System and methods for direct connections between previously unconnected network devices across one or more unknown networks
10154005 ยท 2018-12-11
Inventors
Cpc classification
H04L61/5014
ELECTRICITY
H04L12/4633
ELECTRICITY
H04L61/106
ELECTRICITY
H04L12/4641
ELECTRICITY
H04L45/306
ELECTRICITY
International classification
Abstract
The invention presented herein is a system and method for automatically discovering communication capabilities for direct communication between endpoints across one or more unknown networks, the system comprising: a plurality of network enabled endpoints configured with a module in wireless communication with a management database, the module configured to establish a communication path for direct communication between the network-enabled endpoints, independent of a NAT router. Also disclosed is a system and method for indirect connectionless bi-directional messaging over an unknown network infrastructure for communicating a message communication between a querying device and a database, wherein communication is enabled without the requirement for direct access to the database for either obtaining or placing information; and where the message communication comprises an unlimited amount of discreet and selectable information elements; and without requiring or issuing a direct acknowledgement of a receipt from the database of the communication message received.
Claims
1. A system configured for automatically discovering communication capabilities for direct communication between endpoints across one or more unconnected networks, the system comprising: a plurality of network-enabled endpoints configured with a module, which includes at least one processor, in network communication with a management database, the module configured to establish a communication path for direct communication between the network-enabled endpoints, independent of a network address translation; wherein the module is configured for performing a set of operations, comprising: assessing the network to discover behavioral traits of a network address translation device of a network associated with the endpoints, comprising: identifying one of the endpoints; assessing a number of hops; sending a plurality of data packets across a range of ports to a server; discovering port information of the endpoints based on the data packets and sending port information to the server; permitting the endpoints to exchange information received on the server regarding an endpoint; and performing an iterative operational cycle until establishing a connection path between two previously unconnected endpoints, the operation cycle comprising: determining if one endpoint is located in a network that allows a connection to a device on an available port a port mapping operation comparing sending a series of data packets, sent from one endpoint in incremental ports upwards and in reverse from another endpoint in incremental ports downwards to if determine whether the data packets intersect on a port, synchronizing the endpoints on a single port, so that the incoming data packets appear to be in response to the outgoing packet, allowing a hand-off to occur between the endpoints; and completing a time-to-live manipulation operation comprising: utilizing the number of hops required to get from a local network to the server, defining and sending data packets from the local network to the server with a first set of data packets having a manipulated time-to-live, causing the data packets to be dropped in transit and to allow the network address translation device to see outgoing traffic and open data paths in the network address translation device, and in turn establishing, based on the open data paths in the address translation device, a value within a preset range thereby allowing packet transmission from both ends.
2. A method for establishing direct communication between previously unconnected network-enabled endpoints, comprising: causing a processor stored on at least one of the unconnected endpoints to establish a direct communication path between the endpoints by; assessing the network to discover behavioral traits of a network address translation device of a network associated with the endpoints by; identifying one of the endpoints; assessing a number of hops; sending a plurality of data packets across a range of ports to a server; discovering port information of the endpoints based on the data packets and sending port information to the server; permitting the endpoints to exchange information received on the server regarding an endpoint; and performing an iterative operational cycle until establishing a connection path between two previously unconnected endpoints, the operation cycle comprising: determining if one endpoint is located in a network that allows a connection to a device on an available port; a port mapping operation comparing sending a series of data packets, sent from one endpoint in incremental ports upwards and in reverse from another endpoint downwards to determine whether the data packets intersect on a port; synchronizing the endpoints on a single port, so that the incoming data packets appear to be in response to the outgoing packet; allowing a hand-off to occur between the endpoints; and completing a time-to-live manipulation operation comprising: utilizing the number of hops required to get from a local network to the server; defining and sending data packets from the local network to the server with a first set of data packets having a manipulated time-to-live; causing the data packets to be dropped in transit and allow the network address translation device to see outgoing traffic and open data paths in the network address translation device; and in turn establishing, based on open data paths in the network address translation device, a value within a preset range thereby allowing packet transmission from both ends.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1) The detailed description is described with reference to the accompanying drawings. In the drawings, the left-most digit of a reference number identifies the figure to which the reference number first appears.
(2)
(3)
(4)
(5)
(6)
(7)
(8)
DETAILED DESCRIPTION
(9) A network based device needs to have certain mandatory addressing and connectivity information in order to communicate on any network. On a local area network (LAN) this device will send out a query asking for this network connectivity information. A server on the LAN will respond with this information which is local to this LAN. In all cases, this addressing and connectivity information assumes that the network based device is local and would behave as a local device.
(10) In situations where a compulsory (all traffic if forced) tunnel VPN or Tunnel is installed all of the remote network traffic from remote devices is sent to the headquarters network. When a network based device needs it connectivity information in this environment it will receive its addressing and connectivity query responsenot from the local serverbut the remote server at the headquarters. As such all network traffic from the remote site will traverse the tunnel even traffic not destined for use or processing by that network (compulsory tunneling). In many cases it is desired to have only the network traffic for the remote network traverse the tunnel whilst all non-remote network traffic (local traffic) automatically traverse via its local network connection. This is often called a split-tunnel where there are two different paths for flows to traverse. The present invention is designed to automatically enforce the split-tunnel behavior on networks with multiple DHCP servers.
(11) In order to have specified devices (indicated in a list of specified devices in the process) or all devices on a network, at any time, be able to use this split-tunnel, the connectivity certain parameters must be modified prior to delivery to that host so that the desired information received by the device ensures its proper behavior of either compulsory or split-tunnel behavior.
(12) When a VPN or Tunnel is installed a hosts' connectivity query will traverse the compulsory tunnel to the headend LAN. A server on this LAN will respond with connectivity information towards the querying remote host/devices for its local headend network. The invention will automatically substitute the appropriate parameters so that the querying host's behavior will automatically use the tunnel for remote traffic and the split-tunnel for non-remote network traffic.
(13) The present invention does not require modification to the headend LAN server, the remote network, or the queried host/device.
(14) Existing methods known in the art require setup of multiple LAN servers and/or routers (network elements) each with their own connectivity information or modification to the hosts to make use of split-tunnel. There is no known automatic method for having a single automatic address scheme across multiple networks and/or multiple gateways. Also, the fixed methods also are a waste of limited network resources. There not known methods which provide selectivity on a host basis to force some hosts to be use the tunnel exclusively in a compulsory mode and others to use the split tunnel while coexisting on the same LAN (layer-2 environment.}
Definitions
(15) The following terms are used to describe different aspects of the invention and the environment in which the invention operates. These terms are used for explanation purposes only and are not intended to limit the scope for any aspect of the invention. IP refers to Internet Protocol used for network communications.
(16) IP Address refers to the unique address issued to hosts, devices applications and used for bi-direction or unidirectional communications between those hosts, devices, or applications.
(17) Device or devices refer to any host, device or application that uses or makes use of IP for communications. End-point device or devices refer to some application or device that provides the ability to begin or end a tunnel.
(18) Tunnel refers to the transparent bridged link between networks as provided by software. A bridged-link creates a single logical network although not physically co-located.
(19) Module refers to one particular embodiment of the invention, which refers to computer program logic for providing a specified functionality. One or more variations of the Module can be implemented in hardware, firmware, and/or software. The module is typically stored on a computer-readable storage medium such as the storage device, loaded into memory, and executed by a processor. Modules are referred to herein as S1, S2, S3, S4, S5, and the nomenclature is for illustrative purposes; other identification means could be assigned to the various Modules, such as M1, M2, and the like.
An interface refers to a point of logical or logical/physical connection. Typically, the term interface is used in reference to an Ethernet or Ethernet-like port. This reference assumes that the interface structures present an IP-based behavior posture.
A predetermined interface refers to either an automatic or manual configuration of the invention process to supply the desired information to the requesting host so that its traffic goes out the desired interface based on the traffic type offered.
A packet refers to binary data capable of being routed through a computer network. To improve communication performance and reliability, each message sent between two network devices is often subdivided into packets by the underlying hardware and software.
Illustrative Network Environment
(20) The present invention works within a typical network configuration and operationally performs the task of substituting a default router from an issuing DHCP server with an IP address of a local terminal. This allows the local terminal to forward outgoing traffic to a specific interlace (Internet or tunnel) based on the destination of the address.
(21) Consider the following typical network drawing shown in
(22) On each network, when a device attaches it will issue a DHCP request. If present, a DHCP server will respond with various network connectivity-information for the device. The basic information required for network connectivity include: an IP address and netmask; one or more DNS addresses; and a default gateway.
(23) When a Tunnel is initiated it will request a DHCP address from the local network from where it is attached. For example, based on
(24) Therefore, it may be desirable for some Device 10 users traffic not destined for the native networkvia the tunnelto simply egress the local router (Device 3) normally. But the DHCP information offered over the tunnel would force all Device 10's traffic to traverse the tunnel and egress via the native network's router {Device 6).
(25) Therefore, in many instances, the traffic flow from Device 10 would normally be presented to network 2, and only to use the tunnel for traffic destined to network 6.
(26) Employing the invention as described herein, Device 8 would intercept the DHCP communication destined for DHCP server 7, and substitute the proper network elements to facilitate the split-tunnel operation.
(27) Networks represent any type of communication network, including wire-based (i.e., fiber optic, cable, etc.), wireless (i.e., cellular, WiFi, Bluetooth, etc) or combinations thereof.
(28) Hosts represent any type of client or server computing device on the network. Each host may be configured to send and receive data. A host may be a dedicated server or router through which incoming or outgoing messages are routed on behalf of a client device, user, or application and use any suitable addressing protocol or layer.
(29) A server generally represents a name server that hosts a network service such as providing response to queries against a directory service. This may include addressing components such as IP addresses, amongst others as would be recognized by one skilled in the art.
(30) Hosts and server also represent any suitable computing device, which includes one or more processors and the ability to access a computer-readable media. Processors interact with computer-readable media to execute instructions that facilitate functionality of each router or server.
(31) Processors may be distributed in more than one computer system and over a network. Computer readable media may include any suitable computer-storage media including volatile and non-volatile memory, removable and non-removable media and any combination thereof. In another embodiment, computer readable media may include communication media that may embody computer readable instructions, data structures, program modules, or other data in a modulated data signal.
(32) Standard/Typical Behavior of Network Attached Devices on a Local Network
(33)
(34) The networking and computing industry has standardized on DHCP as the preferred method for distributing connectivity information to devices which require and ask for this network connectivity information.
(35) When a device wishes to establish network connectivity its firmware will transmit to an available connection (either physical or logical) a DHCP disc very request. As the device does not yet have any network information it sends this out as a broadcast to any listening DHCP server. A DHCP server is a preconfigured network service existing on the local network. As it is setup for the local network, any devices requesting this connectivity information will receive the appropriate information to properly function.
(36) After the device is connected, or has its connectivity information, the applications are free to communicate with the Internet via local resources and services.
(37) Network-based services are used to support devices, applications, etc. These services are accessed via a physical or logical connection point, however these services may be found all on a single machine. The arrangement does not affect operation.
(38) Standard/Typical Behavior of Network Attached Devices when a Compulsory VPN is Activated
(39)
(40) Network Behavior Employing the Exemplary Module
(41) When using the Exemplary Module, traffic ONLY destined for the non-native network will traverse the tunnel. This is called a split-tunnel. The key advantage of the Exemplary Module is that the Module can operate automatically without pre configuration.
(42)
(43)
(44) Depending on the implementation and form of distribution, the configuration of the module can be performed in different ways (for example: by setting properties of an embeddable component, by writing or modifying source code, by writing or modifying one or more configuration files, etc). Some or all of the configuration parameters may also be preset in the module, bundled with the module or hard-coded into the module.
(45) In one embodiment, the module resides on a computing device which processes incoming and outgoing network messages as an application, firmware, or software. The module and sub-module assemblies are used at different phases of the communications cycle and operate when those phases are initiated or operated by the network messaging.
(46) Remote Query of Pre-Defined Information Via Remote Module
(47) In another embodiment, predefined information can be queried in a database for retrieval as needed. This operation is carried out by way of a Remote Module 600, shown as S4 in
(48) The DNS system allows for the retrieval of network information in a recursive manner attempting to resolve a queried host name. The DNS request (for any data type) can and will traverse through multiple random servers until it gets to the DNS server that is authoritative for that domain. Once that authoritative DNS server is found it attempt to honor the request with the stored information from its database. Remote Module codes various host names within a domain via a structure and places an associated TXT record also encoded with the desired information. For a remote fielded device to obtain information it is seeking it merely issues a standard DNS TXT record request for a coded-host name full-qualified-domain. The request, if available, will be delivered by the authoritative DNS server back to the querying device. Additionally, the DNS system can be used to create a standard DNS NSUPDATE record to permit the remote addition or modification of data, in real time, from a remote device. The inherent nature of DNS, and its recursion, is a key benefit of the connectionless communications path. The module leverages this to provide a connectionless peer-to-peer or peer-to-many information management front-end.
Example
(49) A device in city X configured with a Remote Module S4with Remote Module in the on position. The device will obtain it's public IP address on its main interface (not module specific) The device will then create a DNS NSUPDATE record to a user specified domainthis is example.comto push the learned knowledge of what it has just learnedit's public IP. The update will send the devices Ethernet MAC address plus an pre-pend as the HOST part (pip.xx-xx-xx-xx-xx-xx.example.net) with the INFO text record data as<publicIP.y.y.y.y> Any other device anywhere looking to contact this specific unit can use the same DNS system and simply ask for the INFO record of pip.xx-xx-xx-xx-xx-xx.example.net for which will be returned <publicIP.y.y.y.y>. An unlimited of host pre-pends and INFO text record formats can used to allow for direct addressing of such things (but not limited to) as DHCP hosts, DHCP gateways, System Uptime Status, Firmware updates, or logging.
(50) Thus, also envisioned in the present inventionby way of Remote Module 600is a method for indirect connectionless bi-directional messaging over unknown network infrastructures. Where the method communicates with a database without the requirement for direct access to that database for either obtaining or placing information; and where the communications can contain an unlimited amount of discreet and selectable information elements; and where there is no direct acknowledgement of receipt of communications.
(51) In one embodiment, the method codes discreet information elements as host names within a full-qualified-domain-name places an associated TXT record also encoded with the desired information; where remote device to obtain information it is seeking it merely issues a standard DNS TXT record request to any DNS server for a coded-host name full-qualified-domain; where the request will be delivered by the authoritative DNS server back to the querying device thorough one or more DNS servers. In another embodiment, the method can be used to create a standard DNS NSUPDATE record to permit the remote addition or modification of data, in real time, from a remote device.
(52) Alternate Embodiment for Establishing Tunnel to Non-Native Network
(53) When a host is installed on the network there are situations where it will desire to communicate directly with another peer across that network. The network infrastructure may not permit this direct communication through a variety of known and/or unknown limitations. Often these limitations are out of the control of the each host's network providers. This situation is particularly difficult when creating a virtual private network (VPN) tunnel between sites as NAT or Firewall gateways are free to make outbound connections but block any ad-hoc in-bound connections.
(54) Thus, also envisioned in the present invention is a Direct Tunnel Module 700, shown as S5 in
(55) Most networks operate with a Network Address Translator (NAT) and create a private IP address network for its hosts. For an endpoint initiating an outbound network connection, meaning the message traverses the private network toward the public IP through the NAT, communications are unimpeded. When a public-to-private connection is to be initially established a NAT router will block this connection as it does not recognize the connection or which host on the private network it should send it to.
(56) In one embodiment, when Direct Tunnel Module 700 is operating within two separate peer-devices, each device will initially and individually contact an offsite management server that can proxy the information between the two endpoints. They will exchange capabilities and information and begin a sequence of agreed upon outbound connections. The endpoint with the lower Ethernet MAC address will become the server with its peer the client. Each device will establish a sequence connection towards each other until one connection is discovered sufficient to establish direct endpoint-to-endpoint connectivity. At this point, the VPN or Tunnel can be initiated with the underlying networking transport already established.
(57) In another embodiment, Direct Tunnel Module 700 facilitates the automatic creation of bi-directional direct peer-to-peer network connections through Internet Protocol based network address translators. In yet another embodiment, Module 700 provides a method that permits one or more devices to automatically discover capabilities for communications directly between associated end-points across one or more unknown networks even if both end points are behind a NAT or Firewall, wherein the method does not require a server or relay function outside of each device network or a special protocol for the creation of a VPN, tunneling, or any other application. Module 700 is further configured so that each device will generate identity communications to a separate database; and each device will create multiple outbound communications sessions; and each device will report to the separate database the status and information of the initiated sessions; and each device will attempt connections on all of the sessions. A successful connection response will generate a handoff in each device to the requesting application.
(58) Reference herein to example, embodiments or similar formulations means that a particular feature, structure, operation or characteristic described in connection with the example, is included in at least one implementation in this description. Thus, the appearance of such phrases or formulations herein is not necessarily all referring to the same example. Further, various particular features, structures, operations or characteristics may be combined in any suitable manner in one or more examples, and or embodiments.