Patents by Inventor Prerit RODNEY
Prerit RODNEY has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240031291Abstract: Some embodiments provide a method of forwarding data messages between source and destination host computers that execute source and destination machines. At a source computer on which a source machine for a data message flow executes, the method in some embodiments identifies a source tunnel endpoint group (TEPG) associated with the source machine. For the flow, the method selects one TEP of the TEPG as the source TEP. The method then uses the selected source TEP to forward the flow to the destination computer on which the destination machine executes.Type: ApplicationFiled: July 25, 2022Publication date: January 25, 2024Inventors: Subin Cyriac Mathew, Prerit Rodney, Chidambareswaran Raman
-
Publication number: 20240028366Abstract: Some embodiments provide a method of forwarding data messages between source and destination host computers that execute source and destination machines. At a source computer on which a source machine for a data message flow executes, the method in some embodiments identifies a source tunnel endpoint group (TEPG) associated with the source machine. For the flow, the method selects one TEP of the TEPG as the source TEP. The method then uses the selected source TEP to forward the flow to the destination computer on which the destination machine executes.Type: ApplicationFiled: July 25, 2022Publication date: January 25, 2024Inventors: Subin Cyriac Mathew, Prerit Rodney, Chidambareswaran Raman
-
Publication number: 20240028367Abstract: Some embodiments provide a method of forwarding data messages between source and destination host computers that execute source and destination machines. At a source computer on which a source machine for a data message flow executes, the method in some embodiments identifies a source tunnel endpoint group (TEPG) associated with the source machine. For the flow, the method selects one TEP of the TEPG as the source TEP. The method then uses the selected source TEP to forward the flow to the destination computer on which the destination machine executes.Type: ApplicationFiled: July 25, 2022Publication date: January 25, 2024Applicant: VMware, Inc.Inventors: Subin Cyriac Mathew, Prerit Rodney, Chidambareswaran Raman
-
Publication number: 20230370429Abstract: Some embodiments of the invention provide a method of upgrading a firewall module executing on a host computer to process traffic sent to and from machines executing on the host computer. While a first version of the firewall module executes on the host computer to process the traffic to and from the machines, the method loads a second version of the firewall module alongside the first version of the firewall module. For each of multiple ports associated with machines executing on the host computer for which the firewall module processes traffic sent to and from the port, the method saves a runtime state of the first version that relates to the port, transfers association of a firewall filter associated with the port from the first version to the second version, and restores the saved runtime state for the port to the second version.Type: ApplicationFiled: July 28, 2023Publication date: November 16, 2023Inventors: Vignesh Raghuraman, Guolin Yang, Boon S. Ang, Prerit Rodney, Rajeev Nair, Ashwin Mahesh Shroff
-
Patent number: 11740887Abstract: Some embodiments of the invention provide a method of upgrading software defined networking (SDN) modules executing on a host computer. While a first version of the SDN modules is executing on the host computer to perform traffic processing, the method loads a second version of the SDN modules alongside the first version of the SDN modules such that the first and second versions of the SDN modules are executing on the host computer at the same time. The method saves runtime states from the first version of the SDN modules, and transfers responsibility for performing traffic processing from the first version of the SDN modules to the second version of the SDN modules. The method then restores the saved runtime states to the second version of the SDN modules.Type: GrantFiled: April 6, 2021Date of Patent: August 29, 2023Assignee: VMWARE, INC.Inventors: Vignesh Raghuraman, Guolin Yang, Boon S. Ang, Prerit Rodney, Rajeev Nair, Ashwin Mahesh Shroff
-
Patent number: 11743234Abstract: Some embodiments of the invention provide a method of upgrading a firewall module executing on a host computer to process traffic sent to and from machines executing on the host computer. While a first version of the firewall module executes on the host computer to process the traffic to and from the machines, the method loads a second version of the firewall module alongside the first version of the firewall module. For each of multiple ports associated with machines executing on the host computer for which the firewall module processes traffic sent to and from the port, the method saves a runtime state of the first version that relates to the port, transfers association of a firewall filter associated with the port from the first version to the second version, and restores the saved runtime state for the port to the second version.Type: GrantFiled: April 6, 2021Date of Patent: August 29, 2023Assignee: VMWARE, INC.Inventors: Vignesh Raghuraman, Guolin Yang, Boon S. Ang, Prerit Rodney, Rajeev Nair, Ashwin Mahesh Shroff
