CN115550957A - Network management method and device - Google Patents

Network management method and device Download PDF

Info

Publication number
CN115550957A
CN115550957A CN202110736813.7A CN202110736813A CN115550957A CN 115550957 A CN115550957 A CN 115550957A CN 202110736813 A CN202110736813 A CN 202110736813A CN 115550957 A CN115550957 A CN 115550957A
Authority
CN
China
Prior art keywords
node
network
network function
information
auxiliary
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110736813.7A
Other languages
Chinese (zh)
Inventor
邱泽令
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN202110736813.7A priority Critical patent/CN115550957A/en
Priority to PCT/CN2022/087930 priority patent/WO2023273533A1/en
Publication of CN115550957A publication Critical patent/CN115550957A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application provides a network management method and device, and relates to the technical field of communication. In the method, a main node determines a first auxiliary node in at least one node according to information of network functions supported by at least one node and information of first network functions of the main node, and sends first configuration information to the first auxiliary node, wherein the first configuration information is used for configuring a network information reporting mode of the first auxiliary node and an execution strategy of the first network functions. The first network function is part of the network function of the main node, and the first auxiliary node is used for replacing the main node to execute the first network function. According to the method, partial network functions of the main node are handed to the auxiliary node for execution, so that semi-centralized management of the main node is realized, the power consumption of the main node can be reduced, and the timeliness and reliability of the network are improved.

Description

Network management method and device
Technical Field
The present application relates to the field of communications technologies, and in particular, to a network management method and apparatus.
Background
In a conventional network (i.e. a network composed of network devices), the network devices are generally divided into two networking modes, namely a centralized networking mode and a distributed networking mode. Centralized networking requires centralized management of information such as resources, traffic, data, etc. of each node of the network. The distributed networking can be independently managed on each node of the network, and the interaction of information such as resources, flow, data and the like is realized through mutual negotiation, so that the aim of decentralization is fulfilled, the increase of power consumption of a main node (also called a central node) is avoided, and the reliability is improved.
In recent years, with the rapid development of mobile internet, internet of things and artificial intelligence, mobile terminal devices are increasing, and meanwhile, how to connect these mobile terminal devices with different functional performances and various connection means together better constitutes a mobile network around user service as a core becomes a current urgent need. Compared with the conventional network, the mobile network is more biased to perform networking facing mobile terminal devices rather than network device networking, which requires special design for the characteristics of mobility, stability, energy consumption and the like of each mobile terminal device.
At present, the following two forms are common for networking of terminal devices:
form 1, centralized networking, that is, adopting a master node or a master node-like form to uniformly manage the terminal devices. For example, wireless fidelity (WiFi) Access Point (AP) networking, bluetooth networking, etc. are all centralized networking. The centralized networking has higher requirements on the capability and power consumption of the main node, and only devices similar to a router, a large screen and the like meet the requirements, but mobile terminal devices such as a mobile phone, a tablet, a sound box, a vehicle machine and the like are difficult to meet.
Form 2, distributed networking, for example, distributed wireless Mesh network (Mesh) networking (for example, bluetooth Low Energy (BLE) Mesh, zigbee (Zigbee) Mesh, wiFi Mesh, etc.), and this networking manner interacts with each other through a service publishing and subscribing form, and decentralized terminal device networking can be realized. The networking mode has a fixed heartbeat mechanism, therefore, fixed normal power supply equipment or low-power consumption equipment is adopted, and for mobile terminal equipment, a screen is required to be turned off for rest frequently, and the fixed heartbeat mechanism can cause higher power consumption of the mobile terminal equipment.
Therefore, the current networking mode of the terminal equipment cannot be applied to the mobile terminal equipment due to the limitation of power consumption requirements.
Disclosure of Invention
The application relates to a network management method and a network management device, which are used for enabling the power consumption of mobile terminal equipment in a mobile network to meet the requirements of the mobile terminal equipment.
In a first aspect, a network management method is provided, including: the main node determines a first auxiliary node in the at least one node according to the information of the network function supported by the at least one node and the information of the first network function of the main node, and sends first configuration information to the first auxiliary node, wherein the first configuration information is used for configuring a network information reporting mode of the first auxiliary node and an execution strategy of the first network function. The first network function is part of the network function of the main node, and the first auxiliary node is used for replacing the main node to execute the first network function. In the method provided by the first aspect, in the distributed network, by handing over (or putting down) part of the network functions of the master node to the auxiliary node, semi-centralized management of the master node is realized, so that the power consumption of the master node can be reduced, and the timeliness and reliability of the network are improved.
In a possible implementation manner, the first configuration information includes first indication information and second indication information, the first indication information is used to indicate a network information reporting manner of the first auxiliary node, the network information reporting manner is a manner in which the first auxiliary node reports network information related to the first network function to the master node or the second auxiliary node, the second auxiliary node is used to report network information related to the first network function and reported by the first auxiliary node to the master node, the second indication information is used to indicate a network function parameter when the first auxiliary node executes the first network function with another node, and the other node is a part or all of at least one node except the first auxiliary node. In this possible implementation manner, the first auxiliary node is configured with the network information reporting manner and the network function parameter when the first network function is executed, so that the first auxiliary node can interact with the master node and other nodes, thereby implementing the proxy of the first network function.
In one possible implementation, the method further includes: the master node sends second configuration information to the first node, wherein the second configuration information comprises third indication information and fourth indication information, the third indication information is used for indicating that the first network function is proxied by the first auxiliary node, the fourth indication information is used for indicating network function parameters when the first network function is executed between the first node and the first auxiliary node, and the first node is a node in other nodes. According to the possible implementation manner, the first auxiliary node and the network function parameter when the first network function is executed are indicated for the first node, so that the first auxiliary node can realize interaction with the first node, and the agent of the first network function is realized.
In one possible implementation, the method further includes: the master node receives information of network functions supported by at least one node from at least one node, respectively. The possible implementation manner can enable the main node to acquire the information of the network functions of other nodes.
In one possible implementation, the information of one network function supported by one node comprises one or more of the following information: an identity of the node, a name of the network function supported by the node, an identity of the network function supported by the node, a power consumption of the network function supported by the node, an enforcement policy of the network function supported by the node, whether the node supports proxying the network function, whether the node supports enforcement policy of a master node controlling the network function.
In one possible implementation, the first network function is a network topology management function, a network access management function, a network device information management function, or a heartbeat function.
In one possible implementation, the method further includes: the main node sends third configuration information to the first auxiliary node, wherein the third configuration information is used for updating network function parameters when a first network function is executed between the first auxiliary node and other nodes; and/or the main node sends fourth configuration information to the first node, wherein the fourth configuration information is used for updating network function parameters when the first network function is executed between the first node and the first auxiliary node. This possible implementation may enable updating of the configuration information of the first secondary node, so that the primary node may control how the first secondary node performs the first network function.
In one possible implementation, if the primary node determines that the first network function is no longer performed by the first secondary node, the method further includes: executing a first network function between the main node and other nodes; alternatively, the primary node reselects the secondary node for the first network function. In this possible implementation, the master node or the reselected secondary node may continue to perform the first network function when the first secondary node no longer proxies the first network function, thereby ensuring normal operation of the first network function.
In one possible implementation, the determining, by the master node, a first auxiliary node in the at least one node according to the information on the network functions supported by the at least one node and the information on the first network function of the master node includes: the main node determines a node which supports the first network function and meets one or more of the following conditions as a first auxiliary node according to the information of the network functions supported by at least one node and the information of the first network function: 1) Supporting the execution of a first network function in place of the master node; 2) Supplying power constantly; 3) The power consumption when the first network function is executed is less than or equal to the power consumption when the master node executes the first network function; 4) Supporting the main node to control the execution strategy of the first network function; 5) The time delay when the first network function is executed is less than or equal to the time delay when the main node executes the first network function; 6) The reliability when the first network function is executed is higher than or equal to the reliability when the master node executes the first network function. The possible implementation mode can reduce the power consumption of the main node and improve the timeliness and reliability of the network.
In one possible implementation, the network function parameters include one or more of the following information: a name of the first network function, an identification of the first network function, whether the first network function is proxied, an address of a node that proxies the first network function, an execution policy when the first network function is proxied, and power consumption when the first network function is proxied.
In a second aspect, a network management method is provided, including: the first auxiliary node receives first configuration information from the main node, wherein the first configuration information is used for configuring a network information reporting mode of the first auxiliary node and an execution strategy of a first network function, the first auxiliary node executes the first network function according to the execution strategy of the first network function, and reports the network information according to the network information reporting mode of the first auxiliary node. The first auxiliary node is used for replacing the main node to execute a first network function, and the first auxiliary node is a node in at least one node except the main node. In the method provided by the second aspect, in the distributed network, by submitting (or putting down) part of the network functions of the main node to the auxiliary node, the semi-centralized management of the main node is realized, so that the power consumption of the main node can be reduced, and the timeliness and reliability of the network are improved.
In a possible implementation manner, the first configuration information includes first indication information and second indication information, the first indication information is used to indicate a network information reporting mode of the first auxiliary node, the network information reporting mode is a mode in which the first auxiliary node reports network information related to the first network function to the master node or the second auxiliary node, the second auxiliary node is used to report network information related to the first network function and reported by the first auxiliary node to the master node, the second indication information is used to indicate a network function parameter when the first auxiliary node executes the first network function with another node, and the another node is a part or all of at least one node except the first auxiliary node. The possible implementation manner can enable the first auxiliary node to realize interaction with the main node and other nodes by configuring a network information reporting manner for the first auxiliary node and network function parameters when the first network function is executed, so that the agent of the first network function is realized.
In one possible implementation, the method further includes: the first secondary node sends information of the network functions supported by the first secondary node to the primary node. The possible implementation mode can enable the main node to acquire the information of the network functions of other nodes.
In one possible implementation, the information of a network function supported by a node comprises one or more of the following information: an identity of the node, a name of the network function supported by the node, an identity of the network function supported by the node, a power consumption of the network function supported by the node, an enforcement policy of the network function supported by the node, whether the node supports proxying the network function, whether the node supports enforcement policy of a master node controlling the network function.
In one possible implementation, the first network function is a network topology management function, a network access management function, a network device information management function, or a heartbeat function.
In one possible implementation, the method further includes: the first auxiliary node receives third configuration information from the main node, wherein the third configuration information is used for updating network function parameters when the first auxiliary node and other nodes execute the first network function; and the first auxiliary node executes the first network function with other nodes according to the updated network function parameters. This possible implementation may enable updating of the configuration information of the first secondary node, so that the primary node may control how the first secondary node performs the first network function.
In one possible implementation, if the updated network function parameter when the first network function is executed between the first auxiliary node and another node indicates that the first auxiliary node does not proxy the first network function, the method further includes: the first secondary node determines that the first network function is no longer proxied. According to the possible implementation manner, the first auxiliary node can determine whether to continue to proxy the first network function according to the change of the network function parameter, and the main node can control whether the first auxiliary node continues to proxy the first network function by indicating the network function parameter.
In one possible implementation, a node of the at least one node that supports the first network function and that satisfies one or more of the following conditions is the first auxiliary node: 1) Supporting the execution of a first network function in place of the master node; 2) Supplying power constantly; 3) The power consumption when executing the first network function is less than or equal to the power consumption when the main node executes the first network function; 4) Supporting the main node to control the execution strategy of the first network function; 5) The time delay when the first network function is executed is less than or equal to the time delay when the main node executes the first network function; 6) The reliability when the first network function is executed is higher than or equal to the reliability when the master node executes the first network function. The possible implementation mode can reduce the power consumption of the main node and improve the timeliness and reliability of the network.
In one possible implementation, the network function parameters include one or more of the following information: a name of the first network function, an identification of the first network function, whether the first network function is proxied, an address of a node that proxies the first network function, an execution policy when the first network function is proxied, power consumption when the first network function is proxied.
In a third aspect, a network management method is provided, including: the first node receives second configuration information from the main node, the second configuration information comprises third indication information and fourth indication information, the third indication information is used for indicating that the first network function is proxied by the first auxiliary node, the fourth indication information is used for indicating a network function parameter when the first network function is executed between the first node and the first auxiliary node, the first node determines the first auxiliary node according to the third indication information, and the first network function is executed between the network function parameter indicated by the fourth indication information and the first auxiliary node. The first auxiliary node is used for replacing the main node to execute a first network function, the first node is one of the at least one node except the first auxiliary node, and the at least one node is one or more nodes except the main node. In the method provided by the third aspect, in the distributed network, by handing over (or putting down) part of the network functions of the master node to the auxiliary node, semi-centralized management of the master node is realized, so that the power consumption of the master node can be reduced, the timeliness and reliability of the network are improved, and by indicating the first auxiliary node for the first node and the network function parameters when the first network function is executed, the first auxiliary node can realize interaction with the first node, so that the agent of the first network function is realized.
In one possible implementation, the method further includes: the first node sends information of network functions supported by the first node to the master node. The possible implementation mode can enable the main node to acquire the information of the network functions of other nodes.
In one possible implementation, the information of a network function supported by a node comprises one or more of the following information: an identification of the node, a name of the network function supported by the node, an identification of the network function supported by the node, a power consumption of the network function supported by the node, an enforcement policy of the network function supported by the node, whether the node supports a proxy of the network function, whether the node supports an enforcement policy of a master node controlling the network function.
In one possible implementation, the first network function is a network topology management function, a network access management function, a network device information management function, or a heartbeat function.
In one possible implementation, the method further includes: the first node receives fourth configuration information from the main node, wherein the fourth configuration information is used for updating network function parameters when a first network function is executed between the first node and the first auxiliary node; the first node executes the first network function with the first auxiliary node according to the updated network function parameter. This possible implementation may enable updating of the configuration information of the first node, so that the master node may control how the first node performs the first network function.
In a possible implementation manner, if the updated network function parameter when the first network function is executed between the first node and the first auxiliary node indicates that the first auxiliary node does not proxy the first network function any more, the method further includes: a first network function is executed between the first node and the main node; or the first network function is executed between the first node and an auxiliary node which is determined by the main node and proxies the first network function. In this possible implementation manner, when the first network function is no longer proxied by the first auxiliary node, the first network function may be continuously executed between the first node and the primary node or the reselected auxiliary node, thereby ensuring normal operation of the first network function.
In one possible implementation, a node of the at least one node that supports the first network function and that satisfies one or more of the following conditions is the first auxiliary node: 1) Supporting the execution of a first network function in place of the master node; 2) Supplying power constantly; 3) The power consumption when executing the first network function is less than or equal to the power consumption when the main node executes the first network function; 4) Supporting the main node to control the execution strategy of the first network function; 5) The time delay when the first network function is executed is less than or equal to the time delay when the main node executes the first network function; 6) The reliability when the first network function is executed is higher than or equal to the reliability when the master node executes the first network function. The possible implementation mode can reduce the power consumption of the main node and improve the timeliness and reliability of the network.
In one possible implementation, the network function parameters include one or more of the following information: a name of the first network function, an identification of the first network function, whether the first network function is proxied, an address of a node that proxies the first network function, an execution policy when the first network function is proxied, power consumption when the first network function is proxied.
In a fourth aspect, a network management apparatus is provided, including: functional units for performing any of the methods provided in the first aspect above; the actions performed by these functional units are implemented by hardware or by hardware executing corresponding software. The network management device may be the master node.
In a fifth aspect, a network management apparatus is provided, including: a functional unit for performing any one of the methods provided by the second aspect above; the actions performed by these functional units are implemented by hardware or by hardware executing corresponding software. The network management apparatus may be the first auxiliary node.
In a sixth aspect, a network management apparatus is provided, which includes: a functional unit configured to perform any one of the methods provided in the third aspect; the actions performed by these functional units are implemented by hardware or by hardware executing corresponding software. The network management device may be the first node.
In a seventh aspect, a network management apparatus is provided, including: a processor. The processor is connected to the memory, and the memory is used for storing computer-executable instructions, and the processor executes the computer-executable instructions stored in the memory, thereby implementing any one of the methods provided by any one of the first to third aspects. For example, the memory and the processor may be integrated together or may be separate devices. In the latter case, the memory may be located inside the network management apparatus or outside the network management apparatus. The network management device may be the primary node, the first secondary node, or the first node.
In one possible implementation, the processor includes logic circuitry, and further includes an input interface and/or an output interface. Illustratively, the output interface is for performing the act of transmitting in the respective method and the input interface is for performing the act of receiving in the respective method.
In one possible implementation, the network management apparatus further includes a communication interface and a communication bus, and the processor, the memory, and the communication interface are connected through the communication bus. The communication interface is used for executing the actions of transceiving in the corresponding method. The communication interface may also be referred to as a transceiver. Optionally, the communication interface comprises at least one of a transmitter and a receiver, in which case the transmitter is configured to perform the act of transmitting in the respective method and the receiver is configured to perform the act of receiving in the respective method.
In one possible implementation, the network management device exists in the product form of a chip.
In an eighth aspect, there is provided a chip comprising: a processor coupled to the memory through the interface, and an interface, the processor causing any one of the methods provided by any one of the first to third aspects to be performed when the processor executes the computer program or instructions in the memory.
In a ninth aspect, there is provided a communication system comprising: the master node, the first auxiliary node, and the first node.
In a tenth aspect, there is provided a computer-readable storage medium comprising instructions that, when executed on a computer, cause the computer to perform any one of the methods provided in any one of the first to third aspects.
In an eleventh aspect, there is provided a computer program product comprising instructions which, when run on a computer, cause the computer to perform any one of the methods provided in any one of the first to third aspects.
For technical effects brought by any implementation manner of the fourth aspect to the eleventh aspect, reference may be made to technical effects brought by corresponding implementation manners of the first aspect to the third aspect, and details are not described here.
It should be noted that, on the premise that the schemes are not inconsistent, the schemes in the above aspects may be combined.
Drawings
Fig. 1 is a schematic structural diagram of a network topology provided in the present application;
FIG. 2 is a schematic diagram of another network topology provided herein;
FIG. 3 is a schematic diagram of another network topology provided herein;
fig. 4 is a schematic diagram of communication between auxiliary nodes provided in the present application;
fig. 5 is a schematic classification diagram of a node provided in the present application;
fig. 6 is a flowchart of a network management method provided in the present application;
FIG. 7 is a schematic diagram of information of a network function provided herein;
fig. 8 is a schematic diagram of information of a heartbeat function provided in the present application;
FIG. 9 is a diagram illustrating first configuration information provided herein;
FIG. 10 is a diagram illustrating second configuration information provided herein;
fig. 11 is a flowchart of another network management method provided in the present application;
fig. 12 is a flowchart of yet another network management method provided in the present application;
FIG. 13 is a schematic diagram illustrating a node according to the present application;
fig. 14 is a schematic diagram illustrating a network management apparatus according to the present application;
fig. 15 is a schematic hardware structure diagram of a network management apparatus provided in the present application;
fig. 16 is a schematic hardware structure diagram of another network management device provided in the present application.
Detailed Description
In the description of this application, "/" means "or" unless otherwise stated, for example, A/B may mean A or B. "and/or" herein is merely an association relationship describing an associated object, and means that there may be three relationships, for example, a and/or B, and may mean: a exists alone, A and B exist simultaneously, and B exists alone. Further, "at least one" means one or more, "a plurality" means two or more. The terms "first," "second," and the like do not denote any order or importance, but rather the terms "first," "second," and the like do not denote any order or importance.
It is noted that the words "exemplary" or "such as" are used herein to mean serving as an example, instance, or illustration. Any embodiment or design described herein as "exemplary" or "such as" is not necessarily to be construed as preferred or advantageous over other embodiments or designs. Rather, use of the word "exemplary" or "such as" is intended to present relevant concepts in a concrete fashion.
In order to solve the problems proposed in the background art, the present application provides a network management method that reduces the power consumption of a master node by designating a slave node in a network and handing over part or all of network functions of the master node to the slave node that is more suitable for performing the network functions. There may be one or more auxiliary nodes, and the application is not limited thereto. A secondary node may perform one network function in place of a primary node or may perform multiple network functions in place of a primary node. The secondary node performs a certain network function instead of the primary node, i.e. the secondary node proxies the network function. The network functions of different auxiliary node agents may be the same or different, and the application is not limited.
In order to make the embodiments of the present application clearer, a brief description of some concepts related to the present application will be provided first.
1. Network topology
Network topology refers to a specific arrangement of nodes that form a network, and is generally divided into physical, real, online structures, or logical, virtual, and programmatic structures. If the connection structures of two networks are the same, the network topologies of the two networks are considered to be the same.
The nodes in the network in the present application may comprise mobile terminal devices. The mobile terminal device may be a mobile phone, a tablet, a wireless speaker, a car machine, a Mobile Station (MS), a subscriber unit, an unmanned aerial vehicle, an internet of things (IoT) device, a Station (ST) in a Wireless Local Area Network (WLAN), a cellular phone (cellular phone), a smart phone (smart phone), a cordless phone, a wireless data card, a tablet computer, a Session Initiation Protocol (SIP) phone, a Wireless Local Loop (WLL) station, a Personal Digital Assistant (PDA) device, a laptop computer (laptop computer), a machine type communication (machine type communication, MTC) terminal device, wireless modem, handheld device having wireless communication function, computing device or other processing device connected to wireless modem, vehicle-mounted device, wearable device (which may also be referred to as wearable smart device), device-to-device communication (D2D) terminal device, vehicle-to-outside (V2X) terminal device, machine-to-machine communication (M2M) terminal device, internet of things (IoT) terminal device, virtual Reality (VR) terminal device, augmented Reality (AR) terminal device, terminal device in industrial control (industrial control), terminal device in unmanned driving (self driving), terminal device in remote medical (remote medical), A terminal device in a smart grid (smart grid), a terminal device in transportation security (transportation security), a terminal device in a smart city (smart city), a terminal device in a smart home (smart home), and the like. The terminal device may also be a terminal device in a next generation communication system. The network in the present application may also include non-mobile terminal devices, such as a large screen (also referred to as TV device), a cable box.
A terminal device in this application may also be referred to as a User Equipment (UE), a terminal, an access terminal, a subscriber unit (subscriber unit), a subscriber station, a remote terminal, a user terminal, a wireless communication device, a user agent, a user device, or the like.
A node in the present application may also be referred to as a network node, node device, network device, etc.
The attributes of the network topology include:
(1) The connection means (or connection medium) of the network topology. The connection mode of the network topology refers to a connection mode between nodes in the network topology, for example, BLE connection, wiFi connection, universal Serial Bus (USB) connection, and the like. It should be noted that, the connection modes between different nodes may be the same or different, and therefore, the connection mode of the network topology may include multiple modes. And, when different services are executed, the connection mode between two nodes can be switched from one connection mode to another connection mode. For example, because a mobile terminal device often includes multiple communication capabilities, in different scenes, according to requirements of power consumption and services, the mobile terminal device may be connected to different nodes through different connection manners, for example, in a home scene, a mobile phone and a large screen are connected through a router in a home, at this time, a connection manner of a network topology is a WiFi Wireless Local Area Network (WLAN), but when the mobile phone and the large screen perform a screen projection service, since a WiFi point-to-point (P2P) technology may provide an exclusive link of WiFi, a problem of bandwidth reduction when the router accesses multiple nodes can be effectively reduced, so that when the mobile phone and the large screen perform the screen projection service, a WiFi P2P communication may be switched to. The two nodes are connected through the router, that is, the two nodes are connected to the router, and a logic data path between the two nodes is transferred through the router. Since a router can connect a plurality of nodes, the bandwidth of the router is shared by the plurality of nodes connected to the router. In WiFi P2P, only two nodes are interconnected, so the WiFi link bandwidth is exclusive (i.e. WiFi monopolizes the link).
(2) And (4) interaction mode of network topology. The interaction mode of the network topology refers to an interaction mode between nodes in the network topology, and for example, the interaction mode may be a heartbeat mode or a lease management mode. It should be noted that, the interaction modes between different nodes may be the same or different, and therefore, the interaction mode of the network topology may include multiple types.
(3) The structure of the network topology. The structure of the network topology refers to the connection structure of nodes in the network topology. Referring to fig. 1, the network topology mainly includes star type, ring type, tree type, and net type. In the present application, the network topology after adding the auxiliary nodes can be seen in fig. 2 (one auxiliary node) and fig. 3 (multiple auxiliary nodes). Fig. 1, fig. 2, and fig. 3 are merely schematic diagrams of network topologies, and the number of nodes in an actual network topology, the structure of the network topology, and the like may be different from those shown in the drawings, and the present application is not limited thereto.
2. Heartbeat and lease management
The heartbeat refers to a method in which a node (assumed as node a) sends a small data packet (which may be referred to as a heartbeat signal) to another node (assumed as node B) interconnected at intervals, and the node B replies to a condition to determine whether a communication link between the node a and the node B is disconnected. In the present application, when the node a and the node B (for example, an auxiliary node and a main node, and an auxiliary node and a common node hereinafter) need to exchange information, the information may be carried by a heartbeat signal, or indication information used for indicating that information exchange is subsequently needed may be carried in the heartbeat signal, so that information exchange is completed in a subsequent process. In this application, for an auxiliary node, a common node refers to a master node and a node other than the auxiliary node in a network. For example, for the secondary node a acting on the heartbeat function, the common nodes refer to nodes other than the primary node and the secondary node a in the network, but there may be secondary nodes acting on other network functions in these common nodes. The heartbeat applies between nodes that have been networked.
Lease management means that when a node (assumed as node C) accesses another node (assumed as node D), the node C can declare an online time (i.e., a lease) to the node D, and during the lease, the node D considers that the node C is online and can communicate with the node C at any time. The lease may be extended, for example, node C may apply for an extended lease to node D at 1/2 or 3/4 or the end of the previous lease, and node D may reply with a lease extension success or failure.
3. Network function
The network functions related to the present application include, but are not limited to, a network topology management function, a network access management function, a network device information management function, and a heartbeat function.
The network topology management function is configured to manage network topology information, where the network topology information includes one or more of information of nodes joining a network, information of nodes leaving the network, a connection relationship between the nodes, and network routing information, and may further include other information related to network topology. If the network topology management function is put down to the auxiliary node, the common node managed by the auxiliary node may send the network topology information to the auxiliary node, and the auxiliary node sends the network topology information to the master node (at this time, the heartbeat function is not proxied by the auxiliary node or the auxiliary node proxied with the network topology management function proxies the heartbeat function at the same time) or the auxiliary node proxied with the heartbeat function. Network topology information concerns data related to the structural composition and structural changes of the network topology.
The network access management function is used for being responsible for node access. If the network access management function is put down to the auxiliary node, the main node can configure the auxiliary node to enable the auxiliary node to execute network access, the configurations include information whether authentication binding is supported, whether the auxiliary node can be accessed after the binding and the authentication are successful or can be accessed after the authentication is successful, an access mode (for example, what connection mode is allowed to be accessed), a bandwidth for accessing a common node and the like, and the auxiliary node can send the information of the node added into the network to the main node (at this moment, the network topology management function is not proxied by the auxiliary node or the auxiliary node proxied with the network access management function proxies the network topology management function) or the auxiliary node proxied with the network topology management function.
The network device information management function is used for acquiring and managing network device information. The network device information in the present application includes, but is not limited to, node information (e.g., identification of a node, wiFi status of a node (e.g., whether WiFi is turned on), bluetooth status of a node (e.g., whether bluetooth is turned on), status information of a node (e.g., offline or online of a node), screen projection resolution of a node supporting screen projection, etc.), service information of a node (e.g., attribute information of a service, data of a service, status of a service), etc. If the network device information management function is set down to the auxiliary node, the common node managed by the auxiliary node may send the network device information to the auxiliary node, and the auxiliary node sends the network device information to the master node (at this time, the heartbeat function is not proxied by the auxiliary node or the auxiliary node having proxied the network device information management function has proxied the heartbeat function at the same time) or the auxiliary node having proxied the heartbeat function. Network device information concerns information about the individual devices themselves in the network. For convenience of description, the network device information and/or the network topology information will be referred to as network information hereinafter. That is, the network information referred to hereinafter includes network topology information and/or network device information.
The heartbeat function is used for reporting and synchronizing network information. If the network equipment information management function and/or the network topology management function are/is proxied, the auxiliary node of the proxy network equipment information management function and/or the auxiliary node of the proxy network topology management function can send the network equipment information and/or the network topology information to the auxiliary node of the proxy heartbeat function, and the auxiliary node of the proxy heartbeat function reports the information to the main node according to the heartbeat strategy of the auxiliary node. The network information reporting or synchronization period, mode, etc. may be configured by the master node to the auxiliary node acting on the heartbeat function, that is, the heartbeat management function may be implemented by the master node.
It should be noted that different network functions may be proxied by different secondary nodes, and in this case, referring to fig. 4, for the secondary node a proxying the network access management function, in the case that the network topology management function is proxied by the secondary node B, the secondary node a may synchronize information to the secondary node B, and in the case that the network topology management function is not proxied by the secondary node B, the secondary node a may synchronize information to the primary node. For an auxiliary node B that proxies a network topology management function, the auxiliary node B may synchronize information to the auxiliary node C in case the heartbeat function is proxied by the auxiliary node C, and the auxiliary node B may synchronize information to the master node in case the heartbeat function is not proxied by the auxiliary node C. The secondary node D for the proxy network device information management function is similar to the secondary node B and can be understood by reference. The secondary node C may synchronize information to the primary node. It should be noted that one auxiliary node may proxy multiple network functions, that is, any two or more of the auxiliary node a, the auxiliary node B, the auxiliary node C, and the auxiliary node D in the figure may be the same node, and at this time, a process of information synchronization between nodes or a process of information synchronization related to a certain node does not exist or the process is an implementation process inside the node. For example, if the secondary node C and the secondary node B are the same node, the process from the synchronization information of the secondary node B to the secondary node C does not exist or the process is an implementation process inside the node. If the auxiliary node C and the auxiliary node a are the same node, the process of synchronizing information to the auxiliary node B (i.e., the process of synchronizing information related to the auxiliary node a) by the auxiliary node a does not exist.
4. Node type
Nodes in the network topology can be divided into various types of nodes according to different functions, including a master node (admin node), a homogeneous routing gateway node (router node), a heterogeneous routing gateway node (gateway node), and an end node (endpoint node). The relevant information of each type of node can be seen in table 1.
TABLE 1
Figure BDA0003141839010000091
With respect to table 1 above, the following two points need to be noted:
(1) The main connection mode of the network defined by the main node in table 1 refers to a connection mode between most nodes in the main node, and all nodes in the network may communicate with each other in the connection mode defined by the main node, or some nodes may communicate in the connection mode defined by the main node, and some nodes communicate in other connection modes.
(2) The bluetooth packet in table 1 refers to a packet transmitted between two nodes connected through bluetooth, and the WiFi packet refers to a packet transmitted between two nodes connected through WiFi. The heterogeneous routing gateway node can be connected with different nodes through different connection media, for example, the heterogeneous routing gateway node can be connected with the node a through bluetooth and connected with the node B through WiFi, at this time, the heterogeneous routing gateway node connects terminals of different protocols to the network, and the heterogeneous routing gateway node can receive a bluetooth data packet from the node a and send a WiFi data packet to the node B through conversion.
In addition to the various types of nodes shown in table 1 above, another node type, i.e. an auxiliary node, is introduced in the present application, and the information about the auxiliary node can be seen in table 2.
TABLE 2
Figure BDA0003141839010000101
Nodes in the network topology can also be divided into various types of nodes according to networking conditions, and referring to fig. 5, the nodes include non-networking nodes and networking nodes, the networking nodes include offline nodes and online nodes, and the online nodes include one or more of a master node, an auxiliary node, a homogeneous routing gateway node, a heterogeneous routing gateway node and an end node. Wherein, the non-networking node can join the network through binding and authentication after discovering the network. The offline node may re-authenticate back to the network after discovering a network that has historically joined. The master node can determine and manage network topology information, network equipment information, heartbeat strategies and the like through election. The secondary nodes may be determined by the primary node, and one secondary node may proxy one or more of a network topology management function, a network access management function, a network device information management function, and a heartbeat function. The homogeneous routing gateway node may manage homogeneous routing information. Heterogeneous routing gateway nodes may manage heterogeneous routing information. The end nodes may manage node information, e.g., homogeneous routing gateway node information, heterogeneous routing gateway node information, etc.
The foregoing is a description of some of the concepts related to the present application.
Referring to fig. 6, the network management method provided by the present application includes:
601. one or more nodes (assumed to be a node a, a node b and a node c in fig. 6) perform network search, and establish connection with other searched nodes to form a network (which may be referred to as a first network).
The first network may comprise mobile terminal devices and/or non-mobile terminal devices. One node may search for the network via some connection, for example, other nodes around the node may be searched via WiFi or bluetooth. The connection modes between different nodes in the first network may be the same or different, and the application is not limited.
Before network searching is carried out, each node can be initialized, the network searching function can be opened through initialization so as to carry out network searching for the node carrying out network searching, and the network searching function can be opened through initialization so as to be searched for other nodes. The device management module can be enabled through initialization, so that connection can be established between nodes through binding and authentication. The relevant description of the device management module may be taken below.
For example, in a home scenario, the first network may be a distributed network composed of a mobile phone, a tablet, a large screen, a speaker, and the like, where the mobile phone, the tablet, and the large screen may be connected through a router, and the speaker may be connected with the large screen through bluetooth. The first network may also be a network in a vehicle-traveling scene, an office scene, or other scenes, and the application is not limited thereto.
602. Negotiations are made between the nodes in the first network to determine the master node (assumed to be node c in fig. 6) of the first network.
The master node of the first network is used for performing centralized control on the first network. A master node may also be referred to as a central control node, a central node, etc. The master node of the first network may be a more powerful node in the first network and/or a more user-operated node. For example, in a home scenario, since a user may operate a mobile terminal device (e.g., a mobile phone, a tablet, etc.) more, a master node of a network may be the mobile terminal device.
603. One or more other nodes (assumed as node d in fig. 6) that have not joined the first network join the first network by binding and authenticating with the master node.
For example, assuming that the first network is a WiFi network, the user may enter a network access password corresponding to the searched first network on one node to perform binding and authentication, and join the first network. After the first binding and authentication, if the node leaves the first network and then joins the first network, the node may join the first network again only through authentication.
For another example, the host node may create an account, and the user may log in the account on a node, perform binding and authentication with the host node, and join the node in the first network.
It should be noted that, after step 602, if there are other nodes that need to join the first network, step 603 may be performed to join the first network, and if there are no other nodes that need to join the first network, step 603 does not need to be performed.
604. At least one node (N is assumed to be N nodes, and N is an integer greater than 0) in the first network reports information of the network functions supported by each node to the master node. Correspondingly, the master node receives the information of the network functions supported by the N nodes.
In a specific implementation, the N nodes may be all nodes except the master node in the first network, or may be some nodes except the master node in the first network. In fig. 6, N nodes are all nodes except the master node in the first network (i.e., N nodes are node a, node b, and node d). It will be appreciated that the N nodes are all non-master nodes in the first network.
In step 604, for any non-master node, the non-master node may actively report the information of the supported network functions to the master node, or may report the information of the supported network functions based on the indication of the master node. If the latter, the method further comprises: the main node sends first indication information to the non-main node, wherein the first indication information is used for indicating information of network functions supported by reporting. The non-main node receives first indication information from the main node and reports the information of the supported network functions to the main node under the indication of the first indication information. It should be noted that, in actual implementation, all the nodes in the N nodes may report the information of the supported network functions to the host node actively or based on the indication of the host node, or a part of the nodes in the N nodes may report the information of the supported network functions to the host node actively, and another part of the nodes may report the information of the supported network functions based on the indication of the host node.
Wherein a node may support one or more network functions. A node may report information of all network functions supported by the node to the host node, and may also report information of a part of network functions supported by the node to the host node, which is not limited in this application.
Optionally, the information of one network function (assumed as network function 1) supported by one node includes one or more of the following information: an identity of the node, a name of the network function 1 supported by the node, an identity of the network function 1 supported by the node, a power consumption of the network function 1 supported by the node, an enforcement policy of the network function 1 supported by the node, whether the node supports a proxy of the network function 1, whether the node supports a master node to control an enforcement policy of the network function 1. In addition to these information, the information of the network function 1 supported by a node may also include other information, and the application is not limited.
The identifier of the node may be, for example, a Media Access Control (MAC) address of the node, an Internet Protocol (IP) address of the node, a port number (port) of the node, a device name of the node, or other information that can uniquely determine the node in the first network. The identification of the network function is used to identify the network function. If a node supports a proxy for a network function, the node may perform the network function in place of the master node. If a node supports the execution policy of the master node for controlling the network function, the master node may send the execution policy of the network function to the node, and the node may execute the network function according to the execution policy sent by the master node. Wherein, a node supports the main node to control the execution strategy of the network function, which means that: the node supports the main node to make or modify or manage the execution strategy, the node only executes the execution strategy, and the node has no management authority on the execution strategy.
The information such as the power consumption of the network function, the execution policy of the network function, whether the proxy network function is supported, whether the execution policy of the master node controlling the network function is supported, and the like may be regarded as the service attribute of the network function, and the information may belong to the same service attribute or different service attributes. It should be noted that the service attribute may include other information besides the information, and the application is not limited thereto. Also, the information included in the service attributes of different network functions may be different or the same.
For example, taking the node 1 as an example, the information of the network function 1 supported by the node 1 can be seen in fig. 7, and specifically includes the following information:
name of network function 1: XXX (e.g. network access management function)
Identification of network function 1: XXX (e.g., 0002)
Identification of node 1: XXX (e.g., MAC address of node 1)
Service Attribute 1
Execution policy of network function 1: XXX
Power consumption of network function 1: XXX (e.g., 1 milliamp per hour (1 mAh))
Service Attribute 2
Whether proxy network function 1 is supported: XXX (e.g., is)
Whether the execution policy of the master node controlling network function 1 is supported: XXX (e.g., YES)
...
Service attribute N
...
For example, if the network function 1 supported by the node 1 is a heartbeat function, the information of the heartbeat function may be as shown in fig. 8, which specifically includes the following information:
name of network function: heartbeat function
Identification of network function: 0001
Identification of the node: MAC Address of node 1
Service Attribute 1
Range of heartbeat cycle: 100 milliseconds (ms), 500ms, 1 second(s), 5 seconds, 10 seconds, 30 seconds
Heartbeat window time: 100 milliseconds
Power consumption during local heartbeat: 1 milliamp per hour (1 mAh)
Service Attribute 2
Whether or not proxy of the network function is supported: is that
Whether the execution strategy of the main node for controlling the network function is supported: is that
...
Service attribute N
...
The numerical value in the heartbeat cycle range shown in fig. 8 refers to a heartbeat cycle, that is, how long time to perform heartbeat with other nodes except the master node, the heartbeat window time refers to a time range in which heartbeat is performed in one heartbeat cycle, and the power consumption during local heartbeat refers to power consumption corresponding to one heartbeat window time.
Optionally, after determining the master node, the master node sends information of the master node to other nodes in the first network. The information of the master node may be, for example, an identifier of the master node, a connection mode supported by the master node, and the like, and in the subsequent process, the other nodes may communicate in a connection mode supported by both the master node and the other nodes, and it may also be determined whether the received information is information sent by the master node according to the identifier of the master node in the subsequent process.
605. The master node determines an auxiliary node (denoted as a first auxiliary node, assumed to be node d in fig. 6) of the M nodes according to information of the network functions supported by at least one node (assumed to be M nodes, where M is an integer greater than 0) and information of a first network function of the master node, where the first auxiliary node is used to replace the master node to perform the first network function.
The M nodes may be some or all of the N nodes. In fig. 6, M nodes are drawn as an example of all the N nodes (that is, M nodes are node a, node b, and node d). The first network function is a network topology management function, a network access management function, a network device information management function or a heartbeat function, and may also be other network functions. It should be noted that the first network function is a network function that the master node can drop, and the network function that the master node can drop may be preset in the master node, or may be determined by the master node according to some principles (for example, the network function that is strongly related to the security of the user cannot be dropped).
It should be noted that, if the master node cannot determine the first auxiliary node according to the information of the network functions supported by the M nodes and the information of the first network function of the master node, the master node executes the first network function by itself. The inability to determine the first secondary node may be the absence of a satisfactory node of the M nodes. That is, the master node may determine whether a node capable of acting on the first network function exists in the M nodes according to the information of the network functions supported by the M nodes and the information of the first network function of the master node, if yes, perform the subsequent steps of step 605, and if not, the master node performs the first network function by itself.
Optionally, in consideration of the fact that the power consumption of the master node is too large, the first auxiliary node may be a normally powered node supporting the first network function among the M nodes (for example, if the first network function is a network access management function, the first auxiliary node may be a router or other device having a network access capability, and for example, if the first network function is a heartbeat function, the master node may put the heartbeat function down to a large screen for implementation due to a normally powered attribute of the large screen); and/or the first auxiliary node may be a node whose power consumption when performing the first network function is less than or equal to the power consumption when performing the first network function by the primary node. The common power supply node is a node which is connected with an alternating current point through a power plug to supply power. The abnormal power supply node is a node which supplies power through a battery, a charger and other equipment.
In step 605, in a specific implementation, the master node may select, as the first secondary node, a node that supports the first network function and satisfies one or more of the following conditions among the M nodes: 1) Supporting execution of a first network function in place of the master node; 2) Supplying power constantly; 3) The power consumption when executing the first network function is less than or equal to the power consumption when the main node executes the first network function; 4) Supporting the main node to control the execution strategy of the first network function; 5) The time delay when the first network function is executed is less than or equal to the time delay when the main node executes the first network function; 6) The reliability when performing the first network function is higher than or equal to the reliability when the master node performs the first network function. In actual implementation, if a plurality of nodes may all satisfy one or more of the conditions, a node that satisfies more of the conditions may be determined as the first auxiliary node, or a node that satisfies a specific condition of the conditions may be determined as the first auxiliary node, where the specific condition may be preset according to network requirements.
When the first auxiliary node executes the first network function, the time delay is smaller than that when the main node executes the first network function, so that the timeliness of the first network can be improved, and when the reliability of the first auxiliary node executing the first network function is higher than that of the main node executing the first network function, the reliability of the first network can be improved.
For example, taking the heartbeat function shown in fig. 8 as an example, after receiving information of the heartbeat function of a certain node, the master node will send the information to the nodeThe information of the heartbeat function is compared with the information of the heartbeat function local to the master node. Assuming that a heartbeat cycle is 500ms, the average power consumption for performing a heartbeat at the certain node is: the number of times of heartbeat execution in 1 hour is multiplied by the time of each heartbeat
Figure BDA0003141839010000131
That is, when the heartbeat period is 500ms, the maximum delay of the certain node sensing other nodes except the main node is 500ms, and the average power consumption generated at the same time is 0.2mAh. The main node can calculate the average power consumption of executing heartbeat on the main node when the heartbeat period is 500ms according to the information of the heartbeat function of the main node. The main node compares the two nodes, if the average power consumption of the certain node is smaller, the node is judged to be a first auxiliary node, and whether the node is required to be the first auxiliary node or not is finally judged according to the average power consumption or other information of other nodes obtained through calculation. It should be noted that, the average power consumption for executing the heartbeat is described as an example, and in practical implementation, the average power consumption may also be directly compared according to the power consumption during the local heartbeat, and the present application is not limited.
It should be noted that, for convenience of description in the present application, the method provided by the present application is exemplarily described by taking the first auxiliary node as an example for proxying the first network function, and for other network functions, it is only necessary to replace the first network function with another network function for understanding. The first auxiliary node may proxy other network functions simultaneously in addition to the first network function.
For example, if the first network function is a network topology management function, the first auxiliary node may maintain the network topology information instead of the master node. If the first network function is a network access management function, the first auxiliary node may perform network access instead of the master node. If the first network function is a network device information management function, the first auxiliary node may replace the master node to maintain the network device information. If the first network function is a heartbeat function, the first auxiliary node can replace the main node to perform heartbeat communication with other nodes, so that the synchronization of network information is maintained.
It should be noted that, in the embodiment of the present application, the network function of the auxiliary node proxy is a part of the network function of the main node.
606. The main node sends first configuration information to the first auxiliary node, wherein the first configuration information is used for configuring an execution strategy of a first network function and/or a network information reporting mode of the first auxiliary node. Correspondingly, the first auxiliary node receives the first configuration information sent by the main node.
Optionally, the first configuration information includes first indication information and/or second indication information, where the first indication information is used to indicate a network information reporting mode of the first auxiliary node, the network information reporting mode is a mode in which the first auxiliary node reports network information related to the first network function to the master node or the second auxiliary node, the second auxiliary node is used to report network information related to the first network function and reported by the first auxiliary node to the master node, and the second indication information is used to indicate a network function parameter when the first auxiliary node executes the first network function between the first auxiliary node and other nodes, where the other nodes are some or all of the M nodes except the first auxiliary node, and it is assumed that the other nodes are Q nodes.
And the Q nodes have communication interaction with the first auxiliary node. For example, with the heartbeat interaction, the heartbeat may be in a connected mode (i.e., the heartbeat interaction is performed through a wired connection), or may be in a connectionless mode (i.e., the heartbeat interaction is performed through a wireless connection), such as periodic broadcast. In addition, the Q nodes have communication interaction with the first auxiliary node after the master node determines the first auxiliary node acting on the first network function, and before the master node determines the first auxiliary node, there may be communication interaction with the first auxiliary node or no communication interaction with the first auxiliary node for any one of the Q nodes.
Optionally, the network information reporting mode includes reporting to the master node within a first preset time period when the network information changes, reporting to the master node according to a heartbeat cycle (that is, periodic heartbeat synchronization), reporting to the master node when Wifi or bluetooth is connected, and may also include other modes (for example, master node active query, master node subscription), which is not limited in this application. Through the network information reporting, the master node may obtain the network information of the first network, for example, obtain the real-time status of the entire network or the real-time status of some nodes specified in the network.
For clarity, the following describes the communication modes of periodic heartbeat synchronization (denoted as mode 1), master node active query (denoted as mode 2), and master node subscription (denoted as mode 3) between the master node and the secondary node, respectively.
Mode 1, periodic heartbeat synchronization.
In the mode 1, the auxiliary node at least proxies the heartbeat function, and the main node and the auxiliary node are synchronized according to the execution strategy period of the heartbeat function. The heartbeat policy includes a heartbeat cycle, a heartbeat pattern (e.g., BLE or WiFi), and the like, and the heartbeat policy may be determined by the master node. At least two sets of heartbeat policies are run on the secondary node, a first set of policies being primary node oriented and a second set of policies being directed to some or all of the nodes (e.g., routing nodes, end nodes, etc.) other than the primary node. In the second set of policies, the secondary node needs to complete one heartbeat interaction with some or all nodes in the first network except the primary node in each heartbeat cycle (assumed as the first heartbeat cycle) to determine the network information in the first network. In the first set of policies, the secondary node reports network information to the primary node at each heartbeat cycle (assuming the second heartbeat cycle). The second heartbeat cycle may be an integral multiple of the first heartbeat cycle, or may be a heartbeat cycle greater than or equal to or less than the first heartbeat cycle, thereby achieving the purpose of reducing the power consumption of the master node. The two sets of heartbeat strategies can be decided by the main node according to the actual situation of the network.
It should be noted that, after the heartbeat function is transferred by the master node, on one hand, the master node only needs to perform heartbeat interaction with the auxiliary node, and does not need to perform heartbeat interaction with a large number of nodes, so that the power consumption of the master node can be greatly reduced. On the other hand, if the second heartbeat cycle is greater than the first heartbeat cycle, the frequency of interaction between the main node and the auxiliary node is reduced, and the power consumption of the main node can be further reduced.
Mode 2, master node active query.
In the mode 2, the master node actively queries information in the auxiliary node, and the auxiliary node performs feedback. The query action can be initiated by the primary node at any time, and the secondary node needs to quickly feed back the information (e.g., current node information) queried by the primary node in real time.
Mode 3, master node subscription.
In mode 3, the primary node subscribes to network information in the secondary node. For example, sometimes the master node pays attention to the node information of the partial node in the first network, for example, the mobile phone (i.e., the master node) may pay attention to the real-time network state of the tablet, at this time, the large screen (i.e., the auxiliary node acting on the heartbeat function) may monitor the network state of the tablet in real time through heartbeat, and if the network state of the tablet finds a change, the mobile phone may be awakened in real time and quickly or according to the heartbeat cycle to synchronize the network state of the tablet according to a policy issued by the mobile phone. At this time, the mobile phone can know the real-time network state of the peripheral nodes under the condition that the mobile phone is not frequently awakened, so that the purposes of reducing the power consumption of the mobile phone and maintaining the consistency of the network states of the nodes in the first network are achieved. For another example, in the network topology management function, the master node may subscribe to the online and offline states of a certain type of devices in the network topology information, so as to obtain the situation that the node joins in and leaves the network in real time. The subscription function may be implemented by the primary node by configuring or updating attributes of the service information to the secondary node.
It should be noted that there may be multiple network information related to the first network function, and the reporting modes of the network information corresponding to different network information may be the same or different, and the application is not limited in this application. For example, if the first network function is a network device information management function, the network information related to the first network function includes node information, state information of the node, service information of the node, and the like. The network information reporting mode corresponding to the node information may be reporting to the master node within a first preset time period when the node information changes, the network information reporting mode corresponding to the node state information may be reporting to the master node according to a heartbeat cycle, and the network information reporting mode corresponding to the node service information may be reporting to the master node when Wifi or bluetooth is connected.
Wherein different network functions may be proxied by different secondary nodes. For example, in case a first secondary node proxies the first network function, the other network function may be proxied by the other secondary node, e.g. by the second secondary node. If the first auxiliary node reports the network information related to the first network function to the second auxiliary node, the second auxiliary node may be a node that proxies the network topology management function if the first network function is the network access management function, at this time, if the heartbeat function is proxied by other nodes, the second auxiliary node may report the network information related to the first network function to the master node through the auxiliary node that proxies the heartbeat function, if the heartbeat function is not proxied by other nodes or the second auxiliary node proxies the network topology management function and the heartbeat function at the same time, the second auxiliary node may directly report the network information related to the first network function to the master node, if the first auxiliary node proxies the network access management function and the heartbeat function at least at the same time, the second auxiliary node does not exist. In a case where the first network function is a network topology management function, if the heartbeat function is proxied by another node, the second auxiliary node may be a node that proxies the heartbeat function, and if the heartbeat function is not proxied by another node or the first auxiliary node proxies the heartbeat function and the network topology management function at the same time, the second auxiliary node does not exist. In the case where the first network function is a network device information management function, similar to the case where the first network function is a network topology management function, it can be understood with reference to. In case the first network function is a heartbeat function, the second secondary node is not present.
Optionally, the network function parameter includes one or more of the following information: a name of the first network function, an identification of the first network function, whether the first network function is proxied, an address of a node that proxies the first network function (i.e., an address of the first auxiliary node), an execution policy when the first network function is proxied, and power consumption when the first network function is proxied.
For example, assuming that the first auxiliary node is node 1, the first auxiliary node proxies a heartbeat function and a network device information management function, an example of the first configuration information may be shown in fig. 9, and specifically includes the following information:
name of network function: heartbeat function
Identification of network function: 0001
Identification of the node: MAC Address of node 1
Service Attribute 1
Range of heartbeat cycle: 500 milliseconds (ms)
Heartbeat window time: 100 milliseconds
Power consumption during local heartbeat: 1 milliamp per hour (1 mAh)
Service Attribute 2
Whether to proxy the network function: is that
Service attribute 3:
when the state of the node supporting XX capability changes, the node immediately reports the state to the main node
(e.g., immediately reporting to the master node when the screen resolution of the node supporting the screen projection capability changes)
Synchronizing to the main node according to the heartbeat cycle when the service information of the device supporting the XX capability changes
(e.g., synchronizing to a master node by heartbeat cycle when attribute information of a service of a node supporting gallery capability changes)
Synchronization only during WiFi connection when data changes for XX-capable nodes
(e.g., a master node synchronized only for WiFi connectivity when data changes for services of a node supporting gallery capability)
...
Service attribute N
...
In fig. 9, the service attribute 1 and the service attribute 2 are network function parameters, and the service attribute 3 is a network information reporting mode. Specifically, the service attribute 1 is an execution policy when the heartbeat function is proxied, and the service attribute 2 is information on whether the heartbeat function is proxied by the node 1.
607. The master node sends second configuration information to the first node, wherein the second configuration information comprises third indication information and/or fourth indication information, the third indication information is used for indicating that the first network function is proxied by the first auxiliary node, the fourth indication information is used for indicating network function parameters when the first network function is executed between the first node and the first auxiliary node, and the first node is a node in the Q nodes. Accordingly, the first node receives the second configuration information from the master node.
It should be noted that, in actual implementation, the master node may send the second configuration information to each node of the Q nodes, so as to configure the network function parameters when the first network function is executed between the corresponding node and the first auxiliary node. In fig. 6, the master node sends the second configuration information to each of the Q nodes (i.e., to the node a and the node b) for example.
The first configuration information and the second configuration information are deployment information of the first network function. As for the description of the network function parameters, after receiving the network function parameters, each node may determine whether the first network function is proxied according to information about whether the first network function is proxied, determine whether the node is a first auxiliary node according to whether an address of the node that proxies the first network function is a self address, and determine a cycle of executing the first network function according to a cycle of executing the first network function when the first network function is proxied (for example, if the first network function is a heartbeat function, a cycle of reporting network information may be determined according to the cycle, if the node is a first auxiliary node, the network information is reported to the master node, and if the node is not a first auxiliary node, the network function is reported to the first auxiliary node).
It should be noted that the network function parameter sent by the primary node to the first secondary node and the network function parameter sent to the first node may be the same in type or different in type. The values of the same network function parameter sent by the primary node to the first secondary node and sent to the first node may be the same or different, and the present application is not limited.
For example, taking the first network function as a heartbeat function as an example, an example of the second configuration information sent by the master node to the first node may refer to fig. 10, which specifically includes the following information:
name of network function: heartbeat function
Identification of network function: 0001
Identification of the node: MAC address of node 1
Service Attribute 1
Range of heartbeat cycle: 500 milliseconds (ms)
Heartbeat window time: 100 milliseconds
Power consumption during local heartbeat: 1 milliamp per hour (1 mAh)
Service Attribute 2
Whether the network function is proxied: is that
...
Service attribute N
...
Optionally, the second configuration information further includes fifth indication information, where the fifth indication information is used to indicate a network information reporting mode of the first node, and the network information reporting mode of the first node is a mode in which the first node reports network information related to the first network function to the first auxiliary node. At this time, an example of the second configuration information transmitted by the primary node to the first node may be seen in fig. 9, except that the primary node in the service attribute 3 is replaced with the first secondary node. For other descriptions of the network information reporting method, see above, and are not described in detail.
It should be noted that, if the second configuration information does not include the fifth indication information, the first node may report the network information by default by using a certain network information reporting mode.
It should be noted that, the execution sequence between step 606 and step 607 is not sequential.
608. The first auxiliary node executes the first network function according to the execution strategy of the first network function, and/or the first auxiliary node reports the network information according to the network information reporting mode of the first auxiliary node.
Optionally, if the first configuration information includes the first indication information and/or the second indication information, the first auxiliary node reports the network information related to the first network function to the main node according to a network information reporting manner indicated by the first indication information, and/or the first auxiliary node executes the first network function between the first auxiliary node and another node according to a network function parameter indicated by the second indication information.
When the network information is reported, specifically, the first auxiliary node receives the network information related to the first network function from the Q nodes, and reports the network information related to the first network function to the master node or the second auxiliary node according to a network information reporting mode of the first auxiliary node.
In step 608, in a specific implementation, after the first auxiliary node receives the first configuration information sent by the master node, the first auxiliary node may start to proxy the first network function.
It can be understood that, in the present application, the master node does not need to uniformly manage the entire network (at this time, the master node needs to acquire the entire network information at a relatively high heartbeat cycle) as in the prior art, and the master node interacts with other nodes to acquire the network information through the auxiliary node, and the master node only needs to acquire the network information from the auxiliary node, so that the power consumption of the master node can be reduced.
609. And the first node determines a first auxiliary node according to the third indication information, and/or the first node executes a first network function between the first auxiliary node and the network function parameter indicated by the fourth indication information.
Illustratively, if the network information reporting mode of the first node is periodic heartbeat synchronization, the first auxiliary node may maintain the network information in a heartbeat mode. With the example shown in fig. 10, if the network information changes, the first node may heartbeat with the first auxiliary node with a heartbeat period of 500ms, thereby synchronizing the network information. The first auxiliary node may also maintain the network information by way of lease management, e.g., the first node may communicate with the first auxiliary node during a lease to synchronize network information and/or network topology information.
It should be noted that, if the master node sends the second configuration information to each of the Q nodes, each of the Q nodes may execute the first network function between the first auxiliary node and the network function parameter indicated by the fourth indication information, and fig. 6 is drawn by taking the first network function between each of the Q nodes (i.e., node a and node b) and the first auxiliary node as an example.
It should be noted that the execution sequence between step 608 and step 609 is not sequential.
610. If the network function parameter changes, the main node sends third configuration information to the first auxiliary node and sends fourth configuration information to the first node. The third configuration information is used for updating network function parameters when the first network function is executed between the first auxiliary node and the Q nodes, and the fourth configuration information is used for updating network function parameters when the first network function is executed between the first auxiliary node and the first node. Correspondingly, the first secondary node receives the third configuration information from the primary node, and the first node receives the fourth configuration information from the primary node.
It should be noted that the master node may send fourth configuration information to each of the Q nodes, so as to update the network function parameter when the first network function is executed between the corresponding node and the first auxiliary node. Fig. 6 is drawn by taking an example in which the master node transmits the fourth configuration information to each of the Q nodes (i.e., node a and node b).
After step 610, the first secondary node and/or the first node may feed back an update status to the primary node, the update status indicating whether the network function parameter was successfully updated.
611. The first auxiliary node performs the first network function with the first node according to the updated network function parameter. If each of the Q nodes receives the fourth configuration information, the first auxiliary node may execute the first network function with the Q nodes according to the updated network function parameter. In fig. 6, the master node performs the first network function with each of the Q nodes (i.e., node a and node b) according to the updated network function parameters.
Optionally, if the updated network function parameter when the first network function is executed between the first auxiliary node and the Q nodes indicates that the first auxiliary node no longer proxies the first network function (for example, the address of the node that proxies the first network function is modified to be null or the address of the main node), the method further includes: the first secondary node determines that the first network function is no longer proxied.
Optionally, if the main node determines that the first network function is no longer proxied by the first auxiliary node (for example, in a case that the first auxiliary node leaves the first network, or the communication quality between the main node and the first auxiliary node is degraded, etc., the main node may determine that the first network function is no longer proxied by the first auxiliary node), the method further includes: performing a first network function between the master node and other nodes in the first network; or, the main node reselects an auxiliary node for the first network function, the first network function is executed between the reselected auxiliary node and the Q nodes, and at this time, the first network function is executed between the first node and the auxiliary node reselected by the main node.
It should be noted that the master node controls the function of the first auxiliary node, and is mainly implemented by updating a network function parameter when the first auxiliary node executes the first network function. The master node may first send a command to the first secondary node to enable the first secondary node to update a network function parameter (e.g., a heartbeat cycle) of the first network function of its proxy, and after the first secondary node performs the update operation, the update status of the network function parameter of the first network function of the master node is returned, such as success or failure. And if the network function parameter of the first network function is successfully updated, finishing the updating operation. Otherwise, the primary node may implement a failure protection policy, including an update retry, or force the retraction of the proxy capability of the first secondary node, based on the update failure information of the first secondary node, while synchronizing relevant information (e.g., information that the first secondary node is no longer performing the first network function) to other common nodes (e.g., routing nodes, end nodes, etc.) in the network. Meanwhile, after receiving the synchronous message of the main node, other nodes in the network stop executing the first network function with the first auxiliary node and switch to execute the first network function with the main node or other auxiliary nodes appointed by the main node.
It should be noted that the information that the first auxiliary node no longer performs the first network function may be indicated to each node through the updated network function parameter of the first network function, or may be individually indicated to each node by the master node, which is not limited in this application. If the first secondary node is the second secondary node, the interaction between the first secondary node and the main node comprises the following steps: the master node sends an indication message (marked as sixth indication message) to the first auxiliary node and the first node, wherein the sixth indication message is used for indicating the first auxiliary node to stop proxying the first network function; the first auxiliary node and the first node reply feedback information to the main node, wherein the feedback information is used for informing whether to acquire information that the first auxiliary node stops acting the first network function. It should be noted that this indication information is a mandatory command, that is, after the primary node issues the indication information, the primary node considers that the first secondary node does not proxy the first network function any more. The first auxiliary node replies the feedback information as an optional process.
When the first auxiliary node receives the command to stop the proxy service (the sixth indication information or the network function parameter of the first network function indicating that the first auxiliary node no longer proxies the update of the first network function) sent by the main node, the first auxiliary node stops proxying the first network function and releases the data during the proxy task. It is added that when the first auxiliary node stops acting on the first network function, whether the maintained data is consistent and synchronous with the data maintained by the main node is determined by the parameter in the stop agent service command sent by the main node. Generally, whether the data is synchronized in consistency is determined by the consistency requirements of the network functions of the first auxiliary node agent, and the consistency requirements of different network functions are different. For example, if the network topology management function is proxied, in order to avoid a new network manager (e.g., an auxiliary node of the new proxy network topology management function), and then collect the network topology information, the first auxiliary node may be required to perform the consistency synchronization of the network topology information to reduce the influence on the first network. For another example, the first auxiliary node proxies a heartbeat function, and the master node selects a new auxiliary node for proxying the heartbeat function, and at this time, consistency synchronization may not be performed, and the master node performs consistency synchronization with the new auxiliary node.
It should be noted that the master node may not update the network function parameters, and therefore, step 610 and step 611 may not be performed.
It should be noted that, in addition to the master node determining that the first network function is no longer proxied by the first secondary node, the first secondary node may leave the first network, and at this time, the master node may perform the first network function by itself, or may reselect the secondary node to perform the first network function.
612. The master node leaves the first network.
After step 612, the first network is also released. It is noted that the master node may not leave the network and therefore step 612 may not be performed. It should be noted that step 612 may be executed after any of the above steps, depending on the behavior of the master node.
Optionally, after the primary node determines the first secondary node, the first secondary node may communicate with the primary node for a maximum offline time of the primary node, for example, 1 day, or 1 week, and when the primary node does not complete any interaction with the first secondary node within the maximum offline time, the first secondary node may consider that the primary node of the first network has left the first network, and the first network is released. In the subsequent process, the first auxiliary node may negotiate with other nodes establishing connection, and reselect the master node, and the master node may reselect the auxiliary node.
For example, the maximum offline duration may be that the primary node is configured to the first secondary node in the first configuration information. If there are multiple auxiliary nodes, the maximum offline durations configured by the master node for different auxiliary nodes may be the same or different, and the present application is not limited thereto. In one case, the primary node is considered to leave the first network when the primary node does not complete any interaction with a secondary node within the maximum offline duration corresponding to the secondary node. In another case, when the master node does not complete any interaction with the plurality of secondary nodes within the maximum offline time duration corresponding to the plurality of secondary nodes (which may be part or all of the secondary nodes), the master node is considered to leave the first network.
It should be noted that, if the time for the master node to leave the first network does not reach the maximum offline time, during the time period for the master node to leave, each auxiliary node continues to execute the network function of its own agent, and the synchronization of the network information may be performed after the master node returns to the network. That is to say, the method provided by the present application can meet the mobility requirement of the master node in the distributed network, and as the auxiliary node is introduced, the master node in the network can leave the network within a period of time without affecting the operation of the network, that is, without excessively affecting the steady state (i.e., steady state) of the network. The steady state refers to a stable state in which data to be transmitted, which is generated by one or more sending nodes in the network, is transmitted through a medium in the network, reaches other one or more receiving nodes, and is received and processed. If the amount of data produced and transmitted by the sending node is larger than the amount of data received and processed by the receiving node, network congestion may occur. If the data volume produced and transmitted by the sending node is less than or equal to the data volume received and processed by the receiving node, the network is in a steady state. It should be noted that a network has multiple steady-state conditions, but as long as a node leaves or enters the network, the current steady state is destroyed, and the network needs to adaptively find and match the next steady state.
In order to meet the requirement of optimal network experience in various scenes, when the auxiliary node is selected, the node which is relatively stable in the network can be selected, and the node can monitor the steady state condition of the network, so that when other nodes enter or leave the network, the auxiliary node can optimize the network state in a more targeted manner, and better guarantee of network delay and bandwidth is provided.
The process shown in fig. 6 is a brief introduction to the process by which the primary node determines the secondary node and performs the network function drop.
According to the method, in the distributed network, partial network functions of the main node are given to (or put down by) the auxiliary nodes to be executed, and semi-centralized management of the main node is achieved, so that the power consumption of the main node can be reduced, and the timeliness and the reliability of the network are improved.
Specifically, the network function of the master node is split, the master node may designate other nodes to proxy the network function according to the capabilities of other nodes in the network, and transfer one or more network functions that need to be processed by the master node to the other nodes for execution, so that the network function limited by the capability of the master node device may be transferred to other nodes in the network that can optimize the network function for execution. For example, the network function (e.g., heartbeat function) sensitive to power consumption of the master node is transferred to the node (e.g., large screen) insensitive to power consumption and constantly powered, so that the master node can sense and manage the whole network with lower power consumption, balance between network power consumption and performance is realized on the premise of avoiding frequent network changes (e.g., nodes are continuously added to or leave the first network), and the user coverage of the distributed network is greatly improved. For the heartbeat function, further, a differentiated communication mode between the main node and the auxiliary node (for example, a heartbeat period between the main node and the auxiliary node is greater than that between the auxiliary node and other nodes) can be combined, so that the power consumption of the main node is reduced. As another example, for bandwidth-sensitive network functions, the network can be moved to a node with a large bandwidth (e.g., a router, a large screen, a PC, etc.) in a distributed network, thereby improving the network transmission rate and reliability. It should be noted that if there is no suitable node in the network to proxy the network function, the master node still needs to perform the network function itself.
The start, change, and stop of the network function of the agent of the secondary node are determined only by the primary node. The secondary node does not have the capability to require the non-primary node to switch to other nodes.
For making the embodiments of the present application clearer, the following station exemplarily illustrates the implementation flow of the above method in the perspective of the first auxiliary node, in this example, it is assumed that the first auxiliary node joins the first network after determining the master node, and referring to fig. 11, the following station includes:
1101. the first secondary node searches for a distributed network node (i.e., primary node).
Before step 1101, the first auxiliary node may initialize to turn on a network search function for network searching.
1102. The first secondary node joins the first network by binding and authenticating with the searched primary node.
1103. The first auxiliary node reports the information of the supported network functions to the main node and acquires the information of the main node.
The information of the master node may be, for example, an identifier of the master node, a connection mode supported by the master node, and the like, and in the subsequent process, the first auxiliary node may perform communication in a connection mode supported by both the first auxiliary node and the second auxiliary node, and may also determine whether the received information is information sent by the master node according to the identifier of the master node in the subsequent process.
1104. The first secondary node receives first configuration information of the primary node.
1105. The first auxiliary node determines a self-agent first network function according to the first configuration information, executes the first network function according to an execution strategy of the first network function, and reports the network information according to a network information reporting mode of the first auxiliary node.
1106. If the network function parameter of the first network function changes, the first auxiliary node receives third configuration information from the master node, and the third configuration information is used for updating the network function parameter when the first auxiliary node executes the first network function.
1107. The first auxiliary node executes the first network function according to the updated network function parameter.
1108. The first secondary node leaves the first network.
It should be noted that the first secondary node may not leave the first network, and step 1108 may not be performed.
Under the condition that a first auxiliary node proxies a network access management function, taking the case that the first auxiliary node reports network information related to the network access management function to a main node as an example, in a subsequent process, the first auxiliary node may perform active broadcast search, the active broadcast search is mainly used for scanning and discovering other nodes not networked, when a new node is added, the new node may scan the active broadcast search of the first auxiliary node to acquire information of the first auxiliary node, and establish connection with the first auxiliary node, information (for example, a node identifier) added by the new node is firstly retained on the first auxiliary node and then fed back to the main node according to a heartbeat policy of the main node, or if the main node performs active query, the first auxiliary node may quickly return information added by the new node. In this case, the network entry and subsequent information processing flow of the new node can be seen in fig. 12, which includes:
1201. node X searches for distributed network nodes.
The searched distributed network node may be a master node or a first auxiliary node. If the searched distributed network node is the first auxiliary node, the first auxiliary node may be responsible for authentication, and may also be responsible for binding and authentication. Fig. 12 illustrates an example in which the node X searches for the first auxiliary node.
In step 1201, in a specific implementation, the first network pushes the node performing the network access management function to the node X, and the node X determines the node performing the network access according to the node X, but the node X does not distinguish whether the node performing the network access management function is the primary node or the first secondary node.
1202. And the node X joins the first network through the searched distributed network nodes.
If the first auxiliary node is responsible for authentication, the node X is added into the first network through authentication, and if the first auxiliary node is responsible for binding and authentication, the node X is added into the first network through binding and authentication.
1203. The first subsidiary node transmits the information of the first subsidiary node and the information of the main node to the node X.
In the subsequent process, if the node X receives the instruction with the effect opposite to that simultaneously sent by the main node and the first auxiliary node, the node X executes the instruction according to the instruction of the main node.
1204. The node X sends information (for example, an identifier of the node X, a connection mode of the node X, and the like) added by the node X to the first auxiliary node.
1205. The first secondary node is in heartbeat communication with the primary node. The role of heartbeat communication here is to determine whether devices communicating with each other are online.
1206. And the first auxiliary node sends the information added by the node X to the main node.
1207. Node X leaves the first network.
Note that node X may not leave the first network, and step 1207 may not be performed.
For example, the composition of each node can be seen in fig. 13, and the contained modules may be different for different nodes, which is not limited in the present application. The function of the individual modules in fig. 13 is as follows.
The device management module is configured to manage information of each node in a network (e.g., the first network) that has been networked, and is further configured to perform binding and authentication work on a network access node, and maintain node information in the entire network.
The network state management module is responsible for synchronization and maintenance of state information of each node in the network, and for example, an active heartbeat scheme may be adopted in combination with a lease scheme to maintain the state information of each node.
And the configuration management module is used for managing various configuration items and strategy items of the network.
And the routing management module is responsible for constructing and maintaining information such as a forwarding table and a routing table of the route. The routing is divided into heterogeneous routing management (for example, 3 devices a, B, and C, where a is connected to B via bluetooth, B is connected to C via WiFi, a communicates data to B supporting WiFi via bluetooth link, and then B forwards the data to other WiFi access device C via WiFi) and homogeneous routing management (for example, 3 devices a, B, and C are connected via WiFi, and a forwards the data to C via WiFi of B) according to the difference of forwarding types or routing data types.
And the routing selection module is responsible for selecting the optimal network path for calculation in the network by calculating the network path, time delay and the like.
And the equipment address management module is responsible for the distribution and management of the network equipment address.
And the routing engine module manages a low-level concrete physical communication medium by adopting an event state mechanism in abstract management based on various low-level communication technologies.
For encapsulation of various specific communication technology protocols, such as lowest-layer bluetooth communication, basic WiFi communication, wiFi P2P communication, virtual wireless access point (WiFi SoftAP) communication, USB communication, and the like, in a control plane, interaction may be performed with a control Protocol of a specific Protocol, such as a General Access Profile (GAP) Protocol of bluetooth, an 802.11MAC Protocol of WiFi, and interaction may also be performed with a standard of a specific Protocol in a data plane, so as to implement data interconnection, such as a radio frequency communication Protocol (RFCOMM) Protocol of a classic bluetooth (i.e., bluetooth BR), an Attribute Protocol (Attribute Protocol, ATT)/general Attribute profile (GATT), and the like.
In the present application, for the overall framework shown in fig. 13, differential deployment is performed on the primary node and the secondary node. Specifically, the capability of the whole framework is completely deployed on the main node, but the auxiliary nodes are deployed in a differentiated manner, so that the auxiliary nodes have the capability of managing network information, but the capability can be executed only according to a policy required by the main node, such as a heartbeat policy, and the clock of the main node needs to be aligned, at this time, the main node can know the wakeup period of the whole network managed by the auxiliary nodes, but the main node can interact with the auxiliary nodes according to the own energy consumption policy (such as two clock periods or a dynamic clock period) according to the clock beat, so as to acquire the real-time information maintained by the auxiliary nodes.
The physical devices referred to in this application include, but are not limited to, wiFi, bluetooth, USB, network card, central Processing Unit (CPU) in the node, and the like.
The above description has presented the embodiments of the present application primarily from a method perspective. It will be appreciated that the respective network elements, e.g. the primary node, the secondary node and the first node, for performing the above-described functions, comprise at least one of corresponding hardware structures and software modules for performing the respective functions. Those of skill in the art would readily appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as hardware or combinations of hardware and computer software. Whether a function is performed as hardware or computer software drives hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiment of the present application, the main node, the auxiliary node, and the first node may be divided according to the above method example, for example, each functional unit may be divided corresponding to each function, or two or more functions may be integrated into one processing unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit. It should be noted that the division of the unit in the embodiment of the present application is schematic, and is only a logic function division, and there may be another division manner in actual implementation.
By way of example, fig. 14 shows a schematic diagram of a possible structure of the network management device (denoted as network management device 140) involved in the above embodiments, where the network management device 140 includes a processing unit 1401 and a communication unit 1402. Optionally, a storage unit 1403 is further included. The network management apparatus 140 may be used to illustrate the structures of the primary node, the secondary node, and the first node in the above embodiments.
When the schematic configuration shown in fig. 14 is used to illustrate the structure of the master node in the foregoing embodiment, the processing unit 1401 is used to control and manage the actions of the master node, for example, the processing unit 1401 is used to execute the actions performed by the master node in 601-607, 610, and 612 in fig. 6 and/or other processes described in this embodiment. The processing unit 1401 may communicate with other network entities, e.g. with the first auxiliary node in fig. 6, via the communication unit 1402. The storage unit 1403 is used to store program codes and data of the master node.
When the schematic structure shown in fig. 14 is used to illustrate the structure of the first auxiliary node in the above embodiments, the processing unit 1401 is configured to perform control management on the action of the first auxiliary node, for example, the processing unit 1401 is configured to perform actions performed by the first auxiliary node in 603, 604, 606, 608-611 in fig. 6, fig. 11, fig. 12, and/or other processes described in this embodiment. The processing unit 1401 may communicate with other network entities, e.g. with the master node in fig. 6, via the communication unit 1402. The storage unit 1403 is used for storing program codes and data of the first auxiliary node.
When the schematic structure diagram shown in fig. 14 is used to illustrate the structure of the first node in the foregoing embodiment, the processing unit 1401 is configured to control and manage the action of the first node, for example, the processing unit 1401 is configured to execute 601, 602, 604, 607, 609-611 in fig. 6 (in this case, the first node may be node a or node b), and/or the action executed by the first node in other processes described in this embodiment. The processing unit 1401 may communicate with other network entities, e.g. with the first secondary node in fig. 6, via the communication unit 1402. The storage unit 1403 is used to store program codes and data of the first node.
The schematic structure shown in fig. 14 may also be used to illustrate structures of other nodes (e.g., node X, a second auxiliary node) involved in the foregoing embodiments, where the processing unit 1401 is configured to control and manage actions of the other nodes, and for example, the processing unit 1401 is configured to execute actions performed by the other nodes described in this embodiment of the present application. The processing unit 1401 may communicate with other network entities via a communication unit 1402. A storage unit 1403 is used for program codes and data of the other node.
For example, the network management apparatus 140 may be a device or a chip system.
When the network management apparatus 140 is a device, the processing unit 1401 may be a processor; the communication unit 1402 may be a communication interface, a transceiver, or an input interface and/or an output interface. Alternatively, the transceiver may be a transmit-receive circuit. Alternatively, the input interface may be an input circuit and the output interface may be an output circuit.
When the network management device 140 is a chip or a chip system, the communication unit 1402 can be a communication interface, an input interface and/or an output interface, an interface circuit, an output circuit, an input circuit, a pin or related circuit, etc. on the chip or the chip system. The processing unit 1401 may be a processor, a processing circuit, a logic circuit, or the like.
The integrated unit in fig. 14 may be stored in a computer-readable storage medium if it is implemented in the form of a software functional module and sold or used as a separate product. Based on such understanding, the technical solutions of the embodiments of the present application may be essentially implemented or make a contribution to the prior art, or all or part of the technical solutions may be implemented in the form of a software product stored in a storage medium, and including several instructions for causing a computer device (which may be a personal computer, a server, a network device, or the like) or a processor (processor) to execute all or part of the steps of the methods described in the embodiments of the present application. A storage medium storing a computer software product comprising: various media capable of storing program codes, such as a usb disk, a removable hard disk, a read-only memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The embodiment of the present application further provides a schematic diagram of a hardware structure of a network management apparatus, referring to fig. 15 or fig. 16, the network management apparatus includes a processor 1501, and optionally, a memory 1502 connected to the processor 1501.
The processor 1501 may be a general-purpose Central Processing Unit (CPU), a microprocessor, an application-specific integrated circuit (ASIC), or one or more ics for controlling the execution of programs in accordance with the present disclosure. The processor 1501 may also include multiple CPUs, and the processor 1501 may be a single-core (single-CPU) processor or a multi-core (multi-CPU) processor. A processor herein may refer to one or more devices, circuits, or processing cores that process data (e.g., computer program instructions).
The memory 1502 may be a ROM or other type of static storage device that can store static information and instructions, a RAM or other type of dynamic storage device that can store information and instructions, an EEPROM (electrically erasable programmable read-only memory), a CD-ROM (compact disk read-only memory) or other optical disk storage, optical disk storage (including compact disk, laser disk, optical disk, digital versatile disk, blu-ray disk, etc.), a magnetic disk storage medium or other magnetic storage device, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer, which is not limited in this embodiment. The memory 1502 may be separate (in this case, the memory 1502 may be located outside the network management apparatus or inside the network management apparatus), or may be integrated with the processor 1501. The memory 1502 may include, among other things, computer program code. The processor 1501 is configured to execute the computer program code stored in the memory 1502, thereby implementing the methods provided by the embodiments of the present application.
In a first possible implementation, referring to fig. 15, the network management device further includes a transceiver 1503. The processor 1501, memory 1502, and transceiver 1503 are connected by a bus. The transceiver 1503 is used to communicate with other devices or communication networks. Optionally, the transceiver 1503 may include a transmitter and a receiver. The means for performing the receiving function in the transceiver 1503 may be considered as a receiver for performing the receiving step in the embodiments of the present application. The device for implementing the transmission function in the transceiver 1503 can be regarded as a transmitter for performing the steps of transmission in the embodiment of the present application. Based on the first possible implementation manner, referring to fig. 15, the schematic structure diagram shown in fig. 15 may be used to illustrate the structures of the primary node, the secondary node, and the first node involved in the foregoing embodiments.
While the schematic structural diagram shown in fig. 15 is used to illustrate the structure of the master node in the above embodiments, the processor 1501 is used to control and manage the actions of the master node, for example, the processor 1501 is used to execute the actions performed by the master node in 601-607, 610 and 612 in fig. 6 and/or other processes described in this embodiment. The processor 1501 may communicate with other network entities, e.g., the first auxiliary node in fig. 6, via the transceiver 1503. A memory 1502 is used to store program codes and data for the master node.
When the schematic structure shown in fig. 15 is used to illustrate the structure of the first auxiliary node in the above embodiments, the processor 1501 is configured to control and manage the action of the first auxiliary node, for example, the processor 1501 is configured to execute the actions performed by the first auxiliary node in 603, 604, 606, 608-611 in fig. 6, fig. 11, fig. 12, and/or other processes described in this embodiment. The processor 1501 may communicate with other network entities, e.g., the master node in fig. 6, via the transceiver 1503. The memory 1502 is used for storing program codes and data of the first secondary node.
When the schematic structure diagram shown in fig. 15 is used to illustrate the structure of the first node in the foregoing embodiment, the processor 1501 is configured to control and manage the action of the first node, for example, the processor 1501 is configured to execute 601, 602, 604, 607, 609-611 in fig. 6 (in this case, the first node may be node a or node b), and/or the action executed by the first node in other processes described in this embodiment. The processor 1501 may communicate with other network entities, e.g., the first auxiliary node in fig. 6, via the transceiver 1503. The memory 1502 is used to store program codes and data for the first node.
The structure diagram shown in fig. 15 may also be used to illustrate the structure of another node (e.g., node X, a second auxiliary node) involved in the foregoing embodiments, where the processor 1501 is configured to control and manage the action of the other node, for example, the processor 1501 is configured to execute the action performed by the other node described in this embodiment. The processor 1501 may communicate with other network entities via the transceiver 1503. A memory 1502 is used for program codes and data for the other nodes.
In a second possible implementation, the processor 1501 includes logic circuits and an input interface and/or an output interface. Illustratively, the output interface is for performing the act of transmitting in the respective method and the input interface is for performing the act of receiving in the respective method. Based on the second possible implementation manner, referring to fig. 16, the schematic structure diagram shown in fig. 16 may be used to illustrate the structures of the primary node, the secondary node, and the first node in the foregoing embodiment.
While the schematic structural diagram shown in fig. 16 is used to illustrate the structure of the master node in the above embodiments, the processor 1501 is configured to control and manage the actions of the master node, for example, the processor 1501 is configured to execute the actions performed by the master node in 601-607, 610, and 612 in fig. 6 and/or other processes described in this embodiment. The processor 1501 may communicate with other network entities, e.g. with the first auxiliary node in fig. 6, via an input interface and/or an output interface. A memory 1502 is used to store program codes and data for the master node.
When the schematic structure shown in fig. 16 is used to illustrate the structure of the first auxiliary node in the above embodiments, the processor 1501 is configured to control and manage the action of the first auxiliary node, for example, the processor 1501 is configured to execute the actions performed by the first auxiliary node in 603, 604, 606, 608-611 in fig. 6, fig. 11, fig. 12, and/or other processes described in this embodiment. The processor 1501 may communicate with other network entities, e.g., the master node in fig. 6, via an input interface and/or an output interface. A memory 1502 is used to store program codes and data for the first secondary node.
When the schematic structure diagram shown in fig. 16 is used to illustrate the structure of the first node in the foregoing embodiment, the processor 1501 is configured to control and manage the action of the first node, for example, the processor 1501 is configured to execute 601, 602, 604, 607, 609-611 in fig. 6 (in this case, the first node may be node a or node b), and/or the action executed by the first node in other processes described in this embodiment. The processor 1501 may communicate with other network entities, e.g. with the first auxiliary node in fig. 6, via an input interface and/or an output interface. The memory 1502 is used to store program codes and data for the first node.
The structure diagram shown in fig. 16 may also be used to illustrate the structure of another node (e.g., node X, a second auxiliary node) involved in the foregoing embodiment, where the processor 1501 is configured to control and manage the action of the other node, for example, the processor 1501 is configured to execute the action performed by the other node described in this embodiment of the present application. The processor 1501 may communicate with other network entities via an input interface and/or an output interface. A memory 1502 is used for program codes and data for the other nodes.
In implementation, the steps in the method provided by this embodiment may be implemented by integrated logic circuits of hardware in a processor or instructions in the form of software. The steps of the method disclosed in connection with the embodiments of the present application may be directly implemented by a hardware processor, or implemented by a combination of hardware and software modules in a processor.
Embodiments of the present application also provide a computer-readable storage medium, which includes instructions that, when executed on a computer, cause the computer to perform any of the above methods.
Embodiments of the present application also provide a computer program product containing instructions that, when executed on a computer, cause the computer to perform any of the methods described above.
An embodiment of the present application further provides a communication system, including: the primary node, the secondary node, and one or more other nodes.
An embodiment of the present application further provides a chip, including: a processor coupled to the memory through the interface, and an interface, when the processor executes the computer program or instructions in the memory, causing any of the methods provided by the above embodiments to be performed.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented using a software program, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. The procedures or functions described in accordance with the embodiments of the present application are all or partially generated upon loading and execution of computer program instructions on a computer. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored on a computer readable storage medium or transmitted from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center via wire (e.g., coaxial cable, fiber optic, digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). Computer-readable storage media can be any available media that can be accessed by a computer or can comprise one or more data storage devices, such as servers, data centers, and the like, that can be integrated with the media. The usable medium may be a magnetic medium (e.g., a floppy disk, a hard disk, a magnetic tape), an optical medium (e.g., a DVD), or a semiconductor medium (e.g., a Solid State Disk (SSD)), among others.
While the present application has been described in connection with various embodiments, other variations to the disclosed embodiments can be understood and effected by those skilled in the art in practicing the claimed application, from a review of the drawings, the disclosure, and the appended claims. In the claims, the word "comprising" does not exclude other elements or steps, and the word "a" or "an" does not exclude a plurality. A single processor or other unit may fulfill the functions of several items recited in the claims. The mere fact that certain measures are recited in mutually different dependent claims does not indicate that a combination of these measures cannot be used to advantage.
Although the present application has been described in conjunction with specific features and embodiments thereof, it will be evident that various modifications and combinations can be made thereto without departing from the spirit and scope of the application. Accordingly, the specification and drawings are merely illustrative of the present application as defined in the appended claims and are intended to cover any and all modifications, variations, combinations, or equivalents within the scope of the application. It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.

Claims (28)

1. A method of network management, comprising:
the method comprises the steps that a main node determines a first auxiliary node in at least one node according to information of network functions supported by the at least one node and information of first network functions of the main node, the first auxiliary node is used for replacing the main node to execute the first network functions, and the first network functions are partial network functions of the main node;
the main node sends first configuration information to the first auxiliary node, wherein the first configuration information is used for configuring a network information reporting mode of the first auxiliary node and an execution strategy of the first network function.
2. The method of claim 1, wherein the first configuration information comprises first indication information and second indication information;
the first indication information is used for indicating a network information reporting mode of the first auxiliary node; the network information reporting mode is a mode that the first auxiliary node reports network information related to the first network function to the main node or a second auxiliary node; the second auxiliary node is configured to report, to the master node, network information related to the first network function, which is reported by the first auxiliary node;
the second indication information is used for indicating a network function parameter when the first network function is executed between the first auxiliary node and other nodes, where the other nodes are some or all of the at least one node except the first auxiliary node.
3. The method of claim 2, further comprising:
the master node sends second configuration information to a first node, where the second configuration information includes third indication information and fourth indication information, the third indication information is used to indicate that the first network function is proxied by the first auxiliary node, the fourth indication information is used to indicate a network function parameter when the first network function is executed between the first node and the first auxiliary node, and the first node is a node among the other nodes.
4. The method of claim 3, further comprising:
the main node sends third configuration information to the first auxiliary node, wherein the third configuration information is used for updating network function parameters when the first network function is executed between the first auxiliary node and the other nodes; and/or the presence of a gas in the gas,
the master node sends fourth configuration information to the first node, where the fourth configuration information is used to update a network function parameter when the first network function is executed between the first node and the first auxiliary node.
5. The method of any of claims 2-4, wherein if the primary node determines that the first network function is no longer being performed by the first secondary node, the method further comprises:
performing the first network function between the master node and the other nodes; or,
the primary node reselects a secondary node for the first network function.
6. The method according to any one of claims 1-5, further comprising:
the master node receives information of network functions supported by the at least one node from the at least one node, respectively.
7. The method according to any of claims 1-6, wherein the determining by the master node of the first secondary node in the at least one node based on information of network functions supported by the at least one node and information of a first network function of the master node comprises:
the main node determines, according to the information on the network functions supported by the at least one node and the information on the first network functions, a node that supports the first network functions and satisfies one or more of the following conditions as the first auxiliary node: 1) Supporting the execution of the first network function in place of the master node; 2) Supplying power constantly; 3) The power consumption when the first network function is executed is less than or equal to the power consumption when the main node executes the first network function; 4) An enforcement policy supporting the master node to control the first network function; 5) The time delay when the first network function is executed is less than or equal to the time delay when the main node executes the first network function; 6) The reliability when the first network function is executed is higher than or equal to the reliability when the master node executes the first network function.
8. The method according to any of claims 1-7, wherein the first network function is a network topology management function, a network access management function, a network device information management function, or a heartbeat function.
9. A method of network management, comprising:
a first auxiliary node receives first configuration information from a main node, wherein the first configuration information is used for configuring a network information reporting mode of the first auxiliary node and an execution strategy of a first network function, the first auxiliary node is used for replacing the main node to execute the first network function, the first network function is a part of network functions of the main node, and the first auxiliary node is a node in at least one node except the main node;
and the first auxiliary node executes the first network function according to the execution strategy of the first network function and reports network information according to the network information reporting mode of the first auxiliary node.
10. The method of claim 9, wherein the first configuration information comprises first indication information and second indication information;
the first indication information is used for indicating a network information reporting mode of the first auxiliary node; the network information reporting mode is a mode that the first auxiliary node reports network information related to the first network function to the main node or a second auxiliary node; the second auxiliary node is configured to report, to the master node, network information related to the first network function, which is reported by the first auxiliary node;
the second indication information is used for indicating a network function parameter when the first network function is executed between the first auxiliary node and other nodes, where the other nodes are some or all of the at least one node except the first auxiliary node.
11. The method of claim 10, further comprising:
the first auxiliary node receiving network information relating to the first network function from the other nodes;
the reporting of the network information by the first auxiliary node according to the network information reporting mode of the first auxiliary node comprises the following steps: and the first auxiliary node reports the network information related to the first network function to the main node or the second auxiliary node according to the network information reporting mode of the first auxiliary node.
12. The method according to claim 10 or 11, characterized in that the method further comprises:
the first auxiliary node receives third configuration information from the main node, wherein the third configuration information is used for updating network function parameters when the first auxiliary node and the other nodes execute the first network function;
and the first auxiliary node executes the first network function according to the updated network function parameter and the other nodes.
13. The method of claim 12, wherein if the updated network function parameter when the first network function is executed between the first auxiliary node and the other nodes indicates that the first auxiliary node no longer proxies the first network function, the method further comprises:
the first secondary node determines that the first network function is no longer proxied.
14. The method according to any one of claims 9-13, further comprising:
the first secondary node sends information of network functions supported by the first secondary node to the primary node.
15. The method according to any of claims 9-14, wherein the node of the at least one node that supports the first network function and that fulfils one or more of the following conditions is the first secondary node: 1) Supporting the execution of the first network function in place of the master node; 2) Supplying power constantly; 3) The power consumption when the first network function is executed is less than or equal to the power consumption when the main node executes the first network function; 4) An enforcement policy supporting the master node to control the first network function; 5) The time delay when the first network function is executed is less than or equal to the time delay when the main node executes the first network function; 6) The reliability when the first network function is executed is higher than or equal to the reliability when the master node executes the first network function.
16. A method of network management, comprising:
the method comprises the steps that a main node determines a first auxiliary node in at least one node according to information of network functions supported by the at least one node and information of first network functions of the main node, the first auxiliary node is used for replacing the main node to execute the first network functions, and the first network functions are partial network functions of the main node;
the main node sends first configuration information to the first auxiliary node, wherein the first configuration information is used for configuring a network information reporting mode of the first auxiliary node and an execution strategy of the first network function;
the first secondary node receiving the first configuration information from the primary node;
and the first auxiliary node executes the first network function according to the execution strategy of the first network function and reports network information according to the network information reporting mode of the first auxiliary node.
17. The method of claim 16, wherein the first configuration information comprises first indication information and second indication information;
the first indication information is used for indicating a network information reporting mode of the first auxiliary node; the network information reporting mode is a mode that the first auxiliary node reports network information related to the first network function to the main node or a second auxiliary node; the second auxiliary node is configured to report, to the master node, network information related to the first network function, which is reported by the first auxiliary node;
the second indication information is used for indicating a network function parameter when the first network function is executed between the first auxiliary node and other nodes, where the other nodes are some or all of the at least one node except the first auxiliary node.
18. The method of claim 17, further comprising:
the master node sends second configuration information to a first node, wherein the second configuration information comprises third indication information and fourth indication information, the third indication information is used for indicating that the first network function is proxied by the first auxiliary node, the fourth indication information is used for indicating a network function parameter when the first network function is executed between the first node and the first auxiliary node, and the first node is a node in other nodes;
the first node receiving the second configuration information from the master node;
the first node determines the first auxiliary node according to the third indication information;
and the first node executes the first network function according to the network function parameter indicated by the fourth indication information and the first auxiliary node.
19. The method of claim 17 or 18, further comprising:
the first auxiliary node receiving network information relating to the first network function from the other nodes;
the reporting of the network information by the first auxiliary node according to the network information reporting mode of the first auxiliary node comprises the following steps: the first auxiliary node reports network information related to the first network function to the main node or the second auxiliary node according to a network information reporting mode of the first auxiliary node;
the primary node or the second secondary node receives network information related to the first network function from the first secondary node.
20. The method according to any one of claims 17-19, further comprising:
the main node sends third configuration information to the first auxiliary node, wherein the third configuration information is used for updating network function parameters when the first network function is executed between the first auxiliary node and the other nodes;
the first secondary node receiving the third configuration information from the primary node;
and the first auxiliary node executes the first network function according to the updated network function parameter and the other nodes.
21. The method of claim 20, wherein if the updated network function parameter when the first network function is executed between the first auxiliary node and the other node indicates that the first auxiliary node no longer proxies the first network function, the method further comprises:
the first secondary node determines that the first network function is no longer proxied.
22. The method of claim 18, further comprising:
the master node sends fourth configuration information to the first node, wherein the fourth configuration information is used for updating network function parameters when the first network function is executed between the first node and the first auxiliary node;
the first node receiving the fourth configuration information from the master node;
and the first node executes the first network function according to the updated network function parameter and the first auxiliary node.
23. The method of any of claims 16-22, wherein the determining, by the master node, a first secondary node in at least one node based on information of network functions supported by the at least one node and information of a first network function of the master node, comprises:
the main node determines, according to the information on the network functions supported by the at least one node and the information on the first network functions, a node that supports the first network functions and satisfies one or more of the following conditions as the first auxiliary node: 1) Supporting execution of the first network function in place of the master node; 2) Supplying power constantly; 3) The power consumption when the first network function is executed is less than or equal to the power consumption when the main node executes the first network function; 4) An enforcement policy supporting the master node to control the first network function; 5) The time delay when the first network function is executed is less than or equal to the time delay when the main node executes the first network function; 6) The reliability when the first network function is executed is higher than or equal to the reliability when the master node executes the first network function.
24. The method according to any of claims 16-23, wherein the first network function is a network topology management function, a network access management function, a network device information management function, or a heartbeat function.
25. The method according to any one of claims 16-24, further comprising:
the at least one node reports information of the network functions supported by the at least one node to the master node respectively;
the master node receives information of network functions supported by the at least one node from the at least one node, respectively.
26. The method of any of claims 17-21, wherein if the primary node determines that the first network function is no longer being performed by the first secondary node, the method further comprises:
performing the first network function between the master node and the other nodes; or,
and the main node selects an auxiliary node for the first network function again, and the other nodes and the auxiliary node which is determined by the main node again and is used for proxying the first network function execute the first network function.
27. A network management apparatus, comprising: a functional unit for performing the method according to any of claims 1-15; the actions executed by the functional units are realized by hardware or by hardware executing corresponding software.
28. A network management apparatus, comprising: a processor;
the processor is coupled to a memory for storing computer-executable instructions, the processor executing the computer-executable instructions stored by the memory to cause the network management apparatus to implement the method of any of claims 1-15.
CN202110736813.7A 2021-06-30 2021-06-30 Network management method and device Pending CN115550957A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202110736813.7A CN115550957A (en) 2021-06-30 2021-06-30 Network management method and device
PCT/CN2022/087930 WO2023273533A1 (en) 2021-06-30 2022-04-20 Network management method and apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110736813.7A CN115550957A (en) 2021-06-30 2021-06-30 Network management method and device

Publications (1)

Publication Number Publication Date
CN115550957A true CN115550957A (en) 2022-12-30

Family

ID=84690219

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110736813.7A Pending CN115550957A (en) 2021-06-30 2021-06-30 Network management method and device

Country Status (2)

Country Link
CN (1) CN115550957A (en)
WO (1) WO2023273533A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117135729B (en) * 2023-01-20 2024-05-24 荣耀终端有限公司 Multi-device cooperation method, system and terminal device

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7995467B2 (en) * 2007-12-12 2011-08-09 Synapsense Corporation Apparatus and method for adapting to failures in gateway devices in mesh networks
US9735930B2 (en) * 2014-05-02 2017-08-15 Telefonaktiebolaget Lm Ericsson (Publ) System and method using a secondary network node for handling packet retransmissions
JP2020511844A (en) * 2017-03-21 2020-04-16 オッポ広東移動通信有限公司Guangdong Oppo Mobile Telecommunications Corp., Ltd. Communication method, secondary network node and terminal
HUE058127T2 (en) * 2017-10-10 2022-07-28 Ericsson Telefon Ab L M Report nsa/sa nr indicator
CN113196827A (en) * 2019-03-18 2021-07-30 苹果公司 Data forwarding in MR-DC with 5GC operations involving SN changes

Also Published As

Publication number Publication date
WO2023273533A1 (en) 2023-01-05

Similar Documents

Publication Publication Date Title
RU2693592C1 (en) Method, device and a computer program product for a service detection proxy session for wireless communication
EP2384590B1 (en) Method for device capability advertising and discovery in a wireless network.
US9591582B1 (en) Smart co-processor for optimizing service discovery power consumption in wireless service platforms
US10194478B2 (en) Method and apparatus for performing wireless docking service
CN104956761B (en) Use the direct-connected method of servicing of the WI-FI of NFC and its equipment
US8060590B2 (en) Distance-aware service discovery mechanism for determining the availability of remote services in wireless personal area networks
EP3337223B1 (en) Method for remotely managing a sensor network topology and gateway
US10652730B2 (en) Traffic-aware group reformation in a multi-group P2P network
CN104333888A (en) Self-organized instant messaging method based on Wi-Fi direct connection
US7801080B2 (en) Root mobile router and the operating method thereof in dynamically composed moving network
JP2014504065A (en) Probe messaging for direct link connections
US12034821B2 (en) Computing aware-session management method and communication apparatus
US10362452B2 (en) Mechanism for quick connection in wireless peer to peer networks
EP4258710A1 (en) Method for transmitting data in near field, device and system
EP4319461A1 (en) Session management method and apparatus for cross-domain computing-aware network
Shahin et al. A framework for P2P networking of smart devices using Wi-Fi direct
CN102684966B (en) Equipment method of network entry, Apparatus and system
KR102200775B1 (en) Communication device, communication method, and program
US20240224300A1 (en) Channel configuration method, and apparatus
WO2023273533A1 (en) Network management method and apparatus
CN115580943A (en) Communication method and network based on networking service, terminal device and storage medium
CN107689986A (en) The data communications method of communication equipment, communication equipment and storage device in wireless self-organization network
CN113873554A (en) Method and system for acquiring and issuing synchronous configuration of Mesh networking
Mbala et al. Android Wi-Fi Direct Architecture: From Protocol Implementation to Formal Specification
Mannan et al. Mesh network-based device-to-device negotiation system for energy management

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination