公司 | A kind of data forwarding device and method |
US9912612B2 (en) | 2013-10-28 | 2018-03-06 | Brocade Communications Systems LLC | Extended ethernet fabric switches |
US9864623B2 (en) | 2013-11-21 | 2018-01-09 | Centurylink Intellectual Property Llc | Physical to virtual network transport function abstraction |
US10158538B2 (en) | 2013-12-09 | 2018-12-18 | Nicira, Inc. | Reporting elephant flows to a network controller |
US9967199B2 (en) | 2013-12-09 | 2018-05-08 | Nicira, Inc. | Inspecting operations of a machine to detect elephant flows |
US9996467B2 (en) | 2013-12-13 | 2018-06-12 | Nicira, Inc. | Dynamically adjusting the number of flows allowed in a flow table cache |
US9569368B2 (en) | 2013-12-13 | 2017-02-14 | Nicira, Inc. | Installing and managing flows in a flow table cache |
IN2013CH05983A (en) * | 2013-12-23 | 2015-06-26 | Ineda Systems Pvt Ltd | |
US9548873B2 (en) | 2014-02-10 | 2017-01-17 | Brocade Communications Systems, Inc. | Virtual extensible LAN tunnel keepalives |
US9344337B2 (en) | 2014-03-13 | 2016-05-17 | Cisco Technology, Inc. | Service node originated service chains in a network environment |
US9225597B2 (en) | 2014-03-14 | 2015-12-29 | Nicira, Inc. | Managed gateways peering with external router to attract ingress packets |
US9313129B2 (en) | 2014-03-14 | 2016-04-12 | Nicira, Inc. | Logical router processing by network controller |
US9590901B2 (en) | 2014-03-14 | 2017-03-07 | Nicira, Inc. | Route advertisement by managed gateways |
US9419855B2 (en) | 2014-03-14 | 2016-08-16 | Nicira, Inc. | Static routes for logical routers |
US10581758B2 (en) | 2014-03-19 | 2020-03-03 | Avago Technologies International Sales Pte. Limited | Distributed hot standby links for vLAG |
US10476698B2 (en) | 2014-03-20 | 2019-11-12 | Avago Technologies International Sales Pte. Limited | Redundent virtual link aggregation group |
US9503321B2 (en) | 2014-03-21 | 2016-11-22 | Nicira, Inc. | Dynamic routing for logical routers |
US9647883B2 (en) | 2014-03-21 | 2017-05-09 | Nicria, Inc. | Multiple levels of logical routers |
US20150268989A1 (en) * | 2014-03-24 | 2015-09-24 | Sandisk Enterprise Ip Llc | Methods and Systems for Extending the Object Store of an Application Virtual Machine |
US9893988B2 (en) | 2014-03-27 | 2018-02-13 | Nicira, Inc. | Address resolution using multiple designated instances of a logical router |
US9413644B2 (en) | 2014-03-27 | 2016-08-09 | Nicira, Inc. | Ingress ECMP in virtual distributed routing environment |
US9985896B2 (en) | 2014-03-31 | 2018-05-29 | Nicira, Inc. | Caching of service decisions |
US10481932B2 (en) * | 2014-03-31 | 2019-11-19 | Vmware, Inc. | Auto-scaling virtual switches |
US9385954B2 (en) | 2014-03-31 | 2016-07-05 | Nicira, Inc. | Hashing techniques for use in a network environment |
US10193806B2 (en) | 2014-03-31 | 2019-01-29 | Nicira, Inc. | Performing a finishing operation to improve the quality of a resulting hash |
US10110710B2 (en) | 2014-04-03 | 2018-10-23 | Centurylink Intellectual Property Llc | System and method for implementing extension of customer LAN at provider network service point |
US9998320B2 (en) | 2014-04-03 | 2018-06-12 | Centurylink Intellectual Property Llc | Customer environment network functions virtualization (NFV) |
US10063473B2 (en) | 2014-04-30 | 2018-08-28 | Brocade Communications Systems LLC | Method and system for facilitating switch virtualization in a network of interconnected switches |
US9800471B2 (en) | 2014-05-13 | 2017-10-24 | Brocade Communications Systems, Inc. | Network extension groups of global VLANs in a fabric switch |
US9479443B2 (en) | 2014-05-16 | 2016-10-25 | Cisco Technology, Inc. | System and method for transporting information to services in a network environment |
US9379931B2 (en) | 2014-05-16 | 2016-06-28 | Cisco Technology, Inc. | System and method for transporting information to services in a network environment |
US9742881B2 (en) | 2014-06-30 | 2017-08-22 | Nicira, Inc. | Network virtualization using just-in-time distributed capability for classification encoding |
US10616108B2 (en) | 2014-07-29 | 2020-04-07 | Avago Technologies International Sales Pte. Limited | Scalable MAC address virtualization |
US9544219B2 (en) | 2014-07-31 | 2017-01-10 | Brocade Communications Systems, Inc. | Global VLAN services |
US9807007B2 (en) | 2014-08-11 | 2017-10-31 | Brocade Communications Systems, Inc. | Progressive MAC address learning |
US10225327B2 (en) | 2014-08-13 | 2019-03-05 | Centurylink Intellectual Property Llc | Remoting application servers |
US9898318B2 (en) | 2014-08-15 | 2018-02-20 | Centurylink Intellectual Property Llc | Multi-line/multi-state virtualized OAM transponder |
US10511458B2 (en) | 2014-09-30 | 2019-12-17 | Nicira, Inc. | Virtual distributed bridging |
US11178051B2 (en) | 2014-09-30 | 2021-11-16 | Vmware, Inc. | Packet key parser for flow-based forwarding elements |
US10020960B2 (en) | 2014-09-30 | 2018-07-10 | Nicira, Inc. | Virtual distributed bridging |
US10250443B2 (en) | 2014-09-30 | 2019-04-02 | Nicira, Inc. | Using physical location to modify behavior of a distributed virtual network element |
US9768980B2 (en) | 2014-09-30 | 2017-09-19 | Nicira, Inc. | Virtual distributed bridging |
US9524173B2 (en) | 2014-10-09 | 2016-12-20 | Brocade Communications Systems, Inc. | Fast reboot for a switch |
US10469342B2 (en) | 2014-10-10 | 2019-11-05 | Nicira, Inc. | Logical network traffic analysis |
US9699029B2 (en) | 2014-10-10 | 2017-07-04 | Brocade Communications Systems, Inc. | Distributed configuration management in a switch group |
US10417025B2 (en) | 2014-11-18 | 2019-09-17 | Cisco Technology, Inc. | System and method to chain distributed applications in a network environment |
USRE48131E1 (en) | 2014-12-11 | 2020-07-28 | Cisco Technology, Inc. | Metadata augmentation in a service function chain |
US9660909B2 (en) | 2014-12-11 | 2017-05-23 | Cisco Technology, Inc. | Network service header metadata for load balancing |
US9977688B2 (en) * | 2014-12-31 | 2018-05-22 | Vmware, Inc. | Live migration of virtual machines across virtual switches in virtual infrastructure |
US9626255B2 (en) | 2014-12-31 | 2017-04-18 | Brocade Communications Systems, Inc. | Online restoration of a switch snapshot |
US9628407B2 (en) | 2014-12-31 | 2017-04-18 | Brocade Communications Systems, Inc. | Multiple software versions in a switch group |
US9942097B2 (en) | 2015-01-05 | 2018-04-10 | Brocade Communications Systems LLC | Power management in a network of interconnected switches |
US10003552B2 (en) | 2015-01-05 | 2018-06-19 | Brocade Communications Systems, Llc. | Distributed bidirectional forwarding detection protocol (D-BFD) for cluster of interconnected switches |
US10079779B2 (en) * | 2015-01-30 | 2018-09-18 | Nicira, Inc. | Implementing logical router uplinks |
US10038592B2 (en) | 2015-03-17 | 2018-07-31 | Brocade Communications Systems LLC | Identifier assignment to a new switch in a switch group |
US9807005B2 (en) | 2015-03-17 | 2017-10-31 | Brocade Communications Systems, Inc. | Multi-fabric manager |
US10747564B2 (en) * | 2015-04-02 | 2020-08-18 | Vmware, Inc. | Spanned distributed virtual switch |
US10038628B2 (en) | 2015-04-04 | 2018-07-31 | Nicira, Inc. | Route server mode for dynamic routing between logical and physical networks |
US9967134B2 (en) | 2015-04-06 | 2018-05-08 | Nicira, Inc. | Reduction of network churn based on differences in input state |
US10579406B2 (en) | 2015-04-08 | 2020-03-03 | Avago Technologies International Sales Pte. Limited | Dynamic orchestration of overlay tunnels |
US10673978B2 (en) | 2015-05-06 | 2020-06-02 | Centurylink Intellectual Property Llc | Method and system for implementing network experience shifting using shared objects |
US10481938B2 (en) | 2015-05-06 | 2019-11-19 | Centurylink Intellectual Property Llc | System and method for implementing network experience shifting |
US9762402B2 (en) | 2015-05-20 | 2017-09-12 | Cisco Technology, Inc. | System and method to facilitate the assignment of service functions for service chains in a network environment |
CN106255226B (en) * | 2015-06-10 | 2021-07-30 | 中兴通讯股份有限公司 | Network connection processing method and device |
CN106330779B (en) * | 2015-06-23 | 2019-07-26 | 联想企业解决方案(新加坡)有限公司 | Server, physical switch, and communication system |
US20160378630A1 (en) * | 2015-06-25 | 2016-12-29 | Dell Products L.P. | Port monitoring system |
US10243848B2 (en) | 2015-06-27 | 2019-03-26 | Nicira, Inc. | Provisioning logical entities in a multi-datacenter environment |
US10225184B2 (en) | 2015-06-30 | 2019-03-05 | Nicira, Inc. | Redirecting traffic in a virtual distributed router environment |
US9942131B2 (en) * | 2015-07-29 | 2018-04-10 | International Business Machines Corporation | Multipathing using flow tunneling through bound overlay virtual machines |
US10439929B2 (en) | 2015-07-31 | 2019-10-08 | Avago Technologies International Sales Pte. Limited | Graceful recovery of a multicast-enabled switch |
US10129142B2 (en) | 2015-08-11 | 2018-11-13 | Nicira, Inc. | Route configuration for logical router |
US10057157B2 (en) | 2015-08-31 | 2018-08-21 | Nicira, Inc. | Automatically advertising NAT routes between logical routers |
US10171303B2 (en) | 2015-09-16 | 2019-01-01 | Avago Technologies International Sales Pte. Limited | IP-based interconnection of switches with a logical chassis |
US9882833B2 (en) | 2015-09-28 | 2018-01-30 | Centurylink Intellectual Property Llc | Intent-based services orchestration |
US10204122B2 (en) | 2015-09-30 | 2019-02-12 | Nicira, Inc. | Implementing an interface between tuple and message-driven control entities |
US10078528B2 (en) | 2015-10-06 | 2018-09-18 | Centurylink Intellectual Property Llc | Virtual machine-to-port peripheral device driver for implementing communications between virtual machines and client devices |
US10095535B2 (en) | 2015-10-31 | 2018-10-09 | Nicira, Inc. | Static route types for logical routers |
US20170153907A1 (en) * | 2015-12-01 | 2017-06-01 | Rajeev Grover | Out-of-band Management Of Virtual Machines |
US9912614B2 (en) | 2015-12-07 | 2018-03-06 | Brocade Communications Systems LLC | Interconnection of switches based on hierarchical overlay tunneling |
US11044203B2 (en) | 2016-01-19 | 2021-06-22 | Cisco Technology, Inc. | System and method for hosting mobile packet core and value-added services using a software defined network and service chains |
US10872049B2 (en) | 2016-01-29 | 2020-12-22 | Analog Devices, Inc. | GPIO-to-GPIO communication on a multi-node daisy-chained network |
US10313271B2 (en) * | 2016-03-16 | 2019-06-04 | At&T Intellectual Property I, L.P. | Providing and using a distributed forwarding service |
WO2017158407A1 (en) * | 2016-03-18 | 2017-09-21 | Telefonaktiebolaget Lm Ericsson (Publ) | Using nano-services to secure multi-tenant networking in datacenters |
US10187306B2 (en) | 2016-03-24 | 2019-01-22 | Cisco Technology, Inc. | System and method for improved service chaining |
US10931793B2 (en) | 2016-04-26 | 2021-02-23 | Cisco Technology, Inc. | System and method for automated rendering of service chaining |
US10333849B2 (en) | 2016-04-28 | 2019-06-25 | Nicira, Inc. | Automatic configuration of logical routers on edge nodes |
US10841273B2 (en) | 2016-04-29 | 2020-11-17 | Nicira, Inc. | Implementing logical DHCP servers in logical networks |
US11019167B2 (en) | 2016-04-29 | 2021-05-25 | Nicira, Inc. | Management of update queues for network controller |
US10484515B2 (en) | 2016-04-29 | 2019-11-19 | Nicira, Inc. | Implementing logical metadata proxy servers in logical networks |
US10091161B2 (en) | 2016-04-30 | 2018-10-02 | Nicira, Inc. | Assignment of router ID for logical routers |
CN107491339A (en) * | 2016-06-13 | 2017-12-19 | 深圳市深信服电子科技有限公司 | The virtual machine monitoring method and device of server virtualization |
US10560320B2 (en) | 2016-06-29 | 2020-02-11 | Nicira, Inc. | Ranking of gateways in cluster |
US10153973B2 (en) | 2016-06-29 | 2018-12-11 | Nicira, Inc. | Installation of routing tables for logical router in route server mode |
US10419550B2 (en) | 2016-07-06 | 2019-09-17 | Cisco Technology, Inc. | Automatic service function validation in a virtual network environment |
US10218616B2 (en) | 2016-07-21 | 2019-02-26 | Cisco Technology, Inc. | Link selection for communication with a service function cluster |
US10320664B2 (en) | 2016-07-21 | 2019-06-11 | Cisco Technology, Inc. | Cloud overlay for operations administration and management |
US10225270B2 (en) | 2016-08-02 | 2019-03-05 | Cisco Technology, Inc. | Steering of cloned traffic in a service function chain |
US10218593B2 (en) | 2016-08-23 | 2019-02-26 | Cisco Technology, Inc. | Identifying sources of packet drops in a service function chain environment |
US10361969B2 (en) | 2016-08-30 | 2019-07-23 | Cisco Technology, Inc. | System and method for managing chained services in a network environment |
US10454758B2 (en) | 2016-08-31 | 2019-10-22 | Nicira, Inc. | Edge node cluster network redundancy and fast convergence using an underlay anycast VTEP IP |
US10650621B1 (en) | 2016-09-13 | 2020-05-12 | Iocurrents, Inc. | Interfacing with a vehicular controller area network |
US10341236B2 (en) | 2016-09-30 | 2019-07-02 | Nicira, Inc. | Anycast edge service gateways |
US10237090B2 (en) | 2016-10-28 | 2019-03-19 | Avago Technologies International Sales Pte. Limited | Rule-based network identifier mapping |
KR20180051719A (en) * | 2016-11-08 | 2018-05-17 | (주) 퓨전데이타 | System and method for virtualization integrated web service based on html5 |
US10237123B2 (en) | 2016-12-21 | 2019-03-19 | Nicira, Inc. | Dynamic recovery from a split-brain failure in edge nodes |
US10742746B2 (en) | 2016-12-21 | 2020-08-11 | Nicira, Inc. | Bypassing a load balancer in a return path of network traffic |
US10212071B2 (en) | 2016-12-21 | 2019-02-19 | Nicira, Inc. | Bypassing a load balancer in a return path of network traffic |
US10616045B2 (en) | 2016-12-22 | 2020-04-07 | Nicira, Inc. | Migration of centralized routing components of logical router |
US10423434B2 (en) * | 2016-12-22 | 2019-09-24 | Nicira, Inc. | Logical port authentication for virtual machines |
CN108509249B (en) * | 2017-02-23 | 2022-03-08 | 华为技术有限公司 | Virtual system restarting method and equipment |
US10805239B2 (en) | 2017-03-07 | 2020-10-13 | Nicira, Inc. | Visualization of path between logical network endpoints |
US10225187B2 (en) | 2017-03-22 | 2019-03-05 | Cisco Technology, Inc. | System and method for providing a bit indexed service chain |
US10884807B2 (en) | 2017-04-12 | 2021-01-05 | Cisco Technology, Inc. | Serverless computing and task scheduling |
US10257033B2 (en) | 2017-04-12 | 2019-04-09 | Cisco Technology, Inc. | Virtualized network functions and service chaining in serverless computing infrastructure |
US10178646B2 (en) | 2017-04-12 | 2019-01-08 | Cisco Technology, Inc. | System and method to facilitate slice management in a network environment |
US10333855B2 (en) | 2017-04-19 | 2019-06-25 | Cisco Technology, Inc. | Latency reduction in service function paths |
US10554689B2 (en) | 2017-04-28 | 2020-02-04 | Cisco Technology, Inc. | Secure communication session resumption in a service function chain |
CN108964959B (en) * | 2017-05-27 | 2022-02-25 | 阿里巴巴集团控股有限公司 | Network card direct connection system for virtualization platform and data packet supervision method |
