The present invention relates in general to a name service in a wireless ad hoc network and particularly to a distributed auto discovering name service for multihop wireless ad hoc networks.
It is an increasing interest for developing and deploying wireless multihop ad hoc networks in several different application areas within commercial, private installations, and for governmental purposes. The commercial applications of ad hoc networks can for instance be used for hot spot installations during special events. Hot spots are local areas where wireless access are provided for paying customers so they can be in contact with a network, such as the Internet or a private network. Private installations can be within a company or during a special event.
The governmental applications can be during rescue operations within disaster areas, military applications, or during special events.
A multihop wireless ad hoc network is built up by the nodes present since the network actually is formed by the present nodes; an ad hoc network does not have any central control function. The nodes all act as routers, routing traffic to other nodes which is a similar concept as for fixed networks. However, the routing protocol used in these types of multihop wireless ad hoc networks is often quite different from the normal routing protocols used for fixed networks. The nodes keep track of the other nodes by updating a routing table using the protocol and there are mainly two different categories of routing protocols: reactive and proactive. The reactive protocol reacts on the need of routing a message in the network and updates the routing table paths on demand. The proactive protocol updates the routing table on a regular basis.
The term multihop is defined as using the nodes together building up the network forwards messages and traffic not intended for themselves to other nodes able to communicate with the node until the data traffic reaches the intended node.
The existing solutions for multihop wireless network has knowledge about which nodes are available and possible routing routes to the nodes part of the network; however, there is a lack of knowledge about the users in the multihop wireless network. The network infrastructure routing tables do not handle any naming services.
Central domain name system (DNS) has a drawback in the fact that it is central, this means that it is vulnerable as a single point of failure. During update of such a central database, it may become unavailable for a certain period of time, thus making traffic within the network impossible or at least difficult.
Accordingly the present invention according to a preferred embodiment preferably seeks to mitigate, alleviate or eliminate one or more of the above-mentioned disadvantages singly or in any combination.
This is done by a method for automatic name service discovery, which is distributed to all nodes present in a network. A name service database is updated locally in each node present in the network.
A first embodiment of the present invention, a method for associating user information with network information in a multihop wireless ad hoc network comprising a plurality of nodes is presented, comprising the steps of:
In the method, the user information may comprise information about at least one of user identifications, network addresses, available services within network, and authority level of each user.
Another aspect of the present invention, a node in a multihop wireless ad hoc network comprising a plurality of nodes is presented, comprising
The service in the node may further update the information changes in the database.
In yet another aspect of the present invention, a multihop wireless ad hoc network comprising a plurality of nodes, together forming the network, wherein changes of user information of the nodes are automatically distributed to all nodes within the network and wherein the user information is a naming service for associating user information with a respective network address.
The user information may further comprise information about available services in nodes. The user information may further comprise information about authority level of each user.
The at least one node within the network may be connected to a second network and wherein the at least one node acts as a gateway between the network and the second network; adapting user information in the network to usable information in the second network.
In still another aspect of the present invention, an instruction set in a node in a multihop wireless ad hoc network comprising a plurality of nodes is presented, for responding to changes of user information reaching the node, the instruction set comprising:
Yet another aspect of the present invention is presented: a database in a node in a multihop wireless ad hoc network, comprising entries for associating user information with network information; changes of the database being updated and distributed to all nodes within the network when changes in the database has been detected.
In the database the entries may comprise at least one of user identification of each user connected within the network and corresponding network address, available services in each node, and authority level of each user.
Yet another aspect of the present invention is presented: an application in a node in a multihop wireless ad hoc network using a database for finding a network address of a user within the network when communicating with a certain user; the database comprising entries for associating user information with network information; changes of the database being updated and distributed to all nodes within the network when changes in the database has been detected.
Yet another aspect of the present invention comprise a database associating user information with network information for use when a mobile station in a packet based network system connects to a private network using a virtual private network function (VPN), wherein a VPN server contains one instance of the database for each connected user, and the instances of the database are automatically updated when changes of user information occur.
Another aspect of the present invention comprise a database in a mobile station associating user information with network information for use when a mobile station in a packet based network system connects to a private network using a virtual private network function (VPN), wherein each mobile station contains one instance of the database, and each instance of the database are automatically updated when changes of user information occur.
These and other aspects of the invention will be apparent from and elucidated with reference to the embodiments described hereinafter.
In the following the invention will be described in a non-limiting way and in more detail with reference to exemplary embodiments illustrated in the enclosed drawings, in which:
In this example, node 1 with a user named X has the desire to communicate with a user named Y. In order to do this X needs to translate the user name, Y, to a network address. Thereafter, the routing protocol will be able to find user Y in the network. Finally communication is established between X and Y. The present invention uses a method for updating a database comprising information about available users and their network location (which is not the same as physical location of course); associating user information with network information. Each node continuously tracks traffic on the network in order to respond to changes in the network configuration. Each node may be looking in a neighbor cache available in each node, looking for neighbor topology changes. Such neighbor cache functions may be for example an ARP (Address Resolution Protocol) function in IPv4 or a Neighbor Discovery function in IPv6. These protocols keep track of network hardware addresses for neighboring nodes.
Upon activation of the network, if a node discovers traffic on the network, it will exchange information to the nearest neighbors, the information may comprise, but not limited to, user information, address information, services available from the node, or authority level. The different types of information will be discussed later in more detail. The nearest neighbors obtain this information and store it in their local database located in each node. They will also pass the information on to their nearest neighbors and so on until equilibrium is reached and all nodes in the network have updated their database. Thus all nodes may have the same data about the network.
When the network has formed, the nodes will still keep track of traffic and look for new users or new information available. If so, a new update stream will be sent to the nearest neighbors again and the network will be updated in the same manner as described above for the network activation situation.
When a first node sees a new node it will ask the new node for information. There are two possible responses to this request:
A node may be triggered to send out new information to the network by using an internal trigger such as updating their own database with new information about themselves, thus the system will be triggered and start a network update transmission.
Optionally it is possible to configure the system to flood the network with information in order to trigger a new update from the nearest neighbors or to update the entire network. This ensures that the network has fresh and correct information about users and available services. The flooding behavior may be triggered if there has been a long time period without any information exchange in the network or for the node, or it may be triggered on a regularly basis.
When applications (or users) desire to communicate with a certain user, the node in question looks into the name service database and connects the user to a network address, enabling traffic to be routed within the network to the desired user.
A more detailed description about different types of information that could be exchanged using the present invention will now follow. The two most important information types are user name and network address. These provide the possibility to find a route to a specific user. If a user logs out from a node and logs into another node the network updates the database entries accordingly and it will still be possible to route traffic to the correct user. The user information may comprise at least one of name, user name, identification data, email address, IP address in “Home” network, or other information relating to the user, such as home address, telephone number or similar data. With “Home” network means a network where the user belongs to such as, for instance, a private network or company network. This may be a network where the user often resides in with user equipment but it may also be a network provided by a Service Provider (SP) granting access for the user and charging the user for these services.
Other information that may be distributed is information about services provided by a modem, such as a VOIP gateway (Voice over IP), Internet gateway, fixed network services, infrastructure services, calculational services, database services, and other such informative services. Information about authority level of a user may be distributed using the present invention as well. This may be of interest for instance in a military application or in a rescue application, where it may be important to find a chain of command, a access level of databases available as services in the network, and so on.
Advantages of the present invention include:
The invention may be implemented in software using many different coding approaches and run on a suitable calculational device, such as a microprocessor. It may also be implemented in more hardware close environments, such as in an FPGA (Field Programmable Gate Array), a DSP (Digital Signal Processor), or an ASIC (Application Specific Integrated Circuit). These are non-limiting examples of units or devices in which the present invention may be implemented.
Users may log into a VPN (Virtual Private Network) protected private network 408 using their GPRS or 3G equipment. They log in to the VPN network via for instance the Internet or some similar public or semi public network (e.g. a network provided by a Service Provider). In order to keep track of the users from the private network and providing communication possibilities between users logged into the private network, a naming service according to the present invention is utilized. When a user logs out, a new user logs in, or any other new information is available the name services in the private network are updated. Each user logged in has a dedicated name service database 407 associated with the user. This dedicated database 407 may be located in a server 406 associated with the private VPN protected network or locally cached (not shown) in each node, such as a PDA. A mobile station may be for instance a mobile phone, a laptop, a PDA, or similar equipment used in mobile applications.
In this second embodiment the system is triggered for an update of information using a similar method as for the first embodiment.
An interpretation interface or “translator” may be provided that can handle interfacing to applications that is not normally designed to communicate in a network using the present invention, i.e. a name resolution function for “legacy” applications.
The name service database may communicate with an SNMP (Simple Network Management Protocol) application in order to collect statistical data, configurations, and so on, as well as being able to control and configure name service databases remotely from a central view point.
A route export function implemented in a gateway may also be provided in order to communicate between the multihop wireless ad hoc network and other networks, such as a fixed network (e.g. Ethernet). This function acts as an interpreter between the name service available in the ad hoc network according to the present invention and standard routing and/or name service protocols available in other networks, such as OSPF (Open Shortest Path First) protocol.
It should be noted that the word “comprising” does not exclude the presence of other elements or steps than those listed and the words “a” or “an” preceding an element do not exclude the presence of a plurality of such elements. It should further be noted that any reference signs do not limit the scope of the claims, that the invention may be implemented by means of both hardware and software, and that several “means” may be represented by the same item of hardware.
The above mentioned and described embodiments are only given as examples and should not be limiting to the present invention. Other solutions, uses, objectives, and functions within the scope of the invention as claimed in the below described patent claims should be apparent for the person skilled in the art.
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/SE04/02038 | 12/29/2004 | WO | 00 | 6/27/2007 |