Abstract:
Techniques are presented herein to enable identification of light fixtures. A light fixture modulates light emitted by the light fixture with an identifier associated with the light fixture. The identifier may be encoded or encrypted before it is modulated. In one example, the identifier is a Universally Unique Identifier (UUID). A user device is positioned to detect light emitted by the light fixture. The user device demodulates the light to obtain the identifier. The identifier, time and location associated with detection of the identifier are sent to a management entity for use in provisioning the light fixture on a network.
Abstract:
A lighting control system is provided which accepts user lightning commands, generates controls in accordance with predetermined operating policies and directs light fixtures to produce brightness, color, or directional pattern of the light emitted by the light fixtures. The lighting control system determines whether the light emitted by the light fixtures complies with government regulations, and building policies, and insures that controls are adjusted such that all regulations regarding lighting safety and working conditions, as well as building policy and energy management targets are adhered to. In addition, a way to reconcile conflicting user requests for lighting settings is provided.
Abstract:
A method is provided in one example embodiment and includes receiving a message at a network element configured for routing packets, where the message directs a network device to change its power state; identifying the network device as being associated with a network for which the network element has responsibility; and communicating at least a portion of the message from the network element to the network device.
Abstract:
Techniques presented herein are directed to lighting management techniques supporting lighting functions of networked light fixtures. In accordance with one example, a light fixture in networked lighting system accepts a lighting request transmitted by a computing device. The light fixture determines whether the lighting request is a control message or a query message and performs one or more operations in response to the lighting request depending on whether the lighting request is a control message or a query message.
Abstract:
Techniques presented herein are directed to lighting management techniques supporting lighting functions of networked light fixtures. In accordance with one example, a light fixture in networked lighting system accepts a lighting request transmitted by a computing device. The light fixture determines whether the lighting request is a control message or a query message and performs one or more operations in response to the lighting request depending on whether the lighting request is a control message or a query message.
Abstract:
A method is provided in one example embodiment and includes receiving a message at a network element configured for routing packets, where the message directs a network device to change its power state; identifying the network device as being associated with a network for which the network element has responsibility; and communicating at least a portion of the message from the network element to the network device.
Abstract:
A method is provided in which a network access system receives an initial request from a device requesting access to the network. In response to successfully authenticating the initial access request, the system causes a code to be transmitted in light emitted by one or more light fixtures within a physical space in which access to the network is to be restricted. The system receives information from the device requesting access to the network and determines whether to permit the device access to the network based on the initial request and on whether the received information is derived from the code transmitted by the one or more light fixtures, thereby indicating that the requesting device is within the physical space.
Abstract:
Techniques are presented herein to enable identification of light fixtures. A light fixture modulates light emitted by the light fixture with an identifier associated with the light fixture. The identifier may be encoded or encrypted before it is modulated. In one example, the identifier is a Universally Unique Identifier (UUID). A user device is positioned to detect light emitted by the light fixture. The user device demodulates the light to obtain the identifier. The identifier, time and location associated with detection of the identifier are sent to a management entity for use in provisioning the light fixture on a network.
Abstract:
A method is provided in which a network access system receives an initial request from a device requesting access to the network. In response to successfully authenticating the initial access request, the system causes a code to be transmitted in light emitted by one or more light fixtures within a physical space in which access to the network is to be restricted. The system receives information from the device requesting access to the network and determines whether to permit the device access to the network based on the initial request and on whether the received information is derived from the code transmitted by the one or more light fixtures, thereby indicating that the requesting device is within the physical space.
Abstract:
Techniques presented herein are directed to lighting management techniques supporting lighting functions of networked light fixtures. In accordance with one example, a light fixture in networked lighting system accepts a lighting request transmitted by a computing device. The light fixture determines whether the lighting request is a control message or a query message and performs one or more operations in response to the lighting request depending on whether the lighting request is a control message or a query message.