최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
DataON 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Edison 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Kafe 바로가기국가/구분 | United States(US) Patent 등록 |
---|---|
국제특허분류(IPC7판) |
|
출원번호 | US-0041838 (2013-09-30) |
등록번호 | US-9519501 (2016-12-13) |
발명자 / 주소 |
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 | 피인용 횟수 : 0 인용 특허 : 285 |
A method performed by a hypervisor in a virtual network traffic management cluster, the method comprising: assigning a set of continuous available source media access control (SMAC) addresses to one or more virtual network traffic management devices in a network traffic management cluster, the one o
A method performed by a hypervisor in a virtual network traffic management cluster, the method comprising: assigning a set of continuous available source media access control (SMAC) addresses to one or more virtual network traffic management devices in a network traffic management cluster, the one or more virtual network traffic management devices configured to handle connections for virtual guest instances; assigning a region of predetermined size in a SMAC-index mapping table to a corresponding virtual network traffic management device; wherein the assigned SMAC addresses and assigned region in the SMAC-index mapping table are accessible by the virtual guest instances; and maintaining SMAC-index pool allocation to virtual guest instances handled by corresponding virtual network traffic management devices.
1. A method for facilitating network address translation in a virtualized network traffic management cluster, executable by one or more traffic management devices with at least one processor executing the method, the method comprising steps to: assign, by a first processor on the one or more network
1. A method for facilitating network address translation in a virtualized network traffic management cluster, executable by one or more traffic management devices with at least one processor executing the method, the method comprising steps to: assign, by a first processor on the one or more network traffic management devices, a set of continuous available source media access control (SMAC) addresses stored in a region of a MAC table to a network traffic management cluster comprising one or more virtual network traffic management devices;establish, by a second processor on the one or more network traffic management devices, a connection in response to a request from one of the virtual network traffic management devices that received a packet associated with a new flow;insert, by a third processor on the one or more network traffic management devices, a flow table entry comprising an index to the MAC table into a flow table in a hardware-based data flow segment (DFS), wherein the flow table entry can be identified based on a key generated from a flow signature of the packet and the index corresponds to a MAC table entry in the MAC table storing one of the SMAC addresses corresponding to the one of the virtual network traffic management devices; andtransform, by a fourth processor on the one or more network traffic management devices, the packet associated with the connection using the one of the SMAC addresses as a source address of the received packet and send the received packet to a destination network device. 2. The method of claim 1, further comprising employing at least one of the first, second, third, or fourth processors on the one or more network traffic management devices to: generate the key based on the flow signature of another received packet;retrieve the flow table entry using the key and the MAC table entry using the index retrieved from the flow table entry; andtransform the another received packet using the MAC address. 3. The method of claim 1, wherein the at least a portion of the MAC table has a base boundary and a limit boundary, wherein storing of data associated with the virtual network traffic management devices is performed from the limit boundary in a converging manner to the base boundary. 4. The method of claim 1, further comprising employing at least one of the first, second, third, or fourth processors on the one or more network traffic management devices to enforce use of the set of SMAC addresses assigned to the virtual network traffic management devices. 5. The method of claim 1, further comprising employing at least one of the first, second, third, or fourth processors on the one or more network traffic management devices to: receive a request from another one of the virtual network traffic management devices for one or more additional SMAC addresses; andallocate additional space in the MAC table for, and assign to the another one of the virtual network traffic management devices, the one or more additional SMAC addresses. 6. The method as set forth in claim 1, wherein the first processor, the second processor, the third, and the fourth processor are the same processor. 7. The method as set forth in claim 1, wherein two or more of the first processor, the second processor, the third processor, or the fourth processor are on a same one of the network traffic management devices. 8. A non-transitory computer readable medium having stored thereon instructions for facilitating network address translation in a virtualized, comprising executable code which when executed by one or more processors causes the processors to perform steps comprising: assigning a set of continuous available source media access control (SMAC) addresses stored in a region of a MAC table to a network traffic management cluster comprising one or more virtual network traffic management devices;establishing a connection in response to a request from one of the virtual network traffic management devices that received a packet associated with a new flow;inserting a flow table entry comprising an index to the MAC table into a flow table in a hardware-based data flow segment (DFS), wherein the flow table entry can be identified based on a key generated from a flow signature of the packet and the index corresponds to a MAC table entry in the MAC table storing one of the SMAC addresses corresponding to the one of the virtual network traffic management devices; andtransforming the packet associated with the connection using the one of the SMAC addresses as a source address of the received packet and send the received packet to a destination network device. 9. The non-transitory computer readable medium of claim 8, further having stored thereon executable code which when executed by the processors further causes the processors to perform one or more additional steps comprising: generating the key based on the flow signature of another received packet;retrieving the flow table entry using the key and the MAC table entry using the index retrieved from the flow table entry; andtransforming the another received packet using the MAC address. 10. The non-transitory computer readable medium of claim 8, wherein the at least a portion of the MAC table has a base boundary and a limit boundary, wherein storing of data associated with the virtual network traffic management devices is performed from the limit boundary in a converging manner to the base boundary. 11. The non-transitory computer readable medium of claim 8, further having stored thereon executable code which when executed by the processors further causes the processors to perform one or more additional steps comprising enforcing use of the set of SMAC addresses assigned to the virtual network traffic management devices. 12. The non-transitory computer readable medium of claim 8, further having stored thereon executable code which when executed by the processors further causes the processors to perform one or more additional steps comprising: receiving a request from another one of the virtual network traffic management devices for one or more additional SMAC addresses; andallocating additional space in the MAC table for, and assign to the another one of the virtual network traffic management devices, the one or more additional SMAC addresses. 13. One or more network traffic management devices comprising: memory comprising programmed instructions stored in the memory; andone or more processor configured to be capable of executing the programmed instructions stored in the memory to: assign a set of continuous available source media access control (SMAC) addresses stored in a region of a MAC table to a network traffic management cluster comprising one or more virtual network traffic management devices;establish a connection in response to a request from one of the virtual network traffic management devices that received a packet associated with a new flow;insert a flow table entry comprising an index to the MAC table into a flow table in a hardware-based data flow segment (DFS), wherein the flow table entry can be identified based on a key generated from a flow signature of the packet and the index corresponds to a MAC table entry in the MAC table storing one of the SMAC addresses corresponding to the one of the virtual network traffic management devices; andtransform the packet associated with the connection using the one of the SMAC addresses as a source address of the received packet and send the received packet to a destination network device. 14. The one or more network traffic management devices of claim 13, wherein the one or more processor are further configured to be capable of executing the programmed instructions stored in the memory to: generate the key based on the flow signature of another received packet;retrieve the flow table entry using the key and the MAC table entry using the index retrieved from the flow table entry; andtransform the another received packet using the MAC address. 15. The one or more network traffic management devices of claim 13, wherein the at least a portion of the MAC table has a base boundary and a limit boundary, wherein storing of data associated with the virtual network traffic management devices is performed from the limit boundary in a converging manner to the base boundary. 16. The one or more network traffic management devices of claim 13, wherein the one or more processor are further configured to be capable of executing the programmed instructions stored in the memory to enforce use of the set of SMAC addresses assigned to the virtual network traffic management devices. 17. The one or more network traffic management devices of claim 13, wherein the one or more processor are further configured to be capable of executing the programmed instructions stored in the memory to: receive a request from another one of the virtual network traffic management devices for one or more additional SMAC addresses; andallocate additional space in the MAC table for, and assign to the another one of the virtual network traffic management devices, the one or more additional SMAC addresses. 18. A method for facilitating network address translation in a virtualized network traffic management cluster, the method comprising: assigning, by a network traffic management device, a set of continuous available source media access control (SMAC) addresses stored in a region of a MAC table to a network traffic management cluster comprising one or more virtual network traffic management devices;establishing, by the network traffic management device, a connection in response to a request from one of the virtual network traffic management devices that received a packet associated with a new flow;inserting, by the network traffic management device, a flow table entry comprising an index to the MAC table into a flow table in a hardware-based data flow segment (DFS), wherein the flow table entry can be identified based on a key generated from a flow signature of the packet and the index corresponds to a MAC table entry in the MAC table storing one of the SMAC addresses corresponding to the one of the virtual network traffic management devices; andtransforming, by the network traffic management device, the packet associated with the connection using the one of the SMAC addresses as a source address of the received packet and send the received packet to a destination network device.
Copyright KISTI. All Rights Reserved.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.