US20170164246A1 - Method and system for dynamic determination of potential access points for propagating client information - Google Patents

Method and system for dynamic determination of potential access points for propagating client information Download PDF

Info

Publication number
US20170164246A1
US20170164246A1 US15/433,579 US201715433579A US2017164246A1 US 20170164246 A1 US20170164246 A1 US 20170164246A1 US 201715433579 A US201715433579 A US 201715433579A US 2017164246 A1 US2017164246 A1 US 2017164246A1
Authority
US
United States
Prior art keywords
client device
aps
subset
access point
instructions
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US15/433,579
Inventor
Sachin Ganu
Juei Cheng Lo
Rajini Balay
Partha Narasimhan
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Aruba Networks Inc
Original Assignee
Aruba Networks Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Aruba Networks Inc filed Critical Aruba Networks Inc
Priority to US15/433,579 priority Critical patent/US20170164246A1/en
Assigned to HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. reassignment HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ARUBA NETWORKS, INC.
Assigned to ARUBA NETWORKS, INC. reassignment ARUBA NETWORKS, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
Publication of US20170164246A1 publication Critical patent/US20170164246A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0055Transmission or use of information for re-establishing the radio link
    • H04W36/0061Transmission or use of information for re-establishing the radio link of neighbour cell information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/16Performing reselection for specific purposes
    • H04W36/22Performing reselection for specific purposes for handling the traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/24Reselection being triggered by specific parameters
    • H04W36/32Reselection being triggered by specific parameters by location or mobility data, e.g. speed data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/02Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
    • H04W8/08Mobility data transfer
    • H04W8/14Mobility data transfer between corresponding nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/20Transfer of user or subscriber data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities
    • H04W8/24Transfer of terminal data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]

