Abstract:
A method, an apparatus, and a software program to implement a method to dete ct a rogue access point of a wireless network. The method includes maintaining an AP database that includes information about managed access point (APs) and friendly APs, including the MAC address of each managed AP. The method furth er includes sending a scan request to one or more managed APs, including one or more of a request for the receiving managed AP to scan for beacons and probe responses and a request for the receiving managed AP to request its clients to' scan for beacons and probe responses. The method further includes receiving reports from at least one of the receiving managed APs, a report including information on any beacon or probe response received that was sent by an AP. For each beacon or probe response on which information is received , the method analyzes the information received in the report about the AP that sent the beacon or probe response, the analyzing including ascertaining if t he MAC address of the AP that sent the beacon or probe response matches a MAC address of an AP in the AP database to ascertain whether or not the AP is a potential rogue AP or a managed or friendly AP.
Abstract:
In one embodiment, a method includes identifying, responsive to a triggering event, one or more radio frequency (RF) firewall transceivers that neighbor a data wireless access point to which a given wireless client is communicating; configuring one or more of the identified neighboring RF firewall transceivers to detect RF frames transmitted by the wireless client; causing the data wireless access point to transmit one or more wireless messages operative to cause the wireless client to transmit RF frames; collecting RF signal data corresponding to the RF frames transduced by one or more of the identified neighboring RF firewall transceivers; transmitting the collected RF signal data to a location system; receiving from the location system an indication of the location of the wireless client; and applying one or more network access policies based on the indication of the location.
Abstract:
Methods, apparatuses, and systems directeli to facilitating troubleshooting wireless conneptivity issues in a wirsless network. In accordance with one embodiment of the present invention, either a diagnostic supplicant in the Wireless client (Fig. IA, 60a, 60b, 60c 60d) or a diagnostic manager (fig.lA, 10) initiates a troubleshooting protocol between the diagnostic supplicant and the diagnostic manager over a diagnostic link in response to one orjmore events. In one embodiment, after the diagnostic supplicant esiablishes a link to a diagnostic manager (fig. IA, 10) via a diagnostic link, the diagnostic supplicant generates and transmits a problem report to the diagnostic manager. The problem report initiates a troubleshooting protocol between the diagnostic manager and the diagnostic supplicant.
Abstract:
A method, an apparatus, and a software program to implement a method to detect a rogue access point of a wireless network. The method includes maintaining an AP database that includes information about managed access point (APs) and friendly APs, including the MAC address of each managed AP. The method further includes sending a scan request to one or more managed APs, including one or more of a request for the receiving managed AP to scan for beacons and probe responses and a request for the receiving managed AP to request its clients to scan for beacons and probe responses. The method further includes receiving reports from at least one of the receiving managed APs, a report including information on any beacon or probe response received that was sent by an AP. For each beacon or probe response on which information is received, the method analyzes the information received in the report about the AP that sent the beacon or probe response, the analyzing including ascertaining if the MAC address of the AP that sent the beacon or probe response matches a MAC address of an AP in the AP database to ascertain whether or not the AP is a potential rogue AP or a managed or friendly AP.
Abstract:
A method, an apparatus, and a software program to implement a method to detect a rogue access point of a wireless network. The method includes maintaining an AP database that includes information about managed access point (APs) and friendly APs, including the MAC address of each managed AP. The method further includes sending a scan request to one or more managed APs, including one or more of a request for the receiving managed AP to scan for beacons and probe responses and a request for the receiving managed AP to request its clients to scan for beacons and probe responses. The method further includes receiving reports from at least one of the receiving managed APs, a report including information on any beacon or probe response received that was sent by an AP. For each beacon or probe response on which information is received, the method analyzes the information received in the report about the AP that sent the beacon or probe response, the analyzing including ascertaining if the MAC address of the AP that sent the beacon or probe response matches a MAC address of an AP in the AP database to ascertain whether or not the AP is a potential rogue AP or a managed or friendly AP.
Abstract:
Determining the location of a radio tag or client station of a wireless network, and the location of coverage holes by receiving from a plurality of wireless stations of the wireless network path loss information of the path loss of one or more location frames received at the respective wireless stations. The location frames transmitted by the radio tag or client station having a pre-defined frame structure. The radio tags and client stations use a common infrastructure for transmitting a location frame configured for radiolocation by path loss measurement. The common infrastructure includes a pre defined protocol common for both radio tags and client stations for transmitting information for reception by the plurality of stations of the wireless network for radiolocation. The pre-defined protocol includes using the location frame having the predefined frame structure.
Abstract:
Methods, apparatuses and systems directed to identifying coverage holes in wireless networks. According to implementation of the present invention, the wireless network infrastructure analyzes signal strength data to detect potential coverage holes associated with one or more wireless clients (604) and validates (616) the potential coverage holes based on observed coverage data.
Abstract:
In a wireless local area network, a method for detecting the presence of an unauthorized device comprises: detecting the presence of neighboring devices from which management frames can be sent; saving a representation of each neighboring device present; receiving a management frame purporting to be from one of the detected device; determining that the received management frame was sent by an unauthorized device; and indicating the presence of the unauthorized device.
Abstract:
A method, an apparatus, and a carrier medium carrying computer readable code segments to instruct a processor to execute the method. The method is in a wireless network that includes at least one access point. The method includes, from time-to- time, measuring (405) a first set of at least one property of each access point (111-115) of a set of at least one classified access point of the wireless network. The method further includes re-classifying (407) each access point based on at least one function of a second set of at least one property of the access point, the second set of properties including the first set of properties. The set of at least one access point is classified according to a set of AP classifications, and the re-classifying is into one of the AP classifications.