Abstract:
Methods and apparatuses for operating a wireless mobile station configured to communicate with a wireless access point are described. A first awake timer may be started in response to receiving a beacon signal from the wireless access point. The beacon signal may indicate that data is available or pending for the wireless mobile station. A second awake timer may be started in response to data received from the wireless access point. When the second awake timer expires, the wireless mobile station may return to the sleep state. In one embodiment, the first awake timer counts for a first period of time and the second awake timer counts for a second period of time which is shorter than the first period of time. The RF radio may be in a higher power state when the first and/or the second awake timers are counting. In one embodiment, the wireless mobile station and the wireless access points may be synchronized using target beacon transmission times of the beacon signal.
Abstract:
In order to facilitate reduced power consumption of an electronic device (such as a smartphone) when communicating with another electronic device (such as an access point) in a wireless network, the electronic device may change a wake policy based on the applications executing on the electronic device. In particular, the electronic device may monitor a subset of the applications currently executed by a processor in the electronic device, where the subset can include zero or more of the applications. Based on the subset, the wake policy of an interface circuit in the electronic device may be changed. This wake policy may specify a frequency of wake ups to receive information from the other electronic device and/or monitoring of unicast or multicast bits in a Traffic Indication Map element. In this way, the time that the electronic device is in the active mode can be reduced, thereby reducing power consumption.
Abstract:
An electronic device receives a request for access to the infrastructure network (and, more generally, a ‘resource’) from the other electronic device via a peer-to-peer link. In response to the request, the electronic device determines that it has access to the infrastructure network, and provides a response to the other electronic device via the peer-to-peer link indicating that the electronic device has access to the infrastructure network. Then, the electronic device establishes secure communication with the other electronic device, and provides access information to the other electronic device via the peer-to-peer link using the secure communication. This access information facilitates access to the infrastructure network.
Abstract:
A method and system are described for determining the reliability of the communications between a portable electronic device and an access point (AP) before associating with the AP. In the described embodiments, a first probe request frame is transmitted to the AP at a first data rate, and a first probe response frame is received from the AP, wherein the first probe response frame is responsive to the first probe request frame. Then, a second probe request frame is transmitted to the AP at a second data rate, wherein the first data rate is lower than the second data rate. Then, the portable electronic device determines if a second probe response frame is received from the AP, wherein the second probe response frame is responsive to the second probe request frame. The portable electronic device then determines the reliability of the communications between the portable electronic device and the AP.
Abstract:
An electronic device, e.g., a mobile device, having access to a wireless network roams from one access point (AP) to another using access point detection based on location and learning. A learning scheme may modify a list of nearby access points determined based on location to identify neighboring access points where roaming is possible. The identified neighboring access points where roaming is possible may be ordered based on roaming history, such as the frequency of the roams to a particular AP. The roaming history may be maintained on a per client basis or aggregated across all clients using an AP.
Abstract:
In order to facilitate access to a wireless network, access information (and, more generally, credentials) may be provided to an electronic device via an image. In particular, the electronic device may capture an image that includes a representation of the access information. For example, the electronic device may scan a two-dimensional representation of the access information, such as a Quick Response (QR) code. Then, the electronic device may analyze the image to extract the access information. Next, the access information may be used to access the wireless network. This communication technique allows a user of the electronic device to access the wireless network with less effort, thereby improving the user's experience.
Abstract:
Automatically determining and alerting a user to available wireless networks. Initially, the method may automatically determine that one or more wireless networks are available to a wireless device at a location. The method may determine if the wireless device has been present at the first location for more than a threshold amount of time, e.g., based on periodic determination of the available wireless networks to the wireless device. Based on the wireless device being present at the first location for more than the threshold amount of time, an alert may be automatically displayed to the user on a display of the wireless device. The alert may indicate at least one wireless network of the one or more wireless networks at the first location. The wireless device may connect to wireless network indicated by the alert in response to user input.
Abstract:
Methods and apparatus for location-based control of parameters such as radio frequency (RF) transmission characteristics of a wireless device. In one embodiment, a determination of a maximum allowable level for a given characteristic associated with the location of the wireless device is made, and the transmission characteristic of the wireless device is adjusted based at least in part on this maximum allowable level. The location may correspond to a regulatory domain with specific requirements for wireless transmitters. A database is referenced to retrieve these requirements. The maximum allowable levels are derived from the requirements. Thus, exemplary wireless devices are capable of universal regulatory compliance.
Abstract:
An electronic device receives a list of available networks and associated access credentials via a cellular-telephone network. These available networks may be other than the cellular-telephone network and may use a communication technique other than a cellular-telephone communication technique, such as an IEEE 802.11 protocol. For example, a base station in the cellular-telephone network may track the location of the electronic device, and may provide the list to the electronic device when the cellular-telephone network performance is constrained or degraded. In response to receiving the list, the electronic device may select a network from the available networks based on a communication criterion, such as: proximity to the electronic device, a signal strength, security, and/or communication quality. Information specifying this selection may be provided via the cellular-telephone network, and then instructions that transition communication with the electronic device from the cellular-telephone network to the selected network may be received.
Abstract:
A system, apparatus and method for selecting master devices in a peer-to-peer communication environment. Devices select a master to facilitate their synchronization, and rendezvous according to a schedule of availability windows broadcast by the master as part of periodic synchronization frames. Devices capable of serving as master advertise their selection metrics, which are converted into a master preference value by a selection algorithm applied uniformly by all devices in the environment. Individual devices may identify the best local master and synchronize to it, yielding a cluster of synchronized peers. Clusters may then be synchronized to masters at further range. Individual devices conserve power by being automatically synchronized instead of having to individually discover other devices and services, and can power off their radios without sacrificing discoverability. Synchronization and peer-to-peer communication as provided herein coexists with other device demands, such as Bluetooth® operations, infrastructure-based communications and so on.