Device power management transitions in wireless networks

ABSTRACT

Techniques for improving the power management of devices are described. In an example, a device transitions into a power save mode. While in the power save mode, the device performs a number of operations. The operations include transitioning into an awake state and determining that the device has no data to transmit to a network access device. The operations also include determining a sequence number associated with data transmission to the network access device. The operations further include generating a frame that includes a header field and a payload field. The header field includes the sequence number and power management data. The power management data indicates a transition of the device to the awake state. Additionally, the operations include transmitting the frame to the network access device.

BACKGROUND

In a wireless environment, such as in an IEEE 802.11 wireless network,an access point communicates wirelessly with computing devices. At thedata link layer (e.g., the L2 layer), the access point can receive, froma source, frames that include an address of a computing device and cantransmit such frames to the computing device. Conversely, the accesspoint can receive, from the computing device, frames that include anaddress of a destination and can transmit such frames to thedestination.

A computing device can transition in and out of a power save mode. Whenin the power save mode, the computing device may not transmit and/orreceive data, thereby saving power.

BRIEF DESCRIPTION OF THE DRAWINGS

Various embodiments in accordance with the present disclosure will bedescribed with reference to the drawings, in which:

FIG. 1 illustrates an example computing environment for managing datatransmissions of a device based on power management data according to anembodiment of the present disclosure;

FIG. 2 illustrates example stages for managing data transmissions of adevice according to an embodiment of the present disclosure;

FIG. 3 illustrates an example of a sequence diagram for transitioningbetween an awake state and a sleep state;

FIG. 4 illustrates an example of a sequence diagram, where a deviceerroneously remains in an awake state;

FIG. 5 illustrates an example of a sequence diagram that uses a triggerframe such that a device properly transitions between an awake state anda sleep state according to an embodiment of the present disclosure;

FIG. 6 illustrates an example of a trigger frame according to anembodiment of the present disclosure;

FIG. 7 illustrates an example of a sequence diagram where a data frameloss may occur;

FIG. 8 illustrates an example of a sequence diagram that uses a delayinterval for transitioning into a sleep state according to an embodimentof the present disclosure;

FIG. 9 illustrates an example flow of a computing device for managingdata transmissions to the computing device based on power managementdata according to an embodiment of the present disclosure;

FIG. 10 illustrates another example flow of a computing device fordelaying a transition into a sleep state according to an embodiment ofthe present disclosure;

FIG. 11 illustrates another example flow of an access point for managingdata transmissions to a computing device based on power management data;and

FIG. 12 illustrates a diagram showing an example of computerarchitecture according to an embodiment of the present disclosure.

DETAILED DESCRIPTION

In the following description, various embodiments will be described. Forpurposes of explanation, specific configurations and details are setforth in order to provide a thorough understanding of the embodiments.However, it will also be apparent to one skilled in the art that theembodiments may be practiced without the specific details. Furthermore,well-known features may be omitted or simplified in order not to obscurethe embodiment being described.

In existing systems, a computing device connects to a network via anetwork access device according to a communication standard (e.g., to alocal access network (LAN) via a wireless access point according to theIEEE 802.11 standard). For example, the IEEE 802.11 standard definesmultiple wireless protocols including a protocol for saving power. Perthis protocol, an idle computing device (e.g., a computing device thatis not transmitting or receiving data) enters a power save mode for atime interval (e.g., one hundred milliseconds) to save power. In thismode, the computing device's receiver is powered off or is in standby toreduce the power consumption. Another IEEE 802.11 protocol defines asleep-awake cycle mode and is referred to as the IEEE 802.11 unscheduledautomatic power save delivery (U-APSD) protocol. The sleep-awake cyclemode is supplementary to the power save mode and reduces the networklatency, while still benefiting from the reduction to the powerconsumption provided by the power save mode. In particular, whencompliant with the IEEE 820.11 standard, the computing device iscompliant with the power save mode and is optionally compliant with theIEEE U-APSD protocol. When compliant with the IEEE U-APSD protocol, andwhile in the power save mode, the computing device can enter an awakestate according to a sleep-awake cycle (e.g., twenty milliseconds afterentering the power save mode) to check whether data is available fortransmission from the network access device. If so, the computing devicereceives the data. In the awake state, the receiver is powered on and isoperational to receive the data. Once the data is received or if no datais available, the computing device transitions back to a sleep state torestart the next sleep-awake cycle (e.g., the computing device remainsin the sleep state for the next twenty milliseconds). In the sleepstate, the receiver is powered off or is on standby, similarly to thecomputing device's state in the power save mode (the exception beingthat the computing device transitions again to the awake state in twentymilliseconds rather than at the end of the power save mode's timeinterval of one hundred milliseconds). Generally, the sleep-awake cycleis much shorter than the time interval of the power save mode (e.g.,twenty milliseconds for the sleep-awake cycle versus one-hundredmilliseconds for the time interval of the power save mode). In this way,and while remaining in the power save mode, the computing device candetermine whether data can be received from the network access device,where the data may have been stored in a buffer of the network accessdevice. If so, rather than waiting until the end of the power save mode,the computing device can receive the data by transitioning out of thesleep state and into the awake state, thereby reducing the latencyassociated with the data reception. Otherwise, the computing device canreturn to the sleep state, thereby continuing to reduce its powerconsumption.

As further described in connection with FIG. 4, in various situationsrelated to the processing of redundant frames, the computing device mayerroneously remain in the awake state when it should actually transitioninto the sleep state, thereby inefficiently consuming power. A reasonfor this inefficiency includes, for instance, the network access deviceignoring an indication from the computing device that the computingdevice has transitioned into the awake state, resulting in the networkaccess device assuming that the computing device is in the sleep stateand, hence, not informing the computing device that it can transitionback into the sleep state because no data is available for the computingdevice. In this case, the computing device erroneously remains in theawake state. As also described in connection with FIG. 7, in othersituations, the quality of the communication channel between thecomputing device and the network access device may result in data framelosses. In such situations, the network access device may transmit dataframes while the computing device is not operational to receive suchdata frames. Embodiments of the present disclosure improve the powerconsumption metrics (e.g., reduce the power consumption) and the errorframe rate (e.g., reduce the loss of data frames).

In particular, embodiments of the present disclosure involve thecomputing device using a trigger frame to indicate the transition intothe awake state, where the trigger frame includes a sequence numberunique to the trigger frame (e.g., not redundantly used for othertrigger frames). In an example, the trigger frame can include a payloadfield that stores the sequence number. For instance, the trigger framecan be a non-quality of service (QoS) null frame, such as a data frameor a management frame including any of an address resolution protocol(ARP) frame or a vendor-specific frame. Because the sequence number isunique to the trigger frame, the network address device does not ignorethe trigger frame and, instead, processes this trigger frame andtransmits, as applicable, an indication to the computing device that noadditional data is available for the computing device. In turn, thecomputing device can properly transition into the sleep state and neednot incorrectly remain in the awake state when no data is available.

Embodiments of the present disclosure also involve the computing deviceusing a delay interval prior to transitioning into the sleep state. Bydelaying this transition, the computing device can defer the transitioninto the sleep state for a sufficient time to determine whether aretransmission is received from the network access device, where theretransmission indicates that no additional data is available (e.g., areceived retransmission indicates that that the network access devicelikely did not determine that the device is transitioning into the sleepstate). If the retransmission is not received, the computing devicetransitions into the sleep state at the end of the delay interval. Ifthe retransmission is received, the computing device can transmit anacknowledgement of the retransmission to the network access device priorto actually performing this transition. Hence, the network access devicecan more likely determine the transition into the sleep state, despitechannel conditions that would have otherwise prevented thisdetermination.

To illustrate, consider the following use case. A wireless audio device(or some other internet of things (IoT) device) is connected to a homeLAN via a wireless access point by using a WiFi connection to thewireless access point according to the 802.11 standard. The wirelessaudio device also implements the 802.11 U-APSD protocol. Audio contentis streamed to the wireless audio device from a content source via thewireless access point. The streaming can occur in data blocks, where adata block includes multiple data frames and is downloaded to thewireless audio device via the wireless access point. To save power, thewireless audio device enters a power save mode between the download oftwo data blocks for a period of at least one-hundred milliseconds (orsome other configurable time interval). Further, the 802.11 U-APSD cycleof the wireless audio device is set to twenty milliseconds (or someother configurable cycle, generally shorter than the time interval ofthe power save mode). Accordingly, the wireless audio device transitionsinto the awake state in twenty milliseconds after entering into thepower save mode.

While in the power save mode and despite determining that no audio dataexists to transmit to the wireless access point, the wireless audiodevice generates a sequence number based on a counter that maintains acount of data frames associated with audio data transmission to thewireless access point. The sequence number is unique to next audio datatransmission, such that no two audio data transmissions have the samesequence number (unless redundancy of the transmissions is desired). Thewireless audio device also generates an ARP frame that includes thesequence number in its payload field and transmits the ARP frame (ratherthan transmitting a QoS null frame because no audio data exists) as thetrigger frame to the wireless access point. The trigger frame indicatesthe transition into the sleep state and is not ignored by the wirelessaccess point because of the sequence number. Accordingly, the wirelessaccess point indicates, as applicable, to the wireless audio device thatno audio data is available to download. In turn, the wireless audiodevice properly transitions into the sleep state.

In addition, rather than immediately transitioning into the sleep stateonce the indication of no audio data to download is received, thewireless audio device can delay this transition by five milliseconds (orsome other determined delay interval). If a retransmission of theindication is received, the wireless audio device transmits anacknowledgement of the retransmission and transitions into the sleepstate upon the elapse of the five milliseconds. Otherwise, the wirelessaudio device need not transmit the acknowledgment and transitions intothe sleep state upon the elapse of the five milliseconds.

Embodiments of the present disclosure provide several technologicalimprovements over existing systems. As described herein above and in thefollowing sections of the present disclosure, the embodiments improvethe power consumption metrics and the latency associated with usingsleep-awake cycles within a power save mode, such as the use of an802.11 U-APSD cycle. Further, by relying on a computing devicegenerating a specific trigger frame and using a specific delay interval,the improvements to the power consumption metrics and the latency can beachieved without changing, or with minimal change, to the configurationof a network access device.

In the interest of clarity of explanation, various embodiments of thepresent disclosure are described in conjunction with an access pointthat supports a wireless transmission and a computing device thatconnects to the access point according to the IEEE 802.11 standard andthat implements the IEEE 802.11 U-APSD for power saving. However, theembodiments are not limited as such and similarly apply to any othertype of connections, whether wired or wireless, and to any other type ofnetwork access devices. A network access device is generally atransmission device that manages, provides, controls, and/or facilitatesaccess of one or more other computing devices to a computer networkincluding a local area network, a wide area network, or a mesh network.A network hub, a network switch, a network router, an access point, anode in a mesh network, and any combination of such devices are examplesof a network access device. For instance, the embodiments can beimplemented in any type of computer network that is based on a IEEE802.11 standard, such as tunneled direct link setup (TDLS) peer, ad-hocindependent basic service set (IBSS), and mesh basic service (MBSS).

FIG. 1 illustrates an example computing environment for managing datatransmissions of a device based on power management data according to anembodiment of the present disclosure. As illustrated, the computingenvironment includes an access point 110, a data source 120, and acomputing device 130. However, the computing environment can include adifferent number of access points, data sources, and/or computingdevices. In an example, the access point 110 supports the capability ofa power save mode with a sleep-awake cycle, whereby data frames aretransmitted or stored for the computing device 130 depending on whetherthe computing device 130 is in a power save mode or not, and on whetherthe computing device 130 is in an awake state while in the power savemode.

In an example, the data source 120 includes a computing resource thatstores data (e.g., audio and/or video content, files, digital media,etc.) and that transmits the data in data frames 122 at the data linklayer. For instance, the computing resource is a content server thatsupports multimedia streaming.

The access point 110 is a wireless access point that manages thewireless access of the computing device 130 to a home network (e.g., aLAN that the computing device 130 is registered with as its homenetwork) and to a public network (e.g., including the internet). Thewireless access point also receives the data frames 122. Some of thedata frames 122 are transmitted immediately (e.g., without being storedin a memory buffer), whereas other ones are stored (e.g., in the memorybuffer) for a time duration prior to transmission to the computingdevice 130. The transmitted data frames from the access point 110 areshown as data frames 118 in FIG. 1. The home network includes the accesspoint 110 and the computing device 130.

The computing device 130 can be a device that includes suitable hardwareand software (e.g., one or more processors and one or more memoriesstoring computer-readable instructions) to support the receipt andtransmission of frames, including data frames and management frames, atthe data link layer. For instance, the computing device can be any of amobile phone such as a smartphone, a tablet, a laptop, a personalcomputer, a smart speaker, a smartwatch, a smart appliance, or any otherIoT device or user device.

In an example, if the capability of the power save mode with thesleep-awake cycle should be available to computing device 130, theaccess point 110 stores power management registration data 112 inassociation with an identifier of the computing device 130 (e.g., inassociation with the media access control (MAC) address and/or theinternet protocol (IP) address of the computing device 130). Inparticular, the power management registration data 112 associates thecomputing device 130 with this capability. For instance, during aconnection set-up, the access point 110 and the computing device 130complete a registration process by which the power managementregistration data 112 is generated. The power management registrationdata 112 indicates that the computing device 130 has been registeredwith the access point 110, where the registration indicates that uponthe computing device 130 entering into a power save mode, no data is tobe transmitted to the computing device 130 unless the computing device130 is in a awake state according to the IEEE 802.11 U-APSD protocol.The power management registration data 112 can be stored as informationin a table, where the MAC address of the computing device 130 is oneentry of a row and a bit is set to “1” in another entry of the row. A“1” bit indicates that the capability is applicable to the computingdevice 130 having the MAC address, whereas a “0” bit indicates that thecapability is not applicable to the computing device.

In addition, the access point 110 stores power management state data 114indicating an operational state of the computing device 130 controllingthe data transmission to the computing device 130. In particular, thepower management state data 114 indicates whether the computing device130 is in the power save mode or not and, if in the power save mode,whether the computing device is in the awake state or a sleep stateaccording to the IEEE 802.11 U-APSD protocol. A power save mode for acomputing device represents an operational mode in which the computingdevice uses a reduced amount of power compared to its normal operationalmode. An awake state indicates that, while the computing device is inthe power save mode, the computing device can operate some or all of thereceive functionalities of the computing device to receive data. A sleepstate indicates that, while the computing device is in the power savemode, the computing device cannot operate some or all of its receivefunctionalities to receive data. In an illustration, a table can be usedto store the power management state data 114. For instance, an entry ina row of the table can include the MAC address of the computing device130 and another entry in the row can include two bits: the first bit(e.g., the most significant bit) corresponds to the power save mode andthe second bit (e.g., the least significant bit) corresponds to the IEEE802.11 U-APSD state. If the first bit is set to “1,” the “1” bitindicates that the computing device 130 having the MAC address is in thepower save mode, whereas a “0” bit indicates that the computing deviceis not in the power save mode. If the second bit is set to “1,” the “1”bit indicates that the computing device 130 having the MAC address is inthe sleep state, whereas a “0” bit indicates that the computing deviceis not in the awake state.

Further, the access point 110 includes a memory buffer 116. Frames(whether data frames or management frames) that are received by theaccess point 110 and are addressed to a computing device (e.g., includea MAC address of the computing device as the receiver address in the MACheader of the frame) can be stored in the memory buffer 116 when thepower and saving data 114 indicates that the computing device is inpower save mode and the sleep state. Otherwise, such frames aretransmitted without being stored in the memory buffer 116. Frames(whether data frames or management frames) that are in the memory buffer116 and that are addressed to a computing device can be transmitted fromthe memory buffer 116 to the computing device upon a change to the powersaving mode 114 indicating that the computing device is out of the powersave mode or is in the power save mode but in the awake state.

In an example, the computing device 130 is entering a power save mode.Accordingly, the computing device 130 transmits a frame 132 to theaccess point 110, where the frame 132 indicates that the computingdevice 130 is entering the power save mode. For instance, the MAC headerof the frame 132 includes power management (PM) data indicating atransition of the computing device 130 into the power save mode (e.g., aPM bit set to “1”). If the computing device 130 has pending data ormanagement controls to transmit, the frame 132 is a data frame or amanagement frame. The frame 132 can be protected (and is referred toherein as a protected frame) by using one or more types of protectionincluding, for instance, encryption of the payload of the frame 132,authentication of the frame 132, and/or authentication of the MAC headerof the frame 132. In an example, the protected frame is a frame that hasan encrypted payload per the IEEE 802.11 encryption standard, where theencrypted payload includes additional authentication data (AAD)generated based on some of the information in the MAC header andencrypted with an encryption key. The ADD can be generated, forinstance, as a hash of the MAC header. If the computing device 130 hasno pending data or management controls to transmit, the computing device130 may transmit a QoS null frame that has an empty payload as the frame132, or for improved security, can transmit a protected frame as theframe 132, such as an ARP frame. In this case, the payload of theprotected frame (e.g., the ARP frame) includes AAD and is protectedand/or the protected frame can include a checksum.

Upon receiving the frame 132 from the computing device 130, the accesspoint 110 can check the power management registration data 112 todetermine whether the capability of the power save mode with thesleep-awake cycle is applicable to the computing device 130. If so, theaccess point 110 may update the power management state data 114applicable to the computing device 130 to indicate the transition intothe power save mode. Otherwise, the access point 110 may determine thatthe capability is not applicable to the computing device 130 and canignore the frame 132.

Similar processing can be performed when the computing device 130 exitsthe power save mode. Here, the frame 132 includes PM data indicating atransition of the computing device 130 out of the power save mode (e.g.,a PM bit set to “0”). Upon receiving this frame 132, the access point110 can check the power management registration data 112 to determinewhether the capability of the power save mode with the sleep-awake cycleis applicable to the computing device 130. If so, the access point 110may update the power management state data 114 applicable to thecomputing device 130 to indicate the transition out of the power savemode. Otherwise, the access point 110 may determine that the capabilityis not applicable and can ignore the frame 132.

Further, while the computing device 130 is in the power save mode, thecomputing device 130 may enter the awake state. In this case, thecomputing device 130 may send a trigger frame 134 indicating the awakestate. The trigger frame 134 can include a sequence number unique to thetrigger frame. For instance, the computing device 130 transmits a dataframe or a management frame as the trigger frame 134, even when thecomputing device 130 has no data or management control to transmit tothe access point 110 and would have otherwise transmitted a QoS nullframe per the IEEE 802.11 U-APSD protocol. In this case, the triggerframe 134 can be an ARP frame that includes the sequence number in thepayload field, or a vendor specific frame having a payload field and avendor specific element, where the sequence number is included in thepayload field and/or the vendor specific element. In addition, thetrigger frame 134 can be protected (e.g., by using one or more types ofprotection including, for instance, encryption of the payload of theframe 134, authentication of the frame 134, and/or authentication of theMAC header of the frame 134).

Upon receiving the trigger frame 134 from the computing device 130, theaccess point 110 can check the power management registration data 112 todetermine whether the capability of the power save mode with thesleep-awake cycle is applicable to the computing device 130. If so, theaccess point 110 may update the power management state data 114applicable to the computing device 130 to indicate the transition intothe awake state. Otherwise, the access point 110 may determine that thecapability is not applicable to the computing device 130 and can ignorethe frame 132.

On the other hand, upon transitioning out of the awake state and intothe sleep state while being in the power save mode, the computing device130 need not transmit a frame indicating this transition into the accesspoint 110. Instead, upon determining that no data frame (e.g., noadditional data if other data was transmitted when the computing device130 was in the awake state) is available for transmission to thecomputing device 130, the access point 110 may indicate thisdetermination to the computing device 130 (e.g., by using end of serviceperiod (EOSP) data indicating that no data is available, such as bytransmitting a QoS Null frame with an EOSP bit set to “1” or setting theEOSP bit to “1” in the last transmitted data frame to the computingdevice 130). The access point 110 may also check the power managementregistration data 112 to determine whether the capability of the powersave mode with the sleep-awake cycle is applicable to the computingdevice 130. If so, the access point 110 may update the power managementstate data 114 applicable to the computing device 130 to indicate thetransition into the sleep state. Otherwise, the access point 110 maydetermine that the capability is not applicable to the computing device130 and may not perform the update.

Accordingly, upon receiving a data frame from the data source 120, theaccess point determines a destination address of the data frame. Theaccess point 110 uses the destination address in a look-up of the powermanagement registration data 112. If destined to the computing device130 (e.g., based on a match between the destination address and thecomputing device's 130 MAC address in the power management registrationdata 112), the access point 110 determines that the capability of thepower save mode with the sleep-awake cycle is applicable to thecomputing device 130 and proceeds to check whether the computing device130 is in the sleep state or the awake state. Otherwise, the accesspoint immediately transmits the data frame without necessarily storingin the memory buffer 116. When the capability is applicable, the accesspoint 110 uses the destination address in a look-up of the powermanagement state data 114. If destined to the computing device 130(e.g., based on a match between the destination address and thecomputing device's 130 MAC address in the power management state data114), the access point 110 determines whether the computing device 130is in the sleep state or the awake state. If in the sleep state, theaccess point 110 stores the data frame in the memory buffer 116. If inthe awake state, the access point transmits any data frame stored in thememory buffer 116 along with the data frame received from the datasource 120.

FIG. 2 illustrates example stages for managing data transmissions of adevice according to an embodiment of the present disclosure. In anexample, an access point 210 manages frame transmissions to computingdevices including a computing device 220. The computing device 220 maytransition into and out of a power save mode and, while in the powersave mode, may transition into and out of an awake state. Thetransmission of frames from the access point 110 to the computing devicecan depend on the power save mode and the awake state. The access point210 and the computing device 220 are examples of the access point 110and the computing device 130, respectively, of FIG. 1. As illustrated,managing the frame transmissions can be performed in multiple stages,including a first stage 201 for a registration to the protected powermanagement mode, a second stage 202 for a power saving mode update, athird stage 203 for an awake state update, a third stage 203 for anawake state update a fourth state 204 for transmitting the frames, and afifth state 205 for a sleep state update.

In an example, during the first stage 201, the access point 210advertises its capability for supporting the power save mode and theIEEE 802.11 U-APSD functionality of awake and sleep states. Forinstance, the access point 210 transmits a frame that includes a MACheader indicating the capability. The frame can be any of a beaconframe, a probe response frame, or an association response frame. The MACheader can include an extended capabilities element and/or a vendorspecific element that indicates the capability. Such a MAC header caninclude one or more bits indicating whether frames to transition intoand out of the power save mode are to be protected or not. Such a MACheader can also include one or more bits indicating whether triggerframes to transition into the sleep state are to be protected or not.

Under the first stage 201, the computing device 220 can also transmit aframe indicating a request for the capability. For instance, thisrequest can be sent in a frame and can indicate whether the computingdevice 220 supports the power save mode and the IEEE 802.11 U-APSDfunctionality of awake and sleep states. The frame can be any of a proberequest frame, an authentication request frame, or an associationrequest frame. Similar to the frame of the access point 210, here theframe can be a vendor specific frame that includes an extendedcapabilities element and/or a vendor specific element in the MAC header.The vendor specific element can also be added to TDLS, IBSS, MBSSBeacons, and/or Management frames.

Upon receiving the request from the computing device 220, the accesspoint 210 can generate and store protected power management registrationdata 212 (and can initialize power management state data 214 to defaultvalues for indicating that the computing device 220 is not in the powersave mode and is not in the sleep state). The protected power managementregistration data 212 is usable as part of processing requests receivedby the access point 210 and indicating that the computing device 220 istransitioning into the power save mode or out of the power save mode,similar to the protected power management registration data 112described in connection with FIG. 1.

Although FIG. 2 illustrates that the first stage 201 includes the accesspoint 210 advertising its capability and the computing device 220requesting the capability, the embodiments of the present disclosure arenot limited as such. For example, the access point 210 can advertise thecapability, but the computing device 220 need not request it. Instead,the computing device 220 can automatically (e.g., without furtherregistration with the access point 210) use the capability based on adetermination that the access point 210 provides the capability. Inanother example, the access point 210 may not advertise the capability,but the computing device 220 may request it. In this example, the accesspoint 210 can generate and store the protected power managementregistration data 212 upon receipt of a frame from the computing device220 requesting the capability. In yet another example, the access point210 does not advertise the capability and the computing device 220 doesnot request it. Instead, each of such devices can be configured to usethe capability before and/or after a data connection is establishedbetween the two devices.

During the second stage 202, the computing device 230 transmits data tothe access point 210 indicating that the computing device 230 hasentered the power save mode or has exited the power save mode. The datacan be sent as an update frame 222 with a power management bit set to“1” or “0” for entering or leaving, respectively, the power mode and theaccess point 210 may respond with an acknowledgment to the computingdevice 230. In particular, the power management bit can be set in aframe control within a MAC header of the update frame 222. In oneexample, the update frame 222 can be QoS null frame (if the computingdevice 220 has no data to transmit to the access point 210), a dataframe, or a management frame (the data frame is used when the computingdevice 222 has data to transmit to the access point 210, and/or when nosuch data exists, but the update frame 222 is to be protected;similarly, the management frame is used when the computing device 222has management control to transmit to the access point 210, and/or whenno such management control exists, but the update frame 222 is to beprotected). In an example, the update frame 222 is a protected dataframe or a protected management frame including, for instance, achecksum and an encrypted payload that in turn includes AAD generatedbased on the frame's MAC header. In this example, the access point 210processes the protected frame by authenticating the protected frameaccording to the checksum, decrypting the payload, authenticating theMAC header according to the AAD, and retrieving the value of the powermanagement bit. In both examples (e.g., whether update frame 222 isprotected or not), the access point 210 generates or updates the powermanagement state data 214 to indicate the power save mode. The powermanagement state data 214 can include an identifier of the computingdevice 220, such as its MAC address, a first bit to have the same valueas the power management bit, and a second bit indicating whether thecomputing device 220 is in the sleep state or in the awake state. Thesleep state can be the default upon the computing device 220 indicatingthat it has transitioned into the power save mode, or upon the accesspoint 210 transmitting the last data frame to the computing device 220or a frame indicating that no data is available to the computing device220. The awake state can be the default upon the computing device 220indicating that it has transitioned out of the power save mode.

During the third stage 203, the computing device 230 transmits data tothe access point 210 indicating that the computing device 230 hastransitioned into the awake state. In particular the computing deviceinitiates a cycle of transitioning between the sleep state and the awakestate according to the IEEE 802.11 U-APSD protocol. This cycle is shownin FIG. 2 as a U-APSD cycle 250. Accordingly, the computing device 220transmits a trigger frame 224 to indicate the transition into the awakestate. Even when the computing device 220 has no data to transmit to theaccess point 210 (in which case, a QoS null frame would be transmittedper the IEEE 802.11 U-APSD protocol), the computing device 220 cangenerate and transmit a non-QoS null frame, such as a data frame or amanagement frame, as the trigger frame 224. The trigger frame 224 caninclude, in addition to a PM bit set to “1,” a sequence number unique tothe trigger frame 224 such that the access point 210 may determine thatthe trigger frame 224 is not redundant with a previously transmittedframe and may not ignore the trigger frame 224. For instance, thetrigger frame 224 can be an ARP frame or a vendor specific frame thatincludes the sequence number, as further described in connection withthe next figures. In an example, the trigger frame 224 can be protectedby including, for instance, a checksum and an encrypted payload that inturn includes AAD generated based on the frame's MAC header. In thisexample, the access point 210 processes the protected frame byauthenticating the protected frame according to the checksum, decryptingthe payload, authenticating the MAC header according to the AAD, andretrieving the sequence number. In both examples (e.g., whether triggerframe 224 is protected or not), the access point 210 updates the powermanagement state data 214 to indicate the sleep state. For instance, thesecond bit in the power management state data 214 is set to indicate theawake state (e.g., set to “0”).

During the fourth stage 204, the access point 210 receives frames 216,such as data frames and/or management frames. Each of the frames 216include a MAC header that, in turn, includes the MAC address of thecomputing device 220 as the destination address. Accordingly, the accesspoint 210 determines that the frames 216 are addressed to the computingdevice 220. The access point 210 uses the MAC address to look-up thepower save mode data 214 and generate a decision 217 of whether theframes 216 should be immediately transmitted to the computing device 220or stored in a memory buffer for a delayed transmission. In particular,if the computing device 220 is not operating in the power save mode, orif the computing device is in the power save mode and in the awakestate, the frames 216 are transmitted 218 without being buffered. If thecomputing device 220 is in the power save mode and in the sleep state,the frames 216 are buffered and the transmission of the buffered framesis delayed 219 until the computing device 220 transitions into the awakestate while in the power save mode or until the computing devicetransitions out of the power save mode (or until a time out timeduration, after which the buffered frames 216 are deleted and nottransmitted).

During the fifth stage 205, the computing device 220 transitions out ofthe awake state and into the sleep state, thereby completing the U-APSDcycle 250. The length of the U-APSD cycle corresponds to a serviceperiod. The service period is an interval of time during which thedevice is in the awake state and at the end of which the device entersthe sleep state. The timing between two service periods can beconfigured to be twenty milliseconds (or some other configurable value)and is generally shorter than the length of time during which thecomputing device 220 remains in the power save mode (e.g., one-hundredmilliseconds). In an example, the access point 210 determines that nodata frames or management frames are available to transmit to thecomputing device 220 during the U-APSD cycle 250 (e.g., during thefourth stage 204, no frames were received). In this case, the accesspoint 210 can transmit a QoS null frame with an EOSP bit set to “1” tothe computing device 220 to indicate that no data frames or managementframes are available to the computing device 220. Alternatively, ratherthan transmitting a QoS null frame, the access point 210 can transmit adata frame or a management frame that includes the EOSP bit and that isprotected (by including, for instance, a checksum and an encryptedpayload that in turn includes AAD generated based on the frame's MACheader). In another example, upon transmitting the last frame (e.g., adata frame or a management frame) under the fourth stage 204, the accesspoint 210 includes the EOSP bit set to “1” in this last frame toindicate to the computing device 220 that no additional frames areavailable to the computing device 220. In this example, the last framecan also be protected. In both examples, the frame including the EOSPbit is shown in FIG. 2 as an EOSP frame 215. Based on the transmissionof the EOSP frame 215, the access point 210 can update the powermanagement state data 214 to indicate that the computing device 220 hastransitioned into the sleep state (e.g., by changing the second bit inthe power management state data 214 to a “1”). This update to the powermanagement state data 214 can depend on receiving an acknowledgementfrom the computing device 220 of the EOSP frame 215. If no suchacknowledgement is received, the access point 210 may not update thepower management state data 214 and may attempt a number ofretransmissions of the EOSP frame 215 until receiving theacknowledgement (or a time out period) to then complete the update.

Further, during the fifth stage 205, and upon the computing device 220receiving the EOSP frame 215 and/or any retransmission thereof, thecomputing device 220 can transmit an acknowledgement about this receiptto the access point 210. Rather than immediately transitioning into thesleep state, the computing device 220 can determine a delay interval anddefer the transition into the sleep mode until an elapse of the delayinterval. Further, the computing device can extend a length of the delayinterval by a time interval depending on whether a retransmission of theEOSP frame 215 is received or not (e.g., the receipt of theretransmission can result in the time extension; otherwise, the delayinterval is not further extended).

FIG. 3 illustrates an example of a sequence diagram 300 fortransitioning between an awake state and a sleep state. As illustrated,a station 310 is in communication with an access point 320, and bothdevices implement the IEEE 802.11 U-APSD protocol. The sequence diagram300 includes a number of steps that are performed in an order of thearrows shown in FIG. 3, starting with the top arrow and ending with thebottom arrow.

As illustrated, the station 310 transmits a frame with a PM bit set to“1” to the access point 320 to indicate a transition of the station 310into a power save mode. The frame can be a QoS null frame if the station310 has no data or management control to transmit, data frame if thestation 310 has data to transmit, or a management frame if the station310 has management control to transmit and the frame may not beprotected. In response, the access point 320 transmits anacknowledgement to the station 310 to indicate that the frame wasreceived. At that point in time, the station 310 transitions into asleep state according to the IEEE 802.11 U-APSD protocol.

The station 310 remains in the sleep state until a detection of atrigger event. In an example, the trigger event can be time-based, suchas an elapse of a predefined time interval for a service period (e.g.,twenty milliseconds). Upon determining the trigger event (e.g., theelapse of twenty milliseconds from the transition into the power savemode), the station 310 transitions into the awake state. This transitionincludes transmitting a QoS null frame with a PM bit set to “1” as atrigger frame when the station 310 has no data or management control totransmit. In response, the access point 320 transmits an acknowledgementto the station 310 to indicate that the trigger frame was received.

In the example diagram 300 of FIG. 3, the access point 320 has buffereddata (e.g., data frames stored in a memory buffer) for the station 310upon the station's 310 transition into the power save mode and prior tothe station's 310 transition into the awake state. In this example, theaccess point 320 transmits the data to the station 310 by transmittingthe buffered data frames. In the last transmitted frame, the accesspoint 320 includes an EOSP bit set to “1” to indicate that no additionaldata is available for download to the station 310. At that point intime, the station 310 transitions out of the awake state and into thesleep state.

The station 310 remains in the sleep state until a detection of a nexttrigger event. For instance, upon the elapse of twenty milliseconds fromthe transition into the sleep state, the station 310 determines that atransition into the awake state is to be performed. Accordingly, thestation 310 transitions into the awake state by, at least, transmittinganother QoS null frame with a PM bit set to “1” as a next trigger frame.In response, the access point 320 transmits an acknowledgement to thestation 310 to indicate that this trigger frame was received.

In the example diagram 300 of FIG. 3, the access point 320 has nobuffered data (e.g., data frames stored in the memory buffer) for thestation 310 upon the station's 310 transition into the awake state. Inthis example, the access point 320 transmits a QoS null frame thatincludes an EOSP bit set to “1” to the station 310 to indicate that noadditional data is available for download to the station 310. At thatpoint in time, the station 310 transitions out of the awake state andinto the sleep state.

The transition into and out of the sleep state and awake state arerepeated over multiple U-APSD cycles until the station 310 transitionsout of the power save mode. The process of transitioning back into thepower save mode and between the sleep state and awake state is repeatedover time.

FIG. 4 illustrates an example of a sequence diagram 400, where a device,such as a station 410 in communication with an access point 420,erroneously remains in an awake state. The sequence diagram 400 can beperformed in accordance with the IEEE 802.11 U-APSD protocol. Asdemonstrated by this sequence diagram 400, the device can be in theawake state, whereas it should be in the sleep state because no data isavailable for the device to receive, and, thus, power can beinefficiently consumed by the device despite implementing the IEEE802.11 U-APSD protocol. As illustrated, the station 410 is incommunication with the access point 420, and both devices implement theIEEE 802.11 U-APSD protocol but do not support, fully or partially, thecapability of a power save mode with a sleep-awake cycle. The sequencediagram 400 includes a number of steps that are performed in an order ofthe arrows shown in FIG. 4, starting with the top arrow and ending withthe bottom arrow.

As illustrated, the station 410 transmits a frame with a PM bit set to“1” to the access point 420 to indicate a transition of the station 410into a power save mode. The frame can be a QoS null frame if the station410 has no data or management control to transmit, a data frame if thestation 410 has data to transmit, or a management frame if the station410 has management control to transmit and the frame may not beprotected. In response, the access point 420 transmits anacknowledgement to the station 410 to indicate that the frame wasreceived. At that point in time, the station 410 transitions into thesleep state according to the IEEE 802.11 U-APSD protocol.

The station 410 remains in the sleep state until a detection of atrigger event. In an example, the trigger event can be time-based, suchas an elapse of a predefined time interval for a service period (e.g.,twenty milliseconds). Upon determining the trigger event (e.g., theelapse of twenty milliseconds from the transition into the power savemode), the station 410 transitions into the awake state. For thistransition, the station 410 determines that it has no data or managementcontrol to transmit to the access point 420. Accordingly, and per theIEEE U-APSD protocol, the transition includes transmitting a QoS nullframe with a PM bit set to “1” as a trigger frame. In addition, thestation 410 implementing the IEEE U-APSD may not include a sequencenumber unique to the QoS null frame (or its value can be set to adefault value, such as zero). In response, the access point 420transmits an acknowledgement to the station 410 to indicate that thetrigger frame was received.

In the example diagram 400 of FIG. 4, the access point 420 has buffereddata (e.g., data frames stored in a memory buffer) for the station 410upon the station's 410 transition into the power save mode and prior tothe station's 410 transition into the awake state. In this example, thetrigger frame is the first trigger frame received by the access point420. Accordingly, the access point 420 determines that the sequencenumber included in the trigger frame has not been used before. Based onthis determination, the access point 420 transmits the data to thestation 410 by transmitting the buffered data frames. In the lasttransmitted frame, the access point 420 includes an EOSP bit set to “1”to indicate that no additional data is available for download to thestation 410. At that point in time, the station 410 transitions out ofthe awake state and into the sleep state.

The station 410 remains in the sleep state until a detection of a nexttrigger event. For instance, upon the elapse of twenty milliseconds fromthe transition into the sleep state, the station 410 determines that atransition into the awake state is to be performed. Accordingly, thestation 410 transitions into the awake state by, at least, transmittinganother QoS null frame with a PM bit set to “1” as a next trigger frame.The sequence number included in the QoS null frame has the same value asthe sequence number transmitted in the previous QoS null frame. Inresponse, the access point 420 transmits an acknowledgement to thestation 410 to indicate that this trigger frame was received. Here,however, because the QoS sequence number is not unique to this currentlyreceived QoS null frame, the access point 420 erroneously determinesthat the QoS null frame is redundant with the previously received QoSnull frame. Because of this redundancy determination, the access point420 ignores the currently received QoS null frame (as illustrated withan “X” mark in FIG. 4) and, hence, ignores that the station 410transitioned into the awake state and, instead, maintains that thestation 410 is in the sleep state. Accordingly, the access point 420does not start transmitting any data to the access point 420 if suchdata is available, or a QoS null frame with an EOSP bit set to “1” if nosuch data is available. Because the station 410 does not receive thedata followed by the EOSP bit set to “1” or the QoS null frame with theEOSP bit set to “1,” the station 410 cannot determine that it is moreproper to transition into the sleep state. Instead, the computing deviceerroneously remains in the awake state, thereby consuming unnecessarypower to receive data when no such data is actually available todownload by the station 410.

The station 410 can erroneously remain in the awake state until, forinstance, the station 410 has data or management control to transmit tothe access point 420 or upon exit from the power save mode. In theformer case, the station 410 can send a data frame or a management frameto the access point 420 and, in response, the access point 420 candetermine that the device is in the awake state and transmit, asapplicable, buffered data to the station 410. In the latter case, thestation 410 can send a data frame or a management frame to the accesspoint 420 indicating the transition out of the power save mode and, inresponse, the access point 420 can determine that the device has exitedthe power save mode and transmit, as applicable, buffered data to thestation 410.

FIG. 5 illustrates an example of a sequence diagram 500 that uses atrigger frame such that a device properly transitions between an awakestate and a sleep state according to an embodiment of the presentdisclosure. The device is illustrated as a station 510 that is incommunication with an access point 520. The sequence diagram 500 can beperformed in accordance with the IEEE 802.11 U-APSD protocol, while alsoimplementing the capability of a power save mode with a sleep-awakecycle. The station 510 and the access point 520 are examples of thecomputing device 220 and the access point 210 of FIG. 2, respectively.The sequence diagram 500 includes a number of steps that are performedin an order of the arrows shown in FIG. 5, starting with the top arrowand ending with the bottom arrow.

As illustrated, the station 510 transmits a frame with a PM bit set to“1” to the access point 520 to indicate a transition of the station 510into a power save mode. This frame can be similar to the update frame222 of FIG. 2 and can be protected. In response, the access point 520transmits an acknowledgement to the station 510 to indicate that theframe was received. At that point in time, the station 510 transitionsinto the sleep state according to the IEEE 802.11 U-APSD protocol.

The station 510 remains in the sleep state until a detection of atrigger event. In an example, the trigger event can be time-based, suchas an elapse of a predefined time interval for a service period (e.g.,twenty milliseconds). Upon determining the trigger event (e.g., theelapse of twenty milliseconds from the transition into the power savemode), the station 510 transitions into the awake state. For thistransition, the station 510 determines that it has no data or managementcontrol to transmit to the access point 510. In addition, the station510 determines that this is the first transition into the awake stateand, thus, no previous frame about this transition was transmitted tothe access point 520. Accordingly, the transition includes transmittinga QoS null frame with a PM bit set to “1” as a trigger frame per theIEEE 802.11 U-APSD protocol. Alternatively, and as explained inconnection with the next steps, the station 510 can transmit a triggerframe that includes a sequence number unique to the trigger frame. Inboth cases, the access point 520 responds with an acknowledgementtransmitted to the station 510 to indicate that the trigger frame wasreceived.

In the example diagram 500 of FIG. 5, the access point 520 has buffereddata (e.g., data frames stored in a memory buffer) for the station 510upon the station's 510 transition into the power save mode and prior tothe station's 510 transition into the awake state. In this example, thetrigger frame is the first trigger frame received by the access point520. Accordingly, the access point 520 determines that the sequencenumber included in the trigger frame has not been used before, even whenthe trigger frame is the QoS null frame. Based on this determination,the access point 520 transmits the data to the station 510 bytransmitting the buffered data frames. In the last transmitted frame,the access point 520 includes an EOSP bit set to “1” to indicate that noadditional data is available for download to the station 510. At thatpoint in time, the station 510 transitions out of the awake state andinto the sleep state.

The station 510 remains in the sleep state until a detection of a nexttrigger event. For instance, upon the elapse of twenty milliseconds fromthe transition into the sleep state, the station 510 determines that atransition into the awake state is to be performed. Accordingly, thestation 510 transitions into the awake state. Here, even when thestation 510 determines that no data is to be transmitted to the accesspoint 520, the station 510 generates a unique sequence number to beincluded in the trigger frame that indicates the transition into theawake state. This trigger frame can be a QoS null frame that includesthe unique sequence number and a power management bit set to “0,”thereby indicating the transition into the awake state and that theaccess point 520 should not determine that the QoS null frame isredundant with a previously transmitted QoS null frame. Alternatively,the trigger frame can be, even though no data is to be transmitted, adata frame or a management frame that includes the unique sequencenumber and the PM bit set to “0” and that can be protected foradditional security. In response, the access point 520 transmits anacknowledgement to the station 510 to indicate that this trigger framewas received. Here, because the sequence number is unique to thereceived trigger frame (whether a QoS null frame, a data frame protectedor not, or a management frame protected or not), the access point 520properly determines that the currently received trigger frame is notredundant with a previously receive trigger frame, does not ignore thecurrently received trigger frame, and, instead, processes the currentlyreceived trigger frame to determine the transition of the station to theawake state (this processing as illustrated with a check mark in FIG.5).

Accordingly, if the access point 520 has buffered data for the station510, the access point 520 transmits the buffered data and includes, inthe last transmitted data frame, an EOSP bit set to “1”. Alternatively,and as illustrated in the example diagram 500 of FIG. 5, no data isavailable to transmit to the station 510 and the access point 510transmits in one instance a QoS null frame with EOSP set to “1.”

The station 510 receives the EOSP bit set to “1” (e.g., in a lasttransmitted data frame or in a QoS null frame) and transitions into thesleep state. The transition can be deferred by a delay interval asfurther described in connection with FIG. 8. Because the station 510transitions into the sleep state and does not erroneously remain in theawake state, as is the case with the sequence diagram 400 of FIG. 4, thestation 510 need not inefficiently consume power to enable receivefunctionalities when no data is actually available for download by thestation 510.

Although FIG. 5 illustrates the use by the station 510 of a non-QOS nullframe that includes a unique sequence number, the access point 520 cansimilarly use such a frame even when the access point 520 has no data totransmit to the station 510. In particular and rather than transmittinga QoS null frame, the access point 520 can transmit a data frame, amanagement frame with an EOSP bit set to one even when no data isavailable for transmission to the station 510, where the used frame(data or management) includes a sequence number unique to thetransmission of the user frame. For instance, the used frame can be anARP frame and/or a vendor specific frame and may be protected.

FIG. 6 illustrates an example of a trigger frame 600 according to anembodiment of the present disclosure. The trigger frame 600 is a dataframe that includes a header field and a payload field. The header fieldincludes a sequence number unique to the trigger frame 600 and powermanagement data, such as a PM bit, usable to indicate a transition of adevice transmitting the trigger frame 600 to an awake state. In anexample, the trigger frame 600 is an ARP frame. In another example andspecifically as illustrated in in FIG. 6, the trigger frame 600 can be avendor specific frame.

As illustrated, the trigger frame 600 is a vendor specific frame thatincludes a logical link control (LLC) header and a subnetwork accessprotocol (SNAP) header. The sequence number is included in the LLCheader. The payload field is included in the SNAP header. In addition,the payload field can be set to have zero length, thereby reducing thetotal size of the trigger frame 600.

In particular, the trigger frame 600 includes a MAC header that isbetween twenty-four and thirty octets long. The trigger frame 600 alsoincludes the LLC header having a one destination service access point(DSAP) octet, a one source service access point (SSAP) octet, and a onecontrol octet. The trigger frame 600 also includes the SNP header havinga three organizationally unique identifier (OUI) octet (which can be setto a vendor OUI), a two type octet, a two subtype octet (which cancontain the payload and, if the trigger frame 600 is not protected, thepayload can be set to have zero length), and a four frame check sequence(FCS) octet. In comparison to a QoS null frame, the trigger frame 600with the vendor specific element has an additional eight octetsoverhead. This trigger frame 600 uses Vendor OUI (as part of the OUIfield in the SNAP header). Its Type field is set to Extended Ether TypeVendor Specific as defined by IEEE 802-2014 standard, section 9.2.4 OUIExtended Ether Type.

FIG. 7 illustrates an example of a sequence diagram 700, where a dataframe loss may occur. The sequence diagram 700 can be performed inaccordance with the IEEE 802.11 U-APSD protocol. As demonstrated by thissequence diagram 700, station 710 can be in the sleep state, whereas itshould be in the awake state to receive data from an access point 720,and, thus, resulting in the data frame loss despite implementing theIEEE 802.11 U-APSD protocol. As illustrated, the station 710 is incommunication with the access point 720, and both devices implement theIEEE 802.11 U-APSD protocol but do not support, fully or partially, thecapability of a power save mode with a sleep-awake cycle. The sequencediagram 700 includes a number of steps that are performed in an order ofthe arrows shown in FIG. 7, starting with the top arrow and ending withthe bottom arrow.

As illustrated, the station 710 transmits a frame with a PM bit set to“1” to the access point 720 to indicate a transition of the station 710into a power save mode. The frame can be a QoS null frame if the station710 has no data or management control to transmit, a data frame if thestation 710 has data to transmit, or a management frame if the station710 has management control to transmit and the frame may not beprotected. In response, the access point 720 transmits anacknowledgement to the station 710 to indicate that the frame wasreceived. At that point in time, the station 710 transitions into thesleep state according to the IEEE 802.11 U-APSD protocol.

The station 710 remains in the sleep state until a detection of atrigger event. In an example, the trigger event can be time-based, suchas an elapse of a predefined time interval for a service period (e.g.,twenty milliseconds). Upon determining the trigger event (e.g., theelapse of twenty milliseconds from the transition into the power savemode), the station 710 transitions into the awake state. For thistransition, the station 710 determines that it has no data or managementcontrol to transmit to the access point 720. Accordingly, and per theIEEE U-APSD protocol, the transition includes transmitting a QoS nullframe with a PM bit set to “1” as a trigger frame. In addition, thestation 710 implementing the IEEE U-APSD may not include a sequencenumber unique to the QoS null frame (or its value can be set to adefault value, such as zero). In response, the access point 720transmits an acknowledgement to the station 710 to indicate that thetrigger frame was received.

In the example diagram 700 of FIG. 7, the access point 720 has nobuffered data (e.g., data frames stored in a memory buffer) for thestation 710 upon the station's 710 transition into the power save modeand prior to the station's 710 transition into the awake state. In thisexample, the trigger frame is the first trigger frame received by theaccess point 720. Accordingly, the access point 720 determines that thesequence number included in the trigger frame has not been used before.Based on this determination, the access point 720 transmits, to thestation 710, a QoS null frame with an EOSP bit set to “1” to indicatethat no data is available.

Upon receiving the QoS null frame, the station 710 responds with atransmission of an acknowledgement about this receipt to the accesspoint 720 and transitions into the sleep state per the IEEE 802.11U-APSD protocol. However, due to conditions of the communication channel(e.g., the wireless medium), the access point 720 does not receive theacknowledgment (as indicated with the “X” mark in FIG. 7). Because noacknowledgement is received, the access point 720 retransmits the QoSnull frame with the EOSP bit set to “1” in a retry. However, because thestation 710 has already entered the sleep state, the station 710 doesnot receive the retransmission and does not transmit an acknowledgementabout the receipt of the transmission. The access point 720 can attempta number of re-tries, and would not receive the proper acknowledgementwhile the station 710 remains in the sleep state.

The station 710 remains in the sleep state until a detection of a nexttrigger event. For instance, upon the elapse of twenty milliseconds fromthe transition into the sleep state, the station 710 determines that atransition into the awake state is to be performed. Accordingly, thestation 710 transitions into the awake state by, at least, transmittinganother QoS null frame with a PM bit set to “1” as a next trigger frameto indicate the transition. In response, the access point 720 transmitsan acknowledgement to the station 710 to indicate that this triggerframe was received. However, the station 710 can also receive one of there-transmissions of the QoS null frame with the EOSP bit set to “1” andresponds with an acknowledgment. Hence, the station 710 can erroneouslydetermine that no data is available to download from the access point720 by relying on a EOSP retry. Accordingly, the station 710 transitionsagain to the sleep state, but this transition can be incorrect becauseit is in response to the EOSP retry.

As illustrated in FIG. 7, having received the trigger frame indicatingthe transition into the awake state, the access point 720 has data totransmit to the station 710 and transmits such data using one or moredata frames. However, the station 720 by this time has erroneouslytransitioned into the sleep state and the station 710 is not aware ofthis transition. Hence, the transmitted data frame(s) are not receivedby the station 710 (as illustrated with an “X” mark in FIG. 7). Further,the access point 720 does not receive an acknowledgement from thestation 710 about receipt of the data frame(s). Hence, the access point720 retransmits the data frame(s) in retries, but also does not receivethe corresponding acknowledgement (as also illustrated with “X” mark inFIG. 7), resulting in the lost data frame(s) and wasted computingoverhead and network bandwidth.

FIG. 8 illustrates an example of a sequence diagram 800 that uses adelay interval for transitioning into a sleep state according to anembodiment of the present disclosure. The sequence diagram 800 isperformed by a station 810 that is in communication with an access point820 in accordance with the IEEE 802.11 U-APSD protocol, while alsoimplementing the capability of a power save mode with a sleep-awakecycle. The station 810 and the access point 820 are examples of thecomputing device 220 and the access point 210 of FIG. 2, respectively.The sequence diagram 800 includes a number of steps that are performedin an order of the arrows shown in FIG. 8, starting with the top arrowand ending with the bottom arrow.

As illustrated, the station 810 transmits a frame with a PM bit set to“1” to the access point 820 to indicate a transition of the station 810into a power save mode. This frame can be similar to the update frame222 of FIG. 2 and can be protected. In response, the access point 820transmits an acknowledgement to the station 810 to indicate that theframe was received. At that point in time, the station 810 transitioninto the sleep state according to the IEEE 802.11 U-APSD protocol.

The station 810 remains in the sleep state until a detection of atrigger event. In an example, the trigger event can be time-based, suchas an elapse of a predefined time interval for a service period (e.g.,twenty milliseconds). Upon determining the trigger event (e.g., theelapse of twenty milliseconds from the transition into the power savemode), the station 810 transitions into the awake state. For thistransition, the station 810 determines that it has no data or managementcontrol to transmit to the access point 810. In addition, the station810 determines that this is the first transition into the awake stateand, thus, no previous frame about this transition was transmitted tothe access point 820. Accordingly, the transition includes transmittinga QoS null frame with a PM bit set to “1” as a trigger frame per theIEEE 802.11 U-APSD protocol. Alternatively, and as explained inconnection with the next steps, the station can 810 can transmit atrigger frame that includes a sequence number unique to the triggerframe. In both cases, the access point 820 responds with anacknowledgement transmitted to the station 810 to indicate that thetrigger frame was received.

In the example diagram 800 of FIG. 8, the access point 820 has nobuffered data (e.g., data frames stored in a memory buffer) for thestation 810 upon the station's 810 transition into the power save modeand prior to the station's 810 transition into the awake state. In thisexample, the trigger frame is the first trigger frame received by theaccess point 820. Accordingly, the access point 820 determines that thesequence number included in the trigger frame has not been used before.Based on this determination, the access point 820 transmits, to thestation 810, a QoS null frame with an EOSP bit set to “1” to indicatethat no data is available.

Upon receiving the QoS null frame, the station 810 responds with atransmission of an acknowledgement about this receipt to the accesspoint 820 and transitions into the sleep state per the IEEE 802.11U-APSD protocol. However, due to conditions of the communication channel(e.g., the wireless medium), the access point 820 does not receive theacknowledgment (as indicated with the “X” mark in FIG. 8). And, unlikethe sequence diagram 700 of FIG. 7, the station 810 determines a delayinterval and defers the transition into the sleep state until an elapseof the delay interval.

During this delay interval and because no acknowledgement is received,the access point 820 retransmits the QoS null frame with the EOSP bitset to “1” in a retry. Because the station 810 has not entered the sleepstate yet, the station 810 receives the retransmission (as indicatedwith a check mark in FIG. 8) and, in response, transmits anacknowledgement about the receipt of this retransmission and thentransitions into the sleep state. Accordingly, the access point 820 canmore accurately determine the transition of the station 810 into thesleep state. Although not illustrated in FIG. 8, if a number ofretransmission(s) is (are) received during the delay interval, thestation 810 can extend the time length of the delay interval a number oftimes.

The station 810 remains in the sleep state until a detection of a nexttrigger event. For instance, upon the elapse of twenty milliseconds fromthe transition into the sleep state, the station 810 determines that atransition into the awake state is to be performed. Accordingly, thestation 810 transitions into the awake state. Here, even when thestation 810 determines that no data is to be transmitted to the accesspoint 820, the station 810 generates a unique sequence number to beincluded in the trigger frame that indicates the transition into theawake state. This trigger frame can be a QoS null frame that includesthe unique sequence number and a power management bit set to “0,”thereby indicating the transition into the awake state and that theaccess point 820 should not determine that the QoS null frame isredundant with a previously transmitted QoS null frame. Alternatively,the trigger frame can be, even though no data is to be transmitted, adata frame or a management frame that includes the unique sequencenumber and the PM bit set to “0” and that can be protected foradditional security. In response, the access point 820 transmits anacknowledgement to the station 810 to indicate that this trigger framewas received. Here, because the sequence number is unique to thereceived trigger frame (whether a QoS null frame, a data frame protectedor not, or a management frame protected or not), the access point 820properly determines that the currently received trigger frame is notredundant with a previously received trigger frame, does not ignore thecurrently received trigger frame, and, instead, processes the currentlyreceived trigger frame to determine the transition of the station to theawake state (this processing as illustrated with a check mark in FIG.8).

As illustrated in FIG. 8, at this point, the access point 820 has datato transmit to the station 810. Accordingly, such data is transmitted inone or more data frame(s) because the access point 820 has accuratelydetermined that the station 810 is in the awake state. The station 810responds with an acknowledgment. The access point 820 continues thetransmission of the data frames until a last transmitted data frame thatincludes an EOSP bit set to “1.” Here, also the station 810 respondswith an acknowledgement and, rather than immediately entering the sleepstate, defer this transition by the delay interval. As illustrated withthe dashed box, and unlike the result of performing the sequence diagram700 of FIG. 7, performing the sequence diagram 800 does not result indata frame loss or reduces the data frame loss.

FIGS. 9-11 illustrate example flows for implementing the capability of apower save mode with a sleep-awake cycle to manage data transmissions,save power, and meet latency targets. Devices that form a basic serviceset (BSS), including a computing device (e.g., a station) and an accesspoint, are described as performing operations of the flows. Inparticular, the flows illustrated in FIGS. 9 and 10 are described fromthe perspective of the computing device, whereas the flow illustrated inFIG. 11 is described from the perspective of the access point.Instructions for performing the operations can be stored ascomputer-readable instructions on non-transitory computer-readable mediaof the devices. As stored, the instructions represent programmablemodules that include code executable by processors of the devices. Theexecution of such instructions configures the devices to perform thespecific operations shown in the figures and described herein. Eachprogrammable module in combination with the respective processorrepresents a means for performing a respective operation(s). While theoperations are illustrated in a particular order, it should beunderstood that no particular order is necessary and that one or moreoperations may be omitted, skipped, performed in parallel, and/orreordered.

FIG. 9 illustrates an example flow of the computing device for managingdata transmissions to the computing device based on power managementdata according to an embodiment of the present disclosure. The powermanagement data can include any or a combination of the power managementregistration data 212 or the power management state data 214 of FIG. 2.

In an example, the flow of FIG. 9 starts at operation 902, where thecomputing device completes a registration for power management. Forinstance, the computing device can receive a beacon from the accesspoint advertising the capability and/or can request this capability bytransmitting a probe request frame, an authentication request frame, oran association request frame to the access point. Upon registration, theaccess point may generate and store the power management registrationdata 212.

In an example, the flow of FIG. 9 includes operation 904, where thecomputing device transitions to a power save mode. For instance, thetransition includes transmitting, to the access point, a QoS null frameif the computing device has no data or management control to transmit, adata frame if the computing has data to transmit, or a management frameif the computing device has management control to transmit. The dataframe and/or the management frame can also be used in lieu of the QoSnull frame when the computing device has no data or management controlto transmit. In this case, the data frame and/or the management frameare protected to improve the security of the transition into the powersave mode. The transmitted frame, whether QoS null frame, data frame(protected or not), or management frame (protected or not) includes PMdata to indicate the transition (e.g., a PM bit set to “1”).

In an example, the flow of FIG. 9 includes operation 906, where thecomputing device transitions to an awake state. For instance, thecomputing device detects a trigger event (e.g., that twenty millisecondshave passed since the transition into the power save mode) powers up areceiver of the computing device and/or enables receive functionality ofthe computing device. Further, the computing device determines that nodata is available to transmit from the computing device to the accesspoint at this time. Nonetheless, the computing device generates a dataframe or a management frame, rather than a QoS null frame, to transmitas a trigger frame to indicate the transition into the awake state. Inother words, the trigger frame is a non-QoS null frame that includes atleast a header field and a payload field. In particular, the computingdevice generates a sequence number unique to the trigger frame andincludes the sequence number in the trigger frame (e.g., in the headerfield).

To generate the sequence number, the computing device maintains acounter. The counter is used to track the count of the transmissions.Each time a transmission occurs, the computing device increments thecount by one. The computing device increments the latest count (e.g.,the current value of the counter) by one and sets the resulting value asthe sequence number.

In an illustration, the computing device maintains a counter per typeand category of transmission. In particular, the computing devicemaintains a set of counter for data frames and a set of counters formanagement frames. Each data frame (and similarly management frame) canbe associated with a category, such as audio, video, best effort, orbackground. The computing device maintains a counter per category (e.g.,a first counter for data frames containing audio data, a second counterfor data frames containing video data, a third counter for data framescontaining data categorized as best effort data, and a fourth counterfor data frames containing data categorized as background data). Eachtime a data frame associated with a category is transmitted, only thecorresponding counter is increased (e.g., if a data frame associatedwith the audio category is transmitted, only the first counter isincreased). The value of a counter associated with a data frame can beincluded as a sequence number in the data frame (e.g., if a data frameassociated with the audio category is transmitted, the latest value ofthe first counter is included in this data frame). Each counter can beincreased monotonically with a transmission of a corresponding dataframe, unless this transmission is a retransmission and needs to beindicated as being redundant.

In this illustration, the computing device determines a category toassociate with the trigger frame, looks up the current value of thecounter associated with this category, increases this value by one, andincludes this increased value as the sequence number in the triggerframe. For instance, if the computing device is streaming audio and hasentered the power save mode, the computing device can select thecategory associated with audio to then generate the sequence number fromthe value of the counter associated with this category.

In an example, the flow of FIG. 9 includes operation 908, where thecomputing device transmits the trigger frame indicating the transitioninto the awake state. For instance, the trigger frame is transmitted tothe access point. In addition, prior to transmission, the trigger framecan be protected to improve the security associated with indicating thetransition. In this case, the trigger frame, as protected, istransmitted to the access point.

In an example, the flow of FIG. 9 includes operation 910, where thecomputing device receives, as applicable one or more data frames fromthe access point. For instance, if the access point has stored dataframes in a memory buffer between the time the computing devicetransitioned into the power save mode and the time the computing devicetransitioned into the awake state, such data frames can be transmitted.If no such data frames have been buffered, no such transmission isperformed.

In an example, the flow of FIG. 9 includes operation 912, where thecomputing device receives a frame from the access point, where the frameindicates that no additional data is available. For instance, if dataframes were received per operation 910, the last received data frameincludes EOSP data indicating that no additional data is available forthe computing device to receive from the access point (e.g., an EOSP bitset to “1”). If no data frames were received per operation 910, thecomputing device can receive a QoS null frame with the EOSP data. In anexample, the access point uses a non-QOS null frame that includes theEOSP data even when the access point has not buffered data fortransmission to the computing device. The non-QOS null frame includes asequence number unique to the transmission of the non-QOS null frame andcan be any of a data frame, including a vendor specific frame, or amanagement frame.

In an illustration, the frame is a data frame or a management frame thatincludes the EOSP data, and the frame is protected (e.g., includes anencrypted payload, where this payload includes AAD generated based onsome of the information in the MAC header of the frame and encryptedwith an encryption key). In this illustration, the computing devicevalidates the protected frame and, only if the validation is successful,does the computing device determine the EOSP data and starts thetransition into the sleep state. The validation includes, for instance,decrypting the payload, generating a hash from the MAC header, anddetermining that the hash is the same as or sufficiently similar to theAAD.

In an example, the flow of FIG. 9 includes operation 914, where thecomputing device determines a delay interval and defers the transitioninto the sleep state until an end of the delay interval. The delayinterval can be configured to a static value (e.g., five milliseconds)or can be dynamically configured depending on a number of factorsassociated with detected channel conditions including, for instance, anyor a combination of a packet error rate, a difference between anexpected frame rate and a detected frame rate, or channel utilization.FIG. 10 further illustrates the determination of a dynamic value of thedelay interval.

In an example, the flow of FIG. 9 includes operation 916, where thecomputing device transitions to the sleep state based on the EOSP dataindicating no additional data and on the delay interval. For instance,the computing device starts a timer upon receiving the EOSP data andsets the duration of this timer to the value of the delay interval. If aretransmission of the EOSP data is received before the end of the timer,the computing device can determine and extend the delay interval by atime interval (e.g., extend the timer by that time interval). If noretransmission is received (or no further retransmission is receivedafter an extension), the computing device transitions to the sleep stateby powering off its receiver or disabling the receive functionalities.The value of the time interval can be also static (e.g., set at fivemilliseconds) or dynamic. If dynamic, this value can also be determinedbased on any or a combination of the factors associated with thedetected channel conditions.

FIG. 10 illustrates another example flow of the computing device fordelaying a transition into a sleep state according to an embodiment ofthe present disclosure. As described in connection with operations914-916, the transition can be deferred by a delay interval, where thisdelay interval is extendable by a time interval. Any or both of thedelay interval and the time interval can have a predefined static valueor can have a dynamic value determined based on the factors associatedwith the detected channel conditions. The value of the delay intervaland the value of the time interval (e.g., the time length of theextension) can be different.

In an example, the flow of FIG. 10 starts at operation 1002, where thecomputing device receives a frame indicating that no additional data isavailable. This operation is similar to operation 912 of FIG. 9.

In an example, the flow of FIG. 10 includes operation 1004, where thecomputing device transmits an acknowledgement to the access point aboutreceipt of the frame. As explained in connection with FIG. 7, due to thechannel conditions, the acknowledgement may not be actually received bythe access point. In this case, the access point may retransmit theframe. By deferring the transition into the sleep state by the delayinterval, the computing device can detect the retransmission andretransmit the acknowledgement so that the access point can be morelikely determine that the computing device is transitioning into thesleep state.

In an example, the flow of FIG. 10 includes operation 1006, where thecomputing device determines a delay interval. For instance, the delayinterval has a dynamic duration that is determined based on one or moreof the packet error rate or the difference between an expected framerate and a detected frame rate (e.g., for audio streaming, the streamcan necessitate a frame rate that would be the expected frame rate. Inoperation, the computing device may determine an average of the numberof frame rates received in a time window and set this average as theexpected frame rate). Generally, the larger the packet error rate, thelonger the delay interval is. Similarly, the larger the difference is,the longer the delay interval is.

In addition to using the factors associated with the detected channelconditions to compute the dynamic value of the delay interval, some orall these factors can be additionally or alternatively used as a triggerto determine the delay interval (e.g., as a trigger to perform operation1006 and possibly defer the transition into the sleep state). Forinstance, if the packet error rate exceeds a predefined error ratethreshold and/or if the difference exceeds a predefined value, thecomputing device is triggered to determine the delay interval (whetherstatic or dynamic) and defer the transition.

In an example, the flow of FIG. 10 includes operation 1008, where thecomputing device stays in the awake state during the duration of thedelay interval. While in the awake state, the computing device monitorswhether a second frame is received from the access point and indicatesthat no additional data is available to the computing device (e.g., thesecond frame can be a retransmission of the frame received at operation1002). If the second frame is not received, operations 1010 followsoperation 1008. Otherwise, operation 1020 follows operation 1008.

In an example, the flow of FIG. 10 includes operation 1010, where thecomputing device transitions to the sleep state. For instance, thecomputing device powers off its receiver or disables its receivefunctionalities.

In an example, the flow of FIG. 10 includes operation 1020, where thecomputing device transmits an acknowledgement to the access point aboutreceipt of the second frame. This operation can be similar to operation1004.

In an example, the flow of FIG. 10 includes operation 1022, where thecomputing device determines an extension interval (e.g., a time intervalby which the delay interval is extended). For instance, the duration ofthe extension interval can be static or can be dynamic. If dynamic, theabove factors associated with the detected channel conditions can besimilarly used to compute the dynamic duration. In addition, the abovefactors can be used as a trigger to determine the duration extension.

FIG. 11 illustrates another example flow of the access point formanaging data transmissions to the computing device based on powermanagement data. In an example, the flow of FIG. 11 starts at operation1102, where the access point completed a registration of the computingdevice for power management. For instance, the access point mayadvertise the capability of the power save mode with the sleep-awakecycle by sending a beacon indicating so. Or, the computing device mayrequest this capability by transmitting a probe request frame, anauthentication request frame, or an association request frame to theaccess point. Upon registration, the access point may generate and storethe power management registration data 212.

In an example, the flow of FIG. 11 includes operation 1104, where theaccess point receives a frame indicating a transition of the computingdevice into the power save mode. The frame can be a QoS null frame, adata frame, or a management frame that includes a PM bit set to “1.” Ifthe frame is a data frame or management frame, the frame can beprotected (e.g., includes an encrypted payload, where this payloadincludes AAD generated based on some of the information in the MACheader of the frame and encrypted with an encryption key). If so, theaccess point validates the protected frame and, only if the validationis successful, does the computing device determine the value of the PMbit. The validation includes, for instance, decrypting the payload,generating a hash from the MAC header, and determining that the hash isthe same as or sufficiently similar to the AAD. Upon determining thatthe PM bit is set to “1,” the access point can update the powermanagement state data 214 to indicate that the computing device is inthe power save mode.

In an example, the flow of FIG. 11 includes operation 1106, where theaccess point starts buffering data, as applicable, for the computingdevice. For instance, the access point receives one or more data framesfrom a data source and the data frame(s) includes a MAC address of thecomputing device as the destination address. By looking up the powermanagement state data 214, the access point determines that thecomputing device is in the power save mode and stores the data frame(s)in a memory buffer rather than immediately transmitting the dataframe(s) to the computing device.

In an example, the flow of FIG. 11 includes operation 1108, where theaccess point receives a trigger frame indicating the transition of thecomputing device to the awake state. For instance, the trigger frame canbe a data frame or a management frame and can include a sequence numberunique to the trigger frame and a PM bit set to “0.” The trigger framecan also be protected, similarly to the frame described in connectionwith operation 1104. If protected, the trigger frame is validated priorto additional processing (similarly to the validation described inconnection with operation 1104). If not protected or if protected andupon successful validation, the access point determines the sequencenumber and the value of the PM bit. Because the sequence number isunique, the access point does not discard the trigger frame. Because thePM bit is set to “0,” the access point determines that the computingdevice has indeed transitioned into the awake state. The access pointcan update the power management state data 214 to indicate that thecomputing device is in the awake state while also being in the powersave mode.

In an example, the flow of FIG. 11 includes operation 1110, where theaccess point transmits, as applicable, buffered data. For instance, dataframes that were stored in the memory buffer per operation 1106 aretransmitted to the computing device because the computing device is inthe awake state. Any data frames received while the computing device isin the awake state and destined to the computing device are alsotransmitted by the access point to the computing device.

In an example, the flow of FIG. 11 includes operation 1112, where theaccess point transmits a frame indicating that no additional data isavailable for the computing device to receive from the access point.Upon receiving an acknowledgment about this frame from the computingdevice, the access point can update the power management state data 214to indicate that the computing device is in sleep state while also beingin the power save mode. The frame can be a QoS null frame, a data frame,or a management frame. The data frame or the management frame can beused even when the access point has not buffered data for transmissionto the computing device. The data frame can be a vendor specific frame.If the frame is a data frame or a management frame, this frame can alsobe protected.

FIG. 12 illustrates aspects of an example environment 1200 forimplementing aspects in accordance with various embodiments. As will beappreciated, although a Web-based environment is used for purposes ofexplanation, different environments may be used, as appropriate, toimplement various embodiments. The environment includes an electronicclient device 1202, which can include any appropriate device operable tosend and receive requests, messages, or information over an appropriatenetwork 1204 and convey information back to a user of the device.Examples of such client devices include personal computers, cell phones,handheld messaging devices, laptop computers, set-top boxes, personaldata assistants, electronic book readers, and the like. The network caninclude any appropriate network, including an intranet, the Internet, acellular network, a local area network, or any other such network orcombination thereof. Components used for such a system can depend atleast in part upon the type of network and/or environment selected.Protocols and components for communicating via such a network are wellknown and will not be discussed herein in detail. Communication over thenetwork can be enabled by wired or wireless connections and combinationsthereof. In this example, the network includes the Internet, as theenvironment includes a Web server 1206 for receiving requests andserving content in response thereto, although for other networks analternative device serving a similar purpose could be used as would beapparent to one of ordinary skill in the art.

The illustrative environment includes at least one application server1208 and a data store 1210. It should be understood that there can beseveral application servers, layers, or other elements, processes, orcomponents, which may be chained or otherwise configured, which caninteract to perform tasks such as obtaining data from an appropriatedata store. As used herein the term “data store” refers to any device orcombination of devices capable of storing, accessing, and retrievingdata, which may include any combination and number of data servers,databases, data storage devices, and data storage media, in anystandard, distributed, or clustered environment. The application servercan include any appropriate hardware and software for integrating withthe data store as needed to execute aspects of one or more applicationsfor the client device, handling a majority of the data access andbusiness logic for an application. The application server providesaccess control services in cooperation with the data store and is ableto generate content such as text, graphics, audio, and/or video to betransferred to the user, which may be served to the user by the Webserver in the form of HyperText Markup Language (“HTML”), ExtensibleMarkup Language (“XML”), or another appropriate structured language inthis example. The handling of all requests and responses, as well as thedelivery of content between the client device 1202 and the applicationserver 1208, can be handled by the Web server. It should be understoodthat the Web and application servers are not required and are merelyexample components, as structured code discussed herein can be executedon any appropriate device or host machine as discussed elsewhere herein.

The data store 1210 can include several separate data tables, databasesor other data storage mechanisms and media for storing data relating toa particular aspect. For example, the data store illustrated includesmechanisms for storing production data 1212 and user information 1216,which can be used to serve content for the production side. The datastore also is shown to include a mechanism for storing log data 1214,which can be used for reporting, analysis, or other such purposes. Itshould be understood that there can be many other aspects that may needto be stored in the data store, such as for page image information andto access right information, which can be stored in any of the abovelisted mechanisms as appropriate or in additional mechanisms in the datastore 1210. The data store 1210 is operable, through logic associatedtherewith, to receive instructions from the application server 1208 andobtain, update or otherwise process data in response thereto. In oneexample, a user might submit a search request for a certain type ofitem. In this case, the data store might access the user information toverify the identity of the user and can access the catalog detailinformation to obtain information about items of that type. Theinformation then can be returned to the user, such as in a resultslisting on a Web page that the user is able to view via a browser on theuser device 1202. Information for a particular item of interest can beviewed in a dedicated page or window of the browser.

Each server typically will include an operating system that providesexecutable program instructions for the general administration andoperation of that server and typically will include a computer-readablestorage medium (e.g., a hard disk, random access memory, read onlymemory, etc.) storing instructions that, when executed by a processor ofthe server, allow the server to perform its intended functions. Suitableimplementations for the operating system and general functionality ofthe servers are known or commercially available and are readilyimplemented by persons having ordinary skill in the art, particularly inlight of the disclosure herein.

The environment in one embodiment is a distributed computing environmentutilizing several computer systems and components that areinterconnected via communication links, using one or more computernetworks or direct connections. However, it will be appreciated by thoseof ordinary skill in the art that such a system could operate equallywell in a system having fewer or a greater number of components than areillustrated in FIG. 12. Thus, the depiction of the system 1200 in FIG.12 should be taken as being illustrative in nature and not limiting tothe scope of the disclosure.

The various embodiments further can be implemented in a wide variety ofoperating environments, which in some cases can include one or more usercomputers, computing devices or processing devices which can be used tooperate any of a number of applications. User or client devices caninclude any of a number of general purpose personal computers, such asdesktop or laptop computers running a standard operating system, as wellas cellular, wireless, and handheld devices running mobile software andcapable of supporting a number of networking and messaging protocols.Such a system also can include a number of workstations running any of avariety of commercially-available operating systems and other knownapplications for purposes such as development and database management.These devices also can include other electronic devices, such as dummyterminals, thin-clients, gaming systems, and other devices capable ofcommunicating via a network.

Most embodiments utilize at least one network that would be familiar tothose skilled in the art for supporting communications using any of avariety of commercially-available protocols, such as TransmissionControl Protocol/Internet Protocol (“TCP/IP”), Open SystemInterconnection (“OSI”), File Transfer Protocol (“FTP”), Universal Plugand Play (“UpnP”), Network File System (“NFS”), Common Internet FileSystem (“CIFS”), and AppleTalk. The network can be, for example, a localarea network, a wide-area network, a virtual private network, theInternet, an intranet, an extranet, a public switched telephone network,an infrared network, a wireless network, and any combination thereof.

In embodiments utilizing a Web server, the Web server can run any of avariety of server or mid-tier applications, including Hypertext TransferProtocol (“HTTP”) servers, FTP servers, Common Gateway Interface (“CGI”)servers, data servers, Java servers, and business application servers.The server(s) also may be capable of executing programs or scripts inresponse to requests from user devices, such as by executing one or moreWeb applications that may be implemented as one or more scripts orprograms written in any programming language, such as Java®, C, C#, orC++, or any scripting language, such as Perl, Python, or TCL, as well ascombinations thereof. The server(s) may also include database servers,including without limitation those commercially available from Oracle®,Microsoft®, Sybase®, and IBM®.

The environment can include a variety of data stores and other memoryand storage media as discussed above. These can reside in a variety oflocations, such as on a storage medium local to (and/or resident in) oneor more of the computers or remote from any or all of the computersacross the network. In a particular set of embodiments, the informationmay reside in a storage-area network (“SAN”) familiar to those skilledin the art. Similarly, any necessary files for performing the functionsattributed to the computers, servers, or other network devices may bestored locally and/or remotely, as appropriate. Where a system includescomputerized devices, each such device can include hardware elementsthat may be electrically coupled via a bus, the elements including, forexample, at least one central processing unit (“CPU”), at least oneinput device (e.g., a mouse, keyboard, controller, touch screen, orkeypad), and at least one output device (e.g., a display device,printer, or speaker). Such a system may also include one or more storagedevices, such as disk drives, optical storage devices, and solid-statestorage devices such as random access memory (“RAM”) or read-only memory(“ROM”), as well as removable media devices, memory cards, flash cards,etc.

Such devices also can include a computer-readable storage media reader,a communications device (e.g., a modem, a network card (wireless orwired)), an infrared communication device, etc.), and working memory asdescribed above. The computer-readable storage media reader can beconnected with, or configured to receive, a computer-readable storagemedium, representing remote, local, fixed, and/or removable storagedevices as well as storage media for temporarily and/or more permanentlycontaining, storing, transmitting, and retrieving computer-readableinformation. The system and various devices also typically will includea number of software applications, modules, services, or other elementslocated within at least one working memory device, including anoperating system and application programs, such as a client applicationor Web browser. It should be appreciated that alternate embodiments mayhave numerous variations from that described above. For example,customized hardware might also be used and/or particular elements mightbe implemented in hardware, software (including portable software, suchas applets), or both. Further, connection to other computing devicessuch as network input/output devices may be employed.

Storage media computer readable media for containing code, or portionsof code, can include any appropriate media known or used in the art,including storage media and communication media, such as, but notlimited to, volatile and non-volatile, removable and non-removable mediaimplemented in any method or technology for storage and/or transmissionof information such as computer readable instructions, data structures,program modules, or other data, including RAM, ROM, ElectricallyErasable Programmable Read-Only Memory (“EEPROM”), flash memory or othermemory technology, Compact Disc Read-Only Memory (“CD-ROM”), digitalversatile disk (DVD), or other optical storage, magnetic cassettes,magnetic tape, magnetic disk storage, or other magnetic storage devices,or any other medium which can be used to store the desired informationand which can be accessed by a system device. Based on the disclosureand teachings provided herein, a person of ordinary skill in the artwill appreciate other ways and/or methods to implement the variousembodiments.

The specification and drawings are, accordingly, to be regarded in anillustrative rather than a restrictive sense. It will, however, beevident that various modifications and changes may be made thereuntowithout departing from the broader spirit and scope of the disclosure asset forth in the claims.

Other variations are within the spirit of the present disclosure. Thus,while the disclosed techniques are susceptible to various modificationsand alternative constructions, certain illustrated embodiments thereofare shown in the drawings and have been described above in detail. Itshould be understood, however, that there is no intention to limit thedisclosure to the specific form or forms disclosed, but on the contrary,the intention is to cover all modifications, alternative constructions,and equivalents falling within the spirit and scope of the disclosure,as defined in the appended claims.

What is claimed is:
 1. A method implemented by a device, the methodincluding: transmitting, to an access point, a first frame indicating afirst transition of the device to a power save mode according to a802.11 wireless protocol; and while in the power save mode and during acycle starting with a second transition of the device into an awakestate and ending with a third transition of the device into a sleepstate according to an 802.11 unscheduled automatic power save delivery(U-APSD) protocol: transitioning into the awake state after an amount oftime from the first transition of the device to the power save mode;determining that the device has no data to transmit to the access point;determining, from a counter, a sequence number associated with datatransmission from the device to the access point, the device increasingthe counter sequentially per data transmission; generating an addressresolution protocol (ARP) frame that includes the sequence number and apower management bit, the power management bit set to a value indicatingthat the device is in the awake state; transmitting the ARP frame to theaccess point; receiving, during the cycle, data from the access point,the data being stored in memory buffer of the access point prior to theARP frame being transmitted, the data being transmitted by the accesspoint in response to the ARP frame; receiving, from the access point,end of service period (EOSP) data indicating that the access point hasno additional data to transmit to the device during the cycle; andtransitioning into the sleep state.
 2. The method of claim 1, furtherincluding protecting the ARP frame by at least: generatingauthentication data by hashing a media access control (MAC) header ofthe ARP frame; encrypting the authentication data; and including theauthentication data as encrypted in a payload field of the ARP frame,wherein the data is transmitted by the access point following adecryption of the payload field and a validation of the authenticationdata by the access point.
 3. The method of claim 1, further including:determining, upon receiving the EOSP data, a delay interval, the delayinterval being predefined for the cycle; transmitting, to the accesspoint, a first acknowledgment of the EOSP data being received; stayingin the awake state after receiving the EOSP data and for a duration ofthe delay interval; receiving, during the delay interval, aretransmission of the EOSP data; and transmitting, to the access point,a second acknowledgment of the retransmission of the EOSP data, whereintransitioning into the sleep state is performed at an end of the delayinterval.
 4. A device including: one or more processors; and one or morememories storing computer-readable instructions that, upon execution bythe one or more processors, configure the device to: enter into a powersave mode; and while in the power save mode: transition into an awakestate after an amount of time from entering into the power save mode;determine that the device has no data to transmit to a network accessdevice; determine a sequence number associated with data transmission tothe network access device; generate a frame that includes a header fieldand a payload field, the header field including the sequence number andpower management data of the device, the power management dataindicating a transition of the device into the awake state; and transmitthe frame to the network access device.
 5. The device of claim 4,wherein the one or more memories store further computer-readableinstructions that, upon execution by the one or more processors,configure the device to: receive, while in the awake state, a secondframe from the network access device, the second frame including an endof service period (EOSP) bit indicating that the network access devicehas no data to transmit to the device; determine a delay interval; stayin the awake state after receiving the second frame and for a durationof the delay interval; and transition into a sleep state at an end ofthe delay interval.
 6. The device of claim 4, wherein the one or morememories store further computer-readable instructions that, uponexecution by the one or more processors, configure the device to:determine a category associated with the data transmission, the categorybeing one of: audio data transmission, video data transmission,background data transmission, or best effort data transmission;determine a counter that is associated with the category and that storesa count of previous data transmissions; and generate the sequence numberby increasing the count.
 7. The device of claim 4, wherein the frame isa vendor specific frame that includes a logical link control (LLC)header and a subnetwork access protocol (SNAP) header, and wherein thesequence number is included in the LLC header, and wherein the payloadfield is included in the SNAP header.
 8. The device of claim 4, whereinthe frame is a vendor specific frame, and wherein the one or morememories store further computer-readable instructions that, uponexecution by the one or more processors, configure the device to:transition into a sleep state; generate a second sequence numberassociated with the data transmission; generate an address resolutionprotocol (ARP) frame that includes the second sequence number and secondpower management data of the device, the second power management dataindicating another transition of the device to the awake state; andtransmit the ARP frame to the network access device.
 9. The device ofclaim 4, wherein the one or more memories store furthercomputer-readable instructions that, upon execution by the one or moreprocessors, configure the device to: receive, while in the awake state,data from the network access device; receive, from the network accessdevice, end of service period (EOSP) data indicating that the networkaccess device has no additional data to transmit to the device; andtransition into a sleep state.
 10. The device of claim 9, wherein theone or more memories store additional computer-readable instructionsthat, upon execution by the one or more processors, configure the deviceto: transmit, to the network access device and while in the awake state,an acknowledgement about receipt of the EOSP data; remain in the awakestate for a duration of a delay interval; determine that the EOSP datawas not retransmitted by the network access device during the duration;and transition into the sleep state at an end of a delay interval. 11.The device of claim 9, wherein the one or more memories store additionalcomputer-readable instructions that, upon execution by the one or moreprocessors, configure the device to: transmit, to the network accessdevice and while in the awake state, an acknowledgement about receipt ofthe EOSP data; remain in the awake state for a duration of a delayinterval; determine that the EOSP data was retransmitted by the networkaccess device during the duration; extend the duration of the delayinterval by an extension interval; and transition into the sleep stateat an end of the delay interval as extended by the extension interval.12. The device of claim 4, wherein the frame is an ARP frame, andwherein the one or more memories store further computer-readableinstructions that, upon execution by the one or more processors,configure the device to: receive, while in the awake state and from thenetwork access device, a quality of service (QOS) null frame indicatingthat the network access device has no data to transmit to the networkaccess device; transmit, to the network access device and while in theawake state, an acknowledgement about receipt of the QOS null frame; andtransition into a sleep state at an end of a delay interval.
 13. One ormore non-transitory computer-readable storage media storing instructionsthat, upon execution on a device, cause the device to perform operationsthat include: entering into a power save mode; and while in the powersave mode: transitioning into an awake state after an amount of timefrom entering into the power save mode; determining that the device hasno data to transmit to a network access device; determining a sequencenumber associated with data transmission to the network access device;generating a frame that includes a header field and a payload field, theheader field including the sequence number and power management data ofthe device, the power management data indicating a transition of thedevice to the awake state; and transmitting the frame to the networkaccess device.
 14. The one or more non-transitory computer-readablestorage media of claim 13, further storing second instructions that,upon execution on the device, cause the device to perform secondoperations that include: receiving, while in the awake state and fromthe network access device, a QoS null frame, data frame, or a vendorspecific frame indicating that the network access device has no data totransmit to the network access device; and transitioning into a sleepstate based at least in part on a delay interval.
 15. The one or morenon-transitory computer-readable storage media of claim 14, furtherstoring third instructions that, upon execution on the device, cause thedevice to perform third operations that include: determining the delayinterval based at least in part on one or more of: a packet error rate,or a difference between an expected frame rate and a detected framerate, wherein the sleep state is transitioned into at an end of thedelay interval.
 16. The one or more non-transitory computer-readablestorage media of claim 13, further storing second instructions that,upon execution on the device, cause the device to perform secondoperations that include: receiving, while in the awake state and fromthe network access device, a QoS null frame, data frame, or a vendorspecific frame indicating that the network access device has no data totransmit to the network access device; determining a trigger to delay atransition into a sleep state, the trigger comprising at least one of: apacket error rate, or a difference between an expected frame rate and adetected frame rate; and transitioning into the sleep state at an end ofa delay interval.
 17. The one or more non-transitory computer-readablestorage media of claim 16, wherein a duration of the delay interval isbased at least in part on the packet error rate or the differencebetween the expected frame rate and the detected frame rate.
 18. The oneor more non-transitory computer-readable storage media of claim 13,further storing second instructions that, upon execution on the device,cause the device to perform second operations that include: receiving,while in the awake state and from the network access device, a QoS nullframe, data frame, or a vendor specific frame indicating that thenetwork access device has no data to transmit to the network accessdevice; refraining from transitioning into a sleep state for a durationof a delay interval; receiving, during the delay interval and from thenetwork access device, a retransmission of the frame from the networkaccess device; extending the duration of the delay interval by anextension interval; and transitioning into the sleep state at an end ofthe delay interval as extended by the extension interval.
 19. The one ormore non-transitory computer-readable storage media of claim 18, whereina duration of the extension interval is based at least in part on anumber of extensions of the delay interval.
 20. The one or morenon-transitory computer-readable storage media of claim 13, wherein theframe is a first protected frame that comprises encrypted authenticationdata in the payload field, and further storing second instructions that,upon execution on the device, cause the device to perform secondoperations that include: receiving, while in the awake state and fromthe network access device, a second protected frame indicating that thenetwork access device has no data to transmit to the network accessdevice; validating the second protected frame; and transitioning into asleep state.