WO2002087172A1 - Protocol and structure for self-organizing network - Google Patents

Protocol and structure for self-organizing network Download PDF

Info

Publication number
WO2002087172A1
WO2002087172A1 PCT/US2002/012519 US0212519W WO02087172A1 WO 2002087172 A1 WO2002087172 A1 WO 2002087172A1 US 0212519 W US0212519 W US 0212519W WO 02087172 A1 WO02087172 A1 WO 02087172A1
Authority
WO
WIPO (PCT)
Prior art keywords
node
cluster
cluster head
identifier
message
Prior art date
Application number
PCT/US2002/012519
Other languages
French (fr)
Inventor
Masahiro Maeda
Monique Bourgeois
Edgar H. Callaway, Jr.
Priscilla Chen
Jian Huang
Yan Huang
Qicai Shi
Original Assignee
Motorola, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Motorola, Inc. filed Critical Motorola, Inc.
Publication of WO2002087172A1 publication Critical patent/WO2002087172A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks
    • H04W84/20Master-slave selection or change arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/02Topology update or discovery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/02Topology update or discovery
    • H04L45/026Details of "hello" or keep-alive messages
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/02Topology update or discovery
    • H04L45/03Topology update or discovery by updating link state protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/46Cluster building
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/12Arrangements for detecting or preventing errors in the information received by using return channel
    • H04L1/16Arrangements for detecting or preventing errors in the information received by using return channel in which the return channel carries supervisory signals, e.g. repetition request signals
    • H04L1/1607Details of the supervisory signal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/24Connectivity information management, e.g. connectivity discovery or connectivity update
    • H04W40/246Connectivity information discovery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks

Definitions

  • This invention relates generally to the field of communication networks. More particularly, the invention relates to a protocol and structure for a self-organizing network.
  • the present invention relates generally to self-organizing communication networks and in particular to structures and protocols for the operation of cluster tree self-organizing networks. Objects and features of the invention will become apparent to those of ordinary skill in the art upon consideration of the following detailed description of the invention.
  • the Cluster Tree Protocol of the present invention is a protocol of the logical link and network layers for a wireless ad-hoc network.
  • the protocol uses link-state packets to form either a single cluster network, or a potentially larger cluster tree network.
  • the network is basically self-organized, and supports network redundancy to attain a degree of fault resistance and self-repair.
  • Nodes select a cluster head and form a cluster according to the self-organized manner.
  • the cluster head assigns a unique node ID to each member node.
  • Designated Device is a special node that has high computing ability and large memory space; in most applications it is also the gateway between the network and the Internet.
  • the Designated Device assigns a unique cluster ED to each cluster.
  • FIG. 1 is a diagrammatic representation of a cluster head selection process of the invention.
  • FIG. 2 is a diagrammatic representation of a link setup process between a cluster head and a member node in accordance with the invention.
  • FIG. 3 is a diagrammatic representation of a single-hop cluster structure in accordance with the invention.
  • FIG. 4 is a diagrammatic representation of a multi-hop cluster setup procedure in accordance with the invention.
  • FIG. 5 is a diagrammatic representation of a multi-hop cluster structure in accordance with the invention.
  • FIG. 6 is a diagrammatic representation of a process for updating a neighbor list in accordance with the invention.
  • FIG. 7 is a diagrammatic representation an exemplary network.
  • FIG. 8 is a neighbor list of a node in cluster border of the network shown in
  • FIG. 9 is a diagrammatic representation an exemplary network.
  • FIG. 10 is a link-state report corresponding to the network in FIG. 9.
  • FIG. 11 is a diagrammatic representation an exemplary network.
  • FIG. 12 is a topology update table corresponding to the network in FIG. 11.
  • FIG. 13 is a diagrammatic representation of an exemplary network with a failed node.
  • FIG. 14 is a modified link-state report table for the network shown in FIG. 13.
  • FIG. 15 is a diagrammatic representation of the network in FIG. 13 following a first stage of link recovery.
  • FIG. 16 is a topology update table for the network shown in FIG. 15.
  • FIG. 17 is a diagrammatic representation of the network in FIG. 13 following a second stage of link recovery.
  • FIG. 18 is a link-state report table for the network shown in FIG. 17.
  • FIG. 19 is a topology update table for the network shown in FIG. 17.
  • FIG. 20 is a diagrammatic representation of multiple access control using RTS/CTS messages.
  • FIG. 21 is a flow diagram showing data packet forwarding flow.
  • FIG. 22 is an interaction diagram of a first example of cluster ID assignment.
  • FIG. 23 is a diagrammatic representation of a network corresponding to FIG. 22.
  • FIG. 24 is an interaction diagram of a second example of cluster ID assignment.
  • FIG. 25 is a diagrammatic representation of a network corresponding to FIG. 24.
  • FIG. 26 is an interaction diagram of a third example of cluster ID assignment.
  • FIG. 27 is a diagrammatic representation of a network corresponding to FIG. 26.
  • FIG. 28 is an interaction diagram of a fourth example of cluster ID assignment.
  • FIG. 29 is a diagrammatic representation of a network corresponding to FIG.
  • FIG. 30 is an interaction diagram of an exemplary network.
  • FIG. 31 is a network link-state report corresponding to the network shown in
  • FIG. 32 is a diagrammatic representation of an exemplary network.
  • FIG. 33 is a network topology update table corresponding to the network shown in FIG. 32.
  • FIG. 34 is a diagrammatic representation of an exemplary network illustrating network redundancy.
  • FIG. 35 is a modified network link-state report corresponding to the network shown in FIG. 34.
  • FIG. 36 is a modified network topology update table corresponding to the network shown in FIG. 34.
  • FIG. 37 is a diagrammatic representation of an exemplary multi-cluster network illustrating border nodes.
  • FIG. 38 shows the structure of an exemplary HELLO message.
  • FIG. 39 shows the structure of an exemplary CONNECTION REQUEST message.
  • FIG. 40 shows the structure of an exemplary CONNECTION RESPONSE
  • FIG. 41 shows the structure of an exemplary NODE ED REQUEST message.
  • FIG. 42 shows the structure of an exemplary NODE ED RESPONSE message.
  • FIG. 43 shows the structure of an exemplary DISCONNECTION REQUEST message.
  • FIG. 44 shows the structure of an exemplary DISCONNECTION RESPONSE message.
  • FIG. 45 shows the structure of an exemplary LENK-STATE REPORT message.
  • FIG. 46 shows the structure of an exemplary TOPOLOGY UPDATE
  • FIG. 47 shows the structure of an exemplary NETWORK CONNECTION REQUEST message.
  • FIG. 48 shows the structure of an exemplary NETWORK CONNECTION RESPONSE message.
  • FIG. 49 shows the structure of an exemplary CLUSTER ED REQUEST message.
  • FIG. 50 shows the structure of an exemplary CLUSTER ED RESPONSE message.
  • FIG. 51 shows the structure of an exemplary NETWORK DISCONNECTION REQUEST message.
  • FIG. 52 shows the structure of an exemplary NETWORK DISCONNECTION
  • FIG. 53 shows the structure of an exemplary NETWORK LINK-STATE REPORT message.
  • FIG. 54 shows the structure of an exemplary NETWORK TOPOLOGY UPDATE message.
  • FIG. 55 shows the structure of an exemplary REQUEST TO SEND (RTS) message.
  • FIG. 56 shows the structure of an exemplary CLEAR TO SEND (CTS) message.
  • FIG. 57 shows the structure of an exemplary ACKNOWLEDGEMENT
  • FIG. 58 shows the structure of an exemplary ACKNOWLEDGEMENT (ACK) for Inter Cluster Communication.
  • FIG. 59 shows the structure of an exemplary Intra Cluster DATA frame.
  • FIG. 60 shows the structure of an exemplary Inter Cluster DATA frame. DETAILED DESCRIPTION OF THE INVENTION
  • the Cluster Tree Protocol of the present invention is a protocol of the logical link and network layers for a wireless ad-hoc network.
  • the protocol uses link-state packets to form either a single cluster network, or a potentially larger cluster tree network.
  • the network is basically self-organized, and supports network redundancy to attain a degree of fault resistance and self -repair.
  • Nodes select a cluster head and form a cluster according to the self-organized manner that will be described below.
  • the cluster head assigns a unique node ED to each member node.
  • the Designated Device is a special node that has high computing ability and large memory space; in some applications it is also the gateway between the network and the Internet.
  • the Designated Device assigns a unique cluster ED to each cluster.
  • a network is made of one or more clusters, each cluster having a cluster head and a number of member nodes.
  • the formation and operation of a single cluster is described first.
  • Multi-cluster networks are described later.
  • Each node is directed by a computer program stored in a memory, an application specific integrated circuit, a digital signal processor or an equivalent device.
  • Each node has an input for receiving data and an output for transmitting data.
  • Single Cluster Network Cluster Formation Process The Cluster formation process begins with the selection of the cluster head, the first node in the cluster. After a cluster head is selected, the cluster head expands links with other member nodes to form a cluster.
  • FIG. 1 One example of selecting a cluster head is illustrated in FIG. 1.
  • a node After a node turns on, it operates as a regular network node, and listens and searches for a HELLO message from other nodes. (A HELLO message is a simple broadcast message identifying the transmitting node.) If the node does not receive any HELLO messages for a first period of time, e.g., 1-30 seconds, it then operates as a cluster head and sends out a HELLO message to its neighbors. The new cluster head waits for responses from neighboring nodes for a second period of time, e.g., 2-60 seconds. If no connection requests are received, the node turns back to operation as a regular network node and listens again.
  • a first period of time e.g. 1-30 seconds
  • the new cluster head waits for responses from neighboring nodes for a second period of time, e.g., 2-60 seconds. If no connection requests are received, the node turns back to operation as a
  • the cluster head can be selected based on stored/calculated parameters of each node, like transmission range, power capacity, computing ability or location information.
  • a node After a node is selected as a cluster head (CH), it broadcasts a periodic HELLO message that contains a part of the cluster head MAC (Multiple Access Control) address and a node ED (0 for example) that indicates the cluster head. This is shown in FIG. 2.
  • the nodes that receive this HELLO message send a CONNECTION REQUEST message to the cluster head.
  • the cluster head receives the CONNECTION REQUEST, it responds to the node with a CONNECTION RESPONSE message that contains a node ED for the node.
  • the node ED should preferably be unique within a cluster and the cluster head has the responsibility to assign and manage unique node EDs to its member nodes.
  • the node that is assigned a node ED replies with an ACK (acknowledge) message to the cluster head.
  • ACK acknowledgenowledge
  • both nodes set each other as parent or child.
  • Each node maintains a neighbor list, which includes a list of parent and child nodes.
  • the cluster head denotes the newly added node as a child in its neighbor list and the new node denotes the cluster head as a parent. The link between the cluster head and the member node is established at this moment.
  • the topology of connection becomes a star, as shown in FIG. 3, and every member node is connected to the cluster head with one hop.
  • the maximum number of nodes in a cluster is 254 including the cluster head. If node addresses with N-bits are used the maximum number of nodes is 2 N -2. The administrator or the manufacturer may limit the node feature to supporting only single hop cluster.
  • a cluster can expand into a multi-hop structure when each node supports multiple connections. Although network delay increases, the coverage within one cluster can increase.
  • the multi hop cluster setup procedure is described in FIG. 4.
  • node B After node B has established a link with the cluster head, it starts to relay HELLO messages from the cluster head.
  • node C gets the message from node B, it sends a CONNECTION REQUEST message to node B.
  • Node B requests a new node ED to the cluster head for node C.
  • node B receives a new node ED from the cluster head, it sends a CONNECTION RESPONSE message to node C. Then node C receives it and answers with an ACK message.
  • node C sets node B as its parent, node B sets node C as its child, and the cluster head sets node C as node B's child. Node C then starts to relay HELLO messages to announce itself to its neighborhood.
  • the node When a node receives several HELLO messages from different nodes, there are many different ways to select the Hello message to which to respond. In a preferred embodiment, the node responds to the earliest HELLO message. In another embodiment, it responds to the strongest HELLO message. The path to the cluster head might not be ideal at this time. The route to the cluster head will optimize in a later process.
  • the maximum hop count may also be limited to reduce maximum network delay.
  • the cluster head When the cluster head has run out of node EDs or the cluster has reached some other defined limit, the cluster head should reject connection requests from new nodes.
  • the temporary NED (NED 254 for example) is used in the destination NED field of the CONNECTION RESPONSE message or the new NED field of the NODE ED RESPONSE message.
  • a requester node When a requester node receives a NODE ED RESPONSE message with NID 254, it sends a CONNECTION RESPONSE message with NID 254 to the new node. If a new node has received a CONNECTION RESPONSE with NID 254, it stores the cluster ED and stop sending a CONNECTION REQUEST message to the node belonging to the same cluster for a while.
  • FIG. 5 An example of a multi-hop cluster structure is shown in FIG. 5.
  • Single Cluster Network Network Maintenance
  • the cluster head periodically broadcasts HELLO messages to its member nodes.
  • These member nodes receive the HELLO message from the cluster head, they also send HELLO messages to announce themselves to their neighbors. Every node records their neighbor nodes in their neighbor list. The entry of the neighbor list is updated by the periodic HELLO message. If a node entry doesn't update until certain timeout limit, it should be eliminated. This process is shown in FIG. 6.
  • the member nodes can talk directly with the neighbor nodes. If a node wants to communicate with a node outside of its range, it asks the cluster head or the parent node to relay the message to the destination.
  • a node may receive a HELLO message from a node that belongs to different cluster. In that case, the node adds the cluster ED (CED) of the transmitting node in the neighbor list.
  • CED cluster ED
  • An exemplary network is shown in FIG. 7.
  • the corresponding neighbor list for node 2 is shown in FIG. 8. Every node has to report its link state to the cluster head.
  • a member node periodically sends a LINK-STATE REPORT message that contain its neighbors node ED list to the cluster head. The frequency of Link-State Report message will be determined by application requirements and stability.
  • FIG. 9 shows an exemplary network.
  • a table of the link-state reports sent by each node is shown in FIG. 10.
  • the cluster head Based on the LINK-STATE REPORT message the cluster head periodically calculates the shortest path between itself and member nodes and informs it to the members by TOPOLOGY UPDATE message.
  • TOPOLOGY UPDATE An example of a TOPOLOGY
  • UPDATE report for the network shown in FIG. 11 is shown in FIG. 12.
  • the cluster head should choose the route with the smallest hop count. If there are several routes with the same hop count, the cluster head should choose the route that has the smallest node ED as the parent node or some similar arbitration rule. If a member node receives the TOPOLOGY UPDATE message that the different parent node is linked to the node, it changes the parent node as indicated in the message. The member node also records its child nodes and the nodes below it in the tree at this time. The nodes within a cluster basically communicate with other node through the parent node except the case where they communicate with their neighbor nodes directly. The cycle of the Topology Update depends on the Link-
  • the tree route of the cluster would be reconfigured.
  • the node 2 has trouble and stops communication.
  • a modified table of corresponding link-state reports is shown in FIG. 14. Since the nodes 2, 7, 8 and 10 cannot send the LINK-
  • the cluster head calculates a new route from other link-state information.
  • the node 7 establishes a new connection with the node 3, as shown in FIG. 15.
  • the corresponding topology update report is shown in FIG. 16.
  • the nodes 8 and 10 are instructed to connect to node 7.
  • the resulting network is shown in FIG. 17.
  • the corresponding link-state report is shown in FIG. 18 and the corresponding topology update is shown in FIG. 19.
  • RTS Request To Send
  • CTS Call To Send
  • FIG. 20 when a node wants to send a packet to other node, it sends RTS at first and then waits for CTS. After receiving RTS, the receiving node sends a CTS frame to acknowledge the right for the sending node to send data frame. This procedure reduces the chance of collision by hidden nodes.
  • a node receiving an error-free frame can send an ACK frame to the sending node to acknowledge the successful reception of the frame.
  • a node wants to send a packet to other node, i.e. it wants to unicast a message, it sets its node ED in the source NED field of the packet and its destination node ED in destination NED field. Ii a node isn't sending to one of its neighbors, and if the destination node is below the source in the tree, the source node sets its child node ID in the receiving NED field and asks its child node to forward to the destination.
  • the source If the source isn't sending to one of its neighbors, and if the destination node isn't below the source branch, the source sets its parent node ED in the receiving NED field and sends the packet to its parent. Each intermediate node should relay the packet toward the destination node as it updates receiving and transmitting NED fields.
  • the packet is routed along the tree topology except for the last one hop. If the destination node is below the sender node in the tree structure, the packet is forwarded along the branch to the destination. Otherwise, the packet goes up along the tree structure and looks for the destination. If the intermediate node has the destination node in its neighbor list, the packet is routed apart from the tree route.
  • the receiving node When a node receives a unicast message, the receiving node should respond to the transmitting node with an ACK message.
  • the detail of packet forwarding process is described in FIG. 21. Referring to the flow chart in FIG. 21, the receiving node receives a packet at block 120.
  • a check is made to determine if the Cluster Head ED matches that of the cluster. If the Cluster Head ED is that of a different cluster, the packet is discarded at block 124. If the Cluster Head ED is that of the present cluster, flow continues to decision block 126.
  • the frame type is checked. If the frame type does not indicate that the packet contains data, the packet is passed to a different process at block 128.
  • decision block 130 a check is made to determine if the Node ED is that of the present node. If the ED is that of another node, flow continues to block 124 and the packet is discarded. If the ED indicates that this is a broadcast message, flow continues to block 132 where the packet is accepted. At decision block 134 the Source Node ED is checked. If the source Node ED is that of the parent node, the packet is forwarded at block 136, otherwise no further action is taken, as indicated by block 138. Returning to decision block 130, if the receiving node ED is that of the receiving node, flow continues to decision block 140 and the Destination Device ED is checked.
  • the packet is accepted at block 142 and an acknowledgement (ACK) message is sent at block 144. If the Destination Device ED does not match the receiving node ED, the RNED field in the packet is updated at block 146, the packet is forwarded at block 148 and an ACK message is sent at block
  • the broadcast message within a cluster is sent by the cluster head and forwarded by all member nodes.
  • the receiving node shouldn't respond to the broadcast message with ACK message.
  • a member node should forward the broadcast message that is sent by its parent to avoid forwarding the same packet more than once.
  • a Designated Device To form a multi-cluster network, a Designated Device is needed in the network.
  • the Designated Device assumes an important role in the network. It has the responsibility to assign a unique cluster ED to each cluster head. This cluster ED, combined with the node ED that the cluster head assigns to each node within a cluster, forms a logical address and is used to route packets. Another role of the Designated Device is to calculate the shortest route from the cluster to Designated Device and inform it to all nodes within the network.
  • Inter Cluster Network Network Formation Process
  • Each node is unique due to the combination of the cluster ED (CED) and the node ED (NED).
  • the NED is assigned by each cluster head (CH) and the Designated Device (DD) assigns a unique CED to each cluster in early stage of multi-cluster network formation.
  • the DD acts as the cluster head of cluster 0 and starts to send HELLO message to the neighborhood. If a CH has received this message, it sends a CONNECTION REQUEST message and joins the cluster 0. After that, the CH requests a CED to the DD.
  • the CH is a border node that has two logical addresses. One is for a member node of the cluster 0 and the other is for a cluster head.
  • the CH gets a new CED, it informs to its member nodes by sending a HELLO message.
  • the corresponding network is shown in FIG. 23.
  • a member node if a member node has received the HELLO message from the DD, it adds CED 0 in its neighbor list and reports to its CH. The reported CH selects the member node as a border node to its parent cluster and sends a
  • NETWORK CONNECTION REQUEST message to the member node to set up a connection with the DD.
  • the border node requests a connection and joins the cluster 0 as its member node. Then it sends a CED REQUEST message to the DD. After the CED RESPONSE message arrival, the border node sends a NETWORK CONNECTION RESPONSE message that contains a new CID to the CH. When the CH gets a new CED, it informs its member nodes by the HELLO message.
  • the corresponding network is shown in FIG. 25.
  • the clusters not bordering cluster 0 use intermediate clusters to get a CED.
  • Two cases can be thought as the same as above.
  • One case, shown in the interaction diagram in FIG. 26 and the network in FIG. 27, is where the CH becomes the border node to its parent cluster.
  • the other case, shown in the interaction diagram of FIG. 28 and the corresponding network in FIG 29, is where the CH names a member node as the border to its parent cluster.
  • the process is triggered by the HELLO message that contains a CED from 1 to 253 instead of the HELLO from the DD.
  • Each member node of the cluster records its parent cluster, child/lower clusters and the border node EDs associated with both the parent and child clusters.
  • the DD stores the whole tree structure of the clusters.
  • the clusters form an initial tree topology in the CED assignment procedure, it may not be the optimal tree structure and the tree structure may change due to the failure of nodes.
  • the clusters use the cluster link-state information to calculate the optimized route and periodically update their topology for the network redundancy. Every cluster reports its link-state information to the DD.
  • the cluster head periodically sends a NETWORK LINK-STATE REPORT message that contains its neighbor cluster CID list to the DD.
  • An exemplary network is shown in FIG. 30 and the corresponding link-state reports are shown in FIG. 31.
  • the DD Based on the NETWORK LINK-STATE REPORT message, the DD periodically calculates the optimized tree route and sends a NETWORK TOPOLOGY UPDATE message to inform up-to-date route from the DD to the clusters.
  • An exemplary network is shown in FIG. 32 and the corresponding network topology updates are shown in FIG. 33.
  • the DD chooses the route with the smallest hop count. If there are several routes with the same hop count, the DD should choose the cluster that has the smallest CED as the parent cluster, or some other functional rule for arbitrating ties.
  • a cluster head receives the NETWORK TOPOLOGY UPDATE message and determines that a different parent cluster is linked to the cluster, it changes the parent cluster as indicated in the message. All nodes within the cluster should memorize its parent cluster, child/lower clusters and the border nodes' NED at this
  • the cluster may have to find an alternative route to the DD. This feature is achieved by using the messages explained above.
  • a problem has occurred in cluster 1.
  • the NETWORK LINK-STATE REPORT messages shown in FIG. 35, from cluster 1 and 3 fail to arrive at the DD.
  • the link-sate report from cluster 3 fails to arrive because it was linked to the DD via the failed cluster.
  • the link-state report from cluster 2 no longer indicates a link to cluster 1.
  • the DD broadcasts a new NETWORK TOPLOGY UPDATE message, shown in FIG. 36, and indicates cluster 3 to switch the parent to cluster 4.
  • a backup Designated Device can be prepared to prevent network down time due to the DD's trouble.
  • a BDD is connected to the DD by wired or wireless network and periodically duplicate the list of cluster JD and network link-state information from the DD.
  • the BDD takes over the DD role as soon as it detects the DD's failure.
  • Other solutions may be possible to realize the BDD.
  • Inter cluster communication is realized by routing.
  • the border nodes act as routers that connect clusters and relay packets between clusters.
  • An exemplary multi- cluster network with border nodes is shown in FIG. 37.
  • Every node knows its parent cluster, child/lower cluster and the border node ED.
  • a node sends a unicast message (a message to a specific node)
  • receiving nodes can decide where they should send/forward the packet.
  • a border node receives a packet, it examines the destination address, then forwards to the next border node in the adjacent cluster or to the destination node within the cluster.
  • Only the DD can broadcast a message by sending it to all nodes within its network.
  • the message is forwarded along the tree route of clusters.
  • the border node should forward the broadcast packet from the parent cluster to the child cluster.
  • Each node is assigned a 16 bit logical address that consists of a cluster ED (CED) and a node ED (N D).
  • CED cluster ED
  • N D node ED
  • the Designated Device assigns a unique 8-bit cluster ED to the cluster.
  • CED 255 means all clusters and is used for broadcast message.
  • the cluster head assigns a unique 8-bit node ED to its member nodes.
  • the cluster head uses NED 0.
  • NED 255 is for broadcast and 254 for temporary use.
  • Frame Type One embodiment of the different types of packets that are used for communication within and between clusters is described below.
  • a 6-bit field is defined for the frame type. The first two bits define the category of the function and the next four bits indicate the detail functions.
  • CH DED denotes the Cluster Head Device ED, which is a part of cluster head MAC address. This field is used to determine whether the transmitting node belongs to the same node cluster.
  • TNED denotes the Transmitting Node ED: the node ED of source/intermediate node that sends the packet.
  • TCED denotes the Transmitting Cluster ED, i.e. the cluster ED of transmitter.
  • the cluster head uses temporary CED 254.
  • CH DID denotes the Cluster Head Device ED which is a part of the cluster head MAC address that the new node wants to join.
  • Dst NED denotes the
  • Destination Node ED i.e. the node ED that the new node requests a connection and Src DED denotes the Source Device ED: a part of the source node MAC.
  • CH DID denotes the Cluster Head Device ID.
  • Src NID denotes the Source Node ED, i.e. the node ED that is requested the connection by the new node.
  • Dst DED is the Destination Device ED, and is a copy of Src DED field of CONNECTION REQUEST message.
  • New NED denotes the New Node ED, which is the new node ED that is assigned to the requester node. When the requested node rejects the request, it puts 254 in this field.
  • FIG. 41 shows the structure of the NODE ED REQUEST message.
  • CH DED denotes the Cluster Head Device ED
  • RNED denotes the Receiving Node ED, i.e. the node ED of destination/intermediate node that should receive the packet.
  • Src NED denotes the Source Node ED, i.e. the node ED that is requesting the connection for the new node.
  • New Node DED denotes the New Node
  • CH DED denotes the Cluster Head Device ED
  • RNED denotes the Receiving Node ED
  • Dst NED denotes the Destination Node ED
  • New Node DED denotes the
  • New Node Device ED is a copy of New Node DED field of the CLUSTER ED REQUEST message.
  • New NED denotes the New Node ED, i.e. the node ED that is assigned to the new node.
  • the cluster head rejects the request, it puts the ED 254 in this field.
  • FIG. 43 shows the structure of the DISCONNECTION REQUEST message.
  • CH DED denotes the Cluster Head Device ED
  • Src NED denotes the Source Node ED (the node ED of requesting node).
  • FIG. 44 shows the structure of the DISCONNECTION RESPONSE message.
  • CH DED denotes the Cluster Head Device ED
  • Dst NED denotes the Destination Node ED.
  • FIG. 45 shows the structure of the LINK-STATE REPORT message.
  • CH DED denotes the Cluster Head Device D
  • RNED denotes the Receiving Node ED
  • Src NED denotes the Source Node ED.
  • Length 1 denotes the number of NED fields
  • Length 2 denotes the number of CED fields.
  • NED #n is the identifier of neighbor node #n.
  • CED #m is the identifier of neighbor cluster #m.
  • FIG. 46 shows the structure of the TOPOLOGY UPDATE message.
  • CH DED denotes the Cluster Head Device ED
  • Length 1 denotes the number of NED fields
  • Length 2 denotes the number of CED fields.
  • NED #n is the identifier of member node #n.
  • Parent NED is the Parent Node ED, that is the parent node ED for the member node #n named in the previous field.
  • CED #m is the identifier for neighbor Cluster #m.
  • Border NED is the Border Node ED: the border node ED for the cluster #m named in the previous field.
  • FIG. 47 shows the structure of the NETWORK CONNECTION REQUEST message.
  • CH DID denotes the Cluster Head Device ED
  • RNED denotes the Receiving Node ED
  • Dst NED denotes the Destination Node ED
  • CED denotes the cluster ED that the border node should set up a connection with.
  • FIG. 48 shows the structure of the NETWORK CONNECTION RESPONSE message.
  • CH DED denotes the Cluster Head Device ED
  • RNED denotes the Receiving Node ED
  • Src NED is the Source Node ED, that is the node ED of the border node.
  • New CED is the New Cluster ED that is assigned to the cluster head by the Designated Device.
  • FIG. 49 shows the structure of the CLUSTER JD REQUEST message.
  • CH DID denotes the Cluster Head Device ED
  • RNED is the Receiving Node ED
  • Src CED is the Source Cluster ED, that is the cluster ED of the border node.
  • Src NED is the Source Node ED.
  • FIG. 50 shows the structure of the CLUSTER ED RESPONSE message.
  • CH DED denotes the Cluster Head Device ED.
  • RNED denotes the Receiving Node ED, that is the node ED of destination/intermediate node that should receive the packet.
  • Dst CED is the Destination Cluster ED, i.e. the cluster ED of the border node that requested a new CED.
  • Dst NED is the Destination Node ED, i.e. the node ED of the border node that requested a new CED.
  • New CED is the New Cluster ED that is assigned by the Designated Device.
  • FIG. 51 shows the structure of the NETWORK DISCONNECTION REQUEST message.
  • CH DED denotes the Cluster Head Device
  • JD. RNED denotes the Receiving Node ED and Dst NED denotes the Destination Node ED.
  • CED is the cluster ED that the border node should disconnect.
  • FIG. 52 shows the structure of the NETWORK DISCONNECTION RESPONSE message.
  • CH DED denotes the Cluster Head Device JD
  • RNED denotes the Receiving Node ED
  • Src NED denotes the Source Node
  • ED and CED denotes the cluster ED that the border node has disconnected with.
  • FIG. 53 shows the structure of the NETWORK LINK-STATE REPORT message.
  • CH DED denotes the Cluster Head Device ED
  • RNED denotes the Receiving Node ID
  • Src NED denotes the Source Node ED.
  • Length 1 denotes the number of fields for CEDs and CED #n denotes the identifier of the neighbor cluster.
  • FIG. 54 shows the structure of the NETWORK TOPOLOGY UPDATE message.
  • CH DID denotes the Cluster Head Device ID, Length
  • FIG. 55 shows the structure of the RTS message. Referring to FIG. 55, CH
  • DED denotes the Cluster Head Device ED.
  • the value of the Duration field is the amount of time the sending node needs to transmit the data frame, one CTS frame, one ACK frame and three inter-frame space intervals.
  • RNED denotes the Receiving Node JD and TNED denotes the Transmitting Node ED.
  • FIG. 56 shows the structure of the CTS message. Referring to FIG. 56, CH
  • DED denotes the Cluster Head Device ED. Duration is the duration of previous RTS frame minus the time required to transmit the CTS frame and an inter-frame space interval.
  • RNED denotes the Receiving Node ED and TNED denotes the Transmitting Node ED.
  • FIG. 57 shows the structure of the ACK message for Intra Cluster
  • CH DED denotes the Cluster Head Device ED
  • RNED denotes Receiving Node ED, that is the node ED of destination/intermediate node that should receive the packet.
  • Dst NED denotes the Destination Node ED
  • Src NED denotes the Source Node ED.
  • FIG. 58 shows the structure of the ACK message for Inter Cluster Communication.
  • CH DED denotes Cluster Head Device ED
  • RNED denotes the Receiving Node ED
  • Dst CED denotes the Destination Cluster
  • Src CED denotes Source Cluster ED
  • Src NED denotes the Source Node ED. Data Frames.
  • FIG. 59 shows the structure of an Intra Cluster Data Frame.
  • CH DED denotes the Cluster Head Device ED
  • RNED denotes the Receiving Node ED (the node ED of destination/intermediate node that should receive the packet)
  • Dst NED denotes the
  • Src NED is the Source Node ED and Payload denotes the Data itself.
  • the Intra Cluster Data Frame with ACK has the same frame structure as Intra Cluster Data Frame except the Frame Type field.
  • FIG. 60 shows an Inter Cluster Data Frame.
  • CH DED denotes the Cluster Head Device JD
  • RNED denotes the Receiving Node ED (the node ED of destination/intermediate node that should receive the packet)
  • Dst CED denotes the Destination Cluster ED
  • Dst NED denotes the node ED of the destination node.
  • Src CED denotes the node ED of the source node
  • Src NED denotes the Source Node ED
  • Payload denotes the Data itself.
  • the Inter Cluster Data Frame with ACK has the same frame structure as Inter Cluster Data Frame except the Frame Type field.
  • the nodes themselves may comprise a variety of hardware components including as special purpose hardware and/or dedicated processors.
  • general purpose computers, microprocessor based computers, digital signal processors, microcontrollers, dedicated processors, custom circuits, ASICS and/or dedicated hard wired logic may be used to construct alternative equivalent embodiments of the present invention.
  • Each node is directed by a computer program.
  • program steps and associated data used to implement the embodiments described above can be implemented using disc storage as well as other forms of storage, such as, for example, Read Only Memory (ROM) devices, Random Access Memory (RAM) devices, optical storage elements, magnetic storage elements, magneto-optical storage elements, flash memory, core memory and/or other equivalent storage technologies without departing from the present invention.
  • ROM Read Only Memory
  • RAM Random Access Memory
  • optical storage elements magnetic storage elements
  • magneto-optical storage elements flash memory
  • core memory core memory and/or other equivalent storage technologies

Abstract

The method of self-organization includes processes for cluster (Fig. 2) formation, network maintenance, intra-cluster communication (Fig. 1). In the cluster formation process, each node discovers if any neighboring node (9, 8, 11) is a cluster head or if any node is already a member of a cluster, and if a cluster head or a networked node is discovered, each node establishes a communication link with the cluster head or the networked node. If no cluster head or networked node is discovered, the node itself becomes a cluster head. The network is maintained by each node periodically broadcasting a HELLO message to neighboring nodes (Fig. 6), receiving responses the message and updating a neighbour list in accordance with responses to the HELLO message. The resulting network has one or more clusters of nodes, each with a cluster head and a number of member nodes, each assigned a node identifier by the cluster head. Border nodes are members of at least two clusters acting as routers.

Description

PROTOCOL AND STRUCTURE FOR SELF- ORGANIZING NETWORK
PRIORITY DATA This application claims the benefit under Title 35, United States Code Section
119(e), to United States provisional application serial number 60/285,165 filed April 20, 2001.
CROSS REFERENCE TO RELATED APPLICATIONS
This application is related to pending U.S. patent application number 09/803322 filed March 9, 2001 titled "A Multiple Access Protocol and Structure for
Communication Devices in an Asynchronous Network", and to pending U.S. patent application number 10/022935 filed December 18, 2001 titled "A Multiple Access Protocol and Structure for Communication Devices in an Asynchronous Network", which are hereby incorporated herein by reference.
FIELD OF THE INVENTION
This invention relates generally to the field of communication networks. More particularly, the invention relates to a protocol and structure for a self-organizing network.
BACKGROUND OF THE INVENTION
There are many applications for wireless communication networks, such as wireless sensors, industrial control and monitoring, intelligent agriculture, asset and inventory tracking, and security. The manual configuration of such networks can be time consuming and expensive. There is therefore a need for a communication protocol that produces an ad hoc, self-organizing network; that is, a network with a random topology in which the network organization and maintenance occur without human intervention.
SUMMARY OF THE INVENTION
The present invention relates generally to self-organizing communication networks and in particular to structures and protocols for the operation of cluster tree self-organizing networks. Objects and features of the invention will become apparent to those of ordinary skill in the art upon consideration of the following detailed description of the invention.
The Cluster Tree Protocol of the present invention is a protocol of the logical link and network layers for a wireless ad-hoc network. In one embodiment, the protocol uses link-state packets to form either a single cluster network, or a potentially larger cluster tree network. The network is basically self-organized, and supports network redundancy to attain a degree of fault resistance and self-repair.
Nodes select a cluster head and form a cluster according to the self-organized manner. In the cluster formation process the cluster head assigns a unique node ID to each member node.
Self-developed clusters connect to each other using a Designated Device. The
Designated Device is a special node that has high computing ability and large memory space; in most applications it is also the gateway between the network and the Internet. The Designated Device assigns a unique cluster ED to each cluster.
BRIEF DESCRIPTION OF THE DRAWINGS
The novel features believed characteristic of the invention are set forth in the appended claims. The invention itself, however, as well as the preferred mode of use, and further objects and advantages thereof, will best be understood by reference to the following detailed description of an illustrative embodiment when read in conjunction with the accompanying drawing(s), wherein: FIG. 1 is a diagrammatic representation of a cluster head selection process of the invention.
FIG. 2 is a diagrammatic representation of a link setup process between a cluster head and a member node in accordance with the invention.
FIG. 3 is a diagrammatic representation of a single-hop cluster structure in accordance with the invention.
FIG. 4 is a diagrammatic representation of a multi-hop cluster setup procedure in accordance with the invention.
FIG. 5 is a diagrammatic representation of a multi-hop cluster structure in accordance with the invention. FIG. 6 is a diagrammatic representation of a process for updating a neighbor list in accordance with the invention.
FIG. 7 is a diagrammatic representation an exemplary network. FIG. 8 is a neighbor list of a node in cluster border of the network shown in
FIG. 7.
FIG. 9 is a diagrammatic representation an exemplary network. FIG. 10 is a link-state report corresponding to the network in FIG. 9. FIG. 11 is a diagrammatic representation an exemplary network.
FIG. 12 is a topology update table corresponding to the network in FIG. 11. FIG. 13 is a diagrammatic representation of an exemplary network with a failed node.
FIG. 14 is a modified link-state report table for the network shown in FIG. 13.
FIG. 15 is a diagrammatic representation of the network in FIG. 13 following a first stage of link recovery.
FIG. 16 is a topology update table for the network shown in FIG. 15. FIG. 17 is a diagrammatic representation of the network in FIG. 13 following a second stage of link recovery.
FIG. 18 is a link-state report table for the network shown in FIG. 17. FIG. 19 is a topology update table for the network shown in FIG. 17. FIG. 20 is a diagrammatic representation of multiple access control using RTS/CTS messages. FIG. 21 is a flow diagram showing data packet forwarding flow.
FIG. 22 is an interaction diagram of a first example of cluster ID assignment. FIG. 23 is a diagrammatic representation of a network corresponding to FIG. 22. FIG. 24 is an interaction diagram of a second example of cluster ID assignment.
FIG. 25 is a diagrammatic representation of a network corresponding to FIG. 24. FIG. 26 is an interaction diagram of a third example of cluster ID assignment.
FIG. 27 is a diagrammatic representation of a network corresponding to FIG. 26.
FIG. 28 is an interaction diagram of a fourth example of cluster ID assignment. FIG. 29 is a diagrammatic representation of a network corresponding to FIG.
28.
FIG. 30 is an interaction diagram of an exemplary network.
FIG. 31 is a network link-state report corresponding to the network shown in
FIG. 30. FIG. 32 is a diagrammatic representation of an exemplary network.
FIG. 33 is a network topology update table corresponding to the network shown in FIG. 32.
FIG. 34 is a diagrammatic representation of an exemplary network illustrating network redundancy. FIG. 35 is a modified network link-state report corresponding to the network shown in FIG. 34.
FIG. 36 is a modified network topology update table corresponding to the network shown in FIG. 34. FIG. 37 is a diagrammatic representation of an exemplary multi-cluster network illustrating border nodes.
FIG. 38 shows the structure of an exemplary HELLO message.
FIG. 39 shows the structure of an exemplary CONNECTION REQUEST message.
FIG. 40 shows the structure of an exemplary CONNECTION RESPONSE
message.
FIG. 41 shows the structure of an exemplary NODE ED REQUEST message.
FIG. 42 shows the structure of an exemplary NODE ED RESPONSE message. FIG. 43 shows the structure of an exemplary DISCONNECTION REQUEST message.
FIG. 44 shows the structure of an exemplary DISCONNECTION RESPONSE message.
FIG. 45 shows the structure of an exemplary LENK-STATE REPORT message.
FIG. 46 shows the structure of an exemplary TOPOLOGY UPDATE
FIG. 47 shows the structure of an exemplary NETWORK CONNECTION REQUEST message.
FIG. 48 shows the structure of an exemplary NETWORK CONNECTION RESPONSE message.
FIG. 49 shows the structure of an exemplary CLUSTER ED REQUEST message. FIG. 50 shows the structure of an exemplary CLUSTER ED RESPONSE message.
FIG. 51 shows the structure of an exemplary NETWORK DISCONNECTION REQUEST message. FIG. 52 shows the structure of an exemplary NETWORK DISCONNECTION
RESPONSE message.
FIG. 53 shows the structure of an exemplary NETWORK LINK-STATE REPORT message.
FIG. 54 shows the structure of an exemplary NETWORK TOPOLOGY UPDATE message.
FIG. 55 shows the structure of an exemplary REQUEST TO SEND (RTS) message.
FIG. 56 shows the structure of an exemplary CLEAR TO SEND (CTS) message. FIG. 57 shows the structure of an exemplary ACKNOWLEDGEMENT
(ACK) for Intra Cluster Communication.
FIG. 58 shows the structure of an exemplary ACKNOWLEDGEMENT (ACK) for Inter Cluster Communication.
FIG. 59 shows the structure of an exemplary Intra Cluster DATA frame. FIG. 60 shows the structure of an exemplary Inter Cluster DATA frame. DETAILED DESCRIPTION OF THE INVENTION
While this invention is susceptible of embodiment in many different forms, there is shown in the drawings and will herein be described in detail one or more specific embodiments, with the understanding that the present disclosure is to be considered as exemplary of the principles of the invention and not intended to limit the invention to the specific embodiments shown and described. In the description below, like reference numerals are used to describe the same, similar or corresponding parts in the several Views of the drawings.
The Cluster Tree Protocol of the present invention is a protocol of the logical link and network layers for a wireless ad-hoc network. In one embodiment, the protocol uses link-state packets to form either a single cluster network, or a potentially larger cluster tree network. The network is basically self-organized, and supports network redundancy to attain a degree of fault resistance and self -repair.
Nodes select a cluster head and form a cluster according to the self-organized manner that will be described below. In the cluster formation process the cluster head assigns a unique node ED to each member node.
Self-developed clusters connect to each other using the Designated Device. The Designated Device is a special node that has high computing ability and large memory space; in some applications it is also the gateway between the network and the Internet. The Designated Device assigns a unique cluster ED to each cluster.
In the preferred embodiment, a network is made of one or more clusters, each cluster having a cluster head and a number of member nodes. The formation and operation of a single cluster is described first. Multi-cluster networks are described later. Each node is directed by a computer program stored in a memory, an application specific integrated circuit, a digital signal processor or an equivalent device. Each node has an input for receiving data and an output for transmitting data. Single Cluster Network: Cluster Formation Process The Cluster formation process begins with the selection of the cluster head, the first node in the cluster. After a cluster head is selected, the cluster head expands links with other member nodes to form a cluster.
One example of selecting a cluster head is illustrated in FIG. 1. After a node turns on, it operates as a regular network node, and listens and searches for a HELLO message from other nodes. (A HELLO message is a simple broadcast message identifying the transmitting node.) If the node does not receive any HELLO messages for a first period of time, e.g., 1-30 seconds, it then operates as a cluster head and sends out a HELLO message to its neighbors. The new cluster head waits for responses from neighboring nodes for a second period of time, e.g., 2-60 seconds. If no connection requests are received, the node turns back to operation as a regular network node and listens again.
Other methods to select a cluster head are possible. The cluster head can be selected based on stored/calculated parameters of each node, like transmission range, power capacity, computing ability or location information. After a node is selected as a cluster head (CH), it broadcasts a periodic HELLO message that contains a part of the cluster head MAC (Multiple Access Control) address and a node ED (0 for example) that indicates the cluster head. This is shown in FIG. 2. Referring now to FIG. 2, the nodes that receive this HELLO message send a CONNECTION REQUEST message to the cluster head. When the cluster head receives the CONNECTION REQUEST, it responds to the node with a CONNECTION RESPONSE message that contains a node ED for the node. The node ED should preferably be unique within a cluster and the cluster head has the responsibility to assign and manage unique node EDs to its member nodes. The node that is assigned a node ED replies with an ACK (acknowledge) message to the cluster head. After every message exchange is finished, both nodes set each other as parent or child. Each node maintains a neighbor list, which includes a list of parent and child nodes. Specifically, the cluster head denotes the newly added node as a child in its neighbor list and the new node denotes the cluster head as a parent. The link between the cluster head and the member node is established at this moment.
If all nodes are located in the range of the cluster head, the topology of connection becomes a star, as shown in FIG. 3, and every member node is connected to the cluster head with one hop. In the preferred embodiment, the maximum number of nodes in a cluster is 254 including the cluster head. If node addresses with N-bits are used the maximum number of nodes is 2N-2. The administrator or the manufacturer may limit the node feature to supporting only single hop cluster.
A cluster can expand into a multi-hop structure when each node supports multiple connections. Although network delay increases, the coverage within one cluster can increase. The multi hop cluster setup procedure is described in FIG. 4.
After node B has established a link with the cluster head, it starts to relay HELLO messages from the cluster head. When node C gets the message from node B, it sends a CONNECTION REQUEST message to node B. Node B requests a new node ED to the cluster head for node C. When node B receives a new node ED from the cluster head, it sends a CONNECTION RESPONSE message to node C. Then node C receives it and answers with an ACK message. After this message exchange, node C sets node B as its parent, node B sets node C as its child, and the cluster head sets node C as node B's child. Node C then starts to relay HELLO messages to announce itself to its neighborhood.
When a node receives several HELLO messages from different nodes, there are many different ways to select the Hello message to which to respond. In a preferred embodiment, the node responds to the earliest HELLO message. In another embodiment, it responds to the strongest HELLO message. The path to the cluster head might not be ideal at this time. The route to the cluster head will optimize in a later process.
This expansion process can continue until the cluster head runs out of node EDs. The maximum hop count may also be limited to reduce maximum network delay.
When the cluster head has run out of node EDs or the cluster has reached some other defined limit, the cluster head should reject connection requests from new nodes. To reject the connection request, the temporary NED (NED 254 for example) is used in the destination NED field of the CONNECTION RESPONSE message or the new NED field of the NODE ED RESPONSE message.
When a requester node receives a NODE ED RESPONSE message with NID 254, it sends a CONNECTION RESPONSE message with NID 254 to the new node. If a new node has received a CONNECTION RESPONSE with NID 254, it stores the cluster ED and stop sending a CONNECTION REQUEST message to the node belonging to the same cluster for a while.
An example of a multi-hop cluster structure is shown in FIG. 5. Single Cluster Network: Network Maintenance
The cluster head periodically broadcasts HELLO messages to its member nodes. When these member nodes receive the HELLO message from the cluster head, they also send HELLO messages to announce themselves to their neighbors. Every node records their neighbor nodes in their neighbor list. The entry of the neighbor list is updated by the periodic HELLO message. If a node entry doesn't update until certain timeout limit, it should be eliminated. This process is shown in FIG. 6.
The member nodes can talk directly with the neighbor nodes. If a node wants to communicate with a node outside of its range, it asks the cluster head or the parent node to relay the message to the destination.
A node may receive a HELLO message from a node that belongs to different cluster. In that case, the node adds the cluster ED (CED) of the transmitting node in the neighbor list. An exemplary network is shown in FIG. 7. The corresponding neighbor list for node 2 is shown in FIG. 8. Every node has to report its link state to the cluster head. A member node periodically sends a LINK-STATE REPORT message that contain its neighbors node ED list to the cluster head. The frequency of Link-State Report message will be determined by application requirements and stability. FIG. 9 shows an exemplary network. A table of the link-state reports sent by each node is shown in FIG. 10.
Based on the LINK-STATE REPORT message the cluster head periodically calculates the shortest path between itself and member nodes and informs it to the members by TOPOLOGY UPDATE message. An example of a TOPOLOGY
UPDATE report for the network shown in FIG. 11 is shown in FIG. 12.
The cluster head should choose the route with the smallest hop count. If there are several routes with the same hop count, the cluster head should choose the route that has the smallest node ED as the parent node or some similar arbitration rule. If a member node receives the TOPOLOGY UPDATE message that the different parent node is linked to the node, it changes the parent node as indicated in the message. The member node also records its child nodes and the nodes below it in the tree at this time. The nodes within a cluster basically communicate with other node through the parent node except the case where they communicate with their neighbor nodes directly. The cycle of the Topology Update depends on the Link-
State Report cycle.
If a member node has trouble and becomes unable to communicate, the tree route of the cluster would be reconfigured. In the cluster show in FIG. 13, the node 2 has trouble and stops communication. A modified table of corresponding link-state reports is shown in FIG. 14. Since the nodes 2, 7, 8 and 10 cannot send the LINK-
STATE REPORT, the cluster head calculates a new route from other link-state information. By the first TOPOLOGY UPDATE message, the node 7 establishes a new connection with the node 3, as shown in FIG. 15. The corresponding topology update report is shown in FIG. 16. In the next cycle of TOPOLOGY REPORT and UPDATE, the nodes 8 and 10 are instructed to connect to node 7. The resulting network is shown in FIG. 17. The corresponding link-state report is shown in FIG. 18 and the corresponding topology update is shown in FIG. 19. When the cluster head has trouble, the distribution of HELLO messages is stopped and all member nodes know that they have lost the cluster head. The member nodes lose their node ED and connections with the parent/children nodes. The cluster is then reconfigured in the same way as the cluster formation process. Single Cluster Network: Intra Cluster Communication. There are many options in Multiple Access Control. One is CSMA/CA
(Carrier Sense Multiple Access/ Collision Avoidance); another is pure ALOHA (where messages are sent at any time and then resent if the message is not received). In the CSMA/CA option, RTS (Request To Send)/CTS (Clear To Send) messages are used. Referring now to FIG. 20, when a node wants to send a packet to other node, it sends RTS at first and then waits for CTS. After receiving RTS, the receiving node sends a CTS frame to acknowledge the right for the sending node to send data frame. This procedure reduces the chance of collision by hidden nodes.
A node receiving an error-free frame can send an ACK frame to the sending node to acknowledge the successful reception of the frame. When a node wants to send a packet to other node, i.e. it wants to unicast a message, it sets its node ED in the source NED field of the packet and its destination node ED in destination NED field. Ii a node isn't sending to one of its neighbors, and if the destination node is below the source in the tree, the source node sets its child node ID in the receiving NED field and asks its child node to forward to the destination. If the source isn't sending to one of its neighbors, and if the destination node isn't below the source branch, the source sets its parent node ED in the receiving NED field and sends the packet to its parent. Each intermediate node should relay the packet toward the destination node as it updates receiving and transmitting NED fields.
The packet is routed along the tree topology except for the last one hop. If the destination node is below the sender node in the tree structure, the packet is forwarded along the branch to the destination. Otherwise, the packet goes up along the tree structure and looks for the destination. If the intermediate node has the destination node in its neighbor list, the packet is routed apart from the tree route.
When a node receives a unicast message, the receiving node should respond to the transmitting node with an ACK message. The detail of packet forwarding process is described in FIG. 21. Referring to the flow chart in FIG. 21, the receiving node receives a packet at block 120. At decision block 122 a check is made to determine if the Cluster Head ED matches that of the cluster. If the Cluster Head ED is that of a different cluster, the packet is discarded at block 124. If the Cluster Head ED is that of the present cluster, flow continues to decision block 126. At decision block 126, the frame type is checked. If the frame type does not indicate that the packet contains data, the packet is passed to a different process at block 128. If the frame type indicates that the packet contains data, flow continues to decision block 130, where a check is made to determine if the Node ED is that of the present node. If the ED is that of another node, flow continues to block 124 and the packet is discarded. If the ED indicates that this is a broadcast message, flow continues to block 132 where the packet is accepted. At decision block 134 the Source Node ED is checked. If the source Node ED is that of the parent node, the packet is forwarded at block 136, otherwise no further action is taken, as indicated by block 138. Returning to decision block 130, if the receiving node ED is that of the receiving node, flow continues to decision block 140 and the Destination Device ED is checked. If the Destination Device JD matches the receiving node ED, the packet is accepted at block 142 and an acknowledgement (ACK) message is sent at block 144. If the Destination Device ED does not match the receiving node ED, the RNED field in the packet is updated at block 146, the packet is forwarded at block 148 and an ACK message is sent at block
150.
The broadcast message within a cluster is sent by the cluster head and forwarded by all member nodes. The receiving node shouldn't respond to the broadcast message with ACK message. A member node should forward the broadcast message that is sent by its parent to avoid forwarding the same packet more than once.
Large packets may be sent in several parts, in accordance with a packet fragmentation rule. Inter Cluster Network
The preferred embodiment of multi-cluster network formation and the subsequent communication between clusters is now described.
To form a multi-cluster network, a Designated Device is needed in the network. The Designated Device assumes an important role in the network. It has the responsibility to assign a unique cluster ED to each cluster head. This cluster ED, combined with the node ED that the cluster head assigns to each node within a cluster, forms a logical address and is used to route packets. Another role of the Designated Device is to calculate the shortest route from the cluster to Designated Device and inform it to all nodes within the network. Inter Cluster Network: Network Formation Process
Each node is unique due to the combination of the cluster ED (CED) and the node ED (NED). The NED is assigned by each cluster head (CH) and the Designated Device (DD) assigns a unique CED to each cluster in early stage of multi-cluster network formation. Referring now to the interaction diagram shown in FIG. 22, when the DD joins the network, it acts as the cluster head of cluster 0 and starts to send HELLO message to the neighborhood. If a CH has received this message, it sends a CONNECTION REQUEST message and joins the cluster 0. After that, the CH requests a CED to the DD. In this case, the CH is a border node that has two logical addresses. One is for a member node of the cluster 0 and the other is for a cluster head. When the CH gets a new CED, it informs to its member nodes by sending a HELLO message. The corresponding network is shown in FIG. 23.
Referring to FIG. 24, if a member node has received the HELLO message from the DD, it adds CED 0 in its neighbor list and reports to its CH. The reported CH selects the member node as a border node to its parent cluster and sends a
NETWORK CONNECTION REQUEST message to the member node to set up a connection with the DD. The border node requests a connection and joins the cluster 0 as its member node. Then it sends a CED REQUEST message to the DD. After the CED RESPONSE message arrival, the border node sends a NETWORK CONNECTION RESPONSE message that contains a new CID to the CH. When the CH gets a new CED, it informs its member nodes by the HELLO message. The corresponding network is shown in FIG. 25.
The clusters not bordering cluster 0 use intermediate clusters to get a CED. Two cases can be thought as the same as above. One case, shown in the interaction diagram in FIG. 26 and the network in FIG. 27, is where the CH becomes the border node to its parent cluster. The other case, shown in the interaction diagram of FIG. 28 and the corresponding network in FIG 29, is where the CH names a member node as the border to its parent cluster. In both cases, the process is triggered by the HELLO message that contains a CED from 1 to 253 instead of the HELLO from the DD.
Each member node of the cluster records its parent cluster, child/lower clusters and the border node EDs associated with both the parent and child clusters. The DD stores the whole tree structure of the clusters. Inter Cluster Network: Network Maintenance
Although the clusters form an initial tree topology in the CED assignment procedure, it may not be the optimal tree structure and the tree structure may change due to the failure of nodes. The clusters use the cluster link-state information to calculate the optimized route and periodically update their topology for the network redundancy. Every cluster reports its link-state information to the DD. The cluster head periodically sends a NETWORK LINK-STATE REPORT message that contains its neighbor cluster CID list to the DD. An exemplary network is shown in FIG. 30 and the corresponding link-state reports are shown in FIG. 31. Based on the NETWORK LINK-STATE REPORT message, the DD periodically calculates the optimized tree route and sends a NETWORK TOPOLOGY UPDATE message to inform up-to-date route from the DD to the clusters. An exemplary network is shown in FIG. 32 and the corresponding network topology updates are shown in FIG. 33. The DD chooses the route with the smallest hop count. If there are several routes with the same hop count, the DD should choose the cluster that has the smallest CED as the parent cluster, or some other functional rule for arbitrating ties.
If a cluster head receives the NETWORK TOPOLOGY UPDATE message and determines that a different parent cluster is linked to the cluster, it changes the parent cluster as indicated in the message. All nodes within the cluster should memorize its parent cluster, child/lower clusters and the border nodes' NED at this
time.
When a failure has occurred in the network, the cluster may have to find an alternative route to the DD. This feature is achieved by using the messages explained above.
In the example network shown in FIG. 34, a problem has occurred in cluster 1. The NETWORK LINK-STATE REPORT messages, shown in FIG. 35, from cluster 1 and 3 fail to arrive at the DD. The link-sate report from cluster 3 fails to arrive because it was linked to the DD via the failed cluster. The link-state report from cluster 2 no longer indicates a link to cluster 1. The DD broadcasts a new NETWORK TOPLOGY UPDATE message, shown in FIG. 36, and indicates cluster 3 to switch the parent to cluster 4. A backup Designated Device (BDD) can be prepared to prevent network down time due to the DD's trouble. One example is that a BDD is connected to the DD by wired or wireless network and periodically duplicate the list of cluster JD and network link-state information from the DD. The BDD takes over the DD role as soon as it detects the DD's failure. Other solutions may be possible to realize the BDD. Inter Cluster Communication
Inter cluster communication is realized by routing. The border nodes act as routers that connect clusters and relay packets between clusters. An exemplary multi- cluster network with border nodes is shown in FIG. 37.
Every node knows its parent cluster, child/lower cluster and the border node ED. When a node sends a unicast message (a message to a specific node), receiving nodes can decide where they should send/forward the packet. When a border node receives a packet, it examines the destination address, then forwards to the next border node in the adjacent cluster or to the destination node within the cluster.
Only the DD can broadcast a message by sending it to all nodes within its network. The message is forwarded along the tree route of clusters. The border node should forward the broadcast packet from the parent cluster to the child cluster.
An exemplary implementation of the network of the present invention is described in more detail below Address Scheme
An exemplary address scheme is described below.
Each node is assigned a 16 bit logical address that consists of a cluster ED (CED) and a node ED (N D). Cluster ID
The Designated Device assigns a unique 8-bit cluster ED to the cluster. CED 255 means all clusters and is used for broadcast message.
Figure imgf000023_0001
Node ID The cluster head assigns a unique 8-bit node ED to its member nodes. The cluster head uses NED 0. NED 255 is for broadcast and 254 for temporary use.
Table 2 Node ID
Figure imgf000023_0002
Frame Structure
One embodiment of the different types of packets that are used for communication within and between clusters is described below. Frame Type
A 6-bit field is defined for the frame type. The first two bits define the category of the function and the next four bits indicate the detail functions.
Table 3 Frame Type
Figure imgf000024_0001
Figure imgf000025_0001
Management Frames
Intra Cluster Management Frames
The structure of the HELLO message is shown in FIG. 38. Referring to FIG. 38, CH DED denotes the Cluster Head Device ED, which is a part of cluster head MAC address. This field is used to determine whether the transmitting node belongs to the same node cluster. TNED denotes the Transmitting Node ED: the node ED of source/intermediate node that sends the packet. TCED denotes the Transmitting Cluster ED, i.e. the cluster ED of transmitter. Before assignment of CED, the cluster head uses temporary CED 254.
The structure of the CONNECTION REQUEST message is shown in FIG. 39.
Referring to FIG. 39, CH DID denotes the Cluster Head Device ED which is a part of the cluster head MAC address that the new node wants to join. Dst NED denotes the
Destination Node ED, i.e. the node ED that the new node requests a connection and Src DED denotes the Source Device ED: a part of the source node MAC.
The structure of the CONNECTION RESPONSE message is shown in FIG.
40. Referring to FIG. 40, CH DID denotes the Cluster Head Device ID. Src NID denotes the Source Node ED, i.e. the node ED that is requested the connection by the new node. Dst DED is the Destination Device ED, and is a copy of Src DED field of CONNECTION REQUEST message. New NED denotes the New Node ED, which is the new node ED that is assigned to the requester node. When the requested node rejects the request, it puts 254 in this field.
FIG. 41 shows the structure of the NODE ED REQUEST message. Referring to FIG. 41, CH DED denotes the Cluster Head Device ED and RNED denotes the Receiving Node ED, i.e. the node ED of destination/intermediate node that should receive the packet. Src NED denotes the Source Node ED, i.e. the node ED that is requesting the connection for the new node. New Node DED denotes the New Node
Device ED. This is a copy of Src DED field of the CONNECTION REQUEST message
The structure of the NODE ED RESPONSE is shown in FIG. 42. Referring to FIG. 42, CH DED denotes the Cluster Head Device ED, RNED denotes the Receiving Node ED, Dst NED denotes the Destination Node ED and New Node DED denotes the
New Node Device ED. The New Node DED is a copy of New Node DED field of the CLUSTER ED REQUEST message. New NED denotes the New Node ED, i.e. the node ED that is assigned to the new node. When the cluster head rejects the request, it puts the ED 254 in this field. FIG. 43 shows the structure of the DISCONNECTION REQUEST message.
Referring to FIG. 43, CH DED denotes the Cluster Head Device ED and Src NED denotes the Source Node ED (the node ED of requesting node). FIG. 44 shows the structure of the DISCONNECTION RESPONSE message. Referring to FIG. 44, CH DED denotes the Cluster Head Device ED and Dst NED denotes the Destination Node ED.
FIG. 45 shows the structure of the LINK-STATE REPORT message. Referring to FIG. 45, CH DED denotes the Cluster Head Device D, RNED denotes the Receiving Node ED, and Src NED denotes the Source Node ED. Length 1 denotes the number of NED fields and Length 2 denotes the number of CED fields. NED #n is the identifier of neighbor node #n. CED #m is the identifier of neighbor cluster #m.
FIG. 46 shows the structure of the TOPOLOGY UPDATE message. Referring to FIG. 46, CH DED denotes the Cluster Head Device ED, Length 1 denotes the number of NED fields and Length 2 denotes the number of CED fields. NED #n is the identifier of member node #n. Parent NED is the Parent Node ED, that is the parent node ED for the member node #n named in the previous field. CED #m is the identifier for neighbor Cluster #m. Border NED is the Border Node ED: the border node ED for the cluster #m named in the previous field.
Inter Cluster Management Frames
FIG. 47 shows the structure of the NETWORK CONNECTION REQUEST message. Referring to FIG. 47, CH DID denotes the Cluster Head Device ED, RNED denotes the Receiving Node ED and Dst NED denotes the Destination Node ED. CED denotes the cluster ED that the border node should set up a connection with.
FIG. 48 shows the structure of the NETWORK CONNECTION RESPONSE message. Referring to FIG. 48, CH DED denotes the Cluster Head Device ED, RNED denotes the Receiving Node ED and Src NED is the Source Node ED, that is the node ED of the border node. New CED is the New Cluster ED that is assigned to the cluster head by the Designated Device.
FIG. 49 shows the structure of the CLUSTER JD REQUEST message. Referring to FIG. 49, CH DID denotes the Cluster Head Device ED, RNED is the Receiving Node ED and Src CED is the Source Cluster ED, that is the cluster ED of the border node. Src NED is the Source Node ED.
FIG. 50 shows the structure of the CLUSTER ED RESPONSE message. Referring to FIG. 50, CH DED denotes the Cluster Head Device ED. RNED denotes the Receiving Node ED, that is the node ED of destination/intermediate node that should receive the packet. Dst CED is the Destination Cluster ED, i.e. the cluster ED of the border node that requested a new CED. Dst NED is the Destination Node ED, i.e. the node ED of the border node that requested a new CED. New CED is the New Cluster ED that is assigned by the Designated Device.
FIG. 51 shows the structure of the NETWORK DISCONNECTION REQUEST message. Referring to FIG. 51, CH DED denotes the Cluster Head Device
JD. RNED denotes the Receiving Node ED and Dst NED denotes the Destination Node ED. CED is the cluster ED that the border node should disconnect.
FIG. 52 shows the structure of the NETWORK DISCONNECTION RESPONSE message. Referring to FIG. 52, CH DED denotes the Cluster Head Device JD, RNED denotes the Receiving Node ED, Src NED denotes the Source Node
ED and CED denotes the cluster ED that the border node has disconnected with.
FIG. 53 shows the structure of the NETWORK LINK-STATE REPORT message. Referring to FIG. 53, CH DED denotes the Cluster Head Device ED, RNED denotes the Receiving Node ID and Src NED denotes the Source Node ED. Length 1 denotes the number of fields for CEDs and CED #n denotes the identifier of the neighbor cluster.
FIG. 54 shows the structure of the NETWORK TOPOLOGY UPDATE message. Referring to FIG. 54, CH DID denotes the Cluster Head Device ID, Length
1 denotes the number of fields for CEDs and their Parent CEDs. CED #n denotes the identifier of the cluster ED that exists in the network. Parent CED is the Parent Cluster ED for the cluster #n named in previous field. Control Frames FIG. 55 shows the structure of the RTS message. Referring to FIG. 55, CH
DED denotes the Cluster Head Device ED. The value of the Duration field is the amount of time the sending node needs to transmit the data frame, one CTS frame, one ACK frame and three inter-frame space intervals. RNED denotes the Receiving Node JD and TNED denotes the Transmitting Node ED. FIG. 56 shows the structure of the CTS message. Referring to FIG. 56, CH
DED denotes the Cluster Head Device ED. Duration is the duration of previous RTS frame minus the time required to transmit the CTS frame and an inter-frame space interval. RNED denotes the Receiving Node ED and TNED denotes the Transmitting Node ED. FIG. 57 shows the structure of the ACK message for Intra Cluster
Communication. Referring to FIG. 57, CH DED denotes the Cluster Head Device ED and RNED denotes Receiving Node ED, that is the node ED of destination/intermediate node that should receive the packet. Dst NED denotes the Destination Node ED and Src NED denotes the Source Node ED.
FIG. 58 shows the structure of the ACK message for Inter Cluster Communication. Referring to FIG. 58, CH DED denotes Cluster Head Device ED, RNED denotes the Receiving Node ED, Dst CED denotes the Destination Cluster
ED. and Dst NED denotes the Destination Node ED. Src CED denotes Source Cluster ED and Src NED denotes the Source Node ED. Data Frames.
FIG. 59 shows the structure of an Intra Cluster Data Frame. CH DED denotes the Cluster Head Device ED, RNED denotes the Receiving Node ED (the node ED of destination/intermediate node that should receive the packet) and Dst NED denotes the
Destination Node ED. Src NED is the Source Node ED and Payload denotes the Data itself.
The Intra Cluster Data Frame with ACK has the same frame structure as Intra Cluster Data Frame except the Frame Type field.
FIG. 60 shows an Inter Cluster Data Frame. Referring to FIG. 60, CH DED denotes the Cluster Head Device JD, RNED denotes the Receiving Node ED (the node ED of destination/intermediate node that should receive the packet), Dst CED denotes the Destination Cluster ED and Dst NED denotes the node ED of the destination node. Src CED denotes the node ED of the source node, Src NED denotes the Source Node ED and Payload denotes the Data itself.
The Inter Cluster Data Frame with ACK has the same frame structure as Inter Cluster Data Frame except the Frame Type field. Those of ordinary skill in the art will recognize that the present invention has been described in terms of exemplary embodiments based upon use of a particular message set. However, the invention should not be so limited, since the present invention could be implemented functionally equivalent messages. The nodes themselves may comprise a variety of hardware components including as special purpose hardware and/or dedicated processors. Similarly, general purpose computers, microprocessor based computers, digital signal processors, microcontrollers, dedicated processors, custom circuits, ASICS and/or dedicated hard wired logic may be used to construct alternative equivalent embodiments of the present invention.
Each node is directed by a computer program. Those ordinarily skilled in the art will appreciate that the program steps and associated data used to implement the embodiments described above can be implemented using disc storage as well as other forms of storage, such as, for example, Read Only Memory (ROM) devices, Random Access Memory (RAM) devices, optical storage elements, magnetic storage elements, magneto-optical storage elements, flash memory, core memory and/or other equivalent storage technologies without departing from the present invention. Such alternative storage devices should be considered equivalents.
While the invention has been described in conjunction with specific embodiments, it is evident that many alternatives, modifications, permutations and variations will become apparent to those of ordinary skill in the art in light of the foregoing description. Accordingly, it is intended that the present invention embrace all such alternatives, modifications and variations as fall within the scope of the appended claims.
What is claimed is:

Claims

1. A node structure comprising a plurality of nodes, wherein a first node of the plurality of nodes is directed by a computer program to associate with a cluster of nodes in order to form a network by: discovering if any neighboring node is a cluster head; if a cluster head is discovered, establishing a communication link with the cluster head; and if no cluster head is discovered, directing the node to become a cluster head.
2. A structure in accordance with claim 1, wherein the discovering comprises listening for a HELLO message for a predetermined period of time.
3. A structure in accordance with claim 1, wherein the plurality of nodes includes a cluster head and the first node of the plurality of nodes contains a link-state list in a memory and wherein the establishing a communication link with the cluster head comprises: obtaining an identifier of the cluster head; and updating the link state list with the identifier of the cluster head.
4. A structure in accordance with claim 1, wherein, if no neighboring node is a cluster head, the computer program is further operable to direct the first node to broadcast a HELLO message to neighboring nodes.
5. A structure in accordance with claim 4, wherein if a neighboring node responds to the HELLO message, the computer program is operable to direct the node in establishing communication with the neighboring node.
6. A structure in accordance with claim 5, wherein the cluster head has a cluster head identifier and a link state list stored in a memory and wherein the establishing communication with the neighboring node comprises: providing the neighboring node with a node identifier; providing the neighboring node with the cluster head identifier; and updating the link-state list with the node identifier.
7. A structure in accordance with claim 6, wherein, if the size of the cluster has reached a defined limit, the node identifier is a predetermined temporary node identifier that directs the neighboring node to stop responding to HELLO messages from the cluster head.
8. A structure in accordance with claim 1, wherein the plurality of nodes includes a cluster head and the computer program is further operable to direct the first node to link with a second node by: receiving a HELLO message broadcast by the cluster head; transmitting the HELLO message to neighboring nodes; receiving a CONNECTION REQUEST message from the second node; transmitting a NODE IDENTIFIER REQUEST to the cluster head; receiving a NODE IDENTIFIER RESPONSE from the cluster head; and transmitting a CONNECTION RESPONSE message to the second node.
9. A structure in accordance with claim 8, wherein if the cluster has reached a defined limit the node identifier response from the cluster head includes a predetermined temporary node identifier that directs the second node to stop sending
CONNECTION REQUEST messages to the first node.
10. A structure in accordance with claim 1, wherein the computer program is further operable to direct the first node periodically to broadcast a HELLO message to neighboring nodes and to update a neighbor list stored in memory according to any responses to the HELLO message.
11. A structure in accordance with claim 10, wherein a node is removed from the neighbor list if it does not respond to the HELLO message within a specified time.
12. A structure in accordance with claim 10, wherein if a response to the HELLO message is received from a node in a different cluster, the cluster identifier of the responding node is add to the neighbor list.
13. A structure in accordance with claim 10, wherein the first node is not a cluster head and the computer program is further operable to direct the first node to broadcast the HELLO message to neighboring nodes in response to a HELLO message from the cluster head.
14. A structure in accordance with claim 1, wherein the plurality of nodes includes a cluster head, the first node has a neighbor list stored in memory and the computer program is further operable to direct the first node periodically to send a link-state report that contains its neighbor list to the cluster head.
15. A structure in accordance with claim 14, wherein, based upon one or more link- state reports received from neighboring nodes, the computer program is further operable to direct the cluster head to generate a topology list stored in memory and to send a TOPOLOGY UPDATE message to neighboring nodes.
16. A structure in accordance with claim 15, wherein the topology list is generated by selecting the route between the cluster head and a neighboring node that uses the smallest number of nodes.
17. A structure in accordance with claim 15, wherein the topology list is updated if a node fails to send a link-state report.
18. A structure in accordance with claim 1, wherein the computer program is operable to direct the first node to send data in a frame comprising: the data; a cluster head device identifier; a frame type indicator; a receiving node identifier; a destination node identifier; and a source node identifier.
19. A structure in accordance with claim 18, wherein the data is sent to a node in a different cluster and wherein the frame further comprises: a transmitting node identifier; a destination cluster head identifier; and a source cluster head identifier.
20. A structure in accordance with claim 1, wherein the computer program is operable to direct the first node to process a received information packet having a Cluster Head Identifier, a Frame Type, a Receiving Node Identifier and a Destination Node Identifier, by: checking the Cluster Head Identifier; checking the Frame Type; checking the Receiving Node Identifier; and checking the Destination Node Identifier; wherein the packet is accepted if the Cluster Head Identifier, the Receiving Node Identifier and the Destination Node Identifier match those of the first node and the
Frame Type indicates that the packet contains a data message.
21. A structure in accordance with claim 20, wherein if the Cluster Head Identifier and the Receiving Node Identifier match those of the first node and the Frame Type indicates that the packet contains a data message, but the Destination Node Identifier is that of a different node, the Receiving Node Identifier of the packet is updated with the identifier of the first node, the packet is forwarded on the structure and an acknowledgement message is sent.
22. A structure in accordance with claim 20, wherein the packet is accepted if the Cluster Head Identifier matches that of the first node, the Frame Type indicates that the packet contains a data message and the Receiving Node Identifier indicates that the packet contains a broadcast message.
23. A structure in accordance with claim 22, wherein the information packet includes a Source Node Identifier, and the accepted broadcast message is forwarded to the structure if the Source Node Identifier is that of the parent node of the first node.
24. A structure in accordance with claim 1, wherein the plurality of nodes includes one or more clusters, each cluster comprising a node that is a cluster head and one or more member nodes linked to the cluster head.
25. A structure in accordance with claim 24, wherein the plurality of nodes further comprises a designated device directed by a computer program that is operable to direct the designated device to assign a cluster identifiers to the cluster heads of the one or more clusters.
26. A structure in accordance with claim 24, wherein the plurality of nodes includes a border node that is a member of at least two clusters, and wherein the border node act as router connecting the clusters and relaying information packets between the clusters.
27. A method for self-organization of a plurality of nodes to form a network comprising a cluster, the method comprising one or more of the processes of cluster formation, cluster network maintenance, intra-cluster communication, wherein, for a node of the plurality of nodes:
the process of cluster formation comprises: discovering if any neighboring node is a cluster head; if the cluster head is discovered, establishing a communication link with the cluster head; and if no cluster head is discovered, directing the node of the plurality of nodes to become the cluster head,
the process of cluster network maintenance comprises: periodically broadcasting a HELLO message to neighboring nodes; receiving responses to the HELLO message; and updating a neighbor list in accordance with responses to the HELLO message and the process of intra-cluster communication comprises: receiving an information packet having a Cluster Head Identifier, a Frame Type, a Receiving Node Identifier and a Destination Node Identifier; checking the Cluster Head Identifier; checking the Frame Type; checking the Receiving Node Identifier; checking the Destination Node Identifier; accepting the packet if the Cluster Head Identifier, the Receiving Node Identifier and the Destination Node Identifier match those of the node and the Frame Type indicates that the packet contains a data message.
28. A method in accordance with claim 27, wherein the discovering in the process of cluster formation comprises listening for a HELLO message for a predetermined period of time.
29. A method in accordance with claim 27, wherein the establishing a communication link with the cluster head in the cluster formation process comprises: obtaining an identifier of the cluster head; and updating a link-state list with the identifier of the cluster head.
30. A method in accordance with claim 27, wherein the cluster formation process further comprises broadcasting a HELLO message to neighboring nodes from the cluster head.
31. A method in accordance with claim 30, wherein the cluster formation process further comprises establishing communication between the cluster head and a neighboring node if the neighboring node responds to the HELLO message.
32. A method in accordance with claim 31, wherein the cluster head has a cluster head identifier and a link-state list and wherein the establishing communication with the neighboring node in the cluster formation process comprises: providing the neighboring node with a node identifier; providing the neighboring node with the cluster head identifier; and updating the link state list with the node identifier.
33. A method in accordance with claim 32, wherein, if the size of the cluster has reached a defined limit, the node identifier is a predetermined temporary node identifier that directs the neighboring node to stop responding to HELLO messages from the cluster head.
34. A method in accordance with claim 27, wherein the plurality of nodes includes a cluster head and the cluster formation process further comprises establishing a link between a first node and a second node by: receiving a HELLO message broadcast by the cluster head; transmitting the HELLO message to neighboring nodes; receiving a CONNECTION REQUEST message from the second node; transmitting a NODE IDENTIFIER REQUEST to the cluster head; receiving a NODE IDENTIFIER RESPONSE from the cluster head; and transmitting a CONNECTION RESPONSE message to the second node.
35. A method in accordance with claim 34, wherein, if the cluster has reached a defined limit, the node identifier response from the cluster head includes a predetermined temporary node identifier that directs the second node to stop sending CONNECTION REQUEST messages to the first node.
36. A method in accordance with claim 27, wherein the process of cluster network maintenance further comprises a node of the plurality of nodes: periodically broadcasting a HELLO message to neighboring nodes; receiving responses to the HELLO message; and updating a neighbor list in accordance with the responses to the HELLO message.
37. A method in accordance with claim 36, further comprising removing a node from the neighbor list if it does not respond to the HELLO message within a specified time.
38. A method in accordance with claim 36, further comprising adding the cluster identifier of the responding node to the neighbor list if a response to the HELLO message is received from a node in a different cluster.
39. A method in accordance with claim 38, wherein the node of the plurality of nodes is not a cluster head and the node broadcasts the HELLO message to neighboring nodes in response to a HELLO message from the cluster head.
40. A method in accordance with claim 27, wherein the plurality of nodes includes a cluster head and the process of cluster network maintenance further comprises a node of the plurality of nodes periodically sending a link-state report that contains its neighbor list to the cluster head.
41. A method in accordance with claim 40, wherein the process of cluster maintenance further comprises: the cluster head generating a topology list based upon one or more link-state reports received from neighboring nodes; and the cluster head sending a TOPOLOGY UPDATE message to neighboring nodes.
42. A method in accordance with claim 40, wherein the topology list is generated by selecting the route between the cluster head and a neighboring node that uses the smallest number of nodes.
43. A method in accordance with claim 41, wherein the process of cluster maintenance further comprises updating the topology list if the node fails to send a link-state report within a specified time.
44. A method in accordance with claim 27, wherein the process of intra-cluster communication further comprises: updating the Receiving Node Identifier of a packet with the identifier of the node; forwarding the packet on the network; and sending an acknowledgement message; if the Cluster Head Identifier and the Receiving Node Identifier match those of the node and the Frame Type indicates that the packet contains a data message, but the Destination Node Identifier is that of a different node.
45. A network in accordance with claim 27, wherein the process of intra-cluster communication further comprises accepting a packet if the Cluster Head Identifier matches that of the node, the Frame Type indicates that the packet contains a data message and the Receiving Node Identifier indicates that the packet contains a broadcast message,
46. A method in accordance with claim 45, wherein the information packet includes a Source Node Identifier, and the process of intra-cluster communication further comprises forwarding the accepted broadcast message to the network if the Source
Node Identifier is that of the parent node of the node.
47. A method in accordance with claim 27, wherein the network comprises a plurality of clusters and a plurality of cluster heads and wherein the method further comprising one or more of the processes of inter-cluster network formation, inter-cluster network maintenance, and inter-cluster communication.
48. A method as in claim 47, wherein the network further comprises a designated device and the process of inter-cluster network formation comprises: the designated device sending a HELLO message to neighboring nodes; if a cluster head of the plurality of cluster heads receives the HELLO message: the designated device assigning a cluster identifier to the cluster head; and the cluster head informing its member nodes of the cluster identifier; and if a member node receives the HELLO message: the member node adding the cluster identifier of the neighboring node from the parent cluster to its neighbor list; the member node reporting the neighbor list to the cluster head; the cluster head designating the member node as a border node; and the designated device assigning a cluster identifier to the cluster head via the border node.
49. A method as in claim 48, wherein the designated device assigning a cluster identifier to the cluster head comprises: the cluster head sending a CONNECTION REQUEST message to the designated device; the designated device sending a CONNECTION RESPONSE message to the cluster head; the cluster head sending an ACK message to the designated device; the cluster head sending an CLUSTER IDENTIFIER REQUEST message to the designated device; and the designated device sending a CLUSTER IDENTIFIER RESPONSE message to the cluster head.
50. A method as in claim 48, wherein the designated device assigning a cluster identifier to the cluster head via the border node comprises: the cluster head sending a NETWORK CONNECTION REQUEST message to the border node; the border node sending a CONNECTION REQUEST message to the designated device, or to its parent node that belongs to the parent cluster; the designated device, or the parent node from the parent cluster, sending a
CONNECTION RESPONSE message to the border node; the border node sending an ACK message to the designated device, or to the parent node from the parent cluster; the border node sending an CLUSTER IDENTIFIER REQUEST message to the designated device; the designated device sending a CLUSTER IDENTIFIER RESPONSE message to the border node; and the border node sending a NETWORK CONNECTION RESPONSE message to the cluster head.
51. A method as in claim 47, wherein a node of the plurality of nodes is a designated device and the process of inter-cluster network formation comprises: each cluster head in the plurality of nodes periodically sending a LINK STATE REPORT to the designated device; the designated device calculating a tree route for the network; and the designated device sending a NETWORK TOPOLOGY UPDATE message to each cluster head;
52. A method as in claim 51, wherein the process of inter-cluster network formation further comprises each cluster head updating a list of identifiers of parent clusters, child/lower clusters and border nodes when a NETWORK TOPOLOGY UPDATE message is received.
53. A method as in claim 48, wherein the cluster head requests a cluster identifier from the designated device via at least one of an intermediate cluster head and a border node.
54. A method as in claim 48, wherein the designated device assigns a cluster identifier to a cluster head via at least one of an intermediate cluster head and a border node.
55. A method as in claim 51, wherein a node of the plurality of nodes is a backup designated device and the process of inter-cluster network maintenance further comprises the backup designated device periodically duplicating the list of cluster ED and network link-state information of the designated device.
PCT/US2002/012519 2001-04-20 2002-04-19 Protocol and structure for self-organizing network WO2002087172A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US28516501P 2001-04-20 2001-04-20
US60/285,165 2001-04-20

Publications (1)

Publication Number Publication Date
WO2002087172A1 true WO2002087172A1 (en) 2002-10-31

Family

ID=23093038

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2002/012519 WO2002087172A1 (en) 2001-04-20 2002-04-19 Protocol and structure for self-organizing network

Country Status (2)

Country Link
US (1) US7171476B2 (en)
WO (1) WO2002087172A1 (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005043830A1 (en) * 2003-10-30 2005-05-12 Qualcomm Incorporated Network topology formation
WO2005120089A2 (en) * 2004-06-02 2005-12-15 Siemens Aktiengesellschaft Establishment of a wireless, autonomous communications network and transfer of base station functionality
EP1665641A2 (en) * 2003-09-11 2006-06-07 Motorola, Inc. Method and apparatus for discovering neighbors within a piconet communication system
GB2423892A (en) * 2005-03-04 2006-09-06 Itt Mfg Enterprises Inc Point to multipoint voice operation in an ad-hoc wireless network
WO2006123999A1 (en) * 2005-05-20 2006-11-23 Agency For Science, Technology And Research A virtual grid
CN100356713C (en) * 2003-09-19 2007-12-19 日本电气株式会社 Data transmission path establishing method, radio communication network system, and sensor network system
US7342896B2 (en) 2003-03-03 2008-03-11 Sharp Laboratories Of America, Inc. Centralized network organization and topology discover in Ad-Hoc network with central controller
US7443833B2 (en) 2004-08-06 2008-10-28 Sharp Laboratories Of America, Inc. Ad hoc network topology discovery
US7519359B2 (en) 2005-09-30 2009-04-14 Motorola, Inc. Voice tagging of automated menu location
CN101801113B (en) * 2009-02-05 2012-07-11 华为技术有限公司 Network topology cluster processing method and processing system
US8275866B2 (en) * 2007-11-13 2012-09-25 At&T Intellectual Property I, L.P. Assigning telecommunications nodes to community of interest clusters
WO2015062642A1 (en) * 2013-10-30 2015-05-07 Nokia Solutions And Networks Oy D2d inter-cluster coordination
EP2911346A4 (en) * 2012-11-13 2015-09-23 Huawei Tech Co Ltd Method and network device for establishing virtual cluster
US10880936B2 (en) 2013-06-26 2020-12-29 Telefonaktiebolaget Lm Ericsson (Publ) Cluster head selection in a communications network
CN113556286A (en) * 2021-05-31 2021-10-26 北京邮电大学 Communication method and system of peer-to-peer network

Families Citing this family (155)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7483403B2 (en) * 2002-01-10 2009-01-27 Robert Bosch Gmbh Protocol for reliable, self-organizing, low-power wireless network for security and building automation systems
US7130289B2 (en) * 2002-03-14 2006-10-31 Airmagnet, Inc. Detecting a hidden node in a wireless local area network
US7477612B2 (en) * 2002-03-15 2009-01-13 Broadcom Corporation Topology discovery process and mechanism for a network of managed devices
US7542459B2 (en) 2002-04-26 2009-06-02 Intel Corporation Ad hoc network having a back-bone determined at least in part on a metric and method therefore
US6870846B2 (en) * 2002-04-29 2005-03-22 Harris Corporation Hierarchical mobile ad-hoc network and methods for performing reactive routing therein using dynamic source routing (DSR)
US6965775B2 (en) * 2002-05-15 2005-11-15 Nokia Corporation Service-oriented protection scheme for a radio access network
US20040059835A1 (en) * 2002-09-25 2004-03-25 Zhigang Liu Method and system for in-band signaling between network nodes using state announcement or header field mechanisms
US7697419B1 (en) * 2002-11-22 2010-04-13 Allied Telesyn International Corporation Apparatus and method for managing a set of switches in a computer network
US7366113B1 (en) * 2002-12-27 2008-04-29 At & T Corp. Adaptive topology discovery in communication networks
US7983239B1 (en) 2003-01-07 2011-07-19 Raytheon Bbn Technologies Corp. Systems and methods for constructing a virtual model of a multi-hop, multi-access network
US7995497B2 (en) * 2003-02-27 2011-08-09 Hewlett-Packard Development Company, L.P. Spontaneous topology discovery in a multi-node computer system
US7392053B1 (en) * 2003-04-08 2008-06-24 Intel Corporation Method and apparatus for selective listening in a dynamically configured wireless network
US8103753B2 (en) * 2003-04-22 2012-01-24 Microsoft Corporation Distributing membership information for multi-party application layer sessions
US7593996B2 (en) * 2003-07-18 2009-09-22 Netapp, Inc. System and method for establishing a peer connection using reliable RDMA primitives
US7716323B2 (en) * 2003-07-18 2010-05-11 Netapp, Inc. System and method for reliable peer communication in a clustered storage system
US7881229B2 (en) * 2003-08-08 2011-02-01 Raytheon Bbn Technologies Corp. Systems and methods for forming an adjacency graph for exchanging network routing data
US7606927B2 (en) 2003-08-27 2009-10-20 Bbn Technologies Corp Systems and methods for forwarding data units in a communications network
US8166204B2 (en) 2003-08-29 2012-04-24 Raytheon Bbn Technologies Corp. Systems and methods for automatically placing nodes in an ad hoc network
US7436789B2 (en) * 2003-10-09 2008-10-14 Sarnoff Corporation Ad Hoc wireless node and network
US20050086368A1 (en) * 2003-10-15 2005-04-21 Dell Products L.P. System and method for determining nearest neighbor information
US7668083B1 (en) 2003-10-28 2010-02-23 Bbn Technologies Corp. Systems and methods for forwarding data in a communications network
US8060619B1 (en) * 2003-11-07 2011-11-15 Symantec Operating Corporation Direct connections to a plurality of storage object replicas in a computer network
EP1721414A4 (en) * 2004-02-16 2011-06-29 Chrsitopher Michael Davies Network architecture
US8499061B2 (en) * 2004-02-16 2013-07-30 Thomson Licensing Method for inserting a new device in a community of devices
US7961650B2 (en) * 2004-02-16 2011-06-14 Christopher Michael Davies Network architecture
WO2005089239A2 (en) 2004-03-13 2005-09-29 Cluster Resources, Inc. System and method of providing a self-optimizing reservation in space of compute resources
US8782654B2 (en) 2004-03-13 2014-07-15 Adaptive Computing Enterprises, Inc. Co-allocating a reservation spanning different compute resources types
US7532623B2 (en) * 2004-03-24 2009-05-12 Bbn Technologies Corp. Methods for wireless mesh multicasting
US7889674B2 (en) * 2004-05-04 2011-02-15 Samsung Electronics Co., Ltd. Zigbee network device for assigning addresses to child nodes after constructing cluster-tree structure, address assigning method and routing method
FR2870418B1 (en) * 2004-05-17 2006-08-18 Alcatel Sa ROUTING WITHIN A MOBILE COMMUNICATION NETWORK
US20070266388A1 (en) 2004-06-18 2007-11-15 Cluster Resources, Inc. System and method for providing advanced reservations in a compute environment
US7751305B2 (en) * 2004-06-25 2010-07-06 Samsung Electronics Co., Ltd. Method for transmitting and receiving broadcast service data in an OFDMA wireless communication system
US7474632B2 (en) * 2004-06-30 2009-01-06 International Business Machines Corporation Method for self-configuring routing devices in a network
US8180882B2 (en) * 2004-07-22 2012-05-15 Tyco Electronics Subsea Communications Llc Distributed messaging system and method for sharing network status data
US7656804B2 (en) * 2004-08-16 2010-02-02 Motorola, Inc. Method and apparatus for operating an AD-HOC communication system
DE102004040070B3 (en) * 2004-08-18 2006-03-02 Siemens Ag Establishment of a wireless network under identification and use of local topology information
US8176490B1 (en) 2004-08-20 2012-05-08 Adaptive Computing Enterprises, Inc. System and method of interfacing a workload manager and scheduler with an identity manager
JP2006091971A (en) * 2004-09-21 2006-04-06 Hewlett-Packard Development Co Lp Network data display method/device/program
US8756521B1 (en) 2004-09-30 2014-06-17 Rockwell Automation Technologies, Inc. Systems and methods for automatic visualization configuration
US7751341B2 (en) * 2004-10-05 2010-07-06 Cisco Technology, Inc. Message distribution across fibre channel fabrics
WO2006053093A2 (en) 2004-11-08 2006-05-18 Cluster Resources, Inc. System and method of providing system jobs within a compute environment
US7467293B2 (en) * 2004-11-12 2008-12-16 Tsinghua University Method and computing system for transparence computing on the computer network
US7596152B2 (en) * 2004-12-07 2009-09-29 Intel Corporation Apparatus, system and method capable of low duty cycle hierarchical AD HOC networks
US7792956B2 (en) * 2005-01-24 2010-09-07 Daintree Networks, Pty. Ltd. Network analysis system and method
US20060193316A1 (en) * 2005-02-25 2006-08-31 Allen Mark R Autonomous network topology and method of operating same
US7502360B2 (en) * 2005-03-04 2009-03-10 Itt Manufacturing Enterprises, Inc. Method and apparatus for dynamic neighbor discovery within wireless networks using time division multiple access (TDMA)
US7639663B1 (en) 2005-03-04 2009-12-29 Itt Manufacturing Enterprises, Inc. Method and apparatus for dynamic channel access within wireless networks
US8863143B2 (en) 2006-03-16 2014-10-14 Adaptive Computing Enterprises, Inc. System and method for managing a hybrid compute environment
US9231886B2 (en) 2005-03-16 2016-01-05 Adaptive Computing Enterprises, Inc. Simple integration of an on-demand compute environment
US7729285B2 (en) * 2005-03-22 2010-06-01 Itt Manufacturing Enterprises, Inc. Energy-efficient network protocol and node device for sensor networks
CA2603577A1 (en) 2005-04-07 2006-10-12 Cluster Resources, Inc. On-demand access to compute resources
EP1713206A1 (en) * 2005-04-11 2006-10-18 Last Mile Communications/Tivis Limited A distributed communications network comprising wirelessly linked base stations
KR100695146B1 (en) * 2005-04-12 2007-03-14 삼성전자주식회사 Method and apparatus for transmitting message in private and public networks
US8203964B2 (en) * 2005-05-06 2012-06-19 Broadcom Corporation Asynchronous event notification
US7809683B2 (en) 2005-05-13 2010-10-05 Rockwell Automation Technologies, Inc. Library that includes modifiable industrial automation objects
US7672737B2 (en) * 2005-05-13 2010-03-02 Rockwell Automation Technologies, Inc. Hierarchically structured data model for utilization in industrial automation environments
US7676281B2 (en) * 2005-05-13 2010-03-09 Rockwell Automation Technologies, Inc. Distributed database in an industrial automation environment
US7650405B2 (en) * 2005-05-13 2010-01-19 Rockwell Automation Technologies, Inc. Tracking and tracing across process boundaries in an industrial automation environment
US8799800B2 (en) * 2005-05-13 2014-08-05 Rockwell Automation Technologies, Inc. Automatic user interface generation
KR101241412B1 (en) * 2005-05-31 2013-03-11 삼성전자주식회사 Method for clustering of wireless sensor network for minimizing energy consumption
US7400598B1 (en) * 2005-06-23 2008-07-15 Rockwell Collins, Inc. Polymorphic broadcast and multicast services for wireless networks
KR100679250B1 (en) 2005-07-22 2007-02-05 한국전자통신연구원 Method for automatically selecting a cluster header in a wireless sensor network and for dynamically configuring a secure wireless sensor network
US8149737B2 (en) * 2005-08-09 2012-04-03 Motorola Solutions, Inc. Method and system for data transmission in a wireless network
KR100698615B1 (en) * 2005-08-31 2007-03-22 삼성전자주식회사 Beacon scheduling method in Multi-hop Ad-hoc Networks
JP4503513B2 (en) 2005-08-31 2010-07-14 株式会社エヌ・ティ・ティ・ドコモ Mobile terminal device, topology management device, communication method, and communication network
US7680068B1 (en) * 2005-09-13 2010-03-16 Rockwell Collins, Inc. System and method for artery node selection in an ad-hoc network
US8554920B2 (en) * 2005-11-22 2013-10-08 Telcordia Technologies, Inc. Linked equivalent cell header-based approach and protocol for organizing an ad-hoc network
US8130638B2 (en) * 2006-01-24 2012-03-06 Cisco Technology, Inc. Method and apparatus to elect ABRs dynamically and intelligently
JP4807701B2 (en) * 2006-02-28 2011-11-02 国立大学法人 名古屋工業大学 Mobile terminal device, control method, and mobile communication system
US8645514B2 (en) * 2006-05-08 2014-02-04 Xerox Corporation Method and system for collaborative self-organization of devices
US20070268856A1 (en) * 2006-05-16 2007-11-22 Nokia Corporation Beacon broadcaster methods and systems for wireless networks
JP4948054B2 (en) * 2006-06-16 2012-06-06 三菱電機株式会社 Management apparatus, communication terminal apparatus, communication system, and communication management method
US7656851B1 (en) * 2006-10-12 2010-02-02 Bae Systems Information And Electronic Systems Integration Inc. Adaptive message routing for mobile ad HOC networks
US20100085916A1 (en) * 2007-01-31 2010-04-08 Noosphere Communications, Inc. Systems and Methods for Hybrid Wired and Wireless Universal Access Networks
CA2623805A1 (en) * 2007-03-02 2008-09-02 Robert A. Hubbs Quality of service based preemptive routing
DE102007012085B4 (en) * 2007-03-13 2012-05-03 Merten Gmbh & Co. Kg Method for commissioning a radio system
US7916666B2 (en) * 2007-04-03 2011-03-29 Itt Manufacturing Enterprises, Inc. Reliable broadcast protocol and apparatus for sensor networks
KR100878906B1 (en) 2007-06-22 2009-01-15 성균관대학교산학협력단 Method and system for filtering of message in sensor network
US8432565B2 (en) * 2007-07-11 2013-04-30 Xerox Corporation Job distribution among networked resources in a document processing environment
US8041773B2 (en) 2007-09-24 2011-10-18 The Research Foundation Of State University Of New York Automatic clustering for self-organizing grids
US8954562B2 (en) * 2007-09-28 2015-02-10 Intel Corporation Entropy-based (self-organizing) stability management
US7996510B2 (en) * 2007-09-28 2011-08-09 Intel Corporation Virtual clustering for scalable network control and management
JP4462340B2 (en) * 2007-12-14 2010-05-12 ソニー株式会社 Wireless communication terminal, wireless communication system, communication management method, and computer program
US20090201840A1 (en) * 2008-02-08 2009-08-13 Pfeiffer Jr Loren K Wireless networks using a rooted, directed topology
WO2009104171A2 (en) * 2008-02-22 2009-08-27 France Telecom Dynamic clustering management
KR100987492B1 (en) * 2008-04-23 2010-10-13 경희대학교 산학협력단 Method for organizing logical group in wireless sensor network and wireless sensor network system using the same and managing group
TWI392279B (en) * 2008-04-23 2013-04-01 Inst Information Industry Network address assigning method and routing method for a long thin wireless network
US8098593B2 (en) * 2008-04-30 2012-01-17 Microsoft Corporation Multi-level interconnection network
US8315237B2 (en) * 2008-10-29 2012-11-20 Google Inc. Managing and monitoring emergency services sector resources
US8239509B2 (en) 2008-05-28 2012-08-07 Red Hat, Inc. Systems and methods for management of virtual appliances in cloud-based network
US8341625B2 (en) * 2008-05-29 2012-12-25 Red Hat, Inc. Systems and methods for identification and management of cloud-based virtual machines
JP4930460B2 (en) * 2008-06-06 2012-05-16 沖電気工業株式会社 Wireless communication connection control method
US8275404B2 (en) * 2008-10-29 2012-09-25 Google Inc. Managing and monitoring emergency services sector resources
CA2778905A1 (en) * 2008-10-29 2010-08-26 Google Inc. Network and application merging and asset tracking
KR101156618B1 (en) * 2008-11-21 2012-06-14 연세대학교 산학협력단 Method for allocating resources for wireless network
DE102008063454B4 (en) * 2008-12-17 2012-05-31 Siemens Aktiengesellschaft Method for monitoring network nodes
US8705523B2 (en) 2009-02-05 2014-04-22 Google Inc. Conjoined class-based networking
US20100208551A1 (en) * 2009-02-13 2010-08-19 Daniel Golparian Configuring wireless seismic acquisition networks
US8495141B2 (en) * 2009-02-17 2013-07-23 International Business Machines Corporation Efficient maintenance of a distributed system membership view
US8139504B2 (en) * 2009-04-07 2012-03-20 Raytheon Bbn Technologies Corp. System, device, and method for unifying differently-routed networks using virtual topology representations
SG176087A1 (en) * 2009-06-11 2011-12-29 Shell Int Research A process for the selective hydrogenation and hydrodesulferization of a pyrolysis gasoline feedstock
US10877695B2 (en) 2009-10-30 2020-12-29 Iii Holdings 2, Llc Memcached server functionality in a cluster of data processing nodes
US11720290B2 (en) 2009-10-30 2023-08-08 Iii Holdings 2, Llc Memcached server functionality in a cluster of data processing nodes
KR101284790B1 (en) * 2009-11-30 2013-07-10 한국전자통신연구원 Method for cluster based data transmission in wireless sensor networks
KR101294973B1 (en) * 2009-12-08 2013-08-09 한국전자통신연구원 Multi-channel/multi-interface mesh router and method for fixed-distirbuted channel assignment
WO2011106931A1 (en) * 2010-03-03 2011-09-09 Nokia Corporation Compressed hybrid automatic repeat request feedback for device to device cluster communications
US8837327B2 (en) * 2010-03-25 2014-09-16 Zte Corporation Method and device for managing network topology structure of machine to machine network
US8484401B2 (en) 2010-04-15 2013-07-09 Rockwell Automation Technologies, Inc. Systems and methods for conducting communications among components of multidomain industrial automation system
US8984533B2 (en) 2010-04-15 2015-03-17 Rockwell Automation Technologies, Inc. Systems and methods for conducting communications among components of multidomain industrial automation system
US9392072B2 (en) 2010-04-15 2016-07-12 Rockwell Automation Technologies, Inc. Systems and methods for conducting communications among components of multidomain industrial automation system
CN102136990B (en) 2010-06-09 2013-11-06 华为技术有限公司 Service routing method and system of service superposition network
KR101136375B1 (en) * 2010-07-12 2012-04-18 아주대학교산학협력단 Method and apparatus for establishing a routing path on a multi-hop network
KR101771026B1 (en) * 2010-08-12 2017-08-25 삼성전자주식회사 Method and apparatus for data communication while base station is disrupted troyed in wireless communication system
US8788465B2 (en) 2010-12-01 2014-07-22 International Business Machines Corporation Notification of configuration updates in a cluster system
US8943082B2 (en) 2010-12-01 2015-01-27 International Business Machines Corporation Self-assignment of node identifier in a cluster system
US9069571B2 (en) 2010-12-01 2015-06-30 International Business Machines Corporation Propagation of unique device names in a cluster system
US9449065B1 (en) 2010-12-28 2016-09-20 Amazon Technologies, Inc. Data replication framework
US10198492B1 (en) * 2010-12-28 2019-02-05 Amazon Technologies, Inc. Data replication framework
US8554762B1 (en) 2010-12-28 2013-10-08 Amazon Technologies, Inc. Data replication framework
US8634330B2 (en) 2011-04-04 2014-01-21 International Business Machines Corporation Inter-cluster communications technique for event and health status communications
CN102769867B (en) 2011-05-05 2017-08-11 北京三星通信技术研究有限公司 Method for network access
WO2013054425A1 (en) * 2011-10-13 2013-04-18 富士通株式会社 Node device and communication method
DE102011055267A1 (en) 2011-11-11 2013-05-16 Insta Elektro Gmbh Method for operating a multi-hop interconnection network
DE102012205355A1 (en) * 2012-04-02 2013-10-02 Rohde & Schwarz Gmbh & Co. Kg Method of integrating network subscribers into an ad hoc network and associated ad hoc network
US9866475B2 (en) * 2012-06-15 2018-01-09 Citrix Systems, Inc. Systems and methods for forwarding traffic in a cluster network
WO2013190172A1 (en) * 2012-06-21 2013-12-27 Eye Solutions Oy Method, system, apparatus and computer program product for communication management
JP5962452B2 (en) * 2012-11-19 2016-08-03 富士通株式会社 Wireless communication system, wireless communication method, and transmission terminal
JP5954130B2 (en) * 2012-11-19 2016-07-20 富士通株式会社 Wireless communication system, wireless communication method, transmitting terminal, and receiving terminal
US9170971B2 (en) 2012-12-26 2015-10-27 Iii Holdings 2, Llc Fabric discovery for a cluster of nodes
US9613119B1 (en) 2013-03-14 2017-04-04 Nutanix, Inc. Unique identifiers for data replication, migration, failover operations and failback operations
WO2014203023A1 (en) 2013-06-19 2014-12-24 Hitachi Data Systems Engineering UK Limited Decentralized distributed computing system
US9112790B2 (en) 2013-06-25 2015-08-18 Google Inc. Fabric network
CN103491129B (en) * 2013-07-05 2017-07-14 华为技术有限公司 A kind of service node collocation method, pool of service nodes Register and system
US10382527B2 (en) * 2013-10-16 2019-08-13 International Business Machines Corporation Performing optimized collective operations in an irregular subcommunicator of compute nodes in a parallel computer
US9021296B1 (en) 2013-10-18 2015-04-28 Hitachi Data Systems Engineering UK Limited Independent data integrity and redundancy recovery in a storage system
US9183148B2 (en) 2013-12-12 2015-11-10 International Business Machines Corporation Efficient distributed cache consistency
US9843989B2 (en) * 2014-02-10 2017-12-12 Nokia Solutions And Networks Oy Uniform UE initialization procedure for both in-coverage and out-of-coverage D2D communications
US9596143B2 (en) * 2014-07-25 2017-03-14 Cohesity, Inc. Node discovery and cluster formation for a secondary storage appliance
US10334423B2 (en) * 2015-07-14 2019-06-25 Mediatek Inc. Method and apparatus for self-forming a tree topology network in a communications network
US20180121826A1 (en) * 2016-10-28 2018-05-03 Knowm Inc Compositional Learning Through Decision Tree Growth Processes and A Communication Protocol
US10635648B2 (en) 2016-11-30 2020-04-28 Nutanix, Inc. Entity identifier generation in distributed computing systems
EP3562100B1 (en) * 2016-12-22 2023-05-17 Nidec Corporation Motor unit and multi-motor system
CN106658640B (en) * 2016-12-26 2020-05-19 上海大学 Clustering type ad hoc network route establishing method for three-meter wireless meter reading
US10514847B2 (en) 2016-12-28 2019-12-24 Amazon Technologies, Inc. Data storage system with multiple durability levels
US11301144B2 (en) 2016-12-28 2022-04-12 Amazon Technologies, Inc. Data storage system
US10771550B2 (en) * 2016-12-28 2020-09-08 Amazon Technologies, Inc. Data storage system with redundant internal networks
US10484015B2 (en) 2016-12-28 2019-11-19 Amazon Technologies, Inc. Data storage system with enforced fencing
US10841163B2 (en) * 2018-10-30 2020-11-17 EMC IP Holding Company LLC Autoinitialization of clustered storage
JP7167687B2 (en) * 2018-12-18 2022-11-09 富士通株式会社 Information processing device, information processing method and information processing program
US10999187B2 (en) 2019-06-13 2021-05-04 Juniper Networks, Inc. Wireless control and fabric links for high-availability cluster nodes
US11304084B1 (en) 2020-10-23 2022-04-12 Rockwell Collins, Inc. System and method for beacon-based passive clustering in mobile ad hoc networks (MANET)
US11665658B1 (en) 2021-04-16 2023-05-30 Rockwell Collins, Inc. System and method for application of doppler corrections for time synchronized transmitter and receiver
US11726162B2 (en) 2021-04-16 2023-08-15 Rockwell Collins, Inc. System and method for neighbor direction and relative velocity determination via doppler nulling techniques
US11737121B2 (en) 2021-08-20 2023-08-22 Rockwell Collins, Inc. System and method to compile and distribute spatial awareness information for network
CN117098161B (en) * 2023-10-18 2024-01-05 西安蜂语信息科技有限公司 Data transmission method, device, network equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5079767A (en) * 1988-09-27 1992-01-07 Digital Equipment Corporation Method of multicast message distribution
US6208623B1 (en) * 1998-04-13 2001-03-27 3Com Corporation Method of combining PNNI and E-IISP in an asynchronous transfer mode network
US6385201B1 (en) * 1997-04-30 2002-05-07 Nec Corporation Topology aggregation using parameter obtained by internodal negotiation

Family Cites Families (50)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4313036A (en) * 1980-02-19 1982-01-26 Rolm Corporation Distributed CBX system employing packet network
US5128938A (en) * 1989-03-03 1992-07-07 Motorola, Inc. Energy saving protocol for a communication system
US5394436A (en) * 1991-10-01 1995-02-28 Norand Corporation Radio frequency local area network
US5940771A (en) * 1991-05-13 1999-08-17 Norand Corporation Network supporting roaming, sleeping terminals
GB9114808D0 (en) * 1991-07-09 1991-08-28 Philips Electronic Associated Information transmission system
US5241542A (en) * 1991-08-23 1993-08-31 International Business Machines Corporation Battery efficient operation of scheduled access protocol
US5418835A (en) * 1992-10-26 1995-05-23 Motorola Inc. Method of delivering paging messages using voice mail
US5371734A (en) * 1993-01-29 1994-12-06 Digital Ocean, Inc. Medium access control protocol for wireless network
GB9304638D0 (en) * 1993-03-06 1993-04-21 Ncr Int Inc Wireless data communication system having power saving function
US5943397A (en) * 1993-12-29 1999-08-24 At&T Network assisted callback system
US5590396A (en) 1994-04-20 1996-12-31 Ericsson Inc. Method and apparatus for a deep-sleep mode in a digital cellular communication system
US5533100A (en) * 1994-07-29 1996-07-02 At&T Corp. Communications system call complete arrangement
AU5848896A (en) * 1995-05-23 1996-12-11 Telefonaktiebolaget Lm Ericsson (Publ) Method and apparatus for supporting delivery of short messag e service messages to sleeping mobile stations in a cellular communications system
FI99072C (en) * 1995-06-08 1997-09-25 Nokia Telecommunications Oy A method for issuing delivery confirmations of message deliveries over a telephone network
US6041166A (en) * 1995-07-14 2000-03-21 3Com Corp. Virtual network architecture for connectionless LAN backbone
US5845204A (en) * 1995-08-11 1998-12-01 Rockwell International Corporation Method and apparatus for controlling the wakeup logic of a radio receiver in sleep mode
US6058289A (en) * 1995-09-26 2000-05-02 Pacific Communication Sciences, Inc. Method and apparatus for low power mobile unit for cellular communications system
US5850592A (en) * 1996-01-11 1998-12-15 Gte Internetworking Incorporated Method for self-organizing mobile wireless station network
US5778052A (en) * 1996-02-23 1998-07-07 At&T Corp. Method and system for storing messages for later forwarding
US6088591A (en) * 1996-06-28 2000-07-11 Aironet Wireless Communications, Inc. Cellular system hand-off protocol
US6055561A (en) * 1996-10-02 2000-04-25 International Business Machines Corporation Mapping of routing traffic to switching networks
US5991287A (en) * 1996-12-30 1999-11-23 Lucent Technologies, Inc. System and method for providing seamless handover in a wireless computer network
US6085114A (en) * 1997-02-06 2000-07-04 At&T Wireless Systems Inc. Remote wireless unit having reduced power operating mode
GB9703996D0 (en) * 1997-02-26 1997-04-16 British Telecomm Message system
US6044069A (en) * 1997-10-29 2000-03-28 Conexant Systems, Inc. Power management system for a mobile station
US6356538B1 (en) * 1998-03-30 2002-03-12 Oki Telecom, Inc. Partial sleep system for power savings in CDMA wireless telephone devices
US6134599A (en) * 1998-04-18 2000-10-17 Sun Microsystems, Inc. System and method for organizing devices in a network into a tree using suitability values
US6370146B1 (en) * 1998-06-29 2002-04-09 Lucent Technologies Inc. Method and apparatus for non-disruptive addition of a new node to an inter-nodal network
US6205122B1 (en) * 1998-07-21 2001-03-20 Mercury Interactive Corporation Automatic network topology analysis
US6304556B1 (en) * 1998-08-24 2001-10-16 Cornell Research Foundation, Inc. Routing and mobility management protocols for ad-hoc networks
US6285892B1 (en) * 1998-11-24 2001-09-04 Philips Electronics North America Corp. Data transmission system for reducing terminal power consumption in a wireless network
US6243746B1 (en) * 1998-12-04 2001-06-05 Sun Microsystems, Inc. Method and implementation for using computer network topology objects
US6889254B1 (en) * 1999-03-30 2005-05-03 International Business Machines Corporation Scalable merge technique for information retrieval across a distributed network
US6377987B1 (en) * 1999-04-30 2002-04-23 Cisco Technology, Inc. Mechanism for determining actual physical topology of network based on gathered configuration information representing true neighboring devices
US6473408B1 (en) * 1999-05-19 2002-10-29 3Com Corporation Building a hierarchy in an asynchronous transfer mode PNNI network utilizing proxy SVCC-based RCC entities
US6836463B2 (en) * 1999-10-15 2004-12-28 Nokia Corporation System for communicating labeled routing trees to establish preferred paths and source routes with local identifiers in wireless computer networks
US6385174B1 (en) * 1999-11-12 2002-05-07 Itt Manufacturing Enterprises, Inc. Method and apparatus for transmission of node link status messages throughout a network with reduced communication protocol overhead traffic
US6636499B1 (en) * 1999-12-02 2003-10-21 Cisco Technology, Inc. Apparatus and method for cluster network device discovery
US20020091855A1 (en) * 2000-02-02 2002-07-11 Yechiam Yemini Method and apparatus for dynamically addressing and routing in a data network
US6456599B1 (en) * 2000-02-07 2002-09-24 Verizon Corporate Services Group Inc. Distribution of potential neighbor information through an ad hoc network
US6816460B1 (en) * 2000-03-14 2004-11-09 Lucent Technologies Inc. Location based routing for mobile ad-hoc networks
US6845091B2 (en) * 2000-03-16 2005-01-18 Sri International Mobile ad hoc extensions for the internet
US6829222B2 (en) * 2000-04-25 2004-12-07 Board Of Regents The University Of Texas System Clusterhead selection in wireless ad hoc networks
US6791949B1 (en) * 2000-04-28 2004-09-14 Raytheon Company Network protocol for wireless ad hoc networks
US6694361B1 (en) * 2000-06-30 2004-02-17 Intel Corporation Assigning multiple LIDs to ports in a cluster
US6493759B1 (en) * 2000-07-24 2002-12-10 Bbnt Solutions Llc Cluster head resignation to improve routing in mobile communication systems
US6876643B1 (en) * 2000-08-08 2005-04-05 International Business Machines Corporation Clustering in wireless ad hoc networks
US6973053B1 (en) * 2000-09-12 2005-12-06 Bbnt Solutions Llc Using direct cluster member to cluster member links to improve performance in mobile communication systems
US6982960B2 (en) * 2001-03-09 2006-01-03 Motorola, Inc. Protocol for self-organizing network using a logical spanning tree backbone
US7203729B2 (en) * 2001-04-20 2007-04-10 Motorola Inc. Method and apparatus for a communication network with nodes capable of selective cluster head operation

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5079767A (en) * 1988-09-27 1992-01-07 Digital Equipment Corporation Method of multicast message distribution
US6385201B1 (en) * 1997-04-30 2002-05-07 Nec Corporation Topology aggregation using parameter obtained by internodal negotiation
US6208623B1 (en) * 1998-04-13 2001-03-27 3Com Corporation Method of combining PNNI and E-IISP in an asynchronous transfer mode network

Cited By (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7342896B2 (en) 2003-03-03 2008-03-11 Sharp Laboratories Of America, Inc. Centralized network organization and topology discover in Ad-Hoc network with central controller
EP1665641A4 (en) * 2003-09-11 2007-10-10 Motorola Inc Method and apparatus for discovering neighbors within a piconet communication system
EP1665641A2 (en) * 2003-09-11 2006-06-07 Motorola, Inc. Method and apparatus for discovering neighbors within a piconet communication system
CN100356713C (en) * 2003-09-19 2007-12-19 日本电气株式会社 Data transmission path establishing method, radio communication network system, and sensor network system
US7336958B2 (en) 2003-09-19 2008-02-26 Nec Corporation Data transmission path establishing method, radio communication network system, and sensor network system
KR101062647B1 (en) * 2003-10-30 2011-09-06 퀄컴 인코포레이티드 Network topology formation
EP2299756A1 (en) * 2003-10-30 2011-03-23 QUALCOMM Incorporated Network topology formation
JP2010016809A (en) * 2003-10-30 2010-01-21 Qualcomm Inc Network topology formation
KR100887907B1 (en) * 2003-10-30 2009-03-12 퀄컴 인코포레이티드 Network topology formation
WO2005043830A1 (en) * 2003-10-30 2005-05-12 Qualcomm Incorporated Network topology formation
JP2009268111A (en) * 2003-10-30 2009-11-12 Qualcomm Inc Network topology formation
US8489135B2 (en) 2003-10-30 2013-07-16 Qualcomm Incorporated Network topology formation
US7515924B2 (en) 2003-10-30 2009-04-07 Qualcomm Incorporated Method and module for operating independently of a remote terminal if an incoming pilot signal is not detected within a time period and enabling a pilot signal transmission
EP1881650A1 (en) 2004-06-02 2008-01-23 Siemens Home and Office Communication Devices GmbH & Co. KG Establishment of a wireless, autonomous communications network
CN1842999B (en) * 2004-06-02 2011-06-15 吉加塞特通信有限责任公司 Method for establishing wireless self-organized communication network,wireless self-organized communication net receiving and transmitting apparatus and base station and the network
WO2005120089A2 (en) * 2004-06-02 2005-12-15 Siemens Aktiengesellschaft Establishment of a wireless, autonomous communications network and transfer of base station functionality
KR100804837B1 (en) * 2004-06-02 2008-02-20 지멘스 악티엔게젤샤프트 Method for establishing a wireless self-organizing communications network, transceiver and base station of a wireless self-organizing communications network and corresponding wireless self-organizing communications network
US8032083B2 (en) 2004-06-02 2011-10-04 Siemens Aktiengesellschaft Method for establishing a wireless, autonomous communications network, transceiver and base station of a wireless, autonomous communications network and corresponding wireless, autonomous communications network
WO2005120089A3 (en) * 2004-06-02 2006-04-20 Siemens Ag Establishment of a wireless, autonomous communications network and transfer of base station functionality
US7443833B2 (en) 2004-08-06 2008-10-28 Sharp Laboratories Of America, Inc. Ad hoc network topology discovery
US7768989B2 (en) 2005-03-04 2010-08-03 Itt Manufacturing Enterprises, Inc. Method and apparatus for multipoint voice operation in a wireless, Ad-Hoc environment
GB2423892A (en) * 2005-03-04 2006-09-06 Itt Mfg Enterprises Inc Point to multipoint voice operation in an ad-hoc wireless network
GB2423892B (en) * 2005-03-04 2010-07-14 Itt Mfg Enterprises Inc Method and apparatus for multipoint voice operation in a wireless, AD-HOC environment
US7924735B2 (en) 2005-05-20 2011-04-12 Agency For Science, Technology And Research Virtual grid
WO2006123999A1 (en) * 2005-05-20 2006-11-23 Agency For Science, Technology And Research A virtual grid
US7519359B2 (en) 2005-09-30 2009-04-14 Motorola, Inc. Voice tagging of automated menu location
US8275866B2 (en) * 2007-11-13 2012-09-25 At&T Intellectual Property I, L.P. Assigning telecommunications nodes to community of interest clusters
US8495201B2 (en) 2007-11-13 2013-07-23 At&T Intellectual Property I, L.P. Assigning telecommunications nodes to community of interest clusters
US8914491B2 (en) 2007-11-13 2014-12-16 At&T Intellectual Property, I, L.P. Assigning telecommunications nodes to community of interest clusters
CN101801113B (en) * 2009-02-05 2012-07-11 华为技术有限公司 Network topology cluster processing method and processing system
EP2911346A4 (en) * 2012-11-13 2015-09-23 Huawei Tech Co Ltd Method and network device for establishing virtual cluster
US10462048B2 (en) 2012-11-13 2019-10-29 Huawei Technologies Co., Ltd. Virtual cluster establishment method and network device
US10880936B2 (en) 2013-06-26 2020-12-29 Telefonaktiebolaget Lm Ericsson (Publ) Cluster head selection in a communications network
WO2015062642A1 (en) * 2013-10-30 2015-05-07 Nokia Solutions And Networks Oy D2d inter-cluster coordination
CN113556286A (en) * 2021-05-31 2021-10-26 北京邮电大学 Communication method and system of peer-to-peer network

Also Published As

Publication number Publication date
US7171476B2 (en) 2007-01-30
US20040003111A1 (en) 2004-01-01

Similar Documents

Publication Publication Date Title
US7171476B2 (en) Protocol and structure for self-organizing network
US20040018839A1 (en) Protocol and structure for mobile nodes in a self-organizing communication network
US5926101A (en) Method and apparatus for routing messages in a network of nodes with minimal resources
US8050196B2 (en) Method and apparatus for controlling packet transmissions within wireless networks to enhance network formation
JP5199061B2 (en) Hybrid mesh routing protocol
US7330694B2 (en) Method for setting up route path through route discovery in a mobile ad hoc network using partial route discovery
EP1994688B1 (en) Tree-guided distributed link state routing method
US7120683B2 (en) Single switch image for a stack of switches
US7242671B2 (en) System and method for link-state based proxy flooding of messages in a network
JP3810440B2 (en) Architecture for mobile radio networks with dynamically changing topology using virtual subnets
US7310335B1 (en) Multicast routing in ad-hoc networks
EP2466964B1 (en) Wireless Ad-hoc Network
JP4262784B2 (en) Wireless networked message routing means
US9253707B2 (en) Network interface unit for a node in a wireless multi-hop network, and a method of establishing a network path between nodes in a wireless multi-hop network
US20030235158A1 (en) Protocol for a self-organizing network using a logical spanning tree backbone
US20080040507A1 (en) Methods and systems for a routing protocol
WO2008106530A1 (en) Method and system for radio frequency management in a mesh network with a path distance factor
KR20090124899A (en) Method for multipath source routing in sensor network
WO2007001286A1 (en) Method for discovering routes in wireless communications networks
JP2009542109A (en) Mobile ad hoc network (MANET) and method for implementing multiple paths for fault tolerance
AU2014252152B2 (en) SMF-type communication method for a manet network, network node and mobile network which implement this communication method
WO1997002680A1 (en) A method and apparatus for routing messages in a network of nodes
JP5004999B2 (en) Hybrid mesh routing protocol
JP3559508B2 (en) Packet transfer route search method and method for checking communication possibility of wireless node with gateway node
CN110996266B (en) Multicast group data transmission method of ad hoc network system

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG UZ VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP