Network World

research center:

Wireless / Mobile

Search / DocFinder:
Advanced search
Research Centers
Vendor Solutions
Site Resources
Special Issues

Signature SeriesEnterprise All-Stars
Enterprise All-Stars NEW

You in action
You in action

New Data Center The New Data Center: Wireless & Mobility
Wireless & Mobility NEW

The New Data Center: Server Virtualization
Server Virtualization

Error 404--Not Found

Error 404--Not Found

From RFC 2068 Hypertext Transfer Protocol -- HTTP/1.1:

10.4.5 404 Not Found

The server has not found anything matching the Request-URI. No indication is given of whether the condition is temporary or permanent.

If the server does not wish to make this information available to the client, the status code 403 (Forbidden) can be used instead. The 410 (Gone) status code SHOULD be used if the server knows, through some internally configurable mechanism, that an old resource is permanently unavailable and has no forwarding address.


A proposed IEEE standard, 802.11k aims to provide key client feedback to wireless-LAN access points and switches. The proposed standard defines a series of measurement requests and reports that detail Layer 1 and Layer 2 client statistics. In most cases, access points or WLAN switches ask clients to report data, but in some cases clients might request data from access points.

Because 802.11k is designed to be implemented in software, existing WLAN equipment can be upgraded to support it. For the standard to be effective, both clients (WLAN cards and adapters) and infrastructure (access points and WLAN switches) will need to support it.

Here are some of the measurements 802.11k defines:

• Roaming decisions.
• RF channel knowledge.
• Hidden nodes.
• Client statistics.
• Transmit Power Control (TCP).

To improve roaming decisions, access points or WLAN switches can provide a site report to clients. The standard defines a beacon request, in which an access point asks a client to go to a specific channel and report all the access point beacons it hears. The access point collects the data, and it or a WLAN switch will analyze the beacon information, looking at details such as what services and encryption types each access point supports and how strongly the client heard the access point. Then the switch or access point generates an ordered list of access points, from best to worst service, called the site report.

Currently, access points and clients cannot share channel information. With 802.11k, an access point could have a client build a "noise histogram," which will display all non-802.11 energy on that channel. An access point also can request data about channel load or how long the channel was used during a given time. An access point or WLAN switch then will know if there's too much interference or traffic on a channel to use it for WLAN services.

From 802.11k makes WLANs measure up, Network World Tech Update, 03/29/04.

Additional resources

Discuss 802.11k
In our 802.11k forum.

Add a comment

NOTE: Comments are reviewed by an editor before being posted.

Your rating of this resource (with 5 the best)
1 2 3 4 5


Your user name (what other users will see on the review):

Your real name (for our records only):

Your e-mail (ditto):

Your comments (Use a blank line to separate paragraphs):


Sign up for one of NWW's Wireless & Mobile newsletters.

Wireless in the Enterprise
Cool Tools alert
Wireless News Alert
View all newsletters

Email Address:

Vendor Solutions

White Papers


Research Centers: Applications | Application Development | Applications-Standards | Applications Vendor Solutions | Collaboration | CRM / ERP | Databases | Directories | Grid Computing | Java | Messaging | .Net | RFID | SOAP | Web Services | XML | Convergence & VoIP | Convergence Regulatory | Convergence Services | Convergence Standards | Convergence VoIP Vendor Solutions | Video | IP PBX | SIP | VoIP | VoIP Services | E-Business | DNS | RFID | Supply Chain | Web security LANs & Routers | Acceleration | Gigabit Ethernet | Lans-Standards | Routers | Wireless LANs | Network Management | Application Management | Desktop Management | Management Test Patch Management | Operating Systems | Linux | NetWare | Unix | Windows Outsourcing | Managed Services | Offshoring Security | Firewalls - VPN - Intrusion | Identity management | Patch Management | Microsoft Security | Privacy | Security Standards | Spam & Phishing | Viruses & worms | Web Security | Wireless Security | Servers & Desktop | Backup-Recovery | DataCenter | Desktops | Desktop Management | Grid | Servers | Server Blades | Servers Desktops | Utility Computing | Small & Medium Business | Broadband | Telework | Handhelds & PDAs | Home Networking | Security | Storage | Compliance | Infiniband | Network-Attached Storage | SANs | Storage Management | Storage Virtualization | Virtualization | Vendor News | Bankruptcy | Earnings | Lawsuits | Layoffs | Standards | Start Ups | Vendor Markets | Education | Financial | Healthcare | HIPAA | Manufacturing | Retail | Wide Area Network | Broadband | Carriers | Frame Relay | Metro Ethernet | MPLS | Service providers | Wireless services | Wireless & Mobile | Wireless LANs | PDAs & handhelds | Wireless Security | Wireless Services | Wireless Standards | Wireless Switches | All Company Profiles