Transpose box based network scaling

    公开(公告)号:US09330052B2

    公开(公告)日:2016-05-03

    申请号:US13963965

    申请日:2013-08-09

    CPC classification number: G06F15/173 H04L12/4625 H04L49/45

    Abstract: The deployment and scaling of a network of electronic devices can be improved by utilizing one or more network transpose boxes. Each transpose box can include a number of connectors and a meshing useful for implementing a specific network topology. When connecting devices of different tiers in the network, each device need only be connected to at least one of the connectors on the transpose box. The meshing of the transpose box can cause each device to be connected to any or all of the devices in the other tier as dictated by the network topology. When changing network topologies or scaling the network, additional devices can be added to available connectors on an existing transpose box, or new or additional transpose boxes can be deployed in order to handle the change with minimal cabling effort.

    AUTHORIZING COMMUNICATIONS BETWEEN COMPUTING NODES

    公开(公告)号:US20130205042A1

    公开(公告)日:2013-08-08

    申请号:US13829578

    申请日:2013-03-14

    Inventor: Daniel T. Cohn

    Abstract: Techniques are described for managing communications between multiple computing nodes, such as computing nodes that are separated by one or more physical networks. In some situations, the techniques may be used to provide a virtual network between multiple computing nodes that are separated by one or more intermediate physical networks, such as from the edge of the one or more intermediate physical networks by modifying communications that enter and/or leave the intermediate physical networks. In some situations, the computing nodes may include virtual machine nodes hosted on one or more physical computing machines or systems, such as by or on behalf of one or more users (e.g., users of a program execution service). The managing of the communications may include determining whether communications sent to managed computing nodes are authorized, and providing the communications to the computing nodes only if they are determined to be authorized.

    AUTHORIZING COMMUNICATIONS BETWEEN COMPUTING NODES

    公开(公告)号:US20130132577A1

    公开(公告)日:2013-05-23

    申请号:US13691497

    申请日:2012-11-30

    Inventor: Daniel T. Cohn

    Abstract: Techniques are described for managing communications between multiple computing nodes, such as computing nodes that are separated by one or more physical networks. In some situations, the techniques may be used to provide a virtual network between multiple computing nodes that are separated by one or more intermediate physical networks, such as from the edge of the one or more intermediate physical networks by modifying communications that enter and/or leave the intermediate physical networks. In some situations, the computing nodes may include virtual machine nodes hosted on one or more physical computing machines or systems, such as by or on behalf of one or more users (e.g., users of a program execution service). The managing of the communications may include determining whether communications sent to managed computing nodes are authorized, and providing the communications to the computing nodes only if they are determined to be authorized.

    System to manage satellite communications

    公开(公告)号:US11546049B1

    公开(公告)日:2023-01-03

    申请号:US16934577

    申请日:2020-07-21

    Abstract: Satellites provide communication between devices such as user terminals (UTs) and ground stations that are in turn connected to points-of-presence (PoP) that connect to other networks, such as the Internet. Many factors affect latency for data passing between the PoP and the UT. The PoP accepts downstream data addressed to the UT and determines a target delivery window (TDW) indicating a window of time within which the downstream data is expected to be delivered. Communication resources are allocated to the downstream data based on the TDW. At subsequent points, such as at the ground station, the TDW is assessed to determine whether to continue sending the downstream data or to use a different communication resource. For example, a first ground station will forward the downstream data to a second ground station if the uplink will not be able to deliver the downstream data before expiration of the TDW.

    Methods and apparatus for Internet-scale routing using small-scale border routers
    27.
    发明授权
    Methods and apparatus for Internet-scale routing using small-scale border routers 有权
    使用小规模边界路由器进行Internet规模路由的方法和装置

    公开(公告)号:US09497115B1

    公开(公告)日:2016-11-15

    申请号:US14106509

    申请日:2013-12-13

    CPC classification number: H04L45/54 H04L12/4633 H04L41/12 H04L45/58 H04L69/16

    Abstract: Methods and apparatus for Internet-scale routing using small-scale border routers and IP tunneling are described. Each border router is directly connected to a transit provider. Routing protocol peerings may be passed via the border routers through tunnels to a routing service; the routing service and the transit provider router(s) appear to be directly adjacent routing peers. The routing service receives routing data from the transit provider(s), maintains the routing data in a routing table, and processes the routing data in the routing table to select best paths. A mapping service may be informed, by the routing service, of a best exit point (or points) for each Internet prefix of each packet to be routed on the Internet. Outbound packets from devices on the network to the Internet, and inbound packets from the Internet to the network devices, may be encapsulated and passed through tunnels as directed by the mapping service.

    Abstract translation: 描述了使用小规模边界路由器和IP隧道进行Internet规模路由的方法和装置。 每个边界路由器都直接连接到中转服务提供商。 路由协议对等体可以经由边界路由器通过隧道传递到路由服务; 路由服务和中转提供商路由器似乎是直接相邻的路由对等体。 路由服务从转接提供商接收路由数据,将路由数据维护在路由表中,并处理路由表中的路由数据以选择最佳路径。 路由服务可以向映射服务通知要在因特网上路由的每个分组的每个因特网前缀的最佳出口点(或点)。 从网络设备到互联网的出站数据包,以及从互联网到网络设备的入站数据包,可以按照映射服务的指示封装并通过隧道。

    LOGICAL SWITCHES
    28.
    发明申请
    LOGICAL SWITCHES 审中-公开
    逻辑开关

    公开(公告)号:US20160277320A1

    公开(公告)日:2016-09-22

    申请号:US15170699

    申请日:2016-06-01

    Abstract: The deployment and scaling of a network of electronic devices can be improved by utilizing one or more network transpose boxes. Each transpose box can include a number of connectors and a meshing useful for implementing a specific network topology. Different tiers of a network can be connected to one or more of the network transpose boxes, and operated as a logical switch. A control server can be used to manage the control plane operations of the logical switch.

    Abstract translation: 可以通过利用一个或多个网络转置盒来改进电子设备网络的部署和缩放。 每个转置盒可以包括多个连接器和用于实现特定网络拓扑的网格。 网络的不同层可以连接到一个或多个网络转置盒,并且作为逻辑开关来操作。 控制服务器可用于管理逻辑交换机的控制平面操作。

    PROVIDING LOCAL SECURE NETWORK ACCESS TO REMOTE SERVICES
    29.
    发明申请
    PROVIDING LOCAL SECURE NETWORK ACCESS TO REMOTE SERVICES 审中-公开
    提供本地安全网络访问远程服务

    公开(公告)号:US20160006610A1

    公开(公告)日:2016-01-07

    申请号:US14853608

    申请日:2015-09-14

    Abstract: Techniques are described for providing users with access to computer networks, such as to enable users to create computer networks that are provided by a remote configurable network service for use by the users. Such provided computer networks may be configured to be private computer networks accessible only by the users who create them, and may each be created and configured by a client of the configurable network service to be an extension to an existing computer network of the client, such as a private computer network extension to an existing private computer network of the client. In addition, access to remote resource services may be configured and provided from such computer networks in various manners, such as to include a local access mechanism as part of a provided computer network that is configured to forward communications sent to the access mechanism to a particular remote resource service.

    Abstract translation: 描述了为用户提供对计算机网络的访问的技术,例如使得用户能够创建由远程可配置网络服务提供以供用户使用的计算机网络。 这样提供的计算机网络可以被配置为仅由创建它们的用户可访问的专用计算机网络,并且每个可以由可配置网络服务的客户端创建和配置为可扩展到客户端的现有计算机网络,例如 作为私人计算机网络扩展到客户端的现有专用计算机网络。 此外,可以以各种方式从这样的计算机网络配置和提供对远程资源服务的访问,例如包括作为所提供的计算机网络的一部分的本地访问机制,其被配置为将发送到访问机制的通信转发到特定的 远程资源服务。

    PROVIDING ACCESS TO CONFIGURABLE PRIVATE COMPUTER NETWORKS
    30.
    发明申请
    PROVIDING ACCESS TO CONFIGURABLE PRIVATE COMPUTER NETWORKS 审中-公开
    提供访问可配置的私有计算机网络

    公开(公告)号:US20140047082A1

    公开(公告)日:2014-02-13

    申请号:US14059236

    申请日:2013-10-21

    CPC classification number: H04L41/0803 H04L12/4641 H04L45/586 H04L63/0272

    Abstract: Techniques are described for providing users with access to computer networks, such as to enable users to interact with a remote configurable network service in order to create and configure computer networks that are provided by the configurable network service for use by the users. Computer networks provided by the configurable network service may be configured to be private computer networks that are accessible only by the users who create them, and may each be created and configured by a client of the configurable network service to be an extension to an existing computer network of the client, such as a private computer network extension to an existing private computer network of the client. If so, secure private access between an existing computer network and new computer network extension that is being provided may be enabled using one or more VPN connections or other private access mechanisms.

    Abstract translation: 描述了为用户提供对计算机网络的访问的技术,例如使用户能够与远程可配置网络服务进行交互,以便创建和配置由可配置网络服务提供以供用户使用的计算机网络。 由可配置网络服务提供的计算机网络可以被配置为只能由创建它们的用户访问的专用计算机网络,并且每个可以由可配置网络服务的客户端创建和配置成为现有计算机的扩展 客户端的网络,如私有计算机网络扩展到客户端的现有专用计算机网络。 如果是这样,可以使用一个或多个VPN连接或其他私人访问机制来启用现有计算机网络和正在提供的新的计算机网络分机之间的安全私人访问。

Patent Agency Ranking