摘要:
A device that requires a regulatory label includes a label affixed to a surface of the device and a marking mechanism in the device that detects a configuration setting associated with the device and alters a portion of the label based on the configuration setting such that the label indicates information related to the configuration setting of the device.
摘要:
An arrangement facilitating the connection of a client to a network through an access point, particularly in an area with overlapping 0.11n channels. Preferably, a client may communicate with two access points and “ask” one of them to stop transmitting long enough so as to facilitate communication with the other access point. Current specifications otherwise provide no workable arrangement for handling overlapping channels.
摘要:
A method, computer program product and system for handling the use of multiple 802.11n channels in a location where there are a small number of available channels. An access point (“access point A”) having a client (“client A”) located solely within its coverage area and another client (“client B”) located within its coverage area and a coverage area of an adjacent access point (“access point B”) may receive a request to hold back 802.11n traffic from client B. Client B sends such a request since it is prevented from communicating with access point B using the 802.11n standard due to the interference from access point A communicating with client A using the 802.11n standard. As a result, access point A switches its standard of operation from using the 802.11n standard to communicate with client A to a standard that uses a bandwidth of 22 MHz (e.g., 802.11b, 802.11a, 802.11g standards).
摘要:
A method of selecting a network connection for use with a data processing system includes detecting environmental information indicative of a current environment in which the system is operating, determining whether the current environment is a known environment, and, rapidly selecting a current network connection by identifying a known environment network connection. Detecting environmental information may include detecting time information and detecting whether specified hardware (e.g., docking station, external monitor, printer, external network adapter) is present. The determining may include accessing a network connection data structure containing historical network connection information. The network connection data structure may include a plurality of records, each record identifying an environmental state and a network connection used in conjunction with the respective environmental state. The system may be a laptop system having a dial up modem connection, a wired network interface card (NIC) connection, a wireless connection, and a broadband connection.
摘要:
A system and method for allowing an access point in a wireless network to operate at maximum speed includes determining if there is at least one client within the network that is operating at less than the maximum speed. If there is, then instruct the at least one client to decrease transmission range until the at least one client is no longer in range of the access point. Then, instruct a client at the maximum speed to interface with the at least one client to provide a peer-to-peer connection wherein the maximum speed client acts as an access point for the at least one client.
摘要:
A system, method, and program product is provided that establishes a shared secret between a computer system and a peripheral device such as a removable nonvolatile storage device or a printer. After establishing the shared secret, the peripheral device is locked. After the peripheral device is locked, an unlock request is received and the shared secret is sent to the peripheral device. The peripheral device then attempts to verify the shared secret. If the shared secret is successfully verified, then the peripheral device is unlocked allowing use of the device by using an encryption key that is made available by the verified shared secret. On the other hand, if the shared secret is not verified, then the peripheral device remains locked and use of the device is prevented.
摘要:
A system, method, and program product is provided that establishes a shared secret between a computer system and a peripheral device such as a removable nonvolatile storage device or a printer. After establishing the shared secret, the peripheral device is locked. After the peripheral device is locked, an unlock request is received and the shared secret is sent to the peripheral device. The peripheral device then attempts to verify the shared secret. If the shared secret is successfully verified, then the peripheral device is unlocked allowing use of the device by using an encryption key that is made available by the verified shared secret. On the other hand, if the shared secret is not verified, then the peripheral device remains locked and use of the device is prevented.
摘要:
Communications are provided for wide-channel and narrow-channel wireless devices within a common area over a number of channels within a common radio frequency band. Since communications using a wide-channel wireless signal interfere with at least two channels over which communications using narrow-channel wireless signals can occur, wide-channel communications are established only when it is determined that a wide-channel wireless device is present within the common area.
摘要:
An arrangement facilitating the connection of a client to a network through an access point, particularly in an area with overlapping 0.11n channels. Preferably, a client may communicate with two access points and “ask” one of them to stop transmitting long enough so as to facilitate communication with the other access point. Current specifications otherwise provide no workable arrangement for handling overlapping channels.
摘要:
A method, apparatus and computer-usable medium for minimizing in-band noise in a WLAN network is presented. The method includes the steps of detecting, at a first wireless device that communicates with a Wireless Local Area Network (WLAN) via a first access point, a signal interference that is caused by a second wireless device that communicates with the WLAN via a second access point, wherein the first and second access points communicate with their respective first and second wireless devices via a same channel; and minimizing the signal interference by sending an instruction to the second wireless device to switch to a third access point, wherein the third access point uses a different channel than the channel that is used by the first and second access points.