摘要:
A system for configuring a network adapter of a computer without user intervention. Device information for the devices of the computer, including each network adapter, is collected to uniquely identify the devices and to describe the device characteristics associated with the operation of those devices with the computer. Computer resources, which support the functions of the devices within the computer, are allocated based upon this device information. This allocation process prevents a potential conflicting use of computer resources by the installed devices. A device driver, which enables communications between a corresponding device and the computer, is also identified and loaded for each of the devices in response to the allocation of computer resources. In response to loading the driver for each network adapter, each network configuration routine or layer for a particular interface of the corresponding network adapter is identified. In response to the identification of these layers, each identified layer for the particular interface is loaded. In turn, layers are identified and loaded for each of the remaining interfaces of the corresponding network adapter.
摘要:
A system for managing the assignment of device drivers to devices of a computer system. The computer system can maintain device-related information for a primary device and for devices that are "compatible" with the primary device. This device information supplies an indication of whether a device driver intended for primary use with a device is maintained by the computer system. Moreover, the device information provides an indication of whether one or more device drivers compatible with the primary device are maintained by the computer system. During assignment of device drivers to devices of the computer system, the device information is examined to determine whether the intended device driver for the primary device is available to support the operations of that device. If not, the device information is examined to determine whether a device driver for a device that is compatible with the primary device is available for supporting computer operations of the primary device. In this event, if the device information lists more than one device that is compatible with the primary device, then the compatible device having the highest priority or ranking can be selected and the device driver for the selected device is used to support the operations of the primary device.
摘要:
A system for configuring a network adapter of a computer without user intervention. Device information for the devices of the computer, including each network adapter, is collected to uniquely identify the devices and to describe the device characteristics associated with the operation of those devices with the computer. Computer resources, which support the functions of the devices within the computer, are allocated based upon this device information. This allocation process prevents a potential conflicting use of computer resources by the installed devices. A device driver, which enables communications between a corresponding device and the computer, is also identified and loaded for each of the devices in response to the allocation of computer resources. In response to loading the driver for each network adapter, each network configuration routine or layer for a particular interface of the corresponding network adapter is identified. In response to the identification of these layers, each identified layer for the particular interface is loaded. In turn, layers are identified and loaded for each of the remaining interfaces of the corresponding network adapter.
摘要:
A method and system are disclosed for invoking a limited or "fail-safe" functionality from a computer system having a graphical user interface (GUI). In one aspect, a computer operating system having GUI functionality can be activated with two different sets of GUI features. Normally, the operating system provides a full complement of GUI features. Alternatively, the operating system provides a more limited set of GUI features. The operating system invokes the limited set of GUI features either in response to a user command, such as a keyboard function key pressed during the bootstrap loading sequence of the operating system, or automatically in response to a failure of an attempt by the computer system to load the normal complement of GUI functions. With the limited set of GUI features, the user of the computer can take advantage of the power of graphical user interfaces even when the computer system is not operating normally. For example, the user can run graphically based diagnostic and repair programs from the "fail-safe" mode. The invention finds application in stand-alone and networked computer systems and, in particular, in systems that store the bulk of the operating system software on a remote server accessible only by network.
摘要:
The role of a system in a network may be categorized as a networking system, a security system, a systems management system, a mail system, a database system, a web system, a file/print system, a communication and collaboration system, and/or any other system in the network. The role of a target system may be determined by sending test probes to one or more systems in a target network. The test probes may be data packets crafted to produce a particular response from a target system. The received responses may be compared to signature responses of a basis system with known operating system, services, and/or roles. By matching the received responses with signature responses, a role resolver may associate a role with the target system.
摘要:
A system for configuring a devices of a computer with minimal support by a user. Device information for the devices of the computer is collected to uniquely identify the devices and to describe the device characteristics associated with the operation of those devices with the computer. Computer resources, which support the functions of the devices within the computer, are allocated based upon this device information. This allocation process prevents a potential conflicting use of computer resources by the installed devices. A device driver, which enables communications between a corresponding device and the computer, is also identified and loaded for each of the devices in response to the allocation of computer resources.
摘要:
The role of a system in a network may be categorized as a networking system, a security system, a systems management system, a mail system, a database system, a web system, a file/print system, a communication and collaboration system, and/or any other system in the network. The role of a target system may be determined by sending test probes to one or more systems in a target network. The test probes may be data packets crafted to produce a particular response from a target system. The received responses may be compared to signature responses of a basis system with known operating system, services, and/or roles. By matching the received responses with signature responses, a role resolver may associate a role with the target system.
摘要:
A system for allocating resources for use by devices of a computer. Device information for the devices of the computer is collected to uniquely identify the devices and to describe the device characteristics associated with the operation of those devices with the computer. A list of device configurations is constructed in response to the collection of device information. Each device is represented by at least one device configuration, which defines the resource element requirements for the corresponding device. Computer resources, which support the functions of the devices within the computer, are allocated based upon the device configurations and the availability of the desired resources. This allocation process prevents a potential conflicting use of computer resources by the installed devices.
摘要:
The present invention is directed to tracking and managing failure-susceptible operations in a computer system. In a preferred embodiment, the performance of failure-susceptible operations is monitored, such that, when execution of the operating system is interrupted then restarted, it can be determined which failure-susceptible operation was in progress at the point at which execution of the operating system was interrupted. In one embodiment, this monitoring is performed using a stack data structure. When a failure-susceptible operation is invoked, an entry is pushed on the stack identifying the invoked failure-susceptible operation. On the other hand, when a failure-susceptible operation is completed, the entry identifying the completed failure-susceptible operation is popped off the stack. The failure-susceptible operation that was in progress at the point at which execution was last interrupted is then determined to be the failure-susceptible operation identified by the top entry on the stack when execution resumes. In a further preferred embodiment, subsequent attempted invocation of the operation determined to be in progress when execution was interrupted is inhibited.
摘要:
A system for configuring devices of a computer system without user intervention. Device information for each of the devices is collected to uniquely identify the devices and to describe the device characteristics associated with the operation of devices with the computer. Computer resources, which support the functions of the devices within the computer, are allocated based upon the device information. This allocation process prevents a potential conflicting use of the resources by the devices. A device driver, which enables communications between the corresponding device and the computer system, is also identified for each of the devices in response to the device information. In response to the allocation of resources, the identified device drivers are loaded and the devices are activated for operation with the computer.