Typical physical networks have several physical routers to perform L3 forwarding (i.e., routing). When a first machine wants to send a packet to a second machine located on a different IP subnet, the packet is sent to a router that uses a destination IP address of the packet to determine through which of its physical interfaces the packet should be sent. Larger networks will have multiple routers, such that if one of the routers fails, the packets can be routed along a different path between the first machine and the second machine.
In logical networks, user-defined data compute nodes (e.g., virtual machines) on different subnets may need to communicate with each other as well. In this case, tenants may define a network for virtualization that includes both logical switches and logical routers. In certain systems, the logical routers may include both distributed logical routers that are implemented across numerous physical forwarding elements and centralized logical routers that are implemented by single physical forwarding elements. Techniques for these logical routers to communicate with each other are desirable.
Some embodiments of the invention provide a method for implementing a route server for a distributed logical router (or a distributed routing component of a logical router) that uses a hierarchical routing protocol for routing data messages in a logical network. The logical router of some embodiments includes (i) a distributed routing component that is implemented by managed forwarding elements executing on multiple host computers and (ii) one or more centralized routing components that are each implemented on separate host computers at the edge of the logical network. These centralized routing components are responsible for handling data traffic between the logical network and external physical networks.
In order for the end machines in the logical network to receive data message traffic from the external network, the centralized routing component (also referred to as an edge gateway) of some embodiments learns routes from the distributed routing component, which logically interfaces more directly with the internal logical network. The edge gateways (i) advertise some of the routes from the distributed routing component to routers in the external network and (ii) use these routes to route data messages received from the external network.
The edge gateways also learn routes from the external network routers. In certain situations, the edge gateways will learn routes for a public Internet Protocol prefix from the external routers that is also used as an internal private subnet in the logical network (in which case the edge gateway would be configured to not advertise the route, but should use the route for internal routing). In certain cases, the hierarchy of the routing protocol will cause the edge gateway to prefer the route learned from the external router to that learned from the distributed routing component.
Because the distributed routing component is implemented across numerous (e.g., dozens, hundreds, thousands, etc.) of physical host computers, in some embodiments a route server is used to aggregate the routes of the distributed routing component and advertise these routes to the edge gateways. This route server may be implemented as a separate physical device, a virtual machine or other data compute node executing on a host computer (e.g., separately from data compute nodes that are the endpoints of the logical network), etc.
In order to ensure that the routes advertised by the distributing routing component route server are preferred by the edge gateway over routes received from the external router, in some embodiments the route server sends two types of routing protocol messages to the edge gateway. The first routing protocol message of some includes (i) a parameter that identifies the machine as a route server to the edge gateway and (ii) a set of addresses (prefixes) for the logical network (e.g., subnets of the logical network). These addresses are the addresses for which routes are advertised to the edge gateways.
The second routing protocol message specifies a next hop address corresponding to the distributed routing component (e.g., an interface of the distributed routing component that interfaces with the edge gateways), and the edge gateway uses this next hop address as the next hop for the set of addresses sent in the first message. Because the first message identifies the source of these routes as a route server, the edge gateways prefer these routes to routes learned from the external router when updating its routing table. Thus, for data messages addressed to the logical network endpoints, the edge gateway routing table will route the messages to the distributed routing component (which may be implemented by a different routing table on the same computing device). For data messages addressed to other addresses not in the logical network (e.g., external addresses), the edge gateway will still route the packets to the external routers.
One hierarchical routing protocol used in some embodiments is Open Shortest Path First (OSPF). In this case, the first routing protocol message is a type 1 Link State Advertisement (LSA), also known as a “router LSA.” The router LSA includes an options field in the header, where the parameter that identifies the machine as a route server is a single bit in the options field. In some embodiments, the last bit in the options field is the route server bit. In such embodiments, the second routing protocol message is a type 9 LSA, also known as an “opaque LSA.” The opaque LSA includes a header with an opaque type field, and also includes an opaque information field. The next hop address is specified in the opaque information field, and the opaque type field is set to a value that allows the edge gateway to recognize the opaque LSA.
The preceding Summary is intended to serve as a brief introduction to some embodiments of the invention. It is not meant to be an introduction or overview of all of the inventive subject matter disclosed in this document. The Detailed Description that follows and the Drawings that are referred to in the Detailed Description will further describe the embodiments described in the Summary as well as other embodiments. Accordingly, to understand all the embodiments described by this document, a full review of the Summary, Detailed Description and the Drawings is needed. Moreover, the claimed subject matters are not to be limited by the illustrative details in the Summary, Detailed Description and the Drawing, but rather are to be defined by the appended claims, because the claimed subject matters can be embodied in other specific forms without departing from the spirit of the subject matters.
The novel features of the invention are set forth in the appended claims. However, for purposes of explanation, several embodiments of the invention are set forth in the following figures.
Some embodiments of the invention provide a method for implementing a route server for a distributed logical router (or a distributed routing component of a logical router) that uses a hierarchical routing protocol for routing data messages in a logical network. The logical router of some embodiments includes (i) a distributed routing component that is implemented by managed forwarding elements executing on multiple host computers and (ii) one or more centralized routing components that are each implemented on separate host computers at the edge of the logical network. These centralized routing components are responsible for handling data traffic between the logical network and external physical networks.
The network management and control system of some embodiments also defines additional components 132-145 within the logical router 105. These components include multiple centralized routing components (also referred to as service routers, or SRs) 132 and 135, a distributed routing component (DR) 140, and a transit logical switch 145. The distributed routing component 140 includes a south-facing interface for each of the logical switches 110 and 115, and a single north-facing interface to the transit logical switch 145 (used to communicate with the service routers 132 and 135). The service routers 132 and 135 each include a single south-facing interface to the transit logical switch 145 (used to communicate with the distributed routing component 140, as well as each other in certain situations). In addition, in some embodiments, additional logical routers (with distributed and/or centralized routing components of their own) can connect to the distributed routing component 140, with additional logical switches connected to these logical routers.
Each service router 132 and 135 also corresponds to one or more uplink ports of the logical router 105 for connecting to the external network 130 in some embodiments. Therefore, each of the service routers has a single north-facing interface (though, in other embodiments, a single SR can implement multiple uplink interfaces). The SRs of some embodiments are responsible for delivering services that are not implemented in a distributed fashion (e.g., some stateful services). Even if there are no stateful services configured on the logical router 105, some embodiments use SRs to centralize management of the connection(s) to the external network 130.
In some embodiments, the management plane generates separate routing information bases (RIBs) for each of the router constructs 132-140. Essentially, the network management and control system treats each of the router constructs 132-140 as a separate logical router with a separate routing table and separate interfaces.
The MFEs 210 (or a subset of them) also may implement logical switches (and distributed logical routers) for other logical networks if the other logical networks include VMs or other data compute nodes that reside on the host machines 205 as well. In some embodiments, these other logical networks may be different tenants of a datacenter to which the host machines 210 belong.
The centralized routing components 132 and 135 each operate on different gateway machines 232 and 235. The gateway machines 232 and 235 are host machines similar to the machines 205, hosting centralized routing components rather than user VMs (in some embodiments, some host machines can host both centralized routing components and user VMs). In some embodiments, the gateway machines 232 and 235 each also include an MFE, in order to handle logical switching as well as routing for the distributed routing component 140. The distributed routing component 140 would then span the gateway machines 232 and 235 accordingly. For instance, packets sent from the external network 130 may be routed by an SR routing table on one of the gateway machines and then subsequently switched and routed (according to the distributed routing component routing table) by the MFE on the same gateway. In other embodiments, the gateway machines execute a datapath (e.g., a DPDK-based datapath) that implements one or more centralized routing components as well as other logical forwarding elements (e.g., logical switches, distributed routing components, etc.).
The centralized routing components 132 and 135 may also be implemented in a namespace, a virtual machine, or as a VRF in different embodiments. They may operate in an active-active or active-standby mode in some embodiments, depending on whether any stateful services (e.g., firewalls) are configured on the logical router 105. When stateful services are configured, some embodiments require only a single active SR. In some embodiments, the active and standby SRs are provided with the same configuration, but the MFEs 210 are configured to send packets via a tunnel to the active SR (or to the MFE on the gateway machine with the active SR). Only if the tunnel is down will the MFE send packets to the standby gateway.
In order for VMs in the logical network 100 to receive southbound data message traffic from the external network 130, the SRs 132 and 135 of some embodiments learn routes from the distributed routing component 140 of the logical router 105, which logically interfaces directly with the internal logical network via its south-facing interfaces. In some embodiments, each of the gateway hosts 232 and 235 also executes a routing protocol application (e.g., as a daemon), which receives routing protocol packets sent to the SR and processes these packets in order to modify the SR routing table. In such embodiments, operations attributed below to the SR (e.g., to process routing protocol messages or generate routing protocol messages in order to advertise routes) may instead be performed by the routing protocol application executing alongside the SR.
The SRs (i) advertise some of the routes from the distributed routing component 140 to the routers 125 in the external network and (ii) use these routes to route data messages received from the external network 130. Route advertisement from centralized routing components to external network routers is explained in further detail in U.S. Pat. Nos. 10,075,363, 10,038,628, and 9,590,901, which are incorporated herein by reference.
The SRs 132 and 135 also learn routes from the external network routers 125. In certain situations, the SRs 132 and 135 will learn routes for a public Internet Protocol prefix from the external routers 125 that is also used as an internal private subnet in the logical network 100 (in which case the SR would be configured to not advertise the route, but still should use the route for internal routing). However, in certain cases, the hierarchy of the routing protocol will cause the SR to prefer the route learned from the external router 125 to that learned from the DR 140. In some embodiments, the SRs 132 and 135 each use a local database to store information associated with each route, including the source from which the route was received.
Because the distributed routing component 140 is potentially implemented across numerous (e.g., dozens, hundreds, thousands, etc.) of physical host computers 205, in some embodiments a route server 240 (RS) is used to aggregate the routes of the distributed routing component and advertise these routes to the edge gateways. This route server may be implemented in some embodiments as a separate physical device, a virtual machine or other data compute node executing on a host computer (e.g., separately from data compute nodes that are the endpoints of the logical network), etc. For example, in
In order to ensure that the routes advertised by the route server 240 are preferred by the SRs 132 and 135 over routes received from the external routers 125, in some embodiments the route server sends two types of routing protocol messages to the SRs. The first routing protocol message of some embodiments includes (i) a parameter that identifies the machine 240 as a route server to the SRs and (ii) a set of addresses (prefixes) for the logical network 100 (e.g., subnets of the logical network). These addresses are the addresses for which routes are advertised to the SRs.
The second routing protocol message specifies a next hop address corresponding to the distributed routing component 140 (e.g., a north-facing interface of the DR that interfaces with the SRs, or in some embodiments via the corresponding interface of the transit logical switch 145), and the SR uses this next hop address as the next hop for the set of addresses sent in the first message. Because the first message identifies the source of these routes as a route server, the SRS can be configured to prefer these routes to routes learned from the external routers 125 when updating its routing table, while otherwise remaining compliant with the routing protocol. Thus, for data messages addressed to end machines in the logical network, the SR routing table will correctly route the messages to the distributed routing component 140 (which may be implemented by a different routing table on the same computing device). For data messages addressed to other addresses not in the logical network (e.g., external addresses), the SRs 132 and 135 will still route these data messages to the external routers 125 in accordance with the default routing protocol hierarchy.
One hierarchical routing protocol used in some embodiments is Open Shortest Path First (OSPF). In this case, the first routing protocol message is a type 1 Link State Advertisement (LSA), also known as a router LSA.
The options field is expanded for purposes of illustration in
Returning to the router LSA example in
The link data field 320 associated with a given link ID also varies by the type of link. For the link type of a stub network, the corresponding link data is the IP address mask (e.g. 255.255.255.0). Additional fields 340 follow, some of which are used by the OSPF algorithm to calculate the optimal path with the shortest cost. After these additional fields, the next link is described with its own link ID, link data, etc.
In embodiments using the OSPF protocol, the second routing protocol message is a type 9 LSA, also known as an “opaque LSA,” which enables extending the OSPF protocol.
The opaque type field 505 specifies a value that allows the edge gateways 132 and 135 to interpret the opaque LSA 500. Values 1-4 are assigned to various OSPF protocol extensions, values 5-127 are unassigned, and values 128-255 are reserved for private (e.g., proprietary) use. For example, in some embodiments, the opaque type value used is 200. The use of an opaque type acts as a filter to reject opaque LSAs from other sources that are not route servers, but which may have also set the same options bit in their router LSAs. It is unlikely that a foreign router would have the same options bit set in its router LSA and the same opaque type in its opaque LSA. The opaque type can therefore be considered a validation of the route server. Opaque LSAs received from a source that is considered a route server due to the options bit, but which have the incorrect opaque type, may be simply ignored.
The opaque information field 510 is used to specify the specific data relevant to the opaque LSA from the validated route server. In this case, the information is the next hop address to be used for all the link addresses in the router LSA. In this example, the next hop for both subnets linked in the router LSA is the private IP address (10.0.0.1) of the north-facing interface to transit logical switch 145 from SR1132.
It should be noted that, as used in this document, the term data packet, packet, data message, or message refers to a collection of bits in a particular format sent across a network. It should be understood that the term data packet, packet, data message, or message may be used herein to refer to various formatted collections of bits that may be sent across a network, such as Ethernet frames, IP packets, TCP segments, UDP datagrams, etc. While the examples above and below refer to data packets, packets, data messages, or messages, it should be understood that the invention should not be limited to any specific format or type of data message.
After receiving the LSA, the process 600 determines (at 610) the type of LSA from the LSA type field in the LSA header (e.g., the type field 306 shown in
On the other hand, if the LSA is a router LSA (i.e., type 1), the process 600 determines (at 615) whether the route server bit of the router LSA has been set to identify the source of the LSA as a route server (i.e., whether the route server flag is set to 1). As shown in
If the route server bit has been set, then the process 600 identifies (at 620) the source router as a route server. In some embodiments, the process 600 stores the identification of the route server in an internal database, for reference when it receives an opaque LSA as discussed below. If the route server bit has not been set, then the process 600 does not identify the source router as a route server.
Next, the process 600 adds (at 625) the links specified in the router LSA to the local routing table (e.g., to the routing table for the centralized routing component). The forwarding address for each link is determined according to the default OSPF protocol hierarchy. If the centralized routing component that receives the router LSA has not yet received any opaque LSAs, the centralized routing component processes the links in the router LSA received from the route server just as it processes links received from another router (e.g., an external router). The process 600 then ends.
The process begins by receiving (at 705) an LSA from a source router. The source router may be an external router, a logical routing component (such as the DR 140), a route server (e.g. a route server for a logical routing component), or any other type of router neighboring the SR under the OSPF protocol.
After receiving the LSA, the process 700 determines (at 710) the type of LSA from the LSA type field in the LSA header (e.g. the type field 506 in the sample opaque LSA illustrated in
On the other hand, if the LSA is an opaque LSA, the process determines (at 715) whether the source router is a route server. The SR makes this determination in some embodiments by checking if the source router is identified as a route server in an internal database. For example, the source router would be designated as a route server if the SR previously received a router LSA from the route server with the route server bit set, (e.g., as described above in reference to 615 in
If the router is not a route server, the process 700 processes (at 707) the opaque LSA using a different process. For example, the SR may be configured to process opaque LSAs which extend the OSPF protocol in other ways which are unrelated to the route server. The process 700 then ends.
On the other hand, if the router is a route server, then the process 700 determines (at 720) whether the opaque LSA is the correct opaque type. The opaque LSA type is determined in some embodiments by looking at the opaque type field of the opaque type LSA. For example, in the sample opaque LSA of
It should be noted that the opaque type is different from the LSA type. The value for the opaque type field, only present in an opaque LSA (e.g. as illustrated in
In some embodiments, the receipt of an opaque LSA from a route server that is the wrong opaque type occurs when the source router is not actually a route server, even though a previous LSA had been received from the router with the route server bit set. The source router may instead be using the same bit to implement a different feature that is not supported by the SR. Since all routers in an OSPF area receive all LSAs broadcast within the area, in some cases an SR will receive LSAs that were not intended for its consumption (e.g., from external routers). These other routers might also send opaque LSAs with a different opaque type that would be recognized by the intended target of the LSA, but not by the SR. Because the opaque LSA is not the correct type for the SR, the LSA can be safely ignored in compliance with the OSPF protocol. The process 700 then ends.
If the opaque LSA is the correct opaque type, then the SR knows that it is the intended recipient and knows how to interpret the data within the opaque LSA. The process 700 accordingly extracts (at 725) the forwarding address from the opaque information field of the opaque LSA (e.g., field 510 in the sample opaque LSA 500 in
Finally, the process then updates (at 730) the routing table of the SR with the extracted forwarding address for all the links specified in the router LSA received previously from the route server (e.g., as described above with reference to
Many of the above-described features and applications are implemented as software processes that are specified as a set of instructions recorded on a computer readable storage medium (also referred to as computer readable medium). When these instructions are executed by one or more processing unit(s) (e.g., one or more processors, cores of processors, or other processing units), they cause the processing unit(s) to perform the actions indicated in the instructions. Examples of computer readable media include, but are not limited to, CD-ROMs, flash drives, RAM chips, hard drives, EPROMs, etc. The computer readable media does not include carrier waves and electronic signals passing wirelessly or over wired connections.
In this specification, the term “software” is meant to include firmware residing in read-only memory or applications stored in magnetic storage, which can be read into memory for processing by a processor. Also, in some embodiments, multiple software inventions can be implemented as sub-parts of a larger program while remaining distinct software inventions. In some embodiments, multiple software inventions can also be implemented as separate programs. Finally, any combination of separate programs that together implement a software invention described here is within the scope of the invention. In some embodiments, the software programs, when installed to operate on one or more electronic systems, define one or more specific machine implementations that execute and perform the operations of the software programs.
The bus 805 collectively represents all system, peripheral, and chipset buses that communicatively connect the numerous internal devices of the electronic system 800. For instance, the bus 805 communicatively connects the processing unit(s) 810 with the read-only memory 830, the system memory 825, and the permanent storage device 835.
From these various memory units, the processing unit(s) 810 retrieve instructions to execute and data to process in order to execute the processes of the invention. The processing unit(s) may be a single processor or a multi-core processor in different embodiments.
The read-only-memory (ROM) 830 stores static data and instructions that are needed by the processing unit(s) 810 and other modules of the electronic system. The permanent storage device 835, on the other hand, is a read-and-write memory device. This device is a non-volatile memory unit that stores instructions and data even when the electronic system 800 is off. Some embodiments of the invention use a mass-storage device (such as a magnetic or optical disk and its corresponding disk drive) as the permanent storage device 835.
Other embodiments use a removable storage device (such as a floppy disk, flash drive, etc.) as the permanent storage device. Like the permanent storage device 835, the system memory 825 is a read-and-write memory device. However, unlike storage device 835, the system memory is a volatile read-and-write memory, such as random-access memory. The system memory stores some of the instructions and data that the processor needs at runtime. In some embodiments, the invention's processes are stored in the system memory 825, the permanent storage device 835, and/or the read-only memory 830. From these various memory units, the processing unit(s) 810 retrieve instructions to execute and data to process in order to execute the processes of some embodiments.
The bus 805 also connects to the input and output devices 840 and 845. The input devices enable the user to communicate information and select commands to the electronic system. The input devices 840 include alphanumeric keyboards and pointing devices (also called “cursor control devices”). The output devices 845 display images generated by the electronic system. The output devices include printers and display devices, such as cathode ray tubes (CRT) or liquid crystal displays (LCD). Some embodiments include devices such as a touchscreen that function as both input and output devices.
Finally, bus 805 also couples electronic system 800 to a network 865 through a network adapter (not shown). In this manner, the computer can be a part of a network of computers (such as a local area network (“LAN”), a wide area network (“WAN”), or an Intranet, or a network of networks, such as the Internet. Any or all components of electronic system 800 may be used in conjunction with the invention.
Some embodiments include electronic components, such as microprocessors, storage and memory that store computer program instructions in a machine-readable or computer-readable medium (alternatively referred to as computer-readable storage media, machine-readable media, or machine-readable storage media). Some examples of such computer-readable media include RAM, ROM, read-only compact discs (CD-ROM), recordable compact discs (CD-R), rewritable compact discs (CD-RW), read-only digital versatile discs (e.g., DVD-ROM, dual-layer DVD-ROM), a variety of recordable/rewritable DVDs (e.g., DVD-RAM, DVD-RW, DVD+RW, etc.), flash memory (e.g., SD cards, mini-SD cards, micro-SD cards, etc.), magnetic and/or solid state hard drives, read-only and recordable Blu-Ray® discs, ultra-density optical discs, any other optical or magnetic media, and floppy disks. The computer-readable media may store a computer program that is executable by at least one processing unit and includes sets of instructions for performing various operations. Examples of computer programs or computer code include machine code, such as is produced by a compiler, and files including higher-level code that are executed by a computer, an electronic component, or a microprocessor using an interpreter.
While the above discussion primarily refers to microprocessor or multi-core processors that execute software, some embodiments are performed by one or more integrated circuits, such as application specific integrated circuits (ASICs) or field programmable gate arrays (FPGAs). In some embodiments, such integrated circuits execute instructions that are stored on the circuit itself.
As used in this specification, the terms “computer”, “server”, “processor”, and “memory” all refer to electronic or other technological devices. These terms exclude people or groups of people. For the purposes of the specification, the terms display or displaying means displaying on an electronic device. As used in this specification, the terms “computer readable medium,” “computer readable media,” and “machine readable medium” are entirely restricted to tangible, physical objects that store information in a form that is readable by a computer. These terms exclude any wireless signals, wired download signals, and any other ephemeral signals.
This specification refers throughout to computational and network environments that include virtual machines (VMs). However, virtual machines are merely one example of data compute nodes (DNCs) or data compute end nodes, also referred to as addressable nodes. DCNs may include non-virtualized physical hosts, virtual machines, containers that run on top of a host operating system without the need for a hypervisor or separate operating system, and hypervisor kernel network interface modules.
VMs, in some embodiments, operate with their own guest operating systems on a host using resources of the host virtualized by virtualization software (e.g., a hypervisor, virtual machine monitor, etc.). The tenant (i.e., the owner of the VM) can choose which applications to operate on top of the guest operating system. Some containers, on the other hand, are constructs that run on top of a host operating system without the need for a hypervisor or separate guest operating system. In some embodiments, the host operating system isolates the containers for different tenants and therefore provides operating-system level segregation of the different groups of applications that operate within different containers. This segregation is akin to the VM segregation that is offered in hypervisor-virtualized environments, and thus can be viewed as a form of virtualization that isolates different groups of applications that operate in different containers. Such containers are more lightweight than VMs.
Hypervisor kernel network interface modules, in some embodiments, is a non-VM DCN that includes a network stack with a hypervisor kernel network interface and receive/transmit threads. One example of a hypervisor kernel network interface module is the vmknic module that is part of the ESX hypervisor of VMware Inc.
One of ordinary skill in the art will recognize that while the specification refers to VMs, the examples given could be any type of DCNs, including physical hosts, VMs, non-VM containers, and hypervisor kernel network interface modules. In fact, the example networks could include combinations of different types of DCNs in some embodiments.
While the invention has been described with reference to numerous specific details, one of ordinary skill in the art will recognize that the invention can be embodied in other specific forms without departing from the spirit of the invention. In addition, at least one figure conceptually illustrates a process. The specific operations of this process may not be performed in the exact order shown and described. The specific operations may not be performed in one continuous series of operations, and different specific operations may be performed in different embodiments. Furthermore, the process could be implemented using several sub-processes, or as part of a larger macro process. Thus, one of ordinary skill in the art would understand that the invention is not to be limited by the foregoing illustrative details, but rather is to be defined by the appended claims.
Number | Name | Date | Kind |
---|---|---|---|
5504921 | Dev et al. | Apr 1996 | A |
5550816 | Hardwick et al. | Aug 1996 | A |
5751967 | Raab et al. | May 1998 | A |
6006275 | Picazo et al. | Dec 1999 | A |
6104699 | Holender et al. | Aug 2000 | A |
6219699 | McCloghrie et al. | Apr 2001 | B1 |
6359909 | Ito et al. | Mar 2002 | B1 |
6456624 | Eccles et al. | Sep 2002 | B1 |
6512745 | Abe et al. | Jan 2003 | B1 |
6539432 | Taguchi et al. | Mar 2003 | B1 |
6680934 | Cain | Jan 2004 | B1 |
6785843 | McRae et al. | Aug 2004 | B1 |
6914907 | Bhardwaj et al. | Jul 2005 | B1 |
6941487 | Balakrishnan et al. | Sep 2005 | B1 |
6950428 | Horst et al. | Sep 2005 | B1 |
6963585 | Pennec et al. | Nov 2005 | B1 |
6999454 | Crump | Feb 2006 | B1 |
7046630 | Abe et al. | May 2006 | B2 |
7197572 | Matters et al. | Mar 2007 | B2 |
7200144 | Terrell et al. | Apr 2007 | B2 |
7209439 | Rawlins et al. | Apr 2007 | B2 |
7260648 | Tingley et al. | Aug 2007 | B2 |
7283473 | Arndt et al. | Oct 2007 | B2 |
7342916 | Das et al. | Mar 2008 | B2 |
7391771 | Orava et al. | Jun 2008 | B2 |
7447197 | Terrell et al. | Nov 2008 | B2 |
7450598 | Chen et al. | Nov 2008 | B2 |
7463579 | Lapuh et al. | Dec 2008 | B2 |
7478173 | Delco | Jan 2009 | B1 |
7483411 | Weinstein et al. | Jan 2009 | B2 |
7555002 | Arndt et al. | Jun 2009 | B2 |
7606260 | Oguchi et al. | Oct 2009 | B2 |
7630358 | Lakhani et al. | Dec 2009 | B1 |
7643488 | Khanna et al. | Jan 2010 | B2 |
7649851 | Takashige et al. | Jan 2010 | B2 |
7653747 | Lucco et al. | Jan 2010 | B2 |
7710874 | Balakrishnan et al. | May 2010 | B2 |
7742459 | Kwan et al. | Jun 2010 | B2 |
7764599 | Doi et al. | Jul 2010 | B2 |
7778268 | Khan et al. | Aug 2010 | B2 |
7792987 | Vohra et al. | Sep 2010 | B1 |
7802000 | Huang et al. | Sep 2010 | B1 |
7818452 | Matthews et al. | Oct 2010 | B2 |
7826482 | Minei et al. | Nov 2010 | B1 |
7839847 | Nadeau et al. | Nov 2010 | B2 |
7885276 | Lin | Feb 2011 | B1 |
7936770 | Frattura et al. | May 2011 | B1 |
7937438 | Miller et al. | May 2011 | B1 |
7948986 | Ghosh et al. | May 2011 | B1 |
7953865 | Miller et al. | May 2011 | B1 |
7991859 | Miller et al. | Aug 2011 | B1 |
7995483 | Bayar et al. | Aug 2011 | B1 |
8027260 | Venugopal et al. | Sep 2011 | B2 |
8027354 | Portolani et al. | Sep 2011 | B1 |
8031633 | Bueno et al. | Oct 2011 | B2 |
8046456 | Miller et al. | Oct 2011 | B1 |
8054832 | Shukla et al. | Nov 2011 | B1 |
8055789 | Richardson et al. | Nov 2011 | B2 |
8060875 | Lambeth | Nov 2011 | B1 |
8131852 | Miller et al. | Mar 2012 | B1 |
8149737 | Metke et al. | Apr 2012 | B2 |
8155028 | Abu-Hamdeh et al. | Apr 2012 | B2 |
8166201 | Richardson et al. | Apr 2012 | B2 |
8194674 | Pagel et al. | Jun 2012 | B1 |
8199750 | Schultz et al. | Jun 2012 | B1 |
8223668 | Allan et al. | Jul 2012 | B2 |
8224931 | Brandwine et al. | Jul 2012 | B1 |
8224971 | Miller et al. | Jul 2012 | B1 |
8239572 | Brandwine et al. | Aug 2012 | B1 |
8259571 | Raphel et al. | Sep 2012 | B1 |
8265075 | Pandey | Sep 2012 | B2 |
8281067 | Stolowitz | Oct 2012 | B2 |
8312129 | Miller et al. | Nov 2012 | B1 |
8339959 | Moisand et al. | Dec 2012 | B1 |
8339994 | Gnanasekaran et al. | Dec 2012 | B2 |
8345650 | Foxworthy et al. | Jan 2013 | B2 |
8351418 | Zhao et al. | Jan 2013 | B2 |
8370834 | Edwards et al. | Feb 2013 | B2 |
8416709 | Marshall et al. | Apr 2013 | B1 |
8456984 | Ranganathan et al. | Jun 2013 | B2 |
8504718 | Wang et al. | Aug 2013 | B2 |
8559324 | Brandwine et al. | Oct 2013 | B1 |
8565108 | Marshall et al. | Oct 2013 | B1 |
8600908 | Lin et al. | Dec 2013 | B2 |
8611351 | Gooch et al. | Dec 2013 | B2 |
8612627 | Brandwine | Dec 2013 | B1 |
8625594 | Sakai et al. | Jan 2014 | B2 |
8625603 | Ramakrishnan et al. | Jan 2014 | B1 |
8625616 | Vobbilisetty et al. | Jan 2014 | B2 |
8627313 | Edwards et al. | Jan 2014 | B2 |
8644188 | Brandwine et al. | Feb 2014 | B1 |
8660129 | Brendel et al. | Feb 2014 | B1 |
8705513 | Merwe et al. | Apr 2014 | B2 |
8958298 | Zhang et al. | Feb 2015 | B2 |
9021066 | Singh et al. | Apr 2015 | B1 |
9032095 | Traina et al. | May 2015 | B1 |
9059999 | Koponen et al. | Jun 2015 | B2 |
9137052 | Koponen et al. | Sep 2015 | B2 |
9313129 | Ganichev et al. | Apr 2016 | B2 |
9419855 | Ganichev et al. | Aug 2016 | B2 |
9485149 | Traina et al. | Nov 2016 | B1 |
9503321 | Neginhal et al. | Nov 2016 | B2 |
9559980 | Li et al. | Jan 2017 | B2 |
9647883 | Neginhal et al. | May 2017 | B2 |
9749214 | Han | Aug 2017 | B2 |
9787605 | Zhang et al. | Oct 2017 | B2 |
10057157 | Goliya et al. | Aug 2018 | B2 |
10075363 | Goliya et al. | Sep 2018 | B2 |
10079779 | Zhang et al. | Sep 2018 | B2 |
10095535 | Dubey et al. | Oct 2018 | B2 |
10110431 | Ganichev et al. | Oct 2018 | B2 |
10129142 | Goliya et al. | Nov 2018 | B2 |
10129180 | Zhang et al. | Nov 2018 | B2 |
10153973 | Dubey | Dec 2018 | B2 |
10230629 | Masurekar et al. | Mar 2019 | B2 |
10341236 | Boutros et al. | Jul 2019 | B2 |
10382321 | Boyapati | Aug 2019 | B1 |
10411955 | Neginhal et al. | Sep 2019 | B2 |
10454758 | Boutros et al. | Oct 2019 | B2 |
10601700 | Goliya et al. | Mar 2020 | B2 |
20010043614 | Viswanadham et al. | Nov 2001 | A1 |
20020067725 | Oguchi et al. | Jun 2002 | A1 |
20020093952 | Gonda | Jul 2002 | A1 |
20020194369 | Rawlins et al. | Dec 2002 | A1 |
20030041170 | Suzuki | Feb 2003 | A1 |
20030058850 | Rangarajan et al. | Mar 2003 | A1 |
20030067924 | Choe et al. | Apr 2003 | A1 |
20030069972 | Yoshimura et al. | Apr 2003 | A1 |
20040013120 | Shen | Jan 2004 | A1 |
20040073659 | Rajsic et al. | Apr 2004 | A1 |
20040098505 | Clemmensen | May 2004 | A1 |
20040267866 | Carollo et al. | Dec 2004 | A1 |
20050018669 | Arndt et al. | Jan 2005 | A1 |
20050027881 | Figueira et al. | Feb 2005 | A1 |
20050053079 | Havala | Mar 2005 | A1 |
20050083953 | May | Apr 2005 | A1 |
20050120160 | Plouffe et al. | Jun 2005 | A1 |
20050132044 | Guingo et al. | Jun 2005 | A1 |
20060002370 | Rabie et al. | Jan 2006 | A1 |
20060018253 | Windisch et al. | Jan 2006 | A1 |
20060026225 | Canali et al. | Feb 2006 | A1 |
20060029056 | Perera et al. | Feb 2006 | A1 |
20060056412 | Page | Mar 2006 | A1 |
20060059253 | Goodman et al. | Mar 2006 | A1 |
20060092940 | Ansari et al. | May 2006 | A1 |
20060092976 | Lakshman et al. | May 2006 | A1 |
20060174087 | Hashimoto et al. | Aug 2006 | A1 |
20060187908 | Shimozono et al. | Aug 2006 | A1 |
20060193266 | Siddha et al. | Aug 2006 | A1 |
20060291387 | Kimura et al. | Dec 2006 | A1 |
20060291388 | Amdahl et al. | Dec 2006 | A1 |
20070043860 | Pabari | Feb 2007 | A1 |
20070064673 | Bhandaru et al. | Mar 2007 | A1 |
20070140128 | Klinker et al. | Jun 2007 | A1 |
20070156919 | Potti et al. | Jul 2007 | A1 |
20070165515 | Vasseur | Jul 2007 | A1 |
20070201357 | Smethurst et al. | Aug 2007 | A1 |
20070206591 | Doviak et al. | Sep 2007 | A1 |
20070297428 | Bose et al. | Dec 2007 | A1 |
20080002579 | Lindholm et al. | Jan 2008 | A1 |
20080002683 | Droux et al. | Jan 2008 | A1 |
20080013474 | Nagarajan et al. | Jan 2008 | A1 |
20080049621 | McGuire et al. | Feb 2008 | A1 |
20080049646 | Lu | Feb 2008 | A1 |
20080059556 | Greenspan et al. | Mar 2008 | A1 |
20080071900 | Hecker et al. | Mar 2008 | A1 |
20080086726 | Griffith et al. | Apr 2008 | A1 |
20080151893 | Nordmark et al. | Jun 2008 | A1 |
20080159301 | Heer | Jul 2008 | A1 |
20080189769 | Casado et al. | Aug 2008 | A1 |
20080225853 | Melman et al. | Sep 2008 | A1 |
20080240122 | Richardson et al. | Oct 2008 | A1 |
20080253366 | Zuk et al. | Oct 2008 | A1 |
20080253396 | Olderdissen | Oct 2008 | A1 |
20080291910 | Tadimeti et al. | Nov 2008 | A1 |
20090031041 | Clemmensen | Jan 2009 | A1 |
20090043823 | Iftode et al. | Feb 2009 | A1 |
20090064305 | Stiekes et al. | Mar 2009 | A1 |
20090083445 | Ganga | Mar 2009 | A1 |
20090092137 | Haigh et al. | Apr 2009 | A1 |
20090122710 | Bar-Tor et al. | May 2009 | A1 |
20090150527 | Tripathi et al. | Jun 2009 | A1 |
20090161547 | Riddle et al. | Jun 2009 | A1 |
20090249470 | Litvin et al. | Oct 2009 | A1 |
20090249473 | Cohn | Oct 2009 | A1 |
20090279536 | Unbehagen et al. | Nov 2009 | A1 |
20090292858 | Lambeth et al. | Nov 2009 | A1 |
20090300210 | Ferris | Dec 2009 | A1 |
20090303880 | Maltz et al. | Dec 2009 | A1 |
20100002722 | Porat et al. | Jan 2010 | A1 |
20100046531 | Louati et al. | Feb 2010 | A1 |
20100107162 | Edwards et al. | Apr 2010 | A1 |
20100115101 | Lain et al. | May 2010 | A1 |
20100131636 | Suri et al. | May 2010 | A1 |
20100153554 | Anschutz et al. | Jun 2010 | A1 |
20100153701 | Shenoy et al. | Jun 2010 | A1 |
20100162036 | Linden et al. | Jun 2010 | A1 |
20100165877 | Shukla et al. | Jul 2010 | A1 |
20100169467 | Shukla et al. | Jul 2010 | A1 |
20100192225 | Ma et al. | Jul 2010 | A1 |
20100205479 | Akutsu et al. | Aug 2010 | A1 |
20100214949 | Smith et al. | Aug 2010 | A1 |
20100275199 | Smith et al. | Oct 2010 | A1 |
20100290485 | Martini et al. | Nov 2010 | A1 |
20100318609 | Lahiri et al. | Dec 2010 | A1 |
20100322255 | Hao et al. | Dec 2010 | A1 |
20110016215 | Wang | Jan 2011 | A1 |
20110022695 | Dalal et al. | Jan 2011 | A1 |
20110026537 | Kolhi et al. | Feb 2011 | A1 |
20110032830 | Merwe et al. | Feb 2011 | A1 |
20110032843 | Papp et al. | Feb 2011 | A1 |
20110075664 | Lambeth et al. | Mar 2011 | A1 |
20110075674 | Li et al. | Mar 2011 | A1 |
20110085557 | Gnanasekaran et al. | Apr 2011 | A1 |
20110085559 | Chung et al. | Apr 2011 | A1 |
20110103259 | Aybay et al. | May 2011 | A1 |
20110119748 | Edwards et al. | May 2011 | A1 |
20110134931 | Merwe et al. | Jun 2011 | A1 |
20110142053 | Merwe et al. | Jun 2011 | A1 |
20110149964 | Judge et al. | Jun 2011 | A1 |
20110149965 | Judge et al. | Jun 2011 | A1 |
20110194567 | Shen | Aug 2011 | A1 |
20110205931 | Zhou et al. | Aug 2011 | A1 |
20110261825 | Ichino | Oct 2011 | A1 |
20110283017 | Alkhatib et al. | Nov 2011 | A1 |
20110299534 | Koganti et al. | Dec 2011 | A1 |
20110310899 | Alkhatib et al. | Dec 2011 | A1 |
20110317703 | Dunbar et al. | Dec 2011 | A1 |
20120014386 | Xiong et al. | Jan 2012 | A1 |
20120014387 | Dunbar et al. | Jan 2012 | A1 |
20120131643 | Cheriton | May 2012 | A1 |
20120155467 | Appenzeller | Jun 2012 | A1 |
20120182992 | Cowart et al. | Jul 2012 | A1 |
20120236734 | Sampath et al. | Sep 2012 | A1 |
20130007740 | Kikuchi et al. | Jan 2013 | A1 |
20130044636 | Koponen et al. | Feb 2013 | A1 |
20130044641 | Koponen et al. | Feb 2013 | A1 |
20130051399 | Zhang et al. | Feb 2013 | A1 |
20130058225 | Casado et al. | Mar 2013 | A1 |
20130058229 | Casado et al. | Mar 2013 | A1 |
20130058335 | Koponen et al. | Mar 2013 | A1 |
20130058350 | Fulton | Mar 2013 | A1 |
20130058353 | Koponen et al. | Mar 2013 | A1 |
20130060940 | Koponen et al. | Mar 2013 | A1 |
20130094350 | Mandal et al. | Apr 2013 | A1 |
20130103817 | Koponen et al. | Apr 2013 | A1 |
20130103818 | Koponen et al. | Apr 2013 | A1 |
20130132536 | Zhang et al. | May 2013 | A1 |
20130142048 | Gross, IV et al. | Jun 2013 | A1 |
20130148541 | Zhang et al. | Jun 2013 | A1 |
20130148542 | Zhang et al. | Jun 2013 | A1 |
20130148543 | Koponen et al. | Jun 2013 | A1 |
20130148656 | Zhang et al. | Jun 2013 | A1 |
20130151661 | Koponen et al. | Jun 2013 | A1 |
20130151676 | Thakkar et al. | Jun 2013 | A1 |
20130208621 | Manghirmalani et al. | Aug 2013 | A1 |
20130212148 | Koponen et al. | Aug 2013 | A1 |
20130223444 | Liljenstolpe et al. | Aug 2013 | A1 |
20130230047 | Subrahmaniam et al. | Sep 2013 | A1 |
20130266007 | Kumbhare et al. | Oct 2013 | A1 |
20130266015 | Qu et al. | Oct 2013 | A1 |
20130266019 | Qu et al. | Oct 2013 | A1 |
20130268799 | Mestery et al. | Oct 2013 | A1 |
20130329548 | Nakil et al. | Dec 2013 | A1 |
20130332602 | Nakil et al. | Dec 2013 | A1 |
20130332619 | Xie et al. | Dec 2013 | A1 |
20130339544 | Mithyantha | Dec 2013 | A1 |
20140003434 | Assarpour et al. | Jan 2014 | A1 |
20140016501 | Kamath et al. | Jan 2014 | A1 |
20140059226 | Messerli et al. | Feb 2014 | A1 |
20140146817 | Zhang | May 2014 | A1 |
20140173093 | Rabeela et al. | Jun 2014 | A1 |
20140195666 | Dumitriu et al. | Jul 2014 | A1 |
20140229945 | Barkai et al. | Aug 2014 | A1 |
20140241247 | Kempf et al. | Aug 2014 | A1 |
20140269299 | Koornstra | Sep 2014 | A1 |
20140328350 | Hao et al. | Nov 2014 | A1 |
20140372582 | Ghanwani et al. | Dec 2014 | A1 |
20140376550 | Khan et al. | Dec 2014 | A1 |
20150016300 | Devireddy et al. | Jan 2015 | A1 |
20150063360 | Thakkar et al. | Mar 2015 | A1 |
20150063364 | Thakkar et al. | Mar 2015 | A1 |
20150089082 | Patwardhan et al. | Mar 2015 | A1 |
20150092594 | Zhang | Apr 2015 | A1 |
20150103838 | Zhang et al. | Apr 2015 | A1 |
20150188770 | Naiksatam et al. | Jul 2015 | A1 |
20150222550 | Anand | Aug 2015 | A1 |
20150263897 | Ganichev et al. | Sep 2015 | A1 |
20150263946 | Tubaltsev | Sep 2015 | A1 |
20150263952 | Ganichev et al. | Sep 2015 | A1 |
20150271011 | Neginhal et al. | Sep 2015 | A1 |
20150271303 | Neginhal et al. | Sep 2015 | A1 |
20150299880 | Jorge et al. | Oct 2015 | A1 |
20160105471 | Nunes et al. | Apr 2016 | A1 |
20160119229 | Zhou | Apr 2016 | A1 |
20160182287 | Chiba et al. | Jun 2016 | A1 |
20160191374 | Singh et al. | Jun 2016 | A1 |
20160226700 | Zhang et al. | Aug 2016 | A1 |
20160226754 | Zhang et al. | Aug 2016 | A1 |
20160226762 | Zhang et al. | Aug 2016 | A1 |
20160261493 | Li | Sep 2016 | A1 |
20160294612 | Ravinoothala et al. | Oct 2016 | A1 |
20160344586 | Ganichev et al. | Nov 2016 | A1 |
20170005923 | Babakian | Jan 2017 | A1 |
20170048129 | Masurekar et al. | Feb 2017 | A1 |
20170048130 | Goliya et al. | Feb 2017 | A1 |
20170063632 | Goliya et al. | Mar 2017 | A1 |
20170063633 | Goliya et al. | Mar 2017 | A1 |
20170064717 | Filsfils et al. | Mar 2017 | A1 |
20170126497 | Dubey et al. | May 2017 | A1 |
20170180154 | Duong et al. | Jun 2017 | A1 |
20170230241 | Neginhal et al. | Aug 2017 | A1 |
20170317919 | Fernando et al. | Nov 2017 | A1 |
20180006943 | Dubey | Jan 2018 | A1 |
20180062914 | Boutros et al. | Mar 2018 | A1 |
20180097734 | Boutros et al. | Apr 2018 | A1 |
20180367442 | Goliya et al. | Dec 2018 | A1 |
20190018701 | Dubey et al. | Jan 2019 | A1 |
20190020580 | Boutros et al. | Jan 2019 | A1 |
20190020600 | Zhang et al. | Jan 2019 | A1 |
20190109780 | Nagarkar | Apr 2019 | A1 |
20190124004 | Dubey | Apr 2019 | A1 |
20190199625 | Masurekar et al. | Jun 2019 | A1 |
20190281133 | Tomkins | Sep 2019 | A1 |
20190312812 | Boutros et al. | Oct 2019 | A1 |
20190334767 | Neginhal et al. | Oct 2019 | A1 |
20200021483 | Boutros et al. | Jan 2020 | A1 |
20200169496 | Goliya et al. | May 2020 | A1 |
Number | Date | Country |
---|---|---|
1442987 | Sep 2003 | CN |
1714548 | Dec 2005 | CN |
103890751 | Jun 2014 | CN |
103947164 | Jul 2014 | CN |
104335553 | Feb 2015 | CN |
1653688 | May 2006 | EP |
2838244 | Feb 2015 | EP |
3013006 | Apr 2016 | EP |
2000244567 | Sep 2000 | JP |
2003069609 | Mar 2003 | JP |
2003124976 | Apr 2003 | JP |
2003318949 | Nov 2003 | JP |
2011139299 | Jul 2011 | JP |
2011228864 | Nov 2011 | JP |
2014534789 | Dec 2014 | JP |
1020110099579 | Sep 2011 | KR |
2005112390 | Nov 2005 | WO |
2008095010 | Aug 2008 | WO |
2013020126 | Feb 2013 | WO |
2013026049 | Feb 2013 | WO |
2013055697 | Apr 2013 | WO |
2013081962 | Jun 2013 | WO |
2013143611 | Oct 2013 | WO |
2013184846 | Dec 2013 | WO |
2015015787 | Feb 2015 | WO |
2015142404 | Sep 2015 | WO |
2016123550 | Aug 2016 | WO |
2017027073 | Feb 2017 | WO |
2018044746 | Mar 2018 | WO |
Entry |
---|
Agarwal, Sugam, et al., “Traffic Engineering in Software Defined Networks,” 2013 Proceedings IEEE INFOCOM, Apr. 14, 2013, 10 pages, Bell Labs, Alcatel-Lucent, Holmdel, NJ, USA. |
Aggarwal, R., et al., “Data Center Mobility based on E-VPN, BGP/MPLS IP VPN, IP Routing and NHRP,” draft-raggarwa-data-center-mobility-05.txt, Jun. 10, 2013, 24 pages, Internet Engineering Task Force, IETF, Geneva, Switzerland. |
Author Unknown, “VMware® NSX Network Virtualization Design Guide,” Month Unknown 2013, 32 pages, Item No. VMW-NSX-NTWK-VIRT-DESN-GUIDE-V2-101, VMware, Inc., Palo Alto, CA, USA. |
Ballani, Hitesh, et al., “Making Routers Last Longer with ViAggre,” NSDI '09: 6th USENIX Symposium on Networked Systems Design and Implementation, Apr. 2009, 14 pages, USENIX Association. |
Berger, L, et al, “The OSPF Opaque LSA Option,” Jul. 2008, 17 pages, RFC 5250, IETF. |
Caesar, Matthew, et al., “Design and Implementation of a Routing Control Platform,” NSDI '05: 2nd Symposium on Networked Systems Design & Implementation , Apr. 2005, 14 pages, USENIX Association. |
Dumitriu, Dan Mihai, et al., (U.S. Appl. No. 61/514,990), filed Aug. 4, 2011. |
Fernando, Rex, et al., “Service Chaining using Virtual Networks with BGP,” Internet Engineering Task Force, IETF, Jul. 7, 2015, 32 pages, Internet Society (ISOC), Geneva, Switzerland, available at https://tools.ietf.org/html/draft-fm-bess-service-chaining-01. |
Handley, Mark, et al., “Designing Extensible IP Router Software,” Proc. of NSDI, May 2005, 14 pages. |
Keller, Ralph, “Dissemination of Application-Specific Information using the OSPF Routing Protocol,” TIK Report Nr. 181, Nov. 2003, 12 pages, ETH Zurich, Switzerland. |
Koponen, Teemu, et al., “Network Virtualization in Multi-tenant Datacenters,” Technical Report TR-2013-001E, Aug. 2013, 22 pages, VMware, Inc., Palo Alto, CA, USA. |
Lakshminarayanan, Karthik, et al., “Routing as a Service,” Report No. UCB/CSD-04-1327, Month Unknown 2004, 16 pages, Computer Science Division (EECS), University of California—Berkeley, Berkeley, California. |
Lowe, Scott, “Learning NSX, Part 14: Using Logical Routing,” Scott's Weblog: The weblog of an IT pro specializing in cloud computing, virtualization, and networking, all with an open source view, Jun. 20, 2014, 8 pages, available at https://blog.scottlowe.org/2014/06/20/learning-nsx-part-14-using-logical-routing/. |
Maltz, David A., et al., “Routing Design in Operational Networks: A Look from the Inside,” SIGCOMM '04, Aug. 30-Sep. 3, 2004, 14 pages, ACM, Portland, Oregon, USA. |
Non-Published Commonly Owned U.S. Appl. No. 16/216,936, filed Dec. 11, 2018, 47 pages, Nicira, Inc. |
Rosen, E, “Applicability Statement for BGP/MPLS IP Virtual Private Networks (VPNs),” RFC 4365, Feb. 2006, 32 pages, The Internet Society. |
Sajassi, Ali, et al., “Integrated Routing and Bridging in EVPN draft-sajassi-12vpn-evpn-inter-subnet-forwarding-04”, Jul. 4, 2014, 24 pages. |
Shenker, Scott, et al., “The Future of Networking, and the Past of Protocols,” Dec. 2, 2011, 30 pages, USA. |
Wang, Anjing, et al., “Network Virtualization: Technologies, Perspectives, and Frontiers,” Journal of Lightwave Technology, Feb. 15, 2013, 15 pages, IEEE. |
Wang, Yi, et al., “Virtual Routers on the Move: Live Router Migration as a Network-Management Primitive,” SIGCOMM '08, Aug. 17-22, 2008, 12 pages, ACM, Seattle, Washington, USA. |
Non-Published commonly Owned U.S. Appl. No. 16/441,939, filed Jun. 20, 2019, 37 pages, Nicira, Inc. |
Non-Published commonly Owned U.S. Appl. No. 16/506,182, filed Jul. 9, 2019, 91 pages, Nicira, Inc. |
Author Unknown, “Cisco Border Gateway Protocol Control Plane for Virtual Extensible LAN,” White Paper, Jan. 23, 2015, 6 pages, Cisco Systems, Inc. |
Author Unknown, “Cisco Data Center Spine-and-Leaf Architecture: Design Overview,” White Paper, Apr. 15, 2016, 27 pages, Cisco Systems, Inc. |
Moreno, Victor, “VXLAN Deployment Models—A Practical Perspective,” Cisco Live 2015 Melbourne, Mar. 6, 2015, 72 pages, BRKDCT-2404, Cisco Systems, Inc. |
Non-published commonly owned U.S. Appl. No. 16/581,118, filed Sep. 24, 2019, 36 pages, Nicira, Inc. |
Non-published commonly owned U.S. Appl. No. 16/823,050, filed Mar. 18, 2020, 79 pages, Nicira, Inc. |
Non-published commonly owned U.S. Appl. No. 16/868,524, filed May 6, 2020, 105 pages, Nicira, Inc. |
Number | Date | Country | |
---|---|---|---|
20200186468 A1 | Jun 2020 | US |