The present disclosure relates generally to home wireless networking.
A home network enables Internet connectivity and data sharing among computing devices within a home that are connected to that network. To allow computing devices to be placed remotely from one another and/or from the network router, many home networks are fully or partially wirelessly connected. Wireless home networks typically include a wireless router that is hard wired to a modem. The modem, which is often provided by a telephone or cable company, is connected to an external network, such as the Internet, and allows information to flow between the external network and the home network. Each computing device in the home network is connected to the wireless router through a wireless network adapter that is either internal or external to the computing device.
When connecting to a home network, a computer on which pre-loaded applications reside is exposed to a new network topology over which new capabilities and services are offered. Those capabilities and services may or may not support the different pre-loaded applications on the computer. In situations where the new network topology does not support the operation of one or more pre-loaded applications, software executing on the computer that is responsible for connecting the computer to the home network may “gray out” icons representing those applications. While “graying out” the icons communicates to the user of the computer that those applications are not available on the new network, “grayed out” icons are relatively annoying and confusing to many users. Worse yet, in some instances, the software executing on the computer that is responsible for connecting the computer to the home network may not “gray out” any of the relevant icons and, instead, allow the user to attempt to launch the unsupported applications. As is well-appreciated, when an unsupported application is launched, a reasonably long period of time may transpire before a message indicating that the application cannot properly load/execute appears on the computer screen for the user to see. Such outcomes are even more annoying and frustrating for uses.
So that the manner in which the features of the present disclosure can be understood in detail, a more particular description of the disclosure may be had by reference to example embodiments, some of which are illustrated in the appended drawings. It is to be noted, however, that the appended drawings illustrate only example embodiments of this disclosure and are therefore not to be considered limiting of its scope, for the disclosure may admit to other equally effective embodiments.
One embodiment of the present disclosure sets forth a technique for determining whether to expose or to not expose an application for use with a computing device when there has been a change in the topology of the smart home network to which the computing device has just connected or has been connected. In one embodiment, a method includes detecting an event that changes a topology of a smart home network, requesting, from a router device included in the smart home network, topology information that describes the topology of the smart home network, and comparing the topology information against a requirements list associated with an application executing on a computing device that is connected to the smart home network, where the requirements list delineates at least one of a capability or a service necessary for the application to operate properly within a network. The method further includes determining, based on comparing, whether the application is supported by the topology of the smart home network, and, if the application is supported, then causing the application to be exposed for use with the computing device, unless the application is not permitted to operate within the smart home network, or, if the application is not supported or if the application is not permitted to operate within the smart home network, then causing the application to not be exposed for use with the computing device.
Other embodiments include, without limitation, a computer-readable medium that includes instructions that, when executed by a processing unit, cause the processing unit to carry out the above method as well as a computing device configured to implement the above method and a system that includes such a computing device.
An applet portal application 172, residing within the computer 170, is configured to access the network state model 178 to determine which client devices 130 are available within the smart network 102, which services the client devices 130 provide, and to access and use the services. The applet portal application 172 may download one or more applets 174, configured to extend functionality of the applet portal application 172, from the applet store 116. A given applet 174 may be associated with a specific client device 130 and may facilitate specific usage models for the client device 130 via the extended functionality. When a new client device 130 registers with the smart network 102, a most recent version of a corresponding applet 174 may not be available within the applet portal application 172. However, the applet portal application 172 may retrieve the corresponding applet 174 or version of the corresponding applet 174 from the applet store 116.
In alternative embodiments, the applet portal application 172 may be hosted externally to the smart network 102 in, for example, a cloud environment. In such embodiments, the computer 170 would access the applet portal application 172 through a network interface to realize the different functionalities of the applet portal application 172 described herein.
The applet store 116 is configured to facilitate access to applets 174 by the applet portal application 172. The applet store 116 provides storage for applets 174 corresponding to client devices 130 and makes the applets 174 available for download to the applet portal application 172 via the external network 110. In one embodiment, the applet store 116 occupies a well-known location, such as a universal resource locator (URL) associated with the external network 110. Any technically feasible technique may be used to identify a particular applet 174 as corresponding to a particular client device 130. Furthermore, any technically feasible technique may be used to download the particular applet 174 an incorporate the functionality of the applet 174 to the portal 172.
The smart network host device 120 implements a wireless network interface coupled to antenna 122, which is configured to convert electrical signals to electromagnetic signals for transmitting data packets, and electromagnetic signals to electrical signals for receiving data packets. The antenna 122 may comprise plural independent radiator structures, each having a separate radiation pattern for implementing spatial multiplexing. In one embodiment, the wireless network interface implements one or more well-known standards, such as the Institute of Electrical and Electronics Engineers (IEEE) standard 802.11, which defines a system for wireless local area networking. The antenna 122 is configured establish wireless client links 134 to antennas 132 coupled to corresponding client devices 130. The smart network host device 120 implements Ethernet layer 2 switching for wireless data packets forwarded among client devices 130 as well as internet protocol (IP) layer 3 routing between an IP domain associated with the smart network 102 and the external network 110. In this configuration, the smart network host device 120 provides related services and protocols, such as dynamic host configuration protocol (DHCP), network address translation (NAT), and the like.
The smart network host device 120 acts as a central authentication authority for the smart network 102 and implements authentication services for devices registering with the smart network 102. In one embodiment, authentication is implemented via Identification (ID) devices 136 that are uniquely paired with corresponding client devices 130. For example, client device 130(0) may be uniquely paired with ID device 136(0) by a manufacturer of the client device 130(0). An ID device 136(0) is physically presented to the smart network host device 120 as an authentication credential to allow a client device 130(0) paired to the ID device 136(0) to join the smart network 102. Furthermore, the client device 130(0) is able to authenticate the smart network 102 as a trusted network by accessing credentials for the corresponding ID device 136(0) specifically via the smart network 102. In one embodiment, the ID devices 136 are implemented as near field radio frequency identification (RFID) tags. Each one of the RFID tags is configured to retain authentication credentials necessary to uniquely associate the one RFID tag with one instance of the client device 130. In this way, an RFID tag may be paired with a given client device 130. Persons skilled in the art will recognize that any technique may be implemented to generate and represent authentication credentials without departing the scope and spirit of the present disclosure. In alternative embodiments, other forms of ID devices 136 may implement storage of the authentication credentials. For example, a universal serial bus (USB) storage device may be used to present authentication credentials to the smart network host device 120 for authenticating a related device, such as the computer 170. In an alternative embodiments, a user may manually authenticate a client device 130 with the smart network host device 120. For example, the user may log onto a management web page generated by the smart network host device 120 and manually enter authentication credentials, such as a printed code associated with the client device 130. In yet another alternative embodiment, the device ID is communicated using a bar-code or QR code which is scanned by a camera attached to a host computer or built into the Smart Network Host Device 120.
In one usage scenario involving ID device 136, the user wishes to add a new device, such as a smart network-enabled printer to the smart network 102. The printer includes an ID device 136 implemented as an RFID tag that is paired to the printer. The user places the ID device 136 in close physical proximity to the smart network host device 120, which is the able to read the ID device 136 and authenticate the printer. The printer registers with the smart network host device 120 and is then available for use by devices connected within the smart network 102. Upon successfully reading the ID device 136, the smart network host device 120 may indicate success to the user by flashing a light-emitting diode (LED), or by generating any technically feasible indication.
In addition to previously described functionality, the smart network host device 120 is also configured to detect one or more smart network extender devices 140 and to establish a bridge link 128 to each of the one or more smart network extender devices 140. Each smart network extender device 140 is configured to act as a network bridge between a client device 130 and the smart network host device 120. For example, client devices 130(1) through 130(N) may be physically located such that they are able to connect to the smart network extender device 140, but not to the smart network host device 120. Furthermore, the smart network extender device 140 is able to connect to the smart network host device 120 via bridge link 128. Data packets transmitted by client devices 130(1) through 130(N) and destined to the external network 110 are received by the smart network extender device 140 and retransmitted by the smart network extender device 140 via bridge link 128 to the smart network host device 120, which then forwards the data packets to the external network 110. Similarly, data packets from the external network 110 that are destined to any of the client devices 130(1) through 130(N) are transmitted via bridge link 128 to the smart network extender device 140, which retransmits the data packets via wireless client links 134(1)-134(N). Persons skilled in the art will understand that wireless client links 134(1)-134(N) may each be configured to operate on a separate channel or band, or a common channel or band. Furthermore, bridge link 128 may operate on a separate channel or band with respect to the wireless client links 134.
In one embodiment, each smart network extender device 140 is paired to an ID device 136, which is presented as an authentication credential to the smart network host device 120 to enable the smart network extender device 140 to participate within the smart network 102.
In this embodiment, the smart network host device 120 is configured to operate similarly with respect to
Network data traffic between client device 130(N) and the external network 110 traverses wireless client link 134(N), bridge link 128, and backhaul link 158. This network data traffic is also forwarded by smart network extender device 140, smart network host device 120, and smart network connector device 150. A client device 130 may connect directly to any one of the network extender device 140, smart network host device 120, or smart network connector device 150. As shown, client device 130(0) is connected to smart network connector device 150 via wireless client link 134(0), client device 130(1) is connected to smart network host device 120 via wireless client link 134(1), and client device 130(N) is connected to smart network extender device 140 via wireless client link 134(N).
In one embodiment, the smart network connector device 150 is paired to an ID device 136, which is presented as an authentication credential to the smart network host device 120 to enable the smart network connector device 150 to participate within the smart network 102. In an alternative embodiment, the smart network connector device 150 and the smart network host device 120 are paired during a manufacturing step, eliminating the need for a separate ID device 136.
The processor complex 160 comprises a central processing unit (CPU), non-volatile memory for storing persistent programs, program state, and configuration information, random access memory (RAM) for storing temporary or volatile data, and an interface to the interconnect 165. In one embodiment, the processor complex 160 is configured to execute an operating system and applications that provide routing services. The routing services may include, for example, data packet forwarding between the network interface 118 and the wireless network interface 162. The packet forwarding services may include, without limitation, bridging among the one or more network devices via the wireless network interface 162.
The ID device reader 164 is configured to read data from an associated ID device 136. In one embodiment, the ID device reader 164 is configured to read data from RFID tags comprising the ID device 136. The ID device reader 164 may also include a USB reader. In an alternative embodiment, ID device reader 164 is a camera and the ID is encoded into a bar-code or QR code which can be physically printed on the device or on the device's packaging.
In certain embodiments, the smart network host device 120 comprises one or more integrated circuits that implement respective functions of the smart network host device 120. For example, the processor complex 160, wired network interface 166, and wireless network interface 162 may be integrated into a single integrated circuit.
Persons skilled in the art will recognize that the smart network extender device 140 may be implemented using the basic architecture of the smart network host device 120, with the exception that the ID device reader 164 and wired network interface 166 are not required for the smart network extender device 140. Similarly, the smart network connector device 150 may be implemented using the basic architecture of the smart network host device 120, with the exception that the ID device reader 164 is not required for the smart network connector device 150.
The runtime server 180 comprises a network provisioning module 182, a service and discovery provisioning (SDP) module 184, an event module 186, and a network configuration module 188. The event module 186 tracks different network events, such as a network device advertising presence or updating status within the smart network 102. The SDP module 184 maintains a persistent view of different network devices and related services, based on data from the event module 186 and on data from the network devices. The network provisioning module 182 provides authentication and authorization for network devices within the smart network 102. Authentication credentials may be presented via a given ID device 136. The network provisioning module 182 may also facilitate certain network services, such as DHCP leases. The network configuration module 188 includes hardware platform-specific implementation methods for network configuration and management. The persistent view comprises the network state model 178 of
Persons skilled in the art will recognize that the smart network connector device 150 and smart network extender device 140 may be implemented using an appropriate subset of the system software architecture 104 described above in conjunction with
As previously described herein, applets 174 published within the applet store 116 are downloaded to the computer 170 for execution. An applet 174 is a device applet or a service applet. A device applet is configured to display information about and/or provide logic to configure a particular client device 130. A service applet is configured to provide, to a user, additional functionality built on top of the smart network 102. Each applet 174 is packaged with a set of rules that must be satisfied within the smart network 102 for the applet 174 to function as desired.
In operation, the download/update engine 202 automatically downloads applets 174 from the application store 116 as the need arises. For example, when a new client device 130 is connected to the smart network 102, the download/update engine 202 receives an indication from the smart network host device 120 that the client device 130 has been connected. Other triggers include a client device 130 coming online, a routine applet download/update task or a new applet 174 becoming available within the applet store 116. In response, the download/update engine 202 downloads any applets 174 related to the newly connected client device 130. The downloaded applets 174 may include a device applet that configures the newly connected client device 130 within the smart network 102 and any service applets that utilize the newly connected client device 130.
To identify which applets 174 are to be downloaded, the download/update engine 202 accesses the network state model maintained by the smart network host device 120. Based on the network state model, the download/update engine 202 identifies applets 174 that are related to the client devices 130 within the smart network 102. In one case, there may be a 1-to-1 relationship between a particular client device 130 and a particular applet 174, for example a device applet associated with the client device. In other cases, if the smart network 102 includes a particular combination of client devices 130, then the download/update engine 202 may download an applet 174 that utilizes the combination of the client devices 130.
The download/update engine 202 keeps track of the different applets that have been downloaded, i.e., the downloaded applets 204. If an update is available in the applet store 116 of one of the downloaded applets 204, the download/update engine 202 automatically downloads the updated applet from the applet store 116. Another trigger to the automatic update of a downloaded applet 204 occurs when a client device 130 associated with the downloaded applet 204 is connected/re-connected to the client device 130, and the download/update engine 202 determines the status of each applet associated with the client device 130. In such a case, if a downloaded applet 204 requires an update, then the download/update engine 202 downloads the updates from the applet store 116.
A downloaded applet 204 executes within the applet portal application 172 to interact with the corresponding client devices 130. The downloaded applet 204 is, typically, a light-weight application from which the lower-level network model details and communications are abstracted by the applet portal application 172. In addition, interactions with system resources provided by the computer 170 that are needed to execute the downloaded applet 204 are also abstracted from the downloaded applet 204 by the applet portal application 172.
As previously described herein, the different client devices 130 within the smart network 102 have various capabilities and expose various services within the smart network 102. Each service is defined via a particular service definition that specifies a set of actions that can be performed on the associated device 130 based on the capabilities of the associated device 130. The services exposed by the client devices 130 enable the interaction between a particular client device 130 and a downloaded applet 174.
In one embodiment, a particular applet 174 specifies a set of operating requirements that should be satisfied by the smart network 102 for the applet 174 to operate properly within the smart network 102. Such requirements may include the capabilities and services that need to be provided by the different client devices 130 included in the smart network 102 to properly support the operation of the applet 174. The download/update engine 202 is configured to maintain a list of these operating requirements for each of the applets 174 included in the set of downloaded applets 204 residing on the computer 170. Again, each such list sets forth the capabilities and services that should be provided by the other devices on the smart network 102 for the associated applet 174 to operate properly within the smart network 102.
When the computer 170 first joins the smart network 102, the download/update engine is configured to request from the device within the smart network 102 having router functionality (e.g., smart network host device 120 or smart network connector device 150) topology information that describes the topology of the smart network 102. In particular, the topology information delineates all of the capabilities and services provided to the smart network 102 by the various devices connected to the smart network 102, including the different client devices 130. Upon receiving the topology information from the router device, the download/update engine 202 is configured to compare the topology information to the different lists of operating requirements for the applets 174 included in the set of downloaded applets 204. For a particular applet 174, if the operating requirements set forth in the list of operating requirements associated with the applet 174 is included in the topology information, then the download/update engine 202 concludes that the topology of the smart network 102 supports the operation of the applet 174 within the smart network 102. In such a case, the download/update engine 202 is configured to cause the applet 174 to be exposed to the user of the computer 170. In one embodiment, the download/update engine 202 turns on the applet 174 to expose the applet 174 to the user. If the operating requirements set forth in the list of operating requirements is not included in the topology information, then the download/update engine 202 concludes that the topology of the smart network 102 does not support the operation of the applet 174 within the smart network 102. In such a case, the download/update engine 202 causes the applet 174 to not be exposed to the user of the computer 170. Because the applets 174 included in the set of downloaded applets 204 are typically turned off when the computer 170 first joins the smart network 102, in one embodiment, not exposing the applet 174 entails not turning on the applet 174.
In this fashion, download/update engine 202 exposes to the user of the computer 170 only the applets 174 that are able to operate properly within the smart network 102. Consequently, the user advantageously does not see any “grayed out” applets on the display of computer 170, and each applet shown to the user on the display is guaranteed to launch and operate properly for the user.
In other embodiments, certain applets 174 may be configured to operate only within a particular network that may or may not be the smart network 102. In such embodiments, the applet 174 is associated with a specific router device identifier, like a media access control (MAC) address or other unique identifier. The upload/update engine 202 is configured to keep track of which applets 174 in the set of downloaded applets 204 are associated with these types of router device identifiers. The upload/update engine is further configured to request from the device in the smart network 102 having router functionality the MAC address or other unique identifier associated with that device. Upon receiving the MAC address or other unique identifier, for each applet 174 in the set of downloaded applets 204, the download/update engine is configured to compare that MAC address or other unique identifier with the specific router device identifier, if any, associated with the applet 174. If the specific router identifier associated with the applet 174 does not match the MAC address or other unique identifier received from the device within the smart network 102 having router functionality, then the download/update engine 202 concludes that the applet 174 is not permitted to operate within the smart network 102 and does not expose the applet 174 to the user of the computer 170. If the specific router identifier associated with the applet 174 matches the MAC address or other unique identifier received from the device with the smart network 102 having router functionality, then the download/update engine 202 concludes that the applet 174 is permitted to operate within the smart network 102. One should note that, in cases where an applet 174 is not associated with any specific router device identifier, the download/update engine 202 is configured to conclude that applet 174 is permitted to operate within the smart network 102. In cases where the download/update engine 202 concludes that the applet 174 is permitted to operate within the smart network 102, the download/update engine 202 is configured to cause the applet 174 to be exposed to the user of the computer 170 only if the topology of the smart network 102 properly supports the operation of the applet 174, as described above.
In yet other embodiments, after the computer 170 is connected to the smart network 102, and an initial set of applets 174 in the set of downloaded applets 204 has been exposed to the user of the computer 170, the download/update engine 202 is configured to monitor the smart network 102 for any changes in the topology of the smart network 102. A change in the topology of the smart network 102 may be caused by one or more devices joining the smart network 102, including the computer 170 initially joining the smart network 102, or by one or more devices disconnecting from the smart network 102. In such cases, the download/update engine 202 is configured to request again from the device in the smart network 102 having routing functionality the topology information that describes the topology of the smart network 102. The download/update engine 202 is configured to reevaluate which applets 174 in the set of downloaded applets 204 are supported by the new topology of the smart network 102. In so doing, the download/update engine 202 follows the same process described above in determining whether the topology of the smart network 102 supports the operation of a particular applet 174 within the smart network 102 and then either causing the that applet 174 to be exposed or to not be exposed to the user of the computer 170. However, in cases where the download/update engine 202 concludes that the applet 174 should not be exposed to the user, and the applet 174 had been turned on previously and exposed to the user, the download/update engine is configured to turn off the applet 174.
In operation, the applet portal application 172 hosts a web browser control (not shown) that operates as an execution container for a particular downloaded applet 204 that is currently loaded. Alternatively, the computer 170 may include a web browser (not shown) within which any downloaded applet 204 may be executed. To load the downloaded applet 204, the applet portal application 172 injects the applet communication layer 206 and the bridge 208 into the context of the web browser control. The applet communication layer 206 exposes a set of high-level application program interfaces (APIs) that allow the downloaded applet 204 to communicate with the system resources of the computer 170 as well as the smart network host device 120 and the corresponding client devices 130 in an intuitive manner. The applet communication layer 206 wraps the bridge 208, such that APIs exposed by the applet communication layer 206 internally call into the methods exposed by the bridge 208.
The bridge 208 provides an interface between the applet communication layer 206 and the network communication layer 210. The bridge 208 exposes methods to the applet communication layer 206 that allow the downloaded applet 204 to invoke pre-defined actions on the corresponding client devices 130, subscribe to and unsubscribe from events that can be raised within the smart network 102, etc. These methods, when executed, call on underlying functions provided by the network communication layer 210 to interact with the smart network 102. In addition, the bridge 208 exposes methods that, when executed, allow the applet 204 to interact with an operating system (not sown) executing within the computer 170 to access system-level resources, such as a file system, network input/output, etc.
The network communication layer 210 is configured with logic that enables the communication between the client devices 130 specified by the bridge 208 via the smart network host. The network communication layer 210 also enables the downloaded applet 204 to interact with the smart network host device 120. For example, the network communication layer 210 can embody a security model related to the smart network host device 120 to allow or disallow commands and requests that can be transmitted to devices within the smart network 102. In one embodiment, the network communication layer 210 is separate from the applet portal 172 to provide services to external callers regardless of whether the applet portal 172 is executing. In such an embodiment, requests to the applet portal 172 can be queued via the separately executing network communication layer 210 when the applet portal 172 is not executing.
In one embodiment, the downloaded applet 204 and the applet communication layer 206 are implemented in Javascript, the network communication layer 210 is implemented in C++, and the bridge 208 provides an interface between the Javascript layer and the C++ layer.
In such a manner, the downloaded applet 204, via the tri-layered execution environment, i.e., the applet communication layer 206, the bridge 208, and the network communication layer 210, can interact with the different client devices 130 within the smart network 102. For example, the downloaded applet 204 can retrieve information about the client devices 130 within the smart network 102, perform actions on the client devices 130 and subscribe to any relevant alerts/events within the smart network 102. Based on the interactions, the downloaded applet 204 can either configure the corresponding client devices 130 to operate as desired, or provide additional functionality to a user that is built on top of the various services exposed by the corresponding client devices 130.
The method 300 begins in step 305, where the download/update engine 202 residing within computer 170 determines that compute 170 had joined the smart network 102. In step 310, the download/update engine 202 requests topology information associated with the smart network 102 from the device within the smart network 102 having router functionality (e.g., smart network host device 120 or smart network connector device 150). As previously discussed herein, the topology information delineates all of the capabilities and services provided to the smart network 102 by the various devices connected to the smart network 102, including the different client devices 130. The download/update engine 202 also requests a router device identifier from that device as well. In step 315, the download/update engine 202 receives the topology information and the router device identifier from the device on the smart network 102 from which that information was requested.
In step 320, for each applet 174 in the set of downloaded applets 204, the download/update engine 202 determines whether the applet 174 is permitted to operate within the smart network 102. In some instances, a particular applet 174 may be configured to operate only in a specifically designated network. That network may be identified by a particular router device identifier, such as the MAC address of a particular router device or some other unique identifier of that router device. Therefore, in one embodiment, for each applet 174 associated with a particular router device identifier, the download/update engine 202 compares that router device identifier to the router device identifier associated with the smart network 102 and received by the download/update engine 202 in step 315. If the router device identifier associated with the applet 174 matches the router device identifier associated with the smart network 102, then the download/update engine 202 concludes that the applet 174 is permitted to operate within the smart network 102. If the two router device identifiers do not match, then the download/update engine 202 concludes that the applet 174 is not permitted to operate within the smart network 102. In one embodiment, if an applet 174 happens to not be associated with any router device identifier, then, as a default, the download/update engine 202 concludes that the applet 174 is permitted to operate within the smart network 102.
If, in step 320, an applet 174 is not permitted to operate within the smart network 102, then, in step 330, the download/update engine 202 causes the applet 174 to not be exposed to the user of computer 170. In one embodiment, not exposing the applet 174 means that the applet 174 is not turned on. For the applets 174 in step 320 that are permitted to operate within the smart network 102, the method proceeds to step 325.
In step 325, for each applet 174 permitted to operate within the smart network 102, the download/update engine 202 compares the topology information associated with the smart network 102 with the operating requirements associated with the applet 174. In step 335, for each applet 174 permitted to operate within the smart network 102, the download/update engine 202 determines whether the topology of the smart network 102 supports the operation of that applet 174. If the operating requirements associated with the applet 174 are included in the topology information associated with the smart network 102, then the download/update engine 202 concludes that the operation of the applet 174 is supported, and the method proceeds to step 340, where the download/update engine 202 causes the applet 174 to be exposed to the user of computer 170. In one embodiment, to expose an applet 174 to the user of computer 170, the download/update engine 202 turns on the applet 174. If, however, the operating requirements associated with the applet 174 are not included in the topology information associated with the smart network 102, then the download/update engine 202 concludes that the operation of the applet 174 is not supported by the topology of the smart network 102, and the method returns to step 330.
In step 345, the download/update engine 202 monitors the smart network for topology changes. As persons skilled in the art will recognize, a topology change occurs whenever a device is added to or removed from the smart network 102. If, in step 350, download/update engine determines that no change in the topology has occurred, then download/update engine 202 returns to step 345 and continues to monitor the smart network 102 for topology changes. If, in step 350, download/update engine determines that a change in the topology of the smart network 102 has occurred, then the method proceeds to step 355, where the download/update engine 202 requests topology information associated with the new topology of the smart network 102 from the device within the smart network 102 having router functionality. In step 360, the download/update engine 202 receives the new topology information from the device within the smart network 102 having routing functionality. The method then returns to step 320, wherein the download/update engine 202 determines which of the applets 174 in the set of downloaded applets 204 residing on computer 170 are permitted to operate within the smart network 102, as previously described herein.
Persons skilled in the art will recognize that, in returning to step 320, any applet 174 in the set of downloaded applets 204 that has already been turned on by the download/update engine 202 is retested for operational compatibility with the new topology of the smart network 102. If, upon returning to step 335, the download/update engine 202 determines that the new topology of the smart network 102 does not support the operation of any such applet 174, then, upon returning to step 330, the download/update engine 202 turns off that applet 174 so that the applet 174 is no longer exposed to the user of computer 170. Further, in returning to step 320, any new applet 174 downloaded to computer 170 while computer 170 is connected to the smart network 102 is analyzed first to determine whether that applet is permitted to operate within the smart network 102 and, if so, then to determine whether the topology of the smart network 102 supports the operation of that applet 174 within the smart network 102, as previously described herein.
Various embodiments may be implemented as program products for use with a computer system. The program(s) of the program product define functions of the embodiments (including the methods described herein) and can be contained on a variety of computer-readable storage media. Illustrative computer-readable storage media include, but are not limited to: (i) non-writable storage media (e.g., read-only memory devices within a computer such as CD-ROM disks readable by a CD-ROM drive, flash memory, ROM chips or any type of solid-state non-volatile semiconductor memory) on which information is permanently stored; and (ii) writable storage media (e.g., floppy disks within a diskette drive or hard-disk drive or any type of solid-state random-access semiconductor memory) on which alterable information is stored. Another embodiment may be implemented as a program product deployed for use over a network. In such an embodiment, the program product may be accessed via a web browser.
The disclosure has been described above with reference to specific embodiments. Persons skilled in the art, however, will understand that various modifications and changes may be made thereto without departing from the broader spirit and scope of the disclosure as set forth in the appended claims. The foregoing description and drawings are, accordingly, to be regarded in an illustrative rather than a restrictive sense.