Patent classifications
H04W84/20
DATA COMPLEMENTING METHOD AND APPARATUS
Embodiments of the invention provide a data complementing method and apparatus, which relate to the field of computer. In the method provided by the invention, in the process of master database switching in a master-slave database cluster, a slave database is selected from the database cluster to act as a new master database; first connections between the new master database and all the other slave databases are established successively; the data of the new master database is compared with the data of all the other slave databases, respectively, to synchronize new data in all the other slave databases into the new master database, to accomplish data complementing of the new master database, which causes the new master database to have the latest data in the database cluster, guarantees smooth switching of the master database, and therefore will not influence normal running of database services.
DATA COMPLEMENTING METHOD AND APPARATUS
Embodiments of the invention provide a data complementing method and apparatus, which relate to the field of computer. In the method provided by the invention, in the process of master database switching in a master-slave database cluster, a slave database is selected from the database cluster to act as a new master database; first connections between the new master database and all the other slave databases are established successively; the data of the new master database is compared with the data of all the other slave databases, respectively, to synchronize new data in all the other slave databases into the new master database, to accomplish data complementing of the new master database, which causes the new master database to have the latest data in the database cluster, guarantees smooth switching of the master database, and therefore will not influence normal running of database services.
COMMUNICATION METHOD
A wireless communication network includes a plurality of nodes each capable of performing wireless communication by a first communication method that can form P2P group and wireless communication by a second communication method. A first owner node that operates as an access point to a first P2P group uses the wireless communication by the second communication method to discover a second P2P group present in a second communicable range that is a region outside a first communicable range defined by the first communication method, predicts the time that elapses before the second P2P group moves into the first communicable range, and performs group reorganization before the predicted time elapses.
FINDING MISSING WIRELESS NODES
A method for finding missing wireless nodes includes creating a repeating schedule of communication between a data concentrator and one or more nodes such that the data concentrator attempts to communicate with each of the one or more nodes at a discrete time slot for each node. The schedule of communication further includes at least one dead time slot such that the data concentrator does not attempt to communicate with any of the one or more nodes. The method also includes determining if each node has communicated with the data concentrator during a predetermined amount of discrete time slots, identifying each node that does not communicate with the data concentrator during the predetermined amount of discrete time slot as a missing node, and attempting to communicate with each missing node during the at least one dead time slot.
Selection of a Coordinator Device for an Automated Environment
An automated environment can include multiple controller devices capable of communicating with multiple accessory devices. The controller devices can automatically elect one of their number as a coordinator device for the environment and can automatically perform a new election if an incumbent coordinator becomes unavailable or resigns. The election processes can be transparent to any users. An elected coordinator can perform various operations to facilitate management of the automated environment, including routing of communications between controllers and accessories.
Networked security system
A method of securing communications between a security device and a security server include receiving, at the security server, a registration request from the security device, the registration request being encrypted using an initial registration key. A device identifier and rotation key unique to the security device are transmitted to the security device. A first session key request is received at the security server from the security device, the request being encrypted using the rotation key. A first session key is transmitted to the security device in response. One or more communications, encrypted using the first session key, is received at the security server from the security device. A second session key request is received at the security server from the security device after the first session key has expired, the request encrypted using the rotation key. A second session key is transmitted to the security device in response.
Cloud based access solution for enterprise deployment
Systems and methods for providing mobile services are disclosed. In one implementation, an access point (AP) is provided, which may include a set of one or more base-station functions for use by a user equipment (UE) connected to the AP over a wireless communication interface. The one or more base-station functions may be configured to receive information from the UE. The AP may further include a set of one or more core-network functions configured to receive the information from the set of one or more base-station functions and a distributed portion of a service. The distributed portion of the service may be configured to receive the information from the one or more core-network functions and communicate the information to a corresponding cloud portion of the service running on a cloud platform. The service may be provided by a combination of the distributed portion and the cloud portion of the service. The distributed portion of the service may be further configured to receive a response from the cloud portion of the service based on processing performed by the cloud portion on the cloud platform.
Cooperative power savings among mobile computing devices
Disclosed herein is a technique for enabling mobile computing devices to share observation information using low-energy communication protocols. This observation information can include network connectivity information and GPS location information that is either known to or being sought out by a mobile computing device. When observation information (if any) maintained by a mobile computing device does not satisfy a threshold level of confidence, the mobile computing device can query neighboring mobile computing devices for corresponding observation information that satisfies the threshold level of confidence. Conversely, the mobile computing device can be configured to advertise observation information to the neighboring mobile computing devices when the observation information satisfies the threshold level of confidence. In this manner, the mobile computing devices can collaboratively share information in an attempt to reduce the significant workload that is otherwise required when working in isolation to establish network connectivity and determine GPS location information.
Modular cargo storage apparatus for use on a base platform of a modular autonomous bot apparatus that transports an item being shipped
A modular cargo storage system (CSS) is described for use on a base platform of a modular autonomous bot apparatus that transports an item being shipped. The modular CSS includes a set of folding structural walls, an interlocking alignment interface on at least one of the walls, and a modular component power and data transport bus. The walls at least partially enclose a payload area above the base platform. The interlocking alignment interface has a set of latches and a locking handle coupled to the set of latches that actuates the latches to interlock with the base platform. The power and data transport bus have top and bottom side modular component electronics interfaces where each interface has a power conduit outlet and a command and data communication interface.
Remote control system
On detection of a difference between the operation amount detected by a first sensor and the operation amount received by a first communication unit from a slave, a master side controller executes at least one of stop control to automatically stop a construction machine and alarm control to cause a warning device to issue an alarm. On detection of a difference between the operation amount detected by a second sensor and the operation amount received by a communication unit from the master, a slave side controller executes at least one of the stop control to automatically stop the construction machine and the alarm control to cause the warning device to issue the alarm.