Definitions

  • the present disclosure relates to dynamically determining a set of access points to which a client device may roam.
  • the present disclosure relates to propagating information associated with a client device to the dynamically determined set of access point to which the client device may roam.
  • WLAN Wireless Local Area Network
  • IEEE Institute of Electrical and Electronics Engineers 802.11 standard is the dominating technology and is frequently used for WLANs.
  • Access points are digital devices that may be communicatively coupled to one or more networks (e.g., Internet, an intranet, etc.). Access points may be directly connected to the one or more networks or connected via a controller.
  • An access point as referred to herein, may include a wireless access point (WAP) that communicates wirelessly with devices using Wi-Fi, Bluetooth or related standards and that communicates with a wired network.
  • WAP wireless access point
  • a client device that is communicatively coupled to a first access point may switch to a second access point due to a change in location of the client device, failure of the first access point, a better signal strength for the second access point, or for any other reason.
  • the second access point determines whether or not to grant the client device access to one or more network resources via the second access point.
  • FIG. 1 shows a block diagram example of a system in accordance with one or more embodiments
  • FIG. 2 shows a block diagram example of an access point in accordance with one or more embodiments
  • FIG. 3 illustrates an example of an information propagating logic in accordance with one or more embodiments
  • FIG. 4 illustrates an example method for propagating information associated with a client device in accordance with one or more embodiments.
  • a client device is associated with a first access point. Prior to a client device roaming to a different access point, a set of access points to which the client device may roam is identified. Information associated with the client device is propagated to the set of access points to which the client device may roam.
  • the set of access points in wireless communication with a particular access point with which a client device is associated, is identified as the set of access points to which the client device may roam.
  • the set of access points may be identified based on the particular access point receiving wireless signals with a Signal-To-Noise ratio or an absolute signal strength above a particular threshold.
  • the set of access points which receive wireless signals from a client device while the client device is associated with a particular access point, is identified as the set of access points to which the client device may roam.
  • the set of access points may be identified in response to receiving wireless signals, from the client device, with a Signal-To-Noise ratio or an absolute signal strength above a particular threshold
  • a distributed set of nodes for example, a distributed hash table
  • client device identifiers corresponding to the client devices.
  • a first network device determines a particular node in a distributed set of nodes, based on a client device identifier, to store state information for the client device.
  • State information for example, authentication information, firewall session information, multicast information, gateway information, and/or optimization information
  • identification, of another network device which stores at least a portion of the state information for the client device is stored on the first node.
  • nodes of a distributed set of nodes are (a) selected based on client device identifiers and (b) queried for information associated with client devices corresponding to the client device identifiers.
  • a client device which was previously associated with a first access point, requests association with a second access point.
  • the second access point (or other network device such as a controller) determines a MAC address of the client device from the association request and applies a hash function to the MAC address to compute a hash value.
  • the second access point identifies a particular node in a distributed hash table that is associated with the hash value and obtains from the particular node (a) authentication information such as a shared key from prior authentication(s) of the client device and (b) an identification such as an IP address of a network device which stores additional information for the client device. Based on the information, the access point communicates with the client device to create at least one encryption key for encrypting communication between the access point and the client device. Furthermore, while the at least one encryption key is being created, the additional information for the client device is obtained from the network device based on the IP address. In this example, the additional information may include multicast information identifying the multicast subscriptions for the client device. The concurrent creation of the encryption keys and obtaining of the multicast information allows the second access point to quickly resume the multicast subscriptions for the client device.
  • FIG. 1 shows a block diagram example of a system which includes digital devices in accordance with one or more embodiments.
  • System 1 may include more or less digital devices, than the devices illustrated in FIG. 1 .
  • digital device generally refers to any hardware device that includes a processor. When the digital device is adapted for communications with a network, the digital device may be configured as a network device, a client device, or both.
  • a digital device may refer to a physical controller device or a hardware device executing a virtual controller.
  • a digital device may be a network device and/or a client device.
  • a “network device” is a digital device that may be configured to provide a network service.
  • a “client device” is a digital device that may be configured to receive a network service. Examples of digital devices include a computer, a tablet, a laptop, a desktop, a netbook, a server, a web server, authentication server, an authentication-authorization-accounting (AAA) server, a Domain Name System (DNS) server, a Dynamic Host Configuration Protocol (DHCP) server, an Internet Protocol (IP) server, a Virtual Private Network (VPN) server, a network policy server, a mainframe, a television, a content receiver, a set-top box, a video gaming console, a printer, a mobile handset, a smartphone, a personal digital assistant “FDA”, a wireless receiver and/or transmitter, an access point, a base station, a communication management device, a router, a switch, and/or
  • System 1 is a system that includes a network 10 (for example, a Local Area Network, a Wide Area Network, the Internet, Intranet, etc.), an access point 20 , an access point 21 , access point 22 , access point 23 , and a set of client devices 30 1 - 30 x .
  • the access points are communicatively coupled to the network 10 via a transmission medium to send and receive data.
  • the transmission medium may be a wired or a wireless connection.
  • Access points 20 - 23 may be on a same network or different networks. Access points 20 - 23 may be on the same Internet Protocol Subnet or different Internet Protocol Subnets.
  • System 1 may include one or more controllers (not shown) which are configured to communicate with one or more access points (for example, access points 20 - 23 ) within System 1 .
  • the controller links one or more of access points 20 - 23 to network 10 .
  • two separate controllers link access point 20 and access point 21 to network 10 .
  • access points 20 - 23 each correspond to a network device such as a wired access port, a wireless access port, a switch, a router, or any combination thereof.
  • An access point communicatively couples a client device to one or more other devices and/or resources within System 1 .
  • the access point 20 is configured to forward data to or data from the client devices 30 1 - 30 n .
  • the client devices 30 1 - 30 n are digital devices that include a processor, memory, and input/output (I/O) interfaces including a wireless interface such as an IEEE 802.11 wireless interface.
  • the wireless interface may be used to communicate with the access point 20 to obtain access to devices and/or resources within System 1 .
  • the client devices 30 1 - 30 n may be wireless electronic devices that are capable of receiving application data, configuration data, voice data streams, video data streams, or any other type of data. Examples of client devices include personal computers, laptop computers, netbook computers, wireless music players, portable telephone communications devices, smart phones, tablets, and digital televisions.
  • each client device is associated with a client device identifier.
  • the client device identifier refers to any information that is associated with a client device and is persistent as the client device connects to different access points (for example, access point 20 and access point 21 ).
  • An example of a client device identifier is a Media Access Control (MAC) address of a client device.
  • MAC Media Access Control
  • a client device identifier corresponds to an identification number assigned to each device used in an enterprise network by a system administrator or automatically by a device registration application.
  • access point 20 a controller associated with access point 20 , or another device stores information associated with client device 30 x .
  • the information associated with a client device may include but is not limited to one or more of:
  • FIG. 2 shows a block diagram example of access point 20 in accordance with one or more embodiments.
  • One or more steps described herein as being performed by an access point may be performed by another network device such as a controller.
  • another network device such as a controller.
  • one or more components described herein as being implemented within an access point may be implemented within another network device such as a controller.
  • Access points within System 1 may be configured similarly or differently than access point 20 .
  • Access point 20 is a network device that comprises one or more of: a processor 21 , data storage 22 , an I/O interface 23 , and an information propagating logic 24 .
  • the data storage 22 of the access point 20 may include a fast read-write memory for storing programs and data during the access point 20 's operations and a hierarchy of persistent memory such as ROM, EPROM, and Flash memory for storing instructions and data needed for the startup and/or operations of access point 20 .
  • the data storage 22 stores data that is to be transmitted from the access point 20 or data that is received by access point 20 .
  • the data storage 22 is a distributed set of data storage components.
  • the I/O interface 23 corresponds to one or more components used for communicating with other devices via wired or wireless segments.
  • the I/O interface 23 may include a wired network interface such as an IEEE 802.3 Ethernet interface and/or a wireless interface such as an IEEE 802.11 WiFi® interface (WiFi® is a registered trademark of WiFi Alliance).
  • the processor 21 is coupled to the data storage 22 and the I/O interface 23 .
  • the processor 21 may be any processing device including, but not limited to a MIPS-class processor, a microprocessor, a digital signal processor, an application specific integrated circuit, a microcontroller, a state machine, or any type of programmable logic array.
  • the information propagating logic 24 includes one or more functional units implemented using firmware, hardware, software, or a combination thereof for dynamically determining a set of access points for propagating information associated with a client device.
  • the information propagating logic 24 is shown as implemented on access point 20 , one or more physical or functional components of the information propagating logic 24 may be implemented on a separate device(s).
  • the information propagating logic 24 may be implemented on a controller (or any other device) in communication with one or more of the access points 20 - 23 .
  • the individual functional components of the information propagating logic 24 are described below with Reference to FIG. 3 .
  • FIG. 3 illustrates an example of information propagating logic 24 in accordance with one or more embodiments.
  • the information propagating logic 24 includes functional units implemented using firmware, hardware, software, or a combination thereof.
  • the information propagating logic 24 is implemented with functional units including an access point identification unit 32 , information identification unit 34 , and an information transmission unit 36 .
  • Components and functionalities described with reference to a particular functional unit may instead be implemented within another functional unit.
  • two or more functional units may be combined into a single program or single device.
  • a single functional unit may be implemented by multiple devices or multiple applications that each performs a portion of the functions described herein.
  • An access point identification unit 32 includes functionality to identify a set of access points to which a client device may roam.
  • the access point identification unit 32 may communicate with any of access points 20 - 23 or with a client device to obtain information which may be evaluated to determine the set of access points to which the client device may roam.
  • the access point identification unit 32 determines that client device 30 ,, currently associated with access point 20 is likely to roam to access point 21 or access point 23 , but not likely to roam to access point 22 based on a proximity to access point 20 .
  • the access point identification unit 32 determines that client device 30 x currently associated with access point 20 is likely to roam to access point 21 or access point 22 , but not likely to roam to access point 23 based on an estimated direction of travel of client device 30 x .
  • the information identification unit 34 includes functionality to determine a set of information associated with the client device (described above).
  • the information identification unit 34 may continuously, periodically, or in response to an event, determine the set of information associated with the client device.
  • the information identification unit 34 may aggregate the information or simply determine where the information is located.
  • the information transmission unit 36 includes functionality to transmit the set of information associated with the client device to each of the set of access points to which a client device may roam.
  • the information transmission unit 36 may include functionality to transmit the information associated with the client device in response to a triggering event or periodically.
  • the information transmission unit 36 may transmit instructions to other devices, storing the information associated with the client device, to transmit the information to each of a set of client devices to which a client device may roam.
  • the operations that may be performed by the information propagating logic 24 (or other functional units within the system) for granting access to a client device are described below with reference to FIG. 4 .
  • FIG. 4 illustrates an example method for propagating information associated with a client device.
  • One or more operations illustrated in FIG. 4 may be modified, rearranged, or omitted all together. Accordingly, the particular sequence of operations illustrated in FIG. 4 should not be construed as limiting the scope of one or more embodiments.
  • a client device is associated with a particular access point. While the client device is associated with the particular access point, other access points to which the client device may roam are identified (Operation 402 ).
  • a set of access points to which the client device may roam is identified based on the particular access point to which the client is currently associated.
  • access points that are nearby the particular access point are identified in the potential set of access points.
  • the set of nearby access points may be determined based on a detection of each of the set of the nearby access points by the particular access point.
  • a second access point may be determined to be a nearby access point responsive to the particular access point receiving a wireless signal from the second access point with (a) a Signal-To-Noise ratio above a particular threshold and/or (b) an absolute signal strength above a particular threshold.
  • the received wireless signal may, for example, (a) include a beacon frame, (b) be an ACK frame received in response to a wireless signal transmitted to the particular access point, or (c) be directed to another device and snooped by the first access point.
  • the potential set of access points to which the client device may roam may be determined based on information collected by each of the potential set of access points.
  • each access point may collect information on a set of client devices that are detected by that access point.
  • the access point detects client devices based on received wireless signals and records for the detected client devices a corresponding Signal-To-Noise ratio or an absolute signal strength of wireless signals received by the access point from the client device.
  • the received wireless signals may include probe requests, data frames, management frames, or any other information.
  • a client device transmits probe requests, across many different wireless channels, that are received by a plurality of access points. Based on the received probe requests, each access point maintains a respective list of client device identifiers, a signal strength of received wireless signals, and a timestamp indicating when the wireless signals were received.
  • the access point records information for client devices if the Signal-To-Noise ratios of received signals received from the client device is above a particular Signal-To-Noise ratio threshold.
  • the recorded information for a client device may include a timestamp of the time at which the wireless signal was received.
  • information received for each client device from different access points may be aggregated to generate a client record.
  • the client record indicates a list of access points which received wireless signals from a particular client device, a signal strength of received wireless signals, a Signal-to-Noise ratio of the received wireless signals, and/or a time at which the wireless signals were received.
  • the potential set of access points to which the client device may roam may be based on historical data.
  • a user of a client device takes the client device to a Fish Bowl conference room every Tuesday at 10 am wherein the client device connects to the access point in the Fish Bowl conference room (or to one of a set of access points in the vicinity of the Fish Bowl conference room.
  • the potential set of access points to which the client device may roam to on Tuesday mornings at 10 am includes the access point in the Fish Bowl conference room (or includes the set of access points in the vicinity of the Fish Bowl conference room).
  • lunch guests at a corporation bring client devices that first connect to an access point located in a lobby of an office building.
  • the client devices connect to an access point located in a cafeteria of the office building. Based on this historical trend, a determination is made that client devices first connecting to the access point in the lobby around lunch time will likely roam to the access point in the cafeteria. Accordingly, a potential set of access points to which a client device may roam to may be determined based on a historical usage of that client device itself or based on a historical usage of a set of client devices with similar characteristics.
  • the potential set of client devices to which the client device may roam may be based on administrator configured rules.
  • a casino administrator may indicated that client devices connected with an access point on a casino floor will likely roam to an access point near a cashier.
  • the trend of client devices roaming from an access point on the casino floor to an access point near a cashier may also be determined based on historical connectivity data.
  • the determination that the information is to be transmitted may be made based on a periodic basis such that information associated with the client device is periodically transmitted to a dynamically determined set of access points to which the client device may roam to.
  • the determination that the information associated with a client device is to be transmitted is based on a triggering event.
  • triggering events include but are not limited to one or more of:
  • the information associated with the client device is transmitted to the access points to which the client device may roam to (Operation 406 ).
  • the information associated with the client device, that is received by an access point to which the client device may roam, is used by that access point and/or transmitted to the client device for use by the client device (Operation 408 ).
  • the client device roams away from the first access point and initiates a process for associating with the second access point.
  • the second access point transmit the information for deriving an encryption key, that was received from the first access point (or from a controller) to the client device.
  • the client device uses the information to derive an encryption key and encrypt packets transmitted to the second access point.
  • the information associated with the client device may be used to establish firewall sessions, resume streaming of data, resume multicast subscriptions, etc.
  • information that is sent to a particular access point that is no longer (but used to be) one of the access points to which the client device may roam is deleted from the particular access point.
  • a newly determined set of access points to which a client device may roam is compared to a previously determined set of access points to which the client device may roam.
  • a particular access point that was in the previously determined set is not included in the newly determined set.
  • the particular access point is notified that the previously sent information associated with the client device may be deleted.

Abstract

A method includes determining a subset, of a set of access points, that a client device is likely to roam to from a first access point in the set of access points; transmitting to each of the subset of access points, without transmitting to a second access point in the set of access points that is not included in the subset, information associated with the client device; wherein the information associated with the client device is used by the client device or by the third access point during (a) an association process for the client device associating with the third access point or (b) an authentication process for the authentication of the client device by the third access point.

Description

    BENEFIT CLAIM
  • This non-provisional application claims the benefit of provisional application Ser. No. 61/785,001 filed on Mar. 14, 2013, which is hereby incorporated by reference.
  • TECHNICAL FIELD
  • The present disclosure relates to dynamically determining a set of access points to which a client device may roam. In particular, the present disclosure relates to propagating information associated with a client device to the dynamically determined set of access point to which the client device may roam.
  • BACKGROUND
  • In recent years, Wireless Local Area Network (WLAN) technologies have emerged as a fast-growing market. Among the various WLAN technologies, Institute of Electrical and Electronics Engineers (IEEE) 802.11 standard is the dominating technology and is frequently used for WLANs.
  • Client devices within WLANs communicate with access points to obtain access to one or more network resources. Access points are digital devices that may be communicatively coupled to one or more networks (e.g., Internet, an intranet, etc.). Access points may be directly connected to the one or more networks or connected via a controller. An access point, as referred to herein, may include a wireless access point (WAP) that communicates wirelessly with devices using Wi-Fi, Bluetooth or related standards and that communicates with a wired network.
  • A client device that is communicatively coupled to a first access point may switch to a second access point due to a change in location of the client device, failure of the first access point, a better signal strength for the second access point, or for any other reason. The second access point then determines whether or not to grant the client device access to one or more network resources via the second access point.
  • The approaches described in this section are approaches that could be pursued, but not necessarily approaches that have been previously conceived or pursued. Therefore, unless otherwise indicated, it should not be assumed that any of the approaches described in this section qualify as prior art merely by virtue of their inclusion in this section.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The embodiments are illustrated by way of example and not by way of limitation in the figures of the accompanying drawings. It should be noted that references to “an” or “one” embodiment in this disclosure are not necessarily to the same embodiment, and they mean at least one. In the drawings:
  • FIG. 1 shows a block diagram example of a system in accordance with one or more embodiments;
  • FIG. 2 shows a block diagram example of an access point in accordance with one or more embodiments;
  • FIG. 3 illustrates an example of an information propagating logic in accordance with one or more embodiments;
  • FIG. 4 illustrates an example method for propagating information associated with a client device in accordance with one or more embodiments.
  • DETAILED DESCRIPTION
  • In the following description, for the purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding. One or more embodiments may be practiced without these specific details. Features described in one embodiment may be combined with features described in a different embodiment. In some examples, well-known structures and devices are described with reference to a block diagram form in order to avoid unnecessarily obscuring the present invention.
  • General Overview
  • In one or more embodiments, a client device is associated with a first access point. Prior to a client device roaming to a different access point, a set of access points to which the client device may roam is identified. Information associated with the client device is propagated to the set of access points to which the client device may roam.
  • In an embodiment, the set of access points, in wireless communication with a particular access point with which a client device is associated, is identified as the set of access points to which the client device may roam. The set of access points may be identified based on the particular access point receiving wireless signals with a Signal-To-Noise ratio or an absolute signal strength above a particular threshold.
  • In an embodiment, the set of access points, which receive wireless signals from a client device while the client device is associated with a particular access point, is identified as the set of access points to which the client device may roam. The set of access points may be identified in response to receiving wireless signals, from the client device, with a Signal-To-Noise ratio or an absolute signal strength above a particular threshold
  • information for client devices is stored in a distributed set of nodes (for example, a distributed hash table) that is keyed based on client device identifiers corresponding to the client devices. In one example, upon authentication of a client device by a RADIUS server, a first network device determines a particular node in a distributed set of nodes, based on a client device identifier, to store state information for the client device. State information (for example, authentication information, firewall session information, multicast information, gateway information, and/or optimization information) for the client device is stored on the particular node. Alternatively, or in addition, identification, of another network device which stores at least a portion of the state information for the client device, is stored on the first node.
  • In one or more embodiments, nodes of a distributed set of nodes are (a) selected based on client device identifiers and (b) queried for information associated with client devices corresponding to the client device identifiers. In one example, a client device, which was previously associated with a first access point, requests association with a second access point. The second access point (or other network device such as a controller) determines a MAC address of the client device from the association request and applies a hash function to the MAC address to compute a hash value. The second access point identifies a particular node in a distributed hash table that is associated with the hash value and obtains from the particular node (a) authentication information such as a shared key from prior authentication(s) of the client device and (b) an identification such as an IP address of a network device which stores additional information for the client device. Based on the information, the access point communicates with the client device to create at least one encryption key for encrypting communication between the access point and the client device. Furthermore, while the at least one encryption key is being created, the additional information for the client device is obtained from the network device based on the IP address. In this example, the additional information may include multicast information identifying the multicast subscriptions for the client device. The concurrent creation of the encryption keys and obtaining of the multicast information allows the second access point to quickly resume the multicast subscriptions for the client device.
  • Architectural Overview
  • FIG. 1 shows a block diagram example of a system which includes digital devices in accordance with one or more embodiments. In one or more embodiments, System 1 may include more or less digital devices, than the devices illustrated in FIG. 1.
  • The term “digital device” generally refers to any hardware device that includes a processor. When the digital device is adapted for communications with a network, the digital device may be configured as a network device, a client device, or both. A digital device may refer to a physical controller device or a hardware device executing a virtual controller.
  • A digital device may be a network device and/or a client device. A “network device” is a digital device that may be configured to provide a network service. A “client device” is a digital device that may be configured to receive a network service. Examples of digital devices include a computer, a tablet, a laptop, a desktop, a netbook, a server, a web server, authentication server, an authentication-authorization-accounting (AAA) server, a Domain Name System (DNS) server, a Dynamic Host Configuration Protocol (DHCP) server, an Internet Protocol (IP) server, a Virtual Private Network (VPN) server, a network policy server, a mainframe, a television, a content receiver, a set-top box, a video gaming console, a printer, a mobile handset, a smartphone, a personal digital assistant “FDA”, a wireless receiver and/or transmitter, an access point, a base station, a communication management device, a router, a switch, and/or a controller.
  • System 1, as illustrated in FIG. 1, is a system that includes a network 10 (for example, a Local Area Network, a Wide Area Network, the Internet, Intranet, etc.), an access point 20, an access point 21, access point 22, access point 23, and a set of client devices 30 1-30 x. The access points are communicatively coupled to the network 10 via a transmission medium to send and receive data. The transmission medium may be a wired or a wireless connection. Access points 20-23 may be on a same network or different networks. Access points 20-23 may be on the same Internet Protocol Subnet or different Internet Protocol Subnets. In an example, System 1 may include one or more controllers (not shown) which are configured to communicate with one or more access points (for example, access points 20-23) within System 1. The controller links one or more of access points 20-23 to network 10. In another example, two separate controllers link access point 20 and access point 21 to network 10.
  • In one or more embodiments, access points 20-23 each correspond to a network device such as a wired access port, a wireless access port, a switch, a router, or any combination thereof. An access point communicatively couples a client device to one or more other devices and/or resources within System 1. The access point 20 is configured to forward data to or data from the client devices 30 1-30 n.
  • In an embodiment, the client devices 30 1-30 n are digital devices that include a processor, memory, and input/output (I/O) interfaces including a wireless interface such as an IEEE 802.11 wireless interface. The wireless interface may be used to communicate with the access point 20 to obtain access to devices and/or resources within System 1. The client devices 30 1-30 n may be wireless electronic devices that are capable of receiving application data, configuration data, voice data streams, video data streams, or any other type of data. Examples of client devices include personal computers, laptop computers, netbook computers, wireless music players, portable telephone communications devices, smart phones, tablets, and digital televisions.
  • In an embodiment, each client device is associated with a client device identifier. The client device identifier refers to any information that is associated with a client device and is persistent as the client device connects to different access points (for example, access point 20 and access point 21). An example of a client device identifier is a Media Access Control (MAC) address of a client device. In another example, a client device identifier corresponds to an identification number assigned to each device used in an enterprise network by a system administrator or automatically by a device registration application.
  • In an embodiment, access point 20, a controller associated with access point 20, or another device stores information associated with client device 30 x. The information associated with a client device may include but is not limited to one or more of:
      • a. Authentication Information—Information related to, used in, or generated during prior authentications of the client device; Information to be used in a future authentication of the client device.
      • b. Encryption Key Information—Information related to encryption keys used for encrypting data received by the client device or data sent by the client device.
      • c. Multicast Information—Information related to multicasts received by the client device.
      • d. Optimization Information—Information related to the configuration of the client device or configuration of access points in communication with the client device for optimal performance.
      • e. Firewall Session Information—Information related to a firewall session defining acceptable data sources or data types for the client device.
      • f. Gateway Information—Dynamic Host Configuration Protocol (DHCP) parameters used for an access point when communicatively coupling the client device to one or more resources on a network.
      • g. Fast Roaming Information—Keys for Opportunistic Key Caching (OKC) as defined under IEEE 802.11
    Access Points
  • FIG. 2 shows a block diagram example of access point 20 in accordance with one or more embodiments. One or more steps described herein as being performed by an access point, may be performed by another network device such as a controller. Furthermore, one or more components described herein as being implemented within an access point may be implemented within another network device such as a controller. Access points within System 1 may be configured similarly or differently than access point 20. Access point 20 is a network device that comprises one or more of: a processor 21, data storage 22, an I/O interface 23, and an information propagating logic 24.
  • The data storage 22 of the access point 20 may include a fast read-write memory for storing programs and data during the access point 20's operations and a hierarchy of persistent memory such as ROM, EPROM, and Flash memory for storing instructions and data needed for the startup and/or operations of access point 20. The data storage 22 stores data that is to be transmitted from the access point 20 or data that is received by access point 20. In an embodiment, the data storage 22 is a distributed set of data storage components.
  • In an embodiment, the I/O interface 23 corresponds to one or more components used for communicating with other devices via wired or wireless segments. The I/O interface 23 may include a wired network interface such as an IEEE 802.3 Ethernet interface and/or a wireless interface such as an IEEE 802.11 WiFi® interface (WiFi® is a registered trademark of WiFi Alliance).
  • The processor 21 is coupled to the data storage 22 and the I/O interface 23. The processor 21 may be any processing device including, but not limited to a MIPS-class processor, a microprocessor, a digital signal processor, an application specific integrated circuit, a microcontroller, a state machine, or any type of programmable logic array.
  • In an embodiment, the information propagating logic 24 includes one or more functional units implemented using firmware, hardware, software, or a combination thereof for dynamically determining a set of access points for propagating information associated with a client device. Although, the information propagating logic 24 is shown as implemented on access point 20, one or more physical or functional components of the information propagating logic 24 may be implemented on a separate device(s). In an example, the information propagating logic 24 may be implemented on a controller (or any other device) in communication with one or more of the access points 20-23. The individual functional components of the information propagating logic 24 are described below with Reference to FIG. 3.
  • Information Propagating Logic
  • FIG. 3 illustrates an example of information propagating logic 24 in accordance with one or more embodiments. The information propagating logic 24 includes functional units implemented using firmware, hardware, software, or a combination thereof. In one or more embodiments, the information propagating logic 24 is implemented with functional units including an access point identification unit 32, information identification unit 34, and an information transmission unit 36. Components and functionalities described with reference to a particular functional unit may instead be implemented within another functional unit. Furthermore, two or more functional units may be combined into a single program or single device. A single functional unit may be implemented by multiple devices or multiple applications that each performs a portion of the functions described herein.
  • An access point identification unit 32 includes functionality to identify a set of access points to which a client device may roam. The access point identification unit 32 may communicate with any of access points 20-23 or with a client device to obtain information which may be evaluated to determine the set of access points to which the client device may roam. In an example, the access point identification unit 32 determines that client device 30,, currently associated with access point 20 is likely to roam to access point 21 or access point 23, but not likely to roam to access point 22 based on a proximity to access point 20. In another example, the access point identification unit 32 determines that client device 30 x currently associated with access point 20 is likely to roam to access point 21 or access point 22, but not likely to roam to access point 23 based on an estimated direction of travel of client device 30 x.
  • The information identification unit 34 includes functionality to determine a set of information associated with the client device (described above). The information identification unit 34 may continuously, periodically, or in response to an event, determine the set of information associated with the client device. The information identification unit 34 may aggregate the information or simply determine where the information is located.
  • The information transmission unit 36 includes functionality to transmit the set of information associated with the client device to each of the set of access points to which a client device may roam. The information transmission unit 36 may include functionality to transmit the information associated with the client device in response to a triggering event or periodically. The information transmission unit 36 may transmit instructions to other devices, storing the information associated with the client device, to transmit the information to each of a set of client devices to which a client device may roam.
  • The operations that may be performed by the information propagating logic 24 (or other functional units within the system) for granting access to a client device are described below with reference to FIG. 4.
  • Propagating Information Associated With A Client Device
  • FIG. 4 illustrates an example method for propagating information associated with a client device. One or more operations illustrated in FIG. 4 may be modified, rearranged, or omitted all together. Accordingly, the particular sequence of operations illustrated in FIG. 4 should not be construed as limiting the scope of one or more embodiments.
  • Initially, a client device is associated with a particular access point. While the client device is associated with the particular access point, other access points to which the client device may roam are identified (Operation 402).
  • In an embodiment, a set of access points to which the client device may roam is identified based on the particular access point to which the client is currently associated. In an example, access points that are nearby the particular access point are identified in the potential set of access points. The set of nearby access points may be determined based on a detection of each of the set of the nearby access points by the particular access point. A second access point may be determined to be a nearby access point responsive to the particular access point receiving a wireless signal from the second access point with (a) a Signal-To-Noise ratio above a particular threshold and/or (b) an absolute signal strength above a particular threshold. The received wireless signal may, for example, (a) include a beacon frame, (b) be an ACK frame received in response to a wireless signal transmitted to the particular access point, or (c) be directed to another device and snooped by the first access point.
  • In an embodiment, the potential set of access points to which the client device may roam may be determined based on information collected by each of the potential set of access points. In an example, each access point may collect information on a set of client devices that are detected by that access point. The access point detects client devices based on received wireless signals and records for the detected client devices a corresponding Signal-To-Noise ratio or an absolute signal strength of wireless signals received by the access point from the client device. The received wireless signals may include probe requests, data frames, management frames, or any other information. In an example, a client device transmits probe requests, across many different wireless channels, that are received by a plurality of access points. Based on the received probe requests, each access point maintains a respective list of client device identifiers, a signal strength of received wireless signals, and a timestamp indicating when the wireless signals were received.
  • In an example, the access point records information for client devices if the Signal-To-Noise ratios of received signals received from the client device is above a particular Signal-To-Noise ratio threshold. The recorded information for a client device may include a timestamp of the time at which the wireless signal was received.
  • In an embodiment, information received for each client device from different access points may be aggregated to generate a client record. In an example, the client record indicates a list of access points which received wireless signals from a particular client device, a signal strength of received wireless signals, a Signal-to-Noise ratio of the received wireless signals, and/or a time at which the wireless signals were received.
  • In an embodiment, the potential set of access points to which the client device may roam may be based on historical data. In an example, a user of a client device takes the client device to a Fish Bowl conference room every Tuesday at 10 am wherein the client device connects to the access point in the Fish Bowl conference room (or to one of a set of access points in the vicinity of the Fish Bowl conference room. Based on this usage pattern, the potential set of access points to which the client device may roam to on Tuesday mornings at 10 am includes the access point in the Fish Bowl conference room (or includes the set of access points in the vicinity of the Fish Bowl conference room). In another example, lunch guests at a corporation bring client devices that first connect to an access point located in a lobby of an office building. Thereafter, the client devices connect to an access point located in a cafeteria of the office building. Based on this historical trend, a determination is made that client devices first connecting to the access point in the lobby around lunch time will likely roam to the access point in the cafeteria. Accordingly, a potential set of access points to which a client device may roam to may be determined based on a historical usage of that client device itself or based on a historical usage of a set of client devices with similar characteristics.
  • In an embodiment, the potential set of client devices to which the client device may roam may be based on administrator configured rules. In an example, a casino administrator may indicated that client devices connected with an access point on a casino floor will likely roam to an access point near a cashier. The trend of client devices roaming from an access point on the casino floor to an access point near a cashier may also be determined based on historical connectivity data.
  • In an embodiment, while the client device is associated with the particular access point, a determination is made that information associated with the client device is to be transmitted to access points to which the client device may roam to (Operation 404).
  • In an embodiment, the determination that the information is to be transmitted may be made based on a periodic basis such that information associated with the client device is periodically transmitted to a dynamically determined set of access points to which the client device may roam to.
  • In an embodiment, the determination that the information associated with a client device is to be transmitted is based on a triggering event. Examples of triggering events include but are not limited to one or more of:
      • a. Detecting a decrease in signal strength of wireless signals transmitted between the client device and an access point with which the client device is currently associated;
      • b. Detecting an increase in signal strength of wireless signals transmitted by the client device and detected by an access point with which the client device is not currently associated;
      • c. Determination that an association between the client device and a particular access point is to be terminated (for example, for load balancing purposes, improving signal quality, etc.)
      • d. A historical trend associated with the client device itself that is likely to roam to another access point;
      • e. A historical trend associated with client devices with similar characteristics as the client device that is likely to roam to another access point;
  • In an embodiment, while the client device is associated with the particular access point and in response to the determination that information associated with the client device is to be transmitted to access points to which the client device may roam to: the information associated with the client device is transmitted to the access points to which the client device may roam to (Operation 406). The information associated with the client device, that is received by an access point to which the client device may roam, is used by that access point and/or transmitted to the client device for use by the client device (Operation 408).
  • In one example, while a client device is associated with a first access point of a set of five access points, a determination is made that the client device is likely to roam to a second access point or a third access point, and not as likely to roam to a fourth access point or a fifth access point. The determination is made based on the second access point and third access point detecting probe requests, transmitted by the client device, at a Signal-To-Noise ratio above a particular threshold. The fourth access point and the fifth access point fail to receive the probe requests at a Signal-To-Noise ratio above the particular threshold. Based on the determination, while the client device is associated with the first access point, information for deriving an encryption key is transmitted to the second access point and the third access point. Subsequent to transmission of the information, the client device roams away from the first access point and initiates a process for associating with the second access point. During the process, the second access point transmit the information for deriving an encryption key, that was received from the first access point (or from a controller) to the client device. The client device uses the information to derive an encryption key and encrypt packets transmitted to the second access point. In other examples, the information associated with the client device may be used to establish firewall sessions, resume streaming of data, resume multicast subscriptions, etc.
  • In an embodiment, information that is sent to a particular access point that is no longer (but used to be) one of the access points to which the client device may roam is deleted from the particular access point. In an example, when a newly determined set of access points to which a client device may roam is compared to a previously determined set of access points to which the client device may roam. A particular access point that was in the previously determined set is not included in the newly determined set. In response to the particular access point not being included in the newly determined set, the particular access point is notified that the previously sent information associated with the client device may be deleted.
  • Any combination of the above features and functionalities may be used in accordance with one or more embodiments. In the foregoing specification, embodiments have been described with reference to numerous specific details that may vary from implementation to implementation. The specification and drawings are, accordingly, to be regarded in an illustrative rather than a restrictive sense. The sole and exclusive indicator of the scope of the invention, and what is intended by the applicants to be the scope of the invention, is the literal and equivalent scope of the set of claims that issue from this application, in the specific form in which such claims issue, including any subsequent correction.

