Patent application number | Description | Published |
20080225804 | Real-Time Sessions for Wireless Mesh Networks - A real-time data transport protocol directed to aggregating multiple packets of a real-time protocol session and transmitting redundant copies of the packets as defined by a sliding window. In particular implementations, a method comprising accessing a plurality of packets of a real-time protocol session; aggregating, over a sliding window, a contiguous sequence of packets in the plurality of packets into real-time data transport packets, and transmitting the real-time data transport packets to a receiving node. | 09-18-2008 |
20080285530 | Wireless Node Location Mechanism Featuring Definition of Search Region to Optimize Location Computation - A wireless node location mechanism that defines a search region to optimize the computations associated with estimating the location of a given wireless node. According to one implementation, a coverage map associated with each radio receiver that records signal strength data is defined out to a threshold signal strength level. Before computing the estimated location of a given wireless nodes, a search region is defined based on the intersection of the coverage maps associated with each radio receiver that detects the wireless node. Some implementations use information provided by the fact that certain radio receivers did not detect the wireless node to further optimize the location estimate. By defining a search region, which is a generally small area relative to the space encompassed by an entire RF environment, the present invention provides several advantages, such as reducing the processing time and/or power to compute estimated locations for wireless nodes. | 11-20-2008 |
20090271864 | Containment of Rogue Systems in Wireless Network Environments - Methods, apparatuses and systems facilitating containment of the effects of rogue or unauthorized access points on wireless computer network environments. Embodiments of the present invention support one to a plurality of rogue containment methodologies. A first rogue containment type involves identification of the physical connection of the rogue access point to the wired network infrastructure and, thus, allows for disabling of that physical connection to contain the rogue access point. Other rogue containment methods involve wireless techniques for containing the effect of rogue access points. As discussed below, the rogue containment functionality described herein can be applied to a wide variety of wireless network system architectures. | 10-29-2009 |
20090296647 | Method and System for Dynamically Assigning Channels Across Multiple Radios in a Wireless LAN - In a fixed channel wireless network system with a limited number of channels, assignment of the fixed channels between remote client elements and access elements is made systematically according to a set of criteria accounting for network loading and interference, then channel assignments are dynamically updated according to a priority to maintain optimal network performance with changing conditions of load and interference. The channel utilization problem is address at a system level rather than at a local level by treating the system as a three dimensional color mapping problem. All noise is treated as having a source in virtual access elements with an appropriate performance metric. The performance metric is used to select a channel set that minimize chances of interference and maximize user performance. Specifically, there are several parameter matrices which are managed and updated by a central resource management element, namely signal strength between elements, interference, and load. These matrices are used to find the optimal channel assignments for a predetermined limited set of assignable channels. In one implementation, the channel assignment methodology takes into account the interference associated with access elements operating on a selected channel, as well as the interference or energy that spills over (or is otherwise observable) on physical channels adjacent to the selected channel. | 12-03-2009 |
20100322198 | Pre-Emptive Roaming Mechanism Allowing for Enhanced QoS in Wireless Network Environment - A preemptive roaming mechanism in wireless network environments. In one implementation, the present invention provides a wireless client that implements a preemptive roaming mode that, when an attribute of the signal (e.g., Signal to Noise Ratio (SNR), etc.) between the access point with which the client is currently associated crosses a threshold, scans for other access points with which to associate. In one implementation, the client switches between the scanning mode and a traffic mode to allow data to be transferred between the client and the current access point. The pre-emptive roaming functionality can be configured to support desired data rates or other QoS levels. | 12-23-2010 |
20110026500 | LOW LATENCY MESH NETWORK - In an example embodiment, there is disclosed herein an apparatus comprising a wireless transceiver and packet processing logic coupled to the wireless transceiver. The packet processing logic is responsive to receiving a packet from a first node on a first path addressed to a node on a second path via the wireless transceiver to forward the packet on the second path towards the node on the second path via the wireless transceiver. The packet processing logic is further configured to send a reply to the packet to the first node on the first path via the wireless transceiver to a second node on the first path that is within range of the wireless receiver and on the second path to the first node on the first path responsive to determining the wireless transceiver cannot send a message directly the first upstream node. | 02-03-2011 |
20140029526 | Method and System for Dynamically Assigning Channels Across Multiple Radios in a Wireless LAN - According to one embodiment, a method includes monitoring, at one or more wireless network access elements, signal strength of signals transmitted by respective neighboring wireless network access elements. Information is collected from said wireless network access elements and converted into reportable data about signal strength observed during the monitoring. The method further includes identifying, based at least in part on interference associated with concurrent signal transmissions of the wireless network access elements, a combination of channel assignments for the one or more wireless network access elements from a plurality of possible combinations of channel assignments and assigning channels for concurrent, respective use by said wireless network access elements based on the identified combination of channel assignments. | 01-30-2014 |
20140051391 | WIRELESS ROAMING AND AUTHENTICATION - In one embodiment, a method includes receiving a Wi-Fi authentication request from a mobile device at a wireless controller, the request including a network access identifier, transmitting the request from the wireless controller to an authentication proxy, wherein the authentication proxy is in communication with a plurality of mobile operator authentication devices and operable to forward the request to one of the mobile operator authentication devices based on the network access identifier, and receiving a response to the request at the wireless controller, wherein the mobile device is permitted Wi-Fi access to a network by the wireless controller if the request is authenticated by the mobile operator authentication device. An apparatus and logic are also disclosed herein. | 02-20-2014 |
20140094142 | NETWORK BASED ON DEMAND WIRELESS ROAMING - In one embodiment, a method includes receiving at a network device, a request from a mobile device to connect to a wireless local area network, inserting mobile device and network attributes into the request, transmitting the request from the network device to an authentication proxy comprising a policy filter, and receiving a response to the request and offloading mobile data to the wireless local area network if the request is allowed. The policy filter is configured to filter requests received at the authentication proxy based on the attributes and a network policy for offloading mobile data to the wireless local area network. An apparatus and logic are also disclosed herein. | 04-03-2014 |
20140201000 | REAL TIME MECHANISM FOR LOCATION BASED MESSAGING USING WIRELESS NETWORKS - In an example embodiment disclosed herein is an apparatus comprising an interface and mobile billboard logic that is coupled with the interface and operable to communicate with an associated device via the interface. The mobile billboard logic obtains location data for the associated device. The mobile billboard logic determines whether a predetermined trigger condition has been met. The mobile billboard logic selectively sends data representative of an advertisement to the associated device to be displayed on a web page being requested by the associated device based on the location of the associated device and whether the predetermined condition has been met. | 07-17-2014 |
20140358732 | REAL-TIME RETURN OF LOCAL SEARCH CONTENT BASED ON GLOBAL SEARCH KEY - In one embodiment, a method includes receiving at a network device, a search key from a global search initiated at a mobile device, the network device in communication with the mobile device via a proxy operable to retrieve the search key from a packet transmitted from the mobile device, performing a search at the network device for local content associated with the search key, and transmitting the local content from the network device for display on the mobile device. An apparatus and logic are also disclosed herein. | 12-04-2014 |