Load balancing of throughput for multi-PHY networks using decision trees

    公开(公告)号:US11159430B2

    公开(公告)日:2021-10-26

    申请号:US16518130

    申请日:2019-07-22

    摘要: In one embodiment, a technique for load balancing of throughput for multi-PHY networks using decision trees is provided. A first device of a mesh communication network may collect at least one transmission metric indicative of a primary link and a secondary link between the first device and a second device of the mesh communication network. The first device may provide the at least one transmission metric as input to one or more decision trees comprising one or more attributes that are each indicative of a threshold for a corresponding transmission metric. The first device may obtain an output from the decision tree comprising a selection of either the primary link or the secondary link. The first device may send, based on the output from the decision tree, one or more packets to the second device using the selected link.

    Dynamic transmission power in wireless mesh networks using supervised and semi-supervised learning

    公开(公告)号:US10887851B1

    公开(公告)日:2021-01-05

    申请号:US16521184

    申请日:2019-07-24

    摘要: In one embodiment, a technique for dynamic transmission power in wireless mesh networks using supervised and semi-supervised learning is provided. A first device of a mesh communication network may receive a set of transmission power metrics indicative of network conditions between a second device of the mesh communication network and a plurality of child nodes associated with the second device. The first device may provide the set of transmission power metrics as input to a supervised machine learning process that probabilistically determines one or more minimum transmission power thresholds for nodes of the mesh communication network. The first device may obtain an output from the supervised machine learning process comprising an indication of a particular minimum transmission power threshold for the second device. The first device may control the second device to exchange packets with the plurality of child nodes using the particular minimum transmission power threshold.

    CLOUD-BASED DEPLOYMENT SERVICE IN LOW-POWER AND LOSSY NETWORK

    公开(公告)号:US20200322809A1

    公开(公告)日:2020-10-08

    申请号:US16375778

    申请日:2019-04-04

    IPC分类号: H04W16/18 H04W4/02 G06F17/50

    摘要: Systems, methods, and computer-readable media for identifying a deployment scheme for forming a wireless mesh network based on environmental characteristics and an optimum deployment scheme. In some examples, a geographical area for deployment of a wireless mesh network is identified. Additionally, environmental information of the geographical area can be collected. Network characteristics of an optimum deployment scheme for forming the wireless mesh network can be defined. As follows, a deployment scheme for forming the wireless mesh network can be identified based on the network characteristics of the optimum deployment scheme and the environmental information of the geographical area.

    Localized multicast in a low power and lossy network based on rank-based distance

    公开(公告)号:US11909545B2

    公开(公告)日:2024-02-20

    申请号:US17866768

    申请日:2022-07-18

    摘要: In one embodiment, a method comprises: identifying, by a low power and lossy network (LLN) device in a low power and lossy network, a minimum distance value and a distance limit value for limiting multicast propagation, initiated at the LLN device, of a multicast data message in the LLN; and multicast transmitting, by the LLN device, the multicast data message with a current distance field specifying the minimum distance value and a distance limit field specifying the distance limit value, the multicast transmitting causing a receiving LLN device having a corresponding rank in the LLN to respond to the multicast data message by: (1) determining an updated distance based on adding to the current distance field a rank difference between the receiving LLN device and the LLN device, and (2) selectively retransmitting the multicast data message if the updated distance is less than the distance limit value.

    Cloud-based deployment service in low-power and lossy network

    公开(公告)号:US11653220B2

    公开(公告)日:2023-05-16

    申请号:US16375778

    申请日:2019-04-04

    摘要: Systems, methods, and computer-readable media for identifying a deployment scheme for forming a wireless mesh network based on environmental characteristics and an optimum deployment scheme. In some examples, a geographical area for deployment of a wireless mesh network is identified. Additionally, environmental information of the geographical area can be collected. Network characteristics of an optimum deployment scheme for forming the wireless mesh network can be defined. As follows, a deployment scheme for forming the wireless mesh network can be identified based on the network characteristics of the optimum deployment scheme and the environmental information of the geographical area.

    SASE Based Method of Preventing Exhausting Attack in Wireless Mesh Networks

    公开(公告)号:US20230139002A1

    公开(公告)日:2023-05-04

    申请号:US17515014

    申请日:2021-10-29

    摘要: The present disclosure provides a hierarchical method of identifying unauthorized network traffic in a network by applying, at one of a first plurality of nodes of a network, a first level of network traffic analysis to identify received network traffic as one of authorized or suspicious network traffic, the one of the first plurality of nodes having a first path for traffic routing and a second path to one of a second plurality of nodes of the network, the second path being used for forwarding the suspicious network traffic to the one of the second plurality of nodes; tagging the received network traffic as the suspicious network traffic; and sending the suspicious network traffic to the one of the second plurality of nodes over the second path, the second network node applying a second level of network analysis to determine if the received network traffic is authorized, unauthorized or remains suspicious.

    SECURE DEVICE MANAGEMENT
    17.
    发明申请

    公开(公告)号:US20220353149A1

    公开(公告)日:2022-11-03

    申请号:US17246301

    申请日:2021-04-30

    IPC分类号: H04L12/24 H04L29/06

    摘要: Techniques are described for managing devices using multiple virtual personal area networks (VPANs). A border router can receive a first request to join a network from a first device. The first device may be assigned to a first virtual personal area network (VPAN), which has an associated first group temporal key (GTK). The first GTK can be distributed to the first virtual device. The border router can also receive a second request to join a network from a second device. The second device may be assigned to a second VPAN, which has an associated second GTK. The second GTK can be distributed to the second virtual device.

    MALICIOUS BLACK HOLE NODE DETECTION AND CIRCUMVENTION

    公开(公告)号:US20220070672A1

    公开(公告)日:2022-03-03

    申请号:US17011792

    申请日:2020-09-03

    摘要: A method includes identifying a potentially malicious node using a rating assigned to nodes within the network and decrementing the rating based on detected dropped messages to identify a potentially malicious node. The malicious node is identified based on location information obtained from the nodes within the network and comparable distances from the potentially malicious node. The method further includes ending communications with the malicious node and selecting a new parent node based on a presumption that any of the plurality of nodes other than the malicious node are non-malicious.