Abstract:
Systems and methods for communicating in a wireless communication system are described. Various processes for reducing the initial link set up time are described. In aspect a method in a wireless communication system is provided. The method includes transmitting two or more network domain identifiers from an access point, each of the network domain identifiers being associated with a respective network service. The method further includes receiving an access request message for establishing the network service associated with at least one of the transmitted network domain identifiers.
Abstract:
Methods, systems, and devices are described for wireless communication at a wireless station. Specifically, the present disclosure prevents a station from decrypting unauthorized messages transmitted by wireless device(s) impersonating an AP. In some examples, the AP may continuously and periodically alter the keys for each transmitted message transmitted to prevent malicious interference by unauthorized devices. In some examples, the method may use a symmetric cipher (e.g., Message Integrity Code) for a message using an undisclosed MIC key.
Abstract:
Methods, apparatuses, and systems are described that implement techniques and protocols to enable a station to receive a neighbor query request from a first associated access point that is associated with the station. The station may wirelessly communicate a neighbor report of a second access point to the first access point while the station is unassociated with the second access point.
Abstract:
Methods, apparatuses, and systems are described that implement techniques and protocols to enable a station to receive a neighbor query request from a first associated access point that is associated with the station. The station may wirelessly communicate a neighbor report of a second access point to the first access point while the station is unassociated with the second access point.
Abstract:
Methods, systems, and devices are described for unicast key management across multiple neighborhood aware network (NAN) data link networks (NDL) comprising: establishing, by a first device, a first association with a second device via a first data link; establishing, by the first device, a second association with the second device via a second data link; and using a single unicast key to encrypt unicast traffic transmitted via the first data link and the second data link between the first device and the second device.
Abstract:
Systems and techniques are disclosed to manage coexistence of wireless technologies, including 5G unlicensed transmissions, with 802.11 transmissions in the unlicensed band. Aspects of the present disclosure include collision avoidance to achieve fair access of transmissions on unlicensed bands. Other aspects, embodiments, and features are also claimed and described.
Abstract:
Methods, systems, and devices are described for presence indication and determination in a wireless data link, such as a neighbor aware network (NAN) data link (NDL). A wireless station (STA) may identify a set of devices associated with the wireless data link and transmit a message to the set of devices including a presence request indicator. The STA may determine that a first subset of the set of devices are present in the wireless data link based on receiving a response to the message from the first subset. The STA may also determine that at least one device of the set of devices are absent from the wireless data link based on receiving a notice of absence message from the one device.
Abstract:
Methods and devices for communicating data in a wireless communications network are described herein. In one aspect, network layers are offloaded from a station to an access point. In another aspect, flow control is introduced between the station and access point. In another aspect, segmentation is introduced between the station and access point. In another aspect, keep alive is introduced between the station and access point. In another aspect, in addition to MAC layer sequencing and acknowledging, additional sequencing and acknowledging is performed between the station and access point to ensure reliable transmission of data. In another aspect, MAC layer sequencing and acknowledging is disabled. In another aspect, a last MPDU fragment is used to ensure reliable transmission of data.
Abstract:
Techniques for proving enterprise mode security for relays are disclosed. For example, enterprise mode security based on IEEE 802.1x is provided for relays or other similar devices to extend the coverage of access point hotspots or other similar access point use cases. According to one aspect, a relay incorporates an authentication client associated with an authentication server. According to another aspect, a four address format is employed for tunneling messages via a relay between a station and an access point. According to another aspect, a cryptographic master key associated with an access point and a station is provided to a relay to enable the relay to be an authenticator for the station.
Abstract:
Methods and apparatus for wireless communication in a peer-to-peer network are described herein. In one aspect, a method of wireless communication apparatus is provided. The method includes transmitting during a discovery window, by a first device, a first service discovery frame (SDF) or other action frame to a second device, the first SDF or other action frame comprising ranging information for performing a ranging protocol. The method further includes performing the ranging protocol, by the first device, in accordance with the ranging information.