Dismiss
InnovationQ will be updated on Sunday, Oct. 22, from 10am ET - noon. You may experience brief service interruptions during that time.
Browse Prior Art Database

Method for dynamic time calculation of a firmware update

IP.com Disclosure Number: IPCOM000182472D
Original Publication Date: 2009-May-01
Included in the Prior Art Database: 2009-May-01
Document File: 2 page(s) / 47K

Publishing Venue

IBM

Abstract

This invention proposes a mechanism for the Hardware Management Console (HMC) to determine the firmware update duration time dynamically based on the system configuration and on the Flexible Service Processor (FSP) performance.

This text was extracted from a PDF file.
At least one non-text object (such as an image or picture) has been suppressed.
This is the abbreviated version, containing approximately 100% of the total text.

Page 1 of 2

Method for dynamic time calculation of a firmware update

Based on historical data it has been observed that the expected time of a firmware update operation might greatly differ from the actual time depending on hardware, system configuration, system resources, etc. If the operation takes longer than expected, then the customer would be left to wonder if something is wrong. On the other hand, if the operation completes sooner than expected and the customer has left the site, precious time is wasted.

Software updates performed on PCs automatically adjusts the operation time based the network speed, But that is not enough to accurately calculate the firmware update time on an eServer system. Therefore, this invention proposes a mechanism to include system configuration and specific performance into the formula to calculate the operation time.

The dynamic calculation of the firmware update function duration time is based on the size of the firmware image, system history, and configuration dependencies. The system history includes the average time for various boot processes and collection of Vital Product Data (VPD) (Fig. 2). Finally, the automatic time adjustment during the operation takes place at various key checkpoints. The overall process is shown in Fig.
1.

Figure 1.

1

[This page contains 1 picture or other non-text object]

Page 2 of 2

Figure...