TW201006182A - Mesh network configured to autonomously commission a network and manage the network topology - Google Patents

Mesh network configured to autonomously commission a network and manage the network topology Download PDF

Info

Publication number
TW201006182A
TW201006182A TW098112416A TW98112416A TW201006182A TW 201006182 A TW201006182 A TW 201006182A TW 098112416 A TW098112416 A TW 098112416A TW 98112416 A TW98112416 A TW 98112416A TW 201006182 A TW201006182 A TW 201006182A
Authority
TW
Taiwan
Prior art keywords
mesh point
mesh
point
network
level
Prior art date
Application number
TW098112416A
Other languages
Chinese (zh)
Inventor
Ulises Olvera-Hernandez
Original Assignee
Interdigital Tech Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Interdigital Tech Corp filed Critical Interdigital Tech Corp
Publication of TW201006182A publication Critical patent/TW201006182A/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks
    • H04W84/20Master-slave selection or change arrangements

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

In a wireless communication system, a method for commissioning and managing communication between a plurality of mesh points (MPs) comprises a first MP broadcasting a signal to a second MP to establish communication with the second MP. The second MP transmits a response signal to the first MP. The first MP authenticates the second MP and determines a master MP, and the first MP establishes the communication with the second MP.

Description

201006182 六、發明說明·· 【發明所屬之技術領域】 本發明與一種無線通訊系統有關。更特別的,本發明 與一種用來獨立委任網路及管理網路拓撲的網狀網路有 關0 【先前技術】 網狀無線區域網路("WLAN mesh) —般是一種以正EE 802 11 為基礎的無線分散系統(WDS),其為一分散系統(DS)的部分, ❹而該分散系統包括兩個或多個透過正EE 802.11鏈結互連並透過 該網狀無線區域網路服務所通訊的網狀點。網狀無線區域網路可 以支援種已知為網狀入口的入口點、自動化拓撲學習以及動態 路徑選擇。 無線區域網路形式上是一種隨意網路,一般上只包括位於读 過無線媒體(WM)彼此相互通訊範圍中的站 意 '路—般上以-種自發性方式建立。隨意網路的主要辨麟 受限的時間與空間擴展性。這些限制使其能夠有效率地直接建立 ©及解散該隨意網路,並不需特別技術便能促進網路使用者的方便 隨意網路也時常包含一獨立基本服務套組(職),因為獨立 基本服務套組包括—組麟直接 正EE 802.11區域網路开η 一加,雨哪口再火,〇e種 、工叙上不南要預先規劃,而只有在該區 :料二形成。然而’這種隨意網路的一種明顯缺點是雖然 屬於該網路的站台可以彼此 包至相同網路巾的錄心=溢祕或再次女排封 、 σ因此,如果該傳送站台並未連接至 201006182 該目標站台,便需要建立一種新的直接連接,以傳送 一 ===圖顯示這種先前撕的無線通訊系統d: 技術中的無線通訊系,統10包含複數個站台^、2與 ^^ 台2及站台3進行無線通訊。站台2及站台3可以與站^ ^站 但無法以刪除破碎線所指出方式而透過站台!彼此遞送^ 由成員與網狀點兩者所形成的網狀網路,則藉由拽網 點:Γ具有安排與遞送的能力,而試圖消除隨意網 ^題。㈣效地允許_其他成員而在_路 t然而’此功能必須遵守其他不危害網路效能的雜與安全需 目前僅存在有限的方式能夠實作網狀魏。這些方式面臨許 多挑戰,包錢力絲_蝴、隱雜射 盘 多路徑多跳躍路由'自我配置與公平的帶寬分佈,以及=限 制0 故些現存_狀網賴根翻路管_ _在朗與管理網 7作的針式設備上操作,以消除某侧題。據此,目前的網 狀網路發展需要配置網路拓撲的複雜管理步驟,包含無線存取 =、、網狀人口與錯辭理的發現與視覺化。這些網路的動態特性 造成追求這觀能是困_不實際的,因為根_路管理的解決 方式是,慢的,並需要來自操作者的複雜手動操作。 &像是動態路由或_頻率獅_時要求應用,便無法依賴 可月t«過f的拓撲I:訊。像是軍事朗策略的高度移動性應用,於 ,’周狀^員快速地離開或加人該晴時,便需要快速的反應拓撲管 理田該網路成長時,便對該需求網路以及甚至是根據改變環境 201006182 可能 特徵的快速網狀點調遣增加新的負擔需农 需要被重新安排網狀點以支援對特定路由所|巾〜種範例為 因此如果存在一種不受到弈 曰加的訊務要求。 系統是有利的。 技術所限制的方法與 【發明内容】 統該中之間 ❹ 第一網狀點認註該第二網狀點^二第一網狀點。該 一網狀點與該第二網狀點建i通額^ 網狀點,且該第 【實施方式】 無線(STA) ”包含但不偈限為—種使用者配備、 或=====定式或移動式用户單元'呼叫器、 ❹ ~ C:::: 侷限為節點3、位晋㈣哭糞a” ⑽))包含但不 介面裝置。 置控制器、基站或是任何在無線環境中的其他 包括可以整合於集成電路(IC)之中,或是安裝於 括許夕互連成員的電路之中。 線通據本發_置的無線通訊系統1〇〇°該無 訊。住音包含複數個網狀點110 ,其可以彼此進行無線通 、H分广數量的站台(未顯示)也可以連接至該網狀點no,以透 κ線通訊系统1〇〇的網狀點no彼此通訊。 5 201006182 ,,=®顯示根據本發明的兩網狀點(以網狀點11〇,與網狀點 u〇私不)塊狀圖’其用於在一無線通訊系統中獨立委任網路及 管理網路域。為了示範的目的,該網狀點110,與網狀點110”本 質上是相同的單元。 . . 除了包含在典型網狀點的列名成員以外,該網狀點110,也包 '含用以獨立委任網路及管理網路拓撲的處理器115、與該處理器 115通汛的接收器、與該處理器通訊的傳輸器117、與該 處理器115通訊的記憶體119,以及與該接收器116及傳輸器117 ❹通訊’以促進從該網狀點110,接收資料並傳送資料至該網狀點ιι〇, 的天線118。 除了包含在典型網狀點的列名成員以外,該網狀點11〇”也包 含用以獨立委任網路及管理網路拓撲的處理器125、與該處理器 125通訊的接收器126、與該處理器125通訊的傳輸器127、與該 處理器125通訊的記憶體129 ’以及與該接收器126及傳輸器127 通訊’以促進從該網狀點110”接收資料並傳送資料至該網狀點 110”的天線128。 © 第4圖顯示在網狀網路的形成與管理期間,根據本發明介於 該網狀點110’與網狀點110”之間的信號圖示。在本發明的一較佳 實施例中,該網狀點11〇,的處理器115透過該傳輸器117與該天 線118廣播信號請求(410)至該網狀點no”,以嘗試建立介於彼 此之間的無線鏈結。該網狀點110,,的接收器126透過該天線128 接收來自該網狀點110’的信號,並將其遞送至該處理器〗25。該處 理器125便從包含與該網狀點11〇”相關憑證資訊的該記憶體129 取得資料。 6 201006182 該網狀㈣〇,,的處理器125接著透過該傳輸器i27與該天線 128 ’傳达包含該驗資料的回應(42())至該峨點⑽。該網狀 點11二”的接收器116透過該天線118接收回應,並將其遞送至該 處理器115。該處理器115從該記憶體119取得用於該網狀點⑽, '的憑證資訊’並與來自該網狀點⑽’’回應中所接收的憑證資訊進 '行比較。該處理11 115接著決定該網狀點110,或該網狀‘點110”何 者應該成為主網狀點,並透過該傳輸器117與該天線ιΐ8,將一認 註信號(430)傳輸回到該網狀點11〇”。該認註信號包含在細路 〇中何者網狀點m⑽,或⑽”)應該成為主網狀點的相關資訊。 該’祠狀點11G與網狀點11〇”現在便組成—種網狀網路。特別的, f兩個網狀點〇1(),及_,,)現在可以在發展的網狀網路中形成 一種區域’其中驅域是域數個輸點11G所域,其將-網 狀點110指明為在該區域中剩餘網狀點11〇的主網狀點。據此, 該網狀網路可以包含複數個區域。 在種決定何者網狀點110應該成為該區域主網狀點的替代 方法中’該網狀點110’的處理器出可以在廣播信號請求(410) =建立無線鏈結之前’取得有關該網狀點陳的憑證資訊。據此, W該網狀點110”的處理器125從該網狀點11〇,接收該信號請求 時該處理器可以比較從該網狀點11〇,所接收的憑證以及儲存在 該網狀點110,的記憶體129中的憑證資訊。該網狀點11〇,,接著可 以在其回應中將該資訊傳輸回到該網狀點〗1〇,其包含該認註資訊 以及何者網狀點110(110,或110,,)應該成為該區域中主網狀點的 相關資訊。何者網狀點應該成為該區域主網狀點的決定可以由該 網狀點110的處理器115實作,並發送至該網狀點11〇”,或是由 201006182 該網狀點110”的處理器125實作,並發送至該網狀點11〇,。 再次參考第4圖,為了範例的目的,將具有上位憑證的網狀 點110’指明為主網狀點。一額外的網狀點11〇,”(其本質上與網狀 點110’及網狀點110”的結構相同)廣播一請求(44〇)至網狀點 110’,以連接在網狀點110,及網狀點11〇,,之間所建立的該網狀網 t該主網狀點11G,接收該請求,並將具有與網狀點⑽,相關憑 證資訊的回應(45G)傳輸至該峨點11G,,,。該網狀點11〇”,接收201006182 VI. Description of the Invention · Technical Field of the Invention The present invention relates to a wireless communication system. More specifically, the present invention relates to a mesh network for independently appointing a network and managing a network topology. [Prior Art] A WLAN mesh is generally a positive EE 802. 