US20150244648A1 - Auto-configuration of a mesh relay's tx/rx schedule - Google Patents
Auto-configuration of a mesh relay's tx/rx schedule Download PDFInfo
- Publication number
- US20150244648A1 US20150244648A1 US14/270,884 US201414270884A US2015244648A1 US 20150244648 A1 US20150244648 A1 US 20150244648A1 US 201414270884 A US201414270884 A US 201414270884A US 2015244648 A1 US2015244648 A1 US 2015244648A1
- Authority
- US
- United States
- Prior art keywords
- communication device
- network
- power
- packets
- devices
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
- H04L43/0805—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
- H04L43/0817—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking functioning
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/73—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by creating or determining hardware identification, e.g. serial numbers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/76—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in application-specific integrated circuits [ASIC] or field-programmable devices, e.g. field-programmable gate arrays [FPGA] or programmable logic devices [PLD]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/08—Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
- G06Q10/083—Shipping
- G06Q10/0833—Tracking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
- H04B7/14—Relay systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04H—BROADCAST COMMUNICATION
- H04H20/00—Arrangements for broadcast or for distribution combined with broadcast
- H04H20/65—Arrangements characterised by transmission systems for broadcast
- H04H20/71—Wireless systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
- H04L41/0813—Configuration setting characterised by the conditions triggering a change of settings
- H04L41/082—Configuration setting characterised by the conditions triggering a change of settings the condition being updates or upgrades of network functionality
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
- H04L41/084—Configuration by using pre-existing information, e.g. using templates or copying from other elements
- H04L41/0846—Configuration by using pre-existing information, e.g. using templates or copying from other elements based on copy from other elements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/085—Retrieval of network configuration; Tracking network configuration history
- H04L41/0853—Retrieval of network configuration; Tracking network configuration history by actively collecting configuration information or by backing up configuration information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/12—Discovery or management of network topologies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/06—Generation of reports
- H04L43/065—Generation of reports related to network devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
- H04L43/0852—Delays
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
- H04L43/0876—Network utilisation, e.g. volume of load or congestion level
- H04L43/0882—Utilisation of link capacity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/10—Active monitoring, e.g. heartbeat, ping or trace-route
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/02—Topology update or discovery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/10—Flow control; Congestion control
- H04L47/11—Identifying congestion
- H04L47/115—Identifying congestion using a dedicated packet
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/10—Flow control; Congestion control
- H04L47/16—Flow control; Congestion control in connection oriented networks, e.g. frame relay
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L49/00—Packet switching elements
- H04L49/15—Interconnection of switching modules
- H04L49/1553—Interconnection of ATM switching modules, e.g. ATM switching fabrics
- H04L49/1584—Full Mesh, e.g. knockout
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L5/00—Arrangements affording multiple use of the transmission path
- H04L5/003—Arrangements for allocating sub-channels of the transmission path
- H04L5/0053—Allocation of signaling, i.e. of overhead other than pilot signals
- H04L5/0055—Physical resource allocation for ACK/NACK
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1475—Passive attacks, e.g. eavesdropping or listening without modification of the traffic monitored
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1491—Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/18—Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/2866—Architectures; Arrangements
- H04L67/30—Profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/22—Parsing or analysis of headers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0877—Generation of secret information including derivation or calculation of cryptographic keys or passwords using additional device, e.g. trusted platform module [TPM], smartcard, USB or hardware security module [HSM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/50—Secure pairing of devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W16/00—Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
- H04W16/18—Network planning tools
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/06—Testing, supervising or monitoring using simulated traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/029—Location-based management or tracking services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/06—Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/30—Services specially adapted for particular environments, situations or purposes
- H04W4/38—Services specially adapted for particular environments, situations or purposes for collecting sensor information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/70—Services for machine-to-machine communication [M2M] or machine type communication [MTC]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/24—Connectivity information management, e.g. connectivity discovery or connectivity update
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W52/00—Power management, e.g. TPC [Transmission Power Control], power saving or power classes
- H04W52/02—Power saving arrangements
- H04W52/0209—Power saving arrangements in terminal devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W52/00—Power management, e.g. TPC [Transmission Power Control], power saving or power classes
- H04W52/02—Power saving arrangements
- H04W52/0209—Power saving arrangements in terminal devices
- H04W52/0225—Power saving arrangements in terminal devices using monitoring of external events, e.g. the presence of a signal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W52/00—Power management, e.g. TPC [Transmission Power Control], power saving or power classes
- H04W52/02—Power saving arrangements
- H04W52/0209—Power saving arrangements in terminal devices
- H04W52/0251—Power saving arrangements in terminal devices using monitoring of local events, e.g. events related to user activity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W52/00—Power management, e.g. TPC [Transmission Power Control], power saving or power classes
- H04W52/02—Power saving arrangements
- H04W52/0209—Power saving arrangements in terminal devices
- H04W52/0261—Power saving arrangements in terminal devices managing power supply demand, e.g. depending on battery level
- H04W52/0274—Power saving arrangements in terminal devices managing power supply demand, e.g. depending on battery level by switching on or off the equipment or parts thereof
- H04W52/028—Power saving arrangements in terminal devices managing power supply demand, e.g. depending on battery level by switching on or off the equipment or parts thereof switching on or off only a part of the equipment circuit blocks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W52/00—Power management, e.g. TPC [Transmission Power Control], power saving or power classes
- H04W52/04—TPC
- H04W52/38—TPC being performed in particular situations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W64/00—Locating users or terminals or network equipment for network management purposes, e.g. mobility management
- H04W64/003—Locating users or terminals or network equipment for network management purposes, e.g. mobility management locating network equipment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/12—Wireless traffic scheduling
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/20—Control channels or signalling for resource management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/11—Allocation or use of connection identifiers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/14—Direct-mode setup
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/22—Processing or transfer of terminal data, e.g. status or physical capabilities
- H04W8/24—Transfer of terminal data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/22—Processing or transfer of terminal data, e.g. status or physical capabilities
- H04W8/24—Transfer of terminal data
- H04W8/245—Transfer of terminal data from a network towards a terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organising networks, e.g. ad-hoc networks or sensor networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
- H04W88/04—Terminal devices adapted for relaying to or from another terminal or user
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
- H04W88/06—Terminal devices adapted for operation in multiple networks or having at least two operational modes, e.g. multi-mode terminals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W92/00—Interfaces specially adapted for wireless communication networks
- H04W92/02—Inter-networking arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/69—Identity-dependent
- H04W12/77—Graphical identity
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02A—TECHNOLOGIES FOR ADAPTATION TO CLIMATE CHANGE
- Y02A10/00—TECHNOLOGIES FOR ADAPTATION TO CLIMATE CHANGE at coastal zones; at river basins
- Y02A10/40—Controlling or monitoring, e.g. of flood or hurricane; Forecasting, e.g. risk assessment or mapping
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Definitions
- This invention relates to a communication device that is capable of relaying packets in a mesh network.
- the routing tables store routes from one network device to another so that messages can be propagated from source to destination via a series of hops.
- the topology of the network has to be known in order that routes between the various devices can be determined and stored.
- An alternative is flood routing. In this method messages do not travel from one device to another via a predefined route. Instead messages are broadcast and any device in range that receives a message retransmits it. A message thus propagates its way through the network, potentially reaching its destination via a number of different routes.
- Flood routing is very simple to implement and although it may appear inefficient has a number of advantages, particularly for ad hoc networks that may change their topology on a random basis.
- Flood routing implies that all devices should listen continuously for signals from other devices in the network, otherwise there is a risk that data might not reach its destination. Continuous listening increases power consumption, in current mesh networks this is often unimportant because most mesh devices have access to a mains power source, which eliminates the requirement for power saving. It does, however, limit the range of devices that can form part of the network. There is a need to open up mesh networks to a wider range of devices, including those with severe power restrictions.
- a communication device capable of communicating over a communication network that is configured such transport of packets through the network is provided by each communication device in the network listening for and relaying packets, the communication device comprising a relay unit configured to listen for packets and relay them over the network, a detection unit configured to identify other communication devices in the network that are also capable of acting as relay devices and a power controller configured to adjust the power that the communication device uses to listen for packets in dependence on the other devices identified by the detection unit.
- the power controller may be configured adjust the power in dependence on the number of other devices identified by the detection unit.
- the power controller may be configured adjust the power in dependence on receive parameters associated with the other devices identified by the detection unit.
- the receive parameters may include one or more of a listening schedule, a power status and a receive range.
- the power controller may be configured adjust the power in dependence on a mode of operation of a consumer device associated with the communication device.
- the power controller may be configured adjust the power in dependence on whether its associated consumer device is active or non-active with respect to the network.
- the power controller may be configured adjust the power in dependence on information received from the network about the current transport capabilities of the network.
- the power controller may be configured to adjust the power in dependence on a power status associated with the communication device.
- the power controller may be configured to control the rate at which it adjusts the power in dependence on a power status associated with the communication device.
- the detection unit may be configured to identify the other devices using packets that it has been relayed multiple times.
- the detection unit may be configured to identify the other devices using a lifetime value incorporated in packets that have previously been relayed to it over the network.
- the power controller may be configured to control a period of time for which the relay unit listens continuously for packets.
- the power controller may be configured to control the relay unit such that, the higher the number of devices identified by the detection unit, the less time that the relay unit listens for packets.
- the power controller may be configured to adjust the power by controlling a receive range of the communication device.
- the power controller may be configured to adjust the power by controlling the usage of receive circuitry in the communication device.
- the relay unit may be configured to listen to packets asynchronously from other devices in the network.
- a method of communicating over a communication network that is configured such transport of packets through the network is provided by each communication device in the network listening for and relaying packets, the method comprising a communication device identifying other communication devices in the network that are also capable of acting as relay devices and adjusting the power that the communication device uses to listen for packets in dependence on the other devices identified by the detection unit.
- FIG. 1 illustrates a distributed network
- FIG. 2 illustrates a wireless communications device
- FIG. 3 illustrates a distributed lighting system installed in a house
- FIGS. 4 a and 4 b illustrate the transport of a packet through the distributed lighting system
- FIG. 5 illustrates another example of a communication device
- FIG. 6 illustrates an example of a method for controlling the listening windows of a communication device
- FIG. 8 illustrates an example of the listening windows of four communication devices that have reduced the frequency of their listening.
- Packets In a wireless network data is transmitted via radio signals. In a wired implementation, data may be transmitted via electrical signals. Most commonly data will be arranged in “packets” incorporating payload data and some indication of the source device and the destination device. Packets take many different formats and the apparatus, network and method described herein are not limited to using a particular type of packet. The term “packet” is therefore used herein to denote any signal, data or message transmitted over the network.
- the first is the cost in power.
- the second is the physical impossibility for many devices of receiving at the same time as transmitting.
- the third is the need to perform other functions outside of the network, which may not be possible while listening for packets.
- the challenge in a mesh network is to reconcile these drawbacks with each node's responsibility to relay data for the network.
- the communication device is capable of acting as a relay device in a mesh network.
- the communication device will be configured for wireless communication over the mesh network, although wired configurations are also possible. It comprises a relay unit 201 , a detection unit 202 and a power controller 203 .
- the relay unit may be configured to listen for packets. Typically those packets will be intended for one or more other devices in the network. The data content of the packets is thus immaterial to the communication device; its role is just to relay those packets by retransmitting them.
- the relay unit preferably either has access to a communication unit or incorporates a communication unit (not shown) so that it sees packets that have been received by the communication unit and can control those packets being retransmitted by the device.
- the detection unit may be configured to identify other devices in the network that are also acting as relay devices. There are a number of ways it might achieve this, and some examples are described below.
- the power controller may be configured to control the amount of power that the communication device uses to listen for packets to relay. Suitably the power controller controls the receive power in dependence on the other relay devices that are identified by the detection unit.
- the power controller may incorporate a timing unit 204 that is configured to adjust a time that the relay unit spends listening for packets.
- the higher the number of relay devices detected within radio range of the communication device the less power it will use on average listening for packets. This may be achieved by reducing the length of the windows for which the communication device listens and/or by increasing the interval between windows.
- the communication device might alter the duty cycle of its receive operations in dependence on the number of other devices it detects within radio range.
- the communication device might reduce the power consumed by a listening operation, e.g. by reducing its reception range.
- the communication device detects a decrease in the number of other relay devices within range in the network, it suitably increases the amount of power it spends listening to packets to compensate.
- the overall effect is that a communication device with a local mesh density that is relatively high, e.g. because it is in the middle of a network with many other devices within range, will tend to use less receive power than a communication device with a local mesh density that is relatively low, e.g. because it is on the edge of a network with few other devices within range.
- Time that a communication device saves by not listening for packets may be spent performing other functions or in a low power mode to conserve battery life. Any gaps between the device's listening windows are suitably filled by the other devices within radio range so that the performance of the network as a whole does not suffer. In fact, the performance of the network may improve as a consequence of fewer devices relaying the same packet. Communication devices within range of each other may coordinate their listening periods so at least one of them is listening at all times. An alternative is for the devices to be asynchronous so that largely continuous listening is achieved naturally due to random offsets between the device's own listening periods.
- FIG. 2 is intended to correspond to a number of functional blocks in an apparatus. This is for illustrative purposes only.
- FIG. 2 is not intended to define a strict division between different parts of hardware on a chip or between different programs, procedures or functions in software.
- some or all of the algorithms described herein may be performed wholly or partly in hardware.
- at least part of the relay unit, sense unit and timing unit may be implemented by a processor acting under software control (e.g. the CPU of a communication device). Any such software is preferably stored on a non-transient computer readable medium, such as a memory (RAM, cache, hard disk, etc.) or other storage means (USB stick, CD, disk, etc.).
- FIG. 3 represents a house having a distributed lighting system.
- the system comprises a light switch unit 301 and light fittings 302 , 303 , 304 , 305 .
- Light switch unit 301 is integrated with a wireless communication device 312 .
- Light fittings 302 to 305 are integrated with respective wireless communication devices 306 , 307 , 308 , 309 .
- the house has a mains electrical supply which powers the light fittings and their respective wireless communication devices 306 to 309 .
- Light switch unit 301 and its wireless communication device 312 are powered by a local battery 311 .
- the house contains other items of equipment that contain other wireless communication devices.
- a tablet computer 310 which contains a wireless communication device 313
- a mobile phone 315 which contains a wireless communication device 316 .
- a sensor 320 for detecting the open/closed state of window 318 , which contains communication device 319 .
- Computer 310 , phone 315 and sensor 320 are powered by batteries 314 , 317 and 321 respectively.
- Wireless communication devices 306 to 309 , 312 , 313 , 316 and 319 operate according to the same wireless communication protocol. That could be a relatively short-range protocol. For example the effective range of each device could be less than 35 m. That characteristic can permit the devices to use less power for transmitting and/or receiving than would be expected in a longer range protocol.
- the protocol could be one that imposes no common time-base at or below the transport level, or below the application or presentation levels. In other words, the devices in the network operate asynchronously of each other. That characteristic can reduce the devices' power consumption by reducing their for need accurate clocks running continuously.
- the devices could operate according to the Bluetooth protocol, specifically the Bluetooth Low Energy (BLE) protocol.
- BLE Bluetooth Low Energy
- the devices could use other protocols, for instance IEEE 803.11.
- Devices 306 to 309 are configured cooperatively in order that the light fittings 302 to 305 know to respond to signals from the light switch 301 . This may be done by the devices 306 to 309 storing a common identification code in their respective non-volatile memories.
- the identification code may be stored in the light switch when it is manufactured, and stored in the light fittings at the time they are installed in the house. They may be stored in the light fittings by means of another device such as mobile phone 315 communicating with the wireless device of the light switch to read its identification code, and then communicating with the wireless devices of the light fittings to cause them to store that same identification code.
- This code may be a network key, and it may be used to sign all packets sent over the network.
- the network is preferably also configured to implement flood routing, which is well suited to ad hoc networks.
- the phone 315 and the tablet computer 310 are both portable devices that change location within the network as a user picks them up and moves them. They may also occasionally leave the network and then reappear some time later. For example, when a user takes them out of range of the network by taking them out of the house and later returns them to the house.
- the network's topology is thus subject to random alteration.
- each packet suitably includes a lifetime field that defines the lifetime of the packet within the network.
- a communication device that receives the packet suitably checks whether the lifetime field is equal to a threshold value before retransmitting the packet. If the lifetime value is equal to the threshold, the communication device does not retransmit the packet. Otherwise the communication device does retransmit the packet.
- the lifetime field is a Time-To-Live (TTL) field. This is a value in the packet that is suitably decremented each time that the packet is retransmitted.
- TTL Time-To-Live
- the TTL value is decremented by one at each retransmission, with each communication device that receives the packets retransmitting it until the TTL value is decremented to zero.
- the lifetime field is a Max Hop Count (MHC) field.
- MHC Max Hop Count
- each communication device stores a threshold MHC value, which is a positive, non-zero number. The MHC value in each packet may be incremented by one each time that the packet is retransmitted, with each communication device that receives the packets retransmitting it until the MHC value reaches the device's stored MHC threshold.
- the communication devices in FIG. 3 are all connected to or fully integrated with another device—a “consumer”—on behalf of which the communication device transmits and receives packets over the network.
- a consumer on behalf of which the communication device transmits and receives packets over the network.
- Consumer devices have varying levels of complexity.
- a consumer device might be a tablet computer; in another it might just be a clock configured to count down to an expiry date of some perishable goods.
- the communication device it also possible for the communication device to be a consumer itself.
- An example of such a scenario might be when a communication device uses X10, which is a protocol designed to support the integration of electronic devices within the home.
- a connection between the communication device and its associated consumer may be wired or wireless.
- the communication device may be contained within the same housing as the consumer. In many implementations the communication device might be fully integrated with the consumer; they might even share circuitry. Often the communication device will be implemented by a chip within the consumer. An example of this is communication device 316 within phone 315 . In other implementations the communication device and the consumer may be separate devices that are connected together. For example, the communication device might be a BLE tag connected to a PC.
- the communication device is considered to be the combination of hardware and/or software that implements the protocol governing the network, thereby implementing the packet transport that enables the consumer to communicate over the network.
- Each communication device may be capable of acting as a relay in the network.
- An example of this is shown in FIG. 4 a, which shows the same distributed lighting system as FIG. 3 , where like reference numerals refer to like parts.
- the network is configured as a mesh network so, at least in theory, all devices that are part of the network have a responsibility to act as relays.
- a relay device suitably retransmits any packet that it recognises as having originated from the network (e.g. because it has been signed using a network key).
- the relay device might also take steps to prevent old packets from being continuously bounced around the network, e.g. by only forwarding the packet if it is new and/or by decrementing a “time-to-live” value in the packet before forwarding it on.
- FIG. 4 a shows the same distributed lighting system as FIG. 3 , where like reference numerals refer to like parts.
- the network is configured as a mesh network so, at least in theory, all devices that are part of the network have
- Light switch 301 transmits a packet addressed to all of devices 306 to 309 instructing light fittings 302 to 305 to switch on. This packet is propagated by all devices that receive it, eventually reaching light fitting 305 , which is out of range of light switch 301 , the source of the packet.
- both device 316 and device 319 are capable as acting as relays, they are both battery powered and would prefer to reduce power consumption where possible. Therefore, one or both of those devices may deliberately reduce their receive power.
- FIG. 4 b which shows the an embodiment of distributed lighting system of FIG. 3 , where like reference numerals refer to like parts
- device 319 has detected that devices 306 , 316 and 309 are all within range and are all capable of acting as relays.
- Device 319 is battery powered and is running low on power. It has therefore shortened its listening periods so that it only listens for 10% of the time. The network is unaffected, however, as the packet from light switch 301 is still relayed by device 316 .
- the alternative arrangement is also possible, with device 319 listening and relaying packets instead of device 316 .
- FIG. 5 Another example of a communication device is shown in FIG. 5 .
- the communication device is configured for wireless communication.
- the device of FIG. 5 comprises an antenna 501 , a radio frequency front end 502 and a baseband processor 503 .
- the baseband processor comprises a microprocessor 504 and a non-volatile memory 509 .
- the non-volatile memory 509 stores in non-transitory form program code that is executable by the microprocessor to cause the baseband processor to implement the communication protocol of the network.
- the non-volatile memory 509 stores in non-transitory form program code that is executable by the microprocessor to implement the relay unit 506 , the detection unit 507 , and the power control unit 508 .
- the device also comprises a clock 510 , which can be turned on or off by the microprocessor 504 in order to save power, and an external wired connection 512 for exchanging information with the device's associated consumer. This information may include the sensing external events (e.g. the operation of an associated user interface device such as a switch) or issuing control signals to associated appliances (e.g. light fittings).
- the device also comprises a power source 511 , which may be a battery. The device may also be mains-powered.
- the RF front end 502 and the baseband processor could be implemented on one or more integrated circuits.
- a communication device may take a wide range of different factors into account when deciding whether (and how) to adjust its listening operations to conserve power. Examples of the steps this might involve are shown in FIG. 6 .
- the communication device may determine the number of communication devices within range that are capable of acting as relays. This may be termed the “local mesh density”. There are a number of ways the communication device might do this. Some examples are described below.
- the communication device suitably stores a record of packets it has received previously.
- the communication device may be configured to derive information about its local mesh density based on this record. For example, if the communication device has received the same packet multiple times, this may indicate that there are multiple devices acting as relays within range. Similarly, if those multiple copies of the same packet have similar values in their lifetime fields, this may tend to indicate that there are multiple relay-capable devices close to the communication device. If the communication device receives the same packet with very different lifetime value fields, this may be less indicative of a local mesh density but may indicate a good level of relay capability in the network as a whole.
- the communication device may send probe packets to see how many copies of that packet it receives back from the network.
- the communication take steps to prevent probe packets from wasting resources by bouncing around the network.
- the probe packets are retransmitted only once. This may be achieved by the communication device setting the lifetime value of the probe packet to an appropriate value, e.g. by setting the TTL value to one. This has the further advantage of providing the communication device with local information about device density, since any copy of the probe packet it receives back must necessarily have been relayed by a device within radio range.
- the communication device may incorporate a flag or similar in the probe packet that causes any device that receives it not only to retransmit the packet but also to include its own receive parameters, such as receive capabilities, receive range, power status, listening schedule etc. in the retransmitted packet.
- the communication device may be configured to operate over the network in accordance with a protocol that includes protocol, transport and bearer layers. Probe packets may be injected directly into the bearer layer, thus bypassing the protocol and transport layer.
- the protocol may define a host stack and a host controller stack. Bluetooth is an example of such an arrangement. BLE in particular places a significant amount of intelligence in the host controller so that the host only needs to be woken up when it needs to perform some action (the host is assumed to consume more energy than the host controller). In fact, in some implementations a communication device may not have a separate host at all, with the host controller (which is mostly implemented in software) performing all tasks that are usually associated with the host.
- probe packets may be normal broadcast packets, e.g. broadcast packets according to the protocol that underlies the network (such as BLE). These normal broadcast packets may be different from the mesh packets that are normally transmitted over the network (for a start, they may not be signed by the network key), but they will still be monitored by all devices in the network. This also renders it possible for a device outside the mesh network to inject probe packets into the network. For example, a probing node, whose only purpose is to periodically broadcast data, might be outside of the mesh network itself but still inject probe packets into the mesh network.
- the communication device may also be configured to more directly obtain information about neighbouring devices that are acting as relays. For example, the device may send packets requesting that any device that receives it responds with details about its own receive capabilities. This may include information such as power status, listening schedule, receive and/or transmit range, active status etc. These packets may be broadcast with a lifetime value that prevents them from being retransmitted. For example, the packets could be transmitted with a TTL value of zero.
- the communication device may also be configured, together with other devices in the network, to implement a more general feedback program in which they exchange information about receive strategies/capabilities so that the devices can coordinate their listening operations. Request and probe packets may form part of such a feedback program.
- the communication device may be in a position to adjust its receive power accordingly. There are other factors that the communication device may also take into account, examples of which are represented by optional steps 602 to 605 .
- step 602 the communication device determines whether it or its associated consumer are “active” or “non-active” with respect to the network. In some embodiments this step may be performed before the communication device detects other devices in the network, since some devices may be configured not to reduce their receive power at all unless their associated consumer is non-active.
- a device may considered to be “active” if it is waiting to receive a packet from the network that will cause it to adapt its behaviour. This “waiting” does not require the device to be positively anticipating a packet; it just refers to a state in which the consumer is configured to listen for a packet that might cause it to perform some operation (no matter how insignificant that operation might be).
- the communication device may include a mode unit configured to determine whether its associated consumer is “active” or “non-active”. It may make this determination based on information received from the consumer, e.g. a code or setting received at switch-on identifying the type of device that the consumer is and/or a status update each time that the consumer changes from active to non-active and vice versa.
- mesh device may be used to refer to a communication device together with its associated consumer.
- a mesh device may fall into one of two categories:
- An MAD is typically constrained in its scheduling as it is important for the effective realisation of its function that it receives all commands addressed to it. This implies that an MAD has to spend significant amount of time listening for potential commands. It is generally not advisable to attempt to reduce this listening time. Practically, this is a moot point as the MAD will usually be associated with some actuator, which implies access to an inexhaustible or rechargeable power source and thus removes the requirement for power saving.
- An MPT is essentially stateless nature with respect to the transmitted packets. It does not affect the behaviour of an individual MPT if it has not observed a particular packet. This makes it possible for an MPT to have shorter and/or less frequent listening “windows” if there are sufficient other MPTs in the system to compensate.
- a mesh device might be an MPT if its consumer component falls into any one of the following categories:
- a communication device preferably listens for the maximum time available if it falls into the MAD category. Otherwise it risks missing packets that it actually needs to receive. A communication device may, however, safely reduce its listening time if it falls into the MPT category.
- the communication device may check whether it has received any take information or commands from the network that it should take into account when determining its receive power. For example, it can be envisaged that in some situations there might be an insufficient density of devices for all non-active devices to substantially reduce their listening time. Therefore, if one device (e.g. a controller) determines that packets are taking too long to reach their destination or are being regularly dropped, it may send out an instruction for all devices to increase their listening time accordingly. The device that sent the instruction might have determined that the network transport is not performing well enough based on the number of acknowledgments that it is receiving to its own packets and/or the length of time that those acknowledgements are taking to reach it.
- a controller determines that packets are taking too long to reach their destination or are being regularly dropped
- the communication device may consider its own power status when deciding how to control its receive power (step 604 ). This factor may be particularly relevant when it comes to deciding whether or not to accede to a request from the network. For example, whether it has access to mains power or not and, it is battery powered, the amount of power the battery has left. If the device is battery powered with little power remaining, it may decide to continue minimising its receive power as much as possible notwithstanding the instruction from the network.
- the communication device might also take into account any information it has about neighbouring devices that are capable of acting as relays (step 605 ). In particular it may compare any information it may have about a neighbouring device's power supply with its own power situation. For example, if the communication device knows from a previous exchange of status information with its neighbouring devices that one or more of them is mains powered, while the device itself is battery powered, it may determine that the neighbouring mains powered device is far better placed to carry the burden of listening for packets and maintain its own power-saving approach accordingly. The communication device may also consider any information it has about the receive arrangements of neighbouring devices, and particularly their listening schedules.
- the communication device may control its receive power.
- a communication device for controlling its receive power There are a number of different options available to a communication device for controlling its receive power, including the following examples:
- a communication device may make any adjustments slowly, particularly if it is reducing its receive power, to allow other devices in the network time to adjust their own receive power to compensate.
- the communication device may control the speed at which the communication device ramps its receive power up or down in dependence on a variety of different factors, including a power level of the communication device, one or more receive parameters of its neighbouring devices, the time of day (some devices may have a schedule in which they do not listen at certain times of day), etc.
- the principles described herein enable a network to transfer packets via a stochastic transport mechanism.
- This technique is well suited to ad hoc networks.
- the network is able to achieve reliable transport between two arbitrary devices via intermediary devices, which are not expected to handle communications reliably, because there is a sufficient density of devices in the network to compensate for devices that have reduced their receive power. Relaxing the constraint on the reliability of an individual device permits better power management, opening up the network to a wider range of devices.
- the mechanism is self-administering, in that each device makes its own decisions about how to adjust its receive power, but is still able to achieve network-wide reliability.
- FIGS. 7 a, 7 b and FIG. 8 An example of how devices can compensate for one another is illustrated in FIGS. 7 a, 7 b and FIG. 8 .
- FIG. 7 a and 7 b An example of a device listening as much as it can is illustrated in FIG. 7 a and 7 b for a mesh network that communicates using the three advertising channels specified by the BLE protocol.
- the MPT scans successively on BLE advertising channels 37 , 38 , and 39 until it receives some new information.
- FIGS. 7 a and 7 b show one transmission over the network.
- a packet may also be relayed by retransmitting it multiple times over each of the relevant channels. Gaps between transitions from channel to channel are significantly shorter than the receive durations.
- Gaps between channels or between transmission groups may consist of a random element added to a fixed (minimum) duration to increase non-synchronisation with other beacons. The listening process is repeated until data is detected.
- the receive operation is stopped for an immediate forwarding of the packet on all three channels. If the mesh packet is not for relaying, reception continues for its expected duration.
- the standard schedule realigned to what it would have been if it had not been interrupted. Resuming the same schedule may be important to avoid devices accidentally synchronising after a relay operation.
- FIG. 6 b a similar operation is followed but the device additionally performs a non-mesh transmit for additional function delivery. This non-mesh transmit and the relay transmit represent times when it is impossible for most current devices to listen. Thus, while the device tries to listen continuously, in practice this is not realisable so the device simply listens for the maximum time possible.
- FIG. 8 shows the listening windows of four different MPTs.
- devices 801 , 802 , 803 and 804 have all reduced their listening windows.
- the overall effect on transport in the network is negligible, however, since the times when one device is not listening are filled by another device.
- Receive windows for individual devices are reduced, and compensated by the density of devices in the mesh.
Abstract
Description
- This invention relates to a communication device that is capable of relaying packets in a mesh network.
-
FIG. 1 shows a distributed network. The network comprises a number ofcommunication devices device 101 transmits a signal, that signal can be received bydevices device 101.Devices device 101 so that it can be received bydevice 105, which is out of range ofdevice 101. The coverage area ofdevice 101 is illustrated at 108 and the coverage area ofdevice 105 is illustrated at 109. This method of communication allows devices to communicate even though they are out of direct range or not synchronised with each other. Each device may also be connected to, or integrated within, an associated consumer device. Sodevice 101 is connected to a sensor that detects whetherwindow 102 is open or closed, anddevices light fittings - Many mesh networks send data using complex routing tables. The routing tables store routes from one network device to another so that messages can be propagated from source to destination via a series of hops. The topology of the network has to be known in order that routes between the various devices can be determined and stored. An alternative is flood routing. In this method messages do not travel from one device to another via a predefined route. Instead messages are broadcast and any device in range that receives a message retransmits it. A message thus propagates its way through the network, potentially reaching its destination via a number of different routes. Flood routing is very simple to implement and although it may appear inefficient has a number of advantages, particularly for ad hoc networks that may change their topology on a random basis.
- Flood routing implies that all devices should listen continuously for signals from other devices in the network, otherwise there is a risk that data might not reach its destination. Continuous listening increases power consumption, in current mesh networks this is often unimportant because most mesh devices have access to a mains power source, which eliminates the requirement for power saving. It does, however, limit the range of devices that can form part of the network. There is a need to open up mesh networks to a wider range of devices, including those with severe power restrictions.
- According to one embodiment, there is provided a communication device capable of communicating over a communication network that is configured such transport of packets through the network is provided by each communication device in the network listening for and relaying packets, the communication device comprising a relay unit configured to listen for packets and relay them over the network, a detection unit configured to identify other communication devices in the network that are also capable of acting as relay devices and a power controller configured to adjust the power that the communication device uses to listen for packets in dependence on the other devices identified by the detection unit.
- The power controller may be configured adjust the power in dependence on the number of other devices identified by the detection unit.
- The power controller may be configured adjust the power in dependence on receive parameters associated with the other devices identified by the detection unit.
- The receive parameters may include one or more of a listening schedule, a power status and a receive range.
- The power controller may be configured adjust the power in dependence on a mode of operation of a consumer device associated with the communication device.
- The power controller may be configured adjust the power in dependence on whether its associated consumer device is active or non-active with respect to the network.
- The power controller may be configured adjust the power in dependence on information received from the network about the current transport capabilities of the network.
- The power controller may be configured to adjust the power in dependence on a power status associated with the communication device.
- The power controller may be configured to control the rate at which it adjusts the power in dependence on a power status associated with the communication device.
- The detection unit may be configured to identify the other devices using packets that have previously been relayed to it over the network.
- The detection unit may be configured to identify the other devices using packets that it has been relayed multiple times.
- The detection unit may be configured to identify the other devices using a lifetime value incorporated in packets that have previously been relayed to it over the network.
- The power controller may be configured to adjust the power by controlling the amount of time that the relay unit listens for packets.
- The power controller may be configured to control a period of time for which the relay unit listens continuously for packets.
- The power controller may be configured to control a time interval between periods of time for which the relay unit listens continuously for packets.
- The power controller may be configured to control the relay unit such that, the higher the number of devices identified by the detection unit, the less time that the relay unit listens for packets.
- The power controller may be configured to adjust the power by controlling a receive range of the communication device.
- The power controller may be configured to adjust the power by controlling the usage of receive circuitry in the communication device.
- The relay unit may be configured to listen to packets asynchronously from other devices in the network.
- According to a second embodiment, there is provided a method of communicating over a communication network that is configured such transport of packets through the network is provided by each communication device in the network listening for and relaying packets, the method comprising a communication device identifying other communication devices in the network that are also capable of acting as relay devices and adjusting the power that the communication device uses to listen for packets in dependence on the other devices identified by the detection unit.
- The present invention will now be described by way of example with reference to the accompanying drawings. In the drawings:
-
FIG. 1 illustrates a distributed network; -
FIG. 2 illustrates a wireless communications device; -
FIG. 3 illustrates a distributed lighting system installed in a house; -
FIGS. 4 a and 4 b illustrate the transport of a packet through the distributed lighting system; -
FIG. 5 illustrates another example of a communication device; -
FIG. 6 illustrates an example of a method for controlling the listening windows of a communication device; -
FIGS. 7 a and 7 b illustrate an example of a communication device listening for packets for the maximum time available; and -
FIG. 8 illustrates an example of the listening windows of four communication devices that have reduced the frequency of their listening. - In a wireless network data is transmitted via radio signals. In a wired implementation, data may be transmitted via electrical signals. Most commonly data will be arranged in “packets” incorporating payload data and some indication of the source device and the destination device. Packets take many different formats and the apparatus, network and method described herein are not limited to using a particular type of packet. The term “packet” is therefore used herein to denote any signal, data or message transmitted over the network.
- There are three main reasons why it may be impractical for a communication device to spend significant amount of time listening for packets. The first is the cost in power. The second is the physical impossibility for many devices of receiving at the same time as transmitting. The third is the need to perform other functions outside of the network, which may not be possible while listening for packets. The challenge in a mesh network is to reconcile these drawbacks with each node's responsibility to relay data for the network.
- For many nodes in a mesh network it is simply impossible to listen for packets all the time. This is because the communication devices that implement those nodes are incapable of listening at the same time as they transmit. So, packets that arrive while the device is transmitting are inevitably lost. Thus it is more realistic to aim at maximising the number of packets received by a device than to aim at having every device receive all packets.
- This leads to two further insights. First, it is often the case that a device acting as a relay in a mesh network does not actually need to receive all packets because its role is only to relay those packets, not to alter its behaviour in dependence on the data that those packets contain. Consequently, not only is it technically impossible for a single device to listen continuously, it is also (at least from the perspective of that particular device) often unnecessary. Second, from the perspective of the network it does not matter which particular device relays each packet; it only matters that the packet is relayed. Thus it may be possible to have one relay device reduce its receive power, for example by reducing its range or deliberately not listening for packets at all, on the basis that any gaps in its listening will be covered by other devices in the vicinity. It becomes possible to trade listening power against the number of relay devices. For example, one device listening for N seconds can be traded against two or more devices listening for K seconds, with K<N.
- A general example of a communication device is shown in
FIG. 2 . The communication device is capable of acting as a relay device in a mesh network. In most examples the communication device will be configured for wireless communication over the mesh network, although wired configurations are also possible. It comprises arelay unit 201, adetection unit 202 and apower controller 203. The relay unit may be configured to listen for packets. Typically those packets will be intended for one or more other devices in the network. The data content of the packets is thus immaterial to the communication device; its role is just to relay those packets by retransmitting them. The relay unit preferably either has access to a communication unit or incorporates a communication unit (not shown) so that it sees packets that have been received by the communication unit and can control those packets being retransmitted by the device. The detection unit may be configured to identify other devices in the network that are also acting as relay devices. There are a number of ways it might achieve this, and some examples are described below. The power controller may be configured to control the amount of power that the communication device uses to listen for packets to relay. Suitably the power controller controls the receive power in dependence on the other relay devices that are identified by the detection unit. The power controller may incorporate atiming unit 204 that is configured to adjust a time that the relay unit spends listening for packets. - Typically the higher the number of relay devices detected within radio range of the communication device, the less power it will use on average listening for packets. This may be achieved by reducing the length of the windows for which the communication device listens and/or by increasing the interval between windows. The communication device might alter the duty cycle of its receive operations in dependence on the number of other devices it detects within radio range. The communication device might reduce the power consumed by a listening operation, e.g. by reducing its reception range. Conversely if the communication device detects a decrease in the number of other relay devices within range in the network, it suitably increases the amount of power it spends listening to packets to compensate. The overall effect is that a communication device with a local mesh density that is relatively high, e.g. because it is in the middle of a network with many other devices within range, will tend to use less receive power than a communication device with a local mesh density that is relatively low, e.g. because it is on the edge of a network with few other devices within range.
- Time that a communication device saves by not listening for packets may be spent performing other functions or in a low power mode to conserve battery life. Any gaps between the device's listening windows are suitably filled by the other devices within radio range so that the performance of the network as a whole does not suffer. In fact, the performance of the network may improve as a consequence of fewer devices relaying the same packet. Communication devices within range of each other may coordinate their listening periods so at least one of them is listening at all times. An alternative is for the devices to be asynchronous so that largely continuous listening is achieved naturally due to random offsets between the device's own listening periods.
- One advantage of this approach is that it enables battery-powered relay devices become possible, whereas previously only mains-powered relay devices could realistically be considered. This is a significant step in permitting flexible mesh deployment and ad-hoc arrangements. It also enables any device configured to operate in accordance with the mesh protocol to form part of the mesh whilst still allowing other “primary” (i.e. non-mesh) functions to be performed.
- The structures shown in
FIG. 2 (and indeed all block apparatus diagrams included herein) are intended to correspond to a number of functional blocks in an apparatus. This is for illustrative purposes only.FIG. 2 is not intended to define a strict division between different parts of hardware on a chip or between different programs, procedures or functions in software. In some embodiments, some or all of the algorithms described herein may be performed wholly or partly in hardware. In many implementations, at least part of the relay unit, sense unit and timing unit may be implemented by a processor acting under software control (e.g. the CPU of a communication device). Any such software is preferably stored on a non-transient computer readable medium, such as a memory (RAM, cache, hard disk, etc.) or other storage means (USB stick, CD, disk, etc.). - An example of a network is shown in
FIG. 3 , which represents a house having a distributed lighting system. The system comprises alight switch unit 301 andlight fittings Light switch unit 301 is integrated with awireless communication device 312.Light fittings 302 to 305 are integrated with respectivewireless communication devices wireless communication devices 306 to 309.Light switch unit 301 and itswireless communication device 312 are powered by alocal battery 311. - The house contains other items of equipment that contain other wireless communication devices. For example, there is a
tablet computer 310 which contains awireless communication device 313, and amobile phone 315 which contains awireless communication device 316. There is also asensor 320 for detecting the open/closed state ofwindow 318, which containscommunication device 319.Computer 310,phone 315 andsensor 320 are powered bybatteries -
Wireless communication devices 306 to 309, 312, 313, 316 and 319 operate according to the same wireless communication protocol. That could be a relatively short-range protocol. For example the effective range of each device could be less than 35 m. That characteristic can permit the devices to use less power for transmitting and/or receiving than would be expected in a longer range protocol. The protocol could be one that imposes no common time-base at or below the transport level, or below the application or presentation levels. In other words, the devices in the network operate asynchronously of each other. That characteristic can reduce the devices' power consumption by reducing their for need accurate clocks running continuously. In one example, the devices could operate according to the Bluetooth protocol, specifically the Bluetooth Low Energy (BLE) protocol. The devices could use other protocols, for instance IEEE 803.11. -
Devices 306 to 309 are configured cooperatively in order that thelight fittings 302 to 305 know to respond to signals from thelight switch 301. This may be done by thedevices 306 to 309 storing a common identification code in their respective non-volatile memories. The identification code may be stored in the light switch when it is manufactured, and stored in the light fittings at the time they are installed in the house. They may be stored in the light fittings by means of another device such asmobile phone 315 communicating with the wireless device of the light switch to read its identification code, and then communicating with the wireless devices of the light fittings to cause them to store that same identification code. This code may be a network key, and it may be used to sign all packets sent over the network. - The network is preferably also configured to implement flood routing, which is well suited to ad hoc networks. The
phone 315 and thetablet computer 310 are both portable devices that change location within the network as a user picks them up and moves them. They may also occasionally leave the network and then reappear some time later. For example, when a user takes them out of range of the network by taking them out of the house and later returns them to the house. The network's topology is thus subject to random alteration. - In order to avoid packets being bounced around the network indefinitely, each packet suitably includes a lifetime field that defines the lifetime of the packet within the network. A communication device that receives the packet suitably checks whether the lifetime field is equal to a threshold value before retransmitting the packet. If the lifetime value is equal to the threshold, the communication device does not retransmit the packet. Otherwise the communication device does retransmit the packet. In one example the lifetime field is a Time-To-Live (TTL) field. This is a value in the packet that is suitably decremented each time that the packet is retransmitted. In one example the TTL value is decremented by one at each retransmission, with each communication device that receives the packets retransmitting it until the TTL value is decremented to zero. In another example the lifetime field is a Max Hop Count (MHC) field. In this example each communication device stores a threshold MHC value, which is a positive, non-zero number. The MHC value in each packet may be incremented by one each time that the packet is retransmitted, with each communication device that receives the packets retransmitting it until the MHC value reaches the device's stored MHC threshold.
- The communication devices in
FIG. 3 are all connected to or fully integrated with another device—a “consumer”—on behalf of which the communication device transmits and receives packets over the network. In many cases the primary function of the consumer may have nothing to do with the network. Consumer devices have varying levels of complexity. In one example a consumer device might be a tablet computer; in another it might just be a clock configured to count down to an expiry date of some perishable goods. It also possible for the communication device to be a consumer itself. An example of such a scenario might be when a communication device uses X10, which is a protocol designed to support the integration of electronic devices within the home. - A connection between the communication device and its associated consumer may be wired or wireless. The communication device may be contained within the same housing as the consumer. In many implementations the communication device might be fully integrated with the consumer; they might even share circuitry. Often the communication device will be implemented by a chip within the consumer. An example of this is
communication device 316 withinphone 315. In other implementations the communication device and the consumer may be separate devices that are connected together. For example, the communication device might be a BLE tag connected to a PC. - For the purposes of this document, the communication device is considered to be the combination of hardware and/or software that implements the protocol governing the network, thereby implementing the packet transport that enables the consumer to communicate over the network.
- Each communication device may be capable of acting as a relay in the network. An example of this is shown in
FIG. 4 a, which shows the same distributed lighting system asFIG. 3 , where like reference numerals refer to like parts. The network is configured as a mesh network so, at least in theory, all devices that are part of the network have a responsibility to act as relays. A relay device suitably retransmits any packet that it recognises as having originated from the network (e.g. because it has been signed using a network key). The relay device might also take steps to prevent old packets from being continuously bounced around the network, e.g. by only forwarding the packet if it is new and/or by decrementing a “time-to-live” value in the packet before forwarding it on.FIG. 3 a shows an example of the network operating according to traditional mesh principles.Light switch 301 transmits a packet addressed to all ofdevices 306 to 309 instructinglight fittings 302 to 305 to switch on. This packet is propagated by all devices that receive it, eventually reachinglight fitting 305, which is out of range oflight switch 301, the source of the packet. - Although the arrangement shown in
FIG. 3 a is effective at propagating packets to all devices in the network, constant listening is an expensive operation and should preferably be avoided in contexts where power availability is an issue. Although bothdevice 316 anddevice 319 are capable as acting as relays, they are both battery powered and would prefer to reduce power consumption where possible. Therefore, one or both of those devices may deliberately reduce their receive power. - In
FIG. 4 b, which shows the an embodiment of distributed lighting system ofFIG. 3 , where like reference numerals refer to like parts,device 319 has detected thatdevices Device 319 is battery powered and is running low on power. It has therefore shortened its listening periods so that it only listens for 10% of the time. The network is unaffected, however, as the packet fromlight switch 301 is still relayed bydevice 316. The alternative arrangement is also possible, withdevice 319 listening and relaying packets instead ofdevice 316. - Another example of a communication device is shown in
FIG. 5 . In this example the communication device is configured for wireless communication. The device ofFIG. 5 comprises anantenna 501, a radio frequencyfront end 502 and abaseband processor 503. The baseband processor comprises amicroprocessor 504 and anon-volatile memory 509. Thenon-volatile memory 509 stores in non-transitory form program code that is executable by the microprocessor to cause the baseband processor to implement the communication protocol of the network. In this example thenon-volatile memory 509 stores in non-transitory form program code that is executable by the microprocessor to implement therelay unit 506, thedetection unit 507, and thepower control unit 508. - The device also comprises a
clock 510, which can be turned on or off by themicroprocessor 504 in order to save power, and an externalwired connection 512 for exchanging information with the device's associated consumer. This information may include the sensing external events (e.g. the operation of an associated user interface device such as a switch) or issuing control signals to associated appliances (e.g. light fittings). The device also comprises apower source 511, which may be a battery. The device may also be mains-powered. - The RF
front end 502 and the baseband processor could be implemented on one or more integrated circuits. - A communication device may take a wide range of different factors into account when deciding whether (and how) to adjust its listening operations to conserve power. Examples of the steps this might involve are shown in
FIG. 6 . - In
step 601 the communication device may determine the number of communication devices within range that are capable of acting as relays. This may be termed the “local mesh density”. There are a number of ways the communication device might do this. Some examples are described below. - The communication device suitably stores a record of packets it has received previously. The communication device may be configured to derive information about its local mesh density based on this record. For example, if the communication device has received the same packet multiple times, this may indicate that there are multiple devices acting as relays within range. Similarly, if those multiple copies of the same packet have similar values in their lifetime fields, this may tend to indicate that there are multiple relay-capable devices close to the communication device. If the communication device receives the same packet with very different lifetime value fields, this may be less indicative of a local mesh density but may indicate a good level of relay capability in the network as a whole.
- The communication device may send probe packets to see how many copies of that packet it receives back from the network. Preferably the communication take steps to prevent probe packets from wasting resources by bouncing around the network. Preferably the probe packets are retransmitted only once. This may be achieved by the communication device setting the lifetime value of the probe packet to an appropriate value, e.g. by setting the TTL value to one. This has the further advantage of providing the communication device with local information about device density, since any copy of the probe packet it receives back must necessarily have been relayed by a device within radio range. In one example the communication device may incorporate a flag or similar in the probe packet that causes any device that receives it not only to retransmit the packet but also to include its own receive parameters, such as receive capabilities, receive range, power status, listening schedule etc. in the retransmitted packet.
- In another example the communication device may be configured to operate over the network in accordance with a protocol that includes protocol, transport and bearer layers. Probe packets may be injected directly into the bearer layer, thus bypassing the protocol and transport layer. The protocol may define a host stack and a host controller stack. Bluetooth is an example of such an arrangement. BLE in particular places a significant amount of intelligence in the host controller so that the host only needs to be woken up when it needs to perform some action (the host is assumed to consume more energy than the host controller). In fact, in some implementations a communication device may not have a separate host at all, with the host controller (which is mostly implemented in software) performing all tasks that are usually associated with the host. It may be the host controller that injects the probe packet into the bearer layer In one example probe packets may be normal broadcast packets, e.g. broadcast packets according to the protocol that underlies the network (such as BLE). These normal broadcast packets may be different from the mesh packets that are normally transmitted over the network (for a start, they may not be signed by the network key), but they will still be monitored by all devices in the network. This also renders it possible for a device outside the mesh network to inject probe packets into the network. For example, a probing node, whose only purpose is to periodically broadcast data, might be outside of the mesh network itself but still inject probe packets into the mesh network.
- The communication device may also be configured to more directly obtain information about neighbouring devices that are acting as relays. For example, the device may send packets requesting that any device that receives it responds with details about its own receive capabilities. This may include information such as power status, listening schedule, receive and/or transmit range, active status etc. These packets may be broadcast with a lifetime value that prevents them from being retransmitted. For example, the packets could be transmitted with a TTL value of zero.
- The communication device may also be configured, together with other devices in the network, to implement a more general feedback program in which they exchange information about receive strategies/capabilities so that the devices can coordinate their listening operations. Request and probe packets may form part of such a feedback program.
- Having determined the local mesh density, the communication device may be in a position to adjust its receive power accordingly. There are other factors that the communication device may also take into account, examples of which are represented by
optional steps 602 to 605. - In
step 602 the communication device determines whether it or its associated consumer are “active” or “non-active” with respect to the network. In some embodiments this step may be performed before the communication device detects other devices in the network, since some devices may be configured not to reduce their receive power at all unless their associated consumer is non-active. - In general a device may considered to be “active” if it is waiting to receive a packet from the network that will cause it to adapt its behaviour. This “waiting” does not require the device to be positively anticipating a packet; it just refers to a state in which the consumer is configured to listen for a packet that might cause it to perform some operation (no matter how insignificant that operation might be). The communication device may include a mode unit configured to determine whether its associated consumer is “active” or “non-active”. It may make this determination based on information received from the consumer, e.g. a code or setting received at switch-on identifying the type of device that the consumer is and/or a status update each time that the consumer changes from active to non-active and vice versa.
- The term “mesh device” may be used to refer to a communication device together with its associated consumer. A mesh device may fall into one of two categories:
-
- Mesh Active Device (MAD): Devices whose functional purpose includes obeying mesh commands and thus is required to receive all MESH packets to perform this function.
- Mesh Passive Transport (MPT): Devices whose primary purpose in the network is to implement a mesh transport. They will listen for mesh packets and forward new information. They can additionally offer other services (and commonly will since the consumer at least usually has at least one functional purpose other than communicating over a mesh network). They are, however, not required to receive to all mesh packets to perform this function.
- An MAD is typically constrained in its scheduling as it is important for the effective realisation of its function that it receives all commands addressed to it. This implies that an MAD has to spend significant amount of time listening for potential commands. It is generally not advisable to attempt to reduce this listening time. Practically, this is a moot point as the MAD will usually be associated with some actuator, which implies access to an inexhaustible or rechargeable power source and thus removes the requirement for power saving.
- An MPT is essentially stateless nature with respect to the transmitted packets. It does not affect the behaviour of an individual MPT if it has not observed a particular packet. This makes it possible for an MPT to have shorter and/or less frequent listening “windows” if there are sufficient other MPTs in the system to compensate.
- A mesh device might be an MPT if its consumer component falls into any one of the following categories:
-
- a device might be of a type that is not sent commands by the network;
- a device might be of a type that does not adapt its behaviour in response to commands from the network;
- a device might be configured to receive commands at predetermined intervals, so that the rest of the time it is not waiting to receive anything;
- a device might be of a type that would normally expect to change its behaviour in dependence on a signal from the network but at present it has not got an assigned role within the network, so is not waiting to receive anything; or
- a device might be of a type whose primary function is entirely separate from the network; it neither sends nor receives commands, although it can usefully relay them.
- A communication device preferably listens for the maximum time available if it falls into the MAD category. Otherwise it risks missing packets that it actually needs to receive. A communication device may, however, safely reduce its listening time if it falls into the MPT category.
- In
step 603 the communication device may check whether it has received any take information or commands from the network that it should take into account when determining its receive power. For example, it can be envisaged that in some situations there might be an insufficient density of devices for all non-active devices to substantially reduce their listening time. Therefore, if one device (e.g. a controller) determines that packets are taking too long to reach their destination or are being regularly dropped, it may send out an instruction for all devices to increase their listening time accordingly. The device that sent the instruction might have determined that the network transport is not performing well enough based on the number of acknowledgments that it is receiving to its own packets and/or the length of time that those acknowledgements are taking to reach it. - The communication device may consider its own power status when deciding how to control its receive power (step 604). This factor may be particularly relevant when it comes to deciding whether or not to accede to a request from the network. For example, whether it has access to mains power or not and, it is battery powered, the amount of power the battery has left. If the device is battery powered with little power remaining, it may decide to continue minimising its receive power as much as possible notwithstanding the instruction from the network.
- The communication device might also take into account any information it has about neighbouring devices that are capable of acting as relays (step 605). In particular it may compare any information it may have about a neighbouring device's power supply with its own power situation. For example, if the communication device knows from a previous exchange of status information with its neighbouring devices that one or more of them is mains powered, while the device itself is battery powered, it may determine that the neighbouring mains powered device is far better placed to carry the burden of listening for packets and maintain its own power-saving approach accordingly. The communication device may also consider any information it has about the receive arrangements of neighbouring devices, and particularly their listening schedules.
- Finally, in
step 606, the communication device may control its receive power. There are a number of different options available to a communication device for controlling its receive power, including the following examples: -
- Reducing the amount of time that the communication device listens for packets. This might involve reducing the length of the windows during which the communication device continuously listens for packets or their frequency (e.g. by reducing the communication device's listening duty cycle).
- Using fewer receive circuits such as amplifiers and correlators. This may reduce the receive range of the communication device.
- If a communication device decides that it should adjust its receive power, it may make any adjustments slowly, particularly if it is reducing its receive power, to allow other devices in the network time to adjust their own receive power to compensate. The communication device may control the speed at which the communication device ramps its receive power up or down in dependence on a variety of different factors, including a power level of the communication device, one or more receive parameters of its neighbouring devices, the time of day (some devices may have a schedule in which they do not listen at certain times of day), etc.
- The principles described herein enable a network to transfer packets via a stochastic transport mechanism. This technique is well suited to ad hoc networks. The network is able to achieve reliable transport between two arbitrary devices via intermediary devices, which are not expected to handle communications reliably, because there is a sufficient density of devices in the network to compensate for devices that have reduced their receive power. Relaxing the constraint on the reliability of an individual device permits better power management, opening up the network to a wider range of devices. The mechanism is self-administering, in that each device makes its own decisions about how to adjust its receive power, but is still able to achieve network-wide reliability.
- An example of how devices can compensate for one another is illustrated in
FIGS. 7 a, 7 b andFIG. 8 . - An example of a device listening as much as it can is illustrated in
FIG. 7 a and 7 b for a mesh network that communicates using the three advertising channels specified by the BLE protocol. InFIG. 7 a the MPT scans successively onBLE advertising channels FIGS. 7 a and 7 b show one transmission over the network. A packet may also be relayed by retransmitting it multiple times over each of the relevant channels. Gaps between transitions from channel to channel are significantly shorter than the receive durations. Gaps between channels or between transmission groups may consist of a random element added to a fixed (minimum) duration to increase non-synchronisation with other beacons. The listening process is repeated until data is detected. If the data is considered to be a mesh packet that is valid and new (i.e. so that it is a packet for relaying), the receive operation is stopped for an immediate forwarding of the packet on all three channels. If the mesh packet is not for relaying, reception continues for its expected duration. Once the data has been transmitted, the standard schedule realigned to what it would have been if it had not been interrupted. Resuming the same schedule may be important to avoid devices accidentally synchronising after a relay operation. InFIG. 6 b, a similar operation is followed but the device additionally performs a non-mesh transmit for additional function delivery. This non-mesh transmit and the relay transmit represent times when it is impossible for most current devices to listen. Thus, while the device tries to listen continuously, in practice this is not realisable so the device simply listens for the maximum time possible. - An alternative implementation is shown in
FIG. 8 .FIG. 8 shows the listening windows of four different MPTs. In thisimplementation devices - The applicant hereby discloses in isolation each individual feature described herein and any combination of two or more such features, to the extent that such features or combinations are capable of being carried out based on the present specification as a whole in the light of the common general knowledge of a person skilled in the art, irrespective of whether such features or combinations of features solve any problems disclosed herein, and without limitation to the scope of the claims. The applicant indicates that aspects of the present invention may consist of any such individual feature or combination of features. In view of the foregoing description it will be evident to a person skilled in the art that various modifications may be made within the scope of the invention.
Claims (20)
Applications Claiming Priority (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB1403314.6A GB2512733B (en) | 2014-02-25 | 2014-02-25 | Broadcast retransmission |
GB1403312.0A GB2515853B (en) | 2014-02-25 | 2014-02-25 | Latency mitigation |
GB1403314.6 | 2014-02-25 | ||
GB1403312.0 | 2014-02-25 | ||
GB1405791.3A GB2512748B (en) | 2014-02-25 | 2014-03-31 | Auto-configuration of a mesh relay's TX/RX schedule |
GB1405791.3 | 2014-03-31 |
Publications (1)
Publication Number | Publication Date |
---|---|
US20150244648A1 true US20150244648A1 (en) | 2015-08-27 |
Family
ID=50737759
Family Applications (14)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/270,884 Abandoned US20150244648A1 (en) | 2014-02-25 | 2014-05-06 | Auto-configuration of a mesh relay's tx/rx schedule |
US14/270,961 Active 2035-05-12 US10055570B2 (en) | 2014-02-25 | 2014-05-06 | Mesh relay |
US14/297,324 Active 2034-12-08 US9489506B2 (en) | 2014-02-25 | 2014-06-05 | Linking ad hoc networks |
US14/298,177 Abandoned US20150245203A1 (en) | 2014-02-25 | 2014-06-06 | Packet identification |
US14/316,404 Abandoned US20150245204A1 (en) | 2014-02-25 | 2014-06-26 | Device authentication |
US14/316,529 Abandoned US20150244828A1 (en) | 2014-02-25 | 2014-06-26 | Thwarting traffic analysis |
US14/505,465 Abandoned US20150244565A1 (en) | 2014-02-25 | 2014-10-02 | Network configuration |
US14/505,458 Active US9672346B2 (en) | 2014-02-25 | 2014-10-02 | Object tracking by establishing a mesh network and transmitting packets |
US14/505,466 Abandoned US20150244623A1 (en) | 2014-02-25 | 2014-10-02 | Mesh profiling |
US14/505,437 Abandoned US20150245369A1 (en) | 2014-02-25 | 2014-10-02 | Communicating data over a mesh network |
US14/505,399 Active 2035-04-03 US9910976B2 (en) | 2014-02-25 | 2014-10-02 | Processing mesh communications |
US14/505,418 Abandoned US20150242614A1 (en) | 2014-02-25 | 2014-10-02 | Provisioning of security credentials |
US14/505,443 Active 2035-06-01 US9754096B2 (en) | 2014-02-25 | 2014-10-02 | Update management |
US14/505,454 Expired - Fee Related US9842202B2 (en) | 2014-02-25 | 2014-10-02 | Device proximity |
Family Applications After (13)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/270,961 Active 2035-05-12 US10055570B2 (en) | 2014-02-25 | 2014-05-06 | Mesh relay |
US14/297,324 Active 2034-12-08 US9489506B2 (en) | 2014-02-25 | 2014-06-05 | Linking ad hoc networks |
US14/298,177 Abandoned US20150245203A1 (en) | 2014-02-25 | 2014-06-06 | Packet identification |
US14/316,404 Abandoned US20150245204A1 (en) | 2014-02-25 | 2014-06-26 | Device authentication |
US14/316,529 Abandoned US20150244828A1 (en) | 2014-02-25 | 2014-06-26 | Thwarting traffic analysis |
US14/505,465 Abandoned US20150244565A1 (en) | 2014-02-25 | 2014-10-02 | Network configuration |
US14/505,458 Active US9672346B2 (en) | 2014-02-25 | 2014-10-02 | Object tracking by establishing a mesh network and transmitting packets |
US14/505,466 Abandoned US20150244623A1 (en) | 2014-02-25 | 2014-10-02 | Mesh profiling |
US14/505,437 Abandoned US20150245369A1 (en) | 2014-02-25 | 2014-10-02 | Communicating data over a mesh network |
US14/505,399 Active 2035-04-03 US9910976B2 (en) | 2014-02-25 | 2014-10-02 | Processing mesh communications |
US14/505,418 Abandoned US20150242614A1 (en) | 2014-02-25 | 2014-10-02 | Provisioning of security credentials |
US14/505,443 Active 2035-06-01 US9754096B2 (en) | 2014-02-25 | 2014-10-02 | Update management |
US14/505,454 Expired - Fee Related US9842202B2 (en) | 2014-02-25 | 2014-10-02 | Device proximity |
Country Status (3)
Country | Link |
---|---|
US (14) | US20150244648A1 (en) |
DE (13) | DE102014012257B4 (en) |
GB (18) | GB2512502B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9489506B2 (en) | 2014-02-25 | 2016-11-08 | Qualcomm Technologies International, Ltd. | Linking ad hoc networks |
US9692538B2 (en) | 2014-02-25 | 2017-06-27 | Qualcomm Technologies International, Ltd. | Latency mitigation |
US10944669B1 (en) | 2018-02-09 | 2021-03-09 | GoTenna, Inc. | System and method for efficient network-wide broadcast in a multi-hop wireless network using packet echos |
US11811642B2 (en) | 2018-07-27 | 2023-11-07 | GoTenna, Inc. | Vine™: zero-control routing using data packet inspection for wireless mesh networks |
Families Citing this family (125)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103974225B (en) * | 2013-02-01 | 2018-03-13 | 财团法人工业技术研究院 | Communication device, device-to-device communication system and wireless communication method thereof |
US8989053B1 (en) | 2013-11-29 | 2015-03-24 | Fedex Corporate Services, Inc. | Association management in a wireless node network |
US9451462B2 (en) * | 2014-08-10 | 2016-09-20 | Belkin International Inc. | Setup of multiple IoT network devices |
US9918351B2 (en) * | 2014-04-01 | 2018-03-13 | Belkin International Inc. | Setup of multiple IOT networks devices |
US10453023B2 (en) | 2014-05-28 | 2019-10-22 | Fedex Corporate Services, Inc. | Methods and node apparatus for adaptive node communication within a wireless node network |
US9386605B2 (en) * | 2014-07-11 | 2016-07-05 | Motorola Solutions, Inc. | Mobile dynamic mesh cluster bridging method and apparatus at incident scenes |
US9872240B2 (en) | 2014-08-19 | 2018-01-16 | Belkin International Inc. | Network device source entity triggered device configuration setup |
FR3026587A1 (en) * | 2014-09-30 | 2016-04-01 | Orange | METHOD OF ACCESS BY A MASTER DEVICE TO A VALUE TAKEN BY A CHARACTERISTIC MANAGED BY A PERIPHERAL DEVICE |
FR3031822B1 (en) * | 2015-01-16 | 2018-04-13 | Airbus Operations | DOWNLOADING DATA ON REMOTE EQUIPMENT |
US10681479B2 (en) | 2015-01-30 | 2020-06-09 | Cassia Networks Inc. | Methods, devices and systems for bluetooth audio transmission |
US9769594B2 (en) * | 2015-01-30 | 2017-09-19 | Cassia Networks Inc. | Methods, devices and systems for increasing wireless communication range |
US11238397B2 (en) | 2015-02-09 | 2022-02-01 | Fedex Corporate Services, Inc. | Methods, apparatus, and systems for generating a corrective pickup notification for a shipped item using a mobile master node |
US9426616B1 (en) | 2015-02-10 | 2016-08-23 | Tyco Fire & Security Gmbh | Wireless sensor network controlled low energy link |
FR3033118B1 (en) * | 2015-02-19 | 2017-02-17 | Sigfox | METHOD AND SYSTEM FOR WIRELESS COMMUNICATION BETWEEN TERMINALS AND SEMI-DUPLEX BASE STATIONS |
US11122034B2 (en) | 2015-02-24 | 2021-09-14 | Nelson A. Cicchitto | Method and apparatus for an identity assurance score with ties to an ID-less and password-less authentication system |
US11171941B2 (en) * | 2015-02-24 | 2021-11-09 | Nelson A. Cicchitto | Mobile device enabled desktop tethered and tetherless authentication |
US10848485B2 (en) | 2015-02-24 | 2020-11-24 | Nelson Cicchitto | Method and apparatus for a social network score system communicably connected to an ID-less and password-less authentication system |
WO2016137377A1 (en) | 2015-02-26 | 2016-09-01 | Telefonaktiebolaget Lm Ericsson (Publ) | Energy efficient ble mesh initialisation and operation |
JP6566669B2 (en) * | 2015-03-12 | 2019-08-28 | キヤノン株式会社 | Information processing apparatus, control method thereof, communication method, and program |
TWI552001B (en) * | 2015-04-13 | 2016-10-01 | 聚眾聯合科技股份有限公司 | Connection information sharing system, computer program, and connection information sharing method thereof |
CN106304303B (en) * | 2015-06-09 | 2019-11-12 | 沈阳中科奥维科技股份有限公司 | A kind of power regulating method suitable for WIA-PA wireless network |
US10375492B2 (en) | 2015-06-30 | 2019-08-06 | Sonova, AG | Method of fitting a hearing assistance device |
EP3320721A4 (en) * | 2015-07-06 | 2018-08-01 | Telefonaktiebolaget LM Ericsson (publ) | Apparatus and method for forwarding messages |
US9985839B2 (en) | 2015-07-08 | 2018-05-29 | Fedex Corporate Services, Inc. | Systems, apparatus, and methods of event monitoring for an event candidate within a wireless node network based upon sighting events, sporadic events, and benchmark checkpoint events |
US9503969B1 (en) | 2015-08-25 | 2016-11-22 | Afero, Inc. | Apparatus and method for a dynamic scan interval for a wireless device |
US9843929B2 (en) | 2015-08-21 | 2017-12-12 | Afero, Inc. | Apparatus and method for sharing WiFi security data in an internet of things (IoT) system |
EP3357266B1 (en) * | 2015-09-30 | 2020-10-28 | Google LLC | Systems, devices, and methods for simulataneously exchanging messages between a low-energy radio device and multiple communication devices |
US10673646B1 (en) * | 2018-12-09 | 2020-06-02 | Olibra Llc | System, device, and method of multi-path wireless communication |
US10990616B2 (en) * | 2015-11-17 | 2021-04-27 | Nec Corporation | Fast pattern discovery for log analytics |
US10432461B2 (en) * | 2015-12-04 | 2019-10-01 | T-Mobile Usa, Inc. | Peer-to-peer distribution of radio protocol data for software defined radio (SDR) updates |
KR102381371B1 (en) | 2015-12-10 | 2022-03-31 | 삼성전자주식회사 | System and method for providing information by using near field communication |
US10447784B2 (en) | 2015-12-14 | 2019-10-15 | Afero, Inc. | Apparatus and method for modifying packet interval timing to identify a data transfer condition |
US10091242B2 (en) | 2015-12-14 | 2018-10-02 | Afero, Inc. | System and method for establishing a secondary communication channel to control an internet of things (IOT) device |
US10805344B2 (en) * | 2015-12-14 | 2020-10-13 | Afero, Inc. | Apparatus and method for obscuring wireless communication patterns |
US9992065B2 (en) * | 2015-12-15 | 2018-06-05 | T-Mobile Usa, Inc. | Selective wi-fi calling router updates |
US10659442B1 (en) * | 2015-12-21 | 2020-05-19 | Marvell International Ltd. | Security in smart configuration for WLAN based IOT device |
US20170187602A1 (en) * | 2015-12-29 | 2017-06-29 | Vivek Pathela | System and method of troubleshooting network source inefficiency |
US10708842B2 (en) * | 2016-01-13 | 2020-07-07 | Locus Control LLC | Low power communications system |
US10148453B2 (en) * | 2016-02-24 | 2018-12-04 | Qualcomm Incorporated | Using update slot to synchronize to Bluetooth LE isochronous channel and communicate state changes |
CA3014870A1 (en) | 2016-03-23 | 2017-09-28 | Fedex Corporate Services, Inc. | Systems, apparatus, and methods for self-adjusting a broadcast setting of a node in a wireless node network |
GB2549735B (en) * | 2016-04-26 | 2020-07-29 | Checkit Ltd | Network access control |
US10644746B2 (en) | 2016-04-29 | 2020-05-05 | Texas Instruments Incorporated | Pseudo channel hopping using scan dwell times in mesh networks without time synchronization |
US10205606B2 (en) | 2016-06-15 | 2019-02-12 | Abl Ip Holding Llc | Mesh over-the-air (OTA) luminaire firmware update |
US10873854B2 (en) * | 2016-07-28 | 2020-12-22 | Lg Electronics Inc. | Method and apparatus for establishing connection of devices |
US10798548B2 (en) * | 2016-08-22 | 2020-10-06 | Lg Electronics Inc. | Method for controlling device by using Bluetooth technology, and apparatus |
EP3312762B1 (en) * | 2016-10-18 | 2023-03-01 | Axis AB | Method and system for tracking an object in a defined area |
US9781603B1 (en) | 2016-10-20 | 2017-10-03 | Fortress Cyber Security, LLC | Combined network and physical security appliance |
US10348514B2 (en) * | 2016-10-26 | 2019-07-09 | Abl Ip Holding Llc | Mesh over-the-air (OTA) driver update using site profile based multiple platform image |
US11210678B2 (en) | 2016-11-18 | 2021-12-28 | Samsung Electronics Co., Ltd. | Component for provisioning security data and product including the same |
US10728026B2 (en) * | 2016-11-24 | 2020-07-28 | Samsung Electronics Co., Ltd. | Data management method |
DE102016124168A1 (en) * | 2016-12-13 | 2018-06-14 | Endress+Hauser Conducta Gmbh+Co. Kg | Method for operating a specific field device via a mobile operating device |
EP3558117A1 (en) * | 2016-12-20 | 2019-10-30 | Abbott Diabetes Care Inc. | Systems, devices and methods for wireless communications in analyte monitoring devices |
CN106792853B (en) * | 2016-12-22 | 2020-05-12 | 青岛亿联客信息技术有限公司 | New equipment adding method for Bluetooth mesh network |
CN106713047A (en) * | 2017-01-12 | 2017-05-24 | 泰凌微电子(上海)有限公司 | Node upgrading method and system in mesh network |
US10433134B2 (en) | 2017-01-24 | 2019-10-01 | Arris Enterprises Llc | Video gateway as an internet of things mesh enhancer apparatus and method |
CN110168454B (en) * | 2017-02-21 | 2022-05-06 | 欧姆龙株式会社 | Method for controlling a field device, control device, technical system and storage medium |
US10362612B2 (en) * | 2017-03-06 | 2019-07-23 | Citrix Systems, Inc. | Virtual private networking based on peer-to-peer communication |
AU2018231407B2 (en) * | 2017-03-08 | 2023-02-16 | Hitachi Energy Ltd | Methods and devices for providing cyber security for time aware end-to-end packet flow networks |
DE102017106381A1 (en) | 2017-03-24 | 2018-09-27 | Newtec Gmbh | Method and apparatus for wirelessly transmitting a data signal |
EP3610661A4 (en) * | 2017-04-10 | 2020-09-16 | Itron Networked Solutions, Inc. | Efficient internet-of-things device configuration via quick response codes |
US10116523B1 (en) * | 2017-04-12 | 2018-10-30 | Fisher-Rosemount Systems, Inc. | Predictive connectivity diagnostics for a wireless mesh network in a process control system |
US11229023B2 (en) | 2017-04-21 | 2022-01-18 | Netgear, Inc. | Secure communication in network access points |
US10605609B2 (en) | 2017-05-03 | 2020-03-31 | Microsoft Technology Licensing, Llc | Coupled interactive devices |
DE102017207871A1 (en) * | 2017-05-10 | 2018-11-15 | Tridonic Gmbh & Co Kg | Firmware Update-Over-The Air (FOTA) in building technology |
CA3063105A1 (en) | 2017-05-23 | 2018-11-29 | Walmart Apollo, Llc | Automated inspection system |
US10389854B2 (en) * | 2017-06-15 | 2019-08-20 | Infinet, LLC | Method and system for forming an ad-hoc network over heterogeneous protocols |
US9955307B1 (en) * | 2017-08-03 | 2018-04-24 | Here Global B.V. | Distributed relative positioning |
CN110892741A (en) * | 2017-08-15 | 2020-03-17 | 通用电气公司 | Intelligent equipment, intelligent equipment using method and intelligent lamp |
US10666624B2 (en) * | 2017-08-23 | 2020-05-26 | Qualcomm Incorporated | Systems and methods for optimized network layer message processing |
CN107635215A (en) * | 2017-08-25 | 2018-01-26 | 西安电子科技大学 | Mesh network-building methods based on low-power consumption bluetooth |
US10951653B2 (en) | 2017-09-22 | 2021-03-16 | Samsung Electronics Co., Ltd. | Apparatus including secure component and method of provisioning security information into the apparatus |
CN107508714B (en) * | 2017-09-26 | 2020-09-15 | 深圳市微智电子有限公司 | Method and device for carrying out network configuration on Bluetooth equipment based on Bluetooth mesh |
US11146395B2 (en) | 2017-10-04 | 2021-10-12 | Amir Keyvan Khandani | Methods for secure authentication |
CN109756324A (en) * | 2017-11-02 | 2019-05-14 | 大唐移动通信设备有限公司 | Cryptographic key negotiation method, terminal and gateway in a kind of Mesh network |
US11490400B2 (en) * | 2017-11-15 | 2022-11-01 | Telefonaktiebolaget Lm Ericsson (Publ) | End node, relay node, and methods performed therein for handling transmission of information |
CN108064034A (en) * | 2017-11-17 | 2018-05-22 | 芯海科技(深圳)股份有限公司 | A kind of data collection network method of mesh networkings |
EP3489922B1 (en) | 2017-11-24 | 2022-01-05 | Andreas Stihl AG & Co. KG | Method of operating a wireless transmitter and a wireless receiver and system |
WO2019105523A1 (en) * | 2017-11-28 | 2019-06-06 | Telefonaktiebolaget Lm Ericsson (Publ) | Message transmission with reduced interference |
WO2019117763A1 (en) * | 2017-12-11 | 2019-06-20 | Telefonaktiebolaget Lm Ericsson (Publ) | Channel scanning in a mesh network |
US10554562B2 (en) * | 2017-12-22 | 2020-02-04 | International Business Machines Corporation | Streaming network |
RU2666306C1 (en) * | 2017-12-27 | 2018-09-06 | федеральное государственное автономное образовательное учреждение высшего образования "Санкт-Петербургский политехнический университет Петра Великого" (ФГАОУ ВО "СПбПУ") | Method of controlling communication of single-range intercomputer data network |
US10607012B2 (en) | 2017-12-29 | 2020-03-31 | Delphian Systems, LLC | Bridge computing device control in local networks of interconnected devices |
US10706179B2 (en) * | 2018-01-10 | 2020-07-07 | General Electric Company | Secure provisioning of secrets into MPSoC devices using untrusted third-party systems |
KR102530441B1 (en) | 2018-01-29 | 2023-05-09 | 삼성전자주식회사 | Electronic device, external electronic device, system comprising the same and control method thereof |
WO2019177505A1 (en) | 2018-03-16 | 2019-09-19 | Telefonaktiebolaget Lm Ericsson (Publ) | Methods and nodes for obtaining information regarding a bluetooth mesh network |
US11448632B2 (en) | 2018-03-19 | 2022-09-20 | Walmart Apollo, Llc | System and method for the determination of produce shelf life |
US11658865B2 (en) * | 2018-03-20 | 2023-05-23 | Delphian Systems, LLC | Updating devices in a local network of interconnected devices |
CN111886835B (en) | 2018-03-23 | 2023-07-28 | 瑞典爱立信有限公司 | Message cache management in a mesh network |
US10311705B1 (en) * | 2018-03-29 | 2019-06-04 | Saudi Arabian Oil Company | Distributed industrial facility safety system |
US10303147B1 (en) | 2018-03-29 | 2019-05-28 | Saudi Arabian Oil Company | Distributed industrial facility safety system modular remote sensing devices |
US10613505B2 (en) | 2018-03-29 | 2020-04-07 | Saudi Arabian Oil Company | Intelligent distributed industrial facility safety system |
US11018871B2 (en) * | 2018-03-30 | 2021-05-25 | Intel Corporation | Key protection for computing platform |
KR102114992B1 (en) * | 2018-04-25 | 2020-05-25 | (주)휴맥스 | Wireless communication equipment and method for configuring mesh network thereof |
US11308950B2 (en) | 2018-05-09 | 2022-04-19 | 4PLAN Corporation | Personal location system for virtual assistant |
US11146540B2 (en) * | 2018-05-09 | 2021-10-12 | Datalogic Ip Tech S.R.L. | Systems and methods for public key exchange employing a peer-to-peer protocol |
CN110493758B (en) | 2018-05-14 | 2023-01-13 | 阿里巴巴集团控股有限公司 | Bluetooth Mesh network and network distribution method, equipment and storage medium thereof |
CN110505606B (en) * | 2018-05-18 | 2022-12-02 | 阿里巴巴集团控股有限公司 | Bluetooth Mesh network and distribution network authentication method, equipment and storage medium thereof |
US10574475B2 (en) * | 2018-05-24 | 2020-02-25 | Haier Us Appliance Solutions, Inc. | Household appliance with bluetooth connection and authentication |
CN111886843B (en) * | 2018-06-13 | 2023-04-04 | 卧安科技(深圳)有限公司 | Low power consumption Bluetooth network maintenance method, electronic device, bluetooth network and medium |
CN110636478B (en) | 2018-06-22 | 2023-04-14 | 阿里巴巴集团控股有限公司 | Bluetooth Mesh network system, communication method, device and storage medium thereof |
US10650023B2 (en) * | 2018-07-24 | 2020-05-12 | Booz Allen Hamilton, Inc. | Process for establishing trust between multiple autonomous systems for the purposes of command and control |
WO2020023762A1 (en) | 2018-07-26 | 2020-01-30 | Walmart Apollo, Llc | System and method for produce detection and classification |
US11140659B2 (en) * | 2018-08-21 | 2021-10-05 | Signify Holding B.V. | Wireless organization of electrical devices by sensor manipulation |
US11368436B2 (en) * | 2018-08-28 | 2022-06-21 | Bae Systems Information And Electronic Systems Integration Inc. | Communication protocol |
US11715059B2 (en) * | 2018-10-12 | 2023-08-01 | Walmart Apollo, Llc | Systems and methods for condition compliance |
FI128520B (en) | 2018-11-14 | 2020-07-15 | Xiphera Oy | Method for providing a secret unique key for a volatile FPGA |
WO2020106332A1 (en) | 2018-11-20 | 2020-05-28 | Walmart Apollo, Llc | Systems and methods for assessing products |
US11146919B2 (en) | 2018-12-14 | 2021-10-12 | Denso International America, Inc. | System and method of determining real-time location |
CN109673014B (en) * | 2019-01-25 | 2022-07-15 | 欧普照明股份有限公司 | Network combination method |
CN111669732B (en) * | 2019-03-06 | 2021-09-07 | 乐鑫信息科技(上海)股份有限公司 | Method for filtering redundant data packets at nodes in bluetooth Mesh network |
CN109862548B (en) * | 2019-03-06 | 2021-01-26 | 乐鑫信息科技(上海)股份有限公司 | Method for processing data packets at a node in a bluetooth Mesh network |
US11777715B2 (en) | 2019-05-15 | 2023-10-03 | Amir Keyvan Khandani | Method and apparatus for generating shared secrets |
CN111988268A (en) * | 2019-05-24 | 2020-11-24 | 魏文科 | Method for establishing and verifying input value by using asymmetric encryption algorithm and application thereof |
WO2021006456A1 (en) * | 2019-07-05 | 2021-01-14 | Samsung Electronics Co., Ltd. | System and method for dynamic group data protection |
CN110779500B (en) * | 2019-11-14 | 2021-11-30 | 中国人民解放军国防科技大学 | Mesoscale vortex detection method for incremental deployment sensor |
KR102324374B1 (en) | 2019-11-18 | 2021-11-11 | 한국전자통신연구원 | Method and apparatus for configuring cluster in wireless communication system |
US11245784B1 (en) * | 2020-01-06 | 2022-02-08 | Vorbeck Materials Corp. | Self-organizing communications network nodes and systems |
US11432167B2 (en) | 2020-01-22 | 2022-08-30 | Abl Ip Holding Llc | Selective updating of nodes of a nodal wireless network |
US20210273920A1 (en) * | 2020-02-28 | 2021-09-02 | Vmware, Inc. | Secure certificate or key distribution for synchronous mobile device management (mdm) clients |
US11166253B2 (en) * | 2020-03-27 | 2021-11-02 | Dell Products L.P. | Data center automatic inventory and location data population and recovery using mesh network |
EP3968600A1 (en) * | 2020-09-11 | 2022-03-16 | Volkswagen Ag | Controlling a communication between a vehicle and a backend device |
WO2022148695A1 (en) * | 2021-01-06 | 2022-07-14 | Signify Holding B.V. | A method of, a node device and a system for relaying a message in a network comprising at least two mesh networks |
US20230266960A1 (en) * | 2022-02-24 | 2023-08-24 | Whirlpool Corporation | Systems and methods of offline over the air (ota) programming of appliances |
CN115051921B (en) * | 2022-05-27 | 2023-11-07 | 北京交通大学 | Self-adaptive heterogeneous network attribute information collection method |
US11870879B1 (en) * | 2023-01-04 | 2024-01-09 | Getac Technology Corporation | Device communication during emergent conditions |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090067373A1 (en) * | 2007-09-12 | 2009-03-12 | Nokia Corporation | Deep sleep mode for mesh points |
US20110053493A1 (en) * | 2009-08-25 | 2011-03-03 | Oki Electric Industry Co., Ltd. | Wireless device and wireless system |
US20130029685A1 (en) * | 2011-07-26 | 2013-01-31 | Mehran Moshfeghi | Distributed method and system for determining the position of a mobile device using long-range signals and calibrating the position using short-range signals |
US20140266669A1 (en) * | 2013-03-14 | 2014-09-18 | Nest Labs, Inc. | Devices, methods, and associated information processing for security in a smart-sensored home |
Family Cites Families (184)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6079034A (en) * | 1997-12-05 | 2000-06-20 | Hewlett-Packard Company | Hub-embedded system for automated network fault detection and isolation |
ES2760905T3 (en) * | 1998-10-30 | 2020-05-18 | Virnetx Inc | An agile network protocol for secure communications with assured system availability |
US6986046B1 (en) | 2000-05-12 | 2006-01-10 | Groove Networks, Incorporated | Method and apparatus for managing secure collaborative transactions |
US6836466B1 (en) * | 2000-05-26 | 2004-12-28 | Telcordia Technologies, Inc. | Method and system for measuring IP performance metrics |
US6745027B2 (en) | 2000-12-22 | 2004-06-01 | Seekernet Incorporated | Class switched networks for tracking articles |
US20030014507A1 (en) | 2001-03-13 | 2003-01-16 | International Business Machines Corporation | Method and system for providing performance analysis for clusters |
WO2002078272A1 (en) * | 2001-03-23 | 2002-10-03 | Kent Ridge Digital Labs | A method and system for providing bridged mobile ad-hoc networks |
US20030037237A1 (en) | 2001-04-09 | 2003-02-20 | Jean-Paul Abgrall | Systems and methods for computer device authentication |
DE10145596A1 (en) * | 2001-09-15 | 2003-04-03 | Philips Corp Intellectual Pty | Network with several sub-networks |
WO2003034669A1 (en) | 2001-10-17 | 2003-04-24 | British Telecommunications Public Limited Company | Network location management system |
KR100408525B1 (en) * | 2001-10-31 | 2003-12-06 | 삼성전자주식회사 | System and method of network adaptive real- time multimedia streaming |
US7391731B1 (en) | 2002-03-07 | 2008-06-24 | Ibasis, Inc. | Method for determining best path |
US6917974B1 (en) * | 2002-01-03 | 2005-07-12 | The United States Of America As Represented By The Secretary Of The Air Force | Method and apparatus for preventing network traffic analysis |
CA2419767C (en) | 2002-02-25 | 2011-01-04 | Olsonet Communications Corporation | Method for routing ad-hoc signals |
US7532862B2 (en) | 2002-03-19 | 2009-05-12 | Apple Inc. | Method and apparatus for configuring a wireless device through reverse advertising |
US20030212821A1 (en) | 2002-05-13 | 2003-11-13 | Kiyon, Inc. | System and method for routing packets in a wired or wireless network |
US7251235B2 (en) | 2002-06-12 | 2007-07-31 | Conexant, Inc. | Event-based multichannel direct link |
US20040001483A1 (en) | 2002-06-27 | 2004-01-01 | Schmidt Kurt E. | Distribution and reconstruction of AD-HOC timing signals |
US7474874B2 (en) | 2002-06-28 | 2009-01-06 | Nokia Corporation | Local browsing |
US6898751B2 (en) * | 2002-07-31 | 2005-05-24 | Transdimension, Inc. | Method and system for optimizing polling in systems using negative acknowledgement protocols |
EP1540875A4 (en) | 2002-08-28 | 2011-01-26 | Ntt Docomo Inc | Certificate-based encryption and public key infrastructure |
GB0313473D0 (en) | 2003-06-11 | 2003-07-16 | Koninkl Philips Electronics Nv | Configuring a radio network for selective broadcast |
KR100547133B1 (en) | 2003-07-11 | 2006-01-26 | 삼성전자주식회사 | Apparatus and method for constructing ad-hoc network of heterogeneous terminals |
KR100640327B1 (en) * | 2003-11-24 | 2006-10-30 | 삼성전자주식회사 | The Frame Structure and Data Transmission Method for Bridge Operation of WPAN |
US20050175184A1 (en) * | 2004-02-11 | 2005-08-11 | Phonex Broadband Corporation | Method and apparatus for a per-packet encryption system |
CA2558323A1 (en) | 2004-03-25 | 2005-10-06 | Research In Motion Limited | Wireless access point methods and apparatus for reduced power consumption and cost |
EP1753181A4 (en) | 2004-05-31 | 2012-02-22 | Panasonic Corp | Mobile terminal managing device, mobile terminal, and communication system |
US20060025180A1 (en) | 2004-07-30 | 2006-02-02 | Qualcomm Incorporated | Method for waking a wireless device |
DE112005001934T5 (en) | 2004-08-10 | 2007-07-05 | MeshNetworks, Inc., Maitland | Software architecture and hardware abstraction layer for multi-routing and method of providing the same |
DE102004040069B3 (en) | 2004-08-18 | 2006-03-23 | Siemens Ag | Establishment of a wireless communication network with determination of local topology information from the identifiers of the communication devices |
US7747774B2 (en) * | 2004-08-23 | 2010-06-29 | At&T Intellectual Property I, L.P. | Methods, systems and computer program products for obscuring traffic in a distributed system |
EP1842203A4 (en) | 2004-11-12 | 2011-03-23 | Verayo Inc | Volatile device keys and applications thereof |
KR100594127B1 (en) * | 2004-11-16 | 2006-06-28 | 삼성전자주식회사 | Bonding process method and device in a Bluetooth device |
US7496059B2 (en) * | 2004-12-09 | 2009-02-24 | Itt Manufacturing Enterprises, Inc. | Energy-efficient medium access control protocol and system for sensor networks |
US7533258B2 (en) | 2005-01-07 | 2009-05-12 | Cisco Technology, Inc. | Using a network-service credential for access control |
JP4550636B2 (en) * | 2005-03-18 | 2010-09-22 | 富士通株式会社 | Electronic device, its registration method and registration program |
US7522540B1 (en) | 2005-04-15 | 2009-04-21 | Nvidia Corporation | Extended service set mesh topology discovery |
US8027289B2 (en) * | 2005-04-27 | 2011-09-27 | Raytheon Bbn Technologies Corp. | Ultra-low latency packet transport in ad hoc networks |
US7606178B2 (en) | 2005-05-31 | 2009-10-20 | Cisco Technology, Inc. | Multiple wireless spanning tree protocol for use in a wireless mesh network |
US7653011B2 (en) | 2005-05-31 | 2010-01-26 | Cisco Technology, Inc. | Spanning tree protocol for wireless networks |
US7894372B2 (en) | 2005-05-31 | 2011-02-22 | Iac Search & Media, Inc. | Topology-centric resource management for large scale service clusters |
US7844308B2 (en) | 2005-06-01 | 2010-11-30 | Millennial Net, Inc. | Communicating over a wireless network |
US9654200B2 (en) | 2005-07-18 | 2017-05-16 | Mutualink, Inc. | System and method for dynamic wireless aerial mesh network |
KR101298155B1 (en) * | 2005-07-21 | 2013-09-16 | 파이어타이드, 인코포레이티드 | Method for enabling the efficient operation of arbitrarily interconnected mesh networks |
US7787361B2 (en) | 2005-07-29 | 2010-08-31 | Cisco Technology, Inc. | Hybrid distance vector protocol for wireless mesh networks |
US8948805B2 (en) * | 2005-08-26 | 2015-02-03 | Qualcomm Incorporated | Method and apparatus for reliable transmit power and timing control in wireless communication |
US7778270B1 (en) | 2005-08-31 | 2010-08-17 | Hrl Laboratories, Llc | Code-switching in wireless multi-hop networks |
US7546139B2 (en) | 2005-12-27 | 2009-06-09 | F4W, Inc. | System and method for establishing and maintaining communications across disparate networks |
US20100005294A1 (en) * | 2005-10-18 | 2010-01-07 | Kari Kostiainen | Security in Wireless Environments Using Out-Of-Band Channel Communication |
JP4641245B2 (en) | 2005-10-26 | 2011-03-02 | 三菱電機株式会社 | Ad hoc network system, wireless ad hoc terminal and failure detection method thereof |
US7978666B2 (en) * | 2005-10-31 | 2011-07-12 | Robert Bosch Gmbh | Node control in wireless sensor networks |
US7539488B2 (en) | 2005-11-09 | 2009-05-26 | Texas Instruments Norway As | Over-the-air download (OAD) methods and apparatus for use in facilitating application programming in wireless network devices of ad hoc wireless communication networks |
US20070110024A1 (en) | 2005-11-14 | 2007-05-17 | Cisco Technology, Inc. | System and method for spanning tree cross routes |
US7593376B2 (en) | 2005-12-07 | 2009-09-22 | Motorola, Inc. | Method and apparatus for broadcast in an ad hoc network using elected broadcast relay nodes |
US20130219482A1 (en) | 2006-01-31 | 2013-08-22 | Sigma Designs, Inc. | Method for uniquely addressing a group of network units in a sub-network |
US7848261B2 (en) * | 2006-02-17 | 2010-12-07 | Isilon Systems, Inc. | Systems and methods for providing a quiescing protocol |
US8023478B2 (en) | 2006-03-06 | 2011-09-20 | Cisco Technology, Inc. | System and method for securing mesh access points in a wireless mesh network, including rapid roaming |
US7647078B2 (en) * | 2006-03-07 | 2010-01-12 | Samsung Electronics Co., Ltd. | Power-saving method for wireless sensor network |
US8340106B2 (en) * | 2006-03-13 | 2012-12-25 | Microsoft Corporation | Connecting multi-hop mesh networks using MAC bridge |
US8519566B2 (en) | 2006-03-28 | 2013-08-27 | Wireless Environment, Llc | Remote switch sensing in lighting devices |
US7786885B2 (en) | 2006-04-25 | 2010-08-31 | Hrl Laboratories, Llc | Event localization within a distributed sensor array |
US8681671B1 (en) * | 2006-04-25 | 2014-03-25 | Cisco Technology, Inc. | System and method for reducing power used for radio transmission and reception |
US8406794B2 (en) | 2006-04-26 | 2013-03-26 | Qualcomm Incorporated | Methods and apparatuses of initiating communication in wireless networks |
CN101083597A (en) | 2006-05-31 | 2007-12-05 | 朗迅科技公司 | SIP based instant message of mobile self-organizing network |
DE102006036109B4 (en) | 2006-06-01 | 2008-06-19 | Nokia Siemens Networks Gmbh & Co.Kg | Method and system for providing a mesh key |
EP2041910A4 (en) * | 2006-07-06 | 2013-05-22 | Apple Inc | Wireless access point security for multi-hop networks |
FR2903830B1 (en) | 2006-07-11 | 2008-08-22 | Alcatel Sa | METHOD AND DEVICE FOR MONITORING OPTICAL CONNECTION PATHS FOR A TRANSPARENT OPTICAL NETWORK |
US8411651B2 (en) | 2006-07-27 | 2013-04-02 | Interdigital Technology Corporation | Media independent multi-rat function in a converged device |
EP1892913A1 (en) | 2006-08-24 | 2008-02-27 | Siemens Aktiengesellschaft | Method and arrangement for providing a wireless mesh network |
US8634342B2 (en) | 2006-10-05 | 2014-01-21 | Cisco Technology, Inc. | Upgrading mesh access points in a wireless mesh network |
US8270302B2 (en) | 2006-10-20 | 2012-09-18 | Stmicroelectronics, Inc. | System and method for providing an adaptive value of TTL (time to live) for broadcast/multicast messages in a mesh network using a hybrid wireless mesh protocol |
US8149748B2 (en) | 2006-11-14 | 2012-04-03 | Raytheon Company | Wireless data networking |
KR100879026B1 (en) | 2006-12-05 | 2009-01-15 | 한국전자통신연구원 | Method for grouping among sensor nodes in heterogeneous wireless sensor networks |
MX2009005491A (en) | 2006-12-19 | 2009-06-03 | Ericsson Telefon Ab L M | Handling of idle gap commands in a telecommunication sysytem. |
US9760146B2 (en) | 2007-01-08 | 2017-09-12 | Imagination Technologies Limited | Conditional activation and deactivation of a microprocessor |
US7787427B1 (en) | 2007-01-09 | 2010-08-31 | Dust Networks, Inc. | Providing low average latency communication in wireless mesh networks |
US20080205385A1 (en) | 2007-02-26 | 2008-08-28 | Motorola, Inc. | Data frame formats to improve groupcast efficiency in multi-hop wireless networks |
US8325627B2 (en) | 2007-04-13 | 2012-12-04 | Hart Communication Foundation | Adaptive scheduling in a wireless network |
US8942219B2 (en) | 2007-04-13 | 2015-01-27 | Hart Communication Foundation | Support for network management and device communications in a wireless network |
US8451752B2 (en) | 2007-05-21 | 2013-05-28 | Arrowspan, Inc. | Seamless handoff scheme for multi-radio wireless mesh network |
US20080292105A1 (en) | 2007-05-22 | 2008-11-27 | Chieh-Yih Wan | Lightweight key distribution and management method for sensor networks |
WO2009016513A2 (en) * | 2007-08-01 | 2009-02-05 | Philip Morris Products S.A. | Degradable cigarette filters |
KR101405688B1 (en) | 2007-09-14 | 2014-06-12 | 엘지이노텍 주식회사 | Zigbee system |
US20090089408A1 (en) | 2007-09-28 | 2009-04-02 | Alcatel Lucent | XML Router and method of XML Router Network Overlay Topology Creation |
US7941663B2 (en) | 2007-10-23 | 2011-05-10 | Futurewei Technologies, Inc. | Authentication of 6LoWPAN nodes using EAP-GPSK |
CN101855861A (en) | 2007-11-16 | 2010-10-06 | 富士通天株式会社 | Authentication method, authentication system, on-vehicle device, and authentication device |
US9166934B2 (en) | 2007-11-25 | 2015-10-20 | Trilliant Networks, Inc. | System and method for operating mesh devices in multi-tree overlapping mesh networks |
US8289883B2 (en) | 2007-12-21 | 2012-10-16 | Samsung Electronics Co., Ltd. | Hybrid multicast routing protocol for wireless mesh networks |
US7929446B2 (en) | 2008-01-04 | 2011-04-19 | Radiient Technologies, Inc. | Mesh networking for wireless communications |
KR20090090461A (en) * | 2008-02-21 | 2009-08-26 | 삼성전자주식회사 | Method for prolonging lifetime of sensor nodes in a wireless sensor network and system therefor |
JP4613969B2 (en) | 2008-03-03 | 2011-01-19 | ソニー株式会社 | Communication apparatus and communication method |
US8116247B2 (en) * | 2008-03-11 | 2012-02-14 | Nokia Siemens Networks Oy | Adaptive mechanism for dynamic reconfiguration of mesh networks |
US8923285B2 (en) | 2008-04-30 | 2014-12-30 | Qualcomm Incorporated | Apparatus and methods for transmitting data over a wireless mesh network |
US9386502B2 (en) | 2008-07-29 | 2016-07-05 | Orange | Routing adaptable to electromagnetic conditions in a multihop network |
US8179845B2 (en) | 2008-08-21 | 2012-05-15 | Motorola Solutions, Inc. | Antenna-aware method for transmitting packets in a wireless communication network |
US8699377B2 (en) | 2008-09-04 | 2014-04-15 | Trilliant Networks, Inc. | System and method for implementing mesh network communications using a mesh network protocol |
EP2340667B1 (en) | 2008-09-25 | 2015-07-08 | Fisher-Rosemount Systems, Inc. | Wireless mesh network with pinch point and low battery alerts |
GB2464125A (en) | 2008-10-04 | 2010-04-07 | Ibm | Topology discovery comprising partitioning network nodes into groups and using multiple discovery agents operating concurrently in each group. |
US8782746B2 (en) | 2008-10-17 | 2014-07-15 | Comcast Cable Communications, Llc | System and method for supporting multiple identities for a secure identity device |
CA2743958C (en) * | 2008-11-24 | 2016-11-08 | Certicom Corp. | System and method for hardware based security |
US8294573B2 (en) | 2008-12-11 | 2012-10-23 | International Business Machines Corporation | System and method for optimizing power consumption of container tracking devices through mesh networks |
US8498229B2 (en) | 2008-12-30 | 2013-07-30 | Intel Corporation | Reduced power state network processing |
US8904177B2 (en) * | 2009-01-27 | 2014-12-02 | Sony Corporation | Authentication for a multi-tier wireless home mesh network |
US8254251B2 (en) | 2009-02-03 | 2012-08-28 | Mobix Wireless Solutions Ltd. | Mesh hybrid communication network |
US8964634B2 (en) | 2009-02-06 | 2015-02-24 | Sony Corporation | Wireless home mesh network bridging adaptor |
US9172612B2 (en) | 2009-02-12 | 2015-10-27 | Hewlett-Packard Development Company, L.P. | Network device configuration management by physical location |
EP2528279A3 (en) | 2009-02-13 | 2013-03-27 | Nokia Siemens Networks Oy | Method, system and nodes for network topology detection in communication networks |
US8194576B2 (en) | 2009-03-27 | 2012-06-05 | Research In Motion Limited | Wireless access point methods and apparatus using dynamically-activated service intervals |
US8171292B2 (en) | 2009-04-08 | 2012-05-01 | Research In Motion Limited | Systems, devices, and methods for securely transmitting a security parameter to a computing device |
US9069727B2 (en) * | 2011-08-12 | 2015-06-30 | Talari Networks Incorporated | Adaptive private network with geographically redundant network control nodes |
JP5721713B2 (en) * | 2009-07-23 | 2015-05-20 | ノキア コーポレイション | Method and apparatus for reducing power consumption when operating as a Bluetooth Low Energy device |
KR20110020005A (en) * | 2009-08-21 | 2011-03-02 | 주식회사 팬택 | Method for tranmitting and receiving data in wireless communication system |
US8879994B2 (en) | 2009-10-02 | 2014-11-04 | Blackberry Limited | Methods and devices for facilitating Bluetooth pairing using a camera as a barcode scanner |
EP2306692B1 (en) * | 2009-10-02 | 2014-05-21 | BlackBerry Limited | Methods and devices for facilitating bluetooth pairing using a camera as a barcode scanner |
US20150058409A1 (en) | 2013-03-22 | 2015-02-26 | Frank C. Wang | Enhanced content delivery system and method spanning multiple data processing systems |
US9215082B2 (en) | 2009-10-06 | 2015-12-15 | Thomson Licensing | Method and apparatus for hop-by-hop reliable multicast in wireless networks |
CN102045280B (en) | 2009-10-26 | 2013-08-07 | 国基电子(上海)有限公司 | Cable modem (CM) and certificate test method thereof |
JP5544863B2 (en) | 2009-12-17 | 2014-07-09 | 富士通株式会社 | Reception device, reception method, and reception program |
CN101729296B (en) | 2009-12-29 | 2012-12-19 | 中兴通讯股份有限公司 | Method and system for statistical analysis of ethernet traffic |
EP2526505B1 (en) | 2010-01-20 | 2015-06-17 | Intrinsic ID B.V. | Device and method for obtaining a cryptographic key |
US10645628B2 (en) | 2010-03-04 | 2020-05-05 | Rosemount Inc. | Apparatus for interconnecting wireless networks separated by a barrier |
US8495618B1 (en) | 2010-03-31 | 2013-07-23 | American Megatrends, Inc. | Updating firmware in a high availability enabled computer system |
US8516269B1 (en) | 2010-07-28 | 2013-08-20 | Sandia Corporation | Hardware device to physical structure binding and authentication |
US9173196B2 (en) | 2010-10-07 | 2015-10-27 | GM Global Technology Operations LLC | Adaptive multi-channel access for vehicular networks |
WO2012064178A1 (en) * | 2010-11-11 | 2012-05-18 | Mimos Berhad | Method for use in providing an adaptable sensor nodes schedule in a wireless sensor network |
CN103222241B (en) | 2010-11-25 | 2017-10-03 | 飞利浦灯具控股公司 | System and method for the data transfer of the node that is optimized to wireless mesh network |
US8873526B2 (en) | 2010-12-17 | 2014-10-28 | Cisco Technology, Inc. | Collision avoidance for wireless networks |
US20120163292A1 (en) | 2010-12-23 | 2012-06-28 | Nokia Corporation | Frame Header in Wireless Communication System |
US9094316B2 (en) | 2011-01-28 | 2015-07-28 | Hewlett-Packard Development Company, L.P. | Dynamic name generation |
US20120198434A1 (en) | 2011-01-31 | 2012-08-02 | Digi International Inc. | Virtual bundling of remote device firmware upgrade |
US8769525B2 (en) | 2011-01-31 | 2014-07-01 | Digi International Inc. | Remote firmware upgrade device mapping |
US20120196534A1 (en) | 2011-02-01 | 2012-08-02 | Nokia Corporation | Method, apparatus, and computer program product for broadcasting in short-range communication |
WO2012122994A1 (en) | 2011-03-11 | 2012-09-20 | Kreft Heinz | Off-line transfer of electronic tokens between peer-devices |
US9716659B2 (en) * | 2011-03-23 | 2017-07-25 | Hughes Network Systems, Llc | System and method for providing improved quality of service over broadband networks |
US9268545B2 (en) * | 2011-03-31 | 2016-02-23 | Intel Corporation | Connecting mobile devices, internet-connected hosts, and cloud services |
CN102761941B (en) | 2011-04-28 | 2016-08-03 | 北京云天创科技有限公司 | A kind of method utilizing ultra-low power consumption wireless smart sensor's network protocol transmission |
US20130128809A1 (en) | 2011-05-19 | 2013-05-23 | Qualcomm Incorporated | Apparatus and methods for media access control header compression |
US8553536B2 (en) | 2011-07-12 | 2013-10-08 | General Electric Company | Mesh network management system |
CN102355351B (en) | 2011-07-21 | 2014-11-05 | 华为技术有限公司 | Key generation, backup and migration method and system based on trusted computing |
US8849202B2 (en) | 2011-08-19 | 2014-09-30 | Apple Inc. | Audio transfer using the Bluetooth Low Energy standard |
