US20010027521A1 - Automatic reconfiguration system for change in management servers - Google Patents
Automatic reconfiguration system for change in management servers Download PDFInfo
- Publication number
- US20010027521A1 US20010027521A1 US09/855,624 US85562401A US2001027521A1 US 20010027521 A1 US20010027521 A1 US 20010027521A1 US 85562401 A US85562401 A US 85562401A US 2001027521 A1 US2001027521 A1 US 2001027521A1
- Authority
- US
- United States
- Prior art keywords
- network
- personal computer
- server
- data
- destination address
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 230000008859 change Effects 0.000 title description 6
- 238000000034 method Methods 0.000 claims description 18
- 230000005540 biological transmission Effects 0.000 claims description 15
- 230000005055 memory storage Effects 0.000 claims description 6
- 238000012545 processing Methods 0.000 claims description 6
- 238000010200 validation analysis Methods 0.000 claims 1
- 238000012423 maintenance Methods 0.000 abstract description 8
- 238000007726 management method Methods 0.000 description 34
- 238000001514 detection method Methods 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 6
- 230000008569 process Effects 0.000 description 6
- 230000007246 mechanism Effects 0.000 description 5
- 238000010586 diagram Methods 0.000 description 4
- 238000012546 transfer Methods 0.000 description 4
- 230000006870 function Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 101100172132 Mus musculus Eif3a gene Proteins 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 238000013070 change management Methods 0.000 description 1
- 238000013480 data collection Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000002349 favourable effect Effects 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 238000004806 packaging method and process Methods 0.000 description 1
- 230000004224 protection Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 238000007493 shaping process Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0876—Aspects of the degree of configuration automation
- H04L41/0886—Fully automatic configuration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
- H04L41/0813—Configuration setting characterised by the conditions triggering a change of settings
- H04L41/0816—Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/065—Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/16—Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
- H04L69/161—Implementation details of TCP/IP or UDP/IP stack architecture; Specification of modified or new header fields
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/16—Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
- H04L69/164—Adaptation or special uses of UDP protocol
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/16—Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/22—Parsing or analysis of headers
Definitions
- the present invention relates to computer systems coupled to a network and more particularly to a system having logic to receive transmissions across a connection to a network to allow for automatically updating configuration information and system management parameters.
- a personal computer can typically be defined as a desktop, floor standing, or portable microcomputer that includes a system unit having a single central processing unit (CPU) and associated volatile and non-volatile memory, including random access memory (RAM) and basic input-output system read only memory (BIOS ROM), a system monitor, a keyboard, one or more flexible diskette drives, a CD-ROM drive, a fixed disk storage drive (also known as a “hard drive”), a “mouse” or pointing device, and an optional network interface adapter.
- CPU central processing unit
- BIOS ROM basic input-output system read only memory
- PCS being increasingly connected into networks to allow transfers of data among computers, more operations such as maintenance, updating of applications and data collections are occurring over the network.
- computers are also becoming more and more essential to their users, it is desirable to minimize loss of productivity by increasing the availability of PCS. This includes detection and reporting of intermittent failures on a system that will allow system administrators to schedule maintenance forthe PC at a convenient time.
- Alert technology such as IBM's Alert on LAN technology, which supports detection and reporting of failures over a network.
- Alert on LAN solution creates network alerts to provide event and status information to a network administrator.
- the technology detects and reports events such as operating system (OS) hang, POSTIBIOS error codes, and voltage and temperature problems.
- OS operating system
- IP Internet Protocol
- DMI Desktop Management Interface
- the task of re-configuring IP headers using DMI is accomplished by the following steps. First the management server must discover all the systems on the network. The management server can only do first time discovery of systems on the network if they are in full power on state running OS with a management application with DMI capabilities such as Intel's LANDesk Client Manger or IBM NetFinity. After the system is discovered it is placed into a database. Next the systems must be placed in a full-on power state, since DMI runs on the OS. This may be accomplished using Wake on LAN technology. Finally DMI is used to re-configure the IP header by sending commands to the Alert on LAN management application. This is a complicated and time consuming operation, given that several hundred machines are set up to send alerts to a single server. This mechanism also requires the system administrator to gain control of each system to accomplish the update.
- the present invention provides for such a mechanism and will update the IP address regardless of the power state, i.e., full-on, sleep, or off, of the client.
- the mechanism provides for an advantageous method for handling updates to groups of systems within a network.
- the present invention recognizes that by designing improved hardware reception capabilities in the computer. It is possible to reconfigure a system unit at a remote location without requiring DMI.
- the invention involves the recognition that a system normally, and for good reason, protects itself from being reconfigured remotely, and it is desirable to override these protections and have the computer automatically reconfigure based on a special packet from a management console.
- One embodiment of the present invention is directed to a method for detecting re-configuration packets from a management console and then updating hardware configuration.
- the system when necessary, is supplied with auxiliary power and is operative to receive and accept updates regardless of the system power state.
- the method includes providing a computer system connected to a management console via a data transmission network.
- the invention includes a detection scheme to recognize reconfiguration network packets.
- the invention further includes a scheme for the computer to handle re-configuration of subgroups of machines.
- the present invention recognizes that certain normal reconfiguration operations, that involve updating operations as opposed to initialization operations, are minor operations but nonetheless are expensive and time consuming because, for example, a service person must come to the site or use a time consuming process, such as employing DMI techniques to make the desired changes.
- the PCS can be controlled based on predefined network commands without requiring software intervention.
- Such “hardware” modifications can be performed by the network administrator without requiring a service call.
- an auxiliary processor that communicates with the network adapter and is always “on” as a result of trickle power, and it receives commands through a connection to the network through a portion of the network adapter, which is also trickle powered to always be “on.”
- the auxiliary processor listens for occasional signals, in network format, from the management console indicating a re-configuration request for action on the client. This allows the network manager to perform operations without a time consuming operation of reconfiguration which occurs using, for example, DMI or making a service call.
- the auxiliary processor provides the ability to selectively reconfigure hardware according to the invention, which results in making remote maintenance more effective.
- the signals are introduced to the network side of the “physical layer” of the network controller.
- the physical layer is the layer that provides the mechanical, electrical, functional and procedural means to establish, maintain and release physical connections over the transmission medium and it conditions the packet signal to analog form to send and receive over the physical connecting network that is the LAN.
- the PC stays active, preferably full time, and is able, on an ongoing basis, at a minimum, to monitor the network scanning for re-configuration packets.
- the network manager is made aware of the actual conditions at the client without loss of information due to a network circumstance or change in management consoles. A problem can be addressed while the machine is unattended and possibly before the user realizes a problem exists.
- FIG. 1 is a block diagram of a network arrangement suitable for implementation of the present invention
- FIG. 2 is a block diagram of a system client with network connection circuitry without the benefit of the present invention
- FIG. 3 is a block diagram of a system client with added logic, according to the principles of the present invention, coupled to the network connection circuitry for receiving and executing a command;
- FIG. 4 is a detailed block diagram of the LAN adapter from FIG. 3 and logic for the present invention.
- FIG. 5 is a diagrammatic representation of an exemplary packet of a LAN system based on an Ethernet specification
- FIG. 6 is a diagrammatic representation of the data area from FIG. 5 with details for reception according to the principles of the present invention.
- FIG. 7 is a flow chart indicating logic for generation of the transmitted-data packets of FIG. 5 which may be implemented as hard logic or by using a programmed general purpose processor.
- a network master 100 hereinafter sometimes referred to as management console, is connected to a hub 102 by a LAN connector bus 106 .
- Respective client stations or systems 104 illustrated as exemplary systems 104 A, 104 B and 104 C, are also connected to the hub 102 through respective LAN busses 106 .
- the preferred illustrated and exemplary form of network conforms to the Ethernet specification and uses such hubs. It will be appreciated however that other forms of networks, such as, but not limited to, Token-Ring are applicable to the present invention.
- a computer system suitable for use as a client station 104 to embody the present invention is indicated in FIG. 2.
- a central processing unit (CPU) 200 is connected by address, control and data busses 202 to a memory controller and PCI bus bridge chip 204 .
- System memory 206 is connected to the memory controller 204 .
- Connected to standard PCI expansion bus 208 are the memory controller PCI bridge chip 204 , IDE device controller 220 , PCI connector slots 210 , and a PCI bus to ISA bus bridge chip 212 which typically also includes power management logic.
- ISA standard expansion bus 214 with ISA expansion connector slots 216 is connected to bridge chip 212 . It will be appreciated that other expansion bus types may be used to permit expansion of the system with added devices and it is not necessary to have two expansion busses.
- an intelligent client station 104 there would normally be input devices and data storage devices such as a fixed and a floppy drive 222 and 224 , respectively.
- the fixed drive 222 is connected to IDE controller 220
- the floppy drive 224 is connected to I/O controller 218 .
- PCI-ISA bridge controller 212 includes an interface for Flash memory 242 , which contains microcode, which the system 104 executes upon power-on.
- the flash memory 242 is a non-volatile storage device which can be an electrically erasable programmable read only memory (EEPROM) module and includes BIOS that is used to interface between the 10 devices and operating system.
- PCI-ISA bridge controller 212 also contains CMOS which is used to store system configuration data. That is, the CMOS will contain values which describe the present configuration of the system 104 . For example, CMOS contains information describing the list of IPL devices set by a user and the sequence to be used for a particular power method, the type of display, the amount of memory, time, date, etc. Furthermore, these data are stored in CMOS whenever a special configuration program, such as configuration/setup is executed.
- PCI-ISA bridge controller 212 is supplied power from battery 244 to prevent loss of configuration data in CMOS.
- a client system 104 has a network adapter 230 , which may, for example, be plugged into one of the connector slots 210 or in the alternative could connected to ISA slot 216 or embedded on the planar such as in the video.
- the client system 104 is shown with a special power supply 240 which supplies full normal system power and has a auxiliary power Aux 5 which supplies full time power to the power management logic 212 and the network adapter 230 . This enables the system, as is known, to respond to a wakeup signal from network adapter 230 and power up the system.
- the network adapter 230 consists of a physical layer 234 and a media access controller (MAC) 232 connected through the MII (media independent interface) local bus.
- MII media independent interface
- the MAC 232 serves as an interface between a shared data path, i.e., the MII, and the PCI bus 208 .
- the MAC 232 performs a number of functions in the transmission and reception of data packets. For example, during the transmission of data, the MAC 232 assembles the data to be transmitted into a packet with address and error detection fields. Conversely, during the reception of a packet, the MAC 232 disassembles the packet and performs address checking and error detection.
- the MAC 232 typically performs encoding/decoding of digital signals transmitted over the shared path and performs preamble generation/removal, as well as bit transmission/reception.
- the MAC 232 may be an Intel 82557 chip.
- the MII bus is a specification of signals and protocols which formalizes the interfacing of a 10/100 Mbps Ethernet Media Access Controller (MAC) 232 to the underlying physical layer 234 .
- the physical layer 234 conditions analog signals to go out to the network for example, an Ethernet network over an RJ45 connector 236 , as is well known.
- the physical layer 234 can be a fully integrated device supporting 10 and 100 Mb/s CSMA/CD Ethernet applications.
- the physical layer 234 receives parallel data from the MII local bus and converts it to serial data for transmission through the connector 236 and over the cable network.
- the physical layer 234 is also responsible for wave shaping and provides analog voltages to the network.
- the physical layer can be, for example, an Integrated Circuits Systems chip No. 1890.
- the physical layer 232 includes auto-negotiation logic that serves three main purposes. First it determines the capabilities of the main computer, second it advertises its own capabilities to the main computer, and thirdly it establishes a connection with the main computer using the highest performance connection technology. The physical layer 232 also provides a LINK status signal that reflects the current link status. The output of the LINK signal is low when a valid link exists between the system 104 and the main computer 100 .
- the media access controller (MAC) 232 processes the network signals in digital form and connects to the PCI bus 208 .
- the network adapter 230 may be added as an adapter card (as shown) or implemented directly on the system motherboard. To support wake-up operation, in the illustration of FIG. 2, it is powered from the full time auxiliary line Aux 5 .
- the illustrated exemplary client system 104 of FIG. 3 incorporates a specially modified network adapter 231 with a logic module 300° according to the principles of the present invention, connected at the MI bus that extends between the physical layer 234 and the MAC 232 .
- This logic may be a “hard wired” application specific integrated circuit (ASIC) or a programmed general-purpose processor which is programmed as more fully described hereinbelow.
- ASIC application specific integrated circuit
- the invention is using hardware to handle a very limited number of predefined packets that are created and decoded by hardware.
- the logic 300 accepts data from the physical layer 234 and provides updated configuration information stored in EEPROM 302 , a non-volatile memory storage device. With the trickle power supplied on bus Aux 5 . of power supply 240 , the logic 231 is preferably powered full time.
- Management ASIC 300 is connected to bridge controller 212 via the System Management (SM) bus 310 . This provides a path to allow software running on PC 104 to access the management ASIC 300 and the EEPROM 302 .
- SM System Management
- FIG. 4 Component modules of the logic module 300 are indicated in FIG. 4. Signals are received from the MII bus by interface unit 414 and passed to RX (reception) FIFO (first-in-first-out) 410 .
- Micro controller 402 coordinates the processing of information according to the principles of the present invention.
- the micro controller 402 accesses EEPROM 302 through interface control lines 411 to EEPROM interface 420 to obtain values to create network packets such as source and destination MAC address, IP protocol information, authentication headers and Universal Data Packet headers.
- EEPROM 302 retains the universal identifier (UUID) for the client system 104 and the unique system data.
- UUID universal identifier
- UUID stands for Universal Unique Identifier which is a part of Microsoft's PC98 specification and provides a unique number for every PC.
- the system unique data would be that data which defaults for alerts enabled/disabled, timers for watchdogs and system and group keys for the client PC.
- the micro controller 402 consists of several state machines to handle the following tasks: packet reception, packet transmission, SM bus interface transmission and EEPROM updates.
- the micro controller 402 sends commands to FIFO control 412 to control data flow from TX (transmission) FIFO 408 and RX FIFO 410 .
- Them micro controller 402 also responds to a SM bus 310 request from software running on a PC 104 to access Register Status 416 or access EEPROM 302 .
- the micro controller 402 processes the data in the packet according to the invention and determines whether the packet is a standard data packet or a management packet.
- a defined packet is the result of updating with the values in non-volatile EEPROM 302 .
- the micro controller 402 responds to the management console 100 to indicate completion of updates by sending a response message by sending a packet to TX FIFO 408 which transfers the packet to Mil bus Interface 414 and then on to physical layer 234 over the MII bus.
- the network header 510 includes a MAC header 500 , an IP header 502 , Authentication header 504 , and UDP header 506 , and is known to provide addresses, identifiers and other information for assuring correct transfer.
- the data packet 508 includes the information content to be transferred.
- the straight Magic Packet or Configuration ID 600 has, as shown in FIG. 6, content known as 6 bytes of FFh followed by 12 copies of client MAC address.
- the network manager 100 may send commands to logic module 300 .
- Logic module 300 in system 104 determines if the command is directed to that client. For the present embodiment with a simplified description, the command is limited to a change in IP address or network address of the management console 100 .
- the data patterns are preferably followed.
- the data field is checked for configuration packet by determining if it contains Configuration ID, which consists of UUID and Old Servers IP, MAC, and UDP Port.
- Configuration ID which consists of UUID and Old Servers IP, MAC, and UDP Port.
- the data field of Configuration Data 602 contains the information required for the update, such as System key, Group Key, New Server IP, New Server MAC, and New UDP Port. The field could contain the new values.
- the micro controller 402 in logic 300 transfers the contents of the new header to Fe non-volatile storage or EEPROM 302 .
- the data portion of the Data Packet 508 contains two areas of data.
- the first field is the Configuration ID field 600 of FIG. 6.
- the Configuration ID 600 field contains the UUID of the client machine for the current old, or existing management servers network address which consists of IP, MAC, and UDP port assignment.
- the micro controller 402 inspects that data and compares it against the values stored in EEPROM 302 to ensure a match between the information in Configuration ID 600 and the current management server.
- the micro controller 402 inspects the data contents of 10 configuration data 602 to the command applied to client 104 . Even though the management server 100 sends a command to all clients on the network, the command may only be intended for a group of clients. This is handled by two additional match fields, the system key and the group key. The system and group keys are “pseudo passwords” for client 104 for addressing the machine uniquely or as part of a group of systems. If a match occurs the micro controller 402 takes the new values for the management server 100 (IP, MAC, and UDP port) from configuration data 602 and updates EEPROM 302 .
- the packet format can be implemented as follows for an Ethernet packet: Bytes (Hex) Description 1-29 ⁇ Ethernet/IP/UDP Headers> 2A-2F Old Server MAC Address 30-33 Old Server IP Address 34-39 New Server MAC Address 3A-3D New Server IP Address. 3E-3F New Server UDP Port
- Another option for updating is the use of authentication keys.
- the Alert on LAN is setup with two Authentication Keys.
- the first key is unique to each machine and the second key is typically set the same for a group of systems which could, for example, be in the same building, on the same floor, serving the same function, etc.)
- This provides the flexibility to modify the IP address on an individual client basis or as a group of clients.
- the packet contains these keys and the new server addresses.
- the hardware will compare the authentication keys sent from the server to the keys located in the Alert On LAN EEPROM. When updating an individual machine, the group key is left blank, and when updating a group of machines, the individual machine key is left blank.
- the packet format can be implemented as follows, for example, for an Ethernet packet: Bytes (Hex) Description 1-29 ⁇ Ethernet/IP/UDP Headers> 30-3F Authentication key (for individual) 40-4F Authentication key (for group) 50-55 New Server MAC Address 56-59 New Server IP Address. 5A-5B New Server UDP
- Security for either option for updating can be implemented using a TCP/IP Authentication Header (AH) or an Encapsulating Security Payload (ESP) Header detailed in RFC 1825.
- AH TCP/IP Authentication Header
- ESP Encapsulating Security Payload
- the management ASIC would also be equipped to interpret the Header and decode the data.
- step 700 there is illustrated the process, starting at step 700 , used by micro controller 402 in implementing attributes of the invention.
- the micro controller 402 waits for a packet and upon receiving one, at step 704 , checks to determine authentication of encrypted data in the packet. Only authenticated packets are used to change management server parameters to eliminate concern of an unauthorized user or hacker entering or damaging the network. Non authenticated packets are assumed to be data and sent to OS at step 714 . Packets authenticated at steps 706 , 708 and 710 , are then checked to determine if they contain valid data at step 712 . For authentication, first the security load parameter is done at step 706 and the sequence number is loaded at step 708 . The next measure, at step 710 , is decrypting the authenticated packet. Once authentication is complete, at step 712 , invalid data is ignored and valid data is checked for a configuration packet at step 720 .
- Configuration packets are determined by checking for Configuration ID 600 and Configuration Data 602 . If the packet is not a configuration packet, the packet is assumed to be an encrypted data packet and the data is sent to OS at step 714 . Configuration packets are checked for a system key match at step 724 and for a group key match at step 726 . If a system key match is confirmed at step 724 , the steps of 728 , 729 and 730 follow, if no system key match is found then at step 726 a check is made for a group key match. If a group key match is confirmed than the exemplary steps of 728 . 730 and 732 are carried out for the group of the client systems. The system key and group key are contained in EEPROM 302 . If a match is found, then new configuration data (Server IP, MAC, Port) are pulled from the Configuration Data packet 602 at step 728 , as stated. The EEPROM is updated at step 730 and then the new configuration is applied at step 732 .
- EEPROM
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Automation & Control Theory (AREA)
- Small-Scale Networks (AREA)
Abstract
Description
- Application Ser. No. ______ concurrently filed herewith and entitled “INTERACTIVE SYSTEM SUPPORT USING A SYSTEM MANAGEMENT ASIC.”
- 1. Field of the Invention
- The present invention relates to computer systems coupled to a network and more particularly to a system having logic to receive transmissions across a connection to a network to allow for automatically updating configuration information and system management parameters.
- 2. Description of Related Art
- Personal computer systems are well known in the art. Personal computer systems have attained widespread use for providing computer power to many segments of modern society. A personal computer (PC) can typically be defined as a desktop, floor standing, or portable microcomputer that includes a system unit having a single central processing unit (CPU) and associated volatile and non-volatile memory, including random access memory (RAM) and basic input-output system read only memory (BIOS ROM), a system monitor, a keyboard, one or more flexible diskette drives, a CD-ROM drive, a fixed disk storage drive (also known as a “hard drive”), a “mouse” or pointing device, and an optional network interface adapter. One of the distinguishing characteristics of such a system is the use of a motherboard or system planar to electrically or operationally connect these components together. Examples of such PCS are computer systems within IBM's
PC 300 series and IBM's IntelliStation Series. The PC of the before referenced related patent document Serial No. 104835 identified in the illustration of FIG. 3 thereof and as described in the patent document specification thereof, is an example of a typical client computer system. - With PCS being increasingly connected into networks to allow transfers of data among computers, more operations such as maintenance, updating of applications and data collections are occurring over the network. As computers are also becoming more and more essential to their users, it is desirable to minimize loss of productivity by increasing the availability of PCS. This includes detection and reporting of intermittent failures on a system that will allow system administrators to schedule maintenance forthe PC at a convenient time.
- In addition, the immediate detection and reporting of an inoperable PC is required, since it has an immediate impact to productivity. There is no reason to wait until employees arrive on the next working day to discover that the machine failed yesterday or over the weekend.
- One solution to this problem has been alert technology, such as IBM's Alert on LAN technology, which supports detection and reporting of failures over a network. Alert on LAN solution creates network alerts to provide event and status information to a network administrator. The technology detects and reports events such as operating system (OS) hang, POSTIBIOS error codes, and voltage and temperature problems.
- When the client systems are deployed, the network administrator must configure the alerts supported and the TCP/IP Internet Protocol (IP) information for the administrators management console This information is then stored in a non-volatile EEPROM in the client system.
- It is normal to custom configure the system unit of a computer system for a user at a corporate configuration center or at the user site. When done at a configuration center the resources and skills needed are available, but the computer must be removed from the packaging, set up, configured with BIOS and a program image, and configured to support system management applications such as Alert on LAN and then repackaged to be sent to the end user. At the time of configuration, the final location or owner of the system may not be known. Therefore at the time of configuration the IP address of management server is not possible, given that most networks have several management consoles. The missing critical pieces of information will require re-configuration at the final location.
- At the user site, roll out and updating of systems is a less efficient use of resources but avoids the determining-final-location problem. For complex system management program images, it may be necessary to send out a skilled configuration expert thus consuming time when the expert's valuable skills could otherwise be put to use, as the expert travels to the user site.
- Accordingly, a number of methods have been developed for simplifying the remote 15 configuration of computer systems. For example, the Desktop Management Interface (DMI) industry standard provides a mechanism to retrieve and update remotely from a client personal computer. The DMI technology is widely used in standard system management applications such as Intel's LANDesk programs and IBM's NetFinity program.
- The task of re-configuring IP headers using DMI is accomplished by the following steps. First the management server must discover all the systems on the network. The management server can only do first time discovery of systems on the network if they are in full power on state running OS with a management application with DMI capabilities such as Intel's LANDesk Client Manger or IBM NetFinity. After the system is discovered it is placed into a database. Next the systems must be placed in a full-on power state, since DMI runs on the OS. This may be accomplished using Wake on LAN technology. Finally DMI is used to re-configure the IP header by sending commands to the Alert on LAN management application. This is a complicated and time consuming operation, given that several hundred machines are set up to send alerts to a single server. This mechanism also requires the system administrator to gain control of each system to accomplish the update.
- The time required to update each system unfortunately provides an opportunity for loss of information, since information sent by a client, prior to being reconfigured to the new server, is lost. There is a potential significant down-time when there is a change in server due to a crash or network issue. Each client system must be reconfigured with the IP address of the new management server. In the case of routine maintenance, it is possible to avoid loss of information, but the reconfiguration process is very time consuming and potentially disruptive to operation on the client.
- What is needed is a robust and effective mechanism to update the destination IP address in the client PCS to point to the new server. The present invention provides for such a mechanism and will update the IP address regardless of the power state, i.e., full-on, sleep, or off, of the client. In addition, the mechanism provides for an advantageous method for handling updates to groups of systems within a network.
- The present invention recognizes that by designing improved hardware reception capabilities in the computer. It is possible to reconfigure a system unit at a remote location without requiring DMI. The invention involves the recognition that a system normally, and for good reason, protects itself from being reconfigured remotely, and it is desirable to override these protections and have the computer automatically reconfigure based on a special packet from a management console.
- One embodiment of the present invention is directed to a method for detecting re-configuration packets from a management console and then updating hardware configuration. The system, when necessary, is supplied with auxiliary power and is operative to receive and accept updates regardless of the system power state. The method includes providing a computer system connected to a management console via a data transmission network. The invention includes a detection scheme to recognize reconfiguration network packets. The invention further includes a scheme for the computer to handle re-configuration of subgroups of machines.
- The present invention recognizes that certain normal reconfiguration operations, that involve updating operations as opposed to initialization operations, are minor operations but nonetheless are expensive and time consuming because, for example, a service person must come to the site or use a time consuming process, such as employing DMI techniques to make the desired changes. By so modifying the reconfiguration process, the PCS can be controlled based on predefined network commands without requiring software intervention. Such “hardware” modifications can be performed by the network administrator without requiring a service call.
- While remote wakeup of client systems has made the network manager's support of client systems more convenient, it is limited in that it requires software applications running at the client for maintenance operations or updates. Related patent application Ser. No. 09/024,231 describes logic for responding to status information queries from a main computer over the network.
- According to the present invention, included is an auxiliary processor that communicates with the network adapter and is always “on” as a result of trickle power, and it receives commands through a connection to the network through a portion of the network adapter, which is also trickle powered to always be “on.” The auxiliary processor listens for occasional signals, in network format, from the management console indicating a re-configuration request for action on the client. This allows the network manager to perform operations without a time consuming operation of reconfiguration which occurs using, for example, DMI or making a service call. Hence while there is a service call normally required to change IP settings, the auxiliary processor provides the ability to selectively reconfigure hardware according to the invention, which results in making remote maintenance more effective.
- According to a preferred implementation, the signals are introduced to the network side of the “physical layer” of the network controller. The physical layer is the layer that provides the mechanical, electrical, functional and procedural means to establish, maintain and release physical connections over the transmission medium and it conditions the packet signal to analog form to send and receive over the physical connecting network that is the LAN. By so configuring the packet to have the characteristics of a standard packet, it passes through the network as if a normal packet is received by the client.
- It is recognized, by the invention, that additional commands and other information are to be received from the network manager to provide increased remote maintenance support, but that it is not desirable to change from existing PC network structures and protocols and the major installed infrastructure of PC networks. According to the invention, low power logic is provided that is always active and simulates normal network data traffic (e.g., Ethernet format) normally sent from and received by the client system.
- The PC stays active, preferably full time, and is able, on an ongoing basis, at a minimum, to monitor the network scanning for re-configuration packets. By so maintaining the ability to respond immediately to changes in management consoles at the client, the network manager is made aware of the actual conditions at the client without loss of information due to a network circumstance or change in management consoles. A problem can be addressed while the machine is unattended and possibly before the user realizes a problem exists.
- FIG. 1 is a block diagram of a network arrangement suitable for implementation of the present invention;
- FIG. 2 is a block diagram of a system client with network connection circuitry without the benefit of the present invention;
- FIG. 3 is a block diagram of a system client with added logic, according to the principles of the present invention, coupled to the network connection circuitry for receiving and executing a command;
- FIG. 4 is a detailed block diagram of the LAN adapter from FIG. 3 and logic for the present invention;
- FIG. 5 is a diagrammatic representation of an exemplary packet of a LAN system based on an Ethernet specification;
- FIG. 6 is a diagrammatic representation of the data area from FIG. 5 with details for reception according to the principles of the present invention; and
- FIG. 7 is a flow chart indicating logic for generation of the transmitted-data packets of FIG. 5 which may be implemented as hard logic or by using a programmed general purpose processor.
- While the present invention is described more fully hereinafter with reference to the accompanying drawings, in which a preferred embodiment and exemplary illustrations of the present invention is shown, it is to be understood, that with regard to the description of the specification and figures, that persons of ordinary skill in the appropriate arts may modify the invention herein described while still achieving the favorable results of this invention. Accordingly, the description which follows is to be understood as being a broad teaching disclosure directed to persons of ordinary skill in the appropriate arts, and not as limiting upon the present invention.
- Referring to FIG. 1, a
network master 100, hereinafter sometimes referred to as management console, is connected to ahub 102 by aLAN connector bus 106. Respective client stations or systems 104, illustrated asexemplary systems hub 102 through respective LAN busses 106. The preferred illustrated and exemplary form of network conforms to the Ethernet specification and uses such hubs. It will be appreciated however that other forms of networks, such as, but not limited to, Token-Ring are applicable to the present invention. - A computer system suitable for use as a client station104 to embody the present invention is indicated in FIG. 2. A central processing unit (CPU) 200 is connected by address, control and
data busses 202 to a memory controller and PCIbus bridge chip 204.System memory 206 is connected to thememory controller 204. Connected to standardPCI expansion bus 208 are the memory controllerPCI bridge chip 204,IDE device controller 220,PCI connector slots 210, and a PCI bus to ISAbus bridge chip 212 which typically also includes power management logic. ISAstandard expansion bus 214 with ISAexpansion connector slots 216 is connected to bridgechip 212. It will be appreciated that other expansion bus types may be used to permit expansion of the system with added devices and it is not necessary to have two expansion busses. - In an intelligent client station104 there would normally be input devices and data storage devices such as a fixed and a
floppy drive fixed drive 222 is connected toIDE controller 220, whereas thefloppy drive 224 is connected to I/O controller 218. - PCI-
ISA bridge controller 212 includes an interface forFlash memory 242, which contains microcode, which the system 104 executes upon power-on. Theflash memory 242 is a non-volatile storage device which can be an electrically erasable programmable read only memory (EEPROM) module and includes BIOS that is used to interface between the 10 devices and operating system. PCI-ISA bridge controller 212 also contains CMOS which is used to store system configuration data. That is, the CMOS will contain values which describe the present configuration of the system 104. For example, CMOS contains information describing the list of IPL devices set by a user and the sequence to be used for a particular power method, the type of display, the amount of memory, time, date, etc. Furthermore, these data are stored in CMOS whenever a special configuration program, such as configuration/setup is executed. PCI-ISA bridge controller 212 is supplied power frombattery 244 to prevent loss of configuration data in CMOS. - A client system104 has a
network adapter 230, which may, for example, be plugged into one of theconnector slots 210 or in the alternative could connected toISA slot 216 or embedded on the planar such as in the video. The client system 104 is shown with aspecial power supply 240 which supplies full normal system power and has aauxiliary power Aux 5 which supplies full time power to thepower management logic 212 and thenetwork adapter 230. This enables the system, as is known, to respond to a wakeup signal fromnetwork adapter 230 and power up the system. Thenetwork adapter 230 consists of aphysical layer 234 and a media access controller (MAC) 232 connected through the MII (media independent interface) local bus. TheMAC 232 serves as an interface between a shared data path, i.e., the MII, and thePCI bus 208. TheMAC 232 performs a number of functions in the transmission and reception of data packets. For example, during the transmission of data, theMAC 232 assembles the data to be transmitted into a packet with address and error detection fields. Conversely, during the reception of a packet, theMAC 232 disassembles the packet and performs address checking and error detection. In addition, theMAC 232 typically performs encoding/decoding of digital signals transmitted over the shared path and performs preamble generation/removal, as well as bit transmission/reception. As an example, theMAC 232 may be an Intel 82557 chip. - The MII bus is a specification of signals and protocols which formalizes the interfacing of a 10/100 Mbps Ethernet Media Access Controller (MAC)232 to the underlying
physical layer 234. Thephysical layer 234 conditions analog signals to go out to the network for example, an Ethernet network over anRJ45 connector 236, as is well known. For example, thephysical layer 234 can be a fully integrated device supporting 10 and 100 Mb/s CSMA/CD Ethernet applications. Thephysical layer 234 receives parallel data from the MII local bus and converts it to serial data for transmission through theconnector 236 and over the cable network. Thephysical layer 234 is also responsible for wave shaping and provides analog voltages to the network. The physical layer can be, for example, an Integrated Circuits Systems chip No. 1890. Thephysical layer 232 includes auto-negotiation logic that serves three main purposes. First it determines the capabilities of the main computer, second it advertises its own capabilities to the main computer, and thirdly it establishes a connection with the main computer using the highest performance connection technology. Thephysical layer 232 also provides a LINK status signal that reflects the current link status. The output of the LINK signal is low when a valid link exists between the system 104 and themain computer 100. - The media access controller (MAC)232 processes the network signals in digital form and connects to the
PCI bus 208. Thenetwork adapter 230, it should be appreciated, may be added as an adapter card (as shown) or implemented directly on the system motherboard. To support wake-up operation, in the illustration of FIG. 2, it is powered from the full timeauxiliary line Aux 5. - The illustrated exemplary client system104 of FIG. 3 incorporates a specially modified
network adapter 231 with alogic module 300° according to the principles of the present invention, connected at the MI bus that extends between thephysical layer 234 and theMAC 232. This logic may be a “hard wired” application specific integrated circuit (ASIC) or a programmed general-purpose processor which is programmed as more fully described hereinbelow. By so connecting thelogic 300 at the MII bus, it can send and receive network packets using thephysical layer 234. The invention is using hardware to handle a very limited number of predefined packets that are created and decoded by hardware. This approach bypasses the software stack and allows the ASIC to send and receive UDP (User Datagram Protocol) datagrams thru the physical layer. Thelogic 300, according to the invention, accepts data from thephysical layer 234 and provides updated configuration information stored inEEPROM 302, a non-volatile memory storage device. With the trickle power supplied onbus Aux 5. ofpower supply 240, thelogic 231 is preferably powered full time.Management ASIC 300 is connected to bridgecontroller 212 via the System Management (SM)bus 310. This provides a path to allow software running on PC 104 to access themanagement ASIC 300 and theEEPROM 302. The principles taught could be applied to integrated MAC-PHY solutions such as Intel product device #82558, or integrated MAC-PHY Management ASIC solutions. - Component modules of the
logic module 300 are indicated in FIG. 4. Signals are received from the MII bus byinterface unit 414 and passed to RX (reception) FIFO (first-in-first-out) 410.Micro controller 402 coordinates the processing of information according to the principles of the present invention. Themicro controller 402 accessesEEPROM 302 throughinterface control lines 411 toEEPROM interface 420 to obtain values to create network packets such as source and destination MAC address, IP protocol information, authentication headers and Universal Data Packet headers. FurthermoreEEPROM 302 retains the universal identifier (UUID) for the client system 104 and the unique system data. UUID stands for Universal Unique Identifier which is a part of Microsoft's PC98 specification and provides a unique number for every PC. The system unique data would be that data which defaults for alerts enabled/disabled, timers for watchdogs and system and group keys for the client PC. - The
