An information handling system (ihs) unambiguously addresses networked devices connected by a local area network (LAN) based network interface controller (NIC) by detecting a device descriptor of LAN-based NIC, determining that the device descriptor indicates a capability for assigning a reserve media access control (mac) address to the networked device, writing the reserve mac address in the LAN-based NIC of the networked device, and associating the reserve mac address with the networked device in an inventory data structure for the ihs.

Patent
   RE49226
Priority
Jul 30 2014
Filed
Oct 31 2018
Issued
Sep 27 2022
Expiry
Jul 30 2034
Assg.orig
Entity
Large
0
13
currently ok
0. 23. A method comprising:
detecting, during a boot of a networked device that locally connects to an ihs via a LAN-based network interface controller (NIC), a device descriptor in the LAN-based NIC, the device descriptor indicative of a capability for assigning a mac address to the networked device;
in response to detecting the device descriptor, exposing an interface of a unified extensible Firmware interface (uefi) reserve mac protocol driver;
loading a uefi preboot execution environment (PXE) driver into a uefi platform; and
provisioning, using the uefi PXE driver, the NIC with a mac address.
1. A method of unambiguously addressing networked devices in an information handling system (ihs), the method comprising:
detecting a device descriptor of a local area network (LAN) based (LAN)-based network interface controller (NIC) connected to a networked device that does not physically contain a unique mac address;
determining that the device descriptor indicates a capability for assigning a reserve media access control (mac) address to the networked device;
archiving an original equipment manufacturer (OEM) mac address of the LAN-based NIC into a non-volatile storage of the LAN-based NIC; and
provisioning the reserve mac address in the LAN-based NIC of the networked device;
associating the reserve mac address with the networked device in an inventory data structure of the ihs;
detecting a presence of the networked device by an operating system of the ihs;
accessing a unified extensible Firmware interface (uefi) reserve mac protocol to expose a uefi preboot execution environment (PXE) driver that is specific to the device descriptor;
loading the uefi PXE driver into a uefi platform; and
provisioning the LAN-based NIC with the reserve mac address using the uefi PXE driver in place of the archived OEM mac address.
0. 25. An information handling system (ihs) comprising:
a local area network (LAN) based network interface controller (NIC);
a networked device connected to the LAN-based NIC, which locally connects with the ihs, the networked device having a processor operably in communication with the LAN-based NIC to:
detect, during a boot of the networked device, a device descriptor in the NIC, the device descriptor indicative of a capability for assigning a mac address to the networked device;
in response to detecting the device descriptor, expose an interface of a unified extensible Firmware interface (uefi) reserve mac protocol driver;
load a uefi preboot execution environment (PXE) driver into a uefi platform; and
provision, using the uefi PXE driver, the NIC with a mac address.
7. An information handling system (ihs) to unambiguously address networked devices, the ihs comprising:
a local area network (LAN) based network interface controller (NIC);
a networked device connected to the LAN-based NIC, the LAN-based NIC external to the networked device; and
a system that manages an ihs inventory list database, the system physically interconnected to the networked device via the LAN-based NIC and having a processor operably in communication with the LAN-based NIC to:
detect a device descriptor of the LAN-based NIC;
determine that the device descriptor indicates a capability for assigning a reserve media access control (mac) address to the networked device that connects to the system via the LAN-based NIC;
archive an original equipment manufacturer (OEM) mac address of the LAN-based NIC into a non-volatile storage of the LAN-based NIC; and
provision the LAN-based NIC with the reserve a mac address;
associate the reserve mac address with the networked device in an inventory data structure for the HIS;
detect the presence of the networked device by an operating system of the ihs;
access a unified extensible Firmware interface (uefi) reserve mac protocol to expose a uefi preboot execution environment (PXE) driver that is specific to the device descriptor;
load the uefi PXE driver into a uefi platform; and
provision, by using the uefi PXE driver, the LAN-based NIC with the reserve mac address in place of the archived OEM mac address.
0. 26. A system that addresses networked devices in a distributed information handling system (ihs), the system comprising:
