摘要:
A set of new information elements are defined that are to be used between an access point and a client that allow an access point to advertise its capabilities, configuration, and/or parameters allowing the client to tune to the parameters prior to, during, or after associating with the access point. If the access point adjusts these parameters, the changes are advertised in subsequent beacons and response frames and the client responsive to receiving a beacon or response frame with changed parameters will change its parameters accordingly. If the station changes its operating parameters it will send a message to the access point informing the access point of the changes.
摘要:
Methods and apparatus are disclosed for locating and disabling the. switch port of a rogue wireless access point. In one embodiment, a network management device is configured to detect the presence of a rogue access point on a managed wireless network. Once detected, the management device may then instruct a special client, such as a scanning AP, to associate with the rogue access point and send a discovery packet through the rogue access point to network management device. The network management device upon receiving the discovery packet may thereby determine that the rogue access point is connected to a network managed by said network device. The network device may then utilize information contained in the discovery packet to locate the switch port to which the rogue access .point is connected, and ultimately disable the switch port to which the rogue access point is connected.
摘要:
A set of new information elements are defined that are to be used between an access point and a client that allow an access point to advertise its capabilities, configuration, and/or parameters allowing the client to tune to the parameters prior to, during, or after associating with the access point. If the access point adjusts these parameters, the changes are advertised in subsequent beacons and response frames and the client responsive to receiving a beacon or response frame with changed parameters will change its parameters accordingly. If the station changes its operating parameters it will send a message to the access point informing the access point of the changes.
摘要:
A detection-based defense to a wireless network. Elements of the infrastructure, e.g., access points or scanning-only access points, detect intruders by detecting spoofed frames, such as from rogue access points. Access points include a signature, such as a message integrity check, with their management frames in a manner that enables neighboring access points to be able to validate the management frames, and to detect spoofed frames. When a neighboring access point receives a management frame, obtains a key for the access point sending the frame, and validates the management frame using the key.
摘要:
A technique for network planning that includes an interface for guiding a network user through the network allocation process, such as defining groups of clients based on their capabilities. Portions of the wireless local area network infrastructure, e.g., access points, are allocated among the groups. When a client attempts to associate with an access point, the access point determines the client capabilities. If the client is supported by the access point, the access point allows the client to associate and sends the client a message that contains a prioritized list of other nearby access points allocated to service that client, otherwise the access point sends a prioritized roaming list of nearby access points to the client that are allocated to serve that type of client. Feedback is provided by the network infrastructure enabling a network user or the network to automatically reallocate resources based on the feedback.
摘要:
Systems and methods for evaluating wireless network quality. A metric provided by embodiments of the present invention relies on information that is relatively easy to collect, can be very efficiently computed, and yet provides a realistic estimate of likely wireless network performance. In one implementation, the input includes path loss data and access point transmitter power level and frequency settings. A capacity indicator is computed for each client and each access point. A data rate indicator is computed for each client location. The traffic load is computed for each access point. Based on these computed indicators, a bidirectional client throughput can be computed for each client and a combined metric can be determined for the network as a whole.
摘要:
Methods and apparatus are disclosed for locating and disabling the. switch port of a rogue wireless access point. In one embodiment, a network management device is configured to detect the presence of a rogue access point on a managed wireless network. Once detected, the management device may then instruct a special client, such as a scanning AP, to associate with the rogue access point and send a discovery packet through the rogue access point to network management device. The network management device upon receiving the discovery packet may thereby determine that the rogue access point is connected to a network managed by said network device. The network device may then utilize information contained in the discovery packet to locate the switch port to which the rogue access .point is connected, and ultimately disable the switch port to which the rogue access point is connected.