Entity

Time filter

Source Type

Santa Clara, CA, United States

A method for monitoring network conditions by receiving a first condition definition describing a first network condition to be monitored in a network and an activation definition, determining a network topology of the network, and compiling the first condition definition to generate a first data plane component, a first control plane component, and an activation component. The method also includes deploying the first data plane component into a data plane of the network, where the data plane component captures and synthesizes a first stream of network events to generate a first modified stream of network events. The method also includes deploying the control plane component into a network operating system for the network. The control plane component receives and correlates the first modified stream of network events. The method also includes deploying an activation component that, upon receiving the correlated stream of events, initiates the activation definition.


The method includes receiving, by a data plane definition language compiler, a first data plane definition describing customized functionality of a data plane of a first network application, and compiling the data plane definition to generate a first set of customized data processing modules and a program interface that allows a control plane of the network application to access the first set of customized data processing modules. The method also includes loading the first set of customized data processing modules into a data plane container, wherein the network application is executed via a network operating system, and wherein, upon execution of the network application the customized data processing module causes the data plane container of the network application to process packets differently than prior to loading the customized data processing module in the data plane container.


A method for network storage by receiving, by a storage compiler, a first storage definition from a storage application developer, where the first storage definition describes a customized storage implementation for storing data in an abstraction of at least one physical storage device, compiling the first storage definition to generate a first customized storage implementation module, and loading the first customized storage implementation module into an IO engine. The first customized storage implementation module causes data to be stored in the at least one physical storage device differently than prior to loading the first customized storage implementation module in the IO engine.


News Article | June 25, 2014
Site: www.eweek.com

Instead of using SSL for data in motion encryption, PLUMgrid is leveraging a new approach to keep the cloud safe. The open-source OpenStack cloud platform is getting a security boost today thanks to software-defined networking (SDN) vendor PLUMgrid . PLUMgrid's new OpenStack Networking Suite is an attempt to provide virtual networking and security through the use of a number of innovative technologies. The OpenStack cloud platform is made up of multiple components, including the Neutron networking project. The PLUMgrid OpenStack Networking Suite plugs into Neutron, enabling cloud administrators to create and manage a virtual cloud network. The PLUMgrid solution has a plug-in that works with the recent OpenStack Icehouse release as well as one for the OpenStack Havana release that debuted in 2013. The PLUMgrid solution is built on top of the company's SDN platform that was first announced in June 2013. At the time, PLUMgrid was just emerging from its stealth phase and had received $10.7 million in funding. Awais Nemat, co-founder and CEO of PLUMgrid, told eWEEK that his company has now raised a new $16.2 million round of funding to help further advance PLUMgrid's technologies. The OpenStack Networking Suite, Nemat said, is built on top of his company's core PLUMgrid platform, which includes a virtual switching technology known as IO Visor. The IO Visor technology is now in the process of becoming part of the open-source Linux kernel, with some components already included in the Linux 3.15 kernel The PLUMgrid OpenStack Networking Suite introduces the idea of a virtual private cloud to the OpenStack market. Amazon Web Services has been providing a virtual private cloud ( Amazon VPC ) to its users, providing privacy and isolation for a cloud deployment."We are bringing to OpenStack secure virtual domains that you can think of as VPC on steroids," Nemat said. "It's a private, logical data center." The way it works is a virtual domain can be spun up that provides an independent and private IPv4 address space and other private networking services, including router, DNS and load balancing capabilities. Networking is only one aspect of any OpenStack deployment; there is also the Nova compute project within OpenStack that provides the actual compute virtualization layer. Pere Monclus, co-founder and CTO of PLUMgrid, explained to eWEEK that the virtual machine is created by OpenStack Nova and the network is an area where enforcement of privacy and security policy can occur. One of the particularly interesting ideas that the PLUMgrid OpenStack Networking Suite introduces, aside from tenant isolation using private virtual networks, is the notion that all traffic within the network is encrypted. Secure Sockets Layer (SSL)-based encryption for data in motion is widely used within OpenStack, but PLUMgrid isn't using SSL. Instead, Monclus said that the technology his company is using is an overlay-based encryption approach within VXLAN. VXLAN is a key SDN networking protocol that typically does not include encryption. If there is a security breach where traffic gets sent to the wrong location, the traffic is encrypted, limiting the risk, he noted. PLUMgrid is now working with its partners to submit a draft proposal that includes its VXLAN encryption features as part of the main VXLAN standard, Monclus added.To help expedite workload deployments, the PLUMgrid OpenStack Networking Suite includes recommended blueprints for specific deployments. The first round of blueprints that PLUMgrid is making available includes one for the CloudFoundry platform-as-a-service (PaaS) technology. The idea of rapid deployment models for workloads within OpenStack is not a new one. The Heat orchestration project was included as part of the OpenStack Havana release in October 2013, providing a template-based approach for cloud application deployment. Monclus noted that PLUMgrid does not currently leverage Heat, though he said it is on the roadmap for future automation and orchestration. Sean Michael Kerner is a senior editor at eWEEK and InternetNews.com. Follow him on Twitter @TechJournalist.


News Article | August 16, 2015
Site: techcrunch.com

The Linux Foundation and PLUMgrid today announced an alliance of hardware manufacturers, Linux distribution vendors and others that aims to advance Linux networking and virtualization for modern data centers. Other partners in this alliance include Barefoot Networks, Broadcom, Canonical, Cavium, Cisco, Huawei, Intel, and SUSE. The project will be based on PLUMgrid’s existing IO Visor technology, which the company is donating to the project. The Linux Foundation will offer additional support. The trend in compute, storage and networking is toward virtualization, and PLUMgrid argues that I/O and networking subsystems need to keep up, especially when it comes to Internet of Things applications. In PLUMgrid’s view, the trend toward delivering network functions as virtual appliances — as opposed to expensive single-purpose hardware routers and switches — creates performance and scale bottlenecks because, the company argues, these virtual appliances weren’t built to easily scale with demand. “As a company that actively supports a number of open source projects, we believe that open sourcing IO Visor through a community hosted with the Linux Foundation was in the best interests of not only our company, but of everyone dependent upon agile and highly performant cloud technologies at scale,” said PLUMgrid founder and CTO Pere Monclus. That all sounds pretty abstract, but the idea here is to build the IO Visor into every server in the data center to create a virtual network. The visor then works with PLUMgrid’s Director service to create the data layers that connect all of these networks according to the developers’ needs. “This collaboration is critically important as virtualization is putting more demands on flexibility, performance and security,” said Jim Zemlin, executive director of the Linux Foundation. “Open source software and collaborative development are the ingredients for addressing massive change in any industry. IO Visor will provide the essential framework for this work on Linux virtualization and networking.”

Discover hidden collaborations