a local area network (LAN) based network interface controller (NIC); and
a networked device that locally connects within the distributed ihs via the LAN-based NIC, the networked device having a processor that is communicatively connected to the LAN-based NIC and which executes firmware that makes the processor operable to:
detect, during a boot of the networked device, a device descriptor in the LAN-based NIC, the device descriptor indicative of a capability for assigning a mac address to the networked device;
in response to detecting the device descriptor, expose an interface of a unified extensible Firmware interface (uefi) reserve mac protocol driver;
load a uefi preboot execution environment (PXE) driver into a uefi platform; and
provision, using the uefi PXE driver, the NIC with a mac address.
13. A system that unambiguously addresses networked devices in a distributed information handling system (ihs), the system comprising:
a processor;
an operating system driver executed by the processor and in communication with a local area network (LAN) based network interface controller (NIC) that is external to and connected to a networked device, the operating system driver;
a memory comprising an ihs inventory list database managed by the system, the system physically interconnected to the networked device via the LAN-based NIC; and
a processor communicatively connected to the LAN-based NIC and which executes firmware including an operating system driver that makes the processor operable to:
detect a device descriptor of the LAN-based NIC;
determine that the device descriptor indicates a capability for assigning a reserve media access control (mac) address to the networked device that connects to the ihs via the LAN-based NIC;
archive an original equipment manufacturer (OEM) mac address of the LAN-based NIC into a non-volatile storage of the LAN-based NIC; and
provision the LAN-based NIC with the reserve a mac address;
associate the reserve mac address with the networked device in an inventory data structure for the ihs;
detect a presence of the networked device by an operating system of the ihs;
access a unified extensible Firmware interface (uefi) reserve mac protocol to expose a uefi preboot execution environment (PXE) driver that is specific to the device descriptor;
load the uefi PXE driver into a uefi platform; and
provision the LAN-based NIC with the reserve mac address using the uefi PXE driver in place of the archived OEM mac address.
2. The method of claim 1, wherein the LAN-based NIC provides LAN connectivity between the ihs and the networked device, the method further comprising:
detecting the presence of the networked device by an operating system driver during one of a boot of the ihs and a hot plugging of a network system; and
the operating system driver provisioning the reserve mac address in the LAN-based NIC for use in place of an OEM programmed mac address of the LAN-based NIC; and
associating the mac address with the networked device in an inventory data structure of the ihs.
3. The method of claim 2, further comprising:
sending a command over an operating system to a basic input/output system (BIOS) interface to an of a unified extensible Firmware interface (uefi) BIOS; and
receiving the reserve mac address from the uefi BIOS.
4. The method of claim 1, further comprising:
re-initializing an original equipment manufacturer (OEM) mac address for the LAN-based NIC in response to a power cycle of the networked device.
5. The method of claim 1, further comprising:
detecting a second device descriptor of a second networked device that is connected to the LAN-based NIC; and
provisioning a second reserve mac address in the LAN-based NIC, where the second reserve mac address is assigned to the second networked device and a first reserve the mac address and second mac address are unique reserve different mac addresses.
6. The method of claim 1, further comprising:
detecting the a second device descriptor of the networked device connected to a second LAN-based NIC to which the networked device is connected, the second device descriptor also indicating a capability for assigning a second mac address to the second LAN-based NIC; and
provisioning the second based LAN-based NIC with the reserve mac address that was previously assigned to and is associated with the networked device.
8. The ihs of claim 7, wherein the LAN-based NIC provides LAN connectivity between the ihs and the networked device and the system is further operable to:
detect the presence of the networked device by an operating system driver during one of a boot of the ihs and a hot plugging of a network system; and
provision the reserve mac address in the LAN-based NIC by the operating system driver for use in place of an OEM programmed mac address of the LAN-based NIC; and
associate the mac address with the networked device in an inventory data structure of the ihs.
9. The ihs of claim 8, wherein the system is further operable to:
send a command by an the operating system driver over an operating system to a basic input/output system (BIOS) interface to an unified extensible Firmware interface (uefi) BIOS; and
receive the reserve mac address from the uefi BIOS.
10. The ihs of claim 7, wherein the system is further operable to:
re-initialize an original equipment manufacturer (OEM) mac address for the LAN-based NIC in response to a power cycle of the networked device.
11. The ihs of claim 7, wherein the system is further operable to:
detect a second device descriptor of a second networked device that is connected to the LAN-based NIC; and
provision the LAN-based NIC with a second reserve mac address that is assigned to the second networked device, the second mac address being a different mac address from the mac address associated with the networked device.
12. The ihs of claim 7, wherein the system is operable to:
detect the device descriptor of the networked device that is connected to a second LAN-based NIC; and
provision the second LAN-based NIC with a reserve the mac address that is was previously assigned and associated with the networked device.
14. The system of claim 13, wherein the LAN-based NIC provides LAN connectivity between the distributed ihs and the networked device and the operating system driver is makes the processor further operable to:
detect the presence of the networked device during one of a boot of the ihs and a hot plugging of a network system; and
provision, by the operating system driver, the reserve mac address in the LAN-based NIC for use in place of an OEM programmed mac address of the LAN-based NIC; and
associate the mac address with the networked device in an inventory data structure of the ihs.
15. The system of claim 14, further comprising an interface of the operating system executed by wherein the processor and is further operable to:
send a command to a basic input/output system (BIOS) interface to an unified extensible Firmware interface (uefi) BIOS; and
receive the reserve mac address from the uefi BIOS.
0. 16. The system of claim 13, wherein the operating system driver is further operable to detect the presence of the networked device during of an operating system of the ihs, the ihs further comprising:
an interface of the operating system executed by the processor and operable to access a unified extensible Firmware interface (uefi) reserve mac protocol to expose a uefi preboot execution environment (PXE) driver that is specific to the device descriptor and to load the uefi PXE driver into a uefi platform that in turn provisions the LAN-based NIC with the reserve mac address.
17. The system of claim 13, wherein the operating system driver is makes the processor further operable to:
detect a second device descriptor of a second networked device that is connected to the LAN-based NIC; and
provision the LAN-based NIC with a second reserve mac address, different from the mac address associated with the networked device; and
associate the second mac address with the second networked device.
18. The system of claim 13, wherein the operating system driver is makes the processor operable to:
detect the device descriptor of the networked device that is connected to a second LAN-based NIC having a device descriptor that also indicates a capability for assigning a mac address to the networked device; and
provision the second LAN-based NIC with a reserve the mac address that is associated with the networked device.
0. 19. The method of claim 1, wherein provisioning of the mac address in the LAN-based NIC comprises reprogramming the LAN-based NIC with the mac address received from a unified extensible Firmware interface (uefi) basic input/output system (BIOS).
0. 20. The method of claim 1, wherein the LAN-based NIC is associated with a docking station or dongle to which the networked device physically connects, the method further comprising clearing the mac address from the LAN-based NIC when the network device is detached from the LAN-based NIC.
0. 21. The ihs of claim 7, wherein to provision the mac address in the LAN-based NIC, the system is further operable to reprogram the LAN-based NIC with the mac address received from a unified extensible Firmware interface (uefi) basic input/output system (BIOS).
0. 22. The system of claim 13, wherein in provisioning the mac address in the LAN-based NIC, the operating system driver makes the processor further operable to reprogram the LAN-based NIC with the mac address received from a unified extensible Firmware interface (uefi) basic input/output system (BIOS).
0. 24. The method of claim 23, wherein provisioning of the NIC with the mac address comprises archiving an original equipment manufacturer (OEM) mac address in a NIC internal non-volatile storage.

1. Technical Field

This disclosure relates generally to information handling systems, and more particularly to managing media access control (MAC) addresses for networked devices.

2. Description of the Related Art

As the value and use of information continue to increase, individuals and businesses seek additional ways to process and store information. One option available to users is information handling systems. An information handling system (IHS) generally processes, compiles, stores, and/or communicates information or data for business, personal, or other purposes, thereby allowing users to take advantage of the value of the information. Because technology and information handling needs and requirements vary between different users or applications, information handling systems may also vary regarding what information is handled, how the information is handled, how much information is processed, stored, or communicated, and how quickly and efficiently the information may be processed, stored, or communicated. The variations in information handling systems allow for information handling systems to be general or configured for a specific user or specific use such as financial transaction processing, airline reservations, enterprise data storage, or global communications. In addition, information handling systems may include a variety of hardware and software components that may be configured to process, store, and communicate information and may include one or more computer systems, data storage systems, and networking systems.

In systems management, the media access control (MAC) address of a networked device is often used to uniquely identify that system for targeted deployment of an operating system (OS) or for identification after OS deployment. An example is a Configuration Manager (ConfigMgr for short). When the networked device is first entered into the ConfigMgr database, the ConfigMgr database captures the MAC address which is then used to identify the networked device. Networked devices that include a network interface controller (NIC) generally have a MAC address that is hard coded. NICs are also known as network adapters, local area network (LAN) adapters, and similar terms. Ethernet standard is one ubiquitous used in NICs. Ethernet-based NICs are often included as an expansion card or built into the motherboard of the networked device.

In many instances, however, networked devices are being developed with no onboard NIC. For example, a number of networked devices such as laptops can be connected to an enterprise system via a docking station. For each of the laptops, an original eqiupment manufacturer (OEM) MAC address provisioned in a universal serial bus (USB) NIC is used many times used over and over when first registering these laptops into the ConfigMgr database. This results in many networked devices getting registered with the same MAC address. In another scenario, a single networked device such as a laptop is used at different physical locations, such as at one or more work locations and at the user's home. A different docking station or network dongle at each location can have a different physical NIC that is then used for the same networked device. In both instances, the overall ecosystem is harder to manage.

Disclosed is a method of unambiguously addressing networked devices in an information handling system (IHS). In one embodiment, the method includes detecting a device descriptor of a local area network (LAN) based network interface controller (NIC) connected to a networked device. The method further includes determining that the device descriptor indicates a capability for assigning a reserve media access control (MAC) address to the networked device. The method further includes provisioning the reserve MAC address in the LAN-based NIC of the networked device. The method includes associating the reserve MAC address with the networked device in an inventory data structure for the IHS for unambiguously addressing the networked device.

According to at least one aspect of the present disclosure, an IHS is provided to unambiguously address networked devices. In one embodiment, the IHS includes a LAN-based NIC and a networked device connected to the LAN-based NIC. The IHS includes a system operably in communication with the LAN-based NIC to detect a device descriptor of the LAN-based NIC. The system is further operable to determine that the device descriptor indicates a capability for assigning a reserve MAC address. The system is further operable to provision the LAN-based NIC with the reserve MAC address. The system is further operable to associate the reserve MAC address with the networked device in an inventory data structure for the IHS for unambiguously addressing the networked device.

According to at least one aspect of the present disclosure, a system unambiguously addresses networked devices. In one embodiment, the system includes a processor and an operating system driver executed by the processor and in communication with a LAN-based NIC that is connected to a networked device. The operating system driver is operable to detect a device descriptor of the LAN-based NIC. The operating system driver is further operable to determine that the device descriptor indicates a capability for assigning a reserve MAC address to the networked device. The operating system driver is operable to provision the LAN-based NIC with the reserve MAC address. The operating system driver is operable to associate the reserve MAC address with the networked device in an inventory data structure.

The above presents a general summary of several aspects of the disclosure in order to provide a basic understanding of at least some aspects of the disclosure. The above summary contains simplifications, generalizations and omissions of detail and is not intended as a comprehensive description of the claimed subject matter but, rather, is intended to provide a brief overview of some of the functionality associated therewith. The summary is not intended to delineate the scope of the claims, and the summary merely presents some concepts of the disclosure in a general form as a prelude to the more detailed description that follows. Other systems, methods, functionality, features and advantages of the claimed subject matter will be or will become apparent to one with skill in the art upon examination of the following figures and detailed written description.

The description of the illustrative embodiments can be read in conjunction with the accompanying figures. It will be appreciated that for simplicity and clarity of illustration, elements illustrated in the figures have not necessarily been drawn to scale. For example, the dimensions of some of the elements are exaggerated relative to other elements. Embodiments incorporating teachings of the present disclosure are shown and described with respect to the figures presented herein, in which:

FIG. 1 illustrates an example information handling system within which various aspects of the disclosure can be implemented, according to one or more embodiments;

FIG. 2 illustrates an IHS having three networked devices that at different times utilize a local area network (LAN)-based network interface controller (NIC), according to one embodiment;

FIG. 3 illustrates an IHS having one networked device that at different times utilizes two LAN-based NICs, according to one embodiment;

FIG. 4 illustrates a diagram of an IHS that updates LAN-based NIC with a reserved MAC address in response to detecting a connection or in response to booting, according to one embodiment;

FIG. 5 illustrates a diagram of an IHS that updates LAN-based NIC with a reserved MAC address in response to an operating system install when no data resides on a primary hard drive; and

FIG. 6 illustrates a flow diagram of an exemplary method 240 340 even when the networked device 305 connects to a different docking station 307a-b.

In one embodiment, the networked device 305 can be responsible for maintaining and providing its own reserved MAC address internally. Devices of the IHS 300 such as a configuration server (not shown) can be responsible for querying each networked device 305 to retrieve the current device MAC address, which happens to be the reserved MAC, after the networked device 305 updates the MAC address as it connects to a docking station 307a-b. The configuration server can retain the results of the MAC query as the reserved MAC address in the server's inventory list as a way to reference and identify that networked device 305 uniquely.

In one usage case, the system 301 tracks software licensing as part of cloud licensing. For example, a user may subscribe to license software or media content for a predetermined number of MAC addresses, such as three or five. Absent the above described functionality provided as one aspect of the present disclosure, a single networked device 305 used at different USB NICs 330a-b can appear to the system 301 to be more than one networked device 305, unnecessarily exhausting at least a portion of the license grant.

FIG. 4 illustrates usage cases for an IHS 400 dynamically updating a USB NIC 430 with a reserved MAC address 440 of a networked device 405, in one of the following two situations: (1) during a boot up of the IHS 400 that occurs while the USB NIC 430 is connected to the networked device 405; or (2) when the USB NIC 430 is hot plugged to the IHS 400. In both cases, a custom USB NIC driver 448 can be employed for the USB NIC 430. This USB NIC driver 448 can leverage a secure OS-to-BIOS interface 446, such as Dell's OS Protocol Access. All other driver-level interfaces (not shown) that can update the MAC address may be disabled, such as would be used in a vendor utility.

An exemplary sequence of events for this path can be as follows: (1) OS 416 detects USB NIC 430 with a custom device descriptor 438, which requests that the custom USB NIC driver 448 begin its initialization path (block 461). (2) The USB NIC driver 448 attempts to communicate over the secure OS-to-BIOS interface by sending a pre-defined discovery/query command to the BIOS (block 462). (3) If unsuccessful, the USB NIC driver will abort the MAC address update, and continue to load with the MAC address that was programmed into the device by the manufacturer (block 463). (4) If successful, the USB NIC driver 448 requests that the UEFI BIOS platform 414 send the reserved MAC address 440 (block 464). (5) Once the USB NIC driver receives the reserved MAC Address, the USB NIC driver 448 archives the OEM MAC address 436 in the NIC internal non-volatile storage (not shown), and then reprograms the USB NIC 430 (block 465). (6) The USB NIC driver 448 continues to load as usual, whereby operation of the USB NIC 430 behaves as normal with the only exception being the updated reserved MAC Address 440 (block 466). The reserved MAC address may be cleared from the USB NIC 430 when the networked device 405 is detached from the USB NIC 430 to prevent duplicate MAC addresses on the IHS 400. In one embodiment, the host system is not required to clear the reserved MAC address 440 in the USB NIC 430. The USB NIC firmware 434 or hardware of the USB NIC 430 can be required to re-initialize to the OEM MAC address 436 any time power is lost to prevent a reserved MAC address 440 from becoming “sticky” to the networked device 405. For example, the networked device 405 may leave the IHS 400 for another IHS (not shown).

FIG. 5 illustrates an IHS 500 in the case of a bare metal install of an OS by utilizing a UEFI PXE driver 542 rather than the OS-to-BIOS interface 146 (FIG. 1) when no data resides on a primary hard drive. The UEFI PXE driver 542 that is included in the UEFI BIOS platform 514 can be required to expose an interface of a UEFI reserved MAC protocol driver 544, whereby the UEFI BIOS platform 514 can provide the reserved MAC address 540.

The Preboot eXecution Environment (PXE, also known as Pre-Execution Environment; sometimes pronounced “pixie”) is an environment to boot computers using a network interface independently of data storage devices or installed operating systems. PXE makes use of several network protocols like Internet Protocol (IPv4), User Datagram Protocol (UDP), Dynamic Host Configuration Protocol (DHCP) and Trivial File Transfer Protocol (TFTP) and of concepts like globally unique identifier (GUID), universally unique identifier (UUID) and Universal Network Device Interface and extends the firmware of the PXE client (the computer to be bootstrapped via PXE) with a set of predefined application programming interfaces (APIs). The firmware on the client tries to locate a PXE redirection service on the network (Proxy DHCP) in order to receive information about available PXE boot servers. After parsing the answer, the firmware will ask an appropriate boot server for the file path of a network bootstrap program (NBP), download the NBP into the computer's random-access memory (RAM) using TFTP, possibly verify the NBP, and finally execute the NBP.

With further reference to FIG. 5, an exemplary sequence of events for this path is as follows: (1) USB NIC 530 with a specific device descriptor 538 that is indicative of a reserve MAC address 540 is detected by the UEFI BIOS platform 514 (block 571); (2) The UEFI reserved MAC protocol driver 544 that allows for the communication of the reserved MAC address 540 is exposed (block 572); (3) The UEFI PXE driver 542 that is specific to this device is loaded, and the UEFI BIOS platform 514 communicates the reserved MAC address 540 to the UEFI PXE driver 542 (block 573); (4) The UEFI PXE driver 542 archives the original MAC address 536 in internal non-volatile storage of the USB NIC 530 and then provisions the USB NIC 530 with the reserved MAC address 540 (block 574); (5) Operation of the USB NIC 530 behaves as normal, with the only exception being the updated reserve MAC address 540 that is presented to network and local OS for bare metal installation (block 575); (6) The UEFI PXE driver 542 continues to load as usual (block 576).

With reference to FIG. 6, a method 600 is provided for unambiguously addressing networked devices in an IHS. In one embodiment, illustrated in FIG. 6A, the method 600 includes a system detecting a device descriptor of a LAN-based NIC connected to a networked device that does not physically contain a unique MAC address (block 602). The system determines that the device descriptor indicates a capability for assigning a reserve MAC address to the networked device (block 604). The system provisions the reserve MAC address in the LAN-based NIC of the networked device (block 606). The system can associate the reserve MAC address with the networked device in an inventory data structure for the IHS in order to unambiguously address the networked device (block 608).

In one embodiment, the LAN-based NIC determines whether the networked device has undergone a power cycle (block 610). In response to determining in block 610 that the network system has not been undergone a power cycle, the LAN-based NIC maintains the reserve MAC address (block 612). Processing returns to block 610. In response to determining (or detecting) in block 610 that the networked device has been disconnected from the LAN-based NIC, the LAN-based NIC re-initializes an OEM MAC address for the LAN-based NIC (block 614).

Without a reserve MAC address, ambiguous addressing can arise from more than one networked device connecting to the IHS at various times via the same LAN-based NIC. Thus, in one embodiment, the method 600, continued in FIG. 6B, further includes the system detecting a second device descriptor of a second networked device that is connected to the LAN-based NIC (block 616). The system provisions a second, different reserve MAC address in the LAN-based NIC (block 618).

Without a reserve MAC address, ambiguous addressing can also arise from the same networked device connecting to the IHS at various times via different LAN-based NICs. Thus, in one embodiment the method 600 further includes the system detecting the device descriptor of the networked device that is connected to a second LAN-based NIC (block 620). The system provisions the second LAN-based NIC with the previously-assigned reserve MAC address of the networked device (block 622).

In one embodiment, the method 600 further includes the system detecting the presence of the networked device by an operating system driver during one of a boot of the IHS and a hot plugging of the network system. The method 600 includes the operating system driver provisioning the reserve MAC address in the LAN-based NIC. In an exemplary embodiment, the method 600 includes sending a command by the operating system driver over an operating system to BIOS interface to a UEFI BIOS. The method 600 then includes receiving the reserve MAC address from the UEFI BIOS.

In one embodiment, the method 600 includes detecting the presence of the networked device by an operating system driver during installation of an operating system of the IHS. The method 600 includes accessing a UEFI reserve reserved MAC protocol driver to expose a UEFI PXE driver that is specific to the device descriptor. The method 600 further includes loading the UEFI PXE driver into a UEFI platform. The method 600 includes provisioning the LAN-based NIC with the reserve MAC address using the UEFI PXE driver.

In the above described flow charts chart of FIG. 6, one or more of the methods may be embodied in a computer readable device containing computer readable code such that a series of functional processes are performed when the computer readable code is executed on a computing device. In some implementations, certain steps of the methods are combined, performed simultaneously or in a different order, or perhaps omitted, without deviating from the scope of the disclosure. Thus, while the method blocks are described and illustrated in a particular sequence, use of a specific sequence of functional processes represented by the blocks is not meant to imply any limitations on the disclosure. Changes may be made with regards to the sequence of processes without departing from the scope of the present disclosure. Use of a particular sequence is therefore, not to be taken in a limiting sense, and the scope of the present disclosure is defined only by the appended claims.

One or more of the embodiments of the disclosure described can be implementable, at least in part, using a software-controlled programmable processing device, such as a microprocessor, digital signal processor or other processing device, data processing apparatus or system. Thus, it is appreciated that a computer program for configuring a programmable device, apparatus or system to implement the foregoing described methods is envisaged as an aspect of the present disclosure. The computer program may be embodied as source code or undergo compilation for implementation on a processing device, apparatus, or system. Suitably, the computer program is stored on a carrier device in machine or device readable form, for example in solid-state memory, magnetic memory such as disk or tape, optically or magneto-optically readable memory such as compact disk or digital versatile disk, flash memory, etc. The processing device, apparatus or system utilizes the program or a part thereof to configure the processing device, apparatus, or system for operation.

While the disclosure has been described with reference to exemplary embodiments, it will be understood by those skilled in the art that various changes may be made and equivalents may be substituted for elements thereof without departing from the scope of the disclosure. In addition, many modifications may be made to adapt a particular system, device or component thereof to the teachings of the disclosure without departing from the essential scope thereof. Therefore, it is intended that the disclosure not be limited to the particular embodiments disclosed for carrying out this disclosure, but that the disclosure will include all embodiments falling within the scope of the appended claims. Moreover, the use of the terms first, second, etc. do not denote any order or importance, but rather the terms first, second, etc. are used to distinguish one element from another.

The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. As used herein, the singular forms “a”, “an” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms “comprises” and/or “comprising,” when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.

The description of the present disclosure has been presented for purposes of illustration and description, but is not intended to be exhaustive or limited to the disclosure in the form disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope of the disclosure. The described embodiments were chosen and described in order to best explain the principles of the disclosure and the practical application, and to enable others of ordinary skill in the art to understand the disclosure for various embodiments with various modifications as are suited to the particular use contemplated.

Grobelny, Nicholas D., Martell, Nathan F., Gillon, James T., Voor, Thomas E.

Patent Priority Assignee Title
Patent Priority Assignee Title
6640278, Mar 25 1999 DELL PRODUCTS, L P Method for configuration and management of storage resources in a storage network
7240364, May 20 2000 Ciena Corporation Network device identity authentication
7590653, Mar 02 2005 Computer Associates Think, Inc Automated discovery and inventory of nodes within an autonomic distributed computing system
8260891, Oct 30 2007 Dell Products L.P. System and method for the provision of secure network boot services
20080162800,
20080175246,
20090113046,
20120131157,
20130346628,
20140052403,
20140258700,
20140281577,
20150016417,
///////////////////////
Executed onAssignorAssigneeConveyanceFrameReelDoc
Jul 08 2014MARTELL, NATHAN F DELL PRODUCTS, L P ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0473740566 pdf
Jul 15 2014GILLON, JAMES T DELL PRODUCTS, L P ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0473740566 pdf
Jul 16 2014GROBELNY, NICHOLAS G DELL PRODUCTS, L P ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0473740566 pdf
Jul 16 2014VOOR, THOMASDELL PRODUCTS, L P ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0473740566 pdf
Oct 31 2018DELL PRODUCTS, L.P.(assignment on the face of the patent)
Mar 20 2019Dell USA L PTHE BANK OF NEW YORK MELLON TRUST COMPANY, N A SECURITY AGREEMENT0494520223 pdf
Mar 20 2019DELL MARKETING L P THE BANK OF NEW YORK MELLON TRUST COMPANY, N A SECURITY AGREEMENT0494520223 pdf
Mar 20 2019DELL INTERNATIONAL L L C THE BANK OF NEW YORK MELLON TRUST COMPANY, N A SECURITY AGREEMENT0494520223 pdf
Mar 20 2019Dell Products L PTHE BANK OF NEW YORK MELLON TRUST COMPANY, N A SECURITY AGREEMENT0494520223 pdf
Mar 20 2019CREDANT TECHNOLOGIES, INC THE BANK OF NEW YORK MELLON TRUST COMPANY, N A SECURITY AGREEMENT0494520223 pdf
Mar 20 2019EMC IP HOLDING COMPANY LLCTHE BANK OF NEW YORK MELLON TRUST COMPANY, N A SECURITY AGREEMENT0494520223 pdf
Mar 20 2019WYSE TECHNOLOGY L L C THE BANK OF NEW YORK MELLON TRUST COMPANY, N A SECURITY AGREEMENT0494520223 pdf
Mar 20 2019FORCE10 NETWORKS, INC THE BANK OF NEW YORK MELLON TRUST COMPANY, N A SECURITY AGREEMENT0494520223 pdf
Mar 20 2019EMC CorporationTHE BANK OF NEW YORK MELLON TRUST COMPANY, N A SECURITY AGREEMENT0494520223 pdf
Apr 09 2020EMC IP HOLDING COMPANY LLCTHE BANK OF NEW YORK MELLON TRUST COMPANY, N A SECURITY AGREEMENT0535460001 pdf
Apr 09 2020WYSE TECHNOLOGY L L C THE BANK OF NEW YORK MELLON TRUST COMPANY, N A SECURITY AGREEMENT0535460001 pdf
Apr 09 2020FORCE10 NETWORKS, INC THE BANK OF NEW YORK MELLON TRUST COMPANY, N A SECURITY AGREEMENT0535460001 pdf
Apr 09 2020EMC CorporationTHE BANK OF NEW YORK MELLON TRUST COMPANY, N A SECURITY AGREEMENT0535460001 pdf
Apr 09 2020Dell USA L PTHE BANK OF NEW YORK MELLON TRUST COMPANY, N A SECURITY AGREEMENT0535460001 pdf
Apr 09 2020Dell Products L PTHE BANK OF NEW YORK MELLON TRUST COMPANY, N A SECURITY AGREEMENT0535460001 pdf
Apr 09 2020DELL MARKETING L P THE BANK OF NEW YORK MELLON TRUST COMPANY, N A SECURITY AGREEMENT0535460001 pdf
Apr 09 2020CREDANT TECHNOLOGIES INC THE BANK OF NEW YORK MELLON TRUST COMPANY, N A SECURITY AGREEMENT0535460001 pdf
Apr 09 2020DELL INTERNATIONAL L L C THE BANK OF NEW YORK MELLON TRUST COMPANY, N A SECURITY AGREEMENT0535460001 pdf
Date Maintenance Fee Events
Oct 31 2018BIG: Entity status set to Undiscounted (note the period is included in the code).
Jun 20 2024M1552: Payment of Maintenance Fee, 8th Year, Large Entity.


Date Maintenance Schedule
Sep 27 20254 years fee payment window open
Mar 27 20266 months grace period start (w surcharge)
Sep 27 2026patent expiry (for year 4)
Sep 27 20282 years to revive unintentionally abandoned end. (for year 4)
Sep 27 20298 years fee payment window open
Mar 27 20306 months grace period start (w surcharge)
Sep 27 2030patent expiry (for year 8)
Sep 27 20322 years to revive unintentionally abandoned end. (for year 8)
Sep 27 203312 years fee payment window open
Mar 27 20346 months grace period start (w surcharge)
Sep 27 2034patent expiry (for year 12)
Sep 27 20362 years to revive unintentionally abandoned end. (for year 12)