摘要:
A system for signaling an application when a requested data rate and Quality of Service cannot be achieved using OFDM wireless data transmission, and the application proceeds by either renegotiating QoS and data rate, or waiting until they requested rate and QoS are met.
摘要:
Security techniques and security mechanisms for wireless networks that transmit content such as advertisements. According to exemplary techniques, control messages comprising unrequested content (e.g., advertisement data) may be transmitted in response to a request from a client device, while in other exemplary techniques the control messages may be transmitted without any request from a client device. In some exemplary implementations, security mechanisms such as public key cryptography algorithms may be used to secure transmissions. In some of these techniques which implement public key cryptography, a user may be required to retrieve a public key from a source other than the wireless access point transmitting encrypted advertisements (e.g., a sign or terminal in a commercial entity transmitting such advertisements, or from a web service), such that the user may confirm that the encrypted content is from a source matching the retrieved public key and thus confirm the authenticity of a wireless access point.
摘要:
Capability checking to examine a computing device's capabilities to determine if the device supports a software defined radio to communicate according to a specific wireless protocol. Applicants have appreciated that as the reliance on software defined radio increases, numerous potential options may be available to a user for performing wireless communication. Applicants have appreciated the desirability of providing the ability to discover the capabilities of a user's computer to determine whether it is capable of supporting one or more wireless protocols.
摘要:
A communication system in which an access point and one or more devices communicating through the access point adaptively apply Orthogonal Frequency Division Multiple Access (OFDMA). The access point may assign orthogonal subcarriers to devices as in conventional OFDMA, but the access point senses activity on the subcarriers and selects subcarriers without activity for assignment. In an alternative approach, a device that is configured for OFDMA communication may receive a channel assignment from a device that does not support OFDMA. The OFDMA-capable device may use only a portion of the subcarriers in the assigned channel, which may be communicated to the non-OFDMA device. During the non-OFDMA device may then ignore unused subcarriers in error detection and correction to avoid incorrectly classifying communications as erroneous. Information about OFDMA capabilities, subcarrier assignments and subcarriers in use may be communicated as information elements in network control communications, such as beacons and probe messages.
摘要:
Discovery of services between devices is provided prior to establishing a connection between devices, including wireless-enabled devices or devices that are communicatively coupled to wireless access points or other wireless communication devices. Discovering services prior to establishing a connection may facilitate finding a desired service. The services that may be discovered may be, for example, print services, camera services, PDA services or any other suitable services. Services may be discovered using 802.11, Bluetooth, UWB or any other suitable wireless technology. A graphical user interface is provided that enables a user to select a desired service.
摘要:
A system and method for providing the ability to discover the capabilities of a user's computer to determine whether it is capable of supporting more than one wireless protocol simultaneously is provided. A computing device's capabilities (including, for example, hardware and/or software capabilities) is checked to determine if it supports at least two specific wireless protocols and checking a computing device's capabilities (including, for example, hardware and/or software capabilities) is checked to determine if it supports both wireless protocols simultaneously. The techniques for determining the computing device's compatibility may include comparing lists of protocol requirements to lists of system capabilities and/or generating test signals by the system according to the protocol.
摘要:
Guest user are enabled to access network resources through an enterprise network using a guest user account. A guest user account may be created for a guest for a limited time. Guest account credentials of the guest account may be provided to the guest to use the guest account using any of a variety of techniques described herein, for example, by scanning a guest access card, credit card or mobile telephone of guest user, and providing the guest account credentials to the user based on the information obtained. A guest access management server may be configured to generate and maintain guest accounts, authenticate guest users, and track and log guest activity. A VLAN technology may be used to separate guest traffic from host enterprise traffic on the host enterprise network. After a guest user is authenticated, communications to and from the guest user may be routed to a guest VLAN.
摘要:
An advertising framework for transmitting advertisements from wireless access points to client devices that need not be connected to the wireless access point. The client device can display the advertisements on a user interface of the client device. Such advertisements may be transmitted, for example, as part of a control message transmitted by a wireless access point of a wireless network, or other message conventionally used to broadcast network characteristics necessary for a client device to establish a connection to the wireless access point. In terms of the Open Systems Interconnect (OSI) layered model of a network, layer 2 control messages, including announcement transmissions such as beacons, may be used for control messages.
摘要:
Guest user are enabled to access network resources through an enterprise network using a guest user account. A guest user account may be created for a guest for a limited time. Guest account credentials of the guest account may be provided to the guest to use the guest account using any of a variety of techniques described herein, for example, by scanning a guest access card, credit card or mobile telephone of guest user, and providing the guest account credentials to the user based on the information obtained. A guest access management server may be configured to generate and maintain guest accounts, authenticate guest users, and track and log guest activity. A VLAN technology may be used to separate guest traffic from host enterprise traffic on the host enterprise network. After a guest user is authenticated, communications to and from the guest user may be routed to a guest VLAN.