Ingress rate limiting
First Claim
Patent Images
1. A network device comprising:
- a controller for connection in a computer, the computer including a plurality of virtual machines, with each of the plurality of virtual machines having a maximum incoming data rate, the controller configured to detect data traffic received at an ingress port of the controller and directed to each of the plurality of virtual machines exceeding the maximum incoming data rate for each of the plurality of virtual machines, wherein the maximum incoming data rate is less than a data traffic capacity of the ingress port of the controller and the controller is further configured to provide a signal to at least one source of the data traffic directed to a given virtual machine of the plurality of virtual machines to reduce the data output of the at least one source to the virtual machine, responsive to detecting the data traffic received at the ingress port of the controller exceeding the maximum incoming data rate for the given virtual machine.
3 Assignments
0 Petitions
Accused Products
Abstract
A network device monitors the traffic of individual flows through one of its ingress ports and, if the traffic volume exceeds a predetermined threshold, signals for a reduction in data traffic volume transmitted to that ingress port from one or more source devices. Example signals may include without limitation a unicast congestion message sent to the source of a flow, an Explicit Congestion Notification to one or more source devices, and the dropping of packets by the receiving device. In response to such signals, one or more of the source devices decrease the transmission rate of data traffic to the receiving device.
-
Citations
18 Claims
-
1. A network device comprising:
a controller for connection in a computer, the computer including a plurality of virtual machines, with each of the plurality of virtual machines having a maximum incoming data rate, the controller configured to detect data traffic received at an ingress port of the controller and directed to each of the plurality of virtual machines exceeding the maximum incoming data rate for each of the plurality of virtual machines, wherein the maximum incoming data rate is less than a data traffic capacity of the ingress port of the controller and the controller is further configured to provide a signal to at least one source of the data traffic directed to a given virtual machine of the plurality of virtual machines to reduce the data output of the at least one source to the virtual machine, responsive to detecting the data traffic received at the ingress port of the controller exceeding the maximum incoming data rate for the given virtual machine. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
11. One or more non-transitory processor-readable storage media encoding processor-executable instructions for executing in a processor a computer process comprising:
-
detecting data traffic received at an ingress port of a controller and directed to each of a plurality of virtual machines coupled to the controller exceeding a maximum incoming data rate of a given one of the plurality of virtual machines, wherein the maximum incoming data rate is less than a data traffic capacity of the ingress port of the controller; and signaling at least one source of the data traffic directed to each of the given virtual machines to reduce the data output of the at least one source to each of the given virtual machines, responsive to the detecting operation. - View Dependent Claims (12, 13, 14)
-
-
15. A method comprising:
-
detecting data traffic received at an ingress port of a controller and directed to each virtual machine of a plurality of virtual machines coupled to the controller exceeding a maximum incoming data rate of a given one of the plurality of virtual machines, wherein the maximum incoming data rate is less than a data traffic capacity of the ingress port of the controller; and signaling at least one source of the data traffic directed to each of the given virtual machines to reduce data output of the at least one source to each of the given virtual machines, responsive to the detecting operation. - View Dependent Claims (16, 17, 18)
-
Specification