WO2019183919A1 - 融合组网的方法和装置 - Google Patents
融合组网的方法和装置 Download PDFInfo
- Publication number
- WO2019183919A1 WO2019183919A1 PCT/CN2018/081318 CN2018081318W WO2019183919A1 WO 2019183919 A1 WO2019183919 A1 WO 2019183919A1 CN 2018081318 W CN2018081318 W CN 2018081318W WO 2019183919 A1 WO2019183919 A1 WO 2019183919A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- network
- node
- data packet
- mesh
- transmission protocol
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 115
- 230000006855 networking Effects 0.000 title claims abstract description 58
- 230000005540 biological transmission Effects 0.000 claims abstract description 115
- 238000004891 communication Methods 0.000 claims abstract description 57
- 230000015654 memory Effects 0.000 claims description 46
- 238000012545 processing Methods 0.000 claims description 36
- 238000004590 computer program Methods 0.000 claims description 17
- 238000010586 diagram Methods 0.000 description 32
- 230000008569 process Effects 0.000 description 19
- 230000006870 function Effects 0.000 description 16
- 230000004927 fusion Effects 0.000 description 15
- 238000005516 engineering process Methods 0.000 description 10
- 102100028641 Vesicle-associated membrane protein-associated protein A Human genes 0.000 description 7
- 101710117541 Vesicle-associated membrane protein-associated protein A Proteins 0.000 description 7
- 238000006243 chemical reaction Methods 0.000 description 5
- 239000000835 fiber Substances 0.000 description 5
- 230000007246 mechanism Effects 0.000 description 5
- 238000013461 design Methods 0.000 description 4
- 239000000523 sample Substances 0.000 description 4
- 230000001360 synchronised effect Effects 0.000 description 4
- 230000009471 action Effects 0.000 description 3
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000005538 encapsulation Methods 0.000 description 3
- 238000012546 transfer Methods 0.000 description 3
- 101100172132 Mus musculus Eif3a gene Proteins 0.000 description 2
- 230000008901 benefit Effects 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 230000010354 integration Effects 0.000 description 2
- 238000010295 mobile communication Methods 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- 230000011664 signaling Effects 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 101100326920 Caenorhabditis elegans ctl-1 gene Proteins 0.000 description 1
- 235000008694 Humulus lupulus Nutrition 0.000 description 1
- 108700026140 MAC combination Proteins 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000015572 biosynthetic process Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 239000003795 chemical substances by application Substances 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000018109 developmental process Effects 0.000 description 1
- 238000009432 framing Methods 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 230000008439 repair process Effects 0.000 description 1
- 230000011218 segmentation Effects 0.000 description 1
- 235000008113 selfheal Nutrition 0.000 description 1
- 238000007619 statistical method Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000007704 transition Effects 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W16/00—Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
- H04W16/14—Spectrum sharing arrangements between different networks
Definitions
- the present application relates to the field of communications and, more particularly, to a method and apparatus for converged networking.
- the wireless mesh MESH network is composed of a MESH router and a MESH client.
- the mesh network MESH router forms a backbone network and is connected to the Internet, and is responsible for providing a multi-hop wireless Internet connection for the MESH client.
- wireless communication is performed at the MAC layer of WiFi based on the IEEE802.11s protocol, including automatic device discovery, automatic topology, path learning, and packet forwarding.
- the device form of the home user is diverse.
- WiFi connection between multiple nodes Access Point, AP
- the WiFi-based IEEE802.11s MESH protocol works in the MAC layer of WiFi, and cannot complete network interworking in different media.
- the WiFi MESH network and the Ethernet nodes cannot directly communicate with each other, and even the 2.4G WiFi MESH network and the 5G WiFi MESH network cannot communicate with each other.
- the UE establishes the MESH network link through WiFi, it cannot integrate other heterogeneous media into the unified network, and cannot play the advantages of dynamic multi-hop, self-organization, self-healing and other aspects of the MESH network in heterogeneous media.
- the present invention provides a method, an apparatus, and a communication system for merging networking, which can implement interworking between networks of different media, improve user deployment, and improve user experience.
- a method for converging networking is provided, which is applied to a communication system including at least two networks, each network including at least two nodes, and nodes in each network communicate based on a first transmission protocol At least one node in the first network is capable of communicating with the at least one node in the second network based on the second transmission protocol, the method comprising:
- the first node of the first network receives the first data packet from the second node in the second network, where the first data packet is the second node received by the second node of the second network from the fourth node of the second network After the second data packet, the data packet generated after the second transmission protocol is encapsulated, where the second data packet carries the identification information of the fourth node in the second network;
- the first node of the first network decapsulates the first data packet according to the second transmission protocol, to obtain the second data packet;
- the first node of the first network sends the second data packet to the third node of the first network.
- the network identifier information of the second network is encapsulated, carried in the data packet, and forwarded to the first network through another different medium network, so that the network information of the second network is extended to different media.
- network-based interworking between multiple different links is implemented in a multi-routed home hybrid network, and a unified cross-network mesh network is established to enhance the user experience.
- the first node of the first network decapsulates the first data packet according to the second transmission protocol, to obtain the second data packet, including:
- the first node of the first network acquires the identifier information of the fourth node in the second network carried by the second data packet;
- the first node of the first network sends an extended address resolution protocol ARP request message to the third node of the first network, where the ARP request message carries the identifier information of the fourth node in the second network.
- the first node of the first network When a data packet needs to be transmitted from the first network to the second network through the different medium, the first node of the first network extends the network layer, and after receiving the first data packet, the first package is encapsulated in the extended network layer, that is, The identification information of the second network is implemented as a load part.
- the networking information of the second network is encapsulated in the data packet and transmitted to the second node of the second network, so that the network topology information of the second network is transmitted to each routing node of the first network.
- the second network is a wireless mesh MESH network
- the identifier information of the fourth node in the second network includes the fourth network in the second network.
- the identifier information of the second network may include information such as networking information, link information, or network IP address of the second network, and the identifier information of the second network is encapsulated in the data packet and transmitted to the first network, thereby The network topology information of the second network is transmitted to each routing node of the first network.
- the first transmission protocol is a wireless MESH mesh network protocol
- the second transmission protocol is an Ethernet protocol
- the first network and the second network are wireless MESH mesh networks
- the first network and the second network are connected by Ethernet.
- the information of the MESH network of the second network such as networking information, link information, or network IP address, is encapsulated in a data packet, and transmitted to the first node of the first network through the Ethernet, thereby forming networking information and a chain.
- Information such as road information or network IP address is transmitted to the first node of the first network, and further transmitted to other routing nodes, thereby extending the wireless MESH mesh network protocol to the wired network, so that each node of node 1 - node 6 All can form a mesh network to achieve network interworking.
- a method for merging networking where a network includes at least two nodes, each network includes at least two nodes, and nodes of each network communicate according to a first transmission protocol, At least one node in the first network is capable of communicating with at least one node in the second network based on a second transmission protocol, the method comprising:
- the second node of the second network receives the second data packet from the fourth node of the second network, the second data packet is a data packet generated based on the first transmission protocol, and the second data packet carries the second data packet Identification information of the fourth node in the network;
- the second node of the second network encapsulates the second data packet according to the second transmission protocol to generate a first data packet, where the identifier information of the fourth node in the second network is used as the first data packet. load;
- the second node of the second network sends the second data packet to the first node of the first network.
- the second node of the second network encapsulates the second data packet according to the second transmission protocol to generate a first data packet, including:
- the second node of the second network acquires the identifier information of the fourth node in the second network carried by the second data packet;
- the second node of the second network sends an extended address resolution protocol ARP request message to the first node of the first network, where the ARP request message carries the identifier information of the fourth node in the second network.
- the second network is a wireless mesh MESH network
- the identifier information of the fourth node in the second network includes the second network The identifier MESH ID of the wireless mesh network of the fourth node.
- the first transmission protocol is a wireless MESH mesh network protocol
- the second transmission protocol is an Ethernet protocol
- a method for merging networking characterized in that, in a communication system including at least two networks, each network includes at least two nodes, and nodes in each network are based on a first The transport protocol communicates, and at least one node in the first network is capable of communicating with the at least one node in the second network based on the second transport protocol, the method comprising:
- the third node of the first network receives the second data packet from the first node in the first network, where the second data packet is obtained by decapsulating the first data packet by the first node in the first network a data packet, the first data packet is a data packet generated after the second node of the second network receives the second data packet from the fourth node of the second network, and is encapsulated according to the second transmission protocol, where The second data packet carries the identification information of the fourth node in the second network;
- the third node of the first network obtains the identifier information of the fourth node in the second network from the second data packet, and determines the ID of the fourth node according to the identifier information of the fourth node in the second network, based on The first transmission protocol communicates with a fourth node of the second network.
- the second network is a wireless mesh MESH network
- the identifier information of the fourth node in the second network includes the second network The identifier MESH ID of the wireless mesh network of the fourth node.
- the first transmission protocol is a wireless mesh network protocol
- the second transmission protocol is an Ethernet protocol
- the networking method provided by the foregoing first aspect, the second aspect, and the third aspect may be specifically used in a hybrid networking scenario composed of a WiFi-based MESH network and an Ethernet.
- the MESH network includes a first network composed of a node 4, a node 5, and a node 6, and a second network composed of a node 1, a node 2, and a node 3.
- the data packet of the node 1 or the node 2 is sent to the node 3, and the node 3 has two protocol stack architectures, a MESH protocol stack architecture and an Ethernet protocol stack architecture.
- the node 3 receives the data packet, and the data packet carries the MESH ID information of the node 1 or the node 2.
- the data packet is inside the node 3.
- the node 3 obtains the MESH ID information by decapsulating the data packet, and extends the IP layer to encapsulate the MESH ID information in the extended IP layer.
- the MESH ID information is transmitted to the node 5.
- the neighboring nodes perform active probe (probe request/response) and passive beacon (mesh beacon) to refresh the neighbor entries.
- the broadcast learning ARP is extended, that is, the MESH ID information is carried in the ARP Request and transmitted to the node 5.
- the node 5 receives the data packet carrying the MESH ID information, and then decapsulates the data packet to obtain the MESH ID information.
- the protocol stack in which node 5 and node 3 interact is an Ethernet protocol stack, and the obtained MESH ID information is encapsulated in an extended IP layer.
- the MESH entry/exit address in the original MESH network packet format is removed, and the source/destination address between adjacent APs is encapsulated to be forwardable in Ethernet format, only Includes the 2-MAC address of the device source/destination address.
- the MESH ID information is also encapsulated in the data packet, so that the node 5 is transmitted to the node 4 or the node. Carry the MESH ID at 6. Then, the node 4 or the node 6 obtains the identification information of the node 1 or the node 2, so that each node can form a fused mesh network, and play multi-hop, self-organization, self-healing, etc. in the packet forwarding process.
- the neighboring entry is updated by the discovery of the neighboring node.
- each node has a reporting function, that is, when the neighboring entry changes, the upper node and the primary node are advertised.
- the master node 1 forms a network node topology and implements a mesh topology of all nodes.
- the path learning process the path of each node to the master node is learned based on the RANN mechanism of the master node.
- the RANN message body is carried in the extended IP layer, and the RANN message body carries the MESH ID, and the message is forwarded through the virtual interface between different media.
- node 4 or node 6 obtains the identification information of node 1 or node 2, so that for any node, such as node 6, when there is data to be sent to node 1, there is no need to go through node 5, node A series of forwarding of 3 can directly establish communication with node 1 and transfer data directly from node 6 to node 1.
- a fourth aspect provides a node device, which is a first node device, is applied to a communication system including at least two networks, each network includes at least two node devices, and between each node device of the network Communicating based on the first transmission protocol, the at least one node device in the first network being capable of communicating with the at least one node device in the second network based on the second transmission protocol, the first node device comprising:
- the second node device in the second network And receiving, by the second node device in the second network, the first data packet, where the first data packet is after the second data packet received by the second node of the second network from the fourth node of the second network And the data packet generated after the second transmission protocol is encapsulated, where the second data packet carries the identifier information of the fourth node in the second network;
- a processing unit configured to decapsulate the first data packet according to the second transmission protocol, to obtain a second data packet
- a sending unit configured to send the second data packet to the third node device of the first network.
- the processing unit is further configured to acquire the identifier information of the fourth node in the second network carried by the second data packet;
- the sending unit is further configured to send an extended address resolution protocol ARP request message to the third node of the first network, where the ARP request message carries the identifier information of the fourth node in the second network.
- the second network is a wireless mesh MESH network
- the identifier information of the fourth node in the second network includes the second network The identifier MESH ID of the wireless mesh network of the fourth node.
- the first transmission protocol is a wireless MESH mesh network protocol
- the second transmission protocol is an Ethernet protocol
- a node device where the node device is a second node device, and is applied to a communication system including at least two networks, each network includes at least two node devices, and between each node device of the network Communicating based on the first transmission protocol, the at least one node device in the first network being capable of communicating with the at least one node device in the second network based on the second transmission protocol, the second node device comprising:
- a receiving unit configured to receive a second data packet from a fourth node device of the second network, where the second data packet is a data packet generated based on the first transmission protocol, and the second data packet carries the second network packet Identification information of the fourth node;
- a processing unit configured to encapsulate the second data packet according to the second transmission protocol, to generate a first data packet, where the identifier information of the fourth node in the second network is used as a load of the first data packet;
- a sending unit configured to send the second data packet to the first node device of the first network.
- the processing unit is further configured to acquire the identifier information of the fourth node in the second network that is carried by the second data packet;
- the sending unit is further configured to send an extended address resolution protocol ARP request message to the first node of the first network, where the ARP request message carries the identifier information of the fourth node in the second network.
- the second network is a wireless mesh MESH network
- the identifier information of the fourth node in the second network includes the second network The identifier MESH ID of the wireless mesh network of the fourth node.
- the first transmission protocol is a wireless MESH mesh network protocol
- the second transmission protocol is an Ethernet protocol
- a node device where the node device is a third node device, and is applied to a communication system including at least two networks, each network includes at least two node devices, and node devices in each network Communicating based on the first transmission protocol, the at least one node device in the first network being capable of communicating with the at least one node device in the second network based on the second transmission protocol, the third node device comprising:
- a receiving unit configured to receive a second data packet from the first node device in the first network, where the second data packet is data obtained by decapsulating the first data packet by the first node in the first network a packet, the first data packet is a data packet generated after the second node of the second network receives the second data packet from the fourth node of the second network, and is encapsulated according to the second transmission protocol, where the The second data packet carries the identification information of the fourth node in the second network;
- a processing unit configured to obtain, from the second data packet, identifier information of the fourth node in the second network, and determine an ID of the fourth node according to the identifier information of the fourth node in the second network, based on the first
- the transport protocol communicates with a fourth node device of the second network.
- the second network is a wireless mesh MESH network
- the identifier information of the fourth node in the second network includes the fourth node in the second network
- the identifier of the wireless mesh network is the MESH ID.
- the first transmission protocol is a wireless MESH mesh network protocol
- the second transmission protocol is an Ethernet protocol
- a node device being a first node device, including a transceiver, a processor, and a memory.
- the processor is configured to control a transceiver transceiver signal for storing a computer program, the processor for calling and running the computer program from the memory, such that the terminal device performs any of the above first aspect and the first aspect A method in any of the possible implementations of the implementation.
- a node device is provided, the node device being a second node device, including a transceiver, a processor, and a memory.
- the processor is configured to control a transceiver transceiver signal for storing a computer program, the processor for calling and running the computer program from the memory, such that the terminal device performs any one of the second aspect and the second aspect described above A method in any of the possible implementations of the implementation.
- a node device is provided, the node device being a third node device, including a transceiver, a processor, and a memory.
- the processor is configured to control a transceiver transceiver signal for storing a computer program, the processor for calling and running the computer program from the memory, such that the terminal device performs any of the above third aspect and the third aspect A method in any of the possible implementations of the implementation.
- a computer program product comprising: computer program code, when the computer program code is run on a computer, causing the computer to perform the method of the above aspects.
- a computer readable medium storing program code for causing a computer to perform the method of the above aspects when the computer program code is run on a computer.
- a chip system comprising a processor for supporting a first node device or a second node device or a third node device to implement functions involved in the above aspects, for example, generating, Receive, determine, transmit, or process data and/or information involved in the above methods.
- the chip system further comprises a memory for storing necessary program instructions and data of the terminal device.
- the chip system can be composed of chips, and can also include chips and other discrete devices.
- a chip system comprising a processor for supporting a second node device to implement functions involved in the above aspects, for example, generating, receiving, determining, transmitting, or processing the above method Data and/or information involved in this.
- the chip system further comprises a memory for storing necessary program instructions and data of the terminal device.
- the chip system can be composed of chips, and can also include chips and other discrete devices.
- a chip system comprising a processor for supporting a third node device to implement functions involved in the above aspects, for example, generating, receiving, determining, transmitting, or processing the above method Data and/or information involved in this.
- the chip system further comprises a memory for storing necessary program instructions and data of the terminal device.
- the chip system can be composed of chips, and can also include chips and other discrete devices.
- FIG. 1 is a schematic diagram of an example of a tree network provided by an embodiment of the present application.
- FIG. 2 is a schematic diagram of an example of a mesh networking provided by an embodiment of the present application.
- FIG. 3 is a structural diagram of a wireless MESH protocol stack provided by an embodiment of the present application.
- FIG. 4 is a structural diagram of a node provided by an embodiment of the present application.
- FIG. 5 is a layered architecture diagram of a node protocol according to an embodiment of the present application.
- FIG. 6 is a flowchart of an example of packet processing according to an embodiment of the present application.
- FIG. 7 is a schematic diagram of an example of a fusion networking method provided by an embodiment of the present application.
- FIG. 8 is a schematic diagram of another example of a fusion networking method provided by an embodiment of the present application.
- FIG. 9 is a schematic diagram of another example mesh network provided by an embodiment of the present application.
- FIG. 10 is a schematic diagram of another example of a convergence networking method provided by an embodiment of the present application.
- FIG. 11 is a schematic diagram of link processing provided by an embodiment of the present application.
- FIG. 12 is a schematic diagram of path learning provided by an embodiment of the present application.
- FIG. 13 is a schematic block diagram of an example node device provided by an embodiment of the present application.
- FIG. 14 is a schematic block diagram of another example node device provided by an embodiment of the present application.
- FIG. 15 is a schematic block diagram of another example node device provided by an embodiment of the present application.
- FIG. 16 is a schematic block diagram of an example communication device provided by an embodiment of the present application.
- FIG. 17 is a schematic block diagram of another example system chip according to an embodiment of the present application.
- GSM Global System of Mobile communication
- CDMA Code Division Multiple Access
- WCDMA Wideband Code Division Multiple Access
- GPRS General Packet Radio Service
- LTE Long Term Evolution
- FDD Frequency Division Duplex
- TDD Time Division Duplex
- UMTS Universal Mobile Telecommunication System
- WiMAX Worldwide Interoperability for Microwave Access
- the terminal device in the embodiment of the present application may refer to a user equipment, an access terminal, a subscriber unit, a subscriber station, a mobile station, a mobile station, a remote station, a remote terminal, a mobile device, a user terminal, a terminal, a wireless communication device, a user agent, or User device.
- the terminal device may also be a cellular phone, a cordless phone, a Session Initiation Protocol (SIP) phone, a Wireless Local Loop (WLL) station, a Personal Digital Assistant (PDA), with wireless communication.
- SIP Session Initiation Protocol
- WLL Wireless Local Loop
- PDA Personal Digital Assistant
- the network device in the embodiment of the present application may be a device for communicating with the terminal device, and the network device may be a Global System of Mobile communication (GSM) system or Code Division Multiple Access (CDMA).
- Base Transceiver Station which may also be a base station (NodeB, NB) in a Wideband Code Division Multiple Access (WCDMA) system, or an evolved base station in an LTE system (Evolutional The NodeB, eNB or eNodeB) may also be a wireless controller in a Cloud Radio Access Network (CRAN) scenario, or the network device may be a relay station, an access point, an in-vehicle device, a wearable device, and a future.
- the network device in the 5G network or the network device in the PLMN network in the future is not limited in this embodiment.
- the device form of the home user is diverse, and different terminal devices have different network requirements.
- the family housing is a platform that involves the network needs of various terminal devices.
- Mobile phones, PCs, NAS, game consoles, and smart home devices need to integrate network devices and other terminal devices to build home devices. Efficient management system for residential facilities and family schedules.
- Network communication technology is a key technology in smart home integration. It usually uses short-range wireless communication technology to communicate between gateways and terminal devices. Due to the limited transmission distance between the gateway and the terminal device, the smart home network realized by the short-range wireless communication technology cannot cover the device far away from the gateway.
- the existing general networking technology is based on the repeater Repeater architecture.
- Its network architecture is a tree structure, which is a network architecture based on a primary node and multiple Repeater routing nodes. It should be understood that, in the network system provided by the embodiment of the present application, the description includes only one master node as an example.
- node 1 is a master node or a master node connected to the Internet
- Node 1 is centered and branches step by step, and communication can be achieved between each node.
- Such a networking mode is shaped like an inverted tree, with a root at the top (for example, node 1) and a branch below the tree root (for example, node 2 and node 3 of the primary branch), and each branch can be further taped.
- Branch for example, branch node 6 and node 7 of node 5
- all nodes except the master node 1 in this embodiment are referred to as routing nodes or routing nodes, wherein the routing node forwards messages of the autonomous node to other nodes.
- the routing node or the terminal device sends the collected data directly to the primary node or to the primary node through the routing node.
- the master node (for example, node 1) can communicate with the routing node in two-way communication, and can also communicate with terminal devices (such as mobile phone terminals, PCs, etc.), for example, using WiFi technology or the like.
- terminal devices such as mobile phone terminals, PCs, etc.
- the primary node can also communicate with other primary nodes.
- the master node may send a message (eg, control information) to the terminal device either directly or via the routing node, or may receive data transmitted from the terminal device directly or via the routing node.
- the routing node is used to forward messages in the network system, for example, including a sensor device capable of collecting data, and the routing node also has a wireless routing function, and the routing node can communicate with the primary node, the terminal device, and other routing nodes in two directions, the primary node and the terminal.
- the device can communicate via a plurality of cascaded routing nodes. In this way, the terminal device that is far away from the primary node (for example, not within the communication radius of the primary node) can also be included in the coverage of a network system.
- the terminal device does not have the routing forwarding function, but can communicate with the primary node or the routing node in two directions (for example, adopting 433M wireless technology).
- the terminal device can receive the message sent from the master node, and the terminal device can also collect the data and send the data to the intermediate node directly or via the routing node, and then the master node can upload the data to other external servers for statistical analysis. And further control.
- the embodiments of the present application are not limited thereto.
- Each network node in the network system 100 can hang multiple Repeater devices, or multiple terminal devices (for example, the mobile phone 111, the smart home device 112, the PC device 113, etc. in FIG. 1), but it can be seen that each A network node has only one uplink.
- FIG. 1 is only a schematic diagram of the tree network, wherein the number of nodes and the number of branch nodes are not limited, and the node that each terminal device accesses may be any node, which is not limited in this embodiment of the present application. .
- the intermediate node router is very easy to be a bottleneck. For example, if the communication between the mobile phone 111 and the PC device 113 in FIG. 1 needs to pass through the node 1, the bottleneck of the intermediate node (for example, the node 1) is caused; and the communication between the smart home device 112 and the PC device 113 is required.
- node 5, node 3, and node 1 Passing through node 5, node 3, and node 1, then bottlenecks are created for intermediate nodes (e.g., node 5, node 3, and node 1). In addition, in addition to the routing nodes and their connected lines, any node or its connected line failure will affect the system.
- the mesh network based on IEEE802.11s in the prior art is a mesh network based on WiFi type, such as a single 2.4G WiFi mesh network or a single 5G WiFi mesh network.
- WiFi utilizes a wireless access point AP to provide network access services for terminal devices, which greatly satisfies people's needs for the network.
- the WiFi access point adopts a single-hop access mode, which is limited by the transmission power of the WiFi access point, and its coverage is relatively limited. To obtain a wider coverage, it is necessary to deploy more WiFi connections. Incoming points, which increases the overhead of the network.
- the wireless MESH mesh network developed with Ad hoc network is a dynamic multi-hop, self-organizing and self-healing wireless network.
- Nodes in the network can automatically establish Ad Hoc structure and maintain mesh connectivity.
- Each node At the same time, it is a router that can perform discovery and maintain the function of routing to other nodes.
- Two terminal devices that cannot communicate directly can also perform packet forwarding and other communication by other nodes.
- Ad hoc network when two hosts are in communication coverage with each other, they can communicate directly, but because the communication coverage is limited, if two distant hosts want to communicate, they need to pass between them.
- the forwarding of the node can be implemented. Therefore, the host is also a router and is responsible for finding routes and forwarding packets.
- the routes are generally composed of multiple hops. Due to the dynamic multi-hop characteristics of the MESH network, it can effectively extend the coverage of the network and reduce the deployment cost, which is a market that the major network equipment vendors of the home network seize.
- Ethernet Ethernet wired connection is the most popular LAN technology in current applications, which largely replaces other LAN standards, such as Token Ring, Fiber Distributed Data Interface (FDDI) and Token Bus ARCNET.
- FDDI Fiber Distributed Data Interface
- ARCNET Token Bus ARCNET
- Ethernet based on the IEEE802.3 protocol specifies the content of the physical layer connection, electrical signals and medium access MAC layer protocol, specifically describes the implementation of the MAC layer of the physical layer and the data link layer, in a variety of physical media
- the CSMA/CD access method is used at various rates. Ethernet uses carrier frames with collision detection to listen to multiple access CSMA/CD mechanisms. That is, all nodes in the network can see all the information sent in the network. Therefore, we say that Ethernet is a kind of broadcast network.
- Ethernet frame is the encapsulation of the data link layer, and the data packets of the network layer are added with the frame header and the frame tail to become data frames that can be identified by the data link layer.
- the number of bytes used for the header and the end of the frame is fixed, the length of the Ethernet varies depending on the size of the encapsulated packet. The range is 64 to 1518 bytes (not counting 8 words). The leading word of the section).
- Ethernet can use a variety of connection media, including coaxial cable, twisted pair and fiber.
- the twisted pair is mostly used for connection from the host to the hub or switch, while the fiber is mainly used for cascading between switches and point-to-point links between switches and routers.
- the coaxial cable has gradually become the main connecting medium in the early days. It tends to be eliminated.
- the WiFi-based IEEE802.11s MESH protocol works in the MAC layer of WiFi, and cannot be interworked in different media.
- FIG. 2 is a schematic diagram of an example of a mesh networking provided by an embodiment of the present application
- FIG. 3 is a structural diagram of a wireless MESH protocol stack. The working principle of the IEEE802.11s MESH protocol will be described in detail below with reference to FIG. 2 and FIG. 3.
- Each node device in the MESH network system has its own network ID.
- the routing node on the link may store the network ID of the last hop node, and may periodically send its own network ID and the network ID of the previous hop node to the master. node.
- the central node may obtain the dynamic topology of the entire MESH network system according to the information about the network ID of the node and the network ID of the last hop node sent by the routing node and the terminal node.
- the master node may include a user interface and a dynamic topology map of the MESH network system may be presented on the user interface.
- the master node may also present the dynamic topology of the MESH network system through an external device connected thereto.
- the master node 1 and the routing nodes 2, 3 have already formed a MESH mesh network based on WiFi.
- the mesh network composed of node 1, node 2 and node 3 data forwarding and mixing of the MAC layer are mainly implemented.
- HWMP Hybrid Wireless MESH Protocol
- FIG. 3 the software architecture of the wireless MESH protocol stack is mainly divided into two parts: a control plane and a data plane.
- the MESH network node may include a MESH background management module 301, a stored path table 302, a neighbor table 303, a processing module 304, a path selection module 305, a neighbor management module 306, and a data forwarding module 307.
- the modules in the figure are connected by a bus.
- Only parts related to the description of the embodiments of the present application are shown in the drawings, and it should be understood that the application is not limited thereto.
- the neighbor management module 306 in the node initiates a neighbor search, establishes a neighbor relationship, and forms an IEEE 802.11s network;
- the data forwarding module 307 searches the path table 302 to obtain the next hop MAC address to forward the multi-hop data according to the destination MAC address of the data frame. If no valid path information exists, the path selection module 305 is triggered to initiate the path searching process.
- the control plane includes a processing module 304, a neighbor management module 306, and a path selection module 305, which mainly implements Layer 2 path selection, neighbor establishment, and topology management functions.
- the processing module 304 performs parsing processing on the data frames defined by IEEE802.11s and generates a specific frame format.
- the IEEE 802.11s protocol mainly defines two types of frame formats: one is a frame for path selection; the other is a data frame used for topology formation.
- the neighbor management module 306 implements functions such as neighbor discovery, establishing and maintaining a neighbor table.
- the path selection module 305 implements the IEEE 802.11s Layer 2 hybrid path selection HWMP function to maintain and manage the path table.
- the data plane mainly implements MAC layer multi-hop data forwarding and MESH data frame reception and transmission processing. After receiving a data frame, first check the validity of the data, and then determine whether the destination MAC address is sent to the local device. If not, the data forwarding module 307 is entered. Otherwise, the MAC protocol header is converted and sent directly to the upper layer protocol. After receiving the data frame, the data forwarding module 307 first searches the path table 302 according to the destination MAC address. If there is path information to the destination address, copy a data frame, replace the TA and RA fields of the IEEE802.11s protocol header, and then join. To the sending waiting queue; if there is no valid path information, the triggering path finding module initiates a path search and adds the data frame to the path repair waiting queue.
- the node 5 accesses any node based on the WiFi-constituting MESH mesh network through the Ethernet (for example, the node 3 shown in the figure), the node 4, the node 5, and the node 6 only It can be connected to the network in the traditional Repeater bridge mode. Since the node 3 and the node 5 are connected through the Ethernet network, and the protocol stack structure between the MESH network of the WiFi and the Ethernet node is different, the data frame format is different, so that the MESH network and the Ethernet node cannot directly communicate with each other, even 2.4G. The data frame format between the WiFi MESH network and the 5G WiFi MESH network is different, and interworking cannot be achieved.
- a user establishes a MESH network link through WiFi, other heterogeneous media cannot be integrated into the unified network, and multi-hop, self-organization, self-healing, and the like cannot be utilized in heterogeneous media.
- the data forwarding module 307 performs data forwarding, but in the WiFi-based MESH mesh network, the packet address generated by the encapsulation is generated.
- a forwarding format based on a 6-MAC address (eg, including device source/destination address, MESH entry/exit address, source/destination address between adjacent APs), where the address is 2-MAC address (for example, including Device source address/destination address) forwarding, in other words, in the process of forwarding the data packet to node 5 via node 3, stripping the MESH entry/exit address, neighboring AP on the node 3 for the data packet to be sent to node 5.
- the source/destination address is encapsulated into a 2-MAC address that can be forwarded in the Ethernet format, including the device source/destination address, and directly forwarded using the device source/destination address.
- the mesh connection cannot be established between the nodes 4, 5, 6, and 1, 2, and 3, that is, the node 4, 5, 6 is not integrated into the WiFi MESH network consisting of 1, 2, and 3.
- the uplink is still single.
- the smart home device 112 and the PC device 113 communicate, it needs to go through the node 5, and the node 5 becomes a bottleneck for data forwarding. In addition, node 5 will affect the system if a line fault occurs.
- the following takes the path of the node 1 - node 3 - node 5 - node 6 in FIG. 2 as an example to describe the multi-path fusion mesh networking method provided by the embodiment of the present application.
- the WiFi-based MESH network information is extended to multiple nodes through Ethernet.
- multiple types of link devices are integrated into a mesh network, and the link management layer is implemented not only in the mesh network.
- the fusion also realizes the fusion at the data forwarding level, so that the cross-morphological nodes learn through the routing path, thereby achieving network interworking.
- FIG. 4 is a structural diagram of a node provided by an embodiment of the present application.
- the interface VAP-A, the Ethernet LAN (Local Area Network (LAN) interface LAN-Eth, and the Ethernet WAN interface WAN-Eth are physical interfaces, where VAP-A is used for device access.
- LAN Local Area Network
- WAN-Eth Ethernet WAN interface
- the access node AP can be used for the access node AP or the access terminal device;
- the LAN-Eth is the Ethernet LAN port of the node,
- the WAN-Eth is the Ethernet WAN port of the node;
- the VAP-A' is the interface of the virtual MESH networking.
- the MESH connection between the nodes 1 and 3 and between the nodes 5 and 6 is WiFi, and the connection shown by the dotted line in FIG. 4 mainly passes through the virtual interface VAP-A'.
- Communication to achieve communication between nodes; Ethernet connection between nodes 3 and 5, virtual interface VAP-A' between nodes 3 and 5 through the physical Ethernet interface LAN-Eth and WAN-Eth connection Establish communication. From node 1-3 to node 3-5 is the conversion and fusion of WiFi MESH to Ethernet.
- FIG. 5 is a layered architecture diagram of a node protocol according to an embodiment of the present application. As shown in FIG. 5, they are an internal protocol layered architecture of Node 1 - Node 3 - Node 5 - Node 6, respectively, where architecture 510 represents the protocol layering of Node 1, architecture 520 represents the protocol layering of Node 3, and architecture 530 Representing the protocol layering of node 5, architecture 540 represents the protocol layering of node 6.
- the node 3 includes at least two different protocol stack architectures, such as the protocol stack architecture on the MESH network side shown in the architecture 521 and the protocol stack architecture on the Ethernet side shown in 522; similarly, the Ethernet is completed on the node 5
- the node 5 also includes at least two different protocol stack architectures, such as the protocol stack architecture on the Ethernet side shown in architecture 531 and the protocol stack architecture on the MESH network side shown in 532.
- the protocol architecture 510 of the node 1 includes at least: a network layer (for example, an IP layer in the figure), a data link layer (or a medium access control MAC layer), and a physical layer (PHY).
- the network layer defines end-to-end packet transmission, which can identify the logical addresses of all nodes, and also defines how routes are implemented and how they are learned.
- the task of the network layer is to select the appropriate routing node to ensure timely data transmission.
- the network layer combines the frames provided by the data link layer into a data packet, and the packet encapsulates a network layer header, which contains logical address information - source address information and network address information of the destination address.
- the network layer also defines a segmentation method for decomposing a packet into smaller packets.
- the data link layer defines how packets are transmitted over a single link. These protocols are related to the various media used for transport, such as Asynchronous Transfer Mode (ATM), Fiber Distributed Data Interface (Fiber). Distributed Data Interface, FDDI), etc.
- ATM Asynchronous Transfer Mode
- Fiber Fiber Distributed Data Interface
- FDDI Distributed Data Interface
- This layer establishes a data link between adjacent nodes based on the bit stream service provided by the physical layer, provides data frame (Frame) transmission without error on the channel, and the data link layer can provide reliable on the physical medium. transmission.
- the role of this layer includes: physical address addressing, data framing, flow control, data error detection, retransmission, and so on. At this level, the unit of data is called a frame.
- Representatives of the data link layer protocol include: SDLC, HDLC, PPP, STP, Frame Relay, and the like.
- the PHY layer is a specification for transmission media that typically transmits data on physical media in the form of binary data, often with reference to standards established by other organizations. Connections, frames, frame usage, current, coding, and optical modulation are all part of the various physical layer specifications.
- the physical layer uses multiple specifications to define all the details, repeaters, hubs, and usually The twisted pairs all work on the physical layer.
- Nodes 2, 4, and 6 are similar to the protocol stack architecture of node 1 described above, and the protocol stack architectures of node 3 and node 5 are different.
- the protocol architecture 520 of the node 3 includes two different protocol stack architectures 521 and 522, wherein the architecture 521 is used for communication within the MESH mesh network composed of nodes 1, 2, and 3, and the data packet is at the node.
- the MESH mesh network consisting of 1, 2, and 3 is internally forwarded, each node sends, relays, and receives data packets at the network layer mainly depending on the format of a Protocol Data Unit (PDU), of which the most important
- NID Network Interface Device
- TTL Time To Live
- SRC Source Address
- DST Destination Address
- FIG. 6 is a flowchart of an example of packet processing provided by an embodiment of the present application.
- the WiFi-based IEEE802.11s MESH protocol works in the MAC layer of WiFi.
- a node in the MESH mesh network system receives a network data packet, it needs to process according to the protocol specification shown in Figure 6, specifically The steps are described in conjunction with the flowchart as follows:
- the node If the node receives the data packet, it first determines whether the NID matches, and if it does not match, directly discards the data packet;
- the packet is put into the cache, and it is judged whether it needs to be forwarded according to the node type, the TTL value, and the DST value. Only the node type, the TTL value, and the DST address are all three conditions. The data packet is fed back if it is satisfied, otherwise the data packet is discarded;
- the Ethernet protocol stack architecture 522 is included inside the node 3. Because the protocol stack is different, the data packets are generated in a process such as being encapsulated, and the generated format is different, specifically, in the MESH.
- the encapsulated packet address is based on a 6-MAC address (for example, including device source/destination address, MESH entry/exit address, source/destination address between adjacent APs), in Ethernet
- the address in the network is a 2-MAC address (for example, including the device source address/destination address), so the networking information of the MESH mesh network is blocked by the Ethernet, that is, the wireless MESH protocol cannot be extended to 402 and 403 in FIG.
- the wired connection between the nodes is not available. Therefore, the routing node behind the node 5 cannot obtain the mesh topology information composed of the nodes 1, 2, and 3, so that the interworking of the network signaling and the fusion of the paths cannot be implemented.
- FIG. 7 is a schematic diagram of an example of a fusion networking method provided by an embodiment of the present application. The method is applied to a communication system comprising at least two networks, each network comprising at least two nodes, each node of the network communicating based on a first transmission protocol, and at least one node in the first network is capable of At least one node in the network communicates based on the second transmission protocol.
- the communication system 200 shown in FIG. 2 is taken as an example for description.
- the nodes 4, 5, and 6 form a first network
- the nodes 1, 2, and 3 form a second network
- the nodes of the first network are based on the first
- the transport protocol communicates
- the nodes of the second network also communicate based on the first transport protocol
- one node 5 of the first network communicates with the node 3 of the second network based on the second transport protocol.
- the networking method provided by the embodiment of the present application can be applied to the node 3.
- the node 5 is referred to as the first node of the first network
- the node 3 is referred to as the second node of the second network
- the node 6 (or node 4) is referred to as the first network.
- the third node, node 1 (or node 2) is referred to as the fourth node of the second network, and it should be understood that the application is not limited thereto.
- the method 700 includes the following.
- the first node of the first network receives the first data packet from the second node in the second network, where the first data packet is the second node of the second network from the second network After the second data packet received by the fourth node, the data packet generated after the second transmission protocol is encapsulated, wherein the second data packet carries the identification information of the fourth node in the second network.
- node 5 receives a first data packet from node 3, which is a data packet transmitted over a wired network between node 3 and node 5.
- the second data packet is processed according to the first transmission protocol in the second network formed by the nodes 1, 2, and 3, and the second data packet carries the identification information of the node 1 or the node 2 of the second network.
- the second data packet is encapsulated into a first data packet at node 3 based on a second transmission protocol.
- the first node of the first network extends the network layer, the first node receives the first data packet from the second node of the second network, decapsulates the first data packet to obtain the second data packet, and then decapsulates The second data packet obtains identification information of node 1 or node 2 in the second network. Encapsulating the identification information of the second network node 1 or the node 2 in the extended IP layer, and when the data packet is forwarded from the Ethernet network to the first network, the identifier carried in the data packet encapsulated in the extended network layer The information is used as a payload portion of the packet when the packet is encapsulated, and is forwarded to the first network based on the second transmission protocol.
- the node 3 first receiving the data packet of the node 1 or the node 2, the data packet carries the information of the node 1, 2, 3, and after receiving the data packet, the node 3 encapsulates the data packet in the internally extended network layer, which can be understood as The IP layer, and in the subsequent data packet transmission process, the information of the IP layer acts as a payload part of the data packet encapsulation process, and the node 3 encapsulates the data packet based on the second transmission protocol, thereby carrying the identification information of the second network.
- the node 4 and the node 6 can obtain the information of the nodes 1, 2, and 3 through communication with the node 5, Thereby establishing a mesh network in which each node communicates.
- the identifier information of the second network may include information such as networking information, link information, or network IP address of the second network, and the node 3 may encapsulate the identifier information of the second network in an extended network layer.
- the identification information of the second network encapsulated in the extended network layer is encapsulated as a payload part in the data packet.
- the networking information of the second network is encapsulated in the data packet and transmitted to the node 5 of the first network, so that the network topology information of the second network is transmitted to the node 5 and other routing nodes after the node 5.
- the first node of the first network decapsulates the first data packet according to the second transmission protocol to obtain a second data packet.
- first network and the second network are wireless MESH mesh networks
- first network and the second network are connected by using an Ethernet network, that is, the first network and nodes formed by the nodes 4, 5, and 6.
- the second network consisting of 1, 2, and 3 is a wireless MESH mesh network, and the two networks (ie, node 3 and node 5) are connected through an Ethernet.
- the node 3 receives the data packet from the node 1 or the node 2, and the data packet is encapsulated in the layer 3 of the protocol stack at the node 3, and the identifier of the wireless mesh network is the MESH ID, for example, the wireless mesh network of the node 1 or the node 2
- the information such as the identifier MESH ID is encapsulated in the data packet and transmitted to the node 5 through the Ethernet, thereby transmitting information such as the identifier MESH ID of the wireless mesh network of the node 1 or the node 2 to the node 5 and other routing nodes after the node 5,
- the routing node after the node 5 can obtain the identifier MESH ID of the wireless mesh network of the nodes 1, 2, and 3, and implement the wireless MESH mesh network protocol to be extended to the wired network, so that each node of the node 1 - node 6 All can form a mesh network to achieve network interworking.
- the first node sends the second data packet to a third node of the second network.
- the first network and the second network are wireless MESH mesh networks
- the first network and the second network are connected by an Ethernet network
- the node 5 decapsulates the data by decapsulating the data.
- the packet acquires second wireless MESH mesh network identification information composed of nodes 1, 2, and 3.
- the second wireless MESH mesh network identification information carried by the data packet needs to be completed and transmitted to the node 5 through the Ethernet. That is, the internals of the node 3 need to complete the conversion and fusion of the WiFi-based wireless MESH mesh network to the Ethernet. Therefore, the node 3 also includes at least two different protocol stack architectures, which are specifically implemented in the embodiment of the present application as shown in FIG. Another example of a fusion networking method.
- the networking method 800 of FIG. 8 is applied to a communication system including at least two networks, each network including at least two nodes, and nodes in each network communicate based on a first transmission protocol, at least in the first network A node is capable of communicating with at least one of the nodes in the second network based on the second transmission protocol.
- the method 800 includes the following.
- the second node of the second network receives the second data packet from the fourth node of the second network, the second data packet is a data packet generated based on the first transmission protocol, and the The second data packet carries the identification information of the fourth node in the second network.
- the node 3 receives the data packet from the node 1 or the node 2, and the data packet is encapsulated in the layer 3 of the protocol stack at the node 3, and the MESH ID information, such as the identifier of the wireless mesh network of the node 1 or the node 2, MESH
- the ID information is encapsulated in a data packet and transmitted to the node 5 through the Ethernet, thereby transmitting the identifier MESH ID information of the wireless mesh network of the node 1 or the node 2 to the node 5 and other routing nodes after the node 5, so that the node 5 is followed by
- the routing node can obtain the MESH ID information of the nodes 1, 2, and 3, and implement the wireless MESH mesh network protocol to be extended to the wired network.
- the second node of the second network encapsulates the second data packet according to the second transmission protocol to generate a first data packet, where the identifier information of the fourth node in the second network is Being used as the load of the first data packet.
- the node 3 receives the data packet from the node 1 or the node 2, and the data packet is encapsulated in the layer 3 of the protocol stack at the node 3, and the identification information of the MESH network, for example, the wireless mesh network of the node 1 or the node 2
- the identifier MESH ID information is encapsulated in a data packet, and the data packet is encapsulated into a data packet format that can be transmitted by Ethernet, and transmitted to the node 5 through the Ethernet, thereby transmitting the identifier MESH ID information of the wireless mesh network of the node 1 or the node 2
- the routing node after the node 5 can obtain the network information of the nodes 1, 2, and 3, and realize the extension of the wireless MESH mesh network protocol to the wired network.
- the second node of the second network sends the second data packet to the first node of the first network.
- the wireless network information of the first network can be wired and transmitted to other routing nodes, thereby implementing interworking of the network nodes.
- the convergence of the wireless MESH mesh network and the Ethernet network is taken as an example, and the network convergence shown in FIG. 9 is implemented in the communication system shown in FIG. 2, and FIG. 9 is an example network provided by the embodiment of the present application. Schematic diagram of the network.
- the interworking of each node in the network can be realized in a hybrid network of a wireless connection and a wired connection, and the wireless MESH protocol can be extended to the wired and discovered through the fused neighbors.
- the network topology enables the wired interface to merge into the mesh network with virtual mesh nodes.
- data forwarding can be performed between the 6-MAC data packet of the wireless MESH interface and the Ethernet wired 2-MAC data packet interface. For the mutual access between the terminal devices connected to each node, each node can find the best path for communication.
- network interworking can be completed between the nodes, and communication can be performed between every two nodes.
- the routing node 6 can forward the data packet only through the intermediate node 5 connected to the routing node 6 before the network interworking, and the networking technology provided by the embodiment of the present application can be To achieve interworking between each node, a method 1000 as shown in FIG. 10 can be performed.
- FIG. 10 is a schematic diagram of another example of a convergence networking method provided by an embodiment of the present application.
- the networking method 1000 of FIG. 10 is applied to a communication system including at least two networks, each network including at least two nodes, and nodes in each network communicate based on a first transmission protocol, at least in the first network A node can communicate with at least one node in the second network based on a second transmission protocol, as shown in FIG. 10, the method 1000 including the following.
- the third node of the first network receives a second data packet from a first node in the first network, where the second data packet is a first node pair in the first network a data packet obtained after the first data packet is decapsulated, the first data packet being a second data packet received by the second node of the second network from the fourth node of the second network, according to the The data packet generated after the second transmission protocol is encapsulated, wherein the second data packet carries the identification information of the fourth node in the second network.
- the identifier information of the second network may include any node node 1, node 2 of the second network, or an identifier MESH ID of the wireless mesh network of the node 3.
- the identifier MESH ID information of the wireless mesh network of any node node 1, node 2 or node 3 of the second network is encapsulated in a data packet, and transmitted to the node 5 through the second network, and the group of the second network is The network information is encapsulated in the data packet to the node 5 of the second network, thereby transmitting the network topology information of the first network to the node 5 and other routing nodes after the node 5.
- first network and the second network are wireless MESH mesh networks
- first network and the second network are connected by an Ethernet network
- the second network composed of 2, 3 is a wireless MESH mesh network
- the two networks ie, node 3 and node 5 are connected through an Ethernet.
- the wireless MESH mesh network information is transmitted to the nodes 4, 5, 6 so that the nodes 4, 5, 6 and the nodes 1, 2, 3 merge into one mesh network.
- communication can be implemented between any two nodes in the network, that is, the direct forwarding of the data packet is completed.
- the third node of the first network acquires the identifier information of the fourth node in the second network from the second data packet, and determines according to the identifier information of the fourth node in the second network.
- the ID of the fourth node communicates with the fourth node of the second network based on the first transmission protocol.
- the node 6 can communicate with any routing node in the mesh network. Specifically, the processing flow inside the node of the mesh network will be described in detail from the aspects of link management and data forwarding.
- the signaling message of the MESH 802.11s link management and data forwarding on the WiFi-based MESH network side is encapsulated in the extended IP layer when the IP node is transferred to the IP layer.
- the MESH network information is processed by Ethernet and then forwarded through the MAC layer of WiFi. Referring to FIG. 11 and FIG. 12, the details are as follows:
- neighbor nodes collect and discover neighbors by performing an MESH Probe Request, a MESH Probe Response, and a MESH Beacon. Information, thereby refreshing the neighbor entries.
- the routing node 1 initiates an active scanning request to the neighboring node, and the routing node 3, which is the neighboring node, receives the request of the node 1, and notifies the node 1 of the routing information, and the node 1 updates the stored information after receiving the routing information of the node 3. Neighbor entry.
- the basic information interaction between the source node and the destination node is necessary. Simply put, how is the source node? Tell the destination node: I need your MAC address; and how the destination node responds: this is my MAC address.
- the primary route sends information, it will broadcast the Address Resolution Protocol (ARP) request containing the destination IP address to all routing nodes on the Ethernet system, and receive the return message to determine the physical address of the target; receive the return message.
- ARP Address Resolution Protocol
- the IP address and the physical address are stored in the local ARP cache and reserved for a certain period of time. The ARP cache is directly queried to save resources on the next request.
- ARP Address Resolution Protocol
- the ARP command can be used to query the mapping between the IP address and the MAC address in the local ARP cache, and add or delete static correspondences. It should be understood that both the ARP request and the ARP reply are assembled and sent in an ARP packet.
- the composition of the structure is shown in Table 2 below. It should be noted that the ARP packet is encapsulated in the Ethernet frame, so the Ethernet frame header is also listed in the table.
- the first two fields in the Ethernet frame header are the Ethernet MAC address and the source MAC address, and the special address whose destination address is all ones is the Ethernet broadcast address.
- the source node Before the ARP entry is established, the source node only knows the IP address of the destination node and does not know its MAC address. Therefore, on the data link, the source node sends the ARP request packet only through the broadcast, on the same network segment. All Ethernet interfaces receive broadcast packets.
- the next two single-byte length fields, called hardware address length and protocol address length indicate the length of the hardware address and protocol address, respectively, in length.
- the next four fields are the Ethernet MAC address of the sender, the IP address of the sender, the Ethernet MAC address of the destination, and the IP address of the destination.
- the Ethernet node includes the node 3 and the node 5, and the node 3 initiates an ARP request to the node 5.
- the data packet passes through the processing of the node 3,
- the ARP request carrying the MESH network information is broadcast to the node 5, and the node 5 informs the node 3 of the IP address and the physical address by returning the message, and the node 3 stores the IP address and the physical address in the local ARP cache and retains it.
- the node 5 decapsulates the data packet from the node 3, obtains the MESH network information, and similar to the node 1, will continue to initiate an active scanning request to the neighboring node 6, and transmit the networking information of the node 1 to the node 6
- the neighbor node 6 as the node 5 receives the request of the node 5, and notifies the node 5 of the routing information, and the node 5 updates the stored neighbor entry after receiving the routing information of the node 6.
- the neighboring entry is discovered by the extended neighbors.
- each node has the function of active reporting. That is, when the entry changes, the upper node and the primary node are advertised.
- the master node forms the topology of the network node, and the upper node forms the topology of the surrounding nodes, repeats the above series of operations, and realizes information notification of all nodes of the entire network.
- the ARP of the broadcast learning device is extended to carry the MESH ID information.
- the interworking of the virtual interface on the physical interface of the Ethernet that is, the interworking between the virtual interface VAP-A' of the node 3 402 and the virtual interface VAP-A' of the node 5 403 in FIG.
- the master node periodically broadcasts the gateway advertisement frame RANN.
- the RANN includes information such as the MAC address of the master node.
- the node receives the route request frame PREQ, it saves the routing information and replies to the route request acknowledgement frame PREP. If the PREP is not received within a certain period of time, the route is re-transmitted to obtain the frame PREQ.
- the message body of the RANN is carried on the IP layer in the Ethernet;
- the virtual interface VAP is implemented between different media.
- -A' forwards the message.
- the structure of the routing table includes the destination address, the next hop address, and the hop count.
- the path length between nodes 1 and 3 is A, and between nodes 3 and 5.
- the path is defined as 0 for the Ethernet length, and the path length between the nodes 5 and 6 is B.
- the path learning process between the nodes will be described in detail below with reference to FIG.
- FIG. 12 is a schematic diagram of an example of path learning provided by an embodiment of the present application.
- the master node 1 periodically broadcasts the gateway advertisement frame RANN, and after receiving the RANN, the node 3 performs S1202 forwarding to the node 5, and the path distance (metric) is A, and the node 3 further performs S1203 back.
- the message body of the RANN of the node 3 is carried on the IP layer, that is, the network information ID carrying the node 1.
- the node 5 After receiving the RANN, the node 5 forwards to the node 6 through S1204, and the path metric is A+0, and the node 5 also performs S1205 back to the node 3, that is, the path distance is A+0, and the path is learned through such path.
- the network information carrying the node 1 is transmitted to the node 5 and other nodes thereafter.
- the node 6 After receiving the RANN message of the node 5, the node 6 returns S156 to the node 5, that is, the path distance is A+0+B.
- routing table 3 shown in Table 3
- routing table 4 shown in Table 4.
- the node 3 When the node 3 is a node of the MESH network, that is, the left part of the node 3 in FIG. 12 performs data forwarding according to the routing table 3 of the above table 3.
- the node 3 is fed back to the node 1, and the next hop is the node 1, and the distance is A, when the transition from the MESH node to the Ethernet node, the elapsed distance is zero.
- the data is forwarded according to the routing table 3' of the above table 4.
- the node 3 forwards the data of the node 1 to the node 5, and the distance passed is the previous hop distance, which is also A.
- the distance between the internal nodes of the Ethernet node is 0, and the internal WIFI MESH interfaces of the AP are also in the manner that the distance metric is 0.
- the metric value is measured and 2.4G. same.
- the generation of the multipath forwarding table of each node is completed by the transfer of values between the message bodies learned by the path. There are both the main route and the other node, thus completing the interworking between the nodes.
- FIG. 13 is a schematic block diagram of an example node device provided by an embodiment of the present application.
- the node device 1300 can be configured to correspond to the first node device described in the foregoing converged networking method 700, and each module and unit in the node device 1300 is used to perform each action and processing performed by the first node device in the foregoing method 700. process.
- the first node device 1300 includes a receiving unit 1310, a processing unit 1320, and a transmitting unit 1330.
- the first node device is applied to a communication system including at least two networks, each network includes at least two node devices, and node devices of each network communicate according to a first transmission protocol, at least one of the first networks
- the node device is capable of communicating with at least one node device in the second network based on the second transmission protocol.
- the receiving unit 1310 is configured to receive a second data packet from a fourth node of the second network, where the second data packet is a data packet generated based on the first transmission protocol, and the second data packet Carrying identification information of the second network.
- the processing unit 1320 is configured to decapsulate the first data packet according to the first transmission protocol to obtain a second data packet, where the second data packet carries identifier information of the second network.
- the sending unit 1330 is configured to send the second data packet to a third node of the second network.
- the processing unit is further configured to extend the network layer, and encapsulate the first data packet received by the receiving unit in an extended network layer.
- the identifier information of the second network may include information such as networking information, link information, or network IP address of the second network.
- first network and the second network are wireless MESH mesh networks
- first network and the second network are connected by an Ethernet network, that is, the first network and nodes 1, 2 composed of nodes 4, 5, and 6.
- the second network composed of 3 is a wireless MESH mesh network, and the two networks (ie, node 3 and node 5) are connected through an Ethernet.
- the node 3 receives the data packet from the node 1 or the node 2, and the data packet is encapsulated in the layer 3 of the protocol stack at the node 3, and encapsulates the information of the MESH network information, such as networking information, link information or network IP address, in the data.
- the packet In the packet, it is transmitted to the node 5 through the Ethernet, so that information such as networking information, link information or network IP address is transmitted to the node 5 and other routing nodes after the node 5, so that the routing node after the node 5 can obtain the node.
- the network information of 1, 2, and 3 realizes the extension of the wireless MESH mesh network protocol to the wired network, so that each node of the node 1 - node 6 can form a mesh network to realize network interworking.
- FIG. 14 is a schematic block diagram of another example node device provided by an embodiment of the present application.
- the node device 1400 can be configured to correspond to the second node device described in the foregoing fusion networking method 800, and each module and unit in the node device 1400 is used to perform each action and processing performed by the second node device in the foregoing method 800. process.
- the second node device 1400 includes a receiving unit 1410, a processing unit 1420, and a transmitting unit 1430.
- the second node device is applied to a communication system including at least two networks, each network including at least two node devices, and node devices of each network communicate according to a first transmission protocol, at least one of the first networks
- the node device is capable of communicating with at least one node device in the second network based on the second transmission protocol.
- the receiving unit 1410 is configured to receive a second data packet from a fourth node of the second network, where the second data packet is a data packet generated based on the first transmission protocol, and the second data packet Carrying identification information of the second network.
- the processing unit 1420 is configured to encapsulate the second data packet according to the second transmission protocol to generate a first data packet, where the second data packet is used as a load of the first data packet.
- the sending unit 1430 is configured to send the second data packet to the first node of the first network.
- the identifier information of the second network may include information such as networking information, link information, or network IP address of the second network.
- first network and the second network are wireless MESH mesh networks
- first network and the second network are connected by an Ethernet network, that is, the first network and the node 1 composed of nodes 4, 5, and 6
- the second network composed of 2, 3 is a wireless MESH mesh network, and the two networks (ie, node 3 and node 5) are connected through an Ethernet.
- the node 3 receives the data packet from the node 1 or the node 2, and the data packet is encapsulated in the layer 3 of the protocol stack at the node 3, and encapsulates the information of the MESH network information, such as networking information, link information or network IP address, in the data.
- the packet In the packet, it is transmitted to the node 5 through the Ethernet, so that information such as networking information, link information or network IP address is transmitted to the node 5 and other routing nodes after the node 5, so that the routing node after the node 5 can obtain the node.
- the network information of 1, 2, and 3 realizes the extension of the wireless MESH mesh network protocol to the wired network, so that each node of the node 1 - node 6 can form a mesh network to realize network interworking. .
- FIG. 15 is a schematic block diagram of another example node device provided by an embodiment of the present application.
- the node device 1500 can be configured to correspond to the third node device described in the foregoing fusion networking method 1000, and each module and unit in the node device 1500 is used to perform each action and processing performed by the third node device in the foregoing method 1000. process.
- the third node device 1500 includes a receiving unit 1510, a processing unit 1520, and a transmitting unit 1530.
- the third node device is applied to a communication system including at least two networks, each network including at least two node devices, and node devices in each network communicate based on a first transmission protocol, at least in the first network
- a node device is capable of communicating with at least one node device in the second network based on a second transmission protocol.
- the receiving unit 1510 is configured to receive a second data packet from a first node device in the first network, where the second data packet is a first node in the first network to a first data packet. Decapsulating the obtained data packet, the first data packet is a data packet generated by the second node device of the second network according to the second transmission protocol, and the first data packet carries the second data packet Identification information of the network.
- the processing unit 1520 is configured to obtain the identifier information of the second network from the second data packet, and based on the identifier information of the second network, based on the first transport protocol and the second network
- the two-node device communicates.
- the identifier information of the second network may include information such as networking information, link information, or network IP address of the second network.
- first network and the second network are wireless MESH mesh networks
- first network and the second network are connected by an Ethernet network, that is, the first network and the node 1 composed of nodes 4, 5, and 6
- the second network composed of 2, 3 is a wireless MESH mesh network, and the two networks (ie, node 3 and node 5) are connected through an Ethernet.
- the data packet received by the third node device reads the identification information of the network, thereby obtaining the MESH network information, and can obtain information of each node device in the wireless MESH mesh network and the Ethernet network, so that each node device can form a mesh Network, to achieve network interoperability.
- FIG. 16 is a schematic block diagram of a communication device provided by an embodiment of the present application.
- the communication device 1600 includes a processor 1610, a transceiver 1620, and a memory 1630, wherein the processor 1610, the transceiver 1620, and the memory 1630 communicate with each other through an internal connection path.
- the memory 1630 is configured to store instructions for executing the instructions stored by the memory 1630 to control the transceiver 1620 to receive signals or transmit signals.
- the processor 1610 may invoke the program code stored in the memory 1630 to perform the corresponding operations of the method 700 performed by the first node device in the method embodiment.
- the processor 1610 may invoke the program code stored in the memory 1630 to perform the corresponding operations of the method 700 performed by the first node device in the method embodiment.
- the processor 1610 can invoke the program code stored in the memory 1630 to perform the corresponding operations of the method 800 performed by the second node device in the method embodiment.
- the processor 1610 can invoke the program code stored in the memory 1630 to perform the corresponding operations of the method 800 performed by the second node device in the method embodiment.
- the processor 1610 may invoke the program code stored in the memory 1630 to perform the corresponding operations of the method 1000 performed by the third node device in the method embodiment.
- the processor 1610 may invoke the program code stored in the memory 1630 to perform the corresponding operations of the method 1000 performed by the third node device in the method embodiment.
- the processor of the embodiment of the present application may be an integrated circuit chip with signal processing capability.
- each step of the foregoing method embodiment may be completed by an integrated logic circuit of hardware in a processor or an instruction in a form of software.
- the processor may be a general-purpose processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a Field Programmable Gate Array (FPGA), or the like. Programming logic devices, discrete gates or transistor logic devices, discrete hardware components.
- the methods, steps, and logical block diagrams disclosed in the embodiments of the present application can be implemented or executed.
- the general purpose processor may be a microprocessor or the processor or any conventional processor or the like.
- the steps of the method disclosed in the embodiments of the present application may be directly implemented by the hardware decoding processor, or may be performed by a combination of hardware and software modules in the decoding processor.
- the software module can be located in a conventional storage medium such as random access memory, flash memory, read only memory, programmable read only memory or electrically erasable programmable memory, registers, and the like.
- the storage medium is located in the memory, and the processor reads the information in the memory and combines the hardware to complete the steps of the above method.
- the memory in the embodiments of the present application may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memory.
- the non-volatile memory may be a read-only memory (ROM), a programmable read only memory (PROM), an erasable programmable read only memory (Erasable PROM, EPROM), or an electric Erase programmable read only memory (EEPROM) or flash memory.
- the volatile memory can be a Random Access Memory (RAM) that acts as an external cache.
- RAM Random Access Memory
- many forms of RAM are available, such as static random access memory (SRAM), dynamic random access memory (DRAM), synchronous dynamic random access memory (Synchronous DRAM).
- SDRAM Double Data Rate SDRAM
- DDR SDRAM Double Data Rate SDRAM
- ESDRAM Enhanced Synchronous Dynamic Random Access Memory
- SLDRAM Synchronous Connection Dynamic Random Access Memory
- DR RAM direct memory bus random access memory
- FIG. 17 is a schematic block diagram of a system chip provided by an embodiment of the present application.
- the system chip 1700 of FIG. 17 includes an input interface 1701, an output interface 1702, at least one processor 1703, and a memory 1704.
- the input interface 1701, the output interface 1702, the processor 1703, and the memory 1704 are interconnected by an internal connection path.
- the processor 1703 is configured to execute code in the memory 1704.
- the processor 1703 can implement the method 700 performed by the first node in the method embodiment. For the sake of brevity, it will not be repeated here.
- the processor 1703 can implement the method 800 performed by the second node in the method embodiment. For the sake of brevity, it will not be repeated here.
- the processor 1703 can implement the method 1000 performed by the third node in the method embodiment. For the sake of brevity, it will not be repeated here.
- B corresponding to A means that B is associated with A, and B can be determined according to A.
- determining B from A does not mean that B is only determined based on A, and that B can also be determined based on A and/or other information.
- the disclosed systems, devices, and methods may be implemented in other manners.
- the device embodiments described above are merely illustrative.
- the division of the unit is only a logical function division.
- there may be another division manner for example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not executed.
- the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in an electrical, mechanical or other form.
- the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
- each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
- the functions may be stored in a computer readable storage medium if implemented in the form of a software functional unit and sold or used as a standalone product.
- the technical solution of the present application which is essential or contributes to the prior art, or a part of the technical solution, may be embodied in the form of a software product, which is stored in a storage medium, including
- the instructions are used to cause a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the steps of the methods described in various embodiments of the present application.
- the foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like, which can store program codes. .
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
本申请提供了一种融合组网的方法和装置,应用于包括至少两个网络的通信系统中,每个网络包括至少两个节点,每个网络中的节点之间基于第一传输协议进行通信,第一网络中的至少一个节点能够与第二网络中的至少一个节点基于第二传输协议进行通信,该方法包括:第一网络的第一节点从第二网络中的第二节点接收第一数据包,其中,该第一数据包是该第二网络的第二节点从该第二网络的第四节点接收的第二数据包,该第二数据包携带有该第二网络中第四节点的标识信息;该第一网络的第一节点对该第一数据包进行解封装,以获取第二数据包;该第一网络的第一节点向该第一网络的第三节点发送该第二数据包,该组网方法能够实现不同介质间网络的互通。
Description
本申请涉及通信领域,并且更具体地,涉及一种融合组网的方法和装置。
无线网状MESH网络由MESH路由器和MESH用户端组成,其中由网状网络MESH路由器构成骨干网络并和互联网相连接,负责为MESH客户端提供多跳的无线互联网连接。通常在MESH网络中,是基于IEEE802.11s协议在WiFi的MAC层进行无线通信,包括设备自动发现、自动拓扑、路径学习,数据包的转发等功能。
家庭用户的设备形态是多样的,多个节点(Access Point,AP)之间除了通过WiFi连接,还有可能通过其它方式:以太网有线连接,电力线连接等多种连接方式。而基于WiFi的IEEE802.11s MESH协议工作在WiFi的MAC层,无法在不同介质中完成网络的互通。例如WiFi的MESH网络和以太网的节点之间无法直接互通,甚至2.4G WiFi的MESH网络同5G WiFi的MESH网络也无法互通。当用户端通过WiFi建立MESH网络链路后,无法将其它异种介质融入到统一网络中,无法在异种介质中发挥MESH网络动态多跳、自组织、自愈和等优势。
因此,需要对基于WiFi的MESH网状网络进行扩展,建立统一的多类型链路融合网状网络,满足用户端需求。
发明内容
本申请提供一种融合组网的方法、装置和通信系统,能够实现不同介质间网络的互通,提升用户部署,提高用户体验。
第一方面,提供了一种融合组网的方法,应用于包括至少两个网络的通信系统中,每个网络包括至少两个节点,每个网络中的节点之间基于第一传输协议进行通信,第一网络中的至少一个节点能够与第二网络中的至少一个节点基于第二传输协议进行通信,该方法包括:
第一网络的第一节点从第二网络中的第二节点接收第一数据包,其中,该第一数据包是该第二网络的第二节点从该第二网络的第四节点接收的第二数据包后,根据该第二传输协议封装后生成的数据包,其中,该第二数据包携带有该第二网络中第四节点的标识信息;
该第一网络的第一节点根据该第二传输协议对该第一数据包进行解封装,以获取第二数据包;
该第一网络的第一节点向该第一网络的第三节点发送该第二数据包。
基于上述技术方案,将第二网络的网络标识信息进行封装,携带在数据包中,通过另一种不同介质网络中的转发至第一网络,使得该第二网络的网络信息通过不同介质扩展到多节点上,从而在多路由的家庭混合组网络中,实现多种不同链路间的基于网状网络的互通,建立统一的跨网络的网状组网,提升用户体验。
结合第一方面,在第一方面的某些实现方式中,
该第一网络的第一节点根据该第二传输协议对该第一数据包进行解封装,以获取第二数据包,包括:
该第一网络的第一节点获取该第二数据包携带的该第二网络中第四节点的标识信息;
该第一网络的第一节点向该第一网络的第三节点发送扩展的地址解析协议ARP请求消息,该ARP请求消息携带该第二网络中第四节点的标识信息。
当有数据包需要从第一网络经过不同介质传输到第二网络时,第一网络的第一节点扩展网络层,接收到第一数据包之后,将该第一封装在扩展的网络层,即实现将第二网络的标识信息作为负载部分封装。通过上述方法,将第二网络的组网信息封装在数据包中传递给第二网络的第二节点,从而将第二网络的网络拓扑信息传递到第一网络的各个路由节点。
结合第一方面和上述实现方式,在第一方面的某些实现方式中,该第二网络是无线网状MESH网络,该第二网络中第四节点的标识信息包括该第二网络中第四节点的无线网状网络的标识MESH ID。
具体地,该第二网络的标识信息可以包括该第二网络的组网信息、链路信息或者网络IP地址等信息,将第二网络的标识信息封装在数据包中传递给第一网络,从而将第二网络的网络拓扑信息传递到第一网络的各个路由节点。
结合第一方面和上述实现方式,在第一方面的某些实现方式中,该第一传输协议是无线MESH网状网络协议,该第二传输协议是以太网协议。
当第一网络和第二网络是无线MESH网状网络,第一网络和第二网络之间通过以太网连接。通过将第二网络的MESH网络信息,例如组网信息、链路信息或者网络IP地址等信息封装在数据包内,通过以太网传输到第一网络的第一节点,从而将组网信息、链路信息或者网络IP地址等信息传递到第一网络的第一节点,以及进一步传输到其他路由节点,实现将无线MESH网状网络协议扩展到有线网络上,从而节点1-节点6的每个节点都能够组成网状网络,实现网络的互通。
第二方面,提供了一种融合组网的方法,应用于包括至少两个网络的通信系统中,每个网络包括至少两个节点,每个网络的节点之间基于第一传输协议进行通信,第一网络中的至少一个节点能够与第二网络中的至少一个节点基于第二传输协议进行通信,该方法包括:
第二网络的第二节点从该第二网络的第四节点接收第二数据包,该第二数据包是基于该第一传输协议生成的数据包,且该第二数据包携带有该第二网络中第四节点的标识信息;
该第二网络的第二节点根据该第二传输协议对该第二数据包进行封装以生成第一数据包,其中,该第二网络中第四节点的标识信息被作为该第一数据包的负载;
该第二网络的第二节点向该第一网络的第一节点发送该第二数据包。
结合第二方面,在第二方面的某些实现方式中,
该第二网络的第二节点根据该第二传输协议对该第二数据包进行封装以生成第一数据包,包括:
该第二网络的第二节点获取该第二数据包携带的该第二网络中第四节点的标识信息;
该第二网络的第二节点向该第一网络的第一节点发送扩展的地址解析协议ARP请求消息,该ARP请求消息携带该第二网络中第四节点的标识信息。
结合第二方面和上述实现方式,在第二方面的某些可能的实现方式中,该第二网络是无线网状MESH网络,该第二网络中第四节点的标识信息包括该第二网络中第四节点的无线网状网络的标识MESH ID。
结合第二方面和上述实现方式,在第二方面的某些可能的实现方式中,该第一传输协议是无线MESH网状网络协议,该第二传输协议是以太网协议。
第三方面,提供了一种融合组网的方法,其特征在于,应用于包括至少两个网络的通信系统中,每个网络包括至少两个节点,每个网络中的节点之间基于第一传输协议进行通信,第一网络中的至少一个节点能够与第二网络中的至少一个节点基于第二传输协议进行通信,该方法包括:
该第一网络的第三节点从该第一网络中的第一节点接收第二数据包,其中,该第二数据包是该第一网络中的第一节点对第一数据包解封装后获得的数据包,该第一数据包是该第二网络的第二节点从该第二网络的第四节点接收的第二数据包后,根据该第二传输协议封装后生成的数据包,其中,该第二数据包携带有该第二网络中第四节点的标识信息;
该第一网络的第三节点从该第二数据包中获取该第二网络中第四节点的标识信息,并根据该第二网络中第四节点的标识信息确定该第四节点的ID,基于该第一传输协议与该第二网络的第四节点进行通信。
结合第三方面和上述实现方式,在第三方面的某些可能的实现方式中,该第二网络是无线网状MESH网络,该第二网络中第四节点的标识信息包括该第二网络中第四节点的无线网状网络的标识MESH ID。
结合第三方面和上述实现方式,在第三方面的某些可能的实现方式中,该第一传输协议是无线mesh网状网络协议,该第二传输协议是以太网协议。
当上述第一方面、第二方面、第三方面提供的组网方法具体可以用在基于WiFi的MESH网络和以太网组成的混合组网场景。具体地,MESH网络包括节点4、节点5、节点6组成的第一网络,以及节点1、接点2、节点3组成的第二网络。
其中,节点1或节点2的数据包发送给节点3,节点3内部有两种协议栈架构,一种MESH协议栈架构,一种以太网协议栈架构。节点3接收到该数据包,该数据包里携带有节点1或节点2的MESH ID信息。该数据包在节点3的内部,节点3通过对数据包的解封装来获取该MESH ID信息,并扩展IP层,将该MESH ID信息封装在扩展的IP层。当有数据包需要经过节点3和5之间的以太网传输到节点5之后的MESH网络时,节点3处对数据包进行封装时,会将该MESH ID信息作为该数据包的负载部分封装在数据包的内部。
当数据包经过节点3和节点5之间的以太网传输到节点5,就将该MESH ID信息传输到了节点5。具体地,邻居节点之间要进行主动扫描(probe request/response)、被动监听(mesh beacon)进行邻居表项的刷新。在节点3和节点5之间,对广播学习的ARP进行扩展,即将该MESH ID信息携带在ARP Request中传输到节点5。
相应地,节点5内部也有两种协议栈架构,一种以太网协议栈架构,一种MESH协议栈架构。节点5接收到该携带MESH ID信息的数据包,再对数据包进行解封装,获取 该MESH ID信息。节点5和节点3交互的协议栈为以太网协议栈,将获取的该MESH ID信息封装在扩展的IP层。当有数据包经由以太网传输时,会剥除了原MESH网络数据包格式中的MESH入口/出口地址,相邻AP间的源/目的地址,再经过封装成可以在以太网中转发格式,只包括设备源/目的地址的2-MAC地址。当节点5内部协议栈封装有该MESH ID信息时,对该携带2-MAC地址的数据包进行封装时,将该MESH ID信息也封装在数据包中,从而使节点5传输到节点4或节点6的时候携带该MESH ID。那么,节点4或节点6就获得了节点1或节点2的标识信息,从而能在使各个节点形成一个融合的网状网络,在数据包转发过程中发挥多跳、自组织、自愈和等优势。
此后,通过邻居节点的发现更新邻居表项,同时,各个节点具备上报功能,即邻居表项发生变化时,通告上层节点和主节点。从而,主节点1形成网络节点拓扑,实现所有节点的网状拓扑结构。在路径学习过程,基于主节点的RANN机制,学习各个节点到主节点的路径。在以太网中RANN消息体承载在扩展的IP层,该RANN消息体携带该MESH ID,通过不同介质间虚拟接口来转发消息。
经过上述方法,节点4或节点6就获得了节点1或节点2的标识信息,从而,对于任意一个节点,例如节点6,当有数据需要发送到节点1时,就不需要经过节点5、节点3的一系列转发,直接可以与节点1建立通信,将数据直接从节点6传输到节点1。
第四方面,提供了一种节点设备,该节点设备为第一节点设备,应用于包括至少两个网络的通信系统中,每个网络包括至少两个节点设备,每个网络的节点设备之间基于第一传输协议进行通信,第一网络中的至少一个节点设备能够与第二网络中的至少一个节点设备基于第二传输协议进行通信,该第一节点设备包括:
用于从第二网络中的第二节点设备接收第一数据包,其中,该第一数据包是该第二网络的第二节点从该第二网络的第四节点接收的第二数据包后,根据该第二传输协议封装后生成的数据包,其中,该第二数据包携带有该第二网络中第四节点的标识信息;
处理单元,用于根据该第二传输协议对该第一数据包进行解封装,以获取第二数据包;
发送单元,用于向该第一网络的第三节点设备发送该第二数据包。
结合第四方面,在第四方面的某些可能的实现方式中,该处理单元还用于获取该第二数据包携带的该第二网络中第四节点的标识信息;
该发送单元还用于向该第一网络的第三节点发送扩展的地址解析协议ARP请求消息,该ARP请求消息携带该第二网络中第四节点的标识信息。
结合第四方面和上述实现方式,在第四方面的某些可能的实现方式中,该第二网络是无线网状MESH网络,该第二网络中第四节点的标识信息包括该第二网络中第四节点的无线网状网络的标识MESH ID。
结合第四方面和上述实现方式,在第四方面的某些可能的实现方式中,该第一传输协议是无线MESH网状网络协议,该第二传输协议是以太网协议。
第五方面,提供了一种节点设备,该节点设备为第二节点设备,应用于包括至少两个网络的通信系统中,每个网络包括至少两个节点设备,每个网络的节点设备之间基于第一传输协议进行通信,第一网络中的至少一个节点设备能够与第二网络中的至少一个节点设备基于第二传输协议进行通信,该第二节点设备包括:
接收单元,用于从该第二网络的第四节点设备接收第二数据包,该第二数据包是基于 该第一传输协议生成的数据包,且该第二数据包携带有该第二网络中第四节点的标识信息;
处理单元,用于根据该第二传输协议对该第二数据包进行封装以生成第一数据包,其中,该第二网络中第四节点的标识信息被作为该第一数据包的负载;
发送单元,用于向该第一网络的第一节点设备发送该第二数据包。
结合第五方面,在第五方面的某些可能的实现方式中,该处理单元还用于获取该第二数据包携带的该第二网络中第四节点的标识信息;
该发送单元还用于向该第一网络的第一节点发送扩展的地址解析协议ARP请求消息,该ARP请求消息携带该第二网络中第四节点的标识信息。
结合第五方面和上述实现方式,在第五方面的某些可能的实现方式中,该第二网络是无线网状MESH网络,该第二网络中第四节点的标识信息包括该第二网络中第四节点的无线网状网络的标识MESH ID。
结合第五方面和上述实现方式,在第五方面的某些可能的实现方式中,该第一传输协议是无线MESH网状网络协议,该第二传输协议是以太网协议。
第六方面,提供了一种节点设备,该节点设备为第三节点设备,应用于包括至少两个网络的通信系统中,每个网络包括至少两个节点设备,每个网络中的节点设备之间基于第一传输协议进行通信,第一网络中的至少一个节点设备能够与第二网络中的至少一个节点设备基于第二传输协议进行通信,该第三节点设备包括:
接收单元,用于从该第一网络中的第一节点设备接收第二数据包,其中,该第二数据包是该第一网络中的第一节点对第一数据包解封装后获得的数据包,该第一数据包是该第二网络的第二节点从该第二网络的第四节点接收的第二数据包后,根据该第二传输协议封装后生成的数据包,其中,该第二数据包携带有该第二网络中第四节点的标识信息;
处理单元,用于从该第二数据包中获取该第二网络中第四节点的标识信息,并根据该第二网络中第四节点的标识信息确定该第四节点的ID,基于该第一传输协议与该第二网络的第四节点设备进行通信。
结合第六方面,在第六方面的某些可能的实现方式中,该第二网络是无线网状MESH网络,该第二网络中第四节点的标识信息包括该第二网络中第四节点的无线网状网络的标识MESH ID。
结合第六方面和上述实现方式,在第六方面的某些可能的实现方式中,该第一传输协议是无线MESH网状网络协议,该第二传输协议是以太网协议。
第七方面,提供了一种节点设备,该节点设备为第一节点设备,包括收发器、处理器和存储器。该处理器用于控制收发器收发信号,该存储器用于存储计算机程序,该处理器用于从存储器中调用并运行该计算机程序,使得该终端设备执行上述第一方面和第一方面任意一种可能的实现方式中任意一种可能的实现方式中的方法。
第八方面,提供了一种节点设备,该节点设备为第二节点设备,包括收发器、处理器和存储器。该处理器用于控制收发器收发信号,该存储器用于存储计算机程序,该处理器用于从存储器中调用并运行该计算机程序,使得该终端设备执行上述第二方面和第二方面任意一种可能的实现方式中任意一种可能的实现方式中的方法。
第九方面,提供了一种节点设备,该节点设备为第三节点设备,包括收发器、处理器 和存储器。该处理器用于控制收发器收发信号,该存储器用于存储计算机程序,该处理器用于从存储器中调用并运行该计算机程序,使得该终端设备执行上述第三方面和第三方面任意一种可能的实现方式中任意一种可能的实现方式中的方法。
第十方面,提供了一种计算机程序产品,所述计算机程序产品包括:计算机程序代码,当所述计算机程序代码在计算机上运行时,使得计算机执行上述各方面中的方法。
第十一方面,提供了一种计算机可读介质,所述计算机可读介质存储有程序代码,当所述计算机程序代码在计算机上运行时,使得计算机执行上述各方面中的方法。
第十二方面,提供了一种芯片系统,该芯片系统包括处理器,用于支持第一节点设备或第二节点设备或第三节点设备实现上述各个方面中所涉及的功能,例如,生成,接收,确定,发送,或处理上述方法中所涉及的数据和/或信息。在一种可能的设计中,所述芯片系统还包括存储器,所述存储器,用于保存终端设备必要的程序指令和数据。该芯片系统可以由芯片构成,也可以包括芯片和其他分立器件。
第十三方面,提供了一种芯片系统,该芯片系统包括处理器,用于支持第二节点设备实现上述各个方面中所涉及的功能,例如,生成,接收,确定,发送,或处理上述方法中所涉及的数据和/或信息。在一种可能的设计中,所述芯片系统还包括存储器,所述存储器,用于保存终端设备必要的程序指令和数据。该芯片系统可以由芯片构成,也可以包括芯片和其他分立器件。
第十四方面,提供了一种芯片系统,该芯片系统包括处理器,用于支持第三节点设备实现上述各个方面中所涉及的功能,例如,生成,接收,确定,发送,或处理上述方法中所涉及的数据和/或信息。在一种可能的设计中,所述芯片系统还包括存储器,所述存储器,用于保存终端设备必要的程序指令和数据。该芯片系统可以由芯片构成,也可以包括芯片和其他分立器件。
图1是本申请实施例提供的树状组网的一例示意图。
图2是本申请实施例提供的网状组网的一例示意图。
图3是本申请实施例提供的无线MESH协议栈的架构图。
图4是本申请实施例提供的节点结构图。
图5是本申请实施例提供的节点协议分层架构图。
图6是本申请实施例提供的一例数据包处理流程图。
图7是本申请实施例提供的一例融合组网方法的示意图。
图8是本申请实施例提供的另一例融合组网方法的示意图。
图9是本申请实施例提供的另一例网状网络示意图。
图10是本申请实施例提供的另一例融合组网方法的示意图。
图11是本申请实施例提供的链路处理示意图。
图12是本申请实施例提供的路径学习示意图。
图13是本申请实施例提供的一例节点设备的示意性框图。
图14是本申请实施例提供的另一例节点设备的示意性框图。
图15是本申请实施例提供的另一例节点设备的示意性框图。
图16是本申请实施例提供的一例通信设备的示意性框图。
图17是申请实施例提供的另一例系统芯片的示意性框图。
下面将结合附图,对本申请中的技术方案进行描述。
本申请实施例的技术方案可以应用于各种通信系统,例如:全球移动通讯(Global System of Mobile communication,GSM)系统、码分多址(Code Division Multiple Access,CDMA)系统、宽带码分多址(Wideband Code Division Multiple Access,WCDMA)系统、通用分组无线业务(General Packet Radio Service,GPRS)、长期演进(Long Term Evolution,LTE)系统、LTE频分双工(Frequency Division Duplex,FDD)系统、LTE时分双工(Time Division Duplex,TDD)、通用移动通信系统(Universal Mobile Telecommunication System,UMTS)、全球互联微波接入(Worldwide Interoperability for Microwave Access,WiMAX)通信系统、未来的第五代(5th Generation,5G)系统或新无线(New Radio,NR)等。
本申请实施例中的终端设备可以指用户设备、接入终端、用户单元、用户站、移动站、移动台、远方站、远程终端、移动设备、用户终端、终端、无线通信设备、用户代理或用户装置。终端设备还可以是蜂窝电话、无绳电话、会话启动协议(Session Initiation Protocol,SIP)电话、无线本地环路(Wireless Local Loop,WLL)站、个人数字处理(Personal Digital Assistant,PDA)、具有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它处理设备、车载设备、可穿戴设备,未来5G网络中的终端设备或者未来演进的公用陆地移动通信网络(Public Land Mobile Network,PLMN)中的终端设备等,本申请实施例对此并不限定。
本申请实施例中的网络设备可以是用于与终端设备通信的设备,该网络设备可以是全球移动通讯(Global System of Mobile communication,GSM)系统或码分多址(Code Division Multiple Access,CDMA)中的基站(Base Transceiver Station,BTS),也可以是宽带码分多址(Wideband Code Division Multiple Access,WCDMA)系统中的基站(NodeB,NB),还可以是LTE系统中的演进型基站(Evolutional NodeB,eNB或eNodeB),还可以是云无线接入网络(Cloud Radio Access Network,CRAN)场景下的无线控制器,或者该网络设备可以为中继站、接入点、车载设备、可穿戴设备以及未来5G网络中的网络设备或者未来演进的PLMN网络中的网络设备等,本申请实施例并不限定。
如背景技术所介绍,家庭用户的设备形态是多样的,不同的终端设备有不同的网络需求。例如,以家庭住宅为平台,涉及各种终端设备的网络需求,手机、PC机、NAS、游戏机以及智能家居设备等,需要利用网络通信等技术将与家居生活有关的终端设备进行集成,构建高效的住宅设施与家庭日程事务的管理系统。网络通信技术是智能家居集成中的关键技术,通常采用短距离无线通信技术进行网关与终端设备间的通信。由于网关与终端设备之间的传输距离有限,通过短距离无线通信技术实现的智能家居网络无法覆盖距离网关较远的设备。因此,为了获得更为广泛的覆盖范围,就需要在网络中部署更多的网络接入点,使各个网络节点之间实现互通,即组网技术。而在现有的通用的组网技术,是基于中继器Repeater的架构。其网络架构是一种树状结构,是基于一个主节点和多个Repeater路由节点进行扩展的网络架构。应理解,在本申请实施例提供的网络系统中,以仅包括一 个主节点为例进行说明。
图1是本申请实施例提供的树状组网的一例示意图,如图1所示,在树状组网形成的该网络系统100中,节点1为和Internet连接的主节点或主节点,以节点1为中心,逐级分支,各个节点之间可以实现通信。这样的组网方式,形状像一棵倒置的树,顶端是树根(例如节点1),树根以下带分支(例如,一级分支的节点2和节点3),每个分支还可再带子分支(例如,节点5的分支节点6和节点7),本申请实施例中将除了主节点1以外的其他所有节点都称为路由节点或路由节点,其中路由节点将来自主节点的消息转发给其他路由节点或终端设备,终端设备将采集到的数据直接发送给主节点或者通过路由节点发送给主节点。
应理解,主节点(例如,节点1)可以与路由节点进行双向通信,同时也可以与终端设备(如手机终端、PC等)进行通信,例如采用WiFi技术等。对于包括多个主节点的网络系统来说,主节点还可以与其他主节点进行通信。主节点可以直接或者经由路由节点向终端设备发送消息(例如控制信息),也可以直接或者经由路由节点接收从终端设备发送来的数据。路由节点用于在网络系统中转发消息,例如包括能够采集数据的传感器装置,同时路由节点还具有无线路由功能,路由节点可与主节点、终端设备以及其他的路由节点双向通信,主节点和终端设备可经由多个级联的路由节点进行通信。如此,可将距离主节点较远的(例如不在主节点的通信半径之内)终端设备也纳入一个网络系统的覆盖范围。
在本申请实施例提供的网络系统中,终端设备不具备路由转发功能,但可与主节点或者路由节点双向通信(例如采用433M无线技术)。终端设备可接收从主节点发送来的消息,终端设备还可以采集数据并且将该数据直接或者经由路由节点发送给中间节点,继而可再由主节点将该数据上传到其他外部服务器来进行统计分析和进一步控制。本申请实施例并不限于此。
该网络系统100中每个网络节点,可以下挂多个Repeater设备,或多个终端设备(例如,图1中的手机111、智能家居设备112、PC设备113等),但是可以看出每个网络节点只有一个上行链路。应理解,图1中只是该树状组网的示意图,其中,对节点的数量和分支节点的数量并不做限定,各个终端设备接入的节点可以是任意节点,本申请实施例并不限定。
由于是树状网络,因此从任意一个路由节点到主节点就只有一条路径,对于每一个节点,从局域网LAN侧收到的数据直接转发到单一的上行链路,而且每两个路由节点之间的通信需要经过上层节点,因此中间节点路由器很容易很为瓶颈。例如图1中手机111和PC设备113之间通信,就需要经过节点1,那么就会造成中间节点(例如,节点1)的瓶颈;而智能家居设备112和PC设备113之间通信,就需要经过节点5、节点3和节点1,那么就会造成中间节点(例如,节点5、节点3和节点1)的瓶颈。此外,除了路由节点及其相连的线路外,任一节点或其相连的线路故障都会使系统受到影响。
因此,为了提高网络系统的稳定性,满足各种终端设备的网络需求,同时避免造成网络系统中部分节点的压力开展节点间的网状组网。现有技术中基于IEEE802.11s的网状组网,是基于WiFi类型的网状组网,例如单2.4G WiFi的网状网,或者单5G WiFi的网状组网。
当前,WiFi利用无线接入点AP为终端设备提供网络接入服务,极大的满足了人们对 于网络的需求。然而,WiFi的接入点采用的是单跳的接入方式,受WiFi接入点发射功率等限制,其覆盖范围比较局限,要获得更为广泛的覆盖范围,就需要部署更多的WiFi接入点,从而会增加网络的开销。
发展与Ad hoc网络的无线MESH网状网络是一种动态多跳、自组织、自愈合特点的无线网络,网络中的节点能够自动地建立Ad Hoc结构并维持网状连通性,每一个节点同时是一个路由器,能够完成发现以及维持到其他节点路由的功能,两个无法直接进行通信的终端设备也可以借助其他节点进行分组转发等通信。在Ad hoc网络中,当两个主机在彼此的通信覆盖范围内时,它们可以直接通信,但是由于通信覆盖范围有限,如果两个相距较远的主机要进行通信,则需要通过它们之间的节点的转发才能够实现,因此,主机同时还是路由器,担负着寻找路由和转发报文的工作,路由一般都由多跳组成。由于MESH网络动态多跳的特性,能够有效的延伸网络的覆盖范围,减低部署成本,是家庭网络各大设备商抢占的市场。
通常在MESH网络中,是基于IEEE802.11s协议在WiFi的MAC层进行无线通信,包括设备自动发现、自动拓扑、路径学习,数据包的转发等功能。但是,多个AP之间除了通过WiFi连接,还有可能通过其它方式:Ethernet以太网有线连接,电力线连接等多种连接方式。其中,以太网是当前应用最普遍的局域网技术,它很大程度上取代了其他局域网标准,如令牌环、光纤分布式数据接口(Fiber Distributed Data Interface,FDDI)和令牌总线ARCNET。历经100M以太网在上世纪末的飞速发展后,目前千兆以太网甚至10G以太网正在国际组织和领导企业的推动下不断拓展应用范围。以太网基于IEEE802.3协议规定了包括物理层的连线、电信号和介质访问MAC层协议的内容,具体描述了物理层和数据链路层的MAC子层的实现方法,在多种物理媒体上以多种速率采用CSMA/CD访问方式等。以太网采用带冲突检测的载波帧听多路访问CSMA/CD机制,即以太网中节点都可以看到在网络中发送的所有信息,因此,我们说以太网是一种广播网络。
以太网帧是数据链路层的封装,网络层的数据包被加上帧头和帧尾成为可以被数据链路层识别的数据帧。虽然帧头和帧尾所用的字节数是固定不变的,但随着被封装的数据包大小的不同,以太网的长度也在变化,其范围是64~1518字节(不算8字节的前导字)。以太网可以采用多种连接介质,包括同轴缆、双绞线和光纤等。其中双绞线多用于从主机到集线器或交换机的连接,而光纤则主要用于交换机间的级联和交换机到路由器间的点到点链路上,同轴缆作为早期的主要连接介质已经逐渐趋于淘汰。
以上介绍了以太网的数据传输,而在MESH网络中,基于WiFi的IEEE802.11s MESH协议工作在WiFi的MAC层,无法在不同介质中完成互通。
图2是本申请实施例提供的网状组网的一例示意图,图3是无线MESH协议栈的架构图。下面结合图2和图3详细对IEEE802.11s MESH协议的工作原理进行说明。
MESH网络系统中的每个节点设备具有其自身的网络ID。当MESH网络系统中的主节点向终端设备发送消息时,链路上的路由节点可以存储上一跳节点的网络ID,并且可以定期将自身的网络ID和上一跳节点的网络ID发送给主节点。中心节点可根据路由节点和终端节点发送来的关于该节点的网络ID和上一跳节点的网络ID的信息,得到整个MESH网络系统的动态拓扑结构。
可选地,主节点可以包括用户界面,并且可以在该用户界面上呈现MESH网络系统 的动态拓扑结构图。或者,主节点也可通过与其相连的外部设备来呈现该MESH网络系统的动态拓扑结构。
如图2所示,主节点1和路由节点2、3已经基于WiFi组成MESH网状网络,在节点1、节点2和节点3组成的网状网络中,主要实现了MAC层的数据转发、混合路径选择(Hybrid Wireless MESH Protocol,HWMP)、邻居发现、建立和管理,以及节点的网关功能。如图3所示,无线MESH协议栈的软件架构主要分为控制平面和数据平面两部分。MESH网络的节点可以包括MESH后台管理模块301,存储的路径表302、邻居表303,处理模块304,路径选择模块305,邻居管理模块306、数据转发模块307,图中的各个模块通过总线相连。为了便于理解,图中只示出了与本申请实施例的描述相关的部分,应理解,本申请并不限于此。
在基于WiFi组成MESH网状网络中,任一节点(例如,节点1或节点2或节点3)启动后,通过节点内的邻居管理模块306发起邻居查找,建立邻居关系,形成IEEE802.11s网络;数据转发模块307根据数据帧的目的MAC地址,查找路径表302得到下一跳MAC地址来转发多跳数据,如果不存在有效的路径信息,则会触发路径选择模块305发起路径查找过程。
控制平面包括处理模块304、邻居管理模块306以及路径选择模块305,主要实现二层路径的选择、邻居建立和拓扑管理功能。处理模块304是针对IEEE802.11s定义的数据帧进行解析处理,并生成特定的帧格式。IEEE802.11s协议主要定义了两类帧格式:一类是用于路径选择的帧;另一类是用于拓扑形成的数据帧。邻居管理模块306实现邻居发现、建立和维护邻居表等功能。路径选择模块305实现IEEE802.11s二层混合路径选择HWMP功能,维护和管理路径表。
数据平面主要实现MAC层多跳数据转发以及MESH数据帧的接收和发送处理。当接收到一个数据帧后,首先检查其数据的有效性,其次判断目的MAC地址是否发往本机,若不是,则进入数据转发模块307,否则进行MAC协议头转换后直接送往上层协议。数据转发模块307接收到数据帧后,首先根据目的MAC地址查找路径表302,若存在到达目的地址的路径信息,则拷贝一份数据帧,替换IEEE802.11s协议头的TA和RA域,然后加入到发送等待队列;若不存在有效的路径信息,则触发路径查找模块发起路径查找,并将该数据帧加入到路径修复等待队列中。
但是,如图2所示,当节点5通过以太网接入该基于WiFi组成MESH网状网络的任一节点(例如,图中所示的节点3)后,节点4、节点5、节点6只能以传统的Repeater桥接方式接入到该网络。由于节点3和节点5中间通过Ethernet网络连接,而WiFi的MESH网络和以太的节点之间协议栈架构不同导致数据帧格式不同,从而导致MESH网络和以太的节点之间无法直接互通,甚至2.4G WiFi的MESH网络同5G WiFi的MESH网络之间数据帧格式不同,也无法实现互通。当用户通过WiFi建立MESH网络链路后,无法将其它异种介质融入到统一网络中,无法在异种介质中发挥多跳、自组织、自愈和等优势。
具体地,当节点1、2、3已经组成MESH网状网络,在数据转发过程中,由数据转发模块307进行数据转发,但是在基于WiFi的MESH网状网络中,经过封装生成的数据包地址是基于6-MAC地址(例如,包括设备源/目的地址,MESH入口/出口地址,相邻AP间的源/目的地址)的转发格式,在以太网中地址是2-MAC地址(例如,包括设备源 地址/目的地址)转发,换言之,在数据包经过节点3转发至节点5的过程中,在节点3上对要发送至节点5的数据包,剥除了MESH入口/出口地址,相邻AP间的源/目的地址,再经过封装成可以在以太网中转发格式,包括设备源/目的地址的2-MAC地址,直接使用设备源/目的地址进行转发。
因此,如图2所示组网方式,由于MESH网络没有扩展到节点5以后的链路,导致节点4、5、6和1、2、3之间不能建立网状的连接,即节点4、5、6并没有融入到1、2、3组成的WiFi MESH网络。其上行链路仍然是单一,当智能家居设备112和PC设备113之间通信,就需要经过节点5,节点5会成为数据转发的瓶颈。此外,节点5如果出现线路故障都会使系统受到影响。
因此,亟需提供一种多路融合的网状组网方法,实现多种不同链路间的基于网状网络的互通,从而建立统一的跨网络的网状组网。实现在多路由的家庭混合组网网络中,使多种形态的组网成为一种多跳的、可以自组网、自愈合的网络,提升用户体验。
下面将以图2中节点1-节点3-节点5-节点6的路径为例,详细地介绍本申请实施例提供的多路融合的网状组网方法,将节点1-节点3之间的基于WiFi的MESH网络信息通过以太网扩展到多节点,旨在多路由的家庭混合网络中,实现多种形态链路设备融合为网状网络,在该网状网络中不但实现在链路管理层面的融合,还实现在数据转发层面的融合,使得跨形态节点之间通过路由路径学习,从而实现网络的互通。
图4是本申请实施例提供的节点结构图。如图4所示,节点1-节点3-节点5-节点6的内部结构,其中,结构401代表节点1的内部结构,结构402代表节点3的内部结构,结构403代表节点5的内部结构,结构404代表节点6的内部结构。在各个节点的内部结构中,接口VAP-A、以太网LAN(Local Area Network,LAN)接口LAN-Eth、以太网WAN接口WAN-Eth是物理接口,其中VAP-A用于设备的接入,例如可以用于接入节点AP或者接入终端设备;LAN-Eth为节点的以太网LAN口,WAN-Eth为节点的以太网WAN口;VAP-A’为虚拟的MESH组网的接口。
对应于图2中的组网方法可知,节点1和3之间、节点5和6之间是WiFi的MESH连接,如图4中的虚线所示的连接,主要通过虚拟接口VAP-A’的通信来实现节点之间的通信;节点3和5之间是以太网连接,节点3和5之间的虚拟接口VAP-A’通过物理上以太网接口LAN-Eth和WAN-Eth之间的连接建立通信。从节点1-3到节点3-5之间是WiFi MESH到以太网的转换和融合。
图5是本申请实施例提供的节点协议分层架构图。如图5所示,分别是节点1-节点3-节点5-节点6的内部协议分层架构,其中,架构510代表节点1的协议分层,架构520代表节点3的协议分层,架构530代表节点5的协议分层,架构540代表节点6的协议分层。具体地,因为从节点1-3到节点3-5之间完成基于WiFi的MESH网络到以太网的转换和融合,即在数据包转发过程中,在节点3上完成数据包格式的转换,因此,节点3至少包括两种不同的协议栈架构,如架构521所示的MESH网络侧的协议栈架构和522所示的以太网侧的协议栈架构;同理,在节点5上完成以太网到基于WiFi的MESH网络的转换和融合,因此节点5也至少包括两种不同的协议栈架构,如架构531所示的以太网侧的协议栈架构和532所示的MESH网络侧的协议栈架构。接下来先对各个协议分层架构进行简单的介绍。
节点1的协议架构510至少包括:网络层(例如,图中IP层),数据链路层(或者媒体接入控制MAC层),物理层(PHY)。其中网络层(IP层)定义了端到端的数据包传输,能够标识所有节点的逻辑地址,还定义了路由实现的方式和学习的方式。网络层的任务就是选择合适的路由节点,确保数据及时传送。网络层将数据链路层提供的帧组成数据包,包中封装有网络层包头,其中含有逻辑地址信息-源地址信息和目的地址的网络地址信息。为了适应最大传输单元长度小于数据包长度的传输介质,网络层还定义了如何将一个包分解成更小的包的分段方法等。
数据链路层定义了在单个链路上如何进行数据包的传输,这些协议与用于传输的各种介质有关,例如:异步传输模式(Asynchronous Transfer Mode,ATM),光纤分布式数据接口(Fiber Distributed Data Interface,FDDI)等。该层在物理层提供比特流服务的基础上,建立相邻节点之间的数据链路,提供数据帧(Frame)在信道上无差错的传输,数据链路层可以在物理介质上提供可靠的传输。该层的作用包括:物理地址寻址、数据的成帧、流量控制、数据的检错、重发等。在这一层,数据的单位称为帧(Frame)。数据链路层协议的代表包括:SDLC、HDLC、PPP、STP、帧中继等。
PHY层是有关传输介质的规范,一般以二进制数据形式在物理媒体上传输数据,通常也参考了其他组织制定的标准。连接头、帧、帧的使用、电流、编码及光调制等都属于各种物理层规范中的内容,物理层常用多个规范完成对所有细节的定义,中继器、集线器、还有通常说的双绞线都工作在物理层。
节点2、4、6类似于上述所介绍的节点1的协议栈架构,节点3和节点5的协议栈架构有所区别。
如图5所示,节点3的协议架构520包括两种不同的协议栈架构521和522,其中架构521用于在节点1、2、3组成的MESH网状网络内部的通信,数据包在节点1、2、3组成的MESH网状网络内部转发时,各个节点在网络层发送、中继以及接收数据包主要依赖于网络协议数据单元(Protocol Data Unit,PDU)的格式,其中,最主要的决定网络层行为的几个关键参数是网络识别码(Network Interface Device,NID)、生存时间(Time To Live,TTL)、源地址(Source Address,SRC)以及目的地址(Destination Address,DST)。网络层PDU的组成以及描述如下表1所示。
表1
名称 | 比特数 | 含义 |
IVI | 1 | 最小有效位(Least Significant Bit of IV Index) |
NID | 7 | 网络识别码(Network Interface Device) |
CTL | 1 | 网络控制(Network Control) |
TTL | 7 | 生存时间(Time To Live) |
SEQ | 24 | 序列号(Sequence Number) |
SRC | 16 | 源地址(Source Address) |
DST | 16 | 目的地址(Destination Address) |
传输PDU | 8-128 | 传输协议数据单元(Transport Protocol Data Unit) |
Net MIC | 32-64 | 信息完整性校验(Message Integrity Check for Network) |
结合表1的的协议栈架构,下面具体介绍介绍节点内部协议工作原理。图6是本申请 实施例提供的一例数据包处理流程图。基于WiFi的IEEE802.11s MESH协议工作在WiFi的MAC层,当该MESH网状网络系统内的一个节点收到网络数据包时,它需要根据图6所示的协议规范的流程进行处理,具体的步骤结合流程图描述如下:
(1)如果节点接收到数据包,首先判断NID是否匹配,如果不匹配,则直接丢弃该数据包;
(2)判断当NID满足之后,需要对网络数据包进行完整性验证,如果验证不通过,则丢弃该数据包;
(3)判断当完整性校验通过,对源地址和目的地址进行有效性判断,如果地址无效,丢弃该数据包;
(4)判断当源地址和目的地址进行有效的,在缓存cache中查找是否之前已经收到过该数据包,如果收到,则丢弃该数据包;
(5)如果没有收到该数据包,则将该数据包放入cache,并根据节点类型、TTL值以及DST值进行判断是否需要转发,只有在节点类型、TTL值、DST地址三个条件都满足的情况下才反馈该数据包,否则丢弃该数据包;
(6)如果满足条件,在relay数据包时,需要将数据包报文中的TTL值减1,然后继续传输。
但是,在节点3内部,除了MESH网络协议栈架构521以外,还包括以太网协议栈架构522,因为协议栈不同,数据包在被封装等处理过程中,生成的格式不同,具体地,在MESH网状网络中,经过封装生成的数据包地址是基于6-MAC地址(例如,包括设备源/目的地址,MESH入口/出口地址,相邻AP间的源/目的地址)的转发格式,在以太网中地址是2-MAC地址(例如,包括设备源地址/目的地址)转发,因此MESH网状网络的组网信息被以太网隔断,即无线MESH协议不能扩展到如图4中402和403之间连接的有线上,因此节点5之后的路由节点并不能获得节点1、2、3组成的网状网络拓扑信息,从而不能实现网络信令的互通和路径的融合。
图7是本申请实施例提供的一例融合组网方法的示意图。该方法应用于包括至少两个网络的通信系统中,每个网络包括至少两个节点,每个网络的节点之间基于第一传输协议进行通信,第一网络中的至少一个节点能够与第二网络中的至少一个节点基于第二传输协议进行通信。
以图2所示的通信系统200为例进行说明,结合图2,节点4、5、6组成第一网络,节点1、2、3组成第二网络,第一网络的节点之间基于第一传输协议进行通信,第二网络的节点之间也基于第一传输协议进行通信,第一网络的一个节点5与第二网络的节点3之间基于第二传输协议进行通信。本申请实施例提供的组网方法可以应用在节点3上。
在以下具体实施例的描述中,为了理解方案,将节点5称为第一网络的第一节点,节点3称为第二网络的第二节点,节点6(或节点4)称为第一网络的第三节点,节点1(或节点2)称为第二网络的第四节点,应理解,本申请并不限于此。
如图7所示,该方法700包括以下内容。
在S710中,第一网络的第一节点从第二网络中的第二节点接收第一数据包,其中,所述第一数据包是所述第二网络的第二节点从所述第二网络的第四节点接收的第二数据包后,根据所述第二传输协议封装后生成的数据包,其中,所述第二数据包携带有所述第 二网络中第四节点的标识信息。
具体地,节点5接收来自于节点3的第一数据包,该第一数据包是经过节点3和节点5之间的有线网络传输的数据包。在节点1、2、3组成的第二网络内基于第一传输协议处理得到第二数据包,则该第二数据包携带有该第二网络的节点1或节点2的标识信息。该第二数据包在节点3处基于第二传输协议进行封装成第一数据包。
可选地,该第一网络的第一节点扩展网络层,第一节点从该第二网络的第二节点接收第一数据包,解封装该第一数据包得到第二数据包,再解封装该第二数据包获得第二网络中节点1或节点2的标识信息。将该第二网络节点1或节点2的标识信息封装在扩展的IP层,当有数据包从以太网络要转发到第一网络时,将该封装在扩展的网络层的数据包所携带的标识信息等作为封装数据包时的负载payload部分,并基于第二传输协议转发到第一网络。
具体地,结合图2的各个节点,可以是当节点1、2、3组成的第二网络要通过节点3和5之间的连接传输到节点5,从而传输到节点4或者节点6时,节点3先接收节点1或者节点2的数据包,该数据包里携带有节点1、2、3的信息,节点3接收该数据包之后,将该数据包封装在内部扩展的网络层,可以理解为IP层,并在以后的数据包传输过程中,这个IP层的信息就作为数据包封装过程的负载部分,在节点3基于第二传输协议封装该数据包,从而将第二网络的标识信息携带在封装后的数据包中,然后经过节点3和节点5之间的路径传递到节点5,那么节点4和节点6就能通过和节点5之间的通信获得节点1、2、3的信息,从而建立一个各个节点互通的网状网络。
可选地,该第二网络的标识信息可以包括该第二网络的组网信息、链路信息或者网络IP地址等信息,节点3可以将该第二网络的标识信息封装在扩展的网络层。当有数据包需要通过节点3和节点5之间进行转发时,在节点3封装数据包的过程中,将封装在扩展的网络层的第二网络的标识信息作为负载部分封装在该数据包中。通过上述方法,将第二网络的组网信息封装在数据包中传递给第一网络的节点5,从而将第二网络的网络拓扑信息传递到节点5以及节点5之后的其他路由节点。
在S720中,所述第一网络的第一节点根据所述第二传输协议对所述第一数据包进行解封装,以获取第二数据包。
可选地,当该第一网络和第二网络是无线MESH网状网络,该第一网络和第二网络之间通过以太网络连接时,即节点4、5、6组成的第一网络和节点1、2、3组成的第二网络是无线MESH网状网络,这两个网络之间(即节点3和节点5)通过以太网连接。节点3接收到来自于节点1或节点2的数据包,数据包在节点3经过协议栈的层层封装,将无线网状网络的标识MESH ID,例如节点1或节点2的无线网状网络的标识MESH ID等信息封装在数据包内,通过以太网传输到节点5,从而将节点1或节点2的无线网状网络的标识MESH ID等信息传递到节点5以及节点5之后的其他路由节点,使节点5之后的路由节点都能获得节点1、2、3的无线网状网络的标识MESH ID,实现将无线MESH网状网络协议扩展到有线网络上,从而节点1-节点6的每个节点都能够组成网状网络,实现网络的互通。
在S730中,所述第一节点向所述第二网络的第三节点发送所述第二数据包。
具体地,当该第一网络和第二网络是无线MESH网状网络,该第一网络和第二网络 之间通过以太网络连接,节点5接收来自节点3的数据包后,通过解封装该数据包,获取节点1、2、3组成的第二无线MESH网状网络标识信息。那么相应地,在节点3的内部,需要完成将该数据包携带的第二无线MESH网状网络标识信息通过以太网传输到节点5。即节点3的内部需要完成基于WiFi的无线MESH网状网络到以太网的转换和融合,因此节点3也至少包括两种不同的协议栈架构,具体执行如图8所示的本申请实施例提供的另一例融合组网方法的示意图。
图8的组网方法800应用于包括至少两个网络的通信系统中,每个网络包括至少两个节点,每个网络中的节点之间基于第一传输协议进行通信,第一网络中的至少一个节点能够与第二网络中的至少一个节点基于第二传输协议进行通信。该方法800包括以下内容。
在S810中,第二网络的第二节点从所述第二网络的第四节点接收第二数据包,所述第二数据包是基于所述第一传输协议生成的数据包,且所述第二数据包携带有所述第二网络中第四节点的标识信息。
具体地,节点3接收到来自于节点1或节点2的数据包,数据包在节点3经过协议栈的层层封装,将MESH ID信息,例如节点1或节点2的无线网状网络的标识MESH ID信息封装在数据包内,通过以太网传输到节点5,从而将节点1或节点2的无线网状网络的标识MESH ID信息传递到节点5以及节点5之后的其他路由节点,使节点5之后的路由节点都能获得节点1、2、3的MESH ID信息,实现将无线MESH网状网络协议扩展到有线网络上。
在S820中,所述第二网络的第二节点根据所述第二传输协议对所述第二数据包进行封装以生成第一数据包,其中,所述第二网络中第四节点的标识信息被作为所述第一数据包的负载。
具体地,节点3接收到来自于节点1或节点2的数据包,数据包在节点3经过协议栈的层层封装,将MESH网络的标识信息,例如节点1或节点2的无线网状网络的标识MESH ID信息封装在数据包内,该数据包封装成以太网可以传输的数据包格式,通过以太网传输到节点5,从而将节点1或节点2的无线网状网络的标识MESH ID信息传递到节点5以及节点5之后的其他路由节点,使节点5之后的路由节点都能获得节点1、2、3的网络信息,实现将无线MESH网状网络协议扩展到有线网络上。
在S830中,所述第二网络的第二节点向所述第一网络的第一节点发送所述第二数据包。
通过上述融合组网的方法700和800的结合,能够将第一网络的无线网络信息经过有线传输到其他路由节点,从而实现了网络节点的互通。具体地,以无线MESH网状网络和以太网络的融合为例,应用在图2所示的通信系统中,会实现如图9所示的网络融合,图9是本申请实施例提供的一例网状网络示意图。如图9所示,通过上述的融合组网方法,可以在无线连接和有线连接的混合组网中,实现网络中各个节点的互通,无线的MESH协议能够扩展到有线上,通过融合的邻居发现,网络拓扑使有线接口以虚拟的网状节点融入网状网络;另外,通过融合的路径学习,无线MESH接口的6-MAC数据包和以太网有线2-MAC数据包接口间能够进行数据转发,对于各个节点下挂的终端设备之间能进行互访,每个节点都能找到通信的最佳路径。
具体地,在图9中,各个节点之间可以完成网络互通,每两个节点之间都可以进行通 信。当实现网状网络互通以后,对于路由节点6而言,在实现网络互通之前,节点6转发数据包只能通过其连接的中间节点5来进行转发,本申请实施例提供的组网技术,可以实现每个节点之间的互通,可以执行如图10所示的方法1000。
图10是本申请实施例提供的另一例融合组网方法的示意图。图10的组网方法1000应用于包括至少两个网络的通信系统中,每个网络包括至少两个节点,每个网络中的节点之间基于第一传输协议进行通信,第一网络中的至少一个节点能够与第二网络中的至少一个节点基于第二传输协议进行通信,如图10所示,该方法1000包括以下内容。
在S1010中,所述第一网络的第三节点从所述第一网络中的第一节点接收第二数据包,其中,所述第二数据包是所述第一网络中的第一节点对第一数据包解封装后获得的数据包,所述第一数据包是所述第二网络的第二节点从所述第二网络的第四节点接收的第二数据包后,根据所述第二传输协议封装后生成的数据包,其中,所述第二数据包携带有所述第二网络中第四节点的标识信息。
可选地,该第二网络的标识信息可以包括该第二网络的任一节点节点1、节点2或节点3的无线网状网络的标识MESH ID等。具体地,第二网络的任一节点节点1、节点2或节点3的无线网状网络的标识MESH ID信息封装在数据包中,通过第二网络进行传输到节点5,将第二网络的组网信息封装在数据包中传递给第二网络的节点5,从而将第一网络的网络拓扑信息传递到节点5以及节点5之后的其他路由节点。
具体地,当该第一网络和第二网络是无线MESH网状网络,该第一网络和第二网络之间通过以太网络连接时,即节点4、5、6组成的第一网络和节点1、2、3组成的第二网络是无线MESH网状网络,这两个网络之间(即节点3和节点5)通过以太网连接。即将无线MESH网状网络信息传递到节点4、5、6,从而节点4、5、6和节点1、2、3融合成一个网状网络。在两个网络的所有节点已经组成互通的网状网络之后,网络中的任意两个节点之间都可以实现通信,即完成数据包的直接转发。
在S1020中,所述第一网络的第三节点从所述第二数据包中获取所述第二网络中第四节点的标识信息,并根据所述第二网络中第四节点的标识信息确定所述第四节点的ID,基于所述第一传输协议与所述第二网络的第四节点进行通信。
当实现网络融合组网以后,节点6就可以与该网状网络中的任一路由节点进行通信。具体地,将从链路管理方面和数据转发方面详细讲述网状网络的节点内部的处理流程。
例如,对于节点3而言,基于WiFi的MESH网络侧的MESH 802.11s链路管理和数据转发的信令消息,在转到以太网节点时,被封装在扩展的IP层内,为IP层的MESH网络信息,通过以太网处理后,再通过WiFi的MAC层转发,结合图11和图12进行介绍,具体如下:
(一)链路管理处理流程
在WiFi MESH网络中,基于IEEE802.11s协议,邻居节点间通过进行主动扫描探测帧(MESH Probe Request)、邻居节点反馈帧(MESH Probe Response)、被动监听帧(MESH Beacon),来收集和发现邻居信息,从而进行邻居表项的刷新。如图11所示,路由节点1向邻居节点发起主动扫描请求,作为邻居节点的路由节点3接收节点1的请求,将路由信息告诉节点1,节点1收到节点3的路由信息后更新存储的邻居表项。
而在Ethernet连接的以太网络中,要在源节点上建立关于目标节点的IP地址与MAC 地址对应表项,则源节点和目的节点的基本信息交互是必须的,简单地说就是,源节点如何告诉目的节点:我需要你的MAC地址;而目的节点如何回复:这就是我的MAC地址。主路由发送信息时将包含目标IP地址的地址解析协议(Address Resolution Protocol,ARP)请求广播到以太网络系统上的所有路由节点,并接收返回消息,以此确定目标的物理地址;收到返回消息后将该IP地址和物理地址存入本机ARP缓存中并保留一定时间,下次请求时直接查询ARP缓存以节约资源。ARP命令可用于查询本机ARP缓存中IP地址和MAC地址的对应关系、添加或删除静态对应关系等,应理解,ARP请求和ARP应答都是被组装在一个ARP数据包中发送的,ARP包的组成结构如下表2所示。需要注意的是:ARP数据包是被封装在以太网帧中发送的,所以在表中也列出了以太网帧头部。
表2 ARP报文格式
以太网帧首部中的前两个字段是以太网的MAC地址和源MAC地址,目的地址为全1的特殊地址是以太网广播地址。在ARP表项建立前,源节点只知道目的节点的IP地址,并不知道其MAC地址,所以在数据链路上,源节点只有通过广播的方式将ARP请求数据包发送出去,同一网段上的所有以太网接口都会接收到广播的数据包。接下来的两个单字节长度的字段,称为硬件地址长度和协议地址长度,它们分别指出硬件地址和协议地址的长度,长度单位为字节。接下来的四个字段是发送端的以太网MAC地址、发送端的IP地址、目的端的以太网MAC地址和目的端的IP地址。
具体地,如图11所示,以太网节点包括节点3和节点5,由节点3向节点5发起ARP请求,按照本申请实施例提供的融合组网方法,数据包经过节点3的处理,将携带MESH网络信息的ARP请求广播到节点5,节点5将IP地址和物理地址通过返回消息告诉节点3,节点3将该IP地址和物理地址存入本机ARP缓存中并保留。同时,节点5将来自于节点3的数据包,解封装获取MESH网络信息,并类似于节点1,将继续向邻居节点6发起主动扫描请求,并将节点1的组网信息等传递到节点6,作为节点5的邻居节点6接收节点5的请求,将路由信息告诉节点5,节点5收到节点6的路由信息后更新存储的邻居表项。邻居表项的建立通过上述扩展的邻居发现,同时各个节点具备主动上报功能,即表项发生变化时,通告上层节点和主节点。主节点形成网络节点的拓扑,上层节点形成周围节点的拓扑结构,重复上述一系列的操作,实现整个网络所有节点的信息通告。
上述链路处理过程中,通过对广播学习设备的ARP进行扩展,使其携带MESH ID信息。并实现在以太网物理接口上的虚拟接口的互通,即图4中节点3 402的虚拟接口VAP-A'和节点5 403的虚拟接口VAP-A'之间的互通。
(二)路径学习和数据转发
路径学习有两类学习机制:第一,主节点的RANN机制,即学习到主节点的路径;第二,是节点和节点之间的路由求帧PREQ或路由请求确认帧PREP的路径学习。其中, 主节点定时广播网关通告帧RANN,当节点收到RANN帧记录路由表,并反馈路由求帧PREQ,并继续广播通告帧RANN,RANN中包含主节点的MAC地址等信息。当节点收到路由求帧PREQ后保存路由信息,并回复路由请求确认帧PREP,若一定时间内未收到PREP,则重发该路由求帧PREQ。
基于上述基本的机制,结合本申请实施例提供的融合组网方法,进行如下扩展:第一,在以太网中RANN的消息体承载在IP层上;第二,实现不同介质间通过虚拟接口VAP-A'进行转发消息。
路由表的结构包括目标地址、下一跳地址和跳数,为了更清楚的理解各路由节点之间的路径学习策略,假设节点1和3之间的路径长度为A,节点3和5之间的路径由于是以太网长度定义为0,节点5和6之间的路径长度为B,下面结合图12详细描述节点之间的路径学习过程。
图12是本申请实施例提供的一例路径学习示意图。如图12所示,在S1201中,主节点1定时广播网关通告帧RANN,节点3接收到RANN之后,执行S1202转发给节点5,经过路径距离(metric)为A,节点3还要执行S1203回给节点1,即经过路径距离为A。而且,节点3的RANN的消息体承载在IP层上,即携带有节点1的网络信息ID。节点5接收到RANN之后,执行S1204转发给节点6,经过路径距离(metric)为A+0,节点5还要执行S1205回给节点3,即经过路径距离为A+0,经过这样的路径学习,将携带有节点1的网络信息传递到节点5以及之后的其他节点。节点6收到节点5的RANN消息后,执行S1206回给节点5,即经过路径距离为A+0+B。
以节点3为例,包括两个路由表,如表3所示的路由表3和表4所示的路由表4。
表3
目标地址 | 下一跳 | 距离(metric) |
主节点 | 1 | A |
主节点 | 3(Eth) | 0 |
表4
目标地址 | 下一跳 | 距离(metric) |
主节点 | 3(WIFI) | A |
主节点 | 5(Eth) | 0 |
当节点3作为MESH网络的节点时,即图12中节点3的左边部分按照上表3的路由表3来进行数据转发,节点3要反馈给节点1,下一跳为节点1,经过距离为A,当从MESH节点转变为以太网节点时,经过距离为0。同理,对于节点3的右边部分按照上表4的路由表3'来进行数据转发,节点3将节点1的数据转发到节点5,经过的距离为上一跳距离,也为A。应理解,以太网节点内部之间的距离值为0,AP内部WIFI MESH接口之间,也按照距离metric为0的方式,另外当3和5之间为5G,metric值的度量方式和2.4G一样。
通过路径学习的消息体之间的值的传递,完成每个节点的多路径转发表的生成。既有到主路由的,又有到另一节点的,从而完成各个节点之间的互通。
图13是本申请实施例提供的一例节点设备的示意性框图。该节点设备1300可以对应上述融合组网方法700中描述的第一节点设备,并且,该节点设备1300中各模块和单元 分别用于执行上述方法700中第一节点设备所执行的各动作和处理过程。如图13所示,该第一节点设备1300包括接收单元1310、处理单元1320和发送单元1330。该第一节点设备应用于包括至少两个网络的通信系统中,每个网络包括至少两个节点设备,每个网络的节点设备之间基于第一传输协议进行通信,第一网络中的至少一个节点设备能够与第二网络中的至少一个节点设备基于第二传输协议进行通信。
其中,该接收单元1310用于从所述第二网络的第四节点接收第二数据包,所述第二数据包是基于所述第一传输协议生成的数据包,且所述第二数据包携带有所述第二网络的标识信息。
该处理单元1320用于根据所述第一传输协议对所述第一数据包进行解封装,以获取第二数据包,所述第二数据包携带有所述第二网络的标识信息。
该发送单元1330,用于向所述第二网络的第三节点发送所述第二数据包。
可选地,该处理单元还用于扩展网络层,将该接收单元接收的第一数据包封装在扩展的网络层。
可选地,该第二网络的标识信息可以包括该第二网络的组网信息、链路信息或者网络IP地址等信息。
当该第一网络和第二网络是无线MESH网状网络,该第一网络和第二网络之间通过以太网络连接时,即节点4、5、6组成的第一网络和节点1、2、3组成的第二网络是无线MESH网状网络,这两个网络之间(即节点3和节点5)通过以太网连接。节点3接收到来自于节点1或节点2的数据包,数据包在节点3经过协议栈的层层封装,将MESH网络信息,例如组网信息、链路信息或者网络IP地址等信息封装在数据包内,通过以太网传输到节点5,从而将组网信息、链路信息或者网络IP地址等信息传递到节点5以及节点5之后的其他路由节点,使节点5之后的路由节点都能获得节点1、2、3的网络信息,实现将无线MESH网状网络协议扩展到有线网络上,从而节点1-节点6的每个节点都能够组成网状网络,实现网络的互通。
图14是本申请实施例提供的另一例节点设备的示意性框图。该节点设备1400可以对应上述融合组网方法800中描述的第二节点设备,并且,该节点设备1400中各模块和单元分别用于执行上述方法800中第二节点设备所执行的各动作和处理过程。如图14所示,该第二节点设备1400包括接收单元1410、处理单元1420和发送单元1430。该第二节点设备应用于包括至少两个网络的通信系统中,每个网络包括至少两个节点设备,每个网络的节点设备之间基于第一传输协议进行通信,第一网络中的至少一个节点设备能够与第二网络中的至少一个节点设备基于第二传输协议进行通信。
其中,该接收单元1410用于从所述第二网络的第四节点接收第二数据包,所述第二数据包是基于所述第一传输协议生成的数据包,且所述第二数据包携带有所述第二网络的标识信息。
该处理单元1420用于根据所述第二传输协议对所述第二数据包进行封装以生成第一数据包,其中,所述第二数据包被作为所述第一数据包的负载。
该发送单元1430,用于向所述第一网络的第一节点发送所述第二数据包。
可选地,该第二网络的标识信息可以包括该第二网络的组网信息、链路信息或者网络IP地址等信息。
具体地,当该第一网络和第二网络是无线MESH网状网络,该第一网络和第二网络之间通过以太网络连接时,即节点4、5、6组成的第一网络和节点1、2、3组成的第二网络是无线MESH网状网络,这两个网络之间(即节点3和节点5)通过以太网连接。节点3接收到来自于节点1或节点2的数据包,数据包在节点3经过协议栈的层层封装,将MESH网络信息,例如组网信息、链路信息或者网络IP地址等信息封装在数据包内,通过以太网传输到节点5,从而将组网信息、链路信息或者网络IP地址等信息传递到节点5以及节点5之后的其他路由节点,使节点5之后的路由节点都能获得节点1、2、3的网络信息,实现将无线MESH网状网络协议扩展到有线网络上,从而节点1-节点6的每个节点都能够组成网状网络,实现网络的互通。。
图15是本申请实施例提供的另一例节点设备的示意性框图。该节点设备1500可以对应上述融合组网方法1000中描述的第三节点设备,并且,该节点设备1500中各模块和单元分别用于执行上述方法1000中第三节点设备所执行的各动作和处理过程。如图15所示,该第三节点设备1500包括接收单元1510、处理单元1520和发送单元1530。该第三节点设备应用于包括至少两个网络的通信系统中,每个网络包括至少两个节点设备,每个网络中的节点设备之间基于第一传输协议进行通信,第一网络中的至少一个节点设备能够与第二网络中的至少一个节点设备基于第二传输协议进行通信。
其中,该接收单元1510用于从所述第一网络中的第一节点设备接收第二数据包,其中,所述第二数据包是所述第一网络中的第一节点对第一数据包解封装后获得的数据包,所述第一数据包是所述第二网络的第二节点设备根据所述第二传输协议生成的数据包,且所述第一数据包携带有所述第二网络的标识信息。
该处理单元1520用于从所述第二数据包中获取所述第二网络的标识信息,并根据所述第二网络的标识信息,基于所述第一传输协议与所述第二网络的第二节点设备进行通信。
可选地,该第二网络的标识信息可以包括该第二网络的组网信息、链路信息或者网络IP地址等信息。
具体地,当该第一网络和第二网络是无线MESH网状网络,该第一网络和第二网络之间通过以太网络连接时,即节点4、5、6组成的第一网络和节点1、2、3组成的第二网络是无线MESH网状网络,这两个网络之间(即节点3和节点5)通过以太网连接。该第三节点设备接收到的数据包,读取网络的标识信息,从而获取MESH网络信息,能够获得无线MESH网状网络和以太网络中各个节点设备的信息,从而各个节点设备都能够组成网状网络,实现网络的互通。
图16是本申请实施例提供的通信设备的示意性框图。
如图16所示,该通信设备1600包括处理器1610、收发器1620和存储器1630,其中,该处理器1610、收发器1620和存储器1630之间通过内部连接通路互相通信。该存储器1630用于存储指令,该处理器1610用于执行该存储器1630存储的指令,以控制该收发器1620接收信号或发送信号。
可选地,该处理器1610可以调用存储器1630中存储的程序代码,执行方法实施例中的第一节点设备执行的方法700的相应操作,为简洁,在此不再赘述。
可选地,该处理器1610可以调用存储器1630中存储的程序代码,执行方法实施例中 的第二节点设备执行的方法800的相应操作,为简洁,在此不再赘述。
可选地,该处理器1610可以调用存储器1630中存储的程序代码,执行方法实施例中的第三节点设备执行的方法1000的相应操作,为简洁,在此不再赘述。
应理解,本申请实施例的处理器可能是一种集成电路芯片,具有信号的处理能力。在实现过程中,上述方法实施例的各步骤可以通过处理器中的硬件的集成逻辑电路或者软件形式的指令完成。上述的处理器可以是通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现成可编程门阵列(Field Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。可以实现或者执行本申请实施例中的公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本申请实施例所公开的方法的步骤可以直接体现为硬件译码处理器执行完成,或者用译码处理器中的硬件及软件模块组合执行完成。软件模块可以位于随机存储器,闪存、只读存储器,可编程只读存储器或者电可擦写可编程存储器、寄存器等本领域成熟的存储介质中。该存储介质位于存储器,处理器读取存储器中的信息,结合其硬件完成上述方法的步骤。
可以理解,本申请实施例中的存储器可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(Read-Only Memory,ROM)、可编程只读存储器(Programmable ROM,PROM)、可擦除可编程只读存储器(Erasable PROM,EPROM)、电可擦除可编程只读存储器(Electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(Random Access Memory,RAM),其用作外部高速缓存。通过示例性但不是限制性说明,许多形式的RAM可用,例如静态随机存取存储器(Static RAM,SRAM)、动态随机存取存储器(Dynamic RAM,DRAM)、同步动态随机存取存储器(Synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(Double Data Rate SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(Enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(Synchlink DRAM,SLDRAM)和直接内存总线随机存取存储器(Direct Rambus RAM,DR RAM)。应注意,本文描述的系统和方法的存储器旨在包括但不限于这些和任意其它适合类型的存储器。
图17是申请实施例提供的系统芯片的示意性框图。图17的系统芯片1700包括输入接口1701、输出接口1702、至少一个处理器1703、存储器1704,所述输入接口1701、输出接口1702、所述处理器1703以及存储器1704之间通过内部连接通路互相连接。该处理器1703用于执行所述存储器1704中的代码。
可选地,当所述代码被执行时,所述处理器1703可以实现方法实施例中由第一节点执行的方法700。为了简洁,这里不再赘述。
可选地,当所述代码被执行时,所述处理器1703可以实现方法实施例中由第二节点执行的方法800。为了简洁,这里不再赘述。
可选地,当所述代码被执行时,所述处理器1703可以实现方法实施例中由第三节点执行的方法1000。为了简洁,这里不再赘述。
应理解,在本发明实施例中,“与A相应的B”表示B与A相关联,根据A可以确定B。但还应理解,根据A确定B并不意味着仅仅根据A确定B,还可以根据A和/或其 它信息确定B。
还应理解,本文中术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。另外,本文中字符“/”,一般表示前后关联对象是一种“或”的关系。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。
Claims (28)
- 一种融合组网的方法,其特征在于,应用于包括至少两个网络的通信系统中,每个网络包括至少两个节点,每个网络中的节点之间基于第一传输协议进行通信,第一网络中的至少一个节点能够与第二网络中的至少一个节点基于第二传输协议进行通信,所述方法包括:第一网络的第一节点从第二网络中的第二节点接收第一数据包,其中,所述第一数据包是所述第二网络的第二节点从所述第二网络的第四节点接收的第二数据包后,根据所述第二传输协议封装后生成的数据包,其中,所述第二数据包携带有所述第二网络中第四节点的标识信息;所述第一网络的第一节点根据所述第二传输协议对所述第一数据包进行解封装,以获取第二数据包;所述第一网络的第一节点向所述第一网络的第三节点发送所述第二数据包。
- 根据权利要求1所述的方法,其特征在于,所述第一网络的第一节点根据所述第二传输协议对所述第一数据包进行解封装,以获取第二数据包,包括:所述第一网络的第一节点获取所述第二数据包携带的所述第二网络中第四节点的标识信息;所述第一网络的第一节点向所述第一网络的第三节点发送扩展的地址解析协议ARP请求消息,所述ARP请求消息携带所述第二网络中第四节点的标识信息。
- 根据权利要求1或2所述的方法,其特征在于,所述第二网络是无线网状MESH网络,所述第二网络中第四节点的标识信息包括所述第二网络中第四节点的无线网状网络的标识MESH ID。
- 根据权利要求1至3中任一项所述的方法,其特征在于,所述第一传输协议是无线MESH网状网络协议,所述第二传输协议是以太网协议。
- 一种融合组网的方法,其特征在于,应用于包括至少两个网络的通信系统中,每个网络包括至少两个节点,每个网络的节点之间基于第一传输协议进行通信,第一网络中的至少一个节点能够与第二网络中的至少一个节点基于第二传输协议进行通信,所述方法包括:第二网络的第二节点从所述第二网络的第四节点接收第二数据包,所述第二数据包是基于所述第一传输协议生成的数据包,且所述第二数据包携带有所述第二网络中第四节点的标识信息;所述第二网络的第二节点根据所述第二传输协议对所述第二数据包进行封装以生成第一数据包,其中,所述第二网络中第四节点的标识信息被作为所述第一数据包的负载;所述第二网络的第二节点向所述第一网络的第一节点发送所述第二数据包。
- 根据权利要求5所述的方法,其特征在于,所述第二网络的第二节点根据所述第二传输协议对所述第二数据包进行封装以生成第一数据包,包括:所述第二网络的第二节点获取所述第二数据包携带的所述第二网络中第四节点的标识信息;所述第二网络的第二节点向所述第一网络的第一节点发送扩展的地址解析协议ARP请求消息,所述ARP请求消息携带所述第二网络中第四节点的标识信息。
- 根据权利要求5或6所述的方法,其特征在于,所述第二网络是无线网状MESH网络,所述第二网络中第四节点的标识信息包括所述第二网络中第四节点的无线网状网络的标识MESH ID。
- 根据权利要求5至7中任一项所述的方法,其特征在于,所述第一传输协议是无线MESH网状网络协议,所述第二传输协议是以太网协议。
- 一种融合组网的方法,其特征在于,应用于包括至少两个网络的通信系统中,每个网络包括至少两个节点,每个网络中的节点之间基于第一传输协议进行通信,第一网络中的至少一个节点能够与第二网络中的至少一个节点基于第二传输协议进行通信,所述方法包括:所述第一网络的第三节点从所述第一网络中的第一节点接收第二数据包,其中,所述第二数据包是所述第一网络中的第一节点对第一数据包解封装后获得的数据包,所述第一数据包是所述第二网络的第二节点从所述第二网络的第四节点接收的第二数据包后,根据所述第二传输协议封装后生成的数据包,其中,所述第二数据包携带有所述第二网络中第四节点的标识信息;所述第一网络的第三节点从所述第二数据包中获取所述第二网络中第四节点的标识信息,并根据所述第二网络中第四节点的标识信息确定所述第四节点的ID,基于所述第一传输协议与所述第二网络的第四节点进行通信。
- 根据权利要求9所述的方法,其特征在于,所述第二网络是无线网状MESH网络,所述第二网络中第四节点的标识信息包括所述第二网络中第四节点的无线网状网络的标识MESH ID。
- 根据权利要求9或10所述的方法,其特征在于,所述第一传输协议是无线mesh网状网络协议,所述第二传输协议是以太网协议。
- 一种节点设备,所述节点设备为第一节点设备,其特征在于,应用于包括至少两个网络的通信系统中,每个网络包括至少两个节点设备,每个网络的节点设备之间基于第一传输协议进行通信,第一网络中的至少一个节点设备能够与第二网络中的至少一个节点设备基于第二传输协议进行通信,所述第一节点设备包括:接收单元,用于从第二网络中的第二节点设备接收第一数据包,其中,所述第一数据包是所述第二网络的第二节点从所述第二网络的第四节点接收的第二数据包后,根据所述第二传输协议封装后生成的数据包,其中,所述第二数据包携带有所述第二网络中第四节点的标识信息;处理单元,用于根据所述第二传输协议对所述第一数据包进行解封装,以获取第二数据包;发送单元,用于向所述第一网络的第三节点设备发送所述第二数据包。
- 根据权利要求12所述的节点设备,其特征在于,所述处理单元还用于获取所述第二数据包携带的所述第二网络中第四节点的标识信息;所述发送单元还用于向所述第一网络的第三节点发送扩展地址解析协议ARP请求消息,所述ARP请求消息携带所述第二网络中第四节点的标识信息。
- 根据权利要求12或13所述的节点设备,其特征在于,所述第二网络是无线MESH网络,所述第二网络中第四节点的标识信息包括所述第二网络中第四节点的无线网状网络的标识MESH ID。
- 根据权利要求1至3中任一项所述的方法,其特征在于,所述第一传输协议是无线MESH网状网络协议,所述第二传输协议是以太网协议。
- 一种节点设备,所述节点设备为第二节点设备,其特征在于,应用于包括至少两个网络的通信系统中,每个网络包括至少两个节点设备,每个网络的节点设备之间基于第一传输协议进行通信,第一网络中的至少一个节点设备能够与第二网络中的至少一个节点设备基于第二传输协议进行通信,所述第二节点设备包括:接收单元,用于从所述第二网络的第四节点设备接收第二数据包,所述第二数据包是基于所述第一传输协议生成的数据包,且所述第二数据包携带有所述第二网络中第四节点的标识信息;处理单元,用于根据所述第二传输协议对所述第二数据包进行封装以生成第一数据包,其中,所述第二网络中第四节点的标识信息被作为所述第一数据包的负载;发送单元,用于向所述第一网络的第一节点设备发送所述第二数据包。
- 根据权利要求15所述的节点设备,其特征在于,所述处理单元还用于获取所述第二数据包携带的所述第二网络中第四节点的标识信息;所述发送单元还用于向所述第一网络的第一节点发送扩展的地址解析协议ARP请求消息,所述ARP请求消息携带所述第二网络中第四节点的标识信息。
- 根据权利要求16或17所述的节点设备,其特征在于,所述第二网络是无线网状MESH网络,所述第二网络中第四节点的标识信息包括所述第二网络中第四节点的无线网状网络的标识MESH ID。
- 根据权利要求16至18中任一项所述的节点设备,其特征在于,所述第一传输协议是无线MESH网状网络协议,所述第二传输协议是以太网协议。
- 一种节点设备,所述节点设备为第三节点设备,其特征在于,应用于包括至少两个网络的通信系统中,每个网络包括至少两个节点设备,每个网络中的节点设备之间基于第一传输协议进行通信,第一网络中的至少一个节点设备能够与第二网络中的至少一个节点设备基于第二传输协议进行通信,所述第三节点设备包括:接收单元,用于从所述第一网络中的第一节点设备接收第二数据包,其中,所述第二数据包是所述第一网络中的第一节点对第一数据包解封装后获得的数据包,所述第一数据包是所述第二网络的第二节点从所述第二网络的第四节点接收的第二数据包后,根据所述第二传输协议封装后生成的数据包,其中,所述第二数据包携带有所述第二网络中第四节点的标识信息;处理单元,用于从所述第二数据包中获取所述第二网络中第四节点的标识信息,并根据所述第二网络中第四节点的标识信息确定所述第四节点的ID,基于所述第一传输协议与所述第二网络的第四节点设备进行通信。
- 根据权利要求20所述的节点设备,其特征在于,所述第二网络是无线MESH网络,所述第二网络中第四节点的标识信息包括所述第二网络中第四节点的无线网状网络的标识MESH ID。
- 根据权利要求20或21所述的节点设备,其特征在于,所述第一传输协议是无线MESH网状网络协议,所述第二传输协议是以太网协议。
- 一种节点设备,所述节点设备为第一节点设备,其特征在于,所述装置包括收发器、存储器、处理器以及存储在所述存储器上并可被所述处理器运行的指令,所述处理器执行所述指令使得所述装置实现上述权利要求1至4中任一项所述的方法。
- 一种节点设备,所述节点设备为第二节点设备,其特征在于,所述装置包括收发器、存储器、处理器以及存储在所述存储器上并可被所述处理器运行的指令,所述处理器执行所述指令使得所述装置实现上述权利要求5至8中任一项所述的方法。
- 一种节点设备,所述节点设备为第三节点设备,其特征在于,所述装置包括收发器、存储器、处理器以及存储在所述存储器上并可被所述处理器运行的指令,所述处理器执行所述指令使得所述装置实现上述权利要求9至11中任一项所述的方法。
- 一种计算机可读存储介质,用于存储计算机程序,其特征在于,所述计算机程序包括用于实现上述权利要求1至4中任一项所述的方法的指令。
- 一种计算机可读存储介质,用于存储计算机程序,其特征在于,所述计算机程序包括用于实现上述权利要求5至8中任一项所述的方法的指令。
- 一种计算机可读存储介质,用于存储计算机程序,其特征在于,所述计算机程序包括用于实现上述权利要求9至11中任一项所述的方法的指令。
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2018/081318 WO2019183919A1 (zh) | 2018-03-30 | 2018-03-30 | 融合组网的方法和装置 |
CN201880071566.XA CN111316685A (zh) | 2018-03-30 | 2018-03-30 | 融合组网的方法和装置 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2018/081318 WO2019183919A1 (zh) | 2018-03-30 | 2018-03-30 | 融合组网的方法和装置 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2019183919A1 true WO2019183919A1 (zh) | 2019-10-03 |
Family
ID=68059153
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2018/081318 WO2019183919A1 (zh) | 2018-03-30 | 2018-03-30 | 融合组网的方法和装置 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN111316685A (zh) |
WO (1) | WO2019183919A1 (zh) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11357005B2 (en) | 2019-10-09 | 2022-06-07 | Cisco Technology, Inc. | Integration of a Wi-Fi access point with a cellular radio unit |
US20220200850A1 (en) * | 2020-12-22 | 2022-06-23 | Intel Corporation | Multiple-hop peer-to-peer network |
CN114710795A (zh) * | 2022-06-06 | 2022-07-05 | 希诺麦田技术(深圳)有限公司 | 无线自组网的arp表优化方法、设备及应用 |
CN116074914A (zh) * | 2023-03-06 | 2023-05-05 | 中科诺信集团有限公司 | 基于自组网的混合组网方法及装置 |
US12021760B2 (en) | 2021-06-29 | 2024-06-25 | Industrial Technology Research Institute | Routing establishing method and communication router using the same |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111885630B (zh) * | 2020-07-01 | 2023-06-30 | 中国联合网络通信集团有限公司 | 数据传输方法及通信装置 |
CN115516923B (zh) * | 2020-07-10 | 2024-10-22 | Oppo广东移动通信有限公司 | 体域网中的通信方法、装置、节点、存储介质及芯片 |
CN112437459B (zh) * | 2020-11-17 | 2023-03-24 | 杭州萤石软件有限公司 | 一种无线网格网络的管理方法和装置 |
CN113037652B (zh) * | 2021-03-24 | 2022-04-12 | 深圳市乙辰科技股份有限公司 | 基于分布式组网系统的网络连接方法、装置和计算机设备 |
CN113625588A (zh) * | 2021-09-06 | 2021-11-09 | 合肥润东通信科技股份有限公司 | 基于docsis网关的智能家居设备互联的方法和系统 |
CN114554523B (zh) * | 2022-02-17 | 2024-06-21 | 儒安物联科技集团有限公司 | 一种在mesh链路中4g网络的路由选择及同步参数的方法 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060280177A1 (en) * | 2005-06-13 | 2006-12-14 | Gupta Pawan K | Integration network for digital media solutions |
CN103826233A (zh) * | 2014-03-17 | 2014-05-28 | 华为技术有限公司 | 融合组网配置方法及装置 |
CN104602229A (zh) * | 2015-02-04 | 2015-05-06 | 重庆邮电大学 | 一种针对wlan与5g融合组网应用场景的高效初始接入认证方法 |
CN106376095A (zh) * | 2015-07-22 | 2017-02-01 | 中兴通讯股份有限公司 | 一种融合组网系统中建立传输通道的方法和装置 |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102036425B (zh) * | 2009-09-27 | 2014-11-05 | 华为技术有限公司 | 基于边界网关的无线网状网络通信方法及设备 |
EP3231220A1 (en) * | 2014-12-11 | 2017-10-18 | Nokia Technologies Oy | Extending the range of mesh networks |
CN107409428B (zh) * | 2015-03-13 | 2020-12-29 | 瑞典爱立信有限公司 | Wlan与3gpp之间的业务聚合建立方法与装置 |
US10123371B2 (en) * | 2015-10-02 | 2018-11-06 | Avago Technologies General Ip (Singapore) Pte. Ltd. | Systems and methods for LTE-WAN aggregation |
CN106921641B (zh) * | 2015-12-28 | 2020-04-03 | 华为技术有限公司 | 传输报文的方法和装置 |
-
2018
- 2018-03-30 CN CN201880071566.XA patent/CN111316685A/zh active Pending
- 2018-03-30 WO PCT/CN2018/081318 patent/WO2019183919A1/zh active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060280177A1 (en) * | 2005-06-13 | 2006-12-14 | Gupta Pawan K | Integration network for digital media solutions |
CN103826233A (zh) * | 2014-03-17 | 2014-05-28 | 华为技术有限公司 | 融合组网配置方法及装置 |
CN104602229A (zh) * | 2015-02-04 | 2015-05-06 | 重庆邮电大学 | 一种针对wlan与5g融合组网应用场景的高效初始接入认证方法 |
CN106376095A (zh) * | 2015-07-22 | 2017-02-01 | 中兴通讯股份有限公司 | 一种融合组网系统中建立传输通道的方法和装置 |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11357005B2 (en) | 2019-10-09 | 2022-06-07 | Cisco Technology, Inc. | Integration of a Wi-Fi access point with a cellular radio unit |
US11785670B2 (en) | 2019-10-09 | 2023-10-10 | Cisco Technology, Inc. | Integration of a Wi-Fi access point with a cellular radio unit |
US12160933B2 (en) | 2019-10-09 | 2024-12-03 | Cisco Technology, Inc. | Integration of a Wi-Fi access point with a cellular radio unit |
US20220200850A1 (en) * | 2020-12-22 | 2022-06-23 | Intel Corporation | Multiple-hop peer-to-peer network |
US12021760B2 (en) | 2021-06-29 | 2024-06-25 | Industrial Technology Research Institute | Routing establishing method and communication router using the same |
CN114710795A (zh) * | 2022-06-06 | 2022-07-05 | 希诺麦田技术(深圳)有限公司 | 无线自组网的arp表优化方法、设备及应用 |
CN116074914A (zh) * | 2023-03-06 | 2023-05-05 | 中科诺信集团有限公司 | 基于自组网的混合组网方法及装置 |
CN116074914B (zh) * | 2023-03-06 | 2023-06-23 | 中科诺信集团有限公司 | 基于自组网的混合组网方法及装置 |
Also Published As
Publication number | Publication date |
---|---|
CN111316685A (zh) | 2020-06-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2019183919A1 (zh) | 融合组网的方法和装置 | |
US11510131B2 (en) | Configuration method, data transmission method, and apparatus | |
JP7079866B2 (ja) | パケット処理方法、及びデバイス | |
EP1468528B1 (en) | Method and apparatus for priority-based load balancing for use in an extended local area network | |
CN1794732B (zh) | IPv6微型传感路由器协议栈体系结构的实现方法 | |
WO2022082679A1 (zh) | 一种通信方法及相关设备 | |
CN103841621B (zh) | 一种基于6LoWPAN树型网络的冗余路由方法 | |
JP2011521525A (ja) | フロー容量を等化する方法、装置、及びシステム | |
CN101150481B (zh) | Wlan和lan互通的方法和装置 | |
WO2005109764A1 (ja) | 無線ノード装置及びマルチホップ型無線lanシステム | |
WO2011120358A1 (zh) | 中继通信网络的信息传输方法及系统 | |
CN102421162A (zh) | 一种支持IPv6无线传感器网络的混合式路由 | |
CN103200283A (zh) | 多中继无线通信系统及该系统空中接口ip化的实现方法 | |
CN102256293B (zh) | 自组织融合网络按需路由网关及其驱动设计方法 | |
CN107707476A (zh) | 基于fpga的高效无线转发装置及方法 | |
CN102238683A (zh) | 一种无线网状网的路由信息获取和传递方法 | |
CN103929790A (zh) | 一种Ad Hoc网络的二层路由方法 | |
CN106688304B (zh) | 采用使能TR-069的CPE代理的ZigBee系统管理 | |
WO2018090411A1 (zh) | 一种无线网络融合的实现方法 | |
US7792110B2 (en) | Method and system for updating a virtual local area network (VLAN) status of a node in a mesh network | |
CN106792935B (zh) | 一种用户站点跨小区切换时实现用户数据接续传输的方法 | |
WO2024139892A1 (zh) | 一种通信方法及装置 | |
CN114338852B (zh) | 一种封装基于Thread协议的数据包以获得IEEE 802.11物理帧的方法 | |
TWI827186B (zh) | 路由方法和通信裝置 | |
EP4510692A1 (en) | Information configuration method and apparatus, and communication system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 18912340 Country of ref document: EP Kind code of ref document: A1 |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 18912340 Country of ref document: EP Kind code of ref document: A1 |