Ingress and egress switch which determines services related to an incoming packet

ABSTRACT

Virtual machine environments are provided in the switches that form a network, with the virtual machines executing network services previously performed by dedicated appliances. The virtual machines can be executed on a single multi-core processor in combination with normal switch functions or on dedicated services processor boards. Packet processors analyze incoming packets and add a services tag containing services entries to any packets. Each switch reviews the services tag and performs any network services resident on that switch. This allows services to be deployed at the optimal locations in the network. The network services may be deployed by use of drag and drop operations. A topology view is presented, along with network services that may be deployed. Services may be selected and dragged to a single switch or multiple switches. The management tool deploys the network services software, with virtual machines being instantiated on the switches as needed.

CROSS REFERENCE TO RELATED APPLICATIONS

This application claims the benefit under 35 U.S.C. §119(e) of U.S.Provisional Patent Application Ser. Nos. 61/319,348, entitled “NETWORKSWITCHES WITH VIRTUAL MACHINES AND SIMPLIFIED DISTRIBUTION,” filed Mar.31, 2010 and 61/325,040, entitled “NETWORK SWITCHES WITH VIRTUALMACHINES AND SIMPLIFIED DISTRIBUTION,” filed Apr. 16, 2010, which arehereby incorporated by reference.

This application is related to U.S. patent application Ser. Nos.13/076,302, entitled “Simplified Distribution of Software to NetworkedDevices; 13/076,321, entitled “Switch with Packet Services Processing”;and 13/076,327, entitled “Network Architecture with Distribution ofPacket Services to Various Switches”, all by the current inventors andfiled on the same date as the current application and all of which arehereby incorporated by reference.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The invention relates to network switches and management tools, and moreparticularly to switches and management tools for executing anddeploying network services.

2. Description of the Related Art

One problem that exists today in an enterprise environment is that anumber of dedicated appliances are necessary to perform various networkfunctions, such as wireless LAN control, unified communications,encryption and the like. This is problematic because it representsadditional devices to purchase and maintain and also increases routingand trip times for packets as they must traverse additional links. Thisis shown graphically in FIG. 1. FIG. 1 illustrates a general networkarchitecture 100 for an enterprise with branch offices and variouscampuses. A campus core network 102 includes a plurality ofinterconnected core switches 104. The core switches 104 are connected toa data center (not shown). A router 106 is connected to the coreswitches 104. The router 106 connects through a wide area network (WAN)108 to a branch office network no. The branch office network no includesa unified device 112 which operates as a router, virtual private networkinterface, unified communication interface, switch and PBX. Thereforetelephones 114, computers 116 and wireless access points 118 areconnected to the unified device 112. A campus aggregation network 120 isconnected to the campus core network 102. The campus aggregation network120 includes switches 122 and 124. The switches 122 and 124 areconnected to the core network switches 104. Connected to the switch 124in FIG. 1 is a WLAN controller 126, a call manager 128, a network accesscontroller 130, a unified threat management (UTM) device 132 and anetwork behavioral analysis (NBA) device 134. These are the variousdedicated appliances for the relative type of traffic. For example, theWLAN controller 126 is used to manage wireless access control into thenetwork, the call manager 128 handles unified communications, and theUTM 132 handles various threats and the like. A large campus accessnetwork 140 includes a series of stackable switches 142 which areconnected to the switches 122 and 124. Connected to the stackableswitches 142 are telephones 144, computers 146 and wireless accesspoints 148. A medium campus access network 150 includes a series ofswitches 152 and 154 which are connected to the switches 122 and 124.Connected to the switches 152 and 154 are telephones 156, computers 158and wireless access points 160. A small campus access network 170includes a switch 172 which is connected to the switches 122 and 124. Aseries of computers 174 are shown connected to switch 172. This is atypical enterprise network configuration with the various exemplarypieces. It can be seen that to handle the wireless access traffic forthe various wireless access points such as 148 and 160, network trafficwould be transferred through the relevant switches such as 142, 154 and124 to the WLAN controller 126 for control. The network traffic wouldthen transfer from the WLAN controller 126 back to the switch 124 to thecore switches 104. Similarly, unified communications such as call setupswould have to travel from the telephones 144 or 156 to the call manager128 through the switches 153, 154, 142 and 124 and then back to thenetwork as required. This illustrates the multiple routes andback-and-forth that must occur with the dedicated appliances. It isdesirable to remove these special-purpose appliances.

SUMMARY OF THE INVENTION

In preferred embodiments according to the present invention, virtualmachine environments are provided in the switches that form a network.The virtual machines are used to execute network services previouslyperformed by dedicated appliances. The virtual machines can be executedon a single multi-core processor in combination with normal switchfunctions or on services processor boards added for the purpose ofexecuting the services. The packet processors in the switch portsanalyze incoming packets and add a services tag containing servicesentries to any packets requiring available network services. Each switchreviews the services tag and performs any network services resident onthat switch, removing the services entry for that service. This allowsservices to be deployed at the optimal locations in the network, such asthe edges or the core, rather than requiring multiple traverses of linksto use dedicated appliances. The network services may be deployed to theswitches by use of a graphical user interface and drag and dropoperations. A topology view of the network is presented, along withnetwork services that may be deployed. Multiple services may be selectedand dragged to a single switch or multiple switches may be selected andthen the services selected and dragged to the selected switches. Themanagement tool deploys the network services software, with virtualmachines being instantiated on the switches as needed to support thenetwork services.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram of a prior art enterprise network architectureand devices.

FIG. 2 is a block diagram of a first embodiment of the software andhardware environments of a switch according to the present invention.

FIG. 3 is a block diagram of a second embodiment of the software andhardware environments of a switch according to the present invention.

FIG. 4 is a flowchart of switch operations according to the presentinvention.

FIG. 5 is a block diagram of an enterprise network architectureaccording to the present invention illustrating exemplary virtualmachines and the services that need to be performed.

FIG. 6 is the embodiment of FIG. 5 with the tasks distributed to therelevant switches in the network.

FIG. 6A is a block diagram of a network for distributing networkservices software according to the present invention.

FIGS. 7 and 8 are screen captures of a graphical user interface formanaging a network of FIG. 5 and distributing services software.

FIG. 9 is a view of the graphical user interface illustrating servicessoftware and a topology view of an exemplary network.

FIG. 10 illustrates the drag-and-drop of selected software services to aswitch according to the present invention.

FIG. 11 illustrates the distribution of selected software services to aplurality of selected switches according to the present invention.

FIG. 12 illustrates the deployment indications of the selected servicesaccording to the present invention.

FIG. 13 is an alternate block diagram of a series of connected switcheswith various distributed services according to the present invention.

FIG. 14 illustrates data to be transmitted through the network of FIG.13.

FIG. 15 illustrates the data provided in FIG. 14 after operation byswitches with the selected services according to the present invention.

FIG. 16 illustrates the data of FIG. 15 being received at the coreswitch of FIG. 13.

FIG. 17 is a diagram illustrating a more complex data flow through anetwork from various devices according to the present invention.

FIG. 18 is the block diagram of FIG. 17 with the necessary services tobe deployed according to the present invention.

FIG. 19 is a further breakdown of the services of FIG. 18 intoindividual components.

FIG. 20 illustrates the full dataflow from FIG. 19 to the variousnetwork interfaces according to the present invention.

FIG. 21 illustrates an exemplary enterprise network including cellularconnectivity for illustration of data flows and services deploymentaccording to the present invention.

FIG. 22 illustrates the dataflow in the WiFi coverage area of FIG. 21according to the present invention.

FIG. 23 indicates illustrates the services deployment for a HIPAAinfrastructure for the network of FIG. 21 according to the presentinvention.

FIG. 24 illustrates the active services for unified communication dataflow through the network of FIG. 23.

FIG. 25 illustrates the active services for a data transfer for thenetwork of FIG. 23.

DETAILED DESCRIPTION

In embodiments according to the preferred invention, a conventionalswitch is utilized with software changes. For this invention, the termswitches encompasses data traffic from Layers 1 through 7 in theconventional Open Systems Interconnection (OSI) model as defined by theInternational Organization for Standardization (ISO), along with theITU-T. Two alternate embodiments are provided in FIGS. 2 and 3.

In the first embodiment of FIG. 2, a switch 200 is illustrated as havinghardware 202 and software 204 environments. Discussing first thehardware environment 202, a plurality of packet processors 206 areillustrated. The packet processors 206 include a plurality of networkports 207 for receiving network communications. The packet processors206 are connected to a switch fabric 208. The switch fabric 208 providesthe basic switching operations for the switch 200. A processor complex210 is connected to the switch fabric 208. The processor complex 210 inthe embodiment is illustrated as having four cores 212. This is onepreferred embodiment. In alternate embodiments the processor complex 210can have more cores or fewer cores or can consist of multiple processorseach having single or multiple cores.

The software environment 204 includes a hypervisor 212 to operate aseries of virtual machines (VMs) as known to those skilled in the art.The first virtual machine in the illustrated embodiment is conventionalswitch operations virtual machine 214. These are the operationsperformed in a conventional prior art switch and generally deal with theoperations of the switch fabric 208, the packet processors 206 and thebasic routing functions of the switch 200. According to the preferredembodiment there are additional virtual machines operating in the switch200. The first of these is a management service virtual machine 216. Themanagement service VM 216 manages the network services being provided bythe particular switch 200 and other switches in the network. Themanagement service VM 216 includes a local network services VM table 218to list the local network services operating on the particular switch200. A device/ports/end-user services table 220 is provided in themanagement service VM 216 to cooperate with the packet processors 206 toprovide proper tagging of received packets to allow operation by thevarious network services modules. Also illustrated in the embodiment ofFIG. 2 are a plurality of network service virtual machines 222. Theseare the VMs that perform the various network services that have beendistributed to the switches according to the present invention. Thesenetwork service VMs 222 perform the functions that would have previouslyrequired dedicated appliances. The operation of the network servicevirtual machines 222 is described below in more detail.

To provide hardware support for the provision of the network services,the packet processors 206 include additional capabilities fromconventional packet processors. Each packet processor 206 includes aconventional policy routing table 230 to provide conventional L2 VLAN orL3 routing. In addition, the packet processor 206 analyzes the incomingpacket and determines by reference to a local copy of the device/portservices table 236 if the incoming packet is to have any networkservices performed on the particular packet. If so, a services tag, tobe described in more detail below, is placed into the packet. A servicemodule 232 examines the services tag and a local network services VMtable 234 to determine if any network services present in the switch 200are to be provided on the particular packet of interest. If one or moreof the needed services is operational on the switch 200, the servicemodule 232 directs that the packet be routed to the proper virtualmachine or machines running on the processor complex 210 to provide theservice or services. When the network service is completed, the networkservices VM 222 removes its entry from the services tag and forwards thepacket to the next network service VM 222 or to the switch fabric 208for routing from the switch 200.

The processors utilized in current switches are sufficiently powerfulthat the hypervisor and the multiple VM environment does not exhausttheir capabilities, allowing operation of the network services in thevirtual machines. In addition, embodiments according to the presentinvention can enable network service virtual machines to be dynamicallycreated in desired switches in the network in order to provideadditional services capacity as and where needed, such as due to failureof another switch, reconfiguration of the network, additional traffic inthe network or deployment of new network services software as describedbelow.

In the second embodiment of FIG. 3, the processor complex 210 isreplaced by a switch processor 302 and one or more services processorboards 304. The switch processor 302 operates essentially conventionallyexcept the management service 216 is executing on the switch processor302, though not as a virtual machine but as a conventional task. Thenetwork services are executed on the separate services processor boardor boards 304, which are connected to the switch fabric 208. In thissecond embodiment, a processor, preferably an x86 processor rather thanthe more conventional PowerPC processor used for switch management,executes the hypervisor 212 and the virtual machines 222 which providethe local network services. As in the first embodiment, virtual machines222 can be created dynamically. The second embodiment has the additionalcost of the services processor boards 304 but generally is able toexecute more or more complicated network services then first embodimentdue to the dedicated capability of the services processor boards 304 andcan generally execute network services software intended to operate onx86 processors.

As shown in FIG. 4, in operation, in step 400 an edge switch receivesthe packet or frame. A packet processor 206 in the edge switch performspolicy-based routing, such as L2 VLAN or L3 routing in step 402. Thepacket processor 306 also examines the packet and places a services tag,which indicates the particular services, into the packet in step 404.The services are determined by reviewing the relevant information, suchas VLAN or L3 information, and the device/port/end user services table236. The services tag preferably includes an identifier to indicate thevarious types of services and service levels and so on as necessary forthe particular packet, as described in more detail below. The servicestag is in addition to or in replacement of selected tags that arecommonly present in Ethernet packets. The packet is then provided instep 406 to the service module 232 in the packet processor 206 toexamine the services tag to see if any of the local network servicevirtual machines are indicated. If so, then the packet is routed to theparticular virtual machine or machines that are indicated, which then instep 408 perform their operations. Preferably when each network servicesvirtual machine completes its operations, it removes its indication fromthe services tag to indicate that it has performed its operations andthey are not to be re-executed on the next particular switch, unless ofcourse it is appropriate. A loop of passing through virtual machines inthe local switch continues until all local network services virtualmachines that are appropriate have been utilized is done in step 410. Ifnone of the local network services virtual machines are appropriate orthe last one has been utilized, in step 412 the edge switch thenforwards the packet to an aggregation switch in a typical largeenterprise environment, such as in FIG. 1 or 5.

The aggregation switch receives the packet in step 414 and then performsthe same basic operations as the edge switch, though the services tagmay be updated. When all the virtual machines have completed operationor none are present, the aggregation switch in step 416 sends the packetto a core switch.

The core switch receives a packet in step 418 and then performs the samebasic operations as the aggregation switch. When all of the virtualmachines have completed their operations or if none are present, thecore switch in step 420 sends the packet onto the destination using anaggregation switch or to the data center. The aggregation and edgeswitches on the path out from the core will operate similarly andutilize any relevant local network services virtual machines.

Referring to FIGS. 5 and 6, a network 500 similar to that of FIG. 1 isshown except that the switches and devices are adapted to operateaccording to the present invention and the specialized appliances havebeen removed. Like devices from FIG. 1 are numbered as in FIG. 1.Similar devices that operate according to the present invention arerenumbered with the leading digit of five to indicate the same generalfunction but with the addition of virtualized network services accordingto the present invention. Exemplary virtualized network services areshown in a list 580. These network services include security, unifiedcommunications, WLAN, access router functions and fixed mobileconvergence functions. A VM block 582 is illustrated to show thehypervisor and network services VMs as described in FIGS. 2 and 3. TheVM blocks are provided next to appropriate switches and devices. Forexample, VM block 584 is adjacent to the router/VPN device 512, VM block586 is adjacent to the switch 572, VM block 588 is adjacent switchesfive 552 and 554, VM block 590 is adjacent switches 542, VM block 592 isadjacent switches 522 and 524 and VM block 594 is adjacent switches 504.The virtual machines in the associated block execute on all of theindicated switch groups. For example, the VM block 588 is executing onboth switches 552 and 554. FIG. 6 provides a detailed breakdown ofexemplary network services deployed to each of the virtual machines. VMblock 584 includes services that include access router, firewall, VPN,WLAN controller, voice controller and unified communications/VoIP. VMblock 586 executes network services such as content awareness, firewall,intrusion protection services, application filtering, identity servicesand encryption. VM block 588 includes exemplary services such asencryption, WLAN controller, voice controller, identity services andunified communications. VM block 590 executes the same services as VMblock 588. VM block 592 includes just encryption services. VM block 592only needs to perform encryption services as the edge switches 542, 552,554 and 512 and the like have performed the services more appropriate tobe done at the edge. VM block 594 associated with the core switches 504includes services such as encryption, VPN and unified communications.From viewing FIG. 6, it can be readily seen that the relevant servicesare deployed as needed depending upon the layout of the particularnetwork. In general the services are deployed at the particular firstpoint of use, not at a point later in network which might requirerouting and rerouting packets.

The above virtual machine network services environment provides veryflexible operations but will be difficult to administer without propertools. Because there are conventionally a very large number of switches,such as edge, core, and aggregate, in a typical enterprise and they arewidely distributed, a convenient network management tool is necessary.In the preferred embodiment a management station 606 includes amanagement tool 608 which is provided to enable a customer to buyvirtual machine services from an online store provided by a web server604, shown in a web server network 600 and connected using switch 602 tocore switches 504, and link the services to rules that govern the datatraffic flow through the customer's network. This tool 608 allowspurchase of desired network services from the online store from a webbrowser interface. The tool 608 has knowledge of the revision levels ofexisting network services already present on the customer's network byuse of a deployments table 614 and, therefore, is able to indicate tothe customer appropriate update revisions available from the onlinestore. In addition to new network services not present on the customer'snetwork, the online store also automatically indicates other associatedproducts for each service, such as professional and technical supportservices, and education materials. Further, the online store offers bothproducts and services from the online store owner and the owner'spartners. The tool 608 can also link to license management software 610in case the customer has bulk licensing terms for selected software,allowing use of an existing, available license if one is present, asmight happen if services are being migrated around the network asneeded. FIGS. 7 and 8 illustrate an exemplary browser interface 700. Afunction pane 702 is provided to allow selection of the desiredmanagement function, as seen in the list in function pane 702. In theexample of FIGS. 7 and 8, the selected function is the vNet Store, theexample online store. A network services pane 704 lists the variousnetwork services available for purchase by the customer. The vNet Storewill behave as a conventional online store, allowing selection andcheckout. Delivery of the selected network service software willpreferably be handled in an online manner, with both distribution of thesoftware and any necessary keys handled by the store and the tool 608.

After various network services have been obtained, deployment of thenetwork services is preferably done using a drag and drop operation.FIG. 9 illustrates a screenshot 900 of the application. A function pane902 is provided, essentially the function pane 702 but with a L2Topology View selected rather than the vNet Store. This results in threedifferent panes appearing. The first pane is a working topology pane904. An overview topology pane 906 is provided to allow the pane 904 tobe placed in context of the entire network. The area 910 is the topologyportion displayed in pane 904. A network services pane 908 is providedand lists the various services that may be deployed.

In FIG. 10, a set of services 1002 has been selected for deployment toswitch 1004. The selected set of services 1002 is dragged from the pane908 to over the switch 1004 and dropped. This causes the tool 608 toobtain local copies of the network services 616 and deploy the selectedservices to the switch 1004. New virtual machines are instantiated toexecute the new services. Copies of the services software is provided tothe switch 1004 by the tool 608. Once the copies are loaded and thevirtual machines configured, the virtual machines are started and theexecution of the services begins. Any necessary changes to otherswitches in the network due to the installation of the new services isalso made. For example, all edge switches receive an indication of thenew service and its intended use to allow the packet processors toproperly insert any services tag information relating to the newservices.

FIG. 11 depicts provisioning or deployment to multiple switches at onetime. A group of switches is selected in the box 1102. The cursor ismoved to the services pane 908 and the desired services are selected, asin the box 1104. The selected services are then dragged over the box1102 of the selected switches and dropped. This causes the tool 608 todeploy the services to multiple switches with one simple operation. FIG.11 also shows a star over switch 1004. This symbol is used to indicatethat network services have been successfully deployed in this session.FIG. 12 is the result after the deployment done in FIG. 11. It is notedthat switch 1202 does not have a star, even though it was included inthe selected set 1102. This indicates that none of the network servicesselected (set 1104) was appropriate to execute on switch 1202 and thuswere not deployed to that switch 1202.

The management tool 608 enables the customer to link their purchasedservices to network policy 612 where network policy is defined as theset of rules applied to specific data flows on the customer's network.Moreover, this policy 612 can include specifying rules and services tonetwork context. Network context is defined as the state of the dataflow on the network where state consists of the data flow's end-userentity and functional role in the enterprise, and the priority of thedata flow relative to other flows that may enter the network. Thislinkage of network services to network policy is referred to as bindingnetwork services to network context. After the customer uses the tool608 to bind services to network policy 612, the management tool 608 thenselects the proper software and provides it to the indicated switch,which includes the relevant tools to allow the creation and execution ofthe new virtual machine for the newly provided service.

Thus the use of the topology view in conjunction with a services paneand drag and drop operation provides a very simple method to deploy theservices to single or multiple switches.

FIG. 13 provides a network 1300 with edge switches 1302 connected to acore switch 1304. The edge switches perform L2 routing 1306, L3 routing1308, WLAN network services 1310, unified threat management services1312 and unified communications services 1314. The core switch 1304performs WLAN services 1320, unified threat management services 1318 andunified communications services 1316. FIG. 14 adds a data packet 1400,which is transmitted from one of the attached computers to the edgeswitch 1302. The data packet 1400 has various portions, broken outabove. The data packet includes a destination MAC address 1402, a sourceMAC address 1404, a tag protocol identifier 8100 1406 for the outer VLANtag 1408, a tag protocol identifier 9100 1410 for the inner VLAN tag1412 and the payload 1414.

FIG. 15 has the data packet 1400 after processing by the packetprocessor of the edge switch 1302. The data packet 1500 is the datapacket 1400 with a service chain tag added to the packet as illustrated.In the preferred embodiment the service chain tag 1502 is added betweenthe VLAN tags 1408 and 1412, but other locations are possible. Theservice chain tag 1502 is a series of service indications. The servicechain tag 1502 starts with a service tag identifier 1504. Then follows aseries of services entries, with only two illustrated. A services entrystarts with the type of service 1506 and ends with a service level field1508. The second services entry follows, with a type of service field1510 and service level field 1512 for the second service is shown. Otherservices entries would follow until all needed services have beenindicated.

FIG. 16 illustrates the data packet at the core switch 1304. The datapacket 1600 is the data packet 1500 with any services entries relatingto services performed by the edge switch 1302 removed, leaving justservices to be performed by the core switch 1304. The core switch 1304would perform the appropriate services and route the data packet 1600,with any performed services entries removed, to the next destination.

FIGS. 17-20 are an alternate representation of operations according tothe present invention. A network 1700 includes a series of switches1702. A series of servers 1704 are connected to the switches 1702 andtransfer data 1714. Devices 1706, such as wireless access points 1708,computers 1712 and phones 1710 are connected to the switches 1702 andprovide data packets 1716, unified communications packets 1718 and WLANdata packets 1720. Four basic services, unified communications 1802,WLAN 1804, WAN 1806 and unified threat management 1808 are running onthe switches 1702. These services break out as illustrated in FIG. 19.Services with a dark ring around them are operational with the trafficillustrated in FIG. 19. The WLAN service 1902 operates on the WLAN data1720. The unified communications service 1802 breaks out the unifiedcommunication service 1910 and operates on the unified communicationspackets 1718. The WAN service 1909 breaks out to WAN optimizationservice 1906 and business class broadband service 1908, used primarilyfor WAN link aggregation, and they operate on operates on data packets1714 and 1716 directed to the WAN 1950. Unified threat management ishandled by VPN services 1916 and firewall services 1914, though it isunderstood that other specific services are common in UTM operations.FIG. 20 illustrates the data flow after the switches 1702 have performedthe services. A private link 2008 is developed to transfer data 2010 andunified communication data 2020 over the WAN 1950. Internet connections2012 and 2016 carry WAN data 2010, VPN data 2014, unified communicationdata 2020 and normal data 2018, respectively. A PSTN link 2004 connectsto the PSTN network 2002 to carry unified communications data 2020.

FIGS. 21-25 provide a last example of the operation of the deployedservices in virtual machines in appropriate switches in a network. Inthe illustrated environment, a smartphone with cellular and WiFicapability is used as the data access device, with the smartphone movingfrom the 3G cellular network to the campus WiFi network. FIGS. 23-25illustrate operations when a secure environment, such as those dictatedby HIPAA (Health Insurance Portability and Accountability Act of 1996),is utilized, while FIGS. 21 and 22 are a less secure environment.

A smartphone 2102 is operating in an environment 2100. The smartphone2102 is connected via a cellular network 2104. Voice packets 2106 aretransferred normally to a cellular base station 2108. A VPN 2110 isestablished to carry data packets 2112 to the enterprise network. Theenterprise network includes a campus WiFi coverage area 2114 from acampus access network 2116. The campus access network 2116 is connectedby switches 2122 to an aggregation network 2118 and its switches 2124and 2126. The aggregation network 2118 is connected to a core network2120 and its core switches 2128. The core switches 2128 are operatingencryption services 2132 for the VPN link 2110. Thus the smartphone 2102is communicating with the core switches 2128 over the VPN 2110 with thecore switches handling the VPN service. The core switches 2128 alsowould execute the 3G/WLAN services 2130, but those are used only forhandoff between the 3G cellular network 2104 and the WiFi network 2114.Because such an example is not shown, the 3G/WLAN services 2130 are notshown as active in the Figures.

In FIG. 22 the smartphone 2102 has entered the campus WiFi coverage area2114 and is performing data transfer operations. A wireless access point2202 establishes a connection 2204 with the smartphone 2102 to transferdata 2206. The switches 2122 execute WLAN services 2208, applicationaware services 2210 and encryption services 2212. The data packet 2206travels to the core switches 2128, which have the encryption services2132 and 3G/WLAN services 2130 installed but they do not operate on thedata packet 2206, as indicated by not having an outer rectangle.

In FIG. 23 a HIPAA environment 2300 is shown. Intrusion protection andfirewall services 2302 and identity services 2304 are added to theswitches 2122. Encryption services 2306 are added to the switches 2124and 2126. Unified communication services 2308 are added to the coreswitches 2128. In FIG. 24 the smartphone 2102 is making a unifiedcommunications call. The smartphone 2102 is connected 2402 to thewireless access point 2202 to provide unified communications data 2404.The WLAN services 2208 and intrusion protection and firewall services2302 are active on the switches 2122 and the unified communicationsservices 2308 are active on the core switches 2128. In FIG. 25 thesmartphone 2102 is transferring data packets 2504 over a link 2502 tothe wireless access point 2202. All of the services on switches 2122 areactive, with encryption services 2306 on the switches 2124 and 2126 andencryption services 2132 on the core switches 2128 active. Therefore thechange in data type from the same source device has necessitated changesin the operational services for those packets. The packet processors inthe edge switches provide the additional services entries into theservices tag based on the particular data type.

Because the services that can be provided by the virtual machines aresimilar to those that would be run in many cases on a conventionalcomputer or server hooked up to the network as an appliance, the use ofvirtual machines in the switches allows incorporation of not onlyproprietary network service modules but third-party modules which areintended to run on conventional personal computer hardware. This furtherimproves the flexibility of the switches and allows additionalappliances and devices to be removed from the network.

In addition, the provision of virtual machines in the various switchesallows the network services to be deployed to the best locations fortheir operation and simplify internal routing as special routing is notrequired to occur, as would normally happen with dedicated appliances.

In addition, the virtual machine deployment in switches need not onlyoccur in the enterprise but it can also be deployed with great advantageto branch offices. Instead of an administrator having to make a choicebetween spending large amounts of money for dedicated appliances, whichmight be overly expensive for a given branch office, or foregoing theservices, a virtual machine can be deployed to the switch in the branchoffice. The branch office switch processor is underutilized in mostsituations anyway, so the extra processing capability can be readilyutilized without requiring a more powerful or more expensive switch orthe addition of numerous dedicated appliances.

The deployment of the virtual machines into the various switches whichare the entry points into the network is also highly advantageous in ahighly mobile environment where connected devices may go from a cellularnetwork, connecting to a VPN, and move into a WiFi or wireless areanetwork environment of the enterprise. Because the required pieces arepreferably deployed in the relevant switches where the initial packetsare going to be received, additional routing is not required andsecurity and the like can be readily handled to satisfactory levels suchas that required by each HIPAA and the like.

It is further understood that exemplary network services and exemplaryrelevant execution locations are described. Many other network servicescan be deployed and the network services can be executed where optimalfor a given network. It is also understood that while switches have beendescribed, other networking devices such as routers and the like canoperate as described. In other embodiments a dedicated appliance may beused in conjunction with the services chain tag provided by the edgeswitches, with the dedicated appliance executing the virtual machinesand network services. This allows multiple services to be performed inone appliance, at least limiting the number of potential network hopsneeded for full processing of a frame. It is further understood that theEthernet environment is the preferred environment but other networkprotocols can be operated as described according to the presentinvention. It is even further understood that the management anddeployment tool run be multiple modules running on one or separatecomputers and that various of the features, such as license management,can be omitted or additional features can be added. It is alsounderstood that alternative GUI operations can be utilized.

The above description is intended to be illustrative, and notrestrictive. For example, the above-described embodiments may be used incombination with each other. Many other embodiments will be apparent tothose of skill in the art upon reviewing the above description. Thescope of the invention should, therefore, be determined with referenceto the appended claims, along with the full scope of equivalents towhich such claims are entitled. In the appended claims, the terms“including” and “in which” are used as the plain-English equivalents ofthe respective terms “comprising” and “wherein.”

The invention claimed is:
 1. A network switch comprising: a tableindicating network application and security services to be performed ona given packet by the network; a packet analyzer coupled to said tableindicating network application and security services which reviewsreceived packets and determines application and security services to beperformed by the network on a received packet based on said table; and apacket formatter coupled to the packet analyzer for adding a applicationand security services tag to the received packet indicating the networkapplication and security services to be used on the received packet. 2.The network switch of claim 1, wherein said application and securityservices tag includes: a application and security service tagidentifier; and at least one application and security service entry,each application and security services entry including: a type ofapplication and security service indication; and a service levelindication.
 3. The network switch of claim 1, wherein said applicationand security services tag is placed between the received packet betweenan outer VLAN tag and an inner VLAN tag.
 4. The network switch of claim1, wherein the network switch receives instructions that additionalnetwork application and security services are to be performed in thenetwork, wherein said table is updated to contain the additional networkapplication and security services, and wherein said packet analyzerutilizes said updated table.
 5. A method comprising: examining areceived packet at the edge of a network; referencing a table indicatingnetwork application and security services and determining applicationand security services to be performed on the received packet; and addinga application and security services tag to the received packetindicating the network application and security services to be used onreceived packet.
 6. The method of claim 5, wherein said application andsecurity services tag includes: a application and security service tagidentifier; and at least one application and security service entry,each services entry including: a type of application and securityservice indication; and a service level indication.
 7. The method ofclaim 5, wherein said application and security services tag is placedbetween the received packet between an outer VLAN tag and an inner VLANtag.
 8. The method of claim 5, wherein instructions that that additionalnetwork application and security services are to be performed in thenetwork are received, wherein said table is updated to contain theadditional network application and security services, and wherein saiddetermined application and security services to be performed on thereceived packet is based on said updated table.
 9. A network comprising:a plurality of interconnected switches which form the network, at leasta first number of said plurality of interconnected switches operating asedge switches, wherein each of said plurality of interconnectingswitches operating as edge switches includes: a table indicating networkapplication and security services to be performed on a given packet; apacket analyzer coupled to said table indicating network application andsecurity services which reviews received packets and determinesapplication and security services to be performed on a received packetbased on said table; and a packet formatter coupled to the packetanalyzer for adding a application and security services tag to thereceived packet indicating the network application and security servicesto be used on the received packet.
 10. The network of claim 9, whereinsaid application and security services tag includes: a application andsecurity service tag identifier; and at least one application andsecurity service entry, each application and security services entryincluding: a type of application and security service indication; and aservice level indication.
 11. The network of claim 9, wherein saidapplication and security services tag is placed between the receivedpacket between an outer VLAN tag and an inner VLAN tag.
 12. The networkof claim 9, wherein each of said plurality of interconnecting switchesoperating as edge switches receives instructions that additional networkapplication and security services are to be performed in the network,wherein said table is updated to contain the additional networkapplication and security services, and wherein said packet analyzerutilizes said updated table.