Patent application number | Description | Published |
20100118727 | SYSTEM AND METHOD FOR LINK QUALITY SOURCE ROUTING - Systems and methods for routing packets by nodes in an ad hoc network in accordance with a link quality source routing protocol are disclosed. Route discovery, route maintenance, and metric maintenance are designed to propagate and keep current link quality measurements. Metric maintenance includes a reactive approach for links that a node is currently using to route packets, and a proactive mechanism for all links. Nodes are configured to include a send buffer, a maintenance buffer, a request table, link quality metric modules, and preferably a neighbor cache and a link cache. The invention allows for asymmetric links in the network. The invention may be implemented within a virtual protocol interlayer between the link and network layers. The invention may employ any particular link quality metrics, including metrics based on probing techniques as well as metrics based on knowledge gained in other ways. | 05-13-2010 |
20110271345 | DETECTION OF ROGUE WIRELESS DEVICES FROM DYNAMIC HOST CONTROL PROTOCOL REQUESTS - A method to determine if a rogue device is connected to a specific wired network from dynamic host control protocol (DHCP) requests on the wired network. These DHCP requests are analyzed to determine the type of device issuing the request. Once the type of device has been determined, it can be checked against a list of authorized device types. If the device issuing the DHCP request is not an authorized device type, then it can be determined that the suspect device is a rogue that is connected to the specific wired network. Additionally, even if the system of the present invention determines that it is an authorized device type, if the device is not one of the few authorized devices of this type, e.g. because its MAC address is not recognized as that of one of the authorized devices, the system can flag the suspect as a rogue. | 11-03-2011 |
Patent application number | Description | Published |
20080200181 | Self-Configuring Wireless Network Location System - Wireless adapters are installed on one or more general purpose computing devices and are connected via a network in an enterprise environment. The adapters are densely deployed at known locations throughout the environment and are configured as air monitors. The air monitors monitor signals transmitted by one or more transceiver devices and records information about these signals. One or more analysis or inference engines may be deployed to obtain the recorded signal information and the air monitor locations to determine a location of the one or more wireless transceivers devices deployed in the environment. | 08-21-2008 |
20080201109 | Wireless Performance Analysis System - Wireless adapters are installed on one or more general purpose computing devices and are connected via a wireless network in an enterprise environment. The adapters are densely deployed at known locations throughout the environment and are configured as air monitors. The air monitors monitor wireless signals transmitted between transceiver devices and access points and records information about these signals. One or more analysis or inference engines may be deployed to analyze the signals received from the air monitors to obtain optimum performance and connectivity information about the wireless network. | 08-21-2008 |
20080316982 | Managing Dense Wireless Access Point Infrastructures in Wireless Local Area Networks - Techniques for enhancing the throughput capacity available to client devices connected to a wireless local area network (WLAN) are described. Specifically, existing WLAN resources are converted into wireless access points (APs) to create a dense infrastructure of wireless APs. To leverage this dense AP infrastructure, central management techniques are employed. With client-to-AP mapping, these techniques are used to prevent the discovery of multiple APs in a WLAN by a client device and to select a single AP (using certain policies) to associate with the client device and provide it with an enhanced wireless connection to the WLAN. Additionally, techniques are employed to centrally determine, using central policies, when the AP should disassociate from the client device and when another centrally selected AP should respond to, and associate with, the client device to provide it with an enhanced wireless connection to the WLAN—without interrupting/disrupting the client device's access. | 12-25-2008 |
20080320108 | Management Policies For Dense Wireless Access Point Infrastructures in Wireless Local Area Networks - Techniques for enhancing the throughput capacity available to client devices connected to a wireless local area network (WLAN) are described. Specifically, existing WLAN resources are converted into wireless access points (APs) to create a dense infrastructure of wireless APs. To leverage this dense AP infrastructure, central management techniques are employed. With client-to-AP mapping, these techniques are used to prevent the discovery of multiple APs in a WLAN by a client device and to select a single AP (using certain policies) to associate with the client device and provide it with an enhanced wireless connection to the WLAN. Additionally, techniques are employed to centrally determine, using certain policies, when the AP should disassociate from the client device and when another centrally selected AP should respond to, and associate with, the client device to provide it with an enhanced wireless connection to the WLAN—without interrupting/disrupting the client device's access. | 12-25-2008 |
Patent application number | Description | Published |
20090210519 | EFFICIENT AND TRANSPARENT REMOTE WAKEUP - Systems and methods that facilitate remote wake up are described that provide for efficient and transparent wake up of target hosts by remote hosts. In various embodiments, a separate address can be used by a target host for wake up network traffic, which is different from a regular address associated with a target host for normal network communications. In addition, the disclosed subject matter facilitates controlling wake up operations according to trust, identity, and/or a wake up policy. | 08-20-2009 |
20090210929 | INTER-PROCESS NETWORKING FOR MANY-CORE OPERATING SYSTEMS - Systems and methods that facilitate inter-process networking are described that can provide inter-process communication, firewall restrictions, process and host mobility, as well as parallelization of task performance. In various embodiments, a computer process can be provided with its own internet protocol address and network stack to facilitate inter-process networking. In further embodiments, a gateway process can facilitate process mobility, host mobility, and parallelization of task performance, as well as management of a host area network by facilitating inter-process communication between suitably configured processes. | 08-20-2009 |
20100027419 | INVERSE MULTIPLEXING HETEROGENEOUS WIRELESS LINKS FOR HIGH-PERFORMANCE VEHICULAR CONNECTIVITY - Systems and methods are provided that enable high-performance Internet access on board moving vehicles. In an illustrative implementation, an exemplary wireless data communications environment comprises a PluriBus module, an instruction set comprising at least one instruction set to process data for wireless communication between a cooperating component onboard a moving vehicle and other cooperating wireless components, and one or more multiple wide-area wireless communications links. In an illustrative operation, the PluriBus module can perform one more wireless communications techniques comprising opportunistic erasure coding such that coded packets can be sent in the event that there are openings in the one or more wireless communication links' capacity and transmitting the data packets along the one or more wireless communications links that is estimated (e.g., in real time) to offer efficient delivery of data packets. | 02-04-2010 |
20100027563 | EVOLUTION CODES (OPPORTUNISTIC ERASURE CODING) PLATFORM - Systems and methods are provided that allow for the opportunistic erasure coding of data packets by employing an exemplary evolution code. In an illustrative implementation an exemplary computing environment comprises an evolution code engine and an instruction set comprising at least one instruction to instruct the evolution code to process data for communication between two or more components of the exemplary computing environment. The use of evolution coding mitigates packet losses along one or more communication paths. In an illustrative operation, coded packets are created by XOR-ing data packets together such that a coded packet can recover a lost data packet using other received packets. | 02-04-2010 |