US10735275B2 (en) | 2017-06-16 | 2020-08-04 | Cisco Technology, Inc. | Releasing and retaining resources for use in a NFV environment |
US10798187B2 (en) | 2017-06-19 | 2020-10-06 | Cisco Technology, Inc. | Secure service chaining |
US10637800B2 (en) | 2017-06-30 | 2020-04-28 | Nicira, Inc | Replacement of logical network addresses with physical network addresses |
US10681000B2 (en) | 2017-06-30 | 2020-06-09 | Nicira, Inc. | Assignment of unique physical network addresses for logical network addresses |
US10397271B2 (en) | 2017-07-11 | 2019-08-27 | Cisco Technology, Inc. | Distributed denial of service mitigation for web conferencing |
US10841235B2 (en) | 2017-07-20 | 2020-11-17 | Vmware, Inc | Methods and apparatus to optimize memory allocation in response to a storage rebalancing event |
US11102063B2 (en) | 2017-07-20 | 2021-08-24 | Vmware, Inc. | Methods and apparatus to cross configure network resources of software defined data centers |
US10756967B2 (en) | 2017-07-20 | 2020-08-25 | Vmware Inc. | Methods and apparatus to configure switches of a virtual rack |
US10530678B2 (en) * | 2017-07-20 | 2020-01-07 | Vmware, Inc | Methods and apparatus to optimize packet flow among virtualized servers |
US10673698B2 (en) | 2017-07-21 | 2020-06-02 | Cisco Technology, Inc. | Service function chain optimization using live testing |
US11063856B2 (en) | 2017-08-24 | 2021-07-13 | Cisco Technology, Inc. | Virtual network function monitoring in a network function virtualization deployment |
US10791065B2 (en) | 2017-09-19 | 2020-09-29 | Cisco Technology, Inc. | Systems and methods for providing container attributes as part of OAM techniques |
US10608887B2 (en) | 2017-10-06 | 2020-03-31 | Nicira, Inc. | Using packet tracing tool to automatically execute packet capture operations |
US10469461B1 (en) | 2017-10-11 | 2019-11-05 | Juniper Networks, Inc. | Securing end-to-end virtual machine traffic |
US11018981B2 (en) | 2017-10-13 | 2021-05-25 | Cisco Technology, Inc. | System and method for replication container performance and policy validation using real time network traffic |
JP2020537211A (en) * | 2017-10-13 | 2020-12-17 | ホアウェイ・テクノロジーズ・カンパニー・リミテッド | Application management method and terminal |
US10541893B2 (en) | 2017-10-25 | 2020-01-21 | Cisco Technology, Inc. | System and method for obtaining micro-service telemetry data |
RU2683161C1 (en) * | 2017-11-13 | 2019-03-26 | Ашот Эрнстович Кочарян | Apparatus, method, program and interface for emulation system of terminals with control by sensor screen |
US10374827B2 (en) | 2017-11-14 | 2019-08-06 | Nicira, Inc. | Identifier that maps to different networks at different datacenters |
US10511459B2 (en) | 2017-11-14 | 2019-12-17 | Nicira, Inc. | Selection of managed forwarding element for bridge spanning multiple datacenters |
US11012297B2 (en) | 2018-04-16 | 2021-05-18 | Vmware, Inc. | Methods and apparatus to migrate physical server hosts between virtual standard switches and virtual distributed switches in a network |
US11301278B2 (en) * | 2018-04-25 | 2022-04-12 | Vmware, Inc. | Packet handling based on multiprocessor architecture configuration |
US10666612B2 (en) | 2018-06-06 | 2020-05-26 | Cisco Technology, Inc. | Service chains for inter-cloud traffic |
US10531592B1 (en) * | 2018-07-19 | 2020-01-07 | Quanta Computer Inc. | Smart rack architecture for diskless computer system |
US11036405B2 (en) * | 2018-09-07 | 2021-06-15 | Vmware, Inc. | Runtime information transfer between kernel modules |
US10860078B2 (en) * | 2018-10-25 | 2020-12-08 | Dell Products, L.P. | Managing power request during cluster operations |
US10931560B2 (en) | 2018-11-23 | 2021-02-23 | Vmware, Inc. | Using route type to determine routing protocol behavior |
US10797998B2 (en) | 2018-12-05 | 2020-10-06 | Vmware, Inc. | Route server for distributed routers using hierarchical routing protocol |
US10938788B2 (en) | 2018-12-12 | 2021-03-02 | Vmware, Inc. | Static routes for policy-based VPN |
US10795718B2 (en) * | 2019-02-08 | 2020-10-06 | Microsoft Technology Licensing, Llc | Updating hardware with reduced virtual machine downtime |
US10992515B1 (en) * | 2019-06-10 | 2021-04-27 | Cisco Technology, Inc. | Link state tracking for virtual interfaces |
US11095480B2 (en) | 2019-08-30 | 2021-08-17 | Vmware, Inc. | Traffic optimization using distributed edge services |
CN112491570A (en) * | 2019-09-11 | 2021-03-12 | 中兴通讯股份有限公司 | Method, device and storage medium for setting link state of virtual network card |
US11444843B2 (en) | 2019-12-03 | 2022-09-13 | International Business Machines Corporation | Simulating a system of computing systems |
US11681542B2 (en) * | 2020-01-16 | 2023-06-20 | Vmware, Inc. | Integrating virtualization and host networking |
US11283699B2 (en) | 2020-01-17 | 2022-03-22 | Vmware, Inc. | Practical overlay network latency measurement in datacenter |
JP7400587B2 (en) * | 2020-03-30 | 2023-12-19 | 横河電機株式会社 | Communication processing device, program, and communication processing method |
US11736383B2 (en) | 2020-04-06 | 2023-08-22 | Vmware, Inc. | Logical forwarding element identifier translation between datacenters |
US11777793B2 (en) | 2020-04-06 | 2023-10-03 | Vmware, Inc. | Location criteria for security groups |
US11088916B1 (en) * | 2020-04-06 | 2021-08-10 | Vmware, Inc. | Parsing logical network definition for different sites |
US11088902B1 (en) | 2020-04-06 | 2021-08-10 | Vmware, Inc. | Synchronization of logical network state between global and local managers |
US11258668B2 (en) | 2020-04-06 | 2022-02-22 | Vmware, Inc. | Network controller for multi-site logical network |
US11360799B2 (en) | 2020-04-28 | 2022-06-14 | International Business Machines Corporation | Virtual machine live migration with seamless network connectivity |
US11606294B2 (en) | 2020-07-16 | 2023-03-14 | Vmware, Inc. | Host computer configured to facilitate distributed SNAT service |
US11616755B2 (en) | 2020-07-16 | 2023-03-28 | Vmware, Inc. | Facilitating distributed SNAT service |
US11611613B2 (en) | 2020-07-24 | 2023-03-21 | Vmware, Inc. | Policy-based forwarding to a load balancer of a load balancing cluster |
US11451413B2 (en) | 2020-07-28 | 2022-09-20 | Vmware, Inc. | Method for advertising availability of distributed gateway service and machines at host computer |
US11902050B2 (en) | 2020-07-28 | 2024-02-13 | VMware LLC | Method for providing distributed gateway service at host computer |
US11570090B2 (en) | 2020-07-29 | 2023-01-31 | Vmware, Inc. | Flow tracing operation in container cluster |
US11196628B1 (en) | 2020-07-29 | 2021-12-07 | Vmware, Inc. | Monitoring container clusters |
US11558426B2 (en) | 2020-07-29 | 2023-01-17 | Vmware, Inc. | Connection tracking for container cluster |
US11757940B2 (en) | 2020-09-28 | 2023-09-12 | Vmware, Inc. | Firewall rules for application connectivity |
US11736436B2 (en) | 2020-12-31 | 2023-08-22 | Vmware, Inc. | Identifying routes with indirect addressing in a datacenter |
US11336533B1 (en) | 2021-01-08 | 2022-05-17 | Vmware, Inc. | Network visualization of correlations between logical elements and associated physical elements |
US20220261265A1 (en) * | 2021-02-12 | 2022-08-18 | At&T Intellectual Property I, L.P. | System and method for creating and using floating virtual machines |
JP2024507147A (en) * | 2021-02-13 | 2024-02-16 | オラクル・インターナショナル・コーポレイション | Disabling cached flow information in cloud infrastructure |
GB2605635A (en) * | 2021-04-08 | 2022-10-12 | Withsecure Corp | Arrangement and method of threat detection in a computer or computer network |
