1. Technical Field
The present invention relates generally to networking and computer networks. More specifically, the present invention relates to wireless networks and network security devices for use in new or existing wireless local area networks.
2. Background
With the advancement of computer systems and deployment of broadband internet connections, computer networks have proliferated and are now commonly found in both commercial and residential settings. The convenience of 802.11-based wireless networks has further advanced the proliferation of local area networks in both business environments and consumer residences. The security on these various computer networks can vary widely from network to network, depending on the sophistication of the network administrator and the sensitivity of the data on the networks. For the 802.11-based wireless networks, security is an even greater concern because access to these wireless networks is much harder to control than in a wired network environment.
To improve network security, additional security devices or network elements may be introduced into the network to provide upgraded protection after the initial network deployment.
The addition of these network elements after initial network deployment is less of an issue in networks where plenty of network capacity and network ports are available. Some networks, however, may not have the capacity to include these additional network elements without more significant and more costly hardware upgrades. Such hardware upgrades may not make sense from an economic perspective and deter some network administrators from taking appropriate security measures.
Even for those networks with the excess capacity or network ports to support additional security equipment, the installation costs to add the cabling to support the new equipment may be quite substantial. For example, in a commercial building, the cost for pulling and snaking additional cable through the building may equal or exceed the cost of the additional security. For a wireless local area network in this example, when a plurality of wireless access points are provided in the network, there is typically a switch in a location such as a wiring closet for connecting these access points together. The cable connecting the various wireless access points to the switch may stretch up to 100 meters in length. To pull or lay this cable, the cost may be anywhere from $300 to $1000, depending on the labor and logistics of cutting openings in walls, pulling wire in walls, laying cable in ceilings or the like. As stated previously, this cost may exceed the cost of the new security device. Thus, the economics of implementing the cabling to support the desired security equipment may again dissuade a network administrator from implementing the appropriate security measures or implement them in only a limited deployment.
The present invention provides solutions for at least some of the drawbacks discussed above. Specifically, some embodiments of the present invention provide improved methods and devices for facilitating the deployment of additional network equipment in new or existing networks. In one embodiment, the present invention is directed at deployment of network security devices. In a still further embodiment, the network device is a security device for use in a wireless local area network.
In one embodiment of the present invention, a network monitoring or security device can be connected inline with a Power over Ethernet (PoE) device such that both devices operate from the same Power over Ethernet power source and network connection. It should be understood that the network monitoring or security device may be a wireless network sensor. The Power over Ethernet device may be a wireless Access Point (AP). It should be understood that the present invention may relate to hardware design for a network security device with pass-through (passthru) power capabilities.
In another embodiment of the present invention, an apparatus is provided for use in a network to facilitate network expansion. The apparatus comprises a processor and a network interface. The network interface includes a first port for receiving power and data transmitted from a first network device and a second port for transmitting power and data to a second network device. The network interface may communicatively couple the processor to the network, wherein data received on the first port can be transmitted out the second port to an appropriate destination. It should be understood that the power received by the first port may be at a level that conforms to IEEE 802.3af standard.
In one embodiment of the present invention, the processor may be configured to route data from the first port or the second port to the appropriate destination. Data received on the second port can be transmitted out the first port. The apparatus may include a first circuit defining an input stage between the first port and the processor, wherein the input stage is configured to separate data from the power being received at the first port. The apparatus may also include a second circuit defining an output stage between the second port and the processor, wherein the output stage is configured to combine data with the power to be transmitted out the second port. The apparatus may function or operate on only a portion of the power received via the first port. In one embodiment, the apparatus may be or include a network intrusion detection sensor that operates on only a portion of the power received from the first port. A network intrusion detection sensor may be communicatively coupled to first circuit to receiving power from the first port. A wireless network intrusion detection sensor may be communicatively coupled to first circuit to receiving power from the first port. The first network device may be a Power over Ethernet switch. The first network device may be a device providing a wireless access point.
The power received by the first port may be at a level that conforms to IEEE 802.3af standard. The power transmitted by the second port may be at a level that conforms to IEEE 802.3af standard. In one embodiment, the power transmitted by the second port may be about 18 watts or less. The apparatus may have a power passthru configuration wherein power received on the first port is substantially the same as the power transmitted on the output port, without adding additional power. The processor may include includes a sensor network stack, wherein the processor is configured so that data coming upstream from a downstream network device cannot directly access the sensor network stack in the processor. The network interface may include a third port for transmitting power and data to a third network device. The processor may have a configuration sufficient to allow a software reboot of the device without interruption of power flowing through the apparatus to the second network device. The input stage may include logic configured to determine which power protocol is being used with the power being received. The output stage may include logic configured to determine which power protocol is to be used with the second network device. The input stage can be used with network devices using either IEEE 802.3af or Cisco pre-802.3af proprietary protocols. A device may be providing a function unrelated to routing of data.
In another permutation according to the present invention, a system is provided having a network connection device, a first network device, and a second network device. The first network device and the second network device may be coupled together in a network topology configured so that a single port on the network connection device supports network connectivity to both the first network device and second network device. The single port may provide power and data to an input port on the first network device. An output port on the first network device may provide power and data to the second network device. The network connection device may be a Power over Ethernet switch. The network connection device may be selected from one of the following: a hub, a switch, or a router. The network connection device may be a Power over Ethernet switch.
The power received from the single port may be at a level that conforms to IEEE 802.3af standard. The power transmitted by the first network device may be at a level that conforms to IEEE 802.3af standard. The first network device may be a network security device. The first network device may be a wireless intrusion detection sensor. The first network device may have a power passthru configuration wherein power received on a first port of the first network device is substantially the same as power transmitted on an output port of the first network device, without adding additional power from another source. A third network device may communicatively coupled to the second network device. The input port and output port may be configurable to support either IEEE 802.3af or Cisco pre-802.3af proprietary protocols.
In yet another embodiment according to the present invention, a system is provided having a network connection device, a network security device; and a network device providing a wireless access point. The network security device and the wireless access point may be coupled together in a network topology configured so that a single port on the network connection device supports network connectivity to both the network security device and the wireless access point. The network security device may have a power passthru configuration wherein power received on a first port of the security device is substantially the same as power transmitted on an output port of the security device, without adding additional power from another source.
The network connection device may be selected from one of the following: a hub, a switch, or a router. The network connection device may be a Power over Ethernet switch. The network security device may be both communicatively coupled to the same port on the network connection device. The network topology may include a network connection device communicatively coupled to the network security device which is communicatively coupled to the wireless access point. In one embodiment, a first port on the network security device may receive power and data from the single port on the network connection device. A second port on the network security device may transmit power and data to the wireless access point. In another embodiment, a first port on the network security device receives only data from the single port on the network connection device and a second port on the network security device transmits power and data to the wireless access point, wherein the power is transmitted by the network security device without receiving power from the network connection device. In yet another embodiment, a first port on the network security device receives only data from the single port on the network connection device; a second port on the network security device transmits only data to the wireless access point, wherein the network security device and the wireless access point each receive power from their own power source.
The network topology may comprise of the network connection device communicatively coupled to the wireless access point which is in turn communicatively coupled to the network security device. In another embodiment, a first port on the wireless access point receives power and data from the single port on the network connection device while a second port on the wireless access point transmits power and data to the network security device. In a still further embodiment, a first port on the wireless access point receives only data from the single port on the network connection device while a second port on the wireless access point transmits power and data to the network connection device, wherein the power is transmitted by the wireless access point without receiving power from the network connection device. In another embodiment, a first port on the wireless access point receives only data from the single port on the network connection device while a second port on the wireless access point transmits only data to the network security device, wherein the network security device and the wireless access point each receive power from their own power source. The network connection device may be a Power over Ethernet switch and provides power and data to both the network security device and the wireless access point. The power received from the single port may be at a level that conforms to IEEE 802.3af standard. The power transmitted by the network security device may be at a level that conforms to IEEE 802.3af standard. The network security device may be a wireless intrusion detection sensor. The network security device may have a power passthru configuration wherein power received on a first port of the security device is substantially the same as power transmitted on an output port of the security device, without adding additional power from another source.
In another embodiment according to the present invention, a device is provided having a controller with an input stage, a processing stage, and an output stage. The device may include a network interface comprising a first port for receiving data and power on a cable from a first network device. The interface may include a second port for transmitting data and power on a cable to a second network device. The controller may be configured to allow power to pass from the input stage through to the output stage which combines the power with the data and out a single port. In one embodiment, a network security device may be coupled to the controller.
In yet another embodiment according to the present invention, a device is provided that comprises of a wireless instruction detection sensor configured to both receive and inject power and powers itself off the received power. The power may be about 18 watts or less.
In another permutation according to the present invention, a device is provided that comprises of a low-power switch that operates on significantly less than 20 watts of power. The device includes a network interface having a first port that receives power and data from a first network device. The interface may include a second port that transmits power and data to a second network device. The interface may further include a third port that transmits power and data to a third network device. In one embodiment, the low-power switch and/or security device consumes less than about 4.5 watts, so that within an 18 W budget, there is plenty of headroom for the second device.
In a still further embodiment according to the present invention, a method is provided for installing an additional network device into an existing computer network. The method comprises disconnecting a first network device from a network connection device and communicatively coupling the additional network device between the network connection device and the first network device. The data from the network connection device flows through the additional network device to reach the first network device. The additional network device provides power and data to the first network device. The additional device may have input and output side adjustment of power protocol, allowing the device to be used IEEE 802.3af or Cisco pre-802.3af protocols. The additional device may have a power passthru configuration. The additional device may receive power and data from the network connection device, wherein the additional device also powers itself off received power. The additional device may inject power and data onto a cable coupled to the first network device. The additional device may be a wireless intrusion detection sensor. The additional device may be a wireless intrusion detection sensor and wherein the sensor can receive and pass data. The additional device may be a wireless intrusion detection sensor and wherein the sensor can receive and pass data, without receiving or passing power to the second first network device. The additional device may have an input and output side adjustment of power protocol. The additional device has input and output side adjustment of power protocol, allowing the device to be used IEEE 802.3af or Cisco pre-802.3af protocols.
In yet another embodiment of the present invention, a method is provided for installing a wireless network security device into an existing computer network. The method comprises disconnecting a first network device from a network connection device. The method also includes communicatively coupling the wireless network security device between the network connection device and the first network device, wherein data from the network connection device flows through the wireless network security device to reach the first network device. The wireless network security device provides power and data to the first network device. The method may also include sending power from the network connection device to the wireless network security device.
A further understanding of the nature and advantages of the invention will become apparent by reference to the remaining portions of the specification and drawings.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention, as claimed. It may be noted that, as used in the specification and the appended claims, the singular forms “a”, “an” and “the” include plural referents unless the context clearly dictates otherwise. Thus, for example, reference to “a material” may include mixtures of materials, reference to “cable” may include multiple cables, and the like. References cited herein are hereby incorporated by reference in their entirety, except to the extent that they conflict with teachings explicitly set forth in this specification.
In this specification and in the claims which follow, reference will be made to a number of terms which shall be defined to have the following meanings:
“Optional” or “optionally” means that the subsequently described circumstance may or may not occur, so that the description includes instances where the circumstance occurs and instances where it does not. For example, if a device optionally contains a feature for using a wireless connection, this means that the wireless feature may or may not be present, and, thus, the description includes structures wherein a device possesses the wireless feature and structures wherein the wireless feature is not present.
