METHOD AND SYSTEM FOR MIGRATION OF VIRTUAL MACHINES AND VIRTUAL APPLICATIONS BETWEEN CLOUD-COMPUTING FACILITIES THROUGH MULTIPLEXED SECURE TUNNELS
First Claim
1. A cloud-connector subsystem that provides a stretch-deploy operation for moving one or more virtual machines and virtual applications between cloud-computing facilities, the cloud-connector subsystem comprising:
- cloud-connector nodes associated with each of a source and a target cloud-computing facility; and
a cloud-connector server that includes one or more processors, one or more memories, one or more data-storage devices, and computer instructions that, when executed on the one or more processors, control the cloud-connector server to provide, in cooperation with the cloud-connector nodes, a stretch-deploy operation thatextends a first local virtual network within the source cloud-computing facility to the target cloud-computing facility through a secure tunnel that supports multiple extended virtual networks, forming an extended local virtual network; and
moves one or more virtual machines and virtual applications from executing on the source cloud-computing facility and communicating with other computational entities through the local virtual network using one or more network addresses to executing on the target cloud-computing facility and communicating with other computational entities through the extended local virtual network using the same one or more network addresses.
2 Assignments
0 Petitions
Accused Products
Abstract
The current document discloses methods and systems for extending an internal network within a first cloud-computing facility to a second cloud-computing facility and deploying a virtual machine or virtual application previously running on a first cloud-computing facility within the context of the extended internal network in the second cloud-computing facility. The currently disclosed methods and systems which provide internal-network extension and redeployment of virtual machines and virtual applications, referred to as “stretch deploy,” allow a virtual machine or virtual application formerly executing on a first cloud-computing facility to resume execution on a second cloud-computing facility, using the computational and storage facilities of the second cloud-computing facility but depending on network support from the first cloud-computing facility, without changing IP and local network addresses and the network connectivity, based on those addresses, between the virtual machines and virtual applications and other local and remote computational entities with which the virtual machines and virtual applications communicate. Multiplexing multiple stretch deployed L2 networks over the same secure (SSL-VPN) tunnel, terminating on organization edges.
64 Citations
20 Claims
-
1. A cloud-connector subsystem that provides a stretch-deploy operation for moving one or more virtual machines and virtual applications between cloud-computing facilities, the cloud-connector subsystem comprising:
-
cloud-connector nodes associated with each of a source and a target cloud-computing facility; and a cloud-connector server that includes one or more processors, one or more memories, one or more data-storage devices, and computer instructions that, when executed on the one or more processors, control the cloud-connector server to provide, in cooperation with the cloud-connector nodes, a stretch-deploy operation that extends a first local virtual network within the source cloud-computing facility to the target cloud-computing facility through a secure tunnel that supports multiple extended virtual networks, forming an extended local virtual network; and moves one or more virtual machines and virtual applications from executing on the source cloud-computing facility and communicating with other computational entities through the local virtual network using one or more network addresses to executing on the target cloud-computing facility and communicating with other computational entities through the extended local virtual network using the same one or more network addresses. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 11)
-
-
10. A method that relocates one or more virtual machines and virtual applications connected to a first virtual network within a source cloud-computing facility to a target cloud-computing facility, the method comprising:
-
extending one or more virtual networks to the target cloud-computing facility through a single secure tunnel; and moving the one or more virtual machines and virtual applications from the source cloud-computing facility to the target cloud-computing facility, where the one or more virtual machines and virtual applications are connected to the extended first virtual network and use the same local and global network addresses used in the source cloud-computing facility. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
-
19. Computer instructions stored within a physical data-storage device that, when executed on one or more processors within a cloud-connector subsystem, control the cloud-connector subsystem to relocate one or more virtual machines and virtual applications connected to a first virtual network within a source cloud-computing facility to a target cloud-computing facility by:
-
extending a virtual network to the target cloud-computing facility through an already established secure tunnel, resulting in multiple virtual networks extended through the already established secure tunnel; and moving the one or more virtual machines and virtual applications from the source cloud-computing facility to the target cloud-computing facility, where the one or more virtual machines and virtual applications are connected to the extended virtual network and use the same local and global network addresses used in the source cloud-computing facility. - View Dependent Claims (20)
-
Specification