摘要:
There is provided a computer-implemented method for transmitting data over a wireless network using white spaces. A first white space transmission channel is determined for communicating with mobile client devices. Wireless communication takes place with the mobile client devices over the first white space transmission channel. If the first white space transmission channel becomes unavailable to one of the mobile client devices because of the presence of a primary user on the first white space transmission channel, a different white space transmission channel is determined for communicating with the mobile client device that is affected. The first white space transmission channel may become unavailable to the affected mobile client device, for example, because a primary user begins using the first white space transmission channel in proximity to the affected device. The primary user may be a wireless microphone. Thereafter, communication with the affected wireless device takes place on the different white space transmission channel, while unaffected devices continue to communicate on the first white space transmission channel. Also provided are an exemplary wireless base station and an exemplary mobile client device.
摘要:
A method to determine if a rogue device is connected to a specific wired network from dynamic host control protocol (DHCP) requests on the wired network. These DHCP requests are analyzed to determine the type of device issuing the request. Once the type of device has been determined, it can be checked against a list of authorized device types. If the device issuing the DHCP request is not an authorized device type, then it can be determined that the suspect device is a rogue that is connected to the specific wired network. Additionally, even if the system of the present invention determines that it is an authorized device type, if the device is not one of the few authorized devices of this type, e.g. because its MAC address is not recognized as that of one of the authorized devices, the system can flag the suspect as a rogue.
摘要:
A “Wi-Fi Multicaster” provides a practical and efficient Wi-Fi multicast system for environments having potentially large numbers of Wi-Fi clients. Significantly, the Wi-Fi Multicaster does not require any changes to the 802.11 protocol, or to the underlying Wi-Fi infrastructure. In various embodiments, the Wi-Fi Multicaster uses pseudo-broadcast, and augments it with destination control, association control and optional proactive FEC (forward error correction) to improve multicast performance. More specifically, the Wi-Fi Multicaster system converts multicast packets to targeted unicast transmissions. To minimize the amount of airtime consumed, the Wi-Fi Multicaster uses destination control in combination with various algorithms for association control. Further, in various embodiments, the Wi-Fi Multicaster includes an adaptive, proactive FEC scheme to reduce overall packet losses. Finally, to overcome the challenges posed by encryption protocols such as 802.1x, the Wi-Fi Multicaster uses a “virtual multicast interface” that allows clients to “share” a common key for each multicast.
摘要:
Dynamic time-spectrum block allocation for cognitive radio networks is described. In one implementation, without need for a central controller, peer wireless nodes collaboratively sense local utilization of a communication spectrum and collaboratively share white spaces for communication links between the nodes. Sharing local views of the spectrum utilization with each other allows the nodes to dynamically allocate non-overlapping time-frequency blocks to the communication links between the nodes for efficiently utilizing the white spaces. The blocks are sized to optimally pack the available white spaces. The nodes regularly readjust the bandwidth and other parameters of all reserved blocks in response to demand, so that packing of the blocks in available white spaces maintains a fair distribution of the overall bandwidth of the white spaces among active communication links, minimizes finishing time of all communications, reduces contention overhead among the nodes contending for the white spaces, and maintains non-overlapping blocks.
摘要:
Exemplary methods, computer-readable media, and systems for detecting a fault by a packet trace, includes monitoring at least one packet transmitted to or received from, an computing device of an end user, between one or more computing devices implementing at least one of a service or an application on an enterprise network. The process also includes identifying whether an abnormal condition occurred on the computing device of the end user based on monitoring at least one packet transmitted to or received from, the computing device of the end user; and detecting a fault by using an algorithm based on monitoring at least one packet transmitted or received from, the computing device of the end user; wherein the fault indicates a desired course of action did not occur while the computing device of the end user uses at least one of the service or the application in the enterprise network.
摘要:
A method is provided, wherein the method comprises identifying nearby wireless communication access points (APs) to which a client computing environment can cooperate with to communicate and receive data through a subscription to a neighborcast group from indentified nearby cooperating access points such that illustratively the neighborcast group comprises a communications overlay between cooperating client computing environments employing the identified nearby wireless communications access points. In an illustrative implementation, a wireless communications environment comprises at least two client computing environments comprising a communications overlay engine operable to process at least one instruction from an exemplary instruction set to perform one or more wireless communications operations over the exemplary communications overlay comprising scanning for cooperating client computing environments and/or wireless access points and/or RSS servers, subscribing to the communications overlay group, and publishing data for consumption by cooperating components of the wireless communications overlay.
摘要:
A local network coding framework and method including techniques to improve efficiency in a wireless network by reducing overhead. The local network coding method includes exchanging data availability between nodes on the wireless network by sending Bloom filters of lists of packets to neighboring nodes. Based on data availability, optimized mixing of pure packets is performed to form mixture packets for output. A separate acknowledgement buffer keeps track of the pure packets transmitted but not acknowledged. If an acknowledgement does not arrive after a certain time period, the packet is assumed to be lost and is retransmitted. An optimized packet mixing process generates mixture packets and decides which nodes to send the mixture packets. The local network coding framework and method also includes methods for representing the composition of a mixture packet and using mixing at a wireless access point to improve the performance of the wireless local area network.
摘要:
A system and method for using a wireless beacon broadcast to provide a media message is disclosed. A first beacon broadcast is provided from a wireless access point, the first beacon broadcast having a first beacon component with a first portion of media. A second beacon broadcast is provided from the wireless access point, the second beacon broadcast having a second beacon component with a second portion of media. The first portion of media and the second portion of media are combinable to provide a complete media message.
摘要:
Communication software to aid portable computers monitor, and correct problems accessing a network through a wireless access point. The software controls the exchange of information with other portable computers in the vicinity of the wireless access point. The information exchanged may be used to diagnose problems at the wireless layer, the network layer, the transport layer or the application layer. The information exchanged may provide information about the configuration of computers that successfully or unsuccessfully communicate through the wireless access point. A portable computer receiving this configuration information may compare it to similar information about its own configuration to diagnose problems. Such software may be of particular benefit for portable computers experiencing difficulty connecting to a network at a wireless hot spot.
摘要:
Systems and methods are described relating to detecting an indication of a person within a specified proximity to at least one mobile device; and presenting an indication of location of the at least one mobile device at least partially based on the indication of the person within the specified proximity. Additionally, systems and methods are described relating to means for detecting an indication of a person within a specified proximity to at least one mobile device; and means for presenting an indication of location of the at least one mobile device at least partially based on the indication of the person within the specified proximity.