Approach for extended battery life network nodes

ABSTRACT

In an embodiment, triplets of network-enabled FCIs operate to monitor the three phases of a power distribution system. In being network-enabled, the FCIs also operate as nodes of an RF mesh network. In an embodiment, upon the detection of a power failure, the triplet of network FCIs is serially operated so as to extend their networking capabilities by approximately three times.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of the co-pending U.S. patentapplication titled, “APPROACH FOR EXTENDED BATTERY LIFE NETWORK NODES,”filed on Nov. 5, 2012 and having Ser. No. 13/669,413. The subject matterof this related application is hereby incorporated herein by reference.

BACKGROUND Technical Field

Embodiments of the present invention relate generally to wirelessdigital communication technology and, more specifically, to an approachfor extended battery life network nodes.

Description of the Related Art

A conventional wireless mesh network includes a plurality of nodes, eachincorporating a digital radio transceiver. A given node may transmitpayload data to one or more other nodes via the digital radiotransceiver. The node may originate the payload data or forward thepayload data on behalf of a different node. Similarly, a given node mayreceive the payload data from a different node to be processed orforwarded by the node. The wireless mesh network may include anarbitrary number of nodes and may include certain access points,configured to bridge data communications within the mesh network to arelated service system, such as a wire line or optical communicationsnetwork.

In a network that is typically represented by a utility network, thedistribution part of the network may include a plurality of nodeslocated at end-pint utility meters with a smaller number of nodes actingas relays, and one or more Gateways providing egress to these end-pointnodes. The utility network may also consist of the infrastructure part(substations, feeder stations, transformer locations, generationfacilities) that is populated with monitoring and control sensors. Thesedevices may also be part of the utility network that may be directlyconnected to the utility server via WAN or connected to the utilityserver via Gateways in the wireless network. The routing algorithm maybe structured in such a fashion that these infrastructure nodes, and anyselected distribution end-point nodes can establish bi-directionalconnectivity with minimal latency and via the fastest path. In someembodiments, these infrastructure nodes and select end-point nodes canhave multi-egress capability to increase network reliability.

In traditional power distribution systems, Faulted Circuit Indicators(FCIs) have been used so as to detect faults in power distributionsystems. FCIs that are further equipped with networking functionalityhave also been implemented in distribution automation systems so as tooperate as nodes of a mesh network. Because of this increasedfunctionality, battery backups have been implemented in FCIs. Butbecause power failures may last longer than the battery life of each ofthe FCIs, the mesh network may develop significant problems upondrainage of the FCIs. For example, where the battery backup for anetwork-enabled FCI is approximately two hours, the network, or part ofthe network, may fail after two hours.

As the foregoing illustrates, what is needed in the art is a meshnetwork that can operate for an extended period of time after theoccurrence of a power failure.

SUMMARY

Embodiments of the present invention include methods for extending thebattery-backed operation of network-enable FCIs. A described embodimentincludes a method for substantially serially operating a set of threeFCIs so as to extend the battery-backed operation of a network node byapproximately three times.

In an embodiment, triplets of network-enabled FCIs operate to monitorthe three phases of a power distribution system. In beingnetwork-enabled, the FCIs also operate as nodes of an RF mesh network.In an embodiment, upon the detection of a power failure, the triplet ofnetwork FCIs is serially operated so as to extend their networkingcapabilities by approximately three times.

In a method according to an embodiment of the invention, upon detectionof a power failure, one FCI from among the triplet of network-enabledFCIs is chosen as the lead node FCI. Such lead node FCI then takes onthe networking functions of the other two FCIs. The two non-lead FCIsthen enter a low power usage sleep mode. When the power is substantiallydepleted from the lead node FCI, networking functionality is thentransitioned to one of the two remaining FCIs. When the power issubstantially depleted from the second lead node FCI, networkingfunctionality is then transitioned to the third FCI. In this way, thebattery backed network node is substantially extended.

In an embodiment of the present invention, the lead node FCI isdetermined according to the battery level or capacity of the FCIs. Forexample, the FCI with the strongest battery or the largest charge ischosen as the lead node. In another embodiment, the order of lead nodeselection is predetermined.

In another embodiment of the present invention, it is desired not tocompletely drain and render inoperative the lead node FCI. This can bedesirable so as not to interrupt network traffic. An embodiment of thepresent invention, therefore, putting the non-lead node FCIs into asleep mode with substantially reduced power consumption. On a periodicbasis thereafter, the sleeping FCIs are awakened so as to poll thestatus of the lead node FCI. Where the status (e.g., battery power) ofthe lead node FCI is above a predetermined threshold, the non-lead FCIreturns to a sleep mode. But where the status of the lead node FCI isbelow a predetermined threshold, networking functionality istransitioned away from the first lead node FCI to a second lead nodeFCI. After a complete transition, the first lead node FCI is powereddown. In an embodiment of the present invention, another transition canbe made so as to provide for a third lead node FCI after the battery ofthe second lead node FCI is substantially drained.

when a node joins a network and receives a routing advertisement, such anode transmits the routing advertisement to all its neighbors. The nodethen receives transmission from the neighboring nodes indicatinginterest in joining the advertised network. If more than a thresholdnumber of neighboring nodes are interested in the advertised route, thenewly joining node inserts the route advertisement in a beacontransmission. If there is not a threshold level of interest, the nodeunicasts only to the neighbors who indicated interest in the advertisednetwork. In an embodiment, the node repeats the above steps on apredetermined time basis (e.g., one per day) in order to determineinterest in the advertised route that may have newly arisen.

Other embodiments include, without limitation, a computer-readablemedium that includes instructions that enable a processing unit toimplement one or more aspects of the disclosed methods as well as asystem configured to implement one or more aspects of the disclosedmethods.

BRIEF DESCRIPTION OF THE DRAWINGS

So that the manner in which the above recited features of the presentinvention can be understood in detail, a more particular description ofthe invention, briefly summarized above, may be had by reference toembodiments, some of which are illustrated in the appended drawings. Itis to be noted, however, that the appended drawings illustrate onlytypical embodiments of this invention and are therefore not to beconsidered limiting of its scope, for the invention may admit to otherequally effective embodiments.

FIG. 1A illustrates the overall network architecture of one possibleembodiment.

FIG. 1B is an alternate representation of the overall networkarchitecture of one possible embodiment.

FIG. 2 shows an exemplary format of the Network Advertisement messagesent out by a node about the best path to a particular network known byit.

FIG. 3 is a simplified representation of an exemplary routing tableconstructed at a node after it receives network advertisements from itsneighbors.

FIG. 4 is a diagram of an exemplary implementation of a triplet of FCIsaccording to an embodiment of the present invention.

FIG. 5 is a flowchart for a method according to an embodiment of thepresent invention for extending the battery life of a set of FCIs.

FIG. 6 is a flowchart for a method according to an embodiment of thepresent invention for selecting a lead node FCI.

FIG. 7 is a flowchart for a method according to an embodiment of thepresent invention for placing a non-lead node FCI into a sleep mode.

FIG. 8 is a flowchart for a method according to an embodiment of thepresent invention for transitioning lead node functionality from a firstlead node to a second lead node.

DETAILED DESCRIPTION

In the following description, numerous specific details are set forth toprovide a more thorough understanding of the present invention. It will,however, be apparent to one of skill in the art that the presentinvention may be practiced without one or more of these specificdetails. In other instances, well-known features have not been describedin order to avoid obscuring the present invention.

Embodiments of the present invention relate to the manner of operatingnetwork-enabled FCIs during a power failure. For example, embodiments ofthe present invention relate to the manner of extending thebattery-backed networking capabilities of FCIs. It is, however, usefulto first understand the operation of an RF network in which embodimentsof the present invention can be practiced. With this understanding, theoperation of battery backed network-enabled FCIs according toembodiments of the present invention can be better appreciated asdisclosed further below.

System Overview

Referring to FIG. 1A, a communications network may include a pluralityof nodes 140 and 130 linked to one another and to one or more accesspoints 120 within wireless LANs 160. Unless otherwise noted, accesspoints (APs) 120 are also called gateway as known to those of ordinaryskill in the art. APs 120 may be linked to one or more back officeutility servers (BOS) 150 via one or more wide area networks (WANs) 110.BOS 150 may be implemented on one or more computing devices.

In an embodiment implemented as a utility network, LANs 160 may beneighborhood area networks (NANs) corresponding to a neighborhood orservice area for the utility. As shown in the example embodiment,multiple LANs 160 may be used, which may or may not overlap. The nodesmay be any type of network device. Examples of network devices, ornodes, include utility nodes, which may include a utility meter or mayconnect to a utility meter. A utility meter is a device that is capableof measuring a metered quantity, typically a commodity like electricity,water, natural gas, etc. Utility nodes that connect to a utility metermay include a network interface card (NIC) for communicating on anetwork, may include one or more RF transceivers for communicating onone or more wireless LANs, and may include one or more utility meterinterface devices (a given utility node may interface with multiplemeters, which may or may not meter different commodities, such aselectricity, gas, water, etc.).

Utility nodes may also include an in-premise device interface to connectto in-premise devices through an in-premise network (which may or maynot be a wireless network). An in-premise device interface connects toin-premise devices so as to provide a communications link between theutility node and the in-premise devices. Additionally, the utility nodemay provide a communications link between the in premise devices and thewireless communications network connected to the utility node.

Other examples of network devices include communication devices, such asset-top boxes (as may be used in cable television or satellitetelevision delivery), household appliances, computers or computingdevices, networking devices such as relay, gateways, routers, phones,battery storage devices, transportation devices, transportationvehicles, entertainment devices, or other devices as may be found in ahome, business, roadway, parking lot, or other location.

Wireless LAN 160 may be any type of wireless network and may use anyfrequency, communications channel or communications protocol as would beknown to those of ordinary skill in the art. In embodiments of thepresent invention, one or more of wireless LANs 160 are FHSS(Frequency-Hopping Spread Spectrum) networks or DSSS (Direct SequenceSpread Spectrum) networks.

In an embodiment, in an initial network discovery phase, a node may usea process to scan through slots or channels to get to its neighbors andto get acknowledgement responses and an initial value of link qualityestimates from those discovered neighbors. This initial link qualityestimate may be used to select a number of best upstream neighbors totalk to (the number selected may be configurable).

In an embodiment, a node proceeds with a registration process with itsupstream nodes when the node intends to use these upstream nodes foregress to another network. In response to the registration message fromthe node, an upstream node adds the registering downstream node to thedownstream routing table entries maintained by the upstream node. Theupstream nodes may also proceed to maintain up-to-date timinginformation about the registering node in response to the registering bythe downstream node. Nodes routing through each other are preferably setup to exchange timing information periodically in order to remain insynchronization.

The registration of a node with one or more of the APs may then takeplace. This registration process can prompt the APs to add theregistering node to their routing tables and insure that the status ofthe node is up to date. The registration of a node with an AP may occurperiodically but more infrequently than the registration with anupstream node. In an embodiment, the frequency is on the order of onceevery 12 hours.

Each node (e.g., 130 and 140) in the wireless communication network maybe identified for end-to-end routing in any particular network by aunique address such as an IPv6 address. IPv6 addresses are typicallycomposed of two logical parts: a 64-bit network prefix and a 64-bit hostpart. Upon successful registration by a node with the AP, the AP mayhand the node data packets in the form of a TLV (Type Length Value)containing the network configuration, including the IPv6 globallyroutable prefix associated with the subnet the node is joining. The nodemay then send a Dynamic DNS update request (RFC 2136) to the NetworkHost Utility System DNS server. When a utility server (e.g., BOS 150)wants to send traffic into a wireless LAN, it may resolve the node's DNSname into an IPv6 address for Layer 3 (IP) routing through the WAN tothe correct AP. If the WAN is IPv4-based, IPv6 packets may beencapsulated within IPv4 with appropriate prefixes for tunneling throughthe IPv4 cloud. At BOS 150 and the AP 120, the received IPv6 packetwould be decapsulated. Other addressing schemes as known in the art arealso appropriate for use with embodiments of the present invention.

Link Layer Addressing

Each node (e.g., 130, 140) may be identified for routing in the WirelessLAN by a unique link layer address assigned to its radio interface. Forexample, each node may have only a single interface. Other embodimentscan have multiple discrete link layer addresses. Link layer address istypically 8 bytes long and is the device's MAC address. The link layerbroadcast address may be hex ff:ff:ff:ff:ff:ff (all ones). Packetstransmitted with this local broadcast address can be processed by thosewho receive them.

Routing Subsystem

A routing subsystem can utilize the code entity DLF (Data LinkForwarder) for Layer 2 routing and the code entity MLME (Media AccessControl Sub-Layer Management Entity) for acquiring neighbor nodes andmaintaining timing information between neighbors. The DLF interfaces tothe MLME through a set of APIs.

Neighbor Scan and Discovery

In an embodiment of the present invention, a node may discoverneighboring nodes using two basic processes: broadcast discovery andneighbor queries. When a node comes up, the MLME may find all of thenode's adjacencies (or directly connected RF links) through a broadcastdiscovery process. It may do this randomly to determine when it shouldstart sending broadcast discovery frames and then choose the channel onwhich to send the broadcast discovery frame (channel selection may bedone randomly). It may then cycle through every slot, transmitting eachsuccessive broadcast discovery frame on the next slot, and wrapping atthe last slot.

Once the discovery process has found a neighbor (adjacency), or a set ofneighbors, the MLME may then query the discovered neighbors for theirdirect neighbors (the direct neighbors can be provided in response).This may be done to discover the network environment more quickly (incontrast to broadcasting a large number of frames in hopes of contactingany one particular device). The neighbor query mechanism can be a simplequery/response. For example, a node receiving a neighbor query appliesthe criteria to the nodes in its list, and the nodes that “match” thecriteria are placed in the neighbor response. If no criterion is given,all the nodes in the list may be placed in the neighbor response.

Using the list of neighbors built up by the MLME, the DLF may try andfind advertised egress routes. It may accomplish this task by listeningfor “Network Advertisement” (NADV) messages from the nodes in the MLME'sneighbor table. The NADV message may advertise a set of egress routes,which may include the path cost and hop count of the egress routes. Pathcost can be the lowest cost associated with that egress, amongst allcandidate paths. Hop count can be the highest number of hops that aretaken to reach that egress. Hop count can be used to prevent routingloops, and may not be used in conjunction with the path cost. An exampleof the format of the NADV message is shown in FIG. 2. The DestinationMAC address can be the MAC address of the node originating the networkadvertisement. In most cases it can be the egress point (or the Gateway)since networks can be identified by their egress nodes.

From the advertisements received in the form of NADV messages, each nodecan construct a routing table listing the available networks, the egressnode identifying each of the networks, and the available paths to thategress node. Each of the available paths can be described with a nexthop, flags describing the type of path, and the link and path costs. Anexample of the information that may be captured in the routing table islaid out in FIG. 3.

From the routing table information, nodes may construct a forwarding ornext-hop table with a list of destination MAC addresses, a typeassociated with each address, and the path cost for it. In oneembodiment, the type reflects the selection preference associated withthe destination and may be one of the five: source-routed, hop-by-hop,direct adjacency, breadcrumb, or local.

Node Registration with Upstream Neighbors

Each node may explicitly register with the upstream nodes it intends touse in a network. This registration means that the upstream node may nowattempt to keep up-to-date timing information about the registeringnode, and keep a downstream routing table entry. Thus, traffic cannotonly flow towards the egress, but also back to the node (downstream).

The node registers with its upstream node by sending it an “UpstreamRegister” message. The “Upstream Register” message may contain thedevice's type, and a neighborhood health metric. The neighborhood healthmetric can be used to cull downstream nodes when an upstream becomesoverloaded. Devices with a low neighborhood health metric (and thereforepresumably low path diversity) can be preferentially selected beforedevices with high neighborhood health metrics.

Implementation of NIC-Enabled FCIs

To be discussed now are battery-backed network-enabled FCIs that can actas nodes 130 and 140 as shown in FIG. 1. Shown in FIG. 4 is a diagram ofthe manner in which NIC-enabled FCIs are implemented in a powerdistribution system 400 according to an embodiment of the presentinvention. As shown in FIG. 4, power distribution system 400 includes aplurality of power poles such as power poles 402-1 and 402-2. On suchpower poles, three-phase power lines 404-1, 404-2, and 404-3 aresuspended. Each of these power lines distributes one phase of athree-phase power system. FCIs 406-1, 406-2, and 406-3 are coupled topower lines 404-1, 404-2, and 404-3, respectively, so as to monitortheir status.

In traditional systems, FCIs were limited in functionality to monitoringthe status of the power lines. In an embodiment of the presentinvention, however, FCI 406 (e.g., FCIs 406-1, 406-2, and 406-3)includes network interface card (NIC) 408 that includes functionalityfor operating as nodes in an RF mesh network and further includescomputing resources so as to implement methods according to embodimentsof the present invention. FCIs 406 are, therefore, able to report thestatus of power lines 404 (e.g., power lines 404-1, 404-2, and 404-3)and are also able to receive and forward network communications in an RFmesh network through the use of NIC 408. For example, FCIs 406 canoperate as nodes 140 and 130 as shown in FIG. 1 as discussed above.

In an embodiment, FCI 406 is continuously inductively powered by powerline 404 which it monitors. When power line 404 is properly functioning,NIC 408 has sufficient power to operate continuously. FCI 406 is furtherprovided with a battery backup system for situations where power lines404 fail and are no longer conducting power that can be inductivelycoupled to FCI 406. Such battery power, however, is limited. Forexample, the batteries of certain FCIs are specified to power the FCIfor approximately two hours.

Where power fails to all three phases of power (e.g., no power to powerlines 404-1, 404-2, and 404-3), the set of three FCIs is able to operatetheir collective NICs for two hours. Notably, however, in manysituations NIC 408 of an individual FCI 406 has enough communicationcapacity to handle the network traffic of the collective three FCIs406-1, 406-2, and 406-3. Moreover, whereas FCIs 406-1, 406-2, and 406-3may be staggered across the spans of power lines 404-1, 404-2, and404-3, respectively, they are seen as essentially the same point fromthe perspective of other wireless nodes. For example, from a distantnode, the distance and wireless communication path to each of FCIs406-1, 406-2, and 406-3 is essentially the same.

Extending Battery Life of a Set of NIC-Enabled FCIs

An embodiment of the present invention operates each of FCIs 406-1,406-2, and 406-3 serially in time so as to substantially extend theoperating time of the collective FCIs 406-1, 406-2, and 406-3 by threetimes. For example, instead of simultaneously operating all three FCIs406-1, 406-2, and 406-3 and their corresponding NICs 408 for two hours,an embodiment of the present invention essentially serially operatesonly one FCI 406 at a time to obtain three times the operating time ofessentially the same RF node. Note that in certain discussions below,the collection of three FCIs 406-1, 406-2, and 406-3 will be called atriplet of FCIs 406 for convenience.

An embodiment of the present invention for extending the operating timeof a battery-operated triplet of FCIs 406 is shown in flowchart 500 ofFIG. 5. It should be noted that the described embodiments areillustrative and do not limit the present invention. It should furtherbe noted that the method steps need not be implemented in the orderdescribed. Indeed, certain of the described steps do not depend fromeach other and can be interchanged. For example, as persons skilled inthe art will understand, any system configured to implement the methodsteps, in any order, falls within the scope of the present invention.

As shown in FIG. 5, method 500 begins when a power failure is detectedin the power lines that are being monitored by the FCIs. At step 504,FCI1 is chosen to operate as the lead node. In doing so, FCI 1 takesover the RF mesh operations that were being handled by FCI2 and FCI3 soas to allow FCI2 and FCI3 to smoothly transition into a sleep or reducedpower mode at step 506. Note that in the present discussion, the termsFCI1, FCI2, and FCI3 are intended to be references to any arbitrary FCIin the triplet and is not intended to be a reference to any particularFCI.

FCI1 continues to operate as the lead node until it loses power andtransitions its lead node functions to FCI2 at step 508. Preferably,FCI1 is not completely drained of power so as to smoothly transitionnetwork functionality to FCI2 at step 508.

FCI2 continues to operate as the lead node until it loses power andtransitions its lead node functions to FCI3 at step 510. Preferably,FCI2 is not completely drained of power so as to smoothly transitionnetwork functionality to FCI3 at step 514. In performing method 500 ofFIG. 5, the triplet of FCIs is able to perform RF networkingfunctionality for substantially three times the operating time of anyone FCI.

An embodiment of the present invention for choosing a lead node among atriplet of a battery-operated FCIs 406 is shown in flowchart 600 of FIG.6. It should be noted that the described embodiments are illustrativeand do not limit the present invention. It should further be noted thatthe method steps need not be implemented in the order described. Indeed,certain of the described steps do not depend from each other and can beinterchanged. For example, as persons skilled in the art willunderstand, any system configured to implement the method steps, in anyorder, falls within the scope of the present invention.

As shown in FIG. 6, method 600 begins when a power failure is detectedat step 602 in the power lines that are being monitored by the FCIs. Inan embodiment, at step 604, each FCI performs a battery check. Forexample, various types of information may be available regarding thefunctionality of the battery of each FCI. For example, a batterystrength parameter may be available that provides an indicator of therelative health of the battery. Alternatively, a battery life estimatemay be available based on short-term or long-term utilizationinformation.

Each FCI then transmits a lead status message at step 606. In anembodiment, the message transmission time is randomized with respect tothe battery status. For example, nodes with larger battery power sendtheir message sooner. In this way, the FCI with the strongest batterytransmits its lead status message first and has a higher likelihood ofindeed becoming the lead node.

In certain situations it is preferred to choose the FCI with the bestbattery status as the first lead node because the battery life of oneFCI may be sufficient to provide RF networking functionality for theduration of the entire power failure. For example, steps 508 through 514of FIG. 5 may be obviated if the power failure is shorter than thebattery life of the first-chose lead FCI.

Other schemes may be implemented for choosing a lead node. For example,a lead node can be chosen as a first FCI to transmit its detection of apower failure. In yet another embodiment, a priority may bepredetermined among the triplet of FCIs for functioning as a leader.

At step 608 according to an embodiment of the present invention, the FCIthat transmits the first lead status message is chosen as the first leadnode FCI. In another embodiment, where battery status information istransmitted at step 606, a lead node FCI is chosen at step 608 accordingto the best battery status (e.g., strongest battery). Otherimplementations are also possible as would be understood by those ofordinary skill upon understanding the teachings of the presentinvention.

An embodiment of the present invention for entering a sleep mode forbattery-operated FCIs 406 that are not chosen as the lead node FCI isshown in flowchart 700 of FIG. 7. It should be noted that the describedembodiments are illustrative and do not limit the present invention. Itshould further be noted that the method steps need not be implemented inthe order described. Indeed, certain of the described steps do notdepend from each other and can be interchanged. For example, as personsskilled in the art will understand, any system configured to implementthe method steps, in any order, falls within the scope of the presentinvention.

As shown in FIG. 7, after a lead node FCI is chosen, each FCI that isnot chosen as the lead checks the status of the lead node at step 702.For example, in an embodiment, the nodes not chosen as the lead nodeobtain battery information from the lead node. In another embodiment,network utilization information may also be obtained. Based on thestatus of the lead node, a non-lead node FCI determines an amount oftime to sleep at step 704. For example, based on battery levelinformation, an estimate can be generated for the theoretical operatingtime of the lead node. In another embodiment, an estimated operatingtime for the lead node is generated based on battery information as wellas network utilization information. For example, if there exists a highaverage network utilization, it can be expected that the battery of thelead node will be more quickly depleted. In an embodiment, a sleep timeis chosen that is shorter than the expected battery life of the leadnode. This is preferred so as to more smoothly transition lead nodefunctionality from one FCI to another without disrupting networkcommunications. For example, a sleep time may be chosen as a percentage(e.g., 90%) of the expected battery life of the lead node. Otherimplementations are also possible as would be understood by those ofordinary skill upon understanding the teachings of the presentinvention.

At step 706, the non-lead node FCI enters a sleep mode for the timedetermined at step 704. In a triplet configuration according to anembodiment of the present invention, one FCI is selected as the leadnode and the remaining two FCIs independently perform method 700 of FIG.7 to enter a sleep mode and preserve power. In an embodiment of thepresent invention the determined sleep time is randomized within a rangeso that the two non-lead FCIs do not remain in a sleep mode for exactlythe same time. Other implementations are also possible as would beunderstood by those of ordinary skill upon understanding the teachingsof the present invention.

A sleep mode can be implemented in various ways. For example, in anembodiment, a sleep mode is implemented as a reduced power mode fromwhich an FCI and its network capabilities can quickly power up.Preferably, such a sleep mode uses a low amount of power. In anotherembodiment, a sleep mode is implemented as a complete shutdown of theNIC. This embodiment uses the least amount of power during the sleepmode but may use more power to power up and may take longer to power upthan a reduced operation sleep mode. Other implementations are alsopossible as would be understood by those of ordinary skill uponunderstanding the teachings of the present invention.

An embodiment of the present invention for transitioning lead nodefunctionality from one battery-operated FCI 406 to another is shown inflowchart 800 of FIG. 8. It should be noted that the describedembodiments are illustrative and do not limit the present invention. Itshould further be noted that the method steps need not be implemented inthe order described. Indeed, certain of the described steps do notdepend from each other and can be interchanged. For example, as personsskilled in the art will understand, any system configured to implementthe method steps, in any order, falls within the scope of the presentinvention.

In an embodiment, method 800 is independently implemented by eachnon-lead node FCI. As shown in FIG. 8, at step 802, a sleeping FCI wakesup. Upon waking up, such FCI obtains the status of the lead node at step804. For example, the FCI may first check for the existence of the leadnode. This can be important because, although a sleep time wasdetermined so as to wake up before the lead node was drained of power,many things could have happened while the FCI was sleeping. For example,the lead node FCI may have become completely drained of power. Also,because the non-lead node FCIs operate independently in an embodiment ofthe invention, another FCI may have assumed lead node functionality.

Based on the status of the lead node, a determination is made at step806 as to whether the then-existing lead node can remain the lead node.In an embodiment, based on a predetermined threshold battery level, alead node may remain as a lead node. For example, if the battery levelof the lead node is above a predetermined level (e.g., below 10% of itsuseful level), it will remain the lead node and steps 808 and 810 areperformed. But if the battery level of the lead node is below apredetermined level (e.g., above 10% of its useful level), the FCIperforming method 800 will then perform step 812. Other criteria can beused at step 806 while keeping within the teachings of the presentinvention. For example, network utilization information may also beconsidered.

Where it is determined that the then-existing lead node should continueas the lead node, step 808 is performed to determine a sleep time forthe FCI. For example, based on battery level information, an estimatecan be generated for the operating time of the lead node. In anotherembodiment, an estimated operating time for the lead node is generatedbased on battery information as well as network utilization information.For example, if there exists a high average network utilization, it canbe expected that the battery of the lead node will be more quicklydepleted. In an embodiment, a sleep time is chosen that is shorter thanthe expected battery life of the lead node. This is preferred so as tomore smoothly transition lead node functionality from one FCI toanother. For example, a sleep time may be chosen as a percentage (e.g.,90%) of the expected battery life of the lead node.

At step 810, the FCI that was non-lead node FCI enters a sleep mode forthe time determined at step 808. After sleeping for the determinedamount of time, method 800 is repeated as indicated by arrow 814.

Where it is determined that the then-existing lead node should notcontinue as the lead node, step 812 is performed in an embodiment so asto transition lead node functionality to the FCI performing method 800.In an embodiment, the then-existing lead node notifies all of itsnetwork connected nodes to transition networking functionality to thenew lead node FCI. In another embodiment, the new lead node FCItransmits its availability to accept network traffic. After allnetworking functionality is transitioned from the old lead node to thenew lead node, step 814 is performed to power down the old lead node.Note that steps 802 through 812 are shown in solid-line boxes toindicate that in an embodiment such steps are performed by an FCI thatwas not chosen as the initial lead node, and step 814 is shown in adotted-line box to indicate that it is perform by a separate FCI (i.e.,the initially chosen lead node).

While the forgoing is directed to embodiments of the present invention,other and further embodiments of the invention may be devised withoutdeparting from the basic scope thereof. For example, aspects of thepresent invention may be implemented in hardware or software or in acombination of hardware and software. One embodiment of the inventionmay be implemented as a program product for use with a computer system.The program(s) of the program product define functions of theembodiments (including the methods described herein) and can becontained on a variety of computer-readable storage media. Illustrativecomputer-readable storage media include, but are not limited to: (i)non-writable storage media (e.g., read-only memory devices within acomputer such as CD-ROM disks readable by a CD-ROM drive, flash memory,ROM chips or any type of solid-state non-volatile semiconductor memory)on which information is permanently stored; and (ii) writable storagemedia (e.g., floppy disks within a diskette drive or hard-disk drive orany type of solid-state random-access semiconductor memory) on whichalterable information is stored. Such computer-readable storage media,when carrying computer-readable instructions that direct the functionsof the present invention, are embodiments of the present invention.

In view of the foregoing, the scope of the present invention isdetermined by the claims that follow.

We claim:
 1. A computer-implemented method for increasing the operatingtime of battery-backed wireless network nodes, the method comprising:detecting a power outage associated with one or more power lines thatpower a plurality of nodes that are part of a wireless network; inresponse to the power outage, selecting a first node included in theplurality of nodes as a lead node; transitioning network functionalityfrom one or more other nodes included in the plurality of nodes to thefirst node; and placing the one or more other nodes into reduced powerstates.
 2. The method of claim 1, wherein each of the one or more nodesis placed into the reduced power state for a respective predeterminedamount of time.
 3. The method of claim 1, wherein each node in theplurality of nodes is incorporated as part of a fault circuit indicator.4. The method of claim 1, further comprising selecting the first nodebased on a respective battery status for each node included in theplurality of nodes.
 5. The method of claim 1, further comprising, foreach node included in the plurality of nodes, transmitting a statusmessage based on the respective battery status.
 6. The method of claim5, further comprising, for each node included in the plurality of nodes,determining the respective predetermined time based on the respectivebattery status.
 7. The method of claim 1, further comprising obtaining astatus of the first node; and determining whether the first node shouldcontinue to maintain the network functionality based on the status. 8.The method of claim 7, further comprising waking up a second nodeincluded in the one or more other nodes.
 9. The method of claim 8,further comprising transitioning the network functionality from thefirst node to the second node upon determining that the first nodeshould not continue to maintain the network functionality.
 10. Themethod of claim 9, further comprising powering down the first node afternetwork functionality has been transitioned to the second node.
 11. Themethod of claim 8, further comprising placing the second node intoanother reduced power state upon determining that the first node shouldcontinue to maintain the network functionality.
 12. Acomputer-implemented method, comprising: in response to a power outageassociated with a plurality of power lines that power a plurality ofnodes that are part of a wireless mesh network, selecting a first nodeincluded in the plurality of nodes to manage the wireless mesh network;transitioning network functionality from all other nodes included in theplurality of nodes to the first node; and placing the all other nodesinto reduced power states.
 13. The method of claim 12, wherein each nodeincluded in the plurality of nodes is associated with a fault circuitindicator.
 14. The method of claim 12, further comprising selecting thefirst node based on a respective battery status for each node includedin the plurality of nodes.
 15. The method of claim 12, furthercomprising obtaining a status of the first node; and determining whetherthe first node should continue to maintain the network functionalitybased on the status.
 16. The method of claim 15, further comprisingwaking up a second node included in the one or more other nodes.
 17. Themethod of claim 16, further comprising transitioning the networkfunctionality from the first node to the second node upon determiningthat the first node should not continue to maintain the networkfunctionality.
 18. The method of claim 15, further comprising poweringdown the first node after network functionality has been transitioned tothe second node
 19. A wireless network device configured to perform oneor more mesh network operations, the wireless network device comprising:a transceiver circuit configured to generate and receive radio signals;and a processor that is coupled to the transceiver circuit and, uponexecuting a set of instructions, is configured to: monitor a pluralityof power lines that power at least a portion of a wireless mesh networkwithin which the wireless network device acts as a node; detect a poweroutage associated with the plurality of power lines; in response,transmitting a status message based on a battery check; and if selectedas a lead node based on the status message, then take over one or moremesh network operations being performed by a first node included in thewireless mesh network, or if not selected as the lead node based on thestatus message, then transition the one or more mesh network operationsto another node included in the wireless mesh network, and enter into areduced power state.
 20. The wireless network device of claim 19,wherein the processor is further configured to perform the one or moremesh network operations taken over from the first node until thewireless network device loses power.
 21. The wireless network device ofclaim 20, wherein, prior to losing power, the processor is furtherconfigured to transition the one or more mesh network operations takenover from the first node to some other node, including the first node,included in the wireless mesh network.