1. Field of the Invention
The present invention is directed to technology for creating a public identity for an entity on a network.
2. Description of the Related Art
Most machines on the Internet use the Transmission Control Protocol/Internet Protocol (TCP/IP) reference model to send data to other machines on the Internet. The TCP/IP reference model includes four layers: the physical and data link layer, the network layer, the transport layer, and the application layer. The physical layer portion of the physical and data link layer is concerned with transmitting raw bits over a communication channel. The data link portion of the Physical and Data Link layer takes the raw transmission facility and transforms it into a line that appears to be relatively free of transmission errors. It accomplishes this task by having the sender break the input data up (or encapsulate) into frames, transmit the frames, and process the acknowledgment frames sent back by the receiver.
The network layer permits a host to inject packets into a network and have them travel independently to the destination. On the Internet, the protocol used for the network layer is the Internet Protocol (IP).
The transport layer is designed to allow peer entities on the source and destination to carry on a “conversation.” On the Internet, two protocols are used. The first one, the Transmission Control Protocol (TCP), is a reliable connection-oriented protocol that allows a byte stream originating on one machine to be delivered without error to another machine on the Internet. It fragments the incoming byte stream into discrete packets and passes each one to the network layer. At the destination, the receiving TCP process reassembles the received packets into the output stream. TCP also handles flow control to make sure a fast sender cannot swamp a slow receiver with more packets than it can handle and manages congestion. The second protocol used in the transport layer on the Internet is the User Datagram Protocol (UDP), which does not provide the TCP sequencing or flow control. UDP is typically used for one-shot, client server type requests-reply queries for applications in which prompt delivery is more important than accurate delivery.
The transport layer is typically thought of as being above the network layer to indicate that the network layer provides a service to the transport layer. Similarly, the transport layer is typically thought of as being below the application layer to indicate that the transport layer provides a service to the application layer.
The application layer contains the high level protocols, for example, Telnet, File Transfer Protocol (FTP), Electronic Mail—Simple Mail Transfer Protocol (SMTP), and Hypertext Transfer Protocol (HTTP).
To transmit data from a source to a destination, the Internet Protocol uses an IP address. An IP address is four bytes long, and consists of a network number and a host number. When written out, IP addresses are specified as four numbers separated by dots (e.g. 198.68.70.1). Users and software applications do not always refer to hosts or other resources by their numerical IP address. Instead of using numbers, they use ASCII strings called domain names. The Internet uses a Domain Name System (DNS) to convert a domain name to an IP address.
The Internet Protocol has been in use for over two decades. It has worked extremely well, as demonstrated by the exponential growth of the Internet. Unfortunately, the Internet is rapidly becoming a victim of its own popularity: it is running out of addresses.
One proposed solution to the depleting address problem is Network Address Translation (NAT). This concept includes predefining a number of network addresses to be private addresses. The remainder of the addresses is considered global or public addresses. Public addresses are unique addresses that should only be used by one entity having access to the Internet. That is, no two entities on the Internet should have the same public address. Private addresses are not unique and are typically used for entities not having direct access to the Internet. Private addresses can be used by more than one organization or network. In the past, a private address could not be used to route on the Internet. NAT assumes that all of the machines on a network will not need to access the Internet at all times. Therefore, there is no need for each machine to have a public address. A local network can function with one or a small number of public addresses assigned to one or more gateway computers. The remainder of the machines on the network will be assigned private addresses. Since entities on the network have private addresses, the network is considered to be a private network.
When a particular machine having a private address on the private network attempts to initiate a communication with a machine outside of the private network (e.g. via the Internet), the gateway machine will intercept the communication, change the source machine's private address to a public address, change the port number and set up a table for translation between public addresses and private addresses. The table can contain the destination address, port numbers, sequencing information, byte counts and internal flags for each connection associated with a host address. Inbound packets are compared against entries in the table and permitted through the gateway only if an appropriate connection exists to validate their passage. One problem with the NAT approach is that it only works for communication initiated by a host within the private network to a host on the Internet which has a public IP address. The NAT approach specifically will not work if the communication is initiated by a host outside of the private network and is directed to a host with a private address in the private network.
Another problem is that mobile computing devices can be moved to new and different networks, including private networks. These mobile computing devices may need to be reachable so that a host outside of the private network can initiate communication with the mobile computing device. However, in this case the problem is two-fold. First, there is no means for allowing the host outside of the private network to initiate communication with the mobile computing device in the private network. Second, the host outside the private network does not know the address for the mobile computing device or the network that the mobile computing device is currently connected to.
The present invention, roughly described, pertains to a system for establishing a public identity for an entity on a network. A first entity can initiate a request to create a binding of a public address to a private address for itself. The existence of this public address for the first entity can be made known so that other entities can use the public address to communicate with the first entity. The present invention allows entities outside of a private network to initiate communication with an entity inside the private network.
One embodiment of the present invention includes a first entity electronically requesting a public address for itself. The first entity has a private address prior to requesting the public address. The first entity electronically receives and stores the public address, and communicates using the public address. In one implementation, the first entity connected to the network and received the private address for the network prior to requesting the public address.
In some embodiments, the first entity publishes its public address for other entities to find. For example, the public address can be stored in a DNS resource record or on a server connected to the Internet for purposes of storing public identities. Using the first entity's domain name, or another identifier, other entities can find the public address for the first entity and initiate communication with the first entity.
The present invention can be accomplished using hardware, software, or a combination of both hardware and software. The software used for the present invention is stored on one or more processor readable storage media including hard disk drives, CD-ROMs, DVDs, optical disks, floppy disks, tape drives, RAM, ROM or other suitable storage devices. In alternative embodiments, some or all of the software can be replaced by dedicated hardware including custom integrated circuits, gate arrays, FPGAs, PLDs, and special purpose computers.
These and other objects and advantages of the present invention will appear more clearly from the following description in which the preferred embodiment of the invention has been set forth in conjunction with the drawings.
The various components of
In one embodiment of the present invention, host A is assigned a private address from DHCP server 14 upon connection to network 10. Host A subsequently requests gateway 12 to provide host A with a public address and to bind that public address to the private address for host A. Host A subsequently publishes its new public address with server 30. Host B is a computer (or other entity) with a public IP address. Host B knows the domain name for host A; however, host B does not know an address for host A. According to the present invention, host B requests server 30 to resolve the domain name for host A. Server 30 responds to host B's request by returning the new public address for host A. Host B creates a communication for host A and sends that communication to host A using the public address received from server 30.
The present invention pertains to the creation of a binding of a public identity to a private identity for an entity on a network. For the current state of the Internet, domain names, private IP addresses and public IP addresses can be used. For other networks, protocols, configurations, situations and scenarios, identifiers other than domain names and IP addresses can be used according to the present invention. For purposes of this document, the term “address” has a broader meaning than the concept of an IP address. That is, the term “address” is used in this document to mean something that is used to locate or identify an entity or thing
Upon receiving the ACKNOWLEDGEMENT, gateway 12 will bind the public address offered to host A to the private address for host A. Additionally, local tables that need to be updated will be updated. For example, in one embodiment gateway 12 (or another entity on network 10) will maintain a table that associates IP addresses with MAC addresses (e.g. addresses of Ethernet devices). Such a table will be updated to associate the MAC address for host A with the new public IP address for host A. Other tables may also be updated, as suitable for the particular implementation. In other embodiments, gateway 12 can assign public IP addresses in a manner more similar to DHCP.
In one embodiment, host A has a domain name and one or more DNS resource records stored on the Internet according to the standard Domain Name System. One embodiment of publishing the new public IP address for host A (step 108 of
Resource records are used to resolve a domain name. A resolver process converts the domain name to an IP address. Entities that have public addresses and communicate on the Internet have a set of resource records associated with it. When a resolver process gives a domain name to the domain name system, it gets back the resource records associated with that domain name.
