摘要:
A method of reducing power consumption in a network. A first network device powers down or reduces the port speed of a port if said port is blocked by a loop mitigation protocol.
摘要:
A method of reducing power consumption in a network. A first network device powers down or reduces the port speed of a port if said port is blocked by a loop mitigation protocol.
摘要:
Embodiments of the device have a plurality of authentication slots for authenticating users, a port configured to receive an authentication request from a user, a memory, a queue maintained in the memory, and a processing engine configured to monitor the port and the authentication slots such that if an authentication request from a user is received and no authentication slots are available, an identifier associated with the user is enqueued on the queue, and wherein if one of the authentication slots is or becomes available and the queue is not empty, an identifier is dequeued from the queue and the associated user is authenticated using one of the available authentication slots.
摘要:
In a method of managing access to a network, a MAC based authentication operation is implemented in determining whether to grant a user device access to the network. In addition, a user is enabled to self-register a user device into a database of authorized users in response to the user being denied access through the MAC based authentication operation and being listed as a valid user in a directory of active network users. Moreover, the directory of active network users is monitored for modification of information pertaining to the users listed in the directory of active network users and the database of authorized users is modified in response to a determination that user information pertaining to at least one user listed in the directory of active network users that affects the database of authorized users has been modified.
摘要:
In a method of managing access to a network, a MAC based authentication operation is implemented in determining whether to grant a user device access to the network. In addition, a user is enabled to self-register a user device into a database of authorized users in response to the user being denied access through the MAC based authentication operation and being listed as a valid user in a directory of active network users. Moreover, the directory of active network users is monitored for modification of information pertaining to the users listed in the directory of active network users and the database of authorized users is modified in response to a determination that user information pertaining to at least one user listed in the directory of active network users that affects the database of authorized users has been modified.
摘要:
Dynamic hardware address assignment to network devices in a switch mesh is described. In an example, a network device in a switch mesh dynamically assigns a hardware address to a network interface. The network device receives an address request from a client through the switch mesh. The network device calculates an index value for the client based on data in the address request. The network device selects the hardware address of a plurality of hardware addresses assigned to the network interface based on the index value. The switch mesh includes a plurality of traffic paths respectively for the plurality of hardware addresses. The network device sends the hardware address in a reply to the client through the switch mesh.
摘要:
Dynamic hardware address assignment to network devices in a switch mesh is described. In an example, a network device in a switch mesh dynamically assigns a hardware address to a network interface. The network device receives an address request from a client through the switch mesh. The network device calculates an index value for the client based on data in the address request. The network device selects the hardware address of a plurality of hardware addresses assigned to the network interface based on the index value. The switch mesh includes a plurality of traffic paths respectively for the plurality of hardware addresses. The network device sends the hardware address in a reply to the client through the switch mesh.
摘要:
Embodiments herein relate to transmitting specific traffic along a blocked link. A status of links between switches of a network is monitored. The status of the links is one of blocked and non-blocked. A blocked link is not used by a Spanning Tree Protocol (STP). At least one of the network switches is configured to transmit the specific traffic along the blocked link.
摘要:
An example method includes creating a plurality of redundant, non-looping paths to a plurality of switches, and providing information to the plurality of switches about the plurality of redundant, non-looping paths. The method further comprises assigning each of a plurality of clients to one of the plurality of redundant, non-looping paths, and providing information to the plurality of switches about which of the plurality of redundant, non-looping paths each client of the plurality of clients is assigned to. Then, in response to receiving a packet from a client of the plurality of clients, the method comprises transmitting the packet on one of the plurality of redundant, non-looping paths to one of the plurality of switches based at least in part on which of the plurality of redundant, non-looping paths the client is assigned to.
摘要:
Systems and methods are disclosed for a network switch that periodically determines whether there are connectivity problems with first ports and a second port independently of responding to requests from computer systems. Information to be sent to the computer system that sends a request is generated. The information includes an error message regarding at least one of the connectivity problems when one of the first ports or the second port with the connectivity problem is required to respond to the request.