WO2015197658A1 - Système de réseau - Google Patents

Système de réseau Download PDF

Info

Publication number
WO2015197658A1
WO2015197658A1 PCT/EP2015/064181 EP2015064181W WO2015197658A1 WO 2015197658 A1 WO2015197658 A1 WO 2015197658A1 EP 2015064181 W EP2015064181 W EP 2015064181W WO 2015197658 A1 WO2015197658 A1 WO 2015197658A1
Authority
WO
WIPO (PCT)
Prior art keywords
endpoint
access
access node
data
network system
Prior art date
Application number
PCT/EP2015/064181
Other languages
German (de)
English (en)
Inventor
Roland Hänel
Original Assignee
Qsc Ag
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qsc Ag filed Critical Qsc Ag
Priority to DE112015002970.2T priority Critical patent/DE112015002970A5/de
Publication of WO2015197658A1 publication Critical patent/WO2015197658A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/42Centralised routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/24Multipath

Definitions

  • endpoints are N ; N 2 , N 3 , in such a network system via one or more central elements G connected.
  • These central elements Gi, G 2 often carry the term routers or gateways due to their task.
  • each network protocol provides a method available by which a newly started in the network system endpoint N 4 which is responsible for him Gateway / competent Router - here Gi - determined with this Gateway / Router Gi connects and thus becomes part of the network system around Gi. This is especially the case with wireless networks.
  • the endpoints N 1; N 2 , N 3 , N 4 are WLAN clients that connect to and communicate with an access point.
  • the local communication is limited to the respective network system of the access point or the gateway.
  • there are two network systems wherein the first network system is formed around the access point G and the second network system around the access point G 2 .
  • the endpoints of the respective network systems can each communicate with each other, ie N can communicate with N 2 , N 3 and N 4 .
  • communication with other network systems ie from N to N 5 or N 6 is not possible.
  • this requires additional network components that provide a connection between the two network systems. This is especially necessary if an endpoint does not have the physical ability to connect to another network, eg due to lack of reach.
  • N 5 would be able to integrate with the other network system, but N 6 would not.
  • N 5 would be able to integrate with the other network system, but N 6 would not.
  • network systems are known from the prior art, which allow a further meshing, as shown in Figure 2.
  • network systems are known from the prior art, which allow a further meshing, as shown in Figure 2.
  • the associated network protocol ensures that the routers Gi, G 2 , G 3 know each other as such and thus form a common network system.
  • the individual endpoints can then communicate with each other through the routers or with their help due to the network protocol.
  • An exemplary network system and associated protocol is eg ZigBee.
  • the patent application EP 1 608 1 16 A1 is known from the prior art.
  • the document describes a highly specialized procedure for reducing the error rate.
  • data packets are deliberately transmitted twice via previously determined paths, so that individual errors can be corrected reconstructed.
  • there is a planned connection from the outset and accidental duplication is undesirable.
  • the transmission system is state-oriented.
  • the patent application EP 2 568 673 A1 is known from the prior art. This describes a similar approach in which the (Ethernet) network itself duplicates and thus provides redundancy.
  • the (Ethernet) network itself duplicates and thus provides redundancy.
  • duplication is provided on previously determined paths, using specialized protocols tailored to the network system.
  • the transmission system is state-oriented.
  • One of the central coordination tasks is the routing of routing tables, which reflect the physical conditions of the network with respect to the accessibility of the individual network elements. It should be noted, however, that as network complexity increases, administrative tasks increase dramatically. Again, it may come back to the case where subsystems are formed because they lack the necessary range, i. A communication from N to Nu would not be possible.
  • a network system which has at least a first endpoint and a second endpoint and at least one central entity within the network.
  • the first endpoints have access to the network system via one or more access nodes, with simultaneous access through more than one access node through endpoints.
  • the central entity within the network undertakes the routing of data to the first endpoint to the second endpoint, with data of the first endpoint forwarded by both a first access node and a second access node to the central entity being recognized as a doublet by the central entity will be sent to the second endpoint only once.
  • the network system comprises at least one repeater, the repeater appearing like an access node to an endpoint.
  • data will be sent in data packets, the data packets each having an identifier on the basis of which duplicates can be recognized.
  • the identifier is unique.
  • the transmission from the end points to the access nodes and vice versa takes place stateless.
  • data is sent to the second endpoint (N 6 , N 3 ) over at least a portion of the more than one access node (Gi, G 2 , G 3 ) forwarded to the second endpoint.
  • the second endpoint recognizes data of the first endpoint which has been forwarded by both a first access node and a second access node as a doublet.
  • endpoints that have a common access point exchange data via this access point without forwarding to the central entity.
  • the access nodes and / or repeaters transmit data to the central entity, which has a Localization of an endpoint that uses the access point and / or repeater allowed, the data is selected from a group having reception field strength, signal quality, bit error rate, timestamp or a combination of one or more of the above.
  • the second endpoint in the event that the second endpoint can be reached via more than one access node, data is forwarded to the second endpoint via at least one of the accessor nodes to the second endpoint, wherein the selection of the accessor node or the accessor node on hand the data transmitted by the access nodes or repeaters to the central entity takes place.
  • FIG. 1 shows a first example of a prior art network system
  • FIG. 2 shows a second example of a prior art network system
  • FIG. 1 shows a first example of a prior art network system
  • FIG. 2 shows a second example of a prior art network system
  • FIG. 1 shows a first example of a prior art network system
  • FIG. 2 shows a second example of a prior art network system
  • FIG. 1 shows a first example of a prior art network system
  • FIG. 2 shows a second example of a prior art network system
  • Fig. 3 shows a schematic example of various embodiments and aspects according to the invention.
  • a plurality of endpoints N ; N 2 , N 3 , N 4 , N 5 , N 6 are joined together. Only an exemplary number of end points are shown in FIG. 3, and the invention is in no way limited to this arrangement.
  • At least one central entity ZI is provided in a network system according to the invention, the function of which will be explained in more detail below.
  • the endpoints are provided with each other via access nodes Gi, G 2 , G 3 with access to the network system.
  • the individual endpoints can record with one or more access nodes Gi, G 2 , G 3 connection to the network system.
  • the endpoint may obtain N 6 via both the access node and the access node Gi G 3 access to the network system in FIG. 3
  • the end point N 3 can receive access to the network system via further elements, which are explained below, via the access node G 2 as well as the access node G 3 .
  • the network system allows simultaneous access to the network system via multiple access nodes. This has some advantages, which are also explained in more detail below.
