摘要:
A handheld device (e.g., an RFID reader, mobile computer, or the like) is configured to periodically scan its environment for the presence of RFID tags, determine whether any of the RFID tags within range include a valid security code, then disable operation (e.g., by preventing access to stored data) when it is determined that there are no RFID tags with a valid security code within the operational range. The RFID tags may be placed strategically at secure locations within the environment, such as within other network devices (access ports, switches, etc.).
摘要:
An RFID reader is designed to autoconfigure itself during initial operation by reading configuration information from an RFID tag within its operational range, selecting a configuration file based on the configuration information, and configuring itself based on the configuration file. The configuration file may be stored on the reader itself, or requested and received over a network. The RFID tag may be password protected to add further security.
摘要:
In a network comprising a wireless computing device and a wireless switch coupled to a plurality of access points, techniques are provided for determining a particular one of access points that the wireless computing device is to be associated with and associating the wireless computing device therewith. According to one implementation, the wireless switch monitors one or more wireless communication performance metrics, and determines based on the wireless communication performance metrics, whether the wireless computing device is currently associated with the one of the access points that wireless computing device is to be associated with. If not, then the wireless switch transmits an instruction to the wireless computing device to associate with a particular access point that wireless computing device is to be associated with.
摘要:
A technique for distributed propagation of data in a wireless communication network includes providing 600 a unique host identifier for each peer network entity in the wireless communication network, each host identifier having a length of B bits. A next step includes requesting 602 data from peer network entities using a request having a host identifier of the requesting network entity. A next step includes, if a peer network entity is hosting the requested data, comparing 608 the host identifiers of the requesting network entity and the peer network entity receiving the request to determine a match. A next step includes responding 610 to the request if a match is determined.
摘要:
A technique to manage wireless wide area network bandwidth constraints in a communication network includes; prioritizing client activities in a serving access point; detecting that wired domain access is inactive while wireless wide area domain access is active; and utilizing an available bandwidth of the wireless aide area domain access for the highest priority client activities. The lower priority client activities can be address in various different ways including transferring to other available wired access.
摘要:
Methods are provided to enable a roaming Wireless Local Access Network (WLAN) customer to select from multiple PLMNs using a single standard SSID. The methods include addition of a Mobile Country Code (MCC) to the SSID; addition of an MCC and a series of Mobile Network Codes (MNC) to the SSID; and reverse Domain Name Server (DNS) lookup for the gateway IP address through the designated DNS server.
摘要:
Described is a method, comprising receiving an authentication request by a server from a first wireless device, the authentication request including request data corresponding to a second wireless device. The second wireless device is authenticated by the server as a function of the request data. The server generates authentication data as a function of the request data. The server transmits the authentication data to the first wireless device so that the first wireless device authenticates the second wireless device using the authentication data upon receipt of a further authentication request from the second wireless device.
摘要:
A method of recovering from misconfiguration of APs and other networked components includes storing a “safe” configuration, implementing a configuration request received from a network operations center (NOC), then reverting to the stored configuration in the event that connectivity is not restored with the NOC within a predetermined time period. The NOC is configured to transmit one or more handshake messages to the AP after sending the configuration request.
摘要:
A method of recovering from misconfiguration of APs and other networked components includes storing a “safe” configuration, implementing a configuration request received from a network operations center (NOC), then reverting to the stored configuration in the event that connectivity is not restored with the NOC within a predetermined time period. The NOC is configured to transmit one or more handshake messages to the AP after sending the configuration request.
摘要:
Described is a system and method for providing differentiated service levels to wireless devices in a wireless network. The method comprises receiving, on a first network arrangement connected to a network, an authentication request from a wireless device. The network uses a first access protocol having a plurality of access categories and the wireless device uses a second access protocol. The authentication request including one of the plurality of access categories. The wireless device is verified to ensure that it is authorized to communicate at the one of the plurality of access categories. When the wireless device is verified as authorized, a response is communicated to a second network arrangement that indicates the one of the plurality of access categories is used for communications with the wireless device.