JP2003318949A - Vpn system and router - Google Patents

Vpn system and router

Info

Publication number
JP2003318949A
JP2003318949A JP2002118109A JP2002118109A JP2003318949A JP 2003318949 A JP2003318949 A JP 2003318949A JP 2002118109 A JP2002118109 A JP 2002118109A JP 2002118109 A JP2002118109 A JP 2002118109A JP 2003318949 A JP2003318949 A JP 2003318949A
Authority
JP
Japan
Prior art keywords
vpn
router
function
request
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
JP2002118109A
Other languages
Japanese (ja)
Other versions
JP3904968B2 (en
Inventor
Naoaki Yamanaka
直明 山中
Satoshi Okamoto
岡本  聡
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nippon Telegraph and Telephone Corp
Original Assignee
Nippon Telegraph and Telephone Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nippon Telegraph and Telephone Corp filed Critical Nippon Telegraph and Telephone Corp
Priority to JP2002118109A priority Critical patent/JP3904968B2/en
Publication of JP2003318949A publication Critical patent/JP2003318949A/en
Application granted granted Critical
Publication of JP3904968B2 publication Critical patent/JP3904968B2/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Abstract

<P>PROBLEM TO BE SOLVED: To provide a VPN (Virtual Private Network) system and a router wherein a VPN manager immediately revises a topology and a band of a VPN in a network of a network provider. <P>SOLUTION: A router is provided to a route in an IP network configuring the VPN, and a means for managing the IP network and a means for managing the VPN can make settings to the router on the basis of information including a network topology and a transmission band with respect to the VPN and collect management information including communication traffic information and fault information from the router. <P>COPYRIGHT: (C)2004,JPO

Description

【発明の詳細な説明】Detailed Description of the Invention

【0001】[0001]

【発明の属する技術分野】本発明はVPN(Virtual Pri
vate Network)およびそれを構成するルータに関する。
TECHNICAL FIELD The present invention relates to a VPN (Virtual Principle).
vate Network) and the routers that make it up.

【0002】[0002]

【従来の技術】VPNは、公衆ネットワークを利用しな
がら、あたかもプライベートにネットワークを利用して
いるような環境をユーザに提供するサービスである。従
来の技術では、図5に示すように、ユーザが拠点20と
拠点23との間でVPNを構成する場合に、拠点20と
拠点23との間に専用線24をネットワークプロバイダ
から借りて接続しVPNを構成するのが一般的である。
この場合に、専用線24は、IPネットワーク1に設置
されたルータ21および22によって設定される。ま
た、ルータ21および22は、IPネットワーク1を管
理するネットワークプロバイダの管理システム2によっ
て設定が行われる。
2. Description of the Related Art VPN is a service that provides users with an environment as if they were using the network privately while using the public network. In the conventional technology, as shown in FIG. 5, when a user configures a VPN between the bases 20 and 23, a dedicated line 24 is connected between the bases 20 and 23 by borrowing from a network provider. It is common to configure a VPN.
In this case, the private line 24 is set by the routers 21 and 22 installed in the IP network 1. The routers 21 and 22 are set by the management system 2 of the network provider that manages the IP network 1.

【0003】[0003]

【発明が解決しようとする課題】しかし、このような従
来のVPNでは、VPNのトポロジの変更や帯域の変更
を行う場合は、VPN側からネットワークプロバイダの
ネットワークを制御できないため、ネットワークプロバ
イダに申し込み、このネットワークプロバイダの管理シ
ステムから変更を行う必要があり、即応性に欠けるとい
う問題がある。
However, in such a conventional VPN, when changing the topology or bandwidth of the VPN, the VPN side cannot control the network of the network provider, so an application is made to the network provider. Since it is necessary to make changes from the management system of this network provider, there is a problem of lack of responsiveness.

【0004】本発明は、このような背景に行われたもの
であって、VPN管理者が、ネットワークプロバイダの
ネットワーク内でVPNのトポロジの変更や帯域の変更
を即時に行うことができ、さらに、専用線の効率的な運
用により実質的に使用した分のみの専用線料金とするこ
とができ、ネットワークプロバイダは、ネットワーク全
体のリソースが有効に使用されるので、設備投資効果が
大きく、また、1つのルータをVPN毎の別ルータとし
て見せることによりルータを効率よく運用することがで
きるVPNシステムおよびルータおよびプログラムおよ
び記録媒体を提供することを目的とする。
The present invention has been made against such a background, and the VPN administrator can immediately change the topology or bandwidth of the VPN within the network of the network provider, and further, Due to the efficient operation of the leased line, the leased line fee can be used only for what is substantially used, and the network provider can effectively use the resources of the entire network. An object of the present invention is to provide a VPN system, a router, a program, and a recording medium capable of efficiently operating the router by making one router appear as a different router for each VPN.

【0005】[0005]

【課題を解決するための手段】本発明は、1つまたは複
数のネットワークプロバイダのIPネットワークを用い
て構成する1つまたは複数のVPNにおいて、このVP
Nを構成する前記IPネットワーク内のルートにルータ
を設け、このルータに対して前記IPネットワークを管
理する手段とともに前記VPNを管理する手段からも前
記VPNに関するネットワークトポロジおよび伝送帯域
を含む情報に基づく設定および通信トラヒック情報およ
び障害情報を含む管理情報収集を可能とすることを特徴
とする。
SUMMARY OF THE INVENTION The present invention resides in one or more VPNs configured with an IP network of one or more network providers.
A router is provided at a route in the IP network that constitutes N, and a setting based on information including a network topology and a transmission band related to the VPN is also provided from the means for managing the IP network to the router and the means for managing the VPN. It is also characterized by enabling management information collection including communication traffic information and failure information.

【0006】このように、IPネットワークを管理する
手段とともにVPNを管理する手段からも前記管理情報
収集を行い、当該VPNを管理する手段において、前記
IPネットワークを管理する手段とは関わり無く、ユー
ザからの設定変更リクエストに対して当該リクエストに
対応可能か否かを収集した前記管理情報から即座に判断
することができる。そして、この判断により、当該リク
エストに対応可能である場合には、VPNを管理する手
段は、即座に当該リクエストに対応してルータの設定を
変更することができる。
As described above, the management information is collected not only from the means for managing the IP network but also the means for managing the VPN, and the means for managing the VPN does not depend on the means for managing the IP network, With respect to the setting change request, it is possible to immediately judge whether or not the request can be dealt with from the management information collected. Then, if it is possible to respond to the request by this determination, the means for managing the VPN can immediately change the setting of the router in response to the request.

【0007】このように、VPNを管理する手段が独自
にリクエストに対応できることにより、ユーザからの設
定変更リクエストを即座に実現することができる。IP
ネットワークを管理する手段は、VPNを管理する手段
だけでは対応しきれないリクエストが発生した場合につ
いてだけサポートを行うようにVPNシステムを構成す
ればよい。
As described above, since the means for managing the VPN can independently handle the request, the setting change request from the user can be immediately realized. IP
As a means for managing the network, the VPN system may be configured so as to support only when a request that cannot be handled by the means for managing the VPN is generated.

【0008】また、1つまたは複数のVPNで使用する
IPネットワークのVPNを構成するルートに設けたル
ータにおいて、1つまたは複数のIPアドレスを持た
せ、この1つまたは複数のIPアドレスの個々を前記V
PNの個々に対応させ、1つまたは複数の入出力ポート
を前記VPNの個々に対応させて割付け、前記VPN個
々の管理システムから前記VPN個々に対応した前記I
Pアドレスを用いて前記VPN個々に関する設定および
管理情報収集を行うことを特徴とする。
[0008] In addition, a router provided at a route which constitutes a VPN of an IP network used by one or more VPNs is provided with one or more IP addresses, and each of the one or more IP addresses is assigned. The V
Each I / O port is assigned to each VPN, and one or a plurality of input / output ports are assigned to each VPN.
It is characterized in that the P address is used to perform setting and management information collection for each VPN.

【0009】これにより、1つの実際のルータを複数の
仮想的なルータとして機能させることができる。この仮
想的なルータは、実際のルータの能力を超えない範囲内
で、状況に応じて入出力ポート数を増減させたり、処理
能力を増減させることが可能であり、これによっても前
記リクエストに即座に対応することを容易にする。
As a result, one actual router can function as a plurality of virtual routers. This virtual router can increase / decrease the number of input / output ports or increase / decrease the processing capacity according to the situation within the range that does not exceed the capacity of the actual router. Make it easy to meet.

【0010】このようにして、VPN管理者が、ネット
ワークプロバイダのネットワーク内でVPNのトポロジ
の変更や帯域の変更を即時に行うことができ、さらに、
専用線の効率的な運用により実質的に使用した分のみの
専用線料金とすることができ、ネットワークプロバイダ
は、ネットワーク全体のリソースが有効に使用されるの
で、設備投資効果が大きく、また、1つのルータをVP
N毎の別ルータとして見せることによりルータを効率よ
く運用することができる。
In this way, the VPN administrator can immediately change the topology of the VPN or change the bandwidth within the network of the network provider.
Due to the efficient operation of the leased line, the leased line fee can be used only for what is substantially used, and the network provider can effectively use the resources of the entire network. One router to VP
The router can be operated efficiently by making it appear as a separate router for each N.

【0011】すなわち、本発明の第一の観点は、複数の
拠点と、ルータとを備え、このルータは、前記複数の拠
点間にVPNを構成するための専用線を設定する手段を
備えたVPNシステムである。
That is, a first aspect of the present invention comprises a plurality of bases and a router, and the router is provided with a means for setting a dedicated line for forming a VPN between the plurality of bases. System.

【0012】ここで、本発明の特徴とするところは、前
記VPNを管理する手段が設けられ、この管理する手段
は、当該VPNに関する通信トラヒック情報および障害
情報を含む管理情報を前記ルータから収集する手段と、
前記拠点からの当該VPNのネットワークトポロジおよ
び伝送帯域の変更のリクエストを受け付ける手段と、こ
の受け付ける手段が受け付けたリクエストに対応可能か
否かを前記収集する手段により収集した前記管理情報に
基づき判断する手段と、この判断する手段により当該リ
クエストに対応可能と判断されたときには、当該リクエ
ストに基づく当該VPNのネットワークトポロジおよび
伝送帯域を前記ルータに対して設定する手段とを備えた
ところにある。
Here, a feature of the present invention is that means for managing the VPN is provided, and this managing means collects management information including communication traffic information and failure information regarding the VPN from the router. Means and
Means for accepting a request for changing the network topology and transmission band of the VPN from the base, and means for judging whether or not the request accepted by the accepting means can be handled based on the management information collected by the collecting means And a means for setting the network topology and transmission band of the VPN based on the request to the router when the request is determined to be compatible with the request.

【0013】前記ルータには、N(Nは自然数)個のI
Pアドレスが割当てられ、一つのIPアドレスに対して
一つまたは複数の入出力ポートを割付けることにより前
記ルータをN個の仮想的なルータとして機能分割し、当
該仮想的なルータを前記VPNを構成するために用いる
ルータとして割当てることが望ましい。
In the router, N (N is a natural number) I
A P address is assigned, and by assigning one or more input / output ports to one IP address, the router is functionally divided into N virtual routers, and the virtual router is connected to the VPN. It is desirable to assign it as a router used for configuration.

【0014】また、複数のVPNに対してそれぞれ前記
VPNを管理する手段が設けられ、前記収集する手段
は、自VPNに関する前記管理情報を限定して収集し、
他VPNに関する前記管理情報の収集を禁止する手段を
備えることもできる。
Further, means for managing the VPN is provided for each of the plurality of VPNs, and the means for collecting restrictively collects the management information on the own VPN,
It is also possible to provide a means for prohibiting the collection of the management information regarding the other VPN.

【0015】これによれば、個々のプライベートネット
ワークにおける秘匿性を確保することができる。この場
合でもIPネットワークを管理する手段は、全てのVP
Nに関する管理情報を収集しており、個々のVPNを管
理する手段が自己が収集した自VPN内に限定された管
理情報だけではリクエストの対応に苦慮したときには、
IPネットワークを管理する手段が個々のVPNを管理
する手段をサポートするようにVPNシステムを構成す
ればよい。
According to this, it is possible to secure confidentiality in each private network. Even in this case, the means for managing the IP network is all VPs.
When the management information about N is collected and the means for managing each VPN has a difficulty in responding to the request only with the management information limited to the own VPN collected by itself,
The VPN system may be configured so that the means for managing the IP network supports the means for managing the individual VPNs.

【0016】本発明の第二の観点は、複数の拠点間にV
PNを構成するための専用線を設定する手段を備えたル
ータであって、本発明の特徴とするところは、N個のI
Pアドレスが割当てられ、一つのIPアドレスに対して
一つまたは複数の入出力ポートを割当てることによりN
個の仮想的なルータとして機能分割され、当該仮想的な
ルータが前記VPNを構成するために用いるルータとし
て割当てられるところにある。
[0016] A second aspect of the present invention is to connect V points between a plurality of bases.
A router having means for setting a dedicated line for configuring a PN, which is a feature of the present invention, is that N I
P address is assigned, and by assigning one or more input / output ports to one IP address, N
The functions are divided into individual virtual routers, and the virtual routers are assigned as the routers used to configure the VPN.

【0017】本発明の第三の観点は、情報処理装置にイ
ンストールすることにより、その情報処理装置に、複数
の拠点と、ルータとを備え、このルータは、前記複数の
拠点間にVPNを構成するための専用線を設定する手段
を備えたVPNシステムに適用される装置に相応する機
能を実現させるプログラムである。
According to a third aspect of the present invention, the information processing apparatus, when installed in the information processing apparatus, has a plurality of bases and a router, and the router forms a VPN between the plurality of bases. It is a program that realizes a function corresponding to the device applied to the VPN system, which is provided with a means for setting a dedicated line for doing so.

【0018】ここで、本発明の特徴とするところは、前
記VPNを管理する機能を実現させ、この管理する機能
として、当該VPNに関する通信トラヒック情報および
障害情報を含む管理情報を前記ルータから収集する機能
と、前記拠点からの当該VPNのネットワークトポロジ
および伝送帯域の変更のリクエストを受け付ける機能
と、この受け付ける機能が受け付けたリクエストが実現
可能か否かを前記収集する機能により収集した前記管理
情報に基づき判断する機能と、この判断する機能により
当該リクエストが実現可能と判断されたときには、当該
リクエストに基づく当該VPNのネットワークトポロジ
および伝送帯域を前記ルータに対して設定する機能とを
実現させるところにある。
Here, a feature of the present invention is to realize a function of managing the VPN, and as the function of managing the VPN, management information including communication traffic information and failure information regarding the VPN is collected from the router. Based on the management information collected by the function, the function of receiving a request for changing the network topology and the transmission band of the VPN from the base, and the function of collecting whether the request received by the receiving function is feasible The function of determining and the function of setting the network topology and transmission band of the VPN based on the request to the router when the request is determined to be feasible by the determining function are realized.

【0019】複数のVPNに対してそれぞれ前記VPN
を管理する機能を実現させ、前記収集する機能として、
自VPNに関する前記管理情報を限定して収集し、他V
PNに関する前記管理情報の収集を禁止する機能を実現
させることもできる。
For each of a plurality of VPNs, the VPN
As a function to realize the function of managing
The management information on the own VPN is limited and collected, and the other V
It is also possible to realize the function of prohibiting the collection of the management information on the PN.

【0020】本発明の第四の観点は、本発明のプログラ
ムが記録された前記情報処理装置読取可能な記録媒体で
ある。本発明のプログラムは本発明の記録媒体に記録さ
れることにより、前記情報処理装置は、この記録媒体を
用いて本発明のプログラムをインストールすることがで
きる。あるいは、本発明のプログラムを保持するサーバ
からネットワークを介して直接前記情報処理装置に本発
明のプログラムをインストールすることもできる。
A fourth aspect of the present invention is a recording medium readable by the information processing device, in which the program of the present invention is recorded. By recording the program of the present invention on the recording medium of the present invention, the information processing apparatus can install the program of the present invention using this recording medium. Alternatively, the program of the present invention can be installed in the information processing apparatus directly from a server holding the program of the present invention via a network.

【0021】これにより、コンピュータ装置等の情報処
理装置を用いて、VPN管理者が、ネットワークプロバ
イダのネットワーク内でVPNのトポロジの変更や帯域
の変更を即時に行うことができ、さらに、専用線の効率
的な運用により実質的に使用した分のみの専用線料金と
することができ、ネットワークプロバイダは、ネットワ
ーク全体のリソースが有効に使用されるので、設備投資
効果が大きく、また、1つのルータをVPN毎の別ルー
タとして見せることによりルータを効率よく運用するこ
とができるVPNシステムおよびルータを実現すること
ができる。
Thus, the VPN administrator can immediately change the VPN topology and the bandwidth within the network of the network provider by using the information processing device such as the computer device. Due to efficient operation, the leased line fee can be used only for what is substantially used, and the network provider can effectively use the resources of the entire network, resulting in a large capital investment effect and the use of one router. It is possible to realize a VPN system and a router that can operate the router efficiently by making them appear as separate routers for each VPN.

【0022】[0022]

【発明の実施の形態】本発明実施例のVPNシステムを
図1ないし図4を参照して説明する。図1は本実施例の
VPNシステムの全体構成図である。図2は第一実施例
のトポロジ変更を説明するための図である。図3は本実
施例のルータの構成図である。図4は第三実施例のVP
Nの管理システムの動作を示すフローチャートである。
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS A VPN system according to an embodiment of the present invention will be described with reference to FIGS. FIG. 1 is an overall configuration diagram of the VPN system of this embodiment. FIG. 2 is a diagram for explaining the topology change of the first embodiment. FIG. 3 is a block diagram of the router of this embodiment. FIG. 4 shows the VP of the third embodiment.
It is a flowchart which shows operation | movement of the management system of N.

【0023】本実施例は、図1に示すように、複数の拠
点10−1、10−2、11−1、11−2、12−
1、12−2と、ルータ3〜7とを備え、このルータ3
〜7は、複数の拠点10−1、10−2、11−1、1
1−2、12−1、12−2の間にVPNを構成するた
めの専用線を設定するVPNシステムである。
In this embodiment, as shown in FIG. 1, a plurality of bases 10-1, 10-2, 11-1, 11-2, 12-.
1, 12-2 and routers 3 to 7 are provided.
To 7 are a plurality of bases 10-1, 10-2, 11-1, 1
This is a VPN system in which a dedicated line for configuring a VPN is set between 1-2, 12-1, and 12-2.

【0024】ここで、本実施例の特徴とするところは、
VPNを管理する管理システム10、11、12が設け
られ、この管理システム10、11、12は、当該VP
Nに関する通信トラヒック情報および障害情報を含む管
理情報をルータ3〜7から収集し、拠点10−1、10
−2、11−1、11−2、12−1、12−2からの
当該VPNのネットワークトポロジおよび伝送帯域の変
更のリクエストを受け付け、この受け付けたリクエスト
に対応可能か否かを収集した前記管理情報に基づき判断
し、この判断により当該リクエストに対応可能と判断さ
れたときには、当該リクエストに基づく当該VPNのネ
ットワークトポロジおよび伝送帯域をルータ3〜7に対
して設定するところにある。
Here, the feature of this embodiment is that
Management systems 10, 11 and 12 for managing the VPN are provided, and the management systems 10, 11 and 12 are related to the VP.
Management information including communication traffic information and failure information regarding N is collected from the routers 3 to 7, and the bases 10-1 and 10 are connected.
-2, 11-1, 11-2, 12-1, 12-2 accepts requests to change the network topology and transmission band of the VPN, and manages whether the accepted requests are collected or not. When it is determined based on the information and it is determined that the request can be handled by this determination, the network topology and the transmission band of the VPN based on the request are set in the routers 3 to 7.

【0025】ルータ3〜7には、図3に示すように、N
個のIPアドレスが割当てられ、一つのIPアドレスに
対して一つまたは複数の入出力ポートを割付けることに
よりルータ3〜7をN個の仮想ルータ3−1〜3−3、
4−1、5−1、5−2、6−1、6−2、7−1とし
て機能分割し、当該仮想ルータ3−1〜3−3、4−
1、5−1、5−2、6−1、6−2、7−1を前記V
PNを構成するために用いるルータとして割当てる。
As shown in FIG. 3, each of the routers 3 to 7 has N
IP addresses are assigned, and one or a plurality of input / output ports are assigned to one IP address so that the routers 3 to 7 are assigned to N virtual routers 3-1 to 3-3,
Functions are divided as 4-1, 5-1, 5-2, 6-1, 6-2, 7-1, and the virtual routers 3-1 to 3-3, 4-
1, 5-1, 5-2, 6-1, 6-2, 7-1 is the V
It is assigned as the router used to configure the PN.

【0026】また、図1に示すように、複数のVPNに
対してそれぞれ前記VPNを管理する管理システム1
0、11、12が設けられ、当該管理システム10、1
1、12が前記管理情報を収集する際には、自VPNに
関する前記管理情報を限定して収集し、他VPNに関す
る前記管理情報の収集を禁止することもできる。このよ
うに、VPNが複数あるときは、あるVPNの管理シス
テムは他のVPNに関する管理情報を収集することがで
きないように制限を加えてもよい。
Further, as shown in FIG. 1, a management system 1 for managing each of a plurality of VPNs.
0, 11, 12 are provided, and the management system 10, 1
When the management information 1 and 12 collect the management information, it is possible to limit the collection of the management information about the own VPN and prohibit the collection of the management information about other VPNs. As described above, when there are a plurality of VPNs, the management system of one VPN may be restricted so that it cannot collect management information about other VPNs.

【0027】本実施例の管理システム2、10、11、
12は、情報処理装置であるコンピュータ装置を用いて
実現することができる。すなわち、コンピュータ装置に
インストールすることにより、そのコンピュータ装置
に、複数の拠点10−1、10−2、11−1、11−
2、12−1、12−2と、ルータ3〜7とを備え、こ
のルータ3〜7は、複数の拠点10−1、10−2、1
1−1、11−2、12−1、12−2の間にVPNを
構成するための専用線を設定するVPNシステムに適用
される装置に相応する機能を実現させるプログラムであ
って、前記VPNを管理する管理システム10、11、
12に相応する機能を実現させ、この管理システム1
0、11、12に相応する機能として、当該VPNに関
する通信トラヒック情報および障害情報を含む管理情報
をルータ3〜7から収集する機能と、拠点10−1、1
0−2、11−1、11−2、12−1、12−2から
の当該VPNのネットワークトポロジおよび伝送帯域の
変更のリクエストを受け付ける機能と、この受け付ける
機能が受け付けたリクエストに対応可能か否かを前記収
集する機能により収集した前記管理情報に基づき判断す
る機能と、この判断する機能により当該リクエストに対
応可能と判断されたときには、当該リクエストに基づく
当該VPNのネットワークトポロジおよび伝送帯域を前
記ルータに対して設定する機能とを実現させるプログラ
ムをコンピュータ装置にインストールすることにより、
そのコンピュータ装置を第一実施例の管理システム1
0、11、12に相応する装置とすることができる。
The management systems 2, 10, 11 of this embodiment
12 can be realized using a computer device which is an information processing device. That is, by installing in a computer device, the computer device has a plurality of locations 10-1, 10-2, 11-1, 11-.
2, 12-1, 12-2 and routers 3-7 are provided, and the routers 3-7 have a plurality of bases 10-1, 10-2, 1
A program that realizes a function corresponding to a device applied to a VPN system that sets a dedicated line for configuring a VPN between 1-1, 11-2, 12-1, and 12-2. Management systems 10, 11 for managing
This management system 1 realizes the function corresponding to 12
As functions corresponding to 0, 11, and 12, a function of collecting management information including communication traffic information and failure information related to the VPN from the routers 3 to 7, and bases 10-1 and 10-1.
0-2, 11-1, 11-2, 12-1, 12-2, a function of accepting a request for changing the network topology and transmission band of the VPN, and whether or not the accepting function can respond to the request accepted The function of determining whether the request is based on the management information collected by the function of collecting, and when the function of judging determines that the request can be handled, the router determines the network topology and transmission band of the VPN based on the request. By installing a program that realizes the function to be set for
The computer device is the management system 1 of the first embodiment.
It can be a device corresponding to 0, 11, 12.

【0028】あるいは、前記収集する機能として、自V
PNに関する前記管理情報を限定して収集し、他VPN
に関する前記管理情報の収集を禁止する機能を実現させ
るプログラムをコンピュータ装置にインストールするこ
とにより、そのコンピュータ装置を第三実施例の管理シ
ステム10、11、12に相応する装置とすることがで
きる。
Alternatively, the self-V
Limit the collection of the management information on the PN to other VPNs
By installing a program that realizes the function of prohibiting the collection of the management information on the computer device, the computer device can be a device corresponding to the management system 10, 11, 12 of the third embodiment.

