Patent classifications
H04L69/00
Efficient convergence in network events
One embodiment of the present invention provides a switch. The switch includes a storage device, one or more line cards, and a control card. A respective line card includes one or more ports and forwarding hardware. The control card determines routing and forwarding tables for the switch, and comprises processing circuitry and a management module. The management module manage a tunnel or virtual network at the switch. During operation, the control card determine an event associated with layer-2 operations of the switch. The control card refrains from notifying the management module regarding the event and notifies a first line card in the one or more line cards regarding the event. The first line card then updates a layer-3 forwarding entry in the corresponding forwarding hardware based on the notification.
Data monitoring systems and methods to update input channel routing in response to an alarm state
Monitoring systems and methods for data collection in an industrial environment are described. A system can include a first and second data collector coupled to input channels and a data acquisition circuit to interpret detection values corresponding to the input channels, wherein the sensor data is acquired from a first route of input channels. A data storage may store sensor specifications for sensors corresponding to the input channels and a data analysis circuit may evaluate the sensor data with respect to stored anticipated state information including an alarm threshold level. When the threshold is exceeded, a communication circuit communicates with a second data collector which transmits a state message related to a first input channel. A response circuit changes a routing of the input channels from a first routing to an alternate routing based on the state message from the second data collector.
Method and device for encapsulating and de-encapsulating general data stream
According to a method for encapsulating or decapsulating a general data stream, one or more data sections are obtained by encapsulating data of a transport object based on a format of the general data stream. The data section includes a data section head and a data section payload. The data section head includes a basic section head and an extension section head or includes the basic section head only. The basic section head includes a transport object identity, a data section length, a data section payload encapsulation mode and an extension section head flag. The encapsulation mode uses a variable-length packet encapsulation mode, a fixed-length packet encapsulation mode or a stream encapsulation mode. The flag indicates whether there is the extension section head and the extension section head includes at least one extended parameter. The one or more data sections are concatenated to obtain and transmit the general data stream.
Methods and apparatus for self-tuning operation within user space stack architectures
Methods and apparatus for efficient data transfer within a user space network stack. Unlike prior art monolithic networking stacks, the exemplary networking stack architecture described hereinafter includes various components that span multiple domains (both in-kernel, and non-kernel). For example, unlike traditional “socket” based communication, disclosed embodiments can transfer data directly between the kernel and user space domains. Direct transfer reduces the per-byte and per-packet costs relative to socket based communication. A user space networking stack is disclosed that enables extensible, cross-platform-capable, user space control of the networking protocol stack functionality. The user space networking stack facilitates tighter integration between the protocol layers (including TLS) and the application or daemon. Exemplary systems can support multiple networking protocol stack instances (including an in-kernel traditional network stack).
Supporting internet protocol version 4 (IPv4) extension headers
A method implemented by a network element (NE) comprises generating, by a processor, an Internet Protocol version 4 (IPv4) packet comprising an IPv4 header, a plurality of extension headers, and upper layer data, wherein the IPv4 packet indicates a total length of the IPv4 packet and a total length of the plurality of extension headers, indicating, by the processor, a protocol number associated with a first extension header of the plurality of extension headers in a protocol field of the IPv4 header, indicating, by the processor, a protocol used to encode the upper layer data of the IPv4 packet in a last protocol field of a last extension header of the plurality of extension headers, and transmitting, by a transmitter, the IPv4 packet to another NE.
Using existing servers in a wellbore environment as data sources for streaming servers
A streaming server can receive a request from a client device to access data about a wellbore environment in a database server. The database server can be communicatively coupled to a server, which can be communicatively coupled to the streaming server. The streaming server can communicate data in a standardized format with the server using a request and response protocol. The streaming server can communicate the wellbore environment data from the database server in a streaming format with the client device.
Hardware configurable security, monitoring and automation controller having modular communication protocol interfaces
A single platform for controller functionality for each of security, monitoring and automation, as well as providing a capacity to function as a bidirectional Internet gateway, is provided. Embodiments of the present invention provide such functionality by virtue of a configurable architecture that enables a user to adapt the system for the user's specific needs. Embodiments of the present invention further provide such functionality by providing for installation of removable, modular communication adapters for communication with a variety of devices external to the security, monitoring and automation controller.
Virtualized clocks
A method of virtualizing a clock is executed by a network controller comprising a processor and computer-readable instructions for creating one or more virtual network elements comprising one or more virtual clocks. The method comprises retrieving, at a first virtual network element of the one or more virtual network elements, a first time of day value and a second time of day value. The method further comprises adjusting the amount of time elapsed based, in part, on a frequency adjustment value and incrementing a clock value based on the amount of time elapsed.
Virtualized clocks
A method of virtualizing a clock is executed by a network controller comprising a processor and computer-readable instructions for creating one or more virtual network elements comprising one or more virtual clocks. The method comprises retrieving, at a first virtual network element of the one or more virtual network elements, a first time of day value and a second time of day value. The method further comprises adjusting the amount of time elapsed based, in part, on a frequency adjustment value and incrementing a clock value based on the amount of time elapsed.
Wireless control system, wireless control method, and battery pack
The present disclosure includes a wireless control system, a wireless control method, and a battery pack. The wireless control system includes a master configured to wirelessly transmit a first command packet, and first to N.sup.th slaves to which first to N.sup.th IDs are allocated, respectively. When the first slave receives the first command packet, the first slave wirelessly transmits a first response packet including first battery information and the first ID. When a k+1.sup.th slave receives the first command packet, the k+1.sup.th slave stands by to receive a k.sup.th response packet for a preparation period and wirelessly transmits a k+1.sup.th response packet including k+1.sup.th battery information and a k+1.sup.th ID. When the k.sup.th response packet is received by the k+1.sup.th slave within the preparation period, the k+1.sup.th response packet further includes k.sup.th battery information and a k.sup.th ID.