WO2003001392A1 - Sequential identification of a group of computers - Google Patents

Sequential identification of a group of computers Download PDF

Info

Publication number
WO2003001392A1
WO2003001392A1 PCT/US2002/020029 US0220029W WO03001392A1 WO 2003001392 A1 WO2003001392 A1 WO 2003001392A1 US 0220029 W US0220029 W US 0220029W WO 03001392 A1 WO03001392 A1 WO 03001392A1
Authority
WO
WIPO (PCT)
Prior art keywords
computer
group
signal
identified
network identification
Prior art date
Application number
PCT/US2002/020029
Other languages
French (fr)
Inventor
Peter H. Beckman
Trammel Hudson
James S. Painter
Original Assignee
Turbolinux, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Turbolinux, Inc. filed Critical Turbolinux, Inc.
Publication of WO2003001392A1 publication Critical patent/WO2003001392A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/006Identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/32Monitoring with visual or acoustical indication of the functioning of the machine

Definitions

  • the present application generally relates to identifying a computer in a group of computers. More particularly, the present application relates to identifying the network identification of the computer.
  • a group of computers can be linked together on a computer network. In some applications, these computers can be arranged as a rack of computers. Each computer can function as a server, client, or both as a server and client.
  • the installation and maintenance of such a group of computers can involve correlating each computer with its network identification, such as an IP or MAC address.
  • This network identification can be dynamically or statically assigned to each computer in the group.
  • a server can communicate with a particular computer in the group of computers.
  • a system operator can identify a computer within the group of computers that needs maintenance or attention.
  • a system operator identifies each computer in a group of computers by either writing down hardware identification numbers attached to each computer's physical hardware, or interacting with each computer using input devices such as a keyboard or a mouse.
  • a system operator can sequentially attach a keyboard to each computer and use keyboard input to identify the computer.
  • the system operator can optionally assign a new network identification, such as an IP or MAC address, to the computer.
  • IP or MAC address a new network identification
  • a keyboard and monitor when using input devices such as a keyboard to interact with each computer, a keyboard and monitor must be attached to each computer in the group of computers. This arrangement can be inconvenient, especially when a single keyboard and a single monitor must be manually connected to each of the computers in a group of computers as each computer is identified.
  • Another way of identifying computers in a group of computers involves using specialized hardware that is connected to the group of computers.
  • This specialized hardware can match each computer's physical hardware to a network address.
  • such specialized hardware can be costly to obtain and use.
  • the individualized boot software can include media, such as a floppy disk or a CD-ROM, that includes a unique ID that can be used to identify and sequence the group of computers.
  • media such as a floppy disk or a CD-ROM
  • both producing and using individualized boot software can be time consuming, particularly because the boot software media must be inserted into the correct computer within the group in order for the individualized boot software to identify the computer accurately.
  • a failure of the boot software media requires rebuilding that specific boot software media for the individual computers that failed.
  • Yet another way of identifying computers in a group of computers includes sequentially booting the computers, and identifying each computer by determining the order in which the computers complete their boot-up sequence.
  • this way of identifying a computer in a group of computers can be time consuming because it requires waiting for the computers to boot-up and obtain a network address. The time required for the computers to boot-up can depend on factors such as the details of the computer hardware, network load, and the like.
  • the group of computers may provide no indication to the human operator that a computer in the group failed, thus producing an identification sequence that is missing one or more of the computers in the group. Accordingly, when the operator discovers the error, the sequence must be reconstructed.
  • the present application relates to methods and apparatus for identifying a computer among a group of computers, where each computer in the group is connected to a server and has a network identification.
  • a computer in the group is physically manipulated after being turned on.
  • a signal is sent to the server that can be identified with the physically manipulated computer and indicates that the computer has been physically manipulated.
  • the signal is received at the server.
  • the network identification associated with the received signal is associated with the physically manipulated computer.
  • the apparatus includes a system having a group of computers to be identified and a server.
  • Each computer in the group of computers is configured to detect a physical manipulation to the computer and send a signal to the server indicating that the computer has been manipulated and can be identified with the computer.
  • the server is configured to receive a signal from each computer in the group of computers and associate it with the manipulated computer.
  • Fig. 1 is a schematic diagram depicting a server and a group of computers
  • Fig. 2 is a flow chart depicting stages of an exemplary identification process
  • Fig. 3 is a flow chart depicting stages of another exemplary identification process
  • Fig. 4 is a flow chart depicting stages of yet another exemplary identification process
  • Fig. 5 is a flow chart depicting an exemplary process that can be used to identify and sequence a computer in a group of computers.
  • Fig. 6 is another schematic diagram depicting a server and a group of computers.
  • a group of computers 100 can be arranged in a stack, rack, or any other configuration, and connected to server 102.
  • Each computer in the group of computers 100 can function as a server, client, or both as a server and client, depending on the application.
  • server 100 can function as a server, client, or both as a server and client, depending on the application.
  • Fig. 1 shows a group of computers 100 arranged in a rack configuration, it should be recognized that the group of computers 100 can be arranged in any configuration.
  • each computer in a group of computers 100 can be identified by a server by associating a network address, such as an IP or MAC address 104, with the computer.
  • computers and servers can include software that allows the computers and servers to communicate with each other.
  • this software can allow a computer to contact a server and register its network address, provide a list of ways that the computer can be identified, and the like.
  • each computer in the group of computers can be identified sequentially.
  • step 200 an operator can physically manipulate the state of a computer that is already turned on in a manner that is detectable by the computer.
  • step 202 the computer can detect the manipulation and send a message to server 102 (Fig. 1) indicating that the computer has been manipulated.
  • the message can include information such as network identification of the computer, information about the manipulation, and the like.
  • server 102 (Fig. 1) can then identify the manipulated computer by associating which computer was physically manipulated with which computer sent the message.
  • server 102 (Fig. 1) can associate a network identification, such as an IP or MAC address, and the like, to this computer.
  • step 300 the computer can send heartbeat messages to server 102 (Fig. 1) on a periodic basis.
  • the heartbeat messages can include information such as network identification, information about the computer, and the like.
  • step 302 an operator can physically manipulate the state of the computer in a manner that is detectable by the computer.
  • step 304 the computer can detect the manipulation and consequently fail to send at least one heartbeat message to server 102 (Fig. 1).
  • server 102 (Fig. 1) can identify the manipulated computer by associating which computer was physically manipulated with which computer failed to send a heartbeat message.
  • server 102 (Fig. 1) can associate a network identification, such as a network address, and the like, to this computer.
  • step 400 an operator can physically manipulate the state of a computer that is already turned on in a manner that is detectable by the computer.
  • step 402 software can automatically detect the manipulation and can identify the manipulated computer and associate it with a network identification, such as its EP or MAC address, and the like.
  • the software can be installed on the server, or as a system installed on both the computer and server.
  • the computer can emit a signal indicating that the computer is ready to be identified.
  • This signal can be detectable by an operator in some manner such as visibly, audibly, and the like.
  • the signal can include activating a light, activating a light emitting diode (LED), manipulating the display on an integral LCD, manipulating the display on an integral display panel, ejecting or reinserting a CD-ROM, emitting an auditory sound, and the like.
  • Activating a light or LED can include illuminating the light or LED, flashing the light or LED, and the like.
  • step 500 may not be used in all applications, such as when a computer is always ready for identification.
  • an operator can physically manipulate the state of the computer in a manner that is detectable by the computer.
  • the computer can detect the manipulation and send a message to server 102 (Fig. 1) indicating that the computer has been manipulated.
  • the message can include information such as network identification of the computer, information about the manipulation, and the like.
  • the computer can fail to send at least one heartbeat message when the computer detects an manipulation in step 504.
  • server 102 can then identify the manipulated computer by associating which computer was physically manipulated with which computer sent the message.
  • server 102 can associate a network identification, such as an JP or MAC address, and the like, to this computer.
  • server 102 can send a message to the computer.
  • the message can include information such as information that the computer has been properly identified and sequenced, and the like, and the message can include a command such as a command that the computer produce a signal indicating that the computer has been properly identified and sequenced.
  • the computer being identified produces a signal.
  • the signal produced by the computer can be detectable by an operator in some manner, such as visibly, audibly, and the like.
  • the signal can include activating a light, activating a light emitting diode (LED), manipulateing the display on an integral LCD, manipulating the display on an integral display panel, ejecting or reinserting a CD-ROM, emitting an auditory sound, and the like.
  • Activating a light or a to LED can include illuminating the light or LED, flashing the light or LED, and the like.
  • step 508 and/or step 510 may be omitted in some applications, such as when server 102 (Fig. 1) provides an indication that the computer has been properly identified. For instance, when a computer fails to send a heartbeat message, the server can emit a signal that can notify an operator that the computer has been properly identified and seqenced.
  • step 512 of the present embodiment identification and sequencing information gathered about the computers can be used to assign network identification, such as an IP address, and the like, to the computers in an ordered sequence.
  • network identification such as an IP address, and the like
  • step 512 may be omitted in some applications, such as when the computers have already been assigned proper network addresses.
  • a group of computers 100 connected to server 102 is shown.
  • the following is an example of a process of identifying the computers in the group of computers 100.
  • computers 600, 602, and 604 have already been identified.
  • computer 600 emitted a signal indicating that it was ready to be identified by activating its floppy light 106, 116.
  • an operator activated the power button 108, 112 on computer 600 in order to manipulate computer 600.
  • computer 600 was successfully identified, computer 600 emitted a sound 110, indicating that identification was successful.
  • computers 602 and 604 have also been identified by server 102.
  • computer 602 emitted a signal indicating that it was ready to be identified by activating its floppy light 106, 116.
  • an operator ejected a floppy disk 108, 118 from computer 602 in order to manipulate computer 602.
  • computer 602 emitted a sound 110, indicating that identification was successful.
  • the state of a computer can be physically manipulated in various ways.
  • the state of a computer can be manipulated by manipulating any device, switch, interface, signal, and the like, that is connected to or part of the computer, and that is detectable by server 102 either directly or through a message generated by software on the computer.
  • physically manipulating a computer can include inserting or ejecting a floppy disk (118, 120), CD-ROM disk, and the like, into or from the computer.
  • Another way that a computer can be physically manipulated includes manipulating computer hardware, such as by moving a mouse, manipulating buttons or keys such as the power button (112), suspend button, reboot button, hotkey, keyboard key, and the like.
  • a computer can be physically manipulated by attaching or removing a peripheral device, such as a keyboard, a mouse, dongle, serial device, parallel device, USB device, secondary network interface cable or card, and the like.
  • a computer can be physically manipulated by attaching or removing a device, such as a keyboard, mouse, and the like, to or from any connector, such as a USB port, serial port, parallel port, Ethernet, other communications port, and the like.
  • a computer can be physically manipulated by detaching a primary network cable, card, network interface device, and the like, where the detachment may be for a particular length of time, or may be detached until the entire set of computers has been identified and sequenced.
  • a computer can be physically manipulated by a communication with an infrared port on the computer, or disconnecting the communications cable, card, network interface device, and the like, such as an Ethernet cable or card, while the server and computer or exchanging heartbeat messages.
  • a computer can be physically manipulated by inserting or ejecting a hot plug device, such as a hard drive, PCMCIA device, and the like.

Abstract

In identifying a computer among a group of computers (100) connected to a server, where each computer in the group is connected to a server and has a network identification (104), the computer to be identified is physically manipulated after being turned on. A signal is sent to the server that includes data which can be associated with a network identification for the computer and indicates that the computer has been physically manipulated. The server receives the signal. The network identification (104) associated with the sender of the received signal is associated with the physically manipulated computer.

Description

SEQUENTIAL IDENTIFICATION OF A GROUP OF COMPUTERS
CROSS-REFERENCE TO RELATED APPLICATIONS
The present application claims priority of an earlier filed provisional application U.S. Ser. No. 60/300,191, entitled SEQUENTIAL IDENTIFICATION OF A GROUP OF COMPUTERS, filed on June 21, 2001, the entire content of which is incorporated herein by reference.
BACKGROUND
1. Field of the Invention
The present application generally relates to identifying a computer in a group of computers. More particularly, the present application relates to identifying the network identification of the computer.
2. Related Art
A group of computers can be linked together on a computer network. In some applications, these computers can be arranged as a rack of computers. Each computer can function as a server, client, or both as a server and client.
The installation and maintenance of such a group of computers can involve correlating each computer with its network identification, such as an IP or MAC address. This network identification can be dynamically or statically assigned to each computer in the group. By identifying a computer's network identification, a server can communicate with a particular computer in the group of computers. Furthermore, a system operator can identify a computer within the group of computers that needs maintenance or attention.
Typically, a system operator identifies each computer in a group of computers by either writing down hardware identification numbers attached to each computer's physical hardware, or interacting with each computer using input devices such as a keyboard or a mouse. In particular, a system operator can sequentially attach a keyboard to each computer and use keyboard input to identify the computer. After identifying a computer in a group of computers, the system operator can optionally assign a new network identification, such as an IP or MAC address, to the computer. However, these ways of identifying computers in a group of computers are time consuming and typically require error-free recordation of hardware identification numbers, such as a MAC address, and the subsequent error-free input of those hardware identification numbers into a system. Furthermore, when using input devices such as a keyboard to interact with each computer, a keyboard and monitor must be attached to each computer in the group of computers. This arrangement can be inconvenient, especially when a single keyboard and a single monitor must be manually connected to each of the computers in a group of computers as each computer is identified.
Another way of identifying computers in a group of computers involves using specialized hardware that is connected to the group of computers. This specialized hardware can match each computer's physical hardware to a network address. However, such specialized hardware can be costly to obtain and use.
Another way of identifying computers in a group of computers includes using individualized boot software. In particular, the individualized boot software can include media, such as a floppy disk or a CD-ROM, that includes a unique ID that can be used to identify and sequence the group of computers. However, both producing and using individualized boot software can be time consuming, particularly because the boot software media must be inserted into the correct computer within the group in order for the individualized boot software to identify the computer accurately. Furthermore, a failure of the boot software media requires rebuilding that specific boot software media for the individual computers that failed.
Yet another way of identifying computers in a group of computers includes sequentially booting the computers, and identifying each computer by determining the order in which the computers complete their boot-up sequence. However, this way of identifying a computer in a group of computers can be time consuming because it requires waiting for the computers to boot-up and obtain a network address. The time required for the computers to boot-up can depend on factors such as the details of the computer hardware, network load, and the like. Furthermore, if one or more of the computers fail during the boot-up sequence, the group of computers may provide no indication to the human operator that a computer in the group failed, thus producing an identification sequence that is missing one or more of the computers in the group. Accordingly, when the operator discovers the error, the sequence must be reconstructed. SUMMARY
The present application relates to methods and apparatus for identifying a computer among a group of computers, where each computer in the group is connected to a server and has a network identification.
In one embodiment, a computer in the group is physically manipulated after being turned on. A signal is sent to the server that can be identified with the physically manipulated computer and indicates that the computer has been physically manipulated. The signal is received at the server. The network identification associated with the received signal is associated with the physically manipulated computer.
In another embodiment, the apparatus includes a system having a group of computers to be identified and a server. Each computer in the group of computers is configured to detect a physical manipulation to the computer and send a signal to the server indicating that the computer has been manipulated and can be identified with the computer. The server is configured to receive a signal from each computer in the group of computers and associate it with the manipulated computer.
DESCRIPTION OF DRAWING FIGURES
The present invention can be best understood by reference to the following description taken in conjunction with the accompanying drawing figures, in which like parts may be referred to by like numerals:
Fig. 1 is a schematic diagram depicting a server and a group of computers;
Fig. 2 is a flow chart depicting stages of an exemplary identification process;
Fig. 3 is a flow chart depicting stages of another exemplary identification process;
Fig. 4 is a flow chart depicting stages of yet another exemplary identification process;
Fig. 5 is a flow chart depicting an exemplary process that can be used to identify and sequence a computer in a group of computers; and
Fig. 6 is another schematic diagram depicting a server and a group of computers. DETAILED DESCRIPTION
In order to provide a more thorough understanding of the present invention, the following description sets forth numerous specific details, such as specific configurations, parameters, examples, and the like. It should be recognized, however, that such description is not intended as a limitation on the scope of the present invention, but is intended to provide a better description of the exemplary embodiments.
With reference to Fig. 1, a group of computers 100 can be arranged in a stack, rack, or any other configuration, and connected to server 102. Each computer in the group of computers 100 can function as a server, client, or both as a server and client, depending on the application. Furthermore, server 100 can function as a server, client, or both as a server and client, depending on the application. Although Fig. 1 shows a group of computers 100 arranged in a rack configuration, it should be recognized that the group of computers 100 can be arranged in any configuration.
As shown in Fig. 1, each computer in a group of computers 100 can be identified by a server by associating a network address, such as an IP or MAC address 104, with the computer. In each of the embodiments described below, computers and servers can include software that allows the computers and servers to communicate with each other. In particular, this software can allow a computer to contact a server and register its network address, provide a list of ways that the computer can be identified, and the like. Furthermore, although the following embodiments describe identifying a single computer in a group of computers, each computer in the group of computers can be identified sequentially.
With reference to Fig. 2, an embodiment of a process that can be used to identify a computer in a group of computers 100 (Fig. 1) is shown. In step 200, an operator can physically manipulate the state of a computer that is already turned on in a manner that is detectable by the computer. Next, in step 202, the computer can detect the manipulation and send a message to server 102 (Fig. 1) indicating that the computer has been manipulated. The message can include information such as network identification of the computer, information about the manipulation, and the like. In step 204, server 102 (Fig. 1) can then identify the manipulated computer by associating which computer was physically manipulated with which computer sent the message. In particular, server 102 (Fig. 1) can associate a network identification, such as an IP or MAC address, and the like, to this computer.
With reference to Fig. 3, another embodiment of a process that can be used to identify a computer in a group of computers 100 (Fig. 1) is shown. In step 300, the computer can send heartbeat messages to server 102 (Fig. 1) on a periodic basis. The heartbeat messages can include information such as network identification, information about the computer, and the like. Next, in step 302, an operator can physically manipulate the state of the computer in a manner that is detectable by the computer. In step 304, the computer can detect the manipulation and consequently fail to send at least one heartbeat message to server 102 (Fig. 1). In step 306, server 102 (Fig. 1) can identify the manipulated computer by associating which computer was physically manipulated with which computer failed to send a heartbeat message. In particular, server 102 (Fig. 1) can associate a network identification, such as a network address, and the like, to this computer.
With reference to Fig. 4, another embodiment of a process that can be used to identify a computer in a group of computers 100 (Fig. 1) is shown. In step 400, an operator can physically manipulate the state of a computer that is already turned on in a manner that is detectable by the computer. Next, in step 402, software can automatically detect the manipulation and can identify the manipulated computer and associate it with a network identification, such as its EP or MAC address, and the like. The software can be installed on the server, or as a system installed on both the computer and server.
With reference to Fig. 5, an embodiment of a possible sequence that can be used to identify a computer in a group of computers is shown. In step 500, the computer can emit a signal indicating that the computer is ready to be identified. This signal can be detectable by an operator in some manner such as visibly, audibly, and the like. For instance, the signal can include activating a light, activating a light emitting diode (LED), manipulating the display on an integral LCD, manipulating the display on an integral display panel, ejecting or reinserting a CD-ROM, emitting an auditory sound, and the like. Activating a light or LED can include illuminating the light or LED, flashing the light or LED, and the like. It should be recognized, however, that step 500 may not be used in all applications, such as when a computer is always ready for identification. In step 502 of the present embodiment, an operator can physically manipulate the state of the computer in a manner that is detectable by the computer. Next, in step 504, the computer can detect the manipulation and send a message to server 102 (Fig. 1) indicating that the computer has been manipulated. The message can include information such as network identification of the computer, information about the manipulation, and the like. Alternately, for a computer that sends heartbeat messages to server 102 (Fig. 1), the computer can fail to send at least one heartbeat message when the computer detects an manipulation in step 504.
In step 506 of the present embodiment, server 102 (Fig. 1) can then identify the manipulated computer by associating which computer was physically manipulated with which computer sent the message. In particular, server 102 (Fig. 1) can associate a network identification, such as an JP or MAC address, and the like, to this computer.
Next, in step 508, server 102 (Fig. 1) can send a message to the computer. The message can include information such as information that the computer has been properly identified and sequenced, and the like, and the message can include a command such as a command that the computer produce a signal indicating that the computer has been properly identified and sequenced.
In step 510, the computer being identified produces a signal. The signal produced by the computer can be detectable by an operator in some manner, such as visibly, audibly, and the like. For instance, the signal can include activating a light, activating a light emitting diode (LED), manipulateing the display on an integral LCD, manipulating the display on an integral display panel, ejecting or reinserting a CD-ROM, emitting an auditory sound, and the like. Activating a light or a to LED can include illuminating the light or LED, flashing the light or LED, and the like.
It should be recognized, however, that step 508 and/or step 510 may be omitted in some applications, such as when server 102 (Fig. 1) provides an indication that the computer has been properly identified. For instance, when a computer fails to send a heartbeat message, the server can emit a signal that can notify an operator that the computer has been properly identified and seqenced.
In step 512 of the present embodiment, identification and sequencing information gathered about the computers can be used to assign network identification, such as an IP address, and the like, to the computers in an ordered sequence. However, it should be recognized that step 512 may be omitted in some applications, such as when the computers have already been assigned proper network addresses.
With reference now to Fig. 6, a group of computers 100 connected to server 102 is shown. The following is an example of a process of identifying the computers in the group of computers 100. In particular, assume computers 600, 602, and 604 have already been identified. Specifically, assume computer 600 emitted a signal indicating that it was ready to be identified by activating its floppy light 106, 116. Then, an operator activated the power button 108, 112 on computer 600 in order to manipulate computer 600. After computer 600 was successfully identified, computer 600 emitted a sound 110, indicating that identification was successful.
Similarly, assume computers 602 and 604 have also been identified by server 102. In particular, assume computer 602 emitted a signal indicating that it was ready to be identified by activating its floppy light 106, 116. Then, an operator ejected a floppy disk 108, 118 from computer 602 in order to manipulate computer 602. After computer 602 was successfully identified, computer 602 emitted a sound 110, indicating that identification was successful.
Furthermore, assume computer 604 emitted a signal indicating that it was ready to be identified by activating its floppy light 106, 116. Then, an operator ejected a floppy disk 108, 118 from computer 604 in order to manipulate computer 604. After computer 604 was successfully identified, computer 604 emitted a sound 110, indicating that identification was successful.
In the present embodiment, assume computers 606, 608, 610, 612, 614, and 616 are waiting to be identified by server 102.
In each of the above-described embodiments, the state of a computer can be physically manipulated in various ways. In particular, the state of a computer can be manipulated by manipulating any device, switch, interface, signal, and the like, that is connected to or part of the computer, and that is detectable by server 102 either directly or through a message generated by software on the computer. For example, physically manipulating a computer can include inserting or ejecting a floppy disk (118, 120), CD-ROM disk, and the like, into or from the computer. Another way that a computer can be physically manipulated includes manipulating computer hardware, such as by moving a mouse, manipulating buttons or keys such as the power button (112), suspend button, reboot button, hotkey, keyboard key, and the like. In addition, a computer can be physically manipulated by attaching or removing a peripheral device, such as a keyboard, a mouse, dongle, serial device, parallel device, USB device, secondary network interface cable or card, and the like. Furthermore, a computer can be physically manipulated by attaching or removing a device, such as a keyboard, mouse, and the like, to or from any connector, such as a USB port, serial port, parallel port, Ethernet, other communications port, and the like. In addition, a computer can be physically manipulated by detaching a primary network cable, card, network interface device, and the like, where the detachment may be for a particular length of time, or may be detached until the entire set of computers has been identified and sequenced. Furthermore, a computer can be physically manipulated by a communication with an infrared port on the computer, or disconnecting the communications cable, card, network interface device, and the like, such as an Ethernet cable or card, while the server and computer or exchanging heartbeat messages. Moreover, a computer can be physically manipulated by inserting or ejecting a hot plug device, such as a hard drive, PCMCIA device, and the like.
Although the present invention has been described with respect to certain embodiments, examples, and applications, it will be apparent to those skilled in the art that various modifications and changes may be made without departing from the invention.

Claims

CLAIMSWe claim:
1. A method of identifying a computer among a group of computers connected to a server, wherein each computer in the group of computers has a network identification, the method comprising: physically manipulating the computer to be identified, wherein the computer is already turned on when the computer is physically manipulated; sending a signal to the server that the computer has been physically manipulated, wherein said signal includes network identification for the computer, or other data that can be used to obtain that network identification; receiving said signal from the computer at the server; and associating the network identification in said received signal with the physically manipulated computer.
2. The method of claim 1 , wherein said network identification includes an IP address.
3. The method of claim 1 , wherein said network identification includes an MAC address.
4. The method of claim 1, further comprising storing said association.
5. The method of claim 1, further comprising emitting a signal indicating that the network identification associated with said received signal has been properly associated with the physically manipulated computer.
6. The method of claim 5, wherein said emitted signal is visible to an operator.
7. The method of claim 5, wherein said emitted signal is audible to an operator.
8. The method of claim 1 , further comprising emitting a signal indicating that the computer to be identified is ready to be physically manipulated.
9. The method of claim 8, wherein said emitted signal is visible to an operator.
10. The method of claim 8, wherein said emitted signal is audible to an operator.
11. The method of claim 1 , wherein said physically manipulating includes inserting a disk into the computer to be identified.
12. The method of claim 1 , wherein said physically manipulating includes removing a disk from the computer to be identified.
13. The method of claim 1 , wherein said physically manipulating includes manipulating hardware of the computer to be identified.
14. The method of claim 1, wherein said physical manipulation includes attaching a peripheral device to the computer to be identified.
15. The method of claim 1 , wherein said physical manipulation includes detaching a peripheral device from the computer to be identified.
16. The method of claim 1 , wherein said physical manipulation includes communicating with an infra-red port on the computer to be identifed.
17. The method of claim 1 , wherein the group of computers is arranged in a rack, and wherein each computer in the group of computers is sequentially identified.
18. A method of identifying a computer among a group of computers connected to a server, wherein each computer in the group of computers has a network identification, the method comprising: detecting a physical manipulation to the computer to be identified, wherein said manipulation changes the state of the computer, wherein said manipulation occurs after the computer is turned on; and sending a signal to the server that the computer has been manipulated, wherein said signal can be associated with a network identification for the computer.
19. The method of claim 18, further comprising emitting a signal indicating that the computer is ready to be identified.
20. The method of claim 19, wherein said emitting includes activating a light.
21. The method of claim 19, wherein said emitting includes activating a light emitting diode.
22. The method of claim 19, wherein said emitting includes ejecting a CD-ROM.
23. The method of claim 19, wherein said emitting is visible to an operator.
24. The method of claim 19, wherein said emitting includes producing a sound.
25. The method of claim 19, wherein said emitting is audible to an operator.
26. The method of claim 18, further comprising: receiving a signal from the server indicating that the network identification associated with said signal has been properly associated with the physically manipulated computer; and emitting a signal in response to said receiving, wherein said signal indicates that the computer has been properly associated by the server.
27. The method of claim 26, wherein said emitting includes activating a light.
28. The method of claim 26, wherein said emitting includes activating a light emitting diode.
29. The method of claim 26, wherein said emitting includes ejecting a CD-ROM.
30. The method of claim 26, wherein said emitting is visible to an operator.
31. The method of claim 26, wherein said emitting includes producing a sound.
32. The method of claim 26, wherein said emitting is audible to an operator.
33. The method of claim 18, wherein said signal sent to the server includes failing to send a heartbeat message.
34. The method of claim 18, wherein the group of computers is arranged in a rack, and wherein each computer in the group of computers is sequentially identified.
35. A method of identifying a computer among a group of computers connected to a server, wherein each computer in the group of computers has a network identification, the method comprising: physically manipulating the computer to be identified, wherein said manipulation changes the state of the computer, wherein said manipulation occurs after the computer is turned on; and receiving a signal from the computer indicating that the physically manipulated computer has been properly associated with a network identification.
36. The method of claim 35, wherein said physically manipulating includes inserting a disk into the client computer.
37. The method of claim 36, wherein said disk includes a floppy disk.
38. The method of claim 36, wherein said disk includes a CD-ROM.
39. The method of claim 35, wherein said physically manipulating includes removing a disk from the computer to be identified.
40. The method of claim 35, wherein said physically manipulating includes manipulating hardware of the computer to be identified.
41. The method of claim 40, wherein said manipulating hardware includes moving a mouse connected to the computer to be identified.
42. The method of claim 40, wherein said manipulating hardware includes manipulating a button on the computer to be identified.
43. The method of claim 42, wherein said manipulating a button includes manipulating a power button on the computer to be identified.
44. The method of claim 42, wherein said manipulating a button includes manipulating a suspend button on the computer to be identified.
45. The method of claim 42, wherein said manipulating a button includes manipulating a reboot button on the computer to be identified.
46. The method of claim 40, wherein said manipulating hardware includes manipulating a key.
47. The method of claim 46, wherein said key is a hotkey.
48. The method of claim 46, wherein said key is a keyboard key.
49. The method of claim 35, wherein said physically manipulating includes attaching a peripheral device to the computer to be identified.
50. The method of claim 35, wherein said physically manipulating includes detaching a peripheral device from the computer to be identified.
51. The method of claim 35, wherein said physically manipulating includes detaching a primary network cable connected to the computer to be identified.
52. The method of claim 35, wherein said physically manipulating includes detaching a card connected to the computer to be identified.
53. The method of claim 35, wherein said physically manipulating includes detaching a network interface device connected to the computer to be identified.
54. The method of claim 35, wherein said physically manipulating includes communicating with an infra-red port on the computer to be identified.
55. The method of claim 35, wherein said physically manipulating includes manipulating a hot plug device.
56. The method of claim 55, wherein said manipulating includes ejecting.
57. The method of claim 55, wherein said manipulating includes inserting.
58. The method of claim 55, wherein said hot plug device includes a hard drive.
59. The method of claim 55, wherein said hot plug device includes a PCMCIA device.
60. The method of claim 35, wherein the group of computers is arranged in a rack, and wherein each computer in the group of computers is sequentially identified.
61. A method of identifying a computer among a group of computers connected to a server, wherein each computer in the group of computers has a network identification, the method comprising: receiving a signal from the computer to be identified, wherein said signal indicates that the computer has been physically manipulated, wherein said signal can be associated with a network identification for the computer; associating the network identification associated with said received signal with the computer that has been physically manipulated.
62. The method of claim 61, wherein said network identification includes an IP address.
63. The method of claim 61, wherein said network identification includes a MAC address.
64. The method of claim 61, further comprising storing said association.
65. The method of claim 61, wherein said signal includes failing to send a heartbeat message.
66. The method of claim 61, wherein the group of computers is arranged in a rack, and wherein each computer in the group of computers is sequentially identified.
67. A system for identifying a computer among a group of computers connected to a server, wherein each computer in the group of computers has network identification, the system comprising: a group of computers to be identified, each said computer configured to: detect a physical manipulation to the computer, send a signal to the server indicating that the computer has been manipulated, wherein said signal includes data which can be associated with a network identification for the computer; and a server configured to: receive a signal from each computer in said group, wherein said signal indicates that the computer sending the signal has been manipulated, wherein said signal includes data which can be assocaited with a network identification for the manipulated computer, associate the network identification associated with said sent and received signals with the manipulated computer.
68. The system of claim 67, wherein said server is further configured to store an association of the network identification associated with said sent and received signals with the manipulated computer.
69. The system of claim 67, wherein each computer in said group is further configured to emit a signal indicating that the computer is ready to be identified.
70. The system of claim 67, wherein each computer in said group is further configured to emit a signal indicating that the computer has been properly associated with a network identification.
71. The system of claim 67, wherein said server is further configured to send a signal to each computer in said group indicating that the computer has been properly associated with a network identification.
72. The system of claim 71, wherein said server is further configured to send a signal to each computer in said group requesting that the computer emit a signal indicating that the computer has been properly associated with a network identification.
73. The system of claim 67, wherein said server is further configured to: sequentially receive a signal from each computer in the group, associate the network identification in said received signal with an manipulated computer.
74. A system for identifying a computer in a group of computers, wherein each computer in the group of computers has a network identification, the system comprising: a group of computers, wherein each computer in said group is connected to a server, wherein each computer is turned on; and said server configured to: detect each computer that has been physically manipulated, and associate a network identification with a physically manipulated computer.
75. The system of claim 74, wherein said server is configured to detect by receiving a network identification for the physically manipulated computer.
76. The system of claim 75, wherein said network identification includes an IP address.
77. The system of claim 74, wherein said network identification includes an IP address.
78. The system of claim 74, wherein said network identification includes a MAC address.
79. The system of claim 74, wherein said server is further configured to :
. sequentially detect each computer that has been physically manipulated, and sequentically associate a network identification with a physically manipulated computer.
PCT/US2002/020029 2001-06-21 2002-06-21 Sequential identification of a group of computers WO2003001392A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US30019101P 2001-06-21 2001-06-21
US60/300,191 2001-06-21

Publications (1)

Publication Number Publication Date
WO2003001392A1 true WO2003001392A1 (en) 2003-01-03

Family

ID=23158078

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2002/020029 WO2003001392A1 (en) 2001-06-21 2002-06-21 Sequential identification of a group of computers

Country Status (1)

Country Link
WO (1) WO2003001392A1 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5894557A (en) * 1996-03-29 1999-04-13 International Business Machines Corporation Flexible point-to-point protocol framework
US6023727A (en) * 1994-11-04 2000-02-08 Canon Information Systems, Inc. Smart flash
US6286039B1 (en) * 1997-08-28 2001-09-04 Cisco Technology, Inc. Automatic static to dynamic IP address and DNS address management for remote communications network access

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6023727A (en) * 1994-11-04 2000-02-08 Canon Information Systems, Inc. Smart flash
US5894557A (en) * 1996-03-29 1999-04-13 International Business Machines Corporation Flexible point-to-point protocol framework
US6286039B1 (en) * 1997-08-28 2001-09-04 Cisco Technology, Inc. Automatic static to dynamic IP address and DNS address management for remote communications network access

Similar Documents

Publication Publication Date Title
US10127032B2 (en) System and method for unified firmware management
US6065053A (en) System for resetting a server
US20060267857A1 (en) Method of operating multiple input and output devices through a single computer
CN104932926A (en) System and method for achieving dynamic matching of equipment and drives in intelligent operation system platform
US6189108B1 (en) Reporting of power states for a network connected PC
US9229658B2 (en) Status information saving among multiple computers
US7634649B2 (en) Device initiated mode switching
US20220210882A1 (en) Navigational dynamic lighting
US20020144024A1 (en) Method and system for assigning peripheral devices to logical ports of a network peripheral server
US6874038B2 (en) Attribute reporting over a PS/2 protocol
KR20030069856A (en) Network master hard disk drive duplicator
JP2002366504A (en) Information processing apparatus
WO2003001392A1 (en) Sequential identification of a group of computers
CN101271420A (en) Operating system hard disk recognition device
JP4841163B2 (en) Security terminal
CN113722211B (en) BMC debugging method, device, system and embedded equipment
NO175120B (en) System manager system for data processing system
JP2013134594A (en) Kvm switch, detection program, and detection method
JP4825120B2 (en) Service management system, service management apparatus, and service management method
US7225328B2 (en) Maintenance terminal of disk array device
CN1987809A (en) Method for self detecting result of basic input and output system
JP5267222B2 (en) Switching machine and control program
CN109254800A (en) A kind of facility information processing method, electronic equipment and server
KR101374801B1 (en) Usb keyboard apparatus and method capable of supporting n-key rollover with bios compatibility
JP3860325B2 (en) COMMUNICATION DETERMINING METHOD, HOST USED FOR THE SAME, MULTIPLE TERMINAL DEVICES, AND RECORDING MEDIUM CONTAINING THE PROGRAM

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
ENP Entry into the national phase

Ref document number: 2004106782

Country of ref document: RU

Kind code of ref document: A

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP