logo
banner banner

Blog Details

Created with Pixso. Home Created with Pixso. Blog Created with Pixso.

What are the application methods of Bypass?

What are the application methods of Bypass?

2024-11-15

Generally, according to the control method or trigger method, Bypass can be divided into the following methods:

  1. Triggered by power supply. In this way, generally when the device is not powered on, the Bypass function is on. Once the device is powered on, Bypass is immediately adjusted to the off state.
  2. Controlled by GPIO. After entering the OS, specific ports can be operated through GPIO to realize the control of the Bypass switch.
  3. Controlled by Watchdog. This situation is actually an extended application of method 2. The enabling and disabling of the GPIO Bypass program can be controlled by Watchdog to realize the control of the Bypass state. After using this method, if the platform freezes, Bypass can be opened by Watchdog.

In practical applications, these three states often exist simultaneously, especially the first two methods.


The general application method is: In the case of power off, the device is in the Bypass on state. Then after the device is powered on, since the BIOS can operate on Bypass, after the BIOS takes over the device, Bypass is still in the on state. Then the OS starts. When the OS starts, generally the GPIO Bypass program will be executed to close Bypass, so that the application program can play a role. That is to say, during the entire startup process, there will hardly be any network disconnection. Only in the short 2-3 seconds from when the device is just powered on to when the BIOS takes over may the network be disconnected.


The role of the network intelligent switch is: mainly to protect against various network cascaded gateway devices from becoming single points of failure due to accidental failures (such as hardware failures, power failures, software deadlocks, etc.), or to provide favorable help when these gateway devices are upgraded and maintained, avoiding the time delay and network operation and maintenance management difficulties caused by manual network switching. It has become an indispensable solution for ensuring high availability of network operation.

banner
Blog Details
Created with Pixso. Home Created with Pixso. Blog Created with Pixso.

What are the application methods of Bypass?

What are the application methods of Bypass?

Generally, according to the control method or trigger method, Bypass can be divided into the following methods:

  1. Triggered by power supply. In this way, generally when the device is not powered on, the Bypass function is on. Once the device is powered on, Bypass is immediately adjusted to the off state.
  2. Controlled by GPIO. After entering the OS, specific ports can be operated through GPIO to realize the control of the Bypass switch.
  3. Controlled by Watchdog. This situation is actually an extended application of method 2. The enabling and disabling of the GPIO Bypass program can be controlled by Watchdog to realize the control of the Bypass state. After using this method, if the platform freezes, Bypass can be opened by Watchdog.

In practical applications, these three states often exist simultaneously, especially the first two methods.


The general application method is: In the case of power off, the device is in the Bypass on state. Then after the device is powered on, since the BIOS can operate on Bypass, after the BIOS takes over the device, Bypass is still in the on state. Then the OS starts. When the OS starts, generally the GPIO Bypass program will be executed to close Bypass, so that the application program can play a role. That is to say, during the entire startup process, there will hardly be any network disconnection. Only in the short 2-3 seconds from when the device is just powered on to when the BIOS takes over may the network be disconnected.


The role of the network intelligent switch is: mainly to protect against various network cascaded gateway devices from becoming single points of failure due to accidental failures (such as hardware failures, power failures, software deadlocks, etc.), or to provide favorable help when these gateway devices are upgraded and maintained, avoiding the time delay and network operation and maintenance management difficulties caused by manual network switching. It has become an indispensable solution for ensuring high availability of network operation.