专利摘要:
The invention relates to the assignment of a location-based network address to a network node of a network having a network layer reserved to transmit network initialization data, on which the network node has network ports configured to serve as the endpoint for network initialization data and on at least one other network layer network ports configured to pass network traffic through. different from network initialization data. In the method, the network address is assigned through a first network port for network node initialization and the configuration is adjusted of the first network port and of a second port of the initialized network node or other initialized network node, the first and second network port being bi-directional.
公开号:BE1021983B1
申请号:E2014/0215
申请日:2014-03-27
公开日:2016-02-01
发明作者:Jürgen Lambrecht
申请人:Televic Rail Nv;
IPC主号:
专利说明:

Method and system for distributing location-based addresses in a network
FIELD OF THE INVENTION The present invention relates generally to the field of techniques for distributing, with a server device, logical network addresses to a group of client devices connected to point-to-point connections in a meshed network.
Background of the Invention A communication network is considered that is composed of nodes and links (in graph theory: nodes ("vertices") and lines ("edges") connecting the nodes) as illustrated in FIG. In communication networks, a node is a connection point, either a redistribution point or a communication endpoint (i.e., a terminal device). A node can be a server or a client device, it can act as a master or slave or it can have a control function. A gate is a point of the node where lines are attached.
Each node contains a device for distributing network traffic between the ports of the node. In a so-called "active node", the device (which can take the form of a central processing unit (CPU), a microcontroller, a digital signal processor (DSP), a Field Programmable Gate Array (FPGA), ...) requires a network address to communicate with. A so-called "passive node" has no network address and it is not possible to communicate with it via the network.
Nodes are identified in a network by their address. In some cases it is necessary to know the physical location of nodes, when the communication is not only node specific but also location specific.
The most common implementation of a network topology with point-to-point connections is a meshed network. Loops are present in a meshed network ('mesh network'). Before the communication is started in a network where physical loops are present, the loops must be switched off to create a loop-free logical topology. In a bridges Ethernet LAN network, the RSTP protocol (IEEE 802.1D-2004) can be used for this, since it uses BPDU frames with a multicast destination MAC address.
In computer networks, a network can be partitioned into layers, which can also be interpreted as the well-known logical construction where, for example, all relevant addressing messages are viewed as a "stream" on the physical transmission line, said stream being identifiable based on, for example, protocol number / addresses / port numbers by the entities in nodes that have to do something with addressing. This is comparable to the data flow versus management flow in a route network, where the management flow is directed to the routers for, for example, management purposes and not to the end users.
Another example is the partitioning of a single layer 2 network to create multiple separate broadcast domains that are isolated from each other so that packets can only pass between domains via routers. Such a domain is called a Virtual Local Area Network, Virtual LAN or VLAN.
One type of computer network that is considered here is the Ethernet / IP network type. In that case, a redistribution point comprises at least one ethernet layer 2 switch to distribute the network traffic. An active node contains at least one Ethernet layer 2 switch with 3 ports to connect its links. In FIG. 2, the embedded control unit is also connected to the switch via an embedded link.
The protocol most commonly used today to configure VLANs is IEEE 802.IQ. A 4-byte tag is added to the Ethernet packets that contains an ID and a priority level.
Network topology information is typically obtained via the Link Layer Discovery Protocol (LLDP), as defined in IEEE 802.1AB. In the case of a fixed layout, this information can also be derived from a complete plan (including all nodes, edges and their connections) of the physical network.
IP addresses are typically distributed via the Dynamic Host Configuration Protocol (DHCP) by a DHCP server, but the (received by a client) address is arbitrary. A commonly used solution for linking an IP address to the location is the use of device-specific information such as the MAC address and network topology information that lists the MAC address for each node. However, to implement such a solution, a manual intervention is required for each installation and for each repair (i.e., replacing a device) because the MAC address must be linked to the location in a database used by the DHCP server.
There are also automatic solutions in the prior art for linking the IP address to the location. For example, Media Endpoint Discovery is an improvement of LLDP, known as LLDP-MED (ANSI / TIA-1057), which among other things provides device location detection. Another solution is DHCP Option 82 which provides a mechanism to create IP addresses based on the location of the client device in the network.
All of these automatic solutions, however, have the disadvantage that they need a processor to run a software algorithm and a full TCP / IP stack in the client devices. A hardware solution is not possible.
Patent application US2010 / 274945 shows a solution for automatic self-addressing of wired network nodes and optionally also self-termination. Upon receiving an address command, a first node assigns itself a first address, closes a switch to activate an output port of the first node to allow a second node to receive communication from a first node, and sends a second address on a two-way communication bus. The second address is received by all previously addressed nodes, including a controller if it is used, as well as by the second node, which has not yet been addressed. Upon receipt of the second address, the second node repeats the process. If a node does not receive confirmation that a subsequent node has given itself an address, that node deactivates its output port and terminates the network.
