Patents by Inventor Philip Jakes
Philip Jakes has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20070230392Abstract: A method, apparatus and computer-usable medium for minimizing in-band noise in a WLAN network is presented. The method includes the steps of detecting, at a first wireless client device that communicates with a Wireless Local Area Network (WLAN) via a first access point, a signal interference that is caused by a second wireless client device that communicates with the WLAN via a second access point; and minimizing the signal interference by sending an instruction to the second wireless access device to reduce a transmission power level of the second wireless device.Type: ApplicationFiled: March 31, 2006Publication date: October 4, 2007Inventors: Stewart Adams, Daryl Cromer, Philip Jakes, Howard Locker, Raymond Octaviano
-
Publication number: 20060270554Abstract: A device that requires a regulatory label includes a label affixed to a surface of the device and a marking mechanism in the device that detects a configuration setting associated with the device and alters a portion of the label based on the configuration setting such that the label indicates information related to the configuration setting of the device.Type: ApplicationFiled: May 24, 2005Publication date: November 30, 2006Inventors: Daryl Carvis, Philip Jakes, Raymond Octaviano, Howard Locker
-
Publication number: 20060233134Abstract: A system and method for allowing an access point in a wireless network to operate at maximum speed includes determining if there is at least one client within the network that is operating at less than the maximum speed. If there is, then instruct the at least one client to decrease transmission range until the at least one client is no longer in range of the access point. Then, instruct a client at the maximum speed to interface with the at least one client to provide a peer-to-peer connection wherein the maximum speed client acts as an access point for the at least one client.Type: ApplicationFiled: April 14, 2005Publication date: October 19, 2006Applicant: International Business Machines CorporationInventors: Daryl Cromer, Philip Jakes, Howard Locker, Raymond Octaviano
-
Publication number: 20060208093Abstract: A method of configuring a communication card in a computer system comprises retrieving information relating to a country in which the computer system will be used from the computer system into the communication card. Based on the retrieved information, the communication card selects a configuration setting from a plurality of configuration settings stored in the communication card, and loads the selected configuration setting into memory in the communication card.Type: ApplicationFiled: March 15, 2005Publication date: September 21, 2006Applicant: International Business Machines CorporationInventors: Daryl Cromer, Philip Jakes, Raymond Octaviano
-
Publication number: 20060203784Abstract: A method and system for wirelessly connecting a client device to a wireless network's access point. When a first client device detects a Wireless Broadcast Storm During Active Scan Association (WBSDAASA) caused by a large block of other client devices attempting to simultaneously wirelessly connect to the access point using an active scan, the first client device switches to either a passive scan or a random roam active scan to connect the first client device to the access point. The first client device is thus able to avoid a connection live-lock caused by the WBSDAASA.Type: ApplicationFiled: March 14, 2005Publication date: September 14, 2006Applicant: International Business Machines CorporationInventors: Daryl Cromer, Philip Jakes, Howard Locker, Randall Springfield
-
Publication number: 20060189311Abstract: An apparatus, system, and method are disclosed for rapid wireless network association. The apparatus includes a logic unit containing a plurality of modules configured to functionally execute the necessary steps of conducting a preliminary full band search on a predefined frequency spectrum to identify the frequency of an active communication channel, investigate the availability of the active communication channels identified during the preliminary search, and associate with a wireless network device on the available active communication channel. These modules in the described embodiments include a search module, an investigation module, and an association module. Beneficially such an apparatus, system, and method provide for more efficient searching, scanning, and association than typically found in wireless networks.Type: ApplicationFiled: February 18, 2005Publication date: August 24, 2006Inventors: Daryl Cromer, Philip Jakes, Howard Locker, Randall Springfield
-
Publication number: 20060025127Abstract: In a wireless network in which a client has access to multiple Access Points the client usually attaches to one of the Access Points (AP) and stays attached even though signal transmission is impaired, whereas transmission would not be impaired if the client attaches to another one of the multiple APs. Apparatus and method are described to detect interference noise level and force the client to roam and attach to another AP if interference noise level impairs signal transmission.Type: ApplicationFiled: July 27, 2004Publication date: February 2, 2006Applicant: International Business Machines CorporationInventors: Daryl Cromer, Philip Jakes, Howard Locker
-
Publication number: 20050165916Abstract: A system and method for concurrent WLAN and WPAN wireless modes from a single device is presented. A client uses a Wi-Fi device's infrastructure mode to communicate in a WLAN environment and, during idle WLAN times, uses the Wi-Fi device's adhoc mode to communicate in a WPAN environment. The Wi-Fi device uses a watchdog timer to switch between infrastructure mode and adhoc mode. When the client's Wi-Fi device switches to infrastructure mode, the client's Wi-Fi device uses an infrastructure register and an infrastructure device driver to transfer data over the WLAN environment. Likewise, when the client's Wi-Fi device switches to adhoc mode, the client's Wi-Fi device uses an adhoc register and an adhoc device driver to transfer data over the WLAN environment. The client uses a code shim to act as a virtual device driver at times when either the infrastructure device driver or the adhoc device driver is inactive.Type: ApplicationFiled: December 24, 2003Publication date: July 28, 2005Applicant: International Business Machines CorporationInventors: Daryl Cromer, Philip Jakes, Howard Locker, Michael Vanover
-
Publication number: 20050163085Abstract: A system and method for autonomic wireless presence ping is presented. An IS administrator wishes to collect capacity requirement information corresponding to a wireless network, such as the number of packets a client sends to and receives from an access point. The IS administrator sends a request to the access point. In turn, the access point sends a control packet to client devices it supports, instructing them to enable an enhanced presence ping bit. Each client enables its enhanced presence ping bit, and collect enhanced status information. Each client device sends the enhanced status information to the access point either when a timer expires, or when the client device receives a ping request from the access point. The access point then forwards the enhanced status information to the IS administrator for analysis.Type: ApplicationFiled: December 24, 2003Publication date: July 28, 2005Applicant: International Business Machines CorporationInventors: Daryl Cromer, Philip Jakes, Howard Locker, Randall Springfield
-
Publication number: 20050147070Abstract: A wireless device operating under the IEEE 802.11 specifications passively scans for a wireless access point coupled to a network backbone, wherein the scanning is performed using a default set of channels. The wireless device will then determine if the access point operates under an IEEE 802.11d specification, thus providing a country code to the wireless device. The wireless device will then utilize the country code to determine if the wireless device is legally authorized to communicate with the selected access point with wireless signal channels in addition to the default set of channels. The wireless device can then communicate with a selected access point utilizing any of the default set of channels and the wireless signal channels in addition to the default set of channels.Type: ApplicationFiled: December 29, 2003Publication date: July 7, 2005Applicant: International Business Machines CorporationInventors: Daryl Cromer, Philip Jakes, Howard Locker, Ronald Griffiths
-
Publication number: 20050135239Abstract: A wireless network access point is described which provides the resources of a backbone network to wireless clients. The access point optimizes wireless local area network traffic by concentrating access point traffic toward a single protocol. In the example given, 802.11g clients are associated upon request. However, when an 802.1lb client initiates a first association request, the association is deferred. That 802.11b client will tend to seek access to the backbone network through association with another access point. However, should a second association request be received by the same 802.11b client, the client is associated in response to the second association request. Specific time limits can be imposed relative to the second association request.Type: ApplicationFiled: December 19, 2003Publication date: June 23, 2005Applicant: International Business Machines CorporationInventors: Daryl Cromer, Philip Jakes, Howard Locker
-
Publication number: 20050135303Abstract: A wireless network access point is described which provides the resources of a backbone network to wireless clients. The access point is able to minimize the performance impact on 802.11g clients in the presence of mixed in 802.11g/802.11b traffic by isolating wireless network traffic based on protocol. At least one 802.11g timer is maintained for 802.11g traffic. Request for transfers by 802.11b clients which are blind to 802.11g traffic are delayed until after the expiration of the 802.11g timer. Traffic for 802.11g clients proceeds unimpeded while the 802.11g timer is active. A similar timer is optionally maintained for 802.11b traffic.Type: ApplicationFiled: December 19, 2003Publication date: June 23, 2005Applicant: International Business Machines CorporationInventors: Daryl Cromer, Philip Jakes, Howard Locker
-
Publication number: 20050135249Abstract: A wireless network access point is described which provides the resources of a backbone network to wireless clients. The access point is able to detect a degraded condition on the backbone network. Upon detecting the degraded condition, the access point transmits or broadcasts a reassociation request to one or more clients associated with the access point. In addition, the rate at which new associations are made is halted or reduced during the degraded backbone condition. In one embodiment, the association rate is reduced by increasing the interval between beacons transmitted by the access point which identify the access to the backbone network.Type: ApplicationFiled: December 19, 2003Publication date: June 23, 2005Applicant: International Business Machines CorporationInventors: Daryl Cromer, Philip Jakes, Howard Locker
-
Publication number: 20050135316Abstract: A wireless network access point is described which provides the resources of a backbone network to wireless clients. The access point is able to balance loads by deferring association of new clients and thereby directing clients to associate with alternative access points having improved backbone connectivity. Where the client is unable to find an alternative access point, the client will eventually make a second association request to the access point. The access point, in identifying the second association request of the client, proceeds to associate the client in response to the second association request. Specific time limits can be imposed relative to the second association request.Type: ApplicationFiled: December 19, 2003Publication date: June 23, 2005Applicant: International Business Machines CorporationInventors: Daryl Cromer, Philip Jakes, Howard Locker
-
Publication number: 20050135372Abstract: A wireless network access point is described which provides the resources of a backbone network to wireless clients. The access point is able to detect a degraded condition on the backbone network. Upon detecting the degraded condition, the access point selectively dissociates clients on the wireless network. In order to select which clients are dissociated first, a predetermined client dissociation policy is established. The policy can include account priority, bandwidth utilization, elapsed time since last transfer, and, amongst other criteria, whether the client is currently transferring in peer-to-peer mode on the wireless network. Upon detecting the degraded condition, either immediately or after a predetermined delay to ensure that the degraded condition is not temporary, clients on the wireless network are dissociated according to the preestablished policy.Type: ApplicationFiled: December 19, 2003Publication date: June 23, 2005Applicant: International Business Machines CorporationInventors: Daryl Cromer, Philip Jakes, Howard Locker
-
Publication number: 20050135310Abstract: A wireless network client is described which obtains access to the resources of a backbone network provided by a wireless access point. The client is adapted to receive a reassociation request from an access point which is able to detect a degraded condition on the backbone network and inform clients of the degraded condition. Upon detecting the degraded condition, the access point transmits or broadcasts a reassociation request to one or more clients associated with the access point. Information can also be sent identifying the degraded performance of the backbone network and can include other information useful to clients. Once a client has received the reassociation request and/or the informed identifying the degraded performance, the clients seek access to the backbone network through other access points which are not experiencing degraded performance. The seek preferably omits the access point identified as experiencing degraded backbone performance.Type: ApplicationFiled: December 19, 2003Publication date: June 23, 2005Applicant: International Business Machines CorporationInventors: Daryl Cromer, Philip Jakes, Howard Locker
-
Publication number: 20050122926Abstract: A system and method for autonomic extensions to wake on LAN are presented. An access point detects wake on LAN (WOL) requests that are targeted for unassociated clients. When the access point detects a WOL request for an unassociated client, the access point stores the WOL request in a table for a predefined amount of time. A client queries the access point periodically to see if the access point is storing a WOL request which is targeted for the client. When the access point receives the query, the access point compares the client's identifier, such as its MAC address, with targeted client identifiers corresponding to pending WOL requests. When the access point detects a match, the access point sends the WOL request to the client for the client to process.Type: ApplicationFiled: December 3, 2003Publication date: June 9, 2005Applicant: International Business Machines CorporationInventors: Daryl Cromer, Philip Jakes, Howard Locker, Randall Springfield
-
Publication number: 20050124355Abstract: Aspects for validating access point locations in a wireless network are described. The aspects include performing a scan in a validating access point for another access point in the wireless network. Location data of a detected access point is utilized in the validating access point to direct self-correction of current location data of the validating access point.Type: ApplicationFiled: December 4, 2003Publication date: June 9, 2005Applicant: International Business Machines CorporationInventors: Daryl Cromer, Philip Jakes, Howard Locker, Randall Springfield
-
Publication number: 20050075136Abstract: A method that utilizes software means to meet the FCC requirement for an U-NII antenna to be an integral part of the device in which it operates, while providing wireless ready U-NII devices and CRUable U-NII radios. Enhancements are made to the system BIOS, including the inclusion of a table of PCI IDs and secret key pairs. The CRUable radio includes a pair of validation registers (VRs) and an EEPROM storing an PCI ID and secret key of an approved device. During boot up of the device, the PCI ID and secret key from the device's BIOS are compared against the PCI ID and secret key stored in the radio's EEPROM. The first comparison completes a radio-to-device authentication in the device, while the second comparison completes a device-to-radio authentication in the radio. U-NII transmission capability is enabled only when both parameters match, indicating FCC approved device-antenna-radio combination under the “integral” requirement.Type: ApplicationFiled: October 7, 2003Publication date: April 7, 2005Applicant: International Business Machines Corp.Inventors: Daryl Cromer, Kazuo Fujii, Ronald Griffiths, Masaharu Itoh, Philip Jakes, Kozo Matsunaga, Masaki Oie
-
Publication number: 20050075135Abstract: A method that utilizes both software and combination software and hardware mechanisms to comply with the FCC requirement for an U-NII antenna to be an integral part of the device, while providing CRUable dual mode wireless cards and wireless-ready U-NII devices. Enhancements are made to the system BIOS and Device Driver, and two new software-implemented utilities are provided to create authentication schemes that verify and authenticates the CRUable dual mode U-NII radio and antenna combination as being an FCC approved unique coupling during operation of the system. The system boots with only ISM transmission capability and is allowed to complete a U-NII transmission request only with an approved U-NII radio-antenna combination.Type: ApplicationFiled: October 7, 2003Publication date: April 7, 2005Applicant: International Business Machines Corp.Inventors: Daryl Cromer, Kazuo Fujii, Ronald Griffiths, Masaharu Itoh, Philip Jakes, Kozo Matsunaga, Masaki Oie