摘要:
Architecture that enables wireless narrowband devices (e.g., wireless microphones) and white space devices to efficiently coexist on the same telecommunications channels, while not interfering with the usability of the wireless narrowband device. The architecture provides interference detection, strobe generation and detection and, power ramping and suppression (interference-free coexistence with spectrum efficiency). The architecture provides the ability of the white space device to learn about the presence of the microphone. This can be accomplished i using a geolocation database, reactively via a strober device, and/or proactively via the strober device. The strober device can be positioned close to the microphone receiver and signals the presence of a microphone to white space devices on demand. The strober device takes into consideration the microphone's characteristics as well as the relative signal strength from the microphone transmitter versus the white space device, in order to enable maximum use of the available white space spectrum.
摘要:
Described is incorporating white space networking components into a network stack. A user mode spectrum access control component determines which white space channels are currently allowed for use based upon policy, current operating status and availability information obtained from one or more sources. A white space service (e.g., in the WLAN service) receives the availability information. The white space service includes a discovery module that discovers other nodes, and a channel migration module that changes from the current channel to another channel if the current channel is no longer allowed for use. A kernel mode (NDIS layer) white space driver through a miniport driver controls the channel in use as the current channel. An automatic configuration module is provided that switches to Wi-Fi network communication when a Wi-Fi network is present, and switches back when a Wi-Fi network is not present.
摘要:
Implementation of opportunistic use of stations in a wireless network as repeaters is described. In one implementation, a station detects the existence of rate anomaly in a wireless network. In response to the rate anomaly, the station may transform into a software repeater for certain other neighboring stations. The repeater function allows for the relaying of packets sent by these neighboring stations to the access point and vice versa. The other neighboring stations, owing to their relative proximity to the repeater station, transmit data at a higher rate to the repeater station. Thus, the removal of the slower stations reduces clogging of the access point and increases the overall data rate within the wireless network. Further, a zero-overhead network coding protocol may be implemented in conjunction with the repeater function to increase capacity of the wireless network.
摘要:
A local network coding framework and method including techniques to improve efficiency in a wireless network by reducing overhead. The local network coding method includes exchanging data availability between nodes on the wireless network by sending Bloom filters of lists of packets to neighboring nodes. Based on data availability, optimized mixing of pure packets is performed to form mixture packets for output. A separate acknowledgement buffer keeps track of the pure packets transmitted but not acknowledged. If an acknowledgement does not arrive after a certain time period, the packet is assumed to be lost and is retransmitted. An optimized packet mixing process generates mixture packets and decides which nodes to send the mixture packets. The local network coding framework and method also includes methods for representing the composition of a mixture packet and using mixing at a wireless access point to improve the performance of the wireless local area network.
摘要:
Functionality is described for discovering a channel within an environment in which non-privileged entities have subordinate access rights to spectrum compared to privileged entities. The functionality operates by investigating spectrum units within the spectrum for the presence of the channel. In one case, the functionality operates by investigating the spectrum units in linear succession; in another case, the functionality advances in a staggered fashion over the available spectrum. Functionality is also described for handling disconnection by a node from a channel. The functionality allows the node to convey its disconnection status to other communication participants. In one case, various aspects of the functionality are implemented by performing analysis in the time domain.
摘要:
Alternate communication paths may be analyzed and selected for ongoing communications between two devices. One or both of the communicating devices may identify available communication paths and various identifiers on those paths. The identifiers may be, for example, base stations for a wireless connection, beacon signals, or other information that may be received by the device. After comparing the available communication paths to identify one or more alternative paths, the ongoing communications may be transferred to the alternative path. The initial communication path may be used to pass authentication and encryption information that may be used to establish the alternative path between the devices. The redirection of a communication stream may be performed by an interceptor inserted between the application layer and transport layer in a network stack of the communicating devices.
摘要:
A system and method for peer based localization system using radio technology, such as Bluetooth or Wi-Fi ad-hoc technology that enables mobile devices such as cell phones, smart phones, laptops, handheld communication devices, handheld computing devices, satellite radios, global positioning systems, PDAs, etc. to discover their physical location relative to one another. In addition, the peer based localization can use a plurality of radio technologies to increase the accuracy of the physical location estimates. Additionally or alternatively, the peer based localization technique can be combined with infrastructure based location techniques, such as triangulation, GPS, or infrastructure based Wi-Fi localization in order to transpose virtual coordinates into physical coordinates.
摘要:
A framework for wireless network management applications in an enterprise environment using existing general purpose computing devices is presented. At least one of the devices is configured with a wireless adapter and is used as an AirMonitor to monitor one or more wireless networks. Other devices are configured as LandMonitors to monitor traffic on a wired network in the enterprise environment. At least one inference engine uses the LandMonitors and AirMonitors by assigning them monitoring tasks. Data from the monitoring tasks are stored in a database. Analysis of the data that is computationally intensive is generally performed by the inference engines. Wireless network management applications use the framework by installing and running application-specific components (e.g., filters) on the AirMonitors, LandMonitors, and/or inference engines.
摘要:
Techniques for enhancing the throughput capacity available to client devices connected to a wireless local area network (WLAN) are described. Specifically, existing WLAN resources are converted into wireless access points (APs) to create a dense infrastructure of wireless APs. To leverage this dense AP infrastructure, central management techniques are employed. With client-to-AP mapping, these techniques are used to prevent the discovery of multiple APs in a WLAN by a client device and to select a single AP (using certain policies) to associate with the client device and provide it with an enhanced wireless connection to the WLAN. Additionally, techniques are employed to centrally determine, using central policies, when the AP should disassociate from the client device and when another centrally selected AP should respond to, and associate with, the client device to provide it with an enhanced wireless connection to the WLAN—without interrupting/disrupting the client device's access.
摘要:
Wireless adapters are installed on one or more general purpose computing devices and are connected via a wireless network in an enterprise environment. The adapters are densely deployed at known locations throughout the environment and are configured as air monitors. The air monitors monitor wireless signals transmitted between transceiver devices and access points and records information about these signals. One or more analysis or inference engines may be deployed to analyze the signals received from the air monitors to obtain optimum performance and connectivity information about the wireless network.