摘要:
Systems, methods and media for providing access to a network are disclosed. More particularly, hardware and/or software for providing network access only to client computer systems with acceptable status information are disclosed. Embodiments include a method that generally includes receiving a request for a network address from a client computer system via a network and determining whether the status of the requesting client computer system is acceptable. In the event that the status of the client computer system is determined to be acceptable, the method also generally includes assigning and transmitting a network address to the client computer system. In some embodiments, the status of the client computer system may include information about the system configuration, installed software, presence of files such as virus files, etc.
摘要:
A method and system for defining every operation required of a client PC before being authorized to obtain an IP address that will enable the client PC to join a network serviced by specified DHCP servers. Each successful operation generates a value that is stored on a pre-determined location on the client PC's hard drive. A hash is created from all of the stored values, and after being encrypted, the hash is sent to the DHCP server when requesting an IP address. The DHCP server has a hash string indicative of the required status of operations that should be performed by any client PC requesting an IP address to join the network serviced by the DHCP server. If the DHCP's has string does not match with the hash sent by the client PC, then the DHCP server will not provide the requisite IP address to the client PC.
摘要:
A data processing network configuration includes a server and an access point wired to a network and a mobile system wirelessly connected to the access point. The access point receives and stores a request to retrieve information from the mobile system. The mobile system, when in a powered down state, powers its wireless network adapter periodically to poll the access point to discover the stored request for information. The mobile system responds to discovery of the stored request by retrieving the requested information from nonvolatile storage of the mobile system and transmitting the requested information via the wireless network adapter while otherwise remaining powered down. The information request may be a system management request and the request packet may include a Media Access Control (MAC) address repeated multiple times. The access point stores pending requests in a table having an entry for each associated mobile system.
摘要:
An apparatus, system and method of verifying an interface address are provided. A communication device is connected to a network. The apparatus, system and method query the communication device for an interface address identifying the communication device to the network. The apparatus, system, and method further receive the interface address from the communication device and identify an invalid interface address. In one embodiment, the interface address is invalid if it is outside of a specified interface address range. The apparatus, system, and method mitigate the invalid interface address. In one embodiment, the apparatus, system, and method mitigate the invalid interface address by deactivating the network.
摘要:
A method and system is described for remotely managing a battery powered client computer. A data packet, which includes a set of instructions, is sent to the client computer from a managing computer. Included in the data packet is a field indicating how much computing time is needed to execute the set of instructions. If the client computer is operating on battery power, the client computer determines if there is enough battery life remaining to execute the set of instructions. If not, then the set of instructions are disregarded.
摘要:
A wireless network access point is described which provides the resources of a backbone network to wireless clients. The access point is able to balance loads by deferring association of new clients and thereby directing clients to associate with alternative access points having improved backbone connectivity. Where the client is unable to find an alternative access point, the client will eventually make a second association request to the access point. The access point, in identifying the second association request of the client, proceeds to associate the client in response to the second association request. Specific time limits can be imposed relative to the second association request.
摘要:
A wireless network client is described which obtains access to the resources of a backbone network provided by a wireless access point. The client is adapted to receive a reassociation request from an access point which is able to detect a degraded condition on the backbone network and inform clients of the degraded condition. Upon detecting the degraded condition, the access point transmits or broadcasts a reassociation request to one or more clients associated with the access point. Information can also be sent identifying the degraded performance of the backbone network and can include other information useful to clients. Once a client has received the reassociation request and/or the informed identifying the degraded performance, the clients seek access to the backbone network through other access points which are not experiencing degraded performance. The seek preferably omits the access point identified as experiencing degraded backbone performance.
摘要:
A wireless network access point is described which provides the resources of a backbone network to wireless clients. The access point is able to detect a degraded condition on the backbone network. Upon detecting the degraded condition, the access point transmits or broadcasts a reassociation request to one or more clients associated with the access point. In addition, the rate at which new associations are made is halted or reduced during the degraded backbone condition. In one embodiment, the association rate is reduced by increasing the interval between beacons transmitted by the access point which identify the access to the backbone network.
摘要:
Methods and arrangements for managing a flash drive, hard disk, or connection between the two, in a manner to ensure that sensitive data is not decrypted at any time when it would be vulnerable. Accordingly, in a first implementation, the data may preferably be encrypted as it first goes into a flash drive and decrypted when it comes out of the flash drive. In another implementation, the flash drive may be logically bound to the hard disk, so that they would both use the same encryption key. In yet another implementation, if a hard disk is moved to another system, then the flash drive may also preferably be simultaneously moved.
摘要:
An arrangement for facilitating remote booting in diskless client systems as just described. To this end, there is broadly contemplated herein the employment of a hypervisor that can freely accommodate a variety of booting arrangements for a given OS. This then ensures that few if any modifications, especially costly ones, would need to be made to the OS to ensure greater versatility.