Accordingly, there is a need for a simple mechanism for distributing network addresses among non-initialized network nodes based on the node location. Furthermore, a mechanism is desirable that is simple enough to implement in hardware, whereby the network of already initialized nodes is not disrupted and wherein, for a simple installation and maintenance, no device-specific information is used to determine the node location.
Summary of the Invention It is an object of embodiments of the present invention to provide a method for a controller node to distribute network addresses among uninitialized nodes, based on the location of the node, involving the use of device-specific information is avoided, the method being simple enough to be implemented in hardware, without disrupting the network of already initialized nodes.
The above object is achieved by the solution according to the present invention.
In a first aspect, the invention relates to a method for assigning, with a controller node, a location-based network address to a network node that has not yet been assigned a network address, said controller node and said network node being among the nodes of a meshed network with point-to-point connections, said meshed network provided with a loop-free network layer that is reserved to pass on network initialization data concerning network addressing, said network node on that reserved network layer having at least one network port configured to form an endpoint for said network initialization data received from the controller node through the reserved network layer and wherein said network node on at least one other network layer has at least one network port configured to pass network traffic different from the network initialization data. The method comprises the steps of: - assigning the location-based network address to the network node via a first network port so as to bring the network node into an initialized state, - adapting on said reserved network layer the configuration of said first network port and of a second port of said network node in initialized state or of another initialized node of said meshed network, said first network port and said second network port being configured as bidirectional ports, so that subsequent network initialization data can pass through the network ports in two directions.
With the above approach, the goal of a simple mechanism for the distribution of location-based network addresses is actually achieved. Since the ports of the non-initialized nodes can be configured to be an endpoint for information regarding the distribution of network addresses and allow other traffic to pass through, one can be sure that only one node is available in the network at a time to which the network address can be assigned that is included in the network initialization information. Once the node has obtained a network address, it changes from uninitialized state to initialized state and the network port configuration is adjusted so that network information for initializing network nodes farther from the controller node can get past the newly initialized node. In this way, by initializing the nodes one by one, the relative location of each node is known. Each node only needs intelligence to accept an address through the network and to accept a command that indicates a change of port state, keeping the solution simple.
Once a node has obtained a network address through one of its network ports that acts as the input port, the node changes from uninitialized to initialized state and the network port configuration of the port serving as the input port is adjusted to become a bidirectional port on the reserved network layer. Another port of an initialized node (for example, the node that has just been initialized or, for example, in the event that an end node has been reached, another network node that has already been initialized, including the controller node) is selected (by the controller node or by some mechanism known to the controller, depending on the order one wants to follow) to become a bidirectional port on the reserved network layer. From then on, network information for initialization of a next network node can pass through that port of the node that was just selected. In this way, by initializing the nodes one by one and by opening another port of a known selected node, the controller node knows the relative location of each node. Consequently, the proposed solution is location based.
A reserved network layer is used for the initialization. Other data (non-initialization data) can normally pass as set in the considered network. For example, a node that is being restarted will start the process to get a network address, but its ports will only terminate the initialization data and not the normal data going to other nodes.
In a preferred embodiment, the steps of the method are repeatedly performed for a plurality of non-globalized nodes belonging to said plurality of network nodes.
In an advantageous embodiment, more than one node of the plurality of nodes serves as a controller node. In that case, the nodes preferably use more than one reserved network control layer.
In a preferred embodiment, the information for network initialization comprises identification tags to indicate said reserved network layer.
In another embodiment, the meshed network is part of a larger network comprising a plurality of meshed networks.
Advantageously, the meshed network is an Ethernet network and the reserved network layer applies IEEE 802.1Q VLAN tags.
In a preferred embodiment, information about the relative position of the node in the initialized state coupled to the location-based network address is combined with a map of the meshed network so that information about the absolute position of said node is obtained.
In another aspect, the invention relates to a system comprising a plurality of nodes configured in a meshed network, said meshed network having a loop-free network layer that is reserved for passing on network initialization data with regard to network addresses, wherein at least one node of said multiple number is arranged to serve as a controller node and to distribute location-based network addresses. The plurality of nodes further comprises at least one network node configured to have at least one network port configured to form an end point for network initialization data received from the controller node through the reserved network layer and arranged to have at least one port on at least one one other network layer configured to pass through network traffic different from said network initialization information, the controller node being arranged to allocate the location-based network address to the network node through a first port so as to bring that network node into initialized state, and the reserved network layer to adjust the port configuration of the first network port and of a second network port, that second network port belonging to said initialized node or to a network node that was previously initialized, the first and second ports being configured as bi-directional ports so that subsequent network initialization data can pass through the ports in two directions.
In order to summarize the invention and the realized advantages over the prior art, certain objects and advantages of the invention have been described above. It goes without saying that all such objectives or advantages are not necessarily achieved according to one specific embodiment of the invention. Thus, for example, persons skilled in the art will recognize that the invention may be embodied or embodied in a manner that achieves or optimizes one advantage or group of benefits as described herein, without necessarily realizing other goals or benefits described or suggested herein. .
The above and other aspects of the invention will become clear and further explained with reference to the embodiment (s) described below.
Brief description of the drawings The invention will now be further described, by way of example, with reference to the accompanying drawings, in which like reference numerals refer to like elements in the various figures.
FIG. 1 illustrates a meshed network.
FIG. 2 illustrates a node with an intelligent device inside connected to a switch device.
FIG. 3 illustrates a network node comprising a switch device adapted to route traffic.
Figures 4 to 11 are a part of Figs. 1 and illustrate step by step the method according to the invention.
FIG. 12 illustrates an embedded device connected to an Ethernet switch with an implementation of the method according to the invention using IEEE 802.1Q VLANs.
FIG. 13 sets the meshed network of FIG. 1 for which part of the network is treated as a black box, or where the devices in the black box are passive nodes that do not require a network address.
FIG. 14 represents a meshed network where the RSTP protocol has been applied.
FIG. 15 represents a meshed network, after RSTP, to which the method of the invention is applied.
FIG. 16 represents a node with two clients inside.
Detailed Description of Illustrative Embodiments The present invention will be described with reference to specific embodiments and with reference to certain drawings, but the invention is not limited thereto, but is only limited by the claims.
In addition, the terms first, second, etc. are used in the description and in the claims to distinguish between similar elements and not necessarily for describing a sequence, either in time, in space, in importance or in any other way. It is to be understood that the terms used are interchangeable under proper conditions and that the embodiments of the invention described herein are capable of operating in sequences other than those described or illustrated herein.
It is to be noted that the term "comprising" as used in the claims should not be interpreted as being limited to the means specified thereafter; it does not exclude other elements or steps. It must therefore be interpreted as a specification of the presence of the listed features, units, steps or components referred to, but it does not exclude the presence or addition of one or more other features, units, steps or components or groups thereof. Therefore, the scope of the expression "a device comprising means A and B" should not be limited to devices consisting only of parts A and B. It means that with regard to the present invention, the only relevant parts of the device A and B to be.
References in this specification to "one embodiment" or "an embodiment" mean that a particular feature, structure, or feature described in connection with the embodiment is included in at least one embodiment of the present invention. Statements of the phrase "in one embodiment" or "in an embodiment" at different places in this specification do not necessarily all refer to the same embodiment, but it is possible. Furthermore, the specific features, structures or characteristics may be combined in any suitable manner in one or more embodiments, as will be apparent to those skilled in the art from this disclosure.
In a similar manner, it should be noted that in the description of exemplary embodiments of the invention, various features of the invention are sometimes grouped into a single embodiment, figure, or description thereof to streamline the disclosure and understanding of one or more of the facilitate various inventive aspects. However, this method of disclosure should not be interpreted as an expression of an intention that the claimed invention requires more features than expressly stated in each claim. As shown in the following claims, the inventive aspects lie in less than all the features of a single preceding disclosed embodiment. Therefore, the claims that follow the detailed description are hereby explicitly included in this detailed description, wherein each claim stands on its own as a separate embodiment of the present invention.
In addition, since some embodiments described herein include some, but not other, features included in other embodiments, combinations of features of different embodiments are intended to fall within the scope of the invention and form different embodiments, such as will be understood by someone skilled in this field. For example, in the following claims, any of the claimed embodiments can be used in any combination.
It should be noted that the use of certain terminology in describing certain aspects of the invention does not imply that the terminology herein is redefined to be limited to any specific features of the features or aspects of the invention with which that terminology is associated.
In the description given here, numerous specific details are set forth. However, it is understood that embodiments of the invention can be worked out without these specific details. In other cases, well-known methods, structures and techniques were not shown in detail in order not to obstruct the understanding of this description.
To apply the present invention, a wide range of possible network implementations are available. Any network configuration that meets the following limitations is suitable for implementing the invention. It must be possible to adjust the nodes of the network to separately enable / disable the receiving and sending components of a node port on a specific network layer. An active node can be addressed via the network to adjust nodes, but a passive node requires direct intervention to adjust its nodes. A passive node that cannot modify its node ports may only have two ports (eg a repeater). The network can have any topology, with a meshed network being the most common. It may of course be necessary to take measures to disable loops, as is required in practice with a meshed network. In other words, nodes are not allowed to transmit, switch, route or send all received data at all times to all output ports without any restrictions. The method used to avoid loops is not important here. The logical addresses assigned with the method according to the invention may not be required in the protocol to avoid loops. Furthermore, there are no restrictions. The multiple number of nodes in the network is in fact split into two categories for the invention. At least one node serves as a controller node. The controller node can be any node in the meshed network. The other category includes all other nodes, so all nodes that do not serve as a controller. These nodes, or at least part of them, must be assigned a network address.
A person skilled in the art will understand that a defective node (if - as is often the case in practice - the node has a bypass relay for the physical network) cannot be detected directly. However, the number of defective nodes can be identified by simply counting the number of nodes while initializing, while still avoiding using device-specific information. Another solution for finding broken nodes is to provide the server node topology information, such as the number of edges of a node or the number of clients who have a certain part of the network. If, after initialization, the number of nodes found does not match the topology information, the server knows the number of erroneous nodes and can respond accordingly. For example, an alarm may sound to indicate that correct location-based addressing is not possible.
If there are no corrupt nodes, the addresses can be linked one-on-one on a plan (including all nodes, edges and their connections). In this way the relative position becomes an absolute position.
The controller node can assign addresses that indicate the location (see further example 1) or can use user-specific information as node identification linked to the assigned address to determine the location (see further example 4). In any case there is no need to have device-specific information of all nodes in advance for localization, as is often the case in the prior art.
One advantageous option is an ethernet / IP network. However, in one embodiment of the invention, the network may be an RS485 network where each node is a device that routes all traffic, as illustrated in Fig.3. The initialization data is distinguishable from all other data, for example by a special reserved address and this special reserved address creates a virtual control layer. An uninitialized node does not route initialization data (i.e., do not pass this data), but all other data is routed normally. In this way, only the non-initialized node that is directly connected to the controller, or that is connected via previously initialized nodes, can receive the initialization data.
Example 1: Initialization The method generally works by separately activating the receiving and transmitting portion of the initialization data ports. Normal data (i.e., no initialization data) can pass all ports in all directions (as defined by the network administrator). To explain the method of the invention, a small part of Fig. 1 is used in the following paragraphs. This small portion is repeated as FIG. 4.
The initialization protocol is not relevant here. A so-called "master server" can take the initiative by sending an "init request". Alternatively, the client can send an "init request" (as in ethernet / IP DHCP) to a so-called "slave server". The latter approach is followed below.
During the initialization process, i.e. when the nodes have not yet received an address, the non-initialized point nodes (clients and servers) configure their ports so that initialization data can only enter the node. See the arrows in FIG. 5 representing the flow of initialization data. Send all client nodes DHCP-Discover broadcasts as initialization request The server node (node 0 in Fig.5) runs a modified DHCP server, selects port 1 and activates that port to send a DHCP Offer, see the arrow within the node in Fig .6 to node 1.
Thus, the server can only initialize (ie assign an address to) the physically first non-initialized client that forms a redistribution point so that the server knows the physical location of that client constituting a redistribution point, node 1 in Fig. 6 . As soon as node I in FIG. 6 has received an address, the server can communicate with it and the server activates two ports of node 1 (or the server allows the node to activate itself) to send initialization data: the port connected to the server (Fig. 7) and a other port (Fig. 8) (also for the general case where the node has more than two ports). Initialization data can now reach node 2. That node 2 is the next to be initialized and to activate its gates (Fig. 9). Node 2 is a communication endpoint client, so that the end of that chain of the controller is reached. The controller now selects port 2 to activate so that it can send initialization data, see the arrow in node 0 to node 6 in Fig. 10. Nodes 6 and 7 are also initialized in the same way. FIG. II shows the resulting situation on the reserved network layer after initialization of nodes 6 and 7.
Example 2: a chain of digital information panels Suppose that in Example 1 (Fig. 4) all clients are LCD screens in a restaurant on a train, showing four different menus. During initialization, all screens are configured with the same static IP address. A welcome screen with the basic menu is sent to that static IP address, so to all screens. After initialization you want to show the four menus in the correct order, the cheapest in front. Menu 1 is then sent to the now correct address of Node 1, ... and menu 4 to Node 7.
There are various ways to detect nodes that fail or restart, or to detect newly added nodes (to be able to initialize them). The server can keep a list of clients that have already been initialized and regularly check whether they are still active. The master server can regularly send a response request (and wait for an answer) - the slave server simply has to wait for messages with state renewals from the clients. For this DHCP example, a client that boot will automatically display the welcome screen again, because the server also continues to send that data.
To find the absolute position, a database is required that links the relative position to the absolute position. The database may also contain additional information about the localized device (e.g. color, size, ...). In this example with trains it is interesting to know the absolute position: the first screen on the right shows "exit on this side" when in the current station the platform is on the right. Only the relative position is important for the menus. The exact position is important for the message "output on this side".
Example 3: simple hardware solution for an Ethernet / IP daisv chain In an ethernet / IP-based solution according to the present invention, the switch embedded in a redistribution point is a so-called "managed switch": it must be possible to ( IEEE802.1Q) Virtual Local Area Networks (VLANs) on the switch. In the simplest case, the managed switch is embedded in the network node to form a "daisy chain" of network nodes (see Fig. 1 nodes 1 through 5 for an example of a daisy chain); in the most complex case, the client is in fact a switch / router that also needs an IP address (see Fig. 15, node 35).
The proposed solution does not use a complex algorithm on the network nodes to be initialized. For example, the solution can be implemented with an FPGA attached to an Ethernet switch. The proposed solution makes Safety Integrity Level 2 (SIL2) certification possible because it is simple enough to be implemented without a microcontroller running a TCP / IP stack, which is very difficult to certify.
In a practical example, the method is used to initialize clients in a daisy chain. P1 and P2 are external ports used in the daisy chain (see Fig. 14), P3 is internally connected to the client's control unit; VID1 is VID2, VID1 is the standard VLAN for normal traffic (i.e. traffic that is not related to initialization).
Initialization Confection A separate 802.IQ VLAN ID (VID) 2 is selected for initialization purposes. • PI and P2 mark (non-mandatory) incoming packets with VID2 (this is a virtual tag, not yet a physical VLAN). • P3 uses the standard VID1 tag upon entry (packages from the control unit). • Only the control unit P3 will be an (output) member of this VID2. • All ports have 802.IQ enabled (secured). • All ports (PI, 2, 3) are members of VID1 (standard VLAN). • Gates (PI, 2) are tagged outside. • P3 goes out without a tag (the embedded control unit itself does not have to apply the VLAN tags).
This means that all untagged (or VID2 tagged) packets that arrive in a client receive VID2 and are only sent to the client's embedded control unit. Packages with VIDl tag can pass all ports.
Packets sent by the embedded control unit during the initialization process are unicast packets to the server and can use VID1.
The server can send untagged packages or packages with VID2 tag that only reach the first client. The server can send packages with VIDl tag that travel across the daisy chain. If the server itself cannot add VLAN tags, it configures its own embedded switch to add VID2 tags to packets leaving the server during initialization and to add VID1 tags after initialization.
Initialization process
The so-called 'master server' takes the initiative by sending out a 'status request', for example every second. To keep things simple, all initialization messages use ARP packets (with different message types, see RFC 826 and 903). This example uses the 10.0.0.0/24 subnet. The "status request" is an ARP request that asks "who had 10.0.0.255 ". Normally nobody answers at this broadcast address. However, the FPGA of the clients can easily be programmed to answer such an ARP request:
In case it is not yet initialized: by a RARP request: "I have this MAC address, please give me an IP address". The server then responds with a RARP response.
In case it has already been initialized: by an ARP response: "my IP address here"
Normal traffic When a device is initialized, the 802.IQ VLAN settings of the switch are adjusted: all ports become members of VID2. • Incoming P3 packages (control unit) are marked with VID1 and go out with Pl / 2 tags; • Incoming packages with Pl / 2 tags keep their VLAN and o only VID = 1.2 packages can leave all other ports, o packages with a different VID are ignored; • Untagged incoming Pl / 2 packets are marked with VID2 and can leave P2 without tag and P2 / 1 with VID2 tag.
In this way the next device in the daisy chain can be reached. The VLAN settings also allow minimal intervention from the embedded control unit. It only needs to configure the switch. The switch takes care of the routing.
Thanks to the standard VID1, a client who performs a reset does not interrupt normal Ethernet communication (between server and client further on) because that is via VID1.
If the server wants to reach all devices, it must use VID1. If he wants to reach the first uninitialized device, he must use VID2 or tagged packages.
Example 4: simple hardware solution for an Ethernet / IP daisv chain Alternatively, the proposed solution can also be implemented with a small microcontroller (uC) that runs a small, possibly embedded TCP / IP stack with DHCP (standard method) in all embedded operating systems) for address assignment, and a standard Ethernet switch for localization, see Fig.16 with 2 uCs.
In an advantageous embodiment of the method according to the invention, the addressing is disconnected from the localization. In an Ethernet / IP network the addressing is then handled by a standard DHCP server. The localization protocol runs when necessary, applying the method of this invention, and gathers the MAC addresses of the nodes in the correct order (relative position). This ordered list of MAC addresses is then used to create or refresh the "static leases" table that is commonly used in a DHCP server. Every time the list changes, a "DHCP force-renew" message can be sent.
The protocol controls the layout of the subnetwork of clients who need a location-based address by sending a command (ping) to each client one at a time and waiting for a response (pong), using VIDi (the initialization VLAN) . The result is the "static leases" information, written to a file as a backup for the next boot and written to the RAM as input for the addressing protocol (DHCP server). A client contains an embedded switch where several microcontrollers (uC) can be connected. In a client, only one uC can be connected to the SMI bus of the embedded switch (serial bus for access to register). This uC is called the master client and the other the slave clients. Only the master client can change the VLAN settings of the switch.
Then the following commands are needed: 1. Reset 2. Initialize the master 3. Go to the next slave 4. Initialize the slave 5. Go to the next master (from the next client in the same chain) 6. Go to the next chain (a branch in the current chain)
A protocol iteration includes these steps: 1. Server sends a reset command (such that only the first non-initialized client in the chain can receive the ping). Wait for at least 1 answer. 2. Server sends a ping a. 'Initialize master' or 'initialize slave', and b. 'Go to next slave', 'go to next master' or 'go to next chain' (depending on the layout of the subnet) 3. Client returns a pong. Only the first client must answer. That client must change the VLAN settings to allow the next client to receive the next ping. When the command is received from the server, the client does the following: a. He reads the current VLAN configuration from the switch b. He knows the possible configurations: (a) initial, (b) uCl initialized, (c) uC2 initialized c. It changes to the next configuration d. He sends an ACK back to the server to indicate that the configuration change has occurred. 4. Server sends ping number i, Client number i must change the VLAN settings to allow the next client to receive the next ping. Exactly i clients must respond with a pong, otherwise they will restart (reset command). This is done for all clients listed in the digital version of the folder. 5. Write or update the static leases file. If something has changed, send a force renewal DHCP packet.
Example 5: a meshed network in an ethernet / IP network via STP In a meshed network, the switch does not immediately begin to forward data when the switch's nodes start. Instead, it goes through the states of the STP protocol (ie IEEE 802.1D). Fig.14 shows the result of the STP protocol: Root Ports (RP) and Designated Ports (DP) are ports that are placed in forward mode, Blocked Ports are ports that block all data, both input and output. Now the method of the invention can be applied, see Fig.15 where all ports except the blocked ports (BP) contain the same transmit and receive arrows as in Example 1. 1. Let the root node (1) be the server node. Initially, or because of a reset command, only the receive arrows are present. 2. The server then selects and enablet its port 1 (pl) for bidirectional communication and sends a ping, specifying address "2" and "go-to-next". 3. Node 2 activates p1 and p2 for transmission and 'pongt7 to the server' next master on p2 '4. Then the server sends a ping from that address "3" and specifies "go-to-next". 5. Node 3 activates p1 and p2 for transmission and 'pongs' to the server' next master on p2 ',' no more ports 6. Then the server sends a ping that specifies address "4" and "go-to- next one'. 7. Node 4 activates pl for transmission and 'pongs' to the server 'next master on blocked p2', 'no more ports'. 8. The server then sends a ping to node 2 'go-to-next'. 9. Node 2 activates p3 for transmission and 'pongs' to the server 'next master on p3' 10. Then the server sends a ping that specifies address "5" and "go-to-next". 11. Node 5 activates p1 and p2 for transmission and 'pongs' to the 'next master on p2' server. 12. The server then sends a ping that specifies address "6" and "go-to-next." 13. After the timeout, the server sends a ping to node 5 'go-to-next' 14. Node 5 activates p3 for transmission and 'pongs' to the server 'next master on p3', 'no more ports'. 15. The server then sends a ping that specifies address "6" and "go-to-next." 16. After the timeout the server sends a ping to node 2 'go-to-next' 17. Node 2 activates p4 for transmission and 'pongs' to the server 'next master on p4', 'no more ports'. 18. The server then sends a ping that specifies address "6" and "go-to-next." 19. Node 6 activates pl for transmission and 'pongs' to the 'next master on blocked p2' server, 20. Then the server sends a ping that specifies address '6' 'go-to-next'. 21. Node 6 'pongs' to the server 'next master on blocked p3', 'no more ports'. 22. The server then selects and enablet its port 2 (p2) and sends a ping, specifying address '7' and 'go-to-next'. 23. Node 7 activates p1 and p2 for transmission and 'pongs' to the 'next master on p2' server. 24. The server then sends a ping that specifies address "8" and "go-to-next." 25. After the timeout, the server knows that all seven client nodes have been initialized. He also knows the relative position of all nodes. If the server knows that the number of clients is 7, it knows that the initialization process was correct. If the server has a plan from the network, Fig. 13, he also knows the absolute position: node 4 and 5 are connected via a blocked port, node 7 is above it, node 2 on the left and there is an outer ring over nodes 1 , 2.3.4.5.6.7.
Example 6: hop first or chain first initialization in Fig. 1 Let node 47 in Fig. 1 be the server. Do then has two ways to initialize the clients. 1. Hop-per-hop: a hop is a relative distance measure. Nodes 44, 45, 46 are at 1 hop distance and are first initialized in this case. Nodes 35 -> 43 are at 2 hops distance and are then initialized and finally nodes 17 to 34 are initialized at 3 hops distance. This order reflects the relative position or distance of the server. 2. Chain first: in this case, nodes 44, 43 and 17 (in this order) are initialized first, then node 18, nodes 42, 19 and so on. Finally, node 30 is initialized.
The network can also include a hierarchy: as in FIG. If nodes 35 to 47 are passive nodes or active nodes that have already been initialized (in one way or another), the network of FIG. 1 are simplified in FIG. 13: during initialization of nodes 17 to 34, the server activates one by one the ports (for sending initialization data) where those communication endpoint clients are connected to the server, and then the server initializes that communication endpoint client based on its location , see FIG. 13 for client 35.
Example 7: fail-safe implementation For a fail-safe implementation for an Ethernet / IP network, the server must have a network blueprint. When assigning addresses, the server stores the MAC addresses of each device. The server uses a polling mechanism to check the network for changes.
When a node resets, e.g., node 44 in Fig. 1, the server can still communicate with nodes 41 to 43 and 17 to 22. However, an initialization message will only node 44 and not the node after it. The server may know that node 44 has reset if, for example, the server has stored the MAC addresses (in the case of an Ethernet / IP network) of node 44 when it was first initialized.
When defective nodes are recovered, the server receives initialization requests from unknown nodes. Because the configuration has been changed, the server sends a reset message to restart the initialization phase. If only one node has been restored, the server can of course identify it.
Although the invention has been illustrated and described in detail in the drawings and foregoing description, such illustrations and descriptions are to be considered as illustrative or exemplary and not restrictive. The foregoing description explains certain embodiments of the invention in detail. It should be noted, however, that no matter how detailed the foregoing is contained in the text, the invention can be made in many ways. The invention is not limited to the disclosed embodiments.
Other variations on the disclosed embodiments may be understood and performed by persons skilled in the art and by practicing the claimed invention, through a study of the drawings, the disclosure, and the appended claims. In the claims, the word "comprising" does not exclude other elements or steps and the indefinite article "a" does not exclude a plural. A single processor or other unit can perform the functions of different items in the claims. The mere fact that certain measures are listed in mutually different dependent claims does not mean that a combination of those measures cannot be used to benefit. A computer program can be stored / distributed on a suitable medium, such as an optical storage medium or semiconductor medium supplied with or as part of other hardware, but can also be distributed in other forms, such as via the internet or other wired or wireless telecommunication systems. Any references in the claims should not be construed as limiting the scope.
权利要求:
Claims (9)
[1]
CONCLUSIONS
A method for assigning, with a controller node, a location-based network address to an uninitialized node, wherein said controller node and said uninitialized node belong to a plurality of nodes in a meshed network, said meshed network being provided with a network layer reserved for initialization purposes, wherein said non-initialized node has network ports configured to form an endpoint for network initialization information that relates to network addressing received from said controller node through said reserved network layer and configured to handle network traffic through to differ from said network initialization information, the method comprising the steps of: - assigning said location-based network address to said non-initialized node so as to bring said node into initialized state, - adjusting of the configuration of said network ports, so that subsequent information about network initialization can pass in two directions past said node in the initialized state.
[2]
The method of allocating as in claim 1, wherein the steps of the method are repeatedly performed for a plurality of network nodes belonging to said plurality of nodes.
[3]
Method for allocating, according to one of the preceding claims, wherein more than one node of said multiple number of nodes serves as a controller node.
[4]
The method of allocating according to claim 3, wherein said more than one node uses more than one reserved network layer.
[5]
The method of allocating according to any one of claims 1 to 4, wherein said network initialization data comprises identification tags indicating said reserved network layer.
[6]
Method for allocating according to any of the preceding claims, wherein said meshed network is part of a larger network comprising a plurality of meshed networks.
[7]
Method for allocating according to any of the preceding claims, wherein information about the relative position of said node in the initialized state, coupled to the location-based network address, is combined with a map of said meshed network so that information about the absolute position of said node obtained in the initialized state.
[8]
The method of allocating according to any of the preceding claims, wherein said meshed network is an ethernet network and said reserved network layer applies IEEE 802.IQ VLAN tags.
[9]
A system comprising a plurality of nodes in a meshed network, said meshed network being provided with a network layer reserved for initialization purposes, wherein at least one node of said multiple number is arranged to serve as a controller node and to location-based network addresses and wherein said plurality of nodes further comprises at least one non-initialized client node configured to have network ports configured to form an end point for network initialization information with respect to network addresses received from said controller node via said reserved network layer and configured to pass network traffic different from said information for network initialization, said controller node being arranged to assign the location-based network address to the non-initialized node so as to include said node in initialized state, and to adjust the configuration of said network ports so that subsequent two-way network initialization information can pass past said node in initialized state.
类似技术:
公开号 | 公开日 | 专利标题
JP6317851B1|2018-04-25|Logical router
EP2897347B1|2016-12-28|Method for transmitting addresses correspondence relationship in second-layer protocol using link status routing
US11070619B2|2021-07-20|Routing messages between cloud service providers
ES2535190T3|2015-05-06|System and method for automatic configuration of master / slave devices in a network
US9331946B2|2016-05-03|Method and apparatus to distribute data center network traffic
US20150117451A1|2015-04-30|Communication between hetrogenous networks
CN104285416A|2015-01-14|Virtual router terminating overlay tunnel in storage area network
CN104937885A|2015-09-23|Global VLANs for fabric switches
CN106712988B|2019-11-12|A kind of virtual network management method and device
CN103997414A|2014-08-20|Configuration information generation method and network control unit
US10491466B1|2019-11-26|Intelligent use of peering in public cloud
BE1021983B1|2016-02-01|METHOD AND SYSTEM FOR DIVIDING LOCATION-BASED ADDRESSES IN A NETWORK
US9258209B2|2016-02-09|System and method for layer 3 proxy routing
US20200067733A1|2020-02-27|Transitive routing in public cloud
CN105323330A|2016-02-10|Internet protocol addressing of industrial control devices employing the network ring topology
EP3815311A1|2021-05-05|Intelligent use of peering in public cloud
CN104378302A|2015-02-25|Method for sending address corresponding relation in second layer protocol by utilizing link state routing
CN108259295B|2020-06-09|MAC address synchronization method and device
US20170195344A1|2017-07-06|Lan/san network security management
CN104350710B|2017-12-08|Realize FCoE methods, devices and systems
US10142190B2|2018-11-27|Management plane network aggregation
US11201921B2|2021-12-14|Virtual devices in internet of things | nodes
US20170373941A1|2017-12-28|Faster link layer discovery protocol updates
CN109936503A|2019-06-25|Netted VPWS system based on EVPN and the method and apparatus for establishing netted VPWS example
同族专利:
公开号 | 公开日
EP2979434B1|2017-07-19|
EP2979434A1|2016-02-03|
EP2785020A1|2014-10-01|
WO2014154826A1|2014-10-02|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题

DE19733906C2|1997-08-05|1999-09-30|Siemens Ag|Method for automatic address assignment, bus system for automatic address assignment and communication participants that can be used in the bus system or in the context of the method|
US7412515B2|2002-09-26|2008-08-12|Lockheed Martin Corporation|Method and apparatus for dynamic assignment of network protocol addresses|
EP2183676A1|2007-07-20|2010-05-12|Nxp B.V.|Automatic address assignment for communication bus|
US8296488B2|2009-04-27|2012-10-23|Abl Ip Holding Llc|Automatic self-addressing method for wired network nodes|
US9184987B2|2011-02-23|2015-11-10|Tyco Fire & Security Gmbh|System and method for automatic configuration of master/slave devices on a network|FR3040845B1|2015-09-04|2018-05-18|Schneider Electric Industries Sas|AUTOMATIC ADDRESSING METHOD IN AN ETHERNET COMMUNICATION ARCHITECTURE|
CN106131238B|2016-06-30|2019-05-28|百度在线网络技术(北京)有限公司|The classification method and device of IP address|
US10164938B2|2016-09-01|2018-12-25|Cisco Technology, Inc.|Topology-aware addressing for reconfigurable networks|
法律状态:
2018-12-10| FG| Patent granted|Effective date: 20160201 |
2018-12-10| MM| Lapsed because of non-payment of the annual fee|Effective date: 20180331 |
优先权:
申请号 | 申请日 | 专利标题
EP131618332|2013-03-29|
EP20130161833|EP2785020A1|2013-03-29|2013-03-29|Method and system for distributing location-based addresses in a network|
[返回顶部]