18518029. Transparent Migration of Virtual Network Functions simplified abstract (Google LLC)

From WikiPatents
Jump to navigation Jump to search

Transparent Migration of Virtual Network Functions

Organization Name

Google LLC

Inventor(s)

David Schultz of Albany CA (US)

Shuang Guan of Mountain View CA (US)

Srinivas Krishnan of Sunnyvale CA (US)

Eran Gal of Shoham (IL)

Doron Shaharabani of Mountain View CA (US)

Yossi Richter of Sunnyvale CA (US)

Md Ahsan Arefin of Mountain View CA (US)

Transparent Migration of Virtual Network Functions - A simplified explanation of the abstract

This abstract first appeared for US patent application 18518029 titled 'Transparent Migration of Virtual Network Functions

Simplified Explanation

The method described in the abstract involves identifying a middlebox receiving network flow, communicating with backend virtual machines, receiving flow statistics, and determining when to migrate the network flow to an end host based on offload rules.

  • The method involves identifying a middlebox receiving network flow.
  • The method includes communicating with one or more backend virtual machines.
  • Flow statistics corresponding to the network flow of the middlebox are received.
  • The method determines whether the flow statistics satisfy an offload rule.
  • When the flow statistics satisfy the offload rule, the network flow is migrated from the middlebox to the end host.

Potential Applications

This technology could be applied in network optimization, cloud computing, and data center management.

Problems Solved

This technology helps in optimizing network traffic, improving resource utilization, and enhancing overall network performance.

Benefits

The benefits of this technology include efficient network flow management, improved scalability, and enhanced network security.

Potential Commercial Applications

A potential commercial application of this technology could be in cloud service providers, network infrastructure companies, and data center management firms.

Possible Prior Art

One possible prior art for this technology could be related to network traffic optimization algorithms and virtual machine migration techniques.

What are the potential security implications of migrating network flows between middleboxes and end hosts?

Migrating network flows between middleboxes and end hosts could potentially expose sensitive data to security risks during the migration process. It is essential to ensure that proper encryption and authentication mechanisms are in place to secure the data during transit.

How does this technology compare to existing methods of network flow management in terms of efficiency and scalability?

This technology offers a more dynamic and automated approach to network flow management compared to traditional methods. By offloading network flows based on predefined rules, it can improve efficiency and scalability in handling network traffic.


Original Abstract Submitted

A method includes identifying a middlebox receiving network flow and communicating with one or more backend virtual machines. The method also includes receiving flow statistics corresponding to the network flow of the middlebox and determining whether the flow statistics satisfy an offload rule. The offload rule indicates when to migrate the network flow from the middlebox to an end host. When the flow statistics satisfy the offload rule, the method also includes migrating the network flow from the middlebox to the end host.