Management Of Network Configuration And Address Provisioning

ABSTRACT

Provided are systems and methods for network management and configuration. Exemplary methods can comprise communicating a first message to a network device. The first message can specify one of a first protocol or a second protocol. Methods can comprise configuring a first logical address for the network device based at least on the first message. Methods can comprise communicating a second message to the network device. The second message can specify one of a first mode, directing the network device to use the first protocol to connect to a network, or a second mode, directing the network device to use the second protocol to connect to the network. Methods can also comprise receiving a notification to release the first logical address from the network device. Methods can further comprise configuring a second logical address for the network device that can be defined according to the second message.

CROSS REFERENCE TO RELATED APPLICATION

This application is a Continuation of U.S. Non-Provisional applicationSer. No. 15/146,435 filed May 4, 2016, which is a continuation of U.S.application Ser. No. 13/827,500 filed Mar. 14, 2013 and issued as U.S.Pat. No. 9,363,340, which are herein incorporated by reference in theirentireties.

BACKGROUND

Network address provisioning systems using a 32 bit internet addresssystem can provide network addresses for about 4.3 billion uniqueaddresses on one network. The number of individuals in the world,however, is estimated at roughly 7 billion. The Internet is a globalnetwork used by individuals all over the world. As more people connectto the Internet or other large networks with more and more devices, newaddress provisioning systems using addresses greater than 32 bits needto be utilized to handle the increased number of network devicesconnecting to the Internet. As new address provisioning systems becomeavailable, difficulties can arise in transitioning a network from oneaddress provisioning system to another or in integrating one addressprovisioning system with another address provisioning system. Thus,there is a need for more sophisticated methods and systems for networkconfiguration.

SUMMARY

It is to be understood that both the following general description andthe following detailed description are exemplary and explanatory onlyand are not restrictive, as claimed. Provided are methods and systemsfor network management and configuration. In one aspect, methods cancomprise communicating a first message to a network device. The firstmessage (e.g., directive, communication) can specify one of a firstprotocol or a second protocol. A first logical address can be configuredfor the network device based at least on the first message. A secondmessage can be communicated to the network device. The second messagecan specify one of a first mode, directing the network device to use thefirst protocol to connect to a network, or a second mode, directing thenetwork device to use the second protocol to connect to the network. Anotification to release the first logical address can be received fromthe network device. A second logical address can be configured for thenetwork device. The second logical address can be defined according tothe second message.

In another aspect, methods can comprise communicating a first message toa plurality of network devices. The first message can specify one of afirst protocol or a second protocol. A first logical address can beconfigured for each of the plurality of network devices based on thefirst message. A second message can be communicated to at least aportion of the plurality of network devices. The second message canspecify one of a first mode, directing each network device of theportion of the plurality of network devices to use the first protocol toconnect to a network, or a second mode, directing each network device ofthe portion of the plurality of network devices to use the secondprotocol to connect to the network. Each first logical address can bereleased from each network device of the portion of the plurality ofnetwork devices. Additionally, a second logical address can beconfigured for each network device of the portion of the plurality ofnetwork devices. Each second logical address can be defined according tothe second message.

In yet another aspect, methods can comprise communicating a message(e.g., directive, communication) to a network device. The message canspecify one of a first mode directing the network device to use a firstprotocol to connect to a network or a second mode directing the networkdevice to use a second protocol to connect to the network. A firstlogical address assigned to the network device can be released. A secondlogical address can be configured for the network device. The secondlogical address can be defined according to the message.

Additional advantages will be set forth in part in the description whichfollows or may be learned by practice. The advantages will be realizedand attained by means of the elements and combinations particularlypointed out in the appended claims.

BRIEF DESCRIPTION OF THE DRAWINGS

The accompanying drawings, which are incorporated in and constitute apart of this specification, illustrate embodiments and together with thedescription, serve to explain the principles of the methods and systems:

FIG. 1 is a block diagram illustrating an exemplary system for networkconfiguration;

FIG. 2A shows a configuration interface of an exemplary network device;

FIG. 2B shows another configuration interface of an exemplary networkdevice;

FIG. 2C shows another configuration interface of an exemplary networkdevice;

FIG. 2D shows another configuration interface of an exemplary networkdevice;

FIG. 2E shows another configuration interface of an exemplary networkdevice;

FIG. 2F shows another configuration interface of an exemplary networkdevice;

FIG. 2G shows another configuration interface of an exemplary networkdevice;

FIG. 2H shows another configuration interface of an exemplary networkdevice;

FIG. 2I shows another configuration interface of an exemplary networkdevice;

FIG. 2J shows another configuration interface of an exemplary networkdevice;

FIG. 2K shows another configuration interface of an exemplary networkdevice;

FIG. 2L shows another configuration interface of an exemplary networkdevice;

FIG. 2M shows another configuration interface of an exemplary networkdevice;

FIG. 2N shows another configuration interface of an exemplary networkdevice;

FIG. 2O shows another configuration interface of an exemplary networkdevice;

FIG. 2P shows another configuration interface of an exemplary networkdevice;

FIG. 2Q shows another configuration interface of an exemplary networkdevice;

FIG. 2R shows another configuration interface of an exemplary networkdevice;

FIG. 2S shows another configuration interface of an exemplary networkdevice;

FIG. 2T shows another configuration interface of an exemplary networkdevice;

FIG. 2U shows another configuration interface of an exemplary networkdevice;

FIG. 2V shows another configuration interface of an exemplary networkdevice;

FIG. 2W shows another configuration interface of an exemplary networkdevice;

FIG. 2X shows another configuration interface of an exemplary networkdevice;

FIG. 3 is a diagram illustrating an example relationship between a firstmessage and a second message for an exemplary network device;

FIG. 4 is a flowchart illustrating an exemplary method for initializinga network device;

FIG. 5 is a flowchart illustrating an exemplary method for networkconfiguration;

FIG. 6 is a flowchart illustrating another exemplary method for networkconfiguration;

FIG. 7 is a flowchart illustrating yet another exemplary method fornetwork configuration; and

FIG. 8 is a block diagram illustrating an exemplary computing system inwhich the systems and methods can operate.

DETAILED DESCRIPTION

Before the present methods and systems are disclosed and described, itis to be understood that the methods and systems are not limited tospecific methods, specific components, or to particular implementations.It is also to be understood that the terminology used herein is for thepurpose of describing particular embodiments only and is not intended tobe limiting.

As used in the specification and the appended claims, the singular forms“a,” “an,” and “the” include plural referents unless the context clearlydictates otherwise. Ranges may be expressed herein as from “about” oneparticular value, and/or to “about” another particular value. When sucha range is expressed, another embodiment includes from the oneparticular value and/or to the other particular value. Similarly, whenvalues are expressed as approximations, by use of the antecedent“about,” it will be understood that the particular value forms anotherembodiment. It will be further understood that the endpoints of each ofthe ranges are significant both in relation to the other endpoint, andindependently of the other endpoint.

“Optional” or “optionally” means that the subsequently described eventor circumstance may or may not occur, and that the description includesinstances where said event or circumstance occurs and instances where itdoes not.

Throughout the description and claims of this specification, the word“comprise” and variations of the word, such as “comprising” and“comprises,” means “including but not limited to,” and is not intendedto exclude, for example, other components, integers or steps.“Exemplary” means “an example of” and is not intended to convey anindication of a preferred or ideal embodiment. “Such as” is not used ina restrictive sense, but for explanatory purposes.

Disclosed are components that can be used to perform the disclosedmethods and systems. These and other components are disclosed herein,and it is understood that when combinations, subsets, interactions,groups, etc. of these components are disclosed that while specificreference of each various individual and collective combinations andpermutation of these may not be explicitly disclosed, each isspecifically contemplated and described herein, for all methods andsystems. This applies to all aspects of this application including, butnot limited to, steps in disclosed methods. Thus, if there are a varietyof additional steps that can be performed it is understood that each ofthese additional steps can be performed with any specific embodiment orcombination of embodiments of the disclosed methods.

The present methods and systems may be understood more readily byreference to the following detailed description of preferred embodimentsand the examples included therein and to the Figures and their previousand following descriptions.

As will be appreciated by one skilled in the art, the methods andsystems may take the form of an entirely hardware embodiment, anentirely software embodiment, or an embodiment combining software andhardware aspects. Furthermore, the methods and systems may take the formof a computer program product on a computer-readable storage mediumhaving computer-readable program instructions (e.g., computer software)embodied in the storage medium. More particularly, the present methodsand systems may take the form of web-implemented computer software. Anysuitable computer-readable storage medium may be utilized including harddisks, CD-ROMs, optical storage devices, or magnetic storage devices.

Embodiments of the methods and systems are described below withreference to block diagrams and flowchart illustrations of methods,systems, apparatuses and computer program products. It will beunderstood that each block of the block diagrams and flowchartillustrations, and combinations of blocks in the block diagrams andflowchart illustrations, respectively, can be implemented by computerprogram instructions. These computer program instructions may be loadedonto a general purpose computer, special purpose computer, or otherprogrammable data processing apparatus to produce a machine, such thatthe instructions which execute on the computer or other programmabledata processing apparatus create a means for implementing the functionsspecified in the flowchart block or blocks.

These computer program instructions may also be stored in acomputer-readable memory that can direct a computer or otherprogrammable data processing apparatus to function in a particularmanner, such that the instructions stored in the computer-readablememory produce an article of manufacture including computer-readableinstructions for implementing the function specified in the flowchartblock or blocks. The computer program instructions may also be loadedonto a computer or other programmable data processing apparatus to causea series of operational steps to be performed on the computer or otherprogrammable apparatus to produce a computer-implemented process suchthat the instructions that execute on the computer or other programmableapparatus provide steps for implementing the functions specified in theflowchart block or blocks.

Accordingly, blocks of the block diagrams and flowchart illustrationssupport combinations of means for performing the specified functions,combinations of steps for performing the specified functions and programinstruction means for performing the specified functions. It will alsobe understood that each block of the block diagrams and flowchartillustrations, and combinations of blocks in the block diagrams andflowchart illustrations, can be implemented by special purposehardware-based computer systems that perform the specified functions orsteps, or combinations of special purpose hardware and computerinstructions.

The present disclosure relates to methods and systems for networkconfiguration. The methods and system relate to provisioning one or morenetwork devices using different provisioning systems. Those skilled inthe art will appreciate that the present methods may be used in systemsthat employ both digital and analog equipment. One skilled in the artwill appreciate that provided herein is a functional description andthat the respective functions can be performed by software, hardware, ora combination of software and hardware.

FIG. 1 is a block diagram illustrating various aspects of an exemplarysystem 102 in which the present methods and systems can operate. Thesystem 102 can comprise a termination system 104 configured to provide anetwork interface between one or more networks. For example, thetermination system 104 can provide an interface between a user network106 (e.g., subscriber network) and another network, such as theInternet. The termination system 104 can be located at a centrallocation of an internet service provider, such as a network hub or aheadend. The user network 106 can comprise a plurality of subscriberlines connected to the termination system 104 through one or morenetwork nodes. The user network 106 can connect the termination system104 to one or more network devices 108, and each network device 108 canbe located at a residence or business of a subscriber.

In one aspect, the termination system 104 can comprise a cable modemtermination system, and one or more of the network devices 108 cancomprise a cable modem. In another aspect, the termination system 104can comprise a digital subscriber line access multiplexer (DRAM), andthe network device 108 can comprise a digital subscriber line (DSL)modem. The user network 106 can be configured as a cable connection(e.g., DOCSIS based connection), telephone connection, ISDN connection,DSL connection, satellite link, wireless connection, cellular connectionor other network connection. The user network 106 can comprise fiberoptic cable, coaxial cable, wireless link, satellite link, and the like.Additionally, the network device 108 can comprise a modem, satellitereceiver, wireless receiver, and the like. In one aspect, the networkdevice 108 can be connected to one or more user devices 110. Forexample, a user device 110 can comprise a wireless router, personalcomputer, tablet computer, handheld computing device, television, orother device connected to the network device 108 by the subscriber.

In an aspect, the system 102 can comprise one or more logical addressservers 112. The logical address server 112 can be configured to providea logical address to a network device 108. The logical address can be anidentifier for a network device 108 such that the network device can belocated on the user network 106. For example, a logical address cancomprise an Internet Protocol (IP) address. The logical address can bean IP address formatted according to Internet Protocol version 4 (IPv4).For example, the IP address can comprise 32 bits, and the IP address canbe represented in dotted-decimal notation as four groups of decimalnumbers separated by decimal points, as shown in the followingnon-limiting example: 10.252.100.209. In another aspect, the logicaladdress can be an IP address formatted according to Internet Protocolversion 6 (IPv6). For example, the IP address can comprise 128 bits, andthe IP address can be represented as eight groups of hexadecimalnumbers, each group separated by colons, as shown in the followingnon-limiting example: 2001:0db8:4070:0001:0215:a2ff:fe43:7b65. In somerepresentations of an IPv6 based logical address, the leading zeros canbe omitted. Additionally, the logical address can be formatted accordingto other versions of Internet Protocol or a similar protocol utilizingnetwork addresses.

In an aspect, the termination system 104 can comprise one or moremessages (e.g., directives, communications) 114, 116, and 118. Forexample, the termination system 104 can comprise a first message 114 anda second message 116. In one aspect, each message comprises aninstruction specifying a mode of connection. For example, each messagecan specify a protocol to use for establishing a connection. The firstmessage 114 can specify one of a first protocol or a second protocol.The first message 114 and/or second message 116 can specify either afirst mode or second mode. The first mode can direct the network device108 to use the first protocol to connect to a network. For example, thefirst protocol can comprise IPv4. The second mode can direct the networkdevice 108 to use the second protocol to connect to the network. Forexample, the second protocol can comprise IPv6. Those of ordinary skillin the art will appreciate that in other aspects, different protocolarrangements can be appropriate. For example, the first protocol can beIPv6 and the second protocol can be IPv4. Additionally, the firstprotocol and/or second protocol can comprise other protocols forcommunicating across a network, such as internet control messageprotocol version 4, internet control protocol version 6, and the like.In another aspect, the second message can specify one of the first mode,the second mode, or a third mode. The third mode can direct the networkdevice 108 to use one of the first protocol or the second protocolspecified by the first message to connect to the network. Additionally,the termination system 104 can comprise one or more additional messages,such as a third message 118. In one aspect, the first protocol and/orsecond protocol can be a version of Internet Protocol other than version4 or version 6. Alternatively, the first protocol and/or second protocolcan comprise a different protocol utilizing network addresses.

In an aspect, the first message 114 can comprise an access layer controlmessage. For example, the access layer control message can comprise amedium access control (MAC) domain descriptor. The access layer controlmessage can be a base layer delivery mechanism of modern registrationinformation that is available to the network 108 device after initialranging. The access layer control message can contain IP initializationinformation. The access layer control message can be communicated by thetermination system 104 to a network device 108. For example, thetermination system 104 can periodically broadcast the access layercontrol message across the user network 106. As a network device 108begins the initialization process, for example the process described inFIG. 4, the network device 108 can listen on one or more physicalchannels of the user network 106 for the access layer control message.In one aspect, the access layer control message can indicate an IPprovisioning mode or connection mode, such as the first mode, secondmode, or third mode described above.

In an aspect, the second message 116 can comprise a protocolconfiguration override message. For example, the protocol configurationoverride message can comprise a MAC domain descriptor Internet Protocolprovisioning mode override message. As a further example, the secondmessage 116 can comprise an IP provisioning mode attribute within a MACdomain descriptor message. The second message 116 can communicate aninstruction to dismiss the first message 114. An instruction to dismissthe first message 114 can be communicated by the transfer of informationor by the absence of a transfer of information.

In an aspect, the system 102 can comprise a file server 120 configuredto transfer files to the network devices 108. For example, the fileserver 120 can be a trivial file transfer protocol server configured tocommunicate files to the network devices 108 using trivial file transferprotocol. Accordingly, the network device 108 can receive a file (e.g.,a boot file) with configuration information such as the second message116 from the file server 120. In another aspect, the system 102 cancomprise a time server 122 configured to provide timing information toeach of the network devices 108. For example, the network device 108 canreceive time of day information from the time server 122. The system 102can also comprise other servers managers, agents, and devices formanaging a network, such as, for example, a simple network managementprotocol (SNMP) manager configured to send and receive SNMP messages ora hypertext transfer protocol (HTTP) server configured to send andreceive HTTP messages.

FIG. 2A through FIG. 2X show configuration interfaces, e.g., screens, ofan exemplary network device, FIG. 2A shows a configuration interface 201of an exemplary network device 203 in which a second message may havebeen received, as described below. The network device 203 can comprise,for example, a modem, such as a cable modem, digital subscriber linemodem, or other kind of modem. The network device 203 can becommunicatively coupled to a provisioning device 205 (e.g., a gateway ora termination system) through a network 207 (e.g., cable modemmanagement network). An IP Mode Retrieved value 202 can indicate a modespecified by the first message, and an IP Mode Override value 204 canindicate a mode specified by the second message. In one aspect, the IPMode Retrieved value 202 can indicate a value of an access layer controlmessage received by the network device 203 as a first message. Forexample, the IP Mode Retrieved value 202 can comprise a media accesscontrol domain descriptor (MDD) IP Mode Retrieved value. In anotheraspect, the IP Mode Override value 204 can indicate a value received bythe network device 203 as a second message. For example, the IP ModeOverride value 204 can comprise a MDD IP Mode Override value. Forexample, the IP Mode Retrieved value 202 can be shown as IPv4 onlyprovisioning mode, and the IP mode override value 204 can be shown asIPv4 only mode. As specified by the second message in this example, thenetwork device 203 can be connected in IPv4 mode and the IP addressvalue 206 can show an IP address according to IPv4.

FIG. 2B shows a configuration interface 201 of an exemplary networkdevice 203 in which a second message has been received. For example, theIP Mode Retrieved value 202 can be shown as IPv4 only provisioning mode,and the IP mode override value 204 can be shown as Honor mode. Asspecified by the second message in this example, the network device 203can be connected in IPv4 mode and the IP address value 206 can show anIP address according to IPv4.

FIG. 2C shows a configuration interface 201 of an exemplary networkdevice 203 in which a second message has not been received by thenetwork device 203. For example, the IP override value 204 can be shownas empty when the network device has not received the second message.The IP Mode Retrieved value 202 can show that the first message has beenreceived by specifying an IPv4 only mode.

FIG. 2D shows a configuration interface 201 of an exemplary networkdevice 203 in which a second message has been received. For example, theIP Mode Retrieved value 202 can be shown as IPv4 only provisioning mode,and the IP mode override value 204 can be shown as Dual-StackProvisioning Mode (DPM). As specified by the second message in thisexample, the network device 203 can be connected in Dual-stack mode, andthe IP address value 206 can show both IPv4 and IPv6 according toDual-stack mode.

FIG. 2E shows a configuration interface 201 of an exemplary networkdevice 203 in which a second message has been received. For example, theIP Mode Retrieved value 202 can be shown as IPv4 only provisioning mode,and the IP mode override value 204 can be shown as AlternateProvisioning Mode (APM). As specified by the second message in thisexample, the network device 203 can be connected in IPv4 mode, and theIP address value 206 can show an IP address according to IPv4. In oneaspect, Alternate Provisioning Mode can allow the network device 203 tobe instructed on whether IPv4 or IPv6 is the primary mode. Thedescription herein assumes that IPv6 is selected as the primary mode,but aspects of the invention are not limited to such implementations.Accordingly, the device could fail back to IPv4 if IPv6 is not workingat the provisioning time.

FIG. 2F shows a configuration interface 201 of an exemplary networkdevice 203 in which a second message has been received. For example, theIP Mode Retrieved value 202 can be shown as IPv4 only provisioning mode,and the IP mode override value 204 can be shown as IPv6 only anode. Asspecified by the second message in this example, the network device 203can be connected in IPv6 mode, and the IP address value 206 can show anIP address according to IPv6.

FIG. 2G shows a configuration interface 201 of an exemplary networkdevice 203 in which a second message has been received. For example, theIP Mode Retrieved value 202 can be shown as IPv6 only provisioning mode,and the IP mode override value 204 can be shown as IPv6 only mode. Asspecified by the second message in this example, the network device 203can be connected in IPv6 mode, and the IP address value 206 can show anIP address according to IPv6.

FIG. 2H shows a configuration interface 201 of an exemplary networkdevice 203 in which a second message has been received. For example, theIP Mode Retrieved value 202 can be shown as IPv6 only provisioning mode,and the IP mode override value 204 can be shown as IPv6 only mode. Asspecified by the second message in this example, the network device 203can be connected in IPv4 mode, and the IP address value 206 can show anIP address according to IPv4.

FIG. 2I shows a configuration interface 201 of an exemplary networkdevice 203 in which a second message has been received. For example, theIP Mode Retrieved value 202 can be shown as IPv6 only provisioning mode,and the IP mode override value 204 can be shown as Honor mode. Asspecified by the second message in this example, the network device 203can be connected in IPv6 mode, and the IP address value 206 can show anIP address according to IPv6.

FIG. 2J shows a configuration interface 201 of an exemplary networkdevice 203 in which a second message has been received. For example, theIP Mode Retrieved value 202 can be shown as IPv6 only provisioning mode,and the IP mode override value 204 can be shown as empty or null. Asspecified by the second message in this example, the network device 203can be connected in IPv6 mode, and the IP address value 206 can show anIP address according to IPv6.

FIG. 2K shows a configuration interface 201 of an exemplary networkdevice 203 in which a second message has been received. For example, theIP Mode Retrieved value 202 can be shown as IPv6 only provisioning mode,and the IP mode override value 204 can be shown as DPM. As specified bythe second message in this example, the network device 203 can beconnected in Dual-stack mode, and the IP address value 206 can show bothIPv4 and IPv6 according to Dual-Stack mode.

FIG. 2L shows a configuration interface 201 of an exemplary networkdevice 203 in which a second message has been received. For example, theIP Mode Retrieved value 202 can be shown as IPv6 only provisioning mode,and the IP mode override value 204 can be shown as APM. As specified bythe second message in this example, the network device 203 can beconnected in IPv6 mode, and the IP address value 206 can show an IPaddress according to IPv6.

FIG. 2M shows a configuration interface 201 of an exemplary networkdevice 203 in which a second message has been received. For example, theIP Mode Retrieved value 202 can be shown as DPM mode, and the IP modeoverride value 204 can be shown as IPv6 only mode. As specified by thesecond message in this example, the network device 203 can be connectedin IPv6 mode, and the IP address value 206 can show an IP addressaccording to IPv6.

FIG. 2N shows a configuration interface 201 of an exemplary networkdevice 203 in which a second message has been received. For example, theIP Mode Retrieved value 202 can be shown as DPM mode, and the IP modeoverride value 204 can be shown as IPv4 only mode. As specified by thesecond message in this example, the network device 203 can be connectedin IPv4 mode, and the IP address value 206 can show an IP addressaccording to IPv4.

FIG. 2O shows a configuration interface 201 of an exemplary networkdevice 203 in which a second message has been received. For example, theIP Mode Retrieved value 202 can be shown as DPM mode, and the IP modeoverride value 204 can be shown as Honor. As specified by the secondmessage in this example, the network device 203 can be connected inDual-stack mode, and the IP address value 206 can show both IPv4 andIPv6 according to Dual-Stack mode.

FIG. 2P shows a configuration interface 201 of an exemplary networkdevice 203 in which a second message has been received. For example, theIP Mode Retrieved value 202 can be shown as DPM mode, and the IP modeoverride value 204 can be shown as empty or null. As specified by thesecond message in this example, the network device 203 can be connectedin Dual-stack mode, and the IP address value 206 can show both IPv4 andIPv6 according to Dual-Stack mode.

FIG. 2Q shows a configuration interface 201 of an exemplary networkdevice 203 in which a second message has been received. For example, theIP Mode Retrieved value 202 can be shown as DPM mode, and the IP modeoverride value 204 can be shown as DPM. As specified by the secondmessage in this example, the network device 203 can be connected inDual-stack mode, and the IP address value 206 can show both IPv4 andIPv6 according to Dual-Stack mode.

FIG. 2R shows a configuration interface 201 of an exemplary networkdevice 203 in which a second message has been received. For example, theIP Mode Retrieved value 202 can be shown as DPM mode, and the IP modeoverride value 204 can be shown as APM. As specified by the secondmessage in this example, the network device 203 can be connected in IPv6mode, and the IP address value 206 can show an IP address according toIPv6.

FIG. 2S shows a configuration interface 201 of an exemplary networkdevice 203 in which a second message has been received. For example, theIP Mode Retrieved value 202 can be shown as APM mode, and the IP modeoverride value 204 can be shown as IPv6 only mode. As specified by thesecond message in this example, the network device 203 can be connectedin IPv6 mode, and the IP address value 206 can show an IP addressaccording to IPv6.

FIG. 2T shows a configuration interface 201 of an exemplary networkdevice 203 in which a second message has been received. For example, theIP Mode Retrieved value 202 can be shown as APM mode, and the IP modeoverride value 204 can be shown as IPv4 only mode. As specified by thesecond message in this example, the network device 203 can be connectedin IPv4 mode, and the IP address value 206 can show an IP addressaccording to IPv4.

FIG. 2U shows a configuration interface 201 of an exemplary networkdevice 203 in which a second message has been received. For example, theIP Mode Retrieved value 202 can be shown as APM mode, and the IP modeoverride value 204 can be shown as Honor. As specified by the secondmessage in this example, the network device 203 can be connected in IPv6mode, and the IP address value 206 can show an IP address according toIPv6.

FIG. 2V shows a configuration interface 201 of an exemplary networkdevice 203 in which a second message has been received. For example, theIP Mode Retrieved value 202 can be shown as APM mode, and the IP modeoverride value 204 can be shown as empty or null. As specified by thesecond message in this example, the network device 203 can be connectedin IPv6 mode, and the IP address value 206 can show an IP addressaccording to IPv6.

FIG. 2W shows a configuration interface 201 of an exemplary networkdevice 203 in which a second message has been received. For example, theIP Mode Retrieved value 202 can be shown as APM mode, and the IP modeoverride value 204 can be shown as DPM. As specified by the secondmessage in this example, the network device 203 can be connected inDual-stack mode, and the IP address value 206 can show both IPv4 andIPv6 according to Dual-Stack mode.

FIG. 2X shows a configuration interface 201 of an exemplary networkdevice 203 in which a second message has been received. For example, theIP Mode Retrieved value 202 can be shown as APM mode, and the IP modeoverride value 204 can be shown as APM. As specified by the secondmessage in this example, the network device 203 can be connected in IPv6mode, and the IP address value 206 can show an IP address according toIPv6.

FIG. 3 is a diagram illustrating an example relationship between a firstmessage and a second message for an exemplary network device. While thefollowing description references configurations that, in some cases, maybe specific to moderns, it should be understood these examples aremerely illustrations and that aspects of the disclosure are applicableto different types of modems (e.g., cable modems), fiber optic interfacenodes, twisted pair modems, and the like. The diagram illustrates threeexample scenarios. In the first scenario 302, a termination system, oranother network node, can transmit a first message to a network devicein a MAC domain descriptor (MDD) to use IPv4 only. For example, the MDDcan comprise an access layer control message. Then, the terminationsystem can transmit a second message as a MAC IP Mode Override (MIMO)value specifying an honor mode (e.g., to use the mode specified in thefirst message). For example, the MIMO can be communicated in a bootfile, simple network management protocol set request message, hypertexttransfer protocol message, or the like. The result can be that thenetwork device is configured to connect to a network by IPv4.

In the second scenario 304, a termination system can transmit a firstmessage in a MAC domain descriptor (MDD) specifying to use IPv6 only.Next, the termination system can transmit a second message as a MIMOvalue specifying IPv4. The MIMO value can instruct the network device touse the protocol specified in the MIMO rather than a protocol specifiedby the first message. The result can be that the network device isconfigured to connect to a network by IPv4. In the third scenario 306, atermination system can transmit a first message in a MAC domaindescriptor (MDD) specifying to use IPv6 only. Next, the terminationsystem can transmit a second message in a MIMO value specifying an honormode (e.g., to use the mode specified in the first message). Thus, thenetwork device can be configured to connect to a network by IPv6.

FIG. 4 is a flowchart illustrating an exemplary method 400 forinitializing a network device. In one aspect, the network device canconnect to the termination system by an initialization process. In step402, a communication channel can be identified. For example, the networkdevice can perform ranging to identify available physical communicationchannels on a fiber-optic, coaxial, and/or other physical communicationline. Additionally, a first message can be received by the networkdevice specifying a protocol to use for a network connection

In step 404, a logical address can be received. In an aspect, thenetwork device can communicate with a logical address server. Thelogical address server can comprise, for example, a dynamic hostconfiguration protocol (DHCP) server. The logical address server canassign the network device a logical address, such as an IP address. Inone aspect, the logical address can be configured according to the firstmessage. In another aspect, the logical address can be configuredaccording to the second message or other subsequent message. Forexample, if the network device has reached step 404, after performingstep 406, 408, and 410, then the logical address server can configurethe logical address according to the second message.

In step 406, configuration information can be received. In an aspect,the configuration information can comprise the second message. Theconfiguration information can be received in a boot file. For example,the boot file can be communicated through a Trivial File TransferProtocol (TFTP) transmission. In another aspect, the configurationinformation can be received through a Simple Network Management Protocol(SNMP) transmission. In another aspect, the configuration informationcan be received through a Hypertext Transfer Protocol (HTTP) message.

In step 408, a decision to reconfigure the network device can be madebased on the configuration information. For example, if the secondmessage specifies a protocol different than a protocol specified by thefirst message, then the method 400 can proceed to step 410. If thesecond message does not specify a protocol different than the protocolspecified in the first message, then the method 400 can proceed to step412.

In step 410, the network device can release the network connection thatis connected through the protocol specified by the first message.Additionally, in one aspect, the network device can proceed to step 402to begin the initialization process again. In step 412, the networkdevice can receive a registration. Following registration, the networkdevice can be ready to transmit and receive according to specificationsof the network. Though not shown, the network device can perform otherconfiguration steps, such as requesting and receiving a time of day froma time of day server and other additional steps prior to step 412.

FIG. 5 is a flowchart illustrating an exemplary method 500 for networkconfiguration. In step 502, a first message (e.g., directive,communication) can be communicated to a network device. For example, instep 502 an access layer control message can be communicated. In oneaspect, the access layer control message can comprise a medium accesscontrol domain descriptor message. The first message can specify one ofa first protocol or a second protocol. In one aspect, the first protocolcan be Internet Protocol version 4 (IPv4) and the second protocol can beInternet Protocol version 6 (IPv6). In another aspect, the firstprotocol can be IPv6, and the second protocol can be an IPv4. In step504, a first logical address for the network device can be configuredbased at least on the first message.

In step 506, a second message (e.g., directive, communication) can becommunicated to the network device. For example, in step 506, at leastone of a boot file, a simple network management protocol set request, ora hypertext transfer protocol can be transmitted. In step 506,configuration information can be communicated to the network device. Forexample, step 506 can comprise communicating a protocol configurationmode override message. In one aspect, the protocol configuration modeoverride message can comprise a medium access control domain descriptorInternet Protocol provisioning mode override message. In anotherexample, step 506 can comprise communicating an IP provisioning modeattribute within a medium access control domain descriptor message. Inone aspect, the second message can specify one of a first mode directingthe network device to use the first protocol to connect to a network ora second mode directing the network device to use the second protocol toconnect to the network. In another aspect, the second message canspecify one of the first mode, the second mode, or a third modedirecting the network device to use one of the first protocol or thesecond protocol specified by the first message to connect to thenetwork. Additionally, the second message can communicate an instructionto dismiss the first message.

In step 508, a notification can be received to release the first logicaladdress from the network device. In step 510, a second logical addresscan be configured for the network device. The second logical address canbe defined according to the second message. In step 512, informationindicative of the second message can be persisted on the network devicein response to at least one of resetting the network device, poweringoff the network device, or performing a factory reset to restore thenetwork device to a default configuration. In step 514, a level offunctionality of the network device on a connection associated with thesecond logical address can be determined.

FIG. 6 is a flowchart illustrating another exemplary method for networkconfiguration. In step 602, a first message (e.g., directive,communication) can be communicated to a plurality of network devices.The first message can specify one of a first protocol or a secondprotocol. For example, in step 602 an access layer control message canbe communicated. In one aspect, the access layer control message cancomprise a medium access control domain descriptor message. In oneaspect, the first protocol is Internet Protocol version 4 (IPv4) and thesecond protocol is IP version 6 (IPv6). In another aspect, the firstprotocol is IPv6 and the second protocol is an IPv4. In step 604, afirst logical address can be configured for each of the plurality ofnetwork devices based on the first message.

In step 608, a second message (e.g., directive, communication) can becommunicated to at least a portion of the plurality of network devices.In one aspect, in step 608 configuration information can be communicatedto each network device of the portion of the plurality of networkdevices. For example, communicating configuration information to eachnetwork device of the portion of the plurality of network devices cancomprise one of transmitting at least one of a boot file, a simplenetwork management protocol set request, and a hypertext transferprotocol message. Additionally, the second message can communicate aninstruction to dismiss the first message. In one aspect, step 608 cancomprise communicating a protocol configuration mode override message.For example, the protocol configuration mode override message cancomprise a medium access control domain descriptor Internet Protocolmode override message.

In another aspect, in step 608 an IP provisioning mode attribute withina medium access control Domain Descriptor message can be communicated.The second message can specify one of a first mode directing eachnetwork device of the portion of the plurality of network devices to usethe first protocol to connect to a network or a second mode directingeach network device of the portion of the plurality of network devicesto use the second protocol to connect to the network. In another aspect,the second message can specify one of the first mode, the second mode,or a third mode directing each network device of the portion of theplurality of network devices to use the one of the first protocol or thesecond protocol specified by the first message to connect to thenetwork.

In step 610, each first logical address can be released from eachnetwork device of the portion of the plurality of network devices. Instep 612, a second logical address can be configured for each networkdevice of the portion of the plurality of network devices, each secondlogical address defined according to the second message. In step 614,information indicative of the second message can be persisted on eachnetwork device of the portion of the plurality of network devices duringat least one of resetting of each network device, powering off eachnetwork device, or perforating a factory reset to restore each networkdevice to a default configuration. In step 616, a level of functionalityof at least one network device of the portion of the plurality ofnetwork devices can be determined on at least one connection associatedwith a second logical address.

FIG. 7 is a flowchart illustrating yet another exemplary method fornetwork configuration. In step 702, a message (e.g., directive,communication) can be communicated to a network device. In one aspect,the message can specify one of a first mode directing the network deviceto use a first protocol to connect to a network or a second modedirecting the network device to use a second protocol to connect to thenetwork. For example, the first protocol can be one of an IPv4 and anIPv6, and the second protocol can be the other of IPv4 and IPv6. In oneaspect, in step 702 a protocol configuration mode override message canbe communicated. For example, the protocol configuration mode overridemessage can comprise a medium access control domain descriptor internetprotocol provisioning mode override message. In another aspect, in step702 at least one of a boot file, a simple network management protocolset request, and a hypertext transfer protocol message can betransmitted.

In step 704, a first logical address assigned to the network device canbe released. In step 706, a second logical address can be configured forthe network device. The second logical address can be defined accordingto the message.

In an exemplary aspect, the methods and systems can be implemented on acomputer 801 as illustrated in FIG. 8 and described below. By way ofexample, system 102 of FIG. 1 can comprise a computer as illustrated inFIG. 8. Similarly, the methods and systems disclosed can utilize one ormore computers to perform one or more functions in one or morelocations. FIG. 8 is a block diagram illustrating an exemplary operatingenvironment for performing the disclosed methods. This exemplaryoperating environment is only an example of an operating environment andis not intended to suggest any limitation as to the scope of use orfunctionality of operating environment architecture. Neither should theoperating environment be interpreted as having any dependency orrequirement relating to any one or combination of components illustratedin the exemplary operating environment.

The present methods and systems can be operational with numerous othergeneral purpose or special purpose computing system environments orconfigurations. Examples of well-known computing systems, environments,and/or configurations that can be suitable for use with the systems andmethods comprise, but are not limited to, personal computers, servercomputers, laptop devices, and multiprocessor systems. Additionalexamples comprise set top boxes, programmable consumer electronics,network PCs, minicomputers, mainframe computers, distributed computingenvironments that comprise any of the above systems or devices, and thelike.

The processing of the disclosed methods and systems can be performed bysoftware components. The disclosed systems and methods can be describedin the general context of computer-executable instructions, such asprogram modules, being executed by one or more computers or otherdevices. Generally, program modules comprise computer code, routines,programs, objects; components, data structures, etc. that performparticular tasks or implement particular abstract data types. Thedisclosed methods can also be practiced in grid-based and distributedcomputing environments where tasks are performed by remote processingdevices that are linked through a communications network. In adistributed computing environment, program modules can be located inboth local and remote computer storage media including memory storagedevices.

Further, one skilled in the art will appreciate that the systems andmethods disclosed herein can be implemented via a general-purposecomputing device in the form of a computer 801. The components of thecomputer 801 can comprise, but are not limited to, one or moreprocessors or processing units 803, a system memory 812, and a systembus 813 that couples various system components including the processor803 to the system memory 812. In the case of multiple processing units803, the system can utilize parallel computing.

The system bus 813 represents one or more of several possible types ofbus structures, including a memory bus or memory controller, aperipheral bus, an accelerated graphics port, and a processor or localbus using any of a variety of bus architectures. By way of example, sucharchitectures can comprise an Industry Standard Architecture (ISA) bus,a Micro Channel Architecture (MCA) bus, an Enhanced ISA (EISA) bus, aVideo Electronics Standards Association (VESA) local bus, an AcceleratedGraphics Port (AGP) bus, and a Peripheral Component Interconnects (PCI),a PCI-Express bus, a Personal Computer Memory Card industry Association(PCMCIA), Universal Serial Bus (USB) and the like. The bus 813, and allbuses specified in this description can also be implemented over a wiredor wireless network connection and each of the subsystems, including theprocessor 803, a mass storage device 804, an operating system 805,network management software 806, network management data 807, a networkadapter 808, system memory 812, an Input/Output Interface 810, a displayadapter 809, a display device 811, and a human machine interface 802,can be contained within one or more remote computing devices 814 a,b,cat physically separate locations, connected through buses of this form,in effect implementing a fully distributed system.

The computer 801 typically comprises a variety of computer readablemedia. Exemplary readable media can be any available media that isaccessible by the computer 801 and comprises, for example and not meantto be limiting, both volatile and non-volatile media, removable andnon-removable media. The system memory 812 comprises computer readablemedia in the form of volatile memory, such as random access memory(RAM), and/or non-volatile memory, such as read only memory (ROM). Thesystem memory 812 typically contains data such as network managementdata 807 and/or program modules such as operating system 805 and networkmanagement software 806 that are immediately accessible to and/or arepresently operated on by the processing unit 803.

In another aspect, the computer 801 can also comprise otherremovable/non-removable, volatile/non-volatile computer storage media.By way of example, FIG. 8 illustrates a mass storage device 804 whichcan provide non-volatile storage of computer code, computer readableinstructions, data structures, program modules, and other data for thecomputer 801. For example and not meant to be limiting, a mass storagedevice 804 can be a hard disk, a removable magnetic disk, a removableoptical disk, magnetic cassettes or other magnetic storage devices,flash memory cards, CD-ROM, digital versatile disks (DVD) or otheroptical storage, random access memories (RAM), read only memories (ROM),electrically erasable programmable read-only memory (EEPROM), and thelike.

Optionally, any number of program modules can be stored on the massstorage device 804, including by way of example, an operating system 805and network management software 806. Each of the operating system 805and network management software 806 (or some combination thereof) cancomprise elements of the programming and the network management software806. Network management data 807 can also be stored on the mass storagedevice 804. Network management data 807 can be stored in any of one ormore databases known in the art. Examples of such databases comprise,DB2®, Microsoft® Access, Microsoft® SQL Server, Oracle®, mySQL,PostgreSQL, and the like. The databases can be centralized ordistributed across multiple systems.

In another aspect, the user can enter commands and information into thecomputer 801 via an input device (not shown). Examples of such inputdevices comprise, but are not limited to, a keyboard, pointing device(e.g., a “mouse”), a microphone, a joystick, a scanner, tactile inputdevices such as gloves, and other body coverings, and the like These andother input devices can be connected to the processing unit 803 via ahuman machine interface 802 that is coupled to the system bus 813, butcan be connected by other interface and bus structures, such as aparallel port, game port, an IEEE 1394 Port (also known as a Firewireport), a serial port, or a universal serial bus (USB).

In yet another aspect, a display device 811 can also be connected to thesystem bus 813 via an interface, such as a display adapter 809. It iscontemplated that the computer 801 can have more than one displayadapter 809 and the computer 801 can have more than one display device811. For example, a display device can be a monitor, an LCD (LiquidCrystal Display), or a projector. In addition to the display device 811,other output peripheral devices can comprise components such as speakers(not shown) and a printer (not shown) which can be connected to thecomputer 801 via Input/Output Interface 810. Any step and/or result ofthe methods can be output in any form to an output device. Such outputcan be any form of visual representation, including, but not limited to,textual, graphical, animation, audio, tactile, and the like. The display811 and computer 801 can be part of one device, or separate devices.

The computer 801 can operate in a networked environment using logicalconnections to one or more remote computing devices 814 a,b,c. By way ofexample, a remote computing device can be a personal computer, portablecomputer, smartphone, a server, a router, a network computer, a peerdevice or other common network node, and so on. Logical connectionsbetween the computer 801 and a remote computing device 814 a,b,c can bemade via a network 815, such as a local area network (LAN) and/or ageneral wide area network (WAN). Such network connections can be througha network adapter 808. A network adapter 808 can be implemented in bothwired and wireless environments. Such networking environments areconventional and commonplace in dwellings, offices, enterprise-widecomputer networks, intranets, and the Internet.

For purposes of illustration, application programs and other executableprogram components such as the operating system 805 are illustratedherein as discrete blocks, although it is recognized that such programsand components reside at various times in different storage componentsof the computing device 801, and are executed by the data processor(s)of the computer. An implementation of network management software 806can be stored on or transmitted across some form of computer readablemedia. Any of the disclosed methods can be performed by computerreadable instructions embodied on computer readable media. Computerreadable media can be any available media that can be accessed by acomputer. By way of example and not meant to be limiting, computerreadable media can comprise “computer storage media” and “communicationsmedia.” “Computer storage media” comprise volatile and non-volatile,removable and non-removable media implemented in any methods ortechnology for storage of information such as computer readableinstructions, data structures, program modules, or other data. Exemplarycomputer storage media comprises, but is not limited to, RAM, ROM,EEPROM, flash memory or other memory technology, CD-ROM, digitalversatile disks (DVD) or other optical storage, magnetic cassettes,magnetic tape, magnetic disk storage or other magnetic storage devices,or any other medium which can be used to store the desired informationand which can be accessed by a computer.

The methods and systems can employ artificial intelligence techniquessuch as machine learning and iterative learning. Examples of suchtechniques include, but are not limited to, expert systems, case basedreasoning, Bayesian networks, behavior based AI, neural networks, fuzzysystems, evolutionary computation (e.g. genetic algorithms), swarmintelligence (e.g. ant algorithms), and hybrid intelligent systems (e.g.Expert inference rules generated through a neural network or productionrules from statistical learning).

While the methods and systems have been described in connection withpreferred embodiments and specific examples, it is not intended that thescope be limited to the particular embodiments set forth, as theembodiments herein are intended in all respects to be illustrativerather than restrictive.

Unless otherwise expressly stated, it is in no way intended that anymethod set forth herein be construed as requiring that its steps beperformed in a specific order. Accordingly, where a method claim doesnot actually recite an order to be followed by its steps or it is nototherwise specifically stated in the claims or descriptions that thesteps are to be limited to a specific order, it is in no way intendedthat an order be inferred, in any respect. This holds for any possiblenon-express basis for interpretation, including: matters of logic withrespect to arrangement of steps or operational flow; plain meaningderived from grammatical organization or punctuation; the number or typeof embodiments described in the specification.

It will be apparent to those skilled in the art that variousmodifications and variations can be made without departing from thescope or spirit. Other embodiments will be apparent to those skilled inthe art from consideration of the specification and practice disclosedherein. It is intended that the specification and examples be consideredas exemplary only, with a true scope and spirit being indicated by thefollowing claims.

What is claimed is:
 1. A method, comprising: transmitting, to a networkdevice, a first message comprising an access layer control message, thefirst message specifying one of a first protocol or a second protocol;determining a first logical address for the network device based atleast on the first message; transmitting, to the network device, asecond message, wherein the second message specifies one of a firstmode, directing the network device to use the first protocol to connectto a network, or a second mode, directing the network device to use thesecond protocol to connect to the network; receiving, from the networkdevice, a notification to release the first logical address; anddetermining a second logical address for the network device, the secondlogical address being defined according to the second message.