Method for optimized layer 2 roaming and policy enforcement in a wireless environment
    1.
    发明授权
    Method for optimized layer 2 roaming and policy enforcement in a wireless environment 有权
    在无线环境中优化第2层漫游和策略实施的方法

    公开(公告)号:US07602746B2

    公开(公告)日:2009-10-13

    申请号:US11315861

    申请日:2005-12-21

    IPC分类号: G06F15/00

    摘要: Methods, apparatuses, and systems directed to facilitating the application of pre-allocation policies in a wireless network environment. According to one implementation of the present invention, a central controller, or other control point in a wireless network infrastructure, applies one or more policies that limit the number of resource pre-allocations a given wireless client may establish with one or more wireless access points. In one implementation, the central controller provides a pre-allocation list to a wireless client that is requesting pre-allocation. By limiting a wireless client's ability to pre-allocate resources, the central controller optimally manages the resources of the wireless network. In alternative embodiments, the central controller can terminate pre-allocations between a wireless client and one or more wireless access points to enforce pre-allocation policy on the wireless network infrastructure.

    摘要翻译: 旨在促进在无线网络环境中应用预分配策略的方法,设备和系统。 根据本发明的一个实施方案,无线网络基础设施中的中央控制器或其他控制点应用一个或多个限制给定无线客户端可以与一个或多个无线接入点建立的资源预分配数量的策略 。 在一个实现中,中央控制器向请求预分配的无线客户端提供预分配列表。 通过限制无线客户端预先分配资源的能力,中央控制器优化地管理无线网络的资源。 在替代实施例中,中央控制器可以终止无线客户端与一个或多个无线接入点之间的预分配,以在无线网络基础设施上实施预分配策略。

    Discovery of rogue access point location in wireless network environments
    5.
    发明授权
    Discovery of rogue access point location in wireless network environments 有权
    在无线网络环境中发现流氓接入点的位置

    公开(公告)号:US08089974B2

    公开(公告)日:2012-01-03

    申请号:US11965162

    申请日:2007-12-27

    IPC分类号: H04L12/28

    摘要: Methods, apparatuses and systems facilitating location or containment of rogue or unauthorized access points on wireless computer network environments. Embodiments of the present invention support one to a plurality of rogue containment methodologies. A first rogue containment type involves identification of the physical connection of the rogue access point to the wired network infrastructure and, thus, allows for disabling of that physical connection to contain the rogue access point. Other rogue containment methods involve wireless techniques for containing the effect of rogue access points. In some embodiments, the present invention provides methods, apparatuses and systems facilitating network location of rogue access points to determine whether one or more rogue containment methodologies should be applied. As discussed below, the rogue location and containment functionality described herein can be applied to a wide variety of wireless network system architectures.

    摘要翻译: 在无线计算机网络环境中方便,设备和系统便于定位或遏制流氓或未经授权的接入点。 本发明的实施例支持一个到多个流氓封闭方法。 第一流氓包围类型涉及识别流氓接入点到有线网络基础设施的物理连接,因此允许禁止该物理连接以包含恶意接入点。 其他流氓遏制方法涉及无线技术,用于包含流氓接入点的影响。 在一些实施例中,本发明提供促进流氓接入点的网络位置的方法,装置和系统,以确定是否应该应用一个或多个流氓容纳方法。 如下所述,本文描述的流氓位置和容纳功能可以应用于各种各样的无线网络系统架构。

    Containment of rogue systems in wireless network environments
    6.
    发明授权
    Containment of rogue systems in wireless network environments 有权
    在无线网络环境中控制流氓系统

    公开(公告)号:US08000308B2

    公开(公告)日:2011-08-16

    申请号:US12254420

    申请日:2008-10-20

    IPC分类号: H04W4/00

    摘要: Methods, apparatuses and systems facilitating containment of the effects of rogue or unauthorized access points on wireless computer network environments. Embodiments of the present invention support one to a plurality of rogue containment methodologies. A first rogue containment type involves identification of the physical connection of the rogue access point to the wired network infrastructure and, thus, allows for disabling of that physical connection to contain the rogue access point. Other rogue containment methods involve wireless techniques for containing the effect of rogue access points. As discussed below, the rogue containment functionality described herein can be applied to a wide variety of wireless network system architectures.

    摘要翻译: 促进在无线计算机网络环境中容纳流氓或未经授权接入点的影响的方法,装置和系统。 本发明的实施例支持一个到多个流氓封闭方法。 第一流氓包围类型涉及识别流氓接入点到有线网络基础设施的物理连接,因此允许禁止该物理连接以包含流氓接入点。 其他流氓遏制方法涉及无线技术,用于包含流氓接入点的影响。 如下所述,本文描述的流氓封锁功能可以应用于各种各样的无线网络系统体系结构。

    Methods, Apparatuses and Systems Facilitating Client Handoffs in Wireless Network Systems
    7.
    发明申请
    Methods, Apparatuses and Systems Facilitating Client Handoffs in Wireless Network Systems 有权
    方法,设备和系统促进无线网络系统中的客户端切换

    公开(公告)号:US20090296658A1

    公开(公告)日:2009-12-03

    申请号:US12540668

    申请日:2009-08-13

    IPC分类号: H04W36/00

    摘要: Methods, apparatuses, and systems directed to facilitating roaming and client handoffs in wireless networks. In one implementation, the present invention is directed to a coordination mechanism facilitating handoffs of wireless clients in a wireless network infrastructure. In one implementation, the coordination mechanism minimizes the use of group- or multi-casting to provide a scalable wireless network roaming infrastructure.

    摘要翻译: 旨在促进无线网络中漫游和客户端切换的方法,设备和系统。 在一个实施方式中,本发明涉及促进无线网络基础设施中无线客户端的切换的协调机制。 在一个实现中,协调机制使组播或多播的使用最小化,以提供可扩展的无线网络漫游基础设施。

    Method and system for dynamically assigning channels across multiple radios in a wireless LAN
    8.
    发明授权
    Method and system for dynamically assigning channels across multiple radios in a wireless LAN 有权
    用于在无线LAN中跨多个无线电设备动态分配信道的方法和系统

    公开(公告)号:US07327697B1

    公开(公告)日:2008-02-05

    申请号:US10183704

    申请日:2002-06-25

    IPC分类号: H04B7/005

    摘要: In a fixed channel wireless network system with a limited number of channels, assignment of the fixed channels between remote client elements and access elements is made systematically according to a set of criteria accounting for network loading and interference, then channel assignments are dynamically updated according to a priority to maintain optimal network performance with changing conditions of load and interference. The channel utilization problem is address at a system level rather than at a local level by treating the system as a three dimensional color mapping problem. All noise is treated as having a source in virtual access elements with an appropriate performance metric. The performance metric is used to select a channel set that minimize chances of interference and maximize user performance. Specifically, there are several parameter matrices which are managed and updated by a central resource management element, namely signal strength between elements, interference, and load. These matrices are used to find the optimal channel assignments for a predetermined limited set of assignable channels.

    摘要翻译: 在具有有限数量的信道的固定信道无线网络系统中,根据负责网络加载和干扰的一组标准系统地对远程客户端元素和接入单元之间的固定信道进行分配,然后,信道分配根据 优先考虑负载和干扰条件下的最佳网络性能。 信道利用问题是通过将系统视为三维颜色映射问题而在系统级而不是在本地级的地址。 所有噪声被视为具有适当性能指标的虚拟访问元素中的源。 性能指标用于选择最小化干扰机会并最大化用户性能的通道集。 具体来说,存在由中央资源管理元件管理和更新的几个参数矩阵,即元件之间的信号强度,干扰和负载。 这些矩阵用于找到预定有限的一组可分配信道的最佳信道分配。

    Containment of Rogue Systems in Wireless Network Environments
    9.
    发明申请
    Containment of Rogue Systems in Wireless Network Environments 有权
    在无线网络环境中遏制盗贼系统

    公开(公告)号:US20090271864A1

    公开(公告)日:2009-10-29

    申请号:US12254420

    申请日:2008-10-20

    IPC分类号: G06F21/00

    摘要: Methods, apparatuses and systems facilitating containment of the effects of rogue or unauthorized access points on wireless computer network environments. Embodiments of the present invention support one to a plurality of rogue containment methodologies. A first rogue containment type involves identification of the physical connection of the rogue access point to the wired network infrastructure and, thus, allows for disabling of that physical connection to contain the rogue access point. Other rogue containment methods involve wireless techniques for containing the effect of rogue access points. As discussed below, the rogue containment functionality described herein can be applied to a wide variety of wireless network system architectures.

    摘要翻译: 促进在无线计算机网络环境中容纳流氓或未经授权接入点的影响的方法,装置和系统。 本发明的实施例支持一个到多个流氓封闭方法。 第一流氓包围类型涉及识别流氓接入点到有线网络基础设施的物理连接,因此允许禁止该物理连接以包含流氓接入点。 其他流氓遏制方法涉及无线技术,用于包含流氓接入点的影响。 如下所述,本文描述的流氓封锁功能可以应用于各种各样的无线网络系统体系结构。