US20230017692A1 (en) * | 2021-06-30 | 2023-01-19 | Juniper Networks, Inc. | Extending switch fabric processing to network interface cards |
US11687210B2 (en) | 2021-07-05 | 2023-06-27 | Vmware, Inc. | Criteria-based expansion of group nodes in a network topology visualization |
US11477270B1 (en) * | 2021-07-06 | 2022-10-18 | Vmware, Inc. | Seamless hand-off of data traffic in public cloud environments |
US11711278B2 (en) | 2021-07-24 | 2023-07-25 | Vmware, Inc. | Visualization of flow trace operation across multiple sites |
US11706109B2 (en) | 2021-09-17 | 2023-07-18 | Vmware, Inc. | Performance of traffic monitoring actions |
CN114710774A (en) * | 2022-03-04 | 2022-07-05 | 阿里云计算有限公司 | Resource management method, device and storage medium |
US12107722B2 (en) | 2022-07-20 | 2024-10-01 | VMware LLC | Sharing network manager between multiple tenants |
US11929883B1 (en) * | 2022-09-26 | 2024-03-12 | Vmware, Inc. | Supporting virtual machine migration when network manager or central controller is unavailable |
Family Cites Families (251)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE69126666T2 (en) | 1990-09-17 | 1998-02-12 | Cabletron Systems Inc | NETWORK MANAGEMENT SYSTEM WITH MODEL-BASED INTELLIGENCE |
JPH0779233A (en) | 1993-06-29 | 1995-03-20 | Synoptics Commun Inc | Apparatus for establishing topology, method and apparatus for communicating topology information |
SE9402059D0 (en) | 1994-06-13 | 1994-06-13 | Ellemtel Utvecklings Ab | Methods and apparatus for telecommunications |
US5751967A (en) | 1994-07-25 | 1998-05-12 | Bay Networks Group, Inc. | Method and apparatus for automatically configuring a network device to support a virtual network |
US5550816A (en) * | 1994-12-29 | 1996-08-27 | Storage Technology Corporation | Method and apparatus for virtual switching |
JP3196004B2 (en) | 1995-03-23 | 2001-08-06 | 株式会社日立製作所 | Failure recovery processing method |
US6035105A (en) | 1996-01-02 | 2000-03-07 | Cisco Technology, Inc. | Multiple VLAN architecture system |
US6108304A (en) | 1996-03-08 | 2000-08-22 | Abe; Hajime | Packet switching network, packet switching equipment, and network management equipment |
US6111876A (en) | 1996-03-12 | 2000-08-29 | Nortel Networks Limited | VLAN frame format |
US6085238A (en) * | 1996-04-23 | 2000-07-04 | Matsushita Electric Works, Ltd. | Virtual LAN system |
JPH09307861A (en) * | 1996-05-17 | 1997-11-28 | Sony Corp | Signal processing method and signal process |
US6151324A (en) | 1996-06-03 | 2000-11-21 | Cabletron Systems, Inc. | Aggregation of mac data flows through pre-established path between ingress and egress switch to reduce number of number connections |
US6493347B2 (en) * | 1996-12-16 | 2002-12-10 | Juniper Networks, Inc. | Memory organization in a switching device |
JP2001514833A (en) | 1997-03-12 | 2001-09-11 | ノマディックス・リミテッド・ライアビリティ・カンパニー | Nomad converter or router |
US6075938A (en) * | 1997-06-10 | 2000-06-13 | The Board Of Trustees Of The Leland Stanford Junior University | Virtual machine monitors for scalable multiprocessors |
US6456624B1 (en) | 1997-10-29 | 2002-09-24 | Enterasys Networks, Inc. | Network address resolve blocker |
JP3609256B2 (en) | 1998-05-19 | 2005-01-12 | 株式会社日立製作所 | Network management device, node device, and network management system |
US6424659B2 (en) | 1998-07-17 | 2002-07-23 | Network Equipment Technologies, Inc. | Multi-layer switching apparatus and method |
US6674727B1 (en) * | 1998-11-30 | 2004-01-06 | Cisco Technology, Inc. | Distributed ring protocol and database |
US7020697B1 (en) | 1999-10-01 | 2006-03-28 | Accenture Llp | Architectures for netcentric computing systems |
AU7996200A (en) | 1999-10-05 | 2001-05-10 | Ejasent Inc. | Virtual port multiplexing |
US6963585B1 (en) | 1999-10-21 | 2005-11-08 | International Business Machines Corporation | Method and system for establishing a virtual path capability in a frame relay network |
US6680934B1 (en) | 1999-12-02 | 2004-01-20 | Nortel Networks Limited | System, device and method for expediting control flow in a communication system |
US6948003B1 (en) | 2000-03-15 | 2005-09-20 | Ensim Corporation | Enabling a service provider to provide intranet services |
US6854115B1 (en) | 2000-06-02 | 2005-02-08 | Sun Microsystems, Inc. | Process persistence in a virtual machine |
US6941410B1 (en) | 2000-06-02 | 2005-09-06 | Sun Microsystems, Inc. | Virtual heap for a virtual machine |
US6934755B1 (en) | 2000-06-02 | 2005-08-23 | Sun Microsystems, Inc. | System and method for migrating processes on a network |
US6765921B1 (en) | 2000-06-28 | 2004-07-20 | Nortel Networks Limited | Communications network |
US20020093952A1 (en) | 2000-06-30 | 2002-07-18 | Gonda Rumi Sheryar | Method for managing circuits in a multistage cross connect |
US7111163B1 (en) | 2000-07-10 | 2006-09-19 | Alterwan, Inc. | Wide area network using internet with quality of service |
US7389358B1 (en) | 2000-09-13 | 2008-06-17 | Fortinet, Inc. | Distributed virtual system to support managed, network-based services |
US7263700B1 (en) | 2000-11-06 | 2007-08-28 | International Business Machines Corporation | Serially, reusable virtual machine |
JP4225681B2 (en) | 2000-12-06 | 2009-02-18 | 富士通株式会社 | Virtual closed network construction method and apparatus, and relay apparatus |
US20020116397A1 (en) | 2000-12-21 | 2002-08-22 | Berg Mitchell T. | Method and system for communicating an information packet through multiple router devices |
US7260648B2 (en) | 2001-01-25 | 2007-08-21 | Ericsson, Inc. | Extension of address resolution protocol (ARP) for internet protocol (IP) virtual networks |
US6999454B1 (en) | 2001-02-09 | 2006-02-14 | Nortel Networks Limited | Information routing system and apparatus |
US6785843B1 (en) | 2001-02-23 | 2004-08-31 | Mcrae Andrew | Data plane restart without state change in a control plane of an intermediate network node |
US7209439B2 (en) | 2001-03-20 | 2007-04-24 | Mci, Llc | Pool-based resource management in a data network |
US7069337B2 (en) | 2001-03-20 | 2006-06-27 | Mci, Inc. | Policy-based synchronization of per-class resources between routers in a data network |
US7110670B1 (en) * | 2001-03-30 | 2006-09-19 | Nortel Networks Limited | Distributed photonic switch and optical UNI server |
US7231430B2 (en) * | 2001-04-20 | 2007-06-12 | Egenera, Inc. | Reconfigurable, virtual processing system, cluster, network and method |
US7102996B1 (en) | 2001-05-24 | 2006-09-05 | F5 Networks, Inc. | Method and system for scaling network traffic managers |
US7126944B2 (en) | 2001-07-05 | 2006-10-24 | Intel Corporation | Routing packets across multiple forwarding elements |
GB2378535A (en) | 2001-08-06 | 2003-02-12 | Ibm | Method and apparatus for suspending a software virtual machine |
US20030066026A1 (en) | 2001-08-13 | 2003-04-03 | David Jaffe | System and method for simulating a laboratory experiment |
JP2003069609A (en) | 2001-08-23 | 2003-03-07 | Fujitsu Ltd | System for providing virtual private network service |
US7200144B2 (en) | 2001-10-18 | 2007-04-03 | Qlogic, Corp. | Router and methods using network addresses for virtualization |
US6895429B2 (en) | 2001-12-28 | 2005-05-17 | Network Appliance, Inc. | Technique for enabling multiple virtual filers on a single filer to participate in multiple address spaces with overlapping network addresses |
US6941487B1 (en) | 2002-03-07 | 2005-09-06 | Riverstone Networks, Inc. | Method, system, and computer program product for providing failure protection in a network node |
US7577722B1 (en) | 2002-04-05 | 2009-08-18 | Vmware, Inc. | Provisioning of computer systems using virtual machines |
US7197572B2 (en) | 2002-05-06 | 2007-03-27 | Qlogic, Corporation | System and method for implementing logical switches in a network system |
