Abstract:
In some examples, compensating for hysteretic characteristics of a crystal oscillator in a timing circuit includes obtaining a plurality of successive temperature measurements. From the plurality of successive temperature measurements, a temperature gradient having a sign and a magnitude can be determined. A frequency compensation parameter can then be determined based on any combination of two or more factors chosen from a set of factors including a temperature measurement, the sign of the temperature gradient, and the magnitude of the temperature gradient. A frequency error of the timing circuit can then be compensated based on the frequency compensation parameter.
Abstract:
Methods, apparatuses, and devices are disclosed that may be used re-allocate active scan times of available frequency channels used by wireless transceivers within range of a mobile device. Re-allocation of active scan times may comprise increasing and/or decreasing active time scans based, at least in part, on a number of wireless transceivers discovered transmitting on one or more of the available frequency channels.
Abstract:
The apparatus receives a first PDU and a first CRC that is based on the first PDU. The first PDU is encrypted based on a first nonce. The apparatus decrypts the first PDU to obtain a first payload and a first cipher stream. The apparatus soft combines the decrypted first payload with a decrypted set of payloads. The set of payloads have been encrypted based on at least one nonce different than the first nonce. The apparatus generates a second CRC based on the soft combined decrypted payloads and based on the first cipher stream. The apparatus determines whether the generated second CRC for the soft combined decrypted payloads passes a CRC check against the first CRC.
Abstract:
Methods, systems, and devices for dynamic link recovery are described. Generally, a first device may transmit a first packet to a second device using a first set of transmission parameters, and may monitor for a feedback message from the second device. The first device may not receive a feedback message, and may therefore generate a second packet with the same sequence number as the first packet, and may introduce an error to the second packet that will trigger a feedback message from the second device, and may transmit the second packet to the second device using second transmission parameters (e.g., that are more robust than the first transmission parameters). The first device may monitor for and receive a feedback message from the second device.
Abstract:
Methods, systems, and devices for wireless communications are described. Generally, the described techniques provide for sniffing, by a secondary wireless audio device, a first packet (including a first sequence number (SEQN) associated with a primary wireless audio device) from a source device to the primary wireless audio device. The secondary wireless audio device may increment a packet counter based on sniffing the first packet, and may receive a second packet (including a second SEQN associated with the secondary wireless audio device) from the source device. The secondary wireless audio device may transmit an acknowledgement (ACK) message corresponding to the second packet, and may increment its packet based thereon. In some examples, both the primary wireless audio device and the second wireless audio device may alternate between transmitting ACK messages for owned SEQNs.
Abstract:
Methods, systems, and devices for wireless communications are described. Generally, the described techniques provide for receiving a first packet comprising a first sequence number (SEQN) and a second packet comprising a second SEQN, and obtaining a first hash for the first packet and a second hash for the second packet. The receiving device may classify the second packet as one of a new packet or a retransmission of the first packet based on a comparison between the first SEQN and the second SEQN and a comparison between the first hash and the second hash. The receiving device may selectively process the payload of the second packet based on the classifying.
Abstract:
Methods, systems, and devices for real-time ACK/NACK are described. The method includes a primary wireless device receiving a transmission from a source wireless device over a wireless link established between the source wireless device and the primary wireless device, determining whether the primary wireless device correctly received a data packet during the transmission, determining whether a first indication of ACK is received from a secondary wireless device during a time gap after receiving the transmission from the source wireless device, the first indication associated with the transmission between the source wireless device and the primary wireless device, and sending a second indication of ACK or NACK to the source wireless device based on whether the primary wireless device correctly received the data packet and whether the first indication is received from the secondary wireless device during the time gap.
Abstract:
Methods, systems, and devices for wireless communications are described. Described techniques may include broadcasting a first Bluetooth packet over a channel bandwidth during a first set of one or more master slots of a periodic broadcast window; performing one or more received signal strength indication (RSSI) measurements during a first set of one or more slave slot of the periodic broadcast window; receiving from one or more receiving devices, based at least in part on the one or more RSSI measurements, one or more negative acknowledgement (NACK) signals corresponding to the first Bluetooth packet; and rebroadcasting, during a second set of one or more master slots of the periodic broadcast window, the first Bluetooth packet based at least in part on the one or more NACK signals
Abstract:
Disclosed are methods, devices, systems, apparatus, servers, media, and other implementations, including a method, performed at a first wireless device, for secure range determination that includes transmitting a first signed message at a first time instance, with the first signed message, including a first payload, configured to be received by a second wireless device at a second time instance, and receiving at a fourth time instance a verifiable acknowledgement message transmitted from the second wireless device at a third time instance in response to the first signed message. The method further includes verifying that the verifiable acknowledgement message originated from the second wireless device, and, responsive to a verification that the verifiable acknowledgement message originated from the second wireless device, transmitting a second signed message including a second payload with at least timing information for the first time instance and the fourth time instance.
Abstract:
In one aspect, a method performed by an access point in a wireless local area network (WLAN), includes receiving a first ranging request message from a first device and monitoring for a second ranging request message from a second device on a channel of the WLAN. The first ranging request message includes a device identifier of the first device and the second ranging request message includes a device identifier of the second device. In response to receiving the second ranging request message, the access point combines the device identifier of the first device, first timing information associated with the first ranging request message, the device identifier of the second device, and second timing information associated with the second ranging request message into a single ranging response message. The access point then broadcasts the single ranging response message on the channel of the WLAN.