摘要:
Embodiments of the present invention include a method, an apparatus, and logic encoded in one or more computer-readable tangible medium to carry out a method. One method includes tagging packets and forwarding packets in a wireless mesh network using stored forwarding information for the tag, wherein the forwarding information is according to a centrally determined routing method and tag distribution method.
摘要:
Embodiments of the present invention include a method, an apparatus, and logic encoded in one or more computer-readable tangible medium to carry out a method. One method includes tagging packets and forwarding packets in a wireless mesh network using stored forwarding information for the tag, wherein the forwarding information is according to a centrally determined routing method and tag distribution method.
摘要:
A method, system, and logic for upgrading mesh points of a wireless mesh network. One method includes maintaining a mesh topology data structure containing information on the tree topology of a wireless mesh network. The method further includes using a tree-walking method to send an upgrade message to the root access point and to each other mesh point in the wireless mesh network until each mesh point has received the upgrade message. Receiving the upgrade message enables the receiving mesh point to upgrade according to the contents of the upgrade message without necessarily disrupting the mesh network.
摘要:
A plurality of flow network elements monitors network flows at the subscriber level for a plurality of subscribers. The flow network elements export flow records to a collector, which organizes the flow records. A policy client correlates the flow records and determines whether any network flows are violating a flow policy definition. If a flow policy definition is violated, the policy client transmits a policy action to a policy server which indicates what action to take for a given violating flow. The policy server assigns a flow policy for the subscriber corresponding with the violating flow. The assigned flow policy is then transmitted to the flow network element having that violating flow, and that flow network element installs the flow policy.
摘要:
A method of implementing a spanning tree protocol for a wireless network conforming to a wireless network standard, the spanning tree protocol substantially conforming to the IEEE 802.1 standard, including a first wireless bridging node wirelessly transmitting BPDU information to other wireless bridging nodes of the network or wirelessly receiving BPDU information from other wireless bridging nodes, the BPDU information encapsulated in one or more control/management frames, e.g., beacon or probe response frames of the wireless network standard, the BPDU information relating to a spanning tree topology containing the first and other wireless bridging nodes.
摘要:
In one embodiment, a method includes accessing a frame including a baseline header including a recipient address (RA) field, a transmitter address (TA) field, a destination address (DA) field, and a source address (SA) field. The method includes inserting into the frame a mesh header including a mesh destination address (MDA) field and a mesh source address (MSA) field. The MSA field specifies an address of a first edge node of the wireless mesh network, and the MDA field specifies an address of a second edge node of the wireless mesh network. The first edge node is a first transmitter of the frame with the baseline and mesh headers in the wireless mesh network, and the second edge node is a last recipient of the frame with the baseline and mesh headers in the wireless mesh network. The RA, TA, DA, and SA fields precede the MDA and MSA fields in the frame after insertion of the mesh header into the frame.
摘要:
An IP (Internet Protocol) session for a mobile node is carried out through the use of a virtual care-of address. A foreign agent sends an agent advertisement to the mobile node to allow the mobile node to choose from a list of IP addresses of the foreign agent. The foreign agent ties a virtual care-of address to a mobile node so that an intelligent and dynamic selection of tunnels to be used for the IP session can occur. Therefore, traffic for an IP session is not limited to transmission over the single particular tunnel that corresponds to an IP address initially selected by the mobile node. Rather, the virtual care-of address shifts the tunneling decision from the mobile node to the foreign agent. Supporting multiple tunnels between home agent and foreign agent allows resilience, redundancy, and service-level differentiation to mobile node traffic without involving the mobile node in the process.
摘要:
An IP (Internet Protocol) session for a mobile node is carried out through the use of a virtual care-of address. A foreign agent sends an agent advertisement to the mobile node to allow the mobile node to choose from a list of IP addresses of the foreign agent. To perform virtual care-of address services, the foreign agent ties the virtual care-of address to a mobile node so that an intelligent and dynamic selection of tunnels to be used for the IP session can occur. Therefore, traffic for an IP session is not limited to transmission over the single particular tunnel that corresponds to an IP address initially selected by the mobile node. Rather, the virtual care-of address shifts the tunneling decision from the mobile node to the foreign agent. Supporting multiple tunnels between home agent and foreign agent allows resilience, redundancy, and service-level differentiation to mobile node traffic without involving the mobile node in the process.
摘要:
A plurality of flow network elements monitors network flows at the subscriber level for a plurality of subscribers. The flow network elements export flow records to a collector, which organizes the flow records. A policy client correlates the flow records and determines whether any network flows are violating a flow policy definition. If a flow policy definition is violated, the policy client transmits a policy action to a policy server which indicates what action to take for a given violating flow. The policy server assigns a flow policy for the subscriber corresponding with the violating flow. The assigned flow policy is then transmitted to the flow network element having that violating flow, and that flow network element installs the flow policy.
摘要:
A mesh access point that includes an access point profile storing one ore more parameters in non-volatile memory, and a method of using the mesh access point having the access point profile to select and carry out mutual authentication on a wireless mesh network to establish itself to the mesh network using information in the access point profile, and further to provide services to wireless clients according to information in the access point profile. Access point profiles can be pre-configured/configured/updated suitably in order to adapt the mesh access point in a mesh network according to its capabilities and requirements.