CROSS HOST BEACON PROBING IN A VIRTUALIZED COMPUTING SYSTEM

    公开(公告)号:US20240250920A1

    公开(公告)日:2024-07-25

    申请号:US18185763

    申请日:2023-03-17

    Applicant: VMware, Inc.

    CPC classification number: H04L49/90 H04L2101/622

    Abstract: An example method of beacon probing in a computing system includes: sending, by cross-host beacon probing (CHBP) software executing in a first host of the computing system, a first beacon probe from a first network interface controller (NIC) of the first host to NICs on a same layer 2 domain as the first NIC, the NICs including a second NIC of the first host and cross-host NICs of at least one host other than the first host; receiving, at the CHBP software through the first NIC, acknowledgements (ACKs) to the first beacon probe from the cross-host NICs; and determining, in response to the first beacon probe, connectivity statuses of the first NIC and the second NIC by the CHBP software based on the ACKs and on whether the second NIC receives the first beacon probe.

    PACKET HANDLING BASED ON MULTIPROCESSOR ARCHITECTURE CONFIGURATION

    公开(公告)号:US20190332408A1

    公开(公告)日:2019-10-31

    申请号:US15961900

    申请日:2018-04-25

    Applicant: VMware, Inc.

    Abstract: Example methods are provided for a host to perform packet handling based on a microprocessor architecture configuration that includes a first node and a second node. One example method may comprise detecting, from a virtualized computing instance supported by the host, an egress packet for transmission to a destination via one of multiple physical network interface controllers (PNICs) of the host. The method may also comprise: identifying the first node assigned to the virtualized computing instance and selecting a first PNIC associated with the first node assigned to the virtualized computing instance. The multiple PNICs may include the first PNIC, and a second PNIC associated with the second node. The method may further comprise sending the egress packet to the destination via the first PNIC associated with the first node.

    VALIDATION-BASED SERVICE REQUEST HANDLING
    4.
    发明公开

    公开(公告)号:US20240236037A1

    公开(公告)日:2024-07-11

    申请号:US18132438

    申请日:2023-04-10

    Applicant: VMware, Inc.

    CPC classification number: H04L61/5014 H04L41/40 H04L41/50

    Abstract: Example methods and systems for validation-based service request handling are described. In one example, a computer system may obtain, from a management entity, configuration information specifying a unicast service address associated with a service node capable of providing a network service. In response to detecting a service request from the virtualized computing instance, the computer system may generate a modified service request that (a) is destined for the unicast service address and (b) includes a validation identifier (ID) associated with the virtualized computing instance. The modified service request may be forwarded towards the service node to cause the service node to perform validation based on the validation ID to determine whether to provide the network service. In response to detecting a service response from the service node, the service response, or a modified service response, may be forwarded towards the virtualized computing instance.

    LOGICAL OVERLAY TUNNEL MONITORING

    公开(公告)号:US20220210040A1

    公开(公告)日:2022-06-30

    申请号:US17170900

    申请日:2021-02-09

    Applicant: VMware, Inc.

    Abstract: Example methods and systems for logical overlay tunnel monitoring are described. One example may involve a first computer system obtaining control information identifying a list of multiple logical overlay tunnels to be monitored, including a first logical overlay tunnel between a first virtual tunnel endpoint (VTEP) and a second VTEP. Based on the control information, a first monitoring agent may configure and inject a probe packet at the first VTEP to cause the first VTEP to perform encapsulation and send an encapsulated probe packet over the first logical overlay tunnel. In response, an encapsulated response packet that includes a response packet may be received from the second monitoring agent over the first logical overlay tunnel. Based on the response packet, a tunnel performance metric associated with the first logical overlay tunnel may be determined.

Patent Agency Ranking