摘要:
A key having a gripping portion, the key is left protruding so that torque can be applied by the key user. The gripping portion includes a gripping portion structure. The gripping portion structure further includes an electronic device having a plug connectable to a plug receptacle of electronic appliance. The electronic device integrated in the gripping portion structure. Along at least one side of the gripping portion structure disposed an elongated slot which is wide enough to be used as a key ring receptacle where the key ring, can pass through. The key gripping portion have a freedom of movement for the key user to move the key around the key ring and also a freedom of movement to cross the key ring to either direction, inwardly or outwardly for enabling comfortable access of the plug of the electronic device to be connected to the plug receptacle of electronic appliance.
摘要:
A key having a gripping portion, the key is left protruding so that torque can be applied by the key user. The gripping portion includes a gripping portion structure. The gripping portion structure further includes an electronic device having a plug connectable to a plug receptacle of electronic appliance. The electronic device integrated in the gripping portion structure. Along at least one side of the gripping portion structure disposed an elongated slot which is wide enough to be used as a key ring receptacle where the key ring, can pass through. The key gripping portion have a freedom of movement for the key user to move the key around the key ring and also a freedom of movement to cross the key ring to either direction, inwardly or outwardly for enabling comfortable access of the plug of the electronic device to be connected to the plug receptacle of electronic appliance.
摘要:
A fast protection mechanism capable of maintaining end-to-end and fast local protection on the order of sub 50 ms for both VLAN only based connections and for connections that are based partially on VLAN technology and partially on MPLS technology. The present invention is suitable for use edge switches configured in a stack or ring topology. The NMS provisions both the main and alternative VLANs in each edge switch in the stack portions of the network. When a link failure occurs, the edge switches on either end of the failed link immediately switch all protected traffic going through that link to the alternative VLAN. The packets are then returned on the links over which they were received. Hello messages are used to signal the remote end that a link failure has occurred and that protected traffic must be switched to the main or alternative VLAN in accordance with the VLAN the Hello message was received on.
摘要:
A method of managing connectivity between an end-device and one of a plurality of bridging-devices connected to the end-device. The method includes transmitting test messages by each of the bridging-devices, transmitting test messages by the end-device, determining, in each of the bridging-devices, with which of the other devices there is an operative connection, based on the test messages the bridging-device receives and determining, in each of the bridging-devices, whether a port leading to the end-device should be in a forwarding or blocking state responsive to the determination of the operative connections.
摘要:
A novel and useful system and method for fast protection of dual homed Virtual Private LAN Service (VPLS) spokes. Fast protection is achieved by forwarding traffic to the dual homed VPLS spoke from the VSI that is not currently the one currently serving it, as long as the traffic is known unicast. Egress traffic at the VSI that does not currently serve the VPLS-spoke is re-routed over a protection transport entity to the VPLS-spoke through the device of the VSI currently serving it. Broadcast, multicast and unknown (BMU) traffic is sent to the VPLS spoke only by the BMU-primary VSI. BMU frames received at the BMU-secondary VSI are dropped. A fast election process serves to elect the BMU-primary for coordinating between the two VSIs serving the same VPLS spoke. In addition, a flag is inserted in each frame at an ingress VSI to indicate whether the frame is known or unknown unicast. Unknown unicast frames are forwarded to the VPLS spoke only by the BMU-primary.
摘要:
A novel and useful hitless node insertion mechanism for configuring a new node to be inserted into an Ethernet network. The mechanism comprises pre-configuring the new node into a partially configured state, disconnecting a network link where the new node is to be inserted and connecting the new node to at least one end of the disconnected link. All data traffic received from neighboring nodes is then blocked and fake signal failure (SF) messages are generated and sent if Ethernet Ring Protection (ERP) messages are detected. An in-band management port is then selected and a configuration from a Network Management System (NMS) is received. Once configuration of the said new node is complete, the new node is set to a fully configured state.
摘要:
A method of connecting a client to a server by a load balancer associated with a plurality of servers. The method includes establishing a first connection for transmission of packets between the load balancer and the client, selecting a server to service the client, and splicing the first connection with a second connection between the load balancer and the selected server, the second connection being established before the first connection.
摘要:
An E-Tree service interoperability mechanism between VPLS domain devices (e.g., MPLS domain devices) and Ethernet domain devices. E-Tree interoperability functionality is provided whereby the E-domain device directly connected to the VPLS device is modified to perform an asymmetric VLAN tag manipulation on traffic forwarded between the VPLS device and itself. The capabilities of VPLS are used to divide between roots and leaves, even if both exist in the same E-domain, so that they do not share VLANs resulting in preventing roots and leaves in the same E-domain from communicating directly, but rather through the VPLS devices to which the E-domain connects. Traffic on the E-domain is segregated into a root VLAN to which roots are connected, a root-to-leaf VLAN for forwarding root-originated traffic from the VPLS-domain to the leafs, and a leaf-to-root VLAN for handling traffic originated by the leafs destined to roots.
摘要:
An apparatus for and method of packet loss measurement for TLS connections in an MEN that overcomes the problems of the prior art. The mechanism is operative to ensure that only one copy of each received packet is counted when exiting the TLS connection (unless dropped along the path due to congestion, etc.), so that the number of egress packets counted can be accurately compared with the number of ingress packets counted. Only a single copy of each packet is marked, i.e. flagged, at ingress. Any bridging along the path that needs to duplicate the packet forwards only a single marked copy of the packet. All other copies are forwarded unmarked. At the egress from the TLS, only marked packets are counted by the egress counter. In a second embodiment, a duplication field is inserted into each packet to better track all the duplicate copies of a packet.
摘要:
An apparatus for and method of enforcing precedence of committed traffic over excess traffic that overcomes the difficulty in supporting committed over excess traffic and has particular application to distributed queuing systems. Queue control messages are generated and transmitted to other line cards to guarantee that committed traffic is not dropped when sent from multiple sources such as line interface cards to a single destination. When the level of a queue exceeds a threshold and flow control is received for the corresponding destination, the queue starts dropping excess traffic and messages indicating the queue status are sent to all other lines cards. When a line card receives a queue control message that another line card started dropping excess traffic to a specific destination, it also starts dropping excess traffic to that destination as well.