US8982785B2 (en) | 2011-09-08 | 2015-03-17 | Cisco Technology, Inc. | Access point assisted direct client discovery |
US9445305B2 (en) | 2011-09-12 | 2016-09-13 | Microsoft Corporation | Low energy beacon encoding |
JP6276183B2 (en) | 2011-09-15 | 2018-02-07 | フィッシャー−ローズマウント システムズ,インコーポレイテッド | Transmission of data frames across communication networks using incompatible network routing protocols |
US8892866B2 (en) | 2011-09-26 | 2014-11-18 | Tor Anumana, Inc. | Secure cloud storage and synchronization systems and methods |
US8649883B2 (en) | 2011-10-04 | 2014-02-11 | Advanergy, Inc. | Power distribution system and method |
WO2013057666A1 (en) | 2011-10-17 | 2013-04-25 | Koninklijke Philips Electronics N.V. | Automatic recommissioning of electronic devices in a networked system |
US8654869B2 (en) | 2011-10-27 | 2014-02-18 | Cooper Technologies Company | Multi-path radio transmission input/output devices, network, systems and methods with link suitability determination |
US9936382B2 (en) * | 2011-11-21 | 2018-04-03 | Vital Connect, Inc. | Method and system for pairing a sensor device to a user |
US8953790B2 (en) | 2011-11-21 | 2015-02-10 | Broadcom Corporation | Secure generation of a device root key in the field |
US9191461B2 (en) | 2012-02-21 | 2015-11-17 | Entropic Communications, Inc. | Software upgrade using layer-2 management entity messaging |
US9172636B2 (en) | 2012-02-28 | 2015-10-27 | Cisco Technology, Inc. | Efficient link repair mechanism triggered by data traffic |
US9270584B2 (en) * | 2012-02-28 | 2016-02-23 | Cisco Technology, Inc. | Diverse paths using a single source route in computer networks |
US20130279410A1 (en) | 2012-04-18 | 2013-10-24 | Draker, Inc. | Communicating Data in a Mesh Network |
US9629063B2 (en) | 2012-05-09 | 2017-04-18 | Trellisware Technologies, Inc. | Method and system for global topology discovery in multi-hop ad hoc networks |
US8844026B2 (en) | 2012-06-01 | 2014-09-23 | Blackberry Limited | System and method for controlling access to secure resources |
US20150195692A1 (en) | 2012-06-26 | 2015-07-09 | Nokia Corporation | Method and apparatus for providing device ringtone coordination |
US8751615B2 (en) | 2012-07-18 | 2014-06-10 | Accedian Networks Inc. | Systems and methods of discovering and controlling devices without explicit addressing |
JP5881047B2 (en) | 2012-08-08 | 2016-03-09 | 株式会社日立製作所 | Network management system, network management computer, and network management method |
TW201424435A (en) | 2012-09-05 | 2014-06-16 | Interdigital Patent Holdings | Methods for MAC frame extensibility and frame specific MAC header design for WLAN systems |
US9081643B2 (en) | 2012-09-21 | 2015-07-14 | Silver Sring Networks, Inc. | System and method for efficiently updating firmware for nodes in a mesh network |
US9306660B2 (en) * | 2012-10-22 | 2016-04-05 | Qualcomm Technologies International, Ltd. | Dynamic interactive zone driven proximity awareness system |
US9279856B2 (en) | 2012-10-22 | 2016-03-08 | Infineon Technologies Ag | Die, chip, method for driving a die or a chip and method for manufacturing a die or a chip |
CN102984798B (en) | 2012-11-21 | 2016-02-03 | 越亮传奇科技股份有限公司 | Position-based accurate positioning method |
US20140167912A1 (en) | 2012-12-17 | 2014-06-19 | David M. Snyder | System, method and apparatus for providing security systems integrated with solid state lighting systems |
US20140171062A1 (en) | 2012-12-19 | 2014-06-19 | Telefonaktiebolaget L M Ericsson (Publ) | Wireless Devices, Network Node and Methods for Handling Relay Assistance in a Wireless Communications Network |
WO2014098504A1 (en) | 2012-12-19 | 2014-06-26 | 엘지전자 주식회사 | Method for communicating in wireless communication system supporting multiple access network and apparatus supporting same |
US9628373B2 (en) | 2012-12-19 | 2017-04-18 | Comcast Cable Communications, Llc | Multipath communication in a network |
US20140181172A1 (en) | 2012-12-20 | 2014-06-26 | Brent J. Elliott | Offloading tethering-related communication processing |
WO2014105893A1 (en) | 2012-12-26 | 2014-07-03 | Ict Research Llc | Mobility extensions to industrial-strength wireless sensor networks |
US9032480B2 (en) | 2012-12-28 | 2015-05-12 | Cellco Partnership | Providing multiple APN connections support in a browser |
US8938792B2 (en) | 2012-12-28 | 2015-01-20 | Intel Corporation | Device authentication using a physically unclonable functions based key generation system |
US9239723B2 (en) | 2013-05-13 | 2016-01-19 | Lenovo (Singapore) Pte. Ltd. | Configuring a device based on proximity to other devices |
US9264892B2 (en) | 2013-07-03 | 2016-02-16 | Verizon Patent And Licensing Inc. | Method and apparatus for attack resistant mesh networks |
US9983651B2 (en) | 2013-07-15 | 2018-05-29 | Google Technology Holdings LLC | Low-power near-field communication authentication |
US9386008B2 (en) | 2013-08-19 | 2016-07-05 | Smartguard, Llc | Secure installation of encryption enabling software onto electronic devices |
US20150071216A1 (en) | 2013-09-09 | 2015-03-12 | Qualcomm Connected Experiences, Inc. | Allowing mass re-onboarding of headless devices |
US9565576B2 (en) | 2013-10-09 | 2017-02-07 | At&T Intellectual Property I, L.P. | Network operating system client architecture for mobile user equipment |
US10591969B2 (en) | 2013-10-25 | 2020-03-17 | Google Technology Holdings LLC | Sensor-based near-field communication authentication |
US20150143130A1 (en) | 2013-11-18 | 2015-05-21 | Vixs Systems Inc. | Integrated circuit provisioning using physical unclonable function |
GB2512502B (en) | 2014-02-25 | 2015-03-11 | Cambridge Silicon Radio Ltd | Device authentication |
GB2515853B (en) | 2014-02-25 | 2015-08-19 | Cambridge Silicon Radio Ltd | Latency mitigation |
GB2512733B (en) | 2014-02-25 | 2018-09-05 | Qualcomm Technologies Int Ltd | Broadcast retransmission |
US9660836B2 (en) | 2014-05-06 | 2017-05-23 | Lattice Semiconductor Corporation | Network topology discovery |
US10142799B2 (en) * | 2014-08-19 | 2018-11-27 | Qualcomm Incorporated | Multicasting traffic using multi-connectivity |
-
2014
- 2014-03-31 GB GB1405789.7A patent/GB2512502B/en not_active Expired - Fee Related
- 2014-03-31 GB GB1415178.1A patent/GB2517844B/en not_active Expired - Fee Related
- 2014-03-31 GB GB1415177.3A patent/GB2515923B8/en not_active Expired - Fee Related
- 2014-03-31 GB GB1405791.3A patent/GB2512748B/en not_active Expired - Fee Related
- 2014-03-31 GB GB1405797.0A patent/GB2512749B/en not_active Expired - Fee Related
- 2014-03-31 GB GB1405785.5A patent/GB2512501A/en not_active Withdrawn
- 2014-03-31 GB GB1405790.5A patent/GB2512747B/en not_active Expired - Fee Related
- 2014-03-31 GB GB1405786.3A patent/GB2512746B/en not_active Expired - Fee Related
- 2014-03-31 GB GB1421698.0A patent/GB2523444B/en not_active Expired - Fee Related
- 2014-05-06 US US14/270,884 patent/US20150244648A1/en not_active Abandoned
- 2014-05-06 US US14/270,961 patent/US10055570B2/en active Active
- 2014-06-05 US US14/297,324 patent/US9489506B2/en active Active
- 2014-06-06 US US14/298,177 patent/US20150245203A1/en not_active Abandoned
- 2014-06-26 US US14/316,404 patent/US20150245204A1/en not_active Abandoned
- 2014-06-26 US US14/316,529 patent/US20150244828A1/en not_active Abandoned
- 2014-07-17 GB GB1501075.4A patent/GB2518120B/en not_active Expired - Fee Related
- 2014-07-17 GB GB1412717.9A patent/GB2512543B/en not_active Expired - Fee Related
- 2014-07-17 GB GB1412714.6A patent/GB2512256B8/en not_active Expired - Fee Related
- 2014-07-17 GB GB1412720.3A patent/GB2513048B/en not_active Expired - Fee Related
- 2014-07-17 GB GB1412719.5A patent/GB2512545B/en not_active Expired - Fee Related
- 2014-07-17 GB GB1412718.7A patent/GB2512544B/en not_active Expired - Fee Related
- 2014-07-17 GB GB1412716.1A patent/GB2512542B/en not_active Expired - Fee Related
- 2014-07-17 GB GB1412722.9A patent/GB2512781B/en not_active Expired - Fee Related
- 2014-07-17 GB GB1412715.3A patent/GB2513265B/en not_active Expired - Fee Related
- 2014-08-19 DE DE102014012257.3A patent/DE102014012257B4/en not_active Expired - Fee Related
- 2014-08-19 DE DE102014012252.2A patent/DE102014012252A1/en not_active Ceased
- 2014-08-19 DE DE102014019749.2A patent/DE102014019749B3/en not_active Expired - Fee Related
- 2014-08-19 DE DE102014012258.1A patent/DE102014012258A1/en not_active Withdrawn
- 2014-08-20 DE DE102014012379.0A patent/DE102014012379B4/en not_active Expired - Fee Related
- 2014-08-25 DE DE102014012518.1A patent/DE102014012518A1/en not_active Withdrawn
- 2014-08-25 DE DE102014012517.3A patent/DE102014012517B4/en not_active Expired - Fee Related
- 2014-09-11 DE DE102014013471.7A patent/DE102014013471A1/en not_active Withdrawn
- 2014-10-02 US US14/505,465 patent/US20150244565A1/en not_active Abandoned
- 2014-10-02 US US14/505,458 patent/US9672346B2/en active Active
- 2014-10-02 US US14/505,466 patent/US20150244623A1/en not_active Abandoned
- 2014-10-02 US US14/505,437 patent/US20150245369A1/en not_active Abandoned
- 2014-10-02 US US14/505,399 patent/US9910976B2/en active Active
- 2014-10-02 US US14/505,418 patent/US20150242614A1/en not_active Abandoned
- 2014-10-02 US US14/505,443 patent/US9754096B2/en active Active
- 2014-10-02 US US14/505,454 patent/US9842202B2/en not_active Expired - Fee Related
-
2015
- 2015-02-04 DE DE102015101604.4A patent/DE102015101604A1/en not_active Withdrawn
- 2015-02-04 DE DE102015101620.6A patent/DE102015101620A1/en not_active Withdrawn
- 2015-02-05 DE DE102015101698.2A patent/DE102015101698A1/en not_active Withdrawn
- 2015-02-05 DE DE102015101697.4A patent/DE102015101697A1/en not_active Withdrawn
- 2015-02-05 DE DE102015101699.0A patent/DE102015101699B4/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090067373A1 (en) * | 2007-09-12 | 2009-03-12 | Nokia Corporation | Deep sleep mode for mesh points |
US20110053493A1 (en) * | 2009-08-25 | 2011-03-03 | Oki Electric Industry Co., Ltd. | Wireless device and wireless system |
US20130029685A1 (en) * | 2011-07-26 | 2013-01-31 | Mehran Moshfeghi | Distributed method and system for determining the position of a mobile device using long-range signals and calibrating the position using short-range signals |
US20140266669A1 (en) * | 2013-03-14 | 2014-09-18 | Nest Labs, Inc. | Devices, methods, and associated information processing for security in a smart-sensored home |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9489506B2 (en) | 2014-02-25 | 2016-11-08 | Qualcomm Technologies International, Ltd. | Linking ad hoc networks |
US9672346B2 (en) | 2014-02-25 | 2017-06-06 | Qualcomm Technologies International, Ltd. | Object tracking by establishing a mesh network and transmitting packets |
US9692538B2 (en) | 2014-02-25 | 2017-06-27 | Qualcomm Technologies International, Ltd. | Latency mitigation |
US9754096B2 (en) | 2014-02-25 | 2017-09-05 | Qualcomm Technologies International, Ltd. | Update management |
US9842202B2 (en) | 2014-02-25 | 2017-12-12 | Qualcomm Technologies International, Ltd. | Device proximity |
US9910976B2 (en) | 2014-02-25 | 2018-03-06 | Qualcomm Technologies International, Ltd. | Processing mesh communications |
US10055570B2 (en) | 2014-02-25 | 2018-08-21 | QUALCOMM Technologies International, Ltd | Mesh relay |
US10944669B1 (en) | 2018-02-09 | 2021-03-09 | GoTenna, Inc. | System and method for efficient network-wide broadcast in a multi-hop wireless network using packet echos |
US11750505B1 (en) | 2018-02-09 | 2023-09-05 | goTenna Inc. | System and method for efficient network-wide broadcast in a multi-hop wireless network using packet echos |
US11811642B2 (en) | 2018-07-27 | 2023-11-07 | GoTenna, Inc. | Vine™: zero-control routing using data packet inspection for wireless mesh networks |
Also Published As
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20150244648A1 (en) | Auto-configuration of a mesh relay's tx/rx schedule | |
CN107211368B (en) | Network of nodes, battery-powered node and method of managing a battery-powered node | |
US7356561B2 (en) | Adaptive sleeping and awakening protocol for an energy-efficient adhoc network | |
KR102351845B1 (en) | A multi-hop networking protocol for wide-area energy harvesting sensor network deployments | |
Pegatoquet et al. | A wake-up radio-based MAC protocol for autonomous wireless sensor networks | |
US8804584B2 (en) | Periodic synchronization link quality in a mesh network | |
US8630606B2 (en) | Communications terminals for reducing power consumption and methods thereof | |
CN107960151B (en) | Response device and request device in wireless communication system and implementation method thereof | |
JP5177416B2 (en) | Information processing apparatus and method, program, and communication method | |
US8982754B2 (en) | I/O driven node commissioning in a sleeping mesh network | |
US9692538B2 (en) | Latency mitigation | |
JP2009206749A (en) | Multi-hop wireless network system | |
US20160112955A1 (en) | Communication protocol between access point and wireless station | |
US8787274B2 (en) | Communication system | |
AU2015259363B2 (en) | Node synchronization in a frequency hopping wireless network | |
JP2010278763A (en) | Base station device | |
US11356950B1 (en) | Systems and methods for stunning network nodes | |
Rajib et al. | Minimum Delay Forwarding in Intermittently Connected Sensor Networks | |
Chen et al. | Medium access control based on adaptive sleeping and probabilistic routing for delay tolerant mobile sensor networks | |
Xu et al. | A low–delay energy–efficient decision strategy in duty–cycled wireless sensor networks | |
KR20100106799A (en) | Method for transmitting qos packet in wireless sensor network node |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: CAMBRIDGE SILICON RADIO LIMITED, UNITED KINGDOM Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:TYSON, HUGO MARK;GRAUBE, NICOLAS GUY ALBERT;REEL/FRAME:032832/0145 Effective date: 20140422 |
|
AS | Assignment |
Owner name: QUALCOMM TECHNOLOGIES INTERNATIONAL, LTD., UNITED Free format text: CHANGE OF NAME;ASSIGNOR:CAMBRIDGE SILICON RADIO LIMITED;REEL/FRAME:036663/0211 Effective date: 20150813 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |