-
公开(公告)号:US11019554B2
公开(公告)日:2021-05-25
申请号:US16494788
申请日:2017-04-14
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Qiang Zhou , Jianpo Han , Guangzhi Ran
Abstract: An example method of controlling a wireless access point may include associating accumulated-channel-resource-consumption variables with, respectively, resource consumers of the wireless access point. The method may further include, for wireless communications of the wireless access point determining a number of spatial streams effectively consumed by the respective wireless communication; determining an operational bandwidth effectively consumed by the respective wireless communication; determining a duration of the respective wireless communication; determining a channel-resource-consumption amount for the respective wireless communication based on the number of spatial streams effectively consumed by the respective wireless communication, the operational bandwidth effectively consumed by the respective wireless communication, and the duration of the respective wireless communication; and determining values for the accumulated-channel-resource-consumption variables by accumulating the channel-resource-consumption amounts per resource consumer. The method may further include determining whether to impose channel access restrictions on the resource consumers based on their respective accumulated-channel-resource-consumption variables.
-
公开(公告)号:US20210058861A1
公开(公告)日:2021-02-25
申请号:US16547183
申请日:2019-08-21
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Qiang Zhou , Jianpo Han , Guangzhi Ran
Abstract: In one example a computer implemented method comprises receiving, at an access point of a wireless network, a multicast/broadcast frame which identifies one or more stations associated with the access point as a recipient for the multicast/broadcast frame, and in response to a determination that at least one station of the one or more stations identified as a recipient for the multicast/broadcast frame is in an inactive state, determining a beacon slot time for a transmission of the multicast/broadcast frame from the access point, in response to a determination that at least one of the one or more stations in an inactive state will miss the beacon signal, converting the multicast/broadcast frame to a unicast frame, and holding a copy of the unicast frame to be transmitted to the at least one of the one or more stations in an inactive state that will miss the beacon signal.
-
公开(公告)号:US20210058850A1
公开(公告)日:2021-02-25
申请号:US16547186
申请日:2019-08-21
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Guangzhi Ran , Qiang Zhou , Jianpo Han
Abstract: In one example a computer implemented method comprises estimating, in a processor communicatively coupled to a wireless client of a composite device, a first transmission time for an uplink beacon from a first access point communicatively coupled to the wireless client, scheduling, in the processor, a second transmission time for a beacon from a local access point of the composite device, and defining a scan window during which scan operations for the wireless client of the composite device and the local access point of the composite device are to occur, the scan window offset from the second transmission time by a first time buffer.
-
公开(公告)号:US10827521B2
公开(公告)日:2020-11-03
申请号:US16356143
申请日:2019-03-18
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Jianpo Han , Qiang Zhou , Guangzhi Ran
Abstract: An example device comprising: a processor to determine that a client device is located in an overlapping area between the first network device and a second network device, to synchronize a first clock of the first network device with a second clock of the second network device, to negotiate, with the second network device, a overlapping access window, an overlapping forbidden window, and a non-overlapping access window for the first network device and the second network device in beacon intervals, to allocate the overlapping access window, the overlapping forbidden window, and the non-overlapping access window by the first network device, to store the allocated overlapping access window, the allocated overlapping forbidden window, and the allocated non-overlapping access window as channel scheduling rules for spatial reuse, and to control frame transmission of the network device based on the channel scheduling rules.
-
公开(公告)号:US10771954B2
公开(公告)日:2020-09-08
申请号:US15966393
申请日:2018-04-30
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Qiang Zhou , Sachin Ganu , Guangzhi Ran , Jianpo Han
Abstract: An example of controlling a network of wireless access points (APs) to detect that a client device associated with the network is stationary in an AP-overlap area, and in response to the detection that the client device is stationary in the AP-overlap area, assigning one of the APs to be a preferred AP for the client device. The APs are to avoid connecting with any client devices that have been assigned another AP as a preferred AP. Thus, the stationary client device in the overlap area may be prevented from undesired roaming.
-
公开(公告)号:US20190239173A1
公开(公告)日:2019-08-01
申请号:US16262292
申请日:2019-01-30
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Xuguang Jia , Qiang Zhou , Jianpo Han , Guangzhi Ran
IPC: H04W56/00
CPC classification number: H04W56/001 , H04W56/0015 , H04W84/12
Abstract: An example device comprising: a processor to detect a time difference between a first system clock of an access point (AP) and a second system clock of a controller; determine whether the AP has abnormal dock based on the time difference; and automatically recover the first system clock of the AP when the AP has abnormal clock.
-
公开(公告)号:US20250142324A1
公开(公告)日:2025-05-01
申请号:US18498291
申请日:2023-10-31
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Jianpo Han , Kangchang Huang , Qiang Zhou
IPC: H04W12/0431 , H04W12/76 , H04W84/12
Abstract: In implementations of the present disclosure, there is provided an approach for transmitting multicast frames. A method comprises obtaining a multicast frame in a wireless local area network (WLAN), where the WLAN includes a plurality of sub-networks with a same service set identifier (SSID). Then, a target sub-network of the plurality of sub-networks for receiving the multicast frame is determined based on the multicast frame and a unique group temporal key (GTK) for the target sub-network is obtained based on the target sub-network. Next, the multicast frame is encrypted using the obtained unique GTK for the target sub-network, and the encrypted multicast frame is transmitted to one or more client devices in the target sub-network. Implementations of the present disclosure can help the AP to reduce leakage of multicast frames to all client device by using the GTK corresponding the target sub-network.
-
公开(公告)号:US12132714B2
公开(公告)日:2024-10-29
申请号:US17672011
申请日:2022-02-15
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Huimeng Huang , Jianpo Han , Zhijun Ren , Chunfeng Wang
IPC: H04L67/1004 , H04L9/40 , H04L12/46 , H04L67/141
CPC classification number: H04L63/0485 , H04L12/4633 , H04L63/029 , H04L63/164 , H04L67/1004 , H04L67/141
Abstract: Systems are methods are provided for implementing load balancing of IPsec security associations (SAs) SAs between different heterogeneous cores, for example in a multiple controller systems. The balancing of IPsec SAs are performed using software implementations of IPsec offloading and/or hardware implementations of IPsec offloading. By balancing the processing functions related to orchestration of IPsec SAs between hardware (e.g., IPsec hardware accelerator) and software (e.g., IPsec software accelerator), the methods realize increased optimization, improved user experience, and enhanced product performance in networks using IPsec. For example, an IPsec session is initiated, and it is determined whether a resource limitation for a hardware-based IPsec accelerator has been reached. If the limitation for the hardware-based IPsec accelerator has been reached, processing for the IPsec SA for the initiated IPsec session is offloaded to a software-based IPsec accelerator.
-
公开(公告)号:US12099133B2
公开(公告)日:2024-09-24
申请号:US17487630
申请日:2021-09-28
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Jianpo Han , Jiguang Zheng , Kuanyue Li
IPC: G01S5/02 , G01R33/022 , G01R33/24
CPC classification number: G01S5/0284 , G01R33/022 , G01R33/24
Abstract: In embodiments of the present disclosure, a method is provided for managing an AP position for an access point. In the method, a magnetic distribution map is obtained for an indoor area, the magnetic distribution map representing a plurality of reference magnetic values that are collected at a plurality of reference positions in the indoor area. A plurality of magnetic measurements are received, here the plurality of magnetic measurements are respectively collected at a plurality of access point (AP) positions at which a plurality of APs are deployed within the indoor area, and the plurality of AP positions are unknown. The plurality of AP positions are mapped to a portion of the plurality of reference positions based on the plurality of magnetic measurements and the plurality of reference magnetic values. The plurality of AP positions are determined based on the portion of the plurality of reference positions. Therefore, AP positions may be determined accurately and effectively in an indoor environment.
-
公开(公告)号:US12095905B2
公开(公告)日:2024-09-17
申请号:US17461390
申请日:2021-08-30
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Yafeng Jiang , Jianpo Han , Guangzhi Ran
CPC classification number: H04L9/0827 , H04L9/0825 , H04L9/0866 , H04L9/3247 , H04L2209/12
Abstract: Examples disclosed herein include accessing, by a host device, device information corresponding to an intermediate communication device communicatively coupled to the host device. Identifying, by the host device, a unique identifier corresponding to the intermediate communication device from the accessed device information. Query, by the host device, a public key from a remote resource, based on the identified unique identifier. Receiving, by the host device, the public key from the remote resource. Authenticating, by the host device, the intermediate communication device based on the received public key and a private key stored in the intermediate communication device.
-
-
-
-
-
-
-
-
-