  • the central entity ZI generally handles the routing of data from any of the endpoints (source endpoint) to any other destination (sink endpoint). For example, from a first endpoint N 6, a message to the second endpoint N 2 can be made so that the data is received via the access nodes Gi and G 3 and passed on to the central entity ZI. The central entity recognizes the destination of the data and forwards it via the access node G 2 to the second endpoint N 2 . It depends on the further design of the network, which is shown as a cloud Cl, for the further understanding of the invention not.
  • data of the first end point N 6 which were forwarded by both a first access node Gi and a second access node G 3 to the central entity ZI, are recognized by the central entity ZI as a doublet. If a duplicate is detected, the corresponding data will only be sent once to the second endpoint N 2 .
  • Duplicate recognition can be carried out in a variety of ways, it being possible, for example, to store unique identifiers for a specific period of time or to generate a hash as an identifier and to save it for a time or to store the data itself for a certain period of time. Certain lifetimes may be predetermined, so that data older than a certain period of time may be discarded.
  • the invention adopts that the central entity ZI is connected to all access nodes.
  • the central instance ZI can perform functions of classical local network protocols as well as provide additional functionalities that would otherwise not be available in local networks.
  • the endpoints N and N 6 and the access point G can be considered as a first local area network, while the endpoints N 6 , N 5 , N 4 and N 3 and the access point G 3 as a second local area network and the endpoints N 2 and N 3 and the access point G 2 can be considered as a third local area network. This means that while previously the local networks only permitted communication within their own network, it is now possible to connect the local networks via the central instance.
  • the invention also describes a local communication protocol which has a universal, central communication connection via one (or more) central entity (s).
  • the presence of the central entity (s) removes some of the abandonment of traditional local communication protocols; other functions can be realized additionally or for the first time effectively.
  • the communication protocol or network system described in the context of this invention is based on the idea that the access nodes in the network have the connection to a central instance. Each access point has this connection, and as a consequence, each access point implicitly knows that each endpoint is reachable over the network (mediated by the central instance), as long as the endpoint is reachable via at least one access point.
  • the network system and the corresponding network protocol can be so simple that a terminal only has to make contact with some endpoint in some form and does not require further log-on.
  • Login procedures such as e.g. Bluetooth or similar protocols are optional in the invention.
  • repeaters may be relatively simple in that they merely repeat the received signals. That a repeater forwards the signals of all end points communicating with it as well as all access nodes communicating with it alternately. Because of this simple design, there is no need for any further logic, so that these repeaters can be provided inexpensively.
  • the repeater appears opposite the endpoints that are connected to it, such as the access node accessible by the repeater. That is, the end point N 4 sees the access node G 3 in the repeater R 2 while the end point N 3 additionally sees the access node G 2 in the repeater Ri.
  • the repeaters are each associated with exactly one access node.
  • the repeater R is assigned to the access node G 2 and the repeater R 2 to the access node G 3 .
  • the repeater appears opposite the endpoints associated with it, such as the access node accessible by the repeater. That is, the end point N 4 sees in the repeater R 2 the access node G 3 while the end point N 3 in the repeater Ri additionally also sees the access node G 2 .
  • multiple repeaters may also form a chain with respect to one or more access nodes.
  • an unambiguous assignment can be advantageous if the end points allow local access to an access node and to a (associated) repeater connected to it. This means that the end point N 6 could exchange data directly with the end point N 4 via the access node G 3 and the repeater R 2 , ie without routing via the central entity ZI.
  • the invention can be used particularly advantageously with packet-oriented data. These usually have an identifier, with the help of doublets can be detected.
  • the identifier does not necessarily have to be globally unique. Also, the uniqueness may also result from other features such as source and destination address, timestamp, sequence number or the like.
  • the invention can be used particularly advantageously if the transmission from the end points N ; N 2 , N 3 , N 4 , N 5 , N 6 to the access nodes Gi, G 2 , G 3 and vice versa is stateless. In this case, the possible redundancy can increase the security of the transmission.
  • the central entity now also distributes data that it receives from an endpoint via one or more access points via more than one access node to the destination endpoint.
  • the endpoint N 6 may forward data to the endpoint N 3 via the access node Gi or G 3 to the central entity ZI.
  • the central entity ZI can now recognize the doublet and discard the following identical data.
  • the central authority can now decide on the basis of very different parameters whether the data should only be forwarded to the endpoint via one or just several or even all access points. This decision may depend, for example, on the priority of data, the age of the data, latencies, transmission quality, service level agreements, etc. That is, in the example of FIG. 3, the central entity may decide whether to forward the data to the endpoint N 3 via the access node G 2 and / or G 3 . Further parameters will be given below in addition.
  • the target endpoint should be able to data from the source endpoint, which is from both a first access node and a second access node were forwarded to recognize as a doublet.
  • the same mechanisms as previously explained with respect to the central instance ZI can be used.
  • the endpoint may send N 6 via the access node G 3 and the repeater R 2 data to the endpoint then N 4. This could reduce the network load within the network as well as in the central instance ZI. In addition, it would not be necessary to perform a doublet recognition within the local network formed herewith.
  • the respective access nodes and / or repeaters transmit data to the central entity, which make it possible to localize the access nodes. For example, latency data, timestamps, bit error rates, number of hops or, in the case of wireless connections, reception field strength, signal quality or combinations thereof can be used here, the list not being conclusive.
  • the localization can be used for a wide variety of purposes. First, it allows it e.g. to locate mobile endpoints, e.g. is interesting for machine-to-machine communication, or it allows the localization of persons or the derivation of personal densities, the generation of position-based services, on the other hand, it can also be used for routing.
  • the quality of localization data can be improved by increasing the number and thus the density of the access nodes and repeaters (if provided). Since, in contrast to conventional networks, the routing logic within the network is not directly influenced, this is easily possible.
  • the invention can be used for both wireless and wired networks.
  • an overlay operation over existing networks and network protocols is possible.
  • the central entity ZI and the network CI can also be understood as a cloud and a cloud service. However, this is not a limiting shape. As far as a "simultaneous" access has been described above, it can not be concluded from this that actually access to exactly the same time is meant.
  • the term is to be understood as meaning that it is allowed by principle to be able to access the network via several accesses. This can be configured both at the same time and in chronological succession.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

L'invention concerne un système de réseau, comprenant au moins un premier point terminal (N3, N6) et un deuxième point terminal (N2, N6, N4, N5, Ni; N2, N3, N4, N5, N1) et au moins une instance centrale (ZI) au sein du réseau. Les premiers points terminaux (N1, N2, N3, N4, N5, N6) possèdent un accès au système de réseau par le biais d'un ou plusieurs nœuds d'accès (G, G2, G3). Un accès simultané est possible par le biais de plus d'un nœud d'accès (G1, G3) via les points terminaux (N6). L'instance centrale (ZI) du réseau prend en charge le routage des données du premier point terminal (N6) au deuxième point terminal (N2, N3, N4, N5, N1). Les données du premier point terminal (N6) qui ont été transmises à l'instance centrale (ZI) à la fois par un premier nœud d'accès (G1) et par un second nœud d'accès (G3) sont détectées par l'instance centrale (ZI) comme étant des doublons et ne sont envoyées qu'une seule fois au deuxième point terminal (N2, N3, N4, N5, N1). De préférence, les paquets de données comportent un identifiant unique qui permet de détecter les doublons. La détection des doublons peut également se faire dans le deuxième point terminal lorsque celui-ci peut être atteint par plus d'un nœud d'accès.
PCT/EP2015/064181 2014-06-24 2015-06-24 Système de réseau WO2015197658A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
DE112015002970.2T DE112015002970A5 (de) 2014-06-24 2015-06-24 Netzwerksystem

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DE102014212037.3 2014-06-24
DE102014212037.3A DE102014212037A1 (de) 2014-06-24 2014-06-24 Netzwerksystem

Publications (1)

Publication Number Publication Date
WO2015197658A1 true WO2015197658A1 (fr) 2015-12-30

Family

ID=53498975

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2015/064181 WO2015197658A1 (fr) 2014-06-24 2015-06-24 Système de réseau

Country Status (2)

Country Link
DE (2) DE102014212037A1 (fr)
WO (1) WO2015197658A1 (fr)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102014212038A1 (de) 2014-06-24 2015-12-24 Qsc Ag Netzwerksystem mit Ende-zu-Ende Verschlüsselung

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6751746B1 (en) 2000-07-31 2004-06-15 Cisco Technology, Inc. Method and apparatus for uninterrupted packet transfer using replication over disjoint paths
EP1608116A1 (fr) 2004-06-18 2005-12-21 Agere Systems, Inc. Procédé et système pour protection de défaut et restauration par service dans un réseau de paquets
US7342890B1 (en) * 2002-12-20 2008-03-11 Juniper Networks, Inc. Data duplication for transmission over computer networks
EP2523400A1 (fr) * 2011-05-10 2012-11-14 Cassidian Finland OY Noeud de réseau intermédiaire dans un système de télécommunication
EP2568673A1 (fr) 2011-08-30 2013-03-13 ABB Technology AG Parallèlement Redundancy Protocol, PRP, la duplication de paquets sur VLAN basés sur des instances Spanning Tree

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6751746B1 (en) 2000-07-31 2004-06-15 Cisco Technology, Inc. Method and apparatus for uninterrupted packet transfer using replication over disjoint paths
US7342890B1 (en) * 2002-12-20 2008-03-11 Juniper Networks, Inc. Data duplication for transmission over computer networks
EP1608116A1 (fr) 2004-06-18 2005-12-21 Agere Systems, Inc. Procédé et système pour protection de défaut et restauration par service dans un réseau de paquets
EP2523400A1 (fr) * 2011-05-10 2012-11-14 Cassidian Finland OY Noeud de réseau intermédiaire dans un système de télécommunication
EP2568673A1 (fr) 2011-08-30 2013-03-13 ABB Technology AG Parallèlement Redundancy Protocol, PRP, la duplication de paquets sur VLAN basés sur des instances Spanning Tree

Also Published As

Publication number Publication date
DE102014212037A1 (de) 2015-12-24
DE112015002970A5 (de) 2017-04-20

Similar Documents

Publication Publication Date Title
EP1748338B1 (fr) Méthode d'optimisation l'utilisation de la largeur de bande dans des systèmes de bus
EP2413538B1 (fr) Prévention de boucles de transmission dans un réseau en anneau redondant
EP1100230B1 (fr) Système de transmission de données pour avions
EP3577871B1 (fr) Procédé et dispositif permettant l'orientation modulaire d'un flux avb
EP2127329B1 (fr) Filtrage de trames redondantes dans un noeud de réseau
WO2016188707A1 (fr) Procédé pour générer un élément secret ou une clé dans un réseau
DE112014006431T5 (de) Gruppenneubildungs-Mechanismus zum Reduzieren von Disruptionszeit in drahtlosen Peer-to-Peer-Netzwerken
EP3151476B1 (fr) Procede de trafic transversal entre deux esclaves d'un reseau de donnees en boucle
EP3042473A1 (fr) Procédé de transmission de messages dans un réseau d'ordinateurs ainsi que réseau d'ordinateurs
DE102012206529A1 (de) Drahtloses Echtzeitübertragungssystem
EP2127241A1 (fr) Recherche de port cible dans des réseaux constitués de sous-réseaux reliés
DE10004432A1 (de) Netzwerk sowie Netzwerkteilnehmer, insbesondere Feldgerät, für ein derartiges Netzwerk
WO2015197658A1 (fr) Système de réseau
DE602006000486T2 (de) Verfahren zur Konfiguration von IP-Netzwerkressourcen und IP-Netzwerke
WO2018202446A1 (fr) Procédé de coordination d'accès à une ressource d'un système informatique distribué, système informatique et programme informatique
DE10339280B4 (de) Auswahlverfahren für Nachrichtenpfade in Kommunikationssystemen
EP2605457A1 (fr) Procédé destiné à la transmission de données utiles
EP3525476B1 (fr) Procede de determination de topologie d'un site de communication mobile et un site de communication mobile correspondant
DE112017003386B4 (de) Kommunikationssystem und Kommunikationsverfahren
EP2528282A1 (fr) Réseau de communication et dispositif de couplage pour interconnecter un premier et un deuxieme sous-réseau du réseau de communication
DE10260640A1 (de) Verfahren zur Topologie-Erkennung und Weglenkung von Datenpaketen in einem Pakete vermittelnden Ring
EP2649751B1 (fr) Procédé et système de surveillance d'un système de communication
DE102010042601A1 (de) Netzwerk
WO2017063996A1 (fr) Procédé pour générer un secret dans un réseau comprenant au moins deux canaux de transmission
EP3703340A1 (fr) Procédé de fonctionnement d'appareils réseau dans un réseau, dispositif de calcul ainsi que réseau

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15733389

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 112015002970

Country of ref document: DE

REG Reference to national code

Ref country code: DE

Ref legal event code: R225

Ref document number: 112015002970

Country of ref document: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15733389

Country of ref document: EP

Kind code of ref document: A1