GB2518120A - Network Configuration - Google Patents

Network Configuration Download PDF

Info

Publication number
GB2518120A
GB2518120A GB1501075.4A GB201501075A GB2518120A GB 2518120 A GB2518120 A GB 2518120A GB 201501075 A GB201501075 A GB 201501075A GB 2518120 A GB2518120 A GB 2518120A
Authority
GB
United Kingdom
Prior art keywords
local
devices
network
identities
message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
GB1501075.4A
Other versions
GB201501075D0 (en
GB2518120B (en
Inventor
Nicholas Guy Albert Graube
Robin Heydon
Nicholas John Jones
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qualcomm Technologies International Ltd
Original Assignee
Cambridge Silicon Radio Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from GB1403314.6A external-priority patent/GB2512733B/en
Priority claimed from GB1403312.0A external-priority patent/GB2515853B/en
Application filed by Cambridge Silicon Radio Ltd filed Critical Cambridge Silicon Radio Ltd
Publication of GB201501075D0 publication Critical patent/GB201501075D0/en
Publication of GB2518120A publication Critical patent/GB2518120A/en
Application granted granted Critical
Publication of GB2518120B publication Critical patent/GB2518120B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0805Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
    • H04L43/0817Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking functioning
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/73Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by creating or determining hardware identification, e.g. serial numbers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/76Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in application-specific integrated circuits [ASIC] or field-programmable devices, e.g. field-programmable gate arrays [FPGA] or programmable logic devices [PLD]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • G06Q10/083Shipping
    • G06Q10/0833Tracking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/14Relay systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04HBROADCAST COMMUNICATION
    • H04H20/00Arrangements for broadcast or for distribution combined with broadcast
    • H04H20/65Arrangements characterised by transmission systems for broadcast
    • H04H20/71Wireless systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0813Configuration setting characterised by the conditions triggering a change of settings
    • H04L41/082Configuration setting characterised by the conditions triggering a change of settings the condition being updates or upgrades of network functionality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/084Configuration by using pre-existing information, e.g. using templates or copying from other elements
    • H04L41/0846Configuration by using pre-existing information, e.g. using templates or copying from other elements based on copy from other elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/085Retrieval of network configuration; Tracking network configuration history
    • H04L41/0853Retrieval of network configuration; Tracking network configuration history by actively collecting configuration information or by backing up configuration information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/12Discovery or management of network topologies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/06Generation of reports
    • H04L43/065Generation of reports related to network devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0852Delays
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0876Network utilisation, e.g. volume of load or congestion level
    • H04L43/0882Utilisation of link capacity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/10Active monitoring, e.g. heartbeat, ping or trace-route
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/02Topology update or discovery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/11Identifying congestion
    • H04L47/115Identifying congestion using a dedicated packet
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/16Flow control; Congestion control in connection oriented networks, e.g. frame relay
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L49/00Packet switching elements
    • H04L49/15Interconnection of switching modules
    • H04L49/1553Interconnection of ATM switching modules, e.g. ATM switching fabrics
    • H04L49/1584Full Mesh, e.g. knockout
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • H04L5/003Arrangements for allocating sub-channels of the transmission path
    • H04L5/0053Allocation of signaling, i.e. of overhead other than pilot signals
    • H04L5/0055Physical resource allocation for ACK/NACK
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1475Passive attacks, e.g. eavesdropping or listening without modification of the traffic monitored
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1491Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/18Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/2866Architectures; Arrangements
    • H04L67/30Profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/22Parsing or analysis of headers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0877Generation of secret information including derivation or calculation of cryptographic keys or passwords using additional device, e.g. trusted platform module [TPM], smartcard, USB or hardware security module [HSM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/50Secure pairing of devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
    • H04W16/18Network planning tools
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/06Testing, supervising or monitoring using simulated traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/06Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/38Services specially adapted for particular environments, situations or purposes for collecting sensor information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/24Connectivity information management, e.g. connectivity discovery or connectivity update
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements
    • H04W52/0209Power saving arrangements in terminal devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements
    • H04W52/0209Power saving arrangements in terminal devices
    • H04W52/0225Power saving arrangements in terminal devices using monitoring of external events, e.g. the presence of a signal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements
    • H04W52/0209Power saving arrangements in terminal devices
    • H04W52/0251Power saving arrangements in terminal devices using monitoring of local events, e.g. events related to user activity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements
    • H04W52/0209Power saving arrangements in terminal devices
    • H04W52/0261Power saving arrangements in terminal devices managing power supply demand, e.g. depending on battery level
    • H04W52/0274Power saving arrangements in terminal devices managing power supply demand, e.g. depending on battery level by switching on or off the equipment or parts thereof
    • H04W52/028Power saving arrangements in terminal devices managing power supply demand, e.g. depending on battery level by switching on or off the equipment or parts thereof switching on or off only a part of the equipment circuit blocks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/04TPC
    • H04W52/38TPC being performed in particular situations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W64/00Locating users or terminals or network equipment for network management purposes, e.g. mobility management
    • H04W64/003Locating users or terminals or network equipment for network management purposes, e.g. mobility management locating network equipment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/12Wireless traffic scheduling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/20Control channels or signalling for resource management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/11Allocation or use of connection identifiers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/14Direct-mode setup
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities
    • H04W8/24Transfer of terminal data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities
    • H04W8/24Transfer of terminal data
    • H04W8/245Transfer of terminal data from a network towards a terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • H04W88/04Terminal devices adapted for relaying to or from another terminal or user
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • H04W88/06Terminal devices adapted for operation in multiple networks or having at least two operational modes, e.g. multi-mode terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W92/00Interfaces specially adapted for wireless communication networks
    • H04W92/02Inter-networking arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/77Graphical identity
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02ATECHNOLOGIES FOR ADAPTATION TO CLIMATE CHANGE
    • Y02A10/00TECHNOLOGIES FOR ADAPTATION TO CLIMATE CHANGE at coastal zones; at river basins
    • Y02A10/40Controlling or monitoring, e.g. of flood or hurricane; Forecasting, e.g. risk assessment or mapping
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

A method of determining the topology of a network, preferably a wireless mesh network, is disclosed. The network comprises a central network entity 207 and a plurality of devices 201-206 each of which communicates directly with one or more local devices of a local group 208, 209, 210. The local devices are the devices of the network with which the device is within direct communication range. At each device an identifier message is received from each local device comprising an identifier and an instruction not to retransmit the message. Each device reports the identities of the local devices in the local group to the central network entity 207. The central network entity determines the topology by collating the identities of the local devices in the local groups of each device. Transport of messages through the network may be provided by each device listening for and retransmitting messages. The identities of local devices in a local group may be stored in a store at each device, the store being updated with the received identities. Each local device may transmit its identifier message in response to receiving a trigger message from the central network entity or from another device.

Description

Intellectual Property Office Application No. GB1501075.4 RTM Date:30 January 2015 The following terms are registered trade marks and should be read as such wherever they occur in this document: Bluetooth ZigBee Zwave Intellectual Property Office is an operating name of the Patent Office www.ipo.govuk
NETWORK CONFIGURATION
This invention relates to configuring the devices of a network, for example configuring the devices of a mesh network.
S BACKGROUND
There is an increasing need for a variety of objects to be equipped with the ability to send and receive messages. In the case of the home, for example, it is desirable for multiple devices to be able to communicate with each other, and also potentially with the internet or cloud, in order to allow for more automated control of the home. For example, a home may contain a lighting system, heating appliances and sensor devices. By allowing these devices to communicate with each other certain controls can be automated, such as turning on the lights and the heating when the sensor detects that a person has entered a room.
To enable arbitrary objects to communicate, they can be equipped with communication devices. As many of these objects will not have access to, or require, power themselves (for example a window or a door), there is a desire that the communication devices be battery-powered devices that consume very little power.
Low-powered communications equipment may not have sufficient communication range to communicate directly with other equipment located in the network. A suitable network for such devices to adopt is a mesh network, in which a device can communicate with a remote device outside its communication range via one or more intermediary devices. In this arrangement the intermediary devices function to relay a received message.
Figure 1 shows such a mesh network. The network comprises a number of devices 101, 102, 103 and 104. Each device can communicate wirelessly with other devices that are in effective range of it by means of an incorporated wireless communications device lOla, 102a, 103 and 104a. The communications devices cooperate to propagate signals between them. The communication range of device lOla is bounded by boundary 105. The communication range of device 103 is bounded by boundary 106. If communications device lola transmits a signal, that signal can be received by devices 102a and 103 which are within range of device lOla.
Device 104a is out of range of device lola. However, device 103 can relay the signal received from device lOla so that it can be received by device 104a. This method of communication allows devices to communicate even though they are out of direct range of each other.
In order for the operation of appliances connected in such a mesh network to be automated based on a predetermined schedule and/or the state of other devices in the network, the appliances and the network must first be configured accordingly by the network user. Every time a new appliance is added to the network, that appliance and the network must be re-configured to cause the appliance to operate automatically in the desired manner. This is particularly burdensome in the case that the new appliance is a replacement for another appliance, for example in the case that a light bulb has blown and been replaced by an equivalent light bulb. In this situation, for every light bulb that is replaced, the user would have to manually configure the light bulb to communicate with the mesh network according to the mesh network communications protocol, and also manually configure the lighting operation of the light bulb, i.e. when it is to turn on and off.
There is a need for an improved way of reconfiguring a network of devices when a replacement device is introduced in a network.
SUMMARY OF THE INVENTION
According to one aspect of the invention there is provided a method of configuring a network, the network comprising a plurality of devices capable of operating according to a wireless communications protocol, each device having a device type, each device communicating directly with one or more local devices of a local group, the local devices being those devices of the network with which the device is in direct communications range, the method comprising: storing a device configuration for each device; at a device: detecting that a first local device having a first device type has left the local group, and detecting that a further device having the first device type has entered the local group; determining that the further device is a replacement for the first local device; and applying the stored configuration for the first local device to the further device.
Suitably, the further device is associated with an appliance supplementary to its wireless communications function, and applying the stored configuration to the further device configures functionality of the appliance.
Suitably, applying the stored configuration to the further device configures the further device to communicate over the network according to the wireless communications protocol.
Suitably, the method comprises at each device: storing identities of the local devices of the local group of that device in a store; from each local device, receiving an identifier message comprising an identity of the local device and an instruction not to retransmit the identifier message; and updating the store with the identities of the local devices of the local group.
Suitably, the identifier message comprising the identity of the local device specifies the device type of the local device.
Suitably, each local device transmits an identifier message in response to receiving a trigger message from the device.
Suitably, each local device transmits an identifier message in response to receiving a trigger message from a central network entity.
Suitably, the trigger message and the identifier message are both transmitted in a low or no security mode such that a device which is not yet associated with the network can successfully receive the trigger message and transmit the identifier message.
Suitably, each device periodically reports the identities of the local devices in the local group of that device to a central network entity.
Suitably, each device reports the identities of the local devices in the local group of that device to a central network entity only if the identities of the local devices in the local group have changed since the device last reported the identities of the local devices in the local group to the central network entity.
Suitably the method comprises, at the central network entity, determining that the further device is a replacement for the first local device if more than one device reports to the central network entity that: the identities of the local devices no longer include the first local device's S identity; the identities of the local devices include the further device's identity; and the first local device and the further device have the same device type.
Suitably the method comprises, at the central network entity, determining that the further device is a replacement for the first local device if each of the devices which were local devices of the first local device reports to the central network entity that: the identities of the local devices no longer include the first local device's identity; the identities of the local devices include the further device's identity; and the first local device and the further device have the same device type.
Suitably, the device configurations of each device are stored at a central network entity.
Suitably, the device configurations of each device are stored in a distributed manner across the devices of the network.
Suitably, the network is a mesh network.
Suitably, the devices operate according to the Bluetooth Low Energy protocol.
According to another aspect of the invention there is provided a network comprising: a plurality of devices capable of operating according to a wireless communications protocol, each device having a device type, each device communicating directly with one or more local devices of a local group, the local devices being those devices of the network with which the device is in direct communications range; wherein each device is configured to: detect that a first local device having a first device type has left the local group, and detect that a further device having the first device type has entered the local group; wherein the network is configured to: store a device configuration for each device, determine that the further device
S
isa replacement for the first local device, and apply the stored configuration for the first local device to the further device.
Suitably, the further device is associated with an appliance supplementary to its wireless communications function, and the further device is configured to apply the stored configuration to the appliance.
Suitably, each device comprises a store for storing the identities of the local devices of the local group of that device, and each device is configured to update the identities stored in the store on receiving identifier messages from the local devices, each identifier message including an identity of the local device that sent the identifier message.
According to another aspect of the invention there is provided a method of determining the topology of a network, the network comprising a central network entity and a plurality of devices capable of operating according to a wireless communications protocol, each device communicating directly with one or more local devices ofa local group, the local devices being those devices of the network with which the device is in direct communications range, the method comprising: at each device, from each local device, receiving an identifier message comprising an identity of the local device and an instruction not to retransmit the identifier message; at each device, reporting the identities of the local devices in the local group of that device to the central network entity; and at the central network entity, determining the topology of the network by collating the identities of the local devices in the local groups of each device.
BRIEF DESCRIPTION OF THE DRAWINGS
The present invention will now be described by way of example with reference to the drawings. In the drawings: Figure 1 illustrates a mesh network; Figure 2 illustrates a further mesh network; Figure 3 illustrates a wireless communications device; Figure 4 illustrates a message format; and Figure 5 illustrates a method of updating a store of the identifies of the local devices in the local group of a device; and Figure 6 illustrates a method of determining that a device of the network has been replaced by another device and configuring that other device.
DETAILED DESCRIPTION
Figure 2 shows a mesh network comprising a plurality of devices 201, 202, 203, 204, 205, 206 and 207. Each of these devices has an integrated wireless communications unit which is capable of communicating with the other devices of the mesh network using a wireless communications protocol. The devices communicate with each other using the same wireless communications protocol. That could be a relatively short-range protocol. For example, the effective range of each device may be less than 25m. That characteristic may permit the devices to use less power for transmitting and/or receiving than would be expected in a longer range protocol. Examples of such wireless communications protocols are Bluetooth Low Energy, Zigbee, IEEE 802.11 and Zwave. The devices communicate in an ad hoc manner in order to transfer data between each other.
One or more of the devices is associated with an appliance supplementary to its wireless communications function. The appliance may be mains powered, for example a light fitting.
Suitably, the integrated wireless communications units associated with the mains powered appliance is also mains powered. Alternatively, the appliance may be battery-powered, for example a door alarm. Suitably, the integrated wireless communications unit associated with the battery-powered appliance is also battery powered.
Each device in the network has a device type. Examples of device type are light bulb, light switch, door, window, motion sensor, heat sensor, radiator, fridge, mobile phone, tablet computer.
Each device can communicate wirelessly with other devices that are in effective range of it.
The communications coverage area of device 201 is bounded by boundary 208 in figure 2.
Device 201 is able to communicate directly with devices 202, 203, 204 and 205 which are within communications range 208 of device 201. In other words, device 201 is able to receive communications signals which are transmitted within its coverage area 208. Similarly, device 201 is able to successfully transmit communications signals to other devices which are located within its coverage area 208. No intermediary device is needed to relay signals between device 201 and any other devices located within the area 208. Devices within coverage area 208 are referred to herein as local devices of device 201's local group. Thus, devices 202, 203, 204 and 205 are local devices of device 201's local group. The communications coverage area of device 205 is bounded by boundary 209. Thus, devices 201 and 204 are local devices of device 205's local group. The communications coverage area of device 206 is bounded by boundary 210. Thus, devices 204, 205 and 207 are local devices of device 206's local group.
Figure 3 shows the architecture of one of the devices 201, 202, 203, 204, 205, 206 and 207 for communicating in the mesh network. The device 300 comprises an antenna 301, a radio frequency (RF) front end 302 and a baseband processor 303. The baseband processor 303 comprises a microprocessor 304 and a non-volatile memory 305. The non-volatile memory 305 stores in non-transitory form program code that is executable by the microprocessor to cause the baseband processor to implement the communications protocol of the network and the methods described herein with reference to figures 5 and 6. Memory 305 comprises local device identity store 306 and keystore 307.
In order to transmit signals into the mesh network the processor 303 can drive the RF front end 302, which in turn causes the antenna 301 to emit suitable RF signals. Signals received at the antenna 301 from the mesh network can be pre-processed (e.g. by analogue filtering and amplification) by the RF front end 302, which presents corresponding signals to the processor 303 for decoding. The processor can respond to those signals in various ways, as will be described in more detail below.
The device also comprises a clock 308, which can be turned on or off by the microprocessor 304 in order to save power, and optionally an external connection 309 suitable for exchanging information with the device's associated appliance if it has one. Suitably, this external connection 309 is wired. This information may include sensing external events (e.g. the operation of an associated user interface device such as a switch) or issuing control signals to associated appliances (e.g. to turn a light bulb on or off). The device also comprises a power source 310, which may be a battery. The device may also be mains-powered.
The RE front end 302 and the baseband processor 303 could be implemented on one or more integrated circuits.
The mesh network operates by communicating data packets among the devices of the network. Eigure 4 shows a suitable format for one of the packets. The packet 400 comprises a header made up of a source address 401, a destination address 402 and a sequence number 403, a payload 404, an authentication field 405 and a trailer comprising a time to live (TTL) field 406. The payload is optionally encrypted using an encryption key that is specific to a particular set of nodes in the network. When such a payload is successfully decrypted, as illustrated at 407, it comprises a plaintext payload 408 and optionally a checksum field 409.
Each device is assigned an identity which is unique within the network. Suitably, this identity specifies the device type of the device. When composing an original packet for transmission, a device inserts its identity in the source address field 401. The identity could be assigned at manufacture or when the network is being configured. The device also specifies the destination device in the destination address field 402. If the message is intended for a single device, then the identity of that single device is inserted into the destination address field 402. If the message is intended for a group of devices then the group identity of that group is inserted into the destination address field 402.
Each device keeps a count of original packets it has composed. Each time it composes a new original packet it increments the count and inserts the new count into the sequence number field 403. The length of the sequence number field can be set to be sufficient that a combination of fields 401 and 403 uniquely identify within the network any packet that would be expected to be currently circulating in the network.
Each device has a keystore 307 where it stores in non-volatile fashion one or more network keys, for example encryption and/or authentication keys. When a device composes a message for use in a certain mesh network it forms a payload 408 including the traffic data it wishes to convey and optionally generates a checksum 409 for that payload using a predefined checksum algorithm. It then concatenates the payload and the checksum and either: (a) uses that concatenated string as the payload 404 for the new packet or (b) encrypts the concatenated string using a predefined encryption algorithm which takes as input the concatenated plaintext payload 408 and the encryption key that corresponds to the mesh network in question and uses the output of the encryption step as the payload 404. In the latter case, the encryption key is selected to be one that is shared with a device that is intended to action the payload.
A device composing an original packet defines an original TTL for that message. The original TEL depends on the expected characteristics of the network, as will be discussed below, but could, for example, be a number such asS.
Once the original packet is fully composed the originating device transmits it one or more times.
When one of the devices is participating in a mesh network it listens for mesh packets. It may listen continually or, to save power, intermittently. When it receives a mesh packet it attempts to authenticate the packet using one or more of the authentication keys it has stored. If the device has successfully authenticated the packet it can pass the received payload for processing. The payload might be decrypted by means of an encryption key stored by the device. The payload is processed by the device. The payload may be intended to control the internal operation of the device. For example, the payload may control the device to adapt its wireless communications operation. As another example, the payload may indicate that the device should perform some test function. Alternatively, the payload may be intended to control the operation of an appliance attached to the device (if it has one).
For example, the payload may indicate that the device should issue a control signal to an appliance via external connection 309.
An important feature of the mesh network is that a device can also re-transmit a packet it has received. Each device may be configured either to retransmit all mesh packets it receives irrespective of whether it can authenticate them, or only those mesh packets it can successfully authenticate.
A device in the mesh network may be configured to not re-transmit certain mesh messages so as to suppress the possibility of mesh messages circulating indefinitely. One way to do this is for the device to be configured to store a record of messages it has already re-transmitted (e.g. by storing their source and sequence numbers) and to not re-transmit those messages if it receives them again. Another way to do this is by the device making a determination as to whether to re-transmit a received message in dependence on the message's TEL field.
When a device retransmits a packet the device transmits the packet with data content identical to the content of the packet as it received it, except that it decrements the TTLvalue, e.g. by one. The system can be designed so each device is configured not to retransmit any mesh packets if the decremented TEL value is zero. In that way the TTL serves to prevent messages circulating indefinitely in the mesh network. Configuring each device not to re-transmit a message whose identity matches one it has received and re-transmitted before can also help to suppress redundant message transmission. With this behaviour in mind, the original value of the TEL can be set to reflect the propagation properties of the network. A large or unreliable network may suit a larger initial IlL value than a smaller, more reliable network.
Packets can be transmitted adventitiously among the devices participating in a mesh network.
A device can transmit an original packet into the network, other devices participating in the network can serve as a transport for that message to reach another device that is out of direct range of the originating device. The devices need not be fixed in location: they could be mobile. The devices could participate in the network continually or from time to time.
Each device has a store 306 of the identities of the local devices in its local group. Figure S is a flowchart illustrating an exemplary method for updating the store 306.
At step 501 of figure 5, a trigger message is received by the devices in the network. Suitably, this trigger message is generated and sent by a device of the network. It may be sent by a device acting as a central network entity. The central network entity may, for example, be a server. The central network entity may perform one or more of the following roles in the network: sense the network by sending out requests for information to the devices in the network; collate information from reports received from the devices of the network about the local environments of those devices; determine the topology of the network from the collated information; determine changes to make to the operation of the devices in the network; instruct the devices of the network to change their operation.
Suitably, incorporated into the trigger message is an instruction to retransmit the trigger message. This may be achieved, for example, by setting the TTL field of the trigger message to be greater than 0. For example, the TTL field may be 8. Each device that receives a trigger message decrements the value of the TTL field by 1 in the trigger message that it retransmits.
Any device which receives a trigger message with a TTL>1 retransmits the trigger message. If a device receives a trigger message with a TTL=0 or TTL=1 it does not retransmit the trigger message.
An example of sending the trigger message will be described with reference to figure 2.
Consider the case in which device 207 is the central network entity. Device 207 sends a trigger message with a TTL value of 4. Device 206 receives this trigger message, decrements the TTL value to 3, and retransmits the trigger message. Device 204 receives the trigger message with a TTL value of 3. Device 204 decrements the TTL value to 2, and retransmits the trigger message. Devices 201 and 205 receive the trigger message with a TTL value of 2. These devices decrement the TTL value to 1, and retransmit the trigger message. Devices 202 and 203 receive the trigger message sent by device 201. Because the TTL value is 1, devices 202 and 203 do not retransmit the trigger message. Thus, the trigger message is distributed to all the devices in the mesh network of figure 2.
Suitably, the destination address of the trigger message is set to a group identity. Each device in the network interprets the group identity as addressing itself. Thus, each device in the network responds to the trigger message.
The trigger message may be sent periodically. Alternatively, the trigger message may be generated and sent in response to some stimulus in the network. For example, the central network entity may sense a bottleneck in the network, and in response send out a trigger message to determine the current topology of the network.
At step 502 of figure 5, the devices that received the trigger message at step 501 respond by transmitting an identifier message. The identifier message includes the identity of the device that sent it. Suitably, incorporated into the identifier message is an instruction not to retransmit the identifier message. For example, this may be achieved by setting the TTL field of the identifier message too. Thus, an identifier message is not retransmitted by any device in the network. Thus, only devices within direct communications range of the device which sends the identifier message receive the identifier message. In other words, only the local devices of the local group of a device receive its identifier message. In the example of figure 2, only devices 204 and 201 would receive an identifier message transmitted by device 205.
Suitably, the identifier message includes the device type of the device that sends it. This device type may be incorporated into the identity of the device. Alternatively, the device type may be incorporated into a separate field of the message, for example the payload.
In the case that the mesh network is designed such that devices do not retransmit packets for which the decremented TEL value is zero, then all retransmitted packets received by a device have TTL »=1. A device does not receive any retransmitted packets that have TTL=0 because if another device had decremented the TTL value to zero, it would not have retransmitted the packet. Thus, a device can distinguish between packets which have been routed via one or more relays (those packets received with TTL»=1), and those which have been sent directly by a local device in that device's local group (those packets received with TTL=0).
Thus, by means of steps 501 and 502 of figure 5, each device receives an identifier message from each local device of its local group. The device extracts the identity and device type (which may form part of the identity) and updates identity store 306 with the identities at step 503.
In an alternative implementation, the trigger message of step 501 of figure 5 is generated and sent by a device of the network which is to receive the identifier messages sent in response to the trigger message. So, for example, a device sends the trigger message to local devices in its local group, and those local devices respond by sending identifier messages which are received by the device that sent the trigger message. In this case, the trigger message may have an instruction incorporated into it not to retransmit the trigger message. For example, this may be achieved by setting the TEL field to 0. Thus, only the local devices of the local group of a device receive the trigger message it sends. In this case, the destination address may be a group identity which identifies solely the devices in the local group of the device.
Suitably, both the trigger message and the identifier message are sent in a promiscuous mode. In other words, these messages are sent with low or no security. This may be achieved, for example, by sending these messages such that they can be decoded using a public network key. Alternatively, this may be achieved by sending these messages such that no network key is needed to decode them. Thus, devices which have not yet fully entered the network can successfully receive the trigger message and are able to transmit an identifier message which can be successfully received. This may be the case, for example, if a device has not yet authenticated with the network. As another example, the device may not yet have associated At step 504 of figure 5, the device that has updated its identity store at step 503 reports the identities of the local devices in its local group to the central network entity. Step 504 is not necessarily carried out following every instance of step 503. A device may periodically report the identities of the local devices in its local group to the central network entity. A device may report the identities of the local devices in its local group to the central network entity every time it updates its identity store at step 503. A device may report the identities of the local devices in its local group to the central network entity only if the set of identities has changed since the device last reported the identities of the local devices in its local group to the central network entity. A device may report the identities of the local devices in its local group to the central network entity only if an identity has left the set of identities of the local group since the device last reported the identities of the local devices in its local group to the central network entity. A device may report the identities of the local devices in its local group to the central network entity only if an identity has joined the set of identities of the local group since the device last reported the identities of the local devices in its local group to the central network entity. The device may report all of the identities of the local devices in its local group to the central network entity. Alternatively, the device may only report the identities of the devices that have left or joined its local group to the central network entity.
The device may report the identity and the device type of the local devices in its local group to the central network entity.
Thus, the central network entity receives from each device a list of the identities of the local devices in that device's local group. The central network entity may thus determine the topology of the mesh network by collating these identity lists along with knowledge of the identities of the devices that sent the lists. Thus, the central network identity determines the relative arrangement of the devices in the mesh network. The greater the density of the devices in the network, the more accurate that determination of the relative arrangement is.
In an alternative method for updating the store 306 of the local device identities of a device's local group, there is no step 501. In other words, there is no trigger message which is sent to trigger devices to generate the identifier messages. In this case, each device may be configured to periodically transmit identifier messages with an incorporated instruction not to retransmit.
The configuration of at least one device of the network is stored in the network other than at that device. Suitably, the configuration of each device of the network is stored in the network other than at that device. Suitably, the configuration is stored at the central network entity.
Alternatively, the configuration is stored in a distributed manner across the devices of the network. At one extreme, each device of the network may store the configurations of all the other devices of the network. More suitably, the whole or partial configuration of a device in the network is stored in a subset of the devices of the network. For example, devices which are mains powered may store the whole or partial configuration of one or more other devices of the network. Devices which have surplus memory may store the whole or partial configuration of one or more other devices of the network. The configuration of a device may be stored partially at one device of the network and partially at another device of the network.
The configuration of a device which is stored in the network may be a configuration which configures the functionality of the appliance with which the device is associated. For example, in the case of a device which is associated with a light bulb, the configuration may specify, for example, the times that light bulb switches ON and OFF, that the light bulb is to switch ON if a sensor of the network detects that a person has entered the room that the light bulb is in, that the light bulb is to switch OFF if the sensor detects that the person has left the room that the light bulb is in, and so on.
Additionally, or alternatively, the configuration of the devices which is stored in the network may be a configuration which configures the wireless communications functionality of the device. For example, the configuration may include network keys, such as one or more authentication keys and encryption keys, which enable the device to communicate with the network using the mesh protocol.
Additionally, or alternatively, the configuration of a device which is stored in the network may be a configuration which configures the functionality of a device acting as a relay node. For example, the configuration may define the types of messages that the device retransmits.
Figure 6 illustrates a method of determining that a device of the network has been replaced by another device and configuring that other device in the same manner as the replaced device.
At step 601, the updated identity list of local devices in the local group of a device is received by the processor which is to perform steps 602, 603 and 604 of the method of figure 6. The processor accesses the currently stored identity list of local devices in the local group. The processor compares the two lists.
At step 602, the processor assesses if an identity on the stored list is not on the updated list.
If this is the case, then this is indicative of a local device having left the local group. If all the identities on the stored list are also on the updated list, then the method returns to step 601.
If an identity on the stored list is missing from the updated list, then the method proceeds to step 603.
At step 603, the processor assesses if an identity on the updated list is not on the stored list.
If this is the case, then this is indicative of a new device having entered the local group. If all the identities on the updated list are also on the stored list, then the method returns to step 601. If an identity on the updated list is missing from the stored list, then the method proceeds to step 604.
At step 604, the processor compares the device type of the local device whose identity is on the stored list but missing from the updated list with the device type of the new local device whose identity is on the updated list but missing from the stored list. If the device types are different, then the method returns to step 601. If the device types are the same, then it is determined that the new local device is a replacement device for the device that has left the local group. Thus, if the device types are the same, the method proceeds to step 605. At step 605 the configuration of the device that has left the local group is extracted from the configuration store and transmitted to the replacement device, where that configuration is applied to the replacement device.
The configuration applied to the replacement device at step 605 may be a configuration which configures the functionality of the appliance with which the device is associated. This type of configuration is described above. If the configuration applied at step 605 only configures the appliance, then the replacement device separately associates with the wireless network as normal using the mesh association protocol. For example, the replacement device may associate with the mesh network by exchanging its unique identity with a configuring device of the network such as the central network entity. This process is user initiated, for example by the user scanning a OR code on the replacement device. In response to exchanging its unique identity with the network, the configuring device of the network sends the network key(s) to the replacement device, thereby enabling it to communicate with the network fully according to the network communications protocol.
The configuration applied to the replacement device at step 605 may be a configuration which configures the wireless communications functionality of the device. This type of configuration is described above, lithe configuration applied at step 605 only configures the wireless communications operations of the device, then the appliance functionality of the replacement device is separately configured by the user. For example, the user may configure the appliance functionality through a user interface on the appliance.
The configuration applied to the replacement device at step 605 may both configure the functionality of the associated appliance and configure the wireless communications functionality of the device.
Suitably, the configuration that is applied to the replacement device automatically by the network on determining that the device is a replacement for an old device that has left the network depends on the device type. For example, if the device type is one deemed to be a low security risk, for example a light fitting, then the configuration that is applied to it automatically may be chosen to configure the operation of the appliance and the wireless communications operation of the device. If the device type is one deemed to be a medium security risk, for example a proximity sensor, then the configuration applied to it automatically maybe chosen to configure the operation of the appliance but not the wireless communications operation of the device, such that the device must still associate with the network in order to fully integrate with the network. lithe device type is one deemed to be a high security risk, for example a door alarm, then it may be deemed that no configuration is to be automatically applied by the network and it is to be manually configured instead.
Suitably, the security settings of the devices in the network, and the configurations to be automatically applied by the network on determining that a device has been replaced, are user-configurable. Standard security settings of devices in the network may be set during manufacture.
The method steps of figure 6 may be carried out solely at the central network entity. This may be the case if (i) the central network entity holds a central store of the configuration of the devices in the network, and (ii) the central network entity receives an updated list of the identities of the local devices in a device's local group. Alternatively, the method steps of figure 6 may be carried out solely at the device which receives the identifier messages from the local devices in its local group. This may be the case if the device stores the configurations of the local devices in its local group. Alternatively, the method steps of figure 6 may be carried out partially at the device which receives the identifier messages and partially at the central network entity. For example, the device which receives the identifier messages may determine that a device has been replaced by carrying out steps 601, 602, 603 and 604, but the central network entity extracts the configuration and applies it to the replacement device by carrying out step 605. Alternatively the steps of figure 6 may be carried out partially at the device which receives the identifier messages and partially in a distributed manner across the network. For example, the device which receives the identifier messages may determine that a device has been replaced by carrying out steps 601, 602, 603 and 604, but the configuration is extracted from one or more other devices across the network and applied to the replacement device by carrying out step 605. Alternatively, the method steps of figure 6 may be carried out partially at the central network entity and partially in a distributed manner across the network. For example, the central network entity may determine that a device has been replaced by carrying out steps 601, 602, 603 and 604, but the configuration is extracted from one or more other devices across the network and applied to the replacement device by carrying out step 605.
In the example of figure 6, the configuration of an old device that has left the local group is applied to a replacement device that has entered the local group with the same device type as the old device that left, if both the old device left the local group and the replacement device entered the local group since the last time the identity list was updated.
In a further example, the configuration of an old device that has left the local group is applied to a replacement device that has entered the local group with the same device type as the old device that left, even if the old device had already left the local group the last time the identity list was updated. In this example, the step 602 in figure 6 is not performed. A store of the identities of devices that have recently left the local group is maintained, along with their device types. If the new identity that is in the updated identity list but not the stored identity list has the same device type as any of the devices that are in the store of recently departed device identities, then the new identity is determined to belong to a replacement device for the recently departed device having the same device type. Suitably, there is a maximum elapsed time between a device leaving a local group and another device entering the local group in which the device that has entered it can be deemed to be a replacement for the device that has left. This maximum elapsed time could be applied, for example, by only storing the identities of departed devices for a set period of time. After this period of time, the identities of the departed devices are discarded.
The determination that a new device that has entered a local group is a replacement for an old device that has recently departed the local group in accordance with figure 6 and the further examples described above, may be taken based on the identifier messages received by a single device whose local group included the device that has departed and includes the new device. Alternatively, this determination may be made based on the identifier messages received at more than one device. In accordance with step 504 of figure 5, the central network entity receives reports from the devices in the network. Each report may list the identities of the local devices in the local group of the device that sent the report. Thus, the central network entity knows which devices are in the local group of each device. By collating the local group identities of each device in the network, the central network entity is able to determine the topology of the whole network. The central network entity may determine the local group of the departed device which has been reported as having left the local group of another device. The central network entity may determine this based on a report received from the departed device prior to its departure which lists the identities of the local devices in its local group. Alternatively, the central network entity may determine the local group of the departed device to include all the devices which have reported that the departed device is within their local group.
The central network entity may only determine that the new device is a replacement for the departed device if more than one device in the departed device's local group receives identifier messages which indicate that the departed device has been replaced by the new device having the same device type as the departed device.
The central network entity may only determine that the new device is a replacement for the departed device if a threshold number or a threshold proportion of the devices in the departed device's local group receive identifier messages which indicate that the departed device has been replaced by the new device having the same device type as the departed device.
The central network entity may only determine that the new device is a replacement for the departed device if all of the devices in the departed device's local group receive identifier messages which indicate that the departed device has been replaced by the new device having the same device type as the departed device.
By utilising the methods described herein, when devices in a mesh network are replaced with other devices, the mesh network can respond by configuring the replaced devices with the same configurations as the devices that they are replacing without the need for the network user to manually perform the configuration.
The operations described above for the baseband processor could be carried out by other devices. For example, there could be a dedicated processor for implementing the protocol described above, or some of the operations could be carried out by the baseband processor and some by another processing entity.
The mesh network may employ a wired communications protocol.
The applicant hereby discloses in isolation each individual feature described herein and any combination of two or more such features, to the extent that such features or combinations are capable of being carried out based on the present specification as a whole in the light of the common general knowledge of a person skilled in the art, irrespective of whether such features or combinations of features solve any problems disclosed herein, and without limitation to the scope of the claims. The applicant indicates that aspects of the present invention may consist of any such individual feature or combination of features. In view of the foregoing description it will be evident to a person skilled in the art that various modifications may be made within the scope of the invention.

Claims (13)

  1. CLAIMS1. A method of determining the topology ofa network, the network comprising a central network entity and a plurality of devices capable of operating according to a wireless communications protocol, each device communicating directly with one or more local devices of a local group, the local devices being those devices of the network with which the device is in direct communications range, the method comprising: at each device, from each local device, receiving an identifier message comprising an identity of the local device and an instruction not to retransmit the identifier message; at each device, reporting the identities of the local devices in the local group of that device to the central network entity; and at the central network entity, determining the topology of the network by collating the identities of the local devices in the local groups of each device.
  2. 2. A method as claimed in claim 1, wherein transport of messages through the network is provided by each device in the network listening for and retransmitting messages
  3. 3. A method as claimed in claim 1 or 2, further comprising, at each device: storing identities of the local devices of the local group of that device in a store; and updating the store with the received identities of the local devices of the local group.
  4. 4. A method as claimed in any preceding claim, wherein each local device transmits the identifier message in response to receiving a trigger message from the central network entity.
  5. 5. A method as claimed in claim 4, wherein the trigger message comprises an instruction to retransmit the trigger message.
  6. 6. A method as claimed in any of claims 1 to 3, wherein each local device transmits an identifier message in response to receiving a trigger message from the device.
  7. 7. A method as claimed in claim 6, wherein the trigger message comprises an instruction not to retransmit the trigger message.
  8. 8. A method as claimed in any of claims 4 to 7, wherein the trigger message and the identifier message are both transmitted in a low or no security mode such that a device which is not yet associated with the network can successfully receive the trigger message and transmit the identifier message.
  9. 9. A method as claimed in any preceding claim, wherein the identifier message comprises a lifetime field, the method comprising, at each local device, generating an identifier message and setting the lifetime field such that devices receiving the identifier message do not retransmit the identifier message.
  10. 10. A method as claimed in any preceding claim, wherein each device periodically reports the identities of the local devices in the local group of that device to the central network entity.
  11. ii. A method as claimed in any of claims ito 9, wherein each device reports the identities of the local devices in the local group of that device to the central network entity only if the identities of the local devices in the local group have changed since the device last reported the identities of the local devices in the local group to the central network entity.
  12. 12. A method as claimed in any preceding claim, wherein the network is a mesh network.
  13. 13. A method as claimed in any preceding claim, wherein the devices operate according to the Bluetooth Low Energy protocol.
GB1501075.4A 2014-02-25 2014-07-17 Determining the topology of a network Expired - Fee Related GB2518120B (en)

Applications Claiming Priority (9)

Application Number Priority Date Filing Date Title
GB1403314.6A GB2512733B (en) 2014-02-25 2014-02-25 Broadcast retransmission
GB1403312.0A GB2515853B (en) 2014-02-25 2014-02-25 Latency mitigation
GB1405791.3A GB2512748B (en) 2014-02-25 2014-03-31 Auto-configuration of a mesh relay's TX/RX schedule
GB1405785.5A GB2512501A (en) 2014-02-25 2014-03-31 Packet identification
GB1405790.5A GB2512747B (en) 2014-02-25 2014-03-31 Mesh relay
GB1405789.7A GB2512502B (en) 2014-02-25 2014-03-31 Device authentication
GB1405786.3A GB2512746B (en) 2014-02-25 2014-03-31 Thwarting traffic analysis
GB1405797.0A GB2512749B (en) 2014-02-25 2014-03-31 Linking ad hoc networks
GB1412722.9A GB2512781B (en) 2014-02-25 2014-07-17 Network configuration

Publications (3)

Publication Number Publication Date
GB201501075D0 GB201501075D0 (en) 2015-03-11
GB2518120A true GB2518120A (en) 2015-03-11
GB2518120B GB2518120B (en) 2015-09-30

Family

ID=50737759

Family Applications (18)

Application Number Title Priority Date Filing Date
GB1415178.1A Expired - Fee Related GB2517844B (en) 2014-02-25 2014-03-31 Thwarting traffic analysis
GB1415177.3A Expired - Fee Related GB2515923B8 (en) 2014-02-25 2014-03-31 Linking ad hoc networks
GB1405789.7A Expired - Fee Related GB2512502B (en) 2014-02-25 2014-03-31 Device authentication
GB1405791.3A Expired - Fee Related GB2512748B (en) 2014-02-25 2014-03-31 Auto-configuration of a mesh relay's TX/RX schedule
GB1405785.5A Withdrawn GB2512501A (en) 2014-02-25 2014-03-31 Packet identification
GB1405797.0A Expired - Fee Related GB2512749B (en) 2014-02-25 2014-03-31 Linking ad hoc networks
GB1405786.3A Expired - Fee Related GB2512746B (en) 2014-02-25 2014-03-31 Thwarting traffic analysis
GB1405790.5A Expired - Fee Related GB2512747B (en) 2014-02-25 2014-03-31 Mesh relay
GB1421698.0A Expired - Fee Related GB2523444B (en) 2014-02-25 2014-03-31 Device authentication
GB1412718.7A Expired - Fee Related GB2512544B (en) 2014-02-25 2014-07-17 Processing mesh communications
GB1412717.9A Expired - Fee Related GB2512543B (en) 2014-02-25 2014-07-17 Object tracking
GB1412714.6A Expired - Fee Related GB2512256B8 (en) 2014-02-25 2014-07-17 Mesh profiling
GB1412720.3A Expired - Fee Related GB2513048B (en) 2014-02-25 2014-07-17 Device proximity
GB1412719.5A Expired - Fee Related GB2512545B (en) 2014-02-25 2014-07-17 Update management
GB1412715.3A Expired - Fee Related GB2513265B (en) 2014-02-25 2014-07-17 Provisioning of security credentials
GB1412716.1A Expired - Fee Related GB2512542B (en) 2014-02-25 2014-07-17 Communicating data over a mesh network
GB1412722.9A Expired - Fee Related GB2512781B (en) 2014-02-25 2014-07-17 Network configuration
GB1501075.4A Expired - Fee Related GB2518120B (en) 2014-02-25 2014-07-17 Determining the topology of a network

Family Applications Before (17)

Application Number Title Priority Date Filing Date
GB1415178.1A Expired - Fee Related GB2517844B (en) 2014-02-25 2014-03-31 Thwarting traffic analysis
GB1415177.3A Expired - Fee Related GB2515923B8 (en) 2014-02-25 2014-03-31 Linking ad hoc networks
GB1405789.7A Expired - Fee Related GB2512502B (en) 2014-02-25 2014-03-31 Device authentication
GB1405791.3A Expired - Fee Related GB2512748B (en) 2014-02-25 2014-03-31 Auto-configuration of a mesh relay's TX/RX schedule
GB1405785.5A Withdrawn GB2512501A (en) 2014-02-25 2014-03-31 Packet identification
GB1405797.0A Expired - Fee Related GB2512749B (en) 2014-02-25 2014-03-31 Linking ad hoc networks
GB1405786.3A Expired - Fee Related GB2512746B (en) 2014-02-25 2014-03-31 Thwarting traffic analysis
GB1405790.5A Expired - Fee Related GB2512747B (en) 2014-02-25 2014-03-31 Mesh relay
GB1421698.0A Expired - Fee Related GB2523444B (en) 2014-02-25 2014-03-31 Device authentication
GB1412718.7A Expired - Fee Related GB2512544B (en) 2014-02-25 2014-07-17 Processing mesh communications
GB1412717.9A Expired - Fee Related GB2512543B (en) 2014-02-25 2014-07-17 Object tracking
GB1412714.6A Expired - Fee Related GB2512256B8 (en) 2014-02-25 2014-07-17 Mesh profiling
GB1412720.3A Expired - Fee Related GB2513048B (en) 2014-02-25 2014-07-17 Device proximity
GB1412719.5A Expired - Fee Related GB2512545B (en) 2014-02-25 2014-07-17 Update management
GB1412715.3A Expired - Fee Related GB2513265B (en) 2014-02-25 2014-07-17 Provisioning of security credentials
GB1412716.1A Expired - Fee Related GB2512542B (en) 2014-02-25 2014-07-17 Communicating data over a mesh network
GB1412722.9A Expired - Fee Related GB2512781B (en) 2014-02-25 2014-07-17 Network configuration

Country Status (3)

Country Link
US (14) US10055570B2 (en)
DE (13) DE102014012258A1 (en)
GB (18) GB2517844B (en)

Families Citing this family (129)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103974225B (en) * 2013-02-01 2018-03-13 财团法人工业技术研究院 Communication device, device-to-device communication system and wireless communication method thereof
US10078811B2 (en) 2013-11-29 2018-09-18 Fedex Corporate Services, Inc. Determining node location based on context data in a wireless node network
GB2515853B (en) 2014-02-25 2015-08-19 Cambridge Silicon Radio Ltd Latency mitigation
GB2517844B (en) 2014-02-25 2015-09-09 Cambridge Silicon Radio Ltd Thwarting traffic analysis
US9451462B2 (en) * 2014-08-10 2016-09-20 Belkin International Inc. Setup of multiple IoT network devices
US9918351B2 (en) 2014-04-01 2018-03-13 Belkin International Inc. Setup of multiple IOT networks devices
US10453023B2 (en) 2014-05-28 2019-10-22 Fedex Corporate Services, Inc. Methods and node apparatus for adaptive node communication within a wireless node network
US9386605B2 (en) * 2014-07-11 2016-07-05 Motorola Solutions, Inc. Mobile dynamic mesh cluster bridging method and apparatus at incident scenes
US9872240B2 (en) 2014-08-19 2018-01-16 Belkin International Inc. Network device source entity triggered device configuration setup
FR3026587A1 (en) * 2014-09-30 2016-04-01 Orange METHOD OF ACCESS BY A MASTER DEVICE TO A VALUE TAKEN BY A CHARACTERISTIC MANAGED BY A PERIPHERAL DEVICE
FR3031822B1 (en) * 2015-01-16 2018-04-13 Airbus Operations DOWNLOADING DATA ON REMOTE EQUIPMENT
US10681479B2 (en) 2015-01-30 2020-06-09 Cassia Networks Inc. Methods, devices and systems for bluetooth audio transmission
US9769594B2 (en) 2015-01-30 2017-09-19 Cassia Networks Inc. Methods, devices and systems for increasing wireless communication range
US11238397B2 (en) 2015-02-09 2022-02-01 Fedex Corporate Services, Inc. Methods, apparatus, and systems for generating a corrective pickup notification for a shipped item using a mobile master node
US9426616B1 (en) * 2015-02-10 2016-08-23 Tyco Fire & Security Gmbh Wireless sensor network controlled low energy link
FR3033118B1 (en) * 2015-02-19 2017-02-17 Sigfox METHOD AND SYSTEM FOR WIRELESS COMMUNICATION BETWEEN TERMINALS AND SEMI-DUPLEX BASE STATIONS
US10848485B2 (en) 2015-02-24 2020-11-24 Nelson Cicchitto Method and apparatus for a social network score system communicably connected to an ID-less and password-less authentication system
US11122034B2 (en) 2015-02-24 2021-09-14 Nelson A. Cicchitto Method and apparatus for an identity assurance score with ties to an ID-less and password-less authentication system
US11171941B2 (en) * 2015-02-24 2021-11-09 Nelson A. Cicchitto Mobile device enabled desktop tethered and tetherless authentication
CN107409433B (en) 2015-02-26 2020-09-15 瑞典爱立信有限公司 Energy efficient BLE mesh initialization and operation
JP6566669B2 (en) * 2015-03-12 2019-08-28 キヤノン株式会社 Information processing apparatus, control method thereof, communication method, and program
TWI552001B (en) * 2015-04-13 2016-10-01 聚眾聯合科技股份有限公司 Connection information sharing system, computer program, and connection information sharing method thereof
CN106304303B (en) * 2015-06-09 2019-11-12 沈阳中科奥维科技股份有限公司 A kind of power regulating method suitable for WIA-PA wireless network
US10375492B2 (en) 2015-06-30 2019-08-06 Sonova, AG Method of fitting a hearing assistance device
WO2017007409A1 (en) * 2015-07-06 2017-01-12 Telefonaktiebolaget Lm Ericsson (Publ) Apparatus and method for forwarding messages
US9985839B2 (en) 2015-07-08 2018-05-29 Fedex Corporate Services, Inc. Systems, apparatus, and methods of event monitoring for an event candidate within a wireless node network based upon sighting events, sporadic events, and benchmark checkpoint events
US9843929B2 (en) 2015-08-21 2017-12-12 Afero, Inc. Apparatus and method for sharing WiFi security data in an internet of things (IoT) system
US9503969B1 (en) 2015-08-25 2016-11-22 Afero, Inc. Apparatus and method for a dynamic scan interval for a wireless device
US20170094696A1 (en) * 2015-09-30 2017-03-30 Misfit, Inc. Methods and apparatuses for simulataneously exchanging messages between a low-energy radio device and multiple central devices
US10990616B2 (en) * 2015-11-17 2021-04-27 Nec Corporation Fast pattern discovery for log analytics
US10673646B1 (en) * 2018-12-09 2020-06-02 Olibra Llc System, device, and method of multi-path wireless communication
US10432461B2 (en) * 2015-12-04 2019-10-01 T-Mobile Usa, Inc. Peer-to-peer distribution of radio protocol data for software defined radio (SDR) updates
KR102381371B1 (en) * 2015-12-10 2022-03-31 삼성전자주식회사 System and method for providing information by using near field communication
US10805344B2 (en) * 2015-12-14 2020-10-13 Afero, Inc. Apparatus and method for obscuring wireless communication patterns
US10091242B2 (en) 2015-12-14 2018-10-02 Afero, Inc. System and method for establishing a secondary communication channel to control an internet of things (IOT) device
US10447784B2 (en) 2015-12-14 2019-10-15 Afero, Inc. Apparatus and method for modifying packet interval timing to identify a data transfer condition
US9992065B2 (en) * 2015-12-15 2018-06-05 T-Mobile Usa, Inc. Selective wi-fi calling router updates
US10659442B1 (en) * 2015-12-21 2020-05-19 Marvell International Ltd. Security in smart configuration for WLAN based IOT device
US20170187602A1 (en) * 2015-12-29 2017-06-29 Vivek Pathela System and method of troubleshooting network source inefficiency
US10708842B2 (en) * 2016-01-13 2020-07-07 Locus Control LLC Low power communications system
US10148453B2 (en) 2016-02-24 2018-12-04 Qualcomm Incorporated Using update slot to synchronize to Bluetooth LE isochronous channel and communicate state changes
EP3433809A4 (en) 2016-03-23 2019-10-02 Fedex Corporate Services, Inc. Systems, apparatus, and methods for self-adjusting a broadcast setting of a node in a wireless node network
GB2549735B (en) * 2016-04-26 2020-07-29 Checkit Ltd Network access control
US10644746B2 (en) 2016-04-29 2020-05-05 Texas Instruments Incorporated Pseudo channel hopping using scan dwell times in mesh networks without time synchronization
US10205606B2 (en) 2016-06-15 2019-02-12 Abl Ip Holding Llc Mesh over-the-air (OTA) luminaire firmware update
WO2018021877A1 (en) * 2016-07-28 2018-02-01 엘지전자(주) Method and apparatus for establishing connection to device
US10798548B2 (en) * 2016-08-22 2020-10-06 Lg Electronics Inc. Method for controlling device by using Bluetooth technology, and apparatus
EP3312762B1 (en) * 2016-10-18 2023-03-01 Axis AB Method and system for tracking an object in a defined area
US9781603B1 (en) * 2016-10-20 2017-10-03 Fortress Cyber Security, LLC Combined network and physical security appliance
US10348514B2 (en) * 2016-10-26 2019-07-09 Abl Ip Holding Llc Mesh over-the-air (OTA) driver update using site profile based multiple platform image
US11210678B2 (en) 2016-11-18 2021-12-28 Samsung Electronics Co., Ltd. Component for provisioning security data and product including the same
US10728026B2 (en) * 2016-11-24 2020-07-28 Samsung Electronics Co., Ltd. Data management method
DE102016124168A1 (en) * 2016-12-13 2018-06-14 Endress+Hauser Conducta Gmbh+Co. Kg Method for operating a specific field device via a mobile operating device
WO2018118822A1 (en) * 2016-12-20 2018-06-28 Abbott Diabetes Care Inc. Systems, devices and methods for wireless communications in analyte monitoring devices
CN106792853B (en) * 2016-12-22 2020-05-12 青岛亿联客信息技术有限公司 New equipment adding method for Bluetooth mesh network
CN106713047A (en) * 2017-01-12 2017-05-24 泰凌微电子(上海)有限公司 Node upgrading method and system in mesh network
US10433134B2 (en) 2017-01-24 2019-10-01 Arris Enterprises Llc Video gateway as an internet of things mesh enhancer apparatus and method
US11209787B2 (en) * 2017-02-21 2021-12-28 Omron Corporation Method and control device for controlling a field device
US10362612B2 (en) * 2017-03-06 2019-07-23 Citrix Systems, Inc. Virtual private networking based on peer-to-peer communication
EP3593509B1 (en) * 2017-03-08 2021-05-05 ABB Power Grids Switzerland AG Method and apparatuses for preserving relative timing and ordering of data packets in a network
DE102017106381A1 (en) 2017-03-24 2018-09-27 Newtec Gmbh Method and apparatus for wirelessly transmitting a data signal
CA3064460A1 (en) * 2017-04-10 2018-10-18 Itron Networked Solutions, Inc. Efficient internet-of-things device configuration via quick response codes
US10116523B1 (en) * 2017-04-12 2018-10-30 Fisher-Rosemount Systems, Inc. Predictive connectivity diagnostics for a wireless mesh network in a process control system
US11229023B2 (en) 2017-04-21 2022-01-18 Netgear, Inc. Secure communication in network access points
US10605609B2 (en) 2017-05-03 2020-03-31 Microsoft Technology Licensing, Llc Coupled interactive devices
DE102017207871A1 (en) * 2017-05-10 2018-11-15 Tridonic Gmbh & Co Kg Firmware Update-Over-The Air (FOTA) in building technology
CA3063105A1 (en) 2017-05-23 2018-11-29 Walmart Apollo, Llc Automated inspection system
US10389854B2 (en) * 2017-06-15 2019-08-20 Infinet, LLC Method and system for forming an ad-hoc network over heterogeneous protocols
US9955307B1 (en) * 2017-08-03 2018-04-24 Here Global B.V. Distributed relative positioning
CN110892741A (en) * 2017-08-15 2020-03-17 通用电气公司 Intelligent equipment, intelligent equipment using method and intelligent lamp
US10666624B2 (en) * 2017-08-23 2020-05-26 Qualcomm Incorporated Systems and methods for optimized network layer message processing
CN107635215A (en) * 2017-08-25 2018-01-26 西安电子科技大学 Mesh network-building methods based on low-power consumption bluetooth
US10951653B2 (en) 2017-09-22 2021-03-16 Samsung Electronics Co., Ltd. Apparatus including secure component and method of provisioning security information into the apparatus
CN107508714B (en) * 2017-09-26 2020-09-15 深圳市微智电子有限公司 Method and device for carrying out network configuration on Bluetooth equipment based on Bluetooth mesh
US11146395B2 (en) 2017-10-04 2021-10-12 Amir Keyvan Khandani Methods for secure authentication
CN109756324A (en) * 2017-11-02 2019-05-14 大唐移动通信设备有限公司 Cryptographic key negotiation method, terminal and gateway in a kind of Mesh network
WO2019098917A1 (en) * 2017-11-15 2019-05-23 Telefonaktiebolaget Lm Ericsson (Publ) End node, relay node, and methods performed therein for handling transmission of information
CN108064034A (en) * 2017-11-17 2018-05-22 芯海科技(深圳)股份有限公司 A kind of data collection network method of mesh networkings
EP3489922B1 (en) 2017-11-24 2022-01-05 Andreas Stihl AG & Co. KG Method of operating a wireless transmitter and a wireless receiver and system
EP3718352B1 (en) * 2017-11-28 2021-07-07 Telefonaktiebolaget LM Ericsson (publ) Message transmission with reduced interference
WO2019117763A1 (en) * 2017-12-11 2019-06-20 Telefonaktiebolaget Lm Ericsson (Publ) Channel scanning in a mesh network
US10554562B2 (en) * 2017-12-22 2020-02-04 International Business Machines Corporation Streaming network
RU2666306C1 (en) * 2017-12-27 2018-09-06 федеральное государственное автономное образовательное учреждение высшего образования "Санкт-Петербургский политехнический университет Петра Великого" (ФГАОУ ВО "СПбПУ") Method of controlling communication of single-range intercomputer data network
US10607012B2 (en) 2017-12-29 2020-03-31 Delphian Systems, LLC Bridge computing device control in local networks of interconnected devices
US10706179B2 (en) * 2018-01-10 2020-07-07 General Electric Company Secure provisioning of secrets into MPSoC devices using untrusted third-party systems
KR102530441B1 (en) 2018-01-29 2023-05-09 삼성전자주식회사 Electronic device, external electronic device, system comprising the same and control method thereof
US10944669B1 (en) 2018-02-09 2021-03-09 GoTenna, Inc. System and method for efficient network-wide broadcast in a multi-hop wireless network using packet echos
US11516682B2 (en) * 2018-03-16 2022-11-29 Telefonaktiebolaget Lm Ericsson (Publ) Methods and nodes for obtaining information regarding a bluetooth mesh network
US11448632B2 (en) 2018-03-19 2022-09-20 Walmart Apollo, Llc System and method for the determination of produce shelf life
US11658865B2 (en) * 2018-03-20 2023-05-23 Delphian Systems, LLC Updating devices in a local network of interconnected devices
EP3769482B1 (en) * 2018-03-23 2023-01-25 Telefonaktiebolaget LM Ericsson (publ) Message cache management in a mesh network
US10303147B1 (en) 2018-03-29 2019-05-28 Saudi Arabian Oil Company Distributed industrial facility safety system modular remote sensing devices
US10613505B2 (en) 2018-03-29 2020-04-07 Saudi Arabian Oil Company Intelligent distributed industrial facility safety system
US10311705B1 (en) * 2018-03-29 2019-06-04 Saudi Arabian Oil Company Distributed industrial facility safety system
US11018871B2 (en) * 2018-03-30 2021-05-25 Intel Corporation Key protection for computing platform
KR102114992B1 (en) * 2018-04-25 2020-05-25 (주)휴맥스 Wireless communication equipment and method for configuring mesh network thereof
US11308950B2 (en) 2018-05-09 2022-04-19 4PLAN Corporation Personal location system for virtual assistant
US11146540B2 (en) * 2018-05-09 2021-10-12 Datalogic Ip Tech S.R.L. Systems and methods for public key exchange employing a peer-to-peer protocol
CN110493758B (en) 2018-05-14 2023-01-13 阿里巴巴集团控股有限公司 Bluetooth Mesh network and network distribution method, equipment and storage medium thereof
CN110505606B (en) * 2018-05-18 2022-12-02 阿里巴巴集团控股有限公司 Bluetooth Mesh network and distribution network authentication method, equipment and storage medium thereof
US10574475B2 (en) * 2018-05-24 2020-02-25 Haier Us Appliance Solutions, Inc. Household appliance with bluetooth connection and authentication
WO2019237263A1 (en) * 2018-06-13 2019-12-19 卧槽科技(深圳)有限公司 Low-energy bluetooth network maintenance method, electronic device, bluetooth network, and medium
CN110636478B (en) 2018-06-22 2023-04-14 阿里巴巴集团控股有限公司 Bluetooth Mesh network system, communication method, device and storage medium thereof
US10650023B2 (en) * 2018-07-24 2020-05-12 Booz Allen Hamilton, Inc. Process for establishing trust between multiple autonomous systems for the purposes of command and control
US11393082B2 (en) 2018-07-26 2022-07-19 Walmart Apollo, Llc System and method for produce detection and classification
US11082324B2 (en) 2018-07-27 2021-08-03 goTenna Inc. Vine: zero-control routing using data packet inspection for wireless mesh networks
US11140659B2 (en) * 2018-08-21 2021-10-05 Signify Holding B.V. Wireless organization of electrical devices by sensor manipulation
US11368436B2 (en) * 2018-08-28 2022-06-21 Bae Systems Information And Electronic Systems Integration Inc. Communication protocol
US11715059B2 (en) * 2018-10-12 2023-08-01 Walmart Apollo, Llc Systems and methods for condition compliance
FI128520B (en) * 2018-11-14 2020-07-15 Xiphera Oy Method for providing a secret unique key for a volatile FPGA
WO2020106332A1 (en) 2018-11-20 2020-05-28 Walmart Apollo, Llc Systems and methods for assessing products
US11146919B2 (en) 2018-12-14 2021-10-12 Denso International America, Inc. System and method of determining real-time location
CN109673014B (en) * 2019-01-25 2022-07-15 欧普照明股份有限公司 Network combination method
CN109862548B (en) * 2019-03-06 2021-01-26 乐鑫信息科技(上海)股份有限公司 Method for processing data packets at a node in a bluetooth Mesh network
CN111669732B (en) * 2019-03-06 2021-09-07 乐鑫信息科技(上海)股份有限公司 Method for filtering redundant data packets at nodes in bluetooth Mesh network
US11777715B2 (en) 2019-05-15 2023-10-03 Amir Keyvan Khandani Method and apparatus for generating shared secrets
CN111988268A (en) * 2019-05-24 2020-11-24 魏文科 Method for establishing and verifying input value by using asymmetric encryption algorithm and application thereof
WO2021006456A1 (en) * 2019-07-05 2021-01-14 Samsung Electronics Co., Ltd. System and method for dynamic group data protection
CN110779500B (en) * 2019-11-14 2021-11-30 中国人民解放军国防科技大学 Mesoscale vortex detection method for incremental deployment sensor
KR102324374B1 (en) 2019-11-18 2021-11-11 한국전자통신연구원 Method and apparatus for configuring cluster in wireless communication system
US11245784B1 (en) * 2020-01-06 2022-02-08 Vorbeck Materials Corp. Self-organizing communications network nodes and systems
US11432167B2 (en) 2020-01-22 2022-08-30 Abl Ip Holding Llc Selective updating of nodes of a nodal wireless network
US20210273920A1 (en) * 2020-02-28 2021-09-02 Vmware, Inc. Secure certificate or key distribution for synchronous mobile device management (mdm) clients
US11166253B2 (en) * 2020-03-27 2021-11-02 Dell Products L.P. Data center automatic inventory and location data population and recovery using mesh network
EP3968600A1 (en) * 2020-09-11 2022-03-16 Volkswagen Ag Controlling a communication between a vehicle and a backend device
WO2022148695A1 (en) * 2021-01-06 2022-07-14 Signify Holding B.V. A method of, a node device and a system for relaying a message in a network comprising at least two mesh networks
US20230266960A1 (en) * 2022-02-24 2023-08-24 Whirlpool Corporation Systems and methods of offline over the air (ota) programming of appliances
CN115051921B (en) * 2022-05-27 2023-11-07 北京交通大学 Self-adaptive heterogeneous network attribute information collection method
US11870879B1 (en) * 2023-01-04 2024-01-09 Getac Technology Corporation Device communication during emergent conditions

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070280137A1 (en) * 2004-08-18 2007-12-06 Michael Bahr Creation Of Non-Wired Communication Network, By Determining Local Topology Information From The Identifiers Of Communication Appliances
GB2464125A (en) * 2008-10-04 2010-04-07 Ibm Topology discovery comprising partitioning network nodes into groups and using multiple discovery agents operating concurrently in each group.
US20120195231A1 (en) * 2011-01-28 2012-08-02 Francisco Jose Rojas Fonseca Dynamic name generation
US20140089912A1 (en) * 2012-09-21 2014-03-27 Silver Spring Networks, Inc. System and method for efficiently updating firmware for nodes in a mesh network

Family Cites Families (184)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6079034A (en) * 1997-12-05 2000-06-20 Hewlett-Packard Company Hub-embedded system for automated network fault detection and isolation
CA2349520C (en) * 1998-10-30 2011-05-17 Science Applications International Corporation An agile network protocol for secure communications with assured system availability
US6986046B1 (en) 2000-05-12 2006-01-10 Groove Networks, Incorporated Method and apparatus for managing secure collaborative transactions
US6836466B1 (en) * 2000-05-26 2004-12-28 Telcordia Technologies, Inc. Method and system for measuring IP performance metrics
US6745027B2 (en) 2000-12-22 2004-06-01 Seekernet Incorporated Class switched networks for tracking articles
US20030014507A1 (en) 2001-03-13 2003-01-16 International Business Machines Corporation Method and system for providing performance analysis for clusters
WO2002078272A1 (en) * 2001-03-23 2002-10-03 Kent Ridge Digital Labs A method and system for providing bridged mobile ad-hoc networks
US20030037237A1 (en) 2001-04-09 2003-02-20 Jean-Paul Abgrall Systems and methods for computer device authentication
DE10145596A1 (en) * 2001-09-15 2003-04-03 Philips Corp Intellectual Pty Network with several sub-networks
EP1436957B1 (en) 2001-10-17 2017-07-05 BRITISH TELECOMMUNICATIONS public limited company Network location management system
KR100408525B1 (en) * 2001-10-31 2003-12-06 삼성전자주식회사 System and method of network adaptive real- time multimedia streaming
US7391731B1 (en) 2002-03-07 2008-06-24 Ibasis, Inc. Method for determining best path
US6917974B1 (en) * 2002-01-03 2005-07-12 The United States Of America As Represented By The Secretary Of The Air Force Method and apparatus for preventing network traffic analysis
US7760645B2 (en) 2002-02-25 2010-07-20 Olsonet Communications Method for routing ad-hoc signals
US7532862B2 (en) 2002-03-19 2009-05-12 Apple Inc. Method and apparatus for configuring a wireless device through reverse advertising
US20030212821A1 (en) 2002-05-13 2003-11-13 Kiyon, Inc. System and method for routing packets in a wired or wireless network
US7251235B2 (en) 2002-06-12 2007-07-31 Conexant, Inc. Event-based multichannel direct link
US20040001483A1 (en) 2002-06-27 2004-01-01 Schmidt Kurt E. Distribution and reconstruction of AD-HOC timing signals
US7474874B2 (en) 2002-06-28 2009-01-06 Nokia Corporation Local browsing
US6898751B2 (en) * 2002-07-31 2005-05-24 Transdimension, Inc. Method and system for optimizing polling in systems using negative acknowledgement protocols
US7657748B2 (en) 2002-08-28 2010-02-02 Ntt Docomo, Inc. Certificate-based encryption and public key infrastructure
GB0313473D0 (en) 2003-06-11 2003-07-16 Koninkl Philips Electronics Nv Configuring a radio network for selective broadcast
KR100547133B1 (en) 2003-07-11 2006-01-26 삼성전자주식회사 Apparatus and method for constructing ad-hoc network of heterogeneous terminals
KR100640327B1 (en) * 2003-11-24 2006-10-30 삼성전자주식회사 The Frame Structure and Data Transmission Method for Bridge Operation of WPAN
US20050175184A1 (en) * 2004-02-11 2005-08-11 Phonex Broadband Corporation Method and apparatus for a per-packet encryption system
US7436790B2 (en) 2004-03-25 2008-10-14 Research In Motion Limited Wireless access point methods and apparatus for reduced power consumption and cost
WO2005117367A1 (en) 2004-05-31 2005-12-08 Matsushita Electric Industrial Co., Ltd. Mobile terminal managing device, mobile terminal, and communication system
US20060025180A1 (en) 2004-07-30 2006-02-02 Qualcomm Incorporated Method for waking a wireless device
WO2006020800A2 (en) 2004-08-10 2006-02-23 Meshnetworks, Inc. Software architecture and hardware abstraction layer for multi-radio routing and method for providing the same
US7747774B2 (en) * 2004-08-23 2010-06-29 At&T Intellectual Property I, L.P. Methods, systems and computer program products for obscuring traffic in a distributed system
WO2006071380A2 (en) 2004-11-12 2006-07-06 Pufco, Inc. Securely field configurable device
KR100594127B1 (en) * 2004-11-16 2006-06-28 삼성전자주식회사 Bonding process method and device in a Bluetooth device
US7496059B2 (en) * 2004-12-09 2009-02-24 Itt Manufacturing Enterprises, Inc. Energy-efficient medium access control protocol and system for sensor networks
US7533258B2 (en) 2005-01-07 2009-05-12 Cisco Technology, Inc. Using a network-service credential for access control
JP4550636B2 (en) * 2005-03-18 2010-09-22 富士通株式会社 Electronic device, its registration method and registration program
US7522540B1 (en) 2005-04-15 2009-04-21 Nvidia Corporation Extended service set mesh topology discovery
US8027289B2 (en) * 2005-04-27 2011-09-27 Raytheon Bbn Technologies Corp. Ultra-low latency packet transport in ad hoc networks
US7653011B2 (en) 2005-05-31 2010-01-26 Cisco Technology, Inc. Spanning tree protocol for wireless networks
US7894372B2 (en) 2005-05-31 2011-02-22 Iac Search & Media, Inc. Topology-centric resource management for large scale service clusters
US7606178B2 (en) 2005-05-31 2009-10-20 Cisco Technology, Inc. Multiple wireless spanning tree protocol for use in a wireless mesh network
KR20080025095A (en) 2005-06-01 2008-03-19 밀레니얼 넷, 인크. Communicating over a wireless network
US9654200B2 (en) 2005-07-18 2017-05-16 Mutualink, Inc. System and method for dynamic wireless aerial mesh network
CN103220748B (en) * 2005-07-21 2017-04-12 发尔泰公司 Method and system for enabling the efficient operation of arbitrarily interconnected mesh networks
US7787361B2 (en) 2005-07-29 2010-08-31 Cisco Technology, Inc. Hybrid distance vector protocol for wireless mesh networks
US8948805B2 (en) * 2005-08-26 2015-02-03 Qualcomm Incorporated Method and apparatus for reliable transmit power and timing control in wireless communication
US7778270B1 (en) 2005-08-31 2010-08-17 Hrl Laboratories, Llc Code-switching in wireless multi-hop networks
US7546139B2 (en) 2005-12-27 2009-06-09 F4W, Inc. System and method for establishing and maintaining communications across disparate networks
US20100005294A1 (en) * 2005-10-18 2010-01-07 Kari Kostiainen Security in Wireless Environments Using Out-Of-Band Channel Communication
JP4641245B2 (en) 2005-10-26 2011-03-02 三菱電機株式会社 Ad hoc network system, wireless ad hoc terminal and failure detection method thereof
US7978666B2 (en) 2005-10-31 2011-07-12 Robert Bosch Gmbh Node control in wireless sensor networks
US7539488B2 (en) 2005-11-09 2009-05-26 Texas Instruments Norway As Over-the-air download (OAD) methods and apparatus for use in facilitating application programming in wireless network devices of ad hoc wireless communication networks
US20070110024A1 (en) 2005-11-14 2007-05-17 Cisco Technology, Inc. System and method for spanning tree cross routes
US7593376B2 (en) 2005-12-07 2009-09-22 Motorola, Inc. Method and apparatus for broadcast in an ad hoc network using elected broadcast relay nodes
US20130219482A1 (en) 2006-01-31 2013-08-22 Sigma Designs, Inc. Method for uniquely addressing a group of network units in a sub-network
US7848261B2 (en) * 2006-02-17 2010-12-07 Isilon Systems, Inc. Systems and methods for providing a quiescing protocol
US8023478B2 (en) 2006-03-06 2011-09-20 Cisco Technology, Inc. System and method for securing mesh access points in a wireless mesh network, including rapid roaming
US7647078B2 (en) * 2006-03-07 2010-01-12 Samsung Electronics Co., Ltd. Power-saving method for wireless sensor network
US8340106B2 (en) * 2006-03-13 2012-12-25 Microsoft Corporation Connecting multi-hop mesh networks using MAC bridge
US8519566B2 (en) 2006-03-28 2013-08-27 Wireless Environment, Llc Remote switch sensing in lighting devices
US7786885B2 (en) 2006-04-25 2010-08-31 Hrl Laboratories, Llc Event localization within a distributed sensor array
US8681671B1 (en) * 2006-04-25 2014-03-25 Cisco Technology, Inc. System and method for reducing power used for radio transmission and reception
US8406794B2 (en) 2006-04-26 2013-03-26 Qualcomm Incorporated Methods and apparatuses of initiating communication in wireless networks
CN101083597A (en) 2006-05-31 2007-12-05 朗迅科技公司 SIP based instant message of mobile self-organizing network
DE102006036109B4 (en) 2006-06-01 2008-06-19 Nokia Siemens Networks Gmbh & Co.Kg Method and system for providing a mesh key
EP2041910A4 (en) * 2006-07-06 2013-05-22 Apple Inc Wireless access point security for multi-hop networks
FR2903830B1 (en) 2006-07-11 2008-08-22 Alcatel Sa METHOD AND DEVICE FOR MONITORING OPTICAL CONNECTION PATHS FOR A TRANSPARENT OPTICAL NETWORK
US8411651B2 (en) 2006-07-27 2013-04-02 Interdigital Technology Corporation Media independent multi-rat function in a converged device
EP1892913A1 (en) 2006-08-24 2008-02-27 Siemens Aktiengesellschaft Method and arrangement for providing a wireless mesh network
US8634342B2 (en) 2006-10-05 2014-01-21 Cisco Technology, Inc. Upgrading mesh access points in a wireless mesh network
US8270302B2 (en) 2006-10-20 2012-09-18 Stmicroelectronics, Inc. System and method for providing an adaptive value of TTL (time to live) for broadcast/multicast messages in a mesh network using a hybrid wireless mesh protocol
US8149748B2 (en) 2006-11-14 2012-04-03 Raytheon Company Wireless data networking
KR100879026B1 (en) 2006-12-05 2009-01-15 한국전자통신연구원 Method for grouping among sensor nodes in heterogeneous wireless sensor networks
US8838481B2 (en) 2011-07-26 2014-09-16 Golba Llc Method and system for location based hands-free payment
EP2095661B1 (en) 2006-12-19 2018-03-28 Telefonaktiebolaget LM Ericsson (publ) Handling of idle gap commands in a telecommunication sysytem
US9760146B2 (en) 2007-01-08 2017-09-12 Imagination Technologies Limited Conditional activation and deactivation of a microprocessor
US7787427B1 (en) 2007-01-09 2010-08-31 Dust Networks, Inc. Providing low average latency communication in wireless mesh networks
US20080205385A1 (en) 2007-02-26 2008-08-28 Motorola, Inc. Data frame formats to improve groupcast efficiency in multi-hop wireless networks
US8325627B2 (en) 2007-04-13 2012-12-04 Hart Communication Foundation Adaptive scheduling in a wireless network
US8406248B2 (en) 2007-04-13 2013-03-26 Hart Communication Foundation Priority-based scheduling and routing in a wireless network
US8451752B2 (en) 2007-05-21 2013-05-28 Arrowspan, Inc. Seamless handoff scheme for multi-radio wireless mesh network
US20080292105A1 (en) 2007-05-22 2008-11-27 Chieh-Yih Wan Lightweight key distribution and management method for sensor networks
BRPI0815065A2 (en) * 2007-08-01 2015-02-10 Philip Morris Products Sa DEGRADABLE CIGARETTE FILTERS
US8189506B2 (en) 2007-09-12 2012-05-29 Nokia Corporation Deep sleep mode for mesh points
KR101405688B1 (en) 2007-09-14 2014-06-12 엘지이노텍 주식회사 Zigbee system
US20090089408A1 (en) 2007-09-28 2009-04-02 Alcatel Lucent XML Router and method of XML Router Network Overlay Topology Creation
US7941663B2 (en) 2007-10-23 2011-05-10 Futurewei Technologies, Inc. Authentication of 6LoWPAN nodes using EAP-GPSK
US8918643B2 (en) 2007-11-16 2014-12-23 Fujitsu Ten Limited Authentication method, authentication system, in-vehicle device, and authentication apparatus
US9166934B2 (en) 2007-11-25 2015-10-20 Trilliant Networks, Inc. System and method for operating mesh devices in multi-tree overlapping mesh networks
US8289883B2 (en) 2007-12-21 2012-10-16 Samsung Electronics Co., Ltd. Hybrid multicast routing protocol for wireless mesh networks
US7929446B2 (en) 2008-01-04 2011-04-19 Radiient Technologies, Inc. Mesh networking for wireless communications
KR20090090461A (en) * 2008-02-21 2009-08-26 삼성전자주식회사 Method for prolonging lifetime of sensor nodes in a wireless sensor network and system therefor
JP4613969B2 (en) 2008-03-03 2011-01-19 ソニー株式会社 Communication apparatus and communication method
US8116247B2 (en) * 2008-03-11 2012-02-14 Nokia Siemens Networks Oy Adaptive mechanism for dynamic reconfiguration of mesh networks
US8923285B2 (en) 2008-04-30 2014-12-30 Qualcomm Incorporated Apparatus and methods for transmitting data over a wireless mesh network
EP2308259B1 (en) 2008-07-29 2017-12-06 Orange Routing adaptable to electromagnetic conditions in a multihop network
US8179845B2 (en) 2008-08-21 2012-05-15 Motorola Solutions, Inc. Antenna-aware method for transmitting packets in a wireless communication network
US8699377B2 (en) 2008-09-04 2014-04-15 Trilliant Networks, Inc. System and method for implementing mesh network communications using a mesh network protocol
WO2010036885A2 (en) 2008-09-25 2010-04-01 Fisher-Rosemount Systems, Inc. Wireless mesh network with pinch point and low battery alerts
US8782746B2 (en) 2008-10-17 2014-07-15 Comcast Cable Communications, Llc System and method for supporting multiple identities for a secure identity device
CA2743958C (en) * 2008-11-24 2016-11-08 Certicom Corp. System and method for hardware based security
US8294573B2 (en) 2008-12-11 2012-10-23 International Business Machines Corporation System and method for optimizing power consumption of container tracking devices through mesh networks
US8498229B2 (en) 2008-12-30 2013-07-30 Intel Corporation Reduced power state network processing
US8904177B2 (en) * 2009-01-27 2014-12-02 Sony Corporation Authentication for a multi-tier wireless home mesh network
US8254251B2 (en) 2009-02-03 2012-08-28 Mobix Wireless Solutions Ltd. Mesh hybrid communication network
US8964634B2 (en) 2009-02-06 2015-02-24 Sony Corporation Wireless home mesh network bridging adaptor
US9172612B2 (en) 2009-02-12 2015-10-27 Hewlett-Packard Development Company, L.P. Network device configuration management by physical location
EP2528279A3 (en) 2009-02-13 2013-03-27 Nokia Siemens Networks Oy Method, system and nodes for network topology detection in communication networks
US8194576B2 (en) 2009-03-27 2012-06-05 Research In Motion Limited Wireless access point methods and apparatus using dynamically-activated service intervals
US8171292B2 (en) 2009-04-08 2012-05-01 Research In Motion Limited Systems, devices, and methods for securely transmitting a security parameter to a computing device
US9069727B2 (en) * 2011-08-12 2015-06-30 Talari Networks Incorporated Adaptive private network with geographically redundant network control nodes
JP5721713B2 (en) * 2009-07-23 2015-05-20 ノキア コーポレイション Method and apparatus for reducing power consumption when operating as a Bluetooth Low Energy device
KR20110020005A (en) * 2009-08-21 2011-03-02 주식회사 팬택 Method for tranmitting and receiving data in wireless communication system
JP5338567B2 (en) * 2009-08-25 2013-11-13 沖電気工業株式会社 Wireless terminal and wireless system
US8879994B2 (en) 2009-10-02 2014-11-04 Blackberry Limited Methods and devices for facilitating Bluetooth pairing using a camera as a barcode scanner
EP2306692B1 (en) * 2009-10-02 2014-05-21 BlackBerry Limited Methods and devices for facilitating bluetooth pairing using a camera as a barcode scanner
US20150058409A1 (en) 2013-03-22 2015-02-26 Frank C. Wang Enhanced content delivery system and method spanning multiple data processing systems
US9215082B2 (en) 2009-10-06 2015-12-15 Thomson Licensing Method and apparatus for hop-by-hop reliable multicast in wireless networks
CN102045280B (en) 2009-10-26 2013-08-07 国基电子(上海)有限公司 Cable modem (CM) and certificate test method thereof
JP5544863B2 (en) 2009-12-17 2014-07-09 富士通株式会社 Reception device, reception method, and reception program
CN101729296B (en) 2009-12-29 2012-12-19 中兴通讯股份有限公司 Method and system for statistical analysis of ethernet traffic
KR101727130B1 (en) 2010-01-20 2017-04-14 인트린직 아이디 비브이 Device and method for obtaining a cryptographic key
US10645628B2 (en) 2010-03-04 2020-05-05 Rosemount Inc. Apparatus for interconnecting wireless networks separated by a barrier
US8495618B1 (en) 2010-03-31 2013-07-23 American Megatrends, Inc. Updating firmware in a high availability enabled computer system
US8516269B1 (en) 2010-07-28 2013-08-20 Sandia Corporation Hardware device to physical structure binding and authentication
US9173196B2 (en) 2010-10-07 2015-10-27 GM Global Technology Operations LLC Adaptive multi-channel access for vehicular networks
WO2012064178A1 (en) * 2010-11-11 2012-05-18 Mimos Berhad Method for use in providing an adaptable sensor nodes schedule in a wireless sensor network
RU2013128767A (en) 2010-11-25 2014-12-27 Конинклейке Филипс Электроникс Н.В. SYSTEM AND METHOD FOR OPTIMIZING DATA TRANSFER TO WIRELESS NETWORK NODES
US8873526B2 (en) 2010-12-17 2014-10-28 Cisco Technology, Inc. Collision avoidance for wireless networks
US20120163292A1 (en) 2010-12-23 2012-06-28 Nokia Corporation Frame Header in Wireless Communication System
US20120198434A1 (en) 2011-01-31 2012-08-02 Digi International Inc. Virtual bundling of remote device firmware upgrade
US8769525B2 (en) 2011-01-31 2014-07-01 Digi International Inc. Remote firmware upgrade device mapping
US20120196534A1 (en) 2011-02-01 2012-08-02 Nokia Corporation Method, apparatus, and computer program product for broadcasting in short-range communication
WO2012122994A1 (en) 2011-03-11 2012-09-20 Kreft Heinz Off-line transfer of electronic tokens between peer-devices
US9716659B2 (en) * 2011-03-23 2017-07-25 Hughes Network Systems, Llc System and method for providing improved quality of service over broadband networks
US9268545B2 (en) * 2011-03-31 2016-02-23 Intel Corporation Connecting mobile devices, internet-connected hosts, and cloud services
CN102761941B (en) 2011-04-28 2016-08-03 北京云天创科技有限公司 A kind of method utilizing ultra-low power consumption wireless smart sensor's network protocol transmission
US20130128809A1 (en) 2011-05-19 2013-05-23 Qualcomm Incorporated Apparatus and methods for media access control header compression
US8553536B2 (en) 2011-07-12 2013-10-08 General Electric Company Mesh network management system
CN102355351B (en) 2011-07-21 2014-11-05 华为技术有限公司 Key generation, backup and migration method and system based on trusted computing
US8849202B2 (en) 2011-08-19 2014-09-30 Apple Inc. Audio transfer using the Bluetooth Low Energy standard
US8982785B2 (en) 2011-09-08 2015-03-17 Cisco Technology, Inc. Access point assisted direct client discovery
US9445305B2 (en) 2011-09-12 2016-09-13 Microsoft Corporation Low energy beacon encoding
WO2013040438A1 (en) 2011-09-15 2013-03-21 Fisher-Rosemount Systems, Inc. Communicating data frames across communication networks that use incompatible network routing protocols
US8892866B2 (en) 2011-09-26 2014-11-18 Tor Anumana, Inc. Secure cloud storage and synchronization systems and methods
US8649883B2 (en) 2011-10-04 2014-02-11 Advanergy, Inc. Power distribution system and method
WO2013057666A1 (en) 2011-10-17 2013-04-25 Koninklijke Philips Electronics N.V. Automatic recommissioning of electronic devices in a networked system
US8654869B2 (en) 2011-10-27 2014-02-18 Cooper Technologies Company Multi-path radio transmission input/output devices, network, systems and methods with link suitability determination
US8953790B2 (en) 2011-11-21 2015-02-10 Broadcom Corporation Secure generation of a device root key in the field
US9936382B2 (en) * 2011-11-21 2018-04-03 Vital Connect, Inc. Method and system for pairing a sensor device to a user
US9191461B2 (en) 2012-02-21 2015-11-17 Entropic Communications, Inc. Software upgrade using layer-2 management entity messaging
US9270584B2 (en) * 2012-02-28 2016-02-23 Cisco Technology, Inc. Diverse paths using a single source route in computer networks
US9172636B2 (en) 2012-02-28 2015-10-27 Cisco Technology, Inc. Efficient link repair mechanism triggered by data traffic
US20130279409A1 (en) 2012-04-18 2013-10-24 Draker, Inc. Establishing a Mesh Network
US9629063B2 (en) 2012-05-09 2017-04-18 Trellisware Technologies, Inc. Method and system for global topology discovery in multi-hop ad hoc networks
US8844026B2 (en) 2012-06-01 2014-09-23 Blackberry Limited System and method for controlling access to secure resources
US20150195692A1 (en) 2012-06-26 2015-07-09 Nokia Corporation Method and apparatus for providing device ringtone coordination
US8751615B2 (en) 2012-07-18 2014-06-10 Accedian Networks Inc. Systems and methods of discovering and controlling devices without explicit addressing
JP5881047B2 (en) 2012-08-08 2016-03-09 株式会社日立製作所 Network management system, network management computer, and network management method
US10779212B2 (en) 2012-09-05 2020-09-15 Interdigital Patent Holdings, Inc. Methods for MAC frame extensibility and frame specific MAC header design for WLAN systems
US9208676B2 (en) 2013-03-14 2015-12-08 Google Inc. Devices, methods, and associated information processing for security in a smart-sensored home
US9279856B2 (en) 2012-10-22 2016-03-08 Infineon Technologies Ag Die, chip, method for driving a die or a chip and method for manufacturing a die or a chip
US9306660B2 (en) * 2012-10-22 2016-04-05 Qualcomm Technologies International, Ltd. Dynamic interactive zone driven proximity awareness system
CN102984798B (en) 2012-11-21 2016-02-03 越亮传奇科技股份有限公司 Position-based accurate positioning method
US20140167912A1 (en) 2012-12-17 2014-06-19 David M. Snyder System, method and apparatus for providing security systems integrated with solid state lighting systems
US20150351014A1 (en) 2012-12-19 2015-12-03 Lg Electronics Inc. Method for communicating in wireless communication system supporting multiple access network and apparatus supporting same
US9628373B2 (en) 2012-12-19 2017-04-18 Comcast Cable Communications, Llc Multipath communication in a network
US20140171062A1 (en) 2012-12-19 2014-06-19 Telefonaktiebolaget L M Ericsson (Publ) Wireless Devices, Network Node and Methods for Handling Relay Assistance in a Wireless Communications Network
US20140181172A1 (en) 2012-12-20 2014-06-26 Brent J. Elliott Offloading tethering-related communication processing
US9699768B2 (en) 2012-12-26 2017-07-04 Ict Research Llc Mobility extensions to industrial-strength wireless sensor networks
US9032480B2 (en) 2012-12-28 2015-05-12 Cellco Partnership Providing multiple APN connections support in a browser
US8938792B2 (en) 2012-12-28 2015-01-20 Intel Corporation Device authentication using a physically unclonable functions based key generation system
US9239723B2 (en) 2013-05-13 2016-01-19 Lenovo (Singapore) Pte. Ltd. Configuring a device based on proximity to other devices
US9264892B2 (en) 2013-07-03 2016-02-16 Verizon Patent And Licensing Inc. Method and apparatus for attack resistant mesh networks
US9983651B2 (en) 2013-07-15 2018-05-29 Google Technology Holdings LLC Low-power near-field communication authentication
US9386008B2 (en) 2013-08-19 2016-07-05 Smartguard, Llc Secure installation of encryption enabling software onto electronic devices
US20150071216A1 (en) 2013-09-09 2015-03-12 Qualcomm Connected Experiences, Inc. Allowing mass re-onboarding of headless devices
US9565576B2 (en) 2013-10-09 2017-02-07 At&T Intellectual Property I, L.P. Network operating system client architecture for mobile user equipment
US10591969B2 (en) 2013-10-25 2020-03-17 Google Technology Holdings LLC Sensor-based near-field communication authentication
US20150143130A1 (en) 2013-11-18 2015-05-21 Vixs Systems Inc. Integrated circuit provisioning using physical unclonable function
GB2512733B (en) 2014-02-25 2018-09-05 Qualcomm Technologies Int Ltd Broadcast retransmission
GB2515853B (en) 2014-02-25 2015-08-19 Cambridge Silicon Radio Ltd Latency mitigation
GB2517844B (en) 2014-02-25 2015-09-09 Cambridge Silicon Radio Ltd Thwarting traffic analysis
US9660836B2 (en) 2014-05-06 2017-05-23 Lattice Semiconductor Corporation Network topology discovery
US10142799B2 (en) * 2014-08-19 2018-11-27 Qualcomm Incorporated Multicasting traffic using multi-connectivity

