摘要:
A network troubleshooting framework is described. In an implementation, a method includes generating a first estimation of network performance by a simulator based on network settings obtained from a network, estimating the new performance under an alternative setting by providing the alternative setting to the network simulation and observing the simulation output, repeating the procedure for other alternative settings, and suggesting the alternative setting that improves network performance.
摘要:
A network troubleshooting framework is described. In an implementation, a method includes detecting discrepancy in operation of a network by supplying data that describes the network to a network simulation so that the network simulation provides an estimation of network performance. A determination is made as to whether the estimation of network performance differs from observed network performance of the network. A root cause of the discrepancy id diagnosed by injecting one or more of a plurality of faults into the network simulation until the estimation of network performance approximates the observed network performance.
摘要:
Systems and methods are described for managing network connectivity for mobile users, particularly when a mobile user roams between two networks or between two subnets of a network. An announcer signal is broadcast by a host organization. The announcer signal includes a network identifier, an authorizer address and a verifier address. A mobile client monitors for the announcer signal and, when detected, provides an option to connect to the network via the authorizer. Once authorization is obtained, the mobile client communicates with the network through the verifier. The verifier received tagged data packets from a mobile client and only accepts the data packets if a valid tag (created with an authorization key) is included therewith. Multiple verifiers may be used to provide load balancing and fault tolerance (in the event a verifier fails). If a mobile client disconnects from a network and later reconnects, the mobile client does not have to be re-authorized if the mobile client still has a valid authorization key.
摘要:
A method for locating a user in a wireless network is disclosed. A mobile computer seeking to determine its location within a building detects the signal strength of one or more wireless base stations placed at known locations throughout the building. The mobile computer uses this measured signal strength to determine its location via a signal-strength-to-location table look-up. A table of known locations within the building and the base station signal strength at those locations is searched to find the most similar stored signal strength to the signal strength detected. The location corresponding to the most similar stored signal strength is determined to be the current location of the mobile computer. Alternatively, a number of signal strengths from the table can be used and the corresponding locations can be spatially averaged to determine the location of the mobile computer. The table can be derived empirically, by placing a mobile computer at the known locations and detecting the signal strength of the wireless base stations at those locations, or the table can be derived mathematically by taking into account a reference signal strength, the distance between the reference point and the known location, and the number of walls between the reference point and the known location. As an alternative, the base stations can detect the signal strength of the mobile computer. In such a case, the table would relate a known position of the mobile computer to the signal strength of the mobile computer at that location as detected by the one or more base stations.
摘要:
Methods, systems and data structure for storing and managing information in a wireless network are described wherein fixed resources in the system are stored in a database in a hierarchical directory structure according to the location of each fixed resource. Each level of the directory structure represents a geographical area in which a fixed resource is located. A mobile user submits a query for the location of the nearest fixed resource having certain properties. The system determines the location of the mobile user and then searches the database for the requested fixed resource that is nearest to the mobile user. When the fixed resource is identified, data regarding its location is transmitted to the mobile user. In addition, specific directions as to how to get to the location of the fixed resource from the location of the mobile user may be provided.
摘要:
A method for locating a user in a wireless network is disclosed. A mobile computer seeking to determine its location within a building detects the signal strength of one or more wireless base stations placed at known locations throughout the building. The mobile computer uses this measured signal strength to determine its location via a signal-strength-to-location table look-up. A table of known locations within the building and the base station signal strength at those locations is searched to find the most similar stored signal strength to the signal strength detected. The location corresponding to the most similar stored signal strength is determined to be the current location of the mobile computer. Alternatively, a number of signal strengths from the table can be used and the corresponding locations can be spatially averaged to determine the location of the mobile computer. The table can be derived empirically, by placing a mobile computer at the known locations and detecting the signal strength of the wireless base stations at those locations, or the table can be derived mathematically by taking into account a reference signal strength, the distance between the reference point and the known location, and the number of walls between the reference point and the known location. As an alternative, the base stations can detect the signal strength of the mobile computer. In such a case, the table would relate a known position of the mobile computer to the signal strength of the mobile computer at that location as detected by the one or more base stations.
摘要:
A method for locating a user in a wireless network is disclosed. A mobile computer which seeks to determine its location within a building detects the signal strength of one or more wireless base stations placed at known locations throughout the building. An environmentally profiled table of known locations within the building and the base station signal strength at those locations is searched to find the stored signal strength most similar to the signal strength detected. The location corresponding to the most similar stored signal strength is determined to be the current location of the mobile computer. The table can be derived empirically, by placing a mobile computer at the known locations and measuring the signal strength of the wireless base stations at those locations, or it can be derived mathematically by taking into account a reference signal strength, the distance between the reference point and the known location, and the number of intervening walls between the reference point and the known location. As an alternative, the base stations can measure the signal strength of the mobile computer. In such a case, the table would relate a known position of the mobile computer to the signal strength of the mobile computer as measured by the one or more base stations. Environmental profiling is achieved by comparing several different tables, corresponding to several different environments, and using the table that minimizes the error. Environmental profiling can be applied to tables determined empirically or mathematically.
摘要:
A mobile computer establishes a wireless communication session with a wireless access point of a computer network. The location of each wireless access point is known and obtainable either from a database on the network or from the access points themselves. The strengths of wireless signals passing between the mobile computer and multiple wireless access points of the network, including the access point with which the mobile computer has established the session are measured at multiple time intervals. The measurements may be taken at the mobile computer itself or at the wireless access points. The measured strength values are then weighted according to such factors as whether the mobile computer has already established a communication session with the access point from which the sample was taken, and how old the sample is. For each location, the weighted strength values obtained for access points in that location are summed. The location having the highest sum is deemed to be the location of the mobile computer.
摘要:
A slot assignment technique for assigning slots to a video communiction source in a slotted communication channel entails, in embodiments, using a slot from the channel to issue a coded request message containing a bit pattern indicative of a number of other slots that the video communication source requires for transmitting video information. At the receiver, the number of slots that the video communication source requires for transmitting video information is identified from the coded request via a lookup table. The requiste number of slots in the communication channel can then be allocated to the video commuinication source to transmit the video information. The bit pattern indicative of the number of slots that the video communication source requires generally comprises less data than would an uncoded request for the same number of slots. In this way, request limitations imposed by request slot size may be overcome.
摘要:
A full service channel access protocol that supports the integrated transport of voice, video and data communications is provided by dividing a communication channel into a plurality of frames, dividing each of the frames into a plurality of slots, and dividing some of the plurality of slots into a plurality of mini-slots. The mini-slots are provided for use by the multiple communication sources to request the establishment of a new voice, data, or video transmission connection over the communication channel. Additionally, a second one of the plurality of slots is divided into a plurality of second mini-slots for use by the multiple communication sources to request the establishment of a new voice, data, or video transmission connection over the communication channel and for use by the multiple communication sources to augment an existing video connection over the communication channel. The method enables timely and power efficient communications over communication network.