Abstract:
A communication device detects whether anomalous events occur with respect to at least one node in a utility network. The communication device has recorded therein threshold operating information and situational operating information. The threshold operating information includes data indicative of configured acceptable operating parameters of nodes in the network based on respective locational information of the nodes. The situational information includes data indicative of configured operation data expected to be received from nodes in the network during a predetermined time period, based on a condition and/or event occurring during the time period. The communication device receives operation data from nodes in the network, and determines whether the operation data from a node constitutes an anomalous event based on a comparison of the received operation data with (i) the threshold operating information defined for the node and (ii) the situational information. The communication device outputs notification of any determined anomalous event.
Abstract:
A node within a wireless mesh network is configured to forward a high-priority message to adjacent nodes in the wireless mesh network by either (i) transmitting the message during successive timeslots to the largest subset of nodes capable of receiving transmissions during each timeslot, or (ii) transmitting the message on each different channel during the timeslot when the largest subset of nodes are capable of receiving transmissions on each of those channels.
Abstract:
To provide overall security to a utility management system, critical command and control messages that are issued to components of the system are explicitly approved by a secure authority. The explicit approval authenticates the requested action and authorizes the performance of the specific action indicated in a message. Key components of the utility management and control system that are associated with access control are placed in a physical bunker. With this approach, it only becomes necessary to bunker those subsystems that are responsible for approving network actions. Other management modules can remain outside the bunker, thereby avoiding the need to partition them into bunkered and non-bunkered components. Access to critical components of each of the non-bunkered subsystems is controlled through the bunkered approval system.
Abstract:
A wireless mesh network includes heterogeneous types of nodes, including continuously-powered nodes and battery-powered nodes. The battery-powered nodes may reside in a sleeping state most of the time to conserve power. The various nodes in the network may communicate with one another by transmitting and receiving at scheduled times and on scheduled frequencies. The battery-powered nodes may become active during the scheduled transmit and receive times. Network management nodes may facilitate network formation by transmitting information that reflects the scheduled transmit and receive times across the network. Based on this data, the continuously-powered nodes and battery-powered nodes may establish communication links with one another.
Abstract:
A method includes detecting, by a mobile network interface card (MNIC) using a radio frequency (RF) signal, network devices of a network, generating, by the MNIC, a report identifying a network device of the network devices as detected by the MNIC, and sending, by the MNIC, the report to the network device. The method further includes forwarding, by the network device using the network, the report to a backend, identifying, by the backend, a physical location of the network device, and determining, by the backend, an approximate physical location of the MNIC based on the physical location of the network device.
Abstract:
One embodiment of the present invention sets forth a technique for transmitting data in a listen before talk (LBT) wireless transmission regime. A digital radio receiver is configured to simultaneously receive and decode digital data transmissions from multiple radio channels. A digital radio transmitter is configured to listen to the multiple radio channels prior to transmitting digital data on a selected one of the multiple channels, based on locally determined channel occupancy. Optimal LBT efficiency is achieved within the set of multiple channels, thereby improving overall transmission efficiency between the transmitter and the receiver.
Abstract:
A mobile device communicates with an authenticator affiliated with a recharging facility, to identify itself. To confirm that the mobile device is connected to the correct facility, the authenticator instructs the mobile device to draw electrical charge according to an identifiable pattern. Upon detecting a charge being drawn according to that pattern, the authenticator has confirmation that the identified device is connected to the facility, and permits the charging to proceed. The amount of electricity drawn during the charging procedure can be metered, and then billed to a party associated with the identified mobile device.
Abstract:
A node in network is configured to buffer data received from other nodes across multiple channels. The node process a portion of the buffered data associated with a subset of those channels. When the node receives data on that subset of channels that includes a notification, the node then processes a larger portion of the buffered data associated with a larger number of channels. In doing so, the node may identify additional notifications include within data that was buffered but not previously processed. The node may also coordinate with other nodes in order to process buffered data upon identification of a notification.
Abstract:
Systems and methods for detecting device failures in a network having nodes coupled to a central controller, in which a first of the nodes communicates with the central controller via a second of the nodes. When the second node determines that the first node has not transmitted a predetermined number of messages over a predefined number of time periods, the second node provides a failure alert to the central controller. The central controller records a failure alert received from the second node in a log. Based on a set of failure alerts received from a number of nodes recorded in the log, the central controller determines whether the first node has failed.
Abstract:
A node within a wireless endpoint device may be coupled to multiple heterogeneous networks simultaneously. The node is configured to select between the different networks based on various constraints associated with the endpoint device, applications executing on the endpoint device, traffic routed by the endpoint device, and constraints associated with the multiple networks. Based on these different constraints, and based on the current operating mode of the node, the node rates each network, and then selects the network with the highest rating to be used for routing purposes.