Abstract:
An electric vehicle can be configured to execute an association procedure with one or more charging stations in a charging facility to securely connect to and receive electric power from one of the charging stations. The electric vehicle can broadcast one or more service matching messages to the charging stations and, in response, can receive attenuation information from one or more of the charging stations. The electric vehicle can analyze the attenuation information received from the charging stations to identify with which charging station the electric vehicle should associate (e.g., to determine which charging station should provide electric power to the electric vehicle). The electric vehicle can then associate with (and receive electric power from) the identified charging station.
Abstract:
A hybrid network device can implement functionality to detect a change in a packet route associated with one or more packets sharing a common route and to manage out of order packet arrival. In a hybrid communication network a first network device can communicate with a second network device via a plurality of packet routes. The first network device can detect one or more route change indicators that are indicative of a change in a packet route between the first network device and the second network device from a first packet route to a second packet route based at least in part on a plurality of packets received from the second network device. Based on the route change indicators it may be determined whether the plurality of packets were received according to a predetermined order and if the plurality of packets should be re ordered based on the predetermined order.
Abstract:
A slotted message access protocol can be implemented for transmitting messages in a communication network. A beacon period may be divided into multiple communication slots. A master network device may register a first client network device and provide registration information to the first client network device. The registration information may include one or more encryption keys to allow the first client network device to securely transmit messages in the communication network. The client network device may use an encryption key associated with a second client network device to decrypt messages received from the second client network device. Furthermore, the first client network device may use a contention-based communication slot to request allocation of contention-free communication slots for subsequent transmissions. The master network device may temporarily allocate contention-free communication slots to the client network device for a specified duration.
Abstract:
Protocol data units (PDUs) associated with a packet stream are transmitted with sequence numbers to support reordering and selective acknowledgement. A selective acknowledgement (SACK) message may be used to indicate at least one sequence number of a lost or corrupted PDU which was not properly received by the receiving device. Responsive to the SACK message, the lost or corrupted PDU is retransmitted via a different path of the network, different from the path used to transmit the original PDU. Lost or corrupted PDUs may not be retransmitted if the estimated retransmission delay is greater than a delay tolerance associated with the quality of service requirements of the application. Instead, a control message (i.e. cut losses message) may be transmitted to indicate that PDUs earlier than a particular sequence number will not be transmitted.
Abstract:
A slotted message access protocol can be implemented for transmitting messages in a communication network. A beacon period may be divided into multiple communication slots. A master network device may register a first client network device and provide registration information to the first client network device. The registration information may include one or more encryption keys to allow the first client network device to securely transmit messages in the communication network. The client network device may use an encryption key associated with a second client network device to decrypt messages received from the second client network device. Furthermore, the first client network device may use a contention-based communication slot to request allocation of contention-free communication slots for subsequent transmissions. The master network device may temporarily allocate contention-free communication slots to the client network device for a specified duration.