摘要:
Systems and methods for distributed configuration of one or more network interface cards (NICs) are disclosed. An exemplary method comprises issuing a request frame including at least a current configuration generation for the NICs from a host computing device to a network device. The method also comprises returning at least one configuration frame including a newer network configuration for the NICs from the network device to the host computing device. The method also comprises configuring the NICs at the host computing device with the newer network configuration.
摘要:
Systems and methods for distributed configuration of one or more network interface cards (NICs) are disclosed. An exemplary method comprises issuing a request frame including at least a current configuration generation for the NICs from a host computing device to a network device. The method also comprises returning at least one configuration frame including a newer network configuration for the NICs from the network device to the host computing device. The method also comprises configuring the NICs at the host computing device with the newer network configuration.
摘要:
A computer system aggregates a plurality of network resources of a computer system. The computer system has a plurality of processing nodes. Each of the processing nodes includes one or more of the plurality of network resources. The one or more resources of each processing node makes up a bypass protocol stack operable to provide offloaded connections over a network to instances of one or more applications running on the system. Each of the applications is uniquely associated with a first port number. The system is identified on the network by a global IP address and each of the plurality of nodes is identified by a unique local IP address. Each of the plurality of resources is uniquely identified by an assigned private IP address. At each of the processing nodes, a listening socket is created for each instance of the plurality of applications running on the node. The listening socket is created by associating it with a first endpoint tuple that includes the public IP address uniquely identifying the node and the first port number associated with the application for which the listening socket is created. The first endpoint tuple associated with each listening socket created is translated to a set of bypass endpoint tuples, each of the set of bypass tuples including a different one of the assigned private IP addresses identifying the one or more network resources of the node. Each listening socket is associated with the set of bypass tuples. A global address translation map is maintained for each set of bypass tuples associated with each of the listening sockets created for an instance of each of the applications running on the plurality of processing nodes.
摘要:
A computer system aggregates a plurality of network resources of a computer system. The plurality of network resources forms a bypass stack operable to provide offloaded connections to one or more applications available on the computer system. Each of the applications is associated with a first port number. The computer system itself is addressable on the network by a public IP address. The system assigns private IP addresses to uniquely identify each of the plurality of network resources. The system creates a socket for each application by which the application can communicate with the network. The socket is associated with a first endpoint tuple that includes the public IP address and the first port number associated with the application for which the socket is created. The socket is further associated with a set of bypass endpoint tuples that are translated from the first endpoint tuple, each of the set including a different one of the private IP addresses. Each of the bypass endpoint tuples is available to be a transport address to define an offloaded connection to the application through one of the network resources. The created socket can be a listening one at a server node or a connection one at a client node.
摘要:
A network comprising a first electronic device associated with a first profile that uniquely identifies the first electronic device on the network. The network also comprises a second electronic device coupled to the first electronic device. The first profile is migrated to the second electronic device such that the first electronic device is no longer associated with the first profile and such that the first profile uniquely identifies the second electronic device on the network.
摘要:
A network comprising a first electronic device associated with a first profile that uniquely identifies the first electronic device on the network. The network also comprises a second electronic device coupled to the first electronic device. The first profile is migrated to the second electronic device such that the first electronic device is no longer associated with the first profile and such that the first profile uniquely identifies the second electronic device on the network.
摘要:
An improved ultra-high bandwidth helical coil deflection structure for a hode ray tube is described comprising a first metal member having a bore therein, the metal walls of which form a first ground plane; a second metal member coaxially mounted in the bore of the first metal member and forming a second ground plane; a helical deflection coil coaxially mounted within the bore between the two ground planes; and a resistive load disposed in one end of the bore and electrically connected to the first and second ground planes, the resistive load having an impedance substantially equal to the characteristic impedance of the coaxial line formed by the two coaxial ground planes to inhibit cavity resonance in the structure within the ultra-high bandwidth of operation. Preferably, the resistive load comprises a carbon film on a surface of an end plug in one end of the bore.
摘要:
According to one embodiment, a server is automatically deployed using a pre-provisioned logical volume LV. A first world wide name WWN1 is associated 320 with a logical volume LV1 associated with a disk array controller 260. A second world wide name WWN1, which is assigned to a server S1, is received 335 at the disk array controller 260. If 340 the first world wide name WWN1 is the same as the second world wide name WWN1, the server S1 is enabled 350 to access the logical volume LV1. The first and second world wide names are not required to be assigned to any server S1, S2 at the time that the first world wide name is associated with the logical volume.
摘要:
A new deflection structure (12) which deflects a beam of charged particles,uch as an electron beam (15), includes a serpentine set (20) for transmitting a deflection field, and a shielding frame (25) for housing the serpentine set (20). The serpentine set (20) includes a vertical serpentine deflection element (22) and a horizontal serpentine deflection element (24). These deflection elements (22, 24) are identical, and are interdigitatedly and orthogonally disposed relative to each other, for forming a central transmission passage (75), through which the electron beam (15) passes, and is deflected by the deflection field, so as to minimize drift space signal distortion. The shielding frame (25) includes a plurality of ground blocks (26, 28, 30, 32), and forms an internal serpentine trough (77) within these ground blocks, for housing the serpentine set (20). The deflection structure (12) further includes a plurality of feedthrough connectors (35, 37, 35I, 37I), which are inserted through the shielding frame (25), and which are electrically connected to the serpentine set (20).
摘要:
A log splitter in which a log splitter beam is rotatably attached to a rear upright frame of a wood transporting trailer. The beam is rotatable between a vertical position which is maintainable for splitting operation and a diagonal position where it is secured during over-the-road operation of the trailer.