throbber
United States Patent (19)
`Carter et al.
`
`US005386470A
`Patent Number:
`Date of Patent:
`
`11
`45
`
`5,386,470
`*Jan. 31, 1995
`
`(54 REPEATERS FOR SECURE LOCAL AREA
`NETWORKS
`75) Inventors: Steven H. Carter, Great Missenden;
`Terence D. Lockyer, Luton;
`Christopher J. Gahan, Kings
`Langley, all of Great Britain
`73). Assignee: - - - - 3Com Ireland, Dublin, Ireland
`* Notice: The portion of the term of this patent
`subsequent to Nov. 3, 2009, has been
`disclaimed.
`21 Appl. No.: 111,012
`22 Filed:
`Aug. 24, 1993
`Related U.S. Application Data
`Continuation of Ser. No. 913,475, Jul. 15, 1992, aban
`doned, which is a continuation of Ser. No. 609,791,
`Nov. 7, 1990, Pat. No. 5,161,192.
`Foreign Application Priority Data
`30
`Dec. 6, 1989 GB United Kingdom ................. 8927623
`51) Int. Cl. ......................... H04B 3/36; HO4B 3/58;
`H04L 25/20, H04L 25/52
`52 U.S. Cl. .......................................... 380/48; 380/9;
`380/23; 380/49; 375/3; 375/4; 379/338;
`379/339; 455/7; 455/14; 455/15; 340/825.54
`58) Field of Search ..................... 380/2, 4, 23, 25, 48,
`380/49, 50,340/825.54, 35, 75,97; 375/3, 4;
`379/338,339; 455/7, 9, 14, 15
`References Cited
`U.S. PATENT DOCUMENTS
`4,449,247 5/1984 Waschka, Jr. .......................... 455/9
`4,626,845 12/1986 Ley ..................
`4,627,052 12/1986 Hoare et al. ..................... 370/85.13
`4,672,572 6/1987 Alsberg ................................. 380/23
`4,692,918 9/1987 Elliott et al. ..................... 370/85.13
`4,783,657 11/1988 Bouchard et al. ..
`... 340/825.52
`4,887,075 12/1989 Hirasawa .............
`... 340/825.03
`4,901,348 2/1990 Nichols et al
`... 380/6
`4,939,747 7/1990 Adler ......
`. 375/3.1
`4,974,190 11/1990 Curtis..........
`... 307/571
`5,161,192 11/1992 Carter et al. .......................... 380/48
`5,177,788 i/1993 Schanning et al. ................... 380/23
`
`56)
`
`-
`
`63)
`
`OTHER PUBLICATIONS
`Brian P. Schanning, Secure Relays: An Alternative
`Approcach to Lansec, Apr. 3, 1989, pp. 31-52.
`"StarLAN” Specification excerpts of Draft C "Unap
`proved Draft” Oct. 1985, IEEE C351m3puter Society.
`Conard K. Kwok, Biswanath Mukherjee, On Transpar
`ent Bridging of CSMA/CD Networks, 1989 IEEE pp.
`5.7.1-5.7.6.
`Japanese Abstract of 59-63839; vol. 8, No. 167; 02 Aug.
`84.
`C. Kwok et al, "On Transparent Bridging of
`CSMA/CO Networks'; Dallas Globecom '89, vol. 1,
`pp. 5.7.1-5.7.6; 27-30 Nov. '89.
`J. Weinstein, "Bridging to a Better Lan', vol. XXII,
`No. 2, Feb. 1989: “Micro-Mini Systems', pp. 86-88.
`European Search Report EP 90 31 2060.
`Primary Examiner-Bernarr E. Gregory
`Attorney, Agent, or Firm-Haynes & Davis
`57
`ABSTRACT
`A multiport repeater for a local area network installa
`tion has (in addition to its conventional functions)
`means for storing access rules for the items of equip
`ment connected to it. It reads a portion of each frame,
`which may be all or part of the destination address
`segment and/or of the source address segment and/or
`of the control segment of each incoming data frame, or
`it could be aframe or protocol identifier incorporated in
`opening bytes of the data segment. It compares the data
`that it reads with the stored access rules to determine
`whether the frame is permitted or not. If not, the re
`peater modifies the frame which it is in the course of
`re-transmitting, for example by overwriting it with
`meaningless digits or by encrypting it. It may also re
`port the source address, destination address and reason
`for deciding to modify the frame to the network con
`troller.
`
`53 Claims, 5 Drawing Sheets
`
`
`
`Ex.1005
`CISCO SYSTEMS, INC. / Page 1 of 13
`
`

`

`U.S. Patent
`
`Jan. 31, 1995
`
`Sheet 1 of 5
`
`5,386,470
`
`FIG.1
`
`MAU 1
`
`MPR 2
`
`MAU 14
`
`Ex.1005
`CISCO SYSTEMS, INC. / Page 2 of 13
`
`

`

`U.S. Patent
`
`Jan. 31, 1995
`
`Sheet 2 of 5
`
`5,386,470
`
`FROM INFO,
`BUS
`
`5
`
`PRT 1 PRT I/F
`S1
`
`5
`
`PRT 2 Pr/f
`
`
`
`
`
`
`
`
`
`PORT 3 PRT I/F
`S3
`
`5
`
`PORT ||PORT/F
`SN
`
`|
`
`SELECT
`21
`
`11
`
`/WRITING
`SEQUENCE
`GEN,
`
`CORRUPT
`
`21. MUX
`
`DATA
`SELECT
`
`EN
`
`W
`
`
`
`JAM
`PREAMBLE
`GEN,
`
`lik -
`
`Ex.1005
`CISCO SYSTEMS, INC. / Page 3 of 13
`
`

`

`U.S. Patent
`
`Jan. 31, 1995
`
`Sheet 3 of 5
`
`5,386,470
`
`s
`
`X
`
`s
`
`FIG.2 (cont.)
`
`s
`
`s
`
`d
`
`s a.
`
`t
`
`s 8. es s A. 4xx 4& h
`
`s
`
`B
`
`s
`
`s
`
`16
`
`Rx DATA
`T OTHER
`MODULE
`Rx CCK
`TO THER
`MODULE
`
`
`
`
`
`
`
`14
`
`I/FEd DA
`
`COUNTERS
`EN
`
`CK
`S
`H
`F
`T
`R
`
`D
`
`19
`
`DA
`L
`
`C
`H
`
`SA
`l
`A
`T
`s
`
`I/FF
`17
`
`SA
`
`ILLEGAL
`FRAME
`
`T
`INF
`BUS
`
`DELAY
`
`COMPARATRS
`
`
`
`ADDRESS
`ADDRESS DATA BASE Ko DOWN
`LOAD
`
`18
`
`TIMING
`
`CONTRL
`
`STATE
`
`FRPS I/F =PORT IDE
`
`Ex.1005
`CISCO SYSTEMS, INC. / Page 4 of 13
`
`

`

`U.S. Patent
`
`Jan. 31, 1995
`
`Sheet 4 of 5
`
`5,386,470
`
`
`
`
`
`FRM INFO,
`BUS
`
`5
`
`PORT | PRT IVF
`S.
`
`S
`
`PORT 2PORT I/F
`S2
`
`PORT 3 PRT I/F s"
`
`ENCRYTED
`DATA
`
`5
`
`PORT 4. PORT I/F
`SN
`
`
`
`
`
`|
`
`.
`
`SELECT
`21.
`
`JAM
`PREAMBLE
`GEN,
`
`Ex.1005
`CISCO SYSTEMS, INC. / Page 5 of 13
`
`

