Mobile overlay virtual enterprise network and virtual internet for enterprises
11025540 · 2021-06-01
Assignee
Inventors
Cpc classification
H04L45/08
ELECTRICITY
G06F15/173
PHYSICS
International classification
G06F15/173
PHYSICS
Abstract
An overlay network for use with a data network that routes packets from one location on the data network to another location on the data network, the overlay network comprising one or more software nodes, at least one of the software nodes configured to receive commands from an application, the application including software for generating the commands and sending the commands to the at least one of the software nodes, the commands used by the at least one of the software nodes to control routing of packets, generated by the application, through the data network. In addition, a method of routing packets through a physical network by providing one or more software nodes connected to each other over the physical network to form an overlay network and forming a communications channel between at least one of the software nodes and an application, wherein the application instructs the at least one software node on how to route data over the physical network. Further, a software platform for network communications that includes computer-executable instructions configured to generate a global overlay network, which enables an application to determine a network path through an underlying access network for data generated by the application.
Claims
1. A method for routing data generated by an application to a destination under control of the application, the method comprising: a) instructing, with the application, a software node of a global overlay network to initially route the data to a policy-defined target node of an underlying access network; b) at the policy-defined target node, analyzing, using another software node of the global overlay network or a routing engine: (1) needs of the application; (2) a respective real time status of each respective candidate next hop node of one or more candidate next hop nodes; and (3) associated paths through the underlying access network to the policy-defined target node, the associated paths comprising at least one path traversing both a mobile overlay virtual enterprise (MOVE) network and a virtual internet for enterprise (VINE) network; c) selecting, with the another software node or the routing engine, at least one of the one or more candidate next hop nodes of the underlying access network that best meets the needs of the application; d) causing the data to be routed to the at least one of the one or more candidate next hop nodes of the underlying access network, as selected; and repeating steps b)-d) until the data reaches the destination.
2. The method of claim 1, wherein the needs of the application include end-to-end policies of the application.
3. The method of claim 1, wherein the needs of the application include end-to-end policies for desired business results of the application.
4. The method of claim 1, wherein software nodes of the global overlay network are agnostic to at least one of network technology or network ownership of the underlying access network.
5. The method of claim 1, wherein software nodes of the global overlay network are located in a public cloud, a private cloud, an Internet backbone environment, or on end user devices.
6. The method of claim 1, wherein software nodes of the global overlay network comprise one or more of applications, VNFs, standalone devices running on commodity computers, purpose built appliances, or services embedded in network infrastructure.
7. The method of claim 1, wherein the application comprises at least one of: an enterprise application; a software as a service (SaaS); a platform as a service (PaaS); an internet of things (IoT); a cognitive computing application; an artificial intelligence (AI) application; a virtual reality application; an augmented reality application; a gaming application; or an entertainment application.
8. The method of claim 2, wherein the end-to-end policies can be set or changed according to at least one of real-time conditions, triggers, or events.
9. The method of claim 1, wherein software nodes of the global overlay network are connected as traditional networked nodes, as peer-to-peer mesh nodes, or as any combination thereof.
10. The method of claim 5, wherein: the software nodes of the global overlay network comprise the services embedded in the network infrastructure; and the services embedded in the network infrastructure comprise gateways and session border controllers.
11. A system for routing data generated by an application to a destination under control of the application, the system comprising: a global overlay network comprising software nodes; and the application, wherein the application is configured to perform: (a) instructing, with the application, a software node of the global overlay network to initially route the data to a policy-defined target node of an underlying access network; (b) at the policy-defined target node, analyzing, using another software node of the global overlay network or a routing engine: needs of the application; a respective real time status of each respective candidate next hop node of one or more candidate next hop nodes; and associated paths through the underlying access network to the policy-defined target node, the associated paths comprising at least one path traversing both a mobile overlay virtual enterprise (MOVE) network and a virtual internet for enterprise (VINE) network; (c) selecting, with the another software node or the routing engine, at least one of the one or more candidate next hop nodes of the underlying access network that best meets the needs of the application; (d) causing the data to be routed to the at least one of the one or more candidate next hop nodes, as selected, of the underlying access network; and repeating steps b)-d) until the data reaches the destination.
12. The system of claim 11, wherein the needs of the application include end-to-end policies of the application.
13. The system of claim 11, wherein the needs of the application include end-to-end policies for desired business results of the application.
14. The system of claim 11, wherein the software nodes of the global overlay network are agnostic to at least one of network technology or network ownership of the underlying access network.
15. The system of claim 11, wherein the software nodes of the global overlay network are located in a public cloud, a private cloud, an Internet backbone environment, or on end user devices.
16. The system of claim 11, wherein the software nodes of the global overlay network comprise one or more of applications, VNFs, standalone devices running on commodity computers, purpose built appliances, or services embedded in network infrastructure.
17. The system of claim 12, wherein the application comprises at least one of: an enterprise application; a software as a service (SaaS); a platform as a service (PaaS); an internet of things (IoT); a cognitive computing application; an artificial intelligence (AI) application; a virtual reality application; an augmented reality application; a gaming application; or an entertainment application.
18. The system of claim 12, wherein the end-to-end policies can be set or changed according to at least one of real-time conditions, triggers, or events.
19. The system of claim 11, wherein the software nodes of the global overlay network are connected as traditional networked nodes, as peer-to-peer mesh nodes, or as any combination thereof.
20. The system of claim 15, wherein: the software nodes of the global overlay network comprise the services embedded in the network infrastructure; and the services embedded in the network infrastructure comprise gateways and session border controllers.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1)
(2)
(3)
DETAILED DESCRIPTION
(4) Disclosed herein is a platform, network and network control plane that enable applications to determine, or at least influence, their own network paths. The application tells the switches and routers how and where to route its packets. The “where” may comprise a global overlay network, which includes endpoints, IP Back to Back User Agents (BBUAs), and management and control instance, that is managed according to the present invention. The global overlay network may be built on an existing endpoint and BBUA software. In one non-limiting embodiment, the global overlay network may be built on the endpoint and IP BBUA software disclosed in U.S. Pat. No. 9,071,607, the entire disclosure of which is incorporated herein by reference. Further, the network of the present invention can continually “negotiate” with the application to dynamically make changes. The present invention can allow application users (people and/or devices), the user's administrative domain (usually a business or organization) and provider (often an ASP), to enact policies and business logic, which control networks that they don't own or manage. The network and network control is essentially embedded inside the application, regardless of where the application is physically launched from. Therefore, applications and application managers can control any network from anywhere, according to their needs and goals, without owning or managing the network.
(5)
(6) The MOVE network and the VINE can be used for B2E (business-to-employee), B2B (business-to-business), and B2C (business-to-consumer) cloud-distributed communications amongst users, machines, and servers, to provide higher network performance, extreme levels of data-in-motion security, and enterprise-level control.
(7) In some embodiments, the MOVE network and the VINE can comprise an “embeddable enterprise network service” that enables a site-less enterprise-managed overlay VPN to be integrated within applications that require a “site-less” capability for enterprise network security and performance, unconstrained by the inflexibility of a site-level WAN or SD WAN that is bound to one or more physical networks. Such applications include without limitation: Enterprise-developed applications. 3rd party ISVs. SaaS (e.g., CRM, sales force automation, office suites, HR, Finance, ERP, document management, CAD, ITaaS, etc.). B2C services (e.g., eCommerce, Finance, Healthcare, and etc self service, service desks, Points of Sale, Kiosks). IaaS, PaaS and APaaS (e.g., AWS, Azure, Google, SalesForce, Softlayer, BlueMix, MBaaS platforms, etc.). IoT implementations (e.g., GE, Telit, PTC, Gemalto, numerous other platforms). Cloud storage (e.g., Box, Dropbox, Egnyte, etc.). cloud security (e.g., Zscaler, Bluecoat, Websense, Cisco Scansafe, etc.). UCaaS. API Service Provider platforms (e.g., Twilio, Kandy, Nexmo, Cisco Tropo, etc.). Entertainment sites. Collaboration platforms (e.g., Webex, Go to Meeting, SFB, etc.). Office application suites (e.g., Microsoft, IBM, Google).
(8) The MOVE network and the VINE, thus, add major new GTM channels for enterprise VPNs. For one example from just above, an ASP such as Microsoft Office365 for B2E or GE Predix for IoT, can integrate strong QoE, hyper-secure MOVE network into their application platform, where: The ASP can manage their multi-tenanted MOVE/VINE network as an integral part of their platform service The ASP can provide each enterprise tenant with autonomous control of their own ASP-bound VPN The tenant-level exposure may be fully integrated inside their overall platform management, it may be native white-labeled MOVE/VINE management, or it may be a hybrid.
