During operation, an access point may provide a first WLAN and a second WLAN, where the first WLAN uses a WPA2-compatible authentication protocol and the second WLAN uses a WPA3-compatible authentication protocol. In response to an association request or a probe request associated with (or from) an electronic device, the access point may establish a connection with the electronic device using the first WLAN. Then, when a binding between a passphrase associated with the electronic device and the second WLAN does not exist, the access point may establish the binding in the computer system. Next, the access point may perform a BSS transition of the electronic device from the first WLAN to the second WLAN. Moreover, the access point may authenticate the electronic device without a time constraint.
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Technical support services, namely, troubleshooting in the nature of diagnosing and repairing computer hardware and software used in wired and wireless telecommunication networks; technology consultation services in the field of telecommunications and computer networking; engineering services in the nature of maintaining computer hardware and software used in telecommunication networks
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Technical support services, namely, troubleshooting in the nature of diagnosing and repairing computer hardware and software used in wired and wireless telecommunication networks; technology consultation services in the field of telecommunications and computer networking; engineering services in the nature of maintaining computer hardware and software used in telecommunication networks
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Technical support services, namely, troubleshooting in the nature of diagnosing and repairing computer hardware and software used in wired and wireless telecommunication networks; technology consultation services in the field of telecommunications and computer networking; engineering services in the nature of maintaining computer hardware and software used in telecommunication networks
5.
High-availability connections using dynamic transparent bridging
An electronic device may establish a standby network having a service set identifier (SSID). Moreover, the electronic device may receive, from a controller, information specifying neighbors of the electronic device, where the neighbors are within wireless communication range of the electronic device and include a second electronic device. When the electronic device is unable to communicate with the controller, the electronic device may select the second electronic device from the neighbors, where the second electronic device implements a second instance of the standby network having the SSID. Then, the electronic device may provide a message to the second electronic device. Moreover, the electronic device may receive a response to the message from the second electronic device. Next, the electronic device may providing a transparent bridge with the second electronic device using the standby network, where the transparent bridge provides communication of management traffic between the electronic device and the controller.
During operation, an access point may receive, from an electronic device, a roaming request, where the electronic device is currently associated with a second access point. In response, the access point may broadcast a message in a network, which includes the access point and the second access point. Note that the message may include an L2 look-up message. In some embodiments, the message is only conveyed to the second access point via a router or a switch in the network. Then, the access point may receive, from the second access point, PMK information, where the second access point is included in a subset in the network with the access point. Next, based at least in part on the PMK information, the access point may generate a PMK for use during secure communication with the electronic device and may perform a fast BSS transition with the electronic device.
H04W 48/10 - Distribution d'informations relatives aux restrictions d'accès ou aux accès, p. ex. distribution de données d'exploration utilisant des informations radiodiffusées
7.
ACCURATE ASSESSMENT OF COMMUNICATION PERFORMANCE IN A WIRELESS NETWORK
An electronic device (such as an access point) is described. During operation, the electronic device may receive a packet associated with a second electronic device, where the packet includes a tag with a timestamp representing a time when the packet was enqueued at a data-link layer or a networking layer in the second electronic device. Then, the electronic device may store a receive timestamp when the packet was received. Next, the electronic device may compute an uplink latency corresponding to a difference between the receive timestamp and the timestamp. In some embodiments, the packet may include an aggregate physical layer protocol data unit (PPDU) with multiple packets. A given packet in the multiple packets may include a second tag with a second timestamp representing a second time when the given packet was enqueued at the data-link layer or the networking layer in the second electronic device.
H04L 43/106 - Surveillance active, p. ex. battement de cœur, utilitaire Ping ou trace-route en utilisant des informations liées au temps dans des paquets, p. ex. en ajoutant des horodatages
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Artificial intelligence as a service (AIAAS) featuring computer algorithms to balance and distribute connections to wireless computer and mobile networks to improve network performance; Software as a service (SAAS) featuring computer algorithms to balance and distribute connections to wireless computer and mobile networks to improve network performance; Software as a service (SAAS) in the field of computer and mobile networking
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Downloadable software for managing, monitoring and
maintaining telecommunication and data networking devices,
namely devices for transporting voice, video and data across
multiple network infrastructure and communication protocols;
downloadable computer software for network management,
monitoring and maintenance. Software as a service (SAAS) services featuring computer
software platforms for providing, hosting, managing,
monitoring and maintaining network and security software
applications; cloud computing services featuring software
for network management intelligence and network service
assurance.
Segmenting personal area networks (PAN) in a computer network using regions, which may include: associating a first client device to a first PAN, where the first PAN is assigned to a first region from a plurality of regions; receiving an indication that the first client device is in communication with a first computer networking device; identifying whether the first computer networking device is a member of a plurality of computer networking devices that service the first region; selecting one of a first identifier or a second identifier based on whether the first computer networking device is or is not a member of the plurality of computer networking devices; and communicating the selected one of the first identifier and the second identifier to the first computer networking device. The first computer networking device may be configured to tag PAN network traffic from the first client device using the provided identifier.
Antennas with reconfigurable periodic structures are provided. The antenna includes a ground plane, a periodic structure comprising a plurality of conductive patches, and an antenna structure on the periodic structure. Ones of the plurality of conductive patches are selectively electrically connected to adjacent ones, to the ground or not connected to the ground. The antenna structure is configured to resonate at a resonant frequency of the antenna.
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
(1) Downloadable software for managing, monitoring and maintaining telecommunication and data networking devices, namely devices for transporting voice, video and data across multiple network infrastructure and communication protocols; downloadable computer software for network management, monitoring and maintenance. (1) Software as a service (SAAS) services featuring computer software platforms for providing, hosting, managing, monitoring and maintaining network and security software applications; cloud computing services featuring software for network management intelligence and network service assurance.
13.
DETECTION AND SOLUTION OF MISDIRECTED DOMAIN NAME SYSTEM REQUESTS
Methods, systems, and devices in which a computer networking device may compare the destination address of the a name resolution request with a stored list of addresses. If the destination address does not match any of the addresses from the stored list, the computer networking device may perform one or more actions, such as sending a notification, redirecting the name resolution request to one of the servers in the list, or generating a new name resolution request. For example, a method may include receiving network traffic from a client device including a first name resolution request; comparing a first destination address from the first name resolution request with a list of addresses indicating servers to which the client device is to communicate name resolution requests; and detecting that the first destination address does not match any of the addresses from the list of addresses.
H04L 61/4511 - Répertoires de réseauCorrespondance nom-adresse en utilisant des répertoires normalisésRépertoires de réseauCorrespondance nom-adresse en utilisant des protocoles normalisés d'accès aux répertoires en utilisant le système de noms de domaine [DNS]
H04L 61/5014 - Adresses de protocole Internet [IP] en utilisant le protocole de configuration dynamique de l'hôte [DHCP] ou le protocole d'amorçage [BOOTP]
H04L 61/5046 - Résolution des conflits d'allocation d'adressesTest des adresses
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Artificial intelligence as a service (AIAAS) featuring computer algorithms to translate simple language instruction into network configuration to meet computer and mobile network goals; Software as a service (SAAS) featuring computer algorithms to translate simple language instruction into network configuration to meet computer and mobile network goals; Software as a service (SAAS) in the field of computer and mobile networking
15.
Dynamic Frequency Selection Detection Using a Group of Access Points
During operation, an electronic device may detect wireless signals associated with a potential higher priority user in a band of frequencies subject to a dynamic frequency selection (DFS) regulation. Then, the electronic devices may receive, associated with remaining electronic devices in a group of electronic devices that includes the electronic device, information specifying whether the remaining electronic devices detected the wireless signals or additional wireless signals associated with the potential higher priority user in the band of frequencies. Moreover, the electronic device may determine whether the detected wireless signals are a true positive detection or a false positive detection based at least in part on the information and a detection threshold. When the electronic device determines that the detected wireless signals are the true positive detection, the electronic device may selectively perform the DFS by ceasing use of at least a portion of the band of frequencies.
H04W 72/0453 - Ressources du domaine fréquentiel, p. ex. porteuses dans des AMDF [FDMA]
H04W 72/566 - Critères d’affectation ou de planification des ressources sans fil sur la base de critères de priorité de l’information, de la source d’information ou du destinataire
16.
Dynamic Reserve WLAN Based on Authentication Availability
An electronic device (such as an access point) that dynamically provides a reserve wireless local area network (WLAN) having a reserve service set identifier (SSID) is described. During operation, the electronic device may provide a WLAN having an SSID, where access to services in a network via the WLAN is gated by authentication performed by a computer. Note that the computer may include a controller of the electronic device or an authentication computer. When the computer is offline or communication with the computer is unavailable, the electronic device may dynamically provide the reserve WLAN having the reserve SSID, where access to a subset of the services in the network via the reserve WLAN is gated by second authentication performed by the electronic device. Moreover, the services may include sensitive (or more-secure) and insensitive (or less-secure) services, and the subset of the services may include the insensitive services.
A device and method and computer readable medium for resisting downgrade attacks. User equipment includes a memory having instructions stored thereon and a processor configured to execute the instructions stored on the memory to cause the user equipment to perform the following operations: determining a security authentication type when the user equipment is connected to a network device for the first time; and in response to determining that the security authentication type when the user equipment is connected to the network device for the first time is WPA3, applying the only-WPA3 rule; where the only-WPA3 rule only allows the user equipment to use WPA3 to access the network device, and refuses the user equipment to use other security authentication types with lower security than WPA3 to access the network device.
A computer system is described. During operation, the computer system may receive information specifying communication in a network. Then, the computer system may detect a network problem based at least in part on the information. Moreover, the computer system may automatically determine a remedial action based at least in part on the detected network problem and may automatically perform the determined remedial action. Alternatively, when the remedial action cannot be determined, the computer system may selectively collect additional information for a predefined time interval, e.g., using one or more edge electronic devices or one or more controllers in the network. Next, the computer system may diagnose the network problem and may compute a second remedial action based at least in part on the diagnosis of the network problem. After receiving approval the computer system may automatically perform the second remedial action when a subsequent instance of the network problem is detected.
H04L 41/0816 - Réglages de configuration caractérisés par les conditions déclenchant un changement de paramètres la condition étant une adaptation, p. ex. en réponse aux événements dans le réseau
During operation, a computer system may receive, associated with access points, information about the access points and specifying one or more communication-performance metrics associated with a shared band of frequencies. Then, for the access points, the computer system may compute co-channel interference (CCI) metrics based at least in part on the information about the access points and the one or more communication-performance metrics. Moreover, the computer system may select channels and channel widths of the access points based at least in part on the CCI metrics, a graph representation of the access points and a CCI criterion, where nodes in the graph representation correspond to the access points and edges in the graph representation correspond to communication between the pairs of access points. Next, the computer system may provide, addressed to the access points, second information specifying the channels, the channel widths and/or the transmit power of the access points.
H04W 72/541 - Critères d’affectation ou de planification des ressources sans fil sur la base de critères de qualité en utilisant le niveau d’interférence
Switchable antennas are provided that include an RF port, an antenna array that includes at least a first column of radiating elements, a second column of radiating elements and a third column of radiating elements, and a feed network coupled between the RF port and the antenna array. The feed network includes a power divider whose input is coupled to the RF port and whose output is coupled to a phase shifter.
H01Q 3/36 - Dispositifs pour changer ou faire varier l'orientation ou la forme du diagramme de directivité des ondes rayonnées par une antenne ou un système d'antenne faisant varier la phase relative ou l’amplitude relative et l’énergie d’excitation entre plusieurs éléments rayonnants actifsDispositifs pour changer ou faire varier l'orientation ou la forme du diagramme de directivité des ondes rayonnées par une antenne ou un système d'antenne faisant varier la distribution de l’énergie à travers une ouverture rayonnante faisant varier la phase par des moyens électriques avec des déphaseurs variables
H01Q 3/24 - Dispositifs pour changer ou faire varier l'orientation ou la forme du diagramme de directivité des ondes rayonnées par une antenne ou un système d'antenne faisant varier l'orientation, par commutation de l'énergie fournie, d'un élément actif rayonnant à un autre, p. ex. pour commutation du lobe
H01Q 3/26 - Dispositifs pour changer ou faire varier l'orientation ou la forme du diagramme de directivité des ondes rayonnées par une antenne ou un système d'antenne faisant varier la phase relative ou l’amplitude relative et l’énergie d’excitation entre plusieurs éléments rayonnants actifsDispositifs pour changer ou faire varier l'orientation ou la forme du diagramme de directivité des ondes rayonnées par une antenne ou un système d'antenne faisant varier la distribution de l’énergie à travers une ouverture rayonnante
H01Q 21/06 - Réseaux d'unités d'antennes, de même polarisation, excitées individuellement et espacées entre elles
An access point device with a single radio can provide a 6 GHz fronthaul connection to a client device and a 6 GHz backhaul connection to a network device by utilizing a dual-channel composite radio. The dual-channel composite radio comprises a summation circuit for summing transmit signals from the network device and the client device. The output from the summation circuit is fed to a front-end module (FEM) that sends this output to the antenna. The FEM can also receive signals from the network device and the client device and send those signals to the FEM for transmission to a bandpass filter that separates the signals into distinct signals associated with the respective devices. In this way, the cost is reduced and resources are conserved by only requiring a single dual-channel composite radio in an access point device for providing 6 GHz connectivity.
During operation, the computer system (such as a controller) may receive, from an access point, information specifying an electronic device that has the connection with the access point. Then, based at least in part on the information, the computer system may store a mapping between the electronic device and the access point. Moreover, the computer system may receive, from the access point or a second access point, a notification message, where the notification message is associated with an orphan notification of the electronic device. Next, in response to receiving the notification message, the computer system may perform a look-up operation for the electronic device in the stored mapping. Furthermore, when the electronic device is included in the stored mapping, the computer system may selectively provide, to the access point and based at least in part on the stored mapping, second information specifying the electronic device.
A computer system (such as a controller) that distributes locations of access points is described. During operation, the computer system may receive, from the access points, information specifying the locations of the access points, uncertainties in the locations, and results of wireless scans. Then, the computer system may provide, to the access points, second information specifying the locations, the uncertainties in the locations, and the results of the wireless scans. Next, the computer system may receive, from the access points, third information specifying second locations of the access points and second uncertainties in the second locations, where the third information received from a given access point in the access points includes revisions to a location of the given access point and/or an uncertainty in the location. These revisions may be based at least in part on the second information.
A computer system may receive, from a second electronic device, provisioning information for the electronic device and may confirm a license associated with the electronic device based at least in part on the provisioning information. Moreover, the computer system may receive, from the electronic device, confirmation information and may perform a join flow with the electronic device based at least in part on the confirmation information. Then, the computer system may provide, to the electronic device, authorization information. When the electronic device includes an instance of a trusted platform module (TPM) chip, prior to performing the join flow, the computer system may: provide, to the electronic device, an attestor identity key (AIK) certificate; perform remote attestation with the electronic device based at least in part on the AIK certificate; and verify the electronic device based at least in part on a result of the remote attestation.
An access point that provides a transition recommendation is described. During operation, the access point may associate with or establish a connection with the electronic device in a band of frequencies. Moreover, the access point may access or obtain information associated with or that indicates historical band-of-frequency usage by the electronic device. For example, the access point may receive, associated with a computer system, the information. Note the computer system may include a controller of the access point and/or a cloud-based computer system. Then, based at least in part on the information, the access point may provide the transition recommendation addressed to the electronic device, where the transition recommendation recommends that the electronic device transition from the band of frequencies to a second band of frequencies, which is different from the band of frequencies.
A computer network device (such as an access point, a switch or a router) that has multiple user interfaces is described. During operation, the computer network device may execute program instructions for the user interfaces and a shared messaging module, where a given user interface includes an agent corresponding to an application. When a message associated with the application is received via a user interface in the user interfaces, the corresponding agent in the user interface may extract a command or operation from the message. Then, the shared messaging module may translate the command or operation into a common format of the application. Moreover, the shared messaging module may provide (or route) the translated command or operation addressed to the application via a single communication path associated with the application and the agents for the application in the user interfaces.
During operation, the computer may obtain an access acceptance message, where the access acceptance message indicates that the electronic device has been authenticated and allowed to securely access a network, and where the authentication is based at least in part on a passphrase associated with a user of an electronic device. For example, the computer may receive the acceptance message from the computer network device or a second computer (such as a controller). Alternatively, the computer may obtain the access acceptance message while performing the authentication. Then, the computer may automatically provide a second passphrase addressed to a computer network device and the electronic device, where the second passphrase replaces the passphrase during a current session of the electronic device in the network. Moreover, when the current session ends, the computer may automatically revert to the passphrase for subsequent authentication of the user.
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Downloadable software for managing, monitoring and maintaining telecommunication and data networking devices, namely devices for transporting voice, video and data across multiple network infrastructure and communication protocols; downloadable computer software for network management, monitoring and maintenance. Software as a service (SAAS) services featuring computer software platforms for providing, hosting, managing, monitoring and maintaining network and security software applications; Cloud computing services featuring software for management of network intelligence and for network service assurance.
29.
DETERMINING A LOCATION OF 6 GHZ WI-FI ACCESS POINT DEVICE FOR USE IN OBTAINING A TRANSMISSION POWER LEVEL
A provisioning application can provide a location of an access point device so that the access point device can request provisioning of a transmit power level. The provisioning application can receive information from a user via user interface associated with the provisioning application, such as one or more location parameters, a height location, and/or an address associated with an access point device. The provisioning application provides a user with prompts and/or instructions for obtaining the information and for using an interact tool so as to indicate a boundary associated with the access point device. The one or more location parameters are updated or determined based on the boundary such that the location of the access point device can be accurately determined and transmitted to the access point device so as to be used by the access point device in receiving a transmission power level.
H04W 52/28 - Commande de puissance d'émission [TPC Transmission power control] le TPC étant effectué selon des paramètres spécifiques utilisant le profil utilisateur, p. ex. la vitesse, la priorité ou l'état du réseau, p. ex. en attente, libre ou absence de transmission
G01S 19/06 - Éléments coopérantsInteraction ou communication entre les différents éléments coopérants ou entre les éléments coopérants et les récepteurs fournissant des données d'assistance utilisant une estimation initiale de la position du récepteur comme données d'assistance ou lors de la génération de données d'assistance
G01S 19/35 - Détails de construction ou détails de matériel ou de logiciel de la chaîne de traitement des signaux
H04W 16/20 - Outils de planification de réseau pour déploiement de réseaux de couverture domestique ou de courte portée
H04W 52/38 - Commande de puissance d'émission [TPC Transmission power control] le TPC étant effectué dans des situations particulières
H04W 64/00 - Localisation d'utilisateurs ou de terminaux pour la gestion du réseau, p. ex. gestion de la mobilité
During operation, an electronic device may receive, associated with a computer, a packet or a frame that includes a dynamic power reset pattern, where the dynamic power reset pattern specifies temporal pattern of power resets. Then, the electronic device may detect multiple power resets, where a given detected power reset in the detected power resets involves activation of a power reset button in the electronic device. Moreover, the electronic device may compute a detected power reset pattern, where the detected power reset pattern includes a detected temporal pattern of detected power resets. Next, the electronic device may compare the dynamic power reset pattern and the detected power reset pattern. Furthermore, based at least in part on a result of the comparison, the electronic device may at least selectively provide, to the computer, the result of the comparison.
During operation, an access point may provide a first WLAN and a second WLAN, where the first WLAN uses a WPA2-compatible authentication protocol and the second WLAN uses a WPA3-compatible authentication protocol. In response to an association request or a probe request associated with (or from) an electronic device, the access point may establish a connection with the electronic device using the first WLAN. Then, the access point may confirm, with a computer system, that a binding between a passphrase associated with the electronic device and the second WLAN exists. Alternatively, when the binding does not exist, the access point may establish the binding in the computer system. Next, the access point may perform a BSS transition of the electronic device from the first WLAN to the second WLAN.
An enhanced network environment is provided by configuring an indoor access point device in a region subject to AFC constraints to utilize the 6 GHz frequency band. The access point device requires configuration so as not to interfere with incumbent 6 GHz wireless infrastructures or systems. The configuring includes obtaining location information using Wi-Fi Location functionality to obtain one or more associated range measurements so as to determine an accurate access point device location. This location can then be sent as part of an AFC request message to an AFS management system to obtain a power allowance. Once configured, the access point device can be registered with the AFC resource and can operate at a power allowance that can be higher than the power allowance associated with the standard power or low power indoor.
H04W 52/36 - Commande de puissance d'émission [TPC Transmission power control] utilisant les limitations de la quantité totale de puissance d'émission disponible avec une plage ou un ensemble discrets de valeurs, p. ex. incrément, variation graduelle ou décalages
H04W 52/28 - Commande de puissance d'émission [TPC Transmission power control] le TPC étant effectué selon des paramètres spécifiques utilisant le profil utilisateur, p. ex. la vitesse, la priorité ou l'état du réseau, p. ex. en attente, libre ou absence de transmission
33.
SUPPORTING COMPUTER NETWORKING DEVICE CONNECTIONS TO CONTROLLERS USING DIFFERENT CONNECTION PROTOCOLS
Computer networking devices and controllers thereof may communicate via a secure tunnel. Aspects of the present disclosure provide methods, systems, and devices that facilitate establishment of such tunnels. For example, a method may include: generating, by a computer networking device, a tunneling capabilities message indicating a plurality of different tunnel types supported by the computer networking device; transmitting the tunneling capabilities message to a controller; receiving, from the controller, a tunneling selection response message indicating one of the plurality of different tunnel types; requesting, by the computer networking device, establishment of a tunnel of the one tunnel type indicated by the tunneling selection response message; and establishing the tunnel of the one tunnel type between the computer networking device and the controller.
H04W 12/088 - Sécurité d'accès utilisant des filtres ou des pare-feu
H04W 12/48 - Dispositions de sécurité utilisant des modules d’identité utilisant la liaison sécurisée, p. ex. liant de manière sécurisée les modules d'identité aux dispositifs, aux services ou aux applications
34.
HTTP-based message broker architectures for communications between a cloud-based controller and network devices of a wireless communications network and related methods
An application of a cloud-based controller forwards a message to a message broker of the cloud-based controller. The message is then transmitted to a network device of a wireless communications network over a persistent hypertext transfer protocol (“HTTP”) connection. Thereafter, an acknowledgment is received in response to transmitting the message at a gRPC proxy for the message broker.
During operation, a computer system may establish a connection with an electronic device. Then, the computer system may receive, from a port in a firewall, a packet associated with the electronic device, where the packet includes an IP address of the electronic device. Moreover, the computer system may provide, to the port, a response addressed to the IP address. Next, the computer system may receive an acknowledgment associated with the electronic device that indicates that the response was received. Furthermore, the computer system may provide, addressed to the electronic device, a second IP address of a second electronic device and a second port in a second firewall associated with the second electronic device. Additionally, the computer system may provide, addressed to the second electronic device, the IP address of the electronic device and the port in the firewall.
During operation, an electronic device may obtain feedback associated with communication performance between the electronic device and a second electronic device, where the feedback includes one or more features including: a channel frequency response, a compressed beamforming report, an error vector magnitude and/or a relationship between at least two of the features. Then, based at least in part on the feedback, the electronic device may dynamically adjust a transmit polarization state and/or a receive polarization state by selecting antennas in a first set of antennas and a second set of antennas in the electronic device, where a given first antenna in the first set of antennas has a first predefined polarization and a given second antenna in the second set of antennas has a second predefined polarization, and the second predefined polarization is different from the first predefined polarization.
H04B 7/10 - Diversité de polarisationDiversité de direction
H04B 7/06 - Systèmes de diversitéSystèmes à plusieurs antennes, c.-à-d. émission ou réception utilisant plusieurs antennes utilisant plusieurs antennes indépendantes espacées à la station d'émission
37.
Regulatory-Constraint-Based Adaptation of Transmit Polarization
An electronic device that dynamically adjusts a number of antennas used during transmitting and/or a transmit polarization state is described. This electronic device may include: a first set of antennas; and a second set of antennas, where a given first antenna in the first set of antennas has a first predefined polarization and a given second antenna in the second set of antennas has a second predefined polarization. During operation, the electronic device may dynamically adjust, based at least in part on a transmit power and a regulatory constraint: the number of antennas in the first set of antennas and the second set of antennas used during transmitting; and/or the transmit polarization state by selecting antennas in the first set of antennas and the second set of antennas.
H04B 7/10 - Diversité de polarisationDiversité de direction
H04B 7/06 - Systèmes de diversitéSystèmes à plusieurs antennes, c.-à-d. émission ou réception utilisant plusieurs antennes utilisant plusieurs antennes indépendantes espacées à la station d'émission
38.
CHANNEL SELECTION BASED ON MULTI-HOP NEIGHBORING-ACCESS-POINT FEEDBACK
During operation, an access point may receive, associated with other access points, information specifying one or more communication-performance metrics associated with the shared band of frequencies. Then, based at least in part on the one or more communication-performance metrics, the access point may determine a proposed channel and/or a proposed channel width for use by the access point during communication in a shared band of frequencies. Moreover, the access point may provide, addressed to the other access points, second information specifying the proposed channel and/or the proposed channel width. Next, the access point may receive, associated with the other access points, feedback about the proposed channel and/or the proposed channel width. Furthermore, based at least in part on the feedback, the access point may select a channel and/or a channel width for use by the access point during communication in the shared band of frequencies.
A computer system (such as a controller) that dynamically configures a computer network device with a containerized data-driven application and associated metadata is described. During operation, the computer system may receive information specifying the containerized data-driven application. Then, the computer system may receive second information specifying metadata associated with the containerized data-driven application. For example, the second information may include one or more modifications to predefined metadata. Moreover, the computer system may perform authentication using an authentication proxy. Next, the computer system may obtain, in a cloud-based registry of containerized data-driven applications, the containerized data-driven application. Furthermore, the computer system may provide, addressed to the computer network device, the containerized data-driven application and the metadata.
G06F 9/455 - ÉmulationInterprétationSimulation de logiciel, p. ex. virtualisation ou émulation des moteurs d’exécution d’applications ou de systèmes d’exploitation
During operation, the radio node may, using a first interface circuit, listen for transmissions from one or more second radio nodes. Based at least in part on the transmissions, the radio node may determine a first list of discovered channels associated with the radio node and the one or more second radio nodes. Then, the radio node may, using a second interface circuit, provide the first list of discovered channels to the one or more second radio nodes. Moreover, the radio node may, using the second interface circuit, receive one or more second lists of discovered channels from the one or more second radio nodes. Next, the radio node may aggregate the first list of discovered channels and the second list of discovered channels into a list of active channels. Furthermore, the radio node may, using the first interface circuit, provide the list of active channels to an electronic device.
H04W 4/06 - Répartition sélective de services de diffusion, p. ex. service de diffusion/multidiffusion multimédiaServices à des groupes d’utilisateursServices d’appel sélectif unidirectionnel
H04W 16/14 - Dispositions de partage du spectre de fréquence
H04W 24/10 - Planification des comptes-rendus de mesures
H04W 48/10 - Distribution d'informations relatives aux restrictions d'accès ou aux accès, p. ex. distribution de données d'exploration utilisant des informations radiodiffusées
H04W 48/16 - ExplorationTraitement d'informations sur les restrictions d'accès ou les accès
41.
DEPLOYMENT OF PROFILES FOR ACESS TO WIRELESS NETWORKS
Provided are devices, methods, and systems for generating and deploying networking profiles for enabling computing devices to connect to wireless networks in a secure manner. For example, a method may include: receiving a request for a networking profile from a second computing device, the networking profile configured to enable the second computing device to access to a wireless network; generating, based on the received request for the networking profile, a code for presentation; transmitting the code for presentation to the second computing device; receiving an indication of a content of the code for presentation from a first computing device different than the second computing device; generating the networking profile based on receiving the indication of the content of the code for presentation; and transmitting the generated networking profile to the second computing device.
Managing an association of a wireless device to an access point device of a wireless network is disclosed. A client device sends an association request frame to one or more access point devices that is directed to a target access point device. A network controller device receives an association request event from each access point device that received an association request frame. The network controller device can select a preferred access point device based on one or more steering parameters of the associated request events. The network controller device sends the target access point device the preferred access point device as indicated by one or more preferred access point device parameters. The target access point device sends an association response frame to the client device that indicates the preferred access point device so as to steer the client device to the preferred access point device.
An access point device can utilize a deep packet inspection (DPI) management device for inspecting traffic associated with a session of a station for quality of service (QoS) information. The QoS information is compared to DPI application and device categories. Based on the comparison a Wi-Fi QoS Management controller of the access point device can determine a QoS policy for the session based on the comparison. The access point device can send a request to the station to assign a QoS priority to the session based on the QoS policy. The request can apply to upstream traffic, downstream traffic, or both. The QoS policy provide a priority level for the session so that the associated traffic receives a QoS appropriate or required by the associated application, device, or both so as to provide Wi-Fi QoS Management for traffic associated with the station.
Networking systems and methods here include utilizing an exchange service in communication with a network service, the network service being in communication with a first network and a second network, the exchange service configured to, receive a formation request to form a consortium of networks among the first network and second network, send provision information to a first AP in the first network regarding the second network and a second AP in the second network regarding the first network.
H04W 4/00 - Services spécialement adaptés aux réseaux de télécommunications sans filLeurs installations
H04W 8/18 - Traitement de données utilisateur ou abonné, p. ex. services faisant l'objet d'un abonnement, préférences utilisateur ou profils utilisateurTransfert de données utilisateur ou abonné
A computer network device that implements a data plane is described. During operation, the computer network device may receive, associated with a second computer network device, a request to establish a connection, where the request includes an instance of a first type of certificate associated with a first certificate authority for a first layer in a hierarchy in the network, and/or an instance of a second type of certificate associated with a second certificate authority for a second layer in the hierarchy, where the first layer is lower in the hierarchy than the second layer. Then, the computer network device may selectively establish a connection in the network with the second computer network device based at least in part on the instance of the first type of certificate and/or the instance of the second type of certificate.
H04L 41/28 - Restriction de l’accès aux systèmes ou aux fonctions de gestion de réseau, p. ex. en utilisant la fonction d’autorisation pour accéder à la configuration du réseau
H04L 41/044 - Architectures ou dispositions de gestion de réseau comprenant des structures de gestion hiérarchisées
During operation, a controller node, in multiple nodes in a cluster, may provide to the multiple nodes a set of operations associated with an update of controller software for a controller, where at least the controller node implements the controller. Moreover, at least a first node in the multiple nodes may perform the set of operations associated with the update of the controller software. Furthermore, at least a second node in the multiple nodes may monitor the performing of the set of operations by at least the first node. When the performing of the set of operations is completed by at least the first node, the first node may terminate the performing of the set of operations by the multiple nodes. Alternatively, when a failure occurs during the update of the controller software, at least the first node or the second node may automatically recover the multiple nodes.
G06F 11/14 - Détection ou correction d'erreur dans les données par redondance dans les opérations, p. ex. en utilisant différentes séquences d'opérations aboutissant au même résultat
During operation, a computer network device may provide an identifier for a network (such as an SSID for a WLAN) that supports certificate-based authentication and pre-shared-key-based authentication. Then, during an authentication procedure, the computer network device may receive an authentication request associated with an electronic device, where the authentication request specifies an instance of the certificate-based authentication or an instance of the pre-shared-key-based authentication. Moreover, the computer network device may provide authentication information addressed to a computer based at least in part on the authentication request. Next, the computer network device may receive, associated with the computer, an access response based at least in part on the authentication information, where the access response allows the electronic device to access the network when the authentication is successful, and the access response includes different attributes for the instance of the certificate-based authentication and the instance of the pre-shared-key-based authentication.
During operation, a computer system may obtain data associated with an electronic device and that has a first format. Then, the computer system may compute a context of the data. For example, the context may include: a location of the electronic device, a type of the data, a type of the electronic device, the first format, and/or a gateway (such as an access point or a radio node in a network) that forwards the data from the electronic device to the computer system. Moreover, based at least in part on the context, the computer system may identify the electronic device associated with the data. Next, the computer system may translate, based at least in part on the identified electronic device, the data from the first format to a second format, where the second format is common to additional data associated with multiple different types of electronic devices.
Methods, systems, and computer readable media can be operable to facilitate an exchange of messages between an access point and a station, wherein the access point requests a unique identifier from the station. The station may either respond with a message declining to provide a unique identifier or respond with a message including a unique identifier to be used by the access point for the station. The response from the station may include additional limitations on the use of the unique identifier by the access point. The access point may enforce different policies against a station depending upon how the station responds to the unique identifier request.
An access point that detects a duplicate address is described. During operation, the access point may receive a request associated with an electronic device, where the request includes an address of the electronic device (such as an IP address). In response, the access point may perform a comparison of the address to stored addresses of one or more electronic devices that are associated with the access point. When the comparison indicates that the address is in use by another electronic device in the one or more electronic devices, the access point may provide a response addressed to the electronic device that indicates that the address is in use. Otherwise, the access point may check with a remainder of a network to see if the address is in use. If the address is in use, the access point may provide the response.
To improve the network experience in a network, a unique device identifier (UDID) can be generated by a UDID generation module of a client device. The UDID generation module utilizes one or more device parameters as well as a service set identifier (SSID) as input(s) to the UDID generation module. The UDID can be reported to an access point device of the network so that the access point device can track, monitor, control, etc. the client device within the network, for example, when media access control randomization (rMAC) is utilized by the network to protect the privacy of the client device or a user of the client device. The same UDID is generated each time the client device joins the network so that the client device need not store the UDID.
G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p. ex. pour le traitement simultané de plusieurs programmes
Methods for an electronic device to communicate in a wireless local area network are provided in which information bits are encoded at the electronic device to provide a plurality of encoded bits. A first radio of the electronic device is used to transmit a first subset of the encoded bits over a first channel that is within a first frequency band, where the first subset of the encoded bits comprises less than all of the encoded bits. A second radio of the electronic device is used to transmit a second subset of the encoded bits over a second channel that is within a second frequency band.
H03M 13/03 - Détection d'erreurs ou correction d'erreurs transmises par redondance dans la représentation des données, c.-à-d. mots de code contenant plus de chiffres que les mots source
H04L 1/00 - Dispositions pour détecter ou empêcher les erreurs dans l'information reçue
H04L 1/04 - Dispositions pour détecter ou empêcher les erreurs dans l'information reçue par réception à diversité utilisant la diversité de fréquence
H04L 1/1867 - Dispositions spécialement adaptées au point d’émission
A server includes a processor configured to execute instructions stored on a memory to cause the server to: receive a client position signal; predict a future position of a client device based on a client device position signal providing location and velocity information about the client device; instruct a first access point device to provide a first Wi-Fi hotspot network with a first SSID, currently in use by the client device with another access point device, based on the predicted future position of the client device; and instruct a second access point device, which was previously providing a second Wi-Fi hotspot network with the first SSID, to stop providing the second Wi-Fi hotspot network with the first SSID after instructing the first access point device to provide the first Wi-Fi hotspot network with the first SSID.
During operation, a computer system may receive, from an electronic device, a VNI assignment message, where the VNI assignment message specifies a range of VNIs for VXLANs and one or more associated data planes. In response, the computer system may compute whether one or more VNIs in the range of VNIs are available. For example, the computer system may communicate with the VXLANs and/or may perform a look-up operation in a data structure in memory with information about VNIs (such as available VNIs and/or unavailable VNIs). When the one or more VNIs are unavailable, the computer system may provide, to the electronic device, an error message. Alternatively, when the one or more VNIs in the range of VNIs are available, the computer system may: modify the one or more data planes that implement the VXLANs with the range of VNIs; and provide, to the electronic device, an acknowledgment message.
During operation, a computer system may receive, from an electronic device, a login request, where the login request includes or specifies an authentication realm in a network. Then, the computer system may compute whether the authentication realm at least partially matches a predefined authentication realm in the network, where the predefined authentication realm in the network includes at least one wildcard element, and where the partial match is for elements in the predefined authentication realm other than the at least one wildcard element. When there is a partial match, the computer system may provide, to a second computer system, an authentication request based at least in part on the login request. Next, the computer system may receive, from the second computer system, an authentication response. When the authentication response indicates successful authentication, the computer system may provide, to the electronic device, a login response.
A switchable antenna comprises an RF port, an antenna array that includes at least a first column of radiating elements, a second column of radiating elements and a third column of radiating elements, and a feed network coupled between the RF port and the antenna array. The feed network includes a first switch having a first output that is coupled to each of the columns of radiating elements and a second output and a second switch having a first input coupled to the first output of the first switch and a second input coupled to the second output of the first switch, and a first output coupled to the second column of radiating elements.
H01Q 3/24 - Dispositifs pour changer ou faire varier l'orientation ou la forme du diagramme de directivité des ondes rayonnées par une antenne ou un système d'antenne faisant varier l'orientation, par commutation de l'énergie fournie, d'un élément actif rayonnant à un autre, p. ex. pour commutation du lobe
57.
Tenant Access Protection via an Intermediary Computer System
During operation, a computer system may receive, from an electronic device, an access request to access a shared network in a multi-tenant system, where the electronic device associated with a tenant in the multi-tenant system. Then, the computer system may identify a second computer system, which may be associated with an MSP of the shared network and that provides authentication and/or authorization to the shared network for users associated with the tenant. Moreover, the computer system may provide, to the second computer system, an authorization request for the electronic device. Next, the computer system may receive, from the second computer system, an authorization response, where the authorization response approves access by the electronic device to the shared network. Furthermore, the computer system may provide, to the electronic device, an access response, where the access response includes information specifying access privileges of the electronic device in the shared network.
A computer system that updates a pretrained predictive model is described. During operation, the computer system may receive, from an electronic device, information specifying user feedback about a network incident. Then, the computer system may update, based at least in part on the user feedback, the pretrained predictive model that outputs severity classifications of network incidents, where a difference between a severity classification of the updated pretrained predictive model and a user severity classification associated with the user feedback is reduced relative to an initial difference between an initial severity classification of the pretrained predictive model and the user severity classification. Moreover, the computer system may receive information specifying a second network incident. Next, the computer system may compute a second severity classification of the second network incident using the updated pretrained predictive model.
H04L 41/5067 - Mesures de la qualité du service [QoS] centrées sur le client
H04L 41/0604 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant du filtrage, p. ex. la réduction de l’information en utilisant la priorité, les types d’éléments, la position ou le temps
H04L 41/5009 - Détermination des paramètres de rendement du niveau de service ou violations des contrats de niveau de service, p. ex. violations du temps de réponse convenu ou du temps moyen entre l’échec [MTBF]
H04L 41/16 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets en utilisant l'apprentissage automatique ou l'intelligence artificielle
59.
Allocating Network Resources to a Mesh Access Point
A root access point (RAP) that allocates network resources (such as airtimes) to two or more mess access points (MAPs) via in a mesh network is described. During operation, the RAP receives communication information associated with operation of the two or more MAPs. Then, the RAP allocates the network resources in the mesh network to the two or more MAPs based at least in part on the communication information. Note that the network resources may include use of a shared wireless medium. For example, the network resources may include airtimes of the two or more MAPs. Moreover, a first airtime of a first MAP in the two or more MAPs may be different from a second airtime of a second MAP in the two or more MAPs and/or one or more clients (such as one or more electronic devices) of the RAP.
H04W 28/16 - Gestion centrale des ressourcesNégociation de ressources ou de paramètres de communication, p. ex. négociation de la bande passante ou de la qualité de service [QoS Quality of Service]
Methods, systems, and devices for facilitating automatic discovery of a controller device by one or more access points of a network, thereby providing a more secure and easier deployment of the access points. For example, a method may include receiving an indication of an authorization grant by a networking device; requesting, by the networking device, an authorization token from a remote authorization service; obtaining, by the networking device and from the remote authorization service, the requested authorization token; and transmitting, by the networking device and to a device registrar, a request to register the networking device with the device registrar, where the request includes the authorization token.
Network devices include a memory and a processor, wherein the processor is configured to determine a connection state of one or more first client devices, and in response to the determination that none of the one or more first client devices are connected to the wireless network for a predetermined time period, cause one or more second client devices currently connected to network devices other than a predetermined network device in the wireless network to connect to the predetermined network device. The network devices other than the predetermined network device turn off their wireless access function such that the wireless access function of only the predetermined network device is kept on.
An electronic device (such as an access point) that selectively performs authentication to a network is described. During operation, the electronic device provides an identity request addressed to the second electronic device. Then, the electronic device receives, associated with the second electronic device, an identity response. In response, when the authentication computer is unavailable, the electronic device accesses, in memory, a predefined hash function and associated authentication parameters for an authentication technique. Next, the electronic device performs authentication with the second electronic device based at least in part on the predefined hash function, where the authentication is compatible with the authentication technique (a type of EAP). Moreover, the electronic device generates an encryption key, and establishes secure communication with the second electronic device by performing a four-way handshake with the second electronic device based at least in part on the encryption key.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Computer hardware, downloadable computer software and mobile application software for providing, hosting, managing, developing, and maintaining networks; downloadable computer software, mobile application software and hardware for networking and security Platform as a service (PAAS) featuring computer software platforms for providing, hosting, managing, developing and maintaining network and security software applications; Cloud computing featuring software for networking and security applications; Provision of computing facilities, namely, cloud computing featuring software for networking and security software as well as applications
64.
LEAP FROG TECHNIQUES FOR TRANSMITTING BACK HAUL DATA IN A MESH WIRELESS LOCAL AREA NETWORK AND RELATED ACCESS POINTS
A method of transmitting mesh backhaul data in a WiFi network comprises transmitting the mesh backhaul data between a root node and a first intervening mesh access point via a wireless communication in a first frequency band and transmitting the mesh backhaul data between the first mesh access point and a second mesh access point via a wireless communication in a second frequency band.
H04W 28/08 - Équilibrage ou répartition des charges
H04W 40/04 - Sélection d'itinéraire ou de voie de communication, p. ex. routage basé sur l'énergie disponible ou le chemin le plus court sur la base des ressources nodales sans fil
65.
ACCESS-POINT PASSPHRASE IDENTIFICATION USING KEY MATCHING
A computer network device that performs key matching is described. While attempting to establish a secure connection with an electronic device, the computer network device may receive a connection-request message associated with the electronic device. In response, the computer network device may provide a context message addressed to a computer, where the context message requests stored passphrase information associated with the electronic device. Then, the computer network device may receive, associated with the computer, a context response. When the context response indicates that there is no stored passphrase information associated with the electronic device, the computer network device may perform the key matching to identify the passphrase associated with the electronic device. Next, the computer network device may provide, addressed to the computer, the identified passphrase associated with the electronic device or an encryption key corresponding to the identified passphrase for storage by the computer.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
66.
METHODS, SYSTEMS, AND DEVICES FOR ANALYZING NETWORK PERFORMANCE
Methods, systems, and devices for performing analytics on communications networks. For example, methods may include receiving, at an access point of a wireless network, a first transfer unit comprising first data destined for a first destination; receiving, at the access point, a second transfer unit comprising second data destined for a second destination; grouping, by the access point, the first and second transfer units into a group; and calculating, by the access point and based on the transfer units of the group, a response time associated with the first destination based on a time difference between the receiving of the first transfer unit and the receiving of the second transfer unit. The transfer units may comprise encrypted data.
H04L 43/022 - Capture des données de surveillance par échantillonnage
H04L 43/106 - Surveillance active, p. ex. battement de cœur, utilitaire Ping ou trace-route en utilisant des informations liées au temps dans des paquets, p. ex. en ajoutant des horodatages
67.
METHODS AND DEVICES FOR REPLICATING MULTICAST CONTROL PACKETS IN HARDWARE
Methods, systems, and devices for performing replication of multicast control packets by a packet processor of a networking device, rather than a central processor of the networking device, thereby freeing the central processor to perform other tasks. For example, methods of performing replication of multicast control packets may include learning, by a networking device, two or more local routers coupled to ports of the networking device; configuring a packet processor of the networking device for hardware-based replication of multicast control packets based on the learned two or more local routers; receiving a multicast control packet by the networking device; and replicating, by the packet processor of the networking device, the multicast control packet.
Methods, systems, and devices for synchronizing multicast state in a cluster of network devices, such as network switches. For example, a method may include receiving a multicast control packet by an edge port of a first switch of a cluster comprising a plurality of switches; processing the multicast control packet by the first switch to update a local multicast state; manipulating the multicast control packet to insert a unique identifier associated with the edge port, resulting in a manipulated version of the multicast control packet; and forwarding, by the first switch of the cluster, the manipulated version of the multicast control packet to at least one other switch of the cluster via an inter-chassis link that couples the first switch and the at least one other switch.
An access point that determines whether an electronic device has multi-band capability is described. During operation, the access point may receive a packet or a frame associated with the electronic device. For example, the access point may determine that the electronic device has the multi-band capability based at least in part on: an operating class of the electronic device; a model of the electronic device; and/or a vendor of the electronic device. Then, based at least in part on information included in the packet or the frame, the access point may determine whether the electronic device has the multi-band capability. Moreover, the access point may selectively provide a transition recommendation addressed to the electronic device based at least in part on the determined multi-band capability.
H04B 7/06 - Systèmes de diversitéSystèmes à plusieurs antennes, c.-à-d. émission ou réception utilisant plusieurs antennes utilisant plusieurs antennes indépendantes espacées à la station d'émission
H04W 8/00 - Gestion de données relatives au réseau
70.
PREVENTING AN INTER-CHASSIS-LINK LOOP USING A SELECTIVE FORWARDING DELAY
A computer network device (such as a switch or a router) that prevents loop occurrence is described. During operation, the computer network device communicates, via one or more ports, data packets with a corresponding one or more second ports in a second computer network device, where a given data packet includes a source address and a destination address, and where the one or more ports and the second one or more ports specify a link between the computer network device and the second computer network device. Moreover, when the link goes down and then comes back up, the computer network device may block forwarding, via the one or more ports, of additional data packets based at least in part on a predefined delay.
A first electronic device communicates over a wide area network by establishing a MACSec session with a second electronic device over the wide area network. The MACSec session is thereafter torn down in response to the first electronic device sensing a fault in the MACSec session. Then, one or more keep alive probes are transmitted to the second electronic device over the wide area network. A response to the keep alive probe is thereafter received. The MACSec session may then be automatically reestablished in response to receiving the probe.
A controller for steering a client device between content streaming apparatuses in a wireless local area network (WLAN). The controller is configured to determine whether a client device should be steered to a content streaming apparatus based on at least one sample measurement related to the client device and/or the content streaming apparatus. The steering logic calculations may use predetermined thresholds.
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Computer hardware, downloadable computer software and mobile
application software for providing, hosting, managing,
developing, and maintaining networks; downloadable computer
software, mobile application software and hardware for
networking and security. Platform as a service (PAAS) featuring computer software
platforms for providing, hosting, managing, developing and
maintaining network and security software applications;
cloud computing featuring software for networking and
security applications; provision of computing facilities,
namely, cloud computing featuring software for networking
and security software as well as applications.
74.
Method of reporting received signal strength on per frame basis in Wi-Fi network
Aspects of the present disclosure are drawn to a client device for use with an access point device. The client device includes: a memory; and a processor configured to execute instructions stored on the memory to cause the client device to: obtain a value associated with a capability of the client device, create a response including a header and a payload, the header including a reserved field including a bit reporting that the payload of the response includes the value associated with the capability, and transmit the response to the APD.
An access point that determines communication boundaries is described. During operation, the access point may receive one or more probe requests associated with the one or more electronic devices, where a given probe request may include an identifier of a given electronic device. Moreover, when the access point receives the given probe request, the access point may determine a signal strength associated with the given probe request and timestamps when the given probe request was received. Then, the access point may exchange probe-request information with one or more additional access points, where the probe-request information corresponds to received probe requests. Next, the access point may compare the probe-request information to determine the communication boundaries. For example, the communication boundaries may be determined by comparing the probe-request information for pairs of access points. Furthermore, the access point may identify neighboring access points based at least in part on the probe-request information.
H04W 4/33 - Services spécialement adaptés à des environnements, à des situations ou à des fins spécifiques pour les environnements intérieurs, p. ex. les bâtiments
To protect and ensure security and/or privacy, an access point and a wireless network device can exchange capabilities information. The capabilities information can indicate that each of the access point and the wireless network device support generation of an association identifier association media access control (A-AMAC) identifier. The A-AMAC identifier is based on an association identifier (AID) (that is assigned by the access point and associated with the wireless network device) and any other information exchanged between the access point and the wireless network device. The A-AMAC identifier once generated can be stored by the access point. The A-AMAC identifier is then used for post association communications between the access point and the wireless network device. As the A-AMAC identifier is a unique identifier for the association of the access point and the wireless network device, tracking of the wireless network device is thwarted or inhibited.
A computer system that processes state messages is described. During operation, the computer system receives, associated with communication network devices in a network, the state messages, where the state messages include different types of state messages having associated priorities. Then, the computer system computes identifiers of the state messages based at least in part on second identifiers of clients associated with or connected to the communication network devices, where, for a given state message, the computer system computes an identifier of the given state message based at least in part on a second identifier of a given client associated with information in the given state message. Next, the computer system may selectively assign the state messages to dedicated message queues having associated processing priorities based at least in part on the computed second identifiers and/or the types of state messages.
An electronic device (such as an access point) is described. During operation, the electronic device may create a hidden transmitted BSS. For example, the hidden transmitted BSS may be hidden, e.g., from an operator of a network that includes the electronic device and/or from one or more second electronic devices. Moreover, the electronic device may transmit a multi-BSS beacon with a transmitted BSSID and a wild-card SSID (or blank character string) of the hidden transmitted BSS, and, for one or more non-transmitted BSSes, one or more non-transmitted BSSIDs and their associated SSIDs. Then, the electronic device may establish one or more connections with the one or more second electronic devices via the one or more non-transmitted BSSes. Furthermore, the electronic device may deactivate a given non-transmitted BSS in the one or more non-transmitted BSSes without impacting a remainder of the non-transmitted BSSes.
An access point is described. During operation, the access point may provide, addressed to a computer, a location request. In response, the access point may receive, associated with the computer, a location response that includes location information specifying an address of a controller of the access point, where the computer may be located in a same subnet in the network as the access point and/or the controller may be located in a different subnet in a network than the access point. For example, the computer may be a lightweight access point protocol (LWAPP) proxy for at least some management functions of the controller. Then, the access point may provide, addressed to the controller, a configuration request. Next, the access point may receive, associated with the controller, a configuration response that includes second information specifying a configuration of the access point.
An access point may receive, associated with a computer, information that specifies a group of access points in a network, where the group includes the access point, a second access point and/or a third access point, and the group of access points are proximate to each other. Then, the access point may receive, associated with the computer, instructions for testing to conduct with the second access point or the second access point and the third access point, where the testing involves wired communication with the second access point, and wireless communication with the second access point or the third access point. Next, the access point may perform, based at least in part on the instructions, the testing with the second access point or the second access point and the third access point. Moreover, the access point may provide, addressed to the computer, test results associated with the access point.
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
(1) Computer hardware, downloadable computer software and mobile application software for providing, hosting, managing, developing, and maintaining networks; downloadable computer software, mobile application software and hardware for networking and security. (1) Platform as a service (PAAS) featuring computer software platforms for providing, hosting, managing, developing and maintaining network and security software applications; cloud computing featuring software for networking and security applications; provision of computing facilities, namely, cloud computing featuring software for networking and security software as well as applications.
A steering controller of an access point device can provide an optimized network environment or performance by steering a target client device to a basic service set (BSS) of a network device that is different from the current BSS of the target client device based on one or more non-associated client (NAC) link quality parameters to the BSS on the network device. The steering controller can identify the target client device based on a steering condition. A delta link quality can be determined based on the NAC link quality parameters and the target link quality parameters associated with the target client device. The steering controller can send one or more steering instructions to the target client device if a candidate BSS is identified based on a comparison between a determined maximum difference between a NAC link quality parameter and a target link quality parameter and an associated threshold.
Antenna systems for access points and other wireless radio units include an RF ground plane, a radiating element mounted in front of the RF ground plane, and a coaxial feed cable coupled to the radiating element. The cable jacket includes a first opening that exposes a first portion of an outer conductor of the coaxial feed cable so that the cable jacket is on either side of the first opening along a longitudinal direction of the coaxial feed cable. The first portion of the outer conductor is galvanically connected to the RF ground plane via a first direct galvanic connection.
To prevent a client device from being stranded, a steering controller of an access point device can provide an improved network environment or performance by steering a target client device to a basic service set (BSS) of a network device that is different from the current BSS of the target client device based on a first or a poor link quality threshold where non-associated client (NAC) link quality parameters for NAC network devices within the network environment, such as a mesh network, is not available. The steering controller can select or identify a candidate BSS and then send a steering query to the target client device. The steering controller can receive a response from the target client device that indicates whether the steering to the candidate BSS was successful or accepted by the targeted client device.
A system and method that enable data processing and dynamic recombination of data by software on a device to be enhanced without requiring a replacement of the main software image on the device. Runtime management objects are generated at a network management platform including an interpreted application. The runtime management objects, KPIs, and interpreted application are downloaded network access devices. Data is collected at the interpreted application and analytics is performed on the collected data. First new runtime management objects are dynamically created at the interpreted application. The first new runtime management objects are presented to the network management platform. Analytics on the first new runtime management objects is performed at the network management platform to generate second new runtime management objects to provide to the plurality of network access devices for processing by the downloaded interpreted applications.
H04L 41/5009 - Détermination des paramètres de rendement du niveau de service ou violations des contrats de niveau de service, p. ex. violations du temps de réponse convenu ou du temps moyen entre l’échec [MTBF]
H04L 41/142 - Analyse ou conception de réseau en utilisant des méthodes statistiques ou mathématiques
H04L 43/10 - Surveillance active, p. ex. battement de cœur, utilitaire Ping ou trace-route
86.
Collaborative wireless intrusion protection system
A controller may receive information identifying a rogue access point operating on a channel in the WLAN. In response, the controller may provide instructions to at least a subset of the access points, where the instructions indicate that at least the subset of the access points collaboratively attack the rogue access point, and where a given instruction for a given access point specifies a schedule of attacks by the given access point. In some embodiments, the controller selects at least the subset of the access points based at least in part on one or more parameters, including: an ability to receive transmissions from the rogue access point; traffic loading; communication performance; a number of associated electronic devices; proximity to the rogue access point; and/or operating channels.
A method, device, and computer program product for determining quality of a wireless network, includes: connecting, by a mobile device, to one or more access points of the wireless network in a physical environment; capturing, via a camera of the mobile device, a live rendering of the physical environment; generating, by the mobile device, a rendering of the physical environment; detecting, via the mobile device, a signal quality of the connection to each of the one or more access points; storing, in memory of the mobile device, each current position and a plurality of previous positions of the mobile device in the physical environment in association with the detected signal quality; and generating, in a processor of the mobile device, a virtual path graphic by linking the current positions and the plurality of previous positions of the mobile device in the physical environment.
An antenna comprises a printed circuit board that includes a central feed point and a plurality of antenna elements formed therein, where the antenna elements extending radially from the central feed point. Each antenna element comprises a feed line that is coupled to the central feed point, the feed line including a feed conductor and a ground conductor, and at least two dipole radiators coupled to the feed line, each dipole radiator comprising a first dipole arm that is coupled to the feed conductor and a second dipole arm that is coupled to the ground conductor. A first length of a first of the dipole radiators is different than a second length of a second of the dipole radiators. Each of the dipole radiators is fed in-phase.
H01Q 1/22 - SupportsMoyens de montage par association structurale avec d'autres équipements ou objets
H01Q 1/38 - Forme structurale pour éléments rayonnants, p. ex. cône, spirale, parapluie formés par une couche conductrice sur un support isolant
H01Q 19/24 - Combinaisons d'éléments actifs primaires d'antennes avec des dispositifs secondaires, p. ex. avec des dispositifs quasi optiques, pour donner à une antenne une caractéristique directionnelle désirée utilisant un dispositif secondaire constitué par un seul élément conducteur sensiblement rectiligne l'élément actif primaire étant alimenté par son centre et sensiblement rectiligne, p. ex. antenne H
H01Q 21/06 - Réseaux d'unités d'antennes, de même polarisation, excitées individuellement et espacées entre elles
H01Q 21/30 - Combinaisons d'unités d'antennes séparées, fonctionnant sur des bandes d'ondes différentes et connectées à un système d'alimentation commun
89.
MULTIPLE COEXISTING PERSONAL AREA NETWORKS HAVING DIFFERENT HANDSHAKING
An electronic device is described. This electronic device may include a radio that supports multiple coexisting networks having different handshaking and a common PAN communication protocol. During operation, a single radio in the electronic device may provide different beacons for the coexisting networks. Then, the radio may receive a response associated with another electronic device, where the response may specify a first coexisting network in the coexisting networks. Next, the radio may establish a connection with the other electronic device, where establishing the connection involves performing handshaking associated with the first coexisting network. Note that the common PAN communication protocol may include: Bluetooth, BLE, Zigbee, or Z-Wave.
H04W 4/80 - Services utilisant la communication de courte portée, p. ex. la communication en champ proche, l'identification par radiofréquence ou la communication à faible consommation d’énergie
H04W 76/14 - Établissement de la connexion en mode direct
H04W 76/15 - Établissement de connexions à liens multiples sans fil
90.
Access restriction for a private or neutral-host network
During operation, a computer receives an attachment request from a radio node, where the attachment request is associated with an electronic device, and includes an identifier of the radio node, an identifier of the electronic device and an identifier of a service provider. Then, the computer determines a first entity identifier of an entity based at least in part on the identifier of the radio node and a second entity identifier of the entity based at least in part on the identifier of the electronic device. When the first entity identifier matches the second entity identifier, the computer performs authentication of the electronic device. Alternatively, if the entity identifiers are different, but the identifier of the service provider matches a stored identifier, the computer performs the authentication of the electronic device. Otherwise, the computer does not allow the electronic device to attach to a private or neutral-host network.
An electronic device that assesses communication performance is described. During operation, the electronic device receives information specifying a location in an environment. For example, the information may correspond to user-interface activity associated with a user interface. Notably, the user interface may include an augmented reality and the user-interface activity may include defining the location, such as by dropping a pin in the augmented reality. Then, the electronic device provides the information to an access point and/or a controller of the access point, where the location is within communication range of the access point. Next, the electronic device receives, from the access point and/or the controller, measurements of one or more communication performance metrics at or proximate to the location during a time interval. Moreover, the electronic device provides a graphical representation of the communication performance at or proximate to the location based at least in part on the measurements.
H04L 41/147 - Analyse ou conception de réseau pour prédire le comportement du réseau
H04L 41/22 - Dispositions pour la maintenance, l’administration ou la gestion des réseaux de commutation de données, p. ex. des réseaux de commutation de paquets comprenant des interfaces utilisateur graphiques spécialement adaptées [GUI]
H04L 43/045 - Traitement des données de surveillance capturées, p. ex. pour la génération de fichiers journaux pour la visualisation graphique des données de surveillance
An access point includes a WiFi chipset, a first radio that is coupled to the WiFi chipset and that is selectively coupled to a first radiating element through one of a first filter or a second filter, and a second radio that is coupled between the WiFi chipset and a second radiating element.
H04B 1/00 - Détails des systèmes de transmission, non couverts par l'un des groupes Détails des systèmes de transmission non caractérisés par le milieu utilisé pour la transmission
Devices, methods, and systems that provide transmitting of messages between different units of a multi-unit system in response to instantiated multi-unit transactions. For example, a method may include: identifying, by a first unit of a multi-unit system of computing devices, an event has occurred that triggers initiation of a transaction; generating, by the first unit, a transaction identifier associated with the transaction, the transaction identifier comprising a unit identifier of the first unit and an application identifier of an application associated with the event; and transmitting, from the first unit and to a second unit of the multi-unit system, the transaction identifier as part of an inter-unit message.
H04L 41/0631 - Gestion des fautes, des événements, des alarmes ou des notifications en utilisant l’analyse des causes profondesGestion des fautes, des événements, des alarmes ou des notifications en utilisant l’analyse de la corrélation entre les notifications, les alarmes ou les événements en fonction de critères de décision, p. ex. la hiérarchie ou l’analyse temporelle ou arborescente
H04L 41/085 - Récupération de la configuration du réseauSuivi de l’historique de configuration du réseau
H04L 49/15 - Interconnexion de modules de commutation
94.
COMMUNICATION USING ARBITRARY SELECTABLE POLARIZATION
An electronic device that uses an arbitrary transmit polarization is described. This electronic device includes: a first antenna having a first predefined polarization; and a second antenna having a second predefined polarization, where the second predefined polarization is different from the first predefined polarization. During operation, an interface circuit in the electronic device selectively transmits, from the first antenna, first wireless signals corresponding to the packet or the frame. Moreover, the interface circuit selectively transmits, from the second antenna, second wireless signals corresponding to the packet or the frame, where the second wireless signals have a same magnitude as the first wireless signals, and the second wireless signals are transmitted from the second antenna concurrently (or at the same time) as the first wireless signals are transmitted from the first antenna. Note that the interface circuit may dynamically modify the transmit polarization during the communication.
Mobility traffic drop solutions for EVPN-based networking systems that reduce delays related to a device reassociating from one access point to a different access point. For example, a method may include learning information related to a path of a mobile device configured to travel in a physical space along the path; identifying a plurality of access points having coverage areas that provide service to locations along the path and a plurality of networking tunnel endpoints servicing the plurality of access points; assigning the plurality of networking tunnel endpoints to a mobility zone associated with the mobile device; and transmitting data from a source to at least two of the networking tunnel endpoints of the mobility zone.
H04W 48/16 - ExplorationTraitement d'informations sur les restrictions d'accès ou les accès
H04W 4/02 - Services utilisant des informations de localisation
H04W 36/32 - La resélection étant déclenchée par des paramètres spécifiques par des données de localisation ou de mobilité, p. ex. des données de vitesse
96.
Generation of a unique device identifier for a client device in a wireless network
To improve the network experience in a network, a unique device identifier (UDID) can be generated by a UDID generation module of a client device. The UDID generation module utilizes one or more device parameters as well as a service set identifier (SSID) as input(s) to the UDID generation module. The UDID can be reported to an access point device of the network so that the access point device can track, monitor, control, etc. the client device within the network, for example, when media access control randomization (rMAC) is utilized by the network to protect the privacy of the client device or a user of the client device. The same UDID is generated each time the client device joins the network so that the client device need not store the UDID.
G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p. ex. pour le traitement simultané de plusieurs programmes
09 - Appareils et instruments scientifiques et électriques
Produits et services
Downloadable computer software for wireless networks to
enhance the functionality and operability of wireless
applications; computer hardware, namely, wireless access
point (WAP) devices and wireless access point (WAP) devices
with integral antennas.
98.
Common-framework controller for multiple device types
A computer system is described. This computer system may implement a controller for multiple different types of computer network devices (CNDs), such as: an access point, a switch, a router, and a dataplane. Moreover, the computer system may have a common framework for program modules (with sets of program instructions) associated with the different types of CNDs. Furthermore, configuration and management of a given type of CND using the program modules may be specified by metadata associated with the given type of CND. Additionally, the common framework may include a unified protocol layer for the program modules, and one or more of the program modules may be modified or configured via the unified protocol layer using a common communication Alternatively or additionally, the computer system may communicate with the different types of CNDs via the unified protocol layer using a second common communication protocol.
G06F 15/173 - Communication entre processeurs utilisant un réseau d'interconnexion, p. ex. matriciel, de réarrangement, pyramidal, en étoile ou ramifié
H04L 41/12 - Découverte ou gestion des topologies de réseau
H04L 67/02 - Protocoles basés sur la technologie du Web, p. ex. protocole de transfert hypertexte [HTTP]
H04L 67/561 - Ajout de données fonctionnelles à l’application ou de données de commande de l’application, p. ex. métadonnées
H04L 67/566 - Regroupement ou agrégation de demandes de service, p. ex. pour un traitement unifié
09 - Appareils et instruments scientifiques et électriques
Produits et services
Computer hardware and downloadable software for setting up
and configuring local area networks; computer hardware and
downloadable software for setting up and configuring wide
area networks; computer hardware and downloadable software
systems for operating wireless network communications and
telecommunications; network access server operating
software; wireless communication devices for voice, data or
image transmission; wireless routers; wireless transmitters
and receivers; antennas for wireless communications
apparatus; computer hardware for wireless content delivery;
computer hardware, namely, wireless access point (WAP)
devices, POE (power over ethernet) switches, and WLAN
(wireless local area network) controllers; downloadable
computer software for providing wireless content delivery;
downloadable LAN (local area network) operating software;
downloadable WAN (wide area network) operating software.
09 - Appareils et instruments scientifiques et électriques
Produits et services
Computer hardware and downloadable software for setting up
and configuring local area networks; computer hardware and
downloadable software for setting up and configuring wide
area networks; computer hardware and downloadable software
systems for operating wireless network communications and
telecommunications; network access server operating
software; wireless communication devices for voice, data or
image transmission; wireless routers; wireless transmitters
and receivers; antennas for wireless communications
apparatus; computer hardware for wireless content delivery;
computer hardware, namely, wireless access point (WAP)
devices, POE (power over ethernet) switches, and WLAN
(wireless local area network) controllers; downloadable
computer software for providing wireless content delivery;
downloadable LAN (local area network) operating software;
downloadable WAN (wide area network) operating software.