WO2011135452A2 - An ip-closed circuit system and method - Google Patents
An ip-closed circuit system and method Download PDFInfo
- Publication number
- WO2011135452A2 WO2011135452A2 PCT/IB2011/001166 IB2011001166W WO2011135452A2 WO 2011135452 A2 WO2011135452 A2 WO 2011135452A2 IB 2011001166 W IB2011001166 W IB 2011001166W WO 2011135452 A2 WO2011135452 A2 WO 2011135452A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- port
- group
- data
- frames
- unique
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/18—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/46—Interconnection of networks
- H04L12/4641—Virtual LANs, VLANs, e.g. virtual private networks [VPN]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V20/00—Scenes; Scene-specific elements
- G06V20/50—Context or environment of the image
- G06V20/52—Surveillance or monitoring of activities, e.g. for recognising suspicious objects
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/50—Address allocation
- H04L61/5007—Internet protocol [IP] addresses
- H04L61/5014—Internet protocol [IP] addresses using dynamic host configuration protocol [DHCP] or bootstrap protocol [BOOTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2101/00—Indexing scheme associated with group H04L61/00
- H04L2101/60—Types of network addresses
- H04L2101/618—Details of network addresses
- H04L2101/622—Layer-2 addresses, e.g. medium access control [MAC] addresses
Definitions
- the invention relates to IP networks, and in particular to closed-circuit video-over- IP networks.
- Closed Circuit Television typically works on the basis that conventional analog video cameras can be deployed for security and surveillance purposes via point to point analog connections, forming a closed, secure network of the deployed cameras.
- Transmission of video over TCP/IP networks can be facilitated, however, using IP cameras.
- IP cameras The use of TCP/IP networks can facilitate high-resolution transmission, thereby improving quality of the transmitted images, and provide the ability to deploy cameras over a wide geographical area.
- TCP/IP networks can also be used to create closed circuit (CC) systems that interconnect other IP-enabled end-point devices.
- TCP/IP and IP-CC systems are not limited to TV systems, and can be configured to include various end-point devices (e.g., access-control readers, alarms, etc.).
- TCP/IP networks can present challenges to the management and operation of CCTV networks, because the transmitted video data can be easily intercepted by known IP hacking techniques.
- IP hacking makes CCTV-IP networks insecure.
- the identification and configuration of multiple devices, such as video servers and IP cameras, which are to be used as part of a CCTV surveillance system/video monitoring system, can also be difficult when deployed on a TCP/IP network. This is because some approaches require an installer to manually identify, one-by-one, each of the devices connected on the network through the understanding of the Media Access Control (MAC) address of the device when it appears on the Dynamic Host Configuration Protocol (DHCP) server. The DHCP server would then allocate an IP address to the device, or the IP address must be allocated manually. Only after such identification of a device and allocation of an IP address, the device can be located and controlled.
- MAC Media Access Control
- DHCP Dynamic Host Configuration Protocol
- an IP cabling endpoint where a camera can be connected to a cable, may be outside a protected zone.
- a protected zone can be a region to which it may be difficult for an intruder to gain access, making it difficult for the intruder to tamper with a camera.
- a protected zone e.g., housing at a distance in the back of a building
- a intruder can gain access to the IP cabling endpoint and may install a different, unauthorized device.
- the unauthorized device can send fake video data to a monitoring station in the TCP/IP network, making the network vulnerable.
- the elements of the system are often installed in difficult to service locations, such as on roofs/tall buildings or CCTV camera poles, it may be advantageous to the installer if the devices can be identified and IP configured without the need to hire platforms/cherry pickers in order to access the devices.
- Some methods can allocate IP addresses to devices such as IP cameras, and may be configured such that one port is associated with one allocated IP address.
- DHCP Option 82 by permitting communication among devices corresponding to only a subset of the allocated IP addresses a secured network can be created.
- configuring each port to only a single IP address can be cumbersome.
- the DHCP Option 82 does not provide authorization of IP addresses prior to permitting communication between two devices. Therefore, the step of authorizing IP addresses and thus providing a secured network must implemented in addition to using the DHCP Option 82. Operating a secured network according to these methods presents yet another problem.
- a device in the network is not uniquely identifiable by its own identifier such as a Media Access Control (MAC) address. If an unauthorized device replaces an authorized device connected to the network, the unauthorized device would simply use the IP address allocated to the authorized device, and thus would appear to be authorized to the other network components.
- MAC Media Access Control
- configuring a secured network using these methods may require a specific IP address allocation method that may not be compatible with other allocation methods employed by the network.
- configuring the ports of a network switch to access the IP addresses and the associated identifiers, so as to route the received data frames based on the identifiers can be cumbersome for a large number of ports.
- the present invention features a closed IP network of devices which connect to one or more control systems in a point-to-point manner, creating a secure network of these devices.
- closed means only devices configured to be included in the IP network can directly exchange data with one another.
- the invention solves the problem of the difficulty in configuring multiple devices and cameras on TCP/IP networks, due to their locations, by creating a point to point, plug and play configuration. This is achieved, in part, by allocating devices (e.g., cameras) to network ports and assigning IP addresses to the devices automatically, and by allowing devices which are to be deployed as part of a CCTV surveillance system to be automatically paired, in a deterministic manner, with the respective server/recording device without any intervention by an installer or user.
- a deterministic and device specific data management can enable securing a TCP/IP network.
- switching modules that have pre-allocated network ports may be built into the control equipment. These switches can tag received data frames, thereby allowing integration of layer 3 switch capabilities into an application program. Then, the application program can automatically allocate devices or "endpoints" to ports of the switch, and associate a device connected to a port to the control equipment. This may be achieved without the need for undertaking a lengthy and flaw ridden process of finding the relevant device's manually or DHCP allocated IP address before it is possible to connect the device to the control/recording equipment.
- tag means to modify a data frame by adding certain information to the data frame or removing such information from a data frame.
- a secure network indicates that the endpoint or a device connected to a port is secured, i.e., the association between a port and a device connected to the port cannot be altered.
- a closed IP TV network is formed in which there can exist a substantially exclusive relationship between the devices (e.g., cameras) and the control equipment. The closed IP TV network thus created can start streaming and recording video data immediately.
- a switching module can thus create a fully IP based solution for both standard and high definition data/video by providing embedded IP network video recording (NVR).
- the IP cameras can be automatically discovered using zero configuration networking (zeroconf) or multicast domain name system (mDNS).
- zeroconf is a set of techniques that automatically creates a usable IP network, without manual operator intervention or special configuration servers.
- the mDNS allows for automatic resolution and distribution of computer hostnames.
- the switch module can provide integrated Layer 2/3 switch solutions allowing for deterministic individual camera identification by input connector.
- a point to point IP network can be configured without requiring substantial effort.
- the configuration of IP cameras can be substantially transparent, i.e., specific knowledge of the camera's IP address or its other IP-related information may not be required substantially.
- This configuration may allow polymorphic streaming and advanced event handling (e.g., multimode). For example, as a higher application layer such configuration provides seamless NetVu Connected environment.
- the IP cameras may be substantially isolated from IP Video access using a default firewall setting, and additional firewall- setup options can allow deep integration into a client's network, while maintaining high levels of security.
- the switching module can provide a substantially secure and robust IP solution without requiring substantial IP expertise.
- an Integrated Camera Recorder can provide full IP infrastructure for standard definition and megapixel pictures, video, and other data.
- a decentralized IP/ICR architecture can reduce central network risk, while providing powerful multi- screen, multi- stream decoders and hi-definition displays.
- the architecture can be a completely integrated centralized video management system (VMS).
- An Integrated Camera Recorder typically includes an Enterprise class server, local storage devices and media, e.g., solid state drives (SDD) or hard disk drives (HDD) that can be made completely independent of IP status of the camera using ATA over Ethernet (AoE) technology.
- SDD solid state drives
- HDD hard disk drives
- an ICR can facilitate on-demand viewing and management, complementary backup storage, and can transmit video data to high definition viewing workstations using a High-Definition Multimedia Interface (HDMI).
- HDMI High-Definition Multimedia Interface
- Multi-tiered storage architecture of the ICR can provide multiple resolution and storage options that may be proportionate to the storage medium. This can allow effectively balancing storage requirements and storage cost.
- An enterprise server embedded within the camera can provide support for alarm handling, integration and processing of meta data, and serve as a video management tool.
- the ICR may be flexibly integrated with Heating
- HVAC Ventilating and Air-Conditioning
- the invention features the deployment of Ethernet frame tagging in a new and unique manner that integrates the layer 3 switch capabilities into the video server application, itself allowing devices to deterministically discover each other securely and be allocated automatically to ports within the built-in switch.
- a unique topography of devices that becomes a completely secure network within another TCP/IP network can be created.
- the invention relates to a switching module including a first and second port groups and a control unit for configuration of the ports in each port group.
- the first port group includes at least one port.
- Each port in the first port group is configured for connecting with a data source, and modifies a data frame transmitted by the connected data source. This is achieved by including in the data frame a unique port number assigned to the port.
- the port routes the modified data frame to a destination port if a unique port number assigned to the destination port is associated with the port in a routing table assigned to the port.
- the second port group also includes at least one port. Each port in the second port group is configured for connecting with a monitoring station and for receiving a data frame modified by one of the ports in the first port group.
- the control unit assigns a unique port number to each port in the first and second port groups. It also assigns a routing table to each port in the first port group.
- the routing table includes at least one source port number and at least one destination port number associated with each source port number in the table.
- the data source of the switching module includes an IP camera or an analog camera and a codec.
- the data source can be an encoder, and a device connected to the encoder can be an IP camera, an analog camera, or an SDI camera.
- the data source may also be an access-control reader or an alarm.
- the monitoring station may include means for viewing the data frames received through the connected port and/or means for storing the data frames received through the connected port.
- the switching module further includes a third port group including at least one port. Each port in the third port group can be configured for connecting with a private network of computing devices.
- the control unit may be configured for assigning a unique port number to each port in the third port group.
- the control unit may also enable communication of data frames between ports in the third group, a port in the third port group and a port in the first or second port groups, and between a port in the third group and the control unit.
- the switching module further includes a fourth port group including at least one port.
- Each port in the fourth port group can be configured for connecting with a public network of computing devices.
- the control unit may be configured for assigning a unique port number to each port in the fourth port group.
- the control unit may also enable communication of data frames between ports in the fourth port group, and between a port in the fourth group and the control unit. The control unit may, however, prevent communication of data frames between a port in the fourth port group and a port in the first or second port groups.
- the invention in another aspect, relates to a video device that includes a camera, a storage unit, and a server.
- the storage unit is in communication with the camera for storing data frames recorded by the camera.
- the server controls the camera and the storage unit, and provides access to and transmission of the stored data frames.
- the video device may further include a port unit configured for receiving a unique port number.
- the port unit can modify a data frame transmitted by the camera by including in the data frame the unique port number.
- the video device may further include a switching module.
- the switching module may include a first and second port groups and a control unit for configuration of the ports in each port group.
- the first port group includes at least one port.
- Each port in the first port group is configured for connecting with a data source, and it modifies a data frame transmitted by the connected data source. This is achieved by including in the data frame a unique port number assigned to the port.
- the port routes the modified data frame to a destination port if a unique port number assigned to the destination port is associated with the port in a routing table assigned to the port.
- the second port group also includes at least one port. Each port in the second port group is configured for connecting with a monitoring station, and for receiving a data frame modified by one of the ports in the first port group.
- the control unit assigns a unique port number to each port in the first and second port groups. It also assigns a routing table to each port in the first port group.
- the routing table includes at least one source port number and at least one destination port number associated with each source port number in the table.
- the camera is connected to the switching module using one port in the first port group.
- the server of the video device may receive control information via the port using whichever camera is connected. In response to the received control information, the server can control the control unit.
- the first port group of the video device may also include at least one secondary port.
- a data source can be connected to one of the secondary ports.
- the data source can be a video camera.
- the invention related to a method for operating an IP network.
- the network may include a switching module that includes a first port group including at least one port, a second port group including at least one port, and a control unit.
- the method includes assigning from the control unit a unique port number to each port in the first and second port groups, and assigning from the control unit each port in the first port group a routing table including at least one source port number and at least one destination port number associated with the at least one source port number.
- the method also includes connecting a data source to the at least one port of the first port group, authorizing a data frame transmitted by the data source, and modifying the authorized data frame.
- the modified data frame may be to a destination port if a unique port number assigned to the destination port is associated with the port in a routing table assigned to the port.
- the method further includes connecting a monitoring station to the at least one port of the second port group and receiving a data frame modified by at least one port in the first port group at the monitoring station.
- authorizing a data frame in the method includes comparing a device source number in the data frame with the unique port number.
- the method may further include the steps of preventing transmission of an unauthorized data frame, and communicating the unique port number of the port receiving the unauthorized data frame to the control unit for blocking access through the port.
- the unique port number a port in the first port group may include a device source number of the data source connected to the port.
- the unique port number of a port in the second port group may include a device source number of the monitoring station connected to the port.
- the method of operating an IP networks also includes storing at a port in the first group a security parameter associated with the data source connected to the port.
- the security parameter can be a unique identifier associated with the connected device and/or a key generated by the port or switch based on the unique identifier or another property of the connected device.
- the key may be randomly generated and may also be used to encrypt the data frames.
- the unique identifier may also be the number of data frames received and/or transmitted during a certain period.
- the method also includes storing at the data source a corresponding security parameter, that may be the unique identifier, key, or the corresponding counts as described above.
- the method further includes receiving and comparing the corresponding parameter with the security parameter stored at the port to determine if an unauthorized device is present at the port. Finally, the method includes disabling the port for a predetermined period if the comparison fails (i.e., an unauthorized port is determined to be present), to prevent data transmission from the unauthorized device.
- a violation may also be reported to an administrator by sending an alert such as an email or alarm. The report may also include the untrusted data frames received at the port at which the presence of an unauthentic device was detected.
- FIG. 1 schematically shows a switching module comprising two switches
- FIG. 2 schematically shows a switch included in a switching module, and its connections outside the switching module;
- FIG. 3 schematically illustrates connections between two switches included in a switching module
- FIG. 4 schematically shows a switching module, and its external connections
- FIG. 5 schematically shows a configuration of two switch modules
- FIG. 6 schematically shows a configuration of three switch modules connected in a chain
- Fig. 7 schematically shows a configuration of five switching modules connected in a branching pattern
- Fig. 8 schematically shows star-connected switching modules, using a dumb network switch
- FIG. 9 schematically illustrates a configuration of two video servers
- Fig. 10 schematically shows a configuration of a switching module and a Network
- NAT Address Translation
- FIG. 11 schematically shows an IP camera according to the present invention.
- An exemplary system shown in Figs. 1 and 2 includes a switching module 100 comprising a pair of switches 102, 104 (e.g., Marvell 88E6097 switches) and subsidiary components including a setup microcontroller 106 and Gb Ethernet physical connectors/devices (PHYs) 108 as required.
- the switch 88E6097 is used for illustration only, and it should be understood that any switch in which received data frames can be tagged is within the scope of the present invention.
- This module provides 16 10/100 Mb Ethernet ports 110, and four Gb
- the 10/100 Mb ports 110 may have embedded PHYs, and the Gb ports 112 may require the use of external PHY devices.
- the two switch devices are interconnected by using direct serdes connection 114 of Gb ports without PHY devices.
- the switch may include many configurable features that can be programmed via internal registers.
- the power-up configuration for the switches may be loaded by a
- microcontroller chip 106 via a two-wire Serial Management Interface (SMI) bus 116, but settings can be queried and updated via the use of special Ethernet control frames that may be routed into port 9 of each device.
- This port can be connected to the main board Central Processing Unit (CPU) of the video server, directly for the first switch of the first module.
- CPU Central Processing Unit
- Fig. 3 which shows a configuration 300 of two modules 302, 304, control frames may also be routed indirectly via intermediate switches for the second switch of the first module and for both switches of any cascaded modules.
- an individual SMI bus 316 may be used for each of the switch modules 302, 304, allowing for use of a faster register access protocol by the microcontroller 306. This may require that the switch ID value for both of the devices be set at zero by the power-on ID links.
- the microcontroller 306 can subsequently assign the operational switch IDs during the configuration process.
- the module ID number N can be set by configuration select links on General Purpose Input Output (GPIO) lines into the microcontroller; switch IDs may then be set using the values 2*N+1 and 2*N+2.
- GPIO General Purpose Input Output
- An interrupt line 318 can be connected to the microcontroller from each of the switch chips; it is possible for the interrupt to be triggered by control frames from the main board CPU. This can be used to request the microcontroller to read back register values from the switches, so that it can take note of configuration changes that may have been made remotely.
- a Network Address Translation (NAT) router unit or a Stateful Packet Inspection firewall (SPI) unit may be included within the switch module.
- NAT Network Address Translation
- SPI Stateful Packet Inspection firewall
- a switch chip can route Ethernet frames between its port connections, as shown in Fig. 3.
- a number of rules i.e., frame- routing rules
- the switch module typically inserts extra data fields - known as a tag - within each Ethernet frame.
- tags may be automatically inserted and removed on ingress and egress of the frames, or may be applied to the frames while external to the chip in order to support inter-connection of multiple switch chips.
- Tagging can also be used after configuration of ports (i.e., after ports have been assigned unique numbers as described above) to limit certain MAC addresses to certain ports. This can provide MAC level access control list (ACL) operation by deterministic port assignment without requiring substantial operator specific knowledge.
- ACL MAC level access control list
- a typical Ethernet frame format is as follows:
- Ethernet data frame When an Ethernet data frame is received by a switch chip, it may modify the frame format by the insertion of tag data as follows: 6 bytes Destination address
- the source chip ID can be set by the configuration links of the chip, and the source port number can be the number of the physical port where the frame ingressed.
- the priority and Virtual Local Area Network ID (VLAN ID or VID) values may be set for each of the switch ports 110, 112. These values can be used to prioritize traffic from particular ports and to limit the routing of frames to keep traffic between certain ports private from traffic between other ports.
- the tag type flags can be used to denote special variations on the tag format, as described below.
- the ports used for chip interconnections can be configured into a "distributed switch architecture" mode.
- the tag data may not be removed from a frame upon egress, and may be assumed to be already present on frame ingress.
- the source chip ID and source port number fields may then identify the physical chip and port where a frame first ingressed the system from the external network, and the priority and VLAN ID values can provide for control of steering the frame throughout the extended switch network.
- a source chip ID may be a 5-bit field and values 0x00 and Ox IF are reserved for special purposes, a maximum of 30 chips may be inter-connected.
- An extended tag format shown below, can be used when a CPU may be connected directly to the switch
- the switch can be programmed to recognize a special value as an indication that tag data is included and that the actual ether-type field follows after 8 bytes of other data.
- An example of a special value may be Ox ADO 1 which typically does not occur as the ether-type of any normal Ethernet frame.
- both tagged and normal Ethernet frames may be ingressed in any sequence. If bytes 13-14 have a special tag specifier value, then bytes 17-20 may be interpreted as the tag information; otherwise the frame may be considered as untagged and tag data may be automatically inserted according to the chip/port number and the default priority/VLAN ID settings for the port.
- This configuration allows the CPU to originate frames that can be steered to specific egress ports by tagging different frames with different VID values.
- Ordinary frames i.e., untagged frames
- the default rules may be provided by the CPU.
- the source chip/port ID fields within the frames egressing the switch to the CPU may allow the CPU to identify the physical port of origin for every frame.
- the data frames from the codecs or IP cameras connected via ports 0 through 7 of each switch chip can be associated with the physical connection without needing special knowledge of the Ethernet source address or IP address of each codec/IP camera.
- the CPU can also use special settings of the tag-type flag bits as follows: (a) Setting 1 lb i.e., forward Distributed Switch Architecture (DSA) tag may imply a normal data frame from/to CPU, or from one switch chip to another; (b) 00b i.e., To-CPU DSA tag may imply control/management frame that may be received by the CPU; (c) 01b i.e., From-CPU DSA tag may imply control/management frame sent by the CPU; and (d) 10b i.e., To-Sniffer DSA tag may imply mirroring of frames to a nominated monitor port.
- DSA forward Distributed Switch Architecture
- the to/from-CPU DSA tag formats can be used to send register read/write commands to the switch chips and to receive status information from the switch chips.
- the source chip ID field can be used as a destination chip ID, allowing the CPU to send commands to any chip within the extended switch configuration.
- the switch chips may only accept command frames when ingressed via a particular physical port, e.g., either through port 9 or port 10, selected at power up by the microcontroller programming.
- port 9 be a preferred port for interconnecting with the CPU, and may be configured as a control port of the switch module.
- a typical default routing algorithm for all frames is as follows: (a) on ingress of each frame, the MAC source address (SA) may be stored with the physical port number in the Address Translation Unit (ATU) of the switch. This can be a hashed lookup table that can hold up to 8192 entries. It is assumed that all frames with a given SA will be received via the same physical port. The entries within the ATU will be aged out if not re-used within a certain time period (e.g., 5 minutes); (b) to decide the egress port for a unicast Ethernet frame, the ATU may be checked for an entry matching the MAC destination address (DA).
- SA MAC source address
- ATU Address Translation Unit
- the default routing algorithm can be modified by register settings that configure virtual local area networks (VLANs) based on physical port numbers. Without a port-based VLAN setup, a frame ingressing any port may be egressed through any other port. When a port-based VLAN setup is used, for each ingress port there is typically an individual list of the allowed egress ports. The ingress/egress rules do not need to be symmetrical e.g., it may be possible to configure a VLAN which allows frames to flow from port 0 to port 1, but not from port 1 to port 0.
- the port based VLAN routing may be operated in addition to the ATU routing.
- egress of broadcast frames can be limited to a selection of ports depending upon the ingress port, instead of to all ports.
- the egress of unicast/multicast frames may be determined by the entries in the ATU, but certain ports may be blocked (i.e., frames may not egress from a blocked port) according to the VLAN rules.
- Port-based VLANs may be operated across multiple switch chips when directly inter-connected using the "distributed switch architecture" method.
- the original source device and port number for each frame can be preserved within the tag information as the frame passes between chips, and the routing within each chip can be made with reference to the original chip/port ID values. For example, if a frame is ingressed to port 2 of chip 1, the port- based VLAN rules might limit its egress to only ports 7 and 8 of that chip. If port 8 connects to chip 2, then the frame might be limited to egress of only ports 5 and 6 of the second chip. But if a frame was originally ingressed to port 3 of chip 1, and similarly forwarded to chip 2 through port 8 of chip 1, that frame may be limited to egress only through port 7 of the second chip.
- the port-based VLANs can provide for complex partitioning of a network into a number of virtual LANs with traffic being kept private within each VLAN group. These VLANs, however, do not allow for changing the group used for individual frames on a frame- by-frame basis.
- the default frame routing and port-based routing of frames can be further modified by the VLAN ID tagging of frames.
- a normal Ethernet frame first ingresses to a multiple-chip switch system, it may be modified by the insertion of tag data as described above. This includes a VLAN ID (VID) value that may be set up individually for each port of each chip. In one embodiment, 4094 different VID values may be permitted. If a frame ingresses into the switch via a CPU- switch direct connection port, the CPU may pre-tag the frame, allowing the VID to be set on a frame-by-frame basis depending on the desired frame destination.
- VID VLAN ID
- the tag data from the original ingress port can be preserved, hence the original VID value may remain unmodified in the frame until it finally egresses to a normal network port.
- each switch chip there may be a list of port numbers that are associated with each possible VID value. A frame tagged with a particular VID may only egress through the ports listed for that VID.
- the VID based VLAN rules can operate in addition to the port-based VLAN rules and the normal ATU routing of frames. For example, frames originated by the CPU and ingressing port 9 of chip 1 can be limited by port-based VLAN rules to egress only through ports 0 to 7 of chip 1, or ports 8 or 10 of chip 2.
- An IP camera may also be configured such that it can specify/change the VID of a frame being transmitted.
- a module 400 for video recorder/server may include two switches 402, 404.
- the module can be configured to provide connections for 16 codecs or IP cameras 110. Connection to public Ethernet network 412, and two connections 414, 416 either to private video network or cascaded to expansion switch modules.
- switch settings that may be set by a microcontroller
- the port 8B and 10B connections will be to an external private video network.
- commands can be sent to the switches to detect whether in fact either of these ports are being used as cascades to connect to one or more additional switches, and accordingly, the switch settings may be revised.
- five separate network regions can be created as follows: the external public network, the external private video network, the IP-camera/codec connections, the main board connection, and the internal inter-switch connection.
- the VID/port VLAN routing rules can further limit the possible routes for unknown addresses and for broadcast/multicast traffic.
- Typical power on settings are shown in the table below. It should be understood that the settings described in the table are illustrative only, and that other settings of ports are within the scope of the present invention.
- Ports OA to 7A (for connection to codecs or ⁇ cameras)
- Port-based VLAN routing rules ingressing frames allowed egress ports 0A-7A (to go to other codecs/IP- cameras), 8A (to go to other switch chip) and 9A (to go to main board CPU). Port 10A egress is blocked (frames cannot go to public network).
- Egress mode ether-type DSA tagged for all frames extended tag created using information from the internal tag. This allows the CPU to see the VID/SID/PID of all received frames.
- Ingressed frames allowed egress at ports according to the VID based VLAN routing rules detailed above.
- Port 10A (for connection to external public network)
- Port based VLAN routing rules ingressing frames allowed egress port 8A (to go to other switch chip) and port 9A (to go to main board CPU). Ports 0A-7A egress is blocked (frames cannot go to codecs/IP -cameras).
- Ports OB to 7B (for connection to codecs or ⁇ cameras)
- Port-based VLAN routing rules ingressing frames allowed egress ports 0B-7B (to go to other codecs/IP -cameras), 9B (to go to other switch chip), 8B and 10B (to go to private video network).
- Ports 8B and 10B (for connection to external private video network, but allowing detect of cascade to further switch modules)
- Egress mode ether-type DSA tagged for control frames extended tag created using information from the internal tag. Egress mode normal network for all other frames, internal tag information is discarded.
- Ingressed frames allowed egress at ports according to the VID based VLAN routing rules detailed above.
- Ethernet driver code in a boot operating system can be modified to remove (and discard) any extended tag information from incoming frames, as indicated by an OxADOl value in the position of the ether-type field. With any other value at this position, the frame may be passed through to the TCP/IP stack unchanged.
- This switch configuration can allow free data transfer between main board and the public network connection, without the boot operating system requiring any knowledge of the switch module presence. No dynamic configuration of the switch is required to allow normal boot operation, i.e., DHCP/ARP/TCP etc. can operate with no code modification other than the single change in the low level Ethernet driver as described above. Note that Redboot with this modification can also operate correctly on a main board that has a direct connection to the public network, i.e., when the switch module is not present.
- Frames can pass from port 10A to switch B via the inter- switch link, but the VID based VLAN routing rules can then prevent egress to ports 0B-7B or the private network ports. Note, this may also be achieved in port-based routing wherein the source port ID would be retained in a frame, and then the ingress port of switch B would apply rules of port 10A. Hence a total firewall is automatically enforced between the public network and the private video network, even when operating under control of the boot operating system and when no specific switch module supervisor software is active. As a result, a method of frame header spoofing by an attacker on the public network may not provide access to the devices on the private video network.
- Traffic can be freely allowed, however, between any of ports 0A-7A and 0B-7B (via the port 8A to 9B inter-switch link), and also between any of these and the private network connections ports 8B and 10B.
- IP-cameras (as opposed to codec cards) are connected to any of ports 0A-7A, 0B-7B this configuration allows them to operate normally even before the main board application has booted up. For example, the IP-cameras may be browsed from a decoder unit connected on the private video network even if the main video server were inactive.
- an endpoint/device e.g., an IP camera or an analog video camera having a codec
- a unique identifier associated with the device such as a MAC address of the device is recorded in the port.
- the system is "locked down," i.e., a recorded identifier can be subsequently changed only by an authorized application program.
- the devices/endpoints become secured or trusted endpoints.
- the port receives and routes data frames from a connected device only if the unique identifier associated with the device matches with the identifier stored in the port.
- the port and/or switch In case of a mismatch of identifiers, the port and/or switch detect that a different, unauthorized device is connected to the port, and the port ignores the received data frames. Thus the closed network also becomes secured because the ingress port ensures that the data frames routed through the network were received from a secured or trusted endpoint.
- the public network instead of forming a total firewall between the public network and the private video network, it may be necessary to provide limited access to some devices/endpoints. In that situation, it is critical that any tampering with the device connected to a port be detected, so as to ensure that only authorized data are received by private network. Even when the access granted to an endpoint/device is limited, there is a risk of spoofing the unique identifier (e.g., MAC address, IP address, etc.) associated with the device. If the device's unique identifier is spoofed, it would match with the recorded identifier in the switch/port. Thus, the switch/port would not detect the unauthorized device.
- the unique identifier e.g., MAC address, IP address, etc.
- a unique key is generated corresponding to the trusted endpoint by the switch and is stored in the switch and at the trusted endpoint. Additionally or in the alternative, the key is stored at an IP master (e.g., a main computer or another trusted endpoint to which even a limited access is not granted).
- IP master e.g., a main computer or another trusted endpoint to which even a limited access is not granted.
- the unique key is generated by encrypting the device's MAC address using MD5 hashing, and it may be generated randomly. Other encryption methods and/or device parameters other than its unique identifier may also be used for generating the unique key.
- the unique key is configured such that it is substantially inaccessible from a public network, even though, the public network may have limited access to the secured endpoint for which the key is generated.
- a manifesto of all known, allowed, and connected IP address is compiled.
- the secured endpoints are polled at regular and/or random intervals requesting their respective unique keys. Even if an unauthentic device connected to a port spoofs the unique identifier, it may not have the correct unique key supplied by the switch at the point of lockdown. Therefore, if the key transmitted by an endpoint does not match with that stored in the switch and/or at the IP master, the endpoint can be determined to be unauthentic.
- the device may include the unique key in the header of the data frames transmitted.
- the unique key may be included in only some and not all data frames.
- the key may be used to encrypt the data frames transmitted by a trusted endpoint/device. If an unauthorized device sends data frames to a port, those data frames would not be encrypted using the unique key provided to the authorized device and, hence, the switch and/or port would recognize that the received data frames were not transmitted by an authorized source.
- pro-active monitoring is achieved by configuring a secured endpoint to monitor network traffic to detect if another device is spoofing, i.e., transmitting the endpoint' s unique identifier to the switch. In that event, the trusted endpoint may send an alert signal to the switch.
- a secured endpoint can also store counts of data frames ingressed and egressed by the endpoint.
- the switch may poll the endpoints for the stored counts and compare the received values with the respective counts maintained by the switch. If an unauthorized device were successful in transmitting data frames to the switch, the count values at the switch would not match with those received from the trusted endpoint, thus informing the switch the presence of the unauthorized device at the port where the count values did not match.
- the presence of an unauthorized device at a certain port may be detected by the switch.
- the switch may not be able to locate the rogue device, however, preventing it from sending data.
- the switch may isolate the port at which the rogue device was detected from the public and/or private network.
- the switch may also isolate the port entirely for a certain duration, re-check the status of the port and its response to polling after a predetermined interval, and re-establish its connection.
- the port and/or switch may also generate a system event (e.g., e-mail, alarm, etc.) when an unauthorized port is detected, alerting a system administrator to take further actions that may be necessary to secure the network.
- a system event e.g., e-mail, alarm, etc.
- Ethernet driver code in the application can be modified to remove any extended tag information from incoming frames.
- a cache of Switch ID (SID) / Port ID (PID) values corresponding Ethernet source address may be maintained, however.
- VID values can be used to route frames through a number of virtual Ethernet interface channels to the TCP/IP stack.
- the upper layers of the TCP/IP stack can receive normal network frames, although appearing to have come through multiple interfaces according to VID value.
- Outgoing frames from the TCP/IP stack can be transmitted as normal network frames if sourced from virtual Ethernet channel number zero. For other virtual channels the frames may be transmitted with extended tag information inserted containing the appropriate VID value.
- Switch control frames can be generated by direct calls to the Ethernet driver from a switch driver application, and these frames typically bypass the TCP/IP stack.
- the existing application network code can operate without modification with respect to traffic between the main board and the public network.
- the application does not need any switch-awareness for normal operation of DHCP/ARP/TCP etc.
- the application program build can also operate normally on a main board that has a direct connection to the public network i.e., when the switch module is not present.
- Switch-aware application code can check for the presence of the switch module by checking the Ethernet driver cache of SID/PID/SA values to see if incoming frames are being received with tags. If there are no incoming frames (interface connection seeming to be operational, but not receiving traffic) then control frames can be sent to determine if there is any response from the switch. These frames may not affect a public network if they are transmitted to such network when a switch is not present.
- the OxADOl marker i.e., tag- specifier value
- the OxADOl marker i.e., tag- specifier value in the frames may only have meaning for specially configured switches. All other equipment (even if containing a switch chip) may ignore the control frames.
- control frames can be sent out to detect the presence of second and subsequent modules that may be connected via the ports 8B and 10B cascade connections. If additional switches are detected, the routing rules can be revised and the egress mode of these ports can be reconfigured to use Ether-type DSA tagging for all frames. Then, the VID/SID/PID values originating from the CPU can be preserved on frames that are addressed to destination ports reached via the second/subsequent switch modules.
- TCP/IP stack this is looked after by the IP address routing tables in exactly the same way as when using multiple physical ethernet interfaces.
- AoE driver this just requires adding interface "eth2" as an extra interface where AoE drives may be searched for.
- Switch-aware application code can find the codecs/IP-cameras that are physically attached to switch ports 0A-7A and 0B-7B, by querying the Ethernet driver cache for
- the SA can then easily be converted to the codec/camera IP address by either searching the ARP cache or using the RARP protocol.
- the switch-aware application code may seek to mirror some ARP frames received from the public network segment onto the private network segment, and vice versa.
- IP allocation for devices on the private network uses the zero-conf protocol and allocation on the public network typically uses a DHCP server, so that there may be no address conflicts. In some circumstances, however the zero-conf protocol may also be used on the public network, creating the possibility of address conflicts.
- ARP frames are mirrored between public to private networks, and vice versa, conflicts can be avoided because both segments can have visibility of addresses that have already been used.
- ARP frames are the only type of frames that may be allowed to pass between the public and private network segments. Note that this mirroring may not be done automatically within the switch module, but by reception at and re-transmission from the main board CPU. This can facilitate preventing an ARP frame circling between two video servers via public and private network segments (i.e., being transmitted repeatedly, back and forth, between the two servers). If an incoming ARP were recognized as being identical to one previously transmitted within a short interval, it may not be re-transmitted.
- Codec and IP camera software can operate without modification, other than generally using the zeroconf method for assigning IP addresses instead of DHCP. As far as these modules are concerned they may be connected via an ordinary Ethernet network.
- the codec/IP camera software can operate normally as long as the switch module is powered up, even when the main board is inactive or running boot operating system. In this mode, however, the network may operate as private network that is hidden from the public network, i.e., there may be no transfer of any data between the two network segments.
- An alternative setting for the egress mode of switch ports 0A-7B can provide for a high security mode of operation of the codecs/IP-cameras. These ports may be set to use egress mode ether- type DSA tagged for all frames, with extended tag created using information from the internal tag. This may require that the Ethernet driver code of the codec/IP-camera be tag- aware, so that it can check for and remove the extended tags before passing frames up to the TCP/IP stack, caching the SID/PID/SA information in the driver.
- an IP-camera connected to one of ports 0A-7B might allow configuration commands only from the main board of a video server directly connected to the switch, while allowing other video servers or decoder units connected to the private video network to make connections for the purpose of viewing images only.
- the high security mode may be used only with codecs/IP-cameras that have been identified as supporting this operation.
- a two-module system is now described with reference to Fig. 5.
- This system can provide connections for 32 codecs or IP cameras 502, two connections 504, 506 for public Ethernet networks, and three connections 508 for private video network or for cascade to expansion switch modules.
- the power-on settings for the first module can be similar to those for a single module having two switches, as described above.
- the settings for the second module are similar, but with an important difference that the default VID value for port 9A may be 5 (i.e., private network traffic) instead of 4 (i.e., public network traffic).
- This setup can be automatically managed by the module microcontroller, based on the module ID.
- Main-board software may also be operated as described above for a single module.
- the power on settings of the switch modules may allow boot operating system to communicate with devices on the public network segment via the first public network connection on switch module zero. All devices on the private network segment can inter-communicate without Redboot requiring any special awareness of the switch modules or having to perform any special setup actions. Redboot may not communicate with the private video network, and there may be no traffic between the public and private network segments.
- the main application code When the main application code starts up, it can check for the presence of the first switch module by detecting whether incoming frames are being received with tags and by sending control commands to the switch. Once the first module has been detected, control commands can be passed through to detect the second module.
- the ingress/egress modes of the inter-communicating ports of the switches can then be modified to provide full distributed switch architecture operating mode with the tag information being preserved on all frames passing either way through the link. This process can then repeated as necessary to detect any further cascaded switches.
- the distributed switch architecture design may allow up to 30 switch modules to be linked for a single video server, providing up to 240 ports for connecting IP-cameras/codecs. All switches may be set with a different SID value to allow correct physical port to tag information correspondence. Switch modules may be cascaded together in a chained manner without requiring any other external dumb switch/hub units. Each module can have two connections available that may be used as private network connections or as cascades to further switch modules. A few example configurations are shown in Figs. 6-8.
- the embodiment illustrated in Fig. 6 includes three modules 602, 604, 606 arranged in a linear chain. It has 3 public network connections, 4 private network connections, and up to 48 codec/IP-cameras. Data from the first 8 cameras can be received by the main board via a single switch, data from the second 8 cameras via two switches, and data from the third 8 cameras via three switches.
- module numbering can be in increasing order according to the cameras or in any other order.
- the internal module of the video server may be module zero as the default power-on configuration of module 0 is typically different.
- the module IDs of other modules can, however, be set to any values in any order provided that all modules are given unique numbers.
- FIG. 7 Another embodiment, shown in Fig. 7 has five modules 702, 704, 706, 708, 710, forming a branching chain. It can provide 5 public network connections, 6 private network connections, and up to 80 codecs / IP-cameras. In this configuration, data transmitted to the main board from any camera may not have to pass through more than 6 switches (i.e. three modules). Using a branching chain the maximum number of switches that frames may have to pass through increases logarithmically with camera count.
- dumb switch/hub units e.g., off-the-shelf network switches
- the embodiment shown in Fig. 8 uses seven intelligent video switch modules 802, 804, 806, 810, 812, 816, 816 and a dumb network Gb Ethernet switch 820 having at least seven ports.
- This system can provide up to 112 IP-cameras/codecs, seven public network connections, and thirteen private video network connections.
- Ethernet frames may not have to pass through more than five switches (four in modules and the dumb network switch).
- the spare ports of the dumb switch may not be used as extra private or public network ports, however.
- the dumb switch is considered to be part of the cascade connection and all traffic passing through it may contain VID/SID/PID tag information using the OxADOl tag marker.
- Fig. 9 illustrates one possible interconnection between two video servers 902, 904 each of which uses multiple switch modules.
- multiple video server systems may be interconnected using their public and/or private network connections. Their cascade connections must be isolated.
- a single video server may be considered to include a main system unit with its built-in switch module, plus optional additional switch modules linked in a cascade network.
- the module ID numbers must all be unique within the network of one server, but do not need to be unique across different servers (indeed, each server may have at least an individual module zero).
- the four connections shown are (left to right) private/cascade-out 910, private/cascade-out 912, public network 914, main-board/cascade-in 916.
- the two servers are connected together on both public network and private network. Note, however, that there is only a single interconnect on each side for preventing network loops.
- the private network link between the servers differs from an internal cascade connection in that the outgoing port from server one is operated in private network mode, not cascade-out mode; and the ingoing port of server two is another private network port, and not a cascade-in port.
- the IP-cameras/codecs connected within each video server may be considered to be owned by the particular server. Only server 1 may have visibility of the VID/SID/PID tags on the traffic from the server 1 IP-cameras (and hence immediate knowledge of the physical connectivity of these IP-cameras); likewise only server 2 may have visibility of the traffic tags for its IP-cameras. However, all these IP-cameras/codecs may also visible as normal network devices on the private video network. Therefore, it may be possible for server 2 to make a guest connection to view any of server l's cameras, without the data having to all be routed via the server 1 main board CPU.
- An exemplary data flow can be [server 1 IP-camera] -> private network -> [server 2 display codec].
- Guest connections can also be made via the public network, but in this case the firewall operation means that all data has to be routed via the main board CPUs.
- the server 1 can request camera data from server 2 via the public network, but the connection may have to be established between the two CPUs and the data may flow as [server 2 IP- camera] -> [server 2 main board] -> public network -> [server 1 main board] -> [server 1 display codec] .
- a NAT router unit can be included within the switch unit, as shown in Fig. 10. This can provide for intelligently tunneling selected traffic between the public, private, and internal network segments.
- the NAT router 1002 may include a fast network processor device capable of receiving frames, inspecting the frame data at L2 (Ethernet header) / L3 (IP header) / L4 (TCP header) protocol layers, applying rules for accepting / rejecting / modifying frames, and then re-transmitting them.
- the NAT router 1002 may be sited between port 10A of a first switch module 1004 and the public network connection 1006.
- a SPI unit can also be used.
- All frames moving between the public network and the switch module may have to pass through the NAT router 1002. It can inspect and optionally modify the MAC address, IP address, and TCP port number information.
- the standard routing rules for frames ingressing the switch module at port 10A from the public network only allow egress to the main board CPU on port 9A. When the presence of the NAT router 1002 has been detected, however, these rules may be updated to allow for the ingressing frames to be VLAN tagged. The frames can then be directed either to the main board CPU, the codecs/IP-cameras, or the external private video network according to the VID values.
- frames originating from the codecs/IP- cameras and private video network can normally only egress port 9 A, but special VID values may allow them to egress at port 10A for transit to the public network via the NAT router 1002.
- Detection and dynamic configuration of the NAT router may be performed by the main board CPU sending special control frames. This can also allow updating of the NAT routing rules on the fly.
- FIG. 11 schematically shows an IP camera 1100 according to the present invention.
- the IP camera 1100 includes a storage unit 1102, a server 1104, and a switching module 1106.
- a terminal 1110 of camera 1100 is connected to port OA of the switching module 1106, and also to the storage unit 1102.
- Video data recorded by camera 1100 may be delivered on terminal 1110, and may be stored in storage unit 1102, and may also be routed through switching module 1106 to other destinations in a secure network.
- Other cameras IP or analog
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Multimedia (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Small-Scale Networks (AREA)
Abstract
Description
Claims
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2011246969A AU2011246969B2 (en) | 2010-04-30 | 2011-04-29 | An IP-closed circuit system and method |
CA2834733A CA2834733A1 (en) | 2010-04-30 | 2011-04-29 | An ip-closed circuit system and method |
EP11738475.0A EP2564565B1 (en) | 2010-04-30 | 2011-04-29 | An ip-closed circuit system and method |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US32986010P | 2010-04-30 | 2010-04-30 | |
US61/329,860 | 2010-04-30 | ||
US37817110P | 2010-08-30 | 2010-08-30 | |
US61/378,171 | 2010-08-30 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2011135452A2 true WO2011135452A2 (en) | 2011-11-03 |
WO2011135452A3 WO2011135452A3 (en) | 2012-03-29 |
Family
ID=44629301
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/IB2011/001166 WO2011135452A2 (en) | 2010-04-30 | 2011-04-29 | An ip-closed circuit system and method |
Country Status (6)
Country | Link |
---|---|
US (2) | US9219617B2 (en) |
EP (2) | EP2564565B1 (en) |
AU (1) | AU2011246969B2 (en) |
CA (1) | CA2834733A1 (en) |
TW (1) | TW201208302A (en) |
WO (1) | WO2011135452A2 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017137835A1 (en) * | 2016-02-10 | 2017-08-17 | Dalton Wilson Michael | Electronic devices with automated intelligence |
US20220052982A1 (en) * | 2018-09-17 | 2022-02-17 | The Secretary State For Foreihn And Commonwealth | A method and device for transferring electronic information |
Families Citing this family (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8442228B2 (en) | 2010-04-06 | 2013-05-14 | MicroTechnologies LLC | Multi-class switching system and associated method of use |
US10477158B2 (en) | 2010-11-05 | 2019-11-12 | Razberi Technologies, Inc. | System and method for a security system |
US11082665B2 (en) | 2010-11-05 | 2021-08-03 | Razberi Secure Technologies, Llc | System and method for a security system |
US9860490B2 (en) * | 2010-11-05 | 2018-01-02 | Tom Galvin | Network video recorder system |
US10157526B2 (en) | 2010-11-05 | 2018-12-18 | Razberi Technologies, Inc. | System and method for a security system |
ITMI20120491A1 (en) * | 2012-03-27 | 2013-09-28 | Videotec Spa | INTERFACE DEVICE FOR CAMERAS |
US9094739B2 (en) | 2012-10-31 | 2015-07-28 | Unicorn Government, Inc. | Internet protocol switching system and associated method of use |
EP2846509B1 (en) * | 2013-09-09 | 2019-08-28 | Alcatel Lucent | Tls protocol extension |
TWI552589B (en) * | 2014-01-09 | 2016-10-01 | Chunghwa Telecom Co Ltd | End-to-end active test IPTV channel access quality method |
US20160013976A1 (en) * | 2014-07-14 | 2016-01-14 | Futurewei Technologies, Inc. | Wireless Through Link Traffic Reduction |
US9886264B2 (en) * | 2014-12-09 | 2018-02-06 | Xiaomi Inc. | Method and device for upgrading firmware |
US9628334B2 (en) * | 2014-12-19 | 2017-04-18 | Cisco Technology, Inc. | VLAN tagging in a virtual environment |
US9882774B2 (en) | 2015-02-02 | 2018-01-30 | Eero Inc. | Systems and methods for intuitive home networking |
JP2016201683A (en) * | 2015-04-10 | 2016-12-01 | ソニー株式会社 | Video server, video server system and instruction processing method |
US9736019B2 (en) | 2015-05-14 | 2017-08-15 | Eero Inc. | Methods for dynamic router configuration in a mesh network |
US10225105B2 (en) * | 2015-07-08 | 2019-03-05 | Openvpn Technologies, Inc. | Network address translation |
US10778593B2 (en) * | 2015-12-03 | 2020-09-15 | Arista Networks, Inc. | Virtual cable |
CN105634903B (en) * | 2015-12-31 | 2019-03-22 | 深圳市磊科实业有限公司 | A kind of port corresponding method of NVR and IPC |
US10079828B2 (en) * | 2016-07-06 | 2018-09-18 | Chekt Llc | CCTV monitoring system for registering camera and managing permission and control method thereof |
JP6737955B2 (en) | 2016-09-27 | 2020-08-12 | エーナイン・ドット・コム インコーポレイテッドA9.com, Inc. | How to share network settings |
US10769080B2 (en) * | 2017-03-30 | 2020-09-08 | Futurewei Technologies, Inc. | Distributed and shared memory controller |
US10644969B2 (en) | 2017-08-08 | 2020-05-05 | Arista Networks, Inc. | Method and system for network elements to internally probe their forwarding elements |
US10644975B2 (en) * | 2017-08-08 | 2020-05-05 | Arista Networks, Inc. | Method and system for probing forwarding elements of network elements |
BE1027224B1 (en) * | 2019-04-24 | 2020-11-23 | Phoenix Contact Gmbh & Co | Modular switch for use in a data transmission and control system |
US20220335029A1 (en) * | 2021-04-19 | 2022-10-20 | Dell Products L.P. | Prioritized hash table |
CA214944S (en) * | 2021-10-22 | 2024-06-10 | Banner Eng | Communication hub |
Family Cites Families (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6337863B1 (en) * | 1997-01-17 | 2002-01-08 | Alcatel Interworking, Inc. | Seamless communication service with intelligent edge devices |
US6930709B1 (en) * | 1997-12-04 | 2005-08-16 | Pentax Of America, Inc. | Integrated internet/intranet camera |
US6741592B1 (en) * | 2000-05-22 | 2004-05-25 | Cisco Technology, Inc. | Private VLANs |
JP4168574B2 (en) | 2000-06-02 | 2008-10-22 | 株式会社日立製作所 | Packet transfer apparatus, packet transfer control method, and packet transfer apparatus setting method |
US7031267B2 (en) * | 2000-12-21 | 2006-04-18 | 802 Systems Llc | PLD-based packet filtering methods with PLD configuration data update of filtering rules |
US7058967B2 (en) * | 2000-12-15 | 2006-06-06 | Lockheed Martin Corporation | Video distribution system and method |
US20030081121A1 (en) * | 2001-10-30 | 2003-05-01 | Kirmuss Charles Bruno | Mobile digital video monitoring with pre-event recording |
US7440467B2 (en) * | 2004-05-05 | 2008-10-21 | Gigamon Systems Llc | Asymmetric packet switch and a method of use |
US20060136575A1 (en) * | 2004-05-11 | 2006-06-22 | Ray Payne | Integrated security suite architecture and system software/hardware |
AU2005249022A1 (en) * | 2004-05-31 | 2005-12-15 | Jason Andrew Roper | Computer network security |
US7808992B2 (en) * | 2004-12-30 | 2010-10-05 | Cisco Technology, Inc. | Platform independent implementation of private VLANS |
WO2007030689A2 (en) * | 2005-09-09 | 2007-03-15 | Agilemesh, Inc. | Surveillance apparatus and method for wireless mesh network |
US7624417B2 (en) * | 2006-01-27 | 2009-11-24 | Robin Dua | Method and system for accessing media content via the internet |
US20070204350A1 (en) * | 2006-02-18 | 2007-08-30 | Gibson Guitar Corp. | Secure Internet |
US8073936B2 (en) * | 2006-06-08 | 2011-12-06 | Cisco Technology, Inc. | Providing support for responding to location protocol queries within a network node |
US8616976B2 (en) * | 2006-11-07 | 2013-12-31 | Core Wireless Licensing S.A.R.L. | Gaming via peer-to-peer networks |
US7903655B2 (en) * | 2007-04-19 | 2011-03-08 | Hewlett-Packard Development Company, L.P. | Marked packet forwarding |
US8347355B2 (en) * | 2008-01-17 | 2013-01-01 | Aerohive Networks, Inc. | Networking as a service: delivering network services using remote appliances controlled via a hosted, multi-tenant management system |
-
2011
- 2011-04-29 CA CA2834733A patent/CA2834733A1/en not_active Abandoned
- 2011-04-29 EP EP11738475.0A patent/EP2564565B1/en active Active
- 2011-04-29 EP EP15164338.4A patent/EP2975804A1/en not_active Withdrawn
- 2011-04-29 WO PCT/IB2011/001166 patent/WO2011135452A2/en active Application Filing
- 2011-04-29 AU AU2011246969A patent/AU2011246969B2/en not_active Ceased
- 2011-04-29 TW TW100115196A patent/TW201208302A/en unknown
- 2011-04-29 US US13/097,645 patent/US9219617B2/en not_active Expired - Fee Related
-
2015
- 2015-11-20 US US14/947,231 patent/US20160249018A1/en not_active Abandoned
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017137835A1 (en) * | 2016-02-10 | 2017-08-17 | Dalton Wilson Michael | Electronic devices with automated intelligence |
US20220052982A1 (en) * | 2018-09-17 | 2022-02-17 | The Secretary State For Foreihn And Commonwealth | A method and device for transferring electronic information |
Also Published As
Publication number | Publication date |
---|---|
AU2011246969B2 (en) | 2015-09-17 |
US20160249018A1 (en) | 2016-08-25 |
EP2564565B1 (en) | 2015-04-22 |
TW201208302A (en) | 2012-02-16 |
US20110292206A1 (en) | 2011-12-01 |
EP2975804A1 (en) | 2016-01-20 |
US9219617B2 (en) | 2015-12-22 |
EP2564565A2 (en) | 2013-03-06 |
CA2834733A1 (en) | 2011-11-03 |
WO2011135452A3 (en) | 2012-03-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU2011246969B2 (en) | An IP-closed circuit system and method | |
AU2011246969A1 (en) | An IP-closed circuit system and method | |
US9054990B2 (en) | System and method for data center security enhancements leveraging server SOCs or server fabrics | |
US7624434B2 (en) | System for providing firewall capabilities to a communication device | |
US8918631B1 (en) | Methods and apparatus for dynamic automated configuration within a control plane of a switch fabric | |
US9032504B2 (en) | System and methods for an alternative to network controller sideband interface (NC-SI) used in out of band management | |
US20130022040A1 (en) | System and method for high-performance, low-power data center interconnect fabric with broadcast or multicast addressing | |
US8799466B2 (en) | Method and apparatus for automatic verification of a network access control construct for a network switch | |
JP2024038229A (en) | Enhanced smart process control switch port lockdown | |
US20120155483A1 (en) | Video Router and Method of Automatic Configuring Thereof | |
US20070101422A1 (en) | Automated network blocking method and system | |
US20090172151A1 (en) | Dynamic network configuration | |
US9118606B2 (en) | Method and apparatus for simulating IP multinetting | |
US20110202685A1 (en) | System and Method for Communication Between an Information Handling System and Management Controller Through a Shared LOM | |
AU2012272455B2 (en) | Methods of connecting network-based cameras to video stations, and corresponding video surveillance systems, video stations, and network-based cameras | |
US20140152837A1 (en) | Video monitoring system | |
US20200344269A1 (en) | Network switches with secured switch ports to baseboard management controllers | |
US20160072733A1 (en) | Using a network switch to control a virtual local network identity association | |
AU2015271891A1 (en) | An IP-closed circuit system and method | |
US20090276538A1 (en) | Devices and methods for providing network access control utilizing traffic-regulation hardware | |
US12021658B2 (en) | Switch device, in-vehicle communication system, and communication method | |
US20020129276A1 (en) | Dual network with distributed firewall for network security | |
US20230141041A1 (en) | Switch device, in-vehicle communication system, and communication method | |
KR102103484B1 (en) | Method and system for providing intranet service by customer using virtual networking technology | |
KR20230165636A (en) | System and managed switch for network separation by household of wall pad of apartment house |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 11738475 Country of ref document: EP Kind code of ref document: A2 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2011738475 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 2011246969 Country of ref document: AU Date of ref document: 20110429 Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 2834733 Country of ref document: CA |