摘要:
A system and method for rapidly responding to triggering events or activities in a network system. The system includes a policy enforcement function, a policy manager function, and one or more network devices of the network system. The policy enforcement function includes one or more installed policy sets and/or policy enforcement rule sets suitably responsive to triggering events or activities. Upon detection of a trigger, the policy manager function analyzes the trigger and selects one or more appropriate policy sets and/or policy enforcement rule sets deemed to be responsive to the trigger. Each set has a unique rapid response identifier. The policy manager function signals for implementation of the one or more policy and/or rule sets, based on one or more rapid response identifiers, which are enforced through the policy enforcement function. The policy enforcement function may be a part of one or more of the one or more network infrastructure devices for implementing the policy change. The system and method enable rapid response to a detected trigger (which might be a manual input) by pre-installing responsive policy and/or rule sets first and then generating and transmitting the unique rapid response identifier(s) corresponding to one or more selected policy and/or rule sets for implementation. That is, the network device is already configured with a response through the pre-installed policy and/or rule sets. Responses may be implemented and/or removed gradually, and different network devices may be instructed to implement different policies in response to the same trigger and the same policy may be implemented with different policy enforcement rules on different devices, ports, or interfaces.
摘要:
A computer-implemented method and computer program product for providing data that includes location-based access control information concerning a data relay device located within a network infrastructure. The data relay device is loaded with one or more features, such that the one or more features loaded are dependent, at least in part, upon the location-based access control information.
摘要:
A system and method to respond to intrusions detected on a network system including attached functions and a network infrastructure. The system includes means for receiving from an intrusion detection function information about intrusions, a directory service function for gathering and reporting at least the physical and logical addresses of devices of the network infrastructure associated with the detected intrusions, and a plurality of distributed enforcement devices of the network infrastructure for enforcing policies responsive to the detected intrusions. A policy decision function evaluates the reported detected intrusions and makes a determination whether one or more policy changes are required on the enforcement devices in response to a detected intrusion. A policy manager function configures the distributed enforcement devices with the responsive changed policy or policies. Policy changes rules can vary from no change to complete port blocking on one or more identified enforcement devices associated with the detected intrusion, to redirecting the associated traffic including the intrusion and these policies may be modified or removed over time as warranted by network operation.
摘要:
A system and method to respond to intrusions detected on a network system including attached functions and a network infrastructure. The system includes means for receiving from an intrusion detection function information about intrusions, a directory service function for gathering and reporting at least the physical and logical addresses of devices of the network infrastructure associated with the detected intrusions, and a plurality of distributed enforcement devices of the network infrastructure for enforcing policies responsive to the detected intrusions. A policy decision function evaluates the reported detected intrusions and makes a determination whether one or more policy changes are required on the enforcement devices in response to a detected intrusion. A policy manager function configures the distributed enforcement devices with the responsive changed policy or policies. Policy changes rules can vary from no change to complete port blocking on one or more identified enforcement devices associated with the detected intrusion, to redirecting the associated traffic including the intrusion and these policies may be modified or removed over time as warranted by network operation.
摘要:
The present invention is a vertically stored dock leveler with a telescoping lip that selectively extends and retracts through a range positions relative to the deck. The lip is held and guided by a deck frame carriage. When the deck is raised and lowered, the lip is extended and retracted by an electro-hydraulic control system. When the deck reaches a preselected incline position, the lip is fully extended. Sensors on the underside of the deck determine the incline position of the deck and when the lip is retracted. The leveler is then lowered until the lip engages and rests on the bed of the trailer. Similarly, when the deck is raised for storage and reaches the preselected incline position, the lip is fully retracted prior to returning to its stored position. The telescoping lip is selectively moveable to a range of partially extended position to facilitate end loading a trailer.
摘要:
A drill tool includes a bit body, at least one bearing shaft extending from the bit body and a cone mounted for rotation on the bearing shaft. An outer bearing surface of the bearing shaft includes a non-loading zone. A first groove and a second groove are formed in the outer bearing surface at the non-loading zone. The first and second grooves are both circumferentially offset from each other and axially offset from each other. One or more of the grooves includes an opening for making a fluid connection to an internal lubricant channel within this bearing shaft. The circumferential and axial offsetting of the first and second grooves define a plurality of attenuation zones that function to restrict propagation of a cone pumping pressure pulse towards a sealing system of the drill tool.
摘要:
An apparatus, system, and method of fabricating a percussion tool that includes a flow tube. The flow tube includes upper and lower portions, inner and outer walls, and at least one opening formed in the outer wall. The upper portion extends from a top end towards a bottom end. The lower portion extends from the upper portion to the bottom end. The inner wall extends from the top end to the bottom end and defines a central channel therein. The outer wall extends from the top end towards the bottom end, surrounds a portion of the inner wall and defines an outer channel with the inner wall. The opening is fluidly communicable with a first conduit formed within a piston, which surrounds a portion of the flow tube, when in an up position and is fluidly communicable with a second conduit formed within the piston when in a down position.
摘要:
A system and method of fabricating a percussion tool that includes one or more coatings applied onto a piston, casing, and/or flow tube. The percussion tool includes a piston positioned in sliding contact within a casing. The piston includes an inner wall and an outer wall, where the inner wall defines a passageway extending longitudinally therethrough. The outer wall is positioned in close fitting relationship with an internal surface of the casing. One or more coatings are disposed on at least one of the casing's internal surface and/or the piston's outer wall. A flow tube may be placed through the passageway such that an outer wall of the flow tube is in a close fitting relationship with the piston's inner wall. One or more coatings can be disposed on at least one of the piston's inner wall and/or the flow tube's outer wall.
摘要:
A request for network access is received from a client device at a network entry device of a network infrastructure. The network infrastructure determines a physical location of the client device and determines authorization of the client device based on the physical location. The approach can include providing the physical location along with other user credentials to an authorizing device. The method can also include determining a level of service based on the physical location. Communication for the approach can make use of the IEEE 802.1X protocol.
摘要:
Integrated MOSFET current sensing for fuel-gauging. A 1st MOSFET through which the current is to be sensed is coupled to a 2nd MOSFET of the same type, the 2nd MOSFET being biased to have the same resistance as the 1st MOSFET. The 2nd MOSFET has a much smaller area than the 1st MOSFET, and is coupled to a current source representing a maximum current through the 1st MOSFET. The voltage across the 1st MOSFET relative to the voltage across the 2nd MOSFET provides a measure of the current through the 1st MOSFET. Various embodiments are disclosed, including embodiments in battery packs to eliminate the need for additional and expensive external components.