摘要:
Methods, apparatuses, and systems directed to facilitating troubleshooting wireless connectivity issues in a wireless network. In accordance with one embodiment of the present invention, either a diagnostic supplicant in the wireless client or a diagnostic manager initiates a troubleshooting protocol between the diagnostic supplicant and the diagnostic manager over a diagnostic link in response to one or more events. In one embodiment, after the diagnostic supplicant establishes a link to a diagnostic manager via a diagnostic link, the diagnostic supplicant generates and transmits a problem report to the diagnostic manager. The problem report initiates a troubleshooting protocol between the diagnostic manager and the diagnostic supplicant.
摘要:
Methods, apparatuses, and systems directed to facilitating troubleshooting wireless connectivity issues in a wireless network. In accordance with one embodiment of the present invention, either a diagnostic supplicant in the wireless client or a diagnostic manager initiates a troubleshooting protocol between the diagnostic supplicant and the diagnostic manager over a diagnostic link in response to one or more events. In one embodiment, after the diagnostic supplicant establishes a link to a diagnostic manager via a diagnostic link, the diagnostic supplicant generates and transmits a problem report to the diagnostic manager. The problem report initiates a troubleshooting protocol between the diagnostic manager and the diagnostic supplicant.
摘要:
In one embodiment, a method for acquiring service provider information includes querying a wireless network for service provider information, receiving an advertisement response containing advertising service scheduling information, and configuring a power conservation mode responsive to the advertising service scheduling information.
摘要:
In one embodiment, a method for acquiring service provider information includes querying a wireless network for service provider information, receiving an advertisement response containing advertising service scheduling information, and configuring a power conservation mode responsive to the advertising service scheduling information.
摘要:
A wireless access point selection system. In particular implementations, a method includes receiving a notification that identifies a wireless access point that detects radar on an operating channel and identifies the operating channel; updating neighbor lists of one or more neighboring wireless access points to remove the wireless access point from the neighbor list, where the neighbor list comprises neighbor wireless access points, corresponding operating channels, and corresponding enable indications, where each enable indication indicates if a channel availability check is required before performing active scanning; and transmitting the updated neighbor list to the neighboring wireless access points. In one implementation, a system provides a DFS enable indication to wireless clients so they can know whether a channel availability check is required prior to transmitting.
摘要:
Methods, apparatuses, and systems directed to facilitating the application of pre-allocation policies in a wireless network environment. According to one implementation of the present invention, a central controller, or other control point in a wireless network infrastructure, applies one or more policies that limit the number of resource pre-allocations a given wireless client may establish with one or more wireless access points. In one implementation, the central controller provides a pre-allocation list to a wireless client that is requesting pre-allocation. By limiting a wireless client's ability to pre-allocate resources, the central controller optimally manages the resources of the wireless network. In alternative embodiments, the central controller can terminate pre-allocations between a wireless client and one or more wireless access points to enforce pre-allocation policy on the wireless network infrastructure.
摘要:
Methods, apparatuses and systems enabling a directed association mechanism in wireless computer network environments. In certain embodiments, the directed association functionality described herein can be used in a variety of contexts, such as directing wireless clients to associate with a desired access element or subset of access elements in a wireless network environment. In certain embodiments, the present invention can also be used to increase the efficiency of handing off wireless clients between access elements. The directed association mechanism, in one embodiment, increases the efficiency of establishing wireless connections between wireless clients and access points in a wireless network system.
摘要:
Methods, apparatuses and systems directed to detecting address spoofing in wireless networks by, after receiving a wireless management frame, transmitting verification messages to determine whether a given wireless node (e.g., a wireless access point, or wireless client) has legitimately lost its connection state.
摘要:
A troubleshooting system. In particular implementations, a method includes receiving a request for troubleshooting, where the request comprises identifying information for a wireless client having a connection problem. The method further includes identifying network nodes that are sources of log data associated with connection activity of the wireless client, and invoking troubleshoot logging on one or more central controllers for the wireless client. The method further includes polling the identified network nodes for the log data, and identifying one or more potential causes of the connection problem based on correlating the data logs.
摘要:
Methods, apparatuses and systems facilitating containment of the effects of rogue or unauthorized access points on wireless computer network environments. Embodiments of the present invention support one to a plurality of rogue containment methodologies. A first rogue containment type involves identification of the physical connection of the rogue access point to the wired network infrastructure and, thus, allows for disabling of that physical connection to contain the rogue access point. Other rogue containment methods involve wireless techniques for containing the effect of rogue access points. As discussed below, the rogue containment functionality described herein can be applied to a wide variety of wireless network system architectures.