Methods for frequency division multiplexed on-off keying signals for wake-up radios

ABSTRACT

An access point (AP) that supports the IEEE 802.11ba protocol may transmit a frame including a physical layer (PHY) preamble to one or more stations (STAs) over a channel. The PHY preamble may include a plurality of repeated modulated legacy signal (L-SIG) fields to spoof a recipient of the frame and protect a wake up signal (WUS) to be subsequently transmitted by the AP. The AP may transmit the WUS to at least a first STA of the one or more STAs, wherein the at least the first STA is a IEEE 802.11ba compliant STA.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is the U.S. National Stage, under 35 U.S.C. § 371, ofInternational Application No. PCT/US2019/023546 filed Mar. 22, 2019,which claims the benefit of U.S. Provisional Application No. 62/647,304filed Mar. 23, 2018 and U.S. Provisional Application No. 62/687,947filed Jun. 21, 2018, the contents of which are incorporated herein byreference.

BACKGROUND

A wireless local area network (WLAN) is a wireless distribution networkthat links two or more devices using wireless communication within alimited area, and may or may not include an access point (AP). Thus, amobile user device (i.e., a station (STA)) can connect to a local areanetwork (LAN) through a wireless (radio) connection.

SUMMARY

An access point (AP) that supports the IEEE 802.11ba protocol maytransmit a frame including a physical layer (PHY) preamble to one ormore stations (STAs) over a channel. The PHY preamble may include aplurality of repeated modulated legacy signal (L-SIG) fields to spoof arecipient of the frame and protect a wake up signal (WUS) to besubsequently transmitted by the AP. The AP may transmit the WUS to atleast a first STA of the one or more STAs, wherein the at least thefirst STA is a IEEE 802.11ba compliant STA.

An AP may determine encoded bits for a given time for a plurality ofwake up signals (WUSs) to be transmitted with different data rates ondifferent channels. The AP may select a subset of sequences from a setof complementary sequences to apply across the channels based on theencoded bits. The AP may map the selected subset of sequences tocorresponding channels in frequency. The AP may apply a single inversediscrete Fourier transform (IDFT) to the mapped sequences. The AP mayappend a cyclic prefix to the transformed sequences to generate theplurality of WUSs. The AP may transmit the plurality of WUSs on thedifferent channels, such that symbol boundaries of the plurality of theplurality of WUSs are aligned in time.

BRIEF DESCRIPTION OF THE DRAWINGS

A more detailed understanding may be had from the following description,given by way of example in conjunction with the accompanying drawings,wherein like reference numerals in the figures indicate like elements,and wherein:

FIG. 1A is a system diagram illustrating an example communicationssystem in which one or more disclosed embodiments may be implemented;

FIG. 1B is a system diagram illustrating an example wirelesstransmit/receive unit (WTRU) that may be used within the communicationssystem illustrated in FIG. 1A according to an embodiment;

FIG. 1C is a system diagram illustrating an example radio access network(RAN) and an example core network (CN) that may be used within thecommunications system illustrated in FIG. 1A according to an embodiment;

FIG. 1D is a system diagram illustrating a further example RAN and afurther example CN that may be used within the communications systemillustrated in FIG. 1A according to an embodiment;

FIG. 2A shows a block diagram of a first masking approach for waveformgeneration methods for Manchester-coded on-off keying (OOK) symbols fora high data rate;

FIG. 2B shows a block diagram of a second masking approach for waveformgeneration methods for Manchester-coded OOK symbols for a high datarate;

FIG. 2C shows a block diagram of a zero padding approach for waveformgeneration methods for Manchester-coded OOK symbols for a high datarate;

FIG. 3 shows a block diagram for a waveform generation method forManchester-coded OOK symbols for a low data rate;

FIG. 4A shows transmitting wake-up signals for different wake-up radiostations in a multi-band 40 MHz operation;

FIG. 4B shows transmitting wake-up signals for different wake-up radiostations in a multi-band 80 MHz operation;

FIG. 5 shows overlapping “on” durations of OOK signals in a time domain;

FIG. 6A shows generated signal when four channels, each with an highdata rate (HDR) wake-up signal, are utilized;

FIG. 6B shows a peak to average power ratio (PAPR) distribution whenfour channels, each with an HDR wake-up signal, are utilized;

FIG. 7 shows aligning inverse discrete Fourier transform (IDFT)durations for low data rate (LDR) and HDR wake up signals (WUSs)according to one or more embodiments;

FIG. 8 shows applying phase rotations for different channels;

FIG. 9 shows a transmitter block diagram for constructing a Golay-basedmulti-band OOK waveform;

FIG. 10A shows a generated signal when four channels, each with an HDRwake-up signal, are utilized;

FIG. 10B shows a PAPR distribution when four channels, each with an HDRwake-up signal, are utilized;

FIG. 11 shows preamble formats for various IEEE 802.11 standards;

FIG. 12 shows a preamble format with a mark-indication field accordingto one or more embodiments;

FIG. 13 shows an example format of the mark-indication field (MIF)according to one or more embodiments;

FIG. 14A shows a preamble format with binary phase shift keying (BPSK)repeated legacy signal field;

FIG. 14B shows a preamble format with BPSK repeated legacy signal fieldand rotated BPSK MIF;

FIG. 15 shows a preamble with multiple repeated legacy signal fields;

FIG. 16 shows a preamble with termination with rotated-BPSK;

FIG. 17 shows a preamble with combined BPSK and rotated BPSK;

FIG. 18 shows a unified preamble design;

FIG. 19 shows a flow diagram of a receive procedure to distinguishdifferent 802.11 signals according to one or more embodiments;

FIG. 20 shows a flow diagram of receiving a WUS; and

FIG. 21 shows a flow diagram of transmitting a WUS.

DETAILED DESCRIPTION

FIG. 1A is a diagram illustrating an example communications system 100in which one or more disclosed embodiments may be implemented. Thecommunications system 100 may be a multiple access system that providescontent, such as voice, data, video, messaging, broadcast, etc., tomultiple wireless users. The communications system 100 may enablemultiple wireless users to access such content through the sharing ofsystem resources, including wireless bandwidth. For example, thecommunications systems 100 may employ one or more channel accessmethods, such as code division multiple access (CDMA), time divisionmultiple access (TDMA), frequency division multiple access (FDMA),orthogonal FDMA (OFDMA), single-carrier FDMA (SC-FDMA), zero-tailunique-word discrete Fourier transform Spread OFDM (ZT-UW-DFT-S-OFDM),unique word OFDM (UW-OFDM), resource block-filtered OFDM, filter bankmulticarrier (FBMC), and the like.

As shown in FIG. 1A, the communications system 100 may include wirelesstransmit/receive units (WTRUs) 102 a, 102 b, 102 c, 102 d, a radioaccess network (RAN) 104, a core network (CN) 106, a public switchedtelephone network (PSTN) 108, the Internet 110, and other networks 112,though it will be appreciated that the disclosed embodiments contemplateany number of WTRUs, base stations, networks, and/or network elements.Each of the WTRUs 102 a, 102 b, 102 c, 102 d may be any type of deviceconfigured to operate and/or communicate in a wireless environment. Byway of example, the WTRUs 102 a, 102 b, 102 c, 102 d, any of which maybe referred to as a station (STA), may be configured to transmit and/orreceive wireless signals and may include a user equipment (UE), a mobilestation, a fixed or mobile subscriber unit, a subscription-based unit, apager, a cellular telephone, a personal digital assistant (PDA), asmartphone, a laptop, a netbook, a personal computer, a wireless sensor,a hotspot or Mi-Fi device, an Internet of Things (IoT) device, a watchor other wearable, a head-mounted display (HMD), a vehicle, a drone, amedical device and applications (e.g., remote surgery), an industrialdevice and applications (e.g., a robot and/or other wireless devicesoperating in an industrial and/or an automated processing chaincontexts), a consumer electronics device, a device operating oncommercial and/or industrial wireless networks, and the like. Any of theWTRUs 102 a, 102 b, 102 c and 102 d may be interchangeably referred toas a UE.

The communications systems 100 may also include a base station 114 aand/or a base station 114 b. Each of the base stations 114 a, 114 b maybe any type of device configured to wirelessly interface with at leastone of the WTRUs 102 a, 102 b, 102 c, 102 d to facilitate access to oneor more communication networks, such as the CN 106, the Internet 110,and/or the other networks 112. By way of example, the base stations 114a, 114 b may be a base transceiver station (BTS), a NodeB, an eNode B(eNB), a Home Node B, a Home eNode B, a next generation NodeB, such as agNode B (gNB), a new radio (NR) NodeB, a site controller, an accesspoint (AP), a wireless router, and the like. While the base stations 114a, 114 b are each depicted as a single element, it will be appreciatedthat the base stations 114 a, 114 b may include any number ofinterconnected base stations and/or network elements.

The base station 114 a may be part of the RAN 104, which may alsoinclude other base stations and/or network elements (not shown), such asa base station controller (BSC), a radio network controller (RNC), relaynodes, and the like. The base station 114 a and/or the base station 114b may be configured to transmit and/or receive wireless signals on oneor more carrier frequencies, which may be referred to as a cell (notshown). These frequencies may be in licensed spectrum, unlicensedspectrum, or a combination of licensed and unlicensed spectrum. A cellmay provide coverage for a wireless service to a specific geographicalarea that may be relatively fixed or that may change over time. The cellmay further be divided into cell sectors. For example, the cellassociated with the base station 114 a may be divided into threesectors. Thus, in one embodiment, the base station 114 a may includethree transceivers, i.e., one for each sector of the cell. In anembodiment, the base station 114 a may employ multiple-input multipleoutput (MIMO) technology and may utilize multiple transceivers for eachsector of the cell. For example, beamforming may be used to transmitand/or receive signals in desired spatial directions.

The base stations 114 a, 114 b may communicate with one or more of theWTRUs 102 a, 102 b, 102 c, 102 d over an air interface 116, which may beany suitable wireless communication link (e.g., radio frequency (RF),microwave, centimeter wave, micrometer wave, infrared (IR), ultraviolet(UV), visible light, etc.). The air interface 116 may be establishedusing any suitable radio access technology (RAT).

More specifically, as noted above, the communications system 100 may bea multiple access system and may employ one or more channel accessschemes, such as CDMA, TDMA, FDMA, OFDMA, SC-FDMA, and the like. Forexample, the base station 114 a in the RAN 104 and the WTRUs 102 a, 102b, 102 c may implement a radio technology such as Universal MobileTelecommunications System (UMTS) Terrestrial Radio Access (UTRA), whichmay establish the air interface 116 using wideband CDMA (WCDMA). WCDMAmay include communication protocols such as High-Speed Packet Access(HSPA) and/or Evolved HSPA (HSPA+). HSPA may include High-Speed Downlink(DL) Packet Access (HSDPA) and/or High-Speed Uplink (UL) Packet Access(HSUPA).

In an embodiment, the base station 114 a and the WTRUs 102 a, 102 b, 102c may implement a radio technology such as Evolved UMTS TerrestrialRadio Access (E-UTRA), which may establish the air interface 116 usingLong Term Evolution (LTE) and/or LTE-Advanced (LTE-A) and/orLTE-Advanced Pro (LTE-A Pro).

In an embodiment, the base station 114 a and the WTRUs 102 a, 102 b, 102c may implement a radio technology such as NR Radio Access, which mayestablish the air interface 116 using NR.

In an embodiment, the base station 114 a and the WTRUs 102 a, 102 b, 102c may implement multiple radio access technologies. For example, thebase station 114 a and the WTRUs 102 a, 102 b, 102 c may implement LTEradio access and NR radio access together, for instance using dualconnectivity (DC) principles. Thus, the air interface utilized by WTRUs102 a, 102 b, 102 c may be characterized by multiple types of radioaccess technologies and/or transmissions sent to/from multiple types ofbase stations (e.g., an eNB and a gNB).

In other embodiments, the base station 114 a and the WTRUs 102 a, 102 b,102 c may implement radio technologies such as IEEE 802.11 (i.e.,Wireless Fidelity (WiFi), IEEE 802.16 (i.e., Worldwide Interoperabilityfor Microwave Access (WiMAX)), CDMA2000, CDMA2000 1×, CDMA2000 EV-DO,Interim Standard 2000 (IS-2000), Interim Standard 95 (IS-95), InterimStandard 856 (IS-856), Global System for Mobile communications (GSM),Enhanced Data rates for GSM Evolution (EDGE), GSM EDGE (GERAN), and thelike.

The base station 114 b in FIG. 1A may be a wireless router, Home Node B,Home eNode B, or access point, for example, and may utilize any suitableRAT for facilitating wireless connectivity in a localized area, such asa place of business, a home, a vehicle, a campus, an industrialfacility, an air corridor (e.g., for use by drones), a roadway, and thelike. In one embodiment, the base station 114 b and the WTRUs 102 c, 102d may implement a radio technology such as IEEE 802.11 to establish awireless local area network (WLAN). In an embodiment, the base station114 b and the WTRUs 102 c, 102 d may implement a radio technology suchas IEEE 802.15 to establish a wireless personal area network (WPAN). Inyet another embodiment, the base station 114 b and the WTRUs 102 c, 102d may utilize a cellular-based RAT (e.g., WCDMA, CDMA2000, GSM, LTE,LTE-A, LTE-A Pro, NR etc.) to establish a picocell or femtocell. Asshown in FIG. 1A, the base station 114 b may have a direct connection tothe Internet 110. Thus, the base station 114 b may not be required toaccess the Internet 110 via the CN 106.

The RAN 104 may be in communication with the CN 106, which may be anytype of network configured to provide voice, data, applications, and/orvoice over internet protocol (VoIP) services to one or more of the WTRUs102 a, 102 b, 102 c, 102 d. The data may have varying quality of service(QoS) requirements, such as differing throughput requirements, latencyrequirements, error tolerance requirements, reliability requirements,data throughput requirements, mobility requirements, and the like. TheCN 106 may provide call control, billing services, mobile location-basedservices, pre-paid calling, Internet connectivity, video distribution,etc., and/or perform high-level security functions, such as userauthentication. Although not shown in FIG. 1A, it will be appreciatedthat the RAN 104 and/or the CN 106 may be in direct or indirectcommunication with other RANs that employ the same RAT as the RAN 104 ora different RAT. For example, in addition to being connected to the RAN104, which may be utilizing a NR radio technology, the CN 106 may alsobe in communication with another RAN (not shown) employing a GSM, UMTS,CDMA 2000, WiMAX, E-UTRA, or WiFi radio technology.

The CN 106 may also serve as a gateway for the WTRUs 102 a, 102 b, 102c, 102 d to access the PSTN 108, the Internet 110, and/or the othernetworks 112. The PSTN 108 may include circuit-switched telephonenetworks that provide plain old telephone service (POTS). The Internet110 may include a global system of interconnected computer networks anddevices that use common communication protocols, such as thetransmission control protocol (TCP), user datagram protocol (UDP) and/orthe internet protocol (IP) in the TCP/IP internet protocol suite. Thenetworks 112 may include wired and/or wireless communications networksowned and/or operated by other service providers. For example, thenetworks 112 may include another CN connected to one or more RANs, whichmay employ the same RAT as the RAN 104 or a different RAT.

Some or all of the WTRUs 102 a, 102 b, 102 c, 102 d in thecommunications system 100 may include multi-mode capabilities (e.g., theWTRUs 102 a, 102 b, 102 c, 102 d may include multiple transceivers forcommunicating with different wireless networks over different wirelesslinks). For example, the WTRU 102 c shown in FIG. 1A may be configuredto communicate with the base station 114 a, which may employ acellular-based radio technology, and with the base station 114 b, whichmay employ an IEEE 802 radio technology.

FIG. 1B is a system diagram illustrating an example WTRU 102. As shownin FIG. 1B, the WTRU 102 may include a processor 118, a transceiver 120,a transmit/receive element 122, a speaker/microphone 124, a keypad 126,a display/touchpad 128, non-removable memory 130, removable memory 132,a power source 134, a global positioning system (GPS) chipset 136,and/or other peripherals 138, among others. It will be appreciated thatthe WTRU 102 may include any sub-combination of the foregoing elementswhile remaining consistent with an embodiment.

The processor 118 may be a general purpose processor, a special purposeprocessor, a conventional processor, a digital signal processor (DSP), aplurality of microprocessors, one or more microprocessors in associationwith a DSP core, a controller, a microcontroller, Application SpecificIntegrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs), anyother type of integrated circuit (IC), a state machine, and the like.The processor 118 may perform signal coding, data processing, powercontrol, input/output processing, and/or any other functionality thatenables the WTRU 102 to operate in a wireless environment. The processor118 may be coupled to the transceiver 120, which may be coupled to thetransmit/receive element 122. While FIG. 1B depicts the processor 118and the transceiver 120 as separate components, it will be appreciatedthat the processor 118 and the transceiver 120 may be integratedtogether in an electronic package or chip.

The transmit/receive element 122 may be configured to transmit signalsto, or receive signals from, a base station (e.g., the base station 114a) over the air interface 116. For example, in one embodiment, thetransmit/receive element 122 may be an antenna configured to transmitand/or receive RF signals. In an embodiment, the transmit/receiveelement 122 may be an emitter/detector configured to transmit and/orreceive IR, UV, or visible light signals, for example. In yet anotherembodiment, the transmit/receive element 122 may be configured totransmit and/or receive both RF and light signals. It will beappreciated that the transmit/receive element 122 may be configured totransmit and/or receive any combination of wireless signals.

Although the transmit/receive element 122 is depicted in FIG. 1B as asingle element, the WTRU 102 may include any number of transmit/receiveelements 122. More specifically, the WTRU 102 may employ MIMOtechnology. Thus, in one embodiment, the WTRU 102 may include two ormore transmit/receive elements 122 (e.g., multiple antennas) fortransmitting and receiving wireless signals over the air interface 116.

The transceiver 120 may be configured to modulate the signals that areto be transmitted by the transmit/receive element 122 and to demodulatethe signals that are received by the transmit/receive element 122. Asnoted above, the WTRU 102 may have multi-mode capabilities. Thus, thetransceiver 120 may include multiple transceivers for enabling the WTRU102 to communicate via multiple RATs, such as NR and IEEE 802.11, forexample.

The processor 118 of the WTRU 102 may be coupled to, and may receiveuser input data from, the speaker/microphone 124, the keypad 126, and/orthe display/touchpad 128 (e.g., a liquid crystal display (LCD) displayunit or organic light-emitting diode (OLED) display unit). The processor118 may also output user data to the speaker/microphone 124, the keypad126, and/or the display/touchpad 128. In addition, the processor 118 mayaccess information from, and store data in, any type of suitable memory,such as the non-removable memory 130 and/or the removable memory 132.The non-removable memory 130 may include random-access memory (RAM),read-only memory (ROM), a hard disk, or any other type of memory storagedevice. The removable memory 132 may include a subscriber identitymodule (SIM) card, a memory stick, a secure digital (SD) memory card,and the like. In other embodiments, the processor 118 may accessinformation from, and store data in, memory that is not physicallylocated on the WTRU 102, such as on a server or a home computer (notshown).

The processor 118 may receive power from the power source 134, and maybe configured to distribute and/or control the power to the othercomponents in the WTRU 102. The power source 134 may be any suitabledevice for powering the WTRU 102. For example, the power source 134 mayinclude one or more dry cell batteries (e.g., nickel-cadmium (NiCd),nickel-zinc (NiZn), nickel metal hydride (NiMH), lithium-ion (Li-ion),etc.), solar cells, fuel cells, and the like.

The processor 118 may also be coupled to the GPS chipset 136, which maybe configured to provide location information (e.g., longitude andlatitude) regarding the current location of the WTRU 102. In additionto, or in lieu of, the information from the GPS chipset 136, the WTRU102 may receive location information over the air interface 116 from abase station (e.g., base stations 114 a, 114 b) and/or determine itslocation based on the timing of the signals being received from two ormore nearby base stations. It will be appreciated that the WTRU 102 mayacquire location information by way of any suitablelocation-determination method while remaining consistent with anembodiment.

The processor 118 may further be coupled to other peripherals 138, whichmay include one or more software and/or hardware modules that provideadditional features, functionality and/or wired or wirelessconnectivity. For example, the peripherals 138 may include anaccelerometer, an e-compass, a satellite transceiver, a digital camera(for photographs and/or video), a universal serial bus (USB) port, avibration device, a television transceiver, a hands free headset, aBluetooth® module, a frequency modulated (FM) radio unit, a digitalmusic player, a media player, a video game player module, an Internetbrowser, a Virtual Reality and/or Augmented Reality (VR/AR) device, anactivity tracker, and the like. The peripherals 138 may include one ormore sensors. The sensors may be one or more of a gyroscope, anaccelerometer, a hall effect sensor, a magnetometer, an orientationsensor, a proximity sensor, a temperature sensor, a time sensor; ageolocation sensor, an altimeter, a light sensor, a touch sensor, amagnetometer, a barometer, a gesture sensor, a biometric sensor, ahumidity sensor and the like.

The WTRU 102 may include a full duplex radio for which transmission andreception of some or all of the signals (e.g., associated withparticular subframes for both the UL (e.g., for transmission) and DL(e.g., for reception) may be concurrent and/or simultaneous. The fullduplex radio may include an interference management unit to reduce andor substantially eliminate self-interference via either hardware (e.g.,a choke) or signal processing via a processor (e.g., a separateprocessor (not shown) or via processor 118). In an embodiment, the WTRU102 may include a half-duplex radio for which transmission and receptionof some or all of the signals (e.g., associated with particularsubframes for either the UL (e.g., for transmission) or the DL (e.g.,for reception)).

FIG. 1C is a system diagram illustrating the RAN 104 and the CN 106according to an embodiment. As noted above, the RAN 104 may employ anE-UTRA radio technology to communicate with the WTRUs 102 a, 102 b, 102c over the air interface 116. The RAN 104 may also be in communicationwith the CN 106.

The RAN 104 may include eNode-Bs 160 a, 160 b, 160 c, though it will beappreciated that the RAN 104 may include any number of eNode-Bs whileremaining consistent with an embodiment. The eNode-Bs 160 a, 160 b, 160c may each include one or more transceivers for communicating with theWTRUs 102 a, 102 b, 102 c over the air interface 116. In one embodiment,the eNode-Bs 160 a, 160 b, 160 c may implement MIMO technology. Thus,the eNode-B 160 a, for example, may use multiple antennas to transmitwireless signals to, and/or receive wireless signals from, the WTRU 102a.

Each of the eNode-Bs 160 a, 160 b, 160 c may be associated with aparticular cell (not shown) and may be configured to handle radioresource management decisions, handover decisions, scheduling of usersin the UL and/or DL, and the like. As shown in FIG. 1C, the eNode-Bs 160a, 160 b, 160 c may communicate with one another over an X2 interface.

The CN 106 shown in FIG. 1C may include a mobility management entity(MME) 162, a serving gateway (SGW) 164, and a packet data network (PDN)gateway (PGW) 166. While the foregoing elements are depicted as part ofthe CN 106, it will be appreciated that any of these elements may beowned and/or operated by an entity other than the CN operator.

The MME 162 may be connected to each of the eNode-Bs 162 a, 162 b, 162 cin the RAN 104 via an S1 interface and may serve as a control node. Forexample, the MME 162 may be responsible for authenticating users of theWTRUs 102 a, 102 b, 102 c, bearer activation/deactivation, selecting aparticular serving gateway during an initial attach of the WTRUs 102 a,102 b, 102 c, and the like. The MME 162 may provide a control planefunction for switching between the RAN 104 and other RANs (not shown)that employ other radio technologies, such as GSM and/or WCDMA.

The SGW 164 may be connected to each of the eNode Bs 160 a, 160 b, 160 cin the RAN 104 via the S1 interface. The SGW 164 may generally route andforward user data packets to/from the WTRUs 102 a, 102 b, 102 c. The SGW164 may perform other functions, such as anchoring user planes duringinter-eNode B handovers, triggering paging when DL data is available forthe WTRUs 102 a, 102 b, 102 c, managing and storing contexts of theWTRUs 102 a, 102 b, 102 c, and the like.

The SGW 164 may be connected to the PGW 166, which may provide the WTRUs102 a, 102 b, 102 c with access to packet-switched networks, such as theInternet 110, to facilitate communications between the WTRUs 102 a, 102b, 102 c and IP-enabled devices.

The CN 106 may facilitate communications with other networks. Forexample, the CN 106 may provide the WTRUs 102 a, 102 b, 102 c withaccess to circuit-switched networks, such as the PSTN 108, to facilitatecommunications between the WTRUs 102 a, 102 b, 102 c and traditionalland-line communications devices. For example, the CN 106 may include,or may communicate with, an IP gateway (e.g., an IP multimedia subsystem(IMS) server) that serves as an interface between the CN 106 and thePSTN 108. In addition, the CN 106 may provide the WTRUs 102 a, 102 b,102 c with access to the other networks 112, which may include otherwired and/or wireless networks that are owned and/or operated by otherservice providers.

Although the WTRU is described in FIGS. 1A-1D as a wireless terminal, itis contemplated that in certain representative embodiments that such aterminal may use (e.g., temporarily or permanently) wired communicationinterfaces with the communication network.

In representative embodiments, the other network 112 may be a WLAN.

