HANGZHOU H3C TECHNOLOGIES CO., LTD. Patent applications |
Patent application number | Title | Published |
20160142287 | PACKET FORWARDING - ECMPs are selected from multiple TRILL paths to a gateway. The source MAC address of a received Ethernet packet whose destination MAC address is the MAC address of the gateway is replaced with a local MAC address. A path is selected from the ECMPs, and the Ethernet packet whose source MAC address has been replaced is sent via the selected path. | 05-19-2016 |
20160134511 | PACKETMIRROR PROCESSING IN A STACKING SYSTEM - A CB device receives a first packet sent from another device through a stacking port. In response to determining, based on source port information carried in the first packet, that the first packet entered the stacking system from a PE device and the first packet is a non-unicast packet, the switch module performs mirroring processing to the first packet to obtain a mirrored packet, and transmits the first packet and the mirrored packet to a packet buffering module of the CB device. In response to determining that a second packet from the packet buffering module entered the stacking system from the PE device and the second packet is the non-unicast packet, the second packet is forbidden from being forwarded through a first-level stacking port of the CB device. | 05-12-2016 |
20160132435 | SPINLOCK RESOURCES PROCESSING - According to an example, in a spinlock processing method, a value of a spinlock cache variable may be read from a cache and the value of the spinlock cache variable may be written into a register. A determination may be made as to whether the value of the spinlock cache variable is an initial value. If yes, the value of the spinlock cache variable in the register may be updated. A determination may also be made as to whether the spinlock cache variable is accessed by a core after the value of the spinlock cache variable is written into the register. If yes, a value of a spinlock cache variable may be obtained from the cache. If no, the updated value of the spinlock cache variable may be written into the cache. Moreover, an access speed of the cache may be larger than an access speed of an L2 cache. | 05-12-2016 |
20160127272 | VIRTUAL NETWORK - A SDN controller receives a forwarding request message including a header portion of a layer-2 packet. The SDN controller determines whether a source host and a destination host of the layer-2 packet are in the same virtual network according to a virtual network table. | 05-05-2016 |
20160127224 | ELECTING DESIGNATED ROUTING BRIDGE - According to an example, a RB sends an election packet to a STP device to cause the STP device to flood the election packet in a spanning tree. The RB may receive a second election packet and perform DRB election based on the second election packet. | 05-05-2016 |
20160119256 | DISTRIBUTED VIRTUAL SWITCH SYSTEM - A distributed virtual switch system comprises a controller and multiple servers. Each server is configured with a virtual SDN switch and at least one VM. Each VM is connected with an external physical switch via the SDN switch. The controller obtains interface information of a switch logic interface corresponding to a VM, adds an entry comprising the interface information into a local global interface management table. The interface information includes a global unique identifier of the switch logic interface corresponding to the VM, a switch identifier of an SDN switch corresponding to the switch logic interface, and a local port identifier of the SDN switch corresponding to the switch logic interface. The controller manages each VM connected with each SDN switch according to the local global interface management table. | 04-28-2016 |
20160119228 | FORWARDING PACKETS - A control device may allocate a global label for a switch device based on a forwarding equivalent class (FEC), and issue the global label to the switch device. Subsequently, for a packet not carrying the global label, after matching the packet not carrying the global label with the FEC, the switch device may encapsulate the global label for the packet, and forward the packet. For a packet carrying the global label, the switch device may forward the packet carrying the global label by using a global label forwarding entry. | 04-28-2016 |
20160119186 | ZERO-CONFIGURATION NETWORKING PROTOCOL - According to an example, a network device serving as a monitoring device for a zero-configuration network protocol is in a subnet in a network including multiple subnets. The monitoring device may receive and update a service in another subnet that is notified by a manager. Also, the monitoring device may respond to a query for the service from a terminal in the subnet when the queried service is in another subnet. | 04-28-2016 |
20160112503 | LOAD SWITCH COMMAND INCLUDING IDENTIFICATION OF SOURCE SERVER CLUSTER AND TARGET SERVER CLUSTER - A software defined network (SDN) controller sends a load switch command to a network device. The load switch command includes identification of a source server cluster and identification of a target server cluster. | 04-21-2016 |
20160112348 | INTEROPERATION OF SWITCH LINE CARD AND PROGRAMMABLE LINE CARD - When needing to forward a packet from a switch line card to a programmable line card, the switch line card may encapsulate a pseudo-Layer 2 header for the packet based on uplink forwarding process of the switch line card. The pseudo-Layer 2 header may carry an adjacency table index and an egress interface table index which is used by the programmable line card. Correspondingly, the programmable line card may obtain the adjacency table index and the egress interface table index from the pseudo-Layer 2 header of the packet, and then may re-encapsulate a real Layer 2 header for the packet based on downlink forwarding process of the programmable line card, and transmit the packet through a corresponding egress interface. | 04-21-2016 |
20160112299 | CONFIGURING FORWARDING INFORMATION - Based on an example, a network apparatus may calculate N equal-cost multi paths to a destination address; sort the N equal-cost multi paths into an order to obtain a sorted result; the sorted result specifying an order from a first ECMP to an Nth ECMP; populate an ECMP table with ECMP entries, each ECMP entry comprising forwarding information associated with a respective ECMP; wherein the ECMP table comprises M entries, wherein M is greater than N, and wherein the ECMP table is populated with ECMP entries according to the order of equal-cost multi paths in the sorted result, and wherein the order is treated in a circular manner such that the N+1th ECMP table entry is populated with forwarding information associated with the first table entry and wherein M=2 | 04-21-2016 |
20160112258 | CONSTRUCTING A NETWORK ENABLING LAYER-2 INTERCONNECTION OF DATA CENTERS - A method for constructing a network enabling layer-2 interconnection of data centers includes: a current data center registers at a neighbor server when the current data center gets online, obtains information of all registered data centers, generates a virtual bridge port for each registered data center; after the current data center comes online, the current data center obtains information of all newly registered data centers according to a pre-set rule, generates a virtual bridge port for each newly registered data center; establishes a tunnel to each registered data center by using the virtual bridge port corresponding to the registered data center, and transmit data via the tunnel. | 04-21-2016 |
20160105306 | LINK AGGREGATION - A Software Defined Networking (SDN) controller selects ports from among ports on an SDN edge device as selected ports of an aggregation group according to an aggregation strategy. | 04-14-2016 |
20160094400 | PACKET FORWARDING - A member device of a stacked switches system receives a packet which is to be sent to every member device in the stack groups of the stacked switches system. The member device identifies an intra-group port and an aggregated stack link group which permit forwarding the packet based on an ingress member device identification of the packet. The member device sends the packet carrying the ingress member device identification via the identified intra-group stack port, via the identified aggregated stack link group and via a local data port. | 03-31-2016 |
20160065463 | FORWARDING PACKETS - Based on an example, a core backbone (CB) device receives via a second-level stacking port connected with a source port extender (PE) device, a packet containing a source port number and a local identifier of a source forwarding chip. The CB device transmits the packet via a second-level stacking port connected with a destination PE device, wherein the packet contains the source port number, a global identifier of the source forwarding chip, a local identifier of a destination forwarding chip and a destination port number. | 03-03-2016 |
20160050142 | TRANSMISSION PATH SWITCHING - According to an example, a virtual next-hop is created and a destination identity corresponding to each virtual next-hop is stored. Each virtual next-hop comprises one best next-hop and one second-best next-hop, and a next-hop of the best path of the destination identity corresponding to a virtual next-hop is the best next-hop of the virtual next-hop, and a next-hop of the second-best path of the destination identity corresponding to the virtual next-hop is the second-best next-hop of the virtual next-hop. Path forwarding may be performed using the best next-hop of each virtual next-hop. If the best next-hop of a virtual next-hop is determined to be failed, path forwarding may be performed using the second-best next-hop of the virtual next-hop. | 02-18-2016 |
20160044145 | LEARNING A MAC ADDRESS - A method and an edge device for learning a Medium Access Control (MAC) address are provided. According to an example, based on a request message from a first node to a second node, a session cache item is created in the edge device. The session cache item includes: IP addresses of the first and second nodes, and a first relationship between a MAC address of the first node and an output port corresponding to the first node. Based on a response message from the second node to the first node, the session cache item is updated to include a second relationship between a MAC address of the second node and an output port corresponding to the second node. The first and second relationships are then provided to a data plane of the edge device to facilitate data packet forwarding between the first node and the second node. | 02-11-2016 |
20160036678 | NETWORK RESOURCE MONITORING - According to an example of the present disclosure, a service template providing a service may be found according to type of the service. A resource zone matching the service template may be found from a resource pool. A network resource matching a service unit in the service template may be found from the resource zone. A network parameter configured for the service unit may be sent to the network resource. Usage state information of the network resource may be updated. | 02-04-2016 |
20160028716 | ROUTING PROTOCOL AUTHENTICATION MIGRATION - A first migration instruction is received from a management device, new authentication information is configured on a routing device according to the first migration instruction, and an authentication direction of the new authentication information is configured as a receiving direction. A second migration instruction that is sent by the management device after determining that all adjacent routing devices have configured the new authentication information is received, an authentication direction of original active authentication information is configured as a receiving direction and the authentication direction of the new authentication information is configured as the receiving direction and a sending direction. | 01-28-2016 |
20160028621 | PROVIDER EDGE IN VIRTUAL PRIVATE LAN SERVICE NETWORK - In a VPLS network, a first PE in a VPN instance sends topology information and a bridging MAC address of the first PE to another PE in the VPN instance, receives and stores topology information and bridging MAC addresses from the another PE. The first PE further generates a CE MAC table in the VPN instance according to the stored topology information and bridging MAC addresses of the another PE; calculates a unicast minimal spanning tree by taking the first PE as a root, generates a unicast MAC table in the VPN instance according to the unicast minimal spanning tree. Each PE further selects one of the PEs in the VPN instance as a root bridge, calculates a broadcast minimal spanning tree by taking the root bridge as a root, and generates a broadcast MAC table in the VPN instance according to the broadcast minimal spanning tree. | 01-28-2016 |
20160007364 | ACCESS POINT - An access point (AP) for an indoor antenna distributed deployment environment provides an access service for a wireless terminal. The AP includes N radio frequency (RF) processing units and N*M RF switches (RFSs). Each RFS includes a public port and at least two branch ports. The at least two branch ports respectively connect with at least two antennas deployed in different indoor areas via RF feeders. The RF processing unit includes M RF chains. Each RF chain is connected to a public port of an RFS. The RF processing unit is to transmit a packet to the wireless terminal, based on a predetermined antenna combination for the wireless terminal. | 01-07-2016 |
20150334057 | PACKET FORWARDING - According to an example, a method for forwarding an Ethernet packet may include receiving an Ethernet packet having a destination MAC address that is a MAC address of a gateway, selecting a port from multiple ports, wherein each of the ports of the multiple ports connects to one member device of a VRRP router that is working as the gateway; and sending the Ethernet packet via the selected port. | 11-19-2015 |
20150334011 | TRAFFIC INTERCONNECTION BETWEEN VIRTUAL DEVICES - According to an example, a virtual port is configured for a current virtual device (VD) to interconnect the current VD with other VDs. The virtual port may be a layer | 11-19-2015 |
20150334000 | BORDER GATEWAY PROTOCOL (BGP) ROUTES ADVERTISEMENT - When updated routing information is advertised, attributes of the updated routing information are advertised in a first UPDATE message and prefixes of the updated routing information are advertised in a second UPDATE message. | 11-19-2015 |
20150326526 | KEEPING A TERMINAL ACCESS LOCATION RECORD ALIVE - A SDN controller may receive a packet from a terminal device and may update an IP/MAC address mapping record and a terminal access location record of the terminal device. The SDN controller may periodically send an ARP request packet and may keep the IP/MAC address mapping record and the terminal access location record of the terminal device alive. The SDN controller may also periodically age the IP/MAC address mapping record and the terminal access location record of the terminal device. | 11-12-2015 |
20150295936 | GET VPN GROUP MEMBER REGISTRATION - An example of the present disclosure includes a Group Member (GM) registering on a Key Server (KS) in a Group Encrypted Transport Virtual Private Network (GET VPN). The KS is to manage at least one group, and GMs belonging to the same group have the same group ID. The KS receives a group ID and a Security Association, SA, policy list supported by a GM sent by the GM. The KS, according to the group ID, determines a KS SA policy list corresponding to the group, and matches the SA policy list supported by the GM with the KS SA policy list according to a priority. A group SA policy with the highest priority is sent the GM. | 10-15-2015 |
20150180717 | CONFIGURING VIRTUAL ROUTER REDUNDANCY PROTOCOL BACKUP GROUP - According to an example, when a member device is in a Master state in a VRRP backup group, after snooping a first DHCP packet sent from a DHCP client to a DHCP server, the member device determines an interface receiving the first DHCP packet as an interface of the DHCP client; after snooping a second DHCP packet sent from the DHCP server to a DHCP client, the member device obtains a default gateway address and a subnet mask of the DHCP client from the second DHCP packet; after obtaining the default gateway address and the subnet mask, if the interface of the DHCP client is not configured with a virtual IP address and a network segment route, the member device respectively configures the default gateway address and the subnet mask as the virtual IP address and the network segment route on the interface of the DHCP client. | 06-25-2015 |
20150149658 | SOFTWARE UPGRADE OF ROUTERS - According to an example a router includes a control plane CPU, a data plane CPU, a first memory area and a second memory area independent from the first memory area. When the router upgrades its software, the control plane CPU is reset and clears the first memory area. After being reset, the control plane CPU loads a new version control plane program into the first memory area and runs the new version control plane program in the first memory area. | 05-28-2015 |
20150113168 | Network Bridging - A network device is connectable wirelessly to an Access Point AP that is connected to a server. The network device comprises a processing module to receive a Dynamic Host Configuration Protocol (DHCP) message from a client device, to insert in a predetermined option of the DHCP message a Media Access Control (MAC) address of the client device, and to send the DHCP message to the AP to be forwarded to the server for allocation of an IP address to the client device based on the MAC address inserted in the predetermined option of the DHCP message. | 04-23-2015 |
20150110111 | Forward Packet with Edge Device - When a User Edge Device (UED) receives a unicast packet from a user side, the UED searches in a Media Access Control (MAC) table. When a matching entry in the MAC table is found, the UED forwards the unicast packet locally. When no matching entry in the MAC table is found, the UED transmits the unicast packet to a Network Edge Device (NED). When the UED receives a broadcast packet from the user side, the UED broadcasts the broadcast packet within a same Virtual Local Area Network (VLAN) of a local site and forwards to the NED. | 04-23-2015 |
20150074788 | Firewall Security Between Virtual Devices - When communication from a first virtual device to a second virtual device is received, it is determined a first virtual interface associated with the first virtual device and a second virtual interface associated with the second virtual device. It is then determined a first security domain associated with the first virtual interface and a second security domain associated with the second virtual interface to implement a security policy between the first security domain and second security domain. The communication between the virtual devices is allowed or blocked. | 03-12-2015 |
20150030031 | FORWARDING PACKETS IN AN EDGE DEVICE - An edge device searches a MAC table to obtain information of a public network egress interface for a packet which is to be sent from a local site to a remote site to access a service, replaces a VLAN ID in the packet with a VLAN ID used for transmission in a public network, and sends the packet in which the VLAN ID has been replaced to a remote site according to the information of the public network egress interface. | 01-29-2015 |
20150029855 | TRAFFIC ROUTING - The present disclosure relates to a traffic routing method and a traffic routing device. A member device of a stacking system receives traffic destined for a destination node. If there is at least one valid Equal-cost multi-path (ECMP) associated with an address of the destination node in a forwarding table, the member device routes the received traffic to the destination node through the at least one valid ECMP path. Otherwise, the member device selects at least one other member device of the stacking system for routing the received traffic, updates an ECMP path associated with the address of the destination node in the forwarding table to a stacking link connecting the member device with the selected at least one member device, and transmits the received traffic to the selected at least one member device. | 01-29-2015 |
20150029834 | TRANSMISSION PATH SWITCHING - According to an example, a virtual next-hop is created and a destination identity corresponding to each virtual next-hop is stored. Each virtual next-hop comprises one best next-hop and one second-best next-hop, and a next-hop of the best path of the destination identity corresponding to a virtual next-hop is the best next-hop of the virtual next-hop, and a next-hop of the second-best path of the destination identity corresponding to the virtual next-hop is the second-best next-hop of the virtual next-hop. Path forwarding may be performed using the best next-hop of each virtual next-hop. If the best next-hop of a virtual next-hop is determined to be failed, path forwarding may be performed using the second-best next-hop of the virtual next-hop. | 01-29-2015 |
20150010013 | PORT NEGOTIATION BETWEEN FCOE FORWARDERS - According to an example, port negotiation between FCFs is implemented through initiation of a negotiation to an opposite party corresponding to a VFC port on a FCF within a VLAN corresponding to each VSAN supported by the VFC port on the FCF. The port negotiation also includes a determination of an intersection of the VSAN and the VLAN supported by the VFC port and the VSAN and the VLAN supported by the opposite party corresponding to the VFC port on the FCF and performance of an ELP negotiation within the intersection of the VSAN and the VLAN. | 01-08-2015 |
20140379832 | FTP DATA TRANSMISSION IN STACK SYSTEM - According to an example, a file transfer protocol data transmission method applied in a stack system includes an FTP server master process receiving a file transfer request from an FTP client, for a file requested by the file transfer request, the FTP server master process judging whether the file and the FTP server master process are in a same chassis, when the file and the FTP server master process are not in the same chassis, the FTP server master process sends a file transfer notice to an FTP server slave process running on a chassis which is in the stack system and which the file is in. | 12-25-2014 |
20140369233 | REDUCING FLOODING OF LINK STATE INFORMATION - The present disclosure describes reducing flooding of link state information of a link state protocol in a network with multiple routers. A filtering strategy is pre-configured on a router interface for filtering link state information generated by a first router. The filtering strategy is to enable link state database (LSDB) isolation between a second router associated with the router interface and the first router. Link state information generated by the first router is received or sent according to the pre-configured filtering strategy via the router interface. | 12-18-2014 |
20140359697 | Active Security Defense for Software Defined Network - A method is described in which at least one access event matching a predetermined security entry detected by a SDN switch is received; a target host of the access event is determined; and a security validation module corresponding to the predetermined security entry is invoked to obtain a security validation result. | 12-04-2014 |
20140355421 | Link Aggregation Control Protocol (LACP) Loop Detection - Link Aggregation Control Protocol (LACP) loop detection in a network that includes a Software Defined Networking (SDN) controller, a server and an edge switch is provided. The server virtualizes a virtual switch and virtual machines. The virtual switch includes uplink ports that are aggregated with downlink ports of the edge switch to form an aggregation group, and the SDN controller controls operation of the virtual switch. The virtual switch periodically sends a LACP data unit (LACPDU) message to the edge switch via each of the uplink ports in the aggregation group. The virtual switch receives a LACPDU message from the edge switch via one of the uplink ports in the aggregation group. When it is determined that the received LACPDU message originates from the virtual switch itself, the virtual switch keeping one of the uplink ports running and shutting down the rest of the uplink ports. | 12-04-2014 |
20140348164 | MAINTAINING A MULTICAST FORWARDING TABLE AND A PIM ROUTER - A method for maintaining a multicast forwarding table item and a Protocol Independent Multicast (PIM) router are disclosed. The method includes: receiving, by a PIM router, a multicast leave message for leaving a multicast group through an input port, finding, by the PIM router, a multicast forwarding table item corresponding to the multicast group in the PIM router, deleting the input port through which the multicast leave message is received from an output port list of the multicast forwarding table item, if there is a switcher identifier on the input port in the output port list and the output port list of the multicast forwarding table item is empty, deleting the multicast forwarding table item immediately or accelerating the deletion of the multicast forwarding table item, wherein the switcher identifier indicates that the input port corresponds to a switcher. | 11-27-2014 |
20140344444 | Recovery of Dynamic Host Configuration Protocol IP Addresses - Recovery of an Internet Protocol (IP) address allocated to a client using Dynamic Host Configuration Protocol (DHCP) is provided. Media Access Control (MAC) address and the IP address of the client are stored. When the client is determined as being offline, MAC address and IP address of the client are determined and a DHCP release message carrying the IP address of the client is sent to an address allocation server. The client is determined as being offline based on a shutdown status of a port to which the client is connected. The port may be on the relay device, or an access device that connects the client and the relay device. | 11-20-2014 |
20140314100 | MAC ADDRESS DISTRIBUTION - According to an example, in a method for MAC address distribution by an apparatus, a MAC address is received in the apparatus, in which the apparatus includes a data store on which is stored a local slice set containing a plurality of slices, and in which each of the plurality of slices is assigned a respective slice identifier. An address value for the received MAC address may be determined and a correlation between the determined address value and one of the slice IDs of the plurality of slices may be identified. In addition, the received MAC address may be stored in the slice having the slice identifier identified as being correlated to the determined address value. | 10-23-2014 |
20140313924 | Selecting A Receiving Antenna In A Wireless Local Area Network - The disclosure involves selecting a receiving antenna in a wireless local area network, comprises: testing each antenna in an antenna array to obtain an antenna quality parameter of each antenna corresponding to a client Station, and determining an optimal receiving antenna corresponding to said Station according to the antenna quality parameter of each antenna corresponding to the Station; setting the optimal receiving antenna corresponding to said Station as the receiving antenna upon receiving a notification transmission message transmitted by said Station. | 10-23-2014 |
20140301401 | PROVIDING AGGREGATION LINK GROUPS IN LOGICAL NETWORK DEVICE - A control plane of a logical network device creates a service link aggregation group and adds one port from each member network device to the service link aggregation group. The logical network device includes member network devices and each port connects the logical network device to the same neighbor device. When a port of the logical network device receives a message with an unknown source address, the control plane determines if the receiving port is in any service link aggregation group. After determining the receiving port is in the service link aggregation group, the control plane configures a data plane of the logical network device with mappings between the address and the ports in the service link aggregation group. | 10-09-2014 |
20140301378 | METHOD FOR IMPLEMENTING NEIGHBOR DISCOVERY PROTOCOL IN A WLAN - A method for implementing neighbor discovery protocol in a wireless local area network (WLAN) and an access point (AP). In the method, the AP prestores the logic group of each wireless client associated to the AP, determines the logic group of a neighbor discovery protocol related message when the message is received by the AP, and transmits the neighbor discovery protocol related message to at least one wireless client included in the logic group of the message via a unicast mode, respectively, according to prestored information relating to the logic group of each wireless client associated to the AP. | 10-09-2014 |
20140301185 | HANDLING A FAULT IN AN ETHERNET RING NETWORK - The present disclosure relates to a fault handling method for a communication network that comprises a plurality of intersecting Ethernet rings including at least a first Ethernet ring having a first master node and a first transit node and a second Ethernet ring having a second master node and a second transit node, the first Ethernet ring and the second Ethernet ring intersecting at a first shared link connecting at least a first shared node and a second shared node shared between the first Ethernet ring and the second Ethernet ring, the method comprising a ring-extension process including the second master node joining the first Ethernet ring as a transit node upon determination of a fault in the first shared link, and the second master node sending a RING EXTEND message to notify the second transit node to join the first Ethernet ring as a transit node of the first Ethernet ring. | 10-09-2014 |
20140285991 | GUIDE BRACKET AND ELECTRONIC DEVICE ADOPTING THE GUIDE BRACKET - According to an example, a guide bracket and an electronic device adopting the guide bracket are provided. A free end of a resilient sheet installed in a wall of the guide bracket is to be held by a snap-fit part set in a chassis beyond the external surface of the wall where the resilient sheet is located to implement position limiting of the guide bracket in the forward-backward direction. The free end of the resilient sheet is to retreat inwards with the bending of the resilient sheet towards the interior of the wall where the resilient sheet is located to avoid the snap-fit part. | 09-25-2014 |
20140282920 | DYNAMICALLY SELECTING A DHCP SERVER FOR A CLIENT TERMINAL - Dynamically selecting a DHCP server for a DHCP client terminal device, according to an example, includes: triggering, by a network device with a DHCP relay function, an authentication performed by an authentication server on a DHCP client terminal device user when receiving a DHCP packet for requesting a configuration parameter sent from a DHCP client terminal device; receiving, by the network device, an identity of a DHCP server designated by the authentication server for the DHCP client terminal device user when the DHCP client terminal device user passes the authentication, and establishing an entry for user information of the DHCP client terminal device user and the identity of the designated DHCP server; and matching, by the network device, the user information carried in a packet with established entries when receiving the packet subsequently sent from the DHCP client terminal device, and forwarding the packet using the identity of the DHCP server in the entry matching the user information. | 09-18-2014 |
20140258525 | Computer Network Management Tools - A network device for computer network operation includes a processor and a memory. A set of object identifiers (OID) and a set of device management identifiers are stored in the memory, wherein each object identifier is mapped to a corresponding device management parameter to facilitate management of the network device. The set of device management identifiers collective represents the set of object identifiers. The network device is to make available the device management identifiers and values corresponding to the device management parameters to facilitate network management. | 09-11-2014 |
20140254353 | NOTIFYING OF A LSP FAILURE - According to an example, in a method and apparatus for notifying a LSP, the downstream LSR detecting the link failure on the work LSP sends a SF message on the direction of the work LSP, so that the upstream LSR detecting the link failure on the work LSP receives the SF message and sends the packet via the protection LSP according to the SF message. | 09-11-2014 |
20140244726 | Assignment of Point-to-Point Over Ethernet (PPPoE) Session IDs - The present disclosure describes assignment of Point-to-Point Protocol over Ethernet (PPPoE) session identifiers (IDs). A PPPoE server receives a session request from a first PPPoE client to establish a new session with the PPPoE server. Based on the session request, the PPPoE server selects a session ID for the new session with the first PPPoE client and broadcasts a probe request carrying the session ID and a Media Access Control (MAC) address of the PPPoE server. When a probe response carrying the session ID is received from a second PPPoE client within a predetermined time period, the probe response indicating that a prior session previously established with the second PPPoE client is assigned with same session ID, the PPPoE server terminates the prior session with the second PPPoE client before assigning the session ID to the new session with the first PPPoE client. | 08-28-2014 |
20140241353 | SWITCH CONTROLLER - According to an example, a switch controller is connected to a computer hosting a virtual machine (VM) and a virtual switch to provide packet forwarding for the VM. The switch controller restricts packet forwarding actions on the ports according to the assigned primary VLAN, the assigned secondary VLAN, and the assigned VDS to the ports and the stored rules. | 08-28-2014 |
20140237572 | PORTAL AUTHENTICATION METHOD AND ACCESS CONTROLLER - In a portal authentication method, a DHCP request message sent by a terminal is received by an AC. In response to finding that a user of the terminal is an unauthenticated user, a private network IP address is assigned to the terminal. After portal authentication of the terminal is finished, a wireless connection of the terminal is terminated by the AC. When a DHCP request message sent by the terminal again is received, a determination that the user of the terminal passes the authentication is made by the AC, a public network IP address is assigned to the terminal, and an accounting request message is sent to a RADIUS server. After finding that the terminal is offline, an accounting stop message is sent by the AC to the RADIUS server, the wireless connection of the terminal is disconnected, and the public network IP address is released. | 08-21-2014 |
20140219289 | HANDLING STACKING LINK FAILURES IN MDC DEVICE - A part of a non-default multitenant device context (MDC) is located on a member device of that forms part of a logical network device. The non-default MDC part assigns a first downlink port to a first downlink port group, assigns a first uplink port to a first uplink port group, and monitors a stacking port to another part of the non-default MDC on another member device that forms part of the logical network device. When the stacking port changes to the down state, the non-default MDC part determines if the first downlink port group and the first uplink port group are in the up state. If so, the non-default MDC part maintains the states of the ports in the first downlink port group and the first uplink port group. Otherwise the non-default MDC part makes changes so the ports in the first downlink port group and the first uplink port group are in the down state. | 08-07-2014 |
20140219077 | TRAFFIC MANAGEMENT ACROSS DATA CENTER SITES - According to an example, a traffic management method includes that an edge device of a data center site receives first-hop gateway information of at least one remote data center sites from an edge device of the at least one remote data center site, checks whether a local first-hop gateway has failed, and in response to the local first-hop gateway being determined as having failed, transmits a packet originating within the data center site and addressed to the local first hop gateway to an edge device of a remote data center site. | 08-07-2014 |
20140215023 | CONSTRUCTING A NETWORK ENABLING LAYER-2 INTERCONNECTION OF DATA CENTERS - A method for constructing a network enabling layer-2 interconnection of data centers includes: a current data center registers at a neighbor server when the current data center gets online, obtains information of all registered data centers, generates a virtual bridge port for each registered data center; after the current data center comes online, the current data center obtains information of all newly registered data centers according to a pre-set rule, generates a virtual bridge port for each newly registered data center; establishes a tunnel to each registered data center by using the virtual bridge port corresponding to the registered data center, and transmit data via the tunnel. | 07-31-2014 |
20140204944 | METHOD FOR AVOIDING A LOOP IN A NETWORK - According to an example, a method for avoiding a loop in a network, which is performed by each ED in each VPN site, comprises: interacting with other EDs in a same VPN site to elect a DED; assigning an authorized forwarding instance to each ED in the same VPN site when the ED is elected as the DED; obtaining the authorized forwarding instance from the DED when the ED is not elected as the DED; allowing traffic of the authorized forwarding instance transmitted from or to a public network, and blocking traffic of unauthorized forwarding instance transmitted from or to the public network. | 07-24-2014 |
20140204731 | MULTIPROTOCOL LABEL SWITCHING RING PROTECTION SWITCHING METHOD AND NODE DEVICE - According to an example, a MPLS ring protection switching method is applied to each node in an MPLS TP ring. In the method, an MPLS forwarding table entry configured for a working LSP and an MPLS forwarding table entry configured for a backup LSP of the working LSP are added into a first table, an MPLS forwarding table entry formed by cross connecting the working LSP and the backup LSP is added into a second table, a packet is received, the first table is searched when the node is in a normal forwarding state, and the packet is forwarded by using an MPLS forwarding table entry in the first table, the second table is searched when the node device is in a protection forwarding state, and the packet is forwarded by using an MPLS forwarding table entry in the second table. | 07-24-2014 |
20140146710 | Trill Network Communications Across an IP Network - A method, system and device of Transparent Interconnection of Lots of Links (TRILL) network communications across an Internet Protocol (IP) network are provided. The method includes: DC1 and DC2 which are respectively a local and remote Data Center (DC) networks connected with each other via the IP network; DC1 and DC2 are respectively deployed with a TRILL network; a first DCI device (S1, S2) is an RBridge located in core layer of TRILL network in DC1; a first access layer device (S10, S11, S20) is any RBridge located in access layer of TRILL network in DC1; a second DCI device (S1, S2) is an RBridge located in core layer of TRILL network of DC2; a second access layer device (S30, S31, S40) is an RBridge located in access layer of TRILL network in DC2; generating, by the first DCI device (S1, S2), a nickname forwarding table by learning routes to RBridges in local and remote TRILL networks, after receiving a packet destined for DC2 or sent by DC2, forwarding, by the first DCI device (S1, S2), the packet according to the nickname forwarding table. | 05-29-2014 |
20140146660 | RESTARTING A LINE CARD - A method and a network device for preventing service disruption during a restart of a line card. The line card including a CPU control system and a forwarding system. Information on the CPU control system is stored in a predetermined storage and a flag is set prior to the restart of the line card. The stored information includes configuration information of the forwarding system and protocol state information of the CPU control system. The CPU control system is restarted while the forwarding system is maintained in a state of providing forwarding service. Upon detecting the flag is set during the restart of the CPU control system, the stored information is restored on the CPU control system. | 05-29-2014 |
20140122704 | REMOTE PORT MIRRORING - According to an example, remote port mirroring includes storing correspondence information describing a correspondence between a mirroring source port and a mirroring destination port. The correspondence information includes a VLAN ID of a mirror VLAN. The mirroring source port and the mirroring destination port are assigned to the mirror VLAN. A message received on the mirroring source port is copied, and a mirroring message is generated based on the correspondence information and sent to the remote network switch. | 05-01-2014 |
20140095862 | SECURITY ASSOCIATION DETECTION FOR INTERNET PROTOCOL SECURITY - According to an example, a detection message may be sent for security association detection for Internet protocol security. The detection message includes a detection flag. The detection message may be an encapsulated message including the detection flag. | 04-03-2014 |
20140092729 | Data Transmission in a Packet Transport Network (PTN) - The present disclosure describes data transmission in a packet transport network (PTN). A multiple stack device facilitates data transmission between a first edge device of a first PTN technology and a second edge device of a second PTN technology. After receiving a first packet of the first PTN technology from the first edge device, the multiple stack device identifies a first connection with the first edge device according to information of the first packet and identifies a second connection with the second edge device from the first connection based on a relationship between the first connection and the second connection. The first packet is de-encapsulated and re-encapsulated into a second packet of the second PTN technology according to the second connection. The second packet is then forwarded to the second edge device via the second connection. | 04-03-2014 |
20140064272 | PROVIDING A LAYER-3 INTERFACE - Providing a VLAN virtual interface of a default VLAN as a VLAN virtual interface of a layer-3 Ethernet interface provided on an apparatus, assigning an interface MAC address for the layer-3 Ethernet interface, setting a layer-3 interface entry including at least the interface MAC address of the layer-3 Ethernet interface and a VLAN ID of the default VLAN, providing a VLAN virtual interface of a layer-3 Ethernet sub-interface provided on the apparatus based on a binding VLAN of the layer-3 Ethernet sub-interface, assigning an interface MAC address to the layer-3 Ethernet sub-interface, setting a layer-3 sub-interface entry including at least the interface MAC address of the layer-3 Ethernet sub-interface and a VLAN ID of the binding VLAN, receiving a packet from one interface of the apparatus, and performing layer-3 forwarding for the packet if the layer-3 interface entry or the layer-3 interface entry matching with a destination MAC address and a VLAN ID of the packet. | 03-06-2014 |
20140059314 | PREVENTING DATA LOSS DURING REBOOT AND LOGICAL STORAGE RESOURCE MANAGEMENT DEVICE - According to an example, in a method for preventing data loss during reboot, a logical storage resource management device may pre-allocate reserved memory for storing a storage resource mapping table, allocate logical storage resources to a data source device before a system is rebooted, record, in the storage resource mapping table, a physical location of the logical storage resources into which data has been written when the data source device writes the data into the logical storage resources, obtain the physical location of the logical storage resources into which the data has been written from the storage resource mapping table when the system is rebooted, set a state of a physical memory block corresponding to the logical storage resources into which the data has been written as used, and release all logical storage resources after the data source device reads the data. | 02-27-2014 |
20140036720 | ASSIGNING A VLAN - In a network that comprises a first edge device and a second edge device at a site connecting the site to a core of the network, the first edge device receives, in a Hello message sent from the second edge device, information indicating a Virtual Local Area Network VLAN amongst a plurality of VLANs in the site as a preferred VLAN of the second edge device. From the Hello message sent from the second edge device, the first edge device obtains the information indicating the preferred VLAN of the second edge device. For each of the plurality of VLANs, the first edge device assigns a VLAN to the second edge device if the obtained information indicates the VLAN as the preferred VLAN of the second edge device. | 02-06-2014 |
20140036682 | Load Balancing Based on TRILL - A method for load balancing based on Transparent Interconnection of Lots of Links (TRILL) is provided. Said method comprises: acquiring, by a routing bridge (RB), all current medium access control (MAC) addresses within each virtual local area network (VLAN) on a link where the RB is located. And if said RB is selected as a designated routing bridge (DRB), said RB distributes all the current MAC addresses acquired within each VLAN between said RB and other RBs on the same link according to a preset distribution rule, and notifies said other RBs to be responsible for forwarding of messages having a specified MAC address and VLAN, wherein said MAC addresses are the MAC addresses of the host devices on the link where said RB is located. If said RB is a common RB, said RB receives a notification sent by a DRB and learns that it is responsible for forwarding of messages having a MAC address and VLAN specified in said notification; and upon receiving a message sent by a host device, said RB determines whether said message is a message it is responsible for forwarding according to the VLAN and the MAC address of the host device carried by the message; if yes, said RB forwards said message; and if no, said RB discards said message. | 02-06-2014 |
20140032383 | ONLINE REAL-TIME ACCOUNTING - A method of real time accounting of an online user, comprising, in response to detecting that an accounting period of an online user has expired, transmitting an instant accounting request packet to a Network Access Server (NAS) with an accounting server, in response to receiving an accounting reset packet from the NAS and with the accounting server, performing an instant settlement for expenses of the user according to online usage information carried in the accounting reset packet, recording a result of the instant settlement in a bill of the accounting period that expired recently, restarting to perform accounting for the user from a next accounting period, and transmitting an accounting response packet to the NAS to cause the NAS to clear online usage information of the user and re-calculate the online usage of the user from the next accounting period. | 01-30-2014 |
20140016470 | METHOD FOR TRAFFIC LOAD BALANCING - A method for balancing traffic load is disclosed. The method comprises: monitoring, by a stacking device in a distribution layer, traffic in an aggregation link between the stacking device and a core layer; when a traffic unbalance is monitored in the aggregation link, finding by said stacking device a data flow which causes said traffic unbalance from data flows transferred over the aggregation link; and determining by said stacking device an incoming interface through which the found data flow enters said stacking device, reallocating a new MAC address to the incoming interface, and sending the new MAC address allocated to the incoming interface to a terminal server, so as to enable said traffic unbalance to transit to traffic balance by way of said terminal server sending a data flow with the new MAC address as the destination MAC address. | 01-16-2014 |
20140010074 | SWITCHING TO A BACKUP TRAFFIC PATH BY A LABEL SWITCHING ROUTER IN A MULTI-PROTOCOL LABEL SWITCHING NETWORK - A label switching router (LSR) and a method of switching data traffic to a predefined backup traffic path by the LSR in an MPLS (multi-protocol label switching) network. The LSR, upon detection of failure of a protected path during an LDP session, maintains an LDP session and forwards data traffic via the backup traffic path according to a forwarding table. The forwarding table contains logical output interface information including an outgoing label, a logical output interface, and the next hop of the predefined backup path. | 01-09-2014 |
20130346623 | METHOD AND APPARATUS FOR ACCESSING A PRIVATE SURVEILLANCE NETWORK THROUGH L2TP - According to an example, to access a surveillance network through a Layer 2 Tunnel Protocol (L2TP) includes a private network IP address is assigned to a public network user device, and a route of a surveillance segment is transmitted to the public network user device, such that, after the route of the surveillance segment is received by the public network user device, an IP address of the L2TP virtual interface of the public network user device is configured as a next-hop of the route. When an access request to a surveillance device in the private network is initiated, a routing table of the public network user device is searched to find a matching route of the surveillance segment according to an IP address of the surveillance device. The access request is transmitted to an L2TP server through the L2TP virtual interface, and forwarded to the surveillance device. | 12-26-2013 |
20130332584 | LOAD BALANCING METHODS AND DEVICES - According to an example, to load balance a group of servers, a service access request message is sent by a client terminal and is received at a load balancing device, wherein a source Internet Protocol address of the request message is an Internet Protocol address of the client terminal of a first protocol version. A server is selected from the group of servers to send the request message. A determination is made as to whether the first protocol version is same as a second protocol version of an IP address of the selected server. If the versions are the same, the request message is sent to the selected server. Otherwise, network address translation is performed to replace the source Internet Protocol address of the request message with an Internet Protocol address of the second protocol version to send the request message. | 12-12-2013 |
