throbber
mH.p.mHuHuu~HHmo_=uwnmam=.Eum.S.=_.§.nw=m=:nHm_HhH.».m_nHuum H.::::::::::::::::-!..iul!i:!i:Iluluauuuuuuuuu-------§.HH.-----------HHHnmwmaH__H8HHHH.:u-3.=umum=m=rnmH_oH:.mo._.uaum_._HE..%_o.E§uoam=HH::b%mH3H"InewH.|«om4AH;SH
`
`
`
`
`
`
`
`
`
`
`
`r.llllllllllllllllllllllllllllllllllllllllllll|I...l.Ill......IlIll....l....lIIlI...ll...l_Il._
`
`Sim:
`
`_
`
`
`
`
`
`
`
`[E1 0]
`
`
`
`
`
`
`
`r:s:III|IIallllnnlllnIluunnlllllisststrlllinansinIIIIlinlgiluiiiulllillllh
`
`
` :1$&IxZlbflmHmHlHmm_mac..a.__H_HHn%+mmHH8.H£8”38H
`
`
`
`m.m.m_uLuuaHHwn.aHR.Toua=5....nEuo__a:_H...
`mArK¢
`
`
`
`
`
`__ma.xm.uu_..Hum_—m=:n_m.._UUd.H..:w.__vn_uaa..:T.H_m.Hu.m.mHnHu=m
`
`-----------------nnmafl-------------------------.mafl---mmmnnnnnnn»---wafl---H
`
`._:..§.=Enm._ET._u_
`
`HME:
`
`H
`
`6¥ggm
`
`O26
`
`O
`
`23:8:
`
`NNQiesm8_:oEm_mOIHmm?H059m.mmn_
`
`
`
`

`
`(I7)
`
`1%Efi1l16—62020
`
`H2112]
`
`[12]
`
`_1T_
`
`7 F 1./7dj'—-JV
`
`ap-nane=adm .01 .a.:ldr
`
`E7I~’1x;Ulfi$E
`I
`III
`I
`II
`II
`IIA
`
`\
`
`\
`
`
`
`
`1202b
`
`1203b
`1204b
`
`
`3%?’ F U1 addr=
`fiflfi’ F L/7.
`adclr=13.8-6
`
`?§U7f=J‘3§)JflE
`tine-
`H*Jfi§btIHl'x§
`time=Be99
`
`1 ~ Ffifi
`
`nmne~bdl.3x
`
`name-
`
`
`
`[12114]
`
`((314)
`
`
`
`addr
`
`dnr
`
`nail
`
`fzle
`
`add:
`
`dlr
`
`nail
`
`1406
`
`1407
`
`""""""" ‘i5§<7'J;I"sH{""'J
`
`‘“""""'""'33}3?'9‘B"f66I'
`
`Page 1502 of 1928
`
`

`
`(18)
`
`[E13]
`
`(E13)
`
`2-2
`
`¥4u7bU#—H
`
`ap—nane=adm.D1.dir
`
`¥$5§§16-*-6 2 0 2 0
`
`
`_
`
`1cn2-2
`
`¥4uabuv-A §
`ap»nane=bdn.ax.dir
`
`
`
`
`
`F4U0b9fifi1
`
`
`
`
`
`
`
`name-&dm.0E.mail
`addr=
`
`
`:::/ F Llfiifl
`
`flfift $3IE7l¢L/31
`
`A P7’f:bUX
`
`139b
`
`312/ h!)fiE¥$
`
`nane=tdm.sx.uail
`
`Efi %E7Fv2
`
`addr=13.B.6
`
`P\F’7’ F Lvil
`
`ap-addr=5
`
`Wé
`
`alias=
`
`1305b
`
`1307b
`
`1308b
`
`Page1503of1928
`
`'~-
`
`I
`
`¥+v7+Uflfi
`
`I
`
`I I
`
`I
`
`IIII
`
`.
`
`

`
`Electronic Acknowledgement Receipt
`
`66261 07
`
`Application Number:
`
`90010416
`
`International
`
`Number:
`
`Title of Invention:
`
`Point-to—Point Internet Protocol
`
`First Named Inventor/Applicant Name:
`
`6108704
`
`Filer:
`
`Michael R Casey
`
`Attorney Docket Number:
`
`2655-0188
`
`Payment information:
`
`Submitted with Payment
`
`no
`
`File Listing:
`
`Document
`
`_
`
`.
`
`File Size(Bytes)/
`
`Multi
`
`
` Pages Message Digest Pan /-zip
`
`
`NPL Documents
`
`F0057_lSR_US9615S04.pdf
`
`e27e(cddc4J43I’tJ0e-16c 54746 I the 3200980
`1..-e73
`
`no
`
`10
`
`Warnings:
`
`'"'°'"'P*é 1504 of 1928
`
`

`
`
`
`NPL Documents
`
`FO058_gitman_economic_ana|
`ysis.pdf
`
`eesll ):reL|5ddLr&271d48816Se869752rJ:.a
`4Jd84.|lS
`
`1874599
`
` F0059_h ue|amo_end_user_pre
`
`712273
`
`mises.pdf
`
`6baldlc1J)S(dSt I a9069bdc687 3LVé'28aae7 '
`dcfib
`
`NPL Documents
`
`
`
`102320
`
`)1)lLk_2Cdl}.70e7L861Sl/sa4)L\79c6e0eB
`MOI
`
`NPL Documents
`
`F0060_RFC978.pdf
`
`.1 IAJ7
`
`NPL Documents
`
`F0061_RFC10SS.pdf
`
`4)LH)eae|JDl8)97a1J8bb1Sh'274SSeee7761 -
`
`202556
`
`223076 F006 2_ia me s_m i||s_da La_voice
`
`.pdf
`
`99ef2 34a§bI7c 3074223 3cSLlb94b.'Ja9f6 .
`87:
`
`NPL Documents
`
`Wa rnings:
`
`Info rmation:
`
`
`
`_
`_
`FO063_|ames_forgIe_speech.
`pdf
`
`527034
`
`da96c67c7acc4ba)E69lL)rXSlb97}.7f975 '
`0CbJ
`
`NPL Documents
`
`
`
`F0064_iames_forgie_voice_co
`nferencing.pdf
`
`am I74sris4u6;29ate786riah6é.w3asla4b
`6aJz
`
`NPL Documents
`
`
`
`NPL Documents
`
`F006S_Janes_1979_80.pdf
`
`9;».-d6ddla:i82lMd8ec6a9 l94a I Sc938e7b
`bI'e7l
`
`7|)9S04
`
`NPL Documents
`
`F0066_Janes_198S.pdf
`
`e44ébe3$Sd4S8Sd9S!Seb71JL\228lZbaiML\
`
`421297
`
`Warnings:
`
`Infor|1-39%‘?
`
`Of
`
`

`
`617418
`
`
`
`NPL Documents
`
`F0067_Janes_1989.pdf
`
`b lS7dl(49L171JabedaS 7d8c6L181714d66E6
`8297
`
`Wa rnings:
`
`Info rmation:
`
`
`
`2431238
`
`123925.-déd 1246 1 24:16 39 )dLD84cb777)L1d
`Scslec
`
`NPL Documents
`
`F0068_Janes_1990_91.pdf
`
`
`
`628193
`
`I 1 dlafifiaiaf )aL12e9e1b3a£a I(8SL167aa - .
`M43
`
`NPL Documents
`
`F0069_Janes_1992_93.pdf
`
`
`
`FO070_Jim_stevens_Much_mo
`repdf
`
`SL1b7e11‘91ccbIOSe4c1JSICI99e67l68Sla77
`4991)
`
`262071
`
`NPL Documents
`
`
`
`NPL Documents
`
`F0071_John_|:>e||arny_DigiLa|_
`e|ephony.pdf
`
`4:14118e2ddL1b)9ce876e901d342c49)L1)57
`12356!
`
`428289
`
` Foreign Reference
`
`F0072_JP-63431637.pdf
`
`(.161 191282 7a911l907r$aeBL1S 749)1r3éb-c
`eficee
`
`183914
`
`
`
`2765194
`
`114.21 (019741 c1)cBd1:.S77 3S1ld)be6Md
`83841
`
`Foreign Reference
`
`F0073_J P_6—62020.pdf
`
`
`
`F0074_JP200816382S_Office_ '
`ction_Trans|ation.pdf
`
`a:1ber.99)$4ele8bBl@ M9 1 lacl 3&d 36:6
`:00“)
`
`NPL Documents
`
`AS4133
`
`NPL Documents
`
`F007S_J P-59414140.pdf
`
`rJ:.S)999aaa21)LMSS67l9)_§SEa@7aSS11
`
`1272933
`
`Warnings:
`
`Infor|1-39%‘?
`
`Of
`
`

`
`
`
`F0076_k_sohra by_|SDN_Prirna
`y.pdf
`
`507873
`551 I I 31 Iodbéa Mdécblul 3dL!e I M62397)
`Ibdfl
`
`NPL Documents
`
`
`
`NPL Documents
`
`F0077_ken_sherrnan_daLa_co
`.
`.
`rnrnunIcatIons.pdf
`
`752769
`
`a1JB.MSa1 96lJ8L)8Sc1J77e9ce8d9e&S8B 3 - :-
`|b75I
`
`
`
`F0078_kevin_iefay_kerne|_sup
`po rt.pdf
`
`7cdSccAar_2 74613 3 7le3c4r3 703964; 38216
`abbc
`
`NPL Documents
`
`
`
`F0079_kyuta_saito_voice_pack
`et_c om m.pdf
`
`d249d6607bS)4 l2S))bbb1d7Sc9Sd3d19I
`W8485
`
`NPL Documents
`
`NPL Documents
`
`F0080_|awrence_roberts_evo|u
`tion_of_packet.pdf
`
`S 12);: l07dc316la74al2daI9ce1b |b946l
`|0e2|
`
`543758
`
`
`
`NPL Documents
`
`F0O81_|in_hwa-
`chun_dynamic_|oad_ba|ancing
`
`337731
`
`7Sb8l986L)9e3)Sl:_913a2lc4LmS9L644Jdd3
`3bd7
`
`
`
`NPL Documents
`
`F0O82_rn_e_u|ug_Statistica|_M
`u|tip|exing.pdf
`
`7877617c3aLv981samsb7st.:I87r12oaB2 .
`M313
`
`378989
`
` F0083_m_gopa|akrishnan_inte
`
`NPL Documents
`
`grating_voice_and_data.pdf
`
`ae)aId3bLHI/25 7ll409cd4b6e9a I258 384
`4J0<J
`
`748795
`
`(93.18
`
`F0084_m_i_ross_a|ternatives_f
`or_integrating.pdf
`
`77aBd7 3e )decc48d7S8S la92ccfc Meee I0
`
`NPL Documents
`
`Warnings:
`
`Infor|1-39%‘?
`
`Of
`
`

`
`790492
`
`NPL Documents
`
`F0O85_natesa_ianakiraman_ov
`erview_of_recent.pdf
`
`d4 IAc99aS1bdee8c7edS lS$6lb7)L1dS Mb
`
`1075971
`
` F0086_p_b org nis-d es bordes.
`
`pdf
`
`611bdCe1747e8l778r_4d19M93)S9S1a1JM
`844:0
`
`NPL Documents
`
`
`
`NPL Dowmen ts
`
`FOO87_p_\-en kat_rangan_so
`are_a rc hitecturepdf
`
`07772023 ):v66S6b76l7)7a4|:v66l&S1bdl
`964 3b|
`
` NPL Documents
`
`F0088_francis94inet.pdf
`
`2166322
`
`Wa rnings:
`
`Info rmation:
`
`366
`
`H
`
`1454997 F0089_|nternet_Na vigator_wit
`
`h_SOR.pdf
`
`20l996L8IacF7d6))I6ff7d$eebb§éDb6
`964(
`
`NPL Documents
`
`
`
`FO090_E>ctending_the_|P_|nter
`net_Through_Address_Reuse.
`pdf
`
`NPL Documents
`
`C(£(\
`
`F0091_phi|ip_h_regan_is_it_th
`e_PBX.pdf
`
`8 1874 I 3bd1 (687 I 641.8690 3828194222 36% -
`
`NPL Documents
`
`F009 2_po||e_t_ze| |weger_A n_ NPL Documents
`
`overview_of_the_etherphone.
`pdf
`
`efc|a6)adSu.a7L8d I IK.lcd9d7r_2)ble879e1:d
`IJ87
`
`Wa rnings:
`
`Info rmation:
`
`0( ll
`
`FO093_r_braudes_Requirernen
`s_for_Mu|ticast.pdf
`
`7Sa9dfd49)a76d6718e1E.18d7efd4S8Ha7
`
`NPL Documents
`
`Warnings:
`
`Infor|1-39%‘?
`
`Of
`
`

`
`38
`
`NPL Documents
`
`_
`FOO94_r_w_me|:>a_Expenment
`Jmwidebandlpdf
`
`233947
`
`cl )7bd24cN8n:.)2ddlacl IcIe9)_§blSaSfi
`30IL9d
`
`no
`
`Warnings:
`
`Information:
`
`39
`
`NPL Documents
`
`F0095
`
`N
`‘r‘p.‘mc émarajome‘
`consIderatIons.pdf
`
`292918
`SaLI8LI7D3Sl1Ja)a9dSbS67d@77460ldda
`9|4Q
`
`no
`
`Warnings:
`
`Information:
`
`7
`
`5
`
`40
`
`NPL Documents
`
`F0096
`
`v
`'
`k t
`I
`d
`‘ran Leo Lpac E‘ 0'
`e_when.pdf
`
`662089
`)ellalI8d)93I:HJI3é8d9dbblaa297IS60l
`A7307
`
`no
`
`10
`
`Warnings:
`
`Information:
`
`41
`
`NPL Documents
`
`t‘
`d‘
`fl‘
`tt
`F0097
`‘Sm ‘ mn‘c°°r ma m
`g_helerogeneous.pdf
`
`1104908
`I6Lk963le63)L)dl)47cl97276dl@c)SSl29
`7bfl)3
`
`no
`
`16
`
`Warnings:
`
`Information:
`
`42
`
`NPL Documents
`
`t
`’
`’
`’ h tt
`h'
`F0098
`‘S."lnm|’ 5:‘ °.n‘m egra
`ted_dIgIta|_swItchIng.pdf
`
`656025
`S70lee2SeIld8L6l6l|:49a&eII8ei6ll3l4 .
`7494
`
`no
`
`7
`
`Warnings:
`
`Information:
`
`Total Files Size (in bytes)
`
`30535939
`
`This Acknowledgement Receipt evidences receipt on the noted date by the USPTO ofthe indicated documents,
`characterized by the applicant, and including page counts, where applicable. It serves as evidence of receipt similar to a
`Post Ca rd, as described in MPEP 503.
`
`New Applications Under 35 U.S.C. 111
`lfa new application is being filed and the application includes the necessary components for a filing date (see 37 CFR
`1.53(b)-(d) and MPEP 506), a Filing Receipt (37 CFR 1.54) will be issued in due course and the date shown on this
`Acknowledgement Receipt will establish the filing date of the application.
`
`National Stage of an International Application under 35 U.S.C. 371
`lfa timely submission to enter the national stage ofan international application is compliant with the conditions of35
`U.S.C. 371 and other applicable requirements a Form PCT/DO/E0/903 indicating acceptance ofthe application as a
`national stage submission under 35 U.S.C. 371 will be issued in addition to the Filing Receipt, in due course.
`
`New International Application Filed with the USPTO as a Receiving Office
`lfa new international application is being filed and the international application includes the necessary components for
`an international filing date(see PCT Article 11 and MPEP 1 B10), a Notification ofthe International Application Number
`and ofthe International Filing Date(Form PCT/R0/105)wi|| be issued in due course, subject to prescriptions concerning
`national security, and the date shown on this Acknowledgement Receipt will establish the international filing date of
`the application.
`
`Page 1509 of 1928
`
`

`
`wow» Er_§ oaaamzmou
`,
`PCT
`INTERNATIONAL APPLICATION PUBLISHED UNDBI '1'HE-PA'I'EN"l' COOPEIATION TREATY (PC?)
`
`
`
`(51) mun-don-I Pm: chsstfiuuon 5 «
`cosy 13
`'
`/00
`
`A1
`
`an [ma-national Puhflcndon um."
`wo 94x22os7
`(43) llurnntbul Publication pm:
`29 sepmha 1994 (29.o99¢)
`
`.‘
`
`(21) hm-nnflonnl Appfludon Nnmba-:
`
`PCl'l‘IJS94l00(X)4
`
`(22) Inunntional Filing Dan:
`
`3 January 1994 (0101.94)
`
`(31) Ddgnatu! Shins: AU. CA. JP. KR. Emopcxn pmzm (AT,
`BE.Cl-l.DB,DK.E§.FR.GB,GR.£B..l'l'.LU.MC.NI..
`P1‘, SE).
`
`(30) Pdorily Dam
`oaIo33,914
`
`19 March 1993 09.0393)
`
`US
`
`-
`Puhlishzd
`With ituenmdavnol march report.
`
`no Appflcum acou conromnou [us/us]: 5-too Bayfmnt
`mm. 9.0. Box 58145, Santa Chm. ca 950523145 (Us).
`
`(72) Inventors: N1LA.K.AN'I‘AN. Chanda-a.u-Jdm-an; JT74 Wooaibuk
`Com. San I054; CA9Sll7 (US). LDI. Ly‘, 34852 Win:h(:-
`m Plnca. Fremont. CA 94555 (US). ARUNKUMML N»
`garnj; 3041 Cedar Ridge Court, San Jose. CA 95148 (US).
`SEAMAN. Nfldmll. Iohn; 350 Elan Village Lane, 0206,
`San 106:. CA 95134 (US).
`
`(70 Agent: HAYNES. Mark. A.; I-hynufi. Davis. Suite |70.2l80
`SaudH.i]JRoad.M=n]oPsrk,CA94(n5-6935 (US).
`
`(54) T|'I.|e: SYSTEM FOR REVERSE ADDRfl RESOLUTION FOR REMOTE NEl'WOR.K DEVICE
`
`.5
`
`(57) Abstract
`
`Arcvaumitmurusoluionproanunlfnnuinaaunnmaiandnu netwa-kwhinhanowuesoiznionlogictopmvtdcahiyxczlevcl
`pm¢omlh1Ia'ma1inn(mcbuanIPadctresI)tnn:nu!l:I:ofnmqunu(l27){urIuchin.fIx1:mlion(l22).i1:tdwcnd:n.lofdbphyénlnetwak
`ad:tn:uofsuchaoumu.Tbep:umaa1i:usedhupoanmhvhguplmnfiqdpa-mmhnomofnnbpauwwumbynpdu-w
`pnzimchnunslmnremolnuctwutdevion.Rnumndd:-n:rudmbnprommlktuponsive(129)bnruolu§nnreqnutfiommcrmn¢
`ucrwutkv'imuom¢cpdm4&pMchmmlmswpbIkhk&bvdmmmlhmmfimbuduwomewnhmy:wfi¢¢o
`msohnianrnqmstismcdved (l?5),m1h:rlhnnd1ophysbalnctwu'knM|uso{thn1'u;uc:tin3dcvi=.
`'l'hIn.arw1oIndcv'nemuy|>c
`coupledtoancxwu-k,andcmnmudmnomrdmmgawtfimmomnpdm-Iommunmnni=fionHnhba‘phgmdphy'mod¢.
`'I1:opamnaounec|i.ngwcdevimmfielummnuwakdoummdbddumimmnphyfimlnuwatwmmoffiodevizuunfigwc
`zhodzvbcwiduhighcrlcvdadfiruspomcnl
`
`Page 1510 of 1928
`
`

`
`0W0M.0.WP.EmmF
`
`m.
`
`OodesuedmH:ndfySmupuubfl:=PCl'mbefinmpagcsofpmyhknpubfid:hghumfimd
`IppIica:iousu.ndcr:boPCl‘.
`
`nmnmuwunnuammammaamuannm
`
`
`
`MmmmmmmmmmwwmmmmmWmmwmmm
`
`MW
`
`WWExammmMax
`
`uummmmnnnmn
`uuuwummmmm
`
`mmnnmmnnmmmuanmmmunmW
`
`Mmwmaawwiam
`
`Page1511of1928
`
`

`
`W0 940.2081
`
`PCTIUS94I00O04
`
`SYSTEM FOR REVERSE ADDRESS RESOLUTION
`
`FOR REMOTE NETWORK DEVICE
`
`
`
`The present invention relates to start up protocols for devices in
`
`communication networks; and more particularly to systems which allow a
`
`machine without a configured higher level protocol address to obtain such '
`
`5
`
`address without a unique machine Identifier.
`
`QESCRIEHQN QE BELAIEQ am
`
`A widely accepted series of intematlonei standards describing network
`
`architectures is known as the OSI
`
`reference model.
`
`See, generally,
`
`10
`
`Tannenbaum, , 2nd Ed., 1988, Prentice-Hall. According
`
`to this model, network communications are divided into a plurality of
`
`protocols within layers of the model. Local Area Networks (LANs) operate
`
`using medium access protocols within the lower layers. layers 1 and 2, of the
`
`OSI model, such as the carrier sense multiple access with collision detection
`
`15
`
`CSMA/CD. IEEE Standard 802.3, also known as ETHERNET, and the token
`
`ring access ring method of IEEE Standard 802.5. These two lower layers
`
`are typically broken down into the physical layer and the data link layer. with
`
`the data link layer being further broken down into a media access control
`
`(MAC) layer, and a logical link layer.
`
`20
`
`Systems, such as personal computers, workstations, and mainframe
`
`computers, attached to the LANs each have a distinct lower level protocol
`
`Identifier known as the physical network address or MAC address. LAN
`frames forwarded to a destination system on the network under these lower
`
`;
`
`level protocols contain the destination system MAC address, or other
`
`25
`
`physical network address, as a destination. LAN frames lorwarded irom a
`
`source system on the network contah the source system MAC address, or
`
`other physical network address, as
`
`a
`
`source address.
`
`Systems
`
`-1-
`
`Page 1512 of 1928
`
`

`
`WO94122087
`
`PCl'lUS94I00004
`
`communicate by encapsulating additional protocols (OSI layers 3-7) within
`
`the lower layer LAN frames. These higher level protocols are grouped into
`
`suites such as the TCP/iP protocol suite and the XNS protocol suite. Many
`
`LANs contain groups of end systems that use different higher level protocol
`
`suites. These higher level protocol suites also assign unique higher level
`
`protocol
`
`identifiers to systems which transmit or receive frames in the
`
`network.
`
`For instance. an internet protocol iP address is assigned to each
`
`system operating within an lntemet protocol network. The lntemet protocol
`
`10
`
`address includes a network address portion and a host address portion. The
`
`network address portion identifies a network within which the system resides,
`
`and the host address portion uniquely identifies the system in that network.
`
`Processors routing packets in an lntemet protocol network rely on the
`
`network address portion of the IP address in a frame to find -the local area
`
`15
`
`network of the destination machine. Once the local area network of the
`
`destination is located, the frame Is forwarded to that network where the host
`
`address portion is relied upon to assign a MAC address for the destination
`
`machine to the packet. Thus, higher level protocol address places the
`
`device In a particular network or subnetwork, so that the higher level protocol
`
`can effectively manage the routing of packets among the networks. without
`
`maintaining a table of the unique physical access layer identifiers for all of
`
`the terminals in the network.
`
`in order to communicate in such a network, the machine must first
`
`obtain its higher level protocol address. This address is typically assigned
`
`by a central authority, such as the lntemet Activities Board, or by a network
`
`manager. Normally, a particular machine learns its
`
`IP address by a
`
`configure operation, in which a technblan uses a local tennlnai to configure
`
`the machine.
`
`in a centrally managed network, this could be a cumbersome
`
`task, involving travel of skilled personnel away from the central management
`
`location. However, a reverse address resolution protocol RARP has been
`
`20
`
`25
`
`30
`
`-2-
`
`Page 1513 of 1928
`
`

`
`W0 94/H087
`
`PCT/‘U594/00004
`
`developed tor networks such as TCPIIP or SNMP protocols. The HARP
`
`allows a machine without a configured IP address to obtain an IP address
`
`from a remote server. The machine broadcasts a request and waits until an
`
`FlAFlP sewer responds.
`
`In the request, the requesting machine must provide
`
`5
`
`its physical network address (MAC address) to uniquely identify itseii.
`
`allowing the sewer to map it into an IP address.
`
`This RARP protocol works fine, so long as the central manegernent
`
`site is aware of the physical network address of the devices being added to
`
`the network.
`
`in order to find out the physical network address, all of the
`
`'
`
`-
`
`10
`
`system being added to the network must be passed through the central
`
`management site so that the address can be read irom these machines, or
`
`a local technician must read the physical network address from the machine
`
`and telephone the central site. This process makes connecting a new device
`
`to a network difficult. Further, this process of physically reading the physical
`
`15
`
`network address from the box is prone to human errors. Such addresses
`
`are typically very long (MAC addresses are 48 bits long), and can be
`
`misread or typed in erroneously.
`
`It
`
`is desirable to have so-called ‘plug and play‘ network devices.
`
`Such devices can be plugged in and turned on by unsldlled personnel.
`
`20
`
`However, the need to find out the physical network address of the box
`
`detracts from this ability.
`
`Accordingly, it is desirable to provide a technique tor resolving higher
`
`level protocol addresses, without reliance on the lower level protocol
`
`addresses.
`
`25
`
`
`
`1
`
`The present invention provides a reverse address resolution protocol
`
`tor use in a communication network which allows resolution logic to provide
`
`a higher level protocol address, or other lntonnation, to a source oi a request
`
`30
`
`for such address, independent of the physical network address of such
`
`-3-
`
`Page 1514 of 1928
`
`

`
`W0 94I7.2087
`
`PCl'lUS94Itl0004
`
`source. The protocol according to the present invention is used in a
`
`processor having a plurality of ports, at least one oi such ports connected by
`
`a point-to-point channel to a remote network device. The reverse address
`
`resolution protocol is responsive to a resolution request from the remote
`
`network device across the point-to-point channel to supply the higher level
`
`‘
`
`protocol address based upon the port through which the resolution request
`
`is received, rather than the physical network address of the requesting
`
`device. Thus. a remote device may be coupled to a network, and connected
`
`to a central management site across a point-to-point communication link in
`
`a ‘plug and play‘ mode. The person connecting the device to the remote
`
`network does not need to determine the physical network address of the
`
`device or configure the device with a higher level address protocol. All this
`
`can be handled automatically.
`
`Thus, the present invention can be characterized as an apparatus for
`
`resolving higher level protocol addresses in response to resolution requests
`
`irom a source ol resolution requests in a communication network. The
`
`apparatus comprises a central processor having a plurality ot ports for
`
`connection to the communication network, and resolution logic which is
`
`coupled to the communication network and in communication with the central
`
`processor. The resolution logic provides a higher level protocol identifier in
`
`response to a particular port in the plurality of ports through which the
`
`resolution request is received by the central processor, independent of the
`
`lower level protocol identifier ot the source of the resolution request. The
`resolution logic may be a routine executed by the central processor. or a
`
`routine executed by a network management processor coupled to the
`
`communication network, and in communication with the central processor.
`
`The resolution logic. according to one aspect, includes a resolution
`
`table that is configurable independent of the lower level protocol identifiers,
`
`which assigns higher level protocol identifiers to particular ports of the central
`
`processor through which the resolution requests may be received.
`
`-4-
`
`10
`
`15
`
`20
`
`25
`
`30
`
`Page 1515 of 1928
`
`

`
`WO 94122037
`
`PCT/US94I'00004
`
`The higher level protocol identifier may comprise an intemet protocol
`
`IP address, which includes a network address for the source of the resolution
`
`request. and a host address for the source of the resolution request.
`
`Further, the higher level protocol may be utilized by a network management
`
`5
`
`system, which communicates network-wide, while the lower level protocol
`
`'
`
`comprises a medium access protocol.
`
`The resolution logic, according to the present invention. relies on the -
`
`source of
`
`the resolution request being coupled across a point-to-point
`
`communication channel to the particular port of the processor receiving the
`
`10
`
`request.
`
`in this way. the port serves as a virtual identifier tor the source of
`
`the request.
`
`Thus, the present invention can also be characterized as an apparatus
`
`for connecting a first network and a second network. This apparatus
`
`includes a communication link, a first processor, and a second processor.
`
`15
`
`The first processor has a first interface coupled to the first network and a
`
`second interface coupled to the communication link. The second processor
`
`has a lower level protocol identifier and is coupled to the second network
`
`and to the communication link. Resolution logic is coupled to the first
`
`network to provide a higher level protocol identifier to the second processor
`
`20
`
`in response to a resolution request through the second interface of the first
`
`processor, independent of the lower le_ve| ‘protocol identifier of the second
`
`processor.
`
`in this manner, the first processor can configure the higher level
`
`protocol addresses for devices in the system, independent of the lower level
`
`protocol addresses.
`
`25
`
`According to another aspect of the invention. the first processor
`
`includes resources to provide network services to frames of data in the first
`
`.
`
`and second networks through the first and second interfaces, and the second
`
`processor includes resources to extend the second interface of the first
`
`processor transparently to the second network.
`
`Page 1516 of 1928
`
`

`
`wo' sumosv
`
`PC'I‘lUS94l000O4
`
`The resolution logic may comprise a routine executed by the lirst
`
`processor, or a routine executed by a network management processor
`
`located in the first network.
`
`Accordingly. a technique-which greatly improves the ‘plug and play‘
`
`5
`
`capability of a network-device has been provided. Remote networks may be ‘
`
`set up using this system, without requiring error prone and cumbersome
`
`techniques to acquire the physical network address oi each device being
`
`added to the network.
`
`Other aspects and advantages of the present invention can be seen
`
`10
`
`upon review of the figures, the detailed description, and the claims which
`
`follow.
`
`
`
`Fig.
`
`1
`
`is a schematic diagram of a system including the reverse
`
`15
`
`address resolution logic according to the present invention.
`
`Fig. 2 illustrates a prior art packet exchange sequence for reverse
`
`address resolution over LAN media.
`
`Fig. 3 illustrates a packet exchange sequence over a WAN medium
`
`as extended according to the present invention.
`
`20
`
`Fig. 4 illustrates the resolution request generation process used in the
`
`sequence of Fig. 3.
`
`Fig. 5 illustrates the resolution request response generation process
`
`used in the sequence of Fig. 3.
`
`Fig. 6 illustrates the resolution request response acceptance process
`
`25
`
`used in the sequence of Fig. 3, which results in a request for a subnet mask
`
`in IP networks.
`
`Fig. 7 is a diagram of the subnet mask response generation process
`
`used in the sequence of Fig. 3.
`
`Fig. 8 is a diagram of the subnet mask response acceptance process
`used in the sequence of Fig. 3.
`_
`
`30
`
`Page 1517 of 1928
`
`

`
`WO 94122087
`
`PCTIIJS94/00004
`
`Fig. 9 is a schematic diagram illustrating one network environment in
`
`which the present invention may be used.
`
`
`
`5
`
`A detailed description of preferred embodiments oi
`
`the present
`
`'
`
`invention is provided with respect to Figs. 1-9. Fig. 1 illustrates application
`
`of the present invention in a preferred embodiment. Figs. 2-8 Illustrate the -
`
`extended protocol for reverse address resolution used in a preferred
`
`embodiment oi the present invention. Fig. 9 provides an overview of a
`
`10
`
`network in which the present invention may be applied.
`
`Fig.
`
`1 provides a schematic diagram of an apparatus for connecting
`
`a first network 10 to a second network 11 using address resolution logic 25
`
`according to the present invention. The first network 10 includes a first LAN
`
`9 which includes a plurality of end systems and a sewer, and may be
`
`15
`
`interconnected to other LANs using lntennedlate systems (not shown) known
`
`in the art. Coupled to the IAN 9 is a boundary router 12. The boundary
`
`router 12 is an intermediate system in the network which provides network
`
`resources serving higher
`
`level protocol suites which,
`
`in one unique
`
`embodiment, constitute routing resources. As such. the boundary router 12
`
`20
`
`maintains end system directories 13 tor the local LAN 9 and global routing
`
`iniomtation 14 to serve the routing functions according to the higher level
`
`protocol suites. Thus, the end system directories will
`
`include DEC end
`
`system tables, iPX end system tables, IP and system tables, and others to
`
`serve other protocol suites that are operating in the network 10. The
`
`25
`
`boundary router 12 may also be coupled to other portions of the corporate
`
`data network as schematically illustrated at arrow 15.
`
`.
`
`The boundary router 12 inclunbs a local interface 16 which serves the
`
`local LAN 9 providing access to the network resources within the boundary
`
`router to and systems on LAN 9. The boundary router could also have
`
`30
`
`interfaces to other local LANs as well.
`
`in addition. the boundary router 12
`
`-7.
`
`Page 1518 of 1928
`
`

`
`W0 94/22087
`
`.
`
`PCT/US94l00004
`
`includes a remote routing interface 17. which provides an interface to the
`
`network resources for and systems in the remote network 11.
`
`In support of
`
`the remote lnteriace 17,
`
`the boundary router maintains and system
`
`directories 18 sewing the higher level protocol suites in the remote network
`
`5
`
`11.
`
`As illustrated schematically by the hatched symbol 19, the remote
`
`network 11 appears to the end systems in the local LAN 9 as it
`
`it were a -
`
`LAN connected locally to the boundary router 12. This appearance is
`
`maintained across a communication link 20, which may use telephone or
`
`10
`
`other dial up lines,
`
`leased lines, satellites. wireless systems. or other
`
`communication media configured as a point-to-point channel, to a routing
`
`adapter 21. which is coupled to the remote network 11. The remote network
`
`11 includes a remote LAN 22 to which a plurality oi end systems and servers
`
`may be connected as known in the art.
`
`in addition, the LAN 22 may be
`
`15
`
`coupled to other LANs In the remote network 11 through intermediate
`
`systems (not shown) as known in the art. The routing adapter 21 provides
`
`resources for extending the remote routing lnteriace 17 transparently to the
`
`remote network 11 across the communication link 20. From the perspective
`
`of the remote network 11.
`
`the routing adapter 21 provides the same
`
`20
`
`functionality as a router, while the routing adapter itseii operates independent
`
`of the higher level protocol suites.
`
`The system thus provides efficient communication between remote
`
`networks, and a corporate network, through a boundary router (e.g., net 11,
`
`routing adaptor 21, link 20, boundary router 12, net 9).
`
`25
`
`The routing adapter 21 includes hardware pertorrnlng physical network
`
`access protocols for connection to the network 22. Also. such hardware is
`
`assigned a physical network address, or MAC address, to uniquely identify
`
`the system for the lower level protocol suites. However,
`
`in order to
`
`participate in the higher level protocol suites managed by the boundary
`
`30
`
`router 12 or elsewhere in the central network 10. an identifier which serves
`
`.3-
`
`Page 1519 of 1928
`
`

`
`W0 94/3087
`
`PCP/U894/00004
`
`such higher level protocols is needed iorthe routing adapter 21. Thus. the
`
`boundary router 12 includes resolution logic 25 to provide such identifier in
`
`response to the Interface 17 across which a request for such identifier is
`
`received.
`
`5
`
`Figs. 2-8 illustrate the reverse address resolution protocol executed .
`
`by the resolution logic 25 in the boundary router of Fig.
`
`1 according to a
`
`preferred embodiment. in which the higher level protocol address comprises '
`
`an internet protocol IP address, such as used by SNMP (Simple Network
`
`Management Protocol) standard network management sewers.
`
`10
`
`Fig. 2 illustrates the prior art mechanism which is utilized in the
`
`preierred system on ports of the routing adaptor coupled to LAN media. The
`
`structure of Fig. 2 includes a flrst interface 100 corresponding to the RARP
`
`client port of
`
`the routing adapter 21. and a second interiace 101
`
`corresponding to an RARP sewer in the local network 11. The routing
`
`15
`
`adapter includes RARP request generation process 102, an RARP response
`
`acceptance process 103, and an ICMP subnet mask response acceptance
`
`process 104. The resolution logic 25 in the RARP server includes an RARP
`
`response generation process 105. and an ICMP subnet mask response
`generation process 106.
`I
`
`20
`
`Using the industry standard RARP request generation process, as
`
`specified In RFC 903 dated June, 1984. the RARP request generation
`
`process 102 in the client generates an RARP RFC 903 request 107. which
`
`includes the client's MAC address. This request 107 is received at the
`
`sewer interface 101 and the RARP response generation process 105
`
`25
`
`generates a response 103 by accessing a database or other logic which
`
`assigns an IP address based upon the MAC address In the request 107.
`
`The RARP response acceptance process 103 in the client receives the IP
`
`address from the response 103, stores it as appropriate in the client, and
`
`generates an ICMP subnet mask request 109. The sewer 101 receives the
`
`30
`
`request 109 and the ICMP subnet mask response generation process 106
`
`.9-
`
`Page 1520 of 1928
`
`

`
`WO94lZ7.087
`
`PCI‘lUS94I00004
`
`supplies a subnet mask response 110 to the client 100. The ICMP subnet
`
`mask response acceptance process 104 then configures the client with the
`
`IP address and the subnet mask. and assigns the address of the sewer 101
`
`as the default gateway address.
`
`Fig. 3 illustrates this process as extended according to the present
`
`invention for reverse address resolution independent of the physical network
`
`address 01 the client.
`
`in this aspect, the interface 120 corresponds to the
`
`routing adapter 21 operating as an HARP client.
`
`The Interface 121
`
`corresponds to the interface 17 of the boundary router 12 operating as an
`
`HARP server. The RAHP sewer 121 need not be located in the boundary
`
`router 12. Rather, it can be located in any in system or intermediate system
`
`coupled to the networks served by the boundary router 12.
`
`in the extended sequence. as illustrated in Fig. 3, the routing adapter
`
`also includes an RAHP request generation process 122 (Hg. 4). an HAHP
`
`response acceptance process 123 (Fig. 6). and an ICMP subnet mask
`
`response acceptance process 124 (Fig. 8).
`
`The HARP sewer in the
`
`boundary router Includes an HARP response generation process 125 (Fig.
`
`5) and an ICMP subnet mask response generation process 126 (Fig. 7).
`
`As in the prior art system, the HARP request generation process 122
`
`in the client 120 generates an FIAHP RFC 903 request 127. Also. the
`
`process 122 generates an extended request 128, which indicates to the
`
`receiver that the address resolution must be conducted independent of the
`
`MAC address.
`
`The HARP response generation process 125 receives both the RFC
`
`903 request 127 and the MAC independent request 123.
`
`It the response can
`
`be served with the RFC 903 request. then the response generation process
`
`125 proceeds that way. However. it the MAC address 01 the client 120 has
`
`not been previously communicated to the response generation process 125,
`
`then the MAC independent request 128 must be utilized.
`
`1D
`
`15
`
`20
`
`25
`
`-10-
`
`Page 1521 of 1928
`
`

`
`WO 94122087
`
`PCTIUSMI00004
`
`The RARP response generation process 125 is coupled to a media
`
`address/IP address database 135 and to a channel number/IF address
`
`database 136. These databases are configured by the network managerto
`
`assign IP addresses throughout the network. The channel number/IF
`
`address database is relied upon when the media address (MAC address) of
`
`A
`
`the client 120 is not available at the time the IP address is configured.
`
`'
`
`in either event. the RARP response generation process 125 generates
`
`an RARP RFC 903 response 129 which includes an IP address. The RARP
`response acceptance proces-3.123 in the client 120 accepts the IP address
`and generates an ICMP subnet mask request 130.
`in the server 121, the
`
`ICMP subnet mask response generation process 126 supplies an ICMP
`
`subnet mask response 131. The client 120 receives that response and
`
`executes the ICMP subnet mask acceptance process 124.
`
`Fig. 4 shows the RARP request generation process corresponding to
`
`block 122 of Fig. 3. This routine loops through all of the interfaces or ports
`
`on the remote node, also called a leaf node. to detennlne its IP address.
`
`The algorithm starts with an interface up message 400. After an interface
`
`up message. the algorithm tests whether the IP address is available in local
`
`storage (step 401).
`
`if the address is availab

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket