Abstract:
An apparatus, system, and method are disclosed for determining electrical load and lifestyle characteristics. A record receiving module receives an electrical energy usage record for premises for a predefined time period (“record period”), and receives property characteristics for the premises. The property characteristics include physical characteristics for the premises, environmental characteristics for the premises for the record period, and/or lifestyle characteristics of users of the premises. A load identification module selects a load prediction algorithm to determine if a particular type of electrical load is present at the premises. A comparison module applies the load prediction algorithm to the electrical energy usage record for the premises for at least a portion of the record period (“comparison period”) to determine if the particular type of electrical load is present at the premises. The load prediction algorithm uses the property characteristics of the premises during the comparison period.
Abstract:
Rather than using a large number of transceivers (transmitter/receiver pairs) operating in parallel, Access Points with multiple channels are used to aggregate, or stack, transmitted response communications, e.g., transmitting multiple acknowledgements (ACKs) in a single packet to one or more sources of received packets. The method includes sending on a plurality of channels, by each of a plurality of respective first nodes, a communication to a second node, receiving on the plurality of channels, by the second node, the communication from each of the plurality of first nodes and sending, by the second node, a transmission that contains a response to each communication that was successfully received from each of the plurality of first nodes. The response to each of the plurality of first nodes is part of a single message sent by the second node.
Abstract:
A method for managing radio transmission in an endpoint device in a network includes: receiving, at a first endpoint device, a message requesting wake up of the first endpoint device; establishing a connection between the first endpoint device to a second endpoint device connected to the network; determining, at the first endpoint device, whether a secure command is received from the second endpoint device via the established connection within a predetermined period of time; and based on the received secure command, establishing a connection between the first endpoint device and the network via radio transmission, wherein the first endpoint device is configured to turn off radio transmission if the secure command is not received within the predetermined period of time.
Abstract:
A mobile device communicates with an authenticator affiliated with a recharging facility, to identify itself. To confirm that the mobile device is connected to the correct facility, the authenticator instructs the mobile device to draw electrical charge according to an identifiable pattern. Upon detecting a charge being drawn according to that pattern, the authenticator has confirmation that the identified device is connected to the facility, and permits the charging to proceed. The amount of electricity drawn during the charging procedure can be metered, and then billed to a party associated with the identified mobile device.
Abstract:
Systems and methods for detecting device failures in a network having nodes coupled to a central controller, in which a first of the nodes communicates with the central controller via a second of the nodes. When the second node determines that the first node has not transmitted a predetermined number of messages over a predefined number of time periods, the second node provides a failure alert to the central controller. The central controller records a failure alert received from the second node in a log. Based on a set of failure alerts received from a number of nodes recorded in the log, the central controller determines whether the first node has failed.
Abstract:
A wireless mesh network is configured to manage a power grid. Each node within the wireless mesh network is configured to detect and classify voltage fluctuations in power supplied by an upstream transformer coupled to the power grid. When a given node detects a particular type of fluctuation (i.e., an “event”), the node generates a timestamped event classification that reflects the type of event and a time when the event occurred. A server configured to manage the wireless mesh network receives timestamped event classifications from each node within the wireless mesh network and then performs a time correlation with the received timestamped event classifications to determine which nodes detected similar events. When two or more nodes detected the same event at similar times, the server determines that those nodes are coupled to the same transformer.
Abstract:
One example embodiment provides a method and system where a node in a utility network registers with one or more access point devices associated with one or more local area utility networks. The utility node generates a unique network address using a network address prefix of a network address associated with the access point device. The utility node registers with a DNS server. Messages sent to the utility node are routed through the access point corresponding to the received prefix used to generate the unique network address for the utility node. The network address for the utility node and access point may be IPv6 addresses and the network address prefix may be an IPv6 prefix, or may be an IPv4 address.
Abstract:
One embodiment of the present disclosure sets forth a technique for convergence and automatic disabling of access points in a wireless mesh network. Specifically, an access point within a wireless mesh network computes one or more network metrics to determine whether the metrics are unfavorable or favorable. If the network metrics are favorable, then the access point disables the access point's network connection. An access point turns the network connection back on based on whether a routing was lost for at least a preset amount of time, utilization of one or more neighboring access points is above a preset value, or one or more network metrics have degraded by a certain percentage value. One advantage of this approach is that cost savings may be achieved when the number of access points dynamically changes to accommodate varying communications conditions.
Abstract:
One embodiment of the present invention sets forth a technique for transmitting data in a frequency hopping spread spectrum (FHSS) wireless communication system. A multi-channel receiver is configured to receive data from one or more channels simultaneously. The multi-channel receiver enables efficient implementation of a transmission protocol in which multiple candidate nodes within a wireless mesh network are polled for availability to receive a packet of data. The packet of data is transmitted to one or more available nodes based on prevailing link conditions, thereby increasing the likelihood of successful delivery. Data flooding may be selectively implemented to further increase the likelihood of successful delivery.
Abstract:
A node within a wireless mesh network performs a path analysis on an advertised path to an access point that has a cost value less than the cost value of the current primary path to the access point. Depending on the cost value difference between the respective cost values of the advertised path and the current primary path, the node may perform a different type of path analysis. Based on the result of that path analysis, the node may change paths to the access point and use the advertised path as the primary path. Further, the node maintains a secondary path so that, in the event that the primary path fails, the node can default to using the secondary path.