US20150244623A1 - Mesh profiling - Google Patents

Mesh profiling Download PDF

Info

Publication number
US20150244623A1
US20150244623A1 US14/505,466 US201414505466A US2015244623A1 US 20150244623 A1 US20150244623 A1 US 20150244623A1 US 201414505466 A US201414505466 A US 201414505466A US 2015244623 A1 US2015244623 A1 US 2015244623A1
Authority
US
United States
Prior art keywords
network
communication device
message
communication
probe
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US14/505,466
Inventor
Robin Heydon
Nicholas John Jones
Clive Thomson
Hugo Mark Tyson
Nicolas Guy Albert Graube
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qualcomm Technologies International Ltd
Original Assignee
Cambridge Silicon Radio Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from GB1403312.0A external-priority patent/GB2515853B/en
Priority claimed from GB1403314.6A external-priority patent/GB2512733B/en
Application filed by Cambridge Silicon Radio Ltd filed Critical Cambridge Silicon Radio Ltd
Assigned to CAMBRIDGE SILICON RADIO LIMITED reassignment CAMBRIDGE SILICON RADIO LIMITED ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: HEYDON, ROBIN, ALBERT, NICOLAS GUY, JONES, NICHOLAS JOHN, THOMSON, CLIVE, TYSON, HUGO MARK
Publication of US20150244623A1 publication Critical patent/US20150244623A1/en
Assigned to QUALCOMM TECHNOLOGIES INTERNATIONAL, LTD. reassignment QUALCOMM TECHNOLOGIES INTERNATIONAL, LTD. CHANGE OF NAME (SEE DOCUMENT FOR DETAILS). Assignors: CAMBRIDGE SILICON RADIO LIMITED
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/73Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by creating or determining hardware identification, e.g. serial numbers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/76Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in application-specific integrated circuits [ASIC] or field-programmable devices, e.g. field-programmable gate arrays [FPGA] or programmable logic devices [PLD]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • G06Q10/083Shipping
    • G06Q10/0833Tracking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/14Relay systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04HBROADCAST COMMUNICATION
    • H04H20/00Arrangements for broadcast or for distribution combined with broadcast
    • H04H20/65Arrangements characterised by transmission systems for broadcast
    • H04H20/71Wireless systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0813Configuration setting characterised by the conditions triggering a change of settings
    • H04L41/082Configuration setting characterised by the conditions triggering a change of settings the condition being updates or upgrades of network functionality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/084Configuration by using pre-existing information, e.g. using templates or copying from other elements
    • H04L41/0846Configuration by using pre-existing information, e.g. using templates or copying from other elements based on copy from other elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/085Retrieval of network configuration; Tracking network configuration history
    • H04L41/0853Retrieval of network configuration; Tracking network configuration history by actively collecting configuration information or by backing up configuration information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/12Discovery or management of network topologies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/06Generation of reports
    • H04L43/065Generation of reports related to network devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0805Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
    • H04L43/0817Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking functioning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0852Delays
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0876Network utilisation, e.g. volume of load or congestion level
    • H04L43/0882Utilisation of link capacity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/10Active monitoring, e.g. heartbeat, ping or trace-route
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/02Topology update or discovery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/11Identifying congestion
    • H04L47/115Identifying congestion using a dedicated packet
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/16Flow control; Congestion control in connection oriented networks, e.g. frame relay
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L49/00Packet switching elements
    • H04L49/15Interconnection of switching modules
    • H04L49/1553Interconnection of ATM switching modules, e.g. ATM switching fabrics
    • H04L49/1584Full Mesh, e.g. knockout
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L5/00Arrangements affording multiple use of the transmission path
    • H04L5/003Arrangements for allocating sub-channels of the transmission path
    • H04L5/0053Allocation of signaling, i.e. of overhead other than pilot signals
    • H04L5/0055Physical resource allocation for ACK/NACK
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1475Passive attacks, e.g. eavesdropping or listening without modification of the traffic monitored
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1491Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/18Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/2866Architectures; Arrangements
    • H04L67/30Profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/22Parsing or analysis of headers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0877Generation of secret information including derivation or calculation of cryptographic keys or passwords using additional device, e.g. trusted platform module [TPM], smartcard, USB or hardware security module [HSM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/50Secure pairing of devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
    • H04W16/18Network planning tools
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/06Testing, supervising or monitoring using simulated traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/06Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/38Services specially adapted for particular environments, situations or purposes for collecting sensor information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/24Connectivity information management, e.g. connectivity discovery or connectivity update
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements
    • H04W52/0209Power saving arrangements in terminal devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements
    • H04W52/0209Power saving arrangements in terminal devices
    • H04W52/0225Power saving arrangements in terminal devices using monitoring of external events, e.g. the presence of a signal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements
    • H04W52/0209Power saving arrangements in terminal devices
    • H04W52/0251Power saving arrangements in terminal devices using monitoring of local events, e.g. events related to user activity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/02Power saving arrangements
    • H04W52/0209Power saving arrangements in terminal devices
    • H04W52/0261Power saving arrangements in terminal devices managing power supply demand, e.g. depending on battery level
    • H04W52/0274Power saving arrangements in terminal devices managing power supply demand, e.g. depending on battery level by switching on or off the equipment or parts thereof
    • H04W52/028Power saving arrangements in terminal devices managing power supply demand, e.g. depending on battery level by switching on or off the equipment or parts thereof switching on or off only a part of the equipment circuit blocks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W52/00Power management, e.g. TPC [Transmission Power Control], power saving or power classes
    • H04W52/04TPC
    • H04W52/38TPC being performed in particular situations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W64/00Locating users or terminals or network equipment for network management purposes, e.g. mobility management
    • H04W64/003Locating users or terminals or network equipment for network management purposes, e.g. mobility management locating network equipment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/12Wireless traffic scheduling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/20Control channels or signalling for resource management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/11Allocation or use of connection identifiers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/14Direct-mode setup
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities
    • H04W8/24Transfer of terminal data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities
    • H04W8/24Transfer of terminal data
    • H04W8/245Transfer of terminal data from a network towards a terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • H04W88/04Terminal devices adapted for relaying to or from another terminal or user
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • H04W88/06Terminal devices adapted for operation in multiple networks or having at least two operational modes, e.g. multi-mode terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W92/00Interfaces specially adapted for wireless communication networks
    • H04W92/02Inter-networking arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/77Graphical identity
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02ATECHNOLOGIES FOR ADAPTATION TO CLIMATE CHANGE
    • Y02A10/00TECHNOLOGIES FOR ADAPTATION TO CLIMATE CHANGE at coastal zones; at river basins
    • Y02A10/40Controlling or monitoring, e.g. of flood or hurricane; Forecasting, e.g. risk assessment or mapping
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Definitions

  • This invention relates to a communication device and method for profiling the performance of a communication network.
  • the objects in a room be capable of communicating with each other, and also potentially being able to communicate with the internet or cloud.
  • the room may have a light, light switch, window and door. It may be desired that each of these objects be able to communicate with the others so that the home can be automated. Thus certain actions may be undertaken by one or more of these objects in response to other objects communicating that they are in a particular state.
  • a basic example is adjusting the heating within a room when the light is switched on, to keep the room at a comfortable temperature. Similar situations are envisaged in a commercial environment.
  • objects to communicate may be equipped with a device that can communicate with similar devices attached to other objects. They may also communicate with similar devices that are not associated with or attached to other objects but that can communicate with those devices that are associated with or attached to other objects. For this type of communication to be useful, a large number of these devices may be able to communicate with each other. The result can be a network of devices and so this network can potentially have a large number of objects.
  • One suitable method of communication for such a network is to use a mesh networking protocol. This permits a first device to send a message to a second device, which may be outside the communication range of the first device, by transmitting the message via one or more intermediate devices.
  • the objects that are attached to, or associated with, those devices may therefore be able to send and receive messages from one object to another via intermediate objects and/or the other devices that are not associated with an object.
  • the routing tables store routes from one network device to another so that messages can be propagated from source to destination via a series of hops.
  • the topology of the network generally has to be known in order that routes between the various devices can be determined and stored.
  • An alternative is flood routing. In this method messages do not travel from one device to another via a predefined route. Instead messages are broadcast and any device in range that receives a message retransmits it. A message thus propagates its way through the network, potentially reaching its destination via number of different routes.
  • Flood routing is very simple to implement and although it may appear inefficient has a number of advantages, particularly for ad hoc networks that may change their topology on a random basis.
  • the performance of a mesh network that uses flood routing can be dependent on the connections between the devices in the network and the topology of those connections between the network devices.
  • the performance of the mesh network may be dependent on the connectivity between devices, the density of the devices within the network, the topology arrangement of the devices and/or the transmit and receive schedule of each of the devices.
  • the devices may be located in the network in a way which may not be optimal for the performance of the mesh network. For instance, devices positioned in a home may be positioned according to the function of the object that the device is associated with. For instance, a door may be located in an opening to a room and a light may be located on the ceiling in the middle of a room.
  • a position that is based on the function of the object may be sub-optimal from the perspective of the operation of a mesh network. For example, that device may only be able to communicate with a small number of other devices that are at the edge of the transmit and/or receive ranges of those devices.
  • One optimal position for the device, from the perspective of the operation of the mesh network may be a position that enables the device to communicate with many other devices with good transmit/receive signal strength. Such a position may enable messages sent via flood routing to arrive at that device via multiple routes. This may increase the reliability, and also the performance, of the mesh network. It may therefore be desirable to view and optimize the mesh network as a whole to enable reliable communication between each of the mesh network nodes.
  • the devices that communicate on the objects' behalf may be battery-powered devices that consume only a small amount of power. It may also be desirable that these devices be able to communicate wirelessly with each other so that there is no need for cables running between them. This can increase the need to optimise the mesh network.
  • an analysis device for analysing a communication network comprising a plurality of communication devices, the communication network being configured such that transport of packets through the network is provided by the communication devices in the network listening for and relaying packets, the analysis device being configured to: receive a traffic statistics log from a profile device, the traffic statistics log comprising a traffic statistics message from each of the plurality of communication devices, each traffic statistics message comprising data defining at least one reception property of the reception of at least one probe message at the respective communication device; and identify, based on the at least one reception property, at least one restriction point communication device from the plurality of communication devices that is a restriction point in the network.
  • the analysis device may be configured to: calculate a network reception property for each different reception property received from the plurality of communication devices; and identify at least one restriction point communication device that is a restriction point by selecting the at least one communication device from the plurality of communication devices that have at least one reception property that deviates from the at least one network reception property by a predetermined threshold value.
  • the analysis device may be configured to: calculate each network reception property by taking the average of the respective reception property received from each communication device; and identify at least one restriction point communication device that is a restriction point by selecting the communication devices that deviate from that average by a predetermined threshold value.
  • the analysis device may be configured to: send a configuration message to each of the at least one restriction point communication device, the configuration message comprising data instructing the restriction point communication device to increase that communication device's duty cycle.
  • the restriction point communication device may listen for messages only a proportion of the time and the instruction to increase that device's duty cycle comprises an instruction to listen for a larger proportion of the time.
  • the analysis device may be configured to: generate a recommendation message comprising data containing a recommendation to install another communication device near each restriction point communication device; and send the recommendation message to a presentation device for display to a user of the mesh network.
  • the at least one reception property may comprise at least one of: the number of unique messages received at the respective communication device, the number of repeated messages received at the respective communication device, the number of unknown network messages received at the respective communication device, and the average received signal strength of the messages received at the respective communication device.
  • the traffic statistics log may comprise a reliability property for the communication network which is based on the number of probe messages that the profile device receives a response to; and the analysis device may be configured to identify at least one restriction point communication device based on the reliability property.
  • the traffic statistics log may comprise a delay property for the communication network which is based on the difference between receive times at which the probe messages are received by the respective communication devices and send times at which the probe messages are sent by the profile device; and the analysis device may be configured to identify at least one restriction point based on the delay property.
  • the traffic statistics log may comprise values of the lifetime field of the probe messages as received by an addressed communication device; and the analysis device may be configured to identify at least one restriction point based on the averaged value of the lifetime fields.
  • a communication device capable of communicating over a communication network comprising a plurality of communication devices, the communication network being configured such that transport of packets through the network is provided by the communication devices in the network listening for and relaying packets, the communication device being configured to: send a plurality of probe messages for transmission through the communication network; send a traffic statistic request message to each of the plurality of communication devices; and receive a traffic statistics message from each of the plurality of communication devices, each traffic statistics message comprising data defining at least one reception property of the reception of at least one of the probe messages at the respective communication device.
  • the communication device may be configured to: form a traffic statistics log message the traffic statistics log comprising the traffic statistics messages from each of the plurality of communication devices; and send the traffic statistics log message to an analysis device.
  • the communication device may be configured to: form the plurality of probe messages so that each probe message comprises data containing a unique identifier that identifies that particular probe message separate from the others of the plurality of probe messages.
  • the communication device may be configured to: form the plurality of probe messages so that the unique identifier is an incremental count which increases sequentially in turn for each sent probe message.
  • the communication device may be configured to: form the plurality of probe messages so that each probe message comprises data containing an address field specifying the address of at least one communication device that the probe message is addressed to, and the address field contains an address of at least one of the plurality of communication devices; receive a probe message response for at least one of the plurality of probe messages from the at least one addressed communication device, each probe message response comprising data containing the unique identifier of the probe message that the probe message response is a response to; and calculate a reliability property for the communication network based on the number of distinct unique identifiers that are present in the probe message responses.
  • the communication device may be configured to: form the plurality of probe messages so that each probe message comprises data containing a sent time at which that particular probe message is sent by the communication device.
  • the communication device may be configured to: form the plurality of probe messages so that each probe message comprises data containing an address field specifying the address of at least one communication device that the probe message is addressed to, and the address field contains an address of at least one of the plurality of communication devices; receive a probe message response for at least one of the plurality of probe messages from the at least one addressed communication device, each probe message response comprising data containing a receive time at which that particular probe message is received by the communication device; and calculate a delay property for the communication network based on the difference between the receive time and the sent time of the probe messages.
  • the communication device may be configured to: form the plurality of probe messages so that each probe message comprises data containing a lifetime field specifying the retransmission lifetime of the message; and each probe message response comprises data containing the value of the lifetime field of that particular probe message as received by the addressed communication device.
  • the communication device may be configured to: form the plurality of probe messages so that each probe message comprises data containing an address field specifying the address of the communication device that the probe message is addressed to, and the address field may contain a communication device address that is not present in the communication network.
  • the communication device may be configured to: prior to sending the plurality of probe messages, send a traffic counter reset message to each of the plurality of communication devices, wherein the traffic counter reset message may instruct each of the plurality of communication devices to reset respective traffic counters.
  • the communication device may be configured to: send one traffic counter reset message that instructs all of the plurality of communication devices to reset respective traffic counters.
  • the plurality of probe messages may be ping request messages.
  • a method for identifying restriction point devices within a communication network comprising a plurality of communication devices, the communication network being configured such that transport of packets through the network is provided by the communication devices in the network listening for and relaying packets, the method comprising: sending a plurality of probe messages for transmission through the communication network; sending a traffic statistic request message to each of the plurality of communication devices; receiving a traffic statistics message from each of the plurality of communication devices, each traffic statistics message comprising data defining at least one reception property of the reception of at least one of the probe messages at the respective communication device; and identifying, based on the at least one reception property, at least one restriction point communication device from the plurality of communication devices that is a restriction point in the network.
  • the method may comprise: calculating a network reception property for each different reception property received from the plurality of communication devices; and identifying at least one restriction point communication device that is a restriction point by selecting the at least one communication device from the plurality of communication devices that have at least one reception property that deviates from the at least one network reception property by a predetermined threshold value.
  • the method may comprise: calculating each network reception property by taking the average of the respective reception property received from each communication device; and identifying at least one restriction point communication device that is a restriction point by selecting the communication devices that deviate from that average by a predetermined threshold value.
  • the method may comprise: sending a configuration message to each of the at least one restriction point communication device, the configuration message may comprise data instructing the restriction point communication device to increase that communication device's duty cycle.
  • the restriction point communication device may listen for messages only a proportion of the time and the instruction to increase that device's duty cycle may comprise an instruction to listen for a larger proportion of the time.
  • the method may comprise: generating a recommendation message comprising data containing a recommendation to install another communication device near each restriction point communication device; and sending the recommendation message to a presentation device for display to a user of the mesh network.
  • the at least one reception property may comprise at least one of: the number of unique messages received at the respective communication device, the number of repeated messages received at the respective communication device, the number of unknown network messages received at the respective communication device, and the average received signal strength of the messages received at the respective communication device.
  • the method may comprise: forming the plurality of probe messages so that each probe message comprises data containing a unique identifier that identifies that particular probe message separate from the others of the plurality of probe messages.
  • the method may comprise: forming the plurality of probe messages so that the unique identifier is an incremental count which increases sequentially in turn for each sent probe message.
  • the method may comprise: forming the plurality of probe messages so that each probe message comprises data containing an address field specifying the address of at least one communication device that the probe message is addressed to, and the address field contains an address of at least one of the plurality of communication devices; receiving a probe message response for at least one of the plurality of probe messages from the at least one addressed communication device, each probe message response comprising data containing the unique identifier of the probe message that the probe message response is a response to; and calculating a reliability property for the communication network based on the number of distinct unique identifiers that are present in the probe message responses;
  • the method comprise: identifying at least one restriction point communication device based on the reliability property.
  • the method may comprise: forming the plurality of probe messages so that each probe message comprises data containing a sent time at which that particular probe message is sent by the communication device.
  • the method may comprise: forming the plurality of probe messages so that each probe message comprises data containing an address field specifying the address of at least one communication device that the probe message is addressed to, and the address field may contain an address of at least one of the plurality of communication devices; receiving a probe message response for at least one of the plurality of probe messages from the at least one addressed communication device, each probe message response comprising data containing a receive time at which that particular probe message is received by the communication device; calculating a delay property for the communication network based on the difference between the receive time and the sent time of the probe messages.
  • the method may comprise: identifying at least one restriction point communication device based on the delay property.
  • the method may comprise: forming the plurality of probe messages so that each probe message comprises data containing a lifetime field specifying the retransmission lifetime of the message; and each probe message response comprises data containing the value of the lifetime field of that particular probe message as received by the addressed communication device; and identifying at least one restriction point based on the averaged value of the lifetime field as received by the addressed communication device.
  • the method may comprise: forming the plurality of probe messages so that each probe message comprises data containing an address field specifying the address of the communication device that the probe message is addressed to, and the address field may contain a communication device address that is not present in the communication network.
  • the method may comprise: prior to sending the plurality of probe messages, sending a traffic counter reset message to each of the plurality of communication devices, wherein the traffic counter reset message instructs each of the plurality of communication devices to reset respective traffic counters.
  • the method may comprise: sending one traffic counter reset message that instructs all of the plurality of communication devices to reset respective traffic counters.
  • the plurality of probe messages may be ping request messages.
  • FIG. 1A shows a schematic diagram of a wireless communication device
  • FIG. 1B shows a schematic diagram of another communication device
  • FIG. 2 shows a schematic diagram of a network containing a plurality of communication devices
  • FIGS. 3A and 3B illustrate the transport of a packet through the network
  • FIG. 4 shows a schematic mesh network performance test message sequence chart
  • FIG. 5 shows another schematic mesh network performance test message sequence chart.
  • the present invention relates to an analysis device that is capable of analysing a communication network and determining where within the network optimizations may be required to improve the performance of the communication network.
  • the analysis device may be known as a collector device and/or a concentrator device.
  • the present invention also relates to a profile device that is capable of profiling a communication network for its performance characteristics.
  • the communication devices within the communication network may be a communication device that can transmit and receive according to a mesh network protocol. Accordingly the communication devices may be part of the mesh network. Within the mesh network, packets may be transferred between devices that are part of the mesh network by the communication devices that form the communication network listening for and relaying packets that the communication devices have received.
  • the communication device may be a wireless communication device.
  • the profiling device may profile the communication network by sending out a plurality of probe messages in to the network.
  • the other communication devices within the network can log the reception of those messages and properties associated with that reception. This log can then be sent back to the communication device, at the request of the communication device.
  • This log of information may be sent to the analysis device for analysis to determine where in the network the performance of the network may be improved by altering the network properties of an individual communication device, and/or by installing another communication device in the vicinity of another individual communication device.
  • the profiling device may also use at least one of the other communication devices to help profile the network by instructing that other communication device to respond to the probe messages thus increasing the number of probe messages and also potentially increasing the number of routes taken by the probe messages through the network.
  • FIG. 1A shows a schematic diagram of an example communication device in accordance with the present invention.
  • the communication device 10 has an antenna 20 connected to a transceiver 30 .
  • the communication device 10 can use the transceiver to communicate with at least one other communication device according to a communications protocol.
  • the communication device 10 can use the transceiver to transport packets over a communication network where the network is provided by a plurality of communication devices in the network listening for and relaying packets.
  • the communication device 10 can use the transceiver to communicate in a mesh network.
  • the communication device 10 also comprises a processor 40 that is capable of executing a set of program instructions that are stored in a memory 50 .
  • the memory 50 can be a non-volatile memory that stores in non-transitory form program code that is executable by the processor 40 to cause the communication device to communicate according to the communications protocol.
  • the processor 40 can be a microprocessor.
  • the memory 50 may be part of processor 40 or connected to processor 40 via a bus. Whilst the processor 40 and transceiver 30 are shown in FIG. 1A as separate elements, it will be appreciated that at least processor 40 and transceiver 30 could be incorporated in to one element. For example, being incorporated on a single chip.
  • the communication device 10 may also comprise a power source 60 .
  • This power source may be a battery.
  • the communication device 10 may not comprise a power source and be connected to an external power source such as an electrical outlet.
  • the communication device 10 may also comprise an interface 70 for sending and receiving data that is to be sent using the communications protocol.
  • This interface 70 may be a wired or wireless link to sensors for sensing external events, such as the operation of a light switch in the home environment described above, or a link to appliances for issuing control signals to those appliances, such as the light in the home environment described above.
  • FIG. 1B shows a schematic diagram of another example communication device in accordance with the present invention.
  • the communication device 90 has a wired network interface 80 .
  • the communication device 90 can use the wired network interface 80 to communicate with at least one other communication device according to a communications protocol.
  • the communication device 90 can use the wired network interface 80 to transport packets over a communication network where the network is provided by a plurality of communication devices in the network listening for and relaying packets.
  • the communication device 90 can use the wired network interface 80 to communicate in a mesh network.
  • the other illustrated elements of the communication device 90 are as described in relation to FIG. 1A .
  • FIGS. 1A and 1B are intended to correspond to a number of functional blocks in an apparatus. This is for illustrative purposes only. FIGS. 1A and 1B are not intended to define a strict division between different parts of hardware on a chip or between different programs, procedures or functions in software. In some embodiments, some or all of the algorithms described herein may be performed wholly or partly in hardware. In many implementations, at least part of interface 70 , transceiver 30 and wired network interface 80 may be implemented by a processor actioned under software control (e.g. the CPU of a communication device). Any such software may be stored on a non-transient computer readable medium, such as a memory (ROM, cache, hard disk etc) or other storage means (USB stick, CD, disk etc).
  • the communication devices described above can form part of a communication network that is configured such that transport of packets through the network is provided by a plurality of communication devices such as those described in FIGS. 1A and/or 1 B.
  • FIG. 2 represents a house having a distributed lighting system.
  • the system comprises a light switch unit 201 and light fittings 202 , 203 , 204 , 205 .
  • Light switch unit 201 is integrated with a wireless communication device 212 .
  • Light fittings 202 to 205 are integrated with respective wireless communication devices 206 , 207 , 208 , 209 .
  • the house has a mains electrical supply which powers the light fittings and their respective wireless communication devices 206 to 209 .
  • Light switch unit 201 and its wireless communication device 212 are powered by a local battery 211 .
  • the house contains other items of equipment that contain other wireless communication devices.
  • a tablet computer 210 which contains a wireless communication device 213
  • a mobile phone 215 which contains a wireless communication device 216 .
  • a sensor 220 for detecting the open/closed state of window 218 , which contains communication device 219 .
  • Computer 210 , phone 215 and sensor 220 are powered by batteries 214 , 217 and 221 respectively.
  • the house may also contain an analysis device 222 for performing analysis on gathered network information.
  • the analysis device 222 may be a communication device as described herein. Alternatively the analysis device 222 may be remote from the house and connected to the house via a network, such as the internet.
  • the analysis device 222 may be part of a cloud network.
  • the analysis device 222 may be part of one of the other communication devices referred to herein.
  • Wireless communication devices 206 to 209 , 213 , 216 and 219 operate according to the same wireless communication protocol. That could be a relatively short-range protocol. For example the effective range of each device could be less than 25 m. That characteristic can permit the devices to use less power for transmitting and/or receiving than would be expected in a longer range protocol.
  • the protocol could be one that imposes no common time-base at or below the transport level, or below the application or presentation levels. In other words, the devices in the network operate asynchronously of each other. That characteristic can reduce the devices' power consumption by reducing their need for accurate clocks running continuously.
  • the devices could operate according to the Bluetooth protocol, specifically the Bluetooth Low Energy protocol.
  • the devices could use other protocols, for instance IEEE 802.11.
  • Devices 206 to 209 are configured cooperatively in order that the light fittings 202 to 205 know to respond to signals from the light switch 201 . This may be done by the devices 206 to 209 storing a common network key in their respective memories.
  • the network key may be negotiated by the devices 206 to 209 in the network.
  • the network key may be stored in the device 206 to 209 by means of another device such as mobile phone 215 communicating with the wireless device of the light switch and/or light fittings to communicate with the wireless devices of the light fittings to cause them to store the network key.
  • the network key may be used to sign all packets sent over the network.
  • the communication devices in FIG. 2 are all connected to or fully integrated with another device—a “consumer”—on behalf of which the communication device transmits and receives packets over the network.
  • a consumer on behalf of which the communication device transmits and receives packets over the network.
  • Consumer devices have varying levels of complexity.
  • a consumer device might be a tablet computer; in another it might just be a clock configured to count down to an expiry date of some perishable goods.
  • the communication device it also possible for the communication device to be a consumer itself.
  • An example of such a scenario might be when a communication device uses X10, which is a protocol designed to support the integration of electronic devices within the home.
  • a connection between the communication device and its associated consumer may be wired or wireless and may be performed by the interface 70 of communication devices 10 , 90 .
  • the communication device may be contained within the same housing as the consumer. In many implementations the consumer device might be fully integrated with the consumer; they might even share circuitry. Often the communication device may be implemented by a chip within the consumer. An example of this is communication device 216 within phone 215 . In other implementations the communication device and the consumer may be separate devices that are connected together. For example, the communication device might be a BLE tag connected to a PC.
  • the communication device is considered to be the combination of hardware and/or software that implements the protocol governing the network, thereby implementing the packet transport that enables the consumer to communicate over the network.
  • Each communication device may be capable of acting as a relay in the network.
  • FIG. 3 shows the same distributed lighting system as FIG. 2 .
  • the network is configured as a mesh network so, at least in theory, all devices that are part of the network have a responsibility to act as relays.
  • a relay device suitably retransmits any packet that it recognises as having originated from the network.
  • a relay device may retransmit packets that have been injected in to the network at that relay device.
  • the relay device might also take steps to prevent old packets from being continuously bounced around the network, e.g. by decrementing a “time-to-live” value, or more generally, a lifetime value, in the packet before forwarding it on.
  • the packet is not retransmitted.
  • the relay device might also take steps to prevent packets it has already retransmitted before being propagated around the network multiple times; the relay device may do this by only forwarding the packet if it is new.
  • each packet suitably includes a lifetime field that defines the lifetime of the packet within the network.
  • a communication device that receives the packet suitably checks whether the lifetime field is equal to a threshold value before retransmitting the packet. If the lifetime value is equal to the threshold, the communication device does not retransmit the packet. Otherwise the communication device does retransmit the packet.
  • the lifetime field is a Time-To-Live (TTL) field. This is a value in the packet that is suitably decremented each time that the packet is retransmitted.
  • TTL Time-To-Live
  • the TTL value is decremented by one at each retransmission, with each communication device that receives the packets retransmitting it until the TTL value is decremented to zero.
  • the lifetime field is a Max Hop Count (MHC) field.
  • MHC Max Hop Count
  • each communication device stores a threshold MHC value, which is a positive, non-zero number. The MHC value in each packet may be incremented by one each time that the packet is retransmitted, with each communication device that receives the packets retransmitting it until the MHC value reaches the device's stored MHC threshold.
  • FIG. 3A shows an example of the network operating according to mesh principles.
  • Light switch 201 transmits a packet addressed to all of devices 206 to 209 instructing light fittings 202 to 205 to switch on. This packet is propagated by all devices that receive it, eventually reaching light fitting 205 , which is out of range of light switch 201 , the source of the packet. The packet is propagated via light fitting communication devices 206 to 209 , then via communication device 216 and window sensor communication device 219 finally arriving at light fitting communication device 209 .
  • the network may also be configured to implement flood routing as a way of propagating messages within the mesh network, which is well suited to ad hoc networks.
  • the phone 215 and the tablet computer 210 are both portable devices that change location within the network as a user picks them up and moves them. They may also occasionally leave the network and then reappear some time later. For example, when a user takes them out of range of the network by taking them out of the house and later returns them to the house.
  • the network's topology is thus subject to random alteration.
  • the window communication device 219 may in effect act as an articulation point or one vertex of a bridge between the upstairs mesh network and the downstairs mesh network.
  • a bridge is referring to a bridge between two parts of the mesh network. As opposed to denoting elements that link two or more communication technologies together.
  • the performance and reliability of the mesh network as a whole may then become dependent on these bridge communication devices, such as window communication device 219 . This is because if the bridge communication device does not forward or retransmit packets originating from the network then the communication route between the two or more networks that the bridge communication device bridges may be lost. This may only be a temporary loss of communication, but in such a situation there may at a minimum be packet loss or a loss of connection entirely.
  • Such a situation may arise, where a device does not retransmit packets, if constant listening is not able to be performed by all of the devices in the mesh network. It may also arise when a device does not receive the signal from another device with sufficient power to be able to decode the information contained in that signal.
  • switch communication device 212 and window communication device 219 are capable as acting as relays, they are both battery powered and should reduce power consumption where possible. Therefore, one or both of those devices may deliberately reduce their receive period/duration with the aim of conserving battery power. This manages the amount of energy used for receiving information.
  • window communication device 219 may decide to reduce its receive period/duration as it is battery powered. It may also decide to reduce its receive period/duration because it has detected that devices 206 , 207 and 209 are all within range and are all capable of acting as relays. Where there are multiple relays within range, each relay may decide to reduce its receive period/duration under the assumption that at least one of the relays within range may receive any retransmitted packet at a given time. The other relay devices may then receive the retransmitted packet at a later time when that first relay retransmits the packet. In the situation shown in FIG. 3B , window communication device 219 has therefore decided to shorten its listen periods so that it only listens for 10% of the time. The proportion of time that a device listens for may be known as the duty cycle of the device.
  • FIG. 3B a period when the window communication device 219 is not listening is shown. As it is not listening at that moment, the window communication device 219 does not receive the packets that are retransmitted by the device 206 and 207 that are connected to downstairs lights 202 and 203 . As window communication device 219 does not receive the packets that are retransmitted by devices 206 and 207 , communication device 219 does not retransmit the packet. This means that device 209 which is attached to upstairs light 205 , and outside of the communication range of downstairs light devices 206 and 207 , does not receive the packet that has been retransmitted by devices 206 and 207 .
  • device 219 may provide a single point of failure within the mesh network because it can function as a bridging device linking the upstairs portion of the mesh network to the downstairs portion of the mesh network. It would therefore be desirable to either increase the duty cycle of bridge devices such as device 219 so that they listen for a larger proportion of the time, or add additional devices near device 219 which can act as alternative bridges so that there is no longer a single point of failure in that part of the network. To be able to know where to target additional devices within the mesh network, or to know which devices ought to be limited to using a higher duty cycle, the mesh network may be profiled to establish the health and/or performance of the mesh network and/or locate bridging devices such as device 219 .
  • the mesh network may be profiled to establish the performance of the mesh network. Some examples are described below. These examples either make use of a single mesh device as the profiling device which sends test packets in to the network or use several mesh devices that work collaboratively to send test packets in to the network. In the case of at least two mesh devices working together, a first communication device sends packets in to the network which are addressed for the at least one other communication device in the network. The other communication device can then respond with messages addressed to the first communication device. Statistics about the mesh network can also be gathered from the rest of the communication devices present in the mesh network. The profiling device itself can then analyse the collected data concerning the communications through the network, in which case it also performs the role of the analysis device 222 . Alternatively, the profiling device can send a log message to the analysis device 222 which contains the collected data concerning the communications through the network. The analysis device 222 can then analyse the data contained in this log message.
  • FIG. 4 shows a schematic message sequence chart for a first test that can be used to profile the mesh network. It will be understood that whilst the messages are shown in a sequence that there may be concurrency between at least some of these messages. For example, one message may be sent to multiple devices in substitute for separate messages to each device; and the responses from devices may arrive in an alternative order.
  • a communication device 400 that is acting as the profiling device may initially send a DIAGNOSTIC_RESET message 401 in to the communication network.
  • the diagnostic reset message 401 may not be addressed to any particular communication device within the network. This is because it may need to be acted upon by all communication devices, network nodes 410 , in the network.
  • This diagnostic rest message 401 causes the communication devices operating in the communication network to reset one or more counters within each communication device. These counters may be stored in a memory such as memory 50 shown in FIGS. 1A and 1B .
  • the traffic counters may store statistics concerning the transport of packets through the communication network as seen by that particular communication device.
  • the traffic counters may store statistics concerning:
  • diagnostic reset message referred to in this document may alternatively be described as a traffic counter reset message.
  • the results that are generated can be known to relate to the period during which tests were run.
  • the diagnostic reset message 401 may be a short message that does no more than identify itself as a traffic counter reset message.
  • the message may contain data that comprises an opcode that is set to identify the message as a diagnostic message, and also as a reset sub-message within the diagnostic message type.
  • the message may contain data that identifies the message as an instruction to reset the traffic counters within the network node 410 .
  • the profile device 400 can then send out a predefined number (k) of PING_REQUEST messages 402 , 403 in to the network.
  • Each ping message 402 , 403 can comprise a payload that may contain a unique identifier that identifies that particular ping message separate from the other of the predefined number of ping messages.
  • the ping message unique identifier may be an incremental count that is incremented for each ping message that is sent.
  • Each ping message 402 , 403 therefore contains a different number in the incremental count field within the data defining the payload of the ping message.
  • Each ping message can comprise a payload that may also contain a packet sent time. This sent time is a record of the time that the packet was sent by the profile device 400 .
  • ping request messages will be retransmitted by the network nodes until the lifetime value of that ping request message has reached the threshold value or the communication devices recognise the message as an “old” message that they have already seen, as described above.
  • the ping request messages can therefore propagate through the communication network by at least most of the communication devices, the network nodes, listening for and retransmitting the packets.
  • ping request messages may be alternatively be described as a probe message.
  • the predefined number may be 1000, 5000, 10000 or 20000.
  • the predefined number may be determined in dependence on the number of network nodes present in the communication network. For instance, a higher predefined number may be chosen by the profiling device when more network nodes are present in the communication network.
  • the payload of the ping messages may be used by the network nodes 410 to calculate the packet loss over the test and the number of repeated messages that are received by the network nodes 410 .
  • the packet loss can be calculated by logging the ping message unique identifier for each of the ping messages that are received. Once all of the predefined number of ping messages have been sent, each network node 410 can search for unique identifiers that are missing from the unique identifier log. The number that are missing can be used to give the packet loss over the test.
  • the number of repeated messages can be calculated by the network nodes 410 by summing the number of times a particular unique identifier has been received by that network node 410 during the test.
  • the ping request message 402 , 403 may contain data that comprises an opcode that is set to identify the message as a ping message, and also as a ping request sub-message within the ping message type.
  • the ping message 402 , 403 may contain data that identifies the message as a request for a ping response that may be addressed to a particular communication device.
  • the PING_REQ 402 , 403 message may need to be addressed to a particular device to be compliant with the protocol that the communication network is compliant with.
  • the protocol may define that, instead and/or as well as being capable of being address to a particular device, the ping message may be capable of being addressed to a group of particular devices.
  • the group of particular devices may have a group identifier, group address, or group ID, associated with them and this group ID may be used in place of the device ID, or device address associated with a particular device.
  • the profile device 400 may set the recipient address for each of the ping request messages 402 - 403 (also written as 402 , 403 ) to that of a device, or group, that is not present in the communications network. In this case, there may be no device that has that particular address and so none of the network nodes 410 within the communication network m respond with a response to the ping request 402 , 403 message.
  • the profile device 400 can request that each of the network nodes 410 sends that network node's traffic statistics to the profile device 400 . This can be achieved by the profile device 400 sending a DIAGNOSTIC_READ messages 404 , 406 addressed to that particular node.
  • the profile device 400 can send a separate diagnostic read message 404 , 406 to each of the network nodes 410 in the communication network.
  • the profile device 400 may send a diagnostic read message 404 , 406 to a group of the network nodes 410 in the communication network that are part of that particular group and identified by a group address or group ID.
  • the diagnostic read message 404 , 406 requests that the network node sends the requesting device at least one of the traffic statistics that have been compiled by the network node 410 .
  • the diagnostic read message 404 , 406 may contain data that comprises an opcode that is set to identify the message as a diagnostic message, and also as a traffic statistics request sub-message within the diagnostic message type.
  • the diagnostic read message 404 , 406 may contain data that identifies the message as a request for traffic statistics that may be addressed to a particular device.
  • diagnostic read message referred to in this document may alternatively described as a traffic statistic request message.
  • Each network node that receives a traffic statistic request message 404 , 406 may send a message back to the requesting device, in this case the profile device 400 , which contains the requested traffic statistics.
  • the network node 410 forms and sends a DIAGNOSTIC_TRAFFIC_STATS message 405 , 407 to the profile device 400 .
  • This diagnostic traffic statistics message 405 is addressed to the device that sent the diagnostic read message 404 , 406 .
  • the payload of the traffic statistics message 404 , 406 may include data that contains:
  • the diagnostic traffic statistics message 405 , 407 may contain data that comprises an opcode that is set to identify the message as a diagnostic message, and also as a traffic statistics sub-message within the diagnostic message type.
  • the diagnostic traffic statistics message 405 , 407 may contain data that identifies the message as a containing traffic statistics that have been measured by the sending device.
  • the profile device 400 may use these traffic statistics to calculate the congestion that is seen by each network node 410 in the communication network.
  • the congestion at a particular node in the network may be determined by:
  • the traffic statistics messages can be formed in to a traffic statistics log message.
  • This log message may be sent to an analysis device 222 for further analysis to identify particular communication devices having particular properties using methods described below.
  • FIG. 5 shows a schematic message sequence chart for second and third tests that can be used to profile the mesh network.
  • the messages are shown in a sequence that there may be concurrency between at least some of these messages. For example, one message may be sent to multiple devices in substitute for separate messages to each device; and the responses from devices may arrive in an alternative order.
  • a communication device 500 that is acting as the profiling device may initially send a DIAGNOSTIC_RESET message 501 in to the communication network.
  • This diagnostic reset message 501 is as described in relation to FIG. 4 above and diagnostic reset message 401 .
  • the results that are generated can be known to relate to the period during which tests were run.
  • the profile device 500 can then send out a predefined number (k) of ping request messages 502 , 506 in to the network.
  • the profile device 500 may send each ping request message in turn waiting for a response from the device that a ping response has been requested from before sending the next ping request message.
  • the profile device 500 may alternatively send the next ping request message after a predefined timeout period if no response has been received within that timeout period.
  • the PING_REQ 502 , 506 message may need to be addressed to a particular device to be compliant with the protocol that the communication network is compliant with. In the case shown in FIG. 5 , the device that is required to respond to each ping request message 502 , 506 is the response device 520 .
  • the ping messages may therefore comprise data defining the device address that the message is addressed to.
  • the protocol may define that, instead and/or as well as being capable of being address to a particular device, the ping message may be capable of being addressed to a group of particular devices.
  • the group of particular devices may have a group identifier, group address, or group ID, associated with them and this group ID may be used in place of the device ID, or device address associated with a particular device.
  • the ping request messages 502 , 503 , 506 , 507 are as described above in relation to FIG. 4 .
  • the response devices 520 may be one or more of the network nodes, and so communication devices, of the communication network.
  • the profile device 500 sends each of the ping request messages in to the network by transmitting the ping request message.
  • the ping request message may be received by one or more network nodes and those network nodes can retransmit the ping request message 503 , 507 as long as the lifetime value for the packet has not reached the threshold value as described above.
  • the ping request messages may therefore propagate through the communication network by each communication device, the network nodes, listening for and retransmitting the packets.
  • the retransmitted ping request messages may eventually reach the response device 520 which is the device that the ping request message was addressed to.
  • the response device may record the lifetime value of the ping request message as received at the response device.
  • the lifetime value may be, as discussed above, a “time-to-live” value or a max hop count value.
  • the response device may also record the RSSI of the ping request message as received at the response device 520 . More generally, the response device may record the signal strength of the ping request message 502 , 507 .
  • the response device 520 can, in response to the ping request message, form a PING_RESPONSE message 504 , 508 and transmit this message for transmission through the communication network to the profile device 500 .
  • This ping response message 504 , 508 is addressed to the device that originally sent the ping request message 503 , 507 .
  • the ping response message 504 , 508 may be addressed to the profile device 500 .
  • the payload of the ping response message 504 , 508 may include data that contains one or more of:
  • the ping response messages 504 , 508 are shown in FIG. 5 propagating from the response device 520 via the network nodes 510 , the ping response messages 505 , 509 being retransmitted by the network nodes 510 and being received by the profile device 500 .
  • ping response messages referred to in this document may alternatively be described as probe response messages and that references to a response device may be taken to include a group of response devices when the probe messages are addressed to more than one device.
  • the ping response message 504 , 505 , 508 , 509 may contain data that comprises an opcode that is set to identify the message as a ping message, and also as a ping response sub-message within the ping message type.
  • the ping message 504 , 505 , 508 , 509 may contain data that identifies the message as a response to a ping request message that may be addressed to a particular communication device.
  • the profile device 500 can form the next ping request 506 and transmit it for transmission over the communication network to response device 520 .
  • the profile device 500 can form the next ping request 506 and transmit it for transmission over the communication network to response device 520 , on the basis that the previous ping request and/or response was lost in the network.
  • the profile device 500 may log the number of ping responses that it receives from the response device 520 .
  • the profile device 500 may log the number in a counter. That counter may be stored in a memory of the device.
  • the profile device may alternatively log the number of dropped ping responses, i.e. those ping request messages that do not have a corresponding ping response message.
  • the profile device 500 can determine whether the ping response message was received at the profile device 500 within a given time period, or timeout, of the ping request message being sent by the profile device 500 .
  • the profile device 500 can request that each of the network nodes 510 sends that network node's traffic statistics to the profile device 500 .
  • the network nodes 510 may include the response device 520 as it can also be a network node 510 within the communication network. This request is achieved using the diagnostic read messages discussed in relation to FIG. 4 and as shown in FIG. 5 as diagnostic read messages 511 , 513 and diagnostic traffic statistics messages 512 , 514 .
  • the profile device 500 may choose not to request the traffic statistics from the network nodes 510 if only the ping response statistics are required.
  • the profile device 500 may use these traffic statistics as per the discussion in relation to FIG. 4 .
  • the traffic statistics messages can be formed in to a traffic statistics log message. This log message may be sent to an analysis device 222 for further analysis to identify particular communication devices having particular properties using methods described below.
  • the test shown in FIG. 5 may give a better indication as to the congestion present in the network. Message have also originated from two different locations in the network.
  • the profile device 500 may log either the number of ping requests that have successfully been responded to by the response device 520 or the number of ping requests that have not been responded to within a given time period. Based on the log, the profile device 500 , or the analysis device 222 , may calculate the reliability of the communication network as the ratio, or percentage, of messages for which a reply was successfully received. The profile device 500 may include this reliability in the traffic statistics log message that is sent to the analysis device 222 .
  • each ping message 502 , 506 that is sent by the profile device 500 can comprise a payload that may contain a unique identifier that identifies that particular ping message separate from the other of the predefined number of ping messages.
  • the ping message unique identifier may be an incremental count that is incremented for each ping message that is sent.
  • Each ping message can comprise a payload that may also contain a packet sent time. This sent time is a record of the time that the packet was sent by the profile device 500 .
  • the ping response messages can comprise a payload that may contain a packet received time.
  • the packet received time may also be known as the ping request received time.
  • This packet received time is a record of the time that the particular ping request message packet, to which the particular ping response message is a response, was received by the response device 520 .
  • the profile device 500 may log the sent time, which is included in each particular ping request message, for each particular ping request message. When the profile device 500 receives the ping response messages that contain the packet receive time, the profile device 500 may log the received time against the identifier of the particular ping request message. At the end of the ping process, the profile device 500 may then calculate the difference between the sent time and the received time to calculate the delay, for that particular ping request message, caused by transmission through the communications network.
  • the profile device 500 may also log the time at which the ping response message is received by the profile device 500 .
  • the profile device 500 may calculate the difference between the receive time of the ping response message and the sent time of the ping request message to generate the round-trip time through the communication network.
  • the calculated delay for each successful ping request may be averaged to generate the average delay over the whole test.
  • the minimum and maximum values may also be selected to generate the maximum and minimum delays through the network.
  • the maximum and/or minimum delays could be compared to the lifetime value included in the particular ping response message. This comparison could show whether the difference in delay is caused by a longer path through the network, i.e. more retransmissions, or slow retransmission of the message at each hop in the mesh network, i.e. a low number of retransmissions but a higher time between each retransmission.
  • This calculation and comparison may be undertaken by either analysis device 222 or profile device 500 .
  • the profile device 400 , 500 may first run the test shown in FIG. 4 where the mesh network is generally profiled using ping request messages, or probe messages, that are not addressed any network node present in the network to determine how messages propagate through the network when sent from one device. The profile device 400 , 500 may then identify particular network nodes to profile further based on the data generated by the test shown in FIG. 4 . Alternatively, the analysis device 222 may identify particular nodes to profile further based on the data generated by the tests shown in FIG. 4 and sent to the analysis device 222 in the traffic statistics log message. The analysis device 222 may then send an instruction message to profile device 400 , 500 instructing the profile device 400 , 500 to profile further.
  • the analysis device, or profile device 400 , 500 may identify network nodes 410 , 510 that have a particular set of message reception characteristics. These message reception characteristics may comprise:
  • the profile device 400 , 500 may then run at least one of the tests shown in FIG. 5 between the profile device 400 , 500 and the one or more network nodes that have been selected based on the message reception characteristics.
  • the profile device 400 , 500 can run the test or tests against each of the selected network nodes in turn designating each one as the response device and addressing the probe messages, or ping requests, at that network node 410 , 510 .
  • results of these tests may be used to identify characteristics of the underlying mesh network such as bottlenecks, articulation points, and/or bridges between different parts of the mesh network.
  • an articulation point and/or a bridge may be a mesh device that links two parts of the mesh network together.
  • a device may be a bottleneck within the network as that one device can be responsible for retransmission of message between the two parts of the mesh network.
  • Such an identification may be undertaken by the analysis device 222 , or alternatively by profile device 400 , 500 .
  • the results of these tests may be used to identify network nodes that are operating sub-optimally.
  • the results of these tests may also identify network nodes in the mesh network that are operating sub-optimally within the mesh network, for instance because they are located at the edge of the transmit region of the other network nodes.
  • the identification of these network nodes can then mean that recommendations can be compiled as to how the performance of the mesh network can be improved.
  • the bottlenecks, articulation points and/or bridges can be individual network nodes within the mesh network that link different portions of the mesh network together. For instance, as the window communication device 219 can do in FIG. 2 in linking the upstairs lights to the downstairs lights.
  • These restriction points in the mesh network can be grouped together as having a similar set of properties. A restriction point may be identified by the test results described above.
  • this information can be presented to the user, either directly by the profile device 400 , 500 or by sending information to another device for presentation to the user, with a recommendation that another mesh communication device be installed near the identified device.
  • the analysis device 222 may also send an instruction to the communication device that has been identified as a restriction point to increase its listening duty cycle so that it is listening for messages to retransmit for a longer proportion of the time.
  • This instruction may be in the form of a configuration message that comprises a payload that contains data containing an instruction to the identified communication device to increase the device's duty cycle.
  • the duty cycle update message may be addressed to the particular identified communication device.
  • the presentation device may be the profile device 400 , 500 itself or another device.
  • the presentation device may be a device such as tablet computer 210 .

Abstract

An analysis device for analysing a communication network comprising a plurality of communication devices, the communication network being configured such that transport of packets through the network is provided by the communication devices in the network listening for and relaying packets, the analysis device being configured to: receive a traffic statistics log from a profile device, the traffic statistics log comprising a traffic statistics message from each of the plurality of communication devices, each traffic statistics message comprising data defining at least one reception property of the reception of at least one probe message at the respective communication device; and identify, based on the at least one reception property, at least one restriction point communication device from the plurality of communication devices that is a restriction point in the network.

Description

    CROSS REFERENCE TO RELATED APPLICATIONS
  • This non-provisional patent application claims priority to Great Britain applications: GB 1412714.6, filed Jul. 17, 2014; GB 1405790.5, filed Mar. 31, 2014; GB 1403314.6, filed Feb. 25, 2014; GB 1405785.5, filed Mar. 31, 2014; GB 1405786.3, filed Mar. 31, 2014; GB 1405789.7, filed Mar. 31, 2014; GB 1403312.0, filed Feb. 25, 2014; GB 1405791.3, filed Mar. 31, 2014; GB 1405797.0, filed Mar. 31, 2014.
  • TECHNICAL FIELD
  • This invention relates to a communication device and method for profiling the performance of a communication network.
  • BACKGROUND
  • There is an increasing need for a variety of objects to be equipped with the ability to send and receive messages. In the case of a home, for example, it may be desired that the objects in a room be capable of communicating with each other, and also potentially being able to communicate with the internet or cloud. For example, the room may have a light, light switch, window and door. It may be desired that each of these objects be able to communicate with the others so that the home can be automated. Thus certain actions may be undertaken by one or more of these objects in response to other objects communicating that they are in a particular state. A basic example is adjusting the heating within a room when the light is switched on, to keep the room at a comfortable temperature. Similar situations are envisaged in a commercial environment.
  • To enable objects to communicate, they may be equipped with a device that can communicate with similar devices attached to other objects. They may also communicate with similar devices that are not associated with or attached to other objects but that can communicate with those devices that are associated with or attached to other objects. For this type of communication to be useful, a large number of these devices may be able to communicate with each other. The result can be a network of devices and so this network can potentially have a large number of objects.
  • One suitable method of communication for such a network is to use a mesh networking protocol. This permits a first device to send a message to a second device, which may be outside the communication range of the first device, by transmitting the message via one or more intermediate devices. The objects that are attached to, or associated with, those devices may therefore be able to send and receive messages from one object to another via intermediate objects and/or the other devices that are not associated with an object.
  • Many mesh networks send data using complex routing tables. The routing tables store routes from one network device to another so that messages can be propagated from source to destination via a series of hops. The topology of the network generally has to be known in order that routes between the various devices can be determined and stored. An alternative is flood routing. In this method messages do not travel from one device to another via a predefined route. Instead messages are broadcast and any device in range that receives a message retransmits it. A message thus propagates its way through the network, potentially reaching its destination via number of different routes. Flood routing is very simple to implement and although it may appear inefficient has a number of advantages, particularly for ad hoc networks that may change their topology on a random basis.
  • The performance of a mesh network that uses flood routing can be dependent on the connections between the devices in the network and the topology of those connections between the network devices. The performance of the mesh network may be dependent on the connectivity between devices, the density of the devices within the network, the topology arrangement of the devices and/or the transmit and receive schedule of each of the devices. The devices may be located in the network in a way which may not be optimal for the performance of the mesh network. For instance, devices positioned in a home may be positioned according to the function of the object that the device is associated with. For instance, a door may be located in an opening to a room and a light may be located on the ceiling in the middle of a room. A position that is based on the function of the object may be sub-optimal from the perspective of the operation of a mesh network. For example, that device may only be able to communicate with a small number of other devices that are at the edge of the transmit and/or receive ranges of those devices. One optimal position for the device, from the perspective of the operation of the mesh network, may be a position that enables the device to communicate with many other devices with good transmit/receive signal strength. Such a position may enable messages sent via flood routing to arrive at that device via multiple routes. This may increase the reliability, and also the performance, of the mesh network. It may therefore be desirable to view and optimize the mesh network as a whole to enable reliable communication between each of the mesh network nodes.
  • As many of these objects may not have access to, or require power themselves, for example, packages sitting on a shelf, a window or a door, there may be a desire for the devices that communicate on the objects' behalf to be battery-powered devices that consume only a small amount of power. It may also be desirable that these devices be able to communicate wirelessly with each other so that there is no need for cables running between them. This can increase the need to optimise the mesh network.
  • Due to the distributed nature of a mesh network with multiple separate independent devices, it can be difficult to acquire the data needed to understand how the mesh network may be configured to enable reliable communication. Therefore, there is a need to improve the analysis of mesh networks as a system to be able to optimise communications within the mesh network.
  • SUMMARY OF THE INVENTION
  • According to a first aspect of the present invention there is provided an analysis device for analysing a communication network comprising a plurality of communication devices, the communication network being configured such that transport of packets through the network is provided by the communication devices in the network listening for and relaying packets, the analysis device being configured to: receive a traffic statistics log from a profile device, the traffic statistics log comprising a traffic statistics message from each of the plurality of communication devices, each traffic statistics message comprising data defining at least one reception property of the reception of at least one probe message at the respective communication device; and identify, based on the at least one reception property, at least one restriction point communication device from the plurality of communication devices that is a restriction point in the network.
  • The analysis device may be configured to: calculate a network reception property for each different reception property received from the plurality of communication devices; and identify at least one restriction point communication device that is a restriction point by selecting the at least one communication device from the plurality of communication devices that have at least one reception property that deviates from the at least one network reception property by a predetermined threshold value. The analysis device may be configured to: calculate each network reception property by taking the average of the respective reception property received from each communication device; and identify at least one restriction point communication device that is a restriction point by selecting the communication devices that deviate from that average by a predetermined threshold value.
  • The analysis device may be configured to: send a configuration message to each of the at least one restriction point communication device, the configuration message comprising data instructing the restriction point communication device to increase that communication device's duty cycle. The restriction point communication device may listen for messages only a proportion of the time and the instruction to increase that device's duty cycle comprises an instruction to listen for a larger proportion of the time.
  • The analysis device may be configured to: generate a recommendation message comprising data containing a recommendation to install another communication device near each restriction point communication device; and send the recommendation message to a presentation device for display to a user of the mesh network. The at least one reception property may comprise at least one of: the number of unique messages received at the respective communication device, the number of repeated messages received at the respective communication device, the number of unknown network messages received at the respective communication device, and the average received signal strength of the messages received at the respective communication device.
  • The traffic statistics log may comprise a reliability property for the communication network which is based on the number of probe messages that the profile device receives a response to; and the analysis device may be configured to identify at least one restriction point communication device based on the reliability property. The traffic statistics log may comprise a delay property for the communication network which is based on the difference between receive times at which the probe messages are received by the respective communication devices and send times at which the probe messages are sent by the profile device; and the analysis device may be configured to identify at least one restriction point based on the delay property. The traffic statistics log may comprise values of the lifetime field of the probe messages as received by an addressed communication device; and the analysis device may be configured to identify at least one restriction point based on the averaged value of the lifetime fields.
  • According to a second aspect of the present invention there is provided a communication device capable of communicating over a communication network comprising a plurality of communication devices, the communication network being configured such that transport of packets through the network is provided by the communication devices in the network listening for and relaying packets, the communication device being configured to: send a plurality of probe messages for transmission through the communication network; send a traffic statistic request message to each of the plurality of communication devices; and receive a traffic statistics message from each of the plurality of communication devices, each traffic statistics message comprising data defining at least one reception property of the reception of at least one of the probe messages at the respective communication device.
  • The communication device may be configured to: form a traffic statistics log message the traffic statistics log comprising the traffic statistics messages from each of the plurality of communication devices; and send the traffic statistics log message to an analysis device. The communication device may be configured to: form the plurality of probe messages so that each probe message comprises data containing a unique identifier that identifies that particular probe message separate from the others of the plurality of probe messages. The communication device may be configured to: form the plurality of probe messages so that the unique identifier is an incremental count which increases sequentially in turn for each sent probe message.
  • The communication device may be configured to: form the plurality of probe messages so that each probe message comprises data containing an address field specifying the address of at least one communication device that the probe message is addressed to, and the address field contains an address of at least one of the plurality of communication devices; receive a probe message response for at least one of the plurality of probe messages from the at least one addressed communication device, each probe message response comprising data containing the unique identifier of the probe message that the probe message response is a response to; and calculate a reliability property for the communication network based on the number of distinct unique identifiers that are present in the probe message responses. The communication device may be configured to: form the plurality of probe messages so that each probe message comprises data containing a sent time at which that particular probe message is sent by the communication device.
  • The communication device may be configured to: form the plurality of probe messages so that each probe message comprises data containing an address field specifying the address of at least one communication device that the probe message is addressed to, and the address field contains an address of at least one of the plurality of communication devices; receive a probe message response for at least one of the plurality of probe messages from the at least one addressed communication device, each probe message response comprising data containing a receive time at which that particular probe message is received by the communication device; and calculate a delay property for the communication network based on the difference between the receive time and the sent time of the probe messages. The communication device may be configured to: form the plurality of probe messages so that each probe message comprises data containing a lifetime field specifying the retransmission lifetime of the message; and each probe message response comprises data containing the value of the lifetime field of that particular probe message as received by the addressed communication device.
  • The communication device may be configured to: form the plurality of probe messages so that each probe message comprises data containing an address field specifying the address of the communication device that the probe message is addressed to, and the address field may contain a communication device address that is not present in the communication network.
  • The communication device may be configured to: prior to sending the plurality of probe messages, send a traffic counter reset message to each of the plurality of communication devices, wherein the traffic counter reset message may instruct each of the plurality of communication devices to reset respective traffic counters. The communication device may be configured to: send one traffic counter reset message that instructs all of the plurality of communication devices to reset respective traffic counters. The plurality of probe messages may be ping request messages.
  • According to a third aspect of the present invention there is provided a method for identifying restriction point devices within a communication network comprising a plurality of communication devices, the communication network being configured such that transport of packets through the network is provided by the communication devices in the network listening for and relaying packets, the method comprising: sending a plurality of probe messages for transmission through the communication network; sending a traffic statistic request message to each of the plurality of communication devices; receiving a traffic statistics message from each of the plurality of communication devices, each traffic statistics message comprising data defining at least one reception property of the reception of at least one of the probe messages at the respective communication device; and identifying, based on the at least one reception property, at least one restriction point communication device from the plurality of communication devices that is a restriction point in the network.
  • The method may comprise: calculating a network reception property for each different reception property received from the plurality of communication devices; and identifying at least one restriction point communication device that is a restriction point by selecting the at least one communication device from the plurality of communication devices that have at least one reception property that deviates from the at least one network reception property by a predetermined threshold value. The method may comprise: calculating each network reception property by taking the average of the respective reception property received from each communication device; and identifying at least one restriction point communication device that is a restriction point by selecting the communication devices that deviate from that average by a predetermined threshold value. The method may comprise: sending a configuration message to each of the at least one restriction point communication device, the configuration message may comprise data instructing the restriction point communication device to increase that communication device's duty cycle. The restriction point communication device may listen for messages only a proportion of the time and the instruction to increase that device's duty cycle may comprise an instruction to listen for a larger proportion of the time.
  • The method may comprise: generating a recommendation message comprising data containing a recommendation to install another communication device near each restriction point communication device; and sending the recommendation message to a presentation device for display to a user of the mesh network. The at least one reception property may comprise at least one of: the number of unique messages received at the respective communication device, the number of repeated messages received at the respective communication device, the number of unknown network messages received at the respective communication device, and the average received signal strength of the messages received at the respective communication device.
  • The method may comprise: forming the plurality of probe messages so that each probe message comprises data containing a unique identifier that identifies that particular probe message separate from the others of the plurality of probe messages. The method may comprise: forming the plurality of probe messages so that the unique identifier is an incremental count which increases sequentially in turn for each sent probe message. The method may comprise: forming the plurality of probe messages so that each probe message comprises data containing an address field specifying the address of at least one communication device that the probe message is addressed to, and the address field contains an address of at least one of the plurality of communication devices; receiving a probe message response for at least one of the plurality of probe messages from the at least one addressed communication device, each probe message response comprising data containing the unique identifier of the probe message that the probe message response is a response to; and calculating a reliability property for the communication network based on the number of distinct unique identifiers that are present in the probe message responses; The method comprise: identifying at least one restriction point communication device based on the reliability property.
  • The method may comprise: forming the plurality of probe messages so that each probe message comprises data containing a sent time at which that particular probe message is sent by the communication device. The method may comprise: forming the plurality of probe messages so that each probe message comprises data containing an address field specifying the address of at least one communication device that the probe message is addressed to, and the address field may contain an address of at least one of the plurality of communication devices; receiving a probe message response for at least one of the plurality of probe messages from the at least one addressed communication device, each probe message response comprising data containing a receive time at which that particular probe message is received by the communication device; calculating a delay property for the communication network based on the difference between the receive time and the sent time of the probe messages. The method may comprise: identifying at least one restriction point communication device based on the delay property.
  • The method may comprise: forming the plurality of probe messages so that each probe message comprises data containing a lifetime field specifying the retransmission lifetime of the message; and each probe message response comprises data containing the value of the lifetime field of that particular probe message as received by the addressed communication device; and identifying at least one restriction point based on the averaged value of the lifetime field as received by the addressed communication device.
  • The method may comprise: forming the plurality of probe messages so that each probe message comprises data containing an address field specifying the address of the communication device that the probe message is addressed to, and the address field may contain a communication device address that is not present in the communication network. The method may comprise: prior to sending the plurality of probe messages, sending a traffic counter reset message to each of the plurality of communication devices, wherein the traffic counter reset message instructs each of the plurality of communication devices to reset respective traffic counters.
  • The method may comprise: sending one traffic counter reset message that instructs all of the plurality of communication devices to reset respective traffic counters. The plurality of probe messages may be ping request messages.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The present invention will now be described by way of example with reference to the accompanying drawings. In the drawings:
  • FIG. 1A shows a schematic diagram of a wireless communication device;
  • FIG. 1B shows a schematic diagram of another communication device;
  • FIG. 2 shows a schematic diagram of a network containing a plurality of communication devices;
  • FIGS. 3A and 3B illustrate the transport of a packet through the network;
  • FIG. 4 shows a schematic mesh network performance test message sequence chart; and
  • FIG. 5 shows another schematic mesh network performance test message sequence chart.
  • DETAILED DESCRIPTION
  • The following description is presented to enable any person skilled in the art to make and use the invention, and is provided in the context of a particular application. Various modifications to the disclosed embodiments will be readily apparent to those skilled in the art.
  • The general principles defined herein may be applied to other embodiments and applications without departing from the spirit and scope of the present invention. Thus, the present invention is not intended to be limited to the embodiments shown, but is to be accorded the widest scope consistent with the principles and features disclosed herein.
  • The present invention relates to an analysis device that is capable of analysing a communication network and determining where within the network optimizations may be required to improve the performance of the communication network. The analysis device may be known as a collector device and/or a concentrator device. The present invention also relates to a profile device that is capable of profiling a communication network for its performance characteristics. The communication devices within the communication network may be a communication device that can transmit and receive according to a mesh network protocol. Accordingly the communication devices may be part of the mesh network. Within the mesh network, packets may be transferred between devices that are part of the mesh network by the communication devices that form the communication network listening for and relaying packets that the communication devices have received. The communication device may be a wireless communication device.
  • The profiling device may profile the communication network by sending out a plurality of probe messages in to the network. The other communication devices within the network can log the reception of those messages and properties associated with that reception. This log can then be sent back to the communication device, at the request of the communication device. This log of information may be sent to the analysis device for analysis to determine where in the network the performance of the network may be improved by altering the network properties of an individual communication device, and/or by installing another communication device in the vicinity of another individual communication device.
  • The profiling device may also use at least one of the other communication devices to help profile the network by instructing that other communication device to respond to the probe messages thus increasing the number of probe messages and also potentially increasing the number of routes taken by the probe messages through the network.
  • FIG. 1A shows a schematic diagram of an example communication device in accordance with the present invention. In FIG. 1A, the communication device 10 has an antenna 20 connected to a transceiver 30. The communication device 10 can use the transceiver to communicate with at least one other communication device according to a communications protocol. The communication device 10 can use the transceiver to transport packets over a communication network where the network is provided by a plurality of communication devices in the network listening for and relaying packets. The communication device 10 can use the transceiver to communicate in a mesh network.
  • The communication device 10 also comprises a processor 40 that is capable of executing a set of program instructions that are stored in a memory 50. The memory 50 can be a non-volatile memory that stores in non-transitory form program code that is executable by the processor 40 to cause the communication device to communicate according to the communications protocol. The processor 40 can be a microprocessor. The memory 50 may be part of processor 40 or connected to processor 40 via a bus. Whilst the processor 40 and transceiver 30 are shown in FIG. 1A as separate elements, it will be appreciated that at least processor 40 and transceiver 30 could be incorporated in to one element. For example, being incorporated on a single chip.
  • The communication device 10 may also comprise a power source 60. This power source may be a battery. Alternatively, the communication device 10 may not comprise a power source and be connected to an external power source such as an electrical outlet.
  • The communication device 10 may also comprise an interface 70 for sending and receiving data that is to be sent using the communications protocol. This interface 70 may be a wired or wireless link to sensors for sensing external events, such as the operation of a light switch in the home environment described above, or a link to appliances for issuing control signals to those appliances, such as the light in the home environment described above.
  • FIG. 1B shows a schematic diagram of another example communication device in accordance with the present invention. In FIG. 1B, the communication device 90 has a wired network interface 80. The communication device 90 can use the wired network interface 80 to communicate with at least one other communication device according to a communications protocol. The communication device 90 can use the wired network interface 80 to transport packets over a communication network where the network is provided by a plurality of communication devices in the network listening for and relaying packets. The communication device 90 can use the wired network interface 80 to communicate in a mesh network. The other illustrated elements of the communication device 90 are as described in relation to FIG. 1A.
  • The structures shown in FIGS. 1A and 1B (and the other block apparatus diagrams included herein) are intended to correspond to a number of functional blocks in an apparatus. This is for illustrative purposes only. FIGS. 1A and 1B are not intended to define a strict division between different parts of hardware on a chip or between different programs, procedures or functions in software. In some embodiments, some or all of the algorithms described herein may be performed wholly or partly in hardware. In many implementations, at least part of interface 70, transceiver 30 and wired network interface 80 may be implemented by a processor actioned under software control (e.g. the CPU of a communication device). Any such software may be stored on a non-transient computer readable medium, such as a memory (ROM, cache, hard disk etc) or other storage means (USB stick, CD, disk etc).
  • The communication devices described above can form part of a communication network that is configured such that transport of packets through the network is provided by a plurality of communication devices such as those described in FIGS. 1A and/or 1B. An example of such a network is shown in FIG. 2, which represents a house having a distributed lighting system. The system comprises a light switch unit 201 and light fittings 202, 203, 204, 205. Light switch unit 201 is integrated with a wireless communication device 212. Light fittings 202 to 205 are integrated with respective wireless communication devices 206, 207, 208, 209. The house has a mains electrical supply which powers the light fittings and their respective wireless communication devices 206 to 209. Light switch unit 201 and its wireless communication device 212 are powered by a local battery 211.
  • The house contains other items of equipment that contain other wireless communication devices. For example, there is a tablet computer 210 which contains a wireless communication device 213, and a mobile phone 215 which contains a wireless communication device 216. There is also a sensor 220 for detecting the open/closed state of window 218, which contains communication device 219. Computer 210, phone 215 and sensor 220 are powered by batteries 214, 217 and 221 respectively. The house may also contain an analysis device 222 for performing analysis on gathered network information. The analysis device 222 may be a communication device as described herein. Alternatively the analysis device 222 may be remote from the house and connected to the house via a network, such as the internet. The analysis device 222 may be part of a cloud network. The analysis device 222 may be part of one of the other communication devices referred to herein.
  • Wireless communication devices 206 to 209, 213, 216 and 219 operate according to the same wireless communication protocol. That could be a relatively short-range protocol. For example the effective range of each device could be less than 25 m. That characteristic can permit the devices to use less power for transmitting and/or receiving than would be expected in a longer range protocol. The protocol could be one that imposes no common time-base at or below the transport level, or below the application or presentation levels. In other words, the devices in the network operate asynchronously of each other. That characteristic can reduce the devices' power consumption by reducing their need for accurate clocks running continuously. In one example, the devices could operate according to the Bluetooth protocol, specifically the Bluetooth Low Energy protocol. The devices could use other protocols, for instance IEEE 802.11.
  • Devices 206 to 209 are configured cooperatively in order that the light fittings 202 to 205 know to respond to signals from the light switch 201. This may be done by the devices 206 to 209 storing a common network key in their respective memories. The network key may be negotiated by the devices 206 to 209 in the network. The network key may be stored in the device 206 to 209 by means of another device such as mobile phone 215 communicating with the wireless device of the light switch and/or light fittings to communicate with the wireless devices of the light fittings to cause them to store the network key. The network key may be used to sign all packets sent over the network.
  • The communication devices in FIG. 2 are all connected to or fully integrated with another device—a “consumer”—on behalf of which the communication device transmits and receives packets over the network. In many cases the primary function of the consumer may have nothing to do with the network. Consumer devices have varying levels of complexity. In one example a consumer device might be a tablet computer; in another it might just be a clock configured to count down to an expiry date of some perishable goods. It also possible for the communication device to be a consumer itself. An example of such a scenario might be when a communication device uses X10, which is a protocol designed to support the integration of electronic devices within the home.
  • A connection between the communication device and its associated consumer may be wired or wireless and may be performed by the interface 70 of communication devices 10, 90. The communication device may be contained within the same housing as the consumer. In many implementations the consumer device might be fully integrated with the consumer; they might even share circuitry. Often the communication device may be implemented by a chip within the consumer. An example of this is communication device 216 within phone 215. In other implementations the communication device and the consumer may be separate devices that are connected together. For example, the communication device might be a BLE tag connected to a PC.
  • For the purposes of this document, the communication device is considered to be the combination of hardware and/or software that implements the protocol governing the network, thereby implementing the packet transport that enables the consumer to communicate over the network.
  • Each communication device may be capable of acting as a relay in the network. An example of this is shown in FIG. 3, which shows the same distributed lighting system as FIG. 2. The network is configured as a mesh network so, at least in theory, all devices that are part of the network have a responsibility to act as relays. A relay device suitably retransmits any packet that it recognises as having originated from the network. A relay device may retransmit packets that have been injected in to the network at that relay device. The relay device might also take steps to prevent old packets from being continuously bounced around the network, e.g. by decrementing a “time-to-live” value, or more generally, a lifetime value, in the packet before forwarding it on. More generally, if the lifetime value is equal to a threshold value then the packet is not retransmitted. The relay device might also take steps to prevent packets it has already retransmitted before being propagated around the network multiple times; the relay device may do this by only forwarding the packet if it is new.
  • As discussed above, in order to avoid packets being bounced around the network indefinitely, each packet suitably includes a lifetime field that defines the lifetime of the packet within the network. A communication device that receives the packet suitably checks whether the lifetime field is equal to a threshold value before retransmitting the packet. If the lifetime value is equal to the threshold, the communication device does not retransmit the packet. Otherwise the communication device does retransmit the packet. In one example the lifetime field is a Time-To-Live (TTL) field. This is a value in the packet that is suitably decremented each time that the packet is retransmitted. In one example the TTL value is decremented by one at each retransmission, with each communication device that receives the packets retransmitting it until the TTL value is decremented to zero. In another example the lifetime field is a Max Hop Count (MHC) field. In this example each communication device stores a threshold MHC value, which is a positive, non-zero number. The MHC value in each packet may be incremented by one each time that the packet is retransmitted, with each communication device that receives the packets retransmitting it until the MHC value reaches the device's stored MHC threshold.
  • FIG. 3A shows an example of the network operating according to mesh principles. Light switch 201 transmits a packet addressed to all of devices 206 to 209 instructing light fittings 202 to 205 to switch on. This packet is propagated by all devices that receive it, eventually reaching light fitting 205, which is out of range of light switch 201, the source of the packet. The packet is propagated via light fitting communication devices 206 to 209, then via communication device 216 and window sensor communication device 219 finally arriving at light fitting communication device 209.
  • The network may also be configured to implement flood routing as a way of propagating messages within the mesh network, which is well suited to ad hoc networks. The phone 215 and the tablet computer 210 are both portable devices that change location within the network as a user picks them up and moves them. They may also occasionally leave the network and then reappear some time later. For example, when a user takes them out of range of the network by taking them out of the house and later returns them to the house. The network's topology is thus subject to random alteration.
  • It can be appreciated from FIG. 3A that if the phone 215 was not present in the upstairs of the house, then there would be only a single route to light fitting 205 via communication device 219 of sensor 220 for window 218. This is because, in this example, light fitting 205 is out of range of the downstairs light fittings 202, 203, 204 and the light switch 201, but in range of window 218. Window 218 is within range of at least light fittings 202 and 203. There may be more than one light fitting 205 present in the upstairs of the house and each of those light fittings 205 may be out of range of the downstairs light fittings 202, 203, 204. In such a situation the window communication device 219 may in effect act as an articulation point or one vertex of a bridge between the upstairs mesh network and the downstairs mesh network. In this context, a bridge is referring to a bridge between two parts of the mesh network. As opposed to denoting elements that link two or more communication technologies together.
  • The performance and reliability of the mesh network as a whole may then become dependent on these bridge communication devices, such as window communication device 219. This is because if the bridge communication device does not forward or retransmit packets originating from the network then the communication route between the two or more networks that the bridge communication device bridges may be lost. This may only be a temporary loss of communication, but in such a situation there may at a minimum be packet loss or a loss of connection entirely.
  • Such a situation may arise, where a device does not retransmit packets, if constant listening is not able to be performed by all of the devices in the mesh network. It may also arise when a device does not receive the signal from another device with sufficient power to be able to decode the information contained in that signal.
  • Constant listening can be an expensive operation and should generally be avoided in contexts where power availability is an issue. Although switch communication device 212 and window communication device 219 are capable as acting as relays, they are both battery powered and should reduce power consumption where possible. Therefore, one or both of those devices may deliberately reduce their receive period/duration with the aim of conserving battery power. This manages the amount of energy used for receiving information.
  • In the case of FIG. 3B, window communication device 219 may decide to reduce its receive period/duration as it is battery powered. It may also decide to reduce its receive period/duration because it has detected that devices 206, 207 and 209 are all within range and are all capable of acting as relays. Where there are multiple relays within range, each relay may decide to reduce its receive period/duration under the assumption that at least one of the relays within range may receive any retransmitted packet at a given time. The other relay devices may then receive the retransmitted packet at a later time when that first relay retransmits the packet. In the situation shown in FIG. 3B, window communication device 219 has therefore decided to shorten its listen periods so that it only listens for 10% of the time. The proportion of time that a device listens for may be known as the duty cycle of the device.
  • In FIG. 3B, a period when the window communication device 219 is not listening is shown. As it is not listening at that moment, the window communication device 219 does not receive the packets that are retransmitted by the device 206 and 207 that are connected to downstairs lights 202 and 203. As window communication device 219 does not receive the packets that are retransmitted by devices 206 and 207, communication device 219 does not retransmit the packet. This means that device 209 which is attached to upstairs light 205, and outside of the communication range of downstairs light devices 206 and 207, does not receive the packet that has been retransmitted by devices 206 and 207.
  • As is shown in the situation shown in FIG. 3B, device 219 may provide a single point of failure within the mesh network because it can function as a bridging device linking the upstairs portion of the mesh network to the downstairs portion of the mesh network. It would therefore be desirable to either increase the duty cycle of bridge devices such as device 219 so that they listen for a larger proportion of the time, or add additional devices near device 219 which can act as alternative bridges so that there is no longer a single point of failure in that part of the network. To be able to know where to target additional devices within the mesh network, or to know which devices ought to be limited to using a higher duty cycle, the mesh network may be profiled to establish the health and/or performance of the mesh network and/or locate bridging devices such as device 219.
  • There are a number of ways in which the mesh network may be profiled to establish the performance of the mesh network. Some examples are described below. These examples either make use of a single mesh device as the profiling device which sends test packets in to the network or use several mesh devices that work collaboratively to send test packets in to the network. In the case of at least two mesh devices working together, a first communication device sends packets in to the network which are addressed for the at least one other communication device in the network. The other communication device can then respond with messages addressed to the first communication device. Statistics about the mesh network can also be gathered from the rest of the communication devices present in the mesh network. The profiling device itself can then analyse the collected data concerning the communications through the network, in which case it also performs the role of the analysis device 222. Alternatively, the profiling device can send a log message to the analysis device 222 which contains the collected data concerning the communications through the network. The analysis device 222 can then analyse the data contained in this log message.
  • FIG. 4 shows a schematic message sequence chart for a first test that can be used to profile the mesh network. It will be understood that whilst the messages are shown in a sequence that there may be concurrency between at least some of these messages. For example, one message may be sent to multiple devices in substitute for separate messages to each device; and the responses from devices may arrive in an alternative order.
  • A communication device 400 that is acting as the profiling device may initially send a DIAGNOSTIC_RESET message 401 in to the communication network. The diagnostic reset message 401 may not be addressed to any particular communication device within the network. This is because it may need to be acted upon by all communication devices, network nodes 410, in the network. This diagnostic rest message 401 causes the communication devices operating in the communication network to reset one or more counters within each communication device. These counters may be stored in a memory such as memory 50 shown in FIGS. 1A and 1B. The traffic counters may store statistics concerning the transport of packets through the communication network as seen by that particular communication device. The traffic counters may store statistics concerning:
      • the number of lost packets,
      • number of consecutive packets lost,
      • maximum number of repeated packets seen,
      • minimum number of repeated packets seen,
      • average number of repeated packets seen,
      • average RSSI seen over the received packets; as measured during the reception of those packets,
      • number of unknown messages seen,
      • number of messages/packets received, and/or
      • number of repeated messages/packets.
  • It will be appreciated that the diagnostic reset message referred to in this document may alternatively be described as a traffic counter reset message.
  • By resetting the counters prior to running any profile tests, the results that are generated can be known to relate to the period during which tests were run.
  • The diagnostic reset message 401 may be a short message that does no more than identify itself as a traffic counter reset message. For example, the message may contain data that comprises an opcode that is set to identify the message as a diagnostic message, and also as a reset sub-message within the diagnostic message type. The message may contain data that identifies the message as an instruction to reset the traffic counters within the network node 410.
  • The profile device 400 can then send out a predefined number (k) of PING_REQUEST messages 402, 403 in to the network. Each ping message 402, 403 can comprise a payload that may contain a unique identifier that identifies that particular ping message separate from the other of the predefined number of ping messages. The ping message unique identifier may be an incremental count that is incremented for each ping message that is sent. Each ping message 402, 403 therefore contains a different number in the incremental count field within the data defining the payload of the ping message. Each ping message can comprise a payload that may also contain a packet sent time. This sent time is a record of the time that the packet was sent by the profile device 400. It is the nature of the communication network that those ping request messages will be retransmitted by the network nodes until the lifetime value of that ping request message has reached the threshold value or the communication devices recognise the message as an “old” message that they have already seen, as described above. The ping request messages can therefore propagate through the communication network by at least most of the communication devices, the network nodes, listening for and retransmitting the packets.
  • It will be appreciated that the ping request messages may be alternatively be described as a probe message.
  • The predefined number may be 1000, 5000, 10000 or 20000. The predefined number may be determined in dependence on the number of network nodes present in the communication network. For instance, a higher predefined number may be chosen by the profiling device when more network nodes are present in the communication network.
  • The payload of the ping messages may be used by the network nodes 410 to calculate the packet loss over the test and the number of repeated messages that are received by the network nodes 410. The packet loss can be calculated by logging the ping message unique identifier for each of the ping messages that are received. Once all of the predefined number of ping messages have been sent, each network node 410 can search for unique identifiers that are missing from the unique identifier log. The number that are missing can be used to give the packet loss over the test. The number of repeated messages can be calculated by the network nodes 410 by summing the number of times a particular unique identifier has been received by that network node 410 during the test.
  • The ping request message 402, 403 may contain data that comprises an opcode that is set to identify the message as a ping message, and also as a ping request sub-message within the ping message type. The ping message 402, 403 may contain data that identifies the message as a request for a ping response that may be addressed to a particular communication device. The PING_REQ 402, 403 message may need to be addressed to a particular device to be compliant with the protocol that the communication network is compliant with. Alternatively, the protocol may define that, instead and/or as well as being capable of being address to a particular device, the ping message may be capable of being addressed to a group of particular devices. The group of particular devices may have a group identifier, group address, or group ID, associated with them and this group ID may be used in place of the device ID, or device address associated with a particular device.
  • In the case shown in FIG. 4, no response is required to the ping message. Therefore, the profile device 400 may set the recipient address for each of the ping request messages 402-403 (also written as 402, 403) to that of a device, or group, that is not present in the communications network. In this case, there may be no device that has that particular address and so none of the network nodes 410 within the communication network m respond with a response to the ping request 402, 403 message.
  • Once the predefined number of ping request messages (k) have been sent by the profile device 400, the profile device 400 can request that each of the network nodes 410 sends that network node's traffic statistics to the profile device 400. This can be achieved by the profile device 400 sending a DIAGNOSTIC_READ messages 404, 406 addressed to that particular node. The profile device 400 can send a separate diagnostic read message 404, 406 to each of the network nodes 410 in the communication network. The profile device 400 may send a diagnostic read message 404, 406 to a group of the network nodes 410 in the communication network that are part of that particular group and identified by a group address or group ID. The diagnostic read message 404, 406 requests that the network node sends the requesting device at least one of the traffic statistics that have been compiled by the network node 410.
  • The diagnostic read message 404, 406 may contain data that comprises an opcode that is set to identify the message as a diagnostic message, and also as a traffic statistics request sub-message within the diagnostic message type. The diagnostic read message 404, 406 may contain data that identifies the message as a request for traffic statistics that may be addressed to a particular device.
  • It will be appreciated that the diagnostic read message referred to in this document may alternatively described as a traffic statistic request message.
  • Each network node that receives a traffic statistic request message 404, 406, may send a message back to the requesting device, in this case the profile device 400, which contains the requested traffic statistics. The network node 410 forms and sends a DIAGNOSTIC_TRAFFIC_STATS message 405, 407 to the profile device 400. This diagnostic traffic statistics message 405 is addressed to the device that sent the diagnostic read message 404, 406. The payload of the traffic statistics message 404, 406 may include data that contains:
      • the number of messages received by the particular network node, since the traffic counters were reset,
      • the number of repeated messages received by the particular network node, since the traffic counters were reset. As discussed above, the number of repeated messages can be calculated by referring to the ping message unique identifier and summing the number of times that each identifier has been received.
      • the number of unknown network messages received by the particular network node, since the traffic counters were reset. The unknown network messages being messages that cannot be read by that network node. This could be because it contains a network identification code that is not known to the network node or contains a network code that is unreadable by the network node.
      • Statistical information pertinent to the distribution of the RSSI of the messages received by the network node, since the traffic counters were reset. This may be in the form of the average RSSI of the messages received by the network node, since the traffic counters were reset. This may also be in the form of other statistical variances of the RSSI of the messaged received by the network. For instance, the mean, mode, variance or standard deviation of those values. The RSSI may be averaged for only the messages that are recognised as being identified as a message for the communication network that the network node is part of.
      • the number of lost packets/messages, since the traffic counters were reset. As discussed above, the number of lost packets can be calculated by referring to the ping message unique identifier and searching for unique identifiers that are missing from the unique identifier log.
      • number of consecutive packets lost,
      • maximum number of repeated packets seen,
      • minimum number of repeated packets seen,
      • average number of repeated packets seen,
      • average RSSI seen over the received packets; as measured during the reception of those packets,
      • number of unknown messages seen,
      • number of messages/packets received, and/or
      • number of repeated messages/packets.
  • The diagnostic traffic statistics message 405, 407 may contain data that comprises an opcode that is set to identify the message as a diagnostic message, and also as a traffic statistics sub-message within the diagnostic message type. The diagnostic traffic statistics message 405, 407 may contain data that identifies the message as a containing traffic statistics that have been measured by the sending device.
  • Once all of the network nodes have been queried using the diagnostic traffic statistics read message 404, 406 and the network nodes have sent their responses then the profile device 400 may use these traffic statistics to calculate the congestion that is seen by each network node 410 in the communication network. The congestion at a particular node in the network may be determined by:
      • comparing the individual levels of packet loss at that particular network node 410 with the average over the whole communication network. A high level of packet loss at a particular node relative to the network average may indicate a high level of congestion at that network node 410.
      • comparing the individual level of repeated messages seen by that particular network node 410 with the average over the whole communication network. A low level of repeated messages may indicate low total throughput at that network node due to there being few other network nodes within communication distance of that particular network node. A low level of repeated messages may indicate an area of the communication network around that particular network node which is susceptible to congestion.
      • more generally, by comparing the traffic statistics recorded by a particular node with the average traffic statistics across all nodes in the network.
  • Alternatively, or as well as, the traffic statistics messages can be formed in to a traffic statistics log message. This log message may be sent to an analysis device 222 for further analysis to identify particular communication devices having particular properties using methods described below.
  • FIG. 5 shows a schematic message sequence chart for second and third tests that can be used to profile the mesh network. As with FIG. 4 above, it will be understood that whilst the messages are shown in a sequence that there may be concurrency between at least some of these messages. For example, one message may be sent to multiple devices in substitute for separate messages to each device; and the responses from devices may arrive in an alternative order.
  • A communication device 500 that is acting as the profiling device may initially send a DIAGNOSTIC_RESET message 501 in to the communication network. This diagnostic reset message 501 is as described in relation to FIG. 4 above and diagnostic reset message 401. By resetting the counters prior to running any profile tests, the results that are generated can be known to relate to the period during which tests were run.
  • The profile device 500 can then send out a predefined number (k) of ping request messages 502, 506 in to the network. The profile device 500 may send each ping request message in turn waiting for a response from the device that a ping response has been requested from before sending the next ping request message. The profile device 500 may alternatively send the next ping request message after a predefined timeout period if no response has been received within that timeout period. The PING_REQ 502, 506 message may need to be addressed to a particular device to be compliant with the protocol that the communication network is compliant with. In the case shown in FIG. 5, the device that is required to respond to each ping request message 502, 506 is the response device 520. The ping messages may therefore comprise data defining the device address that the message is addressed to. As discussed above in relation to FIG. 4, the protocol may define that, instead and/or as well as being capable of being address to a particular device, the ping message may be capable of being addressed to a group of particular devices. The group of particular devices may have a group identifier, group address, or group ID, associated with them and this group ID may be used in place of the device ID, or device address associated with a particular device. Thus apart from now being addressed to the response device or a group of response devices, the ping request messages 502, 503, 506, 507 are as described above in relation to FIG. 4. The response devices 520 may be one or more of the network nodes, and so communication devices, of the communication network.
  • As shown in FIG. 5, the profile device 500 sends each of the ping request messages in to the network by transmitting the ping request message. The ping request message may be received by one or more network nodes and those network nodes can retransmit the ping request message 503, 507 as long as the lifetime value for the packet has not reached the threshold value as described above. Although it might be assumed that only one retransmission is shown in FIG. 5 before the ping request message reaches the response device, it will be appreciated that there could be many retransmissions by the network nodes 510 within the communication network. As discussed above, the ping request messages may therefore propagate through the communication network by each communication device, the network nodes, listening for and retransmitting the packets.
  • The retransmitted ping request messages may eventually reach the response device 520 which is the device that the ping request message was addressed to. The response device may record the lifetime value of the ping request message as received at the response device. The lifetime value may be, as discussed above, a “time-to-live” value or a max hop count value. The response device may also record the RSSI of the ping request message as received at the response device 520. More generally, the response device may record the signal strength of the ping request message 502, 507. The response device 520 can, in response to the ping request message, form a PING_RESPONSE message 504, 508 and transmit this message for transmission through the communication network to the profile device 500. This ping response message 504, 508 is addressed to the device that originally sent the ping request message 503, 507. In this case, the ping response message 504, 508 may be addressed to the profile device 500. The payload of the ping response message 504, 508 may include data that contains one or more of:
      • the recorded lifetime value of the particular ping request message 503, 507 that the ping response message is a response to.
      • the RSSI value associated with the reception of the particular ping request message 503, 507. More generally, the RSSI value may be the signal strength of the particular ping request message 503, 507.
  • The ping response messages 504, 508 are shown in FIG. 5 propagating from the response device 520 via the network nodes 510, the ping response messages 505, 509 being retransmitted by the network nodes 510 and being received by the profile device 500.
  • It will be appreciated that the ping response messages referred to in this document may alternatively be described as probe response messages and that references to a response device may be taken to include a group of response devices when the probe messages are addressed to more than one device.
  • The ping response message 504, 505, 508, 509 may contain data that comprises an opcode that is set to identify the message as a ping message, and also as a ping response sub-message within the ping message type. The ping message 504, 505, 508, 509 may contain data that identifies the message as a response to a ping request message that may be addressed to a particular communication device.
  • Once the response to the ping request message 502 has been received by the profile device 500, the profile device 500 can form the next ping request 506 and transmit it for transmission over the communication network to response device 520. Alternatively, if no response is received from the response device 520 within a predefined time period, a timeout period, then the profile device 500 can form the next ping request 506 and transmit it for transmission over the communication network to response device 520, on the basis that the previous ping request and/or response was lost in the network.
  • The profile device 500 may log the number of ping responses that it receives from the response device 520. The profile device 500 may log the number in a counter. That counter may be stored in a memory of the device. The profile device may alternatively log the number of dropped ping responses, i.e. those ping request messages that do not have a corresponding ping response message. The profile device 500 can determine whether the ping response message was received at the profile device 500 within a given time period, or timeout, of the ping request message being sent by the profile device 500.
  • Once all of the predetermined number of ping request messages (k) have been sent by the profile device 500, the profile device 500 can request that each of the network nodes 510 sends that network node's traffic statistics to the profile device 500. The network nodes 510 may include the response device 520 as it can also be a network node 510 within the communication network. This request is achieved using the diagnostic read messages discussed in relation to FIG. 4 and as shown in FIG. 5 as diagnostic read messages 511, 513 and diagnostic traffic statistics messages 512, 514. The profile device 500 may choose not to request the traffic statistics from the network nodes 510 if only the ping response statistics are required.
  • If, and once, all of the network nodes have been queried using the diagnostic traffic statistics read message 511, 513 and the network nodes have sent their responses then the profile device 500 may use these traffic statistics as per the discussion in relation to FIG. 4. As also discussed in relation to FIG. 4, alternatively, or as well as, the traffic statistics messages can be formed in to a traffic statistics log message. This log message may be sent to an analysis device 222 for further analysis to identify particular communication devices having particular properties using methods described below.
  • As theoretically twice as many messages have been sent through the network, i.e. both the ping request messages and the ping response messages, the test shown in FIG. 5 may give a better indication as to the congestion present in the network. Message have also originated from two different locations in the network.
  • As described above, the profile device 500 may log either the number of ping requests that have successfully been responded to by the response device 520 or the number of ping requests that have not been responded to within a given time period. Based on the log, the profile device 500, or the analysis device 222, may calculate the reliability of the communication network as the ratio, or percentage, of messages for which a reply was successfully received. The profile device 500 may include this reliability in the traffic statistics log message that is sent to the analysis device 222.
  • As discussed above, each ping message 502, 506 that is sent by the profile device 500 can comprise a payload that may contain a unique identifier that identifies that particular ping message separate from the other of the predefined number of ping messages. The ping message unique identifier may be an incremental count that is incremented for each ping message that is sent. Each ping message can comprise a payload that may also contain a packet sent time. This sent time is a record of the time that the packet was sent by the profile device 500.
  • The ping response messages can comprise a payload that may contain a packet received time. The packet received time may also be known as the ping request received time. This packet received time is a record of the time that the particular ping request message packet, to which the particular ping response message is a response, was received by the response device 520. The profile device 500 may log the sent time, which is included in each particular ping request message, for each particular ping request message. When the profile device 500 receives the ping response messages that contain the packet receive time, the profile device 500 may log the received time against the identifier of the particular ping request message. At the end of the ping process, the profile device 500 may then calculate the difference between the sent time and the received time to calculate the delay, for that particular ping request message, caused by transmission through the communications network.
  • The profile device 500 may also log the time at which the ping response message is received by the profile device 500. The profile device 500 may calculate the difference between the receive time of the ping response message and the sent time of the ping request message to generate the round-trip time through the communication network.
  • The calculated delay for each successful ping request may be averaged to generate the average delay over the whole test. The minimum and maximum values may also be selected to generate the maximum and minimum delays through the network. The maximum and/or minimum delays could be compared to the lifetime value included in the particular ping response message. This comparison could show whether the difference in delay is caused by a longer path through the network, i.e. more retransmissions, or slow retransmission of the message at each hop in the mesh network, i.e. a low number of retransmissions but a higher time between each retransmission. This calculation and comparison may be undertaken by either analysis device 222 or profile device 500.
  • The above has described a number of ways in which the mesh network may be profiled to establish the performance of the mesh network. These tests may generate data concerning:
      • the congestion in the mesh network (i.e. how well the mesh network is coping with a certain level of throughput of packets/messages);
      • the reliability of the mesh network in transporting messages between two network nodes, two particular communication devices, of the mesh network (i.e. how many of the messages between these two devices are successfully transported by the mesh network); and/or
      • the delay in message transport that is introduced by the transport of messages between two network nodes, two particular communication devices, of the mesh network (i.e. how long it takes messages sent between these two devices to propagate through the mesh network from one to the other of those two devices).
  • The profile device 400, 500 may first run the test shown in FIG. 4 where the mesh network is generally profiled using ping request messages, or probe messages, that are not addressed any network node present in the network to determine how messages propagate through the network when sent from one device. The profile device 400, 500 may then identify particular network nodes to profile further based on the data generated by the test shown in FIG. 4. Alternatively, the analysis device 222 may identify particular nodes to profile further based on the data generated by the tests shown in FIG. 4 and sent to the analysis device 222 in the traffic statistics log message. The analysis device 222 may then send an instruction message to profile device 400, 500 instructing the profile device 400, 500 to profile further.
  • The analysis device, or profile device 400, 500, may identify network nodes 410, 510 that have a particular set of message reception characteristics. These message reception characteristics may comprise:
      • a high repeated message count which may indicate a network node 410, 510 that is located within reception range of a plurality of other network nodes.
      • a low repeated message count which may indicate a network node 410, 510 that is located at the edge of the mesh network and in communication with few other network nodes.
      • a low average received signal strength of the messages received by the network node. This may indicate a network node that is located near the edge of the mesh network because the signals that are received by that network node are low.
  • The profile device 400, 500 may then run at least one of the tests shown in FIG. 5 between the profile device 400, 500 and the one or more network nodes that have been selected based on the message reception characteristics. The profile device 400, 500 can run the test or tests against each of the selected network nodes in turn designating each one as the response device and addressing the probe messages, or ping requests, at that network node 410, 510.
  • The results of these tests may be used to identify characteristics of the underlying mesh network such as bottlenecks, articulation points, and/or bridges between different parts of the mesh network. As discussed above an articulation point and/or a bridge may be a mesh device that links two parts of the mesh network together. As an example, it follows therefore that such a device may be a bottleneck within the network as that one device can be responsible for retransmission of message between the two parts of the mesh network. Such an identification may be undertaken by the analysis device 222, or alternatively by profile device 400, 500.
  • The results of these tests may be used to identify network nodes that are operating sub-optimally. The results of these tests may also identify network nodes in the mesh network that are operating sub-optimally within the mesh network, for instance because they are located at the edge of the transmit region of the other network nodes. The identification of these network nodes can then mean that recommendations can be compiled as to how the performance of the mesh network can be improved.
  • The bottlenecks, articulation points and/or bridges can be individual network nodes within the mesh network that link different portions of the mesh network together. For instance, as the window communication device 219 can do in FIG. 2 in linking the upstairs lights to the downstairs lights. These restriction points in the mesh network can be grouped together as having a similar set of properties. A restriction point may be identified by the test results described above.
  • A mesh node that is functioning as a restriction point may comprise one or more of the following characteristics:
      • a high level of congestion at that particular mesh node, this may indicate that a single node is handling the retransmission within a particular area of the mesh network;
      • a high repeated message count, this may indicate that the network node is a convergence point in the network and is receiving messages from many sources.
      • a high level of bounce back messages, these are messages that are received that have a lifetime value adjusted by one increment meaning that it has only been retransmitted once. In the example of the lifetime value being a TTL, receiving messages with a TTL of one less than the message sent. This may show that the node has many immediate neighbours.
  • Once a mesh node has been identified as a restriction point this information can be presented to the user, either directly by the profile device 400, 500 or by sending information to another device for presentation to the user, with a recommendation that another mesh communication device be installed near the identified device.
  • The analysis device 222, or profile device 400, 500, may also send an instruction to the communication device that has been identified as a restriction point to increase its listening duty cycle so that it is listening for messages to retransmit for a longer proportion of the time. This instruction may be in the form of a configuration message that comprises a payload that contains data containing an instruction to the identified communication device to increase the device's duty cycle. The duty cycle update message may be addressed to the particular identified communication device.
  • A mesh node that is operating sub-optimally because it is operating on the edge of the mesh network may comprise one or more of the following characteristics:
      • a low average received signal strength;
      • a low repeated message count;
      • a repeated message count that is less than the number of messages transmitted by the mesh node.
  • Once a mesh node has been identified as a peripheral network node this information can be presented to the user, either directly by the profile device 400, 500 or by sending information to another device for presentation to the user, with a recommendation that another mesh communication device be installed between the identified device and the rest of the mesh network. The presentation device may be the profile device 400, 500 itself or another device. The presentation device may be a device such as tablet computer 210.
  • The applicant hereby discloses in isolation each individual feature described herein and any combination of two or more such features, to the extent that such features or combinations are capable of being carried out based on the present specification as a whole in the light of the common general knowledge of a person skilled in the art, irrespective of whether such features or combinations of features solve any problems disclosed herein, and without limitation to the scope of the claims. The applicant indicates that aspects of the present invention may consist of any such individual feature or combination of features. In view of the foregoing description it will be evident to a person skilled in the art that various modifications may be made within the scope of the invention.

Claims (20)

What is claimed is:
1. An analysis device for analysing a communication network comprising a plurality of communication devices, the communication network being configured such that transport of packets through the network is provided by the communication devices in the network listening for and relaying packets, the analysis device being configured to:
receive a traffic statistics log from a profile device, the traffic statistics log comprising a traffic statistics message from each of the plurality of communication devices, each traffic statistics message comprising data defining at least one reception property of the reception of at least one probe message at the respective communication device; and
identify, based on the at least one reception property, at least one restriction point communication device from the plurality of communication devices that is a restriction point in the network.
2. The analysis device according to claim 1, the analysis device being configured to:
calculate a network reception property for each different reception property received from the plurality of communication devices; and
identify at least one restriction point communication device that is a restriction point by selecting the at least one communication device from the plurality of communication devices that have at least one reception property that deviates from the at least one network reception property by a predetermined threshold value.
3. The analysis device according to claim 2, the analysis device being configured to:
calculate each network reception property by taking the average of the respective reception property received from each communication device; and
identify at least one restriction point communication device that is a restriction point by selecting the communication devices that deviate from that average by a predetermined threshold value.
4. The analysis device according to claim 1, the analysis device being configured to:
send a configuration message to each of the at least one restriction point communication device, the configuration message comprising data instructing the restriction point communication device to increase that communication device's duty cycle.
5. The analysis device according to claim 4, wherein the restriction point communication device listens for messages only a proportion of the time and the instruction to increase that device's duty cycle comprises an instruction to listen for a larger proportion of the time.
6. The analysis device according to claim 1, the analysis device being configured to:
generate a recommendation message comprising data containing a recommendation to install another communication device near each restriction point communication device; and
send the recommendation message to a presentation device for display to a user of the mesh network.
7. The analysis device according to claim 1, wherein the at least one reception property comprises at least one of: a number of unique messages received at the respective communication device, a number of repeated messages received at the respective communication device, a number of unknown network messages received at the respective communication device, and the average received signal strength of the messages received at the respective communication device.
8. The analysis device according to claim 1, wherein the traffic statistics log comprises a reliability property for the communication network which is based on a number of probe messages that the profile device receives a response to; and the analysis device is configured to identify at least one restriction point communication device based on the reliability property.
9. The analysis device according to claim 1, wherein the traffic statistics log comprises a delay property for the communication network which is based on the difference between receive times at which the probe messages are received by the respective communication devices and send times at which the probe messages are sent by the profile device; and the analysis device is configured to identify at least one restriction point based on the delay property.
10. The analysis device according to claim 1, wherein the traffic statistics log comprises values of the lifetime field of the probe messages as received by an addressed communication device; and the analysis device is configured to identify at least one restriction point based on the averaged value of the lifetime fields.
11. A communication device capable of communicating over a communication network comprising a plurality of communication devices, the communication network being configured such that transport of packets through the network is provided by the communication devices in the network listening for and relaying packets, the communication device being configured to:
send a plurality of probe messages for transmission through the communication network;
send a traffic statistic request message to each of the plurality of communication devices; and
receive a traffic statistics message from each of the plurality of communication devices, each traffic statistics message comprising data defining at least one reception property of the reception of at least one of the probe messages at the respective communication device.
12. The communication device according to claim 11, the communication device being configured to:
form a traffic statistics log message the traffic statistics log comprising the traffic statistics messages from each of the plurality of communication devices; and
send the traffic statistics log message to an analysis device.
13. The communication device according to claim 11, the communication device being configured to:
form the plurality of probe messages so that each probe message comprises data containing a unique identifier that identifies that particular probe message separate from the others of the plurality of probe messages.
14. The communication device according to claim 13, the communication device being configured to:
form the plurality of probe messages so that the unique identifier is an incremental count which increases sequentially in turn for each sent probe message.
15. The communication device according to claim 11, the communication device being configured to:
form the plurality of probe messages so that each probe message comprises data containing an address field specifying the address of at least one communication device that the probe message is addressed to, and the address field contains an address of at least one of the plurality of communication devices;
receive a probe message response for at least one of the plurality of probe messages from the at least one addressed communication device, each probe message response comprising data containing the unique identifier of the probe message that the probe message response is a response to; and
calculate a reliability property for the communication network based on a number of distinct unique identifiers that are present in the probe message responses.
16. The communication device according to claim 11, the communication device being configured to:
form the plurality of probe messages so that each probe message comprises data containing a sent time at which that particular probe message is sent by the communication device.
17. The communication device according to claim 11, the communication device being configured to:
form the plurality of probe messages so that each probe message comprises data containing an address field specifying the address of at least one communication device that the probe message is addressed to, and the address field contains an address of at least one of the plurality of communication devices;
receive a probe message response for at least one of the plurality of probe messages from the at least one addressed communication device, each probe message response comprising data containing a receive time at which that particular probe message is received by the communication device; and
calculate a delay property for the communication network based on the difference between the receive time and the sent time of the probe messages.
18. The communication device according to claim 15, the communication device being configured to:
form the plurality of probe messages so that each probe message comprises data containing a lifetime field specifying the retransmission lifetime of the message; and each probe message response comprises data containing the value of the lifetime field of that particular probe message as received by the addressed communication device.
19. The communication device according to claim 11, the communication device being configured to:
form the plurality of probe messages so that each probe message comprises data containing an address field specifying the address of the communication device that the probe message is addressed to, and the address field contains a communication device address that is not present in the communication network.
20. A method for identifying restriction point devices within a communication network comprising a plurality of communication devices, the communication network being configured such that transport of packets through the network is provided by the communication devices in the network listening for and relaying packets, the method comprising:
sending a plurality of probe messages for transmission through the communication network;
sending a traffic statistic request message to each of the plurality of communication devices;
receiving a traffic statistics message from each of the plurality of communication devices, each traffic statistics message comprising data defining at least one reception property of the reception of at least one of the probe messages at the respective communication device; and
identifying, based on the at least one reception property, at least one restriction point communication device from the plurality of communication devices that is a restriction point in the network.
US14/505,466 2014-02-25 2014-10-02 Mesh profiling Abandoned US20150244623A1 (en)

Applications Claiming Priority (18)

Application Number Priority Date Filing Date Title
GB1403312.0A GB2515853B (en) 2014-02-25 2014-02-25 Latency mitigation
GB1403312.0 2014-02-25
GB1403314.6A GB2512733B (en) 2014-02-25 2014-02-25 Broadcast retransmission
GB1403314.6 2014-02-25
GB1405789.7 2014-03-31
GB1405790.5 2014-03-31
GB1405791.3A GB2512748B (en) 2014-02-25 2014-03-31 Auto-configuration of a mesh relay's TX/RX schedule
GB1405786.3A GB2512746B (en) 2014-02-25 2014-03-31 Thwarting traffic analysis
GB1405786.3 2014-03-31
GB1405797.0A GB2512749B (en) 2014-02-25 2014-03-31 Linking ad hoc networks
GB1405791.3 2014-03-31
GB1405797.0 2014-03-31
GB1405785.5A GB2512501A (en) 2014-02-25 2014-03-31 Packet identification
GB1405789.7A GB2512502B (en) 2014-02-25 2014-03-31 Device authentication
GB1405790.5A GB2512747B (en) 2014-02-25 2014-03-31 Mesh relay
GB1405785.5 2014-03-31
GB1412714.6 2014-07-17
GB1412714.6A GB2512256B8 (en) 2014-02-25 2014-07-17 Mesh profiling

Publications (1)

Publication Number Publication Date
US20150244623A1 true US20150244623A1 (en) 2015-08-27

Family

ID=50737759

Family Applications (14)

Application Number Title Priority Date Filing Date
US14/270,884 Abandoned US20150244648A1 (en) 2014-02-25 2014-05-06 Auto-configuration of a mesh relay's tx/rx schedule
US14/270,961 Active 2035-05-12 US10055570B2 (en) 2014-02-25 2014-05-06 Mesh relay
US14/297,324 Active 2034-12-08 US9489506B2 (en) 2014-02-25 2014-06-05 Linking ad hoc networks
US14/298,177 Abandoned US20150245203A1 (en) 2014-02-25 2014-06-06 Packet identification
US14/316,404 Abandoned US20150245204A1 (en) 2014-02-25 2014-06-26 Device authentication
US14/316,529 Abandoned US20150244828A1 (en) 2014-02-25 2014-06-26 Thwarting traffic analysis
US14/505,465 Abandoned US20150244565A1 (en) 2014-02-25 2014-10-02 Network configuration
US14/505,458 Active US9672346B2 (en) 2014-02-25 2014-10-02 Object tracking by establishing a mesh network and transmitting packets
US14/505,466 Abandoned US20150244623A1 (en) 2014-02-25 2014-10-02 Mesh profiling
US14/505,437 Abandoned US20150245369A1 (en) 2014-02-25 2014-10-02 Communicating data over a mesh network
US14/505,399 Active 2035-04-03 US9910976B2 (en) 2014-02-25 2014-10-02 Processing mesh communications
US14/505,418 Abandoned US20150242614A1 (en) 2014-02-25 2014-10-02 Provisioning of security credentials
US14/505,443 Active 2035-06-01 US9754096B2 (en) 2014-02-25 2014-10-02 Update management
US14/505,454 Expired - Fee Related US9842202B2 (en) 2014-02-25 2014-10-02 Device proximity

Family Applications Before (8)

Application Number Title Priority Date Filing Date
US14/270,884 Abandoned US20150244648A1 (en) 2014-02-25 2014-05-06 Auto-configuration of a mesh relay's tx/rx schedule
US14/270,961 Active 2035-05-12 US10055570B2 (en) 2014-02-25 2014-05-06 Mesh relay
US14/297,324 Active 2034-12-08 US9489506B2 (en) 2014-02-25 2014-06-05 Linking ad hoc networks
US14/298,177 Abandoned US20150245203A1 (en) 2014-02-25 2014-06-06 Packet identification
US14/316,404 Abandoned US20150245204A1 (en) 2014-02-25 2014-06-26 Device authentication
US14/316,529 Abandoned US20150244828A1 (en) 2014-02-25 2014-06-26 Thwarting traffic analysis
US14/505,465 Abandoned US20150244565A1 (en) 2014-02-25 2014-10-02 Network configuration
US14/505,458 Active US9672346B2 (en) 2014-02-25 2014-10-02 Object tracking by establishing a mesh network and transmitting packets

Family Applications After (5)

Application Number Title Priority Date Filing Date
US14/505,437 Abandoned US20150245369A1 (en) 2014-02-25 2014-10-02 Communicating data over a mesh network
US14/505,399 Active 2035-04-03 US9910976B2 (en) 2014-02-25 2014-10-02 Processing mesh communications
US14/505,418 Abandoned US20150242614A1 (en) 2014-02-25 2014-10-02 Provisioning of security credentials
US14/505,443 Active 2035-06-01 US9754096B2 (en) 2014-02-25 2014-10-02 Update management
US14/505,454 Expired - Fee Related US9842202B2 (en) 2014-02-25 2014-10-02 Device proximity

Country Status (3)

Country Link
US (14) US20150244648A1 (en)
DE (13) DE102014012257B4 (en)
GB (18) GB2512502B (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9489506B2 (en) 2014-02-25 2016-11-08 Qualcomm Technologies International, Ltd. Linking ad hoc networks
US9692538B2 (en) 2014-02-25 2017-06-27 Qualcomm Technologies International, Ltd. Latency mitigation
WO2017116642A1 (en) * 2015-12-29 2017-07-06 Pathela Vivek System and method of troubleshooting network source inefficiency
WO2019177505A1 (en) 2018-03-16 2019-09-19 Telefonaktiebolaget Lm Ericsson (Publ) Methods and nodes for obtaining information regarding a bluetooth mesh network
US10554562B2 (en) * 2017-12-22 2020-02-04 International Business Machines Corporation Streaming network
US10673646B1 (en) * 2018-12-09 2020-06-02 Olibra Llc System, device, and method of multi-path wireless communication
US10944669B1 (en) 2018-02-09 2021-03-09 GoTenna, Inc. System and method for efficient network-wide broadcast in a multi-hop wireless network using packet echos
US20220086943A1 (en) * 2020-09-11 2022-03-17 Volkswagen Aktiengesellschaft Method for controlling a communication between a vehicle and a backend device
US11811642B2 (en) 2018-07-27 2023-11-07 GoTenna, Inc. Vine™: zero-control routing using data packet inspection for wireless mesh networks

Families Citing this family (120)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103974225B (en) * 2013-02-01 2018-03-13 财团法人工业技术研究院 Communication device, device-to-device communication system and wireless communication method thereof
US8989053B1 (en) 2013-11-29 2015-03-24 Fedex Corporate Services, Inc. Association management in a wireless node network
US9451462B2 (en) * 2014-08-10 2016-09-20 Belkin International Inc. Setup of multiple IoT network devices
US9918351B2 (en) * 2014-04-01 2018-03-13 Belkin International Inc. Setup of multiple IOT networks devices
US10453023B2 (en) 2014-05-28 2019-10-22 Fedex Corporate Services, Inc. Methods and node apparatus for adaptive node communication within a wireless node network
US9386605B2 (en) * 2014-07-11 2016-07-05 Motorola Solutions, Inc. Mobile dynamic mesh cluster bridging method and apparatus at incident scenes
US9872240B2 (en) 2014-08-19 2018-01-16 Belkin International Inc. Network device source entity triggered device configuration setup
FR3026587A1 (en) * 2014-09-30 2016-04-01 Orange METHOD OF ACCESS BY A MASTER DEVICE TO A VALUE TAKEN BY A CHARACTERISTIC MANAGED BY A PERIPHERAL DEVICE
FR3031822B1 (en) * 2015-01-16 2018-04-13 Airbus Operations DOWNLOADING DATA ON REMOTE EQUIPMENT
US10681479B2 (en) 2015-01-30 2020-06-09 Cassia Networks Inc. Methods, devices and systems for bluetooth audio transmission
US9769594B2 (en) * 2015-01-30 2017-09-19 Cassia Networks Inc. Methods, devices and systems for increasing wireless communication range
US11238397B2 (en) 2015-02-09 2022-02-01 Fedex Corporate Services, Inc. Methods, apparatus, and systems for generating a corrective pickup notification for a shipped item using a mobile master node
US9426616B1 (en) 2015-02-10 2016-08-23 Tyco Fire & Security Gmbh Wireless sensor network controlled low energy link
FR3033118B1 (en) * 2015-02-19 2017-02-17 Sigfox METHOD AND SYSTEM FOR WIRELESS COMMUNICATION BETWEEN TERMINALS AND SEMI-DUPLEX BASE STATIONS
US11122034B2 (en) 2015-02-24 2021-09-14 Nelson A. Cicchitto Method and apparatus for an identity assurance score with ties to an ID-less and password-less authentication system
US11171941B2 (en) * 2015-02-24 2021-11-09 Nelson A. Cicchitto Mobile device enabled desktop tethered and tetherless authentication
US10848485B2 (en) 2015-02-24 2020-11-24 Nelson Cicchitto Method and apparatus for a social network score system communicably connected to an ID-less and password-less authentication system
WO2016137377A1 (en) 2015-02-26 2016-09-01 Telefonaktiebolaget Lm Ericsson (Publ) Energy efficient ble mesh initialisation and operation
JP6566669B2 (en) * 2015-03-12 2019-08-28 キヤノン株式会社 Information processing apparatus, control method thereof, communication method, and program
TWI552001B (en) * 2015-04-13 2016-10-01 聚眾聯合科技股份有限公司 Connection information sharing system, computer program, and connection information sharing method thereof
CN106304303B (en) * 2015-06-09 2019-11-12 沈阳中科奥维科技股份有限公司 A kind of power regulating method suitable for WIA-PA wireless network
US10375492B2 (en) 2015-06-30 2019-08-06 Sonova, AG Method of fitting a hearing assistance device
EP3320721A4 (en) * 2015-07-06 2018-08-01 Telefonaktiebolaget LM Ericsson (publ) Apparatus and method for forwarding messages
US9985839B2 (en) 2015-07-08 2018-05-29 Fedex Corporate Services, Inc. Systems, apparatus, and methods of event monitoring for an event candidate within a wireless node network based upon sighting events, sporadic events, and benchmark checkpoint events
US9503969B1 (en) 2015-08-25 2016-11-22 Afero, Inc. Apparatus and method for a dynamic scan interval for a wireless device
US9843929B2 (en) 2015-08-21 2017-12-12 Afero, Inc. Apparatus and method for sharing WiFi security data in an internet of things (IoT) system
EP3357266B1 (en) * 2015-09-30 2020-10-28 Google LLC Systems, devices, and methods for simulataneously exchanging messages between a low-energy radio device and multiple communication devices
US10990616B2 (en) * 2015-11-17 2021-04-27 Nec Corporation Fast pattern discovery for log analytics
US10432461B2 (en) * 2015-12-04 2019-10-01 T-Mobile Usa, Inc. Peer-to-peer distribution of radio protocol data for software defined radio (SDR) updates
KR102381371B1 (en) 2015-12-10 2022-03-31 삼성전자주식회사 System and method for providing information by using near field communication
US10447784B2 (en) 2015-12-14 2019-10-15 Afero, Inc. Apparatus and method for modifying packet interval timing to identify a data transfer condition
US10091242B2 (en) 2015-12-14 2018-10-02 Afero, Inc. System and method for establishing a secondary communication channel to control an internet of things (IOT) device
US10805344B2 (en) * 2015-12-14 2020-10-13 Afero, Inc. Apparatus and method for obscuring wireless communication patterns
US9992065B2 (en) * 2015-12-15 2018-06-05 T-Mobile Usa, Inc. Selective wi-fi calling router updates
US10659442B1 (en) * 2015-12-21 2020-05-19 Marvell International Ltd. Security in smart configuration for WLAN based IOT device
US10708842B2 (en) * 2016-01-13 2020-07-07 Locus Control LLC Low power communications system
US10148453B2 (en) * 2016-02-24 2018-12-04 Qualcomm Incorporated Using update slot to synchronize to Bluetooth LE isochronous channel and communicate state changes
CA3014870A1 (en) 2016-03-23 2017-09-28 Fedex Corporate Services, Inc. Systems, apparatus, and methods for self-adjusting a broadcast setting of a node in a wireless node network
GB2549735B (en) * 2016-04-26 2020-07-29 Checkit Ltd Network access control
US10644746B2 (en) 2016-04-29 2020-05-05 Texas Instruments Incorporated Pseudo channel hopping using scan dwell times in mesh networks without time synchronization
US10205606B2 (en) 2016-06-15 2019-02-12 Abl Ip Holding Llc Mesh over-the-air (OTA) luminaire firmware update
US10873854B2 (en) * 2016-07-28 2020-12-22 Lg Electronics Inc. Method and apparatus for establishing connection of devices
US10798548B2 (en) * 2016-08-22 2020-10-06 Lg Electronics Inc. Method for controlling device by using Bluetooth technology, and apparatus
EP3312762B1 (en) * 2016-10-18 2023-03-01 Axis AB Method and system for tracking an object in a defined area
US9781603B1 (en) 2016-10-20 2017-10-03 Fortress Cyber Security, LLC Combined network and physical security appliance
US10348514B2 (en) * 2016-10-26 2019-07-09 Abl Ip Holding Llc Mesh over-the-air (OTA) driver update using site profile based multiple platform image
US11210678B2 (en) 2016-11-18 2021-12-28 Samsung Electronics Co., Ltd. Component for provisioning security data and product including the same
US10728026B2 (en) * 2016-11-24 2020-07-28 Samsung Electronics Co., Ltd. Data management method
DE102016124168A1 (en) * 2016-12-13 2018-06-14 Endress+Hauser Conducta Gmbh+Co. Kg Method for operating a specific field device via a mobile operating device
EP3558117A1 (en) * 2016-12-20 2019-10-30 Abbott Diabetes Care Inc. Systems, devices and methods for wireless communications in analyte monitoring devices
CN106792853B (en) * 2016-12-22 2020-05-12 青岛亿联客信息技术有限公司 New equipment adding method for Bluetooth mesh network
CN106713047A (en) * 2017-01-12 2017-05-24 泰凌微电子(上海)有限公司 Node upgrading method and system in mesh network
US10433134B2 (en) 2017-01-24 2019-10-01 Arris Enterprises Llc Video gateway as an internet of things mesh enhancer apparatus and method
CN110168454B (en) * 2017-02-21 2022-05-06 欧姆龙株式会社 Method for controlling a field device, control device, technical system and storage medium
US10362612B2 (en) * 2017-03-06 2019-07-23 Citrix Systems, Inc. Virtual private networking based on peer-to-peer communication
AU2018231407B2 (en) * 2017-03-08 2023-02-16 Hitachi Energy Ltd Methods and devices for providing cyber security for time aware end-to-end packet flow networks
DE102017106381A1 (en) 2017-03-24 2018-09-27 Newtec Gmbh Method and apparatus for wirelessly transmitting a data signal
EP3610661A4 (en) * 2017-04-10 2020-09-16 Itron Networked Solutions, Inc. Efficient internet-of-things device configuration via quick response codes
US10116523B1 (en) * 2017-04-12 2018-10-30 Fisher-Rosemount Systems, Inc. Predictive connectivity diagnostics for a wireless mesh network in a process control system
US11229023B2 (en) 2017-04-21 2022-01-18 Netgear, Inc. Secure communication in network access points
US10605609B2 (en) 2017-05-03 2020-03-31 Microsoft Technology Licensing, Llc Coupled interactive devices
DE102017207871A1 (en) * 2017-05-10 2018-11-15 Tridonic Gmbh & Co Kg Firmware Update-Over-The Air (FOTA) in building technology
CA3063105A1 (en) 2017-05-23 2018-11-29 Walmart Apollo, Llc Automated inspection system
US10389854B2 (en) * 2017-06-15 2019-08-20 Infinet, LLC Method and system for forming an ad-hoc network over heterogeneous protocols
US9955307B1 (en) * 2017-08-03 2018-04-24 Here Global B.V. Distributed relative positioning
CN110892741A (en) * 2017-08-15 2020-03-17 通用电气公司 Intelligent equipment, intelligent equipment using method and intelligent lamp
US10666624B2 (en) * 2017-08-23 2020-05-26 Qualcomm Incorporated Systems and methods for optimized network layer message processing
CN107635215A (en) * 2017-08-25 2018-01-26 西安电子科技大学 Mesh network-building methods based on low-power consumption bluetooth
US10951653B2 (en) 2017-09-22 2021-03-16 Samsung Electronics Co., Ltd. Apparatus including secure component and method of provisioning security information into the apparatus
CN107508714B (en) * 2017-09-26 2020-09-15 深圳市微智电子有限公司 Method and device for carrying out network configuration on Bluetooth equipment based on Bluetooth mesh
US11146395B2 (en) 2017-10-04 2021-10-12 Amir Keyvan Khandani Methods for secure authentication
CN109756324A (en) * 2017-11-02 2019-05-14 大唐移动通信设备有限公司 Cryptographic key negotiation method, terminal and gateway in a kind of Mesh network
US11490400B2 (en) * 2017-11-15 2022-11-01 Telefonaktiebolaget Lm Ericsson (Publ) End node, relay node, and methods performed therein for handling transmission of information
CN108064034A (en) * 2017-11-17 2018-05-22 芯海科技(深圳)股份有限公司 A kind of data collection network method of mesh networkings
EP3489922B1 (en) 2017-11-24 2022-01-05 Andreas Stihl AG & Co. KG Method of operating a wireless transmitter and a wireless receiver and system
WO2019105523A1 (en) * 2017-11-28 2019-06-06 Telefonaktiebolaget Lm Ericsson (Publ) Message transmission with reduced interference
WO2019117763A1 (en) * 2017-12-11 2019-06-20 Telefonaktiebolaget Lm Ericsson (Publ) Channel scanning in a mesh network
RU2666306C1 (en) * 2017-12-27 2018-09-06 федеральное государственное автономное образовательное учреждение высшего образования "Санкт-Петербургский политехнический университет Петра Великого" (ФГАОУ ВО "СПбПУ") Method of controlling communication of single-range intercomputer data network
US10607012B2 (en) 2017-12-29 2020-03-31 Delphian Systems, LLC Bridge computing device control in local networks of interconnected devices
US10706179B2 (en) * 2018-01-10 2020-07-07 General Electric Company Secure provisioning of secrets into MPSoC devices using untrusted third-party systems
KR102530441B1 (en) 2018-01-29 2023-05-09 삼성전자주식회사 Electronic device, external electronic device, system comprising the same and control method thereof
US11448632B2 (en) 2018-03-19 2022-09-20 Walmart Apollo, Llc System and method for the determination of produce shelf life
US11658865B2 (en) * 2018-03-20 2023-05-23 Delphian Systems, LLC Updating devices in a local network of interconnected devices
CN111886835B (en) 2018-03-23 2023-07-28 瑞典爱立信有限公司 Message cache management in a mesh network
US10311705B1 (en) * 2018-03-29 2019-06-04 Saudi Arabian Oil Company Distributed industrial facility safety system
US10303147B1 (en) 2018-03-29 2019-05-28 Saudi Arabian Oil Company Distributed industrial facility safety system modular remote sensing devices
US10613505B2 (en) 2018-03-29 2020-04-07 Saudi Arabian Oil Company Intelligent distributed industrial facility safety system
US11018871B2 (en) * 2018-03-30 2021-05-25 Intel Corporation Key protection for computing platform
KR102114992B1 (en) * 2018-04-25 2020-05-25 (주)휴맥스 Wireless communication equipment and method for configuring mesh network thereof
US11308950B2 (en) 2018-05-09 2022-04-19 4PLAN Corporation Personal location system for virtual assistant
US11146540B2 (en) * 2018-05-09 2021-10-12 Datalogic Ip Tech S.R.L. Systems and methods for public key exchange employing a peer-to-peer protocol
CN110493758B (en) 2018-05-14 2023-01-13 阿里巴巴集团控股有限公司 Bluetooth Mesh network and network distribution method, equipment and storage medium thereof
CN110505606B (en) * 2018-05-18 2022-12-02 阿里巴巴集团控股有限公司 Bluetooth Mesh network and distribution network authentication method, equipment and storage medium thereof
US10574475B2 (en) * 2018-05-24 2020-02-25 Haier Us Appliance Solutions, Inc. Household appliance with bluetooth connection and authentication
CN111886843B (en) * 2018-06-13 2023-04-04 卧安科技(深圳)有限公司 Low power consumption Bluetooth network maintenance method, electronic device, bluetooth network and medium
CN110636478B (en) 2018-06-22 2023-04-14 阿里巴巴集团控股有限公司 Bluetooth Mesh network system, communication method, device and storage medium thereof
US10650023B2 (en) * 2018-07-24 2020-05-12 Booz Allen Hamilton, Inc. Process for establishing trust between multiple autonomous systems for the purposes of command and control
WO2020023762A1 (en) 2018-07-26 2020-01-30 Walmart Apollo, Llc System and method for produce detection and classification
US11140659B2 (en) * 2018-08-21 2021-10-05 Signify Holding B.V. Wireless organization of electrical devices by sensor manipulation
US11368436B2 (en) * 2018-08-28 2022-06-21 Bae Systems Information And Electronic Systems Integration Inc. Communication protocol
US11715059B2 (en) * 2018-10-12 2023-08-01 Walmart Apollo, Llc Systems and methods for condition compliance
FI128520B (en) 2018-11-14 2020-07-15 Xiphera Oy Method for providing a secret unique key for a volatile FPGA
WO2020106332A1 (en) 2018-11-20 2020-05-28 Walmart Apollo, Llc Systems and methods for assessing products
US11146919B2 (en) 2018-12-14 2021-10-12 Denso International America, Inc. System and method of determining real-time location
CN109673014B (en) * 2019-01-25 2022-07-15 欧普照明股份有限公司 Network combination method
CN111669732B (en) * 2019-03-06 2021-09-07 乐鑫信息科技(上海)股份有限公司 Method for filtering redundant data packets at nodes in bluetooth Mesh network
CN109862548B (en) * 2019-03-06 2021-01-26 乐鑫信息科技(上海)股份有限公司 Method for processing data packets at a node in a bluetooth Mesh network
US11777715B2 (en) 2019-05-15 2023-10-03 Amir Keyvan Khandani Method and apparatus for generating shared secrets
CN111988268A (en) * 2019-05-24 2020-11-24 魏文科 Method for establishing and verifying input value by using asymmetric encryption algorithm and application thereof
WO2021006456A1 (en) * 2019-07-05 2021-01-14 Samsung Electronics Co., Ltd. System and method for dynamic group data protection
CN110779500B (en) * 2019-11-14 2021-11-30 中国人民解放军国防科技大学 Mesoscale vortex detection method for incremental deployment sensor
KR102324374B1 (en) 2019-11-18 2021-11-11 한국전자통신연구원 Method and apparatus for configuring cluster in wireless communication system
US11245784B1 (en) * 2020-01-06 2022-02-08 Vorbeck Materials Corp. Self-organizing communications network nodes and systems
US11432167B2 (en) 2020-01-22 2022-08-30 Abl Ip Holding Llc Selective updating of nodes of a nodal wireless network
US20210273920A1 (en) * 2020-02-28 2021-09-02 Vmware, Inc. Secure certificate or key distribution for synchronous mobile device management (mdm) clients
US11166253B2 (en) * 2020-03-27 2021-11-02 Dell Products L.P. Data center automatic inventory and location data population and recovery using mesh network
WO2022148695A1 (en) * 2021-01-06 2022-07-14 Signify Holding B.V. A method of, a node device and a system for relaying a message in a network comprising at least two mesh networks
US20230266960A1 (en) * 2022-02-24 2023-08-24 Whirlpool Corporation Systems and methods of offline over the air (ota) programming of appliances
CN115051921B (en) * 2022-05-27 2023-11-07 北京交通大学 Self-adaptive heterogeneous network attribute information collection method
US11870879B1 (en) * 2023-01-04 2024-01-09 Getac Technology Corporation Device communication during emergent conditions

Citations (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6079034A (en) * 1997-12-05 2000-06-20 Hewlett-Packard Company Hub-embedded system for automated network fault detection and isolation
US20030014507A1 (en) * 2001-03-13 2003-01-16 International Business Machines Corporation Method and system for providing performance analysis for clusters
US20030083870A1 (en) * 2001-10-31 2003-05-01 Samsung Electronics Co., Ltd. System and method of network adaptive real-time multimedia streaming
US20040001483A1 (en) * 2002-06-27 2004-01-01 Schmidt Kurt E. Distribution and reconstruction of AD-HOC timing signals
US20040025099A1 (en) * 2002-07-31 2004-02-05 Aikawa Susan M. Method and system for optimizing polling in systems using negative acknowledgement protocols
US20040246911A1 (en) * 2001-10-17 2004-12-09 Bonsma Erwin R Network location management system
US6836466B1 (en) * 2000-05-26 2004-12-28 Telcordia Technologies, Inc. Method and system for measuring IP performance metrics
US20070054691A1 (en) * 2005-08-26 2007-03-08 Hari Sankar Method and apparatus for reliable transmit power and timing control in wireless communication
US20070281721A1 (en) * 2006-04-26 2007-12-06 Qualcomm Incorporated Methods and apparatuses of initiating communication in wireless networks
US20080069030A1 (en) * 2004-05-31 2008-03-20 Matsushita Electric Industrial Co., Ltd. Mobile Terminal Managing Device, Mobile Terminal, and Communication System
US7391731B1 (en) * 2002-03-07 2008-06-24 Ibasis, Inc. Method for determining best path
US20090312023A1 (en) * 2006-12-19 2009-12-17 Muhammad Ali Kazmi Handling of Idle Gap Commands in a Telecommunication System
US20110044209A1 (en) * 2006-02-17 2011-02-24 Isilon Systems, Inc. Systems and methods for providing a quiescing protocol
US20110149999A1 (en) * 2009-12-17 2011-06-23 Fujitsu Limited Reception apparatus, reception method, and reception program
US20110164512A1 (en) * 2008-09-25 2011-07-07 Fisher-Rosemount Systems, Inc Wireless mesh network with pinch point and low battery alerts
US20120102334A1 (en) * 2008-11-24 2012-04-26 Certicom Corp. System and Method for Hardware Based Security
US20120155355A1 (en) * 2009-08-21 2012-06-21 Pantech Co., Ltd. Method and system for transmitting/receiving data in a wireless communication system
US20120182860A1 (en) * 2009-10-06 2012-07-19 Hang Liu Method and apparatus for hop-by-hop reliable multicast in wireless networks
US20130107909A1 (en) * 2011-10-27 2013-05-02 Benjamin Peter John Jones Multi-path radio transmission input/output devices, network, systems and methods with link suitability determination
US20130223237A1 (en) * 2012-02-28 2013-08-29 Cisco Technology, Inc. Diverse paths using a single source route in computer networks
US20170104686A1 (en) * 2012-12-19 2017-04-13 Talari Networks Incorporated Adaptive Private Network with Path Maximum Transmission Unit (MTU) Discovery Process
US20170317937A1 (en) * 2011-03-23 2017-11-02 Hughes Network Systems, Llc System and method for providing improved quality of service over broadband networks
US20190222966A1 (en) * 2014-08-19 2019-07-18 Qualcomm Incorporated Multicasting traffic using multi-connectivity

Family Cites Families (165)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
ES2760905T3 (en) * 1998-10-30 2020-05-18 Virnetx Inc An agile network protocol for secure communications with assured system availability
US6986046B1 (en) 2000-05-12 2006-01-10 Groove Networks, Incorporated Method and apparatus for managing secure collaborative transactions
US6745027B2 (en) 2000-12-22 2004-06-01 Seekernet Incorporated Class switched networks for tracking articles
WO2002078272A1 (en) * 2001-03-23 2002-10-03 Kent Ridge Digital Labs A method and system for providing bridged mobile ad-hoc networks
US20030037237A1 (en) 2001-04-09 2003-02-20 Jean-Paul Abgrall Systems and methods for computer device authentication
DE10145596A1 (en) * 2001-09-15 2003-04-03 Philips Corp Intellectual Pty Network with several sub-networks
US6917974B1 (en) * 2002-01-03 2005-07-12 The United States Of America As Represented By The Secretary Of The Air Force Method and apparatus for preventing network traffic analysis
CA2419767C (en) 2002-02-25 2011-01-04 Olsonet Communications Corporation Method for routing ad-hoc signals
US7532862B2 (en) 2002-03-19 2009-05-12 Apple Inc. Method and apparatus for configuring a wireless device through reverse advertising
US20030212821A1 (en) 2002-05-13 2003-11-13 Kiyon, Inc. System and method for routing packets in a wired or wireless network
US7251235B2 (en) 2002-06-12 2007-07-31 Conexant, Inc. Event-based multichannel direct link
US7474874B2 (en) 2002-06-28 2009-01-06 Nokia Corporation Local browsing
EP1540875A4 (en) 2002-08-28 2011-01-26 Ntt Docomo Inc Certificate-based encryption and public key infrastructure
GB0313473D0 (en) 2003-06-11 2003-07-16 Koninkl Philips Electronics Nv Configuring a radio network for selective broadcast
KR100547133B1 (en) 2003-07-11 2006-01-26 삼성전자주식회사 Apparatus and method for constructing ad-hoc network of heterogeneous terminals
KR100640327B1 (en) * 2003-11-24 2006-10-30 삼성전자주식회사 The Frame Structure and Data Transmission Method for Bridge Operation of WPAN
US20050175184A1 (en) * 2004-02-11 2005-08-11 Phonex Broadband Corporation Method and apparatus for a per-packet encryption system
CA2558323A1 (en) 2004-03-25 2005-10-06 Research In Motion Limited Wireless access point methods and apparatus for reduced power consumption and cost
US20060025180A1 (en) 2004-07-30 2006-02-02 Qualcomm Incorporated Method for waking a wireless device
DE112005001934T5 (en) 2004-08-10 2007-07-05 MeshNetworks, Inc., Maitland Software architecture and hardware abstraction layer for multi-routing and method of providing the same
DE102004040069B3 (en) 2004-08-18 2006-03-23 Siemens Ag Establishment of a wireless communication network with determination of local topology information from the identifiers of the communication devices
US7747774B2 (en) * 2004-08-23 2010-06-29 At&T Intellectual Property I, L.P. Methods, systems and computer program products for obscuring traffic in a distributed system
EP1842203A4 (en) 2004-11-12 2011-03-23 Verayo Inc Volatile device keys and applications thereof
KR100594127B1 (en) * 2004-11-16 2006-06-28 삼성전자주식회사 Bonding process method and device in a Bluetooth device
US7496059B2 (en) * 2004-12-09 2009-02-24 Itt Manufacturing Enterprises, Inc. Energy-efficient medium access control protocol and system for sensor networks
US7533258B2 (en) 2005-01-07 2009-05-12 Cisco Technology, Inc. Using a network-service credential for access control
JP4550636B2 (en) * 2005-03-18 2010-09-22 富士通株式会社 Electronic device, its registration method and registration program
US7522540B1 (en) 2005-04-15 2009-04-21 Nvidia Corporation Extended service set mesh topology discovery
US8027289B2 (en) * 2005-04-27 2011-09-27 Raytheon Bbn Technologies Corp. Ultra-low latency packet transport in ad hoc networks
US7606178B2 (en) 2005-05-31 2009-10-20 Cisco Technology, Inc. Multiple wireless spanning tree protocol for use in a wireless mesh network
US7653011B2 (en) 2005-05-31 2010-01-26 Cisco Technology, Inc. Spanning tree protocol for wireless networks
US7894372B2 (en) 2005-05-31 2011-02-22 Iac Search & Media, Inc. Topology-centric resource management for large scale service clusters
US7844308B2 (en) 2005-06-01 2010-11-30 Millennial Net, Inc. Communicating over a wireless network
US9654200B2 (en) 2005-07-18 2017-05-16 Mutualink, Inc. System and method for dynamic wireless aerial mesh network
KR101298155B1 (en) * 2005-07-21 2013-09-16 파이어타이드, 인코포레이티드 Method for enabling the efficient operation of arbitrarily interconnected mesh networks
US7787361B2 (en) 2005-07-29 2010-08-31 Cisco Technology, Inc. Hybrid distance vector protocol for wireless mesh networks
US7778270B1 (en) 2005-08-31 2010-08-17 Hrl Laboratories, Llc Code-switching in wireless multi-hop networks
US7546139B2 (en) 2005-12-27 2009-06-09 F4W, Inc. System and method for establishing and maintaining communications across disparate networks
US20100005294A1 (en) * 2005-10-18 2010-01-07 Kari Kostiainen Security in Wireless Environments Using Out-Of-Band Channel Communication
JP4641245B2 (en) 2005-10-26 2011-03-02 三菱電機株式会社 Ad hoc network system, wireless ad hoc terminal and failure detection method thereof
US7978666B2 (en) * 2005-10-31 2011-07-12 Robert Bosch Gmbh Node control in wireless sensor networks
US7539488B2 (en) 2005-11-09 2009-05-26 Texas Instruments Norway As Over-the-air download (OAD) methods and apparatus for use in facilitating application programming in wireless network devices of ad hoc wireless communication networks
US20070110024A1 (en) 2005-11-14 2007-05-17 Cisco Technology, Inc. System and method for spanning tree cross routes
US7593376B2 (en) 2005-12-07 2009-09-22 Motorola, Inc. Method and apparatus for broadcast in an ad hoc network using elected broadcast relay nodes
US20130219482A1 (en) 2006-01-31 2013-08-22 Sigma Designs, Inc. Method for uniquely addressing a group of network units in a sub-network
US8023478B2 (en) 2006-03-06 2011-09-20 Cisco Technology, Inc. System and method for securing mesh access points in a wireless mesh network, including rapid roaming
US7647078B2 (en) * 2006-03-07 2010-01-12 Samsung Electronics Co., Ltd. Power-saving method for wireless sensor network
US8340106B2 (en) * 2006-03-13 2012-12-25 Microsoft Corporation Connecting multi-hop mesh networks using MAC bridge
US8519566B2 (en) 2006-03-28 2013-08-27 Wireless Environment, Llc Remote switch sensing in lighting devices
US7786885B2 (en) 2006-04-25 2010-08-31 Hrl Laboratories, Llc Event localization within a distributed sensor array
US8681671B1 (en) * 2006-04-25 2014-03-25 Cisco Technology, Inc. System and method for reducing power used for radio transmission and reception
CN101083597A (en) 2006-05-31 2007-12-05 朗迅科技公司 SIP based instant message of mobile self-organizing network
DE102006036109B4 (en) 2006-06-01 2008-06-19 Nokia Siemens Networks Gmbh & Co.Kg Method and system for providing a mesh key
EP2041910A4 (en) * 2006-07-06 2013-05-22 Apple Inc Wireless access point security for multi-hop networks
FR2903830B1 (en) 2006-07-11 2008-08-22 Alcatel Sa METHOD AND DEVICE FOR MONITORING OPTICAL CONNECTION PATHS FOR A TRANSPARENT OPTICAL NETWORK
US8411651B2 (en) 2006-07-27 2013-04-02 Interdigital Technology Corporation Media independent multi-rat function in a converged device
EP1892913A1 (en) 2006-08-24 2008-02-27 Siemens Aktiengesellschaft Method and arrangement for providing a wireless mesh network
US8634342B2 (en) 2006-10-05 2014-01-21 Cisco Technology, Inc. Upgrading mesh access points in a wireless mesh network
US8270302B2 (en) 2006-10-20 2012-09-18 Stmicroelectronics, Inc. System and method for providing an adaptive value of TTL (time to live) for broadcast/multicast messages in a mesh network using a hybrid wireless mesh protocol
US8149748B2 (en) 2006-11-14 2012-04-03 Raytheon Company Wireless data networking
KR100879026B1 (en) 2006-12-05 2009-01-15 한국전자통신연구원 Method for grouping among sensor nodes in heterogeneous wireless sensor networks
US8838481B2 (en) * 2011-07-26 2014-09-16 Golba Llc Method and system for location based hands-free payment
US9760146B2 (en) 2007-01-08 2017-09-12 Imagination Technologies Limited Conditional activation and deactivation of a microprocessor
US7787427B1 (en) 2007-01-09 2010-08-31 Dust Networks, Inc. Providing low average latency communication in wireless mesh networks
US20080205385A1 (en) 2007-02-26 2008-08-28 Motorola, Inc. Data frame formats to improve groupcast efficiency in multi-hop wireless networks
US8325627B2 (en) 2007-04-13 2012-12-04 Hart Communication Foundation Adaptive scheduling in a wireless network
US8942219B2 (en) 2007-04-13 2015-01-27 Hart Communication Foundation Support for network management and device communications in a wireless network
US8451752B2 (en) 2007-05-21 2013-05-28 Arrowspan, Inc. Seamless handoff scheme for multi-radio wireless mesh network
US20080292105A1 (en) 2007-05-22 2008-11-27 Chieh-Yih Wan Lightweight key distribution and management method for sensor networks
WO2009016513A2 (en) * 2007-08-01 2009-02-05 Philip Morris Products S.A. Degradable cigarette filters
US8189506B2 (en) * 2007-09-12 2012-05-29 Nokia Corporation Deep sleep mode for mesh points
KR101405688B1 (en) 2007-09-14 2014-06-12 엘지이노텍 주식회사 Zigbee system
US20090089408A1 (en) 2007-09-28 2009-04-02 Alcatel Lucent XML Router and method of XML Router Network Overlay Topology Creation
US7941663B2 (en) 2007-10-23 2011-05-10 Futurewei Technologies, Inc. Authentication of 6LoWPAN nodes using EAP-GPSK
CN101855861A (en) 2007-11-16 2010-10-06 富士通天株式会社 Authentication method, authentication system, on-vehicle device, and authentication device
US9166934B2 (en) 2007-11-25 2015-10-20 Trilliant Networks, Inc. System and method for operating mesh devices in multi-tree overlapping mesh networks
US8289883B2 (en) 2007-12-21 2012-10-16 Samsung Electronics Co., Ltd. Hybrid multicast routing protocol for wireless mesh networks
US7929446B2 (en) 2008-01-04 2011-04-19 Radiient Technologies, Inc. Mesh networking for wireless communications
KR20090090461A (en) * 2008-02-21 2009-08-26 삼성전자주식회사 Method for prolonging lifetime of sensor nodes in a wireless sensor network and system therefor
JP4613969B2 (en) 2008-03-03 2011-01-19 ソニー株式会社 Communication apparatus and communication method
US8116247B2 (en) * 2008-03-11 2012-02-14 Nokia Siemens Networks Oy Adaptive mechanism for dynamic reconfiguration of mesh networks
US8923285B2 (en) 2008-04-30 2014-12-30 Qualcomm Incorporated Apparatus and methods for transmitting data over a wireless mesh network
US9386502B2 (en) 2008-07-29 2016-07-05 Orange Routing adaptable to electromagnetic conditions in a multihop network
US8179845B2 (en) 2008-08-21 2012-05-15 Motorola Solutions, Inc. Antenna-aware method for transmitting packets in a wireless communication network
US8699377B2 (en) 2008-09-04 2014-04-15 Trilliant Networks, Inc. System and method for implementing mesh network communications using a mesh network protocol
GB2464125A (en) 2008-10-04 2010-04-07 Ibm Topology discovery comprising partitioning network nodes into groups and using multiple discovery agents operating concurrently in each group.
US8782746B2 (en) 2008-10-17 2014-07-15 Comcast Cable Communications, Llc System and method for supporting multiple identities for a secure identity device
US8294573B2 (en) 2008-12-11 2012-10-23 International Business Machines Corporation System and method for optimizing power consumption of container tracking devices through mesh networks
US8498229B2 (en) 2008-12-30 2013-07-30 Intel Corporation Reduced power state network processing
US8904177B2 (en) * 2009-01-27 2014-12-02 Sony Corporation Authentication for a multi-tier wireless home mesh network
US8254251B2 (en) 2009-02-03 2012-08-28 Mobix Wireless Solutions Ltd. Mesh hybrid communication network
US8964634B2 (en) 2009-02-06 2015-02-24 Sony Corporation Wireless home mesh network bridging adaptor
US9172612B2 (en) 2009-02-12 2015-10-27 Hewlett-Packard Development Company, L.P. Network device configuration management by physical location
EP2528279A3 (en) 2009-02-13 2013-03-27 Nokia Siemens Networks Oy Method, system and nodes for network topology detection in communication networks
US8194576B2 (en) 2009-03-27 2012-06-05 Research In Motion Limited Wireless access point methods and apparatus using dynamically-activated service intervals
US8171292B2 (en) 2009-04-08 2012-05-01 Research In Motion Limited Systems, devices, and methods for securely transmitting a security parameter to a computing device
JP5721713B2 (en) * 2009-07-23 2015-05-20 ノキア コーポレイション Method and apparatus for reducing power consumption when operating as a Bluetooth Low Energy device
JP5338567B2 (en) * 2009-08-25 2013-11-13 沖電気工業株式会社 Wireless terminal and wireless system
US8879994B2 (en) 2009-10-02 2014-11-04 Blackberry Limited Methods and devices for facilitating Bluetooth pairing using a camera as a barcode scanner
EP2306692B1 (en) * 2009-10-02 2014-05-21 BlackBerry Limited Methods and devices for facilitating bluetooth pairing using a camera as a barcode scanner
US20150058409A1 (en) 2013-03-22 2015-02-26 Frank C. Wang Enhanced content delivery system and method spanning multiple data processing systems
CN102045280B (en) 2009-10-26 2013-08-07 国基电子(上海)有限公司 Cable modem (CM) and certificate test method thereof
CN101729296B (en) 2009-12-29 2012-12-19 中兴通讯股份有限公司 Method and system for statistical analysis of ethernet traffic
EP2526505B1 (en) 2010-01-20 2015-06-17 Intrinsic ID B.V. Device and method for obtaining a cryptographic key
US10645628B2 (en) 2010-03-04 2020-05-05 Rosemount Inc. Apparatus for interconnecting wireless networks separated by a barrier
US8495618B1 (en) 2010-03-31 2013-07-23 American Megatrends, Inc. Updating firmware in a high availability enabled computer system
US8516269B1 (en) 2010-07-28 2013-08-20 Sandia Corporation Hardware device to physical structure binding and authentication
US9173196B2 (en) 2010-10-07 2015-10-27 GM Global Technology Operations LLC Adaptive multi-channel access for vehicular networks
WO2012064178A1 (en) * 2010-11-11 2012-05-18 Mimos Berhad Method for use in providing an adaptable sensor nodes schedule in a wireless sensor network
CN103222241B (en) 2010-11-25 2017-10-03 飞利浦灯具控股公司 System and method for the data transfer of the node that is optimized to wireless mesh network
US8873526B2 (en) 2010-12-17 2014-10-28 Cisco Technology, Inc. Collision avoidance for wireless networks
US20120163292A1 (en) 2010-12-23 2012-06-28 Nokia Corporation Frame Header in Wireless Communication System
US9094316B2 (en) 2011-01-28 2015-07-28 Hewlett-Packard Development Company, L.P. Dynamic name generation
US20120198434A1 (en) 2011-01-31 2012-08-02 Digi International Inc. Virtual bundling of remote device firmware upgrade
US8769525B2 (en) 2011-01-31 2014-07-01 Digi International Inc. Remote firmware upgrade device mapping
US20120196534A1 (en) 2011-02-01 2012-08-02 Nokia Corporation Method, apparatus, and computer program product for broadcasting in short-range communication
WO2012122994A1 (en) 2011-03-11 2012-09-20 Kreft Heinz Off-line transfer of electronic tokens between peer-devices
US9268545B2 (en) * 2011-03-31 2016-02-23 Intel Corporation Connecting mobile devices, internet-connected hosts, and cloud services
CN102761941B (en) 2011-04-28 2016-08-03 北京云天创科技有限公司 A kind of method utilizing ultra-low power consumption wireless smart sensor's network protocol transmission
US20130128809A1 (en) 2011-05-19 2013-05-23 Qualcomm Incorporated Apparatus and methods for media access control header compression
US8553536B2 (en) 2011-07-12 2013-10-08 General Electric Company Mesh network management system
CN102355351B (en) 2011-07-21 2014-11-05 华为技术有限公司 Key generation, backup and migration method and system based on trusted computing
US8849202B2 (en) 2011-08-19 2014-09-30 Apple Inc. Audio transfer using the Bluetooth Low Energy standard
US8982785B2 (en) 2011-09-08 2015-03-17 Cisco Technology, Inc. Access point assisted direct client discovery
US9445305B2 (en) 2011-09-12 2016-09-13 Microsoft Corporation Low energy beacon encoding
JP6276183B2 (en) 2011-09-15 2018-02-07 フィッシャー−ローズマウント システムズ,インコーポレイテッド Transmission of data frames across communication networks using incompatible network routing protocols
US8892866B2 (en) 2011-09-26 2014-11-18 Tor Anumana, Inc. Secure cloud storage and synchronization systems and methods
US8649883B2 (en) 2011-10-04 2014-02-11 Advanergy, Inc. Power distribution system and method
WO2013057666A1 (en) 2011-10-17 2013-04-25 Koninklijke Philips Electronics N.V. Automatic recommissioning of electronic devices in a networked system
US9936382B2 (en) * 2011-11-21 2018-04-03 Vital Connect, Inc. Method and system for pairing a sensor device to a user
US8953790B2 (en) 2011-11-21 2015-02-10 Broadcom Corporation Secure generation of a device root key in the field
US9191461B2 (en) 2012-02-21 2015-11-17 Entropic Communications, Inc. Software upgrade using layer-2 management entity messaging
US9172636B2 (en) 2012-02-28 2015-10-27 Cisco Technology, Inc. Efficient link repair mechanism triggered by data traffic
US20130279410A1 (en) 2012-04-18 2013-10-24 Draker, Inc. Communicating Data in a Mesh Network
US9629063B2 (en) 2012-05-09 2017-04-18 Trellisware Technologies, Inc. Method and system for global topology discovery in multi-hop ad hoc networks
US8844026B2 (en) 2012-06-01 2014-09-23 Blackberry Limited System and method for controlling access to secure resources
US20150195692A1 (en) 2012-06-26 2015-07-09 Nokia Corporation Method and apparatus for providing device ringtone coordination
US8751615B2 (en) 2012-07-18 2014-06-10 Accedian Networks Inc. Systems and methods of discovering and controlling devices without explicit addressing
JP5881047B2 (en) 2012-08-08 2016-03-09 株式会社日立製作所 Network management system, network management computer, and network management method
TW201424435A (en) 2012-09-05 2014-06-16 Interdigital Patent Holdings Methods for MAC frame extensibility and frame specific MAC header design for WLAN systems
US9208676B2 (en) 2013-03-14 2015-12-08 Google Inc. Devices, methods, and associated information processing for security in a smart-sensored home
US9081643B2 (en) 2012-09-21 2015-07-14 Silver Sring Networks, Inc. System and method for efficiently updating firmware for nodes in a mesh network
US9306660B2 (en) * 2012-10-22 2016-04-05 Qualcomm Technologies International, Ltd. Dynamic interactive zone driven proximity awareness system
US9279856B2 (en) 2012-10-22 2016-03-08 Infineon Technologies Ag Die, chip, method for driving a die or a chip and method for manufacturing a die or a chip
CN102984798B (en) 2012-11-21 2016-02-03 越亮传奇科技股份有限公司 Position-based accurate positioning method
US20140167912A1 (en) 2012-12-17 2014-06-19 David M. Snyder System, method and apparatus for providing security systems integrated with solid state lighting systems
US20140171062A1 (en) 2012-12-19 2014-06-19 Telefonaktiebolaget L M Ericsson (Publ) Wireless Devices, Network Node and Methods for Handling Relay Assistance in a Wireless Communications Network
WO2014098504A1 (en) 2012-12-19 2014-06-26 엘지전자 주식회사 Method for communicating in wireless communication system supporting multiple access network and apparatus supporting same
US9628373B2 (en) 2012-12-19 2017-04-18 Comcast Cable Communications, Llc Multipath communication in a network
US20140181172A1 (en) 2012-12-20 2014-06-26 Brent J. Elliott Offloading tethering-related communication processing
WO2014105893A1 (en) 2012-12-26 2014-07-03 Ict Research Llc Mobility extensions to industrial-strength wireless sensor networks
US9032480B2 (en) 2012-12-28 2015-05-12 Cellco Partnership Providing multiple APN connections support in a browser
US8938792B2 (en) 2012-12-28 2015-01-20 Intel Corporation Device authentication using a physically unclonable functions based key generation system
US9239723B2 (en) 2013-05-13 2016-01-19 Lenovo (Singapore) Pte. Ltd. Configuring a device based on proximity to other devices
US9264892B2 (en) 2013-07-03 2016-02-16 Verizon Patent And Licensing Inc. Method and apparatus for attack resistant mesh networks
US9983651B2 (en) 2013-07-15 2018-05-29 Google Technology Holdings LLC Low-power near-field communication authentication
US9386008B2 (en) 2013-08-19 2016-07-05 Smartguard, Llc Secure installation of encryption enabling software onto electronic devices
US20150071216A1 (en) 2013-09-09 2015-03-12 Qualcomm Connected Experiences, Inc. Allowing mass re-onboarding of headless devices
US9565576B2 (en) 2013-10-09 2017-02-07 At&T Intellectual Property I, L.P. Network operating system client architecture for mobile user equipment
US10591969B2 (en) 2013-10-25 2020-03-17 Google Technology Holdings LLC Sensor-based near-field communication authentication
US20150143130A1 (en) 2013-11-18 2015-05-21 Vixs Systems Inc. Integrated circuit provisioning using physical unclonable function
GB2512502B (en) 2014-02-25 2015-03-11 Cambridge Silicon Radio Ltd Device authentication
GB2515853B (en) 2014-02-25 2015-08-19 Cambridge Silicon Radio Ltd Latency mitigation
GB2512733B (en) 2014-02-25 2018-09-05 Qualcomm Technologies Int Ltd Broadcast retransmission
US9660836B2 (en) 2014-05-06 2017-05-23 Lattice Semiconductor Corporation Network topology discovery

Patent Citations (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6079034A (en) * 1997-12-05 2000-06-20 Hewlett-Packard Company Hub-embedded system for automated network fault detection and isolation
US6836466B1 (en) * 2000-05-26 2004-12-28 Telcordia Technologies, Inc. Method and system for measuring IP performance metrics
US20030014507A1 (en) * 2001-03-13 2003-01-16 International Business Machines Corporation Method and system for providing performance analysis for clusters
US20040246911A1 (en) * 2001-10-17 2004-12-09 Bonsma Erwin R Network location management system
US20030083870A1 (en) * 2001-10-31 2003-05-01 Samsung Electronics Co., Ltd. System and method of network adaptive real-time multimedia streaming
US7391731B1 (en) * 2002-03-07 2008-06-24 Ibasis, Inc. Method for determining best path
US20040001483A1 (en) * 2002-06-27 2004-01-01 Schmidt Kurt E. Distribution and reconstruction of AD-HOC timing signals
US20040025099A1 (en) * 2002-07-31 2004-02-05 Aikawa Susan M. Method and system for optimizing polling in systems using negative acknowledgement protocols
US20080069030A1 (en) * 2004-05-31 2008-03-20 Matsushita Electric Industrial Co., Ltd. Mobile Terminal Managing Device, Mobile Terminal, and Communication System
US20070054691A1 (en) * 2005-08-26 2007-03-08 Hari Sankar Method and apparatus for reliable transmit power and timing control in wireless communication
US20110044209A1 (en) * 2006-02-17 2011-02-24 Isilon Systems, Inc. Systems and methods for providing a quiescing protocol
US20070281721A1 (en) * 2006-04-26 2007-12-06 Qualcomm Incorporated Methods and apparatuses of initiating communication in wireless networks
US20090312023A1 (en) * 2006-12-19 2009-12-17 Muhammad Ali Kazmi Handling of Idle Gap Commands in a Telecommunication System
US20110164512A1 (en) * 2008-09-25 2011-07-07 Fisher-Rosemount Systems, Inc Wireless mesh network with pinch point and low battery alerts
US20120102334A1 (en) * 2008-11-24 2012-04-26 Certicom Corp. System and Method for Hardware Based Security
US20120155355A1 (en) * 2009-08-21 2012-06-21 Pantech Co., Ltd. Method and system for transmitting/receiving data in a wireless communication system
US20120182860A1 (en) * 2009-10-06 2012-07-19 Hang Liu Method and apparatus for hop-by-hop reliable multicast in wireless networks
US20110149999A1 (en) * 2009-12-17 2011-06-23 Fujitsu Limited Reception apparatus, reception method, and reception program
US20170317937A1 (en) * 2011-03-23 2017-11-02 Hughes Network Systems, Llc System and method for providing improved quality of service over broadband networks
US20130107909A1 (en) * 2011-10-27 2013-05-02 Benjamin Peter John Jones Multi-path radio transmission input/output devices, network, systems and methods with link suitability determination
US20130223237A1 (en) * 2012-02-28 2013-08-29 Cisco Technology, Inc. Diverse paths using a single source route in computer networks
US20170104686A1 (en) * 2012-12-19 2017-04-13 Talari Networks Incorporated Adaptive Private Network with Path Maximum Transmission Unit (MTU) Discovery Process
US20190222966A1 (en) * 2014-08-19 2019-07-18 Qualcomm Incorporated Multicasting traffic using multi-connectivity

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10055570B2 (en) 2014-02-25 2018-08-21 QUALCOMM Technologies International, Ltd Mesh relay
US9672346B2 (en) 2014-02-25 2017-06-06 Qualcomm Technologies International, Ltd. Object tracking by establishing a mesh network and transmitting packets
US9489506B2 (en) 2014-02-25 2016-11-08 Qualcomm Technologies International, Ltd. Linking ad hoc networks
US9754096B2 (en) 2014-02-25 2017-09-05 Qualcomm Technologies International, Ltd. Update management
US9842202B2 (en) 2014-02-25 2017-12-12 Qualcomm Technologies International, Ltd. Device proximity
US9910976B2 (en) 2014-02-25 2018-03-06 Qualcomm Technologies International, Ltd. Processing mesh communications
US9692538B2 (en) 2014-02-25 2017-06-27 Qualcomm Technologies International, Ltd. Latency mitigation
WO2017116642A1 (en) * 2015-12-29 2017-07-06 Pathela Vivek System and method of troubleshooting network source inefficiency
US20180198693A1 (en) * 2015-12-29 2018-07-12 Vivek Pathela System and method of troubleshooting network source inefficiency
US11153216B2 (en) * 2017-12-22 2021-10-19 International Business Machines Corporation Streaming network
US10554562B2 (en) * 2017-12-22 2020-02-04 International Business Machines Corporation Streaming network
US10944669B1 (en) 2018-02-09 2021-03-09 GoTenna, Inc. System and method for efficient network-wide broadcast in a multi-hop wireless network using packet echos
US11750505B1 (en) 2018-02-09 2023-09-05 goTenna Inc. System and method for efficient network-wide broadcast in a multi-hop wireless network using packet echos
EP3766276A4 (en) * 2018-03-16 2021-12-08 Telefonaktiebolaget Lm Ericsson (Publ) Methods and nodes for obtaining information regarding a bluetooth mesh network
US11516682B2 (en) 2018-03-16 2022-11-29 Telefonaktiebolaget Lm Ericsson (Publ) Methods and nodes for obtaining information regarding a bluetooth mesh network
WO2019177505A1 (en) 2018-03-16 2019-09-19 Telefonaktiebolaget Lm Ericsson (Publ) Methods and nodes for obtaining information regarding a bluetooth mesh network
US11811642B2 (en) 2018-07-27 2023-11-07 GoTenna, Inc. Vine™: zero-control routing using data packet inspection for wireless mesh networks
US10673646B1 (en) * 2018-12-09 2020-06-02 Olibra Llc System, device, and method of multi-path wireless communication
US20220086943A1 (en) * 2020-09-11 2022-03-17 Volkswagen Aktiengesellschaft Method for controlling a communication between a vehicle and a backend device

Also Published As

Publication number Publication date
GB2512543A (en) 2014-10-01
US20150245182A1 (en) 2015-08-27
GB2512256A8 (en) 2015-07-01
DE102014012517B4 (en) 2017-03-02
DE102014012252A1 (en) 2015-08-27
US20150244565A1 (en) 2015-08-27
DE102015101697A1 (en) 2015-08-27
GB201412718D0 (en) 2014-09-03
GB201421698D0 (en) 2015-01-21
GB201412720D0 (en) 2014-09-03
GB201405797D0 (en) 2014-05-14
DE102014012517A1 (en) 2015-08-27
GB2523444A (en) 2015-08-26
GB201405786D0 (en) 2014-05-14
US20150244648A1 (en) 2015-08-27
GB201412716D0 (en) 2014-09-03
GB201405791D0 (en) 2014-05-14
US20150245204A1 (en) 2015-08-27
DE102015101604A1 (en) 2015-08-27
DE102014012258A1 (en) 2015-08-27
GB201415177D0 (en) 2014-10-08
GB2513048A (en) 2014-10-15
GB2512256A (en) 2014-09-24
US20150244828A1 (en) 2015-08-27
US20150245296A1 (en) 2015-08-27
GB201412715D0 (en) 2014-09-03
GB201412714D0 (en) 2014-09-03
GB2512749A (en) 2014-10-08
DE102015101698A1 (en) 2015-08-27
GB2512501A (en) 2014-10-01
GB2512748A (en) 2014-10-08
US20150242614A1 (en) 2015-08-27
US10055570B2 (en) 2018-08-21
GB2512748B (en) 2015-02-18
GB2523444B (en) 2016-05-18
GB2512747B (en) 2015-04-01
GB201405790D0 (en) 2014-05-14
GB2512781A (en) 2014-10-08
GB2518120A (en) 2015-03-11
GB2512746A (en) 2014-10-08
GB2512545A (en) 2014-10-01
US9489506B2 (en) 2016-11-08
US9672346B2 (en) 2017-06-06
GB2512542A (en) 2014-10-01
US20150245220A1 (en) 2015-08-27
US20150245203A1 (en) 2015-08-27
GB2512747A (en) 2014-10-08
DE102014012518A1 (en) 2015-08-27
GB2515923B (en) 2015-06-03
US20150245369A1 (en) 2015-08-27
GB2513048B (en) 2015-08-26
GB201412719D0 (en) 2014-09-03
GB2512256B8 (en) 2015-07-01
DE102015101699A1 (en) 2015-08-27
GB2515923B8 (en) 2015-06-17
GB2512502A (en) 2014-10-01
GB201405789D0 (en) 2014-05-14
GB201501075D0 (en) 2015-03-11
GB2513265B (en) 2016-10-26
DE102014012379A1 (en) 2015-08-27
GB2512746B (en) 2015-03-11
DE102014012257B4 (en) 2015-12-03
GB2513265A (en) 2014-10-22
DE102014013471A1 (en) 2015-08-27
GB2515923A (en) 2015-01-07
GB2512544B (en) 2016-08-17
GB2512256B (en) 2015-04-15
GB2512544A (en) 2014-10-01
GB2512502B (en) 2015-03-11
DE102014012257A1 (en) 2015-08-27
GB201412722D0 (en) 2014-09-03
GB201412717D0 (en) 2014-09-03
GB2512543B (en) 2015-02-11
GB2512545B (en) 2015-04-08
US20150245412A1 (en) 2015-08-27
DE102014012379B4 (en) 2016-05-12
DE102014019749B3 (en) 2017-08-31
DE102015101620A1 (en) 2015-08-27
GB2517844B (en) 2015-09-09
GB2512749B (en) 2015-04-01
US9842202B2 (en) 2017-12-12
US20150245231A1 (en) 2015-08-27
GB2515923A8 (en) 2015-06-17
GB2518120B (en) 2015-09-30
GB2512781B (en) 2015-08-05
GB2517844A (en) 2015-03-04
US9754096B2 (en) 2017-09-05
US9910976B2 (en) 2018-03-06
US20150245179A1 (en) 2015-08-27
GB201405785D0 (en) 2014-05-14
GB2512542B (en) 2015-02-25
GB201415178D0 (en) 2014-10-08
DE102015101699B4 (en) 2019-12-24

Similar Documents

Publication Publication Date Title
US20150244623A1 (en) Mesh profiling
JP5948497B2 (en) Content-centric and load balancing aware dynamic data aggregation
KR102351845B1 (en) A multi-hop networking protocol for wide-area energy harvesting sensor network deployments
US7133373B2 (en) Wireless network with improved sharing of high power consumption tasks
US9549363B2 (en) Obtaining data reception parameters on-demand in a multiple interface network
US20150036570A1 (en) Method and apparatus for transmission scheduling in wireless sensor network
US20150003309A1 (en) Adaptive wireless sensor network and method of routing data in a wireless sensor network
US20110261738A1 (en) Adaptive wireless sensor network and method of routing data in a wireless sensor network
Hong et al. DAG-based multipath routing for mobile sensor networks
US20150023369A1 (en) Obtaining data reception parameters in a multiple interface network
Lee et al. Design and evaluation of an open-source wireless mesh networking module for environmental monitoring
Di Marco et al. Performance evaluation of the data transfer modes in bluetooth 5
Lutz et al. ATLAS: Adaptive topology-and load-aware scheduling
Parsaei et al. RPL load balancing in Internet of Things
JP5885242B2 (en) Sensor node, sensor node control method, and sensor node control program
Paulino et al. Optimizing Packet Reception Rates for Low Duty-Cycle BLE Relay Nodes
Musa et al. Constructing Energy Aware Home Automation within the IPv6-USN Architecture
Iova Standards optimization and network lifetime maximization for wireless sensor networks in the Internet of things
Kİraz et al. ALORT: a transport layer protocol using adaptive loss recovery method for WSN
Bhuiyan et al. Reliable shortest paths in wireless sensor networks: Refocusing on link failure scenarios from applications
Pantoni et al. Receiver initiated transmission strategies applied to street lighting systems based on wireless sensor networks
Nguyen et al. An energy-efficient multi-candidate greedy routing scheme in wireless sensor networks
Sugano et al. Low-Energy-Consumption Ad Hoc Mesh Network Based on Intermittent Receiver-driven Transmission
KHARCHE myref. bib
EP3327988A1 (en) System and method for improving multicast latency and reliability of multicast transmissions in a wireless building automation network

Legal Events

Date Code Title Description
AS Assignment

Owner name: CAMBRIDGE SILICON RADIO LIMITED, UNITED KINGDOM

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:HEYDON, ROBIN;JONES, NICHOLAS JOHN;THOMSON, CLIVE;AND OTHERS;SIGNING DATES FROM 20140808 TO 20140909;REEL/FRAME:033893/0737

AS Assignment

Owner name: QUALCOMM TECHNOLOGIES INTERNATIONAL, LTD., UNITED

Free format text: CHANGE OF NAME;ASSIGNOR:CAMBRIDGE SILICON RADIO LIMITED;REEL/FRAME:036663/0211

Effective date: 20150813

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE AFTER FINAL ACTION FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: ADVISORY ACTION COUNTED, NOT YET MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: ADVISORY ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION