Patents by Inventor Todd Sabin
Todd Sabin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10033693Abstract: Systems and techniques are described for monitoring network communications using a distributed firewall. One of the techniques includes receiving, at a driver executing in a guest operating system of a virtual machine, a request to open a network connection from a process associated with a user, wherein the driver performs operations comprising: obtaining identity information for the user; providing the identity information and data identifying the network connection to an identity module external to the driver; and receiving, by a distributed firewall, data associating the identity information with the data identifying the network connection from the identity module, wherein the distributed firewall performs operations comprising: receiving an outgoing packet from the virtual machine; determining that the identity information corresponds to the outgoing packet; and evaluating one or more routing rules based at least in part on the identity information.Type: GrantFiled: October 1, 2013Date of Patent: July 24, 2018Assignee: NICIRA, INC.Inventors: Anirban Sengupta, Subrahmanyam Manuguri, Mitchell T. Christensen, Azeem Feroz, Todd Sabin
-
Publication number: 20180176180Abstract: For a host that executes one or more guest virtual machines (GVMs), some embodiments provide a novel virtualization architecture for utilizing a firewall service virtual machine (SVM) on the host to check the packets sent by and/or received for the GVMs. In some embodiments, the GVMs connect to a software forwarding element (e.g., a software switch) that executes on the host to connect to each other and to other devices operating outside of the host. Instead of connecting the firewall SVM to the host's software forwarding element that connects its GVMs, the virtualization architecture of some embodiments provides an SVM interface (SVMI) through which the firewall SVM can be accessed to check the packets sent by and/or received for the GVMs.Type: ApplicationFiled: February 19, 2018Publication date: June 21, 2018Inventors: Chidambareswaran Raman, Subrahmanyam Manuguri, Todd Sabin
-
Publication number: 20180069924Abstract: Techniques leveraging CPU flow affinity to increase throughput of a layer 2 (L2) extension network are disclosed. In one embodiment, an L2 concentrator appliance, which bridges a local area network (LAN) and a wide area network (WAN) in a stretched network, is configured such that multiple Internet Protocol Security (IPsec) tunnels are pinned to respective CPUs or cores, which each process traffic flows for one of the IPsec tunnels. Such parallelism can increase the throughput of the stretched network. Further, an L2 concentrator appliance that receives FOU packets is configured to distribute the received FOU packets across receive queues based a deeper inspection of inner headers of such packets.Type: ApplicationFiled: August 29, 2017Publication date: March 8, 2018Inventors: Laxminarayana TUMULURU, Todd SABIN, Weiqing WU, Serge MASKALIK, Sachin THAKKAR
-
Publication number: 20180063743Abstract: An approach is disclosed for steering network traffic away from congestion hot-spots to achieve better throughput and latency. In one embodiment, multiple Foo-over-UDP (FOU) tunnels, each having a distinct source port, are created between two endpoints. As a result of the distinct source ports, routers that compute hashes of packet fields in order to distribute traffic flows across network paths will compute distinct hash values for the FOU tunnels that may be associated with different paths. Probes are scheduled to measure network metrics, such as latency and liveliness, of each of the FOU tunnels. In turn, the network metrics are used to select particular FOU tunnel(s) to send traffic over so as to avoid congestion and high-latency hotspots in the network.Type: ApplicationFiled: July 19, 2017Publication date: March 1, 2018Inventors: Laxminarayana TUMULURU, Todd SABIN, Weiqing WU, Uday MASUREKAR, Serge MASKALIK, Sachin THAKKAR, Debashis BASAK
-
Publication number: 20180063000Abstract: Techniques for stateful connection optimization over stretched networks are disclosed. In one embodiment, hypervisor filtering modules in a cloud computing system are configured to modify packets sent by virtual computing instances (e.g., virtual machines (VMs)) in the cloud to local destinations in the cloud such that those packets have the destination Media Access Control (MAC) address of a local router that is also in the cloud. Doing so prevents tromboning traffic flows in which packets sent by virtual computing instances in the cloud to location destinations are routed to a stretched network's default gateway that is not in the cloud.Type: ApplicationFiled: August 29, 2017Publication date: March 1, 2018Inventors: Weiqing WU, Aravind SRINIVASAN, Leon CUI, Todd SABIN, Serge MASKALIK, Sachin THAKKAR
-
Publication number: 20180062993Abstract: Techniques for stateful connection optimization over stretched networks are disclosed. Such stretched networks may extend across both a data center and a cloud. In one embodiment, configuration changes are made to cloud layer 2 (L2) concentrators used by extended networks and a cloud router such that the L2 concentrators block packets with the cloud router's source MAC address and block address resolution protocol (ARP) requests for a gateway IP address from/to cloud networks that are part of the extended networks. Further, the cloud router is configured with the same gateway IP address as that of a default gateway router in the data center and responds to ARP requests for the gateway IP address with its own MAC address. In addition, specific prefix routes (e.g., /32 routes) for virtual computing instances on route optimized networks in the cloud are injected into the cloud router and propagating to a data center router.Type: ApplicationFiled: August 29, 2017Publication date: March 1, 2018Inventors: Weiqing WU, Aravind SRINIVASAN, Serge MASKALIK, Todd SABIN, Sachin THAKKAR
-
Publication number: 20180060117Abstract: A method of migrating a virtualized computing instance between source and destination virtualized computing systems includes executing a first migration workflow in the source virtualized computing system between a source host computer and a first mobility agent simulating a destination host, executing a second migration workflow in the destination virtualized computing system between a second mobility agent simulating a source host and a destination host computer, sending, as part of the first migration workflow, a configuration of the migrated virtualized computing instance to the destination virtualized computing system, translating, as part of the second migration workflow, infrastructure-dependent information in the configuration of the migrated virtualized computing instance, and transferring, during execution of the first and second migration workflows, migration data including the virtualized computing instance between the source host and the destination host over a network.Type: ApplicationFiled: August 29, 2017Publication date: March 1, 2018Inventors: Serge MASKALIK, Vemana MURTY, Manjunath BANDI, Todd SABIN, Narendra Kumar BASUR SHANKARAPPA, Sachin THAKKAR
-
Patent number: 9906494Abstract: For a host that executes one or more guest virtual machines (GVMs), some embodiments provide a novel virtualization architecture for utilizing a firewall service virtual machine (SVM) on the host to check the packets sent by and/or received for the GVMs. In some embodiments, the GVMs connect to a software forwarding element (e.g., a software switch) that executes on the host to connect to each other and to other devices operating outside of the host. Instead of connecting the firewall SVM to the host's software forwarding element that connects its GVMs, the virtualization architecture of some embodiments provides an SVM interface (SVMI) through which the firewall SVM can be accessed to check the packets sent by and/or received for the GVMs.Type: GrantFiled: March 31, 2014Date of Patent: February 27, 2018Assignee: NICIRA, INC.Inventors: Chidambareswaran Raman, Subrahmanyam Manuguri, Todd Sabin
-
Patent number: 9807021Abstract: The disclosure herein describes an edge device of a network for distributed policy enforcement. During operation, the edge device receives an initial packet for an outgoing traffic flow, and identifies a policy being triggered by the initial packet. The edge device performs a reverse lookup to identify at least an intermediate node that is previously traversed by the initial packet and traffic parameters associated with the initial packet at the identified intermediate node. The edge device translates the policy based on the traffic parameters at the intermediate node, and forwards the translated policy to the intermediate node, thus facilitating the intermediate node in applying the policy to the traffic flow.Type: GrantFiled: December 14, 2015Date of Patent: October 31, 2017Assignee: VMware, Inc.Inventors: Jayant Jain, Anirban Sengupta, Debashis Basak, Serge Maskalik, Weiqing Wu, Aravind Srinivasan, Todd Sabin
-
Publication number: 20170060880Abstract: The technology described in this document can be embodied in a computer-implemented method that includes receiving identification information associated with a geographic location. The identification information includes one or more features that affect an acoustic environment of the geographic location at a particular time. The method also includes determining one or more parameters representing at least a subset of the one or more features, and estimating at least one acoustic parameter that represents the acoustic environment of the geographic location at the particular time. The at least one parameter can be estimated using a mapping function that generates the estimate of the at least one acoustic parameter as a weighted combination of the one or more parameters. The method further includes presenting, using a user-interface displayed on a computing device, information representing the at least one acoustic parameter estimated for the geographic location for the particular time.Type: ApplicationFiled: August 31, 2015Publication date: March 2, 2017Inventor: Andrew Todd Sabin
-
Patent number: 9503427Abstract: For a host that executes one or more guest virtual machines (GVMs), some embodiments provide a novel virtualization architecture for utilizing a firewall service virtual machine (SVM) on the host to check the packets sent by and/or received for the GVMs. In some embodiments, the GVMs connect to a software forwarding element (e.g., a software switch) that executes on the host to connect to each other and to other devices operating outside of the host. Instead of connecting the firewall SVM to the host's software forwarding element that connects its GVMs, the virtualization architecture of some embodiments provides an SVM interface (SVMI) through which the firewall SVM can be accessed to check the packets sent by and/or received for the GVMs.Type: GrantFiled: March 31, 2014Date of Patent: November 22, 2016Assignee: Nicira, Inc.Inventors: Chidambareswaran Raman, Subrahmanyam Manuguri, Todd Sabin
-
Publication number: 20160191396Abstract: The disclosure herein describes an edge device of a network for distributed policy enforcement. During operation, the edge device receives an initial packet for an outgoing traffic flow, and identifies a policy being triggered by the initial packet. The edge device performs a reverse lookup to identify at least an intermediate node that is previously traversed by the initial packet and traffic parameters associated with the initial packet at the identified intermediate node. The edge device translates the policy based on the traffic parameters at the intermediate node, and forwards the translated policy to the intermediate node, thus facilitating the intermediate node in applying the policy to the traffic flow.Type: ApplicationFiled: December 14, 2015Publication date: June 30, 2016Inventors: Jayant Jain, Anirban Sengupta, Debashis Basak, Serge Maskalik, Weiqing Wu, Aravind Srinivasan, Todd Sabin
-
Patent number: 9215177Abstract: The disclosure herein describes an edge device of a network for distributed policy enforcement. During operation, the edge device receives an initial packet for an outgoing traffic flow, and identifies a policy being triggered by the initial packet. The edge device performs a reverse lookup to identify at least an intermediate node that is previously traversed by the initial packet and traffic parameters associated with the initial packet at the identified intermediate node. The edge device translates the policy based on the traffic parameters at the intermediate node, and forwards the translated policy to the intermediate node, thus facilitating the intermediate node in applying the policy to the traffic flow.Type: GrantFiled: June 24, 2013Date of Patent: December 15, 2015Assignee: WMware, Inc.Inventors: Jayant Jain, Anirban Sengupta, Debashis Basak, Serge Maskalik, Weiqing Wu, Aravind Srinivasan, Todd Sabin
-
Patent number: 9215210Abstract: For a host that executes one or more guest virtual machines (GVMs), some embodiments provide a novel virtualization architecture for utilizing a firewall service virtual machine (SVM) on the host to check the packets sent by and/or received for the GVMs. In some embodiments, the GVMs connect to a software forwarding element (e.g., a software switch) that executes on the host to connect to each other and to other devices operating outside of the host. Instead of connecting the firewall SVM to the host's software forwarding element that connects its GVMs, the virtualization architecture of some embodiments provides an SVM interface (SVMI) through which the firewall SVM can be accessed to check the packets sent by and/or received for the GVMs.Type: GrantFiled: March 31, 2014Date of Patent: December 15, 2015Assignee: NICIRA, INC.Inventors: Chids Raman, Subrahmanyam Manuguri, Todd Sabin
-
Publication number: 20150281180Abstract: For a host that executes one or more guest virtual machines (GVMs), some embodiments provide a novel virtualization architecture for utilizing a firewall service virtual machine (SVM) on the host to check the packets sent by and/or received for the GVMs. In some embodiments, the GVMs connect to a software forwarding element (e.g., a software switch) that executes on the host to connect to each other and to other devices operating outside of the host. Instead of connecting the firewall SVM to the host's software forwarding element that connects its GVMs, the virtualization architecture of some embodiments provides an SVM interface (SVMI) through which the firewall SVM can be accessed to check the packets sent by and/or received for the GVMs.Type: ApplicationFiled: March 31, 2014Publication date: October 1, 2015Inventors: Chids Raman, Subrahmanyam Manuguri, Todd Sabin
-
Publication number: 20150281178Abstract: For a host that executes one or more guest virtual machines (GVMs), some embodiments provide a novel virtualization architecture for utilizing a firewall service virtual machine (SVM) on the host to check the packets sent by and/or received for the GVMs. In some embodiments, the GVMs connect to a software forwarding element (e.g., a software switch) that executes on the host to connect to each other and to other devices operating outside of the host. Instead of connecting the firewall SVM to the host's software forwarding element that connects its GVMs, the virtualization architecture of some embodiments provides an SVM interface (SVMI) through which the firewall SVM can be accessed to check the packets sent by and/or received for the GVMs.Type: ApplicationFiled: March 31, 2014Publication date: October 1, 2015Inventors: Chids Raman, Subrahmanyam Manuguri, Todd Sabin
-
Publication number: 20150281179Abstract: For a host that executes one or more guest virtual machines (GVMs), some embodiments provide a novel virtualization architecture for utilizing a firewall service virtual machine (SVM) on the host to check the packets sent by and/or received for the GVMs. In some embodiments, the GVMs connect to a software forwarding element (e.g., a software switch) that executes on the host to connect to each other and to other devices operating outside of the host. Instead of connecting the firewall SVM to the host's software forwarding element that connects its GVMs, the virtualization architecture of some embodiments provides an SVM interface (SVMI) through which the firewall SVM can be accessed to check the packets sent by and/or received for the GVMs.Type: ApplicationFiled: March 31, 2014Publication date: October 1, 2015Inventors: Chids Raman, Subrahmanyam Manuguri, Todd Sabin
-
Publication number: 20150096007Abstract: Systems and techniques are described for monitoring network communications using a distributed firewall. One of the techniques includes receiving, at a driver executing in a guest operating system of a virtual machine, a request to open a network connection from a process associated with a user, wherein the driver performs operations comprising: obtaining identity information for the user; providing the identity information and data identifying the network connection to an identity module external to the driver; and receiving, by a distributed firewall, data associating the identity information with the data identifying the network connection from the identity module, wherein the distributed firewall performs operations comprising: receiving an outgoing packet from the virtual machine; determining that the identity information corresponds to the outgoing packet; and evaluating one or more routing rules based at least in part on the identity information.Type: ApplicationFiled: October 1, 2013Publication date: April 2, 2015Applicant: VMware, Inc.Inventors: Anirban Sengupta, Subrahmanyam Manuguri, Mitchell T. Christensen, Azeem Feroz, Todd Sabin
-
Publication number: 20140376367Abstract: The disclosure herein describes an edge device of a network for distributed policy enforcement. During operation, the edge device receives an initial packet for an outgoing traffic flow, and identifies a policy being triggered by the initial packet. The edge device performs a reverse lookup to identify at least an intermediate node that is previously traversed by the initial packet and traffic parameters associated with the initial packet at the identified intermediate node. The edge device translates the policy based on the traffic parameters at the intermediate node, and forwards the translated policy to the intermediate node, thus facilitating the intermediate node in applying the policy to the traffic flow.Type: ApplicationFiled: June 24, 2013Publication date: December 25, 2014Inventors: Jayant Jain, Anirban Sengupta, Debashis Basak, Serge Maskalik, Weiqing Wu, Aravind Srinivasan, Todd Sabin
-
Patent number: 8565908Abstract: Systems, methods, and apparatus are provided for equalization preference learning for digital audio modification. A method for listener calibration of an audio signal includes modifying a reference sound using at least one equalization curve; playing the modified reference sound for a listener; accepting listener feedback regarding the modified reference sound; and generating a weighting function based on listener feedback. A listener audio configuration system includes an output providing a sound for listener review; an interface accepting listener feedback regarding the sound; and a processor programming an audio device based on listener feedback.Type: GrantFiled: July 29, 2010Date of Patent: October 22, 2013Assignee: Northwestern UniversityInventors: Andrew Todd Sabin, Bryan A. Pardo