11-based wireless decentralized system (WDS), which is part of a decentralized system (DS), which includes two or more interconnected and interconnected wireless ARE networks through a positive EE 802.11 link The network point of service communication. Mesh wireless local area networks support entry points known as mesh portals, automated topology learning, and dynamic path selection. The wireless local area network is in the form of a random network, which generally only includes the station that is located in the communication range between the wireless media (WM) and the like. The main distinction between random networks is limited time and space scalability. These restrictions make it possible to efficiently create and dissipate the casual network efficiently, without the need for special technology to facilitate the convenience of Internet users. It also often includes an independent basic service set (job) because of independence. The basic service package includes - group Lin directly EE 802.11 regional network to open η one plus, rain which re-fire, 〇e species, work in the south is not planned in advance, but only in the area: material two formed. However, an obvious disadvantage of this kind of random network is that although the stations belonging to the network can wrap each other to the same network towel's recording heart = overflow secret or again women's row seal, σ therefore, if the transfer station is not connected to 201006182 The target station needs to establish a new direct connection to transmit a === picture showing the previously torn wireless communication system d: the wireless communication system in the technology, the system 10 includes a plurality of stations ^, 2 and ^^ Station 2 and station 3 perform wireless communication. Station 2 and Station 3 can be connected to the station ^ ^ station but can not pass the station in the way indicated by the broken line! Delivering to each other ^ The mesh network formed by both the members and the mesh points attempts to eliminate the random network by means of the network: the ability to arrange and deliver. (4) Effectiveness allows _ other members to be in the _ road t However, this function must comply with other miscellaneous and security requirements that do not harm the network performance. There are only limited ways to implement the mesh. These methods face many challenges, including Qian Lisi _ butterfly, hidden hybrid multi-path multi-hop routing 'self-configuration and fair bandwidth distribution, and = limit 0, so the existing _ _ _ _ _ _ _ _ _ lang Operate on the needle device with the management network 7 to eliminate some side problems. Accordingly, the current development of mesh networks requires complex management steps to configure network topologies, including wireless access =, network population and erroneous discovery and visualization. The dynamic nature of these networks makes it difficult to pursue this view—not practical, because the root-path management solution is slow and requires complex manual operations from the operator. & like dynamic routing or _ frequency lion _ requires application, you can not rely on the topology of the month t «over f: I. For example, the highly mobile application of the military tactics, when the squad quickly leaves or adds the qing, it needs a quick response topology to manage the network growth, then the demand network and even It is based on the rapid network point assignment that changes the environment 201006182. It is necessary to re-arrange the mesh point to support the specific route. Claim. The system is advantageous. The method and the method limited by the technology [the invention] Between the system ❹ the first mesh point recognizes the second mesh point ^ two first mesh points. The mesh point and the second mesh point are formed by the net mesh point, and the first embodiment includes: but not limited to, a user equipment, or ==== = Fixed or mobile subscriber unit 'Caller, ❹ ~ C:::: Limited to node 3, bit Jin (four) cry dung a" (10))) Contains but does not interface device. The controller, base station, or any other device in the wireless environment can be integrated into an integrated circuit (IC) or installed in a circuit that includes a member of the interconnected circuit. The line is connected to the wireless communication system according to the present invention. The live sound includes a plurality of mesh points 110, which can be wirelessly connected to each other, and a number of stations (not shown) can also be connected to the mesh point no to penetrate the mesh point of the κ line communication system 1〇〇. No communicate with each other. 