US7404012B2 (en) * | 2002-05-06 | 2008-07-22 | Qlogic, Corporation | System and method for dynamic link aggregation in a shared I/O subsystem |
US7116665B2 (en) | 2002-06-04 | 2006-10-03 | Fortinet, Inc. | Methods and systems for a distributed provider edge |
US6907039B2 (en) | 2002-07-20 | 2005-06-14 | Redback Networks Inc. | Method and apparatus for routing and forwarding between virtual routers within a single network element |
US7120728B2 (en) | 2002-07-31 | 2006-10-10 | Brocade Communications Systems, Inc. | Hardware-based translating virtualization switch |
US7339929B2 (en) | 2002-08-23 | 2008-03-04 | Corrigent Systems Ltd. | Virtual private LAN service using a multicast protocol |
US20040073659A1 (en) | 2002-10-15 | 2004-04-15 | Carl Rajsic | Method and apparatus for managing nodes in a network |
JP2004145684A (en) | 2002-10-25 | 2004-05-20 | Ari Ide | Network type analysis service business model (virtual laboratory) |
US7185106B1 (en) | 2002-11-15 | 2007-02-27 | Juniper Networks, Inc. | Providing services for multiple virtual private networks |
US20040098505A1 (en) | 2002-11-20 | 2004-05-20 | Clemmensen Daniel G. | Forwarding system with multiple logical sub-system functionality |
CN100339848C (en) * | 2002-12-26 | 2007-09-26 | 联想(北京)有限公司 | Method for automatic configuration or restoring of computer system network configuration |
US7814228B2 (en) | 2003-02-13 | 2010-10-12 | Oracle America, Inc. | System and method for using data encapsulation in a virtual network |
US20040210623A1 (en) * | 2003-03-06 | 2004-10-21 | Aamer Hydrie | Virtual network topology generation |
JP3954511B2 (en) * | 2003-03-14 | 2007-08-08 | 株式会社東芝 | Power distribution system monitoring and control device |
JP4157409B2 (en) | 2003-03-31 | 2008-10-01 | 富士通株式会社 | Virtual path construction apparatus and virtual path construction method |
US20040249973A1 (en) | 2003-03-31 | 2004-12-09 | Alkhatib Hasan S. | Group agent |
US7283473B2 (en) | 2003-04-10 | 2007-10-16 | International Business Machines Corporation | Apparatus, system and method for providing multiple logical channel adapters within a single physical channel adapter in a system area network |
CA2522915A1 (en) | 2003-04-21 | 2004-11-04 | Netcell Corp. | Disk array controller with reconfigurable data path |
US7792987B1 (en) | 2003-04-21 | 2010-09-07 | Juniper Networks, Inc. | Supporting virtual private networks using a first network topology for forwarding and a subset of the first network topology or a smaller topology for signaling |
US7277453B2 (en) | 2003-05-30 | 2007-10-02 | Motorola, Inc. | Inter private network communications between IPv4 hosts using IPv6 |
US7710874B2 (en) | 2003-06-04 | 2010-05-04 | International Business Machines Corporation | System and method for automatic management of many computer data processing system pipes |
JP4278445B2 (en) | 2003-06-18 | 2009-06-17 | 株式会社日立製作所 | Network system and switch |
US7356818B2 (en) | 2003-06-24 | 2008-04-08 | International Business Machines Corporation | Virtual machine communicating to external device without going through other virtual machines by using a list of IP addresses managed only by a single virtual machine monitor |
US20040267897A1 (en) | 2003-06-24 | 2004-12-30 | Sychron Inc. | Distributed System Providing Scalable Methodology for Real-Time Control of Server Pools and Data Centers |
US7203944B1 (en) | 2003-07-09 | 2007-04-10 | Veritas Operating Corporation | Migrating virtual machines among computer systems to balance load caused by virtual machines |
US7463579B2 (en) | 2003-07-11 | 2008-12-09 | Nortel Networks Limited | Routed split multilink trunking |
US20050018669A1 (en) | 2003-07-25 | 2005-01-27 | International Business Machines Corporation | Infiniband subnet management queue pair emulation for multiple logical ports on a single physical port |
US7697527B2 (en) | 2003-07-30 | 2010-04-13 | Nortel Networks Limited | Method and apparatus for direct frame switching using frame contained destination information |
US8776050B2 (en) | 2003-08-20 | 2014-07-08 | Oracle International Corporation | Distributed virtual machine monitor for managing multiple virtual resources across multiple physical nodes |
US7366181B2 (en) | 2003-09-06 | 2008-04-29 | Fujitsu Limited | Virtual private network (VPN) with channelized ethernet over sonet (EoS) interface and method |
US7342916B2 (en) | 2003-09-10 | 2008-03-11 | Intel Corporation | Method, apparatus and system for optimizing routing of mobile IP packets |
US7502842B2 (en) | 2003-09-25 | 2009-03-10 | International Business Machines Corporation | Auto-configuration of an internal VLAN network interface |
US7725559B2 (en) | 2003-10-08 | 2010-05-25 | Unisys Corporation | Virtual data center that allocates and manages system resources across multiple nodes |
EP1673683A4 (en) | 2003-10-14 | 2010-06-02 | Raptor Networks Technology Inc | Switching system with distributed switching fabric |
US8009556B2 (en) | 2003-10-17 | 2011-08-30 | Ip Infusion, Inc. | System and method for providing redundant routing capabilities for a network node |
US7555002B2 (en) | 2003-11-06 | 2009-06-30 | International Business Machines Corporation | Infiniband general services queue pair virtualization for multiple logical ports on a single physical port |
US8146148B2 (en) | 2003-11-19 | 2012-03-27 | Cisco Technology, Inc. | Tunneled security groups |
US20050114490A1 (en) * | 2003-11-20 | 2005-05-26 | Nec Laboratories America, Inc. | Distributed virtual network access system and method |
US7450598B2 (en) | 2003-12-15 | 2008-11-11 | At&T Intellectual Property I, L.P. | System and method to provision MPLS/VPN network |
US7478173B1 (en) | 2003-12-18 | 2009-01-13 | Wmware, Inc. | Method and system for sharing a network connection in a virtual computer system |
US7752635B2 (en) | 2003-12-18 | 2010-07-06 | Intel Corporation | System and method for configuring a virtual network interface card |
US7483370B1 (en) | 2003-12-22 | 2009-01-27 | Extreme Networks, Inc. | Methods and systems for hitless switch management module failover and upgrade |
US8401024B2 (en) | 2004-01-14 | 2013-03-19 | Telefonaktiebolaget Lm Ericsson (Publ) | Ethernet address management system |
US7391771B2 (en) | 2004-01-23 | 2008-06-24 | Metro Packet Systems Inc. | Method of sending information through a tree and ring topology of a network system |
US8838743B2 (en) | 2004-02-13 | 2014-09-16 | Intel Corporation | Apparatus and method for a dynamically extensible virtual switch |
US7454756B2 (en) * | 2004-03-05 | 2008-11-18 | Intel Corporation | Method, apparatus and system for seamlessly sharing devices amongst virtual machines |
US20070050520A1 (en) | 2004-03-11 | 2007-03-01 | Hewlett-Packard Development Company, L.P. | Systems and methods for multi-host extension of a hierarchical interconnect network |
US20050220096A1 (en) | 2004-04-06 | 2005-10-06 | Robert Friskney | Traffic engineering in frame-based carrier networks |
US7761259B1 (en) | 2004-05-26 | 2010-07-20 | William Brian Seymour | Methods and systems for testing evaluation modules |
US8422500B2 (en) | 2004-07-02 | 2013-04-16 | Rockstar Consortium Us Lp | VLAN support of differentiated services |
US8228931B1 (en) * | 2004-07-15 | 2012-07-24 | Ciena Corporation | Distributed virtual storage switch |
DE602004011928T2 (en) | 2004-08-02 | 2009-02-12 | Alcatel Lucent | Method for controlling a shared resource by different managers |
US20070195794A1 (en) | 2004-08-11 | 2007-08-23 | Nec Corporation | Virtual lan system and node device |
US7366182B2 (en) | 2004-08-13 | 2008-04-29 | Qualcomm Incorporated | Methods and apparatus for efficient VPN server interface, address allocation, and signaling with a local addressing domain |
