Troubleshooting link and protocol in a wireless network
    41.
    发明申请
    Troubleshooting link and protocol in a wireless network 有权
    排除无线网络中的链路和协议

    公开(公告)号:US20070197206A1

    公开(公告)日:2007-08-23

    申请号:US11356488

    申请日:2006-02-17

    IPC分类号: H04Q7/20

    摘要: Methods, apparatuses, and systems directed to facilitating troubleshooting wireless connectivity issues in a wireless network. In accordance with one embodiment of the present invention, either a diagnostic supplicant in the wireless client or a diagnostic manager initiates a troubleshooting protocol between the diagnostic supplicant and the diagnostic manager over a diagnostic link in response to one or more events. In one embodiment, after the diagnostic supplicant establishes a link to a diagnostic manager via a diagnostic link, the diagnostic supplicant generates and transmits a problem report to the diagnostic manager. The problem report initiates a troubleshooting protocol between the diagnostic manager and the diagnostic supplicant.

    摘要翻译: 方法,设备和系统,旨在便于在无线网络中排除无线连接问题。 根据本发明的一个实施例,响应于一个或多个事件,无线客户端中的诊断请求者或诊断管理器通过诊断链路启动诊断请求者和诊断管理器之间的故障排除协议。 在一个实施例中,在诊断请求者通过诊断链路建立到诊断管理器的链接之后,诊断请求者生成并向诊断管理器发送问题报告。 问题报告启动诊断管理器和诊断请求者之间的故障排除协议。

    Method and system for filtered pre-authentication and roaming
    42.
    发明申请
    Method and system for filtered pre-authentication and roaming 审中-公开
    用于过滤的预认证和漫游的方法和系统

    公开(公告)号:US20070082656A1

    公开(公告)日:2007-04-12

    申请号:US11247674

    申请日:2005-10-11

    IPC分类号: H04M1/66

    摘要: A system and method to manage the pre-authentication service by providing a network-centric, managed list of neighboring/logical access points from which a wireless station should pre-authenticate. An access point is provided with a pre-authentication table. When a wireless station associates with the access point, the access point transmits the pre-authentication table to the client. The client responsive to receiving the table only pre-authenticates with neighboring access points on the table.

    摘要翻译: 通过提供一个以网络为中心的相邻/逻辑接入点的管理列表来管理预认证服务的系统和方法,无线站应从该接口点预先认证。 接入点提供预认证表。 当无线站与接入点相关联时,接入点将预认证表发送给客户端。 响应于接收表的客户端仅对表上的相邻接入点进行预认证。

    Method and apparatus for locating rogue access point switch ports in a wireless network related patent applications
    43.
    发明申请
    Method and apparatus for locating rogue access point switch ports in a wireless network related patent applications 有权
    在无线网络相关专利申请中定位流氓接入点交换机端口的方法和装置

    公开(公告)号:US20060200862A1

    公开(公告)日:2006-09-07

    申请号:US11073317

    申请日:2005-03-03

    IPC分类号: G06F12/14

    摘要: Methods and apparatus are disclosed for locating and disabling the switch port of a rogue wireless access point. In one embodiment, a network management device is configured to detect the presence of a rogue access point on a managed wireless network. Once detected, the management device may then instruct a special client, such as a scanning AP, to associate with the rogue access point and send a discovery packet through the rogue access point to network management device. The network management device upon receiving the discovery packet may thereby determine that the rogue access point is connected to a network managed by said network device. The network device may then utilize information contained in the discovery packet to locate the switch port to which the rogue access point is connected, and ultimately disable the switch port to which the rogue access point is connected.

    摘要翻译: 公开了用于定位和禁用流氓无线接入点的交换机端口的方法和装置。 在一个实施例中,网络管理设备被配置为检测被管理无线网络上的恶意接入点的存在。 一旦检测到,管理设备然后可以指示诸如扫描AP的特殊客户端与流氓接入点关联,并通过流氓接入点将发现分组发送到网络管理设备。 因此,网络管理装置在接收到发现分组时可以确定恶意接入点连接到由所述网络设备管理的网络。 然后,网络设备可以利用包含在发现分组中的信息来定位与恶意接入点连接的交换机端口,并且最终禁用与恶意接入点连接的交换机端口。

    Rapid search for optimal wireless network configuration

    公开(公告)号:US20060046737A1

    公开(公告)日:2006-03-02

    申请号:US10933102

    申请日:2004-09-02

    IPC分类号: H04Q7/20

    CPC分类号: H04W16/18

    摘要: A search algorithm to find a globally optimal radio plan for a wireless network, including assignments of frequency and transmission power to multiple access points. Two different evaluation metrics are used in order to provide an optimal solution in a reasonable time period. Frequency searches are performed using a special rapid evaluation metric. Transmission powers are selected using a more refined metric that estimates data throughput. The search results are deterministic and execution time is also substantially deterministic.

    Method, apparatus, and software product for detecting rogue access points in a wireless network
    45.
    发明申请
    Method, apparatus, and software product for detecting rogue access points in a wireless network 有权
    用于检测无线网络中的流氓接入点的方法,装置和软件产品

    公开(公告)号:US20050171720A1

    公开(公告)日:2005-08-04

    申请号:US10766174

    申请日:2004-01-28

    CPC分类号: H04L63/1433 H04W12/12

    摘要: A method, an apparatus, and a software program to implement a method to detect a rogue access point of a wireless network. The method includes maintaining an AP database that includes information about managed access point (APs) and friendly APs, including the MAC address of each managed AP. The method further includes sending a scan request to one or more managed APs, including one or more of a request for the receiving managed AP to scan for beacons and probe responses and a request for the receiving managed AP to request its clients to scan for beacons and probe responses. The method further includes receiving reports from at least one of the receiving managed APs, a report including information on any beacon or probe response received that was sent by an AP. For each beacon or probe response on which information is received, the method analyzes the information received in the report about the AP that sent the beacon or probe response, the analyzing including ascertaining if the MAC address of the AP that sent the beacon or probe response matches a MAC address of an AP in the AP database to ascertain whether or not the AP is a potential rogue AP or a managed or friendly AP.

    摘要翻译: 一种用于实现检测无线网络的恶意接入点的方法的方法,装置和软件程序。 该方法包括维护AP数据库,该AP数据库包括有关受管接入点(AP)和友好AP的信息,包括每个被管理AP的MAC地址。 该方法还包括向一个或多个受管理的AP发送扫描请求,包括对接收被管理的AP扫描信标和探测响应的请求中的一个或多个,以及对接收被管理的AP请求其客户端扫描信标的请求 并探测反应。 所述方法还包括从所述接收管理AP中的至少一个接收报告,报告包括由AP发送的所接收的任何信标或探测响应的信息。 对于接收到哪个信息的每个信标或探测响应,该方法分析报告中收到的关于发送信标或探测响应的AP的信息,该分析包括确定发送信标或探测响应的AP的MAC地址 匹配AP数据库中的AP的MAC地址,以确定AP是否是潜在的流氓AP或被管理或友好的AP。