-
Patent number: 11743191Abstract: Some embodiments provide a method of forwarding data messages between source and destination host computers that execute source and destination machines. At a source computer on which a source machine for a data message flow executes, the method in some embodiments identifies a source tunnel endpoint group (TEPG) associated with the source machine. For the flow, the method selects one TEP of the TEPG as the source TEP. The method then uses the selected source TEP to forward the flow to the destination computer on which the destination machine executes.Type: GrantFiled: July 25, 2022Date of Patent: August 29, 2023Assignee: VMWARE, INC.Inventors: Subin Cyriac Mathew, Prerit Rodney, Chidambareswaran Raman
-
Patent number: 11722336Abstract: Certain embodiments herein are directed to a method of by a source virtual tunnel endpoint (VTEP) for selecting a tunneling protocol for encapsulating a packet destined for a destination VTEP. In some embodiments, the method includes receiving the packet for transmission to the destination VTEP. The method further includes determining whether the destination VTEP is configured with a first tunneling protocol. Upon determining that the destination VTEP is configured with the first tunneling protocol, the method includes encapsulating the packet using the first tunneling protocol, and transmitting the encapsulated packet to the destination VTEP. Upon determining that the destination VTEP is not configured with the first tunneling protocol, encapsulating the packet using a second tunneling protocol, and transmitting the encapsulated packet to the destination VTEP.Type: GrantFiled: February 25, 2019Date of Patent: August 8, 2023Assignee: VMWARE, INC.Inventors: Feng Gu, Subin Cyriac Mathew, Prerit Rodney, Chidambareswaran Raman
-
Publication number: 20230208678Abstract: Example methods and systems for virtual tunnel endpoint (VTEP) mapping for overlay networking are described. One example may involve a computer system monitoring multiple VTEPs that are configured for overlay networking. In response to detecting a state transition associated with a first VTEP from a healthy state to an unhealthy state, the computer system may identify mapping information that associates a virtualized computing instance with the first VTEP in the unhealthy state; and update the mapping information to associate the virtualized computing instance with a second VTEP in the healthy state. In response to detecting an egress packet from the virtualized computing instance to a destination, an encapsulated packet may be generated and sent towards the destination based on the updated mapping information. The encapsulated packet may include the egress packet and an outer header identifying the second VTEP to be a source VTEP.Type: ApplicationFiled: December 23, 2021Publication date: June 29, 2023Applicant: VMware, Inc.Inventors: Subin Cyriac MATHEW, Chidambareswaran RAMAN, Prerit RODNEY, Naveen Vijayan KODAKKAL PUTHIYAVEETTIL
-
Publication number: 20220317990Abstract: Some embodiments of the invention provide a method of upgrading software defined networking (SDN) modules executing on a host computer. While a first version of the SDN modules is executing on the host computer to perform traffic processing, the method loads a second version of the SDN modules alongside the first version of the SDN modules such that the first and second versions of the SDN modules are executing on the host computer at the same time. The method saves runtime states from the first version of the SDN modules, and transfers responsibility for performing traffic processing from the first version of the SDN modules to the second version of the SDN modules. The method then restores the saved runtime states to the second version of the SDN modules.Type: ApplicationFiled: April 6, 2021Publication date: October 6, 2022Inventors: Vignesh Raghuraman, Guolin Yang, Boon S. Ang, Prerit Rodney, Rajeev Nair, Ashwin Mahesh Shroff
-
Publication number: 20220321536Abstract: Some embodiments of the invention provide a method of upgrading a firewall module executing on a host computer to process traffic sent to and from machines executing on the host computer. While a first version of the firewall module executes on the host computer to process the traffic to and from the machines, the method loads a second version of the firewall module alongside the first version of the firewall module. For each of multiple ports associated with machines executing on the host computer for which the firewall module processes traffic sent to and from the port, the method saves a runtime state of the first version that relates to the port, transfers association of a firewall filter associated with the port from the first version to the second version, and restores the saved runtime state for the port to the second version.Type: ApplicationFiled: April 6, 2021Publication date: October 6, 2022Inventors: Vignesh Raghuraman, Guolin Yang, Boon S. Ang, Prerit Rodney, Rajeev Nair, Ashwin Mahesh Shroff
-
