Albert Young - Cupertino CA, US BoFu Chen - Fremont CA, US Bob O'Hara - Santa Clara CA, US Seema Nayek - San Jose CA, US Tim Schardt - San Jose CA, US
Assignee:
3Com Corporation - Santa Clara CA
International Classification:
G06F015/16 H04L012/43
US Classification:
709232, 709224, 709230, 370447, 370458, 370461
Abstract:
A method and system for increasing the overall network throughput over a wireless local area network (WLAN). Specifically, in one embodiment of the present invention, the dynamic selection of an initial value for a contention window in the Distributed Coordinated Function (DCF) mode is determined according to the load conditions over the WLAN in a method and system. Stations and access points within a WLAN monitor conditions within the network to establish an initial value for the contention window, also called a minimum contention window value, which is lower than that set by the IEEE 802. 11 communication standard. Some factors to consider in determining the load conditions include but are not limited to the following: number of transmissions; number of receptions; and number of collisions.
Method And System For Improving Throughput Over Wireless Local Area Networks With Mode Switching
Albert Young - Cupertino CA, US BoFu Chen - Fremont CA, US Bob O'Hara - Santa Clara CA, US Seema Nayek - San Jose CA, US Tim Schardt - San Jose CA, US
Assignee:
3Com Corporation - Santa Clara CA
International Classification:
H04L 12/413
US Classification:
370445, 370338, 370462
Abstract:
A method and system for increasing the overall network throughput over a wireless local area network (WLAN). Specifically, in one embodiment of the present invention, the dynamic switching between the Distributed Coordination Function (DCF) and Point Coordination Function IEEE 802. 11 access modes is determined according to the load conditions over the WLAN in a method and system. Stations and access points within a WLAN monitor conditions within the network to determine which access mechanism is most optimum for the current load conditions. Some factors to consider in determining the load conditions include but are not limited to the number of transmissions, number of receptions, and number of collisions.
Protected Mutual Authentication Over An Unsecured Wireless Communication Channel
Albert Young - Cupertino CA, US Bob O'Hara - Santa Clara CA, US Danny M. Nessett - Fremont CA, US Joe Tsai - Saratoga CA, US BoFu Chen - Fremont CA, US
Assignee:
3Com Corporation - Santa Clara CA
International Classification:
H04L 9/00 H04K 1/00
US Classification:
726 5, 713176, 380270, 726 14
Abstract:
A process for mutual authentication of users and networks over an unsecured wireless communication channel. In one embodiment, sensitive information (e. g. , passwords) is not communicated over the unsecured channel. Rather, hashed representations of user identifiers, passwords, etc. , and randomly generated numbers are communicated between the client and the network during the log-in process. The representations may be encrypted with a one-way hash function such that it is not computationally feasible for an eavesdropper to decrypt. In one embodiment, the representation may be generated based on the user identifier, password and/or MAC address of a wireless LAN card.
Using A Key Lease In A Secondary Authentication Protocol After A Primary Authentication Protocol Has Been Performed
Danny M. Nessett - Fremont CA, US Albert Young - Cupertino CA, US Bob O'Hara - Santa Clara CA, US Joe Tsai - Saratoga CA, US BoFu Chen - Fremont CA, US
Assignee:
3Com Corporation - Santa Clara CA
International Classification:
H04L009/00
US Classification:
713168, 713155, 713158, 713171, 380247
Abstract:
The present invention provides a method and system for using a key lease in a secondary authentication protocol after a primary authentication protocol has been performed. In one embodiment, the primary authentication protocol comprises a strong, secure, computationally complex authentication protocol. Moreover, the secondary authentication protocol comprises a less complex (compared to the primary authentication protocol) and less secure (compared to the primary authentication protocol) authentication protocol which can be performed in a length of time that is shorter than a length of time required to perform the primary authentication protocol. In one embodiment, a wireless client electronic system (WC) completes the primary authentication protocol with a wireless network access point electronic system of a wireless network (AP). When the WC is required to authenticate with another AP, the WC authenticates itself with another AP by using the secondary authentication protocol. However, the WC is required to periodically complete the primary authentication protocol, guarding against the possibility that the secondary authentication protocol may be exploited by an unauthorized intruder to attack the wireless network.
Youtube
Bob O'Hara - Pecha Kucha - Yestermorrow 30th ...
As part of the Yestermorrow Design/Build School's 30 Anniversary, 14 p...
Category:
Education
Uploaded:
17 Jun, 2010
Duration:
6m 59s
Scarlett O'hara Interview w/ Robert Herrera
Robert Herrera interviews Scarlett O'hara while on the Brodeo Tour 201...
Category:
Music
Uploaded:
17 Jan, 2011
Duration:
4m
Bob Royal #18 O'Hara WR Class of 09'
Bob Royal #18 O'Hara WR Class of 09'
Category:
Sports
Uploaded:
20 Dec, 2008
Duration:
4m 49s
Branden O'Hara #44 of Bob Jones High School 2...
Branden O'Hara #44 Bob Jones High School Madison, AL Coach: Kevin Rose...
Category:
Sports
Uploaded:
16 Feb, 2010
Duration:
4m 37s
Scarlett O'hara - Welcome To The Brodeo [Live]
Scarlett O'hara live video while on the Brodeo Tour 2011 at Chain Reac...
Category:
Music
Uploaded:
10 Feb, 2011
Duration:
2m 44s
Lee vs. O'Hara Scene - Enter the Dragon Movie...
Lee (Bruce Lee) soundly defeats O'Hara (Robert Wall) in a tournament f...
Category:
Film & Animation
Uploaded:
27 May, 2011
Duration:
2m 43s
Enter The Dragon - Fight With O'Hara
Bruce Lee owns it up.
Category:
Entertainment
Uploaded:
19 Sep, 2007
Duration:
3m 43s
Baddest Fight Scenes EVER! - Enter the Dragon...
By "baddest" we mean the BEST fight scenes EVER! Enter the Dragon - (1...