US20240022626A1 - Dns-based gslb-aware sd-wan for low latency saas applications - Google Patents
Dns-based gslb-aware sd-wan for low latency saas applications Download PDFInfo
- Publication number
- US20240022626A1 US20240022626A1 US18/211,576 US202318211576A US2024022626A1 US 20240022626 A1 US20240022626 A1 US 20240022626A1 US 202318211576 A US202318211576 A US 202318211576A US 2024022626 A1 US2024022626 A1 US 2024022626A1
- Authority
- US
- United States
- Prior art keywords
- cloud gateway
- cloud
- application server
- saas application
- latency
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/12—Shortest path evaluation
- H04L45/123—Evaluation of link metrics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1001—Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
- H04L67/1004—Server selection for load balancing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
- H04L43/0852—Delays
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
- H04L43/0852—Delays
- H04L43/0864—Round trip delays
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/10—Active monitoring, e.g. heartbeat, ping or trace-route
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/20—Arrangements for monitoring or testing data switching networks the monitoring system or the monitored elements being virtualised, abstracted or software-defined entities, e.g. SDN or NFV
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/12—Shortest path evaluation
- H04L45/121—Shortest path evaluation by minimising delays
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/45—Network directories; Name-to-address mapping
- H04L61/4505—Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols
- H04L61/4511—Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols using domain name system [DNS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/53—Network services using third party service providers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/24—Connectivity information management, e.g. connectivity discovery or connectivity update
- H04W40/28—Connectivity information management, e.g. connectivity discovery or connectivity update for reactive routing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/16—Threshold monitoring
Definitions
- SD-WAN solutions can provide different networking services according to defined business policies, such as the VMware SD-WAN by VeloCloud®. These networking services can include direct internet, internet via a cloud gateway (e.g., VeloCloud® gateway), and internet via private link (e.g., MPLS) backhaul.
- a cloud gateway e.g., VeloCloud® gateway
- MPLS private link
- the business policy and default policy direct traffic to the internet via a cloud gateway.
- this approach may direct traffic to a specific cloud gateway based on proximity to the source location, this specific cloud gateway may not be the best gateway for certain publicly hosted applications, such as applications where the specific cloud gateway is unable to meet low latency requirements of the application.
- Some embodiments of the invention provide a method of routing data message traffic between an edge router at a branch first location for an enterprise network and a SaaS (software as a service) application server provided by a third-party at a second location.
- the method is performed, in some embodiments, by the edge router at the branch first location.
- the method queries a (global server load balancing) GSLB-aware DNS (domain name system) server for a cloud gateway from multiple cloud gateways at multiple locations through which a particular destination network address for the SaaS application server can be reached.
- the method receives an identifier for a first cloud gateway that is farther from the branch first location than a second cloud gateway, but closer to the second location than the second cloud gateway.
- the method then uses an optimized SD-WAN connection to the first cloud gateway to forward data messages for the first cloud gateway to the SaaS application at the second location.
- each link between the edge router and a cloud gateway is associated with a respective latency score. For instance, a first link between the edge router and the first cloud gateway is associated with a first latency score, in some embodiments, and a second link between the edge router and the second cloud gateway.
- the edge router after receiving the identifier for the first cloud gateway, sends requests to the first and second cloud gateways for latency scores associated with the respective links between the first and second cloud gateways and the SaaS application server.
- the edge router of some embodiments receives a third latency score from the first cloud gateway associated with a third link between the first cloud gateway and the SaaS application server, and receives a fourth latency score from the second cloud gateway associated with a fourth link between the second cloud gateway and the SaaS application server.
- the first latency score associated with the first link between the edge router and the first cloud gateway and the fourth latency score associated with the fourth link between the second cloud gateway and the SaaS application server are high latency scores, in some embodiments.
- the second latency score associated with the second link between the edge router and the second cloud gateway, and the third latency score associated with the third link between the first cloud gateway and the SaaS application server are low latency scores.
- the SaaS application server is associated with a low latency requirement that specifies a maximum latency threshold for the last mile connectivity to the SaaS application (i.e., the unmanaged, unoptimized links from the cloud gateways to the SaaS application server).
- the first cloud gateway is identified as the optimal cloud gateway for reaching the SaaS application server based on a determination that the third latency score meets the low latency requirement (i.e., does not exceed the maximum latency threshold), while the fourth latency score does not meet the low latency requirement (i.e., does exceed the maximum latency threshold).
- the first and second cloud gateways identify the latency scores provided to the edge router by sending probe packets to the SaaS application server.
- the first and second cloud gateways derive latency measurements from the probe packets to generate the latency scores for the links between the first and second cloud gateways and the SaaS application server, according to some embodiments.
- the probe packets include layer 4 (L4) and layer 7 (L7) probe packets.
- the first cloud gateway of some embodiments is also associated with a longer (round-trip time) RTT than the second cloud gateway (i.e., due to the increased distance to each the first cloud gateway).
- the first cloud gateway is farther from the edge router than the second cloud gateway in terms of physical distance, while in other embodiments, the first cloud gateway is farther from the edge router than the second cloud gateway in terms of signal distance. In still other embodiments, the first cloud gateway is farther from the edge router than the second cloud gateway in terms of both physical distance and signal distance.
- the edge router of some embodiments determines that the first cloud gateway is farther than the second cloud gateway based on proximity information provided by a server (e.g., the DNS server or a management and control server), while in other embodiments, the edge router makes this determination by performing a proximity operation to determine the distance to each cloud gateway.
- a server e.g., the DNS server or a management and control server
- the DNS server is a DNS first server that provides a particular destination network address for the SaaS application server to the edge router, while a second server provides the identifier for the first cloud gateway to the edge router.
- the second server in some embodiments, is a management and control server for the enterprise network that identifies the most optimal cloud gateways for each edge router in the enterprise network to reach the SaaS application server, and provides identifiers for the most optimal cloud gateways to each edge router.
- the second server in some embodiments, is also responsible for directing each cloud gateway to compute latency scores (i.e., rather than the edge routers each directing the cloud gateways to compute latency scores), and periodically collects the latency scores to dynamically identify the most optimal cloud gateways for each edge router.
- the second server causes the edge router to automatically switch from the first cloud gateway to another cloud gateway upon identifying the other gateway router as the most optimal cloud gateway based on updated latency scores for the first cloud gateway and the other cloud gateway.
- the second cloud gateway is a default gateway assigned to the edge router for forwarding data messages to the SaaS application server until the edge router receives the identifier for the first cloud gateway when the second server determines that the first cloud gateway is the most optimal gateway for use by the edge router to reach the SaaS application server.
- the second server of some embodiments also provides the location information and latency scores associated with the first cloud gateway to the edge router when providing the identifier for the first cloud gateway.
- FIG. 1 conceptually illustrates a block diagram of different routes between a branch office of an enterprise network for an entity and a geographically distant datacenter hosting a SaaS application server, in some embodiments.
- FIG. 2 conceptually illustrates a process of some embodiments for identifying a cloud gateway for forwarding data messages to a datacenter hosting a SaaS application server.
- FIG. 3 conceptually illustrates the block diagram of FIG. 1 with latency scores of some embodiments associated with the connections between the LA branch office, cloud gateways, and Japan datacenter.
- FIG. 4 conceptually illustrates a block diagram of a workflow of some embodiments for a branch office to identify a cloud gateway from a set of cloud gateways based on latency scores associated with using each cloud gateway in the set.
- FIG. 5 conceptually illustrates a process for identifying a cloud gateway for forwarding data messages to a SaaS application server, in some embodiments.
- FIG. 6 conceptually illustrates a block diagram of some embodiments in which a branch office obtains cloud gateway information from a controller for use in forwarding data messages to a SaaS application server.
- FIG. 7 conceptually illustrates a process of some embodiments for obtaining a cloud gateway from a controller for use in forwarding data messages to a SaaS application server.
- FIG. 8 illustrates an example of a standard SD-WAN environment in which some embodiments of the invention are implemented.
- FIG. 9 conceptually illustrates a computer system with which some embodiments of the invention are implemented.
- Some embodiments of the invention provide a method of routing data message traffic between an edge router at a branch first location for an enterprise network and a SaaS (software as a service) application server provided by a third-party at a second location.
- the method is performed, in some embodiments, by the edge router at the branch first location.
- the method queries a (global server load balancing) GSLB-aware DNS (domain name system) server for a cloud gateway from multiple cloud gateways at multiple locations through which a particular destination network address for the SaaS application server can be reached.
- the method receives an identifier for a first cloud gateway that is farther from the first location than a second cloud gateway, but closer to the second location than the second cloud gateway.
- the method then uses an optimized SD-WAN connection to the first cloud gateway to forward data messages for the first cloud gateway to the SaaS application at the second location.
- each link between the edge router and a cloud gateway is associated with a respective latency score. For instance, a first link between the edge router and the first cloud gateway is associated with a first latency score, in some embodiments, and a second link between the edge router and the second cloud gateway.
- the edge router after receiving the identifier for the first cloud gateway, sends requests to the first and second cloud gateways for latency scores associated with the respective links between the first and second cloud gateways and the SaaS application server.
- the edge router of some embodiments receives a third latency score from the first cloud gateway associated with a third link between the first cloud gateway and the SaaS application server, and receives a fourth latency score from the second cloud gateway associated with a fourth link between the second cloud gateway and the SaaS application server.
- the first latency score associated with the first link between the edge router and the first cloud gateway and the fourth latency score associated with the fourth link between the second cloud gateway and the SaaS application server are high latency scores, in some embodiments.
- the second latency score associated with the second link between the edge router and the second cloud gateway and the third latency score associated with the third link between the first cloud gateway and the SaaS application server are low latency scores.
- the SaaS application server is associated with a low latency requirement that specifies a maximum latency threshold for the last mile connectivity to the SaaS application (i.e., the unmanaged, unoptimized links from the cloud gateways to the SaaS application server).
- the first cloud gateway is identified as the optimal cloud gateway for reaching the SaaS application server based on a determination that the third latency score meets the low latency requirement (i.e., does not exceed the maximum latency threshold), while the fourth latency score does not meet the low latency requirement (i.e., does exceed the maximum latency threshold).
- the first and second cloud gateways identify the latency scores provided to the edge router by sending probe packets to the SaaS application server.
- the first and second cloud gateways derive latency measurements from the probe packets to generate the latency scores for the links between the first and second cloud gateways and the SaaS application server, according to some embodiments.
- the probe packets include layer 4 (L4) and layer 7 (L7) probe packets.
- the first cloud gateway of some embodiments is also associated with a longer (round-trip time) RTT than the second cloud gateway (i.e., due to the increased distance to the first cloud gateway).
- the first cloud gateway is farther from the edge router than the second cloud gateway in terms of physical distance, while in other embodiments, the first cloud gateway is farther from the edge router than the second cloud gateway in terms of signal distance. In still other embodiments, the first cloud gateway is farther from the edge router than the second cloud gateway in terms of both physical distance and signal distance.
- the edge router of some embodiments determines that the first cloud gateway is farther than the second cloud gateway based on proximity information provided by a server (e.g., the DNS server or a management and control server), while in other embodiments, the edge router makes this determination by performing a proximity operation to determine the distance to each cloud gateway.
- a server e.g., the DNS server or a management and control server
- the DNS server is a DNS first server that provides a particular destination network address for the SaaS application server to the edge router, while a second server provides the identifier for the first cloud gateway to the edge router.
- the second server in some embodiments, is a management and control server for the enterprise network that identifies the most optimal cloud gateways for each edge router in the enterprise network to reach the SaaS application server, and provides identifiers for the most optimal cloud gateways to each edge router.
- the second server in some embodiments, is also responsible for directing each cloud gateway to compute latency scores (i.e., rather than the edge routers each directing the cloud gateways to compute latency scores), and periodically collects the latency scores to dynamically identify the most optimal cloud gateways for each edge router.
- the second server causes the edge router to automatically switch from the first cloud gateway to another cloud gateway upon identifying the other gateway router as the most optimal cloud gateway based on updated latency scores for the first cloud gateway and the other cloud gateway.
- the second cloud gateway is a default gateway assigned to the edge router for forwarding data messages to the SaaS application server until the edge router receives the identifier for the first cloud gateway when the second server determines that the first cloud gateway is the most optimal gateway for use by the edge router to reach the SaaS application server.
- the second server of some embodiments also provides the location information and latency scores associated with the first cloud gateway to the edge router when providing the identifier for the first cloud gateway.
- FIG. 1 conceptually illustrates a block diagram of different routes between a branch office of an enterprise network for an entity and a geographically distant datacenter hosting a SaaS application server, in some embodiments.
- the diagram 100 includes a Los Angeles (“LA”) branch office 110 and a Japan datacenter 120 at which a SaaS application server is located.
- the LA branch office 110 is connected through an SD-WAN (e.g., to cloud gateways 130 and 135 through which data messages to the Japan datacenter 120 can be forwarded. While only one branch office 110 is shown, the SD-WAN (also referred to herein as a virtual network) may connect multiple branch sites to each other, as well as to, e.g., a controller (not shown).
- SD-WAN also referred to herein as a virtual network
- the connections between the LA branch office 110 and each of the cloud gateways 130 - 135 are between an edge router (e.g., VeloCloud® edge (VCE)) at the branch office and the cloud gateways (e.g., VeloCloud® gateways (VCGs)), according to some embodiments.
- the edge routers of some embodiments are edge machines (e.g., virtual machines (VMs), containers, programs executing on computers, etc.) and/or standalone appliances that operate at multi-computer locations of the particular entity (e.g., at an office or datacenter of the entity) to connect the computers at their respective locations to other nodes (e.g., gateways, hubs, etc.) in the virtual network.
- edge machines e.g., virtual machines (VMs), containers, programs executing on computers, etc.
- standalone appliances that operate at multi-computer locations of the particular entity (e.g., at an office or datacenter of the entity) to connect the computers at their respective locations to other nodes (e.g., gateways, hubs
- the nodes are clusters of nodes at each of the branch sites.
- the edge nodes are deployed to each of the branch sites as high-availability pairs such that one edge node in the pair is the active node and the other edge node in the pair is the standby node that can take over as the active edge node in case of failover.
- An example of an entity for which such a virtual network can be established includes a business entity (e.g., a corporation), a non-profit entity (e.g., a hospital, a research organization, etc.), and an education entity (e.g., a university, a college, etc.), or any other type of entity.
- Examples of public cloud providers include Amazon Web Services® (AWS), Google Cloud PlatformTM (GCP), Microsoft Azure®, etc.
- examples of entities include a company (e.g., corporation, partnership, etc.), an organization (e.g., a school, a non-profit, a government entity, etc.), etc.
- hub forwarding elements can also be deployed in private cloud datacenters of a virtual WAN provider that hosts these hubs to establish SD-WANs for different entities.
- one cloud gateway 130 is located in California and the other cloud gateway 135 is located in Japan.
- the LA branch office 110 has two route options using the two cloud gateways for reaching the Japan datacenter 120 .
- the first route includes connection 1 A from the LA branch office 110 to the California cloud gateway 130 and connection 1 B from the California cloud gateway 130 to the Japan datacenter 120 .
- the second route includes connection 2 A from the LA branch office 110 to the Japan cloud gateway 135 and connection 2 B from the Japan cloud gateway 135 to the Japan datacenter 120 .
- the respective connections 1 A and 2 A from the LA branch office 110 to the California and Japan cloud gateways 130 and 135 are managed by the SD-WAN and therefore can be optimized.
- controllers for the SD-WAN can configure the two managed forwarding elements to perform their forwarding operations in a way that maximizes QoS (quality of service), or other metrics such as throughput, according to some embodiments.
- QoS quality of service
- multiple links of any type can be leveraged to optimize connections between branch offices and cloud gateways.
- managed links can be configured to provide a desirable attribute associated with certain metrics such as throughput, QoS, and packet drops. Additional methods of link optimization, in some embodiments, can include utilizing link scores (e.g., assigned based on QoS metrics collected from devices connected by the SD-WAN), alternate path selections, packet replication, forward error correction, etc.
- DMPO dynamic multipath optimization
- the last mile connectivity from the Japan cloud gateway 135 to the Japan datacenter 120 is shorter than the last mile connectivity from the California cloud gateway 130 to the Japan datacenter 120 .
- the last mile connectivity links 1 B and 2 B are not managed by the SD-WAN and do not benefit from the same optimizations as the links that are managed by the SD-WAN.
- the second route through the Japan cloud gateway 135 is the optimal route due to the distance covered by the unmanaged portion of the path, according to some embodiments.
- the first route through the California cloud gateway 130 may be associated with better overall metrics (e.g., shorter round-trip time)
- the combination of the potential for optimizing the link covering the greater distance (i.e., link 2 A) and the shorter length of link 2 B compared to link 1 B that are associated with using the Japan cloud gateway 135 make the second route through the Japan cloud gateway 135 the optimal route (i.e., compared to the route through California cloud gateway 130 ).
- FIG. 2 conceptually illustrates a process 200 of some embodiments for identifying a cloud gateway for forwarding data messages to a datacenter hosting a SaaS application server.
- the process 200 is performed in some embodiments by an edge router at a branch office of an enterprise network (e.g., an edge router at the LA branch office 110 in the diagram 100 ).
- the process 200 starts when the edge router identifies (at 210 ) a destination datacenter in which a particular SaaS application is located.
- the edge router identifies the destination datacenter by requesting a network address (e.g. IP address) associated with the SaaS application from a DNS server, and receiving a network address and location information in response to the request.
- a network address e.g. IP address
- the process 200 identifies (at 220 ) the most optimal cloud gateway for forwarding data messages to the destination datacenter.
- the edge router identifies the most optimal cloud gateway based on receiving an identifier for a particular cloud gateway from the DNS server from which the network address and location of the destination datacenter were received.
- the edge router identifies the most optimal cloud gateway based on receiving an identifier for a particular cloud gateway from a management and control server.
- the edge router compares location and latency information associated with the set of cloud gateways to identify the most optimal cloud gateway for itself.
- the edge router of some embodiments determines whether a default (e.g., primary) cloud gateway assigned to the edge router and the gateway nearest to the DNS server match, and when these cloud gateways do not match, the edge router identifies the cloud gateway with the lowest latency to the SaaS application server.
- a default cloud gateway assigned to the edge router and the gateway nearest to the DNS server match, and when these cloud gateways do not match, the edge router identifies the cloud gateway with the lowest latency to the SaaS application server.
- the edge router obtains latency data from the cloud gateways by directing the cloud gateways to perform probes to the SaaS application server and to compute latency scores based on those probes for providing to the edge router.
- the edge router of some embodiments also already has latency scores for connections from the edge router to the cloud gateways based on DMPO.
- DMPO is a cloud-delivered architecture for on-premises and cloud applications that enables the use of multiple WAN transports simultaneously, thereby maximizing bandwidth and ensuring application performance.
- the process 200 then uses (at 230 ) the identified cloud gateway to forward data messages to the SaaS application located at the destination datacenter.
- an edge router at the LA branch office 110 would use an optimized SD-WAN connection to either the California cloud gateway 130 or the Japan cloud gateway 135 based on which cloud gateway has been identified as the most optimal cloud gateway to reach the SaaS application server at the Japan datacenter 120 .
- the process 200 ends.
- the cloud gateway used by the edge router to forward data messages to a SaaS server is selected based on latency scores associated with the links between the edge router, cloud gateways, and destination datacenter.
- FIG. 3 conceptually illustrates the block diagram 100 of FIG. 1 with latency scores of some embodiments associated with the connections between the LA branch office 110 , cloud gateways 130 - 135 , and Japan datacenter 120 .
- the link 340 between the LA branch office 110 and the California cloud gateway 130 and the link 355 between the Japan cloud gateway 135 are indicated as being low latency links.
- the link 345 between the California cloud gateway 130 and the Japan datacenter 120 and the link 350 between the LA branch office 110 and the Japan cloud gateway 135 are indicated as being high latency links.
- the first route from the LA office 110 to the Japan datacenter 120 through the California cloud gateway 130 includes a low latency first connection to the cloud gateway and a high latency second connection for the last mile connectivity from the cloud gateway 130 to the datacenter 120
- the second route from the LA office 110 to the Japan datacenter 120 through the Japan cloud gateway 135 includes a high latency first connection to the cloud gateway 135 and a low latency second connection for the last mile connectivity from the cloud gateway 135 to the Japan datacenter 120 .
- the SaaS application at the Japan datacenter 120 has low latency requirements
- the Japan cloud gateway 135 is the more optimal cloud gateway compared to the California cloud gateway 130 based on the connection between the Japan cloud gateway 135 and the Japan datacenter 120 having low latency, while the connection between the California cloud gateway 130 and Japan datacenter 120 has high latency.
- the connection between the Japan cloud gateway 135 and the Japan datacenter 120 has lower latency than the connection between the California cloud gateway 130 and the Japan datacenter 120 based on the shorter distance between the Japan cloud gateway 135 and Japan datacenter 120 .
- FIG. 4 conceptually illustrates a block diagram of a workflow of some embodiments for a branch office to identify a cloud gateway from a set of cloud gateways based on latency scores associated with using each cloud gateway in the set.
- the diagram 400 includes an LA branch office 410 , a Japan datacenter 420 that hosts a SaaS application server, a cloud gateway 430 located in California, a cloud gateway 435 located in Japan, a DNS server 440 , and location-based context 445 .
- FIG. 5 conceptually illustrates a process 500 for identifying a cloud gateway for forwarding data messages to a SaaS application server, in some embodiments.
- the process 500 is performed in some embodiments by an edge router for a branch office of an enterprise network.
- the process 500 starts when the edge router queries (at 510 ) a DNS server for a cloud gateway for forwarding data messages to a SaaS application server.
- the SaaS application server of some embodiments is located in a datacenter that is geographically distant from the branch office trying to reach the SaaS application server.
- the edge router at the branch office 410 sends a request for a cloud gateway (at the encircled 1) to the DNS server 440 .
- the edge router prior to requesting the cloud gateway, the edge router first requests a network address and location information for the SaaS application server.
- the DNS server 440 of some embodiments obtains location information for the SaaS application server at the resolved network address from the location-based context 445 , and provides both the network address and location information to the edge router at the branch office 410 in response to the request.
- the process 500 receives (at 520 ) an identifier for a cloud gateway from the DNS server.
- the branch office 410 receives (at the encircled 2) an identifier for the Japan cloud gateway 435 .
- the edge router prior to requesting and receiving the cloud identifier, is assigned a default cloud gateway for use in forwarding data messages to third-party SaaS application servers, and thus already has an identifier for at least one other cloud gateway.
- the DNS server responds to the edge router's request by providing two or more identifiers to the edge router for the edge router to select from.
- the process 500 sends (at 530 ) a request for a latency score associated with a connection between the cloud gateway and SaaS application server to the cloud gateway.
- the SaaS application server of some embodiments is associated with a low latency requirement, and thus the edge router of some such embodiments sends a request to the cloud gateway for a latency score to determine whether the latency score meets the low latency requirement.
- the LA branch office 410 i.e., an edge router at the branch office
- the cloud gateways compute latency scores by sending probe packets to the SaaS application server and collecting latency measurements using the probe packets.
- the California and Japan cloud gateways 430 - 435 are each shown (at the encircled 4) performing probes for latency measurements between the cloud gateways 430 - 435 and the Japan datacenter 420 that hosts the SaaS application server.
- the probe packets include L4 and L7 probe packets.
- the process 500 then receives (at 540 ) a latency score from the cloud gateway, such as the latency scores received (at the encircled 5) at the LA branch office 410 in the diagram 400 , and determines (at 550 ) whether the latency score meets the low latency requirement associated with the SaaS application server.
- the distance between a cloud gateway and the destination SaaS application server affects latency such that a cloud gateway that is farther from the SaaS application server has a higher latency than a cloud gateway that is closer to the SaaS application server.
- the process 500 returns to 510 to query the DNS server for a cloud gateway.
- the edge router uses or continues to use a default cloud gateway to forward data messages to the SaaS application server while awaiting the next cloud gateway from the DNS server.
- the process 500 transitions to use (at 560 ) an optimized SD-WAN connection to the cloud gateway to forward data messages for the cloud gateway to send to the SaaS application server. Following 560 , the process 500 ends.
- FIG. 6 conceptually illustrates a block diagram 600 of some embodiments in which a branch office obtains cloud gateway information from a controller for use in forwarding data messages to a SaaS application server.
- a cloud gateway i.e., identifier for a cloud gateway
- VCO VeloCloud® Orchestrator
- the controller 650 manages business policies for the SD-WAN.
- the controller 650 is hosted by a cloud, in some embodiments, and on-premises in other embodiments.
- new business policies may be created (e.g., network preferred DNS) that may trigger different actions, such as configuring or choosing a business policy for a tenant to be implemented by edge routers at the edges of the tenant networks.
- edge routers may receive a policy specified for a SaaS application, and the edge router then configures a rule to match the business policy.
- the edge router of some such embodiments may send data messages to each cloud gateway assigned to the edge router to instruct the cloud gateways to perform L4 and/or L7 probes to the SaaS application to collect latency measurements.
- the controller 650 directs the cloud gateways to perform these probes and provides the results to the edge router.
- the edge router of some embodiments already has latency data from the edge router to each cloud gateway based on DMPO, and also either stores, or obtains, proximity location information for each cloud gateway.
- the controller 650 collects latency measurements from the California and Japan cloud gateways 630 - 635 .
- the controller 650 collects latency measurements periodically to ensure that each edge router is using the most optimal cloud gateway for forwarding data messages to destinations outside of the enterprise network, such as the third-party SaaS application server at the Japan datacenter 620 . For instance, if a particular cloud gateway's updated latency score increases, the controller 650 of some embodiments may cause an edge router assigned to that cloud gateway to automatically switch to a different cloud gateway that is associated with a lower latency score.
- the controller 650 may assign a default cloud gateway to an edge router for reaching third-party sites within a first region, and assign a secondary cloud gateway to the edge router for reaching third-party sites within a second region.
- the controller 650 of some embodiments may assign the California cloud gateway 630 as a default cloud gateway to an edge router at the LA branch office 610 for use in reaching third-party sites in California and surrounding states, and subsequently assign the Japan cloud gateway 635 as a secondary cloud gateway for use in reaching at least the Japan datacenter 620 .
- the edge router of some such embodiments may automatically switch between the different cloud gateways based on the destination network addresses of data messages being forwarded.
- FIG. 6 will be further described below by reference to FIG. 7 , which conceptually illustrates a process 700 of some embodiments for obtaining a cloud gateway from a controller for use in forwarding data messages to a SaaS application server.
- the process 700 is performed in some embodiments by an edge router at a branch office (e.g., LA branch office 610 ).
- the process 700 starts when the edge router queries (at 710 ) a controller for a cloud gateway for forwarding data messages to a SaaS application server.
- the edge router may use the received destination network address to query the controller for a cloud gateway to use to reach the SaaS application.
- the LA branch office 610 receives a destination IP for the Japan SaaS application from the DNS server 640 (at the encircled 1), and then receives a cloud gateway identifier and location and latency data for the cloud gateway from the controller 650 (at the encircled 2).
- the process 700 receives (at 720 ) an identifier for a cloud gateway from the controller.
- the edge router is assigned a set of cloud gateways by the controller for use in forwarding data messages to entities outside of the enterprise network, and queries the controller for an identifier corresponding to a cloud gateway from the set that is most optimal for reaching the destination IP associated with the SaaS application.
- the controller of some embodiments determines the most optimal cloud gateway for use by an edge router based on latency scores associated with connections between the cloud gateways and the destination.
- both available routes from the LA branch office 610 to the Japan datacenter 620 include a high latency connection and a low latency connection.
- the low latency connection for the route that uses the Japan cloud gateway 635 is the unmanaged last mile connection (i.e., unoptimized connection) to the Japan datacenter 620
- the low latency connection for the route that uses the California cloud gateway 630 is the managed connection (i.e., optimized connection) from the LA branch office 610 to the California cloud gateway 630 .
- the route through the California cloud gateway 630 may be identified as the best route (e.g., in a routing table of the edge router based on proximity to the LA branch office 610 )
- the Japan cloud gateway 635 may be identified by the controller 650 as the most optimal cloud gateway based on the low latency associated with the unmanaged, unoptimized connection between the Japan cloud gateway 635 and Japan datacenter 620 .
- the process 700 uses (at 730 ) an optimized SD-WAN connection to the cloud gateway to forward data messages for the cloud gateway to send to the SaaS application server.
- the LA branch office 610 for instance, is illustrated (at the encircled 3) as forwarding data messages to the Japan datacenter 620 via the Japan cloud gateway 635 .
- the process 700 ends.
- FIG. 8 illustrates an example of a standard SD-WAN environment 800 in which some embodiments of the invention are implemented.
- the SD-WAN 800 is created in some embodiments for a particular entity using SD-WAN forwarding elements (FEs) deployed at branch sites, datacenters, and public clouds.
- FEs SD-WAN forwarding elements
- Examples of public clouds are public clouds provided by Amazon Web Services (AWS), Google Cloud Platform (GCP), Microsoft Azure, etc.
- entities include a company (e.g., corporation, partnership, etc.), an organization (e.g., a school, a non-profit, a government entity, etc.), etc.
- the SD-WAN FEs include cloud gateway 805 (e.g., cloud gateway router) and SD-WAN FEs 830 , 832 , 834 , 836 .
- the cloud gateway (CGW) in some embodiments is an FE that is in a private or public datacenter 810 .
- the CGW 805 in some embodiments has secure connection links (e.g., tunnels) with edge FEs (e.g., SD-WAN edge FEs 830 , 832 , 834 , and 836 ) at the particular entity's multi-machine sites (e.g., SD-WAN edge sites 820 , 822 , and 824 ), such as multi-user compute sites (e.g., branch offices or other physical locations having multi user computers and other user-operated devices and serving as source computers and devices for requests to other machines at other sites), datacenters (e.g., locations housing servers), etc.
- These multi-machine sites are often at different physical locations (e.g., different buildings, different cities, different states, etc.).
- Each branch site 820 - 826 is shown to include a respective edge FE 830 , 832 , and 834 (e.g., edge routers) and respective resources 850 , 852 , and 854 .
- the resources 850 - 854 are machines located at the branch sites 820 - 824 .
- the datacenter site 826 is shown to include a hub FE 836 (e.g., a hub router), and datacenter resources 856 .
- the datacenter SD-WAN FE 836 is referred to as a hub FE because in some embodiments this FE can be used to connect to other edge FEs of the branch sites 820 - 824 .
- the hub FE in some embodiments uses or has one or more service engines to perform services (e.g., middlebox services) on packets that it forwards from one branch site to another branch site.
- the hub FE also provides access to the datacenter resources 856 .
- Each edge FE (e.g., SD-WAN edge FEs 830 - 834 ) exchanges packets with one or more cloud gateways 805 through one or more connection links 815 (e.g., multiple connection links available at the edge FE).
- connection links 815 include secure and unsecure connection links, while in other embodiments they only include secure connection links.
- multiple secure connection links e.g., multiple secure tunnels that are established over multiple physical links
- each secure connection link in some embodiments is associated with a different physical network link between the edge FE and an external network.
- an edge FE in some embodiments has one or more commercial broadband Internet links (e.g., a cable modem, a fiber optic link) to access the Internet, an MPLS (multiprotocol label switching) link to access external networks through an MPLS provider's network, a wireless cellular link (e.g., a 5G LTE network), etc.
- the different physical links between the edge FE 834 and the cloud gateway 805 are the same type of links (e.g., are different MPLS links).
- one edge FE 830 - 834 can also have multiple direct links 815 (e.g., secure connection links established through multiple physical links) to another edge FE 830 - 834 , and/or to a datacenter hub FE 836 .
- the different links in some embodiments can use different types of physical links or the same type of physical links.
- a first edge FE of a first branch site can connect to a second edge FE of a second branch site (1) directly through one or more links 815 , (2) through a cloud gateway or datacenter hub to which the first edge FE connects through two or more links 815 , or (3) through another edge FE of another branch site that can augment its role to that of a hub FE.
- a first edge FE (e.g., 834 ) of a first branch site can use multiple SD-WAN links 815 to reach a second edge FE (e.g., 830 ) of a second branch site (e.g., 820 ), or a hub FE 836 of a datacenter site 826 .
- the cloud gateway 805 in some embodiments is used to connect two SD-WAN FEs 830 - 836 through at least two secure connection links 815 between the gateway 805 and the two FEs at the two SD-WAN sites (e.g., branch sites 820 - 824 or datacenter site 826 ). In some embodiments, the cloud gateway 805 also provides network data from one multi-machine site to another multi-machine site (e.g., provides the accessible subnets of one site to another site).
- the hub FE 836 of the datacenter 826 in some embodiments can be used to connect two SD-WAN FEs 830 - 834 of two branch sites through at least two secure connection links 815 between the hub 836 and the two FEs at the two branch sites 820 - 824 .
- each secure connection link between two SD-WAN FEs is formed as a VPN tunnel between the two FEs.
- the collection of the SD-WAN FEs e.g., FEs 830 - 836 and gateways 805
- the secure connections 815 between the FEs forms the SD-WAN 800 for the particular entity that spans at least the public or private cloud datacenter 810 to connect the branch and datacenter sites 820 - 826 .
- secure connection links are defined between gateways in different public cloud datacenters to allow paths through the virtual network to traverse from one public cloud datacenter to another, while no such links are defined in other embodiments.
- the gateway 805 is a multi-tenant gateway that is used to define other virtual networks for other entities (e.g., other companies, organizations, etc.). Some such embodiments use tenant identifiers to create tunnels between a gateway and edge FE of a particular entity, and then use tunnel identifiers of the created tunnels to allow the gateway to differentiate packet flows that it receives from edge FEs of one entity from packet flows that it receives along other tunnels of other entities.
- gateways are single-tenant and are specifically deployed to be used by just one entity.
- the SD-WAN 800 includes a cluster of controllers 840 that serve as a central point for managing (e.g., defining and modifying) configuration data that is provided to the edge FEs and/or gateways to configure some or all of the operations.
- this controller cluster 840 is in one or more public cloud datacenters, while in other embodiments it is in one or more private datacenters.
- the controller cluster 840 has a set of manager servers that define and modify the configuration data, and a set of controller servers that distribute the configuration data to the edge FEs, hubs and/or gateways.
- the controller cluster 840 directs edge FEs and hubs to use certain gateways (i.e., assigns a gateway to the edge FEs and hubs). In some embodiments, some or all of the controller cluster's functionality is performed by a cloud gateway (e.g., cloud gateway 805 ). The controller cluster 840 also provides next hop forwarding rules and load balancing criteria in some embodiments.
- Computer-readable storage medium also referred to as computer-readable medium.
- processing unit(s) e.g., one or more processors, cores of processors, or other processing units
- processing unit(s) e.g., one or more processors, cores of processors, or other processing units
- Examples of computer-readable media include, but are not limited to, CD-ROMs, flash drives, RAM chips, hard drives, EPROMs, etc.
- the computer-readable media does not include carrier waves and electronic signals passing wirelessly or over wired connections.
- the term “software” is meant to include firmware residing in read-only memory or applications stored in magnetic storage, which can be read into memory for processing by a processor.
- multiple software inventions can be implemented as sub-parts of a larger program while remaining distinct software inventions.
- multiple software inventions can also be implemented as separate programs.
- any combination of separate programs that together implement a software invention described here is within the scope of the invention.
- the software programs when installed to operate on one or more electronic systems, define one or more specific machine implementations that execute and perform the operations of the software programs.
- FIG. 9 conceptually illustrates a computer system 900 with which some embodiments of the invention are implemented.
- the computer system 900 can be used to implement any of the above-described hosts, controllers, gateway, and edge forwarding elements. As such, it can be used to execute any of the above described processes.
- This computer system 900 includes various types of non-transitory machine-readable media and interfaces for various other types of machine-readable media.
- Computer system 900 includes a bus 905 , processing unit(s) 910 , a system memory 925 , a read-only memory 930 , a permanent storage device 935 , input devices 940 , and output devices 945 .
- the bus 905 collectively represents all system, peripheral, and chipset buses that communicatively connect the numerous internal devices of the computer system 900 .
- the bus 905 communicatively connects the processing unit(s) 910 with the read-only memory 930 , the system memory 925 , and the permanent storage device 935 .
- the processing unit(s) 910 retrieve instructions to execute and data to process in order to execute the processes of the invention.
- the processing unit(s) 910 may be a single processor or a multi-core processor in different embodiments.
- the read-only-memory (ROM) 930 stores static data and instructions that are needed by the processing unit(s) 910 and other modules of the computer system 900 .
- the permanent storage device 935 is a read-and-write memory device. This device 935 is a non-volatile memory unit that stores instructions and data even when the computer system 900 is off. Some embodiments of the invention use a mass-storage device (such as a magnetic or optical disk and its corresponding disk drive) as the permanent storage device 935 .
- the system memory 925 is a read-and-write memory device. However, unlike storage device 935 , the system memory 925 is a volatile read-and-write memory, such as random access memory.
- the system memory 925 stores some of the instructions and data that the processor needs at runtime.
- the invention's processes are stored in the system memory 925 , the permanent storage device 935 , and/or the read-only memory 930 . From these various memory units, the processing unit(s) 910 retrieve instructions to execute and data to process in order to execute the processes of some embodiments.
- the bus 905 also connects to the input and output devices 940 and 945 .
- the input devices 940 enable the user to communicate information and select commands to the computer system 900 .
- the input devices 940 include alphanumeric keyboards and pointing devices (also called “cursor control devices”).
- the output devices 945 display images generated by the computer system 900 .
- the output devices 945 include printers and display devices, such as cathode ray tubes (CRT) or liquid crystal displays (LCD). Some embodiments include devices such as touchscreens that function as both input and output devices 940 and 945 .
- bus 905 also couples computer system 900 to a network 965 through a network adapter (not shown).
- the computer 900 can be a part of a network of computers (such as a local area network (“LAN”), a wide area network (“WAN”), or an Intranet), or a network of networks (such as the Internet). Any or all components of computer system 900 may be used in conjunction with the invention.
- Some embodiments include electronic components, such as microprocessors, storage and memory that store computer program instructions in a machine-readable or computer-readable medium (alternatively referred to as computer-readable storage media, machine-readable media, or machine-readable storage media).
- computer-readable media include RAM, ROM, read-only compact discs (CD-ROM), recordable compact discs (CD-R), rewritable compact discs (CD-RW), read-only digital versatile discs (e.g., DVD-ROM, dual-layer DVD-ROM), a variety of recordable/rewritable DVDs (e.g., DVD-RAM, DVD-RW, DVD+RW, etc.), flash memory (e.g., SD cards, mini-SD cards, micro-SD cards, etc.), magnetic and/or solid state hard drives, read-only and recordable Blu-Ray® discs, ultra-density optical discs, any other optical or magnetic media, and floppy disks.
- CD-ROM compact discs
- CD-R recordable compact
- the computer-readable media may store a computer program that is executable by at least one processing unit and includes sets of instructions for performing various operations.
- Examples of computer programs or computer code include machine code, such as is produced by a compiler, and files including higher-level code that are executed by a computer, an electronic component, or a microprocessor using an interpreter.
- ASICs application-specific integrated circuits
- FPGAs field-programmable gate arrays
- integrated circuits execute instructions that are stored on the circuit itself.
- the terms “computer”, “server”, “processor”, and “memory” all refer to electronic or other technological devices. These terms exclude people or groups of people.
- the terms “display” or “displaying” mean displaying on an electronic device.
- the terms “computer-readable medium,” “computer-readable media,” and “machine-readable medium” are entirely restricted to tangible, physical objects that store information in a form that is readable by a computer. These terms exclude any wireless signals, wired download signals, and any other ephemeral or transitory signals.
- FIGS. 2 , 5 , and 7 conceptually illustrate processes.
- the specific operations of these processes may not be performed in the exact order shown and described.
- the specific operations may not be performed in one continuous series of operations, and different specific operations may be performed in different embodiments.
- the process could be implemented using several sub-processes, or as part of a larger macro process.
- the invention is not to be limited by the foregoing illustrative details, but rather is to be defined by the appended claims.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Environmental & Geological Engineering (AREA)
- Health & Medical Sciences (AREA)
- Cardiology (AREA)
- General Health & Medical Sciences (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
- Today, SD-WAN solutions can provide different networking services according to defined business policies, such as the VMware SD-WAN by VeloCloud®. These networking services can include direct internet, internet via a cloud gateway (e.g., VeloCloud® gateway), and internet via private link (e.g., MPLS) backhaul. Typically, the business policy and default policy direct traffic to the internet via a cloud gateway. However, while this approach may direct traffic to a specific cloud gateway based on proximity to the source location, this specific cloud gateway may not be the best gateway for certain publicly hosted applications, such as applications where the specific cloud gateway is unable to meet low latency requirements of the application.
- Some embodiments of the invention provide a method of routing data message traffic between an edge router at a branch first location for an enterprise network and a SaaS (software as a service) application server provided by a third-party at a second location. The method is performed, in some embodiments, by the edge router at the branch first location. The method queries a (global server load balancing) GSLB-aware DNS (domain name system) server for a cloud gateway from multiple cloud gateways at multiple locations through which a particular destination network address for the SaaS application server can be reached. From the GSLB-aware DNS server, the method receives an identifier for a first cloud gateway that is farther from the branch first location than a second cloud gateway, but closer to the second location than the second cloud gateway. The method then uses an optimized SD-WAN connection to the first cloud gateway to forward data messages for the first cloud gateway to the SaaS application at the second location.
- In some embodiments, each link between the edge router and a cloud gateway is associated with a respective latency score. For instance, a first link between the edge router and the first cloud gateway is associated with a first latency score, in some embodiments, and a second link between the edge router and the second cloud gateway. In some embodiments, after receiving the identifier for the first cloud gateway, the edge router sends requests to the first and second cloud gateways for latency scores associated with the respective links between the first and second cloud gateways and the SaaS application server. In response to the requests, the edge router of some embodiments receives a third latency score from the first cloud gateway associated with a third link between the first cloud gateway and the SaaS application server, and receives a fourth latency score from the second cloud gateway associated with a fourth link between the second cloud gateway and the SaaS application server.
- The first latency score associated with the first link between the edge router and the first cloud gateway and the fourth latency score associated with the fourth link between the second cloud gateway and the SaaS application server are high latency scores, in some embodiments. Conversely, in some embodiments, the second latency score associated with the second link between the edge router and the second cloud gateway, and the third latency score associated with the third link between the first cloud gateway and the SaaS application server are low latency scores. In some embodiments, the SaaS application server is associated with a low latency requirement that specifies a maximum latency threshold for the last mile connectivity to the SaaS application (i.e., the unmanaged, unoptimized links from the cloud gateways to the SaaS application server). In some such embodiments, the first cloud gateway is identified as the optimal cloud gateway for reaching the SaaS application server based on a determination that the third latency score meets the low latency requirement (i.e., does not exceed the maximum latency threshold), while the fourth latency score does not meet the low latency requirement (i.e., does exceed the maximum latency threshold).
- In some embodiments, the first and second cloud gateways identify the latency scores provided to the edge router by sending probe packets to the SaaS application server. The first and second cloud gateways derive latency measurements from the probe packets to generate the latency scores for the links between the first and second cloud gateways and the SaaS application server, according to some embodiments. The probe packets, in some embodiments, include layer 4 (L4) and layer 7 (L7) probe packets.
- In addition to the first cloud gateway being farther from the first location than the second cloud gateway, the first cloud gateway of some embodiments is also associated with a longer (round-trip time) RTT than the second cloud gateway (i.e., due to the increased distance to each the first cloud gateway). In some embodiments, the first cloud gateway is farther from the edge router than the second cloud gateway in terms of physical distance, while in other embodiments, the first cloud gateway is farther from the edge router than the second cloud gateway in terms of signal distance. In still other embodiments, the first cloud gateway is farther from the edge router than the second cloud gateway in terms of both physical distance and signal distance. The edge router of some embodiments determines that the first cloud gateway is farther than the second cloud gateway based on proximity information provided by a server (e.g., the DNS server or a management and control server), while in other embodiments, the edge router makes this determination by performing a proximity operation to determine the distance to each cloud gateway.
- In some embodiments, the DNS server is a DNS first server that provides a particular destination network address for the SaaS application server to the edge router, while a second server provides the identifier for the first cloud gateway to the edge router. The second server, in some embodiments, is a management and control server for the enterprise network that identifies the most optimal cloud gateways for each edge router in the enterprise network to reach the SaaS application server, and provides identifiers for the most optimal cloud gateways to each edge router.
- The second server, in some embodiments, is also responsible for directing each cloud gateway to compute latency scores (i.e., rather than the edge routers each directing the cloud gateways to compute latency scores), and periodically collects the latency scores to dynamically identify the most optimal cloud gateways for each edge router. In some embodiments, the second server causes the edge router to automatically switch from the first cloud gateway to another cloud gateway upon identifying the other gateway router as the most optimal cloud gateway based on updated latency scores for the first cloud gateway and the other cloud gateway. For instance, in some embodiments, the second cloud gateway is a default gateway assigned to the edge router for forwarding data messages to the SaaS application server until the edge router receives the identifier for the first cloud gateway when the second server determines that the first cloud gateway is the most optimal gateway for use by the edge router to reach the SaaS application server. The second server of some embodiments also provides the location information and latency scores associated with the first cloud gateway to the edge router when providing the identifier for the first cloud gateway.
- The preceding Summary is intended to serve as a brief introduction to some embodiments of the invention. It is not meant to be an introduction or overview of all inventive subject matter disclosed in this document. The Detailed Description that follows and the Drawings that are referred to in the Detailed Description will further describe the embodiments described in the Summary as well as other embodiments. Accordingly, to understand all the embodiments described by this document, a full review of the Summary, the Detailed Description, the Drawings, and the Claims is needed. Moreover, the claimed subject matters are not to be limited by the illustrative details in the Summary, the Detailed Description, and the Drawings.
- The novel features of the invention are set forth in the appended claims. However, for purposes of explanation, several embodiments of the invention are set forth in the following figures.
-
FIG. 1 conceptually illustrates a block diagram of different routes between a branch office of an enterprise network for an entity and a geographically distant datacenter hosting a SaaS application server, in some embodiments. -
FIG. 2 conceptually illustrates a process of some embodiments for identifying a cloud gateway for forwarding data messages to a datacenter hosting a SaaS application server. -
FIG. 3 , for instance, conceptually illustrates the block diagram ofFIG. 1 with latency scores of some embodiments associated with the connections between the LA branch office, cloud gateways, and Japan datacenter. -
FIG. 4 conceptually illustrates a block diagram of a workflow of some embodiments for a branch office to identify a cloud gateway from a set of cloud gateways based on latency scores associated with using each cloud gateway in the set. -
FIG. 5 conceptually illustrates a process for identifying a cloud gateway for forwarding data messages to a SaaS application server, in some embodiments. -
FIG. 6 conceptually illustrates a block diagram of some embodiments in which a branch office obtains cloud gateway information from a controller for use in forwarding data messages to a SaaS application server. -
FIG. 7 conceptually illustrates a process of some embodiments for obtaining a cloud gateway from a controller for use in forwarding data messages to a SaaS application server. -
FIG. 8 illustrates an example of a standard SD-WAN environment in which some embodiments of the invention are implemented. -
FIG. 9 conceptually illustrates a computer system with which some embodiments of the invention are implemented. - In the following detailed description of the invention, numerous details, examples, and embodiments of the invention are set forth and described. However, it will be clear and apparent to one skilled in the art that the invention is not limited to the embodiments set forth and that the invention may be practiced without some of the specific details and examples discussed.
- Some embodiments of the invention provide a method of routing data message traffic between an edge router at a branch first location for an enterprise network and a SaaS (software as a service) application server provided by a third-party at a second location. The method is performed, in some embodiments, by the edge router at the branch first location. The method queries a (global server load balancing) GSLB-aware DNS (domain name system) server for a cloud gateway from multiple cloud gateways at multiple locations through which a particular destination network address for the SaaS application server can be reached. From the GSLB-aware DNS server, the method receives an identifier for a first cloud gateway that is farther from the first location than a second cloud gateway, but closer to the second location than the second cloud gateway. The method then uses an optimized SD-WAN connection to the first cloud gateway to forward data messages for the first cloud gateway to the SaaS application at the second location.
- In some embodiments, each link between the edge router and a cloud gateway is associated with a respective latency score. For instance, a first link between the edge router and the first cloud gateway is associated with a first latency score, in some embodiments, and a second link between the edge router and the second cloud gateway. In some embodiments, after receiving the identifier for the first cloud gateway, the edge router sends requests to the first and second cloud gateways for latency scores associated with the respective links between the first and second cloud gateways and the SaaS application server. In response to the requests, the edge router of some embodiments receives a third latency score from the first cloud gateway associated with a third link between the first cloud gateway and the SaaS application server, and receives a fourth latency score from the second cloud gateway associated with a fourth link between the second cloud gateway and the SaaS application server.
- The first latency score associated with the first link between the edge router and the first cloud gateway and the fourth latency score associated with the fourth link between the second cloud gateway and the SaaS application server are high latency scores, in some embodiments. Conversely, in some embodiments, the second latency score associated with the second link between the edge router and the second cloud gateway and the third latency score associated with the third link between the first cloud gateway and the SaaS application server are low latency scores. In some embodiments, the SaaS application server is associated with a low latency requirement that specifies a maximum latency threshold for the last mile connectivity to the SaaS application (i.e., the unmanaged, unoptimized links from the cloud gateways to the SaaS application server). In some such embodiments, the first cloud gateway is identified as the optimal cloud gateway for reaching the SaaS application server based on a determination that the third latency score meets the low latency requirement (i.e., does not exceed the maximum latency threshold), while the fourth latency score does not meet the low latency requirement (i.e., does exceed the maximum latency threshold).
- In some embodiments, the first and second cloud gateways identify the latency scores provided to the edge router by sending probe packets to the SaaS application server. The first and second cloud gateways derive latency measurements from the probe packets to generate the latency scores for the links between the first and second cloud gateways and the SaaS application server, according to some embodiments. The probe packets, in some embodiments, include layer 4 (L4) and layer 7 (L7) probe packets.
- In addition to the first cloud gateway being farther from the first location than the second cloud gateway, the first cloud gateway of some embodiments is also associated with a longer (round-trip time) RTT than the second cloud gateway (i.e., due to the increased distance to the first cloud gateway). In some embodiments, the first cloud gateway is farther from the edge router than the second cloud gateway in terms of physical distance, while in other embodiments, the first cloud gateway is farther from the edge router than the second cloud gateway in terms of signal distance. In still other embodiments, the first cloud gateway is farther from the edge router than the second cloud gateway in terms of both physical distance and signal distance. The edge router of some embodiments determines that the first cloud gateway is farther than the second cloud gateway based on proximity information provided by a server (e.g., the DNS server or a management and control server), while in other embodiments, the edge router makes this determination by performing a proximity operation to determine the distance to each cloud gateway.
- In some embodiments, the DNS server is a DNS first server that provides a particular destination network address for the SaaS application server to the edge router, while a second server provides the identifier for the first cloud gateway to the edge router. The second server, in some embodiments, is a management and control server for the enterprise network that identifies the most optimal cloud gateways for each edge router in the enterprise network to reach the SaaS application server, and provides identifiers for the most optimal cloud gateways to each edge router.
- The second server, in some embodiments, is also responsible for directing each cloud gateway to compute latency scores (i.e., rather than the edge routers each directing the cloud gateways to compute latency scores), and periodically collects the latency scores to dynamically identify the most optimal cloud gateways for each edge router. In some embodiments, the second server causes the edge router to automatically switch from the first cloud gateway to another cloud gateway upon identifying the other gateway router as the most optimal cloud gateway based on updated latency scores for the first cloud gateway and the other cloud gateway. For instance, in some embodiments, the second cloud gateway is a default gateway assigned to the edge router for forwarding data messages to the SaaS application server until the edge router receives the identifier for the first cloud gateway when the second server determines that the first cloud gateway is the most optimal gateway for use by the edge router to reach the SaaS application server. The second server of some embodiments also provides the location information and latency scores associated with the first cloud gateway to the edge router when providing the identifier for the first cloud gateway.
-
FIG. 1 conceptually illustrates a block diagram of different routes between a branch office of an enterprise network for an entity and a geographically distant datacenter hosting a SaaS application server, in some embodiments. As shown, the diagram 100 includes a Los Angeles (“LA”)branch office 110 and aJapan datacenter 120 at which a SaaS application server is located. TheLA branch office 110 is connected through an SD-WAN (e.g., to cloud 130 and 135 through which data messages to thegateways Japan datacenter 120 can be forwarded. While only onebranch office 110 is shown, the SD-WAN (also referred to herein as a virtual network) may connect multiple branch sites to each other, as well as to, e.g., a controller (not shown). - The connections between the
LA branch office 110 and each of the cloud gateways 130-135 are between an edge router (e.g., VeloCloud® edge (VCE)) at the branch office and the cloud gateways (e.g., VeloCloud® gateways (VCGs)), according to some embodiments. The edge routers of some embodiments are edge machines (e.g., virtual machines (VMs), containers, programs executing on computers, etc.) and/or standalone appliances that operate at multi-computer locations of the particular entity (e.g., at an office or datacenter of the entity) to connect the computers at their respective locations to other nodes (e.g., gateways, hubs, etc.) in the virtual network. In some embodiments, the nodes are clusters of nodes at each of the branch sites. In other embodiments, the edge nodes are deployed to each of the branch sites as high-availability pairs such that one edge node in the pair is the active node and the other edge node in the pair is the standby node that can take over as the active edge node in case of failover. - An example of an entity for which such a virtual network can be established includes a business entity (e.g., a corporation), a non-profit entity (e.g., a hospital, a research organization, etc.), and an education entity (e.g., a university, a college, etc.), or any other type of entity. Examples of public cloud providers include Amazon Web Services® (AWS), Google Cloud Platform™ (GCP), Microsoft Azure®, etc., while examples of entities include a company (e.g., corporation, partnership, etc.), an organization (e.g., a school, a non-profit, a government entity, etc.), etc. In other embodiments, hub forwarding elements can also be deployed in private cloud datacenters of a virtual WAN provider that hosts these hubs to establish SD-WANs for different entities.
- In this example, one
cloud gateway 130 is located in California and theother cloud gateway 135 is located in Japan. TheLA branch office 110 has two route options using the two cloud gateways for reaching theJapan datacenter 120. The first route includesconnection 1A from theLA branch office 110 to theCalifornia cloud gateway 130 andconnection 1B from theCalifornia cloud gateway 130 to theJapan datacenter 120. The second route includesconnection 2A from theLA branch office 110 to theJapan cloud gateway 135 andconnection 2B from theJapan cloud gateway 135 to theJapan datacenter 120. The 1A and 2A from therespective connections LA branch office 110 to the California and 130 and 135 are managed by the SD-WAN and therefore can be optimized. In other words, when both forwarding elements (i.e., a forwarding element at theJapan cloud gateways LA branch office 110 and either of the California andJapan cloud gateways 130 and 135) for one hop (i.e., source and destination forwarding elements) are managed by the SD-WAN, controllers for the SD-WAN can configure the two managed forwarding elements to perform their forwarding operations in a way that maximizes QoS (quality of service), or other metrics such as throughput, according to some embodiments. - In some embodiments, for instance, multiple links of any type (e.g., DSL (digital subscriber line), cable modem, Ethernet, fiber, LTE/3G/4G/5G, MPLS (multiprotocol label switching), radio, satellite, Wi-Fi, etc.), location, or provider can be leveraged to optimize connections between branch offices and cloud gateways. Also, in some embodiments, managed links can be configured to provide a desirable attribute associated with certain metrics such as throughput, QoS, and packet drops. Additional methods of link optimization, in some embodiments, can include utilizing link scores (e.g., assigned based on QoS metrics collected from devices connected by the SD-WAN), alternate path selections, packet replication, forward error correction, etc. For example, some embodiments utilize dynamic multipath optimization (DMPO) to optimize links in the SD-WAN. DMPO, according to some embodiments, is a cloud-delivered architecture for on-premises and cloud applications that enables the use of multiple WAN transports simultaneously, thereby maximizing bandwidth and ensuring application performance.
- Returning to the diagram 100, while the distance from the
LA branch office 110 to theJapan cloud gateway 135 is longer than the distance from theLA branch office 110 to theCalifornia cloud gateway 130, the last mile connectivity from theJapan cloud gateway 135 to theJapan datacenter 120 is shorter than the last mile connectivity from theCalifornia cloud gateway 130 to theJapan datacenter 120. Unlike the 1A and 2A between theconnections LA branch office 110 and the California and 130 and 135, the lastJapan cloud gateway 1B and 2B are not managed by the SD-WAN and do not benefit from the same optimizations as the links that are managed by the SD-WAN. As a result, the second route through themile connectivity links Japan cloud gateway 135 is the optimal route due to the distance covered by the unmanaged portion of the path, according to some embodiments. That is, while the first route through theCalifornia cloud gateway 130 may be associated with better overall metrics (e.g., shorter round-trip time), the combination of the potential for optimizing the link covering the greater distance (i.e., link 2A) and the shorter length oflink 2B compared to link 1B that are associated with using theJapan cloud gateway 135 make the second route through theJapan cloud gateway 135 the optimal route (i.e., compared to the route through California cloud gateway 130). -
FIG. 2 conceptually illustrates aprocess 200 of some embodiments for identifying a cloud gateway for forwarding data messages to a datacenter hosting a SaaS application server. Theprocess 200 is performed in some embodiments by an edge router at a branch office of an enterprise network (e.g., an edge router at theLA branch office 110 in the diagram 100). Theprocess 200 starts when the edge router identifies (at 210) a destination datacenter in which a particular SaaS application is located. In some embodiments, the edge router identifies the destination datacenter by requesting a network address (e.g. IP address) associated with the SaaS application from a DNS server, and receiving a network address and location information in response to the request. - From a set of cloud gateways through which the destination datacenter hosting the SaaS application can be reached, the
process 200 identifies (at 220) the most optimal cloud gateway for forwarding data messages to the destination datacenter. In some embodiments, the edge router identifies the most optimal cloud gateway based on receiving an identifier for a particular cloud gateway from the DNS server from which the network address and location of the destination datacenter were received. In other embodiments, the edge router identifies the most optimal cloud gateway based on receiving an identifier for a particular cloud gateway from a management and control server. In still other embodiments, the edge router compares location and latency information associated with the set of cloud gateways to identify the most optimal cloud gateway for itself. For instance, the edge router of some embodiments determines whether a default (e.g., primary) cloud gateway assigned to the edge router and the gateway nearest to the DNS server match, and when these cloud gateways do not match, the edge router identifies the cloud gateway with the lowest latency to the SaaS application server. - In some embodiments, the edge router obtains latency data from the cloud gateways by directing the cloud gateways to perform probes to the SaaS application server and to compute latency scores based on those probes for providing to the edge router. The edge router of some embodiments also already has latency scores for connections from the edge router to the cloud gateways based on DMPO. As mentioned above, DMPO, according to some embodiments, is a cloud-delivered architecture for on-premises and cloud applications that enables the use of multiple WAN transports simultaneously, thereby maximizing bandwidth and ensuring application performance.
- Returning to the
process 200, theprocess 200 then uses (at 230) the identified cloud gateway to forward data messages to the SaaS application located at the destination datacenter. In the diagram 100, for instance, an edge router at theLA branch office 110 would use an optimized SD-WAN connection to either theCalifornia cloud gateway 130 or theJapan cloud gateway 135 based on which cloud gateway has been identified as the most optimal cloud gateway to reach the SaaS application server at theJapan datacenter 120. Following 230, theprocess 200 ends. - In some embodiments, the cloud gateway used by the edge router to forward data messages to a SaaS server is selected based on latency scores associated with the links between the edge router, cloud gateways, and destination datacenter.
FIG. 3 , for instance, conceptually illustrates the block diagram 100 ofFIG. 1 with latency scores of some embodiments associated with the connections between theLA branch office 110, cloud gateways 130-135, andJapan datacenter 120. - As shown, the
link 340 between theLA branch office 110 and theCalifornia cloud gateway 130 and thelink 355 between theJapan cloud gateway 135 are indicated as being low latency links. Conversely, thelink 345 between theCalifornia cloud gateway 130 and theJapan datacenter 120 and thelink 350 between theLA branch office 110 and theJapan cloud gateway 135 are indicated as being high latency links. Thus, the first route from theLA office 110 to theJapan datacenter 120 through theCalifornia cloud gateway 130 includes a low latency first connection to the cloud gateway and a high latency second connection for the last mile connectivity from thecloud gateway 130 to thedatacenter 120, while the second route from theLA office 110 to theJapan datacenter 120 through theJapan cloud gateway 135 includes a high latency first connection to thecloud gateway 135 and a low latency second connection for the last mile connectivity from thecloud gateway 135 to theJapan datacenter 120. - In some embodiments, the SaaS application at the
Japan datacenter 120 has low latency requirements, and theJapan cloud gateway 135 is the more optimal cloud gateway compared to theCalifornia cloud gateway 130 based on the connection between theJapan cloud gateway 135 and theJapan datacenter 120 having low latency, while the connection between theCalifornia cloud gateway 130 andJapan datacenter 120 has high latency. In some embodiments, the connection between theJapan cloud gateway 135 and theJapan datacenter 120 has lower latency than the connection between theCalifornia cloud gateway 130 and theJapan datacenter 120 based on the shorter distance between theJapan cloud gateway 135 andJapan datacenter 120. -
FIG. 4 conceptually illustrates a block diagram of a workflow of some embodiments for a branch office to identify a cloud gateway from a set of cloud gateways based on latency scores associated with using each cloud gateway in the set. As illustrated, the diagram 400 includes anLA branch office 410, aJapan datacenter 420 that hosts a SaaS application server, acloud gateway 430 located in California, acloud gateway 435 located in Japan, aDNS server 440, and location-basedcontext 445. - The diagram 400 will be further described below by reference to
FIG. 5 , which conceptually illustrates aprocess 500 for identifying a cloud gateway for forwarding data messages to a SaaS application server, in some embodiments. Theprocess 500 is performed in some embodiments by an edge router for a branch office of an enterprise network. Theprocess 500 starts when the edge router queries (at 510) a DNS server for a cloud gateway for forwarding data messages to a SaaS application server. Like the diagram 400, the SaaS application server of some embodiments is located in a datacenter that is geographically distant from the branch office trying to reach the SaaS application server. The edge router at thebranch office 410 sends a request for a cloud gateway (at the encircled 1) to theDNS server 440. - In some embodiments, prior to requesting the cloud gateway, the edge router first requests a network address and location information for the SaaS application server. The
DNS server 440 of some embodiments obtains location information for the SaaS application server at the resolved network address from the location-basedcontext 445, and provides both the network address and location information to the edge router at thebranch office 410 in response to the request. - The
process 500 receives (at 520) an identifier for a cloud gateway from the DNS server. For instance, thebranch office 410 receives (at the encircled 2) an identifier for theJapan cloud gateway 435. In some embodiments, prior to requesting and receiving the cloud identifier, the edge router is assigned a default cloud gateway for use in forwarding data messages to third-party SaaS application servers, and thus already has an identifier for at least one other cloud gateway. In other embodiments, the DNS server responds to the edge router's request by providing two or more identifiers to the edge router for the edge router to select from. - The
process 500 sends (at 530) a request for a latency score associated with a connection between the cloud gateway and SaaS application server to the cloud gateway. The SaaS application server of some embodiments is associated with a low latency requirement, and thus the edge router of some such embodiments sends a request to the cloud gateway for a latency score to determine whether the latency score meets the low latency requirement. In the diagram 400, for instance, the LA branch office 410 (i.e., an edge router at the branch office) sends requests for latency scores (at the encircled 3) to the California and Japan cloud gateways 430-435. - In some embodiments, the cloud gateways compute latency scores by sending probe packets to the SaaS application server and collecting latency measurements using the probe packets. For example, the California and Japan cloud gateways 430-435 are each shown (at the encircled 4) performing probes for latency measurements between the cloud gateways 430-435 and the
Japan datacenter 420 that hosts the SaaS application server. The probe packets, in some embodiments, include L4 and L7 probe packets. - The
process 500 then receives (at 540) a latency score from the cloud gateway, such as the latency scores received (at the encircled 5) at theLA branch office 410 in the diagram 400, and determines (at 550) whether the latency score meets the low latency requirement associated with the SaaS application server. In some embodiments, the distance between a cloud gateway and the destination SaaS application server affects latency such that a cloud gateway that is farther from the SaaS application server has a higher latency than a cloud gateway that is closer to the SaaS application server. When the latency score from the cloud gateway does not meet the low latency requirement (e.g., is higher than a specified latency threshold), theprocess 500 returns to 510 to query the DNS server for a cloud gateway. In some embodiments, the edge router uses or continues to use a default cloud gateway to forward data messages to the SaaS application server while awaiting the next cloud gateway from the DNS server. - When the latency score does meet the low latency requirement (e.g., is lower than a specified latency threshold), the
process 500 transitions to use (at 560) an optimized SD-WAN connection to the cloud gateway to forward data messages for the cloud gateway to send to the SaaS application server. Following 560, theprocess 500 ends. - In some embodiments, rather than obtaining a cloud gateway (i.e., identifier for a cloud gateway) from the DNS server, the edge router instead requests the cloud gateway from a controller for the enterprise network (e.g., a VeloCloud® Orchestrator (VCO)).
FIG. 6 conceptually illustrates a block diagram 600 of some embodiments in which a branch office obtains cloud gateway information from a controller for use in forwarding data messages to a SaaS application server. - The
controller 650, in some embodiments, manages business policies for the SD-WAN. Thecontroller 650 is hosted by a cloud, in some embodiments, and on-premises in other embodiments. In some embodiments, new business policies may be created (e.g., network preferred DNS) that may trigger different actions, such as configuring or choosing a business policy for a tenant to be implemented by edge routers at the edges of the tenant networks. For example, an edge router of some embodiments may receive a policy specified for a SaaS application, and the edge router then configures a rule to match the business policy. The edge router of some such embodiments may send data messages to each cloud gateway assigned to the edge router to instruct the cloud gateways to perform L4 and/or L7 probes to the SaaS application to collect latency measurements. In other embodiments, thecontroller 650 directs the cloud gateways to perform these probes and provides the results to the edge router. As mentioned above, the edge router of some embodiments already has latency data from the edge router to each cloud gateway based on DMPO, and also either stores, or obtains, proximity location information for each cloud gateway. - As shown, rather than an edge router at the
branch office 610 requesting latency scores from the cloud gateways 630-635, thecontroller 650 collects latency measurements from the California and Japan cloud gateways 630-635. In some embodiments, thecontroller 650 collects latency measurements periodically to ensure that each edge router is using the most optimal cloud gateway for forwarding data messages to destinations outside of the enterprise network, such as the third-party SaaS application server at theJapan datacenter 620. For instance, if a particular cloud gateway's updated latency score increases, thecontroller 650 of some embodiments may cause an edge router assigned to that cloud gateway to automatically switch to a different cloud gateway that is associated with a lower latency score. - In some embodiments, the
controller 650 may assign a default cloud gateway to an edge router for reaching third-party sites within a first region, and assign a secondary cloud gateway to the edge router for reaching third-party sites within a second region. For example, thecontroller 650 of some embodiments may assign theCalifornia cloud gateway 630 as a default cloud gateway to an edge router at theLA branch office 610 for use in reaching third-party sites in California and surrounding states, and subsequently assign theJapan cloud gateway 635 as a secondary cloud gateway for use in reaching at least theJapan datacenter 620. The edge router of some such embodiments may automatically switch between the different cloud gateways based on the destination network addresses of data messages being forwarded. -
FIG. 6 will be further described below by reference toFIG. 7 , which conceptually illustrates aprocess 700 of some embodiments for obtaining a cloud gateway from a controller for use in forwarding data messages to a SaaS application server. Theprocess 700 is performed in some embodiments by an edge router at a branch office (e.g., LA branch office 610). Theprocess 700 starts when the edge router queries (at 710) a controller for a cloud gateway for forwarding data messages to a SaaS application server. - In some embodiments, for example, after the edge router receives a destination network address and location information for a SaaS application, the edge router may use the received destination network address to query the controller for a cloud gateway to use to reach the SaaS application. In the diagram 600, the
LA branch office 610, for example, receives a destination IP for the Japan SaaS application from the DNS server 640 (at the encircled 1), and then receives a cloud gateway identifier and location and latency data for the cloud gateway from the controller 650 (at the encircled 2). - The
process 700 receives (at 720) an identifier for a cloud gateway from the controller. In some embodiments, the edge router is assigned a set of cloud gateways by the controller for use in forwarding data messages to entities outside of the enterprise network, and queries the controller for an identifier corresponding to a cloud gateway from the set that is most optimal for reaching the destination IP associated with the SaaS application. As also described above, the controller of some embodiments determines the most optimal cloud gateway for use by an edge router based on latency scores associated with connections between the cloud gateways and the destination. - For example, in the diagram 600, both available routes from the
LA branch office 610 to theJapan datacenter 620 include a high latency connection and a low latency connection. However, the low latency connection for the route that uses theJapan cloud gateway 635 is the unmanaged last mile connection (i.e., unoptimized connection) to theJapan datacenter 620, whereas the low latency connection for the route that uses theCalifornia cloud gateway 630 is the managed connection (i.e., optimized connection) from theLA branch office 610 to theCalifornia cloud gateway 630. While the route through theCalifornia cloud gateway 630 may be identified as the best route (e.g., in a routing table of the edge router based on proximity to the LA branch office 610), theJapan cloud gateway 635 may be identified by thecontroller 650 as the most optimal cloud gateway based on the low latency associated with the unmanaged, unoptimized connection between theJapan cloud gateway 635 andJapan datacenter 620. - The
process 700 uses (at 730) an optimized SD-WAN connection to the cloud gateway to forward data messages for the cloud gateway to send to the SaaS application server. TheLA branch office 610, for instance, is illustrated (at the encircled 3) as forwarding data messages to theJapan datacenter 620 via theJapan cloud gateway 635. Following 730, theprocess 700 ends. -
FIG. 8 illustrates an example of a standard SD-WAN environment 800 in which some embodiments of the invention are implemented. The SD-WAN 800 is created in some embodiments for a particular entity using SD-WAN forwarding elements (FEs) deployed at branch sites, datacenters, and public clouds. Examples of public clouds are public clouds provided by Amazon Web Services (AWS), Google Cloud Platform (GCP), Microsoft Azure, etc., while examples of entities include a company (e.g., corporation, partnership, etc.), an organization (e.g., a school, a non-profit, a government entity, etc.), etc. - In the SD-
WAN 800, the SD-WAN FEs include cloud gateway 805 (e.g., cloud gateway router) and SD- 830, 832, 834, 836. The cloud gateway (CGW) in some embodiments is an FE that is in a private orWAN FEs public datacenter 810. TheCGW 805 in some embodiments has secure connection links (e.g., tunnels) with edge FEs (e.g., SD- 830, 832, 834, and 836) at the particular entity's multi-machine sites (e.g., SD-WAN edge FEs 820, 822, and 824), such as multi-user compute sites (e.g., branch offices or other physical locations having multi user computers and other user-operated devices and serving as source computers and devices for requests to other machines at other sites), datacenters (e.g., locations housing servers), etc. These multi-machine sites are often at different physical locations (e.g., different buildings, different cities, different states, etc.).WAN edge sites - Four multi-machine sites 820-826 are illustrated in the SD-
WAN 800, with three of them being branch sites 820-824, and one being adatacenter 826. Each branch site is shown to include a 830, 832, and 834 (e.g., edge routers) andrespective edge FE 850, 852, and 854. The resources 850-854, in some embodiments, are machines located at the branch sites 820-824. Therespective resources datacenter site 826 is shown to include a hub FE 836 (e.g., a hub router), anddatacenter resources 856. The datacenter SD-WAN FE 836 is referred to as a hub FE because in some embodiments this FE can be used to connect to other edge FEs of the branch sites 820-824. The hub FE in some embodiments uses or has one or more service engines to perform services (e.g., middlebox services) on packets that it forwards from one branch site to another branch site. The hub FE also provides access to thedatacenter resources 856. - Each edge FE (e.g., SD-WAN edge FEs 830-834) exchanges packets with one or
more cloud gateways 805 through one or more connection links 815 (e.g., multiple connection links available at the edge FE). In some embodiments, these connection links include secure and unsecure connection links, while in other embodiments they only include secure connection links. As shown byedge FE 834 andgateway 805, multiple secure connection links (e.g., multiple secure tunnels that are established over multiple physical links) can be established between one edge FE and a gateway. - When multiple such links are defined between an edge FE and a gateway, each secure connection link in some embodiments is associated with a different physical network link between the edge FE and an external network. For instance, to access external networks, an edge FE in some embodiments has one or more commercial broadband Internet links (e.g., a cable modem, a fiber optic link) to access the Internet, an MPLS (multiprotocol label switching) link to access external networks through an MPLS provider's network, a wireless cellular link (e.g., a 5G LTE network), etc. In some embodiments, the different physical links between the
edge FE 834 and thecloud gateway 805 are the same type of links (e.g., are different MPLS links). - In some embodiments, one edge FE 830-834 can also have multiple direct links 815 (e.g., secure connection links established through multiple physical links) to another edge FE 830-834, and/or to a
datacenter hub FE 836. Again, the different links in some embodiments can use different types of physical links or the same type of physical links. Also, in some embodiments, a first edge FE of a first branch site can connect to a second edge FE of a second branch site (1) directly through one ormore links 815, (2) through a cloud gateway or datacenter hub to which the first edge FE connects through two ormore links 815, or (3) through another edge FE of another branch site that can augment its role to that of a hub FE. Hence, in some embodiments, a first edge FE (e.g., 834) of a first branch site (e.g., 824) can use multiple SD-WAN links 815 to reach a second edge FE (e.g., 830) of a second branch site (e.g., 820), or ahub FE 836 of adatacenter site 826. - The
cloud gateway 805 in some embodiments is used to connect two SD-WAN FEs 830-836 through at least twosecure connection links 815 between thegateway 805 and the two FEs at the two SD-WAN sites (e.g., branch sites 820-824 or datacenter site 826). In some embodiments, thecloud gateway 805 also provides network data from one multi-machine site to another multi-machine site (e.g., provides the accessible subnets of one site to another site). Like thecloud gateway 805, thehub FE 836 of thedatacenter 826 in some embodiments can be used to connect two SD-WAN FEs 830-834 of two branch sites through at least twosecure connection links 815 between thehub 836 and the two FEs at the two branch sites 820-824. - In some embodiments, each secure connection link between two SD-WAN FEs (i.e.,
CGW 805 and edge FEs 830-836) is formed as a VPN tunnel between the two FEs. In this example, the collection of the SD-WAN FEs (e.g., FEs 830-836 and gateways 805) and thesecure connections 815 between the FEs forms the SD-WAN 800 for the particular entity that spans at least the public orprivate cloud datacenter 810 to connect the branch and datacenter sites 820-826. - In some embodiments, secure connection links are defined between gateways in different public cloud datacenters to allow paths through the virtual network to traverse from one public cloud datacenter to another, while no such links are defined in other embodiments. Also, in some embodiments, the
gateway 805 is a multi-tenant gateway that is used to define other virtual networks for other entities (e.g., other companies, organizations, etc.). Some such embodiments use tenant identifiers to create tunnels between a gateway and edge FE of a particular entity, and then use tunnel identifiers of the created tunnels to allow the gateway to differentiate packet flows that it receives from edge FEs of one entity from packet flows that it receives along other tunnels of other entities. In other embodiments, gateways are single-tenant and are specifically deployed to be used by just one entity. - The SD-
WAN 800 includes a cluster ofcontrollers 840 that serve as a central point for managing (e.g., defining and modifying) configuration data that is provided to the edge FEs and/or gateways to configure some or all of the operations. In some embodiments, thiscontroller cluster 840 is in one or more public cloud datacenters, while in other embodiments it is in one or more private datacenters. In some embodiments, thecontroller cluster 840 has a set of manager servers that define and modify the configuration data, and a set of controller servers that distribute the configuration data to the edge FEs, hubs and/or gateways. In some embodiments, thecontroller cluster 840 directs edge FEs and hubs to use certain gateways (i.e., assigns a gateway to the edge FEs and hubs). In some embodiments, some or all of the controller cluster's functionality is performed by a cloud gateway (e.g., cloud gateway 805). Thecontroller cluster 840 also provides next hop forwarding rules and load balancing criteria in some embodiments. - Many of the above-described features and applications are implemented as software processes that are specified as a set of instructions recorded on a computer-readable storage medium (also referred to as computer-readable medium). When these instructions are executed by one or more processing unit(s) (e.g., one or more processors, cores of processors, or other processing units), they cause the processing unit(s) to perform the actions indicated in the instructions. Examples of computer-readable media include, but are not limited to, CD-ROMs, flash drives, RAM chips, hard drives, EPROMs, etc. The computer-readable media does not include carrier waves and electronic signals passing wirelessly or over wired connections.
- In this specification, the term “software” is meant to include firmware residing in read-only memory or applications stored in magnetic storage, which can be read into memory for processing by a processor. Also, in some embodiments, multiple software inventions can be implemented as sub-parts of a larger program while remaining distinct software inventions. In some embodiments, multiple software inventions can also be implemented as separate programs. Finally, any combination of separate programs that together implement a software invention described here is within the scope of the invention. In some embodiments, the software programs, when installed to operate on one or more electronic systems, define one or more specific machine implementations that execute and perform the operations of the software programs.
-
FIG. 9 conceptually illustrates acomputer system 900 with which some embodiments of the invention are implemented. Thecomputer system 900 can be used to implement any of the above-described hosts, controllers, gateway, and edge forwarding elements. As such, it can be used to execute any of the above described processes. Thiscomputer system 900 includes various types of non-transitory machine-readable media and interfaces for various other types of machine-readable media.Computer system 900 includes abus 905, processing unit(s) 910, asystem memory 925, a read-only memory 930, apermanent storage device 935,input devices 940, andoutput devices 945. - The
bus 905 collectively represents all system, peripheral, and chipset buses that communicatively connect the numerous internal devices of thecomputer system 900. For instance, thebus 905 communicatively connects the processing unit(s) 910 with the read-only memory 930, thesystem memory 925, and thepermanent storage device 935. - From these various memory units, the processing unit(s) 910 retrieve instructions to execute and data to process in order to execute the processes of the invention. The processing unit(s) 910 may be a single processor or a multi-core processor in different embodiments. The read-only-memory (ROM) 930 stores static data and instructions that are needed by the processing unit(s) 910 and other modules of the
computer system 900. Thepermanent storage device 935, on the other hand, is a read-and-write memory device. Thisdevice 935 is a non-volatile memory unit that stores instructions and data even when thecomputer system 900 is off. Some embodiments of the invention use a mass-storage device (such as a magnetic or optical disk and its corresponding disk drive) as thepermanent storage device 935. - Other embodiments use a removable storage device (such as a floppy disk, flash drive, etc.) as the permanent storage device. Like the
permanent storage device 935, thesystem memory 925 is a read-and-write memory device. However, unlikestorage device 935, thesystem memory 925 is a volatile read-and-write memory, such as random access memory. Thesystem memory 925 stores some of the instructions and data that the processor needs at runtime. In some embodiments, the invention's processes are stored in thesystem memory 925, thepermanent storage device 935, and/or the read-only memory 930. From these various memory units, the processing unit(s) 910 retrieve instructions to execute and data to process in order to execute the processes of some embodiments. - The
bus 905 also connects to the input and 940 and 945. Theoutput devices input devices 940 enable the user to communicate information and select commands to thecomputer system 900. Theinput devices 940 include alphanumeric keyboards and pointing devices (also called “cursor control devices”). Theoutput devices 945 display images generated by thecomputer system 900. Theoutput devices 945 include printers and display devices, such as cathode ray tubes (CRT) or liquid crystal displays (LCD). Some embodiments include devices such as touchscreens that function as both input and 940 and 945.output devices - Finally, as shown in
FIG. 9 ,bus 905 also couplescomputer system 900 to anetwork 965 through a network adapter (not shown). In this manner, thecomputer 900 can be a part of a network of computers (such as a local area network (“LAN”), a wide area network (“WAN”), or an Intranet), or a network of networks (such as the Internet). Any or all components ofcomputer system 900 may be used in conjunction with the invention. - Some embodiments include electronic components, such as microprocessors, storage and memory that store computer program instructions in a machine-readable or computer-readable medium (alternatively referred to as computer-readable storage media, machine-readable media, or machine-readable storage media). Some examples of such computer-readable media include RAM, ROM, read-only compact discs (CD-ROM), recordable compact discs (CD-R), rewritable compact discs (CD-RW), read-only digital versatile discs (e.g., DVD-ROM, dual-layer DVD-ROM), a variety of recordable/rewritable DVDs (e.g., DVD-RAM, DVD-RW, DVD+RW, etc.), flash memory (e.g., SD cards, mini-SD cards, micro-SD cards, etc.), magnetic and/or solid state hard drives, read-only and recordable Blu-Ray® discs, ultra-density optical discs, any other optical or magnetic media, and floppy disks. The computer-readable media may store a computer program that is executable by at least one processing unit and includes sets of instructions for performing various operations. Examples of computer programs or computer code include machine code, such as is produced by a compiler, and files including higher-level code that are executed by a computer, an electronic component, or a microprocessor using an interpreter.
- While the above discussion primarily refers to microprocessor or multi-core processors that execute software, some embodiments are performed by one or more integrated circuits, such as application-specific integrated circuits (ASICs) or field-programmable gate arrays (FPGAs). In some embodiments, such integrated circuits execute instructions that are stored on the circuit itself.
- As used in this specification, the terms “computer”, “server”, “processor”, and “memory” all refer to electronic or other technological devices. These terms exclude people or groups of people. For the purposes of the specification, the terms “display” or “displaying” mean displaying on an electronic device. As used in this specification, the terms “computer-readable medium,” “computer-readable media,” and “machine-readable medium” are entirely restricted to tangible, physical objects that store information in a form that is readable by a computer. These terms exclude any wireless signals, wired download signals, and any other ephemeral or transitory signals.
- While the invention has been described with reference to numerous specific details, one of ordinary skill in the art will recognize that the invention can be embodied in other specific forms without departing from the spirit of the invention. In addition, a number of the figures (including
FIGS. 2, 5, and 7 ) conceptually illustrate processes. The specific operations of these processes may not be performed in the exact order shown and described. The specific operations may not be performed in one continuous series of operations, and different specific operations may be performed in different embodiments. Furthermore, the process could be implemented using several sub-processes, or as part of a larger macro process. Thus, one of ordinary skill in the art would understand that the invention is not to be limited by the foregoing illustrative details, but rather is to be defined by the appended claims.
