H04L61/5038

Master slave communication system and control method for master slave communication system
11700144 · 2023-07-11 · ·

A master slave communication system capable of reducing a manufacturing cost is provided. The mater slave communication system includes a master node and a plurality of slave nodes having the same initial address. A communication between the master node and one slave node among the plurality of slave nodes is established by using the initial address set as an address of the one slave node. The address of the one slave node is changed into another address which has been transmitted from the master node to the one slave node through the established communication and is different from the initial address.

Method of and devices for supporting selective forwarding of messages in a network of communicatively coupled communication devices

A gateway device and a configuration client for supporting selective forwarding of messages published to a group address or a virtual address in a wireless mesh network of communicatively coupled communication devices, such as a Bluetooth Mesh system. The configuration client maintains a mapping between unicast addresses of communication devices and group and virtual addresses in the network. The gateway device receives, from the configuration client, unicast addresses of those communication devices collectively identified by the group or virtual address in a received message. When the retrieved unicast addresses are all serviced by the gateway device, the message is transmitted by the gateway device on all interfaces corresponding to the communication devices addressed by the retrieved unicast addresses. When the retrieved unicast addresses are not all serviced by the gateway device, the message is transmitted by the gateway device on all except one of the interfaces.

Virtual IP support for bare metal cloud infrastructures
11550616 · 2023-01-10 · ·

Disclosed is an improved approach for managing floating/virtual IP addresses in a virtualization system. Where a bare metal cloud provider does not provide adequate facilities to implement broadcast operations, the approach would capture broadcast packets, and from the captured packets, generate calls to the cloud provider to implement configuration changes to reflect the changes desired by the broadcast packets.

Computing device and method for performing a secure neighbor discovery

Computing devices and method for performing a secure neighbor discovery. A local computing device transmits an encrypted local node identifier and an encrypted local challenge to a remote computing device. The remote computing device generates a local challenge response based on the local challenge; and transmits an encrypted remote node identifier and an encrypted local challenge response to the local computing device. The local computing device determines that the received local challenge response corresponds to an expected local challenge response generated based on the local challenge. The remote computing device further transmits an encrypted remote challenge. The local computing device generates a remote challenge response based on the remote challenge; and transmits an encrypted remote challenge response to the remote computing device. The remote computing device determines that the received remote challenge response corresponds to an expected remote challenge response generated based on the remote challenge.

Method and system for provisioning device specific WLAN credentials

A method at an electronic device, the method including initiating authentication with a network through a network element; providing a configuration request, the configuration request including an attribute set for the electronic device; and receiving a configuration response, the configuration response including a certificate or credential for future authentication with the network.

System and method of applying policy based, targeted prefix advertisements via internet protocol version 6 (IPv6) stateless address auto-configuration (SLAAC) router advertisement (RA) poisoning

Systems and network devices configured to use Stateless Address Auto-Configuration (SLAAC) to provide different internet protocol (IP) address information to user equipment (UE) devices that are connected to the same local area network (LAN). A network device (e.g., default router, etc.) may determine whether a UE device is eligible to receive special treatment based on a link-layer address of the UE device. The network device send the UE device an unicast router advertisement that includes a special prefix in response to determining that the UE device is eligible to receive special treatment. The network device may send the UE device an unicast router advertisement that includes a base prefix for the LAN in response to determining that the UE device is not eligible to receive special treatment.

BATTERY RACK MANAGEMENT APPARATUS

Disclosed is a battery rack managing apparatus, which may effectively wake up a plurality of module BMSs. The battery rack managing apparatus manages a battery rack provided with a plurality of battery modules, and includes a plurality of module BMSs provided to correspond to one or more battery modules among the plurality of battery modules; a rack BMS configured to communicate with the plurality of module BMSs and control the plurality of module BMSs; a heater configured to generate and supply heat; and a plurality of wake-up units provided to correspond to the plurality of module BMSs, respectively, and including a variable resistor element configured to change a resistance value by the heat supplied by the heater, the plurality of wake-up units being configured to supply a wake-up signal to a corresponding module BMS when the resistance value of the variable resistor element is changed.

NETWORK DEVICE AND MEDIA ACCESS CONTROL ADDRESS LEARNING METHOD THEREFOR
20220407806 · 2022-12-22 ·

A Media Access Control address (MAC) learning method includes: parsing out packet header and packet verification parameter of a packet from an input/output port; generating a port identifier corresponding to the input/output port; starting first-stage procedure for the packet header; and starting second-stage procedure for the packet verification parameter. The first-stage procedure includes: performing, according to a MAC forwarding table and the port identifier, learning processing for source MAC address of the packet header to generate learning result; generating status parameter according to the learning result; and associating and storing the status parameter, the port identifier, and a hash address corresponding to the source MAC address into a memory. The second-stage procedure includes: obtaining the status parameter and the hash address from the memory according to the port identifier; and updating the MAC forwarding table according to the packet verification parameter, the obtained status parameter, and the obtained hash address.

TRIGGER-BASED COMMISSIONING SYSTEM

To improve the accuracy of a trigger-based commissioning in a high dense network without leveraging an optical link, a separate beacon tag (400) is employed to assist the commissioning procedure between a node (200) and a commissioning device (300). A trigger event is detected at the node (200) side when its local identification number is equal to the identification number comprised in a second type of beacon received from the beacon tag (400), and the proximity of the beacon tag (400) is determined to be below a local threshold. Upon the detection of such a trigger event, the node (200) updates its first type of beacons to notify the commissioning device 300 about the trigger event. And then, the commissioning device (300) confirms the trigger event and sends a request for commissioning to the node (200).

TRIGGER-BASED COMMISSIONING SYSTEM

To improve the accuracy of a trigger-based commissioning in a high dense network without leveraging an optical link, a separate beacon tag (400) is employed to assist the commissioning procedure between a node (200) and a commissioning device (300). A trigger event is detected at the node (200) side when its local identification number is equal to the identification number comprised in a second type of beacon received from the beacon tag (400), and the proximity of the beacon tag (400) is determined to be below a local threshold. Upon the detection of such a trigger event, the node (200) updates its first type of beacons to notify the commissioning device 300 about the trigger event. And then, the commissioning device (300) confirms the trigger event and sends a request for commissioning to the node (200).