`
`
`
`
`
`
`
`
`
`
`
`r.llllllllllllllllllllllllllllllllllllllllllll|I...l.Ill......IlIll....l....lIIlI...ll...l_Il._
`
`Sim:
`
`_
`
`
`
`
`
`
`
`[E1 0]
`
`
`
`
`
`
`
`r:s:III|IIallllnnlllnIluunnlllllisststrlllinansinIIIIlinlgiluiiiulllillllh
`
`
` :1$&IxZlbflmHmHlHmm_mac..a.__H_HHn%+mmHH8.H£8”38H
`
`
`
`m.m.m_uLuuaHHwn.aHR.Toua=5....nEuo__a:_H...
`mArK¢
`
`
`
`
`
`__ma.xm.uu_..Hum_—m=:n_m.._UUd.H..:w.__vn_uaa..:T.H_m.Hu.m.mHnHu=m
`
`-----------------nnmafl-------------------------.mafl---mmmnnnnnnn»---wafl---H
`
`._:..§.=Enm._ET._u_
`
`HME:
`
`H
`
`6¥ggm
`
`O26
`
`O
`
`23:8:
`
`NNQiesm8_:oEm_mOIHmm?H059m.mmn_
`
`
`
`
`
`(I7)
`
`1%Efi1l16—62020
`
`H2112]
`
`[12]
`
`_1T_
`
`7 F 1./7dj'—-JV
`
`ap-nane=adm .01 .a.:ldr
`
`E7I~’1x;Ulfi$E
`I
`III
`I
`II
`II
`IIA
`
`\
`
`\
`
`
`
`
`1202b
`
`1203b
`1204b
`
`
`3%?’ F U1 addr=
`fiflfi’ F L/7.
`adclr=13.8-6
`
`?§U7f=J‘3§)JflE
`tine-
`H*Jfi§btIHl'x§
`time=Be99
`
`1 ~ Ffifi
`
`nmne~bdl.3x
`
`name-
`
`
`
`[12114]
`
`((314)
`
`
`
`addr
`
`dnr
`
`nail
`
`fzle
`
`add:
`
`dlr
`
`nail
`
`1406
`
`1407
`
`""""""" ‘i5§<7'J;I"sH{""'J
`
`‘“""""'""'33}3?'9‘B"f66I'
`
`Page 1502 of 1928
`
`
`
`(18)
`
`[E13]
`
`(E13)
`
`2-2
`
`¥4u7bU#—H
`
`ap—nane=adm.D1.dir
`
`¥$5§§16-*-6 2 0 2 0
`
`
`_
`
`1cn2-2
`
`¥4uabuv-A §
`ap»nane=bdn.ax.dir
`
`
`
`
`
`F4U0b9fifi1
`
`
`
`
`
`
`
`name-&dm.0E.mail
`addr=
`
`
`:::/ F Llfiifl
`
`flfift $3IE7l¢L/31
`
`A P7’f:bUX
`
`139b
`
`312/ h!)fiE¥$
`
`nane=tdm.sx.uail
`
`Efi %E7Fv2
`
`addr=13.B.6
`
`P\F’7’ F Lvil
`
`ap-addr=5
`
`Wé
`
`alias=
`
`1305b
`
`1307b
`
`1308b
`
`Page1503of1928
`
`'~-
`
`I
`
`¥+v7+Uflfi
`
`I
`
`I I
`
`I
`
`IIII
`
`.
`
`
`
`Electronic Acknowledgement Receipt
`
`66261 07
`
`Application Number:
`
`90010416
`
`International
`
`Number:
`
`Title of Invention:
`
`Point-to—Point Internet Protocol
`
`First Named Inventor/Applicant Name:
`
`6108704
`
`Filer:
`
`Michael R Casey
`
`Attorney Docket Number:
`
`2655-0188
`
`Payment information:
`
`Submitted with Payment
`
`no
`
`File Listing:
`
`Document
`
`_
`
`.
`
`File Size(Bytes)/
`
`Multi
`
`
` Pages Message Digest Pan /-zip
`
`
`NPL Documents
`
`F0057_lSR_US9615S04.pdf
`
`e27e(cddc4J43I’tJ0e-16c 54746 I the 3200980
`1..-e73
`
`no
`
`10
`
`Warnings:
`
`'"'°'"'P*é 1504 of 1928
`
`
`
`
`
`NPL Documents
`
`FO058_gitman_economic_ana|
`ysis.pdf
`
`eesll ):reL|5ddLr&271d48816Se869752rJ:.a
`4Jd84.|lS
`
`1874599
`
` F0059_h ue|amo_end_user_pre
`
`712273
`
`mises.pdf
`
`6baldlc1J)S(dSt I a9069bdc687 3LVé'28aae7 '
`dcfib
`
`NPL Documents
`
`
`
`102320
`
`)1)lLk_2Cdl}.70e7L861Sl/sa4)L\79c6e0eB
`MOI
`
`NPL Documents
`
`F0060_RFC978.pdf
`
`.1 IAJ7
`
`NPL Documents
`
`F0061_RFC10SS.pdf
`
`4)LH)eae|JDl8)97a1J8bb1Sh'274SSeee7761 -
`
`202556
`
`223076 F006 2_ia me s_m i||s_da La_voice
`
`
`99ef2 34a§bI7c 3074223 3cSLlb94b.'Ja9f6 .
`87:
`
`NPL Documents
`
`Wa rnings:
`
`Info rmation:
`
`
`
`_
`_
`FO063_|ames_forgIe_speech.
`
`527034
`
`da96c67c7acc4ba)E69lL)rXSlb97}.7f975 '
`0CbJ
`
`NPL Documents
`
`
`
`F0064_iames_forgie_voice_co
`nferencing.pdf
`
`am I74sris4u6;29ate786riah6é.w3asla4b
`6aJz
`
`NPL Documents
`
`
`
`NPL Documents
`
`F006S_Janes_1979_80.pdf
`
`9;».-d6ddla:i82lMd8ec6a9 l94a I Sc938e7b
`bI'e7l
`
`7|)9S04
`
`NPL Documents
`
`F0066_Janes_198S.pdf
`
`e44ébe3$Sd4S8Sd9S!Seb71JL\228lZbaiML\
`
`421297
`
`Warnings:
`
`Infor|1-39%‘?
`
`Of
`
`
`
`617418
`
`
`
`NPL Documents
`
`F0067_Janes_1989.pdf
`
`b lS7dl(49L171JabedaS 7d8c6L181714d66E6
`8297
`
`Wa rnings:
`
`Info rmation:
`
`
`
`2431238
`
`123925.-déd 1246 1 24:16 39 )dLD84cb777)L1d
`Scslec
`
`NPL Documents
`
`F0068_Janes_1990_91.pdf
`
`
`
`628193
`
`I 1 dlafifiaiaf )aL12e9e1b3a£a I(8SL167aa - .
`M43
`
`NPL Documents
`
`F0069_Janes_1992_93.pdf
`
`
`
`FO070_Jim_stevens_Much_mo
`repdf
`
`SL1b7e11‘91ccbIOSe4c1JSICI99e67l68Sla77
`4991)
`
`262071
`
`NPL Documents
`
`
`
`NPL Documents
`
`F0071_John_|:>e||arny_DigiLa|_
`e|ephony.pdf
`
`4:14118e2ddL1b)9ce876e901d342c49)L1)57
`12356!
`
`428289
`
` Foreign Reference
`
`F0072_JP-63431637.pdf
`
`(.161 191282 7a911l907r$aeBL1S 749)1r3éb-c
`eficee
`
`183914
`
`
`
`2765194
`
`114.21 (019741 c1)cBd1:.S77 3S1ld)be6Md
`83841
`
`Foreign Reference
`
`F0073_J P_6—62020.pdf
`
`
`
`F0074_JP200816382S_Office_ '
`ction_Trans|ation.pdf
`
`a:1ber.99)$4ele8bBl@ M9 1 lacl 3&d 36:6
`:00“)
`
`NPL Documents
`
`AS4133
`
`NPL Documents
`
`F007S_J P-59414140.pdf
`
`rJ:.S)999aaa21)LMSS67l9)_§SEa@7aSS11
`
`1272933
`
`Warnings:
`
`Infor|1-39%‘?
`
`Of
`
`
`
`
`
`F0076_k_sohra by_|SDN_Prirna
`y.pdf
`
`507873
`551 I I 31 Iodbéa Mdécblul 3dL!e I M62397)
`Ibdfl
`
`NPL Documents
`
`
`
`NPL Documents
`
`F0077_ken_sherrnan_daLa_co
`.
`.
`rnrnunIcatIons.pdf
`
`752769
`
`a1JB.MSa1 96lJ8L)8Sc1J77e9ce8d9e&S8B 3 - :-
`|b75I
`
`
`
`F0078_kevin_iefay_kerne|_sup
`po rt.pdf
`
`7cdSccAar_2 74613 3 7le3c4r3 703964; 38216
`abbc
`
`NPL Documents
`
`
`
`F0079_kyuta_saito_voice_pack
`et_c om m.pdf
`
`d249d6607bS)4 l2S))bbb1d7Sc9Sd3d19I
`W8485
`
`NPL Documents
`
`NPL Documents
`
`F0080_|awrence_roberts_evo|u
`tion_of_packet.pdf
`
`S 12);: l07dc316la74al2daI9ce1b |b946l
`|0e2|
`
`543758
`
`
`
`NPL Documents
`
`F0O81_|in_hwa-
`chun_dynamic_|oad_ba|ancing
`
`337731
`
`7Sb8l986L)9e3)Sl:_913a2lc4LmS9L644Jdd3
`3bd7
`
`
`
`NPL Documents
`
`F0O82_rn_e_u|ug_Statistica|_M
`u|tip|exing.pdf
`
`7877617c3aLv981samsb7st.:I87r12oaB2 .
`M313
`
`378989
`
` F0083_m_gopa|akrishnan_inte
`
`NPL Documents
`
`grating_voice_and_data.pdf
`
`ae)aId3bLHI/25 7ll409cd4b6e9a I258 384
`4J0<J
`
`748795
`
`(93.18
`
`F0084_m_i_ross_a|ternatives_f
`or_integrating.pdf
`
`77aBd7 3e )decc48d7S8S la92ccfc Meee I0
`
`NPL Documents
`
`Warnings:
`
`Infor|1-39%‘?