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070280137A1 (en) * 2004-08-18 2007-12-06 Michael Bahr Creation Of Non-Wired Communication Network, By Determining Local Topology Information From The Identifiers Of Communication Appliances
GB2464125A (en) * 2008-10-04 2010-04-07 Ibm Topology discovery comprising partitioning network nodes into groups and using multiple discovery agents operating concurrently in each group.
US20120195231A1 (en) * 2011-01-28 2012-08-02 Francisco Jose Rojas Fonseca Dynamic name generation
US20140089912A1 (en) * 2012-09-21 2014-03-27 Silver Spring Networks, Inc. System and method for efficiently updating firmware for nodes in a mesh network

Also Published As

Publication number Publication date
GB201412719D0 (en) 2014-09-03
GB2515923A (en) 2015-01-07
GB2512746B (en) 2015-03-11
DE102014012257B4 (en) 2015-12-03
GB2512781A (en) 2014-10-08
DE102014019749B3 (en) 2017-08-31
GB201501075D0 (en) 2015-03-11
GB2515923A8 (en) 2015-06-17
GB2512748A (en) 2014-10-08
GB2512542A (en) 2014-10-01
DE102014012379B4 (en) 2016-05-12
DE102014012257A1 (en) 2015-08-27
GB201415178D0 (en) 2014-10-08
GB201412715D0 (en) 2014-09-03
GB2512749B (en) 2015-04-01
US20150244648A1 (en) 2015-08-27
DE102015101699A1 (en) 2015-08-27
GB2517844A (en) 2015-03-04
GB2512747A (en) 2014-10-08
DE102015101699B4 (en) 2019-12-24
GB2512256A (en) 2014-09-24
GB2515923B (en) 2015-06-03
GB2513048A (en) 2014-10-15
GB2512502B (en) 2015-03-11
DE102014012252A1 (en) 2015-08-27
GB2515923B8 (en) 2015-06-17
US20150245369A1 (en) 2015-08-27
GB2513265A (en) 2014-10-22
GB2512256B8 (en) 2015-07-01
GB2512749A (en) 2014-10-08
GB201405791D0 (en) 2014-05-14
GB201412718D0 (en) 2014-09-03
US20150245204A1 (en) 2015-08-27
GB2512545B (en) 2015-04-08
GB2512256A8 (en) 2015-07-01
US10055570B2 (en) 2018-08-21
GB201421698D0 (en) 2015-01-21
GB201405786D0 (en) 2014-05-14
GB2512748B (en) 2015-02-18
US20150245179A1 (en) 2015-08-27
US9489506B2 (en) 2016-11-08
GB2512501A (en) 2014-10-01
GB2512747B (en) 2015-04-01
GB2512781B (en) 2015-08-05
US20150242614A1 (en) 2015-08-27
DE102014012379A1 (en) 2015-08-27
GB201405790D0 (en) 2014-05-14
DE102015101698A1 (en) 2015-08-27
GB2517844B (en) 2015-09-09
GB2512545A (en) 2014-10-01
US20150244828A1 (en) 2015-08-27
US20150244565A1 (en) 2015-08-27
DE102014012517B4 (en) 2017-03-02
US20150245182A1 (en) 2015-08-27
DE102014013471A1 (en) 2015-08-27
GB201412717D0 (en) 2014-09-03
GB2512544B (en) 2016-08-17
GB201412714D0 (en) 2014-09-03
DE102015101620A1 (en) 2015-08-27
GB2512256B (en) 2015-04-15
DE102014012517A1 (en) 2015-08-27
GB2523444A (en) 2015-08-26
US20150245220A1 (en) 2015-08-27
US20150244623A1 (en) 2015-08-27
GB201412722D0 (en) 2014-09-03
GB201405789D0 (en) 2014-05-14
US20150245203A1 (en) 2015-08-27
DE102014012258A1 (en) 2015-08-27
GB2512544A (en) 2014-10-01
US20150245231A1 (en) 2015-08-27
US9754096B2 (en) 2017-09-05
GB2512543A (en) 2014-10-01
GB2513265B (en) 2016-10-26
US9910976B2 (en) 2018-03-06
DE102015101604A1 (en) 2015-08-27
US20150245296A1 (en) 2015-08-27
GB2512542B (en) 2015-02-25
GB201405785D0 (en) 2014-05-14
GB2512543B (en) 2015-02-11
GB201415177D0 (en) 2014-10-08
GB2523444B (en) 2016-05-18
GB201412716D0 (en) 2014-09-03
GB201405797D0 (en) 2014-05-14
GB201412720D0 (en) 2014-09-03
GB2512502A (en) 2014-10-01
GB2518120B (en) 2015-09-30
GB2513048B (en) 2015-08-26
DE102015101697A1 (en) 2015-08-27
US9842202B2 (en) 2017-12-12
GB2512746A (en) 2014-10-08
US9672346B2 (en) 2017-06-06
US20150245412A1 (en) 2015-08-27
DE102014012518A1 (en) 2015-08-27

Similar Documents

Publication Publication Date Title
US20150244565A1 (en) Network configuration
RU2742327C1 (en) Infrastructure network
US9819638B2 (en) Alarm profile for a fabric network
US20150245351A1 (en) Communicating data over a mesh network
KR102107201B1 (en) Efficient communication for devices of a home network
CN110460977B (en) Intelligent lighting equipment network distribution method based on Bluetooth MESH
CN105766016B (en) Method and apparatus for inter-profile debugging in a network
CN103713608A (en) Hierarchical network architecture of wireless Internet-of-Things home system and networking communication method thereof
JP6045580B2 (en) How to configure a node
US10405164B2 (en) Transmission mode selection of a zigbee green power device
CN101682476A (en) Wireless network communications system
US20220232449A1 (en) Method of Waking up a Mesh Node in a Wireless Mesh Network as Well as a Related Mesh Node and a Computer Program Product
GB2519698A (en) Communicating data over a mesh network
Westö et al. The Internet of things: An overview of enabling technologies for

Legal Events

Date Code Title Description
PCNP Patent ceased through non-payment of renewal fee

Effective date: 20200717