Patent application number | Description | Published |
20080232373 | System and method for extending battery life - According to one embodiment of the invention, a method comprises determining whether a non-unicast message is to be transmitted by a transmitting device, which may involve a setting a Delivery Traffic Indicator Map (DTIM) Interval value to reflect a longer periodicity than associated with a Listen Interval. After such determination, the non-unicast message may be converted into one or more unicast messages for transmission. | 09-25-2008 |
20090113535 | Securely Virtualizating Network Services - Services in a network device are added through providing virtual environments. Virtualization allows services based on other platforms or architectures to be run with minimum modification and in a secure manner. Connecting services to the host through a stateful firewall allows dynamic integration, and passes only traffic of interest to the service. Virtualization allows services written for different instruction architectures to be supported. Multiple virtualized environments each supporting a service may be run. | 04-30-2009 |
20090156164 | Single Number Presentation for Dual-Mode Phones - Providing a single number presentation to the party called by a dual-mode phone. The operation of the cellular side of a dual-mode phone is altered such that when the user attempts to place an outgoing call using the cellular phone, the call is redirected to a preprogrammed incoming phone number associated with the enterprise. When the enterprise PBX answers this call, the dual-mode phone transmits the desired number to the enterprise PBX. The enterprise PBX then places the call to the desired number, and in the process transmits the caller-id information assigned to the dual-mode phone. | 06-18-2009 |
20090156175 | Single Voicemail For Dual-Mode Phones - Single voicemail for dual-mode phones. Functionality is added to a dual-mode phone such that the dual-mode phone when operating in cellular mode sends a predetermined signal when it answers an incoming call. An enterprise mobility controller, on forwarding a call to the cellular side of a dual-mode phone after failing to complete a Wi-Fi connection, starts a timer. If the mobility controller does not receive the predetermined signal before the timer expires, it assumes that the cellular call has been handed off to the cellular voicemail system, terminates the cellular call, and sends the call to the enterprise voicemail system. | 06-18-2009 |
20100195497 | Client Balancing in Wireless Networks - Client balancing in a wireless digital network comprising a plurality of access nodes connected to a controller. Access nodes collect client density information and periodically report that client density information to the controller. The controller uses the client density information from the access nodes to compute Virtual RF Neighborhoods, identifying Virtual RF neighboring access nodes. Two access nodes are Virtual RF neighbors if a client which can connect to one access node can also connect to the other access node. The controller then identifies which nodes are overloaded by comparing the client loading of a target access node to the client loading of its Virtual RF neighbors. If an access node is identified as overloaded and selected for client balancing on a particular channel, it will initially refuse new association requests from client devices on that channel. | 08-05-2010 |
20110122804 | SYSTEM AND METHOD FOR EXTENDING BATTERY LIFE - According to one embodiment of the invention, a method comprises identifying that a wireless receiving device is operating in a battery saving mode where a Delivery Traffic Indicator Map (DTIM) Interval supported by the wireless device exceeds a Listening Interval supported by the wireless receiving device. Thereafter, the method further comprises converting a non-unicast message into one or more unicast messages for transmission to the wireless receiving device. | 05-26-2011 |
20110281549 | SINGLE NUMBER PRESENTATION FOR DUAL-MODE PHONES - Providing a single number presentation to the party called by a dual-mode phone. The operation of the cellular side of a dual-mode phone is altered such that when the user attempts to place an outgoing call using the cellular phone, the call is redirected to a preprogrammed incoming phone number associated with the enterprise. When the enterprise PBX answers this call, the dual-mode phone transmits the desired number to the enterprise PBX. The enterprise PBX then places the call to the desired number, and in the process transmits the caller-id information assigned to the dual-mode phone. | 11-17-2011 |
20120166515 | Providing and Resolving an IP Address for Swarm-Based Services - Providing and maintaining an IP address for swarm-based services. A swarm is a group of digital devices operating cooperatively on a network, such as a group of wireless access points. Services may be distributed over members of the swarm, with each service having a master which is hosted on one member of the swarm. The master broadcasts a periodic heartbeat, advertising its service and the address of the host member. If a swarm member fails to hear a particular service's heartbeat for a predetermined interval, it broadcasts a message announcing its intent to be master for the service. If the swarm member does not receive any other broadcasts from members indenting to take the role of master for the service, it takes over the role of master for the service and begins broadcasting periodic heartbeats identifying itself as the service master. If multiple swam members broadcast their intent to become master of the same service, a resolution protocol is invoked and one swarm member is selected to be master. In operation, each member of the swarm maintains a table of services and the address of the swarm member hosting the service; this information is obtained from the periodic heartbeats broadcast by each service master. When a swarm member receives a service request, the request is either redirected to the service master, or the request is terminated at the swarm member and handled. | 06-28-2012 |
20120166519 | Provisioning a Swarm - Provisioning access points operating in a swarm. A swarm is a plurality of digital devices, such as access points, connected using a digital network and operating in a cooperative manner. When an access point (AP) is first powered up, it lacks provisioning information such as channel numbers, power levels, SSIDS, security settings, and so on. The process of supplying this information required to get the AP operating as part of a network is called provisioning. An unprovisioned AP in a swarm first attempts to obtain a DHCP address. Once it gets a DHCP address or selects an address such as from the link-address (169.254.xx.xx) group, it advertises a predetermined wireless SSID which is only used for provisioning the swarm. The swarm | 06-28-2012 |
20120166662 | HTTP Proxy based Captive Portal - HTTP-Based Captive Portal. Client requests through a device such as an access point or wired connection are routed through a captive portal switch (CPS). If the CPS determines that the client has not been authenticated, the CPS redirects (NATs) the client request to an internal HTTP proxy. The CPS HTTP proxy terminates the client request and opens a connection to a captive portal server. Thus, for an unauthenticated client, any HTTP request will be routed to the captive portal server. When client authentication at the captive portal server completes, the captive portal server returns a success code, such as embedded in a web page delivered to the client. When the CPS recognizes this success code, it disables the NAT for that client, allowing further requests to be passed through the network. The CPS may be hosted in a separate network appliance, or it may be a process hosted in the AP or on another AP in the network, or on a network device such as a controller or switch. | 06-28-2012 |
20120170455 | Client Balancing in Wireless Networks - Herein, a method directed to receiving, by a network device, client density data of a first access node in a plurality of access nodes in a network. Also, the network device receives client density data of a second access node in the plurality of access nodes. The network device determines whether the client density data of the first access node overlaps with the client density data of the second access node. In response to the received client density data of the first access node overlapping with the received client density data of the second access node, the network device identifies the first access node and the second access node as members of a virtual radio frequency (RF) neighborhood, wherein the virtual RF neighborhood comprises a subset of a RF neighborhood. Each member of the virtual RF neighborhood is capable of receiving beacons from other members of the virtual RF neighborhood. | 07-05-2012 |
20120243456 | Bridge Mode Firewall Mobility - Mobility of firewall rules for clients moving among bridge AP nodes in a wireless network. APs operate in bridge mode. A wireless client C is associated with a first AP. As part of that association, the first AP establishes and maintains personal firewall rules and state for client C. When wireless client C associates with a second AP in the L2 domain, the second AP sends session request to other APs. This may be in the form of a multicast message. Optionally, the second AP may send a unicast message to the first AP indicating that client C has associated with the second AP. APs receiving the multicast session request message for client C check their tables to see if they have stored firewall or other state for client C. APs having storied firewall or other state for client C send session response messages to the second AP containing stored firewall sessions and other state for client C. When the second AP receives a session response, it sends an acknowledgement to the AP which sent the response. When the AP, such as the first AP, receives the acknowledgement, it may remove all stored state for client C. If the second AP receives session response messages for client C from multiple APs, it acknowledges each, and creates session entries and state using the oldest rules in the session response messages. Flags may be logically ORed together. | 09-27-2012 |
20120275320 | SIGNAL STRENGTH AWARE BAND STEERING - A system or method that receives a current request from a client, and responds to the current request based on signal strength associated with a previous request. If the current request is received on a non-preferred communication band, and a previous request was received on a preferred communication band within a pre-determined time, the system determines whether the signal strength associated with the previous request is weaker than a pre-determined threshold signal strength level for the preferred communication band. If so, the system responds to the current request. Otherwise, the system ignores the current request. If no recent request on the preferred communication band is received, and the signal strength associated with the current request is weaker than a pre-determined threshold signal strength level for the non-preferred communication band, the system responds to the current request on the non-preferred communication band. Otherwise, the system ignores the current request. | 11-01-2012 |
20120278440 | Dynamic Transaction-Persistent Server Load Balancing - The present disclosure describes a system for dynamic transaction-persistent server load balancing. The disclosed system receives a client request associated with a new transaction. In response to receiving the client request, the system dynamically infers relative capacities of a plurality of servers coupled to the device in a network. In particular, the system maintains a set of variables corresponding to the servers. Each variable indicates a number of outstanding requests transmitted from the device to a respective server. The system infers relative server capacities and transmission latencies between the device and the servers based on a comparison of current values of the variables. The system identifies and selects a server associated with high capacity or low transmission latency between the device and the server relative to one or more other servers, and transmits an outstanding request corresponding to the client request from the new transaction to the identified server. | 11-01-2012 |
20130003654 | Mesh Node Role Discovery and Automatic Recovery - Embodiments of the present disclosure provide for configuring and managing mesh nodes during occasional failure of mesh nodes or addition of new mesh nodes. The disclosed system first determines whether a mesh node is a mesh portal or a mesh point. If it is a mesh portal, the mesh node will advertise its capacity as a mesh portal to other mesh nodes in the network. If it is a mesh point, the mesh node attempts to automatically recover connection to the wireless mesh network if it identifies a unique wireless network based on its associated network identifier. If more than one network identifiers are discovered, the mesh node delays establishing connection to the wireless mesh network until a selection is received. | 01-03-2013 |
20130007104 | Time Zone Adjustment in User Interface - Displaying time from a network device according to the time zone of the client. A network device keeps time to a first known time zone, such as UTC, and provides a web server. When a client device makes a request of the network device's webserver, the webserver returns an HTML document which includes code to extract the time zone offset from the client. This may be done for example using the javascript .getTime zone Offset( ) method, through the use of DLLs, or through other programming methods. The document also contains the time at the network device, which is displayed on the client device using the client time zone, and not using the clock or time information in the client device, only using the time zone offset in the client device. | 01-03-2013 |
20130007233 | Device Abstraction in Autonomous Wireless Local Area Networks - According to embodiments of the present disclosure, a managed network device assigns to itself an IP address, in absence of a DHCP service, in a link local address space within a wireless network. The system further responds to a network frame received from another device based on the assigned IP address in the link local address space. The network frame can be a network traffic frame, a control path frame, and/or a management frame. The control path frame comprises a source IP address and a destination IP address that correspond to internal IP addresses in the link local address space that are self-assigned by managed network devices. The management frame comprises the self-assigned internal IP address for the managed network device, and provides for management of managed network devices in the wireless network through a single IP address when a virtual controller is configured for the wireless network. | 01-03-2013 |
20130036188 | Infrastructure-Assisted Client Management using Synthesized Beacon Reports - Infrastructure-based client management uses synthesized beacon reports to effect client association with APs in a wireless digital network. Beacon reports are synthesized by having a plurality of APs in the network collect client reports and send those reports to a report process on the network. The report process accumulates client reports from the plurality of APs and selects one or more candidate APs to support a client. Selection may be made on reported SNR, AP loading, channel loading, AP characteristics, or a combination. The report process may produce blacklists and optionally whitelists for use by APs to use in processing client probe and connection requests. | 02-07-2013 |
20130080614 | Client Aware DHCP Lease Management - The management of DHCP address leased based on client properties is described. According to a method of operation, clients are managed in a wireless digital network by modifying a requested lease time for an assigned Internet Protocol (IP) address based on properties of a client requesting the lease time. The assigned IP address is released if (i) no communication activity is detected by the client for a prescribed duration or (ii) upon detecting a DHCP Release message from the client. When the DHCP server receives a renewal request, it checks if the client has generated more than a predetermined amount of traffic. If the client has generated traffic exceeding this threshold level, the lease is renewed for a longer period. If the client traffic has not met the threshold level, the lease is renewed with the short lease time. | 03-28-2013 |
