Abstract:
An example method involves generating, with a network management module, a data structure to store current reroute statistics based on rerouting of data from a logical circuit that has failed to a logical failover circuit in a network. The current reroute statistics include trap data corresponding to the logical circuit. The trap data includes a committed burst size. The logical circuit is identified by a first logical circuit identifier. The logical failover circuit is identified by a second logical circuit identifier. The first and second logical circuit identifiers are renamed until the logical circuit has been restored from failure. The table is updated with the network management module to store updated reroute statistics. The updated reroute statistics include updated trap data corresponding to the logical circuit. The updated reroute statistics are based on a change in status of the logical circuit resulting from the committed burst size having been exceeded.
Abstract:
An initial request is received to establish a communication session. The initial request contains a communication address of a first communication device. A communication server detects that the communication session cannot be established across a primary network. In response, the initial request is repurposed by changing the first communication address to a second communication address. The changed request is sent to a communication system, which adds a field to the changed request that indicates that the changed request is to be sent via a secondary network. The changed request is sent with the field to the communication server. The changed request with the second communication address is sent to a gateway to establish the communication session across a secondary network. A portion of the communication session is established using the second communication address. The first communication address is sent in the portion of the communication session using Dual-Tone-Multi-Frequency (DTMF).
Abstract:
The WSAN simultaneous failures recovery method ranks each node based on the number of hops to a pre-designated root node in the network. The method identifies some nodes as cluster heads based on the number of their children in the recovery tree. The method assigns a recovery weight and a nearby cluster node to each node. Nearby cluster nodes serve as gateways to other nodes that belong to that cluster. The recovery weight is used to decide which node is better to move in order to achieve lower recovery cost. The recovery method uses the same on-going set of actors to restore connectivity. Simulation results have demonstrated that the recovery method can achieve low recovery cost per failed node in small and large networks. The results have also shown that clustering leads to lower recovery cost if the sub-network needs to re-establish links with the rest of the network.
Abstract:
Each node device has a sensor data saving information list storage section for storing a sensor data saving information list indicates a proper node device for saving each of sensor data among node devices according to an attribute of the sensor data. A sensor data arrangement section transfers each of the sensor data saved in sensor data storage sections of the node devices to the proper node device for saving the sensor data based on the sensor data saving information list.
Abstract:
A fault-spot locating method, comprising at a switching apparatus that includes an interface for connection to a master, which is a controlling object, and a plurality of ports for connection to a slave, which is a controlled object, providing another interface used to output information indicating an operation of the switching apparatus and received data, and causing the switching apparatus to transmit the information via the another interface, using a processor. And causing an apparatus that is capable of obtaining the information transmitted via the another interface to locate a spot where a fault has possibly occurred by using the information to check the received data and the operation of the switching apparatus caused by a command from the master, using the processor.
Abstract:
A switch may be configured with multiple zones to provide access to an external storage to certain processing systems. For example, the switch may be configured with two zones, in which a first zone configuration provides access to the external storage for a first processing system and a second zone configuration provides access to the external storage for a second processing system. Thus, the switch may provide high availability of the external storage and allow seamless transition from one computer system to another computer system.
Abstract:
Systems and methods for distributing peer-to-peer communications are provided herein. Exemplary methods may include masking identification of two or more client nodes on a communications channel of a peer-to-peer communications network by directing peer-to-peer communications of the two or more client nodes through a proxy node, the proxy node including a disinterested client node relative to the two or more client nodes, the disinterested client node providing network resources to the peer-to-peer communications network.
Abstract:
An example involves identifying a failure of a dedicated logical circuit connecting a host device to a remote device to communicate data that originates and terminates only at the host and remote devices. When a first logical circuit identifier of the dedicated logical circuit does not match a second logical circuit identifier of a logical failover circuit comprising an alternate communication path for communicating the data: the second logical circuit identifier is renamed to identify the logical failover circuit using the first logical circuit identifier when the logical failover circuit is a dedicated logical failover circuit to communicate only when the dedicated logical circuit fails, and the dedicated logical circuit is renamed to identify the dedicated logical circuit using the second logical circuit identifier when the logical failover circuit is to communicate regardless of failure of the dedicated logical circuit.
Abstract:
A system and method for automatically cloning or migrating a computing appliance while maintaining its operational state. A configuration bundle that includes configuration data, software revision level and a list of system updates is used to recover or duplicate a device's operation state. The system and method can also be utilized to migrate a computing appliance between different operating system while maintaining or replicating the previous operational state.
Abstract:
Embodiments of the present invention disclose a method for switching an NC link, a processor system, and a node, where the processor system includes more than two nodes capable of communicating with each other, each node includes a node controller NC chip, a host bus adapter HBA apparatus, and at least one CPU, the NC chip is connected to each CPU in a node where the NC chip is located, and the HBA apparatus is connected to each CPU in a node where the HBA apparatus is located; an NC link borne by the NC chip is corresponding to an HBA link borne by the HBA apparatus. By using an HBA apparatus to deploy a redundant link, the cost of deploying the redundant link is reduced effectively under a premise of ensuring the reliability of the processor system.