20130308441 | Method for Backing up Link State Advertisement - The present disclosure provides a method for backing up a link state advertisement (LSA) for use in a distributed device comprising a main control board and an interface board. The main control board comprises a primary board and a standby board. The method comprises: receiving by the standby board LSA related information sent by the primary board; and generating by the standby board an LSA according to the LSA related information. | 11-21-2013 |
20130298207 | METHODS AND DEVICES FOR DETECTING AN IP ADDRESS - A method for detecting an IP address. An access router releases the routes of a detected IP address via a first interface and a second interface, and sets the priority of the route released via said first interface lower than that of the route released via said second interface. After having received by said access router a WEB request by the user via said first interface, the method comprises searching a session record corresponding to said WEB request; establishing by said access router the session record corresponding to said WEB request when the corresponding session record is not found, and returning a redirecting message taking said detected IP address as the re-directed destination IP address; and after having received by said access router via said second interface the message taking said detected IP address as the destination IP address, determining that the user who sent said message is an illegal user. | 11-07-2013 |
20130272114 | PSEUDO WIRE SWITCHING METHOD AND DEVICE - A Pseudo Wire (PW) switching method applied to a MPLS L2VPN comprising U-PE devices and N-PE devices includes checking, by an N-PE device, connectivity of a main U-PW and a backup U-PW between the N-PE device and a U-PE device and connectivity of N-PWs between the N-PE device and other N-PE devices. When one of the main U-PW and the backup U-PW is detected to have failed, transmitting, by the N-PE device, a MAC address clear command through an N-PW in a VSI to which the failed U-PW belongs, and clearing, by an N-PE device receiving the MAC address clear command, MAC addresses associated with the N-PW for transmitting the MAC address clear command in the VSI; and when one of the N-PWs is detected to have failed, transmitting a traffic rerouting command through a U-PW in a VSI to which the failed N-PW belongs and performing U-PW switching. | 10-17-2013 |
20130269000 | Verification in Wireless Local Area Network - A verification method or apparatus applied in a Wireless Local Area Network (WLAN) includes learning an Internet Protocol (IP) address assigned to a station; sending the IP address to a managing device that is managing the access device and receiving, from the managing device, a determination of whether the IP address is used by another station; and verifying a data packet sent by the station by using an IP address that is not used by another station as reported by the managing device. | 10-10-2013 |
20130265941 | PREVENTING ROAMING USER TERMINAL RE-AUTHENICATION - A method and device for preventing a roaming user terminal from re-authentication are provided. The method includes: when Virtual Local Area Network (VLAN) of a roaming user terminal changes, change information of the roaming user terminal is reported to a Broadband Remote Access Server (BRAS) via an Access Controller (AC) and the BRAS reports modified information of the roaming user terminal to an Authentication, Authorization, Accounting server (AAA server). | 10-10-2013 |
20130259042 | MULTICAST PACKET TRANSMISSION - A method for multicast packet transmission by a first provider edge device in a virtual switching instance, in which the first provider edge device transmits, to a second provider edge device in the virtual switching instance, a packet having an address of a private network multicast group and an address of a public network multicast group associated with the private network multicast group. The first provider edge device receives, from the second provider edge device, a join request packet to join the public network multicast group. The first provider edge device stores forwarding information for the public network multicast group, wherein the forwarding information relates to an interface over which the join request packet is received by the first provider edge device. The first provider edge device encapsulates a multicast packet for the private network multicast group with the address of the public network multicast group. The first provider edge device transmits the encapsulated multicast packet according to the address of the public network multicast group and forwarding information. | 10-03-2013 |
20130232202 | FORWARDING TRAFFIC FLOW IN INTELLIGENT RESILIENT FRAMEWORK SYSTEM - A method and member device for forwarding service messages in an Intelligent Resilient Framework (IRF) system and an IRF system. In the method, each member device in the IRF system is allocated to at least two virtual devices, and at least one stack link for each virtual device is configured in order to connect interface boards among different member devices. When it is determined according to a forwarding entry of an interface board in a first member device receiving a service message that the service message is to be transmitted to a second member device, the service message is forwarded via the at least one stack link configured for the virtual device of that interface board. | 09-05-2013 |
20130212394 | Method for 802.1X Authentication, Access Device and Access Control Device - In a method for 802.1X authentication, used in a network which comprises an access device and an access control device, a WLAN security template and a 802.1X client template is enabled at the access device, a 802.1X client template is enabled at the access device, and a 802.1X device template is enabled at a tunnel port of the access control device. The access control device establishes a 802.1X authentication tunnel with the access device, receive a packet transmitted by a client at the access control device through the 802.1X authentication tunnel, authenticates the client after receiving the packet, and assists the access device through the 802.1X authentication tunnel to obtain a session key. | 08-15-2013 |
20130201988 | METHOD FOR PRUNING A MULTICAST BRANCH, PROTOCOL INDEPENDENT MULTICAST ROUTER, AND LAYER-2 EXCHANGE - According to an example, a multicast source may be connected to a first hop Protocol Independent Multicast (PIM) router via one or multiple layer-2 switches that has PIM functions. A first hop PIM router may receive a multicast flow initiated by the multicast source, send a PIM prune message via a port from which the multicast flow is received in response to a determination that the multicast flow is not to be received, or the first hop PIM router may receive a PIM prune message for a multicast flow from a downstream PIM router or a multicast group leave message for a multicast flow from a client connected to the first hop PIM router and delete a port via which the PIM prune message. | 08-08-2013 |
20130201822 | COMPUTER NETWORK METHOD AND DEVICE USING LINK AGGREGATION - A method and device of link aggregation in computer networking, wherein data originally scheduled for forwarding by a scheduled data port are diverted for forwarding by a backup data port assigned to the scheduled data port upon detection that the scheduled data port is connected to a data link which is not capable of data traffic even though the data port is still a selected port. | 08-08-2013 |
20130176899 | METHOD FOR ACQUIRING STATION INFORMATION - A method for acquiring station information is disclosed. The method is for use in a system comprising an access controller (AC), a Fit Access Point (Fit AP), a station and a network management device. The method comprises: the network management device reading the station information under the AC when it is initialized, the network management device determining a new online duration of the station according to the recorded online duration of the station and the time interval since the last time the online duration was updated, and the network management device displaying and/or recording the new online duration of the station. | 07-11-2013 |
20130173788 | NETWORK ACCESS APPARATUS - A network access apparatus comprising a tunneling interface to collect device access information of network devices of a first computer network having a first network gateway device and device access information of network devices of a second computer network having a second network gateway device, wherein the apparatus is to send device access information of network devices of said first computer network to said second computer network upon receipt of an inquiry for request of device access information from said second computer network, and vice versa. | 07-04-2013 |
20130148495 | A METHOD OF ROUTING AND A DEVICE FOR AN AUTONOMOUS SYSTEM - The disclosure relates to a method of routing for an Autonomous System AS in a communication system, in which the AS comprises a plurality of network devices including a first network device and a second network device. The first network device distributes routing information to a forwarding table by calculating a first route from the first network device to the second network device. The first network device receives information of a destination network device of the communication system from the second network device, and forms a second route from the second network device to the destination network device to be stored in the forwarding table using the received information of the destination network device. When the first route fails, the first network device calculates a third route from the first network device to the second network device and updates the routing information in the forwarding table according to the third route. | 06-13-2013 |
20130142096 | METHOD AND DEVICE FOR RADIO RESOURCE MANAGEMENT - The present disclosure relates to a method of radio resource management for a communication network including an Access Controller and a plurality of Access Points. The Access Controller manages the plurality of Access Points, each of which provides a radio for accessing the network. The Access Controller joins into a high-density group a present radio and, with respect to the present radio, radios which have signal strengths higher than a power-adjustment threshold, when it determines that the transmission power of the present radio is less than or equal to a minimum transmission power threshold, and that a predetermined condition to down-adjust the transmission power of the present radio is satisfied. A channel from amongst a plurality of available channels is assigned to each of the radios in the high-density group including the present radio. | 06-06-2013 |
20130142033 | ACCESS POINT AND METHOD FOR DATA TRANSMISSION - A method for data transmission disclosed is applied to an access point for use in a wireless local area network. The access point has multiple antennas. The method comprises in response to transmitting a first message successfully to a station, determining a maximum transmitting rate at which a message can be transmitted successfully using a current antenna group by increasing the transmitting rate and transmitting a message repeatedly; and, transmitting further messages to the station at the determined maximum transmitting rate. | 06-06-2013 |
20130139219 | METHOD OF FENCING IN A CLUSTER SYSTEM - A method of fencing in a cluster system including network devices and a management network device is disclosed. Each network device may run an application program and comprises a fence device. A first network device receives a fence operation command from the management network device. The fence operation command contains information of a target network device and information of a target application. The first network device may determine a fence device on the first network device that corresponds to the fence operation command and activates the determined fence device such that the fence device performs a fence operation on the target application program according to the fence operation command. | 05-30-2013 |
20130138920 | METHOD AND APPARATUS FOR PACKET PROCESSING AND A PREPROCESSOR - An apparatus for packet processing is provided. The apparatus is to be implemented in a server and includes: a preprocessor and at least two processors which are respectively connected with the preprocessor. The preprocessor is to classify packets received externally from the server, and to distribute the classified packets to the respective processors, wherein packets in a same flow are distributed to a same processor. Each of the processors is to receive and process a packet distributed by the preprocessor. | 05-30-2013 |
20130135989 | DATA FORWARDING APPARATUS WITH REDUNDANCY - A default data forwarding apparatus according to an example may transmit network device access information to a backup apparatus while operating in the normal operation state to facilitate network access to network devices via a backup apparatus when the data forwarding apparatus fails. The backup apparatus may receive and store network device access information for accessing the plurality of network devices while in the backup state to prepare for taking over as a default gateway upon failure of the default data forwarding apparatus. | 05-30-2013 |
20130128762 | METHOD AND APPARATUS FOR CONTROLLING INTELLIGENT ANTENNA SYSTEM - A method and an apparatus for controlling an intelligent antenna system are provided. The method includes: pre-configuring a Request Min Rate (RR), a Request Max PER (RP) and a request TX power (RTP); A). determining a current antenna configuration and a current transmitting power of the intelligent antenna system; B). reducing the transmitting power as long as the packet loss ratio does not exceed the RP with the current antenna configuration and with RR as a current transmitting rate, and adopting a reduced transmitting power as the current transmitting power; and C). switching between different antenna configurations at intervals with the current transmitting rate and the current transmitting power to obtain an antenna configuration under which the packet loss ratio is lower than the current packet loss ratio, and performing B). | 05-23-2013 |
20130089096 | METHOD AND SYSTEM FOR MANAGING PROTOCOL CONNECTION IN PBB NETWORK AND BEB NODE - A method and system for managing protocol connection in a PBB network and a BEB node. A first BEB node in the PBB network receives a Pseudo Wire (PW) connection requesting message sent by a second BEB node which has a PBB instance. When it is determined according to the PW connection requesting message that the first BEB node has the same PBB instance as that of the second BEB node, the first BEB node sends a PW response message back to the second BEB node and establishes protocol connection between the first BEB node and the second BEB node for forwarding backbone frame. | 04-11-2013 |
20130070746 | TRANSMISSION METHOD FOR SUPPORTING DATA COMPRESSION - A wireless communication network includes a network device and a terminal device. The network device sends a first message indicating a data compression algorithm supported by the network device, receives a second message identifying a data compression algorithm supported by the terminal device, and sends a third message to the terminal device upon receiving the second message, the third message identifying a negotiated data compression algorithm. | 03-21-2013 |
20130064247 | METHOD AND DEVICE FOR PROCESSING SOURCE ROLE INFORMATION - A method and device for processing source role information in which a source role tag is inserted into a packet as an inner VLAN tag of the packet and used to perform role based access control processing for the packet. | 03-14-2013 |
20110252228 | METHOD AND APPARATUS FOR ENSURING PACKET TRANSMISSION SECURITY - An apparatus and method for ensuring distributed packet transmission security are provided. In an embodiment of the present invention, a main control board allocates SA information to multiple processing boards according to a pre-defined criterion, so that each processing board which receives and stores the SA information may implement IPSec processing. As such, the IPSec processing is shared by the multiple processing boards. Accordingly, when there are a large number of IPSec tunnels on one interface, the IPSec processing to the packets passing the IPSec tunnels will not completely rely on only the processing board where the interface is located. Instead, the IPSec processing is allocated to different processing boards. Therefore, the multiple processing boards effectively share the IPSec processing corresponding to multiple SAs. The efficiency of the IPSec processing is increased. | 10-13-2011 |
20110249674 | APPARATUS AND METHOD FOR PROCESSING PACKET - The present invention provides an apparatus and method for processing a packet. An interface processing module selects one from all service processing modules as a service processing module for processing a packet; if the service processing module needs to perform tunnel processing for the packet, the service processing module transmits the packet after performing the tunnel processing; if another service processing module needs to perform tunnel processing for the packet, the service processing module transmits the packet to a service processing module needing to perform tunnel processing for the packet. According to the present invention, the packet can be processed uniformly by the service processing module, so it is not unnecessary to store session states in the service processing modules, and also not unnecessary to perform synchronization between the service processing modules, which greatly decreases complexity of processing the packet and saves system bandwidth. | 10-13-2011 |
20110153584 | METHOD, SYSTEM, AND ENGINE DISPATCH FOR CONTENT SEARCH - The present invention discloses a method, system, and engine dispatch unit for content search, wherein the engine dispatch unit connects to at least a processor and two search engines, obtains objects from the processor(s), and selects search engines to perform content search according to the load of each search engine; the selected search engines perform content search for the objects according to preset matching rules. Solutions of the present invention can effectively improve content search performance. | 06-23-2011 |
20110106947 | Method and Apparatus for Dual Stack Access - The present invention discloses a method of dual stack access, wherein a network device authenticates the first protocol address of a requesting client, stores the user name, first protocol address, and address status information of the client in the user information table if the authentication succeeds, assigns a second protocol address to the client, stores this second protocol address and address status information in the user information table, generates control rules for the client according to its user information, and controls dual stack access of the client according to the rules. This invention provides effective authentication-based access control of dual stack users. | 05-05-2011 |
20110085584 | LONG-REACH ETHERNET SYSTEM AND RELAY - The present invention discloses a long-reach Ethernet system. The system includes a first Ethernet device and a second Ethernet device which communicate with each other, and a relay; wherein one of the first Ethernet device and the second Ethernet device is a conventional Ethernet device, and the other one of the first Ethernet device and the second Ethernet device is a conventional Ethernet device or a long-reach Ethernet device; the first Ethernet device and the second Ethernet device communicate with each other via the relay; and the relay is adapted to transform conventional Ethernet data into long-reach Ethernet data and transform long-reach Ethernet data into Ethernet data. The present invention can realize the communication of two Ethernet devices when at least one of the two Ethernet devices is a conventional Ethernet device and a working distance between them is longer than 100 meters. | 04-14-2011 |
20110040923 | DATA PACKET ACCESS CONTROL APPARATUS AND METHOD THEREOF - A data packet access control apparatus and a data packet access control method are disclosed. RAM resources in a data packet processing chip are used to implement a Bypass FIFO. The Bypass FIFO is used as a first-level cache for small amount of data, and an external RAM of the data packet processing chip is used as a second-level cache for large amount of data. In this way, some data packets are read and written within the chip and not all data packets have to be read and written through the external RAM. A data packet reading/writing operation may be performed to the external RAM by a BANK interleave mode. | 02-17-2011 |
20110032948 | METHOD AND TRANSMISSION APPARATUS FOR TRANSMITTING DATA IN A COAX NETWORK - A method and apparatus for transmitting data in a coax network, a coax distribution network including an access point and a plurality of coaxial terminals connected to the access point through splitters, a same physical transmission channel is adopted for transmitting uplink data and downlink data between the access point and each coaxial terminal in the coax distribution network, the method including: Step S1: dividing an entire time duration of a physical transmission channel for transmitting information into time slices to constitute an uplink data transmission channel and a downlink data transmission channel; and Step S2: transmitting uplink data and downlink data between the Ethernet access point and each coaxial terminal at different time slices respectively. The present invention is based on a reconstruction of the Ethernet physical layer of the coax distribution network, where the uplink data and the downlink data are transmitted on the same physical transmission channel by adopting a time division multiplexing method, and MPCP protocol is adopted on the uplink for realizing a MAC layer communications between the Ethernet access point and the plurality of coaxial terminals. | 02-10-2011 |
20110022726 | METHOD AND APPARATUS FOR TRAFFIC FORWARDING IN A STACKING APPARATUS - Embodiments of the present invention provide a method and device for traffic forwarding in a stacking apparatus which includes multiple member devices. The method includes: obtaining, by a member device, a forwarding table size of each member device in the stacking apparatus; choosing a member device having the largest forwarding table as a proxy device when a forwarding table of another member device in the stacking apparatus is larger than that of the member device; transmitting all or part of to-be-forwarded traffic to the proxy device which performs traffic forwarding. According to the present invention, forwarding capability of member devices having larger forwarding tables is utilized for providing proxy forwarding for member device having smaller forwarding tables, so that forwarding sizes of the member devices having different forwarding table sizes in the stacking apparatus are unified and forwarding capabilities of the member devices in the stacking apparatus are fully used. | 01-27-2011 |
20110016243 | METHOD AND DEVICE OF LOAD-SHARING IN IRF STACK - The present invention provides a method and device of load-sharing in an IRF stack. The method includes: the Master device checking a congestion state of the main path, obtaining a path for forwarding service flow according the congestion state of the main path, where the path is the main path or a backup path, and forwarding the service flow to the egress device through the main path or the backup bath to implement the load-sharing in the IRF stack. In the embodiments of the present invention, by checking the congestion states of main path and the backup path in real-time, the load-sharing of the IRF stack is implemented. When new service flow is added, the data may be forwarded through another path, which can improve the efficiency of member devices in the IRF stack and solve the problem of forwarding bottleneck to which the member devices face. | 01-20-2011 |
20110013637 | Method, System and Gateway for Remotely Accessing MPLS VPN - A method, system and gateway for remotely accessing an MPLS VPN are provided. In the method, multiple virtual interfaces are established in an SSL VPN gateway, one virtual interface is bound with one VPN, different VPN users are differentiated according to authentication and authorization information of users, and the authentication and authorization information of the users is respectively bound with corresponding VPNs. When the SSL VPN gateway receives a packet sent by a user, an inner label and an outer label are added to the packet according to a VPN instance bound with the user; when receiving a response packet from a resource server, the SSL VPN gateway searches for a VPN instance according to the VPN label, and forwards the response packet to the user through the SSL connection according to the found VPN instance. | 01-20-2011 |
20110007670 | Stacking System and a Method for Switching Traffic in the Stacking System - The invention provides a stacking system and a method for traffic switching in the stacking system, comprising: when newly joined devices in the stacking system make the daisy chain topology change to ring topology, block a stack port of one of the newly joined devices; after the devices in the stacking system perform another topology convergence process, the master restores the configuration of the newly joined devices; after the configuration of the newly joined device one of whose stack ports is blocked is restored, it sets its blocked stack port to the forwarding state, calculates the shortest path based on the ring topology, and sends first notification packets for topology change from daisy chain type to ring type through its two stack ports; each device that receives the first notification packets re-calculates its shortest forwarding path respectively and switches the traffic, and then forwards the first notification packets. This invention can prevent traffic interruption that occurs when the topology of a stacking system changes from daisy chain to ring. | 01-13-2011 |
20100325677 | TV Network-Based Ethernet Data Transmission Method and Physical Layer Transmission Apparatus - Embodiments of the present invention provide a television, TV, network based Ethernet data transmission method and a physical layer, PHY, transmission apparatus. The method includes: determining in advance data transmission speed according to bidirectional frequency spectrum width reserved in a TV network; setting working speed of transmitting and receiving of a PHY transmission apparatus according to the determined data transmission speed to make the working speed match the data transmission speed; receiving and transmitting, by the PHY transmission apparatus, data with the transmission speed; performing, by the PHY transmission apparatus, speed matching for the data according to speed of a Media Access Control, MAC, layer interface; receiving and transmitting, by the MAC layer interface, the data after completing the speed matching. The PHY transmission apparatus includes: a transmitting unit, a receiving unit and a variable speed control unit. | 12-23-2010 |
20100322239 | METHOD AND AN APPARATUS FOR PROCESSING PACKETS - The present invention discloses a packet processing method, which applies to a high-performance and scalable flow processing system architecture. The service board performs security processing for packets received from external devices by using the firewall function before sending them to the main CPU; similarly, the service board also performs security processing for packets sent from the main CPU by using the firewall function before the main CPU sends them to external devices. The methods of the present invention utilize high performance and good scalability of the new architecture. In a network with heavy and high-speed traffic, the service board performs security processing for packets by using the firewall function and then transmits the valid packets to the main CPU. Thus, the main CPU is protected by the firewall function against attack packets. | 12-23-2010 |
20100306466 | METHOD FOR IMPROVING DISK AVAILABILITY AND DISK ARRAY CONTROLLER - The present invention discloses a method for improving disk availability and a disk array controller. The method includes: determining, when detecting that part of tracks of a disk in a disk array is damaged, a first master data storage space in a damaged track; selecting an idle first backup data storage space from at least one back data storage space, establishing a corresponding relation between an address of a strip contained in the first master data storage space and an address of a strip contained in the first backup data storage space; and receiving an instruction for accessing the strip contained in the first master data storage space, finding the strip contained in the first backup data storage space according to an address of the strip in the instruction and the corresponding relation, and accessing the strip contained in the first backup data storage space. | 12-02-2010 |
20100299460 | BUFFER MANAGER AND BUFFER MANAGEMENT METHOD BASED ON ADDRESS POINTER LINKED LIST - Embodiments of the present invention provide a buffer manager and a buffer management method based on an address pointer linked list. In the embodiments, address pointers of all buffer blocks in a buffer are divided into several groups, lower bits of address pointers in each group are used to record a linked list between the address pointers in the same group, and an address pointer which is pointed by one predetermined address pointer of each group and is in a different group is further recorded to upbuild a linked list between the groups. Thereby, an address linked list can still be stored without a RAM with a width equal to a pointer depth and with a depth equal to the total number of buffer blocks in the buffer as required by the conventional art, which greatly reduces hardware resources required. | 11-25-2010 |
20100262819 | METHOD AND APPARATUS FOR IMPLEMENTING MULTIPLE SERVICE PROCESSING FUNCTIONS - A multi-service processing method, including: configuring different cores of a multi-core processor to process different services; and sending received packets to the cores in the pre-defined service processing sequence. The multi-core processor apparatus, includes the configuration management unit, the packet distributing unit, and the multi-core processor. The method and apparatus can save investments in devices while implementing multiple service processing functions. | 10-14-2010 |
20100260181 | METHOD, PROGRAM, AND SYSTEM FOR IMPLEMENTING CENTRALIZED CONTROL PLANE AND DISTRIBUTED DATA PLANE - The present invention discloses a method for implementing centralized control plane and distributed data plane and that comprises the following steps: the main control unit of the main board generates control information and delivers it to the adaptation layer of the main board; the adaptation layer of the main board transmits the control information to the adaptation layer of the service board(s); the adaptation layer of the service board(s) delivers the control information to the data plane and hardware engine of the service board(s). The present discloses a program and system for implementing centralized control plane and distributed data plane. The present invention provides a software architecture using an adaptation layer to implement centralized control plane and distributed data plane to ensure high performance and good scalability of the new architecture, reduce system complexity, and keep system simplicity and efficiency. | 10-14-2010 |
20100235496 | Method, System and Apparatus for Collecting Statistics of Characteristic Value with Threshold - A method for collecting statistics of a characteristic value with a threshold includes: determining, according to a total threshold for a characteristic value whose statistic is to be collected, at least one sub-threshold corresponding to at least one application processing apparatus participating in statistic-collection; issuing the at least one sub-threshold respectively to the at least one application processing apparatus, notifying the at least one application processing apparatus to enter into a distributed statistic-collecting state; after receiving from anyone of the at least one application processing apparatus a notification which indicates that a current statistic value of the characteristic value of the application processing apparatus reaches a sub-threshold corresponding to the application processing apparatus, notifying the at least one application processing apparatus to enter into a centralized statistic-collecting state to collect statistics of the characteristic value in a centralized mode. | 09-16-2010 |
20100195647 | METHOD AND APPARATUS FOR PACKET PROCESSING - The present invention discloses a packet processing apparatus and method. The packet processing apparatus is applied to an L4˜L7 network device, including a plurality of interface processing units and a plurality of service processing units, the interface processing units are connected with the service processing units through a first connection unit; and each of the interface processing units is adapted to select, after receiving a packet from outside, a service processing unit from all the service processing units and transmit the packet to the selected service processing unit; and each of the service processing units is adapted to perform service processing to the packet after receiving the packet. The present invention improves packet processing capability and reliability of the L4˜L7 network device. | 08-05-2010 |
20100180342 | Method for Using Extended Security System, Extended Security System and Devices - Embodiments of the present invention disclose a method for using an extended security system, including: configuring one of security processing devices in the extended security system as a primary security processing device and configuring other security processing devices as at least one secondary security processing device connected with the primary security processing device; the method further includes: when the extended security system receives an external packet, selecting, by the primary security processing device, a security processing device to process the received external packet, the selected security processing device being the primary security processing device or the secondary security processing device. The embodiments of the present invention also disclose an extended security system and a primary security processing device and secondary security processing devices. By data interaction between the security processing devices, resource sharing between the security processing devices can be implemented, thereby improving the performance of the extended security system. | 07-15-2010 |
20100146323 | METHOD, SYSTEM AND APPARATUS FOR DETECTING MULTIPLE ACTIVE DEVICES IN STACK - Embodiments of the present invention disclose a method for detecting multiple Active devices in a stack. In the method, a new Active device generates a Link Aggregation Control Protocol (LACP) packet when a stacking link is in failure, the LACP packet contains a bridge MAC address and a member number of the new Active device; the new Active device transmits the LACP packet to a stacking member through an access switch; and the stacking member detects collision of multiple Active devices according to the MAC address and the member number and enters a Recovery state. In the present invention, by containing the bridge MAC, the Active ID and the configuration dividing identifier in the extended field of the LACP packet, the collision of multiple Active devices in a distributed stack can be detected. | 06-10-2010 |
20100138612 | SYSTEM AND METHOD FOR IMPLEMENTING CACHE SHARING - A system for implementing cache sharing includes a main control unit and a plurality of service processing units, and further includes a shared cache unit respectively connected with the main control unit and the service processing units for implementing high-speed data interaction among the service processing units. A method for cache sharing is also provided. In embodiments of the present invention, based on a reliable high-speed bus, a high-speed shared cache is provided. A mutual exclusion scheme is provided in the shared cache to ensure data consistency, which not only implements high-speed data sharing but also dramatically improves system performance. | 06-03-2010 |
20100104007 | METHOD AND DEVICE FOR VIDEO-STREAM FRAME RATE ADAPTATION, AND FIELD PROGRAMMABLE GATE ARRAY CHIP AND VIDEO STREAM PROCESSING APPARATUS - This invention provides a method and device for video-stream frame rate adaptation. The method includes: allocating a buffer space for each of at least one video conference room respectively and dividing the buffer space into at least one segment, each segment of which is used for buffering a video frame; and performing following steps for each of the at least one video conference room: generating a pulse signal for the video conference room periodically according to a certain pulse rate; and performing a data writing operation for a segment of the corresponding buffer space at an input-video-stream frame rate of the video conference room, and performing a reading operation for a segment of the buffer space at an output-video-stream frame rate. This invention also provides an FPGA chip and a video stream processing apparatus. The invention simplifies frame rate adaptation design, and reduces system processing overhead during the frame rate adaptation. | 04-29-2010 |
20100076919 | METHOD AND APPARATUS FOR PATTERN MATCHING - A method of pattern matching is provided, including: determining whether there is flow status information corresponding to a current pattern for a transmission flow to which a current segment belongs; if yes, performing pattern matching for the current segment by taking the flow status information as assistant information of the pattern matching; otherwise, creating the flow status information corresponding to the current pattern for the transmission flow and performing pattern matching for the current segment by taking the flow status information as assistant information of the pattern matching. An apparatus of pattern matching is also provided, including a flow status information configuration module and a pattern matching processing module. The solution of the present invention can avoid the defects caused by flow-reassembly. | 03-25-2010 |
20090290489 | METHOD OF BALANCING WIRELESS LOAD AND ACCESS CONTROLLER - The present invention discloses a method of balancing wireless load and an Access Controller (AC). The method includes: receiving by an Access Controller (AC) an association request of joining an Access Port (AP) sent by a Station (STA); calculating wireless load of the AP that the STA requests to join; determining whether one or more preset conditions are met, if the one or more present conditions are met, accepting the association request sent by the STA; otherwise, rejecting the association request sent by the STA. In the present invention, when an AP's wireless load is too large, STAs can be distributed to other APs, thereby optimizing load balance in the Wireless Local Area Network (WLAN). | 11-26-2009 |
20090290486 | Ring Network Routing Method and Ring Network Node - The present invention discloses a method for routing in a ring network, the ring network comprising multiple connected nodes, wherein, the method includes: each node in the ring network acquiring topology information of the ring network, obtaining under-ring routings learnt by the other nodes from a under-ring network, calculating a main path and a backup path to each routing according to the acquired topology information of the ring network, creating an FRR switch table, and switching between the main path and the backup path according to the FRR switch table when a failure occurs in the ring network. Accordingly, the present invention also provides a node in the ring network. Adopting technical scheme provided by the present invention, a simple routing implementation for ring network and fast convergence when a failure occurs can be provided. | 11-26-2009 |
20090274201 | ETHERNET TRANSCEIVER AND ETHERNET TRANSMISSION METHOD BASED ON COAX NETWORK - An Ethernet transceiver and an Ethernet transmission method are disclosed. The transceiver is adapted to detect the level amplitude of a received analog signal, adjust an amplification factor adaptively according to the detecting result to make the level amplitude of the received analog signal which has been amplified reach a same output level amplitude, perform an analog-to-digital conversion and a codec process, and transmit the signal to a MAC layer of the Ethernet. The transceiver is further adapted to amplify the level of a signal to be transmitted to a coax network and output the signal. The amplification factor is determined according to a maximum attenuation loss between coaxial terminals. In the present invention, an interaction between an Ethernet access point and a coaxial terminal and an interaction between coaxial terminals are carried out, which makes the CSMA/CD MAC layer of the Ethernet be adopted in an application environment of radio and television coax network. | 11-05-2009 |
20090274170 | Adaptation Apparatus and Adaptation Method for Ethernet Signal Transmission - The present invention provides an adaptation apparatus for Ethernet signal transmission, including: a differential/single-ended conversion unit, set between the coaxial cable network and the Ethernet physical layer chip, adapted to convert a to-be-transmitted signal of the Ethernet physical layer chip from differential signal into single-ended signal; a non-collinear/collinear conversion unit, set between the coaxial cable network and the Ethernet physical layer chip, adapted to convert the to-be-transmitted signal from non-collinear signal into collinear signal; and transmitting means for transmitting the converted to-be-transmitted signal to the coaxial cable network. The present invention also provides an adaptation method for Ethernet signal transmission. Through the present invention, communications between an Ethernet access point and coaxial cable terminals and communications between the coaxial cable terminals are enabled so that Ethernet signals can be transmitted in coaxial cable networks. | 11-05-2009 |
20090263981 | MIDPLANE OF COMMUNICATION DEVICE - A midplane of a communication device, includes the first connectors and the second connectors which connect with each other via high-speed traces, the first connectors arrange in parallel at one side of the midplane, the second connectors arrange in parallel at the other side of the midplane and in parallel with the first connectors. The wiring of high-speed traces between the first connectors and the second connectors can be disposed on the whole midplane, so that it avoids the high density of wiring in part of midplane, reduces the number of layers of the midplane and the complexity of design, and reduces the crosstalk in signals. And the cooling of the whole communication device can be accomplished by only one heat dissipation system, it reduces the complexity of design of the communication device. The area between each frames of the midplane is provided to allocate electrical power in the communication device with two or multiple frames, it reduces the costs of the communication device. | 10-22-2009 |
20090262643 | METHOD FOR IMPLEMENTING INTERSECTING RING NETWORK WITH ARBITRARY TOPOLOGY, NODE AND INTERSECTING RING NETWORK - The present invention discloses a method for implementing an intersecting ring network with arbitrary topology, node and an intersecting ring network. The method includes: intersecting multiple Ethernet rings to form the intersecting ring network with arbitrary topology, each Ethernet ring in the intersecting ring network comprising a master node and multiple transmission nodes; the master node of each Ethernet ring opening its primary port and blocking its secondary port during initial normal operation; and the master node of each Ethernet ring in the intersecting ring network performing fault detection and fault processing as well as fault recovery detection and fault recovery processing by using one of the two manners containing protocol message interaction and detection on links directly connected to the master node. | 10-22-2009 |
20090196287 | Method and apparatus for forwarding data in Ethernet - The present invention provides a method for forwarding data in the Ethernet, an Ethernet physical layer cross apparatus, an Ethernet Media Access Control (MAC) layer cross apparatus, an Ethernet IP layer cross apparatus and cross cascade systems. In the method of the present invention includes the following features: configuring cross relationships between network device interfaces; determining whether an interface has a cross relationship with other interfaces according to the cross relationships configured after receiving data from the interface; sending the data to an interface which has a cross relationship with the interface from which the data is received if the interface from which the data is received has a cross relationship with other interfaces; and proceeding with existing forwarding processing in each layer if the interface from which the data is received does not have a cross relationship with other interfaces. The solution of the present invention dramatically reduces workload of network devices in the Ethernet and improves forwarding performance of the network devices. | 08-06-2009 |
20090141716 | METHOD AND APPARATUS FOR PACKET RULE MATCHING - This invention discloses method and apparatus for packet rule matching. The method includes: creating multiple levels of storage tables, storage table other than final-level storage table records corresponding relation between value index and value range number, and final-level storage table records corresponding relation between packet rule number and combination index formed by value range number; upon receiving packet, searching first-level storage table for value index corresponding to value of quintuple of the packet; searching next-level storage table according to value range number corresponding to found value index until penultimate-level storage table; searching final-level storage table for combination index identical to combination value formed by the value range number found in the penultimate-level storage table, and obtaining packet rule number corresponding to the found combination value; and taking packet rule corresponding to the obtained packet rule number as matched packet rule. This invention can increase the speed of packet rule matching. | 06-04-2009 |
20090138471 | METHOD AND APPARATUS FOR IDENTIFYING DATA CONTENT - A method for identifying data content comprises: establishing a character base which stores characters corresponding to various service applications and protocols; performing matching between contents of currently received data and the characters in the character base, and obtaining characters contained in the currently received data; identifying at least one of a service application and a protocol corresponding to the characters contained in the currently received data according to a mapping relation between characters and protocols as well as a mapping relation between characters and service applications. An apparatus for identifying data content is also disclosed. The technical scheme of the present invention can identify data content comprehensively and can be easily extended. | 05-28-2009 |
20090072621 | POWER SUPPLY SYSTEM, POWER CABLE DISTRIBUTOR, POWER SUPPLY SUBRACK AND INTEGRATED EQUIPMENT - A power supply system is provided, which includes a power supply subrack (PSS) and a power cable distributor (PCD). The PSS includes one or more power modules and a third connector ( | 03-19-2009 |
20090043878 | VIRTUAL NETWORK STORAGE SYSTEM, NETWORK STORAGE DEVICE AND VIRTUAL METHOD - A virtual network storage system includes at least two network storage devices which connect to same SAN. At least one network storage device includes a device management unit for maintaining the mapping relationship between the global volume and the local volume of each network storage device, and for redirecting the access from the global volume to the network storage device which the global volume management unit of the global volume is located. At least one network storage device includes a global volume management unit for executing the access operation to the global volume according to the mapping relationship. A network storage device and virtual method are applied to the virtual network storage system. With the increasing of the network device, the ability of processing the access to the global volume is increased, and then the performance bottleneck caused by virtually operating to the network storage system. | 02-12-2009 |
20080294784 | Method for Synchronizing Connection State in Data Communication, and Communication Node Using the Same - The present invention discloses a method for synchronizing connection state in data communication, which includes: a node requests connection state information from an opposite node connected with it; and the node updates the local connection state according to the connection state information returned by the opposite node. The invention further discloses a communication node using the method. In the invention, by synchronizing the connection state information between a node that may be out of synchronization and its opposite node connected, the problem of connection state synchronization may be solved substantially, and synchronization may be recovered simply by holding the connection. Further, according to the embodiment of the invention, frequent connection state synchronization inside a high-availability system is no longer necessary, so that system bandwidth and processing capability may be saved, and the original connection may be recovered at any moment when an active/standby switching occurs. | 11-27-2008 |