WO2005053233A1 - Vorrichtung und verfahren zur einrichtung von ad-hoc netzwerken - Google Patents
Vorrichtung und verfahren zur einrichtung von ad-hoc netzwerken Download PDFInfo
- Publication number
- WO2005053233A1 WO2005053233A1 PCT/EP2004/008216 EP2004008216W WO2005053233A1 WO 2005053233 A1 WO2005053233 A1 WO 2005053233A1 EP 2004008216 W EP2004008216 W EP 2004008216W WO 2005053233 A1 WO2005053233 A1 WO 2005053233A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- network
- data
- information
- network element
- network elements
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/02—Communication route or path selection, e.g. power-based or shortest path routing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/12—Shortest path evaluation
- H04L45/122—Shortest path evaluation by minimising distances, e.g. by selecting a route with minimum of number of hops
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/12—Shortest path evaluation
- H04L45/124—Shortest path evaluation using a combination of metrics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/20—Hop count for routing purposes, e.g. TTL
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/02—Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
- H04W8/08—Mobility data transfer
- H04W8/087—Mobility data transfer for preserving data network PoA address despite hand-offs
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/26—Network addressing or numbering for mobility support
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W80/00—Wireless network protocols or protocol adaptations to wireless operation
- H04W80/04—Network layer protocols, e.g. mobile IP [Internet Protocol]
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Definitions
- the invention relates to a network element for setting up wireless networks for wireless data exchange between network elements and network users, the network element having a transmitter / receiver unit for wireless transmission and reception of data, a control unit for controlling the processing of data and a data memory.
- the invention also relates to a method for setting up wireless networks for data exchange between network elements and network users and a network with network elements for setting up wireless networks for network users.
- Mainly so-called network elements serve as wireless access points for mobile network users (laptop users with WLAN cards).
- the number of network users per network element is limited, since otherwise the data transfer rate per network user is too low.
- a network element only covers a very limited space for wireless network access (radius of approx. 300m) and only if there is a direct line of sight between the network element and the mobile network user.
- a conventional network element serves as a wireless interface to the Internet.
- the connection to the Internet is provided by an internet service provider. This results in a point-to-multipoint network topology, which covers a very limited area with wireless network access and only for mobile network users with a direct line of sight. is useful. If the network elements fail, network access is no longer possible, i.e. There is no security against failure. Even if the Internet connection of the Internet service provider fails, there is no failure protection for the network user, since this is the only access point to the Internet.
- the invention has for its object to provide a network element, a network and a method aimed therefor, which offers a more extensive, more readily available, more convenient network access, improved network access options for mobile network users and improved network properties.
- control unit is designed to evaluate connection route information and connection quality information for data exchange between network elements and network users, to determine partial sections of data transmission routes or complete data transmission routes for transmitting or forwarding data, the Link information the number of network work elements and the neighborhood relationships of the network elements of the network and the connection quality information indicates the nature of the connection between network elements and network users.
- the object is also achieved according to the invention by a method of the type mentioned at the outset, with the steps: exchange and storage of link information and connection quality information of the network elements to one another and the network user to the network elements, evaluation of the link information and connection quality information, exchange of data between network elements and network users, based on the link information and connection quality information, by sending data by a first network user to a nearby network element, receiving the data by the network element and forwarding the data to a neighboring network element in the direction of the addressed second network user or the addressed network users themselves, via a data transmission route determined from the connection quality and link information e or a section of a data transmission route.
- the object is also achieved according to the invention by a network of the type mentioned at the beginning, with network elements according to the invention for setting up wireless networks for network users according to a method according to the invention, the data exchange between two or more network users always using at least one network element and on the basis of the connection quality. and the link information takes place.
- the method according to the invention offers numerous advantages.
- the constant exchange of information about the nature of the network is particularly beneficial.
- the data from network elements located further away are always passed on to neighboring network elements. is passed and each network element supplements the information until each network element carries the entire information corresponding to the complete topology of the network. This means that each network element can directly calculate a route through the network. This results in optimal decentralization.
- the computing capacity is not used up centrally, but always at the location where the data to be transferred is.
- the aforementioned properties and features of the network element according to the invention make these advantages possible and even more favorable.
- Data within the meaning of this application and within the meaning of the claims comprise any form of data and / or information, in particular control, video, audio, synchronization, initialization, error correction, error detection, modulation, coding information or data; to name just a few examples and all other information and data.
- Neighborhood relationship in the sense of this application means the existence, the nature, quantity and quality of the data communication channels of network elements according to the invention to one another.
- a neighborhood relationship can result from the spatial arrangement, but is not limited to this.
- network elements can also be adjacent in the sense of this application if one or more further network elements are spatially arranged between them. The focus is on the possibility of being able to establish an electromagnetic connection.
- a neighborhood relationship can also change due to interference.
- Connection quality information denotes all qualitative features of one or more connections, in particular also over a longer period of time. This may include the spatial distances, the quality of the connection measured as a signal-to-noise ratio (SNR) and much more.
- SNR signal-to-noise ratio
- the network element according to the invention is far superior to conventional WLAN solutions not only in technical but also in economic terms. Compared to previous solutions for creating a network infrastructure, the costs for setting up and expanding any network access zone are reduced. The self-organization of the network and the almost complete elimination of further wiring measures make it possible to achieve drastic cost savings. Due to the flexible and decentralized structure of a network access zone, the area and performance can be expanded simply by adding further network elements according to the invention. The planning of the network and expensive infrastructure measures can thus be almost completely dispensed with.
- the control unit is preferably designed to evaluate connection route information and connection quality information stored in the data memory and optionally or simultaneously in the connection route information and connection quality information contained in the data intended for data exchange.
- the network element can contain data that only arise when the data is transmitted, e.g. how many so-called hops (jumps between network elements) have already taken place, combine with the information present in the network element and use it to calculate a route that is still cheap, or find out new things about the network topology Metaphorically speaking, it is like a traveler reporting on his trip or the region he has traveled to.
- connection route information stored in the data memory contains the number of network elements and the number of network elements. Relationships between the network elements of the entire network and the connection quality information indicates the nature of the connection between network elements and network users of the entire network. This means that each network element contains or receives all the necessary information for calculating a complete data transmission route through the network and is therefore completely self-sufficient.
- the network element according to the invention preferably has data storage with authentication information which is present only once for each network element and is stored in a fixed data storage, and the control units are designed in such a way that the authentication information is transmitted to other network elements by means of the transceiver units and evaluate the authentication information sent by other network elements to check the authorization of the other network elements of the network for data exchange in the network.
- the authorization e.g. certificate of a certification authority
- the authorization is checked automatically by the network elements according to the invention itself. As a result, no such measures are required by the user when setting up the network.
- the data memory of a network element preferably has unique authorization information, in particular address information which is characteristic of each network user and each network element in the network, and the control unit is designed to assign the authorization information to other network elements by means of the transceiver units transmitted and to evaluate the authorization information sent by other network elements to determine data transmission routes or sections of data transmission rates in the network. This enables so-called "roaming" of network users
- the network user always has the same address within the network via which the data exchange with him is carried out. For the network The network also always has the same address. The network user can thus move from network element to network element and can continuously receive and send data.
- the network element preferably has a first transmitter / receiver unit for data exchange between network elements and a second transmitter / receiver unit for data exchange between network elements and network users.
- the data for communication between network users and network elements are processed separately.
- the resources bandwidth, radio channels
- Coupling means for coupling the network element for data exchange with a second network are preferably arranged on a network element according to the invention.
- a second network in particular a non-wireless infrastructure network such as the Internet
- Coupling means for coupling the network element for data exchange with a second network are preferably arranged on a network element according to the invention.
- This enables access to the infrastructure network by means of each network element according to the invention.
- the bottlenecks of existing concepts can be eliminated with the network according to the invention, because practically unlimited network elements according to the invention can be combined to form a network.
- the network element according to the invention for supplying electrical energy has coupling means for coupling with several different energy sources, in particular with solar cells.
- the network element according to the invention can achieve maximum autonomous operation and is independent of individual energy providers.
- the network element according to the invention also supplies energy by means of the coupling means for data exchange for a non-wireless infrastructure network, in particular an Ethernet connection. is cash. This eliminates the need for an additional wired connection.
- the transceiver units are designed according to one or more of the standards IEEE 802.11 a, IEEE 802.1 1 b, IEEE 802.11g.
- the network element according to the invention preferably also has one or more WLAN PCI cards according to one or more of the standards IEEE 802.11a, 802.11 b, 802.11g, volatile and non-volatile memories, in particular SDRAMs or flash memories, a microprocessor or microcomputer unit or programmable logic modules, Components for regulating and controlling the power loss and the energy sources and two antennas, each for data exchange between network users and / or network elements.
- IEEE 802.11a, 802.11 b, 802.11g volatile and non-volatile memories, in particular SDRAMs or flash memories
- a microprocessor or microcomputer unit or programmable logic modules Components for regulating and controlling the power loss and the energy sources and two antennas, each for data exchange between network users and / or network elements.
- a preferred method step according to the invention for setting up an ad hoc network in finding network elements and network users by wirelessly receiving and sending connection requests, and further steps in checking the authenticity of the network elements found by evaluating a sent authenticity information in order to determine the authorization for data exchange and storage of the authorization information determined therefrom and unique authorization information, in particular address information of network elements and network users, in the transmission, reception, assignment and storage in the network.
- Network users are advantageously moved from the transmission / reception area of a first network element into the transmission / reception area of a second network element as a function of the connection quality information and the connection route information while maintaining the pass unique authorization information assigned to the network user. This gives network users optimal communication capacities and optimal freedom of movement in the network.
- the transfer of a network user from a first to a second network element is preferably accomplished by providing a predefined, limited number of authorization information for network users, which is the same in all network elements, discovering an association event by a network element which indicates that a network user is within the transmission / reception range of a network element is arranged, comparing the transmitted authorization information with the predefined, known authorization information, evaluating the comparison to determine whether it is an external or already known network user, assigning authorization information if an external network user has been determined, transmit the connection routes and / or connection quality information relating to the network user to the network elements of the network and transmission of authorization information to de n Network user, which is characteristic of the network, in particular address information for data transmission.
- Network elements are preferably added to the transmission / reception areas or the network access zone of the network elements already arranged in the network in order to increase the data transmission rates of connection paths and improve the reliability of the network. This results in a high level of redundancy in the network.
- the transmission rates can be increased. If a network element according to the invention fails, the connection can be taken over by a nearby network element.
- the data transmission rate and the data transmission security are increased by preferably coupling a plurality of network elements to a second network, in particular a non-wireless infrastructure network such as the Internet.
- a network according to the invention has network elements according to one of claims 1 to 11 and a method according to one of claims 12 to 20, wherein the data exchange between two or more network users is always at least by means of a network element and on the basis of the connection quality and the link information Network elements are done.
- FIG. 1 shows a schematic illustration of a conventional network
- FIG. 2 shows a schematic illustration of a conventional network using WDS technology
- FIG. 3 shows a schematic representation of a network according to the invention with network elements according to the invention
- FIG. 4 shows a schematic representation of a network according to the invention and network elements according to the invention in a detailed representation
- FIG. 5 shows a schematic representation of a network according to the invention and the associated network access zone
- FIG. 6 shows a schematic illustration of two network elements according to the invention and the associated network access zone
- FIG. 7 shows a schematic illustration of seven network elements according to the invention and the associated network access zone
- FIG. 8 shows a realistic scenario in a schematic illustration of a network according to the invention
- FIG. 9 shows a schematic representation of a runtime model of a network according to the invention.
- Figure 10 is a schematic view of a static model of a ER- 'inventive network
- FIG. 11 shows a further schematic illustration of the static model from FIG. 10,
- FIG. 12 shows a dynamic model in a schematic representation of a network according to the invention
- FIG. 13 shows a schematic representation of the data communication between two network users in a network according to the invention
- FIG. 14 shows a schematic representation of the communication of network users with an infrastructure network in a network according to the invention
- FIG. 15 shows a schematic representation of the communication of two networks according to the invention connected by an infrastructure network and two network users
- FIG. 16 shows a schematic illustration of the hardware structure of a network element according to the invention
- FIG. 17 shows a schematic illustration of the typical outer housing shape of a network element according to the invention
- FIG. 18 shows a schematic representation of the architecture of a computer program for a network element according to the invention
- FIG. 19 shows a schematic illustration of the link discovery protocol and link state protocol in a network according to the invention.
- FIG. 20 shows a data architecture in the link state protocol for network elements of a network according to the invention
- FIGS. 21-24 show schematic representations of a roaming process of a network user in a network according to the invention
- FIG. 25 shows a multipoint-to-multipoint connection in a network according to the invention
- FIG. 26 shows a graphic representation of a hotspot
- Figure 27 is a pictorial representation of the network element according to the invention as a WLAN adapter and
- FIG. 28 shows a comprehensive illustration of the possible applications and uses of the network element according to the invention and of the network according to the invention.
- FIG. 1 shows the scenario which is used using commercially available network elements 5.
- This scenario is also referred to as a "hotspot".
- a hotspot is a spatially limited area in which wireless WLAN access (WLAN network, 3) is possible for network users 2.
- the conventional network element 5 is connected to the "Internet” 4 by means of an interface , The conventional network element 5 creates a spatially limited area of the wireless network access 3. In this area it is possible for network users 2 to gain wireless access to the network or to the “Internet” 4.
- Network users are devices such as laptops or PDAs (Personal Digital Assistant), equipped with a WLAN interface that is compatible with the standard of WLAN 3 used (IEEE 802.11b, IEEE 802.11g, IEEE 802.11a) .Wireless network access outside of network 3 is not possible.
- FIG. 2 expands the representation of the functionality of FIG. 1 with regard to the spatial coverage of the network 3.
- Commercially available network elements 5 with WDS functionality make it possible to combine up to 10 network elements 5 and thus the spatial extent of the network 3 to increase.
- the WDS functionality corresponds to a wireless bridge between the network elements 5.
- the network elements 5 are configured as a bridge.
- a network element 5 is configured as a gateway to the network or “Internet”.
- To achieve a greater number of network elements 5 and thus a greater spatial coverage with the network 3 can only be achieved by means of additional installation effort by adding wired network connections and additional devices. This considerably limits the installation options for the network elements 5, since the cable-bound network infrastructure required for this is not available in most places for the establishment of “hotspots”.
- Network users 2 are enabled to have a wireless access to the network or within this network 3 To obtain "Internet" 4.
- FIG. 3 shows the use of the network element 1 according to the invention (also 4G Access Cube TM or 4G Access Enabler) in a network 3 according to the invention and the associated possibility of unlimited spatial expansion of the network 3 according to the invention by adding additional network elements 1 according to the invention no manual configuration of the network element 1 according to the invention is necessary since the network elements according to the invention carry out the configuration independently.
- the operating mode of the network element 1 according to the invention (“Operation Mode”) is selected automatically.
- the network 3 between the network elements 1 according to the invention is formed completely wirelessly and independently; simply by adding Network elements 1 according to the invention in spatial proximity (within the network access zone) to a network element 1 according to the invention, the network 3 is expanded.
- a large number of network accesses or accesses to the “Internet” 4 are also possible, ie if a network connection 4 is terminated, the closest connection 4 is selected independently. This has no influence on the network users 2; the change takes place completely transparent in the background. Network users 2 are enabled to gain wireless access to the network or “Internet” 4 within this WLAN 3.
- FIG. 4 shows three network elements 1 according to the invention, two network users 2, a network access to the Internet 4 and their sub-components including interactions.
- a network element 1 according to the invention consists of a logic board 100, an IO board 200, 2 WLAN boards 300 and optionally one or more extension boards 400.
- the boards are physical through a hardware interface 501, 502 - a plug connection connected with each other.
- the interface 502 is the interface which is used as a plug interface for adding extension boards 400 (for example for flash memory extensions, graphics card, etc.). Any number of extension boards 400 can be “stacked” by means of the interface 502.
- the logic board 100 consists of a CPU 101, which loads program instructions 104, which are stored in the flash memory 103, into the RAM memory 105 and executes them.
- the program instructions essentially consist of an operating system and algorithms that enable the proper functionality of the invention.
- the controller 102 takes over the management of the logic board, such as the communication to the outside via the interfaces 501 and 502.
- the IO board 200 includes the wired interfaces to the outside: Ethernet 202, USB 203 and power connection 204.
- the power supply can also be optionally the Ethernet interface 202 can be carried out (using PoE - Power over Ethernet Standard, IEEE 802.3af, which provides separate data and power transmission via an Ethernet cable). As a rule, the Ethernet interface 202 is used for the network connection to the “Internet” 4.
- the USB interface 203 enables the connection of external devices such as USB storage devices.
- the network element 1 according to the invention as a so-called network user To use adapters, for example to connect PCs 6 via the USB interface 203 and to enable access to networks 3.
- the controller 201 ensures automatic Detection, for example, of whether the power supply is carried out via the power connection 204 or alternatively via the Ethernet interface 202.
- the WLAN board 300 is coupled to the logic board 100 via the interface 502.
- a controller 302 takes on the task of controlling any additional extension board 400 which is connected to the WLAN board 300 by means of the interface 502.
- the WLAN transceiver 301 ensures the secure sending and receiving of data packets via the network 3. Separate transmitting and receiving antennas 503 increase the data throughput of the data packets via the network 3.
- the network according to the invention provides extensive area coverage with wireless network access based on one of the IEEE 802.11 standards.
- the system has a very high level of reliability due to redundancy of the network connections and self-organization of the entire network.
- the problem of the lack of visual contact between the access point and network users, caused by so-called "radio shadows", is overcome by strategically positioning the access points and organizing them themselves.
- the system consists of a large number of network elements of the same design, which are connected to each other by a wireless interface for data transmission.
- the wireless interface also connects mobile network users with the devices.
- the device itself consists of a hardware and a software part.
- the hardware consists of an IO part, a logic part and a WLAN part.
- the IO part represents the interface for the proper operation of the device.
- This includes a connection for the power supply, an Ethemet connection (which can be used as an alternative power supply for the wired network connection or additionally via PoE - Power over Ethernet) and two USB ports (USB host and USB device ce), for the operation of external devices, such as. Sound cards, memory modules, web cams, etc.
- the WLAN-Teii enables the wireless data communication of the devices of the overall system and also provides the wireless connection of the network users.
- the WLAN part can alternatively be based on one or more wireless interfaces based on different transmission technologies (IEEE 802.11a, 802.1 1b, 802.11g, etc.).
- the logic part comprises a processor and a memory unit which holds program algorithms.
- the algorithms are initialized with the data from the IO and, in particular, from the WLAN parts and executed by the processor.
- the results of the data processing are transmitted wirelessly to the nearby devices using the WLAN part.
- Each part is housed on a separate circuit board and connected to one another by a hardware interface. It is possible to add additional functionality through boards that implement this hardware interface.
- the hardware is implemented in a modular design to standardize the addition of functionality.
- the system software is optimized and adapted for the hardware platform and includes, among other things, algorithms for the provision of the basic functionality of the system.
- the algorithms are divided as follows: creation of wireless and encrypted data communication tunnels between the devices,
- the network element according to the invention is a novel, highly integrated hardware and software platform for wireless broadband networks, e.g. based on the IEEE 802.11 standards.
- the core of the network element according to the invention is preferably a RISC CPU clocked at over 500 MHz, flanked by up to 64 MB flash and 128 MB RAM as well as various interface ports such as e.g. USB.
- a Linux high stability adapted for this application was chosen as the software platform.
- the performance of the network element according to the invention is comparable to a commercially available Intel Pentium II PC with the same clock frequency. This means that there is sufficient computing power available to process protocols or time-critical applications as well as various other applications in a decentralized and redundant manner, without sacrificing sufficient power reserves for future requirements.
- two to four independent WLAN 802.11 g interfaces enable wireless transmission rates of up to 216 Mbit. This is possible for the first time thanks to a special, freely stackable MiniPCI adapter.
- the transparent routing of the authorization, authentication and metering protocols ensures controlled access for every single user at every point in the network.
- the small, cube-shaped and weatherproof housing of the network element according to the invention with the small dimensions of preferably 55 x 55 x 55 mm and the extremely low power requirement allow network access zones to be created in almost any place in the world, if necessary by using small solar cells, should no power supply be available ,
- the production-optimized design reduces the costs for the network element according to the invention.
- the network elements according to the invention are grouped independently and wirelessly to form a comprehensive network access zone (cluster) and are therefore able to overcome the spatial limits of the availability of broadband access via cable networks or central hotspots.
- Up to 4 WLAN interfaces per network element according to the invention enable transmission rates of up to 216 Mbit at present. By implementing a future IEEE 802.11 n standard with up to 180 Mbit per interface, a multiple of this will soon be possible.
- the network element according to the invention enables the establishment of an arbitrarily large area-wide network access zone for WLAN networks for stationary access or also by roaming functionality for mobile users.
- network elements according to the invention enables “real” wireless operation of WLAN hotspots. There is no need for wired Ethemet connections between the network elements according to the invention due to the limited number of possible network accesses in order to enable roaming or other infrastructure measures.
- Every network user can be guaranteed bandwidth as an absolute or percentage share of the respective available interfaces.
- each network user When fully expanded with good link quality of a network element according to the invention, each network user has an average of 2 Mbit / s gross.
- a tight network of network elements increases the "quality of service” factor and the performance of data services through the independent reorganization with the implementation of a redundant network structure.
- the network element according to the invention enables ranges of up to 400 m using omnidirectional antennas with a large opening angle and of up to 5000 m outdoors by using directional antennas with a small opening angle. Ranges of up to 100 m can be achieved indoors. By generously dispensing with bandwidth, even greater ranges can be achieved in all outdoor areas.
- Network Access Zone Network elements are grouped independently and wirelessly to form a comprehensive WLAN cluster and thus result in a network access zone.
- All network elements according to the invention of a network access zone organize themselves independently due to changes in the network topology, for example by adding or removing network elements according to the invention, always with the aspect of maximum availability and redundancy of the network structure.
- FIG. 25 shows an example of a network access zone with wireless roaming access by mobile users via standard laptops or PDAs with WLAN 802.11 standard hardware and the wired access via the Ethernet interface of a stationary user (desktop PC).
- 802.11 hotspot 802.11 hotspot
- the network elements according to the invention are 100% downward compatible with the WLAN IEEE 802.11b standard with the WLAN IEEE 802.11g standard, which is currently the most widespread among mobile users.
- the bandwidth of the network element according to the invention can currently be increased to 216 Mbit with up to four physical .1 1g interfaces.
- an expansion to .11 n standard with up to 180 Mbit per interface is planned.
- hotspots as shown in FIG. 26, this can be used particularly advantageously.
- the Ethernet interface additionally offers the possibility of supplying power to the network element according to the invention ("Power Over Ethernet” - POE). This prevents "cable clutter" between the power and network cables.
- the combination of outdoor and indoor variants of the network element results in large-scale network access zones that can take on the dimensions of entire cities.
- the use of access and billing systems (authorization, authentication and metering) in network access zones enables controlled and transparent access for mobile users at any point in the access zone.
- a network access zone is a room with size r 3 , in which wireless data transmission for mobile devices - referred to below as network users - (such as laptops, personal digital assistants (PDAs)) is equipped with WLAN technology based on one of the IEEE 802.11 standards , is possible.
- a network access zone is formed with the help of network elements, each network element according to the invention establishing a network access zone with the size r 3 .
- the spatial positioning of several network elements expands the network access zone, ie the spatial extent of the location-independent mobile data transmission (within the network access zone) is increased.
- the data throughput is increased by redundancy of the connections between the network elements and thus the general stability of the network access zone.
- WLAN interface or transmitter / receiver unit
- a WLAN interface consists of hardware components such as Chipset, antenna, software, etc. together. It serves as a wireless communication interface between computers.
- These transmitter / receiver units are already available in large numbers on the market, connected to a PC as so-called add-on devices or already as an integral part of a laptop or PDA.
- IEEE 802.11 b There are three different WLAN standards, which are already available on the market as products: IEEE 802.11 b, IEEE 802.11g, IEEE 802.11a. It should be noted that the standards with regard to the data transmission rate are different and only 802.11 b and 802.11g are compatible with each other.
- the network element according to the invention is hardware and software
- the platform consists of either 1, 2 or 4 transmitter / receiver units based on the IEEE 802.11 b, IEEE 802.11g or IEEE 802.11a standards (with selectively directed antennas and omnidirectional antennas) and is able to establish wireless connections with nearby network elements according to the invention to establish, as well as to establish wireless connections with network users.
- a network element according to the invention has a WLAN range of r 3 . Within this range, cableless data communication with another network element or network user according to the invention is possible. The sum of all network elements according to the invention result in a network access zone.
- a ' network access zone is a room with a size r 3 , in which wireless data transmission is possible anywhere in this room.
- Three different types of data transmission are distinguished within a network access zone with the spatial extent r 3 : the data transmission between two network users, - the data transmission between a network user and a network element according to the invention, and - the data transmission between a network user and any computer on the Internet.
- a quality of a connection for use for data transmission is quantified in Kbit / s or Mbit / s.
- the average SNR signal-to-noise ratio
- Bandwidth The possibility of the simultaneous transmission of data packets at a time T via a data transmission interface. Can be specified in Kbit / s or Mbit / s.
- Network element Traffic The sum of the routed data packets in a network element, which are not intended for the "local” network (for network users).
- a repeater is responsible for the transmission of radio signals.
- a router is responsible for forwarding data packets -> routing.
- the basic functionality of a network access zone is fulfilled precisely when each network element in this network access zone can establish a connection with every other network element in this network access zone within a period of time Z. This implicitly states that any network user within this network access zone can create a connection with any other network user within this network access zone.
- the stability of a network access zone is impaired if the basic functionality of the network access zone is not guaranteed.
- This section describes the basic physical ("mechanical") processes in a network access zone. From the formation of a network access zone to the basic inter-communication of the network elements (connections).
- a network access zone can be set up anywhere.
- the extent of a network access zone is the sum (overlay) of the extent of all network elements in a network access zone.
- the static model shows a snapshot of a network access zone without considering the time factor t.
- FIG. 5 shows the simplest form of a network access zone 7.
- a network element 1 according to the invention forms a network access zone 7 with the spatial extent r 3 (three-dimensional space) and a radius of the extent with the length r (and diameter 2r).
- FIG. 6 shows an expansion stage of a network access zone 7 with two network elements 1 according to the invention.
- the spatial extension r 3 of the network access zone 7 is determined by adding a further network Work element 1 increased. It should be noted that an expansion of the network access zone is only possible if the distance between two network elements is not greater than the radius r.
- FIG. 7 shows a further stage of expansion of the network access zone 7 with 7 network elements 1 according to the invention.
- the expansion of a network access zone 7 can be increased as desired. There is no limit to the number of network elements 1.
- the spatial extent r 3 of a network element 1 according to the invention can be impaired by existing building structures (for example buildings, electromagnetic interference factors, etc.). This results in a realistic scenario of the spatial extent r 3 of a network access zone 7, as shown in FIG. 8. Multiple spatial connections with the length of the radius ⁇ r between the network elements 1 are also possible.
- the network elements 20, 30 and 40 have multiple connections with the length ⁇ radius r.
- the network element 80 is not a full member of the network access zone, since the element 80 lies outside the range with the radius length r. However, it is possible to close the "gap" by positioning another network element and to integrate element 80 as a full member of the network access zone (runtime model).
- the runtime model shows the physical processes in a network access zone in the context of the time parameter t.
- This shows an essential property of a network access zone and its network elements: Spontaneous connections between two network elements are possible, that is, when viewed in a temporal context, it can be seen that after a connection between two network elements is interrupted (e.g. due to electromagnetic interference) Both network elements try to re-establish the connection as quickly as possible.
- FIG. 9 shows each network element 1 in a network access zone 7 tries at all times T to make as many connections as possible with spatially nearby network elements 1 ( ⁇ length of the radius r) in order to constantly improve the stability and redundancy of the network access zone 7.
- Each network element 1 thus proactively contributes to improving the performance of the overall system - the network access zone 7.
- Network users 2 can create a wireless data connection to a network element 1 based on one of the WLAN standards within the spatial extension r 3 of the network access zone 7. This is independent of the respective location of the network user 2 (within the network access zone 7). This is shown in FIG. 10.
- connection of the network element 1 is selected on the basis of the quality of the connection; that is, high quality compounds are preferred. This is shown in FIG. 11.
- Dynamic model • The quality of the connections is always assessed over time and activated accordingly. This is particularly important in connection with mobile network users. From the point of view of the mobile network user, the example in FIG. 12 is a permanent and uninterrupted connection with possibly changing qualities of the connection.
- the respective address of the network element is found in the network access zone using a protocol based on ARP (Address Resolution Protocol).
- ARP Address Resolution Protocol
- Routing of data packets There are two basic mechanisms to enable successful routing of data packets through the network access zone: route calculation and route maintenance. Both mechanisms can be activated if required - "On Detnand”.
- Route calculation This mechanism comes into force when a first network element 1 sends a data packet to a second network element 1 and the first network element receives the routing information for this mechanism. This mechanism only comes into force when a first network element 1 sends a data packet to a second network element 1 and does not yet have any routing information.
- the neighboring network elements are generally spoken using the link discovery protocol, and the routing entries are distributed in the network using a meshing protocol. In the end, it is about the dynamic Provision of a routing table.
- the routing algorithm is preferably a shortest path algorithm.
- Route maintenance This mechanism comes into force when a first network element 1 already sends data packets to a second network element 1 and the first network element detects that the routing information is no longer correct, since the route e.g. is interrupted or the second network element 1 no longer exists. The first network element 1 will try to find another route to the second network element, possibly using this mechanism.
- Each data packet contains all the routing information from the source to the destination.
- Each network element that forwards a data packet to the next network element stores the routing information of the data packet in a local route cache. This allows a very quick reaction to changing routes through the entire network access zone. Faulty routes, e.g. are interrupted (due to failure of a network work element), are replaced by alternative routes from the route cache - if available - in order to forward the packet. An alternative route may be found and therefore no further route calculation is required. This has a significant impact on the performance of the entire network access zone.
- the bidirectional data communication between two network elements 1 is carried out using mechanisms based on the sending and receiving of IP packets.
- FIG. 13 shows the connection between two mobile network elements 1. Data communication between two mobile network users 2 is possible at any point in time t , From the point of view of network user 2, this is a permanent and uninterrupted connection with possibly changing properties (qualities) of the connection.
- FIG. 14 shows a permanent and uninterrupted connection between one Network user 2 and a network element 1, which serves as a gateway to the “Internet” 4. It should be noted that an optimal route for data communication is always selected; the route is always chosen with regard to the closest gateway based on the respective position of the network user 2 ,
- two physically independent network access zones 7 can be “connected” to one another via the Internet 4, so that all network elements, including network users, can connect within these two network access zones. This is shown in FIG. 15.
- the network user is always the focus of the requirements and is the basis for the entry into force of the respective routing mechanism. If, for example, a connection between network users and the "Internet" is desired, the focus of the Routing mechanism for finding the closest gateway and optimizing the route through the network access zone.
- the focus of the routing mechanism is on finding the optimal route between the network users.
- the hardware architecture of the network element according to the invention is preferably of modular construction: there are three preferred basic components of the network element according to the invention, which represent the basic configuration
- This configuration provides the entire basic functionality - comparable to a commercially available PC.
- the modules are connected to each other via a defined hardware interface, making each module interchangeable.
- FIG. 16 shows a schematic illustration.
- the housing of the network element according to the invention is preferably cube-shaped and weatherproof. This is shown in Figure 17.
- the power is supplied either via an external 9V power supply or via PoE (Power over Ethernet) - the power supply via the Ethemet cable.
- the network element can alternatively be operated with a lithium-ion accumulator, which is preferably housed in an additional cube-shaped housing (battery).
- the WLAN interface board consists of two separate IEEE 802.11g chipsets and two antennas.
- a transmitter / receiver unit 12 is reserved for the network element data exchange (traffic) or network user data exchange traffic.
- the software architecture is optimally matched to the respective hardware configuration of the network element.
- Software modules for additional hardware components based on the network element can be added dynamically during runtime without the overall system being adversely affected thereby.
- the network element "recognizes" the respective application as a gateway, router, DHCP server, web server or firewall and the configuration is carried out “automatically”.
- the need for bandwidth due to high data traffic between network elements or network users is regulated dynamically and without interruption by the network element according to the invention.
- the processes of the interactive network element can be divided into an interactive one
- Part of workflows which through actions of network users (ie Change settings using the configuration website) is triggered and an automatic part of workflows, which is triggered by backend applications such as monitor agents, trigger agents or SNMP controllers, can be divided.
- the network element uses a modification of the GNU / Linux system, which corresponds to a division of the system into two parts, namely the user workspace domain and the kernel workspace domain.
- the Enterprise Layer has components that are domain-specific, ie components that are common for a specific domain (Config Manager). More than one application can use components of the enterprise layer. This is shown in Figure 18. It should be mentioned that an application layer can be regarded as a "business component system" which has the logic and intelligence of the core application of the network element according to the invention.
- Agents implement business rules (activities) by using elementary services, which are provided by the managers of the enterprise layer.
- an agent can combine more than one service from more than one manager.
- Agents nest data flows In the context of the network element according to the invention and a system of network elements according to the invention, the agents nest individual steps from, for example, stopping, configuring and restarting elementary GNU / Linux services by using the Config Manager (enterprise layer). The reusability of agents is limited.
- the enterprise layer contains so-called managers: a manager provides services. A manager can use services offered by other managers.
- a controller controls the work flow of the actions of the users, i.e. the user actions of the configuration website of the network element according to the invention.
- FIGS 19-24 show three elementary mechanisms of the core features of the network element according to the invention:
- Link Discovery The search for new connections (Link Discovery), the connection state protocol (Link State Protocol), which is part of the wireless infrastructure network and is physically separated from the wireless network of the network users and the roaming mechanism of the network users. or user includes.
- Link State Protocol the connection state protocol
- the Link Discovery protocol provides a media-independent mechanism to discover neighbors in a mobile ad-hoc network and is able to determine whether connections are unidirectional or bidirectional.
- a connection metric is assigned to each entry in the IP address table, which is based on an average value of the average measured connection signal quality over time.
- the link state protocol ensures the distribution of the entries in the routing table (including the IP addresses) within the network.
- the roaming mechanism of the network users enables an uninterrupted and mobile wireless connection to the network according to the invention.
- the network element is preconfigured with an IP address that only exists once on the basis of the publicly available 32-bit IP4 address range.
- each network element contains its own unique digital fingerprint (fingerprint or certificate) for security reasons.
- the transmitting / receiving unit (IP interface) of the network element periodically sends a UDP datagram message to a known port of a neighboring network element (if it can be reached wirelessly).
- This message has a format as shown in Figure 20.
- the information type field enables a non-discovery message to be identified as such.
- the message also contains a list of neighboring interface addresses from which discovery messages on the IP interface are received within a known period of time. The list of addresses is used to determine bidirectional connections. A bidirectional connection is established.
- the fingerprint (ie the authentication information 23) of the network element with the IP address 10.0.1.0 is transmitted to the "new" network element in order to determine whether it is a valid network element with a certificate from a certification body. If the certificate is valid according to the certification authority, the certificate of the "new" network element is transmitted. If the certificate of the "new" network element is also valid, it is possible to set up the data traffic via the new wireless connection.
- a virtual private network connection can also be established between the two network elements in order to send data packets securely and wirelessly.
- the network element periodically sends its own link state data packets (LSP) or also link information 22 and connection quality information 21 to each interface that participates in the protocol.
- LSPs are based on the network elements and allow each network element to receive the full topology information for the entire ad hoc network. From its topology database, in which the connection quality information 21 and the connection path information 22 are contained, a network element can be based on the principle of a Cost minimization Calculate routes to all other network elements in the ad hoc network. This is also shown in Figure 19.
- the LSPs show each interface (each network element) which addresses their neighbors (neighboring network elements) have. It also shows whether and at what cost these connections exist (metric).
- the scalability is improved by a technique known as fish-eye routing. This reduces the resolution of the network card of a network element with increasing distance or increasing hop distance (hop is the number of network elements in between) from the network element. This is achieved by reducing the rate at which the LSPs travel through the network with increasing distance from their source.
- the UDP datagram message has a format as shown in FIG. 20. This message helps display LSP messages.
- the "router ID” is used to identify the network element from which the message is sent using its own IP address.
- the “sequence number” is used to distinguish younger LSPs from older ones. This field is increased when the network element sends its own LSP.
- the "Age of the data packet” field shows the period of time in which the LSP is valid.
- the "Number of hops” field shows how many hops the LSP traveled from the source of the message.
- the field “number of interfaces” shows how many interfaces of the source (network element) participate in the protocol.
- the "external route field” contains external route information.
- the roaming mechanism of network users enables the user to have mobile access to the wireless network.
- the mechanism also has a meaning for static wireless network users because a network user that is close to two different invention Network elements, may want to change its assignment depending on the signal quality (connection quality information 21). This is independent of the hardware equipment of the network user.
- the network element must prevent the termination of an active network user connection by reassignment.
- Figures 21 through 23 show the mechanism for preventing the wireless connection from being broken, thereby allowing the network user to move within the network.
- FIG. 21 shows the assignment of a mobile network user 2 to a network element 1 of the network.
- the network user 2 receives the IP configuration information by means of a DHCP service of the network element 1 (the address of the network user is part of the network user IP address range).
- the gateway IP address remains the same throughout the network, and the network user 2 also receives an IP address which is unique within the network. This enables a true end-to-end connection (i.e. user-defined end-to-end VPN tunneling through the network).
- FIG. 22 shows a roaming of a wireless network user 2.
- FIG. 23 shows the new connection of a wireless network user 2 with a further network element 1.
- ARP request which forces the network user 2 to answer the ARP requests and to resolve the IP address and MAC address (in particular resolution of the gateway address) for the network element just assigned .
- the new routing entry of the network element is communicated to the network by the link state protocol and the corresponding mechanisms.
- the network element originally associated with the network user determines that a new routing entry has been reported, which part of its own network user is IP addresses and notes that this IP address cannot be assigned to new wireless network users.
- An association event is discovered in a network element. That the Access Cube notices that a "new" WLAN client is associated. 2.
- a monitoring daemon which continuously monitors the ARP table, "notices" a previously unknown IP address. Unknown IP address because each network element has a pool of IP addresses for WLAN clients, and so it can easily be determined whether it is a "local" address originating from the pool or an unknown, external address.
- the monitoring daemon waits until the associated MAC address appears in the ARP table.
- FIGS. 20, 21 and 22 also show that the routing entries of different network users or those who are moving away from the network access area of the network are not passed on through the network.
- the original network element connected to the network user can transfer the IP address 10.0.3.1 to a new network user.
- the hardware has the following properties: small, in particular cube-shaped dimensions, an optional waterproof housing (1P67), no moving parts, low power consumption (approx. 3W), an Ethernet interface, a USB host and a USB interface, Power over Ethernet (IEEE 802.3af standard), 2 WLAN interfaces (RP-SMA connections), 500 MHz MIPS processors, 32 MB. Flash memory and 64 MB RAM memory, as well as IEEE 802.1x compatibility (EAP, Radius).
- the software platform has in particular: a link discovery protocol, a link state protocol, trigger agents, monitor agents, Config Web Controller, Config Manager, DHCP services, HTTP services, DNS services, IPSEC services, SSH services, CRON services, PPPoE services (DSL), SNMP agents, Perl and a package management system for "on-air" software updates and upgrades without having to restart the network element.
- the configuration website of the network element preferably allows the most important parts of the system, i.e. Parameterize routing, NAT, IPSEC, IPTABLES (firewall), MAC address filtering, DHCP services and DNS services.
- the Kemel workspace domain consists of the latest stable GNU / Linux kernel specially compiled for the network element according to the invention.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Small-Scale Networks (AREA)
Abstract
Description
Claims
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA002555748A CA2555748A1 (en) | 2003-11-18 | 2004-07-23 | Device and method for setting up ad hoc networks |
US10/579,671 US20070127393A1 (en) | 2003-11-18 | 2004-07-23 | Device and method for setting up ad hoc networks |
EP04763412A EP1665647A1 (de) | 2003-11-18 | 2004-07-23 | Vorrichtung und verfahren zur einrichtung von ad-hoc netzwerken |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE10353851A DE10353851A1 (de) | 2003-11-18 | 2003-11-18 | Vorrichtung und Verfahren zur Einrichtung von Ad-Hoc Netzwerken |
DE10353851.8 | 2003-11-18 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2005053233A1 true WO2005053233A1 (de) | 2005-06-09 |
Family
ID=34585198
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP2004/008216 WO2005053233A1 (de) | 2003-11-18 | 2004-07-23 | Vorrichtung und verfahren zur einrichtung von ad-hoc netzwerken |
Country Status (5)
Country | Link |
---|---|
US (1) | US20070127393A1 (de) |
EP (1) | EP1665647A1 (de) |
CA (1) | CA2555748A1 (de) |
DE (1) | DE10353851A1 (de) |
WO (1) | WO2005053233A1 (de) |
Families Citing this family (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1688007B1 (de) * | 2003-11-27 | 2011-01-05 | Telecom Italia S.p.A. | Verfahren zur simulation eines kommunikationsnetzes, das die dienstqualität betrachtet |
DE102004047364A1 (de) | 2004-09-29 | 2006-03-30 | Siemens Ag | Verfahren zum spontanen Verteilen von Daten sowie entsprechendes Datennetz |
DE102004047366A1 (de) | 2004-09-29 | 2006-03-30 | Siemens Ag | Verfahren zum Verteilen von Daten auf Anforderung sowie entsprechendes Datennetz |
DE102004047371A1 (de) * | 2004-09-29 | 2006-03-30 | Siemens Ag | Verfahren zum Verteilen von Software und Konfigurationsdaten sowie entsprechendes Datennetz |
US8160062B2 (en) * | 2006-01-31 | 2012-04-17 | Microsoft Corporation | Network connectivity determination based on passive analysis of connection-oriented path information |
US8677479B2 (en) * | 2007-04-16 | 2014-03-18 | Microsoft Corporation | Detection of adversaries through collection and correlation of assessments |
US7769888B2 (en) * | 2007-06-15 | 2010-08-03 | Silver Spring Networks, Inc. | Method and system for providing network and routing protocols for utility services |
US8189577B2 (en) * | 2007-06-15 | 2012-05-29 | Silver Spring Networks, Inc. | Network utilities in wireless mesh communications networks |
US20090003356A1 (en) * | 2007-06-15 | 2009-01-01 | Silver Spring Networks, Inc. | Node discovery and culling in wireless mesh communications networks |
US8233905B2 (en) * | 2007-06-15 | 2012-07-31 | Silver Spring Networks, Inc. | Load management in wireless mesh communications networks |
US8072951B2 (en) * | 2007-06-15 | 2011-12-06 | Silver Spring Networks, Inc. | Method and system for providing routing protocols in a frequency hopping spread spectrum network |
US8130700B2 (en) * | 2007-06-15 | 2012-03-06 | Silver Spring Networks, Inc. | Method and system for providing network and routing protocols for utility services |
US7940669B2 (en) * | 2007-06-15 | 2011-05-10 | Silver Spring Networks, Inc. | Route and link evaluation in wireless mesh communications networks |
US8040817B2 (en) * | 2007-06-26 | 2011-10-18 | Ricoh Company, Ltd. | Wireless communication device, wireless communication method, and computer program product |
US8279870B2 (en) * | 2007-08-01 | 2012-10-02 | Silver Spring Networks, Inc. | Method and system of routing in a utility smart-grid network |
US7936697B2 (en) | 2007-08-30 | 2011-05-03 | Bae Systems Information And Electronic Systems Integration Inc. | Topology aware MANET for mobile networks |
US20090157844A1 (en) * | 2007-12-13 | 2009-06-18 | Telefonaktiebolaget Lm Ericsson (Publ) | Network automatic discovery method and system |
EP2239916A1 (de) * | 2009-04-08 | 2010-10-13 | EADS Secure Networks Oy | Verbesserte Anwendung von unzuverlässigen Transfermechanismen |
US8605609B2 (en) * | 2010-03-11 | 2013-12-10 | Silver Spring Networks, Inc. | Simulation of multiple nodes in an internetwork |
US8705368B1 (en) * | 2010-12-03 | 2014-04-22 | Google Inc. | Probabilistic distance-based arbitration |
US8953488B2 (en) * | 2010-12-13 | 2015-02-10 | At&T Intellectual Property I, L.P. | Method and apparatus for optimal interconnection of telecommunication nodes via a reliable microwave clustering |
EP3582583B1 (de) | 2012-02-10 | 2020-11-04 | Nec Corporation | Basisstationssystem |
CN105490907B (zh) * | 2014-09-17 | 2019-07-26 | 联想(北京)有限公司 | 一种信息处理方法及电子设备 |
Family Cites Families (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5987011A (en) * | 1996-08-30 | 1999-11-16 | Chai-Keong Toh | Routing method for Ad-Hoc mobile networks |
CA2356947A1 (en) * | 1998-12-23 | 2000-07-06 | Nokia Wireless Routers, Inc. | A unified routing scheme for ad-hoc internetworking |
US7158484B1 (en) * | 2000-02-25 | 2007-01-02 | Lucent Technologies Inc. | Methods and apparatus for topology sensing in networks with mobile nodes |
US20020044549A1 (en) * | 2000-06-12 | 2002-04-18 | Per Johansson | Efficient scatternet forming |
US20020186665A1 (en) * | 2001-03-14 | 2002-12-12 | Donald Chaffee | Efficient path learning in network |
US7251222B2 (en) * | 2001-05-15 | 2007-07-31 | Motorola, Inc. | Procedures for merging the mediation device protocol with a network layer protocol |
EP1282282B1 (de) * | 2001-08-03 | 2007-05-30 | Siemens Aktiengesellschaft | Verfahren zur Bildung eines Ad-hoc-Netzwerkes |
JP4037640B2 (ja) * | 2001-11-15 | 2008-01-23 | 日本電気株式会社 | 無線端末 |
US7200149B1 (en) * | 2002-04-12 | 2007-04-03 | Meshnetworks, Inc. | System and method for identifying potential hidden node problems in multi-hop wireless ad-hoc networks for the purpose of avoiding such potentially problem nodes in route selection |
US6925069B2 (en) * | 2002-04-19 | 2005-08-02 | Meshnetworks, Inc. | Data network having a wireless local area network with a packet hopping wireless backbone |
US20030212821A1 (en) * | 2002-05-13 | 2003-11-13 | Kiyon, Inc. | System and method for routing packets in a wired or wireless network |
US6904055B2 (en) * | 2002-06-24 | 2005-06-07 | Nokia Corporation | Ad hoc networking of terminals aided by a cellular network |
US6894985B2 (en) * | 2002-08-05 | 2005-05-17 | Harris Corporation | Monitoring link quality in a mobile ad hoc network |
DE10242623B4 (de) * | 2002-09-13 | 2005-05-12 | Siemens Ag | Verfahren zum Routen einer Verbindung von ersten Mobilstation zu einer zweiten Mobilstation, Funkkommunikationssystem, zentrale Routingeinrichtung sowie Mobilstation |
US7355986B2 (en) * | 2002-10-22 | 2008-04-08 | Sandia Corporation | Reconfigureable network node |
US20050152305A1 (en) * | 2002-11-25 | 2005-07-14 | Fujitsu Limited | Apparatus, method, and medium for self-organizing multi-hop wireless access networks |
US7376101B2 (en) * | 2003-02-20 | 2008-05-20 | Nec Laboratories America, Inc. | Secure candidate access router discovery method and system |
US7701858B2 (en) * | 2003-07-17 | 2010-04-20 | Sensicast Systems | Method and apparatus for wireless communication in a mesh network |
US7388841B2 (en) * | 2003-10-20 | 2008-06-17 | Mitsubishi Electric Research Laboratories, Inc. | Selecting multiple paths in overlay networks for streaming data |
-
2003
- 2003-11-18 DE DE10353851A patent/DE10353851A1/de not_active Withdrawn
-
2004
- 2004-07-23 WO PCT/EP2004/008216 patent/WO2005053233A1/de active Application Filing
- 2004-07-23 US US10/579,671 patent/US20070127393A1/en not_active Abandoned
- 2004-07-23 CA CA002555748A patent/CA2555748A1/en not_active Abandoned
- 2004-07-23 EP EP04763412A patent/EP1665647A1/de not_active Withdrawn
Non-Patent Citations (3)
Title |
---|
JON AGRE: "PERVASIVE COMPUTING RESEARCH AND HOMELAND SECURITY", RESEARCH PROJECTS OF FUJITSU LABORATORIES OF AMERICA - COLLEGE PARK, MARYLAND, April 2003 (2003-04-01), XP002306860, Retrieved from the Internet <URL:http://www.mindlab.umd.edu/documents/perv_comp.pdf> [retrieved on 20041122] * |
ROYER E M ET AL: "A REVIEW OF CURRENT ROUTING PROTOCOLS FOR AD HOC MOBILE WIRELESS NETWORKS", IEEE PERSONAL COMMUNICATIONS, IEEE COMMUNICATIONS SOCIETY, US, vol. 6, no. 2, April 1999 (1999-04-01), pages 46 - 55, XP000823968, ISSN: 1070-9916 * |
YASUNORI OWADA, KENICHI MASE: "A Study on Protocol, Implementation and Throughput Evaluation for Multihop Wireless LAN", VEHICULAR TECHNOLOGY CONFERENCE, 2003. VTC 2003-SPRING. THE 57TH IEEE SEMIANNUAL, vol. 3, 22 April 2003 (2003-04-22) - 25 April 2003 (2003-04-25), pages 1773 - 1777, XP002306859, Retrieved from the Internet <URL:http://ieeexplore.ieee.org> [retrieved on 20041122] * |
Also Published As
Publication number | Publication date |
---|---|
EP1665647A1 (de) | 2006-06-07 |
US20070127393A1 (en) | 2007-06-07 |
DE10353851A1 (de) | 2005-06-16 |
CA2555748A1 (en) | 2005-06-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2005053233A1 (de) | Vorrichtung und verfahren zur einrichtung von ad-hoc netzwerken | |
DE102008010145B4 (de) | Peer-to-Peer-Kommunikationssystem und -verfahren | |
DE60305676T2 (de) | Drahtloses lan mit dynamischer kanalzugriffsverwaltung | |
EP1826956B1 (de) | Anpassung von virtuellen und physikalischen Netzwerkschnittstellen | |
DE69933542T2 (de) | Geoort-Bestimmung | |
DE112005003332T5 (de) | Multicast-Architektur für drahtlose Maschennetze | |
WO2005020602A2 (de) | Wireless lan system zum einsatz bei sich mit hoher geschwindigkeit bewegenden clients | |
DE112014006431T5 (de) | Gruppenneubildungs-Mechanismus zum Reduzieren von Disruptionszeit in drahtlosen Peer-to-Peer-Netzwerken | |
DE102022208744A1 (de) | Sicherer fernzugriff auf geräte in sich überlappenden subnetzen | |
DE102014219472A1 (de) | Verfahren zum Übertragen von Daten, Netzknoten und Netzwerk | |
AT508676B1 (de) | Drahtloses telekommunikationssystem zur vernetzung ortsfester objekte | |
AT515450B1 (de) | Verfahren für die Kommunikation in einem Satellitennetzwerk | |
EP1719303A1 (de) | Verfahren zur herstellung einer verbindung zwischen einem dienstanforderer (client) und einem dienstanbieter (server) in einem dezentralen mobilfunknetz | |
DE102021109509A1 (de) | System und verfahren zur rekonfiguration eines netzwerks unter verwendung von netzvverkverkehrsvergleichen | |
KR100744786B1 (ko) | 미디어 스트림 전송 시스템 및 방법 | |
CN110505626A (zh) | 一种大规模wifi网络信息推送方法及系统 | |
EP1719291B1 (de) | Verfahren, Zwischenstation sowie zentrale Steuereinrichtung zur Paketvermittelten Datenübertragung in einem selbstorganisierten Funknetzwerk | |
DE10350909B4 (de) | Verfahren zur Signalisierung eines Pfades an Funkstationen eines Funkkommunikationssystems | |
WO2006018404A1 (de) | Verfahren zur steuerung des datenverkehrs in paketübertragungsbasierten kommunikationsnetzwerken | |
DE10143228B4 (de) | Verfahren zum Routen von Verbindungen in einem funkgestützen Ad-hoc-Netz und Netzstation zum Durchführen eines solchen Verfahrens | |
EP3579498B1 (de) | Verfahren zum konfigurieren eines kommunikationsnetzes | |
EP1602205A1 (de) | Verfahren und netzseitige einrichtung zur ermittlung eines pfades in einem adhoc funkkommunikationssystem | |
EP2263399A1 (de) | Verfahren und kommunikationssystem zum bestimmen der qualität wenigstens einer ip-verbindung zwischen einer mobilen einrichtung und einem mit einem öffentlichen ip-basierten kommunikationsnetz verbundenen server | |
EP1289201A1 (de) | Verfahren zum Routen von Verbindungen in einem funkgestützten Ad-hoc-Netz und Netzstation zum Durchführen eines solchen Verfahrens | |
EP1453245A1 (de) | Routing Verfahren für Adhoc Netze |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2004763412 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2555748 Country of ref document: CA |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWW | Wipo information: withdrawn in national office |
Country of ref document: DE |
|
WWP | Wipo information: published in national office |
Ref document number: 2004763412 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2007127393 Country of ref document: US Ref document number: 10579671 Country of ref document: US |
|
WWP | Wipo information: published in national office |
Ref document number: 10579671 Country of ref document: US |