H04W74/04

RESTRICTED TARGET WAKE TIME SERVICE PERIOD TERMINATION

A wireless communication protocol using CSMA/CA, EDCA and R-TWT to prioritize RTA traffic transmissions. During an R-TWT SP, the RTA traffic is prioritized for transmission and mechanisms are provided for assuring proper indications and termination of the R-TWT SP. During this process, member STAs communicate with the R-TWT scheduling AP when they have no more frames to send. The R-TWT scheduling AP can also terminate the R-TWT SP before its scheduled end time, allowing non-member STAs to immediately contend for the channel. In addition, the R-TWT scheduling AP can exchange frames with STAs, that have an R-TWT feature but are not R-TWT member STAs, after frame exchanges with the R-TWT member STAs during the R-TWT SP have been completed.

RESTRICTED TARGET WAKE TIME SERVICE PERIOD TERMINATION

A wireless communication protocol using CSMA/CA, EDCA and R-TWT to prioritize RTA traffic transmissions. During an R-TWT SP, the RTA traffic is prioritized for transmission and mechanisms are provided for assuring proper indications and termination of the R-TWT SP. During this process, member STAs communicate with the R-TWT scheduling AP when they have no more frames to send. The R-TWT scheduling AP can also terminate the R-TWT SP before its scheduled end time, allowing non-member STAs to immediately contend for the channel. In addition, the R-TWT scheduling AP can exchange frames with STAs, that have an R-TWT feature but are not R-TWT member STAs, after frame exchanges with the R-TWT member STAs during the R-TWT SP have been completed.

DEVICES AND METHODS FOR ASYNCHRONOUS AND SYNCRHONOUS WIRELESS COMMUNICATIONS UTILIZING A SINGLE RADIO
20230052555 · 2023-02-16 ·

Devices and methods to provide simultaneous asynchronous and synchronous wireless communications, wherein communications with at least one wireless device are established using an asynchronous operation mode utilizing a first frequency band of a single radio device; and, the asynchronous operation mode is interrupted at periodic intervals to establish a synchronous operation mode utilizing a second frequency band of the single radio device, wherein the synchronous operation mode comprises: during a first of the periodic intervals, advertising at least a first of a plurality of available communication slots and listening for a slot petition from at least one end device; and, if a petition is received from at least one end device, assigning one of the plurality of available communication slots to each end device from which a petition was received, wherein each slot utilizes Coordinated Sampled Listening for both uplink and downlink communications with an assigned end device.

Advanced dual band virtual concurrent for WiFi

Example methods of advanced DBVC for WiFi relate to one or more of avoiding beacon collisions between a repeater and a root AP, optimizing traffic flows based on buffers queued within hardware, optimizing TCP throughput through DPI and prioritization of TCP ACK packets, or optimizing transmissions through a trigger-based mechanism. An example method may include receiving a transmission from a root AP. The method may include obtaining a next root AP TBTT of a next beacon to be sent by the root AP from the transmission. The method may include determining an amount of time to delay a next repeater TBTT of a next beacon to be sent by a repeater to avoid conflict between the next root AP TBTT and the next repeater TBTT. The method may include delaying the next repeater TBTT based on the determined amount of time.

Receiver address field for multi-user transmissions in WLAN systems
11581927 · 2023-02-14 · ·

In wireless communications for multi-users, a station may receive a trigger frame including a transmitter address field. When the trigger frame is a multi-user request-to-send (MU-RTS) frame eliciting clear-to-send (CTS) frames from a plurality of stations, the station transmit a CTS frame including a first receiver address field in response to the trigger frame. The first receiver address field may be set equal to the transmitter address field. When the trigger frame elicits data frames from a plurality of stations, the station transmit a data frame including a second receiver address field in response to the trigger frame. The second receiver address field may be set to a destination address. Other methods, apparatus, and computer-readable media are also disclosed.

Receiver address field for multi-user transmissions in WLAN systems
11581927 · 2023-02-14 · ·

In wireless communications for multi-users, a station may receive a trigger frame including a transmitter address field. When the trigger frame is a multi-user request-to-send (MU-RTS) frame eliciting clear-to-send (CTS) frames from a plurality of stations, the station transmit a CTS frame including a first receiver address field in response to the trigger frame. The first receiver address field may be set equal to the transmitter address field. When the trigger frame elicits data frames from a plurality of stations, the station transmit a data frame including a second receiver address field in response to the trigger frame. The second receiver address field may be set to a destination address. Other methods, apparatus, and computer-readable media are also disclosed.

Transport block size (TBS) configuration for small data transfer

Certain aspects of the present disclosure provide techniques for configuring parameters for small data transfer (SDT) transmissions. One example technique provides a method for wireless communications at a user equipment (UE), involving: obtaining configuration information received from a network entity, the configuration information indicating a plurality of configurations for small data transfer (SDT) transmission, determining at least one of a transport block size (TBS) or data threshold for SDT transmission based on one of the configurations, and outputting for transmission one or more SDT transmissions based on the determination.

Co-channel co-existence in a wireless communications system

There are provided mechanisms for sharing channels in a wireless communications system among wireless devices that use a plurality of different access technologies. First and second wireless devices are operable to share a channel in the wireless communication system with each other. The first wireless device is operable to provide an indication to the second wireless device that the first wireless device is using a first access technology to access the channel. The second wireless device is operable to receive the indication and determine, based on the indication, that the first wireless device is using a first access technology to access the channel. Accordingly, the second wireless device can determine, based on compatibility of its access technology with that of the first wireless device, whether to refrain from using the channel or to share the channel.

Co-channel co-existence in a wireless communications system

There are provided mechanisms for sharing channels in a wireless communications system among wireless devices that use a plurality of different access technologies. First and second wireless devices are operable to share a channel in the wireless communication system with each other. The first wireless device is operable to provide an indication to the second wireless device that the first wireless device is using a first access technology to access the channel. The second wireless device is operable to receive the indication and determine, based on the indication, that the first wireless device is using a first access technology to access the channel. Accordingly, the second wireless device can determine, based on compatibility of its access technology with that of the first wireless device, whether to refrain from using the channel or to share the channel.

SYSTEMS AND METHODS TO REDUCE NETWORK ACCESS LATENCY AND IMPROVE QUALITY OF SERVICE IN WIRELESS COMMUNICATION
20230010010 · 2023-01-12 · ·

In a grant based system, a user equipment (UE) sends data in an uplink in a request-grant process. The UE first sending a scheduling request, a gNodeB processing the request and scheduling a grant sometime in future, then UE then either sending data if the grant is sufficient or requesting for another grant with more capacity to accommodate data sending. Such a proceeding could cause serious latency in network access. Described in the present patent disclosure are embodiments to reduce the access time by giving proactive grants through inspecting downlink (DL) data sent to the UE or uplink data being transmitted from the UE. The uplink data may be predictive since it maybe in lieu of requirement for sending a TCP acknowledgement for the DL TCP data scheduled earlier. For voice calls, a ML system for system may be deployed to predict when proactive UL grants may be given.