Browse Prior Art Database

Remote access of network status info on systems that cannot respond to login requests

IP.com Disclosure Number: IPCOM000018937D
Original Publication Date: 2003-Aug-21
Included in the Prior Art Database: 2003-Aug-21
Document File: 2 page(s) / 40K

Publishing Venue

IBM

Abstract

A programming method is disclosed that provides the ability to remotely access network status information when a remote computer system will not respond to login requests.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 52% of the total text.

Page 1 of 2

  Remote access of network status info on systems that cannot respond to login requests

Access of a remote computer system's network oriented status information to include protocol level statistics and individual connection status with possible undelivered data is sometimes not possible because the system cannot process login requests when problem analysis needs to be done. Dynamically loadable code (kernel extension) will be used to respond to requests for network information. This method will respond when lower dispatch priority user processes are unable to provide login capability at the remote computer system. This method will also provide debug capability when new socket creation is inhibited by system/network resource availability issues. This methodology will include a network option via a command that will enable this functionality. The network option will enable commands and programming interfaces for defining remote hosts and the information that they can access. The remote host information will be entered by the system administrator into a config file. This file will be read at system startup and the host access information will be stored in the kernel for quick access. Also a command will be made available to the system administrator which will allow him/her to make changes to the config file and also update the same in the kernel.

Two possible implementation scenarios can be used to provide the advantage of this method.

The first scenario involves the following method:

Boot time initialization code will open a UDP socket and bind it to a well known port number. A setsockopt() function call will then be used to set a new flag (SO_DIAGNOST...