Claims (21)

1-20. (canceled)
21. An apparatus comprising:
a processing resource; and
a memory resource storing machine readable instructions to cause the processing resource to:
determine a subset of a plurality of access points (APs) that a client device is likely to roam to from a first AP in response to a determination that an association between the client device and the first AP is to be terminated; and
transmit, while the client device is associated with the first AP, a client device identifier associated with the client device to APs among the subset of the plurality of APs.
22. The apparatus of claim 21, wherein the client device identifier is persistent to the client device.
23. The apparatus of claim 21, wherein the client device identifier comprises an identification number assigned to the client device as part of an automatic device registration application.
24. The apparatus of claim 21, wherein the client device identifier comprises information used to derive an encryption key to encrypt data transmitted by the client device to the first AP.
25. The apparatus of claim 21, wherein the client device identifier comprises information used to derive an encryption key to encrypt data transmitted by the client device to respective APs among the subset of the plurality of APs.
26. The apparatus of claim 21, wherein the instructions are further executable by the processing resource to determine the subset of the plurality of APs based, at least in part, on wireless signals received by the first AP from each AP of the subset of the plurality of APs.
27. The apparatus of claim 21, wherein the instructions are further executable by the processing resource to cause the first AP to store identification information for a network device that has at least a portion of state information associated with the client device stored thereon.
28. The apparatus of claim 21, wherein the instructions are further executable by the processing resource to transmit a client device identifier associated with the client device to respective APs among the subset of the plurality of APs without transmitting to other APs that are not included in the subset.
29. A non-transitory machine-readable medium having instructions stored thereon, the machine readable instructions to cause a computer a processor to:
determine a subset of a plurality of access points (APs) that a client device is likely to roam to from a first AP;
determine that an association between the client device and the first AP is to be terminated; and
transmit information associated with the client device to each AP of the subset of APs in response to the determination that the association between the client device and the first AP is to be terminated.
30. The non-transitory machine readable medium of claim 29, wherein the instructions are further executable by the processing resource to determine that the association between the client device and the first AP is to be terminated based, at least in part, or determination that a load balancing operation is to be triggered.
31. The non-transitory machine readable medium of claim 29, wherein the instructions are further executable by the processing resource to determine that the association between the client device and the first AP is to be terminated based, at least in part, on a determination that an AP among the subset of the plurality of APs provides an increase in signal strength of signals transmitted to the client device than the first AP.
32. The non-transitory machine readable medium of claim 29, wherein the instructions are further executable by the processing resource to detect a decrease in signal strength of signals transmitted between the client device and the first AP.
33. The non-transitory machine readable medium of claim 29, wherein the instructions are further executable by the processing resource to transmit information associated with the client device to each AP of the subset of APs while the client device is associated with the first AP.
34. The non-transitory machine readable medium of claim 29, wherein the instructions are further executable by the processing resource to determine that an association between the client device and the first AP is to be terminated based on a detection that it is a particular time of day.
35. The non-transitory machine readable medium of claim 29, wherein the instructions are further executable by the processing resource to determine the subset of the plurality of APs that the client device is likely to roam to from the first AP based, at least in part, on probe requests detected by respective APs among the subset of the plurality of APs.
36. A comprising:
determining a subset of access points (APs) among a plurality of APs that a client device is likely to roam to from a first AP;
determining that an association between the client device and the first AP is to be terminated;
transmitting a client device identifier associated with the client device to APs among the subset of APs without transmitting the client device identifier to other APs that are not included in the subset of APs in response to determining that the association between the client device and the first AP is to be terminated; and
associating the client device to a second AP, wherein the second AP is an AP among the subset of APs.
37. The method of claim 36, wherein associating the client device to the second AP further comprises:
generating a hash value associated with the client device;
identifying a particular node in a distributed has table that is associated with the has value associated with the client device;
generating an encryption key for encrypting communication between the client device and the second AP; and
receiving information associated with the client device.
38. The method of claim 37, wherein generating the encryption key and receiving information associated with the client device are performed concurrently.
39. The method of claim 37, wherein receiving information associated with the client device further comprises receiving multicast information associated with the client device.
40. The method of claim 36, further comprising transmitting the client device identifier associated with the client device to APs among the subset of APs while the client device is associated with the first AP.
US15/433,579 2013-03-14 2017-02-15 Method and system for dynamic determination of potential access points for propagating client information Abandoned US20170164246A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US15/433,579 US20170164246A1 (en) 2013-03-14 2017-02-15 Method and system for dynamic determination of potential access points for propagating client information

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US201361785001P 2013-03-14 2013-03-14
US14/204,777 US9578487B2 (en) 2013-03-14 2014-03-11 Method and system for dynamic determination of potential access points for propagating client information
US15/433,579 US20170164246A1 (en) 2013-03-14 2017-02-15 Method and system for dynamic determination of potential access points for propagating client information

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US14/204,777 Continuation US9578487B2 (en) 2013-03-14 2014-03-11 Method and system for dynamic determination of potential access points for propagating client information

Publications (1)

Publication Number Publication Date
US20170164246A1 true US20170164246A1 (en) 2017-06-08

Family

ID=51529367

Family Applications (2)

Application Number Title Priority Date Filing Date
US14/204,777 Active 2034-04-11 US9578487B2 (en) 2013-03-14 2014-03-11 Method and system for dynamic determination of potential access points for propagating client information
US15/433,579 Abandoned US20170164246A1 (en) 2013-03-14 2017-02-15 Method and system for dynamic determination of potential access points for propagating client information

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US14/204,777 Active 2034-04-11 US9578487B2 (en) 2013-03-14 2014-03-11 Method and system for dynamic determination of potential access points for propagating client information

Country Status (1)

Country Link
US (2) US9578487B2 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160295628A1 (en) * 2015-04-06 2016-10-06 Cable Television Laboratories, Inc. Self-organizing network (son) with fast initial link setup (fils)
US20170033940A1 (en) * 2015-07-31 2017-02-02 Ricoh Company, Ltd. Conference system
US10499328B2 (en) * 2015-04-06 2019-12-03 Cable Television Laboratories, Inc. Self-organizing network (SON) with fast initial link setup (FILS)
US11075928B2 (en) * 2015-04-29 2021-07-27 Coronet Cyber Security Ltd Wireless communications access security system and method
US20220303085A1 (en) * 2020-08-26 2022-09-22 Arris Enterprises Llc An optimized method for wi-fi band steering

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9697372B2 (en) * 2013-03-19 2017-07-04 Raytheon Company Methods and apparatuses for securing tethered data
US9712324B2 (en) 2013-03-19 2017-07-18 Forcepoint Federal Llc Methods and apparatuses for reducing or eliminating unauthorized access to tethered data
US10142766B2 (en) * 2015-04-03 2018-11-27 Kodacloud Inc. Method and system for selecting an access point for performing services corresponding to a client device
US10123265B2 (en) 2016-03-03 2018-11-06 Kodacloud Inc. Selecting an access point for providing network access to a wireless device based on historical network activity
US9974043B1 (en) 2017-05-31 2018-05-15 Aruba Networks, Inc. Assigning a subset of access points in a wireless network to a high priority
US11336365B2 (en) * 2018-05-17 2022-05-17 Thales Method for managing the telecommunication data traffic of a very high throughput satellite communication system
US11336535B2 (en) * 2019-03-19 2022-05-17 Cisco Technology, Inc. Station movement flow driven automatic RF site grouping

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6845238B1 (en) * 1999-09-15 2005-01-18 Telefonaktiebolaget Lm Ericsson (Publ) Inter-frequency measurement and handover for wireless communications
US20070153722A1 (en) * 2006-01-05 2007-07-05 Gillies Donald W Method and apparatus for seamless and efficient wireless handoffs
US20070218875A1 (en) * 2006-03-16 2007-09-20 Cisco Technlogy, Inc. Detecting address spoofing in wireless network environments
US20080268844A1 (en) * 2004-06-07 2008-10-30 Nortel Networks Limited Handoffs and Handoff Selection in a Wireless Access Network
US20080299966A1 (en) * 2006-02-15 2008-12-04 Fujitsu Limited Communication device, wireless communication device, and control method
US20110162060A1 (en) * 2009-12-30 2011-06-30 Motorola, Inc. Wireless local area network infrastructure devices having improved firewall features
US8190150B1 (en) * 2010-12-14 2012-05-29 Symbol Technologies, Inc. Synchronization of mobile device information in a wireless communication network
US20120294239A1 (en) * 2009-12-22 2012-11-22 Bengt Lindoff Method and Arrangement for Network Nodes of a Wireless Communication Network
US20130107736A1 (en) * 2011-11-02 2013-05-02 Buffalo Inc. Portable network communication device, method of selecting active network interface and computer readable storage medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TR201902679T4 (en) * 2013-01-30 2019-03-21 Ericsson Telefon Ab L M Security key generation for binary connectivity.

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6845238B1 (en) * 1999-09-15 2005-01-18 Telefonaktiebolaget Lm Ericsson (Publ) Inter-frequency measurement and handover for wireless communications
US20080268844A1 (en) * 2004-06-07 2008-10-30 Nortel Networks Limited Handoffs and Handoff Selection in a Wireless Access Network
US20070153722A1 (en) * 2006-01-05 2007-07-05 Gillies Donald W Method and apparatus for seamless and efficient wireless handoffs
US20080299966A1 (en) * 2006-02-15 2008-12-04 Fujitsu Limited Communication device, wireless communication device, and control method
US20070218875A1 (en) * 2006-03-16 2007-09-20 Cisco Technlogy, Inc. Detecting address spoofing in wireless network environments
US20120294239A1 (en) * 2009-12-22 2012-11-22 Bengt Lindoff Method and Arrangement for Network Nodes of a Wireless Communication Network
US20110162060A1 (en) * 2009-12-30 2011-06-30 Motorola, Inc. Wireless local area network infrastructure devices having improved firewall features
US8190150B1 (en) * 2010-12-14 2012-05-29 Symbol Technologies, Inc. Synchronization of mobile device information in a wireless communication network
US20130107736A1 (en) * 2011-11-02 2013-05-02 Buffalo Inc. Portable network communication device, method of selecting active network interface and computer readable storage medium

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160295628A1 (en) * 2015-04-06 2016-10-06 Cable Television Laboratories, Inc. Self-organizing network (son) with fast initial link setup (fils)
US9998921B2 (en) * 2015-04-06 2018-06-12 Cable Television Laboratories, Inc. Self-organizing network (SON) with fast initial link setup (FILS)
US10499328B2 (en) * 2015-04-06 2019-12-03 Cable Television Laboratories, Inc. Self-organizing network (SON) with fast initial link setup (FILS)
US11134439B2 (en) 2015-04-06 2021-09-28 Cable Television Laboratories, Inc. Self-organizing network (SON) with fast initial link setup (FILS)
US11075928B2 (en) * 2015-04-29 2021-07-27 Coronet Cyber Security Ltd Wireless communications access security system and method
US20210344699A1 (en) * 2015-04-29 2021-11-04 Coronet Cyber Security Ltd Wireless communications access security system and method
US11652838B2 (en) * 2015-04-29 2023-05-16 Coronet Cyber Security Ltd Wireless communications access security system and method
US20170033940A1 (en) * 2015-07-31 2017-02-02 Ricoh Company, Ltd. Conference system
US10097363B2 (en) * 2015-07-31 2018-10-09 Ricoh Company, Ltd. Conference system
US20220303085A1 (en) * 2020-08-26 2022-09-22 Arris Enterprises Llc An optimized method for wi-fi band steering

Also Published As

Publication number Publication date
US9578487B2 (en) 2017-02-21
US20140274037A1 (en) 2014-09-18

Similar Documents

Publication Publication Date Title
US9578487B2 (en) Method and system for dynamic determination of potential access points for propagating client information
US20190373453A1 (en) Infrastructure coordinated media access control address assignment
US20180367383A1 (en) Methods for dynamic router configuration in a mesh network
US9107149B2 (en) Wireless portable computer capable of autonomously adjusting load of wireless base station
US9787778B2 (en) Geographic proximity based service discovery
US10524225B1 (en) System and method for locating a mobile electronic device
US10285054B2 (en) Method and system for storing and accessing client device information in a distributed set of nodes
JP7422092B2 (en) Network address policy information received pre-associated
CN112438056B (en) Device-based access point association and physical address tracking
US10193742B2 (en) Selecting a corrective action for a network connection problem based on historical data
RU2679345C1 (en) Method and device for automatic network interaction of gateway device
US20230076033A1 (en) System and method for connection and hand-over management across networks and ssids
US11832355B2 (en) Real-time assessment of multimedia service in a particular environment
US20160050710A1 (en) Wireless access point allocation and transfer
US9356908B2 (en) Method and system for causing a client device to renew a dynamic IP address
US9479990B1 (en) Roaming management for client devices
TWI508609B (en) Network configuration method and wireless networking system
US20140105094A1 (en) Method and system for secure advertisements and wireless discovery of virtual controller based access point clusters
US20140040422A1 (en) Method and System for Storing and Accessing Client Device Information in a Distributed Set of Nodes
CN107969026A (en) The wireless method and wireless controller AC for throwing screen is realized in a wireless local area network
US20160150454A1 (en) Client managed soft handover and seamless link failover for wireless networks
US10516998B2 (en) Wireless network authentication control
US20210006412A1 (en) Communications system and devices for routing data
EP1897283B1 (en) Apparatus and method for performing fast handover
TWI495314B (en) Muti-wan device and method of updating routing table

Legal Events

Date Code Title Description
AS Assignment

Owner name: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P., TEXAS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ARUBA NETWORKS, INC.;REEL/FRAME:041380/0336

Effective date: 20150529

AS Assignment

Owner name: ARUBA NETWORKS, INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.;REEL/FRAME:041858/0960

Effective date: 20150807

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION