-
公开(公告)号:US11856428B2
公开(公告)日:2023-12-26
申请号:US17388569
申请日:2021-07-29
IPC分类号: H04W24/08 , H04B17/318
CPC分类号: H04W24/08 , H04B17/318
摘要: Examples described herein relate to an investigator device and a method for determining a condition of an antenna of an access point (AP). At least one investigator device may receive one or more antenna condition test frames transmitted via a plurality of antennas of the AP Further, the at least one investigator device may determine an average received signal strength indicator (RSSI) value corresponding to each of the plurality of antennas based on the one or more antenna condition test frames. A condition of the plurality of antennas of the AP may be determined based on a relative comparison between the average RSSI value corresponding to each of the plurality of antennas of the AP. Moreover, in some examples, the at least one investigator device may send a notification to an administrator of the AP based on the condition of the plurality of antennas.
-
2.
公开(公告)号:US11558759B2
公开(公告)日:2023-01-17
申请号:US17083282
申请日:2020-10-28
摘要: Systems and methods are provided for leveraging uplink (U)L scheduling information obtained by way of Quality of Service (QoS) Null/QoS Data frames and Media Access Control (MAC) headers transmitted by any station (STA). This UL scheduling information can be read by any access point (AP) in an extended service set (ESS), and used to improve network performance. For example, an AP may use such UL scheduling information (from STAs associated to co-channel APs in the same ESS) to minimize the latency for UL latency-sensitive traffic in that ESS. Additionally, an AP may use such UL scheduling information to minimize contention amongst STAs connected to different APs on the same channel in the same ESS, thereby improving system capacity.
-
公开(公告)号:US12081986B2
公开(公告)日:2024-09-03
申请号:US17680557
申请日:2022-02-25
发明人: Shubham Saloni , Abhiruchi Dakshinkar , Wei Hu
IPC分类号: H04W12/122 , H04W48/16 , H04W76/10 , H04W84/12
CPC分类号: H04W12/122 , H04W48/16 , H04W76/10 , H04W84/12
摘要: Examples of techniques for handling unsolicited probe responses are disclosed. In an example, occurrence of an attack on an access point (AP) in an enterprise Wireless Local Area Network (WLAN) is detected based on an unsolicited probe response and Robust Security Network Information Element (RSN IE). Responsive to detecting the attack, unsolicited probe responses at the AP is disabled. Further, Fast initial Link Setup (FILS) discovery at the AP is enabled.
-
公开(公告)号:US20220030026A1
公开(公告)日:2022-01-27
申请号:US16936981
申请日:2020-07-23
发明人: Tejas Sathe , Wei Hu , Shubham Saloni
摘要: A method for processing a denial of service (DOS) includes: receiving a de-authentication/disassociation (D/D) frame by an access point (AP), determining by the AP a state of security association establishment between the AP and a client device, maintaining a connection between the AP and the client device if the security association is incomplete, sending a probe packet from the AP to the client device if security association is complete and the connection between the AP and the client device is in a non-PMF (protected management frames) setting, maintaining the connection if the client device responds to the probe packet, and terminating the connection if the client device does not respond to the probe packet.
-
公开(公告)号:US20210385220A1
公开(公告)日:2021-12-09
申请号:US16892939
申请日:2020-06-04
发明人: Andre Beaudin , Shubham Saloni , Eloy Jr. Galdones , Sachin Ganu , Qiang Zhou , Denis Houle
摘要: Operation of a wireless network access point (AP) to communicate with a first set of one or more wireless client devices using a wireless protocol in which spatial reuse of channels is supported via at least a dynamically configurable basic service set (BSS) identifier of the wireless AP. The BSS identifier is utilized to identify overlapping BSSs (OBSSs). A first set of one or more wireless client devices communicate using a wireless protocol in which spatial reuse of channels is supported via at least a dynamically configurable BSS identifier of the wireless AP. The BSS identifier is utilized to identify OBSSs. Unauthorized network activity is detected based on the BSS identifier and a received BSS identifier associated with the received transmissions. A dynamic adjustment is made to one of the BSS identifiers of the AP or the received BSS identifier in response to detected unauthorized network activity.
-
公开(公告)号:US11665545B2
公开(公告)日:2023-05-30
申请号:US17245439
申请日:2021-04-30
发明人: Shubham Saloni , Abhiruchi Dakshinkar , Wei Hu
IPC分类号: H04W12/122 , H04W12/088 , H04L29/06 , H04L9/40
CPC分类号: H04W12/122 , H04L63/1458 , H04W12/088 , H04L2463/141
摘要: An access point (AP) in a deployment may be attacked by a rogue AP. The rogue AP may transmit fake beacons that include a fake/incorrect basic service set (BSS) color that does not match the BSS color assigned to/used by the AP under attack. Due to this BSS color mismatch, stations associated to the AP under attack may switch to the fake/incorrect BSS color, and communications between the AP under attack and the stations may be disrupted, and can eventually lead to service denial. Systems and methods are provided for leveraging the BSS color feature to identify when a rogue AP is attacking another AP. Upon detecting an attack, the BSS color feature may be disabled to mitigate the level of service disruption to the AP under attack and the stations associated to that AP.
-
公开(公告)号:US20230164595A1
公开(公告)日:2023-05-25
申请号:US17533634
申请日:2021-11-23
发明人: Rishabh Gupta , Shubham Saloni , Nethra Muniyappa
摘要: A set of AP radios to which configurations are to be deployed is identified. A candidate deployment order for deploying configurations to the set of AP radios is determined by an order-deploy algorithm. The algorithm seeks to spread out configuration deployments to AP radios both spatially and temporally such that APs that are located close to one another in the network receive their configuration updates as part of different deployment batches with delay periods introduced between consecutive batch deployments. The algorithm orders the set of APs by iterating through a network factor hierarchy to place APs that share certain network factors such as the same band or channel close to one another in the candidate deployment order and place APs that share certain other network factors (e.g., same switch, RF domain, and/or RF partition) far from one another in the order.
-
公开(公告)号:US11451552B2
公开(公告)日:2022-09-20
申请号:US16892939
申请日:2020-06-04
发明人: Andre Beaudin , Shubham Saloni , Eloy Jr Galdones , Sachin Ganu , Qiang Zhou , Denis Houle
摘要: Operation of a wireless network access point (AP) to communicate with a first set of one or more wireless client devices using a wireless protocol in which spatial reuse of channels is supported via at least a dynamically configurable basic service set (BSS) identifier of the wireless AP. The BSS identifier is utilized to identify overlapping BSSs (OBSSs). A first set of one or more wireless client devices communicate using a wireless protocol in which spatial reuse of channels is supported via at least a dynamically configurable BSS identifier of the wireless AP. The BSS identifier is utilized to identify OBSSs. Unauthorized network activity is detected based on the BSS identifier and a received BSS identifier associated with the received transmissions. A dynamic adjustment is made to one of the BSS identifiers of the AP or the received BSS identifier in response to detected unauthorized network activity.
-
公开(公告)号:US11374691B2
公开(公告)日:2022-06-28
申请号:US16941977
申请日:2020-07-29
发明人: Shubham Saloni , Wei Hu , Manoj Thawani
IPC分类号: H04L1/16 , H04L67/141 , H04W84/12 , H04W88/08
摘要: Examples of block acknowledgement negotiations are described. In an example, a request to establish a BA session is sent by a first computing device (first device) to a second computing device (second device). A timer for receipt of a response to the request is initialized. A BA successful response is received by the first device after the timer has timed out. A request to terminate the BA session is sent by the first device to the second device. After sending the request to terminate the BA session, BA negotiation is reinitiated by the first device based on an updated inactivity timer, so that there are greater chances of successfully establishing a BA session. In an example, if the second device ignores the request to terminate the BA session then it sends a BA reject response to the first device. After receiving the BA reject response, the first device waits for the inactivity timer before reinitiating BA negotiations, so that the second device clears its states thereby increasing chances of successful BA renegotiations.
-
公开(公告)号:US20240314703A1
公开(公告)日:2024-09-19
申请号:US18184789
申请日:2023-03-16
CPC分类号: H04W52/242 , H04W64/00
摘要: An example method for managing transmit powers of a networking device is presented. A network management device is configured to determine an expected path loss value at a receiver of a first networking device based at least on the distance between the first networking device and the second networking device. Further, the network management device receives a measured path loss value relative to the second networking device from the first networking device. The network management device then determines a target transmit power for the transmitter of the second networking device based on the measured path loss value and an offset value. The offset value is determined based on the expected path loss value and the measured path loss value. After determining the target transmit power, the network management device sends an instruction to the second networking device to operate the transmitter at the target transmit power.
-
-
-
-
-
-
-
-
-