[미국특허]
Inspecting operations of a machine to detect elephant flows
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-015/173
H04L-012/851
H04L-012/26
출원번호
US-0502102
(2014-09-30)
등록번호
US-9967199
(2018-05-08)
발명자
/ 주소
Lambeth, W. Andrew
Patil, Amit Vasant
Dabak, Prasad Sharad
Gunda, Laxmikant Vithal
Dhanasekar, Vasantha Kumar
Pettit, Justin
출원인 / 주소
NICIRA, INC.
대리인 / 주소
Adeli LLP
인용정보
피인용 횟수 :
0인용 특허 :
106
초록▼
Some embodiments provide a system that detects whether a data flow is an elephant flow; and if so, the system treats it differently than a mouse flow. The system of some embodiments detects an elephant flow by examining, among other items, the operations of a machine. In detecting, the system identi
Some embodiments provide a system that detects whether a data flow is an elephant flow; and if so, the system treats it differently than a mouse flow. The system of some embodiments detects an elephant flow by examining, among other items, the operations of a machine. In detecting, the system identifies an initiation of a new data flow associated with the machine. The new data flow can be an outbound data flow or an inbound data flow. The system then determines, based on the amount of data being sent or received, if the data flow is an elephant flow. The system of some embodiments identifies the initiation of a new data flow by intercepting a socket call or request to transfer a file.
대표청구항▼
1. A method of inspecting the operations of a first machine, that operates on a physical host, to detect an elephant flow, the method comprising: receiving, at a detector operating on the physical host and outside of the first machine, an indication from an agent operating within the first machine o
1. A method of inspecting the operations of a first machine, that operates on a physical host, to detect an elephant flow, the method comprising: receiving, at a detector operating on the physical host and outside of the first machine, an indication from an agent operating within the first machine of a new data flow, wherein the new data flow is one of (i) an outbound data flow from the first machine to a second machine with the first machine as the source of the data flow and (ii) an inbound data flow from the second machine to the first machine with the first machine as the destination of the data flow;receiving, from the agent operating within the first machine, an indicator of an amount of data being transferred by the first machine in the data flow;at the detector operating on the physical host and outside of the first machine, determining whether the data flow is an elephant flow based on the indicated amount of data being transferred in the data flow; andif the detector determines that the data flow is an elephant flow, reporting that the data flow is an elephant flow, wherein a managed forwarding element processes the data associated with the detected elephant flow differently from other flows not detected as elephant flows based on the report. 2. The method of claim 1, wherein the first machine is a first virtual machine (VM) and the detector operates within a second virtual machine that operates on the physical host. 3. The method of claim 1, wherein the agent operating within the first machine provides the indication after intercepting a network connection that is being opened on the first machine. 4. The method of claim 1, wherein the agent operating within the first machine performs a network introspection operation on the first machine to intercept a socket call being made to open the network connection, in order to provide the indication of the new data flow. 5. The method of claim 1, wherein the determining comprises (i) comparing the amount of data transferred with a threshold value and (ii) specifying, if the amount of data being transferred is greater than a threshold value, that the data flow is an elephant flow. 6. The method of claim 1 further comprising sending a message regarding a determined elephant flow to the agent operating within the first machine, wherein the agent receives the message and processes each packet in the elephant flow differently from other flows not detected as elephant flows. 7. The method of claim 6, wherein the indication of the new data flow comprises context information, wherein the context information includes at least one of a name of the first machine, an address associated with the first machine, an address associated with the second machine, a port number, an identification of an application that initiated the new data flow, and user data. 8. A physical host device comprising: a set of processing units;a set of non-transitory machine readable media storing: a first machine which when executed by the set of processing units sends and receives packets belonging to data flows;a data flow interception agent which when executed by the set of processing units operates on the first machine to detect an initiation of a new data flow and to identify amounts of the data being transferred by the machine in the data flow, wherein the new data flow is one of (i) an outbound data flow from the first machine to a second machine with the first machine as the source of the data flow and (ii) an inbound data flow from the second machine to the first machine with the first machine as the destination of the data flow; andan elephant detector, which when executed by the set of processing units, operates outside of the first machine to determine whether the amount of data transferred in the data flow is over a threshold size and, if the amount of data transferred is over the threshold size, that the data flow is an elephant flow, based on information received from the data flow interception agent; anda forwarding element, which when executed by the set of processing units, receives a report regarding the detected elephant flow and processes the data associated with the detected elephant flow differently from other flows not detected as elephant flows. 9. The physical host device of claim 8, wherein the first machine is a virtual machine (VM) that operates on the physical host device and the elephant detector operates within virtualization software of the physical host device. 10. The physical host device of claim 8, wherein the data flow interception agent detects the initiation of the new data flow by intercepting a file transfer request. 11. The physical host device of claim 8, wherein the data flow interception agent identifies one or more pieces of information that provide context regarding the new data flow and provides the pieces of information to the elephant detector. 12. The physical host device of claim 11, wherein the context information includes at least one of a name of the first machine, an address associated with the first machine, an address associated with the second machine, a port number, an identification of an application that initiated the new data flow, and user data. 13. A non-transitory machine readable medium storing a program that when executed by at least one processing unit inspects the operations of a first machine, that operates on a physical host, to detect an elephant flow, the program comprising sets of instructions for: receiving, at a detector operating on the physical host and outside of the first machine, an indication from an agent operating within the first machine of a new data flow, wherein the new data flow is one of (i) an outbound data flow from the first machine to a second machine with the first machine as the source of the data flow and (ii) an inbound data flow from the second machine to the first machine with the first machine as the destination of the data flow;receiving, from the agent operating within the first machine, an indicator of an amount of data being transferred by the first machine in the data flow;at the detector operating on the physical host and outside of the first machine, determining whether the data flow is an elephant flow based on the indicated amount of data being transferred in the data flow; andif the detector determines that the data flow is an elephant flow, reporting that the data flow is an elephant flow, wherein a managed forwarding element processes the data associated with detected elephant flow differently from other flows not detected as elephant flows based on the report. 14. The non-transitory machine readable medium of claim 13, wherein the first machine is a first virtual machine (VM) and the detector operates within virtualization software of the physical host. 15. The non-transitory machine readable medium of claim 13, wherein the agent operating within the machine provides the indication after intercepting a network connection that is being opened on the first machine. 16. The non-transitory machine readable medium of claim 13, wherein the agent operating within the first machine performs a network introspection operation on the first machine to intercept a socket call being made to open the network connection in order to provide the indication of the new data flow. 17. The non-transitory machine readable medium of claim 13, wherein the set of instructions for determining comprises sets of instructions for (i) comparing the amount of data transferred with a threshold value and (ii) specifying, if the amount of data being transferred is greater than a threshold value, that the data flow is an elephant flow.
Chatwani Dilip ; Subramanian Rajan ; Chiang Winnis ; Davar Jonathan ; Opher Ayal ; Sawant Shiva, Apparatus for determining the topology of an ATM network or the like Via communication of topology information between a.
Arndt,Richard Louis; Beukema,Bruce Leroy; Craddock,David F.; Fuhs,Ronald Edward; Gregg,Thomas Anthony; Meritt,Allan Samuel; Paynton,Calvin Charles; Rogers,Steven L.; Schmidt,Donald William; Walk,Bruce Marshall, Apparatus, system and method for providing multiple logical channel adapters within a single physical channel adapter in a system area network.
Schultz, Andrew Patrick; Gilson, David Henry; Bly, Keith Michael; Fromm, Kelly Donald; Weaver, Dennis Lee, Communicating with a control plane using a forwarding information format and control plane processing of packets devoid of a virtual switch identifier.
Ofek Yoram (Riverdale NY) Yung Marcel M. (New York NY), Communication network and a method of regulating the transmission of data packets in a communication network.
Kempf, James; Beheshti-Zavareh, Neda; Zhang, Ying; Nilsson, Tord K.; Johansson, Bengt E.; Pettersson, Sten Rune; Luning, Harald, Implementing a 3G packet core in a cloud computer with openflow data and control planes.
Arndt, Richard Louis; Beukema, Bruce Leroy; Craddock, David F.; Fuhs, Ronald Edward; Gregg, Thomas Anthony; Paynton, Calvin Charles; Rogers, Steven L.; Schmidt, Donald William; Walk, Bruce Marshall, Infiniband general services queue pair virtualization for multiple logical ports on a single physical port.
Brandwine, Eric Jason; Searle, Ian R.; Thompson, Aaron C.; Miller, Kevin Christopher, Managing use of intermediate destination computing nodes for provided computer networks.
Raab Ilan ; Manghirmalani Ravi ; Doitel Ofer ; Izbicki Lynne Marie, Method and apparatus for automatically configuring a network device to support a virtual network.
Allan, David; Bragg, Nigel; Unbehagen, Paul; Ashwood-Smith, Peter; Guoli, Yin, Method and apparatus for exchanging routing information and the establishment of connectivity across multiple network areas.
Frattura, David E.; Graham, Richard; Roese, John, Method and apparatus of virtual class of service and logical queue representation through network traffic distribution over multiple port interfaces.
Freimuth, Douglas Morgan; Hu, Elbert C.; Mraz, Ronald; Nahum, Erich M.; Pradhan, Prashant; Sahu, Sambit, Method for supporting connection establishment in an offload of network protocol processing.
Dev Roger H. (Durham NH) Emery Dale H. (Berwick ME) Rustici Eric S. (Londonderry NH) Brown Howard M. (Rochester NH) Wiggin Dwayne S. (Rochester NH) Gray Eric W. (Manchester NH) Scott Walter P. (Salem, Network management system using model-based intelligence.
Musoll, Enrique; Nemirovsky, Mario; Huynh, Jeffrey, Packet processor that generates packet-start offsets to immediately store incoming streamed packets using parallel, staggered round-robin arbitration to interleaved banks of memory.
Lee Sue-Kyoung (Cambridge MA) Chin Danny (Mercer NJ), Routing technique for a hierarchical interprocessor-communication network between massively-parallel processors.
Moisand, Jerome P.; Frailong, Jean-Marc; Narayanaswamy, Krishna; Melamud, Oren; Kirner, Paul J., Streamlined packet forwarding using dynamic filters for routing and security in a shared forwarding plane.
Vohra, Quaizar; Sheth, Nischal, Supporting virtual private networks using a first network topology for forwarding and a subset of the first network topology or a smaller topology for signaling.
Soloway Stuart R. (Wrentham MA) Lauck Anthony G. (Wellesley MA) Varghese George (Bradford MA), Synchronization mechanism for link state packet routing.
Balakrishnan, Ganesh; Corl, Jr., Everett A.; Jeffries, Clark D.; Sabhikhi, Ravinder K.; Siegel, Michael S.; Singh, Raj K.; Yedavalli, Rama M., System and method for automatic management of many computer data processing system pipes.
Zhao, Qianglin Quintin; Chen, Huaimo, System and method for point to multipoint inter-domain multiprotocol label switching traffic engineering path calculation.
Miller, Kevin Christopher; Brandwine, Eric Jason; Doane, Andrew J., Using virtual networking devices and routing information to initiate external actions.
Miller, Kevin Christopher; Brandwine, Eric Jason; Doane, Andrew J., Using virtual networking devices to manage routing communications between connected computer networks.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.