Abstract:
In an example embodiment, a service that analyzes location information of a client as the client roams. For example, whenever a trigger event occurs, such as a change in the association state, a change in Internet Protocol (IP) address, etc., a determination is made whether the event was expected. If the event was not expected, the location of where the trigger event occurred can be determined enabling a network administrator to investigate roaming problems at a particular location.
Abstract:
In one embodiment, a method includes receiving calibration data, computing one or more attributes of a pathloss model based on the calibration data, computing estimated locations using the received signal strength values of the calibration data points, associating location errors with the one or more calibration data points, and computing a location quality within a region based on the associated location errors.
Abstract:
A network access system. In particular implementations, a method includes monitoring, responsive to a network access request of a client, an authentication session between an authentication server and the client, and determining user credential information associated with a user of the client based on one or more messages of the authentication session. The method also includes accessing, using the user credential information, physical entry information indicating a physical location of the user relative to a defined perimeter, and conditionally allowing the client access to a network based on the physical entry information and a successful authentication of the client.
Abstract:
In one embodiment, a method includes storing, in a data store, a physical network model of a network environment, the network environment comprising one or more central controllers and one or more access points each operative to associate with a central controller, the physical network model comprising one or more region objects, each region object corresponding to a physical region of the network environment, each region object further including one or more radio frequency (RF) coverage maps, each RF coverage map defining a location of one or more access points and RF properties of a physical space; receiving a first mapping definition between a location server and a one or more region objects of the physical network model; receiving a second mapping definition between the location server and one or more central controllers; transmitting the one or more region objects in the first mapping definition to the location server; and configuring the location server and the one or more central controllers in the second mapping definition to interoperate.
Abstract:
Methods and apparatuses of planning a wireless local area network are disclosed. Various embodiments receive data such as floor plan data, coverage data, and/or capacity data about a site for the WLAN. Based on such data, features of the WLAN access points can be determined. Examples are the quantity, placement, and/or configuration of the access points. Measured data, such as WLAN data, are received. The measured data are compared with expected data, such as expected WLAN data. Expected WLAN data can be generated from various sources, for example floor plan data and access point data (e.g., quantity, placement, and/or configuration). Based on such measured data, WLAN features can be changed, such as floor plan and/or access point data (e.g., quantity, placement, and/or configuration).
Abstract:
A method and apparatus for communicating information. In particular, a method of communicating data between a plurality of applications, comprising the following steps. A first list is encoded. The first encoded list includes a first set of data objects. Each of the data objects includes data to be communicated. Next, the first encoded list is transmitted to a first of the plurality of applications and decoded for the first application. The first application accesses a first subset of data objects from the first encoded list. The first subset of data objects does not necessarily include all data objects in the first set of data objects. Next, the first application generates a second encoded list, where the second encoded list corresponds to the first encoded list. Then, the first application causes the second encoded list to be transmitted to a second application and decoded for the second application. The second application then accesses a second subset of data objects corresponding to the second encoded list, the second subset of data objects not necessarily including the same data objects in the first subset of data objects. The first application and the second of the plurality of applications exchange data type information for the second subset of data objects corresponding to the second encoded list.
Abstract:
A sensor unit for a bearing including at least one inner ring and at least one outer ring, wherein the sensor unit is configured to detect at least one state variable of the bearing. The sensor unit is embedded in a recess of one of the inner ring or the outer ring.
Abstract:
In one embodiment, a method includes identifying, responsive to a triggering event, one or more radio frequency (RF) firewall transceivers that neighbor a data wireless access point to which a given wireless client is communicating; configuring one or more of the identified neighboring RF firewall transceivers to detect RF frames transmitted by the wireless client; causing the data wireless access point to transmit one or more wireless messages operative to cause the wireless client to transmit RF frames; collecting RF signal data corresponding to the RF frames transduced by one or more of the identified neighboring RF firewall transceivers; transmitting the collected RF signal data to a location system; receiving from the location system an indication of the location of the wireless client; and applying one or more network access policies based on the indication of the location.
Abstract:
In an example embodiment, there is disclosed a technique that enables a wireless device to achieve coexistence with an interfering source. The wireless device determines when interference is present and not present during a service period and reports the duration of interference free interval. At the end of an interference period, the wireless device can send a trigger signal indicating the start of an interference free interval to request data be sent to the wireless station until the expiration of the duration of the interference free interval. In particular embodiments, the signal sent by the wireless device can include an offset, for example a timing synchronization function (TSF) value, to indicate the end of the interference-free interval, perhaps computed so as allow for some clock drift.