Configuring communications between computing nodes

Electrical computers and digital processing systems: multicomput – Computer network managing

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C709S203000, C709S217000, C709S224000

Reexamination Certificate

active

07865586

ABSTRACT:
Techniques are described for configuring communications between multiple computing nodes, such as computing nodes that are separated by one or more physical networks. In some situations, the techniques may be used to provide a virtual network between multiple computing nodes that are separated by one or more intermediate physical networks, such as from the edge of the one or more intermediate physical networks by modifying communications that enter and/or leave the intermediate physical networks so as to provide an overlay network without encapsulation of the communications. In some situations, the computing nodes may include virtual machine nodes hosted on one or more physical computing machines or systems, such as by or on behalf of one or more users (e.g., users of a program execution service).

REFERENCES:
patent: 6411967 (2002-06-01), Van Renesse
patent: 6529953 (2003-03-01), Van Renesse
patent: 6724770 (2004-04-01), Van Renesse
patent: 7068666 (2006-06-01), Foster et al.
patent: 7068667 (2006-06-01), Foster et al.
patent: 7124289 (2006-10-01), Suorsa
patent: 7131123 (2006-10-01), Suorsa et al.
patent: 7152109 (2006-12-01), Suorsa et al.
patent: 7516206 (2009-04-01), Henseler et al.
patent: 7685148 (2010-03-01), Engquist et al.
patent: 7739328 (2010-06-01), Champion
patent: 2002/0062388 (2002-05-01), Ogier et al.
patent: 2004/0230670 (2004-11-01), Schmidt-Karaca et al.
patent: 2005/0188105 (2005-08-01), Reinhard et al.
patent: 2007/0239987 (2007-10-01), Hoole et al.
patent: 2007/0271453 (2007-11-01), Pohja et al.
patent: 2008/0313318 (2008-12-01), Vermeulen et al.
patent: 2009/0248896 (2009-10-01), Cohn
patent: 2009/0249473 (2009-10-01), Cohn
patent: 2009/0285207 (2009-11-01), Cohen et al.
patent: 2010/0138488 (2010-06-01), Fletcher et al.
“Chapter: Configuring Layer 2 Services Over MPLS,” JUNOSe Internet Software for E-series Routing Platforms: Routing Protocols Configuration Guide, vol. 2, Mar. 2004, retrieved Jan. 26, 2007, from http://www.juniper.net/techpubs/software/erx/junose52/swconfig-routing-vol2/html/title-swconfig . . . , pp. 357-382, 31 pages.
“Cisco IP Solution Center MPLS VPN Management 4.2, ” Cisco Systems, Inc., retrieved Jan. 24, 2007, from http://www.cisco.com/en/US/products/sw
etmgtsw/ps5332/products—data—sheet09186a008017d7 . . . , 5 pages.
“Grid Computing Solutions,” Sun Microsystems, Inc., retrieved May 3, 2006, from http://www.sun.com/software/grid, 3 pages.
“Grid Offerings,” Java.net, retrieved May 3, 2006, from http://wiki.java.net/bin/view/Sungrid/OtherGridOfferings, 8 pages.
“MPLS-enabled VPN Services,” Data Connection, retrieved Jan. 26, 2007, from http://www.dataconnection.com/solutions/vpn—vlan.htm, 1 page.
“Recent Advances Boost System Virtualization,” eWeek.com, retrieved May 3, 2006, from http://www.eweek.com/article2/0,1895,1772626,00.asp, 5 pages.
“Scalable Trust of Next Generation Management (STRONGMAN),” retrieved May 17, 2006, from http://www.cis.upenn.edu/˜dsl/STRONGMAN/, 4 pages.
“Sun EDA Compute Ranch,” Sun Microsystems, Inc., retrieved May 3, 2006, from http://sun.com/processors/ranch/brochure.pdf, 2 pages.
“Sun Microsystems Accelerates UltraSPARC Processor Design Program With New Burlington, Mass. Compute Ranch,” Nov. 6, 2002, Sun Microsystems, Inc., retrieved May 3, 2006, from http://www.sun.com/smi/Press/sunflash/2002-11/sunflash.20021106.3.xml, 2 pages.
“Sun N1 Grid Engine 6,” Sun Microsystems, Inc., retrieved May 3, 2006, from http://www.sun.com/software/gridware/index.xml, 3 pages.
“Sun Opens New Processor Design Compute Ranch,” Nov. 30, 2001, Sun Microsystems, Inc., retrieved May 3, 2006, from http ://www.sun.com/smi/Press/sunflash/2001-11/sunflash.20011130.1.xml, 3 pages.
“The Reverse Firewall™: Defeating DDoS Attacks Emerging from Local Area Networks,” Cs3, Inc., retrieved Nov. 11, 2005, from http://www.cs3-inc.com/rfw.html, 4 pages.
“The Softricity Desktop,” Softricity, retrieved May 3, 2006, from http://www.softricity.com/products/, 3 pages.
Bellovin, S., “Distributed Firewalls,” Nov. 1999, issue of ;login:, pp. 37-39, retrieved Nov. 11, 2005, from http://www.cs.columbia.edu/˜smb/papers/distfw.html, 10 pages.
Blaze, M., “Using the KeyNote Trust Management System,” Mar. 1, 2001, retrieved May 17, 2006, from http://www.crypto.com/trustmgt/kn.html, 4 pages.
Brenton, C., “What is Egress Filtering and How Can I Implement It?—Egress Filtering v 0.2,” Feb. 29, 2000, SANS Institute, http://www.sans.org/infosecFAQ/firewall/egress.htm, 6 pages.
Chown, T., “Use of VLANs for IPv4-IPv6 Coexistence in Enterprise Networks: draft-ietf-v6ops-vlan-usage-01,” IPv6 Operations, University of Southampton, Mar. 6, 2006, retrieved Jun. 15, 2007, from http://tools.ietf.org/html/draft-ietf-v6ops-vlan-usage-01, 13 pages.
Coulson, D., “Network Security Iptables,” Apr. 2003, Linuxpro, Part 2, retrieved from http://davidcoulson.net/writing/lxf/39/iptables.pdf, 4 pages.
Coulson, D., “Network Security Iptables,” Mar. 2003, Linuxpro, Part 1, retrieved from http://davidcoulson.net/writing/lxf/38/iptables.pdf, 4 pages.
Demers, a., “Epidemic Algorithms for Replicated Database Maintenance,” 1987, Proceedings of the sixth annual ACM Symposium on Principles of distributed computing, Vancouver, British Columbia, Canada, Aug. 10-12, 1987, 12 pages.
Dilley, J., et al., “Globally Distributed Content Delivery,” IEEE Internet Computing, Sep./Oct. 2002, http://computer.org/internet, pp. 50-58.
Draves, R., “Default Address Selection for Internet Protocol version 6 (IPv6),” The Internet Society, Feb. 2003, retrieved Feb. 12, 2008, from http://tools.ietf.org/html/rfc3484, 24 pages.
Farinacci, D., et al., “LISP Alternative Topology (LISP-ALT),” The Internet Society, Nov. 13, 2007, retrieved Mar. 19, 2008, from http://tools.ietf.org/html/draft-fuller-lisp-alt-01, 21 pages.
Gruener, J., “A vision of togetherness,” May 24, 2004, NetworkWorld, retrieved May 3, 2006, from, http://www.networkworld.com/supp/2004
dc3/0524virt.html, 9 pages.
Hinden, R., et al., “Internet Protocol Version 6 (IPv6) Addressing Architecture,” The Internet Society, Apr. 2003, retrieved Feb. 12, 2008, from http://tools.ietf.org/html/rfc3513, 26 pages.
Ioannidis, S., “Implementing a Distributed Firewall,” Nov. 2000, (ACM) Proceedings of the ACM Computer and Communications Security (CCS) 2000, Athens, Greece, pp. 190-199, retrieved from http://www.cis.upenn.edu/˜dsl/STRONGMAN/Papers/df.pdf, 10 pages.
Kenshi, P., “Help File Library: Iptables Basics,” Justlinux, retrieved Dec. 1, 2005, from http://www.justlinux.com
hf/Security/Iptables—Basics.html, 4 pages.
Metz, C., et al., “IPv4-Mapped Addresses on the Wire Considered Harmful,” Internet Engineering Task Force, Oct. 21, 2003, retrieved Mar. 27, 2008, from http://www.stindustries.net/IPv6/ietf-internet-drafts/draft-itojun-v6op . . . , 5 pages.
Nordmark, E., “Stateless IP/ICMP Translation Algorithm (SIIT),” The Internet Society, Feb. 2000, retrieved Mar. 19, 2008, from http://tools.ietf.org/html/rfc2765, 26 pages.
Resilient Overlay Networks, “Overview,” retrieved Feb. 11, 2008, from http:/
ms.csail.mit.edu/ron, 5 pages.
Shankland, S., “Sun to buy start-up to bolster N1,” Jul. 30, 2003, CNet News.com, retrieved May 3, 2006, http:/
ews.zdnet.com/2100-35213—22-5057752.html, 8 pages.
Strand, L., “Adaptive distributed firewall using intrusion detection,” Nov. 1, 2004, University of Oslo Department of Informatics, retrieved Mar. 8, 2006, from http://gnist.org/˜lars/studies/master/StrandLars-master.dpf, 158 pages.
Subramanian, L., et al., “OverQoS: An Overlay Based Architecture for Enhancing Internet QoS,” 1stSymposium on NSDI, Mar

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Configuring communications between computing nodes does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Configuring communications between computing nodes, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Configuring communications between computing nodes will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2729725

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.