Patent classifications
H04L43/10
DYNAMIC AND SECURE PACKET FORMATION FOR TRANSMISSION MANAGEMENT OF IOT DEVICE DATA
A method and system for transmission management of Internet of Things (IoT) device data. A method includes receiving polling data from the one or more devices available in the network based at least in part on one or more adaptable device configuration templates stored in a template library, and determining a number of active devices available in the network and data provided by the active devices based on the received polling data and the corresponding adaptable device configuration template. A method includes generating one or more configurable data packets for transmission over the communication channel to the IoT platform, identifying variations in device configurations by comparing the one or more adaptable device configuration templates stored in the template library with the received polling data, and modifying the corresponding adaptable device configuration template based on the identified variations.
DYNAMIC AND SECURE PACKET FORMATION FOR TRANSMISSION MANAGEMENT OF IOT DEVICE DATA
A method and system for transmission management of Internet of Things (IoT) device data. A method includes receiving polling data from the one or more devices available in the network based at least in part on one or more adaptable device configuration templates stored in a template library, and determining a number of active devices available in the network and data provided by the active devices based on the received polling data and the corresponding adaptable device configuration template. A method includes generating one or more configurable data packets for transmission over the communication channel to the IoT platform, identifying variations in device configurations by comparing the one or more adaptable device configuration templates stored in the template library with the received polling data, and modifying the corresponding adaptable device configuration template based on the identified variations.
INTUITIVE GRAPHICAL NETWORK MAPPING BASED ON COLLECTIVE INTELLIGENCE
In one embodiment, a method comprises: obtaining, by a process, path trace data collected by a plurality of performance monitoring agents across a computer network; obtaining, by the process, one or more catalogs having application-based correlation information for the path trace data; generating, by the process, network mapping directed graphs by correlating the path trace data using the one or more catalogs, the network mapping directed graphs logically comprising nodes categorized at a plurality of levels of aggregation and edges connecting the nodes; associating, by the process, test-based performance data with the edges of the network mapping directed graphs; and providing, by the process, at least one Sankey diagram based on the network mapping directed graphs and test-based performance data associated with their edges for selectable display by a user interface.
INTUITIVE GRAPHICAL NETWORK MAPPING BASED ON COLLECTIVE INTELLIGENCE
In one embodiment, a method comprises: obtaining, by a process, path trace data collected by a plurality of performance monitoring agents across a computer network; obtaining, by the process, one or more catalogs having application-based correlation information for the path trace data; generating, by the process, network mapping directed graphs by correlating the path trace data using the one or more catalogs, the network mapping directed graphs logically comprising nodes categorized at a plurality of levels of aggregation and edges connecting the nodes; associating, by the process, test-based performance data with the edges of the network mapping directed graphs; and providing, by the process, at least one Sankey diagram based on the network mapping directed graphs and test-based performance data associated with their edges for selectable display by a user interface.
SELF-HEALING OF REPEATER FORMATION IN A NETWORK
An example method includes, in response to receiving a gateway heartbeat message from a lighting system non-connected gateway RF node, incrementing a gateway heartbeat counter. In response to receiving a repeater RF node heartbeat message from a network RF node of lighting system non-connected network RF nodes set to a repeater role, incrementing a repeater heartbeat counter. In response to a cycle time exceeding a cycle time timeout, the gateway heartbeat counter not exceeding a gateway heartbeat threshold, and the repeater heartbeat counter exceeding a repeater heartbeat threshold, selecting a selected network RF node of the RF nodes set to the repeater role. Transmitting, via an extended star wireless network, a registration message to the selected network RF node. In response to transmitting the registration message and having a network RF node role state set to an unconnected role, setting the network RF node role state to a connected role.
SELF-HEALING OF REPEATER FORMATION IN A NETWORK
An example method includes, in response to receiving a gateway heartbeat message from a lighting system non-connected gateway RF node, incrementing a gateway heartbeat counter. In response to receiving a repeater RF node heartbeat message from a network RF node of lighting system non-connected network RF nodes set to a repeater role, incrementing a repeater heartbeat counter. In response to a cycle time exceeding a cycle time timeout, the gateway heartbeat counter not exceeding a gateway heartbeat threshold, and the repeater heartbeat counter exceeding a repeater heartbeat threshold, selecting a selected network RF node of the RF nodes set to the repeater role. Transmitting, via an extended star wireless network, a registration message to the selected network RF node. In response to transmitting the registration message and having a network RF node role state set to an unconnected role, setting the network RF node role state to a connected role.
DETERMINING NETWORK RELIABILITY USING MESSAGE SUCCESS RATES
One embodiment of the present invention sets forth a technique for evaluating connections between nodes in a mesh network. The technique includes listening, at a first node and across a plurality of listening windows, for one or more messages transmitted by a second node during a first period of time; determining a number of messages received by the first node during the first period of time; computing, based on the number of messages received by the first node, a received message success rate associated with a first connection between the first node and the second node, wherein the received message success rate indicates a probability of successfully receiving, at the first node, messages transmitted by the second node via the first connection; and computing, based on at least one message received during the first period of time, a transmitted message success rate associated with the first connection, wherein the transmitted message success rate indicates a probability of successfully transmitting messages from the first node to the second node via the first connection.
Traffic detection method, apparatus, and system
A traffic detection method, apparatus, and system are provided. A first network device obtains a packet, where the packet is any packet of the traffic. The first network device adds a detection flag and detection indication information to the packet to update the packet, where the detection flag is used to indicate a position of the detection indication information, where the detection indication information includes a first flag, and the first flag is used to indicate whether the traffic is to-be-detected traffic. The first network device sends an updated packet to a second network device. According to this method, traffic performance is detected, and flexibility and extensiveness of traffic performance detection are improved.
IIoT asymmetric reactive buffering to dynamically manage and optimize in-motion data batch size
A reactive buffering system for use in IIoT data pipelines dynamically adjusts data accumulation and delivery by a node of a pipeline based on aggregated downstream metrics representing current data processing latencies of downstream nodes. Based on these downstream performance metrics, a reactive node that adjusts the size of the next data batch to be sent to an adjacent downstream node. The nodes of the data pipeline are configured to support a request-response based handshaking protocol whereby the nodes that send data to downstream nodes maintain up-to-date performance level information from adjacent downstream nodes. With this performance information, together with pipeline priorities, the sending node (or reactive node) adjusts the transmission rate and intermediate buffering of data. In this way, the nodes of the pipeline can dynamically regulate interim data storage to avoid overwhelming the pipeline system with too much data during periods of high latency.
IIoT asymmetric reactive buffering to dynamically manage and optimize in-motion data batch size
A reactive buffering system for use in IIoT data pipelines dynamically adjusts data accumulation and delivery by a node of a pipeline based on aggregated downstream metrics representing current data processing latencies of downstream nodes. Based on these downstream performance metrics, a reactive node that adjusts the size of the next data batch to be sent to an adjacent downstream node. The nodes of the data pipeline are configured to support a request-response based handshaking protocol whereby the nodes that send data to downstream nodes maintain up-to-date performance level information from adjacent downstream nodes. With this performance information, together with pipeline priorities, the sending node (or reactive node) adjusts the transmission rate and intermediate buffering of data. In this way, the nodes of the pipeline can dynamically regulate interim data storage to avoid overwhelming the pipeline system with too much data during periods of high latency.