U.S. patent application number 11/474907 was filed with the patent office on 2006-11-30 for radio frequency local area network.
Invention is credited to Ronald E. Luse, Robert C. Meier.
Application Number | 20060268806 11/474907 |
Document ID | / |
Family ID | 25085407 |
Filed Date | 2006-11-30 |
United States Patent
Application |
20060268806 |
Kind Code |
A1 |
Meier; Robert C. ; et
al. |
November 30, 2006 |
Radio frequency local area network
Abstract
An apparatus and a method for routing data in a radio data
communication system having one or more host computers, one or more
intermediate base stations, and one or more RF terminals organizes
the intermediate base stations into an optimal spanning-tree
network to control the routing of data to and from the RF terminals
and the host computer efficiently and dynamically. Communication
between the host computer and the RF terminals is achieved by using
the network of intermediate base stations to transmit the data.
Inventors: |
Meier; Robert C.; (Cedar
Rapids, IA) ; Luse; Ronald E.; (Marion, IA) |
Correspondence
Address: |
MCANDREWS HELD & MALLOY, LTD
500 WEST MADISON STREET
SUITE 3400
CHICAGO
IL
60661
US
|
Family ID: |
25085407 |
Appl. No.: |
11/474907 |
Filed: |
June 26, 2006 |
Related U.S. Patent Documents
|
|
|
|
|
|
Application
Number |
Filing Date |
Patent Number |
|
|
10965991 |
Oct 15, 2004 |
|
|
|
11474907 |
Jun 26, 2006 |
|
|
|
09542424 |
Apr 4, 2000 |
6826165 |
|
|
10965991 |
Oct 15, 2004 |
|
|
|
09066125 |
Apr 24, 1998 |
6046992 |
|
|
09542424 |
Apr 4, 2000 |
|
|
|
08543838 |
Feb 16, 1996 |
|
|
|
09066125 |
Apr 24, 1998 |
|
|
|
08410592 |
Mar 27, 1995 |
5504746 |
|
|
08543838 |
Feb 16, 1996 |
|
|
|
07968990 |
Oct 30, 1992 |
|
|
|
08410592 |
Mar 27, 1995 |
|
|
|
07769425 |
Oct 1, 1991 |
|
|
|
07968990 |
Oct 30, 1992 |
|
|
|
PCT/US92/08610 |
Oct 1, 1992 |
|
|
|
07968990 |
Oct 30, 1992 |
|
|
|
Current U.S.
Class: |
370/338 |
Current CPC
Class: |
H01Q 21/24 20130101;
H04L 69/32 20130101; H04W 88/16 20130101; H04L 12/12 20130101; H04L
45/48 20130101; H04W 40/02 20130101; H04W 40/34 20130101; H04W
88/04 20130101; H04L 69/14 20130101; Y02D 70/324 20180101; H04L
45/04 20130101; H04L 45/00 20130101; H04W 40/24 20130101; Y02D
70/30 20180101; H04L 29/06 20130101; H04L 69/326 20130101; H04W
92/20 20130101; G06F 15/0225 20130101; H04W 88/08 20130101; H01Q
1/241 20130101; H04W 40/00 20130101; Y02D 30/70 20200801; H04W
88/14 20130101; H04W 40/08 20130101; G06K 7/1098 20130101; H04L
45/44 20130101; H04W 84/04 20130101; H01Q 1/007 20130101; H04L
69/324 20130101; H04W 84/12 20130101; G06F 1/1626 20130101; H04L
69/325 20130101 |
Class at
Publication: |
370/338 |
International
Class: |
H04Q 7/24 20060101
H04Q007/24 |
Claims
1-20. (canceled)
21. A communication network, comprising: a gateway node adapted to
provide wireless communication and wired communication; a plurality
of wireless access points; and a plurality of wireless devices
coupled to the wireless access points and comprising a first
wireless device and a second wireless device, the first wireless
device communicating with the second wireless device along a
selected communication signal path through the gateway node and at
least two wireless access points, wherein the selected
communication signal path can be dynamically adapted according to
communication signal path conditions.
22. The communication network according to claim 21, wherein the
communication network comprises a multi-hop communication
network.
23. The communication network according to claim 21, wherein the
plurality of wireless access points comprise a plurality of
bridges.
24. The communication network according to claim 21, wherein the
gateway node comprises a root node.
25. The communication network according to claim 21, wherein the
gateway node comprises a switch node.
26. The communication network according to claim 2I, wherein some
wireless access points provide wired communication.
27. The communication network according to claim 21, wherein the
first wireless device communicates with the second wireless device
along the selected communication signal path through the gateway
node and at least three wireless access points.
28. The communication network according to claim 21, wherein the
communication signal path conditions comprise bandwidth
conditions.
29. The communication network according to claim 21, wherein the
communication signal path conditions comprise information rate
conditions.
30. The communication network according to claim 21, wherein the
communication signal path conditions comprise interference
conditions.
31. The communication network according to claim 21, wherein the
communication signal path conditions comprise data interference
conditions.
32. The communication network according to claim 21, wherein the
communication signal path conditions comprise a defined level of
performance.
33. The communication network according to claim 21, wherein the
gateway node, the plurality of wireless access points and the
plurality of wireless devices form a hierarchical communication
architecture.
34. The communication network according to claim 33, wherein the
gateway node selects the communication signal path between the
first wireless device and the second wireless device according to
the communication signal path conditions.
35. The communication network according to claim 33, wherein the
plurality of wireless access points comprises a first wireless
access point and a second wireless access point, and wherein the
gateway node monitors the communication signal path conditions
between the first wireless access point and the second wireless
access point.
36. The communication network according to claim 33, wherein the
plurality of wireless access points comprises a first wireless
access point and a second wireless access point, and wherein the
gateway node monitors the communication signal path conditions
between at least one of the first wireless access point and the
second wireless access point and at least one of the first wireless
device and the second wireless device.
37. The communication network according to claim 33, wherein the
selected communication signal path is part of a set of possible
communication paths.
38. The communication network according to claim 37, wherein the
gateway node selects a particular communication signal path from
the set of possible communication signal paths according to the
communication signal path conditions of the particular
communication signal path.
39. The communication network according to claim 21, wherein the
plurality of wireless access points and the plurality of wireless
devices form an ad hoc communication architecture.
40. The communication network according to claim 39, wherein each
wireless device or each wireless access point along the selected
communication signal path provides the best peer-to-peer
communication signal path conditions between nodes.
41. The communication network according to claim 40, wherein the
selected communication signal path is determined on a peer-to-peer
basis based on respective peer-to-peer communication signal path
conditions.
42. The communication network according to claim 39, wherein at
least some wireless device independently create and maintain
locally stored information to specify how communication traffic
should flow through that bridge.
43. The communication network according to claim 21, wherein some
wireless access points or some wireless devices dynamically create
and revise communication pathways according to communication signal
path conditions.
44. The communication network according to claim 21, wherein some
wireless access points or some wireless devices independently store
and maintain local information that specifies how communication
traffic should flow through a local access point or a local
wireless device.
45. The communication network according to claim 21, further
comprising: a central switch coupled to the gateway node.
46. The communication network according to claim 45, wherein the
central switch is adapted to provide a higher level access node
than the gateway node.
47. The communication network according to claim 21, wherein the
plurality of wireless devices comprises means for automatically
connecting to the gateway node through a plurality of hops.
48. The communication network according to claim 21, wherein the
plurality of wireless device comprises means for connecting to the
gateway node using a HELLO packet protocol.
49. The communication network according to claim 21, wherein at
least some wireless access points or at least some wireless devices
use spread spectrum communication techniques.
50. The communication network according to claim 21, wherein the
plurality of wireless devices comprises a plurality of
terminals.
51. A method for communicating in a communication network,
comprising: (a) creating a hierarchical communication structure
comprising a gateway node, a plurality of wireless access points
and a plurality of wireless devices; (b) determining communication
signal path conditions of a first communication signal path and a
second communication signal path, the first communication signal
path and the second communication signal path providing a
communication signal path between a first wireless device of the
plurality of wireless devices and a second wireless device of the
plurality of wireless devices, the first communication path and the
second communication path each passing through at least two
wireless access points of the plurality of wireless access points;
and (c) selecting a particular communication signal path from the
first communication signal path and the second communication signal
path based on the determined communication signal path conditions
of the first communication signal path and the second communication
signal path.
52. The method according to claim 51, wherein the gateway node
performs (c).
53. The method according to claim 51, further comprising: storing
local node-to-node communication signal path conditions in local
nodes.
54. The method according to claim 51, further comprising: storing
local node-to-node communication signal path conditions in the
gateway node.
55. The method according to claim 51, wherein the hierarchical
communication structure comprises a spanning tree.
56. The method according to claim 51, further comprising:
monitoring the determined communication signal path conditions of
the first communication signal path and the second communication
signal path to determine whether the selected communication signal
path should be changed.
57. A method for communicating between a first wireless device and
a second wireless device in a communication network, comprising:
(a) creating an ad hoc communication structure comprising a gateway
node, a plurality of wireless access points and a plurality of
wireless devices, the plurality of wireless device comprising the
first wireless device and the second wireless device; (b) creating
a communication signal path between the first wireless device and
the second wireless device through at least two wireless access
points of the plurality of wireless access points, the
communication signal path comprising a plurality of node-to-node
signal paths; (c) selecting a particular node-to-node signal path
according to node-to-node communication signal path conditions; (d)
based on dynamically changing node-to-node communication signal
path conditions, modifying the communication signal path between
the first wireless device and the second wireless device through at
least two wireless access points of the plurality of wireless
access points.
58. The method according to claim 57, further comprising: storing
node-to-node communication signal path conditions between a first
node and a second node in at least one of the first node and the
second node.
Description
CROSS-REFERENCE TO RELATED APPLICATION
[0001] The present application is a continuation in part of a
pending application of Meier et al., U.S. Ser. No. 07/769,425,
filed Oct. 1, 1991 (Attorney Docket Nos. 91 P 668; DN37882). This
application is also a continuation in part of pending PCT
application of Mahany et al., Serial No. PCT/US92/08610, filed Oct.
1, 1992 (Attorney Docket Nos. 92 P 661; DN37882Y).
[0002] The entire disclosures of each of these pending applications
including the drawings and appendices are incorporated herein by
reference as if set forth fully in this application.
BACKGROUND OF THE INVENTION
[0003] In a typical radio data communication system having one or
more host computers and multiple PF terminals, communication
between a host computer and an RF terminal is provided by one or
more base stations. Depending upon the application and the
operating conditions, a large number of these base stations may be
required to adequately serve the system. For example, a radio data
communication system installed in a large factory may require
dozens of base stations in order to cover the entire factory
floor.
[0004] In earlier RF (Radio Frequency) data communication systems,
the base stations were typically connected directly to a host
computer through multi-dropped connections to an Ethernet
communication line. To communicate between an RF terminal and a
host computer, in such a system, the RF terminal sends data to a
base station and the base station passes the data directly to the
host computer. Communicating with a host computer through a base
station in this manner is commonly known as hopping. These earlier
RF data communication systems used a single-hop method of
communication.
[0005] In order to cover a larger area with an RF data
communication system and to take advantage of the deregulation of
the spread-spectrum radio frequencies, later-developed RF data
communication systems are organized into layers of base stations.
As in earlier RF data communications systems, a typical system
includes multiple base stations which communicate directly with the
RF terminals and the host computer. In addition, the system also
includes intermediate stations that communicate with the RF
terminals, the multiple base stations, and other intermediate
stations. In such a system, communication from an RF terminal to a
host computer may be achieved, for example, by having the RF
terminal send data to an intermediate station, the intermediate
station send the data to a base station, and the base station send
the data directly to the host computer. Communicating with a host
computer through more than one station is commonly known as a
multiple-hop communication system.
[0006] Difficulties often arise in maintaining the integrity of
such multiple-hop RF data communication systems. The system must be
able to handle both wireless and hard-wired station connections,
efficient dynamic routing of data information, RF terminal
mobility, and interference from many different sources.
SUMMARY OF THE INVENTION
[0007] The present invention solves many of the problems inherent
in a multiple-hop data communication system. The present invention
comprises an RF Local-Area Network capable of efficient and dynamic
handling of data by routing communications between the RF Terminals
and the host computer through a network of intermediate base
stations.
[0008] In one embodiment of the present invention, the RF data
communication system contains one or more host computers and
multiple gateways, bridges, and RF terminals. Gateways are used to
pass messages to and from a host computer and the RF Network. A
host port is used to provide a link between the gateway and the
host computer. In addition, gateways may include bridging functions
and may pass information from one RF terminal to another. Bridges
are intermediate relay nodes which repeat data messages. Bridges
can repeat data to and from bridges, gateways and RF terminals and
are used to extend the range of the gateways.
[0009] The RF terminals are attached logically to the host computer
and use a network formed by a gateway and the bridges to
communicate with the host computer. To set up the network, an
optimal configuration for conducting network communication spanning
tree is created to control the flow of data communication. To aid
understanding by providing a more visual description, this
configuration is referred to hereafter as a "spanning tree" or
"optimal spanning tree".
[0010] Specifically, root of the spanning tree are the gateways;
the branches are the bridges; and non-bridging stations, such as RF
terminals, are the leaves of the tree. Data are sent along the
branches of the newly created optimal spanning tree. Nodes in the
network use a backward learning technique to route packets along
the correct branches.
[0011] One object of the present invention is to route data
efficiently, dynamically, and without looping. Another object of
the present invention is to make the routing of the data
transparent to the RF terminals. The RF terminals, transmitting
data intended for the host computer, are unaffected by the means
ultimately used by the RF Network to deliver their data.
[0012] It is a further object of the present invention for the
network to be capable of handling RF terminal mobility and lost
nodes with minimal impact on the entire RF data communication
system.
BRIEF DESCRIPTION OF THE DRAWINGS
[0013] FIG. 1 is a functional block diagram of an RF data
communication system incorporating the RF local-area network of the
present invention.
[0014] FIG. 2 is a flow diagram illustrating a bridging node's
construction and maintenance of the spanning tree.
DETAILED DESCRIPTION OF THE INVENTION
[0015] FIG. 1 is a functional block diagram of an RF data
communication system. In one embodiment of the present invention,
the RF data communication system has a host computer 10, a network
controller 14 and bridges 22 and 24 attached to a data
communication link 16. Also attached to the data communication link
16 is a gateway 20 which acts as the root node for the spanning
tree of the RF data network of the present invention. A bridge 42
is attached to the gateway 20 through a hard-wired communication
link and bridges 40 and 44 are logically attached to gateway 20 by
two independent RF links. Additional bridges 46, 48, 50 and 52 are
also connected to the RF Network and are shown in the FIG. 1. Note
that, although shown separate from the host computer 10, the
gateway 20 (the spanning tree root node) may be part of host
computer 10.
[0016] The FIG. 1 further shows RF terminals 100 and 102 attached
to bridge 22 via RF links and RF terminal 104 attached to bridge 24
via an RF link. Also, RF terminals 106, 108, 110, 112, 114, 116,
118, and 120 can be seen logically attached to the RF Network
through their respective RF links. The RF terminals in FIG. 1 are
representative of non-bridging stations. In alternate embodiments
of the present invention, the RF Network could contain any type of
device capable of supporting the functions needed to communicate in
the RF Network such as hard-wired terminals, remote printers,
stationary bar code scanners, or the like. The RF data
communication system, as shown in FIG. 1, represents the
configuration of the system at a discrete moment in time after the
initialization of the system. The RF links, as shown, are dynamic
and subject to change. For example, changes in the structure of the
RF data communication system can be caused by movement of the RF
terminals and by interference that affects the RF communication
links.
[0017] In the preferred embodiment, the host computer 10 is an IBM
3090, the network controller 14 is a model RC3250 of the Norand
Corporation, the data communication link 16 is an Ethernet link,
the nodes 20, 22, 24, 40, 42, 44, 46, 48, 50 and 52 are intelligent
base transceiver units of the type RB4000 of the Norand
Corporation, and the RF terminals 100, 102, 104, 106, 108, 110,
112, 114, 116, 118 and 120 are of type RT1100 of the Norand
Corporation.
[0018] The optimal spanning tree, which provides the data pathways
throughout the communication system, is stored and maintained by
the network as a whole. Each node in the network stores and
modifies information which specifies how local communication
traffic should flow. Optimal spanning trees assure efficient,
adaptive (dynamic) routing of information without looping.
[0019] To initialize the RF data communication system, the gateway
20 and the other nodes are organized into an optimal spanning tree
rooted at the gateway 20. To form the optimal spanning tree, in the
preferred embodiment the gateway 20 is assigned a status of
ATTACHED and all other bridges are assigned the status UNATTACHED.
The gateway 20 is considered attached to the spanning tree because
it is the root node. Initially, all other bridges are unattached
and lack a parent in the spanning tree. At this point, the attached
gateway node 20 periodically broadcasts a specific type of polling
packet referred to hereafter as "HELLO packets". The HELLO packets
can be broadcast using known methods of communicating via radio
frequency (RF) link or via a direct wire link. In the preferred
embodiment of the present invention, the RF link is comprised of
spread-spectrum transmissions using a polling protocol. Although a
polling protocol is preferred, a carrier-sense multiple-access
(CSMA), busy-tone, or any other protocol might also manage the
communication traffic on the RF link.
[0020] HELLO packets contain 1) the address of the sender, 2) the
hopping distance that the sender is from the root, 3) a source
address, 4) a count of nodes in the subtree which flow through that
bridge, and 5) a list of system parameters. Each node in the
network is assigned a unique network service address and a
node-type identifier to distinguish between different nodes and
different node types. The distance of a node from the root node is
measured in hops times the bandwidth of each hop. The gateway root
is considered to be zero hops away from itself.
[0021] FIG. 2 is a flow diagram illustrating a bridge's
participation in the construction and maintenance of the spanning
tree. At a block 201, the bridge begins the local construction of
the spanning tree upon power-up. Next, at a block 203, the bridge
enters the UNATTACHED state, listening for HELLO packets (also
referred to as HELLO messages herein) that are broadcast.
[0022] By listening to the HELLO messages, bridges can learn which
nodes are attached to the spanning tree. At a block 205, the bridge
responds to a HELLO packet received by sending an ATTACH.request
packet to the device that sent the received HELLO packet. The
ATTACH.request packet is thereafter forwarded towards and to the
root node which responds by sending an ATTACH.response packet back
down towards and to the bridge.
[0023] The bridge awaits the ATTACH.response packet at a block 207.
Upon receipt of the ATTACH.response packet, at a block 209, the
bridge enters an ATTACHED state. Thereafter, at a block 211, the
bridge begins periodically broadcasting HELLO packets and begins
forwarding or relaying packets received. Specifically, between
HELLO packet broadcasts, the bridge listens for HELLO, DATA,
ATTACH.request and ATTACH.response packets broadcast by other
devices in the communication network. Upon receiving such a packet,
the bridge branches to a block 213. At the block 213, if the bridge
detects that it has become detached from the spanning tree the
bridge will branch back to the block 203 to establish attachment.
Note that although the illustration in FIG. 2 places block 213
immediately after the block 211, the bridges functionality
illustrated in block 213 is actually distributed throughout the
flow diagram.
[0024] If at the block 213 detachment has not occurred, at a block
214, the bridge determines if the received packet is a HELLO
packet. If so, the bridge analyzes the contents of the HELLO packet
at a block 215 to determine whether to change its attachment point
in the spanning tree. In a preferred embodiment, the bridge
attempts to maintain attachment to the spanning tree at the node
that is logically closest to the root node.
[0025] The logical distance, in a preferred embodiment, is based
upon the number of hops needed to reach the root node and the
bandwidth of those hops. The distance the attached node is away
from the root node is found in the second field of the HELLO
message that is broadcast. In another embodiment of the present
invention, the bridges consider the number of nodes attached to the
attached node as well as the logical distance of the attached node
from the root node. If an attached node is overloaded with other
attached nodes, the unattached bridge may request attachment to the
less loaded node, or to a more loaded node as described above in
networks having regions of substantial RF overlap. In yet another
embodiment, to avoid instability in the spanning tree, the bridge
would only conclude to change attachment if the logical distance of
the potential replacement is greater than a threshold value.
[0026] If no change in attachment is concluded, at a block 217 the
bridge branches back to the block 211. If a determination is made
to change attachment, a DETACH packet is sent to the root as
illustrated at a block 219. After sending the DETACH packet, the
bridge branches back to the block 205 to attach to the new spanning
tree node. Note that the order of shown for detachment and
attachment is only illustrative and can be reversed.
[0027] Referring back to the block 214, if the received packet (at
block 211) is not a HELLO packet, the bridge branches to a block
221 to forward the received packet through the spanning tree.
Afterwards, the bridge branches back to the block 211 to continue
the process.
[0028] Specifically, once attached, the attached bridge begins
broadcasting HELLO packets (at the block 211) seeking to have all
unattached bridges (or other network devices) attach to the
attached bridge. Upon receiving an ATTACH.request packet, the
bridge forwards that packet toward the root node (through the
blocks 211, 213, 214 and 221. On its path toward the root, each
node records the necessary information of how to reach requesting
bridge. This process is called "backward learning" herein, and is
discussed more fully below. As a result of the backward learning,
once the root node receives the ATTACH.request packet, an
ATTACH.response packet can be sent through the spanning tree to the
bridge requesting attachment.
[0029] After attaching to an attached node, the newly attached
bridge (the child) must determine its distance from the root node.
To arrive at the distance of the child from the root node, the
child adds the broadcast distance of its parent from the root node
to the distance of the child from its parent. In the preferred
embodiment, the distance of a child from its parent is based on the
bandwidth of the data communication link. For example, if the child
attaches to its parent via a hard-wired link (data rate 26,000
baud), then the distance of that communication link might equal,
for example, one hop. However, if the child attaches to its parent
via an RF link (data rate 9600 baud), then the distance of that
communication link might correspondingly be equal 3 hops. The
number of the hop corresponds directly to the communication speed
of the link. This may not only take into consideration baud rate,
but also such factors as channel interference.
[0030] Initially, only the root gateway node 20 is broadcasting
HELLO messages and only nodes 40, 42 and 44 are within range of the
HELLO messages broadcast by the gateway. Therefore, after the
listening period has expired, nodes 40, 42 and 44 request
attachment to the gateway node 20. The unattached nodes 40, 42, and
44 send ATTACH.request packets and the attached gateway node 20
acknowledges the ATTACH.request packets with local ATTACH.confirm
packets. The newly attached bridges are assigned the status
ATTACHED and begin broadcasting their own HELLO packets, looking
for other unattached bridges. Again, the remaining unattached nodes
attempt to attach to the attached nodes that are logically closest
to the root node. For example, node 48 is within range of HELLO
messages from both nodes 40 and 42. However, node 40 is three hops,
via an RF link, away from the gateway root node 20 and node 42 is
only one hop, via a hard-wired link, away from the gateway root
node 20. Therefore, node 48 attaches to node 42, the closest node
to the gateway root node 20.
[0031] The sending of HELLO messages, ATTACH.request packets and
ATTACH.confirm packets continues until the entire spanning tree is
established. In addition, attached bridges may also respond to
HELLO messages. If a HELLO message indicates that a much closer
route to the root node is available, the attached bridge sends a
DETACH packet to its old parent and an ATTACH.request packet to the
closer node. To avoid instability in the system and to avoid
overloading any given node, an attached bridge would only respond
to a HELLO message if the hop count in a HELLO packet is greater
than a certain threshold value, CHANGE_THRESHOLD. In the preferred
embodiment, the value of the CHANGE_THRESHOLD equals 3. In this
manner, an optimal spanning tree is formed that is capable of
transmitting data without looping.
[0032] Nodes, other than the gateway root node, after acknowledging
an ATTACH.request packet from a previously unattached node, will
send the ATTACH.request packet up the branches of the spanning tree
to the gateway root node. As the ATTACH.request packet is being
sent to the gateway root node, other nodes attached on the same
branch record the destination of the newly attached node in their
routing entry table. When the ATTACH.request packet reaches the
gateway root node, the gateway root node returns an end-to-end
ATTACH.confirm packet.
[0033] After the spanning tree is initialized, the RF terminals
listen for periodically broadcasted Hello packets to determine
which attached nodes are in range. After receiving HELLO messages
from attached nodes, an RF terminal responding to an appropriate
poll sends an ATTACH.request packet to attach to the node logically
closest to the root. For example, RF terminal 110 is physically
closer to node 44. However, node 44 is three hops, via an RF link,
away from the gateway root node 20 and node 42 is only one hop, via
a hard-wired link, away from the gateway root node 20. Therefore,
RF terminal 110, after hearing HELLO messages from both nodes 42
and 44, attaches to node 42, the closest node to the gateway root
node 20. Similarly, RF terminal 114 hears HELLO messages from nodes
48 and 50. Nodes 48 and 50 are both four hops away from the gateway
root node 20. However, node 48 has two RF terminals. 110 and 112
already attached to it while node 50 has only one RF terminal 116
attached to it. Therefore, RF terminal 114 will attach to node 50,
the least busy node of equal distance to the gateway root node 20.
Attaching to the least busy node proves to be the most efficient
practice when the communication system has little overlap in the RF
communication regions. In another embodiment, however, instead of
attaching to the least busy node of equal distance to the gateway
root node 20, the attachment is established with the busiest
node.
[0034] The attached node acknowledges the ATTACH.request and sends
the ATTACH.request packet to the gateway root node. Then, the
gateway root node returns an end-to-end ATTACH.confirm packet. In
this manner, the end-to-end ATTACH.request functions as a discovery
packet enabling the gateway root node, and all other nodes along
the same branch, to learn the address of the RF terminal quickly.
This process is called backward learning. Nodes learn the addresses
of terminals by monitoring the traffic from terminals to the root.
If a packet arrives from a terminal that is not contained in the
routing table of the node, an entry is made in the routing table.
The entry includes the terminal address and the address of the node
that sent the packet. In addition, an entry timer is set for that
terminal. The entry timer is used to determine when RF terminals
are actively using the attached node. Nodes maintain entries only
for terminals that are actively using the node for communication.
If the entry timer expires due to lack of communication, the RF
terminal entry is purged from the routing table.
[0035] The RF links among the RF terminals, the bridges, and the
gateway are often lost. Therefore, a connection-oriented data-link
service is used to maintain the logical node-to-node links. In the
absence of network traffic, periodic messages are sent and received
to ensure the stability of the RF link. As a result, the loss of a
link is quickly detected and the RF Network can attempt to
establish a new RF link before data transmission from the host
computer to an RF terminal is adversely affected.
[0036] Communication between terminals and the host computer is
accomplished by using the resulting RF Network. To communicate with
the host computer, an RF terminal sends a data packet in response
to a poll from the bridge closest to the host computer. Typically,
the RF terminal is attached to the bridge closest to the host
computer. However, RF terminals are constantly listening for HELLO
and polling messages from other bridges and may attach to, and then
communicate with, a bridge in the table of bridges that is closer
to the particular RF terminal.
[0037] Under certain operating conditions, duplicate data packets
can be transmitted in the RF Network. For example, it is possible
for an RF terminal to transmit a data packet to its attached node,
for the node to transmit the acknowledgement frame, and for the RF
terminal not to receive the acknowledgement. Under such
circumstances, the RF terminal will retransmit the data. If the
duplicate data packet is updated into the database of the host
computer, the database would become corrupt. Therefore, the RF
Network of the present invention detects duplicate data packets. To
ensure data integrity, each set of data transmissions receives a
sequence number. The sequence numbers are continuously incremented,
and duplicate sequence numbers are not accepted.
[0038] When a bridge receives a data packet from a terminal
directed to the host computer, the bridge forwards the data packet
to the parent node on the branch. The parent node then forwards the
data packet to its parent node. The forwarding of the data packet
continues until the gateway root node receives the data packet and
sends it to the host computer. Similarly, when a packet arrives at
a node from the host computer directed to an RF terminal, the node
checks its routing entry table and forwards the data packet to its
child node which is along the branch destined for the RF terminal.
It is not necessary for the nodes along the branch containing the
RF terminal to know the ultimate location of the RF terminal. The
forwarding of the data packet continues until the data packet
reaches the final node on the branch, which then forwards the data
packet directly to the terminal itself.
[0039] Communication is also possible between RF terminals. To
communicate with another RF terminal, the RF terminal sends a data
packet to its attached bridge. When the bridge receives the data
packet from a terminal directed to the host computer, the bridge
checks to see if the destination address of the RF terminal is
located within its routing table. If it is, the bridge simply sends
the message to the intended RF terminal. If not, the bridge
forwards the data packet to its parent node. The forwarding of the
data packet up the branch continues until a common parent between
the RF terminals is found. Then, the common parent (often the
gateway node itself) sends the data packet to the intended RF
terminal via the branches of the RF Network.
[0040] During the normal operation of the RF Network, RF terminals
can become lost or unattached to their attached node. If an RF
terminal becomes unattached, for whatever reason, its routing entry
is purged and the RF terminal listens for HELLO or polling messages
from any attached nodes in range. After receiving HELLO or polling
messages from attached nodes, the RF terminal sends an
ATTACH.request packet to the attached node closest to the root.
That attached node acknowledges the ATTACH.request and sends the
ATTACH.request packet onto the gateway root node. Then, the gateway
root node returns an end-to-end ATTACH.confirm packet.
[0041] Bridges can also become lost or unattached during normal
operations of the RF Network. If a bridge becomes lost or
unattached, all routing entries containing the bridge are purged.
The bridge then broadcasts a HELLO.request with a global bridge
destination address. Attached nodes will broadcast HELLO packets
immediately if they receive an ATTACH.request packet with a global
destination address. This helps the lost node re-attach. Then, the
bridge enters the LISTEN state to learn which attached nodes are
within range. The unattached bridge analyzes the contents of
broadcast HELLO messages to determine whether to request attachment
to the broadcasting node. Again, the bridge attempts to attach to
the node that is logically closest to the root node. After
attaching to the closest node, the bridge begins broadcasting HELLO
messages to solicit ATTACH.requests from other nodes or RF
terminals.
[0042] The spread-spectrum system provides a hierarchical radio
frequency network of on-line terminals for data entry and message
transfer in a mobile environment. The network is characterized by
sporadic data traffic over multiple-hop data paths consisting of
RS485 or ethernet wired links and single-channel direct sequenced
spread spectrum links. The network architecture is complicated by
moving, hidden, and sleeping nodes. The spread spectrum system
consists of the following types of devices:
[0043] Terminal controller--A gateway which passes messages from a
host port to the RF network; and which passes messages from the
network to the host port. The host port (directly or indirectly)
provides a link between the controller and a "host" computer to
which the terminals are logically attached.
[0044] Base station--An intermediate relay node which is used to
extend the range of the controller node. Base station-to-controller
or base station-to-base station links can be wired or wireless
RF.
[0045] Terminal--Norand RF hand-held terminals, printers, etc. In
addition, a controller device has a terminal component.
[0046] The devices are logically organized as nodes in an (optimal)
spanning tree, with the controller at the root, internal nodes in
base stations or controllers on branches of the tree, and terminal
nodes as (possibly mobile) leaves on the tree. Like a sink tree,
nodes closer to the root of the spanning tree are said to be
"downstream" from nodes which are further away. Conversely, all
nodes are "upstream" from the root. Packets are only sent along
branches of the spanning tree. Nodes in the network use a "BACKWARD
LEARNING" technique to route packets along the branches of the
spanning tree.
[0047] Devices in the spanning tree are logically categorized as
one of the following three node types: [0048] 1) Root (or root
bridge)--A controller device which functions as the root bridge of
the network spanning tree. In the preferred embodiment, the
spanning tree has a single root node. Initially, all controllers
are root candidates from which a root node is selected. This
selection may be based on the hopping distance to the host, preset
priority, random selection, etc. [0049] 2) Bridge--An internal node
in the spanning tree which is used to "bridge" terminal nodes
together into an interconnected network. The root node is also
considered a bridge and the term "bridge" may be used to refer to
all non-terminal nodes or all non-terminal nodes except the root,
depending on the context herein. A bridge node consists of a
network interface function and a routing function. [0050] 3)
Terminal--leaf node in the spanning tree. A terminal node can be
viewed as the software entity that terminates a branch in the
spanning tree.
[0051] A controller device contains a terminal node(s) and a bridge
node. The bridge node is the root node if the controller is
functioning as the root bridge. A base station contains a bridge
node. A terminal device contains a terminal node and must have a
network interface function. A "bridging entity" refers to a bridge
node or to the network interface function in a terminal.
[0052] The basic requirements of the system are the following.
[0053] a) Wired or wireless node connections.
[0054] b) Network layer transparency.
[0055] c) Dynamic/automatic network routing configuration.
[0056] d) Terminal mobility. Terminals should be able to move about
the RF network without losing an end-to-end connection.
[0057] e) Ability to accommodate sleeping terminals.
[0058] f) Ability to locate terminals quickly.
[0059] g) Built-in redundancy. Lost nodes should have minimal
impact on the network.
[0060] h) Physical link independence. The bridging algorithm is
consistent across heterogeneous physical links.
[0061] The software for the spread-spectrum system is functionally
layered as follows.
[0062] Medium Access Control (MAC)
[0063] The MAC layer is responsible for providing reliable
transmission between any two nodes in the network (i.e.
terminal-to-bridge). The MAC has a channel access control component
and a link control component. The link control component
facilitates and regulates point-to-point frame transfers in the
absence of collision detection. The MAC channel access control
component regulates access to the network. Note that herein, the
MAC layer is also referred to as the Data Link layer.
[0064] Bridging Layer
[0065] The bridging layer, which is also referred to herein as the
network layer, has several functions as follows.
[0066] 1. The bridging layer uses a "HELLO protocol" to organize
nodes in the network into an optimal spanning tree rooted at the
root bridge. The spanning tree is used to prevent loops in the
topology. Interior branches of the spanning tree are relatively
stable (i.e. controller and relay stations do not move often).
Terminals, which are leaves on the spanning three, may become
unattached, and must be reattached, frequently.
[0067] 2. The bridging layer routes packets from terminals to the
host, from the host to terminals, and from terminals to terminals
along branches of the spanning tree.
[0068] 3. The bridging layer provides a service for storing packets
for SLEEPING terminals. Packets which cannot be delivered
immediately can be saved by the bridging entity in a parent node
for one or more HELLO times.
[0069] 4. The bridging layer propagates lost node information
throughout the spanning tree.
[0070] 5. The bridging layer maintains the spanning tree links.
[0071] 6. The bridging layer distributes network interface
addresses.
[0072] Logical Link Control Layer
[0073] A logical link control layer, also known herein as the
Transport layer herein, is responsible for providing reliable
transmission between any two nodes in the network (i.e.,
terminal-to-base station). The data-link layer provides a
connection-oriented reliable service and a connectionless
unreliable service. The reliable service detects and discards
duplicate packets and retransmits lost packets. The unreliable
services provides a datagram facility for upper layer protocols
which provide a reliable end-to-end data path. The data-link layer
provides ISO layer 2 services for terminal-to-host application
sessions which run on top of an end-to-end terminal-to-host
transport protocol. However, the data-link layer provides transport
(ISO layer 4) services for sessions contained within the SST
network.
Higher Layers
[0074] For terminal-to-terminal sessions contained within the SST
network, the data-link layer provides transport layer services and
no additional network or transport layer is required. In this case,
the MAC, bridging, and data-link layers discussed above can be
viewed as a data-link layer, a network layer, and a transport
layer, respectively. For terminal-to-host-application sessions,
higher ISO layers exist on top of the SST data-link layer and must
be implemented in the terminal and host computer, as required. This
document does not define (or restrict) those layers. This document
does discuss a fast-connect VMTP-like transport protocol which is
used for transient internal terminal-to-terminal sessions.
[0075] Specifically, a network layer has several functions, as
follows.
[0076] 1) The network layer uses a "hello protocol" to organize
nodes in the network into an optimal spanning tree rooted at the
controller. (A spanning tree is required to prevent loops in the
topology.) Interior branches of the spanning tree are relatively
stable (i.e., the controller and base stations do not move often).
Terminals, which are leaves on the spanning tree, become
unattached, and must be reattached frequently.
[0077] 2) The network layer routes messages from terminals to the
host, from the host to terminals, and from terminals to terminals
along branches of the spanning tree.
[0078] 3) The network layer provides a service for storing messages
for SLEEPING terminals. Messages which cannot be delivered
immediately can be saved by the network entity in a parent node for
one or more hello times.
[0079] 4) The network layer propagates lost node information
throughout the spanning tree.
[0080] 5) The network layer maintains the spanning tree links in
the absence of regular data traffic.
[0081] A transport layer is responsible for establishing and
maintaining a reliable end-to-end data path between transport
access points in any two nodes in the network. The transport layer
provides unreliable, reliable and a transaction-oriented services.
The transport layer should be immune to implementation changes in
the network layer.
[0082] The responsibilities of the transport layer include the
following.
[0083] 1) Establishing and maintaining TCP-like connections for
reliable root-to-terminal data transmission.
[0084] 2) Maintaining VMTP-like transaction records for reliable
transient message passing between any two nodes.
[0085] 3) Detecting and discarding duplicate packets.
[0086] 4) Retransmitting lost packets.
[0087] Layers 1 through 4 are self-contained within the Norand RF
network, and are independent of the host computer and of terminal
applications. The session layer (and any higher layers) are
dependent on specific applications. Therefore, the session protocol
(and higher protocols) must be implemented as required. Note that a
single transport access point is sufficient to handle single
sessions with multiple nodes. Multiple concurrent sessions between
any two nodes could be handled with a session identifier in a
session header.
[0088] Network address requirements are as follows. DLC framed
contain a hop destination and source address in the DLC header.
network packets contain an end-to-end destination and a source
address in the network header. Transport messages do not contain an
address field; instead, a transport connection is defined by
network layer source and destination address pairs. Multiple
transport connections require multiple network address pairs.
[0089] The transport header contains a TRANSPORT ACCESS POINT
identifier. DLC and network addresses are consistent and have the
same format. Each node has a unique LONG ADDRESS which is
programmed into the node at the factory. The long address is used
only to obtain a SHORT ADDRESS from the root node.
[0090] The network entity in each node obtains a SHORT ADDRESS from
the root node, which identifies the node uniquely. The network
entity passes the short address to the DLC entity. Short addresses
are used to minimize packet sizes.
[0091] Short addresses consist of the following. There is: an
address length bit (short or long).
[0092] a spanning tree identified.
[0093] a node-type identifier. Node types are well known.
[0094] a unique multi-cast or broadcast node identifier.
[0095] The node-identifier parts of root addresses are well known
and are constant. A default spanning tree identifier is well known
by all nodes. A non-default spanning tree identifier can be entered
into the root node (i.e., by a network administrator) and
advertised to all other nodes in "hello" packets. The list of
non-default spanning trees to which other nodes can attach must be
entered into each node.
[0096] A node-type identifier of all 1's is used to specify all
node types. A node identifier of all 1's is used to specify all
nodes of the specified type. A DLC identifier of all 0's is used to
specify a DLC entity which does not yet have an address. The
all-0's address is used in DLC frames that are used to send and
receive network ADDRESS packets. (The network entity in each node
filters ADDRESS packets based on the network address.)
[0097] Short-address allocation is accomplished as follows. Short
node identifiers of root nodes are well known. All other nodes must
obtain a short node identifier from the root. To obtain a short
address, a node send an ADDRESS request packet to the root node.
The source addresses (i.e., DLC and network) in the request packet
are LONG ADDRESSES. The root maintains an address queue of used and
unused SHORT ADDRESSES. If possible, the root selects an available
short address, associates the short address with the long address
of the requesting node, and returns the short address to the
requesting node in an ADDRESS acknowledge packet. (Note that the
destination address in the acknowledge packet is a long
address.)
[0098] A node must obtain a (new) short address initially and
whenever an ADDRESS-TIMEOUT inactivity period expires without
having the node receive a packet from the network entity in the
root.
[0099] The network entity in the root maintains addresses in the
address queue in least recently used order. Whenever a packet is
received, the source address is moved to the end of the queue. The
address at the head of the queue is available for use by a
requesting node if it has never been used or if it has been
inactive for a MAX-ADDRESS-LIFE time period.
[0100] MAX-ADDRESS-LIFE must be larger than ADDRESS-TIMEOUT to
ensure that an address is not in use by any node when it becomes
available for another node. If the root receives an ADDRESS request
from a source for which an entry exists in the address queue, the
root simply updates the queue and returns the old address.
[0101] The network layer organizes nodes into an optimal spanning
tree with the controller at the root of the tree. (Note that the
spanning three identifier allows two logical trees to exist in the
same coverage area.) Spanning tree organization is facilitated with
a HELLO protocol which allows nodes to determine the shortest path
to the root before attaching to the spanning tree. All messages are
routed along branches of the spanning tree.
[0102] Nodes in the network are generally categorized as ATTACHED
or UNATTACHED. Initially, only the root node is attached. A single
controller may be designated as the root, or multiple root
candidates (i.e. controllers) may negotiate to determine which node
is the root. Attached bridge nodes and root candidates transmit
"HELLO" packets at calculated intervals. The HELLO packets
include:
[0103] a) the source address, which includes the spanning tree
ID).
[0104] b) a broadcast destination address.
[0105] c) a "seed" value from which the time schedule of future
hello messages can be calculated.
[0106] d) a hello slot displacement time specifying an actual
variation that will occur in the scheduled arrival of the very next
hello message (the scheduled arrival being calculated from the
"seed").
[0107] e) the distance (i.e., path cost) of the transmitter from
the host. The incremental portion of the distance between a node
and its parent is primarily a function of the type of physical link
(i.e., ethernet, RS485, RF, or the like). If a signal-strength
indicator is available, connections are biased toward the link with
the best signal strength. The distance component is intended to
bias path selection toward (i.e., wired) high-speed connections.
Setting a minimum signal strength threshold helps prevent sporadic
changes in the network. In addition, connections can be biased to
balance the load (i.e., the number of children) on a parent
node.
[0108] f) a pending message list. Pending message lists consist of
0 or more destination-address/message-length pairs. Pending
messages for terminals are stored in the terminal's parent
node.
[0109] g) a detached-node list. Detached-node lists contain the
addresses of nodes which have detached from the spanning tree. The
root maintains two lists. A private list consists of all detached
node addresses, and an advertised list consists of the addresses of
all detached nodes which have pending transport messages. The
addresses in the hello packet are equivalent to the advertised
list.
[0110] An internal node learns which entries should be in its list
from hello messages transmitted by its parent node. The root node
builds its detached-node lists from information received in DETACH
packets. Entries are included in hello messages for DETACH-MSG-LIFE
hello times.
[0111] Attached notes broadcast "SHORT HELLO" messages immediately
if they receive an "HELLO.request" packet with a global destination
address; otherwise, attached nodes will only broadcast hello
messages at calculated time intervals in "hello slots." Short hello
messages do not contain a pending-message or detached-node list.
Short hello messages are sent independently of regular hello
messages and do not affect regular hello timing.
[0112] Unattached nodes (nodes without a parent in the spanning
tree) are, initially, in an "UNATTACHED LISTEN" state. During the
listen state, a node learns which attached base station/controller
is closest to the root node by listening to hello messages. After
the listening period expires an unattached node sends an
ATTACH.request packet to the attached node closest to the root. The
attached node immediately acknowledges the ATTACH.request, and send
the ATTACH.request packet onto the root (controller) node. The root
node returns the request as an end-to-end ATTACH.confirm packet. If
the newly-attached node is a base station, the node calculates its
link distance and adds the distance to the distance of its parent
before beginning to transmit hello messages.
[0113] The end-to-end ATTACH.request functions as a discovery
packet, and enables the root node to learn the address of the
source node quickly. The end-to-end ATTACH.request, when sent from
a node to the root, does not always travel the entire distance.
When a downstream node receives an ATTACH.request packet and
already has a correct routing entry for the associated node, the
downstream node intercepts the request and returns the
ATTACH.confirm to the source node. (Note that any data piggy-backed
on the ATTACH.request packet must still be forwarded to the host.)
This situation occurs whenever a "new" path has more than one node
in common with the "old" path.
[0114] The LISTEN state ends after MIN_HELLO hello time slots if
hello messages have been received from at least one node. If no
hello messages have been received the listening node waits and
retries later.
[0115] An attached node may respond to a hello message from a node
other than its parent (i.e., with an ATTACH.request) if the
difference in the hop count specified in the hello packet exceeds a
CHANGE-THRESHOLD level.
[0116] Unattached nodes may broadcast a GLOBAL ATTACH.request with
a multi-cast base station destination address to solicit short
hello messages from attached base stations. The net effect is that
the LISTEN state may (optionally) be shortened. (Note that only
attached base station or the controller may respond to
ATTACH.requests.) Normally, this facility is reserved for base
stations with children and terminals with transactions in
progress.
[0117] ATTACH.requests contain a (possibly empty) CHILD LIST, to
enable internal nodes to update their routing tables.
ATTACH.requests also contain a "count" field which indicates that a
terminal may be SLEEPING. The network entity in the parent of a
SLEEPING terminal con temporarily store messages for later
delivery. If the count field is non-zero, the network entity in a
parent node will store pending messages until 1) the message is
delivered, or 2) "count" hello times have expired.
[0118] Transport layer data can be piggy-backed on an attached
request packet from a terminal. (i.e., an attach request/confirm
can be implemented with a bit flag in the network header of a data
packet.)
Network Layer Routing.
[0119] All messages are routed along branches of the spanning tree.
Base stations "learn" the address of terminals by monitoring
traffic from terminals (i.e., to the root). When a base station
receives (i.e., an ATTACH.request) packet, destined for the root,
the base station creates or updates an entry in its routing table
for the terminal. The entry includes the terminal address, and the
address of the base station which sent the packet (i.e., the hop
address). When a base station receives an upstream packet (i.e.,
from the root, destined for a terminal) the packet is simply
forwarded to the base station which is in the routing entry for the
destination. Upstream messages (i.e., to a terminal) are discarded
whenever a routing entry does not exist. Downstream messages (i.e.,
from a terminal to the root) are simply forwarded to the next
downstream node (i.e., the parent in the branch of the spanning
tree.
[0120] TERMINAL-TO-TERMINAL COMMUNICATIONS is accomplished by
routing all terminal-to-terminal traffic through the nearest common
ancestor. In the worst case, the root is the nearest common
ancestor. A "ADDRESS SERVER" facilitates terminal-to-terminal
communications (see below).
[0121] DELETING INVALID ROUTING TABLE ENTRIES is accomplished in
several ways: connection oriented transport layer ensures that
packets will arrive from nodes attached to the branch of the
spanning tree within the timeout period, unless a node is
disconnected.)
[0122] 2) Whenever the DLC entity in a parent fails RETRY MAX times
to send a message to a child node, the node is logically
disconnected from the spanning tree, with one exception. If the
child is a SLEEPING terminal, the message is retained by the
network entity in the parent for "count" hello times. The parent
immediately attempts to deliver the message after it sends its next
hello packet. If, after "count" hello times, the message cannot be
delivered, then the child is logically detached from the spanning
tree. Detached node information is propagated downstream to the
root node, each node in the path of the DETACH packet must adjust
its routing tables appropriately according to the following rules:
a) if the lost node is a child terminal node, the routing entry for
the terminal is deleted and a DETACH packet is generated, b) if the
node specified in DETACH packet is a terminal and the node which
delivered the packet is the next hop in the path to the terminal,
then the routing table entry for the terminal is deleted and the
DETACH packet is forwarded, c) if the lost node is a child base
station node then all routing entries which specify that base
station as the next hop are deleted and a DETACH packet is
generated for each lost terminal.
[0123] IN GENERAL, WHENEVER A NODE DISCOVERS THAT A TERMINAL IS
DETACHED, IT PURGES ITS ROUTING ENTRY FOR THE TERMINAL. WHENEVER A
NODE DISCOVERS THAT A BASE STATION IS DETACHED, IT PURGES ALL
ROUTING ENTRIES CONTAINING THE BASE STATION. ONLY ENTRIES FOR
UPSTREAM NODES ARE DELETED.
[0124] When DETACH packets reach the root node, they are added to a
"detached list." Nodes remain in the root node's detached list
until a) the node reattaches to the spanning tree, or b) the list
entry times out. The detached list is included in hello messages
and is propagated throughout the spanning tree.
[0125] For example, if a terminal detaches and reattaches to a
different branch in the spanning tree, all downstream nodes in the
new branch (quickly) "learn" the new path to the terminal. Nodes
which were also in the old path change their routing tables and no
longer forward packets along the old path. At least one node, the
root, must be in both the old and new path. A new path is
established as soon as an end-to-end attach request packet from the
terminal reaches a node which was also in the old path.
[0126] 4) A node (quickly) learns that it is detached whenever it
receives a hello message, from any node, with its address in the
associated detached list. The detached node can, optionally, send a
global ATTACH.request, and then enters the UNATTACHED LISTEN state
and reattaches as described above. After reattaching, the node must
remain in a HOLD-DOWN state until its address is aged out of all
detached lists. During the HOLD-DOWN state the node ignores
detached lists.
[0127] 5) A node becomes disconnected and enters the UNATTACHED
LISTEN state whenever HELLO-RETRY-MAX hello messages are missed
from its parent node.
[0128] 6) A node enters the ATTACHED LISTEN state whenever a single
hello message, from its parent, is missed. SLEEPING terminals
remain awake during the ATTACHED LISTEN state. The state ends when
the terminal receives a data or hello message from its parent. The
terminal becomes UNATTACHED when a) its address appears in the
detached list of a hello message from an ode other than its parent,
or b) HELLO-RETRY-MAX hello messages are missed. The total number
of hello slots spend in the LISTEN state is constant.
[0129] If a node in the ATTACHED LISTEN state discovers a path to
the root which is CHANGE-THRESHOLD shorter, it can attach to the
shorter path. Periodically, SLEEPING terminals must enter the
ATTACHED LEARN state to discovery any changes (i.e., shorter paths)
in the network topology.
[0130] Hello Synchronization.
[0131] All attached non-terminal nodes broadcast periodic "hello"
messages in discrete "hello slots" at calculated intervals. Base
station nodes learn which hello slots are busy and refrain from
transmitting during busy hello slots.
[0132] A terminal refrains from transmitting during the hello slot
of its parent node and refrains from transmitting during message
slots reserved in a hello message.
[0133] The hello message contains a "seed" field used in a
well-known randomization algorithm to determine the next hello slot
for the transmitting node and the next seed. The address of the
transmitting node is used as a factor in the algorithm to guarantee
randomization. Nodes can execute the algorithm i times to determine
the time (and seed) if the i-the hello message from the
transmitter.
[0134] After attached, a base station chooses a random initial seed
and a non-busy hello slot and broadcasts a hello message in that
slot. The base station chooses succeeding hello slots by executing
the randomization algorithm. If an execution of the algorithm
chooses a busy slot, the next free slot is used and a hello
"displacement" field indicates the offset from a calculated slot.
Cumulative delays are not allowed (i.e., contention delays during
the i hello transmission do not effect the time of the i+1 hello
transmission).
[0135] HELLO-TIME and HELLO-SLOT-TIME values are set by the root
node and flooded throughout the network in hello messages. The
HELLO-SLOT-TIME value must be large enough to minimize hello
contention.
[0136] A node initially synchronizes on a hello message from its
parent. A SLEEPING node can power-down with an active timer
interrupt to wake it just before the next expected hello message.
The network entity in base station nodes can store messages for
SLEEPING nodes and transmit them immediately following the hello
messages. This implementation enables SLEEPING terminals to receive
unsolicited messages. (Note that the network layer always tries to
deliver messages immediately, before storing them.) Retries for
pending messages are transmitted in a round-robin order when
messages are pending for more than one destination.
[0137] Note that a child node that misses i hello messages, can
calculate the time of the i+1 hello message.
Transport Layer Theory and Implementation Notes.
[0138] The transport layer provides reliable, unreliable, and
transaction-oriented services. Two types of transport connections
are defined: 1) a TCP-like transport connection may be explicitly
requested for long-lived connections or 2) a VMTP-like
connection-record may be implicitly set up for transient
connections. In addition, a connectionless service is provided for
nodes which support an end-to-end transport connection with the
host computer.
[0139] The interfaces to the next upper (i.e., application) layer
include: TABLE-US-00001 CONNECT (access_point, node_name) LISTEN
(access_point) UNITDATA (access_point, node_name, buffer, length)
SEND (handle, buffer, length) RECEIVE (handle, buffer, length)
CLOSE (handle)
[0140] The "handle" designates the connection type, and is the
connection identifier for TCP-like connections.
[0141] SEND messages require a response from the network node (root
or terminal) to which the message is directed.
[0142] UNITDATA messages do not require a response. UNITDATA is
used to send messages to a host which is capable of supporting
end-to-end host-to-terminal transport connections.
[0143] Because the network layer provides an unreliable service,
the transport layer is required to detect duplicate packets and
retransmit lost packets. Detecting duplicates is facilitated by
numbering transport packets with unambiguous sequence numbers.
Transport Connections.
[0144] TCP-like transport connections are used for message
transmission over long-lived connections. The connections may be
terminal-to-root or terminal-to-terminal (i.e., base stations are
not involved in the transport connection).
[0145] TCP-like transport connections are established using a 3-way
handshake. Each end selects its initial sequence number and
acknowledges the other end's initial sequence number during the
handshake. The node which initiates the connection must wait a
MAX-PACKET-LIFE time, before requesting a connection, to guarantee
that initial sequence numbers are unambiguous. Sequence numbers are
incremented modulo MAX-SEQ, where MAX-SEQ is large enough to insure
that duplicate sequence numbers do not exist in the network. Packet
types for establishing and breaking connections are defined as in
TCP.
[0146] A TCP-like connection is full-duplex and a sliding window is
used to allow multiple outstanding transport packets. An ARQ bit in
the transport header is used to require an immediate acknowledgment
from the opposite end.
[0147] VMTP-like connections are used for transient messages (i.e.
terminal-to-terminal mail messages). VMTP-like connection records
are built automatically. A VMTP-like connection record is built (or
updated) whenever a VMTP-like transport message is received. The
advantage is that an explicit connection request is not required.
The disadvantage is that longer and more carefully selected
sequence numbers are required. A VMTP-like connection is
half-duplex. (A full-duplex connection at a higher layer can be
built with two independent half-duplex VMTP-like connections.)
Acknowledgments must be handled by higher layers.
[0148] Transport connections are defined by the network end-to-end
destination and source addresses.
[0149] A MAX_TP_LIFE timeout is associated with transport
connections. Transport connection records are purged after a
MAX_TP_LIFE time expires without activity on the connection. The
transport entity in a terminal can ensure that its transport
connection will not be lost by transmitting an empty time-fill
transport packet whenever TP_TIMEOUT time expires without
activity.
[0150] The transport entity in a node stores messages for possible
retransmission. Note that retransmissions may not always follow the
same path (primarily) due to moving terminals and the resulting
changes in the spanning tree. For example, the network entity in a
parent node may disconnect a child after the DLC entity reports a
message delivery failure. The child will soon discover that it is
detached and will reattach to the spanning tree. Now when the
transport entity (i.e. in the root) re-sends the message, it will
follow the new path.
Transport Message Timing and Sleeping Terminals.
[0151] The transport entity in a terminal calculates a separate
timeout for SEND and TRANSACTION operations. Initially, both
timeouts are a function of the distance of the terminal from the
root node.
[0152] A TCP-like algorithm is used to estimate the expected
propagation delay for each message type. Messages, which require a
response, are retransmitted if twice the expected propagation time
expires before a response is received. SLEEPING terminals can power
down for a large percentage of the expected propagation delay
before waking up to receive the response message. Note that missed
messages may be stored by the network layer for "count" hello
times.
Medium Access Control (MAC) Theory and Implementation Notes.
[0153] Access to the network communications channel is regulated in
several ways: executing the full CSMA algorithm (see MAC layer
above). The sender retransmits unacknowledged messages until a
RETRY_MAX count is exhausted.
[0154] The retry time of the DLC must be relatively short so that
lost nodes can be detected quickly. When the DLC layer reports a
failure to deliver a message to the network layer, the network
layer can 1) save messages for SLEEPING terminals for later
attempts, or 2) DETACH the node from the spanning tree. Note that
most lost nodes are due to moving terminals.
[0155] The node identifier part of the DLC address is initially all
0's for all nodes except the root node. The all 0's address is used
by a node to send and received data-link frames until a unique node
identifier is passed to the DLC entity in the node. (The unique
node identifier is obtained by the network entity.)
Address Resolution.
[0156] Well-known names too are bound to network addresses in
several ways: [0157] The network address and TRANSPORT ACCESS ID of
a name server, contained in the root, is well-known by all nodes.
[0158] A node can register a well-known name with the name server
contained in the root node. [0159] A node can request the network
access address of another application from the name server by using
the well-known name of the application. Possible Extensions.
[0160] Base station-to-base station traffic could also be routed
through the controller if the backward learning algorithm included
base station nodes. (Each base station would simply have to
remember which direction on its branch of the spanning tree to send
data directed toward another base station.)
[0161] The possibility of multiple controllers is kept open by
including a spanning-tree identifier in address fields. Each
controller defines a unique spanning tree. A node can be in more
than one spanning tree, with separate network state variables
defined for each.
[0162] Thus, the preferred embodiment of the present invention
describes an apparatus and a method of efficiently routing data
through a network of intermediate base stations in a radio data
communication system.
[0163] In alternate embodiments of the present invention, the RF
Networks contain multiple gateways. By including a system
identifier in the address field of the nodes, it is possible to
determine which nodes are connected to which networks.
[0164] As is evident from the description that is provided above,
the implementation of the present invention can vary greatly
depending upon the desired goal of the user. However, the scope of
the present invention is intended to cover all variations and
substitutions which are and which may become apparent from the
illustrative embodiment of the present invention that is provided
above, and the scope of the invention should be extended to the
claimed invention and its equivalents.
* * * * *