摘要:
A shaft assembly that includes a propshaft member and a constant velocity joint. The constant velocity joint has an outer race, which is coupled for rotation with the propshaft member, an inner race, a plurality of bearing balls disposed between the outer and inner races to transmit rotary power therebetween, a shaft member coupled for rotation with the inner race, and a boot assembly that is sealingly engaged to the outer race and the shaft member. The shaft member defines a coupling portion that extends from the boot assembly. A method for coupling a shaft member to a driveline component is also provided.
摘要:
The present invention is directed to a constant velocity joint (“CV joint”) and, more particularly, to a Rzeppa CV joint and method of forming the same. The method generally includes the steps of forming a bell shaped outer bearing race and separating the bell shaped outer bearing race into a disc shaped outer bearing race and a stub shaft. The method may further include the step of machining the bell shaped outer bearing race to create the stub shaft integrally connected to the disc shaped outer bearing race, before separating the bell shaped outer bearing race into the disc shaped outer bearing race and the stub shaft.
摘要:
A plasma ignition system is described herein that can produce plasma ionization around a spark plug gap using a single power circuit for the spark and plasma ionization. The system results in fewer components and higher reliability, allowing the system to be more easily integrated with existing ignition circuitry or in new ignition system designs. The plasma ignition system adds a one-way current path between the primary and secondary windings of the high voltage transformer. This allows energy stored within the capacitor after the creation of the spark to flow out of the capacitor, across the one-way current path, and through the spark plug gap. Thus, the plasma ignition system provides a dramatically better ignition spark with relatively little increase in components. The system does so without requiring a secondary power supply circuit to generate the current for producing plasma ionization.
摘要:
Disclosed are systems and methods for reclaiming posted buffers during a direct memory access (DMA) operation executed by an input/output device (I/O device) in connection with data transfer across a network. During the data transfer, the I/O device may cancel a buffer provided by a device driver thereby relinquishing ownership of the buffer. A condition for the I/O device relinquishing ownership of a buffer may be provided by a distance vector that may be associated with the buffer. The distance vector may specify a maximum allowable distance between the buffer and a buffer that is currently fetched by the I/O device. Alternatively, a condition for the I/O device relinquishing ownership of a buffer may be provided by a timer. The timer may specify a maximum time that the I/O device may maintain ownership of a particular buffer. In other implementations, a mechanism is provided to force the I/O device to relinquish some or all of the buffers that it controls.
摘要:
Described herein are systems and methods for use with a load balancer or traffic director, and administration thereof. In accordance with an embodiment the system comprises a traffic director having one or more traffic director instances, which is configured to receive and communicate requests, from clients, to origin servers having one or more pools of servers. A traffic monitor, at the traffic director, monitors traffic, including the number of connections, between the traffic director instances and one or more of the resource servers within the origin servers. The traffic director can set a traffic rate which controls the traffic, including the number of connections, to provide surge protection, or rate acceleration/deceleration.
摘要:
A system and method for verifying the receive path of an input/output device such as a network interface circuit. The device's operation with various different input sources (e.g., networks) and output sources (e.g., hosts, host buses) is modeled in a verification layer that employs multiple queues to simulate receipt of packets, calculation of destination addresses and storage of the packet data by the device. Call backs are employed to signal completion of events related to storage of packet data by the device and modeling of data processing within the verification layer. Processing of tokens within the verification layer to mimic the device's processing of corresponding packets is performed according to a dynamic DMA policy modeled on the device's policy. The policy is dynamic and can be updated or replaced during verification without interrupting the verification process.
摘要:
An anomaly detector compares a first event from a business activity monitoring system to a second number from an independent trusted source, wherein the first event includes a first number. The anomaly detector determines that the first number from the business activity monitoring system is inconsistent with the second number. The anomaly detector generates a calibration relationship between first number and second number based on time, responsive to a determination that the first number is inconsistent with the second number. The anomaly detector stores the calibration relationship. The anomaly detector receives a third number from the business activity monitoring system at an interval after comparing the first number. The anomaly detector displays the third number to a dashboard. The anomaly detector displays a qualifier to the third number.
摘要:
A power optimization method of deriving gated circuitry in an integrated circuit (IC) is provided. A design description of the IC is received and analyzed. A state machine is identified based on the analysis. One or more candidate blocks are determined to be capable of being disabled. At least one of the candidate blocks is selected based on one or more states of the state machine. A gating circuit is inserted for gating the selected candidate block(s). In another embodiment of power optimization, one or more state machines are identified and a synthesized netlist is generated. One or more candidate blocks in the synthesized netlist are determined to be capable of being disabled. At least one of the candidate blocks is selected based on one or more states in the state machine, and a gating circuit is inserted for gating the selected candidate block(s).
摘要:
Upstream devices, such as load balancers or routers, within a server farm, may be configured to route requests to the servers handling sessions for those requests using a secure (e.g. encrypted) unique ID or network address received with requests identifying how requests may be routed through the server farm. Upstream devices or a server receiving a request that is not associated with a session may generate a unique ID or select a network address identifying how the request is routed through the server farm. The server handling the request forms a session ID and returns that session ID and the unique ID to the client that originated the request. Encryption may be performed on network addresses or session IDs. Upon receiving a request corresponding to an established session, an upstream device may then decrypt routing information from the encrypted unique ID or network address and send the request downstream accordingly.
摘要:
A system-on-a-chip device is provided, the system-on-a-chip device comprising an on-chip processor and an on-chip dynamic random access memory (DRAM) capable of communicating with the on-chip processor. The system-on-a-chip device also comprises at least one on-chip input/output (I/O) bus capable of communicating with the on-chip processor and the on-chip dynamic random access memory (DRAM).