`

`U.S. Patent
`
`Jan. 31, 1995
`
`Sheet 5 of 5
`
`5,386,470
`
`
`
`
`
`
`
`
`
`o
`
`s ed o un
`
`Out
`
`no
`
`CK
`S
`H I
`F
`T
`R
`
`19
`
`- DELAY
`
`FIG.3 (cont.)
`
`ae uno ump
`
`e O up
`
`o
`
`o
`
`m o
`
`to as uno r
`
`Rx DATA
`TO THER
`MDULE
`Rx CLOCK
`TO THER
`MDULE
`
`16
`
`COUNTERS
`EN
`
`
`
`
`
`
`
`14
`
`I/FX DA
`
`I/FX SA
`
`DA
`l
`A
`T
`s
`
`SA
`l
`A
`H
`
`17
`
`CMPARATORS
`
`ILLEGAL
`FRAME
`East
`ADDRESS
`ADDRESS DATA BASE KCO DOWN
`LOAD
`
`TO
`INFO
`BUS
`
`18
`
`TIMING
`
`CONTROL SE
`
`o an
`
`es gos
`
`s m
`
`up s
`
`-
`
`O
`
`s
`
`0. so as us
`
`an
`
`o o
`
`as an
`
`d
`
`FRPS 1/f EPORT IDE
`
`Ex.1005
`CISCO SYSTEMS, INC. / Page 6 of 13
`
`

`

`1.
`
`REPEATERS FOR SECURE LOCAL AREA
`NETWORKS
`
`This application is a continuation of Ser. No.
`07/913,475, filed Jul. 15, 1992, now abandoned, which is
`a continuation of Ser. No. 07/609,791, filed Nov. 7,
`1990, now U.S. Pat. No. 5,161,192.
`FIELD OF THE INVENTION
`This invention relates to local area networks for pro
`viding intercommunication between computers and/or
`other network connected devices (hereinafter called
`data termination equipment and abbreviated to DTE).
`More particularly, it is concerned with networks of the
`15
`kind in which DTE's are connected (normally via a
`media attachment Unit (MAU), also called a trans
`ceiver) to a common transmission medium such as a
`coaxial cable, a twisted pair cable or an optical fiber and
`in which digital repeaters (usually multiport repeaters,
`20
`MPR's) are used to restore digital signals that have been
`attenuated or otherwise degraded and to provide for
`branching when required. The invention includes im
`proved repeaters and the networks in which they are
`used.
`25
`The invention is primarily (but not exclusively) con
`cerned with networks operating Carrier Sense Multiple
`Access
`techniques
`with
`collision
`detection
`(CSMA/CD). The best-known networks of this type
`are those specified by the International Standards Orga
`30
`nization as ISO 8802/3 networks and by Xerox Corpo
`ration as 'ETHERNET' networks.
`In such systems, data is transmitted in frames which
`have a limited range of lengths and are normally made
`up of a meaningless preamble (for establishing Synchro
`35
`nization), a start-of-frame indicator, a destination ad
`dress segment, a source address segment, a control seg
`ment (indicating, for instance, the frame length), a seg
`ment of data (often beginning with a frame or protocol
`identification) to be transmitted to the DTE identified
`by the address identification, and a frame check seg
`ment for verifying accuracy of transmission.
`MPR's repeat frames received on an input port indis
`criminately to all their output ports and necessarily
`(because of delay limits imposed by the network specifi
`45
`cations) begin to retransmit before the complete frame
`has been received.
`A local area network as so far described is insecure, in
`the sense that any DTE can transmit data to any other
`and that an eavesdropper gaining access to the transmis
`50
`sion medium can read all the data.
`DISCUSSION OF RELATED ART
`In known systems, a measure of security may be
`achieved by physically subdividing the transmission
`medium into groups using components called “bridges'
`which receive and store computer data frames and can
`then analyze them and determine whether they are
`authorized frames and if so to which of its output ports
`they need to be re-transmitted. However, bridges are
`much more expensive than MPR's and introduce a
`delay in excess of the frame length.
`SUMMARY OF THE INVENTION
`The present invention provides repeaters with secu
`65
`rity features such that in a local area network in which
`they are used the expense and signal delay inherent in
`the use of bridges can be avoided, or at least minimized.
`
`5,386,470
`2
`In accordance with the invention, a repeater is char
`acterized by having (in addition to whatever known
`repeater functions are desired) means for storing access
`rules for the DTE's connected to the repeater; means
`for reading at least one portion of the frame selected
`from the destination address segment, the source ad
`dress segment, the control segment and the frame or
`protocol identifier (if present) of each incoming data
`frame and comparing the portion or portions so read
`with the stored access rules to determine whether the
`O
`frame is permitted or not; and means for modifying (by
`corrupting or encrypting) the frame in retransmission if
`the repeater determines that the frame is not permitted.
`When the portion of the frame selected to be read is
`in the control segment, it may be the whole segment or
`it may be only a part of the segment that is relevant to
`the decision to be made. In most (but not necessarily all)
`other cases, the whole of the appropriate address seg
`ment or of the identifier should be read.
`The access rules may be written to their storing
`means in various ways, depending (among other things)
`on the level of security required. For example, a degree
`of security can be achieved by allowing a learning per
`iod when the network is first set up in which the re
`peater "self-learns” which DTE's are connected to each
`of its ports and thus sets up its own access rules for each
`port forbidding the transmission thereafter of any frame
`with a source address not corresponding with a DTE
`not connected to that port during the learning period.
`More sophisticated rules can be loaded (or self
`learned rules can be edited) using data provided as con
`trol frames from a network manager, or if the possibility
`of the network manager being misused or counterfeited
`needs to be allowed for, from a special input device (a
`key pad or a mobile memory device, for instance) cou
`pled to the repeater itself and protected from misuse
`either by password protection or by removing the input
`device once the access rules have been written. In ex
`treme cases, the means provided in the repeater for
`coupling the input device could be destroyed after use,
`or the rules could be inserted as a pre-programmed
`ROM encapsulated along with key components of the
`repeater to prevent substitution.
`Either one or both of the destination address segment
`and the source identification segment may be read and
`compared with the stored access rules, depending on
`the nature of the rules to be applied. For example, if the
`physical connections are such that all the DTE's con
`nected to a particular input port (or group of ports) of a
`repeater have unlimited access to the network, then
`there is no point in comparing the destination address
`segments of frames received on that port, and it is only
`necessary to check the source address segment to verify
`that the DTE in question is authorized to be connected
`there. Similarly, if physical security can be relied on to
`prevent unauthorized connections and all the DTE's
`connected to a port (of group of ports) have the same
`(but limited) access to other parts of the network, then
`only the destination address segment needs to be read
`and compared.
`Subject to the limitations set by comparison time and
`storage space, each DTE may have its own access rules,
`independently of all the others, or if the DTE's are
`organized in groups with common access rules, then it is
`possible for individual DTE's to be allocated to more
`than one of the groups; for example, a departmental
`accountant's terminal could have access to all the other
`terminals within his department and also to other ac
`
`5
`
`55
`
`Ex.1005
`CISCO SYSTEMS, INC. / Page 7 of 13
`
`

`

`15
`
`5,386,470
`3
`4.
`of a multiport repeater that are relevant to the under
`countants' terminals outside the department, without
`standing of the present invention, and FIG. 3 is a block
`the need to give unnecessary access between the re
`maining terminals of those two groups.
`diagram of an alternative embodiment of the present
`Ideally, all the data contained in an unauthorized
`invention.
`frame should be modified, and this presents no problems 5
`DESCRIPTION OF PREFERRED
`if the destination address segment shows the frame to be
`EMBODIMENTS
`unauthorized; if however it is the source address, the
`control frame or the frame or protocol identifier seg
`The network of FIG. 1 comprises 14 items of data
`termination equipment, DTE 1 to DTE 14 (which may
`ment that shows the frame to be unauthorized, the time
`for example be general purpose personal computers,
`taken to make comparisons may be such that a few bytes 10
`dedicated word processors, printers, disc drives etc.),
`of data may be retransmitted without modification. If
`this is considered unacceptable, high-speed comparison
`and a network controller C. Each of these is connected
`algorithms may be used and/or the system protocol
`through its own media access unit MAU 1 to MAU 15
`may be modified so that there will be an appropriate
`to one or other of three multiport repeaters MPR 1,
`number of meaningless bytes at the beginning of the
`MPR2 and MPR3; these are in turn interconnected by
`the remaining repeater MPR 4.
`data segment.
`Data may be modified, when required, by corrupting
`FIG. 2 shows one module serving ports 1 to 4 of an
`it, as by overwriting a series of binary digits selected
`MPR, the assumption for the purpose of illustration
`from all 1's, all 0's, cyclically repeated sequences and
`being that there is at least one other module serving
`pseudo-random sequences. The first two require no
`further ports, and that the access rules will be the same
`more complex generating means than a simple logic
`for all the ports connected to this module.
`gate, say a non-exclusive OR gate, receiving the incom
`The most basic conventional function of the MPR is
`ing data on one input and a permitted/not permitted
`served by the inputs received on any one of ports 1 to 4
`flipflop signal on its other input so as to pass the data to
`passing via respective port interface units 5 and multi
`output if the flipflop is set "permitted' but a continuous 25
`plexers 6 and 7 to a first in/first out memory 8. This is
`“high” or “low” output if it is set “not permitted”.
`inert until enabled by a signal from the start of frame
`Cyclically repeated or pseudo-random sequences can
`detector 9, and then begins to store the incoming data.
`be read from memory or generated when required by
`In the meantime, a preamble generator 10 has begun to
`output a preamble signal through the multiplexer 11 to
`conventional means.
`Data may alternatively be modified by encrypting it 30
`all of the port interfaces, which will pass it to their
`respective ports except in the case of the port receiving
`in a manner that cannot be decrypted by the DTE's of
`the incoming signal. Preamble transmission continues
`the network, except possibly one or a few authorized
`until a counter 12 indicates that the prescribed length of
`DTE's (for instance the network controller).
`preamble has been outputted. Provided there are then at
`If desired, a repeater which detects an unauthorized
`frame may, in addition to modifying the unauthorized 35
`least 3 bits of data in the memory 8, the multiplexer 11
`is switched to begin reading out the data stored in the
`frame, switch off the port on which such a frame was
`memory, and in the ordinary way will continue to do so
`received and/or the port to which the DTE it was
`addressed to is connected. Preferably it only does so if
`until the complete frame has been received into and
`it knows that the port concerned is not connected to
`then read from the memory 8.
`another repeater.
`However, in accordance with the invention, the in
`40
`coming signal is also passed via a shift register 13 which
`On occasion, an unauthorized person gaining access
`to a network may not be concerned with transmitting
`extracts the destination address and the source address
`unauthorized data, nor reading data from the network,
`in parallel form to latches 14 and 15 which are switched
`but to prevent proper functioning of the network. One
`by counters 16 enabled by the start of frame signal from
`easy way of so "jamming' a conventional network is to
`detector 9. These are passed to comparators 17 and
`45
`inject into the network a rapid succession of frames that
`compared with the access rules previously stored in a
`conform to the system protocol, so that any other user
`database 18 for example by self-learning on the basis of
`the identity of equipment connected to the ports of the
`seeking to transmit will encounter a "collision'. As a
`precaution against this form of abuse, the repeater in
`repeater during an initial learning period; or by writing
`from one of the following: a network manager; an input
`accordance with the invention may additionally be
`50
`device coupled to the repeater (and removing the input
`fitted with a timer (or frame counter) device arranged
`to limit the number of consecutive frames that will be
`device once the access rules have been written); or an
`input device that has password protection.
`accepted on any one port and to switch off that port if
`If the comparators indicate that the frame is not in
`the limit is exceeded.
`If desired, the repeater in accordance with the inven- 55
`accordance with the rules contained in the database,
`tion may be switchable (e.g. by a local, key-operated
`then a signal is output via a delay 19 (serving to ensure
`switch or by a control frame from a network manager)
`that the source address will never be corrupted) to the
`between secure operation in accordance with the inven
`multiplexer 7, and cause it to transmit, for the remainder
`tion and ordinary, insecure operation; the latter may be
`of the length of the frame, a meaningless sequence of
`desirable, for example, during fault testing and identifi- 60
`digits (such as all 1's, all 0's, a cyclically repeated se
`quence or a pseudo-random sequence) available to it
`Cation.
`from a sequence generator 20 instead of the incoming
`signal. Preferably when such a signal is given, data is
`also transmitted to the network controller Cidentifying
`the port on which the frame concerned was received,
`the destination address and source address of the frame
`and the reason for the decision that the frame was unau
`thorized. If desired, this signal may be separated from
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`The invention will be further described by way of
`example with reference to the accompanying drawings 65
`in which FIG. 1 is a diagram of a network in accor
`dance with the invention incorporating four multiport
`repeaters, and FIG. 2 is a block diagram of those parts
`
`Ex.1005
`CISCO SYSTEMS, INC. / Page 8 of 13
`
`

`

`15
`
`5,386,470
`5
`6
`the system data signals into a separate signalling me
`repeater in accordance with the invention loaded with
`dium, designated on the diagram as an information bus.
`analagous rules to provide additional security.
`In addition, the repeater port on which the unautho
`Note that, in this example, the network has been so
`rized frame was received, and/or the repeater port to
`arranged that each destination address and each source
`which the addressed DTE is connected, may be
`address is either accepted or rejected unconditionally.
`switched off.
`This has the advantage of requiring the shortest pro
`Instead of substituting the output of sequence genera
`cessing time, and consequently allowing an unautho
`tor 20 for the content of the unauthorized frame, the
`rized frame to be modified from as nearly as possible the
`unauthorized frame may be modified by encrypting it in
`beginning of its data segment. It is however possible,
`a manner that cannot be decrypted by the DTE's of the
`O
`subject to process time limitations, to provide condi
`network, except for the network controller or a security
`tional rules allowing certain destination addresses to be
`unit. This enables the controller or a security unit to be
`accessed from some but not all of the DTE's connected
`informed of the content of the modified frame with
`to the module in question.
`facility.
`What we claim as our invention is:
`As shown in FIG. 3, to encrypt an unauthorized
`1. In a network communicating data frames having an
`frame, encrypter 20' is provided in place of overwriting
`identifiable destination on communication media having
`sequence generator 20. The multiplexer 7 stays the same
`a particular media access protocol, a repeater compris
`as in FIG. 2. Encrypted data generator 20' has clock,
`1ng:
`SFC, and the received data fed into it. Encrypted data
`at least first and second ports for connection to the
`generator 20' then produces an encrypted data stream
`20
`communication media of the network;
`synchronized with the start of the data frame which is
`a frame regenerator connected between the first and
`fed into multiplexer 7. The encrypted data is selected
`second ports that repeats an incoming frame from
`via the select signal as in FIG. 2. The remainder of the
`the first port to supply a regenerated frame for
`FIG. 3 circuit functions as described above with refer
`retransmission on the second port within a time
`ence to FIG. 2.
`25
`interval which begins before the complete incom
`The repeater provides in addition conventional facili
`ing frame has been received by the first port;
`ties for detecting a collision and transmittingjam signals
`access rule logic coupled with the first port to detect
`in response to it, for extending signal fragments arising
`incoming frames having destinations not autho
`from collisions and for disabling a port on which exces
`rized for the second port; and
`sive collisions or frame lengths exceeding the protocol
`30
`an override circuit, coupled to the frame regenerator
`limit are indicative of faulty equipment. The repeater
`and to the access rule logic, to modify the regener
`may also include a timer or frame counting device ar
`ated frame in response to indication by the access
`ranged to switch off any port in which a number of
`rule logic that the incoming frame has a destination
`consecutive frames exceeding a preset limit is received.
`not authorized for the second port.
`Suppose, by way of example, that DTE's 1 to 5 need
`35
`2. The repeater of claim 1, wherein the access rule
`to communicate with each other but with none of the
`logic, comprises:
`other DTEs. DTE's 6 to 9 similarly need access only to
`sampling circuitry to sample a destination field in an
`each other but DTE 10 needs access not only to DTE 6
`incoming frame;
`to 9 but also DTEs 11 to 14; obviously, all the DTE's
`a destination table store to store a list of at least one
`need to be in communication with the network control
`authorized destination in the network for access
`ler C. This could be achieved by connecting MAUs 1 to
`through the second port;
`5 to one module (or to separate modules with the same
`a comparator, coupled with the sampling circuitry
`instructions in their address rule databases) in MPR. 1,
`and the destination table store, which supplies an
`MAU 6 to 9 to one module and MAU 10 to a separate
`unauthorized frame signal when the destination of
`module in MPR2 and similarly MAUs 11 to 14 to one
`45
`the incoming frame falls outside the list of at least
`module and MAU 15 to a second module in MPR 3. In
`one authorized destination; and wherein
`MPR 1, the address database needs to be loaded with
`the override circuit is responsive to the unauthorized
`rules accepting destination addresses corresponding to
`frame signal to begin modifying the regenerated
`the network controller C and to its own DTE's 1 to 5
`frame.
`but no other, and may optionally be loaded with the
`50
`3. The repeater of claim 2, wherein the unauthorized
`source addresses of its own DTE's 1-5 in order to reject
`frame signal is supplied in time to modify substantially
`signals from an additional DTE connected to it without
`all data in the regenerated frame.
`authority. The first module of MPR2 is correspond
`4. The repeater of claim 2, further including:
`ingly loaded. The second module of MPR 2, on the
`a circuit to learn a destination accessible through the
`other hand, is loaded with rules accepting destination
`55
`second port of the repeater in response to frames
`addresses corresponding to MAU’s 6 to 9 and 11 to 14
`received on the second port during a learning inter
`as well as to the network controllers MAU 15 (and if
`required to accept no source address except that of
`val and to store the learned destination in the desti
`DTE 10).
`nation table store.
`5. The repeater of claim 2, wherein the network com
`The first module of MPR 3 is loaded with rules ac
`60
`cepting destination addresses corresponding to any of
`municates data frames having a preset format, the preset
`MAU’s 10-15 (and optionally to accept only source
`format having a beginning of the frame and a destina
`addresses corresponding to MAU’s 11 to 14); and the
`tion address field near the beginning of the frame, and
`second module of MPR3 is loaded to accept any desti
`wherein the destination table store stores a list of at least
`nation address (and preferably to accept no source ad
`one destination address.
`65
`dress except that of the network controller C).
`6. The repeater of claim 1, wherein the override cir
`MPR 4 may, if physical security is reliable, be a con
`cuit modifies the regenerated frame by corrupting at
`ventional MPR without security features; or it may be a
`least most of the data in the regenerated frame.
`
`Ex.1005
`CISCO SYSTEMS, INC. / Page 9 of 13
`
`

`

`O
`
`15
`
`20
`
`5,386,470
`8
`7
`7. For a network communicating data frames having
`a frame regenerator connected between the first and
`second ports that repeats an incoming frame from
`an identifiable destination on communication media
`the first port to supply a regenerated frame for
`having a carrier sense multiple access with collision
`retransmission on the second port within a time
`detection (CSMA/CD) media access protocol, a multi
`port repeater comprising:
`interval which begins before the complete incom
`ing frame has been received by the first port;
`a plurality of ports for connection to the communica
`access rule logic coupled with the first port to detect
`tion media of the network;
`incoming frames having sources not authorized for
`a frame regenerator connected to the plurality of
`the first port; and
`ports that repeats an incoming frame from a partic
`an override circuit, coupled to the frame regenerator
`ular port in the plurality of ports to supply respec
`and to the access rule logic, to modify the regener
`tive regenerated frames for retransmission on other
`ated frame in response to indication by the access
`ports in the plurality of ports within a time interval
`rule logic that the incoming frame has a source not
`which begins before the complete incoming frame
`authorized for the first port.
`has been received by the particular port;
`14. The repeater of claim 13, wherein the access rule
`access rule logic, coupled with the plurality of ports,
`logic, comprises:
`to detect whether the incoming frame from the
`sampling circuitry to sample a source field in an in
`particular port has a destination not authorized for
`coming frame;
`retransmission on the other ports on a per port
`a source table store to store a list of at least one autho
`basis; and
`rized source for the first port;
`an override circuit, coupled to the frame regenerator
`a comparator, coupled with the sampling circuitry
`and the access rule logic, responsive to detection
`and the source table store, which supplies an unau
`by the access rule logic on a per port basis that the
`thorized frame signal when the source of the in
`incoming frame has a destination not authorized for
`coming frame falls outside the list of at least one
`retransmission on a given port in the plurality of
`authorized source; and wherein
`25
`ports to modify the regenerated frame for retrans
`the override circuit is responsive to the unauthorized
`mission on the given port.
`frame signal to begin modifying the regenerated
`8. The multiport repeater of claim 7, wherein the
`frame.
`access rule logic, comprises:
`15. The repeater of claim 14, wherein the unautho
`sampling circuitry to sample a destination field in the
`rized frame signal is supplied in time to modify substan
`incoming frame;
`tially all data in the regenerated frame.
`a destination table store, storing respective lists of at
`16. The repeater of claim 14, further including:
`least one authorized destination in the network for
`a circuit to learn at least one source connected to the
`access through the respective ports in the plurality
`first port of the repeater in response to frames re
`of ports;
`ceived on the first port during a learning interval
`35
`a comparator, coupled with sampling circuitry and
`and to store the at least one learned source in the
`the destination table store, which supplies an unau
`source table store.
`thorized frame signal for given ports in the plural
`17. The repeater of claim 14 wherein the network
`ity of ports when the destination of the incoming
`communicates data frames having a preset format, the
`frame falls outside the list of at least one authorized
`preset format having a beginning of the frame and a
`40
`destination for the given ports; and wherein
`Source address field near the beginning of the frame,
`the override circuitry is responsive to the unautho
`and wherein the source table storestores a list of at least
`rized frame signal for the given ports.
`one source address.
`9. The multiport repeater of claim 8, wherein the
`18. The multiport repeater of claim 13, further includ
`unauthorized frame signal is supplied in time to modify
`ing a circuit for switching off the first port in response
`45
`substantially all data in the regenerated frame.
`to detection of an incoming frame on the first port hav
`10. The multiport repeater of claim 8, further includ
`ing a source not authorized for the first port.
`1ng:
`19. The repeater of claim 13, wherein the override
`a circuit for learning destinations accessible through
`circuit modifies the regenerated frame by corrupting at
`the respective ports in the plurality of ports in
`least most of the data in the regenerated frame.
`response to data frames received on the respective
`20. For a network communicating data frames having
`ports during a learning interval and storing the
`an identifiable source on communication media having a
`learned destinations in the destination table store.
`carrier sense multiple access with collision detection
`11. The multiport repeater of claim 8, wherein the
`(CSMA/CD) media access protocol, a multiport re
`network communicates data frames having a preset
`peater comprising:
`format, the preset format having a beginning of the
`a plurality of ports for connection to the communica
`frame and a destination address field near the beginning
`tion media of the network;
`of the frame, and wherein the destination table store
`a frame regenerator connected to the plurality of
`stores a list of destination addresses.
`ports that repeats an incoming frame from a partic
`12. The multiport repeater of claim 7, wherein the
`ular port in the plurality of ports to supply respec
`60
`override circuit modifies the regenerated frame by cor
`tive regenerated frames for retransmission on other
`rupting at least most of the data in the regenerated
`ports in the plurality of ports within a time interval
`which begins before the complete incoming frame
`frame.
`13. In a network communicating data frames having
`has been received by the particular port;
`an identifiable source on communication media having a
`access rule logic, coupled with the plurality of ports,
`65
`particular media access protocol, a repeater comprising:
`to detect whether the inco

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket