摘要:
Embodiments of the present invention include a method, an apparatus, and logic encoded in one or more computer-readable tangible medium to carry out a method. One method includes tagging packets and forwarding packets in a wireless mesh network using stored forwarding information for the tag, wherein the forwarding information is according to a centrally determined routing method and tag distribution method.
摘要:
Methods, apparatuses, and systems directed to facilitating roaming and client handoffs in wireless networks. In one implementation, the present invention is directed to a coordination mechanism facilitating handoffs of wireless clients in a wireless network infrastructure. In one implementation, the coordination mechanism minimizes the use of group- or multi-casting to provide a scalable wireless network roaming infrastructure.
摘要:
A congestion control system. In particular implementations, a method includes receiving packets into one or more queues and monitoring the one or more queues for congestion. The method also includes, if a number of packets in the one or more queues exceeds a first threshold, determining a congestion control mode. The method also includes generating a congestion control message indicating the congestion control mode and transmitting the congestion control message to one or more neighboring mesh nodes.
摘要:
A packet aggregation system. In particular implementations, a method includes accessing one or more transmit queues, each corresponding to a wireless client associated with a given wireless mesh access point of a plurality of mesh access points. The method further includes selecting a mesh access point of the plurality of mesh access points and selecting a transmit queue corresponding to a wireless client associated with the selected mesh access point. The method further includes aggregating packets that are destined for the selected wireless client, up to a size limit, taking into account the path to the selected mesh point as well as quality of service constraints, and composing and transmitting the aggregated packet to the selected mesh access point.
摘要:
Methods, apparatuses, and systems directed to facilitating troubleshooting wireless connectivity issues in a wireless network. In accordance with one embodiment of the present invention, either a diagnostic supplicant in the wireless client or a diagnostic manager initiates a troubleshooting protocol between the diagnostic supplicant and the diagnostic manager over a diagnostic link in response to one or more events. In one embodiment, after the diagnostic supplicant establishes a link to a diagnostic manager via a diagnostic link, the diagnostic supplicant generates and transmits a problem report to the diagnostic manager. The problem report initiates a troubleshooting protocol between the diagnostic manager and the diagnostic supplicant.
摘要:
Method for detecting an attack on a broadcast key shared between an access point and its wireless clients. Upon detection of the attack, actions are implemented to react to the attack as defined in one or more security policies. Detection of the attack is achieved by examining both a link message integrity check and an infrastructure management frame protection (IMFP) message integrity check contained in a broadcast management frame.
摘要:
A troubleshooting system. In particular implementations, a method includes collecting, from a first wireless network element, PEM state associated with a wireless client having a connection problem, and collecting log data associated with the wireless client from the first wireless network elements and one or more other wireless network elements. The method further includes correlating the PEM state and log data based on a network security protocol employed by the wireless client, where the network security protocol corresponds to an expected sequence of events. The correlating includes correlating events and messages collected based on the expected sequence of events, and comparing the correlated sequence of events to a data store of diagnostic information to identify one or more possible causes of the connection problem.
摘要:
Methods and systems for use in a wireless client that includes one or more wireless network interfaces for communicating with at least one access point wherein the method enables the wireless client to validate the authenticity and integrity of received management frames. The method includes receiving a protected wireless network management frame from an access point verifying a message integrity check (MIC) appended to the protected wireless network management frame. One or more security policies are then conditionally applied based on a failure to verify the MIC.
摘要:
In a fixed channel wireless network system with a limited number of channels, assignment of the fixed channels between remote client elements and access elements is made systematically according to a set of criteria accounting for network loading and interference, then channel assignments are dynamically updated according to a priority to maintain optimal network performance with changing conditions of load and interference. The channel utilization problem is address at a system level rather than at a local level by treating the system as a three dimensional color mapping problem. All noise is treated as having a source in virtual access elements with an appropriate performance metric. The performance metric is used to select a channel set that minimize chances of interference and maximize user performance. Specifically, there are several parameter matrices which are managed and updated by a central resource management element, namely signal strength between elements, interference, and load. These matrices are used to find the optimal channel assignments for a predetermined limited set of assignable channels. In one implementation, the channel assignment methodology takes into account the interference associated with access elements operating on a selected channel, as well as the interference or energy that spills over (or is otherwise observable) on physical channels adjacent to the selected channel.
摘要:
Methods, apparatuses and systems facilitating containment of the effects of rogue or unauthorized access points on wireless computer network environments. Embodiments of the present invention support one to a plurality of rogue containment methodologies. A first rogue containment type involves identification of the physical connection of the rogue access point to the wired network infrastructure and, thus, allows for disabling of that physical connection to contain the rogue access point. Other rogue containment methods involve wireless techniques for containing the effect of rogue access points. As discussed below, the rogue containment functionality described herein can be applied to a wide variety of wireless network system architectures.