Patents by Inventor Mike Parsa
Mike Parsa has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20200366526Abstract: For a multi-tenant environment, some embodiments of the invention provide a novel method for (1) embedding a specific path for a tenant's data message flow through a network in tunnel headers encapsulating the data message flow, and then (2) using the embedded path information to direct the data message flow through the network. In some embodiments, the method selects the specific path from two or more viable such paths through the network for the data message flow.Type: ApplicationFiled: July 31, 2020Publication date: November 19, 2020Inventors: Sami Boutros, Ankur Dubey, Mike Parsa, Israel Cidon, Prashanth Venugopal
-
Publication number: 20200358867Abstract: In some embodiments, a method instantiates a proxy that stores first state information for first workloads running on a first computing device. The first computing device receives a migrated workload from a second computing device and second state information for a session associated with the migrated workload. The second state information is generated by a proxy on the second computing device that processed one or more packets for the migrated workload on the second computing device. The method stories the second state information for the proxy on the first computing device and resumes the session associated with the migrated workload using the proxy on the first computing device.Type: ApplicationFiled: July 23, 2020Publication date: November 12, 2020Inventors: Jayant Jain, Rick Lund, Mike Parsa, Brenden Blanco, Anirban Sengupta
-
Patent number: 10797910Abstract: For a multi-tenant environment, some embodiments of the invention provide a novel method for (1) embedding a specific path for a tenant's data message flow through a network in tunnel headers encapsulating the data message flow, and then (2) using the embedded path information to direct the data message flow through the network. In some embodiments, the method selects the specific path from two or more viable such paths through the network for the data message flow.Type: GrantFiled: January 26, 2018Date of Patent: October 6, 2020Assignee: NICIRA, INC.Inventors: Sami Boutros, Ankur Dubey, Mike Parsa, Israel Cidon, Prashanth Venugopal
-
Patent number: 10735541Abstract: In some embodiments, a first proxy is instantiated on the first computing device. and receives packets that are intercepted by a hypervisor. The packets are sent between a workload and another device and the proxy includes a first session between the proxy and the another device and a second session between the proxy and the workload. State information is extracted for the packets that are sent in the first session or the second session at the first proxy and the state information is stored. The first computing device migrates the workload to a second computing device. When the workload is migrated to the second computing device, the state information for the workload is migrated to a second proxy that is instantiated on the second computing device. The second proxy then resumes the first session with the another device and the second session with the proxy using the state information.Type: GrantFiled: November 30, 2018Date of Patent: August 4, 2020Assignee: VMware, Inc.Inventors: Jayant Jain, Rick Lund, Mike Parsa, Brenden Blanco, Anirban Sengupta
-
Publication number: 20200177691Abstract: In some embodiments, a first proxy is instantiated on the first computing device and receives packets that are intercepted by a hypervisor. The packets are sent between a workload and another device and the proxy includes a first session between the proxy and the another device and a second session between the proxy and the workload. State information is extracted for the packets that are sent in the first session or the second session at the first proxy and the state information is stored. The first computing device migrates the workload to a second computing device. When the workload is migrated to the second computing device, the state information for the workload is migrated to a second proxy that is instantiated on the second computing device. The second proxy then resumes the first session with the another device and the second session with the proxy using the state information.Type: ApplicationFiled: November 30, 2018Publication date: June 4, 2020Inventors: Jayant Jain, Rick Lund, Mike Parsa, Brenden Blanco, Anirban Sengupta
-
Patent number: 10659252Abstract: For a multi-tenant environment, some embodiments of the invention provide a novel method for (1) embedding a specific path for a tenant's data message flow through a network in tunnel headers encapsulating the data message flow, and then (2) using the embedded path information to direct the data message flow through the network. In some embodiments, the method selects the specific path from two or more viable such paths through the network for the data message flow.Type: GrantFiled: January 26, 2018Date of Patent: May 19, 2020Assignee: NICIRA, INCInventors: Sami Boutros, Ankur Dubey, Mike Parsa, Israel Cidon, Prashanth Venugopal
