Node discovery involving stealth node enumerators
First Claim
1. A method of managing enumeration traffic by a selected enumerator in a computer network, the method comprising:
- detecting enumeration requests from one or more enumerators in the computer network;
computing a stealth condition based on detection of the enumeration requests from the one or more enumerators;
transmitting enumeration requests from the selected enumerator in the computer network, if the stealth condition is not satisfied; and
refraining from transmission of enumeration requests from the selected enumerator, if the stealth condition is satisfied.
2 Assignments
0 Petitions
Accused Products
Abstract
A network node discovery method allows multiple enumerators to concurrently accept and interpret the same enumeration responses from responder nodes on a network. In this manner, the responder nodes do not have to issue individual responses for each enumerator. Each responder maintains a discovery state and one or more per-enumerator session states to manage when the responder should transmit enumeration responses. The enumeration, therefore, proceeds at a target network load, irrespective of the number of enumerators present, and completes in a short time by making efficient use of the network capacity available. Furthermore, an enumerator can determine that it need only wait for responses solicited by other enumerators, rather than requesting them, thereby reducing network traffic in the presence of many concurrently enumerating nodes.
-
Citations
20 Claims
-
1. A method of managing enumeration traffic by a selected enumerator in a computer network, the method comprising:
-
detecting enumeration requests from one or more enumerators in the computer network;
computing a stealth condition based on detection of the enumeration requests from the one or more enumerators;
transmitting enumeration requests from the selected enumerator in the computer network, if the stealth condition is not satisfied; and
refraining from transmission of enumeration requests from the selected enumerator, if the stealth condition is satisfied. - View Dependent Claims (8, 9, 10)
-
-
2. The method of claim I wherein the computing operation comprises:
-
computing an acknowledgement load attributable to the one or more enumerators in the computer network;
computing a response load attributable to responders responding to the enumeration requests of the one or more enumerators in the computer network, wherein the stealth condition determines whether the acknowledgment load exceeds the response load. - View Dependent Claims (3, 4, 5, 6, 7)
-
-
11. A network node that manages enumeration traffic in a computer network, the network node comprising:
-
an enumeration module that detects enumeration requests from one or more enumerators in the computer network;
a stealth condition module that computes a stealth condition based on detection of the enumeration requests from the one or more enumerators;
an enumeration request module that transmits enumeration requests, if the stealth condition is not satisfied, and refrains from transmitting enumeration requests, if the stealth condition is satisfied. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A network node that manages enumeration traffic in a computer network, the network node comprising:
-
means for detecting enumeration requests from one or more enumerators in the computer network;
means for computing a stealth condition based on detection of the enumeration requests from the one or more enumerators;
means for transmitting enumeration requests from the selected enumerator in the computer network, if the stealth condition is not satisfied; and
means for refraining from transmission of enumeration requests from the selected enumerator, if the stealth condition is satisfied.
-
Specification