摘要:
Techniques for determining a problem location or otherwise characterizing a network comprising a plurality of processing elements, including at least one processing element associated with performance of a packet encapsulation operation of an encapsulation protocol. The packet encapsulation operation is performed on a test packet to generate an encapsulated packet, the test packet having a time to live (TTL) value and an identifier. In conjunction with performance of the packet encapsulation operation, the TTL value and the identifier of the test packet are copied to a header of the encapsulated packet. The encapsulated packet is transmitted, and a determination is made as to whether a reply packet has been received responsive to transmission of the encapsulated packet. The reply packet, if any, is processed to obtain information utilizable in determining the problem location or otherwise characterizing the network. By way of example, these operations may be repeated, for subsequent test packets with increasing TTL values, until an amount of router hop information sufficient to determine the problem location is obtained.
摘要:
Techniques for determining a problem location or otherwise characterizing a network comprising a plurality of processing elements, including at least one processing element associated with performance of a packet encapsulation operation of an encapsulation protocol. The packet encapsulation operation is performed on a test packet to generate an encapsulated packet, the test packet having a time to live (TTL) value and an identifier. In conjunction with performance of the packet encapsulation operation, the TTL value and the identifier of the test packet are copied to a header of the encapsulated packet. The encapsulated packet is transmitted, and a determination is made as to whether a reply packet has been received responsive to transmission of the encapsulated packet. The reply packet, if any, is processed to obtain information utilizable in determining the problem location or otherwise characterizing the network. By way of example, these operations may be repeated, for subsequent test packets with increasing TTL values, until an amount of router hop information sufficient to determine the problem location is obtained.
摘要:
In one embodiment, a communication device 204 includes a voice communication module 152 to effect packet-switched voice communications over an untrusted network 140; a secure communication module 228 to create a secured pathway 258 with a selected remote secure communication module 124; and a VPN topology client 232 to contact a VPN topology server 240 to receive VPN topology information 236 that enables the secure communication module to create the secured pathway with the selected remote secure communication module. The VPN topology information includes IP addresses associated with remote secure communication modules, with each of the IP addresses having a corresponding range of node addresses serviced by the respective secure communication module.
摘要:
A surgical blower for providing a directed stream to clear a surgical site, that can be used in multiple different use modes. In one use mode, the surgical blower is handheld by a user during operation. In another mode, a distal end portion of the blower is fixed to a foot of a stabilizer instrument and the handle of the blower is handheld. In another mode, a distal end portion of the blower is fixed to a foot of a stabilizer instrument and the handle of the blower is fixed to a stationary object such as a sternal retractor. In another mode, the distal end of the blower is free and the handle of the blower is fixed to a stationary object. An apparatus including a blower and a stabilizer is provided. Methods of using the blower as well as the apparatus are also provided.
摘要:
During operation, a client node can receive a network's topology. Next, the client node can detect a change in an interface's state. The client node can then create an interface state change message which indicates the change in the interface's state. Next, the client node can send the interface state change message to the master node, which can cause the master node to notify other client nodes about the change in the interface's state. If a client node's copy of the link state database (LSD) is out of sync with the master node's LSD, the client node can request the master node to send a full LSD update message to the client node. The master node can multicast messages to the client nodes, and each node in the network can include one or more interfaces that are dedicated for sending and receiving control messages, thereby creating a separate control network.
摘要:
A request to store a data object is received at a hosted storage service. The request includes the data object and an associated object reference. The object reference configured to enable retrieval of the data object from the hosted storage service. The data object is stored at the hosted storage service in association with the object reference. The data object is sent from the hosted storage service to a content delivery network node such that the data object is cached in and retrievable from the content delivery network node using the object reference.
摘要:
Methods and systems to implement voltage level shifting with interim-voltage-controlled contention-interruption. A voltage level shifter (VLS) may include voltage level shift circuitry to level shift an input logical state from an input voltage swing to an output voltage swing. The VLS may include contention circuitry, a contention interrupter, and an interrupt controller to generate a contention-interrupt control having an interim voltage swing. A lower limit of the interim voltage swing may correspond to a lower limit of the output voltage swing. An upper limit of the interim voltage swing may correspond to an upper limit of the input voltage swing. The VLS may be implemented to level shift true and complimentary logical states, such as with cascode voltage switch logic (CVSL). The interim-voltage-controlled contention interrupter may help to maintain voltages within process-based voltage reliability limits of the contention interrupter, with relatively little delay, and relatively little power and area consumption.
摘要:
Methods, devices, and systems are provided for filtering packets and other communication messages or portions thereof. Particularly, mechanisms are provided for efficiently determining and applying a set of trust-based filtering rules. Trust scores may be assigned to various connections and packets received on a particular connection may have filtering rules applied thereto in accordance with the trust score of the connection.
摘要:
The pricing of a product is programmatically managed by defining a plurality of pricing states for the product. Each pricing state has a pricing mechanism associated therewith. A pricing mechanism can be a variable pricing mechanism such as an auction. It can also be a fixed pricing mechanism for the sale, rental, or subscription of the product. One or more triggers are defined, each of which may include one or more trigger parameters, to enable the pricing of the product to transition from one pricing state to another pricing state. In this manner, an automated, systematic approach to pricing management is provided.
摘要:
A surgical blower for providing a directed stream to clear a surgical site, that can be used in multiple different use modes. In one use mode, the surgical blower is handheld by a user during operation. In another mode, a distal end portion of the blower is fixed to a foot of a stabilizer instrument and the handle of the blower is handheld. In another mode, a distal end portion of the blower is fixed to a foot of a stabilizer instrument and the handle of the blower is fixed to a stationary object such as a sternal retractor. In another mode, the distal end of the blower is free and the handle of the blower is fixed to a stationary object. An apparatus including a blower and a stabilizer is provided. Methods of using the blower as well as the apparatus are also provided.