Abstract:
An access point is configured to control peer-to-peer wireless transmission in an area around the access point. The access point receives a message from a service providing device advertising a service. The access point receives another message from a service using device requesting the service. The access point determines whether the service using device or the service is prohibited in the area controlled by the access point. Responsive to a determination that the service using device is prohibited, the access point blocks the service using device from receiving the service. Responsive to a determination that the service is prohibited, the access point blocks the service providing device from providing the service.
Abstract:
Low Latency, Low Loss, Scalable Throughput (L4S) queuing and marking and, specifically, L4S parameters for congestion marking and a new congestion flag for predicted congestion events may be provided. Providing L4S marking can comprise determining, in layer 2, a packet is experiencing congestion. A L4S marking request is sent to layer 3 to request congestion marking of the packet. The packet is marked in layer 3 for congestion experienced A L4S marking response comprising the marked packet is then sent to layer 2.
Abstract:
Novel techniques and mechanisms enable processing of heavy deep learning workloads on standard edge network devices to optimize the overall inference throughput of the network while meeting Service Level Agreement(s) (SLAs). The techniques can include receiving a deep learning model, determining a graph structure of the deep learning model including neurons organized in layers (the layers including an input layer, a plurality of hidden layers, and an output layer), assigning to a first IP subnet, at least a part of a first hidden layer of the plurality of hidden layers, assigning to a second IP subnet, at least a part of a second hidden layer of the plurality of hidden layers, and deploying the parts of the first and second hidden layers to edge devices as containerized applications with assigned IP addresses, which may be hidden from the user and/or third party application.
Abstract:
A method and system for implementing security policies for a user device based on one or more user device parameters. When a user device joins a domain, the security policy agent determines one or more security policies for the user device based on one or more parameters of the user device. The user parameters may include the type of user device, a user group, an application to be used, etc. The security polies are sent to the user device. The user device generates a data packet having metadata indicating the one or more device parameters. The data packet is sent to a remote security service where security policies are implemented based on the metadata.
Abstract:
An epoch scheme for Station (STA) privacy and, specifically, a structured Media Access Control (MAC) address rotation schedule for STAs may be provided. Providing an epoch scheme for STA privacy can include determining epoch parameters for a STA, the epoch parameters comprising a minimum epoch period duration and a maximum epoch period duration. The epoch parameters are sent to the STA, wherein the STA is operable to rotate a MAC address each epoch period at a time between the minimum epoch period duration and the maximum epoch period duration. A mapping of the STA and the MAC address can be updated each epoch period.
Abstract:
Presented herein are infrastructure triggering techniques for secure Ultra-Wideband (UWB) ranging. In one example, a method may include providing UWB ranging parameters to a mobile device via a first radio communication, wherein the first radio communication is a non-UWB radio communication; and triggering the mobile device to perform UWB ranging with a UWB anchor, wherein the triggering is performed using a second radio communication. In another example, a method may include, obtaining, by a mobile device, UWB ranging parameters for a geographic area; obtaining a UWB ranging instruction for the geographic area; and performing UWB ranging with a target UWB anchor based on the UWB ranging parameters and the UWB ranging instruction.
Abstract:
Described herein are devices, systems, methods, and processes for determining the geo-positions of access points (APs) in a wireless network. The techniques involve utilizing geo-positioning data including global navigation satellite system (GNSS) measurements, wireless local area network (WLAN) signal measurements, air pressure measurements, preexisting knowledge, or any combination thereof. The GNSS measurements may include pseudo range measurements. The WLAN signal measurements can include time of arrival (ToA), channel state information (CSI), and/or received signal strength indicator (RSSI) measurements. The geo-position of each AP is calculated by applying Bayes' theorem to all available geo-positioning data and selecting the geo-position hypothesis with the highest probability. The geo-positions of the APs can be updated when a new measurement is obtained. The techniques can handle diverse AP deployments including heterogeneous APs with varying sensor capabilities.
Abstract:
Devices, systems, methods, and processes for calibrating clock signals of network devices are described herein. A device can initiate a ranging procedure with a reference device for synchronizing a clock signal of the device. The ranging procedure may utilize Fine Time Measurement (FTM), Ultra-Wide band (UWB), or similar protocols. The device can also synchronize the clock signal based on detection of ambient interference events. The device may also receive Global Navigation Satellite System (GNSS) data from a satellite and determine a pseudo range for the corresponding satellite based on the synchronized clock signal. The device may further transmit the GNSS data to a location engine. The location engine may aggregate the GNSS data received from a plurality of devices and determine a geolocation of the plurality of devices based on the aggregated GNSS data.
Abstract:
Devices, systems, methods, and processes for detecting anomalous movements within network devices are described herein. Certain movements within networks devices are predictable and negligible. However, other movements may indicate a larger problem with the network, or network devices, especially when the network devices (e.g., access points) are within a stationary deployment. For example, a sudden movement of a network device may indicate that it has fallen, been moved, or is under threat of a physical attack. Many network devices are being deployed with various environmental sensors. These sensors can be utilized to detect movement of the network device. This can be done by evaluating the received signal strength indicator levels as well as the output of the environmental sensor. If an anomalous movement is detected, preventative actions can be taken such as rebooting or limiting access. This can be done on the network device or by a centralized management system.
Abstract:
Described herein are devices, systems, methods, and processes for estimating the geolocation of network devices by jointly utilizing pseudorange measurements from global navigation satellite system (GNSS) satellites and terrestrial-based ranging measurements between network devices. Each network device is equipped with a GNSS receiver that collects pseudorange data from each satellite link at time intervals. Terrestrial-based ranging measurements between network devices can also be collected. The receiver clock error can be accounted for at least in part by over-the-air time synchronization of network devices. To mitigate the impact of multipath and improve accuracy, pseudorange measurements with less than satisfactory quality metrics can be filtered out. In some embodiments, the geolocation of anchor network devices can be estimated with high accuracy first, and then the rest of the non-anchor network devices may be localized in a second-stage localization process.