摘要:
As an example, a system and method is provided for allocating network bandwidth. The method includes identifying congested and uncongested links using a tenant demand for each link and a tenant bandwidth cap. A portion of the tenant bandwidth cap may be allocated to each uncongested link based on the tenant demand on the uncongested link and the tenant bandwidth cap. Additionally, the remainder of the tenant bandwidth cap may be allocated to the tenants congested links based on a link capacity.
摘要:
Optimizing priority queue levels for a flow in a network includes determining a path for the flow, determining an optimized priority queue level of the flow at each of a plurality of switches based on a Quality of Service (QoS) requirement of the flow and priority queue levels of one or more existing flows in the network. Information of the optimized priority queue level of the flow is sent to at each of the switches.
摘要:
A display monitor includes a plurality of monitor inputs, a monitor switch for switching between the plurality of monitor inputs, a plurality of universal serial bus (USB) ports, where a first one of the USB ports is positioned at a first location and is dedicated to a first processing device, a second one of the USB ports is positioned at a second location and is dedicated to a second processing device, and a third one of the USB ports is positioned at a third location and is dedicated to either the first processing device or the second processing device. In addition, the display monitor includes a USB switch for switching between the plurality of USB ports to selectively activate the plurality of USB ports, where the monitor switch is internally linked to the USB switch to cause the monitor switch and the USB switch to switch concurrently with each other.
摘要:
In a first aspect, the present invention provides a protocol for communications across a securable communication channel between a first device and a second device. The protocol includes the transmission of a plurality of uniquely identifiable messages which each include security-related data, from the first device to the second device. The protocol includes determining whether a subset of messages that are received by the second device comply with at least one predetermined message criterion and are identifiable as having been sent from the first device. In the event that said subset of messages are determined to comply with the predetermined verification criterion (or criteria) and are identifiable as having been sent from the first device, the security-related data is determined to have been successfully communicated to the second device.
摘要:
In a first aspect, the present invention provides a protocol for communications across a securable communication channel between a first device and a second device. The protocol includes the transmission of a plurality of uniquely identifiable messages which each include security-related data, from the first device to the second device. The protocol includes determining whether a subset of messages that are received by the second device comply with at least one predetermined message criterion and are identifiable as having been sent from the first device. In the event that said subset of messages are determined to comply with the predetermined verification criterion (or criteria) and are identifiable as having been sent from the first device, the security-related data is determined to have been successfully communicated to the second device.
摘要:
A configurable Clos network includes leafs and spines and a switch fabric that connects the leafs and the spines. The switch fabric couples each leaf port of each leaf to at least one spine port of each spine.
摘要:
Embodiments herein relate to addition or modification to a forwarding table based on an address. A first packet having a source address and a location value may be received. The source address includes a source of the first packet and the location value indicates at least part of a route along a network to the source address. The forwarding table is not modified or no new entry is added to the forwarding table, if the forwarding table does not include the source address.
摘要:
A priority queue assignment technique for quality-of-service (“QoS”) network flows in a network is provided. A network path is determined for an incoming flow including a plurality of network switches associated, with a plurality of priority queue levels. A priority queue level is determined for the incoming flow for at least one of the plurality of network switches in the network path based on priority queue levels of existing flows. The priority queue level of the incoming flow is adjusted, to dynamically balance flows over the plurality of priority queue levels for at least one of the plurality of network switches in the network path based on quality-of-service (“QoS”) requirements associated with the incoming flow.
摘要:
Local rules for managing flows devolved from a central controller are received at a switch. The central controller determines a global set of rules for managing flows. The switch receives a packet from a flow from a network and determines whether a metric for the flow satisfies a dynamic condition to trigger a metric report to the central controller. In response to a determination that the metric for the flow at the switch satisfies the dynamic condition to trigger a metric report to the central controller, the switch sends a metric report to the central controller, and the switch then receives an instruction to manage the flow from the central controller. In response to a determination that the metric for the flow at the switch does not satisfy the dynamic condition to trigger the metric report to the central controller, the switch manages the flow using the local rules for managing flows.
摘要:
A rack sensor controller is operable to sense information for assets housed in a rack. The rack sensor controller includes a memory storing a location of the rack and sensor information received from a plurality of sensors. At least some of the sensors include one or more RFID readers operable to read RFID tags attached to assets housed in the rack. A processor is operable to receive the sensor information and generate a message including the sensor information and the location of the rack for transmission to one or more back-end applications via a forwarder. The forwarder is operable to receive the message, determine one or more back-end applications to receive the message, replicate the message for each of the back-end applications, and transmit the message to the back-end applications. The back-end applications use the location of the rack and the sensor information to track the assets.