Emily L. Hipp - Oakland CA, US Burton A. Hipp - Elk Grove CA, US
Assignee:
Veritas Operating Corporation - Mountain View CA
International Classification:
H04L012/56
US Classification:
370397, 3703952, 370409, 709239, 709227
Abstract:
A system or network may provide for communication between two or more applications. The communication is achieved by initiating communication between a first and second application. The communication is directed from the first application to a second virtual address of the second application. An actual address associated with the second application is determined. A first data channel is established between a first computer associated with the first application and a second computer associated with the second application over a control channel, to coordinate the communication over the first data channel. The communication is then directed to the actual address associated with the second application over the data channel. Further, the first data channel is taken down and a second data channel is established to maintain communication without the knowledge of the first and second applications.
Emily L. Hipp - Oakland CA, US Burton A. Hipp - Elk Grove CA, US
Assignee:
Veritas Operating Corporation - Mountain View CA
International Classification:
G06F 15/173
US Classification:
709238
Abstract:
A virtual network environment to be used by a set of applications for the express purpose of isolating the applications from other applications on the same node or network is disclosed. The virtual network environment encapsulates a set of applications within a virtual network and prevents applications from interfering, either maliciously or unintentionally, with other applications outside of its virtual network environment. This virtual network environment provides security and network isolation between applications, as is required in a hosted application environment.
Emily L. Hipp - Oakland CA, US Burton A. Hipp - Elk Grove CA, US
Assignee:
VERITAS Operating Corporation - Mountain View CA
International Classification:
G06F 13/00
US Classification:
719312, 718 1, 718102, 719313
Abstract:
A method, system and computer program product for creating a virtual network identity, by using a virtual IP address and hostname, in a software application for the express purpose of making the application node-independent (where node is defined as a particular machine running a given operating system at a specific moment in time) is disclosed. By virtualizing the IP address and hostname, a running software application can be moved from one node to another within a computer network, allowing for process migration and the reallocation of system resources.
Thomas Alan Bean - West Columbia SC, US Emily Hipp - Oakland CA, US
Assignee:
VERITAS Operating Corporation - Mountain View CA
International Classification:
G06F 15/16 H04Q 7/20
US Classification:
709227, 4554221
Abstract:
A method is provided for maintaining a connection between a local application and a remote application while the local application is unavailable or inactive. The method includes pausing the local application and sending data over the connection to maintain the connection. A connection filter on the same computing node as the local application sends data to maintain the connection by responding to acknowledgements and heartbeats from the remote application. The connection filter is configured to initiate the restoration of the local application in response to data that it is not configured to handle.
Emily L. Hipp - Oakland CA, US Burton A. Hipp - Elk Grove CA, US
Assignee:
Symantec Operating Corporation - Mountain View CA
International Classification:
G06F 15/16
US Classification:
709245, 709227
Abstract:
A system or network may provide for communication between two or more applications. The communication is achieved by initiating communication between a first and second application. The communication is directed from the first application to a second virtual address of the second application. An actual address associated with the second application is determined. A first data channel is established between a first computer associated with the first application and a second computer associated with the second application over a control channel, to coordinate the communication over the first data channel. The communication is then directed to the actual address associated with the second application over the data channel. Further, the first data channel is taken down and a second data channel is established to maintain communication without the knowledge of the first and second applications.
Thomas Alan Bean - West Columbia SC, US Emily Hipp - Oakland CA, US
Assignee:
Symantec Operating Corporation - Mountain View CA
International Classification:
G06F 15/16
US Classification:
709227, 709228, 709249
Abstract:
A method is provided for migrating a connection between two computing nodes of a computing center. The method includes establishing the connection between a remote application and a local application on a first computing node, pausing the local application, restoring the local application to a second computing node, and reestablishing the connection between the remote application and the local application on the second computing node. A connection filter on the first computing node can maintain connections while the local application is paused. An application scheduler routine can cause the application to be restored on the second computing node where a second connection filter obtains connection information and reestablishes the connection to the remote application.
Emily L. Hipp - Oakland CA Burton A. Hipp - Elk Grove CA
Assignee:
Veritas Operating Corporation - Mountain View CA
International Classification:
G06F 1516
US Classification:
709225
Abstract:
A virtual network environment to be used by a set of applications for the express purpose of isolating the applications from other applications on the same node or network is disclosed. The virtual network environment encapsulates a set of applications within a virtual network and prevents applications from interfering, either maliciously or unintentionally, with other applications outside of its virtual network environment. This virtual network environment provides security and network isolation between applications, as is required in a hosted application environment.