摘要:
A method and system for accessing a remote real communication port (“COM port”) from a server blade in a server blade chassis by creating a virtual COM port in the server blade. A basic input/output system (BIOS) controller monitors an internal COM port in the server blade for communication traffic. Upon detecting the communication traffic, the BIOS controller reroutes the traffic to a virtual USB COM port created by the BIOS controller chipset. The virtual USB COM port directs the communication traffic to an internal universal serial bus (USB) device in the server blade. The USB device then forwards the traffic to an Ethernet media access controller (MAC) input/output (I/O) on a sideband channel to a remote system, which passes the communication traffic to a real COM port in the remote system.
摘要:
A method and system for accessing a remote real communication port (“COM port”) from a server blade in a server blade chassis by creating a virtual COM port in the server blade. A basic input/output system (BIOS) controller monitors an internal COM port in the server blade for communication traffic. Upon detecting the communication traffic, the BIOS controller reroutes the traffic to a virtual USB COM port created by the BIOS controller chipset. The virtual USB COM port directs the communication traffic to an internal universal serial bus (USB) device in the server blade. The USB device then forwards the traffic to an Ethernet media access controller (MAC) input/output (I/O) on a sideband channel to a remote system, which passes the communication traffic to a real COM port in the remote system.
摘要:
A method and system for accessing a remote real communication port (“COM port”) from a server blade in a server blade chassis by creating a virtual COM port in the server blade. A basic input/output system (BIOS) controller monitors an internal COM port in the server blade for communication traffic. Upon detecting the communication traffic, the BIOS controller reroutes the traffic to a virtual USB COM port created by the BIOS controller chipset. The virtual USB COM port directs the communication traffic to an internal universal serial bus (USB) device in the server blade. The USB device then forwards the traffic to an Ethernet media access controller (MAC) input/output (I/O) on a sideband channel to a remote system, which passes the communication traffic to a real COM port in the remote system.
摘要:
A client on a network is provided with auxiliary low power logic, at the network adoptor, that is always active and simulates network traffic (e.g., Ethernet format) normally sent under control of the main client system processor(s). This logic collects client status information and reports to the network manager, even when the system CPU is powered down, information which allows the network manager to exercise broader control and perform maintenance and upgrades which would otherwise require a dialog with the user and/or limit maintenance and reconfiguration of the client system to off-hours activity.
摘要:
A method and system for booting up multiple PCI peripheral devices, such that the number of bootable PCI peripheral devices is not limited by the amount of computer system memory that is dedicated to storing executable boot code for the peripheral devices. The executable boot code is stored on a Read Only Memory (ROM) on each peripheral device. When a new PCI peripheral device begins to boot up, a check for available memory space in a ROM scan memory address space is performed. If there is not enough available room in the ROM scan memory address space for the new device's executable boot code, then a ROM scan detection logic pages an image of another peripheral device's executable boot code out of the ROM scan memory address space before storing the new device's executable boot code into the ROM scan memory address space.
摘要:
A method and system are disclosed for dynamically loading selected BIOS modules and settings from a server computer system to a client computer system according to an identity of a user who is currently utilizing the client computer system. The client computer system is coupled to a server computer system via a network. Selected BIOS modules and settings are associated with a particular user. These BIOS modules and settings are those preferred by the particular user to use in order to customize the client computer system when the client computer system is used by the particular user. The associations among the particular user and the selected BIOS modules and settings are stored in the server computer system. The selected BIOS modules and settings are downloaded from the server computer system to the client computer system when the particular user causes the client computer system to start booting, i.e. when the particular user is the current user. The client computer system is then booted utilizing these downloaded BIOS modules and settings. The client computer system is booted utilizing BIOS modules and settings received from the server computer system in order to customize the client computer system according to the current user's preferences.
摘要:
Systems and arrangements for remotely selecting a bootable image via a WOL packet for a wake-on-LAN (WOL) capable computer are contemplated. Server-side embodiments include hardware and/or software for determining a client to be managed, determining whether the client is active on the network, and transmitting a WOL packet having a vector, or operating system partition identification (OSPID), to describe a bootable image accessible by the WOL capable computer. Some embodiments may include an OSPID that points to a secure bootable image such as a bootable image on a hard drive, a compact disk (CD) connected to the computer, or other local resource. Client-side embodiments may receive the WOL packet at, for instance, a network interface card (NIC), recognize that the WOL packet includes an OSPID that describes the bootable image to boot, and implement an alternative boot sequence to boot from that bootable image.
摘要:
Systems and arrangements for remotely selecting a bootable image via a WOL packet for a wake-on-LAN (WOL) capable computer are contemplated. Server-side embodiments include hardware and/or software for determining a client to be managed, determining whether the client is active on the network, and transmitting a WOL packet having a vector, or operating system partition identification (OSPID), to describe a bootable image accessible by the WOL capable computer. Some embodiments may include an OSPID that points to a secure bootable image such as a bootable image on a hard drive, a compact disk (CD) connected to the computer, or other local resource. Client-side embodiments may receive the WOL packet at, for instance, a network interface card (NIC), recognize that the WOL packet includes an OSPID that describes the bootable image to boot, and implement an alternative boot sequence to boot from that bootable image.
摘要:
Systems and arrangements for remotely selecting a bootable image via a WOL packet for a wake-on-LAN (WOL) capable computer are contemplated. Server-side embodiments include hardware and/or software for determining a client to be managed, determining whether the client is active on the network, and transmitting a WOL packet having a vector, or operating system partition identification (OSPID), to describe a bootable image accessible by the WOL capable computer. Some embodiments may include an OSPID that points to a secure bootable image such as a bootable image on a hard drive, a compact disk (CD) connected to the computer, or other local resource. Client-side embodiments may receive the WOL packet at, for instance, a network interface card (NIC), recognize that the WOL packet includes an OSPID that describes the bootable image to boot, and implement an alternative boot sequence to boot from that bootable image.
摘要:
A wireless network access point is described which provides the resources of a backbone network to wireless clients. The access point is able to detect a degraded condition on the backbone network. Upon detecting the degraded condition, the access point selectively dissociates clients on the wireless network. In order to select which clients are dissociated first, a predetermined client dissociation policy is established. The policy can include account priority, bandwidth utilization, elapsed time since last transfer, and, amongst other criteria, whether the client is currently transferring in peer-to-peer mode on the wireless network. Upon detecting the degraded condition, either immediately or after a predetermined delay to ensure that the degraded condition is not temporary, clients on the wireless network are dissociated according to the preestablished policy.