1. Field of the Invention
The present invention is related to the field of devices used in networks, and more specifically to network nodes that verify the power configuration of a device before supplying power to it.
2. Description of the Related Art
Integrated Services Local Area Networks (ISLANs) include nodes such as switches, gateways, routers, bridges, repeaters, etc. Network nodes are referred to generally below as network switches, but include any device used for processing information in a network. Endpoints connected to the network, such as Internet phones, can receive power along with data from the network switch. Such endpoints are called line powered devices.
An example of a line powered device is described with reference to
A serious problem exists when network switch 12 inadvertently applies power to a non-line powered device. In the example of
In conventional circuit switched networks, telephones are often powered through the telephone lines. However, the telephones in packet switched networks may or may not be powered remotely by the network switch 12 over the network cable. In packet switched networks, the switch can detect a device coupled to a port (assuming the device already has power), but does not know whether the device is suitable for remote powering before power is applied to the device. What aggravates the problem is that such devices are often connected to the network switch at remote locations. For example, telephones are typically powered from a central location (e.g. a wiring closet) instead of locally (e.g. in the same office). This makes it hard to configure the network for different line powered devices.
The problem is worsened in the event of loss of power. In the case of telephones, users have come to expect service under all conditions, including loss of power. The device must therefore operate without interruption when local power is not available.
Accordingly, a need exists for identifying line powered devices on a packet switched network.
The present invention ascertains the suitability for remote powering a device from a network switch, before the network switch supplies power to the device. The network switch determines suitability by interrogating all coupled devices.
The switch sends a discovery signal to the ports connected to remote devices and monitors each port for a return signal. If a return signal is received, it is compared to the transmitted discovery signal. If the signals are identical, accounting for the expected signal losses in the wire, the coupled device is deemed suitable for receiving power remotely from the network switch. Accordingly, the network switch then supplies power to the line powered devices. If the network switch fails to discover any device, the switch periodically retries this discovery signal in order to detect new devices that are connected. The network switch also monitors ports that have power applied, looking for loss of signal, indicating that a device has been detached. Power then needs to be removed before another device is connected.
The invention eliminates having to preprogram the network switch with the type of devices connected to each port. This reduces the amount of time required to initially program the switch, and also eliminates having to reprogram the switch every time a new device is connected. The invention also eliminates having to reprogram the switch after loss of power. The invention is particularly useful in network locations without local power, or with a central power distribution facility that uses an uninterrupted power supply.
The foregoing and other objects, features and advantages of the invention will become more readily apparent from the following detailed description of a preferred embodiment which proceeds with reference to the drawings.
The present invention identifies which devices connected to a network switch are suitable for remote powering. The network switch prevents accidental destruction of devices by first interrogating the devices before applying remote power.
Referring to
Switch 22 interrogates the device to determine its suitability for remote powering. Suitable devices (here only device 24, coupled to Port Y) are powered through their respective cables (here cable 34).
Referring to
As will be obvious to a person skilled in the art, any number of ways and sequences can be used to scan the ports to detect newly coupled devices that may need powering. For example, the ports can be scanned continuously, serially or in parallel, or scanned during switch idle times. The ports are generally scanned simultaneously at a low frequency such as 0.5 Hz to 1 Hz. Alternatively, the ports can be scanned sequentially, as described below.
Referring to step 70 in
If the selected port was the last port in step 90, switch 22 returns to normal operations in step 100. If not, the next port is selected in step 110, and interrogated in step 80. This is repeated for all ports. Alternately, the switch performs other steps after each port is interrogated, before interrogating the next port. If the switch is already powering the connected device in step 110, or the link signal is detected without power, no further interrogation takes place, and execution proceeds to the next port.
If no link is detected in 80, the discovery tone is sent out through the port while keeping the power turned off. Referring briefly to
Referring back to
In the example shown in
Because the device 26 is not configured to receive line power, if device 26 returns a signal in step 150, the returned signal will be different than the discovery tone DP. In step 160, the returned signal is compared to the discovery signal DP. If there is no match, step 165 marks the port as used and execution moves to step 90. The next port is then interrogated in step 110.
The next port scanned in the example shown in
Optionally once a remote line powered device has been so identified, the discovery tone is sent a few more times, and the return signal is accordingly recorded and confirmed. This reduces the probability of error.
According to step 170, switch 22 applies power through cable 34 to device 24. The power is applied as phantom power through the same pair of wires in cable 34 used for transmitting data, or through a pair of wires in cable 34 separate from the data lines.
After power is applied to device 24, the link is established between the switch and device. Then switch 22 sends one or more initialization packets in step 180. The initialization packets inquire the type, serial number, version, etc. of device 24. The device 24 sends back identification packets in response to the initialization packets. Data in the identification packets is processed by the network switch 22. If the data returned by device 24 is satisfactory in step 190, the port is marked as used in step 195 and execution continues for the next port. If not, then power may be disconnected in step 200, before continuing to the next port.
Unit 222 includes a processor and associated signal detection circuits 238, a receive (RX) filter 240, a transmit (TX) filter 242, transformers 244 and 246, a voltage source VN and optional series circuit protection such as fuse F1. The voltage can be switched on and off through a switch S5, and applied through taps in the middle of transformers 244 and 246. The fuse F1 has a high enough value so that it does not blow when a normal load is applied to port 226. The value of fuse F1 is low enough to ensure safety if the detection algorithm fails. One advantage of the invention is that it eliminates damage to ports that are not configured to receive power.
Telephone 224 includes a RX filter 248, a TX filter 250 and transformers 252 and 254. Device 224 further includes switches S1, S2, S3 and S4. These are interposed between transformers 252 and 254 and their respective RX and TX filters. This device is a line powered device. The switches S1-S4 are at a first position A or at a second position B. Switches S1-S4 are at position A before remote power is applied. The application of power throws switches S1-S4 to position B.
Cable 234 can be a Category 5 cable, having 8 lines that are organized in 4 line pairs. In this connection, pins 1 and 2 are differential transmitting signals TX±, and pins 3 and 6 are differential receiving signals RX+/−.
Returning to
The processor and detection circuits 238 compares DPR to DP. If they are the same, the processor 238 infers that the device 224 is suitable for remote line powering, and applies power by closing switch S5. The voltage VN applied on cable 234 causes switches S1-S4 to move into position B. Then data and superimposed power VN is carried over the same lines to RX 248 and TX 250.
After a link is established, it is important for the switch to interrogate used ports so that a device disconnection can be detected and the power removed from the port before another device can be reconnected. This detection of loss of link and removal of power should happen within 200-300 msec or less.
The isolation of the power supplied to the telephone 224 can be optimized according to relevant IEEE standards. More specifically, IEEE Draft Standard 802.9f (1997 version) specifies the details for providing power from an ISLAN Access Unit (AU) to an ISLAN-compliant Terminal Equipment (TE) via one of two methods: (a) PS1, powering over the signal pairs, and (b) PS2, powering over additional cabling. For both methods the AU 222 provides power with adequate isolation and protection from shorts and transients to protect other AU ports and other functions within the TE 224 or any associated equipment.
After the link is marked as still used in step 270, or after the port is marked as not used in step 268, then at decision step 272 it is determined whether the currently interrogated port is the last port. If not, then execution moves to step 274, where the next port is selected. Then execution returns to decision step 262, and repeats the steps described above. If the currently interrogated port is the last port in decision step 272, the network switch selects the first port in step 260, and repeats the steps described above.
A person skilled in the art will be able to practice the present invention in view of the present description, where numerous details have been set forth in order to provide a more thorough understanding of the invention. In other instances, well-known features have not been described in detail in order not to obscure unnecessarily the invention.
Having illustrated and described the principles of the invention in a preferred embodiment thereof, it should be readily apparent to those skilled in the art that the invention can be modified in arrangement and detail without departing from such principles. We claim all modifications coming within the spirit and scope of the accompanying claims.
The present application is a continuation of U.S. patent application Ser. No. 10/836,923, filed on Apr. 29, 2004, now U.S. Pat. No. 7,256,684 issued on Aug. 14, 2007, which is a continuation of U.S. patent application Ser. No. 09/406,248, filed on Sep. 27, 1999, now U.S. Pat. No. 6,762,675 issued on Jul. 13, 2004.
Number | Name | Date | Kind |
---|---|---|---|
3569635 | Bloch et al. | Mar 1971 | A |
4173754 | Feiker | Nov 1979 | A |
4419666 | Gurr et al. | Dec 1983 | A |
4703306 | Barritt | Oct 1987 | A |
4835737 | Herrig et al. | May 1989 | A |
5034948 | Mizutani et al. | Jul 1991 | A |
5089927 | Bulan et al. | Feb 1992 | A |
5122691 | Balakrishnan | Jun 1992 | A |
5144544 | Jenneve et al. | Sep 1992 | A |
5148144 | Sutterlin et al. | Sep 1992 | A |
5237511 | Caird et al. | Aug 1993 | A |
5268592 | Bellamy et al. | Dec 1993 | A |
5289359 | Ziermann | Feb 1994 | A |
5386567 | Lien et al. | Jan 1995 | A |
5406260 | Cummings et al. | Apr 1995 | A |
5461671 | Sakuragi et al. | Oct 1995 | A |
5483574 | Yuyama | Jan 1996 | A |
5491804 | Heath et al. | Feb 1996 | A |
5531612 | Goodall et al. | Jul 1996 | A |
5544163 | Maddona | Aug 1996 | A |
5608792 | Laidler | Mar 1997 | A |
5613130 | Teng et al. | Mar 1997 | A |
5639267 | Loudermilk | Jun 1997 | A |
5668857 | McHale | Sep 1997 | A |
5726506 | Wood | Mar 1998 | A |
5742513 | Bouhenguel et al. | Apr 1998 | A |
5758102 | Carey et al. | May 1998 | A |
5775946 | Briones | Jul 1998 | A |
5790391 | Stich et al. | Aug 1998 | A |
5790873 | Popper et al. | Aug 1998 | A |
5793987 | Quackenbush et al. | Aug 1998 | A |
5796185 | Takata et al. | Aug 1998 | A |
5799040 | Lau | Aug 1998 | A |
5991885 | Chang et al. | Nov 1999 | A |
5994998 | Fisher et al. | Nov 1999 | A |
6011702 | Gucyski | Jan 2000 | A |
6021493 | Cromer et al. | Feb 2000 | A |
6115468 | De Nicolo | Sep 2000 | A |
6134666 | De Nicolo | Oct 2000 | A |
6218930 | Katzenberg et al. | Apr 2001 | B1 |
6246748 | Yano | Jun 2001 | B1 |
6295356 | De Nicolo | Sep 2001 | B1 |
6308240 | De Nicolo | Oct 2001 | B1 |
6366143 | Liu et al. | Apr 2002 | B1 |
6535983 | McCormack et al. | Mar 2003 | B1 |
6541878 | Diab | Apr 2003 | B1 |
6571181 | Rakshani et al. | May 2003 | B1 |
6762675 | Cafiero et al. | Jul 2004 | B1 |
6804351 | Karam | Oct 2004 | B1 |
6912282 | Karam | Jun 2005 | B2 |
7053501 | Barrass | May 2006 | B1 |
7099463 | Karam | Aug 2006 | B1 |
7256684 | Cafiero et al. | Aug 2007 | B1 |
7373532 | Schindler | May 2008 | B2 |
20020063584 | Molenda et al. | May 2002 | A1 |
Number | Date | Country | |
---|---|---|---|
20070222562 A1 | Sep 2007 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 10836923 | Apr 2004 | US |
Child | 11755542 | US | |
Parent | 09406248 | Sep 1999 | US |
Child | 10836923 | US |