Network node discovery method and device
A discovery method and node technology, applied in network topology, network data management, access restrictions, etc., can solve problems such as taking a long time
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0026] In the node discovery process in the above P2P technical specification, it takes a long time for node 1 and node 2 to monitor and search respectively on the same channel at the same time. In view of this, in this embodiment, by using the unified information provided by the trusted third party, each node performing the node discovery process can directly monitor and search on the same channel, thereby speeding up the node discovery process. figure 2 A flowchart illustrating a node discovery method in a wireless ad-hoc network according to the first embodiment of the present invention.
[0027] Such as figure 2 As shown, in step S21, each node in the wireless ad-hoc network uses the unified information provided by the trusted third party to determine a unified node discovery channel.
[0028]The unified information provided by the trusted third party may be any information as long as it is the same for all nodes in the wireless ad-hoc network. In this way, each node w...
no. 2 example
[0038] In the node discovery method according to the first embodiment of the present invention, the discovery of nodes is accelerated by using the unified information provided by a trusted third party, therefore, the unified information is very important and should be kept safe. Taking ARANet as an example, the security of the area number should be guaranteed, because the area number guarantees that only nodes in the same ARANet can exchange information with each other. Therefore, in this embodiment, in addition to the area number, the area key also includes a random key and a counter value, and the security of the area number is ensured by encrypting the area number and the counter value with the random key.
[0039] The difference between the node discovery method according to this embodiment and the first embodiment is that, when performing the step of finding a node through a unified node discovery channel, a random key is used to ensure the security of the area number. Th...
no. 3 example
[0046] The following describes a node discovery method in a wireless ad-hoc network according to a third embodiment of the present invention.
[0047] The difference between the node discovery method of the third embodiment and the first embodiment is that before executing the node discovery method described in the first embodiment, a node scanning operation is performed first. The node scanning in this embodiment follows the scanning process described in the Wi-Fi Peer-to-Peer (P2P) technical specification mentioned above, and improves it.
[0048] The Wi-Fi Peer-to-Peer (P2P) technical specification uses the scanning process defined in the IEEE standard (IEEE Standard802.11-2007) during the scanning process. The following will refer to Figure 8 The details will be described.
[0049] Such as Figure 8 As shown in , the scanning node sends a probe packet on each channel and receives a response within a predetermined minimum probe response time. If the scanning node recei...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 