WO2004054100A2 - System and method for link-state based proxy flooding of messages in a network - Google Patents

System and method for link-state based proxy flooding of messages in a network Download PDF

Info

Publication number
WO2004054100A2
WO2004054100A2 PCT/US2003/039527 US0339527W WO2004054100A2 WO 2004054100 A2 WO2004054100 A2 WO 2004054100A2 US 0339527 W US0339527 W US 0339527W WO 2004054100 A2 WO2004054100 A2 WO 2004054100A2
Authority
WO
WIPO (PCT)
Prior art keywords
flooding
node
lsa
packet
communication network
Prior art date
Application number
PCT/US2003/039527
Other languages
French (fr)
Other versions
WO2004054100A3 (en
Inventor
Chris Cho-Pin Li
Chang-June Yoon
Original Assignee
Itt Manufacturing Enterprises, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Itt Manufacturing Enterprises, Inc. filed Critical Itt Manufacturing Enterprises, Inc.
Priority to GB0510986A priority Critical patent/GB2415322B/en
Priority to AU2003296959A priority patent/AU2003296959B2/en
Publication of WO2004054100A2 publication Critical patent/WO2004054100A2/en
Publication of WO2004054100A3 publication Critical patent/WO2004054100A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/02Topology update or discovery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/20Hop count for routing purposes, e.g. TTL
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems 
    • H04L12/56Packet switching systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/02Topology update or discovery
    • H04L45/03Topology update or discovery by updating link state protocols

Definitions

  • This invention relates, in general, to systems communicating in a network and, more particularly, to a system and method employing link-state based routing of messages in the network with reduced amount of flooding overhead.
  • wireless networks such as cellular telephone systems
  • the first tier typically includes clusters or cells, each including communication nodes or cluster members.
  • One node within each cluster is designated a cluster head or base station.
  • the second tier includes a backbone network formed of the cluster head nodes to enable communications between different clusters.
  • the formation of clusters and designation of cluster head nodes is generally performed dynamically and in accordance with an intranet protocol (e.g., a protocol for communications within the two-tier network) that further performs routing functions within the network.
  • the intranet protocol may be a link-state type of routing protocol that is implemented on the backbone network.
  • the cluster head nodes each include a database that is synchronized with other head node databases by transference of link- state advertisement (LSA) packets in accordance with the protocol.
  • LSA link- state advertisement
  • DV distance-vector
  • LS link-state
  • the amount of flooding overhead for the dissemination of routing information by these routing approaches is generally influenced by two key factors, namely, network size and volatility of network connectivity.
  • the amount of flooding overhead usually increases, when the network size increases and/or the underlying network becomes more volatile.
  • conventional DV and LS protocols deploy a two-way exchange scheme. When a communication node running the DV or LS protocol needs to distribute a piece of routing information to its routing neighbor(s), it sends a point-to-point packet to the neighbor.
  • the routing neighbor Upon reception of the routing packet, the routing neighbor returns an acknowledgment packet back to the sender of the routing packet.
  • the communication node sends one broadcast routing packet to all the routing neighbors, which return point-to-point acknowledgment packets back to the communication node after the routing packet is received.
  • the amount of flooding overhead generally, increases exponentially faster than the increase of network size. In fact, the amount of flooding overhead generated by these conventional approaches is manageable only for small scale networks ( ⁇ 30 communication nodes). For large scale networks, the amount of flooding overhead tends to overwhelm the network and result in network communication breakdown. In addition, volatile network connectivity tends to introduce more changes in network link metrics, which in turn causes more routing information to be distributed in the network.
  • U.S. Patent No. 6,385,174 issued to one of the inventors of the present invention, on May 7, 2002, discloses a method of transmitting LSA packets or messages within a wireless communication system.
  • the method utilizes a version of an open shortest path first (OSPF) routing protocol or a radio open shortest path first (ROSPF) routing protocol.
  • OSPF open shortest path first
  • ROSPF radio open shortest path first
  • ROSPF LSA type packets are transmitted to neighbors of each node to enable each database to maintain current information.
  • ROSPF LSA type packets are transmitted within an intranet protocol that is periodically broadcasted within the network. In this manner, the increase in overhead flooding rate is reduced.
  • flooding overhead is reduced using the system described in the patent, nevertheless, as the number of nodes increases in a network, the amount of flooding overhead increases exponentially. Because the amount of flooding overhead generated by conventional flooding approaches increases exponentially faster than the underlying network size, traditional approaches are only workable in smaller scale networks, with relative stable network connectivity. For larger scale and/or more volatile networks, conventional approaches tend to generate too much flooding overhead that shuts down communication in the underlying network.
  • the present invention provides a method of disseminating information in a communication network having a plurality of nodes.
  • the method includes the steps of (a) receiving, in a node, a packet including link-state advertisements (LSAs) from the communication network, where at least one LSA includes a flooding status field; (b) determining, in the node, a type of LSA received based on the flooding status field; and (c) re-flooding the packet, from the node, onto the communication network, based on the type of LSA determined in step (b).
  • LSAs link-state advertisements
  • Step (a) of the invention also includes receiving a bit in the flooding status field indicating the at least one LSA is intended for distribution to the e ntire communication network.
  • Step (c) of the invention also includes re-flooding, from the node, the at least one LSA onto the communication network in response to the bit in the flooding status field.
  • Step (a) further includes receiving a bit in the flooding status field indicating the at least one LSA is intended for distribution to other nodes in the communication network located within a predetermined range of the node.
  • Step (c) further includes preventing re-flooding of the at least one LSA, from the node, if the other nodes in the communication network are located outside of the predetermined range.
  • Step (a) of the invention still further includes receiving a sub-field in the flooding status field indicating a time-to-live (TTL) value.
  • Step (c) of the invention still further includes re-flooding the at least one LSA, from the node, onto the communication network, if the received TTL value is greater than a value of one, and preventing re-flooding of the at least one LSA if the received TTL value is equal to a value of zero.
  • TTL time-to-live
  • the node includes a re-flood timer and the method includes waiting an interval of time for the re-flood timer to expire.
  • the method re-floods the packet, from the node, onto the communication network, after waiting the interval of time for the re-flood timer to expire.
  • the method further includes receiving a sub-field in the flooding status field that indicates an urgency level for the at least one LSA.
  • the method sets the re- flood timer to expire based on the indicated urgency level.
  • the method then waits for the re-flood timer to expire and then re-floods the packet from the node onto the communication network.
  • the invention includes a method of disseminating information in a communication network having a plurality of clusters, a cluster having a flooding proxy node and at least one flooding group member node.
  • the method includes the steps of (a) receiving, in a flooding proxy node of a first cluster, a packet from a sender node in the communication network; (b) determining, in the flooding proxy node, if the sender node is one of (i) a flooding group member node of the first cluster and (ii) a flooding proxy node of a second cluster in the communication network; and (c) re-flooding the packet, from the flooding proxy node, onto the communication network if step (b) determines that the sender node is either the flooding group member node of the first cluster or the flooding proxy node of the second cluster.
  • the method prevents, in the flooding proxy node, re-flooding of the packet if step (b) determines that the sender node is not the flooding group member node of the first cluster and not the flooding proxy node of the second cluster.
  • the method also determines, in a flooding proxy node, a number for expected receivers of the packet.
  • the method then re-floods the packet, from the flooding proxy node, onto the communication network, by broadcasting the packet onto the communication network, if the number determined is larger than a predetermined integer value.
  • the method also re-floods the packet, from the flooding proxy node, onto the communication network, by point-to-point communication to each of the expected receivers of the packet, if the number determined is smaller than or equal to the predetermined integer value.
  • the invention includes a node disseminating information by transmitting link state advertisements (LSAs) to other nodes in a network.
  • the node includes a transmitter for transmitting LSAs to other nodes in the network, and a processor for assembling at least one LSA and providing the LSA to the transmitter for transmission onto the network.
  • the processor includes an engine for generating a flooding status field in the at least one LSA.
  • the flooding status field includes a flooding scope flag indicating the at least one LSA is intended for distribution to either (a) other nodes in the entire network or (b) other nodes located within a predetermined range of the node.
  • the flooding status field also includes a sub-field indicating a time- to-live (TTL) value. If the TTL value is greater than a value of one, the processor provides the LSA to the transmitter for transmission onto the network. If the TTL value is less than or equal to a value of one, the processor prevents the LSA from being provided to the transmitter for transmission onto the network.
  • FIG. 1 is a diagrammatic illustration of network nodes arranged in an exemplary communication network
  • FIGS. 2-4 illustrate different link-state advertisement (LSA) status fields provided by nodes shown in FIG. 1 when communicating LSA packets, in accordance with the present invention
  • FIG. 5 is a procedural flow chart illustrating a method in which a flooding group member (FGM) of a network transmits a FGM originated LSA packet into the network, according to an embodiment of the invention
  • FIG. 6 is a procedural flow chart illustrating a method in which a flooding group member (FGM) of a network receives a LSA packet from a flooding proxy (FP) of the network, according to an embodiment of the invention
  • FIG. 7 is a procedural flow chart illustrating a method in which a FP of a network transmits a FP originated LSA packet into the network, according to an embodiment of the invention
  • FIG. 8 is a procedural flow chart illustrating a method in which a FP of a network receives a LSA packet from a neighbor FP or its own FGM in the network, according to an embodiment of the invention
  • FIG. 9 is a procedural flow chart illustrating a method in which a FP or a FGM of a network acknowledges a received LSA packet, according to an embodiment of the invention.
  • FIGS. 10-12 are procedural flow charts illustrating a method in which a FP of a network floods, or transmits, a LSA packet into the network, according to an embodiment of the invention
  • FIG. 13 is a block diagram of a node in the network of FIG. 1, in accordance with an embodiment of the invention.
  • the present invention disseminates routing information over a two-tier flooding architecture. With this flooding architecture, redundant flooding (or reflooding) of routing information is greatly reduced. As will be described, the present invention includes a method for transmitting and acknowledging received messages, which dramatically reduces the amount of overhead required to ensure reliable information dissemination in the network.
  • wireless network 2 includes a plurality of nodes 10 arranged in cells or clusters 12. Each cell or cluster includes corresponding cluster member nodes 10, with one of the cluster member nodes designated as a cluster head node, or base station 14.
  • These cluster arrangements form the first tier of network 2 and facilitate communication within a cluster between the cluster head and member nodes, preferably utilizing a first transmission frequency.
  • the head nodes of each cluster are in communication with each other, preferably utilizing a second transmission frequency, and form backbone network 16.
  • the backbone network forms the second tier of network 2 and facilitates communications between nodes of different clusters (generally providing communications over greater distances).
  • the architecture of network 2 employs a two-tier flooding architecture for information dissemination.
  • Each cell or cluster 12 is grouped into a different flooding group (FG).
  • FG flooding group
  • a node, designated as 14, having connections to all the other member nodes within FG. 12, is selected as a flooding proxy (FP).
  • FP flooding proxy
  • the nodes connected to a FP are referred to herein as FG members (FGM) connected to a FP in tier-1.
  • FGM FG members
  • the FPs linked by backbone network 16 are also referred to as FPs linked by main flooding paths (MFPs) 16 in tier-2.
  • MFPs main flooding paths
  • a FGM When disseminating LSAs in the network, a FGM first sends an LSA packet to its FP via point-to-point transmission and the FP, in turn, floods the packet over the MFPs via broadcast transmission. As the LSA packet propagates across the MFP through broadcast transmissions, all FGMs affiliated with the broadcasting FP, and the FP's FP neighbors may be able to receive the packet. With the deployment of broadcast flooding on the MFP, explicit point-to-point acknowledgements (ACKs) are generally not required, because continued broadcasts may also serve as implied ACKs for the received LSA packets.
  • ACKs point-to-point acknowledgements
  • the present invention uses a link-state proxy flooding protocol (LSPFP) which efficiently disseminates LSAs over a large scale network, using the two-tier flooding architecture described with respect to FIG. 1.
  • LSPFP protocol may be implemented by two functional groups, namely, flooding group member (FGM) based functions, and flooding proxy (FP) based functions. As their names imply, the execution of these functions is dependent on the role (FGM or FP) of the respective node.
  • FGM flooding group member
  • FP flooding proxy
  • LSAs In link-state (LS) routing, not all LSAs created by the LS routing engine are equal. Thus, some LSAs may be flooded rapidly, while other LSAs may be flooded at a slower pace. Also, some LSAs may be required to be flooded reliably and some may only need to be flooded within a predefined distance away from the originator node of the LSAs. As a result, different flooding services may be used which incur different flooding overhead.
  • Flooding services supported by this invention, vary according to the needs of the users (LS routing engine of a node) and may include the followi ng :
  • a link-state routing engine may first select a flooding service and then pass the LSA to the LSPFP for flooding.
  • the present invention employs a LSA status field attached to each LSA.
  • the LSA status field is shown in FIG. 2.
  • the S and R sub- fields in FIG. 2 represent a LSA flooding scope flag (FSF) and a flooding reliability flag (FRF), respectively.
  • the FSF and FRF are set and used as explained below.
  • the FSF, S has a value of either GLOBAL or LOCAL, and indicates the intended flooding scope for the associated LSA.
  • the LSA is flooded to the entire network if S is set to GLOBAL.
  • S is set to GLOBAL for the RGF and NGF flooding services.
  • the LSA is distributed to the communication nodes located within a predefined distance from the LSA originator node.
  • S is set to LOCAL for RLF and NLF flooding services.
  • the U sub-field is used to control the flooding pace of the associated LSA.
  • U [0,1,2,... Umax] and a higher U value indicates a more urgent LSA.
  • TTL Time-To-Live
  • the TTL sub-field specifies the number of hops the LSA may travel before flooding is stopped.
  • the TTL sub-field indicates a radius of the flooding range for the local flooding service.
  • the FRF, R has a value of either NORMAL or RELIABLE, and indicates whether reliability is required for the dissemination of the associated LSA.
  • R When R is set to RELIABLE, the LSA is flooded reliably. On the other hand, reliability is not guaranteed, if R is set to NORMAL.
  • R is set to RELIABLE for RGF and RLF flooding services and set to NORMAL for NGF and NLF flooding services.
  • the LSPFP utilizes four types of protocol timers to control the pace of LSA flooding and support the various flooding services.
  • These LSPFP protocol timers are as follows:
  • the ACK timers (T AC ⁇ ,u) are indexed by the urgency (U) sub-field in the associated LSA status field (see FIGS. 3 and 4).
  • the ACK timers are set for transmissions of acknowledgment (ACK) messages to the associated communication nodes. When an ACK timer expires, an ACK message is sent to the associated node.
  • the ACK timers are maintained in the FGMs, and
  • the ACK timeout timers (T' A c ⁇ ,u) are indexed by the urgency (U) sub-field in the associated LSA status field (see FIGS. 3 and 4).
  • the ACK timeout timers are set for the reception of an expected ACK message.
  • An expired ACK timeout timer indicates an event of failing to receive an expected ACK message.
  • the ACK timeout timers are maintained in the FPs, and T' ACK ,o> T' A c ⁇ , ⁇ >
  • the re-flood timers (T re - f i 00d, u) are indexed by the urgency (U) sub-field in the associated LSA status field (see FIGS. 3 and 4).
  • the re-flood timers are set to schedule a flooding of associated LSAs. When a re-flood timer expires, LSAs are flooded to the next hop.
  • the re- flood timers are maintained in the FPs and FGMs, and T re - fiood,0 > T re -fl 00 d.i >T re -fl 00 d /2 > ....
  • the re-flood timeout timers (T' re - fiood.u) are indexed by the urgency (U) sub-field in the associated LSA status field (see FIGS. 3 and 4).
  • the re-flood timeout timers are set for the reception of an expected LSA. An expired re-flood timeout timer indicates the event of failing to receive an expected LSA.
  • the re-flood timeout timers are maintained in the FPs and FGMs, and T' re - flood-O ⁇ T re-flood, 1 > T re-flood,2 '* ••• ⁇ ⁇ T re-flood, Umax-
  • the intervals of the LSPFP protocol timers may be set to satisfy the following relationships:
  • timer parameters may be tuned and adjusted to meet network performance requirements.
  • the intervals of the LSPFP timers may be constructed using the following relationship:
  • Time Fixed + random(Offset) where the fixed portion of the timer interval is configurable, and the random portion is a uniform distribution function (0, Offset).
  • FIGS. 5-12 depict methods executed by a FGM
  • FIGS. 7-12 depict methods executed by a FP.
  • Method 20 is executed when a new LSA is received from a routing engine of the FGM for further dissemination.
  • a new LSA is generated by the FGM (for example, node 10 in FIG. 1) in step 21.
  • the method sets the status field of the LSA (step 22), marks the new LSA for re-flood and sets a T re -tiood.u timer, which indicates the level of urgency of the LSA (step 23).
  • the method waits for the re-flood timer to expire (step 24).
  • the method After the timer expires, the method enters step 25 and packs all pending LSAs into a new packet, while also deleting all other pending re-flood timers.
  • the LSA packet is transmitted to the FP (for example, node 14 in FIG. 1), using point-to-point communication (step 26).
  • the method then enters decision box 27 and determines whether any of the transmitted LSAs are marked RELIABLE. If none of the LSAs are marked RELIABLE, the method branches to step 33 and exits. If a LSA that is marked RELIABLE has been transmitted, however, the method branches to step 28 and sets the re-flood timeout timer (indexed by the urgency level).
  • the method then waits for an acknowledgement to be received from the FP (node 14) in step 29. If an acknowledgement is received, or an implied acknowledgement is received, the method deletes the pending re-flood timeout timer (step 31) and exits (step 33).
  • the method enters decision box 30.
  • the method decides whether to again transmit the LSA packet (i.e. re-flood). If the number of re-flood attempts are greater than a predetermined number (for example 5), the method branches to step 32 and breaks communication with the FP. The method also informs its grouping module that transmissions of LSAs to the FP have failed, and exits in step 33. If the number of re-flood attempts do not exceed the predetermined number, the method branches back to step 25 and re-floods the LSA packet.
  • a predetermined number for example 5
  • Method 40 for reception of LSAs from a FP.
  • Method 40 is executed when a new LSA is received by a FGM (own FGM).
  • the method executed in the own FGM, receives a new LSA packet (step 41).
  • the method then enters decision box 42 and determines whether the LSA is sent from a FP belonging in the same flooding group (for example 12 in FIG. 1) of this own FGM. If the received LSA packet is not from its own FP, the method branches to step 49 and exits. If the received LSA packet is from its own FP, however, the method branches to decision box 43, and determines whether the received LSA is new, or more recent. If it is new, or more recent, the method enters step 44, updates the LSA database, and acknowledges the received LSA (entry point 1, see FIG. 9).
  • the received LSA packet is sent point-to-point, as determined in decision box 45, the received LSA is acknowledged (see FIG. 9). If the received LSA is not sent point-to-point (e.g. broadcast), however, the method enters decision box 47 and determines whether the received LSA contains a list identifying nodes that have not acknowledged. If no list is included in the packet, the method exits in step 49. If a list is included, however, the method enters decision box 48 and determines if own FGM is identified in the list. If own FGM is, in fact, identified in the list, the method branches to entry point 1 and acknowledges the received LSA (see FIG. 9).
  • decision box 47 determines whether the received LSA contains a list identifying nodes that have not acknowledged. If no list is included in the packet, the method exits in step 49. If a list is included, however, the method enters decision box 48 and determines if own FGM is identified in the list. If own FGM is, in fact, identified in the list, the method branches to entry
  • a method of the invention for a FP injecting (transmitting) a new LSA into the network.
  • the new LSA injected into the network is assumed to originate in the FP (own FP).
  • the method executed in the own FP, generates a new LSA in step 51.
  • the status field of the LSA is set in step 52.
  • the LSA is marked for re-flood, and the re- flood timer (with the appropriate urgency level) is set in step 53. (It will be appreciated that re-flooding, as used in step 53, is flooding which occurs for the first time.)
  • step 54 the method performs various steps identified in FIG. 11 (entry point 3). These steps include transmitting (or flooding) the LSA packet by broadcast or by point-to-point (unicast) communication. These steps are described later with respect to FIG. 11.
  • a method of the invention for a FP (own FP) receiving a LSA packet from a FGM or another (neighbor) FP.
  • the method executed by the own FP receives a new LSA packet from its neighbor FP or from its own FGM (step 61). If the received LSA packet is not sent by unicast (point-to-point) and the sender is not a FP neighbor (as determined by decision boxes 62 and 66), the method enters step 71 and exits.
  • the method floods the received LSA packet (entry point 2 of FIG. 10).
  • the method does not flood the received LSA packet.
  • the method only acknowledges the received LSA (entry point 1 of FIG. 9).
  • the method exits in step 65. If the received LSA packet is not sent by unicast, and the sender is its FP neighbor, and the received LSA packet is not new, as determined by decision boxes 62, 66 and 67, the method determines whether the received LSA packet contains a list of node IDs that have not acknowledged (decision box 69). If the list does not include own ID, as determined by decision box 70, the method exits in step 71. If the list does include own ID, however, the method branches to entry point 1 and acknowledges the received LSA (FIG. 9).
  • Method 90 may be executed by a FP or a FGM.
  • decision box 91 determines whether the received LSA is marked RELIABLE. If it is not (e.g. marked NORMAL), the method exits in step 98.
  • step 92 is entered and the received LSA is marked for acknowledgement.
  • the acknowledge timer (with the appropriate urgency level) is set in step 93.
  • the method waits for the timer to expire (step 94) and then forms an acknowledge packet to acknowledge the received LSA (and other unacknowledged LSAs received from the sender node) (step 95). All pending acknowledge timers are deleted (step 96) and the acknowledge packet is transmitted to the sender, via point-to-point communication (step 97).
  • the method for acknowledging ends at step 98.
  • FIG. 10 there is shown method 100 for flooding a received LSA, in accordance with an embodiment of the invention.
  • the method first updates the LSA database (step 101) and then updates the status fields of all the new LSAs (step 102).
  • the new LSAs (either having a status field of GLOBAL or LOCAL (with TTL>0)) are marked for re-flood (step 103).
  • the re-flood times with an appropriate urgency level is set for every LSA (step 104).
  • the method waits for the timer to expire (step 105) and, upon expiration, enters point 3 of FIG. 11.
  • method 100 continues by entering decision box 111. If the number of expected receivers of the LSA packet is less than a predetermined number N (for example 32), the method branches to step 113 and packs all pending LSAs into a new packet. The new packet is sent by point-to-point communication to each expected receiving node (step 115). The method then branches to step 116.
  • N for example 32
  • the method branches from decision box 111 to step 112, and packs all pending LSAs, as well as an unacknowledged node list, into a new packet.
  • the new LSA packet is sent by broadcast communication (step 114).
  • Other pending re-flood timers are deleted (step 116) and decision box 120 is entered.
  • the method exits in step 121. If an LSA is marked RELIABLE, however, but all the LSAs are LOCAL and have a TTL of 1 (one-hop away) the method also exits, as determined by decision box 122. If the LSAs are not LOCAL (but GLOBAL) and have a TTL not equal to 1, the method branches to decision box 117.
  • the method determines if it has any FGMs. If it does, the method sets an acknowledge timeout timer (indexed by an appropriate urgency level) (step 118), associates its unacknowledged FGMs to the timer (step 119), and branches to decision box 123.
  • an acknowledge timeout timer indexed by an appropriate urgency level
  • the method After determining whether the FP has any FGMs, the method enters decision box 123 and determines whether it (the FP) has any FP neighbors. If it does, the method sets the re-flood timeout timer (based on an appropriate urgency level) (step 124), associates its unacknowledged FP neighbors to the timer (step 125), and branches to entry point 4 (FIG. 12).
  • method 100 waits for the timers to expire (step 132). Describing first the right side of FIG. 12, after the re-flood timeout timer expires, the method enters decision box 139. If the acknowledge timeout timer is still pending, the method deletes (cancels) the acknowledge timeout timer (step 142) and enters decision box 140. After the acknowledge timeout timer expires, the method also enters decision box 140. If the FP has reached a predetermined number of tries (for example, 5) in attempting to receive an acknowledgment from another node, the method enters step 143 and drops the links with the unacknowledging nodes, informs its grouping module (FIG.
  • a predetermined number of tries for example, 5
  • step 141 creates an unacknowledging node list, and again attempts another transmission (point- to-point or broadcast) by entering step 111 (entry point 3 of FIG. 11).
  • step 132 if the aforementioned timeout timers have not expired and an acknowledgement packet is received from an FGM, the method branches to decision box 138 and waits for all the acknowledgement packets to be received from all its FGMs. After all the acknowledgement packets have been received, the method branches to step 135 and deletes the acknowledge timeout timer (step 135).
  • the method waits for the timer to expire by branching back to step 132. After expiration of the re-flood timeout timer, the method enters step 137 and exits.
  • a network node, generally designated as 150, according to the present invention, is illustrated in FIG. 13. As shown, node 150 includes processor 151, data link layer 152, modem 153, transceiver 154 and antenna 155.
  • the processor is preferably implemented by a conventional microprocessor or controller and controls the node to transmit and receive messages in accordance with the communication methods and protocols described earlier.
  • the transmitter portion of transceiver 154 is preferably implemented by a conventional transmitter and transmits messages from the processor, preferably in the form of radio frequency (RF) signals, in accordance with processor instructions.
  • the receiver portion is typically implemented by a conventional receiver and configured to receive signals, preferably in the form of radio frequency (RF) signals, transmitted by the transmitter of another node. The receiver receives transmitted signals and forwards the received signals to the processor for processing.
  • a present invention FP node is substantially similar to a FGM node.
  • Processor 151 includes forwarding engine 156, coupled between data link layer 152 and upper layer modules (not shown).
  • upper layer modules may provide application software for appliances or computers invoking different protocols, for example, a point-to-point protocol (PPP) or an application program interface (API) protocol.
  • PPP point-to-point protocol
  • API application program interface
  • the link-state proxy flooding protocol (LSPFP), including the various methods of the invention, as previously described, is executed in LSPFP module 159 and is controlled by timer module 160.
  • the timer module incl udes the multiple timers, each with its respective urgency level, as described previously. These timers may include the ACK timers, ACK timeout timers, re-flood timers and re-flood timeout timers.
  • Grouping engine 158 may group multiple LSAs into one packet for transmission. Routing engine 157 may control whether the processor is in a receive mode for receiving packets from transceiver 154 and then sending them to the upper layer modules, or whether the processor is in a transmit mode for transmitting packets arriving from the upper layer modules.
  • the communication networks employing the present invention nodes may include any quantity of those nodes or tiers.
  • the network nodes may be arranged in any fashion into any quantity of clusters or cells each having any quantity of nodes and head nodes.
  • the backbone network may include any quantity of head nodes, while communications within a cluster and between neighboring cluster head nodes of the backbone network may utilize the same or different transmission frequencies.
  • the formation of cells and designation of head nodes may be predetermined or accomplished dynamically via any conventional or other algorithm or technique.
  • the nodes may communicate via any suitable communications medium (e.g., wired or wireless communication devices, etc.).
  • the present invention node may include any quantity of conventional or other transmitters, where each transmitter may transmit signals at any suitable frequency and in any suitable energy form (e.g., radio signals, microwave, optical signals, etc.), and any quantity of conventional or other receivers, where each receiver may receive signals at any suitable frequency and in any suitable energy form (e.g., radio signals, microwave, optical signals etc.).
  • the present invention node may include any quantity of combined transmitting/receiving devices.
  • the processor of the present invention node may be implemented by any conventional or other microprocessor, controller or circuitry to perform the functions described herein, while any quantity of processors or processing devices or circuitry may be employed within the present invention node where the processor functions may be distributed in any fashion among any quantity of modules, processors or other processing devices or circuits.
  • the software for the processor of the present invention node may be implemented in any suitable computer language, and could be developed by one of ordinary skill in the computer and/or programming arts based on the functional description contained herein and the flow charts illustrated in the drawings. Further, any references herein of software performing various functions generally refer to processors performing those functions under software control.
  • the software and/or algorithms described above and illustrated in the flow charts may be modified in any manner that accomplishes the functions described herein.
  • the present invention node may alternatively include any components arranged in any fashion to facilitate distribution of packets within the network in the manner described above.
  • the LSA packets or message may be of any size, may have any format, and may contain and desired information.
  • the packets may be transmitted at any suitable transmission rate or have any desired interval between transmissions.
  • the re-transmission timers may be implemented by any conventional or other timing mechanisms (e.g., processor clock, external hardware, software, etc.) and may be set to any desired intervals for re- transmission of any packets.
  • the timers may be associated with any types of packets to indicate re-transmission of those packets.
  • the member nodes may communicate a database update, acknowledgment or other type of packet to a cluster head node via any type of message.
  • the various messages may include any identifier to identify the type of message or packet.
  • the database update or other packets may be broadcast or transmitted any quantity of times to achieve a desired success rate, where the repeated packets may be disposed within the same or different node status packets in any desired combination or fashion.
  • the communication network may employ any suitable intranet and/or internetworking communications protocols to facilitate reception, processing and transference of messages or packets within or external of the network.
  • the present invention may be utilized within any intranet, internetworking or other protocol to transmit or flood messages within the network in accordance with the protocol.
  • the insertion of the database update packets within the LSA packet may be accomplished within any layer of the intranet or other protocol.
  • the node database may be implemented by any conventional database or other storage structure (e.g., processor memory, external memory, file, data structure (e.g., array, queue, stack, etc.), etc.) and may have any desired storage capacity to contain any desired information.

Abstract

The invention includes a method and apparatus for disseminating information in a communication network having a plurality of nodes. The method includes receiving, in a node, a packet including link-state advertisements (LSAs) from the communication network and a flooding status field. Based on the flooding status field, the node determines the type of LSA received and then re-floods the packet onto the communication network, based on the type of LSA determined from the flooding status field. A sub-field in the flooding status field indicates whether the LSA is intended for distribution to the entire communication network, or is intended for distribution to other nodes in the communication network located within a predetermined range of the node. The node prevents re­flooding of the LSA, if the other nodes in the communication network are located outside of the predetermined range. The node includes a re-flood timer which is set to expire based on an urgency level included in the flooding status field. The node waits for the re-flood timer to expire and then re-floods the LSA packet from the node onto the communication network.

Description

SYSTEM AND METHOD FOR LINK-STATE BASED PROXY FLOODING
OF MESSAGES IN A NETWORK
FIELD OF THE INVENTION
This invention relates, in general, to systems communicating in a network and, more particularly, to a system and method employing link-state based routing of messages in the network with reduced amount of flooding overhead.
BACKGROUND OF THE INVENTION
In general, wireless networks, such as cellular telephone systems, may be arranged in a two-tier architecture. The first tier typically includes clusters or cells, each including communication nodes or cluster members. One node within each cluster is designated a cluster head or base station. The second tier includes a backbone network formed of the cluster head nodes to enable communications between different clusters. The formation of clusters and designation of cluster head nodes is generally performed dynamically and in accordance with an intranet protocol (e.g., a protocol for communications within the two-tier network) that further performs routing functions within the network. The intranet protocol may be a link-state type of routing protocol that is implemented on the backbone network. The cluster head nodes each include a database that is synchronized with other head node databases by transference of link- state advertisement (LSA) packets in accordance with the protocol. These databases include information enabling the cluster head nodes to determine appropriate paths for routing messages through the network, while the LSA packets provide information to update the databases.
For routing in mobile ad hoc networks, general purpose routing schemes, such as distance-vector (DV) and link-state (LS), distribute routing information to communication peers within the network. The amount of flooding overhead for the dissemination of routing information by these routing approaches is generally influenced by two key factors, namely, network size and volatility of network connectivity. The amount of flooding overhead usually increases, when the network size increases and/or the underlying network becomes more volatile. To reliably disseminate routing information, conventional DV and LS protocols deploy a two-way exchange scheme. When a communication node running the DV or LS protocol needs to distribute a piece of routing information to its routing neighbor(s), it sends a point-to-point packet to the neighbor. Upon reception of the routing packet, the routing neighbor returns an acknowledgment packet back to the sender of the routing packet. When it has two or more routing neighbors, instead of sending separate point-to-point routing packets to each routing neighbor, the communication node sends one broadcast routing packet to all the routing neighbors, which return point-to-point acknowledgment packets back to the communication node after the routing packet is received. The amount of flooding overhead, generally, increases exponentially faster than the increase of network size. In fact, the amount of flooding overhead generated by these conventional approaches is manageable only for small scale networks (<30 communication nodes). For large scale networks, the amount of flooding overhead tends to overwhelm the network and result in network communication breakdown. In addition, volatile network connectivity tends to introduce more changes in network link metrics, which in turn causes more routing information to be distributed in the network.
U.S. Patent No. 6,385,174, issued to one of the inventors of the present invention, on May 7, 2002, discloses a method of transmitting LSA packets or messages within a wireless communication system. The method utilizes a version of an open shortest path first (OSPF) routing protocol or a radio open shortest path first (ROSPF) routing protocol. This patent is incorporated herein by reference in its entirety.
As described in the patent, ROSPF LSA type packets are transmitted to neighbors of each node to enable each database to maintain current information. In order to reduce overhead of transmitting numerous LSA type packets, ROSPF LSA type packets are transmitted within an intranet protocol that is periodically broadcasted within the network. In this manner, the increase in overhead flooding rate is reduced.
Although the flooding overhead is reduced using the system described in the patent, nevertheless, as the number of nodes increases in a network, the amount of flooding overhead increases exponentially. Because the amount of flooding overhead generated by conventional flooding approaches increases exponentially faster than the underlying network size, traditional approaches are only workable in smaller scale networks, with relative stable network connectivity. For larger scale and/or more volatile networks, conventional approaches tend to generate too much flooding overhead that shuts down communication in the underlying network.
What is needed is a system and method that disseminates routing information that further eliminates redundant flooding of information. The present invention addresses this need. SUMMARY OF THE INVENTION
To meet this and other needs, and in view of its purposes, the present invention provides a method of disseminating information in a communication network having a plurality of nodes. The method includes the steps of (a) receiving, in a node, a packet including link-state advertisements (LSAs) from the communication network, where at least one LSA includes a flooding status field; (b) determining, in the node, a type of LSA received based on the flooding status field; and (c) re-flooding the packet, from the node, onto the communication network, based on the type of LSA determined in step (b). Step (a) of the invention also includes receiving a bit in the flooding status field indicating the at least one LSA is intended for distribution to the e ntire communication network. Step (c) of the invention also includes re-flooding, from the node, the at least one LSA onto the communication network in response to the bit in the flooding status field. Step (a) further includes receiving a bit in the flooding status field indicating the at least one LSA is intended for distribution to other nodes in the communication network located within a predetermined range of the node. Step (c) further includes preventing re-flooding of the at least one LSA, from the node, if the other nodes in the communication network are located outside of the predetermined range. Step (a) of the invention still further includes receiving a sub-field in the flooding status field indicating a time-to-live (TTL) value. Step (c) of the invention still further includes re-flooding the at least one LSA, from the node, onto the communication network, if the received TTL value is greater than a value of one, and preventing re-flooding of the at least one LSA if the received TTL value is equal to a value of zero.
In another embodiment of the invention, the node includes a re-flood timer and the method includes waiting an interval of time for the re-flood timer to expire. The method re-floods the packet, from the node, onto the communication network, after waiting the interval of time for the re-flood timer to expire. The method further includes receiving a sub-field in the flooding status field that indicates an urgency level for the at least one LSA. The method sets the re- flood timer to expire based on the indicated urgency level. The method then waits for the re-flood timer to expire and then re-floods the packet from the node onto the communication network. In another embodiment, the invention includes a method of disseminating information in a communication network having a plurality of clusters, a cluster having a flooding proxy node and at least one flooding group member node. The method includes the steps of (a) receiving, in a flooding proxy node of a first cluster, a packet from a sender node in the communication network; (b) determining, in the flooding proxy node, if the sender node is one of (i) a flooding group member node of the first cluster and (ii) a flooding proxy node of a second cluster in the communication network; and (c) re-flooding the packet, from the flooding proxy node, onto the communication network if step (b) determines that the sender node is either the flooding group member node of the first cluster or the flooding proxy node of the second cluster.
In the other embodiment of the invention, the method prevents, in the flooding proxy node, re-flooding of the packet if step (b) determines that the sender node is not the flooding group member node of the first cluster and not the flooding proxy node of the second cluster. The method also determines, in a flooding proxy node, a number for expected receivers of the packet. The method then re-floods the packet, from the flooding proxy node, onto the communication network, by broadcasting the packet onto the communication network, if the number determined is larger than a predetermined integer value. The method also re-floods the packet, from the flooding proxy node, onto the communication network, by point-to-point communication to each of the expected receivers of the packet, if the number determined is smaller than or equal to the predetermined integer value.
In yet another embodiment, the invention includes a node disseminating information by transmitting link state advertisements (LSAs) to other nodes in a network. The node includes a transmitter for transmitting LSAs to other nodes in the network, and a processor for assembling at least one LSA and providing the LSA to the transmitter for transmission onto the network. The processor includes an engine for generating a flooding status field in the at least one LSA.
The flooding status field, in accordance with the invention, includes a flooding scope flag indicating the at least one LSA is intended for distribution to either (a) other nodes in the entire network or (b) other nodes located within a predetermined range of the node. The flooding status field also includes a sub-field indicating a time- to-live (TTL) value. If the TTL value is greater than a value of one, the processor provides the LSA to the transmitter for transmission onto the network. If the TTL value is less than or equal to a value of one, the processor prevents the LSA from being provided to the transmitter for transmission onto the network. It is understood that the foregoing general description and the following detailed description are exemplary, but are not restrictive, of the invention.
BRIEF DESCRIPTION OF THE DRAWINGS
The invention is best understood from the following detailed description when read in connection with the accompanying drawing. Included in the drawing are the following figures:
FIG. 1 is a diagrammatic illustration of network nodes arranged in an exemplary communication network;
FIGS. 2-4 illustrate different link-state advertisement (LSA) status fields provided by nodes shown in FIG. 1 when communicating LSA packets, in accordance with the present invention;
FIG. 5 is a procedural flow chart illustrating a method in which a flooding group member (FGM) of a network transmits a FGM originated LSA packet into the network, according to an embodiment of the invention; FIG. 6 is a procedural flow chart illustrating a method in which a flooding group member (FGM) of a network receives a LSA packet from a flooding proxy (FP) of the network, according to an embodiment of the invention;
FIG. 7 is a procedural flow chart illustrating a method in which a FP of a network transmits a FP originated LSA packet into the network, according to an embodiment of the invention;
FIG. 8 is a procedural flow chart illustrating a method in which a FP of a network receives a LSA packet from a neighbor FP or its own FGM in the network, according to an embodiment of the invention;
FIG. 9 is a procedural flow chart illustrating a method in which a FP or a FGM of a network acknowledges a received LSA packet, according to an embodiment of the invention;
FIGS. 10-12 are procedural flow charts illustrating a method in which a FP of a network floods, or transmits, a LSA packet into the network, according to an embodiment of the invention; and FIG. 13 is a block diagram of a node in the network of FIG. 1, in accordance with an embodiment of the invention. DETAILED DESCRIPTION OF THE INVENTION
The present invention disseminates routing information over a two-tier flooding architecture. With this flooding architecture, redundant flooding (or reflooding) of routing information is greatly reduced. As will be described, the present invention includes a method for transmitting and acknowledging received messages, which dramatically reduces the amount of overhead required to ensure reliable information dissemination in the network.
In general, the amount of flooding overhead generated by this invention is linearly proportional (and not exponentially proportional) to the increase of the underlying network size. As a result, when the network size increases, the amount of flooding overhead utilized by this invention increases at a much lower rate than conventional approaches. Since this invention is advantageously capable of flooding information reliably with much smaller overhead than conventional approaches, it may be used in networks that are much larger than conventional networks. Network nodes, according to the present invention, arranged in an exemplary two-tier wireless network are illustrated in FIG. 1. Specifically, wireless network 2 includes a plurality of nodes 10 arranged in cells or clusters 12. Each cell or cluster includes corresponding cluster member nodes 10, with one of the cluster member nodes designated as a cluster head node, or base station 14. These cluster arrangements form the first tier of network 2 and facilitate communication within a cluster between the cluster head and member nodes, preferably utilizing a first transmission frequency. The head nodes of each cluster are in communication with each other, preferably utilizing a second transmission frequency, and form backbone network 16. The backbone network forms the second tier of network 2 and facilitates communications between nodes of different clusters (generally providing communications over greater distances).
The architecture of network 2 employs a two-tier flooding architecture for information dissemination. Each cell or cluster 12 is grouped into a different flooding group (FG). Within each FG (designated as 12), a node, designated as 14, having connections to all the other member nodes within FG. 12, is selected as a flooding proxy (FP). The nodes connected to a FP are referred to herein as FG members (FGM) connected to a FP in tier-1. The FPs linked by backbone network 16 are also referred to as FPs linked by main flooding paths (MFPs) 16 in tier-2.
When disseminating LSAs in the network, a FGM first sends an LSA packet to its FP via point-to-point transmission and the FP, in turn, floods the packet over the MFPs via broadcast transmission. As the LSA packet propagates across the MFP through broadcast transmissions, all FGMs affiliated with the broadcasting FP, and the FP's FP neighbors may be able to receive the packet. With the deployment of broadcast flooding on the MFP, explicit point-to-point acknowledgements (ACKs) are generally not required, because continued broadcasts may also serve as implied ACKs for the received LSA packets.
As will be explained, the present invention uses a link-state proxy flooding protocol (LSPFP) which efficiently disseminates LSAs over a large scale network, using the two-tier flooding architecture described with respect to FIG. 1. In general, the LSPFP protocol may be implemented by two functional groups, namely, flooding group member (FGM) based functions, and flooding proxy (FP) based functions. As their names imply, the execution of these functions is dependent on the role (FGM or FP) of the respective node.
In link-state (LS) routing, not all LSAs created by the LS routing engine are equal. Thus, some LSAs may be flooded rapidly, while other LSAs may be flooded at a slower pace. Also, some LSAs may be required to be flooded reliably and some may only need to be flooded within a predefined distance away from the originator node of the LSAs. As a result, different flooding services may be used which incur different flooding overhead. Flooding services, supported by this invention, vary according to the needs of the users (LS routing engine of a node) and may include the followi ng :
(a) Reliable Global Flooding (RGF). This flooding service disseminates LSAs reliably throughout the network. This flooding service incurs the highest flooding overhead. (b) Normal Global Flooding (NGF). This flooding service disseminates LSAs throughout the network. Reliability is not guaranteed by this flooding service. The flooding overhead incurred by this flooding service is less than RGF.
(c) Reliable Local Flooding (RLF). This flooding service disseminates LSAs reliably within a predefined flooding range. This flooding service incurs less flooding overhead than RGF.
(d) Normal Local Flooding. This flooding service disseminates LSAs within a predefined flooding range. Reliability is not guaranteed by this flooding service. This flooding service incurs less flooding overhead than RLF.
A link-state routing engine may first select a flooding service and then pass the LSA to the LSPFP for flooding. The present invention employs a LSA status field attached to each LSA. The LSA status field is shown in FIG. 2. The S and R sub- fields in FIG. 2 represent a LSA flooding scope flag (FSF) and a flooding reliability flag (FRF), respectively. The FSF and FRF are set and used as explained below.
The FSF, S has a value of either GLOBAL or LOCAL, and indicates the intended flooding scope for the associated LSA. The LSA is flooded to the entire network if S is set to GLOBAL. S is set to GLOBAL for the RGF and NGF flooding services. On the other hand, when the LSA is set to LOCAL, the LSA is distributed to the communication nodes located within a predefined distance from the LSA originator node. S is set to LOCAL for RLF and NLF flooding services.
FIGS. 3 and 4 show formats of the LSA status field for S = GLOBAL and S = LOCAL, respectively. As depicted in FIGS. 3 and 4, both formats contain an urgency (U) sub-field. In the LSPFP protocol, the U sub-field is used to control the flooding pace of the associated LSA. In general, U = [0,1,2,... Umax] and a higher U value indicates a more urgent LSA.
The LSA status field for S = LOCAL contains an extra TTL (Time-To-Live) sub-field to support local flooding service. In the LSPFP protocol, the TTL sub-field specifies the number of hops the LSA may travel before flooding is stopped. In other words, the TTL sub-field indicates a radius of the flooding range for the local flooding service.
The FRF, R has a value of either NORMAL or RELIABLE, and indicates whether reliability is required for the dissemination of the associated LSA. When R is set to RELIABLE, the LSA is flooded reliably. On the other hand, reliability is not guaranteed, if R is set to NORMAL. R is set to RELIABLE for RGF and RLF flooding services and set to NORMAL for NGF and NLF flooding services.
As will be described, in embodiments of the invention, the LSPFP utilizes four types of protocol timers to control the pace of LSA flooding and support the various flooding services. These LSPFP protocol timers are as follows:
(a) ACK Timers. The ACK timers (TACκ,u) are indexed by the urgency (U) sub-field in the associated LSA status field (see FIGS. 3 and 4). The ACK timers are set for transmissions of acknowledgment (ACK) messages to the associated communication nodes. When an ACK timer expires, an ACK message is sent to the associated node. The ACK timers are maintained in the FGMs, and
TACK,0>TACK,1>TACK,2> >TACK,Umax- (b) ACK Timeout Timers. The ACK timeout timers (T'Acκ,u) are indexed by the urgency (U) sub-field in the associated LSA status field (see FIGS. 3 and 4). The ACK timeout timers are set for the reception of an expected ACK message. An expired ACK timeout timer indicates an event of failing to receive an expected ACK message. The ACK timeout timers are maintained in the FPs, and T'ACK,o> T'Acκ,ι>
T ACK^5* >T ACK.Umax-
(c) Re-Flood Timers. The re-flood timers (Tre-fi00d,u) are indexed by the urgency (U) sub-field in the associated LSA status field (see FIGS. 3 and 4). The re-flood timers are set to schedule a flooding of associated LSAs. When a re-flood timer expires, LSAs are flooded to the next hop. The re- flood timers are maintained in the FPs and FGMs, and Tre- fiood,0>Tre-fl00d.i >Tre-fl00d/2> .... >Tre-flood,.Jmax- (d) Re-Flood Timeout Timers. The re-flood timeout timers (T're- fiood.u) are indexed by the urgency (U) sub-field in the associated LSA status field (see FIGS. 3 and 4). The re-flood timeout timers are set for the reception of an expected LSA. An expired re-flood timeout timer indicates the event of failing to receive an expected LSA. The re-flood timeout timers are maintained in the FPs and FGMs, and T're- flood-O^T re-flood, 1>T re-flood,2 '* ••• ■ ^T re-flood, Umax-
For optimum performance, the intervals of the LSPFP protocol timers may be set to satisfy the following relationships:
Figure imgf000010_0001
T re-flood, U -* Tre-fiood,U TACK,U > "rre-fiood,U
TVe-fiood,u > TAcκ,u , and
T'ACK,U > T re-flood,U for a given urgency level U.
These timer parameters may be tuned and adjusted to meet network performance requirements.
To avoid synchronization of timers in the network, the intervals of the LSPFP timers may be constructed using the following relationship:
Time = Fixed + random(Offset) where the fixed portion of the timer interval is configurable, and the random portion is a uniform distribution function (0, Offset).
Having described the various flooding services and the various protocol timers, methods of the invention, executed by FGMs and FPs in a network, will now be described by reference to FIGS. 5-12. It will be appreciated that FIGS. 5-6 and 9 depict methods executed by a FGM, and FIGS. 7-12 depict methods executed by a FP.
Referring now to FIG. 5, there is shown a method of the invention, generally designated as 20, for injecting FGM originated LSAs into the network. Method 20 is executed when a new LSA is received from a routing engine of the FGM for further dissemination. As shown, a new LSA is generated by the FGM (for example, node 10 in FIG. 1) in step 21. The method sets the status field of the LSA (step 22), marks the new LSA for re-flood and sets a Tre -tiood.u timer, which indicates the level of urgency of the LSA (step 23). The method waits for the re-flood timer to expire (step 24). After the timer expires, the method enters step 25 and packs all pending LSAs into a new packet, while also deleting all other pending re-flood timers. The LSA packet is transmitted to the FP (for example, node 14 in FIG. 1), using point-to-point communication (step 26). The method then enters decision box 27 and determines whether any of the transmitted LSAs are marked RELIABLE. If none of the LSAs are marked RELIABLE, the method branches to step 33 and exits. If a LSA that is marked RELIABLE has been transmitted, however, the method branches to step 28 and sets the re-flood timeout timer (indexed by the urgency level).
The method then waits for an acknowledgement to be received from the FP (node 14) in step 29. If an acknowledgement is received, or an implied acknowledgement is received, the method deletes the pending re-flood timeout timer (step 31) and exits (step 33).
If the re-flood timeout timer expires without receiving an acknowledgment, however, the method enters decision box 30. The method decides whether to again transmit the LSA packet (i.e. re-flood). If the number of re-flood attempts are greater than a predetermined number (for example 5), the method branches to step 32 and breaks communication with the FP. The method also informs its grouping module that transmissions of LSAs to the FP have failed, and exits in step 33. If the number of re-flood attempts do not exceed the predetermined number, the method branches back to step 25 and re-floods the LSA packet.
Referring next to FIG. 6, there is shown a method of the invention, generally designated as 40, for reception of LSAs from a FP. Method 40 is executed when a new LSA is received by a FGM (own FGM). As shown, the method, executed in the own FGM, receives a new LSA packet (step 41). The method then enters decision box 42 and determines whether the LSA is sent from a FP belonging in the same flooding group (for example 12 in FIG. 1) of this own FGM. If the received LSA packet is not from its own FP, the method branches to step 49 and exits. If the received LSA packet is from its own FP, however, the method branches to decision box 43, and determines whether the received LSA is new, or more recent. If it is new, or more recent, the method enters step 44, updates the LSA database, and acknowledges the received LSA (entry point 1, see FIG. 9).
If the received LSA packet is sent point-to-point, as determined in decision box 45, the received LSA is acknowledged (see FIG. 9). If the received LSA is not sent point-to-point (e.g. broadcast), however, the method enters decision box 47 and determines whether the received LSA contains a list identifying nodes that have not acknowledged. If no list is included in the packet, the method exits in step 49. If a list is included, however, the method enters decision box 48 and determines if own FGM is identified in the list. If own FGM is, in fact, identified in the list, the method branches to entry point 1 and acknowledges the received LSA (see FIG. 9).
Referring now to FIG. 7, there is shown a method of the invention, generally designated as 50, for a FP injecting (transmitting) a new LSA into the network. The new LSA injected into the network is assumed to originate in the FP (own FP). As shown, the method, executed in the own FP, generates a new LSA in step 51. The status field of the LSA is set in step 52. The LSA is marked for re-flood, and the re- flood timer (with the appropriate urgency level) is set in step 53. (It will be appreciated that re-flooding, as used in step 53, is flooding which occurs for the first time.)
After the timer expires in step 54, the method performs various steps identified in FIG. 11 (entry point 3). These steps include transmitting (or flooding) the LSA packet by broadcast or by point-to-point (unicast) communication. These steps are described later with respect to FIG. 11.
Referring now to FIG. 8, there is shown a method of the invention, generally designated as 60, for a FP (own FP) receiving a LSA packet from a FGM or another (neighbor) FP. As shown, the method executed by the own FP receives a new LSA packet from its neighbor FP or from its own FGM (step 61). If the received LSA packet is not sent by unicast (point-to-point) and the sender is not a FP neighbor (as determined by decision boxes 62 and 66), the method enters step 71 and exits.
If the received LSA packet, however, is sent by unicast, and the sender is its own FGM, and the received LSA packet is new (or more recent), as determined by decision boxes 62, 63 and 68, the method floods the received LSA packet (entry point 2 of FIG. 10).
If the received LSA packet, on the other hand, is sent by unicast, and the sender is its own FGM, and the received LSA packet is not new, as determined by decision boxes 62, 63 and 68, the method does not flood the received LSA packet. The method only acknowledges the received LSA (entry point 1 of FIG. 9).
It will be appreciated that if the received LSA packet is sent by unicast, and the sender is not its FP neighbor, nor its own FGM, as determined by decision boxes 62, 63 and 64, the method exits in step 65. If the received LSA packet is not sent by unicast, and the sender is its FP neighbor, and the received LSA packet is not new, as determined by decision boxes 62, 66 and 67, the method determines whether the received LSA packet contains a list of node IDs that have not acknowledged (decision box 69). If the list does not include own ID, as determined by decision box 70, the method exits in step 71. If the list does include own ID, however, the method branches to entry point 1 and acknowledges the received LSA (FIG. 9).
Turning next to FIG. 9, a method of acknowledging a received LSA packet, generally designated as 90, is illustrated. Method 90 may be executed by a FP or a FGM. Starting at entry point 1, decision box 91 determines whether the received LSA is marked RELIABLE. If it is not (e.g. marked NORMAL), the method exits in step 98.
If the method determines that the received LSA is marked RELIABLE, step 92 is entered and the received LSA is marked for acknowledgement. The acknowledge timer (with the appropriate urgency level) is set in step 93. The method waits for the timer to expire (step 94) and then forms an acknowledge packet to acknowledge the received LSA (and other unacknowledged LSAs received from the sender node) (step 95). All pending acknowledge timers are deleted (step 96) and the acknowledge packet is transmitted to the sender, via point-to-point communication (step 97). The method for acknowledging ends at step 98. Turning now to FIG. 10, there is shown method 100 for flooding a received LSA, in accordance with an embodiment of the invention. The method first updates the LSA database (step 101) and then updates the status fields of all the new LSAs (step 102). The new LSAs (either having a status field of GLOBAL or LOCAL (with TTL>0)) are marked for re-flood (step 103). The re-flood times with an appropriate urgency level is set for every LSA (step 104). The method waits for the timer to expire (step 105) and, upon expiration, enters point 3 of FIG. 11.
Referring now to FIG. 11, method 100 continues by entering decision box 111. If the number of expected receivers of the LSA packet is less than a predetermined number N (for example 32), the method branches to step 113 and packs all pending LSAs into a new packet. The new packet is sent by point-to-point communication to each expected receiving node (step 115). The method then branches to step 116.
If the number of expected receivers of the LSA packet is greater than N, however, the method branches from decision box 111 to step 112, and packs all pending LSAs, as well as an unacknowledged node list, into a new packet. The new LSA packet is sent by broadcast communication (step 114). Other pending re-flood timers are deleted (step 116) and decision box 120 is entered.
If any of the LSAs in the transmitted packet are not marked RELIABLE, the method exits in step 121. If an LSA is marked RELIABLE, however, but all the LSAs are LOCAL and have a TTL of 1 (one-hop away) the method also exits, as determined by decision box 122. If the LSAs are not LOCAL (but GLOBAL) and have a TTL not equal to 1, the method branches to decision box 117.
In decision box 117, the method determines if it has any FGMs. If it does, the method sets an acknowledge timeout timer (indexed by an appropriate urgency level) (step 118), associates its unacknowledged FGMs to the timer (step 119), and branches to decision box 123.
After determining whether the FP has any FGMs, the method enters decision box 123 and determines whether it (the FP) has any FP neighbors. If it does, the method sets the re-flood timeout timer (based on an appropriate urgency level) (step 124), associates its unacknowledged FP neighbors to the timer (step 125), and branches to entry point 4 (FIG. 12).
Referring now to FIG. 12, method 100 waits for the timers to expire (step 132). Describing first the right side of FIG. 12, after the re-flood timeout timer expires, the method enters decision box 139. If the acknowledge timeout timer is still pending, the method deletes (cancels) the acknowledge timeout timer (step 142) and enters decision box 140. After the acknowledge timeout timer expires, the method also enters decision box 140. If the FP has reached a predetermined number of tries (for example, 5) in attempting to receive an acknowledgment from another node, the method enters step 143 and drops the links with the unacknowledging nodes, informs its grouping module (FIG. 13), and exits in step 137. If the number of tries have not yet reached a predetermined maximum number, on the other hand, the method enters step 141, creates an unacknowledging node list, and again attempts another transmission (point- to-point or broadcast) by entering step 111 (entry point 3 of FIG. 11). Returning to step 132, if the aforementioned timeout timers have not expired and an acknowledgement packet is received from an FGM, the method branches to decision box 138 and waits for all the acknowledgement packets to be received from all its FGMs. After all the acknowledgement packets have been received, the method branches to step 135 and deletes the acknowledge timeout timer (step 135). If the re-flood timeout timer is still pending (has not expired), as determined by decision box 136, the method waits for the timer to expire by branching back to step 132. After expiration of the re-flood timeout timer, the method enters step 137 and exits.
In a similar manner, if all implied acknowledgement packets are received from the FP neighbors, prior to timeout, as determined by decision box 131, the method branches to step 133 and deletes the re-flood timeout timer. If the acknowledge timeout timer is still pending, as determined by decision box 134, the acknowledge timeout timer is deleted by looping back to steps 132 and 142. The method finally exits in step 137. A network node, generally designated as 150, according to the present invention, is illustrated in FIG. 13. As shown, node 150 includes processor 151, data link layer 152, modem 153, transceiver 154 and antenna 155. The processor is preferably implemented by a conventional microprocessor or controller and controls the node to transmit and receive messages in accordance with the communication methods and protocols described earlier. The transmitter portion of transceiver 154 is preferably implemented by a conventional transmitter and transmits messages from the processor, preferably in the form of radio frequency (RF) signals, in accordance with processor instructions. The receiver portion is typically implemented by a conventional receiver and configured to receive signals, preferably in the form of radio frequency (RF) signals, transmitted by the transmitter of another node. The receiver receives transmitted signals and forwards the received signals to the processor for processing. A present invention FP node is substantially similar to a FGM node.
Processor 151 includes forwarding engine 156, coupled between data link layer 152 and upper layer modules (not shown). Such upper layer modules may provide application software for appliances or computers invoking different protocols, for example, a point-to-point protocol (PPP) or an application program interface (API) protocol.
The link-state proxy flooding protocol (LSPFP), including the various methods of the invention, as previously described, is executed in LSPFP module 159 and is controlled by timer module 160. The timer module incl udes the multiple timers, each with its respective urgency level, as described previously. These timers may include the ACK timers, ACK timeout timers, re-flood timers and re-flood timeout timers.
Grouping engine 158 may group multiple LSAs into one packet for transmission. Routing engine 157 may control whether the processor is in a receive mode for receiving packets from transceiver 154 and then sending them to the upper layer modules, or whether the processor is in a transmit mode for transmitting packets arriving from the upper layer modules.
It will be appreciated that the embodiments described above and illustrated in the drawings represent only a few of the many ways of implementing a method and apparatus for transmission of LSA packets throughout a network with reduced communication protocol overhead traffic.
The communication networks employing the present invention nodes may include any quantity of those nodes or tiers. The network nodes may be arranged in any fashion into any quantity of clusters or cells each having any quantity of nodes and head nodes. The backbone network may include any quantity of head nodes, while communications within a cluster and between neighboring cluster head nodes of the backbone network may utilize the same or different transmission frequencies. The formation of cells and designation of head nodes may be predetermined or accomplished dynamically via any conventional or other algorithm or technique. The nodes may communicate via any suitable communications medium (e.g., wired or wireless communication devices, etc.). The present invention node may include any quantity of conventional or other transmitters, where each transmitter may transmit signals at any suitable frequency and in any suitable energy form (e.g., radio signals, microwave, optical signals, etc.), and any quantity of conventional or other receivers, where each receiver may receive signals at any suitable frequency and in any suitable energy form (e.g., radio signals, microwave, optical signals etc.). Alternatively, the present invention node may include any quantity of combined transmitting/receiving devices.
The processor of the present invention node may be implemented by any conventional or other microprocessor, controller or circuitry to perform the functions described herein, while any quantity of processors or processing devices or circuitry may be employed within the present invention node where the processor functions may be distributed in any fashion among any quantity of modules, processors or other processing devices or circuits. The software for the processor of the present invention node may be implemented in any suitable computer language, and could be developed by one of ordinary skill in the computer and/or programming arts based on the functional description contained herein and the flow charts illustrated in the drawings. Further, any references herein of software performing various functions generally refer to processors performing those functions under software control. The software and/or algorithms described above and illustrated in the flow charts may be modified in any manner that accomplishes the functions described herein. The present invention node may alternatively include any components arranged in any fashion to facilitate distribution of packets within the network in the manner described above.
The LSA packets or message (e.g., acknowledge, point-to-point message, broadcast message, etc.) may be of any size, may have any format, and may contain and desired information. The packets may be transmitted at any suitable transmission rate or have any desired interval between transmissions. The re-transmission timers may be implemented by any conventional or other timing mechanisms (e.g., processor clock, external hardware, software, etc.) and may be set to any desired intervals for re- transmission of any packets. The timers may be associated with any types of packets to indicate re-transmission of those packets. The member nodes may communicate a database update, acknowledgment or other type of packet to a cluster head node via any type of message. Further, the various messages may include any identifier to identify the type of message or packet. The database update or other packets may be broadcast or transmitted any quantity of times to achieve a desired success rate, where the repeated packets may be disposed within the same or different node status packets in any desired combination or fashion.
The communication network may employ any suitable intranet and/or internetworking communications protocols to facilitate reception, processing and transference of messages or packets within or external of the network. The present invention may be utilized within any intranet, internetworking or other protocol to transmit or flood messages within the network in accordance with the protocol. The insertion of the database update packets within the LSA packet may be accomplished within any layer of the intranet or other protocol. The node database may be implemented by any conventional database or other storage structure (e.g., processor memory, external memory, file, data structure (e.g., array, queue, stack, etc.), etc.) and may have any desired storage capacity to contain any desired information.
Although illustrated and described herein with reference to certain specific embodiments, the present invention is nevertheless not intended to be limited to the details shown. Rather, various modifications may be made in the details within the scope and range of equivalents of the claims and without departing from the spirit of the invention.

Claims

What is Claimed: 1. A method of disseminating information in a communication network including a plurality of nodes, the method comprising the steps of: (a) receiving, in a node, a packet including link-state advertisements (LSAs) from the communication network, at least one LSA including a flooding status field; (b) determining, in the node, a type of LSA received based on the flooding status field; and (c) re-flooding the packet, from the node, onto the communication network, based on the type of LSA determined in step (b).
2. The method of claim 1 wherein step (a) includes receiving a bit in the flooding status field indicating the at least one LSA is intended for distribution to the entire communication network, and step (c) includes re-flooding, from the node, the at least one LSA onto the communication network in response to the bit in the flooding status field.
3. The method of claim 1 wherein step (a) includes receiving a bit in the flooding status field indicating the at least one LSA is intended for distribution to other nodes in the communication network located within a predetermined range of the node, and step (c) includes preventing re-flooding of the at least one LSA, from the node, if the other nodes in the communication network are located outside of the predetermined range.
4. The method of claim 3 wherein step (a) includes receiving a sub- field in the flooding status field indicating a time -to-live (TTL) value, and step (c) includes re-flooding the at least one LSA, from the node, onto the communication network, if the received TTL value is greater than a value of one, and preventing re-flooding of the at least one LSA if the received TTL value is equal to a value of zero.
5. The method of claim 4 wherein the node receiving the at least one LSA is a flooding proxy node, and the other nodes of the communication network include at least one flooding group member node and another flooding proxy node.
6. The method of claim 1 in which the node includes a re-flood timer and step (c) includes waiting an interval of time for the re-flood timer to expire, and re-flooding the packet, from the node, onto the communication network after waiting the interval of time for the re-flood timer to expire.
7. The method of claim 6 wherein step (a) includes receiving a sub- field in the flooding status field indicating an urgency level for the at least one LSA, and step (c) includes setting the re-flood timer to expire based on the indicated urgency level, and waiting for the re-flood timer to expire and then re-flooding the packet from the node onto the communication network.
8. The method of claim 1 in which the node includes an acknowledge timeout timer, and the following additional steps: (d) setting an interval of time for the acknowledge timeout timer to expire based on an urgency level for the at least one LSA; (e) waiting the interval of time for reception of an acknowledgement packet from another node in the communication network, after re-flooding the packet in step (c); and (f) again re-flooding the packet, from the node, onto the communication network, if the acknowledgement packet from the other node is not received during the interval of time.
9. A method of disseminating information in a communication network including a plurality of clusters, a cluster having a flooding proxy node and at least one flooding group member node, the method comprising the steps of: (a) receiving, in a flooding proxy node of a first cluster, a packet from a sender node in the communication network; (b) determining, in the flooding proxy node, if the sender node is one of (i) a flooding group member node of the first cluster and (ii) a flooding proxy node of a second cluster in the communication network; and (c) re-flooding the packet, from the flooding proxy node, onto the communication network if step (b) determines that the sender node is either the flooding group member node of the first cluster or the flooding proxy node of the second cluster.
10. The method of claim 9 further including the following step: (d) preventing, in the flooding proxy node, re-flooding of the packet if step (b) determines that the sender node is not the flooding group member node of the first cluster and not the flooding proxy node of the second cluster.
11. The method of claim 9 including the following additional step: (d) determining, in the flooding proxy node, a number for expected receivers of the packet; and wherein step (c) includes one of (i) re-flooding the packet, from the flooding proxy node, onto the communication network, by broadcasting the packet onto the communication network, if the number determined in step (d) is larger than a predetermined integer value, and (ii) re-flooding the packet, from the flooding proxy node, onto the communication network, by point-to-point communication to each of the expected receivers of the packet, if the number determined in step (d) is smaller than the predetermined integer value.
12. The method of claim 11 further including the following steps: (e) setting, in the flooding proxy node, an interval of time for an acknowledgement timeout timer to expire; (f) waiting the interval of time for the acknowledgment timeout timer to expire; (g) waiting for a reception of an acknowledgement packet from a flooding group member node of the first cluster, while waiting the interval of time to expire; and (h) again re-flooding the packet, from the flooding proxy node, if the acknowledgment packet from the flooding group member node of the first cluster is not received during the interval of time.
13. The method of claim 12 wherein step (h) includes preventing another re-flooding the packet from the flooding proxy node, after a predetermined number of repeat re-flooding of the packet onto the communication network.
14. The method of claim 11 further including the following steps: (e) setting, in the flooding proxy node, an interval of time for a re- flooding timeout timer to expire; (f) waiting the interval of time for the re-flooding timeout timer to expire; (g) waiting for a reception of an acknowledgement packet from a flooding proxy node of the second cluster, while waiting the interval of time to expire; and (h) again re-flooding the packet, from the flooding proxy node, if the acknowledgment packet from the flooding proxy node of the second cluster is not received during the interval of time.
15. The method of claim 14 wherein step (h) includes preventing another re-flooding the packet from the flooding proxy node, after a predetermined number of repeat re-flooding of the packet onto the communication network.
16 In a node disseminating information by transmitting link state advertisements (LSAs) to other nodes in a network, the node comprising a transmitter for transmitting LSAs to other nodes in the network, a processor for assembling at least one LSA and providing the LSA to the transmitter for transmission onto the network, and the processor including an engine for generating a flooding status field in the at least one LSA, the flooding status field having a flooding scope flag indicating the at least one LSA is intended for distribution to one of (a) other nodes in the entire network and (b) other nodes located within a predetermined range of the node, wherein dissemination of information to other nodes in the network is based on the flooding scope flag.
17. The node of claim 16 wherein the flooding status field includes a sub-field indicating a time-to-live (TTL) value, and if the TTL value is greater than a value of one, the processor provides the LSA to the transmitter for transmission onto the network, and if the TTL value is less than or equal to a value of one, the processor prevents the LSA from being provided to the transmitter for transmission onto the network.
18. The node of claim 16 wherein the flooding status field includes a reliable flooding flag indicating an acknowledgment is required by another node after the LSA is transmitted onto the network, and a normal flooding flag indicating that an acknowledgement is not required by the other node after the LSA is transmitted onto the network.
19. The node of claim 18 further including an acknowledgement timeout timer coupled to the engine for measuring an interval of time, and a receiver coupled to the processor for receiving acknowledgement packets from other nodes in the network in response to the at least one LSA transmitted by the transmitter, wherein after the interval of time expires in the acknowledgement timeout timer and an acknowledgement packet is not received in the receiver, the engine assembles another LSA for re-transmission onto the network.
20. The node of claim 19 in which the node is a flooding proxy node of a first cluster of nodes in the network, and the other nodes are at least one flooding group member node of the first cluster of nodes, and at least one flooding proxy node of a second cluster of nodes in the network.
PCT/US2003/039527 2002-12-11 2003-12-11 System and method for link-state based proxy flooding of messages in a network WO2004054100A2 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
GB0510986A GB2415322B (en) 2002-12-11 2003-12-11 System and method for link-state based proxy flooding of messages in a network
AU2003296959A AU2003296959B2 (en) 2002-12-11 2003-12-11 System and method for link-state based proxy flooding of messages in a network

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US10/316,593 2002-12-11
US10/316,593 US7242671B2 (en) 2002-12-11 2002-12-11 System and method for link-state based proxy flooding of messages in a network

Publications (2)

Publication Number Publication Date
WO2004054100A2 true WO2004054100A2 (en) 2004-06-24
WO2004054100A3 WO2004054100A3 (en) 2005-04-21

Family

ID=32505982

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2003/039527 WO2004054100A2 (en) 2002-12-11 2003-12-11 System and method for link-state based proxy flooding of messages in a network

Country Status (4)

Country Link
US (1) US7242671B2 (en)
AU (1) AU2003296959B2 (en)
GB (1) GB2415322B (en)
WO (1) WO2004054100A2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100384126C (en) * 2005-12-24 2008-04-23 华为技术有限公司 Link station information transmission method based on multi-interface route equipment

Families Citing this family (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
IL144709A (en) * 2000-08-03 2010-11-30 Cisco Tech Inc Path discovery in a distributed network management architecture
KR100522948B1 (en) * 2003-04-30 2005-10-24 삼성전자주식회사 Method for performing packet flooding at wireless ad hoc network
TWI234970B (en) * 2003-12-05 2005-06-21 Inst Information Industry Method and system for route selection and method for route reconstruction
US7697454B2 (en) * 2004-01-14 2010-04-13 Avaya, Inc. Method and apparatus for controlling the dissemination of routing information on a communication network
GB0412846D0 (en) * 2004-06-09 2004-07-14 Nortel Networks Ltd Method for providing for interoperability between standards-compliant and radius-restricted OSPF routers
US7742431B2 (en) * 2004-12-22 2010-06-22 Cisco Technology, Inc. Selectively sending link state messages in a network link state protocol based on interest of network nodes
US7573811B2 (en) * 2005-03-28 2009-08-11 Alcatel-Lucent Usa Inc. Network transparent OSPF-TE failover
AU2006279558B2 (en) 2005-08-16 2012-05-17 Izi Medical Products, Llc Spinal tissue distraction devices
US7609672B2 (en) * 2006-08-29 2009-10-27 Cisco Technology, Inc. Method and apparatus for automatic sub-division of areas that flood routing information
US7787450B1 (en) 2006-10-11 2010-08-31 Itt Manufacturing Enterprises, Inc Method and system for efficient network formation and maintenance of node routing databases in a mobile ad-hoc network
TWI347764B (en) * 2007-08-14 2011-08-21 Univ Nat Pingtung Sci & Tech Constructing method for information transmitting model in wireless sensor network
US7860027B2 (en) * 2007-11-21 2010-12-28 Cisco Technology, Inc. Extending an IP everywhere network over a plurality of flooding domains
US7649904B1 (en) * 2008-02-20 2010-01-19 Juniper Networks, Inc. Seamless split-horizon flooding of layer two (L2) network traffic on non-native and mixed architectures
US7990993B1 (en) * 2008-02-20 2011-08-02 Juniper Networks, Inc. Platform-independent control plane and lower-level derivation of forwarding structures
US8842611B2 (en) * 2010-03-03 2014-09-23 Nokia Corporation Compressed hybrid automatic repeat request feedback for device to device cluster communications
US8908686B1 (en) 2010-12-08 2014-12-09 Juniper Networks, Inc. Distributed generation of hierarchical multicast forwarding structures
US8948174B2 (en) 2011-06-29 2015-02-03 Juniper Networks, Inc. Variable-based forwarding path construction for packet processing within a network device
US8861527B1 (en) * 2011-12-30 2014-10-14 Emc Corporation Network-assisted routing for topology-aware overlay networks
WO2013182248A1 (en) * 2012-06-08 2013-12-12 Telefonaktiebolaget L M Ericsson (Publ) Propagation of network configuration update from network manager to network nodes using routing protocol
US20150071119A1 (en) * 2013-01-14 2015-03-12 Telefonaktiebolaget L M Ericsson (Publ) Technique for Explicit Path Control
US10085783B2 (en) 2013-03-14 2018-10-02 Izi Medical Products, Llc Devices and methods for treating bone tissue
KR102345169B1 (en) * 2015-05-27 2021-12-30 삼성전자 주식회사 Apparatus and method for transmitting/receiving signal in mesh network supporting flooding scheme
US10038623B2 (en) * 2016-10-24 2018-07-31 Microsoft Technology Licensing, Llc Reducing flooding of link state changes in networks
US11284295B1 (en) 2019-03-29 2022-03-22 Rockwell Collins, Inc. Reliable efficient flooding in MANET
US11296966B2 (en) 2019-11-27 2022-04-05 Rockwell Collins, Inc. System and method for efficient information collection and distribution (EICD) via independent dominating sets
US11737121B2 (en) 2021-08-20 2023-08-22 Rockwell Collins, Inc. System and method to compile and distribute spatial awareness information for network
US11665658B1 (en) 2021-04-16 2023-05-30 Rockwell Collins, Inc. System and method for application of doppler corrections for time synchronized transmitter and receiver
US10999778B1 (en) 2019-11-27 2021-05-04 Rockwell Collins, Inc. System and method for adaptive position-location information exchanges
US11290942B2 (en) 2020-08-07 2022-03-29 Rockwell Collins, Inc. System and method for independent dominating set (IDS) based routing in mobile AD hoc networks (MANET)
US11726162B2 (en) 2021-04-16 2023-08-15 Rockwell Collins, Inc. System and method for neighbor direction and relative velocity determination via doppler nulling techniques
US11057818B1 (en) 2020-01-07 2021-07-06 Rockwell Collins, Inc. Stealth position-location information for high value nodes
US11646962B1 (en) 2020-10-23 2023-05-09 Rockwell Collins, Inc. Zero overhead efficient flooding (ZOEF) oriented hybrid any-cast routing for mobile ad hoc networks (MANET)
US11736340B2 (en) * 2021-06-09 2023-08-22 Cisco Technology, Inc. Signaling a prefix unreachability in a network utilizing a route summarization

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001058237A2 (en) * 2000-02-12 2001-08-16 Hrl Laboratories, Llc Scalable unidirectional routing for mobile ad-hoc networks

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5887750A (en) * 1994-03-07 1999-03-30 James L. Popp Commodity container
US5926101A (en) 1995-11-16 1999-07-20 Philips Electronics North America Corporation Method and apparatus for routing messages in a network of nodes with minimal resources
DE19746904B4 (en) 1997-10-23 2004-09-30 Telefonaktiebolaget L M Ericsson (Publ) Traffic data evaluation device and associated method for a network with dynamic switching
EP1099040B1 (en) * 1998-07-17 2002-04-03 J.D. Neuhaus GmbH &amp; Co. KG Pneumatic motor lubrication
US6304556B1 (en) 1998-08-24 2001-10-16 Cornell Research Foundation, Inc. Routing and mobility management protocols for ad-hoc networks
US6856627B2 (en) * 1999-01-15 2005-02-15 Cisco Technology, Inc. Method for routing information over a network
US6415323B1 (en) 1999-09-03 2002-07-02 Fastforward Networks Proximity-based redirection system for robust and scalable service-node location in an internetwork
US6683865B1 (en) * 1999-10-15 2004-01-27 Nokia Wireless Routers, Inc. System for routing and switching in computer networks
US6349091B1 (en) 1999-11-12 2002-02-19 Itt Manufacturing Enterprises, Inc. Method and apparatus for controlling communication links between network nodes to reduce communication protocol overhead traffic
US6385174B1 (en) 1999-11-12 2002-05-07 Itt Manufacturing Enterprises, Inc. Method and apparatus for transmission of node link status messages throughout a network with reduced communication protocol overhead traffic
US6349210B1 (en) 1999-11-12 2002-02-19 Itt Manufacturing Enterprises, Inc. Method and apparatus for broadcasting messages in channel reservation communication systems
US6810259B1 (en) * 1999-12-16 2004-10-26 Utstarcom Inc. Location update protocol
US6456599B1 (en) 2000-02-07 2002-09-24 Verizon Corporate Services Group Inc. Distribution of potential neighbor information through an ad hoc network
US6820134B1 (en) * 2000-12-28 2004-11-16 Cisco Technology, Inc. Optimizing flooding of information in link-state routing protocol
US20030095500A1 (en) * 2001-10-23 2003-05-22 Sycamore Networks, Inc. Methods for distributed shared mesh restoration for optical networks

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001058237A2 (en) * 2000-02-12 2001-08-16 Hrl Laboratories, Llc Scalable unidirectional routing for mobile ad-hoc networks

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
"TCP/IP tutorial and technical overview" IBM REDBOOKS, August 2001 (2001-08), pages 159-164, XP002308354 USA *
YOON C J ET AL: "Optimization of routing protocol for packet radio networks" TACTICAL COMMUNICATIONS CONFERENCE, 1996., PROCEEDINGS OF THE 1996 FORT WAYNE, IN, USA 30 APRIL-2 MAY 1996, NEW YORK, NY, USA,IEEE, US, 30 April 1996 (1996-04-30), pages 479-493, XP010201885 ISBN: 0-7803-3658-5 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100384126C (en) * 2005-12-24 2008-04-23 华为技术有限公司 Link station information transmission method based on multi-interface route equipment

Also Published As

Publication number Publication date
GB2415322B (en) 2007-07-25
WO2004054100A3 (en) 2005-04-21
US7242671B2 (en) 2007-07-10
US20040174825A1 (en) 2004-09-09
GB2415322A (en) 2005-12-21
GB0510986D0 (en) 2005-07-06
AU2003296959A1 (en) 2004-06-30
AU2003296959B2 (en) 2009-08-06

Similar Documents

Publication Publication Date Title
AU2003296959B2 (en) System and method for link-state based proxy flooding of messages in a network
EP1228607B1 (en) Method and apparatus for transmission of node link status messages
US6980537B1 (en) Method and apparatus for communication network cluster formation and transmission of node link status messages with reduced protocol overhead traffic
EP2280517B1 (en) Method and apparatus for controlling packet transmissions within wireless networks to enhance network formation
Lee et al. On-demand multicast routing protocol in multihop wireless mobile networks
US7916747B2 (en) Redundant radio frequency network having a roaming terminal communication protocol
KR100605896B1 (en) Route path setting method for mobile ad hoc network using partial route discovery and mobile terminal teerof
EP2622775B1 (en) Device and method for scheduling data packet transmissions in wireless networks
US9526030B2 (en) Device and method for load balancing for data packet transmissions in wireless networks
US7894381B2 (en) System and method of reliably broadcasting data packet under ad-hoc network environment
US20040028023A1 (en) Method and apparatus for providing ad-hoc networked sensors and protocols
EP1471696B1 (en) Apparatus and method for retransmitting data packets in mobile ad hoc network environment
WO2003105353A2 (en) System and method for multicast media access using broadcast transmissions with multiple acknowledgments in an ad-hoc communications network
WO2001037482A2 (en) Method and apparatus for controlling communication links between network nodes to reduce communication protocol overhead traffic
JP2006270535A (en) Multi-hop radio communication equipment and route table generation method therefor
Aron et al. A witness-aided routing protocol for mobile ad-hoc networks with unidirectional links
US20080165692A1 (en) Method and system for opportunistic data communication
CN110249634B (en) Electricity meter comprising a power line interface and at least one radio frequency interface
US20120163233A1 (en) Method for transmitting routing information and routing apparatus in wireless network
US8180353B2 (en) Routing method and system for mobile ad-hoc network
KR20070083027A (en) Method for multicast routing using mpr set information
WO2020119922A1 (en) A method of, and a node device for, supporting establishment of a path from a source node to a destination node in wireless mesh network
Khaoua et al. Gossip-based interest forwarding in NDN over MANETs
Ramchitra Performance enhancement in MANET for duo coverage broadcasting
Nishar Enhancing Performance of Duo Coverage Broadcasting in MANET

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): BW GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
ENP Entry into the national phase

Ref document number: 0510986

Country of ref document: GB

Kind code of ref document: A

Free format text: PCT FILING DATE = 20031211

WWE Wipo information: entry into national phase

Ref document number: 0510986.3

Country of ref document: GB

WWE Wipo information: entry into national phase

Ref document number: 2003296959

Country of ref document: AU

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP