Trapeze Networks, Inc. Patent applications |
Patent application number | Title | Published |
20160135108 | AP-LOCAL DYNAMIC SWITCHING - A technique for implementing AP-local dynamic switching involves Layer 2 switching. This may be accomplished by providing data associated with wireless stations to an AP sufficient to enable the AP to determine whether traffic from a particular wireless station should be locally switched. Alternatively, the wireless station may be able to determine whether to locally switch traffic based upon the traffic itself. For example, it may be desirable to AP-locally switch voice traffic to avoid latency, which is particularly detrimental to voice transmissions such as voice-over-IP. Traffic that is not to be switched locally is Layer 2 tunneled upstream. | 05-12-2016 |
20160088551 | UNTETHERED ACCESS POINT MESH SYSTEM AND METHOD - A technique for implementing an untethered access point (UAP) mesh involves enabling AP-local switching at one or more UAPs of the mesh. A system constructed according to the technique may include a wireless switch; an access point (AP) wire-coupled to the wireless switch; and a UAP mesh, wirelessly coupled to the AP, including a UAP with an AP-local switching engine embodied in a computer-readable medium. Another system constructed according to the technique may include an untethered access point (UAP), including: a radio; a backhaul service set identifier (SSID) stored in a computer-readable medium; an anchor access point (AAP) selection engine embodied in a computer-readable medium. In operation, the AAP selection engine may use the radio to attempt to associate with the AAP if a beaconed backhaul SSID matches the stored backhaul SSID. A method according to the technique may include beaconing with a backhaul SSID; acting in concert with an upstream switch as an authenticator for a downstream station that responds to the beacon; providing limited local switching functionality for the downstream station. | 03-24-2016 |
20160021528 | SHARING DATA BETWEEN WIRELESS SWITCHES SYSTEM AND METHOD - A technique for facilitating the management of a wireless database related to station records and radio-frequency (RF) information by reducing unnecessary sharing of the data among wireless switches, thus enhancing efficiency in a wireless network. A system constructed according to the technique includes a collection of wireless switches with each switch having associated access points (AP), an AP database distributed throughout the collection of wireless switches, and at least one station radio frequency (RF) database. The AP database includes data associated with ownership of the AP's by the switches, and the station RF database includes wireless station information and RF information. AP radio adjacency is determined by whether an AP owned by a specific switch can detect the other AP owned by another switch. The station and RF information database is shared only within the subset of switches that have AP radio adjacency. | 01-21-2016 |
20140364130 | UNTETHERED ACCESS POINT MESH SYSTEM AND METHOD - A technique for implementing an untethered access point (UAP) mesh involves enabling AP-local switching at one or more UAPs of the mesh. A system constructed according to the technique may include a wireless switch; an access point (AP) wire-coupled to the wireless switch; and a UAP mesh, wirelessly coupled to the AP, including a UAP with an AP-local switching engine embodied in a computer-readable medium. Another system constructed according to the technique may include an untethered access point (UAP), including: a radio; a backhaul service set identifier (SSID) stored in a computer-readable medium; an anchor access point (AAP) selection engine embodied in a computer-readable medium. In operation, the AAP selection engine may use the radio to attempt to associate with the AAP if a beaconed backhaul SSID matches the stored backhaul SSID. A method according to the technique may include beaconing with a backhaul SSID; acting in concert with an upstream switch as an authenticator for a downstream station that responds to the beacon; providing limited local switching functionality for the downstream station. | 12-11-2014 |
20120300708 | WIRELESS STATION LOCATION DETECTION - A technique for locating a device uses connectivity to find a distance between an access point (AP) and a device. The AP transmits a frame to a device and receives an acknowledgement frame from the device. The amount of time for a signal to pass between the AP and the device is estimated and multiplied by the speed of light to find the distance between the AP and the device. | 11-29-2012 |
20120250600 | THROTTLING ACCESS POINTS - A technique for controlling the amount of power consumed by access points (APs) of a wireless network involves implementing throttleable APs (TAPs). It would be desirable for the TAPs to be in a relatively low power mode during periods of low activity, and switch to a high power mode in response to increased wireless activity. To that end, a throttling engine can be implemented to throttle TAPs up in power in response to increases in wireless activity, and throttle TAPs down in power in response to decreases in wireless activity. | 10-04-2012 |
20120204031 | SYSTEM AND METHOD FOR DISTRIBUTING KEYS IN A WIRELESS NETWORK - A technique for improving authentication speed when a client roams from a first authentication domain to a second authentication domain involves coupling authenticators associated with the first and second authentication domains to an authentication server. A system according to the technique may include, for example, a first authenticator using an encryption key to ensure secure network communication, a second authenticator using the same encryption key to ensure secure network communication, and a server coupled to the first authenticator and the second authenticator wherein the server distributes, to the first authenticator and the second authenticator, information to extract the encryption key from messages that a client sends to the first authenticator and the second authenticator. | 08-09-2012 |
20120190323 | SMOOTHING FILTER FOR IRREGULAR UPDATE INTERVALS - A technique for determining a received signal strength from multiple messages filters noise from the received signal to provide an accurate signal strength value. Advantageously, the more accurate output signal strength value can be used to identify movement of a station as well as estimate locations and direction of movement. | 07-26-2012 |
20120190320 | SMOOTHING FILTER FOR IRREGULAR UPDATE INTERVALS - A technique for determining a received signal strength from multiple messages filters noise from the received signal to provide an accurate signal strength value. Advantageously, the more accurate output signal strength value can be used to identify movement of a station as well as estimate locations and direction of movement. | 07-26-2012 |
20120140705 | SYSTEM AND NETWORK FOR WIRELESS NETWORK MONITORING - A technique for wireless network monitoring involves scanning channels using clients instead of access points. An example of a method according to the technique may include, for example, receiving from a wireless access point a command to perform a channel scanning function, listening on a channel associated with the channel scanning function, and sending RF data found on the channel to the wireless access point. Another example of a method according to the technique may include, for example, scanning a first channel, switching from the first channel to a second channel, sending data on the second channel to an access point, switching from the second channel to the first channel, and resuming scanning on the first channel. A system according to the technique may include one or more scanning clients, proxy clients, multi-channel clients, or other clients that are capable of scanning channels in lieu of an access point. | 06-07-2012 |
20120034943 | WIRELESS LOAD BALANCING ACROSS BANDS - A technique for wireless load balancing involves providing a wireless infrastructure that creates a target band option and helps push clients toward that band. An example of a method according to the technique involves, by way of example but not limitation, responding only to probe requests on a first band when a client is detected on the first band and a second band. For example, using the techniques described herein, a platform that is both 802.11a and 802.11b/g compliant may attempt to connect preferentially to the 802.11b/g band of a wireless network, and be migrated toward the 802.11a band instead. | 02-09-2012 |
20110255466 | SYSTEM AND METHOD FOR AGGREGATION AND QUEUING IN A WIRELESS NETWORK - A technique for improved throughput at an access point (AP) involves when frames are received for transmission by the AP, queuing the frames for a particular station. A system constructed according to the technique may include an aggregation and queuing layer. Station queues may be processed by the aggregation and queuing layer before being given to radio hardware for transmission. In an illustrative embodiment, when frames are received by the aggregation and queuing layer, the packet will be assigned a target delivery time (TDT) and an acceptable delivery time (ADT). The TDT is the “ideal” time to transmit a frame, based on its jitter and throughput requirements. Frames are mapped on to a time axis for transmission by TDT. In an illustrative embodiment, each frame is mapped by priority, so that there are separate maps for voice, video, best effort, and background frames. There will be gaps between frames for transmission that can be used for aggregation. | 10-20-2011 |
20110158122 | WIRELESS ROUTING SELECTION SYSTEM AND METHOD - A technique involves untethered access points (UAPs) that can broadcast estimated transmission time (ETT) that represents an estimated time it would take for a packet to be transmitted from the first UAP to an AP that is wire coupled to a network. The proposed system can offer, among other advantages, accurate ETT values for use by UAPs of a wireless network. | 06-30-2011 |
20110128858 | SYSTEM AND NETWORK FOR WIRELESS NETWORK MONITORING - A technique for wireless network monitoring involves scanning channels using clients instead of access points. An example of a method according to the technique may include, for example, receiving from a wireless access point a command to perform a channel scanning function, listening on a channel associated with the channel scanning function, and sending RF data found on the channel to the wireless access point. Another example of a method according to the technique may include, for example, scanning a first channel, switching from the first channel to a second channel, sending data on the second channel to an access point, switching from the second channel to the first channel, and resuming scanning on the first channel. A system according to the technique may include one or more scanning clients, proxy clients, multi-channel clients, or other clients that are capable of scanning channels in lieu of an access point. | 06-02-2011 |
20100315203 | ASSET TAG POWER OPTIMIZATION - A technique for saving power in a tag that is operationally connected to an asset involves using telemetry data to enter an appropriate power state. An asset tracking system according to the technique can make use of context to better track assets to which power-saving tags are operationally connected. Secure tag configuration techniques and asset-agnostic tags are described. Location-agnostic tags are also described. | 12-16-2010 |
20100263852 | HEAT MANAGEMENT FOR ENCLOSED ELECTRONICS - Providing a plurality of fans within an enclosure. A system implementing this technique can include an enclosure, a heat sink in thermal communication with the enclosure, electronic components at least partially sealed within the enclosure, an eXclusive OR (XOR) fan array, a monitoring engine, and a control engine. A method implementing this technique can include using a heat sink to dissipate heat generated by electronic components within an enclosure; determining that each of the fans of a XOR fan array are stopped, selecting one and only one of the fans of the XOR fan array for operation, and operating the fan to increase air flow within the enclosure, thereby increasing the efficiency of the heat sink. | 10-21-2010 |
20100195549 | THROTTLING ACCESS POINTS - A technique for controlling the amount of power consumed by access points (APs) of a wireless network involves implementing throttleable APs (TAPs). It would be desirable for the TAPs to be in a relatively low power mode during periods of low activity, and switch to a high power mode in response to increased wireless activity. To that end, a throttling engine can be implemented to throttle TAPs up in power in response to increases in wireless activity, and throttle TAPs down in power in response to decreases in wireless activity. | 08-05-2010 |
20100172276 | ACCESS POINT AGITATION - A technique for controlling the amount of power consumed by access points (APs) of a wireless network involves implementing power-saving APs (PSAPs). It would be desirable for the PSAPs to be in sleep mode during periods of low activity, and at full power during periods of high activity. To that end, a PSAP agitation (PSAPA) engine can be implemented to agitate PSAPs in response to increases in wireless activity, and put PSAPs to sleep in response to decreases in wireless activity. | 07-08-2010 |
20100113098 | TUNED DIRECTIONAL ANTENNAS - A technique for improving radio coverage involves using interdependently tuned directional antennas. An example according to the technique is a substrate including two antennas, a transceiver, and a connector. Another example system according to the technique is a wireless access point (AP) including a processor, memory, a communication port, and a PCB comprising a plurality of directional antennas and a radio. An example method according to the technique involves determining a voltage standing wave ratio (VSWR) and interdependently tuning a first and second directional antenna to reach an expected radiation pattern. | 05-06-2010 |
20100103059 | TUNED DIRECTIONAL ANTENNAS - A technique for improving radio coverage involves using interdependently tuned directional antennas. An example according to the technique is a substrate including two antennas, a transceiver, and a connector. Another example system according to the technique is a wireless access point (AP) including a processor, memory, a communication port, and a PCB comprising a plurality of directional antennas and a radio. An example method according to the technique involves determining a voltage standing wave ratio (VSWR) and interdependently tuning a first and second directional antenna to reach an expected radiation pattern. | 04-29-2010 |
20100067379 | PICKING AN OPTIMAL CHANNEL FOR AN ACCESS POINT IN A WIRELESS NETWORK - A novel technique involves evaluating a real-time environment of a channel based on a nonlinear function of the number of neighbor radios and channel utilization requirements. The technique can be used to pick a channel for an AP that is added to a wireless network or to tune a channel for an existing AP. The technique can be applied to, for example, a relatively new wideband option in the 802.11n standard. | 03-18-2010 |
20100040059 | SYSTEM AND METHOD FOR RESTRICTING NETWORK ACCESS USING FORWARDING DATABASES - This specification describes a system that can offer, among other advantages, dynamically allowing or rejecting non-DHCP packets entering a switch. In addition, a FDB is commonly used by a bridge or switch to store an incoming packet's source MAC address and its port number, then later on if the destination MAC address of another incoming packet matching any entry in FDB will be forwarded to its associated port. Using the techniques described herein, not only this will be completely transparent to user, the techniques can also result in an increase in switch performance by blocking unwanted traffic at an earlier stage of forwarding process and freeing up other processing units at a later stage, like switch fabric or packet processing stages. | 02-18-2010 |
20100024007 | AFFIRMING NETWORK RELATIONSHIPS AND RESOURCE ACCESS VIA RELATED NETWORKS - A technique for providing a prediction as to whether a resource will be accessible to a user is described. The technique can involve comparing asserted membership in a wireless realm with membership records. Advantageously, a user can be made aware of the likelihood of access to a resource before attempting to reach the resource. | 01-28-2010 |
20090323531 | WIRELESS LOAD BALANCING - A technique for wireless load balancing involves providing a wireless infrastructure that creates a target band option and helps push clients toward that band. An example of a method according to the technique involves, by way of example but not limitation, responding only to probe requests on a first band when a client is detected on the first band and a second band. For example, using the techniques described herein, a platform that is both 802.11a and 802.11b/g compliant may attempt to connect preferentially to the 802.11b/g band of a wireless network, and be migrated toward the 802.11a band instead. | 12-31-2009 |
20090300740 | PROACTIVE CREDENTIAL CACHING - In wireless networking, such as per the IEEE 802.11 standard, a technique automatically republishes an authentication credential to a global credential repository. A station can have a first credential, as is created when the station connects to a first access node of a wireless network. Upon trying and failing to connect to a second access node of the wireless network, the station can have a second credential created and published to the global credential repository. In some situations, the station then roams back to the first access node using the first credential. Efficiently, when the station uses the first credential at the first access node, the first credential can be automatically republished as a global credential. The automatic republishing of the first credential can ensure that the station is able to access the wireless network via various access nodes when roaming. | 12-03-2009 |
20090293106 | METHOD AND APPARATUS FOR CONTROLLING WIRELESS NETWORK ACCESS PRIVILEGES BASED ON WIRELESS CLIENT LOCATION - An access point through which a wireless device attaches to a wireless network determines the access privileges that will be accorded to the device based on a criteria set, such as the ID and physical location of the device requesting network access, the access point through which the device is connected to the network and user credentials. The location of the device is determined by a location determination system using the signal strength of the device signal. The location information and ID information is provided to an access server that uses the criteria set to retrieve access privileges from a privilege database. The retrieved access privileges are then applied to the wireless device by means of the access point and other devices in the wireless network. | 11-26-2009 |
20090287816 | LINK LAYER THROUGHPUT TESTING - A technique for testing a network path involves making use of feedback enabling parameters. Values for the feedback enabling parameters can be generated from a measurement of path performance. The technique can be implemented for wireless paths. The technique can also be implemented for multi-hop paths. | 11-19-2009 |
20090274060 | SYSTEM AND METHOD FOR REMOTE MONITORING IN A WIRELESS NETWORK - A technique for combining operations of a wireless access point with a remote probe. An access point links a wireless client to a wireless switch. A remote probe captures wireless packets, appends radio information, and forwards packets to a remote observer for analysis. In an embodiment, the observer may provide a protocol-level debug. A system according to the technique can, for example, accomplish concurrent in-depth packet analysis of one or more interfaces on a wireless switch. The system can also, for example, augment embedded security functions by forwarding selected packets to a remote Intrusion Detection System (IDS). In an embodiment, filters on the probes may reduce overhead. | 11-05-2009 |
20090257437 | IDENTITY-BASED NETWORKING - A technique for identity based networking is disclosed. A system according to the technique can include a WAN, a first VLAN, a second VLAN, and a network database. The first VLAN and second VLAN can be coupled to the WAN. The network database can include VLAN information. In operation, a client that is authorized on the second VLAN can attempt to connect to the first VLAN. A switch in the WAN can perform a lookup in the network database and determine that the client is authorized on the second VLAN. Based on this information, the client can be connected to the second VLAN using VLAN tunneling. | 10-15-2009 |
20090198999 | SYSTEM AND METHOD FOR DISTRIBUTING KEYS IN A WIRELESS NETWORK - A technique for improving authentication speed when a client roams from a first authentication domain to a second authentication domain involves coupling authenticators associated with the first and second authentication domains to an authentication server. A system according to the technique may include, for example, a first authenticator using an encryption key to ensure secure network communication, a second authenticator using the same encryption key to ensure secure network communication, and a server coupled to the first authenticator and the second authenticator wherein the server distributes, to the first authenticator and the second authenticator, information to extract the encryption key from messages that a client sends to the first authenticator and the second authenticator. | 08-06-2009 |
20090131082 | WIRELESS STATION LOCATION DETECTION - A technique for locating a device uses connectivity to find a distance between an access point (AP) and a device. The AP transmits a frame to a device and receives an acknowledgement frame from the device. The amount of time for a signal to pass between the AP and the device is estimated and multiplied by the speed of light to find the distance between the AP and the device. | 05-21-2009 |
20090073905 | HIGH LEVEL INSTRUCTION CONVERGENCE FUNCTION - A convergence engine may provide a high level message for a high level engine representative of multiple messages received by a network interface or other physical layer transmission device. The high level engine may access one or more high level messages via functions describing the state of a non-network-portal station. | 03-19-2009 |
20090067436 | NETWORK ASSIGNMENT BASED ON PRIORITY - Systems and methods for network assignment based on priority are described in this application. In one aspect, a technique for network assignment based on priority relates to establishing a connection between a client and a virtual local area network (VLAN), based on an explicit or implicit network priority preference of the client. In an embodiment, multiple VLANs can be combined into one network bundle, the network bundle being a unit network for priority specification. In addition, multiple network bundles may be available for network assignment on a particular network controller (e.g., network switch). For example, the preferred network of a client may be comprised of several individual VLANs. Thus, the client can be assigned to any of the constituent VLANs included in the preferred network bundle. | 03-12-2009 |
20080276303 | Network Type Advertising - A technique for network type awareness involves providing network type information associated with a wireless network to stations. The stations, or users of the stations, can then select which network best meets their needs. | 11-06-2008 |
20080226075 | Restricted services for wireless stations - A technique for providing restricted access to a wireless network involves recognizing a service descriptive identifier (SDID). The SDID may be transmitted to wireless stations that query the wireless network so that the wireless stations can at least gain access to restricted services provided by the wireless network. The SDID may include quality of service (QoS) parameters, as well, thereby facilitating dynamically restricted access to the wireless network. | 09-18-2008 |