摘要:
Methods, systems and apparatuses for controlling and managing a plurality of luminaires are disclosed. One method includes sensing, by a sensor of each of the plurality of luminaires, light received by the sensor, communicating, by a device, with the plurality of luminaires by a device through light pulses, commissioning and calibrating, by the device, the plurality of luminaires using the communication, and placing, by the device, at least one of the plurality of luminaires on a floor plan through the communication with light pulses, wherein the at least one of the plurality of luminaires identifies itself over a network.
摘要:
Methods, systems and apparatuses for controlling and managing a plurality of luminaires are disclosed. One method includes sensing, by a sensor of each of the plurality of luminaires, light received by the sensor, communicating, by a device, with the plurality of luminaires by a device through light pulses, commissioning and calibrating, by the device, the plurality of luminaires using the communication, and placing, by the device, at least one of the plurality of luminaires on a floor plan through the communication with light pulses, wherein the at least one of the plurality of luminaires identifies itself over a network.
摘要:
A method of controlling and managing a plurality of system managers, a plurality of lights and devices, including human interfaces and building automation devices is disclosed. The method includes a system manager collecting data from the plurality of lights and devices. The system manager uses the collected data to determine an adjacency of lights and devices. The system manager dynamically places the plurality of lights and devices into zones and binding human interface devices to the zones, and a dynamically configures the devices to control the zones. The devices perform self-calibration and self-commissioning. The system manager and devices perform ongoing calibration and commissioning. The system manager and devices operate resiliently in case of failure of the system manager, other devices, or software or hardware failures in the devices. The system manager and the devices operate on the collected data to determine usage patterns, and to efficiently manage the plurality of lights and devices.
摘要:
A method of controlling and managing a plurality of system managers, a plurality of lights and devices, including human interfaces and building automation devices is disclosed. The method includes a system manager collecting data from the plurality of lights and devices. The system manager uses the collected data to determine an adjacency of lights and devices. The system manager dynamically places the plurality of lights and devices into zones and binding human interface devices to the zones, and a dynamically configures the devices to control the zones. The devices perform self-calibration and self-commissioning. The system manager and devices perform ongoing calibration and commissioning. The system manager and devices operate resiliently in case of failure of the system manager, other devices, or software or hardware failures in the devices. The system manager and the devices operate on the collected data to determine usage patterns, and to efficiently manage the plurality of lights and devices.
摘要:
Techniques are provided for implementing a portable port profile that is based on a virtual machine (VM) definition file. Properties are specified within the VM definition that allow a virtual switch to look up one or more network policies such as connectivity, firewall, or other enforcement policies, and apply those policies on a customizable basis to the VM's virtual network interface.
摘要:
Enhanced tunnel communication mode creation, management and tuning in a network that includes wireless access points (APs) and user authentication. Tunnels can be dynamically managed to adapt to the changing topology of a network with APs. User devices such as mobile phones, laptop computers, personal digital assistants, or other devices can be added or dropped from an assigned AP. APs, routers, switches or other devices can also be added, removed, or modified in their network characteristics. Special control is also provided for IP multicast, Dynamic Host Configuration Protocol (DHCP), Address Resolution Protocol (ARP) and other network features.
摘要:
Embodiments of the present invention provide for switchover from an active processor to a standby processor in a route processor system. An up-to-date copy of information used by a supervisor process at the active processor is ensured by determining necessary event states. One type of event state includes message requests, processing and replies. Three basic types of communication between three different entities (blade, wireless domain services (WDS) and supervisor) are governed by three types of communication protocols: WLCCP between a blade and WDS, LCP between a supervisor and a blade, and checkpoint-type messages between two supervisors.
摘要:
In one embodiment, a method for providing secure communications using a proxy is provided. The proxy negotiates with a client and a server to determine a session key to use with communications between the client and the proxy and between the proxy and the server. Encrypted data may then be received from the client at the proxy. The proxy can decrypt the encrypted data for processing using the session key. In one embodiment, the decrypted data is not altered. The proxy then sends the encrypted data that was received from the client to the server without re-encrypting the data that was decrypted. Because the proxy did not alter the data in its processing of the decrypted data and the same session key is used between communications for the proxy and the server, the encrypted data stream that was received from the client can be forwarded to the server.
摘要:
In one embodiment, ports of a network device are assigned to virtual service domains (VSDs). The ports are coupled to a virtual Ethernet module (VEM) of the network device. Each VSD is associated with one or more virtual service engines (VSEs) in a particular order. Each VSE is configured to apply a particular service to traffic traversing the VSE. Traffic received at a virtual Ethernet module (VEM) of the network device that is destined for a particular VSD, and is received on a port that has not been assigned to the particular VSD, is forwarded to the particular VSD via the one or more VSEs associated with the particular VSD such that the traffic traverses the one or more VSEs in the particular order.
摘要:
A detection-based defense to a wireless network. Elements of the infrastructure, e.g., access points or scanning-only access points, detect intruders by detecting spoofed frames, such as from rogue access points. Access points include a signature, such as a message integrity check, with their management frames in a manner that enables neighboring access points to be able to validate the management frames, and to detect spoofed frames. When a neighboring access point receives a management frame, obtains a key for the access point sending the frame, and validates the management frame using the key.