Modifying network settings of an unreachable host
First Claim
Patent Images
1. A method comprising:
- determining, by a processing device, that a first host on a network is unreachable using a first communication protocol;
selecting a second host on the network that is reachable using the first communication protocol in view of a proximity between the first host and the second host, wherein the second host on the network can reach the first host using a second communication protocol; and
providing, by the processing device, a communication to the second host on the network using the first communication protocol, wherein the communication causes the second host to access the first host on the network in view of a scope associated with the first host to cause the second host to configure a network configuration of the first host.
1 Assignment
0 Petitions
Accused Products
Abstract
An exemplary system may configure network settings of an unreachable host. In one embodiment, the system determines that a first host on a network is unreachable using a first communication protocol. The system selects a second host on the network that is reachable using the first communication protocol. The second host on the network can reach the first host using a second communication protocol. The system provides a communication to the second host on the network using the first communication protocol. The communication causes the second host to access the first host on the network using the second communication protocol.
53 Citations
20 Claims
-
1. A method comprising:
-
determining, by a processing device, that a first host on a network is unreachable using a first communication protocol; selecting a second host on the network that is reachable using the first communication protocol in view of a proximity between the first host and the second host, wherein the second host on the network can reach the first host using a second communication protocol; and providing, by the processing device, a communication to the second host on the network using the first communication protocol, wherein the communication causes the second host to access the first host on the network in view of a scope associated with the first host to cause the second host to configure a network configuration of the first host. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory computer readable storage medium having instructions that, when executed by a processing device, cause the processing device to:
-
determine, by the processing device, that a first host on a network is unreachable using a first communication protocol; select a second host on the network that is reachable using the first communication protocol in view of a proximity between the first host and the second host, wherein the second host on the network can reach the first host using a second communication protocol; and provide, by the processing device, a communication to the second host on the network using the first communication protocol, wherein the communication causes the second host to access the first host on the network using the second communication protocol in view of a scope associated with the first host to cause the second host to configure a network configuration of the first host. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computing device comprising:
-
a memory; and a processing device operatively coupled to the memory, wherein the processing device is to; determine that a first host on a network is unreachable using a first communication protocol; select a second host on the network that is reachable using the first communication protocol in view of a proximity between the first host and the second host, wherein the second host on the network can reach the first host using a second communication protocol; and provide a communication to the second host on the network using the first communication protocol, wherein the communication causes the second host to access the first host on the network in view of a scope associated with the first host to cause the second host to configure a network configuration of the first host. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification