Patent application number | Description | Published |
20090235077 | NETWORK INFRASTRUCTURE VALIDATION OF NETWORK MANAGEMENT FRAMES - A detection-based defense to a wireless network. Elements of the infrastructure, e.g., access points or scanning-only access points, detect intruders by detecting spoofed frames, such as from rogue access points. Access points include a signature, such as a message integrity check, with their management frames in a manner that enables neighboring access points to be able to validate the management frames, and to detect spoofed frames. When a neighboring access point receives a management frame, obtains a key for the access point sending the frame, and validates the management frame using the key. | 09-17-2009 |
20100205471 | NETWORK BASED SYSTEM TO CONTROL AND MONITOR POWER CONSUMPTION OF NETWORKED ELEMENTS - In an example embodiment, a technique for network based power management for power consuming devices associated with a network. A power control strategy is communicated to network elements coupled to the network. The power control strategy is enforced by the network elements and the network elements report power consumption. Each network element enforces the power strategy relative to the set of power consuming devices operatively associated with the network element. Groups of subtended network elements can manage the power policy in a cluster power management mode or in a collaborative cluster management mode. | 08-12-2010 |
20120155395 | Client modeling in a forwarding plane - In one embodiment, a method includes receiving a packet at a network device in communication with a plurality of client nodes, the packet identifying a first client node, performing a look up in a table stored at the network device to locate policies associated with the first client node, the table including an entry for each of the client nodes, each entry having a plurality of policies associated with the client node, applying the policies associated with the first client node at a forwarding engine at the network device, and forwarding the packet from the network device. An apparatus is also disclosed. | 06-21-2012 |
20120210395 | NETWORK INFRASTRUCTURE VALIDATION OF NETWORK MANAGEMENT FRAMES - A detection-based defense to a wireless network. Elements of the infrastructure, e.g., access points or scanning-only access points, detect intruders by detecting spoofed frames, such as from rogue access points. Access points include a signature, such as a message integrity check, with their management frames in a manner that enables neighboring access points to be able to validate the management frames, and to detect spoofed frames. When a neighboring access point receives a management frame, obtains a key for the access point sending the frame, and validates the management frame using the key. | 08-16-2012 |
20130333012 | NETWORK INFRASTRUCTURE VALIDATION OF NETWORK MANAGEMENT FRAMES - A detection-based defense to a wireless network. Elements of the infrastructure, e.g., access points or scanning-only access points, detect intruders by detecting spoofed frames, such as from rogue access points. Access points include a signature, such as a message integrity check, with their management frames in a manner that enables neighboring access points to be able to validate the management frames, and to detect spoofed frames. When a neighboring access point receives a management frame, obtains a key for the access point sending the frame, and validates the management frame using the key. | 12-12-2013 |
20150312091 | SELECTION OF ANCHOR CONTROLLERS FOR CLIENT DEVICES WITHIN A NETWORK ENVIRONMENT - According to one embodiment of the invention, a non-transitory computer readable medium for improving the scalability and redundancy of a wireless communications network. One embodiment of the non-transitory computer readable medium comprises instructions that configure a first controller, of a plurality of controllers, as a primary controller for maintaining data associated with each particular device of a plurality of devices, for each particular device of the plurality of devices, select a respective secondary controller, from the plurality of controllers, for maintaining data associated with that particular device based on a respective identifier associated with that particular device, subsequent to selecting the secondary controller for each particular device of the plurality of devices, detect an error associated with the first controller, and responsive to detecting the error associated with the first controller, establish the secondary controller selected for each particular device, based on the respective identifier, as the primary controller for that particular device. | 10-29-2015 |
20150312140 | Method and System for Handling Failure in a Coordinated Multicast Streaming System - According to one embodiment of the invention, a non-transitory computer readable medium for handling the failure of a controller within a communications network is provided. One embodiment of the non-transitory computer readable medium comprises instructions that cause a secondary network device to identify one or more multicast streams received by a primary network device and detect that the primary network device has failed; and responsive to detecting that the primary network device has failed, cause the secondary network device to subscribe to the multicast streams. | 10-29-2015 |
20150312819 | USER ANCHOR CONTROLLER COMMUNICATION WITHIN A NETWORK ENVIRONMENT - According to one embodiment of the invention, a non-transitory computer readable medium for improving the scalability and redundancy of a wireless communications network. One embodiment of the non-transitory computer readable medium comprises instructions that configure, by a first controller, a first access point, responsive to a client device associating with the first access point, identify a second controller configured for maintaining information corresponding to the client device, wherein the second controller is different than the first controller that configures the first access point, obtain, by the first access point from the second controller, information corresponding to the client device, and communicate, by the first access point with the client device, based on the information corresponding to the client device. | 10-29-2015 |
20150312820 | SELECTION OF ANCHOR CONTROLLERS FOR ACCESS POINTS WITHIN A NETWORK ENVIRONMENT - According to one embodiment of the invention, a non-transitory computer readable medium for improving the scalability and redundancy of a wireless communications network. One embodiment of the non-transitory computer readable medium comprises instructions that select a first controller for controlling a configuration of a first access point and a second access point, detect a particular event and, responsive to detecting the particular event, select a second controller for controlling the configuration of the first access point without modifying the selection of the first controller for controlling the configuration of the second access point. | 10-29-2015 |