Method, node for processing messages within an iot network and network packet thereof

ABSTRACT

A method and node for processing messages within an Internet of Things (IoT) network and network packet thereof are provided. Multiple fields of a header of a network packet broadcasted over the IoT network are referred to in the method. When a node receives a network packet broadcasted over the IOT network, it checks if the node&#39;s ID is recorded in an ID field of the network packet. The node ID is added to the network packet if the network packet does not record the node ID, and the network packet is then broadcasted to the IOT network; otherwise, the network packet is not broadcasted if the node ID has been recorded in the ID field. The node also performs a function indicated in a function field of the network packet when the node ID is not recorded in the network packet.

CROSS REFERENCE TO RELATED APPLICATION

This application is a continuation application of U.S. application Ser.No. 16/558,433, filed on Sep. 3, 2019, and entitled “METHOD, NODE FORPROCESSING MESSAGES WITHIN AN IOT NETWORK AND NETWORK PACKET THEREOF”,the entire contents of which are hereby incorporated by reference.

FIELD OF THE DISCLOSURE

The disclosure is related to a technology for processing messages withinan IOT network, and in particular to utilizing one or more notationfields of network packets propagated within the IOT network to instructa node to perform corresponding one or more actions.

BACKGROUND OF THE DISCLOSURE

An Internet of Things (IoT) refers to a plurality of interconnectedidentifiable devices, and each of which supports a specificcommunication protocol and acts as a node within a network.

A conventional IoT system generally includes a central host and aplurality of nodes that are interconnected by a specific communicationprotocol. Each of the nodes may be responsible for performing onespecific function. For example, the IoT system includes a smoke sensoras one of the nodes, and the central host may be informed with a warningmessage if the smoke sensor senses any unusual event. Further, animaging sensor that acts as a monitoring node within the IoT system isprovided to produce images continuously, and the images will be uploadedto the central host of the system over the network.

Surveillance is a known application of the IoT system. A surveillancesystem utilizes a variety of devices such as a surveillance camera, amotion sensor, and an access control device to detect various eventsaround an environment. In the surveillance system, the surveillancedevices should be on long-term standby for receiving signals at anytime, and are also required to maintain a long-term connection forreceiving signals at any time from the central host or other devices.

SUMMARY OF THE DISCLOSURE

The disclosure generally relates to a method for processing messageswithin an Internet of Things (IoT) system, a node within the IoT system,and a network packet thereof that is defined for instructing the node toperform certain actions.

In an aspect of the disclosure, a network packet propagated over an IoTnetwork is defined by the IoT system which includes a host and aplurality of nodes. In the IoT system, each of the plurality of nodescommunicates with the host via a first wireless communication protocol,and the plurality of node are communicated with each other via a secondwireless communication protocol. Multiple fields in a header of thenetwork packet propagated among the nodes include: a source field thatrecords a source of the network packet, a destination field that recordsa destination of the network packet, an ID field that records a node IDof the node that receives or transmits the network packet; and afunction field that indicates a function that is performed by the nodewhen receiving the network packet. The header further includes acounting field that records a counting value that is used to check if athreshold is reached, and a threshold field that records the threshold.

According to the information of header, the node performs the functionindicated in the function field when the node checks that the networkpacket does not record the node ID of the node. Alternatively, the nodeperforms the function when the counting value does not exceed thethreshold.

According to one of the embodiments of the disclosure, a method forprocessing messages for a node with a node ID within an IOT networkincluding multiple nodes is provided. In the method, the node firstlyreceives a network packet that is broadcasted over the IOT network, andthen analyzes the network packet. The node checks if its node ID isrecorded in an ID field in a header of the network packet. After that,the node ID of the node is added into the network packet when it ischecked and determined that the network packet does not record the nodeID. The network packet is therefore broadcasted.

Otherwise, the network packet is not broadcasted when the nodedetermines that the network packet has already recorded the node ID ofthe node. In other words, since the network packet has been received bythis node, the node ID would be recorded in the network packet.

In another aspect of the disclosure, the node also checks a countingvalue of a counting field in the network packet and adds one to thecounting value before broadcasting the network packet to the IOTnetwork. When the counting value of the counting field reaches athreshold that is recorded in a threshold field in the network packet,the node terminates broadcasting the network packet to the IOT network.

