Abstract:
Presented herein are techniques for using uplink transmissions from devices (e.g., wireless tags, clients, etc.) to determine a path loss between neighboring access points. In one example, a wireless controller obtains receive signal strength information of uplink transmissions received at neighboring access points in a wireless network. The wireless controller determines an effective path loss between the neighboring access points based on the receive signal strength information for the uplink transmissions received at the neighboring access points. The wireless controller also performs radio resource management operations in the wireless network using the effective path loss determined based on the uplink transmissions received at the neighboring access points.
Abstract:
A first wireless device (e.g., an access point) receives a message from a second wireless device (e.g., a client device). The first device determines an angle-of-arrival of the message at a plurality of antennas of the first wireless device. The first device compares the angle-of-arrival with an angle-of-arrival threshold to determine whether to transmit a response message to the second wireless device. In one example, the first wireless device is a wireless access point device operating in a wireless network, the second wireless device is a wireless client device operating in the wireless network, the message is a probe request message and the response message is a probe response message.
Abstract:
A wireless access point uses broadcast Service Set Identifiers (SSIDs) to advertise services available to a user device within range of the access point. The access point receives information about a first service available from a first service provider, and generates a first SSID associated with the first service. The access point receives information about a second service available from a second service provider, and generates a second SSID associated with the second service. The access point broadcasts the first SSID during a first period of time in a wireless network, and broadcasts the second SSID in the wireless network during a second period of time that is non-overlapping with the first period of time.
Abstract:
A first wireless device (e.g., an access point) receives a message from a second wireless device (e.g., a client device). The first device determines an angle-of-arrival of the message at a plurality of antennas of the first wireless device. The first device compares the angle-of-arrival with an angle-of-arrival threshold to determine whether to transmit a response message to the second wireless device. In one example, the first wireless device is a wireless access point device operating in a wireless network, the second wireless device is a wireless client device operating in the wireless network, the message is a probe request message and the response message is a probe response message.
Abstract:
Techniques are presented to enable a network element in a network to receive a request from an application on a device, the request being encapsulated in a packet that includes a header that contains a physical layer identifier of the device to which the application does not have access. The physical layer identifier at the network element may be obtained. A response may be sent to the application on the device, the response containing at least one of the physical layer identifier of the device and location information of the device.
Abstract:
Techniques are presented to enable a network element in a network to receive a request from an application on a device, the request being encapsulated in a packet that includes a header that contains a physical layer identifier of the device to which the application does not have access. The physical layer identifier at the network element may be obtained. A response may be sent to the application on the device, the response containing at least one of the physical layer identifier of the device and location information of the device.
Abstract:
Presented herein are techniques for using uplink transmissions from devices (e.g., wireless tags, clients, etc.) to determine a path loss between neighboring access points. In one example, a wireless controller obtains receive signal strength information of uplink transmissions received at neighboring access points in a wireless network. The wireless controller determines an effective path loss between the neighboring access points based on the receive signal strength information for the uplink transmissions received at the neighboring access points. The wireless controller also performs radio resource management operations in the wireless network using the effective path loss determined based on the uplink transmissions received at the neighboring access points.
Abstract:
Techniques are presented to enable a network element in a network to receive a request from an application on a device, the request being encapsulated in a packet that includes a header that contains a physical layer identifier of the device to which the application does not have access. The physical layer identifier at the network element may be obtained. A response may be sent to the application on the device, the response containing at least one of the physical layer identifier of the device and location information of the device.
Abstract:
Techniques are presented to enable a network element in a network to receive a request from an application on a device, the request being encapsulated in a packet that includes a header that contains a physical layer identifier of the device to which the application does not have access. The physical layer identifier at the network element may be obtained. A response may be sent to the application on the device, the response containing at least one of the physical layer identifier of the device and location information of the device.