摘要:
A method and logic encoded in tangible media and apparatus for securing links between a mesh point and one or more identities of one or more parent mesh points of a wireless mesh network in order to secure the links. A first association is carried out to one of the identities of one of the parent mesh points. The first mesh point undergoes a mutual authentication with an authenticator and announces the possibility of multiple links and/or multiple paths. The authentication generates a first master key from which the root master key of the key hierarchy is derived so that other master keys for different identities are derivable using a hierarchy. The mesh point undergoes a 4-way handshake to derive a first transient key. Other transient keys are obtained by a fast roaming method without having to re-undergo a backend authentication, the other transient keys being for other links and/or paths and derived using the hierarchy.
摘要:
An authentication method in a mesh AP including using standard IEEE 802.11i mechanisms between the mesh AP and an authenticator for authenticating the mesh AP to become a child mesh AP with a secure layer-2 link to a first parent mesh AP that has a secure tunnel to a Controller, including, after a layer-2 link between the child mesh AP and the first parent mesh AP is secured, undergoing a join exchange for form a secure tunnel between the child mesh AP and the Controller. Further, a fast roaming method for re-establishing a secure layer-2 link with a new parent mesh AP including, while the mesh AP is a child mesh AP to the first parent mesh AP and has a secure layer-2 link to the first parent mesh AP, caching key information and wireless mesh network identity information, and using the cached information to establish a secure layer-2 link with a new parent mesh AP without having to undergo a 4-way authentication. Further, while the mesh AP is a child mesh AP to the first parent mesh AP, has a secure layer-2 link to the first parent mesh AP, and has a secure tunnel to the Controller, caching session information on the secure tunnel, and using the cached information to re-establish the secure tunnel with the Controller, the secure tunnel now via the new mesh AP.
摘要:
A method is shown for joining and sealing a female plastic pipe end having a belled end opening to a mating male plastic pipe end having an interior surface and an exterior surface. A sealing element is installed within a groove formed in the belled end of the female pipe section. The male pipe end is then inserted into the end opening of the female pipe end so that the elastomeric sealing gasket makes sealing contact with the exterior surface of the male pipe. A modified transition angle controls the distance the male pipe travels longitudinally within the end opening of the female plastic pipe to prevent overinsertion of the male pipe within the female pipe opening. The modified transition angle thereby lowers the incidence of damage caused by overinsertion by reducing the stress concentration on the socket.
摘要:
In one embodiment, a method involves selecting a connection, and attempting to establish a satisfactory link using that connection. If the link is not established, a reliability indicator associated with the connection is modified, to disfavor use of that connection. If the link is established, the reliability indicator associated with the connection is modified, to favor the use of that connection.
摘要:
An apparatus for, a method of, and a computer carrier medium carrying code to cause a processor to execute a method. The method includes running a plurality of instances of a wireless spanning tree protocol in a wireless mesh node, each instance substantially conforming to the IEEE 802.1 standard. Running an instance of wireless spanning tree protocol including the wireless mesh point wirelessly transmitting BPDU information to other wireless mesh points of the network or wirelessly receiving BPDU information from other wireless mesh points, the BPDU information encapsulated in one or more control/management frames, e.g., beacon or probe response frames of a wireless network standard, the BPDU information relating to a spanning tree topology for the instance.
摘要:
A first code module in a computing device detects an event that constitutes an automatic start debug session condition. The detected event is an occurrence of significance to the first code module and the condition is a set of one or more start criterions of which the detected event is a part. One or more actions for that condition are determined, wherein each action includes properties of a different debug session. At least one of the action(s) are sent to a second code module in the computing device upon determining that the second code module should automatically start at least one debug session. One or more debug flags are set according to each action to start the debug session corresponding to each action and a set of debug messages corresponding to the flags that are set are generated.
摘要:
Techniques for automatically triggering debug sessions across a network are described herein. In one embodiment of the invention, at a first code module in a first computing device, a detected event is determined to constitute an automatic start network debug session condition, wherein the detected event is an occurrence of significance to the first code module, and wherein the automatic start debug session condition is a set of one or more start criterions of which the detected event is a part. One or more actions for that automatic start network debug session condition are determined, wherein each action includes properties of a different one of the one or more debug sessions. A destination of at least one of the actions is determined to be a second computing device. An automatic network debug message is formed for each action destined for the second computing device, wherein the automatic network debug message is based on that action and wherein the automatic network debug message indicates the properties of the debug session. Each automatic network debug message destined for the second computing is transmitted to the second computing device. Upon receiving the automatic network debug messages, the second computing device processes each received automatic network debug message, wherein processing includes reforming the action from the received automatic network debug message and sending the reformed action to a local code module upon determining that the local code module should automatically start a debug session. One or more flags are set according to each reformed action to start the debug session corresponding to each reformed action, and a set of one or more debug messages are generated corresponding to the flags that are set. Other methods and apparatuses are also described.
摘要:
A method of implementing a spanning tree protocol for a wireless network conforming to a wireless network standard, the spanning tree protocol substantially conforming to the IEEE 802.1 standard, including a first wireless bridging node wirelessly transmitting BPDU information to other wireless bridging nodes of the network or wirelessly receiving BPDU information from other wireless bridging nodes, the BPDU information encapsulated in one or more control/management frames, e.g., beacon or probe response frames of the wireless network standard, the BPDU information relating to a spanning tree topology containing the first and other wireless bridging nodes.
摘要:
A method for joining and sealing a female plastic pipe end having a belled end opening to a mating male plastic pipe end having an interior surface and an exterior surface. A sealing element is installed within a groove formed in the belled end of the female pipe section. The male pipe end is then inserted into the end opening of the female pipe end so that the elastomeric sealing gasket makes sealing contact with the exterior surface of the male pipe. A control mechanism controls the distance the male pipe travels longitudinally within the end opening of the female plastic pipe to prevent overinsertion of the male pipe within the female pipe opening.
摘要:
In an example embodiment, there is described herein a “Wireless Route Aggregation Protocol” (WRAP) that is used to aggregate multiple wireless links into a WRAP “route bundle” that functions as a single logical LAN bridge link. WRAP link aggregation can be used for example to increase the bandwidth and robustness of the wireless path between two wired Ethernet LANs.