Abstract:
Systems and methods for carrier sense multiple access (CSMA) protocols for power line communications (PLC) are described. In some embodiments, a method may include performing a virtual carrier sensing operation and, in response to the virtual carrier sensing operation indicating that a communication channel is idle, calculating a contention window. The method may also include performing a physical carrier sensing operation subsequent to the virtual carrier sensing operation, the physical carrier sensing operation based, at least in part, upon the contention window. In response to the physical carrier sensing operation indicating that the communication channel is idle, the method may then include transmitting data over the channel. In other embodiments, another method may include determining that a data transmission is a unicast transmission and that an acknowledgement message has not been received. The method may further include incrementing a backoff parameter and repeating one or more carrier sense operations.
Abstract:
The white list generator identifies wireless sensor nodes that communicate via a wireless sensor network, to identifies time slots assigned for with each of the identified wireless sensor nodes, and to create and maintain a list of the identified wireless sensor nodes and corresponding time slots. The white list generator provides power control information to power a transceiver for reception of transmissions from each identified wireless sensor node based on the identified time slots corresponding to the identified wireless sensor node provided in the list.
Abstract:
In a disclosed embodiment, a method for communication in a network includes receiving, at a first device registered to the network, a physical layer (PHY) frame that includes a PHY header and a MAC header. The PHY frame may further include a MAC payload. The PHY header includes a destination address field. The method further includes comparing a network address of the first device to the destination address field to determine whether the destination address field stores a value having the same number of bits as the network address. When the comparison indicates that the value stored by the destination address field does not have the same number of bits as the network address, the method skips decoding the MAC header and the MAC payload.
Abstract:
A method for implementing a convergence layer. Data is received on a first communication medium by a first transceiver. Data is transmitted on the first communication medium by the first transceiver. A signal is received. Causing, through the convergence layer, by a control logic in response to the signal, the data received and transmitted on the first communication medium as part of a communication session to be received and transmitted instead by a second transceiver on a second communication medium, wherein the convergence layer is configured to conceal from a routing layer at least one of: information related to the first signal, and information related to the data being received and transmitted on the second communication medium.
Abstract:
Systems and methods for carrier sense multiple access (CSMA) protocols for power line communications (PLC) are described. In some embodiments, a method may include performing a virtual carrier sensing operation and, in response to the virtual carrier sensing operation indicating that a communication channel is idle, calculating a contention window. The method may also include performing a physical carrier sensing operation subsequent to the virtual carrier sensing operation, the physical carrier sensing operation based, at least in part, upon the contention window. In response to the physical carrier sensing operation indicating that the communication channel is idle, the method may then include transmitting data over the channel. In other embodiments, another method may include determining that a data transmission is a unicast transmission and that an acknowledgement message has not been received. The method may further include incrementing a backoff parameter and repeating one or more carrier sense operations.
Abstract:
A system and method for arbitrating channel access in a wireless device including co-located network transceivers are disclosed herein. A wireless device includes a first wireless transceiver and a second wireless transceiver. The first transceiver is configured for operation with a first wireless network. The second transceiver is configured for operation with a second wireless network. The wireless device further includes logic that determines which of the first and second transceivers is enabled to transmit at a given time. The logic causes the first transceiver to transmit a notification signal indicating a time period during which the second transceiver of the wireless device will perform a first wireless transaction, and during which, based on receiving the notification signal, a different wireless device performs a second wireless transaction via the second wireless network without transmitting a notification signal.
Abstract:
A power line communication network includes a plurality of PLC devices. The PLC devices communicate packets over conductors of an electrical power distribution system via a plurality of non-interfering channels. Different ones of the PLC devices are configured to communicate packets via different ones of the non-interfering channels.
Abstract:
A system and method for arbitrating channel access in a wireless device including co-located network transceivers are disclosed herein. A wireless device includes a first wireless transceiver and a second wireless transceiver. The first transceiver is configured for operation with a first wireless network. The second transceiver is configured for operation with a second wireless network. The wireless device further includes logic that determines which of the first and second transceivers is enabled to transmit at a given time. The logic causes the first transceiver to transmit a notification signal indicating a time period during which the second transceiver of the wireless device will perform a first wireless transaction, and during which, based on receiving the notification signal, a different wireless device performs a second wireless transaction via the second wireless network without transmitting a notification signal.
Abstract:
Systems and methods for carrier sense multiple access (CSMA) protocols for power line communications (PLC) are described. In some embodiments, a method may include performing a virtual carrier sensing operation and, in response to the virtual carrier sensing operation indicating that a communication channel is idle, calculating a contention window. The method may also include performing a physical carrier sensing operation subsequent to the virtual carrier sensing operation, the physical carrier sensing operation based, at least in part, upon the contention window. In response to the physical carrier sensing operation indicating that the communication channel is idle, the method may then include transmitting data over the channel. In other embodiments, another method may include determining that a data transmission is a unicast transmission and that an acknowledgement message has not been received. The method may further include incrementing a backoff parameter and repeating one or more carrier sense operations.
Abstract:
Authentication of a networked device with limited computational resources for secure communications over a network. Authentication of the device begins with the supplicant node transmitting a signed digital certificate with its authentication credentials to a proxy node. Upon verifying the certificate, the proxy node then authenticates the supplicant's credentials with an authentication server accessible over the network, acting as a proxy for the supplicant node. Typically, this verification includes decryption according to a public/private key scheme. Upon successful authentication, the authentication server creates a session key for the supplicant node and communicates it to the proxy node. The proxy node encrypts the session key with a symmetric key, and transmits the encrypted session key to the supplicant node which, after decryption, uses the session key for secure communications. In some embodiments, the authentication server encrypts the session key with the symmetric key.