摘要:
Disclosed is a method for determining the placement of ITAPs in wireless neighborhood networks. The method disclosed provides for efficient integration of multi-hop wireless networks with the Internet by placing ITAPs at strategic locations. Initially the method provides for the formulation of the ITAP placement problem under three wireless models. For each model, methods are developed to efficiently place ITAPs in the networks. The methods aim to minimize the number of required ITAPs while guaranteeing users' bandwidth requirements. Next, a fault tolerance version of the placement method is presented that provides bandwidth guarantees in the presence of failures. Finally the methods are extended to take into account variable traffic demands by developing an approximation algorithm to simultaneously optimize ITAP placement based on demands over multiple periods.
摘要:
Techniques for increasing the battery life on a mobile device by decreasing the energy consumption of the mobile device's wireless fidelity (Wi-Fi) interface are described. In one embodiment, the mobile device's Wi-Fi interface is automatically disabled when the device is not engaged in a voice over internet protocol (VoIP) call via the Wi-Fi interface. When a VoIP call is initiated on the device, or when the device receives a wake up call from a server via its Cellular interface, the Wi-Fi interface is automatically enabled. Using its Wi-Fi interface, the mobile device then connects to an IP-based network via a Wi-Fi access point. The server then initiates a direct call, wherein VoIP technology is used by the mobile device, between the mobile device and a VoIP calling device.
摘要:
Techniques for enhancing throughput capacity and/or bandwidth distribution fairness among APs in a wireless network are described. Specifically, a channel frequency profile which includes a center frequency and channel-width (i.e., channel bandwidth) is dynamically assigned to each of one or more APs in a wireless network. The assigned channel frequency profile for each AP is based, at least in part, on the current composition of the wireless network including, its topology and traffic load distribution. In this regard, each AP's channel frequency profile can be continuously or periodically changed such that the entire available frequency spectrum is effectively utilized and/or interference between APs is avoided or limited. This, in turn, enhances the throughput capacity and/or bandwidth distribution fairness of the wireless network.
摘要:
Wireless adapters are installed on one or more general purpose computing devices and are connected via a network in an enterprise environment. The adapters are densely deployed at known locations throughout the environment and are configured as air monitors. The air monitors monitor signals transmitted by one or more transceiver devices and records information about these signals. One or more analysis or inference engines may be deployed to obtain the recorded signal information and the air monitor locations to determine a location of the one or more wireless transceivers devices deployed in the environment.
摘要:
Implementation of opportunistic use of stations in a wireless network as repeaters is described. In one implementation, a station detects the existence of rate anomaly in a wireless network. In response to the rate anomaly, the station may transform into a software repeater for certain other neighboring stations. The repeater function allows for the relaying of packets sent by these neighboring stations to the access point and vice versa. The other neighboring stations, owing to their relative proximity to the repeater station, transmit data at a higher rate to the repeater station. Thus, the removal of the slower stations reduces clogging of the access point and increases the overall data rate within the wireless network. Further, a zero-overhead network coding protocol may be implemented in conjunction with the repeater function to increase capacity of the wireless network.
摘要:
Described is a technology by which a remote or local geo-location service provides white space information that one or more client devices and/or base stations may use to determine which white spaces are available for use, e.g., for wireless networking. Because of the information, low-threshold sensing is not needed by the client devices and/or base stations to know which white spaces are available. The service computes the available white spaces for a given location based upon television transmitter parameters, elevation data, and information received regarding any operational wireless microphones.
摘要:
The claimed subject matter provides a system and/or a method that facilitates managing a network by mining a communication rule. An analysis engine can employ a packet trace within a network in order to provide timing information, wherein the network includes at least one of a host, a protocol, or an application. A traffic evaluator can extract a communication rule for the network based upon an activity matrix generated from the timing information in which the activity matrix includes at least one of a row of a time window for the packet trace and a column for a flow in the packet trace.
摘要:
A method described herein includes an act of, at a mobile computing device, receiving an indication that a portion of code of a program executing on the mobile computing device is to be offloaded to a second computing device for execution on the second computing device, wherein the indication is based at least in part upon an estimated energy savings of the mobile computing device by offloading the portion of the code for execution on the second computing device. The method also includes an act of transmitting data to the second computing device that causes the second computing device to execute the portion of the code.
摘要:
A method of detecting rogue devices that are coupled to a wired network without generating false negative or false positive alerts is provided. When a wireless monitor detects an observed SSID and/or BSSID, various tests are run to determine whether the observed device is actually coupled to the wired network. To guard against the suspect device spoofing an authorized SSID and/or BSSID, location information is gathered so that the network administrator can pinpoint the location of the rogue device. If the device is not recognized, various other tests are run to determine whether the unrecognized device is actually connected to the wired network. These tests include an association test, a MAC address test, an ARP test, a packet replay test, a correlation test, and/or a DHCP fingerprint test. Once it is determined that the suspect device is a rogue connected to the wired network, an appropriate alert is generated.
摘要:
Communication software to aid portable computers monitor, and correct problems accessing a network through a wireless access point. The software controls the exchange of information with other portable computers in the vicinity of the wireless access point. The information exchanged may be used to diagnose problems at the wireless layer, the network layer, the transport layer or the application layer. The information exchanged may provide information about the configuration of computers that successfully or unsuccessfully communicate through the wireless access point. A portable computer receiving this configuration information may compare it to similar information about its own configuration to diagnose problems. Such software may be of particular benefit for portable computers experiencing difficulty connecting to a network at a wireless hot spot.