Transparent Migration of Virtual Network Functions

ABSTRACT

A method includes identifying a middlebox receiving network flow and communicating with one or more backend virtual machines. The method also includes receiving flow statistics corresponding to the network flow of the middlebox and determining whether the flow statistics satisfy an offload rule. The offload rule indicates when to migrate the network flow from the middlebox to an end host. When the flow statistics satisfy the offload rule, the method also includes migrating the network flow from the middlebox to the end host.

CROSS REFERENCE TO RELATED APPLICATIONS

This U.S. patent application is a continuation of, and claims priorityunder 35 U.S.C. § 120 from, U.S. patent application Ser. No. 16/219,929,filed on Dec. 13, 2018. The disclosure of this prior application isconsidered part of the disclosure of this application and is herebyincorporated by reference in its entirety.

TECHNICAL FIELD

This disclosure relates to transparent migration of virtual networkfunctions.

BACKGROUND

Computing devices in a software-defined network may not have physicalconnections, but may be virtually linked to one another (i.e., a virtualnetwork). Software-defined networking allows networks to be managedthrough abstraction of lower level functionality. A control plane in avirtual network usually makes decisions about how to route data packetsof network traffic from a source virtual machine in the network to adestination virtual machine. A data plane forwards network traffic toselected destinations. In a software-defined network, methods of networkvirtualization decouple the control plane of a network from the dataplane. Therefore, virtual networks often bear little resemblance to theunderlying physical network, which means that traditional techniques formaking networks scale do not work for virtual networks. As a result,scaling to form large virtual networks can be problematic usingconventional network functionality.

SUMMARY

One aspect of the disclosure provides a method for transparent migrationof virtual network functions. The method includes identifying, by dataprocessing hardware, a middlebox receiving network flow andcommunicating with one or more backend virtual machines. The method alsoincludes receiving, at the data processing hardware, flow statisticscorresponding to the network flow of the middlebox. The method furtherincludes determining, by the data processing hardware, whether the flowstatistics satisfy an offload rule, the offload rule indicating when tomigrate network flow from the middlebox to an end host. When the flowstatistics satisfy the offload rule, the method includes migrating, bythe data processing hardware, the network flow from the middlebox to theend host.

Implementations of the disclosure may include one or more of thefollowing optional features. In some implementations, the middleboxincludes at least one of a network address translator (NAT), a loadbalancer, or a firewall. In these implementations, the middlebox may beassociated with a single network device 1 0 configured to performnetwork routing. The middlebox may include a load balancer configured tobalance network load between network connections and the one or morebackend virtual machines. Here, the load balancer includes a connectiontable mapping each network connection to a corresponding one of the oneor more backend virtual machines.

In some examples, migrating the network flow from the middlebox to theend host includes initiating an end-host connection table at the endhost. Additionally or alternatively, migrating the network flow from themiddlebox to the end host may include initiating an end-host connectiontable at the end host, identifying a network connection request receivedat the end host, determining that the network connection requestcorresponds to a new network connection, updating the end-hostconnection table with the new network connection, and controlling anetwork flow for the new network connection at the end host.

In some configurations, migrating the network flow from the middlebox tothe end host includes initiating an end-host connection table at the endhost, identifying a network connection request received at the end host,determining that the network connection request corresponds to anexisting network connection not present in the end-host connectiontable, and communicating a network flow for the existing networkconnection from the end host to the middlebox. Here, migrating thenetwork flow from the middlebox may also include transferring amiddlebox connection table from the middlebox to the end host. When themiddlebox connection table is transferred from the middlebox to the endhost, the method may include ceasing communication between the end hostand the middlebox. After migrating the network flow from the middleboxto the end host, the method may also include determining, by the dataprocessing hardware, a reduction in the network flow to the end hostduring a period of time and migrating, by the data processing hardware,the network flow from the end host to the middlebox.

In some implementations, the middlebox is configured to communicate withthe one or more backend virtual machines based on consistent hashing. Insome configurations, migrating the network flow from the middlebox tothe end host may also include identifying that a first healthcharacteristic of each backend virtual machine of the one or morebackend virtual machines communicating with the middlebox indicates ahealthy state and determining that a second health characteristiccorresponding to the end host matches the healthy state of the firsthealth characteristic. The end host may include one of the one or morebackend virtual machines or an end point within a physical networklayer.

Another aspect of the disclosure provides a system for transparentmigration of virtual network functions. The system includes dataprocessing hardware and memory hardware in communication with the dataprocessing hardware. The memory hardware stores instructions that whenexecuted on the data processing hardware cause the data processinghardware to perform operations. The operations include identifying amiddlebox receiving network flow and communicating with one or morebackend virtual machines and receiving flow statistics corresponding tothe network flow of the middlebox. The operations also includedetermining whether the flow statistics satisfy an offload rule. Theoffload rule indicates when to migrate network flow from the middleboxto an end host. When the flow statistics satisfy the offload rule, theoperations further include migrating the network flow from the middleboxto the end host.

This aspect may include one or more of the following optional features.In some examples, the middlebox includes at least one of a networkaddress translator (NAT), a load balancer, or a firewall. In theseexamples, the middlebox may be associated with a single network deviceconfigured to perform network routing. Optionally, the middleboxincludes a load balancer configured to balance network load betweennetwork connections and the one or more backend virtual machines. Here,the load balancer includes a connection table mapping each networkconnection to a corresponding one of the one or more backend virtualmachines. Migrating the network flow from the middlebox to the end hostmay include initiating an end-host connection table at the end host.Additionally or alternatively, migrating the network flow from themiddlebox to the end host may include initiating an end-host connectiontable at the end host, identifying a network connection request receivedat the end host, determining that the network connection requestcorresponds to a new network connection, updating the end-hostconnection table with the new network connection, and controlling anetwork flow for the new network connection at the end host.

In some configurations, the network flow from the middlebox to the endhost includes initiating an end-host connection table at the end host,identifying a network connection request received at the end host,determining that the network connection request corresponds to anexisting network connection not present in the end-host connectiontable, and communicating a network flow for the existing networkconnection from the end host to the middlebox. In this configuration,migrating the network flow from the middlebox may also includetransferring a middlebox connection table from the middlebox to the endhost. When the middlebox connection table is transferred from themiddlebox to the end host, the operations may include ceasingcommunication between the end host and the middlebox. In otherconfigurations, after migrating the network flow from the middlebox tothe end host, the operations include determining a reduction in thenetwork flow to the end host during a period of time and migrating thenetwork flow from the end host to the middlebox.

In some implementations, the middlebox is configured to communicate withthe one or more backend virtual machines based on consistent hashing. Insome configurations, migrating the network flow from the middlebox tothe end host may include identifying that a first health characteristicof each backend virtual machine of the one or more backend virtualmachines communicating with the middlebox indicates a healthy state anddetermining that a second health characteristic corresponding to the endhost matches the healthy state of the first health characteristic. Theend host may include one of the one or more backend virtual machines oran end point within a physical network layer.

The details of one or more implementations of the disclosure are setforth in the accompanying drawings and the description below. Otheraspects, features, and advantages will be apparent from the descriptionand drawings, and from the claims.

DESCRIPTION OF DRAWINGS

FIGS. 1A-1C are schematic views of example virtual networkingenvironments.

FIGS. 2A-D are schematic views of example middlebox managers thatmigrate virtual network functions.

FIG. 3 is a flow diagram of an example arrangement of a method tomigrate virtual network functions.

FIG. 4 is a schematic view of an example computing device used toimplement the systems and methods of migrating virtual networkfunctions.

Like reference symbols in the various drawings indicate like elements.

DETAILED DESCRIPTION

Referring to FIGS. 1A-1C, in some implementations, a networkingenvironment 100 includes a physical network layer 102 and a virtualnetwork layer 104. In some examples, the physical network layer 102 is adistributed system (e.g., a remote network such as a cloud environment)having loosely coupled computing resources 110, 110 a-n. These computingresources 110 may include data processing hardware (e.g., one or morecentral processing units (CPUs)) and/or memory hardware (e.g., flashmemory, random access memory (RAM), phase change memory (PCM), and/ordiscs) accessible to one or more clients 120, 120 a-n. For example, thecomputing resources 110 are shown as a plurality of servers. The clients120 may communicate with computing resources 110 hosted on the physicalnetwork layer 102 through a network 130. For instance, the clients 120and the servers represent a collection of machines (e.g., hosts) formingend points of a physical network.

There may be many different types of networks 130 ranging from privatenetworks and enterprise networks to public networks. Some more specificexamples of networks include personal area networks (PAN), local areanetworks (LAN), wireless local area networks (WLAN), wide area networks(WAN), storage/system area networks (SAN), passive optical networks(PON), enterprise private networks (EPN), virtual private networks(VPN), etc. In some configurations, clients 120 and end hosts (i.e.,hosts of the computing resources 110) may access (i.e., connect to) thenetwork 130 via hardware such as network interface controllers (NICs)(also known as a network interface card, network adapter, or LANadapter) or, in the case of an optical network, synchronous transportmodules (STMs). For example, FIGS. 1A-1C depict each client 120 with atleast one NIC 122, 122 a-n and each server with at least one NIC 112,112 a-n.

A virtual network layer, such as the virtual network layer 104, may beoverlain on the physical network layer 102 to form a virtual network(also known as an overlay network) with its own internet protocol (IP)address space. The virtual network layer 104 enables the network 130 tobe managed (e.g., by network administrators), designed, and/or deployedin a manner that may decouple network functionality from hardwareappliances (e.g., proprietary hardware appliances). In other words, thevirtual network layer 104 permits virtual network functionality (alsoreferred to as network function virtualization) such that networkservices may operate by software to permit adaptability and scalabilityover a traditional networks with dedicated hardware. For instance,software-defined networking (SDN) of virtual networks removes thecontrol plane from network hardware and implements the control planeinstead in software. In some implementations, the virtual network layer104 of the network 130 performs some network functionality virtually viasoftware while performing other network functions with dedicatedhardware in a hybrid virtualization approach. Virtual and/or hybridapproaches may allow flexibility and/or optimization for networkproviders or network administrators with respect to network space,power, size, scalability, deployment time, and/or repair andmaintenance. For example, a virtual network layer 104 is dynamicallyconfigured to permit underlying changes to the physical network layer102 without disrupting network services.

The virtual network layer 104 may be configured to perform a variety ofnetwork functions and/or mirror traditional network functions ofphysical networks. Some examples of these network functions includerouting, network address translation (NATs), load balancing (LBs),security (e.g., firewalls and intrusion detection/prevention systems),protocol converting, wide area network optimization, proxies, caching,etc. In other words, virtual network functionality may be applicable toany data plane processing or control plane function within the network130.

With continued reference to FIGS. 1A-1C, the virtual network layer 104includes virtual network end points. Here, the virtual network endpoints are depicted as virtual machines (VMs), such as client virtualmachines (client VMs) 140, 140 a-n and backend virtual machines (backendVMs) 150, 150 a-n. A virtual machine (VM) generally refers to anemulation or image of one or more host computer systems that enable auser to experience functionality of the host computer system without anability to disturb an underlying operating system of a correspondinghost computer system. VMs may be created to perform specialized taskswithin one or more host environments. In some examples, the virtualnetwork layer 104 allows multiple VMs to exist within a host computersystem simultaneously. In order to allow multiple VMs to operate atonce, the VMs are often sandboxed from the critical operating systemresources of the host computer system. VMs may be advantageous tovirtual network layers 104 because they may be designed to map to (e.g.,access) one or more computing resources 110 of the physical networklayer 102 via a backend VM 150. For example, one or more client VMs 140maps to one or more backend VMs 150 where the backend VM 150 is a VMassociated with computing resources 110 of a physical network layer 102(e.g., a distributed system). By mapping to particular computingresources 110, the client VM 140, in conjunction with the backend VM150, may be designed for particular network services (e.g., networkapplications). In some configurations, backend VMs 150 operate ashost-based VMs where data may be contained on servers of the physicalnetwork layer 102 and accessible by or allocated to a variety of remoteclients 120. For instance, the virtual network layer 104 with VMspermits a centrally managed networked structure. Although networkvirtualization is generally described with respect to VMs, networkvirtualization (e.g., with a virtual network layer 104) can begeneralized to connect other types of network end points, includingvirtual private networks (VPNs), bare metal servers, proxies, etc. Forexample, the networking environment 100 supports VPN gateways as aclient which forwards requests from a customer's premises. Accordingly,in some examples, a VM is more generally a network end point toaccommodate for other types of network connections.

In some implementations, in order to perform network functions, thevirtual network layer 104 of the networking environment 100 includes atleast one middlebox 160. A middlebox 160 generally refers to anyintermediary device that performs functions other than normal, standardfunctions of an internet protocol (IP) router on a datagram path betweena source host (e.g., a client via a client VM 140) and a destinationhost (e.g., servers of the physical network layer 102 via a backend VM150). In other words, the middlebox 160 is usually responsible fornetwork functionality other than packet routing (e.g., network addresstranslation (NATs), network address port translation (NAPT), loadbalancing (LBs), firewalls, intrusion detection/prevention systems,protocol converting, proxies). Although a middlebox 160 is typicallyresponsible for network functionality other than routing, the middlebox160 may be part of a device that also handles routing such that anetworking environment 100 includes a single device supporting bothrouting and middlebox functions.

Within the networking environment 100, the middlebox 160 receivesnetwork flow from one or more clients 120 to perform network functions.Network connections with middlebox(es) 160 may be established based onconnection requests 124 from a client 120. In other words, connectionsmay be negotiated between a client 120 and a backend such that themiddlebox 160 sits in the middle, processing and potentially modifyingpackets belonging to a connection. Once connections have beenestablished with the middlebox 160 (e.g., forming a virtual connectionbetween the client VM 140 and the backend VM 150), the middlebox 160receives network traffic (e.g., data 126) based on the configurednetwork functionality of the middlebox 160.

In some examples, the middlebox 160 performs NAT or NAPT on packetsbetween the client 120 and the backend (e.g., backend VM). In the caseof NAPT, the middlebox 160 tracks each connection and port mappingsassigned to each connection. In other examples, the middlebox 160 is alayer-4 load balancer middlebox that forwards packets between the client120 and the backend while also potentially tracking connections toensure that future packets belonging to a connection continue to connectto the same backend. Alternatively, the middlebox 160 may be a layer-7load balancer where a client 120 establishes a transmission controlprotocol (TCP) with the middlebox 160 and the middlebox 160 establishesa separate connection with a backend (i.e., on behalf of the client120). For a layer-7 load balancer, the transport protocol state (e.g.,TCP sequence numbers and window sizes) would transfer from the middlebox160 to a respective end host(s).

In some implementations, an overlay network, such as a virtual networklayer 104, is not required to perform middlebox functions. For example,in a network, such as a physical Ethernet network, software running onan end host could direct a connection to a middlebox 160 by setting thedestination medial access control (MAC) address to a MAC addresscorresponding to the middlebox 160. Here, to offload the connection, thehost would set the MAC address to the address of the destination (or theaddress of an appropriate gateway to reach the destination). In otherwords, the middlebox 160 may communicate with physical machines insteadof VMs. For instance, in load balancing, clients 120 and servers neednot be VMs on a virtual network layer 104, but rather connectionsbetween physical machines.

Middlebox(es) 160 may differ from routers in the respect thatmiddlebox(es) 160 often perform stateful network functions. Morespecifically, stateful network functions refer to network functions thattrack an operating state and/or characteristic of network connectionsassociated with the network function. For example, the middlebox 160tracks connections such that the middlebox 160 is connection-aware,inspects packet context (e.g., periodically inspects payloads), and/orassociates new connections with existing connections. By performingstateful functions, middlebox(es) 160 include a greater degree of datagranularity to identify and/or recall connection events or connectiondata associated with previous sessions of a client 120 or a VM. Thesestateful functions may offer the virtual network layer 104 security andperformance benefits that may help stabilize network services.

FIG. 1B illustrates that, in some implementations, the virtual networklayer 104 includes more than one middlebox 160 associated with one ormore backend VM 150. The virtual network layer 104 may be configuredwith clusters where network flow associated with a client VM 140 isallocated to at least one middlebox 160 dedicated to a particular set ofbackend VMs 150 (e.g., middlebox 160 a associated with backend VM 150a-b). In these examples, a cluster may also associate a particularmiddlebox 160 and set of a backend VMs 150 with particular computingresources 110 of the physical network layer 102. For example, a firstmiddlebox 160 a is associated with two backend VMs 150 a-b that utilizecomputing resources 110 a from the physical network layer 102.Additionally or alternatively, cluster configurations may also supportvirtual networks with multi-tenancy where multiple clients 120 operateVMs in different virtual networks sharing computing resources 110 of thephysical network layer 102.

As depicted by FIGS. 1A and 1B, network functionality of the virtualnetwork layer 104 is performed by middlebox(es) 160. As a number ofclients and/or hosts increases in size, the middlebox 160 proportionallyreceives an increase in network flow and connections that demandsgreater programming resources to program and/or to manage activity at amiddlebox 160, particularly in functions performed by a middlebox 160with stateful tracking (e.g., connection tables). In these instances,the middlebox 160, as an intermediary device, may add latency, abottleneck, and an additional hop for the network functions between aclient VM 140 and a backend VM 150. Therefore, although virtual networkfunctions may address scaling challenges in a control plane for anetwork, virtual network functions still suffer scaling problems in thedata plane.

Referring to FIG. 1C, in some examples, the virtual network layer 104 isconfigured to offload one or more intermediary network connectionsthrough a middlebox 160 to direct network connections between client VMs140 and backend VMs 150. For example, FIG. 1C depicts a previousintermediary network connection within the virtual network layer 104 asa direct network connection 170 between a first client VM 140 a and afirst backend VM 150 a. Although this is simply one illustration, amiddlebox manager 200 (shown in FIGS. 1A-1C) may dynamically manageoffloading for middlebox functions based on offloading rules. Due to thedynamic and fluid nature possible with a virtual network layer 104, themiddlebox manager 200 may also aim to manage scalability of the virtualnetwork layer 104 to resolve or to minimize scalability issues for thecontrol plane and/or the data plane within a virtual network (e.g.,scalable issues with stateful network functions). By offloading ormigrating network flow from a middlebox 160 to an end host (e.g., abackend VM 150), a virtual network layer 104 may strategically balancenetwork flow associated with network functions to improve a clientnetworking experience, especially within a larger or growing network. Anend host may refer to an end point within the virtual network layer 104,such as a backend VM 150, or, in some configurations, an end pointwithin the physical network layer 102.

Although middlebox management may be described hereinafter with respectto the network functionality of load balancing, the middlebox managementtechniques are equally applicable to other middlebox functions (e.g.,NATs, firewalls, etc.). Typically, a client 120 may use a load balanceservice with servers to balance network loads. Traditionally, oneapproach to load balancing employs a dedicated middlebox appliance thatincludes a CPU, local storage, and/or means for packet processing (e.g.,an application specific integrated circuit (ASIC)). With a dedicatedappliance, when a client 120 initiates a connection (e.g., by aconnection request 124), the network 130 sends the connection to thededicated middlebox appliance and the middlebox appliance proxies thetraffic to the backend (e.g., a backend VM 150). As a dedicatedmiddlebox appliance, the middlebox appliance is physical hardware in thenetwork. Unfortunately, as a physical piece of hardware, a dedicatedmiddlebox appliance suffers scaling challenges since scaling requiresproportionally scaling the physical hardware to accommodate for sizechanges. Furthermore, a dedicated appliance may also result in a largedegree of overprovisioning since dedicated hardware appliance must beprovisioned to meet peak traffic demands within the network 130.

Another traditional approach to load balancing is client-side loadbalancing. Client-side networking functionality is a distributedapproach where middlebox functionality is implemented on end hosts,eliminating middleboxes. One such example is where the client-sidenetworking functionality is built into an operation system (OS) kernelor virtual switch (e.g., an Open vSwitch). For example, in client-sideload balancing, a client host uses software to decide independentlywhich backends to use. This approach shifts all of the load balancingfunctions to the end hosts where an end host has a table of all of thebackends. Unlike, the dedicated hardware approach, client-sidefunctionality (i.e. a distributed approach) may accommodate for dataplane scaling, but suffers from control plane scaling challenges. Thisis often because, in a distributed approach, a client must bedistributed information regarding all services, backends, healthcharacteristics, etc. to allow a clients-side functionality decision.

Unlike these traditional approaches, FIGS. 2A-2D illustrate a hybridapproach with the middlebox manager 200. Here, the middlebox manager 200is configured to receive metrics 202 such as flow statistics from amiddlebox 160 receiving network flow to one or more backend VMs 150 andmigrate (i.e. offload) network flow from the middlebox 160 based on themetrics 202. In some examples, measurement and/or analysis of themetrics 202 occurs at other network components within the networkingenvironment 100 (e.g., the middlebox 160, end host(s), top-of-rackswitches, etc.) and the middlebox manager 200 receives instructions fromthese other network components to offload a specific network flow. Themiddlebox manager 200 may be a network administrator or an element of acontrol plane associated with the virtual network layer 104.

In some implementations, to determine whether to migrate network flowfrom a middlebox 160, the middlebox manager 200 includes an offloader210 that is configured with at least one offload rule. The offloader 210decides whether to offload network flows through the middlebox 160 thatmeet the criteria of a given offload rule. As shown in FIG. 2A, theoffloader 210 determines whether to offload a particular connection ornetwork flow associated with the particular connection based on whetherat least one metric 202 satisfies at least one offload rule. Forexample, an offload rule may offload any flow that exceeds a particularspeed or bandwidth (e.g., 20 kbps), whereby the metric 202 in thisexample corresponds to speed/bandwidth of the network flow. Offloadrules may also be compounded or constrained. For instance, although afirst offload rule may offload flow that exceeds 20 kbps, a secondoffload rule may constrain the number of flows that have been offloadedby the first rule (e.g., the middlebox manager 200 may offload nogreater than 20 flows exceeding 20 kbps). An additional offload rule maybe to offload a high-bandwidth flow when the aggregate bandwidth goingthrough a particular middlebox 160 that the high-bandwidth flow is usingexceeds a configurable bandwidth threshold for the middlebox 160. Inother examples, the offloader 210 offloads all flows within a subnet orwithin a certain physical radius. The offloader 210 may determine anoffload rule dynamically based on factors such as: the aggregatebandwidth currently traveling through a middlebox 160, the number offlows already offloaded to a given host, the total number of offloadedflows (e.g., within the control plane or virtual network layer 104), andother flow statistics. Additionally or alternatively, an offload rulemay include a threshold that automatically adjusts based on a load ofthe middlebox 160 or a SDN network controller.

Referring to FIG. 2B, the virtual network layer 104 includes four clientVMs 140 a-d supported by a middlebox 160 and two backend VMs 150 a-b.Here, the offloader 210 decides (e.g., shown by the dotted box around“offload”) to offload the network flow or connection associated with thefourth client VM 140 d from the middlebox 160 with the direct networkconnection 170 (shown by the dotted arrow) to the second backend VM 150b. FIG. 2B depicts the second backend VM 150 b with a dotted line toindicate that the second backend VM 150 b may be new to the virtualnetwork layer 104 (e.g., for scalability of resources) or preexistingand now connected to receive network flow from the fourth client VM 140d.

In some examples, the middlebox manager 200 is configured to identifyoutlier types (uncommon types) of network flow based on flow statisticsfrom the metrics 202. The middlebox manager 200 may then identify theconnections associated with these outliers to be candidates to migrate(e.g., directly connect) to an end host. In some examples, the middleboxmanager 200 is configured to first migrate outlier candidates beforemigrating network flow based on at least one offload rule associatedwith the offloader 210.

In some implementations, a middlebox 160 of a networking environment 100includes a stickiness requirement. A stickiness requirement often refersto maintaining existing connections such that a connection to amiddlebox 160 does not need to be reestablished or initialized for eachinteraction with a client 120 (e.g., each session). In order to trackconnections for the middlebox 160, the middlebox 160 may include arecord 162 of connections. The record 162 may be a table indicatingpreexisting source and destination connections (e.g., as shown by FIGS.2A-2C). An illustration of the concept of stickiness would be if FIG. 2Aincluded three client VMs 140 a-c and then transitioned to four clientVMs 140 a-d as shown by FIG. 2B. In this transition to maintainstickiness, when the middlebox 160 receives a new connection request ornetwork flow from the fourth client VM 140 d, the middlebox manager 200is configured to map the new fourth client VM 140 d to a correspondingbackend VM 150 that does not disturb connections. For example, insteadof offloading the existing network flow of the first, second, or thirdclient VM 140 a-c from the first backend VM 150 a to the second backendVM 150 b, the middlebox manager 200 maintains these existing connectionsand forms a direct connection between the fourth client VM 150 d and thesecond backend VM 150 b. In this respect, in some implementations, newbackend VMs added to the virtual network layer 104 may only be used fornew connections to avoid disrupting existing connections.

In some configurations, such as FIG. 2C, the middlebox manager 200maintains stickiness by including a connector 220. Here, the connector220 may maintain stickiness by using techniques such as consistenthashing for stateless middlebox network functions (e.g., load balancing)and/or connection tracking for stateful middlebox network functions.With the technique of consistent hashing, the connector 220 attempts tominimize disruptions to connections in a stateless manner. As anexample, when N backend VMs 150 transition to N+1 backend VMs 150, thenumber of connections that get reassigned equals 1/N. In other words,consistent hashing does not prevent disruptions to existing connections,but rather minimizes the number of reassigned backend connections.

In some examples, the connector 220 uses the technique of connectiontracking. With connection tracking, a middlebox 160 (e.g., a loadbalancer, NAT, or firewall) has a record 162 such as a connection table.The record 162 tracks past middlebox decisions and activity connectingvarious client VMs 140 to backend VMs 150 (or backend VMs 150 tocomputing resources 110 of the physical network layer 102). Thisapproach may prevent disruptions to existing connections because whenoffloading or load balancing, an existing connection within the record162 will not be reorganized by the middlebox manager 200.

Additionally or alternatively, when the connector 220 uses connectiontracking, the middlebox manager 200 may decide to offload a preexistingconnection. When this occurs, the connector 220 may ensure the record162 transfers along with an offloaded connection. By transferring therecord 162 (e.g., a connection table), an offloaded end host maycontinue tracking the state for a given network connection. For example,FIG. 2C depicts the record 162 transferring to the second backend VM 150b to account for the fourth client VM 140 d offloading from themiddlebox 160.

In some examples, when the middlebox manager 200 migrates a connectionfrom the middlebox 160 to an end host, the connector 220 handles atransition phase for the offload process. As part of the transitionphase, the connector 220 initiates a new record 162 a (e.g., connectiontable) at the end host. Initially, this new record 162 a at the end hostis empty, but the connector 220 updates the new record 162 a with newconnections such that the end host controls any subsequent network flowfrom these new connections. During this transition phase, the middlebox160 may handle network flow from existing connections that are notwithin the new record 162 a at the end host. In other words, themiddlebox 160 continues to control existing connections within anexisting record 162 b at middlebox 160 while the middlebox 160communicates the existing record 162 b to the end host. Once thetransfer is complete, the transition process has formed a merged record162 ab of the new record 162 a and the existing record 162 b at the endhost. At this point, the middlebox 160 ceases handling connections(i.e., ceases handling the existing connections from the existing record162 b).

Referring to FIGS. 2A-2C, the record 162 is shown as a simplifiedversion of a table. In some implementations, the record 162 is aconnection table that tracks individual TCP streams. The record 162 mayinclude any combination of connection data such as source IP,destination IP, protocol (e.g., TCP, user datagram protocol (UDP),internet control message protocol (ICMP)), source transport port,destination transport port, or data regarding use (e.g., last-usedtime). When the record 162 is a table, the record 162 may include acolumn for each type of connection data. The record 162 may also includea state associated with each entry. In some examples, when a middlebox160 for NAPT rewrites an IP and transport port to a different IP andtransport port, the record 162 records these translations. In loadbalancing, for instance, the record 162 includes an identifier (ID) fora backend that was chosen/established for a given connection. A record162 for a firewall may have nothing or include a sequence of numberscorresponding to its sequence number validation process.

In some examples, the networking environment 100 includes multiplemiddleboxes 160 supporting traffic with a combination of stateless andstateful network operations. For example, there may exist nested loadbalancing (multiple layers) in a networking environment 100 such thatend hosts load balance to the middlebox and the middlebox/end host loadbalance to the backend. In situations like this, in order to offload ormigrate network connections, the connector 220 may use either consistenthashing or connection tracking or some combination of both to optimizenetwork functionality of the networking environment 100 across one ormore layers of middleboxes 160.

Referring to FIG. 2D, the middlebox manager 200 may further include ahealth checker 230. The health checker 230 is configured to check ahealth characteristic 232 of each backend VM 150. For example, FIG. 2Ddepicts the middlebox manager 200 receiving a first healthcharacteristic 232 a from the first backend VM 150 a and a second healthcharacteristic 232 b from the second backend VM 150 b. These healthcharacteristics 232 may be communicated to the health checker 230 oridentified by the health checker 230. In some examples, during middleboxfunctionality, the health checker 230 confirms that each backend VM 150connected to a corresponding middlebox 160 indicates a healthy state. Inthese examples, when the middlebox manager 200 decides to migrate or tooffload a network connection (e.g., shown in FIG. 2D as offloaded to thesecond backend VM 150 b), the health checker 230 compares a first healthcharacteristic 232 a corresponding the original middlebox connection toa second health characteristic 232 b of the intended end host (e.g., thesecond backend VM 150 b). When the health checker 230 determines thatthe second health characteristic 232 b corresponding to the intended endhost matches the healthy state of the first health characteristic 232 a,the health checker 230 may permit the middlebox manager 200 to proceedto migrate the network flow. In some examples, when the health checker230 determines that the second health characteristic 232 b correspondingto the intended end host fails to match the healthy state of the firsthealth characteristic 232 a (i.e., corresponds to an unhealthy state),the health checker 230 prevents the middlebox manager 200 fromperforming the migration. In other words, the middlebox manager 200 mayfirst decide to migrate a connection and an end host for the migratedconnection and then ensure the chosen end host includes a healthcharacteristic 232 that indicates a healthy state. Although FIG. 2Ddepicts the middlebox manager 220 with the health checker 230 and theconnector 220, in some configurations, the health checker 230 may beemployed by the middlebox manager 200 without the functionality of theconnector 220 (e.g., consistent hashing and/or connection tracking).

The middlebox manager 200 may operate (i.e. offload by the offloader210) at a particular granularity that has performance implications forthe networking environment 100. When offloading occurs, packets matchingcertain criteria will have network functions applied by an end host(e.g., a backend VM 150) rather than by the middlebox 160. Granularitygenerally refers to a specificity of the criteria for the packets. Insome examples, the middlebox manager 200 operates with 5-tuplegranularity referring to source IP, destination IP, IP protocol, sourcetransport port, and destination transport port (e.g., a singletransmission control protocol (TCP) connection). Here, this 5-tuplegranularity may be used for network functions, such as load balancing,firewall, or NAPT, in a relatively simple manner, but yet it requires alarge number of flows to be offloaded.

In other examples, offloading with respect to load balancing occurs at agranularity of <sender, load-balanced IP>. In this model, whenoffloading occurs, the end host is programmed with a table (e.g., arecord 162) of load-balanced backends for use by a client 120. The endhost will then be able to independently select a backend for any futureconnections from that client 120. Here, these connections will not needto be offloaded separately.

In some implementations, firewalls offload at a granularity of <sourceIP range, destination IP range, protocol>. In this model, whenoffloading occurs, the end host is programmed with a firewall classifierindicating which ports are allowed by the firewall for the given sourceIP range, destination IP range, and protocol. For example, when two ofthousands of firewall rules configured in the middlebox 160 indicatethat TCP ports 22 and 80 should be allowed based on a destination IPprefix 10.0.0.0/8, implementation of this model would offload a firewallclassifier indicating that tcp:22,80 should be allowed to the end host.The key scaling benefit here is that it is not necessary to program allof the firewall rules in all of the end hosts. In this model, a statefulfirewall requires that the connection-tracking state transfers whenoffloading. Additionally or alternatively, a firewall may be offloadedat a granularity of <source IP range, destination IP range>, but thislevel of granularity results in a larger firewall classifier since thefirewall classifier would need to convey protocol information.

When offloading NAPT functions, the middlebox manager 200 may offloadall egress flows associated with a given sender. When offloading occurs,the SDN controller programs the end host with a set of IPs and portsthat the end host may assign to future connections initiated by thesender. In some examples, when the end host exhausts all designated IPsand ports, future connections may revert to the middlebox 160 until theend host resolves the IPs and ports (e.g., receives another set of IPsand ports from the controller). In this model, when offloading occurs,any existing connection-tracking state must also be transferred from themiddlebox 160 to the end host.

In some implementations, to control offloading, the middlebox 160 and/ormiddlebox manager 200 is programmable software or hardware (e.g.,application specific integrated circuits (ASICs) or field programmablegrid-array (FPGA)). Here, the software or hardware may be located eitheron an end host, adjacent to an end host (e.g., bump-in-the-wiretopologies), or in a top-of-rack switch.

FIG. 3 is an example of a method 300 that migrates virtual networkfunctions. The middlebox manager 200 may execute the method 300. Dataprocessing hardware of the physical network layer 102 or other dataprocessing hardware may execute the middlebox manager 200. At operation302, the method 300 identifies a middlebox 160 receiving network flowand communicating with one or more backend VM 150. At operation 304, themethod 300 receives flow statistics (also referred to as metrics 202)corresponding to the network flow of the middlebox 160. At operation306, the method 300 determines whether the flow statistic satisfies anoffload rule. Here, the offload rule indicates when to migrate networkflow from the middlebox 160 to an end host. At operation 308, when theflow statistics satisfy the offload rule, the method 300 migrates thenetwork flow from the middlebox 160 to the end host.

FIG. 4 is schematic view of an example computing device 400 that may beused to implement the systems and methods described in this document.The computing device 400 is intended to represent various forms ofdigital computers, such as laptops, desktops, workstations, personaldigital assistants, servers, blade servers, mainframes, and otherappropriate computers. The components shown here, their connections andrelationships, and their functions, are meant to be exemplary only, andare not meant to limit implementations of the inventions describedand/or claimed in this document.

The computing device 400 includes a processor 410, memory 420, a storagedevice 430, a high-speed interface/controller 440 connecting to thememory 420 and high-speed expansion ports 450, and a low speedinterface/controller 460 connecting to a low speed bus 470 and a storagedevice 430. Each of the components 410, 420, 430, 440, 450, and 460, areinterconnected using various busses, and may be mounted on a commonmotherboard or in other manners as appropriate. The processor 410 (e.g.,data processing hardware) can process instructions for execution withinthe computing device 400, including instructions stored in the memory420 or on the storage device 430 to display graphical information for agraphical user interface (GUI) on an external input/output device, suchas display 480 coupled to high speed interface 440. For instance, themiddlebox manager 200 may execute on the processor 410 (e.g., dataprocessing hardware). The memory 420 and the storage device 430 maycorrespond to memory hardware in communication with the data processinghardware (e.g., processor 410). In other implementations, multipleprocessors and/or multiple buses may be used, as appropriate, along withmultiple memories and types of memory. Also, multiple computing devices400 may be connected, with each device providing portions of thenecessary operations (e.g., as a server bank, a group of blade servers,or a multi-processor system).

The memory 420 stores information non-transitorily within the computingdevice 400. The memory 420 may be a computer-readable medium, a volatilememory unit(s), or non-volatile memory unit(s). The non-transitorymemory 420 may be physical devices used to store programs (e.g.,sequences of instructions) or data (e.g., program state information) ona temporary or permanent basis for use by the computing device 400.Examples of non-volatile memory include, but are not limited to, flashmemory and read-only memory (ROM)/programmable read-only memory(PROM)/erasable programmable read-only memory (EPROM)/electronicallyerasable programmable read-only memory (EEPROM) (e.g., typically usedfor firmware, such as boot programs). Examples of volatile memoryinclude, but are not limited to, random access memory (RAM), dynamicrandom access memory (DRAM), static random access memory (SRAM), phasechange memory (PCM) as well as disks or tapes.

The storage device 430 is capable of providing mass storage for thecomputing device 400. In some implementations, the storage device 430 isa computer-readable medium. In various different implementations, thestorage device 430 may be a floppy disk device, a hard disk device, anoptical disk device, or a tape device, a flash memory or other similarsolid state memory device, or an array of devices, including devices ina storage area network or other configurations. In additionalimplementations, a computer program product is tangibly embodied in aninformation carrier. The computer program product contains instructionsthat, when executed, perform one or more methods, such as thosedescribed above. The information carrier is a computer- ormachine-readable medium, such as the memory 420, the storage device 430,or memory on processor 410.

The high speed controller 440 manages bandwidth-intensive operations forthe computing device 400, while the low speed controller 460 manageslower bandwidth-intensive operations. Such allocation of duties isexemplary only. In some implementations, the high-speed controller 440is coupled to the memory 420, the display 480 (e.g., through a graphicsprocessor or accelerator), and to the high-speed expansion ports 450,which may accept various expansion cards (not shown). In someimplementations, the low-speed controller 460 is coupled to the storagedevice 430 and a low-speed expansion port 490. The low-speed expansionport 490, which may include various communication ports (e.g., USB,Bluetooth, Ethernet, wireless Ethernet), may be coupled to one or moreinput/output devices, such as a keyboard, a pointing device, a scanner,or a networking device such as a switch or router, e.g., through anetwork adapter.

The computing device 400 may be implemented in a number of differentforms, as shown in the figure. For example, it may be implemented as astandard server 400 a or multiple times in a group of such servers 400a, as a laptop computer 400 b, or as part of a rack server system 400 c.

Various implementations of the systems and techniques described hereincan be realized in digital electronic and/or optical circuitry,integrated circuitry, specially designed ASICs (application specificintegrated circuits), computer hardware, firmware, software, and/orcombinations thereof. These various implementations can includeimplementation in one or more computer programs that are executableand/or interpretable on a programmable system including at least oneprogrammable processor, which may be special or general purpose, coupledto receive data and instructions from, and to transmit data andinstructions to, a storage system, at least one input device, and atleast one output device.

These computer programs (also known as programs, software, softwareapplications or code) include machine instructions for a programmableprocessor, and can be implemented in a high-level procedural and/orobject-oriented programming language, and/or in assembly/machinelanguage. As used herein, the terms “machine-readable medium” and“computer-readable medium” refer to any computer program product,non-transitory computer readable medium, apparatus and/or device (e.g.,magnetic discs, optical disks, memory, Programmable Logic Devices(PLDs)) used to provide machine instructions and/or data to aprogrammable processor, including a machine-readable medium thatreceives machine instructions as a machine-readable signal. The term“machine-readable signal” refers to any signal used to provide machineinstructions and/or data to a programmable processor.

The processes and logic flows described in this specification can beperformed by one or more programmable processors executing one or morecomputer programs to perform functions by operating on input data andgenerating output. The processes and logic flows can also be performedby special purpose logic circuitry, e.g., an FPGA (field programmablegate array) or an ASIC (application specific integrated circuit).Processors suitable for the execution of a computer program include, byway of example, both general and special purpose microprocessors, andany one or more processors of any kind of digital computer. Generally, aprocessor will receive instructions and data from a read only memory ora random access memory or both. The essential elements of a computer area processor for performing instructions and one or more memory devicesfor storing instructions and data. Generally, a computer will alsoinclude, or be operatively coupled to receive data from or transfer datato, or both, one or more mass storage devices for storing data, e.g.,magnetic, magneto optical disks, or optical disks. However, a computerneed not have such devices. Computer readable media suitable for storingcomputer program instructions and data include all forms of non-volatilememory, media and memory devices, including by way of examplesemiconductor memory devices, e.g., EPROM, EEPROM, and flash memorydevices; magnetic disks, e.g., internal hard disks or removable disks;magneto optical disks; and CD ROM and DVD-ROM disks. The processor andthe memory can be supplemented by, or incorporated in, special purposelogic circuitry.

To provide for interaction with a user, one or more aspects of thedisclosure can be implemented on a computer having a display device,e.g., a CRT (cathode ray tube), LCD (liquid crystal display) monitor, ortouch screen for displaying information to the user and optionally akeyboard and a pointing device, e.g., a mouse or a trackball, by whichthe user can provide input to the computer. Other kinds of devices canbe used to provide interaction with a user as well; for example,feedback provided to the user can be any form of sensory feedback, e.g.,visual feedback, auditory feedback, or tactile feedback; and input fromthe user can be received in any form, including acoustic, speech, ortactile input. In addition, a computer can interact with a user bysending documents to and receiving documents from a device that is usedby the user; for example, by sending web pages to a web browser on auser's client device in response to requests received from the webbrowser.

A number of implementations have been described. Nevertheless, it willbe understood that various modifications may be made without departingfrom the spirit and scope of the disclosure. Accordingly, otherimplementations are within the scope of the following claims.

What is claimed is:
 1. A computer-implemented method when executed bydata processing hardware causes the data processing hardware to performoperations comprising: identifying a middlebox receiving network flowbetween virtual network endpoints in a virtual network layer, performingstateful network functions in the virtual network layer using thereceived network flow between the virtual network endpoints, andcommunicating with one or more backend virtual machines corresponding tothe virtual network endpoints; receiving flow statistics correspondingto the network flow of the middlebox; determining whether the flowstatistics satisfy an offload rule, the offload rule indicating when tomigrate the network flow from the middlebox to an end host; and when theflow statistics satisfy the offload rule, migrating the network flowfrom the middlebox to the end host.
 2. The method of claim 1, whereinthe middlebox comprises at least one of a network address translator(NAT), a load balancer, or a firewall.
 3. The method of claim 2, whereinthe middlebox is associated with a single network device configured toperform network routing.
 4. The method of claim 1, wherein migrating thenetwork flow from the middlebox to the end host comprises initiating anend-host connection table at the end host.
 5. The method of claim 1,wherein migrating the network flow from the middlebox to the end hostcomprises: initiating an end-host connection table at the end host;identifying a network connection request received at the end host;determining that the network connection request corresponds to a newnetwork connection; updating the end-host connection table with the newnetwork connection; and controlling the network flow for the new networkconnection at the end host.
 6. The method of claim 1, wherein migratingthe network flow from the middlebox to the end host comprises:initiating an end-host connection table at the end host; identifying anetwork connection request received at the end host; determining thatthe network connection request corresponds to an existing networkconnection not present in the end-host connection table; andcommunicating the network flow for the existing network connection fromthe end host to the middlebox.
 7. The method of claim 6, whereinmigrating the network flow from the middlebox further comprises:transferring a middlebox connection table from the middlebox to the endhost; and when the middlebox connection table is transferred from themiddlebox to the end host, ceasing communication between the end hostand the middlebox.
 8. The method of claim 1, wherein the operationsfurther comprise, after migrating the network flow from the middlebox tothe end host: determining a reduction in the network flow to the endhost during a period of time; and migrating the network flow from theend host to the middlebox.
 9. The method of claim 1, wherein themiddlebox is configured to communicate with the one or more backendvirtual machines based on consistent hashing.
 10. The method of claim 1,wherein migrating the network flow from the middlebox to the end hostfurther comprises: identifying that a first health characteristic ofeach backend virtual machine of the one or more backend virtual machinescommunicating with the middlebox indicates a healthy state; anddetermining that a second health characteristic corresponding to the endhost matches the healthy state of the first health characteristic.
 11. Asystem comprising: data processing hardware; and memory hardware incommunication with the data processing hardware, the memory hardwarestoring instruction that when executed on the data processing hardwarecause the data processing hardware to perform operations comprising:identifying a middlebox receiving network flow between virtual networkendpoints in a virtual network layer, performing stateful networkfunctions in the virtual network layer using the received network flowbetween the virtual network endpoints, and communicating with one ormore backend virtual machines corresponding to the virtual networkendpoints; receiving flow statistics corresponding to the network flowof the middlebox; determining whether the flow statistics satisfy anoffload rule, the offload rule indicating when to migrate the networkflow from the middlebox to an end host; and when the flow statisticssatisfy the offload rule, migrating the network flow from the middleboxto the end host.
 12. The system of claim 11, wherein the middleboxcomprises at least one of a network address translator (NAT), a loadbalancer, or a firewall.
 13. The system of claim 12, wherein themiddlebox is associated with a single network device configured toperform network routing.
 14. The system of claim 11, wherein migratingthe network flow from the middlebox to the end host comprises initiatingan end-host connection table at the end host.
 15. The system of claim11, wherein migrating the network flow from the middlebox to the endhost comprises: initiating an end-host connection table at the end host;identifying a network connection request received at the end host;determining that the network connection request corresponds to a newnetwork connection; updating the end-host connection table with the newnetwork connection; and controlling the network flow for the new networkconnection at the end host.
 16. The system of claim 11, whereinmigrating the network flow from the middlebox to the end host comprises:initiating an end-host connection table at the end host; identifying anetwork connection request received at the end host; determining thatthe network connection request corresponds to an existing networkconnection not present in the end-host connection table; andcommunicating the network flow for the existing network connection fromthe end host to the middlebox.
 17. The system of claim 16, whereinmigrating the network flow from the middlebox further comprises:transferring a middlebox connection table from the middlebox to the endhost; and when the middlebox connection table is transferred from themiddlebox to the end host, ceasing communication between the end hostand the middlebox.
 18. The system of claim 11, wherein the operationsfurther comprise, after migrating the network flow from the middlebox tothe end host: determining, a reduction in the network flow to the endhost during a period of time; and migrating the network flow from theend host to the middlebox.
 19. The system of claim 11, wherein themiddlebox is configured to communicate with the one or more backendvirtual machines based on consistent hashing.
 20. The system of claim11, wherein migrating the network flow from the middlebox to the endhost further comprises: identifying that a first health characteristicof each backend virtual machine of the one or more backend virtualmachines communicating with the middlebox indicates a healthy state; anddetermining that a second health characteristic corresponding to the endhost matches the healthy state of the first health characteristic.