Abstract:
Methods, devices, and computer program products for synchronization of wireless devices in a peer-to-peer network are described herein. In one aspect, a method for synchronizing a wireless communication apparatus is provided. The method includes determining, at a wireless communication apparatus, a first time interval since transmitting a message including a time value of a clock signal of the wireless communication apparatus; and determining, at the wireless communication apparatus, a second time interval since updating the time value of the wireless communication apparatus; and transmitting a message comprising content that is based on comparing the first time interval to a first threshold and comparing the second time interval to a second threshold.
Abstract:
A device for wireless communication includes key logic configured to obtain a candidate group key corresponding to a data link group. The device also includes a wireless interface configured to transmit an announcement message to one or more devices of the data link group during a discovery window of a first communication channel. The announcement message includes a multicast message and indicates availability of the candidate group key.
Abstract:
A device for wireless communication includes key logic configured to obtain a candidate group key corresponding to a data link group. The device also includes a wireless interface configured to transmit an announcement message to one or more devices of the data link group during a paging window designated for the data link group. The announcement message includes a multicast message and indicates availability of the candidate group key, and the announcement message.
Abstract:
Methods, apparatus, and computer-readable media for wireless communication may involve techniques for throughput estimation. An expected air time parameter may be used as a parameter for estimating throughput. The expected air time parameter may be indicative of an estimated air time fraction obtainable for communications using an access point (AP), for example, between a wireless station (STA) and the AP. Either the expected air time parameter or an estimated air time fraction determined (e.g., calculated) from the expected air time parameter may be transmitted from the AP to the STA (or other communication device) to allow the STA (or other communication device) to determine an estimated throughput for communications using the AP.
Abstract:
Techniques for proving enterprise mode security for relays are disclosed. For example, enterprise mode security based on IEEE 802.1x is provided for relays or other similar devices to extend the coverage of access point hotspots or other similar access point use cases. According to one aspect, a relay incorporates an authentication client associated with an authentication server. According to another aspect, a four address format is employed for tunneling messages via a relay between a station and an access point. According to another aspect, a cryptographic master key associated with an access point and a station is provided to a relay to enable the relay to be an authenticator for the station.
Abstract:
Systems and methods for communicating in a wireless communication system are described. In one aspect a method in a wireless communication system includes assigning a first identifier at a first access point, the first identifier for establishing a link with the first access point. The method includes receiving from a device an access request message to establish the link, the access request message including a second identifier associated with a plurality of access points configured to provide the link, the plurality of access points including the first access point, the second identifier including a sequence of bits having a bit length, wherein the sequence of bits is based on the first identifier, and wherein the bit length of the sequence of bits is less than the first number of bits. The further includes transmitting an access response message establishing the link with the device and including the first identifier.
Abstract:
Methods and apparatus for multiple user uplink are provided. In one aspect, a method includes receiving, at a wireless device, a trigger message allocating one or more wireless transmission resources, each resource allocated to a plurality of stations. The method further includes determining whether to transmit over the allocated resources based on a contention procedure. The method further includes selectively transmitting over the allocated resources based on said determining.
Abstract:
Methods, systems, and devices are described for wireless communication at a wireless station. Specifically, the present disclosure prevents a station from decrypting unauthorized messages transmitted by wireless device(s) impersonating an AP. In some examples, the AP may continuously and periodically alter the keys for each transmitted message transmitted to prevent malicious interference by unauthorized devices. In some examples, the method may use a symmetric cipher (e.g., Message Integrity Code) for a message using an undisclosed MIC key.
Abstract:
Methods, systems, and devices are described for wireless communication at a wireless device, and for selecting or coordinating with an access point (AP) based on association performance of access points. A wireless device under the coverage of more than one AP can associate with one or more APs to establish communication with a network. A wireless device may estimate a delay due to authentication with an AP, and the wireless device may communicate with another AP while waiting to be authenticated. In some examples, a wireless device may associate with an AP despite sub-optimal access metrics; this may involve certain permissions from the AP. In other examples, an AP may manage pre-association devices, post-association devices, or both, based on certain priorities. A mobile device may request and/or receive information regarding association delays and/or channel load metrics from one or several APs and may select an AP accordingly.
Abstract:
In a particular embodiment, a method includes receiving, by a first mobile device, a first discovery message via a network advertisement protocol common to a plurality of mobile devices. The first discovery message includes information specific to a mobile device cluster that is a subset of the plurality of mobile devices. The method further includes using the information to communicate with at least a second mobile device of the mobile device cluster using a second cluster protocol that is different than the network advertisement protocol.