Abstract:
Bypassing radar in wide Dynamic Frequency Selection (DFS) channels utilizing puncturing may be provided. A first client device may be classified as eligible for puncturing and a second client device may be classified as not eligible for puncturing. Next, it may be determined that a subchannel in a bandwidth range should not be used. Then, in response to determining that the subchannel in the bandwidth range should not be used, the first client device may be steered to a first subset of the bandwidth range and the second client device may be steered to a second subset of the bandwidth range. The second subset of the bandwidth range may be smaller than the first subset of the bandwidth range.
Abstract:
In an example embodiment disclosed herein there is described a multi-radio device which comprises a first radio that first radio comprises a transmitter, and a second radio that second radio comprises a receiver that monitors a channel to obtain data representative of a predefined channel parameter. The second radio is operable to receive a signal from the first radio that indicates when the transmitter of the first radio is transmitting. The receiver of the second radio selectively excludes data representative of a predefined channel parameter based on whether the transmitter of the first radio is transmitting.
Abstract:
In one embodiment, a first wireless access point (AP) of a first basic service set (BSS) receives, from a second wireless AP of a second BSS, data indicative of an 802.11-based target wake time (TWT) schedule of a client of the second BSS. The first wireless AP identifies, from the receive data, a scheduled communication time of the client of the second BSS in the TWT schedule. The first wireless AP generates an 802.11-based TWT schedule for a client of the first BSS that avoids the scheduled communication time of the client of the second BSS. The first wireless AP sends the generated 802.11-based TWT schedule to the client of the first BSS, wherein the sent TWT schedule causes the client of the first BSS to wake from sleep at a scheduled wake time.
Abstract:
A method is provided in which a first wireless access point selects two or more of a plurality of client devices based on similarity of receive signal strength and carrier frequency offset with respect to the first wireless access point, and sends a downlink multi-user multiple-input multiple-output (MIMO) transmission to the two or more client devices. The downlink multi-user MIMO transmission is configured to solicit acknowledgments from the two or more client devices. The acknowledgments are received at a plurality of antennas of the first wireless access point from the two or more client devices. Uplink multi-user MIMO processing of the acknowledgments is performed from the two or more of the plurality of client devices to recover the acknowledgments respectively from each of the two or more client devices.
Abstract:
A system and method are provided for performing stomp-and-restart techniques in distributed MU-MIMO system. A plurality of radio head devices are provided that are configured to be deployed separated from each other in a coverage region of interest of a wireless network. A central processor subsystem is provided that is in communication with the plurality of radio head devices. The central processor subsystem configured to perform several operations based on downconverted samples received from the plurality of radio head devices.
Abstract:
Techniques are presented for detecting rogue wireless beacon devices. Wireless transmissions from beacon devices are received at a plurality of receiver devices. The wireless transmissions of the beacon devices comprise packets that carry information used for location-based services for mobile wireless devices. Content of one or more fields of the packets transmitted by the beacon devices and received by one or more of the receiver devices is obtained. The content of one or more fields of the packets is analyzed to detect an unauthorized beacon device. The analyzing operation may involve comparing the content of the one or more fields of the packets against a list that contains one or more identifiers for authorized beacon devices. In another form, analyzing may involve analyzing the content of the one or more fields of the packets with pattern information related to advertising content or advertising source.
Abstract:
Techniques are presented for distributed processing Distributed-Input Distributed-Output (DIDO) wireless communication. A plurality of base stations (e.g., APs) are provided, each configured to wirelessly serve one or more wireless devices (e.g., clients). At least first and second base stations are configured to transmit simultaneously at an agreed upon time. The first and second base stations are each configured to locally generate steering matrix information used to spatially precode their respective data transmissions in order to steer their respective data transmissions to their one or more wireless devices while nulling to the one or more client devices of the other base station. Moreover, the first and second base stations are each configured to locally generate a transmit waveform by applying the steering matrix information to their respective data transmissions.
Abstract:
In one embodiment, a method includes receiving a plurality of radio frequency chains at a wireless device in a block based modulation environment, recording subcarrier phases and differences between the subcarrier phases, and using the subcarrier phase differences to construct a feature vector for use in angle of arrival calculated positioning of a mobile device.
Abstract:
Presented herein is a tone plan that can accommodate multiple bandwidth options. This tone plan may be designed around a fundamental tile, such as 20 MHz tile, that is replicated to 40 and 80 MHz (and 160 MHz and beyond). For wider bandwidths, the otherwise-unused guard tones between the 20 MHz tiles are filled by a new resource unit and DC tones. There are DC tones placed to support any client, for all defined and plausible future values of its current operating bandwidth and center frequency (i.e. any 20 MHz, any 40 MHz, any 80 MHz, 160 MHz and 80+80 MHz, 320, 160+80 etc.), as well as plausible future preamble puncturing cases.
Abstract:
Bypassing radar in wide Dynamic Frequency Selection (DFS) channels utilizing puncturing may be provided. A first client device may be classified as eligible for puncturing and a second client device may be classified as not eligible for puncturing. Next, it may be determined that a subchannel in a bandwidth range should not be used. Then, in response to determining that the subchannel in the bandwidth range should not be used, the first client device may be steered to a first subset of the bandwidth range and the second client device may be steered to a second subset of the bandwidth range. The second subset of the bandwidth range may be smaller than the first subset of the bandwidth range.