摘要:
A power supply system has redundant regulated power supplies, whose output ports are diode-ORed to an output node. One of the power supplies outputs a regulated output voltage that is sufficient to meet current demand of a load coupled to the output node. Each power supply has an associated monitoring circuit that monitors the voltage drop across its OR-ing diode. The monitoring circuit for a non-dominant power supply controls its operation so that the non-dominant supply provides a reduced current through its diode to the output node that is less than the current demand of the load, but sufficient to forward bias the diode, and thereby enable the non-dominant supply to immediately respond to a load change, such as an interruption in the operation of the dominant power supply.
摘要:
A byte boundary information recovery mechanism locates the first bits of respective bytes of an asynchronous transfer mode (ATM)-based serial data stream, used by a frame synchronization mechanism to delineate respective cells of the ATM stream, and thereby enables transceiver equipment to successfully receive and parse ATM traffic. The invention employs a counter offset-based scheme that generates an output signal in potential alignment with the (first bit) boundary of a byte of the data stream, in response to the contents of a counter reaching a prescribed count value. It then iteratively shifts, as necessary, the bit time at which the output signal is produced relative to the counting operation of the counter, until the output signal is aligned with the boundary of a byte of the data stream.
摘要:
A called telephone number substitution mechanism is incorporated into the call-routing software employed by the microcontroller of a customer premises-installed communication device, through which digitized voice and data services are supplied to a customer site. The number substitution mechanism automatically selectively modifies digits of an original (dialed) telephone number, as necessary, to conform with the connectivity requirements of the communication link serving the destination device, thereby enabling the call to reach the destination device.
摘要:
An autobaud mechanism is executed by transceivers coupled to opposite ends of a communication loop, such as an extended range SDSL loop, to resolve the maximum data rate that can be supported by the loop, using signal power and quality measurements to first estimate the length of the SDSL loop and thereafter iteratively adjust baud rate and/or number of bits/per baud, as necessary, to realize an SDSL baud rate that will ensure error-free transmission over the loop.
摘要:
A loop loss measurement and reporting mechanism for a digital data services unit obviates interaction with a test unit at a far end of the loop, by relying upon a priori knowledge of the signal power and spectral content of a data port at the far end of the loop to conduct threshold detection and power level measurements. A received signal is amplified by amplifier circuitry, the gain of which is controllably adjusted by the microcontroller based upon the outputs of threshold detectors and power level measurement circuitry that monitor the amplified received signal. A front panel display is controlled by the microcontroller to display loop loss parameter information. To measure and report loop loss, the digital data services unit turns off its transmitter for a prescribed period of time and monitors an in-band signal of known power and spectral content sourced from the far end of the loop. In response to this measurement it iteratively adjusts, as necessary, the amplifier gains, and illuminates the LED display device in accordance with the power measurement.
摘要:
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for detecting and managing noisy alarms in a communications network. In some aspects an event is detected on a communications network. Two or more fields of event data of the event are extracted. An event signature that uniquely represents characteristics of the event is created using the two or more fields of event data as input. A magnitude of instances of the given event signature that are encountered over a tracking period are tracked. The event is classified as a flapping event based on a determination that the given event signature has been encountered at least a threshold number of times within a specified amount of time. One or more event processing operations are excluded from being performed for one or more events having event signatures matching the given event signature based on the classification of the event as a flapping event.
摘要:
Methods, systems, and apparatus, including computer programs encoded on computer-storage media, for associating unclaimed communications nodes. In some implementations, a method includes receiving broadcast information transmitted by a transmitting device including (i) identifying information of a transmitting device and (ii) an address not associated with any device in a transmitting vicinity of the transmitting device; transmitting a password request to the transmitting device in response to receiving the broadcast information; obtaining password information that includes hashed data generated by a hash algorithm; generating a hash result by applying the hash algorithm to an identifier of the transmitting device; comparing the hashed data received from the transmitting device to the hash result generated by the controller; and updating a set of registered network devices based on comparing the hashed data with the hash result.
摘要:
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for visualizing network data. In some implementations, a server receives a query for network traffic playback data of network devices. The server extracts data from the query. The server obtains historical network traffic data. The server generates the network playback data by: (i) obtaining a plurality of historical network traffic elements from the historical network traffic data associated with a network device, (ii) obtaining state transitional data for each historical network traffic element of the plurality of historical network traffic elements, (iii) determining whether the state transitional data for each historical network traffic element comprises the prior state, and (iv) in response to determining the state transitional data comprises the prior state, the server appends the state transitional data to the network playback data. The server filters and provides the network playback data.
摘要:
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for job management in a distributed network include a prioritizer that determines a priority level for a job and inserts the job into a priority queue based on the priority level, a scheduler that, for each element in the distributed network, requests the priorities of one or more jobs scheduled for execution, evaluates, based on the priorities of the one or more jobs scheduled for execution, the priority of a particular job with respect to the element, determines, based on the priorities, that the network element is free to perform job processes, and upon determining that a network element is free, scheduling a particular job for execution, and an executor that determines that all local and remote resources required for the scheduled job are available and executes the job according to processes defined within the distributed network.
摘要:
An electronic module cage for receiving an electronic module (such as a pluggable optical module (POM)), includes a cage body mounted to a printed circuit board (PCB), the cage body having a first opening configured to receive an electronic module, the cage body comprising a spring feature, the spring feature configured to apply a biasing pressure to the electronic module in a direction away from the printed circuit board and toward a heat dissipating element such that a surface of the electronic module contacts the heat dissipating element through a second opening in the cage body.