micro controller 402 consists of several state machines to handle the following tasks: packet reception, packet transmission, SM bus interface transmission and EEPROM updates. Themicro controller 402 sends commands toFIFO control 412 to control data flow from TX (transmission)FIFO 408 andRX FIFO 410. Them micro controller402 also responds to aSM bus 310 request from software running on a PC 104 to accessRegister Status 416 oraccess EEPROM 302. - When a network packet is received the
micro controller 402 processes the data in the packet according to the invention and determines whether the packet is a standard data packet or a management packet. In the preferred embodiment of the invention, a defined packet is the result of updating with the values innon-volatile EEPROM 302. Themicro controller 402 responds to themanagement console 100 to indicate completion of updates by sending a response message by sending a packet toTX FIFO 408 which transfers the packet toMil bus Interface 414 and then on tophysical layer 234 over the MII bus. - A standard packet including a network header and data packet, as might be sent over an Ethernet network, is indicated in FIG. 5. The
network header 510 includes aMAC header 500, anIP header 502,Authentication header 504, andUDP header 506, and is known to provide addresses, identifiers and other information for assuring correct transfer. Thedata packet 508 includes the information content to be transferred. For reception, the straight Magic Packet orConfiguration ID 600 has, as shown in FIG. 6, content known as 6 bytes of FFh followed by 12 copies of client MAC address. With the special extensions,Configuration ID 600 andConfiguration Data 602, thenetwork manager 100 may send commands tologic module 300.Logic module 300 in system 104 determines if the command is directed to that client. For the present embodiment with a simplified description, the command is limited to a change in IP address or network address of themanagement console 100. - For the reception of packets received by
logic module 300, the data patterns, according to the principles of the present invention, indicated in FIG. 6 are preferably followed. The data field is checked for configuration packet by determining if it contains Configuration ID, which consists of UUID and Old Servers IP, MAC, and UDP Port. The data field ofConfiguration Data 602 contains the information required for the update, such as System key, Group Key, New Server IP, New Server MAC, and New UDP Port. The field could contain the new values. Themicro controller 402 inlogic 300 transfers the contents of the new header to Fe non-volatile storage orEEPROM 302. - As hereinbefore stated, the data portion of the
Data Packet 508 contains two areas of data. In the preferred embodiment, the first field is theConfiguration ID field 600 of FIG. 6. TheConfiguration ID 600 field contains the UUID of the client machine for the current old, or existing management servers network address which consists of IP, MAC, and UDP port assignment. Themicro controller 402 inspects that data and compares it against the values stored inEEPROM 302 to ensure a match between the information inConfiguration ID 600 and the current management server. - When a match occurs, the
micro controller 402 inspects the data contents of 10configuration data 602 to the command applied to client 104. Even though themanagement server 100 sends a command to all clients on the network, the command may only be intended for a group of clients. This is handled by two additional match fields, the system key and the group key. The system and group keys are “pseudo passwords” for client 104 for addressing the machine uniquely or as part of a group of systems. If a match occurs themicro controller 402 takes the new values for the management server 100 (IP, MAC, and UDP port) fromconfiguration data 602 andupdates EEPROM 302. - The packet format can be implemented as follows for an Ethernet packet:
Bytes (Hex) Description 1-29 <Ethernet/IP/UDP Headers> 2A-2F Old Server MAC Address 30-33 Old Server IP Address 34-39 New Server MAC Address 3A-3D New Server IP Address. 3E-3F New Server UDP Port - Another option for updating is the use of authentication keys. During the initial configuration or roll out, the Alert on LAN is setup with two Authentication Keys. The first key is unique to each machine and the second key is typically set the same for a group of systems which could, for example, be in the same building, on the same floor, serving the same function, etc.) This provides the flexibility to modify the IP address on an individual client basis or as a group of clients. The packet contains these keys and the new server addresses. The hardware will compare the authentication keys sent from the server to the keys located in the Alert On LAN EEPROM. When updating an individual machine, the group key is left blank, and when updating a group of machines, the individual machine key is left blank. Using Authentication Keys, the packet format can be implemented as follows, for example, for an Ethernet packet:
Bytes (Hex) Description 1-29 <Ethernet/IP/UDP Headers> 30-3F Authentication key (for individual) 40-4F Authentication key (for group) 50-55 New Server MAC Address 56-59 New Server IP Address. 5A-5B New Server UDP - Security for either option for updating can be implemented using a TCP/IP Authentication Header (AH) or an Encapsulating Security Payload (ESP) Header detailed in RFC 1825. The management ASIC would also be equipped to interpret the Header and decode the data.
- Referring to FIG. 7, there is illustrated the process, starting at
step 700, used bymicro controller 402 in implementing attributes of the invention. Themicro controller 402, atstep 702, waits for a packet and upon receiving one, atstep 704, checks to determine authentication of encrypted data in the packet. Only authenticated packets are used to change management server parameters to eliminate concern of an unauthorized user or hacker entering or damaging the network. Non authenticated packets are assumed to be data and sent to OS atstep 714. Packets authenticated atsteps step 712. For authentication, first the security load parameter is done atstep 706 and the sequence number is loaded atstep 708. The next measure, atstep 710, is decrypting the authenticated packet. Once authentication is complete, atstep 712, invalid data is ignored and valid data is checked for a configuration packet atstep 720. - Configuration packets are determined by checking for
Configuration ID 600 andConfiguration Data 602. If the packet is not a configuration packet, the packet is assumed to be an encrypted data packet and the data is sent to OS atstep 714. Configuration packets are checked for a system key match atstep 724 and for a group key match atstep 726. If a system key match is confirmed atstep 724, the steps of 728,729 and 730 follow, if no system key match is found then at step 726 a check is made for a group key match. If a group key match is confirmed than the exemplary steps of 728.730 and 732 are carried out for the group of the client systems. The system key and group key are contained inEEPROM 302. If a match is found, then new configuration data (Server IP, MAC, Port) are pulled from theConfiguration Data packet 602 atstep 728, as stated. The EEPROM is updated atstep 730 and then the new configuration is applied atstep 732. - The invention has been described with reference to preferred implementations thereof, but it will be appreciated that variations and modifications within the scope of the claimed invention will be suggested to those skilled in the art. For example, the invention may be implemented on networks other than Ethernet networks such as token ring networks or used to control other aspects of a system.
Claims (20)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/855,624 US20010027521A1 (en) | 1998-10-01 | 2001-05-14 | Automatic reconfiguration system for change in management servers |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/164,657 US6353854B1 (en) | 1998-10-01 | 1998-10-01 | Automatic reconfiguration system for change in management servers having protocol destination addresses |
US09/855,624 US20010027521A1 (en) | 1998-10-01 | 2001-05-14 | Automatic reconfiguration system for change in management servers |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/164,657 Division US6353854B1 (en) | 1998-10-01 | 1998-10-01 | Automatic reconfiguration system for change in management servers having protocol destination addresses |
Publications (1)
Publication Number | Publication Date |
---|---|
US20010027521A1 true US20010027521A1 (en) | 2001-10-04 |
Family
ID=22595488
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/164,657 Expired - Lifetime US6353854B1 (en) | 1998-10-01 | 1998-10-01 | Automatic reconfiguration system for change in management servers having protocol destination addresses |
US09/855,624 Abandoned US20010027521A1 (en) | 1998-10-01 | 2001-05-14 | Automatic reconfiguration system for change in management servers |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/164,657 Expired - Lifetime US6353854B1 (en) | 1998-10-01 | 1998-10-01 | Automatic reconfiguration system for change in management servers having protocol destination addresses |
Country Status (1)
Country | Link |
---|---|
US (2) | US6353854B1 (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040059931A1 (en) * | 2002-09-20 | 2004-03-25 | International Business Machines Corporation | Pluggable trust adapter architecture, method and program product for processing communications |
US20040078583A1 (en) * | 2002-10-18 | 2004-04-22 | Hitachi, Ltd. | Storage device and method of setting configuration information of same |
US20060200673A1 (en) * | 2005-03-03 | 2006-09-07 | Interdigital Technology Corporation | Using watermarking to reduce communication overhead |
US20060271647A1 (en) * | 2005-05-11 | 2006-11-30 | Applied Voice & Speech Tech., Inc. | Messaging system configurator |
US20080215752A1 (en) * | 2005-11-18 | 2008-09-04 | Huawei Technologies Co., Ltd. | Service device, and switching network and switching method for the same |
US20090164480A1 (en) * | 2007-12-19 | 2009-06-25 | Antti Lappetelainen | Methods, apparatus and computer program product for altering device functionality |
US9906366B1 (en) * | 2017-04-07 | 2018-02-27 | At&T Mobility Ii Llc | Service provider based security in a wireless network |
Families Citing this family (35)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100223601B1 (en) * | 1997-05-29 | 1999-10-15 | 윤종용 | Lcd device |
US6513129B1 (en) * | 1999-06-30 | 2003-01-28 | Objective Systems Integrators, Inc. | System and method for managing faults using a gateway |
US7206833B1 (en) | 1999-09-30 | 2007-04-17 | Intel Corporation | Platform independent alert detection and management |
US7318089B1 (en) | 1999-09-30 | 2008-01-08 | Intel Corporation | Method and apparatus for performing network-based control functions on an alert-enabled managed client |
US6922722B1 (en) * | 1999-09-30 | 2005-07-26 | Intel Corporation | Method and apparatus for dynamic network configuration of an alert-based client |
US6839830B2 (en) * | 2000-03-01 | 2005-01-04 | Realtek Semiconductor Corporation | Logical pipeline for data communications system |
US7000012B2 (en) | 2000-04-24 | 2006-02-14 | Microsoft Corporation | Systems and methods for uniquely identifying networks by correlating each network name with the application programming interfaces of transport protocols supported by the network |
US7000015B2 (en) * | 2000-04-24 | 2006-02-14 | Microsoft Corporation | System and methods for providing physical location information and a location method used in discovering the physical location information to an application on a computing device |
US6782422B1 (en) * | 2000-04-24 | 2004-08-24 | Microsoft Corporation | Systems and methods for resynchronization and notification in response to network media events |
US7197542B2 (en) * | 2000-06-30 | 2007-03-27 | Ponzio Jr Frank J | System and method for signaling quality and integrity of data content |
US7032029B1 (en) * | 2000-07-07 | 2006-04-18 | Schneider Automation Inc. | Method and apparatus for an active standby control system on a network |
US7023795B1 (en) | 2000-11-07 | 2006-04-04 | Schneider Automation Inc. | Method and apparatus for an active standby control system on a network |
JP2003076621A (en) * | 2001-08-31 | 2003-03-14 | Fujitsu Ltd | Internet appliance server, and method and program for managing environmental information of internet appliance client |
US7167448B2 (en) * | 2002-02-04 | 2007-01-23 | Sun Microsystems, Inc. | Prioritization of remote services messages within a low bandwidth environment |
US20030149889A1 (en) * | 2002-02-04 | 2003-08-07 | Wookey Michael J. | Automatic communication and security reconfiguration for remote services |
US20030149740A1 (en) * | 2002-02-04 | 2003-08-07 | Wookey Michael J. | Remote services delivery architecture |
US20030149771A1 (en) * | 2002-02-04 | 2003-08-07 | Wookey Michael J. | Remote services system back-channel multicasting |
US20030177259A1 (en) * | 2002-02-04 | 2003-09-18 | Wookey Michael J. | Remote services systems data delivery mechanism |
US20030163544A1 (en) * | 2002-02-04 | 2003-08-28 | Wookey Michael J. | Remote service systems management interface |
US20030212738A1 (en) * | 2002-05-10 | 2003-11-13 | Wookey Michael J. | Remote services system message system to support redundancy of data flow |
US7181455B2 (en) * | 2002-06-27 | 2007-02-20 | Sun Microsystems, Inc. | Bandwidth management for remote services system |
US7260623B2 (en) * | 2002-06-27 | 2007-08-21 | Sun Microsystems, Inc. | Remote services system communication module |
US7240109B2 (en) * | 2002-06-27 | 2007-07-03 | Sun Microsystems, Inc. | Remote services system service module interface |
US8266239B2 (en) * | 2002-06-27 | 2012-09-11 | Oracle International Corporation | Remote services system relocatable mid level manager |
US8254896B2 (en) * | 2003-08-25 | 2012-08-28 | Research In Motion Limited | Implementing a web server on a mobile station |
US7783785B2 (en) * | 2003-10-02 | 2010-08-24 | Gateway, Inc. | Method and apparatus for BIOS determination of network information and diagnostics |
US8090871B2 (en) * | 2003-10-20 | 2012-01-03 | International Business Machines Corporation | Determining a remote management processor's IP address |
US7626944B1 (en) * | 2004-03-31 | 2009-12-01 | Packeteer, Inc. | Methods, apparatuses and systems facilitating remote, automated deployment of network devices |
US8065408B2 (en) * | 2004-06-30 | 2011-11-22 | Nokia, Inc. | Method and system for dynamic device address management |
US7461162B2 (en) * | 2004-12-16 | 2008-12-02 | International Business Machines Corporation | Usage consciousness in HTTP/HTML for reducing unused data flow across a network |
US8117255B2 (en) * | 2005-09-07 | 2012-02-14 | Sap Ag | Systems and methods for smart client remote data monitoring |
US7831694B2 (en) * | 2006-05-11 | 2010-11-09 | Arvind Wadhawan | Transfer of electrical data with auto-discovery of system configuration |
US7930370B2 (en) * | 2007-12-31 | 2011-04-19 | Intel Corporation | Method and system for remote configuration of managed nodes |
US8879570B2 (en) * | 2009-09-04 | 2014-11-04 | Brocade Communications Systems, Inc. | Systems and methods for reconfiguring a network adapter in sleep mode |
US10873604B1 (en) | 2018-06-19 | 2020-12-22 | Architecture Technology Corporation | Methods and systems for reconfiguring network devices |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5579522A (en) * | 1991-05-06 | 1996-11-26 | Intel Corporation | Dynamic non-volatile memory update in a computer system |
US5857072A (en) * | 1996-04-30 | 1999-01-05 | Sprint Communications Co. L.P. | System and method for distributing data simultaneously to multiple computers on a network, with advanced notice to intended recipients |
US5913218A (en) * | 1995-11-06 | 1999-06-15 | Sun Microsystems, Inc | System and method for retrieving and updating configuration parameter values for application programs in a computer network |
US6119234A (en) * | 1997-06-27 | 2000-09-12 | Sun Microsystems, Inc. | Method and apparatus for client-host communication over a computer network |
US6389579B1 (en) * | 1998-01-26 | 2002-05-14 | Chameleon Systems | Reconfigurable logic for table lookup |
US6560699B1 (en) * | 1999-10-20 | 2003-05-06 | Cisco Technology, Inc. | Constraint-based language configuration files for updating and verifying system constraints |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4750175A (en) * | 1986-08-29 | 1988-06-07 | Pactel Communications Companies | Network diagnostic apparatus and method |
US5305321A (en) * | 1992-02-24 | 1994-04-19 | Advanced Micro Devices | Ethernet media access controller with external address detection interface and associated method |
US5404544A (en) * | 1992-06-05 | 1995-04-04 | Advanced Micro Devices | System for periodically transmitting signal to/from sleeping node identifying its existence to a network and awakening the sleeping node responding to received instruction |
US5594426A (en) * | 1993-09-20 | 1997-01-14 | Hitachi, Ltd. | Network station and network management system |
US5650800A (en) * | 1995-05-15 | 1997-07-22 | Inelec Corporation | Remote sensor network using distributed intelligent modules with interactive display |
TW292365B (en) * | 1995-05-31 | 1996-12-01 | Hitachi Ltd | Computer management system |
US5905867A (en) * | 1996-11-12 | 1999-05-18 | The United States Of America As Represented By The Secretary Of The Navy | Apparatus for monitoring environmental parameters at network sites |
US5892690A (en) * | 1997-03-10 | 1999-04-06 | Purechoice, Inc. | Environment monitoring system |
US6249812B1 (en) * | 1998-10-01 | 2001-06-19 | International Business Machines Corporation | Interactive system support using a system management asic |
-
1998
- 1998-10-01 US US09/164,657 patent/US6353854B1/en not_active Expired - Lifetime
-
2001
- 2001-05-14 US US09/855,624 patent/US20010027521A1/en not_active Abandoned
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5579522A (en) * | 1991-05-06 | 1996-11-26 | Intel Corporation | Dynamic non-volatile memory update in a computer system |
US5913218A (en) * | 1995-11-06 | 1999-06-15 | Sun Microsystems, Inc | System and method for retrieving and updating configuration parameter values for application programs in a computer network |
US5857072A (en) * | 1996-04-30 | 1999-01-05 | Sprint Communications Co. L.P. | System and method for distributing data simultaneously to multiple computers on a network, with advanced notice to intended recipients |
US6119234A (en) * | 1997-06-27 | 2000-09-12 | Sun Microsystems, Inc. | Method and apparatus for client-host communication over a computer network |
US6389579B1 (en) * | 1998-01-26 | 2002-05-14 | Chameleon Systems | Reconfigurable logic for table lookup |
US6560699B1 (en) * | 1999-10-20 | 2003-05-06 | Cisco Technology, Inc. | Constraint-based language configuration files for updating and verifying system constraints |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7475239B2 (en) | 2002-09-20 | 2009-01-06 | International Business Machines Corporation | Pluggable trust adapter architecture, method and program product for processing communications |
US20040059931A1 (en) * | 2002-09-20 | 2004-03-25 | International Business Machines Corporation | Pluggable trust adapter architecture, method and program product for processing communications |
US7877520B2 (en) | 2002-10-18 | 2011-01-25 | Hitachi, Ltd. | Storage device and method of setting configuration information of same |
US20040078583A1 (en) * | 2002-10-18 | 2004-04-22 | Hitachi, Ltd. | Storage device and method of setting configuration information of same |
US7136939B2 (en) * | 2002-10-18 | 2006-11-14 | Hitachi, Ltd. | Storage device and method of setting configuration information of same |
US20070038747A1 (en) * | 2002-10-18 | 2007-02-15 | Hitachi, Ltd. | Storage device and method of setting configuration information of same |
US7562160B2 (en) | 2002-10-18 | 2009-07-14 | Hitachi, Ltd. | Storage device and method of setting configuration information of same |
US20090248905A1 (en) * | 2002-10-18 | 2009-10-01 | Hitachi, Ltd. | Storage Device and Method of Setting Cofiguration Information of same |
US20060200673A1 (en) * | 2005-03-03 | 2006-09-07 | Interdigital Technology Corporation | Using watermarking to reduce communication overhead |
US8458481B2 (en) | 2005-03-03 | 2013-06-04 | Interdigital Technology Corporation | Using watermarking to reduce communication overhead |
US7987369B2 (en) * | 2005-03-03 | 2011-07-26 | Interdigital Technology Corporation | Using watermarking to reduce communication overhead |
US7895308B2 (en) * | 2005-05-11 | 2011-02-22 | Tindall Steven J | Messaging system configurator |
US20060271647A1 (en) * | 2005-05-11 | 2006-11-30 | Applied Voice & Speech Tech., Inc. | Messaging system configurator |
US20080215752A1 (en) * | 2005-11-18 | 2008-09-04 | Huawei Technologies Co., Ltd. | Service device, and switching network and switching method for the same |
US20090164480A1 (en) * | 2007-12-19 | 2009-06-25 | Antti Lappetelainen | Methods, apparatus and computer program product for altering device functionality |
US9112985B2 (en) * | 2007-12-19 | 2015-08-18 | Core Wireless Licensing S.A.R.L | Methods, apparatus and computer program product for altering device functionality |
US9906366B1 (en) * | 2017-04-07 | 2018-02-27 | At&T Mobility Ii Llc | Service provider based security in a wireless network |
Also Published As
Publication number | Publication date |
---|---|
US6353854B1 (en) | 2002-03-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6353854B1 (en) | Automatic reconfiguration system for change in management servers having protocol destination addresses | |
US6249812B1 (en) | Interactive system support using a system management asic | |
US7155497B2 (en) | Configuring a network parameter to a device | |
US6314455B1 (en) | Data processing system and method for permitting a server to remotely initiate a client's boot block recovery | |
US6526507B1 (en) | Data processing system and method for waking a client only in response to receipt of an authenticated Wake-on-LAN packet | |
US8862709B2 (en) | Remote management of boot application | |
US7159016B2 (en) | Method and apparatus for configuring an endpoint device to a computer network | |
US6304900B1 (en) | Data processing system and method for permitting a server computer system to remotely modify operation of a client system's network hardware | |
US7280547B2 (en) | Dynamic WAN port detection | |
US7720057B2 (en) | Packet relay apparatus and control method for data relay apparatus | |
US6266696B1 (en) | Full time network auxiliary for a network connected PC | |
US6381636B1 (en) | Data processing system and method for permitting a server to remotely access a powered-off client computer system's asset information | |
US6263388B1 (en) | Data processing system and method for remotely disabling network activity in a client computer system | |
US20050166213A1 (en) | Remote deployment of executable code in a pre-boot environment | |
US6334150B1 (en) | Data processing system and method for remotely disabling a client computer system | |
US20070073832A1 (en) | Method and system of storing and accessing meta-data in a network adapter | |
US6405259B1 (en) | Data processing system and method for transmission of a network packet specifying a group identifier identifying a selected plurality of clients | |
US6275851B1 (en) | Data processing system and method for remotely controlling modification of a client's initialization settings | |
US20050160287A1 (en) | Method to deploy wireless network security with a wireless router | |
US6415324B1 (en) | Data processing system and method for permitting a client computer system to temporarily prohibit remote management | |
US6628663B1 (en) | System and method for permitting a dumb device to create and transmit network packets | |
US6742027B1 (en) | Data processing system and method for permitting a server to remotely disable a client computer system's input device | |
US6601174B1 (en) | Data processing system and method for permitting a server to remotely provide a client computer system's settings password to the client | |
US6334147B1 (en) | Data processing system and method for remotely accessing a client computer systems's individual initialization settings while the client is powered off | |
EP1135890B1 (en) | Data processing system and method for remotely disabling network activity in a client computer system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: LENOVO (SINGAPORE) PTE LTD., SINGAPORE Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:INTERNATIONAL BUSINESS MACHINES CORPORATION;REEL/FRAME:016891/0507 Effective date: 20050520 Owner name: LENOVO (SINGAPORE) PTE LTD.,SINGAPORE Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:INTERNATIONAL BUSINESS MACHINES CORPORATION;REEL/FRAME:016891/0507 Effective date: 20050520 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION |