Abstract:
A method for populating location wiremap databases. In particular implementations, a method includes establishing a link layer connection with a client on a switch port, where the switch port is associated with a port identifier and is mapped to a location; identifying one or more connection attributes of the connection, where the connection attributes comprise a network layer address of the client; and transmitting the port identifier and the network layer address of the client to a location server.
Abstract:
In one embodiment, wireless access point management is optimized. The data bandwidth and/or processing requirements for data indicating operation of the access point is baselined. For example, air quality or interference measurements are made at the access point on a regular basis. The interference measurements over one or more periods, such as one period of 24 hours, provide a baseline. Rather than transmitting and processing the subsequent measurements that are normal or within the baseline, a lack of information or data requiring less bandwidth than the measurements communicates to a controller or server that the measurements are normal or within the baseline.
Abstract:
An apparatus, a method, and logic encoded in computer readable media that when executed operable to carry out the method. The method includes wirelessly receiving at a receiving station a signal transmitted from a transmitting station in a wireless network. The signal includes a network identifier, e.g., MAC address of the transmitting station. The method includes determining one or more RF waveform characteristics of at least a transient part of the received signal, decoding the received signal to determine the network identifier, e.g., MAC address, determining one or more behavior characteristics from the received signal; and using the decoded network identifier, e.g., MAC address and a combination of the one or more waveform characteristics and the one or more behavior characteristics to ascertain whether or not the network identifier, e.g., MAC address is a spoofed identifier, the ascertaining using historical samples of combinations for different network identifiers.
Abstract:
In an example embodiment, a wireless device is configured to associate with a first access point on a first frequency. The wireless device listens for a predefined frame, which may be sent by neighboring access points or other wireless devices. When the wireless device receives a signal comprising a predefined frame, the wireless device acquires a parameter, such as signal strength, for the signal. The wireless device sends the parameter for the signal to the first access point.
Abstract:
Methods, apparatuses, and systems directed to processing location and network data in a wireless network. According to one implementation of the present invention, a location server functions both as a middleware data collection engine and a calculation engine in a hierarchical WLAN system. In one implementation, the location server collects network data associated with mobile nodes. As described in further detail below, mobile nodes may include one or more of wireless mobile stations (e.g., wireless laptops, dual-mode phones, personal digital assistants, etc.), radio frequency identification (RFID) tags, rogue wireless access points and rogue wireless clients. In one implementation, the location server may process at least some of the network data to determine information associated with the mobile nodes. For example, the location server may compute the location of a given mobile node, which is accessible to other applications using one or more defined application programming interfaces (APIs). In one implementation, the location server may track the node history of a given mobile node. In one implementation, the location server may correlate processed network information to one or more locations or regions in the wireless network environment. For example, in one implementation, the location server may compute the load (i.e., amount of traffic) in a given region. The load may be used to further compute traffic patterns in the region. Such computations may be based on types of mobile nodes (e.g., wireless clients) and/or based on time periods (e.g., 12 pm-5 pm). As described in more detail below, such information may facilitate management of a wireless network. For example, the processed information may indicate locations that may require deployment of more resources (e.g., additional wireless access points).
Abstract:
Method for detecting bearing defect severity based on bearing rotation speed and at least one data sample of sensor data obtained to measure vibrations of a bearing ring is provided. The method includes converting the data sample from time domain to frequency domain to obtain a signal frequency spectrum; determining a defect center frequency of the bearing using the rotation speed; and identifying a predetermined number of frequency peaks of the signal frequency spectrum. A total vibration energy in an overall frequency band including the predetermined number of frequency peaks is first determined; next, for each of the frequency peaks, a peak energy as a spectral energy of signal components giving rise to the frequency peaks is determined; calculating a bearing defect spectral energy using the peak energies; and finally a ratio of the bearing defect spectral energy and a total vibration energy to assess a defect severity is obtained.
Abstract:
In an example embodiment, a wireless client sends a probe request frame and waits for responses to the probe frame. The responses to the probe request from comprise encrypted data representative of the signal strength of the client as measured by the respondent that are digitally signed by the respondent's certificate. The client aggregates the responses and forwards them to a location based server.
Abstract:
Mesh access point fault reporting. In particular implementations, a method includes receiving a fault indication indicating one or more failures; collecting fault data related to the one or more failures or a state of the mesh access point; and passing the fault data to the RFID tag, which wirelessly transmits messages relating to the fault.
Abstract:
A device whose location is to be determined (target device) generates a plurality of frames (messages) and time of departure (TOD) timestamp information indicating when the target device transmits the plurality of frames in a sequence or burst. The target device transmits the plurality of frames and the TOD information, wherein the plurality of frames are transmitted such that at least two of the frames are on different radio frequency (RF) channels. Within a sequence or burst (or across multiple sequences or bursts), multiple widely spaced transmissions on the same channel are included to allow for estimation of the crystal frequency offset of the transmitting device. The TOD information included in the transmitted packets allows devices that receive the packets not to change their channels of operation solely for the purpose of receiving packets from the device to be located.
Abstract:
Described herein in an example embodiment, is a mechanism to distribute and implement secure credentials on a WLAN (wireless local area network) employing radio frequency identification (RFID) tags. Symmetric keys are provisioned to the tag in a manner that allows for optimized re-association and secure announcements. The provisioned keys are derived in a way that enables the controller to operate without having to maintain the key state for every tag. In an example embodiment, the controller generates keys for the RFID tags that are derived from a master key associated with the controller, an identifier assigned to the RFID tag and an address associated with the RFID tag.