Referring now to
Referring now to
Referring now to
The passthru of data and power from the switch 10 to the security device 20 and then to the access point 12 enables the present invention to couple both devices via a single port 24 on the switch 10. The passthru of data and power allows the security device 20 to be placed into the existing network without using additional ports or requiring costly cable pulls from the switch 10 to the security device 20. The present invention uses a network security device 20 that can receive power in and also put power out. The present embodiment takes power into the device on a data line and puts power out on a data line. Most devices only receive power from the Wire. A device having a power receive port and a power inject port is desirable to facilitate insertion of the device into an existing network.
Referring now to
In one embodiment, the input stage 30 may be configured as follows. The input stage 30 may comprise of a PoE end-point circuit 40 such that the network monitoring device can be powered, and a Ethernet data end-point circuit 42 such that the network monitoring device can communicate over Ethernet. The input stage 30 may be used to separate data from power being received from the PoE switch. The Ethernet end-point includes support for one or more standards, including but not limited to 100baseTX, 10baseT, etc.
Referring still to
Referring to
One aspect of the implementation involves a hardware implementation that supports one or more power specifications. Optionally, the PoE end-point includes support for one or more standards/conventions, including IEEE 802.3af PoE, Cisco single port injectors, Cisco pre-802.3af PoE switches, etc. . . . In one embodiment, it may be support for the 802.3af standard. In another embodiment, the device supports a legacy Cisco power specification. The device may detect which power specification is used in the system and automatically configure the device for the power specification in use. This may be used on both the receive side and the output side, allowing the device to be used with an input that meets the 802.3af specification or meets some other specification such Cisco legacy specification. There is logic in the system that adjusts the specification on the input side and the output side independently. This logic may reside in processor 50 or may be with the power circuits in the input or output stages.
In embodiments supporting both IEEE 802.3af devices and Cisco pre-802.3af, the device having such a feature may involve two aspects—power protocol detection and power supply. Detection of the power protocol may involve the following. The IEEE 802.3af standard sets forth that the low-voltage resistance be within a given range and that the low-voltage capacitance be less than a given value. Cisco devices can be detected by their resistance/capacitance signature with appropriate hardware that has sufficient dynamic range to measure the resistance and capacitance ranges of both IEEE 802.3af compliant devices and Cisco pre-802.3af devices. The logic for detecting the power protocol may be found in the processor 50, the injector 60, and or some portion of the output stage circuit 34. Logic for such detection may also be found in the input stage circuit 30. In the present implementation, the logic for making the determination is in the processor 50.
Supplying power in the correct protocol may involve the following. Cisco pre-802.3af devices require power on the unused pairs in the reverse polarity to that specified by the 802.3af standard. This can be addressed in a number of ways including, providing power in the reverse polarity on the unused pairs for both types of devices relying on the 802.3af requirement that 802.3af devices accept power in either polarity, providing power on the unused pairs in dynamically chosen polarity to match the device based on the detection signature, or providing power for 802.3af devices on the data pairs and providing power for Cisco pre-802.3af devices on the unused pairs based on the detection signature.
Additionally, the PoE detection feature and monitoring state-machine may be implemented in whole or in part in the main packet processor 50. In one implementation the main packet processor is responsible for the PoE state-machine that goes through the different stages required to detect a PoE capable device, evaluate the device signature, enable power, to monitor the power consumption, and to detect when the device is no longer present. Furthermore, the analogue to digital detection and digital to analogue control may be implemented directly in the main packet processor by using built-in analogue support or by using resistor-capacitor timed digital sampling techniques.
Referring still to
Referring now to
Referring now to
In the present embodiment, the input stage 130 may include an Ethernet data end-point circuit 42 such that the network monitoring device can communicate over Ethernet. The Ethernet end-point includes support for one or more standards, including but not limited to 100baseTX, 10baseT, etc. It should be understood that other circuits supporting other data protocols may also be used. Since there is no power being received on the data line, the input stage 130 does not include a circuit 40 for separating power from the data. Instead, as seen in
In the present embodiment of device 120, the processing stage 132 may have a processing system 50. In one implementation, all packets are bridged between the AP 12 and the network such that the operation of the AP 12 is unaffected. This traffic can be monitored or passed silently by the network security device 120. Packets may be filtered such that the network monitoring device is only network accessible from the network side and is inaccessible from the AP side (see
In the present embodiment, the output stage 134 may comprise of a PoE injector circuit 160 such that the network monitoring device can power the AP 12, and a Ethernet data end-point 162 such that the network monitoring device can communicate to the AP over Ethernet. It should be understood that the injector circuit 160 may support other protocols such as but not limited to Cisco pre-802.3af protocol. Similar to the circuit in
Referring now to
Referring now to
Referring now to
Referring now to
Referring now to
Referring now to
Referring now to
Referring to
Other embodiments may incorporate three, four, five, six, or more ports to power more downstream devices. Some embodiments may cascade two or more network connection devices together to provide more power/data ports.
Optionally, the network monitoring or security device may include remote access features. The device may control power and network connection to the PoE device that it is inline with. This may allow for remotely monitoring the power consumption of device, the network utilization of the device, rate throttling of network traffic to/from the device, firewall or packet filtering of network traffic to/from the device, ability to remotely power down or reboot the device, etc.
While the invention has been described and illustrated with reference to certain particular embodiments thereof, those skilled in the art will appreciate that various adaptations, changes, modifications, substitutions, deletions, or additions of procedures and protocols may be made without departing from the spirit and scope of the invention. For example, with any of the above embodiments, the function performed by the wireless security device may be any function suitable for a networked device, not necessarily related to security. It does not matter whether the devices are using 10 Mbps, 100 Mbps or any other data rate Ethernet. The network bridging functionality between the two ports may be implemented in the main processing unit, or in a dedicated processing unit, e.g. a switch chipset. For any of the above embodiments, it should be understood that the present invention is also applicable to new network installation. The present invention may halve the number of wire pulls used in new network installations. By way of nonlimiting example for any of the above embodiments, the network connection device may be a hub, a switch, or a router. It may be a wired or wireless device. For any of the above embodiments, the various stages (input, output, processor, etc. . . . ) may be part of the same circuit or may be separate circuits. It should be understood that the present invention may optionally support a third, fourth, or other power specifications besides IEEE 802.3af or Cisco proprietary power specifications.
The publications discussed or cited herein are provided solely for their disclosure prior to the filing date of the present application. Nothing herein is to be construed as an admission that the present invention is not entitled to antedate such publication by virtue of prior invention. Further, the dates of publication provided may be different from the actual publication dates which may need to be independently confirmed. All publications mentioned herein are incorporated herein by reference to disclose and describe the structures and/or methods in connection with which the publications are cited.
Where a range of values is provided, it is understood that each intervening value, to the tenth of the unit of the lower limit unless the context clearly dictates otherwise, between the upper and lower limit of that range and any other stated or intervening value in that stated range is encompassed within the invention. The upper and lower limits of these smaller ranges may independently be included in the smaller ranges is also encompassed within the invention, subject to any specifically excluded limit in the stated range. Where the stated range includes one or both of the limits, ranges excluding either both of those included limits are also included in the invention.
Expected variations or differences in the results are contemplated in accordance with the objects and practices of the present invention. It is intended, therefore, that the invention be defined by the scope of the claims which follow and that such claims be interpreted as broadly as is reasonable.
The present application claims the benefit of priority to copending U.S. Provisional Patent Application Ser. No. 60/724,510 (Attorney Docket No. 40645-1001) filed Oct. 7, 2005 and fully incorporated herein by reference for all purposes.
Number | Date | Country | |
---|---|---|---|
60724510 | Oct 2005 | US |