摘要:
In one embodiment, detecting a wireless network access request, forwarding data associated with the detected wireless network access request to a first multipoint Generic Routing Encapsulation (mGRE) tunnel, receiving authentication information associated with the detected wireless network access request, receiving authentication status information for the detected wireless network access request, and forwarding data associated with the detected wireless network access request to a second multipoint Generic Routing Encapsulation (mGRE) tunnel connected to a predetermined internet protocol (IP) subnet when the received authentication status information includes a successful authentication, are provided.
摘要:
In one embodiment, detecting a wireless network access request, forwarding data associated with the detected wireless network access request to a first multipoint Generic Routing Encapsulation (mGRE) tunnel, receiving authentication information associated with the detected wireless network access request, receiving authentication status information for the detected wireless network access request, and forwarding data associated with the detected wireless network access request to a second multipoint Generic Routing Encapsulation (mGRE) tunnel connected to a predetermined internet protocol (IP) subnet when the received authentication status information includes a successful authentication, are provided.
摘要:
Method and system for providing continuous data forwarding during a failure mode in a wireless data network including detecting a control plane failure mode of a network switch, maintaining data path between one or more network entities with the network switch, detecting the network switch recovery from the control plane failure mode, and re-authenticating the one or more network entities over the data network is disclosed without disrupting data traffic forwarding.
摘要:
Method and system for providing continuous data forwarding during a failure mode in a wireless data network including detecting a control plane failure mode of a network switch, maintaining data path between one or more network entities with the network switch, detecting the network switch recovery from the control plane failure mode, and re-authenticating the one or more network entities over the data network is disclosed without disrupting data traffic forwarding.
摘要:
Embodiments of the present invention provide for switchover from an active processor to a standby processor in a route processor system. An up-to-date copy of information used by a supervisor process at the active processor is ensured by determining necessary event states. One type of event state includes message requests, processing and replies. Three basic types of communication between three different entities (blade, wireless domain services (WDS) and supervisor) are governed by three types of communication protocols: WLCCP between a blade and WDS, LCP between a supervisor and a blade, and checkpoint-type messages between two supervisors.
摘要:
Embodiments of the present invention provide for switchover from an active processor to a standby processor in a route processor system. An up-to-date copy of information used by a supervisor process at the active processor is ensured by determining necessary event states. One type of event state includes message requests, processing and replies. Three basic types of communication between three different entities (blade, wireless domain services (WDS) and supervisor) are governed by three types of communication protocols: WLCCP between a blade and WDS, LCP between a supervisor and a blade, and checkpoint-type messages between two supervisors.
摘要:
Techniques are provided for managing and distributing communications in a network. At a first switch device arranged in a first configuration in a network, a set of one or more network attributes are determined, which are associated with network communications that the first switch device is interested in receiving from other network devices. The first switch device sends to a controller device an attribute interest message that informs the controller device of the set of network attributes. The first switch device receives a mapping of the network attributes in to one or more identifiers. The identifiers are included in a header of subsequent frames sent in the network. An identifier interest message is then sent to a second switch device arranged in a second network configuration in the network to inform the second switch device of identifiers of the network attributes of which the first device has an interest.
摘要:
A trading system and method for digital commodity are provided. The method comprises encrypting at least one digital commodity to be an encrypted digital commodity in a content distribution center, followed by delivering the encrypted digital commodity to at least one content distribution point through an actual transportation of storage. When a consumer has been selected a desirable-purchased digital commodity, a content distribution card may be carried to one of the content distribution points, and served to store the encrypted desirable-purchased digital commodity via a physical transmission line directly. At this moment, a network transmission line is used to connect with the content distribution center, which may generate a card number-decrypted data based on a card identification code, this card number-decrypted data being further downloaded to the content distribution card. If the consumer is desirous to use the desirable-purchased digital commodity, the content distribution card may be put into a content reader, which allows for restoring the card number-decrypted data and encrypted digital commodity based on the card identification code in order to generate a digital commodity to be read out for use.
摘要:
In one embodiment, a protocol state associated with a port of a network device is determined to have expired. A port group of which the port is a member is determined, the port group including ports that share one or more common characteristics. A policy is applied to the ports of the port group to determine whether one or more other ports in the port group also have a corresponding protocol state protocol that has expired. In response to one or more other ports in the port group also having a corresponding protocol state that has expired, expiration of the protocol state is determined to be a false positive and no further action is taken based on expiration of the protocol state. When expiration of the protocol state is not determined to be a false positive, further action is taken based on expiration of the protocol state.
摘要:
In one embodiment, a multiple spanning tree (MST) region is defined in a network, where the MST region includes a plurality of network nodes interconnected by links. A MST cluster is defined within the MST region, where the MST cluster includes a plurality of network nodes selected from the plurality of network nodes of the MST region. A network node of the MST cluster generates one or more MST bridge protocol data units (BPDUs) that present the MST cluster as a single logical entity to network nodes of the MST region that are not included in the MST cluster, yet enables per-multiple spanning tree instance (per-MSTI) load balancing of traffic across inter-cluster links that connect network nodes included in the MST cluster and network nodes of the MST region that are not included in the MST cluster.