Extension of a private cloud end-point group to a public cloud

Abstract
Disclosed are systems, methods and computer-readable storage medium for extending a private cloud to a public cloud. The private cloud can be extended to the public cloud by establishing a virtual private network between a private cloud and a public cloud, receiving one or more access control lists provisioned by the private cloud, determining contracts between an end point group of the private cloud and an end point group of the public cloud based on the one or more access control lists, and extending the end point group of the private cloud to the end point group of the public cloud across the virtual private network.
Description
TECHNICAL FIELD

The present technology pertains to extending a private cloud to a public cloud, and more specifically creating a hybrid cloud by extending an end point group of a private cloud to a public cloud for increasing capacity.


BACKGROUND

A “hybrid cloud” is a cloud infrastructure composed of two or more clouds that inter-operate or federate. A hybrid cloud can be an interaction between private and public clouds where a private cloud connects to a public cloud and utilizes public cloud resources in a secure and scalable way. The hybrid cloud model provides key advantages over other cloud models. For example, the hybrid cloud model allows enterprises to protect their existing investment; maintain control of their sensitive data and applications; and maintain control of their network, computing, and storage resources. Additionally, hybrid clouds allow enterprises to scale their environment on demand, (i.e., during periods of seasonal workload, etc.).


While many applications are suited for corporate datacenters, there are others whose dynamic compute requirements make them appropriate for cloud-based deployment. For such applications, the challenge is to take advantage of the computing elasticity and economics of cloud computing without sacrificing the security that the information assets (e.g., databases, directories, repositories) gain from being located on-premises within the business' datacenters. To be a viable hybrid cloud solution, data must be kept secure, applications need not be re-architected, and clouds should be readily mobile. This can be particular important for seasonal workloads.





BRIEF DESCRIPTION OF THE DRAWINGS

In order to describe the manner in which the above-recited and other advantages and features of the disclosure can be obtained, a more particular description of the principles briefly described above will be rendered by reference to specific embodiments that are illustrated in the appended drawings. Understanding that these drawings depict only example embodiments of the disclosure and are not therefore to be considered to be limiting of its scope, the principles herein are described and explained with additional specificity and detail through the use of the accompanying drawings in which:



FIG. 1 illustrates an example hybrid cloud architecture;



FIG. 2 illustrates an example of migrating a virtual machine in a hybrid cloud architecture;



FIG. 3 illustrates an example hybrid cloud wherein one private cloud is in communication with multiple public clouds;



FIG. 4 illustrates an example of extending an end point group of a private cloud to a public cloud;



FIG. 5 illustrates an example of extending tier of a private cloud to a public cloud;



FIG. 6 illustrates an example method of extending a private cloud to a public cloud;



FIG. 7A shows an exemplary possible system embodiment for implementing various embodiments of the present technology; and



FIG. 7B shows an exemplary possible system embodiment for implementing various embodiments of the present technology.





DESCRIPTION OF EXAMPLE EMBODIMENTS

Overview


Private clouds (e.g., enterprise datacenters, etc.) often have multiple end points in multiple groups or multiple tiers (web tier, application tier, database tier, etc.) securely, behind a firewall or other security devices. These multiple groups and tiers are managed locally or on-premise of the private cloud. Public clouds can run multiple groups or tiers as well, however, the public cloud is managed by the cloud provider network infrastructure. The different cloud management structures (between private clouds and public clouds) results in twice as much effort for an administrator (i.e., of a private cloud), along with contrasting security rules. Extending an end point group or tier of the private cloud to the public cloud (i.e., creating a hybrid cloud) can result in less effort by the administrator and streamline security rules between the private cloud and public cloud.


Disclosed are methods, systems and non-transitory computer-readable mediums for extending a private cloud to a public cloud. The extending of a private cloud to a public cloud can include establishing, by an orchestrator, a virtual private network between a private cloud and a public cloud, wherein the private cloud is behind a firewall. The orchestrator can receive one or more access control lists provisioned by the private cloud and determining contracts between an end point group of the private cloud and an end point group of the public cloud based on the one or more access control lists. The orchestrator can extend the end point group of the private cloud to the end point group of the public cloud across the virtual private network. The extending can further include enabling bi-directional communication between the end point group of the private cloud and the end point group of the public cloud.


The extending of a private cloud to a public cloud can include creating, by the orchestrator at the private cloud, a layer three connection bridge between the private cloud and the public cloud, wherein the layer three connection bridge is configured to enable communication from the end point group in the private cloud to the end point group in the public cloud. The layer three connection bridge can communicate with the end point group of the private network using a set of security and connectivity rules based on the contracts.


The extending of a private cloud to a public cloud can include the end point groups of the private cloud and the public cloud are in a web network tier and the orchestrator can be at the private cloud and/or at the public cloud.


Description


Various embodiments of the disclosure are discussed in detail below. While specific implementations are discussed, it should be understood that this is done for illustration purposes only. A person skilled in the relevant art will recognize that other components and configurations may be used without parting from the spirit and scope of the disclosure.


The disclosed technology addresses the need in the art for provisioning a router in a public cloud that can replicate some functionality of an enterprise router located on an enterprise network.


Cloud computing can be generally defined as Internet-based computing in which computing resources are dynamically provisioned and allocated to client or user computers or other devices on-demand from a collection of resources available via the network (e.g., “the cloud”). Cloud computing resources can include any type of resource such as computing, storage, network devices, virtual machines (VMs), etc. For example, cloud computing resources may include service devices (firewalls, deep packet inspectors, traffic monitors, etc.), processing devices (brute force processing capability), storage devices (e.g., servers, network attached storages, storage area network devices), etc., and may be used for instantiation of VMs, databases, applications (Apps), etc.


As noted above, a “hybrid cloud” is a cloud infrastructure composed of two or more clouds that inter-operate or federate. A hybrid cloud can be an interaction between private and public clouds where a private cloud joins a public cloud and utilizes public cloud resources in a secure and scalable way. While many applications end point groups, and/or tiers could remain within corporate datacenters, there are other applications, end point groups, and/or tiers whose dynamic compute requirements make them good candidates for the cloud. For such applications, end point groups and/or tiers, the challenge is to take advantage of the computing elasticity and economics of cloud computing without sacrificing the security that the information assets (e.g., database, directories, repositories) gain from being located on-premises within the business' datacenters. To be a viable hybrid cloud solution, data must be kept secure, applications need not be re-architected, and clouds should be readily mobile.



FIG. 1 illustrates an example hybrid cloud network illustratively comprising a plurality of networks or “clouds,” including a private cloud 105 (e.g., enterprise datacenters) and a public cloud 110 separated by a public network, such as the Internet (not shown). Although current terminology refers to a hybrid cloud comprising a private cloud and a public cloud, it should be understood that many aspects of this disclosure can be practiced in various multi-cloud configurations (e.g., two clouds hosted by third party providers or two enterprise clouds located in different locations). The private cloud 105 and public cloud 110 can be connected via a communication link 170 between cloud gateway 125 and cloud gateway 135. Data packets and traffic can be exchanged among the devices of the hybrid cloud network using predefined network communication protocols as will be understood by those skilled in the art.


As illustrated in FIG. 1, each cloud network element can have a cloud gateway 125 at the private cloud 105, a cloud gateway 135 at the public cloud 110, and at least one virtual machine (VM). For example, FIG. 1 illustrates multiple virtual machines (e.g. VM1150, VM2152), at the private cloud 105, and VM3154 (or nested VM containers) within the public cloud. The cloud gateway 125 at the private cloud can be configured as a VM running in the private cloud (e.g., enterprise datacenter) that is responsible to establish a communication link 170 for interconnecting the components in the public cloud with the private cloud. The cloud gateway 135 at the public cloud may be configured as a VM running in the public cloud that is responsible to establish the communication link 170 for connecting the cloud gateway 135 with cloud resources.



FIG. 1 also illustrates an orchestrator 175 (e.g., hybrid cloud manager) within the private cloud 105 which can be a management plane VM for auto-provisioning resources within the hybrid cloud solution. Specifically, the orchestrator 175 is a management platform (which could be a VM) running in the private network, and may be generally responsible for providing the hybrid cloud operations, translating between private cloud and public cloud interfaces, management of cloud resources, dynamic instantiating of cloud gateways and cloud VMs components (VM3154 in the public cloud 110) though the private virtualization platform and public cloud provider Application Program Interface (“API”). It may also health-monitor all the components (e.g., the cloud gateways, the one or more private application VMs, and the communication link 170 and provides high availability of those components.



FIG. 1 also illustrates a virtual supervisor module 130 (for example, the Nexus 1000V Switch by Cisco Systems, Inc.), a hypervisor 140 (also called a virtual machine manager) and one or more VM 150, 152. The virtual supervisor module 130 in the private cloud can be used to create VMs in the public or private cloud, such as VM1150, VM2152, and VM3154. Each VM hosts a private application, even VM3154 in the public cloud hosts a private application, and it is as though VM3154 in the public cloud were within the private cloud. The hypervisor 140 can be configured by the virtual supervisor module 130, and provides an operating system for one or more VMs.


As introduced above, FIG. 1 also illustrates communication link 170. Communication link can take several forms include a type of VPN, or a tunnel. Specifically, some hybrid cloud technologies utilize an open virtual private network (VPN) overlay or else an IP security (IPSec) VPN based L3 network extension to provide communication link 170. Communication between the private cloud and public cloud over communication link 170, can be controlled by access control lists, updated at the private cloud.



FIG. 2 illustrates a hybrid cloud environment as illustrated in FIG. 1 being used to migrate a VM from private cloud 105 to public cloud 110. Perhaps a VM on the private cloud needs to be scaled beyond the current resources of the private cloud, or perhaps the private cloud needs to be taken off line for a period of time. In either situation it can be desirable to migrate an application on the private cloud to the public cloud. FIG. 2 illustrates VM1150 on private cloud 105 being migrated to public cloud 110, where it is illustrated as VM11501. Migration is managed using virtual supervisor module 130 to take VM1150 offline, and migrated using orchestrator 175 to copy the VM1150 disk image to public cloud 110, and instantiate it in the public cloud. Orchestrator 175, can provision contracts (e.g., access control lists) between the private cloud 105 and public cloud 110 to enable VM1150 on the private cloud to be migrated to the public cloud.



FIG. 3 illustrates an example hybrid cloud environment. In FIG. 3, a public cloud 114 is running an application or service in VM4156. The application is shared by the enterprise private cloud 105 and partner private cloud 112. In such hybrid cloud environments a public cloud can act as an intermediary that provides limited access to the enterprise and the partner.


As shown in FIG. 1, private cloud 105 can be extended to public cloud 110 over communication link 170 (e.g., VPN, layer three bridge connection, etc.). Referring now to FIG. 4, which illustrates a creation of hybrid cloud 400 by extending an end point group (e.g., one or more end points) of private cloud 105 to public cloud 110 based, on contracts (e.g., based on one or more access control lists) provisioned at private cloud 105 (e.g., orchestrator 175, etc.). An end point is a network connection point identified by a media access control (MAC) address. An end point can be physical (e.g., network interface card in a server, router, switch, etc.). An end point can also be virtual (e.g., virtual network interface card in a virtual machine, etc.). An end point can join one or more end point groups based on specific criteria (e.g., IP subnet, switch interface, VLAN, tier, etc.). In some examples, the criteria can be predetermined. In some examples, the criteria can be dynamically determined. An end point group can include one or more physical or virtual end points from different hosts (e.g., servers, routers, switches, virtual machines, etc.) that belong to the same domain (e.g., private cloud 105, enterprise datacenter, etc.). Each domain can be managed by a single entity (e.g., administrator of private cloud).


For example, private cloud 105 can include one or more local end point groups (e.g., 460, 462). These local end point groups are created by an administrator and can include one or more end points in the private cloud, as described above. Local end point group 460 can communicate with local end point group 462 using contract 468. Contract 468 is created by the administrator and can be based (or include) one or more access control lists. The access control lists can include one or more of access control entries that identify a trustee and specify the access rights allowed, denied, or audited for that trustee.


In some examples, private cloud 105 can include one or more private orchestrator end point groups (e.g., 464, 466). The private orchestrator end point groups are created by the orchestrator 175 based on one or more contracts (e.g., one or more access control lists). For example, orchestrator 175 can determine contract 472 exists between private orchestrator end point group 464 and local end point group 462. In response to determining contract 472 exists, orchestrator 175 can configure security and connectivity rules to enable communication between end points 462, 464. Orchestrator 175 can also determine contract 470 exists between private orchestrator end point group 466 and local end point group 460. In response to determining contract 470 exists, orchestrator 175 can configure security and connectivity rules to enable communication between end points 460, 466.


In some examples, public cloud 110 can include one or more public orchestrator end point groups (e.g., 474, 476). The public orchestrator end point groups are created by the orchestrator. Orchestrator 175 can create contracts (for communication between end point groups and/or tiers) between private cloud 105 and public cloud 110. The contracts can be created based on access control lists provisioned by private cloud 105. For example, contract 478 can enable communication between public orchestrator end point group 474 and 476. Contracts can also enable communication between two or more end points in private cloud 105 and public cloud 110. For example, contract 480 can extend (e.g., enable communication) between private orchestrator end point group 466 and public orchestrator end point group 474; and contract 482 can extend (e.g., enable communication) between private orchestrator end point group 464 and public orchestrator end point group 476. In each of these preceding examples, orchestrator 175 extends the private end point group into the public cloud by configuring security and connectivity rules for data communication between the end points specified in the contract over communication link 170 (e.g., VPN). The security and connectivity rules are configured on both private cloud 105 and public cloud 110. Orchestrator 175 can perform the extension and configuration of security and connectivity rules automatically after determining (or creating) a contract (based on access control lists) specification the connection of two or more end points exists. As illustrated in hybrid cloud 500 of FIG. 5, multiple tiers (e.g., web tier 580, application tier 582, database tier 584) of private cloud 105 can be extended into public cloud 110. Public cloud 110 and private cloud 105 can join together to form a “hybrid cloud.” End point groups in the hybrid cloud can be managed and connected based on contracts configured by an administrator of public cloud 110 or an orchestrator 175. In some examples, end point groups can be tiers (e.g., web tier 580, application tier 582, database tier 582). Accordingly, an entire tier (e.g., end point group) can be extended from private cloud 105 to public cloud 110 by communication link 170 (e.g., VPN). In some examples, each tier can be include a firewall. The firewall can regulate the incoming and outgoing traffic of the associated tier (or end point group).



FIG. 5 further illustrates the extension of web tier 580 from private cloud 105 to public cloud 110. Orchestrator 175 can (e.g., automatically) determine (or create) one or more contracts (e.g., based access control lists) of private cloud 105. The one or more contracts can include allowable communication between web tier 580 (e.g., private orchestrator end point group) of private cloud 105 and web tier 581 (e.g., public orchestrator end point group) of public cloud 110. In response to determining (or creating) the one or more contracts, orchestrator 175 can, (e.g., automatically) configure security and connectivity rules (e.g., contracts, access control lists, etc.) at the private cloud 105 and similarly configure security and connectivity rules at public cloud 110. Once orchestrator 175 has configured both the security and connectivity rules on private cloud 105 and public cloud 110, web tier 580 is extended from private cloud 105 to public cloud 110. The extension across communication link 170, enables public end points (e.g., web5, web6, web7, etc.) of web tier 581 to operate as though they are private end points (e.g., web1, web2, web3, web4, etc.) of web tier 580. Once the security and connectivity rules are automatically provisioned by orchestrator 175 and web tier 580 is extended to the public cloud 110, a user (i.e., of web tier 580) will experience access to web tier 580 as if is was all end points were located within private cloud 105 (i.e., transparent to the extension into public cloud 110).


In some examples, orchestrator 175 can also provide monitoring and troubleshooting of the extended web tier 581 and associated public end points (e.g., web5, web6, web7, etc.) of public cloud 110. The monitoring and troubleshooting of extended web tier 581 is substantially equivalent to the monitoring and troubleshooting of the web tier 580 of private cloud 105. Monitoring and troubleshooting can include, but is not limited to, statistics, faults, events, audit logs, permit flow logs, deny flow logs, etc. Orchestrator 175 can provide, an administrator, a consolidated view of these aspects across the private cloud 105 and public cloud 110 (e.g., by aggregating the data across the private and public clouds and presenting the data to the administrator as if all end points are within the private cloud.) In some examples, data requested by a user, residing on an end point (e.g., web5, web6, web7, etc.) can be retrieved on demand upon request or query by the user. In some examples, data can be periodically fetched by the private cloud and stored locally.


The method shown in FIG. 6 is provided by way of example, as there are a variety of ways to carry out the method. Additionally, while the example method is illustrated with a particular order of sequences, those of ordinary skill in the art will appreciate that FIG. 6 and the sequences shown therein can be executed in any order that accomplishes the technical advantages of the present disclosure and can include fewer or more sequences than illustrated.


Each sequence shown in FIG. 6 represents one or more processes, methods or subroutines, carried out in the example method. The sequences shown in FIG. 6 can be implemented in a system such as hybrid clouds 100, 400, and 500 shown in FIGS. 1, 4, and 5. The flow chart illustrated in FIG. 6 will be described in relation to and make reference to at least the elements of hybrid clouds 100, 400, and 500 shown in FIGS. 1, 4, and 5.


Method 600 can begin at step 610. At step 610, a virtual private network can be established between a private cloud and a public cloud. For example, orchestrator 175 can establish, from private cloud 105, a virtual private network for bi-directional communication with public cloud 110.


At step 620, the orchestrator can receive one or more access control lists. For example, orchestrator 175 can receive an access control list provisioned by private cloud 105. In some examples, the access control list can be provisioned by an administrator. In some examples, the access control lists can be stored and transmitted to the orchestrator by an end point.


At step 630, the orchestrator can determine contracts between one or more end point groups. For example, orchestrator 175 can determine (or create) contracts (e.g., for communication between end point groups) based on the received access control lists. In some examples, the contracts can be for communication between one or more end points groups (e.g., 460, 462, 464, 466) within private cloud 105. In some examples, the contracts can be for communication between one or more end points groups (e.g., 460, 462, 464, 466) in private cloud 105 and one or more end points groups (e.g., 474, 476) in public cloud 110. In some examples, an end point group can be a tier level (e.g., web tier 580, application tier 582, database tier 584, etc.)


At step 640, the orchestrator can extend the end point group of the private cloud to the end point group of the public cloud. For examples, end point group 466 can be extended to end point group 474 through communication link 170 based on the contracts. The extension enables a user of an end point (of end point group 466) to access end points in group 474 transparently (i.e., without knowing the end point is in public cloud 110).



FIG. 7A and FIG. 7B show exemplary possible system embodiments. The more appropriate embodiment will be apparent to those of ordinary skill in the art when practicing the present technology. Persons of ordinary skill in the art will also readily appreciate that other system embodiments are possible.



FIG. 7A illustrates a conventional system bus computing system architecture 700 wherein the components of the system are in electrical communication with each other using a bus 70. Exemplary computing system 700 includes a processing unit (CPU or processor) 710 and a system bus 705 that couples various system components including the system memory 715, such as read only memory (ROM) 720 and random access memory (RAM) 725, to the processor 710. The system 700 can include a cache of high-speed memory connected directly with, in close proximity to, or integrated as part of the processor 710. The system 700 can copy data from the memory 715 and/or the storage device 730 to the cache 712 for quick access by the processor 710. In this way, the cache can provide a performance boost that avoids processor 710 delays while waiting for data. These and other modules can control or be configured to control the processor 710 to perform various actions. Other system memory 715 may be available for use as well. The memory 715 can include multiple different types of memory with different performance characteristics. The processor 710 can include any general purpose processor and a hardware module or software module, such as module 1732, module 2734, and module 3736 stored in storage device 730, configured to control the processor 710 as well as a special-purpose processor where software instructions are incorporated into the actual processor design. The processor 710 may essentially be a completely self-contained computing system, containing multiple cores or processors, a bus, memory controller, cache, etc. A multi-core processor may be symmetric or asymmetric.


To enable user interaction with the computing system 700, an input device 745 can represent any number of input mechanisms, such as a microphone for speech, a touch-sensitive screen for gesture or graphical input, keyboard, mouse, motion input, speech and so forth. An output device 735 can also be one or more of a number of output mechanisms known to those of skill in the art. In some instances, multimodal systems can enable a user to provide multiple types of input to communicate with the computing system 700. The communications interface 740 can generally govern and manage the user input and system output. There is no restriction on operating on any particular hardware arrangement and therefore the basic features here may easily be substituted for improved hardware or firmware arrangements as they are developed.


Storage device 730 is a non-volatile memory and can be a hard disk or other types of computer readable media which can store data that are accessible by a computer, such as magnetic cassettes, flash memory cards, solid state memory devices, digital versatile disks, cartridges, random access memories (RAMs) 725, read only memory (ROM) 720, and hybrids thereof.


The storage device 730 can include software modules 732, 734, 736 for controlling the processor 710. Other hardware or software modules are contemplated. The storage device 730 can be connected to the system bus 705. In one aspect, a hardware module that performs a particular function can include the software component stored in a computer-readable medium in connection with the necessary hardware components, such as the processor 710, bus 705, display 735, and so forth, to carry out the function.



FIG. 7B illustrates a computer system 750 having a chipset architecture that can be used in executing the described method and generating and displaying a graphical user interface (GUI). Computer system 750 is an example of computer hardware, software, and firmware that can be used to implement the disclosed technology. System 750 can include a processor 755, representative of any number of physically and/or logically distinct resources capable of executing software, firmware, and hardware configured to perform identified computations. Processor 755 can communicate with a chipset 760 that can control input to and output from processor 755. In this example, chipset 760 outputs information to output 765, such as a display, and can read and write information to storage device 770, which can include magnetic media, and solid state media, for example. Chipset 760 can also read data from and write data to RAM 775. A bridge 780 for interfacing with a variety of user interface components 785 can be provided for interfacing with chipset 760. Such user interface components 785 can include a keyboard, a microphone, touch detection and processing circuitry, a pointing device, such as a mouse, and so on. In general, inputs to system 750 can come from any of a variety of sources, machine generated and/or human generated.


Chipset 760 can also interface with one or more communication interfaces 790 that can have different physical interfaces. Such communication interfaces can include interfaces for wired and wireless local area networks, for broadband wireless networks, as well as personal area networks. Some applications of the methods for generating, displaying, and using the GUI disclosed herein can include receiving ordered datasets over the physical interface or be generated by the machine itself by processor 755 analyzing data stored in storage 770 or 775. Further, the machine can receive inputs from a user via user interface components 785 and execute appropriate functions, such as browsing functions by interpreting these inputs using processor 755.


It can be appreciated that exemplary systems 700 and 750 can have more than one processor 710 or be part of a group or cluster of computing devices networked together to provide greater processing capability.


For clarity of explanation, in some instances the present technology may be presented as including individual functional blocks including functional blocks comprising devices, device components, steps or routines in a method embodied in software, or combinations of hardware and software.


In some embodiments the computer-readable storage devices, mediums, and memories can include a cable or wireless signal containing a bit stream and the like. However, when mentioned, non-transitory computer-readable storage media expressly exclude media such as energy, carrier signals, electromagnetic waves, and signals per se.


Methods according to the above-described examples can be implemented using computer-executable instructions that are stored or otherwise available from computer readable media. Such instructions can comprise, for example, instructions and data which cause or otherwise configure a general purpose computer, special purpose computer, or special purpose processing device to perform a certain function or group of functions. Portions of computer resources used can be accessible over a network. The computer executable instructions may be, for example, binaries, intermediate format instructions such as assembly language, firmware, or source code. Examples of computer-readable media that may be used to store instructions, information used, and/or information created during methods according to described examples include magnetic or optical disks, flash memory, USB devices provided with non-volatile memory, networked storage devices, and so on.


Devices implementing methods according to these disclosures can comprise hardware, firmware and/or software, and can take any of a variety of form factors. Typical examples of such form factors include laptops, smart phones, small form factor personal computers, personal digital assistants, rackmount devices, standalone devices, and so on. Functionality described herein also can be embodied in peripherals or add-in cards. Such functionality can also be implemented on a circuit board among different chips or different processes executing in a single device, by way of further example.


The instructions, media for conveying such instructions, computing resources for executing them, and other structures for supporting such computing resources are means for providing the functions described in these disclosures.


Although a variety of examples and other information was used to explain aspects within the scope of the appended claims, no limitation of the claims should be implied based on particular features or arrangements in such examples, as one of ordinary skill would be able to use these examples to derive a wide variety of implementations. Further and although some subject matter may have been described in language specific to examples of structural features and/or method steps, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to these described features or acts. For example, such functionality can be distributed differently or performed in components other than those identified herein. Rather, the described features and steps are disclosed as examples of components of systems and methods within the scope of the appended claims. Moreover, claim language reciting “at least one of” a set indicates that one member of the set or multiple members of the set satisfy the claim.

Claims
  • 1. A method of extending a private cloud to a public cloud, the method comprising: establishing, by an orchestrator, a virtual private network between a private cloud and a public cloud, wherein the private cloud is behind a firewall;receiving, by the orchestrator, one or more access control lists provisioned by the private cloud;determining, by the orchestrator, contracts between an end point group of the private cloud and an end point group of the public cloud based on the one or more access control lists;extending, by the orchestrator, the end point group of the private cloud to the end point group of the public cloud across the virtual private network; andmonitoring and troubleshooting, by the orchestrator, the end point group of the public clouds and associated public endpoints of the public cloud.
  • 2. The method of claim 1, wherein the extending further comprising: enabling bi-directional communication between the end point group of the private cloud and the end point group of the public cloud.
  • 3. The method of claim 1, further comprising: creating, by the orchestrator at the private cloud, a layer three connection bridge between the private cloud and the public cloud, wherein the layer three connection bridge is configured to enable communication from the end point group in the private cloud to the end point group in the public cloud.
  • 4. The method of claim 3, wherein the layer three connection bridge communicates with the end point group of the private network using a set of security and connectivity rules based on the contracts.
  • 5. The method of claim 1, wherein the end point groups of the private cloud and the public cloud are in a web network tier.
  • 6. The method of claim 1, wherein the orchestrator is at the private cloud.
  • 7. The method of claim 1, wherein the orchestrator is at the public cloud.
  • 8. An orchestrator of a private cloud comprising: a processor device; anda computer-readable storage medium device having stored therein instructions which, when executed by the processor device, cause the processor device to: establish a virtual private network between a private cloud and a public cloud, wherein the private cloud is behind a firewall;receive one or more access control lists provisioned by the private cloud;determine contracts between an end point group of the private cloud and an end point group of the public cloud based on the one or more access control lists;extend the end point group of the private cloud to the end point group of the public cloud across the virtual private network; andmonitoring and troubleshooting the end point group of the public cloud and associated public endpoints of the public cloud.
  • 9. The orchestrator of claim 8, comprising further instructions which, when executed by the processor device, cause the processor to: enable bi-directional communication between the end point group of the private cloud and the end point group of the public cloud.
  • 10. The orchestrator of claim 8, comprising further instructions which, when executed by the processor device, cause the processor device to: create, at the private cloud, a layer three connection bridge between the private cloud and the public cloud, wherein the layer three connection bridge is configured to enable communication from the end point group in the private cloud to the end point group in the public cloud.
  • 11. The orchestrator of claim 10, wherein the layer three connection bridge communicates with the end point group of the virtual private network using a set of security and connectivity rules based on the contracts.
  • 12. The orchestrator of claim 8, wherein the end point groups of the private cloud and the public cloud are in a web network tier.
  • 13. The orchestrator of claim 8, wherein the orchestrator is at the private cloud.
  • 14. The orchestrator of claim 8, wherein the orchestrator is at the public cloud.
  • 15. A non-transitory computer-readable storage medium having stored therein instructions which, when executed by a processor of an orchestrator, cause the processor to perform operations comprising: establish a virtual private network between a private cloud and a public cloud, wherein the private cloud is behind a firewall;receive one or more access control lists provisioned by the private cloud;determine contracts between an end point group of the private cloud and an end point group of the public cloud based on the one or more access control lists;extend the end point group of the private cloud to the end point group of the public cloud across the virtual private network; andmonitor and troubleshoot, by the orchestrator, the end point group of the public cloud and associated public endpoints of the public cloud.
  • 16. The non-transitory computer-readable storage medium of claim 15, the operations further comprising: enable bi-directional communication between the end point group of the private cloud and the end point group of the public cloud.
  • 17. The non-transitory computer-readable storage medium of claim 15, the operation further comprising: create, at the private cloud, a layer three connection bridge between the private cloud and the public cloud, wherein the layer three connection bridge is configured to enable communication from the end point group in the private cloud to the end point group in the public cloud.
  • 18. The non-transitory computer-readable storage medium of claim 17, wherein the layer three connection bridge communicates with the end point group of the virtual private network using a set of security and connectivity rules based on the contracts.
  • 19. The non-transitory computer-readable storage medium of claim 15, wherein the end point groups of the private cloud and the public cloud are in a web network tier.
  • 20. The non-transitory computer-readable storage medium of claim 15, wherein the orchestrator is at the private cloud.
US Referenced Citations (276)
Number Name Date Kind
6108782 Fletcher et al. Aug 2000 A
6178453 Mattaway et al. Jan 2001 B1
6298153 Oishi Oct 2001 B1
6343290 Cossins et al. Jan 2002 B1
6721804 Rubin et al. Apr 2004 B1
6733449 Krishnamurthy et al. May 2004 B1
7028098 Mate et al. Apr 2006 B2
7054930 Cheriton May 2006 B1
7277948 Igarashi et al. Oct 2007 B2
7480672 Hahn et al. Jan 2009 B2
7496043 Leong et al. Feb 2009 B1
7881957 Cohen et al. Feb 2011 B1
7917647 Cooper et al. Mar 2011 B2
8028071 Mahalingam et al. Sep 2011 B1
8041714 Aymeloglu et al. Oct 2011 B2
8171415 Appleyard et al. May 2012 B2
8234377 Cohn Jul 2012 B2
8244559 Horvitz et al. Aug 2012 B2
8250215 Stienhans et al. Aug 2012 B2
8280880 Aymeloglu et al. Oct 2012 B1
8301746 Head et al. Oct 2012 B2
8345692 Smith Jan 2013 B2
8406141 Couturier et al. Mar 2013 B1
8407413 Yucel et al. Mar 2013 B1
8448171 Donnellan et al. May 2013 B2
8477610 Zuo et al. Jul 2013 B2
8495356 Ashok et al. Jul 2013 B2
8514868 Hill Aug 2013 B2
8532108 Li et al. Sep 2013 B2
8533687 Greifeneder et al. Sep 2013 B1
8547974 Guruswamy et al. Oct 2013 B1
8560663 Baucke et al. Oct 2013 B2
8590050 Nagpal et al. Nov 2013 B2
8630291 Shaffer et al. Jan 2014 B2
8639787 Lagergren et al. Jan 2014 B2
8660129 Brendel et al. Feb 2014 B1
8719804 Jain May 2014 B2
8775576 Hebert et al. Jul 2014 B2
8805951 Faibish et al. Aug 2014 B1
8850182 Fritz et al. Sep 2014 B1
8856339 Mestery et al. Oct 2014 B2
8909928 Ahmad et al. Dec 2014 B2
8918510 Gmach et al. Dec 2014 B2
8924720 Raghuram et al. Dec 2014 B2
8930747 Levijarvi et al. Jan 2015 B2
8938775 Roth et al. Jan 2015 B1
8977754 Curry, Jr. et al. Mar 2015 B2
9009697 Breiter et al. Apr 2015 B2
9015324 Jackson Apr 2015 B2
9043439 Bicket et al. May 2015 B2
9049115 Rajendran et al. Jun 2015 B2
9063789 Beaty et al. Jun 2015 B2
9065727 Liu et al. Jun 2015 B1
9075649 Bushman et al. Jul 2015 B1
9111013 Cheriton Aug 2015 B2
9164795 Vincent Oct 2015 B1
9167050 Durazzo et al. Oct 2015 B2
9201704 Chang et al. Dec 2015 B2
9203784 Chang et al. Dec 2015 B2
9223634 Chang et al. Dec 2015 B2
9244776 Koza et al. Jan 2016 B2
9251114 Ancin Feb 2016 B1
9264478 Hon et al. Feb 2016 B2
9313048 Chang et al. Apr 2016 B2
9361192 Smith et al. Jun 2016 B2
9380075 He et al. Jun 2016 B2
9473365 Melander et al. Oct 2016 B2
9503530 Niedzielski Nov 2016 B1
9558078 Farlee et al. Jan 2017 B2
9613078 Vermeulen et al. Apr 2017 B2
9628471 Sundaram et al. Apr 2017 B1
9658876 Chang et al. May 2017 B2
9692802 Bicket et al. Jun 2017 B2
9755858 Bagepalli et al. Sep 2017 B2
9825902 Sharma et al. Nov 2017 B1
20020073337 Ioele et al. Jun 2002 A1
20020143928 Maltz et al. Oct 2002 A1
20020166117 Abrams et al. Nov 2002 A1
20020174216 Shorey et al. Nov 2002 A1
20030018591 Komisky Jan 2003 A1
20030228585 Inoko et al. Dec 2003 A1
20040095237 Chen et al. May 2004 A1
20050060418 Sorokopud Mar 2005 A1
20060087962 Golia et al. Apr 2006 A1
20060126665 Ward et al. Jun 2006 A1
20070242830 Conrado et al. Oct 2007 A1
20080165778 Ertemalp Jul 2008 A1
20080201711 Amir Husain Aug 2008 A1
20080235755 Blaisdell et al. Sep 2008 A1
20090006527 Gingell, Jr. et al. Jan 2009 A1
20090019367 Cavagnari et al. Jan 2009 A1
20090083183 Rao et al. Mar 2009 A1
20090138763 Arnold May 2009 A1
20090177775 Radia et al. Jul 2009 A1
20090265468 Annambhotla et al. Oct 2009 A1
20090265753 Anderson et al. Oct 2009 A1
20090293056 Ferris Nov 2009 A1
20090300608 Ferris et al. Dec 2009 A1
20090313562 Appleyard et al. Dec 2009 A1
20090323706 Germain et al. Dec 2009 A1
20090328031 Pouyadou et al. Dec 2009 A1
20100042720 Stienhans et al. Feb 2010 A1
20100061250 Nugent Mar 2010 A1
20100131765 Bromley et al. May 2010 A1
20100191783 Mason et al. Jul 2010 A1
20100192157 Jackson et al. Jul 2010 A1
20100205601 Abbas et al. Aug 2010 A1
20100211782 Auradkar et al. Aug 2010 A1
20100318609 Lahiri et al. Dec 2010 A1
20100325199 Park et al. Dec 2010 A1
20100325441 Laurie et al. Dec 2010 A1
20100333116 Prahlad et al. Dec 2010 A1
20110016214 Jackson Jan 2011 A1
20110035754 Srinivasan Feb 2011 A1
20110055396 Dehaan Mar 2011 A1
20110055398 Dehaan et al. Mar 2011 A1
20110072489 Parann-Nissany Mar 2011 A1
20110075667 Li et al. Mar 2011 A1
20110126099 Anderson et al. May 2011 A1
20110138055 Daly et al. Jun 2011 A1
20110145390 Kakadia et al. Jun 2011 A1
20110145413 Dawson et al. Jun 2011 A1
20110173303 Rider Jul 2011 A1
20110185063 Head et al. Jul 2011 A1
20110213966 Fu et al. Sep 2011 A1
20110219434 Betz et al. Sep 2011 A1
20110231899 Pulier et al. Sep 2011 A1
20110239039 Dieffenbach et al. Sep 2011 A1
20110252327 Awasthi et al. Oct 2011 A1
20110261828 Smith Oct 2011 A1
20110276675 Singh et al. Nov 2011 A1
20110276951 Jain Nov 2011 A1
20110295998 Ferris et al. Dec 2011 A1
20110305149 Scott et al. Dec 2011 A1
20110307531 Gaponenko et al. Dec 2011 A1
20110320870 Kenigsberg et al. Dec 2011 A1
20120005724 Lee Jan 2012 A1
20120054367 Ramakrishnan et al. Mar 2012 A1
20120072318 Akiyama et al. Mar 2012 A1
20120072578 Alam Mar 2012 A1
20120072581 Tung et al. Mar 2012 A1
20120072985 Davne et al. Mar 2012 A1
20120072992 Arasaratnam et al. Mar 2012 A1
20120084445 Brock et al. Apr 2012 A1
20120084782 Chou et al. Apr 2012 A1
20120096134 Suit Apr 2012 A1
20120102193 Rathore et al. Apr 2012 A1
20120102199 Hopmann et al. Apr 2012 A1
20120117571 Davis et al. May 2012 A1
20120131174 Ferris et al. May 2012 A1
20120137215 Kawara May 2012 A1
20120158967 Sedayao et al. Jun 2012 A1
20120167094 Suit Jun 2012 A1
20120173710 Rodriguez Jul 2012 A1
20120179909 Sagi et al. Jul 2012 A1
20120180044 Donnellan et al. Jul 2012 A1
20120182891 Lee et al. Jul 2012 A1
20120185913 Martinez et al. Jul 2012 A1
20120192016 Gotesdyner et al. Jul 2012 A1
20120192075 Ebtekar et al. Jul 2012 A1
20120214506 Skaaksrud et al. Aug 2012 A1
20120222106 Kuehl Aug 2012 A1
20120240113 Hur Sep 2012 A1
20120265976 Spiers et al. Oct 2012 A1
20120281706 Agarwal et al. Nov 2012 A1
20120281708 Chauhan et al. Nov 2012 A1
20120290647 Ellison et al. Nov 2012 A1
20120297238 Watson et al. Nov 2012 A1
20120311106 Morgan Dec 2012 A1
20120311568 Jansen Dec 2012 A1
20120324092 Brown et al. Dec 2012 A1
20120324114 Dutta et al. Dec 2012 A1
20130003567 Gallant et al. Jan 2013 A1
20130036213 Hasan et al. Feb 2013 A1
20130044636 Koponen et al. Feb 2013 A1
20130066940 Shao Mar 2013 A1
20130080509 Wang Mar 2013 A1
20130091557 Gurrapu Apr 2013 A1
20130097601 Podvratnik et al. Apr 2013 A1
20130111540 Sabin May 2013 A1
20130117337 Dunham May 2013 A1
20130124712 Parker May 2013 A1
20130125124 Kempf et al. May 2013 A1
20130138816 Kuo et al. May 2013 A1
20130144978 Jain et al. Jun 2013 A1
20130152076 Patel Jun 2013 A1
20130152175 Hromoko et al. Jun 2013 A1
20130159496 Hamilton et al. Jun 2013 A1
20130160008 Cawlfield et al. Jun 2013 A1
20130162753 Hendrickson et al. Jun 2013 A1
20130179941 McGloin et al. Jul 2013 A1
20130182712 Aguayo et al. Jul 2013 A1
20130185433 Zhu et al. Jul 2013 A1
20130191106 Kephart et al. Jul 2013 A1
20130198374 Zalmanovitch et al. Aug 2013 A1
20130204849 Chacko Aug 2013 A1
20130232491 Radhakrishnan et al. Sep 2013 A1
20130246588 Borowicz et al. Sep 2013 A1
20130283364 Chang Oct 2013 A1
20130297769 Chang et al. Nov 2013 A1
20130318240 Hebert et al. Nov 2013 A1
20130318546 Kothuri et al. Nov 2013 A1
20130339949 Spiers et al. Dec 2013 A1
20140006481 Frey et al. Jan 2014 A1
20140006585 Dunbar et al. Jan 2014 A1
20140016476 Dietz et al. Jan 2014 A1
20140040473 Ho et al. Feb 2014 A1
20140040883 Tompkins Feb 2014 A1
20140052877 Mao Feb 2014 A1
20140075357 Flores et al. Mar 2014 A1
20140075501 Srinivasan et al. Mar 2014 A1
20140108985 Scott et al. Apr 2014 A1
20140122560 Ramey et al. May 2014 A1
20140141720 Princen et al. May 2014 A1
20140156557 Zeng et al. Jun 2014 A1
20140164486 Ravichandran et al. Jun 2014 A1
20140189095 Lindberg et al. Jul 2014 A1
20140189125 Amies et al. Jul 2014 A1
20140222953 Karve et al. Aug 2014 A1
20140244851 Lee Aug 2014 A1
20140280805 Sawalha Sep 2014 A1
20140282536 Dave et al. Sep 2014 A1
20140282889 Ishaya et al. Sep 2014 A1
20140297569 Clark et al. Oct 2014 A1
20140317261 Shatzkamer et al. Oct 2014 A1
20140366155 Chang et al. Dec 2014 A1
20140369204 Anand et al. Dec 2014 A1
20140372582 Ghanwani et al. Dec 2014 A1
20150043576 Dixon et al. Feb 2015 A1
20150052247 Threefoot et al. Feb 2015 A1
20150052517 Raghu et al. Feb 2015 A1
20150058382 St. Laurent et al. Feb 2015 A1
20150058459 Amendjian et al. Feb 2015 A1
20150071285 Kumar et al. Mar 2015 A1
20150081762 Mason et al. Mar 2015 A1
20150100471 Curry, Jr. et al. Apr 2015 A1
20150106802 Ivanov et al. Apr 2015 A1
20150106805 Melander et al. Apr 2015 A1
20150120914 Wada et al. Apr 2015 A1
20150149828 Mukerji May 2015 A1
20150227405 Jan et al. Aug 2015 A1
20150242204 Hassine et al. Aug 2015 A1
20150249709 Teng Sep 2015 A1
20150280980 Bitar Oct 2015 A1
20150281067 Wu Oct 2015 A1
20150281113 Siciliano et al. Oct 2015 A1
20150319063 Zourzouvillys et al. Nov 2015 A1
20150326524 Tankala et al. Nov 2015 A1
20150373108 Fleming et al. Dec 2015 A1
20160062786 Meng et al. Mar 2016 A1
20160065417 Sapuram Mar 2016 A1
20160094398 Choudhury et al. Mar 2016 A1
20160099847 Melander et al. Apr 2016 A1
20160105393 Thakkar et al. Apr 2016 A1
20160127184 Bursell May 2016 A1
20160134557 Steinder et al. May 2016 A1
20160164914 Madhav Jun 2016 A1
20160188527 Cherian et al. Jun 2016 A1
20160226755 Hammam et al. Aug 2016 A1
20160253078 Ebtekar et al. Sep 2016 A1
20160254968 Ebtekar et al. Sep 2016 A1
20160261564 Foxhoven et al. Sep 2016 A1
20160277368 Narayanaswamy et al. Sep 2016 A1
20160378389 Hrischuk Dec 2016 A1
20170005948 Melander et al. Jan 2017 A1
20170024260 Chandrasekaran et al. Jan 2017 A1
20170026470 Bhargava et al. Jan 2017 A1
20170041342 Efremov et al. Feb 2017 A1
20170054659 Ergin et al. Feb 2017 A1
20170097841 Chang et al. Apr 2017 A1
20170099188 Chang et al. Apr 2017 A1
20170104755 Arregoces et al. Apr 2017 A1
20170147297 Krishnamurthy et al. May 2017 A1
20170171158 Hoy Jun 2017 A1
20170264663 Bicket et al. Sep 2017 A1
20170339070 Chang et al. Nov 2017 A1
Foreign Referenced Citations (15)
Number Date Country
101719930 Jun 2010 CN
101394360 Jul 2011 CN
102164091 Aug 2011 CN
102918499 Feb 2013 CN
104320342 Jan 2015 CN
105740084 Jul 2016 CN
2228719 Sep 2010 EP
2439637 Apr 2012 EP
2648098 Oct 2013 EP
2645253 Nov 2014 EP
10-2015-0070676 May 2015 KR
M394537 Dec 2010 TW
WO 2009155574 Dec 2009 WO
WO 2010030915 Mar 2010 WO
WO 2013158707 Oct 2013 WO
Non-Patent Literature Citations (55)
Entry
Extended European Search Report from the European Patent Office for the corresponding European Patent Application No. 17181901.4, dated Sep. 8, 2017, 10 pages.
Kunz, Thomas, et al., “OmniCloud—The Secure and Flexible Use of Cloud Storage Services,” 2014, retrieved from the internet at https://www.omnicloud.sit.fraunhofer.de/download/omnicloud-whitepaper-en.pdf on Sep. 13, 2017, 30 pages.
Amedro, Brian, et al., “An Efficient Framework for Running Applications on Clusters, Grids and Cloud,” 2010, 17 pages.
Author Unknown, “5 Benefits of a Storage Gateway in the Cloud,” Blog, TwinStrata, Inc., Jul. 25, 2012, XP055141645, 4 pages, https://web.archive.org/web/20120725092619/http://blog.twinstrata.com/2012/07/10//5-benefits-of-a-storage-gateway-in-the-cloud.
Author Unknown, “Joint Cisco and VMWare Solution for Optimizing Virtual Desktop Delivery: Data Center 3.0: Solutions to Accelerate Data Center Virtualization,” Cisco Systems, Inc. and VMware, Inc., Sep. 2008, 10 pages.
Author Unknown, “A Look at DeltaCloud: The Multi-Cloud API,” Feb. 17, 2012, 4 pages.
Author Unknown, “About Deltacloud,” Apache Software Foundation, Aug. 18, 2013, 1 page.
Author Unknown, “Architecture for Managing Clouds, A White Paper from the Open Cloud Standards Incubator,” Version 1.0.0, Document No. DSP-IS0102, Jun. 18, 2010, 57 pages.
Author Unknown, “Cloud Infrastructure Management Interface—Common Information Model (CIMI-CIM),” Document No. DSP0264, Version 1.0.0, Dec. 14, 2012, 21 pages.
Author Unknown, “Cloud Infrastructure Management Interface (CIMI) Primer,” Document No. DSP2027, Version 1.0.1, Sep. 12, 2012, 30 pages.
Author Unknown, “cloudControl Documentation,” Aug. 25, 2013, 14 pages.
Author Unknown, “Interoperable Clouds, A White Paper from the Open Cloud Standards Incubator,” Version 1.0.0, Document No. DSP-IS0101, Nov. 11, 2009, 21 pages.
Author Unknown, “Microsoft Cloud Edge Gateway (MCE) Series Appliance,” Iron Networks, Inc., 4 pages.
Author Unknown, “Open Data Center Alliance Usage: Virtual Machine (VM) Interoperability in a Hybrid Cloud Environment Rev. 1.2,” Open Data Center Alliance, Inc., 2013, 18 pages.
Author Unknown, “Real-Time Performance Monitoring on Juniper Networks Devices, Tips and Tools for Assessing and Analyzing Network Efficiency,” Juniper Networks, Inc., May 2010, 35 pages.
Author Unknown, “Use Cases and Interactions for Managing Clouds, A White Paper from the Open Cloud Standards Incubator,” Version 1.0.0, Document No. DSP-IS00103, Jun. 16, 2010, 75 pages.
Beyer, Steffen, “Module “Data::Locations?!”,” YAPC::Europe, London, UK,ICA, Sep. 22-24, 2000, XP002742700, 15 pages.
Borovick, Lucinda, et al., “Architecting the Network for the Cloud,” IDC White Paper, Jan. 2011, 8 pages.
Bosch, Greg, “Virtualization,” last modified Apr. 2012 by B. Davison, 33 pages.
Broadcasters Audience Research Board, “What's Next,” http://Iwww.barb.co.uk/whats-next, accessed Jul. 22, 2015, 2 pages.
Cisco Systems, Inc. “Best Practices in Deploying Cisco Nexus 1000V Series Switches on Cisco UCS B and C Series Cisco UCS Manager Servers,” Cisco White Paper, Apr. 2011, 36 pages, http://www.cisco.com/en/US/prod/collateral/switches/ps9441/ps9902/white_paper_c11-558242.pdf.
Cisco Systems, Inc., “Cisco Unified Network Services: Overcome Obstacles to Cloud-Ready Deployments,” Cisco White Paper, Jan. 2011, 6 pages.
Cisco Systems, Inc., “Cisco Intercloud Fabric: Hybrid Cloud with Choice, Consistency, Control and Compliance,” Dec. 10, 2014, 22 pages.
Cisco Technology, Inc., “Cisco Expands Videoscape TV Platform Into the Cloud,” Jan. 6, 2014, Las Vegas, Nevada, Press Release, 3 pages.
CITRIX, “Citrix StoreFront 2.0” White Paper, Proof of Concept Implementation Guide, Citrix Systems, Inc., 2013, 48 pages.
CITRIX, “CloudBridge for Microsoft Azure Deployment Guide,” 30 pages.
CITRIX, “Deployment Practices and Guidelines for NetScaler 10.5 on Amazon Web Services,” White Paper, citrix.com, 2014, 14 pages.
CSS CORP, “Enterprise Cloud Gateway (ECG)—Policy driven framework environments,” original published on or about Feb. 11, 2012; 1 page; http://www.css-cloud.com/platform/enterprise-cloud-gateway.php.
Fang K., “LISP MAC-EID-TO-RLOC Mapping (LISP based L2VPN),” Network Working Group, Internet Draft, Cisco Systems, Jan. 2012, 12 pages.
Gedymin, Adam, “Cloud Computing with an emphasis on Google App Engine,” Sep. 2011, 146 pages.
Good, Nathan A., “Use Apache Deltacloud to administer multiple instances with a single API,” Dec. 17, 2012, 7 pages.
Herry, William, “Keep It Simple, Stupid: OpenStack nova-scheduler and its algorithm”, May 12, 2012, IBM, 12 pages.
Hewlett-Packard Company, “Virtual context management on network devices”, Research Disclosure, vol. 564, No. 60, Apr. 1, 2011, Mason Publications, Hampshire, GB, Apr. 1, 2011, 524.
Juniper Networks, Inc., “Recreating Real Application Traffic in Junosphere Lab,” Solution Brief, Dec. 2011, 3 pages.
KENHUI, “Musings on Cloud Computing and IT-as-a-Service: [Updated for Havana] Openstack Computer for VSphere Admins, Part 2: Nova-Scheduler and DRS”, Jun. 26, 2013, Cloud Architect Musings, 12 pages.
Kolyshkin, Kirill, “Virtualization in Linux,” Sep. 1, 2006, XP055141648, 5 pages, https://web.archive.org/web/20070120205111/http://download.openvz.org/doc/openvz-intro.pdf.
Lerach, S.R.O., “Golem,” http://www.lerach.cz/en/products/golem, accessed Jul. 22, 2015, 2 pages.
Linthicum, David, “VM Import could be a game changer for hybrid clouds”, InfoWorld, Dec. 23, 2010, 4 pages.
Logan, Marcus, “Hybrid Cloud Application Architecture for Elastic Java-Based Web Applications,” F5 Deployment Guide Version 1.1, 2016, 65 pages.
Meireles, Fernando Miguel Dias, “Integrated Management of Cloud Computing Resources,” 2013-2014, 286 pages.
Mu, Shuai, et al., “uLibCloud: Providing High Available and Uniform Accessing to Multiple Cloud Storages,” 2012 IEEE, 8 pages.
Naik, Vijay K., et al., “Harmony: A Desktop Grid for Delivering Enterprise Computations,” Grid Computing, 2003, Fourth International Workshop on Proceedings, Nov. 17, 2003, pp. 1-11.
Nair, Srijith K. et al., “Towards Secure Cloud Bursting, Brokerage and Aggregation,” 2012, 8 pages, www.flexiant.com.
NIELSEN, “SimMetry Audience Measurement—Technology,” http://nielsen-admosphere.eu/products-and-services/simmetry-audience-measurement-technology/, accessed Jul. 22, 2015, 6 pages.
NIELSEN, “Television,” http://www.nielsen.com/us/en/solutions/measurement/television.html, accessed Jul. 22, 2015, 4 pages.
Open Stack, “Filter Scheduler,” updated Dec. 17, 2017, 5 pages, accessed on Dec. 18, 2017, http://docs.openstack.org/nova/latest/user/filter-scheduler.html.
Rabadan, J., et al., “Operational Aspects of Proxy-ARP/ND in EVPN Networks,” BESS Worksgroup Internet Draft, draft-snr-bess-evpn-proxy-arp-nd-02, Oct. 6, 2015, 22 pages.
Saidi, Ali, et al., “Performance Validation of Network-Intensive Workloads on a Full-System Simulator,” Interaction between Operating System and Computer Architecture Workshop, (IOSCA 2005), Austin, Texas, Oct. 2005, 10 pages.
SHUNRA, “Shunra for HP Software; Enabling Confidence in Application Performance Before Deployment,” 2010, 2 pages.
Son, Jungmin, “Automatic decision system for efficient resource selection and allocation in inter-clouds,” Jun. 2013, 35 pages.
Sun, Aobing, et al., “IaaS Public Cloud Computing Platform Scheduling Model and Optimization Analysis,” Int. J. Communications, Network and System Sciences, 2011, 4, 803-811, 9 pages.
Toews, Everett, “Introduction to Apache jclouds,” Apr. 7, 2014, 23 pages.
Von Laszewski, Gregor, et al., “Design of a Dynamic Provisioning System for a Federated Cloud and Bare-metal Environment,” 2012, 8 pages.
Wikipedia, “Filter (software)”, Wikipedia, Feb. 8, 2014, 2 pages, https://en.wikipedia.org/w/index.php?title=Filter_%28software%29&oldid=594544359.
Wikipedia; “Pipeline (Unix)”, Wikipedia, May 4, 2014, 4 pages, https://en.wikipedia.org/w/index.php?title=Pipeline2/028Unix%29&oldid=606980114.
Related Publications (1)
Number Date Country
20180034821 A1 Feb 2018 US