摘要:
A computing system receives a compressed archive file that includes a one or more new executable software modules, and a installation file specifying instructions for installing such modules on the computing system. The modules and the installation file are extracted from the compressed archive file, and the modules installed in accordance with the instructions. Instances of executing software modules that correspond to the installed modules are notified about their impending termination. The instances are then terminated before launching corresponding instances of the installed modules.
摘要:
A computing system receives a compressed archive file that includes a one or more new executable software modules, and a installation file specifying instructions for installing such modules on the computing system. The modules and the installation file are extracted from the compressed archive file, and the modules installed in accordance with the instructions. Instances of executing software modules that correspond to the installed modules are notified about their impending termination. The instances are then terminated before launching corresponding instances of the installed modules.
摘要:
A computing environment includes a number of nodes, one of which is a primary node that controls the operation of the computing environment and another of which is a backup node that is capable of controlling operation of the computing environment. The primary node includes a hardware management module (HMM) that controls hardware components in the computing environment. The HMM also detects and reports events relating to the hardware components. The primary node further includes a software management module (SMM) that controls instances of software components of the computing environment, and detects and reports events related to the same. A node management module (NMM) in the primary node elects the node as the primary from among the number of nodes. The NMM receives the reports of events from the HMM and SMM, and selectively transfers operational control of the computing environment to a backup node in response to the reports. A configuration management module (CMM) transfers a configuration of the computing environment to the backup node. A replication library is used in transferring a state of each of the instances of software components to the backup node.
摘要:
A layer-2 network switch device forwarding database implementation and method to access the forwarding database. A forwarding database (FDB) is implemented as a tree. A separate VLAN database is also structured as a tree. Each node in the tree represents a separate VLAN. For each VLAN, all associated ports are maintained in a data structure organized as a tree. Likewise, all port information is maintained in a tree-based data structure, and for each port, all VLAN information associated with the port is maintained in a tree data structure. Each node in a VLAN's port tree data structure is linked with each corresponding node in the port's VLAN tree data structure. Each pair of nodes maintains a linked list of all FDB entries relating to the node pair. Operations are quickly and efficiently performed on the FDB using the data structure architecture.
摘要:
A layer-2 network switch device forwarding database implementation and method to access the forwarding database. A forwarding database (FDB) is implemented as a tree. A separate VLAN database is also structured as a tree. Each node in the tree represents a separate VLAN. For each VLAN, all associated ports are maintained in a data structure organized as a tree. Likewise, all port information is maintained in a tree-based data structure, and for each port, all VLAN information associated with the port is maintained in a tree data structure. Each node in a VLAN's port tree data structure is linked with each corresponding node in the port's VLAN tree data structure. Each pair of nodes maintains a linked list of all FDB entries relating to the node pair. Operations are quickly and efficiently performed on the FDB using the data structure architecture.
摘要:
A method is provided to convert network management protocol request into a markup language representation. In one embodiment, the present invention includes receiving a network management protocol request at a network device, generating a plurality of markup language tags and content embedded in the markup language tags based on the received request, and responding to the request using the plurality of markup language tags and content embedded in the markup language tags using a unified backend interface. In one embodiment, routines used to generate the plurality of markup language tags and content are generated automatically using an instrumentation module.