Abstract:
A granular castable refractory composition is provided which has excellent insulating properties as well as high strength and resistance to oxidation, corrosion or erosion. The refractory insulating composition can be easily transported using a pump, and avoids the potential hazards associated with asbestos and ceramic fibers. The refractory insulating composition is prepared by mixing a low density expanded granular refractory insulating material having a density of 7-50 lb/ft.sup.3 with a conventional high density refractory material having a density of at least 150 lb/ft.sup.3 to form a dry component, and by mixing the dry component with aqueous colloidal silica to provide excellent flow properties for pumping and, ultimately, excellent binding properties.
Abstract translation:提供了具有优异的绝缘性能以及高强度和耐氧化,腐蚀或腐蚀的优异的颗粒状可浇铸耐火材料组合物。 耐火绝缘组合物可以使用泵轻易运输,避免与石棉和陶瓷纤维相关的潜在危害。 难熔绝缘组合物通过将密度为7-50lb / ft 3的低密度发泡粒状耐火绝缘材料与密度为至少150lb / ft 3的常规高密度耐火材料混合以形成干组分来制备,以及 通过将干组分与水性胶体二氧化硅混合以提供优异的泵送流动性质,最终具有优异的粘合性能。
Abstract:
Techniques are provided for sending from a client in a first network device a first session-initiate message to a second network device that is configured to provide network layer, data link layer, or associated convergence layer based service connection information in order for the second network device to accept or reject a network layer, data link layer, or associated convergence layer based service connection with the first network device. The first session-initiate message is based on a messaging and presence protocol. A session-accept message is received at the client in the first network device that is configured to accept the service connection and provide a network layer, data link layer, or associated convergence layer based service connection information in order for the first network device to establish the service connection with the second network device. The session-accept message is based on the messaging and presence protocol. In response to receiving the session-accept message, the service connection is established.
Abstract:
In one embodiment, a method comprises receiving a request for a distributed service, the distributed service offered by a service provider via a data communications network having service delivery locations reachable via a prescribed physical topology; identifying the service delivery locations within a prescribed logical topology overlying the prescribed physical topology, the prescribed logical topology segregating the distributed service from other network traffic on the prescribed physical topology; and identifying one or more of the service delivery locations optimized for providing the distributed service to at least one service consumption location in the prescribed logical topology according to a prescribed service level agreement with the service provider.
Abstract:
In one embodiment, a method comprises retrieving a request graph specifying request nodes identifying respective requested cloud computing service operations, and at least one request edge specifying a requested path requirements connecting the request nodes; identifying a placement pivot among feasible cloud elements identified in a physical graph representing a data network having a physical topology, each feasible cloud element an available solution for one of the request nodes, the placement pivot having a maximum depth in the physical topology relative to the feasible cloud elements; ordering the feasible cloud elements, according to increasing distance from the placement pivot to form an ordered list of candidate sets of feasible cloud elements; and determining an optimum candidate set, from at least a portion of the ordered list, based on the optimum candidate set having an optimized fitness function in the physical graph among the other candidate sets in the ordered list.
Abstract:
Techniques are disclosed for zoning information to be shared with an NPIV proxy device or an NPV device such as a blade switch in a blade chassis. Doing so allows the NPV device to enforce zoning locally for the attached server blades and virtualized systems. The NPV device may learn zoning rules using Fiber Channel name server queries and registered state change notifications. Additionally, the NPV device may snoop name server queries to retrieve zoning information (or state change messages) without using the zoning change protocols and without consuming a Fiber Channel domain from the Fiber Channel fabric.
Abstract:
In an example embodiment, a new qualifier is added to members in a Fiber Channel zone to specify whether each member is a target or initiator and in another embodiment a time-range attribute is added to a zone in the zoneset. When the zoneset is applied the number of ACL entries that must be programmed is reduced from k×(k−1) entries to 2(k−1) entries for a zone with k members where k−1 members are of one type (e.g. initiators) and one of the members is of a different type (e.g., a tape device). The time-range attribute is enforced by zone server software and enhances security by, for example, limiting access to sensitive data to specified times. In another embodiment, an incremental zoneset activation protocol is implemented where a hash of a zoneset is created by a switch updating the zoneset and the hash and ID of the switch updating the zoneset are sent to all other switches in the fabric when the zoneset is propagated. The hash and switch ID are stored in persistent storage at all switches in the fabric. When a target zoneset is updated by a source switch only the incremental change is propagated to other switches in the fabric along with the hash and switch ID of the target zoneset. Each switch checks a received hash and switch ID against its stored hash and switch ID to assure that the stored local zoneset is the same as the target zoneset before applying the incremental change.
Abstract:
Data representing capabilities of devices in a data is aggregated on a cluster-basis. Information representing capability attributes of devices in the data center is received. The information representing the capability attributes is analyzed to generate data that groups devices based on similarity of at least one capability attribute. Aggregation data is stored that represents the grouping of the devices based on similarity of the at least one capability attribute and identifies the devices in corresponding groups.
Abstract:
Techniques are provided herein for a device in a network to receive information configured to indicate a control plane traffic load level for one or more server devices that are configured to manage traffic for messaging and presence clients communicating via a messaging and presence protocol. The control plane traffic is associated with the messaging and presence protocol. A determination is made as to when the control plane traffic load level has become unbalanced among the two or more server devices and in response to determining that the control plane traffic load level has become unbalanced, sending a transfer message to one or more clients comprising information configured to initiate migration of one or more clients from a server device that is relatively overloaded to a server device that is relatively underloaded in order to balance the control plane traffic load level among the two or more server devices.
Abstract:
A cloud computing system is provided comprising a plurality of data centers, each data center comprising a plurality of pods each of which comprises network, compute, storage and service node devices. At a designated device of a data center, data center level capabilities summary data is generated that summarizes the capabilities of the data center. Messages advertising the data center level capabilities summary data is sent from a designated device of each data center to a designated device at a provider edge network level of the computing system. At the designated device at the provider edge network level, provider edge network level capabilities summary data is generated that summarizes capabilities of compute, storage and network devices for each data center as a whole and without exposing individual compute, storage and service node devices in each data center.
Abstract:
A switch includes a processor, an ingress port having ingress port logic, and an egress port. It may also include a virtual network identifier rewrite component for rewriting a virtual network identifier in a data frame received the ingress port with a new virtual network identifier. Also included is a virtual network identifier rewrite rule set, where a rule may have one or more of the following: a received virtual network identifier, a source Fibre Channel identifier (FCID) address, an ingress port identifier, and a new virtual network identifier. The ingress port logic may insert a received virtual network identifier into the data frame received at the ingress port, where the virtual network identifier may correspond to the ingress port. The virtual network identifier rewrite component may assign the new virtual network identifier to the data frame according to a specific virtual network identifier rewrite rule.