A resource record has five fields: domain name, time to live, class, type and value. The time to live field provides an indication of how stable the record is. Information that is highly stable is assigned a large value such as the number of seconds in a day. The third field is the class. For the Internet the class is IN. The fourth field indicates the type of resource record. One domain may have many resource records. There are at least eight types of resource records that are of interest to this discussion: SOA, A, MX, NS, CNAME, PTR, HINFO, and TXT. The value field for an SOA record provides the name of the primary source of information about the name server zone, e-mail address of its administrator, a unique serial number and various flags and time outs in the value field. The value field for an A record holds a 32 bit IP address for the host. The value field for the MX record holds the domain name of the entity willing to accept e-mail for that particular domain name. The NS record specifies name servers. The CNAME record allows aliases to be created in the value field. A PTR record points to another name in the value field, which allows look up of an IP address for a particular domain name. The value field of the HINFO record indicates the type of machine and operating system that the domain name corresponds to. An example of resource records for a host is found below in Table 1.
Table 1 includes three resource records for an entity with a domain name of saturn.ttc.com. The first resource record indicates a time to live of 86,400 seconds (one day). The type of record is HINFO and the value indicates that the entity is a Sun workstation running the UNIX operating system. The second line is a resource record of type A, which indicates that the IP address for saturn.ttc.com is 198.68.70.1. The third line indicates that e-mail for saturn.ttc.com should be sent to mars.ttc.com. It is likely that there will also be a DNS resource record that indicates the IP address for mars.ttc.com.
The DNS name space is divided into non-overlapping zones. Each zone is some part of the Internet space and contains name servers holding the authoritative information about that zone. Normally, a zone will have one primary name server and one or more secondary name servers which get their information from the primary name server. When a resolver process has a query about a domain name, it passes the query to one of the local name servers. If the host being sought falls under the jurisdiction of that name server, then that domain name server returns the authoritative resource record. An authoritative record is one that comes from the authority that manages the record. If, however, the host is remote and no information about the requested host is available locally, the name server sends a query message to the top level name server for the host requested. The top level name server will then provide the resource records to the local name server which may cache the information and forward it to the original resolver process. Since the cached information in the local name server is not the authoritative record, the time to live field is used to determine how long to use that information. The resource records for host A can be updated by using Dynamic DNS or other protocols/methods known in the art.
Another embodiment of publishing the new public IP address for host A (step 108 of
After host A (or another entity) has published its new public identity, other entities outside of private network 10 can communicate with host A. These communications can be initiated by host A or an entity outside of private network 10. In one embodiment, communications between host A and entities outside of private network 10 are sent to each other directly using the public IP address published for host A. In other embodiments, communications between host A and entities outside of private network 10 are sent to each other via gateway 12, where gateway 12 provides a translation as described below. Note that in one embodiment, the public IP address for host A is routable to gateway 12.
In one embodiment of the process of
In another embodiment of the process of
Upon receiving the packets, host A responds to the communication from host B. This response includes creating one or more IP packets in step 312. These IP packets use the private IP address for host A as the source address. The destination address for these packets is the public IP address for host B. These packets are sent from host A using the private address for host A in step 314. The packets are received at gateway 12 in step 316. Gateway 12 translates the packets in step 318. As discussed above, the translation can include encapsulating the packets or changing the source address for the packets from the private IP address for host A to the public IP address for host A. In step 320, gateway 12 sends the packets to host B using the public address for host A as the source address. Note that in the embodiments of
In step 414, host B creates packets for host A using the received public IP address for host A as the destination address. In step 416, host B sends the created packets to host A. After receiving the IP packets, host A creates a response to host B in step 418. This response includes one more IP packets. The IP packets created by host A use the public IP address for host A as the source address. These packets created by host A are sent to host B in step 420. Host A and host B can continue to communicate with each other using steps 414-420. Note that the processes of
The foregoing detailed description of the invention has been presented for purposes of illustration and description. It is not intended to be exhaustive or to limit the invention to the precise form disclosed. Many modifications and variations are possible in light of the above teaching. The described embodiments were chosen in order to best explain the principles of the invention and its practical application to thereby enable others skilled in the art to best utilize the invention in various embodiments and with various modifications as are suited to the particular use contemplated. It is intended that the scope of the invention be defined by the claims appended hereto.
This application is a divisional of U.S. patent application Ser. No. 10/161,573, filed on Jun. 3, 2002, the entirety of which is incorporated herein by reference. This application is also related to the following patents/applications: DOMAIN NAME ROUTING, Hasan S. Alkhatib, U.S. Pat. No. 6,119,171; IPNET GATEWAY, Hasan S. Alkhatib and Bruce C. Wootton, U.S. application Ser. No. 09/167,709, filed on Oct. 6, 1998; and PSEUDO ADDRESSING, Wootton, et al., U.S. application Ser. No. 09/637,803, filed on Aug. 11, 2000. Each of the related Patents/Applications are incorporated herein by reference.
Number | Name | Date | Kind |
---|---|---|---|
5159592 | Perkins | Oct 1992 | A |
5361256 | Doeringer | Nov 1994 | A |
5563878 | Blakely | Oct 1996 | A |
5623605 | Keshav | Apr 1997 | A |
5701427 | Lathrop | Dec 1997 | A |
5717686 | Schiavoni | Feb 1998 | A |
5717687 | Minot | Feb 1998 | A |
5734651 | Blakely | Mar 1998 | A |
5751961 | Smyk | May 1998 | A |
5754938 | Herz et al. | May 1998 | A |
5764906 | Edelstein | Jun 1998 | A |
5777989 | McGarvey | Jul 1998 | A |
5781550 | Templin | Jul 1998 | A |
5790548 | Sistainizadeh | Aug 1998 | A |
5793763 | Mayes | Aug 1998 | A |
5805818 | Perlman | Sep 1998 | A |
5805820 | Bellovin | Sep 1998 | A |
5815664 | Asano | Sep 1998 | A |
5826014 | Coley et al. | Oct 1998 | A |
5856974 | Gervais | Jan 1999 | A |
5864666 | Shrader | Jan 1999 | A |
5867667 | Butman | Feb 1999 | A |
5884038 | Kapoor | Mar 1999 | A |
5884246 | Boucher | Mar 1999 | A |
5889953 | Thebaut | Mar 1999 | A |
5897662 | Corrigan | Apr 1999 | A |
5898830 | Wesinger, Jr. et al. | Apr 1999 | A |
5913210 | Call | Jun 1999 | A |
5937162 | Funk | Aug 1999 | A |
5937163 | Lee | Aug 1999 | A |
6003084 | Green | Dec 1999 | A |
6006272 | Aravamudan | Dec 1999 | A |
6032196 | Monier | Feb 2000 | A |
6047325 | Jain | Apr 2000 | A |
6055236 | Nessett | Apr 2000 | A |
6055575 | Paulsen | Apr 2000 | A |
6058431 | Srisuresh et al. | May 2000 | A |
6061349 | Colie | May 2000 | A |
6061738 | Osaku | May 2000 | A |
6101543 | Alden | Aug 2000 | A |
6119171 | Alkhatib | Sep 2000 | A |
6122276 | Boe et al. | Sep 2000 | A |
6128664 | Yanagidate et al. | Oct 2000 | A |
6137791 | Frid | Oct 2000 | A |
6154777 | Ebrahim | Nov 2000 | A |
6154839 | Arrow | Nov 2000 | A |
6173399 | Gilbrech | Jan 2001 | B1 |
6219715 | Ohno et al. | Apr 2001 | B1 |
6226751 | Arrow et al. | May 2001 | B1 |
6243749 | Sitaraman et al. | Jun 2001 | B1 |
6249801 | Zisapel | Jun 2001 | B1 |
6266707 | Boden et al. | Jul 2001 | B1 |
6304906 | Bhatti et al. | Oct 2001 | B1 |
6353614 | Borella | Mar 2002 | B1 |
6353886 | Howard | Mar 2002 | B1 |
6381638 | Mahler | Apr 2002 | B1 |
6421732 | Alkhatib | Jul 2002 | B1 |
6430622 | Aiken, Jr. | Aug 2002 | B1 |
6430623 | Alkhatib | Aug 2002 | B1 |
6438597 | Mosberger et al. | Aug 2002 | B1 |
6438612 | Ylonen et al. | Aug 2002 | B1 |
6452925 | Sistanizadeh et al. | Sep 2002 | B1 |
6457061 | Bal | Sep 2002 | B1 |
6477565 | Daswani et al. | Nov 2002 | B1 |
6480508 | Mwikalo | Nov 2002 | B1 |
6490289 | Zhang et al. | Dec 2002 | B1 |
6496867 | Beser et al. | Dec 2002 | B1 |
6507873 | Suzuki et al. | Jan 2003 | B1 |
6510154 | Mayers | Jan 2003 | B1 |
6523068 | Beser et al. | Feb 2003 | B1 |
6556584 | Horsley et al. | Apr 2003 | B1 |
6557037 | Provino | Apr 2003 | B1 |
6557306 | Sekiya | May 2003 | B1 |
6591306 | Redlich | Jul 2003 | B1 |
6594704 | Birenback | Jul 2003 | B1 |
6618757 | Babbitt | Sep 2003 | B1 |
6629137 | Wynn | Sep 2003 | B1 |
6631416 | Bendinelli et al. | Oct 2003 | B2 |
6651101 | Gai | Nov 2003 | B1 |
6657991 | Akgun et al. | Dec 2003 | B1 |
6662223 | Zhang | Dec 2003 | B1 |
6697377 | Ju | Feb 2004 | B1 |
6701437 | Hoke et al. | Mar 2004 | B1 |
6708219 | Borella | Mar 2004 | B1 |
6722210 | Armstrong | Apr 2004 | B2 |
6731642 | Borella | May 2004 | B1 |
6742045 | Albert | May 2004 | B1 |
6747979 | Banks | Jun 2004 | B1 |
6754706 | Swildens | Jun 2004 | B1 |
6772210 | Edholm | Aug 2004 | B1 |
6778528 | Blair et al. | Aug 2004 | B1 |
6779035 | Gbadegesin | Aug 2004 | B1 |
6781982 | Borella et al. | Aug 2004 | B1 |
6832322 | Boden | Dec 2004 | B1 |
6865184 | Thubert et al. | Mar 2005 | B2 |
6948003 | Newman et al. | Sep 2005 | B1 |
6961783 | Cook et al. | Nov 2005 | B1 |
6970941 | Caronni | Nov 2005 | B1 |
6973485 | Ebata et al. | Dec 2005 | B2 |
6978317 | Anantha et al. | Dec 2005 | B2 |
6981020 | Miloslavsky et al. | Dec 2005 | B2 |
6982953 | Swales | Jan 2006 | B1 |
6983319 | Lu | Jan 2006 | B1 |
6993012 | Liu | Jan 2006 | B2 |
6993595 | Luptowski et al. | Jan 2006 | B1 |
6996628 | Keane et al. | Feb 2006 | B2 |
6996631 | Aiken et al. | Feb 2006 | B1 |
7003481 | Banka et al. | Feb 2006 | B2 |
7010702 | Bots | Mar 2006 | B1 |
7028333 | Tuomenoksa et al. | Apr 2006 | B2 |
7028334 | Tuomenoksa et al. | Apr 2006 | B2 |
7032242 | Grabelsky | Apr 2006 | B1 |
7054322 | D'Annunzio et al. | May 2006 | B2 |
7058052 | Westphal | Jun 2006 | B2 |
7068655 | March et al. | Jun 2006 | B2 |
7072337 | Arutyunov et al. | Jul 2006 | B1 |
7072935 | Kehoe et al. | Jul 2006 | B2 |
7085854 | Keane et al. | Aug 2006 | B2 |
7092390 | Wan | Aug 2006 | B2 |
7107464 | Shapira | Sep 2006 | B2 |
7107614 | Boden et al. | Sep 2006 | B1 |
7110375 | Khalil et al. | Sep 2006 | B2 |
7120676 | Nelson et al. | Oct 2006 | B2 |
7120701 | Warrier et al. | Oct 2006 | B2 |
7133368 | Zhang et al. | Nov 2006 | B2 |
7139828 | Alkhatib et al. | Nov 2006 | B2 |
7181542 | Tuomenoksa et al. | Feb 2007 | B2 |
7194553 | Lucco | Mar 2007 | B2 |
7227864 | Collins et al. | Jun 2007 | B2 |
7263719 | Jemes et al. | Aug 2007 | B2 |
7327721 | Balasaygun et al. | Feb 2008 | B2 |
7379465 | Aysan et al. | May 2008 | B2 |
7424737 | Wesinger et al. | Sep 2008 | B2 |
7490151 | Munger et al. | Feb 2009 | B2 |
7526658 | He et al. | Apr 2009 | B1 |
7606191 | Breau et al. | Oct 2009 | B1 |
7609701 | Yang et al. | Oct 2009 | B2 |
7653747 | Lucco et al. | Jan 2010 | B2 |
7715380 | Somasundaram | May 2010 | B2 |
7787428 | Furukawa et al. | Aug 2010 | B2 |
7814228 | Caronni et al. | Oct 2010 | B2 |
7814541 | Manvi | Oct 2010 | B1 |
7840701 | Hsu et al. | Nov 2010 | B2 |
7860098 | Biswas et al. | Dec 2010 | B1 |
20010027474 | Nachman et al. | Oct 2001 | A1 |
20010050914 | Akahane et al. | Dec 2001 | A1 |
20020013848 | Rene Salle | Jan 2002 | A1 |
20020026525 | Armitage | Feb 2002 | A1 |
20020053031 | Bendinelli et al. | May 2002 | A1 |
20020056008 | Keane et al. | May 2002 | A1 |
20020078198 | Buchbinder et al. | Jun 2002 | A1 |
20020091859 | Tuomenoksa et al. | Jul 2002 | A1 |
20020099937 | Tuomenoksa | Jul 2002 | A1 |
20020103931 | Mott | Aug 2002 | A1 |
20020133534 | Forslow | Sep 2002 | A1 |
20030018912 | Boyle et al. | Jan 2003 | A1 |
20030041091 | Cheline | Feb 2003 | A1 |
20030041136 | Cheline | Feb 2003 | A1 |
20030055978 | Collins | Mar 2003 | A1 |
20030065785 | Jain | Apr 2003 | A1 |
20030074472 | Lucco et al. | Apr 2003 | A1 |
20030084162 | Johnson et al. | May 2003 | A1 |
20030123421 | Feige et al. | Jul 2003 | A1 |
20030131131 | Yamada et al. | Jul 2003 | A1 |
20030152068 | Balasaygun et al. | Aug 2003 | A1 |
20030208554 | Holder | Nov 2003 | A1 |
20030212795 | Harris et al. | Nov 2003 | A1 |
20030219000 | Magret | Nov 2003 | A1 |
20040006708 | Mukherjee et al. | Jan 2004 | A1 |
20040088542 | Daude | May 2004 | A1 |
20040111612 | Choi et al. | Jun 2004 | A1 |
20040148439 | Harvey | Jul 2004 | A1 |
20040249911 | Alkhatib | Dec 2004 | A1 |
20050177647 | Anantha et al. | Aug 2005 | A1 |
20060190607 | Lowery et al. | Aug 2006 | A1 |
20060195524 | Nichols et al. | Aug 2006 | A1 |
20060195539 | Nichols et al. | Aug 2006 | A1 |
20060212545 | Nichols et al. | Sep 2006 | A1 |
20060212599 | Lucco et al. | Sep 2006 | A1 |
20070286189 | Kreiner et al. | Dec 2007 | A1 |
20080232295 | Kreiner et al. | Sep 2008 | A1 |
20090116487 | Read | May 2009 | A1 |
20100218254 | Gray et al. | Aug 2010 | A1 |
Number | Date | Country |
---|---|---|
0817444 | Jan 1998 | EP |
Number | Date | Country | |
---|---|---|---|
20110196945 A1 | Aug 2011 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 10161573 | Jun 2002 | US |
Child | 13087937 | US |