The application pertains to monitoring various aspects of devices or equipment coupled to networks, as well as monitoring the networks. More particularly, the application pertains to such systems and methods which utilize a monitoring system, coupled to the network to monitor the presence and condition of network connected assets. The condition of the network itself can also be monitored.
The security (tracking) of assets (e.g. printers, PCs, servers, site specific electronic devices, ‘embedded’ electronic equipment, and other items) in a system using a security system is traditionally implemented by detecting physical movement of a device beyond a predefined threshold.
However this approach has problems: Each device requires a connected physical sensor. This leads to additional material, installation and maintenance costs for the end user. If the asset tracking devices use RF communications the management of the batteries could be perceived as an issue.
Additionally the health of the network and network connected devices is currently considered outside the scope of a standard, intrusion detection security system.
While disclosed embodiments can take many different forms, specific embodiments thereof are shown in the drawings and will be described herein in detail with the understanding that the present disclosure is to be considered as an exemplification of the principles thereof as well as the best mode of practicing same, and is not intended to limit the application or claims to the specific embodiment illustrated.
In one aspect, if the security system has a permanent Ethernet connection that is always on, it is possible to use this as an alternate method for detecting removal of an Ethernet connected asset. Removal alarms can be generated.
An additional problem that could be solved with an embodiment that combines an alarm system with a permanent Ethernet connection This configuration provides a platform to monitor the network and provide information on characteristics like device and bandwidth availability and provide alerts based on preset local parameters. This device and network “health” information can relates to available bandwidth (either internal or external) and other characteristics that the system and connected devices can provide.
For example, if a network printer is not responding to network pings whilst that area/partition of the security system is not armed, then the security system can notify (via email, web form submission, SMS text, voice message or other method) the appropriate person perhaps locally. If the system is armed, then a different set of individuals can be notified. For example, monitoring individuals at an alarm receiving center so they can decide on the best course of action.
In another example, the security system could keep a log of Internet availability and signal via alternate communication paths if outages occur.
Using the permanently connected Ethernet connection the alarm system control panel can provide various functions not previously available with monitoring systems. For example, it can monitor devices that are connected to the same network. The alarm system user can be provided with a list of devices connected to the network. The end user can select these devices from the list.
If a device is disconnected from the network for a predefined amount of time then the system can trigger an alert. In yet another aspect, when a permanently connected Ethernet line is in place the alarm system can provide additional functionality. For example, constant (i.e. 24/7) monitoring of the network is possible. Available bandwidth can be monitored and logged (possibly on a central server). Such real-time information can be used to provide information on the “health” of the network. This capability is not normally a feature of an alarm system. Also, future faults can be predicted, for example, if the available bandwidth decreases gradually over time an alarm indication can be generated. In yet another aspect, data and potential debug information can be provided after a network fault.
Information can be collected and provided on the ‘health’ of devices on the network. This function provides additional features in an alarm system. Finally, more complex checks can be implemented on specific devices, using an installer or IT manager configuration interface.
System 12 can communicate via an interface 16 and Ethernet 18 as would be understood by those of skill in the art. Communications of the system 12, via the interface 16 to the Ethernet 18 are available on a 24×7 basis. This can be characterized as an “always on” communications environment.
Other network enabled devices, such as 20a, 20b, 20c are always on assets and can include without limitation printers, PCs, servers, Internet portals, input devices, site specific electronic devices, and embedded electronic equipment all without limitation.
When enabled as discussed above, the monitoring system 12 can, via interface 16 and Ethernet 18, monitor status, availability or other parameters of the network assets 20i. Information or reports as to such conditions or availability can be provided via a local audio/visual system interface 16-1, or at a wireless user communications device 22 all without limitation.
In yet another embodiment, the monitoring system 12 can monitor conditions on the network 18. Information pertaining to traffic, available bandwidth and the like can also be provided to user(s) via the interface 16-1, or the communications device 22. Such information can be collected at a cloud service site 30 having a plurality of servers, such as 32-1 which communicate via a router 32-1 and a computer network such as the Internet I.
Alternately, instead of the system 12 carrying out the network and asset monitoring, one or more of the servers 32-1 can remotely monitor the conditions or characteristics of the assets 20i and the network 18.
In summary, asset security can be provided with an Ethernet connected security panel (or equivalent system—either locally or remotely, for instance, via a remote server or on ‘cloud’ service), with the addition of services for IT equipment and network monitoring. An embodiment could include a security system with: an Ethernet or similar network connection connected to the local IT infrastructure.
Configuration information, such as network parameters or characteristics, parameters of network devices, network characteristics of interest could be entered either by the installation engineer, site operator, local IT staff or other local management or users. Various reporting methods as appropriate to the situation can be provided. For instance if unarmed, a local notification to on-site staff to check equipment could be provided. During times when the system is armed, responsible persons could be notified, or, an alarm receiving center could be notified to take further action.
Such systems could advantageously provide facilities for quick enrollment using phones, tablets, PC computers or other interfaces. Remote facilities could be contactable with reporting problems. Multiple persons or machines can be involved in processing problems, depending upon their type.
From the foregoing, it will be observed that numerous variations and modifications may be effected without departing from the spirit and scope hereof. It is to be understood that no limitation with respect to the specific apparatus illustrated herein is intended or should be inferred. It is, of course, intended to cover by the appended claims all such modifications as fall within the scope of the claims. Further, logic flows depicted in the figures do not require the particular order shown, or sequential order, to achieve desirable results. Other steps may be provided, or steps may be eliminated, from the described flows, and other components may be add to, or removed from the described embodiments.