Method for communicating in a network comprising a virtual network, and a communication node comprising a virtual network entity

A technology of virtual network entities and communication nodes, which is applied in the field of communication in wireless networks and can solve problems such as interference performance

Inactive Publication Date: 2017-05-17
SIGNIFY HLDG BV
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] exist figure 2 In an example, applications with different security profiles or from different vendors coexist on the network and could potentially interfere with each other's performance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for communicating in a network comprising a virtual network, and a communication node comprising a virtual network entity
  • Method for communicating in a network comprising a virtual network, and a communication node comprising a virtual network entity
  • Method for communicating in a network comprising a virtual network, and a communication node comprising a virtual network entity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The invention relates to a network comprising a plurality of communication nodes. In an example of the invention, the network includes various applications linked to different services. Thanks to the embodiments of the invention described below, different services can reuse the infrastructure while maintaining logical isolation between them.

[0030] By way of illustration, embodiments of the invention which will now be described are aimed at the various following objectives.

[0031] The first aspect addressed by these embodiments is the security of the network. As an example, the IEEE 802.15.4 security sublayer provides basic network security for other communication protocols. It is aimed at protecting against a wide range of cyber threats and situations that cause a network to fail or provide defective service that prevents it from functioning properly. In addition to the network security provided by the 6LoWPAN network security mechanism that ensures network-wide...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method of a communication node communicating in a network comprising a plurality of nodes, said nodes belonging to at least one virtual network, wherein the method comprises the communication node identifying whether a first data packet belongs to said virtual network based on at least one of: - a cryptographic key used for the data packet; - a cryptographic key identifier present in the first data packet; - a Personal Area Network identifier present in the first data packet; or the combination of a cryptographic key and a sender IP address used for the first data packet.

Description

technical field [0001] The invention relates to a method for communicating in a network, in particular a wireless network. [0002] The invention is for example relevant to outdoor lighting networks, where multiple networks co-exist and share the same medium and protocols. Background technique [0003] In a network, in particular in an outdoor lighting network, multiple networks dedicated to different services may coexist. [0004] Consider here for example using such as figure 1 Constrained network of the depicted 6LoWPAN protocol stack. In this exemplary protocol stack described according to the OSI model, layer 1, the physical layer is based on the 802.15.4 PHY, and layer 2, the data layer includes the 802.15.4 MAC and 802.15.4 security sublayers. In this example, routing is performed at layer 3 using the RPL or MPL protocol. [0005] Such networks can be deployed at scale, i.e., city-wide Internet of Things (IoT) deployments used in smart city contexts or in smart bu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60H04L29/06H04W4/00H04W4/70
CPCG06F21/602H04L63/0272H04L63/0428H04L63/06H04L63/08H04L63/164H04L63/162G06F2221/2149H04W4/70H04L12/46H04L12/2852H04L61/5092H04L2101/659H04L2101/681
Inventor F.维达梅卡O.加西亚莫乔恩S.沙马E.O.迪克M.奥昂S.查特杰M.J.M.库维斯
Owner SIGNIFY HLDG BV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products