The present disclosure relates generally to point-to-point-over Ethernet device identification.
Broadband service providers for distributed computing network services such as digital subscriber line (DSL) service typically require the end user, e.g., the home or business DSL subscriber, to employ a router, switch, or other customer premises equipment (CPE) to terminate the DSL connection at the residence or business location. The router or other CPE serves to terminate the Asynchronous Transfer Mode (ATM) connection, and generally utilizes point-to-point-over-Ethernet (PPPoE) enabled software to complete the user authentication process.
When a DSL subscriber encounters a problem with their DSL connection, the DSL service provider has no way to automatically determine the specific make and/or model of a particular CPE device being utilized by the DSL subscriber. In this situation, telephone inquiries to the subscriber are made to attempt to discover what type of equipment is being utilized at the CPE location, or a service technician is dispatched to “eyeball” the equipment when the customer does not know what type of CPE device is at their location. Consider a typical case of tens of thousands (or even millions, in some cases) of DSL subscribers and their respective CPE devices, and the support problems presented to the DSL service provider become evident.
In addition, when a service provider wishes to upgrade DSL transport services in their service area(s), e.g., the provision of Point to Point Protocol Termination and Aggregation (PTA), it may be difficult to cost-effectively deploy the new service plan if the service provider does not know what types of CPE devices are currently deployed. For example, if a new transport service is scheduled for deployment in a specific geographic region, but it is determined that a large number of CPE devices may not support the new service, delays in deployment result. Such delays lead to increased provider costs, which are typically passed along to the subscribers, resulting in higher rates.
The use of the same reference symbols in different drawings indicates similar or identical items.
In a particular embodiment, a method for identifying customer premises equipment (CPE) in a distributed network is presented. The method includes generating a device identifier code in response to receiving a point-to-point over Ethernet (PPPoE) packet communicated over the distributed network. A PPPoE active discovery initiation (PADI) packet is broadcast. The PADI packet includes a tag, such as a host-uniq tag, that specifically identifies a product model of a CPE device. A PPPoE active discovery offer (PADO) packet is received by the CPE. The CPE transmits a PPPoE active discovery request (PADR) packet in response to receiving the PADO packet. The PADR packet includes a tag that specifically identifies a product model of the CPE device. The CPE receives a PPPoE active discovery session (PADS) packet, and an Ethernet session is conducted.
In a particular embodiment, a method is presented for sending a point-to-point over Ethernet (PPPoE) active discovery packet. The PPPoE active discovery packet includes a tag that specifically identifies a product model of a customer premises equipment (CPE) device.
In a further embodiment, a disclosed method includes receiving a PPPoE active discovery packet. This packet is a PPPoE active discovery offer (PADO) packet in one embodiment, while the packet may be a PPPoE active discovery session (PADS) packet in another embodiment. The packet includes a tag that identifies a product model of a CPE device. The product model of the CPE device is determined based on the tag.
In a particular embodiment, a customer premises equipment (CPE) device is disclosed. The CPE device includes a network interface and a module coupled to the network interface. The module is configured to transmit a PPPoE active discovery packet including a tag. The tag includes a device identifier field that uniquely identifies a CPE product model.
In another embodiment, a system for identifying a communications device is presented. The system includes an access concentrator and a database server. The access concentrator is configured to receive an active discovery packet having a tag including a device identifier field. The active discovery packet is arranged for transmission by a communications device capable of terminating a point-to-point connection. The device identifier field uniquely identifies a product model associated with the communications device. The database server stores the device identifier field.
The present disclosure provides a method, system, and apparatus for use in identifying customer premises equipment (CPE) in a distributed network. The method utilizes a unique identifier that is provided by a CPE device to an access concentrator during the discovery stage of point-to-point over Ethernet (PPPoE) communications in a distributed network. An access concentrator collects this CPE-provided information, which may be used by a broadband service provider to identify, and thus manage, the CPE devices which form a part of the service provider's network domain. An example of a distributed network system including a collection of domains with one or more networks is illustrated in
Each routing domain 103, 105 in distributed network system 100 is a collection of one or more local networks that are attached to the backbone 101 through one or more routers 123, 124, 125, 130, 132, 134, and 135. A router is a specialized computer for processing Internet protocol (IP) data and forwarding IP data along respective network paths. In the following discussion, the term local network shall be used to refer to all types of networks that may be included in a domain. Routing domains 103 and 105 are also referred to as autonomous systems (AS). An autonomous system is a set of nodes and routers that operate under the same administration. The domains 103 and 105 may be operated by the same service provider (same administration) or by different service providers. The networks in routing domains 103 and 105 may be residence/subscribers' home networks, local area networks (LAN), wide area networks (WAN), metropolitan area networks (MAN), or the like.
In a point-to-point (PPP) connectivity network, various types and models of CPE devices such as CPE devices 124 and 125, or 130, 140, and 135 are used to terminate the point-to-point connections. One type of point-to-point connectivity communications is point-to-point over Ethernet (PPPoE). With various types of broadband access, e.g. digital subscriber line (DSL) service, connectivity may be provided via PPPoE within the domains 103 and 105. It will be appreciated that the numbers of networks, routers, CPE devices, and nodes (nodes are depicted by a circle with ‘N’ inscribed within the circle) have been constrained in the example of
Broadband access service, such as digital subscriber line (DSL) service, entails the use of a CPE device to terminate the DSL (PPPoE) connection at the residence or business location of the DSL subscriber. This is illustrated in
Typically, the CPE device 225 terminates the asynchronous transfer mode (ATM) connection, and has point-to-point over Ethernet (PPPoE) software to complete a user authentication process. The CPE device 225 may be a router or a switch, or any device that terminates a PPPoE connection. The CPE device 225 contains a module configured to transmit a PPPoE packet including a tag to uniquely identify the CPE device 225 product model. Access concentrator 223 is connected to a database 226 to store the device identifier field data obtained from the CPE device 225 during discovery/authentication processes. The method utilizes the packet exchange during the conduct of a PPPoE discovery process.
PPPoE has two distinct stages, a discovery stage, and a PPP session stage. When a host wishes to initiate a PPPoE session, it first performs discovery to identify the Ethernet media access control (MAC) address of the peer, and establishes a PPPoE SESSION_ID. Although PPP defines a peer-to-peer relationship, discovery is a client-server relationship. That is, in the discovery process, a host (the client, or CPE device 225) discovers an access concentrator 223 (the server), and various discovery steps are followed to permit the host and the server to have the information required to build their point-to-point connection over Ethernet. This discovery process is illustrated in
The method and system disclosed herein utilizes a tag identified in Internet Engineering Task Force (IETF) RFC 2516 (A Method for Transmitting PPP over Ethernet (PPPoE)) in an innovative way to determine which CPE devices, such as CPE device 225, are connected to a network. The client (CPE 225) is capable of generating a device identifier code in response to receiving a PPPoE packet communicated over a distributed network. In the first step 302 of the discovery process, the CPE device 225 broadcasts a PPPoE active discovery initiation (PADI) packet. This PADI packet includes a tag that specifically identifies a product model of the CPE device 225. The tag in a particular embodiment is a host-uniq tag, and the device identifier code is a binary number associated with a specific product model or type of CPE device. In a specific embodiment, the binary number is a nine bit binary number.
The access concentrator 223, such as the broadband remote access server (BRAS), transmits a PPPoE active discovery offer (PADO) packet in step 304. In step 306, the PADO packet is received by the client 225, and accepted. In response to the PADO packet receipt, an active discovery request packet (PADR) packet is generated and transmitted to the server 223. The PADR packet can also include a tag that specifically identifies a product model of the CPE device 225. In step 308, the server receives the PADR packet, and generates and transmits a PPPoE active discovery session (PADS) confirmation packet. The session discovery process is concluded, and an Ethernet communication session is then conducted between the client 225 and the server 223.
The host-uniq tag information may be transmitted in the PADI packet. Alternatively, the host-uniq tag information may also be transmitted in the PADR packet. Generally it is most efficient to utilize the PADI packet for device identification, however, the CPE device could return the device identifier in the tag with a PADR packet as well. Whether the tag information is contained in the PADI or PADR packets, the access concentrator 223 receives the PAD packet, and stores the device identifier code in a database (226,
An advantage provided by the disclosed method is that it facilitates network management based upon the product model of the CPE devices determined to be present in the network. For example, the use of the host-uniq tag and the unique device identifier allows broadband service providers to check on the CPE devices in use on the provider's network. This information could be used to target marketing efforts, or to enable surveys of existing equipment to determine if the existing equipment will work with new technologies that a broadband service provider would like to deploy. It should be noted that although the examples provided thus far have discussed primarily DSL broadband services, PPPoE is an authentication system that is not restricted to DSL.
CPE board 400 includes a memory control module 409 with connecting Flash 411 and SDRAM 410 memory components. Other components in board 400 include a universal serial bus (USB) controller 419 and a USB device connector 420; an ATM segmentation and reassembly (SAR) controller module 414; a DSL chipset 412 and DSL connector 413; a 10/100 Mbps Ethernet controller module 416, transceiver 417, and connector 418. ATM controller module 414 and Ethernet controller module 415 have been integrated into the board 400 as network interfaces.
During a PPPoE discovery process, module 415 sends a PPPoE active discovery (PAD) packet. The PAD packet includes a tag comprising a device identifier field that uniquely identifies a CPE product model. The device identifier field can also be generated in response to receiving a PAD packet. The PAD packet containing the tag/device identifier can be a PADI packet, or alternately, a PADR packet. In one embodiment, the tag is a host-uniq tag, and the device identifier field comprises a predefined binary number embedded in the host-uniq tag. This predefined binary number can be a nine-bit binary device identifier code.
A source address field (SOURCE_ADDR) 504 is also contained in data packet 500. This field 504 contains the Ethernet media access control (MAC) address of the source device. The ETHER_TYPE field 506 is set to a first value during the discovery stage, or to a second value during the PPP session stage. The payload field 508 contains the Ethernet payload for PPPoE, and is discussed in detail in
The SESSION_ID field 612 is 16 bits, and is an unsigned value in network byte order. For a given PPP session, the field 612 is fixed, and defines a PPP session along with the Ethernet source address (504 in
A PPPoE payload 508 contains zero or more tags. A tag is a type-length-value (TLV) construct, and an example tag is shown in
IETF RFC 2516 defines the host-uniq tag as follows: “This tag is used by a host to uniquely associate an access concentrator response (PADO or PADS) to a particular host request (PADI or PADR). The TAG_VALUE is binary data of any value and length that the host chooses. It is not interpreted by the access concentrator. The host may include a host-uniq tag in a PADI or PADR. If the access concentrator receives this tag, it must include the tag unmodified in the associated PADO or PADS response.” From the foregoing IETF definition, it should be clear that although the present disclosure utilizes a predefined tag, the tag is utilized in a unique way to identify CPE devices, as well as to collect CPE device information at the access concentrator or database server attached to the access concentrator, for network management purposes.
An example of a nine bit binary CPE device identifier code embedded in a host-uniq tag is illustrated in
The above disclosed subject matter is to be considered illustrative, and not restrictive, and the appended claims are intended to cover all such modifications, enhancements, and other embodiments which fall within the scope of the present disclosure. Thus, to the maximum extent allowed by law, the scope of the present disclosure is to be determined by the broadest permissible interpretation of the following claims and their equivalents, and shall not be restricted or limited by the foregoing detailed description.
The present application claims priority to and is a continuation of patent application Ser. No. 12/906,666 filed on Oct. 18, 2010, and entitled “System and Method to Identify Devices Employing Point-to-Point-Over Ethernet Encapsulation,” which is a continuation of patent application Ser. No. 11/590,447 filed on Oct. 31, 2006 (now U.S. Pat. No. 7,840,659), and entitled “System and Method to Identify Devices Employing Point-to-Point-Over Ethernet Encapsulation,” which is a continuation of patent application Ser. No. 10/634,116 filed on Aug. 4, 2003 (now U.S. Pat. No. 7,165,111), and entitled “System and Method to Identify Devices Employing Point-to-Point-Over Ethernet Encapsulation,” each of which is expressly incorporated herein by reference in their entirety.
Number | Name | Date | Kind |
---|---|---|---|
6327511 | Naismith et al. | Dec 2001 | B1 |
6404861 | Cohen et al. | Jun 2002 | B1 |
6463528 | Rajakarunanayake et al. | Oct 2002 | B1 |
6493327 | Fingerhut | Dec 2002 | B1 |
6496859 | Roy et al. | Dec 2002 | B2 |
6526582 | Brodigan et al. | Feb 2003 | B1 |
6535551 | Sweitzer et al. | Mar 2003 | B1 |
6636505 | Wang et al. | Oct 2003 | B1 |
6982967 | Leung | Jan 2006 | B1 |
7043664 | Chiloyan | May 2006 | B1 |
7099944 | Anschutz et al. | Aug 2006 | B1 |
7165111 | Jones et al. | Jan 2007 | B2 |
7228358 | McManus | Jun 2007 | B1 |
7269182 | Carrel | Sep 2007 | B1 |
7733904 | Borella et al. | Jun 2010 | B1 |
7840659 | Jones et al. | Nov 2010 | B2 |
8347075 | Zhang | Jan 2013 | B1 |
20010030977 | May | Oct 2001 | A1 |
20020019875 | Garrett | Feb 2002 | A1 |
20020026504 | Lo | Feb 2002 | A1 |
20020062361 | Kivipuro | May 2002 | A1 |
20020093525 | Asauchi | Jul 2002 | A1 |
20020095299 | Iwakata | Jul 2002 | A1 |
20020133578 | Wu | Sep 2002 | A1 |
20020156947 | Nishio | Oct 2002 | A1 |
20020165972 | Chien et al. | Nov 2002 | A1 |
20030041151 | Senapati et al. | Feb 2003 | A1 |
20030053443 | Owens | Mar 2003 | A1 |
20030053486 | Okamori | Mar 2003 | A1 |
20030055959 | Sato | Mar 2003 | A1 |
20030060285 | Itakura | Mar 2003 | A1 |
20030078999 | Lund | Apr 2003 | A1 |
20030097552 | Lewis et al. | May 2003 | A1 |
20030101243 | Donahue et al. | May 2003 | A1 |
20030103615 | Baltes | Jun 2003 | A1 |
20030131107 | Godse et al. | Jul 2003 | A1 |
20030131133 | Nyu et al. | Jul 2003 | A1 |
20030167405 | Freund et al. | Sep 2003 | A1 |
20030169444 | Kemp et al. | Sep 2003 | A1 |
20030172136 | Katagawa | Sep 2003 | A1 |
20030182414 | O'Neill | Sep 2003 | A1 |
20030182434 | Ogushi et al. | Sep 2003 | A1 |
20030204640 | Sahinoja | Oct 2003 | A1 |
20030233461 | Mariblanca-Nieves et al. | Dec 2003 | A1 |
20040049572 | Yamamoto | Mar 2004 | A1 |
20040052263 | Xu | Mar 2004 | A1 |
20040071133 | Yusko et al. | Apr 2004 | A1 |
20040093342 | Arbo et al. | May 2004 | A1 |
20040105444 | Korotin et al. | Jun 2004 | A1 |
20040117834 | Karaoguz et al. | Jun 2004 | A1 |
20040128201 | Ofir et al. | Jul 2004 | A1 |
20040181707 | Fujibayashi | Sep 2004 | A1 |
20040216123 | Seebaldt | Oct 2004 | A1 |
20040258028 | Hossain et al. | Dec 2004 | A1 |
20040258143 | Jones et al. | Dec 2004 | A1 |
20050021766 | McKeowen et al. | Jan 2005 | A1 |
20050129002 | Koo | Jun 2005 | A1 |
20060050862 | Shen | Mar 2006 | A1 |
20060161643 | Senapati et al. | Jul 2006 | A1 |
20110035633 | Jones et al. | Feb 2011 | A1 |
20160255342 | Blair | Sep 2016 | A1 |
Number | Date | Country |
---|---|---|
11122277 | Apr 1999 | JP |
2003189378 | Jul 2003 | JP |
2003204345 | Jul 2003 | JP |
0178310 | Oct 2001 | WO |
02077808 | Oct 2002 | WO |
Entry |
---|
Mamakos, L. et al., “RFC 2516: A Method for Transmitting PPP Over Ethernet (PPPoE),” <http://www.ietf.org/rfc/rfc2516.txt?number=2516>, Feb. 1999, 16 pages. |
Mitchell, Bradley, “The MAC Address: An Introduction to MAC Addressing,” <http://compnetworking.about.com/od/networkprotocolsip/1/aa062202a.htm> retrieved Jul. 20, 2007, 1 page. |
“Ethernet address: Information from Answers.com,” <http://www.answers.com/Ethernet+address?cat=technology> retrieved Jul. 20, 2007, 1 page. |
“Sample List of Vendor/Ethernet MAC Address” <http://standards.ieee.org/regauth/oui/oui.txt> 7 pages. |
“Vendor/Ethernet MAC Address Lookup and Search” <http://coffer.com/mac_find/> retrieved Jul. 21, 2007, 1 page. |
International Search Report and Written Opinion of The International Searching Authority for International Application No. PCT/US04/33725, dated Aug. 29, 2005, 9 pages. |
Non-Final Office Action for U.S. Appl. No. 10/700,337 received from the United States Patent and Trademark Office (USPTO) dated Jul. 5, 2005, 13 pages. |
Non-Final Office Action for U.S. Appl. No. 10/700,337 received from the United States Patent and Trademark Office (USPTO) dated Oct. 4, 2005, 11 pages. |
Notice of Allowance and Fee(s) Due for U.S. Appl. No. 10/700,337 received from the United States Patent and Trademark Office (USPTO) dated Mar. 21, 2006, 17 pages. |
Non-Final Office Action for U.S. Appl. No. 11/452,175 received from the United States Patent and Trademark Office (USPTO) dated Mar. 29, 2007, 27 pages. |
Final Office Action for U.S. Appl. No. 11/452,175 received from the United States Patent and Trademark Office (USPTO) dated Jul. 30, 2007, 30 pages. |
Non-Final Office Action for U.S. Appl. No. 11/452,175 received from the United States Patent and Trademark Office (USPTO) dated Nov. 13, 2007, 17 pages. |
Final Office Action for U.S. Appl. No. 11/452,175 received from the United States Patent and Trademark Office (USPTO) dated Dec. 10, 2008, 16 pages. |
Non-Final Office Action for U.S. Appl. No. 11/452,175 received from the United States Patent and Trademark Office (USPTO) dated Jun. 1, 2009, 17 pages. |
Notice of Allowance and Fee(s) Due for U.S. Appl. No. 11/452,175 received from the United States Patent and Trademark Office (USPTO) dated Nov. 17, 2009, 23 pages. |
Non-Final Office Action for U.S. Appl. No. 12/636,325 received from the United States Patent and Trademark Office (USPTO) dated Oct. 1, 2010, 24 pages. |
Final Office Action for U.S. Appl. No. 12/636,325 received from the United States Patent and Trademark Office (USPTO) dated Mar. 31, 2011, 24 pages. |
Non-Final Office Action for U.S. Appl. No. 12/636,325 received from the United States Patent and Trademark Office (USPTO) dated Jul. 14, 2011, 16 pages. |
Notice of Allowance and Fee(s) Due for U.S. Appl. No. 12/636,325 received from the United States Patent and Trademark Office (USPTO) dated Oct. 28, 2011, 20 pages. |
Notice of Grounds for Rejection for Japanese Patent Application No. 2006-522554, dated Sep. 29, 2009, 3 pages. |
International Search Report and Written Opinion of the International Searching Authority for International Application No. PCT/US04/19922, dated Mar. 10, 2005, 13 pages. |
Supplemental European Search Report from the European Patent Office for corresponding EP Application No. 04755828.3-2416/1652099, PCT/US2004019222, dated Aug. 28, 2008, 3 pages. |
Communication pursuant to Article 94(3) EPC for EP Application No. 04755828.3-2416, dated Nov. 14, 2008, 6 pages. |
Communication pursuant to Article 94(3) EPC for EP Application No. 04755828.3-2416, dated Mar. 10, 2009, 3 pages. |
International Preliminary Report on Patentability for International Application No. PCT/US2004/033725, dated May 8, 2006, 6 pages. |
Number | Date | Country | |
---|---|---|---|
20130215790 A1 | Aug 2013 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 12906666 | Oct 2010 | US |
Child | 13847684 | US | |
Parent | 11590447 | Oct 2006 | US |
Child | 12906666 | US | |
Parent | 10634116 | Aug 2003 | US |
Child | 11590447 | US |