Patent application number | Description | Published |
20100212980 | POWER WHEEL - A power wheel is provided. The power wheel includes a wheel, a power-driving device, and a power supply for the power-driving device. The power supply and the power-driving device are fixed on the wheel. A power supply device such as a rechargeable battery is set in the wheel to fully utilize the space in the wheel. The power wheel is applicable in an electric bicycle, so that a body design of the electric bicycle is not influenced by mounting conditions of the rechargeable battery device, and a body structure of the electric bicycle is greatly simplified, thus being beneficial to the design and production of electric bicycles having varied types. At the same time, the power wheel device having the rechargeable battery set in the wheel enables the gravity center of the electric bicycle to be depressed, thus keeping the balance of the electric bicycle. | 08-26-2010 |
20150055651 | DISTRIBUTED MULTICAST BY ENDPOINTS - A novel method of conducting multicast traffic in a network is provided. The network includes multiple endpoints that receive messages from the network and generate messages for the network. The endpoints are located in different segments of the network, each segment including one or more of the endpoints. For a source endpoint to replicate a particular message (e.g., a data packet) for all endpoints belonging to a particular replication group (i.e., multicast group) within the network, the source endpoint replicates the particular message to each endpoint within the source endpoint's own segment and to a proxy endpoint in each of the other segments. Each proxy endpoint in turn replicates the particular message to all endpoints belonging to the particular replication group within the proxy endpoint's own segment. | 02-26-2015 |
20150058463 | PROXY METHODS FOR SUPPRESSING BROADCAST TRAFFIC IN A NETWORK - Some embodiments use proxies on host devices to suppress broadcast traffic in a network. Each host in some embodiments executes one or more virtual machines (VMs). In some embodiments, a proxy operates on each host between each VM and the underlying network. For instance, in some of these embodiments, a VM's proxy operates between the VM and a physical forwarding element executing on the VM's host. The proxy monitors the VM's traffic, and intercepts broadcast packets when it knows how to deal with them. The proxy connects to a set of one or more controllers that provides a directory service that collects and maintains global information of the network. By connecting to the controller cluster, the proxy can obtain information that it can use to resolve broadcast requests. In some embodiments, the connection between the proxy and the controller cluster is encrypted and authenticated, to enhance the security. Also, in some embodiments, the connection is an indirect connection through an agent that executes on the host device and connects the proxies of the host device with the controller cluster. | 02-26-2015 |
20150058968 | PROXY METHODS FOR SUPPRESSING BROADCAST TRAFFIC IN A NETWORK - Some embodiments use proxies on host devices to suppress broadcast traffic in a network. Each host in some embodiments executes one or more virtual machines (VMs). In some embodiments, a proxy operates on each host between each VM and the underlying network. For instance, in some of these embodiments, a VM's proxy operates between the VM and a physical forwarding element executing on the VM's host. The proxy monitors the VM's traffic, and intercepts broadcast packets when it knows how to deal with them. The proxy connects to a set of one or more controllers that provides a directory service that collects and maintains global information of the network. By connecting to the controller cluster, the proxy can obtain information that it can use to resolve broadcast requests. In some embodiments, the connection between the proxy and the controller cluster is encrypted and authenticated, to enhance the security. Also, in some embodiments, the connection is an indirect connection through an agent that executes on the host device and connects the proxies of the host device with the controller cluster. | 02-26-2015 |
20150103645 | CONTROLLER SIDE METHOD OF GENERATING AND UPDATING A CONTROLLER ASSIGNMENT LIST - Some embodiments provide a novel method for distributing control-channel communication load between multiple controllers in a network control system. In some embodiments, the controllers manage physical forwarding elements that forward data between several computing devices (also called hosts or host computers), some or all of which execute one or more virtual machines (VMs). The method of some embodiments distributes a controller assignment list to the host computers. The host computers use this list to identify the controllers with which they need to interact to perform some of the forwarding operations of their associated logical forwarding elements. In some embodiments, agents executing on the host computers (1) review the controller assignment list to identify the appropriate controllers, and (2) establish control channel communications with these controllers to obtain the needed data for effectuating the forwarding operations of their associated physical forwarding elements. These agents in some embodiments are responsible for out-of-band control channel communication with the controllers. | 04-16-2015 |
20150103661 | HOST SIDE METHOD OF USING A CONTROLLER ASSIGNMENT LIST - Some embodiments provide a novel method for distributing control-channel communication load between multiple controllers in a network control system. In some embodiments, the controllers manage physical forwarding elements that forward data between several computing devices (also called hosts or host computers), some or all of which execute one or more virtual machines (VMs). The method of some embodiments distributes a controller assignment list to the host computers. The host computers use this list to identify the controllers with which they need to interact to perform some of the forwarding operations of their associated logical forwarding elements. In some embodiments, agents executing on the host computers (1) review the controller assignment list to identify the appropriate controllers, and (2) establish control channel communications with these controllers to obtain the needed data for effectuating the forwarding operations of their associated physical forwarding elements. These agents in some embodiments are responsible for out-of-band control channel communication with the controllers. | 04-16-2015 |
20150280928 | REPLICATING BROADCAST, UNKNOWN-UNICAST, AND MULTICAST TRAFFIC IN OVERLAY LOGICAL NETWORKS BRIDGED WITH PHYSICAL NETWORKS - A novel method for performing replication of messages in a network that bridges one or more physical networks to an overlay logical network is provided. A physical gateway provides bridging between network nodes of a physical network and virtual machines in the overlay logical network by serving as an endpoint of the overlay logical network. The physical gateway does not replicate messages from the bridged physical network to destination endpoints in the overlay logical network directly, but instead tunnels the message-to-be-replicated to a designated tunnel endpoint in the overlay logical network. The designated tunnel endpoint in turn replicates the message that was tunneled to it to other endpoints in the overlay logical network. | 10-01-2015 |
20150341223 | AUTOMATIC PLACEMENT OF CLIENTS IN A DISTRIBUTED COMPUTER SYSTEM BASED ON AT LEAST PHYSICAL NETWORK TOPOLOGY INFORMATION - A management server and method for performing automatic placement of clients in a distributed computer system selects final client placement locations to place the clients from candidate client placement locations, where the placement requirements of the clients can be satisfied, based on at least physical network topology information of the distributed computer system. | 11-26-2015 |