WO2020141087A1 - Configuration d'un réseau de dispositifs - Google Patents

Configuration d'un réseau de dispositifs Download PDF

Info

Publication number
WO2020141087A1
WO2020141087A1 PCT/EP2019/086298 EP2019086298W WO2020141087A1 WO 2020141087 A1 WO2020141087 A1 WO 2020141087A1 EP 2019086298 W EP2019086298 W EP 2019086298W WO 2020141087 A1 WO2020141087 A1 WO 2020141087A1
Authority
WO
WIPO (PCT)
Prior art keywords
devices
communication information
communicate
inactivated
activated
Prior art date
Application number
PCT/EP2019/086298
Other languages
English (en)
Inventor
Lei Feng
Gongming Wei
Original Assignee
Signify Holding B.V.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Signify Holding B.V. filed Critical Signify Holding B.V.
Publication of WO2020141087A1 publication Critical patent/WO2020141087A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/24Connectivity information management, e.g. connectivity discovery or connectivity update
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/24Connectivity information management, e.g. connectivity discovery or connectivity update
    • H04W40/246Connectivity information discovery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks

Definitions

  • the present invention relates to the field of configuring a plurality of devices, and in particular how to configure a plurality of devices to form a network of devices.
  • Such networks can be implemented in a variety of industries, including the automotive, utility (e.g. lighting or water), agricultural and health industries.
  • devices may consist of peripheral input and/or output devices, and may include, for example, water meters, gas detectors, car monitoring systems, personal healthcare monitoring products and/or wireless luminaires such as smart streetlights.
  • One known method of configuring devices to form a network able to communicate with a backend system is to configure each device to communicate with the backend system using a cellular communication protocol, such as 3G, 4G and so on.
  • a cellular communication protocol such as 3G, 4G and so on.
  • cellular communication protocols are expensive, as devices need to be registered to a network carrier and typically require payment of regular data tariffs.
  • Another proposed method is to enable devices to communicate with one another and the backend system using a long range wireless network protocol, such as LoRaWAN.
  • a long range wireless network protocol such as LoRaWAN.
  • an urban environment e.g. a city
  • each device is: adapted to directly communicate with at least one other device in the plurality of devices using a first wireless communication protocol; capable of being activated so as to directly communicate with the backend system using a second wireless communication protocol; and initially inactivated, so that each device is initially unable to communicate using the second wireless communication protocol.
  • the method comprises: activating one of the plurality of devices, so that the activated device is able to communicate with the backend system using the second wireless communication protocol; and performing iterative steps.
  • the iterative steps comprise: obtaining, from each of a set of one or more devices able to directly communicate with the most recently activated device using the first wireless communication protocol, communication information, being information indicating with which other devices the device is able to communicate using the first wireless communication protocol; updating a communication information dataset to include the obtained communication information obtained from each device in the set of one or more devices; processing the communication information dataset to identify one of the plurality of devices for activation; and activating the identified device, so that the activated device is able to communicate with the backend system using the second wireless communication protocol.
  • the iterative steps are repeated until each device of the plurality of devices is either an activated device or is able to directly communicate with at least one activated device using the first wireless communication protocol.
  • a network having a one-hop star topology benefits from improved reliability, reduced bottle necking, reduced latency and reduced signal interference/degradation when compared to a network having a multi-hop topology.
  • the network provided, by executing the claimed method is formed from activated devices, able to communicate with the backend system using a second wireless communication protocol, and inactivated devices able to directly communicate with an activated device using a first wireless communication protocol (e.g. to thereby communicate with the backend system).
  • a hybrid network is formed that can use two wireless communication protocols to enable all devices to communicate with a backend system.
  • a device can be defined as being “activated”, in which it is able to directly communicate with the backend system using the second wireless communication protocol, or“inactivated”, in which it is not able to directly communicate with the backend system using the second wireless communication protocol.
  • An inactivated device may be able to (directly) communicate with an activated device using the first wireless communication protocol, to thereby communicate with the backend system (i.e. an activated device may act as a router). Initially, i.e. before performing the proposed method, none of the plurality of devices are activated.
  • the proposed method performs an iterative process to sequentially activate certain ones of the (initially inactive) devices in the network to form the one-hop star topology. Thus, a sequence of activations takes place.
  • the method builds up a dataset of communication information, each entry in the dataset being associated with a device in direct communication with an activated device and identifying with which other device(s) that the associated device is able to directly communicate.
  • the dataset is updated/expanded each time a device is activated (as new devices become able to direct communicate with the most recently activated device), and then processed to identify which device is to be activated next.
  • the iterative process is stopped when all devices of the plurality of devices are either activated or in direct communication with an activated device (i.e. when a network having a one-hop star topology is formed).
  • the method thereby proposes a concept for guiding an activation sequence of only certain ones of the (initially inactivated) devices, e.g. to act as routers or relay devices for communication with the backend system.
  • the proposed method thereby enables a network, having a one-hop star topology, to be formed in a guided manner, without needing to activate all devices to be able to communicate using the second wireless communication protocol (or needing all devices to be initially activated). This can help reduce an expense of the network, as fewer devices need to be activated to communicate using the second wireless communication protocol.
  • the term“directly communicate” means communicating from a first entity to a second entity, without the communication being routed via a third entity (i.e. in a single hop).
  • the term“backend system” refers to any device/system external to the plurality of devices, e.g. comprising one of more of: a router, a server, a base station, a cloud-computing system, a controller and so on.
  • the plurality of devices are each able to communicate with at least one other device using the first wireless communication protocol.
  • the plurality of devices may comprise devices for which a message can be routed from any device to any other device in the plurality of device using the first wireless communication protocol.
  • the second wireless communication protocol is different to the first wireless communication protocol.
  • the step of processing the communication information dataset may comprise: determining whether any inactivated device, having communication information in the communication information dataset, has communication information that indicates that they are able to directly communicate with at least one other inactivated device that is unable to directly communicate with an activated device; and in response to a positive determination, identifying an inactivated device, having communication information in the communication information dataset, whose communication information indicates they are able to directly communicate with the greatest number of inactivated devices that are unable to directly communicate with an activated device compared to other inactivated devices having communication information in the communication information dataset.
  • communication information indicates with which other device(s) a particular device is able to communicate. Inclusion of communication information in the dataset indicates that the corresponding device is able to directly communicate with an activated device (as only devices able to directly communicate with an activated are included in the dataset).
  • the device chosen for activation is one able to communicate with the greatest number of inactivated devices not already in direct communication with an activated device (e.g. not having communication information in the dataset). This means that the device having the broadest known reach (to other devices) can be selected to improve an efficiency of selecting the devices to activate.
  • the step of processing the communication information dataset further comprises: determining whether two or more inactivated devices, having communication information in the communication information dataset, have communication information that indicates they are able to directly communicate with the same greatest number of inactivated devices that are unable to directly communicate with an activated device compared to other inactivated devices having communication information in the communication information dataset; and in response to a positive determination, identifying an activated device, of the two or more inactivated devices, whose communication information indicates that they are able to directly communicate with the fewest number of inactivated devices that are able to communicate with an activated device.
  • more than one inactivated device able to directly communicate with an activated device, may be able to directly communicate with a same number of inactivated devices not able to directly communicate with an activated device. If this number is the highest of all entries in the communication information dataset, then there is a problem of deciding how to select which of the more than one inactivated devices to select for activation.
  • the set of one or more devices comprises only those devices for which a signal quality measurement of communications with the most recently activated device, using the first wireless communication protocol, is greater than a first predetermined threshold. That is to say to select high quality communication nodes.
  • the criteria for‘direct communication’ may be restricted to requiring a signal quality above a first predetermined threshold. Examples of a signal quality measurement include received signal strength indication (RSSI), received channel power indicator (RCPI), Signal-to-Noise (SNR) ratio, a Quality of Service indicator, or even a physical distance between the devices (e.g. as measured based on GPS measurements).
  • the set of one or more devices may comprise only those devices for which a signal quality measurement of communications with the most recently activated device, using the first wireless communication protocol, is less than a second, different predetermined threshold (which may be greater than the first predetermined threshold). This is to say to select the nodes at the edge of the most recently activated device to enhance usage of coverage and try to select as little as possible devices to be activated to save cost. From another aspect, this also increases a robustness/reliability of the overall network, as such devices may otherwise drop out of communication with an activated device and thereby be unable to communicate with the backend system.
  • the set of one or more devices comprises only those devices for which a signal quality measurement of communications with the most recently activated device, using the first wireless communication protocol, is greater than a first predetermined threshold and less than a second, different predetermined threshold (which may be greater than the first predetermined threshold).
  • the method may further comprise, in response to the iterative steps ending, activating one or more inactivated devices in the plurality of devices so that each device of the plurality of devices, able to communicate with at least two other devices using the first wireless communication protocol, is either an activated device or is able to directly communicate with at least two activated devices.
  • additional devices may be activated to ensure that all devices in the network are able to directly communicate with at least two activated devices.
  • an activated device becomes unavailable, an inactivated device will still be able to communicate with the backend system via another activated device.
  • the step of processing the communication information dataset may comprise: determining whether any inactivated device, having communication information in the communication information dataset, has communication information that indicates that they are able to directly communicate with at least one other inactivated device that is unable to directly communicate with an activated device; and in response to a negative determination, identifying one of the inactivated devices, of the plurality of devices, not associated with any communication information in the communication information dataset.
  • the second wireless communication protocol is a cellular communication protocol.
  • cellular communication protocols tend to be expensive. There is therefore a particular desire to reduce the number of devices reliant on cellular communication protocols to communicate with a backend system.
  • the invention is therefore particularly advantageous when the second wireless communication protocol is a cellular communication protocol.
  • the first wireless communication protocol is in an unlicensed spectrum and/or a wide area network communication protocol.
  • a wide area network or unlicensed spectrum communication protocol such as LoRaWAN, can be cheaply implemented, and it is therefore preferred or advantageous to use such communications when available.
  • the step of processing the communication information dataset may comprise using the backend system to identify one of the plurality of devices for activation.
  • the backend system may provide the processing power for selecting which of the inactivated devices to activate. This reduces a burden on the devices in the network.
  • the step of obtaining communication information may comprise: broadcasting, from the most recently activated device, a first probe message using the first wireless communication protocol; and receiving, at the most recently activated device, a first response message from each device, within range of the first probe message, containing the communication information.
  • the step of obtaining communication information may further comprise controlling each device within range of the first probe message to: broadcast a second probe message using the first wireless communication protocol; receive, from each device with range of the second probe message, a second response message identifying that the said device within range of the second probe message is within range of the second probe message and thereby able to directly communicate with the device within range of the first probe message; generate a first response message containing the communication information, using the second response messages received from each device with range of the second probe message; and transmit the first response message to the most recently activated device.
  • the step of identifying one of the plurality of devices for activation comprises identifying a device able to directly communicate with an activated device.
  • a method of updating a communication information dataset comprising: sending a first probe message to each of a set of one or more devices using a first wireless communication protocol; receiving a first response message from each of the set of devices, the first response message containing communication information, being information indicating with which other devices the device is able to communicate using the first wireless communication protocol; and updating a communication information dataset to include the obtained communication information obtained from each device in the set of one or more devices;
  • the process carried out by the most recently activated device may, by itself, be considered an aspect of the invention.
  • the step of sending a first probe message comprises broadcasting the first probe message using the first wireless communication protocol.
  • a computer program comprising code means for implementing any described method when said program is run on a computer.
  • a processing system for enabling a plurality of devices to communicate with a backend system, wherein each device is: adapted to directly communicate with at least one other device in the plurality of devices using a first wireless communication protocol; capable of being activated so as to directly communicate with the backend system using a second wireless communication protocol; and initially inactivated, so that each device is initially unable to communicate using the second wireless communication protocol.
  • the processing system being configured to: activate one of the plurality of devices, so that the activated device is able to communicate with the backend system using the second wireless communication protocol; and perform iterative steps.
  • the iterative steps comprise obtaining, from each of a set of one or more devices able to directly communicate with the most recently activated device using the first wireless communication protocol, communication information, being information indicating with which other devices the device is able to communicate using the first wireless communication protocol; updating a communication information dataset to include the obtained communication information obtained from each device in the set of one or more devices; processing the communication information dataset to identify one of the plurality of devices for activation; and activating the identified device, so that the activated device is able to communicate with the backend system using the second wireless communication protocol.
  • the processor system is configured to repeat the iterative steps until each device of the plurality of devices is either an activated device or is able to directly communicate with at least one activated device using the first wireless communication protocol.
  • the backend system may be adapted to perform the iterative steps.
  • the backend system may comprise a data storage system for storing the communication information dataset.
  • Figure 1 illustrates a device for use in an embodiment of the invention
  • Figure 2 illustrates a plurality of devices
  • Figure 3 illustrates a method according to an embodiment of the invention
  • Figures 4 and 5 illustrate part of a method for processing the plurality of devices
  • FIG. 6 to 8 illustrate embodiments for steps of the method
  • Figures 9 and 10 illustrate part of a method for processing the plurality of devices.
  • Figure 11 illustrates the plurality of devices being subject to a step of a further embodiment of the method.
  • the invention provides a concept for enabling a plurality of devices to communicate with a backend system.
  • the plurality of devices are able to communicate among themselves using a first wireless communication protocol. It is proposed to activate certain ones of the plurality of devices, where activating a device enables it to communicate with the backend system using a second, different wireless communication protocol.
  • an iterative process is performed in which communication information about devices able to directly communicate with an activated device is obtained.
  • Illustrative embodiments may, for example, be employed in smart street lighting systems, in which the plurality of devices comprises smart streetlights and the backend system comprises a controller for the smart streetlights.
  • FIG. 1 is a block diagram illustrating a device 10 suitable for being used in embodiments of the invention, and is provided for the purposes of contextual understanding.
  • the device 10 comprises a central processor 12, a first wireless communication unit 13, a second wireless communication unit 14 and a peripheral component arrangement 15.
  • the central processor 12 is adapted to control signals to/from other components of the device.
  • the first wireless communication unit 13 is adapted to enable the device 10 (in particular, the central controller 12) to communicate with other devices using a first wireless communication protocol, such as LoRa.
  • the first wireless communication protocol could be any suitable radio frequency communication technology that supports a one-hop star topology network.
  • the second wireless communication unit 14 is adapted to enable the device 10 (in particular, the central controller 12) to communicate with other entities using a second wireless communication protocol, such as a cellular communication protocol (e.g. 3G, 4G and so on).
  • a second wireless communication protocol such as a cellular communication protocol (e.g. 3G, 4G and so on).
  • the second wireless communication protocol should be any wireless communication technology for connecting a wide area network to a backend system, e.g. cellular or WiMax.
  • the second wireless communication unit may either be inactivated, in which it is unable to communicate using the second wireless communication protocol, or activated, in which it is capable of communicating using the second wireless communication protocol.
  • a device 10 may also be “inactivated”, in that a second wireless communication unit is inactivated, or“activated”, in that the second wireless communication unit is activated.
  • Activating a second wireless communication unit may comprise performing steps that enable a device 10 to communicate over a particular wireless network, such as a cellular network, using the second wireless communication protocol.
  • a particular wireless network such as a cellular network
  • Methods of activating a wireless communication unit will be readily apparent to the skilled person (e.g. identification processes, authentication processes and so on).
  • activating a wireless communication unit may comprise sending an authentication request from the wireless communication unit to a home location register for a backend system, which authenticates the device and enables it to communicate with the backend system.
  • the wireless communication unit may be inactive (i.e. does not attempt communications using or is not configured to use the second wireless communication protocol).
  • the wireless communication unit may be active, and can attempt to communicate with the backend system using the second wireless communication protocol.
  • Another way to activate a wireless communication unit (and thereby device) comprises sending, e.g. from a backend system, a command or instruction to (a management system of) a mobile network operator of a network that operates using the second wireless communication protocol, to permit that wireless communication unit to communicate using the second wireless communication protocol, e.g. by registering the appropriate device, or IMSI thereof, with the mobile network operator.
  • a device may request to be activated for communicating with the backend system using the second wireless communication protocol in response to an activation instruction (e.g. issued by the backend system and routed via another activated device of the plurality of devices, and optionally routed by one or more other inactivated devices).
  • an activation instruction e.g. issued by the backend system and routed via another activated device of the plurality of devices, and optionally routed by one or more other inactivated devices.
  • a device can be activated without input from the device, such as if the backend system directly activates the device with the mobile network operator.
  • the peripheral component arrangement 5 may include, for example: a power supply; input/output devices (e.g. LEDs, lights, sensors and so on); a further (e.g. wired) communication module and so on.
  • input/output devices e.g. LEDs, lights, sensors and so on
  • a further (e.g. wired) communication module e.g., Ethernetd, Etherneted, etc.
  • Other suitable components for being included in a (networked) device will be apparent to the skilled person.
  • a backend system here comprises any entity, outside of the plurality of devices, which is able to communicate using the second wireless communication protocol, e.g. comprising a controller, database, router, cloud-computing arrangement and so on. It is desired for the backend system to be able to communicate with each of the plurality of devices (e.g. to control an operation of the plurality of devices).
  • Figure 2 illustrates a plurality of devices 1-9, A-G to be configured into a network of devices able to communicate with a backend system (not shown), e.g. via WAN/internet, by executing a method according to an embodiment of the invention.
  • the plurality of devices illustrated in Figure 2 are in an initial state, before the method is performed.
  • Each of the plurality of devices 1-9, A-G is adapted to communicate with at least one other device using a first wireless communication protocol.
  • Each device is also initially inactivated, and thereby unable to communicate with a backend system using a second wireless communication protocol.
  • none of the plurality of devices are able to communicate with the backend system using the second wireless communication protocol.
  • Embodiments of the method configure the plurality of devices 1-9, A-G to form a one-hop star network of devices, by activating certain ones of the plurality of devices in an iterative sequence, to thereby ensure that each device is either activated or is in direct communication (using the first wireless communication protocol) with an activated device.
  • a backend system may, before the plurality of devices are configured according to an embodiment, have access to information about the plurality of devices, such as identity information that identifies each device in the plurality of devices and/or information necessary to activate a device (such as a IMSI of each device). This may be performed, for example, by a technician that sets up the plurality of devices identifying devices in the plurality of devices (e.g. ID numbers), e.g. in the form of a list or dataset. The backend system could, for example, then retrieve additional information from a database, e.g. mapping an ID number to an IMSI. Other methods for enabling a backend system to obtain information about the plurality of devices will be apparent to the skilled person.
  • Figure 3 is a flowchart illustrating a method 30 according to an embodiment of the invention. The method may be carried out by a processing or computing system.
  • the method comprises a first step 31 of activating one of the plurality of devices, so that the activated device is able to communicate with the backend system using the second wireless communication protocol.
  • This first step may be performed spontaneously by the plurality of devices or may be performed by the backend system (e.g. selecting a known one of the plurality of devices to activate).
  • the plurality of devices may communicate with one another using the first wireless communication protocol to establish which of the plurality of devices is to be activated (e.g. selecting the device powered on at an earliest/latest point in time to be activated, or selecting a device able to directly communicate with the greatest number of other devices and so on).
  • the first wireless communication protocol to establish which of the plurality of devices is to be activated (e.g. selecting the device powered on at an earliest/latest point in time to be activated, or selecting a device able to directly communicate with the greatest number of other devices and so on).
  • the backend system may select a device to activate based on information about the plurality of devices, e.g. arbitrarily selecting a device, or based on a user input (e.g. a technician may indicate a (edge) device to be initially activated).
  • the backend system may then activate the identified device according to any previously described method.
  • the backend system can then send a message or command to the activated device to initiate the subsequent steps of the method 30.
  • the method 30 then comprises performing an iterative process formed of a series of steps, here labelled a second step 32, third step 33, fourth step 34 and fifth step 35.
  • a second step 32 comprises obtaining communication information from each of a set of one or more devices able to directly communicate with the most recently activated device using the first wireless communication protocol.
  • the second step can be carried out by the most recently activated device, so that the most recently activated device obtains the communication information from each of the set of one or more devices.
  • the most recently activated device may know to perform the second step in response to a message from the backend system (e.g. sent using the second wireless communication protocol).
  • the set of one or more devices may comprise all devices able to communicate with the most recently activated device. However, in preferable embodiments, the set of one or more devices comprises only those devices for which a signal quality measurement of communications with the most recently activated device, using the first wireless communication protocol, is greater than a first predetermined threshold and/or less than a second, different predetermined threshold. The second predetermined threshold may be greater than the first predetermined threshold.
  • the most recently activated device is the device activated in the first step 31.
  • the most recently activated device is that activated in the iteratively repeated fifth step 35 (later described).
  • the communication information indicates with which other devices the said device in the identified set is able to communicate using the first wireless communication protocol.
  • an instance of communication information may comprise a list of device identifiers (device IDs) each identifying a device able to directly communicate (using the first wireless communication protocol) with a device able to directly communicate (using the first wireless communication protocol) with the most recently activated device.
  • an instance or entry of communication information is obtained from each device able to directly communicate with the most recently activated device, thereby obtaining a plurality of instances/entries of communication information.
  • the communication information indicates with which other devices that a particular device is able to communicate using the first wireless communication protocol.
  • a third step 33 comprises updating a communication information dataset to include the obtained communication information (from each device in the set of devices).
  • the step of“updating” a communication information dataset may comprise creating a communication information dataset.
  • the step of updating may therefore include a step of creating a communication information dataset.
  • the communication information dataset thereby comprises information identifying devices that are able to directly communicate (using a first wireless communication protocol) with devices in direct communication (using a first wireless communication protocol) with an activated device.
  • the communication information dataset may be stored at the backend system.
  • the step 32 of updating a communication information dataset may therefore comprise passing, e.g. from the most recently activated device, communication information to the backend system using the second wireless communication protocol to update the stored dataset.
  • a fourth step 34 comprises processing the communication information dataset to identify one of the plurality of devices for activation. Thus, information on which devices are able to directly communicate with devices in direct communication with an activated device is used to determine which device to activate.
  • the fourth step 34 may be carried out by the backend system, which may possess more processing power than of the devices.
  • a fifth step 35 comprises activating the identified device, so that the activated device is able to communicate with the backend system using the second wireless communication protocol.
  • activation of a device may take place via an instruction routed from the backend system (e.g. through another activated device able to communicate with the identified device to be activated) or may be performed by the backend system itself.
  • the fifth step may comprise using the backend system to send an instruction to the identified device via the most recently activated device.
  • the instruction may therefore be passed to the most recently activated device using the second wireless communication protocol, and then routed to the identified device using the first wireless communication protocol.
  • the fifth step may comprise activating the identified device, e.g. by directly communicating with (a management system of) a mobile network operator.
  • the second through fifth steps 32-35 are repeated until each device of the plurality of devices is either an activated device or is able to directly communicate with at least one activated device using the first wireless communication protocol.
  • a network of devices, having a one-hop star topology, able to communicate with the backend system is created in an autonomous fashion.
  • Step 36 may comprise, for example, determining whether all devices identified in the communication information dataset (i.e. those having an entry in the dataset or referred to within an entry in the dataset) are able to communicate with an activated device.
  • a particular example of the method 30 will be described with further reference to Figures 4 to 10.
  • the method is performed on the plurality of devices 1-9, A-G first illustrated in Figure 2.
  • activated devices are illustrated with cross- hatching.
  • Inactivated devices are illustrated without cross-hatching.
  • one of the plurality of devices 1 is activated so that it can communicate with the backend system.
  • the selection of the device for the first step may be arbitrary, e.g. activating a device at an edge of the plurality of device that are able to directly communicate with the most recently activated device, and for which a signal quality measurements of communication with the most recently activated device are below the first predetermined threshold. This results in the subsequently activated device being one which may not be able to communicate with the most recently activated device with a high level of reliability, thereby avoiding the possibility that said device becomes unable to communicate with an activated device in a single hop.
  • Figure 5 illustrates each device 2, 3, 5, 6, 7, 9, A within range R1 of the most recently activated device 1 passing communication information to that device.
  • the communication information indicates, for each device 2, 3, 5, 6, 7, 9, A within range R1 of the most recently activated device 1, with which other devices said each device is able to communicate using the first wireless communication protocol.
  • device 2 may be able to communicate with devices 1, 3, 4, 5, 6, 7, 8, 9, A and B (which information may be contained within the communication information sent by device 2).
  • the second step 32 may be performed by appropriately controlling or instructing particular devices in the plurality of devices, including at least the most recently activated device and optionally the devices able to directly communicate with the most recently activated device using the first wireless communication protocol.
  • step 32 comprise a first sub-step 61 of broadcasting, from the most recently activated device, a first probe message or“StartProbe” message using the first wireless communication protocol and a second sub-step 62 of receiving, at the newly activated device, a first response message from each device, within range R1 of the first probe message, containing the communication information.
  • the most recently activated device may then update the communication information dataset, e.g. in step 33 (not shown).
  • the most recently activated device 1 may broadcast a first probe message or“StartProbe message” to each device within range R1 of the most recently activated device 1, using a first wireless communication protocol.
  • the devices 2, 3, 5, 6, 7, 9, A, B within range R1 of the first probe message form a set of devices able to directly communicate with the most recently activated device 1 using a first wireless communication protocol.
  • the first probe message is a request for any devices within range of the most recently activated device 1 (i.e. “probed devices” or the “set of devices”) to send communication information to that most recently activated device 1 (e.g. in the form of a response message), using the first wireless communication protocol.
  • a most recently activated device 1 could attempt to individually reach each device within the plurality of devices (i.e. unicasting, rather than broadcasting, a first probe message) to request communication information.
  • the most recently activated device may perform steps of sending a first probe message to each of a set of one or more devices using a first wireless communication protocol; receiving a first response message from each of the set of devices, the first response message containing communication information, being information indicating with which other devices the device is able to communicate using the first wireless communication protocol; and updating a communication information dataset to include the obtained communication information obtained from each device in the set of one or more devices.
  • Figure 7 illustrates a further embodiment of the second step 32, which differs from the previous embodiment by including further steps for generating communication information, to be performed for each device in the set of devices able to directly communicate with the most recently activated device.
  • the illustrated second step 32 further comprises a sub-step 71 of broadcasting, using the first wireless communication protocol, a second probe message by a probed device.
  • a probed device a device that receives a first probe message
  • the second probe message is a request for devices within range of the probed device (i.e. devices that are able to receive the second probe message) to send an acknowledgment message or second response message to the probed device that sent the second probe message.
  • a second response message indicates that the other device is able to directly communicate with the probed device using the first wireless communication protocol.
  • the second step 32 comprises (at the device in the set of devices) a sub-step 72 of receiving, from each device with range of the second probe message, a second response message identifying that the said device is able to directly communicate with the probed device.
  • a device receiving a second probe message may respond to the device sending the second probe message with an acknowledgment or second response message.
  • a third predetermined threshold respond to the second probe message with the second response message.
  • the third predetermined threshold may be the same as the first predetermined threshold previously described.
  • the sub-step 72 may comprise receiving, from each device, for which a signal quality measurement of communications using a first wireless communication unit with the device sending the second probe message with a signal quality measurement greater than a third predetermined threshold, the second response message.
  • the third predetermined threshold may be a threshold representing a sufficiently strong signal to ensure stable and reliable communications between two devices communicating using the first wireless communication protocol.
  • the second response message may, for example, contain a sender ID (of the device receiving the second probe message) and optionally a Quality of Service indicator or RSSI (received signal strength indication), which indicates a quality/strength of service of wireless communications between the device sending the second probe message and the device receiving the second probe message)
  • a sender ID of the device receiving the second probe message
  • RSSI received signal strength indication
  • the second step 32 also comprises, a sub-step 73 of generating, by the probed device, a first response message containing the communication information, using the second response messages received from each device with range of the second probe message.
  • the probed device that sends the second probe message
  • the information contained in the second response messages is used to create the communication information for sending to the most recently activated device 1.
  • the probed device may compile all sender IDs from received second response messages to form communication information.
  • sub-step 73 comprises compiling a list of sender IDs or devices that responded to the second probe message.
  • sub-step 73 comprises compiling a list of sender IDs for only those devices that responded to the second probe message where a Quality of Service indicator (when included in the second response message) is above a third predetermined threshold.
  • the third predetermined threshold represent a sufficiently strong or sufficiently high quality signal to ensure stable and reliable communications between two devices communicating using the first wireless communication protocol.
  • the second step 32 also comprises (at the device in the set of devices) a step 74 of transmitting the first response message to the most recently activated device. In this way, the communication information is sent to the most recently activated device.
  • sub-step 62 of receiving, at the most recently activated device, the communication information from each device in the set of devices able to directly communicate with the most recently activated device using the first wireless communication protocol.
  • Sub-steps 71 to 74 are repeated (e.g. consecutively or, preferably, in parallel) for each device in the set of devices able to directly communicate with the most recently activated device. Thus, different instances of sub-steps 71 to 74 may be performed. Only two instances are illustrated in Figure 6, but more/fewer may be used depending upon the number of devices able to directly communicate with the most recently activated device (or to which the first probe message was otherwise sent).
  • Communication information is thereby obtained by the most recently activated device, which information may be passed to the backend system for processing,
  • a probed device may only provide communication information if a signal quality measurement of communications with the most recently activated device, using the first wireless communication protocol, is greater than (or in other embodiments, less than) a first predetermined threshold.
  • steps 71-74 are only performed is a signal quality of the first probe message is greater than or less than a first predetermined threshold.
  • Signal quality may be measured, for example, by determining an RSSI (received signal strength indication), or SNR (signal to noise ratio) or other signal quality measurement.
  • a probed device may perform step 74 of transmitting the first response message to the most recently activated device (with sub-steps 71-73 being previously performed by that probed device).
  • each device of the plurality of devices may periodically perform the described sub-steps 71-73 to obtain communication information, and the latest acquired communication information may be provided in response to the first probe message.
  • sub-steps 71-73 may be performed when a device is first powered on (i.e. joins the plurality of devices).
  • a probed device provides communication information only if a signal quality measurement of communications with the most recently activated device, using the first wireless communication protocol, is greater than a first predetermined threshold.
  • sub-step 74 may only be performed is a signal quality of the first probe message is greater than a first predetermined threshold.
  • a device may passively monitor communications using the first wireless communication protocol sent by other devices within the plurality of devices, to identify with which of the plurality of devices said device is able to communicate with (e.g. within range of).
  • a probed device in the set of devices able to directly communicate with a most recently activated device using a first wireless communication protocol may only transmit the first response message, containing the communication information, to the most recently activated device in response to a collect message issued by the most recently activated device.
  • sub-step 74 may only be performed in response to a collect message sent by the most recently activated device.
  • devices in the first set send an acknowledgement message in response to the first probe message (and before sending the first response message). This enables the most recently activated device to record which devices are able to directly communicate with it using the first wireless communication protocol.
  • step 71 of broadcasting (by a probed device) a second probe message may be performed a (pseudo)random time period after the probed device receives the first probe message.
  • a (pseudo)random time delay may be a (pseudo)random time delay between a device receiving the first probe message, and the broadcasting of the second probe message.
  • Such a time delay reduces the likelihood or number of multiple messages being sent within the plurality of devices, reducing traffic within the channel used by the plurality of devices to communicate using the first wireless communication protocol.
  • the random or pseudorandom time delay is restricted to having a random or pseudorandom length falling within a predetermined time period (e.g. a (pseudo)random length between 0 and 60 seconds).
  • the predetermined time period may be defined in the first probe message, thereby enabling the most recently activated device to control communications in the channel used by the plurality of devices to communicate using the first wireless communication protocol.
  • the predetermined time period may depend upon the (predicted) number of devices able to communicate with the most recently activated device to avoid collision of the second probe message(s). In particular, the greater the (predicted) number of devices, the greater the predetermined time period.
  • the predetermined time period may be based on the number of devices in the plurality of devices, which may represent or estimate the number of devices able to communicate with the most recently activated device.
  • the above-described examples provide ways obtaining the communication information from each device able to communicate with the most recently activated device 1. Other methods of obtaining communication information will be apparent to the skilled person, e.g. by assessing a location of each device to predict whether different devices will be able to communicate with one another using the first wireless communication protocol.
  • a third step 33 of the method 30 comprises updating a communication information dataset to include the obtained communication information. For a first iteration, this may comprise generating a communication information dataset to contain the obtained communication information.
  • obtained communication information is used to update/create a communication information dataset.
  • This dataset thereby contains communication information for each device able to directly communicate with an activated device.
  • the communication information dataset may be stored on the backend system (not shown).
  • the most recently activated device may send the obtained communication information of each probed device to the backend system.
  • the most recently activated device may therefore perform at least part of the third step 33.
  • Step 34 of the method 30 the communication information dataset is processed to select or identify a device for activation.
  • the selection of the next device, of the plurality of devices, to activate is based on information contained in the communication information dataset.
  • Step 34 may be performed by the backend system.
  • Figure 8 illustrates an embodiment of the fourth step 34 of the method.
  • the fourth step 34 comprises a sub-step 81 of determining whether any inactivated device, having communication information in the communication information dataset, has communication information that indicates that they are able to directly communicate with at least one other inactivated device that is unable to directly communicate with an activated device.
  • the fourth step also comprises, in response to a positive determination, a sub-step 82 identifying an inactivated device, having communication information in the communication information dataset, whose communication information indicates they are able to directly communicate with the greatest number of inactivated devices that are unable to directly communicate with an activated device compared to other inactivated devices having communication information in the communication information dataset.
  • each inactivated device able to communicate with an activated device has an entry in the communication information dataset. Conversely, each inactivated device not able to communicate with an activated device does not have an entry in the communication information dataset. Each entry indicates with which devices a corresponding device is able to communicate.
  • the dataset can be processed to identify which device (having an entry in the dataset) is able to communicate with the most inactivated devices not able to communicate with an activated device.
  • the dataset may be processed to identify the entry indicating that the associated device is able to communicate with the greatest number of inactivated devices not able to communicate with an activated device (e.g. not having an entry in the dataset).
  • more than one inactivated device in the dataset
  • more than one device may be able to communicate with the same number of devices not able to directly communicate with an activated device.
  • more than one device is able to communicate with the same greater number of inactivated devices (not able to communicate with an activated device) there is a problem of how to select an inactivated device.
  • one of these inactivated devices is selected randomly or pseudorandomly.
  • the embodiment of the fourth step 34 may be adapted to further comprise a further sub-step 83 (between the sub-steps 81 and 82) of determining whether two or more inactivated devices, having communication information in the communication information dataset, have communication information that indicates they are able to directly communicate with the same greatest number of inactivated devices that are unable to directly communicate with an activated device compared to other inactivated devices having communication information in the communication information dataset.
  • the method performs sub-step 84 of identifying an inactivated device, of the two or more inactivated devices, whose communication information indicates that they are able to directly communicate with the fewest number of inactivated devices that are able to directly communicate with an activated device.
  • inactivated device may be chosen randomly or pseudorandomly.
  • the fourth step 34 in response to a negative determination in sub-step 81, performs a sub-step 85 of identifying one of the inactivated devices, of the plurality of devices, not associated with any communication information in the communication information dataset. This enables the process to continue.
  • the fourth step 34 may be executed by the backend server.
  • the fifth step 35 of activating a device may be performed by the backend server issuing an activation instruction, and routing the activation instruction to the identified device (via an activated device) or to a (a management system of) a mobile network operator.
  • the activation instruction (if passed to the identified device) may be further routed via at least one other inactivated device able to communicate with the activated device.
  • the activation instruction may be provided in a two-hop process.
  • the identified device may be activated without further input or processing by the identified device (e.g. by the backend registering the identified device on a network for communicating using the second wireless communication protocol).
  • the fifth step 35 is illustrated in Figure 9, in which a device 7 is activated.
  • the device 7 represents the previously inactivated device able to communicate with more inactivated devices not able to directly communicate with an activated device than any other inactivated device able to directly communicate with an activated device.
  • the second 32, third 33, fourth 34 and fifth 35 steps are iteratively repeated until each device of the plurality of devices is either an activated device or able to directly communicate with an activated device using the first wireless communication protocol.
  • each device is able to communicate with a backend system via no more than one activated device.
  • each device is either an activated device or is in direct communication with an activated device.
  • the proposed method may comprise further steps of: determining whether each of the plurality of devices, able to communicate with at least two other devices using the first wireless communication protocol, is able to communicate with at least two other devices using the first wireless communication protocol; and, in response to a negative determination, activating one or more inactivated devices in the plurality of devices so that each device, of the plurality of devices, is either an activated device or is able to directly communicate with at least two activated devices.
  • devices D, 4 and 8 are only able to communicate with a single activated device. Thus, at least one further device needs to be activated in order to enable all devices to communicate with at least two activated devices (or be an activated device themselves).
  • device B is activated, thereby enabling all devices to directly communicate with at least two activated devices using the first wireless communication protocol.
  • the communication information dataset may be processed to identify which devices (if any) are able to communicate with only a single activated device.
  • the communication information dataset is then processed to identify one or more inactivated devices to activate in order to enable all inactivated devices to communicate with at least two activated devices.
  • this step comprises identifying the smallest number of inactivated devices to activate in order to allow each inactivated device to communicate with at least two activated devices. This reduces a cost of the network.
  • the plurality of devices is configured so that only those devices for which a signal quality measurement of communications with an activated device) is below a fourth predetermined threshold (which may be different to the first, second and third predetermined thresholds) are assessed to determine whether they are able to communicate with at least two activated devices.
  • the method may comprise determining whether only a subset of the plurality of devices is able to communicate with at least two other devices using the first wireless communication protocol; and, in response to a negative determination, activating one or more inactivated devices in the plurality of devices so that each device, of the subset of devices, is either an activated device or is able to directly communicate with at least two activated devices.
  • the subset here comprises devices able to communicate with only a single activated device using a first wireless communication protocol, where a signal strength measure of said communication is below a third predetermined threshold.
  • one or more devices of the plurality of devices may be able to communicate with a single other one of the plurality of devices. Such devices may be activated to be able to communicate with the backend system using the second wireless communication protocol, to ensure robustness in the system. In other examples, if a signal strength measure of communication between a device able to communicate with only a single (activated) device and that activated device is greater than or equal to a fourth predetermined threshold, then the device is not activated; otherwise the device can be activated. This ensures that there is sufficiently high robustness in the system without needing to activate all devices able to communicate with only a single activated device.
  • each step of the flow chart may represent a different action performed by a processing system, and may be performed by different modules of the processing system.
  • the processing system can be implemented in numerous ways, with software and/or hardware, to perform the various functions required.
  • a processor is one example of a processing system which employs one or more microprocessors that may be programmed using software (e.g., microcode) to perform the required functions.
  • a processing system may however be implemented with or without employing a processor, and also may be implemented as a combination of dedicated hardware to perform some functions and a processor (e.g., one or more programmed microprocessors and associated circuitry) to perform other functions.
  • processing system components that may be employed in various embodiments of the present disclosure include, but are not limited to, conventional microprocessors, application specific integrated circuits (ASICs), and field-programmable gate arrays (FPGAs).
  • ASICs application specific integrated circuits
  • FPGAs field-programmable gate arrays
  • a processor or processing system may be associated with one or more storage media such as volatile and non-volatile computer memory such as RAM, PROM, EPROM, and EEPROM.
  • the storage media may be encoded with one or more programs that, when executed on one or more processors and/or processing systems, perform the required functions.
  • Various storage media may be fixed within a processor or processing system or may be transportable, such that the one or more programs stored thereon can be loaded into a processor or processing system.
  • the backend system forms part of the processing system.
  • the backend system may store the communication information dataset in a data storage system (which forms part of the backend system).
  • a computer program may be stored/distributed on a suitable medium, such as an optical storage medium or a solid-state medium supplied together with or as part of other hardware, but may also be distributed in other forms, such as via the Internet or other wired or wireless telecommunication systems. Any reference signs in the claims should not be construed as limiting the scope.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

L'invention concerne un concept permettant à une pluralité de dispositifs de communiquer avec un système dorsal. La pluralité de dispositifs peuvent communiquer entre eux à l'aide d'un premier protocole de communication sans fil. Il est proposé d'activer certains dispositifs de la pluralité de dispositifs, l'activation d'un dispositif lui permettant de communiquer avec le système dorsal à l'aide d'un second protocole de communication sans fil différent. Pour déterminer lequel de la pluralité de dispositifs activer, un processus itératif est réalisé dans lequel des informations de communication concernant des dispositifs capables de communiquer directement avec un dispositif activé sont obtenues.
PCT/EP2019/086298 2019-01-02 2019-12-19 Configuration d'un réseau de dispositifs WO2020141087A1 (fr)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
CN2019070136 2019-01-02
CNPCT/CN2019/070136 2019-01-02
EP19158569 2019-02-21
EP19158569.4 2019-02-21

Publications (1)

Publication Number Publication Date
WO2020141087A1 true WO2020141087A1 (fr) 2020-07-09

Family

ID=69061365

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2019/086298 WO2020141087A1 (fr) 2019-01-02 2019-12-19 Configuration d'un réseau de dispositifs

Country Status (1)

Country Link
WO (1) WO2020141087A1 (fr)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016015764A1 (fr) * 2014-07-30 2016-02-04 Nec Europe Ltd. Diffusion de l'information dans un réseau de communication multi-technologie
US20170127370A1 (en) * 2014-06-12 2017-05-04 Convida Wireless, Llc Context aware neighbor discovery

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170127370A1 (en) * 2014-06-12 2017-05-04 Convida Wireless, Llc Context aware neighbor discovery
WO2016015764A1 (fr) * 2014-07-30 2016-02-04 Nec Europe Ltd. Diffusion de l'information dans un réseau de communication multi-technologie

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
GENG WU ET AL: "M2M: From mobile to embedded internet", IEEE COMMUNICATIONS MAGAZINE, IEEE SERVICE CENTER, PISCATAWAY, US, vol. 49, no. 4, 1 April 2011 (2011-04-01), pages 36 - 43, XP011478241, ISSN: 0163-6804, DOI: 10.1109/MCOM.2011.5741144 *

Similar Documents

Publication Publication Date Title
Mittal et al. Analysis of security and energy efficiency for shortest route discovery in low‐energy adaptive clustering hierarchy protocol using Levenberg‐Marquardt neural network and gated recurrent unit for intrusion detection system
KR101904745B1 (ko) 적어도 하나의 보조 허브를 포함하는 무선 신체 영역 네트워크(wban)에서 통신하는 주 허브, 보조 허브, 센서 노드 및 그 통신 방법
KR101185624B1 (ko) 메쉬 노드들에 대한 전력 절약을 위한 방법들 및 장치들
US8514760B2 (en) Adaptive wireless sensor network and method of routing data in a wireless sensor network
US20140179352A1 (en) Using Neighboring Access Points to Provide Client Device Location Data
US11039272B2 (en) Methods circuits systems and associated computer executable code for localizing and messaging a wireless communication device
RU2006111717A (ru) Способ и устройство для обнаружения соседних узлов внутри системы связи пикостей
JP2006014305A (ja) モバイルデバイスがアクセスするネットワーク内のクラスタヘッドを選択する方法
US10034228B2 (en) Status monitoring of unconnected wireless broadcast devices
JP6841368B2 (ja) 無線センサシステム、無線端末装置、通信制御方法および通信制御プログラム
JP2014506402A (ja) 警告情報伝送方法、無線センサーノード設備及びゲートウェーノード設備
KR20080009081A (ko) 센서 네트워크의 태스크를 수행하기 위한 방법 및 장치
CN112055082A (zh) 一种接入设备的检验方法、装置及计算机设备
US20160150425A1 (en) System and method of providing a synthetic transaction platform for analyzing communication between a mobile device and a wireless network
CN104303575A (zh) 用于减少信令开销的***和方法
US9774984B2 (en) Real time analytics driven decisioning of edge devices in a wireless sensor network
Cao et al. Design of a generic management system for wireless sensor networks
US20160337443A1 (en) Communication system, common service control apparatus, data collection method, and non-transitory computer readable medium
WO2020141087A1 (fr) Configuration d'un réseau de dispositifs
KR102073134B1 (ko) 디스커버리 방법 및 장치
CN112637923B (zh) 节点确认方法、装置、计算机设备和存储介质
Firner Transmit only for dense wireless networks
CN111614442A (zh) 网络通信方法、装置、电子设备和存储介质
Siddikov et al. Data Transfer Methods and Algorithms in Wireless Sensor Networks for IoT-based Remote Monitoring System of Hybrid Energy Supply Sources
Palattella et al. Performance analysis of the IEEE 802.15. 4 MAC layer

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19829173

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19829173

Country of ref document: EP

Kind code of ref document: A1