CONFIGURING NETWORK SETTINGS OF AN UNREACHABLE HOST
First Claim
Patent Images
1. A method comprising:
- determining, by a processing device, that a first host on a network is unreachable using a first communication protocol;
selecting a second host on the network that is reachable using the first communication protocol, wherein the second host on the network can reach the first host using a second communication protocol; and
providing, by the processing device, a communication to the second host on the network using the first communication protocol, wherein the communication causes the second host to access the first host on the network using the second communication protocol.
1 Assignment
0 Petitions
Accused Products
Abstract
An exemplary system may configure network settings of an unreachable host. In one embodiment, the system determines that a first host on a network is unreachable using a first communication protocol. The system selects a second host on the network that is reachable using the first communication protocol. The second host on the network can reach the first host using a second communication protocol. The system provides a communication to the second host on the network using the first communication protocol. The communication causes the second host to access the first host on the network using the second communication protocol.
47 Citations
20 Claims
-
1. A method comprising:
-
determining, by a processing device, that a first host on a network is unreachable using a first communication protocol; selecting a second host on the network that is reachable using the first communication protocol, wherein the second host on the network can reach the first host using a second communication protocol; and providing, by the processing device, a communication to the second host on the network using the first communication protocol, wherein the communication causes the second host to access the first host on the network using the second communication protocol. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory computer readable storage medium having instructions that, when executed by a processing device, cause the processing device to perform operations comprising:
-
determining, by a processing device, that a first host on a network is unreachable using a first communication protocol; selecting a second host on the network that is reachable using the first communication protocol, wherein the second host on the network can reach the first host using a second communication protocol; and providing, by the processing device, a communication to the second host on the network using the first communication protocol, wherein the communication causes the second host to access the first host on the network using the second communication protocol. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computing device comprising:
-
a memory; and a processing device coupled to the memory, wherein the processing device is to; determine that a first host on a network is unreachable using a first communication protocol; select a second host on the network that is reachable using the first communication protocol, wherein the second host on the network can reach the first host using a second communication protocol; and provide a communication to the second host on the network using the first communication protocol, wherein the communication causes the second host to access the first host on the network using the second communication protocol. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification