摘要:
A system and method for concurrent WLAN and WPAN wireless modes from a single device is presented. A client uses a Wi-Fi device's infrastructure mode to communicate in a WLAN environment and, during idle WLAN times, uses the Wi-Fi device's adhoc mode to communicate in a WPAN environment. The Wi-Fi device uses a watchdog timer to switch between infrastructure mode and adhoc mode. When the client's Wi-Fi device switches to infrastructure mode, the client's Wi-Fi device uses an infrastructure register and an infrastructure device driver to transfer data over the WLAN environment. Likewise, when the client's Wi-Fi device switches to adhoc mode, the client's Wi-Fi device uses an adhoc register and an adhoc device driver to transfer data over the WLAN environment. The client uses a code shim to act as a virtual device driver at times when either the infrastructure device driver or the adhoc device driver is inactive.
摘要:
A security fob periodically transmits wireless access signals that can be received by entities such as computers, buildings and the like to which access is sought. A motion detector is in the fob so that when the fob has been motionless for a threshold period non-essential components are deenergized, putting the fob in a sleep mode to conserve battery power.
摘要:
A printed circuit board (PCB) for supporting a ball grid array (BGA) includes stress relief features to reduce stress on the solder balls. The stress relief features can be plural lines formed into the PCB along the edges of the BGA, and/or holes formed through the PCB near the corners of the BGA.
摘要:
An arrangement facilitating the connection of a client to a network through an access point, particularly in an area with overlapping 0.11n channels. Preferably, a client may communicate with two access points and “ask” one of them to stop transmitting long enough so as to facilitate communication with the other access point. Current specifications otherwise provide no workable arrangement for handling overlapping channels.
摘要:
A wireless communication network comprising: (1) a plurality of mobile devices each configured to receive a beacon being broadcasted within the network and determine based on information transmitted within the beacon whether the mobile device is supported within the network; and (2) one or more access devices configured to broadcast the beacon within the network. Each of the mobile devices has a transmitting mechanism for communicating with the one or more access device. However, only those mobile devices that are supported by the network respond to the receipt of the beacon. Thus, no transmission occurs from the mobile devices until the device is identified as being supported by the network. These mobile devices instantiating a communication path with the one or more access devices and request an authentication from the one or more access devices. In this manner, a handshake mechanism is established between the access devices and the mobile devices that are supported by the network. Unnecessary requests from illegal mobile devices that clutter up the air waves when attempting to establish a handshake within networks with which they are not compatible is substantially eliminated.
摘要:
The battery life of batteries of a mobile device operating in a wireless network is optimized by dynamically changing symbol rates and bits per symbol and selecting one for communicating based upon the source providing power to the mobile device.
摘要:
A method and system for reconfiguring a multi-dimension sound system is disclosed. The method and system include a remote control that is capable of emitting a low-frequency sound wave pulse pattern, and a plurality of speakers, wherein each speaker includes a pulse counter that counts a number of sound wave pulses received from the remote control over a predetermined time period. The method and system further include an audio receiver that includes a digital audio encoding system. The receiver uses the respective sound wave pulse count from each of the speakers to compute the distance between the remote control and each speaker, and programs the digital audio encoding system with speaker delay times based on the computed distances.
摘要:
Aspects for increasing control information from a single general purpose input/output (GPIO) mechanism are described. The aspects include establishing a plurality of voltage levels to indicate a plurality of states for association with installed options on a computer system planar. Further included is the determination of which of the installed options is present via the single GPIO. An analog-to-digital (A/D) converter is also included and converts a voltage level signal indicative of installed options on the computer system planar, while a resistor network is utilized to establish the plurality of voltage levels.
摘要:
The display of a notebook computer includes a privacy filter extending over the display screen to limit the viewing angle within which the image on the screen can be discerned. To allow for normal viewing when the privacy feature is not required, the privacy filter is movable from the screen by sliding into a cavity extending from one side of the screen to be rolled onto a roller or to be stored partly behind the screen. Alternately, a privacy filter is provided that is electrically switchable between a mode in which the viewing angle is limited and a mode in which normal viewing is permitted. The movable privacy filter includes closely spaced louvers surrounded by clear plastic or, alternately, a polarizer. The switchable privacy filter includes a liquid crystal device and a polarizer.
摘要:
A system and method for storing adapter card Option ROM BIOS extensions on the system's DASD and, more particularly, on a partition of the DASD that is generally inaccessible to the operating system. The system may partition the system DASD into a user partition and a hidden partition where the hidden partition is preferably inaccessible to the operating system. BIOS extensions files are stored in the hidden partition. The system BIOS, when executed, identifies the peripheral devices on the system and interrogates the hidden partition for BIOS extension files corresponding to each of the identified devices. If the hidden partition contains a BIOS extension file corresponding to an identified peripheral device, the file is verified for authenticity. If the verification completes successfully, the BIOS extension file is copied into shadow RAM and control is passed to it. In one embodiment, each BIOS extension file are downloaded to the system's DASD using a standards-based update process that is independent of the vendor or adapter card type.