Y02D30/00

Software Upgrade in a Home Network Using Lower Layer Messaging
20230208947 · 2023-06-29 ·

Principles, apparatuses, systems, circuits, methods, and computer program products for performing a software upgrade in a MoCA network includes receiving an image of a software upgrade at a server and sending the image in the MoCA network using an L2ME message channel to a client that is enabled to receive the image and store the image in a client memory. The image may be broken up into packets, and a sequence number may be assigned to each packet to assist the client in assembling them. CRC information may also be appended to the packets to enable the client to verify their contents.

METHODS AND DEVICES FOR TRANSMITTING DEVICE CAPABILITY INFORMATION

Apparatuses, methods, and systems are disclosed for transmitting device capability information. The method includes operating a device with multiple antenna port groups for communication between the device and a network. The method includes transmitting, by the device, device capability information to the network. The device capability information includes a number of antenna port groups of the multiple antenna port groups, a number of antenna ports for each of the antenna port groups, a maximum number of supported spatial layers for each of the antenna port groups, or some combination thereof.

FASTER LINK LAYER DISCOVERY PROTOCOL UPDATES
20170373941 · 2017-12-28 ·

In a method for miming a computer network (2) comprising a number of devices (4a-d) comprising at least one network port (6a-c) and being interconnected by network links (8a-c) connecting two respective ports (6a-c), wherein each of the network ports (6a-c) is running the LLDP protocol (9) and comprises a remote MIB (10a-c), a change of a physical state (up, down) of a network link (8a-c) triggers an update of the information in the remote MIB (10a-c) of the ports (6a-c) associated with this link (8a-c), especially immediately after the change of the physical state (up, down). A computer network (2) comprising a number of devices (4a-d) comprising at least one network port (6a-c) and being interconnected by network links (8a-c) connecting two respective ports (6a-c), wherein each of the network ports (6a-c) is running the LLDP protocol (9) and comprises a remote MIB (10a-c) is adapted for performing the above method.

INTERMEDIARY DEVICE FOR DAISY CHAIN AND TREE CONFIGURATION IN HYBRID DATA/POWER CONNECTION

A plurality of intermediary devices may be interposed in a hybrid data/power connection between a power source and a powered device. In one aspect, the intermediary devices may be connected in series. Such connecting may be referred to as “daisy chaining.” In other aspects, the intermediary devices may be connected in a tree or a mesh. Each intermediary device may be configured to consume, for its own use, power that is supplied over the hybrid data/power connection and to deliver remaining power over the hybrid data/power connection to at least one other device. Furthermore, each intermediary device may be configured to independently route data and power to downstream devices.

METHOD FOR AUTOMATED CONFIGURATION OF AN IED

The present application is concerned with a method for loading configuration data to a first Intelligent Electronic Device IED in a Substation Automation SA system, wherein the SA system included a second IED connected to the first IED via a communication network. The method includes: determining a first SID for the first IED by means of a neighbour ship relation, wherein the neighbour ship relation is predefined and indicative of a relative arrangement of the first and second IED in the communication network; assigning the first SID to the first IED; and obtaining first configuration data corresponding to the first SID, and loading the first configuration data to the first IED. The Global Identification GID of the first IED may be determined from the communication network, and the first SID can be linked with the GID of the first IED. The present application concerns also an active IED for configuration of a new or replaced IED in the substation system, according to the above mentioned method.

Expander I/O module discovery and management system

An expander I/O module discovery/management system includes a secondary system chassis housing an expander I/O module coupled to a server device. The server device identifies the secondary system chassis and an expander I/O module port utilized by that server device, and then generates and transmits an expander I/O module reporting communication identifying the secondary system chassis and the expander I/O module port. A primary system chassis houses a switching I/O module coupled to the expander I/O module. The switching I/O module receives the expander I/O module reporting communication and determines that the secondary system chassis identified in the expander I/O module reporting communication is different than the primary system chassis. In response, the switching I/O module assigns a virtual slot to the expander I/O module, and assigns a virtual port associated with the virtual slot to the expander I/O module port identified in the expander I/O module reporting communication.

Device synchronization over bluetooth

Time synchronization between a central wireless communication device and a peripheral wireless communication device is described. Events associated with an application are time stamped at the central wireless communication device, and one or more link layer messages are sent to the peripheral wireless communication device to provide time stamp information to replicate the event timing at the peripheral wireless communication device. A first link layer message includes information about an internal Bluetooth clock to calibrate a corresponding internal clock value at the peripheral wireless communication device. A second link layer message includes information about a current value for the Bluetooth clock and also a value for an offset that provides a time position at a finer granularity than the Bluetooth clock within a timeslot specified by the Bluetooth clock value. Application layer event synchronization between the central and peripheral wireless communication devices allow for power reduced dormant states between events.

Identification of Nodes Included in a Disaggregated System

A disaggregated routing system is provided for use in a communication network comprising a plurality of white boxes, wherein at least four of the plurality of white boxes are each configured to carry out a functionality different from the functionalities which the other three of the at least four of the plurality of white boxes are configured to carry out, and wherein each of the at least four of the plurality of white boxes is identified based on its functionality.

METHOD FOR COMMUNICATION IN DATA CENTER, APPARATUS, AND SYSTEM

One example method includes receiving network topology information delivered by a topology manager, where the data center includes a plurality of servers, a plurality of electrical switches, and at least one optical cross-connect device. A data flow can be obtained. A routing policy can be configured for the data flow based on the network topology information, where the routing policy includes any one or a combination of the following routing policies: a first routing policy, where the first routing policy indicates to forward the data flow through an optical channel in the at least one optical cross-connect device; a second routing policy, where the second routing policy indicates to split the data flow into at least two sub-data flows for forwarding; or a third routing policy, where the third routing policy indicates to forward the data flow through an electrical switch of the plurality of electrical switches.

UPLINK CONNECTIVITY IN RING NETWORKS
20230198803 · 2023-06-22 ·

Techniques for uplink connectivity determination are disclosed. In an example, a Frame Link Module (FLM) in a frame, belonging to a group of frames connected in a ring network, may generate an uplink discovery packet. The FLM may determine, based on a Link Layer Discovery Protocol (LLDP) packet received by the standby uplink from a customer network accessing the ring that the standby uplink has a link to the customer network. The FLM may forward the uplink discovery packet to the standby uplink via a Peripheral Component Interconnect (PCI) interface. The FLM may send the uplink discovery packet to the customer network through the standby uplink directed to an owner FLM. The owner FLM may monitor receipt of the uplink discovery packet from the customer network through a current active uplink and on successful receipt may determine that the standby uplink and switches in the customer network are correctly configured.