Unsolicited broadcast packet transmission through close-by communication protocol
First Claim
1. A method, comprising:
- generating a broadcast packet at a first device including an internet protocol address of the first device;
transmitting the generated broadcast packet through a first protocol, the first protocol being a wireless, close-by communication protocol, wherein the transmission of the generated broadcast packet is not solicited by a second device; and
receiving, in the first device, a communication from the second device via the internet protocol address communicated in the broadcast packet through a second protocol that is different from the first protocol, wherein the second protocol comprises a set of rules that the first device and the second device use to communicate packets of data over a local area network.
2 Assignments
0 Petitions
Accused Products
Abstract
A method is provided for generating a broadcast packet at a first device including an address; transmitting the generated broadcast packet to a second device through a first protocol. The first device may communicate with the second device via the transmitted address through a second protocol different from the first protocol. Alternatively, an apparatus is provided to receive an unsolicited broadcast packet including an address through a wireless, close-by communication protocol; extract from the broadcast packet identification information about the remote device; and store the extracted identification information in association with the remote device. Alternatively, a computer-readable medium is provided storing instructions to receive a an unsolicited broadcast packet including an address through a first protocol; extract from the broadcast packet identification information, including the address and a service available at the remote device; and communicate with the remote device via a second protocol.
16 Citations
20 Claims
-
1. A method, comprising:
-
generating a broadcast packet at a first device including an internet protocol address of the first device; transmitting the generated broadcast packet through a first protocol, the first protocol being a wireless, close-by communication protocol, wherein the transmission of the generated broadcast packet is not solicited by a second device; and receiving, in the first device, a communication from the second device via the internet protocol address communicated in the broadcast packet through a second protocol that is different from the first protocol, wherein the second protocol comprises a set of rules that the first device and the second device use to communicate packets of data over a local area network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. An apparatus, comprising:
-
a receiver to receive an unsolicited broadcast packet from a remote device through a wireless, close-by communication protocol, the unsolicited broadcast packet including an internet protocol address of the remote device; an extraction module to extract from the unsolicited broadcast packet, identification information about the remote device, including the internet protocol address of the remote device; storage to store the extracted identification information in association with the remote device; and a transmitter to transmit a communication to the remote device via the internet protocol address of the remote device through a second protocol that is different from the first protocol. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A non-transitory computer-readable medium, storing a set of instructions, that when executed by a processor, cause the processor to:
-
receive an unsolicited broadcast packet from a remote device through a first protocol, the first protocol being a wireless, close-by communication protocol, the unsolicited broadcast packet including an internet protocol address of the remote device and a service available at the remote device; extract from the unsolicited broadcast packet, identification information about the remote device, including the internet protocol address of the remote device and the service available at the remote device; store the extracted identification information in association with the remote device; and communicate with the remote device via the internet protocol address extracted from the unsolicited broadcast communication packet via a second protocol that is different from the first protocol. - View Dependent Claims (18, 19, 20)
-
Specification