摘要:
This invention relates to methods for identifying potentially infected files downloaded to a digital display device (“DDD”) and for managing those potentially infected files. These methods may include the steps of: connecting the DDD to a device; downloading one or more files to the DDD; disconnecting the DDD from the device; verifying and repairing the boot sector of the DDD; removing the one or more downloaded files that are not supported for playback on the DDD; and scanning the one or more downloaded files that are supported for playback on the DDD.
摘要:
A method and system is provided in which MAN traffic is segregated at a customer and a provider domain level. A switch at the edge of the MAN encapsulates a data packet in a new header, which is used to specify the customer domain tags. The data packet is encapsulated further in another new header, which is used to specify new VMAN tags. The nested encapsulation is repeated as necessary until the data packet is forwarded to a remote switch at the edge of the MAN in accordance with the VMAN configuration or the source and destination address in the original data packet. The remote switch strips the VMAN tags from the data packet, and forwards the stripped data packet to the receiving customer domain as specified in the customer domain tag.
摘要:
A method and apparatus is provided for automatic protection switching in a ring network by creating a protection domain having a control vlan and protected data vlans and designating a master node and transit nodes connected by a primary port and a secondary port. The master node blocks the secondary port for data vlan traffic until it detects a fault either by notice from a transit node or by polling. When a fault is detected, the master node unblocks the secondary port for data vlan traffic. When the fault is restored, the transit node temporarily blocks the restored port to data vlan traffic thereby preventing a loop. Each time the secondary port is blocked and unblocked, the forwarding databases on all the nodes are flushed.
摘要:
A computing system receives a compressed archive file that includes a one or more new executable software modules, and a installation file specifying instructions for installing such modules on the computing system. The modules and the installation file are extracted from the compressed archive file, and the modules installed in accordance with the instructions. Instances of executing software modules that correspond to the installed modules are notified about their impending termination. The instances are then terminated before launching corresponding instances of the installed modules.
摘要:
A layer-2 network switch device forwarding database implementation and method to access the forwarding database. A forwarding database (FDB) is implemented as a tree. A separate VLAN database is also structured as a tree. Each node in the tree represents a separate VLAN. For each VLAN, all associated ports are maintained in a data structure organized as a tree. Likewise, all port information is maintained in a tree-based data structure, and for each port, all VLAN information associated with the port is maintained in a tree data structure. Each node in a VLAN's port tree data structure is linked with each corresponding node in the port's VLAN tree data structure. Each pair of nodes maintains a linked list of all FDB entries relating to the node pair. Operations are quickly and efficiently performed on the FDB using the data structure architecture.
摘要:
A method for electing a master router in a virtual router network by obtaining a tracking parameter for each of the routers participating in a virtual router network. A priority value is assigned to each of the plurality of routers based on the tracking parameter and reported to each router at periodic intervals. The router with the highest priority value is elected, or re-elected, as the new master. The tracking parameters include a ping tracking parameter obtained by pinging the active routes listed in the routing table for each of the of routers participating in the virtual router network, an environmental tracking parameter obtained by inspecting the operating characteristics outside of the control of the router, including operating temperature and power supply status, and a diagnostic tracking parameter obtained by inspecting the diagnostic data representing operating characteristics within the control of the router, including an operability status of the router's circuitry and channels and a status of the packet-level connectivity to the physical layer backplane network.
摘要:
The present invention relates to methods for defining content at the point of purchase of a digital display device (“DDD”), such as a digital picture frame, and for managing content for the DDD. These methods may include the following steps of: defining content for a DDD by a first DDD content provider at a point of purchase; associating a frame content ID with the defined content; and programming the DDD of the DDD with the frame content ID prior to shipping of the DDD.
摘要:
A method is provided to convert network management protocol request into a markup language representation. In one embodiment, the present invention includes receiving a network management protocol request at a network device, generating a plurality of markup language tags and content embedded in the markup language tags based on the received request, and responding to the request using the plurality of markup language tags and content embedded in the markup language tags using a unified backend interface. In one embodiment, routines used to generate the plurality of markup language tags and content are generated automatically using an instrumentation module.
摘要:
A layer-2 network switch device forwarding database implementation and method to access the forwarding database. A forwarding database (FDB) is implemented as a tree. A separate VLAN database is also structured as a tree. Each node in the tree represents a separate VLAN. For each VLAN, all associated ports are maintained in a data structure organized as a tree. Likewise, all port information is maintained in a tree-based data structure, and for each port, all VLAN information associated with the port is maintained in a tree data structure. Each node in a VLAN's port tree data structure is linked with each corresponding node in the port's VLAN tree data structure. Each pair of nodes maintains a linked list of all FDB entries relating to the node pair. Operations are quickly and efficiently performed on the FDB using the data structure architecture.
摘要:
A method and system is provided to control and check run-time process dependencies. When a process manager receives a request to start a new process, the process manager accesses a configuration file to check if the new process depends on any other processes to be running and what versions of these prerequisite processes are required. If an exact version is specified in the configuration file, the prerequisite process version must match the exact version specified to be compatible with the new process. If a range of acceptable versions is specified in the configuration file, the prerequisite process version must fall within the range of acceptable versions to be compatible with the new process. If a minimum acceptable version is specified in the configuration file, then the prerequisite process version must be greater than or equal to the minimum acceptable version specified. If a maximum acceptable version is specified in the configuration file, then the prerequisite process version must be less than or equal to the maximum acceptable version specified. If the prerequisite processes are not running or the versions of the running prerequisite processes are not compatible with the new process, then the new process is not started. If the new process does not depend on any processes or all the prerequisite are running with compatible versions, then the new process may be started.