WO2015197658A1 - Système de réseau - Google Patents
Système de réseau Download PDFInfo
- Publication number
- WO2015197658A1 WO2015197658A1 PCT/EP2015/064181 EP2015064181W WO2015197658A1 WO 2015197658 A1 WO2015197658 A1 WO 2015197658A1 EP 2015064181 W EP2015064181 W EP 2015064181W WO 2015197658 A1 WO2015197658 A1 WO 2015197658A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- endpoint
- access
- access node
- data
- network system
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/42—Centralised routing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/24—Multipath
Definitions
- endpoints are N ; N 2 , N 3 , in such a network system via one or more central elements G connected.
- These central elements Gi, G 2 often carry the term routers or gateways due to their task.
- each network protocol provides a method available by which a newly started in the network system endpoint N 4 which is responsible for him Gateway / competent Router - here Gi - determined with this Gateway / Router Gi connects and thus becomes part of the network system around Gi. This is especially the case with wireless networks.
- the endpoints N 1; N 2 , N 3 , N 4 are WLAN clients that connect to and communicate with an access point.
- the local communication is limited to the respective network system of the access point or the gateway.
- there are two network systems wherein the first network system is formed around the access point G and the second network system around the access point G 2 .
- the endpoints of the respective network systems can each communicate with each other, ie N can communicate with N 2 , N 3 and N 4 .
- communication with other network systems ie from N to N 5 or N 6 is not possible.
- this requires additional network components that provide a connection between the two network systems. This is especially necessary if an endpoint does not have the physical ability to connect to another network, eg due to lack of reach.
- N 5 would be able to integrate with the other network system, but N 6 would not.
- N 5 would be able to integrate with the other network system, but N 6 would not.
- network systems are known from the prior art, which allow a further meshing, as shown in Figure 2.
- network systems are known from the prior art, which allow a further meshing, as shown in Figure 2.
- the associated network protocol ensures that the routers Gi, G 2 , G 3 know each other as such and thus form a common network system.
- the individual endpoints can then communicate with each other through the routers or with their help due to the network protocol.
- An exemplary network system and associated protocol is eg ZigBee.
- the patent application EP 1 608 1 16 A1 is known from the prior art.
- the document describes a highly specialized procedure for reducing the error rate.
- data packets are deliberately transmitted twice via previously determined paths, so that individual errors can be corrected reconstructed.
- there is a planned connection from the outset and accidental duplication is undesirable.
- the transmission system is state-oriented.
- the patent application EP 2 568 673 A1 is known from the prior art. This describes a similar approach in which the (Ethernet) network itself duplicates and thus provides redundancy.
- the (Ethernet) network itself duplicates and thus provides redundancy.
- duplication is provided on previously determined paths, using specialized protocols tailored to the network system.
- the transmission system is state-oriented.
- One of the central coordination tasks is the routing of routing tables, which reflect the physical conditions of the network with respect to the accessibility of the individual network elements. It should be noted, however, that as network complexity increases, administrative tasks increase dramatically. Again, it may come back to the case where subsystems are formed because they lack the necessary range, i. A communication from N to Nu would not be possible.
- a network system which has at least a first endpoint and a second endpoint and at least one central entity within the network.
- the first endpoints have access to the network system via one or more access nodes, with simultaneous access through more than one access node through endpoints.
- the central entity within the network undertakes the routing of data to the first endpoint to the second endpoint, with data of the first endpoint forwarded by both a first access node and a second access node to the central entity being recognized as a doublet by the central entity will be sent to the second endpoint only once.
- the network system comprises at least one repeater, the repeater appearing like an access node to an endpoint.
- data will be sent in data packets, the data packets each having an identifier on the basis of which duplicates can be recognized.
- the identifier is unique.
- the transmission from the end points to the access nodes and vice versa takes place stateless.
- data is sent to the second endpoint (N 6 , N 3 ) over at least a portion of the more than one access node (Gi, G 2 , G 3 ) forwarded to the second endpoint.
- the second endpoint recognizes data of the first endpoint which has been forwarded by both a first access node and a second access node as a doublet.
- endpoints that have a common access point exchange data via this access point without forwarding to the central entity.
- the access nodes and / or repeaters transmit data to the central entity, which has a Localization of an endpoint that uses the access point and / or repeater allowed, the data is selected from a group having reception field strength, signal quality, bit error rate, timestamp or a combination of one or more of the above.
- the second endpoint in the event that the second endpoint can be reached via more than one access node, data is forwarded to the second endpoint via at least one of the accessor nodes to the second endpoint, wherein the selection of the accessor node or the accessor node on hand the data transmitted by the access nodes or repeaters to the central entity takes place.
- FIG. 1 shows a first example of a prior art network system
- FIG. 2 shows a second example of a prior art network system
- FIG. 1 shows a first example of a prior art network system
- FIG. 2 shows a second example of a prior art network system
- FIG. 1 shows a first example of a prior art network system
- FIG. 2 shows a second example of a prior art network system
- FIG. 1 shows a first example of a prior art network system
- FIG. 2 shows a second example of a prior art network system
- Fig. 3 shows a schematic example of various embodiments and aspects according to the invention.
- a plurality of endpoints N ; N 2 , N 3 , N 4 , N 5 , N 6 are joined together. Only an exemplary number of end points are shown in FIG. 3, and the invention is in no way limited to this arrangement.
- At least one central entity ZI is provided in a network system according to the invention, the function of which will be explained in more detail below.
- the endpoints are provided with each other via access nodes Gi, G 2 , G 3 with access to the network system.
- the individual endpoints can record with one or more access nodes Gi, G 2 , G 3 connection to the network system.
- the endpoint may obtain N 6 via both the access node and the access node Gi G 3 access to the network system in FIG. 3
- the end point N 3 can receive access to the network system via further elements, which are explained below, via the access node G 2 as well as the access node G 3 .
- the network system allows simultaneous access to the network system via multiple access nodes. This has some advantages, which are also explained in more detail below.
- the central entity ZI generally handles the routing of data from any of the endpoints (source endpoint) to any other destination (sink endpoint). For example, from a first endpoint N 6, a message to the second endpoint N 2 can be made so that the data is received via the access nodes Gi and G 3 and passed on to the central entity ZI. The central entity recognizes the destination of the data and forwards it via the access node G 2 to the second endpoint N 2 . It depends on the further design of the network, which is shown as a cloud Cl, for the further understanding of the invention not.
- data of the first end point N 6 which were forwarded by both a first access node Gi and a second access node G 3 to the central entity ZI, are recognized by the central entity ZI as a doublet. If a duplicate is detected, the corresponding data will only be sent once to the second endpoint N 2 .
- Duplicate recognition can be carried out in a variety of ways, it being possible, for example, to store unique identifiers for a specific period of time or to generate a hash as an identifier and to save it for a time or to store the data itself for a certain period of time. Certain lifetimes may be predetermined, so that data older than a certain period of time may be discarded.
- the invention adopts that the central entity ZI is connected to all access nodes.
- the central instance ZI can perform functions of classical local network protocols as well as provide additional functionalities that would otherwise not be available in local networks.
- the endpoints N and N 6 and the access point G can be considered as a first local area network, while the endpoints N 6 , N 5 , N 4 and N 3 and the access point G 3 as a second local area network and the endpoints N 2 and N 3 and the access point G 2 can be considered as a third local area network. This means that while previously the local networks only permitted communication within their own network, it is now possible to connect the local networks via the central instance.
- the invention also describes a local communication protocol which has a universal, central communication connection via one (or more) central entity (s).
- the presence of the central entity (s) removes some of the abandonment of traditional local communication protocols; other functions can be realized additionally or for the first time effectively.
- the communication protocol or network system described in the context of this invention is based on the idea that the access nodes in the network have the connection to a central instance. Each access point has this connection, and as a consequence, each access point implicitly knows that each endpoint is reachable over the network (mediated by the central instance), as long as the endpoint is reachable via at least one access point.
- the network system and the corresponding network protocol can be so simple that a terminal only has to make contact with some endpoint in some form and does not require further log-on.
- Login procedures such as e.g. Bluetooth or similar protocols are optional in the invention.
- repeaters may be relatively simple in that they merely repeat the received signals. That a repeater forwards the signals of all end points communicating with it as well as all access nodes communicating with it alternately. Because of this simple design, there is no need for any further logic, so that these repeaters can be provided inexpensively.
- the repeater appears opposite the endpoints that are connected to it, such as the access node accessible by the repeater. That is, the end point N 4 sees the access node G 3 in the repeater R 2 while the end point N 3 additionally sees the access node G 2 in the repeater Ri.
- the repeaters are each associated with exactly one access node.
- the repeater R is assigned to the access node G 2 and the repeater R 2 to the access node G 3 .
- the repeater appears opposite the endpoints associated with it, such as the access node accessible by the repeater. That is, the end point N 4 sees in the repeater R 2 the access node G 3 while the end point N 3 in the repeater Ri additionally also sees the access node G 2 .
- multiple repeaters may also form a chain with respect to one or more access nodes.
- an unambiguous assignment can be advantageous if the end points allow local access to an access node and to a (associated) repeater connected to it. This means that the end point N 6 could exchange data directly with the end point N 4 via the access node G 3 and the repeater R 2 , ie without routing via the central entity ZI.
- the invention can be used particularly advantageously with packet-oriented data. These usually have an identifier, with the help of doublets can be detected.
- the identifier does not necessarily have to be globally unique. Also, the uniqueness may also result from other features such as source and destination address, timestamp, sequence number or the like.
- the invention can be used particularly advantageously if the transmission from the end points N ; N 2 , N 3 , N 4 , N 5 , N 6 to the access nodes Gi, G 2 , G 3 and vice versa is stateless. In this case, the possible redundancy can increase the security of the transmission.
- the central entity now also distributes data that it receives from an endpoint via one or more access points via more than one access node to the destination endpoint.
- the endpoint N 6 may forward data to the endpoint N 3 via the access node Gi or G 3 to the central entity ZI.
- the central entity ZI can now recognize the doublet and discard the following identical data.
- the central authority can now decide on the basis of very different parameters whether the data should only be forwarded to the endpoint via one or just several or even all access points. This decision may depend, for example, on the priority of data, the age of the data, latencies, transmission quality, service level agreements, etc. That is, in the example of FIG. 3, the central entity may decide whether to forward the data to the endpoint N 3 via the access node G 2 and / or G 3 . Further parameters will be given below in addition.
- the target endpoint should be able to data from the source endpoint, which is from both a first access node and a second access node were forwarded to recognize as a doublet.
- the same mechanisms as previously explained with respect to the central instance ZI can be used.
- the endpoint may send N 6 via the access node G 3 and the repeater R 2 data to the endpoint then N 4. This could reduce the network load within the network as well as in the central instance ZI. In addition, it would not be necessary to perform a doublet recognition within the local network formed herewith.
- the respective access nodes and / or repeaters transmit data to the central entity, which make it possible to localize the access nodes. For example, latency data, timestamps, bit error rates, number of hops or, in the case of wireless connections, reception field strength, signal quality or combinations thereof can be used here, the list not being conclusive.
- the localization can be used for a wide variety of purposes. First, it allows it e.g. to locate mobile endpoints, e.g. is interesting for machine-to-machine communication, or it allows the localization of persons or the derivation of personal densities, the generation of position-based services, on the other hand, it can also be used for routing.
- the quality of localization data can be improved by increasing the number and thus the density of the access nodes and repeaters (if provided). Since, in contrast to conventional networks, the routing logic within the network is not directly influenced, this is easily possible.
- the invention can be used for both wireless and wired networks.
- an overlay operation over existing networks and network protocols is possible.
- the central entity ZI and the network CI can also be understood as a cloud and a cloud service. However, this is not a limiting shape. As far as a "simultaneous" access has been described above, it can not be concluded from this that actually access to exactly the same time is meant.
- the term is to be understood as meaning that it is allowed by principle to be able to access the network via several accesses. This can be configured both at the same time and in chronological succession.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE112015002970.2T DE112015002970A5 (de) | 2014-06-24 | 2015-06-24 | Netzwerksystem |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102014212037.3 | 2014-06-24 | ||
DE102014212037.3A DE102014212037A1 (de) | 2014-06-24 | 2014-06-24 | Netzwerksystem |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2015197658A1 true WO2015197658A1 (fr) | 2015-12-30 |
Family
ID=53498975
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP2015/064181 WO2015197658A1 (fr) | 2014-06-24 | 2015-06-24 | Système de réseau |
Country Status (2)
Country | Link |
---|---|
DE (2) | DE102014212037A1 (fr) |
WO (1) | WO2015197658A1 (fr) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102014212038A1 (de) | 2014-06-24 | 2015-12-24 | Qsc Ag | Netzwerksystem mit Ende-zu-Ende Verschlüsselung |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6751746B1 (en) | 2000-07-31 | 2004-06-15 | Cisco Technology, Inc. | Method and apparatus for uninterrupted packet transfer using replication over disjoint paths |
EP1608116A1 (fr) | 2004-06-18 | 2005-12-21 | Agere Systems, Inc. | Procédé et système pour protection de défaut et restauration par service dans un réseau de paquets |
US7342890B1 (en) * | 2002-12-20 | 2008-03-11 | Juniper Networks, Inc. | Data duplication for transmission over computer networks |
EP2523400A1 (fr) * | 2011-05-10 | 2012-11-14 | Cassidian Finland OY | Noeud de réseau intermédiaire dans un système de télécommunication |
EP2568673A1 (fr) | 2011-08-30 | 2013-03-13 | ABB Technology AG | Parallèlement Redundancy Protocol, PRP, la duplication de paquets sur VLAN basés sur des instances Spanning Tree |
-
2014
- 2014-06-24 DE DE102014212037.3A patent/DE102014212037A1/de not_active Withdrawn
-
2015
- 2015-06-24 WO PCT/EP2015/064181 patent/WO2015197658A1/fr active Application Filing
- 2015-06-24 DE DE112015002970.2T patent/DE112015002970A5/de not_active Withdrawn
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6751746B1 (en) | 2000-07-31 | 2004-06-15 | Cisco Technology, Inc. | Method and apparatus for uninterrupted packet transfer using replication over disjoint paths |
US7342890B1 (en) * | 2002-12-20 | 2008-03-11 | Juniper Networks, Inc. | Data duplication for transmission over computer networks |
EP1608116A1 (fr) | 2004-06-18 | 2005-12-21 | Agere Systems, Inc. | Procédé et système pour protection de défaut et restauration par service dans un réseau de paquets |
EP2523400A1 (fr) * | 2011-05-10 | 2012-11-14 | Cassidian Finland OY | Noeud de réseau intermédiaire dans un système de télécommunication |
EP2568673A1 (fr) | 2011-08-30 | 2013-03-13 | ABB Technology AG | Parallèlement Redundancy Protocol, PRP, la duplication de paquets sur VLAN basés sur des instances Spanning Tree |
Also Published As
Publication number | Publication date |
---|---|
DE102014212037A1 (de) | 2015-12-24 |
DE112015002970A5 (de) | 2017-04-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1748338B1 (fr) | Méthode d'optimisation l'utilisation de la largeur de bande dans des systèmes de bus | |
EP2413538B1 (fr) | Prévention de boucles de transmission dans un réseau en anneau redondant | |
EP1100230B1 (fr) | Système de transmission de données pour avions | |
EP3577871B1 (fr) | Procédé et dispositif permettant l'orientation modulaire d'un flux avb | |
EP2127329B1 (fr) | Filtrage de trames redondantes dans un noeud de réseau | |
WO2016188707A1 (fr) | Procédé pour générer un élément secret ou une clé dans un réseau | |
DE112014006431T5 (de) | Gruppenneubildungs-Mechanismus zum Reduzieren von Disruptionszeit in drahtlosen Peer-to-Peer-Netzwerken | |
EP3151476B1 (fr) | Procede de trafic transversal entre deux esclaves d'un reseau de donnees en boucle | |
EP3042473A1 (fr) | Procédé de transmission de messages dans un réseau d'ordinateurs ainsi que réseau d'ordinateurs | |
DE102012206529A1 (de) | Drahtloses Echtzeitübertragungssystem | |
EP2127241A1 (fr) | Recherche de port cible dans des réseaux constitués de sous-réseaux reliés | |
DE10004432A1 (de) | Netzwerk sowie Netzwerkteilnehmer, insbesondere Feldgerät, für ein derartiges Netzwerk | |
WO2015197658A1 (fr) | Système de réseau | |
DE602006000486T2 (de) | Verfahren zur Konfiguration von IP-Netzwerkressourcen und IP-Netzwerke | |
WO2018202446A1 (fr) | Procédé de coordination d'accès à une ressource d'un système informatique distribué, système informatique et programme informatique | |
DE10339280B4 (de) | Auswahlverfahren für Nachrichtenpfade in Kommunikationssystemen | |
EP2605457A1 (fr) | Procédé destiné à la transmission de données utiles | |
EP3525476B1 (fr) | Procede de determination de topologie d'un site de communication mobile et un site de communication mobile correspondant | |
DE112017003386B4 (de) | Kommunikationssystem und Kommunikationsverfahren | |
EP2528282A1 (fr) | Réseau de communication et dispositif de couplage pour interconnecter un premier et un deuxieme sous-réseau du réseau de communication | |
DE10260640A1 (de) | Verfahren zur Topologie-Erkennung und Weglenkung von Datenpaketen in einem Pakete vermittelnden Ring | |
EP2649751B1 (fr) | Procédé et système de surveillance d'un système de communication | |
DE102010042601A1 (de) | Netzwerk | |
WO2017063996A1 (fr) | Procédé pour générer un secret dans un réseau comprenant au moins deux canaux de transmission | |
EP3703340A1 (fr) | Procédé de fonctionnement d'appareils réseau dans un réseau, dispositif de calcul ainsi que réseau |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 15733389 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 112015002970 Country of ref document: DE |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: R225 Ref document number: 112015002970 Country of ref document: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 15733389 Country of ref document: EP Kind code of ref document: A1 |