METHODS, APPARATUSES AND SYSTEMS FACILITATING MANAGEMENT OF AIRSPACE IN WIRELESS COMPUTER NETWORK ENVIRONMENTS
Granted: February 6, 2014
Application Number:
20140036841
According to one embodiment, a particular network device that comprises at least one hardware processor is described. The network device is configured to perform operations including operating in a first mode by communicating wirelessly with at least one wireless client device to provide the at least one wireless client device access to one or more resources, where the operating in the first mode comprises receiving packets transmitted by the at least one wireless client device and…
LOCATION DETECTION IN WIRELESS COMMUNICATION NETWORKS
Granted: January 30, 2014
Application Number:
20140031067
Location detection of a mobile device is achieved by initiating an API call at an application program. The API call directs an operating system of the mobile device to initiate a scan of wireless access points within wireless communication range of the mobile device. The scanning performed by the mobile device is detected by the network via one or more of the wireless access points. A location of the mobile device is estimated by the network based on detection of the mobile device via…
WIRELESS CLIENT POSITION ESTIMATING SYSTEM AND METHOD
Granted: January 30, 2014
Application Number:
20140031062
The present invention comprises a system and method for determining an estimated position of a wireless mobile client device operating in a communications environment covered by a wireless local area network. The received signal strength of the wireless mobile client device is measured by one or more access points serving devices in the communications environment. In a preferred embodiment, the error between the received signal strength measured by the access points and the expected…
Synchronization of Mobile Client Multicast
Granted: December 19, 2013
Application Number:
20130336194
A method includes subsequent to a client associating with a first access node and the client being communicatively coupled with a first controller through the first access node: storing information on one or more of: active broadcast sessions for the client or active multicast sessions for the client. The method further includes subsequent to the client associating with a second access node and the client being communicatively coupled with a second controller through the second access…
Providing and Resolving an IP Address for Swarm-Based Services
Granted: October 10, 2013
Application Number:
20130268660
According to one embodiment of the disclosure, a non-transitory computer readable medium (CRM) comprising instructions, which when executed by one or more hardware processors, causes performance of operations comprising: listening, by a first digital device in a group of digital devices, for any advertisement for a particular service; responsive to the first digital device not receiving any advertisement for the particular service for a predetermined period of time: transmitting, by the…
Determining Distances Between Wireless Devices
Granted: October 3, 2013
Application Number:
20130258889
A method includes transmitting frames from a first device to a second device, where a first frame is transmitted at a first value for a particular transmission parameter, and where a second frame is transmitted at a second value for the particular transmission parameter that is different than the first value. For each of the transmitted frames, a determination is made if a corresponding Acknowledgement (ACK) frame, as defined by IEEE 802.11 standards, is received by the first device from…
EFFICIENT MULTICAST CONTROL PROCESSING FOR A WIRELESS NETWORK
Granted: August 22, 2013
Application Number:
20130215815
According to one embodiment of the invention, a method comprises an exchange of messages between an access point and a wireless network switch. One message, a PROXY IGMP JOIN message, is transmitted to the access point for propagation to a multicast router. This is performed so that multicast data associated with the multicast group identified by the PROXY IGMP JOIN message is routed to the access point without any unnecessary involvement by the wireless network switch.
Stateless Cryptographic Protocol-based Hardware Acceleration
Granted: July 11, 2013
Application Number:
20130179678
According to one embodiment of the invention, a method comprises an operation of commencing a first phrase and passing control of an authentication handshaking protocol. The first phase is commenced for establishing a secure communication path by a data path processor within a first network device. The first phrase comprises an exchange of data during an authentication handshaking protocol. The passing of control for authentication handshaking protocol by the data path processor to a…
WIRELESS MACRO CELL OVERLAY
Granted: January 26, 2012
Application Number:
20120020344
Overlaying a Wireless Macro Cell architecture on a Micro Cell network. WLAN MAC Address Translation (WMAT) is used to translate BSSIDs from the BSSID used to initialize a radio in an access node and identify communications between the radio in the access node and a controller, and the BSSID used over the air for Macro Cell operation. WMAT is used for transmit operations, translating the BSSID of outgoing packets to the Macro Cell BSSID prior to wireless transmission. On the receive side,…
Enrollment Agent for Automated Certificate Enrollment
Granted: February 3, 2011
Application Number:
20110029771
Automated generation of certificates from a Certificate Authority through the use of an Enrollment Agent. Devices needing certificates generate the necessary keys and package public key information with other identifying information about the device and send this information to an Enrollment Agent. The Enrollment Agent takes this information and submits it on behalf of the device to a Certificate Authority, managing the interaction with the Certificate Authority on behalf of the device.…
PROVISIONING REMOTE ACCESS POINTS
Granted: December 9, 2010
Application Number:
20100313262
Provisioning remote access points for use in a telecommunication network. A remote access point contains identity information established during manufacturing; this identity information may be in the nature of a digital certificate. The identity information is stored in the remote access point, and may be stored in a Trusted Platform Module if present. When the remote access node is powered up in unprovisioned state, outside the manufacturing environment, it attempts to establish an…
Multi-Pattern Wireless Frame Transmission
Granted: November 4, 2010
Application Number:
20100277368
Multi-pattern transmission of wireless frames. A digital device contains a transmitter feeding an electronically steerable antenna system where the radiation pattern produced by the antenna system may be selected. Different antenna radiation patterns are used in transmitting a first portion of a wireless frame and a second portion of a wireless frame in a wireless digital network. In one embodiment, a first portion of a wireless frame is transmitted using a wide radiation pattern while…
Initiating Peer-to-Peer Tunnels
Granted: November 4, 2010
Application Number:
20100281180
Initiating peer-to-peer tunnels between clients in a mobility domain. Client traffic in a mobility domain normally passes from the initiating client to an access node, and from the access node through a tunnel to a controller, and then through another tunnel from the controller to the destination access node, and the destination client. When initiated by the controller, the access nodes establish a peer-to-peer tunnel for suitable client traffic, bypassing the “slow” tunnels through…
Peer-to-Peer Forwarding for Packet-Switched Traffic
Granted: October 28, 2010
Application Number:
20100275017
Establishing peer-to-peer tunnels between clients in a mobility domain. In normal operation, clients attached to a network having access nodes connected to a central controller transfer all traffic through the central controller. This traffic is passed using tunnels between the access node and the central controller. Tunnels may be encrypted, and GRE tunnels may be used. A mobility manager operating in the controller tracks access nodes connected to the controller, and clients connected…
Synchronization of Mobile Client Multicast Membership
Granted: October 28, 2010
Application Number:
20100272103
Synchronization of mobile multicast membership in a wireless network. A controller supports one or more wireless access points, each of which supports wireless clients. A Mobility Manager (MM) in the controller monitors wireless client activity. The controller establishes an IGMP proxy which intercepts IGMP messages from wireless clients and handles the IGMP messages on clients' behalf. When a wireless client wishes to join a multicast, the client's IGMP join message is intercepted by…
CLASSIFICATION OF WIRED TRAFFIC BASED ON VLAN
Granted: August 5, 2010
Application Number:
20100199343
Controlling access and capabilities on wired digital networks. According to the invention, rather than use port-centric controls, multiple virtual local area networks (VLANs) are supported by a wired controller, and these VLANS may be terminated on multiple physical ports. Capabilities are then assigned on a VLAN basis, with default capabilities assigned to the port when no VLAN is used. By defining capabilities on a VLAN basis, as an example no access, trusted access, or untrusted…
DISTANCE ESTIMATION
Granted: February 4, 2010
Application Number:
20100026558
Improved distance estimation of a selected transmitter. An improved distance estimate from a target transmitter to a receiver is produced by assessing the target transmitter to determine transmit power, and combining this information with a propagation model, received signal strength, and reference signal strength indications. Target transmit power may be assessed through knowledge of the target device or device class, and/or transmit power reporting features of target wireless networks.…
Harvesting Entropy from Trusted Cryptographic Sources
Granted: January 28, 2010
Application Number:
20100023749
Extending entropy in a random number generation utility. Where a device has access to trusted sources of encrypted data, such as encrypted network traffic, such encrypted network traffic may be sampled and the bits fed into the entropy seeding routines of the random number generation utility.
DISTRIBUTED LOAD BALANCING IN WIRELESS NETWORKS
Granted: November 5, 2009
Application Number:
20090274129
Distributed load balancing in wireless digital networks. In a network having a plurality of access nodes with at least one wireless client connected to a first access node, the client is encouraged to move to a different access node by reducing the apparent signal strength of transmissions from the access node to the client. Apparent signal strength can be reduced by reducing transmit power, by using beam forming, antenna switching, or a combination. Other access nodes may send…
Secure Creation and Management of Device Ownership Keys
Granted: October 29, 2009
Application Number:
20090268915
Secure creation and management of device ownership keys. TPM ownership keys are generated by cryptographically combining manufacturer information with device specific information. Ownership keys are established in the TPM containing device. The manufacturer retains necessary information to reconstruct the ownership key if needed.