【0029】本実施例のプログラムは本実施例の記録媒
体に記録されることにより、コンピュータ装置は、この
記録媒体を用いて本実施例のプログラムをインストール
することができる。あるいは、本実施例のプログラムを
保持するサーバからネットワークを介して直接コンピュ
ータ装置に本実施例のプログラムをインストールするこ
ともできる。
By recording the program of this embodiment on the recording medium of this embodiment, the computer device can install the program of this embodiment using this recording medium. Alternatively, the program of this embodiment can be directly installed in a computer device from a server holding the program of this embodiment via a network.

【0030】これにより、コンピュータ装置を用いて、
VPN管理者が、ネットワークプロバイダのネットワー
ク内でVPNのトポロジの変更や帯域の変更を即時に行
うことができ、さらに、専用線の効率的な運用により実
質的に使用した分のみの専用線料金とすることができ、
ネットワークプロバイダは、ネットワーク全体のリソー
スが有効に使用されるので、設備投資効果が大きく、ま
た、1つのルータをVPN毎の別ルータとして見せるこ
とによりルータを効率よく運用することができるVPN
システムおよびルータを実現することができる。
Thus, using the computer device,
The VPN administrator can immediately change the VPN topology or change the bandwidth within the network of the network provider, and the effective operation of the leased line allows the leased line charges to be substantially used. You can
Since the resources of the entire network are effectively used by the network provider, the capital investment effect is large, and the router can be operated efficiently by making one router appear as another router for each VPN.
A system and a router can be realized.

【0031】以下では、本実施例をさらに詳細に説明す
る。
The present embodiment will be described in more detail below.

【0032】(第一実施例)第一実施例を図1および図
2を参照して説明する。第一実施例では、本実施例のV
PNシステムの概要について説明する。図1の1はIP
ネットワーク、2はIPネットワークを管理するネット
ワークプロバイダの管理システム、3、4、5、6、7
はネットワークプロバイダが管理する物理的なルータ、
3−1、3−2、3−3はルータ3を使用するVPN−
A、VPN−B、VPN−Cの仮想ルータ、4−1はル
ータ4を使用するVPN−Aの仮想ルータ、5−1、5
−2はルータ5を使用するVPN−B、VPN−Cの仮
想ルータ、6−1、6−2はルータ6を使用するVPN
−AおよびVPN−Bの仮想ルータ、7−1はルータ7
を使用するVPN−Cの仮想ルータ、10はVPN−A
の管理システム、10−1、10−2はVPN−Aの拠
点、11はVPN−Bの管理システム、11−1、11
−2はVPN−Bの拠点、12はVPN−Cの管理シス
テム、12−1、12−2はVPN−Cの拠点である。
(First Embodiment) A first embodiment will be described with reference to FIGS. 1 and 2. In the first embodiment, V of this embodiment is used.
The outline of the PN system will be described. 1 in FIG. 1 is IP
Network, 2 is a management system of a network provider that manages an IP network, 3, 4, 5, 6, 7
Is a physical router managed by a network provider,
3-1, 3-2, and 3-3 are VPN-s using the router 3.
Virtual routers A, VPN-B, and VPN-C, 4-1 is a virtual router of VPN-A that uses the router 4, 5-1 and 5
-2 is a virtual router of VPN-B and VPN-C using the router 5, 6-1 and 6-2 are VPNs using the router 6.
-A and VPN-B virtual routers, 7-1 is router 7
Virtual router of VPN-C using 10 is VPN-A
Management system, 10-1 and 10-2 are VPN-A bases, 11 is a VPN-B management system, 11-1 and 11
Reference numeral -2 is a VPN-B base, 12 is a VPN-C management system, and 12-1 and 12-2 are VPN-C bases.

【0033】一例として、VPN−Aが拠点10−1と
拠点10−2との間に3Mb/sの専用線をIPネット
ワーク1を管理するネットワークプロバイダへ申し込む
と、ネットワークプロバイダは管理システム2からルー
タ3、4、6に対して帯域3Mb/s、使用ポート番
号、IPアドレスを設定し、ルータ3、4、6の間の専
用線を形成してその結果をVPN−Aに通知する。
As an example, when the VPN-A applies a 3 Mb / s leased line between the base 10-1 and the base 10-2 to the network provider managing the IP network 1, the network provider causes the network provider to switch from the management system 2 to the router. A band 3 Mb / s, a port number used, and an IP address are set for 3, 4, and 6, a dedicated line is formed between the routers 3, 4, and 6 and the result is notified to the VPN-A.

【0034】その後、VPN−Aが帯域を5Mb/sに
変更したい場合は、管理システム10から仮想ルータ3
−1、4−1、6−1に対して帯域5Mb/sを設定す
ることができる。このように、ルータ3、4、6の間に
帯域の余裕があれば、VPN−Aの帯域を5Mb/sへ
拡大することがVPN−A自身から簡単に設定できる。
After that, when the VPN-A wants to change the bandwidth to 5 Mb / s, the management system 10 sends the virtual router 3
A band of 5 Mb / s can be set for -1, 4-1, and 6-1. In this way, if there is a margin of bandwidth between the routers 3, 4, and 6, the VPN-A itself can easily set the bandwidth of the VPN-A to 5 Mb / s.

【0035】管理システム2では、各ルータから管理情
報を収集して使用状況を常に把握しており、VPN−A
が帯域を3Mb/sから5Mb/sへ変更したことを知
ることができる。さらにVPN−Aで帯域の増加が必要
になった場合には、ルータ3と4との間の伝送路容量に
余裕がない場合は、図2の破線で示すように、トポロジ
を変更して専用線の一部をルータ3、5、6間で設定
し、要求する帯域を確保することができる。同様にVP
N−B、VPN−CもIPネットワーク1に専用線を形
成した後、帯域の変更やトポロジの変更を自身の管理シ
ステム11、12からそれぞれ行うことができる。
The management system 2 collects management information from each router to constantly grasp the usage status, and the VPN-A
Can change the band from 3 Mb / s to 5 Mb / s. Further, if the bandwidth needs to be increased in VPN-A, and there is no margin in the transmission path capacity between the routers 3 and 4, the topology is changed and dedicated as shown by the broken line in FIG. A part of the line can be set between the routers 3, 5, and 6 to secure the required bandwidth. Similarly VP
N-B and VPN-C can also change the bandwidth and the topology from their own management systems 11 and 12, respectively, after forming a dedicated line in the IP network 1.

【0036】第一実施例では、各管理システム10、1
1、12がそれぞれ全VPNの管理情報を把握してお
り、各管理システム10、11、12が全仮想ルータ3
−1〜3−3、4−1、5−1、5−2、6−1、6−
2、7−1にわたって設定を行うことができる。
In the first embodiment, each management system 10, 1
Each of the management systems 10, 11 and 12 knows the management information of all the VPNs.
-1 to 3-3, 4-1, 5-1, 5-2, 6-1, 6-
Settings can be made over 2, 7-1.

【0037】したがって、第一実施例における管理シス
テム2は、IPネットワーク全体を監視し、各管理シス
テム10、11、12が対応困難な不測の事態が発生し
た場合にのみサポートを行うように構成される。これに
より、実質的なVPNシステムの運用の殆どは各管理シ
ステム10、11、12により行うことができる。
Therefore, the management system 2 in the first embodiment is configured to monitor the entire IP network and provide support only when an unexpected situation in which each management system 10, 11, 12 is difficult to handle occurs. It As a result, most of the actual operation of the VPN system can be performed by the management systems 10, 11 and 12.

【0038】(第二実施例)第二実施例を図3を参照し
て説明する。第二実施例では、本実施例のルータについ
て説明する。P1〜P8は入出力ポートである。本ルー
タには、VPN−A用のIPアドレスIP−A(例え
ば、128.19.254.7)、VPN−B用のIP
アドレスIP−B(例えば、128.19.254.
9)、VPN−C用のIPアドレスIP−C(例えば、
128.19.254.16)が割当てられている。V
PN−Aは入力ポートP1、出力ポートP5を用いて2
Gb/s分を、VPN−Bは入力ポートP2、P3、出
力ポートP6、P7を用いて6Gb/s分を、VPN−
Cは入力ポートP4、出力ポートP8を用いて1Gb/
s分を使用している。次のノードとの伝送容量は10G
b/s分が確保されている。
(Second Embodiment) A second embodiment will be described with reference to FIG. In the second embodiment, the router of this embodiment will be described. P1 to P8 are input / output ports. This router has an IP address IP-A for VPN-A (for example, 128.19.254.7) and an IP for VPN-B.
Address IP-B (eg, 128.19.254.
9), IP address IP-C for VPN-C (for example,
128.19.254.16) is assigned. V
PN-A uses input port P1 and output port P5 for 2
Gb / s is used for VPN-B, and 6 Gb / s is used for VPN-B using input ports P2 and P3 and output ports P6 and P7.
C uses the input port P4 and the output port P8 to achieve 1 Gb /
s minutes are used. The transmission capacity with the next node is 10G
b / s is secured.

【0039】いまVPN−Cが伝送帯域を1Gb/sか
ら2Gb/sに変更した場合には、VPN−Cの管理シ
ステム12はIPアドレスIP−CのOSPF(Open Sh
ortest Path First)パケットを送出して仮想ルータ3−
3、5−2、7−1に伝送帯域の拡大を指示する。
When the VPN-C changes the transmission band from 1 Gb / s to 2 Gb / s, the management system 12 of the VPN-C uses the OSPF (Open Sh) of the IP address IP-C.
ortest Path First) packet is sent to the virtual router 3-
It instructs 3, 5-2 and 7-1 to expand the transmission band.

【0040】仮想ルータ3−3、5−2、7−1ではI
PアドレスIP−Cから自分へのパケットでかつVPN
−C用のものであることを判別し、パケットの内容を解
釈して、1Gb/s分の帯域増加要求であることを知
る。要求の実行が可能かを判別して可能であれば、1G
b/s分の増加を行い、実施結果を送信元IPアドレス
をIP−CとしてOSPFパケットによりVPN−Cの
管理システム12へ返す。同様にVPN−AおよびBに
おいても仮想ルータへの指示はIPアドレスをIP−A
としたOSPFパケットにより行うことができる。
In the virtual routers 3-3, 5-2, 7-1, I
Packet from P-address IP-C to itself and VPN
-C is determined, the contents of the packet are interpreted, and it is known that the bandwidth increase request is 1 Gb / s. Determine if the request can be executed and if possible, 1G
It is increased by b / s, and the execution result is returned to the management system 12 of the VPN-C by an OSPF packet with the source IP address as IP-C. Similarly, in VPN-A and B, the instruction to the virtual router is to change the IP address to IP-A.
Can be performed by the OSPF packet.

【0041】このように、1つのルータにVPN対応に
IPアドレスを持たせることにより、VPN毎に制御す
ることができ、かつ他のVPNからの制御を受けないた
め、1つのルータをVPN毎の仮想ルータとして見せる
ことができる利点がある。
As described above, by giving one router an IP address corresponding to the VPN, it is possible to control each VPN and receive no control from other VPNs. It has the advantage that it can be viewed as a virtual router.

【0042】(第三実施例)第三実施例を図4を参照し
て説明する。第三実施例では、VPNにおける管理情報
の収集を当該VPNの管理システムに限定し、他VPN
の当該管理情報の収集を禁止することにより、各VPN
間の秘匿性を向上させることができる。この場合でもI
Pネットワークの管理システム2では、全VPNの管理
情報を収集しており、個々のVPNの管理システム1
0、11、12が自己が収集した自VPN内に限定され
た管理情報だけではリクエストの対応に苦慮したときに
は、IPネットワークの管理システム2が個々のVPN
の管理システム10、11、12をサポートするように
VPNシステムを構成する。
(Third Embodiment) A third embodiment will be described with reference to FIG. In the third embodiment, collection of management information in a VPN is limited to the management system of the VPN, and other VPNs
By prohibiting the collection of relevant management information of each VPN,
It is possible to improve the confidentiality of the space. Even in this case I
The management system 2 of the P network collects management information of all VPNs and manages the management system 1 of each VPN.
When the management information 0, 11, 12 has difficulty in responding to the request only with the management information limited to the own VPN collected by itself, the management system 2 of the IP network uses the individual VPNs.
The VPN system is configured to support the management systems 10, 11 and 12 of FIG.

【0043】すなわち、第三実施例では、図4に示すよ
うに、リクエストを受け付け(ステップ1)、自VPN
内で収集した管理情報に基づき、そのリクエストに自仮
想ルータのみで対応できるか否か判断し(ステップ
2)、対応できない場合には、IPネットワークの管理
システム2に対して対応を依頼する(ステップ3)。ま
た、対応できる場合には、リクエスト対応処置を施す
(ステップ4)。
That is, in the third embodiment, as shown in FIG. 4, the request is accepted (step 1) and the own VPN is used.
Based on the management information collected in the server, it is judged whether or not the request can be handled only by the own virtual router (step 2). 3). If the request can be dealt with, a request handling procedure is performed (step 4).

【0044】図2の例では、VPN−Aで帯域の増加が
必要になった場合に、ルータ3と4との間の伝送路容量
に余裕がなく、トポロジを変更して専用線の一部をルー
タ3、5、6間で設定しているが、このような場合に
は、管理システム10は、もはや自仮想ルータ3−1、
4−1、6−1のみではリクエストに対応できず、管理
システム2にリクエストへの対応を依頼する。
In the example of FIG. 2, when the bandwidth needs to be increased in the VPN-A, there is no margin in the transmission path capacity between the routers 3 and 4, and the topology is changed to make a part of the leased line. Is set between the routers 3, 5, and 6, but in such a case, the management system 10 no longer has its own virtual router 3-1,
The request cannot be handled by only 4-1 and 6-1 and the management system 2 is requested to handle the request.

【0045】したがって、第三実施例における管理シス
テム2は、IPネットワーク全体を監視し、各管理シス
テム10、11、12からの依頼に応じて各管理システ
ム10、11、12と協調してリクエストに対応するよ
うに構成される。これにより、第一実施例と比較する
と、VPNシステムの運用の一部を管理システム2が担
う割合が大きくなるが、各VPN間の秘匿性が向上する
とともに、管理システム10、11、12間のネットワ
ークトポロジおよび伝送帯域の設定における競合が発生
した場合に、これを管理システム2により調停すること
ができる。
Therefore, the management system 2 in the third embodiment monitors the entire IP network and responds to the requests from the management systems 10, 11, 12 in cooperation with the management systems 10, 11, 12 to make a request. Configured to correspond. As a result, as compared with the first embodiment, the management system 2 plays a larger proportion of a part of the operation of the VPN system, but the confidentiality between the VPNs is improved and the management systems 10, 11, 12 are connected. When a conflict occurs in the setting of the network topology and the transmission band, this can be arbitrated by the management system 2.

【0046】(実施例まとめ)本実施例のVPNシステ
ムでは、VPN管理者は、VPNの管理システム10、
11、12から容易に帯域の変更やトポロジの変更がで
きるため専用線の効率的な運用ができ、実質的に使用し
た分のみの専用線料金とすることができる利点がある。
また、ネットワークプロバイダは、専用線の運用を各V
PNの管理システム10、11、12に任せることがで
きるとともに、ネットワーク全体のリソースが有効に使
用されるので、設備投資効果が大きい利点がある。
(Summary of Embodiments) In the VPN system of this embodiment, the VPN administrator is the VPN management system 10,
Since it is possible to easily change the band and the topology from 11 and 12, there is an advantage that the dedicated line can be efficiently operated and the leased line fee can be substantially used.
In addition, the network provider must operate the dedicated line for each V
Since the PN management systems 10, 11 and 12 can be entrusted to the resources, and the resources of the entire network are effectively used, there is an advantage that the capital investment effect is great.

【0047】また、1つのルータにVPN対応にIPア
ドレスを持たせることにより、VPN毎に制御すること
ができ、かつ他のVPNからの制御を受けないため、1
つのルータをVPN毎の別ルータとして見せることがで
きる利点がある。
Further, by giving one router an IP address corresponding to the VPN, it is possible to control for each VPN and not to be controlled by another VPN.
There is an advantage that one router can be made to appear as another router for each VPN.

【0048】[0048]

【発明の効果】以上説明したように、本発明によれば、
VPN管理者が、ネットワークプロバイダのネットワー
ク内でVPNのトポロジの変更や帯域の変更を即時に行
うことができる。さらに、VPN管理者は、専用線の効
率的な運用により実質的に使用した分のみの専用線料金
とすることができる。また、ネットワークプロバイダ
は、ネットワーク全体のリソースが有効に使用されるの
で設備投資効果が大きく、また、1つのルータをVPN
毎の別ルータとして見せることによりルータを効率よく
運用することができる。
As described above, according to the present invention,
The VPN administrator can immediately change the VPN topology or the bandwidth within the network of the network provider. Further, the VPN administrator can set the leased line fee for only the amount used substantially by the efficient operation of the leased line. In addition, the network provider can use the resources of the entire network effectively, so that the capital investment effect is great, and one router can be used as a VPN.
By showing each router as a separate router, the router can be operated efficiently.

【図面の簡単な説明】[Brief description of drawings]

【図1】本実施例のVPNシステムの全体構成図。FIG. 1 is an overall configuration diagram of a VPN system of this embodiment.

【図2】第一実施例のトポロジ変更を説明するための
図。
FIG. 2 is a diagram for explaining a topology change of the first embodiment.

【図3】本実施例のルータの構成図。FIG. 3 is a configuration diagram of a router of this embodiment.

【図4】第三実施例のVPNの管理システムの動作を示
すフローチャート。
FIG. 4 is a flowchart showing the operation of the VPN management system of the third embodiment.

【図5】従来技術によるVPNシステム構成例を示す
図。
FIG. 5 is a diagram showing an example of a VPN system configuration according to a conventional technique.

【符号の説明】 1 IPネットワーク 2、10、11、12 管理システム 3〜7、21、22 ルータ 3−1〜3−3、4−1、5−1、5−2、6−1、6
−2、7−1 仮想ルータ 10−1、10−2、11−1、11−2、12−1、
12−2、20、23拠点 24 専用線
[Description of Reference Signs] 1 IP network 2, 10, 11, 12 Management system 3 to 7, 21, 22 Router 3-1 to 3-3, 4-1, 5-1, 5-2, 6-1, 6
-2, 7-1 Virtual routers 10-1, 10-2, 11-1, 11-2, 12-1,
12-2, 20, 23 Location 24 Dedicated line

Claims (7)

【特許請求の範囲】[Claims] 【請求項1】 複数の拠点と、ルータとを備え、このル
ータは、前記複数の拠点間にVPN(Virtual Private N
etwork)を構成するための専用線を設定する手段を備え
たVPNシステムにおいて、 前記VPNを管理する手段が設けられ、 この管理する手段は、 当該VPNに関する通信トラヒック情報および障害情報
を含む管理情報を前記ルータから収集する手段と、 前記拠点からの当該VPNのネットワークトポロジおよ
び伝送帯域の変更のリクエストを受け付ける手段と、 この受け付ける手段が受け付けたリクエストに対応可能
か否かを前記収集する手段により収集した前記管理情報
に基づき判断する手段と、 この判断する手段により当該リクエストに対応可能と判
断されたときには、当該リクエストに基づく当該VPN
のネットワークトポロジおよび伝送帯域を前記ルータに
対して設定する手段とを備えたことを特徴とするVPN
システム。
1. A plurality of bases and a router are provided, and the router has a VPN (Virtual Private N) between the plurality of bases.
In the VPN system provided with means for setting a dedicated line for configuring the network, there is provided means for managing the VPN, and this managing means provides management information including communication traffic information and failure information about the VPN. The means for collecting from the router, the means for accepting a request for changing the network topology and the transmission band of the VPN from the base, and the means for collecting whether or not the request accepted by the accepting means can be handled A means for judging based on the management information and a VPN based on the request when the judging means judges that the request can be handled.
And a means for setting the network topology and the transmission band of the router to the router.
system.
【請求項2】 前記ルータには、N(Nは自然数)個の
IPアドレスが割当てられ、 一つのIPアドレスに対して一つまたは複数の入出力ポ
ートを割付けることにより前記ルータをN個の仮想的な
ルータとして機能分割し、 当該仮想的なルータを前記VPNを構成するために用い
るルータとして割当てる請求項1記載のVPNシステ
ム。
2. N (N is a natural number) IP addresses are assigned to the router, and one or a plurality of input / output ports are assigned to one IP address so that the router has N addresses. The VPN system according to claim 1, wherein the function is divided as a virtual router, and the virtual router is assigned as a router used to configure the VPN.
【請求項3】 複数のVPNに対してそれぞれ前記VP
Nを管理する手段が設けられ、 前記収集する手段は、自VPNに関する前記管理情報を
限定して収集し、他VPNに関する前記管理情報の収集
を禁止する手段を備えた請求項1または2記載のVPN
システム。
3. The VP for each of a plurality of VPNs
The means for managing N is provided, and the means for collecting comprises means for collecting the management information on the own VPN in a limited manner and for prohibiting the collection of the management information on other VPNs. VPN
system.
【請求項4】 複数の拠点間にVPNを構成するための
専用線を設定する手段を備えたルータにおいて、 N個のIPアドレスが割当てられ、 一つのIPアドレスに対して一つまたは複数の入出力ポ
ートを割当てることによりN個の仮想的なルータとして
機能分割され、 当該仮想的なルータが前記VPNを構成するために用い
るルータとして割当てられることを特徴とするルータ。
4. A router having means for setting a dedicated line for configuring a VPN between a plurality of bases, N IP addresses are allocated, and one or a plurality of input addresses are assigned to one IP address. A router characterized by being functionally divided into N virtual routers by allocating output ports, and the virtual routers are allocated as routers used to configure the VPN.
【請求項5】 情報処理装置にインストールすることに
より、その情報処理装置に、複数の拠点と、ルータとを
備え、このルータは、前記複数の拠点間にVPNを構成
するための専用線を設定する手段を備えたVPNシステ
ムに適用される装置に相応する機能を実現させるプログ
ラムにおいて、 前記VPNを管理する機能を実現させ、 この管理する機能として、 当該VPNに関する通信トラヒック情報および障害情報
を含む管理情報を前記ルータから収集する機能と、 前記拠点からの当該VPNのネットワークトポロジおよ
び伝送帯域の変更のリクエストを受け付ける機能と、 この受け付ける機能が受け付けたリクエストに対応可能
か否かを前記収集する機能により収集した前記管理情報
に基づき判断する機能と、 この判断する機能により当該リクエストに対応可能と判
断されたときには、当該リクエストに基づく当該VPN
のネットワークトポロジおよび伝送帯域を前記ルータに
対して設定する機能とを実現させることを特徴とするプ
ログラム。
5. The information processing device, when installed in the information processing device, includes a plurality of bases and a router, and the router sets a dedicated line for configuring a VPN between the plurality of bases. In a program that realizes a function corresponding to a device applied to a VPN system that includes a means for controlling the VPN, a function that manages the VPN is realized, and a management including communication traffic information and failure information regarding the VPN is performed as the managing function. With the function of collecting information from the router, the function of receiving a request for changing the network topology and transmission band of the VPN from the base, and the function of collecting whether or not the received function can handle the received request. By the function that makes a judgment based on the management information collected and the function that makes this judgment When it is determined that the request can be handled, the VPN based on the request
And a function for setting the network topology and the transmission band for the router.
【請求項6】 複数のVPNに対してそれぞれ前記VP
Nを管理する機能を実現させ、 前記収集する機能として、自VPNに関する前記管理情
報を限定して収集し、他VPNに関する前記管理情報の
収集を禁止する機能を実現させる請求項5記載のプログ
ラム。
6. The VP for each of a plurality of VPNs
The program according to claim 5, wherein a function of managing N is realized, and as the collecting function, a function of collecting the management information regarding the own VPN in a limited manner and prohibiting the collection of the management information regarding another VPN is realized.
【請求項7】 請求項5または6記載のプログラムが記
録された前記情報処理装置読み取り可能な記録媒体。
7. A recording medium readable by the information processing device, in which the program according to claim 5 or 6 is recorded.
JP2002118109A 2002-04-19 2002-04-19 VPN system and router Expired - Fee Related JP3904968B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP2002118109A JP3904968B2 (en) 2002-04-19 2002-04-19 VPN system and router

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP2002118109A JP3904968B2 (en) 2002-04-19 2002-04-19 VPN system and router

Publications (2)

Publication Number Publication Date
JP2003318949A true JP2003318949A (en) 2003-11-07
JP3904968B2 JP3904968B2 (en) 2007-04-11

Family

ID=29535107

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2002118109A Expired - Fee Related JP3904968B2 (en) 2002-04-19 2002-04-19 VPN system and router

Country Status (1)

Country Link
JP (1) JP3904968B2 (en)

Cited By (98)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005203984A (en) * 2004-01-14 2005-07-28 Nec Corp System, method, and program for network management, and recording medium
GB2431816A (en) * 2005-10-31 2007-05-02 Agilent Technologies Inc Discovering and providing near real-time updates of virtual private networks (VPN) topologies
JP2008502190A (en) * 2004-06-04 2008-01-24 ノキア インコーポレイテッド A system for geographically distributed virtual routing
KR100861592B1 (en) 2006-12-01 2008-10-07 한국전자통신연구원 Method and apparatus for managing fault in customer network management system
WO2010093369A1 (en) * 2009-02-16 2010-08-19 Qualitest Technologies, Inc. Communications-network data processing methods, communications-network data processing systems, computer-readable storage media, communications-network data presentation methods, and communications-network data presentation systems
JP2011228864A (en) * 2010-04-16 2011-11-10 Nippon Telegr & Teleph Corp <Ntt> Traffic control instruction apparatus, traffic control instruction program, traffic control instruction system, and traffic control instruction method
JP2012525017A (en) * 2009-04-01 2012-10-18 ニシラ ネットワークス, インコーポレイテッド Method and apparatus for implementing and managing virtual switches
JP2014131347A (en) * 2009-10-07 2014-07-10 Nec Corp Information system, control server, virtual network management method and program
US8830835B2 (en) 2011-08-17 2014-09-09 Nicira, Inc. Generating flows for managed interconnection switches
US8880468B2 (en) 2010-07-06 2014-11-04 Nicira, Inc. Secondary storage architecture for a network control system that utilizes a primary network information base
US8913611B2 (en) 2011-11-15 2014-12-16 Nicira, Inc. Connection identifier assignment and source network address translation
US8958298B2 (en) 2011-08-17 2015-02-17 Nicira, Inc. Centralized logical L3 routing
US8964528B2 (en) 2010-07-06 2015-02-24 Nicira, Inc. Method and apparatus for robust packet distribution among hierarchical managed switching elements
US9043452B2 (en) 2011-05-04 2015-05-26 Nicira, Inc. Network control apparatus and method for port isolation
US9083609B2 (en) 2007-09-26 2015-07-14 Nicira, Inc. Network operating system for managing and securing networks
US9137107B2 (en) 2011-10-25 2015-09-15 Nicira, Inc. Physical controllers for converting universal flows
US9154433B2 (en) 2011-10-25 2015-10-06 Nicira, Inc. Physical controller
US9203701B2 (en) 2011-10-25 2015-12-01 Nicira, Inc. Network virtualization apparatus and method with scheduling capabilities
US9225597B2 (en) 2014-03-14 2015-12-29 Nicira, Inc. Managed gateways peering with external router to attract ingress packets
US9288104B2 (en) 2011-10-25 2016-03-15 Nicira, Inc. Chassis controllers for converting universal flows
US9313129B2 (en) 2014-03-14 2016-04-12 Nicira, Inc. Logical router processing by network controller
US9385954B2 (en) 2014-03-31 2016-07-05 Nicira, Inc. Hashing techniques for use in a network environment
US9407580B2 (en) 2013-07-12 2016-08-02 Nicira, Inc. Maintaining data stored with a packet
US9413644B2 (en) 2014-03-27 2016-08-09 Nicira, Inc. Ingress ECMP in virtual distributed routing environment
US9419855B2 (en) 2014-03-14 2016-08-16 Nicira, Inc. Static routes for logical routers
US9503371B2 (en) 2013-09-04 2016-11-22 Nicira, Inc. High availability L3 gateways for logical networks
US9503321B2 (en) 2014-03-21 2016-11-22 Nicira, Inc. Dynamic routing for logical routers
US9525647B2 (en) 2010-07-06 2016-12-20 Nicira, Inc. Network control apparatus and method for creating and modifying logical switching elements
US9548924B2 (en) 2013-12-09 2017-01-17 Nicira, Inc. Detecting an elephant flow based on the size of a packet
US9569368B2 (en) 2013-12-13 2017-02-14 Nicira, Inc. Installing and managing flows in a flow table cache
US9571386B2 (en) 2013-07-08 2017-02-14 Nicira, Inc. Hybrid packet processing
US9575782B2 (en) 2013-10-13 2017-02-21 Nicira, Inc. ARP for logical router
US9577845B2 (en) 2013-09-04 2017-02-21 Nicira, Inc. Multiple active L3 gateways for logical networks
US9590901B2 (en) 2014-03-14 2017-03-07 Nicira, Inc. Route advertisement by managed gateways
US9602398B2 (en) 2013-09-15 2017-03-21 Nicira, Inc. Dynamically generating flows with wildcard fields
US9647883B2 (en) 2014-03-21 2017-05-09 Nicria, Inc. Multiple levels of logical routers
US9680750B2 (en) 2010-07-06 2017-06-13 Nicira, Inc. Use of tunnels to hide network addresses
US9768980B2 (en) 2014-09-30 2017-09-19 Nicira, Inc. Virtual distributed bridging
US9887960B2 (en) 2013-08-14 2018-02-06 Nicira, Inc. Providing services for logical networks
US9893988B2 (en) 2014-03-27 2018-02-13 Nicira, Inc. Address resolution using multiple designated instances of a logical router
US9952885B2 (en) 2013-08-14 2018-04-24 Nicira, Inc. Generation of configuration files for a DHCP module executing within a virtualized container
US9967199B2 (en) 2013-12-09 2018-05-08 Nicira, Inc. Inspecting operations of a machine to detect elephant flows
US9996467B2 (en) 2013-12-13 2018-06-12 Nicira, Inc. Dynamically adjusting the number of flows allowed in a flow table cache
US10020960B2 (en) 2014-09-30 2018-07-10 Nicira, Inc. Virtual distributed bridging
US10033579B2 (en) 2012-04-18 2018-07-24 Nicira, Inc. Using transactions to compute and propagate network forwarding state
US10038628B2 (en) 2015-04-04 2018-07-31 Nicira, Inc. Route server mode for dynamic routing between logical and physical networks
US10057157B2 (en) 2015-08-31 2018-08-21 Nicira, Inc. Automatically advertising NAT routes between logical routers
US10063458B2 (en) 2013-10-13 2018-08-28 Nicira, Inc. Asymmetric connection with external networks
US10079779B2 (en) 2015-01-30 2018-09-18 Nicira, Inc. Implementing logical router uplinks
US10091161B2 (en) 2016-04-30 2018-10-02 Nicira, Inc. Assignment of router ID for logical routers
US10095535B2 (en) 2015-10-31 2018-10-09 Nicira, Inc. Static route types for logical routers
US10103939B2 (en) 2010-07-06 2018-10-16 Nicira, Inc. Network control apparatus and method for populating logical datapath sets
US10129142B2 (en) 2015-08-11 2018-11-13 Nicira, Inc. Route configuration for logical router
US10153973B2 (en) 2016-06-29 2018-12-11 Nicira, Inc. Installation of routing tables for logical router in route server mode
US10181993B2 (en) 2013-07-12 2019-01-15 Nicira, Inc. Tracing network packets through logical and physical networks
US10193806B2 (en) 2014-03-31 2019-01-29 Nicira, Inc. Performing a finishing operation to improve the quality of a resulting hash
US10200306B2 (en) 2017-03-07 2019-02-05 Nicira, Inc. Visualization of packet tracing operation results
US10204122B2 (en) 2015-09-30 2019-02-12 Nicira, Inc. Implementing an interface between tuple and message-driven control entities
US10212071B2 (en) 2016-12-21 2019-02-19 Nicira, Inc. Bypassing a load balancer in a return path of network traffic
US10225184B2 (en) 2015-06-30 2019-03-05 Nicira, Inc. Redirecting traffic in a virtual distributed router environment
US10237123B2 (en) 2016-12-21 2019-03-19 Nicira, Inc. Dynamic recovery from a split-brain failure in edge nodes
US10250443B2 (en) 2014-09-30 2019-04-02 Nicira, Inc. Using physical location to modify behavior of a distributed virtual network element
US10333849B2 (en) 2016-04-28 2019-06-25 Nicira, Inc. Automatic configuration of logical routers on edge nodes
US10341236B2 (en) 2016-09-30 2019-07-02 Nicira, Inc. Anycast edge service gateways
US10374827B2 (en) 2017-11-14 2019-08-06 Nicira, Inc. Identifier that maps to different networks at different datacenters
US10454758B2 (en) 2016-08-31 2019-10-22 Nicira, Inc. Edge node cluster network redundancy and fast convergence using an underlay anycast VTEP IP
US10469342B2 (en) 2014-10-10 2019-11-05 Nicira, Inc. Logical network traffic analysis
US10484515B2 (en) 2016-04-29 2019-11-19 Nicira, Inc. Implementing logical metadata proxy servers in logical networks
US10498638B2 (en) 2013-09-15 2019-12-03 Nicira, Inc. Performing a multi-stage lookup to classify packets
US10511458B2 (en) 2014-09-30 2019-12-17 Nicira, Inc. Virtual distributed bridging
US10511459B2 (en) 2017-11-14 2019-12-17 Nicira, Inc. Selection of managed forwarding element for bridge spanning multiple datacenters
US10560320B2 (en) 2016-06-29 2020-02-11 Nicira, Inc. Ranking of gateways in cluster
US10608887B2 (en) 2017-10-06 2020-03-31 Nicira, Inc. Using packet tracing tool to automatically execute packet capture operations
US10616045B2 (en) 2016-12-22 2020-04-07 Nicira, Inc. Migration of centralized routing components of logical router
US10659373B2 (en) 2014-03-31 2020-05-19 Nicira, Inc Processing packets according to hierarchy of flow entry storages
US10742746B2 (en) 2016-12-21 2020-08-11 Nicira, Inc. Bypassing a load balancer in a return path of network traffic
US10797998B2 (en) 2018-12-05 2020-10-06 Vmware, Inc. Route server for distributed routers using hierarchical routing protocol
US10841273B2 (en) 2016-04-29 2020-11-17 Nicira, Inc. Implementing logical DHCP servers in logical networks
US10931560B2 (en) 2018-11-23 2021-02-23 Vmware, Inc. Using route type to determine routing protocol behavior
US10938788B2 (en) 2018-12-12 2021-03-02 Vmware, Inc. Static routes for policy-based VPN
US11019167B2 (en) 2016-04-29 2021-05-25 Nicira, Inc. Management of update queues for network controller
US11095480B2 (en) 2019-08-30 2021-08-17 Vmware, Inc. Traffic optimization using distributed edge services
US11178051B2 (en) 2014-09-30 2021-11-16 Vmware, Inc. Packet key parser for flow-based forwarding elements
US11196628B1 (en) 2020-07-29 2021-12-07 Vmware, Inc. Monitoring container clusters
US11201808B2 (en) 2013-07-12 2021-12-14 Nicira, Inc. Tracing logical network packets through physical network
US11336533B1 (en) 2021-01-08 2022-05-17 Vmware, Inc. Network visualization of correlations between logical elements and associated physical elements
US11451413B2 (en) 2020-07-28 2022-09-20 Vmware, Inc. Method for advertising availability of distributed gateway service and machines at host computer
US11558426B2 (en) 2020-07-29 2023-01-17 Vmware, Inc. Connection tracking for container cluster
US11570090B2 (en) 2020-07-29 2023-01-31 Vmware, Inc. Flow tracing operation in container cluster
US11606294B2 (en) 2020-07-16 2023-03-14 Vmware, Inc. Host computer configured to facilitate distributed SNAT service
US11611613B2 (en) 2020-07-24 2023-03-21 Vmware, Inc. Policy-based forwarding to a load balancer of a load balancing cluster
US11616755B2 (en) 2020-07-16 2023-03-28 Vmware, Inc. Facilitating distributed SNAT service
US11677645B2 (en) 2021-09-17 2023-06-13 Vmware, Inc. Traffic monitoring
US11687210B2 (en) 2021-07-05 2023-06-27 Vmware, Inc. Criteria-based expansion of group nodes in a network topology visualization
US11711278B2 (en) 2021-07-24 2023-07-25 Vmware, Inc. Visualization of flow trace operation across multiple sites
US11736436B2 (en) 2020-12-31 2023-08-22 Vmware, Inc. Identifying routes with indirect addressing in a datacenter
US11902050B2 (en) 2020-07-28 2024-02-13 VMware LLC Method for providing distributed gateway service at host computer
US11924080B2 (en) 2020-01-17 2024-03-05 VMware LLC Practical overlay network latency measurement in datacenter

Cited By (272)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4650607B2 (en) * 2004-01-14 2011-03-16 日本電気株式会社 Network management system, network management method, and network management program
JP2005203984A (en) * 2004-01-14 2005-07-28 Nec Corp System, method, and program for network management, and recording medium
JP2008502190A (en) * 2004-06-04 2008-01-24 ノキア インコーポレイテッド A system for geographically distributed virtual routing
JP4657294B2 (en) * 2004-06-04 2011-03-23 ノキア インコーポレイテッド A system for geographically distributed virtual routing
GB2431816A (en) * 2005-10-31 2007-05-02 Agilent Technologies Inc Discovering and providing near real-time updates of virtual private networks (VPN) topologies
KR100861592B1 (en) 2006-12-01 2008-10-07 한국전자통신연구원 Method and apparatus for managing fault in customer network management system
US9876672B2 (en) 2007-09-26 2018-01-23 Nicira, Inc. Network operating system for managing and securing networks
US9083609B2 (en) 2007-09-26 2015-07-14 Nicira, Inc. Network operating system for managing and securing networks
US11683214B2 (en) 2007-09-26 2023-06-20 Nicira, Inc. Network operating system for managing and securing networks
US10749736B2 (en) 2007-09-26 2020-08-18 Nicira, Inc. Network operating system for managing and securing networks
WO2010093369A1 (en) * 2009-02-16 2010-08-19 Qualitest Technologies, Inc. Communications-network data processing methods, communications-network data processing systems, computer-readable storage media, communications-network data presentation methods, and communications-network data presentation systems
US8589542B2 (en) 2009-02-16 2013-11-19 Qualitest Technologies, Inc. First application receiving text script or application program interface (API) call from second application and executing applications in independent memory spaces
US10931600B2 (en) 2009-04-01 2021-02-23 Nicira, Inc. Method and apparatus for implementing and managing virtual switches
US11425055B2 (en) 2009-04-01 2022-08-23 Nicira, Inc. Method and apparatus for implementing and managing virtual switches
US8966035B2 (en) 2009-04-01 2015-02-24 Nicira, Inc. Method and apparatus for implementing and managing distributed virtual switches in several hosts and physical forwarding elements
JP2012525017A (en) * 2009-04-01 2012-10-18 ニシラ ネットワークス, インコーポレイテッド Method and apparatus for implementing and managing virtual switches
US9590919B2 (en) 2009-04-01 2017-03-07 Nicira, Inc. Method and apparatus for implementing and managing virtual switches
US11381455B2 (en) 2009-10-07 2022-07-05 Nec Corporation Information system, control server, virtual network management method, and program
US9794124B2 (en) 2009-10-07 2017-10-17 Nec Corporation Information system, control server, virtual network management method, and program
JP2014131347A (en) * 2009-10-07 2014-07-10 Nec Corp Information system, control server, virtual network management method and program
US9148342B2 (en) 2009-10-07 2015-09-29 Nec Corporation Information system, control server, virtual network management method, and program
JP2011228864A (en) * 2010-04-16 2011-11-10 Nippon Telegr & Teleph Corp <Ntt> Traffic control instruction apparatus, traffic control instruction program, traffic control instruction system, and traffic control instruction method
US9049153B2 (en) 2010-07-06 2015-06-02 Nicira, Inc. Logical packet processing pipeline that retains state information to effectuate efficient processing of packets
US10326660B2 (en) 2010-07-06 2019-06-18 Nicira, Inc. Network virtualization apparatus and method
US8964598B2 (en) 2010-07-06 2015-02-24 Nicira, Inc. Mesh architectures for managed switching elements
US9008087B2 (en) 2010-07-06 2015-04-14 Nicira, Inc. Processing requests in a network control system with multiple controller instances
US9007903B2 (en) 2010-07-06 2015-04-14 Nicira, Inc. Managing a network by controlling edge and non-edge switching elements
US11743123B2 (en) 2010-07-06 2023-08-29 Nicira, Inc. Managed switch architectures: software managed switches, hardware managed switches, and heterogeneous managed switches
US9306875B2 (en) 2010-07-06 2016-04-05 Nicira, Inc. Managed switch architectures for implementing logical datapath sets
US11641321B2 (en) 2010-07-06 2023-05-02 Nicira, Inc. Packet processing for logical datapath sets
US9680750B2 (en) 2010-07-06 2017-06-13 Nicira, Inc. Use of tunnels to hide network addresses
US9077664B2 (en) 2010-07-06 2015-07-07 Nicira, Inc. One-hop packet processing in a network with managed switching elements
US10038597B2 (en) 2010-07-06 2018-07-31 Nicira, Inc. Mesh architectures for managed switching elements
US9106587B2 (en) 2010-07-06 2015-08-11 Nicira, Inc. Distributed network control system with one master controller per managed switching element
US9112811B2 (en) 2010-07-06 2015-08-18 Nicira, Inc. Managed switching elements used as extenders
US10103939B2 (en) 2010-07-06 2018-10-16 Nicira, Inc. Network control apparatus and method for populating logical datapath sets
US8966040B2 (en) 2010-07-06 2015-02-24 Nicira, Inc. Use of network information base structure to establish communication between applications
US8964528B2 (en) 2010-07-06 2015-02-24 Nicira, Inc. Method and apparatus for robust packet distribution among hierarchical managed switching elements
US11876679B2 (en) 2010-07-06 2024-01-16 Nicira, Inc. Method and apparatus for interacting with a network information base in a distributed network control system with multiple controller instances
US9172663B2 (en) 2010-07-06 2015-10-27 Nicira, Inc. Method and apparatus for replicating network information base in a distributed network control system with multiple controller instances
US10320585B2 (en) 2010-07-06 2019-06-11 Nicira, Inc. Network control apparatus and method for creating and modifying logical switching elements
US9692655B2 (en) 2010-07-06 2017-06-27 Nicira, Inc. Packet processing in a network with hierarchical managed switching elements
US10686663B2 (en) 2010-07-06 2020-06-16 Nicira, Inc. Managed switch architectures: software managed switches, hardware managed switches, and heterogeneous managed switches
US8958292B2 (en) 2010-07-06 2015-02-17 Nicira, Inc. Network control apparatus and method with port security controls
US10021019B2 (en) 2010-07-06 2018-07-10 Nicira, Inc. Packet processing for logical datapath sets
US8959215B2 (en) 2010-07-06 2015-02-17 Nicira, Inc. Network virtualization
US11677588B2 (en) 2010-07-06 2023-06-13 Nicira, Inc. Network control apparatus and method for creating and modifying logical switching elements
US9231891B2 (en) 2010-07-06 2016-01-05 Nicira, Inc. Deployment of hierarchical managed switching elements
US9525647B2 (en) 2010-07-06 2016-12-20 Nicira, Inc. Network control apparatus and method for creating and modifying logical switching elements
US11223531B2 (en) 2010-07-06 2022-01-11 Nicira, Inc. Method and apparatus for interacting with a network information base in a distributed network control system with multiple controller instances
US8913483B2 (en) 2010-07-06 2014-12-16 Nicira, Inc. Fault tolerant managed switching element architecture
US11979280B2 (en) 2010-07-06 2024-05-07 Nicira, Inc. Network control apparatus and method for populating logical datapath sets
US8880468B2 (en) 2010-07-06 2014-11-04 Nicira, Inc. Secondary storage architecture for a network control system that utilizes a primary network information base
US11509564B2 (en) 2010-07-06 2022-11-22 Nicira, Inc. Method and apparatus for replicating network information base in a distributed network control system with multiple controller instances
US9391928B2 (en) 2010-07-06 2016-07-12 Nicira, Inc. Method and apparatus for interacting with a network information base in a distributed network control system with multiple controller instances
US9300603B2 (en) 2010-07-06 2016-03-29 Nicira, Inc. Use of rich context tags in logical data processing
US11539591B2 (en) 2010-07-06 2022-12-27 Nicira, Inc. Distributed network control system with one master controller per logical datapath set
US9363210B2 (en) 2010-07-06 2016-06-07 Nicira, Inc. Distributed network control system with one master controller per logical datapath set
US9043452B2 (en) 2011-05-04 2015-05-26 Nicira, Inc. Network control apparatus and method for port isolation
US9444651B2 (en) 2011-08-17 2016-09-13 Nicira, Inc. Flow generation from second level controller to first level controller to managed switching element
US9209998B2 (en) 2011-08-17 2015-12-08 Nicira, Inc. Packet processing in managed interconnection switching elements
US8830835B2 (en) 2011-08-17 2014-09-09 Nicira, Inc. Generating flows for managed interconnection switches
US8958298B2 (en) 2011-08-17 2015-02-17 Nicira, Inc. Centralized logical L3 routing
US9319375B2 (en) 2011-08-17 2016-04-19 Nicira, Inc. Flow templating in logical L3 routing
US9350696B2 (en) 2011-08-17 2016-05-24 Nicira, Inc. Handling NAT in logical L3 routing
US9356906B2 (en) 2011-08-17 2016-05-31 Nicira, Inc. Logical L3 routing with DHCP
US10027584B2 (en) 2011-08-17 2018-07-17 Nicira, Inc. Distributed logical L3 routing
US9369426B2 (en) 2011-08-17 2016-06-14 Nicira, Inc. Distributed logical L3 routing
US8964767B2 (en) 2011-08-17 2015-02-24 Nicira, Inc. Packet processing in federated network
US10091028B2 (en) 2011-08-17 2018-10-02 Nicira, Inc. Hierarchical controller clusters for interconnecting two or more logical datapath sets
US9407599B2 (en) 2011-08-17 2016-08-02 Nicira, Inc. Handling NAT migration in logical L3 routing
US9288081B2 (en) 2011-08-17 2016-03-15 Nicira, Inc. Connecting unmanaged segmented networks by managing interconnection switching elements
US11804987B2 (en) 2011-08-17 2023-10-31 Nicira, Inc. Flow generation from second level controller to first level controller to managed switching element
US9059999B2 (en) 2011-08-17 2015-06-16 Nicira, Inc. Load balancing in a logical pipeline
US9276897B2 (en) 2011-08-17 2016-03-01 Nicira, Inc. Distributed logical L3 routing
US9137052B2 (en) 2011-08-17 2015-09-15 Nicira, Inc. Federating interconnection switching element network to two or more levels
US9461960B2 (en) 2011-08-17 2016-10-04 Nicira, Inc. Logical L3 daemon
US10193708B2 (en) 2011-08-17 2019-01-29 Nicira, Inc. Multi-domain interconnect
US10931481B2 (en) 2011-08-17 2021-02-23 Nicira, Inc. Multi-domain interconnect
US11695695B2 (en) 2011-08-17 2023-07-04 Nicira, Inc. Logical L3 daemon
US9185069B2 (en) 2011-08-17 2015-11-10 Nicira, Inc. Handling reverse NAT in logical L3 routing
US10868761B2 (en) 2011-08-17 2020-12-15 Nicira, Inc. Logical L3 daemon
US9203701B2 (en) 2011-10-25 2015-12-01 Nicira, Inc. Network virtualization apparatus and method with scheduling capabilities
US9319336B2 (en) 2011-10-25 2016-04-19 Nicira, Inc. Scheduling distribution of logical control plane data
US10505856B2 (en) 2011-10-25 2019-12-10 Nicira, Inc. Chassis controller
US9178833B2 (en) 2011-10-25 2015-11-03 Nicira, Inc. Chassis controller
US9231882B2 (en) 2011-10-25 2016-01-05 Nicira, Inc. Maintaining quality of service in shared forwarding elements managed by a network control system
US9154433B2 (en) 2011-10-25 2015-10-06 Nicira, Inc. Physical controller
US9137107B2 (en) 2011-10-25 2015-09-15 Nicira, Inc. Physical controllers for converting universal flows
US9246833B2 (en) 2011-10-25 2016-01-26 Nicira, Inc. Pull-based state dissemination between managed forwarding elements
US9602421B2 (en) 2011-10-25 2017-03-21 Nicira, Inc. Nesting transaction updates to minimize communication
US9253109B2 (en) 2011-10-25 2016-02-02 Nicira, Inc. Communication channel for distributed network control system
US9288104B2 (en) 2011-10-25 2016-03-15 Nicira, Inc. Chassis controllers for converting universal flows
US9407566B2 (en) 2011-10-25 2016-08-02 Nicira, Inc. Distributed network control system
US9300593B2 (en) 2011-10-25 2016-03-29 Nicira, Inc. Scheduling distribution of logical forwarding plane data
US9306864B2 (en) 2011-10-25 2016-04-05 Nicira, Inc. Scheduling distribution of physical control plane data
US11669488B2 (en) 2011-10-25 2023-06-06 Nicira, Inc. Chassis controller
US9319337B2 (en) 2011-10-25 2016-04-19 Nicira, Inc. Universal physical control plane
US9319338B2 (en) 2011-10-25 2016-04-19 Nicira, Inc. Tunnel creation
US9954793B2 (en) 2011-10-25 2018-04-24 Nicira, Inc. Chassis controller
US10191763B2 (en) 2011-11-15 2019-01-29 Nicira, Inc. Architecture of networks with middleboxes
US10884780B2 (en) 2011-11-15 2021-01-05 Nicira, Inc. Architecture of networks with middleboxes
US10949248B2 (en) 2011-11-15 2021-03-16 Nicira, Inc. Load balancing and destination network address translation middleboxes
US11372671B2 (en) 2011-11-15 2022-06-28 Nicira, Inc. Architecture of networks with middleboxes
US10310886B2 (en) 2011-11-15 2019-06-04 Nicira, Inc. Network control system for configuring middleboxes
US10514941B2 (en) 2011-11-15 2019-12-24 Nicira, Inc. Load balancing and destination network address translation middleboxes
US10235199B2 (en) 2011-11-15 2019-03-19 Nicira, Inc. Migrating middlebox state for distributed middleboxes
US9195491B2 (en) 2011-11-15 2015-11-24 Nicira, Inc. Migrating middlebox state for distributed middleboxes
US9172603B2 (en) 2011-11-15 2015-10-27 Nicira, Inc. WAN optimizer for logical networks
US9558027B2 (en) 2011-11-15 2017-01-31 Nicira, Inc. Network control system for configuring middleboxes
US11593148B2 (en) 2011-11-15 2023-02-28 Nicira, Inc. Network control system for configuring middleboxes
US8913611B2 (en) 2011-11-15 2014-12-16 Nicira, Inc. Connection identifier assignment and source network address translation
US8966024B2 (en) 2011-11-15 2015-02-24 Nicira, Inc. Architecture of networks with middleboxes
US10922124B2 (en) 2011-11-15 2021-02-16 Nicira, Inc. Network control system for configuring middleboxes
US9306909B2 (en) 2011-11-15 2016-04-05 Nicira, Inc. Connection identifier assignment and source network address translation
US9697030B2 (en) 2011-11-15 2017-07-04 Nicira, Inc. Connection identifier assignment and source network address translation
US9552219B2 (en) 2011-11-15 2017-01-24 Nicira, Inc. Migrating middlebox state for distributed middleboxes
US8966029B2 (en) 2011-11-15 2015-02-24 Nicira, Inc. Network control system for configuring middleboxes
US10089127B2 (en) 2011-11-15 2018-10-02 Nicira, Inc. Control plane interface for logical middlebox services
US11740923B2 (en) 2011-11-15 2023-08-29 Nicira, Inc. Architecture of networks with middleboxes
US9015823B2 (en) 2011-11-15 2015-04-21 Nicira, Inc. Firewalls in logical networks
US9697033B2 (en) 2011-11-15 2017-07-04 Nicira, Inc. Architecture of networks with middleboxes
US10977067B2 (en) 2011-11-15 2021-04-13 Nicira, Inc. Control plane interface for logical middlebox services
US10033579B2 (en) 2012-04-18 2018-07-24 Nicira, Inc. Using transactions to compute and propagate network forwarding state
US10135676B2 (en) 2012-04-18 2018-11-20 Nicira, Inc. Using transactions to minimize churn in a distributed network control system
US9571386B2 (en) 2013-07-08 2017-02-14 Nicira, Inc. Hybrid packet processing
US10033640B2 (en) 2013-07-08 2018-07-24 Nicira, Inc. Hybrid packet processing
US10680948B2 (en) 2013-07-08 2020-06-09 Nicira, Inc. Hybrid packet processing
US10181993B2 (en) 2013-07-12 2019-01-15 Nicira, Inc. Tracing network packets through logical and physical networks
US10778557B2 (en) 2013-07-12 2020-09-15 Nicira, Inc. Tracing network packets through logical and physical networks
US9407580B2 (en) 2013-07-12 2016-08-02 Nicira, Inc. Maintaining data stored with a packet
US11201808B2 (en) 2013-07-12 2021-12-14 Nicira, Inc. Tracing logical network packets through physical network
US11695730B2 (en) 2013-08-14 2023-07-04 Nicira, Inc. Providing services for logical networks
US9952885B2 (en) 2013-08-14 2018-04-24 Nicira, Inc. Generation of configuration files for a DHCP module executing within a virtualized container
US10764238B2 (en) 2013-08-14 2020-09-01 Nicira, Inc. Providing services for logical networks
US9887960B2 (en) 2013-08-14 2018-02-06 Nicira, Inc. Providing services for logical networks
US10003534B2 (en) 2013-09-04 2018-06-19 Nicira, Inc. Multiple active L3 gateways for logical networks
US9503371B2 (en) 2013-09-04 2016-11-22 Nicira, Inc. High availability L3 gateways for logical networks
US9577845B2 (en) 2013-09-04 2017-02-21 Nicira, Inc. Multiple active L3 gateways for logical networks
US10389634B2 (en) 2013-09-04 2019-08-20 Nicira, Inc. Multiple active L3 gateways for logical networks
US10382324B2 (en) 2013-09-15 2019-08-13 Nicira, Inc. Dynamically generating flows with wildcard fields
US10498638B2 (en) 2013-09-15 2019-12-03 Nicira, Inc. Performing a multi-stage lookup to classify packets
US9602398B2 (en) 2013-09-15 2017-03-21 Nicira, Inc. Dynamically generating flows with wildcard fields
US9977685B2 (en) 2013-10-13 2018-05-22 Nicira, Inc. Configuration of logical router
US9785455B2 (en) 2013-10-13 2017-10-10 Nicira, Inc. Logical router
US11029982B2 (en) 2013-10-13 2021-06-08 Nicira, Inc. Configuration of logical router
US10528373B2 (en) 2013-10-13 2020-01-07 Nicira, Inc. Configuration of logical router
US10063458B2 (en) 2013-10-13 2018-08-28 Nicira, Inc. Asymmetric connection with external networks
US9575782B2 (en) 2013-10-13 2017-02-21 Nicira, Inc. ARP for logical router
US9910686B2 (en) 2013-10-13 2018-03-06 Nicira, Inc. Bridging between network segments with a logical router
US10693763B2 (en) 2013-10-13 2020-06-23 Nicira, Inc. Asymmetric connection with external networks
US11539630B2 (en) 2013-12-09 2022-12-27 Nicira, Inc. Inspecting operations of a machine to detect elephant flows
US10158538B2 (en) 2013-12-09 2018-12-18 Nicira, Inc. Reporting elephant flows to a network controller
US9838276B2 (en) 2013-12-09 2017-12-05 Nicira, Inc. Detecting an elephant flow based on the size of a packet
US10666530B2 (en) 2013-12-09 2020-05-26 Nicira, Inc Detecting and handling large flows
US9967199B2 (en) 2013-12-09 2018-05-08 Nicira, Inc. Inspecting operations of a machine to detect elephant flows
US11811669B2 (en) 2013-12-09 2023-11-07 Nicira, Inc. Inspecting operations of a machine to detect elephant flows
US9548924B2 (en) 2013-12-09 2017-01-17 Nicira, Inc. Detecting an elephant flow based on the size of a packet
US11095536B2 (en) 2013-12-09 2021-08-17 Nicira, Inc. Detecting and handling large flows
US10193771B2 (en) 2013-12-09 2019-01-29 Nicira, Inc. Detecting and handling elephant flows
US9996467B2 (en) 2013-12-13 2018-06-12 Nicira, Inc. Dynamically adjusting the number of flows allowed in a flow table cache
US9569368B2 (en) 2013-12-13 2017-02-14 Nicira, Inc. Installing and managing flows in a flow table cache
US10380019B2 (en) 2013-12-13 2019-08-13 Nicira, Inc. Dynamically adjusting the number of flows allowed in a flow table cache
US9313129B2 (en) 2014-03-14 2016-04-12 Nicira, Inc. Logical router processing by network controller
US9590901B2 (en) 2014-03-14 2017-03-07 Nicira, Inc. Route advertisement by managed gateways
US10164881B2 (en) 2014-03-14 2018-12-25 Nicira, Inc. Route advertisement by managed gateways
US11025543B2 (en) 2014-03-14 2021-06-01 Nicira, Inc. Route advertisement by managed gateways
US9225597B2 (en) 2014-03-14 2015-12-29 Nicira, Inc. Managed gateways peering with external router to attract ingress packets
US10110431B2 (en) 2014-03-14 2018-10-23 Nicira, Inc. Logical router processing by network controller
US10567283B2 (en) 2014-03-14 2020-02-18 Nicira, Inc. Route advertisement by managed gateways
US9419855B2 (en) 2014-03-14 2016-08-16 Nicira, Inc. Static routes for logical routers
US11252024B2 (en) 2014-03-21 2022-02-15 Nicira, Inc. Multiple levels of logical routers
US9647883B2 (en) 2014-03-21 2017-05-09 Nicria, Inc. Multiple levels of logical routers
US10411955B2 (en) 2014-03-21 2019-09-10 Nicira, Inc. Multiple levels of logical routers
US9503321B2 (en) 2014-03-21 2016-11-22 Nicira, Inc. Dynamic routing for logical routers
US9413644B2 (en) 2014-03-27 2016-08-09 Nicira, Inc. Ingress ECMP in virtual distributed routing environment
US11736394B2 (en) 2014-03-27 2023-08-22 Nicira, Inc. Address resolution using multiple designated instances of a logical router
US11190443B2 (en) 2014-03-27 2021-11-30 Nicira, Inc. Address resolution using multiple designated instances of a logical router
US9893988B2 (en) 2014-03-27 2018-02-13 Nicira, Inc. Address resolution using multiple designated instances of a logical router
US11431639B2 (en) 2014-03-31 2022-08-30 Nicira, Inc. Caching of service decisions
US10659373B2 (en) 2014-03-31 2020-05-19 Nicira, Inc Processing packets according to hierarchy of flow entry storages
US9385954B2 (en) 2014-03-31 2016-07-05 Nicira, Inc. Hashing techniques for use in a network environment
US10193806B2 (en) 2014-03-31 2019-01-29 Nicira, Inc. Performing a finishing operation to improve the quality of a resulting hash
US10511458B2 (en) 2014-09-30 2019-12-17 Nicira, Inc. Virtual distributed bridging
US10020960B2 (en) 2014-09-30 2018-07-10 Nicira, Inc. Virtual distributed bridging
US11483175B2 (en) 2014-09-30 2022-10-25 Nicira, Inc. Virtual distributed bridging
US9768980B2 (en) 2014-09-30 2017-09-19 Nicira, Inc. Virtual distributed bridging
US10250443B2 (en) 2014-09-30 2019-04-02 Nicira, Inc. Using physical location to modify behavior of a distributed virtual network element
US11252037B2 (en) 2014-09-30 2022-02-15 Nicira, Inc. Using physical location to modify behavior of a distributed virtual network element
US11178051B2 (en) 2014-09-30 2021-11-16 Vmware, Inc. Packet key parser for flow-based forwarding elements
US10469342B2 (en) 2014-10-10 2019-11-05 Nicira, Inc. Logical network traffic analysis
US11128550B2 (en) 2014-10-10 2021-09-21 Nicira, Inc. Logical network traffic analysis
US11283731B2 (en) 2015-01-30 2022-03-22 Nicira, Inc. Logical router with multiple routing components
US11799800B2 (en) 2015-01-30 2023-10-24 Nicira, Inc. Logical router with multiple routing components
US10700996B2 (en) 2015-01-30 2020-06-30 Nicira, Inc Logical router with multiple routing components
US10079779B2 (en) 2015-01-30 2018-09-18 Nicira, Inc. Implementing logical router uplinks
US10129180B2 (en) 2015-01-30 2018-11-13 Nicira, Inc. Transit logical switch within logical router
US11601362B2 (en) 2015-04-04 2023-03-07 Nicira, Inc. Route server mode for dynamic routing between logical and physical networks
US10038628B2 (en) 2015-04-04 2018-07-31 Nicira, Inc. Route server mode for dynamic routing between logical and physical networks
US10652143B2 (en) 2015-04-04 2020-05-12 Nicira, Inc Route server mode for dynamic routing between logical and physical networks
US11050666B2 (en) 2015-06-30 2021-06-29 Nicira, Inc. Intermediate logical interfaces in a virtual distributed router environment
US10348625B2 (en) 2015-06-30 2019-07-09 Nicira, Inc. Sharing common L2 segment in a virtual distributed router environment
US10225184B2 (en) 2015-06-30 2019-03-05 Nicira, Inc. Redirecting traffic in a virtual distributed router environment
US10693783B2 (en) 2015-06-30 2020-06-23 Nicira, Inc. Intermediate logical interfaces in a virtual distributed router environment
US11799775B2 (en) 2015-06-30 2023-10-24 Nicira, Inc. Intermediate logical interfaces in a virtual distributed router environment
US10361952B2 (en) 2015-06-30 2019-07-23 Nicira, Inc. Intermediate logical interfaces in a virtual distributed router environment
US10805212B2 (en) 2015-08-11 2020-10-13 Nicira, Inc. Static route configuration for logical router
US11533256B2 (en) 2015-08-11 2022-12-20 Nicira, Inc. Static route configuration for logical router
US10230629B2 (en) 2015-08-11 2019-03-12 Nicira, Inc. Static route configuration for logical router
US10129142B2 (en) 2015-08-11 2018-11-13 Nicira, Inc. Route configuration for logical router
US10075363B2 (en) 2015-08-31 2018-09-11 Nicira, Inc. Authorization for advertised routes among logical routers
US11425021B2 (en) 2015-08-31 2022-08-23 Nicira, Inc. Authorization for advertised routes among logical routers
US10057157B2 (en) 2015-08-31 2018-08-21 Nicira, Inc. Automatically advertising NAT routes between logical routers
US10601700B2 (en) 2015-08-31 2020-03-24 Nicira, Inc. Authorization for advertised routes among logical routers
US11288249B2 (en) 2015-09-30 2022-03-29 Nicira, Inc. Implementing an interface between tuple and message-driven control entities
US10204122B2 (en) 2015-09-30 2019-02-12 Nicira, Inc. Implementing an interface between tuple and message-driven control entities
US11593145B2 (en) 2015-10-31 2023-02-28 Nicira, Inc. Static route types for logical routers
US10795716B2 (en) 2015-10-31 2020-10-06 Nicira, Inc. Static route types for logical routers
US10095535B2 (en) 2015-10-31 2018-10-09 Nicira, Inc. Static route types for logical routers
US10333849B2 (en) 2016-04-28 2019-06-25 Nicira, Inc. Automatic configuration of logical routers on edge nodes
US11502958B2 (en) 2016-04-28 2022-11-15 Nicira, Inc. Automatic configuration of logical routers on edge nodes
US10805220B2 (en) 2016-04-28 2020-10-13 Nicira, Inc. Automatic configuration of logical routers on edge nodes
US11019167B2 (en) 2016-04-29 2021-05-25 Nicira, Inc. Management of update queues for network controller
US10841273B2 (en) 2016-04-29 2020-11-17 Nicira, Inc. Implementing logical DHCP servers in logical networks
US11855959B2 (en) 2016-04-29 2023-12-26 Nicira, Inc. Implementing logical DHCP servers in logical networks
US10484515B2 (en) 2016-04-29 2019-11-19 Nicira, Inc. Implementing logical metadata proxy servers in logical networks
US11601521B2 (en) 2016-04-29 2023-03-07 Nicira, Inc. Management of update queues for network controller
US10091161B2 (en) 2016-04-30 2018-10-02 Nicira, Inc. Assignment of router ID for logical routers
US11418445B2 (en) 2016-06-29 2022-08-16 Nicira, Inc. Installation of routing tables for logical router in route server mode
US10560320B2 (en) 2016-06-29 2020-02-11 Nicira, Inc. Ranking of gateways in cluster
US10749801B2 (en) 2016-06-29 2020-08-18 Nicira, Inc. Installation of routing tables for logical router in route server mode
US10153973B2 (en) 2016-06-29 2018-12-11 Nicira, Inc. Installation of routing tables for logical router in route server mode
US11539574B2 (en) 2016-08-31 2022-12-27 Nicira, Inc. Edge node cluster network redundancy and fast convergence using an underlay anycast VTEP IP
US10454758B2 (en) 2016-08-31 2019-10-22 Nicira, Inc. Edge node cluster network redundancy and fast convergence using an underlay anycast VTEP IP
US10341236B2 (en) 2016-09-30 2019-07-02 Nicira, Inc. Anycast edge service gateways
US10911360B2 (en) 2016-09-30 2021-02-02 Nicira, Inc. Anycast edge service gateways
US11665242B2 (en) 2016-12-21 2023-05-30 Nicira, Inc. Bypassing a load balancer in a return path of network traffic
US10742746B2 (en) 2016-12-21 2020-08-11 Nicira, Inc. Bypassing a load balancer in a return path of network traffic
US10212071B2 (en) 2016-12-21 2019-02-19 Nicira, Inc. Bypassing a load balancer in a return path of network traffic
US10237123B2 (en) 2016-12-21 2019-03-19 Nicira, Inc. Dynamic recovery from a split-brain failure in edge nodes
US10645204B2 (en) 2016-12-21 2020-05-05 Nicira, Inc Dynamic recovery from a split-brain failure in edge nodes
US10616045B2 (en) 2016-12-22 2020-04-07 Nicira, Inc. Migration of centralized routing components of logical router
US11115262B2 (en) 2016-12-22 2021-09-07 Nicira, Inc. Migration of centralized routing components of logical router
US11336590B2 (en) 2017-03-07 2022-05-17 Nicira, Inc. Visualization of path between logical network endpoints
US10200306B2 (en) 2017-03-07 2019-02-05 Nicira, Inc. Visualization of packet tracing operation results
US10805239B2 (en) 2017-03-07 2020-10-13 Nicira, Inc. Visualization of path between logical network endpoints
US10608887B2 (en) 2017-10-06 2020-03-31 Nicira, Inc. Using packet tracing tool to automatically execute packet capture operations
US10374827B2 (en) 2017-11-14 2019-08-06 Nicira, Inc. Identifier that maps to different networks at different datacenters
US10511459B2 (en) 2017-11-14 2019-12-17 Nicira, Inc. Selection of managed forwarding element for bridge spanning multiple datacenters
US11336486B2 (en) 2017-11-14 2022-05-17 Nicira, Inc. Selection of managed forwarding element for bridge spanning multiple datacenters
US10931560B2 (en) 2018-11-23 2021-02-23 Vmware, Inc. Using route type to determine routing protocol behavior
US10797998B2 (en) 2018-12-05 2020-10-06 Vmware, Inc. Route server for distributed routers using hierarchical routing protocol
US10938788B2 (en) 2018-12-12 2021-03-02 Vmware, Inc. Static routes for policy-based VPN
US11095480B2 (en) 2019-08-30 2021-08-17 Vmware, Inc. Traffic optimization using distributed edge services
US11159343B2 (en) 2019-08-30 2021-10-26 Vmware, Inc. Configuring traffic optimization using distributed edge services
US11924080B2 (en) 2020-01-17 2024-03-05 VMware LLC Practical overlay network latency measurement in datacenter
US11616755B2 (en) 2020-07-16 2023-03-28 Vmware, Inc. Facilitating distributed SNAT service
US11606294B2 (en) 2020-07-16 2023-03-14 Vmware, Inc. Host computer configured to facilitate distributed SNAT service
US11611613B2 (en) 2020-07-24 2023-03-21 Vmware, Inc. Policy-based forwarding to a load balancer of a load balancing cluster
US11902050B2 (en) 2020-07-28 2024-02-13 VMware LLC Method for providing distributed gateway service at host computer
US11451413B2 (en) 2020-07-28 2022-09-20 Vmware, Inc. Method for advertising availability of distributed gateway service and machines at host computer
US11570090B2 (en) 2020-07-29 2023-01-31 Vmware, Inc. Flow tracing operation in container cluster
US11196628B1 (en) 2020-07-29 2021-12-07 Vmware, Inc. Monitoring container clusters
US11558426B2 (en) 2020-07-29 2023-01-17 Vmware, Inc. Connection tracking for container cluster
US11736436B2 (en) 2020-12-31 2023-08-22 Vmware, Inc. Identifying routes with indirect addressing in a datacenter
US11336533B1 (en) 2021-01-08 2022-05-17 Vmware, Inc. Network visualization of correlations between logical elements and associated physical elements
US11848825B2 (en) 2021-01-08 2023-12-19 Vmware, Inc. Network visualization of correlations between logical elements and associated physical elements
US11687210B2 (en) 2021-07-05 2023-06-27 Vmware, Inc. Criteria-based expansion of group nodes in a network topology visualization
US11711278B2 (en) 2021-07-24 2023-07-25 Vmware, Inc. Visualization of flow trace operation across multiple sites
US11855862B2 (en) 2021-09-17 2023-12-26 Vmware, Inc. Tagging packets for monitoring and analysis
US11706109B2 (en) 2021-09-17 2023-07-18 Vmware, Inc. Performance of traffic monitoring actions
US11677645B2 (en) 2021-09-17 2023-06-13 Vmware, Inc. Traffic monitoring

Also Published As

Publication number Publication date
JP3904968B2 (en) 2007-04-11

Similar Documents

Publication Publication Date Title
JP3904968B2 (en) VPN system and router
US11689497B2 (en) Auto deploying network for virtual private cloud with heterogenous workloads
US7379987B2 (en) Integrated service management system
US7693980B2 (en) Integrated service management system
US7174390B2 (en) Address resolution protocol system and method in a virtual network
US9276827B2 (en) Allocating computing resources based upon geographic movement
CN111478852B (en) Route advertisement for managed gateways
US20030154236A1 (en) Database Switch enabling a database area network
US20070233825A1 (en) Reconfigurable, virtual processing system, cluster, network and method
US20060107108A1 (en) Service clusters and method in a processing system with failover capability
JP2005506726A (en) Virtual network system and method in processing system
JP2000312226A (en) Method for warranting communication quality
JP2004048125A (en) Connection control, device method therefor, and program thereof
JP3792707B2 (en) Data communication load distribution control program and data load distribution control method
JP3609948B2 (en) Multiprotocol network management method, multiprotocol network management proxy server system, multiprotocol address management server system, and multiprotocol network management system
JP6422345B2 (en) Management device, management system, management method, and program
JP3708444B2 (en) Multiprocessor information processing device
JP3857176B2 (en) Relay router and network and connection rearrangement method
JP5542098B2 (en) Route control apparatus, route control program, route control method, and route control system

Legal Events

Date Code Title Description
A621 Written request for application examination

Free format text: JAPANESE INTERMEDIATE CODE: A621

Effective date: 20040804

A977 Report on retrieval

Free format text: JAPANESE INTERMEDIATE CODE: A971007

Effective date: 20060120

A131 Notification of reasons for refusal

Free format text: JAPANESE INTERMEDIATE CODE: A131

Effective date: 20060131

A521 Written amendment

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20060328

A131 Notification of reasons for refusal

Free format text: JAPANESE INTERMEDIATE CODE: A131

Effective date: 20060829

A521 Written amendment

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20061012

TRDD Decision of grant or rejection written
A01 Written decision to grant a patent or to grant a registration (utility model)

Free format text: JAPANESE INTERMEDIATE CODE: A01

Effective date: 20070109

A61 First payment of annual fees (during grant procedure)

Free format text: JAPANESE INTERMEDIATE CODE: A61

Effective date: 20070110

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20110119

Year of fee payment: 4

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20110119

Year of fee payment: 4

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20120119

Year of fee payment: 5

FPAY Renewal fee payment (event date is renewal date of database)

Free format text: PAYMENT UNTIL: 20130119

Year of fee payment: 6

S531 Written request for registration of change of domicile

Free format text: JAPANESE INTERMEDIATE CODE: R313531

R350 Written notification of registration of transfer

Free format text: JAPANESE INTERMEDIATE CODE: R350

LAPS Cancellation because of no payment of annual fees