The mimicking of network devices in a computing device having first and second network interface cards, the first network interface card connecting the computing device to an external network and the second network interface card connecting the computing device to a local network. The invention incl
The mimicking of network devices in a computing device having first and second network interface cards, the first network interface card connecting the computing device to an external network and the second network interface card connecting the computing device to a local network. The invention includes receiving an incoming message from a client network device residing on the external network, the incoming message being directed to a legacy network device residing on the local network, and determining if the incoming message requires a function provided by an application module residing in the computing device. In the case that the incoming message requires a function provided by the application module, the incoming message is redirected to the application module which performs the required function in response to the incoming message. In the case that the incoming message does not require a function provided by the application module, the incoming message is passed through the local network to the legacy network device residing on the local network.
대표청구항▼
What is claimed is: 1. A method for mimicking network devices, the method being performed in a computing device having first and second network interface cards, the first network interface card connecting the computing device to an external network and the second network interface card connecting t
What is claimed is: 1. A method for mimicking network devices, the method being performed in a computing device having first and second network interface cards, the first network interface card connecting the computing device to an external network and the second network interface card connecting the computing device to a local network, the method comprising the steps of: discovering each of a plurality of target network devices on the local network by listening to the local network for messages from the plurality of target network devices, and creating a target descriptor entry corresponding to each of the plurality of discovered target network devices in a target descriptor table; creating a rule corresponding to each of the target descriptor entries in an inbound rules table containing a plurality of rules, wherein each of the plurality of rules corresponds to one of the plurality of the target network devices on the local network, wherein the each of the plurality of rules contains an IP address corresponding to the target network device, and wherein at least one of the plurality of rules indicates whether a functionality requested for a corresponding target network device to perform is to be processed by one of a plurality of application modules residing in the computing device; receiving, via the first network interface card, an incoming message from a client network device residing on the external network, the incoming message being addressed to an IP address of a designated one of the plurality of target network devices; determining, based at least in part on the rule corresponding to the designated target network device, if the incoming message requests a functionality that the one of the plurality of application modules is configured to perform, wherein the rule containing the IP address of a target network device in the inbound rules table that matches the IP address of the designated one of the plurality of target network devices is used to determine if the requested functionality is to be processed by the one of the plurality of application modules in the computing device, and wherein the processing of the requested functionality by the one of the plurality of application modules includes responding to the incoming message addressed to the target network device on behalf of the target network device; redirecting, in the case that the incoming message requests the functionality that the one of the plurality of application modules is configured to perform, the incoming message to the one of the plurality of application modules which performs the requested functionality in response to the incoming message, wherein the one of the plurality of application modules performs the requested functionality on behalf of the designated one of the plurality of target network devices, and wherein the designated one of the plurality of target network devices lacks support for the requested functionality, wherein in the case that another application module of the plurality of application modules is configured to process another requested functionality after the processing of the requested functionality by the one of the plurality of application modules, a destination address of the incoming message is set to an IP address of the first network interface card; and passing, in the case that the incoming message does not request the functionality that the one of the plurality of application modules is configured to perform, the incoming message through the local network via the second network interface card to the designated target network device. 2. A method according to claim 1, wherein the designated target network device is a legacy network device. 3. A method according to claim 1, wherein the one of the plurality of application modules processes the functionality requested by the incoming message, and transmits data to the designated target network device as a result of the processing. 4. A method according to claim 3, wherein the requested functionality is e-mail printing, and wherein the data transmitted to the target network device is a rendered print job. 5. A method according to claim 1, wherein in the redirecting step, the performing of the requested functionality by the one of the plurality of application modules includes sending a response message from the one of the plurality of application modules over the external network to the client network device, the response message having a source identification address identical to a source identification address of the designated target network device. 6. A method according to claim 1, wherein in the redirecting step, the performing of the requested functionality by the one of the plurality of application modules includes sending a local message from the one of the plurality of application modules over the local network to the designated target network device which performs a function in response to the local message. 7. A method according to claim 1, wherein each of the plurality of rules contains a port identifier to indicate whether the functionality requested of the target network device corresponding to the rule is to be processed by a particular one of the plurality of application modules residing in the computing device. 8. A method according to claim 1, wherein the discovering step includes sending a discovery message to each discovered target network device and receiving discovery information in response to the discovery message from the corresponding target network device, wherein the discovery information is placed in the target descriptor entry for the corresponding target network device. 9. A method according to claim 8, further comprising a polling step of sending the discovery message on a periodic basis to the each discovered target network device, and receiving in response to the discovery message the discovery information from the corresponding target network device, wherein the target descriptor entry for the corresponding target network device is updated with the received discovery information. 10. A method according to claim 9, wherein in the case that the discovery information is not received in response to the discovery message for a particular one of the discovered target network devices, the target descriptor entry corresponding to the particular one of the discovered target network devices is deleted. 11. A method according to claim 1, further comprising the step of sending a notification for each of the plurality of discovered target network devices to the one of the plurality of application modules, the notification containing information related to the target descriptor entry for the corresponding target network device. 12. A method according to claim 1, further comprising the step of publishing the each of the target descriptor entries to the one of the plurality of application modules. 13. A method according to claim 6, wherein the second network interface card is assigned a preset IP address, and the local message contains a source IP address which is identical to the preset IP address. 14. A method according to claim 6, wherein the local message contains a source IP address which is identical to a source IP address of the client network device. 15. A method according to claim 1, wherein in the redirecting step, the performing of the requested functionality by the one of the plurality of application modules includes preparation of an outbound message for delivery to a designated device on one of the external network and the local network, and wherein a routing table is used to determine which one of the external network and the local network is used for sending the outbound message to the designated device. 16. A method according to claim 15, wherein the routing table contains a cross-reference indicator for the each of the plurality of target network devices to indicate which one of the external network and the local network is used for sending the outbound message to the designated device. 17. A method according to claim 15, wherein the routing table is used to determine whether a preset IP address of the second network interface card or a source IP address of the client network device is used as a source IP address in the outbound message. 18. A method according to claim 1, further comprising the step of tracking a port identifier of a port opened by the one of the plurality of application modules and creating a rule in the inbound rules table corresponding to the port identifier, wherein in the determining step, the rule corresponding to the port identifier is used to redirect the incoming message from the external network to the one of the plurality of application modules if the incoming message contains the port identifier corresponding to the rule. 19. A method according to claim 18, further comprising the steps of tracking an initial target port identifier of a port opened by one of the plurality of target network devices, mapping the initial target port identifier to a new target port identifier, creating a first map rule in the inbound rules table corresponding to the target network device which maps the initial target port identifier to the new target port identifier, and creating a second map rule in an outbound rules table corresponding to the target network device which maps the new target port identifier to the initial target port identifier. 20. A method according to claim 1, wherein the local network is a USB network, the target network device is a printer, and the inbound rules table contains at least one rule which is used in the determining step to redirect the incoming message for the printer from the external network to the one of the plurality of application modules which sends a USB message over the local network to the printer in response to the incoming message. 21. A method according to claim 1, wherein the local network is a USB network, the target network device is a digital camera, and further including the steps of downloading a digital image to the one of the plurality of application modules from the digital camera via the local network, and sending the digital image to a server on the external network. 22. A method according to claim 1, wherein the inbound rules table contains rules which are used in the determining step to route the incoming message from the external network to the designated target network device on the local network. 23. A method according to claim 1, wherein the inbound rules table contains rules which are used in the determining step to capture the incoming message from the external network and further including the step of preventing transmission of the incoming message on the local network. 24. A method according to claim 1, wherein the inbound rules table contains rules which are used in the determining step to determine that all incoming messages from the external network are not to be processed by any of the plurality of application modules, whereby all of the incoming messages from the external network are passed through the local network. 25. A method according to claim 1, wherein the one of the plurality of application modules is a file server which sends at least one file over the local network to the designated target network device and at least one file over the external network to the client network device. 26. A method according to claim 1, wherein the inbound rules table contains rules which are used in the determining step to determine that a set of designated incoming messages are copied to the one of the plurality of application modules, which records each of the set of designated incoming messages. 27. A method according to claim 1, wherein the inbound rules table contains rules which are used in the determining step to detect if the incoming message is an undesirable message, and in the case that the incoming message is an undesirable message, the incoming message is to be processed by the one of the plurality of application modules, whereby the incoming message is redirected to the one of the plurality of application modules. 28. A method according to claim 1, further including the step of transmitting a plurality of undesirable messages from the one of the plurality of application modules over one of the external network and the local network. 29. A computing device for mimicking network devices, the computing device having first and second network interface cards, the first network interface card connecting the computing device to an external network and the second network interface card connecting the computing device to a local network, said computing device comprising: a program memory for storing process steps executable to perform a method according to any of claims 2, 3 or 4 to 28, and a processor for executing the process steps stored in said program memory. 30. Computer-executable process steps stored on a computer readable medium, said computer-executable process steps for mimicking network devices and for being performed in a computing device having first and second network interface cards, the first network interface card connecting the computing device to an external network and the second network interface card connecting the computing device to a local network, said computer-executable process steps comprising process steps executable to perform a method according to any of claims 2, 3 or 4 to 28. 31. A computer-readable medium which stores computer-executable process steps, the computer-executable process steps to mimic network devices and to be performed in a computing device having first and second network interface cards, the first network interface card connecting the computing device to an external network and the second network interface card connecting the computing device to a local network, said computer-executable process steps comprising process steps executable to perform a method according to any of claims 2, 3 or 4 to 28.
Stein Scott A. (Phoenix AZ) Carlson Bruce M. (Phoenix AZ) Yen Chung S. (Bedford MA) Farrington Kevin M. (Williamsville NY), Ally mechanism for interconnecting non-distributed computing environment (DCE) and DCE systems to operate in a network s.
Levine Jonathan D. ; Gombert Barry G. ; Mayer James L., Centralized print server for interfacing one or more network clients with a plurality of printing devices.
Svancarek Mark K. ; Hanson Jeffrey S. ; Minami Toshiyuki,JPX, Method and apparatus for adaptively coupling an external peripheral device to either a universal serial bus port on a co.
Barrett Lorraine F. (Yorba Linda CA) Russell William C. (Laguna Hills CA) Wadsworth Robert D. (Costa Mesa CA) Kraslavsky Andrew J. (Rancho Santa Margarita CA) Kalwitz George A. (Costa Mesa CA), Method and apparatus for advertising services of two network servers from a single network node.
Ames Steve ; Bialkowski Jan ; Byrne Donal ; Cave Dennis, Method and apparatus for forwarding traffic between locality attached networks using level 3 addressing information.
Cooper, Michael Richard; Dutta, Rabindranath; Hamzy, Mark Joseph; Vanderwiele, Mark Wayne; Zannucci, Peter A., Method and apparatus for supporting application and device independent print support.
Mostafa Mohamed ; Kumar Rajesh, Multiprotocol adaptor for communication between CEBus devices and remote controllers over an ATM-based broadband access.
Nixon Mark ; Havekost Robert B. ; Jundt Larry O. ; Stevenson Dennis ; Ott Michael G. ; Webb Arthur,GBX ; Lucas Mike,GBX ; Hoffmaster James, Process control system for versatile control of multiple process devices of various device types.
Nixon Mark ; Krivoshein Ken D. ; Shepard John R. ; Christensen Dan D. ; Schleiss Duncan, Process control system including a method and apparatus for automatically sensing the connection of devices to a network.
Butts Thomas H. ; Burris ; Jr. Stuart H. ; Skinner Gary W. ; Prichard ; III Stanley E., Server and terminal emulator for persistent connection to a legacy host system with direct OS/390 host interface.
Viswanathan Srinivasan ; Nazari Siamak ; Swaroop Anil ; Khalidi Yousef, System and method for transparent, global access to physical devices on a computer cluster.
Ngan, Ching-Yuk Paul; Hortikar, Sanjay D.; Havemose, Allan; Tewksbury, Lauren; Raman, Vishwas, Method and system for providing high availability to computer applications.
Reddy, Paul James; Sharpe, Julian; Sun, Jacky; Riddell, Peter James; Pickhardt, Kevin, Printer control device providing printer masquerading features and related methods.
Cherry, Gene Wayne; Lazzaro, Christopher Victor; Ranjan, Dasgupta, System for energy efficient computer management environment via tightly integrated target status and directed work sessions.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.