Wireless configuration of wireless distribution system (wds) wi-fi range extenders using non-wi-fi wireless communication channels

ABSTRACT

A configuration server detects a network change and initiates a configuration process. A smartphone executing a mobile app communicates with the configuration server with a cellular data network transceiver (e.g., a 3G or 4G transceiver), and communicates with slave base stations with a Bluetooth transceiver (e.g., a BILE transceiver) or other one-to-many wireless channel. The configuration server also communicates over a wired connection with a master base station to synchronize WDS configuration data between the master and slave base stations. WDS configuration data is dynamically generated to prevent rogue devices from using preconfigured WDS configuration.

FIELD OF THE INVENTION

The invention relates generally to a computerized networking system, andmore specifically, to configuration of wireless distribution system(WDS) nodes that extend Wi-Fi network range using a mobile station withalternate networking capabilities.

BACKGROUND

Plug and play networking equipment makes networking friendlier forconsumers installing a Wi-Fi (e.g., under a IEEE 802.11 protocol aspromulgated by the Institute of Electrical and Electronics Engineers)system out of the box. Entities also desire less complex configurationswhen making changes to network equipment. Depending on a size of networkcoverage needed, range extenders are added at “dead areas” to provideextended Wi-Fi access. For example, a range extender can add coverage toa backyard of a home. Also, a range extender can connect two buildingsof a corporation.

Conventional configuration techniques for range extenders are performedthrough a wired connection by a network administrator, over severalsteps. First, the network admin connects a wire to an access point toreceive parameters. Next, the network admin connects a wire to a rangeextender to upload parameters. Even if the network admin wants towirelessly connect to the access point and the range extender, thepoint-to-point nature of Wi-Fi radios prevents a dual connection.Further, interference between multiple Wi-Fi radios would beproblematic.

More specifically, WDS is a technique for an access point acting as amaster base station to connect with access points acting as slave basestations for extending Wi-Fi range. The master base station needs toreceive MAC addresses of the slave base stations, and likewise, theslave base stations need to receive a MAC address of the base station.Other parameters in common include an SSID, a wireless channel, and anencryption mode. As described above, conventional techniques accomplishconfigurations with a series of wired connections.

What is needed is a robust technique for wireless configuration ofwireless distribution system nodes, for example, using a wirelesscommunication channel other than Wi-Fi for synching WDS configurationdata necessary for extending Wi-Fi range.

SUMMARY

The above-mentioned needs are met with methods, computer products, anddevices for a computer-implemented method for wireless configuration ofwireless distribution nodes using a mobile station with alternativenetworking capabilities.

In one embodiment, a configuration server detects a network change andinitiates a configuration process. A smartphone executing a mobile appcommunicates with the configuration server with a cellular data networktransceiver (e.g., a 3G or 4G transceiver), and communicates with slavebase stations with a Bluetooth transceiver (e.g., a BTLE transceiver) orother one-to-many wireless channel. The configuration server alsocommunicates over a wired connection with a master base station tosynchronize WDS configuration data between the master and slave basestations.

In another embodiment, WDS configuration data is dynamically generatedto prevent rogue devices from using preconfigured WDS configuration.

In another embodiment, a smartphone executing a mobile app communicatesdirectly with a master base server with a Wi-Fi transceiver, and with aslave base server with a Bluetooth transceiver for synchronizing WDSconfiguration data.

Advantageously, out of the box WDS configurations of Wi-Fi networks withrange extenders are simplified.

BRIEF DESCRIPTION OF THE DRAWINGS

In the following drawings, like reference numbers are used to refer tolike elements. Although the following figures depict various examples ofthe invention, the invention is not limited to the examples depicted inthe figures.

FIGS. 1A & 1B are high-level block diagrams illustrating systems forwireless configuration of wireless distribution nodes using a mobilestation, according to one embodiment.

FIG. 2 is a more detailed block diagram illustrating a configurationserver of the system of FIG. 1A, according to one embodiment.

FIG. 3 is a more detailed block diagram illustrating a master basestation of the system of FIG. 1, according to one embodiment.

FIG. 4 is a more detailed block diagram illustrating an slave basestation of the system of FIG. 1, according to an embodiment.

FIG. 5 is a more detailed block diagram illustrating a wireless stationof the system of FIG. 1, according to an embodiment.

FIG. 6A-6B is a sequence diagram illustrating interactions betweencomponents of the system in FIG. 1, according to one embodiment.

FIG. 7 is a high-level flow diagram illustrating a method for wirelesslyconfiguring wireless distribution nodes using a mobile station,according to one embodiment.

FIG. 8 is a more detailed flow diagram illustrating a first embodimentof a step of synchronizing WDS configuration data between the masterbase station and the slave base station, from the method of FIG. 7.

FIG. 9 is a more detailed flow diagram illustrating a second embodimentof a step of synchronizing WDS configuration data between the masterbase station and the slave base station, from the method of FIG. 7.

FIG. 10 is a block diagram illustrating an exemplary computing devicefor implementing the techniques described herein, according to oneembodiment.

DETAILED DESCRIPTION

Methods, (non-transitory) computer program products, and systems forwireless configurations of WDS over alternative wireless communicationchannels, as described herein. One of ordinary skill in the art willrecognize variations to the disclosed embodiments that are contemplated,although not explicitly described.

I. Systems for Wireless WDS Configuration System (FIGS. 1-6)

FIGS. 1A-1B are high-level block diagram illustrating wireless WDSconfiguration of network nodes, according to one embodiment. The system100A of FIG. 1A comprises a configuration server 110, a master basestation 120, slave base stations 130A-C, and a wireless station 140. Inother embodiments, additional network components can also be part of thesystems 100A and 100B, such as firewalls, virus scanners, routers,switches, application servers, databases, as well as additionalcontrollers, access points, access switches, stations, and the like. Thenetwork components as set forth throughout the different embodimentsdescribed herein can be implemented as hardware, software, or acombination of both. The systems 100A and 100B can be implemented inhome networking systems with easy consumer set-up. Also, enterprisenetworking systems can be quickly deployed and relocated.

The components can communicate through a network 101. The network 101couples the configuration server 110 to the master base station 120,preferably over a wired connection. In turn, the master base station 120couples to the slave base station 130, and the wireless station, throughwireless connections. The network 101 can be the Internet, a wide areanetwork, a local area network, an enterprise network, or the like. Thenetwork 101 can be a data network or a cellular network (e.g., 3G or4G), or a combination of different types of networks. In addition, abase station 102 communicates through the network 101 (e.g., indirectlythrough a gateway directly coupled to the network 101).

The configuration server 110 bridges the master base server 120 and theslave base server 130 during configuration of the system 100A. Morespecifically, WDS configuration data is synchronized between the masterand slave base stations 120, 130 in facilitating a wireless connectionbetween the master and slave base stations 120, 130 in this embodiment.The wireless station 140 can include an application that establishes asecure connection for receiving dynamic WDS configuration data over acellular data network transceiver (e.g., 3G or 4G), and next,transmitting the dynamic WDS configuration data over a Bluetoothtransceiver. On the other data path between the configuration server 110and the master base station 120 can be a secure connection over anEthernet port for a wired connection. The data path includes aninterface between a data network used by the configuration sever 110 anda cellular network used by the wireless station 110.

The WDS configuration data is synchronized by the configuration serverto facilitate a connection between the master and slave base stations120, 130, in one embodiment. WDS configuration data, in one embodiment,includes MAC addresses, BSSIDs, authentication credentials, wirelesschannels, encryption modes (e.g., certificates or shared secrets), andother information necessary for a Wi-Fi connection between the masterand slave base stations 120, 130. There are other embodiments in whichthe WDS configuration data also includes authentication information orother security information. Dynamic WDS information, in anotherembodiment, can comprise WDS parameters generated on-the-fly to avoidprior art out-of-the-box WDS parameter that are pre-configured. Synchingbetween the master and base stations 120, 130 is achieved throughmultiple communication channels as managed by the wireless station 140.For example, a BSSID can be randomly generated and send form theconfiguration server 110 to both the master base station 120 and theslave base station 110. The slave base station 110, in turn, uses theBSSID to send a probe request or respond to a beacon of the master basestation 120. Authentication credentials can also be presented by theslave base station 130 to the master base station 120. Some of thedynamic WDS information can be static and predefined, such asauthentication credentials.

