-
公开(公告)号:US11159430B2
公开(公告)日:2021-10-26
申请号:US16518130
申请日:2019-07-22
发明人: Lele Zhang , Chuanwei Li , Li Zhao , Yajun Xia
IPC分类号: H04L12/803 , H04L12/24 , G06N20/00 , H04L12/721 , H04L12/26 , H04L12/753
摘要: In one embodiment, a technique for load balancing of throughput for multi-PHY networks using decision trees is provided. A first device of a mesh communication network may collect at least one transmission metric indicative of a primary link and a secondary link between the first device and a second device of the mesh communication network. The first device may provide the at least one transmission metric as input to one or more decision trees comprising one or more attributes that are each indicative of a threshold for a corresponding transmission metric. The first device may obtain an output from the decision tree comprising a selection of either the primary link or the secondary link. The first device may send, based on the output from the decision tree, one or more packets to the second device using the selected link.
-
12.
公开(公告)号:US10887851B1
公开(公告)日:2021-01-05
申请号:US16521184
申请日:2019-07-24
发明人: Lele Zhang , Huimin She , Wenchuan Ji , Chuanwei Li
摘要: In one embodiment, a technique for dynamic transmission power in wireless mesh networks using supervised and semi-supervised learning is provided. A first device of a mesh communication network may receive a set of transmission power metrics indicative of network conditions between a second device of the mesh communication network and a plurality of child nodes associated with the second device. The first device may provide the set of transmission power metrics as input to a supervised machine learning process that probabilistically determines one or more minimum transmission power thresholds for nodes of the mesh communication network. The first device may obtain an output from the supervised machine learning process comprising an indication of a particular minimum transmission power threshold for the second device. The first device may control the second device to exchange packets with the plurality of child nodes using the particular minimum transmission power threshold.
-
公开(公告)号:US20200322809A1
公开(公告)日:2020-10-08
申请号:US16375778
申请日:2019-04-04
发明人: Li Zhao , Chuanwei Li , Lele Zhang , Huimin She
摘要: Systems, methods, and computer-readable media for identifying a deployment scheme for forming a wireless mesh network based on environmental characteristics and an optimum deployment scheme. In some examples, a geographical area for deployment of a wireless mesh network is identified. Additionally, environmental information of the geographical area can be collected. Network characteristics of an optimum deployment scheme for forming the wireless mesh network can be defined. As follows, a deployment scheme for forming the wireless mesh network can be identified based on the network characteristics of the optimum deployment scheme and the environmental information of the geographical area.
-
公开(公告)号:US11909545B2
公开(公告)日:2024-02-20
申请号:US17866768
申请日:2022-07-18
发明人: Pascal Thubert , Huimin She , Chuanwei Li , Lele Zhang
CPC分类号: H04L12/1845 , H04L1/08 , H04L12/189 , H04L12/4633 , H04L45/32
摘要: In one embodiment, a method comprises: identifying, by a low power and lossy network (LLN) device in a low power and lossy network, a minimum distance value and a distance limit value for limiting multicast propagation, initiated at the LLN device, of a multicast data message in the LLN; and multicast transmitting, by the LLN device, the multicast data message with a current distance field specifying the minimum distance value and a distance limit field specifying the distance limit value, the multicast transmitting causing a receiving LLN device having a corresponding rank in the LLN to respond to the multicast data message by: (1) determining an updated distance based on adding to the current distance field a rank difference between the receiving LLN device and the LLN device, and (2) selectively retransmitting the multicast data message if the updated distance is less than the distance limit value.
-
公开(公告)号:US11653220B2
公开(公告)日:2023-05-16
申请号:US16375778
申请日:2019-04-04
发明人: Li Zhao , Chuanwei Li , Lele Zhang , Huimin She
摘要: Systems, methods, and computer-readable media for identifying a deployment scheme for forming a wireless mesh network based on environmental characteristics and an optimum deployment scheme. In some examples, a geographical area for deployment of a wireless mesh network is identified. Additionally, environmental information of the geographical area can be collected. Network characteristics of an optimum deployment scheme for forming the wireless mesh network can be defined. As follows, a deployment scheme for forming the wireless mesh network can be identified based on the network characteristics of the optimum deployment scheme and the environmental information of the geographical area.
-
公开(公告)号:US20230139002A1
公开(公告)日:2023-05-04
申请号:US17515014
申请日:2021-10-29
发明人: Lele Zhang , Li Zhao , Chuanwei Li , Feiliang Wang
IPC分类号: H04L29/06 , H04L12/751 , H04L12/733 , G06K9/62 , G06N20/00
摘要: The present disclosure provides a hierarchical method of identifying unauthorized network traffic in a network by applying, at one of a first plurality of nodes of a network, a first level of network traffic analysis to identify received network traffic as one of authorized or suspicious network traffic, the one of the first plurality of nodes having a first path for traffic routing and a second path to one of a second plurality of nodes of the network, the second path being used for forwarding the suspicious network traffic to the one of the second plurality of nodes; tagging the received network traffic as the suspicious network traffic; and sending the suspicious network traffic to the one of the second plurality of nodes over the second path, the second network node applying a second level of network analysis to determine if the received network traffic is authorized, unauthorized or remains suspicious.
-
公开(公告)号:US20220353149A1
公开(公告)日:2022-11-03
申请号:US17246301
申请日:2021-04-30
发明人: Lele Zhang , Li Zhao , Haibo Dong , Yihua Dai
摘要: Techniques are described for managing devices using multiple virtual personal area networks (VPANs). A border router can receive a first request to join a network from a first device. The first device may be assigned to a first virtual personal area network (VPAN), which has an associated first group temporal key (GTK). The first GTK can be distributed to the first virtual device. The border router can also receive a second request to join a network from a second device. The second device may be assigned to a second VPAN, which has an associated second GTK. The second GTK can be distributed to the second virtual device.
-
公开(公告)号:US11489762B2
公开(公告)日:2022-11-01
申请号:US16890241
申请日:2020-06-02
发明人: Li Zhao , Chuanwei Li , Lele Zhang , Haibo Dong , Akram Ismail Sheriff
IPC分类号: H04L45/24 , H04L45/02 , H04L47/122 , H04W28/10 , H04W84/18
摘要: Techniques for distributed sub-controller permission for control of data-traffic flow within software-defined networking (SDN) mesh networks to limit control plane traffic of the network are described herein. A technique described herein includes a network node of a data-traffic path of an SDN mesh network obtaining SDN sub-controller permission from a border controller of the SDN mesh network. Further, the technique includes suppression of data traffic from sibling and children nodes of data-traffic path allied nodes to the data-traffic path allied nodes. The data-traffic path allied nodes include network nodes that are part of the data-traffic path of the SDN mesh network. Further still, the technique includes the transmission of data across the data-traffic path.
-
公开(公告)号:US20220070672A1
公开(公告)日:2022-03-03
申请号:US17011792
申请日:2020-09-03
发明人: Lele Zhang , Yajun Xia , Chuanwei Li , Li Zhao
摘要: A method includes identifying a potentially malicious node using a rating assigned to nodes within the network and decrementing the rating based on detected dropped messages to identify a potentially malicious node. The malicious node is identified based on location information obtained from the nodes within the network and comparable distances from the potentially malicious node. The method further includes ending communications with the malicious node and selecting a new parent node based on a presumption that any of the plurality of nodes other than the malicious node are non-malicious.
-
公开(公告)号:US10931399B2
公开(公告)日:2021-02-23
申请号:US16289859
申请日:2019-03-01
发明人: Lele Zhang , Huimin She , Chuanwei Li , Nan Yi
IPC分类号: G01R31/08 , G06F11/08 , G08C15/00 , H04J1/16 , H04J3/14 , H04L1/00 , H04L12/26 , H04W74/08 , H04L12/44
摘要: In one embodiment, a method comprises determining, by a network device in a wireless data network, that a prescribed Clear Channel Assessment (CCA) threshold is unsuitable for use on an identified wireless network channel among available wireless network channels, based on a determined variance of a corresponding channel transmit attempt failure rate for the identified wireless network channel, relative to an expected variance in channel transmit attempt failure rates that is determined across the respective available wireless network channels; and selectively adjusting the corresponding CCA threshold for the identified wireless network channel, until a second determined variance of the corresponding channel transmit attempt failure rate, at the identified wireless network channel, falls below a prescribed channel failure rate variance factor relative to the expected variance.
-
-
-
-
-
-
-
-
-