5 201006182 ,,=® shows a two-mesh point (in the form of a mesh point 11〇, which is private to the mesh point) according to the present invention, which is used for independently appointing a network in a wireless communication system and Manage your network domain. For exemplary purposes, the mesh point 110 is essentially the same unit as the mesh point 110". . . . In addition to the column name members included in a typical mesh point, the mesh point 110 is also included a processor 115 that independently authorizes the network and manages the network topology, a receiver that is in communication with the processor 115, a transmitter 117 that communicates with the processor, a memory 119 that communicates with the processor 115, and The receiver 116 and the transmitter 117 are "communicating" to facilitate receiving the data from the mesh point 110, and transmitting the data to the antenna 118 of the mesh point. In addition to the column name members included in the typical mesh point, the The mesh point 11" also includes a processor 125 for independently appointing a network and managing a network topology, a receiver 126 in communication with the processor 125, a transmitter 127 in communication with the processor 125, and a processor 125 communication memory 129' and communication with the receiver 126 and transmitter 127 to facilitate receiving data from the mesh point 110" and transmitting data to the antenna 128 of the mesh point 110". © Fig. 4 shows a signal representation between the mesh point 110' and the mesh point 110" during formation and management of the mesh network in accordance with the present invention. In a preferred embodiment of the invention The processor 115 transmits a signal request (410) to the antenna point no" through the transmitter 117 and the antenna 118 to attempt to establish a wireless link between each other. The receiver 126 of the mesh point 110 receives the signal from the mesh point 110' through the antenna 128 and delivers it to the processor 25. The processor 125 retrieves data from the memory 129 containing the credential information associated with the mesh point. 6 201006182 The processor (125) of the mesh (4), then passes through the transmitter i27 and the antenna 128' A response (42()) containing the test data is communicated to the defect (10). The receiver 116 of the mesh point 11" receives the response through the antenna 118 and delivers it to the processor 115. The processor 115 retrieves the voucher information for the mesh point (10), 'from the memory 119' and compares it with the voucher information received from the mesh point (10)'' response. The process 11 115 then determines whether the mesh point 110, or the mesh 'point 110' should be the primary mesh point, and transmits an annotation signal (430) back through the transmitter 117 and the antenna ι8. The mesh point is 11". The comment signal is included in the fine path, which mesh point m(10), or (10)") should be related information of the main mesh point. The '祠11G and the mesh point 11〇" now form a mesh network. In particular, f two mesh points 〇 1 (), and _,,) can now form a region in the development of the mesh network, where the domain is a domain of several points 11G domain, its The point 110 is indicated as the main mesh point of the remaining mesh point 11〇 in the area. Accordingly, the mesh network can include a plurality of regions. In an alternative method of determining which mesh point 110 should be the primary mesh point of the region, the processor of the mesh point 110 can obtain the relevant network before the broadcast signal request (410) = establish a wireless link. The credential information of the point Chen. According to this, the processor 125 of the mesh point 110" receives the signal request from the mesh point 11, and the processor can compare the received certificate from the mesh point 11 and store the network in the mesh. Point 110, the credential information in the memory 129. The mesh point 11〇, then the information can be transmitted back to the mesh point 〇1〇 in its response, which contains the comment information and which mesh Point 110 (110, or 110,,) should be the relevant information of the main mesh point in the area. The decision of which mesh point should become the main mesh point of the area can be implemented by the processor 115 of the mesh point 110. And sent to the mesh point 11〇”, or by the processor 125 of the 201006182 mesh point 110”, and sent to the mesh point 11〇. Referring again to FIG. 4, for the purpose of example , the mesh point 110' having the upper voucher is indicated as the main mesh point. An additional mesh point 11〇, "(which is essentially the same as the mesh point 110' and the mesh point 110") broadcast one Request (44〇) to the mesh point 110' to connect between the mesh point 110, and the mesh point 11〇, The mesh network 11 is established to receive the request, and transmits a response (45G) with the network point (10) and related credential information to the defect 11G, the mesh point 11 〇", receiving

❹ 來自該網狀點11G’的回應’並將該網狀點11G’的憑證與該網狀點 110”,的憑證進行比較,以決定網狀點11〇,是否應該持;^為該網 狀網路社峨點,或是綱狀點11G,,,應該具#主導性。該網狀 點110’”傳輸一認証信號(460),其包含在該網路中何者網狀點11〇 (110’或110’’’)應該成為主網狀點。該網狀點11〇,、網狀點⑽” 與網狀點110’”現在便組成該網狀網路。 闺頫不柢艨本發明的一種委任網狀網路的方法5⑻。在 驟510中,該第一網狀點n〇,廣播一信號至該第二網狀點⑽,, 以與該第二網狀點11G,,連接。該第二網狀點⑽,,接收來自該第 網狀點110,的信號,並傳輸-回應至該第—網狀點⑽.,,=包 該第二網狀點110”的認証與憑證資料(步驟520)。該第一網狀 U0接收具有該認証與憑證資料的傳輸信號, 性的方法(步驟530)。 对作種決疋主 第5B圖顯示根據本發明決定主導性的方法5〇5。在步驟& 峨㈣〇,認誠第二植點⑽,,。該第—網狀點η =碡由確定認証參數的基本配置,認賴第二網狀點ιι〇”, 數則像是定義該第二峨點11G,,可信概,以成為—種特和 201006182 作裝置或了種普通設備的秘鑰秘密性關聯。 一旦該第一網狀點110’已經認証該第二網狀點11〇,,, 一 狀點11G”的憑證,以蚁何者網ί點 上ηυ或Ιΐϋ )應該成為該網狀網路1〇〇的主網狀點( 憑證程度,以及與郷證程度有關的 關連貝訊像疋程度扣疋、,,能力,,與,,網狀成員„。 Ο回应 The response from the mesh point 11G' and compare the voucher of the mesh point 11G' with the voucher of the mesh point 110" to determine whether the mesh point 11〇 should be held; The network network point, or the outline point 11G, should have # dominant. The network point 110' transmits an authentication signal (460), which contains the network point 11 in the network. (110' or 110''') should be the main mesh point. The mesh point 11〇, the mesh point (10)" and the mesh point 110'" now form the mesh network. A method 5 (8) of appointing a mesh network of the present invention. In step 510, the first mesh point n〇 broadcasts a signal to the second mesh point (10) to be connected to the second mesh point 11G. The second mesh point (10) receives the signal from the first mesh point 110 and transmits-responds to the first mesh point (10)., = the packet of the second mesh point 110" authentication and credentials Data (step 520). The first mesh U0 receives a method of transmitting the authenticity of the authentication and credential data (step 530). Figure 5B shows a method for determining the dominantness according to the present invention. 〇 5. In the step & 峨 (4) 〇, the second planting point (10), the first mesh point η = 碡 by determining the basic configuration of the authentication parameters, relying on the second mesh point ιι〇", the number Then, the definition of the second point 11G, the credibility is defined, so as to become the secret key association of the device and the 201006182 device or a common device. Once the first mesh point 110' has authenticated the second mesh point 11〇, the voucher of a point 11G”, the nt or the network of the ant network ί should be the mesh network 1〇 The main network point of the ( (the degree of vouchers, and the degree of 贝 疋 , , , , , , , , , , , , , , , , , , , , , , , ,

_能力 封包遞送 認言正— 封包遞送 路由能力 認言正(客戶端) 封包遞送 路由能力 認註(客戶端/飼服器端) 入口能力_ 表格.1_Capability Packet Delivery Confirmed Positive - Packet Delivery Routing Capability Positive (Client) Packet Delivery Routing Capability Note (Client/Feeder) Entry Capabilities _ Form.1

網狀點Mesh point

網狀點 入口 &現在參考表格1,其顯示驗程度的範綱及相_指定與功 能。舉例而言,具有憑證程度1的網狀點110可以指定為,,基本”, 並=能夠遞送封包及進行認註。具有憑證程度2的網狀點110 貝=疋為中等’並且具有遞送封包、路由功能以及客戶端認註 的能力。程度3的網狀點11()則指定為”高等”,並具有遞送封包、 路由功能、客戶卿服器端認註以及入口功能的能力,而使其可 以成為網狀點入口成員。 201006182 據此,在步驟535中,如果該第一網狀點〗1〇,的憑證程度高 於該第二網狀點110”的憑證程度,便將該第一網狀點11〇,指定為 該網狀網路第一區域的主網狀點(步驟545)。該第二網狀點ιι〇” 將被指定為該第-區域的第-成員,其中該第一網狀點11〇,與該 第二網狀點110”便形成該網狀網路的第一區域(步驟54〇)。 如果該第一網狀點110,的憑證程度並不高於該第二網狀點 110的憑證程度(步驟535),而是該第二網狀點11〇,,的憑證程度 高於該第一網狀點110,的憑證程度(步驟555),便將該第二網狀 ❹點110指定為該網狀網路第一區域的主網狀點(步驟565)。該第 一網狀點110’則被指定為該第一區域的第一成員,其中該第一網 狀點110與該第二網狀點110”便形成該網狀網路的第一區域(步 驟 540)。 如果該第一網狀點11〇,的憑證程度並不高於該第二網狀點 110”的憑證程度(步驟535) ’且該第二網狀點11〇”的憑證程度也 不南於該第一網狀點110’的憑證程度(步驟555),便由該第一網 狀‘點11〇,的處理器115進行一種隨機處理,以決定何者網狀點將 ❹成為該第-區域的主網狀點(步驟575)。此確保該區域的主導關 係是以一種健全的方式所建立。 再次參考第5A圖,額外的網狀點11〇廣播一信號至該網狀網 路區域的蝴狀點’以加人魏域(步驟55())。綱狀網路區域 的主網狀點11G接收該彳§號,並實作介於該網狀網路區域與額外 網狀點之間的主導性認註及決定處理(步驟56〇)。據此,任何連 接至該區域的額外網狀點11〇,如果其具有高於該區域現有主網狀 點的憑證程度,將被指定為魏域巾新駐喊點。該處理在任 201006182 何額外網狀點no傳輸嘗試連接至該區域的信號時實作。 替代地,當兩個或多個網狀點11〇擁有相等的憑證時,他們 可以形成-種區域主導叢集’其巾具有負責其本身區域的主網狀 ”在此方法巾’自網狀點動態連接至該__路及從該網狀網 路中斷時,也能夠分擔成長網路的負擔。 ❹ ❹ 第6圖顯示一種無線通訊系统6〇〇,其包含在一第一區域幻 =網狀點110’與-第二區域把主網狀點着之間所形成的主導叢 :610。該第一區域R1包含該主網狀點⑽,,其控制在區域 的所有網狀點110。同樣的,該主網狀點21〇,控制在區域幻令 =所有網狀點21〇。據此’每個主網狀點咖與主網狀點21〇,擁 =在網狀網路_之中的最高安全性與整合能力,並具有致能區 =狀點認註的能力,而只要該區域的主網狀點為認可網狀點相 问叢集的成S ’該主網狀點可以不是該區域的主網狀點。 舉例,再次參考第6圖’區域似的任—成員網狀點⑽ 二〇區域R1任-網狀點11〇通訊的能力,因為區域似與以 所乂刀別具有的主網狀點⑽’與⑽卞較相同叢集㈣的成員。 …入該叢集成員可以共相於該無線通訊祕_的資訊,像是 =性、路由以及拓撲資訊。此外’因為該叢集成員高於該區域 貝’該叢集成員便具有提供該無線通訊系統_增加可糊性 負载分佈的能力。該叢集成員也可以共享在其他資訊之中,有 地圖、路由地酿鄰近測量的龍。表格2描述該叢集成 與210’可以提供的能Mesh Point Entry & Now refer to Table 1, which shows the outline of the test level and the phase assignments and functions. For example, a mesh point 110 with a voucher level of 1 may be designated as, "basic", and = capable of delivering packets and acknowledgments. The mesh point 110 with voucher level 2 is 中等 = 中等 medium and has a delivery packet , routing capabilities, and the ability of the client to recognize. The degree 3 mesh point 11 () is designated as "high", and has the ability to deliver packets, routing functions, client-side device annotations, and portal functions. It may become a mesh point entry member. 201006182 According to this, in step 535, if the first mesh point is 1〇, the degree of the voucher is higher than the voucher level of the second mesh point 110", then the first A mesh point 11 is designated as the primary mesh point of the first region of the mesh network (step 545). The second mesh point ιι〇 will be designated as the first member of the first region, wherein the first mesh point 11〇, and the second mesh point 110” form the mesh network An area (step 54〇). If the first mesh point 110 has a voucher level not higher than the voucher level of the second mesh point 110 (step 535), but the second mesh point 11 is, the voucher level is higher than the first The degree of voucher of a mesh point 110 (step 555) specifies the second mesh point 110 as the primary mesh point of the first region of the mesh network (step 565). The first mesh point 110' is designated as the first member of the first area, wherein the first mesh point 110 and the second mesh point 110" form a first area of the mesh network ( Step 540). If the first mesh point 11〇, the degree of voucher is not higher than the voucher level of the second mesh point 110” (step 535) 'and the voucher level of the second mesh point 11〇” Not to the extent of the voucher of the first mesh point 110' (step 555), the processor 115 of the first mesh 'point 11' performs a random process to determine which mesh point will become the The primary mesh point of the first region (step 575). This ensures that the dominant relationship of the region is established in a robust manner. Referring again to Figure 5A, the additional mesh point 11 〇 broadcasts a signal to the mesh network The butterfly point of the road area is added to the Wei domain (step 55()). The main mesh point 11G of the network area receives the 彳§ number and is implemented between the mesh network area and the extra network. Dominant annotation and decision processing between the points (step 56〇). Accordingly, any additional mesh points 11 connected to the area If it has a higher level of voucher than the existing main mesh point in the area, it will be designated as the new domain name of the Wei domain. This process is implemented when the 201006182 additional mesh point no transmission attempts to connect to the area. Alternatively, when two or more mesh points 11〇 have equal credentials, they can form a regional dominant cluster 'the towel has a primary mesh that is responsible for its own area. When the point is dynamically connected to the __way and interrupted from the mesh network, the burden on the growing network can also be shared. ❹ ❹ Figure 6 shows a wireless communication system 6〇〇 comprising a dominant cluster: 610 formed between a first region phantom=mesh point 110' and a second region connecting the main mesh point. The first region R1 contains the primary mesh point (10), which controls all of the mesh points 110 of the region. Similarly, the main mesh point 21〇 is controlled in the area magical = all mesh points 21〇. According to this, 'each main mesh point coffee and the main network point 21〇, the highest security and integration ability in the mesh network _, and the ability to enable the area = point recognition, and As long as the main mesh point of the area is the recognition network of the cluster points, the main mesh point may not be the main mesh point of the area. For example, refer again to Figure 6 'Regional-like-member network point (10) Binary area R1--network point 11〇 communication capability, because the area seems to be the main mesh point (10) with the tool A member of the same cluster (4) as (10)卞. ...into this cluster member can be common to the information of the wireless communication secret, such as = sex, routing and topology information. In addition, because the cluster member is higher than the region, the cluster member has the ability to provide the wireless communication system to increase the pasteability load distribution. The members of the cluster can also be shared among other information, with maps and routes to the neighboring measurement dragons. Table 2 describes the cluster integration and the energy that 210' can provide.

11 201006182 發現 —-----~-- 列表 鄰近測量 客戶端軟體遷移通 訊協定(SMP)功能 鄰近系統優先權 ------ 在該客戶端為可設 定 術 — ---- 存取點(鄰近地圖) 功能 *· . 存取點(鄰近地圖) 路由地圖 軟體遷 移通訊 協定 鄰近地圖 -~~--- 存取點 鄰近測量 表格2 在表格2中描繪的功能可以提供具有其他處理的拓撲發現作 用二互動’ m要的較資訊;以及由於娜㈣狀闕加續除所 把成的網路衝擊估計。根據網狀路徑特性的網路配置,使得該 /集成員網狀點能夠提供—種網狀路徑的最佳建立,其中該網狀路 ,、此資枓使侍叢集成員網狀點可以指定在該叢隼 另4域。if網狀點’並根據多種參數重新指定至該叢集中的 以平i在該输的’該叢集成貝網狀點可以要求改變現有的相撲, 中存在的資 ^ Γ路中的負載,而更有效率地管理在該網狀網路 中存’或回應在區域網狀點中的路由要求。 ^ ^ Z ^ R1 ” 可以重新指定一特定網狀點110至區 12 201006182 域幻的該叢集成員21〇,,以進行最佳路由。 由該網狀點110本身,或由該叢集成員網狀點 示範目的’以描_兩區域⑻與幻)組成在該叢集= 域^而’可以细任意數目的區域組成該叢集,包含控 區,的額外叢集成員。該叢集成員網狀點11〇,與網狀點工 可以利用該新拓撲更新其各別的區域成員網狀點。”接著 本發明可以任何想要的無線通訊系統型式中 ❹ 例:本^可以在任何·形私統中,或是任何其他= 訊系統中實作。本發明也可以在一集成電路上實作 f線通 殊用途超大型積體電路(ASIC)、多重#成電路 列α岡、多重可程式邏輯閉陣列、離散 =陣 可程式邏輯閘陣列與離散組件的組合。 疋果成電路、 雖然本發_特徵與元件已經以狀結合的方式在較 例中敘述,每個特徵與元件也可以不虚雜佳 實施 ::::::^ ❹ 【圖式簡單說明】 該先前總結麟本㈣較佳實施觸後續細軒趨 參考附加圖示而獲得較佳瞭解,其中: 9由 第1圖顯示先前技術中的無線通訊系統; 第2圖顯示根據本發明所配置的無線通訊系統; 第3醜示根據本發明用以在第i圖的無線通訊系統 立委任網路及管理網路括撲的網狀點⑽)對塊狀圖; 第4圖顯不根據本發明獨立委任網路及管理網路扭撲的产號 13 201006182 圖示; 第5A圖為根據本發明委任網狀網路的方法流程圖; 第5B圖為根據本發明決定該網狀網路主導區域的方法流程 圖;以及 • 第6圖顯示根據本發明包含叢集與區域的無線通訊系統。 【主要元件符號說明】 10 無線通訊系統 ^ 100無線通訊系統 118天線 128天線 5 無線鏈結 600無線通訊系統 610主導叢集 ‘ R1第一區域 R2第二區域 1411 201006182 Discovery ----------------------------------------------- Point (proximity map) Function*· . Access point (proximity map) Route map software migration protocol proximity map-~~--- Access point proximity measurement table 2 The functions depicted in Table 2 can be provided with other processing The topology finds the effect of the interaction of the two interactions; and the estimated network impact due to the addition of the Na (four) state. According to the network configuration of the mesh path characteristic, the /set member mesh point can provide an optimal establishment of a mesh path, wherein the network path allows the member of the cluster member to be specified at The cluster has another 4 domains. If the mesh point 're-assigns to the cluster according to various parameters to flatten the i-integrated shell-shaped point in the bundle, it may be required to change the load in the existing sumo, and the load in the existing loop, and More efficient management of the routing requirements in the mesh network or responding to regional routing points. ^ ^ Z ^ R1 ” can re-specify a particular mesh point 110 to zone 12 201006182 domain illusion of the cluster member 21〇, for optimal routing. By the mesh point 110 itself, or by the cluster member mesh The point demonstration purpose 'to describe _ two regions (8) and illusion) is composed in the cluster = domain ^ and 'can be any number of regions to form the cluster, including the control region, the extra cluster member. The cluster member mesh point 11 〇, And the mesh point worker can use the new topology to update its respective regional member mesh points.” The present invention can then be used in any desired wireless communication system type: this can be in any form, or It is implemented in any other = system. The invention can also implement an ultra-large integrated circuit (ASIC) for f-line special use on an integrated circuit, a multi-circuit array, a multi-programmable logic closed array, a discrete-array programmable logic gate array and a discrete A combination of components. The result is a circuit, although the present invention has been described in a comparative example in the form of a combination of features and components. Each feature and component can also be implemented in a complicated manner: :::::^ ❹ [Simple description of the drawing] The prior summary of the preferred embodiment of the present invention is better understood by reference to the accompanying drawings, wherein: FIG. 1 shows the wireless communication system of the prior art; FIG. 2 shows the configuration according to the present invention. Wireless communication system; the third figure shows a block diagram (10) for arbitrating the network and managing the network in the wireless communication system according to the present invention; FIG. 4 is not according to the present invention. Independently appointing network and management network twisting number 13 201006182 illustration; Figure 5A is a flow chart of a method for appointing a mesh network according to the present invention; Figure 5B is a diagram for determining the dominant area of the mesh network according to the present invention Method flow diagram; and • Figure 6 shows a wireless communication system including clusters and regions in accordance with the present invention. [Main component symbol description] 10 Wireless communication system ^ 100 wireless communication system 118 antenna 128 antenna 5 Wireless link 600 wireless communication system 610 dominant cluster ‘ R1 first area R2 second area 14

Claims (1)

201006182 七、申請專利範圍: 1·實施於一中等網狀點中用於在複數網狀點之間通訊的裝置, 該裝置包括: 從要求建立一通訊的一第一網狀點接收一信號; . 傳輸一回應信號至該第一網狀點,該回應信號包括該中等網狀 . 點的認証與憑證資料;以及 形成一網狀網路的一第一區域,該網狀網路含有該第一網狀點 與該中等網狀點。 ❹ 2.如申請專利範圍第1項所述的方法,其中該認註與憑證資料 包含複數憑證程度。 ^如申請專利範,2項所述的方法,其巾該憑絲度包含第 -等級憑證程度、第二等、級騎程度以及第三等級憑證程度。 4.如申請專利範圍第i項所述的方法,更包括: 從要求連結至該第-區域的—額外網狀點接收— 。 /如申請專利範圍第4項所述的方法,其中該額外^狀點包括 咼於該第一區域的該網狀點的一認証與憑證資料。 ❹6·如中請專利範圍第5項所述的方ϋ中該額外網狀點被指 疋為該第一區域的新主網狀點。 7. —網狀點,包括: -接收器,被配置以從要求建立—通訊的—第— 信號; 产一傳輸器,魏置去傳輸一回應錢至該第一網狀點,該回應 信唬包括中級網狀點的認証與憑證資料;以及 一處理器,被配置去形成-峨網路的U域,其中細 15 201006182 狀網路包括該第一網狀點與該中級網狀點。 8.如申請專利範圍第7項所述的網狀點,其中該認証與憑證資 料包含複數憑證程度。 9. 如申請專利範圍第8項所述的網狀點’其中該憑證程度包含 第一等級憑證程度、第二等級憑證程度以及第三等級憑證程度。 10. 如申請專利範圍第7項所述的網狀點,更包括: 一接收器,被配置以從要求連結至該第一區域的一額外網狀點 接收一額外信號。‘ ❹勺如申請專利範圍第10項所述的網狀點,其中該額外網狀點 『於該第一區域的該網狀點的一認証與憑證資料。 齡定^申请專利範圍第11項所述的網狀點,其中該額外網狀點 被k為麵—_崎主離點。 〇 16201006182 VII. Patent application scope: 1. A device for communicating between a plurality of mesh points in a medium mesh point, the device comprising: receiving a signal from a first mesh point required to establish a communication; Transmitting a response signal to the first mesh point, the response signal including the medium mesh point authentication and credential data; and forming a first area of a mesh network, the mesh network containing the A mesh point and the medium mesh point. ❹ 2. The method of claim 1, wherein the vouchers and vouchers comprise a plurality of vouchers. ^ The method of claim 2, wherein the method comprises a first level voucher degree, a second level, a level riding degree, and a third level voucher level. 4. The method of claim i, further comprising: receiving from an additional mesh point that is required to be linked to the first region. The method of claim 4, wherein the additional point comprises an authentication and credential data for the mesh point of the first area. ❹6. The additional mesh point in the square of the patent scope is referred to as the new primary mesh point of the first area. 7. The mesh point, comprising: - a receiver configured to establish a communication-to-signal from the request; a transmitter, a transmitter to transmit a response money to the first mesh point, the response letter唬 includes authentication and credential data for the intermediate network point; and a processor configured to form a U-domain of the network, wherein the fine 15 201006182 network includes the first mesh point and the intermediate mesh point. 8. The mesh point of claim 7, wherein the authentication and credential data comprises a plurality of voucher levels. 9. The mesh point as described in claim 8 wherein the voucher level comprises a first level voucher level, a second level voucher level, and a third level voucher level. 10. The mesh point of claim 7, further comprising: a receiver configured to receive an additional signal from an additional mesh point that is required to be coupled to the first area. ‘ ❹ 如 如 如 如 如 如 如 如 如 如 如 如 如 如 如 如 如 如 如 如 如 如 如 如 如 如 如 如 如 如 如 如 如 如 如 如 如 如 如 如The net point described in Item 11 of the patent application scope, wherein the additional mesh point is k-surface--Saki main departure point. 〇 16
TW098112416A 2005-03-11 2006-03-09 Mesh network configured to autonomously commission a network and manage the network topology TW201006182A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US66086305P 2005-03-11 2005-03-11

Publications (1)

Publication Number Publication Date
TW201006182A true TW201006182A (en) 2010-02-01

Family

ID=37026701

Family Applications (3)

Application Number Title Priority Date Filing Date
TW095108009A TW200704038A (en) 2005-03-11 2006-03-09 Mesh network configured to autonomously commission a network and manage the network topology
TW095203941U TWM297104U (en) 2005-03-11 2006-03-09 Mesh network configured to autonomously commission a network and manage the network topology
TW098112416A TW201006182A (en) 2005-03-11 2006-03-09 Mesh network configured to autonomously commission a network and manage the network topology

Family Applications Before (2)

Application Number Title Priority Date Filing Date
TW095108009A TW200704038A (en) 2005-03-11 2006-03-09 Mesh network configured to autonomously commission a network and manage the network topology
TW095203941U TWM297104U (en) 2005-03-11 2006-03-09 Mesh network configured to autonomously commission a network and manage the network topology

Country Status (5)

Country Link
KR (1) KR20060099474A (en)
CN (2) CN101663659A (en)
AR (1) AR052690A1 (en)
DE (1) DE202006003830U1 (en)
TW (3) TW200704038A (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101421732B1 (en) * 2008-01-11 2014-07-24 엘지전자 주식회사 Active scan method for forming mesh network
US8964634B2 (en) * 2009-02-06 2015-02-24 Sony Corporation Wireless home mesh network bridging adaptor
EP2850804B1 (en) * 2012-05-10 2020-09-23 Oracle International Corporation System and method for supporting state synchronization in a network environment
EP3972311B1 (en) 2014-06-24 2023-03-29 Google LLC Mesh network commissioning
FR3029384B1 (en) * 2014-11-27 2018-01-26 Traxens METHOD OF AFFILIATION TO A CLUSTER OF ELECTRONIC DEVICES COMMUNICATING VIA A WIRELESS NETWORK, ELECTRONIC DEVICE USING SAID METHOD AND SYSTEM THEREOF
US9344365B1 (en) 2015-02-03 2016-05-17 Google Inc. Mesh network addressing

Also Published As

Publication number Publication date
CN201008164Y (en) 2008-01-16
TWM297104U (en) 2006-09-01
KR20060099474A (en) 2006-09-19
CN101663659A (en) 2010-03-03
DE202006003830U1 (en) 2006-09-07
AR052690A1 (en) 2007-03-28
TW200704038A (en) 2007-01-16

Similar Documents

Publication Publication Date Title
US9871776B2 (en) Local area network
JP6240273B2 (en) Authentication using DHCP service in mesh networks
US10979894B2 (en) Method and device for allocating address of device in Bluetooth mesh network
CN101232378B (en) Authentication accessing method of wireless multi-hop network
US8953791B2 (en) Key derivative function for network communications
JP5040087B2 (en) Wireless communication network security setting method, security setting program, and wireless communication network system
US20190215879A1 (en) Method and apparatus for connecting device by using bluetooth technology
US9503891B2 (en) Authentication method of wireless mesh network
CN106576101B (en) System and method for managing the secure communication in self-organizing network
US10547995B2 (en) Method and device for transmitting/receiving data using Bluetooth mesh network
KR20060015540A (en) Wireless service point networks
JP2006165984A (en) Authentication method of ad hoc network, and its radio communications terminal
US10321492B2 (en) Wireless communication apparatus and wireless communication system
TW201006182A (en) Mesh network configured to autonomously commission a network and manage the network topology
EP4008118B1 (en) Secure path discovery in a mesh network
CA2849630C (en) Local area network
CN105744524B (en) Mobile device networking authentication method in a kind of WIA-PA industry wireless network
KR100686736B1 (en) The method of joining in the mobile ad-hoc network through the authentication
EP4250641A1 (en) Method, devices and system for performing key management
Yu et al. Secure constructing Bluetooth scatternet based on BTCP
CN102484642A (en) Technique for evaluating the collaboration among nodes of a communication network