Patents by Inventor Serge Maskalik

Serge Maskalik has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20160105393
    Abstract: Conditional address translation is performed in a multi-tenant cloud infrastructure to effectively support tenant-assigned addresses. For each tenant, the multi-tenant cloud infrastructure deploys both a private network used to communicate between the tenant and the cloud and a tenant-facing gateway to manage the private network. The multi-tenant cloud infrastructure also includes an externally-facing gateway used to communicate between the multi-tenant cloud and a public network. The tenant-facing gateways are configured to bypass address translation—providing consistent addressing across each private network irrespective of the physical location of resources linked by the private network. By contrast, the public-facing gateway is configured to translate source addresses in outgoing packets to addresses that are unique within the public network.
    Type: Application
    Filed: March 23, 2015
    Publication date: April 14, 2016
    Inventors: SACHIN THAKKAR, DEBASHIS BASAK, SERGE MASKALIK, WEIQING WU, ARAVIND SRINIVASAN
  • Publication number: 20160103699
    Abstract: A hybrid cloud computing system is managed by determining communication affinity between a cluster of virtual machines, where one virtual machine in the cluster executes in a virtualized computing system, and another virtual machine in the cluster executes in a cloud computing environment, and where the virtualized computing system is managed by a tenant that accesses the cloud computing environment. After determining a target location in the hybrid cloud computing system to host the cluster of virtual machines based on the determined communication affinity, at least one of the cluster of virtual machines is migrated to the target location.
    Type: Application
    Filed: October 30, 2014
    Publication date: April 14, 2016
    Inventors: Sachin THAKKAR, Debashis BASAK, Serge MASKALIK, Weiqing WU, Abhinav Vijay BHAGWAT
  • Publication number: 20160103712
    Abstract: An example provides a method of creating an instance of a virtual machine in a cloud computing system that includes: accepting a network connection at a server resource in the cloud computing system from a first client resource in a first virtualized computing system to transfer a first virtual machine; receiving first signatures for guest files of the first virtual machine from the first client resource; checking the first signatures against a content library in the cloud computing system to identify first duplicate files of the guest files that match first base files stored in the content library, and to identify first unique files of the guest files; instructing the first client resource such that a response to the instructing will send the first unique files to the exclusion of the first duplicate files; and generating an instance of the first virtual machine in the cloud computing system having the first base files and the first unique files.
    Type: Application
    Filed: December 24, 2014
    Publication date: April 14, 2016
    Inventors: Sachin THAKKAR, Serge MASKALIK, Debashis BASAK, Weiqing WU, Allwyn SEQUEIRA
  • Publication number: 20160105456
    Abstract: One or more examples provide a method of transferring a virtual machine between a virtualized computing system and a cloud computing system that includes: establishing connection between a first resource in the virtualized computing system and a second resource in the cloud computing system to transfer files that implement the virtual machine from the first resource to the second resource; accessing, for transmission over the connection, data blocks on a storage device in the virtualized computing system that include the files; executing at least one compliance check on each of the data blocks using at least one compliance checker; and preventing each of the data blocks that fails a compliance check from being maintained in the cloud computing system.
    Type: Application
    Filed: December 24, 2014
    Publication date: April 14, 2016
    Inventors: Sachin THAKKAR, Serge MASKALIK, Debashis BASAK, Allwyn SEQUEIRA, Govind HARIDAS
  • Publication number: 20160105321
    Abstract: A method is provide for managing a migration of a virtual machine from a private data center managed by a first organization to a public cloud computing system by a second organization and where the first organization is a tenant. The configurations of physical infrastructure of the private data center that underlies the virtual machine are determined, along with a corresponding match preference indicating a level of criticality for some corresponding configuration at the public cloud system. The configurations and match preferences generated as part of a migration package. The public cloud computing system instantiates a corresponding VM based on the determined configurations and corresponding match preferences.
    Type: Application
    Filed: March 7, 2015
    Publication date: April 14, 2016
    Inventors: SACHIN THAKKAR, DEBASHIS BASAK, SERGE MASKALIK, ARAVIND SRINIVASAN, ABHINAV VIJAY BHAGWAT
  • Publication number: 20160094643
    Abstract: Some embodiments provide a novel method for load balancing data messages that are sent by a source compute node (SCN) to one or more different groups of destination compute nodes (DCNs). In some embodiments, the method deploys a load balancer in the source compute node's egress datapath. This load balancer receives each data message sent from the source compute node, and determines whether the data message is addressed to one of the DCN groups for which the load balancer spreads the data traffic to balance the load across (e.g., data traffic directed to) the DCNs in the group. When the received data message is not addressed to one of the load balanced DCN groups, the load balancer forwards the received data message to its addressed destination. On the other hand, when the received data message is addressed to one of load balancer's DCN groups, the load balancer identifies a DCN in the addressed DCN group that should receive the data message, and directs the data message to the identified DCN.
    Type: Application
    Filed: December 1, 2014
    Publication date: March 31, 2016
    Inventors: Jayant Jain, Anirban Sengupta, Mohan Parthasarathy, Allwyn Sequeira, Serge Maskalik, Rick Lund
  • Publication number: 20160094451
    Abstract: Some embodiments provide a novel method for load balancing data messages that are sent by a source compute node (SCN) to one or more different groups of destination compute nodes (DCNs). In some embodiments, the method deploys a load balancer in the source compute node's egress datapath. This load balancer receives each data message sent from the source compute node, and determines whether the data message is addressed to one of the DCN groups for which the load balancer spreads the data traffic to balance the load across (e.g., data traffic directed to) the DCNs in the group. When the received data message is not addressed to one of the load balanced DCN groups, the load balancer forwards the received data message to its addressed destination. On the other hand, when the received data message is addressed to one of load balancer's DCN groups, the load balancer identifies a DCN in the addressed DCN group that should receive the data message, and directs the data message to the identified DCN.
    Type: Application
    Filed: December 1, 2014
    Publication date: March 31, 2016
    Inventors: Jayant Jain, Anirban Sengupta, Mohan Parthasarathy, Allwyn Sequeira, Serge Maskalik, Rick Lund
  • Publication number: 20160094452
    Abstract: Some embodiments provide a novel method for load balancing data messages that are sent by a source compute node (SCN) to one or more different groups of destination compute nodes (DCNs). In some embodiments, the method deploys a load balancer in the source compute node's egress datapath. This load balancer receives each data message sent from the source compute node, and determines whether the data message is addressed to one of the DCN groups for which the load balancer spreads the data traffic to balance the load across (e.g., data traffic directed to) the DCNs in the group. When the received data message is not addressed to one of the load balanced DCN groups, the load balancer forwards the received data message to its addressed destination. On the other hand, when the received data message is addressed to one of load balancer's DCN groups, the load balancer identifies a DCN in the addressed DCN group that should receive the data message, and directs the data message to the identified DCN.
    Type: Application
    Filed: December 1, 2014
    Publication date: March 31, 2016
    Inventors: Jayant Jain, Anirban Sengupta, Mohan Parthasarathy, Allwyn Sequeira, Serge Maskalik, Rick Lund
  • Publication number: 20160094632
    Abstract: Some embodiments provide novel inline switches that distribute data messages from source compute nodes (SCNs) to different groups of destination service compute nodes (DSCNs). In some embodiments, the inline switches are deployed in the source compute nodes datapaths (e.g., egress datapath). The inline switches in some embodiments are service switches that (1) receive data messages from the SCNs, (2) identify service nodes in a service-node cluster for processing the data messages based on service policies that the switches implement, and (3) use tunnels to send the received data messages to their identified service nodes. Alternatively, or conjunctively, the inline service switches of some embodiments (1) identify service-nodes cluster for processing the data messages based on service policies that the switches implement, and (2) use tunnels to send the received data messages to the identified service-node clusters.
    Type: Application
    Filed: August 31, 2015
    Publication date: March 31, 2016
    Inventors: Jayant Jain, Anirban Sengupta, Mohan Parthasarathy, Allwyn Sequeira, Serge Maskalik, Rick Lund
  • Publication number: 20160094642
    Abstract: Some embodiments provide a novel method for load balancing data messages that are sent by a source compute node (SCN) to one or more different groups of destination compute nodes (DCNs). In some embodiments, the method deploys a load balancer in the source compute node's egress datapath. This load balancer receives each data message sent from the source compute node, and determines whether the data message is addressed to one of the DCN groups for which the load balancer spreads the data traffic to balance the load across (e.g., data traffic directed to) the DCNs in the group. When the received data message is not addressed to one of the load balanced DCN groups, the load balancer forwards the received data message to its addressed destination. On the other hand, when the received data message is addressed to one of load balancer's DCN groups, the load balancer identifies a DCN in the addressed DCN group that should receive the data message, and directs the data message to the identified DCN.
    Type: Application
    Filed: December 1, 2014
    Publication date: March 31, 2016
    Inventors: Jayant Jain, Anirban Sengupta, Mohan Parthasarathy, Allwyn Sequeira, Serge Maskalik, Rick Lund
  • Publication number: 20160094631
    Abstract: Some embodiments provide a novel method for load balancing data messages that are sent by a source compute node (SCN) to one or more different groups of destination compute nodes (DCNs). In some embodiments, the method deploys a load balancer in the source compute node's egress datapath. This load balancer receives each data message sent from the source compute node, and determines whether the data message is addressed to one of the DCN groups for which the load balancer spreads the data traffic to balance the load across (e.g., data traffic directed to) the DCNs in the group. When the received data message is not addressed to one of the load balanced DCN groups, the load balancer forwards the received data message to its addressed destination. On the other hand, when the received data message is addressed to one of load balancer's DCN groups, the load balancer identifies a DCN in the addressed DCN group that should receive the data message, and directs the data message to the identified DCN.
    Type: Application
    Filed: July 31, 2015
    Publication date: March 31, 2016
    Inventors: Jayant Jain, Anirban Sengupta, Mohan Parthasarathy, Allwyn Sequeira, Serge Maskalik, Rick Lund
  • Patent number: 9276904
    Abstract: Some embodiments of the invention provide a novel method for specifying firewall rules. In some embodiments, the method provides the ability to specify for a particular firewall rule, a set of network nodes (also called a set of enforcement points below) at which the particular firewall should be enforced. To provide this ability, the method of some embodiments adds an extra tuple (referred to below as the AppliedTo tuple) to a firewall rule. This added AppliedTo tuple lists the set of enforcement points at which the firewall rule has to be applied (i.e., enforced).
    Type: Grant
    Filed: March 31, 2014
    Date of Patent: March 1, 2016
    Assignee: NICIRA, INC.
    Inventors: Kaushal Bansal, Uday Masurekar, Aravind Srinivasan, Shadab Shah, Serge Maskalik
  • Patent number: 9225597
    Abstract: Some embodiments provide a network system. The network system includes a first set of host machines hosting virtual machines that connect to each other through a logical network. The network system includes a second set of host machines hosting virtualized containers that operate as gateways to process packets entering the logical network from external sources. Each of the virtualized containers advertises itself to an external router as a next hop for packets entering the logical network such that the external router uses equal-cost multi-path forwarding to distribute the packets across the virtualized containers on the second set of host machines.
    Type: Grant
    Filed: March 14, 2014
    Date of Patent: December 29, 2015
    Assignee: NICIRA, INC.
    Inventors: Ariel Tubaltsev, Ronghua Zhang, Benjamin C. Basler, Serge Maskalik, Rajiv Ramanathan, David J. Leroy, Srinivas Neginhal, Kai-Wei Fan, Ansis Atteka
  • Patent number: 9215213
    Abstract: Some embodiments of the invention provide a novel method for specifying firewall rules. In some embodiments, the method provides the ability to specify for a particular firewall rule, a set of network nodes (also called a set of enforcement points below) at which the particular firewall should be enforced. To provide this ability, the method of some embodiments adds an extra tuple (referred to below as the AppliedTo tuple) to a firewall rule. This added AppliedTo tuple lists the set of enforcement points at which the firewall rule has to be applied (i.e., enforced).
    Type: Grant
    Filed: March 31, 2014
    Date of Patent: December 15, 2015
    Assignee: NICIRA, INC.
    Inventors: Kaushal Bansal, Uday Masurekar, Aravind Srinivasan, Shadab Shah, Serge Maskalik
  • Patent number: 9215214
    Abstract: Some embodiments of the invention provide a novel method for specifying firewall rules. In some embodiments, the method provides the ability to specify for a particular firewall rule, a set of network nodes (also called a set of enforcement points below) at which the particular firewall should be enforced. To provide this ability, the method of some embodiments adds an extra tuple (referred to below as the AppliedTo tuple) to a firewall rule. This added AppliedTo tuple lists the set of enforcement points at which the firewall rule has to be applied (i.e., enforced).
    Type: Grant
    Filed: March 31, 2014
    Date of Patent: December 15, 2015
    Assignee: NICIRA, INC.
    Inventors: Kaushal Bansal, Uday Masurekar, Aravind Srinivasan, Shadab Shah, Serge Maskalik
  • Patent number: 9215177
    Abstract: The disclosure herein describes an edge device of a network for distributed policy enforcement. During operation, the edge device receives an initial packet for an outgoing traffic flow, and identifies a policy being triggered by the initial packet. The edge device performs a reverse lookup to identify at least an intermediate node that is previously traversed by the initial packet and traffic parameters associated with the initial packet at the identified intermediate node. The edge device translates the policy based on the traffic parameters at the intermediate node, and forwards the translated policy to the intermediate node, thus facilitating the intermediate node in applying the policy to the traffic flow.
    Type: Grant
    Filed: June 24, 2013
    Date of Patent: December 15, 2015
    Assignee: WMware, Inc.
    Inventors: Jayant Jain, Anirban Sengupta, Debashis Basak, Serge Maskalik, Weiqing Wu, Aravind Srinivasan, Todd Sabin
  • Publication number: 20150263899
    Abstract: Some embodiments provide a network system. The network system includes a first set of host machines hosting virtual machines that connect to each other through a logical network. The network system includes a second set of host machines hosting virtualized containers that operate as gateways to process packets entering the logical network from external sources. Each of the virtualized containers advertises itself to an external router as a next hop for packets entering the logical network such that the external router uses equal-cost multi-path forwarding to distribute the packets across the virtualized containers on the second set of host machines.
    Type: Application
    Filed: March 14, 2014
    Publication date: September 17, 2015
    Applicant: Nicira, Inc.
    Inventors: Ariel Tubaltsev, Ronghua Zhang, Benjamin C. Basler, Serge Maskalik, Rajiv Ramanathan, David J. Leroy, Srinivas Neginhal, Kai-Wei Fan, Ansis Atteka
  • Publication number: 20150263946
    Abstract: Some embodiments provide a network system. The network system includes a first set of host machines for hosting virtual machines that connect to each other through a logical network. The first set of host machines includes managed forwarding elements for forwarding data between the host machines. The network system includes a second set of host machines for hosting virtualized containers that operate as gateways for forwarding data between the virtual machines and an external network. At least one of the virtualized containers peers with at least one physical router in the external network in order to advertise addresses of the virtual machines to the physical router.
    Type: Application
    Filed: March 14, 2014
    Publication date: September 17, 2015
    Applicant: Nicira, Inc.
    Inventors: Ariel Tubaltsev, Ronghua Zhang, Benjamin C. Basler, Serge Maskalik, Rajiv Ramanathan, David J. Leroy, Srinivas Neginhal, Kai-Wei Fan, Ansis Atteka
  • Publication number: 20150237015
    Abstract: Some embodiments of the invention provide a novel method for specifying firewall rules. In some embodiments, the method provides the ability to specify for a particular firewall rule, a set of network nodes (also called a set of enforcement points below) at which the particular firewall should be enforced. To provide this ability, the method of some embodiments adds an extra tuple (referred to below as the AppliedTo tuple) to a firewall rule. This added AppliedTo tuple lists the set of enforcement points at which the firewall rule has to be applied (i.e., enforced).
    Type: Application
    Filed: March 31, 2014
    Publication date: August 20, 2015
    Inventors: Kaushal Bansal, Uday Masurekar, Aravind Srinivasan, Shadab Shah, Serge Maskalik
  • Publication number: 20150237013
    Abstract: Some embodiments of the invention provide a novel method for specifying firewall rules. In some embodiments, the method provides the ability to specify for a particular firewall rule, a set of network nodes (also called a set of enforcement points below) at which the particular firewall should be enforced. To provide this ability, the method of some embodiments adds an extra tuple (referred to below as the AppliedTo tuple) to a firewall rule. This added AppliedTo tuple lists the set of enforcement points at which the firewall rule has to be applied (i.e., enforced).
    Type: Application
    Filed: March 31, 2014
    Publication date: August 20, 2015
    Inventors: Kaushal Bansal, Uday Masurekar, Aravind Srinivasan, Shadab Shah, Serge Maskalik