Abstract:
A communication device detects whether anomalous events occur with respect to at least one node in a utility network. The communication device has recorded therein threshold operating information and situational operating information. The threshold operating information includes data indicative of configured acceptable operating parameters of nodes in the network based on respective locational information of the nodes. The situational information includes data indicative of configured operation data expected to be received from nodes in the network during a predetermined time period, based on a condition and/or event occurring during the time period. The communication device receives operation data from nodes in the network, and determines whether the operation data from a node constitutes an anomalous event based on a comparison of the received operation data with (i) the threshold operating information defined for the node and (ii) the situational information. The communication device outputs notification of any determined anomalous event.
Abstract:
A node within a wireless mesh network is configured to forward a high-priority message to adjacent nodes in the wireless mesh network by either (i) transmitting the message during successive timeslots to the largest subset of nodes capable of receiving transmissions during each timeslot, or (ii) transmitting the message on each different channel during the timeslot when the largest subset of nodes are capable of receiving transmissions on each of those channels.
Abstract:
To provide overall security to a utility management system, critical command and control messages that are issued to components of the system are explicitly approved by a secure authority. The explicit approval authenticates the requested action and authorizes the performance of the specific action indicated in a message. Key components of the utility management and control system that are associated with access control are placed in a physical bunker. With this approach, it only becomes necessary to bunker those subsystems that are responsible for approving network actions. Other management modules can remain outside the bunker, thereby avoiding the need to partition them into bunkered and non-bunkered components. Access to critical components of each of the non-bunkered subsystems is controlled through the bunkered approval system.
Abstract:
The service phase of the electrical connection to a customer endpoint device located within a power distribution system is determined by various techniques. At the feeder level, the system may be programmed to induce disturbances, thereby causing missed zero crossings at the customer endpoint devices. The pattern of these disturbances is a controlled one, designed specifically to avoid causing noticeable disruption even to sensitive devices, but to be unusual enough that it is statistically unlikely to be naturally occurring. The monitoring of the zero crossing information is used to determine the phase of the service line to the customer endpoint devices.
Abstract:
A mobile device communicates with an authenticator affiliated with a recharging facility, to identify itself. To confirm that the mobile device is connected to the correct facility, the authenticator instructs the mobile device to draw electrical charge according to an identifiable pattern. Upon detecting a charge being drawn according to that pattern, the authenticator has confirmation that the identified device is connected to the facility, and permits the charging to proceed. The amount of electricity drawn during the charging procedure can be metered, and then billed to a party associated with the identified mobile device.
Abstract:
One embodiment of the present invention sets forth a technique for a node within a network to adjust one or more routing parameters based on certain network parameters. A node monitors certain network metrics such as the mean time between routing drops. In response to changes in these network parameters, the node changes certain routing parameters, such as the holddown time. The node may store network metrics and associated routing parameters that result in preferred network operating conditions. The node may pre-load these beneficial settings upon the occurrence of a particular condition such as a system reset of the node. Moreover, a node may share these beneficial settings with neighboring nodes on the same network. One advantage of this approach is that cost savings are achieved when a node within a network may be installed without preconfiguring the node with specific routing parameters.
Abstract:
Systems and methods for detecting device failures in a network having nodes coupled to a central controller, in which a first of the nodes communicates with the central controller via a second of the nodes. When the second node determines that the first node has not transmitted a predetermined number of messages over a predefined number of time periods, the second node provides a failure alert to the central controller. The central controller records a failure alert received from the second node in a log. Based on a set of failure alerts received from a number of nodes recorded in the log, the central controller determines whether the first node has failed.
Abstract:
One example embodiment provides a method and system where a node in an IPv6 utility network communicates with an IPv6 destination node through and IPv4 network. IPv6 utility nodes are reachable through at least one access point. IPv6 packets to be transmitted between an IPv6 access point an and an IPv6 destination node through a IPv4 communications network are encapsulated in IPv4 packets for transmission through the IPv4 communications network. Packets received after transmission through the IPv4 communications network at the destination node are extracted to retrieve the IPv6 packet.
Abstract:
A node within a wireless endpoint device may be coupled to multiple heterogeneous networks simultaneously. The node is configured to select between the different networks based on various constraints associated with the endpoint device, applications executing on the endpoint device, traffic routed by the endpoint device, and constraints associated with the multiple networks. Based on these different constraints, and based on the current operating mode of the node, the node rates each network, and then selects the network with the highest rating to be used for routing purposes.
Abstract:
A node within a wireless mesh network is configured to select a primary path through an access point and to designate that access point as the primary access point for the node. The access point then transmits a failover message indicating that the node designated that access point as the primary access point for the node at a particular time. When another access point receives the failover message, the other access point may determine that the first node has also designated the other access point as the primary access point for the node, and may then de-register the node and stop advertising a primary path to the node.