Abstract:
A Wi-Fi device in a WLAN network includes a processor and a transceiver adapted to be coupled to an antenna, and a power saving medium access in congested network environments algorithm that is activated after a Wi-Fi connection is established with its access point (AP). A Traffic Indication Map (TIM) bitmap in a TIM information element received in a beacon frame from the AP is analyzed to determine whether more than a predetermined number of bits (X) are set to indicate the AP has ≥1 buffered frame for ones of the Wi-Fi devices to conclude whether the WLAN is in a congested environment. When in a congested environment, transmissions responsive to the beacon are postponed by entering a sleep mode for a random period of time (P). After P expires, the sleep mode is exited and a poll frame is transmitted to the AP to try to gain medium access.
Abstract:
Techniques for determining an angle-of-arrival of a wireless transmission are provided, including receiving, with a first antenna, at least a first portion of a wireless transmission, determining when a second portion of the wireless transmission will be received, switching to the second antenna to receive the second portion of the wireless transmission, determining an angle of arrival of the wireless transmission based on the first portion and the second portion of the wireless transmission, and outputting the angle of arrival of the wireless transmission.
Abstract:
Systems and methods for Transmission Control Protocol (TCP) acknowledgement (ACK) packet suppression are described. In various implementations, these systems and methods may be applicable to low-power communications. For example, a method may include receive an incoming TCP packet at a TCP layer implemented by the communication system; de-encapsulating the incoming TCP packet using a TCP protocol to identify an incoming Secure Sockets Layer (SSL) or Transport Layer Security (TLS) packet; passing the incoming SSL or TLS packet from the TCP layer to an SSL or TLS layer; and signaling, by the SSL or TLS layer to the TCP layer in response to the SSL or TLS layer having received the incoming SSL or TLS packet, that a TCP acknowledgement be suppressed by the TCP layer.
Abstract:
Systems and methods for Transmission Control Protocol (TCP) acknowledgement (ACK) packet suppression are described. In various implementations, these systems and methods may be applicable to low-power communications. For example, a method may include receive an incoming TCP packet at a TCP layer implemented by the communication system; de-encapsulating the incoming TCP packet using a TCP protocol to identify an incoming Secure Sockets Layer (SSL) or Transport Layer Security (TLS) packet; passing the incoming SSL or TLS packet from the TCP layer to an SSL or TLS layer; and signaling, by the SSL or TLS layer to the TCP layer in response to the SSL or TLS layer having received the incoming SSL or TLS packet, that a TCP acknowledgement be suppressed by the TCP layer.