摘要:
Techniques are described for distributing network device tasks across virtual machines executing in a computing cloud. A network device includes a network interface to send and receive messages, a routing unit comprising one or more processors configured to execute a version of a network operating system, and a virtual machine agent. The virtual machine agent is configured to identify a virtual machine executing at a computing cloud communicatively coupled to the network device, wherein the identified virtual machine executes an instance of the version of the network operating system, to send, using the at least one network interface and to the virtual machine, a request to perform a task, and to receive, using the at least one network interface and from the virtual machine, a task response that includes a result of performing the task. The routing unit is configured to update the network device based on the result.
摘要:
Techniques are described for providing high availability for a network device, e.g., a router, using full memory replication between a primary virtual machine (VM) and a standby VM running on the network device. In one example, the techniques provide hot-standby high availability for a router by initializing a primary VM and a standby VM on the router at the same time. In another example, the techniques provide high availability for the router by initializing a standby VM on the router upon detecting a failure of the primary VM. In both examples, the primary VM controls the routing functionality and periodically stores a full memory state. Upon a failure of the primary VM, a hypervisor may perform a full memory replication between the primary VM and the standby VM. The standby VM may then take control of the routing functionality at the last stored state of the memory.
摘要:
An anti-theft lock with plate tumblers includes two axial grooves (18) which are disposed at diametrically opposite locations on an inner wall of the lock (1) and an annular groove (10) which has a rectangular cross section and is provided on the inner wall of the lock (1) adjacent an end proximal to a key slot (21). A round controlling plate (8), of which the diameter is same as that of the core (2), is disposed between the lock cover (9) and the lock core (2). A key slot (15), which is narrower than the key slot (21) in the lock core (2), is provided in the round controlling plate (8). Two V-shaped grooves (16) are provided on the inner sidewall of the round controlling plate (8) and correspond to two ends of the key slot (15). Two swallowtail grooves (20), in which a brake shaft (4) is mounted, are provided on the lock core (2), Multiple tooth grooves (17), which are engaged with the brake position teeth (14), are disposed on the outer walls of the two ends of the plate tumblers (5).
摘要:
Techniques described in this disclosure relate to configuration updates, such as performing an in-service software upgrade on a device, using virtual machines. In a routing device, a routing engine utilizes a virtual machine executing on a hypervisor to provide control plane functions. In one example, an in-service software upgrade may be performed between a first virtual machine and a second virtual machine without a managing virtual machine. More specifically, a first virtual machine in the control plane of the router may control the upgrade process, including requesting initialization of the second virtual machine, installing a new software system on the second virtual machine, and replicating state data from the first virtual machine to the second virtual machine. In this example, the first virtual machine may operate as a master virtual machine and the second virtual machine may operate as a slave virtual machine that synchronizes with the master virtual machine.
摘要:
The control plane of a network device comprises a plurality of software processes that manage routing control operations of the device. Through a hypervisor in the control plane, a managing virtual machine controls access to a first virtual machine running a first software system to control a routing communication session between the network device and other network devices. In response to an in-service software upgrade request, the managing virtual machine initializes a second virtual machine. On the second virtual machine, the second software system is loaded. State data maintained by the managing virtual machine can be transferred to the second virtual machine, and the second virtual machine takes control of the routing communication session. During the transfer of control from the first virtual machine to the second virtual machine, techniques of “non-stop forwarding” and “graceful restart” can be implemented to minimize the effect the switchover has on the network.
摘要:
A linkage anti-theft lock head comprises a lock tube (16), a lock core (2), a brake bar (19), a front tumbler (6) with its return spring (20), a rear tumbler (9) with its return spring (20) and a key (1). Clearance fits are provided between the front tumbler (6) and the rear tumbler (9) with the holes (26) distributed axially on the lock core (2). The brake bar (19) is mounted axially along the lock core (2). Brake teeth of the brake bar (19) engage with the teeth grooves of the front tumbler (6) and the rear tumbler (9). Said engagement is a linkage engagement. A brake groove (17) is set on the lock tube (16) to match with the brake bar (19). The tumblers, the brake bar (19) and the lock core (2) constitute a cant device, wherein the front tumbler (6) and the rear tumbler (9) act as moving cams set oppositely, the brake bar (19) acts as a driven member and the lock core (2) acts as a rack.
摘要:
An anti-theft lock with plate tumblers includes two axial grooves (18) which are disposed at diametrically opposite locations on an inner wall of the lock (1) and an annular groove (10) which has a rectangular cross section and is provided on the inner wall of the lock (1) adjacent an end proximal to a key slot (21). A round controlling plate (8), of which the diameter is same as that of the core (2), is disposed between the lock cover (9) and the lock core (2). A key slot (15), which is narrower than the key slot (21) in the lock core (2), is provided in the round controlling plate (8). Two V-shaped grooves (16) are provided on the inner sidewall of the round controlling plate (8) and correspond to two ends of the key slot (15). Two swallowtail grooves (20), in which a brake shaft (4) is mounted, are provided on the lock core (2), Multiple tooth grooves (17), which are engaged with the brake position teeth (14), are disposed on the outer walls of the two ends of the plate tumblers (5).
摘要:
A magnetic attractable spoon comprises a tie ring having a hole; a spoon combined to the hole of the tie ring; and at least one magnet installed to the tie ring for attracting metal objects. The tie ring is elastic. The tie ring has at least one embedding groove for embedding the magnet. The magnet is enclosed within the tie ring. A plurality of magnets are annularly arranged along an edge of the tie ring. The tie ring is combined to an annular body of the tie ring and the tie ring has an annular attracting surface. The hole of the tie ring is not a penetrating hole. The tie ring has a plane attracting surface or a cambered attracting surface.
摘要:
Techniques are described for distributing network device tasks across virtual machines executing in a computing cloud. A network device includes a network interface to send and receive messages, a routing unit comprising one or more processors configured to execute a version of a network operating system, and a virtual machine agent. The virtual machine agent is configured to identify a virtual machine executing at a computing cloud communicatively coupled to the network device, wherein the identified virtual machine executes an instance of the version of the network operating system, to send, using the at least one network interface and to the virtual machine, a request to perform a task, and to receive, using the at least one network interface and from the virtual machine, a task response that includes a result of performing the task. The routing unit is configured to update the network device based on the result.
摘要:
A dual-band antenna (1) includes a first antenna (2) and a second antenna (3). The first antenna includes a first dipole half (11) and a second dipole half (12). The first dipole half is disposed above the second dipole half with a space therebetween and the two dipole halves are corresponding to each other in a lengthwise direction. The second antenna includes a coaxial cable (4) including an inner conductor feeding the first antenna and comprising an exposed extending section (40) acting as a radiating portion of the second antenna, and a ground patch (5) electrically connected with the second dipole half.