WO2003001392A1 - Sequential identification of a group of computers - Google Patents
Sequential identification of a group of computers Download PDFInfo
- Publication number
- WO2003001392A1 WO2003001392A1 PCT/US2002/020029 US0220029W WO03001392A1 WO 2003001392 A1 WO2003001392 A1 WO 2003001392A1 US 0220029 W US0220029 W US 0220029W WO 03001392 A1 WO03001392 A1 WO 03001392A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- computer
- group
- signal
- identified
- network identification
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/006—Identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/32—Monitoring with visual or acoustical indication of the functioning of the machine
Definitions
- the present application generally relates to identifying a computer in a group of computers. More particularly, the present application relates to identifying the network identification of the computer.
- a group of computers can be linked together on a computer network. In some applications, these computers can be arranged as a rack of computers. Each computer can function as a server, client, or both as a server and client.
- the installation and maintenance of such a group of computers can involve correlating each computer with its network identification, such as an IP or MAC address.
- This network identification can be dynamically or statically assigned to each computer in the group.
- a server can communicate with a particular computer in the group of computers.
- a system operator can identify a computer within the group of computers that needs maintenance or attention.
- a system operator identifies each computer in a group of computers by either writing down hardware identification numbers attached to each computer's physical hardware, or interacting with each computer using input devices such as a keyboard or a mouse.
- a system operator can sequentially attach a keyboard to each computer and use keyboard input to identify the computer.
- the system operator can optionally assign a new network identification, such as an IP or MAC address, to the computer.
- IP or MAC address a new network identification
- a keyboard and monitor when using input devices such as a keyboard to interact with each computer, a keyboard and monitor must be attached to each computer in the group of computers. This arrangement can be inconvenient, especially when a single keyboard and a single monitor must be manually connected to each of the computers in a group of computers as each computer is identified.
- Another way of identifying computers in a group of computers involves using specialized hardware that is connected to the group of computers.
- This specialized hardware can match each computer's physical hardware to a network address.
- such specialized hardware can be costly to obtain and use.
- the individualized boot software can include media, such as a floppy disk or a CD-ROM, that includes a unique ID that can be used to identify and sequence the group of computers.
- media such as a floppy disk or a CD-ROM
- both producing and using individualized boot software can be time consuming, particularly because the boot software media must be inserted into the correct computer within the group in order for the individualized boot software to identify the computer accurately.
- a failure of the boot software media requires rebuilding that specific boot software media for the individual computers that failed.
- Yet another way of identifying computers in a group of computers includes sequentially booting the computers, and identifying each computer by determining the order in which the computers complete their boot-up sequence.
- this way of identifying a computer in a group of computers can be time consuming because it requires waiting for the computers to boot-up and obtain a network address. The time required for the computers to boot-up can depend on factors such as the details of the computer hardware, network load, and the like.
- the group of computers may provide no indication to the human operator that a computer in the group failed, thus producing an identification sequence that is missing one or more of the computers in the group. Accordingly, when the operator discovers the error, the sequence must be reconstructed.
- the present application relates to methods and apparatus for identifying a computer among a group of computers, where each computer in the group is connected to a server and has a network identification.
- a computer in the group is physically manipulated after being turned on.
- a signal is sent to the server that can be identified with the physically manipulated computer and indicates that the computer has been physically manipulated.
- the signal is received at the server.
- the network identification associated with the received signal is associated with the physically manipulated computer.
- the apparatus includes a system having a group of computers to be identified and a server.
- Each computer in the group of computers is configured to detect a physical manipulation to the computer and send a signal to the server indicating that the computer has been manipulated and can be identified with the computer.
- the server is configured to receive a signal from each computer in the group of computers and associate it with the manipulated computer.
- Fig. 1 is a schematic diagram depicting a server and a group of computers
- Fig. 2 is a flow chart depicting stages of an exemplary identification process
- Fig. 3 is a flow chart depicting stages of another exemplary identification process
- Fig. 4 is a flow chart depicting stages of yet another exemplary identification process
- Fig. 5 is a flow chart depicting an exemplary process that can be used to identify and sequence a computer in a group of computers.
- Fig. 6 is another schematic diagram depicting a server and a group of computers.
- a group of computers 100 can be arranged in a stack, rack, or any other configuration, and connected to server 102.
- Each computer in the group of computers 100 can function as a server, client, or both as a server and client, depending on the application.
- server 100 can function as a server, client, or both as a server and client, depending on the application.
- Fig. 1 shows a group of computers 100 arranged in a rack configuration, it should be recognized that the group of computers 100 can be arranged in any configuration.
- each computer in a group of computers 100 can be identified by a server by associating a network address, such as an IP or MAC address 104, with the computer.
- computers and servers can include software that allows the computers and servers to communicate with each other.
- this software can allow a computer to contact a server and register its network address, provide a list of ways that the computer can be identified, and the like.
- each computer in the group of computers can be identified sequentially.
- step 200 an operator can physically manipulate the state of a computer that is already turned on in a manner that is detectable by the computer.
- step 202 the computer can detect the manipulation and send a message to server 102 (Fig. 1) indicating that the computer has been manipulated.
- the message can include information such as network identification of the computer, information about the manipulation, and the like.
- server 102 (Fig. 1) can then identify the manipulated computer by associating which computer was physically manipulated with which computer sent the message.
- server 102 (Fig. 1) can associate a network identification, such as an IP or MAC address, and the like, to this computer.
- step 300 the computer can send heartbeat messages to server 102 (Fig. 1) on a periodic basis.
- the heartbeat messages can include information such as network identification, information about the computer, and the like.
- step 302 an operator can physically manipulate the state of the computer in a manner that is detectable by the computer.
- step 304 the computer can detect the manipulation and consequently fail to send at least one heartbeat message to server 102 (Fig. 1).
- server 102 (Fig. 1) can identify the manipulated computer by associating which computer was physically manipulated with which computer failed to send a heartbeat message.
- server 102 (Fig. 1) can associate a network identification, such as a network address, and the like, to this computer.
- step 400 an operator can physically manipulate the state of a computer that is already turned on in a manner that is detectable by the computer.
- step 402 software can automatically detect the manipulation and can identify the manipulated computer and associate it with a network identification, such as its EP or MAC address, and the like.
- the software can be installed on the server, or as a system installed on both the computer and server.
- the computer can emit a signal indicating that the computer is ready to be identified.
- This signal can be detectable by an operator in some manner such as visibly, audibly, and the like.
- the signal can include activating a light, activating a light emitting diode (LED), manipulating the display on an integral LCD, manipulating the display on an integral display panel, ejecting or reinserting a CD-ROM, emitting an auditory sound, and the like.
- Activating a light or LED can include illuminating the light or LED, flashing the light or LED, and the like.
- step 500 may not be used in all applications, such as when a computer is always ready for identification.
- an operator can physically manipulate the state of the computer in a manner that is detectable by the computer.
- the computer can detect the manipulation and send a message to server 102 (Fig. 1) indicating that the computer has been manipulated.
- the message can include information such as network identification of the computer, information about the manipulation, and the like.
- the computer can fail to send at least one heartbeat message when the computer detects an manipulation in step 504.
- server 102 can then identify the manipulated computer by associating which computer was physically manipulated with which computer sent the message.
- server 102 can associate a network identification, such as an JP or MAC address, and the like, to this computer.
- server 102 can send a message to the computer.
- the message can include information such as information that the computer has been properly identified and sequenced, and the like, and the message can include a command such as a command that the computer produce a signal indicating that the computer has been properly identified and sequenced.
- the computer being identified produces a signal.
- the signal produced by the computer can be detectable by an operator in some manner, such as visibly, audibly, and the like.
- the signal can include activating a light, activating a light emitting diode (LED), manipulateing the display on an integral LCD, manipulating the display on an integral display panel, ejecting or reinserting a CD-ROM, emitting an auditory sound, and the like.
- Activating a light or a to LED can include illuminating the light or LED, flashing the light or LED, and the like.
- step 508 and/or step 510 may be omitted in some applications, such as when server 102 (Fig. 1) provides an indication that the computer has been properly identified. For instance, when a computer fails to send a heartbeat message, the server can emit a signal that can notify an operator that the computer has been properly identified and seqenced.
- step 512 of the present embodiment identification and sequencing information gathered about the computers can be used to assign network identification, such as an IP address, and the like, to the computers in an ordered sequence.
- network identification such as an IP address, and the like
- step 512 may be omitted in some applications, such as when the computers have already been assigned proper network addresses.
- a group of computers 100 connected to server 102 is shown.
- the following is an example of a process of identifying the computers in the group of computers 100.
- computers 600, 602, and 604 have already been identified.
- computer 600 emitted a signal indicating that it was ready to be identified by activating its floppy light 106, 116.
- an operator activated the power button 108, 112 on computer 600 in order to manipulate computer 600.
- computer 600 was successfully identified, computer 600 emitted a sound 110, indicating that identification was successful.
- computers 602 and 604 have also been identified by server 102.
- computer 602 emitted a signal indicating that it was ready to be identified by activating its floppy light 106, 116.
- an operator ejected a floppy disk 108, 118 from computer 602 in order to manipulate computer 602.
- computer 602 emitted a sound 110, indicating that identification was successful.
- the state of a computer can be physically manipulated in various ways.
- the state of a computer can be manipulated by manipulating any device, switch, interface, signal, and the like, that is connected to or part of the computer, and that is detectable by server 102 either directly or through a message generated by software on the computer.
- physically manipulating a computer can include inserting or ejecting a floppy disk (118, 120), CD-ROM disk, and the like, into or from the computer.
- Another way that a computer can be physically manipulated includes manipulating computer hardware, such as by moving a mouse, manipulating buttons or keys such as the power button (112), suspend button, reboot button, hotkey, keyboard key, and the like.
- a computer can be physically manipulated by attaching or removing a peripheral device, such as a keyboard, a mouse, dongle, serial device, parallel device, USB device, secondary network interface cable or card, and the like.
- a computer can be physically manipulated by attaching or removing a device, such as a keyboard, mouse, and the like, to or from any connector, such as a USB port, serial port, parallel port, Ethernet, other communications port, and the like.
- a computer can be physically manipulated by detaching a primary network cable, card, network interface device, and the like, where the detachment may be for a particular length of time, or may be detached until the entire set of computers has been identified and sequenced.
- a computer can be physically manipulated by a communication with an infrared port on the computer, or disconnecting the communications cable, card, network interface device, and the like, such as an Ethernet cable or card, while the server and computer or exchanging heartbeat messages.
- a computer can be physically manipulated by inserting or ejecting a hot plug device, such as a hard drive, PCMCIA device, and the like.
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US30019101P | 2001-06-21 | 2001-06-21 | |
US60/300,191 | 2001-06-21 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2003001392A1 true WO2003001392A1 (en) | 2003-01-03 |
Family
ID=23158078
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2002/020029 WO2003001392A1 (en) | 2001-06-21 | 2002-06-21 | Sequential identification of a group of computers |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2003001392A1 (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5894557A (en) * | 1996-03-29 | 1999-04-13 | International Business Machines Corporation | Flexible point-to-point protocol framework |
US6023727A (en) * | 1994-11-04 | 2000-02-08 | Canon Information Systems, Inc. | Smart flash |
US6286039B1 (en) * | 1997-08-28 | 2001-09-04 | Cisco Technology, Inc. | Automatic static to dynamic IP address and DNS address management for remote communications network access |
-
2002
- 2002-06-21 WO PCT/US2002/020029 patent/WO2003001392A1/en not_active Application Discontinuation
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6023727A (en) * | 1994-11-04 | 2000-02-08 | Canon Information Systems, Inc. | Smart flash |
US5894557A (en) * | 1996-03-29 | 1999-04-13 | International Business Machines Corporation | Flexible point-to-point protocol framework |
US6286039B1 (en) * | 1997-08-28 | 2001-09-04 | Cisco Technology, Inc. | Automatic static to dynamic IP address and DNS address management for remote communications network access |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10127032B2 (en) | System and method for unified firmware management | |
US6065053A (en) | System for resetting a server | |
US20060267857A1 (en) | Method of operating multiple input and output devices through a single computer | |
CN104932926A (en) | System and method for achieving dynamic matching of equipment and drives in intelligent operation system platform | |
US6189108B1 (en) | Reporting of power states for a network connected PC | |
US9229658B2 (en) | Status information saving among multiple computers | |
US7634649B2 (en) | Device initiated mode switching | |
US20220210882A1 (en) | Navigational dynamic lighting | |
US20020144024A1 (en) | Method and system for assigning peripheral devices to logical ports of a network peripheral server | |
US6874038B2 (en) | Attribute reporting over a PS/2 protocol | |
KR20030069856A (en) | Network master hard disk drive duplicator | |
JP2002366504A (en) | Information processing apparatus | |
WO2003001392A1 (en) | Sequential identification of a group of computers | |
CN101271420A (en) | Operating system hard disk recognition device | |
JP4841163B2 (en) | Security terminal | |
CN113722211B (en) | BMC debugging method, device, system and embedded equipment | |
NO175120B (en) | System manager system for data processing system | |
JP2013134594A (en) | Kvm switch, detection program, and detection method | |
JP4825120B2 (en) | Service management system, service management apparatus, and service management method | |
US7225328B2 (en) | Maintenance terminal of disk array device | |
CN1987809A (en) | Method for self detecting result of basic input and output system | |
JP5267222B2 (en) | Switching machine and control program | |
CN109254800A (en) | A kind of facility information processing method, electronic equipment and server | |
KR101374801B1 (en) | Usb keyboard apparatus and method capable of supporting n-key rollover with bios compatibility | |
JP3860325B2 (en) | COMMUNICATION DETERMINING METHOD, HOST USED FOR THE SAME, MULTIPLE TERMINAL DEVICES, AND RECORDING MEDIUM CONTAINING THE PROGRAM |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
ENP | Entry into the national phase |
Ref document number: 2004106782 Country of ref document: RU Kind code of ref document: A |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
122 | Ep: pct application non-entry in european phase | ||
NENP | Non-entry into the national phase |
Ref country code: JP |
|
WWW | Wipo information: withdrawn in national office |
Country of ref document: JP |