System and Method for Auto-Detection of WLAN Packets using STF

ABSTRACT

A method of auto-detection of WLAN packets includes selecting a first Golay sequence from a first pair of Golay complementary sequences associated with first packet type, each Golay sequence of the first pair of Golay complementary sequences being zero correlation zone (ZCZ) sequences with each Golay sequence of a second pair of Golay complementary sequences associated with a second packet type, and transmitting a wireless packet carrying a short training field (STF) that includes one or more instances of the first Golay sequence.

This application is a divisional of U.S. application Ser. No. 15/043,089, filed on Feb. 12, 2016, and entitled “System and Method for Auto-Detection of WLAN Packets using STF,” which claims priority to U.S. Provisional Application No. 62/115,445, filed on Feb. 12, 2015, and entitled “Method and Apparatus for Auto-Detection of WLAN Packets,” and U.S. Provisional Application No. 62/219,794, filed on Sep. 17, 2015, and entitled “System and Method for Auto-Detection of 60 GHz WLAN Packets in STF,” all of which applications are hereby incorporated by reference herein in their entireties.

TECHNICAL FIELD

The present invention relates generally to wireless networks, and in particular embodiments, to techniques and mechanisms for auto-detection of wireless local area network (WLAN) packets.

BACKGROUND

With the increasing demands of high-definition (HD) displays and other applications, and with the widespread usage of smart phones and tablets, next generation WLANs capable of transmission at higher data rates are needed. IEEE 802.11ad is a WLAN technique that operates in the globally unlicensed 60 GHz band, e.g., 57-66 GHz. Next generation 60 GHz WLANs (NG60), capable of even higher performance than 802.11ad, have been proposed. Although such networks may be capable of higher performance, there is also a need for them to be compatible with current 802.11ad devices.

SUMMARY OF THE INVENTION

Technical advantages are generally achieved by embodiments of this disclosure, which describe auto-detection of WLAN packets.

In accordance with an embodiment, a method is provided. The method includes receiving a wireless packet in a 60 GHz frequency band comprising a short training field (STF), determining a first quantity of cross-correlation peaks between the STF and a first preamble component sequence, and a second quantity of cross-correlation peaks between the STF and a second preamble component sequence, the first quantity being a first threshold or the second quantity being a second threshold for a first packet type, the first quantity being the second threshold or the second quantity being the first threshold for a second packet type, and determining that the wireless packet is the second packet type when the first quantity of cross-correlation peaks equals the second threshold or the second quantity of cross-correlation peaks equals the first threshold.

In some embodiments, the first threshold is forty-eight and the second threshold is sixteen. In some embodiments, the first packet type is an Institute of Electrical and Electronics Engineers (IEEE) 802.11ad packet type, and the second packet type is an IEEE 802.11ay packet type. In some embodiments, the first preamble component sequence is Ga₁₂₈ and the second preamble component sequence is Gb₁₂₈.

In accordance with an embodiment, a method is provided. The method includes transmitting in a 60 GHz frequency band a wireless packet comprising a short training field (STF), a header, a payload, and a training field, the STF producing a first quantity of cross-correlation peaks when correlated with a first preamble component sequence, the STF producing a second quantity of cross-correlation peaks when correlated with a second preamble component sequence, the first quantity being a first threshold or the second quantity being a second threshold for a first packet type, the first quantity being the second threshold or the second quantity being the first threshold for a second packet type.

In some embodiments, the first threshold is forty-eight and the second threshold is sixteen. In some embodiments, the first packet type is an Institute of Electrical and Electronics Engineers (IEEE) 802.11ad packet type, and the second packet type is an IEEE 802.11ay packet type. In some embodiments, the first preamble component sequence is Gb₁₂₈ and the second preamble component sequence is Ga₁₂₈.

In accordance with an embodiment, a method is provided. The method includes receiving a wireless packet in a 60 GHz frequency band comprising a short training field (STF), determining a first quantity of cross-correlation peaks between the STF and a first preamble component sequence, and a second quantity of cross-correlation peaks between the STF and a second preamble component sequence, the first quantity being a first threshold or the second quantity being a second threshold for a first packet type, removing a phase shift from the STF to produce a phase shifted STF, determining a third quantity of cross-correlation peaks between the phase shifted STF and the first preamble component sequence, and a fourth quantity of cross-correlation peaks between the phase shifted STF and the second preamble component sequence, and determining that the wireless packet is a second packet type when the third quantity equals the first threshold or the fourth quantity equals the second threshold.

In some embodiments, the first packet type is an Institute of Electrical and Electronics Engineers (IEEE) 802.11ad packet type, and the second packet type is an IEEE 802.11ay packet type. In some embodiments, removing the phase shift from the STF comprises applying a linear phase rotation other than

$e^{j\pi \frac{n}{2}}$

to the STF. In some embodiments, removing the phase shift from the STF comprises applying a block rotation to the STF.

In accordance with an embodiment, a method is provided. The method includes adding a phase shift to a short training field (STF) to produce a phase shifted STF, and transmitting in a 60 GHz frequency band a wireless packet comprising the phase shifted STF, a header, a payload, and a training field, the phase shifted STF producing a first quantity of cross-correlation peaks when correlated with a first preamble component sequence and a second quantity of cross-correlation peaks when correlated with a second preamble component sequence, the phase shifted STF producing a third quantity of cross-correlation peaks when correlated with the first preamble component sequence and a fourth quantity of cross-correlation peaks when correlated with the second preamble component sequence after the phase shift is removed from the phase shifted STF, the first quantity being a first threshold or the second quantity being a second threshold for a first packet type, the third quantity being the first threshold or the fourth quantity being the second threshold for a second packet type.

In some embodiments, the first packet type is an Institute of Electrical and Electronics Engineers (IEEE) 802.11ad packet type, and the second packet type is an IEEE 802.11ay packet type. In some embodiments, adding the phase shift to the STF comprises applying a linear phase rotation other than

$e^{j\pi \frac{n}{2}}$

to the STF. In some embodiments, adding the phase shift to the STF comprises applying a block rotation to the STF.

In accordance with an embodiment, a method is provided. The method includes receiving a wireless packet comprising a short training field (STF), determining cross-correlations between the STF and a first preamble component sequence from a first set of preamble component sequences associated with a first packet type and between the STF and a second preamble component sequence from a second set of preamble component sequences associated with a second packet type, the first preamble component sequence and the second preamble component sequence having a zero correlation zone (ZCZ) property, and determining that the wireless packet is the second packet type when there is a greater correlation between the STF and the second preamble component sequence than between the STF and the first preamble component sequence.

In some embodiments, the first packet type is an Institute of Electrical and Electronics Engineers (IEEE) 802.11ad packet type, and the second packet type is an IEEE 802.11ay packet type. In some embodiments, the ZCZ property is a ZCZ of at least 64 symbol time slots in width. In some embodiments, the first set of preamble component sequences comprise preamble component sequences Ga₁₂₈ and Gb₁₂₈. In some embodiments, the second set of preamble component sequences comprise preamble component sequences Ga_(128,new,1) and Gb_(128,new,1). In some embodiments, the second set of preamble component sequences comprise mutual ZCZ sequences. In some embodiments, the mutual ZCZ sequences comprise preamble component sequences Ga_(128,new,2) and Gb_(128,new,2). In some embodiments, the second set of preamble component sequences comprise quadrature phase shift keying (QPSK) modulated preamble component sequences. In some embodiments, the QPSK modulated preamble component sequences comprise preamble component sequences A₁₂₈ and B₁₂₈.

In accordance with an embodiment, a method is provided. The method includes selecting a first Golay sequence from a first pair of Golay complementary sequences associated with first packet type, each Golay sequence of the first pair of Golay complementary sequences being zero correlation zone (ZCZ) sequences with each Golay sequence of a second pair of Golay complementary sequences associated with a second packet type, and transmitting a wireless packet carrying a short training field (STF) that includes one or more instances of the first Golay sequence.

In some embodiments, the first pair of Golay complementary sequences comprise preamble component sequences Ga_(128,new,1) and Gb_(128,new,1). In some embodiments, the first pair of Golay complementary sequences comprise mutual ZCZ sequences. In some embodiments, the mutual ZCZ sequences comprise preamble component sequences Ga_(128,new,2) and Gb_(128,new,2). In some embodiments, the first pair of Golay complementary sequences comprise quadrature phase shift keying (QPSK) modulated Golay complementary sequences. In some embodiments, the QPSK modulated Golay complementary sequences comprise preamble component sequences A₁₂₈ and B₁₂₈. In some embodiments, transmitting the wireless packet comprises transmitting a real portion of the QPSK modulated Golay complementary sequences on a first antenna and transmitting an imaginary portion of the QPSK modulated Golay complementary sequences on a second antenna.

BRIEF DESCRIPTION OF THE DRAWINGS

For a more complete understanding of the present invention, and the advantages thereof, reference is now made to the following description taken in conjunction with the accompanying drawings, in which:

FIG. 1 is a diagram of an embodiment wireless communications network;

FIG. 2 is a diagram of a packet;

FIGS. 3A and 3B show preamble component sequences for PHY packets;

FIGS. 4A and 4B are diagrams of a non-control STF and a control STF;

FIGS. 5A-5D are diagrams of correlation properties of STFs with various preamble component sequences;

FIGS. 6A-8B illustrate a first auto-detection scheme using STFs;

FIGS. 9A-11B illustrate a second auto-detection scheme using STFs;

FIGS. 12A-16B illustrate a third auto-detection scheme using STFs;

FIGS. 17A-21B illustrate a fourth auto-detection scheme using STFs;

FIGS. 22A-25B illustrate a fifth auto-detection scheme using STFs;

FIG. 26 is a diagram of an embodiment processing system; and

FIG. 27 is a block diagram of a transceiver.

Corresponding numerals and symbols in the different figures generally refer to corresponding parts unless otherwise indicated. The figures are drawn to clearly illustrate the relevant aspects of the embodiments and are not necessarily drawn to scale.

DETAILED DESCRIPTION OF ILLUSTRATIVE EMBODIMENTS

The making and using of embodiments of this disclosure are discussed in detail below. It should be appreciated, however, that the concepts disclosed herein can be embodied in a wide variety of specific contexts, and that the specific embodiments discussed herein are merely illustrative and do not serve to limit the scope of the claims. Further, it should be understood that various changes, substitutions and alterations can be made herein without departing from the spirit and scope of this disclosure as defined by the appended claims.

IEEE 802.11ay is currently being developed as an NG60 extension to IEEE 802.11ad, with a goal of achieving extended throughput and range. Disclosed herein is a system and method for using short training fields to determine whether a received wireless physical (PHY) packet is an IEEE 802.11ay control packet, an IEEE 802.11ay non-control packet, an IEEE 802.11ad control packet, or an IEEE 802.11ad non-control packet.

In particular, STF fields in IEEE 802.11ay packets may be different from STF fields in IEEE 802.11ad packets such that a different numbers of cross-correlation peaks result when the respective STFs are cross-correlated with one or more preamble component sequences. As a result, an IEEE 802.11ay receiver may be able to distinguish IEEE 802.11ay packets from IEEE 802.11ad packets by performing cross-correlation. For example, the IEEE 802.11ay receiver may determine a number of cross-correlation peaks between an STF in a packet and a first preamble component sequence, and a number of cross-correlation peaks between the STF in the packet and a second preamble component sequence. The first preamble component sequence and the second preamble component sequence may be complementary sequences that have an out-of-phase aperiodic autocorrelation coefficients sum that is zero. In one embodiment, the first preamble component sequence and the second preamble component sequence form Golay pairs. The IEEE 802.11ay receiver may then determine whether the packet is an IEEE 802.11ay packet or an IEEE 802.11ad packet based on the numbers of correlation peaks between the STF in the packet and the first and second pairs of preamble component sequences. The IEEE 802.11ay receiver may determine that the packet is an IEEE 802.11ad packet when a number of cross-correlation peaks between the STF in the packet and the first preamble component sequence exceeds a first threshold (e.g., 16 peaks) or when a number of cross-correlation peaks between the STF in the packet and the second preamble component sequence exceeds a second threshold (e.g., 48 peaks). The IEEE 802.11ay receiver may determine that the packet is an IEEE 802.11ay packet when a number of cross-correlation peaks between the STF in the packet and the second preamble component sequence exceeds a first threshold (e.g., 16 peaks) or when a number of cross-correlation peaks between the STF in the packet and the first preamble sequence exceeds a second threshold (e.g., 48 peaks). Because embodiment 802.11ay packets can be distinguished from 802.11ad packets, 802.11ad receivers may discard 802.11ay packets, rather than continuing to process incompatible packets, which may reduce power consumption at the 802.11ad receivers. Such savings may be accomplished without reprogramming existing 802.11ad receivers, because such receivers already work in a way that allows them to discard embodiment 802.11ay packets.

Other techniques for distinguishing IEEE 802.11ay packets from IEEE 802.11ad packets are disclosed. In some embodiments, IEEE 802.11ay packets are transmitted using preamble component sequences that are phase-rotated variants of the preamble component sequences used to transmit IEEE 802.11ad packets. As a result, an IEEE 802.11ay receiver may be able to distinguish IEEE 802.11ay packets from IEEE 802.11ad packets by determining a number of cross-correlation peaks between an STF in a packet and a pair of preamble component sequences, then removing a phase rotation from the STF and determining a number of cross-correlation peaks between the phase-rotated STF and the same pair of preamble component sequences. The IEEE 802.11ay receiver may then determine whether the packet is an IEEE 802.11ay packet or an IEEE 802.11ad packet according to whether the STF or the phase-rotated STF has a higher degree of cross-correlation with the preamble component sequences.

In some embodiments, preamble component sequences are selected for the STFs of control and non-control 802.11ay packets such that these preamble component sequences for 802.11ay are mutual zero correlation zone (ZCZ) sequences with respective preamble component sequences for 802.11ad. Preamble component sequences are sequences of symbols transmitted in the preamble (e.g., STF, CEF) of a frame that are known to a receiver and transmitter. The preamble component sequences in IEEE 802.11ad and 802.11ay are Golay complimentary sequences. In some embodiments, preamble component sequences are selected for the STFs of control and non-control packets in an 802.11ay packet such that these preamble component sequences are mutual zero correlation zone (ZCZ) sequences with a zero correlation zone in a range of about 65 time-domain symbol spacings. In some embodiments, the preamble component sequences for control and non-control 802.11ay packets are QPSK-modulated for use in 802.11ay packets.

Various embodiments may achieve advantages. By performing auto-detection in the STF, CEF, and/or header(s), a receiver may identify the format of a received packet at an early stage of reception. In particular, auto-detection can be performed very early in the reception pipeline in embodiment Physical Layer Convergence Protocol (PLCP) Protocol Data Units (PPDUs) that receive the STF before the CEF, header, or data fields. Additionally, proper selection of the STF and/or CEF of an 802.11ay packet may permit legacy 802.11ad devices to detect the length and modulation coding scheme (MCS) of 802.11ay packets, which may reduce ambiguity during auto-detection.

FIG. 1 is a diagram of a network 100 for communicating data. The network 100 comprises an access point (AP) 110 having a coverage area 101, a plurality of mobile devices 120, and a backhaul network 130. As shown, the AP 110 establishes uplink (dashed line) and/or downlink (dotted line) connections with the mobile devices 120, which serve to carry data from the mobile devices 120 to the AP 110 and vice-versa. Data carried over the uplink/downlink connections may include data communicated between the mobile devices 120, as well as data communicated to/from a remote-end (not shown) by way of the backhaul network 130. As used herein, the term “access point” refers to any component (or collection of components) configured to provide wireless access in a network, such as an evolved NodeB (eNB), a macro-cell, a femtocell, a Wi-Fi AP, or other wirelessly enabled devices. APs may provide wireless access in accordance with one or more wireless communication protocols, e.g., Long Term Evolution (LTE), LTE advanced (LTE-A), High Speed Packet Access (HSPA), Wi-Fi 802.11a/b/g/n/ac, etc. As used herein, the term “mobile device” refers to any component (or collection of components) capable of establishing a wireless connection with an access point, such as a user equipment (UE), a mobile station (STA), and other wirelessly enabled devices. In some embodiments, the network 100 may comprise various other wireless devices, such as relays, low power nodes, etc. Embodiment techniques may be performed on a receiver in the network 100, such as the AP 110.

PPDUs are units of data transmitted over the physical (PHY) layer of a network, e.g., Layer 1 of the Open Systems Interconnection (OSI) model. PPDUs are structured data units that include information such as address information, protocol-control information, and/or user data. The packet structure of a PPDU typically includes a short training field (STF), channel estimation field (CEF), header field, and data payload. Some PPDUs may also include a legacy header field (L-Header) and an NG60 header (N-Header) field. Auto-detection may be performed by detecting the preamble of an 802.11ad PPDU, such as the STF and CEF, and/or the header(s). In particular, the STF and CEF in 802.11ad use structured bipolar-based complementary Golay sequences, which have several beneficial correlation properties that may be leverage by APs to enable auto-detection for 802.11ay networks.

FIG. 2 is a diagram of a packet 200. The packet 200 may be a wireless PHY packet, and may be a control or non-control packet. Control PHY packets typically carry control information in their payloads, and non-control PHY packets typically carry data in their payloads. Non-control PHY packets may be transmitted using various waveforms, such as single carrier (SC) waveforms and orthogonal frequency-division multiplexed (OFDM) waveforms. A receiver may need to determine whether the packet 200 is a non-control or control PHY packet upon receiving the packet 200. The receiver may also need to determine whether the packet 200 is an 802.11ad or an 802.11ay packet.

The packet 200 includes a STF 202, a CEF 204, a header 206, a payload 208, and training fields 210. It should be appreciated that the packet 200 could include other fields. The STF 202 and the CEF 204 are commonly referred to in combination as a packet preamble 212. In some embodiments, the STF 202 is used to determine whether the packet 200 is a control or non-control PHY packet, and whether the packet is an 802.11ad or an 802.11ay PHY packet.

The CEF 204 is used for channel estimation. If the packet 200 is a non-control packet, then the CEF 204 may also allow the receiver to determine what kind of waveform was used to communicate the packet 200, e.g., an SC waveform or an OFDM waveform.

The header 206 may contain indicators or parameters that allow the receiver to decode the payload 208. In some embodiments, the header 206 may be used to determine whether the packet is an 802.11ad PHY packet or an 802.11ay PHY packet.

The payload 208 contains information (e.g., data) carried by the packet 200. The training fields 210 may include other fields such as automatic gain control (AGC) and training (TRN) R/T subfields appended to the packet 200.

FIGS. 3A and 3B show preamble component sequences for PHY packets. The preamble component sequences are bipolar-based Golay complementary sequences having a length of 128 symbols. The preamble component sequences shown in FIG. 3A-B are referred to by IEEE 802.11ad as Ga₁₂₈ and Gb₁₂₈, respectively. The sequences Ga₁₂₈ and Gb₁₂₈ are Golay sequences that form a complementary pair, and the subscript indicates the sequence length of 128. The preamble component sequences Ga₁₂₈ and Gb₁₂₈ may be binary phase-shift keyed (BPSK), such that they are located at 0° and 180° on the unit circle, e.g., each symbol has a modulated value of either 1 or −1. The preamble component sequences Ga₁₂₈ and Gb₁₂₈ may be transmitted in the STF of a PHY packet, such as the STF 202 of packet 200.

FIGS. 4A and 4B are diagrams of a non-control STF 400 and a control STF 450, respectively, which are included in an 802.11ad packet preamble. The non-control STF 400 and the control STF 450 each include repeated sequences 402, 452 and a termination sequence 404, 454. The control STF 450 further includes a prefix sequence 456 after the termination sequence 454.

The repeated sequences 402, 452 are multiple repetitions of the preamble component sequences Ga₁₂₈ or Gb₁₂₈. The type and quantities of sequences in the repeated sequences 402, 452 may be different between the non-control STF 400 and a control STF 450 so that a receiver may distinguish a non-control 802.11ad PHY packet from a control 802.11ad PHY packet. For example, the repeated sequence 402 may be 16 repetitions of the preamble component sequence Ga₁₂₈, and the repeated sequence 452 may be 48 repetitions of the preamble component sequence Gb₁₂₈.

The termination sequences 404, 454 occur at the end of the repetition portion of the non-control STF 400 and the control STF 450, respectively, and thus mark the end of the non-control STF 400 and the control STF 450. As discussed above, an STF may include different values and have different lengths for a non-control or control PHY packet. As such, the termination sequences 404, 454 are predetermined sequences that indicate the end of an STF. The termination sequences 404, 454 are negative instances of the preamble component sequence used in the repeated sequence 402, 452, e.g., where each symbol in the termination sequences 404, 454 is multiplied by −1. For example, when the repeated sequence 452 is several repetitions of the preamble component sequence Gb₁₂₈, then the termination sequence 454 is a negated preamble component sequence −Gb₁₂₈. Accordingly, the preamble component sequences −Ga₁₂₈ and −Gb₁₂₈ may be chosen, respectively, for the termination sequences 404, 454.

The prefix sequence 456 occurs after the termination sequence 454 in the control STF 450. The prefix sequence 456 is a preamble component sequence −Ga₁₂₈ and is used as the cyclic prefix for the CEF 204. The termination sequence 404 of the non-control STF 400 also functions as a prefix sequence for the CEF 204, because the termination sequence 404 is also the preamble component sequence −Ga₁₂₈.

FIGS. 5A and 5B are diagrams of correlation properties of the non-control STF 400 and the control STF 450 with the preamble component sequences Ga₁₂₈ and Gb₁₂₈, respectively. A receiver may perform cross-correlation to determine whether a received sequence matches a known sequence. For example, a receiver may cross-correlate a received STF with the preamble component sequences Ga₁₂₈ and Gb₁₂₈ to determine which preamble component sequence is carried within the STF.

As shown in FIG. 5A, when the non-control STF 400 is correlated with the preamble component sequence Ga₁₂₈, 16 positive impulses and a negative impulse are generated. The 16 positive impulses correspond to correlation peaks with the 16 positive repetitions of the preamble component sequence Ga₁₂₈ in the repeated sequence 402, and the negative impulse corresponds to correlation peaks with the negative instance of the preamble component sequence Ga₁₂₈ in the termination sequence 406. The produced impulses are normalized to have a unit maximum magnitude, e.g., a maximum magnitude of 1 or −1. As shown in FIG. 5B, when the non-control STF 400 is correlated with the preamble component sequence Gb₁₂₈, no correlation peaks are generated. Some noise may be generated, but the magnitude of the noise may not be large enough to register as a correlation peak. As shown in FIGS. 5A and 5B, while the magnitude of the noise is low, there is still an appreciable amount of noise present even when no correlation peak is generated. Accordingly, by cross-correlating an STF in a received packet with both of the preamble component sequences Ga₁₂₈ and Gb₁₂₈, a receiver may be able to determine whether or not the packet is a non-control 802.11ad packet.

FIGS. 5C and 5D are diagrams of correlation properties of the control STF 450 with the preamble component sequences Ga₁₂₈ and Gb₁₂₈, respectively. As shown in FIG. 5C, when the control STF 450 is correlated with the preamble component sequence Ga₁₂₈, one negative cross-correlation peak is generated. This is because, as shown above, the control STF 450 contains one negative instance of the preamble component sequence Ga₁₂₈. When the control STF 450 is correlated with the preamble component sequence Gb₁₂₈, 48 positive impulses and a negative impulse are generated. These impulses correspond to the 48 positive repetitions of the preamble component sequence Gb₁₂₈ in the repeated sequence 452 and the one negative instance of the preamble component sequence Gb₁₂₈ in the prefix sequence 456. Accordingly, by cross-correlating an STF in a received packet with both of the preamble component sequences Ga₁₂₈ and Gb₁₂₈, a receiver may be able to determine whether or not the packet is an 802.11ad control packet.

Embodiment receivers may also auto-detect receipt of an 802.11ay packet using the STF field. Accordingly, in some embodiments, STFs for 802.11ay packets may be selected such that they are different from STFs for 802.11ad packets. Embodiment receivers may then perform auto-detection of WLAN packets using the STF of received PHY packets. 802.11ay packets may be distinguished from 802.11ad packets using auto-detection schemes, according to autocorrelation and cross-correlation properties of the STFs with various preamble component sequences.

FIGS. 6A-8B illustrate a first auto-detection scheme using STFs in which the preamble component sequences Ga₁₂₈ and Gb₁₂₈, which are used in 802.11ad STFs, may also be used in 802.11ay STFs. In order to distinguish 802.11ay packets from 802.11ad packets, the preamble component sequences Ga₁₂₈ and Gb₁₂₈ may be interchanged between control and non-control STFs in 802.11ay such that Ga₁₂₈ is used for the repeated sequences in an 802.11ay control packet and Gb₁₂₈ is used for the repeated sequences in an 802.11ay non-control packet.

FIGS. 6A and 6B are diagrams of a non-control STF 600 and a control STF 650, respectively, which are included in an 802.11ay packet preamble. The non-control STF 600 and the control STF 650 each include repeated sequences 602, 652, a termination sequence 604, 654, and a prefix sequence 606, 656.

The repeated sequence 602 of the non-control STF 600 includes 16 repetitions of the preamble component sequence Gb₁₂₈, and the control STF 650 includes 48 repetitions of the preamble component sequence Ga₁₂₈. The termination sequence 604, 654 in each STF includes a negative instance of the preamble component sequence used in the repeated sequences 602, 652, i.e., the sequence 604 has one repetition of −Gb₁₂₈, and the sequence 654 has one repetition of −Ga₁₂₈.

In some embodiments, the prefix sequence 606, 656 is a predefined sequence, such as −Ga₁₂₈, used above in the non-control STF 400 and the control STF 450. Adding a single repetition of −Ga₁₂₈ to the control STF 650 may assist in degrading channel estimation for an 802.11ad receiver that receives an 802.11ay PHY packet. An 802.11ad receiver may incorrectly identify a received control STF 650 as a non-control STF after detecting the repeated sequences 652 and the termination sequence 654. Adding a second repetition of −Ga₁₂₈ after the termination sequence 654 prevents the 802.11ad receiver from successfully detecting the CEF 204.

FIGS. 7A-7D are diagrams of cross-correlation properties for the non-control STF 600 and the control STF 650 with the preamble component sequences Gb₁₂₈ and Ga₁₂₈. FIG. 7A is a diagram of cross-correlation properties of the non-control STF 600 with the preamble component sequence Ga₁₂₈. FIG. 7B is a diagram of cross-correlation properties of the non-control STF 600 with the preamble component sequence Gb₁₂₈. FIG. 7C is a diagram of cross-correlation properties of the control STF 650 with the preamble component sequence Ga₁₂₈. FIG. 7D is a diagram of cross-correlation properties of the control STF 650 with the preamble component sequence Gb₁₂₈.

As shown in FIGS. 7A-7D and FIGS. 5A-5D, a relationship exists between the PHY packet type of a received STF, and a number of peaks generated when the received STF is cross-correlated with different preamble component sequences. This relationship can be expressed as a lookup table, as shown below in Table 1.

TABLE 1 Preamble Seq. Qty. Peaks Result Reference Ga₁₂₈ 16 802.11ad; non-control FIG. 5A Gb₁₂₈ 48 802.11ad; control FIG. 5D Gb₁₂₈ 16 802.11ay; non-control FIG. 7B Ga₁₂₈ 48 802.11ay; control FIG. 7C

As shown above in Table 1, a received PHY packet type can be determined by cross-correlating the STF with the preamble component sequences Ga₁₂₈ and Gb₁₂₈ and counting the number of positive peaks in the correlation result. Also included in Table 1 is a reference to the Figure number that shows a typical cross-correlation result for particular packet and frame types.

FIG. 8A is a diagram of an embodiment 802.11ay auto-detection method 800. The 802.11ay auto-detection method 800 may be indicative of operations occurring in an 802.11ay receiver when determining the PHY packet type of a received packet using the STF.

The 802.11ay auto-detection method 800 begins by correlating a received STF with the preamble component sequences Ga₁₂₈ and Gb₁₂₈ (step 802). Next, the correlation peaks for each preamble component sequence are detected and counted (step 804). If correlation of the received STF produces about 48 peaks for the preamble component sequence Ga₁₂₈ or about 16 peaks for the preamble component sequence Gb₁₂₈ (step 806), the packet is identified as an 802.11ay packet (step 808). In cases where correlation with one preamble component sequence produces peaks, correlation with the other sequence may produce other values that are not considered peaks, such as noise or zero values. For example, as shown in FIGS. 7C and 7D if 48 peaks are produced when correlated with the preamble component sequence Ga₁₂₈, then those 48 peaks will not be produced when correlated with the preamble component sequence Gb₁₂₈. Next, demodulation and decoding of the packet is continued until the end of the 802.11ay packet (step 810).

If correlation of the STF produces 16 peaks for the preamble component sequence Ga₁₂₈ or 48 peaks for the preamble component sequence Gb₁₂₈ (step 812), the packet is identified as an 802.11ad packet (step 814). Finally, demodulation and decoding of the packet is continued until the end of the 802.11ad packet (step 816).

FIG. 8B is a diagram of embodiment 802.11ad auto-detection method 850. The 802.11ad auto-detection method 850 may be indicative of operations occurring in an 802.11ad receiver when determining the PHY packet type of a received packet using the STF. Because an 802.11ad receiver may not be capable of detecting 802.11ay packets, the 802.11ad auto-detection method 850 may thus avoid incorrectly identifying a received 802.11ay packet as a compatible packet for an 802.11ad receiver.

The 802.11ad auto-detection method 850 begins by receiving an 802.11ay STF and correlating it with the preamble component sequences Ga₁₂₈ and Gb₁₂₈ (step 852). Next, the correlation peaks for each preamble component sequence are detected and counted (step 854). Next, the receiver determines whether correlation of the STF with the preamble component sequence Ga₁₂₈ produces 16 peaks (step 856). The correlation with Ga₁₂₈ may not produce 16 peaks if, e.g., the STF is the non-control STF 600. In this case, a detection failure will occur when attempting to count the correlation peaks for Gb₁₂₈ (step 858). The detection failure may occur because an 802.11ad receiver expects correlation of a received STF with the preamble component sequence Gb₁₂₈ to produce 48 peaks (for a control STF) or no peaks (for a non-control STF). However, as shown in FIG. 7B, correlation of the non-control STF 600 with the preamble component sequence Gb₁₂₈ produces 16 peaks. Accordingly, an 802.11ad receiver produces a detection failure when attempting to detect the non-control STF 600.

If, instead, correlation of the STF with the preamble component sequence Ga₁₂₈ produces 16 peaks, then the 802.11ad receiver will proceed to perform channel estimation and PHY header detection (step 860). Such a state may occur when the STF is the control STF 650. As shown in FIG. 7C, correlation of the control STF 650 with Ga₁₂₈ produces 48 peaks; however, some 802.11ad receivers may detect the first 16 peaks of the 48 correlated peaks and falsely identify the control STF 650 as the non-control STF 400. In this case, detection failure will occur when performing PHY header detection (step 862). When a detection failure for either the PHY header or STF occurs, then the 802.11ad auto-detection method 850 terminates. Accordingly, use of the non-control STF 600 and the control STF 650 in an 802.11ay PHY packet may allow an 802.11ad receiver to detect and discard 802.11ay PHY packets, notwithstanding the fact that an 802.11ad receiver may have no knowledge of the STF layout for 802.11ay packets.

FIGS. 9A-11B illustrate a second auto-detection scheme using STFs in which the preamble component sequences Ga₁₂₈ and Gb₁₂₈, which are used in 802.11ad STFs, may be used in 802.11ay STFs. In order to distinguish 802.11ay packets from 802.11ad packets, a phase rotation may be applied to each bipolar symbol of the preamble component sequences Ga₁₂₈ and Gb₁₂₈. The values in the repeated sequence 402 of the non-control STF 400 can be expressed generally as:

(r ₁ ,r ₂ , . . . ,r ₂₁₇₆)

where r_(n)∈{1, −1} and n=1, 2, . . . , 2176. Thus, when applying a phase rotation to each bipolar symbol, the values in the repeated sequence for an 802.11ay non-control STF may be expressed generally as:

(r ₁ e ^(jθ) ¹ ,r ₂ e ^(jθ) ² , . . . ,r ₂₁₇₆ ^(eθ) ²¹⁷⁶ )

where θ_(n) ∈(0, 2π) and n=1, 2, . . . , 2176.

Likewise, the values in the repeated sequence 452 of the control STF 450 may be expressed generally as:

(r ₁ ,r ₂ , . . . ,r ₆₄₀₀)

where r_(n)∈{1, −1} and n=1, 2, . . . , 6400. Thus, when applying a phase rotation to each bipolar symbol, the values in the repeated sequence for an 802.11ay control STF may be expressed generally as:

(r ₁ e ^(jθ) ¹ ,r ₂ e ^(jθ) ² , . . . ,r ₆₄₀₀ e ^(jθ) ⁶⁴⁰⁰ )

where θ_(n) E (0, 2π) and n=1, 2, . . . , 6400.

As discussed above, each symbol in the preamble component sequences Ga₁₂₈ and Gb₁₂₈ has a modulated value of either 1 or −1. Thus each value is linearly phase-rotated on the unit circle by values other than e^(jπn/2). For example, the values in the repeated sequence 402 of the non-control STF 400 may be expressed generally as:

${r_{STF}\left( {nT_{c}} \right)} = \left\{ \begin{matrix} {{Ga_{128}*\ \left( {n\ {mod}\ 128} \right)*e^{j\pi \frac{n}{2}}},{n = 0},1,\ldots \mspace{11mu},{{16*128} - 1}} \\ {{{- G}a_{128}*\ \left( {n\ {mod}\ 128} \right)*e^{j\pi \frac{n}{2}}},{n = \ {16*128}},\ldots \;,{{17*128} - 1}} \end{matrix} \right.$

Likewise, the values in the repeated sequence 452 of the control STF 450 may be expressed generally as:

${r_{STF}\left( {nT_{c}} \right)} = \left\{ \begin{matrix} {{Gb_{128}*\ \left( {n\ {mod}\ 128} \right)*e^{j\pi \frac{n}{2}}},{n = 0},1,\ldots \;,{{48*128} - 1}} \\ {{{- G}b_{128}*\ \left( {n\ {mod}\ 128} \right)*e^{j\pi \frac{n}{2}}},{n = {48*128}},\ldots \mspace{11mu},{{49*128} - 1}} \\ {{{- G}a_{128}*\ \left( {n\ {mod}\ 128} \right)*e^{j\pi \frac{n}{2}}},{n = {49*128}},\ldots \mspace{11mu},{{50*128} - 1}} \end{matrix} \right.$

In other words, a different linear phase rotation, e^(jθ) ^(n) , may be selected and applied to the preamble component sequences Ga₁₂₈ and Gb₁₂₈, e.g.,

$\theta_{n} \neq {\frac{n\pi}{2}.}$

Accordingly, in some embodiments, a linear phase rotation e^(jnφ) is used for 802.11ay, where

${\phi \neq \frac{\pi}{2}},{e.g.},{\phi = \frac{\pi}{4}},\frac{3\pi}{4},\frac{\pi}{8},\frac{3\pi}{8},\frac{5\pi}{8},$

etc. A receiver may determine whether a received packet is an 802.11ad or an 802.11ay packet by cross-correlating the STF of the packet with the preamble component sequences Ga₁₂₈ and Gb₁₂₈, and then removing a phase rotation from the STF of the packet and cross-correlating the de-rotated STF with the preamble component sequences Ga₁₂₈ and Gb₁₂₈. The receiver may then determine the packet type according to which STF has a greater correlation with one or both of the preamble component sequences Ga₁₂₈ and Gb₁₂₈, e.g., which STF produces an expected number of peaks.

FIG. 9A is a diagram of an embodiment 802.11ay auto-detection method 900. The 802.11ay auto-detection method 900 may be indicative of operations occurring on an 802.11ay receiver when determining the PHY packet type of a received packet using the STF.

The 802.11ay auto-detection method 900 beings by de-rotating the phase of a received STF by the phase shift used in IEEE 802.11ad, e.g.,

$e^{{- j}\pi \frac{n}{2}}$

(step 902). Such a de-rotation may be done to first determine whether the received STF is a BPSK-modulated symbol, e.g., an 802.11ad PHY STF. Next, the de-rotated STF is correlated with the preamble component sequences Ga₁₂₈ and Gb₁₂₈ (step 904). Next, the correlation peaks for each preamble component sequence are detected and counted (step 906). If correlation of the received STF produces 16 peaks for the preamble component sequence Ga₁₂₈ or 48 peaks for the preamble component sequence Gb₁₂₈ (step 908), the packet is identified as an 802.11ad packet (step 910). Demodulation and decoding of the packet is continued until the end of the 802.11ad packet (step 912).

If correlation of the received STF does not produce 16 peaks for the preamble component sequence Ga₁₂₈ or 48 peaks for the preamble component sequence Gb₁₂₈, then the phase of the received STF is instead de-rotated by the phase shift used in IEEE 802.11ay, e.g., e^(−jπφ) (step 914), where

$\phi \neq {\frac{\pi}{2}.}$

Next, the de-rotated STF is correlated with the preamble component sequences Ga₁₂₈ and Gb₁₂₈ (step 916). Next, the correlation peaks for each preamble component sequence are detected and counted (step 918). If correlation of the received STF produces 16 peaks for the preamble component sequence Ga₁₂₈ or 48 peaks for the preamble component sequence Gb₁₂₈ (step 920), the packet is identified as an 802.11ay packet (step 922). Finally, demodulation and decoding of the packet is continued until the end of the 802.11ay packet (step 924).

FIG. 9B is a diagram of an embodiment 802.11ad auto-detection method 950. The 802.11ad auto-detection method 950 may be indicative of operations occurring in an 802.11ad receiver.

The 802.11ad auto-detection method 950 begins by de-rotating the phase of a received 802.11ay STF by

$e^{{- j}\pi \frac{n}{2}}$

(step 952). The phase is de-rotated by

$e^{{- j}\pi \frac{n}{2}}$

because 802.11ad PHY packets contain BPSK-modulated symbols in their STFs, and so an 802.11ad receiver may only be capable of demodulating BPSK-modulated STFs. Next, the received STF is correlated with the preamble component sequences Ga₁₂₈ and Gb₁₂₈ (step 954). Next, an attempt is made to detect and count the correlation peaks for each preamble component sequence (step 956). Finally, a failure occurs when attempting to count the correlation peaks. The failure occurs because the received 802.11ay STF may be modulated with a scheme other than BPSK, e.g., the symbols in the preamble component sequence may be linearly phase-rotated. An 802.11ad receiver may not detect these symbols. Accordingly, embodiment STFs may not interfere with an existing 802.11ad receiver.

In some embodiments, a block phase rotation phase rotation e^(jθn) may be selected and applied to the preamble component sequences Ga₁₂₈ and Gb₁₂₈ for an 802.11ay STF. That is, each of the preamble component sequences Ga₁₂₈ and Gb₁₂₈ may be block-rotated to produce preamble component sequences Ga_(128,k) and Gb_(128,k), where k is a value from 1 to 17 for non-control STFs, and from 1 to 50 for control STFs.

FIGS. 10A and 10B are diagrams of a non-control STF 1000 and a control STF 1050, respectively, which are included in an 802.11ay packet preamble. As shown, each symbol in the preamble component sequences for the non-control STF 400 may be rotated by e^(jγ) ^(k) , where γ_(k)=kπ for k=1, . . . , 16, and γ₁₇=0. Likewise, each symbol in the preamble component sequences for the control STF 450 may be rotated by e^(jφ) ^(k) , where φ_(k)=kπ for k=1, . . . , 48, and φ₄₉=φ₅₀=0. Thus, each preamble component sequence in the repeated sequences 1002 may be represented by Ga_(128,k)e^(jγ) ^(k) , where γ_(k) E {0, 2π}, and each preamble component sequence in the repeated sequences 1052 may be represented by Gb_(128,k) e^(jφ) ^(k) , where γ_(k) ∈{0, 2π}.

FIG. 11A is a diagram of an embodiment 802.11ay auto-detection method 1100. The 802.11ay auto-detection method 1100 may be indicative of operations occurring in an 802.11ay receiver.

The 802.11ay auto-detection method 1100 beings by de-rotating the phase of a received STF by

$e^{{- j}\pi \frac{n}{2}}$

(step 1102). Such a de-rotation may be done to first determine whether the received STF is a BPSK-modulated symbol, e.g., an 802.11ad PHY STF. Next, the de-rotated STF is correlated with the preamble component sequences Ga₁₂₈ and Gb₁₂₈ (step 1104). Next, the correlation peaks for each preamble component sequence are detected and counted (step 1106). If correlation of the received STF produces 16 peaks for the preamble component sequence Ga₁₂₈ or 48 peaks for the preamble component sequence Gb₁₂₈ (step 1108), the packet is identified as an 802.11ad packet (step 1110). Demodulation and decoding of the packet is continued until the end of the 802.11ad packet (step 1112).

If correlation of the received STF does not produce 16 peaks for the preamble component sequence Ga₁₂₈ or 48 peaks for the preamble component sequence Gb₁₂₈, then the phase of the received STF is instead block de-rotated by e^(−jγ) ^(k) for a non-control STF, or by e^(−jφ) ^(k) for a control STF (step 1114). Next, the block de-rotated STF is correlated with the preamble component sequences Ga₁₂₈ and Gb₁₂₈ (step 1116). Next, the correlation peaks for each preamble component sequence are detected and counted (step 1118). If correlation of the received STF produces 16 peaks for the preamble component sequence Ga₁₂₈ or 48 peaks for the preamble component sequence Gb₁₂₈ (step 1120), the packet is identified as an 802.11ay packet (step 1122). Finally, demodulation and decoding of the packet is continued until the end of the 802.11ay packet (step 1124).

FIG. 11B is a diagram of an embodiment 802.11ad auto-detection method 1150. The 802.11ad auto-detection method 1150 may be indicative of operations occurring in an 802.11ad receiver.

The 802.11ad auto-detection method 1150 begins by de-rotating the phase of a received 802.11ay STF by

$e^{{- j}\pi \frac{n}{2}}$

(step 1152). The phase is de-rotated by

$e^{{- j}\pi \frac{n}{2}}$

because 802.11ad receivers may only be capable of decoding BPSK-modulated symbols in an STF. Next, the received STF is correlated with the preamble component sequences Ga₁₂₈ and Gb₁₂₈ (step 1154). Next, an attempt is made to detect and count the correlation peaks for each preamble component sequence (step 1156). Finally, a failure occurs when attempting to count the correlation peaks. The failure occurs because the received 802.11ay STF may be modulated with a scheme other than BPSK, e.g., the symbols in the preamble component sequence may be block phase-rotated. An 802.11ad receiver may not detect these symbols. Accordingly, embodiment STFs may not interfere with an existing 802.11ad receiver.

FIGS. 12A-16B illustrate a third auto-detection scheme using STFs in which new preamble component sequences are selected for the control and non-control STFs in an 802.11ay PHY packet. In some embodiments, new preamble component sequences Ga_(128,new,1) and Gb_(128,new,1) are selected such that they are zero correlation zone (ZCZ) sequences with Ga₁₂₈ and Gb₁₂₈, respectively. Ideal ZCZ sequences have an impulse signal (e.g., values of 1 when in-phase and 0 when out-of-phase) when autocorrelated, and a value of 0 when cross-correlated in a certain range of shifts.

FIGS. 12A and 12B show embodiment preamble component sequences Ga_(128,new,1) and Gb_(128,new,1). The ZCZ properties of the preamble component sequences Ga_(128,new,1) and Gb_(128,new,1) may allow the sequences to be used as replacements for the preamble component sequences Ga₁₂₈ and Gb₁₂₈ in the repeated sequences 402 and 452 of the non-control STF 400 and the control STF 450, respectively.

FIGS. 13A-13H are diagrams of various correlation properties of the preamble component sequences Ga_(128,new,1) and Gb_(128,new,1) with the preamble component sequences Ga₁₂₈ and Gb₁₂₈. FIGS. 13A and 13B are diagrams of autocorrelation properties of Ga_(128,new,1) and Gb_(128,new,1), respectively. As shown, the autocorrelation results are impulse responses for shifts within [−32, 32] symbol time slots, and have no correlation for shifts within [−32, 32] symbol time slots. Further, the side lobes for each autocorrelation signal are relatively low. Both the impulse response and the side lobes that result from autocorrelation of Ga_(128,new,1) and Gb_(128,new,1) are comparable to the impulse response and the side lobes that result from autocorrelation of Ga₁₂₈ and Gb₁₂₈, previously shown in the zoomed portions of FIGS. 5A and 5C. It should be appreciated that, although FIGS. 13A-13H illustrate ideal impulse responses, autocorrelation results may not produce true impulses, but rather may produce responses that are of sufficient magnitude for a receiver to recognize the values as correlation peaks.

FIGS. 13C and 13D are diagrams of cross-correlation properties of Ga_(128,new,1) and Gb_(128,new,1), respectively. The cross-correlation properties of Ga_(128,new,1) and Gb_(128,new,1) are comparable to the cross-correlations between Ga₁₂₈ and Gb₁₂₈.

FIGS. 13E and 13F are diagrams of cross-correlation properties between Ga_(128,new,1) and Ga₁₂₈, and between Gb_(128,new,1) and Gb₁₂₈, respectively. As shown, the cross-correlations are equal to zero for shifts within [−32, 32]. Unlike the cross-correlation between Ga₁₂₈ and Gb₁₂₈ (illustrated above in FIG. 5B), there is no noise in the zero correlation zone range for Ga_(128,new,1) and Gb_(128,new,1). Accordingly, an 802.11ad receiver will not detect a false positive when attempting to correlate Ga₁₂₈ or Gb₁₂₈ with Ga_(128,new,1) or Gb_(128,new,1), respectively.

FIGS. 13G and 13H are diagrams of cross-correlation properties between Ga_(128,new,1) and Gb₁₂₈, and between Gb_(128,new,1) and Ga₁₂₈, respectively. The cross-correlation properties between Ga_(128,new,1) and Gb₁₂₈, and between Gb_(128,new,1) and Ga₁₂₈ are comparable to the cross-correlations between Ga₁₂₈ and Gb₁₂₈.

FIGS. 14A and 14B are diagrams of a non-control STF 1400 and a control STF 1450, respectively, which are included in an 802.11ay packet preamble. The non-control STF 1400 and the control STF 1450 each include repeated sequences 1402, 1452, a termination sequence 1404, 1454 which indicates the end of the non-control STF 1400 and the control STF 1450, respectively, and a prefix sequence 1406, 1456.

The repeated sequences 1402, 1452 include multiple repetitions of preamble component sequences. The repeated sequence 1402 includes 16 repetitions of the preamble component sequence Ga_(128,new,1), and the repeated sequence 1452 includes 48 repetitions of the preamble component sequence Gb_(128,new,1). It should be appreciated that the repeated sequences 1402, 1452 could contain any preamble component sequence and number of repetitions.

The termination sequence 1404, 1454 occurs after the repeated sequences 1402, 1452. The termination sequence 1404, 1454 includes one negative instance of the preamble component sequences included in the repeated sequences 1402, 1452. For example, in embodiments where the repeated sequence 1402 includes several repetitions of the preamble component sequence Ga_(128,new,1), the termination sequence 1404 includes one repetition of —Ga_(128,new,1). Likewise, in embodiments where the repeated sequence 1452 includes several repetitions of the preamble component sequence Gb_(128,new,1), the sequence 1454 includes one repetition of −Gb_(128,new,1).

The prefix sequence 1406, 1456 is a cyclic prefix of CEF. It should be noted that the prefix sequence 1406, 1456, i.e., the final preamble component sequence (−Ga₁₂₈) before the CEF, may be the same preamble component sequence at the end of the non-control STF 400 and the control STF 450.

FIGS. 15A-15D are diagrams of cross-correlation properties for the non-control STF 1400 with various preamble component sequences. As shown, the non-control STF 1400 produces 16 positive peaks and a negative peak when correlated with the preamble component sequence Ga_(128,new,1), and produces one negative peak when correlated with the preamble component sequence Ga₁₂₈, but otherwise does not produce a significant signal when correlated with other preamble component sequences. The values produced by cross-correlations of the non-control STF 1400 with sequences other than Ga_(128,new,1) and Ga₁₂₈ may include some noise, but the magnitude of the noise may not be large enough to register as a correlation peak.

FIGS. 15E-15H are diagrams of cross-correlation properties for the control STF 1450 with various preamble component sequences. As shown, the control STF 1450 produces 48 positive peaks and a negative peak when correlated with the preamble component sequence Gb_(128,new,1), and produces one negative peak when correlated with preamble component sequence Ga₁₂₈, but otherwise does not produce a significant signal. The values produced by cross-correlations of the control STF 1450 with sequences other than Gb_(128,new,1) may include some noise, but the magnitude of the noise may not be large enough to register as a correlation peak. Accordingly, proper selection of the symbols for the preamble component sequences used in the non-control STF 1400 and the control STF 1450 may allow the STFs to be auto-detected by a receiver that correlates the STFs with the preamble component sequences Ga_(128,new,1) and Gb_(128,new,1) (e.g., an 802.11ay receiver), but may not interfere with a receiver that correlates the STFs with the preamble component sequences Ga₁₂₈ and Gb₁₂₈ (e.g., an 802.11ad receiver).

FIG. 16A is a diagram of an embodiment 802.11ay auto-detection method 1600. The 802.11ay auto-detection method 1600 may be indicative of operations occurring in an 802.11ay receiver when determining the PHY packet type of a received packet using the STF.

The 802.11ay auto-detection method 1600 begins by receiving a STF and correlating it with the preamble component sequences Ga_(128,new,1), Gb_(128,new,1), Ga₁₂₈, and Gb₁₂₈ (step 1602). Next, the correlation peaks for each preamble component sequence are detected and counted (step 1604). If correlation of the received STF produces 16 peaks for the preamble component sequence Ga_(128,new,1) or 48 peaks for the preamble component sequence Gb_(128,new,1) (step 1606), the packet is identified as an 802.11ay packet (step 1608). In cases where correlation with one preamble component sequence produces peaks, correlation with the other sequence may produce lower values that have no significance. For example, if 16 peaks are produced when correlated with the preamble component sequence Ga_(128,new,1), then no values are produced when correlated with the preamble component sequence Gb_(128,new,1). Next, demodulation and decoding of the packet is continued until the end of the 802.11ay packet (step 1610).

If instead, correlation of the STF produces 16 peaks for the preamble component sequence Ga₁₂₈ or 48 peaks for the preamble component sequence Gb₁₂₈ (step 1612), the packet is identified as an 802.11ad packet (step 1614). Finally, demodulation and decoding of the packet is continued until the end of the 802.11ad packet (step 1616).

FIG. 16B is a diagram of an embodiment 802.11ad auto-detection method 1650. The 802.11ad auto-detection method 1650 may be indicative of operations occurring in an 802.11ad receiver when determining the PHY packet type of a received packet using the STF. Because an 802.11ad receiver may not capable of responding to 802.11ay traffic, the 802.11ad auto-detection method 1650 may thus avoid incorrectly identifying a received 802.11ay packet as a compatible packet for an 802.11ad receiver.

The 802.11ad auto-detection method 1650 begins by receiving an 802.11ay STF and correlating it with the preamble component sequences Ga₁₂₈ and Gb₁₂₈ (step 1652). Next, the correlation peaks for each preamble component sequence are detected and counted (step 1654). Next, an attempt to detect positive peaks in the correlated preamble component sequences is attempted, but fails (step 1656). Detection fails because the received STFs contain the preamble component sequence Ga_(128,new,1) and Gb_(128,new,1), which are ZCZ sequences with Ga₁₂₈ and Gb₁₂₈, as shown in FIGS. 13E and 13F, and thus correlation does not produce significant values. Finally, the failed STF detection causes a synchronization failure (step 1658). Thus, the 802.11ad auto-detection method 1650 allows an 802.11ad receiver to fail auto-detection when it receives an incompatible 802.11ay PHY packet, causing the receiver to ignore the remainder of the PHY packet.

FIGS. 17A-21B illustrate a fourth auto-detection scheme using STFs in which new preamble component sequences are selected for the control and non-control STFs in an 802.11ay PHY packet. In some embodiments, new preamble component sequences Ga_(128,new,2) and Gb_(128,new,2) are selected such that they are mutual zero correlation zone (ZCZ) sequences, e.g., the sequences produce no correlation peaks when cross-correlated in a certain range of shifts.

FIGS. 17A and 17B show embodiment preamble component sequences Ga_(128,new,2) and Gb_(128,new,2). The mutual ZCZ properties of the preamble component sequences Ga_(128,new,2) and Gb_(128,new,2) allows the sequences to be used as replacements for the preamble component sequences Ga₁₂₈ and Gb₁₂₈ in the repeated sequences 402, 452 of the non-control STF 400 and the control STF 450. Because the preamble component sequences Ga_(128,new,2) and Gb_(128,new,2) produce no correlation peaks when cross-correlated, there may be a reduced possibility of incorrectly identifying a PHY packet as a control or non-control packet based on the STF.

FIG. 18A-18C are diagrams of various correlation properties of the preamble component sequences Ga_(128,new,2) and Gb_(128,new,2). FIGS. 18A and 18B show autocorrelation properties of Ga_(128,new,2) and Gb_(128,new,2), respectively. As shown, the autocorrelations have an impulse response property. Further, values at the side lobes of each autocorrelation are relatively low, and may be even lower than values at the side lobes of autocorrelations for the preamble component sequences Ga_(128,new,2) and Gb_(128,new,2) (shown in FIGS. 13A and 13B). Both the impulse response and side lobes for Ga_(128,new,2) and Gb_(128,new,2) are comparable to the impulse response and side lobes for Ga₁₂₈ and Gb₁₂₈, previously shown in the zoomed portions of FIGS. 5A and 5C.

FIG. 18C is a diagram of a cross-correlation property of Ga_(128,new,2) and Gb_(128,new,2). Ga_(128,new,2) and Gb_(128,new,2) have a higher degree of correlation than the cross-correlation between Ga₁₂₈ and Gb₁₂₈. As shown in FIG. 18C, the cross-correlation of the preamble component sequences Ga_(128,new,2) and Gb_(128,new,2) produces relatively low values.

FIGS. 19A and 19B are diagrams of a non-control STF 1900 and a control STF 1950, respectively, which are included in an 802.11ay packet preamble. The non-control STF 1900 and the control STF 1950 each include repeated sequences 1902, 1952, a termination sequence 1904, 1954, and a prefix sequence 1906, 1956.

The repeated sequences 1902, 1952 include multiple repetitions of the preamble component sequences. The repeated sequence 1902 includes 16 repetitions of the preamble component sequence Ga_(128,new,2), and the repeated sequence 1952 includes 48 repetitions of the preamble component sequence Gb_(128,new,2). It should be appreciated that the repeated sequences 1902, 1952 could contain any preamble component sequence and number of repetitions, as discussed further below.

The termination sequence 1904, 1954 occurs after the repeated sequences 1902, 1952. The sequence 1904, 1954 includes one negative instance of the preamble component sequences included in the repeated sequences 1902, 1952. For example, in embodiments where the repeated sequence 1902 includes several repetitions of the preamble component sequence Ga_(128,new,2), the sequence 1904 includes one repetition of −Ga_(128,new,2). Likewise, in embodiments where the repeated sequence 1952 includes several repetitions of the preamble component sequence Gb_(128,new,2), the sequence 1954 includes one repetition of −Gb_(128,new,2).

The prefix sequence 1906, 1956 indicates the end of the non-control STF 1900 and the control STF 1950, respectively. It should be noted that the prefix sequence 1906, 1956, i.e., the final preamble component sequence (−Ga₁₂₈) before the CEF, may be the same as the final sequence in the non-control STF 400 and the control STF 450. Accordingly, an 802.11ad receiver may still be capable of identifying the end of an 802.11ay STF, even though an 802.11ad receiver may not be completely compatible with 802.11ay PHY packets. The prefix sequence 1906, 1956 is a cyclic prefix for the CEF 204.

FIGS. 20A-20D show cross-correlation properties for the non-control STF 1900 and the control STF 1950 with the preamble component sequences Ga_(128,new,2) and Gb_(128,new,2). As shown, the non-control STF 1900 produces 16 positive peaks and a negative peak when correlated with the preamble component sequence Ga_(128,new,2), but otherwise does not produce a significant signal when correlated with other preamble component sequences. Likewise, the control STF 1950 produces 48 positive peaks and a negative peak when correlated with the preamble component sequence Gb_(128,new,2), but otherwise does not produce a significant signal when correlated with other preamble component sequences. The values produced by cross-correlations of the non-control STF 1900 and the control STF 1950 with sequences other than Ga_(128,new,2) and Gb_(128,new,2) may include some noise, but the magnitude of the noise may not be large enough to register as a correlation peak. Accordingly, proper selection of the symbols for the preamble component sequences used in the non-control STF 1900 and the control STF 1950 may allow the STFs to be auto-detected by a receiver that correlates the STFs with the preamble component sequences Ga_(128,new,2) and Gb_(128,new,2) (e.g., an 802.11ay receiver), but may not interfere with a receiver that correlates the STFs with the preamble component sequences Ga₁₂₈ and Gb₁₂₈ (e.g., an 802.11ad receiver). Cross-correlation properties of the non-control STF 1900 and the control STF 1950 with other preamble component sequences (e.g., Ga₁₂₈, Gb₁₂₈) may be similar to properties discussed above with respect to FIGS. 15A-15H. Because Ga_(128,new,2) and Gb_(128,new,2) are mutual ZCZ sequences, they produce less noise when cross-correlated than Ga_(128,new,1) and Gb_(128,new,1). For example, FIG. 20A contains the same quantity of peaks as FIG. 15A, but has less noise.

FIG. 21A is a diagram of an embodiment 802.11ay auto-detection method 2100. The 802.11ay auto-detection method 2100 may be indicative of operations occurring in an 802.11ay receiver when determining the PHY packet type of a received packet using the STF.

The 802.11ay auto-detection method 1600 begins by receiving a STF and correlating it with the preamble component sequences Ga_(128,new,2), Gb_(128,new,2), Ga₁₂₈, and Gb₁₂₈ (step 2102). Next, the correlation peaks for each preamble component sequence are detected and counted (step 2104). If correlation of the received STF produces 16 peaks for the preamble component sequence Ga_(128,new,2) or 48 peaks for the preamble component sequence Gb_(128,new,2) (step 2106), the packet is identified as an 802.11ay packet (step 2108). In cases where correlation with one preamble component sequence produces peaks, correlation with the other sequence may produce lower values that have no significance. For example, if 16 peaks are produced when correlated with the preamble component sequence Ga_(128,new,2), then no values are produced when correlated with the preamble component sequence Gb_(128,new,2.) Next, demodulation and decoding of the packet is continued until the end of the 802.11ay packet (step 2110).

If instead, correlation of the STF produces 16 peaks for the preamble component sequence Ga₁₂₈ or 48 peaks for the preamble component sequence Gb₁₂₈ (step 2112), the packet is identified as an 802.11ad packet (step 2114). Finally, demodulation and decoding of the packet is continued until the end of the 802.11ad packet (step 2116).

FIG. 21B is a diagram of an embodiment 802.11ad auto-detection method 2150. The 802.11ad auto-detection method 2150 may be indicative of operations occurring in an 802.11ad receiver when determining the PHY packet type of a received packet using the STF. Because an 802.11ad receiver may not capable of detecting 802.11ay packet, the 802.11ad auto-detection method 2150 may thus avoid incorrectly identifying a received 802.11ay packet as a compatible packet for an 802.11ad receiver.

The 802.11ad auto-detection method 2150 begins by receiving an 802.11ay STF and correlating it with the preamble component sequences Ga₁₂₈ and Gb₁₂₈ (step 2152). Next, the correlation peaks for each preamble component sequence are detected and counted (step 2154). Next, an attempt to detect positive peaks in the correlated preamble component sequences is attempted, but fails (step 2156). Detection fails because the received STFs contain the preamble component sequence Ga_(128,new,2) and Gb_(128,new,2), which are mutual ZCZ sequences and do not correlate with Ga₁₂₈ and Gb₁₂₈, as shown in FIGS. 20C-20D and 20G-20H. Finally, the failed detection causes a synchronization failure (step 2158). Thus, the 802.11ad auto-detection method 2150 allows an 802.11ad receiver to gracefully fail auto-detection and continue operating when it receives an incompatible 802.11ay PHY packet.

FIGS. 22A-25B illustrate a fifth auto-detection scheme using STFs in which new preamble component sequences are selected for the control and non-control STFs in an 802.11ay PHY packet. In some embodiments, new preamble component sequences A₁₂₈ and B₁₂₈ are selected such that the sequences are quadrature phase shift keying (QPSK) modulated variants of the preamble component sequences Ga₁₂₈ and Gb₁₂₈.

FIGS. 22A-22B show embodiment preamble component sequences A₁₂₈ and B₁₂₈, respectively. The preamble component sequences A₁₂₈ and B₁₂₈ are chosen such that

A ₁₂₈ =α·Ga ₁₂₈ +β·Ga _(128,new,1) ·e ^(jπ/2)

and

B ₁₂₈ =α·Gb ₁₂₈ +β·Gb _(128,new,1) ·e ^(jπ/2)

where 0<α, β<1, α²+β2=1. Thus, the preamble component sequences A₁₂₈ and B₁₂₈ are QPSK-modulated. This allows the preamble component sequences A₁₂₈ and B₁₂₈ to be backwards-compatible with other wireless techniques. In some embodiments, the preamble component sequences Ga_(128,new,1) and Gb_(128,new,1) may be interchanged such that the imaginary portions of A₁₂₈ and B₁₂₈ are replaced with one another to produce preamble component sequences A₁₂₈′ and B₁₂₈′ such that

A ₁₂₈ ′=α·Ga ₁₂₈ +β·Ga _(128,new,1) ·e ^(jπ/2)

and

B ₁₂₈ ′=α·Gb ₁₂₈ +β·Gb _(128,new,1) ·e ^(jπ/2)

where 0<α, β<1, α²+β²=1. It should be appreciated that in some embodiments A₁₂₈ and B₁₂₈ may be interchanged. Because the preamble component sequences A₁₂₈ and B₁₂₈ are QPSK-modulated variants of the preamble component sequences Ga₁₂₈ and Gb₁₂₈, correlation of the preamble component sequences A₁₂₈ and B₁₂₈ with Ga₁₂₈ and Gb₁₂₈, respectively, may produce values that are equivalent to impulse responses in a certain range of shifts.

FIGS. 23A and 23B are diagrams of a non-control STF 2300 and a control STF 2350, respectively, which are included in an 802.11ay packet preamble. The non-control STF 2300 and the control STF 2350 each include repeated sequences 2302, 2352 and a termination sequence 2306, 2356. The control STF 2350 also includes a sequence 2354 interposed between the repeated sequence 2352 and the termination sequence 2356. In some embodiments, the non-control STF 2300 may also include a sequence after the repeated sequence 2302.

The repeated sequences 2302, 2352 include multiple repetitions of the preamble component sequences. The repeated sequence 2302 includes 16 repetitions of the preamble component sequence A₁₂₈, and the repeated sequence 2352 includes 48 repetitions of the preamble component sequence B₁₂₈. It should be appreciated that the repeated sequences 2302, 2352 could contain any preamble component sequence and number of repetitions.

The sequence 2354 occurs after the repeated sequence 2352. The sequence 2354 includes one negative instance of the preamble component sequences included in the repeated sequence 2352. For example, in embodiments where the repeated sequence 2352 includes several repetitions of the preamble component sequence B₁₂₈, the sequence 2354 includes one repetition of −B₁₂₈.

The termination sequence 2306, 2356 is used as a cyclic prefix for the CEF 204 in the non-control STF 2300 and the control STF 2350, respectively. It should be noted that the termination sequence 2306, 2356, i.e., the final preamble component sequence (−Ga₁₂₈) before the CEF, may be the same as the final preamble component sequence (−Ga₁₂₈) before the CEF the non-control STF 400 and the control STF 450.

Because the preamble component sequences A₁₂₈ and B₁₂₈ are QPSK-modulated variants of the preamble component sequences Ga₁₂₈ and Gb₁₂₈, correlation of the non-control STF 2300 with Ga₁₂₈ by a receiver may produce 16 positive peaks and one negative peak, and correlation of the control STF 2350 with Gb₁₂₈ by a receiver may produce 48 positive peaks and one negative peak.

FIG. 24A is a diagram of an embodiment 802.11ay auto-detection method 2400. The 802.11ay auto-detection method 2400 may be indicative of operations occurring in an 802.11ay receiver when determining the PHY packet type of a received packet using the STF.

The 802.11ay auto-detection method 2400 begins by receiving a STF and correlating it with the preamble component sequences A₁₂₈, B₁₂₈, Ga₁₂₈, and Gb₁₂₈ (step 2402). Next, the correlation peaks for each preamble component sequence are detected and counted (step 2404). If correlation of the received STF produces 16 peaks for the preamble component sequence Ga₁₂₈ or 48 peaks for the preamble component sequence Gb₁₂₈ (step 2406), the packet is identified as one of an 802.11ay packet or an 802.11ad packet. If correlation peaks are not detected for either of the preamble component sequences Ga₁₂₈ or Gb₁₂₈, then the 802.11ay auto-detection method 2400 concludes. Such a failure may occur, for example, when an 802.11ay receiver receives an incompatible PHY packet.

If correlation peaks are detected for the either of the preamble component sequences Ga₁₂₈ or Gb₁₂₈, the 802.11ay auto-detection method 2400 continues by determining whether correlation of the received STF produces 16 peaks for the preamble component sequence A₁₂₈ or 48 peaks for the preamble component sequence B₁₂₈ (step 2408). If so, the packet is identified as an 802.11ay packet (step 2410). Next, demodulation and decoding of the packet is continued until the end of the 802.11ay packet (step 2412).

If correlation of the received STF does not produce 16 peaks for the preamble component sequence A₁₂₈ or 48 peaks for the preamble component sequence B₁₂₈, then the packet is identified as an 802.11ad packet (step 2414). Finally, demodulation and decoding of the packet is continued until the end of the 802.11ad packet (step 2416). Accordingly, an 802.11ay receiver may be capable of detecting reception of a compatible PHY packet by correlating its STF with Ga₁₂₈ and Gb₁₂₈, and then further correlating the received STF with A₁₂₈ and B₁₂₈ to auto-detect the received PHY packet type.

FIG. 24B is a diagram of an embodiment 802.11ad auto-detection method 2450. The 802.11ad auto-detection method 2450 may be indicative of operations occurring in an 802.11ad receiver when determining the PHY packet type of a received packet using the STF. Because an 802.11ad receiver may not capable of detecting an 802.11ay packet, the 802.11ad auto-detection method 2450 may thus avoid incorrectly identifying a received 802.11ay packet as a compatible packet for an 802.11ad receiver.

The 802.11ad auto-detection method 2450 begins by receiving an 802.11ay STF and correlating it with the preamble component sequences Ga₁₂₈ and Gb₁₂₈ (step 2452). Next, the correlation peaks for each preamble component sequence are detected and counted (step 2454). If correlation of the received STF does not produce 16 peaks for the preamble component sequence Ga₁₂₈ or 48 peaks for the preamble component sequence Gb₁₂₈ (step 2456), then auto-detection fails and the 802.11ad auto-detection method 2450 concludes.

However, if correlation of the received STF produces 16 peaks for the preamble component sequence Ga₁₂₈ or 48 peaks for the preamble component sequence Gb₁₂₈ (step 2456), then channel estimation and L-Header detection of the received 802.11 ay PHY packet is performed (step 2458). Next, the PHY packet length and the MCS of the L-Header is detected (Step 2460). Next, a detection failure occurs when detecting the N-Header because the 802.11ad receiver is incompatible with an 802.11ay PHY packet (step 2462). Finally, this failure causes the receiver to enter power save mode until the end of the current PHY packet is detected. Accordingly, an 802.11ad receiver may be capable of detecting reception of either an 802.11ay or an 802.11ad PHY packet during STF correlation, and then may gracefully fail auto-detection of an incompatible 802.11ay PHY packet after STF detection and during channel estimation and header detection. By failing auto-detection at a later stage, an 802.11ad receiver may be able to enter power save mode after receiving an incompatible PHY packet, increasing power efficiency of the receiver.

FIGS. 25A and 25B are diagrams of antenna transmission configurations 2500, 2550 for a non-control STF and a control STF, respectively. The antenna transmission configuration 2500 may be indicative of signals transmitted to produce the non-control STF 2300. Likewise, the antenna transmission configuration 2550 may be indicative of signals transmitted to produce the control STF 2350. Because the preamble component sequences A₁₂₈ and B₁₂₈ are QPSK-modulated variants of the preamble component sequences Ga₁₂₈ and Gb₁₂₈, an 802.11ay transmitter may produce the non-control STF 2300 and the control STF 2350 by transmitting orthogonal variants of the non-control STF 400 and the control STF 450, respectively. The orthogonal sequences may be combined by transmitting each sequence on a different antenna. For example, a real portion of the preamble component sequences A₁₂₈ and B₁₂₈ may be transmitted on a first antenna, and an imaginary portion of the preamble component sequences A₁₂₈ and B₁₂₈ may be transmitted on a second antenna.

Because one of each of the transmitted sequences includes the preamble component sequences Ga₁₂₈ and Gb₁₂₈, and 802.11ad receiver may thus receive the incompatible PHY packets and perform channel estimation and header detection of the PHY packet before failing auto-detection and entering power save mode. Likewise, an 802.11ay receiver may receive the PHY packet and perform auto-detection by correlating with the preamble component sequences A₁₂₈, B₁₂₈, Ga₁₂₈, and Gb₁₂₈. Auto-detection of the received PHY packets by a receiver may be performed using a method similar to the 802.11ay auto-detection method 2400 and the 802.11ad auto-detection method 2450, discussed above.

FIG. 26 is a block diagram of an embodiment processing system 2600 for performing methods described herein, which may be installed in a host device. As shown, the processing system 2600 includes a processor 2602, a memory 2604, and interfaces 2606-2610, which may (or may not) be arranged as shown in FIG. 26. The processor 2602 may be any component or collection of components adapted to perform computations and/or other processing related tasks, and the memory 2604 may be any component or collection of components adapted to store programming and/or instructions for execution by the processor 2602. In an embodiment, the memory 2604 includes a non-transitory computer readable medium. The interfaces 2606, 2608, 2610 may be any component or collection of components that allow the processing system 2600 to communicate with other devices/components and/or a user. For example, one or more of the interfaces 2606, 2608, 2610 may be adapted to communicate data, control, or management messages from the processor 2602 to applications installed on the host device and/or a remote device. As another example, one or more of the interfaces 2606, 2608, 2610 may be adapted to allow a user or user device (e.g., personal computer (PC), etc.) to interact/communicate with the processing system 2600. The processing system 2600 may include additional components not depicted in FIG. 26, such as long term storage (e.g., non-volatile memory, etc.).

In some embodiments, the processing system 2600 is included in a network device that is accessing, or part otherwise of, a telecommunications network. In one example, the processing system 2600 is in a network-side device in a wireless or wireline telecommunications network, such as a base station, a relay station, a scheduler, a controller, a gateway, a router, an applications server, or any other device in the telecommunications network. In other embodiments, the processing system 2600 is in a user-side device accessing a wireless or wireline telecommunications network, such as a mobile station, a user equipment (UE), a personal computer (PC), a tablet, a wearable communications device (e.g., a smartwatch, etc.), or any other device adapted to access a telecommunications network.

In some embodiments, one or more of the interfaces 2606, 2608, 2610 connects the processing system 2600 to a transceiver adapted to transmit and receive signaling over the telecommunications network. FIG. 27 is a block diagram of a transceiver 2700 adapted to transmit and receive signaling over a telecommunications network. The transceiver 2700 may be installed in a host device. As shown, the transceiver 2700 comprises a network-side interface 2702, a coupler 2704, a transmitter 2706, a receiver 2708, a signal processor 2710, and a device-side interface 2712. The network-side interface 2702 may include any component or collection of components adapted to transmit or receive signaling over a wireless or wireline telecommunications network. The coupler 2704 may include any component or collection of components adapted to facilitate bi-directional communication over the network-side interface 2702. The transmitter 2706 may include any component or collection of components (e.g., up-converter, power amplifier, etc.) adapted to convert a baseband signal into a modulated carrier signal suitable for transmission over the network-side interface 2702. The receiver 2708 may include any component or collection of components (e.g., down-converter, low noise amplifier, etc.) adapted to convert a carrier signal received over the network-side interface 2702 into a baseband signal. The signal processor 2710 may include any component or collection of components adapted to convert a baseband signal into a data signal suitable for communication over the device-side interface(s) 2712, or vice-versa. The device-side interface(s) 2712 may include any component or collection of components adapted to communicate data-signals between the signal processor 2710 and components within the host device (e.g., the processing system 2600, local area network (LAN) ports, etc.).

The transceiver 2700 may transmit and receive signaling over any type of communications medium. In some embodiments, the transceiver 2700 transmits and receives signaling over a wireless medium. For example, the transceiver 2700 may be a wireless transceiver adapted to communicate in accordance with a wireless telecommunications protocol, such as a cellular protocol (e.g., long-term evolution (LTE), etc.), a wireless local area network (WLAN) protocol (e.g., Wi-Fi, etc.), or any other type of wireless protocol (e.g., Bluetooth, near field communication (NFC), etc.). In such embodiments, the network-side interface 2702 comprises one or more antenna/radiating elements. For example, the network-side interface 2702 may include a single antenna, multiple separate antennas, or a multi-antenna array configured for multi-layer communication, e.g., single input multiple output (SIMO), multiple input single output (MISO), multiple input multiple output (MIMO), etc. In other embodiments, the transceiver 2700 transmits and receives signaling over a wireline medium, e.g., twisted-pair cable, coaxial cable, optical fiber, etc. Specific processing systems and/or transceivers may utilize all of the components shown, or only a subset of the components, and levels of integration may vary from device to device.

Although the description has been described in detail, it should be understood that various changes, substitutions and alterations can be made without departing from the spirit and scope of this disclosure as defined by the appended claims. Moreover, the scope of the disclosure is not intended to be limited to the particular embodiments described herein, as one of ordinary skill in the art will readily appreciate from this disclosure that processes, machines, manufacture, compositions of matter, means, methods, or steps, presently existing or later to be developed, may perform substantially the same function or achieve substantially the same result as the corresponding embodiments described herein. Accordingly, the appended claims are intended to include within their scope such processes, machines, manufacture, compositions of matter, means, methods, or steps. 

What is claimed:
 1. A method comprising: receiving a wireless packet comprising a short training field (STF); determining cross-correlations between the STF and a first preamble component sequence from a first set of preamble component sequences associated with a first packet type and between the STF and a second preamble component sequence from a second set of preamble component sequences associated with a second packet type, the first preamble component sequence and the second preamble component sequence having a zero correlation zone (ZCZ) property; and determining that the wireless packet is the second packet type when there is a greater correlation between the STF and the second preamble component sequence than between the STF and the first preamble component sequence.
 2. The method of claim 1, wherein the first packet type is an Institute of Electrical and Electronics Engineers (IEEE) 802.11ad packet type, and the second packet type is an IEEE 802.11ay packet type.
 3. The method of claim 1, wherein the ZCZ property is a ZCZ of at least 64 symbol time slots in width.
 4. The method of claim 1, wherein the first set of preamble component sequences comprise preamble component sequences Ga₁₂₈ and Gb₁₂₈.
 5. The method of claim 1, wherein the second set of preamble component sequences comprise preamble component sequences Ga_(128,new,1) and Gb_(128,new,1).
 6. The method of claim 1, wherein the second set of preamble component sequences comprise mutual ZCZ sequences.
 7. The method of claim 6, wherein the mutual ZCZ sequences comprise preamble component sequences Ga_(128,new,2) and Gb_(128,new,2).
 8. The method of claim 1, wherein the second set of preamble component sequences comprise quadrature phase shift keying (QPSK) modulated preamble component sequences.
 9. The method of claim 8, wherein the QPSK modulated preamble component sequences comprise preamble component sequences A₁₂₈ and B₁₂₈.
 10. A method comprising: selecting a first Golay sequence from a first pair of Golay complementary sequences associated with first packet type, each Golay sequence of the first pair of Golay complementary sequences being zero correlation zone (ZCZ) sequences with each Golay sequence of a second pair of Golay complementary sequences associated with a second packet type; and transmitting a wireless packet carrying a short training field (STF) that includes one or more instances of the first Golay sequence.
 11. The method of claim 10, wherein the second pair of Golay complementary sequences are preamble component sequences Ga₁₂₈ and Gb₁₂₈, wherein the first pair of Golay complementary sequences further comprises a second Golay sequence, and wherein the first Golay sequence is a ZCZ sequence with Ga₁₂₈ and the second Golay sequence is a ZCZ sequence with Gb₁₂₈.
 12. The method of claim 11, wherein the first pair of Golay complementary sequences comprises preamble component sequences Ga_(128,new,1) and Gb_(128,new,1).
 13. The method of claim 12, wherein Ga_(128,new,1) is a sequence according to: +1, −1, −1, +1, −1, +1, −1, +1, −1, −1, −1, −1, +1, +1, −1, −1, +1, −1, −1, +1, +1, −1, +1, −1, −1, −1, −1, −1, −1, −1, +1, +1, −1, +1, +1, −1, +1, −1, +1, −1, +1, +1, +1, +1, −1, −1, +1, +1, +1, −1, −1, +1, +1, −1, +1, −1, −1, −1, −1, −1, −1, −1, +1, +1, +1, −1, −1, +1, −1, +1, −1, +1, −1, −1, −1, −1, +1, +1, −1, −1, +1, −1, −1, +1, +1, −1, +1, −1, −1, −1, −1, −1, −1, −1, +1, +1, +1, −1, −1, +1, −1, +1, −1, +1, −1, −1, −1, −1, +1, +1, −1, −1, −1, +1, +1, −1, −1, +1, −1, +1, +1, +1, +1, +1, +1, +1, −1, −1, wherein Gb_(128,new,1) is a sequence according to: −1, +1, +1, −1, +1, −1, +1, −1, +1, +1, +1, +1, −1, −1, +1, +1, −1, +1, +1, −1, −1, +1, −1, +1, +1, +1, +1, +1, +1, +1, −1, −1, +1, −1, −1, +1, −1, +1, −1, +1, −1, −1, −1, −1, +1, +1, −1, −1, −1, +1, +1, −1, −1, +1, −1, +1, +1, +1, +1, +1, +1, +1, −1, −1, +1, −1, −1, +1, −1, +1, −1, +1, −1, −1, −1, −1, +1, +1, −1, −1, +1, −1, −1, +1, +1, −1, +1, −1, −1, −1, −1, −1, −1, −1, +1, +1, +1, −1, −1, +1, −1, +1, −1, +1, −1, −1, −1, −1, +1, +1, −1, −1, −1, +1, +1, −1, −1, +1, −1, +1, +1, +1, +1, +1, +1, +1, −1, −1.
 14. The method of claim 11, wherein the first pair of Golay complementary sequences are mutual ZCZ sequences.
 15. The method of claim 14, wherein the mutual ZCZ sequences comprise preamble component sequences Ga_(128,new,2) and Gb_(128,new,2).
 16. The method of claim 15, wherein Ga_(128,new,2) is a sequence according to: −1, +1, −1, −1, +1, −1, −1, −1, +1, −1, +1, +1, +1, −1, −1, −1, −1, +1, −1, −1, +1, −1, −1, −1, −1, +1, −1, −1, −1, +1, +1, +1, +1, −1, +1, +1, −1, +1, +1, +1, −1, +1, −1, −1, −1, +1, +1, +1, +1, −1, +1, +1, −1, +1, +1, +1, +1, −1, +1, +1, +1, −1, −1, −1, +1, −1, +1, +1, −1, +1, +1, +1, −1, +1, −1, −1, −1, +1, +1, +1, −1, +1, −1, −1, +1, −1, −1, −1, −1, +1, −1, −1, −1, +1, +1, +1, +1, −1, +1, +1, −1, +1, +1, +1, −1, +1, −1, −1, −1, +1, +1, +1, −1, +1, −1, −1, +1, −1, −1, −1, −1, +1, −1, −1, −1, +1, +1, +1, wherein Gb_(128,new,2) is a sequence according to: +1, +1, +1, −1, −1, −1, +1, −1, −1, −1, −1, +1, −1, −1, +1, −1, +1, +1, +1, −1, −1, −1, +1, −1, +1, +1, +1, −1, +1, +1, −1, +1, −1, −1, −1, +1, +1, +1, −1, +1, +1, +1, +1, −1, +1, +1, −1, +1, −1, −1, −1, +1, +1, +1, −1, +1, −1, −1, −1, +1, −1, −1, +1, −1, −1, −1, −1, +1, +1, +1, −1, +1, +1, +1, +1, −1, +1, +1, −1, +1, +1, +1, +1, −1, −1, −1, +1, −1, +1, +1, +1, −1, +1, +1, −1, +1, −1, −1, −1, +1, +1, +1, −1, +1, +1, +1, +1, −1, +1, +1, −1, +1, +1, +1, +1, −1, −1, −1, +1, −1, +1, +1, +1, −1, +1, +1, −1, +1.
 17. The method of claim 10, wherein the first pair of Golay complementary sequences comprise quadrature phase shift keying (QPSK) modulated Golay complementary sequences.
 18. The method of claim 17, wherein the QPSK modulated Golay complementary sequences comprise preamble component sequences A₁₂₈ and B₁₂₈.
 19. The method of claim 18, wherein A₁₂₈ is a sequence according to: +1+j, +1−j, −1−j, −1+j, −1−j, −1+j, −1−j, −1+j, −1−j, +1−j, −1−j, +1−j, +1+j, −1+j, −1−j, +1−j, +1+j, +1−j, −1−j, −1+j, +1+j, +1−j, +1+j, +1−j, −1−j, +1−j, −1−j, +1−j, −1−j, +1−j, +1+j, −1+j, −1−j, −1+j, +1+j, +1−j, +1+j, +1−j, +1+j, +1−j, +1+j, −1+j, +1+j, −1+j, −1−j, +1−j, +1+j, −1+j, +1+j, +1−j, −1−j, −1+j, +1+j, +1−j, +1+j, +1−j, −1−j, +1−j, −1−j, +1−j, −1−j, +1−j, +1+j, −1+j, +1+j, +1−j, −1−j, −1+j, −1−j, −1+j, −1−j, −1+j, −1−j, +1−j, −1−j, +1−j, +1+j, −1+j, −1−j, +1−j, +1+j, +1−j, −1−j, −1+j, +1+j, +1−j, +1+j, +1−j, −1−j, +1−j, −1−j, +1−j, −1−j, +1−j, +1+j, −1+j, +1+j, +1−j, −1−j, −1+j, −1−j, −1+j, −1−j, −1+j, −1−j, +1−j, −1−j, +1−j, +1+j, −1+j, −1−j, +1−j, −1−j, −1+j, +1+j, +1−j, −1−j, −1+j, −1−j, −1+j, +1+j, −1+j, +1+j, −1+j, +1+j, −1+j, −1−j, +1−j, wherein B₁₂₈ is a sequence according to: −1−j, −1+j, +1+j, +1−j, +1+j, +1−j, +1+j, +1−j, +1+j, −1+j, +1+j, −1+j, −1−j, +1−j, +1+j, −1+j, −1−j, −1+j, +1+j, +1−j, −1−j, −1+j, −1−j, −1+j, +1+j, −1+j, +1+j, −1+j, +1+j, −1+j, −1−j, +1−j, +1+j, +1−j, −1−j, −1+j, −1−j, −1+j, −1−j, −1+j, −1−j, +1−j, −1−j, +1−j, +1+j, −1+j, −1−j, +1−j, −1−j, −1+j, +1+j, +1−j, −1−j, −1+j, −1−j, −1+j, +1+j, −1+j, +1+j, −1+j, +1+j, −1+j, −1−j, +1−j, +1+j, +1−j, −1−j, −1+j, −1−j, −1+j, −1−j, −1+j, −1−j, +1−j, −1−j, +1−j, +1+j, −1+j, −1−j, +1−j, +1+j, +1−j, −1−j, −1+j, +1+j, +1−j, +1+j, +1−j, −1−j, +1−j, −1−j, +1−j, −1−j, +1−j, +1+j, −1+j, +1+j, +1−j, −1−j, −1+j, −1−j, −1+j, −1−j, −1+j, −1−j, +1−j, −1−j, +1−j, +1+j, −1+j, −1−j, +1−j, −1−j, −1+j, +1+j, +1−j, −1−j, −1+j, −1−j, −1+j, +1+j, −1+j, +1+j, −1+j, +1+j, −1+j, −1−j, +1−j.
 20. The method of claim 17, where transmitting the wireless packet comprises transmitting a real portion of the QPSK modulated Golay complementary sequences on a first antenna and transmitting an imaginary portion of the QPSK modulated Golay complementary sequences on a second antenna. 