Network control

ABSTRACT

Systems and methods for managing a network are disclosed. For example, systems and methods are disclosed for selectively disabling and/or otherwise configuring devices to avoid interference, overlapping service, and/or the like. Signal information for nearby devices can be detected and analyzed to determine device configuration settings.

BACKGROUND

A network such as a local area network can comprise one or more networkdevices such as access points (AP) to provide a means for one or moreuser devices to communicate with and/or over the network. A networkdevice can comprise a device that allows wired and/or wireless userdevices to connect to a network using Wi-Fi, Bluetooth, or otherstandards. A network device can be configured to provide access to oneor more services (e.g., access to a private network or a public network,access to network-related services). In certain locations, where manynetwork devices may be present, network devices may encounter or evenprovide interfering wireless signals. These and other shortcomings areaddressed by the present disclosure.

SUMMARY

It is to be understood that both the following general description andthe following detailed description are exemplary and explanatory onlyand are not restrictive. Methods and systems for providing services(e.g., network connectivity, broadband services, etc.) to one or moreuser devices or clients, are disclosed. In an aspect, the presentmethods and systems allow for configuring a network to avoid or removecertain conflicting and/or redundant wireless services provided bymultiple devices. For example, a service provider may provide (e.g., tousers) devices that broadcast the same or similar wireless networks, forexample, with the same or associated service set identifiers (SSID). Inthis situation, and others, it may be desired to selectively enable ordisable, determine network settings, and/or otherwise configure thedevices to avoid interference, overlapping service, and/or the like. Forexample, the methods and systems described herein, in one aspect, canselectively disable the provision of one or more services. As anotherexample, radio frequency (RF) scanning can be used to selectivelydetermine channel selection for transmitting one or more services viaRF.

In an aspect, an example method can comprise providing a first via aplurality of first devices. At least a portion of the plurality of firstdevices can be configured to provide access to respective secondnetworks. A second local network can be provided from a second deviceupon initialization of the second device, and signal informationrelating to the plurality of first devices can be determined at thesecond device. A coverage gap of the wide area network can be identifiedbased on the signal information. An access mechanism to facilitateaccess to the wide area network via the second network device can beprovided based on the identification of the coverage gap.

In another aspect, an example method can comprise receiving signalinformation related to at least one of a plurality of devices configuredto provide access to a wide area network and respective local networks.Coverage of the wide area network within range of a first device of theplurality of devices can be determined, a network signal for the widearea network provided by the first device can be disabled. The networksignal can be configured to provide access to the wide area network whenenabled.

In another aspect, an example method can comprise receiving signalinformation related to at least one of a plurality of devices configuredto provide access to a wide area network and respective local networks.Coverage of the wide area network within range of a first device of theplurality of devices can be determined, and a network signal for thewide area network can be enabled. The network signal can be configuredto provide access to the wide area network from the first device.

In another aspect, methods can comprise determining signal information.A determination can be made whether to provide access to a network via anetwork device. The determination can be based on the signalinformation. Access to the network can be facilitated via the networkdevice based on the determination of whether to provide access to thefirst network.

In another aspect, methods can comprise receiving signal informationrelating to at least one network device that is providing access to afirst network from at least one respective first location. Adetermination can be made, based on the signal information, whether toprovide access to the first network at a second location. Access can beprovided at the second location to at least one of the first network anda second network based upon the determination of whether to provideaccess to the first network.

In a further aspect, methods can comprise providing, from a firstdevice, a network signal for a first network. Signal informationrelating to at least one second device providing access to the firstnetwork can be received. The network signal for the first networkprovided from the first device can be disabled based on the signalinformation.

Additional advantages will be set forth in part in the description whichfollows or may be learned by practice. The advantages will be realizedand attained by means of the elements and combinations particularlypointed out in the appended claims. It is to be understood that both theforegoing general description and the following detailed description areexemplary and explanatory only and are not restrictive, as claimed.

BRIEF DESCRIPTION OF THE DRAWINGS

The accompanying drawings, which are incorporated in and constitute apart of this specification, illustrate embodiments and together with thedescription, serve to explain the principles of the methods and systems:

FIG. 1 is a block diagram of an exemplary system and network;

FIG. 2 is a block diagram of an exemplary computing device;

FIG. 3 is a block diagram of an exemplary system and network;

FIG. 4 is a block diagram of an exemplary system and network;

FIG. 5 is a flow chart of an exemplary method;

FIG. 6 is a flow chart of another exemplary method;

FIG. 7 is a flow chart of another exemplary method;

FIG. 8 is a flow chart of another exemplary method;

FIG. 9 is a flow chart of another exemplary method;

FIG. 10 is a flow chart of another exemplary method; and

FIG. 11 is a flow chart of another exemplary method.

DETAILED DESCRIPTION

Before the present methods and systems are disclosed and described, itis to be understood that the methods and systems are not limited tospecific methods, specific components, or to particular implementations.It is also to be understood that the terminology used herein is for thepurpose of describing particular embodiments only and is not intended tobe limiting.

As used in the specification and the appended claims, the singular forms“a,” “an,” and “the” include plural referents unless the context clearlydictates otherwise. Ranges may be expressed herein as from “about” oneparticular value, and/or to “about” another particular value. When sucha range is expressed, another embodiment includes from the oneparticular value and/or to the other particular value. Similarly, whenvalues are expressed as approximations, by use of the antecedent“about,” it will be understood that the particular value forms anotherembodiment. It will be further understood that the endpoints of each ofthe ranges are significant both in relation to the other endpoint, andindependently of the other endpoint.

“Optional” or “optionally” means that the subsequently described eventor circumstance may or may not occur, and that the description includesinstances where said event or circumstance occurs and instances where itdoes not.

Throughout the description and claims of this specification, the word“comprise” and variations of the word, such as “comprising” and“comprises,” means “including but not limited to,” and is not intendedto exclude, for example, other components, integers or steps,“Exemplary” means “an example of” and is not intended to convey anindication of a preferred or ideal embodiment. “Such as” is not used ina restrictive sense, but for explanatory purposes.

Disclosed are components that can be used to perform the disclosedmethods and systems. These and other components are disclosed herein,and it is understood that when combinations, subsets, interactions,groups, etc. of these components are disclosed that while specificreference of each various individual and collective combinations andpermutation of these may not be explicitly disclosed, each isspecifically contemplated and described herein, for all methods andsystems. This applies to all aspects of this application including, butnot limited to, steps in disclosed methods. Thus, if there are a varietyof additional steps that can be performed it is understood that each ofthese additional steps can be performed with any specific embodiment orcombination of embodiments of the disclosed methods.

The present methods and systems may be understood more readily byreference to the following detailed description of preferred embodimentsand the examples included therein and to the Figures and their previousand following description.

As will be appreciated by one skilled in the art, the methods andsystems may take the form of an entirely hardware embodiment, anentirely software embodiment, or an embodiment combining software andhardware aspects. Furthermore, the methods and systems may take the formof a computer program product on a computer-readable storage mediumhaving computer-readable program instructions (e.g., computer software)embodied in the storage medium. More particularly, the present methodsand systems may take the form of web-implemented computer software. Anysuitable computer-readable storage medium may be utilized including harddisks, CD-ROMs, optical storage devices, or magnetic storage devices.

Embodiments of the methods and systems are described below withreference to block diagrams and flowchart illustrations of methods,systems, apparatuses and computer program products. It will beunderstood that each block of the block diagrams and flowchartillustrations, and combinations of blocks in the block diagrams andflowchart illustrations, respectively, can be implemented by computerprogram instructions. These computer program instructions may be loadedon a general purpose computer, special purpose computer, or otherprogrammable data processing apparatus to produce a machine, such thatthe instructions which execute on the computer or other programmabledata processing apparatus create a means for implementing the functionsspecified in the flowchart block or blocks.

These computer program instructions may also be stored in acomputer-readable memory that can direct a computer or otherprogrammable data processing apparatus to function in a particularmanner, such that the instructions stored in the computer-readablememory produce an article of manufacture including computer-readableinstructions for implementing the function specified in the flowchartblock or blocks. The computer program instructions may also be loadedonto a computer or other programmable data processing apparatus to causea series of operational steps to be performed on the computer or otherprogrammable apparatus to produce a computer-implemented process suchthat the instructions that execute on the computer or other programmableapparatus provide steps for implementing the functions specified in theflowchart block or blocks.

Accordingly, blocks of the block diagrams and flowchart illustrationssupport combinations of means for performing the specified functions,combinations of steps for performing the specified functions and programinstruction means for performing the specified functions. It will alsobe understood that each block of the block diagrams and flowchartillustrations, and combinations of blocks in the block diagrams andflowchart illustrations, can be implemented by special purposehardware-based computer systems that perform the specified functions orsteps, or combinations of special purpose hardware and computerinstructions.

The methods and systems described herein, in one aspect, can provideservices (e.g., network connectivity, broadband services, etc.) to oneor more user devices or clients. In another aspect, the methods andsystems described herein can use a radio frequency (RF) scan or otherinterference detection to determine whether or not a particular SSIDshould be transmitted. As an example, the RF scan can be used todetermine a number of service set identifiers (SSID) that are beingtransmitted on one or more RF channels. As another example, the RF scancan be used to determine a noise floor, a number of SSIDs with the sameor associated name, one or more SSIDs or devices with a signal strength(e.g., quality, intensity) received above a configurable threshold,and/or channel activity and/or channel utilization that are withinconfigurable thresholds. The RF scan can also determine a receivedsignal strength indicator (RSSI) associated with one or more of theSSIDs. A determination can be made to select one of a plurality of RFchannels to transmit one or more SSIDs. As an example, an AP can beconfigured (e.g., automatically self-configured) to transmit or suppresstransmission of an SSID on the select RF channel.

In one aspect of the disclosure, a system can be configured to provideservices such as network-related services. FIG. 1 illustrates variousaspects of an exemplary environment in which the present methods andsystems can operate. The present disclosure is relevant to systems andmethods for providing services to a user device or a device that servesa user device, for example. Those skilled in the art will appreciatethat present methods may be used in various types of networks andsystems that employ both digital and analog equipment. One skilled inthe art will appreciate that provided herein is a functional descriptionand that the respective functions can be performed by software,hardware, or a combination of software and hardware.

The network and system can comprise a user device 102 in communicationwith a computing device 104, such as a server, for example. Thecomputing device 104 can be disposed locally or remotely relative to theuser device 102. As an example, the user device 102 and the computingdevice 104 can be in communication via a network 105. The network 105can comprise one or more networks, such as a first network and aplurality of second network. The first network can comprise a wide areanetwork (e.g., a content network, service network, provider network, theInternet), public network, open network, provider managed network,non-user managed network, provider controlled network, non-usercontrolled network, and/or the like. An example second network cancomprise a local network, private network, closed network, user managednetwork, user controlled network, user deployed network, and/or thelike. Other forms of communications can be used, such as wired andwireless telecommunication channels, for example.

In an aspect, the user device 102 can be an electronic device, such as acomputer, a smartphone, a laptop, a tablet, a set top box, a displaydevice, or other device capable of communicating with the computingdevice 104. As an example, the user device 102 can comprise acommunication element 106 for providing an interface to a user tointeract with the user device 102 and/or the computing device 104. Thecommunication element 106 can be any interface for presentinginformation to the user and receiving a user feedback, such as aapplication client or a web browser (e.g., Internet Explorer, MozillaFirefox, Google Chrome, Safari, or the like). Other software, hardware,and/or interfaces can be used to provide communication between the userand one or more of the user device 102 and the computing device 104. Asan example, the communication element 106 can request or query variousfiles from a local source and/or a remote source. As a further example,the communication element 106 can transmit data to a local or remotedevice, such as the computing device 104.

In an aspect, the user device 102 can be associated with a useridentifier or device identifier 108. As an example, the deviceidentifier 108 can be any identifier, token, character, string, or thelike, for differentiating one user or user device (e.g., user device102) from another user or user device. In a further aspect, the deviceidentifier 108 can identify a user or user device as belonging to aparticular class of users or user devices. As a further example, thedevice identifier 108 can comprise information relating to the userdevice, such as a manufacturer, a model or type of device, a serviceprovider associated with the user device 102, a state of the user device102, a locator, and/or a label or classifier. Other information can berepresented by the device identifier 108.

In an aspect, the device identifier 108 can comprise an address element110 and a service element 112. In an aspect, the address element 110 canbe an internet protocol address, a MAC address, a network address, anInternet address, or the like. As an example, the address element 110can be relied upon to establish a communication session between the userdevice 102 and the computing device 104 or other devices and/ornetworks. As a further example, the address element 110 can be used asan identifier or locator of the user device 102. In an aspect, theaddress element 110 can be persistent for a particular network and/orlocation.

In an aspect, the service element 112 can comprise an identification ofa service provider associated with the user device 102 and/or with theclass of user device 102. As an example, the service element 112 cancomprise information relating to or provided by a communication serviceprovider (e.g., Internet service provider) that is providing or enablingcommunication services to the user device 102. As a further example, theservice element 112 can comprise information relating to a preferredservice provider for one or more particular services relating to theuser device 102. In an aspect, the address element 110 can be used toidentify or retrieve the service element 112, or vice versa. As afurther example, one or more of the address element 110 and the serviceelement 112 can be stored remotely from the user device 102 andretrieved by one or more devices, such as the user device 102 and thecomputing device 104. Other information can be represented by theservice element 112.

In an aspect, the computing device 104 can be a server for communicatingwith the user device 102. As an example, the computing device 104 cancommunicate with the user device 102 for providing services. In anaspect, the computing device 104 can allow the user device 102 tointeract with remote resources, such as data, devices, and files. As anexample, the computing device can be configured as central location(e.g., a headend, or processing facility), which can receive content(e.g., data, input programming) from multiple sources. The computingdevice 104 can combine the content from the various sources and candistribute the content to user (e.g., subscriber) locations via adistribution system.

In an aspect, the computing device 104 can manage the communicationbetween the user device 102 and a database 114 for sending and receivingdata therebetween. As an example, the database 114 can store a pluralityof data sets (e.g., mapped identifiers, relational tables, user deviceidentifiers (e.g., identifier 108) or records, network deviceidentifiers (e.g., identifier 118), or other information). As a furtherexample, the user device 102 can request and/or retrieve a file from thedatabase 114. In an aspect, the database 114 can store informationrelating to the user device 102, such as the address element 110 and/orthe service element 112. As an example, the computing device 104 canobtain the device identifier 108 from the user device 102 and retrieveinformation from the database 114, such as the address element 110and/or the service elements 112. As another example, the computingdevice 104 can obtain the address element 110 from the user device 102and can retrieve the service element 112 from the database 114, or viceversa. As a further example, the computing device 104 can obtain a MACaddress from the user device 102 and can retrieve a local IP addressfrom the database 114. As such, the local IP address can be provisionedto the user device 102, for example, as the address element 110 tofacilitate interaction between the user device 102 and a network (e.g.,LAN). Any information can be stored in and retrieved from the database114. The database 114 can be disposed remotely from the computing device104 and accessed via direct or indirect connection. The database 114 canbe integrated with the computing system 104 or some other device orsystem.

In an aspect, one or more network devices 116 can be in communicationwith a network, such as network 105. As an example, one or more of thenetwork devices 116 can facilitate the connection of a device, such asuser device 102, to the network 105. As a further example, one or moreof the network devices 116 can be configured as a network gateway. In anaspect, one or more network devices 116 can be configured to allow oneor more wireless devices to connect to a wired and/or wireless networkusing Wi-Fi, Bluetooth or similar standard.

In an aspect, the network devices 116 can be configured as a meshnetwork. As an example, one or more network devices 116 can comprise adual band wireless network device. As an example, the network devices116 can be configured with a first service set identifier (SSID) (e.g.,associated with a user network or private network) to function as alocal network for a particular user or users. As a further example, thenetwork devices 116 can be configured with a second service setidentifier (SSID) (e.g., associated with a public/community network or ahidden network) to function as a secondary network or redundant networkfor connected communication devices.

In an aspect, one or more network devices 116 can comprise an identifier118. As an example, one or more identifiers can be a media accesscontrol address (MAC address). As a further example, one or moreidentifiers 118 can be a unique identifier for facilitatingcommunications on the physical network segment. In an aspect, each ofthe network devices 116 can comprise a distinct identifier 118. As anexample, the identifiers 118 can be associated with a physical locationof the network devices 116.

In an aspect, the user device 102 can connect to a first network, suchas a LAN associated with a first SSID, via a network device (e.g.,network device 116, gateway device, computing device 104, server,router, etc.) As an example, the user device 102 can discover a beacon120 transmitted (e.g., wirelessly) by the network device 116. The beacon120 can comprise a beacon frame. The beacon 120 can comprise informationto facilitate a connection between the user device 102 and the networkdevice 116.

In an aspect, the beacon 120 and/or an SSID can be transmitted over oneor more channels or frequency bands. The user device 102 can beconfigured to support 2.4 GHZ and 5 GHZ bands for WiFi. Within the 2.4Ghz band, multiple channels (e.g., channels 1-11 (in the United States)and 1-14 (outside the United States) can be used. The 2.4 GHz band cancomprise 2412 Mhz-2484 Mhz. The 5 Ghz band can comprise one or morechannels governed by many possible regulations between channel 7 and196, for example, between 4915 Mhz and 5825 Mhz. Any number of channelswhere regulations allow can be used to broadcast a beacon (e.g., beacon120) and transmit data.

In another aspect, the methods and systems described herein can use anRF scan to determine a number of service set identifiers (SSID) that arebeing transmitted on one or more RF channels. An RF scan can beimplemented via a receiver of an access point (or other configureddevice), whereby the receiver can analyze one or more signals currentlypresent on a given channel(s) for which the scan is occurring. Theaccess point can demodulate any signals which can be demodulated, andinterpret the content of the demodulated signal. The access point candetermine saturation of the given channel. Saturation can comprise theavailability of transmit time slots on the given channel. The accesspoint can determine the level of noise on the channel (e.g., for asignal that cannot be demodulated). The access point can determine alist of other devices which are transmitting on the given channel, aswell as the noise floor. Such a list of devices can include other accesspoints, WiFi clients, or transmitting devices. The RF scan can beperformed on one or multiple channels. As an example, the RF scan candetermine the number of APs that are sending a beacon for a particularSSID. As another example, the RF scan can be used to determine a noisefloor, a number of SSIDs with the same or similar name, one or moreSSIDs or devices with a strong signal (received above a configurablethreshold), channel activity and/or channel utilization. The RF scan canalso determine a received signal strength indicator (RSSI) associatedwith one or more of the SSIDs. A determination can be made to select oneof a plurality of RF channels to transmit or suppress one or more SSIDs.As an example, an AP can be configured (e.g., automaticallyself-configured) to transmit or suppress an SSID on the select RFchannel.

In an exemplary aspect, the methods and systems can be implemented on acomputing system, such as computing device 201 as illustrated in FIG. 2and described below. By way of example, one or more of the user device102 and the computing device 104 of FIG. 1 can be a computer asillustrated in FIG. 2. Similarly, the methods and systems disclosed canutilize one or more computers to perform one or more functions in one ormore locations. FIG. 2 is a block diagram illustrating an exemplaryoperating environment for performing the disclosed methods. Thisexemplary′ operating environment is only an example of an operatingenvironment and is not intended to suggest any limitation as to thescope of use or functionality of operating environment architecture.Neither should the operating environment be interpreted as having anydependency or requirement relating to any one or combination ofcomponents illustrated in the exemplary operating environment.

The present methods and systems can be operational with numerous othergeneral purpose or special purpose computing system environments orconfigurations. Examples of well known computing systems, environments,and/or configurations that can be suitable for use with the systems andmethods comprise, but are not limited to, personal computers, servercomputers, laptop devices, and multiprocessor systems. Additionalexamples comprise set top boxes, programmable consumer electronics,network PCs, minicomputers, mainframe computers, distributed computingenvironments that comprise any of the above systems or devices, and thelike.

The processing of the disclosed methods and systems can be performed bysoftware components. The disclosed systems and methods can be describedin the general context of computer-executable instructions, such asprogram modules, being executed by one or more computers or otherdevices. Generally, program modules comprise computer code, routines,programs, objects, components, data structures, etc. that performparticular tasks or implement particular abstract data types. Thedisclosed methods can also be practiced in grid-based and distributedcomputing environments where tasks are performed by remote processingdevices that are linked through a communications network. In adistributed computing environment, program modules can be located inboth local and remote computer storage media including memory storagedevices.

Further, one skilled in the art will appreciate that the systems andmethods disclosed herein can be implemented via a general-purposecomputing device in the form of a computing device 201. The componentsof the computing device 201 can comprise, but are not limited to, one ormore processors or processing units 203, a system memory 212, and asystem bus 213 that couples various system components including theprocessor 203 to the system memory 212. In the case of multipleprocessing units 203, the system can utilize parallel computing.

The system bus 213 represents one or more of several possible types ofbus structures, including a memory bus or memory controller, aperipheral bus, an accelerated graphics port, and a processor or localbus using any of a variety of bus architectures. By way of example, sucharchitectures can comprise an Industry Standard Architecture (ISA) bus,a Micro Channel Architecture (MCA) bus, an Enhanced ISA (EISA) bus, aVideo Electronics Standards Association (VESA) local bus, an AcceleratedGraphics Port (AGP) bus, and a Peripheral Component Interconnects (PCI),a PCI-Express bus, a Personal Computer Memory Card Industry Association(PCMCIA), Universal Serial Bus (USB) and the like. The bus 213, and allbuses specified in this description can also be implemented over a wiredor wireless network connection and each of the subsystems, including theprocessor 203, a mass storage device 204, an operating system 205,network software 206, network data 207, a network adapter 208, systemmemory 212, an Input/Output Interface 210, a display adapter 209, adisplay device 211, and a human machine interface 202, can be containedwithin one or more remote computing devices 214 a,b,c at physicallyseparate locations, connected through buses of this form, in effectimplementing a fully distributed system.

The computing device 201 typically comprises a variety of computerreadable media. Exemplary readable media can be any available media thatis accessible by the computing device 201 and comprises, for example andnot meant to be limiting, both volatile and non-volatile media,removable and non-removable media. The system memory 212 comprisescomputer readable media in the form of volatile memory, such as randomaccess memory (RAM), and/or non-volatile memory, such as read onlymemory (ROM). The system memory 212 typically contains data, such asnetwork data 207, and/or program modules, such as operating system 205and network software 206, that are immediately accessible to and/or arepresently operated on by the processing unit 203.

In another aspect, the computing device 201 can also comprise otherremovable/non-removable, volatile/non-volatile computer storage media.By way of example, FIG. 2 illustrates a mass storage device 204 whichcan provide non-volatile storage of computer code, computer readableinstructions, data structures, program modules, and other data for thecomputing device 201. For example and not meant to be limiting, a massstorage device 204 can be a hard disk, a removable magnetic disk, aremovable optical disk, magnetic cassettes or other magnetic storagedevices, flash memory cards, CD-ROM, digital versatile disks (DVD) orother optical storage, random access memories (RAM), read only memories(ROM), electrically erasable programmable read-only memory (EEPROM),solid state drives, and the like.

Optionally, any number of program modules can be stored on the massstorage device 204, including by way of example, an operating system 205and network software 206. Each of the operating system 205 and networksoftware 206 (or some combination thereof) can comprise elements of theprogramming and the network software 206. Network data 207 can also bestored on the mass storage device 204. Network data 207 can be stored inany of one or more databases known in the art. Examples of suchdatabases comprise, DB2®, Microsoft® Access, Microsoft® SQL Server,Oracle®, mySQL, PostgreSQL, and the like. The databases can becentralized or distributed across multiple systems.

In another aspect, the user can enter commands and information into thecomputing device 201 via an input device (not shown). Examples of suchinput devices comprise, but are not limited to, a keyboard, pointingdevice (e.g., a “mouse”), a microphone, a joystick, a scanner, tactileinput devices such as gloves, and other body coverings, and the likeThese and other input devices can be connected to the processing unit203 via a human machine interface 202 that is coupled to the system bus213, but can be connected by other interface and bus structures, such asa parallel port, game port, an IEEE 1394 Port (also known as a Firewireport), a serial port, or a universal serial bus (USB).

In yet another aspect, a display device 211 can also be connected to thesystem bus 213 via an interface, such as a display adapter 209. It iscontemplated that the computing device 201 can have more than onedisplay adapter 209 and the computer 201 can have more than one displaydevice 211. For example, a display device can be a monitor, an LCD(Liquid Crystal Display), or a projector. In addition to the displaydevice 211, other output peripheral devices can comprise components,such as speakers (not shown) and a printer (not shown) which can beconnected to the computing device 201 via Input/Output Interface 210.Any step and/or result of the methods can be output in any form to anoutput device. Such output can be any form of visual representation,including, but not limited to, textual, graphical, animation, audio,tactile, and the like. The display 211 and computing device 201 can bepart of one device, or separate devices.

The computing device 201 can operate in a networked environment usinglogical connections to one or more remote computing devices 214 a,b,c.By way of example, a remote computing device can be a personal computer,portable computer, a smart phone, a server, a router, a networkcomputer, a peer device or other common network node, and so on. Logicalconnections between the computing device 201 and a remote computingdevice 214 a,b,c can be made via a network 215, such as a local areanetwork (LAN) and a general wide area network (WAN). Such networkconnections can be through a network adapter 208. A network adapter 208can be implemented in both wired and wireless environments. Suchnetworking environments are conventional and commonplace in dwellings,offices, enterprise-wide computer networks, intranets, and the Internet.

For purposes of illustration, application programs and other executableprogram components, such as the operating system 205, are illustratedherein as discrete blocks, although it is recognized that such programsand components reside at various times in different storage componentsof the computing device 201, and are executed by the data processor(s)of the computer. An implementation of network software 206 can be storedon or transmitted across some form of computer readable media. Any ofthe disclosed methods can be performed by computer readable instructionsembodied on computer readable media. Computer readable media can be anyavailable media that can be accessed by a computer. By way of exampleand not meant to be limiting, computer readable media can comprise“computer storage media” and “communications media.” “Computer storagemedia” comprise volatile and non-volatile, removable and non-removablemedia implemented in any methods or technology for storage ofinformation, such as computer readable instructions, data structures,program modules, or other data. Exemplary computer storage mediacomprises, but is not limited to, RAM, ROM, EEPROM, flash memory orother memory technology, CD-ROM, digital versatile disks (DVD) or otheroptical storage, magnetic cassettes, magnetic tape, magnetic diskstorage or other magnetic storage devices, or any other medium which canbe used to store the desired information and which can be accessed by acomputer.

FIG. 3 illustrates an exemplary system and network. In an aspect, aplurality of nodes 302 a, 302 b, 302 c, 302 d can be in communicationwith one or more user devices 303 and a gateway 304 a. As an example,one or more nodes 302 a, 302 b, 302 c, 302 d can be a network device,router, switch, communication device, or the like. As another example,one or more user devices 303 can be an electronic device, such as acomputer, a smartphone, a laptop, a tablet, a set top box, a displaydevice, or other device capable of communicating with one or more of thenodes 302 a, 302 b, 302 c, 302 d of the network.

In an aspect, the user device 303 can be associated with a firstidentifier 305, such as a user identifier or device identifier. As anexample, the first identifier 305 can be any identifier, token,character, string, or the like, for differentiating one user or userdevice (e.g., user device 303) from another user or user device. In afurther aspect, the first identifier 305 can identify a user or userdevice as belonging to a particular class of users or user devices. As afurther example, the first identifier 305 can comprise informationrelating to the user device, such as a manufacturer, a model or type ofdevice, a service provider associated with the user device 303, a stateof the user device 303, a locator, and/or a label or classifier. Otherinformation can be represented by the first identifier 305. In anaspect, the first identifier 305 can be an internet protocol address, aMAC address, a network address, an Internet address, or the like. As anexample, the first identifier 305 can be relied upon to establish acommunication session between the user device 303 and the computingdevice 304 or other devices (e.g., nodes 302 a, 302 b, 302 c, 302 d)and/or networks. As a further example, the first identifier 305 can beused as an identifier or locator of the user device 303. In an aspect,the first identifier 305 can be persistent for a particular networkand/or location.

In an aspect, one or more of the nodes 302 a, 302 b, 302 c, 302 d can beconfigured to communicate with another of the nodes 302 a, 302 b, 302 c,302 d and/or the gateway 304 via one or more communication paths. In anaspect, the one or more communication paths can comprise one or moreuninterrupted communication links, sequential links, pre-defined pathsor links, and/or intervening nodes, Links can comprise a single point topoint connection between two devices or network devices. Paths cancomprise one or more links. As an example, one or more of thecommunication paths can comprise one or more of the nodes 302 a, 302 b,302 c, 302 d. As a further example, one or more of the nodes 302 a, 302b, 302 c, 302 d can be configured as a mesh network. In an aspect, oneore more of the communication paths can be configured to transmit one ormore services.

In an aspect, the nodes 302 a, 302 b, 302 c, 302 d can be configured asa network, such as a mesh network. As an example, the gateway 304 and/orone or more nodes 302 a, 302 b, 302 c, 302 d can comprise a dual bandwireless network device. As an example, a first service 307 a or networkcan be provided. The first service 307 a can be configured with a firstservice set identifier (SSID) (e.g., associated with a user network orprivate network) to function as a local network for a particular user orusers. As a further example, a second service 307 b or network can beprovided. The second service 307 b can be configured with a secondservice set identifier (SSID) (e.g., associated with a public/communitynetwork or a hidden network) to function as a secondary network orredundant network for connected communication devices.

In an aspect, one or more of the nodes 302 a, 302 b, 302 c, 302 d cancomprise an identifier 308 a, 308 b, 308 c, 308 d. As an example, one ormore identifiers can be a media access control address (MAC address).Any uniquely identifiable attribute that can be linked to a location canbe used as the identifier 308 a, 308 b, 308 c, 308 d. Such attributescan comprise one or more of an IP Address, serial number,latitude/longitude, geo-encoding, custom assigned unique identifier,global unique identifier (GUID), and the like. As a further example, oneor more identifiers 308 a, 308 b, 308 c, 308 d can be a uniqueidentifier for facilitating communications on the physical networksegment. In an aspect, each of the nodes 302 a, 302 b, 302 c, 302 d cancomprise a distinct identifier 308 a, 308 b, 308 c, 308 d. As anexample, the identifiers 308 a, 308 b, 308 c, 308 d can be associatedwith a physical location of the nodes 302 a, 302 b, 302 c, 302 d.

In an aspect, one or more nodes 302 a, 302 b, 302 c, 302 d can be incommunication with the gateway 304 a. As an example, one or more nodes302 a, 302 b, 302 c, 302 d and/or the gateway 304 a can be configured toallow one or more wireless devices to connect to a wired and/or wirelessnetwork using Wi-Fi, Bluetooth or similar standard. The gateway 304 acan comprise an identifier 309 a. As an example, one or more identifiers309 a can be a media access control address (MAC address). As a furtherexample, one or more identifiers 309 a can be a unique identifier forfacilitating communications on the physical network segment.

In an aspect, a computing device 310 can be in communication with anetwork device, such as gateway 304 a. As an example, the computingdevice 310 can be or comprise an application server, management device,auto-configuration server (ACS), AAA server, etc. In another aspect, thecomputing device 310 is located within a network, such as a wide areanetwork (WAN).

In an aspect, the user device 303 can connect to a first network via anetwork device, such as node 302 b. As an example, the user device 303can discover one or more beacons 312 a, 312 b transmitted (e.g.,wirelessly) by the node 302 b. The one or more beacons 312 a, 312 b cancomprise a beacon frame. The one or more beacons 312 a, 312 b cancomprise information to facilitate a connection between the user device303 and the network device 116. The one or more beacons 312 a, 312 b cancomprise or relate to one or more SSIDs. As an example, a first beacon312 a can be associated with a first SSID and/or a first service (e.g.,first service 307 a). As another example, a second beacon 312 b can beassociated with a second SSID and/or a second service (e.g., secondservice 307 b).

In an aspect, the one or more beacons 312 a, 312 b and/or an SSID can betransmitted over one or more channels or frequency bands. The userdevice 303 can be configured to support 2.4 GHZ and 5 GHZ bands forWiFi. Within the 2.4 Ghz band, multiple channels (e.g., channels 1-11(in the United States) and 1-14 (outside the United States) can be used.The 2.4 GHz band can comprise 2412 Mhz-2484 Mhz. The 5 Ghz band cancomprise one or more channels governed by many possible regulationsbetween channel 7 and 196, for example, between 4915 Mhz and 5825 Mhz.Any number of channels where regulations allow can be used to broadcasta beacon (e.g., one or more beacons 312 a, 312 b) and transmit data. Inanother aspect, the methods and systems described herein can use an RFscan to determine a number of service set identifiers (SSID) that arebeing transmitted on one or more RF channels. An RF scan can beimplemented via a receiver of an access point (or other configureddevice), whereby the receiver analyzes one or more signals currentlypresent on a given channel(s) for which the scan is occurring. Theaccess point can demodulate any signals, which can be demodulated, andinterpret the content of the demodulated signal. The access point candetermine saturation of the given channel. Saturation can comprise theavailability of transmit time slots on the given channel. The accesspoint can determine the level of noise on the channel (e.g., for asignal that cannot be demodulated). The access point can determine alist of other devices which are transmitting on the given channel, aswell as the noise floor. Such a list of devices can include other accesspoints, WiFi clients, or transmitting devices. The RF scan can beperformed on one or multiple channels. As an example, the RF scan candetermine the number of APs that are sending a beacon for a particularSSID. As another example, the RF scan can be used to determine a noisefloor, a number of SSIDs with the same name, one or more SSIDs ordevices with a signal received above a configurable threshold. The RFscan can also determine a received signal strength indicator (RSSI)associated with one or more of the SSIDs. A determination can be made toselect one of a plurality of RF channels to transmit one or more SSIDs.As an example, an AP can be configured (e.g., automaticallyself-configured) to transmit an SSID on the select RF channel.

The one or more nodes 302 a, 302 b, 302 c, 302 d and/or the gateway 304can inhibit the user device 303 from accessing one or more servicesprovided via the network device. For example, the one or more nodes 302a, 302 b, 302 c, 302 d and/or the gateway 304 may disable access to oneor more signals associated with a particular SSID (e.g., service 307 b),as illustrated in FIG. 4. As an example, the second beacon 312 b can besuppressed (e.g., disabled, not transmitted, decreased in the signalstrength and/or power, changed in the directionality and/or frequency ofthe signal) at least by the node 302 b, which may not allow the userdevice 303 to discover the SSID associated with the second service 307b. However, other nodes 302 a, 302 c, 302 d may provide the secondbeacon 312 b as an alternative to the suppressed second beacon 312 bfrom node 302 b if interference conditions allow such second beacon 312b to be transmitted elsewhere. As another example, the one or more nodes302 a, 302 b, 302 c, 302 d and/or the gateway 304 can allow access to ahome SSID, but block access to other SSID's transmitted via the one ormore nodes 302 a, 302 b, 302 c, 302 d and/or the gateway 304. Suchoperation can ensure that the user device 303 is receiving the servicethat it had subscribed to and that traffic is segregated accordingly foroptimal service. Such operation can be repeated for one or more devicesassociated with the one or more nodes 302 a, 302 b, 302 c, 302 d and/orthe gateway 304. When the user device 303 connects to a network devicethat does not have the filter information (e.g., template) the userdevice can access the service. As an example, inside a user premiseswhere noise is detected, the user device 303 may be blocked fromaccessing a public Wi-Fi network, while outside the premises where aparticular channel has a signal above a configured threshold, the userdevice 303 can be permitted to access the public Wi-Fi network. Asanother example, if a scan determines that the noise is at a level wherethe one or more nodes 302 a, 302 b, 302 c, 302 d is not capable ofproviding useable service the one or more nodes 302 a, 302 b, 302 c, 302d may not broadcast a particular SSID. As a further example if an RFscan determines that there are already 3 devices (e.g., nodes 302 a, 302b, 302 c, 302 d) broadcasting a given SSID received at a level of −50dbm or higher, adding an additional broadcast of the same SSID may notadd benefit to the service at that location and may hinder the serviceat locations near the edge of the transmit range by adding noise for theWiFi system as a whole.

An exemplary method 500 is shown in FIG. 5. At step 502, signalinformation can be determined. The signal information can relate to anenvironment (e.g., user premises, broadcast area, physical environment).The environment can comprise one or more networks, for example, a firstnetwork, a second network, a third network, and the like. The signalinformation can relate to a first network device, a second networkdevice, a third network device, and the like. The network devices can bewireless access points. The signal information can be determined by oneor more of the network devices, such as the first devices, seconddevice, third network device, and/or the like. For example, signalinformation determined at one or more of the network devices can beprovided and/or transmitted to other network devices. As anotherexample, signal information can be determined by each of the networkdevices independently. In an aspect, the signal information can relateto channel information, signal strength, signal identifiers, noise, or acombination thereof. In an aspect, the signal information can bedetermined as illustrated in FIG. 6, and described below.

The signal information can relate to multiple network devices, such as afirst network device, a second network device, a third network device,and the like. The network devices can comprise wireless access points.At least a portion of the signal information can be associated with afirst network. For example, the first network can comprise a publicnetwork (e.g., a public wireless network), wide area network, opennetwork, provider managed network, non-user managed network, providercontrolled network, non-user controlled network, and/or the like. Thefirst network can comprise a network in which one or more of the accesspoints use the same or a similar SSID. The first network (e.g., and/orservices thereof) can be accessed by users based on credentialsassociated with a service provider (e.g., internet service provider,content provider). For example, a service provider can provide networkdevices (e.g., gateways, routers, wireless access points) to multipleusers, such as a first user, a second user, a third user, and the like.The network devices can provide service (e.g., by default, or byenablement) to a public wireless network (e.g., first network), which isaccessible by other users who subscribe to services of the serviceprovider. For example, the first user and/or the other users can accessthe first network through any network device by using the users'credentials associated with the service provider.