Patent number: 11271776Abstract: Example methods and computer systems are provided for logical overlay network monitoring. The method may comprise: obtaining egress metric information associated with egress encapsulated packets that are sent by a source virtual tunnel endpoint (VTEP) to a destination VTEP over a logical overlay network; and obtaining ingress metric information associated with ingress encapsulated packets that are received by the destination VTEP from the source VTEP over the logical overlay network. The method may also comprise: performing a comparison to identify a divergence between the egress metric information and the ingress metric information; and based on the divergence, detecting a performance issue affecting logical overlay network connectivity between the source VTEP and the destination VTEP.Type: GrantFiled: July 23, 2019Date of Patent: March 8, 2022Assignee: VMWARE, INC.Inventors: Uday Shankar Nagaraj, Shyam Sambasivan Ramachandran, Natalia Tupy Jensen, Mansi Babbar, Prerit Rodney
-
Publication number: 20210218795Abstract: The disclosure provides an approach for workload migration. Embodiments include receiving logical network resource capacity information and logical network resource utilization information relating to a plurality of host computers and to one or more logical network resources. Embodiments include determining that a virtual computing instance (VCI) is to be run on one of the plurality of host computers and determining for each respective host computer of the plurality of host computers, a respective realization cost of the VCI for the respective host computer, wherein the respective realization cost relates to the one or more logical network resources. Embodiments include selecting, based on the logical network resource capacity information, the logical network resource utilization information, and the realization cost, a target host computer for the VCI from the plurality of host computers and loading the VCI on the target host computer.Type: ApplicationFiled: January 15, 2020Publication date: July 15, 2021Inventors: Prerit RODNEY, Subin Cyriac MATHEW, Chidambareswaran RAMAN
-
Patent number: 11064018Abstract: The disclosure provides an approach for workload migration. Embodiments include receiving logical network resource capacity information and logical network resource utilization information relating to a plurality of host computers and to one or more logical network resources. Embodiments include determining that a virtual computing instance (VCI) is to be run on one of the plurality of host computers and determining for each respective host computer of the plurality of host computers, a respective realization cost of the VCI for the respective host computer, wherein the respective realization cost relates to the one or more logical network resources. Embodiments include selecting, based on the logical network resource capacity information, the logical network resource utilization information, and the realization cost, a target host computer for the VCI from the plurality of host computers and loading the VCI on the target host computer.Type: GrantFiled: January 15, 2020Date of Patent: July 13, 2021Assignee: VMware, Inc.Inventors: Prerit Rodney, Subin Cyriac Mathew, Chidambareswaran Raman
-
Publication number: 20210028958Abstract: Example methods and computer systems are provided for logical overlay network monitoring. The method may comprise: obtaining egress metric information associated with egress encapsulated packets that are sent by a source virtual tunnel endpoint (VTEP) to a destination VTEP over a logical overlay network; and obtaining ingress metric information associated with ingress encapsulated packets that are received by the destination VTEP from the source VTEP over the logical overlay network. The method may also comprise: performing a comparison to identify a divergence between the egress metric information and the ingress metric information; and based on the divergence, detecting a performance issue affecting logical overlay network connectivity between the source VTEP and the destination VTEP.Type: ApplicationFiled: July 23, 2019Publication date: January 28, 2021Applicant: VMware, Inc.Inventors: Uday Shankar NAGARAJ, Shyam Sambasivan RAMACHANDRAN, Natalia Tupy JENSEN, Mansi BABBAR, Prerit RODNEY
-
Publication number: 20200274738Abstract: Certain embodiments herein are directed to a method of by a source virtual tunnel endpoint (VTEP) for selecting a tunneling protocol for encapsulating a packet destined for a destination VTEP. In some embodiments, the method includes receiving the packet for transmission to the destination VTEP. The method further includes determining whether the destination VTEP is configured with a first tunneling protocol. Upon determining that the destination VTEP is configured with the first tunneling protocol, the method includes encapsulating the packet using the first tunneling protocol, and transmitting the encapsulated packet to the destination VTEP. Upon determining that the destination VTEP is not configured with the first tunneling protocol, encapsulating the packet using a second tunneling protocol, and transmitting the encapsulated packet to the destination VTEP.Type: ApplicationFiled: February 25, 2019Publication date: August 27, 2020Inventors: Feng GU, Subin Cyriac MATHEW, Prerit RODNEY, Chidambareswaran RAMAN