摘要:
Methods, apparatuses, and systems directed to facilitating roaming and client handoffs in wireless networks. In one implementation, the present invention is directed to a coordination mechanism facilitating handoffs of wireless clients in a wireless network infrastructure. In one implementation, the coordination mechanism minimizes the use of group- or multi-casting to provide a scalable wireless network roaming infrastructure.
摘要:
Methods, apparatuses, and systems directed to facilitating roaming and client handoffs in wireless networks. In one implementation, the present invention is directed to a coordination mechanism facilitating handoffs of wireless clients in a wireless network infrastructure. In one implementation, the coordination mechanism minimizes the use of group- or multi-casting to provide a scalable wireless network roaming infrastructure.
摘要:
Methods, apparatuses, and systems directed to a key distribution and caching mechanism that facilitates roaming in wireless networks. In one implementation, the present invention reduces the latency associated with handoffs by reducing the time required to set up encryption or other secure access mechanisms between access points and clients in the wireless network infrastructure. In one implementation, the present invention operates proactively to distribute authentication credential information to selected components of the wireless network infrastructure before a client roams to another access point.
摘要:
Methods, apparatuses, and systems directed to facilitating the application of pre-allocation policies in a wireless network environment. According to one implementation of the present invention, a central controller, or other control point in a wireless network infrastructure, applies one or more policies that limit the number of resource pre-allocations a given wireless client may establish with one or more wireless access points. In one implementation, the central controller provides a pre-allocation list to a wireless client that is requesting pre-allocation. By limiting a wireless client's ability to pre-allocate resources, the central controller optimally manages the resources of the wireless network. In alternative embodiments, the central controller can terminate pre-allocations between a wireless client and one or more wireless access points to enforce pre-allocation policy on the wireless network infrastructure.
摘要:
Methods, apparatuses and systems enabling a directed association mechanism in wireless computer network environments. In certain embodiments, the directed association functionality described herein can be used in a variety of contexts, such as directing wireless clients to associate with a desired access element or subset of access elements in a wireless network environment. In certain embodiments, the present invention can also be used to increase the efficiency of handing off wireless clients between access elements. The directed association mechanism, in one embodiment, increases the efficiency of establishing wireless connections between wireless clients and access points in a wireless network system.
摘要:
Methods, apparatuses and systems directed to detecting address spoofing in wireless networks by, after receiving a wireless management frame, transmitting verification messages to determine whether a given wireless node (e.g., a wireless access point, or wireless client) has legitimately lost its connection state.
摘要:
Methods, apparatuses and systems facilitating containment of the effects of rogue or unauthorized access points on wireless computer network environments. Embodiments of the present invention support one to a plurality of rogue containment methodologies. A first rogue containment type involves identification of the physical connection of the rogue access point to the wired network infrastructure and, thus, allows for disabling of that physical connection to contain the rogue access point. Other rogue containment methods involve wireless techniques for containing the effect of rogue access points. As discussed below, the rogue containment functionality described herein can be applied to a wide variety of wireless network system architectures.
摘要:
A wireless discovery and communication mechanism to facilitate configuration, management and performance tasks associated with wireless network environments. In certain embodiments, access elements transmit and receive neighbor messages on a periodic basis to neighboring access elements. The neighbor messages can include configuration and/or protocol information to allow the access elements or associated devices to discover each other over the air. The present invention can be applied to a variety of wireless network architectures, such as a plurality of distributed, substantially autonomous access points, or to a hierarchical wireless network system comprising central control elements, each supervising and controlling one or more access elements as described more fully below.
摘要:
Methods, apparatuses and systems facilitating location or containment of rogue or unauthorized access points on wireless computer network environments. Embodiments of the present invention support one to a plurality of rogue containment methodologies. A first rogue containment type involves identification of the physical connection of the rogue access point to the wired network infrastructure and, thus, allows for disabling of that physical connection to contain the rogue access point. Other rogue containment methods involve wireless techniques for containing the effect of rogue access points. In some embodiments, the present invention provides methods, apparatuses and systems facilitating network location of rogue access points to determine whether one or more rogue containment methodologies should be applied. As discussed below, the rogue location and containment functionality described herein can be applied to a wide variety of wireless network system architectures.
摘要:
Methods, apparatuses and systems facilitating location or containment of rogue or unauthorized access points on wireless computer network environments. Embodiments of the present invention support one to a plurality of rogue containment methodologies. A first rogue containment type involves identification of the physical connection of the rogue access point to the wired network infrastructure and, thus, allows for disabling of that physical connection to contain the rogue access point. Other rogue containment methods involve wireless techniques for containing the effect of rogue access points. In some embodiments, the present invention provides methods, apparatuses and systems facilitating network location of rogue access points to determine whether one or more rogue containment methodologies should be applied. As discussed below, the rogue location and containment functionality described herein can be applied to a wide variety of wireless network system architectures.