-
公开(公告)号:US11838206B2
公开(公告)日:2023-12-05
申请号:US17384211
申请日:2021-07-23
Applicant: VMware, Inc.
Inventor: Yong Wang , Cheng-Chun Tu , Sreeram Kumar Ravinoothala , Yu Ying
IPC: H04L45/58
CPC classification number: H04L45/58
Abstract: Some embodiments of the invention provide a system for implementing multiple logical routers. The system includes a Kubernetes cluster that includes multiple nodes, with each node executing a set of pods. The set of pods include a first pod for performing a first set of data message processing operations for the multiple logical routers and at least one respective separate pod for each respective logical router of the multiple logical routers. Each respective pod is for performing a respective second set of data message processing operations for the respective logical router.
-
公开(公告)号:US11799784B2
公开(公告)日:2023-10-24
申请号:US17569276
申请日:2022-01-05
Applicant: VMware, Inc.
Inventor: Dexiang Wang , Sreeram Kumar Ravinoothala , Yong Wang , Jerome Catrouillet
IPC: H04L47/2416 , H04L47/2425 , H04L43/0888 , H04L47/122 , H04L47/78 , H04L47/125
CPC classification number: H04L47/2416 , H04L43/0888 , H04L47/122 , H04L47/125 , H04L47/2433 , H04L47/781
Abstract: A network system that implements quality of service (QoS) by rate limiting at a logical network entity is provided. The logical network entity includes multiple transport nodes for transporting network traffic in and out of the logical network entity. The system monitors traffic loads of the multiple transport nodes of the logical network entity. The system allocates a local CR and a local BS to each of the multiple transport nodes. The allocated local CR and the local BS are determined based on the CR and BS parameters of the logical network entity and based on the monitored traffic loads. Each transport node of the logical network entity in turn controls an amount of data being processed by the transport node based on a token bucket value that is computed based on the local CR and the local BS of the transport node.
-
公开(公告)号:US11799761B2
公开(公告)日:2023-10-24
申请号:US17571409
申请日:2022-01-07
Applicant: VMware, Inc.
Inventor: Yong Wang , Xinhua Hong , Hongwei Zhu
IPC: H04L45/24 , H04L45/02 , H04L12/46 , H04L47/2441 , H04L45/7453
CPC classification number: H04L45/24 , H04L12/4641 , H04L45/02 , H04L45/7453 , H04L47/2441
Abstract: Some embodiments provide a method for forwarding data messages between edge nodes that perform stateful processing on flows between a logical network and an external network. At a particular edge node, the method receives a data message belonging to a flow. The edge nodes use a deterministic algorithm to select one of the edge nodes to perform processing for each flow. The method identifies a first edge node to perform processing for the flow in a previous configuration and a second edge node to perform processing for the flow in a new configuration according to the algorithm. When the first and second edge nodes are different, the method uses a probabilistic filter and a stateful connection tracker to determine whether the flow existed prior to a particular time. When the flow did not exist prior to that time, the method selects the second edge node for the received data message.
-
公开(公告)号:US11736413B2
公开(公告)日:2023-08-22
申请号:US17149760
申请日:2021-01-15
Applicant: VMware, Inc.
Inventor: Yong Wang , Boon Seong Ang , Wenyi Jiang , Guolin Yang
IPC: H04L49/1546 , H04L69/22 , H04L49/00 , H04L9/06 , H04L9/40 , H04L45/7453
CPC classification number: H04L49/3063 , H04L9/0643 , H04L45/7453 , H04L63/20 , H04L69/22 , H04L2212/00
Abstract: Example methods and systems for a programmable virtual network interface controller (VNIC) to perform packet processing are described. In one example, the programmable VNIC may modify a packet processing pipeline based on the instruction. The modification may include injecting a second packet processing stage among the multiple first packet processing stages of the packet processing pipeline. In response to detecting an ingress packet that requires processing by the programmable VNIC, the ingress packet may be steered towards the modified packet processing pipeline. The ingress packet may then be processed using the modified packet processing pipeline by performing the second packet processing stage (a) to bypass at least one of the multiple first processing stages, or (b) in addition to the multiple first processing stages.
-
公开(公告)号:US11671347B2
公开(公告)日:2023-06-06
申请号:US17038555
申请日:2020-09-30
Applicant: VMware, Inc.
Inventor: Jia Yu , Yong Wang , Xinhua Hong , Mochi Xue
IPC: G06F15/173 , H04L45/00 , H04L47/20 , H04L45/125 , H04L45/64
CPC classification number: H04L45/14 , H04L45/125 , H04L45/64 , H04L45/70 , H04L47/20
Abstract: The disclosure provides an approach for performance management. Embodiments include receiving, at a port of a router, a transport control protocol (TCP) or user datagram protocol (UDP) packet generated by a performance component of the router. Embodiments include identifying, by the router, a rule related to the TCP or UDP packet. Embodiments include forwarding, by the router, the packet to an interface of a kernel based on the rule. Embodiments include receiving, by the performance component, in response to the TCP or UDP packet, an additional packet from the interface of the kernel. Embodiments include determining, by the performance component, a performance metric based on the TCP or UDP packet and the additional packet.
-
公开(公告)号:US11509638B2
公开(公告)日:2022-11-22
申请号:US16714838
申请日:2019-12-16
Applicant: VMware, Inc.
Inventor: Yong Wang , Jochen Behrens
Abstract: Example methods and computer systems for receive-side processing for encapsulated encrypted packets. One example may comprise: in response to receiving, over a tunnel, a first encapsulated encrypted packet that includes a first encrypted inner packet and a first outer header, generating a first decrypted inner packet by performing decryption and decapsulation; and based on content of the first decrypted inner packet, assigning the first decrypted inner packet to a first processing unit. The method may further comprise: in response to receiving, over the tunnel, a second encapsulated encrypted packet that includes a second encrypted inner packet and a second outer header, generating a second decrypted inner packet by performing decryption and decapsulation; and based on content of the second decrypted inner packet, assigning the second decrypted inner packet to a second processing unit, thereby distributing post-cryptography processing over multiple processing units.
-
公开(公告)号:US20220103488A1
公开(公告)日:2022-03-31
申请号:US17091663
申请日:2020-11-06
Applicant: VMware, Inc.
Inventor: Yong Wang , Boon S. Ang , Guolin Yang , Wenyi Jiang
IPC: H04L12/933
Abstract: Some embodiments of the invention provide a method for configuring multiple hardware offload units of a host computer to perform operations on packets associated with machines (e.g., virtual machines or containers) executing on the host computer and to pass the packets between each other efficiently. For instance, in some embodiments, the method configures a program executing on the host computer to identify a first hardware offload unit that has to perform a first operation on a packet associated with a particular machine and to provide the packet to the first hardware offload unit. The packet in some embodiments is a packet that the particular machine has sent to a destination machine on the network, or is a packet received from a source machine through a network and destined to the particular machine.
-
公开(公告)号:US20210281442A1
公开(公告)日:2021-09-09
申请号:US16866621
申请日:2020-05-05
Applicant: VMWARE, INC.
Inventor: Sarthak Ray , Sourabh Bhattacharya , Awan Kumar Sharma , Yong Wang
Abstract: Described herein are systems, methods, and software to manage maximum segment size (MSS) values associated with multiple tunnels according to an implementation. In one implementation, a gateway may obtain a Transmission Control Protocol (TCP) synchronize (SYN) packet from a computing node. The gateway may identify a tunnel associated with the TCP SYN packet, determine a maximum segment size (MSS) value based on the overhead associated with the tunnel, and replace a first MSS value in the TCP SYN packet with the MSS value determined by the gateway. Once added, the gateway may encapsulate the TCP SYN packet and communicate the packet to a second gateway.
-
公开(公告)号:US11082354B2
公开(公告)日:2021-08-03
申请号:US16439689
申请日:2019-06-12
Applicant: VMware, Inc.
Inventor: Dexiang Wang , Eduard Serra Miralles , Yong Wang , Mani Kancherla , Binggang Liu
IPC: H04L12/873 , H04L12/12
Abstract: Example methods and systems for adaptive polling. One example may comprise operating in a polling mode to poll, from a network interface, zero or more packets that require packet processing by the network device. The method may also comprise: in response to detecting a non-zero polling round, adjusting a polling parameter to delay switching from the polling mode to a sleep mode. The method may further comprise: in response to detecting a zero polling round and determining that a switch condition is satisfied, adjusting a sleep parameter associated with the sleep mode based on traffic characteristic information associated with one or more polling rounds; and switching from the polling mode to the sleep mode in which polling from the network interface is halted based on the sleep parameter.
-
公开(公告)号:US10911338B1
公开(公告)日:2021-02-02
申请号:US16520331
申请日:2019-07-23
Applicant: VMware, Inc.
Inventor: Yong Wang , Xinhua Hong , Jia Yu
Abstract: Example methods and systems are provided for packet event tracking. One example method may comprise: in response to a logical forwarding element detecting a packet event for a first packet, determining a first packet signature of the first packet; and tracking the packet event by updating a set membership filter based on the first packet signature to indicate that the first packet is a member of a set associated with the packet event. The method may also comprise: in response to receiving a query as to whether the packet event has been detected and tracked for a second packet, determining a second packet signature of the second packet. Based on the second packet signature, the set membership filter may be applied to determine whether the second packet is a possible member of the set associated with the packet event.
-
-
-
-
-
-
-
-
-