摘要:
A computing system receives a compressed archive file that includes a one or more new executable software modules, and a installation file specifying instructions for installing such modules on the computing system. The modules and the installation file are extracted from the compressed archive file, and the modules installed in accordance with the instructions. Instances of executing software modules that correspond to the installed modules are notified about their impending termination. The instances are then terminated before launching corresponding instances of the installed modules.
摘要:
A computing system receives a compressed archive file that includes a one or more new executable software modules, and a installation file specifying instructions for installing such modules on the computing system. The modules and the installation file are extracted from the compressed archive file, and the modules installed in accordance with the instructions. Instances of executing software modules that correspond to the installed modules are notified about their impending termination. The instances are then terminated before launching corresponding instances of the installed modules.
摘要:
A computing environment includes a number of nodes, one of which is a primary node that controls the operation of the computing environment and another of which is a backup node that is capable of controlling operation of the computing environment. The primary node includes a hardware management module (HMM) that controls hardware components in the computing environment. The HMM also detects and reports events relating to the hardware components. The primary node further includes a software management module (SMM) that controls instances of software components of the computing environment, and detects and reports events related to the same. A node management module (NMM) in the primary node elects the node as the primary from among the number of nodes. The NMM receives the reports of events from the HMM and SMM, and selectively transfers operational control of the computing environment to a backup node in response to the reports. A configuration management module (CMM) transfers a configuration of the computing environment to the backup node. A replication library is used in transferring a state of each of the instances of software components to the backup node.
摘要:
A layer-2 network switch device forwarding database implementation and method to access the forwarding database. A forwarding database (FDB) is implemented as a tree. A separate VLAN database is also structured as a tree. Each node in the tree represents a separate VLAN. For each VLAN, all associated ports are maintained in a data structure organized as a tree. Likewise, all port information is maintained in a tree-based data structure, and for each port, all VLAN information associated with the port is maintained in a tree data structure. Each node in a VLAN's port tree data structure is linked with each corresponding node in the port's VLAN tree data structure. Each pair of nodes maintains a linked list of all FDB entries relating to the node pair. Operations are quickly and efficiently performed on the FDB using the data structure architecture.
摘要:
A layer-2 network switch device forwarding database implementation and method to access the forwarding database. A forwarding database (FDB) is implemented as a tree. A separate VLAN database is also structured as a tree. Each node in the tree represents a separate VLAN. For each VLAN, all associated ports are maintained in a data structure organized as a tree. Likewise, all port information is maintained in a tree-based data structure, and for each port, all VLAN information associated with the port is maintained in a tree data structure. Each node in a VLAN's port tree data structure is linked with each corresponding node in the port's VLAN tree data structure. Each pair of nodes maintains a linked list of all FDB entries relating to the node pair. Operations are quickly and efficiently performed on the FDB using the data structure architecture.
摘要:
A method is provided to convert network management protocol request into a markup language representation. In one embodiment, the present invention includes receiving a network management protocol request at a network device, generating a plurality of markup language tags and content embedded in the markup language tags based on the received request, and responding to the request using the plurality of markup language tags and content embedded in the markup language tags using a unified backend interface. In one embodiment, routines used to generate the plurality of markup language tags and content are generated automatically using an instrumentation module.
摘要:
A method and system is provided to control and check run-time process dependencies. When a process manager receives a request to start a new process, the process manager accesses a configuration file to check if the new process depends on any other processes to be running and what versions of these prerequisite processes are required. If an exact version is specified in the configuration file, the prerequisite process version must match the exact version specified to be compatible with the new process. If a range of acceptable versions is specified in the configuration file, the prerequisite process version must fall within the range of acceptable versions to be compatible with the new process. If a minimum acceptable version is specified in the configuration file, then the prerequisite process version must be greater than or equal to the minimum acceptable version specified. If a maximum acceptable version is specified in the configuration file, then the prerequisite process version must be less than or equal to the maximum acceptable version specified. If the prerequisite processes are not running or the versions of the running prerequisite processes are not compatible with the new process, then the new process is not started. If the new process does not depend on any processes or all the prerequisite are running with compatible versions, then the new process may be started.
摘要:
A method is provided to dynamically manage the configuration of a network device. An application supporting a protocol, network interface or other component of the configuration operates in conjunction with a master agent and subagent to send and receive configuration management information. The application further operates in conjunction with a configuration manager interface and configuration manager to access and update the configuration in accordance with a priority of the application, and without taking the network device out of service.
摘要:
A method and apparatus is provided for fast route table updates. A route table entry is identified, and a subsequent route table entry is located using the identified route table entry. All subsequent route table entries are identified using the previous route table entry until all route table entries associated with a predetermined characteristic are identified. The identified entries may be purged or transferred from one route table to another. The predetermined characteristic may be that the route table entries where discovered by a common routing protocol. Route table entries associated with a common routing protocol that is inoperative for a predetermined period are purged.
摘要:
A method and system is provided in which MAN traffic is segregated at a customer and a provider domain level. A switch at the edge of the MAN encapsulates a data packet in a new header, which is used to specify the customer domain tags. The data packet is encapsulated further in another new header, which is used to specify new VMAN tags. The nested encapsulation is repeated as necessary until the data packet is forwarded to a remote switch at the edge of the MAN in accordance with the VMAN configuration or the source and destination address in the original data packet. The remote switch strips the VMAN tags from the data packet, and forwards the stripped data packet to the receiving customer domain as specified in the customer domain tag.