Abstract:
In one embodiment, a management device determines a topology of nodes in a network. Based on the topology, frequency hopping sequences are assigned (and notified) to the nodes such that each particular node of a certain set of the nodes is assigned a frequency hopping sequence on which to transmit that is different than frequency hopping sequences of neighbors and hidden neighbors of that particular node. In another embodiment, a transmitting node first transmits a transmission indication signal on its particular frequency band based on its frequency hopping sequence, and then transmits a message on the particular frequency band. In a further embodiment, a receiving node listening to a plurality of frequency bands may detect the transmission indication signal on the particular frequency band. In response, the receiving node filters out all frequency bands other than the particular frequency band, and receives the following transmission on that particular frequency band.
Abstract:
In one embodiment, a node in a network receives communication channel data regarding one or more communication channels available between a particular device in the network and a neighboring device. Each communication channel corresponds to one or more electrical phases over which the particular device can communicate with the neighboring device. The node also receives crosstalk data regarding an amount of crosstalk between the electrical phases over which the particular device can communicate with the neighboring device. The node then generates a routing path for the network based on the received crosstalk and communication channel data.
Abstract:
In one embodiment, a source routing device (e.g., root device) pre-computes diverse source-routed paths to one or more nodes in a computer network. Upon receiving a particular packet, the device forwards the particular packet on a source-routed first path of the pre-computed diverse paths. In the event the device implicitly detects failure of the first path, then it forwards a copy of the particular packet on a source-routed second path of the pre-computed diverse paths in response. In one embodiment, implicit failure detection comprises seeing a second (repeated) packet with the same identification within a certain time since the first packet, and the second packet is forwarded on the second path. In another embodiment, implicit failure detection comprises not seeing a link-layer acknowledgment returned or receiving an error notification from a node along the broken path, and a stored copy of the particular packet is forwarded on the second path.
Abstract:
In one embodiment, a device (e.g., path computation device) informs a network management device of a plurality of possible probing profiles, where nodes of a computer network receive the plurality of possible probing profiles from the network management device. Based on determining that particular information is desired from one or more particular nodes of the nodes of the computer network, the device may then select one or more particular probing profiles of the plurality of possible probing profiles based on the particular information, and instructs the one or more particular nodes to probe one or more particular destination nodes according to the one or more particular probing profiles.
Abstract:
In one embodiment, a device receives a router advertisement message after a power outage event in a network. The device joins the network, in response to receiving the router advertisement message. The device sends a power restoration notification message via the network. The device selectively delays a disconnected node from joining the network.
Abstract:
The subject disclosure relates to a method for directing acyclic graph routing and management for Low power and Lossy Networks (LANs). A system may identify a gain factor that indicates a potential gain that can be obtained in link cost from a node in a network represented by a direct acyclic graph (DAG) to the root node of the DAG when an upper node in the DAG changes its routing decision. When the gain factor exceeds a threshold, the node can transmit a DAG rebuild request to other nodes in the DAG. Upon receiving the request, the system may determine whether to satisfy the DAG rebuild request based on the number of requesting nodes. Based on the determination, the system may select a new parent node for the node that receives the request. The DAG rebuild can decrease in link cost from the transmitting node to the root node.
Abstract:
In one embodiment, attack traffic corresponding to a detected DoS attack from one or more attacker nodes is received at a denial of service (DoS) attack management node in a network. The DoS attack management node determines attack information relating to the attack traffic, including a type of the DoS attack and an intended target of the DoS attack. Then, the DoS attack management node triggers an attack mimicking action based on the attack information, where the attack mimicking action mimics a behavior of the intended target of the DoS attack that would be expected by the one or more attacker nodes if the DoS attack were successful.
Abstract:
In one embodiment, a device in a network receives a switchover policy for a particular type of traffic in the network. The device determines a predicted effect of directing a traffic flow of the particular type of traffic from a first path in the network to a second path in the network. The device determines whether the predicted effect of directing the traffic flow to the second path would violate the switchover policy. The device causes the traffic flow to be routed via the second path in the network, based on a determination that the predicted effect of directing the traffic flow to the second path would not violate the switchover policy for the particular type of traffic.
Abstract:
In a multiple interface, low power and lossy network comprising a plurality of nodes, a low transmission power and medium transmission power topology are defined for the network and a channel-hopping schedule is defined for the devices operating in each topology. A sender determines that data is capable of being transmitted via a link on the low transmission power topology. The sender determines the transmission parameters for the transmission of the data over the link on the low transmission power topology and determines a low transmission power channel for transmission of the data. The sender transmits the determined channel and the transmission parameters to the receiver. The sender transmits the data via the determined channel in the low transmission power topology.
Abstract:
In one embodiment, a device in a network monitors performance data for a first predictive model. The first predictive model is used to make proactive decisions in the network. The device maintains a supervisory model based on the monitored performance data for the first predictive model. The device identifies a time period during which the supervisory model predicts that the first predictive model will perform poorly. The device causes a switchover from the first predictive model to a second predictive model at a point in time associated with the time period, in response to identifying the time period.