Abstract:
Various aspects provide for receiving identity information from a station (STA) that identifies the STA as a sensor-type STA, determining whether communication attributes of the STA correlates with communication attributes expected for a sensor-type STA, and determining that the identity information received from the STA is false when the one or more communication attributes of the STA is uncorrelated with the one or more communication attributes expected for a sensor-type STA. Additional aspects provide for initiating one or more remedial actions upon determining that the identity information is false. The communication attributes may pertain to packet size, inter-arrival time, and/or inter-arrival time variance. The remedial actions may include blocking a future communication with the STA, communicating a warning message to the STA, and/or assigning the STA to a particular access window. Communications by the STA may comply with aspects of Institute of Electrical and Electronics Engineers (IEEE) 802.11ah.
Abstract:
A method of transmitting universal serial bus (USB) frames over a communications channel is disclosed. A USB device receives one or more USB frames from a host device via a network, wherein the one or more USB frames are encapsulated in one or more data packets based on a communications protocol associated with the network. The USB device further synchronizes a local clock signal with a clock signal of the host device using a clock synchronization mechanism of the communications protocol. The USB device then determines a number of USB frames transmitted by the host device and processes the one or more USB frames based, at least in part, on the synchronized local clock signal. For some embodiments, the USB device may receive a frame count value and a corresponding media time value from the host device.
Abstract:
In one example, a method includes receiving, by a wireless docking center (WDC) and from a wireless dockee (WD), a request to access one or more peripheral functions (PFs) associated with the WDC, and receiving, by the WDC and from the WD, one or more authentication credentials. In this example, the method also includes determining, by the WDC, whether or not the one or more authentication credentials received from the WD grant access to the one or more PFs to which the WD requests access. In this example, the method also includes permitting, by the WDC, the WD to access a first PF of the one or more PFs to which the WD requests access in response to determining that the one or more authentication credentials grant access to the first PF.
Abstract:
Source and sink devices are adapted to facilitate streaming of screen content data. According to one example, a source device can capture video data and graphics data for one or more frames. The video data may be transmitted via a first protocol path and the graphics data may be transmitted via a second protocol path, where the second protocol path is different from the first protocol path. The sink device may receive the video data and graphics data, and may render the video data and graphics data for the one or more frames. Other aspects, embodiments, and features are also included.
Abstract:
A first computing device includes: a memory storing instructions; and at least one processor. The at least one processor is configured to: establish a connection with a second computing device, responsive to initiating the connection, perform content discovery with the second computing device; and establish a session of a service responsive to performing content discovery.
Abstract:
Source devices are adapted to facilitate video data streaming to a sink device. According to one example, a source device can capture a plurality of frames of video data, each frame including a set of graphical command tokens. Responsive to a delay between the source device and a sink device, the source device can select one or more frames of the plurality of frames to be dropped. The source device may transmit the plurality of frames of video data to a sink device, without transmitting the one or more frames selected to be dropped. Other aspects, embodiments, and features are also included.
Abstract:
Techniques are described for controlling power consumption in a peer-to-peer communication system. In accordance with various examples, the techniques include determining a power save mode of a first node, determining a power save mode of a second node, determining a category of data connection between the first node and the second node, and adjusting a power save parameter of the first node based at least in part on the power save mode of the first node, the power save mode of the second node, and the category of data connection.
Abstract:
In one example, a method for transmitting video data includes capturing a plurality of sets of graphical command tokens respectively renderable into a plurality of frames of video data; and responsive to determining that a length of a current set of graphical command tokens of the plurality of sets of graphical command tokens is the same as a length of a previous set of the plurality of sets of graphical command tokens, outputting, by a source device and to a sink device, a compressed version of the current set of graphical command tokens.
Abstract:
In one example, a method includes receiving, from a user application and with a wireless docking service of a wireless docking communications stack executing on a computing device, a request to discover one or more peripheral functions within wireless communication range of the computing device. The method also includes, responsive to receiving the request, discovering, with the wireless docking service, the one or more peripheral functions without communicating with a wireless docking center. The method further includes consolidating the peripheral functions into a docking session for the user application. The method also includes, responsive to receiving the request, sending a docking session identifier and one or more respective references corresponding to the one or more peripheral functions to the user application.
Abstract:
A first computing device includes: a memory storing instructions; and at least one processor. The at least one processor is configured to: establish a connection with a second computing device, responsive to initiating the connection, perform content discovery with the second computing device; and establish a session of a service responsive to performing content discovery.