Promiscuous monitoring using internet protocol enabled devices
First Claim
1. A method for enabling a promiscuous monitoring of network communications by an IP-enabled device that ignores received messages directed to unicast addresses of other devices, comprising:
- detecting, by a first node, a physical intrusion within a predetermined geographic area;
in response to said detection of said physical intrusion, performing by said first node a plurality of operations includinggenerating a directed IP packet comprising an IP destination address for a second node;
establishing a unicast communications session with said second node in anticipation of communicating said directed IP packet exclusively to said second node;
subsequent to establishing said unicast communications session, modifying said directed IP packet by changing said IP destination address of said directed IP packet to an IP subnet broadcast address of said second node;
transmitting within said unicast communication session a uni-broadcast signal including said directed IP packet that has been modified to said second node using said IP subnet broadcast address;
receiving said uni-broadcast signal at said second node as a unicast transmission and at a monitoring node as a broadcast transmission, wherein said monitoring node is said IP-enabled device configured to monitor communications between said first and second nodes; and
processing said directed IP packet that has been modified at said second and said monitoring nodes, wherein said directed IP packet is processed at said monitoring node as broadcast traffic and said directed IP packet is processed at said second node as unicast traffic.
9 Assignments
0 Petitions
Accused Products
Abstract
A method (500) is provided for enabling a promiscuous monitoring of network communications by a monitor node (MN). The method includes the steps of: generating a directed IP packet at a first node (FN); transmitting a first unicast signal including a RTS message from the FN to a second node (SN); transmitting a second unicast signal including a CTS message from the SN to the FN in response to the first unicast signal; modifying the directed IP packet by changing an IP destination address of the directed IP packet to an IP subnet broadcast address; transmitting a uni-broadcast signal including the modified directed IP packet from the FN to the IP subnet broadcast address; and receiving the uni-broadcast signal at the SN and a third node (TN). The TN is an IP-enabled device provided to monitor network communications between the FN and SN.
28 Citations
16 Claims
-
1. A method for enabling a promiscuous monitoring of network communications by an IP-enabled device that ignores received messages directed to unicast addresses of other devices, comprising:
-
detecting, by a first node, a physical intrusion within a predetermined geographic area; in response to said detection of said physical intrusion, performing by said first node a plurality of operations including generating a directed IP packet comprising an IP destination address for a second node; establishing a unicast communications session with said second node in anticipation of communicating said directed IP packet exclusively to said second node; subsequent to establishing said unicast communications session, modifying said directed IP packet by changing said IP destination address of said directed IP packet to an IP subnet broadcast address of said second node; transmitting within said unicast communication session a uni-broadcast signal including said directed IP packet that has been modified to said second node using said IP subnet broadcast address; receiving said uni-broadcast signal at said second node as a unicast transmission and at a monitoring node as a broadcast transmission, wherein said monitoring node is said IP-enabled device configured to monitor communications between said first and second nodes; and processing said directed IP packet that has been modified at said second and said monitoring nodes, wherein said directed IP packet is processed at said monitoring node as broadcast traffic and said directed IP packet is processed at said second node as unicast traffic. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for enabling a promiscuous monitoring of network communications by an IP-enabled device that ignores received messages directed to unicast addresses of other devices, comprising:
-
detecting, by a first node, a physical intrusion within a predetermined geographic area; in response to said detection of said physical intrusion, performing by said first node a plurality of operations including generating a directed IP packet comprising an IP destination address for a second node; transmitting a first unicast signal including a request to send message to said second node for establishing a unicast communication session with said second node; receiving a second unicast signal including a clear to send message from said second node; in response to receiving said clear to send message, modifying said directed IP packet by changing said IP destination address of said directed IP packet to an IP subnet broadcast address of said second node; and transmitting within said unicast communication session a uni-broadcast signal including said directed IP packet that has been modified to said-second node using said IP subnet broadcast address; receiving said uni-broadcast signal at said second node as a unicast transmission and at a monitoring node as a broadcast transmission, wherein said monitoring node is said IP-enabled device configured to monitor communications between said first and second nodes; and processing said directed IP packet at said second and said monitoring nodes, wherein said directed IP packet is processed at said monitoring node as broadcast traffic and said directed IP packet is processed at said second node as unicast traffic. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
Specification