According to another embodiment of the disclosure, in the IoT network, anode that is used perform the method for processing messages recitedabove is provided. The node includes a controller, a memory that recordsa node ID of the node, a first wireless communication circuit thatperforms the first wireless communication protocol for communicatingwith the host, and a second wireless communication circuit that performsthe second wireless communication protocol for communicating with theother one or more nodes and at least one sensor.

In one further aspect of the disclosure, a method for processingmessages for the node within the IOT network is provided. In the method,the node receives a network packet broadcasted over the IOT network,checks a counting value recorded in a counting field of a header of thenetwork packet and adds one to the counting value, and broadcasts thenetwork packet to the IOT network when the counting value does not reacha threshold recorded in a threshold field of the header; or terminatesthe broadcasting of the network packet to the IOT network when thecounting value reaches the threshold.

These and other aspects of the present disclosure will become apparentfrom the following description of the embodiment taken in conjunctionwith the following drawings and their captions, although variations andmodifications therein may be affected without departing from the spiritand scope of the novel concepts of the disclosure.

BRIEF DESCRIPTION OF THE DRAWINGS

The present disclosure will become more fully understood from thefollowing detailed description and accompanying drawings.

FIG. 1 is a schematic diagram showing a network system that implementsthe method for processing messages within an Internet of Things networkaccording to one embodiment of the present disclosure;

FIG. 2 is another schematic diagram showing the network system thatimplements the method for processing message within an IoT networkaccording to another embodiment of the present disclosure;

FIG. 3 shows a block diagram depicting a node for processing messageswithin an IoT network in one embodiment of the present disclosure;

FIG. 4 is a schematic diagram illustrating a circumstance where thenodes are communicated within the IoT network according to oneembodiment of the present disclosure;

FIG. 5 is a schematic diagram depicting a network packet that ispropagated within the IoT network according to one embodiment of thepresent disclosure;

FIG. 6 schematically shows a circumstance where the network packet isbroadcasted among nodes within an IoT network in one embodiment of thepresent disclosure;

FIG. 7 shows a flow chart that describes the method for processingmessages within an IoT network according to one embodiment of thepresent disclosure;

FIG. 8 shows one further flow chart that describes the method forprocessing messages within an IoT network according to one furtherembodiment of the present disclosure; and

FIG. 9 shows another flow chart that describes the method for processingmessages within an IoT network according to one embodiment of thepresent disclosure.

DETAILED DESCRIPTION OF THE EXEMPLARY EMBODIMENTS

The present disclosure is more particularly described in the followingexamples that are intended as illustrative only since numerousmodifications and variations therein will be apparent to those skilledin the art. Like numbers in the drawings indicate like componentsthroughout the views. As used in the description herein and throughoutthe claims that follow, unless the context clearly dictates otherwise,the meaning of “a”, “an”, and “the” includes plural reference, and themeaning of “in” includes “in” and “on”. Titles or subtitles can be usedherein for the convenience of a reader, which shall have no influence onthe scope of the present disclosure.

The terms used herein generally have their ordinary meanings in the art.In the case of conflict, the present document, including any definitionsgiven herein, will prevail. The same thing can be expressed in more thanone way. Alternative language and synonyms can be used for any term(s)discussed herein, and no special significance is to be placed uponwhether a term is elaborated or discussed herein. A recital of one ormore synonyms does not exclude the use of other synonyms. The use ofexamples anywhere in this specification including examples of any termsis illustrative only, and in no way limits the scope and meaning of thepresent disclosure or of any exemplified term. Likewise, the presentdisclosure is not limited to various embodiments given herein. Numberingterms such as “first”, “second” or “third” can be used to describevarious components, signals or the like, which are for distinguishingone component/signal from another one only, and are not intended to, norshould be construed to impose any substantive limitations on thecomponents, signals or the like.

In a network system, many devices acting as a plurality of nodes over anetwork are disposed for performing various functionalities of thesystem. The plurality of nodes within the network embody an Internet ofThings (IoT) network. For example, the plurality of nodes can be avariety of sensor devices of the IoT network that implements asurveillance system. The plurality of nodes can also be variousappliances that are interconnected with each other in a smart home. Overthe IoT network, the messages generated by the nodes can be exchangedvia a specific communication protocol, and can be provided forimplementing functionalities for specific purposes. It should be notedthat the IoT network may support multiple communication protocols thatallow each of the nodes within the IoT network to select one of thecommunication protocols to conduct transmission according to a conditionsuch as a distance, an instant requirement or data throughput.

In an aspect of the surveillance system, referring to FIG. 1 or FIG. 2that exemplarily shows an IoT network with multiple nodes, many sensorsare used to monitor various events occurring in a particular area undersurveillance. More specifically, the node within the IoT network can beimplemented as a motion sensor that utilizes optical, microwave,acoustic sensor or an imaging sensor to detect a moving object withinthe area under surveillance. Another node can also be implemented as aPassive Infrared Sensor (PIR) camera that is used to identify the movingobject by comparing image pixels generated by the camera. Another nodecan be an imaging sensor that is used to capture images of the areaunder surveillance. Further, the nodes within the network system cancommunicate with a central host directly or indirectly via a wirelesscommunication protocol. The data generated by the various nodes can bepre-processed in the nodes or immediately transmitted to the centralhost for processing. For the purpose of security, a specific softwareprogram executed in the central host is used to process the data andannounce an alert message or any warning signal once a surveillanceevent is determined.

FIG. 1 is a schematic diagram showing a network system that implementsthe method for processing messages within an Internet of Things (IoT)network according to one embodiment of the present disclosure.

A central host 10 is provided for operating/managing the IoT-basedsystem such as the shown IoT network that includes a plurality of nodes.When the central host 10 is disposed in the IoT network, a mechanism isprovided to control operation of each of the nodes 101 to 107. Forexample, the central host 10 may communicate with each of the nodes101-107 through a base station via a first communication protocol,wherein the base station maybe incorporated into the central host 10.The first communication protocol can be WiFi™ Bluetooth™, cellularnetwork, or other protocols applied to various generations of mobilecommunication. The central host 10 and the nodes 101 to 107 within IoTnetwork can also be communicated with each other directly via a secondcommunication protocol other than the protocol used by the base station.For example, the second communication protocol can be WiFi, Bluetooth,or other IoT-enabled wireless communication protocols, e.g. ZigBee,Bluetooth Low Energy (BLE), Z-Wave and Near Field Communication (NFC).

It should be noted that the second communication protocol applied forthe nodes 101 to 107 generally considers the need for power saving, andthe first communication protocol used between the nodes (101˜107) andthe central host 10 may generally consider the stability of connectionand the need for long-distance communication, but are not limitedthereto. Some communication protocols, such as WiFi, could be used asthe first communication protocol or the second communication protocolwith different settings or power consumption modes.

In an exemplary example shown in FIG. 1, a first wireless station 11 isprovided as a base station for establishing a connection with thecentral host 10 and allows the central host 10 to communicate with thenodes 101 to 107 based on the first communication protocol. Under thisnetwork topology, a second wireless station 12 as an extend base stationis used to create a subnet including the nodes 101 to 107 and providedfor establishing connectivity among the nodes 101 to 107. The secondwireless station 12 can provide message being transmitted from thecentral host 10 to the nodes 101-107 or from the nodes 101-107 to thecentral host 10 via the first communication protocol or the secondcommunication protocol. It should be noticed that if the communicationbetween the second wireless station 12 to the central host 10 is basedon the first communication protocol then the message between the secondwireless station 12 to the nodes 101˜107 should be converted in aspecific format suitable for the first communication protocol if thecommunication between the second wireless station 12 to the nodes101˜107 is based on the second communication protocol.

For example, the central host 10 generates a control instruction that atleast records information about a source, a destination, and a functionto be performed by a destination node. Then, the control instruction isconverted to a network packet being propagated over the IoT network. Inan initial circumstance, the source recorded in the instruction can be asource IP of the central host 10, the destination recorded in theinstruction can be a destination IP/ID of the destination node, and thetask assigned to the destination node is to perform the function. As thenetwork packet is propagated over the IoT network, the informationrecorded in the packet can be modified if necessary.

One further aspect of the network system for implementing the method forprocessing messages within an IoT network can be referred to in FIG. 2.

FIG. 2 shows a different aspect of the IoT network where the centralhost 10 can directly or indirectly communicate with the nodes 201 to 205via the first wireless station 11 and the nodes 206 to 211 via thesecond wireless station 12. The nodes 201 to 211 are disposed atdifferent subnets that may be disposed at different areas. In thisembodiment, the central host 10, the first wireless station 11 and thesecond wireless station 12 preferably communicate with each other viathe first communication protocol when considering the stability ofconnection and the need for long-distance communication.

As an example for surveillance system, the nodes 201 to 205 can besensors disposed at a first surveillance zone, and the nodes 206 to 211can also be sensors disposed at a second surveillance zone. The centralhost 10 can be a central controller of the surveillance system forprocessing data transmitted from each of the nodes 201 to 211.

In an exemplary example, at least one of the nodes 201 to 205 at thefirst surveillance zone can be a motion sensor. The motion sensor isused for detecting any object entering the first surveillance zone. Oneof the nodes 201 to 205 at the first surveillance zone can be an imagingsensor. The imaging sensor is used for capturing images of the objectbeing detected by the motion sensor as a moving object entering thefirst surveillance zone. Therefore, the safety of the first surveillancezone can be ensured by the cooperation of various types of sensorswithin the IoT network.

Furthermore, the nodes 201 to 205 at the first surveillance zone canalso collaborate with the nodes 206 to 211 at the second surveillancezone through the central host 10 for achieving the purpose of securityfor a wide area. For example, at least one of the nodes 201 to 205 is amotion sensor that generates motion detection signals when detecting anobject entering the first surveillance zone. The at least one of thenodes 206 to 210 could be an image sensor capable of capturing imagesand recording videos. When the central host 10 processes the motiondetection signals received from one or more motion sensors anddetermines a moving object may enter the second surveillance zone, thecentral host 10 will instruct at least one imaging sensor, e.g. one ofthe nodes 206 to 211, at the second surveillance zone to capture theimages (or record video) of the moving object. It should be noted thatthe imaging sensor generates a series of images when receiving thecontrol instruction from the central host 10, or receiving the motiondetection signal directly from the motion sensor, and the images aretransmitted to the central host 10.

FIG. 3 shows a block diagram depicting one of the nodes shown in theabove embodiments of the present disclosure.

A node device 30 of FIG. 3 acts as a node of the IoT system. The maincircuit components of the node device 30 include a controller 301, andother circuits electrically connected to the controller 301. Forexample, a memory 302 electrically connected with the controller 301 isprovided for recording information relating to the node device 30. Theinformation recorded in the memory 302 includes a node ID that acts asidentification such as an IP address or a MAC (Media Access Control)address used to identify the node device 30 within the network.

The node device 30 includes a function module 303 electrically connectedwith the controller 301. In an exemplary example of the disclosure, in asurveillance system, the node device 30 is used as a sensor device thatmay include a motion sensor, an imaging sensor, or some kinds of sensorsfor sensing environmental change, such as temperature, humidity, smokeor the like. The sensor device also includes a processor that performsthe function specified by the function 303. Furthermore, the processorof the sensor device can determines a threshold value for issuing awarning message according to the sensed data generated by the abovevarious sensors in the surveillance system. According to one of theembodiments, the threshold value is used to identify a number of timesthat the warning message have been issued. Specifically, when thewarning message is generated, the warning message can be transmitted tothe one or more nodes through a wireless communication circuit.

In detail, the function module 303 includes a sensor element and therelated electronic components for performing a corresponding function.In the function module 303, the sensor element is utilized to conductsensing in order to generate the sensed data and convert the sensed datainto signals. When the controller 301 receives the signals, an alertsignal may be generated if any abnormal event occurs.

Furthermore, the node device 30 includes two types of communicationcircuits (305, 306) that are connected with the controller 301respectively, and are responsible for communication purposes, whereinthe communication circuits (305, 306) could be antennas or the likewhich are capable of transmitting/receiving wireless signals. Forexample, a first wireless communication circuit 305 of the node device30 performs a first wireless communication protocol that allows the nodedevice 30 to communicate with an external host, e.g. the central host(10, FIG. 1) through a base station, and a second wireless communicationcircuit 306 performs a second wireless communication protocol thatallows the node device 30 to communicate with the central host 10 orother one or more nodes directly within the IoT network close to thenode device 30.

In an IoT system, every node is generally required to work for a longperiod of time, or be on a long-term standby. Accordingly, the firstwireless communication circuit 305 performs a general data transmissionprotocol such as WiFi™ for transmitting the sensed data to the externalhost. Different from the first wireless communication circuit 305, thesecond wireless communication circuit 306 performs thelow-power-consumption IoT-enabled communication protocol forcommunicating with the other nodes via broadcasting packets. Therefore,the node device 30 with the two types of wireless communication circuits(305, 306) can operate more efficiently since it effectively saves thepower consumption while still working to receive instant signals for theother nodes.

The node is configured to be in a power saving mode for the purpose ofpower saving until a waking signal is received. When the node device 30is a camera sensor, the node device 30 may detect if an object isexisted or adjust an exposure parameter of the node device 30 in thepower saving mode, and record video (e.g. capturing series of images) ina recording mode. In the recording mode, the node device 30 records thevideo and then transmits the recorded video to the host by applying thefirst wireless communication circuit 305. In the power saving mode, thenode device 30 applies the second wireless communication circuit 306 tokeep listening to the waking signal. For example, the waking signal maybe generated by the controller 301 if any abnormal event is determined;or the waking signal may be received from the external host if theexternal host issues an instruction to the node device 30.

FIG. 4 is a schematic diagram illustrating a circumstance where thenodes with the two types of wireless communication circuits arecommunicated with each other.

A central host 40 within an IoT network connects with the nodes such asa first node device 401 and a second node device 402 within the samenetwork via a wireless station 41. The figure shows the first nodedevice 401 and the second node device 402 communicating with the centralhost 40 via their first antennas 411 and 421 both under a first wirelesscommunication protocol. Further, the first node device 401 iscommunicated with the second node device 402 via their second antennas412 and 422 both under a second wireless communication protocol. Throughthe second antenna 412 with the related electronics of the first nodedevice 401 and the second antenna 422 of the second node device 402, aninternal connectivity there-between is established.

In other words, within the IoT network, the various devices, e.g. thehost and the nodes, can be communicated with each other directly orindirectly under the same or different communication protocols. Thecentral host 40 establishes connectivity with the plurality of nodes(e.g. 401, 402) via their first antennas (e.g. 411, 421) under the firstwireless communication protocol, and the central host 40 issues aninstruction that can be broadcasted as network packets to the nodes. Theplurality of nodes (e.g. 401, 402) are interconnected via their secondantennas (e.g. 412, 422) under the second wireless communicationprotocol, and the network packets can be broadcasted among the nodes.

Reference is made to FIG. 5 which is a schematic diagram depicting anetwork packet that is propagated within the IoT network according toone embodiment of the present disclosure.

A network packet is configured to be broadcasted over the IoT networkand also well defined by the IoT system to be identifiable by the nodes.According to an example shown in FIG. 5, the network packet generallyincludes a header 50 and data 51.

In general, a header of the network packet is used as an identifier inthe IoT system since it records requisite information for the recipient.For example, either a ID field 503 or a destination field 502 is a fieldof the header 50 and used as an identifier for the node to confirm ifthe node should perform a function specified in a function field 504. Inan aspect of the disclosure, when the ID field 503 has no IDcorresponding to the current node which receives the packet, it showsthat it is a first time the current node receives the network packet andthe current node is configured to perform the function specified in thefunction field 504. In an another aspect, when the destination ID 502records an ID corresponding to the current node, it stipulates that thecurrent node needs to perform the function since the current node is thedestination identified by the header 50.

The header 50 is defined with multiple fields that at least include asource field 501 that records a source ID of the network packet; theabove-mentioned destination field 502 that records a destination ID ofthe network packet; the ID field 503 that records a node ID of one ofthe nodes that were receiving or transmitting the network packet; andthe function field 504 that indicates a function or an action that isrequired to be performed by the node when the node receives the networkpacket. It should be noted that any node receiving this network packetperforms a specified function when the node determines that the networkpacket does not record the node ID of this node in the ID field 503.

Further, the header 50 also includes a counting field 505 that records acounting value that is used to check if a threshold is reached; and athreshold field 506 that records this threshold. It should be noted thatany node receiving the network packet performs a specified function whenthe counting value does not exceed the threshold.

Through the network packet defined by the IoT system, the node withinthe IoT network can convey messages with other nodes, for example the IDfield 503 can be used to determine whether or not the node receiving thenetwork packet performs an action, and the counting field 505 can alsobe used to determine if the function should be performed or not.

As an example for the ID field 503, reference is made to FIG. 6 thatschematically shows a circumstance that the network packet isbroadcasted among nodes within an IoT network.

A central host 60 within the IoT network issues an instruction in formof a network packet to the nodes over the network. Initially, the IDfield of the network packet is vacant. A node ID ‘ID1’ is added in an IDfield of a header of the network packet when a first node ID1 receivesthe network packet. In the meantime, the first node ID1 may perform afunction indicated in the function field and send the network packet tothe network.

After that, when a second node ID2 receives the network packet, it findsthat the node ID ‘ID1’ has been added to ID field of the header. A nodeID ‘ID2’ is added with the node ID ‘ID1’ in the ID field and the secondnode ID2 may perform a function indicated in the function field. Thenetwork packet is still broadcasted over the network.

Similarly, when a third node ID3 receives the network packet, a node ID‘ID3’ is added to the ID field of the header if the node ID ‘ID3’ is notrecorded in the header. When a fourth node ID4 receives the networkpacket, a node ID ‘ID4’ is also added to the ID field of the header.After that, since the network packet may be duplicated by the nodes andbroadcasted over the network, the broadcast may be terminated by thefirst node ID1 if the network packet with the node ID ‘ID1’ is againreceived by the first node ID1. In other words, the broadcast of thenetwork packet will be terminated by any node if its node ID has beenrecorded in the ID field of the header of the network packet.

It should be noted that the ID field of the header of the network packetcan effectively exclude repetitive actions within the IoT network sincethe ID field shows if the node has ever received the same networkpacket. Furthermore, the other fields of the header of the networkpacket also indicate other information such as the source anddestination of the packet as well as the ID field.

According to the mechanism described above, the IoT system relies on theinformation recorded in the network packet to operate, for example asurveillance system, since the information carried by the network packetrequires the IoT node to perform a specified function.

FIG. 7 shows a flow chart that describes the method for processingmessages within an IoT network according to one embodiment of thepresent disclosure.

As shown, in step S701, a node receives a network packet broadcastedover an IoT network. In step S703, a software process running in thenode analyzes the network packet, and in step S705 checks if the networkpacket records a node ID of this node in an ID field. If the ID fieldhas recorded the node ID of the node, in step S707, the node stopsbroadcasting the network packet since the node has received the samenetwork packet. Otherwise, when it is checked and determined that thenetwork packet does not record the node ID of the node, the nodeperforms a function that can be indicated by a function field of theheader of the network packet (step S709), and adds a node ID of thisnode to the ID field (step S711). As shown, in step S713, the networkpacket is broadcasted to the network.

FIG. 8 shows one further flow chart for describing the method in onefurther embodiment of the disclosure.

As shown, in step S801, one of the nodes within an IoT network receivesa network packet, and in step S803 checks if a destination field of aheader of the network packet records its own node ID. Step S805 showsthat the node performs a function indicated in a function field of theheader if the destination field records its own node ID. Otherwise, instep S807, the node continues to check if an ID field of the header ofthe network packet records its own ID if the destination field does notrecord its node ID.

When the ID field has recorded the node ID of this node, in step S809,the process terminates and the network packet will not be broadcasted.When the ID field has not recorded the node ID of this node, in stepS811, the node ID of this node is added to the ID field of the header ofthe network packet. The network packet is again broadcasted to thenetwork (step S813).

Referring to FIG. 9, a counting field of the header of the networkpacket is introduced to the method for processing message fordetermining if the node is required to perform a specified function.Specifically, the counting field of the header indicates a quantitativelimit that manages the nodes to perform the functions.

As shown, in step S901, one of the nodes receives a network packet. Instep S903, a software process running in the node analyzes the networkpacket. In step S905, the node checks if a counting value of thecounting field in the network packet reaches a threshold that isrecorded in a threshold field of the header.

If the counting value reaches the threshold, such as in step S907, thenode stops broadcasting the network packet; otherwise, the node performsa function when it determines that the counting value does not exceedthe threshold (step S909). In step S911, under this situation, thesoftware process in the node adds one to the counting field, and in stepS913 broadcasts the network packet to the network.

It should be noted that the information recorded in the ID field and/orthe counting field of the header of the received network packet is toinstruct the node to perform or not perform the specified function. Forthe surveillance system, the system can utilize the method forprocessing the messages of the disclosure to operate the plurality ofsensors within an internal network.

For example, when a motion sensor of the surveillance system detects amoving object entering a surveillance zone, an imaging sensor will beinformed through a network packet issued by the motion sensor or acentral host in order to capture images of the moving object. Asdescribed, the network packet carries the instruction in the header tofacilitate the node, e.g. the motion sensor or imaging sensor, toperform a specified function. After that, the network packet may bebroadcasted to the network, but will be terminated by the sensor whichhas received the same network packet. For the surveillance system, thedata such as a series of images generated by the sensors can betransmitted to the central host for further analysis. It should be notedthat the sensor, as with the node within the IoT network, can also havetwo types of communication circuits, in which one is for communicatingwith the central host and the other one is for communicating with othersensors within the same network.

The foregoing description of the exemplary embodiments of the disclosurehas been presented only for the purposes of illustration and descriptionand is not intended to be exhaustive or to limit the disclosure to theprecise forms disclosed. Many modifications and variations are possiblein light of the above teaching.

The embodiments were chosen and described in order to explain theprinciples of the disclosure and their practical application so as toenable others skilled in the art to utilize the disclosure and variousembodiments and with various modifications as are suited to theparticular use contemplated. Alternative embodiments will becomeapparent to those skilled in the art to which the present disclosurepertains without departing from its spirit and scope.

What is claimed is:
 1. An Internet of Things (TOT) network system,comprising: a first subnet, including: a first wireless base station;and a plurality of first nodes communicating with one another directlythrough a second communication protocol, wherein a first specific nodeof the plurality of first nodes communicates with the first wirelessbase station through the second communication protocol; a second subnet,including: a second wireless base station communicating with the firstwireless base station through a first communication protocol; and aplurality of second nodes communicating with one another directlythrough the second communication protocol, wherein a second specificnode of the plurality of first nodes communicates with the secondwireless base station through the second communication protocol, whereinthe first specific node communicates with the second specific nodethrough the first wireless base station and the second wireless basestation, wherein one of the plurality of first nodes generates senseddata and transmits the sensed data to the first specific node throughthe second communication protocol, wherein in response to the firstspecific node processing the sensed data and determining that asurveillance event occurs, the first specific node transmits a warningsignal to the second specific node through the first communicationprotocol, and the second specific node broadcasts the warning signalover the second subnet through the second communication protocol byusing the network packet.
 2. The IOT network system according to claim1, wherein the second node is configured to: receive the network packetbroadcasted over the second subnet; analyze the network packet andchecking if the network packet records a node ID of one of the pluralityof second nodes in an ID field; and add the node ID of the one of theplurality of second nodes into the network packet when the second nodedetermines that the network packet does not record the node ID of theone of the second nodes and broadcasting the network packet to thesecond subnet; or terminate broadcasting the network packet when thenetwork packet has recorded the node ID of the one of the second nodes.3. The IOT network system according to claim 1, wherein each of thesecond node checks a counting value of a counting field in the networkpacket in response to receiving the network packet, and adds one to thecounting value before broadcasting the network packet to the secondsubnet.
 4. The IOT network system according to claim 3, wherein, whenthe counting value of the counting field reaches a threshold that isrecorded in a threshold field in the network packet, the second nodeterminates the broadcasting of the network packet to the second subnet.5. The IOT network system according to claim 4, wherein the second nodeperforms a function when the second node determines that the networkpacket does not record the node ID of the one of the plurality of secondnodes or the counting value does not exceed the threshold.
 6. The IOTnetwork system according to claim 5, wherein the function performed bythe node is indicated through a function field in the network packet. 7.The IOT network system according to claim 1, wherein each of theplurality of first nodes includes: a sensor that senses an environmentchange to obtain the sensed data; a memory that records a node ID of thefirst node; a second wireless communication circuit that performs thesecond wireless communication protocol to communicate with one or morefirst nodes within the first subnet.
 8. The IOT network system accordingto claim 7, wherein the first specific node further includes: a firstwireless communication circuit that performs the first wirelesscommunication protocol to communicate with the second specific nodethrough the first base station and the second base station.