Method and system for service switching using service tags

Information

  • Patent Grant
  • 11805056
  • Patent Number
    11,805,056
  • Date Filed
    Sunday, September 4, 2022
    a year ago
  • Date Issued
    Tuesday, October 31, 2023
    7 months ago
Abstract
The disclosure herein describes a system, which provides service switching in a datacenter environment. The system can include a service switching gateway, which can identify a service tag associated with a received packet. During operation, the service switching gateway determines a source client, a requested service, or both for the packet based on the service tag, identifies a corresponding service portal based on the service tag, and forwards the packet toward the service portal. The service switching gateway can optionally maintain a mapping between the service tag and one or more of: a source client, a required service, the service portal, and a tunnel encapsulation. The service switching gateway can encapsulate the packet based on an encapsulation mechanism supported by the service portal and forward the packet based on the mapping.
Description
BACKGROUND

The exponential growth of the Internet has made it a ubiquitous delivery medium for a variety of applications. Such applications, in turn, have brought with them an increasing demand for bandwidth. As a result, service providers race to build larger and faster data centers with versatile capabilities. Meanwhile, advances in virtualization technologies have made it possible to implement a large number of virtual machines (VMs) in a data center. These virtual machines can essentially operate as physical hosts and perform a variety of functions such as Web or database servers. Because virtual machines are implemented in software, virtual machines for different customer can coexist in the same physical host. This multi-tenancy capability allows service providers to partition and isolate physical resources (e.g., computing power and network capacity) according to customer needs, and to allocate such resources dynamically.


While virtualization brings unprecedented flexibility to service providers, the conventional multi-tenancy tends to be rigid and cannot readily accommodate the dynamic nature of traffic generated by virtual machines. For example, efficiently addressing diverse service requirements of traffic from a plurality of multi-tenant customers (or clients) with different service requirements can be challenging. To obtain service for its traffic, a virtual machine typically interacts with one or more physical or virtual equipments (can be referred to as service portals). A service portal can provide specific networking services, such as load balancing and firewall service etc, and application services, such as web proxy, mail proxy, authentication proxy, web caching, content proxy etc. In conventional datacenter environments, this interaction can be enabled by configuring the services at several management stations in the network.


One or more service portals can provide a service within or outside of the datacenter environment. Consequently, the network infrastructure comprising switches and routers in the datacenter environment requires service switching for multiple services to reach the desired portals. Service switching refers to the switching of a packet based on its service requirements to a service portal. With today's dynamic nature of the datacenter service and policy deployment, such service switching is an increasingly difficult task.


Because of multi-tenancy, the same network infrastructure is used for forwarding traffic flow belonging to different clients. Traffic for a respective client can be originated from a number of applications running on different virtual machines. Furthermore, different clients may require the network infrastructure to forward traffic belonging to the same application differently. For example, in a multi-tenant environment, the network infrastructure may need to forward web traffic from one client to a web filtering service portal while bypassing web filtering for a second client. In a conventional datacenter, the ability to switch traffic based on the corresponding requested services is typically based on static routing policies toward appliances dedicated for services in the network infrastructure. Consequently, managing and extensive provisioning of individual devices in a network infrastructure to accommodate such diverse service requirements can be tedious and error-prone.


SUMMARY

The disclosure herein describes a system, which provides service switching in a datacenter environment. During operation, the system identifies a source client and a requested service of a received packet and generates a service tag indicating the source client, the requested service, or both. The system forwards the packet and the service tag toward a service switching gateway, thereby allowing the service switching gateway to switch the packet based on the service tag. The system can encapsulate the packet based on the identified source client and the requested service of the packet, incorporates the service tag in the packet encapsulation, and forwards the packet is based on the encapsulation.


The system can include a service switching gateway, which can identify a service tag associated with a received packet. During operation, the service switching gateway determines a source client, a requested service, or both for the packet based on the service tag, identifies a corresponding service portal based on the service tag, and forwards the packet toward the service portal. The service switching gateway can optionally maintain a mapping between the service tag and one or more of: a source client, a requested service, the service portal, and a tunnel encapsulation. The service switching gateway can encapsulate the packet based on an encapsulation mechanism supported by the service portal and forward the packet based on the mapping.


Additionally, upon providing the service to the packet, the service portal can forward the packet back to the service switching gateway. The service switching gateway receives the packet, reconstructs the service tag for the packet, and forwards the packet back to its origination switch. The system can use Generic Routing Encapsulation (GRE) tunneling, Internet Protocol Security (IPsec) tunneling, Virtual Local Area Network (VLAN) encapsulation, and/or Internet Protocol (IP) for encapsulation. The system uses a GRE key, an IPsec Security Parameter Index (SPI), a VLAN tag, and/or IP header options as the corresponding service tag.





BRIEF DESCRIPTION OF FIGURES


FIG. 1A illustrates an exemplary datacenter environment that facilitates dynamic service switching.



FIG. 1B illustrates encapsulation-based dynamic service switching in conjunction with the example in FIG. 1A.



FIG. 2 illustrates header format for a conventional packet and its tunnel encapsulation of dynamic service switching.



FIG. 3 presents a time-space diagram illustrating an exemplary dynamic service switching process in a datacenter environment.



FIG. 4A presents a flow chart illustrating an exemplary process of an origination switch configuring forwarding policies in a datacenter environment based on service requirements.



FIG. 4B presents a flow chart illustrating an exemplary process of an origination switch forwarding a packet in a datacenter environment.



FIG. 5A presents a flow chart illustrating an exemplary process of a service switching gateway configuring service switching policies in a datacenter environment.



FIG. 5B presents a flow chart illustrating an exemplary process of a service switching gateway forwarding a packet in a datacenter environment based on service requirements.



FIG. 6 illustrates an exemplary service switching gateway.





In the figures, like reference numerals refer to the same figure elements.


DETAILED DESCRIPTION

The following description is presented to enable any person skilled in the art to make and use the embodiments, and is provided in the context of a particular application and its requirements. Various modifications to the disclosed embodiments will be readily apparent to those skilled in the art, and the general principles defined herein may be applied to other embodiments and applications without departing from the spirit and scope of the present disclosure. Thus, the present invention is not limited to the embodiments shown, but is to be accorded the widest scope consistent with the principles and features disclosed herein.


Embodiments of the system disclosed herein solve the problem of dynamically facilitating services to a packet in a multitenant datacenter environment by attaching a service tag to the packet based on its service requirements and switching the packet using the service tag. Because of multi-tenancy, the same network infrastructure of the datacenter environment is used to forward traffic flow belonging to different clients. With existing technologies, standard network protocol stack (e.g., layer-2 and layer-3 of the stack) is typically used by a client in a multi-tenant datacenter environment. For example, the client typically uses its own virtual local area network (VLAN) and Internet Protocol (IP) sub-network (subnet) corresponding to a specific range of IP addresses. As a result, the network protocol stack may not be available for associating virtual machines of different clients with different service requirements. Because different services can be provided from different service portals within or outside of the datacenter, the network infrastructure of the datacenter is burdened with selecting the appropriate service portal. Managing individual devices in the network infrastructure to accommodate such diverse service provisioning can be tedious and error-prone.


To solve this problem, a respective packet in a datacenter environment is associated with a service tag which indicates the source client of the packet and/or the service the packet requires. The client to which the originating virtual machine of the packet belongs is the source client of the packet. In some embodiments, upon receiving the packet, a switch, which can be the first-hop switch, determines the source client, and the requested service and creates the service tag. The switch then encapsulates the packet, includes the service tag as a part of the encapsulation, and sends the encapsulated packet to a service switching gateway. Because this switch originates the service switching in the datacenter environment, the switch can be referred to as the origination switch. The service switching gateway uses the service tag to identify service portal capable of providing the requested service to the packet. In some embodiments, the encapsulation is based on a generic encapsulation mechanism. Upon receiving the packet and the service tag, the service switching gateway decapsulates the packet, identifies the source client and the requested service from the service tag, and forwards the packet to a service portal based on the determination. In some embodiments, the service switching gateway can use a generic encapsulation mechanism to forward the packet to a service portal.



FIG. 1A illustrates an exemplary datacenter environment that facilitates dynamic service switching. Datacenter environment 100 includes a number of host machines 122, 124, 126, and 128. A respective host machine can host a plurality of virtual machines running on virtualization software. For example, host machine 122 and 126 run virtualization software 130 and 140, respectively. A number of virtual machines 132, 134, and 138 run on virtualization software 130, and a number of virtual machines 142, 144, and 148 run on virtualization software 140. In this example, virtual machines 132, 134, and 142 belong to VLAN 1, which is associated with one customer, and virtual machines 138, 144, and 148 belong to VLAN 2, which is associated with another customer.


Datacenter environment 100 also includes a policy server 114, which allows a network administrator to provide service policies regarding different clients and the requested services for different traffic flow type from a respective client. Policy server 114 sends these service policies to an origination switch 112 and a service switching gateway 116 via network 102. In this example, originating switch 112 operates as the origination point of service switching in datacenter environment 100. Note that virtualization software 130 and 140, and/or any networking device in network 102 can operate as an origination point of service switching in datacenter environment 100. Service switching gateway 116 is coupled to service portals 152, 154, and 156 via network 104.


Networks 102 and 104 can be local or wide area networks comprising layer-2 (e.g., Ethernet), layer-3 (e.g., IP), and/or any other networking layers. In some embodiments, networks 102 and 104 are parts of the same network (e.g., same local or wide area network). Based on the service policies received from policy server 114, switch 112 configures forwarding policies by determining which traffic flow type (e.g., web, mail, file transfer, etc) from a client requires which service. Similarly, based on the service policies, service switching gateway 116 configures service switching policies by determining which service portal should the traffic flow be directed to.


During operation, virtual machine 132 generates a packet. The term “packet” refers to a group of bits that can be transported together across a network. “Packet” should not be interpreted as limiting embodiments of the present invention to any specific networking layer. “Packet” can be replaced by other terminologies referring to a group of bits, such as “frame,” “message,” “cell,” or “datagram.” Switch 112 receives the packet and determines the source client (i.e., the client to which virtual machine 132 belong) of the packet. Switch 112 can detect the source client based on membership to VLAN 1, an associated subnet and a corresponding IP address range, a source (physical or virtual) port, or any point of attachment between virtual machine 132 and switch 112. Switch 112 also detects the traffic flow type of the packet. Switch 112 can inspect headers of one or more layers (e.g., Ethernet and IP) to determine the traffic flow type. For example, if the packet includes a destination Transmission Control Protocol (TCP) port 80, the packet can be considered as part of a web traffic flow.


Based on the identified source client and the traffic flow type, switch 112 determines the requested service for the packet. Not all clients may require all services. For example, one client may require a web filtering service for all packets while another client may not require any web filtering service. If the packet from virtual machine 132 requires any service, switch 112 creates a service tag, which indicates the source client, the requested service for the packet, or both. Switch 112 then attaches the service tag with the packet and sends the packet to service switching gateway 116 via one or more hops through network 102. In some embodiments, switch 112 encapsulates the packet using a generic encapsulation mechanism and attaches the service tag as a part of the encapsulation. Examples of packet encapsulation include, but are not limited to, Generic Routing Encapsulation (GRE) tunneling, Internet Protocol Security (IPsec) tunneling, VLAN encapsulation, and IP encapsulation. Examples of corresponding service tag include, but are not limited to, a GRE key, Security Parameter Index (SPI), VLAN tag, and IP header options. If the packet does not require any service, switch 112 forwards the packet based on the destination information in the header of the packet.


Service switching gateway 116 terminates packet encapsulation from switch 112. Because the networking devices in network 102 forwards the packet based on the encapsulation, these devices do not need any modification to assist service switching. Upon receiving the packet and the service tag, service switching gateway 116 extracts the service tag and identifies the source client, the requested service, or both from the service tag. Suppose that service portal 152 can provide the requested service to the packet. Based on the identification, service switching gateway 116 selects service portal 152 for providing the service to the packet. Service switching gateway 116 then sends the packet to service portal 152 via one or more hops through network 104. In some embodiments, service switching gateway 116 encapsulates the packet based on a generic encapsulation mechanism supported by both service switching gateway 116 and service portal 152. After providing the service, service portal 152 can either forward the packet based on the destination information of the packet or send the packet back to service switching gateway 116. Upon receiving the packet back, service switching gateway 116 attaches the tag back to the packet and sends the packet back to switch 112.


Note that service switching gateway 116 can have packet encapsulation with switch 112 and service 152 using different encapsulation mechanisms. Service switching gateway 116 uses the service tag in the tunnel encapsulation to switch/steer the packet to corresponding service portal 152. FIG. 1B illustrates encapsulation-based dynamic service switching in conjunction with the example in FIG. 1A. In the example in FIG. 1B, during operation, switch 112 receives packets from virtual machines 142 and 144, which belong to different clients (denoted by different VLANs). Switch 112 establishes one or more forwarding encapsulation tunnels 160 with service switching gateway 116 for forwarding packets from virtual machines 142 and 144. An encapsulation tunnel encapsulates a packet between the origination and termination points of the tunnel.


In some embodiments, based on the customer requirements, service policies specify whether to use the same tunnel for multiple clients or use different tunnels for different clients. Consequently, switch 112 and service switching gateway 116 can have different tunnels for different clients based on the service policies. For example, switch 112 forwards packets from virtual machine 142 via tunnel 162 while forwards packets from virtual machine 144 via tunnel 164. Tunnel 162 and 164 can be based on different encapsulation mechanisms, wherein the service tag formats for tunnel 162 and 164 correspond to the respective encapsulation mechanism. For example, if tunnel 162 is an IPSec tunnel while tunnel 164 is a GRE tunnel, the service tags for all packets forwarded via tunnel 162 are IPSec SPIs and for all packets forwarded via tunnel 164 are GRE keys.


On the other hand, service switching gateway 116 establishes one or more service encapsulation tunnels 170 with service portals 152, 154, and 156 for forwarding packets based on their service requirements. In some embodiments, based on the encapsulation mechanisms supported by a respective service portal, service policies specify which encapsulation mechanism to use for establishing an encapsulation tunnel with a service portal. Service switching gateway 116 and service portals 152, 154, and 156 have tunnels 172, 174, and 176, respectively, between them. Tunnels 172, 174, and 176 can be based on different encapsulation mechanism. For example, tunnel 172 can be a GRE tunnel while tunnels 174 and 176 can be IPSec tunnels.


During operation, switch 112 receives a packet, which requires a service from service portal 152, from virtual machine 142. Switch 112 creates a service tag, which is an IPSec SPI, specifying the source client to which virtual machine 142 belongs. The service tag can also include a requested service, which is the service provided by service portal 152. Switch 112 then encapsulates the packet in IPSec tunneling format, includes the generated IPSec SPI in the encapsulation, and forwards the encapsulated packet to service switching gateway 116 via tunnel 162. Intermediate networking devices in network 102 forwards the packet based on the encapsulation. Upon receiving the encapsulated packet, service switching gateway 116 decapsulates the packet, extracts the IPSec SPI (i.e., the service tag), and identifies the source client and/or the requested service.


In some embodiments, service switching gateway 116 maintains a service mapping between the requested service and/or the source client, and the associated service portal 152. Based on the service mapping, identified the source client, and/or requested service, service switching gateway 116 determines service portal 152 as the service destination. Service switching gateway 116 then encapsulates the packet in GRE tunneling format and forwards the encapsulated packet to service portal 152 via tunnel 172. Upon receiving the encapsulated packet, service portal 152 decapsulates the packet and provides the requested service to the packet. In some embodiments, service switching gateway 116 specifies the requested service by regenerating the service tag as a GRE key and incorporates the GRE key in the packet encapsulation. Upon receiving the packet, service portal 152 extracts the service tag and identifies the requested service for the packet. This can be useful when service portal 152 can provide multiple services.



FIG. 2 illustrates header format for a conventional packet and its tunnel encapsulation of dynamic service switching. In this example, a conventional Ethernet packet 200 typically includes a payload 203 and an Ethernet header 208. Typically, payload 203 can include an IP packet which includes an IP header 206. Ethernet header 208 includes a media access control (MAC) destination address (DA) 204, a MAC source address (SA) 202, and optionally a VLAN tag 205.


In one embodiment, switch 112 can encapsulate conventional packet 200 into an encapsulated packet 250. Encapsulated packet 250 typically includes an encapsulation header 210, which corresponds to the encapsulation mechanism. Encapsulation header 210 contains an encapsulation DA 212 and an encapsulation SA 214. The encapsulated packet is forwarded via network 102 based on encapsulation DA 212. Encapsulation header 210 also includes a service tag 220, which indicates the source client 222, a requested service 224 for packet 200, or both. For example, if encapsulation header 210 corresponds to an IPSec tunnel, a GRE tunnel, or a VLAN encapsulation, service tag 220 is an IPSec SPI, a GRE key, or a VLAN tag, respectively.


Take, for example, packet 200 is a web request to a web server generated by virtual machine 142. Typically, an upper layer application in virtual machine 142 generates an IP packet destined for the web server, using web server's IP address. This IP packet becomes payload 203, and the web server's IP address becomes the destination IP address in IP header 206. In addition, virtualization software 140's IP address becomes the source IP address in IP header 206. The layer-2 in virtual machine 142 then generates Ethernet header 208 to encapsulate payload 203. MAC DA 204 of Ethernet header 208 is assigned the default gateway router's MAC address. For example, if switch 112 is the gateway router, MAC DA 204 of Ethernet header 208 is switch 112's MAC address. MAC SA 202 of Ethernet header 208 is virtual machine 142's MAC address. Virtual machine 142 then sends Ethernet packet 200 to switch 112.


When switch 112 receives Ethernet packet 200 from virtual machine 142, switch 112 inspects the Ethernet MAC DA 204, MAC SA 202, VLAN tag 205, and optionally IP header 206 and its payload (e.g., the layer-4 header). Based on this information, switch 112 determines that Ethernet packet 200 is associated with web service and requires a service from service portal 152. Subsequently, switch 112 assembles the encapsulation header 210, attaches service tag 220 (corresponding to an encapsulation mechanism), and forwards packet 220 to service switching gateway 116. Upon receiving packet 220, service switching gateway 116 removes encapsulation header 210 and extracts service tag 220. Service switching gateway 116 then assembles another encapsulation header for the packet and forwards the encapsulated packet to service portal 152.


As mentioned above, when virtual machine 142 sends a packet to the web server, the packet is switched to a service portal. FIG. 3 presents a time-space diagram illustrating an exemplary dynamic service switching process in a datacenter environment. During operation, switch 112 receives packet 302, which requires a service from service portal 152, from virtual machine 142. Switch 112 creates a service tag specifying the source client to which virtual machine 142 belongs and a requested service, which is the service provided by service portal 152. Switch 112 then encapsulates packet 302 in encapsulation header 304, includes the generated service tag in encapsulation header 304, and forwards encapsulated packet 302 to service switching gateway 116. Upon receiving encapsulated packet 302, service switching gateway 116 decapsulates packet 302, extracts the service tag from encapsulation header 304, and identifies the source client and/or the requested service. Based on the identified the source client and/or the requested service, service switching gateway 116 determines service portal 152 as the service destination. Service switching gateway 116 then encapsulates packet 302 in another encapsulation header 306 and forwards encapsulated packet 302 to service portal 152. Note that encapsulation headers 304 and 306 can be based on different encapsulation mechanism.


Switch 112 can receive another packet 312, which requires a service from service portal 154, from virtual machine 142. Switch 112 encapsulates packet 312 in encapsulation header 314, includes a corresponding service tag in encapsulation header 314, and forwards encapsulated packet 312 to service switching gateway 116. However, based on the service policies associated with a client, switch 112 can use a different encapsulation mechanism for that client. In this example, when switch 112 receives packet 322, which requires a service from service portal 154, from virtual machine 144 belonging to a different client, switch 112 encapsulates packet 322 in encapsulation header 324, which is based on a different encapsulation mechanism than encapsulation headers 304 and 314. Switch 112 then includes a corresponding service tag in encapsulation header 324, and forwards encapsulated packet 322 to service switching gateway 116.


Upon receiving encapsulated packets 312 and 322, service switching gateway 116 decapsulates packets 312 and 322, extracts the service tag from encapsulation headers 314 and 324, respectively, and identifies the source client and/or the requested service. Based on the identified the source client and/or the requested service and a service mapping, service switching gateway 116 determines service portal 154 as the service destination. Service switching gateway 116 then encapsulates packets 312 and 322 in encapsulation headers 316 and 326, respectively, and forwards encapsulated packets 312 and 322 to service portal 154. Encapsulation headers 304 and 306 can be based on the same encapsulation mechanism even though they are generated at different locations.



FIG. 4A presents a flow chart illustrating an exemplary process of an origination switch configuring forwarding policies in a datacenter environment based on service requirements. During operation, the switch receives service policies from a policy server (operation 402), as described in conjunction with FIG. 1A. The switch then determines the service(s) associated with a respective client based on the received service policies (operation 404). The switch also identifies service-identifying features of a respective service (operation 406). For example, service-identifying feature of web filtering can be determining whether a packet includes a destination TCP port 80. The switch obtains encapsulation policy for a respective client based on the received service policies (operation 408). An encapsulation policy dictates the supported encapsulation mechanisms, and which mechanism should be used under which circumstance. For example, a client may require a separate tunnel for forwarding its packets, as described in conjunction with FIG. 1B. The switch then establishes a forwarding encapsulation tunnel with a service switching gateway based on the encapsulation policy (operation 410).



FIG. 4B presents a flow chart illustrating an exemplary process of an origination switch forwarding a packet in a datacenter environment. Upon receiving a packet via a local port (operation 452), the switch identifies the source client of the packet (operation 454). In some embodiments, the switch detects the source client based on membership to a VLAN, an associated subnet and a corresponding IP address range, a source (physical or virtual) port, or any point of attachment with the client. The switch then identifies the service requested for the packet based on the identified client and service-identifying feature(s) of the packet (operation 456). The switch then checks whether the packet requires service switching based on the service policies, as described in conjunction with FIG. 4A (operation 458).


If the packet requires service switching, the switch creates a service tag indicating the source client and/or the requested service for the packet (operation 462). The switch encapsulates the packet based on the forwarding tunnel with a service switching gateway (operation 464). Note that this forwarding tunnel can be client-specific. The switch incorporates the service tag in the packet encapsulation (operation 466) and forwards the encapsulated packet toward the service switching gateway (operation 468). If the packet does not require service switching, the switch forwards the packet based on its header information (operation 460).



FIG. 5A presents a flow chart illustrating an exemplary process of a service switching gateway configuring service switching policies in a datacenter environment. During operation, the service switching gateway receives service policies from a policy server (operation 502), as described in conjunction with FIG. 1A. The service switching gateway then determines the service(s) associated with a respective client based on the received service policies (operation 504). The service switching gateway identifies service portal for a respective service (operation 506) and creates a service mapping between a respective service portal and a respective client and/or associated service based on the received service policies (operation 508). The service switching gateway obtains encapsulation policy for a respective service portal (operation 510) and establishes a service encapsulation tunnel with a respective service portal based on the encapsulation policy (operation 512).



FIG. 5B presents a flow chart illustrating an exemplary process of a service switching gateway forwarding a packet in a datacenter environment based on service requirements. Upon receiving a packet via a forwarding tunnel (operation 552), the service switching gateway extracts the service tag from the packet encapsulation and decapsulate the packet (operation 554) and identifies the source client and/or a requested service associated with the packet based on the service tag (operation 556). The service switching gateway identifies the service portal for the packet based on the service mapping in the service switching gateway (operation 558) and the encapsulation mechanism of service encapsulation tunnel with the identified service portal (operation 560). Note that this service encapsulation tunnel can be service-specific. The switch encapsulates the packet based on the identified encapsulation mechanism (operation 562) and forwards the encapsulated packet toward the identified service portal (operation 564).


It should be noted that the service switching gateway described herein can be implemented as a stand-alone appliance, as part of a switch or router, or as part of a host machine. Furthermore, the service switching gateway can be implemented in hardware or software, or a combination of both. FIG. 6 illustrates an exemplary service switching gateway. In this example, a computer system 602 includes a processor 604, memory 606, and a storage device 608. Computer system 602 is also coupled to a display 610, a keyboard 612, and a pointing device 614. Storage device 608 stores data 650 and instructions which when loaded into memory 606 and executed by processor 604 implement an operating system 616, an origination module 620, an encapsulation module 630, and an service switching module 640. Origination module 620 includes an identification module 622 and a tag management module 624. Encapsulation module 630 includes a forwarding module 632. Service switching module 640 includes a tag processing module 642 and a portal selection module 644. When executed by the processor, these modules jointly or separately perform the functions described above.


The data structures and code described in this detailed description are typically stored on a computer-readable storage medium, which may be any device or medium that can store code and/or data for use by a computer system. The computer-readable storage medium includes, but is not limited to, volatile memory, non-volatile memory, magnetic and optical storage devices such as disk drives, magnetic tape, CDs (compact discs), DVDs (digital versatile discs or digital video discs), or other media capable of storing computer-readable media now known or later developed.


The methods and processes described in the detailed description section can be embodied as code and/or data, which can be stored in a computer-readable storage medium as described above. When a computer system reads and executes the code and/or data stored on the computer-readable storage medium, the computer system performs the methods and processes embodied as data structures and code and stored within the computer-readable storage medium.


Furthermore, the methods and processes described above can be included in hardware modules. For example, the hardware modules can include, but are not limited to, application-specific integrated circuit (ASIC) chips, field-programmable gate arrays (FPGAs), and other programmable-logic devices now known or later developed. When the hardware modules are activated, the hardware modules perform the methods and processes included within the hardware modules.


The foregoing descriptions of embodiments of the present invention have been presented for purposes of illustration and description only. They are not intended to be exhaustive or to limit the present invention to the forms disclosed. Accordingly, many modifications and variations will be apparent to practitioners skilled in the art. Additionally, the above disclosure is not intended to limit the present invention. The scope of the present invention is defined by the appended claims.

Claims
  • 1. A non-transitory machine readable medium storing a program for specifying a service to perform on a received packet, the program for execution by at least one hardware processing unit, the program comprising sets of instructions for: identifying a source client and a requested service associated with the received packet;generating a service tag that identifies the source client and the requested service;storing the service tag in an encapsulation header and using the encapsulation header with the stored service tag to encapsulate the packet; andforwarding the encapsulated packet to a service switching gateway that extracts the service tag from the encapsulation header and directs the packet to a service machine based on the service tag,wherein as the service tag identifies both the source client and the requested service, the service switching gateway identifies the service machine based on the source client and the requested service associated with the packet.
  • 2. The non-transitory machine readable medium of claim 1, wherein the packet originates from a virtual machine executing on a host computer, and program is executed by a device that is different than the host computer.
  • 3. The non-transitory machine readable medium of claim 1, wherein the packet originates from a virtual machine executing on a host computer, and the program executes on the host computer.
  • 4. The non-transitory machine readable medium of claim 1, wherein the packet is sent by a machine operating in a multi-tenant datacenter, and the identified source client is a tenant.
  • 5. The non-transitory machine readable medium of claim 1, wherein the service tag comprises one or more of: a GRE key, an IPSec Security Parameter Index (SPI), a VLAN tag, and IP header options.
  • 6. A non-transitory machine readable medium storing a service-switching program for directing an encapsulated first packet to a service machine to perform a service on the first packet, the program for execution by at least one hardware processing unit, the program comprising sets of instructions for: receiving the encapsulated first packet comprising an encapsulation header that includes a service tag that identifies (i) a source identifier identifying a source machine for the first packet and (ii) a service identifier identifying the requested service;extracting, from the encapsulated first packet, the service tag;from a plurality of service policies, selecting a particular service policy based on the extracted service tag;using the selected service policy to select a particular service machine to perform a service operation on the first packet;forwarding the first packet to the selected particular service machine;receiving a second packet from the particular service machine to which the first packet was forwarded; andreconstructing the service identifier and the source identifier for the second packet based on the selected service policy.
  • 7. The non-transitory machine readable medium of claim 6, wherein the service tag comprises one or more of: a GRE key, an IPSec Security Parameter Index (SPI), a VLAN tag, and IP header options.
  • 8. The non-transitory machine readable medium of claim 6, wherein the first packet originates from a machine that executes on a host computer and the first packet is encapsulated by a service originating switch executing on the host computer.
  • 9. The non-transitory machine readable medium of claim 6, wherein the first packet originates from a machine that executes on a host computer and the first packet is encapsulated by a service originating switch operating outside of the host computer.
  • 10. A method for specifying a service to perform on a received packet, the method comprising: identifying a source client and a requested service associated with the received packet;generating a service tag that identifies the source client and the requested service;storing the service tag in an encapsulation header, and using the encapsulation header with the stored service tag to encapsulate the packet; andforwarding the encapsulated packet to a service switching gateway, that extracts the service tag from the encapsulation header and directs the packet to a service machine based on the service tag,wherein as the service tag identifies both the source client and the requested service, the service switching gateway identifies the service machine based on the source client and the requested service associated with the packet.
  • 11. The method of claim 10, wherein the packet originates from a virtual machine executing on a host computer, and program is executed by a device that is different than the host computer.
  • 12. The method of claim 10, wherein the packet originates from a virtual machine executing on a host computer, and the program executes on the host computer.
  • 13. The method of claim 10, wherein the packet is sent by a machine operating in a multi-tenant datacenter, and the identified source client is a tenant.
  • 14. The method of claim 10, wherein the service tag comprises one or more of: a GRE key, an IPSec Security Parameter Index (SPI), a VLAN tag, and IP header options.
CLAIM OF BENEFIT TO PRIOR APPLICATIONS

This application is a continuation application of U.S. patent application Ser. No. 16/905,909, filed Jun. 18, 2020, now issued as U.S. Pat. No. 11,438,267. U.S. patent application Ser. No. 16/905,909 is a continuation application of U.S. patent application Ser. No. 15/973,487, filed May 7, 2018, now issued as U.S. Pat. No. 10,693,782. U.S. patent application Ser. No. 15/973,487 is a continuation application of U.S. patent application Ser. No. 14/960,441, filed Dec. 7, 2015, now issued as U.S. Pat. No. 9,979,641. U.S. patent application Ser. No. 14/960,441 is a continuation application of U.S. patent application Ser. No. 13/891,025, filed May 9, 2013, now issued as U.S. Pat. No. 9,225,638. U.S. Pat. Nos. 11,438,267, 10,693,782, 9,979,641 and 9,225,638 are incorporated herein by reference.

US Referenced Citations (844)
Number Name Date Kind
6006264 Colby et al. Dec 1999 A
6104700 Haddock et al. Aug 2000 A
6154448 Petersen et al. Nov 2000 A
6772211 Lu et al. Aug 2004 B2
6779030 Dugan et al. Aug 2004 B1
6826694 Dutta et al. Nov 2004 B1
6880089 Bommareddy et al. Apr 2005 B1
6985956 Luke et al. Jan 2006 B2
7013389 Srivastava et al. Mar 2006 B1
7209977 Acharya et al. Apr 2007 B2
7239639 Cox et al. Jul 2007 B2
7379465 Aysan et al. May 2008 B2
7406540 Acharya et al. Jul 2008 B2
7447775 Zhu et al. Nov 2008 B1
7480737 Chauffour et al. Jan 2009 B2
7487250 Siegel Feb 2009 B2
7499463 Droux et al. Mar 2009 B1
7649890 Mizutani et al. Jan 2010 B2
7698458 Liu et al. Apr 2010 B1
7818452 Matthews et al. Oct 2010 B2
7898959 Arad Mar 2011 B1
7921174 Denise Apr 2011 B1
7948986 Ghosh et al. May 2011 B1
8078903 Parthasarathy et al. Dec 2011 B1
8094575 Vadlakonda et al. Jan 2012 B1
8175863 Ostermeyer et al. May 2012 B1
8190767 Maufer et al. May 2012 B1
8201219 Jones Jun 2012 B2
8223634 Tanaka et al. Jul 2012 B2
8224885 Doucette et al. Jul 2012 B1
8230493 Davidson et al. Jul 2012 B2
8266261 Akagi Sep 2012 B2
8339959 Moisand et al. Dec 2012 B1
8451735 Li May 2013 B2
8484348 Subramanian et al. Jul 2013 B2
8488577 Macpherson Jul 2013 B1
8521879 Pena et al. Aug 2013 B1
8615009 Ramamoorthi Dec 2013 B1
8707383 Bade et al. Apr 2014 B2
8738702 Belanger et al. May 2014 B1
8743885 Khan et al. Jun 2014 B2
8804720 Rainovic et al. Aug 2014 B1
8804746 Wu et al. Aug 2014 B2
8811412 Shippy Aug 2014 B2
8830834 Sharma Sep 2014 B2
8832683 Heim Sep 2014 B2
8849746 Candea et al. Sep 2014 B2
8856518 Sridharan et al. Oct 2014 B2
8862883 Cherukuri Oct 2014 B2
8868711 Skjolsvold et al. Oct 2014 B2
8873399 Bothos et al. Oct 2014 B2
8874789 Zhu Oct 2014 B1
8892706 Dalal Nov 2014 B1
8913611 Koponen et al. Dec 2014 B2
8914406 Haugsnes et al. Dec 2014 B1
8966024 Koponen et al. Feb 2015 B2
8966029 Zhang et al. Feb 2015 B2
8971345 McCanne Mar 2015 B1
8989192 Foo Mar 2015 B2
8996610 Sureshchandra et al. Mar 2015 B1
9009289 Jacob Apr 2015 B1
9015823 Koponen et al. Apr 2015 B2
9094464 Scharber et al. Jul 2015 B1
9104497 Mortazavi Aug 2015 B2
9148367 Kandaswamy et al. Sep 2015 B2
9172603 Padmanabhan et al. Oct 2015 B2
9178709 Higashida et al. Nov 2015 B2
9191293 Iovene et al. Nov 2015 B2
9195491 Zhang et al. Nov 2015 B2
9203748 Jiang et al. Dec 2015 B2
9225638 Jain et al. Dec 2015 B2
9225659 McCanne Dec 2015 B2
9232342 Seed et al. Jan 2016 B2
9237098 Patel et al. Jan 2016 B2
9256467 Singh et al. Feb 2016 B1
9258742 Pianigiani et al. Feb 2016 B1
9264313 Manuguri et al. Feb 2016 B1
9277412 Freda et al. Mar 2016 B2
9344337 Kumar et al. May 2016 B2
9363183 Kumar et al. Jun 2016 B2
9397946 Yadav Jul 2016 B1
9407540 Kumar et al. Aug 2016 B2
9407599 Koponen et al. Aug 2016 B2
9419897 Cherian et al. Aug 2016 B2
9442752 Roth et al. Sep 2016 B1
9467382 Kumar et al. Oct 2016 B2
9479358 Klosowski et al. Oct 2016 B2
9503530 Niedzielski Nov 2016 B1
9531590 Jain et al. Dec 2016 B2
9577845 Thakkar et al. Feb 2017 B2
9602380 Strassner Mar 2017 B2
9608896 Kumar et al. Mar 2017 B2
9660905 Dunbar et al. May 2017 B2
9686192 Sengupta et al. Jun 2017 B2
9686200 Pettit et al. Jun 2017 B2
9705702 Foo et al. Jul 2017 B2
9705775 Zhang et al. Jul 2017 B2
9749229 Previdi et al. Aug 2017 B2
9755898 Jain et al. Sep 2017 B2
9755971 Wang et al. Sep 2017 B2
9774537 Jain et al. Sep 2017 B2
9787559 Schroeder Oct 2017 B1
9787605 Zhang et al. Oct 2017 B2
9804797 Ng et al. Oct 2017 B1
9825810 Jain et al. Nov 2017 B2
9860079 Cohn et al. Jan 2018 B2
9900410 Dalal Feb 2018 B2
9935827 Jain et al. Apr 2018 B2
9979641 Jain et al. May 2018 B2
9985896 Koponen et al. May 2018 B2
9996380 Singh et al. Jun 2018 B2
10013276 Fahs et al. Jul 2018 B2
10042722 Chigurupati et al. Aug 2018 B1
10075470 Vaidya et al. Sep 2018 B2
10079779 Zhang et al. Sep 2018 B2
10084703 Kumar et al. Sep 2018 B2
10089127 Padmanabhan et al. Oct 2018 B2
10091276 Bloomquist et al. Oct 2018 B2
10104169 Moniz et al. Oct 2018 B1
10129077 Jain et al. Nov 2018 B2
10129180 Zhang et al. Nov 2018 B2
10135636 Jiang et al. Nov 2018 B2
10135737 Jain et al. Nov 2018 B2
10158573 Lee et al. Dec 2018 B1
10187306 Nainar et al. Jan 2019 B2
10200493 Bendapudi et al. Feb 2019 B2
10212071 Kancherla et al. Feb 2019 B2
10225137 Jain et al. Mar 2019 B2
10237379 Kumar et al. Mar 2019 B2
10250501 Ni Apr 2019 B2
10257095 Jain et al. Apr 2019 B2
10284390 Kumar et al. May 2019 B2
10305822 Tao et al. May 2019 B2
10320679 Jain et al. Jun 2019 B2
10333822 Jeuk et al. Jun 2019 B1
10341233 Jain et al. Jul 2019 B2
10341427 Jalan et al. Jul 2019 B2
10375155 Cai et al. Aug 2019 B1
10390285 Zhou Aug 2019 B2
10397275 Jain et al. Aug 2019 B2
10445509 Thota et al. Oct 2019 B2
10484334 Lee et al. Nov 2019 B1
10514941 Zhang et al. Dec 2019 B2
10516568 Jain et al. Dec 2019 B2
10547508 Kanakarajan Jan 2020 B1
10547692 Salgueiro et al. Jan 2020 B2
10554484 Chanda et al. Feb 2020 B2
10594743 Hong et al. Mar 2020 B2
10609091 Hong et al. Mar 2020 B2
10609122 Argenti et al. Mar 2020 B1
10623309 Gampel et al. Apr 2020 B1
10637750 Bollineni et al. Apr 2020 B1
10645060 Ao et al. May 2020 B2
10645201 Mishra et al. May 2020 B2
10659252 Boutros et al. May 2020 B2
10693782 Jain et al. Jun 2020 B2
10700891 Hao et al. Jun 2020 B2
10708229 Sevinc et al. Jul 2020 B2
10728174 Boutros et al. Jul 2020 B2
10735311 Li Aug 2020 B2
10742544 Roeland et al. Aug 2020 B2
10757077 Rajahalme et al. Aug 2020 B2
10797910 Boutros et al. Oct 2020 B2
10797966 Boutros et al. Oct 2020 B2
10802858 Gunda Oct 2020 B2
10805181 Boutros et al. Oct 2020 B2
10805192 Boutros et al. Oct 2020 B2
10812378 Nainar et al. Oct 2020 B2
10826835 Ruckstuhl et al. Nov 2020 B2
10834004 Yigit et al. Nov 2020 B2
10853111 Gupta et al. Dec 2020 B1
10929171 Gokhale et al. Feb 2021 B2
10931793 Kumar et al. Feb 2021 B2
10938668 Zulak et al. Mar 2021 B1
10938716 Chin et al. Mar 2021 B1
10944673 Naveen et al. Mar 2021 B2
10949244 Naveen et al. Mar 2021 B2
10997177 Howes et al. May 2021 B1
11003482 Rolando et al. May 2021 B2
11012351 Feng et al. May 2021 B2
11012420 Sevinc et al. May 2021 B2
11026047 Greenberger et al. Jun 2021 B2
11036538 Lecuyer et al. Jun 2021 B2
11038782 Boutros et al. Jun 2021 B2
11042397 Mishra et al. Jun 2021 B2
11055273 Meduri et al. Jul 2021 B1
11074097 Naveen et al. Jul 2021 B2
11075839 Zhuang et al. Jul 2021 B2
11075842 Jain et al. Jul 2021 B2
11086654 Rolando et al. Aug 2021 B2
11119804 Gokhale et al. Sep 2021 B2
11140218 Tidemann et al. Oct 2021 B2
11153190 Mahajan et al. Oct 2021 B1
11153406 Sawant et al. Oct 2021 B2
11157304 Watt, Jr. et al. Oct 2021 B2
11184397 Annadata et al. Nov 2021 B2
11194610 Mundaragi et al. Dec 2021 B2
11212356 Rolando et al. Dec 2021 B2
11223494 Mishra et al. Jan 2022 B2
11249784 Chalvadi et al. Feb 2022 B2
11265187 Boutros et al. Mar 2022 B2
11277331 Rolando et al. Mar 2022 B2
11283717 Tidemann et al. Mar 2022 B2
11288088 Rolando et al. Mar 2022 B2
11294703 Rolando et al. Apr 2022 B2
11296930 Jain et al. Apr 2022 B2
11301281 Rolando et al. Apr 2022 B2
11316900 Schottland et al. Apr 2022 B1
11321113 Feng et al. May 2022 B2
11354148 Rolando et al. Jun 2022 B2
11360796 Mishra et al. Jun 2022 B2
11368387 Rolando et al. Jun 2022 B2
11397604 Mundaragi et al. Jul 2022 B2
11398983 Wijnands et al. Jul 2022 B2
11405431 Hong et al. Aug 2022 B2
11411863 Zhang et al. Aug 2022 B2
11438257 Rolando et al. Sep 2022 B2
11438267 Jain et al. Sep 2022 B2
11467861 Kavathia et al. Oct 2022 B2
11496606 Jain et al. Nov 2022 B2
11528213 Venkatasubbaiah et al. Dec 2022 B2
11528219 Rolando et al. Dec 2022 B2
11595250 Naveen et al. Feb 2023 B2
11604666 Feng et al. Mar 2023 B2
11609781 Mishra et al. Mar 2023 B2
11611625 Jain et al. Mar 2023 B2
11659061 Sawant et al. May 2023 B2
20020010783 Primak et al. Jan 2002 A1
20020078370 Tahan Jun 2002 A1
20020097724 Halme et al. Jul 2002 A1
20020194350 Lu et al. Dec 2002 A1
20030065711 Acharya et al. Apr 2003 A1
20030093481 Mitchell et al. May 2003 A1
20030097429 Wu et al. May 2003 A1
20030105812 Flowers et al. Jun 2003 A1
20030188026 Denton et al. Oct 2003 A1
20030236813 Abjanic Dec 2003 A1
20040066769 Ahmavaara et al. Apr 2004 A1
20040210670 Anerousis et al. Oct 2004 A1
20040215703 Song et al. Oct 2004 A1
20040249776 Horvitz et al. Dec 2004 A1
20050021713 Dugan et al. Jan 2005 A1
20050089327 Ovadia et al. Apr 2005 A1
20050091396 Nilakantan et al. Apr 2005 A1
20050114429 Caccavale May 2005 A1
20050114648 Akundi et al. May 2005 A1
20050132030 Hopen et al. Jun 2005 A1
20050198200 Subramanian et al. Sep 2005 A1
20050249199 Albert et al. Nov 2005 A1
20060069776 Shim et al. Mar 2006 A1
20060112297 Davidson May 2006 A1
20060130133 Andreev et al. Jun 2006 A1
20060155862 Kathi et al. Jul 2006 A1
20060195896 Fulp et al. Aug 2006 A1
20060233155 Srivastava Oct 2006 A1
20070061492 Riel Mar 2007 A1
20070121615 Weill et al. May 2007 A1
20070153782 Fletcher et al. Jul 2007 A1
20070214282 Sen Sep 2007 A1
20070248091 Khalid et al. Oct 2007 A1
20070260750 Feied et al. Nov 2007 A1
20070288615 Keohane et al. Dec 2007 A1
20070291773 Khan et al. Dec 2007 A1
20080005293 Bhargava et al. Jan 2008 A1
20080031263 Ervin et al. Feb 2008 A1
20080046400 Shi et al. Feb 2008 A1
20080049614 Briscoe et al. Feb 2008 A1
20080049619 Twiss Feb 2008 A1
20080049786 Ram et al. Feb 2008 A1
20080072305 Casado et al. Mar 2008 A1
20080084819 Parizhsky et al. Apr 2008 A1
20080095153 Fukunaga et al. Apr 2008 A1
20080104608 Hyser et al. May 2008 A1
20080195755 Lu et al. Aug 2008 A1
20080225714 Denis Sep 2008 A1
20080239991 Applegate et al. Oct 2008 A1
20080247396 Hazard Oct 2008 A1
20080276085 Davidson et al. Nov 2008 A1
20080279196 Friskney et al. Nov 2008 A1
20090003349 Havemann et al. Jan 2009 A1
20090003364 Fendick et al. Jan 2009 A1
20090003375 Havemann et al. Jan 2009 A1
20090019135 Eswaran et al. Jan 2009 A1
20090037713 Khalid et al. Feb 2009 A1
20090063706 Goldman et al. Mar 2009 A1
20090129271 Ramankutty et al. May 2009 A1
20090172666 Yahalom et al. Jul 2009 A1
20090190506 Belling et al. Jul 2009 A1
20090199268 Ahmavaara et al. Aug 2009 A1
20090235325 Dimitrakos et al. Sep 2009 A1
20090238084 Nadeau et al. Sep 2009 A1
20090249472 Litvin et al. Oct 2009 A1
20090265467 Peles et al. Oct 2009 A1
20090271586 Shaath Oct 2009 A1
20090299791 Blake et al. Dec 2009 A1
20090300210 Ferris Dec 2009 A1
20090303880 Maltz et al. Dec 2009 A1
20090307334 Maltz et al. Dec 2009 A1
20090327464 Archer et al. Dec 2009 A1
20100031360 Seshadri et al. Feb 2010 A1
20100036903 Ahmad et al. Feb 2010 A1
20100100616 Bryson Apr 2010 A1
20100131638 Kondamuru May 2010 A1
20100165985 Sharma et al. Jul 2010 A1
20100223364 Wei Sep 2010 A1
20100223621 Joshi et al. Sep 2010 A1
20100235915 Memon et al. Sep 2010 A1
20100254385 Sharma et al. Oct 2010 A1
20100257278 Gunturu Oct 2010 A1
20100265824 Chao et al. Oct 2010 A1
20100281482 Pike et al. Nov 2010 A1
20100332595 Fullagar et al. Dec 2010 A1
20110010578 Dominguez et al. Jan 2011 A1
20110016348 Pace et al. Jan 2011 A1
20110022695 Dalal et al. Jan 2011 A1
20110022812 Van Der Linden et al. Jan 2011 A1
20110035494 Pandey et al. Feb 2011 A1
20110040893 Karaoguz et al. Feb 2011 A1
20110055845 Nandagopal et al. Mar 2011 A1
20110058563 Saraph et al. Mar 2011 A1
20110090912 Shippy Apr 2011 A1
20110164504 Bothos et al. Jul 2011 A1
20110194563 Shen et al. Aug 2011 A1
20110211463 Matityahu et al. Sep 2011 A1
20110225293 Rathod Sep 2011 A1
20110235508 Goel et al. Sep 2011 A1
20110261811 Battestilli et al. Oct 2011 A1
20110268118 Schlansker et al. Nov 2011 A1
20110271007 Wang et al. Nov 2011 A1
20110276695 Maldaner Nov 2011 A1
20110283013 Grosser et al. Nov 2011 A1
20110295991 Aida Dec 2011 A1
20110317708 Clark Dec 2011 A1
20120005265 Ushioda et al. Jan 2012 A1
20120011281 Hamada et al. Jan 2012 A1
20120014386 Xiong et al. Jan 2012 A1
20120023231 Ueno Jan 2012 A1
20120054266 Kazerani et al. Mar 2012 A1
20120089664 Igelka Apr 2012 A1
20120110577 Chen et al. May 2012 A1
20120137004 Smith May 2012 A1
20120140719 Hui et al. Jun 2012 A1
20120144014 Natham et al. Jun 2012 A1
20120147890 Kikuchi Jun 2012 A1
20120147894 Mulligan et al. Jun 2012 A1
20120155266 Patel et al. Jun 2012 A1
20120176932 Wu et al. Jul 2012 A1
20120185588 Error Jul 2012 A1
20120195196 Ghai et al. Aug 2012 A1
20120207174 Shieh Aug 2012 A1
20120213074 Goldfarb et al. Aug 2012 A1
20120230187 Tremblay et al. Sep 2012 A1
20120239804 Liu et al. Sep 2012 A1
20120246637 Kreeger et al. Sep 2012 A1
20120266252 Spiers et al. Oct 2012 A1
20120281540 Khan et al. Nov 2012 A1
20120287789 Aybay et al. Nov 2012 A1
20120303784 Zisapel et al. Nov 2012 A1
20120303809 Patel et al. Nov 2012 A1
20120311568 Jansen Dec 2012 A1
20120317260 Husain et al. Dec 2012 A1
20120317570 Dalcher et al. Dec 2012 A1
20120331188 Riordan et al. Dec 2012 A1
20130003735 Chao et al. Jan 2013 A1
20130021942 Bacthu et al. Jan 2013 A1
20130031544 Sridharan et al. Jan 2013 A1
20130039218 Narasimhan et al. Feb 2013 A1
20130044636 Koponen et al. Feb 2013 A1
20130058346 Sridharan et al. Mar 2013 A1
20130073743 Ramasamy et al. Mar 2013 A1
20130100851 Bacthu et al. Apr 2013 A1
20130125120 Zhang et al. May 2013 A1
20130136126 Wang et al. May 2013 A1
20130142048 Gross, IV et al. Jun 2013 A1
20130148505 Koponen et al. Jun 2013 A1
20130151661 Koponen et al. Jun 2013 A1
20130159487 Patel et al. Jun 2013 A1
20130160024 Shtilman et al. Jun 2013 A1
20130163594 Sharma et al. Jun 2013 A1
20130166703 Hammer et al. Jun 2013 A1
20130170501 Egi et al. Jul 2013 A1
20130201989 Hu et al. Aug 2013 A1
20130227097 Yasuda et al. Aug 2013 A1
20130227550 Weinstein et al. Aug 2013 A1
20130287026 Davie Oct 2013 A1
20130287036 Banavalikar et al. Oct 2013 A1
20130291088 Shieh et al. Oct 2013 A1
20130297798 Arisoylu et al. Nov 2013 A1
20130301472 Allan Nov 2013 A1
20130311637 Kamath et al. Nov 2013 A1
20130318219 Kancherla Nov 2013 A1
20130322446 Biswas et al. Dec 2013 A1
20130332983 Koorevaar et al. Dec 2013 A1
20130336319 Liu et al. Dec 2013 A1
20130343174 Guichard et al. Dec 2013 A1
20130343378 Veteikis et al. Dec 2013 A1
20140003232 Guichard et al. Jan 2014 A1
20140003422 Mogul et al. Jan 2014 A1
20140010085 Kavunder et al. Jan 2014 A1
20140029447 Schrum, Jr. Jan 2014 A1
20140046997 Dain et al. Feb 2014 A1
20140046998 Dain et al. Feb 2014 A1
20140050223 Foo et al. Feb 2014 A1
20140052844 Nayak et al. Feb 2014 A1
20140059204 Nguyen et al. Feb 2014 A1
20140059544 Koganty et al. Feb 2014 A1
20140068602 Gember et al. Mar 2014 A1
20140092738 Grandhi et al. Apr 2014 A1
20140092906 Kandaswamy et al. Apr 2014 A1
20140092914 Kondapalli Apr 2014 A1
20140096183 Jain et al. Apr 2014 A1
20140101226 Khandekar et al. Apr 2014 A1
20140101656 Zhu et al. Apr 2014 A1
20140108665 Arora et al. Apr 2014 A1
20140115578 Cooper et al. Apr 2014 A1
20140129715 Mortazavi May 2014 A1
20140149696 Frenkel et al. May 2014 A1
20140164477 Springer et al. Jun 2014 A1
20140169168 Jalan et al. Jun 2014 A1
20140169375 Khan et al. Jun 2014 A1
20140195666 Dumitriu et al. Jul 2014 A1
20140207968 Kumar et al. Jul 2014 A1
20140254374 Janakiraman et al. Sep 2014 A1
20140254591 Mahadevan et al. Sep 2014 A1
20140269487 Kalkunte Sep 2014 A1
20140269717 Thubert et al. Sep 2014 A1
20140269724 Mehler et al. Sep 2014 A1
20140280896 Papakostas et al. Sep 2014 A1
20140281029 Danforth Sep 2014 A1
20140282526 Basavaiah et al. Sep 2014 A1
20140301388 Jagadish et al. Oct 2014 A1
20140304231 Kamath et al. Oct 2014 A1
20140307744 Dunbar et al. Oct 2014 A1
20140310391 Sorenson et al. Oct 2014 A1
20140310418 Sorenson, III et al. Oct 2014 A1
20140317677 Vaidya et al. Oct 2014 A1
20140321459 Kumar et al. Oct 2014 A1
20140330983 Zisapel et al. Nov 2014 A1
20140334485 Jain et al. Nov 2014 A1
20140334488 Guichard et al. Nov 2014 A1
20140341029 Allan et al. Nov 2014 A1
20140351452 Bosch et al. Nov 2014 A1
20140362682 Guichard et al. Dec 2014 A1
20140362705 Pan Dec 2014 A1
20140369204 Anand et al. Dec 2014 A1
20140372567 Ganesh et al. Dec 2014 A1
20140372616 Arisoylu et al. Dec 2014 A1
20140372702 Subramanyam et al. Dec 2014 A1
20150003453 Sengupta et al. Jan 2015 A1
20150003455 Haddad et al. Jan 2015 A1
20150009995 Gross, IV et al. Jan 2015 A1
20150016279 Zhang et al. Jan 2015 A1
20150023354 Li et al. Jan 2015 A1
20150026345 Ravinoothala et al. Jan 2015 A1
20150026362 Guichard et al. Jan 2015 A1
20150030024 Venkataswami et al. Jan 2015 A1
20150052262 Chanda et al. Feb 2015 A1
20150052522 Chanda et al. Feb 2015 A1
20150063102 Mestery et al. Mar 2015 A1
20150063364 Thakkar et al. Mar 2015 A1
20150071285 Kumar et al. Mar 2015 A1
20150071301 Dalal Mar 2015 A1
20150073967 Katsuyama et al. Mar 2015 A1
20150078384 Jackson et al. Mar 2015 A1
20150092551 Moisand et al. Apr 2015 A1
20150092564 Aldrin Apr 2015 A1
20150103645 Shen et al. Apr 2015 A1
20150103679 Tessmer et al. Apr 2015 A1
20150103827 Quinn et al. Apr 2015 A1
20150106802 Ivanov et al. Apr 2015 A1
20150109901 Tan et al. Apr 2015 A1
20150124608 Agarwal et al. May 2015 A1
20150124622 Kovvali et al. May 2015 A1
20150124815 Beliveau et al. May 2015 A1
20150124840 Bergeron May 2015 A1
20150138973 Kumar et al. May 2015 A1
20150139041 Bosch et al. May 2015 A1
20150146539 Mehta et al. May 2015 A1
20150156035 Foo Jun 2015 A1
20150188770 Naiksatam et al. Jul 2015 A1
20150195197 Yong et al. Jul 2015 A1
20150213087 Sikri Jul 2015 A1
20150215819 Bosch et al. Jul 2015 A1
20150222640 Kumar et al. Aug 2015 A1
20150236948 Dunbar et al. Aug 2015 A1
20150237013 Bansal et al. Aug 2015 A1
20150242197 Alfonso et al. Aug 2015 A1
20150244617 Nakil et al. Aug 2015 A1
20150263901 Kumar et al. Sep 2015 A1
20150263946 Tubaltsev et al. Sep 2015 A1
20150271102 Antich Sep 2015 A1
20150280959 Vincent Oct 2015 A1
20150281089 Marchetti Oct 2015 A1
20150281098 Pettit et al. Oct 2015 A1
20150281125 Koponen et al. Oct 2015 A1
20150281179 Raman et al. Oct 2015 A1
20150281180 Raman et al. Oct 2015 A1
20150288671 Chan et al. Oct 2015 A1
20150288679 Ben-Nun et al. Oct 2015 A1
20150295831 Kumar et al. Oct 2015 A1
20150319078 Lee et al. Nov 2015 A1
20150319096 Yip et al. Nov 2015 A1
20150358235 Zhang et al. Dec 2015 A1
20150358294 Kancharla et al. Dec 2015 A1
20150365322 Shatzkamer et al. Dec 2015 A1
20150370586 Cooper et al. Dec 2015 A1
20150370596 Fahs et al. Dec 2015 A1
20150372840 Benny et al. Dec 2015 A1
20150372911 Yabusaki et al. Dec 2015 A1
20150379277 Thota et al. Dec 2015 A1
20150381493 Bansal et al. Dec 2015 A1
20150381494 Cherian et al. Dec 2015 A1
20150381495 Cherian et al. Dec 2015 A1
20160006654 Fernando et al. Jan 2016 A1
20160028640 Zhang et al. Jan 2016 A1
20160043901 Sankar et al. Feb 2016 A1
20160043952 Zhang et al. Feb 2016 A1
20160057050 Ostrom et al. Feb 2016 A1
20160057687 Horn et al. Feb 2016 A1
20160065503 Yohe et al. Mar 2016 A1
20160080253 Wang et al. Mar 2016 A1
20160087888 Jain et al. Mar 2016 A1
20160094384 Jain et al. Mar 2016 A1
20160094389 Jain et al. Mar 2016 A1
20160094451 Jain et al. Mar 2016 A1
20160094452 Jain et al. Mar 2016 A1
20160094453 Jain et al. Mar 2016 A1
20160094454 Jain et al. Mar 2016 A1
20160094455 Jain et al. Mar 2016 A1
20160094456 Jain et al. Mar 2016 A1
20160094457 Jain et al. Mar 2016 A1
20160094631 Jain et al. Mar 2016 A1
20160094632 Jain et al. Mar 2016 A1
20160094633 Jain et al. Mar 2016 A1
20160094642 Jain et al. Mar 2016 A1
20160094643 Jain et al. Mar 2016 A1
20160094661 Jain et al. Mar 2016 A1
20160099948 Ott et al. Apr 2016 A1
20160105333 Lenglet et al. Apr 2016 A1
20160119226 Guichard et al. Apr 2016 A1
20160127306 Wang et al. May 2016 A1
20160127564 Sharma et al. May 2016 A1
20160134528 Lin et al. May 2016 A1
20160149784 Zhang et al. May 2016 A1
20160149816 Roach et al. May 2016 A1
20160149828 Vijayan et al. May 2016 A1
20160162320 Singh et al. Jun 2016 A1
20160164776 Biancaniello Jun 2016 A1
20160164787 Roach et al. Jun 2016 A1
20160164826 Riedel et al. Jun 2016 A1
20160173373 Guichard et al. Jun 2016 A1
20160182684 Connor et al. Jun 2016 A1
20160197831 Foy et al. Jul 2016 A1
20160197839 Li et al. Jul 2016 A1
20160203817 Formhals et al. Jul 2016 A1
20160205015 Halligan et al. Jul 2016 A1
20160212048 Kaempfer et al. Jul 2016 A1
20160212237 Nishijima Jul 2016 A1
20160218918 Chu et al. Jul 2016 A1
20160226700 Zhang et al. Aug 2016 A1
20160226754 Zhang et al. Aug 2016 A1
20160226762 Zhang et al. Aug 2016 A1
20160232019 Shah et al. Aug 2016 A1
20160248685 Pignataro et al. Aug 2016 A1
20160277210 Lin et al. Sep 2016 A1
20160277294 Akiyoshi Sep 2016 A1
20160294612 Ravinoothala et al. Oct 2016 A1
20160294933 Hong et al. Oct 2016 A1
20160294935 Hong et al. Oct 2016 A1
20160308758 Li et al. Oct 2016 A1
20160308961 Rao Oct 2016 A1
20160337189 Liebhart et al. Nov 2016 A1
20160337249 Zhang et al. Nov 2016 A1
20160337317 Hwang et al. Nov 2016 A1
20160344565 Batz et al. Nov 2016 A1
20160344621 Roeland et al. Nov 2016 A1
20160344803 Batz et al. Nov 2016 A1
20160352866 Gupta et al. Dec 2016 A1
20160366046 Anantharam et al. Dec 2016 A1
20160373364 Yokota Dec 2016 A1
20160378537 Zou Dec 2016 A1
20160380812 Chanda et al. Dec 2016 A1
20170005882 Tao et al. Jan 2017 A1
20170005920 Previdi et al. Jan 2017 A1
20170005923 Babakian Jan 2017 A1
20170005988 Bansal et al. Jan 2017 A1
20170019303 Swamy et al. Jan 2017 A1
20170019329 Kozat et al. Jan 2017 A1
20170019331 Yong Jan 2017 A1
20170019341 Huang et al. Jan 2017 A1
20170026417 Ermagan et al. Jan 2017 A1
20170033939 Bragg et al. Feb 2017 A1
20170053683 Lee et al. Feb 2017 A1
20170063928 Jain et al. Mar 2017 A1
20170064048 Pettit et al. Mar 2017 A1
20170064749 Jain et al. Mar 2017 A1
20170078176 Lakshmikantha et al. Mar 2017 A1
20170078961 Rabii et al. Mar 2017 A1
20170093698 Farmanbar Mar 2017 A1
20170093758 Chanda Mar 2017 A1
20170099194 Wei Apr 2017 A1
20170126497 Dubey et al. May 2017 A1
20170126522 McCann et al. May 2017 A1
20170126726 Han May 2017 A1
20170134538 Mahkonen et al. May 2017 A1
20170142012 Thakkar et al. May 2017 A1
20170147399 Cropper et al. May 2017 A1
20170149582 Cohn et al. May 2017 A1
20170149675 Yang May 2017 A1
20170149680 Liu et al. May 2017 A1
20170163531 Kumar et al. Jun 2017 A1
20170163724 Puri et al. Jun 2017 A1
20170170990 Gaddehosur et al. Jun 2017 A1
20170171159 Kumar et al. Jun 2017 A1
20170180240 Kern et al. Jun 2017 A1
20170195255 Pham et al. Jul 2017 A1
20170208000 Bosch et al. Jul 2017 A1
20170208011 Bosch et al. Jul 2017 A1
20170208532 Zhou Jul 2017 A1
20170214627 Zhang et al. Jul 2017 A1
20170220306 Price et al. Aug 2017 A1
20170230333 Glazemakers et al. Aug 2017 A1
20170230467 Salgueiro et al. Aug 2017 A1
20170237656 Gage Aug 2017 A1
20170250869 Voellmy Aug 2017 A1
20170250902 Rasanen et al. Aug 2017 A1
20170250917 Ruckstuhl et al. Aug 2017 A1
20170251065 Furr et al. Aug 2017 A1
20170257432 Fu et al. Sep 2017 A1
20170264677 Li Sep 2017 A1
20170273099 Zhang et al. Sep 2017 A1
20170279938 You et al. Sep 2017 A1
20170295021 Gutiérrez et al. Oct 2017 A1
20170295033 Cherian et al. Oct 2017 A1
20170295100 Hira et al. Oct 2017 A1
20170310588 Zuo Oct 2017 A1
20170310611 Kumar et al. Oct 2017 A1
20170317887 Dwaraki et al. Nov 2017 A1
20170317926 Penno et al. Nov 2017 A1
20170317936 Swaminathan et al. Nov 2017 A1
20170317954 Masurekar et al. Nov 2017 A1
20170317969 Masurekar et al. Nov 2017 A1
20170318081 Hopen et al. Nov 2017 A1
20170318097 Drew et al. Nov 2017 A1
20170324651 Penno et al. Nov 2017 A1
20170324654 Previdi et al. Nov 2017 A1
20170331672 Fedyk et al. Nov 2017 A1
20170339110 Ni Nov 2017 A1
20170339600 Roeland et al. Nov 2017 A1
20170346764 Tan et al. Nov 2017 A1
20170353387 Kwak et al. Dec 2017 A1
20170359252 Kumar et al. Dec 2017 A1
20170364287 Antony et al. Dec 2017 A1
20170364794 Mahkonen et al. Dec 2017 A1
20170366605 Chang et al. Dec 2017 A1
20170373990 Jeuk et al. Dec 2017 A1
20180004954 Liguori et al. Jan 2018 A1
20180006935 Mutnuru et al. Jan 2018 A1
20180026911 Anholt et al. Jan 2018 A1
20180027101 Kumar et al. Jan 2018 A1
20180041425 Zhang Feb 2018 A1
20180041470 Schultz et al. Feb 2018 A1
20180041524 Reddy et al. Feb 2018 A1
20180063000 Wu et al. Mar 2018 A1
20180063018 Bosch et al. Mar 2018 A1
20180063087 Hira et al. Mar 2018 A1
20180091420 Drake et al. Mar 2018 A1
20180102919 Hao et al. Apr 2018 A1
20180102965 Hari et al. Apr 2018 A1
20180115471 Curcio et al. Apr 2018 A1
20180123950 Garg et al. May 2018 A1
20180124061 Raman et al. May 2018 A1
20180139098 Sunavala et al. May 2018 A1
20180145899 Rao May 2018 A1
20180159733 Poon et al. Jun 2018 A1
20180159801 Rajan et al. Jun 2018 A1
20180159943 Poon et al. Jun 2018 A1
20180176177 Bichot et al. Jun 2018 A1
20180176294 Vacaro et al. Jun 2018 A1
20180183764 Gunda Jun 2018 A1
20180184281 Tamagawa Jun 2018 A1
20180191600 Hecker et al. Jul 2018 A1
20180198692 Ansari et al. Jul 2018 A1
20180198705 Wang et al. Jul 2018 A1
20180198791 Desai et al. Jul 2018 A1
20180203736 Vyas et al. Jul 2018 A1
20180205637 Li Jul 2018 A1
20180213040 Pak et al. Jul 2018 A1
20180219762 Wang et al. Aug 2018 A1
20180227216 Hughes Aug 2018 A1
20180234360 Narayana et al. Aug 2018 A1
20180247082 Durham et al. Aug 2018 A1
20180248713 Zanier et al. Aug 2018 A1
20180248755 Hecker et al. Aug 2018 A1
20180248790 Tan et al. Aug 2018 A1
20180248986 Dalal Aug 2018 A1
20180262427 Jain et al. Sep 2018 A1
20180262434 Koponen et al. Sep 2018 A1
20180278530 Connor et al. Sep 2018 A1
20180288129 Joshi et al. Oct 2018 A1
20180295036 Krishnamurthy et al. Oct 2018 A1
20180295053 Leung et al. Oct 2018 A1
20180302242 Hao et al. Oct 2018 A1
20180309632 Kompella et al. Oct 2018 A1
20180337849 Sharma et al. Nov 2018 A1
20180349212 Liu et al. Dec 2018 A1
20180351874 Abhigyan et al. Dec 2018 A1
20180375684 Filsfils et al. Dec 2018 A1
20190007382 Nirwal et al. Jan 2019 A1
20190020580 Boutros et al. Jan 2019 A1
20190020600 Zhang et al. Jan 2019 A1
20190020684 Qian et al. Jan 2019 A1
20190028347 Johnston et al. Jan 2019 A1
20190028384 Penno et al. Jan 2019 A1
20190028577 D?Souza et al. Jan 2019 A1
20190036819 Kancherla et al. Jan 2019 A1
20190068500 Hira Feb 2019 A1
20190089679 Kahalon et al. Mar 2019 A1
20190097838 Sahoo et al. Mar 2019 A1
20190102280 Caldato et al. Apr 2019 A1
20190108049 Singh et al. Apr 2019 A1
20190116063 Bottorff et al. Apr 2019 A1
20190121961 Coleman et al. Apr 2019 A1
20190124096 Ahuja et al. Apr 2019 A1
20190132220 Boutros et al. May 2019 A1
20190132221 Boutros et al. May 2019 A1
20190140863 Nainar et al. May 2019 A1
20190140947 Zhuang et al. May 2019 A1
20190140950 Zhuang et al. May 2019 A1
20190149512 Sevinc et al. May 2019 A1
20190149516 Rajahalme et al. May 2019 A1
20190149518 Sevinc et al. May 2019 A1
20190166045 Peng et al. May 2019 A1
20190173778 Faseela et al. Jun 2019 A1
20190173850 Jain et al. Jun 2019 A1
20190173851 Jain et al. Jun 2019 A1
20190222538 Yang et al. Jul 2019 A1
20190229937 Nagarajan et al. Jul 2019 A1
20190230126 Kumar et al. Jul 2019 A1
20190238363 Boutros et al. Aug 2019 A1
20190238364 Boutros et al. Aug 2019 A1
20190268384 Hu et al. Aug 2019 A1
20190286475 Mani Sep 2019 A1
20190288915 Denyer et al. Sep 2019 A1
20190288947 Jain et al. Sep 2019 A1
20190306036 Boutros et al. Oct 2019 A1
20190306086 Boutros et al. Oct 2019 A1
20190342175 Wan et al. Nov 2019 A1
20190377604 Cybulski Dec 2019 A1
20190379578 Mishra et al. Dec 2019 A1
20190379579 Mishra et al. Dec 2019 A1
20200007388 Johnston et al. Jan 2020 A1
20200036629 Roeland et al. Jan 2020 A1
20200059761 Li et al. Feb 2020 A1
20200067828 Liu et al. Feb 2020 A1
20200073739 Rungta et al. Mar 2020 A1
20200076684 Naveen et al. Mar 2020 A1
20200076734 Naveen et al. Mar 2020 A1
20200084141 Bengough et al. Mar 2020 A1
20200084147 Gandhi et al. Mar 2020 A1
20200136960 Jeuk et al. Apr 2020 A1
20200145331 Bhandari et al. May 2020 A1
20200162318 Patil et al. May 2020 A1
20200162352 Jorgenson et al. May 2020 A1
20200183724 Shevade et al. Jun 2020 A1
20200195711 Abhigyan et al. Jun 2020 A1
20200204492 Sarva et al. Jun 2020 A1
20200213366 Tong et al. Jul 2020 A1
20200220805 Dhanabalan Jul 2020 A1
20200272493 Lecuyer et al. Aug 2020 A1
20200272494 Gokhale et al. Aug 2020 A1
20200272495 Rolando et al. Aug 2020 A1
20200272496 Mundaragi et al. Aug 2020 A1
20200272497 Kavathia et al. Aug 2020 A1
20200272498 Mishra et al. Aug 2020 A1
20200272499 Feng et al. Aug 2020 A1
20200272500 Feng et al. Aug 2020 A1
20200272501 Chalvadi et al. Aug 2020 A1
20200274757 Rolando et al. Aug 2020 A1
20200274769 Naveen et al. Aug 2020 A1
20200274778 Lecuyer et al. Aug 2020 A1
20200274779 Rolando et al. Aug 2020 A1
20200274795 Rolando et al. Aug 2020 A1
20200274801 Feng et al. Aug 2020 A1
20200274808 Mundaragi et al. Aug 2020 A1
20200274809 Rolando et al. Aug 2020 A1
20200274810 Gokhale et al. Aug 2020 A1
20200274826 Mishra et al. Aug 2020 A1
20200274944 Naveen et al. Aug 2020 A1
20200274945 Rolando et al. Aug 2020 A1
20200287962 Mishra et al. Sep 2020 A1
20200322271 Jain et al. Oct 2020 A1
20200344088 Selvaraj et al. Oct 2020 A1
20200358696 Hu et al. Nov 2020 A1
20200364074 Gunda et al. Nov 2020 A1
20200366526 Boutros et al. Nov 2020 A1
20200366584 Boutros et al. Nov 2020 A1
20200382412 Chandrappa et al. Dec 2020 A1
20200382420 Suryanarayana et al. Dec 2020 A1
20200389401 Enguehard et al. Dec 2020 A1
20210004245 Kamath et al. Jan 2021 A1
20210011812 Mitkar et al. Jan 2021 A1
20210011816 Mitkar et al. Jan 2021 A1
20210029088 Mayya et al. Jan 2021 A1
20210044502 Boutros et al. Feb 2021 A1
20210067439 Kommula et al. Mar 2021 A1
20210073736 Alawi et al. Mar 2021 A1
20210117217 Croteau et al. Apr 2021 A1
20210120080 Mishra et al. Apr 2021 A1
20210135992 Tidemann et al. May 2021 A1
20210136140 Tidemann et al. May 2021 A1
20210136141 Tidemann et al. May 2021 A1
20210136147 Giassa et al. May 2021 A1
20210218587 Mishra et al. Jul 2021 A1
20210227041 Sawant et al. Jul 2021 A1
20210227042 Sawant et al. Jul 2021 A1
20210240734 Shah et al. Aug 2021 A1
20210266295 Stroz Aug 2021 A1
20210271565 Bhavanarushi et al. Sep 2021 A1
20210306240 Boutros et al. Sep 2021 A1
20210311758 Cao et al. Oct 2021 A1
20210311772 Mishra et al. Oct 2021 A1
20210314248 Rolando et al. Oct 2021 A1
20210314252 Rolando et al. Oct 2021 A1
20210314253 Rolando et al. Oct 2021 A1
20210314268 Rolando et al. Oct 2021 A1
20210314277 Rolando et al. Oct 2021 A1
20210314310 Cao et al. Oct 2021 A1
20210314415 Rolando et al. Oct 2021 A1
20210314423 Rolando et al. Oct 2021 A1
20210328913 Nainar et al. Oct 2021 A1
20210349767 Asayag et al. Nov 2021 A1
20210359945 Jain et al. Nov 2021 A1
20210377160 Faseela Dec 2021 A1
20220019698 Durham et al. Jan 2022 A1
20220030058 Tidemann et al. Jan 2022 A1
20220038310 Boutros et al. Feb 2022 A1
20220060467 Montgomery et al. Feb 2022 A1
20220078037 Mishra et al. Mar 2022 A1
20220188140 Jain et al. Jun 2022 A1
20220191304 Jain et al. Jun 2022 A1
20230052818 Jain et al. Feb 2023 A1
20230168917 Kavathia et al. Jun 2023 A1
20230179474 Naveen et al. Jun 2023 A1
Foreign Referenced Citations (44)
Number Date Country
2358607 Apr 2002 CA
3034809 Mar 2018 CA
1689369 Oct 2005 CN
101594358 Dec 2009 CN
101729412 Jun 2010 CN
103516807 Jan 2014 CN
103795805 May 2014 CN
104471899 Mar 2015 CN
104521195 Apr 2015 CN
105706420 Jun 2016 CN
106134137 Nov 2016 CN
107005584 Aug 2017 CN
107078950 Aug 2017 CN
107113208 Aug 2017 CN
107204941 Sep 2017 CN
107210959 Sep 2017 CN
109213573 Jan 2019 CN
110521169 Nov 2019 CN
107105061 Sep 2020 CN
112181632 Jan 2021 CN
2426956 Mar 2012 EP
2466985 Jun 2012 EP
3210345 Aug 2017 EP
3300319 Mar 2018 EP
2005311863 Nov 2005 JP
2015519822 Jul 2015 JP
9918534 Apr 1999 WO
2008095010 Aug 2008 WO
2014069978 May 2014 WO
2014182529 Nov 2014 WO
2014207725 Dec 2014 WO
2016053373 Apr 2016 WO
2016054272 Apr 2016 WO
2019084066 May 2019 WO
2019147316 Aug 2019 WO
2019157955 Aug 2019 WO
2019168532 Sep 2019 WO
2019226327 Nov 2019 WO
2020046686 Mar 2020 WO
2020171937 Aug 2020 WO
2021041440 Mar 2021 WO
2021086462 May 2021 WO
2021206789 Oct 2021 WO
2022132308 Jun 2022 WO
Non-Patent Literature Citations (25)
Entry
Author Unknown, “Research on Multi-tenancy Network Technology for Datacenter Network,” May 2015, 64 pages, Beijing Jiaotong University.
Li, Qing-Gu, “Network Virtualization of Data Center Security,” Information Security and Technology, Oct. 2012, 3 pages.
Author Unknown, “Datagram,” Jun. 22, 2012, 2 pages, retrieved from https://web.archive.org/web/20120622031055/https://en.wikipedia.org/wiki/datagram.
Author Unknown, “MPLS,” Mar. 3, 2008, 47 pages.
Author Unknown, “AppLogic Features,” Jul. 2007, 2 pages, 3TERA, Inc.
Author Unknown, “Enabling Service Chaining on Cisco Nexus 1000V Series,” Month Unknown, 2012, 25 pages, Cisco.
Casado, Martin, et al., “Virtualizing the Network Forwarding Plane,” Dec. 2010, 6 pages.
Cianfrani, Antonio, et al., “Translating Traffic Engineering Outcome into Segment Routing Paths: the Encoding Problem,” 2016 IEEE Conference on Computer Communications Workshops (INFOCOM Wkshps): GI 2016: 9th IEEE Global Internet Symposium, Apr. 10-14, 2016, 6 pages, IEEE, San Francisco, CA, USA.
Dixon, Colin, et al., “An End to the Middle,” Proceedings of the 12th Conference on Hot Topics in Operating Systems, May 2009, 5 pages, USENIX Association, Berkeley, CA, USA.
Dumitriu, Dan Mihai, et al., U.S. Appl. No. 61/514,990, filed Aug. 4, 2011, 31 pages.
Greenberg, Albert, et al., “VL2: A Scalable and Flexible Data Center Network,” SIGCOMM '09, Aug. 17-21, 2009, 12 pages, ACM, Barcelona, Spain.
Guichard, J., et al., “Network Service Chaining Problem Statement,” Network Working Group, Jun. 13, 2013, 14 pages, Cisco Systems, Inc.
Halpern, J., et al., “Service Function Chaining (SFC) Architecture,” draft-ietf-sfc-architecture-02, Sep. 20, 2014, 26 pages, IETF.
Halpern, J., et al., “Service Function Chaining (SFC) Architecture,” RFC 7665, Oct. 2015, 32 pages, IETF Trust.
Joseph, Dilip Anthony, et al., “A Policy-aware Switching Layer for Data Centers,” Jun. 24, 2008, 26 pages, Electrical Engineering and Computer Sciences, University of California, Berkeley, CA, USA.
Karakus, Murat, et al., “Quality of Service (QoS) in Software Defined Networking (SDN): A Survey,” Journal of Network and Computer Applications, Dec. 9, 2016, 19 pages, vol. 80, Elsevier, Ltd.
Kumar, S., et al., “Service Function Chaining Use Cases in Data Centers,” draft-ietf-sfc-dc-use-cases-01, Jul. 21, 2014, 23 pages, IETF.
Lin, Po-Ching, et al., “Balanced Service Chaining in Software-Defined Networks with Network Function Virtualization,” Computer: Research Feature, Nov. 2016, 9 pages, vol. 49, No. 11, IEEE.
Liu, W., et al., “Service Function Chaining (SFC) Use Cases,” draft-liu-sfc-use-cases-02, Feb. 13, 2014, 17 pages, IETF.
PCT International Search Report and Written Opinion for commonly owned International Patent Application PCT/US2014/036275, dated Sep. 25, 2014 , 10 pages, International Searching Authority (EPO).
Salsano, Stefano, et al., “Generalized Virtual Networking: An Enabler for Service Centric Networking and Network Function Virtualization,” 2014 16th International Telecommunications Network Strategy and Planning Symposium, Sep. 17-19, 2014, 7 pages, IEEE, Funchal, Portugal.
Sekar, Vyas, et al., “Design and Implementation of a Consolidated Middlebox Architecture,” 9th USENIX Symposium on Networked Systems Design and Implementation, Apr. 25-27, 2012, 14 pages, USENIX, San Jose, CA, USA.
Sherry, Justine, et al., “Making Middleboxes Someone Else's Problem: Network Processing as a Cloud Service,” In Proc. of SIGCOMM '12, Aug. 13-17, 2012, 12 pages, Helsinki, Finland.
Siasi, N., et al., “Container-Based Service Function Chain Mapping,” 2019 SoutheastCon, Apr. 11-14, 2019, 6 pages, IEEE, Huntsville, AL, USA.
Xiong, Gang, et al., “A Mechanism for Configurable Network Service Chaining and Its Implementation,” KSII Transactions on Internet and Information Systems, Aug. 2016, 27 pages, vol. 10, No. 8, KSII.
Related Publications (1)
Number Date Country
20220417150 A1 Dec 2022 US
Continuations (4)
Number Date Country
Parent 16905909 Jun 2020 US
Child 17902879 US
Parent 15973487 May 2018 US
Child 16905909 US
Parent 14960441 Dec 2015 US
Child 15973487 US
Parent 13891025 May 2013 US
Child 14960441 US