Abstract:
A particular method includes receiving a power save polling frame from a station at an access point. The method also includes, in response to receiving the power save polling frame, transmitting a frame from the access point to the station, the frame indicating whether traffic associated with the station is buffered at the access point. Another particular method includes transmitting a power save polling frame from the station to the access point. The method further includes, in response to transmitting the power save polling frame, receiving a frame from the access point indicating whether traffic associated with the station is buffered at the access point.
Abstract:
Methods, systems, and devices are described for enhanced network utilization between an access point and a number of wireless stations. A station (STA), following a transmit opportunity (TXOP), may determine a utilization of the TXOP. Based on the determination, the STA may adjust a delay time for a subsequent transmission. The adjustment of the delay time may include increasing an initial contention window (CW), increasing a backoff value, and/or increasing a number of backoffs for TXOPs following an underutilized TXOP. The increased delay time may result in, on average, increased backoff times in such situations. The delay time may be reduced to a minimum delay time following a certain number of TXOPs that more fully utilize the TXOP. Utilization of the TXOP may be determined based on an amount of time used for the TXOP relative to a TXOP limit that may be set by an access point.
Abstract:
Systems, methods, and devices for reducing collisions in a wireless communications network are described herein. In some aspects, a receiver receives a paging message. The paging message includes an ordering and a multiplier. A processor determines a first wake-up time based on the ordering and the multiplier. The wireless device wakes up at the determined wake-up time. The wireless device receives data via the receiver.
Abstract:
Systems, methods, and devices for communicating frames in a wireless network are disclosed. In one aspect, a method includes determining a protocol version field value for a frame control field of a wireless message, generating the frame control field, the frame control field generated to comprise a protocol version field having the protocol version field value, and a type field having a length based on the protocol version field value, generating the wireless message, the wireless message comprising a media access control header, the media access control header comprising the frame control field; and transmitting the wireless frame.
Abstract:
Certain aspects of the present disclosure provide techniques and apparatus for using different MAC addresses in frames for the same station to indicate how to process the frames. In this manner, frames for IEEE 802.11ac can carry information not present in legacy frames (e.g., frames according to IEEE 802.11a/n), but these frames may be interpreted by legacy devices in a legacy way. One example method generally includes receiving a first frame comprising an indication of a first MAC address and processing the received first frame based on the first MAC address. For certain aspects, the method further includes receiving a second frame comprising an indication of a second MAC address, wherein the second MAC address is different than the first address; and processing the received second frame based on the second MAC address, such that the processing of the second frame is different than the processing of the first frame.
Abstract:
Techniques for proving enterprise mode security for relays are disclosed. For example, enterprise mode security based on IEEE 802.1x is provided for relays or other similar devices to extend the coverage of access point hotspots or other similar access point use cases. According to one aspect, a relay incorporates an authentication client associated with an authentication server. According to another aspect, a four address format is employed for tunneling messages via a relay between a station and an access point. According to another aspect, a cryptographic master key associated with an access point and a station is provided to a relay to enable the relay to be an authenticator for the station.
Abstract:
A network device can implement functionality for dynamically varying the total back-off duration. The network device can determine a total transmit duration for transmitting data from on a communication medium. If the total transmit duration exceeds a predetermined transmit interval associated with the data, the network device can determine the total back-off duration based, at least in part, on the total transmit duration and the predetermined transmit interval. The network device can initiate the total back-off duration by deferring data transmission on the communication medium during the total back-off duration. In some embodiments, if the network device implements multiple consecutive back-off intervals, the network device can determine whether to vary the duration of a second back-off interval depending on whether a transmission by another network device is detected on the communication medium after a first back-off interval elapses.
Abstract:
Certain aspects of the present disclosure provide methods and apparatus for applying security to packets, for example, packets utilizing short MAC headers.
Abstract:
Systems, methods, and devices for communicating in a wireless network are provided. In one aspect, a non-zero portion of a node identifier may be used to generate a partial association identifier. If no portion of the node identifier can be determined to be non-zero, then a default value may be used for the partial association identifier. In some other aspects, the partial association identifier may be based on a random number. In some other aspects, a portion of a node identifier is evaluated to determine if it is zero. If the portion is non-zero, a partial association identifier is generated based on the portion. If the portion is zero, a partial association identifier is generated based on the portion.
Abstract:
Systems, methods, and devices for configuring connectivity in a wireless network are described herein. In some aspects, a wireless device configured to connect to a first wireless network includes a receiver configured to receive a first dynamic host configuration protocol (DHCP) message from a first network device on the first wireless network. The wireless device further includes a processor configured to determine whether the first DHCP message indicates that the first wireless network does not provide access to a second network. The processor is further configured to determine whether to maintain a connection to the second network accessed using a third wireless network based on the first DHCP message. The leader device further includes a transmitter configured to transmit a second DHCP message to the first network device to connect to the first wireless network. The wireless device is further configured to supply devices on a first wireless network with access to a second network.