摘要:
In an embodiment, triplets of network-enabled FCIs operate to monitor the three phases of a power distribution system. In being network-enabled, the FCIs also operate as nodes of an RF mesh network. In an embodiment, upon the detection of a power failure, the triplet of network FCIs is serially operated so as to extend their networking capabilities by approximately three times.
摘要:
A node within a wireless mesh network is configured to forward a high-priority message to adjacent nodes in the wireless mesh network by either (i) transmitting the message during successive timeslots to the largest subset of nodes capable of receiving transmissions during each timeslot, or (ii) transmitting the message on each different channel during the timeslot when the largest subset of nodes are capable of receiving transmissions on each of those channels.
摘要:
A communication device detects whether anomalous events occur with respect to at least one node in a utility network. The communication device has recorded therein threshold operating information and situational operating information. The threshold operating information includes data indicative of configured acceptable operating parameters of nodes in the network based on respective locational information of the nodes. The situational information includes data indicative of configured operation data expected to be received from nodes in the network during a predetermined time period, based on a condition and/or event occurring during the time period. The communication device receives operation data from nodes in the network, and determines whether the operation data from a node constitutes an anomalous event based on a comparison of the received operation data with (i) the threshold operating information defined for the node and (ii) the situational information. The communication device outputs notification of any determined anomalous event.
摘要:
A node within a wireless mesh network is configured to forward a high-priority message to adjacent nodes in the wireless mesh network by either (i) transmitting the message during successive timeslots to the largest subset of nodes capable of receiving transmissions during each timeslot, or (ii) transmitting the message on each different channel during the timeslot when the largest subset of nodes are capable of receiving transmissions on each of those channels.
摘要:
Systems and methods for detecting device failures in a network having nodes coupled to a central controller, in which a first of the nodes communicates with the central controller via a second of the nodes. When the second node determines that the first node has not transmitted a predetermined number of messages over a predefined number of time periods, the second node provides a failure alert to the central controller. The central controller records a failure alert received from the second node in a log. Based on a set of failure alerts received from a number of nodes recorded in the log, the central controller determines whether the first node has failed.
摘要:
A communication device detects whether anomalous events occur with respect to at least one node in a utility network. The communication device has recorded therein threshold operating information and situational operating information. The threshold operating information includes data indicative of configured acceptable operating parameters of nodes in the network based on respective locational information of the nodes. The situational information includes data indicative of configured operation data expected to be received from nodes in the network during a predetermined time period, based on a condition and/or event occurring during the time period. The communication device receives operation data from nodes in the network, and determines whether the operation data from a node constitutes an anomalous event based on a comparison of the received operation data with (i) the threshold operating information defined for the node and (ii) the situational information. The communication device outputs notification of any determined anomalous event.
摘要:
A method for managing radio transmission in an endpoint device in a network includes: receiving, at a first endpoint device, a message requesting wake up of the first endpoint device; establishing a connection between the first endpoint device to a second endpoint device connected to the network; determining, at the first endpoint device, whether a secure command is received from the second endpoint device via the established connection within a predetermined period of time; and based on the received secure command, establishing a connection between the first endpoint device and the network via radio transmission, wherein the first endpoint device is configured to turn off radio transmission if the secure command is not received within the predetermined period of time.
摘要:
A wireless mesh network is configured to implement a latency-sensitive communication protocol in order to facilitate data communications between devices coupled to that network and configured to communicate with one another based on that protocol. Specifically, a node within the wireless mesh network receives a continuous stream of data that includes an N-bit sequence from an upstream device coupled to the wireless mesh network. The node transmits the N-bit sequence to a downstream node within the wireless mesh network. The downstream node re-creates the continuous stream of bits based on the received N-bit sequence, and then transmits the re-created continuous stream of bits to another device coupled to the wireless mesh network. By operating in conjunction with one another, the nodes within the wireless mesh network facilitate communication between the devices coupled to wireless mesh network according to the latency-sensitive communication protocol.
摘要:
The functionality of communications standards and protocols that are application-layer specific are overlaid on an IP-based infrastructure, by employing an IP DNS server as the registration host for IP and other communications standards based and protocol based communications. Communication can occur at either the IP layer or the communications standards or protocol application layer. At the IP layer, a host application can interrogate network nodes. To extend this service to other communications standards or protocol communications, device registration and resolve services are implemented on the DNS server. Similar to the manner in which an IP-based service uses a native, IP-based DNS resolve request, a host can utilize a resolution request against the communications standards and protocol-enabled DNS server for standards and protocol application-layer interrogation of endpoints.
摘要:
A method for controlling a light source associated with an environment includes: receiving, over a wireless mesh network and by a control node corresponding to the light source, a first light intensity value for the environment from a first sensor node; calculating, by the control node, a resulting light intensity (RLI) value based on the first intensity value; determining, by the control node, that the RLI value exceeds a light intensity threshold; and modifying, by the control node and in response to determining the RLI value exceeds the light intensity threshold, an output of the first light source.