This disclosure relates in general to the field of communications networks and, more particularly, to a technique for performing infrastructure-exclusive service forwarding in such communications networks.
The delivery of end-to-end services in a communications network often requires the performance of a variety of service functions. Such service functions may include, but are not limited to, firewalls and traditional IP Network Address Translators (“NATs”), as well as application-specific functions. The definition and instantiation of an ordered set of service functions and the subsequent steering of traffic through those functions is referred to as service function chaining (“SFC”), or simply service chaining. In the process, the traffic is serviced as per policy in the service functions and the service chaining infrastructure. Existing methods of forwarding traffic through service functions suffer from various deficiencies, including but not limited to, complexity of deployment and operation due to a large number of forwarding touch points; scale challenges due to the involvement of service functions in making forwarding decisions, and violation of operational environment policies due to errors or unintentional modification of forwarding state by service functions.
To provide a more complete understanding of the present disclosure and features and advantages thereof, reference is made to the following description, taken in conjunction with the accompanying figures, wherein like reference numerals represent like parts, in which:
Overview
A method is provided in one example embodiment and includes receiving at a network element a packet including a Network Services Header (“NSH”), wherein the NSH includes an Infrastructure (“I”) flag and a service path header comprising a Service Index (“SI”), and a Service Path ID (“SPI”) and determining whether the I flag is set to a first value. The method further includes, if the I flag is set to the first value, setting the I flag to a second value and forwarding the packet to the service function that corresponds to the SI for processing. The method still further includes, if the I flag is not set to the first value, decrementing the SI and making a forwarding decision based on a new value of the SI and the SPI.
To accommodate agile networking and flexible provisioning of network nodes in a network, service chaining may be used to ensure an ordered set of service functions are applied to packets and/or frames of a traffic flow. Service chaining provides a method for deploying service functions in a manner that enables dynamic ordering and topological independence of the service functions. A service chain may define an ordered set of service functions to be applied to packets and/or frames of a traffic flow, where each service function of the ordered set is selected as a result of classification. The implied order may not be a linear progression, as the architecture may allow for nodes that copy to more than one branch.
Service chaining involves a classifier function that performs classification based on policies configured by a control plane element to select a service chain to process traffic and load balances the traffic among instances of the selected service chain. Once the classifier function selects a service chain instance (a.k.a. service function path or “SFP”), it forwards the traffic along a service function path (“SFP”), or simply, a service path, through one or more service-aware forwarding elements (“FEs”). In one certain embodiment, each forwarding element implements a service function forwarder (“SFF”) capability described in an IETF draft entitled “Service Function Chaining (SFC) Architecture” (IETF RFC7665—https://datatracker.ietf.org/doc/rfc7665/) (hereinafter “SFC Architecture RFC”). The forwarding elements forward the traffic to the actual service functions that are logically anchored to, and/or instantiated on, the forwarding element. Forwarding of traffic between any two components in such an architecture, and hence along the service chains, is performed over an overlay network. Overlay networks are realized via a transport header and an encapsulation header. Various network encapsulation headers have been employed to forward traffic, requiring service through the service chains. Such network encapsulation headers encapsulate the original packet, or frame, and are themselves encapsulated in an overlay transport protocol. Examples of encapsulation headers include proprietary headers, such as vPath, or proposed IETF standard headers, such as Network Service Header (“NSH”). Transport protocols used to carry such encapsulated packets may be L3- or L4-based, such as IPv4/IPv6 or GRE or UDP, VxLAN, etc. In the case of vPath, even L2-based, such as LLC SNAP.
A service function may be responsible for specific treatment and/or processing of received packets. A service function may act at the network layer or other OSI layers (e.g., application layer, presentation layer, session layer, transport layer, data link layer, and physical link layer). A service function may be a virtual instance or be embedded in a physical network element, such as a service node. When a service function or other modules of a service node are executed by the at least one processor of the service node, the service function or other modules may be configured to implement any one of the methods described herein. Multiple service functions can be embedded in the same network element. Multiple instances of the service function can be enabled in the same administrative SFC-enabled domain. A non-exhaustive list of service functions includes firewalls, WAN and application acceleration, Deep Packet Inspection (“DPI”), server load balancers, NAT44, NAT64, HOST_ID injection, HTTP Header Enrichment functions, TCP optimizer, and others. A service function may be SFC-encapsulation aware; that is, it may receive and act on information in the SFC encapsulation, or unaware in which case data forwarded to the service does not contain the SFC encapsulation.
A service node may be a physical network element (or a virtual element embedded on a physical network element) that hosts one or more service functions and may have one or more network locators associated with it for reachability and service delivery. In many standardization documents, “service functions” can refer to the service nodes described herein as having one or more service functions hosted thereon. SFP, or simply service path, relates to the instantiation of a service chain in a network. Packets follow a service path from a classifier through the requisite service functions.
Generally speaking, an NSH includes service path information, and NSH is added to a packet or frame. For instance, an NSH can include a data plane header added to packets or frames. Effectively, the NSH creates a service plane. The NSH includes information for service chaining, and in some cases, the NSH can include metadata added and/or consumed by service nodes or service functions. The packets and NSH are encapsulated in an outer header for transport. To implement a service path, a network element such as a service classifier (“SCL”) or some other suitable SFC-aware network element can process packets or frames of a traffic flow and performs NSH encapsulation according to a desired policy for the traffic flow.
The service classification function 55 can process a packet of a traffic flow and determine whether the packet requires servicing and correspondingly which service path to follow to apply the appropriate service. The determination can be performed based on business policies and/or rules stored in memory 54. Once the determination of the service path is made, service header encapsulator 57 generates an appropriate NSH having identification information for the service path and adds the NSH to the packet. The service header encapsulator 57 provides an outer encapsulation to forward the packet to the start of the service path. Other SFC-aware network elements are thus able to process the NSH while other non-SFC-aware network elements would simply forward the encapsulated packets as is. Besides inserting an NSH, network element 50 can also remove or not add the NSH if the service classification function 55 determines the packet does not require servicing.
An NSH may include a (e.g., 64-bit) base header, and one or more context headers. Generally speaking, the base header provides information about the service header and service path identification (e.g., an SPI), and context headers may carry opaque metadata (such as the metadata described herein reflecting the result of classification). For instance, an NSH can include a 4-byte base header, a 4-byte service path header, and optional context headers. The base header can provide information about the service header and the payload protocol. The service path header can provide path identification and location (i.e., service function) within a path. The variable length context headers can carry opaque metadata and variable length encoded information. The one or more optional context headers make up a context header section in the NSH. For instance, the context header section can include one or more context header fields having pieces of information therein, describing the packet/frame. Based on the information in the base header, a service function of a service node can, for instance, derive policy selection from the NSH. Context headers shared in the NSH can, for instance, provide a range of service-relevant information such as traffic classification, end point identification, etc. Service functions can use NSH to select local service policy.
Once properly classified and encapsulated by the classifier, the packet having the NSH may be then forwarded to one or more service nodes where service(s) can be applied to the packet/frame.
As previously noted, service chaining involves a classifier function performing classification based on policies configured by a control plane to select service chains and perform load balancing among instances of the service chains. The classifier function then forwards the traffic along the SFP through one or more service-aware forwarding elements. Forwarding elements implement a service function forwarder (“SFF”) capability described in the aforementioned SFC Architecture IETF Draft. The forwarding elements forward the traffic to the actual service chain nodes that are logically anchored to the forwarding element. Forwarding of traffic between any two components in such an architecture, and hence through the service chains, is performed over an overlay network. As previously noted, overlay networks are realized via a transport header and an encapsulation header. Various network encapsulation headers have been employed to forward traffic, requiring service through the service chains. Such headers encapsulate the original packet, or frame, and are themselves encapsulated in an overlay transport protocol. Examples of encapsulation headers include proprietary headers such as vPath or proposed IETF standard headers, such as Network Service Header (“NSH”). The transport protocols used to carry such encapsulations are typically L3 or L4 based, such as IPv4/IPv6 or GRE or UDP, VxLAN, etc. In the case of vPath, even L2 protocols, such as LLC SNAP, may be used.
By way of an example, a service chain SC1 may be described in terms of service function (“SF”) types:
Corresponding service chain instances, i.e., the service paths (“SPs”), may be constructed from instances of the service function type:
As illustrated in
As previously noted, SFC involves steering user/application traffic through a list of ordered service functions before forwarding onward to its destination, in the process servicing the traffic as per policy in those service functions as well as service chaining infrastructure. Existing methods to forward traffic through service functions suffer from various deficiencies including but not limited to complexity of deployment and operation due a large number of forwarding touch points; scale challenges due to the involvement of service functions in making forwarding decisions; and violation of operational environment policies due to errors or unintentional modification of forwarding-state by service functions.
Moreover, as a consequence of above assertions of NSH and service chaining, NSH uses a model in which service functions are fully trusted to maintain the integrity of the encapsulation, thereby allowing forwarding elements or service function forwarders to forward on the decisions made by service functions. This is not acceptable in all network environments. Strict infrastructure and application boundaries in operators' environments essentially disallow such a method of packet forwarding. Additionally, since forwarding decisions are made at service functions, the control plane has to program the forwarding elements with forwarding information, which includes the SPI and SI information. This approach negatively impacts scalability, as the number of service functions are significantly greater in number as compared to forwarding elements in a typical deployment. Moreover, given that service functions have to be programmed with forwarding information and the service functions may be from any vendor or third party, programming the service functions and the infrastructure may lead to very complex control plane interactions, which in turn negatively impacts scalability of the deployment and hence the architecture. The service functions may be home-grown by the operators, purchased from third parties, or downloaded freely from open source software portals. Still further, since forwarding is performed at the forwarding elements based solely on the SPI and SI fields in the NSH encapsulation header, forwarding elements are vulnerable to decisions made by service functions. If a service function is buggy, compromised, or performing incorrect manipulation of the SI, packets may be forwarded to the wrong next-hop (such as jumping over a firewall) or may continuously loop. Finally, looking at the service context header in NSH, it is not possible to determine what service function the packet is associated with and where along the path it is, due to the fact that service functions decrement the SI. As a result, additional context is required to make such an assertion.
Original vPath implementation relies on a stateful method to contain the forwarding decision to forwarding elements. However stateful methods are not cost-effective to implement in hardware and almost never implemented at any reasonable scale.
To address some of these issues, in accordance with features of embodiments described herein, a technique for infrastructure-exclusive service forwarding may be employed in service chain architecture and packet forwarding methods to perform the actual packet forwarding through the service path in a network in an intuitive, effective, hardware friendly and architecturally clean manner. In particular, the infrastructure-exclusive service forwarding method described herein is stateless and hardware friendly, and advantageously limits forwarding state manipulation to forwarding elements (switches, routers, or other network elements). The method separates the service overlays into service-function and infrastructure overlays. Further, it contains forwarding decisions and SI manipulation to forwarding elements and free the service functions from making forwarding decisions and manipulating the SI.
The method separates forwarding and servicing planes in NSH or any such encapsulations. This enables forwarding to be fully owned and controlled by the service chaining infrastructure while service delivery is fully the responsibility of the service functions. This allows for scaling the service plane independent of the forwarding plane while avoiding forwarding conflicts that may otherwise arise. Forwarding is fully controlled by the forwarding elements and any forwarding-state carried in NSH, be it NSH service context header or metadata context header, is fully opaque to the service functions. The current overlay network can be separated into infrastructure overlay and the service overlay. Infrastructure overlay extends between forwarding elements or classifier and forwarding elements, while the service overlay extends between the forwarding elements and service functions. Only the forwarding elements and classifiers make the forwarding decisions, hence limiting the forwarding decision-making to infrastructure alone. In some embodiments, the decrement operation on SI at the forwarding elements may be controlled by the presence of a signal or a flag that indicates whether the packet is on the infrastructure or the service overlay/plane.
The following rules are observed by the SFC components in updating the ‘I’ flag and the SI field of the modified NSH 94 shown in
It will be noted that in certain embodiments, classifiers are expected to have embedded therein a forwarding element (or service forwarding function) and to display all of the behaviors of a forwarding element.
In certain embodiments, the forwarding element, or SFF, may verify the integrity of the service path header every time an NSH packet is received from a service function. This verification may be implemented as follows.
The separation of service function and forwarding function responsibilities with respect to forwarding state allows the service function forwarders to enforce integrity checks to verify the immutable aspect of the service path header. In certain embodiments, it is recommended to use an appropriate method to verity the integrity of the service path header. There are many approaches to performing the integrity checks; a few are briefly summarized below as examples.
In one embodiment, every NSH packet received from a SF (i.e., 1=0 in NSH base header) is checked against the three tuple: <SF-Transport-Address, SPI, SI> programmed in the SFF by the control plane for that SF. This method is simple and works well when a SF appears only once across all service paths.
In another embodiment, SFFs compute a hash of an n-tuple or a pseudo header and transport this hash as opaque metadata in NSH through the SFs on a service path. When an SFF receives the opaque metadata back (post servicing of the packet), it re-computes the hash of the same n-tuple and checks against the hash received in NSH. The n-tuple may include inner payload, outer transport, service path header and SFF local data among others. Implementations must determine the n-tuple based on the SFC deployment requirements.
In another embodiment, SFFs that are stateful use flow state to record SPI and SIs and validate the same when the packet is received back from a SF. This works well as long as an SF appears only once in a given SPI. If multiple instances of the same SF within the same SPI are needed, additional checks to protect the SI must be performed.
In yet another embodiment, as a generalized approach, the control plane programs a mask to be applied to the NSH header to select the bits against which to perform integrity checks. In the simplest case, the mask represents just the service path header.
The service header integrity check techniques described above do not protect against such threats as packet replay or spoofing attacks, which do not violate the integrity of the service path header; rather, they protect only against modification of the NSH service path header accidentally or otherwise thus ensuring the integrity of the same.
Turning to
Processor 132, which may also be referred to as a central processing unit (“CPU”), can include any general or special-purpose processor capable of executing machine readable instructions and performing operations on data as instructed by the machine readable instructions. Main memory 133 may be directly accessible to processor 132 for accessing machine instructions and may be in the form of random access memory (“RAM”) or any type of dynamic storage (e.g., dynamic random access memory (“DRAM”)). Secondary storage 134 can be any non-volatile memory such as a hard disk, which is capable of storing electronic data including executable software files. Externally stored electronic data may be provided to computer 130 through one or more removable media drives 138, which may be configured to receive any type of external media such as compact discs (“CDs”), digital video discs (“DVDs”), flash drives, external hard drives, etc.
Wireless and wired network interfaces 135 and 136 can be provided to enable electronic communication between machine 130 and other machines, or nodes. In one example, wireless network interface 135 could include a wireless network controller (“WNIC”) with suitable transmitting and receiving components, such as transceivers, for wirelessly communicating within a network. Wired network interface 136 can enable machine 130 to physically connect to a network by a wire line such as an Ethernet cable. Both wireless and wired network interfaces 135 and 136 may be configured to facilitate communications using suitable communication protocols such as, for example, Internet Protocol Suite (“TCP/IP”). Machine 130 is shown with both wireless and wired network interfaces 135 and 136 for illustrative purposes only. While one or more wireless and hardwire interfaces may be provided in machine 130, or externally connected to machine 130, only one connection option is needed to enable connection of machine 130 to a network.
A user interface 137 may be provided in some machines to allow a user to interact with the machine 130. User interface 137 could include a display device such as a graphical display device (e.g., plasma display panel (“PDP”), a liquid crystal display (“LCD”), a cathode ray tube (“CRT”), etc.). In addition, any appropriate input mechanism may also be included such as a keyboard, a touch screen, a mouse, a trackball, voice recognition, touch pad, etc.
Removable media drive 138 represents a drive configured to receive any type of external computer-readable media (e.g., computer-readable medium 139). Instructions embodying the activities or functions described herein may be stored on one or more external computer-readable media. Additionally, such instructions may also, or alternatively, reside at least partially within a memory element (e.g., in main memory 133 or cache memory of processor 132) of machine 130 during execution, or within a non-volatile memory element (e.g., secondary storage 134) of machine 130. Accordingly, other memory elements of machine 130 also constitute computer-readable media. Thus, “computer-readable medium” is meant to include any medium that is capable of storing instructions for execution by machine 130 that cause the machine to perform any one or more of the activities disclosed herein.
Not shown in
The elements, shown and/or described with reference to machine 130, are intended for illustrative purposes and are not meant to imply architectural limitations of machines such as those utilized in accordance with the present disclosure. In addition, each machine may include more or fewer components where appropriate and based on particular needs. As used herein in this Specification, the term “machine” is meant to encompass any computing device or network element such as servers, routers, personal computers, client computers, network appliances, switches, bridges, gateways, processors, load balancers, wireless LAN controllers, firewalls, or any other suitable device, component, element, or object operable to affect or process electronic information in a network environment.
In example implementations, at least some portions of the activities described herein may be implemented in software in. In some embodiments, this software could be received or downloaded from a web server, provided on computer-readable media, or configured by a manufacturer of a particular element in order to implement the embodiments described herein. In some embodiments, one or more of these features may be implemented in hardware, provided external to these elements, or consolidated in any appropriate manner to achieve the intended functionality.
In one example implementation, classifier and forwarding elements, which may include any suitable hardware, software, components, modules, or objects that facilitate the operations thereof, as well as suitable interfaces for receiving, transmitting, and/or otherwise communicating data or information in a network environment. This may be inclusive of appropriate algorithms and communication protocols that allow for the effective exchange of data or information.
Furthermore, in the embodiments described and illustrated herein, some of the processors and memory elements associated with the various network elements may be removed, or otherwise consolidated such that a single processor and a single memory location are responsible for certain activities. Alternatively, certain processing functions could be separated and separate processors and/or physical machines could implement various functionalities. In a general sense, the arrangements depicted in the FIGURES may be more logical in their representations, whereas a physical architecture may include various permutations, combinations, and/or hybrids of these elements. It is imperative to note that countless possible design configurations can be used to achieve the operational objectives outlined here. Accordingly, the associated infrastructure has a myriad of substitute arrangements, design choices, device possibilities, hardware configurations, software implementations, equipment options, etc.
In some of the example embodiments, one or more memory elements (e.g., main memory 133, secondary storage 134, computer-readable medium 139) can store data used in implementing embodiments described and illustrated herein. This includes at least some of the memory elements being able to store instructions (e.g., software, logic, code, etc.) that are executed to carry out the activities described in this Specification. A processor can execute any type of instructions associated with the data to achieve the operations detailed herein in this Specification. In one example, one or more processors (e.g., processor 132) could transform an element or an article (e.g., data) from one state or thing to another state or thing. In another example, the activities outlined herein may be implemented with fixed logic or programmable logic (e.g., software/computer instructions executed by a processor) and the elements identified herein could be some type of a programmable processor, programmable digital logic (e.g., a field programmable gate array (“FPGA”), an erasable programmable read only memory (“EPROM”), an electrically erasable programmable read only memory (“EEPROM”)), an ASIC that includes digital logic, software, code, electronic instructions, flash memory, optical disks, CD-ROMs, DVD ROMs, magnetic or optical cards, other types of machine-readable mediums suitable for storing electronic instructions, or any suitable combination thereof.
Components of communications network described herein may keep information in any suitable type of memory (e.g., random access memory (“RAM”), read-only memory (“ROM”), erasable programmable ROM (“EPROM”), electrically erasable programmable ROM (“EEPROM”), etc.), software, hardware, or in any other suitable component, device, element, or object where appropriate and based on particular needs. Any of the memory items discussed herein should be construed as being encompassed within the broad term “memory element.” The information being read, used, tracked, sent, transmitted, communicated, or received by network environment, could be provided in any database, register, queue, table, cache, control list, or other storage structure, all of which can be referenced at any suitable timeframe. Any such storage options may be included within the broad term “memory element” as used herein. Similarly, any of the potential processing elements and modules described in this Specification should be construed as being encompassed within the broad term “processor.”
Certain embodiments described herein separate the overlay in service function chaining into an infrastructure overlay and a service function overlay, allowing additional security policies to be enforced between the two. Certain embodiments described herein provide a stateless, hardware friendly method for decrementing the NSH service index without requiring any state at the forwarding element or sender awareness. Additionally, certain embodiments described herein restrict the forwarding decisions (in updating the service index) to the forwarding elements alone and frees the service functions to focus purely on service delivery and avoid dealing with complexities associated with forwarding decisions. Still further, certain embodiments described herein enable the service chaining control plane to scale independently of the number of service functions and prevent issues that may arise due to incorrect manipulation of the service index by limiting manipulation of the service index to forwarding elements.
Certain embodiments described herein allow snooping tools or any type of intermediate nodes to clearly determine whether the NSH encapsulated packet is going between forwarding elements or between a forwarding element and a service function without relying on the source and destination locators, which is useful in tracing and debugging, especially in cloud deployments. Certain embodiments described herein allow the service index on an NSH packet to be always associated with the service function as indicated by the service index whether the packet is in transit from a forwarding element to the service function or from the service function to a forwarding element.
Note that with the example provided above, as well as numerous other examples provided herein, interaction may be described in terms of two, three, or four network elements. However, this has been done for purposes of clarity and example only. In certain cases, it may be easier to describe one or more of the functionalities of a given set of flows by only referencing a limited number of network elements. It should be appreciated that topologies illustrated in and described with reference to the accompanying FIGURES (and their teachings) are readily scalable and can accommodate a large number of components, as well as more complicated/sophisticated arrangements and configurations. Accordingly, the examples provided should not limit the scope or inhibit the broad teachings of the illustrated topologies as potentially applied to myriad other architectures.
It is also important to note that the steps in the preceding flow diagrams illustrate only some of the possible signaling scenarios and patterns that may be executed by, or within, communication systems shown in the FIGURES. Some of these steps may be deleted or removed where appropriate, or these steps may be modified or changed considerably without departing from the scope of the present disclosure. In addition, a number of these operations have been described as being executed concurrently with, or in parallel to, one or more additional operations. However, the timing of these operations may be altered considerably. The preceding operational flows have been offered for purposes of example and discussion. Substantial flexibility is provided by communication systems shown in the FIGURES in that any suitable arrangements, chronologies, configurations, and timing mechanisms may be provided without departing from the teachings of the present disclosure.
Although the present disclosure has been described in detail with reference to particular arrangements and configurations, these example configurations and arrangements may be changed significantly without departing from the scope of the present disclosure. For example, although the present disclosure has been described with reference to particular communication exchanges, embodiments described herein may be applicable to other architectures.
Numerous other changes, substitutions, variations, alterations, and modifications may be ascertained to one skilled in the art and it is intended that the present disclosure encompass all such changes, substitutions, variations, alterations, and modifications as falling within the scope of the appended claims. In order to assist the United States Patent and Trademark Office (USPTO) and, additionally, any readers of any patent issued on this application in interpreting the claims appended hereto, Applicant wishes to note that the Applicant: (a) does not intend any of the appended claims to invoke paragraph six (6) of 35 U.S.C. section 142 as it exists on the date of the filing hereof unless the words “means for” or “step for” are specifically used in the particular claims; and (b) does not intend, by any statement in the specification, to limit this disclosure in any way that is not otherwise reflected in the appended claims.
This application claims the benefit of priority under 35 U.S.C. § 119(e) to U.S. Provisional Application Ser. No. 62/263,422 entitled “METHOD FOR INFRASTRUCTURE-EXCLUSIVE SERVICE FORWARDING” filed Dec. 4, 2015, which is hereby incorporated by reference in its entirety.
| Number | Name | Date | Kind |
|---|---|---|---|
| 5812773 | Norin | Sep 1998 | A |
| 5889896 | Meshinsky et al. | Mar 1999 | A |
| 6108782 | Fletcher et al. | Aug 2000 | A |
| 6178453 | Mattaway et al. | Jan 2001 | B1 |
| 6298153 | Oishi | Oct 2001 | B1 |
| 6343290 | Cossins et al. | Jan 2002 | B1 |
| 6643260 | Kloth et al. | Nov 2003 | B1 |
| 6683873 | Kwok et al. | Jan 2004 | B1 |
| 6721804 | Rubin et al. | Apr 2004 | B1 |
| 6733449 | Krishnamurthy et al. | May 2004 | B1 |
| 6735631 | Oehrke et al. | May 2004 | B1 |
| 6996615 | McGuire | Feb 2006 | B1 |
| 7054930 | Cheriton | May 2006 | B1 |
| 7058706 | Lyer et al. | Jun 2006 | B1 |
| 7062571 | Dale et al. | Jun 2006 | B1 |
| 7111177 | Chauvel et al. | Sep 2006 | B1 |
| 7212490 | Kao et al. | May 2007 | B1 |
| 7277948 | Igarashi et al. | Oct 2007 | B2 |
| 7313667 | Pullela et al. | Dec 2007 | B1 |
| 7379846 | Williams et al. | May 2008 | B1 |
| 7480672 | Hahn et al. | Jan 2009 | B2 |
| 7496043 | Leong et al. | Feb 2009 | B1 |
| 7536476 | Alleyne | May 2009 | B1 |
| 7567504 | Darling et al. | Jul 2009 | B2 |
| 7583665 | Duncan et al. | Sep 2009 | B1 |
| 7606147 | Luft et al. | Oct 2009 | B2 |
| 7644437 | Volpano | Jan 2010 | B2 |
| 7647594 | Togawa | Jan 2010 | B2 |
| 7773510 | Back et al. | Aug 2010 | B2 |
| 7808897 | Mehta et al. | Oct 2010 | B1 |
| 7881957 | Cohen et al. | Feb 2011 | B1 |
| 7917647 | Cooper et al. | Mar 2011 | B2 |
| 8010598 | Tanimoto | Aug 2011 | B2 |
| 8028071 | Mahalingam et al. | Sep 2011 | B1 |
| 8041714 | Aymeloglu et al. | Oct 2011 | B2 |
| 8121117 | Amdahl et al. | Feb 2012 | B1 |
| 8171415 | Appleyard et al. | May 2012 | B2 |
| 8234377 | Cohn | Jul 2012 | B2 |
| 8244559 | Horvitz et al. | Aug 2012 | B2 |
| 8250215 | Stienhans et al. | Aug 2012 | B2 |
| 8280880 | Aymeloglu et al. | Oct 2012 | B1 |
| 8284664 | Aybay et al. | Oct 2012 | B1 |
| 8301746 | Head et al. | Oct 2012 | B2 |
| 8345692 | Smith | Jan 2013 | B2 |
| 8406141 | Couturier et al. | Mar 2013 | B1 |
| 8407413 | Yucel et al. | Mar 2013 | B1 |
| 8448171 | Donnellan et al. | May 2013 | B2 |
| 8477610 | Zuo et al. | Jul 2013 | B2 |
| 8495356 | Ashok et al. | Jul 2013 | B2 |
| 8495725 | Ahn | Jul 2013 | B2 |
| 8510469 | Portolani | Aug 2013 | B2 |
| 8514868 | Hill | Aug 2013 | B2 |
| 8532108 | Li et al. | Sep 2013 | B2 |
| 8533687 | Greifeneder et al. | Sep 2013 | B1 |
| 8547974 | Guruswamy et al. | Oct 2013 | B1 |
| 8560639 | Murphy et al. | Oct 2013 | B2 |
| 8560663 | Baucke et al. | Oct 2013 | B2 |
| 8589543 | Dutta et al. | Nov 2013 | B2 |
| 8590050 | Nagpal et al. | Nov 2013 | B2 |
| 8611356 | Yu et al. | Dec 2013 | B2 |
| 8612625 | Andreis et al. | Dec 2013 | B2 |
| 8630291 | Shaffer et al. | Jan 2014 | B2 |
| 8639787 | Lagergren et al. | Jan 2014 | B2 |
| 8656024 | Krishnan et al. | Feb 2014 | B2 |
| 8660129 | Brendel et al. | Feb 2014 | B1 |
| 8719804 | Jain | May 2014 | B2 |
| 8775576 | Hebert et al. | Jul 2014 | B2 |
| 8797867 | Chen et al. | Aug 2014 | B1 |
| 8805951 | Faibish et al. | Aug 2014 | B1 |
| 8850002 | Dickinson et al. | Sep 2014 | B1 |
| 8850182 | Fritz et al. | Sep 2014 | B1 |
| 8856339 | Mestery et al. | Oct 2014 | B2 |
| 8909928 | Ahmad et al. | Dec 2014 | B2 |
| 8918510 | Gmach et al. | Dec 2014 | B2 |
| 8924720 | Raghuram et al. | Dec 2014 | B2 |
| 8930747 | Levijarvi et al. | Jan 2015 | B2 |
| 8938775 | Roth et al. | Jan 2015 | B1 |
| 8959526 | Kansal et al. | Feb 2015 | B2 |
| 8977754 | Curry, Jr. et al. | Mar 2015 | B2 |
| 9009697 | Breiter et al. | Apr 2015 | B2 |
| 9015324 | Jackson | Apr 2015 | B2 |
| 9043439 | Bicket et al. | May 2015 | B2 |
| 9049115 | Rajendran et al. | Jun 2015 | B2 |
| 9063789 | Beaty et al. | Jun 2015 | B2 |
| 9065727 | Liu et al. | Jun 2015 | B1 |
| 9075649 | Bushman et al. | Jul 2015 | B1 |
| 9130846 | Szabo et al. | Sep 2015 | B1 |
| 9164795 | Vincent | Oct 2015 | B1 |
| 9167050 | Durazzo et al. | Oct 2015 | B2 |
| 9201701 | Boldyrev et al. | Dec 2015 | B2 |
| 9201704 | Chang et al. | Dec 2015 | B2 |
| 9203784 | Chang et al. | Dec 2015 | B2 |
| 9223634 | Chang et al. | Dec 2015 | B2 |
| 9244776 | Koza et al. | Jan 2016 | B2 |
| 9251114 | Ancin et al. | Feb 2016 | B1 |
| 9264478 | Hon et al. | Feb 2016 | B2 |
| 9294408 | Dickinson et al. | Mar 2016 | B1 |
| 9313048 | Chang et al. | Apr 2016 | B2 |
| 9361192 | Smith et al. | Jun 2016 | B2 |
| 9379982 | Krishna et al. | Jun 2016 | B1 |
| 9380075 | He et al. | Jun 2016 | B2 |
| 9432245 | Sorenson, III et al. | Aug 2016 | B1 |
| 9432294 | Sharma et al. | Aug 2016 | B1 |
| 9444744 | Sharma et al. | Sep 2016 | B1 |
| 9473365 | Melander et al. | Oct 2016 | B2 |
| 9503530 | Niedzielski | Nov 2016 | B1 |
| 9558078 | Farlee et al. | Jan 2017 | B2 |
| 9571570 | Mutnuru | Feb 2017 | B1 |
| 9613078 | Vermeulen et al. | Apr 2017 | B2 |
| 9628471 | Sundaram et al. | Apr 2017 | B1 |
| 9658876 | Chang et al. | May 2017 | B2 |
| 9692802 | Bicket et al. | Jun 2017 | B2 |
| 9755858 | Bagepalli et al. | Sep 2017 | B2 |
| 20010055303 | Horton et al. | Dec 2001 | A1 |
| 20020073337 | Ioele et al. | Jun 2002 | A1 |
| 20020143928 | Maltz et al. | Oct 2002 | A1 |
| 20020166117 | Abrams et al. | Nov 2002 | A1 |
| 20020174216 | Shorey et al. | Nov 2002 | A1 |
| 20030018591 | Komisky | Jan 2003 | A1 |
| 20030056001 | Mate et al. | Mar 2003 | A1 |
| 20030228585 | Inoko et al. | Dec 2003 | A1 |
| 20040004941 | Malan et al. | Jan 2004 | A1 |
| 20040034702 | He | Feb 2004 | A1 |
| 20040088542 | Daude et al. | May 2004 | A1 |
| 20040095237 | Chen et al. | May 2004 | A1 |
| 20040131059 | Ayyakad et al. | Jul 2004 | A1 |
| 20040197079 | Latvala et al. | Oct 2004 | A1 |
| 20040264481 | Darling et al. | Dec 2004 | A1 |
| 20050060418 | Sorokopud | Mar 2005 | A1 |
| 20050125424 | Herriott et al. | Jun 2005 | A1 |
| 20060062187 | Rune | Mar 2006 | A1 |
| 20060104286 | Cheriton | May 2006 | A1 |
| 20060126665 | Ward et al. | Jun 2006 | A1 |
| 20060146825 | Hofstaedter et al. | Jul 2006 | A1 |
| 20060155875 | Cheriton | Jul 2006 | A1 |
| 20060168338 | Bruegl et al. | Jul 2006 | A1 |
| 20060233106 | Achlioptas et al. | Oct 2006 | A1 |
| 20070174663 | Crawford et al. | Jul 2007 | A1 |
| 20070223487 | Kajekar et al. | Sep 2007 | A1 |
| 20070242830 | Conrado et al. | Oct 2007 | A1 |
| 20080005293 | Bhargava et al. | Jan 2008 | A1 |
| 20080080524 | Tsushima et al. | Apr 2008 | A1 |
| 20080084880 | Dharwadkar | Apr 2008 | A1 |
| 20080165778 | Ertemalp | Jul 2008 | A1 |
| 20080198752 | Fan et al. | Aug 2008 | A1 |
| 20080198858 | Townsley et al. | Aug 2008 | A1 |
| 20080201711 | Amir Husain | Aug 2008 | A1 |
| 20080235755 | Blaisdell et al. | Sep 2008 | A1 |
| 20090006527 | Gingell, Jr. et al. | Jan 2009 | A1 |
| 20090019367 | Cavagnari et al. | Jan 2009 | A1 |
| 20090031312 | Mausolf et al. | Jan 2009 | A1 |
| 20090083183 | Rao et al. | Mar 2009 | A1 |
| 20090138763 | Arnold | May 2009 | A1 |
| 20090177775 | Radia et al. | Jul 2009 | A1 |
| 20090178058 | Stillwell, III et al. | Jul 2009 | A1 |
| 20090182874 | Morford et al. | Jul 2009 | A1 |
| 20090265468 | Annambhotla et al. | Oct 2009 | A1 |
| 20090265753 | Anderson et al. | Oct 2009 | A1 |
| 20090293056 | Ferris | Nov 2009 | A1 |
| 20090300608 | Ferris et al. | Dec 2009 | A1 |
| 20090313562 | Appleyard et al. | Dec 2009 | A1 |
| 20090323706 | Germain et al. | Dec 2009 | A1 |
| 20090328031 | Pouyadou et al. | Dec 2009 | A1 |
| 20100036903 | Ahmad et al. | Feb 2010 | A1 |
| 20100042720 | Stienhans et al. | Feb 2010 | A1 |
| 20100061250 | Nugent | Mar 2010 | A1 |
| 20100115341 | Baker et al. | May 2010 | A1 |
| 20100131765 | Bromley et al. | May 2010 | A1 |
| 20100149966 | Achlioptas et al. | Jun 2010 | A1 |
| 20100191783 | Mason et al. | Jul 2010 | A1 |
| 20100192157 | Jackson et al. | Jul 2010 | A1 |
| 20100205601 | Abbas et al. | Aug 2010 | A1 |
| 20100211782 | Auradkar et al. | Aug 2010 | A1 |
| 20100293270 | Augenstein et al. | Nov 2010 | A1 |
| 20100318609 | Lahiri et al. | Dec 2010 | A1 |
| 20100325199 | Park et al. | Dec 2010 | A1 |
| 20100325441 | Laurie et al. | Dec 2010 | A1 |
| 20100333116 | Prahlad et al. | Dec 2010 | A1 |
| 20110016214 | Jackson | Jan 2011 | A1 |
| 20110035754 | Srinivasan | Feb 2011 | A1 |
| 20110055396 | Dehaan | Mar 2011 | A1 |
| 20110055398 | Dehaan et al. | Mar 2011 | A1 |
| 20110055470 | Portolani | Mar 2011 | A1 |
| 20110072489 | Parann-Nissany | Mar 2011 | A1 |
| 20110075667 | Li et al. | Mar 2011 | A1 |
| 20110110382 | Jabr et al. | May 2011 | A1 |
| 20110116443 | Yu et al. | May 2011 | A1 |
| 20110126099 | Anderson et al. | May 2011 | A1 |
| 20110138055 | Daly et al. | Jun 2011 | A1 |
| 20110145413 | Dawson et al. | Jun 2011 | A1 |
| 20110145657 | Bishop et al. | Jun 2011 | A1 |
| 20110173303 | Rider | Jul 2011 | A1 |
| 20110185063 | Head et al. | Jul 2011 | A1 |
| 20110185065 | Stanisic et al. | Jul 2011 | A1 |
| 20110206052 | Tan et al. | Aug 2011 | A1 |
| 20110213966 | Fu et al. | Sep 2011 | A1 |
| 20110219434 | Betz et al. | Sep 2011 | A1 |
| 20110231715 | Kunii et al. | Sep 2011 | A1 |
| 20110231899 | Puller et al. | Sep 2011 | A1 |
| 20110239039 | Dieffenbach et al. | Sep 2011 | A1 |
| 20110252327 | Awasthi et al. | Oct 2011 | A1 |
| 20110261811 | Battestilli et al. | Oct 2011 | A1 |
| 20110261828 | Smith | Oct 2011 | A1 |
| 20110276675 | Singh et al. | Nov 2011 | A1 |
| 20110276951 | Jain | Nov 2011 | A1 |
| 20110283013 | Grosser et al. | Nov 2011 | A1 |
| 20110295998 | Ferris et al. | Dec 2011 | A1 |
| 20110305149 | Scott et al. | Dec 2011 | A1 |
| 20110307531 | Gaponenko et al. | Dec 2011 | A1 |
| 20110320870 | Kenigsberg et al. | Dec 2011 | A1 |
| 20120005724 | Lee | Jan 2012 | A1 |
| 20120036234 | Staats et al. | Feb 2012 | A1 |
| 20120054367 | Ramakrishnan et al. | Mar 2012 | A1 |
| 20120072318 | Akiyama et al. | Mar 2012 | A1 |
| 20120072578 | Alam | Mar 2012 | A1 |
| 20120072581 | Tung et al. | Mar 2012 | A1 |
| 20120072985 | Davne et al. | Mar 2012 | A1 |
| 20120072992 | Arasaratnam et al. | Mar 2012 | A1 |
| 20120084445 | Brock et al. | Apr 2012 | A1 |
| 20120084782 | Chou et al. | Apr 2012 | A1 |
| 20120096134 | Suit | Apr 2012 | A1 |
| 20120102193 | Rathore et al. | Apr 2012 | A1 |
| 20120102199 | Hopmann et al. | Apr 2012 | A1 |
| 20120131174 | Ferris et al. | May 2012 | A1 |
| 20120137215 | Kawara | May 2012 | A1 |
| 20120158967 | Sedayao et al. | Jun 2012 | A1 |
| 20120159097 | Jennas, II et al. | Jun 2012 | A1 |
| 20120167094 | Suit | Jun 2012 | A1 |
| 20120173710 | Rodriguez | Jul 2012 | A1 |
| 20120179909 | Sagi et al. | Jul 2012 | A1 |
| 20120180044 | Donnellan et al. | Jul 2012 | A1 |
| 20120182891 | Lee et al. | Jul 2012 | A1 |
| 20120185913 | Martinez et al. | Jul 2012 | A1 |
| 20120192016 | Gotesdyner et al. | Jul 2012 | A1 |
| 20120192075 | Ebtekar et al. | Jul 2012 | A1 |
| 20120201135 | Ding et al. | Aug 2012 | A1 |
| 20120214506 | Skaaksrud et al. | Aug 2012 | A1 |
| 20120222106 | Kuehl | Aug 2012 | A1 |
| 20120236716 | Anbazhagan et al. | Sep 2012 | A1 |
| 20120240113 | Hur | Sep 2012 | A1 |
| 20120265976 | Spiers et al. | Oct 2012 | A1 |
| 20120272025 | Park et al. | Oct 2012 | A1 |
| 20120281706 | Agarwal et al. | Nov 2012 | A1 |
| 20120281708 | Chauhan et al. | Nov 2012 | A1 |
| 20120290647 | Ellison et al. | Nov 2012 | A1 |
| 20120297238 | Watson et al. | Nov 2012 | A1 |
| 20120311106 | Morgan | Dec 2012 | A1 |
| 20120311568 | Jansen | Dec 2012 | A1 |
| 20120324092 | Brown et al. | Dec 2012 | A1 |
| 20120324114 | Dutta et al. | Dec 2012 | A1 |
| 20130003567 | Gallant et al. | Jan 2013 | A1 |
| 20130013248 | Brugler et al. | Jan 2013 | A1 |
| 20130036213 | Hasan et al. | Feb 2013 | A1 |
| 20130044636 | Koponen et al. | Feb 2013 | A1 |
| 20130066940 | Shao | Mar 2013 | A1 |
| 20130080509 | Wang | Mar 2013 | A1 |
| 20130080624 | Nagai et al. | Mar 2013 | A1 |
| 20130091557 | Gurrapu, Sr. | Apr 2013 | A1 |
| 20130097601 | Podvratnik et al. | Apr 2013 | A1 |
| 20130104140 | Meng et al. | Apr 2013 | A1 |
| 20130111540 | Sabin | May 2013 | A1 |
| 20130117337 | Dunham | May 2013 | A1 |
| 20130124712 | Parker | May 2013 | A1 |
| 20130125124 | Kempf et al. | May 2013 | A1 |
| 20130138816 | Kuo et al. | May 2013 | A1 |
| 20130144978 | Jain et al. | Jun 2013 | A1 |
| 20130152076 | Patel | Jun 2013 | A1 |
| 20130152175 | Hromoko et al. | Jun 2013 | A1 |
| 20130159097 | Schory et al. | Jun 2013 | A1 |
| 20130159496 | Hamilton et al. | Jun 2013 | A1 |
| 20130160008 | Cawlfield et al. | Jun 2013 | A1 |
| 20130162753 | Hendrickson et al. | Jun 2013 | A1 |
| 20130169666 | Pacheco et al. | Jul 2013 | A1 |
| 20130179941 | McGloin et al. | Jul 2013 | A1 |
| 20130182712 | Aguayo et al. | Jul 2013 | A1 |
| 20130185433 | Zhu et al. | Jul 2013 | A1 |
| 20130191106 | Kephart et al. | Jul 2013 | A1 |
| 20130198374 | Zalmanovitch et al. | Aug 2013 | A1 |
| 20130201989 | Hu et al. | Aug 2013 | A1 |
| 20130204849 | Chacko | Aug 2013 | A1 |
| 20130232491 | Radhakrishnan et al. | Sep 2013 | A1 |
| 20130246588 | Borowicz et al. | Sep 2013 | A1 |
| 20130250770 | Zou et al. | Sep 2013 | A1 |
| 20130254415 | Fullen et al. | Sep 2013 | A1 |
| 20130262347 | Dodson | Oct 2013 | A1 |
| 20130283364 | Chang et al. | Oct 2013 | A1 |
| 20130297769 | Chang et al. | Nov 2013 | A1 |
| 20130318240 | Hebert et al. | Nov 2013 | A1 |
| 20130318546 | Kothuri et al. | Nov 2013 | A1 |
| 20130339949 | Spiers et al. | Dec 2013 | A1 |
| 20140006481 | Frey et al. | Jan 2014 | A1 |
| 20140006535 | Reddy | Jan 2014 | A1 |
| 20140006585 | Dunbar et al. | Jan 2014 | A1 |
| 20140040473 | Ho et al. | Feb 2014 | A1 |
| 20140040883 | Tompkins | Feb 2014 | A1 |
| 20140052877 | Mao | Feb 2014 | A1 |
| 20140056146 | Hu et al. | Feb 2014 | A1 |
| 20140059310 | Du et al. | Feb 2014 | A1 |
| 20140074850 | Noel et al. | Mar 2014 | A1 |
| 20140075048 | Yuksel et al. | Mar 2014 | A1 |
| 20140075108 | Dong et al. | Mar 2014 | A1 |
| 20140075357 | Flores et al. | Mar 2014 | A1 |
| 20140075501 | Srinivasan et al. | Mar 2014 | A1 |
| 20140089727 | Cherkasova et al. | Mar 2014 | A1 |
| 20140098762 | Ghai et al. | Apr 2014 | A1 |
| 20140108985 | Scott et al. | Apr 2014 | A1 |
| 20140122560 | Ramey et al. | May 2014 | A1 |
| 20140136779 | Guha et al. | May 2014 | A1 |
| 20140140211 | Chandrasekaran et al. | May 2014 | A1 |
| 20140141720 | Princen et al. | May 2014 | A1 |
| 20140156557 | Zeng et al. | Jun 2014 | A1 |
| 20140164486 | Ravichandran et al. | Jun 2014 | A1 |
| 20140188825 | Muthukkaruppan et al. | Jul 2014 | A1 |
| 20140189095 | Lindberg et al. | Jul 2014 | A1 |
| 20140189125 | Amies et al. | Jul 2014 | A1 |
| 20140215471 | Cherkasova | Jul 2014 | A1 |
| 20140222953 | Karve et al. | Aug 2014 | A1 |
| 20140244851 | Lee | Aug 2014 | A1 |
| 20140245298 | Zhou et al. | Aug 2014 | A1 |
| 20140281173 | Im et al. | Sep 2014 | A1 |
| 20140282536 | Dave et al. | Sep 2014 | A1 |
| 20140282611 | Campbell et al. | Sep 2014 | A1 |
| 20140282889 | Ishaya et al. | Sep 2014 | A1 |
| 20140289200 | Kato | Sep 2014 | A1 |
| 20140295831 | Karra et al. | Oct 2014 | A1 |
| 20140297569 | Clark et al. | Oct 2014 | A1 |
| 20140297835 | Buys | Oct 2014 | A1 |
| 20140310391 | Sorensen, III et al. | Oct 2014 | A1 |
| 20140310417 | Sorensen, III et al. | Oct 2014 | A1 |
| 20140310418 | Sorensen, III et al. | Oct 2014 | A1 |
| 20140314078 | Jilani | Oct 2014 | A1 |
| 20140317261 | Shatzkamer et al. | Oct 2014 | A1 |
| 20140321278 | Cafarelli et al. | Oct 2014 | A1 |
| 20140330976 | van Bemmel | Nov 2014 | A1 |
| 20140330977 | van Bemmel | Nov 2014 | A1 |
| 20140334488 | Guichard | Nov 2014 | A1 |
| 20140362682 | Guichard et al. | Dec 2014 | A1 |
| 20140365680 | van Bemmel | Dec 2014 | A1 |
| 20140366155 | Chang et al. | Dec 2014 | A1 |
| 20140369204 | Anand et al. | Dec 2014 | A1 |
| 20140372567 | Ganesh et al. | Dec 2014 | A1 |
| 20140379938 | Bosch et al. | Dec 2014 | A1 |
| 20150033086 | Sasturkar et al. | Jan 2015 | A1 |
| 20150043576 | Dixon et al. | Feb 2015 | A1 |
| 20150052247 | Threefoot et al. | Feb 2015 | A1 |
| 20150052517 | Raghu et al. | Feb 2015 | A1 |
| 20150058382 | St. Laurent et al. | Feb 2015 | A1 |
| 20150058459 | Amendjian et al. | Feb 2015 | A1 |
| 20150071285 | Kumar et al. | Mar 2015 | A1 |
| 20150085870 | Narasimha et al. | Mar 2015 | A1 |
| 20150089082 | Patwardhan et al. | Mar 2015 | A1 |
| 20150100471 | Curry, Jr. et al. | Apr 2015 | A1 |
| 20150103827 | Quinn et al. | Apr 2015 | A1 |
| 20150106802 | Ivanov et al. | Apr 2015 | A1 |
| 20150106805 | Melander et al. | Apr 2015 | A1 |
| 20150117199 | Chinnaiah Sankaran et al. | Apr 2015 | A1 |
| 20150117458 | Gurkan et al. | Apr 2015 | A1 |
| 20150120914 | Wada et al. | Apr 2015 | A1 |
| 20150124622 | Kovvali et al. | May 2015 | A1 |
| 20150138973 | Kumar et al. | May 2015 | A1 |
| 20150178133 | Phelan et al. | Jun 2015 | A1 |
| 20150189009 | van Bemmel | Jul 2015 | A1 |
| 20150215819 | Bosch et al. | Jul 2015 | A1 |
| 20150227405 | Jan et al. | Aug 2015 | A1 |
| 20150242204 | Hassine et al. | Aug 2015 | A1 |
| 20150249709 | Teng et al. | Sep 2015 | A1 |
| 20150263901 | Kumar et al. | Sep 2015 | A1 |
| 20150280980 | Bitar | Oct 2015 | A1 |
| 20150281067 | Wu | Oct 2015 | A1 |
| 20150281113 | Siciliano et al. | Oct 2015 | A1 |
| 20150309908 | Pearson et al. | Oct 2015 | A1 |
| 20150319063 | Zourzouvillys et al. | Nov 2015 | A1 |
| 20150326524 | Tankala et al. | Nov 2015 | A1 |
| 20150339210 | Kopp et al. | Nov 2015 | A1 |
| 20150358850 | LaRoche et al. | Dec 2015 | A1 |
| 20150365324 | Kumar et al. | Dec 2015 | A1 |
| 20150373108 | Fleming et al. | Dec 2015 | A1 |
| 20160011925 | Kulkarni et al. | Jan 2016 | A1 |
| 20160013990 | Kulkarni et al. | Jan 2016 | A1 |
| 20160026684 | Mukherjee et al. | Jan 2016 | A1 |
| 20160062786 | Meng et al. | Mar 2016 | A1 |
| 20160094389 | Jain et al. | Mar 2016 | A1 |
| 20160094398 | Choudhury et al. | Mar 2016 | A1 |
| 20160094453 | Jain et al. | Mar 2016 | A1 |
| 20160094454 | Jain et al. | Mar 2016 | A1 |
| 20160094455 | Jain et al. | Mar 2016 | A1 |
| 20160094456 | Jain et al. | Mar 2016 | A1 |
| 20160094480 | Kulkarni et al. | Mar 2016 | A1 |
| 20160094643 | Jain et al. | Mar 2016 | A1 |
| 20160099847 | Melander et al. | Apr 2016 | A1 |
| 20160099853 | Nedeltchev et al. | Apr 2016 | A1 |
| 20160099864 | Akiya et al. | Apr 2016 | A1 |
| 20160105393 | Thakkar et al. | Apr 2016 | A1 |
| 20160127184 | Bursell | May 2016 | A1 |
| 20160134557 | Steinder et al. | May 2016 | A1 |
| 20160156708 | Jalan et al. | Jun 2016 | A1 |
| 20160164780 | Timmons et al. | Jun 2016 | A1 |
| 20160164914 | Madhav et al. | Jun 2016 | A1 |
| 20160182378 | Basavaraja et al. | Jun 2016 | A1 |
| 20160188527 | Cherian et al. | Jun 2016 | A1 |
| 20160234071 | Nambiar et al. | Aug 2016 | A1 |
| 20160239399 | Babu et al. | Aug 2016 | A1 |
| 20160253078 | Ebtekar et al. | Sep 2016 | A1 |
| 20160254968 | Ebtekar et al. | Sep 2016 | A1 |
| 20160261564 | Foxhoven et al. | Sep 2016 | A1 |
| 20160277368 | Narayanaswamy et al. | Sep 2016 | A1 |
| 20170005948 | Melander et al. | Jan 2017 | A1 |
| 20170024260 | Chandrasekaran et al. | Jan 2017 | A1 |
| 20170026294 | Basavaraja et al. | Jan 2017 | A1 |
| 20170026470 | Bhargava et al. | Jan 2017 | A1 |
| 20170041342 | Efremov et al. | Feb 2017 | A1 |
| 20170054659 | Ergin et al. | Feb 2017 | A1 |
| 20170097841 | Chang et al. | Apr 2017 | A1 |
| 20170099188 | Chang et al. | Apr 2017 | A1 |
| 20170104755 | Arregoces et al. | Apr 2017 | A1 |
| 20170147297 | Krishnamurthy et al. | May 2017 | A1 |
| 20170149878 | Mutnuru | May 2017 | A1 |
| 20170171158 | Hoy et al. | Jun 2017 | A1 |
| 20170264663 | Bicket et al. | Sep 2017 | A1 |
| 20170339070 | Chang et al. | Nov 2017 | A1 |
| Number | Date | Country |
|---|---|---|
| 101719930 | Jun 2010 | CN |
| 101394360 | Jul 2011 | CN |
| 102164091 | Aug 2011 | CN |
| 104320342 | Jan 2015 | CN |
| 105740084 | Jul 2016 | CN |
| 2228719 | Sep 2010 | EP |
| 2439637 | Apr 2012 | EP |
| 2645253 | Nov 2014 | EP |
| 10-2015-0070676 | May 2015 | KR |
| M394537 | Dec 2010 | TW |
| WO 2009155574 | Dec 2009 | WO |
| WO 2010030915 | Mar 2010 | WO |
| WO 2013158707 | Oct 2013 | WO |
| Entry |
|---|
| “Network Service Header”, Internet Engineering Task Force Draft, Published Jul. 3, 2014. |
| Kumar, S., et al., “Infrastructure Service Forwarding for NSH,”Service Function Chaining Internet Draft, draft-kumar-sfc-nsh-forwarding-00, Dec. 5, 2015, 10 pages. |
| Quinn, P., et al., “Service Function Chaining (SFC) Architecture,” Network Working Group, Internet Draft, draft-quinn-sfc-arch-03.txt, Jan. 22, 2014, 21 pages. |
| PCT Mar. 7, 2017 International Search Report and Written Opinion of the International Searching Authority from International Application Serial No. PCT/US2016/064017; 10 pages. |
| Amedro, Brian, et al., “An Efficient Framework for Running Applications on Clusters, Grids and Cloud,” 2010, 17 pages. |
| Author Unknown, “5 Benefits of a Storage Gateway in the Cloud,” Blog, TwinStrata, Inc., Jul. 25, 2012, XP055141645, 4 pages, https://web.archive.org/web/20120725092619/http://blog.twinstrata.com/2012/07/10//5-benefits-of-a-storage-gateway-in-the-cloud. |
| Author Unknown, “Joint Cisco and VMWare Solution for Optimizing Virtual Desktop Delivery: Data Center 3.0: Solutions to Accelerate Data Center Virtualization,” Cisco Systems, Inc. and VMware, Inc., Sep. 2008, 10 pages. |
| Author Unknown, “A Look at DeltaCloud: The Multi-Cloud API,” Feb. 17, 2012, 4 pages. |
| Author Unknown, “About Deltacloud,” Apache Software Foundation, Aug. 18, 2013, 1 page. |
| Author Unknown, “Architecture for Managing Clouds, A White Paper from the Open Cloud Standards Incubator,” Version 1.0.0, Document No. DSP-IS0102, Jun. 18, 2010, 57 pages. |
| Author Unknown, “Cloud Infrastructure Management Interface—Common Information Model (CIMI-CIM),” Document No. DSP0264, Version 1.0.0, Dec. 14, 2012, 21 pages. |
| Author Unknown, “Cloud Infrastructure Management Interface (CIMI) Primer,” Document No. DSP2027, Version 1.0.1, Sep. 12, 2012, 30 pages. |
| Author Unknown, “cloudControl Documentation,” Aug. 25, 2013, 14 pages. |
| Author Unknown, “Interoperable Clouds, A White Paper from the Open Cloud Standards Incubator,” Version 1.0.0, Document No. DSP-IS0101, Nov. 11, 2009, 21 pages. |
| Author Unknown, “Microsoft Cloud Edge Gateway (MCE) Series Appliance,” Iron Networks, Inc., 2014, 4 pages. |
| Author Unknown, “Open Data Center Alliance Usage: Virtual Machine (VM) Interoperability in a Hybrid Cloud Environment Rev. 1.2,” Open Data Center Alliance, Inc., 2013, 18 pages. |
| Author Unknown, “Real-Time Performance Monitoring on Juniper Networks Devices, Tips and Tools for Assessing and Analyzing Network Efficiency,” Juniper Networks, Inc., May 2010, 35 pages. |
| Author Unknown, “Use Cases and Interactions for Managing Clouds, A White Paper from the Open Cloud Standards Incubator,” Version 1.0.0, Document No. DSP-ISO0103, Jun. 16, 2010, 75 pages. |
| Author Unknown, “Apache Ambari Meetup What's New,” Hortonworks Inc., Sep. 2013, 28 pages. |
| Author Unknown, “Introduction,” Apache Ambari project, Apache Software Foundation, 2014, 1 page. |
| Baker, F., “Requirements for IP Version 4 Routers,” Jun. 1995, 175 pages, Network Working Group, Cisco Systems. |
| Beyer, Steffen, “Module “Data:: Locations?!”,” YAPC::Europe, London, UK,ICA, Sep. 22-24, 2000, XP002742700, 15 pages. |
| Blanchet, M., “A Flexible Method for Managing the Assignment of Bits of an IPv6 Address Block,” Apr. 2003, 8 pages, Network Working Group, Viagnie. |
| Borovick, Lucinda, et al., “Architecting the Network for the Cloud,” IDC White Paper, Jan. 2011, 8 pages. |
| Bosch, Greg, “Virtualization,” last modified Apr. 2012 by B. Davison, 33 pages. |
| Broadcasters Audience Research Board, “What's Next,” http://lwww.barb.co.uk/whats-next, accessed Jul. 22, 2015, 2 pages. |
| Cisco Systems, Inc. “Best Practices in Deploying Cisco Nexus 1000V Series Switches on Cisco UCS B and C Series Cisco UCS Manager Servers,” Cisco White Paper, Apr. 2011, 36 pages, http://www.cisco.com/en/US/prod/collateral/switches/ps9441/ps9902/white_paper_c11-558242.pdf. |
| Cisco Systems, Inc., “Cisco Unified Network Services: Overcome Obstacles to Cloud-Ready Deployments,” Cisco White Paper, Jan. 2011, 6 pages. |
| Cisco Systems, Inc., “Cisco Intercloud Fabric: Hybrid Cloud with Choice, Consistency, Control and Compliance,” Dec. 10, 2014, 22 pages. |
| Cisco Technology, Inc., “Cisco Expands Videoscape TV Platform Into the Cloud,” Jan. 6, 2014, Las Vegas, Nevada, Press Release, 3 pages. |
| Citrix, “Citrix StoreFront 2.0” White Paper, Proof of Concept Implementation Guide, Citrix Systems, Inc., 2013, 48 pages. |
| Citrix, “CloudBridge for Microsoft Azure Deployment Guide,” 30 pages. |
| Citrix, “Deployment Practices and Guidelines for NetScaler 10.5 on Amazon Web Services,” White Paper, citrix.com, 2014, 14 pages. |
| CSS Corp, “Enterprise Cloud Gateway (ECG)—Policy driven framework for managing multi-cloud environments,” original published on or about Feb. 11, 2012; 1 page; http://www.css-cloud.com/platform/enterprise-cloud-gateway.php. |
| Fang K., “LISP MAC-EID-TO-RLOC Mapping (LISP based L2VPN),” Network Working Group, Internet Draft, CISCO Systems, Jan. 2012, 12 pages. |
| Ford, Bryan, et al., Peer-to-Peer Communication Across Network Address Translators, In USENIX Annual Technical Conference, 2005, pp. 179-192. |
| Gedymin, Adam, “Cloud Computing with an emphasis on Google App Engine,” Sep. 2011, 146 pages. |
| Good, Nathan A., “Use Apache Deltacloud to administer multiple instances with a single API,” Dec. 17, 2012, 7 pages. |
| Herry, William, “Keep It Simple, Stupid: OpenStack nova-scheduler and its algorithm”, May 12, 2012, IBM, 12 pages. |
| Hewlett-Packard Company, “Virtual context management on network devices”, Research Disclosure, vol. 564, No. 60, Apr. 1, 2011, Mason Publications, Hampshire, GB, Apr. 1, 2011, 524. |
| Juniper Networks, Inc., “Recreating Real Application Traffic in Junosphere Lab,” Solution Brief, Dec. 2011, 3 pages. |
| Kenhui, “Musings on Cloud Computing and IT-as-a-Service: [Updated for Havana] Openstack Computer for VSphere Admins, Part 2: Nova-Scheduler and DRS”, Jun. 26, 2013, Cloud Architect Musings, 12 pages. |
| Kolyshkin, Kirill, “Virtualization in Linux,” Sep. 1, 2006, XP055141648, 5 pages, https://web.archive.org/web/20070120205111/http://download.openvz.ora/doc/openvz-intro.pdf. |
| Kunz, Thomas, et al., “OmniCloud—The Secure and Flexible Use of Cloud Storage Services,” 2014, 30 pages. |
| Lerach, S.R.O., “Golem,” http://www.lerach.cz/en/products/golem, accessed Jul. 22, 2015, 2 pages. |
| Linthicum, David, “VM Import could be a game changer for hybrid clouds”, InfoWorld, Dec. 23, 2010, 4 pages. |
| Logan, Marcus, “Hybrid Cloud Application Architecture for Elastic Java-Based Web Applications,” F5 Deployment Guide Version 1.1, 2016, 65 pages. |
| Lynch, Sean, “Monitoring cache with Claspin” Facebook Engineering, Sep. 19, 2012, 5 pages. |
| Meireles, Fernando Miguel Dias, “Integrated Management of Cloud Computing Resources,” 2013-2014, 286 pages. |
| Meraki, “meraki releases industry's first cloud-managed routers,” Jan. 13, 2011, 2 pages. |
| Mu, Shuai, et al., “uLibCloud: Providing High Available and Uniform Accessing to Multiple Cloud Storages,” 2012 IEEE, 8 pages. |
| Naik, Vijay K., et al., “Harmony: A Desktop Grid for Delivering Enterprise Computations,” Grid Computing, 2003, Fourth International Workshop on Proceedings, Nov. 17, 2003, pp. 1-11. |
| Nair, Srijith K. et al., “Towards Secure Cloud Bursting, Brokerage and Aggregation,” 2012, 8 pages, www.flexiant.com. |
| Nielsen, “SimMetry Audience Measurement—Technology,” http://www.nielsen-admosphere.eu/products-and-services/simmetry-audience-measurement-technology/, accessed Jul. 22, 2015, 6 pages. |
| Nielsen, “Television,” http://www.nielsen.com/us/en/solutions/measurement/television.html, accessed Jul. 22, 2015, 4 pages. |
| Open Stack, “Filter Scheduler,” updated Dec. 17, 2017, 5 pages, accessed on Dec. 18, 2017, https://docs.openstack.org/nova/latest/user/filter-scheduler.html. |
| Rabadan, J., et al., “Operational Aspects of Proxy-ARP/ND in EVPN Networks,” BESS Worksgroup Internet Draft, draft-snr-bess-evpn-proxy-arp-nd-02, Oct. 6, 2015, 22 pages. |
| Saidi, Ali, et al., “Performance Validation of Network-Intensive Workloads on a Full-System Simulator,” Interaction between Operating System and Computer Architecture Workshop, (IOSCA 2005), Austin, Texas, Oct. 2005, 10 pages. |
| Shunra, “Shunra for HP Software; Enabling Confidence in Application Performance Before Deployment,” 2010, 2 pages. |
| Son, Jungmin, “Automatic decision system for efficient resource selection and allocation in inter-clouds,” Jun. 2013, 35 pages. |
| Sun, Aobing, et al., “laaS Public Cloud Computing Platform Scheduling Model and Optimization Analysis,” Int. J. Communications, Network and System Sciences, 2011, 4, 803-811, 9 pages. |
| Szymaniak, Michal, et al., “Latency-Driven Replica Placement”, vol. 47 No. 8, IPSJ Journal, Aug. 2006, 12 pages. |
| Toews, Everett, “Introduction to Apache jclouds,” Apr. 7, 2014, 23 pages. |
| Von Laszewski, Gregor, et al., “Design of a Dynamic Provisioning System for a Federated Cloud and Bare-metal Environment,” 2012, 8 pages. |
| Wikipedia, “Filter (software)”, Wikipedia, Feb. 8, 2014, 2 pages, https://en.wikipedia.org/w/index.php?title=Filter_%28software%29&oldid=594544359. |
| Wikipedia; “Pipeline (Unix)”, Wikipedia, May 4, 2014, 4 pages, https://en.wikipedia.org/w/index.php?title=Pipeline2/028Unix%29&oldid=606980114. |
| Ye, Xianglong, et al., “A Novel Blocks Placement Strategy for Hadoop,” 2012 IEEE/ACTS 11th International Conference on Computer and Information Science, 2012 IEEE, 5 pages. |
| Number | Date | Country | |
|---|---|---|---|
| 20170163531 A1 | Jun 2017 | US |
| Number | Date | Country | |
|---|---|---|---|
| 62263422 | Dec 2015 | US |