Ruckus Wireless, Inc.
|Ruckus Wireless, Inc. Patent applications|
|Patent application number||Title||Published|
|20140210681||PATTERN SHAPING OF RF EMISSION PATTERNS - A metallic shaping plate located in the interior housing of a wireless device is disclosed. The metallic shaping plate may influence a radiation pattern being generated by a horizontal antenna array. The result may be an increase in the gain of the array.||07-31-2014|
|20140177511||UNICAST TO MULTICAST CONVERSION - A method for unicast packet conversion whereby a unicast packet is received at a receiving node followed by a determination as to whether the destination address is identified in the packet. If the address is identified, then the unicast packets are converted to a multicast packet and forwarded to a connected station. If a destination network address is not identified, then the packet is forwarded to the connected station.||06-26-2014|
|20140169497||CLOSED-LOOP AUTOMATIC CHANNEL SELECTION - A system and method for improving radio performance through automatic channel selection utilizing a closed-channel model is disclosed. A measurement engine records maximum user throughput on a per station basis during normal traffic operation. The measurement engine further records throughput metrics based on test traffic sent to all associated stations during idle operation. A policy logic engine utilizes the measurements to determine an optimal transmission channel for transmission and receipt of data.||06-19-2014|
|20140133385||DISTRIBUTED ACCESS POINT FOR IP BASED COMMUNICATIONS - An apparatus for Internet-Protocol based communications in a wireless network includes a network interface, a controller, and memory. The interface receives a series of multicast data packets. The controller identifies one or more receiving nodes in the wireless network requesting data corresponding to the series of multicast data packets and determines that the effective unicast rate for one or more unicast data packets exceeds a minimum data rate of the series of multicast data packets using an 802.x protocol. The memory stores instructions that may be executable by a processor. Upon execution of the instructions by a processor, the received series of multicast data packets is converted into one or more unicast packets, the execution and conversion occurring in response to instructions received from the controller. A system for Internet-Protocol based communications in a wireless network implements such an apparatus in the context of an access point.||05-15-2014|
|20140071879||MAC BASED MAPPING IN IP BASED COMMUNICATIONS - An access point of a communications network receives a multicast or broadcast packet from a source. The access point converts the multicast or broadcast packet into a unicast packet addressed to a station associated with the access point. The access point then transmits the unicast packet over the communications network from the access point to the station. The access point further may determine a minimum data rate by which the access point may transmit the multicast or broadcast packet to the station and determines an effective unicast rate for transmitting the unicast packet to the station. If the effective unicast rate does not exceed the minimum data rate, the access point does not transmit the unicast packet to the station and transmits the multicast or broadcast packet.||03-13-2014|
|20140068724||DYNAMIC AUTHENTICATION IN SECURED WIRELESS NETWORKS - Systems and methods for authentication using paired dynamic secrets in secured wireless networks are provided. Each authenticated user is assigned a random secret generated so as to be unique to the user. The secret is associated with a wireless interface belonging to the user, so that no other wireless interface may use the same secret to access the network. The secret may be updated either periodically or at the request of a network administrator, and reauthentication of the wireless network may be required.||03-06-2014|
|20140066112||ON-DEMAND SERVICES BY WIRELESS BASE STATION VIRTUALIZATION - Initiating a virtual presence at a physical access point in response to a request for a service from a wireless access device is provided. A particular wireless service may be provided to a subscriber on an on-demand basis according to location and/or type of service requested. The service may be terminated when demand for the service comes to an end whereby a common wireless service infrastructure may be shared amongst service providers thus eliminating the need for radio channel coordination and otherwise enhancing service quality for those service providers.||03-06-2014|
|20140029519||Wireless Architecture in Support of Voice and Data Communications - A wireless access network including a wireless base station configured to, for Iu-CS voice traffic, act as a network controller, by, terminating Iu-b signals from user equipment, and relaying the voice traffic over Iu-CS via an IP sec tunnel. And for data traffic, wireless base station is configured to act as the network controller, by, terminating Iu-b signals from the user equipment, striping IP payload, and sending the data traffic inside IPsec. Further, the wireless access network includes a wireless gateway configured to act as a security gateway for Iu-CS voice traffic, by, establishing the IP sec tunnel with the femtocell base station without the support of a GPRS Tunneling Protocol (GTP) as defined over Iu-PS. Also receiving and forwarding the tunneled Iu-CS voice traffic to a mobile switching center, and for data traffic, encapsulate the IP payload and send it via Gn to GGSN.||01-30-2014|
|20140016563||WIRELESS NETWORK THROUGHPUT ENHANCEMENT THROUGH CHANNEL AWARE SCHEDULING - A channel aware scheduler (CAS) is disclosed that takes advantage of changing wireless channel conditions in order to maximize aggregated system throughput. The CAS is aware of the different channel conditions for one or more stations and adjusts its scheduling of packet transmissions in light of the same. A related CAS algorithm may take advantage of that knowledge in order to increase aggregated system throughput while concurrently addressing other potential fairness constraints.||01-16-2014|
|20120094705||TRANSMISSION AND RECEPTION PARAMETER CONTROL - A system and method for implementing transmission parameter control at a transmitting station is described. The exemplary system and method comprises querying a transmission parameter control module for a transmission schedule. The transmission schedule comprises at least one schedule entry defining a set of transmission parameter controls as they pertain to a destination address. At least one packet of data is then transmitted to the destination address according to the transmission parameters controls of at least one schedule entry from the transmission schedule. A system and method for selecting an antenna configuration corresponding to a next transmission of packet data is also disclosed.||04-19-2012|
|20090092255||Dynamic Authentication in Secured Wireless Networks - Systems and methods for authentication using paired dynamic secrets in secured wireless networks are provided. Each authenticated user is assigned a random secret generated so as to be unique to the user. The secret is associated with a wireless interface belonging to the user, so that no other wireless interface may use the same secret to access the network. The secret may be updated either periodically or at the request of a network administrator, and reauthentication of the wireless network may be required.||04-09-2009|
Patent applications by Ruckus Wireless, Inc.