摘要:
A networked system for managing a physical intrusion detection/alarm includes a network of end nodes, e.g., sensor nodes including one or more constrained sensor nodes for sensing physical conditions, and a gateway to provide network connections for the constrained sensor nodes. The system also includes a range extender for connecting the one or more constrained sensor nodes to the gateway, with the range extender including first and second radios and corresponding processors to wirelessly communicate with the gateway and constrained nodes.
摘要:
A computing device of a peer-to-peer group for a wireless communication protocol may determine that a peer-to-peer connection for the group transports an application flow sourced by a Group Owner to a client of the Group Owner. The computing devices of the group select the client that receives the application flow sourced by the Group Owner to be a new Group Owner for the group. As a consequence, the computing device of the group that receives the application flow is the new Group Owner and, as a result, the Group Owner for the group receives the application flow whereas prior to the selection of the new Group Owner the Group Owner transmitted the application flow.
摘要:
A method for exiting, by a peer owner, a Wireless Fidelity (Wi-Fi) peer-to-peer network including the peer owner and a plurality of client devices, and the Wi-Fi peer-to-peer network are provided. The method includes delegating ownership of the peer-to-peer network from the peer owner to a new owner from among said the plurality of client devices; and exiting the network after delegating the ownership to the new owner.
摘要:
A method and a first device for determining a group owner during establishment of a local-wireless communication connection are provided. The method includes searching for a second device that supports the local-wireless communication connection; searching, if the second device is found, for services supportable by the second device; determining an intent value of the first device corresponding to a group owner authority with respect to a service to be connected among the found supportable services; transmitting, to the second device, a negotiation message including the determined intent value of the first device; receiving, from the second device, a negotiation message including an intent value of the second device; and determining, from among the first device and the second device, a device having the group owner authority by comparing the determined intent value of the first device with the intent value of the second device.
摘要:
A system and method for method of managing a network. Each of a plurality of servers includes an element management system (EMS) function for managing network elements within the network and a network management system (NMS) function for managing ones of the plurality of servers running the EMS function. An NMS function is activated on one of the servers when the plurality of servers shares a one network domain. When the network domain is divided into multiple domains, e.g. by a network failure, an NMS function is activated on at least one other one of the plurality of servers whereby each of the multiple network domains has at least one associated active NMS function.
摘要:
A method for exiting, by a peer owner, a Wireless Fidelity (Wi-Fi) peer-to-peer network including the peer owner and a plurality of client devices, and the Wi-Fi peer-to-peer network are provided. The method includes delegating ownership of the peer-to-peer network from the peer owner to a new owner from among said the plurality of client devices; and exiting the network after delegating the ownership to the new owner.
摘要:
Systems and methods of the present invention for maintaining network data distribution are provided. Network data may be distributed in such as manner as to allow a network session to weather interrupted communications between host and clients without significant loss of data. Embodiments of the present invention provide for one or more clients to serve as backup host(s) for the network session, such determinations including the use of NAT profile information. When the other clients transmit data to the host, they may also transmit the data to one or more backup hosts if there are any indications of interrupted communication.