Abstract:
Measured data, such as WLAN data, are received. The measured data are compared with expected data, such as expected WLAN data. Expected WLAN data can be generated from various sources, for example floor plan data and access point data (e.g., quantity, placement, and/or configuration). Based on such measured data, WLAN features can be changed, such as floor plan and/or access point data (e.g., quantity, placement, and/or configuration).
Abstract:
Methods and apparatuses of planning a wireless local area network are disclosed. Various embodiments receive data such as floor plan data, coverage data, and/or capacity data about a site for the WLAN. Based on such data, features of the WLAN access points can be determined. Examples are the quantity, placement, and/or configuration of the access points.
Abstract:
A method for populating location wiremap databases. In particular implementations, a method includes establishing a link layer connection with a client on a switch port, where the switch port is associated with a port identifier and is mapped to a location; identifying one or more connection attributes of the connection, where the connection attributes comprise a network layer address of the client; and transmitting the port identifier and the network layer address of the client to a location server.
Abstract:
In one embodiment, wireless access point management is optimized. The data bandwidth and/or processing requirements for data indicating operation of the access point is baselined. For example, air quality or interference measurements are made at the access point on a regular basis. The interference measurements over one or more periods, such as one period of 24 hours, provide a baseline. Rather than transmitting and processing the subsequent measurements that are normal or within the baseline, a lack of information or data requiring less bandwidth than the measurements communicates to a controller or server that the measurements are normal or within the baseline.
Abstract:
An apparatus, a method, and logic encoded in computer readable media that when executed operable to carry out the method. The method includes wirelessly receiving at a receiving station a signal transmitted from a transmitting station in a wireless network. The signal includes a network identifier, e.g., MAC address of the transmitting station. The method includes determining one or more RF waveform characteristics of at least a transient part of the received signal, decoding the received signal to determine the network identifier, e.g., MAC address, determining one or more behavior characteristics from the received signal; and using the decoded network identifier, e.g., MAC address and a combination of the one or more waveform characteristics and the one or more behavior characteristics to ascertain whether or not the network identifier, e.g., MAC address is a spoofed identifier, the ascertaining using historical samples of combinations for different network identifiers.
Abstract:
In an example embodiment, a wireless device is configured to associate with a first access point on a first frequency. The wireless device listens for a predefined frame, which may be sent by neighboring access points or other wireless devices. When the wireless device receives a signal comprising a predefined frame, the wireless device acquires a parameter, such as signal strength, for the signal. The wireless device sends the parameter for the signal to the first access point.
Abstract:
Methods, apparatuses, and systems directed to processing location and network data in a wireless network. According to one implementation of the present invention, a location server functions both as a middleware data collection engine and a calculation engine in a hierarchical WLAN system. In one implementation, the location server collects network data associated with mobile nodes. As described in further detail below, mobile nodes may include one or more of wireless mobile stations (e.g., wireless laptops, dual-mode phones, personal digital assistants, etc.), radio frequency identification (RFID) tags, rogue wireless access points and rogue wireless clients. In one implementation, the location server may process at least some of the network data to determine information associated with the mobile nodes. For example, the location server may compute the location of a given mobile node, which is accessible to other applications using one or more defined application programming interfaces (APIs). In one implementation, the location server may track the node history of a given mobile node. In one implementation, the location server may correlate processed network information to one or more locations or regions in the wireless network environment. For example, in one implementation, the location server may compute the load (i.e., amount of traffic) in a given region. The load may be used to further compute traffic patterns in the region. Such computations may be based on types of mobile nodes (e.g., wireless clients) and/or based on time periods (e.g., 12 pm-5 pm). As described in more detail below, such information may facilitate management of a wireless network. For example, the processed information may indicate locations that may require deployment of more resources (e.g., additional wireless access points).
Abstract:
Method for detecting bearing defect severity based on bearing rotation speed and at least one data sample of sensor data obtained to measure vibrations of a bearing ring is provided. The method includes converting the data sample from time domain to frequency domain to obtain a signal frequency spectrum; determining a defect center frequency of the bearing using the rotation speed; and identifying a predetermined number of frequency peaks of the signal frequency spectrum. A total vibration energy in an overall frequency band including the predetermined number of frequency peaks is first determined; next, for each of the frequency peaks, a peak energy as a spectral energy of signal components giving rise to the frequency peaks is determined; calculating a bearing defect spectral energy using the peak energies; and finally a ratio of the bearing defect spectral energy and a total vibration energy to assess a defect severity is obtained.
Abstract:
In an example embodiment, a wireless client sends a probe request frame and waits for responses to the probe frame. The responses to the probe request from comprise encrypted data representative of the signal strength of the client as measured by the respondent that are digitally signed by the respondent's certificate. The client aggregates the responses and forwards them to a location based server.
Abstract:
Mesh access point fault reporting. In particular implementations, a method includes receiving a fault indication indicating one or more failures; collecting fault data related to the one or more failures or a state of the mesh access point; and passing the fault data to the RFID tag, which wirelessly transmits messages relating to the fault.