18518029. Transparent Migration of Virtual Network Functions simplified abstract (Google LLC)
Contents
- 1 Transparent Migration of Virtual Network Functions
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 Transparent Migration of Virtual Network Functions - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 Original Abstract Submitted
Transparent Migration of Virtual Network Functions
Organization Name
Inventor(s)
David Schultz of Albany CA (US)
Shuang Guan of Mountain View CA (US)
Srinivas Krishnan of Sunnyvale CA (US)
Doron Shaharabani of Mountain View CA (US)
Yossi Richter of Sunnyvale CA (US)
Md Ahsan Arefin of Mountain View CA (US)
Transparent Migration of Virtual Network Functions - A simplified explanation of the abstract
This abstract first appeared for US patent application 18518029 titled 'Transparent Migration of Virtual Network Functions
Simplified Explanation
The method described in the abstract involves identifying a middlebox receiving network flow, communicating with backend virtual machines, receiving flow statistics, and determining when to migrate the network flow to an end host based on offload rules.
- The method involves identifying a middlebox receiving network flow.
- The method includes communicating with one or more backend virtual machines.
- Flow statistics corresponding to the network flow of the middlebox are received.
- The method determines whether the flow statistics satisfy an offload rule.
- When the flow statistics satisfy the offload rule, the network flow is migrated from the middlebox to the end host.
Potential Applications
This technology could be applied in network optimization, cloud computing, and data center management.
Problems Solved
This technology helps in optimizing network traffic, improving resource utilization, and enhancing overall network performance.
Benefits
The benefits of this technology include efficient network flow management, improved scalability, and enhanced network security.
Potential Commercial Applications
A potential commercial application of this technology could be in cloud service providers, network infrastructure companies, and data center management firms.
Possible Prior Art
One possible prior art for this technology could be related to network traffic optimization algorithms and virtual machine migration techniques.
What are the potential security implications of migrating network flows between middleboxes and end hosts?
Migrating network flows between middleboxes and end hosts could potentially expose sensitive data to security risks during the migration process. It is essential to ensure that proper encryption and authentication mechanisms are in place to secure the data during transit.
How does this technology compare to existing methods of network flow management in terms of efficiency and scalability?
This technology offers a more dynamic and automated approach to network flow management compared to traditional methods. By offloading network flows based on predefined rules, it can improve efficiency and scalability in handling network traffic.
Original Abstract Submitted
A method includes identifying a middlebox receiving network flow and communicating with one or more backend virtual machines. The method also includes receiving flow statistics corresponding to the network flow of the middlebox and determining whether the flow statistics satisfy an offload rule. The offload rule indicates when to migrate the network flow from the middlebox to an end host. When the flow statistics satisfy the offload rule, the method also includes migrating the network flow from the middlebox to the end host.