(9) In some embodiments, the MOVE network and the VINE may be operative as a “un-network,” because they make the VPN part of an application or service instead of being a separate network that the application or service has to traverse.
(10) The MOVE network and the VINE can operate transparently across a mix of LAN and WAN, private and public, physical and virtual, fixed and mobile networks and network functions that they traverse, as illustrated in
(11) In some embodiments, the MOVE network can comprise an enterprise VPN, which provides the enterprise with autonomous performance and compliance monitoring and control for sessions amongst any of the MOVE endpoints M11-M18 (
(12) In some embodiments, the MOVE network can be implemented within a multitenant platform such as Office365 or GE Predix, but where the ASP has the ability to provide autonomous enterprise network management to each of their client enterprises, and where each enterprise can be enabled to operate to their own authentication, performance and compliance policy for Office365 or GE Predix communications.
(13) In some embodiments, as illustrated in
(14) The CE-to-PE connection may be over local underlay public internet access, encrypted such as with TLS or IP Sec or unencrypted. The VINE may require no software changes to the client application M13 or device M12 (
(15) Application and Device VPNs using TSL or IPsec tunnels over best effort internet are well-established today. The MOVE and the VINE provide a stronger value proposition for commercially-sensitive sessions where Quality of Experience is proportional to revenue and compliance must be rigorously managed. The MOVE network and the VINE provide: Better Quality of Experience:
(16) TABLE-US-00001 TLS or IP Sec over Internet MOVE and VINE over Internet Best Effort Backbone Dynamically Optimizing Backbone Single static backbone route Aggregating capacities over subject to selected path's multiple parallel backbone capacity and route latency. paths. Deselecting poor performing paths and rolling to better performers Optional QoS prioritized physical network routing On the “backhaul” from the IP BBUAs to public and private cloud endpoints On the “fronthaul” from the edge endpoints to the IP BBUAs Multi-factor hyper-security:
(17) TABLE-US-00002 Security TLS or IPsec over MOVE over VINE over Function Internet Internet Internet Software Not Applicable SDP as defined by SDP other Defined Cloud Security than the Perimeter (SDP) Alliance edge endpoint to PE PoP Data-in motion Single encrypted Flow fragments Single TLS security tunnel, single route spread across tunnel for Tunnel dynamically rolling client compromise = multiple routes, endpoint to data each fragment PE PoP. compromise encrypted in two PE to PE (eg separate “air- and PE to “Heartbleed” gapped” tunnels. Cloud is SSL flaw) Tunnel- identical to Endpoint routings compromise MOVE visible extremely Metadata difficult and exposed only partial Endpoint routings masked DDOS None High immunity. High protection Rolls from immunity congested routes, accepts traffic from authenticated endpoints Man in Middle None? High Immunity High Protection Immunity OWASP Top 10 Partial High Immunity High Protection assuming trusted Immunity endpoints assuming trusted endpoints ARP poisoning None High immunity High protection Rejects Immunity corrupted packets Data None Flow fragments can PE to PE sovereignty be routed via and PE to management selected Cloud is sovereignty identical to domains MOVE Enterprise Monitoring and Control:
(18) TABLE-US-00003 TLS or IP Sec over Internet MOVE and VINE over Internet Encrypted session Secured session Basic public internet Data sovereignty routing reporting and analytics Direct SDK or 5-Tuple policy control for QoE and Compliance Whitelist Flows Blacklist Flows Greylist Flows SDWAN-like reporting and analytics Hierarchical management rights ASP or MSP level management across enterprises nterprise-level management
(19) Various embodiments of the MOVE network, as illustrated in
(20) Various embodiments of the VINE, as illustrated in
(21) In various embodiments, the MOVE/VINE Cloud Connect M18, M25/V14, V24 and Cloud Exchange can have the following use, structure, and capabilities: Use Case: Integrates MOVE/VINE network security, performance, and resilience directly into private and public clouds Cloud Connect=singular cloud connection using a private or dedicated cloud gateway instance Cloud Exchange=on-demand connection to any of many pre-connected clouds via a multi-tenant cloud gateway instance Reduces dependency on less flexible, more costly physical MPLS VPN-based cloud connect Form Factor: VNF (virtual network function) MOVE Gateways for Public and Private Cloud connections to MOVE enterprise WANs and VINE public internet. Optional QoS on the backhaul leg from the IP Back to Back Agents to the cloud and also on the Fronthaul from edge endpoints to the Agents. Cloud Connect: Private gateways for private or dedicated instances in public and private cloud Cloud Exchange: Pre-configured autoscaling multitenant gateways in AWS, Azure/O365, Force.com/SalesForce and other public clouds
(22) The MOVE network can be implemented as an endpoint software, which establishes spread-transport flows across a global public internet “spread-transport” backbone, and dynamically spreads each session across multiple public internet pathways similar to how spread-spectrum radios dynamically spread radio links across multiple radio frequencies. The MOVE endpoints M11-M18 (
(23) The following Table, summarizes the uses of the present invention:
(24) TABLE-US-00004 WAN Manager Edge Cloud Comments Enterprise as “prime” B2E MOVE SDK MOVE Sessions include enterprise - Gateway Edge to Cloud developed apps fronting Edge to Edge (eg VoIP) MOVE wrappers for enterprise Multiple Edges(eg off-the-shelf apps, private and collaboration) eg SFB public Multiple Edges and MOVE drivers for cloud apps Cloud PCs and user Cloud For Wrappers- appliances Connect OEM from someone like VINE via Browser dedicated OpenPeak TL instances Partner with MOVE Gateway for Cloud MDM/MAM players Site aggregation Exchange multi- tenant instances B2C VINE via Browser T MOVE Sessions include MOVE SDK Gateway Edge to Cloud enterprise- fronting Edge to Edge (eg VoIP) developed apps enterprise Multiple Edges(eg private and collaboration) public Multiple Edges and cloud apps Cloud Cloud Connect Cloud Exchange B2B MOVE to SD WAN, NA Federated entities Federation MOVE to WAN or independently manage the MOVE to MOVE federated SD WANs, with back to back agreed policy control of Gateway ingress/egress via the GW IoT MOVE devices MOVE MOVE IOT Gateway aggregators with local fronting processing enterprise IoT LAN to MOVE private and Gateway public cloud apps Enterprise as a MOVE-integrated MOVE Enterprise Tenant Instance will SaaS network SaaS client Gateway ideally be managed fully “tenant” Browser TLS to VINE fronting integrated within the SaaS SaaS management provider Provisioning, authentication, policy, etc Additional reporting may be required SaaS/PaaS provider User Apps MOVE-integrated MOVE SaaS provider multi-tenant SaaS client Gateway MOVE management Browser TLS to VINE fronting Enterprise Tenant Instance SaaS will ideally be managed provider fully integrated within the SaaS management IoT MOVE-integrated MOVE SaaS/PaaS provider multi- Device Gateway tenant MOVE management MOVE-integrated fronting Enterprise Tenant Instance IOT aggregator SaaS/PaaS will ideally be managed MOVE Gateway provider fully integrated within the SaaS/PaaS management TCL UC Provider Edge MOVE NA Service Gateways fronting Infrastructure Network functions such as SBC and Load Balancers MOVE-integrated Network Functions TCL VINE as an NA Network extension of IZO Service WAN Infrastructure MOVE/VINE integration with TCL CDN MOVE as an out-of- band management network Network MOVE integration NA MOVE management Function within Physical and will ideally be integrated Providers Virtual Network within the network Functions such as function management SBC, ADC/Load Candidates: Sonus, balancers, and SD Citrix Netscaler WAN edge devices(?) API Platform MOVE SDK MOVE “Native” direct Services embedded with Gateway enterprise MOVE Providers other SDK fronting management functions, eg WEB enterprise or RTC private MOVE management and integrate within the public “parent” SDK function cloud management apps Candidates: Twilio, MOVE Kandy, CiscTropo Gateway fronting SaaS or PaaS platform SD WAN MOVE Gateway MOVE SD WAN Cloud Cloud back to back with Gateway Connect and Cloud Connect and SD WAN edge fronting Exchange Cloud function enterprise Requires coherent Exchange private orchestration and and management public across both the cloud SD WAN and apps MOVE MOVE One SD WAN to Gateway MOVE (CE or fronting PE) interconnect SaaS or provides all PaaS MOVE Cloud platform Connects (including QoS fronthaul + backhaul option from PE to Cloud) SD WAN SD NA Each SD WAN Exchange WAN 1 MOVE
maintains autonomous SD WAN2 management,including policy at the SD WAN exchange edge. MOVE Exchange edge policy is “standardized” and published tall.
(25) In still further embodiments of the present invention, extended managed services with monitoring and management can be coherently integrated in the same multi-tier mult-tenant platforms that monitor and manage the MOVE network and the VINE. These may be peer services to the MOVE network and the VINE, or have the MOVE network and the VINE integrated within them.
(26) TABLE-US-00005 Integrated Managed Candidate technology Service Description providers Mobile Device Assured and Trusted MOVE edge Zimperium Protection devices ZiAP SDK MOVE and VINE only assure integrated with data-in-motion MOVE SDK Enterprise Compliance on the ZiPS full edge requires device Secured app and data-on- protection device (app developer responsibility) secured device secured data-in-motion Cloud Server Assured and Trusted Cloud Servers Cloud Passage Protection under and behind the Cloud MOVE Amazon cloud Gateway assurance frameworks MOVE and VINE only assure etc data-in-motion Enterprise Compliance on the cloud-based server(s) requires Secured app and data-on- device (app developer responsibility) secured servers and other cloud infrastructure secured data-in-motion SIP Trunking Multimodal sessions over MOVE/ TCL VINE Multimodal Video, voice, messaging, and shared TCL and others collaboration desktop services over MOVE/VINE services UC PaaS Unified Communications Platform-as-a- Kandy, Twilio, others Service over MOVE/VINE Distributed Secure data store behind MOVE/VINE Dispersive Cloud Storage Technologies Storage CASB Cloud Access Security Management Palerra, Skyhigh, with and behind MOVE/VINE Netskope, vArmour, etc
(27) The three part combination of Mobile Device Protection, MOVE/VINE data in motion protection, and Cloud Server protection provides a highly secure end-2-end platform for B2E, B2C IoT, and other business applications.
(28)
(29) In some embodiments, upon receipt of or the determination of the selected next hop node, the software node may forward the packets to another device and provide that device with the address of the selected next hop node (the new target node). In other embodiments, the software node managing and controlling the target node and any of the software nodes along the path may pass instructions to the application, directly or indirectly, including potentially providing the application with a replacement target node (a new DNS name or IP address to replace this target). The instructions may instruct the application to change its behavior for reasons, such as security, compliance or quality, or prompt the user for a decision. The software nodes of the network may also function as gateways, or insert gateways into the path, for example to do signaling or media interworking, or to encrypt/decrypt streams. The platform of the present invention has the capability to instantly and programmatically (no human involvement) deploy new software nodes (during the current application session) if necessary to meet the current or anticipated (according to machine learning or other algorithms) needs of the application or service. Each of the software network nodes of the global overlay network is acting according to instructions, identities, policies and feedback from the application, and the application managers, such that the application needs are determining the selected nodes of the underlying network, and the transport links between them. Whereas today's networks connect nodes according to the network's policies, the present invention connects applications and services according to their identities, policies and needs.
(30) The global overlay network is integrated with the platform and application technology described above. The software nodes of the global overlay network may be connected as traditional networked nodes, and/or as peer-to-peer mesh nodes, and/or combinations of both. Unlike public Internet nodes, they do not all need to have public addresses or use standard Internet protocols and methods. The software nodes of the global overlay network are agnostic to the underlying network technology and network ownership. The software nodes can be located in public cloud, private cloud and Internet backbone environments, and on end user devices as describe earlier (e.g., MOVE and VINE). The software nodes may be applications, VNFs, standalone devices running on commodity compute, purpose built appliances, or services embedded in network infrastructure such as gateways and session border controllers.
(31) Any and all of the above methodologies may be applied differently for different sets of data to be transmitted by the same application. For example, the same application may have different policies and requirements, and thus issue different instructions to the software nodes, for different types of data or for the same data transmitted at different times or to different recipients.
(32) While exemplary drawings and specific embodiments of the present disclosure have been described and illustrated, it is to be understood that that the scope of the invention as set forth in the claims is not to be limited to the particular embodiments discussed. Thus, the embodiments shall be regarded as illustrative rather than restrictive, and it should be understood that variations may be made in those embodiments by persons skilled in the art without departing from the scope of the invention as set forth in the claims that follow and their structural and functional equivalents.