A WLAN in Infrastructure Basic Service Set (BSS) mode may have an AccessPoint (AP) for the BSS and one or more stations (STAs) associated withthe AP. The AP may have access or an interface to a Distribution System(DS) or another type of wired/wireless network that carries traffic into and/or out of the BSS. Traffic to STAs that originates from outsidethe BSS may arrive through the AP and may be delivered to the STAs.Traffic originating from STAs to destinations outside the BSS may besent to the AP to be delivered to respective destinations. Trafficbetween STAs within the BSS may be sent through the AP, for example,where the source STA may send traffic to the AP and the AP may deliverthe traffic to the destination STA. The traffic between STAs within aBSS may be considered and/or referred to as peer-to-peer traffic. Thepeer-to-peer traffic may be sent between (e.g., directly between) thesource and destination STAs with a direct link setup (DLS). In certainrepresentative embodiments, the DLS may use an 802.11e DLS or an 802.11ztunneled DLS (TDLS). A WLAN using an Independent BSS (IBSS) mode may nothave an AP, and the STAs (e.g., all of the STAs) within or using theIBSS may communicate directly with each other. The IBSS mode ofcommunication may sometimes be referred to herein as an “ad-hoc” mode ofcommunication.

When using the 802.11ac infrastructure mode of operation or a similarmode of operations, the AP may transmit a beacon on a fixed channel,such as a primary channel. The primary channel may be a fixed width(e.g., 20 MHz wide bandwidth) or a dynamically set width. The primarychannel may be the operating channel of the BSS and may be used by theSTAs to establish a connection with the AP. In certain representativeembodiments, Carrier Sense Multiple Access with Collision Avoidance(CSMA/CA) may be implemented, for example in 802.11 systems. ForCSMA/CA, the STAs (e.g., every STA), including the AP, may sense theprimary channel. If the primary channel is sensed/detected and/ordetermined to be busy by a particular STA, the particular STA may backoff. One STA (e.g., only one station) may transmit at any given time ina given BSS.

High Throughput (HT) STAs may use a 40 MHz wide channel forcommunication, for example, via a combination of the primary 20 MHzchannel with an adjacent or nonadjacent 20 MHz channel to form a 40 MHzwide channel.

Very High Throughput (VHT) STAs may support 20 MHz, 40 MHz, 80 MHz,and/or 160 MHz wide channels. The 40 MHz, and/or 80 MHz, channels may beformed by combining contiguous 20 MHz channels. A 160 MHz channel may beformed by combining 8 contiguous 20 MHz channels, or by combining twonon-contiguous 80 MHz channels, which may be referred to as an 80+80configuration. For the 80+80 configuration, the data, after channelencoding, may be passed through a segment parser that may divide thedata into two streams. Inverse Fast Fourier Transform (IFFT) processing,and time domain processing, may be done on each stream separately. Thestreams may be mapped on to the two 80 MHz channels, and the data may betransmitted by a transmitting STA. At the receiver of the receiving STA,the above described operation for the 80+80 configuration may bereversed, and the combined data may be sent to the Medium Access Control(MAC).

Sub 1 GHz modes of operation are supported by 802.11af and 802.11ah. Thechannel operating bandwidths, and carriers, are reduced in 802.11af and802.11ah relative to those used in 802.11n, and 802.11ac. 802.11afsupports 5 MHz, 10 MHz, and 20 MHz bandwidths in the TV White Space(TVWS) spectrum, and 802.11ah supports 1 MHz, 2 MHz, 4 MHz, 8 MHz, and16 MHz bandwidths using non-TVWS spectrum. According to a representativeembodiment, 802.11ah may support Meter Type Control/Machine-TypeCommunications (MTC), such as MTC devices in a macro coverage area. MTCdevices may have certain capabilities, for example, limited capabilitiesincluding support for (e.g., only support for) certain and/or limitedbandwidths. The MTC devices may include a battery with a battery lifeabove a threshold (e.g., to maintain a very long battery life).

WLAN systems, which may support multiple channels, and channelbandwidths, such as 802.11n, 802.11ac, 802.11af, and 802.11ah, include achannel which may be designated as the primary channel. The primarychannel may have a bandwidth equal to the largest common operatingbandwidth supported by all STAs in the BSS. The bandwidth of the primarychannel may be set and/or limited by a STA, from among all STAs inoperating in a BSS, which supports the smallest bandwidth operatingmode. In the example of 802.11ah, the primary channel may be 1 MHz widefor STAs (e.g., MTC type devices) that support (e.g., only support) a 1MHz mode, even if the AP, and other STAs in the BSS support 2 MHz, 4MHz, 8 MHz, 16 MHz, and/or other channel bandwidth operating modes.Carrier sensing and/or Network Allocation Vector (NAV) settings maydepend on the status of the primary channel. If the primary channel isbusy, for example, due to a STA (which supports only a 1 MHz operatingmode) transmitting to the AP, all available frequency bands may beconsidered busy even though a majority of the available frequency bandsremains idle.

In the United States, the available frequency bands, which may be usedby 802.11ah, are from 902 MHz to 928 MHz. In Korea, the availablefrequency bands are from 917.5 MHz to 923.5 MHz. In Japan, the availablefrequency bands are from 916.5 MHz to 927.5 MHz. The total bandwidthavailable for 802.11ah is 6 MHz to 26 MHz depending on the country code.

FIG. 1D is a system diagram illustrating the RAN 104 and the CN 106according to an embodiment. As noted above, the RAN 104 may employ an NRradio technology to communicate with the WTRUs 102 a, 102 b, 102 c overthe air interface 116. The RAN 104 may also be in communication with theCN 106.

The RAN 104 may include gNBs 180 a, 180 b, 180 c, though it will beappreciated that the RAN 104 may include any number of gNBs whileremaining consistent with an embodiment. The gNBs 180 a, 180 b, 180 cmay each include one or more transceivers for communicating with theWTRUs 102 a, 102 b, 102 c over the air interface 116. In one embodiment,the gNBs 180 a, 180 b, 180 c may implement MIMO technology. For example,gNBs 180 a, 108 b may utilize beamforming to transmit signals to and/orreceive signals from the gNBs 180 a, 180 b, 180 c. Thus, the gNB 180 a,for example, may use multiple antennas to transmit wireless signals to,and/or receive wireless signals from, the WTRU 102 a. In an embodiment,the gNBs 180 a, 180 b, 180 c may implement carrier aggregationtechnology. For example, the gNB 180 a may transmit multiple componentcarriers to the WTRU 102 a (not shown). A subset of these componentcarriers may be on unlicensed spectrum while the remaining componentcarriers may be on licensed spectrum. In an embodiment, the gNBs 180 a,180 b, 180 c may implement Coordinated Multi-Point (CoMP) technology.For example, WTRU 102 a may receive coordinated transmissions from gNB180 a and gNB 180 b (and/or gNB 180 c).

The WTRUs 102 a, 102 b, 102 c may communicate with gNBs 180 a, 180 b,180 c using transmissions associated with a scalable numerology. Forexample, the OFDM symbol spacing and/or OFDM subcarrier spacing may varyfor different transmissions, different cells, and/or different portionsof the wireless transmission spectrum. The WTRUs 102 a, 102 b, 102 c maycommunicate with gNBs 180 a, 180 b, 180 c using subframe or transmissiontime intervals (TTIs) of various or scalable lengths (e.g., containing avarying number of OFDM symbols and/or lasting varying lengths ofabsolute time).

The gNBs 180 a, 180 b, 180 c may be configured to communicate with theWTRUs 102 a, 102 b, 102 c in a standalone configuration and/or anon-standalone configuration. In the standalone configuration, WTRUs 102a, 102 b, 102 c may communicate with gNBs 180 a, 180 b, 180 c withoutalso accessing other RANs (e.g., such as eNode-Bs 160 a, 160 b, 160 c).In the standalone configuration, WTRUs 102 a, 102 b, 102 c may utilizeone or more of gNBs 180 a, 180 b, 180 c as a mobility anchor point. Inthe standalone configuration, WTRUs 102 a, 102 b, 102 c may communicatewith gNBs 180 a, 180 b, 180 c using signals in an unlicensed band. In anon-standalone configuration WTRUs 102 a, 102 b, 102 c may communicatewith/connect to gNBs 180 a, 180 b, 180 c while also communicatingwith/connecting to another RAN such as eNode-Bs 160 a, 160 b, 160 c. Forexample, WTRUs 102 a, 102 b, 102 c may implement DC principles tocommunicate with one or more gNBs 180 a, 180 b, 180 c and one or moreeNode-Bs 160 a, 160 b, 160 c substantially simultaneously. In thenon-standalone configuration, eNode-Bs 160 a, 160 b, 160 c may serve asa mobility anchor for WTRUs 102 a, 102 b, 102 c and gNBs 180 a, 180 b,180 c may provide additional coverage and/or throughput for servicingWTRUs 102 a, 102 b, 102 c.

Each of the gNBs 180 a, 180 b, 180 c may be associated with a particularcell (not shown) and may be configured to handle radio resourcemanagement decisions, handover decisions, scheduling of users in the ULand/or DL, support of network slicing, DC, interworking between NR andE-UTRA, routing of user plane data towards User Plane Function (UPF) 184a, 184 b, routing of control plane information towards Access andMobility Management Function (AMF) 182 a, 182 b and the like. As shownin FIG. 1D, the gNBs 180 a, 180 b, 180 c may communicate with oneanother over an Xn interface.

The CN 106 shown in FIG. 1D may include at least one AMF 182 a, 182 b,at least one UPF 184 a, 184 b, at least one Session Management Function(SMF) 183 a, 183 b, and possibly a Data Network (DN) 185 a, 185 b. Whilethe foregoing elements are depicted as part of the CN 106, it will beappreciated that any of these elements may be owned and/or operated byan entity other than the CN operator.

The AMF 182 a, 182 b may be connected to one or more of the gNBs 180 a,180 b, 180 c in the RAN 104 via an N2 interface and may serve as acontrol node. For example, the AMF 182 a, 182 b may be responsible forauthenticating users of the WTRUs 102 a, 102 b, 102 c, support fornetwork slicing (e.g., handling of different protocol data unit (PDU)sessions with different requirements), selecting a particular SMF 183 a,183 b, management of the registration area, termination of non-accessstratum (NAS) signaling, mobility management, and the like. Networkslicing may be used by the AMF 182 a, 182 b in order to customize CNsupport for WTRUs 102 a, 102 b, 102 c based on the types of servicesbeing utilized WTRUs 102 a, 102 b, 102 c. For example, different networkslices may be established for different use cases such as servicesrelying on ultra-reliable low latency (URLLC) access, services relyingon enhanced massive mobile broadband (eMBB) access, services for MTCaccess, and the like. The AMF 182 a, 182 b may provide a control planefunction for switching between the RAN 104 and other RANs (not shown)that employ other radio technologies, such as LTE, LTE-A, LTE-A Pro,and/or non-3GPP access technologies such as WiFi.

The SMF 183 a, 183 b may be connected to an AMF 182 a, 182 b in the CN106 via an N11 interface. The SMF 183 a, 183 b may also be connected toa UPF 184 a, 184 b in the CN 106 via an N4 interface. The SMF 183 a, 183b may select and control the UPF 184 a, 184 b and configure the routingof traffic through the UPF 184 a, 184 b. The SMF 183 a, 183 b mayperform other functions, such as managing and allocating UE IP address,managing PDU sessions, controlling policy enforcement and QoS, providingDL data notifications, and the like. A PDU session type may be IP-based,non-IP based, Ethernet-based, and the like.

The UPF 184 a, 184 b may be connected to one or more of the gNBs 180 a,180 b, 180 c in the RAN 104 via an N3 interface, which may provide theWTRUs 102 a, 102 b, 102 c with access to packet-switched networks, suchas the Internet 110, to facilitate communications between the WTRUs 102a, 102 b, 102 c and IP-enabled devices. The UPF 184, 184 b may performother functions, such as routing and forwarding packets, enforcing userplane policies, supporting multi-homed PDU sessions, handling user planeQoS, buffering DL packets, providing mobility anchoring, and the like.

The CN 106 may facilitate communications with other networks. Forexample, the CN 106 may include, or may communicate with, an IP gateway(e.g., an IP multimedia subsystem (IMS) server) that serves as aninterface between the CN 106 and the PSTN 108. In addition, the CN 106may provide the WTRUs 102 a, 102 b, 102 c with access to the othernetworks 112, which may include other wired and/or wireless networksthat are owned and/or operated by other service providers. In oneembodiment, the WTRUs 102 a, 102 b, 102 c may be connected to a local DN185 a, 185 b through the UPF 184 a, 184 b via the N3 interface to theUPF 184 a, 184 b and an N6 interface between the UPF 184 a, 184 b andthe DN 185 a, 185 b.

In view of FIGS. 1A-1D, and the corresponding description of FIGS.1A-1D, one or more, or all, of the functions described herein withregard to one or more of: WTRU 102 a-d, Base Station 114 a-b, eNode-B160 a-c, MME 162, SGW 164, PGW 166, gNB 180 a-c, AMF 182 a-b, UPF 184a-b, SMF 183 a-b, DN 185 a-b, and/or any other device(s) describedherein, may be performed by one or more emulation devices (not shown).The emulation devices may be one or more devices configured to emulateone or more, or all, of the functions described herein. For example, theemulation devices may be used to test other devices and/or to simulatenetwork and/or WTRU functions.

The emulation devices may be designed to implement one or more tests ofother devices in a lab environment and/or in an operator networkenvironment. For example, the one or more emulation devices may performthe one or more, or all, functions while being fully or partiallyimplemented and/or deployed as part of a wired and/or wirelesscommunication network in order to test other devices within thecommunication network. The one or more emulation devices may perform theone or more, or all, functions while being temporarilyimplemented/deployed as part of a wired and/or wireless communicationnetwork. The emulation device may be directly coupled to another devicefor purposes of testing and/or performing testing using over-the-airwireless communications.

The one or more emulation devices may perform the one or more, includingall, functions while not being implemented/deployed as part of a wiredand/or wireless communication network. For example, the emulationdevices may be utilized in a testing scenario in a testing laboratoryand/or a non-deployed (e.g., testing) wired and/or wirelesscommunication network in order to implement testing of one or morecomponents. The one or more emulation devices may be test equipment.Direct RF coupling and/or wireless communications via RF circuitry(e.g., which may include one or more antennas) may be used by theemulation devices to transmit and/or receive data.

The description herein relates to methods, devices, and systems forfrequency division multiplexed On-Off Keying (OOK) signals for wake-upradios (WURs). One or more techniques may be utilized and are describedherein, including aligning the Inverse Discrete Fourier Transform (IDFT)durations for low data rate (LDR) and high data rate (HDR) OOK signals;phase rotations for each wake-up radio (WUR) band; and/or using aGolay-based multi-band OOK waveform to control fluctuation of thesignals in the time domain.

As described above, a WLAN in Infrastructure BSS mode has an AP for theBSS and one or more STAs associated with the AP. The AP may have accessor interface to a Distribution System (DS) or another type ofwired/wireless network that carries traffic in and out of the BSS.Traffic to STAs that originates from outside the BSS may arrive throughthe AP and may be delivered to the STAs. Traffic originating from STAsto destinations outside the BSS may be sent to the AP to be delivered tothe respective destinations. Traffic between STAs within the BSS mayalso be sent through the AP, where the source STA may send traffic tothe AP and the AP may deliver the traffic to the destination STA. Thetraffic between STAs within a BSS may be considered peer-to-peertraffic. The peer-to-peer traffic may also be sent directly between thesource and destination STAs with a direct link setup (DLS) using an IEEE802.11e DLS or an IEEE 802.11z tunneled DLS (TDLS).

A WLAN using an Independent BSS (IBSS) mode may have no AP, and/or STAscommunicating directly with each other. This mode of communication isreferred to as an “ad-hoc” mode of communication.

IEEE 802.11ba defines a physical layer specification and medium accesscontrol layer specification that enables operation of a wake-up radio(WUR) for IEEE 802.11 devices. Due to the low-power requirements of WUR,IEEE 802.11ba may adopt a basic non-coherent transmission scheme, ratherthan advanced schemes like OFDM. To this end, on-off keying (OOK) withManchester coding, where a bit is represented with both on and offstates at different durations, may be utilized. The main advantage ofManchester coding is that the receiver may detect a bit by comparing theenergy of “on” and “off” durations or it may use an envelope detector.However, the “on” durations of the OOK signals may overlap in timedomain. Thus, without any precaution, the multi-band operation may causesignificant fluctuation in the time domain.

To improve spectral efficiency 802.11ac has introduced the concept fordownlink Multi-User MIMO (MU-MIMO) transmission to multiple STA's in thesame symbol's time frame, e.g. during a downlink OFDM symbol. Thepotential for the use of downlink MU-MIMO is also currently consideredfor 802.11ah. It is important to note that since downlink MU-MIMO, as itis used in 802.11ac, uses the same symbol timing to multiple STA'sinterference of the waveform transmissions to multiple STA's is not anissue. However, all STA's involved in MU-MIMO transmission with the APmust use the same channel or band, this limits the operating bandwidthto the smallest channel bandwidth that is supported by the STA's whichare included in the MU-MIMO transmission with the AP.

IEEE 802.11ba defines a physical layer specification and medium accesscontrol layer specification that enables operation of a WUR for 802.11devices. The Project Authorization Request (PAR) for 802.11ba includesthe following requirements for range, capability, coexistence, powerconsumption, and latency.

With respect to range, the 802.11ba WUR may be a companion radio to theprimary connectivity radio (e.g., 802.11ax) and may meet the same rangerequirement as the primary connectivity radio.

With respect to capability, the wake-up frames may carry only controlinformation which can trigger a transition of the primary connectivityradio out of sleep.

With respect to coexistence, the WUR devices may coexist with legacyIEEE 802.11 devices in the same band.

With respect to power consumption, the WUR may have an expected activereceiver power consumption of less than one milliwatt. Low power devicesmay manifest themselves in a number of applications andInternet-of-Things (IOT) usage cases. These use cases may includehealthcare, smart home, industrial sensors, wearables, etc. Devices usedin these applications are usually powered by a battery.

With respect to latency, prolonging the battery lifetime while in someuse cases also maintaining low latency may become an imperativerequirement. Power efficient mechanisms may need to be used withbattery-operated devices while maintaining low latency where it isrequired. A typical OFDM active receiver may consume tens to hundreds ofmilliwatts. To further reduce power consumption, devices may use powersave modes. Devices based on IEEE 802.11 power save modes mayperiodically wake up from a sleep state to receive information from anAP and to know if there are data to receive from the AP. The longer thedevices stay in the sleep state, the lower the amount of power thedevices may consume but at the expense of increased latency of datareception.

There may be several wake-up radio waveform options for a singlechannel. As noted above, due to the low-power requirements of WUR, IEEE802.11ba may adopt a basic non-coherent transmission scheme, rather thanadvanced schemes like OFDM. To this end, on-off keying (OOK) withManchester coding where a bit is represented with both on and off statesat different durations may be utilized. The main advantage of Manchestercoding is that the receiver can detect a bit by comparing the energy of“on” and “off” durations or it may use an envelope detector.

Referring now to FIGS. 2A-2C, diagrams showing several ways to generatecorresponding waveforms for OOK symbols with Manchester coding for ahigh data rate (HDR) are shown. FIG. 2A shows a first masking approach.One of the approaches is to apply a mask on the basic OFDM symbol torepresent the coded OOK bit “0” and “1”. In this method, the basic ideaof using a sequence (e.g., a part of legacy LTF sequence) may be used togenerate an OFDM symbol. Then, the generated OFDM symbol may be maskedafter cyclic prefix (CP) insertion to generate the waveform.

FIG. 2B shows a second masking approach. The output of IDFT is maskedbefore the CP insertion. A smaller CP duration, as compared to the onein FIG. 2A, is then prepended. The operation which generates a 2 μs ‘On’duration in the waveform may be exemplified as follows. The 2 μs ‘On’symbol may be constructed using a 64-point IFFT, sampling at 20-MHz asfollows. Thirteen subcarriers may be used, (−6, −5, . . . −1, 0, 1, 2, .. . 6). The following subcarriers may be null: (−5, −3, −1, 0, 1, 3, 5).The other subcarriers may be selected from any of the followingconstellations: binary phase shift keying (BPSK), quadrature phase shiftkeying (QPSK), 16-QAM, 64-QAM, and 256-QAM. The first 32 values of the64-point IFFT output may be selected, where the last 8 samples of those32 samples may prepend to the 32 samples generating 40 samples,representing the 2 μs ‘On’ symbol.

FIG. 2C shows a third masking approach. This method may use a smallerIDFT operation and a smaller CP insertion to generate the “on” durationand zero padding. In this case, the sequence length may be smaller ascompared to other cases (e.g., a length of 7).

FIG. 3 shows waveform generation methods for Manchester-coded OOKsymbols for a low data rate (LDR). For an LDR, the waveform structuremay introduce more redundancy in time, such as by repetition. FIG. 3illustrates that the CP prepended IDFT output may be transmitted twotimes at disjoint locations in time for different information. As anumerical example, the 4 μs ‘On’ durations in the waveform may beconstructed using a 64-point IFFT, sampling at 20-MHz as follows.Thirteen subcarriers may be used, (−6, −5, . . . −1, 0, 1, 2, . . . 6).The DC subcarrier may be a null symbol. The other subcarriers may beselected from any of the following constellations: BPSK, QPSK, 16-QAM,64-QAM, and 256-QAM. The last 16 values of the 64-point IFFT output maybe prepended to the 64 samples generating 80 samples, representing the 4μs ‘On’ symbol.

In addition to options for a single channel, there may be severalwake-up radio waveform options for a multiple channels. FIGS. 4A and 4Bare directed to multi-band operations. FIG. 4A shows a WUS transmissionin a 40 MHz operation. FIG. 4B shows a WUS transmission in a multi-bandoperation.

In one approach, a wake-up radio signal (WUS) may be transmitted inmultiple 20 MHz channels. For example, two 20 MHz channels as shown inFIG. 4A, and four 40 MHz channels as shown in FIG. 4B, may be exploitedto transmit two WUSs or four WUSs, respectively. Each channel may beeither LDR and HDR. FIG. 4A shows a WUS for WUR station #n and a WUS forWUR station #m transmitted for each respective 20 MHz channel. FIG. 4Bshows a WUS for WUR station #n, a WUS for WUR station #m, a WUS for WURstation #k, and a WUS for WUR station #N transmitted for each respective20 MHz channel.

Certain terms used herein are defined below. For example, Aperiodic AutoCorrelation (APAC) may be defined as follows.

Let ρ_(a)(k) for k∈[−N+1, N−1] be the aperiodic autocorrelation of acomplex sequence a={a₀, a₁, . . . , a_(N−1)} and ρ_(a)(k) may beexplicitly given by:

$\begin{matrix}{{\rho_{a}(k)} = \left\{ {\begin{matrix}{{\rho_{a}^{+}(k)},} & {k \in \left\lbrack {0,{N - 1}} \right\rbrack} \\{{\rho_{a}^{-}\left( {- k} \right)},} & {k \in \left\lbrack {{{- N} + 1},{- 1}} \right\rbrack}\end{matrix},{where}} \right.} & {{Equation}\mspace{14mu} 1} \\{{{\rho_{a}^{+}(k)} = {\sum\limits_{i = 0}^{N - k - 1}{a_{i}^{*}a_{i + k}}}},{0 \leq k \leq {N - 1}},{and}} & {{Equation}\mspace{14mu} 2} \\{{{\rho_{a}^{-}(k)} = {\sum\limits_{i = 0}^{N - k - 1}{a_{i}a_{i + k}^{*}}}},{1 \leq k \leq {N - 1}},} & {{Equation}\mspace{14mu} 3}\end{matrix}$

where (^(⋅))* may be the conjugate of its argument and ρ_(a) ⁺(k)=[ρ_(a)⁻(k)]*.

Periodic Auto Correlation (PAC) may be defined as follows.

Let r_(a)(k) be the periodic autocorrelation of the sequence a={a₀, a₁,. . . , a_(N−1)} and r_(a)(k) may be explicitly given by:r _(a)(k)

Σ_(i=0) ^(N−1) a* _(i) a _((i+k)) _(N) , 0≤k≤N−1,  Equation 4

where (i)_(N) may be the modulo of i.

Golay Complementary Sequences may be defined as follows.

The pair of (a, b) may be called a Golay complementary pair (and thesequences a and b may be called Golay sequences) if:ρ_(a)(k)+ρ_(b)(k)=0, k≠0.  Equation 5

In telecommunication, Golay complementary pairs and sequences have beenproposed for peak-to-average power mitigation, estimation of IQimbalance parameters, and channel estimation due to its uniqueproperties.

A time-domain power signal may be expressed as a function of APAC andlimiting Peak-to-Average Power Ratio (PAPR) with Golay Sequences. Forexample, a sequence with a polynomial may be represented as follows:

$\begin{matrix}{{{x_{a}(z)} = {{a_{N - 1}z^{N - 1}} + {a_{N - 2}z^{N - 2}} + \ldots + a_{0}}},} & {{Equation}\mspace{14mu} 6}\end{matrix}$

where the sequence a=[a₀, a₁ . . . , a_(N−1)]. Therefore, the followingconclusions may be made.

If z=e^(j2πt), x_(a)(z) may be equivalent to OFDM signal in time (i.e.,a Fourier transform of a).

If z=e^(j2πt), the instantaneous power may be calculated as|x_(a)(z)|²=x_(a)(z)x_(a*)(z⁻¹) as x_(a*)(z⁻¹)=x_(a)*(z). If theinstantaneous power is known, the PAPR may be measure.

The formula |x_(a)(z)|²=x_(a)(z)x_(a*)(z⁻¹) may be related to APAC ofthe sequence. It may be expressed as follows:

$\begin{matrix}{{{{x_{a}(z)}}^{2}{x_{a}(z)}x_{a}*\left( z^{- 1} \right)} = {{\rho_{a}(0)} + {\sum\limits_{k = 1}^{N - 1}{{\rho_{a}^{+}(k)}z^{k}}} + {\sum\limits_{k = 1}^{N - 1}{{\rho_{a}^{-}(k)}z^{- k}}}}} & {{Equation}\mspace{14mu} 7} \\{\mspace{79mu}{= {{\rho_{a}(0)} + {\sum\limits_{k = 1}^{N - 1}{{\rho_{a}^{+}(k)}e^{j\; 2\pi\;{tk}}}} + {\sum\limits_{k = 1}^{N - 1}{{\rho_{a}^{-}(k)}e^{{- j}\; 2\pi\;{tk}}}}}}} & {{Equation}\mspace{14mu} 8} \\{= {{{\rho_{a}(0)} + {2{\sum\limits_{k = 1}^{N - 1}{{{\rho_{a}^{+}(k)}}{\cos\left( {{2\pi\;{tk}} + {{\angle\rho}_{a}^{+}(k)}} \right)}}}}} = {\sum\limits_{k = {{- N} + 1}}^{N - 1}{{\rho_{a}(k)}{e^{j2\pi tk}.}}}}} & {{Equation}\mspace{14mu} 9}\end{matrix}$

If the sequence has perfect APAC properties, |x_(a)(e^(j2πt))|²=ρ_(a)(0)(i.e., a constant) holds true. This means the time domain signal mayhave to be unimodal in every point in time. By using the equation above,the PAPR of any sequence may be bounded as:

$\begin{matrix}{{{PAPR}\overset{\Delta}{=}{\frac{\max\left( {{x_{a}(z)}{x_{a}^{*}\left( z^{- 1} \right)}} \right)}{E\left\lbrack {{x_{a}(z)}{x_{a}^{*}\left( z^{- 1} \right)}} \right\rbrack} < \frac{{\rho_{a}(0)} + {2{\sum\limits_{k = 1}^{N - 1}{{\rho_{a}^{+}(k)}}}}}{\rho_{a}(0)}}},} & {{Equation}\mspace{14mu} 10}\end{matrix}$

where E[⋅] may be the integration operation for t from 0 to 2π.

The PAPR may also be equivalently measured by two quantities: integratedside lobe level (ISL) and merit factor (MF) of a sequence, defined as:

$\begin{matrix}{{{ISL}\overset{\Delta}{=}{\sum\limits_{k = 1}^{N - 1}{{\rho_{a}^{+}(k)}}^{2}}},{and}} & {{Equation}\mspace{14mu} 11} \\{{{MF}\overset{\Delta}{=}\frac{{\rho_{a}^{+}(0)}^{2}}{2{\sum\limits_{k = 1}^{N}{{\rho_{a}^{+}(k)}}^{2}}}},{{respectively}.}} & {{Equation}\mspace{14mu} 12}\end{matrix}$

The PAPR of a sequence in a complementary pair may be always less than10 log 10(2) dB (i.e., less than or equal to approximately 3 dB). Theproof may be as follows.

Since Golay pairs a and b satisfy ρ_(a)(k)+ρ_(b)(k)=0, k≠0, thefollowing may hold true:

$\begin{matrix}{{{{x_{a}(z)}{x_{a}^{*}\left( z^{- 1} \right)}} + {{x_{b}(z)}{x_{b}^{*}\left( z^{- 1} \right)}}} = {{\rho_{a}(0)} + {\sum\limits_{k = 1}^{N - 1}{{\rho_{a}^{+}(k)}z^{k}}} + {{\rho_{a}^{-}(k)}z^{- k}} + {\rho_{b}(0)} + {\sum\limits_{k = 1}^{N - 1}{{\rho_{b}^{+}(k)}z^{k}}} + {{\rho_{b}^{-}(k)}z^{- k}}}} & {{Equation}\mspace{14mu} 13} \\{= {{{\rho_{a}(0)} + {\rho_{b}(0)} + {\sum\limits_{k = 1}^{N - 1}\left( {{\left( {{\rho_{a}^{+}(k)} + {\rho_{b}^{+}(k)}} \right)z^{k}} + {\left( {{\rho_{a}^{-}(k)} + {\rho_{b}^{-}(k)}} \right)z^{- k}}} \right)}} = {{{\rho_{a}(0)} + {\rho_{b}(0)}} = {2{N.}}}}} & {{Equation}\mspace{14mu} 14}\end{matrix}$

Thus, the PAPR of a Golay sequence may be bounded as:

$\begin{matrix}{{PAPR} = {{\frac{\max\left( {{x_{a}(z)}{x_{a}\left( z^{- 1} \right)}} \right)}{E\left\lbrack {{x_{a}(z)}{x_{a}\left( z^{- 1} \right)}} \right\rbrack} \leq \frac{\max\left( {{{x_{a}(z)}{x_{a}\left( z^{- 1} \right)}} + {{x_{b}(z)}{x_{b}\left( z^{- 1} \right)}}} \right)}{E\left\lbrack {{x_{a}(z)}{x_{a}\left( z^{- 1} \right)}} \right\rbrack}} = {\frac{2N}{\rho_{a}(0)} = 2.}}} & {{Equation}\mspace{14mu} 15}\end{matrix}$

Golay complementary sequences may be constructed for larger lengthsusing, for example, Budisin's method. For example, the length N=2^(M)Golay complementary pairs may be constructed by the following recursiveprocedure:a _(k) ^((m)) =w _(m) a _(k) ^((m−1)) +b _(k−d) _(m) ^((m−1))  Equation16b _(k) ^((m)) =w _(m) a _(k) ^((m−1)) −b _(k−d) _(m) ^((m−1))  Equation17

where a_(k) ⁽⁰⁾=a_(k) ⁽¹⁾=δ_(k), δ_(k) may be the Kronecker's delta, andw_(m) may be the mth element of rotation vector w=[w₁ w₂ . . . w_(M)],and where |w_(m)|=1, d_(m) may be the mth element of the delay vectord=[d₁ d₂ . . . d_(M)] and the permutation of [1 2 . . . 2^(M)].

For example, in IEEE 802.11ad, the pairs of Golay complementarysequences may be generated based on the method above and three pairs maybe considered: (Ga₃₂, Gb₃₂), (Ga₆₄, Gb₆₄), and (Ga₁₂₈, Gb₁₂₈). Theparameters of these pairs are listed as follows:Ga ₃₂=flip{a _(k) ⁽⁵⁾} and Gb ₃₂=flip{b _(k) ⁽⁵⁾}:  Equation 18w=[−1 1 −1 1 −1] and d=[1 4 8 2 16]  Equation 19Ga ₆₄=flip{a _(k) ⁽⁶⁾} and Gb ₆₄=flip{b _(k) ⁽⁶⁾}:  Equation 20w=[1 1 −1 −1 1 −1] and d=[2 1 4 8 16 32]  Equation 21Ga ₁₂₈=flip{a _(k) ⁽⁷⁾} and Gb ₁₂₈=flip{a _(k) ⁽⁷⁾}:  Equation 22w=[−1 −1 −1 −1 1 −1 −1] and d=[1 8 2 4 16 32 64],  Equation 23

where flip{⋅} reverses the order of its argument. In 802.11ad, the Golaysequences may not only be used in STF and CEF, they are also used in SCPHY (Ga₆₄) and low power SC PHY (Ga₆₄ and G₈) for guard interval (GI),as well as in beamforming training (TRN) field.

A Unified Property to Generate Golay Complementary Pair may be provided.

Property 1: Let a and b be Golay pairs of length N and c and d be Golaypairs of length M. Then, the following e and f sequence are Golay pairsof length k(N−1)+l(M−1)+m+1:x _(e)(z)=w ₁ x _(a)(z ^(k))x _(c)(z ^(l))+w ₂ x _(b)(z ^(k))x _(d)(z^(l))z ^(m)  Equation 24x _(f)(z)=w ₁ x _({tilde over (b)}*)(z ^(k))x _(c)(z ^(l))−w ₂ x _(ã*)(z^(k))x _(d)(z ^(l))z ^(m),  Equation 25

where k, l, m are integer numbers, w₁ and w₂ are arbitrary complexnumbers with unit amplitude, and x_(a)(z^(k)) may be the upsampledsequence a with the factor of k, x_(a)(z^(k))x_(b)(z^(l)) may be theconvolution of up-sampled sequence a with the factor of k and up-sampledsequence b with the factor of l, x_(a)(z)z^(m) may be padded sequence awith m null symbols, {tilde over (b)} may be the flipped vector b, and{tilde over (b)}* may be conjugate of {tilde over (b)}.

Golay complementary sequences with the alphabet of {1, −1} are known toexist for all lengths N=2^(n)10^(m)26^(k) for any non-negative integersn, m and k. Golay complementary sequences up to length 13 are also knownin the art.

Referring now to FIG. 5 , a diagram illustrating WUSs multiplexed in thefrequency domain. FIG. 5 shows that when WUSs are multiplexed in thefrequency domain, the “On” durations of the OOK signals may overlap inthe time domain. The left portion of FIG. 5 may be similar to themulti-band 80 MHz operation shown in FIG. 4B. Thus, without anyprecaution, the multi-band operation may cause significant fluctuationin the time domain.

To demonstrate the fluctuation, assume that the sequences in a firstconventional approach (Approach 1) and the sequences in a secondconventional approach (Approach 2) are considered for four channelswhere each channel consist of HDR WUSs.

An example of the transmitted multi-band signal and the correspondingPAPR distribution (measured at 2 μs periods) are given in FIGS. 6A and6B, which are used to demonstrate the PAPR problem for multi-bandoperation. FIG. 6A shows a signal when four channels are utilized. FIG.6B shows PAPR distribution when four channels are utilized. Each 20 MHzchannel in FIGS. 6A-6B may have one HDR WUS.

As shown in FIG. 6A and FIG. 6B, the peak power may reach more than 12dB above the average, which may lead to a reduced transmit power andcoverage loss for WURs. Methods that reduce the PAPR for multi-bandoperation when considering mixed HDR and LDR traffic may be needed.

One or more techniques may be utilized to reduce the PAPR for multi-bandoperation when considering mixed HDR and LDR traffic and are describedherein, including aligning the Inverse Discrete Fourier Transform (IDFT)durations for LDR and HDR OOK signals; phase rotations for each wake-upradio (WUR) band; and/or using a Golay-based multi-band OOK waveform tocontrol fluctuation of the signals in the time domain.

FIG. 7 shows aligning the IDFT durations for LDR and HDR WUSs. The leftportion of FIG. 7 may be similar to the multi-band 80 MHz operationshown in FIG. 4B. FIG. 7 shows a multi-band operation where the firsttwo channels and the fourth channel carry HDR WUS and the third channelcarries LDR WUS.

Here, each “On” duration of the WUS for the third channel may have twoOFDM symbols transmitted back-to-back. The second OFDM symbol on thethird channel may be a repetition of the first OFDM symbol, a phaseshifted version of the first OFDM symbol, or another OFDM symbolgenerated through a different sequence. This approach may align thesymbol boundaries of OFDM symbols in time for different channels. Thealignment may be beneficial to adjust the sequences on each channel toavoid of PAPR increase in case of multiband operation.

In one implementation, this may be shown as a type of coding for LDRcases. For example, bit 1 may be encoded as [1 1 0 0 1 1 0 0] and bit 0may be encoded as [0 0 1 1 0 0 1 1] for LDR before the waveformgeneration. The symbol duration for LDR may be set to the one used forHDR. The encoding for HDR may be as follows: 1 may be encoded as [1 0]and bit 0 may be encoded as [0 1].

In another technique, phase rotations for each band may be used.Different phase rotations may be introduced to the sequences when theyare mapped to different channels. For example, let s∈

^(7×1) be a sequence optimized for single channel transmission for HDR.When the sequence may be for the 1^(st), 2^(nd), 3^(rd), and 4^(th)channels, the sequence s may be multiplied by e^(jθ) ¹ , e^(jθ) ² ,e^(jθ) ³ , and e^(jθ) ⁴ , respectively, as illustrated in FIG. 8 .

FIG. 8 shows and example of applying phase rotations for differentchannels, and the left portion of FIG. 8 may be similar to themulti-band 80 MHz operation shown in FIG. 4B. In one example, thedifference between the phases may be given as:

$\begin{matrix}{{{\theta_{i + 1} - \theta_{i}} = \theta_{fixed}},{e.g.},{\theta_{fixed} = {\frac{2\pi}{8}.}}} & {{Equation}\mspace{11mu} 26}\end{matrix}$

A different cyclic shift in time may be introduced to the signalsgenerated for different channels. For example, the amount of the cyclicshift between different channels may be set to δt=100 ns to avoid ofPAPR increase in time. This should not be confused with the cyclicshifts introduced to avoid unintentional beamforming for multipleantenna transmission case and may be chosen independently thereof.

In another technique, a Golay-based multi-band OOK waveform may be usedto control fluctuation of the signals in the time domain. The sequencesused for ‘On’ durations may be constructed based on the Golay sequences.To this end, a first step may be to generate a set of Golay sequencewhere the center tone may be 0. The rules for this set may be asfollows.

Golay sequences may be constructed with a length of 7, where a and b areGolay pairs of length S=3. Then,x _(e)(z)=w ₁ x _(a)(z ^(k))+w ₂ x _(b)(z ^(k))z ^(S+1) and  Equation 27x _(f)(z)=w ₁ x _({tilde over (b)}*)(z ^(k))−w ₂ x _(ã*)(z ^(k))z^(S+1)  Equation 28

may be Golay pairs of length of 7 based on the Property 1 providedabove, where w₁ and w₂ are arbitrary complex numbers with unitamplitude. In other words,e=[w ₁ a 0 w ₂ b] and  Equation 29f=[w ₁ {tilde over (b)}* 0 −w ₂ ã*]  Equation 30

may be new sequences and they complement each other as being a Golaycomplementary pair (i.e., Golay sequences) according toρ_(a)(k)+ρ_(b)(k)=0, k≠0. For example, a QPSK-based Golay pair a and bfor the length of S=3 may be a=[1 1i 1] and b=[1 1 −1]. Other equivalentsequences (there may be 128 of them) may also be generated by applyingoperations like conjugations and flipping. Based on equations (1a) and(1b), and assuming w₁ and w₂ are 1,e=[1 1i 1 0 1 1 −1] and f=[−1 1 1 0 −1 1i −1].  Equation 31

Similarly, the following method may also yield Golay sequences of lengthof 7. Let a and b be Golay pairs of length S=3. Then,x _(e)(z)=w ₁ x _(a)(

)+w ₂ x _(b)(

)z ^(S+1) and  Equation 32x _(f)(z)=w ₁ x _(a)(

)−w ₂ x _(b)(

)z ^(S+1)  Equation 33

may also be Golay pairs and may also be expressed equivalently as:e=[w ₁ a 0 w ₂ b] and  Equation 34f=[w ₁ a 0 −w ₂ b].  Equation 35

For example, a QPSK-based Golay pair a and b for the length of S=3 maybe a=[1 1i 1] and b=[1 1 −1]. Other equivalent sequences (there may be128 of them) may also be generated by applying operations likeconjugations and flipping. Based on equations (2a) and (2b), e=[1 1i 1 01 1 −1] and f=[1 1i 1 0 −1 −1 1].

In order to utilize e and f for single-band and multi-band operations,the following rules and cases may be considered.

In case 1, the number of active channels may be 1. When only one of thechannels may be active, either e or f may be mapped to the correspondingchannel. Since e and f are the Golay sequences, they may lead to signalswhere their PAPR are less than 3 dB.

In case 2, the number of active channels may be 2. The sequences e and fmay be the Golay pairs. Based on Property 1 given above, e and f may beused in the expression in Property 1 again and a large Golay sequencemay be generated. For example, the sequence [e 0 f] may be also anotherGolay sequence since m in Property 1 may be chosen freely. This alsomeans that the sequences e and f may be mapped to different channels,regardless of the separation between the channels, without affecting thePAPR.

For example, the vector e and the vector f may be mapped to the 1^(st)and the 3^(rd) channels, respectively, shown in FIG. 4B. In anotherexample, the vector f and the vector e may be mapped to the 1^(st) andthe 4^(th) channels, respectively, shown in FIG. 4B. It may be worthnoting that, e and f may also be manipulated based on Property 1 beforemapping to the subcarriers. For example, one channel may utilize thesequence e while the other channel may utilize the sequence −f.

In case 3, the number of active channels may be 3. Based on Property 1,a Golay sequence which covers 3 channels may be generated as follows:x _(t)(z)=w ₁ x _(a)(z)x _([a 0) _(1×29) _(])(z)+w ₂ x _(b)(z ³²)x_([b 0) _(1×29) _(])(

)z ⁴  Equation 36

This expression means that:t=a⊗[a 0_(1×29)]+circshift(b⊗[b 0_(1×29)],4),   Equation 37where ⊗ may be Kronecker product and circshift(⋅, k) may be a circularshift operation to the right by k elements.

For example, if a=[1 1i 1] and b=[1 1 −1], the vector t may be obtainedast=[a 0 b 0_(1×25) ia 0 b 0_(1×25) a 0 −b].  Equation 38

In other words, if the channels are contiguous, the 1^(st), the 2^(nd),and the 3^(rd) channels may use e=[a 0 b], h=[ia 0 b], and f=[a 0 −b],respectively.

Unfortunately, Property 1 may not yield Golay sequences with QPSKalphabet when the channels are not contiguous. Nevertheless, one maystill use e or f to decrease the transmitter complexity for thediscontinuous case. For example, 1×e, 1×f, and 1i×f may be used for1^(st), 2^(nd), and 4^(th) channels, respectively. The order of thesequences may change and the corresponding coefficients may be theelements of QPSK constellation. In another example, e and f may be usedand another sequence for the third channel may be obtained by a computersearch. For example, e and f may be used for the 1^(st) and the 4^(th)channel and the third channel may be comp=[1 1 1 0 −1 −1i 1i], which mayminimize the PAPR for the resulting signal.

In case 4, the number of active channels may be 4. This case may beaddressed by utilizing Property 1 two times over e and f. For example,the first operation may generate:t ₁=[e 0_(1×25) f] and t ₂=[e 0_(1×25) −f],  Equation 39

where t₁ and t₂ are Golay pairs. By utilizing Property 1 a second time,it may be seen that:t ₃=[t ₁ 0_(1×25) t ₂] and t ₄=[t ₁ 0_(1×25) −t ₂],  Equation 40

where t₃ and t₄ are also Golay pairs. Explicitly, t₃ and t₄ may beexpressed as:t ₃=[e 0_(1×25) f 0_(1×25) e 0_(1×25) −f],and  Equation 41t ₄=[e 0_(1×25) f 0_(1×25) −e 0_(1×25) f].  Equation 42

Thus, for example, if the 1^(st), 2^(nd), 3^(rd), and 4^(th) channelsutilize e, f, e, and −f (i.e., t₃), respectively, the PAPR may be lessthan 3 dB even though four channels are active at the same time. Inanother example, if the 1^(st), 2^(nd), 3^(rd), and 4^(th) channelsutilize e, f, −e, and f (i.e., t₄), respectively, the PAPR of thecorresponding signal in time may be less than 3 dB.

Based on the rules and cases above, a table may be generated that showshow e, f, h, and comp sequences are utilized in the channel for a givenbit. For example, assuminge=[a 0 b]=[1 1i 1 0 1 1 −1],  Equation 43f=[a 0 −b]=[1 1i 1 0 −1 −1 1],  Equation 44h=[ia 0 b]=[1i −1 1i 0 1 1 −1], and  Equation 45comp=[1 1 1 0 −1 −1i 1i],  Equation 46

the corresponding Table 1 for all cases may be given.

TABLE 1 Golay-based construction for up-to 4 channels Coded bits acrossthe # of channels Sequence Sequence Sequence Sequence active (e.g., forfor chan- for chan- for chan- for chan- channels each 2 μs) nel 1,s_(ch) ₂ nel 2, s_(ch) ₂ nel 3, s_(ch) ₃ nel 4, s_(ch) ₄ 0 0000 0 0 0 01 1000 e 0 0 0 0100 0 e 0 0 0010 0 0 e 0 0001 0 0 0 e 2 1100 e f 0 00110 0 e f 0 0011 0 0 e f 1001 e 0 0 f 1010 e 0 f 0 0101 0 e 0 f 3 01110 e h f 1110 e h f 0 1011 f 0 comp e 1101 e comp 0 f 4 1111 e f e −f 

For up to 2 channels (e.g., as shown in FIG. 4A), the mapping table maybe given in Table 2.

TABLE 2 Golay-based construction for up-to 2 channels Coded bits acrossthe # of channels Sequence Sequence active (e.g., for for channel forchannel channels each 2 μs) 1, s_(ch) ₁ 2, s_(ch) ₂ 0 00 0 0 1 01 e or f0 10 0 f or e 2 11 e f

It will be appreciated that Table 1 and Table 2 are merely examples. Thelocation of e, f, h, and comp, and their contents for different channelsmay be different. If e, f, h are the Golay sequences, the PAPR may bereduced to less than 3 dB except in the cases where bits are 1011 or1101.

FIG. 9 shows a corresponding transmitter block diagram, which may useTable 1. In FIG. 9 , k_(ch) ₁ , k_(ch) ₂ , k_(ch) ₃ and k_(ch) ₄ may bethe non-zero sequences (e.g., e, f, h, and comp) given in Table 1 forthe 1^(st), 2^(nd), 3^(rd), and 4^(th) channel, respectively, based on acoded bit transmitted on some duration (e.g., 2 μs).

FIG. 10A shows a generated signal when four channels are utilized. Each20 MHz channel may have one HDR WUS. FIG. 10A. FIG. 10B shows PAPRdistribution when four channels are utilized. Each 20 MHz channel mayhave one HDR WUS. FIGS. 10A-10B show the performance improvement (Golay)over Approach 1 and Approach 2. FIGS. 10A-10B are directed to reducingPAPR with Golay-based multi-band OOK and show performance improvementswhen compared to FIGS. 6A and 6B. Specifically, FIG. 10A shows agenerated signal when four channels are utilized (each 20 MHz channelhas one HDR WUS). FIG. 10B shows a PAPR distribution when four channelsare utilized (each 20 MHz channel has one HDR WUS). The Golay basedconstruction may lead to 6 dB and 3 dB improvements as compared toconventional approaches, Approach 1 and Approach 2, respectively.

FIG. 11 shows preamble formats for various IEEE 802.11 standards. Thevarious preamble fields, as shown, include legacy short training field(L-STF), legacy long training field (L-LTF), legacy signal (L-SIG)field, repetition legacy signal (RL-SIG) field, high throughput (HT) SIGfields 1 and 2, very high throughput (VHT) SIG fields A1 and A2, andhigh efficiency (HE) SIG field.

The preambles for each IEEE 802.11 standard are different and designedto achieve several purposes such as backward compatibility (i.e., thereceiver can recognize the different 802.11 formats) or earlytermination of the packet in case of unrecognized Physical LayerConvergence Procedure (PLCP) Protocol Data Unit (PPDU) which may lead toAP-power saving.

For an IEEE 802.11a receiver, the PPDU validity may be checked at theMAC level. Hence, there may be no mechanism to check the validity ofnon-IEEE 802.11a PPDUs (such as those in IEEE 802.11n, IEEE 802.11ac,IEEE 802.11ax, or IEEE 802.11ba). In addition, the IEEE 802.11a receiverprocedure may not offer a method for early termination to save AP powerin physical layer.

An IEEE 802.11n receiver may be compatible with both IEEE 802.11a andIEEE 802.11n PPDUs. The IEEE 802.11n receiver may identify IEEE 802.11nand IEEE 802.11a PPDUs by detecting π/2 rotation of the binaryphase-shift keying (BPSK) constellation at HT-SIG-1 field. BPSK, whichmay also be called phase reversal keying (PRK) may be the simplest formof PSK. It may use two phases that are separated by 180° and so can alsobe termed 2-PSK.

If the rotation is detected, the receiver may consider the PPDU as anIEEE 802.11n PPDU. If the cyclic redundancy check (CRC) fails atHT-SIG-2 after the rotation, the receiver may check if there is anyenergy drop at the signal level. If there is an energy drop, thereceiver may set the CCA state as IDLE. The IEEE 802.11n receiver mayrecognize an IEEE 802.11ax PPDU and an IEEE 802.11ac PPDU as an IEEE802.11a PPDU, and the validity of these PPDU may fail at MAC layer.Hence, there may be no explicit power saving (i.e., early termination)at the PHY layer.

An IEEE 802.11ac receiver may follow a similar rationale to IEEE802.11n. The IEEE 802.11ac receiver may first detect if the is any π/2rotation between 20-24 μs. If there is a rotation, the IEEE 802.11acreceiver may recognize the received signal is neither an IEEE 802.11anor an IEEE 802.11ac PPDU and may apply the procedures described forIEEE 802.11n. If there is no rotation, the IEEE 802.11ac receiver maycheck the cyclic redundancy code at VHT-SIG2. If the cyclic redundancycode is not valid, it may apply the received procedure for IEEE 802.11a.If the cyclic redundancy code is valid, the packet may be recognized asan IEEE 802.11ac PPDU. The length subfield of L-SIG may be set tointeger multiple of 3 for an IEEE 802.11ac PPDU.

An IEEE 802.11ax receiver may apply hierarchical detection. The IEEE802.11ax receiver may first check if there may be any repetition between16-20 μs and 20-24 μs (the IEEE 802.11ax PPDU may have a field calledRL-SIG after L-SIG and it may be the repetition of L-SIG field). Ifthere is no repetition, the receiver may recognize that the receivedsignal is not an IEEE 802.11ax PPDU and may apply the preamble detectionfor IEEE 802.11ac, IEEE 802.11n, and IEEE 802.11a by exploiting therotations and the CRC of IEEE 802.11ac and IEEE 802.11n SIG fields. Ifthere is repetition, the IEEE 802.11ac receiver may check the validityof HE-SIG-A. If the cyclic redundancy code is not valid, the IEEE802.11ax receiver may wait for the duration that may be indicated atL-SIG. The length subfield of L-SIG may be set to a non-integer multipleof 3 for an IEEE 802.11ax PPDU.

In IEEE 802.11ba, there may be a potential energy drop for an IEEE802.11ba PPDU (e.g., due to the narrow-band signal and regulations). ABPSK-mark signal may be added after an L-SIG field in an IEEE 802.11baPPDU. The BPSK-mark field may avoid existing IEEE 802.11 receivers inthe same environment to fall back to IEEE 802.11n mode, which may checkthe signal power level if the CRC fails. Hence, the BPSK-mark sequencemay be a random BPSK sequence for a spoofing purpose. On the other hand,the structure of the BPSK-mark may be important for devices using futurestandards to indicate signature information related to WUS (or any othersignature information related to any type of AP) and random BPSK may notbe the best solution. Considering there are different types of signatureinformation for future devices, methods for enhanced mark-indication mayalso be desired.

The IEEE 802.11ba protocol is intended to reduce the power consumptionat the receivers. However, an IEEE 802.11ba PPDU may be recognized as anIEEE 802.11a PPDU at IEEE 802.11 receivers. Hence, an IEEE 802.11ba PPDUmay cause power consumption at the other radios in the same environment.Thus, methods which allow for early termination may also be desired.

A mark-indication field (MIF) and a repeated L-SIG for PPDUidentification may be used. FIG. 12 shows an MIF appended after an L-SIGfield. The modulation for the MIF may be based on BPSK or QPSK. The MIFmay carry an encoded information or a signature sequence.

When the MIF carries a signature sequence, the signature sequence may begenerated through a sequence modulation. The signature sequence for MIFmay be based on a Golay sequence. For example, for 20 MHz, the number oftones around direct current (DC) tone may be 26 on the left and 26 onright. The signature sequence may be a modulated sequence as:R _(−26,26)=[m ₁ ×S _(−26,−1);0;m ₂ ×S _(1,26)],  Equation 47where m₁ and m₂ may be modulation symbols, and S_(−26,−1) and S_(1,26)may be a complementary pair. For example, S_(−26,−1) and S_(1,26) may bethe following BPSK sequences:S_(−26,−1)=[1;1;1;1;−1;1;1;−1;−1;1;−1;1;−1;1;−1;−1;1;−1;1;1;1;−1;−1;1;1;1]  Equation 48S_(1,26)=[1;1;1;1;−1;1;1;−1;−1;1;−1;1;1;1;1;1;−1;1;−1;−1;−1;1;1;−1;−1;−1]  Equation 49

In another example, the signature sequence may be a modulated sequencesuch as one of the following:R _(−26,26)=[m ₁ ×S _(−26,−24) ;m ₂ ×S _(−13,−1);0;m ₃ ×S _(1,13) ;−m ₄×S _(14,26)], or   Equation 50R _(−26,26)=[m ₁ ×S _(−26,−24) ;m ₂ ×S _(−13,−1);0;−m ₃ ×S _(1,13) ;m ₄×S _(14,26)],   Equation 51where m₁, m₂, m₃, and m₄ may be modulation symbols, and S_(−26,−1) andS_(1,26) may be the following QPSK sequences;

$\begin{matrix}{{S_{{- 26},{- 24}} = {S_{1,13} = {\frac{\sqrt{2}}{2}\left\lbrack {1;1;1;{1i};{- 1};1;1;{{- 1}i};1;{- 1};1;{{- 1}i};i} \right\rbrack}}},} & {{Equation}\mspace{14mu} 52} \\{S_{{- 13},{- 1}} = {S_{14,26} = {{\frac{\sqrt{2}}{2}\left\lbrack {1;{1i};{- 1};{- 1};{- 1};{1i};{- 1};1;1;{{- 1}i};{- 1};1;{{- 1}i}} \right\rbrack}.}}} & {{Equation}\mspace{14mu} 53}\end{matrix}$

The modulation symbols may indicate the signature information related tothe AP or ID. It may indicate the purpose of the transmission such aswake-up purpose. The main benefit of theses sequences may be that thePAPR may be less than 3 dB for any QPSK modulation symbol. Orderlyflipped and conjugated versions of these sequences may be used.

When the MIF carries encoded information, the MIF may include severalfield that indicate the signature of the AP. For example, the subfieldsfor MIF may be a signature field, CRC, and tail bits for encodingoperation as illustrated in FIG. 13 .

The BPSK-Mark may be encoded with the rate of 1/2 and interleaved beforeconstellation mapping similar to L-SIG. The number of bits in signature,CRC and tail bit subfields may be different from those in FIG. 13 . Inaddition, the relative locations of those bit subfields may also bedifferent from the one shown in FIG. 13 .

The MIF may be provided with enough separation from IEEE 802.11asignals. Because the MIF symbol may be modulated using BPSK, a validsequence pattern or correct CRC check of a MIF CRC may trigger a IEEE802.11ba device which monitors on the Primary Connectivity Radio (PCR)to declare the PPDU as a IEEE 802.11ba frame. However, there may be noguarantee that a valid IEEE 802.11a frame would not trigger suchbehavior. If the frame may be an IEEE 802.11a frame and triggers theabove behavior, the receiving IEEE 802.11ba STA would have missed theIEEE 802.11a PPDU, either intended for the STA or not intended for theSTA but the STA would miss setting NAV correctly.

The IEEE 802.11a specification mandates the last 9 bits of a SERVICEfield to be set to 0. Over the air, these bits would be scrambled by ascrambling sequence initiated by the bit 0-6 of the SERVICE field.

To avoid STA missed-categorizing an IEEE 802.11a PPDU as an IEEE802.11ba PPDU, one or more of the bits corresponding to the positionwithin the last 9 bits of SERVICE field, could be reserved. Thesereserved bits may be set to different values than the values that wouldnormally be set in an IEEE 802.11a frame using 0 at the position afterscrambling. For example, if the bit of the MIF 0˜6 may be set to1111111, then for a valid IEEE 802.11a frame, the subsequent 9 bits maybe 000011101. If the MIF field has any of these bits set to a differentvalue, the IEEE 802.11ba receiver may conclude it may be not a validIEEE 802.11a frame and interpret these bits as corresponding to a IEEE802.11ba MIF field.

This approach may be combined with the setting of L_LENGTH mod 3=1 or 2,such that the IEEE 802.11ba receiver would not confuse MIF as the firstOFDM symbol of IEEE 802.11ac SIG.

This approach may eliminate the usage of RL-SIG (Repeated L-SIG, used inIEEE 802.11ax), such that in one OFDM symbol, the IEEE 802.11ba receivermay determine it is not an IEEE 802.11ax or IEEE 802.11a frame whileproviding signaling in the same symbol.

In an example, L-SIG, which may have a LENGTH subfield set to anon-integer multiple of 3 value (e.g., 3m+1 or 3m+2, where m may be aninteger), may be repeated after L-SIG as RL-SIG. The MIF, which consistsof encoded or sequence-based signature information, may be appendedafter an RL-SIG. FIG. 14A shows L-SIG repeated after L-SIG as RL-SIGusing BPSK. FIG. 14B shows L-SIG repeated after L-SIG as RL-SIG usingrotated BPSK.

If the LENGTH subfield of L-SIG is a non-integer multiple of 3 PPDU, anIEEE 802.11ax receiver may recognize the IEEE 802.11ba PPDU as an IEEE802.11ax packet. Since the CRC may not be valid for a IEEE 802.11baPPDU, the IEEE 802.11ax receiver may classify the received signal as anunsupported PPDU and stop decoding (i.e., power saving). In addition,devices with future generation of the standards may recognize the MIFfield after the repetition (i.e., after the RL-SIG) and decode MIF fieldto learn the signature or other information related to PPDU such aspurpose.

The encoded signature information may consist of CRC and tails bits asillustrated in FIG. 13 . The sequence-based signature information maycarry modulation symbols such as those described above (e.g., m₁, m₂,m₃, and/or m₄).

To avoid two-level hypothesis test that rely on CRC at future receivers,the BPSK constellation for MIF may be rotated by 90 degrees as shown inFIG. 14B to differentiate itself from an IEEE 802.11ax PPDU. After therepetition check, the receiver may check if the constellation may berotated or not between 24-28 μs. If it is rotated, the receiver mayrecognize the field as an MIF field. If it is not rotated, the receivermay recognize the field as an HE-SIG-A (i.e., corresponding to IEEE802.11ax).

Multiple repeated L-SIG (RL-SIG) fields may also be used. According toan embodiment, L-SIG may be repeated multiple times (i.e., two or moretimes) in the form of multiple RL-SIG fields. The subfield LENGTH may beset to a non-integer multiple of 3 to spoof IEEE 802.11ax receivers asshown in FIG. 15 . The receivers may check if there is anotherrepetition between 16-20 μs and 20-24 μs besides the repetition between20-24 μs and 24-28 μs.

Signaling with rotated BPSK over multiple L-SIGs may also be used. Forexample, the number of repetitions may signal the signature of the PPDU(e.g., IEEE 802.11ax or IEEE 802.11ba) and the last RL-SIG field may byphase rotated by 90 degrees to differentiate different signatures asshown in FIG. 16 . In another example, the combination of BPSK androtated BPSK may signal the device signature as illustrated in FIG. 17 .The placement of the rotated BPSK among RL-SIGs (e.g., first, second,last) may indicate the device signature.

Signaling with mismatched or partially repeat L-SIGs may also be used.The reserved bit in the L-SIG field in the legacy preamble may be usedto indicate that the packet carrying the legacy preamble is a newgeneration of preambles and may be ignored by older generation devices.A possible exception may be that the older generation devices may needto respect or adhere to the length indication included in the legacypreamble.

In an example, a currently reserved bit (e.g., bit 4) may be set to 1 toindicate that the packet carrying the legacy preamble includes a newgeneration of preambles, such as WUR frames, EHT frames, or futuregeneration frames. A legacy device, for example, IEEE 802.11a, IEEE802.11b, IEEE 802.11ac, IEEE 802.11ax, other IEEE 802.11 devices, or newradio (NR)-U devices, after receiving an L-SIG, may be configured todetect that the reserved bit is set to 1 and that the parity is correctfor the L-SIG. The legacy device may ignore the packet but may respectthe length indication included in the L-SIG.

In an example, a partially repeated L-SIG (PR-SIG) symbol may be addedafter the regular L-SIG to indicate that the current preamble may bepart of a packet that carries a future generation frame. The indicationmay include an indication that the packet carrying the legacy preambleincludes a new generation of preambles, such as WUR frames, EHT frames,or future defined frames. For example, a repeated L-SIG symbol may beprovided after a regular L-SIG symbol. However, one or more sub-fieldsin the PR-SIG may be deliberately set to a different value than one ormore sub-fields in the L-SIG to provide further indication. A legacydevice, after receiving an L-SIG, may be configured to detect theseindications and that the parity is correct for the L-SIG and/or PR-SIG.The legacy device may ignore the packet but may respect the lengthindication included in the L-SIG.

In an example, the reserved bit (e.g., bit 4) in the PR-SIG may be setto 1, which may be similar to the setting in the L-SIG. In anotherexample, the reserved bit (e.g., bit 4) may be set to 1, which may bedifferent than bit 4 in L-SIG, which may be set to be 0.

In another example, the parity setting may be different in the PR-SIGthan that in the L-SIG. The L-SIG may be set to even parity while thePR-SIG may be set to odd parity.

In yet another example, the rate subfield in the PR-SIG may be setdifferently than in the rate subfield in the L-SIG. For example, bit 3(i.e., R4) of the rate subfield in the PR-SIG may be set to 0. The otherthree bits in the rate subfield in the PR-SIG may set to be identical tothe first three bits in the rate subfield in the L-SIG field. In anotherimplementation, the value of the rate subfield in the PR-SIG may be setat a certain offset from that in the L-SIG field. The offset value inthe rate subfield of the PR-SIG may imply information, such as basicservice set (BSS) color, transmission opportunity (TXOP) power, and STAIDs such as association identifiers (AIDs). In another implementation,the bits in the rate subfield in the PR-SIG may be set to thecomplimentary value of those bits in the rate field in the L-SIG forindicating such information.

In yet another example, the length subfield in the PR-SIG may be setdifferently than the length subfield in the L-SIG. For example, thevalue of the length subfield in the PR-SIG may be set at a certainoffset from that in the L-SIG field. The offset value in the lengthsubfield of the PR-SIG may imply information, such as BSS Color, TXOPpower, and STA IDs such as AIDs. For example, if the length subfield isset to a value N in the PR-SIG and the length subfield is set to value Min the L-SIG, the value N-M representing the offset may be considered asBSS color or STA IDs such as AIDs. In another implementation, the bitsin the length subfield in the PR-SIG may be set to the complimentaryvalue of those bits in the length subfield in the L-SIG for indicatingsuch information.

In yet another example, the tail bits in PR-SIG may be set to all 1'sinstead of all 0's. Parts of the features and/or indications describedabove may be combined in any way.

A legacy device, after receiving an L-SIG, may be configured to detectone or more of these indications and verify that the parity may becorrect for the L-SIG and/or the PR-SIG. The legacy device may thenignore the packet, but may respect (i.e., adhere to) the lengthindication included in the L-SIG.

A unified preamble format may be implemented. In particular, a unifiedpreamble design may be disclosed and an IEEE 802.11ax receiver, an IEEE802.11ba receiver, and future receiver devices may use the format todistinguish the signal types.

FIG. 18 shows an RL-SIG field introduced in IEEE 802.11ax. By detectingboth L-SIG and RL-SIG, an IEEE 802.11ax receiver may performmaximum-ratio combining (MRC). Then, the receiver may check the rate andthe parity subfield carried by L-SIG. If the parity check fails or therate is not at least 6 Mbps, the receiver may determine that the signalis a legacy signal (i.e., non-HT, HT, VHT signal). Otherwise, if theparity check passes or the rate is at least 6 Mbps, the receiver maycheck the length subfield. If mod(Length,3) is 0, the device may treatit as legacy signal. Otherwise, the receiver may determine the signal asan IEEE 802.11ax signal.

In addition, an interleaved repetition L-SIG (I-RL-SIG) for IEEE802.11ba or newer devices, represented as IEEE 802.11ax+ in FIG. 18 ,may be implemented. An additional symbol level interleaver may beapplied on the repetition BPSK modulated L-SIG symbols, and then theinterleaved symbols may be mapped to an OFDM symbol. The RL-SIG fieldutilized in IEEE 802.11ax may be treated as a special case (i.e., anidentity interleaver may be used). A receiver device may use the RL-SIGfield to perform auto-detection such that it may distinguish differenttypes of IEEE 802.11 signals.

FIG. 19 shows a STA receive procedure used by a receiver to distinguishand identify different IEEE 802.11 signals. A STA may detect an I-RL-SIGfield right after an L-SIG field. The STA may use a predefined orpredetermined interleaver pattern to detect whether the first and thesecond symbol after the L-LTF field are the same. The STA may use all ofthe interleaver patterns to de-interleave the second symbol, and thencheck whether the first and the second symbol are the same for eachinterleaver pattern. The STA may record which interleaver pattern usedresulted in the symbols being the same. Here, the L-SIG field may beconsidered as the first symbol after the L-LTF field, and the I-RL-SIGfield may be considered as the second symbol after the L-LTF field.

If the first and the second symbol after the L-LTF field are not thesame, the STA may determine that the repetition check failed and maycheck the legacy mode (e.g., non-HT, HT, and VHT modes).

If the first and the second symbol after the L-LTF field are the same,the STA may combine the L-SIG and the deinterleaved I-RL-SIG field. TheSTA may check the parity subfield and the rate subfield. If the paritycheck fails or the rate is not at least 6 Mbps, the STA may continuedetect the SIG for non-HT, HT and VHT modes. Otherwise, if the paritycheck passes or the rate is at least 6 Mbps, the STA may check theinterleaver pattern.

The STA may check the interleaver pattern, which may result indetermining whether the de-interleaved second symbol is equal to thefirst symbol.

If interleaver pattern 1 (e.g., an identity interleaver) is used, theSTA may check the value of mod(Length, 3). If the value is 0, the STAmay continue to detect the SIG for non-HT, HT and VHT modes. Otherwise,the STA may continue to detect the HE SIG field and treat the signal asan IEEE 802.11ax signal.

If interleaver pattern 2 is used, the STA may consider the signal as anIEEE 802.11ba signal and may continue deferring based on the Lengthsubfield if the STA is in the WUR mode. STAs in WUR mode may not be ableto detect the L-SIG and I-RL-SIG fields. The STA may check the value ofmod(Length, 3) for more information. For example, one value ofmod(Length, 3) may be used to indicate the following IEEE 802.11basignal is a beacon signal. Another value of mod(Length, 3) may be usedto indicate the following IEEE 802.11ba signal is a broadcast ormulticast signal and multiple WUR STAs may be woken up. Another value ofmod(Length, 3) may be used to indicate the following IEEE 802.11basignal is a unicast WUR signal which may wake up one STA.

In another example, the values of mod(Length, 3) may be used to indicatethe bandwidth of the WUR signal. For example, one value of mod(Length,3) may be used to indicate that the WUR signal will be transmitted overone channel. Another value of mod(Length, 3) may be used to indicatethat the WUR signal will be transmitted over two channels. Another valueof mod(Length, 3) may be used to indicate that the WUR signal will betransmitted over more than two channels.

If interleaver pattern 3 is used, the STA may determine the signal as anEHT signal or a future IEEE 802.11 signal. The STA may continuedetecting the corresponding SIG fields followed. For example, the STAmay check the value of mod(Length, 3) for more information, similar tothe information noted above.

It will be appreciated that while three interleaver patterns arementioned above, that the number of interleaver patterns may be notlimited there to and may be greater than or less than three.

In above mentioned interleaver methods, the additional interleaverpattern applied to the second symbol after L-LTF field may be used toidentify the IEEE 802.11 signal type. In another method, two moremodulated BPSK symbols may be inserted on each side of the OFDM symbol.It may be noted that in current design, 48 modulated symbols are usedfor L-SIG and RL-SIG transmissions. With the proposed method, 52modulated symbols may be transmitted over RL-SIG field. The L-SIG fieldmay be 48 symbols or 52 symbols. The additional 4 symbols may be used toidentify the type of IEEE 802.11 signal. In order to decode the 52symbols more accurately, 4 additional L-LTF symbols may be inserted as areference signal for channel estimation. The receive procedure may bemodified as well. Interleaver pattern 1, 2, 3 may be replaced by thecombination of the 4 additional BPSK modulated symbols.

FIG. 20 shows a flow diagram of receiving a WUS. In step 2002, a STA mayreceive a preamble of a message transmitted from an access point (AP).The preamble may include one or more legacy fields compatible with oneor more wireless protocols. In step 2004, the STA may determine themessage is being transmitted using a first wireless protocol of the oneor more wireless protocols based on one or more of an explicitindication in a modulated MIF and a pattern of modulated signal fieldsafter the one or more legacy fields. In step 2006, the STA may determineif it is compatible with the first wireless protocol. If no, in step2008, the STA may terminate the message. If yes, in step 2010, the STAmay receive a WUS following the preamble.

FIG. 21 shows a flow diagram of transmitting a WUS. In step 2102, an APmay determine encoded bits for a given time for a plurality of wake upsignals (WUSs) to be transmitted with different data rates on differentchannels. In step 2104, the AP may select a subset of sequences from aset of complementary sequences to apply across the channels based on theencoded bits. In step 2106, the AP may map the selected subset ofsequences to corresponding channels in frequency. In step 2108, the APmay apply a single inverse discrete Fourier transform (IDFT) to themapped sequences. In step 2110, the AP may append a cyclic prefix to thetransformed sequences to generate the plurality of WUSs. In step 2112,the AP may transmit the plurality of WUSs on the different channels,such that symbol boundaries of the plurality of the plurality of WUSsare aligned in time.

Although features and elements are described above in particularcombinations, one of ordinary skill in the art will appreciate that eachfeature or element can be used alone or in any combination with theother features and elements. In addition, the methods described hereinmay be implemented in a computer program, software, or firmwareincorporated in a computer-readable medium for execution by a computeror processor. Examples of computer-readable media include electronicsignals (transmitted over wired or wireless connections) andcomputer-readable storage media. Examples of computer-readable storagemedia include, but are not limited to, a read only memory (ROM), arandom access memory (RAM), a register, cache memory, semiconductormemory devices, magnetic media such as internal hard disks and removabledisks, magneto-optical media, and optical media such as CD-ROM disks,and digital versatile disks (DVDs). A processor in association withsoftware may be used to implement a radio frequency transceiver for usein a WTRU, UE, terminal, base station, RNC, or any host computer.

What is claimed is:
 1. A method for use in an access point (AP), the method comprising: generating a first frame comprising a first part and a second part, wherein: the first part includes a physical layer (PHY) preamble comprising: a legacy signal (L-SIG) field using a first binary phase shift keying (BPSK) constellation; and a first BPSK mark field using a second BPSK constellation phase rotated relative to the first BPSK constellation; and the second part includes at least one wake-up radio (WUR) field, wherein the at least one WUR field includes a WUR on-off keying (OOK) synchronization (sync) field; and transmitting, to at least one station (STA), the first frame.
 2. The method of claim 1, wherein the PHY preamble further comprises a legacy short training field (L-STF) and a legacy long training field (L-LTF).
 3. The method of claim 1, wherein the second BPSK constellation of the first BPSK mark field is phase rotated by at least 90 degrees relative to the first BPSK constellation of the L-SIG field.
 4. An access point (AP) comprising: an antenna; and a processor operatively coupled to the antenna; wherein the processor and the antenna are configured to: generate a first frame comprising a first part and a second part, wherein: the first part includes a physical layer (PHY) preamble comprising: a legacy signal (L-SIG) field using a first binary phase shift keying (BPSK) constellation; and a first BPSK mark field using a second BPSK constellation phase rotated relative to the first BPSK constellation; and the second part includes at least one wake-up radio (WUR) field, wherein the at least one WUR field includes a WUR on-off keying (OOK) synchronization (sync) field; and transmitting, to at least one station (STA), the first frame.
 5. The method of claim 1, wherein the L-SIG field includes an indication of a length associated with the first frame.
 6. The method of claim 1, wherein the at least one STA includes a WUR STA and a non-WUR STA.
 7. The method of claim 1, wherein the first BPSK mark field is encoded with a rate of 1/2.
 8. The method of claim 1, wherein the PHY preamble further comprises a second BPSK mark field having a BPSK constellation phase rotated relative to the first BPSK constellation of the L-SIG field.
 9. The AP of claim 4, wherein the PHY preamble further comprises a legacy short training field (L-STF) and a legacy long training field (L-LTF).
 10. The AP of claim 4, wherein the second BPSK constellation of the first BPSK mark field is phase rotated by at least 90 degrees relative to the first BPSK constellation of the L-SIG field.
 11. The AP of claim 4, wherein the L-SIG field includes an indication of a length associated with the first frame.
 12. The AP of claim 4, wherein the at least one STA includes a WUR STA and a non-WUR STA.
 13. The AP of claim 4, wherein the PHY preamble further comprises a second BPSK mark field having a BPSK constellation phase rotated relative to the first BPSK constellation of the L-SIG field.
 14. A method for use in a non-wake-up radio (non-WUR) station (STA), the method comprising: receiving, from an access point (AP), a first part of a first frame including a physical layer (PHY) preamble, wherein the PHY preamble comprises: a legacy signal (L-SIG) field using a first binary phase shift keying (BPSK) constellation; and a first BPSK mark field using a second BPSK constellation phase rotated relative to the first BPSK constellation, wherein a second part of the first frame is not received by the non-WUR STA in response to the BPSK constellation of the first BPSK mark field being phase rotated; and receiving, from the AP after a duration, a second frame.
 15. The method of claim 14, wherein the second BPSK constellation of the first BPSK mark field is phase rotated by at least 90 degrees relative to the first BPSK constellation of the L-SIG field.
 16. The method of claim 14, wherein the PHY preamble further comprises a legacy short training field (L-STF) and a legacy long training field (L-LTF).
 17. The method of claim 14, wherein the L-SIG field includes an indication of a length associated with the first frame.
 18. The method of claim 14, wherein the first BPSK mark field is encoded with a rate of 1/2. 