Abstract:
In one example, a method includes receiving, by a wireless docking center (WDC) and from a wireless dockee (WD), a request to access one or more peripheral functions (PFs) associated with the WDC, and receiving, by the WDC and from the WD, one or more authentication credentials. In this example, the method also includes determining, by the WDC, whether or not the one or more authentication credentials received from the WD grant access to the one or more PFs to which the WD requests access. In this example, the method also includes permitting, by the WDC, the WD to access a first PF of the one or more PFs to which the WD requests access in response to determining that the one or more authentication credentials grant access to the first PF.
Abstract:
Methods, systems, and devices are described for wireless communication. An access point (AP) may group stations (STAs) into multi-user (MU) groups with group identifiers (IDs). Within each MU group, the AP may dynamically configure several STAs into a transmission set. Each transmission set may include a different combination of STAs. In some cases, the AP may assign a STA to multiple transmission sets within a group ID. In certain scenarios, the AP may assign a STA to more than one group ID. The AP may restrict the number of group IDs to which a STA is assigned. Each MU group may include a number of user positions that may be occupied by one or more STAs. In some cases, the AP may restrict the number of STAs that may be assigned to (i.e., occupy) each user position.
Abstract:
Various aspects of the present disclosure enable a persistent docking procedure that, once a persistent docking environment has been established, can simplify the future establishment of a docking environment between the dockee and docking host. Other aspects, embodiments, and features are also claimed and described.
Abstract:
Methods, systems, and devices are described for wireless communications. An access point (AP) communicates to a multi-user (MU) group of stations (STAs) that are assigned disparate modulation and coding schemes (MCSs). The AP sends an MU transmission to the MU group using an MCS and transmit power combination that is associated with the highest estimated throughput. The AP selects the MCS and transmit power combination from two configurations. In the first configuration, a single MCS and corresponding transmit power is used for the MU transmission. In the second configuration, a single transmit power and two different MCSs are used for the MU transmission. Both configurations may use the MCSs associated with the STAs in the MU group. The transmit power may correspond to one of the selected MCSs.
Abstract:
A system and method are disclosed that may allow a STA to selectively change frequency bands from an operating band to a candidate band based on operating conditions. In response to determining that a channel condition is within a band switch region associated with a candidate band, the STA may select the candidate band and temporarily switch to it. The STA may select an initial modulation and coding scheme for the candidate band and probe the candidate band with data to determine an estimate of candidate band goodput. If the estimate of candidate band goodput is greater than the operating band goodput, the STA may switch to the candidate band.
Abstract:
A system and method are disclosed that may allow a STA to selectively change frequency bands from an operating band to a candidate band based on operating conditions. In response to determining that a channel condition is within a band switch region associated with a candidate band, the STA may select the candidate band and temporarily switch to it. The STA may select an initial modulation and coding scheme for the candidate band and probe the candidate band with data to determine an estimate of candidate band goodput. If the estimate of candidate band goodput is greater than the operating band goodput, the STA may switch to the candidate band.
Abstract:
Methods, systems, and devices are described for wireless communication at a wireless device. A wireless device (e.g., station or access point) may adapt short inter-frame space (SIFS) burst parameters to improve the performance of the overall network while providing enriched user experience. A wireless device may monitor traffic conditions on the network and dynamically adapt the SIFS burst parameters associated with one or more stations based at least in part on detected variations on the traffic channel. In other examples, the wireless device may allocate a common SIFS burst parameter to be used by a plurality of wireless devices in the basic service set (BSS).
Abstract:
In one example, a method includes receiving, from a user application and with a wireless docking service of a wireless docking communications stack executing on a computing device, a request to discover one or more peripheral functions within wireless communication range of the computing device. The method also includes, responsive to receiving the request, discovering, with the wireless docking service, the one or more peripheral functions without communicating with a wireless docking center. The method further includes consolidating the peripheral functions into a docking session for the user application. The method also includes, responsive to receiving the request, sending a docking session identifier and one or more respective references corresponding to the one or more peripheral functions to the user application.
Abstract:
A method of selecting a modulation coding scheme (MCS) for transmitting data to a client station (STA). The communications device first predicts the MCS for each of at least two of a plurality of communication modes. The plurality of communication modes may include an open-loop mode and at least one of a single-user multiple-input multiple-output (SU-MIMO) mode or a multiple-user multiple-input multiple-output (MU-MIMO) mode. The communications device then selects one of the plurality of communication modes for transmitting data to the STA based at least in part on the predicted MCSs.
Abstract:
This disclosure describes a method of establishing a bi-directional user interface back channel (UIBC) to a computing device, receiving encapsulated peripheral data from the computing device using the UIBC, and decapsulating the peripheral data, as well as a method of establishing a bi-directional user interface back channel (UIBC) to a computing device, receiving peripheral data, encapsulating the peripheral data, and transmitting the encapsulated peripheral data to the computing device using the UIBC.