摘要:
A wireless mesh network enables multiple devices near each other to transmit simultaneously, thus allowing increased network bandwidth. Prior to transmitting, a device may determine various parameters of the wireless medium on which it desires to transmit. For example, the device may determine whether the intended recipient device is close enough, and verify that any other transmitting and receiving devices are far enough away. If these or any other suitable criteria are met, the device can transmit simultaneously with other devices in the vicinity.
摘要:
A computer with an extensible framework for facilitating communication between a software component installed on the computer and a device driver that executes functions in response to vendor-specific command objects (e.g., OIDs). The framework defines data structures and a standardized format for defining and implementing private interfaces. After selecting a private interface that is commonly supported by a software component and a driver, a private communication path may be established by an operating system component to facilitate the transfer of command information from the software component to the driver. The private communication path allows commands packaged as OIDs to be routed from software components to intended drivers. By defining private interfaces which route commands from software components to intended drivers, the extensible framework mitigates potential incompatibilities that may arise when drivers created by different vendors include OIDs with the same OID value.
摘要:
A networked computer with a networking framework that can operate in accordance with a standard protocol or may be configured to perform one or more functions that alter or extend processing according to the standard. The framework includes extensibility points and a mechanism to receive plug-ins that may perform extensibility functions. Network profile information indicates configuration of the extensibility points, including specific extensibility functions to be executed at the extensibility points. This information may be used to configure the extensibility points so that, as the computer operates, the extensibility functions are selectively executed instead of or in addition to standard functions.
摘要:
A software architecture providing ad hoc wireless networking capabilities. The software architecture may be compatible with wireless devices, such as UWB devices operating according to the WLP communication protocol. The software architecture may include user mode and kernel mode modules, and may include a multiplexing driver framework to enable system connection to multiple ad hoc networks.
摘要:
A software architecture providing ad hoc wireless networking capabilities. The software architecture may be compatible with wireless devices, such as UWB devices operating according to the WLP communication protocol. The software architecture may include user mode and kernel mode modules, and may include a multiplexing driver framework to enable system connection to multiple ad hoc networks.
摘要:
A wireless mesh network enables multiple devices near each other to transmit simultaneously, thus allowing increased network bandwidth. Prior to transmitting, a device may determine various parameters of the wireless medium on which it desires to transmit. For example, the device may determine whether the intended recipient device is close enough, and verify that any other transmitting and receiving devices are far enough away. If these or any other suitable criteria are met, the device can transmit simultaneously with other devices in the vicinity.
摘要:
A system and method is provided for detecting wireless access devices coupled to local area network of computers. The method includes coupling a sniffer device to a local area network. The method includes transferring one or more packets to be directed to a selected device over the local area network. The selected device is preferably coupled to the local area network. The method includes intercepting the one or more packets to be directed to the selected device at the sniffer device. Moreover, the method includes deriving information from the intercepted one or more packets using the sniffer device. The method can generate one or more marker packets in a selected format using the sniffer device. The marker packets are provided based upon at least a portion of the information derived from the intercepted packets. The method includes transferring the one or more marker packets from the sniffer device over the local area network to the selected device and monitoring an airspace within a vicinity of the selected device using one or more sniffer devices
摘要:
A system and method is provided for detecting wireless access devices coupled to local area network of computers. The method includes coupling a sniffer device to a local area network. The method includes transferring one or more packets to be directed to a selected device over the local area network. The selected device is preferably coupled to the local area network. The method includes intercepting the one or more packets to be directed to the selected device at the sniffer device. Moreover, the method includes deriving information from the intercepted one or more packets using the sniffer device. The method can generate one or more marker packets in a selected format using the sniffer device. The marker packets are provided based upon at least a portion of the information derived from the intercepted packets. The method includes transferring the one or more marker packets from the sniffer device over the local area network to the selected device and monitoring an airspace within a vicinity of the selected device using one or more sniffer devices
摘要:
A process for secure, safe, and easy provisioning of a wireless device with credentials to connect to a wireless network. A connecting wireless device and an established wireless device both utilize low power transmission at close proximity to exchange wireless connection setting information and/or a password. The connecting wireless device is moved into proximity with the established wireless device and a low power setting is discovered at which the wireless devices may communicate with a sufficiently low error rate. The proximity of the connecting wireless device to the established wireless device is verified and the connecting wireless device is then passed the secret information by the established network device.