US20010027521A1 - Automatic reconfiguration system for change in management servers - Google Patents

Automatic reconfiguration system for change in management servers Download PDF

Info

Publication number
US20010027521A1
US20010027521A1 US09/855,624 US85562401A US2001027521A1 US 20010027521 A1 US20010027521 A1 US 20010027521A1 US 85562401 A US85562401 A US 85562401A US 2001027521 A1 US2001027521 A1 US 2001027521A1
Authority
US
United States
Prior art keywords
network
personal computer
server
data
destination address
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US09/855,624
Inventor
Daryl Cromer
Brandon Ellison
Eric Kern
Howard Locker
James Ward
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Singapore Pte Ltd
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to US09/855,624 priority Critical patent/US20010027521A1/en
Publication of US20010027521A1 publication Critical patent/US20010027521A1/en
Assigned to LENOVO (SINGAPORE) PTE LTD. reassignment LENOVO (SINGAPORE) PTE LTD. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: INTERNATIONAL BUSINESS MACHINES CORPORATION
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0876Aspects of the degree of configuration automation
    • H04L41/0886Fully automatic configuration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0813Configuration setting characterised by the conditions triggering a change of settings
    • H04L41/0816Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/065Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/16Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
    • H04L69/161Implementation details of TCP/IP or UDP/IP stack architecture; Specification of modified or new header fields
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/16Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
    • H04L69/164Adaptation or special uses of UDP protocol
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/16Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/22Parsing or analysis of headers

Definitions

  • the present invention relates to computer systems coupled to a network and more particularly to a system having logic to receive transmissions across a connection to a network to allow for automatically updating configuration information and system management parameters.
  • a personal computer can typically be defined as a desktop, floor standing, or portable microcomputer that includes a system unit having a single central processing unit (CPU) and associated volatile and non-volatile memory, including random access memory (RAM) and basic input-output system read only memory (BIOS ROM), a system monitor, a keyboard, one or more flexible diskette drives, a CD-ROM drive, a fixed disk storage drive (also known as a “hard drive”), a “mouse” or pointing device, and an optional network interface adapter.
  • CPU central processing unit
  • BIOS ROM basic input-output system read only memory
  • PCS being increasingly connected into networks to allow transfers of data among computers, more operations such as maintenance, updating of applications and data collections are occurring over the network.
  • computers are also becoming more and more essential to their users, it is desirable to minimize loss of productivity by increasing the availability of PCS. This includes detection and reporting of intermittent failures on a system that will allow system administrators to schedule maintenance forthe PC at a convenient time.
  • Alert technology such as IBM's Alert on LAN technology, which supports detection and reporting of failures over a network.
  • Alert on LAN solution creates network alerts to provide event and status information to a network administrator.
  • the technology detects and reports events such as operating system (OS) hang, POSTIBIOS error codes, and voltage and temperature problems.
  • OS operating system
  • IP Internet Protocol
  • DMI Desktop Management Interface
  • the task of re-configuring IP headers using DMI is accomplished by the following steps. First the management server must discover all the systems on the network. The management server can only do first time discovery of systems on the network if they are in full power on state running OS with a management application with DMI capabilities such as Intel's LANDesk Client Manger or IBM NetFinity. After the system is discovered it is placed into a database. Next the systems must be placed in a full-on power state, since DMI runs on the OS. This may be accomplished using Wake on LAN technology. Finally DMI is used to re-configure the IP header by sending commands to the Alert on LAN management application. This is a complicated and time consuming operation, given that several hundred machines are set up to send alerts to a single server. This mechanism also requires the system administrator to gain control of each system to accomplish the update.
  • the present invention provides for such a mechanism and will update the IP address regardless of the power state, i.e., full-on, sleep, or off, of the client.
  • the mechanism provides for an advantageous method for handling updates to groups of systems within a network.
  • the present invention recognizes that by designing improved hardware reception capabilities in the computer. It is possible to reconfigure a system unit at a remote location without requiring DMI.
  • the invention involves the recognition that a system normally, and for good reason, protects itself from being reconfigured remotely, and it is desirable to override these protections and have the computer automatically reconfigure based on a special packet from a management console.
  • One embodiment of the present invention is directed to a method for detecting re-configuration packets from a management console and then updating hardware configuration.
  • the system when necessary, is supplied with auxiliary power and is operative to receive and accept updates regardless of the system power state.
  • the method includes providing a computer system connected to a management console via a data transmission network.
  • the invention includes a detection scheme to recognize reconfiguration network packets.
  • the invention further includes a scheme for the computer to handle re-configuration of subgroups of machines.
  • the present invention recognizes that certain normal reconfiguration operations, that involve updating operations as opposed to initialization operations, are minor operations but nonetheless are expensive and time consuming because, for example, a service person must come to the site or use a time consuming process, such as employing DMI techniques to make the desired changes.
  • the PCS can be controlled based on predefined network commands without requiring software intervention.
  • Such “hardware” modifications can be performed by the network administrator without requiring a service call.
  • an auxiliary processor that communicates with the network adapter and is always “on” as a result of trickle power, and it receives commands through a connection to the network through a portion of the network adapter, which is also trickle powered to always be “on.”
  • the auxiliary processor listens for occasional signals, in network format, from the management console indicating a re-configuration request for action on the client. This allows the network manager to perform operations without a time consuming operation of reconfiguration which occurs using, for example, DMI or making a service call.
  • the auxiliary processor provides the ability to selectively reconfigure hardware according to the invention, which results in making remote maintenance more effective.
  • the signals are introduced to the network side of the “physical layer” of the network controller.
  • the physical layer is the layer that provides the mechanical, electrical, functional and procedural means to establish, maintain and release physical connections over the transmission medium and it conditions the packet signal to analog form to send and receive over the physical connecting network that is the LAN.
  • the PC stays active, preferably full time, and is able, on an ongoing basis, at a minimum, to monitor the network scanning for re-configuration packets.
  • the network manager is made aware of the actual conditions at the client without loss of information due to a network circumstance or change in management consoles. A problem can be addressed while the machine is unattended and possibly before the user realizes a problem exists.
  • FIG. 1 is a block diagram of a network arrangement suitable for implementation of the present invention
  • FIG. 2 is a block diagram of a system client with network connection circuitry without the benefit of the present invention
  • FIG. 3 is a block diagram of a system client with added logic, according to the principles of the present invention, coupled to the network connection circuitry for receiving and executing a command;
  • FIG. 4 is a detailed block diagram of the LAN adapter from FIG. 3 and logic for the present invention.
  • FIG. 5 is a diagrammatic representation of an exemplary packet of a LAN system based on an Ethernet specification
  • FIG. 6 is a diagrammatic representation of the data area from FIG. 5 with details for reception according to the principles of the present invention.
  • FIG. 7 is a flow chart indicating logic for generation of the transmitted-data packets of FIG. 5 which may be implemented as hard logic or by using a programmed general purpose processor.
  • a network master 100 hereinafter sometimes referred to as management console, is connected to a hub 102 by a LAN connector bus 106 .
  • Respective client stations or systems 104 illustrated as exemplary systems 104 A, 104 B and 104 C, are also connected to the hub 102 through respective LAN busses 106 .
  • the preferred illustrated and exemplary form of network conforms to the Ethernet specification and uses such hubs. It will be appreciated however that other forms of networks, such as, but not limited to, Token-Ring are applicable to the present invention.
  • a computer system suitable for use as a client station 104 to embody the present invention is indicated in FIG. 2.
  • a central processing unit (CPU) 200 is connected by address, control and data busses 202 to a memory controller and PCI bus bridge chip 204 .
  • System memory 206 is connected to the memory controller 204 .
  • Connected to standard PCI expansion bus 208 are the memory controller PCI bridge chip 204 , IDE device controller 220 , PCI connector slots 210 , and a PCI bus to ISA bus bridge chip 212 which typically also includes power management logic.
  • ISA standard expansion bus 214 with ISA expansion connector slots 216 is connected to bridge chip 212 . It will be appreciated that other expansion bus types may be used to permit expansion of the system with added devices and it is not necessary to have two expansion busses.
  • an intelligent client station 104 there would normally be input devices and data storage devices such as a fixed and a floppy drive 222 and 224 , respectively.
  • the fixed drive 222 is connected to IDE controller 220
  • the floppy drive 224 is connected to I/O controller 218 .
  • PCI-ISA bridge controller 212 includes an interface for Flash memory 242 , which contains microcode, which the system 104 executes upon power-on.
  • the flash memory 242 is a non-volatile storage device which can be an electrically erasable programmable read only memory (EEPROM) module and includes BIOS that is used to interface between the 10 devices and operating system.
  • PCI-ISA bridge controller 212 also contains CMOS which is used to store system configuration data. That is, the CMOS will contain values which describe the present configuration of the system 104 . For example, CMOS contains information describing the list of IPL devices set by a user and the sequence to be used for a particular power method, the type of display, the amount of memory, time, date, etc. Furthermore, these data are stored in CMOS whenever a special configuration program, such as configuration/setup is executed.
  • PCI-ISA bridge controller 212 is supplied power from battery 244 to prevent loss of configuration data in CMOS.
  • a client system 104 has a network adapter 230 , which may, for example, be plugged into one of the connector slots 210 or in the alternative could connected to ISA slot 216 or embedded on the planar such as in the video.
  • the client system 104 is shown with a special power supply 240 which supplies full normal system power and has a auxiliary power Aux 5 which supplies full time power to the power management logic 212 and the network adapter 230 . This enables the system, as is known, to respond to a wakeup signal from network adapter 230 and power up the system.
  • the network adapter 230 consists of a physical layer 234 and a media access controller (MAC) 232 connected through the MII (media independent interface) local bus.
  • MII media independent interface
  • the MAC 232 serves as an interface between a shared data path, i.e., the MII, and the PCI bus 208 .
  • the MAC 232 performs a number of functions in the transmission and reception of data packets. For example, during the transmission of data, the MAC 232 assembles the data to be transmitted into a packet with address and error detection fields. Conversely, during the reception of a packet, the MAC 232 disassembles the packet and performs address checking and error detection.
  • the MAC 232 typically performs encoding/decoding of digital signals transmitted over the shared path and performs preamble generation/removal, as well as bit transmission/reception.
  • the MAC 232 may be an Intel 82557 chip.
  • the MII bus is a specification of signals and protocols which formalizes the interfacing of a 10/100 Mbps Ethernet Media Access Controller (MAC) 232 to the underlying physical layer 234 .
  • the physical layer 234 conditions analog signals to go out to the network for example, an Ethernet network over an RJ45 connector 236 , as is well known.
  • the physical layer 234 can be a fully integrated device supporting 10 and 100 Mb/s CSMA/CD Ethernet applications.
  • the physical layer 234 receives parallel data from the MII local bus and converts it to serial data for transmission through the connector 236 and over the cable network.
  • the physical layer 234 is also responsible for wave shaping and provides analog voltages to the network.
  • the physical layer can be, for example, an Integrated Circuits Systems chip No. 1890.
  • the physical layer 232 includes auto-negotiation logic that serves three main purposes. First it determines the capabilities of the main computer, second it advertises its own capabilities to the main computer, and thirdly it establishes a connection with the main computer using the highest performance connection technology. The physical layer 232 also provides a LINK status signal that reflects the current link status. The output of the LINK signal is low when a valid link exists between the system 104 and the main computer 100 .
  • the media access controller (MAC) 232 processes the network signals in digital form and connects to the PCI bus 208 .
  • the network adapter 230 may be added as an adapter card (as shown) or implemented directly on the system motherboard. To support wake-up operation, in the illustration of FIG. 2, it is powered from the full time auxiliary line Aux 5 .
  • the illustrated exemplary client system 104 of FIG. 3 incorporates a specially modified network adapter 231 with a logic module 300° according to the principles of the present invention, connected at the MI bus that extends between the physical layer 234 and the MAC 232 .
  • This logic may be a “hard wired” application specific integrated circuit (ASIC) or a programmed general-purpose processor which is programmed as more fully described hereinbelow.
  • ASIC application specific integrated circuit
  • the invention is using hardware to handle a very limited number of predefined packets that are created and decoded by hardware.
  • the logic 300 accepts data from the physical layer 234 and provides updated configuration information stored in EEPROM 302 , a non-volatile memory storage device. With the trickle power supplied on bus Aux 5 . of power supply 240 , the logic 231 is preferably powered full time.
  • Management ASIC 300 is connected to bridge controller 212 via the System Management (SM) bus 310 . This provides a path to allow software running on PC 104 to access the management ASIC 300 and the EEPROM 302 .
  • SM System Management
  • FIG. 4 Component modules of the logic module 300 are indicated in FIG. 4. Signals are received from the MII bus by interface unit 414 and passed to RX (reception) FIFO (first-in-first-out) 410 .
  • Micro controller 402 coordinates the processing of information according to the principles of the present invention.
  • the micro controller 402 accesses EEPROM 302 through interface control lines 411 to EEPROM interface 420 to obtain values to create network packets such as source and destination MAC address, IP protocol information, authentication headers and Universal Data Packet headers.
  • EEPROM 302 retains the universal identifier (UUID) for the client system 104 and the unique system data.
  • UUID universal identifier
  • UUID stands for Universal Unique Identifier which is a part of Microsoft's PC98 specification and provides a unique number for every PC.
  • the system unique data would be that data which defaults for alerts enabled/disabled, timers for watchdogs and system and group keys for the client PC.
  • the micro controller 402 consists of several state machines to handle the following tasks: packet reception, packet transmission, SM bus interface transmission and EEPROM updates.
  • the micro controller 402 sends commands to FIFO control 412 to control data flow from TX (transmission) FIFO 408 and RX FIFO 410 .
  • Them micro controller 402 also responds to a SM bus 310 request from software running on a PC 104 to access Register Status 416 or access EEPROM 302 .
  • the micro controller 402 processes the data in the packet according to the invention and determines whether the packet is a standard data packet or a management packet.
  • a defined packet is the result of updating with the values in non-volatile EEPROM 302 .
  • the micro controller 402 responds to the management console 100 to indicate completion of updates by sending a response message by sending a packet to TX FIFO 408 which transfers the packet to Mil bus Interface 414 and then on to physical layer 234 over the MII bus.
  • the network header 510 includes a MAC header 500 , an IP header 502 , Authentication header 504 , and UDP header 506 , and is known to provide addresses, identifiers and other information for assuring correct transfer.
  • the data packet 508 includes the information content to be transferred.
  • the straight Magic Packet or Configuration ID 600 has, as shown in FIG. 6, content known as 6 bytes of FFh followed by 12 copies of client MAC address.
  • the network manager 100 may send commands to logic module 300 .
  • Logic module 300 in system 104 determines if the command is directed to that client. For the present embodiment with a simplified description, the command is limited to a change in IP address or network address of the management console 100 .
  • the data patterns are preferably followed.
  • the data field is checked for configuration packet by determining if it contains Configuration ID, which consists of UUID and Old Servers IP, MAC, and UDP Port.
  • Configuration ID which consists of UUID and Old Servers IP, MAC, and UDP Port.
  • the data field of Configuration Data 602 contains the information required for the update, such as System key, Group Key, New Server IP, New Server MAC, and New UDP Port. The field could contain the new values.
  • the micro controller 402 in logic 300 transfers the contents of the new header to Fe non-volatile storage or EEPROM 302 .
  • the data portion of the Data Packet 508 contains two areas of data.
  • the first field is the Configuration ID field 600 of FIG. 6.
  • the Configuration ID 600 field contains the UUID of the client machine for the current old, or existing management servers network address which consists of IP, MAC, and UDP port assignment.
  • the micro controller 402 inspects that data and compares it against the values stored in EEPROM 302 to ensure a match between the information in Configuration ID 600 and the current management server.
  • the micro controller 402 inspects the data contents of 10 configuration data 602 to the command applied to client 104 . Even though the management server 100 sends a command to all clients on the network, the command may only be intended for a group of clients. This is handled by two additional match fields, the system key and the group key. The system and group keys are “pseudo passwords” for client 104 for addressing the machine uniquely or as part of a group of systems. If a match occurs the micro controller 402 takes the new values for the management server 100 (IP, MAC, and UDP port) from configuration data 602 and updates EEPROM 302 .
  • the packet format can be implemented as follows for an Ethernet packet: Bytes (Hex) Description 1-29 ⁇ Ethernet/IP/UDP Headers> 2A-2F Old Server MAC Address 30-33 Old Server IP Address 34-39 New Server MAC Address 3A-3D New Server IP Address. 3E-3F New Server UDP Port
  • Another option for updating is the use of authentication keys.
  • the Alert on LAN is setup with two Authentication Keys.
  • the first key is unique to each machine and the second key is typically set the same for a group of systems which could, for example, be in the same building, on the same floor, serving the same function, etc.)
  • This provides the flexibility to modify the IP address on an individual client basis or as a group of clients.
  • the packet contains these keys and the new server addresses.
  • the hardware will compare the authentication keys sent from the server to the keys located in the Alert On LAN EEPROM. When updating an individual machine, the group key is left blank, and when updating a group of machines, the individual machine key is left blank.
  • the packet format can be implemented as follows, for example, for an Ethernet packet: Bytes (Hex) Description 1-29 ⁇ Ethernet/IP/UDP Headers> 30-3F Authentication key (for individual) 40-4F Authentication key (for group) 50-55 New Server MAC Address 56-59 New Server IP Address. 5A-5B New Server UDP
  • Security for either option for updating can be implemented using a TCP/IP Authentication Header (AH) or an Encapsulating Security Payload (ESP) Header detailed in RFC 1825.
  • AH TCP/IP Authentication Header
  • ESP Encapsulating Security Payload
  • the management ASIC would also be equipped to interpret the Header and decode the data.
  • step 700 there is illustrated the process, starting at step 700 , used by micro controller 402 in implementing attributes of the invention.
  • the micro controller 402 waits for a packet and upon receiving one, at step 704 , checks to determine authentication of encrypted data in the packet. Only authenticated packets are used to change management server parameters to eliminate concern of an unauthorized user or hacker entering or damaging the network. Non authenticated packets are assumed to be data and sent to OS at step 714 . Packets authenticated at steps 706 , 708 and 710 , are then checked to determine if they contain valid data at step 712 . For authentication, first the security load parameter is done at step 706 and the sequence number is loaded at step 708 . The next measure, at step 710 , is decrypting the authenticated packet. Once authentication is complete, at step 712 , invalid data is ignored and valid data is checked for a configuration packet at step 720 .
  • Configuration packets are determined by checking for Configuration ID 600 and Configuration Data 602 . If the packet is not a configuration packet, the packet is assumed to be an encrypted data packet and the data is sent to OS at step 714 . Configuration packets are checked for a system key match at step 724 and for a group key match at step 726 . If a system key match is confirmed at step 724 , the steps of 728 , 729 and 730 follow, if no system key match is found then at step 726 a check is made for a group key match. If a group key match is confirmed than the exemplary steps of 728 . 730 and 732 are carried out for the group of the client systems. The system key and group key are contained in EEPROM 302 . If a match is found, then new configuration data (Server IP, MAC, Port) are pulled from the Configuration Data packet 602 at step 728 , as stated. The EEPROM is updated at step 730 and then the new configuration is applied at step 732 .
  • EEPROM

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Automation & Control Theory (AREA)
  • Small-Scale Networks (AREA)

Abstract

A client on a network is provided with auxiliary low power logic, at the network adaptor, that is always active and simulates network traffic (e.g., Ethernet format) normally sent under control of the main client system processor(s). This logic collects client status information and reports to the network manager, even when the system CPU is powered down, information which allows the network manager to exercise broader control and perform maintenance and upgrades which would otherwise require a dialog with the user and/or limit maintenance and reconfiguration of the client system to off-hours activity.

Description

  • Application Ser. No. ______ concurrently filed herewith and entitled “INTERACTIVE SYSTEM SUPPORT USING A SYSTEM MANAGEMENT ASIC.”[0001]
  • BACKGROUND OF THE INVENTION
  • 1. Field of the Invention [0002]
  • The present invention relates to computer systems coupled to a network and more particularly to a system having logic to receive transmissions across a connection to a network to allow for automatically updating configuration information and system management parameters. [0003]
  • 2. Description of Related Art [0004]
  • Personal computer systems are well known in the art. Personal computer systems have attained widespread use for providing computer power to many segments of modern society. A personal computer (PC) can typically be defined as a desktop, floor standing, or portable microcomputer that includes a system unit having a single central processing unit (CPU) and associated volatile and non-volatile memory, including random access memory (RAM) and basic input-output system read only memory (BIOS ROM), a system monitor, a keyboard, one or more flexible diskette drives, a CD-ROM drive, a fixed disk storage drive (also known as a “hard drive”), a “mouse” or pointing device, and an optional network interface adapter. One of the distinguishing characteristics of such a system is the use of a motherboard or system planar to electrically or operationally connect these components together. Examples of such PCS are computer systems within IBM's [0005] PC 300 series and IBM's IntelliStation Series. The PC of the before referenced related patent document Serial No. 104835 identified in the illustration of FIG. 3 thereof and as described in the patent document specification thereof, is an example of a typical client computer system.
  • With PCS being increasingly connected into networks to allow transfers of data among computers, more operations such as maintenance, updating of applications and data collections are occurring over the network. As computers are also becoming more and more essential to their users, it is desirable to minimize loss of productivity by increasing the availability of PCS. This includes detection and reporting of intermittent failures on a system that will allow system administrators to schedule maintenance forthe PC at a convenient time. [0006]
  • In addition, the immediate detection and reporting of an inoperable PC is required, since it has an immediate impact to productivity. There is no reason to wait until employees arrive on the next working day to discover that the machine failed yesterday or over the weekend. [0007]
  • One solution to this problem has been alert technology, such as IBM's Alert on LAN technology, which supports detection and reporting of failures over a network. Alert on LAN solution creates network alerts to provide event and status information to a network administrator. The technology detects and reports events such as operating system (OS) hang, POSTIBIOS error codes, and voltage and temperature problems. [0008]
  • When the client systems are deployed, the network administrator must configure the alerts supported and the TCP/IP Internet Protocol (IP) information for the administrators management console This information is then stored in a non-volatile EEPROM in the client system. [0009]
  • It is normal to custom configure the system unit of a computer system for a user at a corporate configuration center or at the user site. When done at a configuration center the resources and skills needed are available, but the computer must be removed from the packaging, set up, configured with BIOS and a program image, and configured to support system management applications such as Alert on LAN and then repackaged to be sent to the end user. At the time of configuration, the final location or owner of the system may not be known. Therefore at the time of configuration the IP address of management server is not possible, given that most networks have several management consoles. The missing critical pieces of information will require re-configuration at the final location. [0010]
  • At the user site, roll out and updating of systems is a less efficient use of resources but avoids the determining-final-location problem. For complex system management program images, it may be necessary to send out a skilled configuration expert thus consuming time when the expert's valuable skills could otherwise be put to use, as the expert travels to the user site. [0011]
  • Accordingly, a number of methods have been developed for simplifying the remote 15 configuration of computer systems. For example, the Desktop Management Interface (DMI) industry standard provides a mechanism to retrieve and update remotely from a client personal computer. The DMI technology is widely used in standard system management applications such as Intel's LANDesk programs and IBM's NetFinity program. [0012]
  • The task of re-configuring IP headers using DMI is accomplished by the following steps. First the management server must discover all the systems on the network. The management server can only do first time discovery of systems on the network if they are in full power on state running OS with a management application with DMI capabilities such as Intel's LANDesk Client Manger or IBM NetFinity. After the system is discovered it is placed into a database. Next the systems must be placed in a full-on power state, since DMI runs on the OS. This may be accomplished using Wake on LAN technology. Finally DMI is used to re-configure the IP header by sending commands to the Alert on LAN management application. This is a complicated and time consuming operation, given that several hundred machines are set up to send alerts to a single server. This mechanism also requires the system administrator to gain control of each system to accomplish the update. [0013]
  • The time required to update each system unfortunately provides an opportunity for loss of information, since information sent by a client, prior to being reconfigured to the new server, is lost. There is a potential significant down-time when there is a change in server due to a crash or network issue. Each client system must be reconfigured with the IP address of the new management server. In the case of routine maintenance, it is possible to avoid loss of information, but the reconfiguration process is very time consuming and potentially disruptive to operation on the client. [0014]
  • What is needed is a robust and effective mechanism to update the destination IP address in the client PCS to point to the new server. The present invention provides for such a mechanism and will update the IP address regardless of the power state, i.e., full-on, sleep, or off, of the client. In addition, the mechanism provides for an advantageous method for handling updates to groups of systems within a network. [0015]
  • SUMMARY OF THE INVENTION
  • The present invention recognizes that by designing improved hardware reception capabilities in the computer. It is possible to reconfigure a system unit at a remote location without requiring DMI. The invention involves the recognition that a system normally, and for good reason, protects itself from being reconfigured remotely, and it is desirable to override these protections and have the computer automatically reconfigure based on a special packet from a management console. [0016]
  • One embodiment of the present invention is directed to a method for detecting re-configuration packets from a management console and then updating hardware configuration. The system, when necessary, is supplied with auxiliary power and is operative to receive and accept updates regardless of the system power state. The method includes providing a computer system connected to a management console via a data transmission network. The invention includes a detection scheme to recognize reconfiguration network packets. The invention further includes a scheme for the computer to handle re-configuration of subgroups of machines. [0017]
  • The present invention recognizes that certain normal reconfiguration operations, that involve updating operations as opposed to initialization operations, are minor operations but nonetheless are expensive and time consuming because, for example, a service person must come to the site or use a time consuming process, such as employing DMI techniques to make the desired changes. By so modifying the reconfiguration process, the PCS can be controlled based on predefined network commands without requiring software intervention. Such “hardware” modifications can be performed by the network administrator without requiring a service call. [0018]
  • While remote wakeup of client systems has made the network manager's support of client systems more convenient, it is limited in that it requires software applications running at the client for maintenance operations or updates. Related patent application Ser. No. 09/024,231 describes logic for responding to status information queries from a main computer over the network. [0019]
  • According to the present invention, included is an auxiliary processor that communicates with the network adapter and is always “on” as a result of trickle power, and it receives commands through a connection to the network through a portion of the network adapter, which is also trickle powered to always be “on.” The auxiliary processor listens for occasional signals, in network format, from the management console indicating a re-configuration request for action on the client. This allows the network manager to perform operations without a time consuming operation of reconfiguration which occurs using, for example, DMI or making a service call. Hence while there is a service call normally required to change IP settings, the auxiliary processor provides the ability to selectively reconfigure hardware according to the invention, which results in making remote maintenance more effective. [0020]
  • According to a preferred implementation, the signals are introduced to the network side of the “physical layer” of the network controller. The physical layer is the layer that provides the mechanical, electrical, functional and procedural means to establish, maintain and release physical connections over the transmission medium and it conditions the packet signal to analog form to send and receive over the physical connecting network that is the LAN. By so configuring the packet to have the characteristics of a standard packet, it passes through the network as if a normal packet is received by the client. [0021]
  • It is recognized, by the invention, that additional commands and other information are to be received from the network manager to provide increased remote maintenance support, but that it is not desirable to change from existing PC network structures and protocols and the major installed infrastructure of PC networks. According to the invention, low power logic is provided that is always active and simulates normal network data traffic (e.g., Ethernet format) normally sent from and received by the client system. [0022]
  • The PC stays active, preferably full time, and is able, on an ongoing basis, at a minimum, to monitor the network scanning for re-configuration packets. By so maintaining the ability to respond immediately to changes in management consoles at the client, the network manager is made aware of the actual conditions at the client without loss of information due to a network circumstance or change in management consoles. A problem can be addressed while the machine is unattended and possibly before the user realizes a problem exists.[0023]
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a block diagram of a network arrangement suitable for implementation of the present invention; [0024]
  • FIG. 2 is a block diagram of a system client with network connection circuitry without the benefit of the present invention; [0025]
  • FIG. 3 is a block diagram of a system client with added logic, according to the principles of the present invention, coupled to the network connection circuitry for receiving and executing a command; [0026]
  • FIG. 4 is a detailed block diagram of the LAN adapter from FIG. 3 and logic for the present invention; [0027]
  • FIG. 5 is a diagrammatic representation of an exemplary packet of a LAN system based on an Ethernet specification; [0028]
  • FIG. 6 is a diagrammatic representation of the data area from FIG. 5 with details for reception according to the principles of the present invention; and [0029]
  • FIG. 7 is a flow chart indicating logic for generation of the transmitted-data packets of FIG. 5 which may be implemented as hard logic or by using a programmed general purpose processor.[0030]
  • DETAILED DESCRIPTION OF THE INVENTION
  • While the present invention is described more fully hereinafter with reference to the accompanying drawings, in which a preferred embodiment and exemplary illustrations of the present invention is shown, it is to be understood, that with regard to the description of the specification and figures, that persons of ordinary skill in the appropriate arts may modify the invention herein described while still achieving the favorable results of this invention. Accordingly, the description which follows is to be understood as being a broad teaching disclosure directed to persons of ordinary skill in the appropriate arts, and not as limiting upon the present invention. [0031]
  • Referring to FIG. 1, a [0032] network master 100, hereinafter sometimes referred to as management console, is connected to a hub 102 by a LAN connector bus 106. Respective client stations or systems 104, illustrated as exemplary systems 104A, 104B and 104C, are also connected to the hub 102 through respective LAN busses 106. The preferred illustrated and exemplary form of network conforms to the Ethernet specification and uses such hubs. It will be appreciated however that other forms of networks, such as, but not limited to, Token-Ring are applicable to the present invention.
  • A computer system suitable for use as a client station [0033] 104 to embody the present invention is indicated in FIG. 2. A central processing unit (CPU) 200 is connected by address, control and data busses 202 to a memory controller and PCI bus bridge chip 204. System memory 206 is connected to the memory controller 204. Connected to standard PCI expansion bus 208 are the memory controller PCI bridge chip 204, IDE device controller 220, PCI connector slots 210, and a PCI bus to ISA bus bridge chip 212 which typically also includes power management logic. ISA standard expansion bus 214 with ISA expansion connector slots 216 is connected to bridge chip 212. It will be appreciated that other expansion bus types may be used to permit expansion of the system with added devices and it is not necessary to have two expansion busses.
  • In an intelligent client station [0034] 104 there would normally be input devices and data storage devices such as a fixed and a floppy drive 222 and 224, respectively. The fixed drive 222 is connected to IDE controller 220, whereas the floppy drive 224 is connected to I/O controller 218.
  • PCI-[0035] ISA bridge controller 212 includes an interface for Flash memory 242, which contains microcode, which the system 104 executes upon power-on. The flash memory 242 is a non-volatile storage device which can be an electrically erasable programmable read only memory (EEPROM) module and includes BIOS that is used to interface between the 10 devices and operating system. PCI-ISA bridge controller 212 also contains CMOS which is used to store system configuration data. That is, the CMOS will contain values which describe the present configuration of the system 104. For example, CMOS contains information describing the list of IPL devices set by a user and the sequence to be used for a particular power method, the type of display, the amount of memory, time, date, etc. Furthermore, these data are stored in CMOS whenever a special configuration program, such as configuration/setup is executed. PCI-ISA bridge controller 212 is supplied power from battery 244 to prevent loss of configuration data in CMOS.
  • A client system [0036] 104 has a network adapter 230, which may, for example, be plugged into one of the connector slots 210 or in the alternative could connected to ISA slot 216 or embedded on the planar such as in the video. The client system 104 is shown with a special power supply 240 which supplies full normal system power and has a auxiliary power Aux 5 which supplies full time power to the power management logic 212 and the network adapter 230. This enables the system, as is known, to respond to a wakeup signal from network adapter 230 and power up the system. The network adapter 230 consists of a physical layer 234 and a media access controller (MAC) 232 connected through the MII (media independent interface) local bus. The MAC 232 serves as an interface between a shared data path, i.e., the MII, and the PCI bus 208. The MAC 232 performs a number of functions in the transmission and reception of data packets. For example, during the transmission of data, the MAC 232 assembles the data to be transmitted into a packet with address and error detection fields. Conversely, during the reception of a packet, the MAC 232 disassembles the packet and performs address checking and error detection. In addition, the MAC 232 typically performs encoding/decoding of digital signals transmitted over the shared path and performs preamble generation/removal, as well as bit transmission/reception. As an example, the MAC 232 may be an Intel 82557 chip.
  • The MII bus is a specification of signals and protocols which formalizes the interfacing of a 10/100 Mbps Ethernet Media Access Controller (MAC) [0037] 232 to the underlying physical layer 234. The physical layer 234 conditions analog signals to go out to the network for example, an Ethernet network over an RJ45 connector 236, as is well known. For example, the physical layer 234 can be a fully integrated device supporting 10 and 100 Mb/s CSMA/CD Ethernet applications. The physical layer 234 receives parallel data from the MII local bus and converts it to serial data for transmission through the connector 236 and over the cable network. The physical layer 234 is also responsible for wave shaping and provides analog voltages to the network. The physical layer can be, for example, an Integrated Circuits Systems chip No. 1890. The physical layer 232 includes auto-negotiation logic that serves three main purposes. First it determines the capabilities of the main computer, second it advertises its own capabilities to the main computer, and thirdly it establishes a connection with the main computer using the highest performance connection technology. The physical layer 232 also provides a LINK status signal that reflects the current link status. The output of the LINK signal is low when a valid link exists between the system 104 and the main computer 100.
  • The media access controller (MAC) [0038] 232 processes the network signals in digital form and connects to the PCI bus 208. The network adapter 230, it should be appreciated, may be added as an adapter card (as shown) or implemented directly on the system motherboard. To support wake-up operation, in the illustration of FIG. 2, it is powered from the full time auxiliary line Aux 5.
  • The illustrated exemplary client system [0039] 104 of FIG. 3 incorporates a specially modified network adapter 231 with a logic module 300° according to the principles of the present invention, connected at the MI bus that extends between the physical layer 234 and the MAC 232. This logic may be a “hard wired” application specific integrated circuit (ASIC) or a programmed general-purpose processor which is programmed as more fully described hereinbelow. By so connecting the logic 300 at the MII bus, it can send and receive network packets using the physical layer 234. The invention is using hardware to handle a very limited number of predefined packets that are created and decoded by hardware. This approach bypasses the software stack and allows the ASIC to send and receive UDP (User Datagram Protocol) datagrams thru the physical layer. The logic 300, according to the invention, accepts data from the physical layer 234 and provides updated configuration information stored in EEPROM 302, a non-volatile memory storage device. With the trickle power supplied on bus Aux 5. of power supply 240, the logic 231 is preferably powered full time. Management ASIC 300 is connected to bridge controller 212 via the System Management (SM) bus 310. This provides a path to allow software running on PC 104 to access the management ASIC 300 and the EEPROM 302. The principles taught could be applied to integrated MAC-PHY solutions such as Intel product device #82558, or integrated MAC-PHY Management ASIC solutions.
  • Component modules of the [0040] logic module 300 are indicated in FIG. 4. Signals are received from the MII bus by interface unit 414 and passed to RX (reception) FIFO (first-in-first-out) 410. Micro controller 402 coordinates the processing of information according to the principles of the present invention. The micro controller 402 accesses EEPROM 302 through interface control lines 411 to EEPROM interface 420 to obtain values to create network packets such as source and destination MAC address, IP protocol information, authentication headers and Universal Data Packet headers. Furthermore EEPROM 302 retains the universal identifier (UUID) for the client system 104 and the unique system data. UUID stands for Universal Unique Identifier which is a part of Microsoft's PC98 specification and provides a unique number for every PC. The system unique data would be that data which defaults for alerts enabled/disabled, timers for watchdogs and system and group keys for the client PC.
  • The [0041] micro controller 402 consists of several state machines to handle the following tasks: packet reception, packet transmission, SM bus interface transmission and EEPROM updates. The micro controller 402 sends commands to FIFO control 412 to control data flow from TX (transmission) FIFO 408 and RX FIFO 410. Them micro controller402 also responds to a SM bus 310 request from software running on a PC 104 to access Register Status 416 or access EEPROM 302.
  • When a network packet is received the [0042] micro controller 402 processes the data in the packet according to the invention and determines whether the packet is a standard data packet or a management packet. In the preferred embodiment of the invention, a defined packet is the result of updating with the values in non-volatile EEPROM 302. The micro controller 402 responds to the management console 100 to indicate completion of updates by sending a response message by sending a packet to TX FIFO 408 which transfers the packet to Mil bus Interface 414 and then on to physical layer 234 over the MII bus.
  • A standard packet including a network header and data packet, as might be sent over an Ethernet network, is indicated in FIG. 5. The [0043] network header 510 includes a MAC header 500, an IP header 502, Authentication header 504, and UDP header 506, and is known to provide addresses, identifiers and other information for assuring correct transfer. The data packet 508 includes the information content to be transferred. For reception, the straight Magic Packet or Configuration ID 600 has, as shown in FIG. 6, content known as 6 bytes of FFh followed by 12 copies of client MAC address. With the special extensions, Configuration ID 600 and Configuration Data 602, the network manager 100 may send commands to logic module 300. Logic module 300 in system 104 determines if the command is directed to that client. For the present embodiment with a simplified description, the command is limited to a change in IP address or network address of the management console 100.
  • For the reception of packets received by [0044] logic module 300, the data patterns, according to the principles of the present invention, indicated in FIG. 6 are preferably followed. The data field is checked for configuration packet by determining if it contains Configuration ID, which consists of UUID and Old Servers IP, MAC, and UDP Port. The data field of Configuration Data 602 contains the information required for the update, such as System key, Group Key, New Server IP, New Server MAC, and New UDP Port. The field could contain the new values. The micro controller 402 in logic 300 transfers the contents of the new header to Fe non-volatile storage or EEPROM 302.
  • As hereinbefore stated, the data portion of the [0045] Data Packet 508 contains two areas of data. In the preferred embodiment, the first field is the Configuration ID field 600 of FIG. 6. The Configuration ID 600 field contains the UUID of the client machine for the current old, or existing management servers network address which consists of IP, MAC, and UDP port assignment. The micro controller 402 inspects that data and compares it against the values stored in EEPROM 302 to ensure a match between the information in Configuration ID 600 and the current management server.
  • When a match occurs, the [0046] micro controller 402 inspects the data contents of 10 configuration data 602 to the command applied to client 104. Even though the management server 100 sends a command to all clients on the network, the command may only be intended for a group of clients. This is handled by two additional match fields, the system key and the group key. The system and group keys are “pseudo passwords” for client 104 for addressing the machine uniquely or as part of a group of systems. If a match occurs the micro controller 402 takes the new values for the management server 100 (IP, MAC, and UDP port) from configuration data 602 and updates EEPROM 302.
  • The packet format can be implemented as follows for an Ethernet packet: [0047]
    Bytes (Hex) Description
     1-29 <Ethernet/IP/UDP Headers>
    2A-2F Old Server MAC Address
    30-33 Old Server IP Address
    34-39 New Server MAC Address
    3A-3D New Server IP Address.
    3E-3F New Server UDP Port
  • Another option for updating is the use of authentication keys. During the initial configuration or roll out, the Alert on LAN is setup with two Authentication Keys. The first key is unique to each machine and the second key is typically set the same for a group of systems which could, for example, be in the same building, on the same floor, serving the same function, etc.) This provides the flexibility to modify the IP address on an individual client basis or as a group of clients. The packet contains these keys and the new server addresses. The hardware will compare the authentication keys sent from the server to the keys located in the Alert On LAN EEPROM. When updating an individual machine, the group key is left blank, and when updating a group of machines, the individual machine key is left blank. Using Authentication Keys, the packet format can be implemented as follows, for example, for an Ethernet packet: [0048]
    Bytes (Hex) Description
     1-29 <Ethernet/IP/UDP Headers>
    30-3F Authentication key (for individual)
    40-4F Authentication key (for group)
    50-55 New Server MAC Address
    56-59 New Server IP Address.
    5A-5B New Server UDP
  • Security for either option for updating can be implemented using a TCP/IP Authentication Header (AH) or an Encapsulating Security Payload (ESP) Header detailed in RFC 1825. The management ASIC would also be equipped to interpret the Header and decode the data. [0049]
  • Referring to FIG. 7, there is illustrated the process, starting at [0050] step 700, used by micro controller 402 in implementing attributes of the invention. The micro controller 402, at step 702, waits for a packet and upon receiving one, at step 704, checks to determine authentication of encrypted data in the packet. Only authenticated packets are used to change management server parameters to eliminate concern of an unauthorized user or hacker entering or damaging the network. Non authenticated packets are assumed to be data and sent to OS at step 714. Packets authenticated at steps 706, 708 and 710, are then checked to determine if they contain valid data at step 712. For authentication, first the security load parameter is done at step 706 and the sequence number is loaded at step 708. The next measure, at step 710, is decrypting the authenticated packet. Once authentication is complete, at step 712, invalid data is ignored and valid data is checked for a configuration packet at step 720.
  • Configuration packets are determined by checking for [0051] Configuration ID 600 and Configuration Data 602. If the packet is not a configuration packet, the packet is assumed to be an encrypted data packet and the data is sent to OS at step 714. Configuration packets are checked for a system key match at step 724 and for a group key match at step 726. If a system key match is confirmed at step 724, the steps of 728,729 and 730 follow, if no system key match is found then at step 726 a check is made for a group key match. If a group key match is confirmed than the exemplary steps of 728.730 and 732 are carried out for the group of the client systems. The system key and group key are contained in EEPROM 302. If a match is found, then new configuration data (Server IP, MAC, Port) are pulled from the Configuration Data packet 602 at step 728, as stated. The EEPROM is updated at step 730 and then the new configuration is applied at step 732.
  • The invention has been described with reference to preferred implementations thereof, but it will be appreciated that variations and modifications within the scope of the claimed invention will be suggested to those skilled in the art. For example, the invention may be implemented on networks other than Ethernet networks such as token ring networks or used to control other aspects of a system. [0052]

Claims (20)

What is claimed is:
1. A personal computer client system, for a data network including at least one personal computer client system and a server having an internet protocol destination address, comprising:
a central processing unit (CPU);
memory;
a non-volatile memory storage device for storing the destination address of the server; and
a network adaptor with a reception portion connected to the data network for receiving network packet signals on the data network from the server in a predefined analog format and decoding the network packet signals having the internet protocol address of the server to a digital format and providing the internet protocol address of the server to the memory storage device to store the destination address of the server.
2. The personal computer client system according to
claim 1
, wherein the data network conforms to the Ethernet specification and the network packet signals on the network are digitally encoded analog signals.
3. The personal computer client system according to
claim 1
, further including auxiliary logic as a part of the network adaptor for applying network packet signals periodically to indicate selected state information regarding the personal computer client system.
4. The personal computer client system according to
claim 1
, further including auxiliary logic as a part of the network adaptor and electrically connected to be powered and active during a state of less than full power being provided to the CPU of the personal computer client system to detect network packet signals received by the personal computer client system that has data including the server's internet protocol destination address.
5. The personal computer client system according to
claim 4
, wherein the network adaptor provides the data including the server's internet protocol destination address to the memory storage device for storing the data.
6. The personal computer client system according to
claim 11
wherein the network adaptor includes a physical layer connected to the data network for receiving and transmitting network data packets to and from the server on the network side of the physical layer and for transmission of received network data packets, including data related to the server's internet protocol destination address, on the client side of the physical layer on a media independent interface bus to an auxiliary logic as a part of the network adaptor to detect network data packets received by the personal computer client system that have data including the server's internet protocol destination address.
7. The personal computer client system according to
claim 6
. further including a non-volatile storage device for storing data including the server's internet protocol destination address.
8. The personal computer client system according to
claim 7
, wherein the auxiliary logic includes a micro controller having state machines for managing data packet reception, data packet transmission and non-volatile storage device transmission.
9. The personal computer client system according to
claim 8
, further including in the personal computer client system a PCI bus, an ISA bus, a PCI/ISA bridge, and wherein the micro controller has a state machine for managing bus transmission between the network adaptor and the PCI bus and the ISA bus.
10. A method for providing update configuration data for a client personal computer system in a data network including a server, having configuration data including an internet protocol destination address, and at least one client personal computer system having a storage device for storing configuration data and a micro controller for receiving network signal packets from the server and for configuring the client personal computer system with updated configuration data, including the internet protocol destination address of the server, comprising the steps of:
receiving a network signal packet sent from the server in the micro controller in the at least one client personal computer system;
determining that the network signal packet includes the server's internet protocol destination address;
determining that the network signal packet is a match for the any one of the at least one client personal computer system; and
updating the storage device of the any one of the at least one client personal computer system with the included internet protocol destination address of the server.
11. The method as defined in
claim 10
, wherein, after the step of receiving the network signal packet, there is a step of authenticating the encryption of the network signal packet to authenticate the presence of encrypted data in the network signal packet.
12. The method as defined in
claim 11
, wherein, after the step of authenticating the encryption of the network packet, there is a step of validation of the data authenticated in the step of authenticating the encryption of the network packet.
13. The method as defined in
claim 12
, wherein in determining that the network signal packet includes the servers internet protocol destination address, the presence in the network signal packet of configuration identification and configuration data is determined.
14. The method as defined in
claim 13
, wherein in the step of determining whether the network signal packet is a match for any one of the at least one client personal computer system, there is a first determination as to whether the network signal packet is identified to any one of the least one client personal computer systems and a second determination as to whether the network signal packet is identified to a plurality of client personal computer systems.
15. A method for providing update configuration data for a client personal computer system in a data network including a server, having configuration data including an internet protocol destination address, and at least one client personal computer system having a storage device for storing configuration data and a micro controller for receiving network signal packets from the server and for configuring the at least one client personal computer system with updated configuration data, including the internet protocol destination address of the server, comprising the steps of:
receiving a network signal packet sent from the server in the micro controller in the at least one client personal computer system;
authenticating encryption of the network signal packet to authenticate the presence of encrypted data in the network signal packet;
validating the data authenticated in the step of authenticating the encryption of the network signal packet;
determining that the network signal packet includes the servers internet protocol destination address by determining the presence in the network signal packet of configuration identification and configuration data for the server;
determining that the network signal packet is a match for the any one of the at least one client personal computer systems by first determining that the network signal packet is identified to a specific one of the at least one client personal computer systems and otherwise determining as to whether the network signal packet is identified to a plurality of client personal computer systems; and
updating the storage device of any identified client personal computer systems with the included internet protocol destination address of the server.
16. A personal computer client system, for a data network including at least one personal computer client system and a server, having an internet protocol destination address, connected to each other through a network communication system, comprising:
a central processing unit (CPU);
memory;
a memory controller connecting the memory to the CPU;
a PCI bus;
a PCI bridge connecting the PCI bus to the memory controller and the CPU;
an ISA bus;
a PCI/ISA bridge connecting the ISA bus to the PCI bus;
a power management device connected to a power supply device;
a network adapter connected to the PCI bus and the network communication system;
a physical layer as a part of the network adapter connected to the network communication system to receive network packet signals from the server;
a media access controller as a part of the network adapter connected to the PCI bus;
a media independent interface (MII) bus connected to the physical layer and the media access controller;
an EEPROM for storing the destination address of the server; and
a logic module connected to the EEPROM and to the MII bus for receiving and detecting network packet signals having data related to the internet protocol destination address of the server and providing the data related to the internet protocol address of the server to the EEPROM to store the destination address of the server.
17. A personal computer client system, for a local area network (LAN) including at least one personal computer client system and a server having an internet protocol destination address, comprising:
a central processing unit (CPU);
memory;
a non-volatile memory storage device for storing the destination address of the server; and
a network adaptor with a reception portion connected to the data network for receiving network packet signals on the data network from the server in a predefined analog format and decoding the network packet signals having the internet protocol address of the server to a digital format and providing the internet protocol address of the server to the memory storage device to store the destination address of the server.
18. The personal computer client system according to
claim 17
, further including auxiliary logic as a part of the network adaptor for applying network packet signals periodically to indicate selected state information regarding the personal computer client system.
19. The personal computer client system according to
claim 17
, further including auxiliary logic as a part of the network adaptor and electrically connected to be powered and active during a state of less than full power being provided to the CPU of the personal computer client system to detect network packet signals received by the personal computer client system that has data including the server's internet protocol destination address.
20. The personal computer client system according to
claim 17
, wherein the network adaptor includes a physical layer connected to the LAN network for receiving and transmitting network data packets to and from the server on the network side of the physical layer and for transmission of received network data packets, including data related to the server's internet protocol destination address, on the client side of the physical layer on a media independent interface bus to an auxiliary logic as a part of the network adaptor to detect network data packets received by the personal computer client system that have data including the servers internet protocol destination address.
US09/855,624 1998-10-01 2001-05-14 Automatic reconfiguration system for change in management servers Abandoned US20010027521A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US09/855,624 US20010027521A1 (en) 1998-10-01 2001-05-14 Automatic reconfiguration system for change in management servers

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US09/164,657 US6353854B1 (en) 1998-10-01 1998-10-01 Automatic reconfiguration system for change in management servers having protocol destination addresses
US09/855,624 US20010027521A1 (en) 1998-10-01 2001-05-14 Automatic reconfiguration system for change in management servers

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US09/164,657 Division US6353854B1 (en) 1998-10-01 1998-10-01 Automatic reconfiguration system for change in management servers having protocol destination addresses

Publications (1)

Publication Number Publication Date
US20010027521A1 true US20010027521A1 (en) 2001-10-04

Family

ID=22595488

Family Applications (2)

Application Number Title Priority Date Filing Date
US09/164,657 Expired - Lifetime US6353854B1 (en) 1998-10-01 1998-10-01 Automatic reconfiguration system for change in management servers having protocol destination addresses
US09/855,624 Abandoned US20010027521A1 (en) 1998-10-01 2001-05-14 Automatic reconfiguration system for change in management servers

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US09/164,657 Expired - Lifetime US6353854B1 (en) 1998-10-01 1998-10-01 Automatic reconfiguration system for change in management servers having protocol destination addresses

Country Status (1)

Country Link
US (2) US6353854B1 (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040059931A1 (en) * 2002-09-20 2004-03-25 International Business Machines Corporation Pluggable trust adapter architecture, method and program product for processing communications
US20040078583A1 (en) * 2002-10-18 2004-04-22 Hitachi, Ltd. Storage device and method of setting configuration information of same
US20060200673A1 (en) * 2005-03-03 2006-09-07 Interdigital Technology Corporation Using watermarking to reduce communication overhead
US20060271647A1 (en) * 2005-05-11 2006-11-30 Applied Voice & Speech Tech., Inc. Messaging system configurator
US20080215752A1 (en) * 2005-11-18 2008-09-04 Huawei Technologies Co., Ltd. Service device, and switching network and switching method for the same
US20090164480A1 (en) * 2007-12-19 2009-06-25 Antti Lappetelainen Methods, apparatus and computer program product for altering device functionality
US9906366B1 (en) * 2017-04-07 2018-02-27 At&T Mobility Ii Llc Service provider based security in a wireless network

Families Citing this family (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100223601B1 (en) * 1997-05-29 1999-10-15 윤종용 Lcd device
US6513129B1 (en) * 1999-06-30 2003-01-28 Objective Systems Integrators, Inc. System and method for managing faults using a gateway
US7206833B1 (en) 1999-09-30 2007-04-17 Intel Corporation Platform independent alert detection and management
US7318089B1 (en) 1999-09-30 2008-01-08 Intel Corporation Method and apparatus for performing network-based control functions on an alert-enabled managed client
US6922722B1 (en) * 1999-09-30 2005-07-26 Intel Corporation Method and apparatus for dynamic network configuration of an alert-based client
US6839830B2 (en) * 2000-03-01 2005-01-04 Realtek Semiconductor Corporation Logical pipeline for data communications system
US7000012B2 (en) 2000-04-24 2006-02-14 Microsoft Corporation Systems and methods for uniquely identifying networks by correlating each network name with the application programming interfaces of transport protocols supported by the network
US7000015B2 (en) * 2000-04-24 2006-02-14 Microsoft Corporation System and methods for providing physical location information and a location method used in discovering the physical location information to an application on a computing device
US6782422B1 (en) * 2000-04-24 2004-08-24 Microsoft Corporation Systems and methods for resynchronization and notification in response to network media events
US7197542B2 (en) * 2000-06-30 2007-03-27 Ponzio Jr Frank J System and method for signaling quality and integrity of data content
US7032029B1 (en) * 2000-07-07 2006-04-18 Schneider Automation Inc. Method and apparatus for an active standby control system on a network
US7023795B1 (en) 2000-11-07 2006-04-04 Schneider Automation Inc. Method and apparatus for an active standby control system on a network
JP2003076621A (en) * 2001-08-31 2003-03-14 Fujitsu Ltd Internet appliance server, and method and program for managing environmental information of internet appliance client
US7167448B2 (en) * 2002-02-04 2007-01-23 Sun Microsystems, Inc. Prioritization of remote services messages within a low bandwidth environment
US20030149889A1 (en) * 2002-02-04 2003-08-07 Wookey Michael J. Automatic communication and security reconfiguration for remote services
US20030149740A1 (en) * 2002-02-04 2003-08-07 Wookey Michael J. Remote services delivery architecture
US20030149771A1 (en) * 2002-02-04 2003-08-07 Wookey Michael J. Remote services system back-channel multicasting
US20030177259A1 (en) * 2002-02-04 2003-09-18 Wookey Michael J. Remote services systems data delivery mechanism
US20030163544A1 (en) * 2002-02-04 2003-08-28 Wookey Michael J. Remote service systems management interface
US20030212738A1 (en) * 2002-05-10 2003-11-13 Wookey Michael J. Remote services system message system to support redundancy of data flow
US7181455B2 (en) * 2002-06-27 2007-02-20 Sun Microsystems, Inc. Bandwidth management for remote services system
US7260623B2 (en) * 2002-06-27 2007-08-21 Sun Microsystems, Inc. Remote services system communication module
US7240109B2 (en) * 2002-06-27 2007-07-03 Sun Microsystems, Inc. Remote services system service module interface
US8266239B2 (en) * 2002-06-27 2012-09-11 Oracle International Corporation Remote services system relocatable mid level manager
US8254896B2 (en) * 2003-08-25 2012-08-28 Research In Motion Limited Implementing a web server on a mobile station
US7783785B2 (en) * 2003-10-02 2010-08-24 Gateway, Inc. Method and apparatus for BIOS determination of network information and diagnostics
US8090871B2 (en) * 2003-10-20 2012-01-03 International Business Machines Corporation Determining a remote management processor's IP address
US7626944B1 (en) * 2004-03-31 2009-12-01 Packeteer, Inc. Methods, apparatuses and systems facilitating remote, automated deployment of network devices
US8065408B2 (en) * 2004-06-30 2011-11-22 Nokia, Inc. Method and system for dynamic device address management
US7461162B2 (en) * 2004-12-16 2008-12-02 International Business Machines Corporation Usage consciousness in HTTP/HTML for reducing unused data flow across a network
US8117255B2 (en) * 2005-09-07 2012-02-14 Sap Ag Systems and methods for smart client remote data monitoring
US7831694B2 (en) * 2006-05-11 2010-11-09 Arvind Wadhawan Transfer of electrical data with auto-discovery of system configuration
US7930370B2 (en) * 2007-12-31 2011-04-19 Intel Corporation Method and system for remote configuration of managed nodes
US8879570B2 (en) * 2009-09-04 2014-11-04 Brocade Communications Systems, Inc. Systems and methods for reconfiguring a network adapter in sleep mode
US10873604B1 (en) 2018-06-19 2020-12-22 Architecture Technology Corporation Methods and systems for reconfiguring network devices

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5579522A (en) * 1991-05-06 1996-11-26 Intel Corporation Dynamic non-volatile memory update in a computer system
US5857072A (en) * 1996-04-30 1999-01-05 Sprint Communications Co. L.P. System and method for distributing data simultaneously to multiple computers on a network, with advanced notice to intended recipients
US5913218A (en) * 1995-11-06 1999-06-15 Sun Microsystems, Inc System and method for retrieving and updating configuration parameter values for application programs in a computer network
US6119234A (en) * 1997-06-27 2000-09-12 Sun Microsystems, Inc. Method and apparatus for client-host communication over a computer network
US6389579B1 (en) * 1998-01-26 2002-05-14 Chameleon Systems Reconfigurable logic for table lookup
US6560699B1 (en) * 1999-10-20 2003-05-06 Cisco Technology, Inc. Constraint-based language configuration files for updating and verifying system constraints

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4750175A (en) * 1986-08-29 1988-06-07 Pactel Communications Companies Network diagnostic apparatus and method
US5305321A (en) * 1992-02-24 1994-04-19 Advanced Micro Devices Ethernet media access controller with external address detection interface and associated method
US5404544A (en) * 1992-06-05 1995-04-04 Advanced Micro Devices System for periodically transmitting signal to/from sleeping node identifying its existence to a network and awakening the sleeping node responding to received instruction
US5594426A (en) * 1993-09-20 1997-01-14 Hitachi, Ltd. Network station and network management system
US5650800A (en) * 1995-05-15 1997-07-22 Inelec Corporation Remote sensor network using distributed intelligent modules with interactive display
TW292365B (en) * 1995-05-31 1996-12-01 Hitachi Ltd Computer management system
US5905867A (en) * 1996-11-12 1999-05-18 The United States Of America As Represented By The Secretary Of The Navy Apparatus for monitoring environmental parameters at network sites
US5892690A (en) * 1997-03-10 1999-04-06 Purechoice, Inc. Environment monitoring system
US6249812B1 (en) * 1998-10-01 2001-06-19 International Business Machines Corporation Interactive system support using a system management asic

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5579522A (en) * 1991-05-06 1996-11-26 Intel Corporation Dynamic non-volatile memory update in a computer system
US5913218A (en) * 1995-11-06 1999-06-15 Sun Microsystems, Inc System and method for retrieving and updating configuration parameter values for application programs in a computer network
US5857072A (en) * 1996-04-30 1999-01-05 Sprint Communications Co. L.P. System and method for distributing data simultaneously to multiple computers on a network, with advanced notice to intended recipients
US6119234A (en) * 1997-06-27 2000-09-12 Sun Microsystems, Inc. Method and apparatus for client-host communication over a computer network
US6389579B1 (en) * 1998-01-26 2002-05-14 Chameleon Systems Reconfigurable logic for table lookup
US6560699B1 (en) * 1999-10-20 2003-05-06 Cisco Technology, Inc. Constraint-based language configuration files for updating and verifying system constraints

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7475239B2 (en) 2002-09-20 2009-01-06 International Business Machines Corporation Pluggable trust adapter architecture, method and program product for processing communications
US20040059931A1 (en) * 2002-09-20 2004-03-25 International Business Machines Corporation Pluggable trust adapter architecture, method and program product for processing communications
US7877520B2 (en) 2002-10-18 2011-01-25 Hitachi, Ltd. Storage device and method of setting configuration information of same
US20040078583A1 (en) * 2002-10-18 2004-04-22 Hitachi, Ltd. Storage device and method of setting configuration information of same
US7136939B2 (en) * 2002-10-18 2006-11-14 Hitachi, Ltd. Storage device and method of setting configuration information of same
US20070038747A1 (en) * 2002-10-18 2007-02-15 Hitachi, Ltd. Storage device and method of setting configuration information of same
US7562160B2 (en) 2002-10-18 2009-07-14 Hitachi, Ltd. Storage device and method of setting configuration information of same
US20090248905A1 (en) * 2002-10-18 2009-10-01 Hitachi, Ltd. Storage Device and Method of Setting Cofiguration Information of same
US20060200673A1 (en) * 2005-03-03 2006-09-07 Interdigital Technology Corporation Using watermarking to reduce communication overhead
US8458481B2 (en) 2005-03-03 2013-06-04 Interdigital Technology Corporation Using watermarking to reduce communication overhead
US7987369B2 (en) * 2005-03-03 2011-07-26 Interdigital Technology Corporation Using watermarking to reduce communication overhead
US7895308B2 (en) * 2005-05-11 2011-02-22 Tindall Steven J Messaging system configurator
US20060271647A1 (en) * 2005-05-11 2006-11-30 Applied Voice & Speech Tech., Inc. Messaging system configurator
US20080215752A1 (en) * 2005-11-18 2008-09-04 Huawei Technologies Co., Ltd. Service device, and switching network and switching method for the same
US20090164480A1 (en) * 2007-12-19 2009-06-25 Antti Lappetelainen Methods, apparatus and computer program product for altering device functionality
US9112985B2 (en) * 2007-12-19 2015-08-18 Core Wireless Licensing S.A.R.L Methods, apparatus and computer program product for altering device functionality
US9906366B1 (en) * 2017-04-07 2018-02-27 At&T Mobility Ii Llc Service provider based security in a wireless network

Also Published As

Publication number Publication date
US6353854B1 (en) 2002-03-05

Similar Documents

Publication Publication Date Title
US6353854B1 (en) Automatic reconfiguration system for change in management servers having protocol destination addresses
US6249812B1 (en) Interactive system support using a system management asic
US7155497B2 (en) Configuring a network parameter to a device
US6314455B1 (en) Data processing system and method for permitting a server to remotely initiate a client&#39;s boot block recovery
US6526507B1 (en) Data processing system and method for waking a client only in response to receipt of an authenticated Wake-on-LAN packet
US8862709B2 (en) Remote management of boot application
US7159016B2 (en) Method and apparatus for configuring an endpoint device to a computer network
US6304900B1 (en) Data processing system and method for permitting a server computer system to remotely modify operation of a client system&#39;s network hardware
US7280547B2 (en) Dynamic WAN port detection
US7720057B2 (en) Packet relay apparatus and control method for data relay apparatus
US6266696B1 (en) Full time network auxiliary for a network connected PC
US6381636B1 (en) Data processing system and method for permitting a server to remotely access a powered-off client computer system&#39;s asset information
US6263388B1 (en) Data processing system and method for remotely disabling network activity in a client computer system
US20050166213A1 (en) Remote deployment of executable code in a pre-boot environment
US6334150B1 (en) Data processing system and method for remotely disabling a client computer system
US20070073832A1 (en) Method and system of storing and accessing meta-data in a network adapter
US6405259B1 (en) Data processing system and method for transmission of a network packet specifying a group identifier identifying a selected plurality of clients
US6275851B1 (en) Data processing system and method for remotely controlling modification of a client&#39;s initialization settings
US20050160287A1 (en) Method to deploy wireless network security with a wireless router
US6415324B1 (en) Data processing system and method for permitting a client computer system to temporarily prohibit remote management
US6628663B1 (en) System and method for permitting a dumb device to create and transmit network packets
US6742027B1 (en) Data processing system and method for permitting a server to remotely disable a client computer system&#39;s input device
US6601174B1 (en) Data processing system and method for permitting a server to remotely provide a client computer system&#39;s settings password to the client
US6334147B1 (en) Data processing system and method for remotely accessing a client computer systems&#39;s individual initialization settings while the client is powered off
EP1135890B1 (en) Data processing system and method for remotely disabling network activity in a client computer system

Legal Events

Date Code Title Description
AS Assignment

Owner name: LENOVO (SINGAPORE) PTE LTD., SINGAPORE

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:INTERNATIONAL BUSINESS MACHINES CORPORATION;REEL/FRAME:016891/0507

Effective date: 20050520

Owner name: LENOVO (SINGAPORE) PTE LTD.,SINGAPORE

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:INTERNATIONAL BUSINESS MACHINES CORPORATION;REEL/FRAME:016891/0507

Effective date: 20050520

STCB Information on status: application discontinuation

Free format text: ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION