The invention relates to the field of network monitoring and supervision application. Educational institutions often provide computers and network access to their students and teachers to facilitate instruction. For example, students and teachers may each be provided with a computer system or other electronic communications device, such as a tablet computer or personal digital assistant. Each student and/or teacher may use their assigned device for some or all of their classes and assignments. In another example, a specific classroom may include computer systems or other devices for use by all of the students assigned to that classroom for one or more classes. In yet another example, a set of computer systems or other devices may be assigned to a cart or cabinet that can be moved to different classrooms according to the needs of students and teachers.
One downside with incorporating computers and other devices in educational environments is that teachers or other instructors often need to monitor the network usage of their students. For example, when a class begins, the teacher may instruct the students to start their computers and access a specific web site. After providing these instructions, the teacher must then walk around the classroom to verify that all of the students' computers have successfully connected to the network and are viewing the specified web site. As the class continues, the teacher may need to frequently patrol the classroom to ensure that all of the students are using their computers in an appropriate manner. The time and effort required to monitor and supervise students' network usage reduces the time and quality of classroom instruction.
Prior systems for monitoring and supervising students' network usage rely on monitoring applications installed on each student's computer. Because these monitoring applications are installed and executed on students' computers, they must be compatible with the hardware, operating system, and software configuration of these computers or other devices. This increases the administrative overhead required to deploy and maintain student computers and limits the types of devices that can be provided to students. Additionally, installing monitoring applications on students' computers can create privacy issues. In some cases, teachers and school administrators may be liable for violating student privacy rights if the monitoring applications are activated outside of school, such as at a student's home.
Additionally, traditional network monitoring applications are tailored towards the needs of system administrators. The user interface and type of information of these prior network monitoring applications is intended for computer-literate and technically sophisticated users. The interface and type of information provided by these applications may be unsuitable for many teachers and school administrators. Furthermore, traditional network monitoring applications identify users and client network devices by hardware attributes, such as MAC addresses, or user attributes, such as user login identifications. However, these prior network monitoring applications do not organize network information in manner relevant to teachers and school administrators, such as by classes, class schedules, or classrooms.
An embodiment of the invention includes a simplified network monitoring and control application suitable for use by teachers and other supervisors. An embodiment of the invention is implemented using wireless access points and other network devices and thus does not require specific software to be installed on client network devices. Thus, this embodiment of the invention can operate with any type of network client capable of communicating via a wireless network interface. An embodiment of the invention uses student and class information to organize network client information in a manner relevant to teachers and other users. An embodiment of the invention monitors and controls client network devices using a decentralized system, so that individual network devices are not overburdened.
Upon receiving a monitoring request from a teacher or other user, an embodiment of the invention identifies one or more classes assigned to the teacher by accessing class data. A teacher or other user may select one of the identified classes or alternatively, an embodiment automatically selects one of the classes based on a class schedule and/or class location. Once a class has been selected by the teacher, an embodiment of the invention accesses class data to identify students assigned to the class. This embodiment of the invention further identifies client network devices used by these students. An embodiment of the invention then selects one wireless access point providing wireless network connections to at least a portion of the students' client network devices. The selected wireless access point collects network activity information from the students' client network devices and presents this information to the teacher or other user.
In an embodiment, the teacher may also use the selected wireless access point to selectively enable or disable local and/or wide-area network access to one or more student client network devices. In a further embodiment, the teacher may also use the selected wireless access point to redirect students' client network devices to a desired network resource. In this embodiment, the teacher or other user provides the selected wireless access point with a network address of the network resource. The selected wireless access point then intercepts network resource requests from at least a portion of the students' client network devices. In response to these network resource requests, the selected wireless access point sends redirection messages including the provided network address to the students' client network devices. The students' client network devices then retrieve the desired network resource automatically.
The invention will be described with reference to the drawings, in which:
An embodiment of the invention includes a simplified network monitoring and control application suitable for use by teachers and other supervisors. An embodiment of the invention is implemented using wireless access points and other network devices and thus does not require specific software to be installed on client network devices. Thus, this embodiment of the invention can operate with any type of network client capable of communicating via a wireless network interface. An embodiment of the invention uses student and class information to organize network client information in a manner relevant to teachers and other users. An embodiment of the invention monitors and controls client network devices using a decentralized system, so that individual network devices are not overburdened.
Similarly, system 100 includes a plurality of teacher client network devices 110. Teacher network devices 110 may include portable or desktop personal computers, tablet computers, mobile internet access or web browsing devices, personal digital assistant devices, and any other type of electronic communications device capable of retrieving data via an electronic communications network. Teacher client network devices 105 may be assigned to specific teachers, school administrators, and/or other staff members; to specific classrooms; to carts or cabinets that can be moved to different classrooms according to the needs of students and teachers; or distributed on an ad-hoc basis to teachers and other personnel as needed.
Student and teacher client network devices 105 and 110 are connected with one or more local area networks via wireless network connections provided by wireless access points 115, such as wireless access points 115a, 115b, and 115c. Wireless access points 115 may use any wireless networking technology and protocol known in the art, including one or more of the IEEE 802.11 family of wireless networking standards.
Wireless access points 115 are connected with one or more local-area networks via one or more network switches 120 or other network devices, such as network switches 120a and 120b. Network switches and other local-area network devices 120 are connected with a router and/or firewall network device 125. Router and firewall network device 125 may provide network address translation, network address assignment, and network security for the local-area networks. Additionally router and firewall network device 125 optionally connects the local-area networks with a wide-area network 135, such as the internet.
System 100 may also include a wireless access point manager 130 that controls the configuration of the wireless access points 115. Wireless access point manager 130 may facilitate the deployment of network policies, software and firmware upgrades, and configurations to wireless access points 115. Wireless access point manager 130 may also monitor network usage by client network devices 105 and 110 via the wireless access points 115. In an embodiment, the wireless access point manager 130 is adapted for use in a controller-less system, in which control and forwarding of network traffic is distributed among the wireless access points 115. In an alternate embodiment of system 100, the wireless access point manager 130 operates in conjunction with a wireless access point controller that intercepts, analyzes, and forwards substantially all of the network traffic associated with the wireless access points 115.
In response to receiving the monitoring request in step 205, step 210 authenticates the user request, for example by requesting that the user provide a login identification and password. In an embodiment of method 200, a user interface is provided to the user in the form of one or more web pages provided by the wireless access point manager, wireless access points, or other network devices. In an embodiment, step 210 may access an authentication system to authenticate users, such as RADIUS, Active Directory, Captive Web Portal, or a private PSK scheme, such as that described in U.S. patent application Ser. No. 12/485,041, filed Jun. 16, 2009, and entitled “EXCLUSIVE PRESHARED KEY AUTHENTICATION,” which is incorporated by reference herein. The private PSK scheme assigns a unique pre-shared key (PSK) to each wireless network user. Thus, the user is authenticated automatically upon connecting with the wireless network with their assigned key.
Following successful authentication of the user by step 210, step 215 provides the user with a list of classes to monitor and/or control. An embodiment of step 215 accesses a database or other data storage structure to identify one or more classes associated with the user. For example, if the user is a teacher, then step 215 may identify one or more classes that have been assigned to the teacher. If the user is a substitute teacher or other school administrator, the user may provide a supplemental identification of a primary teacher. Step 215 uses this supplemental identification to identify one or more classes assigned to the primary teacher and potentially of interest to the user. In a further embodiment, step 215 may compare the current day and/or time with class schedules to automatically identify one or more classes associated with the user that are in progress, starting soon, or recently ended.
In another embodiment, step 215 may identify one or more classes associated with the user based on the location of the user's computer or other client network device. The location of the user's network client may be identified using wireless network location detection techniques, such as comparing wireless network signal strengths from client network devices received by multiple wireless access points.
Once step 215 has identified one or more classes associated with the user, step 215 presents this class list to the user and receives a class selection from the user in response.
In an embodiment, if step 215 only identifies a single class associated with a user, for example by cross-referencing the current day and time and/or user location with a class schedule, then the class may be automatically selected by step 215.
Following step 215, step 220 identifies additional client network devices associated with the class selected by the user. In an embodiment, step 220 accesses a database or other data storage structure to identify students or other personnel assigned to the selected class.
Step 220 then accesses a database or other data storage structure to identify client network devices assigned to these students. If students are assigned to a specific client network devices, client network device identifiers, such as MAC addresses, may be associated with student records in the database or other data storage structure. In a further embodiment, step 220 may access an authentication or user directory system, such as RADIUS, Active Directory, or Captive Web Portal, to match students with specific network devices. In another embodiment, if a private PSK scheme is used, step 220 may search the network for client network devices connected using PSK's assigned to the students of the selected class.
In another embodiment, step 215 may be optionally omitted and step 220 of method 200 identifies client network devices of interest to the user based on criteria other than the class associations. For example, an embodiment of step 220 identifies the location of the user, as described above, and then identifies one or more student client network devices at the same location, such as in the same classroom. In another example, multiple client network devices may be assigned to a group, representing a cabinet or cart of computer shared by students and teachers. In this example, step 220 identifies the group associated with the network client used by the user and selects all of the other active client network devices associated with this group for monitoring.
In yet another embodiment, step 220 may identify the location, such as a specific classroom, of the user's computer or other client network device, and then search for other client network devices at the same location. Any other client network devices in the same location, e.g. the same classroom as the user, are automatically selected for monitoring by the user.
Step 225 selects one of the wireless access points of the network to service the user's monitoring request. By distributing different user monitoring requests to different wireless access points for servicing, this embodiment of the invention balances the processing load required by the monitoring system across the excess computing capacity of existing network devices. This eliminates the need for additional, dedicated network devices to implement embodiments of the invention.
In an embodiment, step 225 identifies one or more wireless access points on the network that are providing wireless network connections to at least one of the identified student client network devices and/or the user's client network device. If there is only one wireless access point providing wireless network connections to these client network devices, an embodiment of step 225 selects this wireless access point to service the user's monitoring request. If there are two or more wireless access points providing wireless network connections to these client network devices, an embodiment of step 225 selects the wireless access point providing the majority of wireless network connections to service the user's monitoring request. In another embodiment, if no client network devices associated with a class are connected with any wireless access point, step 225 may select the wireless access point that has the lowest workload at the time of the monitoring request. In another embodiment, step 225 uses load-balancing techniques to select the appropriate wireless access point for servicing the user's monitoring request.
In another embodiment, an administrative user may preconfigure one or more of the wireless access points to service users' monitoring requests. For example, an administrative user may preconfigure a wireless access point located in or a near a specific classroom or other type of location to service all monitoring requests from users in that classroom. In this embodiment, step 225 identifies the classroom or other type of location associated with the user's monitoring request and selects the wireless access point preconfigured for this location.
In still another embodiment, an administrative or management application or an optional wireless network controller monitors the activity of client network devices to identify the wireless access points that each class or other group of client network devices access most frequently. After gathering sufficient records of a class' network usage, step 225 selects the wireless access point for a monitoring request that was previously used frequently by this class.
Step 230 redirects the user to the selected wireless access point. In an embodiment, the user interface for monitoring and supervising student client network devices is provided as web pages. Prior to step 230, an embodiment of method 200 may provide web pages for user interaction using the wireless access point manager or other network devices. Step 230 redirects the user's web browser on his or her client network device to the selected wireless access point. The selected wireless access point then provides additional web pages for further user interaction, including the ongoing monitoring and supervision of student client network devices.
As discussed above, multiple wireless access points may provide network connections to a portion of the identified student client network devices. If this is the case, then optional step 235 configures any unselected wireless access points providing a network connection to at least one of the identified student client network devices to redirect network activity information for their identified student client network devices to the selected wireless access point. If the selected wireless access point is providing wireless network connections to all of the identified student client network devices of interest to the user, then step 235 may be omitted.
Step 240 monitors the network activity of the identified student client network devices and presents this information to the user via a user interface, implemented for example as a web page. The user interface may be automatically updated in real time, near real time, or periodically with updated network activity information, or on request from the user. As described in detail below, network activity information can include information for each student's client network device such as the wireless network connection status; the software applications used to access the network; the network resources accessed by the student, such as web pages or network locations; and the upstream and/or downstream network bandwidth used by the student's client network device. In an embodiment, all of the network activity information can be collected by wireless access points and/or other network devices, eliminating the need to install monitoring software on student's client network devices.
As described in detail below, step 240 may also receive control inputs from the user to change the wireless network connections of one or more student client network devices. Changes to wireless network connections can include enabling or disabling local and/or wide-area network access for one or more of the students and redirecting one or more of the students' client network devices to a network resource, such as a web page, specified by the user.
As described above, embodiments of method 200 may access a database or other data structure to determine class schedules, class locations, lists of students and teachers assigned to classes, and other information. In one embodiment, one or more data files, such as spreadsheets or CSV data files, including this information are uploaded by an administrator to the system. In another embodiment, the system accesses an external school administrative system or student information system via an API or other interface to retrieve this information in advance or as needed. In still another embodiment, the system provides a self-registration process that enables students and teachers to manually associate themselves with a class. For example, a teacher or other user may manually create an entry for a class. In response, the system provides the teacher with a registration code that is unique for this class. The teacher then provides this registration code to his or her students. Upon connecting with the wireless network, student are prompted to enter their registration code to associate their user identifications and/or their client network devices with this class. The self-registration process may only need to be performed once for each student (for example on the students' first day of class). On subsequent class sessions, this embodiment of the invention uses information obtained from students' previous self-registrations, such as user identifications and/or client network device identifications, to associate students with their classes.
Example user interface 300 also includes user interface controls for controlling the network connections of the students. For example, user interface 300 includes network access controls 320 for enabling or disabling network access to local and/or wide-area networks for one or more students. The functionality of these controls is implemented by the wireless access points and/or other network devices by selectively passing or blocking network traffic based on network addresses for one or more students.
Additionally, example user interface 300 includes a redirection control 325. The redirection control 325 enables teachers or other users to direct their students to a specific web page or other network resource. This feature can save time and reduce errors arising from students having to manually enter network addresses. A teacher or other user enters an address of a network resource, such as a URL of a web page, into the redirection control. The teacher can then instruct his or her students to refresh the web page in their web browsers. The wireless access points and/or other network devices intercept these refresh requests and reply with an HTTP redirect instruction to the network address provided by the teacher.
Although the above-described embodiments refer to applications within schools and other educational environments, embodiments of the invention may be readily deployed in any other type of environment where one or more users require a simplified interface for monitoring and optionally controlling network access for large numbers of other users. Examples of other types of environments include hospitals, conference centers, and business offices.
Computer system 2000 includes a central processing unit (CPU) 2005 for running software applications and optionally an operating system. CPU 2005 may be comprised of one or more processing cores. Memory 2010 stores applications and data for use by the CPU 2005. Examples of memory 2010 include dynamic and static random access memory. Storage 2015 provides non-volatile storage for applications and data and may include fixed or removable hard disk drives, flash memory devices, ROM memory, and CD-ROM, DVD-ROM, Blu-ray, HD-DVD, or other magnetic, optical, or solid state storage devices. Memory 2010 may store a firmware image comprising applications and data adapted to be executed by computer system 2000.
Optional user input devices 2020 communicate user inputs from one or more users to the computer system 2000, examples of which may include keyboards, mice, joysticks, digitizer tablets, touch pads, touch screens, still or video cameras, and/or microphones. In an embodiment, user input devices may be omitted and computer system 2000 may present a user interface to a user over a network, for example using a web page or network management protocol and network management software applications.
Computer system 2000 includes one or more network interfaces 2025 that allow computer system 2000 to communicate with other computer systems via an electronic communications network, and may include wired or wireless communication over local area networks and wide area networks such as the Internet. Computer system 2000 may support a variety of networking protocols at one or more levels of abstraction. For example, computer system may support networking protocols at one or more layers of the seven layer OSI network model. An embodiment of network interface 2025 includes one or more wireless network interfaces adapted to communicate with wireless clients and with other wireless networking devices using radio waves, for example using the 802.11 family of protocols, such as 802.11a, 802.11b, 802.11g, and 802.11n.
An embodiment of the computer system 2000 may also include a wired networking interface, such as one or more Ethernet connections to communicate with other networking devices via local or wide-area networks. In a further embodiment, computer system 2000 may be capable of receiving some or all of its required electrical power via the network interface 2025, for example using a wired networking interface power over Ethernet system.
The components of computer system 2000, including CPU 2005, memory 2010, data storage 2015, user input devices 2020, and network interface 2025 are connected via one or more data buses 2060. Additionally, some or all of the components of computer system 2000, including CPU 2005, memory 2010, data storage 2015, user input devices 2020, and network interface 2025 may be integrated together into one or more integrated circuits or integrated circuit packages. Furthermore, some or all of the components of computer system 2000 may be implemented as application specific integrated circuits (ASICS) and/or programmable logic.
A power supply 2030 provides electrical power to the computer system 2000. Power supply 2030 may be adapted to draw electrical power from a connection with an electrical power distribution grid. In an embodiment, power supply 2030 is connected with network interface 2025 to draw electrical power for computer system 2000 from one or more wired network connections using a network power standard, such as IEEE 802.3af.
Although embodiments of the invention are discussed with reference to the IEEE 802.11 standard, embodiments of the invention are equally applicable to other standard and proprietary wireless network protocols. Additionally, embodiments of the invention are not limited to 802.11 wireless network connections and may be utilized for any type of communication network where a network connection between a client wireless network device and a wireless network device is required.
Further embodiments can be envisioned to one of ordinary skill in the art from the specification and figures. In other embodiments, combinations or sub-combinations of the above disclosed invention can be advantageously made. The block diagrams of the architecture and flow charts are grouped for ease of understanding. However it should be understood that combinations of blocks, additions of new blocks, re-arrangement of blocks, and the like are contemplated in alternative embodiments of the present invention. The specification and drawings are, accordingly, to be regarded in an illustrative rather than a restrictive sense. It will, however, be evident that various modifications and changes may be made thereunto without departing from the broader spirit and scope of the invention as set forth in the claims.
This application claims priority to U.S. Provisional Patent Application No. 61/368,244, filed Jul. 27, 2010, and entitled “Client-Independent Network Supervision Application” and is incorporated by reference herein for all purposes.
Number | Name | Date | Kind |
---|---|---|---|
5471671 | Wang et al. | Nov 1995 | A |
5697059 | Carney | Dec 1997 | A |
5726984 | Kubler et al. | Mar 1998 | A |
5956643 | Benveniste | Sep 1999 | A |
6112092 | Benveniste | Aug 2000 | A |
6154655 | Borst et al. | Nov 2000 | A |
6314294 | Benveniste | Nov 2001 | B1 |
6473413 | Chiou et al. | Oct 2002 | B1 |
6496699 | Benveniste | Dec 2002 | B2 |
6519461 | Andersson et al. | Feb 2003 | B1 |
6628938 | Rachabathuni et al. | Sep 2003 | B1 |
6775549 | Benveniste | Aug 2004 | B2 |
6865393 | Baum et al. | Mar 2005 | B1 |
7057566 | Theobold | Jun 2006 | B2 |
7085224 | Oran | Aug 2006 | B1 |
7085241 | O'Neill et al. | Aug 2006 | B1 |
7164667 | Rayment et al. | Jan 2007 | B2 |
7174170 | Steer et al. | Feb 2007 | B2 |
7177646 | O'Neill et al. | Feb 2007 | B2 |
7181530 | Halasz et al. | Feb 2007 | B1 |
7224697 | Banerjea et al. | May 2007 | B2 |
7251238 | Joshi et al. | Jul 2007 | B2 |
7512379 | Nguyen | Mar 2009 | B2 |
7706789 | Qi et al. | Apr 2010 | B2 |
7716370 | Devarapalli | May 2010 | B1 |
7793104 | Zheng et al. | Sep 2010 | B2 |
7843907 | Abou-Emara et al. | Nov 2010 | B1 |
7844057 | Meier et al. | Nov 2010 | B2 |
7921185 | Chawla et al. | Apr 2011 | B2 |
7949342 | Cuffaro et al. | May 2011 | B2 |
8219688 | Wang | Jul 2012 | B2 |
8249606 | Neophytou et al. | Aug 2012 | B1 |
20020021689 | Robbins et al. | Feb 2002 | A1 |
20020071422 | Amicangioli | Jun 2002 | A1 |
20020091813 | Lamberton et al. | Jul 2002 | A1 |
20020116463 | Hart | Aug 2002 | A1 |
20030104814 | Gwon et al. | Jun 2003 | A1 |
20030129988 | Lee et al. | Jul 2003 | A1 |
20030145091 | Peng et al. | Jul 2003 | A1 |
20030179742 | Ogier et al. | Sep 2003 | A1 |
20040013118 | Borella | Jan 2004 | A1 |
20040022222 | Clisham | Feb 2004 | A1 |
20040103282 | Meier et al. | May 2004 | A1 |
20040109466 | Van Ackere et al. | Jun 2004 | A1 |
20040162037 | Shpak | Aug 2004 | A1 |
20040192312 | Li et al. | Sep 2004 | A1 |
20040236939 | Watanabe et al. | Nov 2004 | A1 |
20040255028 | Chu et al. | Dec 2004 | A1 |
20050053003 | Cain et al. | Mar 2005 | A1 |
20050074015 | Chari et al. | Apr 2005 | A1 |
20050099983 | Nakamura et al. | May 2005 | A1 |
20050122946 | Won | Jun 2005 | A1 |
20050207417 | Ogawa et al. | Sep 2005 | A1 |
20050262266 | Wiberg et al. | Nov 2005 | A1 |
20050266848 | Kim | Dec 2005 | A1 |
20060026289 | Lyndersay et al. | Feb 2006 | A1 |
20060062250 | Payne, III | Mar 2006 | A1 |
20060107050 | Shih | May 2006 | A1 |
20060117018 | Christiansen et al. | Jun 2006 | A1 |
20060140123 | Conner et al. | Jun 2006 | A1 |
20060146748 | Ng et al. | Jul 2006 | A1 |
20060146846 | Yarvis et al. | Jul 2006 | A1 |
20060187949 | Seshan et al. | Aug 2006 | A1 |
20060221920 | Gopalakrishnan et al. | Oct 2006 | A1 |
20060233128 | Sood et al. | Oct 2006 | A1 |
20060234701 | Wang et al. | Oct 2006 | A1 |
20060245442 | Srikrishna et al. | Nov 2006 | A1 |
20060268802 | Faccin | Nov 2006 | A1 |
20060294246 | Stieglitz et al. | Dec 2006 | A1 |
20070010231 | Du | Jan 2007 | A1 |
20070025274 | Rahman et al. | Feb 2007 | A1 |
20070078663 | Grace | Apr 2007 | A1 |
20070082656 | Stieglitz et al. | Apr 2007 | A1 |
20070091859 | Sethi et al. | Apr 2007 | A1 |
20070116011 | Lim et al. | May 2007 | A1 |
20070121947 | Sood et al. | May 2007 | A1 |
20070133407 | Choi et al. | Jun 2007 | A1 |
20070140191 | Kojima | Jun 2007 | A1 |
20070249324 | Jou et al. | Oct 2007 | A1 |
20070263532 | Mirtorabi et al. | Nov 2007 | A1 |
20070280481 | Eastlake et al. | Dec 2007 | A1 |
20070288997 | Meier et al. | Dec 2007 | A1 |
20080002642 | Borkar et al. | Jan 2008 | A1 |
20080080369 | Sumioka et al. | Apr 2008 | A1 |
20080080377 | Sasaki et al. | Apr 2008 | A1 |
20080090575 | Barak et al. | Apr 2008 | A1 |
20080095094 | Innami | Apr 2008 | A1 |
20080130495 | Dos Remedios et al. | Jun 2008 | A1 |
20080146240 | Trudeau | Jun 2008 | A1 |
20080170527 | Lundsgaard et al. | Jul 2008 | A1 |
20080207215 | Chu et al. | Aug 2008 | A1 |
20080225857 | Lange | Sep 2008 | A1 |
20080229095 | Kalimuthu et al. | Sep 2008 | A1 |
20080273520 | Kim et al. | Nov 2008 | A1 |
20090028052 | Strater et al. | Jan 2009 | A1 |
20090082025 | Song | Mar 2009 | A1 |
20090088152 | Orlassino | Apr 2009 | A1 |
20090097436 | Vasudevan et al. | Apr 2009 | A1 |
20090111468 | Burgess et al. | Apr 2009 | A1 |
20090141692 | Kasslin et al. | Jun 2009 | A1 |
20090144740 | Gao | Jun 2009 | A1 |
20090168645 | Tester et al. | Jul 2009 | A1 |
20090239531 | Andreasen et al. | Sep 2009 | A1 |
20090240789 | Dandabany | Sep 2009 | A1 |
20090247170 | Balasubramanian et al. | Oct 2009 | A1 |
20100057930 | DeHaan | Mar 2010 | A1 |
20100112540 | Gross et al. | May 2010 | A1 |
20100115576 | Hale et al. | May 2010 | A1 |
20100208614 | Harmatos | Aug 2010 | A1 |
20100228843 | Ok et al. | Sep 2010 | A1 |
20100254316 | Sendrowicz | Oct 2010 | A1 |
20100260091 | Seok | Oct 2010 | A1 |
20100304738 | Lim et al. | Dec 2010 | A1 |
20100311420 | Reza et al. | Dec 2010 | A1 |
20100322217 | Jin et al. | Dec 2010 | A1 |
20110004913 | Nagarajan et al. | Jan 2011 | A1 |
20110040867 | Kalbag | Feb 2011 | A1 |
20110055326 | Michaelis et al. | Mar 2011 | A1 |
20110064065 | Nakajima et al. | Mar 2011 | A1 |
20110182225 | Song et al. | Jul 2011 | A1 |
20110185231 | Balestrieri et al. | Jul 2011 | A1 |
20120014386 | Xiong et al. | Jan 2012 | A1 |
20120290650 | Montuno et al. | Nov 2012 | A1 |
20130028158 | Lee et al. | Jan 2013 | A1 |
Entry |
---|
Clausen, T., et al., Optimized Link State Routing Protocol (OLSR), Network Working Group, Oct. 2003, pp. 1-71. |
Perkins, C., et al., Ad hoc On-Demand Distance Vector (AODV) Routing, Network Working Group, Oct. 2003, pp. 1-35. |
International Application No. PCT/US2011/047591, International Search Report and Written Opinion mailed Dec. 19, 2011. |
International Application No. PCT/US2008/061674, International Search Report and Written Opinion mailed Oct. 14, 2008. |
International Application No. PCT/US2012/059093, International Search Report and Written Opinion mailed Jan. 4, 2013. |
He, Changhua et al., “Analysis of the 802.11i 4-Way Handshake,” Proceedings of the 3rd ACM Workshop on Wireless Security, pp. 43-50, Oct. 2004. |
Lee, Jae Woo et al, “z2z: Discovering Zeroconf Services Beyond Local Link,” 2007 IEEE Globecom Workshops, pp. 1-7, Nov. 26, 2007. |
Number | Date | Country | |
---|---|---|---|
61368244 | Jul 2010 | US |