Claims (23)
Applications Claiming Priority (4)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| IN202241040923 | 2022-07-18 | ||
| IN202241040923 | 2022-07-18 | ||
| IN202241040926 | 2022-07-18 | ||
| IN202241040926 | 2022-07-18 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| US20240022626A1 true US20240022626A1 (en) | 2024-01-18 |
Family
ID=89509436
Family Applications (2)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US18/211,578 Active US12166661B2 (en) | 2022-07-18 | 2023-06-19 | DNS-based GSLB-aware SD-WAN for low latency SaaS applications |
| US18/211,576 Abandoned US20240022626A1 (en) | 2022-07-18 | 2023-06-19 | Dns-based gslb-aware sd-wan for low latency saas applications |
Family Applications Before (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US18/211,578 Active US12166661B2 (en) | 2022-07-18 | 2023-06-19 | DNS-based GSLB-aware SD-WAN for low latency SaaS applications |
Country Status (1)
| Country | Link |
|---|---|
| US (2) | US12166661B2 (en) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN118282866A (en) * | 2024-06-03 | 2024-07-02 | 中宇联云计算服务(上海)有限公司 | Multi-tenant isolation deployment method, system, equipment and medium based on container cluster |
| CN119853862A (en) * | 2024-12-05 | 2025-04-18 | 天翼云科技有限公司 | Forward error correction system and method |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN118337871B (en) * | 2024-06-17 | 2024-08-30 | 北京火山引擎科技有限公司 | Application access control method, device, equipment, storage medium and program product |
Family Cites Families (855)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5652751A (en) | 1996-03-26 | 1997-07-29 | Hazeltine Corporation | Architecture for mobile radio networks with dynamically changing topology using virtual subnets |
| JP2964957B2 (en) | 1996-08-15 | 1999-10-18 | 日本電気株式会社 | High-speed routing control method |
| US5909553A (en) | 1997-02-19 | 1999-06-01 | International Business Machines Corporation | Systems and methods for controlling the transmission of relatively large data objects in a communications system |
| US6157648A (en) | 1997-03-06 | 2000-12-05 | Bell Atlantic Network Services, Inc. | Network session management |
| US20080055241A1 (en) | 1998-03-26 | 2008-03-06 | Immersion Corporation | Systems and Methods for Haptic Feedback Effects for Control Knobs |
| US6154465A (en) | 1998-10-06 | 2000-11-28 | Vertical Networks, Inc. | Systems and methods for multiple mode voice and data communications using intelligenty bridged TDM and packet buses and methods for performing telephony and data functions using the same |
| JP2002525913A (en) | 1998-09-11 | 2002-08-13 | シェアウェーブ・インコーポレーテッド | Method and apparatus for controlling communication in a computer network |
| US6445682B1 (en) | 1998-10-06 | 2002-09-03 | Vertical Networks, Inc. | Systems and methods for multiple mode voice and data communications using intelligently bridged TDM and packet buses and methods for performing telephony and data functions using the same |
| US6363378B1 (en) | 1998-10-13 | 2002-03-26 | Oracle Corporation | Ranking of query feedback terms in an information retrieval system |
| US6578083B2 (en) | 1999-02-05 | 2003-06-10 | Pluris, Inc. | Method for monitoring data flow at a node on a network facilitating data transfer on at least one link having at least one class of service |
| US6930983B2 (en) | 2000-03-15 | 2005-08-16 | Texas Instruments Incorporated | Integrated circuits, systems, apparatus, packets and processes utilizing path diversity for media over packet applications |
| US6744775B1 (en) | 1999-09-27 | 2004-06-01 | Nortel Networks Limited | State information and routing table updates in large scale data networks |
| EP2375643B1 (en) | 2000-06-16 | 2015-02-18 | Fujitsu Limited | Communication device having VPN accomodation function |
| US20020087716A1 (en) | 2000-07-25 | 2002-07-04 | Shakeel Mustafa | System and method for transmitting customized multi priority services on a single or multiple links over data link layer frames |
| US7003481B2 (en) | 2000-08-25 | 2006-02-21 | Flatrock Ii, Inc. | Method and apparatus for providing network dependent application services |
| US7320017B1 (en) | 2000-09-06 | 2008-01-15 | Cisco Technology, Inc. | Media gateway adapter |
| US9525696B2 (en) | 2000-09-25 | 2016-12-20 | Blue Coat Systems, Inc. | Systems and methods for processing data flows |
| US6876988B2 (en) | 2000-10-23 | 2005-04-05 | Netuitive, Inc. | Enhanced computer performance forecasting system |
| US6976087B1 (en) | 2000-11-24 | 2005-12-13 | Redback Networks Inc. | Service provisioning methods and apparatus |
| US7333512B2 (en) | 2000-12-18 | 2008-02-19 | Rmi Corporation | Dynamic mixing TDM data with data packets |
| US7519048B2 (en) | 2000-12-28 | 2009-04-14 | Nec Corporation | Communication system and packet switching method thereof |
| US7536715B2 (en) | 2001-05-25 | 2009-05-19 | Secure Computing Corporation | Distributed firewall system and method |
| JP3737385B2 (en) | 2001-06-07 | 2006-01-18 | 富士通株式会社 | Optimization path setting method and network management system using the same |
| JP3621987B2 (en) | 2001-09-07 | 2005-02-23 | 独立行政法人情報通信研究機構 | Seamless integrated network system for wireless systems |
| US20030061269A1 (en) | 2001-09-17 | 2003-03-27 | Flow Engines, Inc. | Data flow engine |
| US20030112808A1 (en) | 2001-12-13 | 2003-06-19 | Net Reality Ltd | Automatic configuration of IP tunnels |
| DE60140471D1 (en) | 2001-12-13 | 2009-12-24 | Sony Deutschland Gmbh | Adaptive service quality reservation with prior resource allocation for mobile systems |
| AU2003217640A1 (en) | 2002-02-22 | 2003-09-09 | The Trustees Of The University Of Pennsylvania | System and method for distributing traffic in a network |
| JP2003258854A (en) | 2002-02-27 | 2003-09-12 | Toshiba Corp | Router device and Internet service provider selection method |
| US7751409B1 (en) | 2002-03-20 | 2010-07-06 | Oracle America, Inc. | Logical service domains for enabling network mobility |
| US7289456B2 (en) | 2002-04-08 | 2007-10-30 | Telcordia Technologies, Inc. | Determining and provisioning paths within a network of communication elements |
| US7280476B2 (en) | 2002-06-04 | 2007-10-09 | Lucent Technologies Inc. | Traffic control at a network node |
| EP1514191B1 (en) | 2002-06-19 | 2009-09-16 | Telefonaktiebolaget L M Ericsson | A network device driver architecture |
| US7086061B1 (en) | 2002-08-01 | 2006-08-01 | Foundry Networks, Inc. | Statistical tracking of global server load balancing for selecting the best network address from ordered list of network addresses based on a set of performance metrics |
| US8656050B2 (en) | 2002-09-24 | 2014-02-18 | Alcatel Lucent | Methods and systems for efficiently configuring IP-based, virtual private networks |
| US7440573B2 (en) | 2002-10-08 | 2008-10-21 | Broadcom Corporation | Enterprise wireless local area network switching system |
| US8154581B2 (en) | 2002-10-15 | 2012-04-10 | Revolutionary Concepts, Inc. | Audio-video communication system for receiving person at entrance |
| US7606156B2 (en) | 2003-10-14 | 2009-10-20 | Delangis Eric M | Residential communications gateway (RCG) for broadband communications over a plurality of standard POTS lines, with dynamic allocation of said bandwidth, that requires no additional equipment or modifications to the associated class 5 offices or the PSTN at large |
| US7386605B2 (en) | 2002-11-05 | 2008-06-10 | Enterasys Networks, Inc. | Methods and apparatus for automated edge device configuration in a heterogeneous network |
| EP1570604A4 (en) | 2002-12-13 | 2008-05-07 | Internap Network Services Corp | ROUTE CONTROL IN ACCORDANCE WITH TOPOLOGY |
| US7397795B2 (en) | 2003-02-24 | 2008-07-08 | Intel California | Method and system for label-based packet forwarding among multiple forwarding elements |
| JP4354201B2 (en) | 2003-03-18 | 2009-10-28 | 富士通株式会社 | Unauthorized access countermeasure system and unauthorized access countermeasure processing program |
| US7452278B2 (en) | 2003-05-09 | 2008-11-18 | Microsoft Corporation | Web access to secure data |
| US7373660B1 (en) | 2003-08-26 | 2008-05-13 | Cisco Technology, Inc. | Methods and apparatus to distribute policy information |
| US7313629B1 (en) | 2003-11-06 | 2007-12-25 | Sprint Communications Company L.P. | Method for altering link weights in a communication network within network parameters to provide traffic information for improved forecasting |
| US7903555B2 (en) | 2003-12-17 | 2011-03-08 | Intel Corporation | Packet tracing |
| JP4398263B2 (en) | 2004-01-13 | 2010-01-13 | 富士通株式会社 | Route design method |
| US7246256B2 (en) | 2004-01-20 | 2007-07-17 | International Business Machines Corporation | Managing failover of J2EE compliant middleware in a high availability system |
| US20050159166A1 (en) | 2004-01-21 | 2005-07-21 | Telefonaktiebolaget Lm Ericsson (Publ) | Quality of service controlled link adaptation |
| US8145785B1 (en) | 2004-02-13 | 2012-03-27 | Habanero Holdings, Inc. | Unused resource recognition in real time for provisioning and management of fabric-backplane enterprise servers |
| US7376122B2 (en) | 2004-02-23 | 2008-05-20 | Microsoft Corporation | System and method for link quality source routing |
| US7428214B2 (en) | 2004-03-04 | 2008-09-23 | Cisco Technology, Inc. | Methods and devices for high network availability |
| US7496661B1 (en) | 2004-03-29 | 2009-02-24 | Packeteer, Inc. | Adaptive, application-aware selection of differentiated network services |
| US7957266B2 (en) | 2004-05-28 | 2011-06-07 | Alcatel-Lucent Usa Inc. | Efficient and robust routing independent of traffic pattern variability |
| US7561534B2 (en) | 2004-06-30 | 2009-07-14 | Alcatel-Lucent Usa Inc. | Methods of network routing having improved resistance to faults affecting groups of links subject to common risks |
| US7684374B2 (en) | 2004-07-28 | 2010-03-23 | Broadcom Corporation | Handling of multimedia call sessions and attachments using multi-network simulcasting |
| US8572234B2 (en) | 2004-11-30 | 2013-10-29 | Hewlett-Packard Development, L.P. | MPLS VPN fault management using IGP monitoring system |
| US7936762B2 (en) | 2004-12-09 | 2011-05-03 | The Boeing Company | QOS provisioning in a network having dynamic link states |
| US8250214B2 (en) | 2004-12-20 | 2012-08-21 | Vmware, Inc. | System, method and computer program product for communicating with a private network |
| US8954595B2 (en) | 2004-12-30 | 2015-02-10 | Citrix Systems, Inc. | Systems and methods for providing client-side accelerated access to remote applications via TCP buffering |
| EP1832068A2 (en) | 2004-12-31 | 2007-09-12 | British Telecommunications Public Limited Company | Connection-oriented communications scheme for connection-less communications traffic |
| EP1679835A1 (en) | 2005-01-07 | 2006-07-12 | Koninklijke KPN N.V. | Method, device and system for predicting a data session time |
| US7395277B2 (en) | 2005-01-25 | 2008-07-01 | International Business Machines Corporation | Content framework method |
| US20060171365A1 (en) | 2005-02-02 | 2006-08-03 | Utstarcom, Inc. | Method and apparatus for L2TP dialout and tunnel switching |
| US9306831B2 (en) | 2005-02-14 | 2016-04-05 | Cisco Technology, Inc. | Technique for efficient load balancing of TE-LSPs |
| US7710865B2 (en) | 2005-02-25 | 2010-05-04 | Cisco Technology, Inc. | Disaster recovery for active-standby data center using route health and BGP |
| US7609619B2 (en) | 2005-02-25 | 2009-10-27 | Cisco Technology, Inc. | Active-active data center using RHI, BGP, and IGP anycast for disaster recovery and load distribution |
| US7701851B2 (en) | 2005-07-20 | 2010-04-20 | Vidyo, Inc. | System and method for the control of the transmission rate in packet-based digital communications |
| US7945678B1 (en) | 2005-08-05 | 2011-05-17 | F5 Networks, Inc. | Link load balancer that controls a path for a client to connect to a resource |
| CN1909501A (en) | 2005-08-05 | 2007-02-07 | 华为技术有限公司 | Method for end to end service rapid convergence and route device |
| US7426626B2 (en) | 2005-08-23 | 2008-09-16 | Qualcomm Incorporated | TLB lock indicator |
| US7920572B2 (en) | 2005-09-20 | 2011-04-05 | Cisco Technology, Inc. | Modifying operation of peer-to-peer networks based on integrating network routing information |
| US8259566B2 (en) | 2005-09-20 | 2012-09-04 | Qualcomm Incorporated | Adaptive quality of service policy for dynamic networks |
| US7401198B2 (en) | 2005-10-06 | 2008-07-15 | Netapp | Maximizing storage system throughput by measuring system performance metrics |
| US20070091794A1 (en) | 2005-10-20 | 2007-04-26 | Clarence Filsfils | Method of constructing a backup path in an autonomous system |
| US20070115812A1 (en) | 2005-11-22 | 2007-05-24 | Silver Peak Systems, Inc. | Sequence numbers for multiple quality of service levels |
| US7693047B2 (en) | 2005-11-28 | 2010-04-06 | Cisco Technology, Inc. | System and method for PE-node protection |
| US20070162639A1 (en) | 2005-11-30 | 2007-07-12 | Chu Hsiao-Keng J | TCP-offload-engine based zero-copy sockets |
| US7673042B2 (en) | 2005-12-06 | 2010-03-02 | Shunra Software, Ltd. | System and method for comparing service levels to a service level objective |
| US8141156B1 (en) | 2005-12-28 | 2012-03-20 | At&T Intellectual Property Ii, L.P. | Method and apparatus for mitigating routing misbehavior in a network |
| US7581022B1 (en) | 2005-12-29 | 2009-08-25 | At&T Corp. | Method for tunable inter domain egress selection |
| EP1977571A2 (en) | 2006-01-12 | 2008-10-08 | Broadcom Israel R&D | Method and system for protocol offload and direct i/o with i/o sharing in a virtualized network environment |
| US7633956B1 (en) | 2006-01-19 | 2009-12-15 | Cisco Technology, Inc. | System and method for providing support for multipoint L2VPN services in devices without local bridging |
| US9015299B1 (en) | 2006-01-20 | 2015-04-21 | Cisco Technology, Inc. | Link grouping for route optimization |
| US7680925B2 (en) | 2006-01-24 | 2010-03-16 | Cisco Technology, Inc. | Method and system for testing provisioned services in a network |
| US7633882B2 (en) | 2006-02-02 | 2009-12-15 | Eaton Corporation | Ad-hoc network and method employing globally optimized routes for packets |
| US20150003240A1 (en) | 2006-02-21 | 2015-01-01 | Rockstar Consortium Us Lp | Adaptive call routing in ip networks |
| US7873025B2 (en) | 2006-02-23 | 2011-01-18 | Cisco Technology, Inc. | Network device that determines application-level network latency by monitoring option values in a transport layer message |
| US7729257B2 (en) | 2006-03-30 | 2010-06-01 | Alcatel-Lucent Usa Inc. | Method and apparatus for link transmission scheduling for handling traffic variation in wireless mesh networks |
| US7865615B2 (en) | 2006-05-08 | 2011-01-04 | Cisco Technology, Inc. | Maintaining IGP transparency of VPN routes when BGP is used as a PE-CE protocol |
| US7953020B2 (en) | 2006-05-22 | 2011-05-31 | At&T Intellectual Property Ii, L.P. | Method for implementing and reporting one-way network measurements |
| US8488447B2 (en) | 2006-06-30 | 2013-07-16 | Centurylink Intellectual Property Llc | System and method for adjusting code speed in a transmission path during call set-up due to reduced transmission performance |
| DE102006032832A1 (en) | 2006-07-14 | 2008-01-17 | Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e.V. | Network system and method for controlling distributed memory |
| US7639609B2 (en) | 2006-07-18 | 2009-12-29 | Opnet Technologies, Inc. | Controlled incremental multi-protocol label switching (MPLS) traffic engineering |
| US8566452B1 (en) | 2006-08-03 | 2013-10-22 | F5 Networks, Inc. | Intelligent HTTP based load-balancing, persistence, and application traffic management of SSL VPN tunnels |
| US7907595B2 (en) | 2006-09-29 | 2011-03-15 | Avaya, Inc. | Method and apparatus for learning endpoint addresses of IPSec VPN tunnels |
| KR100817798B1 (en) | 2006-10-20 | 2008-03-31 | 한국정보보호진흥원 | Estimation of Available Network Link Bandwidth Using Timestamp Function of Internet Control Message Protocol |
| US7885180B2 (en) | 2006-12-15 | 2011-02-08 | Check Point Software Technologies Inc. | Address resolution request mirroring |
| US7830804B2 (en) | 2007-01-17 | 2010-11-09 | Sierra Wireless, Inc. | Quality of service application programming interface over socket |
| US8027347B2 (en) | 2007-01-17 | 2011-09-27 | Nortel Networks Limited | Border gateway protocol extended community attribute for layer-2 and layer-3 virtual private networks using 802.1ah-based tunnels |
| CN100484037C (en) | 2007-03-14 | 2009-04-29 | 华为技术有限公司 | Device tracking system, device and method |
| US8205246B2 (en) | 2007-05-10 | 2012-06-19 | Cisco Technology, Inc. | User sensitive filtering of network application layer resources |
| US8111692B2 (en) | 2007-05-31 | 2012-02-07 | Embarq Holdings Company Llc | System and method for modifying network traffic |
| WO2008156782A2 (en) | 2007-06-19 | 2008-12-24 | Sand Holdings, Llc | Devices and methods for automatic reset of monitored network network equipment |
| US8094659B1 (en) | 2007-07-09 | 2012-01-10 | Marvell Israel (M.I.S.L) Ltd. | Policy-based virtual routing and forwarding (VRF) assignment |
| US7974264B2 (en) | 2007-07-13 | 2011-07-05 | Michael Rothschild | Method and a system for determining the spatial location of nodes in a wireless network |
| US9300598B2 (en) | 2007-10-03 | 2016-03-29 | Virtela Technology Services Incorporated | Virtualized application acceleration infrastructure |
| US8560634B2 (en) | 2007-10-17 | 2013-10-15 | Dispersive Networks, Inc. | Apparatus, systems and methods utilizing dispersive networking |
| EP2223254A4 (en) | 2007-11-05 | 2011-11-02 | Intelli Check Mobilisa Inc | Dynamic access control in response to flexible rules |
| US8667095B2 (en) | 2007-11-09 | 2014-03-04 | Cisco Technology, Inc. | Local auto-configuration of network devices connected to multipoint virtual connections |
| US8503334B2 (en) | 2007-12-14 | 2013-08-06 | Level 3 Communications, Llc | System and method for providing network services over shared virtual private network (VPN) |
| US9130968B2 (en) | 2008-01-16 | 2015-09-08 | Netapp, Inc. | Clustered cache appliance system and methodology |
| GB2458154B (en) | 2008-03-07 | 2012-06-27 | Hewlett Packard Development Co | Routing across a virtual network |
| US8681709B2 (en) | 2008-03-27 | 2014-03-25 | At&T Mobility Ii Llc | Dynamic allocation of communications resources |
| US8281377B1 (en) | 2008-04-15 | 2012-10-02 | Desktone, Inc. | Remote access manager for virtual computing services |
| US8964548B1 (en) | 2008-04-17 | 2015-02-24 | Narus, Inc. | System and method for determining network application signatures using flow payloads |
| US8395989B2 (en) | 2008-04-23 | 2013-03-12 | Verizon Patent And Licensing Inc. | Method and system for network backbone analysis |
| US8001413B2 (en) | 2008-05-05 | 2011-08-16 | Microsoft Corporation | Managing cluster split-brain in datacenter service site failover |
| US8160063B2 (en) | 2008-06-09 | 2012-04-17 | Microsoft Corporation | Data center interconnect and traffic engineering |
| US8125907B2 (en) | 2008-06-12 | 2012-02-28 | Talari Networks Incorporated | Flow-based adaptive private network with multiple WAN-paths |
| US7962458B2 (en) | 2008-06-12 | 2011-06-14 | Gravic, Inc. | Method for replicating explicit locks in a data replication engine |
| US9717021B2 (en) | 2008-07-03 | 2017-07-25 | Silver Peak Systems, Inc. | Virtual network overlay |
| US8098663B2 (en) | 2008-07-08 | 2012-01-17 | Cisco Technology, Inc. | Carrier's carrier without customer-edge-to-customer-edge border gateway protocol |
| US8243589B1 (en) | 2008-08-14 | 2012-08-14 | United Services Automobile Association (Usaa) | Systems and methods for data center load balancing |
| JP5074327B2 (en) | 2008-08-21 | 2012-11-14 | 株式会社日立製作所 | Routing system |
| US9715401B2 (en) | 2008-09-15 | 2017-07-25 | International Business Machines Corporation | Securing live migration of a virtual machine from a secure virtualized computing environment, over an unsecured network, to a different virtualized computing environment |
| US7974219B2 (en) | 2008-09-26 | 2011-07-05 | Hewlett-Packard Development Company, L.P. | Network troubleshooting using path topology |
| US8006129B2 (en) | 2008-10-03 | 2011-08-23 | Cisco Technology, Inc. | Detecting and preventing the split-brain condition in redundant processing units |
| US9270595B2 (en) | 2008-10-10 | 2016-02-23 | Hewlett Packard Enterprise Development Lp | Method and system for controlling a delay of packet processing using loop paths |
| US7978612B2 (en) | 2008-10-13 | 2011-07-12 | Cisco Technology, Inc. | Two-hop relay for reducing distance vector routing information |
| US8116225B2 (en) | 2008-10-31 | 2012-02-14 | Venturi Wireless | Method and apparatus for estimating channel bandwidth |
| US9929964B2 (en) | 2008-11-12 | 2018-03-27 | Teloip Inc. | System, apparatus and method for providing aggregation of connections with a secure and trusted virtual network overlay |
| US8155158B2 (en) | 2008-11-12 | 2012-04-10 | Patricio Humberto Saavedra | System, apparatus and method for providing aggregated network connections |
| US20100128600A1 (en) | 2008-11-26 | 2010-05-27 | A T & T Intellectual Property I, L.P. | Automated Network Fault Analysis |
| US8442043B2 (en) | 2008-12-29 | 2013-05-14 | Cisco Technology, Inc. | Service selection mechanism in service insertion architecture data plane |
| US20110299544A1 (en) | 2010-06-04 | 2011-12-08 | David Lundgren | Method and system for managing bandwidth by a broadband gateway |
| US8893009B2 (en) | 2009-01-28 | 2014-11-18 | Headwater Partners I Llc | End user device that secures an association of application to service policy with an application certificate check |
| US10057775B2 (en) | 2009-01-28 | 2018-08-21 | Headwater Research Llc | Virtualized policy and charging system |
| US8289997B2 (en) | 2009-02-02 | 2012-10-16 | Novara Technology, LLC | Bandwidth sharing in a distributed wireless client application using inverse multiplexing termination |
| US7961599B2 (en) | 2009-03-03 | 2011-06-14 | Alcatel Lucent | Pseudowire tunnel redundancy |
| US8094575B1 (en) | 2009-03-24 | 2012-01-10 | Juniper Networks, Inc. | Routing protocol extension for network acceleration service-aware path selection within computer networks |
| JP5391777B2 (en) | 2009-03-30 | 2014-01-15 | 日本電気株式会社 | Route selection method, route selection system, and router used therefor |
| US8582502B2 (en) | 2009-06-04 | 2013-11-12 | Empire Technology Development Llc | Robust multipath routing |
| US8199753B2 (en) | 2009-06-05 | 2012-06-12 | Juniper Networks, Inc. | Forwarding frames in a computer network using shortest path bridging |
| US9069727B2 (en) | 2011-08-12 | 2015-06-30 | Talari Networks Incorporated | Adaptive private network with geographically redundant network control nodes |
| US10200251B2 (en) | 2009-06-11 | 2019-02-05 | Talari Networks, Inc. | Methods and apparatus for accessing selectable application processing of data packets in an adaptive private network |
| US9210065B2 (en) | 2009-06-22 | 2015-12-08 | Alcatel Lucent | Providing cloud-based services using dynamic network virtualization |
| US8489744B2 (en) | 2009-06-29 | 2013-07-16 | Red Hat Israel, Ltd. | Selecting a host from a host cluster for live migration of a virtual machine |
| US8885667B2 (en) | 2009-07-10 | 2014-11-11 | Time Warner Cable Enterprises Llc | Destination based methodology for managing network resources |
| JP5398410B2 (en) | 2009-08-10 | 2014-01-29 | アラクサラネットワークス株式会社 | Network system, packet transfer apparatus, packet transfer method, and computer program |
| US8744807B2 (en) | 2009-08-10 | 2014-06-03 | Siemens Aktiengesellschaft | Scalable and extensible framework for storing and analyzing sensor data |
| US8346808B2 (en) | 2009-08-12 | 2013-01-01 | Westell Technologies, Inc. | System and method of accessing resources in a computer network |
| US8787380B2 (en) | 2009-08-20 | 2014-07-22 | Nec Europe Ltd. | Method for controlling the traffic within a network structure and a network structure |
| CN102025591B (en) | 2009-09-18 | 2013-12-18 | 中兴通讯股份有限公司 | Method and system for implementing virtual private network |
| US8619779B2 (en) | 2009-09-30 | 2013-12-31 | Alcatel Lucent | Scalable architecture for enterprise extension in a cloud topology |
| CN102035814B (en) | 2009-09-30 | 2014-08-27 | 瞻博网络公司 | Method and device for guaranteeing service quality by VPN (Virtual Private Network) IPSEC (Internet Protocol Security) tunnel |
| US20120287818A1 (en) | 2009-10-13 | 2012-11-15 | Telefonaktiebolaget L M Ericsson (Publ) | Multipoint-to-multipoint service for a communications network |
| US8332684B2 (en) | 2009-11-09 | 2012-12-11 | Middlecamp William J | Timer bounded arbitration protocol for resource control |
| US8488491B2 (en) | 2009-11-12 | 2013-07-16 | Cisco Technology, Inc. | Compressed virtual routing and forwarding in a communications network |
| JP5392049B2 (en) | 2009-12-11 | 2014-01-22 | 富士通株式会社 | Route control method, communication system, and communication apparatus |
| US8422379B2 (en) | 2009-12-15 | 2013-04-16 | At&T Intellectual Property I, Lp | Method of simple and efficient failure resilient load balancing |
| US20110153909A1 (en) | 2009-12-22 | 2011-06-23 | Yao Zu Dong | Efficient Nested Virtualization |
| US8224971B1 (en) | 2009-12-28 | 2012-07-17 | Amazon Technologies, Inc. | Using virtual networking devices and routing information to initiate external actions |
| US8452932B2 (en) | 2010-01-06 | 2013-05-28 | Storsimple, Inc. | System and method for efficiently creating off-site data volume back-ups |
| WO2011103293A2 (en) | 2010-02-17 | 2011-08-25 | Rubenstein, Allen | Content and application delivery network aggregation |
| CN102783089B (en) | 2010-03-10 | 2017-06-06 | 瑞典爱立信有限公司 | Method for estimating the available bandwidth of subpath |
| WO2011120000A2 (en) | 2010-03-26 | 2011-09-29 | Citrix Systems, Inc. | Systems and methods for link load balancing on a multi-core device |
| US8665722B2 (en) | 2010-03-29 | 2014-03-04 | Ted Szymanski | Method to achieve bounded buffer sizes and quality of service guarantees in the internet network |
| US8885457B2 (en) | 2010-04-15 | 2014-11-11 | Vonage Network, Llc | Systems and methods of improving the quality of VOIP communications |
| US9300576B2 (en) | 2010-05-03 | 2016-03-29 | Pluribus Networks Inc. | Methods, systems, and fabrics implementing a distributed network operating system |
| US8724456B1 (en) | 2010-05-19 | 2014-05-13 | Juniper Networks, Inc. | Network path selection for multi-homed edges to ensure end-to-end resiliency |
| US8799504B2 (en) | 2010-07-02 | 2014-08-05 | Netgear, Inc. | System and method of TCP tunneling |
| US8705530B2 (en) | 2010-07-29 | 2014-04-22 | At&T Intellectual Property I, L.P. | Methods and apparatus to implement multipoint and replicated communication paths using upstream and recursive downstream label mappings |
| EP2601757B1 (en) | 2010-08-05 | 2017-10-04 | Thomson Licensing | Method and apparatus for converting a multicast session to a unicast session |
| US9323561B2 (en) | 2010-08-13 | 2016-04-26 | International Business Machines Corporation | Calibrating cloud computing environments |
| KR101478475B1 (en) | 2010-09-09 | 2014-12-31 | 닛본 덴끼 가부시끼가이샤 | Computer system and communication method in computer system |
| WO2012038722A1 (en) | 2010-09-24 | 2012-03-29 | Bae Systems Plc | Admission control in a self aware network |
| US8547835B2 (en) | 2010-10-21 | 2013-10-01 | Telefonaktiebolaget L M Ericsson (Publ) | Controlling IP flows to bypass a packet data network gateway using multi-path transmission control protocol connections |
| US8589558B2 (en) | 2010-11-29 | 2013-11-19 | Radware, Ltd. | Method and system for efficient deployment of web applications in a multi-datacenter system |
| JP5750167B2 (en) | 2010-12-07 | 2015-07-15 | エンパイア テクノロジー ディベロップメント エルエルシー | Audio fingerprint difference for measuring quality of experience between devices |
| US8385225B1 (en) | 2010-12-14 | 2013-02-26 | Google Inc. | Estimating round trip time of a network path |
| US9031059B2 (en) | 2010-12-17 | 2015-05-12 | Verizon Patent And Licensing Inc. | Fixed mobile convergence and voice call continuity using a mobile device/docking station |
| EP2656523A1 (en) | 2010-12-21 | 2013-10-30 | Telefonaktiebolaget LM Ericsson (PUBL) | Method and apparatus for providing temporal context for recommending content for consumption by a user device |
| US8806482B1 (en) | 2011-01-06 | 2014-08-12 | Amazon Technologies, Inc. | Interaction with a virtual network |
| US9009217B1 (en) | 2011-01-06 | 2015-04-14 | Amazon Technologies, Inc. | Interaction with a virtual network |
| US9135037B1 (en) | 2011-01-13 | 2015-09-15 | Google Inc. | Virtual network protocol |
| US10637782B2 (en) | 2011-03-23 | 2020-04-28 | Hughes Network Systems, Llc | System and method for policy-based multipath WAN transports for improved quality of service over broadband networks |
| US8462780B2 (en) | 2011-03-30 | 2013-06-11 | Amazon Technologies, Inc. | Offload device-based stateless packet processing |
| US8774213B2 (en) | 2011-03-30 | 2014-07-08 | Amazon Technologies, Inc. | Frameworks and interfaces for offload device-based packet processing |
| US8661295B1 (en) | 2011-03-31 | 2014-02-25 | Amazon Technologies, Inc. | Monitoring and detecting causes of failures of network paths |
| US20120266026A1 (en) | 2011-04-18 | 2012-10-18 | Ramya Malanai Chikkalingaiah | Detecting and diagnosing misbehaving applications in virtualized computing systems |
| US9253252B2 (en) | 2011-05-06 | 2016-02-02 | Citrix Systems, Inc. | Systems and methods for cloud bridging between intranet resources and cloud resources |
| US8848640B2 (en) | 2011-05-06 | 2014-09-30 | Interdigital Patent Holdings, Inc. | Method and apparatus for bandwidth aggregation for IP flow |
| US9054999B2 (en) | 2012-05-09 | 2015-06-09 | International Business Machines Corporation | Static TRILL routing |
| US8873398B2 (en) | 2011-05-23 | 2014-10-28 | Telefonaktiebolaget L M Ericsson (Publ) | Implementing EPC in a cloud computer with openflow data plane |
| US9154327B1 (en) | 2011-05-27 | 2015-10-06 | Cisco Technology, Inc. | User-configured on-demand virtual layer-2 network for infrastructure-as-a-service (IaaS) on a hybrid cloud network |
| JP5672154B2 (en) | 2011-05-31 | 2015-02-18 | 株式会社バッファロー | Network system, gateway device, route determination method, program, and storage medium |
| WO2012167184A2 (en) | 2011-06-02 | 2012-12-06 | Interdigital Patent Holdings, Inc. | Methods, apparatus, and systems for managing converged gateway communications |
| CN103563329B (en) | 2011-06-07 | 2017-04-12 | 慧与发展有限责任合伙企业 | Scalable multi-tenant network architecture for virtualized datacenters |
| US20120317270A1 (en) | 2011-06-10 | 2012-12-13 | Alcatel-Lucent Usa Inc. | Intelligent presence cost management based upon congestion status and subscriber profile |
| US20120331160A1 (en) | 2011-06-22 | 2012-12-27 | Telefonaktiebolaget L M Ericsson (Publ) | Multi-path transmission control protocol proxy service |
| US8804745B1 (en) | 2011-06-27 | 2014-08-12 | Amazon Technologies, Inc. | Virtualization mapping |
| US8661287B2 (en) | 2011-06-30 | 2014-02-25 | Rackspace Us, Inc. | Automatically performing failover operations with a load balancer |
| US9100305B2 (en) | 2011-07-12 | 2015-08-04 | Cisco Technology, Inc. | Efficient admission control for low power and lossy networks |
| AU2012296329B2 (en) | 2011-08-17 | 2015-08-27 | Nicira, Inc. | Logical L3 routing |
| EP3407547B1 (en) | 2011-08-17 | 2020-01-22 | Nicira, Inc. | Hierarchical controller clusters for interconnecting different logical domains |
| CN103069757B (en) | 2011-08-17 | 2015-07-22 | 华为技术有限公司 | Packet reassembly and resequence method, apparatus and system |
| US8630291B2 (en) | 2011-08-22 | 2014-01-14 | Cisco Technology, Inc. | Dynamic multi-path forwarding for shared-media communication networks |
| CA2750345C (en) | 2011-08-24 | 2013-06-18 | Guest Tek Interactive Entertainment Ltd. | Method of allocating bandwidth between zones according to user load and bandwidth management system thereof |
| US10044678B2 (en) | 2011-08-31 | 2018-08-07 | At&T Intellectual Property I, L.P. | Methods and apparatus to configure virtual private mobile networks with virtual private networks |
| US8797874B2 (en) | 2011-09-09 | 2014-08-05 | Futurewei Technologies, Inc. | Apparatus and system for packet routing and forwarding in an interior network |
| US8811212B2 (en) | 2012-02-22 | 2014-08-19 | Telefonaktiebolaget L M Ericsson (Publ) | Controller placement for fast failover in the split architecture |
| CN102377630A (en) | 2011-10-13 | 2012-03-14 | 华为技术有限公司 | Traffic engineering tunnel-based virtual private network implementation method and traffic engineering tunnel-based virtual private network implementation system |
| US9923826B2 (en) | 2011-10-14 | 2018-03-20 | Citrix Systems, Inc. | Systems and methods for dynamic adaptation of network accelerators |
| US9300548B2 (en) | 2011-10-14 | 2016-03-29 | Alcatel Lucent | Providing dynamic reliability and security in communications environments |
| US20130103834A1 (en) | 2011-10-21 | 2013-04-25 | Blue Coat Systems, Inc. | Multi-Tenant NATting for Segregating Traffic Through a Cloud Service |
| US8700683B2 (en) | 2011-10-24 | 2014-04-15 | Nokia Corporation | Method and apparatus for providing a key-value based storage interface |
| US8745177B1 (en) | 2011-11-01 | 2014-06-03 | Edgecast Networks, Inc. | End-to-end monitoring and optimization of a content delivery network using anycast routing |
| KR20130050156A (en) | 2011-11-07 | 2013-05-15 | 한국전자통신연구원 | Apparatus for translating virtual address space |
| CN103095543B (en) | 2011-11-07 | 2016-10-05 | 华为技术有限公司 | The method and apparatus of VPN (virtual private network) docking between territory |
| US8769089B2 (en) | 2011-11-15 | 2014-07-01 | International Business Machines Corporation | Distributed application using diagnostic heartbeating |
| US8756453B2 (en) | 2011-11-15 | 2014-06-17 | International Business Machines Corporation | Communication system with diagnostic capabilities |
| US8874974B2 (en) | 2011-11-15 | 2014-10-28 | International Business Machines Corporation | Synchronizing a distributed communication system using diagnostic heartbeating |
| US20130142201A1 (en) | 2011-12-02 | 2013-06-06 | Microsoft Corporation | Connecting on-premise networks with public clouds |
| CN103166824B (en) | 2011-12-13 | 2016-09-28 | 华为技术有限公司 | A kind of interconnected method, device and system |
| US9411655B2 (en) | 2011-12-30 | 2016-08-09 | Dell Products, Lp | System and method for detection and deployment of virtualization capable assets in a managed datacenter |
| CN102413061B (en) | 2011-12-31 | 2015-04-15 | 杭州华三通信技术有限公司 | Message transmission method and equipment |
| US8855071B1 (en) | 2012-01-04 | 2014-10-07 | Juniper Networks, Inc. | Handling errors in subscriber session management within mobile networks |
| US20130185729A1 (en) | 2012-01-13 | 2013-07-18 | Rutgers, The State University Of New Jersey | Accelerating resource allocation in virtualized environments using workload classes and/or workload signatures |
| US8908698B2 (en) | 2012-01-13 | 2014-12-09 | Cisco Technology, Inc. | System and method for managing site-to-site VPNs of a cloud managed network |
| US9106555B2 (en) | 2012-01-25 | 2015-08-11 | Cisco Technology, Inc. | Troubleshooting routing topology based on a reference topology |
| US8660129B1 (en) | 2012-02-02 | 2014-02-25 | Cisco Technology, Inc. | Fully distributed routing over a user-configured on-demand virtual network for infrastructure-as-a-service (IaaS) on hybrid cloud networks |
| EP2817926B1 (en) | 2012-02-24 | 2020-02-12 | Huawei Technologies Co., Ltd. | Delegate forwarding and address resolution in fragmented network |
| US20130223226A1 (en) | 2012-02-29 | 2013-08-29 | Dell Products, Lp | System and Method for Providing a Split Data Plane in a Flow-Based Switching Device |
| US20130238782A1 (en) | 2012-03-09 | 2013-09-12 | Alcatel-Lucent Usa Inc. | Method and apparatus for identifying an application associated with an ip flow using dns data |
| US8730793B2 (en) | 2012-03-16 | 2014-05-20 | Avaya Inc. | Method and apparatus providing network redundancy and high availability to remote network nodes |
| US8892936B2 (en) | 2012-03-20 | 2014-11-18 | Symantec Corporation | Cluster wide consistent detection of interconnect failures |
| US8885562B2 (en) | 2012-03-28 | 2014-11-11 | Telefonaktiebolaget L M Ericsson (Publ) | Inter-chassis redundancy with coordinated traffic direction |
| US8730806B2 (en) | 2012-04-03 | 2014-05-20 | Telefonaktiebolaget L M Ericsson (Publ) | Congestion control and resource allocation in split architecture networks |
| US8856339B2 (en) | 2012-04-04 | 2014-10-07 | Cisco Technology, Inc. | Automatically scaled network overlay with heuristic monitoring in a hybrid cloud environment |
| US8923149B2 (en) | 2012-04-09 | 2014-12-30 | Futurewei Technologies, Inc. | L3 gateway for VXLAN |
| US9996370B1 (en) | 2012-04-18 | 2018-06-12 | Open Invention Network Llc | Page swapping in virtual machine environment |
| US9203784B2 (en) | 2012-04-24 | 2015-12-01 | Cisco Technology, Inc. | Distributed virtual switch architecture for a hybrid cloud |
| US9071541B2 (en) | 2012-04-25 | 2015-06-30 | Juniper Networks, Inc. | Path weighted equal-cost multipath |
| US9389920B2 (en) | 2012-05-02 | 2016-07-12 | Futurewei Technologies, Inc. | Intelligent data center cluster selection |
| JP5991013B2 (en) | 2012-05-08 | 2016-09-14 | 富士通株式会社 | Base station and radio resource allocation method |
| US9379971B2 (en) | 2012-05-11 | 2016-06-28 | Simula Inovation AS | Method and apparatus for determining paths between source/destination pairs |
| US9602348B2 (en) | 2012-05-15 | 2017-03-21 | Telefonaktiebolaget Lm Ericsson | Methods and apparatus for detecting and handling split brain issues in a link aggregation group |
| CN103621046B (en) | 2012-05-22 | 2016-08-24 | 华为技术有限公司 | Network communication method and device |
| TWI482469B (en) | 2012-05-23 | 2015-04-21 | Gemtek Technology Co Ltd | Routing device |
| US10063443B2 (en) | 2012-05-29 | 2018-08-28 | Openet Telecom Ltd. | System and method for managing VoLTE session continuity information using logical scalable units |
| US9374270B2 (en) | 2012-06-06 | 2016-06-21 | Juniper Networks, Inc. | Multicast service in virtual networks |
| US9898317B2 (en) | 2012-06-06 | 2018-02-20 | Juniper Networks, Inc. | Physical path determination for virtual network packet flows |
| US9055006B2 (en) | 2012-06-11 | 2015-06-09 | Radware, Ltd. | Techniques for traffic diversion in software defined networks for mitigating denial of service attacks |
| US9729424B2 (en) | 2012-06-11 | 2017-08-08 | Futurewei Technologies, Inc. | Defining data flow paths in software-defined networks with application-layer traffic optimization |
| US10031782B2 (en) | 2012-06-26 | 2018-07-24 | Juniper Networks, Inc. | Distributed processing of network device tasks |
| US9100329B1 (en) | 2012-06-28 | 2015-08-04 | Juniper Networks, Inc. | Providing non-interrupt failover using a link aggregation mechanism |
| US9203764B2 (en) | 2012-07-11 | 2015-12-01 | Telefonaktiebolaget L M Ericsson (Publ) | Quality of experience enhancement through feedback for adjusting the quality of service in communication networks |
| US9819658B2 (en) | 2012-07-12 | 2017-11-14 | Unisys Corporation | Virtual gateways for isolating virtual machines |
| CN104094577B (en) | 2012-08-13 | 2017-07-04 | 统一有限责任两合公司 | Method and apparatus for indirectly assessing the state of an active entity |
| US9210079B2 (en) | 2012-08-14 | 2015-12-08 | Vmware, Inc. | Method and system for virtual and physical network integration |
| US9563480B2 (en) | 2012-08-21 | 2017-02-07 | Rackspace Us, Inc. | Multi-level cloud computing system |
| US9331940B2 (en) | 2012-08-28 | 2016-05-03 | Alcatel Lucent | System and method providing distributed virtual routing and switching (DVRS) |
| CN103227843B (en) | 2012-08-31 | 2016-05-04 | 杭州华三通信技术有限公司 | A kind of physical link address management method and device |
| CN103685026A (en) | 2012-08-31 | 2014-03-26 | 中兴通讯股份有限公司 | Virtual network access method and system |
| US9807613B2 (en) | 2012-09-06 | 2017-10-31 | Dell Products, Lp | Collaborative method and system to improve carrier network policies with context aware radio communication management |
| US9106548B2 (en) | 2012-09-11 | 2015-08-11 | Telefonaktiebolaget L M Ericsson (Publ) | Network fault localization |
| EP3720065A1 (en) | 2012-09-28 | 2020-10-07 | Cornell University | System and methods for improved network routing |
| CN103731407B (en) | 2012-10-12 | 2017-08-11 | 华为技术有限公司 | The method and system of IKE message negotiations |
| US9917865B2 (en) | 2012-10-16 | 2018-03-13 | Citrix Systems, Inc. | Systems and methods for bridging between public and private clouds through multilevel API integration |
| US20140112171A1 (en) | 2012-10-23 | 2014-04-24 | Mr. Babak PASDAR | Network system and method for improving routing capability |
| US9223635B2 (en) | 2012-10-28 | 2015-12-29 | Citrix Systems, Inc. | Network offering in cloud computing environment |
| US9497250B2 (en) | 2012-10-29 | 2016-11-15 | International Business Machines Corporation | Runtime grouping of tuples in a streaming application |
| US9930011B1 (en) | 2012-11-30 | 2018-03-27 | United Services Automobile Association (Usaa) | Private network request forwarding |
| ES2624219T3 (en) | 2012-12-03 | 2017-07-13 | Huawei Technologies Co., Ltd. | Policy processing method and network device |
| US9417922B2 (en) | 2012-12-03 | 2016-08-16 | Cutting Edge Consulting Associates, Inc. | Systems and methods for protecting an identity in network communications |
| US9185114B2 (en) | 2012-12-05 | 2015-11-10 | Symantec Corporation | Methods and systems for secure storage segmentation based on security context in a virtual environment |
| KR20140073243A (en) | 2012-12-06 | 2014-06-16 | 삼성전자주식회사 | Apparatus and method for processing http massage |
| US9338225B2 (en) | 2012-12-06 | 2016-05-10 | A10 Networks, Inc. | Forwarding policies on a virtual service network |
| US20140164718A1 (en) | 2012-12-07 | 2014-06-12 | Open Kernel Labs, Inc. | Methods and apparatus for sharing memory between multiple processes of a virtual machine |
| EP2929717A4 (en) | 2012-12-07 | 2016-07-20 | Hewlett Packard Entpr Dev Lp | Network resource management |
| US9055000B1 (en) | 2012-12-17 | 2015-06-09 | Juniper Networks, Inc. | Distributed network subnet |
| US9515899B2 (en) | 2012-12-19 | 2016-12-06 | Veritas Technologies Llc | Providing optimized quality of service to prioritized virtual machines and applications based on quality of shared resources |
| US9053058B2 (en) | 2012-12-20 | 2015-06-09 | Apple Inc. | QoS inband upgrade |
| US9563423B1 (en) | 2012-12-21 | 2017-02-07 | EMC IP Holding Company LLC | System and method for simultaneous shared access to data buffers by two threads, in a connection-oriented data proxy service |
| US9203748B2 (en) | 2012-12-24 | 2015-12-01 | Huawei Technologies Co., Ltd. | Software defined network-based data processing method, node, and system |
| US9680870B2 (en) | 2012-12-28 | 2017-06-13 | Verizon Patent And Licensing Inc. | Software-defined networking gateway |
| EP2944056B1 (en) | 2013-01-08 | 2019-11-27 | Telefonaktiebolaget LM Ericsson (publ) | Distributed traffic inspection in a telecommunications network |
| US9621460B2 (en) | 2013-01-14 | 2017-04-11 | Versa Networks, Inc. | Connecting multiple customer sites over a wide area network using an overlay network |
| JP6024474B2 (en) | 2013-01-23 | 2016-11-16 | 富士通株式会社 | Multi-tenant system, management apparatus, management program, and control method of multi-tenant system |
| EP2763362A1 (en) | 2013-01-31 | 2014-08-06 | Thomson Licensing | A method for connecting a multi-homed and MPTCP capable client with a regular TCP server |
| US9060025B2 (en) | 2013-02-05 | 2015-06-16 | Fortinet, Inc. | Cloud-based security policy configuration |
| CN103430498B (en) | 2013-02-06 | 2016-05-25 | 华为技术有限公司 | A kind of method, equipment and route system of transfer of data of network virtualization |
| US9225647B2 (en) | 2013-02-11 | 2015-12-29 | Vmware, Inc. | Distributed deep packet inspection |
| US20140229210A1 (en) | 2013-02-14 | 2014-08-14 | Futurewei Technologies, Inc. | System and Method for Network Resource Allocation Considering User Experience, Satisfaction and Operator Interest |
| JP5953421B2 (en) | 2013-02-25 | 2016-07-20 | 株式会社日立製作所 | Management method of tenant network configuration in virtual server and non-virtual server mixed environment |
| US10348767B1 (en) | 2013-02-26 | 2019-07-09 | Zentera Systems, Inc. | Cloud over IP session layer network |
| US9699034B2 (en) | 2013-02-26 | 2017-07-04 | Zentera Systems, Inc. | Secure cloud fabric to connect subnets in different network domains |
| US9525564B2 (en) | 2013-02-26 | 2016-12-20 | Zentera Systems, Inc. | Secure virtual network platform for enterprise hybrid cloud computing environments |
| US9065734B2 (en) | 2013-03-08 | 2015-06-23 | Telefonaktiebolaget L M Ericsson (Publ) | Network bandwidth allocation in multi-tenancy cloud computing networks |
| US9306949B1 (en) | 2013-03-12 | 2016-04-05 | Amazon Technologies, Inc. | Configure interconnections between networks hosted in datacenters |
| US20140269690A1 (en) | 2013-03-13 | 2014-09-18 | Qualcomm Incorporated | Network element with distributed flow tables |
| US20160020844A1 (en) | 2013-03-14 | 2016-01-21 | Google Inc. | Systems and methods for wireless backhaul transport |
| WO2014153237A1 (en) | 2013-03-14 | 2014-09-25 | Google Inc. | Optimizing packet/frame forwarding or routing in a wireless backhaul transport system |
| US9832205B2 (en) | 2013-03-15 | 2017-11-28 | International Business Machines Corporation | Cross provider security management functionality within a cloud service brokerage platform |
| US9354983B1 (en) | 2013-03-15 | 2016-05-31 | Entreda, Inc. | Integrated it service provisioning and management |
| US9628328B2 (en) | 2013-03-15 | 2017-04-18 | Rackspace Us, Inc. | Network controller with integrated resource management capability |
| US9075771B1 (en) | 2013-03-15 | 2015-07-07 | Symantec Corporation | Techniques for managing disaster recovery sites |
| US9483286B2 (en) | 2013-03-15 | 2016-11-01 | Avi Networks | Distributed network services |
| US9450817B1 (en) | 2013-03-15 | 2016-09-20 | Juniper Networks, Inc. | Software defined network controller |
| US8818892B1 (en) | 2013-03-15 | 2014-08-26 | Palantir Technologies, Inc. | Prioritizing data clusters with customizable scoring strategies |
| EP2976860B1 (en) | 2013-03-20 | 2018-08-01 | Wolting Holding B.V. | Compiler for and method for software defined networks |
| EP2784996A1 (en) | 2013-03-27 | 2014-10-01 | British Telecommunications public limited company | Deadline driven content delivery |
| JP5977706B2 (en) | 2013-03-29 | 2016-08-24 | 株式会社日立ソリューションズ | Data exchange system and method for setting environment that enables data exchange between virtual private clouds |
| US9432245B1 (en) | 2013-04-16 | 2016-08-30 | Amazon Technologies, Inc. | Distributed load balancer node architecture |
| US10021027B2 (en) | 2013-04-30 | 2018-07-10 | Comcast Cable Communications, Llc | Network validation with dynamic tunneling |
| US20140337674A1 (en) | 2013-05-10 | 2014-11-13 | Nec Laboratories America, Inc. | Network Testing |
| US20140355441A1 (en) | 2013-05-29 | 2014-12-04 | Ashok Kumar Jain | Method and apparatus of delivering assured services over unreliable internet infrastructure by using virtual overlay network architecture over a public cloud backbone |
| KR102059986B1 (en) | 2013-05-31 | 2020-02-11 | 텔레콤 이탈리아 소시에떼 퍼 아찌오니 | Performance measurement of a link of a packet-switched communication network |
| CN104219147B (en) | 2013-06-05 | 2018-10-16 | 中兴通讯股份有限公司 | The VPN of edge device realizes processing method and processing device |
| US9529692B2 (en) | 2013-06-07 | 2016-12-27 | Apple Inc. | Memory management tools |
| US9471356B2 (en) | 2013-06-12 | 2016-10-18 | Dell Products L.P. | Systems and methods for providing VLAN-independent gateways in a network virtualization overlay implementation |
| US9264289B2 (en) | 2013-06-27 | 2016-02-16 | Microsoft Technology Licensing, Llc | Endpoint data centers of different tenancy sets |
| US9648547B1 (en) | 2013-06-28 | 2017-05-09 | Google Inc. | Self-organizing topology management |
| US9608962B1 (en) | 2013-07-09 | 2017-03-28 | Pulse Secure, Llc | Application-aware connection for network access client |
| US10454714B2 (en) | 2013-07-10 | 2019-10-22 | Nicira, Inc. | Method and system of overlay flow control |
| US9722815B2 (en) | 2013-07-10 | 2017-08-01 | Sunil Mukundan | Edge-gateway multipath method and system |
| US10749711B2 (en) | 2013-07-10 | 2020-08-18 | Nicira, Inc. | Network-link method useful for a last-mile connectivity in an edge-gateway multipath system |
| US9344349B2 (en) | 2013-07-12 | 2016-05-17 | Nicira, Inc. | Tracing network packets by a cluster of network controllers |
| US10003536B2 (en) | 2013-07-25 | 2018-06-19 | Grigore Raileanu | System and method for managing bandwidth usage rates in a packet-switched network |
| US9979622B2 (en) | 2013-07-30 | 2018-05-22 | Cisco Technology, Inc. | Elastic WAN optimization cloud services |
| US9203781B2 (en) | 2013-08-07 | 2015-12-01 | Cisco Technology, Inc. | Extending virtual station interface discovery protocol (VDP) and VDP-like protocols for dual-homed deployments in data center environments |
| US9311140B2 (en) | 2013-08-13 | 2016-04-12 | Vmware, Inc. | Method and apparatus for extending local area networks between clouds and migrating virtual machines using static network addresses |
| US9641551B1 (en) | 2013-08-13 | 2017-05-02 | vIPtela Inc. | System and method for traversing a NAT device with IPSEC AH authentication |
| US9338223B2 (en) | 2013-08-14 | 2016-05-10 | Verizon Patent And Licensing Inc. | Private cloud topology management system |
| CN103703724B (en) | 2013-08-15 | 2015-06-10 | 华为技术有限公司 | A method of distributing resources |
| US9559951B1 (en) | 2013-08-29 | 2017-01-31 | Cisco Technology, Inc. | Providing intra-subnet and inter-subnet data center connectivity |
| US9875355B1 (en) | 2013-09-17 | 2018-01-23 | Amazon Technologies, Inc. | DNS query analysis for detection of malicious software |
| CN105745886B (en) | 2013-09-23 | 2019-06-04 | 迈克菲有限公司 | Fast path is provided between the two entities |
| US20150089628A1 (en) | 2013-09-24 | 2015-03-26 | Michael Lang | System and Method for Provision of a Router / Firewall in a Network |
| US20150088942A1 (en) | 2013-09-25 | 2015-03-26 | Westell Technologies, Inc. | Methods and Systems for Providing File Services |
| US9379981B1 (en) | 2013-09-27 | 2016-06-28 | Google Inc. | Flow level dynamic load balancing |
| US9461969B2 (en) | 2013-10-01 | 2016-10-04 | Racemi, Inc. | Migration of complex applications within a hybrid cloud environment |
| US9635580B2 (en) | 2013-10-08 | 2017-04-25 | Alef Mobitech Inc. | Systems and methods for providing mobility aspects to applications in the cloud |
| US9628290B2 (en) | 2013-10-09 | 2017-04-18 | International Business Machines Corporation | Traffic migration acceleration for overlay virtual environments |
| WO2015051845A1 (en) | 2013-10-10 | 2015-04-16 | Telefonaktiebolaget L M Ericsson (Publ) | A pool of network gateways |
| US9465834B2 (en) | 2013-10-11 | 2016-10-11 | Vmware, Inc. | Methods and apparatus to manage virtual machines |
| US9608917B1 (en) | 2013-10-21 | 2017-03-28 | Google Inc. | Systems and methods for achieving high network link utilization |
| US9397946B1 (en) | 2013-11-05 | 2016-07-19 | Cisco Technology, Inc. | Forwarding to clusters of service nodes |
| JP2015095784A (en) | 2013-11-12 | 2015-05-18 | 富士通株式会社 | Information processing system, control method for information processing system, and control program for information processor |
| WO2015071888A1 (en) | 2013-11-18 | 2015-05-21 | Telefonaktiebolaget L M Ericsson (Publ) | Multi-tenant isolation in a cloud environment using software defined networking |
| DE102013113023A1 (en) | 2013-11-25 | 2015-05-28 | Reiner Kunz | Innovative surgical light for operating rooms, which is able to exchange data with other operating room equipment |
| US9231871B2 (en) | 2013-11-25 | 2016-01-05 | Versa Networks, Inc. | Flow distribution table for packet flow load balancing |
| US9813343B2 (en) | 2013-12-03 | 2017-11-07 | Akamai Technologies, Inc. | Virtual private network (VPN)-as-a-service with load-balanced tunnel endpoints |
| US9461923B2 (en) | 2013-12-06 | 2016-10-04 | Algoblu Holdings Limited | Performance-based routing in software-defined network (SDN) |
| TWI528755B (en) | 2013-12-06 | 2016-04-01 | 財團法人工業技術研究院 | A controller for delay measurement, a delay measurement system and a delay measurement method in sdn |
| US9288135B2 (en) | 2013-12-13 | 2016-03-15 | International Business Machines Corporation | Managing data flows in software-defined network using network interface card |
| US9467478B1 (en) | 2013-12-18 | 2016-10-11 | vIPtela Inc. | Overlay management protocol for secure routing based on an overlay network |
| US9612854B2 (en) | 2013-12-18 | 2017-04-04 | Telefonaktiebolaget Lm Ericsson (Publ) | System and method for virtualizing a remote device |
| US9363178B2 (en) | 2013-12-18 | 2016-06-07 | Telefonaktiebolaget L M Ericsson (Publ) | Method, apparatus, and system for supporting flexible lookup keys in software-defined networks |
| US20150189009A1 (en) | 2013-12-30 | 2015-07-02 | Alcatel-Lucent Canada Inc. | Distributed multi-level stateless load balancing |
| US9450852B1 (en) | 2014-01-03 | 2016-09-20 | Juniper Networks, Inc. | Systems and methods for preventing split-brain scenarios in high-availability clusters |
| US10097372B2 (en) | 2014-01-09 | 2018-10-09 | Ciena Corporation | Method for resource optimized network virtualization overlay transport in virtualized data center environments |
| JP6328432B2 (en) | 2014-01-16 | 2018-05-23 | クラリオン株式会社 | Gateway device, file server system, and file distribution method |
| US9436813B2 (en) | 2014-02-03 | 2016-09-06 | Ca, Inc. | Multi-tenancy support for a product that does not support multi-tenancy |
| US20150257081A1 (en) | 2014-02-04 | 2015-09-10 | Architecture Technology, Inc. | Hybrid autonomous network and router for communication between heterogeneous subnets |
| US9825822B1 (en) | 2014-02-13 | 2017-11-21 | Amazon Technologies, Inc. | Group networking in an overlay network |
| US20150236962A1 (en) | 2014-02-14 | 2015-08-20 | Exinda Networks PTY, Ltd. of Australia | Method and system for using dynamic bandwidth detection to drive quality of service control refinement |
| US8989199B1 (en) | 2014-02-24 | 2015-03-24 | Level 3 Communications, Llc | Control device discovery in networks having separate control and forwarding devices |
| US10454708B2 (en) | 2014-03-07 | 2019-10-22 | Nec Corporation | Network system, inter-site network cooperation control apparatus, network control method, and program |
| US9455960B2 (en) | 2014-03-14 | 2016-09-27 | Soha Systems, Inc. | Secure application delivery system with dynamic stitching of network connections in the cloud |
| US9479424B2 (en) | 2014-03-18 | 2016-10-25 | Telefonaktiebolaget Lm Ericsson (Publ) | Optimized approach to IS-IS LFA computation with parallel links |
| US10476698B2 (en) | 2014-03-20 | 2019-11-12 | Avago Technologies International Sales Pte. Limited | Redundent virtual link aggregation group |
| US9647883B2 (en) | 2014-03-21 | 2017-05-09 | Nicria, Inc. | Multiple levels of logical routers |
| US9401851B2 (en) | 2014-03-28 | 2016-07-26 | Verizon Patent And Licensing Inc. | Network management system |
| US9787559B1 (en) | 2014-03-28 | 2017-10-10 | Juniper Networks, Inc. | End-to-end monitoring of overlay networks providing virtualized network services |
| US10846257B2 (en) | 2014-04-01 | 2020-11-24 | Endance Technology Limited | Intelligent load balancing and high speed intelligent network recorders |
| US9807004B2 (en) | 2014-04-01 | 2017-10-31 | Google Inc. | System and method for software defined routing of traffic within and between autonomous systems with enhanced flow routing, scalability and security |
| US9226156B2 (en) | 2014-04-28 | 2015-12-29 | Stad.Io, Llc | Authenticated registration of participants for web access at live events |
| US9407541B2 (en) | 2014-04-24 | 2016-08-02 | International Business Machines Corporation | Propagating a flow policy by control packet in a software defined network (SDN) based network |
| US20150317169A1 (en) | 2014-05-04 | 2015-11-05 | Midfin Systems Inc. | Constructing and operating high-performance unified compute infrastructure across geo-distributed datacenters |
| US20150326426A1 (en) | 2014-05-12 | 2015-11-12 | Futurewei Technologies, Inc. | Partial software defined network switch replacement in ip networks |
| US9455922B2 (en) | 2014-05-19 | 2016-09-27 | Intel Corporation | Technologies for moderating packet ingress interrupt generation |
| WO2015180084A1 (en) | 2014-05-29 | 2015-12-03 | 华为技术有限公司 | Packet forwarding method and vxlan gateway |
| US9961545B2 (en) | 2014-06-03 | 2018-05-01 | Qualcomm Incorporated | Systems, methods, and apparatus for authentication during fast initial link setup |
| US11399063B2 (en) | 2014-06-04 | 2022-07-26 | Pure Storage, Inc. | Network authentication for a storage system |
| US9866487B2 (en) | 2014-06-05 | 2018-01-09 | KEMP Technologies Inc. | Adaptive load balancer and methods for intelligent data traffic steering |
| US9413659B2 (en) | 2014-06-11 | 2016-08-09 | Cisco Technology, Inc. | Distributed network address and port translation for migrating flows between service chains in a network environment |
| US10062045B2 (en) | 2014-06-12 | 2018-08-28 | International Business Machines Corporation | Project workspace prioritization |
| US9350710B2 (en) | 2014-06-20 | 2016-05-24 | Zscaler, Inc. | Intelligent, cloud-based global virtual private network systems and methods |
| US10019278B2 (en) | 2014-06-22 | 2018-07-10 | Cisco Technology, Inc. | Framework for network technology agnostic multi-cloud elastic extension and isolation |
| US10075329B2 (en) | 2014-06-25 | 2018-09-11 | A 10 Networks, Incorporated | Customizable high availability switchover control of application delivery controllers |
| KR102048743B1 (en) | 2014-06-30 | 2020-01-08 | 한국전자통신연구원 | SDN-based network monitoring virtualization system and method therefor |
| US9634936B2 (en) | 2014-06-30 | 2017-04-25 | Juniper Networks, Inc. | Service chaining across multiple networks |
| US9876723B2 (en) | 2014-12-21 | 2018-01-23 | Pismo Labs Technology Limited | Methods and systems for evaluating network performance of an aggregated connection |
| US20160019317A1 (en) | 2014-07-16 | 2016-01-21 | Commvault Systems, Inc. | Volume or virtual machine level backup and generating placeholders for virtual machine files |
| CN105323136B (en) | 2014-07-31 | 2020-01-10 | 中兴通讯股份有限公司 | Information processing method and device |
| US20160035183A1 (en) | 2014-07-31 | 2016-02-04 | Wms Gaming Inc. | Electronic gaming machine service bus |
| EP3175647B1 (en) | 2014-08-03 | 2018-12-12 | Hughes Network Systems, LLC | Centralized ground-based route determination and traffic engineering for software defined satellite communications networks |
| US10609159B2 (en) | 2014-08-04 | 2020-03-31 | Microsoft Technology Licensing, Llc | Providing higher workload resiliency in clustered systems based on health heuristics |
| US9356943B1 (en) | 2014-08-07 | 2016-05-31 | Symantec Corporation | Systems and methods for performing security analyses on network traffic in cloud-based environments |
| US9665432B2 (en) | 2014-08-07 | 2017-05-30 | Microsoft Technology Licensing, Llc | Safe data access following storage failure |
| EP3166275A4 (en) | 2014-08-11 | 2017-07-19 | Huawei Technologies Co., Ltd. | Packet control method, switch and controller |
| US10038629B2 (en) | 2014-09-11 | 2018-07-31 | Microsoft Technology Licensing, Llc | Virtual machine migration using label based underlay network forwarding |
| US9336040B2 (en) | 2014-09-15 | 2016-05-10 | Intel Corporation | Techniques for remapping sessions for a multi-threaded application |
| CN115277489B (en) | 2014-09-16 | 2024-03-08 | 帕洛阿尔托网络公司 | System, method and computer readable medium for monitoring and controlling network traffic |
| EP3198931B1 (en) | 2014-09-23 | 2020-10-21 | Nokia Solutions and Networks Oy | Transmitting data based on flow input from base station |
| US9935829B1 (en) | 2014-09-24 | 2018-04-03 | Amazon Technologies, Inc. | Scalable packet processing service |
| US10038601B1 (en) | 2014-09-26 | 2018-07-31 | Amazon Technologies, Inc. | Monitoring a multi-tier network fabric |
| US9723065B2 (en) | 2014-10-13 | 2017-08-01 | Vmware, Inc. | Cross-cloud object mapping for hybrid clouds |
| US9825905B2 (en) | 2014-10-13 | 2017-11-21 | Vmware Inc. | Central namespace controller for multi-tenant cloud environments |
| EP3207667B1 (en) | 2014-10-14 | 2021-09-29 | Sony Semiconductor Solutions Corporation | System and method for distributed flow state p2p setup in virtual networks |
| US20160164886A1 (en) | 2014-10-17 | 2016-06-09 | Computer Sciences Corporation | Systems and methods for threat analysis of computer data |
| WO2016071390A1 (en) | 2014-11-07 | 2016-05-12 | British Telecommunications Public Limited Company | Method and system for secure communication with shared cloud services |
| US9590902B2 (en) | 2014-11-10 | 2017-03-07 | Juniper Networks, Inc. | Signaling aliasing capability in data centers |
| KR102233645B1 (en) | 2014-11-11 | 2021-03-30 | 한국전자통신연구원 | System and method for virtual network-based distributed multi-domain routing |
| US9930013B2 (en) | 2014-11-14 | 2018-03-27 | Cisco Technology, Inc. | Control of out-of-band multipath connections |
| US9983936B2 (en) | 2014-11-20 | 2018-05-29 | Commvault Systems, Inc. | Virtual machine change block tracking |
| US10135956B2 (en) | 2014-11-20 | 2018-11-20 | Akamai Technologies, Inc. | Hardware-based packet forwarding for the transport layer |
| US9602544B2 (en) | 2014-12-05 | 2017-03-21 | Viasat, Inc. | Methods and apparatus for providing a secure overlay network between clouds |
| US9560018B2 (en) | 2014-12-08 | 2017-01-31 | Cisco Technology, Inc. | Autonomic locator/identifier separation protocol for secure hybrid cloud extension |
| US9692714B1 (en) | 2014-12-15 | 2017-06-27 | Juniper Networks, Inc. | Switching fabric topology based on traversing asymmetric routes |
| EP3238402B1 (en) | 2014-12-23 | 2019-11-27 | Telecom Italia S.p.A. | Method and client apparatus for dynamic rate adaptation of a stream of multimedia contents in a wireless communication network |
| CN107005532B (en) | 2014-12-23 | 2020-09-22 | 海南乐事科技发展有限公司 | System and method for offloading information transfer between a client and a server in a communication network |
| US9747249B2 (en) | 2014-12-29 | 2017-08-29 | Nicira, Inc. | Methods and systems to achieve multi-tenancy in RDMA over converged Ethernet |
| US20160192403A1 (en) | 2014-12-30 | 2016-06-30 | Qualcomm Incorporated | Mechanism to provide lte voice, internet and embms services over ethernet for connected home architecture |
| US9787573B2 (en) | 2014-12-31 | 2017-10-10 | Juniper Networks, Inc. | Fast convergence on link failure in multi-homed Ethernet virtual private networks |
| CN105812260B (en) | 2014-12-31 | 2019-03-19 | 华为技术有限公司 | A kind of method, apparatus and system that control mac address forwarding table is sent |
| US20160197835A1 (en) | 2015-01-02 | 2016-07-07 | Siegfried Luft | Architecture and method for virtualization of cloud networking components |
| US20160197834A1 (en) | 2015-01-02 | 2016-07-07 | Siegfried Luft | Architecture and method for traffic engineering between diverse cloud providers |
| US20160198003A1 (en) | 2015-01-02 | 2016-07-07 | Siegfried Luft | Architecture and method for sharing dedicated public cloud connectivity |
| US10257021B2 (en) | 2015-01-12 | 2019-04-09 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and apparatus for router maintenance |
| US10061664B2 (en) | 2015-01-15 | 2018-08-28 | Cisco Technology, Inc. | High availability and failover |
| US9722906B2 (en) | 2015-01-23 | 2017-08-01 | Cisco Technology, Inc. | Information reporting for anomaly detection |
| US9819565B2 (en) | 2015-01-26 | 2017-11-14 | Ciena Corporation | Dynamic policy engine for multi-layer network management |
| KR102029849B1 (en) | 2015-01-27 | 2019-10-08 | 노키아 솔루션스 앤드 네트웍스 오와이 | Traffic flow monitoring |
| CN107409079B (en) | 2015-01-28 | 2021-05-07 | 安博科技有限公司 | System and method for global virtual network |
| WO2016123314A1 (en) | 2015-01-28 | 2016-08-04 | Hewlett-Packard Development Company, L.P. | Data loop determination in a software-defined network |
| US10313428B2 (en) | 2015-02-07 | 2019-06-04 | Vmware, Inc. | Multi-subnet participation for network gateway in a cloud environment |
| CN104639639B (en) | 2015-02-09 | 2018-04-27 | 华为技术有限公司 | A kind of method of adjustment of deploying virtual machine position, apparatus and system |
| US9800507B2 (en) | 2015-02-10 | 2017-10-24 | Verizon Patent And Licensing Inc. | Application-based path computation |
| US20160255169A1 (en) | 2015-02-27 | 2016-09-01 | Futurewei Technologies, Inc. | Method and system for smart object eviction for proxy cache |
| US11121967B2 (en) | 2015-03-05 | 2021-09-14 | Algoblu Holdings Limited | Data routing across multiple autonomous network systems |
| US9628380B2 (en) | 2015-03-06 | 2017-04-18 | Telefonaktiebolaget L M Ericsson (Publ) | Method and system for routing a network function chain |
| US9729451B2 (en) | 2015-03-06 | 2017-08-08 | Juniper Networks, Inc. | Managing routing information in a hub-and-spokes network |
| US10491525B2 (en) | 2015-03-10 | 2019-11-26 | Huawei Technologies Co., Ltd. | Traffic engineering feeder for packet switched networks |
| US10614056B2 (en) | 2015-03-24 | 2020-04-07 | NetSuite Inc. | System and method for automated detection of incorrect data |
| EP4557697A3 (en) | 2015-04-07 | 2025-07-23 | Umbra Technologies Ltd. | Providing a global virtual network (gvn) |
| US10579406B2 (en) | 2015-04-08 | 2020-03-03 | Avago Technologies International Sales Pte. Limited | Dynamic orchestration of overlay tunnels |
| US10498652B2 (en) | 2015-04-13 | 2019-12-03 | Nicira, Inc. | Method and system of application-aware routing with crowdsourcing |
| US10425382B2 (en) | 2015-04-13 | 2019-09-24 | Nicira, Inc. | Method and system of a cloud-based multipath routing protocol |
| US10135789B2 (en) | 2015-04-13 | 2018-11-20 | Nicira, Inc. | Method and system of establishing a virtual private network in a cloud service for branch networking |
| US9948552B2 (en) | 2015-04-17 | 2018-04-17 | Equinix, Inc. | Cloud-based services exchange |
| US10681058B2 (en) | 2015-05-01 | 2020-06-09 | Pcms Holdings, Inc. | Systems, methods, and devices to defend against attacks |
| US9848041B2 (en) | 2015-05-01 | 2017-12-19 | Amazon Technologies, Inc. | Automatic scaling of resource instance groups within compute clusters |
| US9769065B2 (en) | 2015-05-06 | 2017-09-19 | Telefonaktiebolaget Lm Ericsson (Publ) | Packet marking for L4-7 advanced counting and monitoring |
| US9954799B2 (en) | 2015-05-14 | 2018-04-24 | International Business Machines Corporation | Adaptive service chain management |
| US10193867B2 (en) | 2015-05-27 | 2019-01-29 | Ping Identity Corporation | Methods and systems for API proxy based adaptive security |
| US10349240B2 (en) | 2015-06-01 | 2019-07-09 | Huawei Technologies Co., Ltd. | Method and apparatus for dynamically controlling customer traffic in a network under demand-based charging |
| US9729348B2 (en) | 2015-06-04 | 2017-08-08 | Cisco Technology, Inc. | Tunnel-in-tunnel source address correction |
| US10397277B2 (en) | 2015-06-14 | 2019-08-27 | Avocado Systems Inc. | Dynamic data socket descriptor mirroring mechanism and use for security analytics |
| US9563514B2 (en) | 2015-06-19 | 2017-02-07 | Commvault Systems, Inc. | Assignment of proxies for virtual-machine secondary copy operations including streaming backup jobs |
| US20160380886A1 (en) | 2015-06-25 | 2016-12-29 | Ciena Corporation | Distributed data center architecture |
| EP3314827B1 (en) | 2015-06-25 | 2022-08-03 | NEC Corporation | Method and system for managing data traffic in a computing network |
| US10503532B2 (en) | 2015-06-26 | 2019-12-10 | Vmware, Inc. | Creating a virtual machine clone of the host computing device and handling of virtual machine clone requests via an I/O filter |
| US10498664B2 (en) | 2015-06-29 | 2019-12-03 | Vmware, Inc. | Hybrid cloud resource scheduling |
| US9787641B2 (en) | 2015-06-30 | 2017-10-10 | Nicira, Inc. | Firewall rule management |
| US10136359B2 (en) | 2015-06-30 | 2018-11-20 | Qualcomm Incorporated | Traffic flow migration in backhaul networks |
| US10550093B2 (en) | 2015-07-01 | 2020-02-04 | The Research Foundation For The State University Of New York | Third generation taxoids and methods of using same |
| US10797992B2 (en) | 2015-07-07 | 2020-10-06 | Cisco Technology, Inc. | Intelligent wide area network (IWAN) |
| US9462010B1 (en) | 2015-07-07 | 2016-10-04 | Accenture Global Services Limited | Threat assessment level determination and remediation for a cloud-based multi-layer security architecture |
| US10397283B2 (en) | 2015-07-15 | 2019-08-27 | Oracle International Corporation | Using symmetric and asymmetric flow response paths from an autonomous system |
| US10050951B2 (en) | 2015-07-20 | 2018-08-14 | Cisco Technology, Inc. | Secure access to virtual machines in heterogeneous cloud environments |
| US20170024260A1 (en) | 2015-07-21 | 2017-01-26 | Cisco Technology, Inc. | Workload migration across cloud providers and data centers |
| CN106375231B (en) | 2015-07-22 | 2019-11-05 | 华为技术有限公司 | A kind of flow switching method, equipment and system |
| US10637889B2 (en) | 2015-07-23 | 2020-04-28 | Cisco Technology, Inc. | Systems, methods, and devices for smart mapping and VPN policy enforcement |
| US10298489B2 (en) | 2015-07-24 | 2019-05-21 | International Business Machines Corporation | Adding multi-tenant awareness to a network packet processing device on a software defined network (SDN) |
| US9942131B2 (en) | 2015-07-29 | 2018-04-10 | International Business Machines Corporation | Multipathing using flow tunneling through bound overlay virtual machines |
| CN106412628B (en) | 2015-07-30 | 2020-07-24 | 华为技术有限公司 | Bandwidth adjusting method and related equipment |
| US10567347B2 (en) | 2015-07-31 | 2020-02-18 | Nicira, Inc. | Distributed tunneling for VPN |
| US9819581B2 (en) | 2015-07-31 | 2017-11-14 | Nicira, Inc. | Configuring a hardware switch as an edge node for a logical router |
| WO2017022791A1 (en) | 2015-08-04 | 2017-02-09 | 日本電気株式会社 | Communication system, communication apparatus, communication method, terminal, and program |
| US10630749B2 (en) | 2015-08-14 | 2020-04-21 | Cisco Technology, Inc. | Timely delivery of real-time media problem when TCP must be used |
| US9763054B2 (en) | 2015-08-19 | 2017-09-12 | Locix Inc. | Systems and methods for determining locations of wireless sensor nodes in a tree network architecture having mesh-based features |
| US10198724B2 (en) | 2015-08-21 | 2019-02-05 | Mastercard International Incorporated | Payment networks and methods for facilitating data transfers within payment networks |
| CN106487534B (en) | 2015-08-24 | 2019-08-13 | 华为技术有限公司 | Generation method, device and the network controller of network control strategy |
| US10038650B2 (en) | 2015-08-25 | 2018-07-31 | Futurewei Technologies, Inc. | System and method for tunnel stitching transport |
| US9906561B2 (en) | 2015-08-28 | 2018-02-27 | Nicira, Inc. | Performing logical segmentation based on remote device attributes |
| US10547540B2 (en) | 2015-08-29 | 2020-01-28 | Vmware, Inc. | Routing optimization for inter-cloud connectivity |
| JP6440203B2 (en) | 2015-09-02 | 2018-12-19 | Kddi株式会社 | Network monitoring system, network monitoring method and program |
| US9733973B2 (en) | 2015-09-16 | 2017-08-15 | Cisco Technology, Inc. | Automatically determining sensor location in a virtualized computing environment |
| JP2017059991A (en) | 2015-09-16 | 2017-03-23 | 株式会社日立製作所 | Network control device, network control method, and network control program |
| US10178032B1 (en) | 2015-09-23 | 2019-01-08 | EMC IP Holding Company LLC | Wide area network distribution, load balancing and failover for multiple internet protocol addresses |
| DE112016004286T5 (en) | 2015-09-23 | 2018-06-21 | Google Llc | Systems and methods for distributing load in a distributed packet core system of a software defined network |
| DK3353989T3 (en) | 2015-09-25 | 2021-04-26 | Ubiquiti Inc | Compact and integrated key control unit for network monitoring |
| US10229017B1 (en) | 2015-10-01 | 2019-03-12 | EMC IP Holding Company LLC | Resetting fibre channel devices for failover in high availability backup systems |
| US10067780B2 (en) | 2015-10-06 | 2018-09-04 | Cisco Technology, Inc. | Performance-based public cloud selection for a hybrid cloud environment |
| US10462136B2 (en) | 2015-10-13 | 2019-10-29 | Cisco Technology, Inc. | Hybrid cloud security groups |
| US10033607B2 (en) | 2015-10-13 | 2018-07-24 | Nxp Usa, Inc. | Packet loss debug system and method |
| US9672074B2 (en) | 2015-10-19 | 2017-06-06 | Vmware, Inc. | Methods and systems to determine and improve cost efficiency of virtual machines |
| US9948503B2 (en) | 2015-10-23 | 2018-04-17 | Hughes Network Systems, Llc | Gateway redundancy protocol for communications networks |
| US10333897B2 (en) | 2015-10-23 | 2019-06-25 | Attala Systems Corporation | Distributed firewalls and virtual network services using network packets with security tags |
| CN106656801B (en) | 2015-10-28 | 2019-11-15 | 华为技术有限公司 | Redirection method and device of service flow forwarding path, and service flow forwarding system |
| US9747179B2 (en) | 2015-10-29 | 2017-08-29 | Netapp, Inc. | Data management agent for selective storage re-caching |
| US10027530B2 (en) | 2015-10-30 | 2018-07-17 | Telefonaktiebolaget Lm Ericsson (Publ) | System and method for troubleshooting SDN networks using flow statistics |
| US11025514B2 (en) | 2015-10-30 | 2021-06-01 | Nicira, Inc. | Automatic health check and performance monitoring for applications and protocols using deep packet inspection in a datacenter |
| SG11201803460TA (en) | 2015-10-31 | 2018-05-30 | Huawei Tech Co Ltd | Route determining method and corresponding apparatus and system |
| US9794370B2 (en) | 2015-11-09 | 2017-10-17 | Telefonaktiebolaget Lm Ericsson (Publ) | Systems and methods for distributed network-aware service placement |
| US9916214B2 (en) | 2015-11-17 | 2018-03-13 | International Business Machines Corporation | Preventing split-brain scenario in a high-availability cluster |
| US9825911B1 (en) | 2015-11-18 | 2017-11-21 | Amazon Technologies, Inc. | Security policy check based on communication establishment handshake packet |
| KR20170058201A (en) | 2015-11-18 | 2017-05-26 | 한국전자통신연구원 | System for providing virtual network service in multi cloud environment and method thereof |
| CA3005641C (en) | 2015-11-19 | 2021-10-12 | Teloip Inc. | System, apparatus and method for providing a virtual network edge and overlay with virtual control plane |
| US10904142B2 (en) | 2015-11-19 | 2021-01-26 | Adaptiv Networks Inc. | System, apparatus and method for providing a virtual network edge and overlay with virtual control plane |
| US9602389B1 (en) | 2015-11-21 | 2017-03-21 | Naveen Maveli | Method and system for defining logical channels and channel policies in an application acceleration environment |
| US10425302B2 (en) | 2015-11-23 | 2019-09-24 | International Business Machines Corporation | Scalable end-to-end quality of service monitoring and diagnosis in software defined networks |
| US9992091B2 (en) | 2015-11-30 | 2018-06-05 | Cisco Technology, Inc. | Performing network topology traces with minimal data collection |
| US9843485B2 (en) | 2015-11-30 | 2017-12-12 | International Business Machines Coprporation | Monitoring dynamic networks |
| US10257019B2 (en) | 2015-12-04 | 2019-04-09 | Arista Networks, Inc. | Link aggregation split-brain detection and recovery |
| US10148756B2 (en) | 2015-12-09 | 2018-12-04 | At&T Intellectual Property I, L.P. | Latency virtualization in a transport network using a storage area network |
| US9426030B1 (en) | 2015-12-11 | 2016-08-23 | International Business Machines Coporation | Automatically generating configuration images and deploying computer components in a computing environment that comprises a shared pool of configurable computing resources |
| US10117285B2 (en) | 2015-12-16 | 2018-10-30 | Verizon Patent And Licensing Inc. | Cloud WAN overlay network |
| US9542219B1 (en) | 2015-12-17 | 2017-01-10 | International Business Machines Corporation | Automatic analysis based scheduling of jobs to appropriate cloud resources |
| US20170180220A1 (en) | 2015-12-18 | 2017-06-22 | Intel Corporation | Techniques to Generate Workload Performance Fingerprints for Cloud Infrastructure Elements |
| US10187289B1 (en) | 2015-12-28 | 2019-01-22 | Amazon Technologies, Inc. | Route advertisement management using tags in directly connected networks |
| WO2017117339A1 (en) | 2015-12-31 | 2017-07-06 | Affirmed Networks, Inc. | Network redundancy and failure detection |
| EP3229405B1 (en) | 2015-12-31 | 2020-07-15 | Huawei Technologies Co., Ltd. | Software defined data center and scheduling and traffic-monitoring method for service cluster therein |
| US11025477B2 (en) | 2015-12-31 | 2021-06-01 | Akamai Technologies, Inc. | Overlay network ingress edge region selection |
| US10103947B2 (en) | 2016-01-08 | 2018-10-16 | Universal Research Solutions, Llc | Processing of portable device data |
| WO2017119950A1 (en) | 2016-01-08 | 2017-07-13 | Inspeed Networks, Inc. | Bidirectional data traffic control |
| US9866637B2 (en) | 2016-01-11 | 2018-01-09 | Equinix, Inc. | Distributed edge processing of internet of things device data in co-location facilities |
| EP3403335B1 (en) | 2016-01-12 | 2020-05-13 | Telefonaktiebolaget LM Ericsson (PUBL) | System, method, and apparatus for managing co-channel interference |
| US20170214701A1 (en) | 2016-01-24 | 2017-07-27 | Syed Kamran Hasan | Computer security based on artificial intelligence |
| US10367655B2 (en) | 2016-01-25 | 2019-07-30 | Alibaba Group Holding Limited | Network system and method for connecting a private network with a virtual private network |
| US10320691B1 (en) | 2016-01-30 | 2019-06-11 | Innovium, Inc. | Visibility packets |
| US10764889B2 (en) | 2016-02-03 | 2020-09-01 | Mitsubishi Electric Corporation | Communication system |
| US10785148B2 (en) | 2016-02-15 | 2020-09-22 | Telefonaktiebolaget Lm Ericsson (Publ) | OSPF extensions for flexible path stitchng and selection for traffic transiting segment routing and MPLS networks |
| US9842045B2 (en) | 2016-02-19 | 2017-12-12 | International Business Machines Corporation | Failure recovery testing framework for microservice-based applications |
| US10200278B2 (en) | 2016-03-02 | 2019-02-05 | Arista Networks, Inc. | Network management system control service for VXLAN on an MLAG domain |
| US10142163B2 (en) | 2016-03-07 | 2018-11-27 | Cisco Technology, Inc | BFD over VxLAN on vPC uplinks |
| EP3522460B1 (en) | 2016-03-09 | 2021-12-01 | Huawei Technologies Co., Ltd. | Flow table processing method and apparatus |
| US10332592B2 (en) | 2016-03-11 | 2019-06-25 | Hewlett Packard Enterprise Development Lp | Hardware accelerators for calculating node values of neural networks |
| US10158727B1 (en) | 2016-03-16 | 2018-12-18 | Equinix, Inc. | Service overlay model for a co-location facility |
| US9942787B1 (en) | 2016-03-22 | 2018-04-10 | Amazon Technologies, Inc. | Virtual private network connection quality analysis |
| US10404727B2 (en) | 2016-03-25 | 2019-09-03 | Cisco Technology, Inc. | Self organizing learning topologies |
| US10313241B2 (en) | 2016-03-28 | 2019-06-04 | Cox Communications, Inc. | Systems and methods for routing internet packets between enterprise network sites |
| US9935955B2 (en) | 2016-03-28 | 2018-04-03 | Zscaler, Inc. | Systems and methods for cloud based unified service discovery and secure availability |
| US10205683B2 (en) | 2016-03-28 | 2019-02-12 | Mellanox Technologies Tlv Ltd. | Optimizing buffer allocation for network flow control |
| US10250466B2 (en) | 2016-03-29 | 2019-04-02 | Juniper Networks, Inc. | Application signature generation and distribution |
| US10277505B2 (en) | 2016-03-30 | 2019-04-30 | Juniper Networks, Inc. | Routing inter-AS LSPs with centralized controller |
| US20170289002A1 (en) | 2016-03-31 | 2017-10-05 | Mrittika Ganguli | Technologies for deploying dynamic underlay networks in cloud computing infrastructures |
| US10187292B2 (en) | 2016-04-15 | 2019-01-22 | Microsoft Technology Licensing, Llc | Data center topology having multiple classes of reliability |
| US10819630B1 (en) | 2016-04-20 | 2020-10-27 | Equinix, Inc. | Layer three instances for a cloud-based services exchange |
| CN105827623B (en) | 2016-04-26 | 2019-06-07 | 山石网科通信技术股份有限公司 | Data center systems |
| EP3449617B1 (en) | 2016-04-26 | 2021-08-18 | Umbra Technologies Ltd. | Network slinghop via tapestry slingshot |
| US10333849B2 (en) | 2016-04-28 | 2019-06-25 | Nicira, Inc. | Automatic configuration of logical routers on edge nodes |
| US10484515B2 (en) | 2016-04-29 | 2019-11-19 | Nicira, Inc. | Implementing logical metadata proxy servers in logical networks |
| CN107332812B (en) | 2016-04-29 | 2020-07-07 | 新华三技术有限公司 | Method and device for realizing network access control |
| US10305815B2 (en) | 2016-04-29 | 2019-05-28 | Huawei Technologies Co., Ltd. | System and method for distributed resource management |
| US10841273B2 (en) | 2016-04-29 | 2020-11-17 | Nicira, Inc. | Implementing logical DHCP servers in logical networks |
| US10305807B2 (en) | 2016-05-03 | 2019-05-28 | Citrix Systems, Inc. | Systems and methods to choose an optimal path from multiple high latency links |
| US10917255B2 (en) | 2016-05-10 | 2021-02-09 | Huawei Technologies Co., Ltd. | Packet switched service identification method and terminal |
| US20170339022A1 (en) | 2016-05-17 | 2017-11-23 | Brocade Communications Systems, Inc. | Anomaly detection and prediction in a packet broker |
| US10129177B2 (en) | 2016-05-23 | 2018-11-13 | Cisco Technology, Inc. | Inter-cloud broker for hybrid cloud networks |
| US10389621B2 (en) | 2016-05-24 | 2019-08-20 | Level 3 Communications, Llc | Route selection system for a communication network and method of operating the same |
| US10200264B2 (en) | 2016-05-31 | 2019-02-05 | 128 Technology, Inc. | Link status monitoring based on packet loss detection |
| US10275325B2 (en) | 2016-06-17 | 2019-04-30 | Weixu Technology Co., Ltd. | Method of site isolation protection, electronic device and system using the same method |
| CA3028397A1 (en) | 2016-06-18 | 2017-12-21 | Clevernet, Inc. | Intelligent adaptive transport layer to enhance performance using multiple channels |
| US10404827B2 (en) | 2016-06-22 | 2019-09-03 | Cisco Technology, Inc. | Client network information service |
| CN113395210B (en) | 2016-06-29 | 2022-09-16 | 华为技术有限公司 | Method for calculating forwarding path and network equipment |
| US10182035B2 (en) | 2016-06-29 | 2019-01-15 | Nicira, Inc. | Implementing logical network security on a hardware switch |
| US9992154B2 (en) | 2016-06-30 | 2018-06-05 | Juniper Networks, Inc. | Layer 3 convergence for EVPN link failure |
| US10404788B2 (en) | 2016-06-30 | 2019-09-03 | Alibaba Group Holding Limited | Express route transmissions between virtual machines and cloud service computing devices |
| US20180013636A1 (en) | 2016-07-07 | 2018-01-11 | Cisco Technology, Inc. | System and method for scaling application containers in cloud environments |
| US9888278B2 (en) | 2016-07-07 | 2018-02-06 | Telefonaktiebolaget Lm Ericsson (Publ) | Bandwidth and ABR video QoE management based on OTT video providers and devices |
| US10320664B2 (en) | 2016-07-21 | 2019-06-11 | Cisco Technology, Inc. | Cloud overlay for operations administration and management |
| US10630576B2 (en) | 2016-08-05 | 2020-04-21 | Huawei Technologies Co., Ltd. | Virtual network routing to dynamic end point locations in support of service-based traffic forwarding |
| JP6505172B2 (en) | 2016-08-25 | 2019-04-24 | エヌエイチエヌ エンターテインメント コーポレーションNHN Entertainment Corporation | Method and system for handling load balancing utilizing virtual switches in a virtual network environment |
| US10193749B2 (en) | 2016-08-27 | 2019-01-29 | Nicira, Inc. | Managed forwarding element executing in public cloud data compute node without overlay network |
| US10681131B2 (en) | 2016-08-29 | 2020-06-09 | Vmware, Inc. | Source network address translation detection and dynamic tunnel creation |
| US10225103B2 (en) | 2016-08-29 | 2019-03-05 | Vmware, Inc. | Method and system for selecting tunnels to send network traffic through |
| US10454758B2 (en) | 2016-08-31 | 2019-10-22 | Nicira, Inc. | Edge node cluster network redundancy and fast convergence using an underlay anycast VTEP IP |
| US10326830B1 (en) | 2016-09-02 | 2019-06-18 | Amazon Technologies, Inc. | Multipath tunneling to a service offered at several datacenters |
| US10491531B2 (en) | 2016-09-13 | 2019-11-26 | Gogo Llc | User directed bandwidth optimization |
| US10552267B2 (en) | 2016-09-15 | 2020-02-04 | International Business Machines Corporation | Microcheckpointing with service processor |
| US10542100B2 (en) | 2016-09-16 | 2020-01-21 | Oracle International Corporation | Systems and methodologies for defining and scheduling custom actions as cloud operations |
| CN107864168B (en) | 2016-09-22 | 2021-05-18 | 华为技术有限公司 | Method and system for classifying network data streams |
| US10116593B1 (en) | 2016-09-23 | 2018-10-30 | Amazon Technologies, Inc. | Transmission and storage of routing path information and routing topology information using a single routing protocol |
| JP6763267B2 (en) | 2016-09-29 | 2020-09-30 | 株式会社リコー | Information processing system, information processing device, program and report creation method |
| US10148564B2 (en) | 2016-09-30 | 2018-12-04 | Juniper Networks, Inc. | Multiple paths computation for label switched paths |
| CN106230650A (en) | 2016-09-30 | 2016-12-14 | 赛特斯信息科技股份有限公司 | SDN Overlay network fault positioning system and method |
| US10250498B1 (en) | 2016-10-03 | 2019-04-02 | Sprint Communications Company L.P. | Session aggregator brokering of data stream communication |
| US9667619B1 (en) | 2016-10-14 | 2017-05-30 | Akamai Technologies, Inc. | Systems and methods for utilizing client side authentication to select services available at a given port number |
| US10355944B2 (en) | 2016-10-31 | 2019-07-16 | Riverbed Technology, Inc. | Minimally invasive monitoring of path quality |
| US10263882B2 (en) | 2016-10-31 | 2019-04-16 | Riverbed Technology, Inc. | Dynamically influencing route re-distribution between an exterior gateway protocol and an interior gateway protocol |
| US10778722B2 (en) | 2016-11-08 | 2020-09-15 | Massachusetts Institute Of Technology | Dynamic flow system |
| US9906401B1 (en) | 2016-11-22 | 2018-02-27 | Gigamon Inc. | Network visibility appliances for cloud computing architectures |
| US10749856B2 (en) | 2016-11-23 | 2020-08-18 | Ingram Micro, Inc. | System and method for multi-tenant SSO with dynamic attribute retrieval |
| US10560431B1 (en) | 2016-12-05 | 2020-02-11 | Amazon Technologies, Inc. | Virtual private gateway for encrypted communication over dedicated physical link |
| US10826905B2 (en) | 2016-12-05 | 2020-11-03 | Citrix Systems, Inc. | Secure access to on-premises web services from multi-tenant cloud services |
| US10298619B2 (en) | 2016-12-16 | 2019-05-21 | Nicira, Inc. | Application template generation and deep packet inspection approach for creation of micro-segmentation policy for network applications |
| US10868760B2 (en) | 2016-12-19 | 2020-12-15 | Vmware, Inc. | System and method for managing public IP addresses for virtual data centers |
| US10887173B2 (en) | 2016-12-21 | 2021-01-05 | Juniper Networks, Inc. | Communicating state information in distributed operating systems |
| US10237123B2 (en) | 2016-12-21 | 2019-03-19 | Nicira, Inc. | Dynamic recovery from a split-brain failure in edge nodes |
| US10802858B2 (en) | 2016-12-22 | 2020-10-13 | Nicira, Inc. | Collecting and processing contextual attributes on a host |
| US10263832B1 (en) | 2016-12-29 | 2019-04-16 | Juniper Networks, Inc. | Physical interface to virtual interface fault propagation |
| CN108306831B (en) | 2017-01-13 | 2021-12-03 | 华为技术有限公司 | Routing method and device |
| US10440049B2 (en) | 2017-01-19 | 2019-10-08 | Paypal, Inc. | Network traffic analysis for malware detection and performance reporting |
| US11252079B2 (en) | 2017-01-31 | 2022-02-15 | Vmware, Inc. | High performance software-defined core network |
| US20200036624A1 (en) | 2017-01-31 | 2020-01-30 | The Mode Group | High performance software-defined core network |
| US20200296026A1 (en) | 2017-01-31 | 2020-09-17 | The Mode Group | High performance software-defined core network |
| US20200021515A1 (en) | 2017-01-31 | 2020-01-16 | The Mode Group | High performance software-defined core network |
| US20180219766A1 (en) | 2017-01-31 | 2018-08-02 | Waltz Networks | Method and Apparatus for Network Traffic Control Optimization |
| US20190238449A1 (en) | 2017-01-31 | 2019-08-01 | The Mode Group | High performance software-defined core network |
| US20190280962A1 (en) | 2017-01-31 | 2019-09-12 | The Mode Group | High performance software-defined core network |
| US20190280963A1 (en) | 2017-01-31 | 2019-09-12 | The Mode Group | High performance software-defined core network |
| US20180219765A1 (en) | 2017-01-31 | 2018-08-02 | Waltz Networks | Method and Apparatus for Network Traffic Control Optimization |
| US20190372889A1 (en) | 2017-01-31 | 2019-12-05 | The Mode Group | High performance software-defined core network |
| US20200021514A1 (en) | 2017-01-31 | 2020-01-16 | The Mode Group | High performance software-defined core network |
| US10992558B1 (en) | 2017-11-06 | 2021-04-27 | Vmware, Inc. | Method and apparatus for distributed data network traffic optimization |
| US11706127B2 (en) | 2017-01-31 | 2023-07-18 | Vmware, Inc. | High performance software-defined core network |
| US20190280964A1 (en) | 2017-01-31 | 2019-09-12 | The Mode Group | High performance software-defined core network |
| US10992568B2 (en) | 2017-01-31 | 2021-04-27 | Vmware, Inc. | High performance software-defined core network |
| US11121962B2 (en) | 2017-01-31 | 2021-09-14 | Vmware, Inc. | High performance software-defined core network |
| US20200106696A1 (en) | 2017-01-31 | 2020-04-02 | The Mode Group | High performance software-defined core network |
| US10778528B2 (en) | 2017-02-11 | 2020-09-15 | Nicira, Inc. | Method and system of connecting to a multipath hub in a cluster |
| US10574528B2 (en) | 2017-02-11 | 2020-02-25 | Nicira, Inc. | Network multi-source inbound quality of service methods and systems |
| US10506926B2 (en) | 2017-02-18 | 2019-12-17 | Arc Devices Limited | Multi-vital sign detector in an electronic medical records system |
| US10382492B2 (en) | 2017-03-02 | 2019-08-13 | Draios Inc. | Automated service-oriented performance management |
| US11032248B2 (en) | 2017-03-07 | 2021-06-08 | Nicira, Inc. | Guest thin agent assisted host network encryption |
| US10002530B1 (en) | 2017-03-08 | 2018-06-19 | Fujitsu Limited | Traffic signal control using multiple Q-learning categories |
| CN106656847B (en) | 2017-03-10 | 2019-05-24 | 重庆邮电大学 | The maximized SDN load-balancing method of network utility |
| US10503427B2 (en) | 2017-03-10 | 2019-12-10 | Pure Storage, Inc. | Synchronously replicating datasets and other managed objects to cloud-based storage systems |
| WO2018165934A1 (en) | 2017-03-16 | 2018-09-20 | Intel Corporation | Systems, methods and devices for user plane traffic forwarding |
| US10367712B2 (en) | 2017-03-20 | 2019-07-30 | Citrix Systems, Inc. | Auto tuning of hybrid wan links by adaptive duplication of packets on alternate links |
| US9832128B1 (en) | 2017-03-20 | 2017-11-28 | Engine Media, Llc | Dynamic advertisement routing |
| CN110036661B (en) | 2017-03-23 | 2020-03-27 | Oppo广东移动通信有限公司 | An uplink data transmission method, terminal, network side device and system |
| US10873794B2 (en) | 2017-03-28 | 2020-12-22 | Cisco Technology, Inc. | Flowlet resolution for application performance monitoring and management |
| WO2018187094A1 (en) | 2017-04-06 | 2018-10-11 | Common Networks, Inc. | Systems and methods for networking and wirelessly routing communications |
| CN108696434B (en) | 2017-04-11 | 2022-01-14 | 华为技术有限公司 | Method, equipment and system for forwarding data message |
| US10333836B2 (en) | 2017-04-13 | 2019-06-25 | Cisco Technology, Inc. | Convergence for EVPN multi-homed networks |
| CA3001394A1 (en) | 2017-04-13 | 2018-10-13 | Iot Cloud Technologies Inc. | Method and system to sanitize, recover, analyze and wipe data stored on memory devices connected to a dedicated embedded microcomputer system with a network connection |
| US10498810B2 (en) | 2017-05-04 | 2019-12-03 | Amazon Technologies, Inc. | Coordinating inter-region operations in provider network environments |
| US10142226B1 (en) | 2017-05-24 | 2018-11-27 | Amazon Technologies, Inc. | Direct network connectivity with scalable forwarding and routing fleets |
| US10476817B2 (en) | 2017-05-31 | 2019-11-12 | Juniper Networks, Inc. | Transport LSP setup using selected fabric path between virtual nodes |
| US10382333B2 (en) | 2017-05-31 | 2019-08-13 | Juniper Networks, Inc. | Fabric path context-based forwarding for virtual nodes |
| US10432523B2 (en) | 2017-05-31 | 2019-10-01 | Juniper Networks, Inc. | Routing protocol signaling of multiple next hops and their relationship |
| US10164873B1 (en) | 2017-06-01 | 2018-12-25 | Ciena Corporation | All-or-none switchover to address split-brain problems in multi-chassis link aggregation groups |
| WO2018232022A1 (en) | 2017-06-13 | 2018-12-20 | Equinix, Inc. | Service peering exchange |
| US10462042B2 (en) | 2017-06-20 | 2019-10-29 | Cisco Technology, Inc. | Network path selection |
| US10523539B2 (en) | 2017-06-22 | 2019-12-31 | Nicira, Inc. | Method and system of resiliency in cloud-delivered SD-WAN |
| US10616379B2 (en) | 2017-06-23 | 2020-04-07 | Futurewei Technologies, Inc. | Seamless mobility and session continuity with TCP mobility option |
| US10742447B2 (en) | 2017-07-10 | 2020-08-11 | Level 3 Communications, Llc | Connecting to multiple cloud instances in a telecommunications network |
| JP6904127B2 (en) | 2017-07-19 | 2021-07-14 | 富士通株式会社 | Relay node determination program, relay node determination method and parallel processing device |
| US10742750B2 (en) | 2017-07-20 | 2020-08-11 | Cisco Technology, Inc. | Managing a distributed network of function execution environments |
| US10523560B2 (en) | 2017-07-28 | 2019-12-31 | Juniper Networks, Inc. | Service level agreement based next-hop selection |
| US10454812B2 (en) | 2017-07-28 | 2019-10-22 | Juniper Networks, Inc. | Service level agreement based next-hop selection |
| US10461993B2 (en) | 2017-07-31 | 2019-10-29 | Cisco Technology, Inc. | Network hub site redundancy and failover |
| US20190046056A1 (en) | 2017-08-10 | 2019-02-14 | VVVital Patent Holdings Limited | Multi-Vital Sign Detector in an Electronic Medical Records System |
| US20190058709A1 (en) | 2017-08-16 | 2019-02-21 | Telefonaktiebolaget Lm Ericsson (Publ) | Tenant management method and system in a cloud computing environment |
| CN109412964B (en) | 2017-08-18 | 2022-04-29 | 华为技术有限公司 | Message control method and network device |
| WO2019037846A1 (en) | 2017-08-23 | 2019-02-28 | NEC Laboratories Europe GmbH | Method for supporting service level agreement monitoring in a software defined network and corresponding software defined network |
| US10491516B2 (en) | 2017-08-24 | 2019-11-26 | Nicira, Inc. | Packet communication between logical networks and public cloud service providers native networks using a single network interface and a single routing table |
| US10778579B2 (en) | 2017-08-27 | 2020-09-15 | Nicira, Inc. | Performing in-line service in public cloud |
| EP3677000B1 (en) | 2017-08-30 | 2022-11-16 | Telefonaktiebolaget LM Ericsson (PUBL) | Method and system for tracing packets in software defined networks |
| JP6434190B1 (en) | 2017-08-30 | 2018-12-05 | エヌ・ティ・ティ・コミュニケーションズ株式会社 | Network control device, communication system, network control method, program, and recording medium |
| US10616085B2 (en) | 2017-08-31 | 2020-04-07 | Zte Corporation | Residence time measurement for optimizing network services |
| US10554538B2 (en) | 2017-09-12 | 2020-02-04 | Adara Networks, Inc. | Dynamic link state routing protocol |
| US10511546B2 (en) | 2017-09-29 | 2019-12-17 | Juniper Networks, Inc. | Connecting virtual nodes in a network device using abstract fabric interfaces |
| US10999165B2 (en) | 2017-10-02 | 2021-05-04 | Vmware, Inc. | Three tiers of SaaS providers for deploying compute and network infrastructure in the public cloud |
| US10959098B2 (en) | 2017-10-02 | 2021-03-23 | Vmware, Inc. | Dynamically specifying multiple public cloud edge nodes to connect to an external multi-computer node |
| US10958479B2 (en) | 2017-10-02 | 2021-03-23 | Vmware, Inc. | Selecting one node from several candidate nodes in several public clouds to establish a virtual network that spans the public clouds |
| US11115480B2 (en) | 2017-10-02 | 2021-09-07 | Vmware, Inc. | Layer four optimization for a virtual network defined over public cloud |
| US11089111B2 (en) * | 2017-10-02 | 2021-08-10 | Vmware, Inc. | Layer four optimization for a virtual network defined over public cloud |
| US10999100B2 (en) | 2017-10-02 | 2021-05-04 | Vmware, Inc. | Identifying multiple nodes in a virtual network defined over a set of public clouds to connect to an external SAAS provider |
| US10608887B2 (en) | 2017-10-06 | 2020-03-31 | Nicira, Inc. | Using packet tracing tool to automatically execute packet capture operations |
| EP3879759B1 (en) | 2017-10-27 | 2023-09-13 | Telefonaktiebolaget Lm Ericsson (Publ) | Optimized datapath troubleshooting with trace policy engine |
| US10805181B2 (en) | 2017-10-29 | 2020-10-13 | Nicira, Inc. | Service operation chaining |
| US11223514B2 (en) | 2017-11-09 | 2022-01-11 | Nicira, Inc. | Method and system of a dynamic high-availability mode based on current wide area network connectivity |
| US10778651B2 (en) | 2017-11-15 | 2020-09-15 | Nicira, Inc. | Performing context-rich attribute-based encryption on a host |
| US10644978B2 (en) | 2017-11-22 | 2020-05-05 | Hughes Network Systems, Llc | Latency increase estimated rate limiter adjustment |
| US10565464B2 (en) | 2017-12-21 | 2020-02-18 | At&T Intellectual Property I, L.P. | Adaptive cloud offloading of mobile augmented reality |
| US20190207844A1 (en) | 2018-01-03 | 2019-07-04 | Hewlett Packard Enterprise Development Lp | Determining routing decisions in a software-defined wide area network |
| US10797910B2 (en) | 2018-01-26 | 2020-10-06 | Nicira, Inc. | Specifying and utilizing paths through a network |
| US10673781B2 (en) | 2018-01-31 | 2020-06-02 | Hewlett Packard Enterprise Development Lp | Dedicated virtual local area network for peer-to-peer traffic transmitted between switches |
| US10439927B2 (en) | 2018-01-31 | 2019-10-08 | International Business Machines Corporation | Distributed storage path configuration |
| US11038834B2 (en) | 2018-01-31 | 2021-06-15 | Hewlett Packard Enterprise Development Lp | Selecting an external link of a plurality of external links |
| KR20200109326A (en) | 2018-01-31 | 2020-09-22 | 아씨아 에스피이, 엘엘씨 | System and method for monitoring broadband communication link performance |
| CN111742525B (en) | 2018-02-19 | 2022-02-25 | 华为技术有限公司 | Multi-cloud VPC routing and registration |
| US10932322B2 (en) | 2018-02-23 | 2021-02-23 | Cisco Technology, Inc. | Policy mapping methods and apparatus for use in interconnecting software-defined wide area network (SD-WAN) fabrics with mobile networks for communications with UEs |
| US11792307B2 (en) | 2018-03-28 | 2023-10-17 | Apple Inc. | Methods and apparatus for single entity buffer pool management |
| US20190319881A1 (en) | 2018-04-13 | 2019-10-17 | Microsoft Technology Licensing, Llc | Traffic management based on past traffic arrival patterns |
| US11102079B2 (en) | 2018-04-17 | 2021-08-24 | Microsoft Technology Licensing, Llc | Cross-regional virtual network peering |
| US10778464B2 (en) | 2018-04-20 | 2020-09-15 | Futurewei Technologies, Inc. | NSH encapsulation for traffic steering establishing a tunnel between virtual extensible local area network (VxLAN) tunnel end points (VTEPS) using a NSH encapsulation header comprising a VxLAN header whose VNI field has been replaced by an NSH shim |
| US20200301764A1 (en) | 2018-04-23 | 2020-09-24 | SCRRD, Inc. | Operating system on a computing system |
| US10715427B2 (en) | 2018-04-27 | 2020-07-14 | Hewlett Packard Enterprise Development Lp | Determining routing decisions in a software-defined wide area network overlay |
| US20190334786A1 (en) | 2018-04-30 | 2019-10-31 | Hewlett Packard Enterprise Development Lp | Predicting Workload Patterns in a Data Storage Network |
| US11388096B2 (en) | 2018-05-04 | 2022-07-12 | T-Mobile Usa, Inc. | Performance driven software defined networking |
| US11438254B2 (en) | 2018-06-13 | 2022-09-06 | Telefonaktiebolaget Lm Ericsson (Publ) | Apparatus and method to trace packets in a packet processing pipeline of a software defined networking switch |
| US10666497B2 (en) | 2018-06-22 | 2020-05-26 | Intel Corporation | Localized service resiliency |
| US11184327B2 (en) | 2018-07-05 | 2021-11-23 | Vmware, Inc. | Context aware middlebox services at datacenter edges |
