Patents Assigned to Trapeze Networks, Inc.
-
Patent number: 7863771Abstract: A technique for operating a device at multiple different power levels dependent upon the amount of power received involves sensing the amount of power received and turning on circuit components if power is adequate. A device constructed according to the technique should have the ability to detect at least two different, non-zero, power levels and turn on circuits to the extent that sufficient power is detected.Type: GrantFiled: April 6, 2009Date of Patent: January 4, 2011Assignee: Trapeze Networks, Inc.Inventors: Michael R. Keenly, Zubin Sarkary, Marko Radojicic, Sudheer Poorna Chandra Matta, Philip Riley
-
Patent number: 7865713Abstract: A technique for dynamically responding to threats in a wireless network involves deploying a single network including APs capable of booting from a plurality of software images. Individual APs can switch (or be switched) between multiple sets of software so that network managers can select the AP software most appropriate for a given instance. For example, if a threat is detected, multiple APs can be switched to sensor mode to deal with the threat. As another example, all of the APs can be switched to sensor mode after hours. Alternatively, a server can provide the software image(s) needed for an AP to operate in accordance with a desired functionality.Type: GrantFiled: December 28, 2007Date of Patent: January 4, 2011Assignee: Trapeze Networks, Inc.Inventors: Stan Chesnutt, Jamsheed Bugwadia, Yun Freund, Roy Gignac, Matthew Stuart Gast, Dan Simone, Gary Eugene Morain
-
Publication number: 20100315203Abstract: A technique for saving power in a tag that is operationally connected to an asset involves using telemetry data to enter an appropriate power state. An asset tracking system according to the technique can make use of context to better track assets to which power-saving tags are operationally connected. Secure tag configuration techniques and asset-agnostic tags are described. Location-agnostic tags are also described.Type: ApplicationFiled: July 28, 2009Publication date: December 16, 2010Applicant: Trapeze Networks, Inc.Inventors: Jeffrey J. Peden, II, Christopher J. Leonardo, Christopher Cacioppo
-
Publication number: 20100263852Abstract: Providing a plurality of fans within an enclosure. A system implementing this technique can include an enclosure, a heat sink in thermal communication with the enclosure, electronic components at least partially sealed within the enclosure, an eXclusive OR (XOR) fan array, a monitoring engine, and a control engine. A method implementing this technique can include using a heat sink to dissipate heat generated by electronic components within an enclosure; determining that each of the fans of a XOR fan array are stopped, selecting one and only one of the fans of the XOR fan array for operation, and operating the fan to increase air flow within the enclosure, thereby increasing the efficiency of the heat sink.Type: ApplicationFiled: April 21, 2009Publication date: October 21, 2010Applicant: Trapeze Networks, Inc.Inventors: Frank Mirshams, Gary Wong, Michael Nguyen, Nozar Azarakhsh
-
Publication number: 20100195549Abstract: A technique for controlling the amount of power consumed by access points (APs) of a wireless network involves implementing throttleable APs (TAPs). It would be desirable for the TAPs to be in a relatively low power mode during periods of low activity, and switch to a high power mode in response to increased wireless activity. To that end, a throttling engine can be implemented to throttle TAPs up in power in response to increases in wireless activity, and throttle TAPs down in power in response to decreases in wireless activity.Type: ApplicationFiled: February 4, 2009Publication date: August 5, 2010Applicant: Trapeze Networks, Inc.Inventors: David Bradburn Aragon, Matthew Stuart Gast
-
Publication number: 20100172276Abstract: A technique for controlling the amount of power consumed by access points (APs) of a wireless network involves implementing power-saving APs (PSAPs). It would be desirable for the PSAPs to be in sleep mode during periods of low activity, and at full power during periods of high activity. To that end, a PSAP agitation (PSAPA) engine can be implemented to agitate PSAPs in response to increases in wireless activity, and put PSAPs to sleep in response to decreases in wireless activity.Type: ApplicationFiled: January 8, 2009Publication date: July 8, 2010Applicant: Trapeze Networks, Inc.Inventor: David Bradburn Aragon
-
Publication number: 20100113098Abstract: A technique for improving radio coverage involves using interdependently tuned directional antennas. An example according to the technique is a substrate including two antennas, a transceiver, and a connector. Another example system according to the technique is a wireless access point (AP) including a processor, memory, a communication port, and a PCB comprising a plurality of directional antennas and a radio. An example method according to the technique involves determining a voltage standing wave ratio (VSWR) and interdependently tuning a first and second directional antenna to reach an expected radiation pattern.Type: ApplicationFiled: December 2, 2009Publication date: May 6, 2010Applicant: Trapeze Networks, Inc.Inventor: Philip Riley
-
Publication number: 20100103059Abstract: A technique for improving radio coverage involves using interdependently tuned directional antennas. An example according to the technique is a substrate including two antennas, a transceiver, and a connector. Another example system according to the technique is a wireless access point (AP) including a processor, memory, a communication port, and a PCB comprising a plurality of directional antennas and a radio. An example method according to the technique involves determining a voltage standing wave ratio (VSWR) and interdependently tuning a first and second directional antenna to reach an expected radiation pattern.Type: ApplicationFiled: October 21, 2009Publication date: April 29, 2010Applicant: Trapeze Networks, Inc.Inventor: Philip Riley
-
Publication number: 20100067379Abstract: A novel technique involves evaluating a real-time environment of a channel based on a nonlinear function of the number of neighbor radios and channel utilization requirements. The technique can be used to pick a channel for an AP that is added to a wireless network or to tune a channel for an existing AP. The technique can be applied to, for example, a relatively new wideband option in the 802.11n standard.Type: ApplicationFiled: September 15, 2008Publication date: March 18, 2010Applicant: Trapeze Networks, Inc.Inventors: Shiwei Zhao, Matthew S. Gast
-
Publication number: 20100040059Abstract: This specification describes a system that can offer, among other advantages, dynamically allowing or rejecting non-DHCP packets entering a switch. In addition, a FDB is commonly used by a bridge or switch to store an incoming packet's source MAC address and its port number, then later on if the destination MAC address of another incoming packet matching any entry in FDB will be forwarded to its associated port. Using the techniques described herein, not only this will be completely transparent to user, the techniques can also result in an increase in switch performance by blocking unwanted traffic at an earlier stage of forwarding process and freeing up other processing units at a later stage, like switch fabric or packet processing stages.Type: ApplicationFiled: February 12, 2009Publication date: February 18, 2010Applicant: Trapeze Networks, Inc.Inventor: Tyng Jar Albert Hu
-
Publication number: 20100024007Abstract: A technique for providing a prediction as to whether a resource will be accessible to a user is described. The technique can involve comparing asserted membership in a wireless realm with membership records. Advantageously, a user can be made aware of the likelihood of access to a resource before attempting to reach the resource.Type: ApplicationFiled: December 16, 2008Publication date: January 28, 2010Applicant: Trapeze Networks, Inc.Inventor: Matthew S. Gast
-
Publication number: 20090323531Abstract: A technique for wireless load balancing involves providing a wireless infrastructure that creates a target band option and helps push clients toward that band. An example of a method according to the technique involves, by way of example but not limitation, responding only to probe requests on a first band when a client is detected on the first band and a second band. For example, using the techniques described herein, a platform that is both 802.11a and 802.11b/g compliant may attempt to connect preferentially to the 802.11b/g band of a wireless network, and be migrated toward the 802.11a band instead.Type: ApplicationFiled: June 24, 2009Publication date: December 31, 2009Applicant: Trapeze Networks, Inc.Inventor: Sudheer Poorna Chandra Matta
-
Publication number: 20090300740Abstract: In wireless networking, such as per the IEEE 802.11 standard, a technique automatically republishes an authentication credential to a global credential repository. A station can have a first credential, as is created when the station connects to a first access node of a wireless network. Upon trying and failing to connect to a second access node of the wireless network, the station can have a second credential created and published to the global credential repository. In some situations, the station then roams back to the first access node using the first credential. Efficiently, when the station uses the first credential at the first access node, the first credential can be automatically republished as a global credential. The automatic republishing of the first credential can ensure that the station is able to access the wireless network via various access nodes when roaming.Type: ApplicationFiled: May 30, 2008Publication date: December 3, 2009Applicant: Trapeze Networks, Inc.Inventors: Vineet Verma, Sudheer P. Matta
-
Publication number: 20090293106Abstract: An access point through which a wireless device attaches to a wireless network determines the access privileges that will be accorded to the device based on a criteria set, such as the ID and physical location of the device requesting network access, the access point through which the device is connected to the network and user credentials. The location of the device is determined by a location determination system using the signal strength of the device signal. The location information and ID information is provided to an access server that uses the criteria set to retrieve access privileges from a privilege database. The retrieved access privileges are then applied to the wireless device by means of the access point and other devices in the wireless network.Type: ApplicationFiled: May 28, 2009Publication date: November 26, 2009Applicant: Trapeze Networks, Inc.Inventors: Matthew K. Gray, Jeffrey J. Peden, II, Coleman P. Parker
-
Publication number: 20090287816Abstract: A technique for testing a network path involves making use of feedback enabling parameters. Values for the feedback enabling parameters can be generated from a measurement of path performance. The technique can be implemented for wireless paths. The technique can also be implemented for multi-hop paths.Type: ApplicationFiled: July 11, 2008Publication date: November 19, 2009Applicant: Trapeze Networks, Inc.Inventors: Sudheer P.C. Matta, Matthew S. Gast
-
Publication number: 20090274060Abstract: A technique for combining operations of a wireless access point with a remote probe. An access point links a wireless client to a wireless switch. A remote probe captures wireless packets, appends radio information, and forwards packets to a remote observer for analysis. In an embodiment, the observer may provide a protocol-level debug. A system according to the technique can, for example, accomplish concurrent in-depth packet analysis of one or more interfaces on a wireless switch. The system can also, for example, augment embedded security functions by forwarding selected packets to a remote Intrusion Detection System (IDS). In an embodiment, filters on the probes may reduce overhead.Type: ApplicationFiled: July 9, 2009Publication date: November 5, 2009Applicant: Trapeze Networks, Inc.Inventor: Ron Taylor
-
Publication number: 20090257437Abstract: A technique for identity based networking is disclosed. A system according to the technique can include a WAN, a first VLAN, a second VLAN, and a network database. The first VLAN and second VLAN can be coupled to the WAN. The network database can include VLAN information. In operation, a client that is authorized on the second VLAN can attempt to connect to the first VLAN. A switch in the WAN can perform a lookup in the network database and determine that the client is authorized on the second VLAN. Based on this information, the client can be connected to the second VLAN using VLAN tunneling.Type: ApplicationFiled: June 22, 2009Publication date: October 15, 2009Applicant: Trapeze Networks, Inc.Inventor: Manish Tiwari
-
Patent number: 7577453Abstract: A technique for wireless load balancing involves providing a wireless infrastructure that creates a target band option and helps push clients toward that band. An example of a method according to the technique involves, by way of example but not limitation, responding only to probe requests on a first band when a client is detected on the first band and a second band. For example, using the techniques described herein, a platform that is both 802.11a and 802.11b/g compliant may attempt to connect preferentially to the 802.11b/g band of a wireless network, and be migrated toward the 802.11a band instead.Type: GrantFiled: June 1, 2006Date of Patent: August 18, 2009Assignee: Trapeze Networks, Inc.Inventor: Sudheer Poorna Chandra Matta
-
Patent number: 7573859Abstract: A technique for combining operations of a wireless access point with a remote probe. An access point links a wireless client to a wireless switch. A remote probe captures wireless packets, appends radio information, and forwards packets to a remote observer for analysis. In an embodiment, the observer may provide a protocol-level debug. A system according to the technique can, for example, accomplish concurrent in-depth packet analysis of one or more interfaces on a wireless switch. The system can also, for example, augment embedded security functions by forwarding selected packets to a remote Intrusion Detection System (IDS). In an embodiment, filters on the probes may reduce overhead.Type: GrantFiled: January 5, 2006Date of Patent: August 11, 2009Assignee: Trapeze Networks, Inc.Inventor: Ron Taylor
-
Publication number: 20090198999Abstract: A technique for improving authentication speed when a client roams from a first authentication domain to a second authentication domain involves coupling authenticators associated with the first and second authentication domains to an authentication server. A system according to the technique may include, for example, a first authenticator using an encryption key to ensure secure network communication, a second authenticator using the same encryption key to ensure secure network communication, and a server coupled to the first authenticator and the second authenticator wherein the server distributes, to the first authenticator and the second authenticator, information to extract the encryption key from messages that a client sends to the first authenticator and the second authenticator.Type: ApplicationFiled: March 10, 2009Publication date: August 6, 2009Applicant: Trapeze Networks, Inc.Inventor: Dan Harkins