Abstract:
In one embodiment, a device determines that a latency between a receive timeslot of a channel hopping schedule of the device and a transmit timeslot of the channel hopping schedule is greater than a latency threshold for a particular traffic flow to be received during the receive timeslot. The device requests an additional transmit timeslot for the channel hopping schedule from a parent node of the device in the network. The device receives an indication of a newly allocated transmit timeslot for the channel hopping schedule from the parent node. The device maps the receive timeslot to one of the transmit timeslots of the channel hopping schedule, wherein the particular traffic flow is to be forwarded to a second device during the mapped transmit timeslot.
Abstract:
In one embodiment, a network node monitors communications between a sender node and an intermediary receiver node during a set of time slots of a channel hopping schedule. The sender node, intermediary receiver node, and a final destination node for the communications may all be located along a primary communication path in the network. The network node stores a copy of one of the communications sent from the sender node to the intermediary receiver node during a particular time slot in the set of time slots. The network node forwards the copy of the communication to a listener node configured to monitor communications between the intermediary receiver node and another node located along the primary communication path. The intermediary receiver node is also configured to monitor communications between the network node and the listener node.
Abstract:
In one embodiment, a network node provides a time slotted channel hopping (TSCH) schedule to one or more child nodes of the network node. The TSCH schedule includes one or more mandatory routing protocol report time slots. The network node receives routing protocol reports from the one or more child nodes according to the TSCH schedule. The network node aggregates the received routing protocol reports into an aggregated routing protocol report. The network node provides the aggregated routing protocol report to a parent of the network node during a time slot that is subsequent to the one or more mandatory time slots for the one or more child nodes.
Abstract:
In one embodiment, a device in a network receives an indication of an appropriation and defense time slot for a set of time slots in a channel hopping schedule. The device appropriates ownership of the set of time slots using an appropriation window of the appropriation and defense time slot. The device receives an appropriation request from a second device during the appropriation window. In response to receiving the appropriation request, the device sends a defense notification during a defense window of the appropriation and defense time slot.
Abstract:
In one embodiment, a first communication is transmitted from a transmitting node in a network using a mesh routing protocol. The first communication is received at a particular node in the network. Based on the first communication, a directional attribute is computed. Based on the directional attribute, a particular direction is computed. Then, a second communication is transmitted from the particular node using a beam forming technique in the second direction.
Abstract:
This disclosure describes techniques for device to device authentication. For instance, a first device may detect a second device, such as when a user physically attaches the second device to the first device or when the second device wireless communicates with the first device. A component of the first device and/or an authentication entity may then determine to authenticate the second device. In some instances, the component determines to authenticate the second device using information associated with an environment of the second device. To authenticate the second device, the authentication entity may send a request to a user, receive a response from the user, and then verify the response. After the authentication, the first device may determine that the second device includes a trusted device and establish a connection with the second device.
Abstract:
In one embodiment, a client device enters an area having an overhead mesh of access points, each access point comprising one or more directional transmitters each configured to transmit a beam cone in a substantially downward direction towards a floor of the area. The client device obtains an area-dependent communication schedule for the overhead mesh that is exclusive or partially-exclusive to the client device for the area. The client device sends, during an arbitrary timeslot of the area-dependent communication schedule, a pull request. The client device receives, from a particular access point in the overhead mesh, a packet in response to the pull request.
Abstract:
Broadcast energy and spectrum consumption optimization may be provided. It may be determined, by a computing device for each of a plurality of client devices, a corresponding plurality of respective minimum Modulation and Coding Schemes (MCSs) needed to reach each of the respective plurality of client devices from the computing device at a predetermined power level. Next, an optimal MCS from the plurality of respective minimum MCSs may be used to reach a first group of the plurality of client devices via broadcast. Then unicast may be used to reach a second group of the plurality of client devices wherein the optimal MCS is selected to minimize the total amount of airtime used for the broadcast and the unicast.
Abstract:
Systems and methods may include sending, to a network registrar, an extended duplicate address request (EDAR) message including a first nonce generated by a host computing device, and receiving, from the network registrar, an extended duplicate address confirmation (EDAC) message including a second nonce and a first signature, a first nonce pair including the first nonce and the second nonce being signed by the network registrar via a first key pair of the network registrar via the first signature. The systems and methods may further include sending a first neighbor advertisement (NA) message to the host computing device including the second nonce. The second nonce and a public key of the network registrar verifies the first signature from the network registrar, the verification of the first signature indicating that a router through which the host computing device connects to a network is not impersonating the network.
Abstract:
Techniques for leveraging MLD capabilities at edge nodes of network fabrics to receive SNMAs from silent hosts, and creating unicast addresses from the SNMAs for the silent nodes that are used as secondary matches in a network overlay if primary unicast address lookups fail. The edge nodes described herein may act as snoopers of MLD reports in order to identify the SNMAs of the silent hosts. The edge nodes then forge unicast addresses for the silent hosts that match with the least three bytes of the SNMAs. The forged unicast addresses are presented as unicast MAC/IP mappings in the fabric overlay. In situations where a primary IP address lookup fails, the look-up device performs a secondary lookup for a mapped address that has the last three bytes of the IP address. If a mapping is found, the lookup is sent as a unicast message to the matching MAC address.