DISTRIBUTED RESCHEDULING OF BOUNDED FLOWS IN A TIME SENSITIVE NETWORK
    91.
    发明申请
    DISTRIBUTED RESCHEDULING OF BOUNDED FLOWS IN A TIME SENSITIVE NETWORK 有权
    在时间敏感网络中分布式流动的循环流

    公开(公告)号:US20160021017A1

    公开(公告)日:2016-01-21

    申请号:US14334821

    申请日:2014-07-18

    CPC classification number: H04L47/28 H04L47/12 H04L47/125 H04L47/14 H04L47/24

    Abstract: In one embodiment, a device determines that a latency between a receive timeslot of a channel hopping schedule of the device and a transmit timeslot of the channel hopping schedule is greater than a latency threshold for a particular traffic flow to be received during the receive timeslot. The device requests an additional transmit timeslot for the channel hopping schedule from a parent node of the device in the network. The device receives an indication of a newly allocated transmit timeslot for the channel hopping schedule from the parent node. The device maps the receive timeslot to one of the transmit timeslots of the channel hopping schedule, wherein the particular traffic flow is to be forwarded to a second device during the mapped transmit timeslot.

    Abstract translation: 在一个实施例中,设备确定设备的信道跳频调度的接收时隙与信道跳频调度的发送时隙之间的等待时间大于在接收时隙期间接收的特定业务流的等待时间阈值。 该设备从网络中的设备的父节点请求用于信道跳频调度的附加传输时隙。 设备从父节点接收关于信道跳频调度的新分配的发射时隙的指示。 设备将接收时隙映射到信道跳频调度的发送时隙之一,其中在映射的发送时隙期间将特定业务流转发到第二设备。

    LEAPFROG COMMUNICATIONS IN A TSCH NETWORK
    92.
    发明申请
    LEAPFROG COMMUNICATIONS IN A TSCH NETWORK 审中-公开
    一个TSCH网络中的LEAPFROG通信

    公开(公告)号:US20160020979A1

    公开(公告)日:2016-01-21

    申请号:US14336005

    申请日:2014-07-21

    Abstract: In one embodiment, a network node monitors communications between a sender node and an intermediary receiver node during a set of time slots of a channel hopping schedule. The sender node, intermediary receiver node, and a final destination node for the communications may all be located along a primary communication path in the network. The network node stores a copy of one of the communications sent from the sender node to the intermediary receiver node during a particular time slot in the set of time slots. The network node forwards the copy of the communication to a listener node configured to monitor communications between the intermediary receiver node and another node located along the primary communication path. The intermediary receiver node is also configured to monitor communications between the network node and the listener node.

    Abstract translation: 在一个实施例中,网络节点在信道跳频调度的一组时隙期间监视发送方节点和中间接收机节点之间的通信。 发送方节点,中间接收方节点和用于通信的最终目的地节点都可以沿着网络中的主要通信路径定位。 网络节点在一组时隙中的特定时隙期间存储从发送者节点发送到中间接收机节点的通信之一的副本。 网络节点将通信的副本转发到被配置为监视中间接收机节点与沿着主通信路径的另一个节点之间的通信的监听节点。 中间接收机节点还被配置为监视网络节点和监听节点之间的通信。

    SYNCHRONIZED ROUTING UPDATES FOR TSCH NETWORKS
    93.
    发明申请
    SYNCHRONIZED ROUTING UPDATES FOR TSCH NETWORKS 有权
    用于TSCH网络的同步路由更新

    公开(公告)号:US20160020967A1

    公开(公告)日:2016-01-21

    申请号:US14336486

    申请日:2014-07-21

    CPC classification number: H04L43/06 H04J3/16 H04L45/48 H04W40/248

    Abstract: In one embodiment, a network node provides a time slotted channel hopping (TSCH) schedule to one or more child nodes of the network node. The TSCH schedule includes one or more mandatory routing protocol report time slots. The network node receives routing protocol reports from the one or more child nodes according to the TSCH schedule. The network node aggregates the received routing protocol reports into an aggregated routing protocol report. The network node provides the aggregated routing protocol report to a parent of the network node during a time slot that is subsequent to the one or more mandatory time slots for the one or more child nodes.

    Abstract translation: 在一个实施例中,网络节点向网络节点的一个或多个子节点提供时隙信道跳频(TSCH)调度。 TSCH调度包括一个或多个强制路由协议报告时隙。 网络节点根据TSCH调度从一个或多个子节点接收路由协议报告。 网络节点将接收到的路由协议报告聚合成聚合路由协议报告。 网络节点在一个或多个子节点的一个或多个强制时隙之后的时隙中向网络节点的父节点提供聚合的路由协议报告。

    DISTRIBUTED APPROPRIATION AND DEFENSE OF TIME SLOT OWNERSHIP IN A CHANNEL HOPPING SCHEDULE
    94.
    发明申请
    DISTRIBUTED APPROPRIATION AND DEFENSE OF TIME SLOT OWNERSHIP IN A CHANNEL HOPPING SCHEDULE 有权
    分布式调度和通道时间表中时间轴所有权的防御

    公开(公告)号:US20160020864A1

    公开(公告)日:2016-01-21

    申请号:US14336226

    申请日:2014-07-21

    CPC classification number: H04B1/713 H04B1/707 H04W4/80 H04W40/24

    Abstract: In one embodiment, a device in a network receives an indication of an appropriation and defense time slot for a set of time slots in a channel hopping schedule. The device appropriates ownership of the set of time slots using an appropriation window of the appropriation and defense time slot. The device receives an appropriation request from a second device during the appropriation window. In response to receiving the appropriation request, the device sends a defense notification during a defense window of the appropriation and defense time slot.

    Abstract translation: 在一个实施例中,网络中的设备接收信道跳频调度中的一组时隙的占用和防御时隙的指示。 该设备使用专用和防御时隙的拨款窗口来占用该组时隙的所有权。 设备在拨款窗口期间从第二个设备接收到拨款请求。 响应收到拨款请求,设备在拨号和防御时隙的防范窗口发送防御通知。

    OPTIMIZING COMMUNICATION FOR MESH ROUTING PROTOCOLS USING DIRECTIONAL BEAM FORMING
    95.
    发明申请
    OPTIMIZING COMMUNICATION FOR MESH ROUTING PROTOCOLS USING DIRECTIONAL BEAM FORMING 有权
    使用方向光束形成的网格路由协议优化通信

    公开(公告)号:US20150002336A1

    公开(公告)日:2015-01-01

    申请号:US13930046

    申请日:2013-06-28

    Abstract: In one embodiment, a first communication is transmitted from a transmitting node in a network using a mesh routing protocol. The first communication is received at a particular node in the network. Based on the first communication, a directional attribute is computed. Based on the directional attribute, a particular direction is computed. Then, a second communication is transmitted from the particular node using a beam forming technique in the second direction.

    Abstract translation: 在一个实施例中,使用网状路由协议从网络中的发送节点发送第一通信。 在网络中的特定节点处接收到第一通信。 基于第一通信,计算方向属性。 根据定向属性,计算一个特定的方向。 然后,使用在第二方向上的波束成形技术从特定节点发送第二通信。

    Techniques for device to device authentication

    公开(公告)号:US12250215B2

    公开(公告)日:2025-03-11

    申请号:US16986923

    申请日:2020-08-06

    Abstract: This disclosure describes techniques for device to device authentication. For instance, a first device may detect a second device, such as when a user physically attaches the second device to the first device or when the second device wireless communicates with the first device. A component of the first device and/or an authentication entity may then determine to authenticate the second device. In some instances, the component determines to authenticate the second device using information associated with an environment of the second device. To authenticate the second device, the authentication entity may send a request to a user, receive a response from the user, and then verify the response. After the authentication, the first device may determine that the second device includes a trusted device and establish a connection with the second device.

    Broadcast Energy and Spectrum Consumption Optimization

    公开(公告)号:US20240163005A1

    公开(公告)日:2024-05-16

    申请号:US18334054

    申请日:2023-06-13

    CPC classification number: H04L1/0003 H04W52/34 H04W72/54

    Abstract: Broadcast energy and spectrum consumption optimization may be provided. It may be determined, by a computing device for each of a plurality of client devices, a corresponding plurality of respective minimum Modulation and Coding Schemes (MCSs) needed to reach each of the respective plurality of client devices from the computing device at a predetermined power level. Next, an optimal MCS from the plurality of respective minimum MCSs may be used to reach a first group of the plurality of client devices via broadcast. Then unicast may be used to reach a second group of the plurality of client devices wherein the optimal MCS is selected to minimize the total amount of airtime used for the broadcast and the unicast.

    Network security from host and network impersonation

    公开(公告)号:US11757827B2

    公开(公告)日:2023-09-12

    申请号:US17819783

    申请日:2022-08-15

    Abstract: Systems and methods may include sending, to a network registrar, an extended duplicate address request (EDAR) message including a first nonce generated by a host computing device, and receiving, from the network registrar, an extended duplicate address confirmation (EDAC) message including a second nonce and a first signature, a first nonce pair including the first nonce and the second nonce being signed by the network registrar via a first key pair of the network registrar via the first signature. The systems and methods may further include sending a first neighbor advertisement (NA) message to the host computing device including the second nonce. The second nonce and a public key of the network registrar verifies the first signature from the network registrar, the verification of the first signature indicating that a router through which the host computing device connects to a network is not impersonating the network.

    Leveraging multicast listener discovery for discovering hosts

    公开(公告)号:US11736393B2

    公开(公告)日:2023-08-22

    申请号:US17902158

    申请日:2022-09-02

    Abstract: Techniques for leveraging MLD capabilities at edge nodes of network fabrics to receive SNMAs from silent hosts, and creating unicast addresses from the SNMAs for the silent nodes that are used as secondary matches in a network overlay if primary unicast address lookups fail. The edge nodes described herein may act as snoopers of MLD reports in order to identify the SNMAs of the silent hosts. The edge nodes then forge unicast addresses for the silent hosts that match with the least three bytes of the SNMAs. The forged unicast addresses are presented as unicast MAC/IP mappings in the fabric overlay. In situations where a primary IP address lookup fails, the look-up device performs a secondary lookup for a mapped address that has the last three bytes of the IP address. If a mapping is found, the lookup is sent as a unicast message to the matching MAC address.

Patent Agency Ranking