GB2418326B (en) | 2004-09-17 | 2007-04-11 | Hewlett Packard Development Co | Network vitrualization |
US7450498B2 (en) | 2004-10-27 | 2008-11-11 | Morgan Stanley | Fault tolerant network architecture |
US8458467B2 (en) | 2005-06-21 | 2013-06-04 | Cisco Technology, Inc. | Method and apparatus for adaptive application message payload content transformation in a network infrastructure element |
JP2008524916A (en) | 2004-12-21 | 2008-07-10 | テレフオンアクチーボラゲット エル エム エリクソン(パブル) | Apparatus and method for packet flow in communication system |
KR20070095374A (en) | 2004-12-31 | 2007-09-28 | 브리티쉬 텔리커뮤니케이션즈 파블릭 리미티드 캄퍼니 | Connection-oriented communications scheme for connection-less communications traffic |
JP4733399B2 (en) | 2005-01-28 | 2011-07-27 | 株式会社日立製作所 | Computer system, computer, storage device and management terminal |
US7647589B1 (en) | 2005-02-07 | 2010-01-12 | Parallels Software International, Inc. | Methods and systems for safe execution of guest code in virtual machine context |
US8254285B2 (en) * | 2005-02-25 | 2012-08-28 | Ip Infusion, Inc. | Hardware abstraction layer |
US7936770B1 (en) | 2005-03-08 | 2011-05-03 | Enterasys Networks, Inc. | Method and apparatus of virtual class of service and logical queue representation through network traffic distribution over multiple port interfaces |
US20070064673A1 (en) | 2005-03-10 | 2007-03-22 | Nehru Bhandaru | Flexible, scalable, wireless data forwarding and mobility for secure wireless networks |
US7685635B2 (en) * | 2005-03-11 | 2010-03-23 | Microsoft Corporation | Systems and methods for multi-level intercept processing in a virtual machine environment |
US7865908B2 (en) | 2005-03-11 | 2011-01-04 | Microsoft Corporation | VM network traffic monitoring and filtering on the host |
FR2883437B1 (en) | 2005-03-16 | 2007-08-03 | Wavestorm Sarl | DEVICE AND METHOD FOR COMMUNICATION IN A NETWORK |
EP1864430B1 (en) | 2005-03-29 | 2009-07-08 | Research In Motion Limited | Methods and apparatus for use in establishing session initiation protocol communications for virtual private networking |
US7697536B2 (en) | 2005-04-01 | 2010-04-13 | International Business Machines Corporation | Network communications for operating system partitions |
US8194656B2 (en) | 2005-04-28 | 2012-06-05 | Cisco Technology, Inc. | Metro ethernet network with scaled broadcast and service instance domains |
US7802000B1 (en) * | 2005-08-01 | 2010-09-21 | Vmware | Virtual network in server farm |
US8149737B2 (en) | 2005-08-09 | 2012-04-03 | Motorola Solutions, Inc. | Method and system for data transmission in a wireless network |
US20070074191A1 (en) | 2005-08-30 | 2007-03-29 | Geisinger Nile J | Software executables having virtual hardware, operating systems, and networks |
US20070055789A1 (en) | 2005-09-08 | 2007-03-08 | Benoit Claise | Method and apparatus for managing routing of data elements |
JP4394624B2 (en) * | 2005-09-21 | 2010-01-06 | 株式会社日立製作所 | Computer system and I / O bridge |
JP2007135109A (en) | 2005-11-11 | 2007-05-31 | Hitachi Ltd | Virtual network management method, virtual network management program, virtual network management system, and virtual network management means |
US9397856B2 (en) | 2005-12-02 | 2016-07-19 | Ca, Inc. | Virtual tunnel network router |
US20070174429A1 (en) | 2006-01-24 | 2007-07-26 | Citrix Systems, Inc. | Methods and servers for establishing a connection between a client system and a virtual machine hosting a requested computing environment |
US7639605B2 (en) * | 2006-02-08 | 2009-12-29 | Cisco Technology, Inc. | System and method for detecting and recovering from virtual switch link failures |
US8028071B1 (en) * | 2006-02-15 | 2011-09-27 | Vmware, Inc. | TCP/IP offload engine virtualization system and methods |
US9547485B2 (en) | 2006-03-31 | 2017-01-17 | Prowess Consulting, Llc | System and method for deploying a virtual machine |
US7801128B2 (en) | 2006-03-31 | 2010-09-21 | Amazon Technologies, Inc. | Managing communications between computing nodes |
US7987432B1 (en) | 2006-04-25 | 2011-07-26 | Parallels Holdings, Ltd. | Seamless integration and installation of non-native application into native operating system |
US8619771B2 (en) | 2009-09-30 | 2013-12-31 | Vmware, Inc. | Private allocated networks over shared communications infrastructure |
US8924524B2 (en) | 2009-07-27 | 2014-12-30 | Vmware, Inc. | Automated network configuration of virtual machines in a virtual lab data environment |
US8838756B2 (en) | 2009-07-27 | 2014-09-16 | Vmware, Inc. | Management and implementation of enclosed local networks in a virtual lab |
US8909758B2 (en) | 2006-05-02 | 2014-12-09 | Cisco Technology, Inc. | Physical server discovery and correlation |
US7839847B2 (en) | 2006-05-08 | 2010-11-23 | Cisco Technology, Inc. | Methods and apparatus providing VPN traffic matrix construction |
US7953089B1 (en) | 2006-05-16 | 2011-05-31 | Cisco Technology, Inc. | Systems and methods for multicast switching in a private VLAN |
US7814541B1 (en) | 2006-05-19 | 2010-10-12 | Array Networks, Inc. | Virtual routing for virtual local area networks having overlapping IP addresses |
US8060875B1 (en) * | 2006-05-26 | 2011-11-15 | Vmware, Inc. | System and method for multiple virtual teams |
JP4714081B2 (en) | 2006-06-01 | 2011-06-29 | アラクサラネットワークス株式会社 | Network connection device |
US8199732B2 (en) | 2006-06-09 | 2012-06-12 | Aruba Networks, Inc. | Efficient multicast control processing for a wireless network |
US7958506B2 (en) | 2006-06-22 | 2011-06-07 | Intel Corporation | Time sliced interrupt processing on virtualized platform |
US7706303B2 (en) | 2006-06-26 | 2010-04-27 | Cisco Technology, Inc. | Port pooling |
US7643482B2 (en) * | 2006-06-30 | 2010-01-05 | Sun Microsystems, Inc. | System and method for virtual switching in a host |
US7634608B2 (en) * | 2006-06-30 | 2009-12-15 | Sun Microsystems, Inc. | Bridging network components |
US8036127B2 (en) | 2006-07-20 | 2011-10-11 | Oracle America, Inc. | Notifying network applications of receive overflow conditions |
US8713202B2 (en) * | 2006-07-20 | 2014-04-29 | Oracle America, Inc. | Method and system for network configuration for virtual machines |
JP2008033392A (en) | 2006-07-26 | 2008-02-14 | Nec Corp | Virtual computer system and operation method thereof |
US20080059556A1 (en) | 2006-08-31 | 2008-03-06 | Egenera, Inc. | Providing virtual machine technology as an embedded layer within a processing platform |
US8068602B1 (en) | 2006-09-29 | 2011-11-29 | Verint Americas, Inc. | Systems and methods for recording using virtual machines |
CN100542122C (en) | 2006-09-29 | 2009-09-16 | 华为技术有限公司 | A kind of multiplexing method of VLAN switching tunnel and VLAN switching domain |
US7643488B2 (en) | 2006-09-29 | 2010-01-05 | Nortel Networks Limited | Method and apparatus for supporting multiple customer provisioned IPSec VPNs |
US7996835B2 (en) | 2006-10-10 | 2011-08-09 | International Business Machines Corporation | System, method and program for managing communication with multiple configurations for virtual machine |
US7793101B2 (en) * | 2006-10-19 | 2010-09-07 | Novell, Inc. | Verifiable virtualized storage port assignments for virtual machines |
US20100306773A1 (en) | 2006-11-06 | 2010-12-02 | Lee Mark M | Instant on Platform |
US7826482B1 (en) | 2006-11-17 | 2010-11-02 | Juniper Networks, Inc. | Service-specific forwarding in an LDP-RSVP hybrid network |
US8223668B2 (en) | 2006-12-14 | 2012-07-17 | Rockstar Bidco Lp | Method and apparatus for exchanging routing information and the establishment of connectivity across multiple network areas |
US20080181243A1 (en) | 2006-12-15 | 2008-07-31 | Brocade Communications Systems, Inc. | Ethernet forwarding in high performance fabrics |
US20080159301A1 (en) | 2006-12-29 | 2008-07-03 | De Heer Arjan Arie | Enabling virtual private local area network services |
US8381209B2 (en) | 2007-01-03 | 2013-02-19 | International Business Machines Corporation | Moveable access control list (ACL) mechanisms for hypervisors and virtual machines and virtual port firewalls |
US7941812B2 (en) | 2007-01-30 | 2011-05-10 | Hewlett-Packard Development Company, L.P. | Input/output virtualization through offload techniques |
WO2008098147A1 (en) | 2007-02-07 | 2008-08-14 | Core Microsolutions, Inc. | Remotely controlled real-time and virtual lab experimentation systems and methods |
US8050267B2 (en) | 2007-02-19 | 2011-11-01 | Cisco Technology, Inc. | Simple virtual private network for small local area networks |
US7840701B2 (en) | 2007-02-21 | 2010-11-23 | Array Networks, Inc. | Dynamic system and method for virtual private network (VPN) packet level routing using dual-NAT method |
US7694189B2 (en) | 2007-02-28 | 2010-04-06 | Red Hat, Inc. | Method and system for remote monitoring subscription service |
WO2008108984A2 (en) * | 2007-03-01 | 2008-09-12 | Soapstone Networks, Inc. | Software control plane for switches and routers |
US8171485B2 (en) | 2007-03-26 | 2012-05-01 | Credit Suisse Securities (Europe) Limited | Method and system for managing virtual and real machines |
US8055789B2 (en) | 2007-03-27 | 2011-11-08 | Amazon Technologies, Inc. | Configuring intercommunications between computing nodes |
US7903655B2 (en) | 2007-04-19 | 2011-03-08 | Hewlett-Packard Development Company, L.P. | Marked packet forwarding |
US8065676B1 (en) * | 2007-04-24 | 2011-11-22 | Hewlett-Packard Development Company, L.P. | Automated provisioning of virtual machines for a virtual machine buffer pool and production pool |
US8141090B1 (en) * | 2007-04-24 | 2012-03-20 | Hewlett-Packard Development Company, L.P. | Automated model-based provisioning of resources |
US20160174292A9 (en) | 2007-06-04 | 2016-06-16 | Samsung Electronics Co., Ltd. | Communication method of host apparatus capable of connecting with device by using wireless universal serial bus and wireless connection system including host apparatus and device |
US8166205B2 (en) | 2007-07-31 | 2012-04-24 | Cisco Technology, Inc. | Overlay transport virtualization |
US8031633B2 (en) | 2007-08-13 | 2011-10-04 | Honeywell International Inc. | Virtual network architecture for space data processing |
US8798056B2 (en) | 2007-09-24 | 2014-08-05 | Intel Corporation | Method and system for virtual port communications |
US8127291B2 (en) | 2007-11-02 | 2012-02-28 | Dell Products, L.P. | Virtual machine manager for managing multiple virtual machine configurations in the scalable enterprise |
US8018873B1 (en) | 2007-11-08 | 2011-09-13 | Juniper Networks, Inc. | Enhanced link state protocol for identifying broadcast networks |
US7984123B2 (en) | 2007-12-10 | 2011-07-19 | Oracle America, Inc. | Method and system for reconfiguring a virtual network path |
JP2009146106A (en) * | 2007-12-13 | 2009-07-02 | Hitachi Ltd | Storage system having function which migrates virtual communication port which is added to physical communication port |
US8199750B1 (en) | 2007-12-18 | 2012-06-12 | World Wide Packets, Inc. | Communicating with a control plane using a forwarding information format and control plane processing of packets devoid of a virtual switch identifier |
JP4487150B2 (en) | 2008-02-06 | 2010-06-23 | 日本電気株式会社 | Communication apparatus, firewall control method, and firewall control program |
US9577842B2 (en) * | 2008-02-25 | 2017-02-21 | Cisco Technology, Inc. | Shared L2 bridging domains for L3 virtual networks |
GB2458154B (en) | 2008-03-07 | 2012-06-27 | Hewlett Packard Development Co | Routing across a virtual network |
US8887158B2 (en) * | 2008-03-07 | 2014-11-11 | Sap Se | Dynamic cluster expansion through virtualization-based live cloning |
GB2459433B (en) | 2008-03-07 | 2012-06-06 | Hewlett Packard Development Co | Distributed network connection policy management |
GB2458157B (en) | 2008-03-07 | 2012-04-25 | Hewlett Packard Development Co | Virtual machine liveness check |
US8155028B2 (en) | 2008-03-17 | 2012-04-10 | Alcatel Lucent | Method and apparatus for providing full logical connectivity in MPLS networks |
US8443440B2 (en) | 2008-04-05 | 2013-05-14 | Trend Micro Incorporated | System and method for intelligent coordination of host and guest intrusion prevention in virtualized environment |
WO2009146165A1 (en) | 2008-04-15 | 2009-12-03 | Blade Network Technologies, Inc. | Network virtualization for a virtualized server data center environment |
US8473594B2 (en) | 2008-05-02 | 2013-06-25 | Skytap | Multitenant hosted virtual machine infrastructure |
US8339959B1 (en) | 2008-05-20 | 2012-12-25 | Juniper Networks, Inc. | Streamlined packet forwarding using dynamic filters for routing and security in a shared forwarding plane |
US8195774B2 (en) | 2008-05-23 | 2012-06-05 | Vmware, Inc. | Distributed virtual switch for virtualized computer systems |
US8544080B2 (en) | 2008-06-12 | 2013-09-24 | Telefonaktiebolaget L M Ericsson (Publ) | Mobile virtual private networks |
US8031606B2 (en) | 2008-06-24 | 2011-10-04 | Intel Corporation | Packet switching |
US7983257B2 (en) | 2008-07-18 | 2011-07-19 | Emulex Design & Manufacturing Corporation | Hardware switch for hypervisors and blade servers |
US8694991B2 (en) | 2008-08-22 | 2014-04-08 | Hewlett-Packard Development Company, L.P. | Server virtualized using virtualization platform |
US8065714B2 (en) | 2008-09-12 | 2011-11-22 | Hytrust, Inc. | Methods and systems for securely managing virtualization platform |
US7885276B1 (en) | 2008-09-30 | 2011-02-08 | Emc Corporation | Isolating network traffic in multi-tenant virtualization environments |
US9264403B2 (en) | 2008-10-09 | 2016-02-16 | Telefonaktiebolaget L M Ericsson (Publ) | Virtualization platform |
US8549281B2 (en) | 2008-10-21 | 2013-10-01 | Cohesive Flexible Technologies Corporation | System and methods for enabling customer network control in third-party computing environments |
US7921197B2 (en) | 2008-11-19 | 2011-04-05 | Vmware, Inc. | Dynamic configuration of virtual machines |
US7962647B2 (en) | 2008-11-24 | 2011-06-14 | Vmware, Inc. | Application delivery control module for virtual network switch |
US8201168B2 (en) | 2008-12-25 | 2012-06-12 | Voltaire Ltd. | Virtual input-output connections for machine virtualization |
US8331362B2 (en) | 2008-12-30 | 2012-12-11 | Juniper Networks, Inc. | Methods and apparatus for distributed dynamic network provisioning |
US8054832B1 (en) | 2008-12-30 | 2011-11-08 | Juniper Networks, Inc. | Methods and apparatus for routing between virtual resources based on a routing location policy |
US8019837B2 (en) | 2009-01-14 | 2011-09-13 | International Business Machines Corporation | Providing network identity for virtual machines |
US8214829B2 (en) | 2009-01-15 | 2012-07-03 | International Business Machines Corporation | Techniques for placing applications in heterogeneous virtualized systems while minimizing power and migration cost |
US7995483B1 (en) | 2009-01-20 | 2011-08-09 | Juniper Networks, Inc. | Simultaneously testing connectivity to multiple remote maintenance endpoints of the same maintenance association |
US20100191881A1 (en) | 2009-01-23 | 2010-07-29 | Computer Associates Think, Inc. | System and Method for Reserving and Provisioning IT Resources |
US7948986B1 (en) | 2009-02-02 | 2011-05-24 | Juniper Networks, Inc. | Applying services within MPLS networks |
US8001214B2 (en) | 2009-02-12 | 2011-08-16 | Oracle America, Inc. | Method and system for processing a request sent over a network |
EP2399363B1 (en) | 2009-02-19 | 2019-05-29 | Huawei Technologies Co., Ltd. | System and method for point to multipoint inter-domain multiprotocol label switching traffic engineering path calculation |
US8213336B2 (en) | 2009-02-23 | 2012-07-03 | Cisco Technology, Inc. | Distributed data center access switch |
CN102334112B (en) | 2009-02-27 | 2014-06-11 | 美国博通公司 | Method and system for virtual machine networking |
US8370835B2 (en) | 2009-03-12 | 2013-02-05 | Arend Erich Dittmer | Method for dynamically generating a configuration for a virtual machine with a virtual hard disk in an external storage device |
US8265075B2 (en) | 2009-03-16 | 2012-09-11 | International Business Machines Corporation | Method and apparatus for managing, configuring, and controlling an I/O virtualization device through a network switch |
CA3081255C (en) | 2009-04-01 | 2023-08-22 | Nicira, Inc. | Method and apparatus for implementing and managing virtual switches |
US20100254385A1 (en) | 2009-04-07 | 2010-10-07 | Cisco Technology, Inc. | Service Insertion Architecture (SIA) in a Virtual Private Network (VPN) Aware Network |
US8345650B2 (en) | 2009-04-17 | 2013-01-01 | Viasat, Inc. | Access node/gateway to access node/gateway layer-2 connectivity (end-to-end) |
US8589919B2 (en) | 2009-04-28 | 2013-11-19 | Cisco Technology, Inc. | Traffic forwarding for virtual machines |
US8027354B1 (en) | 2009-04-29 | 2011-09-27 | Cisco Technology, Inc. | Network consolidation for virtualized servers |
US20100281478A1 (en) | 2009-05-01 | 2010-11-04 | Microsoft Corporation | Multiphase virtual machine host capacity planning |
US8538919B1 (en) | 2009-05-16 | 2013-09-17 | Eric H. Nielsen | System, method, and computer program for real time remote recovery of virtual computing machines |
US9497039B2 (en) | 2009-05-28 | 2016-11-15 | Microsoft Technology Licensing, Llc | Agile data center network architecture |
US8683464B2 (en) | 2009-06-04 | 2014-03-25 | Microsoft Corporation | Efficient virtual machine management |
US8289975B2 (en) | 2009-06-22 | 2012-10-16 | Citrix Systems, Inc. | Systems and methods for handling a multi-connection protocol between a client and server traversing a multi-core system |
US8644188B1 (en) | 2009-06-25 | 2014-02-04 | Amazon Technologies, Inc. | Providing virtual networking functionality for managed computer networks |
US9059965B2 (en) | 2009-06-30 | 2015-06-16 | Oracle America, Inc. | Method and system for enforcing security policies on network traffic |
US9973446B2 (en) | 2009-08-20 | 2018-05-15 | Oracle International Corporation | Remote shared server peripherals over an Ethernet network for resource virtualization |
US8339994B2 (en) | 2009-08-27 | 2012-12-25 | Brocade Communications Systems, Inc. | Defining an optimal topology for a group of logical switches |
US8442048B2 (en) * | 2009-11-04 | 2013-05-14 | Juniper Networks, Inc. | Methods and apparatus for configuring a virtual network switch |
US20110283278A1 (en) * | 2010-05-13 | 2011-11-17 | Vmware, Inc. | User interface for managing a distributed virtual switch |
US8954962B2 (en) * | 2010-09-22 | 2015-02-10 | Juniper Networks, Inc. | Automatically reconfiguring physical switches to be in synchronization with changes made to associated virtual system |
US20120131662A1 (en) * | 2010-11-23 | 2012-05-24 | Cisco Technology, Inc. | Virtual local area networks in a virtual machine environment |
US8832693B2 (en) * | 2011-03-09 | 2014-09-09 | Unisys Corporation | Runtime virtual process creation for load sharing |
US8670450B2 (en) * | 2011-05-13 | 2014-03-11 | International Business Machines Corporation | Efficient software-based private VLAN solution for distributed virtual switches |
US8761187B2 (en) * | 2011-06-14 | 2014-06-24 | Futurewei Technologies, Inc. | System and method for an in-server virtual switch |
US8490092B2 (en) * | 2011-07-06 | 2013-07-16 | Microsoft Corporation | Combined live migration and storage migration using file shares and mirroring |
CN102857363B (en) * | 2012-05-04 | 2016-04-20 | 运软网络科技(上海)有限公司 | A kind of autonomous management system and method for virtual network |
US9019977B2 (en) * | 2012-05-16 | 2015-04-28 | Vmware, Inc. | Configuration management of distributed virtual switch |
US9231892B2 (en) * | 2012-07-09 | 2016-01-05 | Vmware, Inc. | Distributed virtual switch configuration and state management |
US9135050B2 (en) * | 2012-10-18 | 2015-09-15 | Vmware, Inc. | Extensible network configuration management |
US9930066B2 (en) * | 2013-02-12 | 2018-03-27 | Nicira, Inc. | Infrastructure level LAN security |
CN104253770B (en) * | 2013-06-27 | 2017-07-14 | 新华三技术有限公司 | Realize the method and apparatus of the distributed virtual switch system |
US10481932B2 (en) * | 2014-03-31 | 2019-11-19 | Vmware, Inc. | Auto-scaling virtual switches |
US9977688B2 (en) * | 2014-12-31 | 2018-05-22 | Vmware, Inc. | Live migration of virtual machines across virtual switches in virtual infrastructure |
US10693806B2 (en) * | 2015-03-11 | 2020-06-23 | Vmware, Inc. | Network bandwidth reservations for system traffic and virtual computing instances |
US9722948B2 (en) * | 2015-06-26 | 2017-08-01 | Nicira, Inc. | Providing quality of service for containers in a virtualized computing environment |
US10581744B2 (en) * | 2016-12-02 | 2020-03-03 | Cisco Technology, Inc. | Group-based pruning in a software defined networking environment |
-
2008
- 2008-05-23 US US12/126,777 patent/US8195774B2/en active Active
-
2009
- 2009-03-27 EP EP16151002.9A patent/EP3026855B1/en active Active
- 2009-03-27 CA CA2724237A patent/CA2724237C/en active Active
- 2009-03-27 EP EP09751056.4A patent/EP2286345B1/en active Active
- 2009-03-27 CA CA2887427A patent/CA2887427C/en active Active
- 2009-03-27 CN CN2009801195697A patent/CN102037452B/en active Active
- 2009-03-27 AU AU2009249516A patent/AU2009249516B2/en not_active Ceased
- 2009-03-27 JP JP2011510526A patent/JP5183802B2/en active Active
- 2009-03-27 RU RU2010143138/08A patent/RU2451991C1/en active
- 2009-03-27 WO PCT/US2009/038604 patent/WO2009142826A1/en active Application Filing
- 2009-03-27 KR KR1020107025752A patent/KR101242908B1/en active IP Right Grant
-
2012
- 2012-05-14 US US13/470,560 patent/US9160612B2/en active Active
-
2015
- 2015-10-06 US US14/876,484 patent/US9838339B2/en active Active
-
2017
- 2017-11-20 US US15/818,398 patent/US10637803B2/en active Active
-
2020
- 2020-04-27 US US16/859,176 patent/US11190463B2/en active Active
-
2021
- 2021-11-29 US US17/537,415 patent/US11757797B2/en active Active
-
2023
- 2023-09-11 US US18/244,870 patent/US20230421511A1/en active Pending
Also Published As
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11190463B2 (en) | Distributed virtual switch for virtualized computer systems | |
US11983082B2 (en) | Server clustering in a computing-on-demand system | |
US9977688B2 (en) | Live migration of virtual machines across virtual switches in virtual infrastructure | |
US9875127B2 (en) | Enabling uniform switch management in virtual infrastructure | |
US7849168B2 (en) | Network switching apparatus, server system and server migration method for server system | |
JP6185045B2 (en) | System and method for supporting live migration of virtual machines in InfiniBand networks | |
US11748094B2 (en) | Techniques for non-disruptive operating system upgrade |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
AS | Assignment |
Owner name: VMWARE LLC, CALIFORNIA Free format text: CHANGE OF NAME;ASSIGNOR:VMWARE, INC.;REEL/FRAME:066692/0103 Effective date: 20231121 |