Systems and methods for adaptive monitoring with bandwidth constraints
First Claim
Patent Images
1. A method of monitoring a wireless network, the method comprising the steps of:
- (a) receiving a data unit from a wireless node;
(b) if a bandwidth constraint is satisfied, buffering the received data unit; and
(c) transmitting the received or buffered data unit to a monitoring processor;
(d) repeating steps (a) through (c) for a plurality of wireless nodes;
(e) selecting the wireless node from the plurality of wireless nodes for a given repetition;
wherein the selecting step is based upon a deterministic selection;
wherein deterministic selection comprises a sequential traversal of the plurality of wireless nodes, a selection based upon amount of buffered data for each wireless node in the plurality of wireless nodes, a selection based upon a threat level for each wireless node in the plurality of wireless nodes or combinations thereof.
9 Assignments
0 Petitions
Accused Products
Abstract
This application is directed to systems and methods for adaptive monitoring of a wireless network with bandwidth constraints. A data unit from a wireless node is received. When a bandwidth constraint is satisfied, the received data unit is buffered. When the bandwidth constraint is not satisfied, the received or buffered data unit is transmitted to a monitoring processor. In some instances, downsampling, data discard and data aggregation can occur during the buffering process.
196 Citations
19 Claims
-
1. A method of monitoring a wireless network, the method comprising the steps of:
-
(a) receiving a data unit from a wireless node; (b) if a bandwidth constraint is satisfied, buffering the received data unit; and (c) transmitting the received or buffered data unit to a monitoring processor; (d) repeating steps (a) through (c) for a plurality of wireless nodes; (e) selecting the wireless node from the plurality of wireless nodes for a given repetition; wherein the selecting step is based upon a deterministic selection; wherein deterministic selection comprises a sequential traversal of the plurality of wireless nodes, a selection based upon amount of buffered data for each wireless node in the plurality of wireless nodes, a selection based upon a threat level for each wireless node in the plurality of wireless nodes or combinations thereof. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A system of monitoring a wireless network, the system comprising:
-
(a) a system data store (SDS) comprising capable of storing wireless data transmitted by a plurality of wireless nodes and configuration information at least comprising a bandwidth constraints; (b) a wireless receiver capable of receiving one or more data units from the plurality of wireless nodes; (c) a communication interface allowing communication with a monitoring processor; and (d) a system processor in communication with the SDS, the wireless receiver and the communication interface, wherein the system processor comprises one or more processing elements configured to; (i) receive a data unit from the wireless receiver in response to receipt of the data unit by the wireless receiver from a wireless node of the plurality of wireless nodes; (ii) buffer the received data unit in the SDS if a bandwidth constraint is satisfied; (iii) immediately transmit the received data unit to the monitoring processor via the communication interface if the bandwidth constraint is not satisfied; (iv) repeat steps (i) through (iii) for a plurality of received data units, wherein the wireless node of the plurality of wireless nodes is deterministically selected for a given repetition, and wherein deterministically selected comprises a sequential traversal of the plurality of wireless nodes, a selection based upon amount of buffered data for each wireless node in the plurality of wireless nodes, a selection based upon a threat level for each wireless node in the plurality of wireless nodes or combinations thereof; (v) discard the received data unit if the bandwidth constraint is satisfied, if a local storage constraint has been satisfied and if the received data unit is redundant with a previously buffered data unit, comprises network control data, is associated with a device that has already been observed more frequently than other devices or originates from a low threat wireless node; (vi) aggregate the received data unit with a previously buffered data unit if the bandwidth constraint is satisfied and if the received data unit is compatible with the previously buffered data unit; and (vii) transmit a selected buffered data unit to the to the monitoring processor via the communication interface at a point in time after receipt based upon the bandwidth constraint and bandwidth usage.
-
-
19. A system of monitoring a wireless network, the system comprising:
-
(a) receiving means for receiving a plurality of data units from one or more wireless nodes; (b) buffer means for deterministically accepting for buffering a received data unit of the plurality of data units from the receiving means if a bandwidth constraint is satisfied, aggregating the deterministically accepted data unit with a previously buffered data unit if the deterministically accepted data unit is compatible with the previously buffered data unit, discarding the deterministically accepted data unit if a storage constraint is satisfied and if the deterministically accepted data unit is redundant with a previously buffered data unit, comprises network control data, is associated with a device that has already been observed more frequently than other devices or originates from a low threat wireless node; and (c) output means for immediately transmitting a received data unit to a monitoring processor if the bandwidth constraint is not satisfied and for transmitting a buffered data unit to the monitoring processor at a point in time after receipt based upon the bandwidth constraint and bandwidth usage; wherein deterministically accepting comprises a sequential traversal of the one or more wireless nodes, a selection based upon amount of buffered data for each wireless node in the one or more wireless nodes, a selection based upon a threat level for each wireless node in the one or more wireless nodes or combinations thereof.
-
Specification