IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
US-0289479
(2011-11-04)
|
등록번호 |
US-8446890
(2013-05-21)
|
발명자
/ 주소 |
- Aragon, David B.
- Huang, Liang-Jong
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 |
피인용 횟수 :
0 인용 특허 :
181 |
초록
A technique for associating clients with APs in an advantageous manner may involve local balancing of clients across APs. This may involve providing instructions to APs to disable client association. Alternatively, this technique may involve load balancing across controllers.
대표청구항
▼
1. A method comprising: identifying, by a processor, a first access point (AP) and a second AP that include an overlapping coverage area;identifying, by the processor, a client that is located in the overlapping coverage area and is seeking to associate with an AP;computing, by the processor and bas
1. A method comprising: identifying, by a processor, a first access point (AP) and a second AP that include an overlapping coverage area;identifying, by the processor, a client that is located in the overlapping coverage area and is seeking to associate with an AP;computing, by the processor and based on identifying that the client is located in the overlapping coverage area, a hash value of a hardware address of the client; andallowing, by the processor, the client to associate with the first AP based on whether the hash value comprises an even number or an odd number. 2. The method of claim 1, where computing the hash value of the hardware address comprises computing a hash value of a media access control (MAC) address of the client, and where the client is allowed to associate with the first AP when the hash value of the MAC address comprises the odd number. 3. The method of claim 1, where the client is allowed to associate with the second AP when the hash value comprises the even number. 4. The method of claim 1, further comprising: determining, a signal strength associated with the client relative to the first AP and a signal strength of the client relative to the second AP; andwhere allowing the client to associated with the first AP includes: allowing the client to associate with the first AP when the signal strength associated with the client relative to the first AP is greater than the signal strength associated with the client relative to the second AP. 5. The method of claim 1, where allowing the client to associate with the first AP includes: transmitting a binary admittance value to the first AP to instruct the first AP to associate with the client. 6. The method of claim 1, further comprising: determining whether the client is associated with the first AP based on identifying that the client is located in the overlapping coverage area; andwhere allowing the client to associate with the first AP includes: allowing the client to associate with the first AP, without calculating the hash value of the hardware address, when the client is associated with the first AP. 7. The method of claim 1, where identifying the first AP and the second AP includes: determining a first received signal strength of the first AP at the second AP,determining a second received signal strength of the second AP at the first AP, andidentifying the overlapping coverage area based on the first received signal strength and the second received signal strength. 8. A non-transitory computer-readable medium storing instructions, the instructions including: one or more instructions which, when executed by one or more processors, cause the one or more processors to identify a first access point (AP) and a second access point (AP) that include an overlapping coverage area;one or more instructions which, when executed by the one or more processors, cause the one or more processors to identify a client that is located in the overlapping coverage area and is seeking to associate with an AP;one or more instructions which, when executed by the one or more processors, cause the one or more processors to determine a hardware address of the client;one or more instructions which, when executed by the one or more processors, cause the one or more processors to compute a hash value of the hardware address of the client;one or more instructions which, when executed by the one or more processors, cause the one or more processors to determine whether to allow the client to associate with the first AP or the second AP based on whether the hash value of the hardware address comprises an odd number or an even number. 9. The non-transitory computer-readable medium of claim 8, where the one or more instructions to determine whether to allow the client to associate with the first AP or the second AP include: one or more instructions which, when executed by the one or more processors, cause the one or more processors to compute a function of the hardware address, andone or more instructions which, when executed by the one or more processors, cause the one or more processors to allow the client to associate with the first AP when the function of the hardware address falls within a range of values. 10. The non-transitory computer-readable medium of claim 8, where the one or more instructions to compute the hash value of the hardware address include: one or more instructions which, when executed by the one or more processors, cause the one or more processors to compute a hash value of a media access control (MAC) address of the client, andwhere the client is allowed to associate with the first AP when the hash value of the MAC address comprises the odd number. 11. The non-transitory computer-readable medium of claim 8, where the one or more instructions to compute the hash value of the hardware address include: one or more instructions which, when executed by the one or more processors, cause the one or more processors to compute a hash value of a media access control (MAC) address of the client, andwhere the client is allowed to associate with the second AP when the hash value of the MAC address comprises the even number. 12. The non-transitory computer-readable medium of claim 8, further comprising: one or more instructions which, when executed by the one or more processors, cause the one or more processors to transmit a binary admittance value to the first AP or to the second AP to instruct the first AP or the second AP to associate with the client when the client is allowed to associate with the first AP or the second AP. 13. The non-transitory computer-readable medium of claim 8, further comprising: one or more instructions which, when executed by the one or more processors, cause the one or more processors to determine that the client is previously associated with the first AP based on identifying that the client is located in the overlapping coverage area; andone or more instructions which, when executed by the one or more processors, cause the one or more processors to allow the client to associate with the first AP based on the client being previously associated with the first AP. 14. The non-transitory computer-readable medium of claim 8, where the one or more instructions to identify the first AP and the second AP includes: one or more instructions which, when executed by the one or more processors, cause the one or more processors to determine a first received signal strength of the first AP at the second AP,one or more instructions which, when executed by the one or more processors, cause the one or more processors to determine a second received signal strength of the second AP at the first AP, andone or more instructions which, when executed by the one or more processors, cause the one or more processors to identify the overlapping coverage area based on the first received signal strength and the second received signal strength. 15. A device comprising: a memory to store instructions;a processor to execute one or more of the instructions to: identify an overlapping coverage area between a first access point (AP) and a second access point (AP);identify a client that is located in the overlapping coverage area and is seeking to associate with an AP;determine a hardware address of the client;determine a hash value of the hardware address; anddetermine whether to allow the client to associate with the first AP or the second AP based on whether the hash value of the hardware address is an odd number or an even number. 16. The device of claim 15, where, when determining whether to allow the client to associate with the first AP or the second AP, the processor executes the instructions further to: compute a function of the hardware address, andallow the client to associate with the first AP when the function of the hardware address falls within a range of values. 17. The device of claim 15, where, when computing the hash value of the hardware address, the processor further executes the instructions to: compute a hash value of a media access control (MAC) address of the client, andwhere, when determining whether to allow the client to associate with the first AP or the second AP, the processor further executes the instructions to: determine to allow the client to associate with the first AP when the hash value comprises the odd number. 18. The device of claim 15, where, when computing the hash value of the hardware address, the processor further executes the instructions to: compute a hash value of a media access control (MAC) address of the client, andwhere, when determining whether to allow the client to associate with the first AP or the second AP, the processor further executes the instructions to: determine to allow the client to associate with the second AP when the hash value comprises the even number. 19. The device of claim 15, where the processor further executes the instructions to: transmit a binary admittance value to the first AP or to the second AP to instruct the first AP or the second AP to associate the client when the client is allowed to associate with the first AP or the second AP. 20. The device of claim 15, where, when identifying the first AP and the second AP, the processor further executes the instructions to: determine a first received signal strength of the first AP at the second AP,determine a second received signal strength of the second AP at the first AP, andidentify the overlapping coverage area based on the first received signal strength and the second received signal strength.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.