摘要:
Wireless adapters are installed on one or more general purpose computing devices and are connected via a network in an enterprise environment. The adapters are densely deployed at known locations throughout the environment and are configured as air monitors. The air monitors monitor signals transmitted by one or more transceiver devices and records information about these signals. One or more analysis or inference engines may be deployed to obtain the recorded signal information and the air monitor locations to determine a location of the one or more wireless transceivers devices deployed in the environment.
摘要:
Implementation of opportunistic use of stations in a wireless network as repeaters is described. In one implementation, a station detects the existence of rate anomaly in a wireless network. In response to the rate anomaly, the station may transform into a software repeater for certain other neighboring stations. The repeater function allows for the relaying of packets sent by these neighboring stations to the access point and vice versa. The other neighboring stations, owing to their relative proximity to the repeater station, transmit data at a higher rate to the repeater station. Thus, the removal of the slower stations reduces clogging of the access point and increases the overall data rate within the wireless network. Further, a zero-overhead network coding protocol may be implemented in conjunction with the repeater function to increase capacity of the wireless network.
摘要:
Described is a technology by which a remote or local geo-location service provides white space information that one or more client devices and/or base stations may use to determine which white spaces are available for use, e.g., for wireless networking. Because of the information, low-threshold sensing is not needed by the client devices and/or base stations to know which white spaces are available. The service computes the available white spaces for a given location based upon television transmitter parameters, elevation data, and information received regarding any operational wireless microphones.
摘要:
A method described herein includes an act of, at a mobile computing device, receiving an indication that a portion of code of a program executing on the mobile computing device is to be offloaded to a second computing device for execution on the second computing device, wherein the indication is based at least in part upon an estimated energy savings of the mobile computing device by offloading the portion of the code for execution on the second computing device. The method also includes an act of transmitting data to the second computing device that causes the second computing device to execute the portion of the code.
摘要:
A method of detecting rogue devices that are coupled to a wired network without generating false negative or false positive alerts is provided. When a wireless monitor detects an observed SSID and/or BSSID, various tests are run to determine whether the observed device is actually coupled to the wired network. To guard against the suspect device spoofing an authorized SSID and/or BSSID, location information is gathered so that the network administrator can pinpoint the location of the rogue device. If the device is not recognized, various other tests are run to determine whether the unrecognized device is actually connected to the wired network. These tests include an association test, a MAC address test, an ARP test, a packet replay test, a correlation test, and/or a DHCP fingerprint test. Once it is determined that the suspect device is a rogue connected to the wired network, an appropriate alert is generated.
摘要:
Functionality is described by selecting a channel in an environment in which non-privileged entities have subordinate access rights to spectrum compared to privileged entities. The functionality operates by identifying spectrum that is available to all nodes involved in communication (where the nodes are associated with non-privileged entities). The functionality then generates a suitability assessment for each candidate channel within the available spectrum. The functionality selects a channel having the most desirable suitability assessment. The functionality can form a suitability assessment for a candidate channel of arbitrary width, e.g., by combining suitability assessments associated with constituent spectrum units within the candidate channel.
摘要:
A system and method that allows a user to concurrently connect to multiple wireless networks with a single network interface card is presented. The networks may be infrastructure (“IS”) networks and ad hoc (“AH”) networks. A driver is inserted into a device's networking stack and exposes a plurality of virtual wireless network adapters, one for each network. The adapters are enabled and disabled in accordance with which network is presently activated. Packets for a network are queued when the network is not enabled. The wireless driver controls the switching of the network card. In one embodiment where multiple wireless cards are switching in and out of AH networks, the method converges the switching times for the cards in an AH network to ensure concurrent connectivity in the AH network for at least a brief time period every switching cycle of the wireless cards.
摘要:
Constructing an inference graph relates to the creation of a graph that reflects dependencies within a network. In an example embodiment, a method includes determining dependencies among components of a network and constructing an inference graph for the network responsive to the dependencies. The components of the network include services and hardware components, and the inference graph reflects cross-layer components including the services and the hardware components. In another example embodiment, a system includes a service dependency analyzer and an inference graph constructor. The service dependency analyzer is to determine dependencies among components of a network, the components including services and hardware components. The inference graph constructor is to construct an inference graph for the network responsive to the dependencies, the inference graph reflecting cross-layer components including the services and the hardware components.
摘要:
Wireless adapters are installed on one or more general purpose computing devices and are connected via a network in an enterprise environment. The adapters are densely deployed at known locations throughout the environment and are configured as air monitors. The air monitors monitor signals transmitted by one or more transceiver devices and records information about these signals. One or more analysis or inference engines may be deployed to obtain the recorded signal information and the air monitor locations to determine a location of the one or more wireless transceivers devices deployed in the environment.
摘要:
A new media access control (MAC) protocol for cognitive wireless networks is described. The new MAC protocol allows each of multiple nodes, such as cell phones and computers with wireless, to determine utilization of a communication spectrum, such as the television broadcast band. The nodes collaborate to achieve a combined view of spectrum utilization in their local vicinity, in which scheduled users and empty time segments are mapped across a wide range of frequencies. Nodes negotiate with each other to reserve idle segments of the spectrum for packet exchange on negotiated frequencies. Control packet structure allows nodes to become prescient of the local spectrum utilization during handshaking. A cognitive device operating under the new MAC has a first radio that both scans the spectrum and monitors a control channel; and a second reconfigurable radio with adjustable parameters, including frequency and bandwidth, for packet transmission.