Embedding overlay virtual network addresses in underlying...

Electrical computers and digital processing systems: multicomput – Computer-to-computer protocol implementing

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C709S217000, C709S223000, C709S224000, C709S238000

Reexamination Certificate

active

08046480

ABSTRACT:
Techniques are described for managing communications between multiple computing nodes, such as computing nodes that are separated by one or more physical networks. In some situations, the techniques may be used to provide a virtual network between multiple computing nodes that are separated by one or more intermediate physical networks, such as from the edge of the one or more intermediate physical networks by modifying communications that enter and/or leave the intermediate physical networks. In some situations, the computing nodes may include virtual machine nodes hosted on one or more physical computing machines or systems, such as by or on behalf of one or more users (e.g., users of a program execution service). The managing of the communications may include using substrate network addresses that are configured to embed virtual network addresses for a virtual network that is overlaid on the underlying physical substrate network.

REFERENCES:
patent: 6411967 (2002-06-01), Van Renesse
patent: 6529953 (2003-03-01), Van Renesse
patent: 6724770 (2004-04-01), Van Renesse
patent: 7068666 (2006-06-01), Foster et al.
patent: 7068667 (2006-06-01), Foster et al.
patent: 7124289 (2006-10-01), Suorsa
patent: 7131123 (2006-10-01), Suorsa et al.
patent: 7152109 (2006-12-01), Suorsa et al.
patent: 2002/0062388 (2002-05-01), Ogier et al.
patent: 2002/0083198 (2002-06-01), Kim et al.
patent: 2004/0111426 (2004-06-01), Kim et al.
patent: 2004/0233916 (2004-11-01), Takeuchi et al.
patent: 2005/0025157 (2005-02-01), Pennec et al.
patent: 2005/0047329 (2005-03-01), Almog et al.
patent: 2005/0120160 (2005-06-01), Plouffe et al.
patent: 2005/0198173 (2005-09-01), Evans
patent: 2007/0239987 (2007-10-01), Hoole et al.
patent: 2007/0271453 (2007-11-01), Pohja et al.
patent: WO2009/151729 (2009-12-01), None
“Chapter: Configuring Layer 2 Services Over MPLS,” JUNOSe Internet Software for E-series Routing Platforms: Routing Protocols Configuration Guide, vol. 2, Mar. 2004, retrieved Jan. 26, 2007, from http://www.juniper.net/techpubs/software/erx/junose52/swconfig-routing-vol2/html/title-swconfig..., pp. 357-382, 31 pages.
“Cisco IP Solution Center MPLS VPN Management 4.2,” Cisco Systems, Inc., retrieved Jan. 24, 2007, from http://www.cisco.com/en/US/products/sw
etmgtsw/ps5332/products—data—sheet09186a008017d7..., 5 pages.
“Grid Computing Solutions,” Sun Microsystems, Inc., retrieved May 3, 2006, from http://www.sun.com/software/grid, 3 pages.
“Grid Offerings,” Java.net, retrieved May 3, 2006, from http://wiki.java.net/bin/view/Sungrid/OtherGridOfferings, 8 pages.
“MPLS-enabled VPN Services,” Data Connection, retrieved Jan. 26, 2007, from http://www.dataconnection.com/solutions/vpn—vlan.htm, 1 page.
“Recent Advances Boost System Virtualization,” eWeek.com, retrieved May 3, 2006, from http://www.eweek.com/article2/0,1895,1772626,00.asn, 5 pages.
“Scalable Trust of Next Generation Management (STRONGMAN),” retrieved May 17, 2006, from http://www.cis.upenn.edu/˜dsl/STRONGMAN/, 4 pages.
“Sun EDA Compute Ranch,” Sun Microsystems, Inc., retrieved May 3, 2006, from http://sun.com/processors/ranch/brochure.pdf, 2 pages.
“Sun Microsystems Accelerates UltraSPARC Processor Design Program With New Burlington, Mass. Compute Ranch,” Nov. 6, 2002, Sun Microsystems, Inc., retrieved May 3, 2006, from http://www.sun.com/smi/Press/sunflash/2002-11/sunflash.20021106.3.xml, 2 pages.
“Sun N1 Grid Engine 6,” Sun Microsystems, Inc., retrieved May 3, 2006, from http://www.sun.com/software/gridware/index.xml, 3 pages.
“Sun Opens New Processor Design Compute Ranch,” Nov. 30, 2001, Sun Microsystems, Inc., retrieved May 3, 2006, from http://www.sun.com/smi/Press/sunflash/2001-11/sunflash.20011130.1.xml, 3 pages.
“The Reverse Firewall™: Defeating DDoS Attacks Emerging from Local Area Networks,” Cs3, Inc., retrieved Nov. 11, 2005, from http://www.cs3-inc.com/rfw.html, 4 pages.
“The Softricity Desktop,” Softricity, retrieved May 3, 2006, from http://www.softricity.com/products/, 3 pages.
Bellovin, S., “Distributed Firewalls,” Nov. 1999, issue of ;login:, pp. 37-39, retrieved Nov. 11, 2005, from http://www.cs.columbia.edu/˜smb/papers/distfw.html, 10 pages.
Blaze, M., “Using the KeyNote Trust Management System,” Mar. 1, 2001, retrieved May 17, 2006, from http://www.crypto.com/trustmgt/kn.html, 4 pages.
Brenton, C., “What is Egress Filtering and How Can I Implement It?—Egress Filtering v 0.2,” Feb. 29, 2000, SANS Institute, http://www.sans.org/infosecFAQ/firewall/egress.htm, 6 pages.
Chown, T., “Use of VLANs for IPv4-IPv6 Coexistence in Enterprise Networks: draft-ietf-v6ops-vlan-usage-01,” IPv6 Operations, University of Southampton, Mar. 6, 2006, retrieved Jun. 15, 2007, from http://tools.ietf.org/html/draft-ietf-v6ops-vlan-usage-01, 13 pages.
Coulson, D., “Network Security Iptables,” Apr. 2003, Linuxpro, Part 2, retrieved from http://davidcoulson.net/writing/lxf/39/iptables.pdf, 4 pages.
Coulson, D., “Network Security Iptables,” Mar. 2003, Linuxpro, Part 1, retrieved from http://davidcoulson.net/writing/lxf/38/iptables.pdf, 4 pages.
Demers, A., “Epidemic Algorithms for Replicated Database Maintenance,” 1987, Proceedings of the sixth annual ACM Symposium on Principles of distributed computing, Vancouver, British Columbia, Canada, Aug. 10-12, 1987, 12 pages.
Dilley, J., et al., “Globally Distributed Content Delivery,” IEEE Internet Computing, Sep./Oct. 2002, http://computer.org/internet, pp. 50-58.
Draves, R., “Default Address Selection for Internet Protocol version 6 (IPv6),” The Internet Society, Feb. 2003, retrieved Feb. 12, 2008, from http://tools.ietf.org/html/rfc3484, 24 pages.
Farinacci, D., et al., “LISP Alternative Topology (LISP-ALT),” The Internet Society, Nov. 13, 2007, retrieved Mar. 19, 2008, from http://tools.ietf.org/html/draft-fuller-lisp-alt-01, 21 pages.
Gruener, J., “A vision of togetherness,” May 24, 2004, NetworkWorld, retrieved May 3, 2006, from, http://www.networkworld.com/supp/2004
dc3/0524virt.html, 9 pages.
Hinden, R., et al., “Internet Protocol Version 6 (IPv6) Addressing Architecture,” The Internet Society, Apr. 2003, retrieved Feb. 12, 2008, from http://tools.ietf.org/html/rfc3513, 26 pages.
Ioannidis, S., “Implementing a Distributed Firewall,” Nov. 2000, (ACM) Proceedings of the ACM Computer and Communications Security (CCS) 2000, Athens, Greece, pp. 190-199, retrieved from http://www.cis.upenn.edu/˜dsl/STRONGMAN/Papers/df.pdf, 10 pages.
Kenshi, P., “Help File Library: Iptables Basics,” Justlinux, retrieved Dec. 1, 2005, from http://www.justlinux.com
hf/Security/Iptables—Basics.html, 4 pages.
Metz, C., et al., “IPv4-Mapped Addresses on the Wire Considered Harmful,” Internet Engineering Task Force, Oct. 21, 2003, retrieved Mar. 27, 2008, from http://www.stindustries.net/IPv6/ietf-internet-drafts/draft-itojun-v6op..., 5 pages.
Nordmark, E., “Stateless IP/ICMP Translation Algorithm (SIIT),” The Internet Society, Feb. 2000, retrieved Mar. 19, 2008, from http://tools.ietf.org/html/rfc2765, 26 pages.
Resilient Overlay Networks, “Overview,” retrieved Feb. 11, 2008, from http:/
ms.csail.mit.edu/ron, 5 pages.
Shankland, S., “Sun to buy start-up to bolster N1,” Jul. 30, 2003, CNet News.com, retrieved May 3, 2006, http:/
ews.zdnet.com/2100-35213—22-5057752.html, 8 pages.
Strand, L., “Adaptive distributed firewall using intrusion detection,” Nov. 1, 2004, University of Oslo Department of Informatics, retrieved Mar. 8, 2006, from http://gnist.org/˜lars/studies/master/StrandLars-master.pdf, 158 pages.
Subramanian, L., et al., “OverQoS: An Overlay Based Architecture for Enhancing Internet , QoS,ȁ

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Embedding overlay virtual network addresses in underlying... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Embedding overlay virtual network addresses in underlying..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Embedding overlay virtual network addresses in underlying... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4273570

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.