Patent application number | Description | Published |
20100290358 | ARCHITECTURE USING INEXPENSIVE, MANAGED WIRELESS SWITCHING POINTS TO DELIVER LARGE SCALE WLAN - Methods, apparatus and a computer program product provide for a network architecture implemented between a Wireless Switching Point and a remote Wireless Controller. The Wireless Switching Point contains only a first data plane portion. At least one incoming data packet is received at a respective port of the Wireless Switching Point. Based on data included within the at least one incoming data packet, the Wireless Switching Point determines a first current network interface utilized by at least one port of the Wireless Switching Point. The Wireless Switching Point uploads the first current network interface to a remote Wireless Controller—which implements a first control plane capability on behalf of the Wireless Switching Point. After uploading the first current network interface, the Wireless Switching Point receives an update, provided by the remote Wireless Controller, to the first current network interface. | 11-18-2010 |
20100290396 | SPLIT-PLANE WIRELESS NETWORK ARCHITECTURE - A split-plane mobility network architecture separates control and data plane operations typically encapsulated in a conventional wireless controller. Configurations provide a unified split-plane mobility switch that separates the data transport and switching in a separate hardware element, and performs control plane operations via exchanges with a centralized topology, rather than simply by adjacent switches within range. In contrast to conventional switch deployment, in which the same switch handles processing demands of the control plane and the data plane, the disclosed approach separates the data plane processing base by employing a mobility agent to define adjacent switch visibility. Thus, the routing capabilities of the data plane may be enhanced, such as to handle increasingly bandwidth-hungry applications of the same user base, without uprooting the infrastructure defined by the control plane. | 11-18-2010 |
20100290398 | Unifying Local and Mobility Network Identifiers - In a mobility domain providing wired and wireless network transport to an enterprise or campus environment, a mobility switch maps a logical network identifier, such as a VLAN ID, to a “home” or wired network VLAN ID so that a mobile device is mapped to the wired VLAN for user identification, IP address consistency, and network policy enforcement. Propagation of the mapping to mobility switches ensures that a roaming user is mapped to the wired network VLAN from a remote L2 switch, and mobility tunnels across L3 boundaries allow roaming into a different broadcast domain or L3 switch connectivity in the mobility domain. Users are assigned to mobility VLAN(s) which are mapped to a VLAN in the wired domain at a mobility switch. The wireless users can roam within the wireless enterprise, or mobility domain, and the network maintains access to the user assigned mobility VLAN(s). | 11-18-2010 |
20100293043 | VIRTUAL LOCAL AREA NETWORK SERVER REDUNDANCY AND FAILOVER TO ENABLE SEAMLESS MOBILITY IN THE MOBILITY DOMAIN - A method, apparatus and computer program product for providing Virtual Local Area Network (VLAN) server redundancy is presented. A mobility switch (MS) advertises to at least one peer mobility switch, VLANs configured as server capable, the advertising including providing priority information relating to a server for the VLAN. The MS receives advertising from the at least one peer mobility switch and elects a server for a mobility VLAN which is not mapped locally. The MS maintains a current server and a list of alternative servers for the VLAN and determines when the MS looses connection with the current server for the VLAN and moves the VLAN to an alternate server contained on the list. | 11-18-2010 |
20100293272 | TOLERANT DEVICE LICENSING IN A DISTRIBUTED ENVIRONMENT - Methods, apparatus and a computer program product provide for a Tolerant License Manager that defines a cluster of a plurality of network controllers, wherein each respective network controller contributes at least one license to a current total amount of licenses in a license pool. The Tolerant License Manager identifies at least one threatened access point upon detecting a first network controller has become unavailable. Each threatened access point comprises any access point connected to the first network controller when the first network controller becomes unavailable. The Tolerant License Manager establishes (and/or) approves a connection between a back-up controller and the threatened access point(s). While the first network controller is unavailable, the Tolerant License Manager allocates a license to each threatened access point via the back-up network controller. | 11-18-2010 |
Patent application number | Description | Published |
20090310535 | Unifying Virtualizations in a Core Network and a Wireless Access Network - To unify virtualizations in a core network and a wireless access network a virtual wireless network is mapped to a virtual network in the core network. Based on the mapping, data associated with a communications session can be communicated through the virtual wireless network and core virtual network. | 12-17-2009 |
20100161969 | NETWORK DEVICE AUTHENTICATION - The present invention relates to using digital certificates to allow network devices to authenticate themselves upon being accepted into and forming part of a communication network. | 06-24-2010 |
20100214918 | METHOD AND ARCHITECTURE FOR A SCALABLE APPLICATION AND SECURITY SWITCH USING MULTI-LEVEL LOAD BALANCING - A switch architecture and method provides scaling through multi-level load balancing of flows across data and application processing planes. An input/output module receives a communication session flow (forward) from a client device and selects one of a plurality of data processors to process the flow. The selected data processor determines the level of processing needed for the forward flow and selects an application processor from a plurality of such application processors. The application processor generates a session structure identifying actions to be performed on the forward flow and transfers the session structure to the selected data processor to perform the actions on the forward flow. The application processor also predictively generates and offloads a session structure for the associated reverse flow. If the reverse session structure is offloaded to a different data processor, either the forward or reverse flow redirects packets, or is redirected, to the data processor hosting the other flow. Typically, the redirection is accomplished by offloading a redirection structure as the offloaded session structure. | 08-26-2010 |
20120087240 | METHOD AND ARCHITECTURE FOR A SCALABLE APPLICATION AND SECURITY SWITCH USING MULTI-LEVEL LOAD BALANCING - A switch architecture and method provides scaling through multi-level load balancing of flows across data and application processing planes. An input/output module receives a communication session flow (forward) from a client device and selects one of a plurality of data processors to process the flow. The selected data processor determines the level of processing for the forward flow and selects an application processor from a plurality of such application processors. The application processor generates a session structure identifying actions to be performed on the forward flow and transfers the session structure to the selected data processor to perform the actions on the forward flow. The application processor also predictively generates and offloads a session structure for the associated reverse flow. If the reverse session structure is offloaded to a different data processor, either the forward or reverse flow redirects packets, or is redirected, to the data processor hosting the other flow. | 04-12-2012 |
20140016465 | METHOD AND ARCHITECTURE FOR A SCALABLE APPLICATION AND SECURITY SWITCH USING MULTI-LEVEL LOAD BALANCING - A switch architecture and method provides scaling through multi-level load balancing of flows across data and application processing planes. An input/output module receives a communication session flow (forward) from a client device and selects one of a plurality of data processors to process the flow. The selected data processor determines the level of processing for the forward flow and selects an application processor from a plurality of such application processors. The application processor generates a session structure identifying actions to be performed on the forward flow and transfers the session structure to the selected data processor to perform the actions on the forward flow. The application processor also predictively generates and offloads a session structure for the associated reverse flow. If the reverse session structure is offloaded to a different data processor, either the forward or reverse flow redirects packets, or is redirected, to the data processor hosting the other flow. | 01-16-2014 |