In one embodiment, when one of the slave base stations is removed fromthe network or otherwise disassociated from the master base station 120,new dynamic WDS configuration data can be sent out to re-secure thecompromised network.

The configuration server 110 and other components of the system 100 canbe any computerized device or processor driven device. Exampleembodiments include server blades, desktop computers, laptops, smarttelephones, tablets, phablets and the like. In some cases, theconfiguration server 110 is operated by a service provider that servicesvarious user accounts. The configuration server 110 can be the sameentity that manufactures the master and slave base stations 120, 130.More detailed embodiments of the configuration server 110 are set forthbelow with respect to FIG. 2.

The master base station 120 is configured to provide access to thenetwork 101 for wireless stations including wireless station 140. Afterconfiguration, wireless stations can be indirectly connected through theslave base station 130. The indirect connection extends the range of themaster base station 120 which appears to the wireless station 140 to bethe same device as the master base station 120, in some embodiments. Inmore detail, a BSSID used to identify connections with the master basestation 120 can be passed to the slave base station 130. When thestation 110 communicates using a certain BSSID associated with both themaster and slave base stations 120, 130, either device can processpackets from communications. In an embodiment, the master base station120 can maintain a table that tracks which wireless stations areassigned to be handled by the slave base station 130 and other slavebase stations.

In example embodiments, the master base station 120 can be an accesspoint running in master node, a router, or a switch, and be implementedby any of the computerized devices discussed herein, and generally inFIG. 9. More detailed embodiments of the master base station 130 aredescribed in below with respect to FIG. 3.

The slave base station 130 is configured to provide access to thenetwork 101 to wireless stations including the wireless station 140.During configuration, the slave station can communicate with thewireless station 140 over a Bluetooth wireless radio in order to receiveWDS configuration data (e.g., dynamic WDS configuration data). Afterconfiguration, packets are forwarded from the wireless station 130 tothe master base station 120, and vice versa.

In some embodiments, the slave base station 130 can be a range extender,a repeater, an access point running in a slave mode, and be implementedby any of the computerized devices discussed herein, and generally inFIG. 9. The slave base station 130 is described in more detail below inassociation with FIG. 4.

The wireless station 140 synchronizes WDS configuration data between aBluetooth transceiver connected to the slave base station 130, and, in afirst embodiment through a Wi-Fi transceiver connected to the masterbase station 120, and, in a second embodiment through a cellular datanetwork transceiver connected to the configuration server 110. Othertypes of transceivers can also be substituted. The one-to-manycapability of Bluetooth allows a single wireless station to configuremany slave base stations without having to manually connect anddisconnect between, for example, Wi-Fi transceivers of different slavebase stations. Some embodiments include a mobile app with user log ininformation in order to create authenticated communication channels forpassing sensitive configuration parameters. The wireless station 140 mayalso authenticate to the slave base station through the mobile app.

In some embodiments, the wireless station 140 can be a mobile telephone,a tablet, a phablet, a laptop, or be implemented by any of thecomputerized devices discussed herein, and generally in FIG. 9. Forinstance, a smart phone is typically equipped with Wi-Fi, Bluetooth andcellular data network transceivers. A mobile app can be downloaded tocoordinate between the heterogeneous communication channels. Exampleswireless station 130 is described in more detail below in associationwith FIG. 5.

FIG. 1B, in contrast to FIG. 1A, eliminates the configuration server 110and connections with the network 101. The locally based configurationfeatures multiple connections over multiple channels to automaticallyconfigure wireless devices out of the box. The system 100B includes themaster base station 120, slave base stations 130A-C and the wirelessstation 140.

In one embodiment, a network administrator uses the wireless station 140to manage configuration of the base slave stations 130A-C to the masterbase station 110. The wireless station 140 uses Wi-Fi to connect withmaster base stations and uses Bluetooth to connect with slave basestations. After configuration, the slave base stations 130A-C can bephysically distributed for deployment in different geographicallocations. Note that the configuration server 110, being accessiblewherever cellular data network service is available, can configure slavebase stations while already deployed to different geographical areas.More specifically, a network administrator can move to within Bluetoothrange of each slave base station for automatic configuration to masterbase stations.

In some embodiments, a configuration server can be notified of off-lineconfigurations at a later point in time, by any of the participatingcomponents.

FIG. 2 is a more detailed block diagram illustrating the configurationserver 110 of the system of FIG. 1, according to one embodiment. Theconfiguration server 110 of this embodiment includes a user accountmanager 210, a configuration parameter database 220, a configurationparameter generation engine 230, a configuration parameter synchingengine 240, and a network communication module.

The user account manager 210 preconfigures a user policy for friendonboarding. In one embodiment, the user account is accessed through auser interface executing on a browser or an independent application. Anetwork owner can access settings of the account. Although thedescription refers to a network owner throughout, this is non-limitingas other actors can include a network administrator, a home owner, anInternet customer, a hot spot operator, and the like.

The configuration parameter database 220 stores the master base station120 in association with the slave base station 130, for example, on auser account record. In one embodiment, the configuration server 110automatically recognizes that the master base station 120 is associatedwith the slave base station 130, based on geographical coordinates ornetwork IP addresses. In another embodiment, a wireless station has amobile app for associating slave base stations to a master base station.To initiate, the mobile app collects and sends to the configurationserver 110, data about nearby slave base stations that is sent out inslave station beacons. As a result, the configuration parameter database220 can be queried using the slave base station identificationinformation to identify master base stations for automaticconfiguration. Then, configuration parameters such as a BSSID are sentto slave base stations for connecting to master slave stations.

The configuration parameter generation engine 230 can create a BSSID inreal-time that would be previously unknown to any rogue actors. TheBSSID is synchronized to master base stations and slave base stations ofa common local area network. In one case, authentication credentials arealso synchronized for logging in from slave base stations. The generatedparameters are sent to the networking communication module 240 forinterfacing with external resources.

The networking communication module 240 can comprise networkinginterface components such as Wi-Fi radios, Wi-Fi antennae, transceivers,coders and decoders, digital signal processors, and other supportinglower level hardware and processes necessary for communication acrosschannels. The networking hardware 240 can support different variationsof IEEE 802.11, including multiple input/multiple output (MIMO) andother techniques. Returning to the task of sending generated parametersto slave base stations, data packets sent over the data network arereceived by an interface to a cellular data network (e.g., Verizon 4Gcellular data network). A cellular data network including, for example,cell towers pass the data packets to wireless stations.

FIG. 3 is a more detailed block diagram illustrating the master basestation 120 of the system of FIG. 1, according to one embodiment. Themaster base station 120 includes a configuration application 310, aslave base station manager 320, a wireless station manager 330, and anetworking communication module 340.

The configuration application 310 can be executed as part of anoperating system, or alternatively, as an application interacting withan operating system. The configuration application 310 receives dynamicWDS confirmation data. Sometime thereafter, a connection request isreceived from a slave base station. For example, the connection requestcan be a probe request using the BSSID generated in real-time during aconfiguration process. In some embodiments, the configurationapplication 310 generates BSSIDs in real-time for transfer to slave basestations through connected wireless stations.

The slave base station manager 320 registers slave base stations such asthe slave base station 130 in association with a particular master slavestation such as the master slave station 120, including MAC addressesand BSSIDs.

The wireless station manager 330 registers wireless stations directlyconnecting without an intervening slave base station. In some cases,wireless stations can be handed off to slave base stations, or handedoff from slave base stations.

The networking communication module 340 comprises a Bluetoothtransceiver 342 (e.g., BLTE transceiver), a Wi-Fi transceiver 344, andan Ethernet port 344. In one instance, IEEE 802.11 network packets arereceived from slave base stations, on behalf of wireless stationsconnected to slave stations. Wi-Fi network packets are transformed toEthernet packets are forwarded as addressed. The reverse data path isalso handled by the networking communication module 340. Otherembodiments with different transceivers are possible.

FIG. 4 is a more detailed block diagram illustrating the slave basestation 130 of the system of FIG. 1, according to an embodiment. Theslave base station 130 features a configuration application 410, a slavebase station manager 420, a wireless station manager 430, and anetworking communication module 440.

The configuration application 410 can be executed as part of anoperating system, or alternatively, as an application interacting withan operating system. The configuration application 410 receives dynamicWDS confirmation data. Sometime thereafter, a connection request isreceived from a slave base station. For example, the connection requestcan be a probe request using the BSSID generated in real-time during aconfiguration process. In some embodiments, the configurationapplication 410 generates BSSIDs in real-time for transfer to slave basestations through connected wireless stations.

The master base station manager 420 registers slave base stations suchas the master base station 120 in association with a particular wirelessstation such as the wireless station 140, including MAC addresses andBSSIDs. Some embodiments of the master base station manager 420registers more than one master base stations, allowing assignments ofwireless stations to different master base stations. Load balancingalgorithms can determine the assignments of wireless stations toparticular master base stations.

The wireless station manager 430 registers wireless stations directlyconnecting with or without an intervening slave base station. In somecases, wireless stations can be handed off to master base stations orother slave base stations, or handed off from other slave base stationsor master base stations.

The networking communication module 440 comprises a Wi-Fi transceiver442 and a Bluetooth transceiver 444. In one instance, Bluetooth packetsare received with WDS configuration data. A BSSID can be embedded into aprobe request sent to master base station with Wi-Fi data packets. Afterconfiguration, IEEE 802.11 network packets are received from otherdownstream slave base stations, on behalf of wireless stations connectedto those slave stations. IEEE 802.11 network packets are also receivedfrom wireless stations directly connected. Wi-Fi network packets areretransmitted as Wi-Fi network packets when forwarded to master basestations. The reverse data path is also handled by the networkingcommunication module 440. Optionally, an Ethernet port or other type oftransceiver can be included on the slave base station 130.

FIG. 5 is a more detailed block diagram illustrating the wirelessstation 140 of the system of FIG. 1, according to an embodiment. Thewireless station 140 includes a configuration application 510, a masterbase station manager 520, a slave base station manager 530, and anetworking communication module 540.

The configuration application 510 can be executed as part of anoperating system, or alternatively, as an application interacting withan operating system. The configuration application 510 receives dynamicWDS confirmation data over a Wi-Fi or cellular network forretransmitting over a Bluetooth channel to slave base stations (and visaversa). The configuration application 510 is communicatively coupledwith each of the transceivers for recognizing data that needs to beprocessed for transmission over a different transceiver. In anembodiment, users can be prompted by the configuration application 510to enter credentials for reaching a particular user account at theconfiguration server 110.

The master base station manager 520 registers master base stations suchas the master base station 130, including MAC addresses and BSSIDs.

The slave base station manager 530 registers slave base stationsdirectly connecting without an intervening slave base station. In somecases, wireless stations can be handed off to slave base stations, orhanded off from slave base stations.

The networking communication module 540 comprises a Wi-Fi transceiver542, a Bluetooth transceiver 544, and a cellular data networktransceiver 546.

FIGS. 6A-6B are sequence diagrams illustrating interactions 600 betweencomponents of the system in FIGS. 1A and 1B, accordingly. The specificinteractions shown in FIGS. 6A-6B and described below can be performedin different orders, can include many sub-interactions, and still becontemplated by the present disclosure. Moreover, the methods below ofFIGS. 7-9 describe processes that are internal to the components, asopposed to the external messages exchanged in FIGS. 6A-B.

In FIG. 6A, the master base station 120 connect with the configurationmodule 110 (interaction 601). Separately, the slave base station, afterestablishing a Bluetooth connection with the wireless station 140(interactions 602, 603), connects with the configuration module 110through the wireless station 140 (interactions 604).

WDS configuration data is sent to both the master base station 120(interaction 605) and to the slave base station 130 through the wirelessstation 140 (interactions 606, 607). Finally, the WDS configuration datais sent from the slave base station 130 to the master base station 120(interaction 608) and an acknowledgment of the connection can bereturned (interaction 609).

In FIG. 6B, the wireless station 140 connects with the master basestation (interactions 611, 613) and separately, the slave base stations130A-B (interactions 612 a,b, 614 a,b). WDS configuration data is sentfrom the wireless station 140 to the master base station 120 (615) andthe slave base stations 130A-B (interactions 616 a,b). Using the WDSconfiguration data, the slave base stations 130A-B connect directly tothe master base station (617 a,b, 618 a,b).

II. Methods for Wireless WDS Configuration (FIGS. 7-9)

FIG. 7 is a high-level flow diagram illustrating a method 700 forwirelessly configuring wireless distribution nodes from the wirelessstation 140, according to one embodiment. The method 700 is one exampleof the operation for the system 100 or other referral systems, withoutlimitation.

At step 710, a network configuration is detected. For example, thenetwork configuration can be an out of the box set up of a Wi-Fi networkwith range extenders. In another example, the network configuration canbe a power down followed by a power up in which authentication is neededby base slave stations.

At step 720, wireless stations use a Bluetooth connection to synchronizeWDS configuration data with slave base stations to facilitate a Wi-Ficonnection between the slave base stations and the master base stations.

The method 700 continues back to step 710 until another networkconfiguration is detected. The next network configuration can involve amodification to the network configuration of the same user account, orcan involve a different user account.

FIG. 8 is a more detailed flow diagram illustrating step 720A (firstembodiment of the step 720) of synchronizing WDS configuration databetween a master base station to a slave base station over an externalnetwork (e.g., see system 100A of FIG. 1A), from the method of FIG. 7,according to an embodiment.

At step 810, a data connection is established with a master basestation. In one implementation, master base stations are pre-configuredwith an IP address of a configuration server for automaticallyconnecting. Once the communication channel is established, applicationscan send commands between the configuration server and the master basestation. For example, users can log into user accounts on theconfiguration server with authentication credentials in order to addnetwork devices to the user account for management.

At step 820, a data connection is established with a wireless stationover a first transceiver, for example, for a cellular data network. Amobile app in wireless stations can also be pre-configured with an IPaddress of a configuration server for automatically connecting.

At step 830 a wireless station establishes a data connection with theslave base station over a second transceiver, for example, for aBluetooth network. As a result, a mobile app of a wireless stationcommunicates with an application on the slave base station.

At step 840, WDS configuration data is synchronized between the masterand slave base stations. One embodiment generates WDS configuration dataat either device which is securely transmitted to the slave basestations.

FIG. 9 is a high-level flow diagram illustrating a step 720B (secondembodiment of the step 720) for wirelessly configuring wirelessdistribution nodes from a wireless station without use of an externalnetwork (e.g., see system 100B of FIG. 1B), according to one embodiment.

At step 910, the wireless station connects to a master base stationsover a first transceiver, for example, for a Wi-Fi network. At step 920,the wireless station connects to slave base stations over a secondtransceiver, for example, for a Bluetooth network.

At step 930, the wireless station synchronizes WDS configuration databetween the master and slave base stations. Optionally, dynamic WDSconfiguration data is generated by the wireless stations or the masterbase station.

IV. Generic Computing Device (FIG. 10)

FIG. 10 is a block diagram illustrating an exemplary computing device1000 for use in the systems 100A-B of FIGS. 1A-B, according to oneembodiment. The computing device 1000 is an exemplary device that isimplementable for each of the components of the system 100, includingthe cloud control element 110, the access points 121A,B, 131, and thestation 140. The computing device 1000 can be a mobile computing device,a laptop device, a smartphone, a tablet device, a phablet device, avideo game console, a personal computing device, a stationary computingdevice, a server blade, an Internet appliance, a virtual computingdevice, a distributed computing device, a cloud-based computing device,or any appropriate processor-driven device.

The computing device 1000, of the present embodiment, includes a memory1010, a processor 1020, a storage drive 1030, and an I/O port 1040. Eachof the components is coupled for electronic communication via a bus1099. Communication can be digital and/or analog, and use any suitableprotocol.

The memory 1010 further comprises network applications 1012 and anoperating system 1014. The network applications 1012 can include themodules of the components illustrated in FIG. 1. Other networkapplications 1012 can include a web browser, a mobile application, anapplication that uses networking, a remote application executinglocally, a network protocol application, a network managementapplication, a network routing application, or the like.

The operating system 1014 can be one of the Microsoft Windows® family ofoperating systems (e.g., Windows 95, 98, Me, Windows NT, Windows 2000,Windows XP, Windows XP x64 Edition, Windows Vista, Windows CE, WindowsMobile, Windows 8 or Windows 10), Linux, HP-UX, UNIX, Sun OS, Solaris,Mac OS X, Alpha OS, AIX, IRIX32, or IRIX64. Other operating systems maybe used. Microsoft Windows is a trademark of Microsoft Corporation.

The processor 1020 can be a network processor (e.g., optimized for IEEE802.11), a general purpose processor, an application-specific integratedcircuit (ASIC), a field programmable gate array (FPGA), a reducedinstruction set controller (RISC) processor, an integrated circuit, orthe like. Qualcomm Atheros, Broadcom Corporation, and MarvellSemiconductors manufacture processors that are optimized for IEEE 802.11devices. The processor 1020 can be single core, multiple core, orinclude more than one processing elements. The processor 1020 can bedisposed on silicon or any other suitable material. The processor 1020can receive and execute instructions and data stored in the memory 1010or the storage drive 1030.

The storage drive 1030 can be any non-volatile type of storage such as amagnetic disc, EEPROM, Flash, or the like. The storage drive 630 storescode and data for applications.

The I/O port 1040 further comprises a user interface 1042 and a networkinterface 1044. The user interface 642 can output to a display deviceand receive input from, for example, a keyboard. The network interface1044 (e.g. RF antennae) connects to a medium such as Ethernet or Wi-Fifor data input and output.

Many of the functionalities described herein can be implemented withcomputer software, computer hardware, or a combination.

Computer software products (e.g., non-transitory computer productsstoring source code) may be written in any of various suitableprogramming languages, such as C, C++, C#, Oracle® Java, JavaScript,PHP, Python, Perl, Ruby, AJAX, and Adobe® Flash®. The computer softwareproduct may be an independent application with data input and datadisplay modules. Alternatively, the computer software products may beclasses that are instantiated as distributed objects. The computersoftware products may also be component software such as Java Beans(from Sun Microsystems) or Enterprise Java Beans (EJB from SunMicrosystems).

Furthermore, the computer that is running the previously mentionedcomputer software may be connected to a network and may interface toother computers using this network. The network may be on an intranet orthe Internet, among others. The network may be a wired network (e.g.,using copper), telephone network, packet network, an optical network(e.g., using optical fiber), or a wireless network, or any combinationof these. For example, data and other information may be passed betweenthe computer and components (or steps) of a system of the inventionusing a wireless network using a protocol such as Wi-Fi (IEEE standards802.11, 802.11a, 802.11b, 802.11e, 802.11g, 802.11i, 802.11n, and802.11ac, just to name a few examples). For example, signals from acomputer may be transferred, at least in part, wirelessly to componentsor other computers.

In an embodiment, with a Web browser executing on a computer workstationsystem, a user accesses a system on the World Wide Web (WWW) through anetwork such as the Internet. The Web browser is used to download webpages or other content in various formats including HTML, XML, text,PDF, and postscript, and may be used to upload information to otherparts of the system. The Web browser may use uniform resourceidentifiers (URLs) to identify resources on the Web and hypertexttransfer protocol (HTTP) in transferring files on the Web.

IV. Additional Embodiments

Generally, one of ordinary skill in the art will recognize that theexamples set forth herein are non-limiting and only illustrative ofwidely-applicable principles. Accordingly, this description of theinvention has been presented for the purposes of illustration anddescription. It is not intended to be exhaustive or to limit theinvention to the precise form described, and many modifications andvariations are possible in light of the teaching above. The embodimentswere chosen and described in order to best explain the principles of theinvention and its practical applications. This description will enableothers skilled in the art to best utilize and practice the invention invarious embodiments and with various modifications as are suited to aparticular use. The scope of the invention is defined by the followingclaims.

I claim:
 1. A computer-implemented method in a configuration server of adata network, implemented at least partially in hardware, for wirelesslyconfiguring slave base stations in a wireless portion of the datanetwork, the method comprising the steps of: storing WDS configurationdata for a master base station having a wired connection to the datanetwork, the master base station providing wireless access for wirelessstations to the data network; establishing a data connection with awireless station having a first radio for wireless connection to thedata network, and having a second radio for wireless connection to aslave base station over a second data network, the wireless stationwithin radio range of the slave base station second radio; generatingdynamic WDS configuration data for the slave base station from the WDSconfiguration data of the master base station; sending the dynamic WDSconfiguration data to the wireless station, wherein the wireless stationforwards the dynamic WDS configuration data to the slave base stationusing the second radio; and sending the dynamic WDS configuration datato the master base station for authenticating the slave base station. 2.The method of claim 1, further comprising: receiving WDS configurationdata for the master base station, from the master base station, prior togenerating dynamic WDS configuration data.
 3. The method of claim 1,wherein the dynamic WDS configuration data comprises a dynamicallygenerated SSID.
 4. The method of claim 1, wherein the dynamic WDSconfiguration data comprises authentication credentials.
 5. The methodof claim 1, further comprising: receiving an indication that the slavebase station is with radio range of the master base station.
 6. Themethod of claim 1, wherein a plurality of slave base stations areconfigured along with the slave base station, successively when withinradio range of the wireless station.
 7. The method of claim 1, wherein aplurality of slave base stations are configured along with the slavebase station and further comprising: detecting that one of the pluralityof slave base stations has been removed from communication with themaster base station; and responsive to the detection, generating newdynamic configuration data for the slave base station and remaining ofthe plurality of slave base stations for configuring under newcredentials.
 8. A computer-implemented method in a wireless station of adata network, implemented at least partially in hardware, for wirelesslyconfiguring slave stations in a wireless portion of the data network,the method comprising the steps of: establishing with a first radio adata connection with a master base station having a wired connection tothe data network, the master base station providing wireless access forwireless stations to the data network; establishing with a second radioa data connection with a wireless station having a first radio forwireless connection to the data network, and having a second radio forwireless connection to a plurality of slave base stations over a seconddata network, the wireless station within radio range of the pluralityof slave base stations; receiving dynamic WDS configuration data for theslave base station from WDS the master base station over the firstradio; and transmitting the dynamic WDS configuration data to a first ofthe plurality of slave base stations over the second radio, wherein thefirst slave base station uses the dynamic WDS configuration data forauthenticating to the master base station, wherein the first slave basestation provides wireless access for wireless stations to the datanetwork, on behalf of the master base station.
 9. The method of claim 8,further comprising: receiving data packets from a wireless station; andtransmitting the data packets to the master base station for access tothe Internet.
 10. The method of claim 8, further comprising: receivingdata packets from the master base station; and transmitting the datapackets to a wireless station.
 11. The method of claim 8, wherein aplurality of slave stations are wirelessly configured by the wirelessstations at the same time, from within radio range of each other. 12.The method of claim 8, wherein the plurality of slave stationsconfigured at the same time, are configured in succession throughsuccessive radio connections, under a single automated process.