Abstract:
A system and methods by which a reconfigurable intelligent surface device is dynamically configured to control the reflection of transmissions made between an access point and one or more client devices so as to protect the transmissions from being properly received by an unauthorized device. These methods may be used to maintain data confidentiality, particular for remote workers. The positions of the access point and client devices are used to configure the reconfigurable intelligent surface device to reflect the transmissions inward and avoid/minimize leakage outside a physical space.
Abstract:
This technology allows for determining the location of client devices via radio scanning for triggered orthogonal frequency-division multiple access (“OFDMA”) uplinks. Access points (“APs”) are configured for OFDMA transmissions. A first AP transmits a trigger frame on particular channel to stations in the wireless network. Neighboring APs scan channels for trigger frames (“TF”). Upon detection of a TF, neighboring APs associate a station identifier with a frequency allocation, or resource unit, in the TF. The neighboring APs receive an OFDMA uplink from the stations, determine a received signal strength indicator (“RSSI”) value for each frequency allocation in the OFDMA uplink, and transmit the RSSI values with the associated station identifier to the first AP. The first AP determines the location of each station by mapping a distance value to the RSSI values.
Abstract:
Optimal determination of wireless antenna configurations may be provided. A computing device may direct an antenna array of an Access Point (AP) to generate a wide beamwidth, to locate a cluster of two or more stations. Upon locating the cluster, the AP can narrow the beamwidth, and, with the narrower beamwidth, receive a key performance indicator (KPI) from at least one of the two or more stations in the cluster. The computing device may then generate a statistical model, based on the KPI and an antenna vector of the antenna array. Based on the statistical model, the computing device can determine a second antenna vector to optimize the KPI for one or more of the client stations. The computing device can then modify the antenna state of the AP to generate the determined antenna vector.
Abstract:
Noise floor degradation detection may be provided. First, an incremental packet loss rate for a secondary radio may be calculated that indicates an impact on packet reception on the secondary radio due to transmissions by a primary radio. The secondary radio and the primary radio may comprise an access point. Next, it may be determined that the incremental packet loss rate is greater than a predetermined value. A configuration of the access point may be changed in response to determining that the incremental packet loss rate is greater than the predetermined value.
Abstract:
Apparatus and techniques are presented for estimating a noise floor experienced by a client device seeking to associate with an access point in a wireless network. A path loss between the client device and the access point may be estimated. A metric may then be generated, where the metric estimates a strength of a signal transmitted from the access point as received at the client device. The transmit power at the access point may then be adjusted, based on the metric.
Abstract:
A first wireless device (e.g., an access point) receives a message from a second wireless device (e.g., a client device). The first device determines an angle-of-arrival of the message at a plurality of antennas of the first wireless device. The first device compares the angle-of-arrival with an angle-of-arrival threshold to determine whether to transmit a response message to the second wireless device. In one example, the first wireless device is a wireless access point device operating in a wireless network, the second wireless device is a wireless client device operating in the wireless network, the message is a probe request message and the response message is a probe response message.
Abstract:
This technology allows for determining the location of client devices via radio scanning for triggered orthogonal frequency-division multiple access (“OFDMA”) uplinks. Access points (“APs”) are configured for OFDMA transmissions. A first AP transmits a trigger frame on particular channel to stations in the wireless network. Neighboring APs scan channels for trigger frames (“TF”). Upon detection of a TF, neighboring APs associate a station identifier with a frequency allocation, or resource unit, in the TF. The neighboring APs receive an OFDMA uplink from the stations, determine a received signal strength indicator (“RSSI”) value for each frequency allocation in the OFDMA uplink, and transmit the RSSI values with the associated station identifier to the first AP. The first AP determines the location of each station by mapping a distance value to the RSSI values.
Abstract:
The present disclosure is directed to simultaneous channel sounding on multiple MLO channels followed by determining phase and amplitude corrections based on channel impulse responses obtained on each MLO channel. The corrections are then used in subsequent extrapolation of channel sounding on one channel to another. In one aspect, a method includes transmitting, on each radio interface of a first multi-link device, a corresponding sounding probe to a second multi-link device; determining, by each radio interface of the first multi-link device, a corresponding channel impulse response based on the corresponding sound probe to yield a plurality of channel impulse responses; determining an offset between the plurality of channel impulse responses; and using the offset during a subsequent extrapolation of a sounding probe on one radio interface to a second radio interface of the first multi-link device.
Abstract:
A method, computer system, and computer program product are provided for prioritizing network traffic. An indication is received at a network controller that an alarm is activated at a physical site. A request is received from a user device to join a network at the physical site that is under control of the network controller, wherein the request includes a flag indicating an identity of a user of the user device and a priority status of the user. In response to authenticating the identity of the user via an identity provider server, the user device is authorized to join the network. Based on verifying the priority status of the user using the flag and authentication via the identity provider server, network traffic for the user device is prioritized.
Abstract:
Presented herein are techniques to shield transmissions from being received and the information contained in them recovered by unwanted devices. Multi-user multiple-input multiple-output (MU-MIMO) techniques are employed, and in particular the spatial dimension aspects of those techniques. Shield nodes are controlled to transmit in a way to obscure the downlink streams transmitted by a wireless access point that are intended for a particular client device to anything outside of the shielded area, and also to obscure uplink streams from one or more client devices to the wireless access point to anything outside of the shielded area but allowing the uplink streams to be well received by the wireless access point.