摘要:
A technique for distributed propagation of data in a wireless communication network includes providing 600 a unique host identifier for each peer network entity in the wireless communication network, each host identifier having a length of B bits. A next step includes requesting 602 data from peer network entities using a request having a host identifier of the requesting network entity. A next step includes, if a peer network entity is hosting the requested data, comparing 608 the host identifiers of the requesting network entity and the peer network entity receiving the request to determine a match. A next step includes responding 610 to the request if a match is determined.
摘要:
A technique to manage wireless wide area network bandwidth constraints in a communication network includes; prioritizing client activities in a serving access point; detecting that wired domain access is inactive while wireless wide area domain access is active; and utilizing an available bandwidth of the wireless aide area domain access for the highest priority client activities. The lower priority client activities can be address in various different ways including transferring to other available wired access.
摘要:
Methods are provided to enable a roaming Wireless Local Access Network (WLAN) customer to select from multiple PLMNs using a single standard SSID. The methods include addition of a Mobile Country Code (MCC) to the SSID; addition of an MCC and a series of Mobile Network Codes (MNC) to the SSID; and reverse Domain Name Server (DNS) lookup for the gateway IP address through the designated DNS server.
摘要:
A handheld device (e.g., an RFID reader, mobile computer, or the like) is configured to periodically scan its environment for the presence of RFID tags, determine whether any of the RFID tags within range include a valid security code, then disable operation (e.g., by preventing access to stored data) when it is determined that there are no RFID tags with a valid security code within the operational range. The RFID tags may be placed strategically at secure locations within the environment, such as within other network devices (access ports, switches, etc.).
摘要:
Described is a method, comprising receiving an authentication request by a server from a first wireless device, the authentication request including request data corresponding to a second wireless device. The second wireless device is authenticated by the server as a function of the request data. The server generates authentication data as a function of the request data. The server transmits the authentication data to the first wireless device so that the first wireless device authenticates the second wireless device using the authentication data upon receipt of a further authentication request from the second wireless device.
摘要:
A method of recovering from misconfiguration of APs and other networked components includes storing a “safe” configuration, implementing a configuration request received from a network operations center (NOC), then reverting to the stored configuration in the event that connectivity is not restored with the NOC within a predetermined time period. The NOC is configured to transmit one or more handshake messages to the AP after sending the configuration request.
摘要:
A method of recovering from misconfiguration of APs and other networked components includes storing a “safe” configuration, implementing a configuration request received from a network operations center (NOC), then reverting to the stored configuration in the event that connectivity is not restored with the NOC within a predetermined time period. The NOC is configured to transmit one or more handshake messages to the AP after sending the configuration request.
摘要:
Described is a system and method for providing differentiated service levels to wireless devices in a wireless network. The method comprises receiving, on a first network arrangement connected to a network, an authentication request from a wireless device. The network uses a first access protocol having a plurality of access categories and the wireless device uses a second access protocol. The authentication request including one of the plurality of access categories. The wireless device is verified to ensure that it is authorized to communicate at the one of the plurality of access categories. When the wireless device is verified as authorized, a response is communicated to a second network arrangement that indicates the one of the plurality of access categories is used for communications with the wireless device.
摘要:
A computer network as described herein includes multiple wireless switches cooperating with wireless access devices. The wireless access devices include intelligent processing that enables them to select a desired wireless switch for adoption. When in need of adoption, a wireless access device sends at least one SWITCH DISCOVER message over the network, the wireless switches reply with SWITCH OFFER messages, and the wireless access device processes the SWITCH OFFER messages to select a desired wireless switch for adoption. The SWITCH OFFER messages contain switch selection information associated with the respective wireless switches, and the wireless access device analyzes the switch selection information during the selection process.
摘要:
Described is a system and method for power conservation in a wireless device. The method includes switching, by a wireless computing unit, from a first communication mode to a second communication mode at a predefined time interval. The unit receives wireless signals only when in the second communication mode, and the first communication mode is a power-save mode. The unit then receives a wireless signal, and initiates a wireless connection to a wireless arrangement to obtain traffic data from the wireless arrangement when the signal includes a traffic data indicator which is indicative of existence of the traffic data. The unit switches into the first communication mode when the indicator is absent from the signal.