摘要:
Embodiments of methods for optimizing power savings in a wireless device by maintaining sleep in sub-frames of an extended Listen Window, in an I.E.E.E. 802.16m communication system. In one embodiment, the Listen Window is extended into the Sleep Window, wherein at least one sub-frame remains designated for sleep. The power savings may be used when HARQ retransmissions are scheduled or for VoIP transmissions and so forth.
摘要:
Embodiments of methods for optimizing power savings in a wireless device by maintaining sleep in sub-frames of an extended Listen Window, in an I.E.E.E. 802.16m communication system. In one embodiment, the Listen Window is extended into the Sleep Window, wherein at least one sub-frame remains designated for sleep. The power savings may be used when HARQ retransmissions are scheduled or for VoIP transmissions and so forth.
摘要:
A system to protect MAC control messages is presented. In one embodiment, the system comprises a processor, a memory coupled to the processor, and a communication device coupled to the processor to communicate wirelessly over multiple sub-channels in an orthogonal frequency division multiple access (OFDMA) wireless network. The communication device is operable to determine that a MAC control message is protected if an indicator within the MAC control message is set. The communication device validates, if the indicator is set, integrity of the MAC control message in conjunction with a CMAC (cipher-message authentication code) tuple concatenated with the MAC control message.
摘要:
A system to protect MAC control messages is presented. In one embodiment, the system comprises a processor, a memory coupled to the processor, and a communication device coupled to the processor to communicate wirelessly over multiple sub-channels in an orthogonal frequency division multiple access (OFDMA) wireless network. The communication device is operable to determine that a MAC control message is protected if an indicator within the MAC control message is set. The communication device validates, if the indicator is set, integrity of the MAC control message in conjunction with a CMAC (cipher-message authentication code) tuple concatenated with the MAC control message.
摘要:
Some demonstrative embodiments include apparatuses, systems and/or methods of supporting streaming over a Protocol Adaptation Layer (PAL). For example, an apparatus may include a first PAL communication unit to communicate PAL traffic with a second PAL communication unit over a communication link, the PAL traffic comprising traffic of a PAL connection, over a PAL, between a first device and a second device, the PAL is above a layer of the communication link, the PAL traffic comprising data to be communicated between the first device and one or more endpoints via the second device, wherein the first PAL communication unit is to communicate an endpoint open stream request and an endpoint open stream response with the second PAL communication unit over the communication link.
摘要:
Disclosed herein are connection management techniques for wireless docking. According to various such techniques, a wireless docking station may be arranged to implement an auto-connect mode setting that defines whether mobile clients are permitted to automatically connect to the wireless docking station, and may be arranged to implement a persistent pairing setting that defines whether authentication certificates may be reused. In some embodiments, the wireless docking station may be configured to advertise the auto-connect mode setting and the persistent pairing setting in auto-connect capability information elements (IEs) that it includes in probe requests and/or probe responses. The embodiments are not limited in this context.
摘要:
Some demonstrative embodiments include devices, systems and/or methods of communicating during an allocated time period. For example, an apparatus may include a wireless communication unit to perform the functionality of a first station to communicate data with a second station during an allocated time period, wherein, when both the first and second stations do not have data ready for transmission, the wireless communication unit is to communicate frames between the first station and the second station to occupy the allocated time period until at least one of the first and second stations has data ready for transmission or until an end of the allocated time period.
摘要:
Some demonstrative embodiments include apparatuses, systems and/or methods of controlling data flow over a communication network. For example, an apparatus may include a communication unit to communicate between first and second devices a transfer response, the transfer response in response to a transfer request, the transfer response including a transfer pending status indicating data is pending to be received at the second device, the communication unit is to communicate the transfer response regardless of whether a retry indicator of the transfer request represents a first request for transfer or a retried request.
摘要:
Some demonstrative embodiments include devices, systems and/or methods of communicating during an Association-Beamforming-Training (A-BFT). For example, a device may include a wireless communication unit to communicate a beacon frame during a beacon transmission interval (BTI), the beacon frame including a responder address field including a responder address representing one or more client devices, which are allowed to transmit during an A-BFT period following the BTI.
摘要:
This disclosure describes systems, methods, and devices related to unauthorized users notification. A device may identify a request from a first device to establish a direct connection. The device may determine a connection status based at least in part on information included in the request. The device may generate a response frame including a connection status information element (IE). The device may cause to send the response frame to the first device.