One or more (or each) of the network devices can also provide respectivesecond networks (e.g., local networks, private networks, first closednetworks, user managed networks, user controlled networks, user deployednetworks). A respective second network can comprise a wireless networkhaving a different SSID than the first network and utilizing privatecredentials associated with and/or managed by a user, such as an owneror leasee of one of the network devices. For example a second user canmanage a second network device. For example, the second user can accessand/or manage a respective second network on the second network deviceusing his or her private credentials. Other users, such as the firstuser, who are in range (e.g., visitors, passersby, neighbors), such asthe first user, of one of the network devices (e.g., first networkdevice, second network device) can access the first network through thesecond network device and/or first network device according to theusers' credentials with the service provider. As a further illustration,the first user can access a respective second network on the firstnetwork device as well as the first network on the second networkdevice. The first user may be unable to access another respectivenetwork on the second network device without permission of the seconduser.

At step 504, a determination can be made whether to provide access tothe first network. For example, a determination can be made as towhether to provide access to the first network on the second networkdevice. The second user can receive (e.g., purchase, lease) the secondnetwork device from the service provider. When the second user powers onand/or restarts the second network device, the second network device canperform step 502, 504, and 506 as well as other configurationprocedures. The determination of step 504, can be based on thedetermined signal information from step 502. Such a determination can bebased, for example, on an insufficient number of other network devicesproviding access to the particular network, such that there is a need toprovide access to the particular network in the range of the secondnetwork device. For example, all or a portion of the signal information(e.g., illustrated in FIG. 6) can be analyzed, compared to one or morethresholds, and/or the like. After such analysis and/or comparison, thedetermination can be made to select one of a plurality of RF channels totransmit or suppress one or more signals associated with one or moreSSIDs. For example, the RF channel can be selected based on the noisefloor (e.g., lowest noise), saturation (e.g., lowest saturation), numberof devices (e.g., lowest number) transmitting on the channel, number ofdevices (e.g., lowest number) transmitting a particular or group ofSSIDs, RSSI (e.g., lowest RSSI), and/or other signal information.

At one aspect, it can be determined at step 504 to suppress and/ordisable access to a particular network, such as the first network. Sucha determination can be based, for example, on a number of other networkdevices already providing access to the particular network, such thatthere is no need to provide access to the particular network. Moreover,it can be determined that providing access to the particular networkmight be detrimental to overall network performance. As an example, anaccess point can be configured (e.g., automatically self-configured) totransmit, suppress, and/or disable a signal (e.g., and accompanyingSSID) on the select RF channel. A signal (e.g., and accompanying SSID)can be suppressed by decreasing the signal strength and/or power,changing the directionality and/or frequency of the signal, and/or thelike. A signal (e.g., and accompanying SSID) can be disabled by ceasingtransmission of a signal for the particular network, determining not toprovide the signal (e.g., during an initialization sequence), and/or thelike.

At step 506, an access mechanism can be provided to facilitate access tothe first network and/or a respective second network via the secondnetwork device. For example, the access mechanism can be provided basedon the determination of whether to provide access to the first network.The access mechanism can comprise a signal, beacon, and/or an SSID.Access to the first network can be conditioned upon verification of usercredentials associated with a service provider. Access can be providedto one or more of the first network and a respective second network viathe second network device. As an example, the first network device andthe second network device can be configured to provide access to thefirst network based on a first network identifier (e.g., SSID). Thesecond network device can be configured to provide access to a first ofthe respective second networks based on a second network identifier(e.g., identifier defined by and/or associated with second user). Thefirst network device can be configured to provide access to a second ofthe respective second networks based on a third network identifier(e.g., identifier defined by and/or associated with first user).

At step 508, access to the one or more networks can be suppressed and/ordisabled. For example, the access mechanism can be configured tosuppress and/or disable the first network and/or second network. Theaccess mechanism can disable (e.g., during operation or an operationinterruption) one or more signals (e.g., and discontinue use of theaccompanying SSID) configured to provide access to the first networkand/or second network. During an initialization sequence (e.g., afterpowering on or restarting a network device), an option to disable and/orsuppress can be selected thereby modifying or determining operation ofthe access mechanism.

In one aspect, the method 500 can be performed iteratively by a device,such as the second network device. For example, the second networkdevice can perform the method 500 after a triggering event, such as thepassage of a time period, performance of an initialization sequence,and/or the like. After the triggering event occurs, the method 500 canreturn to step 502 and perform some or all of the steps of the method500 again.

Another exemplary method 600 is shown in FIG. 6. The method 600 can beused for determining (e.g., receiving, accessing, detecting) signalinformation. It should be noted that the signal information can bedetermined by performing one or more the steps of FIG. 6. For example,the method 600 can implement step 502 of the method 500 of FIG. 5, step702 of the method 700 of FIG. 7, and step 804 of the method 800 of FIG.8. At step 602, a scan can be performed. The scan can be performed via areceiver of an access point (or other configured device), whereby thereceiver analyzes one or more signals currently present on one or morechannels for which the scan is occurring.

At step 604, a list of devices which are transmitting on one or morechannels can be determined (e.g., based on the scan). For example, aservice provider can maintain the list as network devices associatedwith the service provider are deployed in a network environment. Asanother example, a network device can listen to signal and collectinformation associated with the signals. The network device candetermine the devices by information in the signals, by communicatingdirectly with the network devices (e.g., requesting information), bycollecting network information and associating the network informationwith a device profile, and/or the like. The list of devices can includeaccess points, WiFi clients, transmitting devices, and/or the like.

At step 606, as number of, service set identifiers (SSID) that are beingtransmitted on one or more channels can be determined (e.g., based onthe scan and/or list of devices). For example, the SSIDs can betransmitted by the devices from the list of devices. As an illustration,a network device broadcasting a signal can provide an SSID as part ofthe signal. Network devices tuned to the one or more channels canreceive signals and determine the SSIDs from received signals. A devicelistening for all signals on a channel can collect and number the SSIDsas the signals are received.

At step 608, a number of devices providing a beacon for a particularSSID or group of SSIDs can be determined (e.g., based on the scan and/orlist of devices). For example, one or more devices can be configured toprovide a wireless network with the same or similar SSID. As anotherexample, the particular. SSID or group of SSIDs can be associated with aservice provider. A device listening for all signals with a particularSSID or group of SSIDs can collect and number the SSIDs as the signalsare received.

At step 610, a received signal strength indicator (RSSI) associated withone or more of the SSIDs can be determined. For example, the RSSI canindicate an amount of power present in a signal. The RSSI can beindicative of a distance from a device providing an SSID. A networkdevice listening for signals can receive the signals as the signalsarrive. The network device can measure the received signal strength bydigital and/or analog signal processing applied to the signal.

At step 612, one or more devices with a received signal strength (e.g.,RSSI) above or below one or more thresholds can be determined. Forexample, one or more thresholds can be stored and compared to thereceived signal strength. The one or more thresholds can be determinedbased on the features and/or characteristics of the environment and/orotherwise determined using techniques known to those of ordinary skillin the art. In one aspect, the one or more thresholds can be related toensuring consistent access to a specific network by multiple devices,preventing duplication of service, preventing disruptive levels ofinterference and/or the like. The one or more thresholds can vary overtime based on number of overall devices and other environmental factors.

At step 614, one or more signals (e.g., detected can by the scan) can bedemodulated. The demodulated signal can be interpreted and analyzed forrelevant information. For example, the signal can comprise userinformation (e.g., subscription information), content information (e.g.,content resolution), network information (e.g., bit rate), deviceinformation (e.g., device memory levels, processor usage, signal power),and/or other information. The information can be used to determineacceptable amounts of noise, service duplication, service quality,future bandwidth and/or signal needs, and/or to like. Such informationcan be used in determining whether to enable and/or disable a networksignal at a device.

At step 616, saturation of one or more channels can be determined (e.g.,based on the scan). Saturation can comprise the availability of transmittime slots on the given channel. During the scan, the receiver can beconfigured to request and/or listen for time slot information providedby one or more devices relevant to one or more channels. The saturationinformation can be indicative of overcrowding, duplication, and/or thelike of signals in the network environment. For example, the saturationlevels can be compared to certain thresholds in determining whether toenable and/or disable a network signal at a device.

At step 618, the level of noise on one or more channels (e.g., for asignal that cannot be demodulated) can be determined (e.g., based on thescan). For example, a noise floor can be determined for one or morechannels. For example, noise from a variety of sources that interrupts aparticular signal can be received and summed together to determine thenoise floor. A variety of other noise information can be determinedincluding but not limited to length of noise, strength of noise, amountof disruption to a signal caused by the noise, and/or the like. Forexample, the level of noise, noise floor, length of noise, strength ofnoise, disruption cause by noise, and/or the like can be indicative ofovercrowding, duplication, and/or the like of signals in the networkenvironment. Such noise information can be compared to certainthresholds in determining whether to enable and/or disable a networksignal at a device.

Another exemplary method 700 is shown in FIG. 7. At step 702, signalinformation can be received. The signal information be received fromand/or relate to one or more remote devices. For example, one or more(e.g., or each of a plurality of) network devices can determine signalinformation as illustrated by the method 600 of FIG. 6. The at least onenetwork device can provide the signal information to a first networkdevice. The first network device can be a central management deviceand/or a node in a local, regional, and/or wide area network in whichthe network devices are distributed. Whether acting as a node or acentral management device, the first network device can also beconfigured to independently determine at least a portion of the signalinformation as illustrated in FIG. 6. The signal information can relateto at least one network device providing access to a first network fromat least one respective first location. A location can comprise ageospatial area, network address (e.g., internet protocol address, mediaaccess control address), a group of network addresses (e.g., defined bya subnet mask or prefix), customer premises (e.g., apartment, home,office, property, vehicle), and/or the like. A location can be fixed ormobile, such as location associated with a mobile device and/or vehicle.In an aspect, the signal information can relate to channel information,signal strength, signal identifiers, noise, or a combination thereof.

At step 704, a determination can be made whether to provide access tothe first network at a second location. Such a determination can bebased, for example, on an insufficient number of other network devicesproviding access to the particular network, such that there is a need toprovide access to the particular network in the range of the secondnetwork device. For example, the second location can be located distant(e.g., outside the range of a wireless network) or proximate (e.g.,within range of a wireless network, close enough to cause noise,interference, disruption, or duplication of a wireless service) to thefirst location. By way of illustration, the first location can be afirst hotel unit, apartment, condo, townhome, business premises, unit,store, service center, and/or the like of a building and/or buildingcomplex. The second location can be a second hotel unit, apartment,condo, townhome, business premises, unit, store, service center, and/orthe like of the same building and/or building complex. If the secondlocation and first location are proximate to each other, network devicesat these locations may duplicate services and/or interfere with servicesprovided at the other location. For example, one or more of the networkdevices can provide access to the first network and identify the firstnetwork with same or similar identifier, thereby providing access to thefirst network at a variety of distant and/or proximate locations.

In one aspect, the first location can be a location determined by afirst user (e.g., subscriber). The second location can be a locationdetermined by a second user. For example, the network devices (e.g.,first network device, second network device) can be provided (e.g., as apurchase, lease, or the like) to the first user and second userrespectively by the service provider. The first user and second user candeploy the users' respective network devices at respective locationsaccording to the users' desires. Since the service provider does notcontrol the exact location of deployment, users, such as neighbors, mayboth deploy the users' network devices in proximate locations resultingin interference and/or duplication of services. For example, the serviceprovider may desire to provide public, open, and/or provider managedservices on network devices distributed to one or more private users.

In an aspect, the first network can comprise a public network (e.g., apublic wireless network), wide area network, open network, providermanaged network, non-user managed network, provider controlled network,non-user controlled network, and/or the like. The first network cancomprise a network in which one or more of the network devices areaccess points that use the same or a similar SSID. The first network(e.g., and/or services thereof) can be accessed by users based oncredentials associated with a service provider (e.g., internet serviceprovider, content provider). For example, a service provider can providenetwork devices (e.g., gateways, routers, wireless access points) tomultiple users, such as the first user and the second user. The networkdevices can provide service (e.g., by default, or by enablement) to awireless network (e.g., first network or branch thereof), which isaccessible by other users who subscribe to services of the serviceprovider. For example, the first user and/or the second user can accessthe first network by using the users' credentials associated with theservice provider.

One or more (or each) of the network devices can also provide respectivesecond networks (e.g., local networks, private networks, closednetworks, user managed networks, user controlled networks, user deployednetworks). A second network can comprise a private wireless networkhaving a different SSID than the first network and utilizing privatecredentials associated with and/or managed by a user, such as an owneror lease of one of the network devices. For example, a second user canmanage a second network device. For example, the second user can accessand/or manage a respective second network using his or her privatecredentials. Other users, such as the first user, who are in range(e.g., visitors, passersby, neighbors) of one of the network devices(e.g., first network device, second network device) can access the firstnetwork through the second network device and/or first network deviceaccording to their credentials with the service provider. As a furtherillustration, the first user can access a first of the respective secondnetworks on the first network device as well as the first network on thesecond network device. The first user may be unable to access a secondof the respective second networks on the second network device withoutpermission of the second user.

In an aspect, the determination of step 704 can be based on thedetermined signal information. For example, all or a portion of thesignal information (e.g., illustrated in FIG. 6) can be analyzed,compared to one or more thresholds, and/or the like. After such analysisand/or comparison, the determination can be made to select one of aplurality of RF channels to transmit or suppress one or more signalsassociated with one or more SSIDs. For example, the RF channel can beselected based on the noise floor (e.g., lowest noise), saturation(e.g., lowest saturation), number of devices (e.g., lowest number)transmitting on the channel, number of devices (e.g., lowest number)transmitting a particular or group of SSIDs, RSSI (e.g., lowest RSSI),and/or other signal information.

In an aspect, determining whether to provide access to the first networkat the second location can comprise determining not to provide a networksignal for the first network at the second location. Such adetermination can be based, for example, on a number of other networkdevices already providing access to the particular network, such thatthere is no need to provide access to the particular network. Moreover,it can be determined that providing access to the particular networkmight be detrimental to overall network performance.

In another aspect, determining whether to provide access to the firstnetwork at the second location can be performed by a network device atthe second location during an initialization sequence of the networkdevice at the second location. In another aspect, determining whether toprovide access to the first network at the second location can beperformed by a network device at another location (e.g., first location,central location). In a further aspect, determining whether to provideaccess to the first network at the second location can comprisedetermining a number of the at least one network devices providingaccess to the first network on a network channel. If the number isabove, below, or equal to one or more thresholds, it can be determinedto provide access or to disable (e.g., or determine not to provideaccess) access to the first network at the second location.

At step 706, access can be provided at the second location to at leastone of the first network and a respective second network based upon thedetermination of whether to provide access to the first network.Providing access to at least one of the first network and the respectivesecond network can comprise transmitting from the second location atleast one of a network signal for the first network and a network signalfor the respective second network. In an aspect, access to the firstnetwork can be conditioned upon verification of user credentialsassociated with a service provider. The respective second network cancomprise a local network, private network, closed network, user managednetwork, user controlled network, first user deployed network, and/orthe like.

At step 708, access to one or more networks (e.g., first network, secondnetwork, third network) can be suppressed and/or disabled at one or morelocations. For example, the first network device can be configured tosuppress and/or disable the first network and/or a respective secondnetwork at the first location, second location, a third location, and/orthe like. The first network device can disable one or more signals(e.g., and discontinue use of the accompanying SSID) configured toprovide access to the first network and/or a respective second networkat the first location, second location, third location, and/or the like.For example, the first network device can provide an instruction toanother network device, such as the second network device, at the firstlocation, second location, and/or third location. As another example,during an initialization sequence (e.g., after powering on or restartingthe first network device or second network device), an option to disableand/or suppress can be selected thereby modifying or determiningoperation of the first network device or other network devices a thefirst location, second location, third location, and/or the like.

As an illustration, access to the first network (e.g., wide areanetwork, public network, open network, provider managed network, nonusermanaged network, provider controlled network, non-user controllednetwork) at the first network device can be suppressed and/or disabledwhile access to a first of respective second networks (e.g., respectivesecond network associated with the first network device) can be provided(e.g., conditioned upon proper credentials). Similarly, access to thefirst network at the second network device can be suppressed and/ordisabled while access to a second of the respective second networks(e.g., respective second network associated with the second networkdevice) can be provided (e.g., conditioned upon proper credentials).

In one aspect, the method 700 can be performed iteratively by a device,such as the first network device and/or second network device. Forexample, the first network device and/or second network device canperform the method 700 after a triggering event, such as the passage ofa time period, performance of an initialization sequence, and/or thelike. After, the triggering event occurs, the method 700 can return tostep 702 and perform some or all of the steps of the method 700 again.

Another exemplary method 800 is shown in FIG. 8. At step 802, a networksignal for a first network can be provided from a first device. In anaspect, the network signal can facilitate access to the first network.The first device and at least one second device can be configured toprovide access to the first network based on a first network identifier.As an example, the first network identifier can comprise a wirelessservice set identifier (SSID). The first device and/or second device cancomprise wireless access points. For example, the first network cancomprise a public network, open network, wide area network, providermanaged network, provider controlled network, and/or the like. The firstnetwork can comprise a network in which one or more of the access pointsuse the same or a similar SSID. The first network (e.g., and/or servicesthereof) can be accessed by users based on credentials associated with aservice provider (e.g., internet service provider, content provider).For example, a service provider can provide network devices (e.g.,gateways, routers, wireless access points) to multiple users, such as afirst user and a second user. The network devices can provide service(e.g., by default, or by enablement) to the first network, which isaccessible by other users (e.g., second user) who subscribe to servicesof the service provider. Access to the first network can be conditionedupon verification of user credentials associated with a serviceprovider. For example, the first user and/or the other users can accessthe first network through any network device by using users' credentialsassociated with the service provider.

One or more (or each) of the first device, second device, and otherdevices can also provide respective second networks, such as a localnetworks, private networks, closed networks, user managed networks, usercontrolled networks, user deployed networks, and/or the like. Arespective second network can comprise a wireless network having adifferent SSID than the first network and utilizing private credentialsassociated with and/or managed by a user, such as an owner or lease ofone of the network devices. For example a second user can manage asecond network device. For example, the second user can access and/ormanage a respective second network using his or, her privatecredentials. Other users, such as the first user, who are in range(e.g., visitors, passersby, neighbors) of one of the devices (e.g.,first device, second device) can access the first network through thesecond device and/or first device according to the first user'scredentials with the service provider. As a further illustration, thefirst user can access a first of the respective second networks on thefirst device as well as the first network on the second device. Thefirst user may be unable to access a second of the respective secondnetworks on the second network device without permission of the seconduser.

At step 804, signal information can be received. In an aspect, thesignal information can be determined as illustrated in FIG. 6. As anexample, the signal information can relate to the at least one seconddevice providing access to the first network. In another aspect, thesignal information can relate to channel information, signal strength,signal identifiers, noise, or a combination thereof. As a furtherexample, the first device can receive the signal information byperforming a scan for signals on one or more wireless channels. Thefirst device can also receive the signal information from anotherdevice, such as the second device, a central management device, and/orthe like.

At step 806, the network signal for the first network can be suppressed,and/or disabled (e.g., for a particular device). For example, thenetwork signal at the first device can be suppressed or disabled. Asignal (e.g., and accompanying SSID) can be suppressed by decreasing thesignal strength and/or power, changing the directionality and/orfrequency of the signal, and/or the like. A signal (e.g., andaccompanying SSID) can be disabled by ceasing transmission of a signalfor the particular network, determining not to provide the signal,and/or the like.

In an aspect, disabling or suppressing the network signal of the firstdevice can be based on the signal information. For example, all or aportion of the signal information (e.g., illustrated in FIG. 6) can beanalyzed, compared to one or more thresholds, and/or the like. Aftersuch analysis and/or comparison, the determination can be made to selectone of a plurality of RF channels to transmit, suppress, or disable oneor more signals associated with one or more SSIDs. For example, adetermination can be made whether at least one of a network densitythreshold and a network noise threshold has been reached. Disabling thenetwork signal for the first network provided from the first device canbe based on the determination of whether at least one of the networkdensity threshold and the network noise threshold has been reached.

The network signal for the first network can continue to be provided atother devices. For example, the first device can be deployed at a firstlocation. The second device can be deployed at a second location. Thefirst location can be a first hotel unit, apartment, condo, townhome,business premises, unit, store, service center, and/or the like of abuilding and/or building complex. The second location can be a secondhotel unit, apartment, condo, townhome, business premises, unit, store,service center, and/or the like of the same building and/or buildingcomplex. If the second location and first location are proximate to eachother, network devices at these locations may duplicate services and/orinterfere with services provided at the other location. For example, oneor more of the network devices can provide access to the first networkand identify the first network with same or similar identifier, therebyproviding access to the first network at a variety of distant and/orproximate locations.

At step 808, a network signal for a respective second network (e.g.,private wireless network) can be enabled. For example, the first devicecan determine to provide and/or continue providing the network signalfor a respective second network to allow a user (e.g., first user) ofthe first device to access the respective second network (e.g., thoughthe first device may have the signal for the first network disabled).Such a determination can be based, for example, on an insufficientnumber of other network devices providing access to the particularnetwork, such that there is a need to provide access to the particularnetwork in the range of the second network device.

Another exemplary method 900 is shown in FIG. 9. At step 902, a firstnetwork (e.g., wide area network, public network, open network, providermanaged network, non-user managed network, provider controlled network,non-user controlled network) can be provided via a plurality of firstdevices. At least a portion of the plurality of first devices can beconfigured to provide access to respective second networks (e.g., firstlocal networks, first private networks, first closed networks, firstuser managed networks, first user controlled networks, first userdeployed networks). By use of the term respective it is to be understoodthat one or more (e.g., each) of the plurality of first devices canprovide one or more second networks. The respective second networks canbe different networks from each other. For example, the respectivesecond networks can be managed by different users, can be provided fromdifferent devices, can be accessed with different credentials, can beconfigured with different network settings, and/or the like. As anotherexample, a device of the plurality of first devices can provide one ormore of the respective second networks.

In one aspect, the first network can be managed by a service providerand accessible by users (e.g., customers, subscribers) of the serviceprovider based on user credentials. The respective second networks canbe networks managed by respective users of the service provider. Theplurality of first devices can be configured to provide access to thefirst network based on a first network identifier. For example, thefirst network identifier can comprise an SSID, a portion of an SSID,and/or the like. Deployment locations of at least a portion of theplurality of first devices can be selected by users of a serviceprovider. For example, the service provider can provide (e.g., sell,lease, loan) devices, such as a gateway, router (e.g., wireless router),and/or the like for users to access the Internet (or other network). Arespective user can then place his or her respective device at alocation in or about user's premises, such as a business location,apartment, home, and/or the like as described herein.

The service provider can provide at least one media related service tothe users via the first network. For example, the service provider canprovide Internet service, video service (e.g., video on demand,streaming video), audio service (e.g., audio streaming), digital videorecording, gaming services, and/or the like.

At step 904, a third network (e.g., second local network, second privatenetwork, second closed network, second user managed network) can beprovided from a second device. For example, the third network can beprovided upon initialization of the second device, after initializationof the second device, and/or the like.

At step 906, signal information relating to the plurality of firstdevices can be determined, at the second device. For example, the signalinformation can be determined by the second device during aninitialization sequence of the second device. Signal information canrelate to channel information, signal strength, signal identifiers,noise, or a combination thereof.

At step 908, a coverage gap of the first network can be identified basedon the signal information. For example, signal information can beanalyzed based on strength, geographic location, noise, and/or otherinformation described herein (e.g., as shown in FIG. 6.). As anotherexample, signal information can be compared to one or more thresholds.As an illustration, if signal strength information (e.g., or othersignal information) received at the second device (e.g., or otherdevices, such as one or more of the plurality of first device) is above,below, and/or equal to a threshold, then a coverage gap can beidentified. The coverage gap can be associated with a location of adevice receiving the signal information and/or the device itself. Itshould be noted that determining the coverage gap does not requireidentifying the full extent of the coverage gap but rather can beaccomplished by identifying a particular location that is above or belowspecified thresholds indicative of coverage as described herein.

At step 910, an access mechanism can be provided to facilitate access tothe first network via the second network device based on theidentification of the coverage gap. The access mechanism can comprise asignal, beacon, an SSID, and/or the like. The second device can beconfigured to provide access to the first network based on a firstnetwork identifier.

In an aspect, the method 900 can comprise monitoring the signalinformation after providing the access mechanism. The signal informationcan be monitored from the second device, one or more of the plurality offirst devices, and/or another device. The signal information can bemonitored continuously, intermittently (e.g., at predefined events, suchas after a specified time and/or at the occurrence of an event).

In another aspect, the method 900 can comprise disabling, suppressing,and/or otherwise modifying the access mechanism in response tomonitoring the signal information. An access mechanism can be suppressedand/or modified by decreasing the signal strength and/or power of theaccess mechanism, changing the directionality and/or frequency of theaccess mechanism, and/or the like. An access mechanism can be disabledby ceasing transmission of the access mechanism, determining not toprovide the access mechanism, and/or the like.

Another exemplary method 1000 is shown in FIG. 10. At step 1002, signalinformation can be received. Signal information can relate to channelinformation, signal strength, signal identifiers, noise, or acombination thereof. The signal information can be related to at leastone of a plurality of devices configured to provide access to a firstnetwork (e.g., wide area network, public network, open network, providernetwork, provider managed network, non-user managed network, providercontrolled network, non-user controlled network) and respective secondnetworks (e.g., first local networks, first private networks, firstclosed networks, first user managed networks, first user controllednetworks, first user deployed networks). For example, the signalinformation can be received by a first device of the plurality ofdevices during an initialization sequence of the first device. By use ofthe term respective it is to be understood that one or more (e.g., each)of the plurality of devices can provide one or more second networks. Therespective second networks can be different networks from each other.For example, the respective second networks can be managed by differentusers, can be provided from different devices, can be accessed withdifferent credentials, can be configured with different networksettings, and/or the like. As another example, a device of the pluralityof devices can provide one or more of the respective second networks.

The first network can be managed by a service provider and accessible byusers (e.g., customers, subscribers) of the service provider based onuser credentials. The respective second networks can be networks managedby respective users of the service provider. The plurality of devicesand the first device can be configured to provide access to the firstnetwork based on a first network identifier. For example, the firstnetwork identifier can comprise an SSID, a portion of an SSID, and/orthe like.

In one aspect, at least two of the plurality of devices can be locatedin neighboring customer premises. The plurality of devices configured toprovide access to the first network and respective second networks canbe deployed. For example, at least a portion of the plurality of devicescan be provided to users, and deployment locations of the at least aportion of the plurality of devices can be selected by users of theservice provider. By way of explanation, the service provider canprovide (e.g., sell, lease, loan) devices, such as a gateway, router(e.g., wireless router), and/or the like for users to access theInternet (or other network) and/or other services. A respective user canthen place his or her respective device at a location in or about user'spremises, such as a business location, apartment, home, and/or the likeas described herein. One or more user premises can be adjacent,proximate to, neighboring other user premises, and/or the like. One ormore other user premises can be distant from (e.g., outside the range ofa wireless device, separated by at least one property) other userpremises.

The service provider can provide at least one media related service tothe users via the first network. For example, the service provider canprovide Internet service, video service (e.g., video on demand,streaming video), audio service (e.g., audio streaming), digital videorecording, gaming services, and/or the like.

At step 1004, coverage of the first network can be determined. Forexample, coverage within range of the first device can be determined. Inone aspect, it can be determined, based on the signal information,whether at least one of a network density threshold and a network noisethreshold has been reached. For example, signal information can beanalyzed based on strength, geographic location, noise, and/or otherinformation described herein (e.g., as shown in FIG. 6.). As anotherexample, signal information can be compared to one or more thresholds.As an illustration, signal strength information (e.g., or other signalinformation) received at the first device (e.g., or other devices, suchas one or more of the plurality of devices) can be determined as above,below, and/or equal to a threshold, thereby identifying and/orclassifying the coverage of the first network at one or more locations.For example, the coverage can be associated with a location of a device(e.g. first device, one or more of the plurality of devices) receivingthe signal information and/or the device itself.

At step 1006, a network signal for the first network provided by thefirst device can be disabled, suppressed, and/or otherwise modified asdescribed herein. The network signal can be configured to provide accessto the first network when enabled. For example, the network signal cancomprise a wireless signal and the first device can comprise a wirelessaccess point. The network signal (e.g., and accompanying SSID) can besuppressed and/or modified by decreasing the signal strength and/orpower of the network signal, changing the directionality and/orfrequency of the signal, and/or the like. The network signal (e.g., andaccompanying SSID) can be disabled by ceasing transmission of thenetwork signal, determining not to provide the network signal, and/orthe like.

In one aspect, the first device can enable a second network signal. Thesecond network signal can comprise a network signal for a third network(e.g., second local network, second private network, second closednetwork, second user managed network, second user controlled network,second user deployed network).

In one aspect, the method 1000 can comprise determining, based on thesignal information, whether at least one of a network density thresholdand a network noise threshold has been reached. Disabling, suppressing,and/or modifying the network signal for the first network provided fromthe first device can be based on the determination of whether at leastone of the network density threshold and the network noise threshold hasbeen reached.

In one aspect, the method 1000 can comprise monitoring the signalinformation after disabling access at the first device to the firstnetwork. The signal information can be monitored from the first device,one or more of the plurality of devices, and/or another device. Thesignal information can be monitored continuously, intermittently (e.g.,at predefined events, such as after a specified time and/or at theoccurrence of an event).

In another aspect, the method 1000 can comprise enabling the disablednetwork signal thereby providing access to the first network via thefirst device in response to monitoring the signal information. Enablingthe disabled network signal can comprise turning on the network signal,providing the network signal, and/or the like.

Another exemplary method 1100 is shown in FIG. 11. At step 1102, signalinformation can be received. Signal information can relate to channelinformation, signal strength, signal identifiers, noise, or acombination thereof. The signal information can relate to at least oneof a plurality of devices configured to provide access to a firstnetwork (e.g., wide area network, public network, open network, providernetwork, provider managed network, non-user managed network, providercontrolled network, non-user controlled network) and respective secondnetworks (e.g., first local networks, first private networks, firstclosed networks, first user managed networks, first user controllednetworks, first user deployed networks). For example, the signalinformation can be determined by the second device during aninitialization sequence of the second device. By use of the termrespective it is to be understood that one or more (e.g., each) of theplurality of devices can provide one or more second networks. Therespective second networks can be different networks from each other.For example, the respective second networks can be managed by differentusers, can be provided from different devices, can be accessed withdifferent credentials, can be configured with different networksettings, and/or the like. As another example, a device of the pluralityof devices can provide one or more of the respective second networks.

The first network can be managed by a service provider and accessible byusers of the service provider based on user credentials. The respectivesecond networks can be networks managed by respective users of theservice provider. The plurality of devices and the first device can beconfigured to provide access to the first network based on a firstnetwork identifier. For example, the first network identifier cancomprise an SSID, a portion of an SSID, and/or the like.

In one aspect, at least two of the plurality of devices can be locatedin neighboring customer premises. For example, deployment locations ofat least a portion of the plurality of devices can be selected by usersof a service provider. By way of explanation, the service provider canprovide (e.g., sell, lease, loan) devices, such as a gateway, router(e.g., wireless router), and/or the like for users to access theInternet (e.g., or other network) and/or other services. A respectiveuser can then place his or her respective device at a location in orabout user's premises, such as a business location, apartment, home,and/or the like as described herein. One or more user premises can beadjacent, proximate to, neighboring other user premises. One or moreother user premises can be distant (e.g., outside the range of awireless device, separated by at least one property) from other userpremises.

The service provider can provide at least one media related service tothe users via the first network. For example, the service provider canprovide (e.g., sell, lease, loan) devices, such as a gateway, router(e.g., wireless router), and/or the like for users to access theInternet (or other network). A respective user can then place his or herrespective device at a location in or about user's premises, such as abusiness location, apartment, home, and/or the like as described herein.

At step 1104, coverage of the first network can be determined. Forexample, coverage within range of the first device can be determined. Inan aspect, it can be determined, based on the signal information,whether at least one of a network density threshold and a network noisethreshold has been reached. As an illustration, signal strengthinformation (e.g., or other signal information) received at the firstdevice (e.g., or other devices, such as one or more of the plurality ofdevices) can be determined as above, below, and/or equal to a threshold,thereby identifying and/or classifying the coverage of the first networkat one or more locations. For example, the coverage can be associatedwith a location of a device (e.g. first device, one or more of theplurality of devices) receiving the signal information and/or the deviceitself.

At step 1106, a network signal for the first network can be enabled. Thenetwork signal can be configured to provide access to the first networkfrom the first device. For example, the network signal can comprise awireless signal and the first device can comprise a wireless accesspoint. In one aspect, the first device can enable a second networksignal. The second network signal can comprise a network signal for athird network (e.g., second local network, second private network,second closed network, second user managed network, second usercontrolled network, second user deployed network).

In an aspect, the method 1100 can comprise monitoring the signalinformation after enabling the network signal. The signal informationcan be monitored from the first device, one or more of the plurality ofdevices, and/or another device. The signal information can be monitoredcontinuously, intermittently (e.g., at predefined events, such as aftera specified time and/or at the occurrence of an event).

In an aspect, the method 1100 can comprise disabling, suppressing,and/or otherwise modifying the network signal in response to monitoringthe signal information. The network signal (e.g., and accompanying SSID)can be suppressed and/or modified by decreasing the signal strengthand/or power of the network signal, changing the directionality and/orfrequency of the signal, and/or the like. The network signal (e.g., andaccompanying SSID) can be disabled by ceasing transmission of thenetwork signal, determining not to provide the network signal, and/orthe like.

While the methods and systems have been described in connection withpreferred embodiments and specific examples, it is not intended that thescope be limited to the particular embodiments set forth, as theembodiments herein are intended in all respects to be illustrativerather than restrictive.

Unless otherwise expressly stated, it is in no way intended that anymethod set forth herein be construed as requiring that its steps beperformed in a specific order. Accordingly, where a method claim doesnot actually recite an order to be followed by its steps or it is nototherwise specifically stated in the claims or descriptions that thesteps are to be limited to a specific order, it is no way intended thatan order be inferred, in any respect. This holds for any possiblenon-express basis for interpretation, including: matters of logic withrespect to arrangement of steps or operational flow; plain meaningderived from grammatical organization or punctuation; the number or typeof embodiments described in the specification.

It will be apparent to those skilled in the art that variousmodifications and variations can be made without departing from thescope or spirit. Other embodiments will be apparent to those skilled inthe art from consideration of the specification and practice disclosedherein. It is intended that the specification and examples be consideredas exemplary only, with a true scope and spirit being indicated by thefollowing claims.

What is claimed is:
 1. A method comprising: providing a wide areanetwork via a plurality of first devices, wherein at least a portion ofthe plurality of first devices are configured to provide access torespective first local networks; providing a second local network from asecond device upon initialization of the second device; determining, atthe second device, signal information relating to the plurality of firstdevices; identifying, based on the signal information, a coverage gap ofthe wide area network; and providing an access mechanism to facilitateaccess to the wide area network via the second network device based onthe identification of the coverage gap.
 2. The method of claim 1,wherein the wide area network is managed by a service provider andaccessible by users of the service provider based on user credentials,and wherein the respective first local networks are networks managed byrespective users of the service provider.
 3. The method of claim 1,further comprising: monitoring the signal information after providingthe access mechanism; and disabling the access mechanism in response tomonitoring the signal information.
 4. The method of claim 1, wherein thesignal information is determined by the second device during aninitialization sequence of the second device.
 5. The method of claim 1,wherein signal information relates to channel information, signalstrength, signal identifiers, noise, or a combination thereof.
 6. Themethod of claim 1, wherein the plurality of first devices and the seconddevice are configured to provide access to the wide area network basedon a first network identifier.
 7. The method of claim 1, whereindeployment locations of at least a portion of the plurality of firstdevices are selected by users of a service provider.
 8. A method,comprising: receiving signal information related to at least one of aplurality of devices configured to provide access to a wide area networkand respective local networks; determining coverage of the wide areanetwork within range of a first device of the plurality of devices; anddisabling a network signal for the wide area network provided by thefirst device, wherein the network signal is configured to provide accessto the wide area network when enabled.
 9. The method of claim 8, whereinthe wide area network is managed by a service provider and accessible byusers of the service provider based on user credentials, and wherein therespective local networks are networks managed by respective users ofthe service provider.
 10. The method of claim 8, further comprising:monitoring the signal information after disabling access at the firstdevice to the wide area network; and enabling the disabled networksignal thereby providing access to the wide area network via the firstdevice in response to monitoring the signal information.
 11. The methodof claim 8, wherein signal information relates to channel information,signal strength, signal identifiers, noise, or a combination thereof.12. The method of claim 8, wherein the plurality of devices and thefirst device are configured to provide access to the wide area networkbased on a first network identifier.
 13. The method of claim 8, whereindeployment locations of at least a portion of the plurality of devicesare selected by users of a service provider.
 14. The method of claim 8,further comprising determining, based on the signal information, whetherat least one of a network density threshold and a network noisethreshold has been reached, wherein disabling the network signal for thewide area network provided from the first device is based on thedetermination of whether at least one of the network density thresholdand the network noise threshold has been reached.
 15. A method,comprising: receiving signal information related to at least one of aplurality of devices configured to provide access to a wide area networkand respective local networks; determining coverage of the wide areanetwork within range of a first device of the plurality of devices; andenabling a network signal for the wide area network, wherein the networksignal is configured to provide access to the wide area network from thefirst device.
 16. The method of claim 15, wherein the wide area networkis managed by a service provider and accessible by users of the serviceprovider based on user credentials, and wherein the respective localnetworks are networks managed by respective users of the serviceprovider.
 17. The method of claim 15, further comprising: monitoring thesignal information after enabling the network signal; and disabling thenetwork signal in response to monitoring the signal information.
 18. Themethod of claim 15, wherein signal information relates to channelinformation, signal strength, signal identifiers, noise, or acombination thereof.
 19. The method of claim 15, wherein the pluralityof devices and the first device are configured to provide access to thewide area network based on a first network identifier.
 20. The method ofclaim 15, wherein deployment locations of at least a portion of theplurality of devices are selected by users of a service provider.