| US10749773B2 (en) | 2018-07-06 | 2020-08-18 | International Business Machines Corporation | Determining a location of optimal computing resources for workloads |
| WO2020012491A1 (en) | 2018-07-10 | 2020-01-16 | Telefonaktiebolaget L M Ericsson (Publ) | Mechanism for hitless resynchronization during sdn controller upgrades between incompatible versions |
| WO2020018704A1 (en) | 2018-07-18 | 2020-01-23 | The Mode Group | High performance software-defined core network |
| US10892958B2 (en) | 2018-08-03 | 2021-01-12 | Huawei Technologies Co., Ltd. | Methods and functions of network performance monitoring and service assurance |
| US10999163B2 (en) | 2018-08-14 | 2021-05-04 | Juniper Networks, Inc. | Multi-cloud virtual computing environment provisioning using a high-level topology description |
| US11233778B2 (en) | 2018-08-15 | 2022-01-25 | Juniper Networks, Inc. | Secure forwarding of tenant workloads in virtual networks |
| US10992654B2 (en) | 2018-08-17 | 2021-04-27 | Cisco Technology, Inc. | Secure WAN path selection at campus fabric edge |
| US11115327B2 (en) | 2018-08-24 | 2021-09-07 | Oracle International Corporation | Methods, systems, and computer readable media for providing mobile device connectivity |
| US11271905B2 (en) | 2018-09-21 | 2022-03-08 | Google Llc | Network architecture for cloud computing environments |
| US11182209B2 (en) | 2018-09-21 | 2021-11-23 | Google Llc | Distributed job scheduling system |
| US10834004B2 (en) | 2018-09-24 | 2020-11-10 | Netsia, Inc. | Path determination method and system for delay-optimized service function chaining |
| US10911374B1 (en) | 2018-09-28 | 2021-02-02 | Riverbed Technology, Inc. | Software defined wide area network (SD WAN) enabled network fabric for containers |
| US11108664B2 (en) | 2018-10-19 | 2021-08-31 | Comcast Cable Communications, Llc | Prioritized message routing |
| WO2020091777A1 (en) | 2018-11-01 | 2020-05-07 | Hewlett Packard Enterprise Development Lp | Modifying resource allocation or policy responsive to control information from a virtual network function |
| US11102113B2 (en) | 2018-11-08 | 2021-08-24 | Sap Se | Mapping of internet protocol addresses in a multi-cloud computing environment |
| US10708144B2 (en) | 2018-11-14 | 2020-07-07 | Juniper Networks, Inc. | Predicting application quality of experience metrics using adaptive machine learned probes |
| EP3878160B1 (en) | 2018-11-15 | 2025-01-01 | VMware LLC | Layer four optimization in a virtual network defined over public cloud |
| US10795817B2 (en) | 2018-11-16 | 2020-10-06 | Western Digital Technologies, Inc. | Cache coherence for file system interfaces |
| US10893004B2 (en) | 2018-11-20 | 2021-01-12 | Amazon Technologies, Inc. | Configurable detection of network traffic anomalies at scalable virtual traffic hubs |
| US10715402B2 (en) | 2018-11-27 | 2020-07-14 | Servicenow, Inc. | Systems and methods for enhanced monitoring of a distributed computing system |
| US10999197B2 (en) | 2018-11-30 | 2021-05-04 | Cisco Technology, Inc. | End-to-end identity-aware routing across multiple administrative domains |
| US11201854B2 (en) | 2018-11-30 | 2021-12-14 | Cisco Technology, Inc. | Dynamic intent-based firewall |
| US11233822B2 (en) | 2018-11-30 | 2022-01-25 | Cisco Technology, Inc. | Dynamic honeypots |
| US10951529B2 (en) | 2018-12-13 | 2021-03-16 | Fortinet, Inc. | Dynamic service-based load balancing in a software-defined wide area network (SD-WAN) |
| US11115426B1 (en) | 2018-12-13 | 2021-09-07 | Cisco Technology, Inc. | Distributed packet capture for network anomaly detection |
| US11095558B2 (en) | 2018-12-28 | 2021-08-17 | Alibaba Group Holding Limited | ASIC for routing a packet |
| US11032175B2 (en) | 2018-12-31 | 2021-06-08 | Hughes Network Systems | Packet loss isolation test |
| US11099873B2 (en) | 2019-01-04 | 2021-08-24 | Microsoft Technology Licensing, Llc | Network configuration updates for virtual machine |
| US11012299B2 (en) | 2019-01-18 | 2021-05-18 | Cisco Technology, Inc. | Seamless multi-cloud routing and policy interconnectivity |
| US10892989B2 (en) | 2019-01-18 | 2021-01-12 | Vmware, Inc. | Tunnel-based service insertion in public cloud environments |
| US11552874B1 (en) | 2019-01-18 | 2023-01-10 | Keysight Technologies, Inc. | Methods, systems and computer readable media for proactive network testing |
| US20200244721A1 (en) | 2019-01-30 | 2020-07-30 | Hewlett Packard Enterprise Development Lp | Deploying a workload |
| US11336482B2 (en) | 2019-01-31 | 2022-05-17 | Juniper Networks, Inc. | Policy-driven on-demand tunnel creation/deletion based on traffic information in a wide area network (WAN) |
| US11271795B2 (en) | 2019-02-08 | 2022-03-08 | Ciena Corporation | Systems and methods for proactive network operations |
| US10911517B2 (en) | 2019-02-17 | 2021-02-02 | Cisco Technology, Inc. | Determining end times for single page applications |
| US11165828B2 (en) | 2019-02-28 | 2021-11-02 | Cisco Technology, Inc. | Systems and methods for on-demand flow-based policy enforcement in multi-cloud environments |
| US11134126B2 (en) | 2019-03-06 | 2021-09-28 | Hewlett Packard Enterprise Development Lp | Adaptive routing of branch traffic in software-defined wide area network (SDWAN) deployments |
| US10855575B2 (en) | 2019-03-06 | 2020-12-01 | Hewlett Packard Enterprise Development Lp | Adaptive traffic routing in a software-defined wide area network |
| US11005729B2 (en) | 2019-03-14 | 2021-05-11 | Juniper Networks, Inc. | Satisfying service level agreement metrics for unknown applications |
| US11423254B2 (en) | 2019-03-28 | 2022-08-23 | Intel Corporation | Technologies for distributing iterative computations in heterogeneous computing environments |
| US12082086B2 (en) | 2019-03-29 | 2024-09-03 | Apple Inc. | Systems and methods for autonomous vehicle communication |
| US10972386B2 (en) | 2019-03-29 | 2021-04-06 | Juniper Networks, Inc. | Scalable multi-tenant underlay network supporting multi-tenant overlay network |
| US11201800B2 (en) | 2019-04-03 | 2021-12-14 | Cisco Technology, Inc. | On-path dynamic policy enforcement and endpoint-aware policy enforcement for endpoints |
| US11128492B2 (en) | 2019-04-16 | 2021-09-21 | Hewlett Packard Enterprise Development Lp | Automated gateway selection in SD-WAN |
| DE112019007229T5 (en) | 2019-04-18 | 2022-01-13 | Hewlett Packard Enterprise Development Lp | HEURISTIC SD-WAN ROUTES RECONFIGURATION |
| US11128490B2 (en) | 2019-04-26 | 2021-09-21 | Microsoft Technology Licensing, Llc | Enabling access to dedicated resources in a virtual network using top of rack switches |
| US11212223B2 (en) | 2019-04-27 | 2021-12-28 | Hewlett Packard Enterprise Development Lp | Uplink selection in a SD-WAN |
| US11303727B2 (en) | 2019-04-30 | 2022-04-12 | Jio Platforms Limited | Method and system for routing user data traffic from an edge device to a network entity |
| US11050644B2 (en) | 2019-04-30 | 2021-06-29 | Hewlett Packard Enterprise Development Lp | Dynamic device anchoring to SD-WAN cluster |
| US11025522B2 (en) | 2019-05-04 | 2021-06-01 | Juniper Networks, Inc. | Path monitoring system (PMS) controller or ingress node based multiprotocal label switching (MPLS) ping and traceroute in inter- autonomous system (AS) segment routing (SR) networks |
| US11093287B2 (en) | 2019-05-24 | 2021-08-17 | Intel Corporation | Data management for edge architectures |
| US10693739B1 (en) | 2019-05-29 | 2020-06-23 | Accenture Global Solutions Limited | Network design platform |
| US10979316B2 (en) | 2019-05-31 | 2021-04-13 | Juniper Networks, Inc. | Dynamic application SLA metric generation, distribution, and intent-based SD-WAN link selection |
| US10826775B1 (en) | 2019-06-19 | 2020-11-03 | Cisco Technology, Inc. | Policy plane integration across multiple domains |
| US11258628B2 (en) | 2019-06-24 | 2022-02-22 | Cisco Technology, Inc. | Plug and play at sites using TLOC-extension |
| US12057939B2 (en) | 2019-06-25 | 2024-08-06 | Cisco Technology, Inc. | XOR forward error correction for isolated and burst losses over a software-defined-wide area network |
| US11526434B1 (en) | 2019-06-25 | 2022-12-13 | Amazon Technologies, Inc. | Network-level garbage collection in an on-demand code execution system |
| US11071005B2 (en) | 2019-06-27 | 2021-07-20 | Cisco Technology, Inc. | Congestion avoidance with adaptive QoS policy enforcement from SD-WAN controller in SD-WAN networks |
| US11032107B2 (en) | 2019-06-28 | 2021-06-08 | Juniper Networks, Inc. | GRE tunneling with reduced packet encryption at intermediate routers |
| US10498665B1 (en) | 2019-07-15 | 2019-12-03 | Capital One Services, Llc | Method for managing state of cloud-based systems |
| US11184273B2 (en) | 2019-07-24 | 2021-11-23 | Vmware, Inc. | Machine learning-based path priority determination for routing data in software-defined networks |
| JP7388032B2 (en) | 2019-07-29 | 2023-11-29 | 富士フイルムビジネスイノベーション株式会社 | Information processing systems and control programs for information processing systems |
| US11374791B2 (en) | 2019-07-31 | 2022-06-28 | Hewlett Packard Enterprise Development Lp | Orchestration of subnetwork extensions across a wide area network |
| US11329950B2 (en) | 2019-08-02 | 2022-05-10 | Cisco Technology, Inc. | Wide area network edge device connectivity for high availability and extensibility |
| CN114175590B (en) | 2019-08-09 | 2024-07-23 | 惠普发展公司,有限责任合伙企业 | Network connectivity performance determination on a computing device |
| US10691728B1 (en) | 2019-08-13 | 2020-06-23 | Datadog, Inc. | Transforming a data stream into structured data |
| US11121985B2 (en) | 2019-08-27 | 2021-09-14 | Vmware, Inc. | Defining different public cloud virtual networks for different entities based on different sets of measurements |
| US10938717B1 (en) | 2019-09-04 | 2021-03-02 | Cisco Technology, Inc. | Policy plane integration across multiple domains |
| US11169816B2 (en) | 2019-09-05 | 2021-11-09 | Facebook Technologies, Llc | System and method for key value store |
| US20210092062A1 (en) | 2019-09-20 | 2021-03-25 | Citrix Systems, Inc. | Quality of experience (qoe) enhancement device and related techniques |
| US11082304B2 (en) | 2019-09-27 | 2021-08-03 | Oracle International Corporation | Methods, systems, and computer readable media for providing a multi-tenant software-defined wide area network (SD-WAN) node |
| US11115347B2 (en) | 2019-10-14 | 2021-09-07 | Hewlett Packard Enterprise Development Lp | Dynamic monitoring and migration of applications |
| US11153119B2 (en) | 2019-10-15 | 2021-10-19 | Cisco Technology, Inc. | Dynamic discovery of peer network devices across a wide area network |
| US20210126854A1 (en) | 2019-10-23 | 2021-04-29 | Arista Networks, Inc. | Tcp performance model based in-band network telemetry |
| US11509534B2 (en) | 2019-10-23 | 2022-11-22 | Juniper Networks, Inc. | Collection of error packet information for network policy enforcement |
| US11611507B2 (en) | 2019-10-28 | 2023-03-21 | Vmware, Inc. | Managing forwarding elements at edge nodes connected to a virtual network |
| US11483796B2 (en) | 2019-11-25 | 2022-10-25 | Cisco Technology, Inc. | Systems and methods for dynamically generating a mobile software-defined wide area network gateway location for remote users |
| US11411857B2 (en) | 2019-11-25 | 2022-08-09 | Cisco Technology, Inc. | Multicast performance routing and policy control in software defined wide area networks |
| US11316869B2 (en) | 2019-12-10 | 2022-04-26 | Cisco Technology, Inc. | Systems and methods for providing attestation of data integrity |
| CN114342330B (en) | 2019-12-12 | 2024-12-06 | 威睿有限责任公司 | Collect and analyze data about flows associated with DPI parameters |
| US11489783B2 (en) | 2019-12-12 | 2022-11-01 | Vmware, Inc. | Performing deep packet inspection in a software defined wide area network |
| US11394640B2 (en) | 2019-12-12 | 2022-07-19 | Vmware, Inc. | Collecting and analyzing data regarding flows associated with DPI parameters |
| FR3105681B1 (en) | 2019-12-20 | 2021-12-03 | Sagemcom Broadband Sas | Method and device for determining a topology of a network of wireless access points |
| CN111198764B (en) | 2019-12-31 | 2024-04-26 | 江苏省未来网络创新研究院 | A load balancing implementation system and method based on SDN |
| US11398969B2 (en) | 2020-01-22 | 2022-07-26 | Cisco Technology, Inc. | Network conversation testing of flow level operations |
| US11438789B2 (en) | 2020-01-24 | 2022-09-06 | Vmware, Inc. | Computing and using different path quality metrics for different service classes |
| US11665095B2 (en) | 2020-02-21 | 2023-05-30 | Cisco Technology, Inc. | Fine-grained SD-WAN optimization services for cloud-native applications |
| US11556349B2 (en) | 2020-03-04 | 2023-01-17 | International Business Machines Corporation | Booting a secondary operating system kernel with reclaimed primary kernel memory |
| US11870679B2 (en) | 2020-04-06 | 2024-01-09 | VMware LLC | Primary datacenter for logical router |
| US20210314385A1 (en) | 2020-04-07 | 2021-10-07 | Cisco Technology, Inc. | Integration of hyper converged infrastructure management with a software defined network control |
| US11108851B1 (en) | 2020-04-10 | 2021-08-31 | Hewlett Packard Enterprise Development Lp | Dynamic application routing in a software defined wide area network |
| EP4120647A4 (en) | 2020-04-14 | 2023-05-03 | Huawei Cloud Computing Technologies Co., Ltd. | Packet transmission method, device, and system |
| US12316505B2 (en) | 2020-04-15 | 2025-05-27 | Alkira, Inc. | Application-agnostic tenant onboarding onto a multi-tenant system |
| US12153962B2 (en) | 2020-04-15 | 2024-11-26 | Intel Corporation | Storage transactions with predictable latency |
| US11750512B2 (en) | 2020-04-22 | 2023-09-05 | Hewlett Packard Enterprise Development Lp | Identifying a dynamic network parameter probe interval in an SD-WAN |
| US11394606B2 (en) | 2020-05-26 | 2022-07-19 | Cisco Technology, Inc. | Auto-provisioning of SD-WAN hubs and spokes |
| US20200322287A1 (en) | 2020-06-18 | 2020-10-08 | Intel Corporation | Switch-managed resource allocation and software execution |
| US11297513B2 (en) | 2020-06-23 | 2022-04-05 | T-Mobile Usa, Inc. | System for administering test cases from a mobile device for a telecommunications network |
| US11398948B2 (en) | 2020-06-29 | 2022-07-26 | Cisco Technology, Inc. | Generation and deployment of inherited network topology models |
| US11477127B2 (en) | 2020-07-02 | 2022-10-18 | Vmware, Inc. | Methods and apparatus for application aware hub clustering techniques for a hyper scale SD-WAN |
| US11595282B2 (en) | 2020-07-21 | 2023-02-28 | Google Llc | Network anomaly detection |
| US11363124B2 (en) | 2020-07-30 | 2022-06-14 | Vmware, Inc. | Zero copy socket splicing |
| US11240153B1 (en) | 2020-07-31 | 2022-02-01 | Cisco Technology, Inc. | Scoring policies for predictive routing suggestions |
| US11516104B2 (en) | 2020-08-10 | 2022-11-29 | Cisco Technology, Inc. | Systems and methods for determining a network path trace |
| US11588711B2 (en) | 2020-08-14 | 2023-02-21 | Cisco Technology, Inc. | Intent-driven cloud branches |
| US11337227B2 (en) | 2020-08-24 | 2022-05-17 | Amazon Technologies, Inc. | Distributed network connectivity monitoring of provider network edge location resources from cellular networks |
| US11356319B2 (en) | 2020-09-11 | 2022-06-07 | Arista Networks, Inc. | Distinguishing network vs server issues when diagnosing application performance problems |
| WO2022082680A1 (en) | 2020-10-22 | 2022-04-28 | 华为技术有限公司 | Communication method and apparatus |
| US20220131807A1 (en) | 2020-10-28 | 2022-04-28 | Vmware, Inc. | Identification of faulty sd-wan segment |
| US11095612B1 (en) | 2020-10-30 | 2021-08-17 | Palo Alto Networks, Inc. | Flow metadata exchanges between network and security functions for a security service |
| CN115918139A (en) | 2020-11-16 | 2023-04-04 | 瞻博网络公司 | Active assurance of network slicing |
| US11444865B2 (en) | 2020-11-17 | 2022-09-13 | Vmware, Inc. | Autonomous distributed forwarding plane traceability based anomaly detection in application traffic for hyper-scale SD-WAN |
| US11575600B2 (en) | 2020-11-24 | 2023-02-07 | Vmware, Inc. | Tunnel-less SD-WAN |
| US11522780B1 (en) | 2020-12-10 | 2022-12-06 | Amazon Technologies, Inc. | Monitoring networks by detection of noisy agents |
| US20220198229A1 (en) | 2020-12-21 | 2022-06-23 | Genesys Telecommunications Laboratories, Inc. | Systems and methods related to applied anomaly detection and contact center computing environments |
| US11601356B2 (en) | 2020-12-29 | 2023-03-07 | Vmware, Inc. | Emulating packet flows to assess network links for SD-WAN |
| US11765057B2 (en) | 2020-12-30 | 2023-09-19 | Oracle International Corporation | Systems and methods for performing end-to-end link-layer and IP-layer health checks between a host machine and a network virtualization device |
| US11575651B2 (en) | 2020-12-31 | 2023-02-07 | Palo Alto Networks, Inc. | Dynamically scalable application firewall deployment for cloud native applications |
| US11381474B1 (en) | 2020-12-31 | 2022-07-05 | Juniper Networks, Inc. | Wan link selection for SD-WAN services |
| US11595231B2 (en) | 2021-01-07 | 2023-02-28 | Hewlett Packard Enterprise Development Lp | Metric based dynamic virtual private network (VPN) tunnel between branch gateway devices |
| US12218845B2 (en) | 2021-01-18 | 2025-02-04 | VMware LLC | Network-aware load balancing |
| EP4189937A1 (en) | 2021-01-18 | 2023-06-07 | VMware, Inc. | Network-aware load balancing |
| CN116783874A (en) | 2021-01-18 | 2023-09-19 | Vm维尔股份有限公司 | Network aware load balancing |
| WO2022159156A1 (en) | 2021-01-21 | 2022-07-28 | Vmware, Inc. | Proactive optimization across network segments to maintain end-to-end performance |
| US11979325B2 (en) | 2021-01-28 | 2024-05-07 | VMware LLC | Dynamic SD-WAN hub cluster scaling with machine learning |
| US11797510B2 (en) | 2021-04-20 | 2023-10-24 | Netapp, Inc. | Key-value store and file system integration |
| US12368676B2 (en) | 2021-04-29 | 2025-07-22 | VMware LLC | Methods for micro-segmentation in SD-WAN for virtual networks |
| EP4248627A1 (en) | 2021-04-29 | 2023-09-27 | VMware, Inc. | Methods for micro-segmentation in sd-wan for virtual networks |
| US12009987B2 (en) | 2021-05-03 | 2024-06-11 | VMware LLC | Methods to support dynamic transit paths through hub clustering across branches in SD-WAN |
| US20230261974A1 (en) | 2021-05-03 | 2023-08-17 | Vmware, Inc. | On demand routing mesh for routing packets through sd-wan edge forwarding nodes in an sd-wan |
| WO2022235303A1 (en) | 2021-05-03 | 2022-11-10 | Vmware, Inc. | On demand routing mesh for routing packets through sd-wan edge forwarding nodes in an sd-wan |
| US11388086B1 (en) | 2021-05-03 | 2022-07-12 | Vmware, Inc. | On demand routing mesh for dynamically adjusting SD-WAN edge forwarding node roles to facilitate routing through an SD-WAN |
| US11729065B2 (en) | 2021-05-06 | 2023-08-15 | Vmware, Inc. | Methods for application defined virtual network service among multiple transport in SD-WAN |
| US12250114B2 (en) | 2021-06-18 | 2025-03-11 | VMware LLC | Method and apparatus for deploying tenant deployable elements across public clouds based on harvested performance metrics of sub-types of resource elements in the public clouds |
| US20220407790A1 (en) | 2021-06-18 | 2022-12-22 | Vmware, Inc. | Method and apparatus for deploying tenant deployable elements across public clouds based on harvested performance metrics |
| US12015536B2 (en) | 2021-06-18 | 2024-06-18 | VMware LLC | Method and apparatus for deploying tenant deployable elements across public clouds based on harvested performance metrics of types of resource elements in the public clouds |
| US20220407915A1 (en) | 2021-06-18 | 2022-12-22 | Vmware, Inc. | Method and apparatus for deploying tenant deployable elements across public clouds based on harvested performance metrics |
| WO2022265681A1 (en) | 2021-06-18 | 2022-12-22 | Vmware, Inc. | Method and apparatus for deploying tenant deployable elements across public clouds based on harvested performance metrics |
| US20220407774A1 (en) | 2021-06-18 | 2022-12-22 | Vmware, Inc. | Method and apparatus for modifying the deployment of resource elements in public clouds based on harvested performance metrics |
| US11489720B1 (en) | 2021-06-18 | 2022-11-01 | Vmware, Inc. | Method and apparatus to evaluate resource elements and public clouds for deploying tenant deployable elements based on harvested performance metrics |
| US12047282B2 (en) | 2021-07-22 | 2024-07-23 | VMware LLC | Methods for smart bandwidth aggregation based dynamic overlay selection among preferred exits in SD-WAN |
| US11375005B1 (en) | 2021-07-24 | 2022-06-28 | Vmware, Inc. | High availability solutions for a secure access service edge application |
| WO2023009159A1 (en) | 2021-07-24 | 2023-02-02 | Vmware, Inc. | Network management services in a point-of-presence |
| US20230026330A1 (en) | 2021-07-24 | 2023-01-26 | Vmware, Inc. | Network management services in a point-of-presence |
| US20230025586A1 (en) | 2021-07-24 | 2023-01-26 | Vmware, Inc. | Network management services in a secure access service edge application |
| US12267364B2 (en) | 2021-07-24 | 2025-04-01 | VMware LLC | Network management services in a virtual network |
| US11943146B2 (en) | 2021-10-01 | 2024-03-26 | VMware LLC | Traffic prioritization in SD-WAN |
| US12184557B2 (en) | 2022-01-04 | 2024-12-31 | VMware LLC | Explicit congestion notification in a virtual environment |
| US20230216768A1 (en) | 2022-01-04 | 2023-07-06 | Vmware, Inc. | Enhanced path selection using online detection of paths overlaps |
| US20230216804A1 (en) | 2022-01-04 | 2023-07-06 | Vmware, Inc. | Efficient mechanism for the transmission of multipath duplicate packets |
| US20230224759A1 (en) | 2022-01-12 | 2023-07-13 | Vmware, Inc. | Heterogeneous hub clustering and application policy based automatic node selection for network of clouds |
| US20230221874A1 (en) | 2022-01-12 | 2023-07-13 | Vmware, Inc. | Method of efficiently receiving files over a network with a receive file command |
| US20230224356A1 (en) | 2022-01-12 | 2023-07-13 | Vmware, Inc. | Zero-copy method for sending key values |
| US12425395B2 (en) | 2022-01-15 | 2025-09-23 | VMware LLC | Method and system of securely adding an edge device operating in a public network to an SD-WAN |
| US20230239234A1 (en) | 2022-01-25 | 2023-07-27 | Vmware, Inc. | Providing dns service in an sd-wan |
-
2023
- 2023-06-19 US US18/211,578 patent/US12166661B2/en active Active
- 2023-06-19 US US18/211,576 patent/US20240022626A1/en not_active Abandoned
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN118282866A (en) * | 2024-06-03 | 2024-07-02 | 中宇联云计算服务(上海)有限公司 | Multi-tenant isolation deployment method, system, equipment and medium based on container cluster |
| CN119853862A (en) * | 2024-12-05 | 2025-04-18 | 天翼云科技有限公司 | Forward error correction system and method |
Also Published As
| Publication number | Publication date |
|---|---|
| US20240022499A1 (en) | 2024-01-18 |
| US12166661B2 (en) | 2024-12-10 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11792127B2 (en) | Network-aware load balancing | |
| US12218845B2 (en) | Network-aware load balancing | |
| US11381499B1 (en) | Routing meshes for facilitating routing through an SD-WAN | |
| US11611507B2 (en) | Managing forwarding elements at edge nodes connected to a virtual network | |
| US12218800B2 (en) | Methods for application defined virtual network service among multiple transport in sd-wan | |
| US11477127B2 (en) | Methods and apparatus for application aware hub clustering techniques for a hyper scale SD-WAN | |
| US20230261974A1 (en) | On demand routing mesh for routing packets through sd-wan edge forwarding nodes in an sd-wan | |
| US20230224759A1 (en) | Heterogeneous hub clustering and application policy based automatic node selection for network of clouds | |
| US12166661B2 (en) | DNS-based GSLB-aware SD-WAN for low latency SaaS applications | |
| US20200169503A1 (en) | Route advertisement by managed gateways | |
| US9577845B2 (en) | Multiple active L3 gateways for logical networks | |
| US9225597B2 (en) | Managed gateways peering with external router to attract ingress packets | |
| WO2022154850A1 (en) | Network-aware load balancing | |
| US9503371B2 (en) | High availability L3 gateways for logical networks | |
| US20190104050A1 (en) | Routing data message flow through multiple public clouds | |
| US12237990B2 (en) | Method for modifying an SD-WAN using metric-based heat maps | |
| CN115250210A (en) | Routing subnets of breakout gateways in a geographic area to a selected head-end gateway | |
| US20250071021A1 (en) | Configuring components of a software-defined network to automatically deploy and monitor logical edge routers for users | |
| US20250168101A1 (en) | Method for modifying an sd-wan using metric-based heat maps | |
| US20250112863A1 (en) | Gateway migration based on resource consumption | |
| EP4559165A1 (en) | Method for modifying an sd-wan using metric-based heat maps | |
| US20240147297A1 (en) | Methods for resilient multi cloud gateway interconnects |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
| AS | Assignment |
Owner name: VMWARE LLC, CALIFORNIA Free format text: CHANGE OF NAME;ASSIGNOR:VMWARE, INC.;REEL/FRAME:066692/0103 Effective date: 20231121 |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
| STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |
|
| AS | Assignment |
Owner name: VELOCLOUD NETWORKS, LLC, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:VMWARE, LLC;REEL/FRAME:072326/0693 Effective date: 20250629 |