摘要:
A vibration isolator includes a housing having an upper fluid chamber, a lower fluid chamber, a piston, a tuning passage, and a linear inductance motor assembly for changing the isolation frequency of the vibration isolator. The piston is resiliently disposed within the housing. A vibration tuning fluid is located in the upper fluid chamber, the lower fluid chamber, and the tuning passage. The linear inductance motor assembly includes a magnet member and an inductance coil at least partially surrounding the magnet member. A control system is configured to selectively actuate the magnet member; wherein selective actuation of the magnet member selectively imparts a pumping force on the tuning fluid, thereby changing the isolation frequency.
摘要:
A pylon mounting system with vibration isolation is provided. The system generally includes a housing that defines a first fluid chamber and a second fluid chamber, a fluid disposed within the fluid chambers; a piston assembly at least partially disposed within the housing, and a tuning passage defined by the piston assembly for providing fluid communication between the fluid chambers. The piston assembly has a first arm and a second arm, and each arm has a tubeform bearing for providing pitch and roll stiffness.
摘要:
The external crash attenuation airbag includes an inflatable bladder which is inflatable to an exterior of an aircraft, so that the inflatable bladder is generally located between the aircraft and a crash surface when inflated. The airbag includes a vent configured to burst at a predefined burst pressure, the vent being located a side portion of the inflatable bladder. The airbag also includes a vent support located approximate the vent, the vent support being configured to prevent deformation and therefore maintain the effectiveness of a venting area of the vent.
摘要:
In providing seamless migration of virtual or physical devices among networks of a virtual local area network (VLAN) such as one spanning multiple data centers, a same virtual anycast Medium Access Control (VMAC) is used for reaching default gateways in virtual and/or physical devices. Each network is typically configured such that source MAC learning for the VMAC should happen only for packets coming from the local default gateway. In this manner, when a device is migrated between networks of the VLAN, the same IP address and corresponding MAC address (typically still residing in the MAC cache of the migrated device) can be used to reach the local default gateway.
摘要:
A vibration isolator having an upper housing defining an upper fluid chamber, a lower housing defining a lower fluid chamber, a piston resiliently disposed within the upper housing and the lower housing, a tuning passage defined by the piston, for providing fluid communication between the upper fluid chamber and the lower fluid chamber, a tuning fluid disposed within the tuning passage, the upper fluid chamber, and the lower fluid chamber. A reservoir in fluid communication with the upper fluid chamber for providing pressurization control of the vibration isolator. An expanded accumulator region for providing Increased pressure retention during maintenance and operation of the vibration isolator.
摘要:
In one embodiment, layer-2 (L2) ports of a network device may each be assigned to a particular virtual service domain (VSD). One or more virtual service engines (VSEs) may also be assigned in a particular order to each VSD, where each VSE is configured to apply a particular service to traffic traversing the VSE between ingress and egress service ports. Interconnecting the L2 ports and the ingress and egress service ports is an illustrative virtual Ethernet module (VEM), which directs traffic it receives according to rules as follows: a) into a destination VSD via the one or more correspondingly assigned VSEs in the particular order; b) out of a current VSD via the one or more correspondingly assigned VSEs in a reverse order from the particular order; or c) within a current VSD without redirection through a VSE.
摘要:
Various methods and systems for detecting whether a network device supports a protocol, which defines a supplemental header, are disclosed. One method involves detecting a value within a preamble generated by a sending device and verifying that a header format of a header, also generated by the sending device, conforms to a header format definition of a protocol. The header format definition of the protocol defines a supplemental header. The preamble can be an Ethernet preamble. In one embodiment, the preamble is a converged data link (CDL) preamble or other type of preamble that is used to convey operation, administration and management (OAM) information.
摘要:
In one embodiment, layer-2 (L2) ports of a network device may each be assigned to a particular virtual service domain (VSD). One or more virtual service engines (VSEs) may also be assigned in a particular order to each VSD, where each VSE is configured to apply a particular service to traffic traversing the VSE between ingress and egress service ports. Interconnecting the L2 ports and the ingress and egress service ports is an illustrative virtual Ethernet module (VEM), which directs traffic it receives according to rules as follows: a) into a destination VSD via the one or more correspondingly assigned VSEs in the particular order; b) out of a current VSD via the one or more correspondingly assigned VSEs in a reverse order from the particular order; or c) within a current VSD without redirection through a VSE.
摘要:
A process is presented for the production of ammonium sulfate nitrate. The process provides for producing a highly uniform product and having a substantially uniform size. The process includes reacting ammonium sulfate and ammonium nitrate to form an FASN slurry melt. The slurry melt is continuously stirred and heated to keep the slurry melt under a shear thinned condition and at a uniform temperature until the slurry melt is extruded, cooled and solidified.
摘要:
A method and apparatus for providing network security using security labeling is disclosed. The method includes comparing first security level information and second security level information, and indicating processing to be performed on the packet based on the comparing. The first security level information is stored in a security label of a packet received at a network node, while the second security level information is stored at the network node.