Movatterモバイル変換


[0]ホーム

URL:


CN119676641B - An application method through self-organizing network protocol - Google Patents

An application method through self-organizing network protocol

Info

Publication number
CN119676641B
CN119676641BCN202411825199.1ACN202411825199ACN119676641BCN 119676641 BCN119676641 BCN 119676641BCN 202411825199 ACN202411825199 ACN 202411825199ACN 119676641 BCN119676641 BCN 119676641B
Authority
CN
China
Prior art keywords
network
host
communication
node
nodes
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202411825199.1A
Other languages
Chinese (zh)
Other versions
CN119676641A (en
Inventor
王鹏
张旭海
魏媛
曾存良
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Huayuan Xingqi Technology Co ltd
Original Assignee
Beijing Huayuan Xingqi Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Huayuan Xingqi Technology Co ltdfiledCriticalBeijing Huayuan Xingqi Technology Co ltd
Priority to CN202411825199.1ApriorityCriticalpatent/CN119676641B/en
Publication of CN119676641ApublicationCriticalpatent/CN119676641A/en
Application grantedgrantedCritical
Publication of CN119676641BpublicationCriticalpatent/CN119676641B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Classifications

Landscapes

Abstract

Translated fromChinese

本发明提出了一种通过自组网协议的应用方法,所述方法包括如下步骤:S1:通过全对等Mesh结构组网,所有节点完全对等,相互协同完成网络组建及路由转发与通信;S2:将不同区域的相同设备或相同区域的不同设备划分成不同网络,通过网络ID对不同网络进行区分,并在不同网络中采用不同信道进行物理上网络隔离;S3:单个网络通过单播通信与广播通信进行数据交互,在选择进行单播通信时,通过每个设备中设定的唯一ID为通信地址,进行单播通信;S4:在采用广播通信是通过主从式通信机制进行交互,由设定的主机发起通信,通过节点进行交互,节点等待主机命令进行响应,从机端并不与其它从机节点进行数据交流。

The present invention proposes an application method through a self-organizing network protocol, which includes the following steps: S1: networking through a fully peer-to-peer Mesh structure, in which all nodes are completely peer-to-peer and cooperate with each other to complete network establishment, routing forwarding and communication; S2: dividing the same devices in different areas or different devices in the same area into different networks, distinguishing different networks through network IDs, and using different channels in different networks to physically isolate the networks; S3: a single network exchanges data through unicast communication and broadcast communication. When unicast communication is selected, unicast communication is performed through the unique ID set in each device as the communication address; S4: when broadcast communication is adopted, interaction is performed through a master-slave communication mechanism. The communication is initiated by a set host and interacted through nodes. The nodes wait for the host command to respond, and the slave end does not exchange data with other slave nodes.

Description

Application method through ad hoc network protocol
Technical Field
The invention belongs to the field of ad hoc networks, and particularly relates to an application method of an ad hoc network protocol.
Background
Currently, building a complete Zigbee network includes two steps, network initialization, node (router or terminal) joining the network. The standard Zigbee network protocol includes a coordinator, a router and end nodes, and the establishment of a Zigbee network requires only the addition of a router or end node in addition to the coordinator.
In a network, the short address of each device must be unique, assigned by its parent node when the node joins the network, and communicated using the short address. For the coordinator, the short address is usually set to 0x0000, and after the above steps are completed, the Zigbee mesh network is successfully initialized, and then the joining of other nodes is waited. The node joining the network again includes two steps, network entry by interfacing with the coordinator and network entry by the existing parent node.
Disclosure of Invention
The invention provides an application method of an ad hoc network protocol, which solves the problems that the existing protocol stack in the prior art needs to set the functions of equipment in advance, all equipment cannot be the same function, thus the network possibly has a fixed center node to cause inflexibility of the network, the position of the equipment is always unchanged for a fixed application scene, the advantages of the ad hoc network are not existed, and the time and resources consumed by the ad hoc network are still high.
The technical scheme of the invention is realized by the following steps of S1, networking through a full-peer Mesh structure, mutually and cooperatively completing network construction and route forwarding and communication by all nodes, S2, dividing the same equipment in different areas or different equipment in the same area into different networks, distinguishing the different networks through network IDs, and physically isolating the different networks through different channels, S3, carrying out data interaction between a single network and a broadcasting communication through unicast communication, carrying out unicast communication by taking a unique ID set in each equipment as a communication address when unicast communication is selected, S4, carrying out interaction by adopting a master-slave communication mechanism, carrying out communication by a set host, carrying out interaction by the nodes, waiting for a host command to respond by the nodes, and carrying out data communication with other slave nodes, S5, when the slave terminal module operates, not taking part in a supervision and network access process, carrying out data interaction with the nodes by adopting a quick binding slave communication and carrying out data interaction with the host, carrying out data interaction with the host through a management mechanism, carrying out data interaction with the host and carrying out the host management mechanism according to the state regulation and the host, completing the data interaction with the host according to the requirements.
At present, the conventional network initialization flow is as follows:
1) Determining a network coordinator. It is first determined whether a node is an FFD node, and then it is determined whether this FFD node is in another network or whether a coordinator already exists in the network. By actively scanning, a beacon request command (Beacon request command) is sent, then a scanning period is set, if no beacon is detected within the scanning period, the FFD is considered to have no coordinator within its pos, then its own Zigbee network can be established at this time, and the coordinator as the network continuously generates and broadcasts out a beacon.
2) And performing a channel scanning process. Including both energy scanning and active scanning, by first performing energy detection on a designated channel or a default channel to avoid possible interference. The measured energy values are channel ordered in an incremental manner, channels for which those energy values exceed the allowable energy level are discarded, channels for which the allowable energy level are selected and marked as available channels. And then actively scanning to search network information in the communication radius of the node. The information is broadcast in the network in the form of beacon frames which are obtained by the node by means of active channel scanning and from this information a best, relatively quiet channel is found, and from the recorded result a channel is selected which should have the least number of Zigbee networks, preferably no Zigbee devices. During the active scan, the mac layer will discard all frames received by the phy layer data service except for the beacon.
3) Configuring network parameters (setting network ID). After finding the appropriate channel, the coordinator will select a network identifier (PAN ID, value < = 0x3 FFF) for the network, which ID must be unique in the channel used and cannot collide with other Zigbee networks. The PAN ID may be obtained by listening to the IDs of other networks and then selecting an ID that does not collide, or the scanned channel may be manually specified to determine the PAN ID that does not collide with other networks later. There are two address modes in the Zigbee network, an extended address (64 bits) allocated by the IEEE organization for unique device identification and a short address (16 bits) for device identification in the local network.
As a preferred embodiment, the Mesh structure in step S1 uses a full peer-to-peer network protocol stack, and uses encryption to transmit data in the bottom layer and the data transmission process through a discrete routing algorithm, so as to ensure the security of transmitting data.
As a preferred embodiment, in the step S2, a plurality of routing nodes are disposed in different networks, and the routing nodes have autonomous selection rights for the next hop of the data packet transmitted by the routing nodes, and when the network topology changes and the path is lost, the routing nodes transmit the data packet to the optimal next hop node as much as possible.
In the step S2, when the physical isolation is performed, the physical channel is set, the user may set the range to 0x 00-0 x7f, and when the highest bit7 of the user set value is set to 1, the values of bits 0-6 are invalid, and the channel is automatically configured according to the network ID.
In a preferred embodiment, when the broadcast communication is adopted in the step S4, if the Zigbee module is set as the host, data forwarding is performed according to the address specified by the collector, and when the slave module operates, only the data of the host and the supervision are received and forwarded, and the slave does not perform data communication with other slave nodes.
As a preferred embodiment, the management flow of the host in the step S5 is that S51 is firstly performed with serial port adapting operation of resetting and powering up, then the lists are synchronized, S52 is performed with judging the connection state of the test white list node, updating the connection state, updating the topology relation, caching the original topology relation after updating the topology relation, S53 is performed with heartbeat processing, then data communication processing, and updating the connection state at the same time, and S54 is performed with network maintenance processing.
The node comprises three states, namely a first non-network-connected state and a non-registered state, wherein the second non-network-connected state and the registered state, and the third non-network-connected state and the registered state, wherein the non-network-connected state is a state that after the node is electrified, a heartbeat of a host is not found, connection of the host is not tested or connection of the host is not successfully tested, the non-registered state is a state that the node does not store host information records, the node belongs to a blank node, whether the node is network-connected or not tests whether the host exists according to the recorded host and network information, so that whether the node is network-connected or not is confirmed, and meanwhile, the network-connected state of the node is notified to the host through the process.
After the technical scheme is adopted, the invention has the beneficial effects that the function of equipment is required to be preset based on the existing protocol stack, all equipment cannot be in the same function, and the network has the defect that a fixed center node causes inflexibility of the network. Each device in the invention can dynamically identify network information and dynamically adjust the identity of the device to perform normal work, and can realize dynamic fusion under multiple networks so that the network information is not crossed, therefore, the invention can dynamically and adaptively construct a centerless dynamic network under complex environment and special scene, and ensure that the network can still normally communicate without manual intervention under the condition of dynamic fault.
Drawings
In order to more clearly illustrate the embodiments of the invention or the technical solutions of the prior art, the drawings which are used in the description of the embodiments or the prior art will be briefly described, it being obvious that the drawings in the description below are only some embodiments of the invention, and that other drawings can be obtained according to these drawings without inventive faculty for a person skilled in the art.
FIG. 1 is a diagram of a full peer-to-peer distributed network architecture of the present invention;
FIG. 2 is a diagram of a network architecture for fast topology adaptation (fast new path establishment after node movement) in accordance with the present invention;
FIG. 3 is a diagram of a network architecture for fast path repair (when a node path fails, the node is directly rerouted) in accordance with the present invention;
FIG. 4 is a schematic diagram of a network partition according to the present invention;
FIG. 5 is a flow chart of the host management of the present invention;
fig. 6 is a flow chart of the node registration and network access process of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Examples:
The application method of the self-networking protocol comprises the following steps of S1 networking through a full-peer Mesh structure, enabling all nodes to complete network construction and route forwarding and communication in a coordinated mode, S2 dividing the same equipment in different areas or different equipment in the same area into different networks, distinguishing the different networks through network IDs and carrying out physical network isolation through different channels in the different networks, S3 enabling a single network to carry out data interaction with broadcast communication through unicast communication, enabling a unique ID set in each equipment to serve as a communication address when unicast communication is selected, enabling the unicast communication to carry out interaction through a master-slave communication mechanism, enabling the set hosts to initiate communication through the nodes, enabling the nodes to wait for host commands to respond, enabling a slave end to not carry out data communication with other slave nodes, S5 enabling a supervision end module to take part in the network communication process through carrying out point communication of fast binding the slave end and communication, carrying out data interaction with the master end, managing the slave end communication with the nodes through the master end communication mechanism, and carrying out data interaction with the slave end node regulation and the master end communication node according to the state regulation and the master end communication state.
The application adopts a discrete routing algorithm, has fast networking speed, fast network topology response, high communication efficiency and stability, and adopts encryption transmission data transmission safety and reliability in the bottom layer and the data transmission process.
Unlike traditional Zigbee ad hoc network protocol, all nodes are completely peer-to-peer by adopting a full-peer Mesh structure for networking, and network construction, route forwarding and communication are completed in cooperation with each other. When the distributed routing algorithm is adopted, the method only records, stores and updates neighbor information, so that the method has the characteristics of 1, large network capacity, convenient network expansion, 2, rapid topology change response and strong adaptability to the environment of the difference signal. The method has the advantages of high path repair speed, high data transmission efficiency and reliability, support of rapid change and adaptation of network topology, support of rapid route repair, and no sense of route change in the communication process.
For convenience of management, when networking applications, the same devices in different areas or different devices in the same area are generally divided into different networks. Thus, the devices of the same network can communicate with each other, and the devices of different networks are isolated from each other. The different networks are uniquely distinguished by a "network ID". If the "network IDs" are different, devices with different "network IDs" are logically completely isolated. To further isolate different network devices, setting to different channels is also supported to achieve physical network isolation. When setting the physical channel, the user can set the range to be 0x 00-0 x7F. When the highest bit7 of the user set value is set to 1, the values of bit0 to bit6 are invalid, and the module automatically configures a channel according to the network ID. By default, the channel value is 0x80, the module logically uniquely divides the network according to a "network ID", and physically automatically isolates the network using different (and possibly the same) channels.
And supporting unicast communication and broadcast communication, and designating a destination address is required during unicast communication. Thus, each device is assigned a unique ID, referred to as the "native ID". When unicast communication is performed, the "local ID" of the destination ID is designated as the destination address, and unicast communication can be realized. Specific network partitions are shown in fig. 4 below.
The fact that the available channels are shown in fig. 4 as physically dividing different nodes, the network ID logically dividing different nodes, the local ID and the destination ID designating both the transmitting and receiving party, is not fully adapted to the actual application, and mainly has the following problems that if there are too many nodes initiating communication simultaneously in the network, the network blocks or loses data, in some applications, network authorization is required, and the unnecessary nodes are not allowed to participate in communication, so that the nodes can be automatically configured and automatically divided into different networks and different channels, and user participation is not required. (the network is divided to avoid too much overcrowding of the same area). Some communications need not be routed across, but need only be done locally. In order to adapt to the situation, the network management function is built in the module, the master-slave communication mechanism is the communication mode of most data acquisition systems at present, each operation process of the master-slave communication mechanism is initiated by a host, and the node only waits for a host command to respond. Therefore, in the network, only one node can be ensured to communicate at any time, so that the stability of the network is ensured. If the Zigbee module is set as the host end, the Zigbee module forwards data according to the address appointed by the collector. When the slave terminal module operates, only the data of the host terminal and the supervision terminal are received, and the data are forwarded to each other. The slave side does not communicate data with other slave nodes.
When the monitoring end module operates, the monitoring end module does not participate in the network access process and does not need to carry out multi-relay route forwarding, so that the monitoring communication adopts a point-to-point communication mechanism for quickly binding the slave and communicating to carry out data communication. The module is based on HYXQ-053B protocol stack, supports route and non-route communication mode at the same time, and adopts master-slave communication mechanism + point pair communication mechanism to combine with each other, host management network host machine to complete the following functions:
1. a unique and random network ID is generated and the network ID of the managed node is set to that ID.
2. And sending the heartbeat of the host computer to enable the node to actively attempt connection.
3. And managing the white list, and enabling the node with the network access authority to join the network.
4. And managing and actively reporting, and allowing all devices to access the network according to requirements.
5. And managing and updating the node online state. The host management flow is shown in fig. 5 below.
In the step S1, the Mesh structure networking adopts a full peer-to-peer network protocol stack, adopts encryption transmission data in the bottom layer and the data transmission process through a discrete routing algorithm, ensures the safety of the transmission data, and only records, stores and updates adjacent information when networking through the Mesh structure networking.
In the step S2, a plurality of routing nodes are arranged in different networks, each routing node has independent selection right for the next hop of the data packet transmitted by the routing node, and when the network topology changes and the path is lost, the routing node can transmit the data packet to the optimal next hop node as far as possible.
In the step S2, when the physical isolation is performed, the isolation is performed by setting a physical channel, when the physical channel is set, the user can set the range to 0x 00-0 x7f, when the highest bit7 of the user set value is set to 1, the values of bit 0-bit 6 are invalid, and the channel is automatically configured according to the network ID.
In the step S4, if the Zigbee module is set as the host, data forwarding is performed according to the address specified by the collector, and when the slave module operates, only the host and the supervisory data are received, and the data are forwarded to each other, and the slave does not perform data communication with other slave nodes.
The management flow of the host in the step S5 is that S51 is firstly conducted with serial port adapting operation of resetting and powering up, then lists are synchronized, S52 is conducted, connection states of the nodes of the test white list are judged, connection states of the nodes of the test white list are updated, the topology relations are updated, the original topology relations are cached after the topology relations are updated, S53 is conducted, after the topology relations are updated, the host sends heartbeat processing, then data communication processing is conducted, the connection states are updated at the same time when the data communication processing is conducted, and S54 is conducted finally.
The node comprises three states, namely a first non-network-access state and a second non-network-access state, wherein the first non-network-access state is a non-network-access state and the second non-network-access state is a registered state, the third non-network-access state is a network-access state and a registered state, the non-network-access state refers to a state that after the node is powered on, a heartbeat of a host is not found, connection of the host is not tested or connection of the host is not successfully tested, the non-registration state refers to a state that the node does not store host information records, the node belongs to a blank node, whether the node accesses the network or not is tested according to the recorded host and network information, and therefore whether the node accesses the network or not is confirmed. The network-unreceived means that after the node is powered on, the heartbeat of the host is not found, the host connection is not tested or the connection of the host is not tested successfully. Unregistered means that the node does not store host information records, and belongs to a blank node. The node accessing the network refers to the process that the unregistered node searches for the host, requests connection and obtains approval, and finally obtains corresponding network information.
The node is connected to the network, for the registered node, it tests whether the host exists according to the recorded host and network information, thereby confirming whether the host is connected to the network, and at the same time, the network connection state of the host node is notified to the host through the process. If the node is registered and is not connected to the network, but the host computer test fails, after the designated times of retries, the node considers that the network information is wrong or the host computer is lost, and the registration process is carried out.
The node network access logic needs to cooperate with a host to process, and the logic is divided into node processing logic and host processing logic. The design supports two networking management modes of white list management and active reporting management. In order to better ensure the accuracy and reliability of network access, the registration process of network access is divided into two modes of white list registration and active reporting registration aiming at the two modes. When the node is connected to the network, the host is preferably searched in a white list mode, and after the host is unsuccessful (and the network connection time of the active reporting mode is allowed to arrive), the host supporting the active reporting network connection is started to be searched for network connection. I.e. the white list networking priority is higher than the active reporting networking.
As shown in fig. 6, the present module manages networks and communications using a whitelist mechanism. When the white list manages the network, the node is used for judging the legitimacy of the node, and automatic networking is realized according to the white list (when the white list is reported independently, if the host is successful in networking, the node is also added into the list). When the network works, the state of the host can be normally tested only if the nodes exist in the host side list, and data communication is normally realized. During communication, the node sends out data, the data which is filtered by the white list and does not exist in the list is ignored. And the host computer issues data according to the white list, and the data request which does not exist in the list returns an error.
The foregoing description of the preferred embodiments of the invention is not intended to be limiting, but rather is intended to cover all modifications, equivalents, alternatives, and improvements that fall within the spirit and scope of the invention.

Claims (7)

Translated fromChinese
1.一种通过自组网协议的应用方法,其特征在于,所述方法包括如下步骤:1. An application method using an ad hoc network protocol, characterized in that the method comprises the following steps:S1:通过全对等Mesh结构组网,所有节点完全对等,相互协同完成网络组建及路由转发与通信;S1: Through the full peer-to-peer Mesh structure network, all nodes are completely equal and work together to complete network establishment, routing, forwarding and communication;S2:将不同区域的相同设备或相同区域的不同设备划分成不同网络,通过网络ID对不同网络进行区分,并在不同网络中采用不同信道进行物理上网络隔离;S2: Divide the same devices in different areas or different devices in the same area into different networks, distinguish different networks by network ID, and use different channels in different networks for physical network isolation;S3:单个网络通过单播通信与广播通信进行数据交互,在选择进行单播通信时,通过每个设备中设定的唯一ID为通信地址,进行单播通信;S3: A single network exchanges data through unicast communication and broadcast communication. When unicast communication is selected, the unique ID set in each device is used as the communication address for unicast communication.S4:在采用广播通信是通过主从式通信机制进行交互,由设定的主机发起通信,通过节点进行交互,节点等待主机命令进行响应,从机端并不与其它从机节点进行数据交流;S4: When broadcast communication is used, the interaction is carried out through the master-slave communication mechanism. The communication is initiated by the set host and interacted through the nodes. The nodes wait for the host command to respond, and the slave end does not exchange data with other slave nodes.S5:监管端模块在运行时,不参与入网过程,并通过对通信采取快速绑定从机并通信的点对点通信机制进行数据交流,主机通过管理流程对节点进行管理,并根据主机需求调节节点状态,完成主机与从机之间的数据交互。S5: When the supervisory module is running, it does not participate in the network access process, and exchanges data through a point-to-point communication mechanism that quickly binds the slaves and communicates. The host manages the nodes through the management process and adjusts the node status according to the host's needs to complete the data interaction between the host and the slaves.2.如权利要求1所述的一种通过自组网协议的应用方法,其特征在于:所述步骤S1中Mesh结构组网采用全对等网状态网络协议栈,通过离散路由算法并在底层及数据传输过程中,采用加密传输数据,保证传输数据安全,通过Mesh结构组网,在组网时,仅只对相邻信息记录、存储与更新。2. The application method of the self-organizing network protocol as described in claim 1 is characterized in that: the Mesh structure networking in step S1 adopts a full peer-to-peer network state network protocol stack, uses a discrete routing algorithm and encrypts data transmission at the bottom layer and during data transmission to ensure the security of transmitted data, and through the Mesh structure networking, only adjacent information is recorded, stored and updated during networking.3.如权利要求1所述的一种通过自组网协议的应用方法,其特征在于:所述步骤S2中不同网络内设置有若干路由节点,路由节点对其传输数据包的下一跳具有自主选择权,当网络拓扑发生变化、路径丢失时,路由节点会尽最大可能将其传输给最优下一跳节点。3. An application method through a self-organizing network protocol as described in claim 1 is characterized in that: in the step S2, several routing nodes are set in different networks, and the routing nodes have the independent right to choose the next hop for transmitting data packets. When the network topology changes and the path is lost, the routing nodes will try their best to transmit it to the optimal next hop node.4.如权利要求1所述的一种通过自组网协议的应用方法,其特征在于:所述步骤S2中在进行物理隔离时,通过设置物理信道方式进行隔离,在设置物理信道时,用户可设置范围为0x00~0x7F,当用户设置值的最高位bit7置1时,bit0~bit6的数值无效,根据网络ID自动配置信道。4. An application method through a self-organizing network protocol as described in claim 1 is characterized in that: in the step S2, when physical isolation is performed, isolation is performed by setting a physical channel. When setting the physical channel, the user can set the range to 0x00~0x7F. When the highest bit bit7 of the user-set value is set to 1, the values of bits 0~bit 6 are invalid, and the channel is automatically configured according to the network ID.5.如权利要求1所述的一种通过自组网协议的应用方法,其特征在于:所述步骤S4中采用广播通信时,若将Zigbee模块设定为主机端,根据采集器指定的地址,进行数据转发,而从机端模块运行时,只接受主机端和监管端数据,并将数据相互转发,从机端并不与其它从机节点进行数据交流。5. An application method using a self-organizing network protocol as described in claim 1 is characterized in that: when broadcast communication is adopted in step S4, if the Zigbee module is set as the host end, data forwarding is performed according to the address specified by the collector, and when the slave end module is running, it only accepts data from the host end and the supervisor end, and forwards the data to each other, and the slave end does not exchange data with other slave nodes.6.如权利要求1所述的一种通过自组网协议的应用方法,其特征在于:所述步骤S5中的主机的管理流程为:6. The application method according to claim 1, wherein the host management process in step S5 is as follows:S51:首先进行复位上电的串口适配操作,随后将名单进行同步;S51: First, perform a reset and power-on serial port adapter operation, and then synchronize the list;S52:判定测试白名单节点的连接状态,更新其连接状态,并更新拓扑关系,在更新拓扑关系后,将原拓扑关系进行缓存;S52: Determine the connection status of the test whitelist node, update its connection status, and update the topology relationship. After the topology relationship is updated, cache the original topology relationship;S53:在完成拓扑关系更新后,主机发送心跳处理,随后进行数据通信处理,再进行数据通信处理的同时对连接状态进行更新;S53: After completing the topology update, the host sends a heartbeat process, then performs data communication processing, and then updates the connection status while performing data communication processing;S54:最后进入网络维护处理。S54: Finally, enter the network maintenance process.7.如权利要求1所述的一种通过自组网协议的应用方法,其特征在于:所述节点包括三种状态,状态一为未入网、未注册状态,状态二为未入网、已注册状态,状态三为已入网、已注册状态;其中未入网是指节点自上电后,还没有发现主机心跳,没有测试过主机连接或测试主机连接未成功的状态;未注册是指节点未保存有主机信息记录,属于空白节点;节点是否入网根据记录的主机及网络信息,测试主机是否存在,从而确认本机是否已入网,同时通过此过程通知主机本节点的入网状态。7. An application method through a self-organizing network protocol as described in claim 1 is characterized in that: the node includes three states, state one is an off-network, unregistered state, state two is an off-network, registered state, and state three is an on-network, registered state; wherein, off-network means that the node has not found the host heartbeat since power-on, has not tested the host connection or the host connection test has failed; unregistered means that the node has no host information record saved and is a blank node; whether the node is on the network is determined by testing whether the host exists based on the recorded host and network information, thereby confirming whether the local machine has been on the network, and at the same time notifying the host of the network status of this node through this process.
CN202411825199.1A2024-12-122024-12-12 An application method through self-organizing network protocolActiveCN119676641B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN202411825199.1ACN119676641B (en)2024-12-122024-12-12 An application method through self-organizing network protocol

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN202411825199.1ACN119676641B (en)2024-12-122024-12-12 An application method through self-organizing network protocol

Publications (2)

Publication NumberPublication Date
CN119676641A CN119676641A (en)2025-03-21
CN119676641Btrue CN119676641B (en)2025-08-29

Family

ID=94997467

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN202411825199.1AActiveCN119676641B (en)2024-12-122024-12-12 An application method through self-organizing network protocol

Country Status (1)

CountryLink
CN (1)CN119676641B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN101355416A (en)*2008-08-072009-01-28上海交通大学 Wireless self-organizing network active protection system
CN103428899A (en)*2013-07-182013-12-04珠海中慧微电子有限公司Micropower wireless network ad-hoc networking method based on multi-channel frequency hopping

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN102158812B (en)*2011-05-262013-07-31东南大学Wireless Mesh network multicasting communication method of AC-AP (Access Controller-Access Point) framework
CN102665247A (en)*2012-05-212012-09-12华东师范大学Method for realizing peer-to-peer network based on IEEE (Institute of Electrical and Electronic Engineers) 802.15.4
CN110167032A (en)*2019-04-302019-08-23陕西师范大学The network-building method and system of the software definition wireless self-organization network of unmanned aerial vehicle (UAV) control
CN110809276B (en)*2019-11-092023-06-09天合光能股份有限公司Household wireless communication system without mutual interference and networking method thereof

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN101355416A (en)*2008-08-072009-01-28上海交通大学 Wireless self-organizing network active protection system
CN103428899A (en)*2013-07-182013-12-04珠海中慧微电子有限公司Micropower wireless network ad-hoc networking method based on multi-channel frequency hopping

Also Published As

Publication numberPublication date
CN119676641A (en)2025-03-21

Similar Documents

PublicationPublication DateTitle
JP5554325B2 (en) How to establish a wireless multi-hop network
US7171476B2 (en)Protocol and structure for self-organizing network
US9565099B2 (en)Spanning tree in fabric switches
US8582500B2 (en)Methods for providing an ad hoc mobile communication network and systems thereof
US10057130B2 (en)D2HCP protocol in ad hoc networks: merging of sub-networks and address conflict resolution
CN115225564B (en)PLC and wireless heterogeneous network networking method
RU2369976C2 (en)Routing in self-organising peer-to-peer network
JP2009522844A (en) Initializing the wireless communication network
JP2023515723A (en) Efficient commissioning of radio control systems
JP2004527184A (en) Network with multiple sub-networks interconnectable via bridge terminals
JP7629020B2 (en) Method for selectively commissioning node devices in a network and coordinator device - Patents.com
EP2430819B1 (en)A method of assigning a network address for communicating in a segmented network
CN113438634B (en)Intelligent door lock Bluetooth node role switching and networking method based on Internet of things
CN119676641B (en) An application method through self-organizing network protocol
US6901076B2 (en)Dynamic LAN boundaries
JPH05327720A (en) LAN node and LAN system
CN108289087B (en)Local area network post-transmission management system and method
CN118540724B (en)Network control method and related equipment
CN118695143B (en) A decentralized gateway cluster FTTR networking method, device, equipment and medium
CN116032771B (en) A method and system for network recovery based on easymesh network topology structure
KR100650406B1 (en) Method of transmitting / receiving frame of MAC protocol in ad-hoc network using CSM / CA method
KR101024271B1 (en) Automatic interworking device for routing protocol between different ad hoc networks and its method
WO2024037924A1 (en)A method for migrating nodes in a distributed network to a centralized network
CN119769115A (en) Method for migrating nodes in a distributed network to a centralized network
CN116803059A (en)Apparatus, network, method and computer program for configuring a distributed intelligent network

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant

[8]ページ先頭

©2009-2025 Movatter.jp