H04L41/0833

METHODS AND SYSTEMS FOR WIRELESS TO POWER LINE COMMUNICATIONS
20220190247 · 2022-06-16 · ·

Methods, systems, and apparatus for monitoring and controlling electronic devices using wired and wireless protocols are disclosed. The systems and apparatus may monitor their environment for signals from electronic devices. The systems and apparatus may take and disambiguate the signals that are received from the devices in their environment to identify the devices and associate control signals with the devices. The systems and apparatus may use communication means to send control signals to the identified electronic devices. Multiple apparatuses or systems may be connected together into networks, including mesh networks, to make for a more robust architecture.

METHODS AND SYSTEMS FOR WIRELESS TO POWER LINE COMMUNICATIONS
20220190247 · 2022-06-16 · ·

Methods, systems, and apparatus for monitoring and controlling electronic devices using wired and wireless protocols are disclosed. The systems and apparatus may monitor their environment for signals from electronic devices. The systems and apparatus may take and disambiguate the signals that are received from the devices in their environment to identify the devices and associate control signals with the devices. The systems and apparatus may use communication means to send control signals to the identified electronic devices. Multiple apparatuses or systems may be connected together into networks, including mesh networks, to make for a more robust architecture.

Thermal management of wireless access points

The present disclosure relates to thermal management of wireless access points including local thermal management, cloud-based thermal management, and thermal management based on optimization and operation such as in a distributed Wi-Fi network. The objective of the present disclosure is for thermal management in access points allowing small form-factors and aesthetic designs, preventing overheating and without requiring reduced performance or reduced hardware. Generally, the systems and methods detect when access points are nearing overheating and alter their operation so as to minimize the reduction of performance in the network while reducing power consumption.

Systems and methods for reducing stranded power capacity

Systems and methods described herein make previously stranded power capacity (power that is provisioned for a data center according to a computing system's nameplate power consumption but is currently not useable) available to the data center. Systems described herein generate empirical power profiles that specify expected upper bounds for the power consumption levels that applications trigger. Using the upper bounds for application power-consumption levels, a computing system described herein can reliably release part of its provisioned nameplate power for other systems or data center consumers, reducing the amount of stranded power in a data center. The method described herein avoids performance penalties for most jobs by using sensor measurements made at a rapid rate explained herein to ensure that a system power cap based on running application's measured peak power consumption is reliable with reference to the power capacitance inherent in the computing system.

Systems and methods for reducing stranded power capacity

Systems and methods described herein make previously stranded power capacity (power that is provisioned for a data center according to a computing system's nameplate power consumption but is currently not useable) available to the data center. Systems described herein generate empirical power profiles that specify expected upper bounds for the power consumption levels that applications trigger. Using the upper bounds for application power-consumption levels, a computing system described herein can reliably release part of its provisioned nameplate power for other systems or data center consumers, reducing the amount of stranded power in a data center. The method described herein avoids performance penalties for most jobs by using sensor measurements made at a rapid rate explained herein to ensure that a system power cap based on running application's measured peak power consumption is reliable with reference to the power capacitance inherent in the computing system.

Calculating cumulative power consumption along a path in a network
11743170 · 2023-08-29 · ·

Systems and methods for analyzing power or energy consumption parameters measured at each of a plurality of nodes or Network Elements (NEs) of a network are provided. A system, according to one implementation, includes a processing device and a memory device configured to store computer logic. The computer logic, for example, may be configured to enable the processing device to receive a power consumption value corresponding to an amount of energy expended at each of a plurality of NEs in a network. Also, the computer logic may be configured to enable the processing device to calculate a cumulative power consumption total from the power consumption values associated with the NEs arranged along a path in the network.

Dynamic processing distribution for utility communication networks

Technologies for implementing edge intelligence for utility communication networks are provided. For example, a system includes a mesh network and a utility fog configured to manage the mesh network. The utility fog includes a secure utility system configured for executing a private utility application and a first edge intelligence device configured for executing a first subset of software applications. Each software application is configured to manage endpoints in the mesh network or process data collected by the mesh network. The mesh network includes the endpoints and an edge intelligence device configured for executing a second subset of the software applications that is different from the first subset of software applications.

Dynamic processing distribution for utility communication networks

Technologies for implementing edge intelligence for utility communication networks are provided. For example, a system includes a mesh network and a utility fog configured to manage the mesh network. The utility fog includes a secure utility system configured for executing a private utility application and a first edge intelligence device configured for executing a first subset of software applications. Each software application is configured to manage endpoints in the mesh network or process data collected by the mesh network. The mesh network includes the endpoints and an edge intelligence device configured for executing a second subset of the software applications that is different from the first subset of software applications.

Power saving methods and devices using discontinuous reception (DRX) in wireless systems

A configuration method includes receiving, by a terminal device, configuration information from a network device, where the configuration information includes a first discontinuous reception (DRX) parameter and a second DRX parameter, and communicating, by the terminal device, with the network device on a first bandwidth part (BWP) using the first DRX parameter or on a second BWP using the second DRX parameter.

Operating mode configuration

Examples relate to operating mode configuration. An apparatus may include a memory resource storing executable instructions. Instructions may include instructions to receive a message from a host computing device coupled to the apparatus. The message may include a Host Based Media Access Control Address (HBMA). Instructions may further include instructions to configure the apparatus using the HBMA in response to a determination that the apparatus is in a particular operating mode. The apparatus may further include a processing resource to execute the instructions stored on the memory resource.