Abstract:
Certain aspects of the present disclosure relate to techniques and apparatus for efficient support of connected discontinuous reception (C-DRX) by using a wireless device (e.g., a user equipment (UE)) with a second receiver. A wireless device with two receivers may place one receiver in a low power mode and take the receiver out of the low power mode in response to a signal received from a serving base station (BS) of the wireless device. A BS may direct a wireless device to enter a low power DRX (LP-DRX) mode or enhanced DRX mode having longer low power cycles than a non-enhanced DRX mode, and the wireless device may place a primary receiver in a low power mode in response to the directive from the BS. Other aspects, embodiments, and features are also claimed and disclosed.
Abstract:
Methods, systems, and devices for wireless communication are described. A transmitting device may transmit a wakeup message to another device. The wakeup message may be transmitted using a transmit diversity scheme in accordance with aspects of the present disclosure. The transmit diversity may, for example, include a cyclic shift diversity scheme, a phase rotation scheme, a symbol generation scheme, or combinations thereof. The transmit diversity may in some cases improve a communication range of the wakeup message or otherwise benefit the wireless communications system.
Abstract:
Certain aspects of the present disclosure generally relate to wireless communications and, more particularly, to ultra low power paging frames for wake up and discovery. One example apparatus for wireless communications generally includes at least one interface configured to obtain a frame via a first radio and a second radio, wherein the interface receives a frame from another apparatus via the second radio while the first radio is in a first power state; and a processing system configured to take one or more actions based on a command field included in the frame. A second example apparatus for wireless communications generally includes at least one interface configured to obtain a frame via a first radio and a second radio, wherein the interface receives a frame from another apparatus via the second radio while the first radio is in a first power state; and a processing system configured to take one or more actions based on whether or not an authentication code included in the frame matches a local authentication code.
Abstract:
Systems, methods, and devices for wireless communication. In one aspect an apparatus for wirelessly communicating with a wireless station is provided. The apparatus comprises a first transceiver configured to receive a backoff signal from the wireless station during a first time period, the backoff signal configured to indicate a second time period. The apparatus further comprises a processor operationally coupled to the first transceiver and configured to refrain the first transceiver from transmitting a wireless signal during the second time period.
Abstract:
A method of line coding is disclosed that limits error propagation in a decision feedback equalizer (DFE) of a receiving device. A communications device receives a set of bits to be transmitted over a channel and divides the set of bits into a plurality of blocks based, at least in part, on a line coding scheme. The device then encodes each of the blocks of bits into a corresponding block of symbols based on the line coding scheme. Specifically, the line coding scheme has a non-uniform coding efficiency, wherein a first bit or a last bit of each block of bits is mapped to a single data symbol. For some embodiments, the line coding scheme may be a ternary line coding scheme that maps a block of 3k+1 bits to a corresponding block of 2k+1 symbols, where k is an integer greater than 1.
Abstract:
A method of line coding is disclosed that limits error propagation in a decision feedback equalizer (DFE) of a receiving device. A communications device receives a set of bits to be transmitted over a channel and divides the set of bits into a plurality of blocks based, at least in part, on a line coding scheme. The device then encodes each of the blocks of bits into a corresponding block of symbols based on the line coding scheme. Specifically, the line coding scheme has a non-uniform coding efficiency, wherein a first bit or a last bit of each block of bits is mapped to a single data symbol. For some embodiments, the line coding scheme may be a ternary line coding scheme that maps a block of 3k+1 bits to a corresponding block of 2k+1 symbols, where k is an integer greater than 1.
Abstract:
A method includes transmitting, from an electronic device in a neighbor awareness network (NAN) via a first wireless protocol, a wake up message indicating discovery information associated with a second wireless protocol. The method further includes communicating information via the NAN using the second wireless protocol after transmitting the wake up message.
Abstract:
Methods, systems, and devices for wireless communications are described. An access point (AP) may transmit, to a second AP and during a first portion of a transmission opportunity (TxOP), a request to participate in a multi-user (MU) transmission. The AP may receive, from the second AP and during the first portion of the TxOP, an indication of intent to participate in the MU transmission during the second portion of the TxOP, the indication of intent including a resource request of the second AP for participation in the MU transmission. The AP may transmit, during an initial period of the second portion of the TxOP, a trigger signal to the second AP indicating a set of one or more resources for the second AP during the MU transmission. The AP may participate, in conjunction with the second AP and during the second portion of the TxOP, in the MU transmission.
Abstract:
This disclosure provides methods, devices and systems for generating a secure long training field (LTF). In some implementations, the secure LTF may include a randomized bit sequence that is difficult, if not impossible, to replicate by any device other than the transmitting device and the intended receiving device. For example, the transmitting device may use a block cipher or stream cipher to generate a pseudorandom bit sequence and may select a subset of bits of the pseudorandom bit sequence to be mapped to a sequence of modulation symbols representing an LTF symbol of the secure LTF. More specifically, each of the modulation symbols is mapped to a respective one of a number of subcarriers spanning a bandwidth of the secure LTF. The transmitting device may further transmit a physical layer convergence protocol (PLCP) protocol data unit (PPDU) that includes the secure LTF to the receiving device.
Abstract:
In an aspect, a wireless device is configured to transmit a physical layer protocol data unit on one or more channels, wherein the physical layer protocol data unit includes a first portion and a second portion. The first portion includes a signal length field indicating a duration of a transmission of the physical layer protocol data unit. The second portion includes a plurality of Wi-Fi sensing fields. The wireless device is configured to receive a reflected signal and a leakage signal associated with the physical layer protocol data unit. The reflected signal includes the physical layer protocol data unit reflected off of a target object. The leakage signal is associated with the physical layer protocol data unit.