摘要:
Candidates that are potentially responsible for user-perceptible network problems may be inferred. In an example embodiment, a system includes an inference engine to produce a list of candidates that are potentially responsible for user-perceptible network problems, with the candidates being network components that may include both services and network elements. A response to a service request may be a non response, an incorrect response, an untimely correct response, or a timely correct response. The user-perceptible network problems may include the untimely correct response as well as the non response and the incorrect response. In another example embodiment, a method includes monitoring a network and producing a list of candidates that are potentially responsible for user-perceptible network problems. The candidates of the list may include both services and network elements of the monitored network.
摘要:
Exemplary methods, computer-readable media, and systems for detecting a fault by a packet trace, includes monitoring at least one packet transmitted to or received from, an computing device of an end user, between one or more computing devices implementing at least one of a service or an application on an enterprise network. The process also includes identifying whether an abnormal condition occurred on the computing device of the end user based on monitoring at least one packet transmitted to or received from, the computing device of the end user; and detecting a fault by using an algorithm based on monitoring at least one packet transmitted or received from, the computing device of the end user; wherein the fault indicates a desired course of action did not occur while the computing device of the end user uses at least one of the service or the application in the enterprise network.
摘要:
Methods are described for using collaboration of neighboring wireless devices to enable location of disconnected wireless devices and rogue wireless access points. A central server computes the locations of the neighboring clients and uses those locations to estimate the location of a disconnected client. These techniques may take advantage of the beaconing and probing mechanisms of IEEE 802.11 to ensure that connected clients do not pay unnecessary overheads for detecting disconnected clients. Methods are also described for detecting and locating rogue devices by collaboratively collecting information from neighboring devices and comparing the information to a database.
摘要:
Methods are described for using collaboration of neighboring wireless devices to enable location of disconnected wireless devices and rogue wireless access points. A central server computes the locations of the neighboring clients and uses those locations to estimate the location of a disconnected client. These techniques may take advantage of the beaconing and probing mechanisms of IEEE 802.11 to ensure that connected clients do not pay unnecessary overheads for detecting disconnected clients. Methods are also described for detecting and locating rogue devices by collaboratively collecting information from neighboring devices and comparing the information to a database.
摘要:
Systems and methods are described for using client conduits to enable bootstrapping and fault diagnosis of disconnected wireless clients. Client conduits are used to enable disconnected clients to diagnose their problems with the help of nearby clients. This technique may take advantage of the beaconing and probing mechanisms of IEEE 802.11 to ensure that connected clients do not pay unnecessary overheads for detecting disconnected clients. Methods are also described for detecting rogue devices disguising as disconnected clients.
摘要:
A system and method that increases the capacity of a wireless network using frequency diversity. A user switches between channels of a network using a single network interface card in such a manner that nodes desiring to communicate overlap while disjoint communications mostly do not overlap. A driver is inserted into a device's networking stack and controls the network interface card using a plurality of virtual wireless network adapters. Packets for a recipient are queued when the recipient is not accessible on the node's channel. In one embodiment where multiple nodes are switching in and out of channel, the method changes part of a nodes channel hopping schedule to ensure concurrent connectivity in a channel for at least a brief time period such that packets can be received/transmitted with desired nodes.
摘要:
Architecture that enables wireless narrowband devices (e.g., wireless microphones) and white space devices to efficiently coexist on the same telecommunications channels, while not interfering with the usability of the wireless narrowband device. The architecture provides interference detection, strobe generation and detection and, power ramping and suppression (interference-free coexistence with spectrum efficiency). The architecture provides the ability of the white space device to learn about the presence of the microphone. This can be accomplished i using a geolocation database, reactively via a strober device, and/or proactively via the strober device. The strober device can be positioned close to the microphone receiver and signals the presence of a microphone to white space devices on demand. The strober device takes into consideration the microphone's characteristics as well as the relative signal strength from the microphone transmitter versus the white space device, in order to enable maximum use of the available white space spectrum.
摘要:
A system and method for peer based localization system using radio technology, such as Bluetooth or Wi-Fi ad-hoc technology that enables mobile devices such as cell phones, smart phones, laptops, handheld communication devices, handheld computing devices, satellite radios, global positioning systems, PDAs, etc. to discover their physical location relative to one another. In addition, the peer based localization can use a plurality of radio technologies to increase the accuracy of the physical location estimates. Additionally or alternatively, the peer based localization technique can be combined with infrastructure based location techniques, such as triangulation, GPS, or infrastructure based Wi-Fi localization in order to transpose virtual coordinates into physical coordinates.
摘要:
Functionality is described by selecting a channel in an environment in which non-privileged entities have subordinate access rights to spectrum compared to privileged entities. The functionality operates by identifying spectrum that is available to all nodes involved in communication (where the nodes are associated with non-privileged entities). The functionality then generates a suitability assessment for each candidate channel within the available spectrum. The functionality selects a channel having the most desirable suitability assessment. The functionality can form a suitability assessment for a candidate channel of arbitrary width, e.g., by combining suitability assessments associated with constituent spectrum units within the candidate channel.
摘要:
The subject invention relates to a system and/or methodology that provide improved wireless networking performance by dynamically adapting the channel width. A dynamic adaptation component adjust the channel width based on at least one characteristic of a wireless network, the characteristics can include but are not limited to range, power consumption, throughput, signal to noise ratio (SNR), resilience to delay spread, data rate, and capacity. Additionally, an optimization component can determine an optimum channel width.