Abstract:
Systems, methods, and computer program products to perform an operation comprising receiving, from a video monitoring system, a count of people detected at a first location, wherein the video monitoring system comprises a camera configured to capture video of the first location, receiving a count of wireless devices detected in a second location, and applying a first correction factor to the count of wireless devices detected at the second location to determine a number of people present in the second location, wherein the first correction factor is based on the count of people detected by the video monitoring system and a count of wireless devices in the first location.
Abstract:
In response to receiving a probe request from a mobile client, an access point determines whether it should suppress a probe response. The access point receives a probe request from a wireless client device, and prepares a probe response to respond to the probe request. The access point determines whether the wireless client device is likely to associate with the wireless access point. Responsive to a determination that the wireless client device is unlikely to associate with the wireless access point, the access point suppresses the transmission of the probe response.
Abstract:
Techniques are presented herein to coordinate ranging exchanges between base stations in order to enable any number of wireless devices in the vicinity of the base stations to obtain signals associated with ranging exchanges between base stations, time-of-departure report messages transmitted by the base stations to each other and time-of-arrival report messages transmitted by the base stations to each other, for use in computing the location of the wireless devices. Based on the multi-channel time-of-arrivals computed for the wireless device with respect to each base station, the multi-channel time-of-arrivals contained in the time-of-arrival report messages transmitted between base stations and the known locations of the base stations, a physical location is computed for the wireless device.
Abstract:
A first device having a plurality of antennas wirelessly transmits multiple series of test packets to a second device having one or more antennas, each series of test packets being transmitted with a different level of interference imposed on the test packets. The first device determines a packet error rate for each series of test packets transmitted by the first device. The first device derives an estimate of an interference cancellation capability of the second device based on the packet error rate for different levels of interference.
Abstract:
A wireless receiver (e.g., access point (AP)) is a member of a group of a plurality of receivers in a wireless local area network and time synchronized with other receivers in the group. A channel scan list is generated from a plurality of wireless channels available in one or more frequency bands. A channel is selected for the receiver to monitor from the channel scan list based on a current time at the receiver such that each of the plurality of receivers in the group are scanning the same channel at the same time. The selected channel is scanned and signal characteristic information (e.g., received signal strength (RSS)) is generated for the signals received during a given scan duration.
Abstract:
Techniques are presented herein to coordinate ranging exchanges between base stations in order to enable any number of wireless devices in the vicinity of the base stations to obtain signals associated with ranging exchanges between base stations, time-of-departure report messages transmitted by the base stations to each other and time-of-arrival report messages transmitted by the base stations to each other, for use in computing the location of the wireless devices. Based on the multi-channel time-of-arrivals computed for the wireless device with respect to each base station, the multi-channel time-of-arrivals contained in the time-of-arrival report messages transmitted between base stations and the known locations of the base stations, a physical location is computed for the wireless device.
Abstract:
Dynamic bandwidth selection techniques are provided for a plurality of wireless access point devices that operate in a wireless local area network. Each access point device is capable of serving wireless client devices with a bandwidth from a set of possible bandwidths associated with one or multiple contiguous or non-contiguous radio frequency channels. A bias is generated based on determined type of traffic or client composition for each access point device, the bias favoring a channel assignment that results in a particular bandwidth in the set of bandwidths. The bias is applied to metrics representing severity and degree of interference for each channel to generate adjusted metrics. A bandwidth from the set of possible bandwidths is selected for each access point device based on the adjusted metrics.
Abstract:
Improving network throughput and, specifically, improving network throughput for networks comprising sub-7.25 GHz and millimeter wave links may be provided. Improving network throughput may include determining device information of a Station (STA). The STA may be enabled to communicate on a 60 (GHz) band in addition to sub 7.25 GHz bands based on the device information.
Abstract:
A device includes a memory and a hardware processor communicatively coupled to the memory. The hardware processor determines that a computing device communicatively coupled to an access point performed an action with respect to the access point and in response to determining that the action causes a deviation from a multi-user uplink policy of the access point, transmits a disciplinary message to the computing device.
Abstract:
Fine Time Measurement (FTM) Location Configuration Information (LCI) protection and, specifically, FTM LCI protection with authentication and selective client enablement may be provided. To perform FTM LCI protection, a controller may first obtain a key-pair including a public key and a private key from a Certificate Authority (CA). The controller my determine a venue location where an Access Point (AP) is located. The controller may send a Certificate Signing Request (CSR) with the venue location to the CA. In response to sending the CSR, the controller may receive a public key certificate from the CA, wherein the public key certificate includes the venue location. The AP may receive a request for Location Configuration Information (LCI) from a Station (STA), wherein the LCI includes an AP location. The AP creates a hash of LCI of the AP using the private key and sends the LCI and the hash to the STA.