`
`Of
`
`
`
`790492
`
`NPL Documents
`
`F0O85_natesa_ianakiraman_ov
`erview_of_recent.pdf
`
`d4 IAc99aS1bdee8c7edS lS$6lb7)L1dS Mb
`
`1075971
`
` F0086_p_b org nis-d es bordes.
`
`
`611bdCe1747e8l778r_4d19M93)S9S1a1JM
`844:0
`
`NPL Documents
`
`
`
`NPL Dowmen ts
`
`FOO87_p_\-en kat_rangan_so
`are_a rc hitecturepdf
`
`07772023 ):v66S6b76l7)7a4|:v66l&S1bdl
`964 3b|
`
` NPL Documents
`
`F0088_francis94inet.pdf
`
`2166322
`
`Wa rnings:
`
`Info rmation:
`
`366
`
`H
`
`1454997 F0089_|nternet_Na vigator_wit
`
`h_SOR.pdf
`
`20l996L8IacF7d6))I6ff7d$eebb§éDb6
`964(
`
`NPL Documents
`
`
`
`FO090_E>ctending_the_|P_|nter
`net_Through_Address_Reuse.
`
`NPL Documents
`
`C(£(\
`
`F0091_phi|ip_h_regan_is_it_th
`e_PBX.pdf
`
`8 1874 I 3bd1 (687 I 641.8690 3828194222 36% -
`
`NPL Documents
`
`F009 2_po||e_t_ze| |weger_A n_ NPL Documents
`
`overview_of_the_etherphone.
`
`efc|a6)adSu.a7L8d I IK.lcd9d7r_2)ble879e1:d
`IJ87
`
`Wa rnings:
`
`Info rmation:
`
`0( ll
`
`FO093_r_braudes_Requirernen
`s_for_Mu|ticast.pdf
`
`7Sa9dfd49)a76d6718e1E.18d7efd4S8Ha7
`
`NPL Documents
`
`Warnings:
`
`Infor|1-39%‘?
`
`Of
`
`
`
`38
`
`NPL Documents
`
`_
`FOO94_r_w_me|:>a_Expenment
`Jmwidebandlpdf
`
`233947
`
`cl )7bd24cN8n:.)2ddlacl IcIe9)_§blSaSfi
`30IL9d
`
`no
`
`Warnings:
`
`Information:
`
`39
`
`NPL Documents
`
`F0095
`
`N
`‘r‘p.‘mc émarajome‘
`consIderatIons.pdf
`
`292918
`SaLI8LI7D3Sl1Ja)a9dSbS67d@77460ldda
`9|4Q
`
`no
`
`Warnings:
`
`Information:
`
`7
`
`5
`
`40
`
`NPL Documents
`
`F0096
`
`v
`'
`k t
`I
`d
`‘ran Leo Lpac E‘ 0'
`e_when.pdf
`
`662089
`)ellalI8d)93I:HJI3é8d9dbblaa297IS60l
`A7307
`
`no
`
`10
`
`Warnings:
`
`Information:
`
`41
`
`NPL Documents
`
`t‘
`d‘
`fl‘
`tt
`F0097
`‘Sm ‘ mn‘c°°r ma m
`g_helerogeneous.pdf
`
`1104908
`I6Lk963le63)L)dl)47cl97276dl@c)SSl29
`7bfl)3
`
`no
`
`16
`
`Warnings:
`
`Information:
`
`42
`
`NPL Documents
`
`t
`’
`’
`’ h tt
`h'
`F0098
`‘S."lnm|’ 5:‘ °.n‘m egra
`ted_dIgIta|_swItchIng.pdf
`
`656025
`S70lee2SeIld8L6l6l|:49a&eII8ei6ll3l4 .
`7494
`
`no
`
`7
`
`Warnings:
`
`Information:
`
`Total Files Size (in bytes)
`
`30535939
`
`This Acknowledgement Receipt evidences receipt on the noted date by the USPTO ofthe indicated documents,
`characterized by the applicant, and including page counts, where applicable. It serves as evidence of receipt similar to a
`Post Ca rd, as described in MPEP 503.
`
`New Applications Under 35 U.S.C. 111
`lfa new application is being filed and the application includes the necessary components for a filing date (see 37 CFR
`1.53(b)-(d) and MPEP 506), a Filing Receipt (37 CFR 1.54) will be issued in due course and the date shown on this
`Acknowledgement Receipt will establish the filing date of the application.
`
`National Stage of an International Application under 35 U.S.C. 371
`lfa timely submission to enter the national stage ofan international application is compliant with the conditions of35
`U.S.C. 371 and other applicable requirements a Form PCT/DO/E0/903 indicating acceptance ofthe application as a
`national stage submission under 35 U.S.C. 371 will be issued in addition to the Filing Receipt, in due course.
`
`New International Application Filed with the USPTO as a Receiving Office
`lfa new international application is being filed and the international application includes the necessary components for
`an international filing date(see PCT Article 11 and MPEP 1 B10), a Notification ofthe International Application Number
`and ofthe International Filing Date(Form PCT/R0/105)wi|| be issued in due course, subject to prescriptions concerning
`national security, and the date shown on this Acknowledgement Receipt will establish the international filing date of
`the application.
`
`Page 1509 of 1928
`
`
`
`wow» Er_§ oaaamzmou
`,
`PCT
`INTERNATIONAL APPLICATION PUBLISHED UNDBI '1'HE-PA'I'EN"l' COOPEIATION TREATY (PC?)
`
`
`
`(51) mun-don-I Pm: chsstfiuuon 5 «
`cosy 13
`'
`/00
`
`A1
`
`an [ma-national Puhflcndon um."
`wo 94x22os7
`(43) llurnntbul Publication pm:
`29 sepmha 1994 (29.o99¢)
`
`.‘
`
`(21) hm-nnflonnl Appfludon Nnmba-:
`
`PCl'l‘IJS94l00(X)4
`
`(22) Inunntional Filing Dan:
`
`3 January 1994 (0101.94)
`
`(31) Ddgnatu! Shins: AU. CA. JP. KR. Emopcxn pmzm (AT,
`BE.Cl-l.DB,DK.E§.FR.GB,GR.£B..l'l'.LU.MC.NI..
`P1‘, SE).
`
`(30) Pdorily Dam
`oaIo33,914
`
`19 March 1993 09.0393)
`
`US
`
`-
`Puhlishzd
`With ituenmdavnol march report.
`
`no Appflcum acou conromnou [us/us]: 5-too Bayfmnt
`mm. 9.0. Box 58145, Santa Chm. ca 950523145 (Us).
`
`(72) Inventors: N1LA.K.AN'I‘AN. Chanda-a.u-Jdm-an; JT74 Wooaibuk
`Com. San I054; CA9Sll7 (US). LDI. Ly‘, 34852 Win:h(:-
`m Plnca. Fremont. CA 94555 (US). ARUNKUMML N»
`garnj; 3041 Cedar Ridge Court, San Jose. CA 95148 (US).
`SEAMAN. Nfldmll. Iohn; 350 Elan Village Lane, 0206,
`San 106:. CA 95134 (US).
`
`(70 Agent: HAYNES. Mark. A.; I-hynufi. Davis. Suite |70.2l80
`SaudH.i]JRoad.M=n]oPsrk,CA94(n5-6935 (US).
`
`(54) T|'I.|e: SYSTEM FOR REVERSE ADDRfl RESOLUTION FOR REMOTE NEl'WOR.K DEVICE
`
`.5
`
`(57) Abstract
`
`Arcvaumitmurusoluionproanunlfnnuinaaunnmaiandnu netwa-kwhinhanowuesoiznionlogictopmvtdcahiyxczlevcl
`pm¢omlh1Ia'ma1inn(mcbuanIPadctresI)tnn:nu!l:I:ofnmqunu(l27){urIuchin.fIx1:mlion(l22).i1:tdwcnd:n.lofdbphyénlnetwak
`ad:tn:uofsuchaoumu.Tbep:umaa1i:usedhupoanmhvhguplmnfiqdpa-mmhnomofnnbpauwwumbynpdu-w
`pnzimchnunslmnremolnuctwutdevion.Rnumndd:-n:rudmbnprommlktuponsive(129)bnruolu§nnreqnutfiommcrmn¢
`ucrwutkv'imuom¢cpdm4&pMchmmlmswpbIkhk&bvdmmmlhmmfimbuduwomewnhmy:wfi¢¢o
`msohnianrnqmstismcdved (l?5),m1h:rlhnnd1ophysbalnctwu'knM|uso{thn1'u;uc:tin3dcvi=.
`'l'hIn.arw1oIndcv'nemuy|>c
`coupledtoancxwu-k,andcmnmudmnomrdmmgawtfimmomnpdm-Iommunmnni=fionHnhba‘phgmdphy'mod¢.
`'I1:opamnaounec|i.ngwcdevimmfielummnuwakdoummdbddumimmnphyfimlnuwatwmmoffiodevizuunfigwc
`zhodzvbcwiduhighcrlcvdadfiruspomcnl
`
`Page 1510 of 1928
`
`
`
`0W0M.0.WP.EmmF
`
`m.
`
`OodesuedmH:ndfySmupuubfl:=PCl'mbefinmpagcsofpmyhknpubfid:hghumfimd
`IppIica:iousu.ndcr:boPCl‘.
`
`nmnmuwunnuammammaamuannm
`
`
`
`MmmmmmmmmmwwmmmmmWmmwmmm
`
`MW
`
`WWExammmMax
`
`uummmmnnnmn
`uuuwummmmm
`
`mmnnmmnnmmmuanmmmunmW
`
`Mmwmaawwiam
`
`Page1511of1928
`
`
`
`W0 940.2081
`
`PCTIUS94I00O04
`
`SYSTEM FOR REVERSE ADDRESS RESOLUTION
`
`FOR REMOTE NETWORK DEVICE
`
`
`
`The present invention relates to start up protocols for devices in
`
`communication networks; and more particularly to systems which allow a
`
`machine without a configured higher level protocol address to obtain such '
`
`5
`
`address without a unique machine Identifier.
`
`QESCRIEHQN QE BELAIEQ am
`
`A widely accepted series of intematlonei standards describing network
`
`architectures is known as the OSI
`
`reference model.
`
`See, generally,
`
`10
`
`Tannenbaum, , 2nd Ed., 1988, Prentice-Hall. According
`
`to this model, network communications are divided into a plurality of
`
`protocols within layers of the model. Local Area Networks (LANs) operate
`
`using medium access protocols within the lower layers. layers 1 and 2, of the
`
`OSI model, such as the carrier sense multiple access with collision detection
`
`15
`
`CSMA/CD. IEEE Standard 802.3, also known as ETHERNET, and the token
`
`ring access ring method of IEEE Standard 802.5. These two lower layers
`
`are typically broken down into the physical layer and the data link layer. with
`
`the data link layer being further broken down into a media access control
`
`(MAC) layer, and a logical link layer.
`
`20
`
`Systems, such as personal computers, workstations, and mainframe
`
`computers, attached to the LANs each have a distinct lower level protocol
`
`Identifier known as the physical network address or MAC address. LAN
`frames forwarded to a destination system on the network under these lower
`
`;
`
`level protocols contain the destination system MAC address, or other
`
`25
`
`physical network address, as a destination. LAN frames lorwarded irom a
`
`source system on the network contah the source system MAC address, or
`
`other physical network address, as
`
`a
`
`source address.
`
`Systems
`
`-1-
`
`Page 1512 of 1928
`
`
`
`WO94122087
`
`PCl'lUS94I00004
`
`communicate by encapsulating additional protocols (OSI layers 3-7) within
`
`the lower layer LAN frames. These higher level protocols are grouped into
`
`suites such as the TCP/iP protocol suite and the XNS protocol suite. Many
`
`LANs contain groups of end systems that use different higher level protocol
`
`suites. These higher level protocol suites also assign unique higher level
`
`protocol
`
`identifiers to systems which transmit or receive frames in the
`
`network.
`
`For instance. an internet protocol iP address is assigned to each
`
`system operating within an lntemet protocol network. The lntemet protocol
`
`10
`
`address includes a network address portion and a host address portion. The
`
`network address portion identifies a network within which the system resides,
`
`and the host address portion uniquely identifies the system in that network.
`
`Processors routing packets in an lntemet protocol network rely on the
`
`network address portion of the IP address in a frame to find -the local area
`
`15
`
`network of the destination machine. Once the local area network of the
`
`destination is located, the frame Is forwarded to that network where the host
`
`address portion is relied upon to assign a MAC address for the destination
`
`machine to the packet. Thus, higher level protocol address places the
`
`device In a particular network or subnetwork, so that the higher level protocol
`
`can effectively manage the routing of packets among the networks. without
`
`maintaining a table of the unique physical access layer identifiers for all of
`
`the terminals in the network.
`
`in order to communicate in such a network, the machine must first
`
`obtain its higher level protocol address. This address is typically assigned
`
`by a central authority, such as the lntemet Activities Board, or by a network
`
`manager. Normally, a particular machine learns its
`
`IP address by a
`
`configure operation, in which a technblan uses a local tennlnai to configure
`
`the machine.
`
`in a centrally managed network, this could be a cumbersome
`
`task, involving travel of skilled personnel away from the central management
`
`location. However, a reverse address resolution protocol RARP has been
`
`20
`
`25
`
`30
`
`-2-
`
`Page 1513 of 1928
`
`
`
`W0 94/H087
`
`PCT/‘U594/00004
`
`developed tor networks such as TCPIIP or SNMP protocols. The HARP
`
`allows a machine without a configured IP address to obtain an IP address
`
`from a remote server. The machine broadcasts a request and waits until an
`
`FlAFlP sewer responds.
`
`In the request, the requesting machine must provide
`
`5
`
`its physical network address (MAC address) to uniquely identify itseii.
`
`allowing the sewer to map it into an IP address.
`
`This RARP protocol works fine, so long as the central manegernent
`
`site is aware of the physical network address of the devices being added to
`
`the network.
`
`in order to find out the physical network address, all of the
`
`'
`
`-
`
`10
`
`system being added to the network must be passed through the central
`
`management site so that the address can be read irom these machines, or
`
`a local technician must read the physical network address from the machine
`
`and telephone the central site. This process makes connecting a new device
`
`to a network difficult. Further, this process of physically reading the physical
`
`15
`
`network address from the box is prone to human errors. Such addresses
`
`are typically very long (MAC addresses are 48 bits long), and can be
`
`misread or typed in erroneously.
`
`It
`
`is desirable to have so-called ‘plug and play‘ network devices.
`
`Such devices can be plugged in and turned on by unsldlled personnel.
`
`20
`
`However, the need to find out the physical network address of the box
`
`detracts from this ability.
`
`Accordingly, it is desirable to provide a technique tor resolving higher
`
`level protocol addresses, without reliance on the lower level protocol
`
`addresses.
`
`25
`
`
`
`1
`
`The present invention provides a reverse address resolution protocol
`
`tor use in a communication network which allows resolution logic to provide
`
`a higher level protocol address, or other lntonnation, to a source oi a request
`
`30
`
`for such address, independent of the physical network address of such
`
`-3-
`
`Page 1514 of 1928
`
`
`
`W0 94I7.2087
`
`PCl'lUS94Itl0004
`
`source. The protocol according to the present invention is used in a
`
`processor having a plurality of ports, at least one oi such ports connected by
`
`a point-to-point channel to a remote network device. The reverse address
`
`resolution protocol is responsive to a resolution request from the remote
`
`network device across the point-to-point channel to supply the higher level
`
`‘
`
`protocol address based upon the port through which the resolution request
`
`is received, rather than the physical network address of the requesting
`
`device. Thus. a remote device may be coupled to a network, and connected
`
`to a central management site across a point-to-point communication link in
`
`a ‘plug and play‘ mode. The person connecting the device to the remote
`
`network does not need to determine the physical network address of the
`
`device or configure the device with a higher level address protocol. All this
`
`can be handled automatically.
`
`Thus, the present invention can be characterized as an apparatus for
`
`resolving higher level protocol addresses in response to resolution requests
`
`irom a source ol resolution requests in a communication network. The
`
`apparatus comprises a central processor having a plurality ot ports for
`
`connection to the communication network, and resolution logic which is
`
`coupled to the communication network and in communication with the central
`
`processor. The resolution logic provides a higher level protocol identifier in
`
`response to a particular port in the plurality of ports through which the
`
`resolution request is received by the central processor, independent of the
`
`lower level protocol identifier ot the source of the resolution request. The
`resolution logic may be a routine executed by the central processor. or a
`
`routine executed by a network management processor coupled to the
`
`communication network, and in communication with the central processor.
`
`The resolution logic. according to one aspect, includes a resolution
`
`table that is configurable independent of the lower level protocol identifiers,
`
`which assigns higher level protocol identifiers to particular ports of the central
`
`processor through which the resolution requests may be received.
`
`-4-
`
`10
`
`15
`
`20
`
`25
`
`30
`
`Page 1515 of 1928
`
`
`
`WO 94122037
`
`PCT/US94I'00004
`
`The higher level protocol identifier may comprise an intemet protocol
`
`IP address, which includes a network address for the source of the resolution
`
`request. and a host address for the source of the resolution request.
`
`Further, the higher level protocol may be utilized by a network management
`
`5
`
`system, which communicates network-wide, while the lower level protocol
`
`'
`
`comprises a medium access protocol.
`
`The resolution logic, according to the present invention. relies on the -
`
`source of
`
`the resolution request being coupled across a point-to-point
`
`communication channel to the particular port of the processor receiving the
`
`10
`
`request.
`
`in this way. the port serves as a virtual identifier tor the source of
`
`the request.
`
`Thus, the present invention can also be characterized as an apparatus
`
`for connecting a first network and a second network. This apparatus
`
`includes a communication link, a first processor, and a second processor.
`
`15
`
`The first processor has a first interface coupled to the first network and a
`
`second interface coupled to the communication link. The second processor
`
`has a lower level protocol identifier and is coupled to the second network
`
`and to the communication link. Resolution logic is coupled to the first
`
`network to provide a higher level protocol identifier to the second processor
`
`20
`
`in response to a resolution request through the second interface of the first
`
`processor, independent of the lower le_ve| ‘protocol identifier of the second
`
`processor.
`
`in this manner, the first processor can configure the higher level
`
`protocol addresses for devices in the system, independent of the lower level
`
`protocol addresses.
`
`25
`
`According to another aspect of the invention. the first processor
`
`includes resources to provide network services to frames of data in the first
`
`.
`
`and second networks through the first and second interfaces, and the second
`
`processor includes resources to extend the second interface of the first
`
`processor transparently to the second network.
`
`Page 1516 of 1928
`
`
`
`wo' sumosv
`
`PC'I‘lUS94l000O4
`
`The resolution logic may comprise a routine executed by the lirst
`
`processor, or a routine executed by a network management processor
`
`located in the first network.
`
`Accordingly. a technique-which greatly improves the ‘plug and play‘
`
`5
`
`capability of a network-device has been provided. Remote networks may be ‘
`
`set up using this system, without requiring error prone and cumbersome
`
`techniques to acquire the physical network address oi each device being
`
`added to the network.
`
`Other aspects and advantages of the present invention can be seen
`
`10
`
`upon review of the figures, the detailed description, and the claims which
`
`follow.
`
`
`
`Fig.
`
`1
`
`is a schematic diagram of a system including the reverse
`
`15
`
`address resolution logic according to the present invention.
`
`Fig. 2 illustrates a prior art packet exchange sequence for reverse
`
`address resolution over LAN media.
`
`Fig. 3 illustrates a packet exchange sequence over a WAN medium
`
`as extended according to the present invention.
`
`20
`
`Fig. 4 illustrates the resolution request generation process used in the
`
`sequence of Fig. 3.
`
`Fig. 5 illustrates the resolution request response generation process
`
`used in the sequence of Fig. 3.
`
`Fig. 6 illustrates the resolution request response acceptance process
`
`25
`
`used in the sequence of Fig. 3, which results in a request for a subnet mask
`
`in IP networks.
`
`Fig. 7 is a diagram of the subnet mask response generation process
`
`used in the sequence of Fig. 3.
`
`Fig. 8 is a diagram of the subnet mask response acceptance process
`used in the sequence of Fig. 3.
`_
`
`30
`
`Page 1517 of 1928
`
`
`
`WO 94122087
`
`PCTIIJS94/00004
`
`Fig. 9 is a schematic diagram illustrating one network environment in
`
`which the present invention may be used.
`
`
`
`5
`
`A detailed description of preferred embodiments oi
`
`the present
`
`'
`
`invention is provided with respect to Figs. 1-9. Fig. 1 illustrates application
`
`of the present invention in a preferred embodiment. Figs. 2-8 Illustrate the -
`
`extended protocol for reverse address resolution used in a preferred
`
`embodiment oi the present invention. Fig. 9 provides an overview of a
`
`10
`
`network in which the present invention may be applied.
`
`Fig.
`
`1 provides a schematic diagram of an apparatus for connecting
`
`a first network 10 to a second network 11 using address resolution logic 25
`
`according to the present invention. The first network 10 includes a first LAN
`
`9 which includes a plurality of end systems and a sewer, and may be
`
`15
`
`interconnected to other LANs using lntennedlate systems (not shown) known
`
`in the art. Coupled to the IAN 9 is a boundary router 12. The boundary
`
`router 12 is an intermediate system in the network which provides network
`
`resources serving higher
`
`level protocol suites which,
`
`in one unique
`
`embodiment, constitute routing resources. As such. the boundary router 12
`
`20
`
`maintains end system directories 13 tor the local LAN 9 and global routing
`
`iniomtation 14 to serve the routing functions according to the higher level
`
`protocol suites. Thus, the end system directories will
`
`include DEC end
`
`system tables, iPX end system tables, IP and system tables, and others to
`
`serve other protocol suites that are operating in the network 10. The
`
`25
`
`boundary router 12 may also be coupled to other portions of the corporate
`
`data network as schematically illustrated at arrow 15.
`
`.
`
`The boundary router 12 inclunbs a local interface 16 which serves the
`
`local LAN 9 providing access to the network resources within the boundary
`
`router to and systems on LAN 9. The boundary router could also have
`
`30
`
`interfaces to other local LANs as well.
`
`in addition. the boundary router 12
`
`-7.
`
`Page 1518 of 1928
`
`
`
`W0 94/22087
`
`.
`
`PCT/US94l00004
`
`includes a remote routing interface 17. which provides an interface to the
`
`network resources for and systems in the remote network 11.
`
`In support of
`
`the remote lnteriace 17,
`
`the boundary router maintains and system
`
`directories 18 sewing the higher level protocol suites in the remote network
`
`5
`
`11.
`
`As illustrated schematically by the hatched symbol 19, the remote
`
`network 11 appears to the end systems in the local LAN 9 as it
`
`it were a -
`
`LAN connected locally to the boundary router 12. This appearance is
`
`maintained across a communication link 20, which may use telephone or
`
`10
`
`other dial up lines,
`
`leased lines, satellites. wireless systems. or other
`
`communication media configured as a point-to-point channel, to a routing
`
`adapter 21. which is coupled to the remote network 11. The remote network
`
`11 includes a remote LAN 22 to which a plurality oi end systems and servers
`
`may be connected as known in the art.
`
`in addition, the LAN 22 may be
`
`15
`
`coupled to other LANs In the remote network 11 through intermediate
`
`systems (not shown) as known in the art. The routing adapter 21 provides
`
`resources for extending the remote routing lnteriace 17 transparently to the
`
`remote network 11 across the communication link 20. From the perspective
`
`of the remote network 11.
`
`the routing adapter 21 provides the same
`
`20
`
`functionality as a router, while the routing adapter itseii operates independent
`
`of the higher level protocol suites.
`
`The system thus provides efficient communication between remote
`
`networks, and a corporate network, through a boundary router (e.g., net 11,
`
`routing adaptor 21, link 20, boundary router 12, net 9).
`
`25
`
`The routing adapter 21 includes hardware pertorrnlng physical network
`
`access protocols for connection to the network 22. Also. such hardware is
`
`assigned a physical network address, or MAC address, to uniquely identify
`
`the system for the lower level protocol suites. However,
`
`in order to
`
`participate in the higher level protocol suites managed by the boundary
`
`30
`
`router 12 or elsewhere in the central network 10. an identifier which serves
`
`.3-
`
`Page 1519 of 1928
`
`
`
`W0 94/3087
`
`PCP/U894/00004
`
`such higher level protocols is needed iorthe routing adapter 21. Thus. the
`
`boundary router 12 includes resolution logic 25 to provide such identifier in
`
`response to the Interface 17 across which a request for such identifier is
`
`received.
`
`5
`
`Figs. 2-8 illustrate the reverse address resolution protocol executed .
`
`by the resolution logic 25 in the boundary router of Fig.
`
`1 according to a
`
`preferred embodiment. in which the higher level protocol address comprises '
`
`an internet protocol IP address, such as used by SNMP (Simple Network
`
`Management Protocol) standard network management sewers.
`
`10
`
`Fig. 2 illustrates the prior art mechanism which is utilized in the
`
`preierred system on ports of the routing adaptor coupled to LAN media. The
`
`structure of Fig. 2 includes a flrst interface 100 corresponding to the RARP
`
`client port of
`
`the routing adapter 21. and a second interiace 101
`
`corresponding to an RARP sewer in the local network 11. The routing
`
`15
`
`adapter includes RARP request generation process 102, an RARP response
`
`acceptance process 103, and an ICMP subnet mask response acceptance
`
`process 104. The resolution logic 25 in the RARP server includes an RARP
`
`response generation process 105. and an ICMP subnet mask response
`generation process 106.
`I
`
`20
`
`Using the industry standard RARP request generation process, as
`
`specified In RFC 903 dated June, 1984. the RARP request generation
`
`process 102 in the client generates an RARP RFC 903 request 107. which
`
`includes the client's MAC address. This request 107 is received at the
`
`sewer interface 101 and the RARP response generation process 105
`
`25
`
`generates a response 103 by accessing a database or other logic which
`
`assigns an IP address based upon the MAC address In the request 107.
`
`The RARP response acceptance process 103 in the client receives the IP
`
`address from the response 103, stores it as appropriate in the client, and
`
`generates an ICMP subnet mask request 109. The sewer 101 receives the
`
`30
`
`request 109 and the ICMP subnet mask response generation process 106
`
`.9-
`
`Page 1520 of 1928
`
`
`
`WO94lZ7.087
`
`PCI‘lUS94I00004
`
`supplies a subnet mask response 110 to the client 100. The ICMP subnet
`
`mask response acceptance process 104 then configures the client with the
`
`IP address and the subnet mask. and assigns the address of the sewer 101
`
`as the default gateway address.
`
`Fig. 3 illustrates this process as extended according to the present
`
`invention for reverse address resolution independent of the physical network
`
`address 01 the client.
`
`in this aspect, the interface 120 corresponds to the
`
`routing adapter 21 operating as an HARP client.
`
`The Interface 121
`
`corresponds to the interface 17 of the boundary router 12 operating as an
`
`HARP server. The RAHP sewer 121 need not be located in the boundary
`
`router 12. Rather, it can be located in any in system or intermediate system
`
`coupled to the networks served by the boundary router 12.
`
`in the extended sequence. as illustrated in Fig. 3, the routing adapter
`
`also includes an RAHP request generation process 122 (Hg. 4). an HAHP
`
`response acceptance process 123 (Fig. 6). and an ICMP subnet mask
`
`response acceptance process 124 (Fig. 8).
`
`The HARP sewer in the
`
`boundary router Includes an HARP response generation process 125 (Fig.
`
`5) and an ICMP subnet mask response generation process 126 (Fig. 7).
`
`As in the prior art system, the HARP request generation process 122
`
`in the client 120 generates an FIAHP RFC 903 request 127. Also. the
`
`process 122 generates an extended request 128, which indicates to the
`
`receiver that the address resolution must be conducted independent of the
`
`MAC address.
`
`The HARP response generation process 125 receives both the RFC
`
`903 request 127 and the MAC independent request 123.
`
`It the response can
`
`be served with the RFC 903 request. then the response generation process
`
`125 proceeds that way. However. it the MAC address 01 the client 120 has
`
`not been previously communicated to the response generation process 125,
`
`then the MAC independent request 128 must be utilized.
`
`1D
`
`15
`
`20
`
`25
`
`-10-
`
`Page 1521 of 1928
`
`
`
`WO 94122087
`
`PCTIUSMI00004
`
`The RARP response generation process 125 is coupled to a media
`
`address/IP address database 135 and to a channel number/IF address
`
`database 136. These databases are configured by the network managerto
`
`assign IP addresses throughout the network. The channel number/IF
`
`address database is relied upon when the media address (MAC address) of
`
`A
`
`the client 120 is not available at the time the IP address is configured.
`
`'
`
`in either event. the RARP response generation process 125 generates
`
`an RARP RFC 903 response 129 which includes an IP address. The RARP
`response acceptance proces-3.123 in the client 120 accepts the IP address
`and generates an ICMP subnet mask request 130.
`in the server 121, the
`
`ICMP subnet mask response generation process 126 supplies an ICMP
`
`subnet mask response 131. The client 120 receives that response and
`
`executes the ICMP subnet mask acceptance process 124.
`
`Fig. 4 shows the RARP request generation process corresponding to
`
`block 122 of Fig. 3. This routine loops through all of the interfaces or ports
`
`on the remote node, also called a leaf node. to detennlne its IP address.
`
`The algorithm starts with an interface up message 400. After an interface
`
`up message. the algorithm tests whether the IP address is available in local
`
`storage (step 401).
`
`if the address is availab