Minimizing coverage holes in a communication network
First Claim
1. A method for network communication, the method comprising:
- receiving a first message at a client device from a first network device of a communication network;
determining, by the client device, that the first message includes a reserved network identifier indicating that the first network device is configured in a temporary access point configuration;
determining, by the client device, whether a non-reserved network identifier is received at the client device from a second network device of the communication network, in response to determining that the first message includes the reserved network identifier; and
determining that the client device is in a coverage hole, in response to determining that the non-reserved network identifier is not received at the client device.
1 Assignment
0 Petitions
Accused Products
Abstract
Access point functionality of a network device may be disabled, resulting in a coverage hole in a communication network and affecting performance of a client device. Various techniques can be implemented for detecting and minimizing coverage holes. In one embodiment, the network device can selectively establish a communication link with the client device depending on whether the client device is in a coverage hole and depending on whether the client device can detect another access point in the communication network. In some embodiments, the client device can determine that it is in a coverage hole in response to detecting a reserved SSID and can accordingly notify a central coordinator of the communication network. In some embodiments, the central coordinator can identify the network device (with disabled access point functionality) that can eliminate the coverage hole and can cause the network device to enable its access point functionality.
42 Citations
29 Claims
-
1. A method for network communication, the method comprising:
-
receiving a first message at a client device from a first network device of a communication network; determining, by the client device, that the first message includes a reserved network identifier indicating that the first network device is configured in a temporary access point configuration; determining, by the client device, whether a non-reserved network identifier is received at the client device from a second network device of the communication network, in response to determining that the first message includes the reserved network identifier; and determining that the client device is in a coverage hole, in response to determining that the non-reserved network identifier is not received at the client device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A first network device comprising:
-
a processor; and a coverage hole detection unit coupled with the processor, the coverage hole detection unit configured to; receive a first message from a second network device of a communication network; determine that the first message includes a reserved network identifier indicating that the second network device is configured in a temporary access point configuration; determine whether a non-reserved network identifier is received from a third network device of the communication network, in response to determining that the first message includes the reserved network identifier; and determine that the first network device is in a coverage hole, in response to determining that the non-reserved network identifier is not received at the first network device. - View Dependent Claims (19, 20, 21, 22, 23, 24)
-
-
25. A non-transitory machine-readable storage medium having machine executable instructions stored therein, the machine executable instructions comprising instructions to:
-
receive a first message at a client device from a first network device of a communication network; determine that the first message includes a reserved network identifier indicating that the first network device is configured in a temporary access point configuration; determine whether a non-reserved network identifier is received from a second network device of the communication network, in response to determining that the first message includes the reserved network identifier; and determine that the client device is in a coverage hole, in response to determining that the non-reserved network identifier is not received at the client device. - View Dependent Claims (26, 27, 28, 29)
-
Specification