×

Method for detecting dedicated link between an end station and a network device

  • US 6,367,018 B1
  • Filed: 02/05/1998
  • Issued: 04/02/2002
  • Est. Priority Date: 02/05/1998
  • Status: Expired due to Term
First Claim
Patent Images

1. An apparatus for performing at least one authentication protocol at multiple network layers for authenticating an end station coupled to a switch in a network, the apparatus comprising:

  • a switch, comprising, a first driver that executes a link detect protocol at a physical layer; and

    a plurality of ports, wherein each port comprises a first link beat control circuit and a first medium access control (MAC) unit, and wherein the first link beat control circuit manages a physical layer link active signaling process to determine whether a device coupled to a link is active; and

    an end station including a second driver that supports the link detect protocol and a higher layer authentication protocol, a second link beat control circuit, and a second MAC, wherein the switch communicates with the end station via a network link to execute the link detect protocol and the higher layer authentication protocol, wherein the link detect protocol comprises, the switch starting a test timer;

    the switch monitoring a link beat on the network link;

    the switch sending an encrypted message to the end station;

    the end station decrypting the encrypted message;

    the end station dropping the link beat in response to the message;

    if the switch has not detected that the link beat has been dropped before the test timer expires, the switch determining whether a retry limit has been reached;

    if the retry limit has not been reached, the switch resending the encrypted message;

    the switch detecting that the link beat has been dropped;

    the switch determining that the switch is coupled by a direct link to the end station in response to detecting that the link beat has been dropped; and

    the switch initiating the higher layer authentication protocol, which comprises, sending at least one encrypted message to the end station at a network layer above the physical layer; and

    if the end station participates successfully in the authentication protocol, the switch granting the end station access to the network.

View all claims
  • 6 Assignments
Timeline View
Assignment View
    ×
    ×