-
公开(公告)号:US09264974B2
公开(公告)日:2016-02-16
申请号:US14048023
申请日:2013-10-07
Applicant: Avaya Inc.
Inventor: Shashi Hosakere Ankaiah , Vivek L Atreya , Deepak Ramesh , Prasad Vadassery , Shyam Natarajan , Uday Shankar
CPC classification number: H04W40/36 , H04L12/4633 , H04W8/14
Abstract: Systems, methods and computer readable media for mobility integration with fabric-enabled networks are described. Some implementations can include a method comprising terminating, using one or more processors, an access tunnel at an edge switch of a fabric-enabled network, and establishing, using the one or more processors, a mobility tunnel with the edge switch. The method can also include mapping, using the one or more processors, a mobility network to a service identifier associated with the mobility network. The method can further include forwarding, using the one or more processors, traffic for the mobility network from the edge switch to another edge switch across the fabric enabled network, wherein the traffic includes the service identifier.
Abstract translation: 描述了与支持Fabric的网络进行移动性集成的系统,方法和计算机可读介质。 一些实施方式可以包括一种方法,包括:使用一个或多个处理器终止在启用网络的网络的边缘交换机处的接入隧道,以及使用所述一个或多个处理器建立与所述边缘交换机的移动性隧道。 该方法还可以包括使用一个或多个处理器将移动网络映射到与移动网络相关联的服务标识符。 该方法还可以包括使用一个或多个处理器,通过跨架构启用的网络从边缘交换机到另一边缘交换机转发用于移动网络的流量,其中流量包括服务标识符。
-
公开(公告)号:US09723488B2
公开(公告)日:2017-08-01
申请号:US14927062
申请日:2015-10-29
Applicant: Avaya Inc.
Inventor: Vivek L Atreya , Ruth Tsai , Seemant Choudhary , Shashi Hosakere Ankaiah
CPC classification number: H04W12/08 , H04L63/14 , H04L63/1416 , H04L63/1441 , H04W12/12 , H04W48/18 , H04W84/12 , H04W88/08
Abstract: Methods, systems and computer readable media for rogue access point detection are disclosed. In some implementations, the method can include initiating, at one or more processors of a wireless controller, a rogue access point detection process for a wireless network, and transmitting, from the one or more processors, a signature frame to a mobility agent in a wireless switch. The method can also include receiving, at an authorized access point, the signature frame transmitted via a wireless signal from a rogue access point. The method can further include reporting reception of the signature frame to the wireless controller, and generating, at the one or more processors, a signal to shut down a port associated with the rogue access point.
-
公开(公告)号:US09357484B2
公开(公告)日:2016-05-31
申请号:US14077095
申请日:2013-11-11
Applicant: Avaya Inc.
Inventor: Vivek L Atreya , Shashi Hosakere Ankaiah , M. S Badari Narayana
CPC classification number: H04W52/0206 , H04W24/08 , H04W84/12 , H04W88/12 , Y02D70/00 , Y02D70/142
Abstract: One or more implementations can include methods, systems and computer readable media for elastic wireless control planes. In some implementations, the method can include evaluating one or more elastic wireless control plane mode factors, and partitioning each of a plurality of access points into one of an active mode group and a sleep mode group based on the evaluating. The method can also include determining a number of wireless control plane instances needed based on the partitioning. The method can further include activating the number of wireless control plane instances and shutting down any excess wireless control plane instances beyond the number.
Abstract translation: 一个或多个实现可以包括用于弹性无线控制平面的方法,系统和计算机可读介质。 在一些实施方式中,该方法可以包括评估一个或多个弹性无线控制平面模式因子,并且基于评估将多个接入点中的每一个划分为活动模式组和休眠模式组中的每一个。 该方法还可以包括基于划分来确定所需的无线控制平面实例的数量。 该方法还可以包括激活无线控制平面实例的数量并且关闭超出数量的任何多余的无线控制平面实例。
-
公开(公告)号:US20150098443A1
公开(公告)日:2015-04-09
申请号:US14048023
申请日:2013-10-07
Applicant: Avaya Inc.
Inventor: Shashi Hosakere Ankaiah , Vivek L Atreya , Deepak Ramesh , Prasad Vadassery , Shyam Natarajan , Uday Shankar
CPC classification number: H04W40/36 , H04L12/4633 , H04W8/14
Abstract: Systems, methods and computer readable media for mobility integration with fabric-enabled networks are described. Some implementations can include a method comprising terminating, using one or more processors, an access tunnel at an edge switch of a fabric-enabled network, and establishing, using the one or more processors, a mobility tunnel with the edge switch. The method can also include mapping, using the one or more processors, a mobility network to a service identifier associated with the mobility network. The method can further include forwarding, using the one or more processors, traffic for the mobility network from the edge switch to another edge switch across the fabric enabled network, wherein the traffic includes the service identifier.
Abstract translation: 描述了与支持Fabric的网络进行移动性集成的系统,方法和计算机可读介质。 一些实施方式可以包括一种方法,包括:使用一个或多个处理器终止在启用网络的网络的边缘交换机处的接入隧道,以及使用所述一个或多个处理器建立与所述边缘交换机的移动性隧道。 该方法还可以包括使用一个或多个处理器将移动网络映射到与移动网络相关联的服务标识符。 该方法还可以包括使用一个或多个处理器,通过跨架构启用的网络从边缘交换机到另一边缘交换机转发用于移动网络的流量,其中流量包括服务标识符。
-
公开(公告)号:US09723493B2
公开(公告)日:2017-08-01
申请号:US14033337
申请日:2013-09-20
Applicant: Avaya Inc.
Inventor: Vivek L Atreya , Shashi H Ankaiah , Seemant Choudhary
CPC classification number: H04W16/18 , H04W24/02 , H04W24/04 , H04W72/0453
Abstract: Implementations relate to configuring wireless access points in a wireless network. In some implementations, a method includes selecting, from a plurality of wireless access points in a communication network, a configuring subset of wireless access points and a different compensating subset of wireless access points. New settings are applied to the compensating subset of wireless access points to change a physical coverage of wireless communication provided by the compensating subset, thus at least partially compensating for disabled wireless communication of the configuring subset. The method disables wireless communication provided by the configuring subset, and configures the disabled configuring subset of wireless access points.
-
公开(公告)号:US09414289B2
公开(公告)日:2016-08-09
申请号:US14138105
申请日:2013-12-22
Applicant: Avaya Inc.
Inventor: Shashi Hosakere Ankaiah , Vivek L Atreya , Seemant Choudhary
CPC classification number: H04W36/32
Abstract: Methods, systems and computer readable media for predictive client VLAN extension are described. In some implementations, the method can include determining client movement within a wireless network domain. The method can also include predicting one or more next hop access points for the client. The method can further include extending a client network to the one or more next hop access points prior to the client roaming to the one or more next hop access points.
Abstract translation: 描述了用于预测性客户端VLAN扩展的方法,系统和计算机可读介质。 在一些实现中,该方法可以包括确定无线网络域内的客户端移动。 该方法还可以包括为客户端预测一个或多个下一跳接入点。 该方法还可以包括在客户端漫游到一个或多个下一跳接入点之前将客户端网络扩展到一个或多个下一跳接入点。
-
公开(公告)号:US09178896B2
公开(公告)日:2015-11-03
申请号:US13891184
申请日:2013-05-09
Applicant: Avaya Inc.
Inventor: Vivek L Atreya , Ruth Tsai , Seemant Choudhary , Shashi Hosakere Ankaiah
CPC classification number: H04W12/08 , H04L63/14 , H04L63/1416 , H04L63/1441 , H04W12/12 , H04W48/18 , H04W84/12 , H04W88/08
Abstract: Methods, systems and computer readable media for rogue access point detection are disclosed. In some implementations, the method can include initiating, at one or more processors of a wireless controller, a rogue access point detection process for a wireless network, and transmitting, from the one or more processors, a signature frame to a mobility agent in a wireless switch. The method can also include receiving, at an authorized access point, the signature frame transmitted via a wireless signal from a rogue access point. The method can further include reporting reception of the signature frame to the wireless controller, and generating, at the one or more processors, a signal to shut down a port associated with the rogue access point.
Abstract translation: 公开了用于流氓接入点检测的方法,系统和计算机可读介质。 在一些实现中,该方法可以包括在无线控制器的一个或多个处理器处发起用于无线网络的流氓接入点检测过程,并且从一个或多个处理器将签名帧发送到移动代理 无线开关 该方法还可以包括在授权接入点处接收经由无线接入点的无线信号发送的签名帧。 该方法还可以包括向无线控制器报告签名帧的接收,以及在一个或多个处理器处生成用于关闭与流氓接入点相关联的端口的信号。
-
公开(公告)号:US09021569B1
公开(公告)日:2015-04-28
申请号:US14160527
申请日:2014-01-21
Applicant: Avaya Inc.
Inventor: Tejas Kashyap V , Vivek L Atreya , Shashi Ankaiah
CPC classification number: G06F21/35 , H04L63/107 , H04W12/06
Abstract: Methods, systems and computer readable media for providing and managing wireless guest access are described. In some implementations, the method can include a method comprising mining event details including a list of one or more guest attendees for which wireless guest access is selected and a corresponding email address for each of the one or more guest attendees from an event request. The method can also include generating wireless guest access credentials for each of the one or more guest attendees that accept the request, and transmitting corresponding wireless guest access credentials to each guest attendee via email using the corresponding email address. The method can further include receiving an indication that one or more of the guest attendees has connected to a wireless network, and causing a guest access page to be displayed for each guest attendee connecting to the network. The method can also include providing an interface for entering the wireless guest access credentials via the guest access page, and validating the guest access credentials. The method can also include, when the guest access credentials are valid, permitting the guest attendee associated with those credentials to access the wireless network.
Abstract translation: 描述了用于提供和管理无线访客访问的方法,系统和计算机可读介质。 在一些实施方式中,该方法可以包括一种方法,该方法包括:挖掘事件详细信息,其中包括一个或多个客户参与者的列表,对于该客户参与者列表选择无线访客访问;以及相应的电子邮件地址用于来自事件请求的一个或多个客人参与者 该方法还可以包括为接受请求的一个或多个客席参与者中的每一个生成无线访客访问凭证,以及使用相应的电子邮件地址通过电子邮件将相应的无线访客访问凭证发送给每个客人参加者。 该方法还可以包括接收一个或多个客人参加者已经连接到无线网络的指示,并且为连接到网络的每个客人参加者显示访客访问页面。 该方法还可以包括提供用于经由访客访问页面输入无线访客访问凭证并验证访客访问凭证的界面。 该方法还可以包括当访客访问凭证有效时,允许与这些凭证相关联的客人参与者访问无线网络。
-
-
-
-
-
-
-