摘要:
A virtual device includes multiple devices connected to operate as a single device. A first one of the devices is configured to determine that the first device connects to a second one of the devices via a first link; identify a second link; determine that the second link connects the first device to the second device; and automatically aggregate the first link and the second link to form a link aggregation with the second device based on determining that the first device connects to the second device via both the first and second links. The first device is further configured to transmit packets to the second device via the first and second links of the link aggregation.
摘要:
In some embodiments, an apparatus includes a first switch having an egress port configured to be coupled to a second switch to collectively to define a single logical entity having a set of virtual identifiers. A first set of virtual identifiers from the set of virtual identifiers is associated with the first switch, a second set of virtual identifiers from the set of virtual identifiers is associated with the second switch. The first switch is configured to receive a forwarding table associating a first set of destination addresses with a set of identifiers local to the first switch and associating a second set of destination addresses with a set of identifiers local to the second switch. Each identifier from the first set of identifiers is uniquely associated the first set of virtual identifiers. Each identifier from the set of identifiers is uniquely associated the second set of virtual identifiers.
摘要:
A virtual device includes multiple devices connected to operate as a single device. A first one of the devices is configured to determine that the first device connects to a second one of the devices via a first link; identify a second link; determine that the second link connects the first device to the second device; and automatically aggregate the first link and the second link to form a link aggregation with the second device based on determining that the first device connects to the second device via both the first and second links. The first device is further configured to transmit packets to the second device via the first and second links of the link aggregation.
摘要:
A virtual device includes multiple devices connected to operate as a single device. A first one of the devices is configured to determine that the first device connects to a second one of the devices via a first link; identify a second link; determine that the second link connects the first device to the second device; and automatically aggregate the first link and the second link to form a link aggregation with the second device based on determining that the first device connects to the second device via both the first and second links. The first device is further configured to transmit packets to the second device via the first and second links of the link aggregation.
摘要:
A virtual device includes multiple devices connected to operate as a single device. A first one of the devices is configured to determine that the first device connects to a second one of the devices via a first link; identify a second link; determine that the second link connects the first device to the second device; and automatically aggregate the first link and the second link to form a link aggregation with the second device based on determining that the first device connects to the second device via both the first and second links. The first device is further configured to transmit packets to the second device via the first and second links of the link aggregation.
摘要:
A method performed by network devices that includes operating in a normal mode, where the network devices form a virtual chassis that corresponds to a single logical network device; detecting when a failure within the virtual chassis occurs; executing a splitting process to form one or more new virtual chassis in correspondence to the failure; determining whether one of the one or more new virtual chassis operates as a functioning virtual chassis based on whether at least one of a set of criteria is satisfied, where the functioning virtual chassis operates according to resources configured for the virtual chassis; and operating as a nonfunctioning virtual chassis when it is determined that the one of the one or more virtual chassis does not satisfy the at least one of the set of criteria, where the nonfunctioning virtual chassis operates in a pass-through mode.
摘要:
A method, apparatus and computer program product are disclosed for incrementally checkpointing the state of a computer memory in the presence of at least one executing software application at periodic instants. A secure hash function is periodically applied to each partitioned contiguous block of memory to give a periodic block hash value. At each periodic instant, a block hash value for each block is compared with a respective preceding block hash value to determine if said memory block has changed according to whether said block hash values are different. Only changed memory blocks are stored in a checkpoint record. The memory block sizes are adapted at each periodic instant to split changed blocks into at least two parts and to merge only two non-changed contiguous blocks at a time.
摘要:
A method using weighted aggregated ensemble model for energy demand management of buildings includes initializing data values for integrated model to measure energy consumption, perform statistical analysis on data values to estimate accurate prediction, optimizing the data values using marine predator optimization for integrated model, analyze the output to minimize the mean square error and results show improvement in accuracy of integrated model. The data values comprise of σ, maximum number of splits, minimum leaf size, and λ. The weighted aggregated ensemble model for energy demand management of buildings shows best performance compared with other predictive models such as linear regression (LR), support vector regression (SVR), multilayer perceptron neural network (MLPNN), decision tree (DT), and generalized additive model (GAM).
摘要:
Rolling software upgrades may be employed for a network device in a modular chassis and/or virtual chassis. The network device may include memory devices to store a software upgrade package and a group of instructions, and a processor. The processors may install the software upgrade package on a backup routing engine; determine subsets of multiple line cards on which to perform a software upgrade, where ports in each of the multiple line cards are part of a link aggregation group (LAG); initiate a reboot process for each of the subsets of multiple line cards, in sequence, where the reboot process for each of the line cards results in a software upgrade without deactivating any LAG. The processors may also switch the backup routing engine and a master routing engine to create a new master routing engine and a new backup routing engine, and install the upgrade package on the new backup routing engine.
摘要:
A method for data embedding in a digital image under the constraint of a pre-specified upper bound value on the amount of change in the value of a property associated with the image. For compression tolerant data hiding in digital images, a property is selected in which the required information can be embedded. The property should be such that the value obtained from the property before and after a lossy compression does not change by a significant amount, and the change should be bounded. The property should be such that a property value as obtained from the image will not vary due to compression, but only due to malicious tampering. The value obtained from the property is stored so that the image can be verified. The complete image is considered in deciding whether to increase or decrease the property value in a particular region. The method also takes into account the fact that blocks having values of 0 or L, corresponding to the minimum and maximum property values, respectively, are incapable of change in a particular region. The method also attempts to vary even the checksum (stored information), in addition to modifying the image so that the net resultant checksum and the modified image coincide with each other.