-
Publication number: 20190238363Abstract: For a multi-tenant environment, some embodiments of the invention provide a novel method for (1) embedding a specific path for a tenant's data message flow through a network in tunnel headers encapsulating the data message flow, and then (2) using the embedded path information to direct the data message flow through the network. In some embodiments, the method selects the specific path from two or more viable such paths through the network for the data message flow.Type: ApplicationFiled: January 26, 2018Publication date: August 1, 2019Inventors: Sami Boutros, Ankur Dubey, Mike Parsa, Israel Cidon, Prashanth Venugopal
-
Publication number: 20190238364Abstract: For a multi-tenant environment, some embodiments of the invention provide a novel method for (1) embedding a specific path for a tenant's data message flow through a network in tunnel headers encapsulating the data message flow, and then (2) using the embedded path information to direct the data message flow through the network. In some embodiments, the method selects the specific path from two or more viable such paths through the network for the data message flow.Type: ApplicationFiled: January 26, 2018Publication date: August 1, 2019Inventors: Sami Boutros, Ankur Dubey, Mike Parsa, Israel Cidon, Prashanth Venugopal
-
Publication number: 20190173850Abstract: For a network including multiple computers acting as tunnel endpoints in a network, some embodiments provide a method for processing data messages in parallel using multiple processors (e.g., cores) of each computer. Each computer in some embodiments has a set of interfaces configured as tunnel endpoints connecting to multiple tunnels. In some embodiments, the multiple processors encrypt data messages according to a set of encryption parameters or multiple sets of encryption parameters that specify an encryption policy for data messages requiring encryption, an encryption algorithm, an encryption key, a destination network address, and an encryption-parameter-set identifier.Type: ApplicationFiled: December 4, 2017Publication date: June 6, 2019Inventors: Jayant Jain, Ly Loi, Anirban Sengupta, Yong Wang, Mike Parsa
-
Publication number: 20190173851Abstract: For a network including multiple computers acting as tunnel endpoints in a network, some embodiments provide a method for distributing data messages among processors of a destination computer that receives encrypted data messages from a source computer. Each computer in some embodiments has a set of interfaces configured as tunnel endpoints connecting to multiple tunnels. The encrypted data messages are received at multiple interfaces of the destination computer and in some embodiments, include an identifier for a set of encryption parameters (e.g., a security parameter index). The encryption-parameter-set identifier is used to distribute encrypted data messages among processors of the destination computer.Type: ApplicationFiled: December 4, 2017Publication date: June 6, 2019Inventors: Jayant Jain, Ly Loi, Anirban Sengupta, Yong Wang, Mike Parsa
-
Patent number: 10044617Abstract: In order to enable dynamic scaling of network services at the edge, novel systems and methods are provided to enable addition of add new nodes or removal of existing nodes while retaining the affinity of the flows through the stateful services. The methods provide a cluster of network nodes that can be dynamically resized to handle and process network traffic that utilizes stateful network services. The existing traffic flows through the edge continue to function during and after the changes to membership of the cluster. All nodes in the cluster operate in active-active mode, i.e., they are receiving and processing traffic flows, thereby maximizing the utilization of the available processing power.Type: GrantFiled: November 14, 2014Date of Patent: August 7, 2018Assignee: NICIRA, INC.Inventors: Mike Parsa, Jayant Jain, Xinhua Hong, Anirban Sengupta, Kai-Wei Fan
-
Patent number: 9876714Abstract: In order to enable dynamic scaling of network services at the edge, novel systems and methods are provided to enable addition of add new nodes or removal of existing nodes while retaining the affinity of the flows through the stateful services. The methods provide a cluster of network nodes that can be dynamically resized to handle and process network traffic that utilizes stateful network services. The existing traffic flows through the edge continue to function during and after the changes to membership of the cluster. All nodes in the cluster operate in active-active mode, i.e., they are receiving and processing traffic flows, thereby maximizing the utilization of the available processing power.Type: GrantFiled: November 14, 2014Date of Patent: January 23, 2018Assignee: NICIRA, INC.Inventors: Mike Parsa, Jayant Jain, Xinhua Hong, Anirban Sengupta, Kai-Wei Fan
-
Patent number: 9866473Abstract: In order to enable dynamic scaling of network services at the edge, novel systems and methods are provided to enable addition of add new nodes or removal of existing nodes while retaining the affinity of the flows through the stateful services. The methods provide a cluster of network nodes that can be dynamically resized to handle and process network traffic that utilizes stateful network services. The existing traffic flows through the edge continue to function during and after the changes to membership of the cluster. All nodes in the cluster operate in active-active mode, i.e., they are receiving and processing traffic flows, thereby maximizing the utilization of the available processing power.Type: GrantFiled: November 14, 2014Date of Patent: January 9, 2018Assignee: NICIRA, INC.Inventors: Mike Parsa, Jayant Jain, Xinhua Hong, Anirban Sengupta, Kai-Wei Fan
-
Publication number: 20160142314Abstract: In order to enable dynamic scaling of network services at the edge, novel systems and methods are provided to enable addition of add new nodes or removal of existing nodes while retaining the affinity of the flows through the stateful services. The methods provide a cluster of network nodes that can be dynamically resized to handle and process network traffic that utilizes stateful network services. The existing traffic flows through the edge continue to function during and after the changes to membership of the cluster. All nodes in the cluster operate in active-active mode, i.e., they are receiving and processing traffic flows, thereby maximizing the utilization of the available processing power.Type: ApplicationFiled: November 14, 2014Publication date: May 19, 2016Inventors: Mike Parsa, Jayant Jain, Xinhua Hong, Anirban Sengupta, Kai-Wei Fan
-
Publication number: 20160142295Abstract: In order to enable dynamic scaling of network services at the edge, novel systems and methods are provided to enable addition of add new nodes or removal of existing nodes while retaining the affinity of the flows through the stateful services. The methods provide a cluster of network nodes that can be dynamically resized to handle and process network traffic that utilizes stateful network services. The existing traffic flows through the edge continue to function during and after the changes to membership of the cluster. All nodes in the cluster operate in active-active mode, i.e., they are receiving and processing traffic flows, thereby maximizing the utilization of the available processing power.Type: ApplicationFiled: November 14, 2014Publication date: May 19, 2016Inventors: Mike Parsa, Jayant Jain, Xinhua Hong, Anirban Sengupta, Kai-Wei Fan
-
Publication number: 20160142296Abstract: In order to enable dynamic scaling of network services at the edge, novel systems and methods are provided to enable addition of add new nodes or removal of existing nodes while retaining the affinity of the flows through the stateful services. The methods provide a cluster of network nodes that can be dynamically resized to handle and process network traffic that utilizes stateful network services. The existing traffic flows through the edge continue to function during and after the changes to membership of the cluster. All nodes in the cluster operate in active-active mode, i.e., they are receiving and processing traffic flows, thereby maximizing the utilization of the available processing power.Type: ApplicationFiled: November 14, 2014Publication date: May 19, 2016Inventors: Mike Parsa, Jayant Jain, Xinhua Hong, Anirban Sengupta, Kai-Wei Fan
-
Publication number: 20160142297Abstract: In order to enable dynamic scaling of network services at the edge, novel systems and methods are provided to enable addition of add new nodes or removal of existing nodes while retaining the affinity of the flows through the stateful services. The methods provide a cluster of network nodes that can be dynamically resized to handle and process network traffic that utilizes stateful network services. The existing traffic flows through the edge continue to function during and after the changes to membership of the cluster. All nodes in the cluster operate in active-active mode, i.e., they are receiving and processing traffic flows, thereby maximizing the utilization of the available processing power.Type: ApplicationFiled: November 14, 2014Publication date: May 19, 2016Inventors: Mike Parsa, Jayant Jain, Xinhua Hong, Anirban Sengupta, Kai-Wei Fan