WO2002078272A1 - A method and system for providing bridged mobile ad-hoc networks - Google Patents

A method and system for providing bridged mobile ad-hoc networks Download PDF

Info

Publication number
WO2002078272A1
WO2002078272A1 PCT/SG2001/000050 SG0100050W WO02078272A1 WO 2002078272 A1 WO2002078272 A1 WO 2002078272A1 SG 0100050 W SG0100050 W SG 0100050W WO 02078272 A1 WO02078272 A1 WO 02078272A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
address
message
terminals
broadcasting
Prior art date
Application number
PCT/SG2001/000050
Other languages
French (fr)
Inventor
Radhakrishna Pillai Raghavan Pillai
Jit Biswas
Luying Zhou
Eng Hwa Teo
Original Assignee
Kent Ridge Digital Labs
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kent Ridge Digital Labs filed Critical Kent Ridge Digital Labs
Priority to PCT/SG2001/000050 priority Critical patent/WO2002078272A1/en
Publication of WO2002078272A1 publication Critical patent/WO2002078272A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • H04W88/04Terminal devices adapted for relaying to or from another terminal or user
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/02Communication route or path selection, e.g. power-based or shortest path routing
    • H04W40/12Communication route or path selection, e.g. power-based or shortest path routing based on transmission quality or channel quality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/02Communication route or path selection, e.g. power-based or shortest path routing
    • H04W40/22Communication route or path selection, e.g. power-based or shortest path routing using selective relaying for reaching a BTS [Base Transceiver Station] or an access point
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/24Connectivity information management, e.g. connectivity discovery or connectivity update
    • H04W40/246Connectivity information discovery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/24Connectivity information management, e.g. connectivity discovery or connectivity update
    • H04W40/248Connectivity information update
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/24Connectivity information management, e.g. connectivity discovery or connectivity update
    • H04W40/28Connectivity information management, e.g. connectivity discovery or connectivity update for reactive routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/34Modification of an existing route
    • H04W40/38Modification of an existing route adapting due to varying relative distances between nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices

Definitions

  • the present invention relates to telecommunication networks with multi- hop mobile wireless communication, such as Mobile Ad Hoc Networks (MANETs), but also to Wireless WAN, Wireless Bridging, and Infrastructureless Networks.
  • MANETs Mobile Ad Hoc Networks
  • Wireless WAN Wireless Bridging
  • Infrastructureless Networks Infrastructureless Networks.
  • the transmission range of a node is limited and the topology of the network is also dynamic, i.e. not fixed.
  • infrastructureless or mobile ad hoc networks are designed for use in areas where there might not be permanent signal coverage.
  • These are networks in which the radio transmission range of a node is limited and the topology of the network is dynamic, so that multihop communication is necessary for nodes to communicate with each other.
  • the reliance on wireless multihop communication to maintain connectivity among nodes places added complexity on the design and operation of these networks. It is foreseeable that nodes will have different transceivers and antennas, and these differences must also be considered when setting up an infrastructureless network.
  • a wireless network is typically the preferred regime for interconnecting the embedded devices.
  • Such devices might be manufactured into building materials that are used to construct an edifice or vehicle, endowed with special-purpose functionality, such as the ability to monitor strain gauges or accelerometers and pass the information on to a central controller.
  • the embedding matrix itself e.g., the frame of an aircraft
  • the micronetwork is also mobile from the point of view of a global backbone wired network.
  • Management and control of infrastructureless networks is an important area that will probably draw upon different solutions than are found in either cellular or wired networks.
  • the need to report on a dynamically changing topology that suggests a more-autonomous style of network management than one finds in today's polling-based systems.
  • the sheer number of nodes that one might find in a ubiquitous computing network or a micronetwork underscores the need for a level of scalability not commonly present in most approaches to network management.
  • MANETs can be present in a number of applications.
  • Military Communication Networks - With reference to Figure 1 , in military, soldiers equipped with multimode mobile communicators can now communicate in an ad hoc manner without the need for fixed wireless base stations.
  • small vehicular devices equipped with audio sensors and cameras can be deployed at targeted regions to collect important location and environmental information that will be communicated back to a processing node via ad hoc mobile communications.
  • Ship-to-ship ad hoc mobile communication is also desirable since it provides alternate communication paths without reliance on ground or space based communication infrastructures. As shown in the Figure 1, the mobile node by moving between two clusters of ad hoc networks becomes a router node and links the two clusters.
  • An ad hoc network comprised of various computing devices and other entertainment devices at home could be formed, and it can be linked to the Internet through a home gateway.
  • the Bluetooth technology is quite suitable for realising the wireless connectivity.
  • Networked Toys - Electronic toys are being equipped with computing and communication capabilities. In future, such toys, when brought together will be able to form a community and communicate with each other. Mobile ad hoc networks can play a key role in such toys communication.
  • Wireless Sensor Network Large-scale networks of wireless sensors are becoming an active topic of research. Advances in hardware technology and engineering design have lead to dramatic reductions in size, power consumption, and cost for Micro Electro Mechanical Systems (MEMS)- based sensors. This has enabled very compact, autonomous and mobile nodes, and each containing one or more sensors, computation and communication capabilities, and a power supply.
  • MEMS Micro Electro Mechanical Systems
  • Meeting and Conference Sites People today attend meetings and conferences with their laptops, or palmtops, or notebooks. It is therefore attractive to have instant network information, in addition to file and information sharing without the presence of fixed base stations and system administrators. Presenters can multicast slides and audio to intended recipients. Attendees can ask questions and interact on a commonly shared whiteboard.
  • Emergency/Rescue Environments - Ad hoc mobile communication is particularly useful in relaying information via data, video, and/or voice from one rescue team member to another over a small handheld or wearable wireless device.
  • Ad hoc networks mobile terminals with wireless connectivity communicate with each other without any fixed topology.
  • the intermediate nodes could be used to forward the packets.
  • Existing proposals are based on network layer (layer 3) routing.
  • the intermediate terminals act as routers, forwarding the IP packets.
  • the router needs to know the address of the next hop (node) to which the packet should traverse.
  • the next hop address can either be pre-determined and maintained in a table (routing table) or can be explicitly given in the packet header.
  • a routing protocol is used to determine the next hop address based on the packet destination address and one or more optimality criteria.
  • the table is looked up to determine the next hop address. Routing information is exchanged between nodes periodically and the routing table is updated accordingly. It is also called a table driven approach. In the latter case, every packet to be forwarded contains the address of every hop it has to traverse and hence there is no need to maintain a routing table at every node. It is also called source routing. Variations of these routing protocols are considered for the MANET because of the changing topology, limited radio resource, and due to the fact that every terminal is a potential router. There are several protocols proposed for routing IP packets in a MANET. They are mostly on-demand routing protocols.
  • Ad hoc On-Demand Distance Vector Routing (AODV) and Dynamic Source Routing (DSR) are two of the routing protocols which have been proposed in the IETF MANET working group.
  • AODV On-Demand Distance Vector Routing
  • DSR Dynamic Source Routing
  • On-demand routing when a route is needed, the routing protocol attempts to find a route for the current data communication session. On-demand routing does not require each node to continuously evaluate and maintain all the routes to every other node in the network, as required with table-driven routing, thus avoiding the need to frequently exchange state information, reducing the amount of update traffic, and conserving limited resources.
  • AODV is based on a distance vector routing mechanism and uses a route table to find the next hop in the route. AODV assumes symmetric links in the ad hoc network and hence cannot work properly in ad hoc networks having asymmetric links. DSR is based on a source routing mechanism and can work in ad hoc network having asymmetric links. However, DSR requires that the entire route map be carried with each data packet in order for the packet to reach its destination. Although DSR does not involve the route table lookup required by AODV, it nevertheless involves heavy routing overhead in each data packet. Other routing protocols include Associativity-Based long-lived Routing (ABR) and Cluster Based Routing Protocol (CBRP).
  • ABR Associativity-Based long-lived Routing
  • CBRP Cluster Based Routing Protocol
  • a mobile ad hoc network comprising a number of user terminals capable of performing data link (DL) layer bridging is shown in Figures 2 and 3.
  • the bridge listens to all DL frames and forwards them, if necessary, using a bridging algorithm.
  • Bridging Algorithms e.g., IEEE 802.1d
  • Ethernet and Token Ring IEEE 802.3, 802.5
  • the bridges may also use other algorithms optimised for wireless networks. Discovering the topology and route are specific to the algorithm used. Different Bridging Scenarios In wired LANs, bridges are used to extend the coverage area in a transparent manner. However, in wireless LANs, the reachability within a WLAN is also important due to specific problems like hidden terminals. As a result, the different types of bridges in a wireless LAN can be classified as follows: Intra-LAN bridging When there is only a single radio cell in a LAN as shown in Figure 2, the hidden terminal problem prevents some terminals from direct communication. In this case, some intermediate terminal (node) can bridge these terminals. Inter-LAN bridging - Fixed Bridges
  • Stationary bridges can be used to interconnect two nodes on adjacent LANs.
  • the traditional wired LAN bridging algorithms such as spanning tree/source routing algorithm can be used with minor modifications.
  • Path (route) discovery the mobility of terminals cause the path to change dynamically.
  • a mobile terminal has to perform the additional functionality of forwarding the packets between other terminals.
  • the present invention in one aspect provides, in a mobile ad hoc network having a plurality of mobile and/or fixed user terminals, a method of bridging between a first and a second terminal, the method including the step of: Using a third terminal to act as a data link layer (layer 2) bridge between the first and the second terminal.
  • a third terminal to act as a data link layer (layer 2) bridge between the first and the second terminal.
  • the act of bridging of the third terminal includes broadcasting control and current network information.
  • each terminal is adapted to bridge communication based on stored network information.
  • the present inventive aspect has come about by enabling the intermediate nodes to act as a data link layer (layer 2) bridges, and which is expected to be relatively faster and efficient compared to the network layer routing, due to the following reasons: No network layer processing and hence better performance compared to routers
  • any network layer protocol including IP can be used
  • Bridges are considered to be plug and play devices compared to routers. This invention addresses bridging within a wireless LAN and between wireless LANs. It also addresses other issues in mobile ad hoc networks such as auto- configuration and handoff.
  • the present invention provides, in a second aspect, in a system for mobile ad hoc (or infrastructure-less) communication, the system including a plurality of mobile and/or fixed user terminals adapted to serve as data link layer bridges, to link user terminals which are otherwise unable to communicate directly, a method of providing path discovery including the step of: broadcasting control information across a radio cell.
  • passive route (path) discovery is proposed.
  • the availability of a mobile terminal will be announced by the terminal itself and this information will be broadcast across the entire network through intermediate bridges. This saves the number of path discoveries needed to determine the presence or availability of a terminal.
  • the path discovery is done by exchanging control messages. It is realised using the following types of control messages:
  • the present invention provides, in a third aspect, a method of autoconfiguration of addresses and service discovery in a system for mobile ad hoc communication, including the steps of:
  • autoconfiguration is provided on the assumption that all nodes will be assigned addresses from a single subnet.
  • a terminal When a terminal powers up, it broadcasts a control message Address_Request announcing its name. If no response is received within a time out period, it assumes that the terminal is the first terminal in the LAN and assigns an IP address by itself (e.g., the smallest IP address of the subnet, x.x.x.1). On the other hand, if there are terminals already existing in the LAN, one of them (address allocating terminal) will issue an address. The address allocating terminal is the one having an address one less than the smallest address among the currently available unassigned addresses.
  • the address allocating terminal will be the one having the smallest address among the terminals present. For example, if the currently available unassigned addresses are 10, 20, and 30, then the next address allocating terminal will be the one with address 9 and the next address allocated will be 10. The role of the address allocating terminal may thus be assumed by different terminals for different requests, depending on the pattern of address allocation/de-allocation.
  • the address When the terminal gracefully leaves the network, the address will be deallocated so that the address assigned can be re-claimed for further assignment. This can be signaled using the detachment message explained later.
  • the present inventive aspects provide an alternative to the network routing of the prior art fixed and mobile networks.
  • the solution proposed is to have terminals in the MANET adapted to act as data link layer (layer 2) bridges (as opposed to network layer routers) between other terminals that do not have a direct wireless link.
  • each terminal, acting as a bridge will always broadcast control message for all other terminals, directly in range or indirectly via other in range bridges broadcasting to out of range nodes, to update themselves with current network information.
  • the terminals/nodes conditionally act as bridges in accordance with stored criteria based on the current network information.
  • the packet forwarding in a MANET can be realised in an efficient manner.
  • Figure 1 illustrates an ad hoc network
  • Figure 2 illustrates Intra-LAN Bridging, where 'N' is a node, and 'B' is a bridge, and
  • Figure 3 illustrates Inter-LAN Bridging, where 'B" is a bridge.
  • a terminal can either function as an end-user terminal or as a bridge or both.
  • the terminal can be programmed to act in one of these modes. While acting as a bridge, it forwards the data link layer frames.
  • Control message is required to be propagated across the network for various functions such as the route discovery, auto-configuration etc.
  • the control message is transmitted in a broadcast mode, using the inherent layer 2 broadcast capability of the wireless medium.
  • the user data may be transmitted in a unicast, multicast, or broadcast mode, depending on the requirements.
  • a passive route (path) discovery is proposed.
  • the availability of a mobile terminal will be announced by the terminal itself and this information will be broadcast across the entire network through intermediate bridges. All the terminals and bridges maintain this information and will be used for locating the terminals or for forwarding the packets to the terminal. Only when the required information is unavailable, a terminal will query the information from the nearest terminal or bridge.
  • the path discovery is done by exchanging control information. It is conveyed using the following types of control messages:
  • a terminal Whenever a terminal enters the network, it broadcasts this Attachment message. All terminals and bridges in its vicinity update their host table which has the format shown below. If the terminal is in its direct vicinity, it enters "direct" under bridge information. The bridge(s) hearing this broadcast, re-broadcasts the message, by modifying the cost to reach the terminal through the bridge. The bridge also re-broadcasts this message to the radio cell from where it received. This is to ensure that the hidden terminals also get the message. Other terminals, ignores the duplicate broadcast messages received. An attachment message could also be broadcast whenever a terminal notices that one or more bridges to which it could directly communicate with, are no longer reachable. In this case, this attachment message could possibly be relayed through a new set of bridges.
  • All other terminals will update their host table according to the information contained in the new attachment message.
  • the cost could be a function of number of hops, delay involved in re- broadcasting, the duration for which the bridge will be active, loading of the bridge etc. If there are multiple bridges hearing the broadcast, every bridge will re- broadcast the message if the cost through the bridge is less than that is announced by other bridges.
  • the terminals and bridges in the second radio cell will then update their host table by filling up the bridge column, cost, and other details.
  • the terminals/bridges use the following host table information for locating a terminal or for forwarding the packets. Host Table Format
  • the following format may be used for this message:
  • the field Cost will be empty when the terminal first broadcasts the attachment message.
  • Bridges normally copy the information and add their own information before re- broadcasting.
  • the terminal's address will be derived by the first bridge from the MAC frame.
  • the terminals/bridges hearing the subsequent re- broadcasts derive the previous terminal/bridge addresses.
  • Src lag indicates whether the broadcast is from the terminal or from a bridge. This information can also be gathered by comparing the source address and the true source address.
  • a mobile terminal Whenever a mobile terminal leaves the network, it broadcasts this Detachment message. All terminals and bridges in its vicinity update their host table. One of the bridges re-broadcasts this message. If there are multiple bridges hearing the broadcast, one of the bridges relays this message and the remaining bridges keep quiet. The terminals and bridges in the second radio cell will update their host table. This process continues from radio cell to radio cell and the information will finally be fully distributed across the entire network. A bridge also re-broadcasts the message to the radio cell from where it received. This is to ensure that the hidden terminals also get the information. The other terminals, ignores the duplicate broadcast messages received. Detachment Message Format
  • a bridge normally copies the information and adds its own information before re-broadcasting.
  • the terminal's address will be derived by the first bridge from the MAC frame.
  • the terminals/bridges hearing the subsequent re-broadcasts also derive the bridge address from the source address.
  • the bridge/designated terminal then initiates a response message similar to the attachment message and it propagates back to the entire network. If no response is received within the time out period, the terminal concludes that the designated terminal is unreachable.
  • the response could either be restricted or unrestricted.
  • restricted response the response will be confined to the radio cell where it is currently attached.
  • a simple message format as shown below, can be used.
  • the message could be broadcast to the neighboring radio cells as well, using an attachment Message.
  • the subsequent user information (data packet) is sent along the path, also called packet forwarding.
  • packet forwarding Different paths may be used for different packets to realise load balancing or to have improved QoS.
  • the same packet may be sent through multiple paths (bridges) to improve the redundancy in case of loss or to improve the QoS. Packet Forwarding
  • the terminals use the information in the host table for sending data packets. If the destination is directly accessible to the source, the source puts the destination address in the data packet and sends it. If the destination is accessible only through bridges, then the source puts the bridge address as the destination address and sends to a bridge. The bridge, then looks at the true destination address and modifies the destination address and forwards to the destination or to next bridge. This process continues until the data packet is received by the true destination. Data Packets
  • the source and destination addresses will be there in all data packets and control messages.
  • the message_type identifies whether it is a data packet or control message.
  • the Dst_flag identifies whether the data packet is to be bridged and if so, the next field specifies the true destination address for the data packet. For bridged data packets, the bridge replaces the source address with its own address and destination address with the next bridge address or true destination address.
  • control information Since broadcast takes minimum number of transmissions, the control information is propagated fast and disseminated to maximum number of terminals possible.
  • Path discovery is done by learning as in the case of wired LAN bridges. Here the learning is limited only to attachment/detachment messages as opposed to every data link layer frame in the case of learning bridges. Explicit detachment notification removes stale paths. Terminals have the freedom to choose the one or more paths for forwarding packets during a session, based on QoS requirements.
  • Path information is propagated only in one direction (i.e., from destination to source) - as opposed to bi-directional path discovery process in MANET routing proposals (i.e., query from source to destination and acknowledgement in the reverse direction)
  • the bridge need not check every packet to be forwarded as in traditional bridging. In this case, only those packets addressed to it need to be checked as in the case of routers.
  • the proposed technique improves the reachability to hidden terminals.
  • a terminal has the information on the QoS supported by various paths.
  • the packet forwarding with some kind of QoS guarantee can be realised.
  • the attachment message can carry relevant QoS information - like the number of hops, the accumulated delay across the path and so on.
  • the bridges can be selected based on the QoS information.
  • specific QoS control messages can be broadcast periodically by the bridges to have a dynamic control over QoS.
  • Handoff The handoff of mobile terminals can be realised as follows. When a mobile terminal moves from one radio cell to another, it first detaches from the current radio cell and then attaches to the new radio cell. Using this process, every other terminal in the network learns about the new path to the terminal and the packets will be forwarded accordingly. The packet loss during movement, if any, is assumed to be handled by the higher layer protocols. Auto-configuration
  • the present inventive aspect therefore provides distributed autoconfiguration and service discovery techniques for mobile ad hoc networks.
  • the control message for auto-configuration and service discovery is also broadcast. This ensures reliability and fast distribution of control information.
  • address allocating terminal will issue an address.
  • the address allocating terminal is the one having an address one less than the smallest address among the currently available unassigned addresses. If the smallest available address happens to be the smallest IP address of the subnet, then the address allocating terminal will be the one having the smallest address among the terminals present.
  • the role of the address allocating terminal may thus be assumed by different terminals for different requests, depending on the pattern of address allocation/de-allocation.
  • Address Mapping Table Every terminal maintains this table. This table maintains the mapping between the terminal name, IP address, and the MAC address, and the services offered by the terminal. It is updated every time an address allocation takes place. Similarly, during address de-allocation, the table entry will be deleted. Every time an allocation/de-allocation takes place, the terminal checks whether it is going to be the next address allocator. Address Mapping Table Format
  • the proposed scheme assumes an infrastructure-less network. However, the scheme works well in the case of an ad hoc network with fixed access point. It is assumed that the access point would have been established with a valid address even before the first terminal becomes active. Therefore, the very first address allocator will be the AP. Thereafter, the address allocation/de-allocation takes place as described earlier.
  • a terminal If a terminal is looking for the MAC address corresponding to a name/IP address, it broadcasts a query message. Its reply will be broadcast by the terminal. Thus, no special ARP requests need to be broadcast like in Ethernet.
  • Name conflict In case there is a name conflict, the address allocator sends a unicast error message asking the terminal to rename.
  • Unreachable If a terminal is unable to send data packets, it sends out a query message and if there is no response within a time out period, the terminal initiates a forced recovery of the address assigned. Mapping the algorithm and frame structures to existing wireless LANs IEEE 802.11
  • the ACK needs to be disabled. The reason being, if the packet needs to be bridged, it will be immediately received by a bridge and an acknowledgement from the bridge does not make any sense to the sender.
  • the RTS/CTS mechanism can continue to be there as the data packet transmission is point-to-point between the host and bridge. It is also possible to carryout a similar adaptation of the algorithm to other wireless communication standards such Bluetooth, and Hiperlan.

Abstract

The present invention relates to telecommunication networks with multi-hop wireless communication such as Mobile Ad Hoc Networks (MANET), Wireless WAN, Wireless Bridging, and Infrastructureless Networks, where in the transmission range of a node is limited and the topology of the network is also dynamic. Terminals in the MANET adapted to act as data link layer bridges between other terminals that do not have a direct wireless link. Each terminal, acting as a bridge, will always broadcast control information for all other terminals, directly in range or indirectly via other in range bridges broadcasting to out of range nodes, to update themselves with current network information. The terminals/nodes conditionally act as bridges in accordance with stored criteria based on the current network information. Packet forwarding in a MANET can be efficiently realised based on the following provided network functions: path discovery; QoS Quality of Service; Handoff, and Autoconfiguration and service discovery.

Description

A METHOD AND SYSTEM FOR PROVIDING BRIDGED MOBILE AD-HOC
NETWORKS FIELD OF INVENTION
The present invention relates to telecommunication networks with multi- hop mobile wireless communication, such as Mobile Ad Hoc Networks (MANETs), but also to Wireless WAN, Wireless Bridging, and Infrastructureless Networks. In particular, in these networks the transmission range of a node is limited and the topology of the network is also dynamic, i.e. not fixed.
Overall the present inventive aspects provide an alternative to the network routing of the prior art fixed networks. BACKGROUND ART MOBILE AD HOC NETWORKS
As an alternative to cellular networks, infrastructureless or mobile ad hoc networks (MANET) are designed for use in areas where there might not be permanent signal coverage. These are networks in which the radio transmission range of a node is limited and the topology of the network is dynamic, so that multihop communication is necessary for nodes to communicate with each other. The reliance on wireless multihop communication to maintain connectivity among nodes places added complexity on the design and operation of these networks. It is foreseeable that nodes will have different transceivers and antennas, and these differences must also be considered when setting up an infrastructureless network.
Proponents of ubiquitous computing contend that computing devices will be embedded in our living and working spaces. Rooms, home appliances, corridors, vehicles, and public areas might one day each contain hundreds or thousands of computers, which can be interconnected most effectively by means of a wireless network. Although most of the embedded devices would be fixed, it is expected that devices embedded in movable furniture, equipment, or vehicles will be considered mobile or nomadic. Furthermore, users will certainly move from area to area, expecting to have instantaneous connectivity to local embedded devices. While ubiquitous computing seeks to provide wireless access to information for the peripatetic user who wanders from room to room, micronetworks embed small devices, such as microelectomechanical systems, in hostile or inaccessible environments. As the nature of the environment often makes a wired interconnection impractical or too costly, a wireless network is typically the preferred regime for interconnecting the embedded devices. Such devices might be manufactured into building materials that are used to construct an edifice or vehicle, endowed with special-purpose functionality, such as the ability to monitor strain gauges or accelerometers and pass the information on to a central controller. Given that the embedding matrix itself (e.g., the frame of an aircraft) might be mobile, the micronetwork is also mobile from the point of view of a global backbone wired network.
Management and control of infrastructureless networks is an important area that will probably draw upon different solutions than are found in either cellular or wired networks. The need to report on a dynamically changing topology that suggests a more-autonomous style of network management than one finds in today's polling-based systems. Also, the sheer number of nodes that one might find in a ubiquitous computing network or a micronetwork underscores the need for a level of scalability not commonly present in most approaches to network management.
APPLICATION ENVIRONMENTS
By way of illustration, MANETs can be present in a number of applications. Military Communication Networks - With reference to Figure 1 , in military, soldiers equipped with multimode mobile communicators can now communicate in an ad hoc manner without the need for fixed wireless base stations. In addition, small vehicular devices equipped with audio sensors and cameras can be deployed at targeted regions to collect important location and environmental information that will be communicated back to a processing node via ad hoc mobile communications. Ship-to-ship ad hoc mobile communication is also desirable since it provides alternate communication paths without reliance on ground or space based communication infrastructures. As shown in the Figure 1, the mobile node by moving between two clusters of ad hoc networks becomes a router node and links the two clusters.
Home Networks - An ad hoc network comprised of various computing devices and other entertainment devices at home could be formed, and it can be linked to the Internet through a home gateway. In such environments, the Bluetooth technology is quite suitable for realising the wireless connectivity.
Networked Toys - Electronic toys are being equipped with computing and communication capabilities. In future, such toys, when brought together will be able to form a community and communicate with each other. Mobile ad hoc networks can play a key role in such toys communication.
Wireless Sensor Network - Large-scale networks of wireless sensors are becoming an active topic of research. Advances in hardware technology and engineering design have lead to dramatic reductions in size, power consumption, and cost for Micro Electro Mechanical Systems (MEMS)- based sensors. This has enabled very compact, autonomous and mobile nodes, and each containing one or more sensors, computation and communication capabilities, and a power supply.
Meeting and Conference Sites - People today attend meetings and conferences with their laptops, or palmtops, or notebooks. It is therefore attractive to have instant network information, in addition to file and information sharing without the presence of fixed base stations and system administrators. Presenters can multicast slides and audio to intended recipients. Attendees can ask questions and interact on a commonly shared whiteboard.
Emergency/Rescue Environments - Ad hoc mobile communication is particularly useful in relaying information via data, video, and/or voice from one rescue team member to another over a small handheld or wearable wireless device.
Other Areas - Wearable computing, Emergency services, Law enforcement, and Logistics industry. AD HOC NETWORK TECHNIQUES
In Ad hoc networks, mobile terminals with wireless connectivity communicate with each other without any fixed topology. When there is no direct wireless link between two nodes, the intermediate nodes could be used to forward the packets. Existing proposals are based on network layer (layer 3) routing. In the case of Internet protocols, the intermediate terminals act as routers, forwarding the IP packets. In the Internet, when a packet needs to be forwarded, the router needs to know the address of the next hop (node) to which the packet should traverse. The next hop address can either be pre-determined and maintained in a table (routing table) or can be explicitly given in the packet header. In the former case, a routing protocol is used to determine the next hop address based on the packet destination address and one or more optimality criteria. Based on the destination address, the table is looked up to determine the next hop address. Routing information is exchanged between nodes periodically and the routing table is updated accordingly. It is also called a table driven approach. In the latter case, every packet to be forwarded contains the address of every hop it has to traverse and hence there is no need to maintain a routing table at every node. It is also called source routing. Variations of these routing protocols are considered for the MANET because of the changing topology, limited radio resource, and due to the fact that every terminal is a potential router. There are several protocols proposed for routing IP packets in a MANET. They are mostly on-demand routing protocols. For example, Ad hoc On-Demand Distance Vector Routing (AODV) and Dynamic Source Routing (DSR) are two of the routing protocols which have been proposed in the IETF MANET working group. With on-demand routing, when a route is needed, the routing protocol attempts to find a route for the current data communication session. On-demand routing does not require each node to continuously evaluate and maintain all the routes to every other node in the network, as required with table-driven routing, thus avoiding the need to frequently exchange state information, reducing the amount of update traffic, and conserving limited resources.
AODV is based on a distance vector routing mechanism and uses a route table to find the next hop in the route. AODV assumes symmetric links in the ad hoc network and hence cannot work properly in ad hoc networks having asymmetric links. DSR is based on a source routing mechanism and can work in ad hoc network having asymmetric links. However, DSR requires that the entire route map be carried with each data packet in order for the packet to reach its destination. Although DSR does not involve the route table lookup required by AODV, it nevertheless involves heavy routing overhead in each data packet. Other routing protocols include Associativity-Based long-lived Routing (ABR) and Cluster Based Routing Protocol (CBRP).
A mobile ad hoc network comprising a number of user terminals capable of performing data link (DL) layer bridging is shown in Figures 2 and 3. The bridge listens to all DL frames and forwards them, if necessary, using a bridging algorithm.
ALGORITHMS
Bridging Algorithms (e.g., IEEE 802.1d) have been well studied in the case of wired LANs, especially Ethernet and Token Ring (IEEE 802.3, 802.5). These bridges use the following algorithms: Spanning tree
Source routing
The bridges may also use other algorithms optimised for wireless networks. Discovering the topology and route are specific to the algorithm used. Different Bridging Scenarios In wired LANs, bridges are used to extend the coverage area in a transparent manner. However, in wireless LANs, the reachability within a WLAN is also important due to specific problems like hidden terminals. As a result, the different types of bridges in a wireless LAN can be classified as follows: Intra-LAN bridging When there is only a single radio cell in a LAN as shown in Figure 2, the hidden terminal problem prevents some terminals from direct communication. In this case, some intermediate terminal (node) can bridge these terminals. Inter-LAN bridging - Fixed Bridges
In this case, there are multiple LANs using different overlapping radio cells, as shown in Figure 3. Stationary bridges can be used to interconnect two nodes on adjacent LANs. In this case, the traditional wired LAN bridging algorithms such as spanning tree/source routing algorithm can be used with minor modifications.
Inter-LAN bridging - Mobile Bridges
In this case too, there are multiple LANs using different overlapping radio cells as shown in Figure 3. Mobile nodes acting as bridges can be used to interconnect two nodes on different LANs. In this case, the traditional wired LAN bridging techniques such as spanning tree algorithm cannot be used due to bridge mobility. PROBLEMS Some of the problems and challenges associated with ad hoc networks are the following:
Path (route) discovery - the mobility of terminals cause the path to change dynamically.
Packet Forwarding - in order to maintain the connectivity in an ad hoc network, a mobile terminal has to perform the additional functionality of forwarding the packets between other terminals.
QoS - the characteristics of the wireless medium changes randomly and hence the QoS guarantees in such environments is a challenge
Handoff - in order to maintain the continuity of communication, handoff may be necessary in a mobile ad hoc network.
Autoconfiguration - since there is no central server in a mobile ad hoc network, the existing autoconfiguration techniques for address assignment and service discovery for fixed networks cannot be directly applied in a mobile ad hoc network. It is an object of the present invention to seek to address these and other problems associated with prior art ad hoc networks.
There is also a need to provide an architecture for relatively simple, fast and efficient connectivity among the terminals in a mobile ad hoc network.
There is further, a need to provide a relatively simple, distributed and efficient algorithm for bridging in such networks.
There is still further, a need to provide a relatively simple, distributed and efficient solution for auto-configuration in such mobile ad hoc networks. SUMMARY OF INVENTION
In this regard, the present invention in one aspect provides, in a mobile ad hoc network having a plurality of mobile and/or fixed user terminals, a method of bridging between a first and a second terminal, the method including the step of: Using a third terminal to act as a data link layer (layer 2) bridge between the first and the second terminal.
Preferably, the act of bridging of the third terminal includes broadcasting control and current network information.
Preferably, each terminal is adapted to bridge communication based on stored network information.
The present inventive aspect has come about by enabling the intermediate nodes to act as a data link layer (layer 2) bridges, and which is expected to be relatively faster and efficient compared to the network layer routing, due to the following reasons: No network layer processing and hence better performance compared to routers
Relatively simpler forwarding tables at the data link layer, compared to network layer
Independent of network layer protocols - any network layer protocol including IP can be used
Low power consumption due to simpler protocol processing
Bridges are considered to be plug and play devices compared to routers. This invention addresses bridging within a wireless LAN and between wireless LANs. It also addresses other issues in mobile ad hoc networks such as auto- configuration and handoff.
The present invention provides, in a second aspect, in a system for mobile ad hoc (or infrastructure-less) communication, the system including a plurality of mobile and/or fixed user terminals adapted to serve as data link layer bridges, to link user terminals which are otherwise unable to communicate directly, a method of providing path discovery including the step of: broadcasting control information across a radio cell. In this inventive aspect, passive route (path) discovery is proposed. As opposed to the on-demand route discovery proposed in the ad hoc routing proposals of prior art MANETs, the availability of a mobile terminal will be announced by the terminal itself and this information will be broadcast across the entire network through intermediate bridges. This saves the number of path discoveries needed to determine the presence or availability of a terminal.
The path discovery is done by exchanging control messages. It is realised using the following types of control messages:
Attachment Detachment
Query
Response
The present invention provides, in a third aspect, a method of autoconfiguration of addresses and service discovery in a system for mobile ad hoc communication, including the steps of:
(v) The user terminal broadcasting its details after attachment;
(w) One of the user terminals broadcasting the assigned address (address allocator);
(x) Other terminals updating their database; (y) The user terminal broadcasting the detachment from the radio cell;
(z) Other terminals de-allocating the assigned address and updating their database.
In this inventive aspect, autoconfiguration is provided on the assumption that all nodes will be assigned addresses from a single subnet. When a terminal powers up, it broadcasts a control message Address_Request announcing its name. If no response is received within a time out period, it assumes that the terminal is the first terminal in the LAN and assigns an IP address by itself (e.g., the smallest IP address of the subnet, x.x.x.1). On the other hand, if there are terminals already existing in the LAN, one of them (address allocating terminal) will issue an address. The address allocating terminal is the one having an address one less than the smallest address among the currently available unassigned addresses. If the smallest available address happens to be the smallest IP address of the subnet, then the address allocating terminal will be the one having the smallest address among the terminals present. For example, if the currently available unassigned addresses are 10, 20, and 30, then the next address allocating terminal will be the one with address 9 and the next address allocated will be 10. The role of the address allocating terminal may thus be assumed by different terminals for different requests, depending on the pattern of address allocation/de-allocation.
When the terminal gracefully leaves the network, the address will be deallocated so that the address assigned can be re-claimed for further assignment. This can be signaled using the detachment message explained later.
In essence, overall the present inventive aspects provide an alternative to the network routing of the prior art fixed and mobile networks. The solution proposed is to have terminals in the MANET adapted to act as data link layer (layer 2) bridges (as opposed to network layer routers) between other terminals that do not have a direct wireless link. Also, each terminal, acting as a bridge, will always broadcast control message for all other terminals, directly in range or indirectly via other in range bridges broadcasting to out of range nodes, to update themselves with current network information. The terminals/nodes conditionally act as bridges in accordance with stored criteria based on the current network information.
This broadcasting and updating enables the following required network functions:
Path discovery;
QoS - Quality of Service; Handoff, and;
Autoconfiguration and service discovery.
Based on these functionalities, the packet forwarding in a MANET can be realised in an efficient manner.
DETAILED DESCRIPTION A preferred embodiment of the present invention will now be described with reference to the accompanying drawings, in which:
Figure 1 illustrates an ad hoc network, Figure 2 illustrates Intra-LAN Bridging, where 'N' is a node, and 'B' is a bridge, and
Figure 3 illustrates Inter-LAN Bridging, where 'B" is a bridge. Approach In one aspect of the present invention, a terminal can either function as an end-user terminal or as a bridge or both. The terminal can be programmed to act in one of these modes. While acting as a bridge, it forwards the data link layer frames.
Control message is required to be propagated across the network for various functions such as the route discovery, auto-configuration etc. The control message is transmitted in a broadcast mode, using the inherent layer 2 broadcast capability of the wireless medium. The user data may be transmitted in a unicast, multicast, or broadcast mode, depending on the requirements.
Host information is fully distributed among the terminals and bridges. Each terminal/bridge maintains a table listing the host names/addresses and other key attributes. Path Discovery
A passive route (path) discovery is proposed. As opposed to the on- demand route discovery proposed in the ad hoc routing proposals of prior art MANETs, the availability of a mobile terminal will be announced by the terminal itself and this information will be broadcast across the entire network through intermediate bridges. All the terminals and bridges maintain this information and will be used for locating the terminals or for forwarding the packets to the terminal. Only when the required information is unavailable, a terminal will query the information from the nearest terminal or bridge. Control Information
The path discovery is done by exchanging control information. It is conveyed using the following types of control messages:
Attachment Detachment
Query
Response Attachment
Whenever a terminal enters the network, it broadcasts this Attachment message. All terminals and bridges in its vicinity update their host table which has the format shown below. If the terminal is in its direct vicinity, it enters "direct" under bridge information. The bridge(s) hearing this broadcast, re-broadcasts the message, by modifying the cost to reach the terminal through the bridge. The bridge also re-broadcasts this message to the radio cell from where it received. This is to ensure that the hidden terminals also get the message. Other terminals, ignores the duplicate broadcast messages received. An attachment message could also be broadcast whenever a terminal notices that one or more bridges to which it could directly communicate with, are no longer reachable. In this case, this attachment message could possibly be relayed through a new set of bridges. All other terminals will update their host table according to the information contained in the new attachment message. The cost could be a function of number of hops, delay involved in re- broadcasting, the duration for which the bridge will be active, loading of the bridge etc. If there are multiple bridges hearing the broadcast, every bridge will re- broadcast the message if the cost through the bridge is less than that is announced by other bridges. The terminals and bridges in the second radio cell will then update their host table by filling up the bridge column, cost, and other details. The bridges on the second and third radio cells, while computing the cost, announces the combined cost, including their own cost. This process continues from radio cell to radio cell and the information will be fully distributed across the entire network. The terminals and bridges need to check the duplicate messages received from other bridges.
The terminals/bridges use the following host table information for locating a terminal or for forwarding the packets. Host Table Format
Terminal Bridge Cost
(Name/Address) Attachment Message Format
The following format may be used for this message: The field Cost will be empty when the terminal first broadcasts the attachment message. Bridges normally copy the information and add their own information before re- broadcasting. The terminal's address will be derived by the first bridge from the MAC frame. Similarly, the terminals/bridges hearing the subsequent re- broadcasts derive the previous terminal/bridge addresses. Src lag indicates whether the broadcast is from the terminal or from a bridge. This information can also be gathered by comparing the source address and the true source address.
Source Destination Address Message_Type Src_flag True Source Cost Address (Broadcast) (Attachment) Address
Detachment
Whenever a mobile terminal leaves the network, it broadcasts this Detachment message. All terminals and bridges in its vicinity update their host table. One of the bridges re-broadcasts this message. If there are multiple bridges hearing the broadcast, one of the bridges relays this message and the remaining bridges keep quiet. The terminals and bridges in the second radio cell will update their host table. This process continues from radio cell to radio cell and the information will finally be fully distributed across the entire network. A bridge also re-broadcasts the message to the radio cell from where it received. This is to ensure that the hidden terminals also get the information. The other terminals, ignores the duplicate broadcast messages received. Detachment Message Format
The following format may be used for this message:
Figure imgf000013_0001
Query/Response
This is used to query the existence of a path to a terminal. If the designated terminal receives it, the terminal broadcasts a response. All the terminals and bridges that receive the response update their host table, if required. A bridge that holds the information about the designated terminal also broadcasts a response. If a terminal receives a response from both the designated terminal and a bridge, it ignores the latter. If there is no response from the designated terminal and there is no bridge that holds the required information, then one of the bridges re-broadcasts the query to adjacent radio cells till it hits a bridge holding the relevant information or the designated terminal itself. Query Message Format
The following format may be used for this message: A bridge normally copies the information and adds its own information before re-broadcasting. The terminal's address will be derived by the first bridge from the MAC frame.
Similarly, the terminals/bridges hearing the subsequent re-broadcasts also derive the bridge address from the source address.
Figure imgf000014_0001
The bridge/designated terminal then initiates a response message similar to the attachment message and it propagates back to the entire network. If no response is received within the time out period, the terminal concludes that the designated terminal is unreachable.
The response could either be restricted or unrestricted. In restricted response, the response will be confined to the radio cell where it is currently attached. In this case, a simple message format as shown below, can be used.
In unrestricted response, the message could be broadcast to the neighboring radio cells as well, using an attachment Message.
Figure imgf000014_0002
Once the path information is available, the subsequent user information (data packet) is sent along the path, also called packet forwarding. Different paths may be used for different packets to realise load balancing or to have improved QoS. The same packet may be sent through multiple paths (bridges) to improve the redundancy in case of loss or to improve the QoS. Packet Forwarding
The terminals use the information in the host table for sending data packets. If the destination is directly accessible to the source, the source puts the destination address in the data packet and sends it. If the destination is accessible only through bridges, then the source puts the bridge address as the destination address and sends to a bridge. The bridge, then looks at the true destination address and modifies the destination address and forwards to the destination or to next bridge. This process continues until the data packet is received by the true destination. Data Packets
Source Address Destination Address Message_Type Dst_fiag True Destination Address (Data)
The source and destination addresses will be there in all data packets and control messages. The message_type identifies whether it is a data packet or control message. The Dst_flag identifies whether the data packet is to be bridged and if so, the next field specifies the true destination address for the data packet. For bridged data packets, the bridge replaces the source address with its own address and destination address with the next bridge address or true destination address. Advantages
The proposed path discovery and packet forwarding techniques are considered to have the following advantages:
Since broadcast takes minimum number of transmissions, the control information is propagated fast and disseminated to maximum number of terminals possible.
The number of path discoveries initiated to determine the presence or availability of a terminal by other terminals in the network, is minimised because of the terminal initiated path update.
Under normal conditions, no explicit end-to-end path discovery is involved for every packet forwarding session as done in ad hoc routing protocols, proposed in IETF MANET Working Group.
Path discovery is done by learning as in the case of wired LAN bridges. Here the learning is limited only to attachment/detachment messages as opposed to every data link layer frame in the case of learning bridges. Explicit detachment notification removes stale paths. Terminals have the freedom to choose the one or more paths for forwarding packets during a session, based on QoS requirements.
Path information is propagated only in one direction (i.e., from destination to source) - as opposed to bi-directional path discovery process in MANET routing proposals (i.e., query from source to destination and acknowledgement in the reverse direction)
The bridge need not check every packet to be forwarded as in traditional bridging. In this case, only those packets addressed to it need to be checked as in the case of routers. The proposed technique improves the reachability to hidden terminals.
QoS Based Packet Forwarding
A terminal has the information on the QoS supported by various paths. The packet forwarding with some kind of QoS guarantee can be realised. The attachment message can carry relevant QoS information - like the number of hops, the accumulated delay across the path and so on. The bridges can be selected based on the QoS information. In addition, specific QoS control messages can be broadcast periodically by the bridges to have a dynamic control over QoS. Handoff The handoff of mobile terminals can be realised as follows. When a mobile terminal moves from one radio cell to another, it first detaches from the current radio cell and then attaches to the new radio cell. Using this process, every other terminal in the network learns about the new path to the terminal and the packets will be forwarded accordingly. The packet loss during movement, if any, is assumed to be handled by the higher layer protocols. Auto-configuration
Another problem associated with prior art mobile ad hoc networks is that there is an absence of a centralised server. The present inventive aspect therefore provides distributed autoconfiguration and service discovery techniques for mobile ad hoc networks. As in the case of path discovery, the control message for auto-configuration and service discovery is also broadcast. This ensures reliability and fast distribution of control information. A Simple Distributed IP Address Assignment Scheme for Ad hoc LANs
Ad hoc Network with a single IP subnet address
The assumption is that all nodes will be assigned addresses from a single subnet. When a terminal powers up, it broadcasts a control message Address_Request announcing its name. If no response is received within a time out period, it assumes that the terminal is the first terminal in the LAN and assigns an IP address by itself (e.g., the smallest IP address of the subnet, x.x.x.1). On the other hand, if there are terminals already existing in the LAN, one of them
(address allocating terminal) will issue an address. The address allocating terminal is the one having an address one less than the smallest address among the currently available unassigned addresses. If the smallest available address happens to be the smallest IP address of the subnet, then the address allocating terminal will be the one having the smallest address among the terminals present.
The role of the address allocating terminal may thus be assumed by different terminals for different requests, depending on the pattern of address allocation/de-allocation.
When the terminal gracefully leaves the network by broadcasting the detachment message, the address will be de-allocated so that the address assigned can be re-claimed for further assignment. Address Request Message Format
Figure imgf000017_0001
Address Mapping Table Every terminal maintains this table. This table maintains the mapping between the terminal name, IP address, and the MAC address, and the services offered by the terminal. It is updated every time an address allocation takes place. Similarly, during address de-allocation, the table entry will be deleted. Every time an allocation/de-allocation takes place, the terminal checks whether it is going to be the next address allocator. Address Mapping Table Format
Host Name MAC Address IP Address Services
Infrastructure Mode
The proposed scheme assumes an infrastructure-less network. However, the scheme works well in the case of an ad hoc network with fixed access point. It is assumed that the access point would have been established with a valid address even before the first terminal becomes active. Therefore, the very first address allocator will be the AP. Thereafter, the address allocation/de-allocation takes place as described earlier.
If a terminal is looking for the MAC address corresponding to a name/IP address, it broadcasts a query message. Its reply will be broadcast by the terminal. Thus, no special ARP requests need to be broadcast like in Ethernet. Multiple IP Subnets
Multiple subnets could be formed in the following cases:
Two independent subnets get connected through a bridge
The address space in a subnet overflows
In this case, it also broadcasts a subnet formation message to all the neighbouring radio cells. Advantages
• No ARP requests are needed.
• Broadcast saves bandwidth.
• Fully distributed, no centralised server is required as in the case of DHCP. • The server load is balanced among the terminals. The server node allocating the address is possibly different for different terminals.
• Address space explosion is minimised by the re-use of address space.
• The scheme works well in infrastructure and infrastructure-less modes.
• Improved reliability and fast distribution of control information. Error Conditions
Name conflict: In case there is a name conflict, the address allocator sends a unicast error message asking the terminal to rename.
Unreachable: If a terminal is unable to send data packets, it sends out a query message and if there is no response within a time out period, the terminal initiates a forced recovery of the address assigned. Mapping the algorithm and frame structures to existing wireless LANs IEEE 802.11
In the preferred embodiment disclosed, reference is made to IEEE 802.11. In this case, the ACK needs to be disabled. The reason being, if the packet needs to be bridged, it will be immediately received by a bridge and an acknowledgement from the bridge does not make any sense to the sender. However the RTS/CTS mechanism can continue to be there as the data packet transmission is point-to-point between the host and bridge. It is also possible to carryout a similar adaptation of the algorithm to other wireless communication standards such Bluetooth, and Hiperlan.

Claims

1. In a mobile ad hoc network having a plurality of mobile and/or fixed user terminals, a method of bridging between a first and a second terminal, the method including the step of:
Using a third terminal to act as a data link layer (layer 2) bridge between the first and the second terminal.
2. A method as claimed in claim 1, wherein the act of bridging of the third terminal includes broadcasting control and current network information.
3. A method as claimed in claim 1 or 2, wherein each terminal is adapted to bridge communication based on stored network information.
4. A system for mobile ad hoc (or infrastructure-less) communication, including a plurality of mobile and/or fixed user terminals adapted to serve as data link layer bridges, to link user terminals which are otherwise unable to communicate directly.
5. A system as claimed in claim 4, wherein the user terminals use a plurality of wireless (radio) interfaces for communication.
6. A system as claimed in claim 5, wherein multiple radio cell(s) span the entire system.
7. A system as claimed in claim 6, wherein the user terminals provide bridging to enable communication with hidden user terminals.
8. A system as claimed in any one of claims 4 to 7, wherein the bridging is provided between two or more adjacent radio cells.
9. A system as claimed in claim 6, 7 or 8, wherein a plurality of user terminals provide bridging between user terminals at the same time.
10. A system as claimed in claim 9, wherein the decision to provide bridging is made according to one of a set of criteria.
11. In a system for mobile ad hoc (or infrastructure-less) communication, the system including a plurality of mobile and/or fixed user terminals adapted to serve as data link layer bridges, to link user terminals which are otherwise unable to communicate directly, a method of providing path discovery including the step of: broadcasting control message across a radio cell.
12. A method of providing bridging in a system as claimed in claim 4, the method including the steps of: broadcasting control message across a radio cell, and communicating user data in accordance with one of unicast, multicast, or broadcast.
13. A method as claimed in claim 11 or 12, further including the step of: having each user terminal maintain a database of user terminals across the entire network along with the details of the path to reach the terminal and the key attributes of the path.
14. A method as claimed in claim 11 or 12, further including: providing bridging functionality by executing path update, packet forwarding, path discovery, and path maintenance.
15. A method as claimed in claim 14, wherein the path update includes: broadcasting attachment and detachment messages.
16. A method as claimed in claim 15, wherein the broadcast of attachment message includes the following steps:
(a) The user terminal broadcasting a message (Attachment) upon entering the first radio cell or after noticing that the bridge(s) which were communicating with the terminal has changed;
(b) The user terminals in the first radio cell updating their database;
(c) The bridges in the first radio cell re-broadcasting the message to the same and neighbouring radio cells through its radio interface(s);
(d) The user terminals in the first, second, and subsequent radio cells updating their database; and
(e) The bridges in the second and subsequent radio cells re- broadcasting the message.
17. A method as claimed in claim 15, wherein the broadcast of detachment message includes the following steps:
(f) The user terminal broadcasting a message (Detachment) upon leaving the first radio cell;
(g) The user terminals in the first radio cell updating their database;
(h) One of the bridges in the first radio cell re-broadcasting the message to the same radio cell and neighbouring radio cells through its radio interfaces;
(i) The user terminals in the first, second and subsequent radio cells updating their database;
(j) One bridge each from the second and subsequent radio cells re- broadcasting the message.
18. A method as claimed in claim 14, wherein the path query comprises the steps of
(k) The user terminal in the first radio cell broadcasting a message (query) when the intended terminal is not in its database;
(I) The intended terminal broadcasting a response message (attachment) if it is in the first radio cell and able to receive the query message; (m) The bridge(s) in the first radio cell broadcasting messages (response) if the information is available in their database;
(n) All user terminals in the first radio cell updating their database upon receiving a response in step (I) or in step (m) with the former taking precedence over the latter;
(o) One of the bridges in the first radio cell re-broadcasting the message to adjacent radio cells if the information is not available in its database and the intended terminal is not in the first radio cell;
(p) Repeating steps (o) in the second and subsequent radio cells until the message reaches a bridge having the information in its database or the intended user terminal itself;
(q) The intended user terminal or the bridge sending a response message (attachment) back;
(r ) All user terminals updating their database.
19. A method as claimed in claim 18, wherein the response message is restricted for recipients in a radio cell or a group of radio cells.
20. A method as claimed in claim 16, wherein the attachment message contains quality of service indicators which may be modified by the intermediate bridges.
21. A method as claimed in any one of claims 16 to 19, wherein the user terminals check for duplicate messages received by comparison with the previously received messages.
22. A method as claimed in claim 14, wherein the packet forwarding to an user terminal at a destination includes the following steps:
(s) Checking whether the destination is directly reachable without going through a bridge and if so sending the packet directly to the destination;
(t) Sending the packet to one or more bridges if the destination is not directly reachable.
(u) A bridge, upon receiving a packet forwards the packet to the destination if it is directly reachable or to one or more bridges if the destination is not directly reachable.
23. A method as claimed in claim 22, wherein the selection of bridge is based on quality of service indicators and/or on reliability.
24. A method of providing handoff in a system for mobile ad hoc communication, the method including:
Performing a method as claimed in anyone of claims 11 to 24, and wherein the attachment or detachment are performed when a user terminal moves into a radio cell or moves out of a radio cell.
25. A method as claimed in claim 14, wherein a mobile terminal makes dynamic decision to go for path update, or path query, or for both.
26. A method of auto-configuration of addresses and service discovery in a system for mobile ad hoc communication, including the steps of:
(v) The user terminal broadcasting its details after attachment;
(w) One of the user terminals broadcasting the assigned address (address allocator);
(x) Other terminals updating their database;
(y) The user terminal broadcasting the detachment from the radio cell;
(z) Other terminals de-allocating the assigned address and updating their database.
27. A method as claimed in claim 26, wherein the user terminal assigns an address by itself if it is not assigned an address within certain time period.
28. A method as claimed in claim 26 or 27, wherein the address allocator is the terminal having an address one less than the smallest address among the currently available unassigned addresses or the terminal having the smallest address among the terminals present.
29. A method as claimed in claim 28, wherein one of the user terminals initiates the de-allocation of address assigned to another terminal if that is not reachable for a period of time.
30. A method as claimed in claim 28, wherein the address space is re-used.
31. A method as claimed in claim 28, wherein the access point or base station acts as the address allocator for the very first mobile terminal attaching to the radio cell.
32. A method as claimed in claim 22, wherein the Internet protocol is used instead of the data link layer protocol.
33. A method according to claim 24, wherein the Internet protocol addressing is used.
34. A system as claimed in claim 10, wherein the terminals are deployed in a wide area network.
35. A system as claimed in claim 10, wherein the data link layer is based on the IEEE 802.11 specifications.
36. A system as claimed in claim 10, wherein the data link layer is based on the ETSI Hyperlan specifications.
37. A system as claimed in claim 10, wherein the data link layer is based on the Bluetooth specifications.
38. A system as claimed in claim 10, wherein the system is used in conjunction with infrastructure networks.
39. A system as claimed in claim 10, wherein one of a plurality of bridging and addressing methods are used.
40. A system as claimed in claim 4, operatively adapted to carry out a method as claimed in any one of claims 1 to 3, or 11 to 33.
41. A computer program product including: a computer usable medium having computer readable program code and computer readable system code embodied on said medium for enabling ad hoc mobile communication in conjunction with a data processing system, said computer program product including: computer readable code within said computer usable medium for performing, in association with a system as claimed in claim 4, a method as claimed in any one of claims 1 to 3 or 11 to 33.
42. A method as claimed in any one of claims 1 to3, 11 or 32, wherein the third terminal is instead used to act as a network layer (layer 3) router providing routing.
43. A system as claimed in any one of claims 4 to 10, 34 or 38 to 40, wherein the plurality of mobile and / or fixed user terminals is adapted instead to serve as a network layer (layer 3) router providing routing.
PCT/SG2001/000050 2001-03-23 2001-03-23 A method and system for providing bridged mobile ad-hoc networks WO2002078272A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/SG2001/000050 WO2002078272A1 (en) 2001-03-23 2001-03-23 A method and system for providing bridged mobile ad-hoc networks

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/SG2001/000050 WO2002078272A1 (en) 2001-03-23 2001-03-23 A method and system for providing bridged mobile ad-hoc networks

Publications (1)

Publication Number Publication Date
WO2002078272A1 true WO2002078272A1 (en) 2002-10-03

Family

ID=20428920

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/SG2001/000050 WO2002078272A1 (en) 2001-03-23 2001-03-23 A method and system for providing bridged mobile ad-hoc networks

Country Status (1)

Country Link
WO (1) WO2002078272A1 (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003028315A1 (en) * 2001-09-27 2003-04-03 Telefonaktiebolaget Lm Ericsson Method for multihop routing for distributed wlan networks
DE10327923A1 (en) * 2003-06-20 2005-01-05 Matias Campiani Communication system and method for establishing communication links
EP1526750A2 (en) * 2003-10-22 2005-04-27 Samsung Electronics Co., Ltd. Network apparatus and method for stable handoff in IP-based mobile ad hoc network system
FR2862471A1 (en) * 2003-11-17 2005-05-20 Somfy Domestic network radio electric wave bias point/point communications for blinds/solar energy devices/ventilation lighting having auxiliary intermediate points providing point/multipoint communication between first/second point
CN1299478C (en) * 2004-03-26 2007-02-07 清华大学 Route searching of detgredd of node based on radio self-organizing network and maitenance method thereof
EP1760967A1 (en) 2005-09-02 2007-03-07 NTT DoCoMo, Inc. Wireless communication terminal and QoS information collection method
CN1327671C (en) * 2003-09-22 2007-07-18 三星电子株式会社 Service search system for wireless ad hoc network, and service searching method thereof
CN1331331C (en) * 2004-04-27 2007-08-08 国家数字交换系统工程技术研究中心 Method for implementing self-organizing network
WO2007106266A1 (en) * 2006-03-13 2007-09-20 Microsoft Corporation Connecting multi-hop mesh networks using mac bridge
US8060590B2 (en) 2003-06-30 2011-11-15 Sony Deutschland Gmbh Distance-aware service discovery mechanism for determining the availability of remote services in wireless personal area networks
GB2512749A (en) * 2014-02-25 2014-10-08 Cambridge Silicon Radio Ltd Linking ad hoc networks
US9386605B2 (en) 2014-07-11 2016-07-05 Motorola Solutions, Inc. Mobile dynamic mesh cluster bridging method and apparatus at incident scenes
US9692538B2 (en) 2014-02-25 2017-06-27 Qualcomm Technologies International, Ltd. Latency mitigation
CN110971514A (en) * 2019-11-29 2020-04-07 湖南基石通信技术有限公司 Pilot frequency gateway equipment and data interaction method of pilot frequency network
WO2023164789A1 (en) * 2022-03-01 2023-09-07 海能达通信股份有限公司 Routing protocol method, mobile ad hoc network, station, and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1995012942A1 (en) * 1993-11-04 1995-05-11 Norand Corporation A communication network providing wireless and hard-wired dynamic routing
EP0662760A2 (en) * 1994-01-10 1995-07-12 International Business Machines Corporation Highly dynamic destination-sequenced destination vector routing for mobile computers
WO1999046899A2 (en) * 1998-03-11 1999-09-16 Swisscom Ag Routing method for wireless and distributed systems
US5987011A (en) * 1996-08-30 1999-11-16 Chai-Keong Toh Routing method for Ad-Hoc mobile networks

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1995012942A1 (en) * 1993-11-04 1995-05-11 Norand Corporation A communication network providing wireless and hard-wired dynamic routing
EP0662760A2 (en) * 1994-01-10 1995-07-12 International Business Machines Corporation Highly dynamic destination-sequenced destination vector routing for mobile computers
US5987011A (en) * 1996-08-30 1999-11-16 Chai-Keong Toh Routing method for Ad-Hoc mobile networks
WO1999046899A2 (en) * 1998-03-11 1999-09-16 Swisscom Ag Routing method for wireless and distributed systems

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
BHAGWAT P. ET AL.: "A routing vector method (RVM) for routing in bluetooth scatternets", IEEE INTERNATIONAL WORKSHOP ON MOBILE MULTIMEDIA COMMUNICATIONS, November 1999 (1999-11-01), pages 357 - 359 *
PERKINS C.E.: "Mobile-IP, ad-hoc networking, nomadicity", PROCEEDINGS OF THE ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), August 1996 (1996-08-01), pages 472 - 476 *

Cited By (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7443822B2 (en) 2001-09-27 2008-10-28 Telefonaktiebolaget L M Ericsson (Publ) Method for multihop routing for distributed WLAN networks
WO2003028315A1 (en) * 2001-09-27 2003-04-03 Telefonaktiebolaget Lm Ericsson Method for multihop routing for distributed wlan networks
DE10327923A1 (en) * 2003-06-20 2005-01-05 Matias Campiani Communication system and method for establishing communication links
US8060590B2 (en) 2003-06-30 2011-11-15 Sony Deutschland Gmbh Distance-aware service discovery mechanism for determining the availability of remote services in wireless personal area networks
CN1327671C (en) * 2003-09-22 2007-07-18 三星电子株式会社 Service search system for wireless ad hoc network, and service searching method thereof
EP1526750A2 (en) * 2003-10-22 2005-04-27 Samsung Electronics Co., Ltd. Network apparatus and method for stable handoff in IP-based mobile ad hoc network system
US7697940B2 (en) 2003-10-22 2010-04-13 Samsung Electronics Co., Ltd. Network apparatus for stable handoff in IP-based mobile ad hoc network system, and handoff method using the same
EP1526750A3 (en) * 2003-10-22 2005-11-09 Samsung Electronics Co., Ltd. Network apparatus and method for stable handoff in IP-based mobile ad hoc network system
CN1321514C (en) * 2003-10-22 2007-06-13 三星电子株式会社 Network apparatus and method for stable handoff
FR2862471A1 (en) * 2003-11-17 2005-05-20 Somfy Domestic network radio electric wave bias point/point communications for blinds/solar energy devices/ventilation lighting having auxiliary intermediate points providing point/multipoint communication between first/second point
WO2005048536A1 (en) * 2003-11-17 2005-05-26 Somfy Sas Link set up and relaying in a home automation adhoc network
CN100479608C (en) * 2003-11-17 2009-04-15 Somfy两合公司 Link set up and relaying in a home automation ADHOC network
CN1299478C (en) * 2004-03-26 2007-02-07 清华大学 Route searching of detgredd of node based on radio self-organizing network and maitenance method thereof
CN1331331C (en) * 2004-04-27 2007-08-08 国家数字交换系统工程技术研究中心 Method for implementing self-organizing network
EP1760967A1 (en) 2005-09-02 2007-03-07 NTT DoCoMo, Inc. Wireless communication terminal and QoS information collection method
US8406138B2 (en) 2005-09-02 2013-03-26 Ntt Docomo, Inc. Wireless communication terminal and QoS information collection method
AU2007225380B2 (en) * 2006-03-13 2010-09-30 Microsoft Technology Licensing, Llc Connecting multi-hop mesh networks using MAC Bridge
WO2007106266A1 (en) * 2006-03-13 2007-09-20 Microsoft Corporation Connecting multi-hop mesh networks using mac bridge
US8340106B2 (en) 2006-03-13 2012-12-25 Microsoft Corporation Connecting multi-hop mesh networks using MAC bridge
US9672346B2 (en) 2014-02-25 2017-06-06 Qualcomm Technologies International, Ltd. Object tracking by establishing a mesh network and transmitting packets
GB2512749B (en) * 2014-02-25 2015-04-01 Cambridge Silicon Radio Ltd Linking ad hoc networks
US9489506B2 (en) 2014-02-25 2016-11-08 Qualcomm Technologies International, Ltd. Linking ad hoc networks
GB2512749A (en) * 2014-02-25 2014-10-08 Cambridge Silicon Radio Ltd Linking ad hoc networks
US9692538B2 (en) 2014-02-25 2017-06-27 Qualcomm Technologies International, Ltd. Latency mitigation
US9754096B2 (en) 2014-02-25 2017-09-05 Qualcomm Technologies International, Ltd. Update management
US9842202B2 (en) 2014-02-25 2017-12-12 Qualcomm Technologies International, Ltd. Device proximity
US9910976B2 (en) 2014-02-25 2018-03-06 Qualcomm Technologies International, Ltd. Processing mesh communications
US10055570B2 (en) 2014-02-25 2018-08-21 QUALCOMM Technologies International, Ltd Mesh relay
US9386605B2 (en) 2014-07-11 2016-07-05 Motorola Solutions, Inc. Mobile dynamic mesh cluster bridging method and apparatus at incident scenes
CN110971514A (en) * 2019-11-29 2020-04-07 湖南基石通信技术有限公司 Pilot frequency gateway equipment and data interaction method of pilot frequency network
WO2023164789A1 (en) * 2022-03-01 2023-09-07 海能达通信股份有限公司 Routing protocol method, mobile ad hoc network, station, and storage medium

Similar Documents

Publication Publication Date Title
EP1733516B1 (en) Method, communication device and system for detecting neighboring nodes in a wireless multihop network using ndp
US7016336B2 (en) Administrative domains for personal area networks
Jayakumar et al. Ad hoc mobile wireless networks routing protocols–a review
KR100789773B1 (en) A mesh networking auto configuration method, virtual link setting method, packet transmission method and terminal for its in multi hop wireless lan
US9247482B2 (en) Ad hoc wireless communications network with node role information routing and associated methods
US8483192B2 (en) Six-address scheme for multiple hop forwarding in wireless mesh networks
US8009615B2 (en) Multi-hop ad-hoc wireless networks that support non-multi-hop wireless terminals
EP1480388A2 (en) Wireless network clustering communication system and corresponding access port
US20070274232A1 (en) Method, Communication Device and System for Detecting Neighboring Nodes in a Wireless Multihop Network Using Ndp
Mayer et al. Ip-enabled wireless sensor networks and their integration into the internet
US7660258B2 (en) Method for automatically configuring network addresses in mobile multi-hop network
WO2002078272A1 (en) A method and system for providing bridged mobile ad-hoc networks
Chuah et al. Enhanced disruption and fault tolerant network architecture for bundle delivery (EDIFY)
US20070115828A1 (en) Method for sending requests in a network
US9232389B2 (en) Mixed mode security for mesh networks
US7286542B2 (en) Mobile communication network system, foreign agent router, address server and packet delivery method employed therein
Chiang et al. A partition network model for ad hoc networks
Mane Conceptual Aspects on Mobile Ad-Hoc Network System
EP2377348B1 (en) System and method for enabling ipv6-based communication in a vanet
WO2010131152A1 (en) A method for communicating in a segmented network
Lo et al. Personal networks-an architecture for 4G mobile communications networks
Schoeneich et al. Mesh Cluster Based Routing Protocol: Enhancing Multi-hop Internet Access using Cluster paradigm
King et al. Dynamic addressing and mobility in tactical hybrid ad-hoc networks
Huang et al. A partition network model for ad hoc networks in overlay environments
ben Hamida et al. An ad hoc networking for inter-MONET using mobile IPv6 and OLSR

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP