EP3878215A1 - Systems and methods for multicast group routing, firmware updating, and next-hop routing in tree-based wireless networks - Google Patents
Systems and methods for multicast group routing, firmware updating, and next-hop routing in tree-based wireless networksInfo
- Publication number
- EP3878215A1 EP3878215A1 EP19883046.5A EP19883046A EP3878215A1 EP 3878215 A1 EP3878215 A1 EP 3878215A1 EP 19883046 A EP19883046 A EP 19883046A EP 3878215 A1 EP3878215 A1 EP 3878215A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- node
- nodes
- multicast group
- child
- network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/16—Multipoint routing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/16—Arrangements for providing special services to substations
- H04L12/18—Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
- H04L12/1881—Arrangements for providing special services to substations for broadcast or conference, e.g. multicast with schedule organisation, e.g. priority, sequence management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/24—Connectivity information management, e.g. connectivity discovery or connectivity update
- H04W40/32—Connectivity information management, e.g. connectivity discovery or connectivity update for defining a routing cluster membership
Definitions
- the present invention relates generally to tree-based wireless networks, and in various embodiments more specifically to multicast routing, firmware updating and next-hop routing in such networks.
- One commonly used wireless network has a tree-based structure. This network architecture is often deployed in device networks organized or governed by controllers. For example, tree-based wireless networks are often used when a controller controls a group of network members (or“nodes”); each group member will be reachable via a path across the wireless tree, enabling a point-to-multipoint communication (P2MP) (such as from the controller to the nodes) and multipoint-to-point communication (MP2P) (such as from the nodes to the controller).
- P2MP point-to-multipoint communication
- MP2P multipoint-to-point communication
- Common applications include controlled lighting systems, city -wide automatic meter-reading system etc.
- a network group includes a collection of network nodes that share a certain capability, and a network node may belong to more than one group.
- the first network group may include all network nodes equipped with sensors for measuring air quality near the nodes
- the second group may include network nodes equipped with streetlight controllers of a specific type.
- a network node equipped with both the air-quality sensor and the particular streetlight controller may thus belong to both the first and second groups.
- the wireless network may use various random-access algorithms to access the wireless channels.
- a carrier-sense multiple access with collision avoidance (CSMA/CA) algorithm may be used to access a radio channel for packet delivery (in accordance with, e.g., the IEEE 802.15.4 and 802.11 standards).
- CSMA/CA carrier-sense multiple access with collision avoidance
- the heavier the load on the channel the more challenging it will be to“acquire” the channel for packet delivery, thereby increasing communication delay and reducing the throughput performance of the wireless network.
- the spurious energy from the heavily used channel may “leak” to the adjacent channels and reduce their signal -to-noise ratio, thereby degrading performance.
- the term“channel” is understood as follows. Each node broadcasts within an assigned frequency band of the radio spectrum. Within its assigned band, a node sends and receives data over a smaller band or over a selected one of several smaller bands; each of these smaller bands represents a separate“channel.”
- one conventional approach for delivering a packet containing a target group identifier and packet payload from a tree root to a target group is to“flood” the entire tree and broadcast the packet to all nodes thereon.
- Each node upon receipt of the broadcast packet, may re-broadcast the received multicast message, compare its group identifiers with that of the received packet, and process the received packet payload in the event of a match to the packet’s group identifiers. But because the broadcasts are not acknowledged, some messages may not reach the target group.
- the radio channel may be heavily used across the tree network, i.e., the entire geographical area covered by the tree. Even when a group is collectively located in a specific geographical area and covered by only several nodes, the multicast message is still unnecessarily broadcast across all tree nodes.
- the root may generate (or receive from a network management system) a unicast message containing a target multicast group identifier. All nodes along the path to the target node deliver the message as a unicast message with acknowledgement. As a result, the probability that the message will reach the target node is higher than with non-acknowledged delivery via broadcasting.
- the radio channel is heavily used only by the nodes that are on the paths to the target nodes. But this approach has its own inefficiencies.
- a node e.g., node 102 as depicted
- a node that is on the path to several sub-trees containing the target group member must transmit the packet multiple times, each time for another unicast that propagates on a different path from the root to the target node.
- 1B has to deliver two separate unicast messages to the nodes 104 and 106 via the paths 108, 110, respectively.
- Another conventional approach combines unicasting and broadcasting for multicast delivery of a packet from the tree root to the target group.
- the multicast delivery may be performed via unicasting followed by broadcasting.
- the root node 112 first delivers the message to the“first” node 114 via unicasting; subsequently, the node 114 broadcasts the message to the sub-trees 116, 118 containing the target group members there below.
- the term“first node” refers to the node that receives messages via unicasting.
- the root node 112 may identify and unicast the message to multiple nodes, which then broadcast the message. For example, as depicted in FIG. 1C, a multicast message can be delivered to node 120 via broadcasting and then to node 122 via unicasting.
- a tree-based wireless network generally includes a collection (e.g., thousands) of network nodes; each node includes a firmware file for performing various functions.
- the firmware file is typically periodically updated to, for example, provide additional functions and/or update the operating environment for more complex software associated with the nodes. Reliably updating the firmware file throughout thousands of network nodes in the tree-based wireless network, although of the most important and most demanding activities in the wireless network, remains challenging.
- one conventional approach for updating the firmware file is to“flood” the entire tree and broadcast an updated firmware file to all nodes thereon.
- Each node upon receipt of the broadcast file, may re-broadcast the received file to the“down-the-tree” nodes. But because the broadcasts are not acknowledged, the updated firmware file may not reach some of the nodes.
- Another conventional approach for updating the firmware file in the network is by individual unicasting. For example, referring to FIG. 1E, each node in the network transmits the updated firmware file in a unicasting manner with acknowledgement. As a result, the probability that the firmware file will be received by all nodes is higher than with non- acknowledged delivery via broadcasting. But because the firmware file usually consists of a large amount of payload, it is extremely inefficient to use unicasting to update the firmware file in the tree-based network. A long period of time (e.g., many days) may be required for the firmware file to reach all the thousands of network nodes. Accordingly, there is a need for approaches that can efficiently and reliably update the firmware file in the network nodes in a tree-based wireless network.
- the tree or other network topology over which nodes wirelessly communicate may change dynamically in response to the entry or departure of nodes and changing conditions and constraints.
- the wireless capabilities of individual nodes may be affected by factors such as effective transmission power, receiver sensitivity, radio interference, hidden terminals, and other factors. Since the wireless environment is constantly changing, so may the route from a source node to a destination node (i.e., the sequence of intermediate nodes, or“hops,” traversed by packets transmitted by the source node en route to the destination node). That route is determined by the routing protocol used by the network; examples include RPL (which uses a DODAG topology and IPv6 for control messages) and Zigbee (which is AODV-based and uses IEEE 802.15.4 MAC for network control messages).
- RPL which uses a DODAG topology and IPv6 for control messages
- Zigbee which is AODV-based and uses IEEE 802.15.4 MAC for network control messages.
- the routing protocol does not dictate the algorithm used to determine the multi-hop node sequence that a packet will traverse to its destination.
- the protocol does, however, enable the network nodes to exchange information regarding capabilities and utilization. This allows network nodes to be updated with information about neighboring nodes and their ability to serve as a next hop along a route from source to destination.
- each node periodically transmits a“beacon” message announcing its capabilities as well as its own neighboring nodes or, in some cases, its internal representation of the network or portion thereof. Beacon messages (or frames) announce the entry of new network nodes, synchronize the nodes, and allow nodes to populate routing tables and make routing decisions based on the capabilities of neighboring nodes.
- a beacon message may consist of an IEEE 802.11 MAC header, a body, and a frame check sequence.
- the body includes capability information for the node, e.g., service set ID, support rates, a frequency -hopping parameter set, a direct-sequence parameter set, a contention-free parameter set, an IBSS parameter set, and/or a current traffic-indication map.
- Beacon messages are received by all nodes within“radio distance” of the announcing node, i.e., nodes that can receive direct transmissions from the announcing node and are therefore one-hop neighbors thereof.
- a one-hop neighbor of the announcing node In order to receive a beacon message, a one-hop neighbor of the announcing node must tune its radio receiver to the radio channel over which the beacon was transmitted. This requirement is easily satisfied if all nodes are use the same channel, but to increase the overall network throughput, radio networks usually use multiple orthogonal (independent) channels. As a result, a beacon will not be received by any one-hop neighbor tuned to a different radio channel during beacon transmission.
- One way to allow nodes to receive beacon announcements in a multi-channel wireless network is to equip each node with two sets of radio receivers. Every node can use one receiver for routine communication over its currently assigned channel and the other receiver to handle beacons. The need for redundant hardware and attendant software is expensive, however. Accordingly, a more common scheme is for a node with a single receiver to temporarily“hold” its activities on its current communication channel and request one-hop neighbors to hold their traffic to the announcing node as well. During the hold, the requesting node switches its receiver to another channel for a certain interval in order to receive beacons over the other channel by one-hop neighbors. This procedure is termed“hold and sniff.” Because normal traffic flow is interrupted during the hold period, it is desirable to minimize that period. Conventional hold-and-sniff protocols, however, generally utilize a fixed period.
- Various embodiments of the present invention relate to efficient and reliable multicast routing of a group packet in a tree-based wireless network by minimizing wireless transmissions, thereby reducing the loads on the wireless channels.
- the group packet includes a payload and routing information (such as a target bit identifier vector and a target multicast group ID).
- a parent- node multicast group map (MGM) table associated with the node (i.e., parent node) and one or more child-node MGM tables associated with the child node(s) of the parent node may be established and stored in memory accessible to a network management system (NMS).
- NMS network management system
- the parent-node MGM table and child-node MGM tables may include information, such as one or more identifiers (IDs) associated with the multicast group(s) in which the parent/child node(s) is a member and/or a bit identifier vector(s) for pointing to the bit(s) in the parent-node/child- node MGM tables representing the supporting group ID(s).
- IDs identifiers
- the parent node upon receipt of a multicast group packet, retrieves information stored in the parent- node MGM table and/or child-node MGM tables based on routing information in the group packet; the parent node can then determine whether to forward the multicast group packet to any of its child nodes based on the retrieved information.
- the multicast routing traffic described herein does not reach network nodes that neither contain the target group members nor are a transit node on the path to the target group node(s).
- the duration and the number of packet transmissions from the parent nodes to their associated child nodes across the wireless network may be minimized (or at least reduced relative to conventional routing schemes), thereby decreasing the bandwidth consumption and interference.
- This may significantly increase the overall throughput, reduce the delay performance of the network, and reduce the likelihood of a“punctured” packet due to bit hits, thereby maintaining“clean air” in the wireless channels.
- embodiments of the invention described herein may advantageously save bandwidth as well as allow for a larger payload in each delivery.
- the present invention is related to approaches for efficiently and reliably updating a firmware file in a tree-based wireless network by broadcasting the firmware file in the network nodes and allowing the network nodes that transmit and receive the firmware file to communicate so as to ensure receipt of the firmware file in each of the receiving nodes.
- the firmware file is divided into multiple chunks (or“blocks”); each chunk is assigned with a sequence number based on its order in the divided firmware file and can be included in a single data packet for transmission from a network node to another network node.
- each chunk in the data packet may be preceded by a header that describes, for example, a type of the updated firmware file, a time stamp indicating the release time of the firmware file and/or a sequence number associated with the chunk.
- the data packet including the chunk and its associated header can then be broadcast from the root node to its associated child nodes in a transceiver cell.
- the receiving nodes may determine whether the chunk contained therein is“new” (i.e., an updated version); and if so, the receiving nodes may accept the new chunk and schedule it for future broadcasting to its child nodes in its associated cell.
- the parent node periodically transmits to its child nodes a negative-acknowledgment (NACK)-request message indicating the types, time stamps and/or sequence numbers associated with all (or at least some) chunks that the parent node has transmitted.
- NACK negative-acknowledgment
- each child node may identify the chunk(s) that is listed in the NACK-request message but currently missing in the child node, and report the missing chunk(s) to the parent node using aNACK message.
- a transmission approach involving drawing of a random time for the child node to wait before it transmits its NACK message to the parent node is implemented to minimize the number of transmissions of the NACK messages from each child node to the parent node, thereby preventing a“NACK storm” in the parent node.
- the parent node upon receipt of the NACK message indicating a list of missing chunks in at least one of its child nodes, adds the indicated missing chunks to its future schedule for broadcasting.
- the future schedule may include the missing chunks identified in the NACK messages as well as new chunks that have not been broadcast.
- a scheduler logic that classifies the chunks into three states can then be implemented to determine the timing for transmitting a new chunk and/or re-transmitting an old, missing chunk based on the states of the chunks.
- various embodiments provide approaches to efficiently updating the firmware file in the network nodes by broadcasting the chunks of the firmware file in the wireless network.
- various embodiments ensure reliability of the broadcasting by using the NACK-request messages transmitted from the parent nodes to their associated child nodes and the NACK messages transmitted from the child nodes to the parent nodes in response to the received NACK-request messages.
- various embodiments of the present invention relate to efficient and reliable communication of beacons among neighboring nodes in a wireless network.
- nodes instead of having each node transmit beacons over its operational channel and switch to a different channel to receive its one-hop neighbors’ beacons, nodes transmit beacons over a different channel (i.e., different from the operational channel) and receive beacons over their operational channels.
- These outgoing“visitor beacons” may contain the usual beacon information but most importantly specify the operating channel of the transmitting node over which conventional beacons may be transmitted and received.
- the fact that a beacon-transmitting node switches channels while a beacon receiving node communicates over its regular channel helps reduce the overall time during which nodes are not available on their regular channels.
- the invention pertains to a method of multicast routing a group packet in a network including multiple cells, each supporting communication among multiple transceiver nodes therein and being capable of receiving and transmitting group packets, each cell including a parent node and one or more child nodes, each group packet including routing information and a payload.
- the method includes (a) for each cell, establishing and storing one or more child-node multicast group map tables associated with the child node(s), each of the child-node multicast group map table(s) including (i) an ID associated with at least one multicast group in which the cell is a member and (ii) at least one identifier vector for identifying the multicast group ID in the child-node multicast group map table; (b) receiving a multicast group packet whose routing information includes a target identifier vector and a target multicast group ID; (c) determining whether to forward the multicast group packet to the child node(s) based at least in part on the child- node multicast group map table(s) associated therewith and the received target identifier vector; and (d) if so, causing the parent node to forward the multicast group packet to the child node(s).
- the identifier vector points to a bit in the child-node multicast group map table and step (c) includes determining whether the bit pointed to by the received target identifier vector is set to a non-zero value, and if so, causing the parent node to forward the multicast group packet to the child node(s).
- the method may further include establishing and storing a parent-node multicast group map table associated with the parent node, the parent-node multicast group map table including (i) an ID associated with each multicast group IDs supported by all of the child node(s) of the parent node and subtrees associated therewith and (ii) at least one identifier vector merging the identifier vectors associated with all of the child node(s) of the parent node.
- the parent-node multicast group map table is established by applying a bitwise OR operation on the child-node multicast group map table(s) of the child nodes of the parent node.
- the child-node multicast group map table(s) may have a size corresponding to a maximum number of the multicast group supported by the network.
- the forwarding step includes forwarding, by the parent node, the multicast group packet to the child node(s) in a broadcasting or multiple unicasting manner.
- the method may further include determining a number of the child nodes to which the multicast group packet is forwarded.
- the method further includes causing the parent node to forward the multicast group packet in a broadcasting manner if the number of the child nodes to which the multicast group packet is forwarded exceeds one.
- the method may further include causing the parent node to forward the multicast group packet in a unicasting manner if the multicast group packet is forwarded to a single child node.
- the method further includes determining whether the target multicast group ID associated with the group packet matches the multicast group ID in the child-node multicast group map table(s); and if so, causing the group packet to be transferred to a higher stack layer within the child node(s).
- the invention in another aspect, relates to a network system for multicast routing a group packet in a network including multiple cells, each supporting communication among multiple transceiver nodes therein and being capable of receiving and transmitting group packets, each cell including a parent node and one or more child nodes, each group packet including routing information and a payload.
- the system includes memory for storing one or more child-node multicast group map tables associated with the child node(s), each of the child-node multicast group map table(s) including (i) an ID associated with at least one multicast group and (ii) at least one identifier vector for identifying the multicast group ID in the child-node multicast group map table; and multiple network management systems associated with the network system and each of the transceiver nodes.
- the network management system associated with the network system is configured to receive a multicast group packet whose routing information includes a target identifier vector and a target multicast group ID; and the network management system associated with each of the nodes is configured to (i) determine whether to forward the multicast group packet to the child node(s) based at least in part on the child-node multicast group map table(s) associated therewith and the received target identifier vector; and (ii) if so, cause the parent node to forward the multicast group packet to the child node(s).
- the identifier vector points to a bit in the child-node multicast group map table and the network management system associated with each node is further configured to determine whether the bit pointed to by the received target identifier vector is set to a non zero value, and if so, cause the parent node to forward the multicast group packet to the one or more child nodes.
- the network management system associated with each node may be further configured to establish a parent-node multicast group map table associated with the parent node, the parent-node multicast group map table including (i) an ID associated with each multicast group IDs supported by all of the child node(s) of the parent node and subtrees associated therewith and (ii) at least one identifier vector merging the identifier vectors associated with all of the child node(s) of the parent node; and store the parent-node multicast group map in the memory.
- the network management system associated with each node may be further configured to establish the parent-node multicast group map table by applying a bitwise OR operation on the child-node multicast group map table(s) of the child nodes of the parent node.
- the child-node multicast group map table(s) may have a size corresponding to a maximum number of the multicast group supported by the network.
- the network management system associated with each node is further configured to forward, by the parent node, the multicast group packet to the child node(s) in a broadcasting or multiple unicasting manner.
- the network management system associated with each node is further configured to determine a number of the child nodes to which the multicast group packet is forwarded.
- the network management system associated with each node is further configured to cause the parent node to forward the multicast group packet in a broadcasting manner if the number of the child nodes to which the multicast group packet is forwarded exceeds one.
- the network management system associated with each node is further configured to cause the parent node to forward the multicast group packet in a unicasting manner if the multicast group packet is forwarded to a single child node.
- the network management system associated with each node is further configured to determine whether the target multicast group ID associated with the group packet matches the multicast group ID in the child-node multicast group map table(s); and if so, cause the group packet to be transferred to a higher stack layer within the child node(s).
- Another aspect of the invention relates to a method of updating a firmware file in a network including multiple cells, each supporting communication among multiple transceiver nodes therein and being capable of receiving and transmitting the firmware file, each cell including a parent node and one or more child nodes.
- the method includes (a) dividing the firmware file into multiple chunks, each chunk being able to be included in a single data packet transmitted between two of the transceiver nodes; (b) transmitting each of the chunks from the first one of the transceiver nodes to the second one of the transceiver nodes; (c) transmitting a request message from the first one of the transceiver nodes to the second one of the transceiver nodes, the request message including information associated with the chunks that have been transmitted in step (b); and (d) transmitting a responding message from the second one of the transceiver nodes to the first one of the transceiver nodes, the responding message including information associated with at least one of the chunks that is included in the request message of step (c) but not received by the second one of the transceiver nodes.
- the method may further include assigning a sequence number to each of the chunks based at least in part on an order of the chunk in the divided firmware file.
- each of the chunks in its associated data packet may be preceded by a header including information such as a type of the firmware file, a time stamp indicating a release time of the firmware file, and/or the sequence number associated with the chunk.
- the information associated with the chunks in the request message and responding message includes the sequence numbers associated with the chunks.
- the method may further include, upon the first one of the transceiver nodes receiving the responding message, storing the sequence number associated with the at least one of the chunks in a delivery queue associated with the first one of the transceiver nodes for further transmission.
- the method further includes classifying each of the chunks in the delivery queue into multiple states based at least in part on a status of the chunk in a child node associated with the first one of the transceiver nodes. Further, the method may further include determining a timing for transmitting each of the chunks in the delivery queue based at least in part on its associated state.
- the method further includes, upon the second one of the transceiver nodes receiving the transmitted chunks, determining whether each of the received chunks is associated with a most recently released version of the firmware file.
- the method may further include, upon determining that the chunk is associated with the most recently released version of the firmware file, storing the chunk in a database associated with the second one of the transceiver nodes and causing the second one of the transceiver nodes to transmit the chunk to one or more child nodes associated therewith.
- the chunks in step (b) are transmitted in a broadcasting manner.
- the method further includes, prior to step (d), determining a time interval for the second one of the transceiver nodes to wait before transmitting the responding message to the first one of the transceiver nodes.
- the time interval may be determined based at least in part on a number of the chunks included in the request message of step (c) that are not received by the second one of the transceiver nodes.
- each of the transceiver nodes may store exactly one complete version of the firmware file whose chunks are all received and at most one outstanding version whose chunks are only partially received.
- the invention pertains to a network system for updating a firmware file in a network including multiple cells, each supporting communication among multiple transceiver nodes therein and being capable of receiving and transmitting the firmware file, each cell including a parent node and one or more child nodes.
- the system includes one or more network management systems associated with one or more of the transceiver nodes; the network management system(s) is configured to (a) divide the firmware file into multiple chunks, each chunk being able to be included in a single data packet transmitted between two of the transceiver nodes; (b) transmit each of the chunks from the first one of the transceiver nodes to the second one of the transceiver nodes; (c) transmit a request message from the first one of the transceiver nodes to the second one of the transceiver nodes, the request message including information associated with the chunks that have been transmitted in step (b); and (d) transmit a responding message from the second one of the transceiver nodes to the first one of the transceiver nodes, the responding message including information associated with one or more chunks that is included in the request message of step (c) but not received by the second one of the transceiver nodes.
- the network management system(s) may be further configured to assign a sequence number to each of the chunks based at least in part on an order of the chunk in the divided firmware file.
- each of the chunks in its associated data packet may be preceded by a header including information such as a type of the firmware file, a time stamp indicating a release time of the firmware file, and/or the sequence number associated with the chunk.
- the information associated with the chunks in the request message and responding message may include the sequence numbers associated with the chunks.
- the network system further includes memory for storing a delivery queue associated with the first one of the transceiver nodes; the network management system(s) is further configured to, upon the first one of the transceiver nodes receiving the responding message, store the sequence number associated with the chunk(s) in the delivery queue for further transmission.
- the network management system(s) may be further configured to classify each of the chunks in the delivery queue into multiple states based at least in part on a status of the chunk in a child node associated with the first one of the transceiver nodes.
- the network management system(s) is further configured to determine a timing for transmitting each of the chunks in the delivery queue based at least in part on its associated state.
- the network management system(s) may be further configured to, upon the second one of the transceiver nodes receiving the transmitted chunks, determine whether each of the received chunks is associated with a most recently released version of the firmware file.
- the network system may further include memory for storing the received chunks in a database associated with the second one of the transceiver nodes; the network management system(s) is then further configured to, upon determining that the received chunks are associated with the most recently released version of the firmware file, cause the second one of the transceiver nodes to transmit the chunks to one or more child nodes associated therewith.
- the chunks in step (b) are transmitted in a broadcasting manner.
- the network management system(s) may be further configured to, prior to step (d), determine a time interval for the second one of the transceiver nodes to wait before transmitting the responding message to the first one of the transceiver nodes.
- the time interval is determined based at least in part on a number of the chunks included in the request message of step (c) that are not received by the second one of the transceiver nodes.
- each of the transceiver nodes may store exactly one complete version of the firmware file whose chunks are all received and at most one outstanding version whose chunks are only partially received.
- Still another aspect of the invention relates to a method of efficient beacon communication in a wireless network including multiple nodes, each supporting
- the method includes, for each node, (a) transmitting conventional beacons over the operational channel, the conventional beacons reaching one-hop neighboring nodes having operational channels matching the operational channel of the node; and (b) transmitting, by the node, visitor beacons to all other neighboring nodes over one or more channels, different from the operational channel of the node, the visitor beacons specifying the operational channel of the node, whereby each of the other neighboring nodes receives conventional beacons from the node over a secondary channel matching the operational channel of the node, the secondary channel being different from the one or more channels utilized to transmit the visitor beacons.
- a conventional beacon transmitted by a node includes data specifying capabilities of the node and neighboring nodes.
- the conventional beacon may also include data specifying an internal representation of the network or portion thereof.
- the visitor beacon may also include data specifying capabilities of the node and neighboring nodes.
- the operational channel of the node is inactive in step (b).
- each node is also configured to operate in a hold-and-sniff mode whereby the node signals its associated parent node in the wireless network to cease, for a defined interval, transmission over the operational channel of the node; the node receives the beacons from one or more one-hop neighboring nodes in the wireless network over one or more tertiary channels thereof during the defined interval, the one or more tertiary channels being different from the operational channels of the node.
- the operational channel of the node may be inactive when the node is receiving the beacons over the one or more tertiary channels.
- the invention in another aspect, relates to a node for communicating over a wireless network; the node includes at least one radio transceiver for supporting
- the node is configured for (a) transmitting conventional beacons over the operational channel, the conventional beacons reaching one-hop neighboring nodes having operational channels matching the operational channel of the node, and (b) transmitting visitor beacons to all other neighboring nodes over one or more channels, different from the operational channel of the node, the visitor beacons specifying the operational channel of the node, whereby each of the other neighboring nodes receives conventional beacons from the node over a secondary channel matching the operational channel of the node, the secondary channel being different from the one or more channels utilized to transmit the visitor beacons.
- a conventional beacon transmitted by the node includes data specifying capabilities of the node and neighboring nodes.
- the conventional beacon may also include data specifying an internal representation of the network or portion thereof.
- the visitor beacon may also include data specifying capabilities of the node and neighboring nodes.
- the node is configured such that the operational channel of the node is inactive in step (b).
- the node is also configured to operate in a hold-and-sniff mode whereby the node signals its associated parent node in the wireless network to cease, for a defined interval, transmission over the operational channel of the node; the node receives the beacons from one or more one-hop neighboring nodes in the wireless network over one or more tertiary channels thereof during the defined interval, the one or more tertiary channels being different from the operational channels of the node.
- the node may be configured such that the operational channel of the node is inactive when the node is receiving the beacons over the one or more tertiary channels.
- the term“chunk” refers to a logical partition of data that is smaller than the firmware file and can be included in a single data packet.
- the terms “approximately,”“roughly,” and“substantially” mean ⁇ 10%, and in some embodiments,
- FIGS. 1A-1C depict various conventional approaches for multicast delivery of a packet from a root node to a target group of nodes in a tree-based wireless network
- FIGS. 1D and 1E depict various conventional approaches for updating a firmware file in a tree-based wireless network
- FIG. 2 conceptually illustrates an exemplary tree-based wireless network having multiple network nodes for multicast routing messages in accordance with various embodiments
- FIG. 3 is a flow chart illustrating an exemplary approach for multicast routing a group packet in a tree-based wireless network in accordance with various embodiments
- FIG. 4 illustrates a tree-based wireless network having multiple network nodes, each including a parent-node MGM table and one or more child-node MGM tables in accordance with various embodiments;
- FIG. 5 illustrates an exemplary approach for processing a received group packet in a network node in accordance with various embodiments;
- FIG. 6A is a flow chart illustrating an exemplary approach for adding a new multicast group ID to a target network node in accordance with various embodiments
- FIG. 6B is a flow chart illustrating an exemplary approach for adding a new multicast group ID to all nodes controlled by a target gateway in accordance with various embodiments
- FIG. 7A is a flow chart illustrating an exemplary approach for removing a multicast group ID from a target network node in accordance with various embodiments
- FIG. 7B is a flow chart illustrating an exemplary approach for removing a multicast group ID from all nodes controlled by a target gateway in accordance with various embodiments
- FIG. 8 is a flow chart illustrating an exemplary approach for associating a node with a new parent node in accordance with various embodiments
- FIG. 9 is a flow chart illustrating an exemplary approach for de-associating a child node from a parent node in accordance with various embodiments
- FIG. 10 conceptually illustrates an exemplary tree-based wireless network having multiple network nodes in accordance with various embodiments
- FIG. 11 conceptually depicts an exemplary tree-based wireless network having a parent node and child nodes in a transceiver cell and another nodes outside the transceiver cell in accordance with various embodiments;
- FIG. 12 illustrates three states associated with each chunk of a firmware file in accordance with various embodiments
- FIG. 13 is a flow chart illustrating an exemplary approach for updating a firmware file in the network nodes in accordance with various embodiments.
- FIG. 14 is a flow chart illustrating an exemplary approach for minimize the number of message transmissions from the child nodes to the parent nodes in accordance with various embodiments.
- FIG. 15 conceptually illustrates an exemplary tree-based wireless network having multiple network nodes for routing messages in accordance with various embodiments; and [0062] FIG. 16 illustrates a plurality of network nodes configured for operation in accordance with embodiments of the invention.
- FIG. 2 conceptually illustrates an exemplary tree-based wireless network 200 comprising multiple network nodes 202, each including one parent node and one child node, for multicast routing of messages such as group packets across the network 200 in accordance herewith; each group packet may include a payload (e.g., a data packet) and routing information (such as target bit identifier vectors, target multicast group IDs, etc.) as further described below.
- a payload e.g., a data packet
- routing information such as target bit identifier vectors, target multicast group IDs, etc.
- Each network node 202 is a member of a transceiver“cell,” i.e., a discrete geographic region having fixed-location transceivers on, for example, lighting poles.
- a transceiver cell typically includes a“parent” node (e.g., node 204) and one or more child nodes (e.g., nodes 206-210).
- each of the parent and child nodes may include one transceiver.
- the parent node is the“owner” of the cell node(s); a child node may be associated with only one parent node at a time.
- the child nodes connect to their parent nodes via a“wireless tree branch.”
- the child node(s) in a cell are within the radio transmission range of the parent node and vice versa.
- the parent node and its child nodes are within a one-hop distance from each other.
- a data packet can be delivered in a“downlinked” manner— i.e., from the parent node to its child node(s) (e.g., using broadcasting to all child nodes or unicasting to a specific child node) and/or in an “uplinked” manner— i.e., from a child node to its associated parent node using, for example, unicasting.
- the child node may discard the data packet. Similarly, if the data packet received by the parent node does not originate from one of its associated child nodes, the parent node may discard the data packet.
- each node acts as both a parent node (defined herein as “DL”) and a child node (defined herein as“UL”).
- the DL node is an entity contained in a node that acts as a cell parent; and the other cell members are child nodes of the parent node located one hop away from the DL node.
- the UL node is an entity contained in a node and is a cell member“owned” by a DL parent in another node (e.g., one-hop distance away that acts as the parent).
- the tree-based wireless network 200 may be constructed dynamically using one or more conventional protocols and algorithms.
- the network 200 is constructed as a spanning tree that interconnects each network node via a unique path to the tree root node. The same path may connect the tree root node to a network node.
- the network 200 is constructed as multiple spanning trees with appropriate identifiers per tree; each tree (and thereby its associated identifier) supports a unique path between the tree root node and a network node on that tree.
- a downlink data packet that“originates” from the tree root node may traverse a path across the tree that includes a collection of the network nodes wirelessly interconnected from the parent node of one network node to a child node within the parent’s cell (i.e., one hop away).
- the destination network node can be reached via multiple hops.
- the path from the root node to the target node is always the same; in other words, the path acts as a“virtual circuit” for a data packet to be delivered from the root node to a target node.
- the virtual circuit may maintain the in-order delivery of packets, but does not guarantee that all delivered packets will reach the destination.
- the path may change while payload packets are in transit. As a result, the packets may arrive out of sequence.
- a transport protocol e.g. TCP/IP
- TCP/IP transport protocol/IP
- an uplink message may be delivered from a node to the root node via traversing a path therebetween.
- the message may propagate in the uplink manner along the wireless branches— i.e., from the originating node UL (e.g., a child contained within node X) to its associated DL (e.g., the parent contained within node Y), then internally propagate from the receiving DL to the UL contained within the same node (e.g., node Y), then propagate further up to the DL (e.g., contained within node Z) associated with the UL within node Y, and so on.
- the DL e.g., contained within node Z
- each node contains two radio transceivers: one used by the parent within the node to send and/or receive data packets from the associated child node(s) and the other used by a child node within the node to send and/or receive data packets from the associated parent in another node.
- the tree structure may enable (i) each network node to deliver an uplink message directed to the tree root node (using e.g., MP2P) via a path determined by the tree structure, and (ii) the root node to deliver a downlink unicast message to a selected node (using e.g., P2MP) via a path determined by the tree structure.
- a collection of network nodes that have the same capability may form a group.
- Each network node may be a member of (and thereby support) one or more groups.
- a node may be a member of a city wide sensor group and a member of a group corresponding to a specific type of street lighting controller.
- the group members may be distributed across the tree structure in any fashion.
- the group members may be concentrated in a geographical area (e.g., light controllers distributed in a specific neighborhood) or may be distributed citywide (e.g., air-quality sensors distributed across a city).
- the geographical location of one group may or may not overlap with that of another group.
- the tree-based network 200 can (but need not necessarily) be optimized for a certain group delivery. In one embodiment, the tree-based network 200 is constructed with various optimization rules without considering the possible group distributions.
- the delivered message is a“short” message that can be contained in one packet, and each packet is delivered and processed as soon as the packet is received by a node.
- each node may include a database storing one or more group identifiers (IDs) associated with the group(s) it is a member of.
- IDs group identifiers
- a multicast message may be propagated“down” the tree to a single target group ID.
- the child node may accept only messages transmitted from its associated parent.
- the root node broadcasts a message
- the message received by the receiving node(s) may be re-broadcast without acknowledgement.
- each receiving node on the propagation path may acknowledge the unicasting.
- a network management system (NMS) 212 is employed in the wireless tree network 200.
- the NMS 212 may control one or more gateways that act as tree root nodes to the tree-based network.
- the NMS 212 may generate a message (e.g., a group packet) to the tree root(s) which then transmits the message to a specific network node or to a group of network nodes.
- the NMS 212 may be equipped with memory having a database to store information associated with the tree root nodes, network nodes and groups reachable via the corresponding tree roots.
- each node in the network 200 includes an individual network management system 214 for performing various functions, such as multicast routing a group packet in the network, adding a multicast group ID to the network, removing a multicast group ID from the network, associating a node with a new parent node, de-associating a node from its parent node, etc. as further described below.
- the NMS 212/214 may include or consist essentially of a computing device, e.g., a server, which executes various program modules to perform methods in accordance with embodiments of the present invention.
- the memory may include or consist essentially of one or more volatile or non-volatile storage devices, e.g., random-access memory (RAM) devices such as DRAM, SRAM, etc., read-only memory (ROM) devices, magnetic disks, optical disks, flash memory devices, and/or other solid-state memory devices to store, for example, information associated with the tree root nodes and network nodes.
- RAM random-access memory
- ROM read-only memory
- magnetic disks magnetic disks
- optical disks optical disks
- flash memory devices and/or other solid-state memory devices to store, for example, information associated with the tree root nodes and network nodes.
- FIG. 3 illustrates an exemplary approach 300 for multicast routing a group packet in a tree-based wireless network including multiple network nodes.
- FIG. 4 illustrates a tree- based wireless network 400 including network nodes 402-414, each of which itself includes a parent node and one or more child nodes.
- each parent node either broadcasts or unicasts the multicast group packet to its associated child node(s) in another network node(s).
- the parent node 422 in the network node 402 may broadcast or unicast the multicast group packet to its associated child nodes 424, 426, 428 in the network node 404, 406, 408, respectively;
- the parent node 430 in the network node 404 may broadcast or unicast the multicast group packet to its associated child node 432 in the network node 410;
- the parent node 440 in the network node 406 may broadcast or unicast the multicast group packet to its associated child nodes 442, 444 in the network nodes 412, 414, respectively.
- a multicast group map (MGM) table associated with each of the parent and child nodes is established and stored in memory that can be accessed by the NMS 212/214 (step 302).
- the size of each MGM table equals the maximum number of multicast groups that can be supported by the network.
- the network node 402 may include a parent-node MGM table 452 corresponding to the parent node 422 and child-node MGM tables 454, 456, 458 corresponding to its associated child nodes 404, 406, 408, respectively.
- each child-node MGM table includes one or more IDs associated with the network group(s) of which the network node is a member and one or more bit identifier vectors.
- the group ID(s) are represented using a bit map having one or more bits assigned by the NMS 212/214; and the bit identifier vector(s) point to the bit(s) in the child-node MGM table representing the supported multicast group ID(s).
- each parent-node MGM table may include a bit map having one or more bits corresponding to one or more IDs associated with the multicast group(s) supported by all of the associated child nodes and the subtrees associated therewith.
- the parent-node MGM table may include one or more bit identifier vectors merging the bit identifier vectors associated with all of its associated child nodes.
- the bit identifier vector(s) in the parent-node MGM table is obtained by applying a bitwise OR operation on the contents of the child-node MGM tables associated with all the child nodes associated therewith.
- the path to the target multicast group ID includes one of this node’s child nodes.
- a value in a bit position of a child- node MGM table is SET (i.e., has a non-zero value)
- the path to the target multicast group ID includes the child node. Because several child nodes may be on the paths to the target multicast group ID, the corresponding bit positions in the child-node MGM tables can all be SET.
- a“leaf’ node i.e., a node having no child nodes
- the content of all bits in the parent-node MGM table and the child-node MGM tables (if exist) is set with the zero value (or“CLEAR,” for ease of reference herein).
- this does not necessarily mean that the leaf node supports any multicast group ID.
- a list of the multicast group IDs supported by the node may be stored in a database associated therewith.
- the NMS 212/214 may create the child-node MGM tables during node initialization or dynamically when the child node is associated with its parent node. Further, the child node may change its associated parent node. When this occurs, the NMS 212/214 may change the child-node MGM table, the prior parent’s parent- node MGM table, the new parent’s parent-node MGM table and/or the gateway(s) involving the child node. In addition, the NMS 212/214 may add or delete multicast group processes as further described below for updating the multicast group IDs associated with the child node, prior parent node and/or new parent node.
- each of the parent-node MGM table and child-node MGM tables stored in the database associated with the node 402 is represented by two bytes (e.g., byte 1 followed by byte 2 as depicted); each byte has eight bits, 1-8.
- the bit identifier vector is represented by ⁇ “row number,”“column number” ⁇ in the table. In this example, the row number and column number are represented in the decimal values. Note that for the binary representation, four bits may be necessary for presentation of the bit identifier.
- the NMS 212 may cause a multicast group packet having routing information (such as a target bit identifier vector and/or a target multicast group ID) to be delivered from the NMS 212 or a transmitting node (e.g., root node) to a receiving node in the wireless network.
- routing information such as a target bit identifier vector and/or a target multicast group ID
- the NMS 212 may transmit a group packet to the node 402.
- the receiving node Upon receiving the group packet, the receiving node (e.g., node 402) may check the content of the parent-node MGM table and/or the child-node MGM table(s) stored in the database associated therewith to determine whether the bit in the parent-node MGM table and/or child-node MGM tables pointed to by the target bit identifier vector contained in the received group packet is SET (i.e., has a non-zero value) (in a third step 306).
- SET i.e., has a non-zero value
- At least one of the child nodes (e.g., nodes 404-408) associated with this parent node (e.g., node 402) is on the path to the target multicast group having the ID identified in the routing information of the received group packet, and the parent node (e.g., node 402) may contain at least one subtree that has a node belonging to the target multicast group ID.
- the receiving node e.g., node 402 may forward the received group packet to the child node that is on the path to, or has a node belonging to, the target multicast group ID as further described below (step 308).
- the group packet has reached the target group ID.
- this receiving node e.g., node 402 is a “multicast group leaf node” for the target multicast group ID, and no child nodes associated with the receiving node have subtrees that support the target multicast group ID.
- the receiving node may not forward the received group packet to any of its associated cell child nodes (step 310).
- the receiving parent node may determine the approach to forwarding the multicast group packet; this may be based on, for example, the number of child nodes to which the multicast group packet is forwarded (step 312). In some embodiments, when the number of the child nodes to which the multicast group packet is forwarded exceeds one, the parent node may forward the multicast group packet in a broadcasting manner (step 314).
- the parent node may forward the multicast group packet in a unicasting manner (step 316).
- the receiving parent node transmits the multicast group packet to the child node(s) using broadcasting or multiple unicasting. Whether broadcasting or multiple unicasting is used may depend on the distributed fashion of the nodes traversed by the multicast group packet.
- the receiving parent node e.g., node 402 may forward the multicast group packet to the child node(s) in a broadcasting or multiple unicasting manner without determining the number of child nodes to which the multicast group packet is forwarded (step 318).
- FIG. 5 illustrates an exemplary approach 500 for processing a received group packet in a network node in accordance herewith.
- the leaf node and/or the child node(s) may compare the target multicast group ID included in the received group packet with the list of multicast group IDs supported by the node (step 502). If the target multicast group ID indicated by the group packet matches one of the group IDs supported by the node, the node may transfer the received group packet to a higher protocol stack layer within the node for further processing (step 504).
- the group packet is not passed up the protocol stack layer for further processing (step 506).
- the leaf node should support the indicated multicast group ID; otherwise a multicast routing error has occurred.
- the error may result from an error in the MGM tables in one or more of the preceding network nodes on the path to the receiving node. If such a routing error occurs, the leaf node may be configured to issue an alert to the NMS 212 (step 508).
- various embodiments of the present invention reliably and efficiently route a multicast group packet in a tree-based wireless network by establishing and storing parent-node and/or child-node MGM tables in each node and including the routing information (such as a target bit identifier vector and a target multicast group ID) in the delivered group packet.
- the parent-node and/or child-node MGM tables include information such as the ID(s) associated with the multicast group(s) in which the parent/child node(s) is a member and the bit identifier vector(s) for pointing to the bit(s) in the child-node MGM table(s) representing the supporting group ID(s).
- the duration and the number of packet transmissions from the parent nodes to their associated child nodes across the wireless network may be minimized (or at least reduced relative to conventional approaches). This may
- the NMS 212 generally maintains a database storing information, such as the gateway that is the root for a selected network node, the multicast group ID(s) supported by the selected network node, the bit identifier vector(s) corresponding to the supporting multicast group ID(s), etc.
- the NMS 212 may search and modify information in the database when necessary.
- the NMS 212 can add a new multicast group ID to the wireless network it controls.
- the NMS 212 may first identify a gateway that supports the new multicast group ID to be added and then perform the following procedures to add the new multicast group ID to (i) a node, (ii) all nodes rooted to the identified gateway, and (iii) all network nodes in all gateways of the wireless network.
- FIG. 6A illustrates an exemplary approach 600 for adding a new multicast group ID to a target network node for supporting the new multicast group ID in accordance herewith.
- the command is initiated by the NMS 212 and directed to the target node.
- the NMS 212 identifies a gateway that is the root for the target node.
- the NMS 212 delivers an“adding multicast group ID” command to the identified gateway.
- the command may include the pair information ⁇ bit identifier vector, multicast group ID ⁇ as well as the route to the target node.
- the gateway identifies the child node(s) of the gateway to which the command is to be delivered based on, for example, the conventional“source routing” information.
- the gateway transmits the command to the child node(s) identified in step 606.
- the child node determines whether it is itself the target node identified in the command. If so, the child node may add the indicated multicast group ID to the list of the multicast group IDs supported thereby (step 612).
- the child node may identify the next child node(s) on the route to the target node (using, for example, source routing information contained in the received command), identify the child-node MGM table(s) corresponding to the next child node(s), check the value(s) of the bit(s) pointed to by the bit identifier vector(s) in the child-node MGM table(s) (step 614). If the bit is SET, the child node(s) identified in step 606 propagates the command packet to the next child node(s) identified in step 614 using, for example, source routing procedures (step 616).
- the child node(s) identified in step 606 may (i) set the pointed-to bit in the identified child-node MGM table to be a non-zero value (i.e.,“SET”) and propagate the packet to the next node on the path to the target node using conventional source routing procedures and (ii) set the pointed-to bit in the parent-node MGM table to a non-zero value (step 618).
- Steps 614-618 may be iteratively performed until the command packet reaches the target node (identified according to source routing procedures). In one embodiment, after the target node is reached, step 612 may be performed.
- the NMS 212 may add the new multicast group ID to one or more nodes selected based on criteria such as geographical locations.
- FIG. 6B illustrates an exemplary approach 630 for adding a new multicast group ID to all the nodes controlled by a target gateway so that the nodes become members of the new multicast group.
- the NMS 212 delivers an“adding multicast group ID” command to the target gateway.
- the command may include the pair information ⁇ bit identifier vector, multicast group ID ⁇ .
- the gateway forwards the command to all of its cell child nodes (receiving nodes).
- Such forwarding may be performed in (i) a cell-broadcasting manner or (ii) an individual unicasting manner
- the receiving nodes may add the new group ID to the list of the multicast group IDs supported thereby.
- the receiving nodes may set the bits pointed to by the bit identifier vectors in the parent-node MGM tables and the child-node MGM tables of the child nodes associated with the receiving nodes, and forward the command to each of the child nodes.
- the forwarding may be performed in (i) a cell broadcasting manner or (ii) an individual unicasting manner.
- Steps 634 and 636 may continue until the command is received by a leaf node (i.e., a node having no child nodes).
- the NMS 212/214 updates the list of multicast group IDs supported by the leaf node (step 638) and sets the bit pointed to by the bit identifier vector in all the child-node MGM tables of the leaf node to be zero (“CLEAR”) (step 640).
- CLEAR bit pointed to by the bit identifier vector in all the child-node MGM tables of the leaf node to be zero
- a leaf node has no child-node MGM tables; thus, if a child-node MGM table exists for a leaf node, all the bits of the child-node MGM tables associated therewith are cleared (since the leaf node is not on the path to any multicast groups).
- steps 632-640 in the approach 630 are sequentially or substantially simultaneously performed for all gateways in the network so as to add a new multicast group ID to all nodes in all gateways of the network.
- the NMS 212 may maintain a database storing information, such as the gateway that is the root for a selected network node, the multicast group ID(s) supported by the selected network node, the bit identifier vector(s) corresponding to the supporting multicast group ID(s), etc.
- the NMS 212 may search and modify information in the database when necessary.
- the NMS 212 can remove a multicast group ID from the wireless network it controls.
- the NMS 212 may first identify one or more gateways that support the to-be-removed multicast group ID and then perform the following procedures to remove the multicast group ID from (i) a node, (ii) all nodes rooted to the target gateway, and (iii) all network nodes in all gateways of the wireless network.
- FIG. 7A illustrates an exemplary approach 700 for removing a multicast group ID from a target network node in accordance herewith.
- the NMS 212 transmits a“removing multicast group ID” command to a gateway(or, in some embodiments, multiple gateways due to a node transition from one gateway to another) that supports the target node.
- the command may include the target node ID and the pair information ⁇ multicast group ID, corresponding bit identifier vector ⁇ .
- the gateway(s) delivers the command to the target node in a unicasting manner.
- the gateway(s) utilizes the conventional source routing procedures for the unicasting delivery.
- the removing command may propagate transparently via the path to the target node, and no processing may be performed to the command until it reaches the target node.
- the target node may first check the content of the bit in the node MGM table pointed to by the bit identifier vector in the received command (step 706). If the bit is set with a non-zero value (“SET”), one or more of the subtrees associated with the node is on the path to the indicated multicast group ID. Thus, the node may remove the indicated multicast group ID from the list of the multicast groups IDs it supports (step 708) and deliver a packet to the gateway indicating that the removal procedure is complete (step 710).
- SET non-zero value
- the node removes the indicated multicast group ID from the list of the multicast groups IDs it supports (step 712) and delivers an“uplink deleting multicast group” command to its parent uplink (step 714).
- the command includes information such as the multicast group ID, the corresponding bit identifier vector, the address associated with the target node, etc.
- the receiving uplink parent node may CLEAR (i.e., set to zero) the bit in the child-node MGM table associated with the reporting child node pointed to by the bit identifier vector (step 716).
- the parent may perform a logical OR operation on the bit pointed to by the bit identifier vector on all the child-node MGM tables associated therewith; the resulting value is then stored in its parent- node MGM table (step 718).
- the parent node verifies the value of the bit in the parent-node MGM table pointed to by the bit identifier vector corresponding to the indicated to-be-removed multicast group ID (step 720). If the bit is SET, the parent node delivers a packet to the gateway indicating that the removal process is complete (step 722). If the bit is CLEAR (which means that the node is not on the path to the indicated to-be- removed multicast group ID), the parent node delivers an“uplink deleting multicast group” command to its“up-the-tree” parent (step 724), which then performs steps 716-724 described above. 2) Removing a Multicast Group ID from All Nodes Rooted to an Identified Gateway
- the approach 700 described above may be performed on all nodes rooted to a target gateway in order to remove the multicast group ID therefrom. This approach, however, may require longer process times and wastes network resources.
- the target gateway may broadcast the“removing multicast group ID” command, directing each node that receives this broadcast (and supports the to-be-removed multicast group ID) to remove the indicated multicast group ID from its list of the supporting multicast groups.
- This approach is also inefficient since the broadcast command propagates down the tree structure regardless of whether the traversed nodes are on the path to the indicated to-be-removed multicast group ID.
- FIG. 7B illustrates an exemplary approach 730 for efficiently removing a multicast group ID from all the nodes controlled by a target gateway (or root node) by propagating the removing command only via nodes that are on the path to the indicated to-be- removed multicast group ID.
- a single command is sufficient to remove the to-be- removed multicast group ID from the gateway as well as all nodes supported by the gateway.
- the removing command may include the multicast group ID that is to be removed and the corresponding bit identifier vector.
- a“multicast group leaf node” meets the following conditions: (i) the value of the bit that corresponds to the indicated to-be-removed multicast group ID in the parent-node MGM table is CLEAR (i.e., this node is not on the path to other nodes supporting the multicast group ID) and (ii) the node supports the to-be- removed multicast group ID. For a given multicast group ID, there may be one or more multicast group leaf nodes.
- the NMS 212 delivers a“removing multicast group ID” command to the target gateway (or root node).
- the gateway delivers the command to its child nodes that are on the path to the to-be-removed multicast group (as identified by the child-node MGM tables of the gateway).
- the child nodes propagate the command“down the tree” via all nodes that are on the path to the to-be- removed multicast group until a node that contains a multicast group leaf node is reached.
- a fourth step 738 after the command reaches the multicast group leaf node, the multicast group leaf node removes the to-be-removed multicast group ID from the list of the multicast group IDs it supports. In addition, the multicast group leaf node delivers a“deleting multicast group ID” command“up-the-tree” to its parent node (step 740). In one
- the command includes the pair information ⁇ multicast group ID, bit identifier vector ⁇ .
- the receiving parent node may then CLEAR the value of the bit pointed to by the bit identifier vector in the child-node MGM table(s) associated with the reporting child (step 742).
- the parent node may remove the indicated to-be-removed multicast group ID from its list of the supporting multicast groups (step 744).
- the parent node performs a logical OR operation on the bit pointed to by the bit identifier vector of the command on all its child-node MGM tables (including that of the reporting child node); the resulting value is then stored in the parent-node MGM table (step 746).
- the parent node checks, in the parent-node MGM table, the value of the bit pointed to by the bit identifier vector that corresponds to the indicated to- be-removed multicast group ID (step 748). If the bit is SET and the node is not the root node, the node is on the path to other members of the to-be-removed group ID that can be identified and processed when their multicast group leaf nodes are reached; thus, the process may be terminated (step 750).
- the root node is on the path to other members of the indicated group ID that can be identified and processed when their multicast group leaf nodes are reached; thus, the process may be terminated here as well (step 750). If, however, the bit is CLEAR and the node is not the root node, the node delivers an“uplink deleting multicast group” command” to its“up-the-tree” parent node (containing the same“uplink deleting multicast group” command received by the parent node from its reporting child) (step 752). In addition, steps 742-752 may be repeated. If the bit is CLEAR and the node is the root node, the removal process is completed and no further processing is necessary (step 750).
- the NMS delivers the“removing” command as described above to all the gateways that may support the to-be-removed multicast group ID and then performs the approach 730 described above so as to remove the multicast group ID from all nodes in all gateways of the network.
- FIG. 8 illustrates an exemplary approach 800 for allowing a node, A, that is successfully registered with the NMS 212 to be associated with a new parent node, Pl, in accordance with various embodiments.
- the node A transfers its parent- node MGM table to the parent node Pl.
- the parent node Pl stores the received child-node MGM table, and generates an updated parent-node MGM table (e.g., by merging all of its child-node MGM tables).
- the process is stopped (step 806); otherwise, the parent node Pl may deliver the resulting table to its parent node, P2 (step 808).
- P2 receives from its child node (the node that contains Pl) an“updated” child-node MGM table (which already reflects the node A being associated with Pl)
- P2 merges its child-node MGM tables and update its parent-node MGM table (step 810).
- Step 806 the parent node P2 delivers its newly generated parent-node MGM table to the next node“up the tree” (step 812).
- Steps 804-812 may be iteratively performed such that the parent-node MGM table can be continuously updated“up the tree” by each receiving parent node (Pi).
- the root node When the root node eventually receives an updated child-node MGM table from one of its associated child nodes, the root node generates and updates the root MGM table (by, e.g., merging its child-node MGM tables including the newly received child-node MGM table) (step 814). If the newly generated root MGM table is different from that created before the update, the root node delivers the updated root table to the NMS 212 for storage therein (step 816). If, however, the newly generated root MGM table is the same as that created before the update, there is no need for the root node to deliver the updated root table to the NMS (step 818).
- the NMS 212 in the approach 800 need not know the specific path to the multicast group supported by each root node.
- the NMS 212 may have to use only the bit identifier vector corresponding to the target multicast group ID and identify the root MGM table in which this bit is SET.
- the message can then be delivered by the NMS 212 to those gateways in which the bit is SET. Subsequently, each gateway that receives the message may follow the procedure for multicast group delivery as described above.
- a non-loss compression approach is implemented to save the uplink bandwidth when the MGM table is propagated up the tree to the root node.
- An exemplary compression scheme takes advantage of the fact that parent-node MGM tables become sparse when going down the tree network.
- an MGM table can be delivered by rows (i.e., from row 1, row 2, ... , to the last row); each row contains a bit string from the MGM table. Delivery of the bit string in each row may be preceded by a one-bit “compression indicator.” If the compression indicator is set to zero, all the row bits of this row are CLEAR and are not transmitted.
- the node that delivers the MGM table may determine whether to deliver the table in a compressed or uncompressed format and then inform the target node (up the tree) of the format selection.
- FIG. 9 illustrates an exemplary approach 900 performed by the old parent after it determines that the child node has left.
- a first step 902 the old parent node populates the child-node MGM table associated with the child that left with“zero” entries and name this table a“removed child- node MGM table.”
- the old parent node merges the“old” parent-node MGM table (i.e., created before the child left) and the“removed child-node MGM table.” If the resulting parent-node MGM table is different from the existing parent-node MGM table, the old parent node propagates the merged table uplink to its parent node (step 906).
- the multicast group packet may still be delivered to or via the child node that no longer belongs to the correct multicast path.
- Two events may then occur: First, the multicast packet may be erroneously delivered to a node that does not support the target multicast group ID; this does not result in any harm as the decision whether to process the multicast packet is made by the application in the receiving node based on the explicit multicast group ID contained in the received packet. Second, the multicast group packet may not reach the target node due to removal of the node (and thereby the multicast path); as a result, the multicast packet may be lost.
- the child-node MGM tables associated therewith are ignored, and the received packet is simply forwarded to all child nodes associated therewith using, for example, the approach described in connection with FIG. 6B (adding a new multicast group ID to a gateway), where all the child nodes are considered to include the path to the target multicast group ID.
- This approach may effectively minimize (or at least reduce) the number of lost multicast packets during node transitions.
- the efficiency and reliability gain using this approach can be significantly larger than the efficiency loss occurring during the actual transition (e.g., due to the unnecessary forwarding of the packet to a child that may not be on the path).
- the approaches described above for efficiently delivering a multicast group packet may be implemented to efficiently deliver a unicast packet after a route is established between a network node and the root node (using, e.g., the conventional source routing information for packet delivery).
- a unicast routing table associated with each node is created to replace the conventional source routing information; each bit in the unicast routing table may correspond to one child node on the tree.
- each bit in the unicast routing table corresponds to a unicast child table entry; the content of the pointed-to entry in the unicast child table indicates the number of the child node to which the packet is to be forwarded.
- the number of each child node may correspond to the MAC address thereof.
- a unicast packet may include a bit identifier vector that points to a bit in the unicast routing table.
- the receiving node may determine whether the bit pointed to in the unicast routing table is SET. If so, the receiving node may access the unicast child table, retrieve the child number associated with the entry pointed to by the bit identifier vector, and, based thereon, unicast a MAC frame to the child node. If, however, the bit pointed to in the unicast routing table is CLEAR, the packet has reached the target node. The receiving node may then check the content of the received unicast packet to determine if the indicated target destination address matches the node address. If so, the packet can be processed by the node; otherwise, a routing error is issued.
- the approaches for creating the unicast routing tables are similar to those described above for creating the MGM tables. Again, the unicast routing tables may be populated during node association and registration processes. Advantages of using the unicast routing table and unicast child tables include that a packet only has to include the bit identifier vector as the route without having a complete, explicit route required in
- the approaches described herein may advantageously save the bandwidth and allow for a larger payload in each delivery.
- the network is assumed to support 1024 multicast groups; the gateway is assumed to support 4,000 nodes; and each parent node can support up to 16 child nodes (a nibble (four bits) is required in order to represent one of the 16 child nodes).
- the string that indicates the route to a unicast target contains 12 bits for the MGM bit position (e.g., 9 bits for the row number and 3 bits for the column number).
- 2 9 512 bytes are required to store a unicast MGM bit map.
- the total storage required for the unicast routing approach is approximately 2,500 bytes only.
- the string that indicates the route for a multicast target contains 10 bits for the MGM bit position (e.g., 7 bits for the row number and 3 bits for the column number). Because each node maintains up to 16 child-node MGM tables, 2 7 *
- 16 2048 bytes are required for storage of the MGM tables.
- the node maintains 2 7 bytes for the parent-node MGM table.
- the total storage required for the multicast group routing approach is 2176 bytes.
- the routing approaches described herein utilize existing tree-based wireless networks without requiring any tree construction or re-construction.
- the tree structure need not be optimized for a specific multicast group and the same tree structure may be used for all multicast group message deliveries.
- the approaches described herein generally assume that the tree-based wireless network is stable, they can accommodate changes in the tree structure (e.g., caused by self-improving or self-healing procedures) by providing fast changes in the multicast group routing approaches as described above.
- the terms“gateway” and“root node” are used interchangeably herein.
- a firmware file can be periodically updated in a tree-based wireless network 200 as depicted in FIG. 2.
- FIG. 10 depicts a tree-based wireless network 1000 that has the same structure as the network 200 depicted in FIG. 2; FIG. 10 differs from FIG. 2 in that an updated firmware is transmitted in the network 1000.
- the NMS 1014 associated with each network node 1002 in the network 1000 may perform various functions (such as broadcasting a received chunk of a firmware file 1015 to its associated child nodes, transmitting a NACK-request message to its child nodes, transmitting aNACK message to its parent node, etc.) as further described below.
- an updated firmware file 1015 is provided to the root node (e.g., node 1004) in the tree-based network 1000.
- the NMS associated with the root node may then divide the firmware file 1015 into multiple chunks (or“blocks”) such that the root node can transmit each of the chunks in a single data packet to its associated child nodes.
- the NMS associated with each child node Upon receiving the chunks, the NMS associated with each child node is responsible for delivering each of the chunks to its associated child nodes; this process can then propagate throughout the entire tree network.
- the firmware file 1015 is divided (e.g., by the NMS associated with the root node) into multiple chunks 1016; each chunk is assigned a sequence number based on its order in the divided firmware file 1015 and can be included in a single data packet 1018 for transmission in the wireless network 1000.
- each chunk 1016 may be preceded by a header 1020 in the data packet 1018; the header 1020 may include information, such as a type of the broadcast firmware file, a time stamp (e.g., a GMT date and time, such as Nov. 6, 2015, 08:00 GMT) indicating the release time of the firmware file 1015, and/or a sequence number of the associated chunk in the firmware file 1015.
- each chunk may be propagated independently from other chunks in the same version of the file 1015.
- each node 1002 in the wireless network 1000 holds exactly one complete version of the firmware file 1015 and at most one outstanding version (i.e., receiving in-progress) of the file 1015.
- the outstanding version is a newer (or“updated”) version than the complete version.
- the node discards the chunks of the incomplete previous version and starts to collect the chunks associated with the new version for completing the new version.
- each node 1002 may identify the newest version (i.e., the most recently released version) of the received chunks, and subsequently transmit them to its associated child node(s) regardless whether the most recently released file is complete or still in-progress. For example, referring again to FIG.
- the node 1006 is a parent node of the node 1024; assuming that the parent node 1006 has a complete fourth version and incomplete fifth version of the firmware file, while the child node 1024 has a complete third version and incomplete fourth version of the firmware file (this may occur when, for example, the node 1024 is disconnected from the network 1000 for some time), the parent node 1006 may transmit the chunks of the firmware file associated with the fifth version (as opposed to the fourth version) to the child node 1024. Accordingly, each node 1002, upon receiving or identifying the newest version of a chunk, may store the chunk therein and subsequently transmit the chunk to its associated child node(s) in its cell using broadcasting. The child node(s) that receives the broadcast chunk may then determine whether the received chunk is the newest version it has, and if so, accepts the chunk and forwards it to the child node(s) it associated within in its own cell.
- FIG. 11 illustrates a node A being a parent node and nodes B and C being the child nodes of node A in a cell 1102; nodes D and E are network nodes outside the cell 1102.
- node A may first determine whether the child nodes are“silent” (i.e., not transmitting or receiving any data packets); and if so, node A can then transmit the chunk to its child nodes B and C. But in some situations, nodes D and E, which are not child nodes of node A, are active; thus, transmissions from nodes D and E, while not detectable by node A, can still be detected by nodes B and C, respectively. Thus, transmission collisions may occur in nodes B and C. As a result, both nodes B and C may fail to receive the broadcast chunk from node A.
- the child nodes are“silent” (i.e., not transmitting or receiving any data packets); and if so, node A can then transmit the chunk to its child nodes B and C. But in some situations, nodes D and E, which are not child nodes of node A, are active; thus, transmissions from nodes D and E, while not detectable by node A, can still be detected by nodes B and
- the parent node sends its associated child nodes in the cell a “NACK-request message” periodically (e.g., every time interval, TNACK (e.g., 5 minutes)); the NACK-request message requests the child nodes to identify and report to the parent node which of the chunk(s) indicated in the NACKjequest message is missing in the receiving child nodes.
- the NACK-request message may be an independently transmitted message or incorporated into a BEACON message.
- the child nodes upon receipt of the NACK-request message, identify the missing chunks therein and report them to the parent node via transmission of a“NACK message.”
- transmissions of NACK messages may be scheduled to occur when the tree-based network is relatively idle. As further described below, in some embodiments, scheduling transmission of the NACK message can be controlled by the parent node based on the NACK-request messages transmitted therefrom.
- the parent node upon receiving a list of missing chunks from its child nodes, adds the list to its future schedule.
- the list of chunks in the future schedule may include the missing chunks (which are identified in a NACK message sent from at least one of its child nodes) and one or more new chunks (which have not yet been broadcast).
- each chunk at the parent node is classified into one of three states: (i) a“missing” state indicating that at least one of the child nodes does not have the chunk, (ii) a“requested” state indicating that a child node needs to broadcast the chunk, and (iii) a“transmitted” state indicating that the parent node has broadcast this chunk to the child nodes but a NACK message has not been received since last transmission.
- all the chunks in the in-progress firmware file are in one of the above-identified three states.
- the timing for transmitting each chunk can be determined. For example, when the parent’s scheduler is invoked to put new data packets in the delivery queue, the parent node may first select the chunks having a“requested” state; the parent node may then create a data packet from each selected chunk and deliver the packets to a queue for broadcasting. After the chunks are broadcast, the parent node may change the state of the selected chunks to “transmitted,” indicating that the chunks have not been requested since they were transmitted last time. The“transmitted” state may be changed to the“requested” state at a later time.
- a new child node may join the cell at a later time (e.g., one hour later) and need to broadcast the chunk to its associated child nodes.
- the chunk’s state may have to be changed to“request” in order to be placed in the queue for broadcasting.
- the parent node sends a NACK-request message only when all the following conditions are satisfied: (i) there are no more“requested” chunks therein;
- At least a predetermined time interval e.g., TNACK
- a predetermined number e.g. 50
- the parent node knows that there may be at least one receiving child node that has not received one or more of the chunks (thus, if the parent node knows that all the receiving child nodes have received all the chunks, there is no need for the parent node to send the NACK-request message).
- the NACK-request message may include information associated with the chunks that have been transmitted by the parent node.
- the NACK-request message may include a complete set of the sequence numbers associated with all the transmitted chunks.
- only a subset of the sequence numbers associated with the transmitted chunks is indicated in a NACK-request message (e.g., for saving space). This may occur when, for example, the length of the NACK-request message is limited and the broadcast firmware file contains a large amount of chunks.
- the parent node may thus reduce the length of the MACK-request message by including only a subset of the sequence numbers in each message and having different sets of the sequence numbers included in different MACK- request messages transmitted at different times.
- the parent node includes a database maintaining a cyclic pointer for indicating the sequence number of the last chunk in the last-sent NACK-request message. Based thereon, the parent node can then include the sequence numbers of the following chunks in a new NACK-request message.
- the parent node may transmit a NACK- request message having the sequence numbers of 25-40, 41, 44-47, 50, and adjusts the cyclic pointer to number 50 after transmission of the NACK-request message.
- the parent node may transmit the next NACK-request message with the sequence numbers of 92- 100, 1-8, 9, 11.
- the chunks are already transmitted by the parent node but because there is no need for the parent node to receive a NACK message, the sequence numbers of these chunks will not be listed on the NACK-request message. For example, when the parent node has already received a NACK message for a specific sequence number and the chunk associated therewith is currently awaiting retransmission, there may be no need to receive a NACK message for it.
- the child node may respond by transmitting a NACK message to the parent node.
- the child node implements a transmission approach for minimizing the number of transmissions of the responding NACK messages to the parent node and spreading the NACK messages as equally as possible over a predetermined time period (e.g., in the next TNACK period).
- the transmission approach starts by determining the number of chunks identified in the NACK-request message but missing in the child node. Based thereon, fractions of the missing chunks and non-missing chunks (FNMC) can be computed.
- the child node then draws a random time between 0 and (FNMC X TNAC) before transmitting its NACK message to the parent node.
- the child nodes that miss more chunks may access the wireless channel before the child nodes that miss fewer chunks.
- this approach may significantly reduce the expected number of transmissions of the responding NACK messages to the parent node.
- the child node can cancel the transmission of its NACK message.
- the node child can update its NACK message to cover the sequence numbers associated with the chunks that are still missing therein and have not been reported by other child nodes.
- each child node to be aware of the NACK messages transmitted by other child nodes. This may be achieved by, for example, broadcasting each NACK message to all nodes in the vicinity of the transmitting child node, or allowing other child nodes to“spoof’ the NACK message when it is transmitted to the parent node.
- the parent node may periodically broadcast messages summarizing the sequence numbers associated with the missing chunks that are indicated in the received NACK messages. Based thereon, the child nodes can update or cancel their NACK messages to the parent node as described above.
- FIG. 13 is a flow chart illustrating an exemplary approach 1300 for updating a firmware file in a tree-based wireless network in accordance herewith.
- the firmware file is divided into multiple chunks such that each chunk can be included in a single data packet.
- each chunk is broadcast from a node to its child nodes in a transceiver cell.
- the child nodes may determine whether the chunk is new (i.e., an most recently updated version); and if so, the child nodes may store the chunk and broadcast the chunk to their associated child nodes (step 1306). If, however, the chunk is not new, the child nodes may discard the chunk without forwarding it to the child nodes (step 1308).
- each parent node periodically transmits aNACK-request message indicating information such as the types, time stamps and/or sequence numbers associated with all (or at least some) chunks that it has already transmitted to its child nodes (step 1310).
- each child node may identify the chunk(s) that are listed in the NACK-request message but currently missing in the child node, and report the identified missing chunk(s) to the parent node using a NACK message (step 1314).
- a transmission approach involving drawing of a random time for the child node to wait before it transmits its NACK message to the parent node is implemented to minimize the number of transmissions of the NACK messages, thereby preventing a“NACK storm” in the parent node (step 1312).
- the parent node may add the indicated missing chunks to its future schedule for broadcasting (step 1316).
- a scheduler logic that classified the chunks into three states is then implemented to determine the timing for broadcasting a new chunk and/or re-transmitting a missing chunk (step 1318).
- FIG. 14 is a flow chart illustrating an exemplary transmission approach 1400 for minimize the number of message transmissions from the child nodes to the parent nodes in accordance herewith.
- a number of the chunks that is identified in the received NACK-request message but missing in a child node is determined. Based thereon, fractions of the missing chunks and non-missing chunks (FNMC) can be computed (step 1404).
- FNMC non-missing chunks
- a drawn time that the child node has to wait before transmitting the NACK message to its parent node is determined based on the fractions of the missing chunks and non-missing chunks computed in step 1404.
- the child node can cancel or update its NACK message to the parent node while awaiting the drawn time to elapse.
- the child node can transmit the MACK message (if not cancelled) to its parent node.
- Various embodiments described herein provide advantages over conventional approaches for updating the firmware file in a wireless tree network.
- the approaches described herein allow a transmitting node to transmit a file even before it receives all the chunks of the file. This means that the transmitting node may transmit the chunks in an out-of-order manner.
- the transmitting node can use the NACK- request message described above to inform all its receiving nodes about the chunks it wants to receive in the NACK messages.
- NAM negative-acknowledgment-oriented reliable multicast
- the transmitting node is required to have a complete firmware file such that it can transmit the data in order.
- a receiving node that receives a chunk having a sequence number i knows that the NACK messages can be sent for all preceding chunks (i.e., 1 ... /- 1 ). And if a receiving node in NOAM receives the chunk of number 5 before the chunk of number 4, the receiving node will indicate that the chunk of number 4 is missing.
- the approaches described herein allow the transmitting node to receive, from its parent node, the chunk of number 5 before the chunk of number 4, and subsequently transmit the chunk of number 5 before the chunk of number 4 to its receiving nodes. Because allowing the chunks to be distributed out of order may complete the file transfer more rapidly by avoiding the head-of-the-line blocking, the approaches described herein are more efficient than NORM.
- approaches described herein for reliably updating a firmware file can be implemented in any wireless network that has an underlying logical tree- based structure. In addition, these approaches do not require the tree to be static. If the network is dynamic, the tree structure may periodically change; the approaches described herein can automatically adapt to the new network topology. For example, as described above, when a new child node joins the network and needs to broadcast a chunk to its associated child nodes, the chunk’s state may be changed from“transmitted” to“requested;” subsequently, a data packet can be created for the“requested” chunk and delivered to a queue for broadcasting.
- implementation of the NACK-request messages from the parent nodes to the child nodes and NACK messages from the child nodes to the parent nodes may advantageously guarantee that each node connected to the tree network can eventually receive the broadcast firmware file.
- beacon messages can be communicated among neighboring nodes in a tree-based wireless network 200 as depicted in FIG. 2.
- FIG. 15 depicts a tree-based wireless network 1500 that has the same structure as the network 200 depicted in FIG. 2; FIG. 15 differs from FIG. 2 in that a beacon message is transmitted in the network 1500.
- each node contains one or more radio transceivers.
- FIG. 16 illustrates nodes configured for traditional beacon operation and operation in accordance with embodiments of the present invention.
- a first node U (indicated at 1610) includes a parent node portion, DL, 1612 and a child node portion, UL, 1614; the DL and UL have operational channels Cl and C2, respectively, for transmitting and receiving data packets to and from other nodes in the network.
- each of the channels Cl and C2 may be served by a separate transceiver.
- both UL 1612 and DL 1614 of the node U may share one operational channel; as a result, only one transceiver may be equipped with the node U.
- V and W indicated at 1615
- nodes V and W use channels Cl and C3, respectively, as their UL operational channels.
- Beacons transmitted by node U will always be received by node V, since both the DL in the node U and the UL in the node V use the same operational channel Cl— that is, node V is always“listening” to node U. But because the operational channel of the DL in node U is different from the operational channel of the UL in node W, beacons transmitted by node U will not be received by node W.
- the DL 1612 in node U transmits a“visitor beacon” on the operational channel C3 associated with the UL of node W; this way node W can then listen for beacons from node U over its regular operational channel C3 without switching to a different channel.
- both nodes V and W can receive beacons (for node V) or visitor beacons (for node W) over their regular operational channels Cl and C3, respectively, without the need of switching to different channels. This may significantly reduce the overall time during which nodes V and W are not available on their regular operational channels using conventional approaches.
- the DL portion of node U can transmit the visitor beacons on all channels in the network system, except its operational channel Cl.
- This visitor-beacon scheme may be compared with the hold-and-sniff scheme as follows.
- the hold-and-sniff scheme requires the sniffing node to pause activity on its operational channel and request that neighboring nodes also pause their conventional traffic directed at the“sniffing” node; the pause defines the duration of the sniff.
- the sniffing duration is quite long as it has to allow reception of at least one beacon message; this is particularly so when the beacon periodicity is low.
- the transmitter of a visitor beacon pauses activity on its operational channel only for the time it takes to transmit a visitor beacon, which can involve much less time than a sniff.
- BTintervai be the time interval between beacons and let BTiength be the transmission time of an individual beacon. To minimize consumption of network bandwidth by beacon traffic, BTintervai should be maximized. Assume that when the visitor-beacon scheme is used, a node transmits visitor beacons over k channels and that BTiength for each visitor beacon is t seconds. The time t is the sum of the average channel access duration using the relevant channel access scheme (e.g., the commonly used CSMA/CA protocol), plus the time required for radio tuning to another channel, plus the actual time needed to transmit the packets corresponding to a visitor beacon.
- the relevant channel access scheme e.g., the commonly used CSMA/CA protocol
- the total time required to deliver visitor beacons on all channels is k x t, meaning that the normal activity of the beacon sender is interrupted for visitor beacon delivery for a duration of k x t seconds.
- the duration t is affected by the channel load— in fact, exponentially increasing as a function of the channel load.
- the network nodes are not synchronized and beacons may be delivered by each node at any time as determined by a beacon-transmitting node.
- Each node sniffs for a duration the order of BTiength + BTintervai to receive at least one beacon from each announcing node in the vicinity. Again assuming k channels in total, each node needs to switch its receiver through k channels and sniff each of them independently, so the total time spent by each node for a round of sniffing is equals to k x (BTiength + BTintervai).
- The“cost” of the visitor-beacon scheme is the increased channel overhead due to the additional delivery of visitor beacons by every node.
- Each receiving node is affected by this increased load, and the load per receiving node varies as a function of the network topology and radio propagation. Assuming N nodes are within radio distance of a receiving node, and assuming that each node delivers one visitor beacon per visitor beacon interval, the
- the rate of visitor beacon delivery may be dynamically adjusted according to, for example, the following algorithm.
- p channel utilization (so that the higher the channel utilization, or channel load, the lower the probability of delivery).
- the duration required for channel load measurement is short, but this duration nonetheless adds to the total duration t required for delivery of each visitor beacon and hence affects the ratio R.
- N the network density
- the channel load imposed by visitor beacons increases as well, whereas for a system that uses the hold-and-sniff scheme, the channel load imposed by beacon delivery remains constant and is a function only of the beacon Interval BTintervai and the number of channels k.
- the optimal ratio between the two schemes may be determined in advance or dynamically based on network performance.
- a visitor beacon is first transmitted by each node to all other nodes within radio distance, thereby publishing each node’s capabilities to its neighbors. Once all nodes have been apprised of the capabilities of their neighbors, each node can, based on the received visitor beacons, filter out nodes with which it cannot communicate.
- Each receiving node thereupon checks the quality of the radio channel used to receive visitor beacons. In order to do this, a receiving node applies“sniff’ procedure on the channel used to receive visitor beacons, monitoring received beacons (and optionally data traffic) delivered on the sniffed channel.
- the sniff duration per node and channel combination can be very short since the sniffing node can use for its quality analysis any data packet delivered on the sniffed channel.
- the sniffing node is only interested in the quality of the radio link between it and the node that is sniffed. At worst, if the sniffed node does not deliver any data packets, at least it will deliver beacons, so the longest required sniffing duration is on the order of BTiength + BTintervai per sniffed channel and node combination. Following the sniff and quality analysis, the sniffing node has all the requisite information about the node that transmitted the visitor beacon as well as the actual radio channel quality between the measuring node and the node that transmitted the visitor beacon.
- the NMS 212/214/1012/1014/1512/1514 described herein may include one or more modules implemented in hardware, software, or a combination of both for performing the functions described above (e.g., steps in FIGS. 3, 5-9, 13 and 14).
- programming to implement the functions associated with channel switching and visitor beacon generation and transmission may have the form of one or more modules implemented in hardware, software, or a combination of both.
- the functions are provided as one or more software programs, the programs may be written in any of a number of high level languages such as PYTHON, FORTRAN, PASCAL, JAVA, C, C++, C#, BASIC, various scripting languages, and/or HTML.
- the software can be implemented in an assembly language directed to the microprocessor resident on a target computer; for example, the software may be implemented in Intel 80x86 assembly language if it is configured to run on an IBM PC or PC clone.
- the software may be embodied on an article of manufacture including, but not limited to, a floppy disk, a jump drive, a hard disk, an optical disk, a magnetic tape, a PROM, an EPROM, EEPROM, field-programmable gate array, or CD-ROM.
- Embodiments using hardware circuitry may be implemented using, for example, one or more FPGA, CPLD or ASIC processors.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201862757185P | 2018-11-08 | 2018-11-08 | |
US201862757183P | 2018-11-08 | 2018-11-08 | |
US201862757186P | 2018-11-08 | 2018-11-08 | |
PCT/IB2019/001244 WO2020095114A1 (en) | 2018-11-08 | 2019-11-08 | Systems and methods for multicast group routing, firmware updating, and next-hop routing in tree-based wireless networks |
Publications (2)
Publication Number | Publication Date |
---|---|
EP3878215A1 true EP3878215A1 (en) | 2021-09-15 |
EP3878215A4 EP3878215A4 (en) | 2022-10-19 |
Family
ID=70612530
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP19883046.5A Withdrawn EP3878215A4 (en) | 2018-11-08 | 2019-11-08 | Systems and methods for multicast group routing, firmware updating, and next-hop routing in tree-based wireless networks |
Country Status (4)
Country | Link |
---|---|
EP (1) | EP3878215A4 (en) |
AU (1) | AU2019375082A1 (en) |
IL (1) | IL282915A (en) |
WO (1) | WO2020095114A1 (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113760799B (en) * | 2020-06-03 | 2024-04-09 | 中车株洲电力机车研究所有限公司 | Scalable communication method, device, computer equipment and storage medium of UPP interface |
CN113207113B (en) * | 2021-04-20 | 2023-01-13 | 上海富芮坤微电子有限公司 | Multi-connection networking system, method, storage medium and electronic device |
CN114286127B (en) * | 2022-03-08 | 2022-05-27 | 浙江微能科技有限公司 | Distributed artificial intelligence analysis method and device |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6611872B1 (en) * | 1999-01-11 | 2003-08-26 | Fastforward Networks, Inc. | Performing multicast communication in computer networks by using overlay routing |
CN1232081C (en) * | 2002-08-06 | 2005-12-14 | 华为技术有限公司 | Repeating method for multi-broadcast message in network communication |
US20070168555A1 (en) * | 2006-01-18 | 2007-07-19 | Dorenbosch Jheroen P | Efficient multicast call setup method and system |
US8520673B2 (en) * | 2006-10-23 | 2013-08-27 | Telcordia Technologies, Inc. | Method and communication device for routing unicast and multicast messages in an ad-hoc wireless network |
CN101242342B (en) * | 2007-02-05 | 2012-09-19 | 华为技术有限公司 | Multicast method and multicast route method |
US8289883B2 (en) * | 2007-12-21 | 2012-10-16 | Samsung Electronics Co., Ltd. | Hybrid multicast routing protocol for wireless mesh networks |
CN102075417B (en) * | 2010-09-30 | 2013-11-06 | 杭州华三通信技术有限公司 | Multicast cutting method, protocol independent multicast router |
US9438432B2 (en) * | 2013-09-17 | 2016-09-06 | Cisco Technology, Inc. | Bit indexed explicit replication packet encapsulation |
US10447496B2 (en) * | 2017-03-30 | 2019-10-15 | Cisco Technology, Inc. | Multicast traffic steering using tree identity in bit indexed explicit replication (BIER) |
-
2019
- 2019-11-08 AU AU2019375082A patent/AU2019375082A1/en not_active Abandoned
- 2019-11-08 EP EP19883046.5A patent/EP3878215A4/en not_active Withdrawn
- 2019-11-08 WO PCT/IB2019/001244 patent/WO2020095114A1/en unknown
-
2021
- 2021-05-04 IL IL282915A patent/IL282915A/en unknown
Also Published As
Publication number | Publication date |
---|---|
IL282915A (en) | 2021-06-30 |
EP3878215A4 (en) | 2022-10-19 |
WO2020095114A1 (en) | 2020-05-14 |
AU2019375082A1 (en) | 2021-06-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11297468B2 (en) | Efficient multicast group routing across tree-based wireless network | |
US9979635B2 (en) | Method for controlling flood broadcasts in a wireless mesh network | |
US5721733A (en) | Wireless network access scheme | |
US7054271B2 (en) | Wireless network system and method for providing same | |
US7269147B2 (en) | Relaying broadcast packet in a mobile Ad-hoc network including flushing buffer if broadcast count number exceed buffer size | |
JP5165031B2 (en) | Nodes in vehicle ad hoc networks | |
US8493902B2 (en) | Opportunistic listening system and method | |
WO2020095114A1 (en) | Systems and methods for multicast group routing, firmware updating, and next-hop routing in tree-based wireless networks | |
Khabbazian et al. | Efficient broadcasting in mobile ad hoc networks | |
US20080031250A1 (en) | Energy accumulation in destination nodes of wireless relay networks | |
US12041115B2 (en) | Systems and methods for reliable firmware update in tree-based wireless networks | |
US20180199297A1 (en) | Method of Performing Timing Arrangement in a Mesh Network | |
US10624017B2 (en) | Method for operating a communication apparatus and communication apparatus | |
US20140010138A1 (en) | Confirmed link level broadcast using parallel receivers | |
US20210144088A1 (en) | Systems and methods for fast connectivity recovery in tree-based distance-vector routing protocols | |
US20240114429A1 (en) | Downlink routing solution for wireless communication networks | |
US11166220B2 (en) | Next-hop routing over a plurality of distinct channels in a mesh network | |
US20220279423A1 (en) | Systems and methods for efficient and reliable cell broadcasting in tree-based wireless networks | |
US20120163295A1 (en) | Communication apparatus and method | |
Lipman et al. | Neighbor aware adaptive power flooding (NAAP) in mobile ad hoc networks | |
EP4059312A1 (en) | Systems and methods for operating tree-based wireless networks | |
Benincasa et al. | An experimental evaluation of peer-to-peer reliable multicast protocols | |
CN111464444B (en) | Sensitive information distribution method | |
Wu et al. | Intelligent broadcast in wireless ad hoc networks using live packet information | |
Wu et al. | Node-Stamping Approaches to Efficient Message Broadcasting in Wireless Ad Hoc Networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE |
|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE |
|
17P | Request for examination filed |
Effective date: 20210517 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
DAV | Request for validation of the european patent (deleted) | ||
DAX | Request for extension of the european patent (deleted) | ||
RIC1 | Information provided on ipc code assigned before grant |
Ipc: H04L 45/16 20220101ALI20220610BHEP Ipc: H04L 12/18 20060101ALI20220610BHEP Ipc: H04W 40/32 20090101AFI20220610BHEP |
|
A4 | Supplementary search report drawn up and despatched |
Effective date: 20220919 |
|
RIC1 | Information provided on ipc code assigned before grant |
Ipc: H04L 45/16 20220101ALI20220913BHEP Ipc: H04L 12/18 20060101ALI20220913BHEP Ipc: H04W 40/32 20090101AFI20220913BHEP |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20230418 |