network DNA may be determined for a computer network that taxonomically classifies the computer network. network DNA may include derived network DNA components and raw network DNA components. Raw network DNA components may be acquired from local or remote sources. Derived network DNA components may be generated according to derived network DNA component specifications. Derived network DNA component specifications may reference raw network DNA components. network DNA determined for the computer network may include a network species component capable of indicating network species classifications for computer networks. network species classifications may include enterprise network, home network and public place network. network species classifications may be determined as a function of network security, network management and network addressing. One or more network DNA stores may be configured to store network DNA for computer networks. network DNA stores may store network DNA history as well as current network DNA.
|
1. A method for managing network communications, the method comprising:
obtaining a classification of a type of a computer network from amongst multiple different types of computer networks, wherein obtaining the classification includes:
deriving the classification from multiple network attributes associated with the computer network, wherein:
the multiple network attributes include a domain name, a presence of a network infrastructure element, a parameter received from a network server, a communications media type, a service provider, a nominal available communications bandwidth, a measured available communications bandwidth, and/or a physical network location;
obtaining at least one network classification policy based on the obtained classification for the computer network; and
implementing a network classification policy action according to the at least one obtained network classification policy, wherein implementing the at least one network classification policy action includes:
configuring network security settings based on the obtained classification.
11. A computing device that is connectable to at least one network, the computing device comprising:
a memory and at least one processor that are respectively configured to store and execute instructions that are organized into:
a classification store that stores network classifications, the network classifications classifying types of networks according to network characteristics;
a network classification policy enforcer that:
selects a network classification policy action to execute based on a determined network classification from the classification store; and
configures network security settings according to definitions of the selected network classification policy action;
a network attribute acquirer that receives indications of multiple network attributes associated with the network, wherein:
the multiple network attributes include a domain name, a presence of a network infrastructure element, a parameter received from a network server, a communications media type, a service provider, a nominal available communications bandwidth, a measured available communications bandwidth, and/or a physical network location; and
a network characteristic generator that determines the network classification from the stored network classifications according to the received indications of the multiple network attributes associated with the network.
18. A computing device that is connectable to at least one network, the computing device comprising:
a network interface configured to connect the computing device to a network;
at least one memory and at least one processor that are respectively configured to store and execute computer-executable components, the computer-executable components including:
a classification store configured to store network classifications, the network classifications associating types of networks to network characteristics;
a network classification policy enforcer configured to:
select a network classification policy for the network connected to via the network interface based on a determined network classification for the network; and
configure network security settings for the network according to definitions of the selected network classification policy action for the network;
a network attribute acquirer configured to receive indications of multiple network attributes associated with the network from the network interface, wherein:
the multiple network attributes comprising a domain name, a presence of a network infrastructure element, a parameter received from a network server, a communications media type, a service provider, a nominal available communications bandwidth, a measured available communications bandwidth, and/or a physical network location; and
a network characteristic generator configured to determine the network classification for the network connected to via the network interface from the stored network classifications according to the received indications of the multiple network attributes associated with the network.
2. The method of
configuring applications settings of a computing device for the network communications via the computer network.
3. The method of
selecting the computer network from amongst multiple available networks.
4. The method of
the multiple network attributes include information received from a remote computer.
5. The method of
the obtained classification indicates the type of network selected from amongst a plurality of network types.
6. The method of
the plurality of network types comprise an enterprise network, a home network and a public network.
7. The method of
the obtained classification specifies a combination of network attributes of the multiple network attributes.
8. The method of
obtaining the classification also includes deriving the classification based on a structured query language statement, a scripting language statement, and/or an object-oriented language statement.
9. The method of
the classification is also derived based on each derived network characteristic referenced by a network characteristic list matching network attributes of the network, the network characteristic list referencing at least one network characteristic dependent upon two or more network attributes.
10. The method of
the classification is also derived based on confidence levels associated with each of at least two network attributes of the multiple network attributes.
12. The computing device of
configures applications settings for communications via the network.
13. The computing device of
the multiple network attributes include information received from an authenticated remote computer.
14. The computing device of
the determined network classification indicates a type of network selected from amongst a plurality of network types.
15. The computing device of
the plurality of network types comprise an enterprise network, a home network and a public network.
16. The computing device of
the determined network classification is at least partially defined by a combination of the multiple network attributes.
17. The computing device of
determines the network classification based on confidence levels associated with a plurality of network attributes from the multiple network attributes.
19. The computing device of
the multiple network attributes include information received from a remote computing device.
20. The computing device of
the determined network classification indicates a type of network selected from amongst a plurality of network types.
21. The computing device of
the plurality of network types comprise an enterprise network, a home network and a public network.
22. The computing device of
determine the network classification based a combination of the multiple network attributes.
23. The computing device of
determine the network classification based on confidence levels associated with a plurality of network attributes from the multiple network attributes.
24. The computing device of
configuring applications settings of the computing device for network communications via the network.
25. The computing device of
determine the network classification based on each derived network characteristic referenced by a network characteristic list matching network attributes of the network, the network characteristic list referencing at least one network characteristic with two or more network attributes.
|
This application is a continuation of U.S. patent application Ser. No. 13/300,743, filed Nov. 21, 2011, entitled “Network Classification,” now U.S. Pat. No. 8,676,969, issued Mar. 18, 2014, which is a continuation of U.S. patent application Ser. No. 10/773,681, filed Feb. 6, 2004, entitled “Network Classification,” now U.S. Pat. No. 8,126,999, issued Feb. 28, 2012. The entirety of these afore-mentioned applications are incorporated herein by reference.
This invention pertains generally to computer networks and, more particularly, to computer network categorization.
Computer networks and computer networking have become widespread. Underlying this spread is an increasing variety of computer network types, components and configurations. As a result, a computer system and/or computer system user attempting to maintain computer network connectivity may be subjected to requests for a bewildering array of network configuration parameters or be provided with numerous network characteristics and required to make connectivity decisions either without sufficient information or lack of understanding of the same. Perhaps worse, connectivity may be lost, not because of technical unavailability but, for example, through the use of the wrong network connectivity procedure. Attempts to resolve connectivity troubles may be hindered by a lack of readily available network status indicators and/or a common vocabulary for communicating with expert help.
Even where network connectivity itself is nominally maintained between computers, applications hosted by networked computers may need to adapt to network changes in order, for example, to avoid performance penalties or to prevent security vulnerabilities. As a result of the vast array of conventional network attributes, few applications are able to take each conventional network attribute into account. Networked application users may find themselves in the position of having overcome network connectivity difficulties only to be frustrated by a networked application that was the motivation for establishing connectivity in the first place, or to unknowingly expose themselves to a security risk.
While the above issues are particularly encountered by mobile computers and mobile computer users, it is common for multiple computer networks to be available to even immobile computers over their lifetime, if not concurrently. For example, many urban locations have at least one wired network connection as well as one or more wireless network options. Where multiple computer networks are available, the decision of which computer network to choose for a particular data packet may be a complex process in which conventional network attributes may not be able to provide the deciding factor.
This section presents a simplified summary of some embodiments of the invention. This summary is not an extensive overview of the invention. It is not intended to identify key/critical elements of the invention or to delineate the scope of the invention. Its sole purpose is to present some embodiments of the invention in a simplified form as a prelude to the more detailed description that is presented later.
In an embodiment of the invention, network DNA is determined for a computer network that taxonomically classifies the computer network. Network DNA may include derived network DNA components and raw network DNA components. Raw network DNA components may be acquired from local or remote sources. Each raw network DNA component may correspond to an attribute of the computer network. Derived network DNA components may be generated according to derived network DNA component specifications. Derived network DNA component specifications may reference raw network DNA components.
In an embodiment of the invention, network DNA determined for the computer network includes a network species component. In an embodiment of the invention, the network species component is capable of indicating network species classifications for computer networks. Network species classifications may include enterprise network, home network and public place network. Network species classifications may be determined as a function of network security, network management, network addressing, the network's intended use, and other attributes.
In an embodiment of the invention, one or more computers are connected to one or more computer networks. One or more network DNA stores may be configured to store network DNA for the computer networks. Network DNA stores may store network DNA history as well as current network DNA.
While the appended claims set forth the features of the invention with particularity, the invention and its advantages are best understood from the following detailed description taken in conjunction with the accompanying drawings, of which:
Prior to proceeding with a description of the various embodiments of the invention, a description of a computer in which the various embodiments of the invention may be practiced is now provided. Although not required, the invention will be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, programs include routines, objects, components, data structures and the like that perform particular tasks or implement particular abstract data types. The term “program” as used herein may connote a single program module or multiple program modules acting in concert. The terms “computer” and “computing device” as used herein include any device that electronically executes one or more programs, such as personal computers (PCs), hand-held devices, multi-processor systems, microprocessor-based programmable consumer electronics, network PCs, minicomputers, tablet PCs, laptop computers, consumer appliances having a microprocessor or microcontroller, routers, gateways, hubs and the like. The invention may also be employed in distributed computing environments, where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, programs may be located in both local and remote memory storage devices.
Referring to
The computer 102 may also have additional features/functionality. For example, computer 102 may also include additional storage (removable 110 and/or non-removable 112) including, but not limited to, magnetic or optical disks or tape. Computer storage media includes volatile and non-volatile, removable and non-removable media implemented in any method or technology for storage of information, including computer-executable instructions, data structures, program modules, or other data. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory, CD-ROM, digital versatile disk (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to stored the desired information and which can be accessed by the computer 102. Any such computer storage media may be part of computer 102.
The computer 102 preferably also contains communications connections 114 that allow the device to communicate with other devices such as remote computer(s) 116. A communication connection is an example of a communication medium. Communication media typically embody computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media. By way of example, and not limitation, the term “communication media” includes wireless media such as acoustic, radio frequency (RF), infrared and other wireless media. The term “computer-readable medium” as used herein includes both computer storage media and communication media.
The computer 102 may also have input devices 118 such as a keyboard/keypad, mouse, pen, voice input device, touch input device, etc. Output devices 120 such as a display, speakers, a printer, etc. may also be included. All these devices are well known in the art and need not be described at length here.
In the description that follows, the invention will be described with reference to acts and symbolic representations of operations that are performed by one or more computing devices, unless indicated otherwise. As such, it will be understood that such acts and operations, which are at times referred to as being computer-executed, include the manipulation by the processing unit of the computer of electrical signals representing data in a structured form. This manipulation transforms the data or maintains it at locations in the memory system of the computer, which reconfigures or otherwise alters the operation of the computer in a manner well understood by those skilled in the art. The data structures where data is maintained are physical locations of the memory that have particular properties defined by the format of the data. However, while the invention is being described in the foregoing context, it is not meant to be limiting as those of skill in the art will appreciate that various of the acts and operation described hereinafter may also be implemented in hardware.
A computer networking environment suitable for incorporating aspects of the invention may include multiple computer networks. Suitable computer networks may be differentiated by a variety of factors, for example, extent and coverage scope, implementation technology, node management, network security, network connectivity, node addressing schemes, service infrastructure elements, network mobility, network purpose and intended use, network topology and topological location as well as network operational characteristics. Examples of computer network coverage scope designations include personal area network (PAN), local area network (LAN), metropolitan area network (MAN) and wide area network (WAN). Coverage scope of computer networks may be related to computer network physical extent. Computer networks with different physical extents may employ different implementation technologies.
Broadly, implementation technologies may include wireless and wire-line. Suitable wireless technologies may include wireless communications protocols such as wireless communication protocols in compliance with the Institute of Electrical and Electronic Engineers (IEEE) 802.1x series of standards (e.g., Wi-Fi), and wireless communication protocols in compliance with the European Telecommunication Standards Institute (ETSI) Global System for Mobile communications (GSM) series of standards including a general packet radio service (GPRS), an enhanced data GSM environment (EDGE) and a universal mobile telecommunications system (UMTS). Wireless technologies may further include wireless communications protocols in compliance with a code division multiple access (CDMA) series of standards including CDMA 1X and CDMA2000, as well as the Bluetooth (BT) series of standards and the like. Wireless technologies may also include switched multi-megabit data services (SMDS), multi-channel multipoint distribution services (MMDS), local multipoint distribution services (LMDS), ultra-wideband (UWB) wireless, low power wireless sensor networks such as ZigBee™, as well as satellite-based wireless communication technologies.
Suitable wire-line technologies may include Ethernet (e.g., communications protocols in compliance with the IEEE 802.3x series of standards), Token ring (e.g., communications protocols in compliance with the IEEE 802.5x series of standards), as well as dial-up communication protocols such as Serial Line Internet Protocol (SLIP), Point-to-Point Protocol (PPP) and Remote Access Service (RAS). Wire-line technologies may further include integrated services digital network (ISDN), asynchronous transfer mode (ATM) protocols, cable modems in compliance with data communication standards such as a data over cable service interface specification (DOCSIS) as well as digital subscriber line (xDSL) and compatible technologies. Higher layer, e.g., International Standards Organization (ISO) Open System Interconnection (OSI) model layer, communication protocols such as Transmission Control Protocols (TCP) and Internet Protocols (IP) are further examples of suitable computer network implementation technologies.
Nodes (e.g., computers and infrastructure elements) of computer networks may be managed or unmanaged. In an embodiment of the invention, managed nodes do grant authority (e.g., authority to enforce network policy) to computer network administrators of computer networks to which they belong. In an embodiment of the invention, each node of a managed computer network is a managed node. Infrastructure elements of unmanaged computer networks may be managed nodes. In an embodiment of the invention, unmanaged nodes may form an unmanaged computer network (e.g., an ad hoc network) where there is no central administrator to enforce higher reliability and security standards for the network. Secure computer networks may include infrastructure elements such as firewalls, may require encrypted and authenticated communications (e.g., with nodes of other networks), and may engage in active intrusion detection.
Computer networks may have varying levels of network connectivity, for example, full, limited or none. Computer networks with limited network connectivity may limit access within the network as well as to other computer networks. Limited network connectivity may occur by design (e.g., policy and/or filtering), through misconfiguration or because of host/network component failure (e.g., host network adaptor or switch/router failure). Computer networks may incorporate different addressing schemes, for example, internal (private) addressing or external (public) addressing. Computer networks incorporating internal addressing may require infrastructure elements capable of network address translation (NAT) in order to provide connectivity to computer networks incorporating external addressing. Computer networks incorporating internal addressing may benefit from improved security and/or privacy.
Computer networks may incorporate service infrastructure elements or “fixed services” such as domain name services (DNS), proxy services, dynamic host configuration protocol (DHCP) services, network address translation services, firewall services and remote authentication dial-in user services (RADIUS). Some computer networks, for example, ad hoc, mesh or peer-to-peer computer networks, may not incorporate fixed services although they may incorporate distributed analogues, for example, multicast DNS, universal plug and play (UPnP), link local addresses and link local multicast name resolution (LLMNR).
Computer networks may have varying degrees of mobility. Mobile computer networks may have mobile network infrastructure elements such as mobile routers. For example, vehicle LANs may include wireless mobile routers with changing public subnet prefixes that provide network address translation for vehicle LAN nodes with unchanging private network addresses.
Computer networks may have an intended use or access policy. For example, computer networks may be intended for private use or intended for public use. In an embodiment of the invention, computer networks intended for private use have nodes that are owned by an organization that owns the network (or subscribes for its use). Computer networks intended for private use may be managed enabling high levels of trust between nodes. Computer networks intended for public use may provide relatively anonymous service to any customer with the ability to pay, or even free of charge. In an embodiment of the invention, client nodes (e.g., customer nodes) of computer networks intended for public use are unmanaged. Trust between nodes in computer networks intended for public use may be low and varying demand may make technical management difficult, for example, resulting in wide variation in quality of service.
Computer networks may have topological placement or location with respect to other computer networks. For example, computer networks may be transit (core) networks (e.g., internet service providers) that route data traffic to and from other networks, or stub networks that route data traffic within themselves as well as to and from transit networks. Operational attributes and characteristics of computer networks (i.e., network operational attributes) include speed or throughput (e.g., from kilobits per second to gigabits per second), congestion (e.g., low, medium, high or severe), load (e.g., low or underutilized, medium, average or typical, high or near capacity, and critical or at capacity), transmission latency, throughput jitter, packet loss probability, quality of service (QoS) and operational cost (e.g., per byte or per hour).
Computer networks may be premise networks, that is, private networks at particular locations. For example, one or more connected college campus LANs may be a premise network. Computer networks may be proximity networks, that is, networks established by nodes because of their proximity to one another, for example, over one or more shared wireless channels. Proximity networks may be single or multi-hop and may be of an ad hoc nature, established, for example, upon coming into a classroom or deployment area.
The computer 202 is connected to the computer network 220. A resource server 204 is also connected to the computer network 220. For example, the resource server 204 may be a file server, a directory server, a database server, a print server, a collaboration server, a DNS server, a provisioning server such as a DHCP server, an authentication server such as a RADIUS server, or combinations thereof. A Microsoft® Windows® XP server is an example of a resource server.
A network gateway 206 is connected to the computer network 220 and the computer network 222. The network gateway 206 may limit or filter the passage of computer network traffic between the computer network 220 and the computer network 222. For example, the network gateway 206 computer may execute firewall software that enforces a computer network traffic policy, for example a security policy, with regard to computer network traffic arriving at the network gateway 206.
For example, the computer network 220 may be an enterprise network running over an Ethernet LAN and employing an internal addressing scheme. The computers 202, 204 and 206 may each be managed nodes of the computer network 220. The computer network 222 may be a public inter-network such as the Internet. The cloud representing computer network 222 is larger than the clouds representing computer networks 220, 224, 226 and 228 to indicate that the computer network 222 is a transit network for data traffic to and from computer networks 220, 224 and 226. The computer 214 may have a dial-up connection to the computer network 222.
The computer network 224 may be a public wireless network connected to the computer network 222 by a digital telecommunications link (e.g., T1). The computer 208 may be an unmanaged node of the computer network 224 but, for example, the computer network 224 may require the computer 208 to register with the resource server 210 before providing the computer 208 with full connectivity to the network 222. The computer network 226 may be a home LAN able to support a virtual private network (VPN) between the computer 212 and the resource server 204 across the computer network 222, the network gateway 206 and the computer network 220. The computer network 228 may be a wireless computer network instantiated ad hoc by the computers 216 and 218. In this example computer networking environment, the computer network 228 is not connected to the other computer networks 220, 222, 224, 226. However, if, for example, the computer 216 established a connection with the computer network 220 then the computer 216 may be capable of acting as a bridge or network gateway for the computer network 228.
The network DNA module 310 may dynamically gather network attributes from the computer hardware 306, the operating system 304 and the application programs 302. In an embodiment of the invention, the network DNA module 310 resides on one or more computers. Each computer may be connected to one or more computer networks. The network DNA module 310 may determine network DNA for each connected computer network. Network DNA may taxonomically classify the associated computer network. The network DNA for a particular computer network may change over time but, in an embodiment of the invention, such changes are infrequent. Computer network connections (e.g., communication connections 114 of
The network DNA module 310 may be incorporated into or may utilize (e.g., dynamically gather network attributes with) a network application programming interface, for example, the Windows Sockets 2 (Winsock) network application programming interface (API), as detailed in the Windows Sockets 2 section of the February 2003 Microsoft® Windows® Platform Software Development Kit (SDK) documentation in the Microsoft Developer Network (MSDN®) Library. The network DNA module 310 may be incorporated into or may utilize (e.g., dynamically gather network attributes from) a network location awareness module, for example, the network location awareness module detailed by the Network Location Awareness Service Provider section of the February 2003 Microsoft® Windows® Platform SDK documentation in the MSDN® Library. Although not shown in
The network DNA acquirer 402 may acquire raw network DNA component values from the computer hardware 306 (
Raw network DNA component values may be simple copies of static values, samples of dynamically changing values or the like. Examples of raw network DNA components include IP addresses, domain names, verified presence of network infrastructure elements (e.g., DNS servers, authentication servers, proxy servers, NAT), successful authentication, parameters received from DHCP servers (e.g., subnet mask), communications media type (e.g., wireless or wire-line), network traffic analysis (e.g., source address set or statistical traffic ‘fingerprint’ match), cost, service provider, roaming agreements, nominal available communications bandwidth, measured available communications bandwidth, logical and physical network location. Raw network DNA components may be any suitable (e.g., acquirable) conventional computer network attribute. Raw network DNA components may be input by a computer user utilizing a suitable user interface mechanism.
The network DNA acquirer 402 may update the raw network DNA components 420 area of the current network DNA 406 store. The network DNA acquirer 402 may copy current network DNA component values to the network DNA history 408 store before updating them. The network DNA acquirer 402 may notify the network DNA generator 404 of updates to the current network DNA 406 store.
The network DNA generator 404 may determine derived network DNA component values from raw network DNA component value. The network DNA generator 404 may determine derived network DNA component values according to the derived network DNA component specifications 416. For example, each of the derived network DNA component specifications 416 may specify a linear or non-linear combination and/or transformation of one or more raw network DNA component values. The derived-raw network DNA component dependency lists 418 may include, for each derived network DNA component, a list of raw network DNA components required to determine the derived network DNA component, and/or, for each raw network DNA component, a list of derived network DNA components that depend upon the raw network DNA component (e.g., the raw network DNA component is part of the derived network DNA component specifications for the derived network DNA components). The network DNA generator 404 may update the derived network DNA components 422 area of the current network DNA 406 store. The network DNA generator 404 may copy current network DNA component values to the network DNA history 408 store before updating them.
The network DNA policy enforcer 412 may enforce network DNA policies stored in the network DNA policy store 410. The network DNA policies may depend upon network DNA stored in the current network DNA 406 and/or network DNA history 408 stores, for example, network DNA policy actions may be triggered by network DNA components taking on particular values or crossing particular thresholds. The network DNA application programming interface 414 may enable, for example, application programs 302 (
Before describing procedures performed by the network DNA module in more detail, it will be helpful to describe further details of network DNA, network DNA policies and the network DNA application programming interface 414 (
In this example, the network species 502 component is associated with a network species confidence 516, the network name 504 component is associated with a network name confidence 518, the network cost 506 component is associated with a network cost confidence 520, the core access 508 component is associated with a core access confidence 522, the core addressing 510 component is associated with a core addressing confidence 524, the network security 512 component is associated with a network security confidence 526, and the network technology 514 component is associated with a network technology confidence 528. Each network DNA confidence 516, 518, 520, 522, 524, 526, 528 may indicate a level of confidence (e.g., a statistical confidence) in the accuracy and/or precision of the associated network DNA component value(s). Network DNA confidence levels may be updated by the network DNA generator 404 (
The network species 502 component of the network DNA 500 may indicate a network class (or species) for the associated computer network. For example, the network species 502 component may indicate that the associated computer network is an enterprise network, a home network or a public place (public) network. The network species 502 component of the network DNA 500 may be one of the derived network DNA components 422 (
For example, one of the derived network DNA component specifications 416 (
The derived network DNA component specification may specify that the network species 502 component is to indicate that the associated computer network is a home network if the attributes of the associated computer network include a specified combination of: is an insecure network (i.e., has poor network security), is an unmanaged network (i.e., has poor network management), provides ad hoc and/or limited connectivity between network nodes and other computer networks (e.g., the internet), includes PAN, LAN and/or wireless LAN technology, is not a mobile network (i.e., has poor network mobility), is a private network (e.g., utilizes internal network addressing), is a premise network or a proximity network. Examples of computer networks that may have one or more combinations of such computer network attributes include home networks and residential networks.
The derived network DNA component specification may specify that the network species 502 component is to indicate that the associated computer network is a public place network if the attributes of the associated computer network include a specified combination of: is an insecure network, is an unmanaged network, includes PAN, LAN, wireless LAN and/or wireless WAN technology, provides connectivity to other computer networks (e.g., the internet), is not a mobile network, has an associated access cost, is not a private network, is not a premise network and is not a proximity network. Examples of computer networks that may have one or more combinations of such computer network attributes include computer networks at airports, restaurants and coffee houses, convention centers, hotels (particularly hotel lobbies), public libraries, corporate guest networks and some wireless wide area networks.
As shown in the above examples, derived network DNA component specifications 416 (
The network name 504 component of the network DNA 500 may indicate a network name and/or network identifier for the associated computer network. The network name may, for example, be a simple alphanumeric character string or a more complex data structure. The network name may include, for example, a globally unique identifier (GUID) that uniquely identifies the associated computer network. However, neither the network name 504 component nor network DNA 500 as a whole, need be unique across computer networks. As for each derived network DNA component 502, 504, 506, 508, 510, 512 and 514, network name 504 component attributes and values may be specified by one or more of the derived network DNA component specifications 416 (
The network cost 506 component of the network DNA 500 may indicate historical, future and current costs associated with utilizing the associated computer network. For example, the network cost 506 component may reference one or more computer network usage rate plans including per byte, per hour and other suitable bandwidth, time period and/or network resource pricing options. Cost determination may be probabilistic, for example, approximation techniques may be utilized where cost determination is complex, in which case the network cost confidence 520 may indicate a margin of error.
The core access 508 component of the network DNA 500 may indicate to what degree the associated computer network provides access to core or transit networks (e.g., the internet). For example, the core access 508 component may indicate that authentication with a particular resource server is required for core network access. Core network access determination may be probabilistic and/or progressive, particularly from computers connected to unmanaged networks. The core access confidence 522 may indicate the progress and/or degree of achievement of the determination procedure.
The core addressing 510 component of the network DNA 500 may indicate whether the associated computer network utilizes internal (private) or external (public or core) addressing. Internal addressing may reduce a set of suitable communications protocols available to applications. Core addressing determination may be probabilistic and/or progressive, or the core addressing confidence 526 may simply indicate a confirmed or unconfirmed status.
The network security 512 component of the network DNA 500 may indicate one or more security mechanisms available in the associated computer network, as well as, for example, which security mechanisms are mandatory for computers connected to the associated computer network. For example, the network security 512 component may indicate that authentication with one or more network infrastructure elements or resource servers is mandatory and that encryption is available but optional. The network security 512 component may also reference suitable authentication credentials and/or encryption keys. Determination of available and/or mandatory security mechanisms may be probabilistic and/or progressive, for example, additional encryption options may become available following authentication. The network security confidence 526 may indicate determination progress and/or confidence in the integrity of active security mechanisms in the associated computer network.
The network technology 514 component of the network DNA 500 may indicate one or more network implementation technologies utilized by the associated computer network. The network technology indication may include coarse grained classifications, for example, wireless or wire-line, as well as fine grained classifications, for example, IEEE 802.11a, IEEE 802.11b or IEEE 802.16a wireless. Determination of network technology classifications may be probabilistic and/or progressive. The network technology confidence 528 may include a confidence level for each determined network technology classification.
Network DNA policies may depend upon network DNA 500.
The network DNA policy name 602 may be a unique name (e.g., alphanumeric character string or a globally unique identifier) of the network DNA policy 600. The network DNA policy name 602 may serve as an identifier and/or reference for the network DNA policy 600. A condition specified by the network DNA policy condition 604 may reference derived network DNA components and/or raw network DNA components of current network DNA 406 (
The network DNA policy dependency lists 608 may list system aspects (e.g., components, modules, resource servers) that the network DNA policy 600 depends upon in order to determine if the network DNA policy condition 604 is satisfied and/or to initiate the network DNA policy action 606. The derived network DNA components dependency list 610 may list derived network DNA components referenced by the network DNA policy condition 604. The raw network DNA components dependency list 612 may list raw network DNA components referenced by the network DNA policy condition 604.
Examples of network DNA policies include polices for adapting to network changes and for selecting between multiple available networks. Network DNA policies may adapt system behavior in response to network DNA 500, for example, changes in the network technology 514 component of the network DNA 500 (e.g., when switching computer networks) may trigger reconfiguration of application programs 302 (
Changes in the network security 512 component of the network DNA 500 (e.g., when switching computer networks) may likewise trigger reconfiguration of application programs 302 and/or the operating system 304 to reduce the likelihood of security vulnerabilities. One or more network DNA policies may determine a choice between multiple available networks, for example, based on a combination of the network cost 506 and core access 508 components of the network DNA 500. Additional examples of network DNA components that may be utilized in deciding between multiple available networks (or any suitable network DNA policy decision) include: network security 512, speed, load, latency, congestion, radio frequency interference (e.g., noise) and network operator (not necessarily of the first hop, for example, the operator/owner of a GPRS network supplying connectivity to a Wi-Fi ‘hotspot’). While network DNA policies may reduce the probability of user intervention, choice between multiple computer networks need not be fully automated. Computer users may be presented with a filtered list of possible choices.
Network DNA policies may specify that system security settings be reconfigured depending on the network species 502 component of the network DNA 500. A computer with a particular network DNA policy that is connected to a home or public network (as indicated by the network species 502) may automatically attempt to establish a VPN connection to a specified enterprise network so that, for example, the computer has access to enterprise network resource and/or to become managed. Another network DNA policy may specify that bridging (or inter-network routing) be disabled if a computer with the policy is, for example, connected to both an enterprise network and a home or public network as indicated by the network species 502.
The network DNA application programming interface 414 (
The edit network DNA policy application programming interface element 702 may enable computer system modules and components to create, read, update, delete and temporarily disable or enable network DNA policies of the network DNA module 400 (
The subscribe to network DNA events application programming interface element 704 may enable computer system modules and components to subscribe to and unsubscribe from events published by the network DNA module 400 (
The get current network DNA application programming interface element 706 may enable computer system modules and components to retrieve a copy of the current network DNA 406 (
The edit derived network DNA component specifications application program interface element 710 may enable computer system modules and components to create, read, update and delete derived network DNA component specifications 416 (
Having described structural aspects of the network DNA module 400 (
The network DNA acquirer 402 (
At step 804, a raw network DNA acquisition priority list is generated. For example, the network DNA acquirer 402 (
At step 806, a next acquisition target may be selected from the raw network DNA acquisition priority list. At step 808, an attempt is made to acquire the selected acquisition target as described above with reference to
At step 812, the acquired raw network DNA component may be stored in the raw network DNA components 420 (
The procedure depicted in
The network DNA generator 404 (
At step 904, a next refresh target (i.e., a particular derived network DNA component) may be selected from the derived network DNA refresh list. At step 906, a value of the selected derived network DNA component may be derived (i.e., determined) in accordance with associated derived network DNA component specifications 416 (
The network DNA policy enforcer 412 (
At step 1004, a next active network DNA policy is selected, for example, from the network DNA policy store 410 (
At step 1008, the network DNA policy condition 604 (
At step 1012, execution of the network DNA policy action 606 of the network DNA policy 600 is initiated. For example, the network DNA policy enforcer 412 may make a procedure call (local or remote), invoke a method of a program object, send a message to a program module or a system user or administrator and/or initiate any suitable programmatic technique for performing an action on a computer (e.g., the computer 102 of
All references, including publications, patent applications, and patents, cited herein are hereby incorporated by reference to the same extent as if each reference were individually and specifically indicated to be incorporated by reference and were set forth in its entirety herein.
The use of the terms “a” and “an” and “the” and similar referents in the context of describing the invention (especially in the context of the following claims) are to be construed to cover both the singular and the plural, unless otherwise indicated herein or clearly contradicted by context. The terms “comprising,” “having,” “including,” and “containing” are to be construed as open-ended terms (i.e., meaning “including, but not limited to,”) unless otherwise noted. Recitation of ranges of values herein are merely intended to serve as a shorthand method of referring individually to each separate value falling within the range, unless otherwise indicated herein, and each separate value is incorporated into the specification as if it were individually recited herein. All methods described herein can be performed in any suitable order unless otherwise indicated herein or otherwise clearly contradicted by context. The use of any and all examples, or exemplary language (e.g., “such as”) provided herein, is intended merely to better illuminate the invention and does not pose a limitation on the scope of the invention unless otherwise claimed. No language in the specification should be construed as indicating any non-claimed element as essential to the practice of the invention.
Preferred embodiments of this invention are described herein, including the best mode known to the inventors for carrying out the invention. Variations of those preferred embodiments may become apparent to those of ordinary skill in the art upon reading the foregoing description. The inventors expect skilled artisans to employ such variations as appropriate, and the inventors intend for the invention to be practiced otherwise than as specifically described herein. Accordingly, this invention includes all modifications and equivalents of the subject matter recited in the claims appended hereto as permitted by applicable law. Moreover, any combination of the above-described elements in all possible variations thereof is encompassed by the invention unless otherwise indicated herein or otherwise clearly contradicted by context.
Corbett, Christopher J., Bahl, Pradeep, Khaki, Mohamed Jawad
Patent | Priority | Assignee | Title |
Patent | Priority | Assignee | Title |
5774669, | Jul 28 1995 | Administrator of the National Aeronautics and Space Administration | Scalable hierarchical network management system for displaying network information in three dimensions |
6040834, | Dec 31 1996 | Cisco Technology, Inc | Customizable user interface for network navigation and management |
6141690, | Jul 31 1997 | HTC Corporation | Computer network address mapping |
6182226, | Mar 18 1998 | JPMORGAN CHASE BANK, N A ; MORGAN STANLEY SENIOR FUNDING, INC | System and method for controlling interactions between networks |
6298044, | Mar 31 1998 | HEWLETT-PACKARD DEVELOPMENT COMPANY, L P | Method and apparatus for determining if overloaded collision domains can be split to enhance network |
6363411, | Aug 05 1998 | Verizon Patent and Licensing Inc | Intelligent network |
6397381, | Sep 21 1998 | Microsoft Technology Licensing, LLC | System and method for repairing a damaged application program |
6434613, | Feb 23 1999 | International Business Machines Corporation | System and method for identifying latent computer system bottlenecks and for making recommendations for improving computer system performance |
6480963, | Jun 17 1998 | Fujitsu Limited | Network system for transporting security-protected data |
6556659, | Jun 02 1999 | Accenture Global Services Limited | Service level management in a hybrid network architecture |
6675209, | Jul 19 1999 | Hewlett Packard Enterprise Development LP | Method and system for assigning priority among network segments |
6708137, | Jul 16 2001 | COLORADO WSC, LLC | System and method for providing composite variance analysis for network operation |
6982960, | Mar 09 2001 | ARRIS ENTERPRISES LLC | Protocol for self-organizing network using a logical spanning tree backbone |
7079499, | Sep 08 1999 | Apple | Internet protocol mobility architecture framework |
7159125, | Aug 14 2001 | DEUTSCHE BANK AG NEW YORK BRANCH, AS COLLATERAL AGENT | Policy engine for modular generation of policy for a flat, per-device database |
7209964, | Oct 06 1997 | Verizon Patent and Licensing Inc | Intelligent network |
7257560, | Jul 31 2003 | Cisco Technology, Inc.; Cisco Technology, Inc | Cost minimization of services provided by multiple service providers |
7277393, | Mar 13 2002 | Ciena Corporation | System and method for identifying cost metrics for a network |
7448070, | Oct 17 2003 | Microsoft Technology Licensing, LLC | Network fingerprinting |
20010037384, | |||
20020091819, | |||
20020124094, | |||
20020176366, | |||
20020178246, | |||
20030074359, | |||
20030074440, | |||
20030140142, | |||
20030212684, | |||
20040006614, | |||
20040068582, | |||
20040095887, | |||
20050144314, | |||
20050149948, | |||
20050257267, | |||
20060084417, | |||
20090086644, | |||
JP10261083, | |||
JP2001144758, | |||
JP2001251301, | |||
JP2002064561, | |||
JP2002319970, | |||
JP2003124931, | |||
JP2003230167, | |||
JP2004528775, | |||
JP7141265, | |||
JP7210473, | |||
JP9238138, | |||
WO163447, | |||
WO2084951, | |||
WO3058884, | |||
WO2004008693, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Mar 14 2014 | Microsoft Technology Licensing, LLC | (assignment on the face of the patent) | / |
Date | Maintenance Fee Events |
Date | Maintenance Schedule |
Dec 15 2018 | 4 years fee payment window open |
Jun 15 2019 | 6 months grace period start (w surcharge) |
Dec 15 2019 | patent expiry (for year 4) |
Dec 15 2021 | 2 years to revive unintentionally abandoned end. (for year 4) |
Dec 15 2022 | 8 years fee payment window open |
Jun 15 2023 | 6 months grace period start (w surcharge) |
Dec 15 2023 | patent expiry (for year 8) |
Dec 15 2025 | 2 years to revive unintentionally abandoned end. (for year 8) |
Dec 15 2026 | 12 years fee payment window open |
Jun 15 2027 | 6 months grace period start (w surcharge) |
Dec 15 2027 | patent expiry (for year 12) |
Dec 15 2029 | 2 years to revive unintentionally abandoned end. (for year 12) |