Abstract:
A wireless movable device, a system comprising the movable device, and a method for operating the movable device, wherein the movable device determines the link and channel quality of a link between itself and an ad-hoc device, such that the movable device is adapted to determine when it has traveled too far from the ad-hoc device to maintain a reliable link to the ad-hoc device, and wherein the movable device, upon determining the loss of a reliable link to the ad-hoc device, seeks out a location at which a reliable link exists with the ad-hoc device or with another ad-hoc device.
Abstract:
A system and method for detecting communication requirements in a network (100) and placing nodes (102, 107) in various stages of activity where conditions allow. The system and method provides an algorithm to detect changes in node activity levels and alter operations, such as update transmissions and route selections, based upon changes detected. In particular, the algorithm determines activity level at a node (102, 107) at each routing update interval based on factors such as a number of new destinations the node can reach, a number of route modifications that the node (102, 106) can implement, a number of routes from the node whose lengths have changed and a number of destinations thet node (102, 107) can no longer reach. The node can then increase or decrease the rate that it exchanges its routing information with neighboring nodes based on an increase or decrease in this activity level.
Abstract:
A proximity detection system (100) includes a substantially flat electronic circuit that can be printed on a label or tag (113). The tag (113) is used with an electronic device (103, 107, 109, 111) for wireless communication in a network where the tag is affixed to the electronic device for authenticating access to the network. Any number of tags (113) may be include different encryption algorithms for communicating in the network based on groups or subgroups of electronic devices.
Abstract:
A system and method for allowing network users to securely administer and deploy network nodes (102). These networks may comprise wired and/or wireless connections. Examples would include wired networks with shared infrastructure in an office building, as well as ad-hoc multi-hopping peer-to-peer network applications for the home. The system and method provides a key (130) that allows new nodes (102) and thus new devices (124, 126) to gain access to a network via an existing node (122) of that network.
Abstract:
A system (100) and method (300) for mesh/ad hoc participation is provided. The method can include providing (310) an incentive to a user operating a device in an ad hoc network and determining (320) network resources associated with providing the incentive. The method can establish a credit system for devices within the ad hoc network, evaluate a supply and demand for the network resources, and allocate credits to the devices for forwarding packets in the ad hoc network. The method can determine a delivery capacity for the devices and negotiate an optimal packet route through the devices in the ad hoc network based on the supply and demand.
Abstract:
A proximity detection system (100) includes a substantially flat electronic circuit that can be printed on a label or tag (113). The tag (113) is used with an electronic device (103, 107, 109, 111) for wireless communication in a network where the tag is affixed to the electronic device for authenticating access to the network. Any number of tags (113) may be include different encryption algorithms for communicating in the network based on groups or subgroups of electronic devices.
Abstract:
A system and method for allowing network users to securely administer and deploy network nodes (102). These networks (100) may comprise wired and/or wireless connections. Examples would include wired networks (104) with shared infrastructure in an office building, as well as ad-hoc multi-hopping peer-to-peer network applications for the home. The system and method provides a key (130) that allows new nodes (102) and thus new devices (124, 126, 132) to gain access to a network (100) via an existing node (122) of that network (100).
Abstract:
A method for calculating service redundancy of a wireless network is provided. The method comprises determining one or more of a plurality of routes through which a node can communicate to reach a destination. A routing metric is calculated for each of the plurality of routes. Using the calculated routing metrics a route having a best routing metric is identified as a best route to the destination. Service redundancy for each node within the wireless network is calculated using a sum of weighted ratios of the best routing metric to at least one alternate routing metric.
Abstract:
A proximity detection system (100) includes a substantially flat electronic circuit that can be printed on a label or tag (113). The tag (113) is used with an electronic device (103, 107, 109, 111) for wireless communication in a network where the tag is affixed to the electronic device for authenticating access to the network. Any number of tags (113) may be include different encryption algorithms for communicating in the network based on groups or subgroups of electronic devices.
Abstract:
A system and method for providing position information of mobile user terminals (103) in a portable voice and data wireless communications network, such as an ad-hoc wireless communications network (100). More particularly, the present invention relates to a system of locating persons or assets using a centralized computing device, such as a server (125), that computes the respective locations of the terminals (103) from the respective information provided by the terminals (103) relating to their respective locations. A graphical display (121) that receives the location information from the centralized server (125) and generates a graphical display (121) of the location of all or selected terminals (103) based on their locations as computed by the server (125).