Techniques for network replication
First Claim
Patent Images
1. A computer-implemented method for network duplication, comprising:
- under the control of one or more computer systems configured with executable instructions,operating a first network based at least in part on instructions provided remotely by a customer, the first network including a plurality of virtual network devices in a configuration that overlays one or more physical networks, the first network including one or more devices selected from the group consisting of servers, storage volumes, switches, hubs, firewalls, bridges, and gateways;
receiving, from the customer, a web service request to duplicate the first network;
responsive to the web service request;
retrieving configuration information about the first network from a data store;
generating a network duplication plan from the retrieved configuration information;
creating, according to the network duplication plan, a plurality of virtual duplicate devices, each of the virtual duplicate devices corresponding to a device of the first network;
configuring, according to the network duplication plan, the created virtual duplicate devices in a duplicate network that overlays the one or more physical networks in a manner similar to the manner in which the first network overlays the one or more physical networks; and
operating the duplicate network based at least in part on instructions provided remotely by the customer.
1 Assignment
0 Petitions
Accused Products
Abstract
In response to a request to duplicate a network, the network is duplicated. The duplicate network includes one or more virtual devices that correspond to one or more devices in the network being duplicated. The devices of the duplicate network are communicatively arranged in a manner consistent with a topology of the network being duplicated. Once the duplicate network is created, access to the duplicate network is provided.
-
Citations
27 Claims
-
1. A computer-implemented method for network duplication, comprising:
-
under the control of one or more computer systems configured with executable instructions, operating a first network based at least in part on instructions provided remotely by a customer, the first network including a plurality of virtual network devices in a configuration that overlays one or more physical networks, the first network including one or more devices selected from the group consisting of servers, storage volumes, switches, hubs, firewalls, bridges, and gateways; receiving, from the customer, a web service request to duplicate the first network; responsive to the web service request; retrieving configuration information about the first network from a data store; generating a network duplication plan from the retrieved configuration information; creating, according to the network duplication plan, a plurality of virtual duplicate devices, each of the virtual duplicate devices corresponding to a device of the first network; configuring, according to the network duplication plan, the created virtual duplicate devices in a duplicate network that overlays the one or more physical networks in a manner similar to the manner in which the first network overlays the one or more physical networks; and operating the duplicate network based at least in part on instructions provided remotely by the customer. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A computer-implemented method for network duplication, comprising:
under the control of one or more computer systems configured with executable instructions, receiving a request to duplicate a first network that includes one or more virtual devices and that overlays one or more physical networks, the first network including one or more devices selected from the group consisting of servers, storage volumes, switches, hubs, firewalls, bridges, and gateways; responsive to receipt of the request, creating a plurality of virtual duplicate devices each corresponding to a device in the first network and arranging the created virtual duplicate devices in a duplicate network to overlay the one or more physical networks in a manner similar to the manner in which the first network overlays the one or more physical networks; and providing access to the duplicate network. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13)
-
14. One or more non-transitory computer-readable storage media having collectively stored thereon instructions that, when executed by one or more computer systems, cause the one or more computer systems to collectively at least:
-
receive a request to duplicate a first network that includes one or more virtual devices and that overlays one or more physical networks, the first network including one or more devices selected from the group consisting of servers, storage volumes, switches, hubs, firewalls, bridges, and gateways; responsive to receipt of the request, create a duplicate network that overlays the one or more physical networks with a topology consistent with the first network and that includes one or more virtual duplicate devices that each correspond to one of the one or more virtual devices of the first network; and provide access to the duplicate network. - View Dependent Claims (15, 16, 17, 18)
-
-
19. A computer system operable to duplicate networks, comprising:
-
one or more processors; and memory, including executable instructions that, when executed by the one or more processors, cause the computer system to at least; receive a request to duplicate a first network that includes one or more virtual devices and that overlays one or more physical networks, the first network including one or more devices selected from the group consisting of servers, storage volumes, switches, hubs, firewalls, bridges, and gateways; responsive to receipt of the request, create a plurality of virtual duplicate devices each corresponding to a device in the first network and arranging the created devices in a virtual duplicate network to overlay the one or more physical networks in a manner similar to the manner in which the first network overlays the one or more physical networks; and provide access to the duplicate network. - View Dependent Claims (20, 21, 22)
-
-
23. A computer-implemented method of network duplication, comprising:
under the control of one or more computer systems configured with executable instructions, receiving a request to duplicate a first network that overlays one or more physical networks, the first network including one or more devices selected from the group consisting of servers, storage volumes, switches, hubs, firewalls, bridges, and gateways; and responsive to receipt of the request; creating a plurality of virtual devices and configuring the plurality of devices in a virtual network such that the plurality of virtual devices are communicatively connected with one another in a manner so as to overlay the one or more physical networks in a manner similar to the manner in which the first network overlays the one or more physical networks, the plurality of devices including one or more virtual devices that correspond to one or more devices of the first network. - View Dependent Claims (24, 25, 26, 27)
Specification