TWI306707B - Methods for constructing multi-point-link interactive environments using based on point-to-point connections in wireless networks - Google Patents

Methods for constructing multi-point-link interactive environments using based on point-to-point connections in wireless networks Download PDF

Info

Publication number
TWI306707B
TWI306707B TW94106022A TW94106022A TWI306707B TW I306707 B TWI306707 B TW I306707B TW 94106022 A TW94106022 A TW 94106022A TW 94106022 A TW94106022 A TW 94106022A TW I306707 B TWI306707 B TW I306707B
Authority
TW
Taiwan
Prior art keywords
node
point
mentioned
bit
address
Prior art date
Application number
TW94106022A
Other languages
Chinese (zh)
Other versions
TW200633430A (en
Inventor
Yu Jung Chang
Ren Hung Hwang
xian-zhong Zhang
Original Assignee
Inst Information Industry
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inst Information Industry filed Critical Inst Information Industry
Priority to TW94106022A priority Critical patent/TWI306707B/en
Priority to JP2006012452A priority patent/JP4219366B2/en
Publication of TW200633430A publication Critical patent/TW200633430A/en
Application granted granted Critical
Publication of TWI306707B publication Critical patent/TWI306707B/en

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Small-Scale Networks (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Description

-1306707-1306707

if.、發明說明(1) 【發明所屬之技術領域】 且特別有關於一 建構多點連線互 本發明係有關於一種無線網路系统, 種在無線網路環境下利用點對點連線方式 動環境的方法與系統。 【先前技術】 現今所流行的網路虛擬環境(例如線上遊戲 (On-Line Game))主要係建置在主從(CUent/Serv^ )架構的處理系統下。「主從式」的系統架構整個應 統晝分成前端的應用程式(即客戶端(clien〇 ) ^及德 >端的伺服器(Server )兩大部份,兩者間以網際網路 域網路相耦接。 〇參考第1圖,其係顯示習知主從式架構的示意圖。該 架構包括一伺服益110與一應用程式(即客戶端)13〇,且 兩者透過如網際網路或區域網路之傳輸媒體(未顯示)相 耦接。使用者可透過前端的應用程式13〇與伺服器11()溝 通,提供使用者進行查詢、修改、列印等輸入或輸出的作 業而後端的伺服器11 0則負責執行前端應用程式1 3 〇所傳 來的命令’並將處理的結果回傳給前端的應用程式丨3 〇, _直接將結果顯不給使用者參考。 a主從式架構的處理效率極高,透過適當的分工處理, 刖端的應用程式1 30可以呈現更精緻的晝面給使用者,而 ,端的伺服器則專注於更高效率的執行處理,包括資料的 =取、系統的管理以及安全性的防護等,提供了一個更具 彈性、更有效率的應用環境。If the invention belongs to the technical field of the invention, and particularly relates to a construction of a multi-point connection, the invention relates to a wireless network system, which uses a point-to-point connection method in a wireless network environment. Environmental methods and systems. [Prior Art] Today's popular network virtual environments (such as On-Line Game) are mainly built under the processing system of the master-slave (CUent/Serv^) architecture. The "master-slave" system architecture should be divided into two parts: the client (clien〇) and the server (Server). The Internet is the Internet. The road phase is coupled. Referring to Figure 1, it is a schematic diagram showing a conventional master-slave architecture. The architecture includes a servo benefit 110 and an application (ie client) 13〇, both of which are through the Internet. Or the transmission medium (not shown) of the local area network is coupled. The user can communicate with the server 11() through the front-end application 13〇, and provide the user with input or output operations such as querying, modifying, printing, etc. The server 11 0 is responsible for executing the command sent by the front-end application 1 3 and transmitting the result of the processing back to the application 丨 3 〇 of the front end, _ directly showing the result to the user. The processing efficiency of the architecture is extremely high. Through proper division of labor, the client application 30 can present a more sophisticated interface to the user, while the server at the end focuses on more efficient execution processing, including data = take, Systems management and security protection, and provides a more flexible, more efficient application environment.

-1306707 發明說明(2) ^丨β ί而,欲以無線連結的方式建構上述連線網路,則a 利用…、線基地台(Access p〇int )來達到目的。但山項 樣的方式所建構的網路,會因太多客戶端同時存取=這 無線基台而降低網路品質。此外,無線基地台:: 網路中有⑯㈣傳輪㈣外的客戶端將無法加人該無線 口此,本發明提供了一種利用點對點連線方式建播& 線網路的方法以解決上述問題。 建構無 【發明内容】 ” ί ΐ ί述目的,本發明實施例揭露了-種在盔缘網路 該第一節點在首、提供-第-節點, 而侦測到具有一第項的方式發出訊息 發出一加入訊息給該第二節點,^::點°該第一節點 訊息時回覆該第一節點一確認訊:弟;:點$收到:加入 認訊息選擇一第一邏輯位::弟-卽:根據,確 丨叢集式網路。 、輯位址,從而形成該階層 【實施方式] 為讓本發明之上述和豆 易懂,下文特舉出較佳f ^ *、特徵和優點能更明顯 說明如下。佳…],並配合所附圖式,作詳細 本發明實施例揭露了— 在…、線網路環境下利用點對 0213-A40410W(N2);K93179;ALEXCHEN. ptd 第6頁 ^306707-1306707 Description of Invention (2) ^丨β ί, To construct the above-mentioned connection network by wireless connection, a uses ..., the data base station (Access p〇int) to achieve the purpose. However, the network constructed by the mountain project will reduce the network quality due to too many clients accessing the wireless base station at the same time. In addition, the wireless base station:: The network outside the 16 (four) transmission wheel (four) in the network will not be able to add the wireless interface. The present invention provides a method for constructing a broadcast & line network by using a point-to-point connection method to solve the above problem. problem. The construction of the invention is disclosed in the embodiment of the present invention. The first node in the helmet network is in the first, the -node is provided, and the first item is detected. The message sends a join message to the second node, ^:: point: the first node message replies to the first node, a confirmation message: brother;: point $received: joins the message to select a first logical bit:弟-卽: According to the cluster network, the address is set to form the hierarchy. [Embodiment] In order to make the above-mentioned and the beans of the present invention easy to understand, the following is a better f ^ *, features and advantages. It can be more clearly explained as follows. Preferably, the present invention is disclosed in detail with reference to the accompanying drawings. In the network environment, the point pair 0213-A40410W (N2); K93179; ALEXCHEN. ptd 6 pages^306707

<、發明說明(3) 黑t 方— . 用無綠么式建構多點連線互動環境的方法與系統,其係利 性、奢^路中無線電波之廣播傳輸(M u 11 i c a s t i n g )的特 構。此^ 個階層叢聚式(Hierarchical Cluster)的架 節Et 1外’本發明實施例包括節點定址(Addressing )、 以刀二路由(R〇Uting)、節點之移動性(Mobility)、 做3 έ !通訊(MU1 士1 CaS 士1 ng )等四個部分,以下將分別 伯又坪細說明。 程。先固3兄明本_發明實施例之節點(行動裝置)定址的過 •feoc ) a括係顯不本發明實施例之點對點傳輸(以不稱Ad 零1100 )無線網路的牟椹+立国 #丄> 杆叙驻$ 木構不思圖,其中母一節點係表示為一 而每個節點都有其傳輸半徑,利用無線電波之 廣播傳輸的特性可逢 』卞仏扪用热踝%波之 狀牟播.L 產生如第2圖所示的階層叢聚式的樹 狀木構。在此網路結構& 位址(L〇gical IP)每 二點都有一個唯一的邏輯 他節點溝通資訊,伙 利用此邏輯位址與其 為1 3 ,而,、中根即點(R〇〇t Node )之邏輯位址 馮i. 3 ,而其子節點之邏輯 竹1止 Φ,·®祐a & * 科位址為1. 0。在本發明實施例 中邏軏位址的資料格式可以任何彡々 =達出母:卽點與其父節點(〜_ 將網路建立成樹狀結構可以 卜本毛明實施例 以利用樹狀結構的特點來解、、办、=路由路徑的存在,也可 題。當-個節點加入U = 的路由和節點移動等問 唯一的邏輯位址,其定址程序二狀結構時,必須取得一個 x、疋址程序說明如下。 第3圖係顯示本發明實施 J之—仃動裝置加入或產生<, invention description (3) black t-party - . Method and system for constructing multi-point connection interactive environment with no green language, the broadcast transmission of radio waves in the profit and luxury road (M u 11 icasting ) Special structure. The embodiment of the present invention includes node addressing, node routing (R〇Uting), node mobility (Mobility), and doing 3 έ H H H E E E E E E E E E E E E E ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ' ! Communication (MU1 1 CaS 1 ng) and other four parts, the following will be explained separately. Cheng. The first node (the mobile device) is located in the node of the invention (the mobile device). The point-to-point transmission (not called Ad zero 1100) is the wireless network. #丄> The pole is located in the wood structure, where the parent node is represented as one and each node has its transmission radius. The characteristics of the broadcast transmission using radio waves can be used. The wave shape broadcasts.L produces a hierarchical clustered tree structure as shown in Fig. 2. In this network structure & address (L〇gical IP) every two points have a unique logical node communication information, the use of this logical address is 1 3, and, the middle root is the point (R〇〇 t Node ) logical address von i. 3, and its child node logic bamboo 1 Φ, · 佑 佑 a & * section address is 1.0. In the embodiment of the present invention, the data format of the logical address can be any 彡々=up to the parent: the 与其 point and its parent node (~_ the network is established into a tree structure, and the embodiment can be used to utilize the tree structure. Features to solve, do, = the existence of the routing path, but also the problem. When a node joins U = routing and node movement, etc. asks for a unique logical address, when it addresses the program binary structure, it must obtain an x, The program of the address is described as follows. Figure 3 shows the implementation of the present invention - the addition or generation of the swaying device

0213-A40410TWF(N2);K93179;ALEXCHEN.p td 第7頁 《306707 ''五'、發明說明(4) 二無^路樹狀結構時之定址程序的步驟 d點ff時(即行動裝置開機時)(步糊)Λ 發出訊息以❹)是否沒有其它,然後以廣播 居節點ueighb0r Node ))在、、=址的節點(即鄰 ),若是,則執行步驟S14,否列ί輸Ϊ圍内(步驟Sl3 邏輯位址的㈣節點在其傳///:步驟Sl5。若無具有 -樹狀結構,令其本身構二該節點自行建立 邏輯位址(如1.0),並且將其的根節點,定義其 (Media Access c〇ntr〇1,以下 某體存取控制 裝,MAC位址)當做該樹的識_ (^址(即行動 S14元成後回到步驟311, x )。步驟 步二:若有具有邏輯位址的鄰二 不可能已存在-樹狀結構之 在其傳輪範圍内,表 訊息以偵測在所有鄰居r ‘' :,,則接著再廣播發出 S1”。若是,則執行步P驟中疋=根節點的存在(步驟 若在所有鄰居r 5^驟 否則跳到步驟S14。 有鄰居節點發出一:入f,即點的存在,則該節點對所 卢收到該郎點的加入訊息時,會分別Λ二鄰居即點 ί盈以告知該節點其本身的邏輯位址(步確二訊 該確認訊息中包括鄰 ^步驟sn),其中 間仍未收到鄰居節·點 爱本S的f輯位址。若過一段時 給所有鄰居節點。接下二二則該二點再次發出加入訊息 認訊息時,該節點根摅:當收到每—鄰居節點回覆的確 很據所有確認訊息中所包含的邏輯位0213-A40410TWF(N2); K93179;ALEXCHEN.p td Page 7 "306707 ''Five', invention description (4) Steps of the address procedure when the two-tree tree structure is d point ff (ie, the mobile device is turned on) Time) (step paste) 发出 send a message to ❹) if there is no other, then broadcast the node ueighb0r Node)) at the node of the =, address (ie, neighbor), and if so, execute step S14, no list (Step S1, the (4) node of the logical address is in its / / /: step S15. If there is no - tree structure, let it construct the logical address (such as 1.0) and its root Node, define it (Media Access c〇ntr〇1, the following object access control device, MAC address) as the knowledge of the tree (ie, the action S14 element returns to step 311, x). Step 2: If there is a neighbor with a logical address that cannot exist - the tree structure is within its range, the table message is detected in all neighbors r '' :, then broadcast S1". If yes, execute 步=the existence of the root node in step P (steps if all neighbors r 5^ otherwise jump to step S14. The neighboring node sends out one: into f, that is, the existence of the point, when the node receives the message of joining the lang point, the neighbor will point to the neighbor to inform the node of its own logical address (step It is true that the confirmation message includes the neighboring step sn), and the address of the neighboring section of the neighboring section S is still not received. If it is over a period of time, it is given to all the neighboring nodes. When the join message is sent, the node is rooted: when receiving the reply from each neighbor node, it is indeed based on the logical bits contained in all the confirmation messages.

0213-A40410TWF(N2);K93179;ALEXCHEN •Ptd 第8頁 1306707 ~~:—'—~~— 丑、發明說明(5) - J " —1 址,計算可用的邏 位址(步驟§ 1 8 ) 位址’並且選擇其中長度最短的邏輯 1 · 2 · 1與1. 3兩個、。。舉例來說,若回覆的確認訊息中包含 與1, 3. 1。為了邏士輯位址’則可用的邏輯位址為1· 2. 1 · 1 1.3.1。 讓樹的高度較矮,故該節點選擇邏輯位址 接下來,根 位址為1 · 3之節.斤選擇的邏輯位址向其父節點(即邏輯 該選擇的邏輯^立^ )♦發出一加入確認訊息(步驟S1 9 ),將 行聯繫與更新 f备做其邏輯位址,並且定期與父節點執 ♦在-節點選擇。步驟S2〇)。 擇,則在父節點辉又郎點時,若有多個可能父節點可選 父節點位址的’長=訊號強度超過某個臨界值的前提下,以 為父節點,可二二ΐ主要考量。選擇位址長度愈短的節點 得路由路徑變得3個樹狀結構的階層變得較少’從而使 個臨界點的前提而父節點的訊號強度必須要超過某 號過弱,造成節點A了;免某些節點與父節點之間的訊 ^ m. , ^ ^ 2做小幅度的移動,就失去與父節點n & 聯繫,I而需要重新€ # m 點間的 ,=f述定址方法有可能會發生位址衝突的情况 如,有兩個銪It r ϋ命·壯m、 丨月/凡。例 L "彳丁動裝置)相距很遠,彼此不在盤士 广f傳輪範圍^這兩個節點均在啟動時皆取得邏輯:的 匕之後由於其他節點的加入…個節位址 =:(Tree Networ k)碰在一起時,即會發生斤在之 t重,的狀況。要解決這個問題,有許多的策略可2位 用。取冑單的方法就是當發生位址衝突時,啟動—個=併0213-A40410TWF(N2); K93179; ALEXCHEN • Ptd Page 8 1306707 ~~:—'-~~- Ugly, invention description (5) - J " —1 address, calculate the available logical address (step § 1 8) Address ' and select the one with the shortest length of 1 · 2 · 1 and 1.3. . For example, if the reply confirmation message contains 1, 3. 1. The logical address available for the Logic Address is 1· 2. 1 · 1 1.3.1. Let the height of the tree be short, so the node selects the logical address next, the root address is the section of 1 · 3. The logical address selected by the kilobyte is sent to its parent node (that is, the logic of the selected logic ^) As soon as the confirmation message is added (step S1 9 ), the row contact and update f are prepared as their logical addresses, and the parent node is periodically scheduled to perform the - node selection. Step S2〇). If you choose a parent node, if there are multiple possible parent nodes, you can select the parent node address. If the signal strength exceeds a certain threshold, the parent node can be considered as the parent node. . The node with the shorter address length is selected, and the routing path becomes less than the hierarchy of the three tree structures. Thus, the premise of the critical point and the signal strength of the parent node must be too weak, causing node A. ; avoid the signal between some nodes and the parent node ^ m. , ^ ^ 2 to make a small move, lose the contact with the parent node n & I need to re-between the point between the m points, = f There are cases where address conflicts may occur. For example, there are two 铕It ϋ · · 壮 壮 壮 壮 壮 壮 、 、 、 、 、 、 、 、 The example L "King Ding moving device) is far apart, and they are not in the range of the Panshiguang f transmission wheel. ^The two nodes are all logically started at the start: because of the joining of other nodes... Section address=: (Tree Networ k) When it comes together, it will happen that the weight of the pound is heavy. To solve this problem, there are many strategies that can be used. The way to take the order is to start when the address conflict occurs - one = and

0213-A4〇41〇TWF(N2);K93179;ALEXCHEN.ptd 1306707 ~五%發明說明(6) 的程序,以節點數較多的 狀網路依照上述取得邏輯位、再,為主體,節點數少的樹 位址,將兩個樹狀網路入 的定址法重新取的新的邏輯 ,.^ Q 1开成為一個。 接下來說明本發明實施 在本發明實施例中之路由封勺=占,貧料路由的過程。 路由表來得知下一個轉$ 疋由每一節點自行維護的 點包括一子節點路由而到達目的節點。每個節 鄰居路由表(Neighbor Table) 未顯示)與一 表負責記錄目前所有子節點的邏輯::: :子:點路由 鄰居路由表負責記錄附近鄰居乍=二:子節點的狀態。 為Ad Hoc無線網路環境的廣播輯位址和狀態,因 其鄰居節點傳遞資料時,;戶斤以每個節點在 如每-父節點與其子=節點的資料。例 點知道其附近還有哪些節點。’、心即可讓每一節 距離藉可以幫助在進行資料路由時縮短路由 距離根據上述方法所建立的樹狀網路由 時,若沒有-個良好的控制機制,可=擇路由路偟 丨由路徑而發生延遲。故本發明實施例的路 由路徑的方法以解決上述問題。 一種縮知^路 弟 種方法為,當,—節點44"岛丨士 f 儲存的目的節點邏輯位址與其本身包中 錄的邏輯位址,執行一最長表頭比對由表中所記0213-A4〇41〇TWF(N2); K93179;ALEXCHEN.ptd 1306707 ~5% of the description of the program (6), the number of nodes with a large number of nodes in accordance with the above obtained logical bits, then, as the main body, the number of nodes The lesser tree address, the new logic that re-takes the address method of the two tree networks, .^ Q 1 becomes one. Next, the process of implementing the routing and sealing in the embodiment of the present invention is shown. The routing table learns that the next point to be maintained by each node includes a child node route to the destination node. Each section Neighbor Table (not shown) and a table are responsible for recording the logic of all current child nodes::: : child: point routing The neighbor routing table is responsible for recording the status of neighbors 乍=2: child nodes. The broadcast address and state of the Ad Hoc wireless network environment, because the data is transmitted by its neighbor nodes; the data of each node is in each parent node and its child = node. The example knows which nodes are nearby. ', heart can let each distance borrowing can help shorten the routing distance when routing data. According to the tree network route established by the above method, if there is no good control mechanism, you can choose the routing path. There is a delay. Therefore, the method of the routing path of the embodiment of the present invention solves the above problem. A method of indenting the younger brother is to, when, the node 44" island gentleman f stores the logical address of the destination node and the logical address recorded in the package itself, and performs a longest header comparison as recorded in the table.

Prefix Match)操作以找出邏輯位址長度最二『二然Prefix Match) operation to find the logical address length of the second

•1306707•1306707

五-、發明說明(7) 後將該封包送往此節點。 舉例來說,參考| (來源節點)相要傳谏圖,^輯位址為”1.1.1. 1”的節點 點(目的節封包給;輯位址為”1.1·2」,,的節 表做Longest Prefi;=目的節點的邏輯位址與本身的路由 ,丄1·】"與節點',1.〗】atci\°根據比對結果,發現節點 節點可任意選擇一節2的最,表頭長度都為3,故來源 本實施例中,來源節赴作為傳f (F〇rwarding )節點。在 點。當封包被傳遞到r選擇了節點’’1 · 1. 1"做為傳遞節 1 次 Longest Prefix ^點^·1"時,節點 m,會做一 Μ · 1.2”的最長表頭長Ch,根據比對結果,發現節點 度是2,故節點” 是3二而節點"1.1”的最長表頭長 以此方式將封包傳遞、擇節點"1 · 1. 2"為其傳遞節點。 第二種方法為節點。V-, invention description (7), then send the packet to this node. For example, the reference | (source node) phase is to be transmitted, and the node point of the address is "1.1.1. 1" (the destination node is given; the address is "1.1·2", the section The table is Longest Prefi; = the logical address of the destination node and its own route, 丄1·]"and node',1.]atci\° According to the comparison result, it is found that the node node can arbitrarily select the most of the 2 The length of the header is 3, so the source is in this embodiment, the source section goes to the f (F〇rwarding) node. At the point. When the packet is passed to r, the node ''1 · 1. 1" is selected as the pass. When the first Longest Prefix ^ point ^·1", the node m, will do a Μ · 1.2" longest header length Ch, according to the comparison result, the node degree is found to be 2, so the node "is 3 and the node" The longest header length of ;1.1" is to pass the packet in this way, and the node is passed to the node. The second method is the node.

Prefix Match,再利用盔^述方法中所提到的L〇ngest 使得路由更加有效率。由春封包傳遞時具有廣播的特性, 遞封包的方法是廣播方於在Ad hoc網路環境下,節點傳 至其鄰居節點之路由表;,以當有某節點要將封包傳遞 主動去告知此節點該資有,錄的節點時,該鄰居節點會 節點"1 _ 1. 2 · Γ。節點"/即點"1 _ 1. 1. 1"欲傳遞封包給 節點,節點"1 · 1. 2 · 1,, μ · 12 ”為節點"1. 1 _ 1. 1 ”的鄰居 在節點"1 1 · 1 · 211的鄰^ ^點1. 1. 1. 2 ”的鄰居節點,因此 相關訊訊,因此當節點 由表中會記錄節點"1. 1. 2. Γ的 2. 1"時,節點” 1. }. j2 ”合1 1. Γ欲傳遞封包給節點"丨·工. _ 主動告知節點” 1. 1 · 1 · 1",節點Prefix Match, which uses the L〇ngest mentioned in the helmet method to make routing more efficient. The function of the broadcast packet is transmitted by the spring packet. The method of the packet is the routing table that the broadcaster transmits to the neighbor node in the Ad hoc network environment; when a node wants to pass the packet to actively inform the packet When the node has the registered node, the neighbor node will have the node "1 _ 1. 2 · Γ. Node "/points"1 _ 1. 1. 1" To pass a packet to a node, the node "1 · 1. 2 · 1, μ · 12 ” is a node "1. 1 _ 1. 1 ” The neighbors in the node "1 1 · 1 · 211 neighbor ^ ^ point 1. 1. 1. 2" of the neighbor node, so the relevant information, so when the node will record the node by the table "1. 1. 2 Γ 2. 1", node" 1. }. j2 ”1 1. Γ want to pass the packet to the node "丨·工. _ Proactively inform the node” 1. 1 · 1 · 1", node

0213-A40410TWF(N2);K93179;ALEXCHEN. 第11頁 Ί3067070213-A40410TWF(N2); K93179;ALEXCHEN. Page 11 Ί306707

— _ 五、發明說明(8) 沿著種圖擇的當^點欲將封包 ο 1 „ π± 去所選擇的路由路徑傳遞到節點"】η 包丄=節點Μ.1,1.2"因為會收到其要傳心 A ^ 寺),進而會發現該封包所欲到達的目的 2 ;;鄰ί時,即主動告知節點” 1· 1.1. 1"經由節點"丨'即/ Μ "到即點’’1 · 1. 2. 1",此時節點11 1 1 1 1丨|便可,鸾摭_ . 郎點"」· 1· 1. 2"將封包傳遞到節點"Κ1·Υ i"更Τ選擇經由 第ί種方法為,利用路由快取(R〇Uting Caehe) & Ϊ1’使;寻封包在被傳遞的過程中能有更小的跳躍數(以 C0unt)可選擇。當—封包從某節點路經過(, :::走基本的階層路由路徑時,該節點可 的 ^點以及其選擇的傳遞節點記錄到路由快取裡。::: ::他封包經過該節點而到達相同之目的節點或灸二 =分支(子節點)_,就可以從路由快找 :遞卽點卿,進而將封包經由傳遞節點而送達= 舉例來說,參考第6圖,節點"],,, 郎點π 1. 1. 1.厂時,因為先前節點,田封G傳遞到 給節點"1. 1. 2·厂(如虚線箭頭所_ · . ·有傳遞過封包 取(Cache)起來(該資訊包括^不,且有將該資訊快 "1. 1. 1. 1 ”發現目的節點的位址是,,】t 。此外,節點 疋1· 1.2. 1. 1",此位址為— _ V. Description of invention (8) When selecting along the seed map, the point is to pass the packet ο 1 „ π± to the selected routing path to the node "] η 丄 丄 = node Μ.1, 1.2" Because it will receive the A ^ temple), and then will find the purpose of the packet to reach 2;; neighbor ί, that is, to inform the node "1. 1.1. 1" via the node "丨' ie / Μ "To the point ''1 · 1. 2. 1", at this time the node 11 1 1 1 1丨| can, 鸾摭_. 郎点""·1· 1. 2" Pass the packet to the node "Κ1·Υ i" More choices via the ί method, using routing cache (R〇Uting Caehe) &Ϊ1'; the package can have a smaller number of jumps in the process of being passed ( C0unt) can be selected. When a packet passes through a node (, ::: walks the basic hierarchical routing path, the node's available point and its selected transit node are recorded in the routing cache. :::: ::The packet passes through the node And to reach the same destination node or moxibustion 2 = branch (child node) _, you can quickly find from the route: transfer the point, and then send the packet through the delivery node = for example, refer to Figure 6, node " ],,, 朗点π 1. 1. 1. When the factory, because of the previous node, Tian Feng G passed to the node "1. 1. 2 factory (such as the dotted arrow _ · · · have passed the packet Cache (the information includes ^ no, and there is the information fast "1. 1. 1. 1 ” find the destination node's address is,,] t. In addition, the node 疋1· 1.2. 1", this address is

0213-A40410TWF(N2) ;K93179;ALEXCHEN.ptd 第12頁 •1306707 五-、發明說明(9) 節點”1.1.2.1"(前述方法中之 現Hop Count的資訊比階層 H = ‘點)的子節點,發 1π選擇經由節點"丨.丨.丨 狄路仫的少,故節點"1 ·丨.i. "1. 1. 2. 1"的路徑傳遞封包。即點丨.h 1. 2” —節點 接下來說明本發明實施 過程。在Ad Hoc無線網即=樹狀網路中移動的 之移動性Uobility)的特性中要考量的就是節點 點在移動的時候,必須要考声到重新ΐ明實施例中,當節 h (Re-Addressing)的、3§^愿到重新叱址 來達到其目的:亦即更新機制(Soft 節點作註冊更新的動作。 個子即點需定期地與父 舉例來說,參老笛7 Λ回 節點Α要求加入(如(3 : ’考慮一個節點Ρ,其原本向 點。若節點P從其父r # Λ不)而使得節點A成為其父節 輸範圍内(也有可能^傳輸範圍内移動到節點B的傳 節點B可以給節點p = 移動而是節點A移動),若 點P就必須向原來的、輯位址(如⑷所示),則節 Release)的動作(如即點A做位址釋放(Address 定期更新的動作。秋& 5)所不)’轉而跟新的父節點B作 聯絡的位置(如第7“β ’若節點1"移+動到一個只能與節點B 現節點Ρ的邏輯位址所不),且若原來的父節點Α是發 須主動把原來節厶很久沒被註冊更新,父節點A就必 接下來說明T二邏會輯位址做:立址釋放的動作。 實施過程。參考第8 貫施例之即點在樹狀網路中移動的 ,如上所述,假設節點P,原本在父 •1306707 _五.、發明說明(10) 節點A的傳輪範圍内’當其欲更換父節點A而離開其傳輸範 圍時,向其所欲加入之父節點(如節點8 )發出一加入訊 息」步驟S21 ) ’並且判斷是否收到節_回覆的確:訊息 (步驟S22 )。若沒收到節點B的確認訊息,表示 未在節點B的傳輸範圍内,因此執行前文所述之定址 而取得新的邏輯位址(步驟S23 )。若有收到節點B刀、 訊士,則檢查新的父節點B的邏輯位址長度是否比原來的 父節點A的邏輯位址長度短(步驟S24)。 、 若父節點A的邏輯位址長度較短,則回到步驟s2i,節 點P重新發出加入訊息給其它節點以重新搜尋— 點。若父節點B的邏輯位址長度較短,則節點卩 發出-要求邏輯位址的訊息(步驟S25 ) 即成 父節點β的子節點。接下來判斷 』Ρ其要成為 自f卡鰥#广外 聊又即點疋否回覆一確認訊 心(y驟⑽)。方又郎點Β有收到節點 位址的訊息,會回覆—確認訊息給 =之要求邏輯 未收到父節點B發出的確認訊息/則表 处此,若節點15 父節點B移動,導致節點P脫離點;:傳;因^節:或 回到步驟如,節點P重新發出加入訊息圍’因此 丨搜尋一新的父節點。接下來,从狄 :口、匕郎點以重新 確認訊息,根據該確認訊息中β收到父節點B發出的 加入確認訊息給父節點Β (步騍$ 3 ^可用邏輯位址發出一 原來的父節點Α做位址釋放的| % γ 。接下來,節點Ρ向 其底下的所有子節•點,其父(步驟⑽),錢通知 定期與父節點4執行註冊更新的^的邏輯位址已改變,並且 々的動作(步驟S29),即回到 0213-A40410TWF(N2);K93l79;ALEXCHEN.ptd 13,06707 步驟j1 ,重複步驟S21〜S29之操作„ 早蛛畲某一節點的邏輯位址改變了,其須主無、3 :此時其子節點可選擇直接引 二=其所有 3位,來當作自己位址的前置索引(prefi二新獲得的邏 又節點的邏輯位址原本是"丨.2. 5",舉例來 &子節點的邏輯位址可由原來的 在變成”1.2' 位址1'u.〜是重新找-節點來做v二ΐ接轉 二卜^須考慮根節點或很接近根節點之子乂二:點人 •例:若形。例如’參考第6圖’以節點或; 。與其聯絡’而這些子節點可以試子印點可能 "1’:”可J離開了樹狀結構,故必須再產生-子個節點則即點 下的方法、來而解’、么二Γ/同Λ產生_ 依優先權的大小選出一個新的節點""的m =為子節lU.x成為節點”U"的優先權大於子憂先 二。例如,節點"的優先權 郎點1.2”的優先權又大於節點3,,,二J.2 ’而 出一個新的節點|,1. 〇"。 、推,直到找 其勺J:來說明本發明實施例之節點間群纽通訊的過程, 入群組(J〇in)、節點離開群组以及 貪料的轉送(Forward)等三個部分。0213-A40410TWF(N2) ;K93179;ALEXCHEN.ptd Page 12 •1306707 V-, invention description (9) node "1.1.2.1" (in the previous method, the information of the Hop Count is higher than the level H = 'point) The child node sends a 1π selection via the node "丨.丨.丨狄路仫, so the node "1 ·丨.i. "1. 1. 2. 1" path to pass the packet. h 1. 2" - Node Next, the implementation of the present invention will be described. In the characteristics of the mobile Uobility that moves in the Ad Hoc wireless network, that is, in the tree network, it is necessary to test the sound when the node point is moving, in the embodiment, when the section h (Re -Addressing), 3§^willing to re-address to achieve its purpose: that is, the update mechanism (the action of the Soft node to register and update. The point needs to be periodically with the parent, for example, the old flute 7 Α Ask to join (eg (3: 'Consider a node 其, its original point. If node P is from its parent r # Λ not) and make node A become its parent section input range (it is also possible to move within the transmission range to Node B's transit node B can give node p = move but node A moves). If point P, it must be moved to the original address (as shown in (4)), then the section's action (such as point A) Address release (Address regular update action. Autumn & 5) does not) 'turn to the location of the new parent node B to contact (such as the 7th "β 'If node 1 " move + move to one can only Node B is not the logical address of the node, and if the original parent node is the sender, it must be active. It turns out that the frugality has not been registered and updated for a long time, and the parent node A must next explain the address of the T-two logical address: the action of the address release. Implementation process. Refer to the eighth example to point the point in the tree network. Moving, as mentioned above, assume that node P, originally in the range of the parent's 1130707 _ five., invention description (10) node A, when it wants to replace the parent node A and leave its transmission range, The parent node to be joined (e.g., node 8) issues a join message "step S21)' and judges whether or not the section_reply acknowledgment message is received (step S22). If the acknowledgment message of the Node B is not received, it indicates that it is not within the transmission range of the Node B, so the address described above is performed to obtain a new logical address (step S23). If the node B knife and the signal are received, it is checked whether the logical address length of the new parent node B is shorter than the logical address length of the original parent node A (step S24). If the logical address length of the parent node A is short, the process returns to step s2i, and the node P re-issues the join message to other nodes to re-search. If the logical address length of the parent node B is short, the node 发出 issues a message requesting a logical address (step S25) to become a child node of the parent node β. Next, judge 』 Ρ 要 要 要 要 要 要 要 要 要 要 要 广 广 广 广 广 广 广 广 广 广 广 广 广 广 广 广 广 广 广 广 广Fang Erlang points to receive the message of the node address, and will reply - the confirmation message to = the request logic has not received the confirmation message from the parent node B / the table is here, if the node 15 parent node B moves, causing the node P detachment point;: pass; because ^ section: or back to the step, for example, node P re-issues the join message fence 'so it searches for a new parent node. Next, from Di: mouth, 匕 Lang points to re-confirm the message, according to the confirmation message, β receives the confirmation message sent by the parent node B to the parent node Β (step 3 $ 3 ^ available logical address to send an original The parent node does the address release of |% γ. Next, the node traverses all the child nodes and points under it, its parent (step (10)), and the money informs the logical address of the ^ that periodically registers with the parent node 4 to perform the registration update. Changed, and the action of 々 (step S29), that is, return to 0213-A40410TWF (N2); K93l79; ALEXCHEN.ptd 13, 06707 step j1, repeat the operations of steps S21 to S29 „ early spiders logical position of a node The address has changed, it must be master, 3: at this time its child nodes can choose direct = two all its 3 bits, as the pre-index of its own address (prefi two new logical nodes of the logical node) Originally, it is "丨.2. 5", for example, the logical address of the subnode can be changed from the original to the "1.2" address 1'u. ~ is to re-find the node to do v. ^ Must consider the root node or the child that is very close to the root node. 2: Point person. Example: If the shape. For example, 'Reference 6 'With a node or;. Contact with them' and these sub-nodes can try to print a possible "1':" J can leave the tree structure, so it must be generated again - the sub-node is the method under the point, Solution ', 么二Γ/同Λ产生_ Select a new node according to the size of the priority "" m = for the sub-section lU.x becomes the node "U" has priority over sub-worry. For example, The priority of the node "Priority Point 1.2" is greater than the node 3,,, and the second J.2 'and a new node|, 1. 〇"., push until the spoon J: to explain In the embodiment of the present invention, the process of communication between nodes in a group is performed in three parts: a group (J〇in), a node leaving a group, and a greedy forwarding (Forward).

1306707 -五·、發明說明' _____ 首先說明節點加入 入到某一多點傳播珥 、'且的實做過程。當一個節點想加 明之範疇中,故省略之日)(傳播群組的定義方式不在本發 想加入的群組位址對映,使用雜湊表(Hash Table)將所· 著向擁有該邏輯位址、#MaP )到某一個邏輯位址上,接 邏輯位址,並且由讀t =點註冊並取得其他已註冊成員的 不存在,則由該節點:,負責維護註冊資料。如果該節點 說,若節點Ρ欲加入夕父節點負責維護註冊資料。舉例來 播群組Α中所包含的^ j傳播群組A,利用雜湊表與多點傳 _果所得之邏輯位址為位址執行對映操作,根據對映結 ” 1. 3. 5”註冊,但如果f 3里。因此節點P必須向節點 處或離開該樹狀網路A郎點1. 3. 5不存在(可能移動到別 冊資料。又如果” 1. v ,則改由即點” I 3"來負責維護註 註冊資料。 不存在,則就由節點"1. 0”負責維護 另一方面 必須轉移回到該節5原力該負:維遵的節點出現,則資料 點”·3"代替例如,在上述實施例中,原本由: 代朁即點1 · 3. 5"維護群組A的成員資料,夕1即 二節點加人此網路,並取得邏輯位址"13'貝二,後有 •3而要通知節點"ΐ3·5,,進行資料轉移。另外,必= 到某個原本負責維護群節 須考慮 況,包括因Α人A :群 枓的離開樹狀網路的情 =例如,行動袭置當機)而造成節點為 =維護群組資料的節點必須通知 :該原 點代替維護資料。為了避免上述狀況發 一 ”父節 田 即點註冊1306707 -5·, invention description ' _____ First, the node is added to a certain multi-cast 珥 , ' and the actual process. When a node wants to be in the category of ambiguity, it is omitted. (The definition of the propagation group is not in the group address mapping that the sender wants to join, and the hash table is used to hold the logical bit. Address, #MaP) to a logical address, connected to the logical address, and registered by reading t = point and obtain the non-existence of other registered members, the node:, responsible for maintaining the registration data. If the node says that if the node wants to join the parent node, it is responsible for maintaining the registration data. For example, the multicast group A included in the group is broadcasted, and the logical address obtained by the hash table and the multi-point transmission is used as the address to perform the mapping operation, according to the mapping "1.3. 5" Registration, but if f 3. Therefore, node P must go to the node or leave the tree network A. 1. 5. 5 does not exist (may move to another book. If it is 1. v, then change to point "I 3" to be responsible for maintenance Note registration information. If it does not exist, then the node "1. 0" is responsible for maintenance. On the other hand, it must be transferred back to the section. 5 The Force is negative: If the node of the dimension appears, then the data point "·3" instead of, for example, In the above embodiment, the original one is: 朁 1 ie, 3. 5 " maintain the member data of group A, eve 1 is the two nodes add this network, and obtain the logical address "13' shell two, After the 3.3, you must inform the node "ΐ3·5, for data transfer. In addition, you must = to be responsible for maintaining the group festival, including because of the A: group leaving the tree network If the action = for example, the action is down, the node that is causing the node to maintain the group data must notify: the origin replaces the maintenance data. In order to avoid the above situation, a "Father's Day"

1306707 五-、發明說明(13) 後,必須定期向當初註冊的節點發送確認訊息,若發現確 認訊息沒有被回覆’表示負責維護節點失效,此時^須再 次向原本負責的節點之父節點註冊一次。由於此系真 小群組所料,所以需要轉移時資料量並不會太大,故; 需擔心資料轉移會浪費太多的頻寬及時間。 接下來說明節點離開群組的實做過程。當一節點 開某個多點傳播群組時,必須向其原本註冊的節點進行取 其實做過程與上述加入群組的過程類似。 .雜凑表將Α對映到某一邏輯位址,假設為"135"= Μ便向郎點’1_3. 5"取消註冊。同樣考慮到節點""不· Ϊ在=二’二時資訊必定由節點3. 5"之父節點維 能找到維護其資料的節點。 、〗义疋 接下來說明資料轉送的實做過程。务一 =群組後,便可開始執行傳送與接收資料的“:: 網路中的每個節點除了必須處理本身的“由 還必須充當路由節·點的肖色以幫匕外, i此’要達到有效的繞送封包,以使包。因 資料的情況下’將封包量減到最少是:::以夠收到 題。為了減少封包量,根攄太旅一 田重要的議 合無線網路中之資料傳輸具有‘二=,網路’配 此外,在封包中須額外加入幾特性來達到其目的。 ⑴上旗標(UP FUg):若上旗標值被設為i,表示1306707 V-, invention description (13), must send a confirmation message to the node that was originally registered periodically, if it is found that the confirmation message has not been replied 'represents that the maintenance node is invalid, then ^ must be registered again with the parent node of the original responsible node once. Since this is really a small group, the amount of data that needs to be transferred is not too large. Therefore, it is necessary to worry that data transfer will waste too much bandwidth and time. Next, the actual process of the node leaving the group is explained. When a node opens a multicast group, the process of authenticating to the node it originally registered is similar to the process of joining the group. The hash table will be mapped to a logical address, assuming that "135"= Μ 向 郎 ’ '1_3. 5" cancel the registration. Also consider that the node "" is not in the = two second time information must be found by the node 3. 5 " parent node dimension to maintain its data node. 〗 〖 疋 疋 Next, explain the actual process of data transfer. After the group = group, you can start to execute the transmission and reception of the data ":: every node in the network must deal with its own "by having to serve as the routing section and point to help, i 'To achieve a valid wrap-around packet to make the package. In the case of information, the amount of the package is reduced to a minimum of ::: to receive the question. In order to reduce the amount of packets, the data transmission in the important wireless network of the 摅太旅一田 has ‘二=, network’. In addition, several features must be added to the packet to achieve its purpose. (1) UP FUg: If the upper flag value is set to i, it means

1306707 五·、發明說明(14) 轉送一封包之一中繼節點(Intermediate Node)的父節 點必須處理該封包。 (2) 子節點映像(chi 1 dren Node Map ):每個位元代 表中繼節點的一個子節點,若某個位元被設為1,則表示 這個位元所代表的子節點必須轉送此封包。 (3) 序號(sequence number ):在廣播的環境下,有 可能同一個封包由不同的幾個節點轉送,之後被同一個節 點收到’此時必須由序號來判斷此封包是否曾經收過。 (4 )中繼節點:用來紀錄轉送此封包的節點之邏輯位 ,址。 (5)成員列表(Member List):用來記錄在多點傳播 群組中成員的位址,其中該位址中的第一個位元予以保 留’並且據以判斷如何轉送封包。 根ί ΐ述攔位以及利用無線網路電波具有廣播的特性 實做一演算法。當一個成員節點送出封包時,只要在其傳 輸範圍内的成員節點均可收到此封包。也就是言兒,對:些 成員節點而言,只需要送出一次的封包即可。目此,若; :判:哪些成員在電波範圍之内,扣除這些節·點,其他的 ::階層樹狀結構來轉送1可節省多點傳播所 需要=包!。以下詳細敘述演算法中所需用到之規則。 瓦先’假設傳遞封包之節點為傳送者(Sender)的情 /Λα 。 址的第—個位元(額外保留的)設 規則1 右有成貝郎點位於僂读々々科沾比说卉士 时Θ 〇·、- Μ 1 V、得适即點的快取當中,貝丨J 將5亥成貝卽點之邏輯位址的!1306707 V. Invention Description (14) A parent node that forwards a packet to an intermediate node must process the packet. (2) Chi 1 dren Node Map: Each bit represents a child node of the relay node. If a bit is set to 1, it indicates that the child node represented by this bit must forward this. Packet. (3) Sequence number: In the broadcast environment, it is possible that the same packet is forwarded by several different nodes and then received by the same node. At this time, the serial number must be used to determine whether the packet has been received. (4) Relay node: used to record the logical bit and address of the node that forwards the packet. (5) Member List: used to record the address of a member in a multicast group, where the first bit in the address is retained' and it is judged how to forward the packet. The root ί narration of the interception and the use of wireless network radio waves have the characteristics of broadcasting. When a member node sends a packet, it can be received by member nodes within its transmission range. That is to say, for some member nodes, only one packet needs to be sent once. If you are in the range of radio waves, deduct these points and points, and other :: hierarchical tree structure to transfer 1 to save multi-point transmission. . The rules required in the algorithm are described in detail below. The tile first assumes that the node passing the packet is the sender / Λα of the sender. The first bit of the address (extra-reserved) is set to rule 1 and the right is the place where the singer is located in the 偻 沾 沾 说 卉 卉 卉 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 、 , Bellow J will be 5 Hai into the logical address of the Bay Point!

1306707 玉、發明說明(15) 為1 〇 規則2 ’除了根據規則i而 節點外,如果有屬於傳送節點的子設為1的成員 於子節點映像中將:;二支並之,依傳 規則3,若成員列表中還有/點々的位70汉為1。 被設為1,則將上旗標攔位設之第個位元未 記錄傳遞節點的位址,並且將封包=I在中、塵卽點攔位中 =來:設傳遞封包之節;=傳送者的情況。 位判斷),且在子節點映像十二點轉送(由中繼節點攔 表此分支之節點的位元設為i時 蜀二叉將: 成員節點中,不在該傳遞節點快 70…. 該傳遞節點之子節點所在分支點且屬於 點二為1。然後在中繼節點攔位中記錄傳 遞即點的位址,並且將封包送出。 規則5,如果收到的封包由子節點轉送,且上旗梗 為1 ’則計算在成貝列表中第—個位元不為節下點。 丨將位,…之節點的第一個位元設為i,而非位貝於;夫點取 中的:點但屬於傳遞節點之子節點的節點,則將其第一個 位元設為1,並且於子節點映像中將代表此分支之節點的 位元設為1。若成員節點中還有第一個位元未被設為丨·‘的、, 則將^旗標設為1,否則為〇,並且在中繼節點攔位中記錄 傳遞節點的位址,然後將封包送出。1306707 jade, invention description (15) is 1 〇 rule 2 'except for nodes according to rule i, if there are members belonging to the transfer node set to 1 in the child node image will be:; two branches together, according to the rules 3. If there is a /70 in the member list, the bit 70 is 1. If it is set to 1, the first bit of the upper flag is set to record the address of the transmitting node, and the packet = I is in the middle and the dusty spot. =: Set the section to pass the packet; The situation of the sender. Bit judgment), and the child node image is transferred at twelve points (the bit of the node of the branch by the relay node is set to i when the bit is set to i: the member node is not in the delivery node faster 70.... The branch point of the node is located at the branch point and belongs to point two. Then, the address of the point that is transmitted is recorded in the relay node block, and the packet is sent out. Rule 5, if the received packet is forwarded by the child node, and the flag is sent For 1 ', the first bit in the list of bins is not the point of the node. 丨 Set the first bit of the node of the bit, ... to i, instead of the bit; The node that points but belongs to the child node of the delivery node sets its first bit to 1, and sets the bit of the node representing the branch to 1 in the child node image. If there is the first one in the member node If the bit is not set to 丨·', the ^ flag is set to 1, otherwise it is 〇, and the address of the delivery node is recorded in the relay node block, and then the packet is sent out.

0213 .从〇41〇實(犯);咖 179;ALEXCHEN.ptd 第19頁 1306707 ^五-、發明說明(17) 根據規則5,節點” ]n" > 員列表中第一個位元·氣付合其所定義之規則,此時成 "1 3 2丨,。茈而狄机 為1的節點有節點丨'3. I 2丨,與節點 此兩即點均不位於節點"ι〇"的快取 均為 其子印點,故將成員列表中 ,, 的第一個位元設為i,並良^點/.3.1.2與即點I3·2 (代表節點”.3”將:郎點映像的第三個位元 )的方^逮打,例f無線網路中利用點對點傳輸(Ad Hoc a地/且卞I 動裝置之間的連線’而無需透過無線 路中:隨叢聚式的樹狀架構。而在該 能,可以降低連線網路二=!,,加)” 負擔的工作量。 …的》…進而減輕裝置所的 PP - ί ί t發明已以較佳實施例揭露如上,然其並非用以 ϋΓ丄任何熟習此技藝者,在不脫離本發明之精神 ^靶圍内,g可作各種之更動與潤飾,因此本發明之保護 祀圍當視後附之申請專利範圍所界定者為準。0213. From 〇41〇实(犯); 咖179;ALEXCHEN.ptd Page 19 1306707^五-, invention description (17) According to rule 5, node "]n">> the first bit in the list The gas meets the rules defined by it, and at this time it becomes "1 3 2丨, and the node with the machine is 1 has a node 丨'3. I 2丨, and both nodes are not located at the node" The cache of ι〇" is its sub-print, so the first bit in the member list, is set to i, and the good ^ point /.3.1.2 and the point I3 · 2 (representing the node) .3 "will: the third bit of the lang dot image" is captured, for example, the point-to-point transmission in the wireless network (Ad Hoc a ground / and the connection between the devices) without passing through No line: With a clustered tree structure, in this energy, you can reduce the workload of the connection network 2 =!, plus). The invention of the present invention has been disclosed above by way of a preferred embodiment, but it is not intended to be used by any person skilled in the art without departing from the spirit of the invention. Various modifications and refinements are possible, and the scope of the invention is defined by the scope of the appended claims.

13.06707 圖式簡單說明 【圖示簡單說明】 第1圖係顯示習知主從式架構的示意圖。 第2圖係顯示本發明實施例之點對點傳輸無線網路的 架構不意圖。 第3圖係顯示本發明實施例之一行動裝置加入或產生 一無線網路樹狀結構時之定址程序的步驟流程圖。 第4圖〜第6圖係顯示本發明實施例之實做縮短路由路 徑的示意圖。 第7A、7B圖係顯示本發明實施例之一行動裝置加入或 ®離開另一行動裝置之示意圖。 第8圖係顯示本發明實施例之一行動裝置加入或離開 另一行動裝置之實做過程的步驟流程圖。 第9圖係顯示本發明實施例之行動裝置間之群組通訊 的示意圖。 【主要元件符號說明】 11 0〜伺服器 1 3 0〜應用程式 A、B、P〜節點 t (1). . ( 5)〜操作13.06707 Simple description of the diagram [Simple description of the diagram] Figure 1 shows a schematic diagram of a conventional master-slave architecture. Figure 2 is a schematic diagram showing the architecture of a point-to-point transmission wireless network in accordance with an embodiment of the present invention. Figure 3 is a flow chart showing the steps of an addressing procedure when a mobile device of a embodiment of the present invention joins or generates a wireless network tree structure. 4 to 6 are schematic views showing the actual shortening of the routing path in the embodiment of the present invention. 7A, 7B are diagrams showing the addition of a mobile device or the removal of another mobile device in one embodiment of the present invention. Figure 8 is a flow chart showing the steps of the actual process of joining or leaving another mobile device of one of the embodiments of the present invention. Fig. 9 is a view showing the group communication between the mobile devices of the embodiment of the present invention. [Main component symbol description] 11 0~Server 1 3 0~Application A, B, P~node t (1). . ( 5)~Operation

0213 -A40410TfF(N2);K93179;ALEXCHEN.p t d 第22頁0213 -A40410TfF(N2);K93179;ALEXCHEN.p t d第22页

Claims (1)

•13.06707 • * — '六-、申請專利範圍 、1 · 一種在無線網路環境下 法,其利用一點對點連線方 多點連線互動環境的方 括下列步驟: 、思立—階層叢集式網路,包 &供一第一節點; 上述第一節點在等待一任立 出訊息而偵測到具有一第二二τ間後,以廣播的方式發 上述第-節點發出一力::=之-第二節點; 上述第二節點在收到上,%、給上述第二節點; 點一確認訊息;以及 ,入訊息時回覆上述第一節 上述第一節點根據上述 址,並且發出一加入確認訊魚二訊息選擇一第—邏輯位 上述第一邏輯位址,從而形=γ上述第二節點以確認取得 2.如申請專利範圍第】「 述階層叢集式網路。 境的方法,其中,上述第〜浐述的建構多點連線互動環 息之步驟更包括下列步驟:Ρ點以廣播的方式發出上述訊 上述第一節點以廣播的方 存在具有邏輯位址之鄰居節點Υ發出上述訊息以偵測是否 、若沒有具有邏輯位址之鄰居 丨成為上述階層叢集式網路之一卜:則令上述第一節點 邏輯位址,並且令上述第〜μ根節點’定義其相對應之一 為上述階層叢集式網路之〜=點之一媒體存取控制位址成 若沒其它具有邏輯位,f碼; 播的方式發出訊息以彳貞_ 4節點,則上述第一節點以廣 節點丨 貞1在上述鄰居節點中是否存在一根 0213-A40410TWF(N2);K93179;ALEXCHEN.ptd .K.06707 申請專利範圍 右在上述鄰.居節 發出複數加入訊#级,點中存在一根節點,則上述第一節點 每一上述鄰〜' =上逃所有鄰居節點; 別回覆-確認訊2點在收到其中一上述加入訊息後,分 點分別於其回覆^ ^述第一節點,其中每一上述鄰居節 上述第-至少一邏輯位址;以及 所提供之一第三有述確認訊息選擇一第三節點 述第三節點以確: ί且發出-加入確認訊息給上 j 3.如申請第三邏輯位址。 境的方法,其令,』述第三項羅所1的建構多點連線互動環 點提供之上述邏輯位址比為:其它上述鄰居節 址。 所仵之一長度最短的邏輯位 4. 如申請專利範圍第3 r方法,其中,上述第三節點V上建述構第多點,^ :二且上述階層叢集式網路 點之父節 子郎點。 即點或上述根節點之 5. 如中請專利範圍第】項所述 境的方法,其中,上述階層叢集式的建構多點連線互動環 具有一子節點路由表與一鄰居節點:之每一節點分別 6. 如申請專利範圍第5項 由表。 境的方法,其中,根據—路由方法、盘建_構多點連線互動環 點路由表與上述鄰居節點路由 /、每—節點之上述子筘 節點傳遞至一目的節點。由表,將-資料封包由ί:: 7_如申請專利範圍第6項所述的建構… ____ 夕點連線互動環• 13.06707 • * — 'Six-, patent coverage, 1 · A method in a wireless network environment that utilizes a point-to-point connection and multi-point connection interactive environment. The following steps are taken: a network, a package & for a first node; the first node, after waiting for a standing message to detect that there is a second and a second τ, broadcasts the first node to issue a force::= - the second node; the second node receives the %, gives the second node; points a confirmation message; and, when the message is received, replies to the first node, the first node according to the address, and sends a join Confirming that the message 2 selects a first logical address of the first logical address, and thus the shape = γ of the second node to confirm the acquisition. 2. For the scope of the patent, the method of the hierarchical cluster network. The step of constructing the multi-point connection interactive loop of the above-mentioned narration further includes the following steps: the 发出 point broadcasts the above-mentioned message to the first node, and the neighboring party has a logical address neighbor. Clicking on the above message to detect whether, if there is no neighbor with a logical address, it becomes one of the above-mentioned hierarchical cluster networks: then the first node logical address is set, and the above-mentioned ~μ root node is defined One of the corresponding ones is one of the above-mentioned hierarchical cluster networks. The media access control address is such that if there is no other logical bit, the f code; the broadcast mode sends a message to the 彳贞 4 node, then the above Whether a node has a wide node 丨贞1 in the neighboring node, whether there is a 0213-A40410TWF (N2); K93179; ALEXCHEN.ptd.K.06707 patent application scope right in the above-mentioned neighbor. If there is a node in the point, then each of the above-mentioned first nodes omits all the neighbors of the neighbors~' = replies - the confirmation message 2 points after receiving one of the above-mentioned join messages, the points are respectively replied to them ^ ^ a first node, wherein each of the neighboring nodes is the first-at least one logical address; and a third acknowledgement message is provided to select a third node to describe the third node to confirm: 发出 and send-add confirmation message Give j 3. For example, if the third logic address is applied for, the method of the environment, the order of the above-mentioned logical address provided by the construction of the multi-point connection interactive loop point of the third item is: the other neighbors' sites. The shortest logical bit of 4. The method of claim 3, wherein the third node V constructs a multi-point, ^: 2 and the parent node of the hierarchical cluster network point. 5. The method of claim 5, wherein the hierarchical multi-point connection interaction loop has a child node routing table and a neighbor node: The nodes are respectively 6. As shown in the fifth paragraph of the patent application scope. The method according to the method, wherein the routing method, the disk construction method, the multi-point connection interactive ring routing table, and the foregoing neighbor node routing/, the above-mentioned child nodes of each node are delivered to a destination node. From the table, the data packet is composed of ί:: 7_ as described in the scope of claim 6... ____ 夕点线互动环 0213-A40410TWF(N2);K93179;ALEXCHEN.ptd 第24頁 -------- “、申請專利範圍 境的方法,甘 點自一冰 /、令’於上述階層#隹a 則;5 #來源節點接收到一資粗f集式網路中,當一第四節 址热二子缔點路由表與鄰居二包,根據上述第一路由規 、,仃—最長表頭比對(L即點路由表中所包含的邏輯位 县^根據比較結果將上 pref ix Match )操作, 長度之-節點。 貝料封包傳遞至具有-最長表頭 产的t如申請專利範圍第7項所、+- 兄、、、法,其中,當上述第、也的建構多點連線互動環 f上述目的節點且做為上述=二點欲傳遞上述資料封包至 f具有上述目的節點的四:點之鄰居節點的-第五節 即點的資訊告知上述第四節點。1上述第五節點將上述目的 9.如申請專利 境的方法,其中,每一上 所述的建構多點連線互動環 )述目的節點與行經之路由:::土述資料封包欲送達之 (Cache)中,以供後來傳遞的至其路由快取 10·如申請專利範圍第丨項所資/4封包存取。 境的方法’其t ’上述第_ 構多點連線互動環 第-與第二節點之識別碼,、第-邏軏位分別表示為上述 點’且上述第-節點定期與上述第郎點的父節 之操作。 郎點執行註冊與更新 12·如申請專利範圍第u項 環境的方法…,當的1構夕點連線互動 為 點欲使—第五節點成 1M1 第25頁 〇213-A40410TWF(N2);K93179;ALEXCHEN.ptd 、上:第ίί=:第二節點執行-位址釋放操作, =意的方如法申,^利範圍第^項所述的建構多點連線互動 第未向上述第2 r點:上述第一節點在經過一既定時間後 箪二節點主ί: 執打上述註冊與更新之操作,列上i 14主動執行上述位址釋放操作。 則上述 境的方法11,申Λ專利p範圍第1項所述的建構多點連線互動環 挺,且—Μ ~ 述階層叢集式網路包括一多點## # 丨步顿:-六節點加入上述多點傳播群組之流 執行1映:^表:上述多點傳播群組所包含之邏輯位址 上述第::Vi而取得一對映所得邏輯位址;以及 註冊,且上有上述對映所得邏輯位址之-節點 15.如申义點上貝維護上述第六節點之註冊資料。 環境的方法Λ中乂圍t第:乂項所述的建構多點連線互動 父節點負責維護1述;在1由上述節點的 延第六即點之註冊資料。 環境的方V,”中利$?胸 點之註冊資料自上述;士 =:= ’則將上述第六節 六節點。 ’、.’々乂卽點必須轉移給上述第 Τ 上这第六卽點離開卜:;+,文Υ击城μ , 之流程包括下列步驟: 上4多點傳播群組0213-A40410TWF(N2); K93179;ALEXCHEN.ptd Page 24-------- ", the method of applying for the scope of the patent, Gan points from an ice /, order 'in the above-mentioned class #隹a then; 5 #Source node receives a large-funded f-set network, when a fourth-node hot two-sub-node routing table and neighbor two packets, according to the above first routing rule, 仃 - the longest header comparison (L The logical bit count contained in the point routing table ^ will be operated on the pref ix Match ) according to the comparison result, and the length of the node will be transmitted to the t with the longest header, as in the seventh item of the patent application scope, + - brother,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, The information of the node-the fifth node is the fourth node. The above fifth node will be the above purpose. 9. The method of applying for a patent, wherein each of the above-mentioned constructed multi-point connection interaction rings is described. The destination node and the route of the route::: the data packet to be delivered (Cache), For later delivery to its routing cache 10 · as requested in the scope of the patent application / 4 packets access. The method of the environment 'its t 'the above _ structure multi-point connection interactive ring - and the second node The identification code, the first-logic position is respectively represented as the above-mentioned point 'and the above-mentioned first-node is periodically operated with the parent node of the above-mentioned first lang. The execution of the registration and update of the lang point is as follows. Method..., when the 1st eve connection interacts with the point desire - the fifth node becomes 1M1 page 25 〇213-A40410TWF(N2); K93179; ALEXCHEN.ptd, upper: ίί=: second node execution - Address release operation, = the intended party is like the law application, the construction of the multi-point connection interaction described in the second item is not to the second point 2 r: the first node is after a predetermined time The main ί: The operation of the above registration and update is performed, and the i 14 actively performs the above address release operation. The method 11 of the above-mentioned environment, the construction of the multi-point connection interactive ring described in the first item of the patent p range , and -Μ ~ The hierarchical cluster network includes a multipoint ## #丨步顿:-six nodes Joining the above-mentioned multicast group flow execution 1 mapping: ^ table: the logical address included in the above multicast group: the above::Vi to obtain a pair of mapped logical addresses; and registration, and the above The logical address of the mapping is obtained - node 15. If the Shenyi point is above, the registration data of the sixth node is maintained. The method of the environment is the construction of the multi-point connection interaction parent node described in the item: Maintenance 1; in 1 by the above-mentioned node's extension of the sixth point of the registration data. The party V of the environment, "Zhongli $? The registration information of the chest point is from the above; the judge =:= 'The sixth node of the above sixth section. ',.' The point must be transferred to the above sixth.卽点从卜:;+,文Υ城μ, the process includes the following steps: Up 4 multi-cast group 0213-Α40410TWF(Ν2);K93179;ALEXCHEN.p td 第26頁 13.06707 六-、申請專利範圍 利用上述雜溱表 址執行一對映操作從,傳播群組所包含之邏輯位 上述第六節點向…寸對映所得邏輯位址,_ 及 P點向其父節點執行—取消註冊之動作;以 二主m上述第,、即點向擁有上述對映所、®轱 s主冊。 所仵邏輯位址之一節點 户供1 8’如申睛專利範圍第1 4項所述的绪接夕 %埦的方法,其中,於一 攻的建構多點連線互動 映像、序號、中繼節點以及成員二:J供上旗標、子節點 節點根據上述襴位於 j表4攔位,且上述第六 包。 Μ多點傳播群組中轉送一資料封 19·如申請專利範圍第“項 %境的方法,其中,# μ、+. # 4的建構多點連線互動 則在ρ卞士。 述第六節點為一封包僂详r·朴 貝」在上述成貝列表内所記錄之 J匕傳达即點, 點記錄於上述第六節點之-快取令任-成 取中之成員節點的第-個位元設為!。 將母-上述快 環境申===述的建構多點連線互動 :外二如果有屬於上述傳送節點:述成員節 述子節點之邏輯位址的第—個 ”· ,則將上 六f點所屬分支,則將上述子節::二,;^述第 之節點的位元設為i。 將代表上述分支 21."請專利範圍第2〇項 環境的方法,其中,若上M + g ± i傅夕^運線互動 右上迷成貝列表中還有至少—成員節 0213-A404107?F(N2);K93179;ALEXCHEN. ptd 第27頁 1306707 六-、申請專利範圍 個位元未被設,則將上述上旗標欄位吸為工, ,-後1上述中繼節點中記錄上述第六傳遞位 2 ·如中請專利㈣第14項所述的建構多 方法…,若上述第六節點非為一專線 點虽收到的封包由上述第六節點的父節點 述子節點映像中根據上述第六節點八:送,且在上 =節點的位元設為"夺,則計算第—個:表此分$ 即點中,不在一封包傳送節點之快取中的成、、、i上述成貝 >上述封包傳送之子節點所在分支,於上:即點且屬於 代表上逃分支之節點的位元設為丨,缺即點映像中將 攔位中記錄上述封包傳送節點的位址,、、。在上述中繼節點 23. 如申請專利範圍第22項所述的 環境的方法,其中,若上述資料封包係夕工點連線互動 且上旗標設為丨,則計算在上述成員列 子節點轉送, 為1的成員節點,將位於上述封包傳送:第一個位元不 點的第一個位元設為丨,而非位於上述.勺=快取中之節 取中的節點但屬於上述封包傳送節點之專送節點之快 將其第一個位元設為〗,並且於上述子r即點的節點,則 上述子節點分支之節點的位元設為丨。卩4映像令將代表 24. 如申請專利範圍第23項所述的 環境的方法,其中,若上述成員節點中 夕點連線互動 被設為1的的節點,則將上述上旗標設、第一個位元未 繼節點攔位中記錄上述封包傳送節點的、位並且在上述中0213-Α40410TWF(Ν2); K93179;ALEXCHEN.p td Page 26 13.06707 VI-, the scope of the patent application uses the above-mentioned choke table to perform a pair of mapping operations, from the logical group contained in the propagation group to the sixth node to... The logical address obtained by the inch mapping, _ and P point are executed to the parent node - the action of canceling the registration; the second master m is the above, that is, the point is to have the above-mentioned mapping, the ® s main book. One of the logical addresses of the node is for the method of the first-order 夕 埦 埦 如 如 申 申 申 申 申 申 申 申 申 申 申 申 申 申 申 申 申 申 申 申 申 申 申 申 申 , , , Following node and member two: J is provided with a flag, and the child node is located at j table 4 according to the above ,, and the sixth packet is. In the multi-point communication group, a data seal is sent. 19. For example, the method of applying for the patent scope "item%", in which the construction of multi-point connection of #μ, +. #4 is in the 卞 gentleman. The node is a packet, r·Pubei, and the J recorded in the above-mentioned list of bins is transmitted, and the point is recorded in the sixth node - the cache node - the member node of the acquisition - One bit is set! . Constructing a multi-point connection with the parent--the above-mentioned fast environment application===: If there is a first one belonging to the above-mentioned transfer node: the logical address of the member node, then the upper six f Point to the branch, then the above subsection:: 2,; ^ said the node of the node is set to i. Will represent the above-mentioned branch 21. " please patent the scope of the second item of the environment, where if the upper M + g ± i Fu Xi ^ transport line interaction right upper fan into the list of at least - member section 0123-A404107? F (N2); K93179; ALEXCHEN. ptd page 27 1306707 six -, the scope of the patent application is not If it is set, the above-mentioned upper flag field is sucked into the work, and then - the above-mentioned relay node records the sixth transfer bit 2 as described in the above-mentioned patent (4) item 14 The sixth node is not a private line point, although the packet received by the parent node of the sixth node is sent according to the sixth node eight: and the bit of the upper node is set to " Calculate the first one: the table is divided into $, that is, in the cache of a packet transfer node, i is the above-mentioned bin> the branch of the child node transmitted by the above packet, and the bit of the node that belongs to the node that is the branching branch is set to 丨, and the bit of the packet transmitting node is recorded in the spot image in the missing point image. The method of the above-mentioned relay node 23. The environment according to claim 22, wherein if the data packet is connected to the work point and the upper flag is set to 丨, the calculation is performed at The member node sub-node forwards, the member node of 1, will be located in the above packet transmission: the first bit of the first bit is not set to 丨, instead of being located in the above-mentioned scoop=cache The node but the special node of the above-mentioned packet transfer node sets its first bit to 〗, and at the node of the above-mentioned child r, the bit of the node of the child node is set to 丨. The image order will represent the method of the environment as described in claim 23, wherein if the node node in the above member node is set to a node of 1, the upper flag is set, first One bit does not follow the node block The above-described packet transmission node, and bits in the above 0213-A40410TWF(N2);K93179;ALEXCHEN.ptd 第28頁0213-A40410TWF(N2); K93179;ALEXCHEN.ptd第28页
TW94106022A 2005-03-01 2005-03-01 Methods for constructing multi-point-link interactive environments using based on point-to-point connections in wireless networks TWI306707B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
TW94106022A TWI306707B (en) 2005-03-01 2005-03-01 Methods for constructing multi-point-link interactive environments using based on point-to-point connections in wireless networks
JP2006012452A JP4219366B2 (en) 2005-03-01 2006-01-20 Method and system for constructing multipoint link interactive environment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW94106022A TWI306707B (en) 2005-03-01 2005-03-01 Methods for constructing multi-point-link interactive environments using based on point-to-point connections in wireless networks

Publications (2)

Publication Number Publication Date
TW200633430A TW200633430A (en) 2006-09-16
TWI306707B true TWI306707B (en) 2009-02-21

Family

ID=37052313

Family Applications (1)

Application Number Title Priority Date Filing Date
TW94106022A TWI306707B (en) 2005-03-01 2005-03-01 Methods for constructing multi-point-link interactive environments using based on point-to-point connections in wireless networks

Country Status (2)

Country Link
JP (1) JP4219366B2 (en)
TW (1) TWI306707B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI552544B (en) * 2008-09-18 2016-10-01 Chunghwa Telecom Co Ltd Multi-frequency wireless identification transmission control architecture and its method
TWI410077B (en) * 2009-04-14 2013-09-21 Univ Nat Chiao Tung Method of Wrapping Method and Winding Path in Wireless Network Environment
TWI419052B (en) * 2011-01-06 2013-12-11 Univ Nat Taiwan Virtual system of mobile device and virtual method thereof
CN103581931B (en) * 2012-09-27 2017-04-05 深圳友讯达科技股份有限公司 A kind of network-building method, equipment and system

Also Published As

Publication number Publication date
JP2006246441A (en) 2006-09-14
TW200633430A (en) 2006-09-16
JP4219366B2 (en) 2009-02-04

Similar Documents

Publication Publication Date Title
Kulik et al. Negotiation-based protocols for disseminating information in wireless sensor networks
US20060104210A1 (en) Dynamic network management
CN102364977B (en) For running the method for the wireless interconnected data network with multiple network node
CN105721311A (en) System and method for efficient name-based content routing using link-state information in information-centric networks
KR20150091880A (en) Method and Apparatus for communicating contents based on ICN in mobile Ad-hoc Network
CN103119964B (en) Information in wireless communication system selects
US10530685B2 (en) Named data routing protocol for low-power and lossy wide-area networks (NRPL)
CN101431476B (en) Data transmission method based on message queue, server and system
KR20050081846A (en) Method of multicast in zigbee network
JP2009508410A (en) Parallel execution of peer-to-peer overlay communication using multi-destination routing
CN103119979A (en) Information distribution in a wireless communication system
EP3200404B1 (en) Content-centric network on-demand distance vector route method
CN103825826B (en) The implementation method and device of a kind of dynamic routing
JPWO2006103719A1 (en) Multicast communication method
CN109511151B (en) Networking method and communication method of star networking
CN103081529A (en) Information dissemination in a wireless communication system
TWI306707B (en) Methods for constructing multi-point-link interactive environments using based on point-to-point connections in wireless networks
JP4607764B2 (en) Mobile peer-to-peer network construction
JP2014131186A (en) Routing control method, information processing apparatus, and program
Dong et al. On the cache-and-forward network architecture
JP2006279937A (en) Wireless base station, wireless terminal, and wireless access network
KR100759312B1 (en) Link recovery method for hierarchical routing over lowpan
TW201025938A (en) Wireless communication networks and routing methods
JP5424818B2 (en) Route control method, node, and communication system
Wang et al. Ad hoc on-demand backup node setup routing protocol