摘要:
Methods and apparatus for loading a security algorithm in a fast path of a network processor are disclosed. In an example method, a network processor generates a statistic associated with a plurality of communication packets received by the network processor, determines a security attack on the network processor is in progress based on the statistic and loads the security algorithm in the fast path of the network processor.
摘要:
A method of distributing processing in a network device includes defining controller and worker control plane protocol modules. The method also includes developing corresponding entries in a communications library and implementing an infrastructure module, the communication library and the controller module on a control plane. The infrastructure module, the communication library and the worker modules are implemented on a forwarding plane.
摘要:
A method to provide high availability in network elements using distributed architectures. The method employs multiple software components that are distributed across data/forwarding plane and control plane elements in a network element. The software components in the data/forwarding plane include active and standby components. Components in the control plane a re provided to communicate with the components in the data/forwarding plane. A keep-alive messaging mechanism is used to monitor operation of the various elements in the network element. Upon detection of a failure to a hardware or software component, the data/forwarding plane and/or control plane elements are reconfigured, as applicable, to replace a failed active component with a corresponding standby component. This enables the network element to be reconfigured in a manner that is transparent to other network elements, and provided high availability for the network element.
摘要:
A method to provide high availability in network elements using distributed architectures. The method employs multiple software components that are distributed across data/forwarding plane and control plane elements in a network element. The software components in the data/forwarding plane include active and standby components. Components in the control plane are provided to communicate with the components in the data/forwarding plane. A keep-alive messaging mechanism is used to monitor operation of the various elements in the network element. Upon detection of a failure to a hardware or software component, the data/forwarding plane and/or control plane elements are reconfigured, as applicable, to replace a failed active component with a corresponding standby component. This enables the network element to be reconfigured in a manner that is transparent to other network elements, and provided high availability for the network element.
摘要:
According to one general aspect, a method may include receiving a digital circuit model that includes models of a clock mesh and a plurality of logic circuits, each logic circuit associated with end-points of the logic circuit. The method may also include identifying a cluster of end-points, wherein the cluster is associated with a common version of the clock signal. The method may also include identifying an associated skew-schedule for each end-point. The method may include determining a timing slack and skew schedule for each end-point within the cluster. The method may include adjusting a clock-gater cell, based upon a common push/pull schedule associated with the cluster. The method may further include inserting, for at least one end-point of the cluster, a skew-buffer, wherein a variant of the skew-buffer for a respective end-point is based upon a difference between the end-point's skew schedule and the common push/pull schedule.
摘要:
Technologies are presented that provide context-aware privacy metering regarding establishments, such as consumer establishments. A method of rating privacy of one or more establishments may include receiving a location designation of a user device from the user device (automatically or via user input), obtaining privacy-related information regarding one or more establishments in proximity of the location designation, and generating one or more privacy score vector algorithms for the one or more establishments based on the privacy-related information regarding the one or more establishments. The method may further include obtaining a privacy profile of the user, determining one or more privacy scores for the one or more establishments by applying the privacy profile of the user to the one or more privacy score vector algorithms. The method may further include generating and providing a privacy-related recommendation regarding a particular establishment.
摘要:
A process for preparing a novel intermediate in the preparation of perindopril is provided. Also provided are improved processes for the preparation of perindopril erbumine comprising (a) reacting a compound of Formula (15) with a silylated octahydroindole-1H-2-carboxylic acid to form perindopril; and (b) reacting perindopril with tert-butylamine to form perindopril erbumine of Formula I:
摘要:
A programming interface for Secure Socket Layer (SSL) abstracts manipulation, e.g., configuration and management, of SSL tables based upon an SSL implementation model. The SSL tables can be provided in a forwarding plane. A programming interface for server load balancing (SLB) abstracts configuration and management of SLB tables.