18390384. LAYER-2 NETWORKING USING ACCESS CONTROL LISTS IN A VIRTUALIZED CLOUD ENVIRONMENT simplified abstract (Oracle International Corporation)

From WikiPatents
Jump to navigation Jump to search

LAYER-2 NETWORKING USING ACCESS CONTROL LISTS IN A VIRTUALIZED CLOUD ENVIRONMENT

Organization Name

Oracle International Corporation

Inventor(s)

Jagwinder Singh Brar of Bellevue WA (US)

Lucas Michael Kreger-stickles of Seattle WA (US)

Bryce Eugene Bockman of Seattle WA (US)

Peter Croft Jones of Lexington MA (US)

Shane Baker of Bellevue WA (US)

LAYER-2 NETWORKING USING ACCESS CONTROL LISTS IN A VIRTUALIZED CLOUD ENVIRONMENT - A simplified explanation of the abstract

This abstract first appeared for US patent application 18390384 titled 'LAYER-2 NETWORKING USING ACCESS CONTROL LISTS IN A VIRTUALIZED CLOUD ENVIRONMENT

Simplified Explanation

The patent application describes techniques for communications in an L2 virtual network, including L2 compute instances, L2 virtual network interfaces, and L2 virtual switches.

  • L2 virtual network includes L2 compute instances, L2 virtual network interfaces, and L2 virtual switches.
  • L2 virtual network interface emulates an L2 port of the L2 virtual network.
  • Access control list (ACL) information is sent to a network virtualization device hosting the L2 virtual network interface.

Potential Applications

The technology described in the patent application could be applied in the following areas:

  • Data centers
  • Cloud computing environments
  • Network virtualization solutions

Problems Solved

The technology addresses the following issues:

  • Efficient communication in L2 virtual networks
  • Emulation of L2 ports in virtual environments
  • Access control list management in network virtualization

Benefits

The technology offers the following benefits:

  • Improved network performance
  • Enhanced security through access control list management
  • Scalability in virtual network environments

Potential Commercial Applications

The technology could find commercial applications in:

  • Network infrastructure companies
  • Cloud service providers
  • Data center operators

Possible Prior Art

One possible prior art for this technology could be related to virtual network interfaces and switches in network virtualization solutions.

=== What are the specific techniques used for communications in an L2 virtual network? The specific techniques used for communications in an L2 virtual network are not detailed in the abstract. It would be helpful to know the specific protocols or algorithms employed for communication within the virtual network.

=== How does the technology handle network congestion and prioritize traffic in the L2 virtual network? The abstract does not mention how the technology handles network congestion or prioritizes traffic within the L2 virtual network. Understanding these aspects would provide insights into the efficiency and performance of the system.


Original Abstract Submitted

Techniques are described for communications in an L2 virtual network. In an example, the L2 virtual network includes a plurality of L2 compute instances hosted on a set of host machines and a plurality of L2 virtual network interfaces and L2 virtual switches hosted on a set of network virtualization devices. An L2 virtual network interface emulates an L2 port of the L2 virtual network. Access control list (ACL) information applicable to the L2 port is sent to a network virtualization device that hosts the L2 virtual network interface.