The following operators can be used to better focus your queries.
( ) , AND, OR, NOT, W/#
? single char wildcard, not at start
* multi char wildcard, not at start
(Cat? OR feline) AND NOT dog?
Cat? W/5 behavior
(Cat? OR feline) AND traits
Cat AND charact*
This guide provides a more detailed description of the syntax that is supported along with examples.
This search box also supports the look-up of an IP.com Digital Signature (also referred to as Fingerprint); enter the 72-, 48-, or 32-character code to retrieve details of the associated file or submission.
Concept Search - What can I type?
For a concept search, you can enter phrases, sentences, or full paragraphs in English. For example, copy and paste the abstract of a patent application or paragraphs from an article.
Concept search eliminates the need for complex Boolean syntax to inform retrieval. Our Semantic Gist engine uses advanced cognitive semantic analysis to extract the meaning of data. This reduces the chances of missing valuable information, that may result from traditional keyword searching.
A programming method is disclosed that provides the ability to remotely access network status information when a remote computer system will not respond to login requests.
English (United States)
This text was extracted from a PDF file.
This is the abbreviated version, containing approximately
52% of the total text.
Page 1 of 2
Remote access of network status info on systems that cannot respond to login requests
Access of a remote computer system's network oriented status information to include protocol level statistics and individual connection status with possible undelivered data is sometimes not possible because the system cannot process login requests when problem analysis needs to be done. Dynamically loadable code (kernel extension) will be used to respond to requests for network information. This method will respond when lower dispatch priority user processes are unable to provide login capability at the remote computer system. This method will also provide debug capability when new socket creation is inhibited by system/network resource availability issues. This methodology will include a network option via a command that will enable this functionality. The network option will enable commands and programming interfaces for defining remote hosts and the information that they can access. The remote host information will be entered by the system administrator into a config file. This file will be read at system startup and the host access information will be stored in the kernel for quick access. Also a command will be made available to the system administrator which will allow him/her to make changes to the config file and also update the same in the kernel.
Two possible implementation scenarios can be used to provide the advantage of this method.
The first scenario involves the following method:
Boot time initialization code will open a UDP socket and bind it to a well known port number. A setsockopt() function call will then be used to set a new flag (SO_DIAGNOST...