20130089081 | Method and System for Advertising Channel Load - The present disclosure discloses a network device and method for advertising channel load. The disclosed network device aggregates a number of clients that are associated with the network device on a specific wireless communication channel, and advertises the aggregated number to a client on the specific wireless communication channel. Further, the network device can receive aggregated load information on the specific wireless communication channel from another management network device, and further aggregates the load information across multiple wireless networks operating on the same wireless communication channel and coupled to different management network devices. | 04-11-2013 |
20130100857 | Secure Hotspot Roaming - Secure hotspot roaming in wireless networks. An enterprise works with one or more hotspot providers to provide secure access to its clients through hotspot locations. The enterprise provides the (hotspot) service provider (SP), with the addresses of enterprise controllers used for client authentication. The SP maintains a database which maps the enterprise realm to the address of the enterprise controller. When a client connects to a hotspot access point (AP), the hotspot AP sends client information such as MAC address to a SP controller. The SP controller determines if the client is new or already known. If the client is known and the realm associated with the client has an entry in the realm to enterprise database, the hotspot AP is instructed to begin client authentication with the specified enterprise controller. If the client is unknown, authentication begins with the SP controller, and the client is queried for realm information. | 04-25-2013 |
20130111024 | Dynamic Walled Garden | 05-02-2013 |
20130111066 | Device and Method for Split DNS Communications | 05-02-2013 |
20130188625 | VLAN POOLING ENHANCEMENT - The present disclosure discloses a network device and/or method for enhanced VLAN pooling assignments in a wireless network. The disclosed network device receives a message from a wireless client in the wireless network. The network device identifies a virtual local area network (VLAN) based at least on a size of the VLAN and a number of active wireless clients associated with the VLAN. Next, the network device assigns the wireless client to the identified VLAN. In some embodiments, the network device assigns a wireless client to a VLAN if the radio between the number of active wireless clients and the size of the VLAN does not exceed a predetermined value. In some embodiments, the network device assigns a wireless client to a previously assigned VLAN or a VLAN corresponding to an identified home network device, if the wireless client is a roaming client. | 07-25-2013 |
20130201978 | Method and System for Partitioning Wireless Local Area Network - The present disclosure discloses a method and system for partitioning WLAN in order to separate network traffic from different WLANs. Specifically, a network device receives a packet from a client connected to a first network device on an access network. The network device then determines that the received packet is associated with a VLAN that is pre-configured on the first network device based on the access network to which the client is connected. Furthermore, the network device transmits the packet to a MAC layer switching device, which is not configured with the VLAN that is pre-configured on the network device. The packet includes one of a DHCP discovery message, an ARP request message, a unicast message, a multicast message, and a broadcast message. The unicast message will be transmitted to the second network device on the pre-configured VLAN prior to being transmitted to another network device outside the pre-configured VLAN. | 08-08-2013 |
20130201979 | Method and System for Partitioning Wireless Local Area Network - The present disclosure discloses a method and system for partitioning WLAN in order to separate network traffic from different WLANs. Specifically, a network device receives a packet from a client connected to a first network device on an access network. The network device then determines that the received packet is associated with a VLAN that is pre-configured on the first network device based on the access network to which the client is connected. Furthermore, the network device transmits the packet to a MAC layer switching device, which is not configured with the VLAN that is pre-configured on the network device. The packet includes one of a DHCP discovery message, an ARP request message, a unicast message, a multicast message, and a broadcast message. The unicast message will be transmitted to the second network device on the pre-configured VLAN prior to being transmitted to another network device outside the pre-configured VLAN. | 08-08-2013 |
20130268660 | Providing and Resolving an IP Address for Swarm-Based Services - According to one embodiment of the disclosure, a non-transitory computer readable medium (CRM) comprising instructions, which when executed by one or more hardware processors, causes performance of operations comprising: listening, by a first digital device in a group of digital devices, for any advertisement for a particular service; responsive to the first digital device not receiving any advertisement for the particular service for a predetermined period of time: transmitting, by the first digital device, a first advertisement for the particular service; and providing, by the first digital device, the particular service. | 10-10-2013 |
20130268666 | CAPTIVE PORTAL REDIRECTION USING DISPLAY LAYOUT INFORMATION - According to one embodiment of the invention, a method for controlling access to a network by a network device comprises returning a message prompting connectivity to a captive portal that is different from a HTTP Source Code redirect. The message is an HTML document such as a frameset. | 10-10-2013 |
20140003355 | Method and System to Configure Network Access Points | 01-02-2014 |
20140059218 | SYSTEM, APPARATUS AND METHOD FOR MANAGING CLIENT DEVICES WITHIN A WIRELESS NETWORK - According to one embodiment, a system and computer-readable storage medium for storage of software directed to the management of associations between network devices is described. The computer-readable storage medium comprising instructions which, when executed by at least one hardware processor on a network device, causes performance of operations, comprising: (1) determining a desired operating state for a client device under analysis, the client device being associated with a first network device of a plurality of network devices; (2) detecting if a triggering event has occurred based on a comparison of the desired operating state for the client device under analysis to an actual operating state for the client device under analysis; and (3) in response to detecting that the triggering event has occurred, causing the client device to wirelessly connect to a second network device of the plurality of network devices in lieu of the first network device. | 02-27-2014 |
20140173124 | Method and System for Causing a Client Device to Renew a Dynamic IP Address - A method includes terminating a connection between (a) a wireless network supported by a network device and (b) a client device. The method further includes rejecting one or more requests to establish the connection between the wireless network and the client device based at least on the one or more requests being received from the client device within a first period of time subsequent to the terminating operation and accepting a particular request to establish the connection between the wireless network and the client device based at least on the particular request being received from the client device after the first period of time subsequent to the terminating operation. | 06-19-2014 |
20140185485 | WIRELESS LINK MONITORING AND ACTIVE TROUBLESHOOTING - According to one embodiment of the invention, a method comprises transmitting a Layer 2 (L2) frame from a first wireless device. Upon receipt of a frame in response to the L2 frame, the first wireless device uses information conveyed in the frame to modify its functionality. | 07-03-2014 |
20140211716 | SIGNAL STRENGTH AWARE BAND STEERING - A system or method that receives a current request from a client, and responds to the current request based on signal strength associated with a previous request. If the current request is received on a non-preferred communication band, and a previous request was received on a preferred communication band within a pre-determined time, the system determines whether the signal strength associated with the previous request is weaker than a pre-determined threshold signal strength level for the preferred communication band. If so, the system responds to the current request. Otherwise, the system ignores the current request. If no recent request on the preferred communication band is received, and the signal strength associated with the current request is weaker than a pre-determined threshold signal strength level for the non-preferred communication band, the system responds to the current request on the non-preferred communication band. Otherwise, the system ignores the current request. | 07-31-2014 |
20140254362 | BALANCING LOAD ACROSS RADIO FREQUENCY CHANNELS - The present disclosure discloses a network device and method for advertising channel load. The disclosed network device aggregates a number of clients that are associated with the network device on a specific wireless communication channel, and advertises the aggregated number to a client on the specific wireless communication channel. Further, the network device can receive aggregated load information on the specific wireless communication channel from another management network device, and further aggregates the load information across multiple wireless networks operating on the same wireless communication channel and coupled to different management network devices. | 09-11-2014 |
20140282905 | SYSTEM AND METHOD FOR THE AUTOMATED CONTAINMENT OF AN UNAUTHORIZED ACCESS POINT IN A COMPUTING NETWORK - A method and apparatus for automatic containment of unauthorized access points in a computing network is described. The method may include receiving data indicative of at least a device identifier corresponding to an unauthorized access point. The method may also include, in response to locating the received device identifier in a listing of device identifiers that are associated with data transmissions through the network device, identifying a port of a network device as the port to which the unauthorized access point is connected. | 09-18-2014 |
20150032861 | Device Abstraction in Autonomous Wireless Local Area Networks - According to embodiments of the present disclosure, a managed network device assigns to itself an IP address, in absence of a DHCP service, in a link local address space within a wireless network. The system further responds to a network frame received from another device based on the assigned IP address in the link local address space. The network frame can be a network traffic frame, a control path frame, and/or a management frame. The control path frame comprises a source IP address and a destination IP address that correspond to internal IP addresses in the link local address space that are self-assigned by managed network devices. The management frame comprises the self-assigned internal IP address for the managed network device, and provides for management of managed network devices in the wireless network through a single IP address when a virtual controller is configured for the wireless network. | 01-29-2015 |