Techniques for network replication
First Claim
Patent Images
1. A computer-implemented method for network duplication, comprising:
- under the control of one or more computer systems configured with executable instructions,receiving a request to duplicate a first network that includes one or more virtual devices and that overlays one or more physical networks, the request having one or more parameters that each specifies a condition for how closely a duplicate network should match the first network, the first network including one or more of storage volumes, switches, hubs, firewalls, bridges, or gateways;
processing the request to create the duplicate network by creating, in accordance with the one or more parameters, a plurality of virtual duplicate devices each corresponding to a device in the first network and arranging the created virtual duplicate devices in the duplicate network to overlay the one or more physical networks in accordance with a manner in which the first network overlays the one or more physical networks; and
providing access to the duplicate network.
1 Assignment
0 Petitions
Accused Products
Abstract
A request to copy at least a portion of a first network that includes a first set of devices is received, the request including one or more filtering criteria, with at least one of the one or more filtering criteria specifying a tag assigned to a device of the first set of devices. At least the portion of the first network is copied by causing the system to create, according to the one or more filtering criteria, a second network by causing a second set of devices to be configured to be duplicative of devices of the first set of devices that are assigned the tag specified by the filtering criteria.
35 Citations
20 Claims
-
1. A computer-implemented method for network duplication, comprising:
under the control of one or more computer systems configured with executable instructions, receiving a request to duplicate a first network that includes one or more virtual devices and that overlays one or more physical networks, the request having one or more parameters that each specifies a condition for how closely a duplicate network should match the first network, the first network including one or more of storage volumes, switches, hubs, firewalls, bridges, or gateways; processing the request to create the duplicate network by creating, in accordance with the one or more parameters, a plurality of virtual duplicate devices each corresponding to a device in the first network and arranging the created virtual duplicate devices in the duplicate network to overlay the one or more physical networks in accordance with a manner in which the first network overlays the one or more physical networks; and providing access to the duplicate network. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
8. A system, comprising:
-
one or more processors; and memory including instructions that, when executed by the one or more processors, cause the system to; provide an interface configured to receive a request to duplicate a first network that includes a plurality of devices, the request having one or more parameters each specifying a manner in which a duplicate network is to match the first network, the first network including one or more of storage volumes, switches, hubs, firewalls, bridges, or gateways; and process the request to create the duplicate network by causing to be configured, according to the one or more parameters, a plurality of duplicate devices each corresponding to a device in the first network. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable storage medium having stored thereon instructions that, when executed by one or more processors of a system, cause the system to:
process a request to duplicate a first network that includes a plurality of devices, by at least; selecting a set of the plurality of devices based at least in part on one or more parameters of the request each specifying a manner in which a duplicate network is to match the first network, the first network including one or more of storage volumes, switches, hubs, firewalls, bridges, or gateways; and causing the duplicate network to be configured according to the one or more parameters such that the duplicate network includes a plurality of duplicate devices each corresponding to a device in the selected set. - View Dependent Claims (16, 17, 18, 19, 20)
Specification