摘要:
Methods, apparatuses and systems facilitating containment of the effects of rogue or unauthorized access points on wireless computer network environments. Embodiments of the present invention support one to a plurality of rogue containment methodologies. A first rogue containment type involves identification of the physical connection of the rogue access point to the wired network infrastructure and, thus, allows for disabling of that physical connection to contain the rogue access point. Other rogue containment methods involve wireless techniques for containing the effect of rogue access points. As discussed below, the rogue containment functionality described herein can be applied to a wide variety of wireless network system architectures.
摘要:
In one embodiment, a method for generating a radio-frequency coverage map. The method includes receiving coverage map data comprising a plurality of locations within a region, and an identification of a location in the plurality of locations corresponding to a radio transceiver, wherein the locations within the region are represented by at least corresponding x- and y-terms of a Cartesian coordinate system. The method further includes receiving calibration data comprising a plurality of observed signal strength values at corresponding ones of the plurality of locations, converting the x- and y-terms of the locations of the coverage map data to corresponding first and second warped coordinate terms of a warped coordinate system, and computing, using linear interpolation and the first and second warped coordinate terms, predicted received signal strength values at one or more locations in the coverage map based on the calibration data.
摘要:
A wireless discovery and communication mechanism to facilitate configuration, management and performance tasks associated with wireless network environments. In certain embodiments, access elements transmit and receive neighbor messages on a periodic basis to neighboring access elements. The neighbor messages can include configuration and/or protocol information to allow the access elements or associated devices to discover each other over the air. The present invention can be applied to a variety of wireless network architectures, such as a plurality of distributed, substantially autonomous access points, or to a hierarchical wireless network system comprising central control elements, each supervising and controlling one or more access elements as described more fully below.
摘要:
Methods, apparatuses and systems facilitating location or containment of rogue or unauthorized access points on wireless computer network environments. Embodiments of the present invention support one to a plurality of rogue containment methodologies. A first rogue containment type involves identification of the physical connection of the rogue access point to the wired network infrastructure and, thus, allows for disabling of that physical connection to contain the rogue access point. Other rogue containment methods involve wireless techniques for containing the effect of rogue access points. In some embodiments, the present invention provides methods, apparatuses and systems facilitating network location of rogue access points to determine whether one or more rogue containment methodologies should be applied. As discussed below, the rogue location and containment functionality described herein can be applied to a wide variety of wireless network system architectures.
摘要:
A wireless node RF Fingerprinting location mechanism that uses multiple antenna patterns to enhance the accuracy of wireless node location in an RF environment. In one implementation, substantially non-overlapping antenna pattern diversity is used to provide a degree of sectorization in computing the estimated location of a wireless node.
摘要:
In an example embodiment, there is disclosed herein an apparatus comprising a wireless transceiver and packet processing logic coupled to the wireless transceiver. The packet processing logic is responsive to receiving a packet from a first node on a first path addressed to a node on a second path via the wireless transceiver to forward the packet on the second path towards the node on the second path via the wireless transceiver. The packet processing logic is further configured to send a reply to the packet to the first node on the first path via the wireless transceiver to a second node on the first path that is within range of the wireless receiver and on the second path to the first node on the first path responsive to determining the wireless transceiver cannot send a message directly the first upstream node.
摘要:
In a fixed channel wireless network system with a limited number of channels, assignment of the fixed channels between remote client elements and access elements is made systematically according to a set of criteria accounting for network loading and interference, then channel assignments are dynamically updated according to a priority to maintain optimal network performance with changing conditions of load and interference. The channel utilization problem is address at a system level rather than at a local level by treating the system as a three dimensional color mapping problem. All noise is treated as having a source in virtual access elements with an appropriate performance metric. The performance metric is used to select a channel set that minimize chances of interference and maximize user performance. Specifically, there are several parameter matrices which are managed and updated by a central resource management element, namely signal strength between elements, interference, and load. These matrices are used to find the optimal channel assignments for a predetermined limited set of assignable channels. In one implementation, the channel assignment methodology takes into account the interference associated with access elements operating on a selected channel, as well as the interference or energy that spills over (or is otherwise observable) on physical channels adjacent to the selected channel.
摘要:
Methods, apparatuses and systems facilitating location or containment of rogue or unauthorized access points on wireless computer network environments. Embodiments of the present invention support one to a plurality of rogue containment methodologies. A first rogue containment type involves identification of the physical connection of the rogue access point to the wired network infrastructure and, thus, allows for disabling of that physical connection to contain the rogue access point. Other rogue containment methods involve wireless techniques for containing the effect of rogue access points. In some embodiments, the present invention provides methods, apparatuses and systems facilitating network location of rogue access points to determine whether one or more rogue containment methodologies should be applied. As discussed below, the rogue location and containment functionality described herein can be applied to a wide variety of wireless network system architectures.
摘要:
Methods, apparatuses and systems facilitating containment of the effects of rogue or unauthorized access points on wireless computer network environments. Embodiments of the present invention support one to a plurality of rogue containment methodologies. A first rogue containment type involves identification of the physical connection of the rogue access point to the wired network infrastructure and, thus, allows for disabling of that physical connection to contain the rogue access point. Other rogue containment methods involve wireless techniques for containing the effect of rogue access points. As discussed below, the rogue containment functionality described herein can be applied to a wide variety of wireless network system architectures.
摘要:
In an example embodiment, there is disclosed herein an apparatus comprising a wireless transceiver and packet processing logic coupled to the wireless transceiver. The packet processing logic is responsive to receiving a packet from a first node on a first path addressed to a node on a second path via the wireless transceiver to forward the packet on the second path towards the node on the second path via the wireless transceiver. The packet processing logic is further configured to send a reply to the packet to the first node on the first path via the wireless transceiver to a second node on the first path that is within range of the wireless receiver and on the second path to the first node on the first path responsive to determining the wireless transceiver cannot send a message directly the first upstream node.