(19)
(11)EP 2 834 930 B1

(12)EUROPEAN PATENT SPECIFICATION

(45)Mention of the grant of the patent:
13.07.2022 Bulletin 2022/28

(21)Application number: 13718247.3

(22)Date of filing:  03.04.2013
(51)International Patent Classification (IPC): 
H04L 1/00(2006.01)
(52)Cooperative Patent Classification (CPC):
H04L 1/0072; H04L 1/0079; H04L 1/0041; H04L 1/0061; H04L 1/009
(86)International application number:
PCT/US2013/035132
(87)International publication number:
WO 2013/152111 (10.10.2013 Gazette  2013/41)

(54)

PHYSICAL LAYER FRAME FORMAT FOR WLAN

RAHMENFORMAT EINER PHYSIKALISCHEN SCHICHT FÜR WLAN

FORMAT DE TRAME DE COUCHE PHYSIQUE POUR WLAN


(84)Designated Contracting States:
AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

(30)Priority: 03.04.2012 US 201261619640 P

(43)Date of publication of application:
11.02.2015 Bulletin 2015/07

(73)Proprietor: Marvell Asia Pte, Ltd.
Singapore 369522 (SG)

(72)Inventors:
  • ZHANG, Hongyuan
    Fremont, CA 94555 (US)
  • SRINIVASA, Sudhir
    Campbell, CA 95008 (US)
  • NABAR, Rohit U.
    Sunnyvale, CA 94087 (US)
  • BANERJEA, Raja
    Sunnyvale, CA 94085 (US)

(74)Representative: Grünecker Patent- und Rechtsanwälte PartG mbB 
Leopoldstraße 4
80802 München
80802 München (DE)


(56)References cited: : 
AU-A1- 2005 201 982
US-A1- 2005 149 759
US-A1- 2011 032 875
US-A1- 2005 097 361
US-A1- 2010 260 159
  
      
    Note: Within nine months from the publication of the mention of the grant of the European patent, any person may give notice to the European Patent Office of opposition to the European patent granted. Notice of opposition shall be filed in a written reasoned statement. It shall not be deemed to have been filed until the opposition fee has been paid. (Art. 99(1) European Patent Convention).


    Description


    [0001] The present disclosure relates generally to communication networks and, more particularly, to wireless local area networks that utilize orthogonal frequency division multiplexing (OFDM).

    [0002] When operating in an infrastructure mode, wireless local area networks (WLANs) typically include an access point (AP) and one or more client stations. WLANs have evolved rapidly over the past decade. Development of WLAN standards such as the Institute for Electrical and Electronics Engineers (IEEE) 802.11a, 802.11b, 802.11g, and 802.11n Standards has improved single-user peak data throughput. For example, the IEEE 802.11b Standard specifies a single-user peak throughput of 11 megabits per second (Mbps), the IEEE 802.11a and 802.11g Standards specify a single-user peak throughput of 54 Mbps, the IEEE 802.11n Standard specifies a single-user peak throughput of 600 Mbps, and the IEEE 802.11ac Standard specifies a single-user peak throughput in the gigabits per second (Gbps) range. Future standards promise to provide even greater throughputs, such as throughputs in the tens of Gbps range.

    [0003] Reference US 2010/260159 (A1) discloses a method for generating a data unit for transmission via a communication channel, wherein the data unit conforms to a first communication protocol. The method generates a preamble which includes a first field having information that indicates a duration of the data unit, the first field being formatted such that the first field is decodable by a receiver device that conforms to a second communication protocol but does not conform to the first communication protocol to determine the duration of the data unit based on the first field. Additionally, the preamble is formatted such that a portion of the preamble is decodable by a receiver device that conforms to a third communication protocol but does not conform to the first communication protocol. Also, the preamble is formatted such that a receiver device that conforms to the first communication protocol can determine that the data unit conforms to the first communication protocol. A data portion of the data unit that conforms to the first communication protocol and does not conform to either (i) the second communication protocol or (ii) the third communication protocol is generated.

    [0004] It is an object of the present invention to provide an improved technique for allowing wireless terminals employing different communication protocols to share the same physical layer.

    [0005] This is achieved by the features of the independent claims. Preferred embodiments are the subject matter of the dependent claims.

    [0006] The invention is defined by the appended claims. Any references to embodiments that do not fall under the scope of the claims are to be understood as examples useful for understanding the invention.

    Brief Description of the Drawings



    [0007] 

    Fig. 1 is a block diagram of an example wireless local area network (WLAN) 10;

    Figs. 2A and 2B are diagrams of a prior art data unit format;

    Fig. 3 is a diagram of another prior art data unit format;

    Fig. 4 is a diagram of another prior art data unit format;

    Fig. 4 is a diagram of another prior art data unit format

    Fig. 5 is a diagram of another prior art data unit format;

    Fig. 6A are diagrams of modulation used to modulate symbols in a prior art data unit;

    Fig. 6B are diagrams of modulation used to modulate symbols in another prior art data unit;

    Fig. 7 is a diagram of an example data unit format;

    Figs. 8A-8F are diagrams of example bit allocations for the a signal field.

    Fig. 9A is a diagram depicting an example cyclic redundancy check (CRC) generation scheme.

    Figs 9B-9C are diagrams depicting several cyclic redundancy check (CRC) generation schemes according to the invention.

    Fig. 10 is a block diagram depicting a detection scheme for detecting whether a data unit conforms to a first communication protocol or to a second communication protocol.

    Fig. 11 is a block diagram depicting another detection scheme for detecting whether a data unit conforms to a first communication protocol or to a second communication protocol.

    Fig. 12 is a block diagram depicting yet another detection scheme for detecting whether a data unit conforms to a first communication protocol or to a second communication protocol.

    Fig. 13A is a diagram of an example data unit format.

    Fig. 13B are diagrams of modulation used to modulate symbols in the data unit depicted in Fig. 13A;

    Fig. 14A is a diagram of an example data unit format;

    Fig. 14B are diagrams of modulation used to modulate symbols in the data unit depicted in Fig. 14A;

    Fig. 15 is a diagram of a method for generating a data unit;

    Fig. 16 is a diagram of a method for detecting whether a data unit conforms to a first communication protocol or to a second communication protocol.

    Fig. 17 is a diagram of a method for generating a data unit.


    Detailed Description



    [0008] In the examples described below, a wireless network device such as an access point (AP) of a wireless local area network (WLAN) transmits data streams to one or more client stations. The AP is configured to operate with client stations according to at least a first communication protocol. The first communication protocol, according to some examples, is referred herein as "ultra high throughput" or "UHT" communication protocol. Different client stations in the vicinity of the AP may be configured to operate according to one or more other communication protocols which define operation in the same frequency band as the UHT communication protocol but with generally lower data throughputs. The lower data throughput communication protocols (e.g., IEEE 802.11a, IEEE 802.11n, and/or IEEE 802.11ac) are collectively referred herein as "legacy" communication protocols. When the AP transmits a data unit according to the UHT communication protocol, a preamble of the data is formatted such that a client station that operates according to a legacy protocol, and not the UHT communication protocol, is able to determine certain information regarding the data unit, such as a duration of the data unit, and/or that the data unit does not conform to the second protocol. Additionally, a preamble of the data unit is formatted such that a client station that operates according to the UHT protocol is able to determine the data unit conforms to the UHT communication protocol. Similarly, a client station configured to operate according to the UHT communication protocol also transmits data units such as described above.

    [0009] In at least some embodiments, data units formatted such as described above are useful, for example, with an AP that is configured to operate with client stations according to a plurality of different communication protocols and/or with WLANs in which a plurality of client stations operate according to a plurality of different communication protocols. Continuing with the example above, a communication device configured to operate according to both the UHT communication protocol and a legacy communication protocol is able to determine that the data unit is formatted according to the UHT communication protocol and not the legacy communication protocol. Similarly, a communication device configured to operate according to a legacy communication protocol but not the UHT communication protocol is able to determine that the data unit is not formatted according to the legacy communication protocol and/or determine a duration of the data unit.

    [0010] Fig. 1 is a block diagram of an example wireless local area network (WLAN) 10. An AP 14 includes a host processor 15 coupled to a network interface 16. The network interface 16 includes a medium access control (MAC) processing unit 18 and a physical layer (PHY) processing unit 20. The PHY processing unit 20 includes a plurality of transceivers 21, and the transceivers 21 are coupled to a plurality of antennas 24. Although three transceivers 21 and three antennas 24 are illustrated in Fig. 1, the AP 14 may include other suitable numbers (e.g., 1, 2, 4, 5, etc.) of transceivers 21 and antennas 24. In one example, the MAC processing unit 18 and the PHY processing unit 20 may be configured to operate according to a first communication protocol (e.g., UHT communication protocol). In another example, the MAC processing unit 18 and the PHY processing unit 20 may be also configured to operate according to a second communication protocol (e.g., IEEE 802.11ac Standard). In yet another example, the MAC processing unit 18 and the PHY processing unit 20 may be additionally configured to operate according to the second communication protocol, a third communication protocol and/or a fourth communication protocol (e.g., the IEEE 802.11a Standard and/or the IEEE 802.11n Standard).

    [0011] The WLAN 10 includes a plurality of client stations 25. Although four client stations 25 are illustrated in Fig. 1, the WLAN 10 may include other suitable numbers (e.g., 1, 2, 3, 5, 6, etc.) of client stations 25 in various scenarios and examples. At least one of the client stations 25 (e.g., client station 25-1) is configured to operate at least according to the first communication protocol. In some examples, at least one of the client stations 25 is not configured to operate according to the first communication protocol but is configured to operate according to at least one of the second communication protocol, the third communication protocol and/or the fourth communication protocol (referred to herein as a "legacy client station").

    [0012] The client station 25-1 includes a host processor 26 coupled to a network interface 27. The network interface 27 includes a MAC processing unit 28 and a PHY processing unit 29. The PHY processing unit 29 includes a plurality of transceivers 30, and the transceivers 30 are coupled to a plurality of antennas 34. Although three transceivers 30 and three antennas 34 are illustrated in Fig. 1, the client station 25-1 may include other suitable numbers (e.g., 1, 2, 4, 5, etc.) of transceivers 30 and antennas 34.

    [0013] The client station 25-4 may be a legacy client station, i.e., the client station 25-4 is not enabled to receive and fully decode a data unit that is transmitted by the AP 14 or another client station 25 according to the first communication protocol. Similarly, the legacy client station 25-4 may be not enabled to transmit data units according to the first communication protocol. On the other hand, the legacy client station 25-4 is enabled to receive and fully decode and transmit data units according to the second communication protocol, the third communication protocol and/or the fourth communication protocol.

    [0014] One or both of the client stations 25-2 and 25-3, may have a structure the same as or similar to the client station 25-1. The client station 25-4, may have a structure similar to the client station 25-1. The client stations 25 structured the same as or similar to the client station 25-1 may have the same or a different number of transceivers and antennas. For example, the client station 25-2 may have only two transceivers and two antennas.

    [0015] The PHY processing unit 20 of the AP 14 may be configured to generate data units conforming to the first communication protocol and having formats described hereinafter. The transceiver(s) 21 is/are configured to transmit the generated data units via the antenna(s) 24. Similarly, the transceiver(s) 24 is/are configured to receive the data units via the antenna(s) 24. The PHY processing unit 20 of the AP 14 may be configured to process received data units conforming to the first communication protocol and having formats described hereinafter and to determine that such data units conform to the first communication protocol.

    [0016] The PHY processing unit 29 of the client device 25-1 may be configured to generate data units conforming to the first communication protocol and having formats described hereinafter. The transceiver(s) 30 is/are configured to transmit the generated data units via the antenna(s) 34. Similarly, the transceiver(s) 30 is/are configured to receive data units via the antenna(s) 34. The PHY processing unit 29 of the client device 25-1 may be configured to process received data units conforming to the first communication protocol and having formats described hereinafter and to determine that such data units conform to the first communication protocol.

    [0017] Fig. 2A is a diagram of a prior art OFDM data unit 200 that the AP 14 is configured to transmit to the client station 25-4 via orthogonal frequency division multiplexing (OFDM) modulation. The client station 25-4 may be also configured to transmit the data unit 200 to the AP 14. The data unit 200 conforms to the IEEE 802.11a Standard and occupies a 20 Megahertz (MHz) band. The data unit 200 includes a preamble having a legacy short training field (L-STF) 202, generally used for packet detection, initial synchronization, and automatic gain control, etc., and a legacy long training field (L-LTF) 204, generally used for channel estimation and fine synchronization. The data unit 200 also includes a legacy signal field (L-SIG) 206, used to carry certain physical layer (PHY) parameters of with the data unit 200, such as modulation type and coding rate used to transmit the data unit, for example. The data unit 200 also includes a data portion 208. Fig. 2B is a diagram of example data portion 208 (not low density parity check encoded), which includes a service field, a scrambled physical layer service data unit (PSDU), tail bits, and padding bits, if needed. The data unit 200 is designed for transmission over one spatial or space-time stream in a single input single output (SISO) channel configuration.

    [0018] Fig. 3 is a diagram of a prior art OFDM data unit 300 that the AP 14 is configured to transmit to the client station 25-4 via orthogonal frequency domain multiplexing (OFDM) modulation. The client station 25-4 may be also configured to transmit the data unit 300 to the AP 14. The data unit 300 conforms to the IEEE 802.11n Standard, occupies a 20 MHz band, and is designed for mixed mode situations, i.e., when the WLAN includes one or more client stations that conform to the IEEE 802.11a Standard but not the IEEE 802.11n Standard. The data unit 300 includes a preamble having an L-STF 302, an L-LTF 304, an L-SIG 306, a high throughput signal field (HT-SIG) 308, a high throughput short training field (HT-STF) 310, and M data high throughput long training fields (HT-LTFs) 312, where M is an integer generally determined by the number of spatial streams used to transmit the data unit 300 in a multiple input multiple output (MIMO) channel configuration. In particular, according to the IEEE 802.1 In Standard, the data unit 300 includes two HT-LTFs 312 if the data unit 300 is transmitted using two spatial streams, and four HT-LTFs 312 is the data unit 300 is transmitted using three or four spatial streams. An indication of the particular number of spatial streams being utilized is included in the HT-SIG field 308. The data unit 300 also includes a data portion 314.

    [0019] Fig. 4 is a diagram of a prior art OFDM data unit 400 that the AP 14 is configured to transmit to the client station 25-4 via orthogonal frequency domain multiplexing (OFDM) modulation. The client station 25-4 may be also configured to transmit the data unit 400 to the AP 14. The data unit 400 conforms to the IEEE 802.11n Standard, occupies a 20 MHz band, and is designed for "Greenfield" situations, i.e., when the WLAN does not include any client stations that conform to the IEEE 802.11a Standard but not the IEEE 802.11n Standard. The data unit 400 includes a preamble having a high throughput Greenfield short training field (HT-GF-STF) 402, a first high throughput long training field (HT-LTF1) 404, a HT-SIG 406, and M data HT-LTFs 408, where M is an integer which generally corresponds to a number of spatial streams used to transmit the data unit 400 in a multiple input multiple output (MIMO) channel configuration. The data unit 400 also includes a data portion 410.

    [0020] Fig. 5 is a diagram of a prior art OFDM data unit 500 that the client station AP 14 is configured to transmit to the client station 25-4 via orthogonal frequency domain multiplexing (OFDM) modulation. The client station 25-4 may be also configured to transmit the data unit 500 to the AP 14. The data unit 500 conforms to the IEEE 802.11ac Standard and is designed for "Mixed field" situations. The data unit 500 occupies a 20MHz bandwidth. In other examples or scenarios, a data unit similar to the data unit 500 occupies a different bandwidth, such as a 40MHz, an 80MHz, or a 160MHz bandwidth. The data unit 500 includes a preamble having an L-STF 502, an L-LTF 504, an L-SIG 506, two first very high throughput signal fields (VHT-SIGAs) 508 including a first very high throughput signal field (VHT-SIGA1) 508-1 and a second very high throughput signal field (VHT-SIGA2) 508-2, a very high throughput short training field (VHT-STF) 510, M very high throughput long training fields (VHT-LTFs) 512, where M is an integer, and a second very high throughput signal field (VHT-SIG-B) 514. The data unit 500 also includes a data portion 516.

    [0021] Fig. 6A is a set of diagrams illustrating modulation of the L-SIG, HT-SIG1, and HT-SIG2 fields of the data unit 300 of Fig. 3, as defined by the IEEE 802.1 In Standard. The L-SIG field is modulated according to binary phase shift keying (BPSK), whereas the HT-SIG1 and HT-SIG2 fields are modulated according to BPSK, but on the quadrature axis (Q-BPSK). In other words, the modulation of the HT-SIG1 and HT-SIG2 fields is rotated by 90 degrees as compared to the modulation of the L-SIG field.

    [0022] Fig. 6B is a set of diagrams illustrating modulation of the L-SIG, VHT-SIGA1, and VHT-SIGA2 fields of the data unit 500 of Fig. 5, as defined by the IEEE 802.11ac Standard. Unlike the HT-SIG1 field in Fig. 6A, the VHT-SIGA1 field is modulated according to BPSK, same as the modulation of the L-SIG field. On the other hand, the VHT-SIGA2 field is rotated by 90 degrees as compared to the modulation of the L-SIG field.

    [0023] Fig. 7A is a diagram of an OFDM data unit 700 that the client station AP 14 is configured to transmit to the client station 25-1 via orthogonal frequency domain multiplexing (OFDM) modulation. In an example, the client station 25-1 is also configured to transmit the data unit 700 to the AP 14. The data unit 700 conforms to the first communication protocol and occupies a 20MHz bandwidth. Data units similar to the data unit 700 occupy other suitable bandwidth such as 40MHz, 80MHz, 160MHz, 320MHz, 640MHz, for example, or other suitable bandwidths. The data unit 700 is suitable for "mixed mode" situations, i.e. when the WLAN 10 includes a client station (e.g., the legacy client station 24-4) that conforms to a legacy communication protocol, but not the first communication protocol. The data unit 700 may be utilized in other situations as well.

    [0024] The data unit 700 includes a preamble having an L-STF 702, an L-LTF 704, an L-SIG 706, two first ultra high throughput signal fields (UHT-SIGAs) 708 including a first ultra high throughput signal field (UHT-SIGA1) 708-1 and a second ultra high throughput signal field (UHT-SIGA2) 708-2, an ultra high throughput short training field (UHT-STF) 710, M ultra high throughput long training fields (UHT-LTFs) 712, where M is an integer, and a third ultra high throughput signal field (UHT-SIGB) 714. In an example, the UHT-SIGAs 708 comprise two OFDM symbols, where the UHT-SIGA1 708-1 field comprises the first OFDM symbol and the UHT-SIGA2 comprises the second OFDM symbol. In at least some examples, the UHT-SIGAs 708 are collectively referred to as a single very high throughput signal field (UHT-SIGA) 708. In some examples, the data unit 700 also includes a data portion 716. In other examples, the data unit 700 omits the data portion 716.

    [0025] In the example of Fig. 7A, the data unit 700 includes one of each of the L-STF 702, the L-LTF 704, the L-SIG 706, the UHT-SIGA1s 708. In other examples in which an OFDM data unit similar to the data unit 700 occupies a cumulative bandwidth other than 20MHz, each of the L-STF 702, the L-LTF 704, the L-SIG 706, the UHT-SIGA1s 708 is repeated over a corresponding number of 20MHz sub-bands of the whole bandwidth of the data unit. For example, the OFDM data unit occupies an 80MHz bandwidth and, accordingly, includes four of each of the L-STF 702, the L-LTF 704, the L-SIG 706, the UHT-SIGA1s 708. In some examples, the modulation of different 20 MHz sub-bands signals is rotated by different angles. For example, a first subband is rotated 0-degrees, a second subband is rotated 90-degrees, a third sub-band is rotated 180-degrees, and a fourth sub-band is rotated 270-degrees. In other example, different suitable rotations are utilized. The different phases of the 20MHz sub-band signals may result in reduced peak to average power ratio (PAPR) of OFDM symbols in the data unit 700. In an example, if the data unit that conforms to the first communication protocol is an OFDM data unit that occupies a cumulative bandwidth such as 20MHz, 40MHz, 80MHz, 160MHz, 320MHz, 640MHz, etc., the UHT-STF, the UHT-LTFs, the UHT-SIGB and the UHT data portion occupy the corresponding whole bandwidth of the data unit.

    [0026] Fig. 7B is a set of diagrams illustrating modulation of the L-SIG 706, UHT-SIGA1 708-1, and UHT-SIGA2 708-2 of the data unit 700 of Fig. 7A. In this example, the L-SIG 706, UHT-SIGA1 708-1, and UHT-SIGA2 708-2 fields have the same modulation as the modulation of the corresponding field as defined in the IEEE 802.11ac Standard and depicted in Fig. 6B. Accordingly, the UHT-SIGA1 field is modulated the same as the L-SIG field. On the other hand, the UHT-SIGA2 field is rotated by 90 degrees as compared to the modulation of the L-SIG field.

    [0027] In an example, because the modulations of the L-SIG 706, UHT-SIGA1 708-1, and UHT-SIGA2 708-2 fields of the data unit 700 correspond to the modulations of the corresponding fields in a data unit that conforms to the IEEE 802.11ac Standard (e.g., the data unit 500 of Fig. 5), legacy client stations configured to operate according to the IEEE 802.11a Standard and/or the IEEE 802.11n Standard will assume, in at least some circumstances, that the data unit 700 conforms to the IEEE-802.11ac Standard and will process the data unit 700 accordingly. For example, a client station the conforms to the IEEE 802.11a Standard will recognize the legacy IEEE 802-11a Standard portion of the preamble of the data unit 700 and will set the data unit duration according to a duration indicated in the L-SIG 706. For example, the legacy client station will calculate a duration based on a rate and a length (e.g., in number of bytes) indicated in the L-SIG field 706. In an example, the rate and the length in the L-SIG field 706 are set such that a client station configured to operate according to a legacy communication protocol will calculate, based the rate and the length, a packet duration (T) that corresponds to, or at least approximates, the actual duration of the data unit 700. For example, the rate is set to indicate a lowest rate defined by the IEEE 802.11a Standard (i.e., 6 Mbps), and the length is set to a value computed such that packet duration computed using the lowest rate at least approximates the actual duration of the data unit 700.

    [0028] In an example, a legacy client station that conforms to the IEEE-802.11a Standard, when receiving the data unit 700, will compute a packet duration for the data unit 700, e.g., using a rate and a length fields of L-SIG field 706, and will wait until the end of the computed packet duration before performing clear channel assessment (CCA). Thus, in this example, communication medium is protected against access by the legacy client station at least for the duration of the data unit 700. In an example, the legacy client station will continue decoding the data unit 700, but will fail an error check (e.g., using a frame check sequence (FCS)) at the end of the data unit 700.

    [0029] Similarly, a legacy client station configured to operate according to the IEEE 802-11n Standard, when receiving the data unit 700, will compute a packet duration (T) of the data unit 700 based on the rate and the length indicated in the L-SIG 706 of the data unit 700. The legacy client station will detect the modulation of the first UHT signal field (UHT-SIGA1) 708-1 (BPSK) and will assume that the data unit 700 is a legacy data unit that conforms to the IEEE-802.11a Standard. In an example, the legacy client station will continue decoding the data unit 700, but will fail an error check (e.g., using a frame check sequence (FCS)) at the end of the data unit. In any event, according to the IEEE 802-1 In Standard, the legacy client station will wait until the end of a computed packet duration (T) before performing clear channel assessment (CCA). Thus, communication medium will be protected from access by the legacy client station for the duration of the data unit 700.

    [0030] A legacy client station configured to operate according to the IEEE 802.11ac Standard but not the first communication protocol, when receiving the data unit 700, will compute a packet duration (T) of the data unit 700 based on the rate and the length indicated in the L-SIG 706 of the data unit 700. However, the legacy client station will not be able to detect, based on the modulation of the data unit 700, that the data unit 700 does not conform to the IEEE 802.11ac Standard. In some examples, one or more UHT signal fields (e.g., the UHT-SIGA1 and/or the UHT-SIGA2) of the data unit 700 is/are formatted to intentionally cause the legacy client station to detect an error when decoding the data unit 700, and to therefore stop decoding (or "drop") the data unit 700. For example, UHT-SIGA 708 of the data unit 700 is formatted to intentionally cause an error when the SIGA field is decoded by a legacy device according to the IEEE 802.11ac Standard. Further, according to the IEEE 802-11ac Standard, when an error is detected in decoding the VHT-SIGA field, the client station will drop the data unit 700 and will wait until the end of a computed packet duration (T), calculated, for example, based on a rate and a length indicated in the L-SIG 706 of the data unit 700, before performing clear channel assessment (CCA). Thus, communication medium will be protected from access by the legacy client station for the duration of the data unit 700.

    [0031] Figs. 8A-8F are diagrams of example bit allocations for various portions of the UHT-SIGA field 708. In particular, Figs. 8A-8C are diagrams of example bit allocations for the UHT-SIGA1 field 708-1 (or portions of the UHT-SIGA1 field 708-1), and Figs 8D-8F are diagrams of example bit allocations for the UHT-SIGA2 field 708-2 (or portions of the UHT-SIGA1 field 708-2). The UHT-SIGA field 708 is generally formatted similar to a VHT-SIGA1 field as specified in the IEEE 802.11ac Standard, but one or more subfields of the UHT-SIGA field 708 are altered as compared to the corresponding subfields defined in the IEEE 802-11ac Standard and/or include values unsupported by the IEEE 802-11ac Standard to intentionally cause a legacy client station configured to operate according to the IEEE 802.11ac Standard to detect an error from the UHT-SIGA field 708.

    [0032] Referring to Fig. 8A, the UHT-SIGA1 field 708-1 includes a plurality of subfield 802 that collectively comprise 24 information bits, in the illustrated example. The plurality of subfields 802 includes a 2-bit bandwidth (BW) subfield 802-1, a first 1-bit reserved subfield 802-2, a 1-bit space time block coding (STBC) subfield 802-3, a 6-bit Group Identification (Group ID) subfield 802-4, a 12-bit NSTS/Partial AID subfield 802-5, the content of which depends on whether the data unit 700 is a single user data unit (e.g., a data unit that used to transmit information to a single client station) or in a multiuser data unit (e.g., a data unit that includes independent data streams to multiple client stations), a 1-bit TXOP_PS_NOT_ALLOWED subfield 802-6, and a second 1-bit reserved subfield 802-7. Figs. 8B and 8C are diagrams of the NSTS/Partial AID subfield 802-5 for a single user and a multi user data unit, respectively. Referring to Fig. 8B, in an example in which the data unit 700 is a single user data unit, the NSTS/Partial AID subfield 802-5 comprises a 3-bit single user number of space-time streams subfield 802-5a and a 9-bit Partial AID subfield 802-5b. Referring to Fig. 8C, in an example in which the data unit 700 is a multiuser data unit, the NSTS/Partial AID subfield 802-5 comprises four 3-bit user Nsts subfields 802-5c through 802-5f, where each of the user subfields 802-5c through 802-5f indicates a number of space time streams corresponding to a intended recipient of the signal field 800.

    [0033] Referring to now Fig. 8D, the UHT-SIGA2 field 708-2 includes a plurality of subfield 810 that collectively comprise 24 information bits. The plurality of subfields 810 includes a 1-bit Short GI subfield 810-1, a 1-bit Short GINSYM Disambiguation subfield 810-2, a 1-bit SU/MU[0] Coding subfield 910-3, a 1-bit LDPC Extra OFDM Symbol subfield 810-4, a 12-bit SU MCS/MU[1-3] Coding subfield 910-5, the content of which depends on whether the data unit 700 is a single user data unit or a multiuser data unit, a 1-bit beamsteering/reserved subfield 810-6, a reserved subfield 810-7, an 8-bit cyclic redundancy check (CRC) subfield 810-8, and a tail subfield 801-9. Figs. 8E and 8F are diagrams of the SU MCS/MU[1-3] Coding subfield 810-5 for a single user and a multi user data unit, respectively. Referring to Fig. 8E, in an example in which the data unit 700 is a single user data unit, the SU MCS/MU[1-3] Coding subfield 810-5 comprises a 4-bit single SU MCS subfield 810-5a. Referring to Fig. 8F, in an example in which the data unit 700 is a multiuser data unit, the SU MCS/MU[1-3] Coding subfield 810-5 comprises four 1-bit subfields 810-5b through 810-5e, where each of the subfields 810-5b through 810-5d indicates a coding utilized for a particular intended recipient of the signal field 810, and the subfield 810-5e is reserved.

    [0034] In some examples, a signal field of a data unit that conforms to the first communication protocol (e.g., the UHT-SIGA field 708 of the data unit 700) is formatted similarly to a corresponding signal field of a legacy data unit specified by a legacy communication protocol (e.g., the VHT-SIGA as specified in the IEEE 802.11ac Standard), but with a set of one or more information bits generated differently than the corresponding information bits generated according to the legacy communication protocol. For example, the set of one or more information bits includes information bits generated an error detection scheme (e.g., CRC) not specified by the legacy communication protocol. As another example, the set of one or more information bits includes information bits set to indicate a mode not supported by the legacy communication protocol. The differences between the signal field formatted according to the first communication protocol and a signal field formatted according to the legacy communication protocol cause a receiving device that conforms to the second communication protocol, but not the first communication protocol, to detect an error when decoding a signal field of a data unit that conforms to the first communication protocol, in at least some examples and/or scenarios. Further, such differences permit a receiver device that conforms to the first communication protocol whether a data unit being received conforms to the first communication protocol or to a legacy communication protocol.

    [0035] For example, CRC to be included in the CRC subfield 810-8 (Fig. 8C) is generated differently than CRC specified for the VHT-SIGA field by the IEEE 802.11ac Standard. The different CRC for the UHT-SIGA 708 field will cause a CRC error when the UHT-SIGA field 708 is decoded by a client station that conforms to the IEEE 802.11ac Standard, but not the first communication protocol. Further, the different CRC will permit a client station that conforms to the first communication protocol to determine that the data unit 700 conforms to the first communication protocol.

    [0036] Figs 9A-9C are diagrams depicting several example CRC generation schemes 950, 960, 970 used for generating CRC for a UHT-SIGA field of a data unit that conforms to the first communication protocol. The CRC generation schemes 950, 960, 970 may be used to generate the CRC subfield 810-8 (Fig. 8D) or a CRC field for another suitable UHT-SIGA field of a data unit that conforms to the first communication protocol.

    [0037] Referring to Fig. 9A, according to the CRC generation scheme 950, an 8-bit CRC for the UHT-SIGA field is generated using a polynomial that is different from the polynomial specified for the VHT-SIGA field in the IEEE 802.11ac Standard. For example, an 8-bit polynomial at least substantially orthogonal to the polynomial specified for the VHT-SIGA field is utilized at block 952. In other examples, other suitable polynomials different from the CRC polynomial specified for the VHT-SIGA field may be utilized at block 952.

    [0038] Referring now to Fig. 9B, according to the CRC generation scheme 960, an 8-bit CRC for the UHT-SIGA 708 is generated using the polynomial specified for the VHT-SIGA field in the IEEE 802.11ac Standard (block 962), but one or more bits of the generated CRC are flipped (i.e., "0" changed to "1" and "1" changed to "0"), or otherwise encrypted (block 964), according to this embodiment of the invention.

    [0039] Referring now to Fig. 9C, according to the CRC generation scheme 970, a CRC having less bits than the 8-bit CRC specified for the VHT-SIGA field in the IEEE 802.11ac Standard is generated for the UHT-SIGA field, in an embodiment of the invention. For example, a 4-bits CRC is generated for the UHT-SIGA, in some embodiments. The 4-bit CRC is generated, for example, using the polynomial specified for the VHT-SIGA field in the IEEE 802.11ac Standard (block 972). Then, a 4-bit subset of the generated CRC (block 974) is selected. For example, the four most significant bits (MSB) or the four most significant bits (LSB) of the generated CRC (block 974) are selected, in some embodiments of the invention. Further, one or more bits of the selected 4-bit CRC are flipped (i.e., "0" changed to "1" and "1" changed to "0"), or otherwise encrypted (block 976), in this embodiment of the invention. In other embodiments of the invention, the CRC generation scheme 970 generates a CRC that is another suitable number of bits less than 8 (e.g., 7 bits, 6 bits, 5 bits, etc.). For example, a 5-bit CRC is generated using the polynomial specified for the VHT-SIGA field in the IEEE 802.11ac Standard, selecting five most significant bits (MSB) of the generated CRC, the five least significant bits (LSB) of the generated CRC, or another 5-bit subset of the generated CRC, and encrypting (e.g., flipping) one or more bits of the resulting 5-bit CRC, in some embodiments of the invention. In some embodiments in which fewer CRC bits are utilized (e.g., fewer than 8), the remaining bit locations of the UHT-SIGA field (e.g., the other ones of MSBs or LSBs of the CRC subfield 810-8 of Fig. 8D) are reserved and/or are utilized to signal additional information relevant to the first communication protocol.

    [0040] While Figs. 9A-9C depict several example CRC generation schemes utilized for the UHT-SIGA field 708, in general, any CRC generation scheme different than a CRC generation scheme specified for the VHT-SIGA field by the IEEE 802.11ac Standard can be utilized, and other suitable CRC generation are utilized to generate CRC for the UHT-SIGA field 708 in other exemplary embodiments.

    [0041] As just an example, CRC having less bits than the 8-bit CRC specified for the VHT-SIGA field in the IEEE 802.11ac Standard is generated for the UHT-SIGA field using a polynomial that is different from the polynomial specified by the IEEE 802-11ac Standard. For example, an x-bit CRC may be generated using an x-bit polynomial designed such that the generated CRC is at least substantially uncorrelated with the corresponding bits of the VHT-SIGA CRC generated according to the IEEE 802.11ac Standard, where x is an integer between 1 and 7. The remaining bit locations of the UHT-SIGA field that correspond to bit locations of the CRC subfield of a VHT-SIGA field defined by the IEEE 802.11ac Standard (e.g., the other ones of MSBs or LSBs of the CRC subfield 910-8 of Fig. 8D) may be reserved or are utilized to signal additional information relevant to the first communication protocol.

    [0042] Differences in CRC generation for the UHT-SIGA field according to the first communication protocol and for the VHT-SIGA field as defined in the IEEE 802-11ac Standard will cause a legacy client station configured to operate according to the IEEE 802-11ac Standard to detect a CRC error when decoding the data unit 700 and to therefore drop the data unit 700. Further, differences in CRC generation for the UHT-SIGA field according to the first communication protocol and for the VHT-SIGA field defined in the IEEE 802-11ac Standard will permit a client station configured to operate according to the first communication protocol, when receiving a data unit, to detect whether the data unit conforms to the first communication protocol or to the IEEE 802-11ac Standard.

    [0043] Fig. 10 is a block diagram depicting a detection scheme 1000 used by a client station (e.g., the client station 25-1) configured to operate according the first communication protocol to determine whether a data unit conforms to the first communication protocol or to a legacy communication protocol (e.g., the IEEE 802.11ac Standard). The detection scheme 1000 is suitable for use in embodiments in which the UHT-SIGA field of data units conforming to the first communication protocol include a CRC having the same number of bits as CRC specified for a corresponding field by the legacy communication protocol (e.g., 8 bits). According to the detection scheme 1100, a client station receiving a data unit decodes the SIGA field of the data unit. After decoding the signal field, the client station excludes CRC bits and BCC tail bits from the decoded SIGA field to generate a set of bits based on which a CRC for the SIGA field of the data unit should be generated, in an embedment. Then, a first CRC for the SIGA field is generated (bock 1002) based on the set of bits and using a CRC generation scheme specified in the first communication protocol. A second CRC for the SIGA field is generated (bock 1004) based on the set of bits and using a CRC generation scheme specified in the legacy communication protocol (e.g., the IEEE 802-11ac Standard). The first generated CRC and the second generated CRC is each compared (bock 1006) to the received CRC that was received in the SIGA field of the data unit. When a match is detected between the received CRC and the first generated CRC, it is determined that the data unit conforms to the first communication protocol. On the other hand, when a match is detected between the received CRC and the second generated CRC, it is determined that the data unit conforms to the legacy communication protocol (e.g., the IEEE-802.11ac Standard).

    [0044] Fig. 11 is a block diagram depicting a detection scheme 1100 used by a client station (e.g., the client station 25-1) configured to operate according the first communication protocol to detect to whether a data unit conforms to the first communication protocol or to a legacy communication protocol. The detection scheme 1100 is suitable for use in embodiments in which the UHT-SIGA field of data units conforming to the first communication protocol include fewer bits (e.g., 4 bits) than the number of CRC bits specified for a corresponding field by the legacy communication protocol. According to the detection scheme 1100, the client station, when receiving a data unit, decodes the SIGA field of the data unit. The client station then excludes CRC bits and BCC tail bits from the decoded SIGA field to generate a set of bits based on which CRC for the SIGA field should be generated. Then, a first CRC for the received SIGA field is generated (bock 1102) based on the set of bits and using the CRC generation scheme specified in the first communication protocol. In Fig. 11, CRC according to the field communication protocol is generated using a CRC polynomial specified for the corresponding field by the legacy communication protocol, selecting a subset of bits of the generated CRC (e.g., four LSBs, four MSBs, another suitable subset of CRC bits, etc.) to be utilized for the first CRC, and encrypting one or more bits in the selected subset to generate the first CRC. A second CRC for the SIGA field is generated (bock 1104) based on the set of bits and according to the CRC generation scheme specified in the IEEE 802-11ac Standard and using four LSB or four MSB of the generated CRC as the second CRC. The first generated CRC and the second generated CRC are compared (bock 1106) to the corresponding bits of the CRC that was received in the SIGA field of the data unit. When a match is detected between the received CRC and the first generated CRC, it is determined that the data unit conforms to the first communication protocol. On the other hand, when a match is detected between the received CRC and the second generated CRC, it is determined that the data unit conforms to the legacy communication protocol (e.g., the IEEE-802.11ac Standard).

    [0045] In some exemplary embodiments, in addition to or instead of using CRC to intentionally cause a legacy station to detect an error from the UHT-SIGA field 708, one or more subfields of the UHT-SIGA field 708 are set to indicate a mode that is not supported by legacy client stations configured to operate according to the legacy communication protocol to intentionally cause a legacy station to detect an error from the UHT-SIGA field 708. For example, the UHT-SIGA field 708 includes an indication of a modulation and coding scheme not supported by a legacy client station operating according to the IEEE 802.11ac Standard to intentionally cause the legacy client station to detect an error when decoding the UHT-SIGA field 708. As another example, the UHT-SIGA field 708 includes subfield combination that is not supported or "unallowable" according to the IEEE 802.11ac Standard. For example, for a single user data unit, the Group ID subfield of the UHT-SIGA field 708 may be set to a value of 0 or 63 and the SU MCS field 902-5b is set to indicate an MCS greater than 9. As another example, , the STBC subfield 902-3 and the SU NSTS subfield 902-5a may be both set to a logic one (1). As yet another example, for a multi-user data unit, the STBC subfield 902-3 and each of Nsts subfields 902-5c through 902-5f may be set to a logic one (1). Other SIGA subfield combinations unallowable in the IEEE 802.11ac Standard may be utilized in the UHT-SIGA field 708 to intentionally cause an error when the UHT-SIG field 708 is decoded by a legacy client station. Further, such unallowable combinations included in the UHT-SIGA field 708 of the data unit 700 indicate to a client station that conforms to the first communication protocol that the data unit 700 conforms to the first communication protocol.

    [0046] One or more additional indications may be included in the UHT-SIGA field 708 of the data unit 700 to indicate to a client station configured to operate according to the first communication protocol that the data unit 700 conforms to the first communication protocol. For example, a subfield that corresponds to a reserved subfield in a VHT-SIGA field generated according to the IEEE 802.11ac Standard is set to a logic zero (0) in the UHT-SIGA field 708 to indicate to a client station configured to operate according to the first communication protocol that the data unit 700 conforms to the first communication protocol. In this example, a client station operating according to the first communication protocol, when receiving a data unit, determines that the data unit conforms to the first communication protocol if the reserved bit in the UHT-SIGA field is set of logic zero(0) and determines that the data unit conforms to the IEEE 802-11ac Standard if the reserved bit is set to a logic one (1).

    [0047] In some exemplary embodiments, at least some portions (e.g., subfields) of a UHT-SIGA field (e.g., the UHT-SIGA field 708) that are not used to intentionally cause an error at a legacy device are not formatted the same as the corresponding portions (e.g., subfields) of a VHT-SIGA field specified by the IEEE 802.11ac Standard. For example, such portions are altered to include additional information relevant to the first communication protocol. For example, whereas the VHT-SIGA field specified by the IEEE 802.11ac Standard includes two bits to indicate the BW of a data unit, some data units that conform, to the first communication protocol occupy wider bandwidth than the widest bandwidth specified by the IEEE 802.11ac Standard. Thus, in some examples, one or more extra bits are needed to signal the bandwidth for data units that conform to the first communication protocol. For example, in one example, the UHT-SIGA field includes a 3-bit bandwidth indication. Additionally or alternatively, in some examples, extra signal field bits are utilized for the UHT-SIGA field to signal new physical layer (PHY) features that are not present in the IEEE 802.11ac Standard.

    [0048] In some such examples, VHT-SIGA subfields that are reserved according to the IEEE 802.11ac Standard are utilized in the UHT-SIGA field to signal the wider bandwidth and/or additional PHY features according to the first communication protocol. Additionally or alternatively, in some examples in which UHT-SIGA utilizes a shorter than the eight bit CRC defined for VHT-SIGA in the IEEE 802.11ac Standard, bits corresponding to the remaining CRC bits of the VHT-SIGA field are utilized in the UHT-SIGA field to signal the wider bandwidth and/or additional PHY features according to the first communication protocol.

    [0049] In some examples in which the UHT-SIGA field 708 includes an explicit indication to signal that the data unit 700 conforms to the first communication protocol, schemes designed to intentionally cause an error at a legacy client station are not employed for the UHT-SIGA field 708. For example, CRC for the UHT-SIGA field 708 may be generated using the VHT-SIGA CRC polynomial specified in the IEEE-802.11ac Standard and with the same number of bits as specified in the IEEE-802.11ac Standard. Further, in this example, a subfield that corresponds to a reserved subfield in a VHT-SIGA field generated according to the IEEE 802.11ac Standard is set to a logic zero (0) in the UHT-SIGA field 708 to indicate to a client station configured to operate according to the first communication protocol that the data unit 700 conforms to the first communication protocol. In this case, a client station configured to operate according to the first communication protocol will determine that the data unit 700 conforms to the first communication protocol based on the indication included in the UHT-SIGA field 708. However, a legacy client station client station receiving the data unit 700, in this case, will not necessary detect an error from the UHT-SIGA field 708 and will not necessarily drop the data unit 700. In some situations, the legacy client station may drop the data unit 700 even without detecting an intentionally caused error from the UHT-SIGA field 708. For example, the legacy client station will determine that the partial address identification (PAID) and/or the group ID (GID) included in the UHT-SIGA field 708 do not match the corresponding parameters of the client station, and will drop (stop decoding) the data unit 700 based on this determination. In other examples, however, the legacy client station may not drop the data unit 700 even when the client station determines that the partial address identification (PAID) and/or the group ID (GID) included in the UHT-SIGA field 708 do not match the corresponding parameters of the client station. In this case, the client station will continue decoding the data unit 700 for the duration of the data unit 700, and will discard the data unit 700 based on a failed FCS check at the end of the data unit 700, in at least some situations.

    [0050] In another example, CRC for the UHT-SIGA field 708 is generated using the VHT-SIGA CRC polynomial specified in the IEEE-802.11ac Standard, but with fewer bits than specified in the IEEE-802.11ac Standard. For example, a CRC is generated using the VHT-SIGA CRC polynomial and x number of the generated CRC is/are used as the CRC for the UHT-SIGA field 708. For example, four (or another suitable number, such as e.g., 5 or 6) MSB or LSB of the CRC generated using the VHT-SIGA CRC polynomial are utilized. In some such examples, the remaining bit locations of the CRC subfield are reserved or are utilized to signal additional information relevant to the first communication protocol. In such examples, although CRC is not intentionally designed to cause an error from the UHT-SIGA field at a legacy client device, it is highly likely that such an error will be detected, in which case the client station will drop the data unit 700. Further, in such examples, a client station configured to operate according to the first communication protocol will perform a CRC check for the UHT-SIGA field 708 by generating CRC based on received bits of the UHT-SIGA field 708 using the CRC polynomial specified for the VHT-SIGA field in the IEEE 802.11ac Standard and comparing 4 (or another suitable number, such as e.g., 5 or 6) MSB or LSB of the generated CRC to the received CRC in the UHT-SIGA field. Upon passing the CRC check, the client station will decode the received UHT-SIGA field and will determine that the data unit 700 conforms to the first communication protocol based on the indication included in the UHT-SIGA field.

    [0051] Fig. 12 is a diagram of an OFDM data unit 1200 that the client station AP 14 is configured to transmit to the client station 25-1 via orthogonal frequency domain multiplexing (OFDM) modulation. In an example, the client station 25-1 is also configured to transmit the data unit 1200 to the AP 14. The data unit 1200 conforms to the first communication protocol and occupies a 20MHz bandwidth. Data units similar to the data unit 1200 occupy other suitable bandwidth such as 40MHz, 80MHz, 160MHz, 320MHz, 640MHz, for example, or other suitable bandwidths. The data unit 1200 is suitable for "mixed mode" situations, i.e. when the WLAN 10 includes a client station (e.g., the legacy client station 24-4) that conforms to a legacy communication protocol, but not the first communication protocol. The data unit 1200 may be utilized in other situations as well.

    [0052] The data unit 1200 is similar to the data unit 700 of Fig. 7A, except that the data unit 1200 includes two UHT-SIGB fields 1204 as compared to a single UHT-SIG field 714 included in the data unit 700. Further, UHT-SIGA fields 1202 may be different from the UHT-SIGA fields 708 of the data unit 700. For example, one or more information bits of the UHT-SIGA fields 708 may be moved from the UHT-SIGA fields 1202 to the UHT-SIGB fields 1204. For example, one or more information bits that are not required for determining appropriate processing of the UHT-LTFs 712 may be moved to the UHT-SIGB fields 1204. Various UHT-SIGA generation schemes used to intentionally cause a legacy client station to detect an error from the UHT-SIGA and/or to indicate to a client station configured to operate according to the first communication protocol that the data unit 700 conforms to the first communication protocol may be applied to the UHT-SIGA fields 1202.

    [0053] Fig. 13A is a diagram of an OFDM data unit 1300 that the client station AP 14 is configured to transmit to the client station 25-1 via orthogonal frequency domain multiplexing (OFDM) modulation. The client station 25-1 may be also configured to transmit the data unit 1300 to the AP 14. The data unit 1300 conforms to the first communication protocol and occupies a 20MHz bandwidth. Data units similar to the data unit 1300 may occupy other suitable bandwidth such as 40MHz, 80MHz, 160MHz, 320MHz, 640MHz, or other suitable bandwidths. The data unit 1300 is suitable for "mixed mode" situations, i.e. when the WLAN 10 includes a client station (e.g., the legacy client station 24-4) that conforms to a legacy communication protocol, but not the first communication protocol. The data unit 1300 may be utilized in other situations as well.

    [0054] The data unit 1300 is similar to the data unit 700 of Fig. 7A, except that the data unit 1200 includes three UHT-SIGA fields 1302 as compared to two UHT-SIGA field 708 included in the data unit 700. Data unit similar to the data unit 1300 may include other suitable numbers (e.g., 4, 5, 6, etc.) of the UHT-SIGA fields 1302. Each UHT-SIGA field 1302 may comprise one OFDM symbol of the data unit 1300. Additional UHT-SIGA fields 1320 as compared to the two UHT-SIGA fields 708 of the data unit 700 are utilized to carry additional information relevant to the first communication protocol, for example to signal wider bandwidths defined in the first communication protocol, or to signal additional PHY features included in the first communication protocol. UHT-SIGB field 1308 may be omitted from the data unit 1300, and at least some of the Information included in the UHT-SIGB field 1308 (e.g., MU information) may be moved to the UHT-SIGA fields 1302.

    [0055] Fig. 13B is a set of diagrams illustrating modulation of the L-SIG 706, UHT-SIGA1 1302-1, and UHT-SIGA2 1302-2, and UHT-SIGA2 1302-2 of the data unit 1300 of Fig. 13A. In this example, the L-SIG 706, the UHT-SIGA1 1302-1, and the UHT-SIGA2 1302-2 fields are modulated according to BPSK modulation, signaling to legacy client stations configured to operate to the IEEE 802.11a Standard and/or the IEEE 802.11n Standard that the data unit 1300 conforms to the IEEE 802.11a Standard. Accordingly, legacy client stations configured to operate to the IEEE 802.11a Standard, the IEEE 802.11n Standard and/or the IEEE 802.11ac will process the data unit 1300 in the same manner that such devices would treat an IEEE 802.11a packet, in at least some scenarios. For example, a legacy client station will compute, based on the L-SIG field 706, a packet duration for the data unit 1300, and will wait until the end of the computed packet duration before performing clear channel assessment (CCA). Further, a client station configured to operate according to the first communication protocol will detect the modulation of the UHT-SIGA3 field 1302-3 (e.g., Q-BPSK) and, based on the detected modulation, will determined that the data unit 1300 conforms to the first communication protocol.

    [0056] Fig. 14A is a diagram of an OFDM data unit 1400 that the client station AP 14 is configured to transmit to the client station 25-1 via orthogonal frequency domain multiplexing (OFDM) modulation. The client station 25-1 may be also configured to transmit the data unit 1400 to the AP 14. The data unit 1400 conforms to the first communication protocol and occupies a 20MHz bandwidth. Data units similar to the data unit 1400 may occupy other suitable bandwidth such as 40MHz, 80MHz, 160MHz, 320MHz, 640MHz, or other suitable bandwidths. The data unit 1400 is suitable for situations in which the WLAN 10 does not include any client stations configured to operate to the IEEE-802.11a Standard but not the IEEE 802-11n Standard.

    [0057] The data unit 1400 includes a preamble having an ultra high throughput short training field (UHT-STF) 1402, a first ultra high throughput long training field (UHT-LTF) 1404, two legacy high throughput signal fields (HT-SIGs) 1406 including a first high throughput signal field (HT-SIG1) 1406-1 and a second high throughput signal field (HT-SIG2) 1406-2, two ultra high throughput signal fields (UHT-SIGs) 1408 including a first ultra high throughput signal field (UHT-SIG1) 1408-1 and a second ultra high throughput signal field (UHT-SIG2) 1408-2, M ultra high throughput long training fields (UHT-LTFs) 1410, where M is an integer, and a third ultra high throughput signal field (UHT-SIGB) 714. The UHT-SIGAs 1408 may comprise two OFDM symbols, where the UHT-SIGA1 1408-1 field comprises the first OFDM symbol and the UHT-SIGA2 1408-2 comprises the second OFDM symbol. In at least some examples, the UHT-SIGAs 1408 are collectively referred to as a single very high throughput signal field (UHT-SIGA) 1408. In some examples, the data unit 1400 also includes a data portion 1414. In other examples, the data unit 1400 omits the data portion 1414.

    [0058] In the example of Fig. 14A, the data unit 1400 includes one of each of the UHT-STF 1402, the UHT-LTF1 1403, the HT-SIG 1406 and the UHT-SIGA 1408. In other examples in which an OFDM data unit similar to the data unit 1400 occupies a cumulative bandwidth other than 20MHz, each of the UHT-STF 1402, the UHT-LTF1 1403, the HT-SIG 1406 and the UHT-SIGA 1408 is repeated over a corresponding number of 20MHz sub-bands of the whole bandwidth of the data unit. For example, the OFDM data unit may occupy an 80MHz bandwidth and, accordingly, includes four of each of the UHT-STF 1402, the UHT-LTF1 1403, the HT-SIG 1406 and the UHT-SIGA 1408. In some examples, the modulation of different 20 MHz sub-bands signals may be rotated by different angles. For example, , a first subband may be rotated 0-degrees, a second subband is rotated 90-degrees, a third sub-band is rotated 180-degrees, and a fourth sub-band is rotated 270-degrees. In other examples, different suitable rotations are utilized. The different phases of the 20MHz sub-band signals result in reduced peak to average power ratio (PAPR) of OFDM symbols in the data unit 700.

    [0059] Further, if the data unit conforming to the first communication protocol is an OFDM data unit that occupies a cumulative bandwidth such as 20MHz, 40MHz, 80MHz, 160MHz, 320MHz, 640MHz, etc., UHT-LTFs 1410, the UHT-SIGB 1412 and the UHT data portion 1414 may occupy the corresponding whole bandwidth of the data unit. Further, each of the UHT-STF 1402, the UHT-LTF1 1403, the HT-SIG 1406 and the UHT-SIGA 1408 may be single stream fields mapped to multiple spatial streams of the data unit 1400 using a column (e.g., the first column) or a row (e.g., the first row) of a spatial stream mapping matrix ("P matrix") used for mapping multi-stream portion of the data unit 1400 e.g., the UHT-LTFs 1410, the UHT-SIGB 1412 and the UHT data portion 1414) to multiple spatial streams.

    [0060] In some examples, data units similar to the data unit 1300 include other suitable numbers (e.g., 4, 5, 6, etc.) of the UHT-SIGA fields 1408. Each UHT-SIGA field 1408 may comprise one OFDM symbol. Additional UHT-SIGA fields 1408 are utilized to carry additional information relevant to the first communication protocol, for example to signal wider bandwidths defined in the first communication protocol, or to signal additional PHY features included in the first communication protocol. Further, the UHT-SIGB field 1412 may be omitted from the data unit 1400, and at least some of the information included in the UHT-SIGB field 1412 (e.g., MU information) may be moved to the UHT-SIGA fields 1406.

    [0061] Fig. 14B is a set of diagrams illustrating modulation of HT-SIG1 1406-1, UHT-SIGA2 1406-2, and UHT-SIGA1 1408-1 and UHT-SIGA2 1408-2 of the data unit 1400 of Fig. 14A. In the illustrated example, HT-SIG1 1406-1, UHT-SIGA2 1406-2, and UHT-SIGA1 1408-1 are modulated using Q-BPSK modulation. In an example, legacy client stations configured to operate to the IEEE 802.11n Standard and/or the IEEE 802.1ac Standard detect Q-BPSK modulation of the HT-SIG1 1406-1, UHT-SIGA2 1406-2, and UHT-SIGA1 1408-1 and, based on the detected modulation, will process the data unit 1400 as the legacy client station would process an IEEE 802.11n greenfield packet. In such examples, the legacy client station will calculate a duration based on a rate and a length (e.g., in number of bytes) indicated in the HT-SIG field 1406 of the data unit 1400. In an example, the rate and the length in the HT-SIG field 1406 are set such that a client station configured to operate according to a legacy communication protocol will calculate, based the rate and the length, a packet duration (T) that corresponds to, or at least approximates, the actual duration of the data unit 1400. For example, the rate is set to indicate a lowest rate defined by the IEEE 802.11n Standard (i.e., 6 Mbps), and the length is set to a value computed such that packet duration computed using the lowest rate at least approximates the actual duration of the data unit 1400. A legacy client station, when receiving the data unit 1400, will compute a packet duration for the data unit 1400, and will wait until the end of the computed packet duration before performing clear channel assessment (CCA). Further, a client station configured to operate according to the first communication protocol will detect the modulation of the UHT-SIGA2 field 1408-2 (e.g., Q-BPSK) of the data unit 1400 and will determine that the data unit 1400 conforms to the first communication protocol.

    [0062] Fig. 15 is a flow diagram of an example method 1500 for generating a data unit. With reference to Fig. 1, the method 1500 may be implemented by the network interface 16. For example, the PHY processing unit 20 may be configured to implement the method 1500. According to another example, the MAC processing 18 may be also configured to implement at least a part of the method 1500. With continued reference to Fig. 1, the method 1500 may be also implemented by the network interface 27 (e.g., the PHY processing unit 29 and/or the MAC processing unit 28). In other examples, the method 1500 is implemented by other suitable network interfaces.

    [0063] At block 1502, a first field of a preamble of a data unit conforming to a first communication protocol is generated. Referring to Fig. 7, in one example, the L-SIG field 706 of the data unit 700 is generated. In another example, another suitable first field is generated. The first field includes a first set of one or more information bits that indicate a duration of the data unit. The first field is formatted such that the first field decodable by a receiver device that conforms to a second communication protocol, but does not conform to the first communication protocol, to determine the duration of the data unit based on the first field. The first set of information bits corresponds, for example, to a rate subfield and a length subfield of the preamble of the data unit, wherein the rate subfield and the length subfield are generated to allow the receiver device that conforms to the second communication protocol to compute at least an approximate duration of the data unit. In another example, the first set of information bits indicate other suitable information to allow a receiver device that conforms to the second communication protocol to determine a duration of the data unit.

    [0064] In an example, the first communication protocol is the UHT communication protocol and the second communication protocol is a legacy communication protocol such as the IEEE 802.11ac Standard. In other examples, the first communication protocol and/or the second communication protocol is another suitable communication protocol, including communication protocol not yet defined. For example, the second communication protocol may be the UHT communication protocol, and the first communication protocol may be a communication protocol defining even higher throughputs.

    [0065] At block 1504, a second field of the preamble is generated. Referring to Fig. 7, the UHT-SIGA field 708 of the data unit 700 is generated. In another example, another suitable second field is generated. The second field includes a second set of one or more information bits that indicate to a receiver device that conforms to the first communication protocol that the data unit conforms to the first communication protocol. The second set of one or more information may be generated according to an error detection scheme, such as a cyclic redundancy check (CRC) scheme, not specified by the second communication protocol. For example, the second set of information bits is generated according to the CRC generation scheme 950 of Fig. 9A, the CRC generation scheme 960 of Fig. 9B or the CRC generation scheme 970 of Fig. 9C, in some examples. In other examples, the second set of one or more information bits is generated according to other suitable error detection schemes not specified by the second commutation protocol. Additionally or alternatively, the second set of one or more information bits is generated to indicate a mode no supported by the second communication protocol, such as a GID and MCS combination, or another suitable mode, not supported by the second communication protocol.

    [0066] At block 1506, the first field generated at block 1502 is modulation according to a modulation scheme specified for a field corresponding to the first field by the second communication protocol. For example, the first field is modulating using BPSK modulation. In another example, the first field is modulated using another suitable modulation scheme, such as Q-BPSK modulation or another suitable modulation specified for a field corresponding to the first field by the second communication protocol.

    [0067] At block 1508, the second field generated at block 1502 is modulation according to a modulation scheme specified for a field corresponding to the second field by the second communication protocol. For example, the second field comprises two OFDM symbols, wherein the first OFDM symbol is modulated using Q-BPSK modulation at block 1508 and the second OFDM symbol is modulation using BPSK modulation as specified by the second communication protocol. In other examples, the second field is modulated at block 1508 using other suitable modulation schemes specified for a field corresponding to the second field by the second communication protocol.

    [0068] At block 1510, the preamble of the data unit is generated to include at least the first field and the second field. At block 1512, the data unit is generated to include at least the preamble generated at block 1510. In some examples, the data unit is generated to further include a data portion. When the data unit is generated to include a data portion, the data portion may be generated such that the data portion conforms to the first communication protocol, but does not conform to the second communication protocol.

    [0069] Fig. 16 is a flow diagram of an example method 1600. With reference to Fig. 1, the method 1600 may be implemented by the network interface 16. For example, the PHY processing unit 20 may be configured to implement the method 1600. According to another example, the MAC processing 18 may be also configured to implement at least a part of the method 1600. With continued reference to Fig. 1, in yet another example, the method 1600 may be implemented by the network interface 27 (e.g., the PHY processing unit 29 and/or the MAC processing unit 28). In other examples, the method 1600 is implemented by other suitable network interfaces.

    [0070] At block 1602, a data unit that conforms to a first communication protocol or to a second communication protocol is received. In an example, the data unit is received by a receiver device via a communication channel. In an example, the data unit 700 of fig. 7 is received. In another example, the data unit 500 of Fig. 5 is received. In another example, another suitable data unit is received. In an example, the first communication protocol is the UHT communication protocol and the second communication protocol is a legacy communication protocol such as the IEEE 802.11ac Standard. In other examples, the first communication protocol and/or the second communication protocol is another suitable communication protocol, including communication protocol not yet defined. For example, the second communication protocol may be the UHT communication protocol, and the first communication protocol is a communication protocol defining even higher throughputs.

    [0071] At block 1604, a field of a preamble of the data unit received at block 1602 is decoded. Referring to Fig. 7, in an example, the UHT-SIGA field 708 of the data unit 700 is decoded. Referring to Fig. 5, the VHT-SIGA field 508 is decoded, in another example. In another example, another suitable field of a preamble of the data unit received at block 1602 is decoded. In an example, decoding the field at block 1604 included decoding a received CRC included in the field decoded at block 1604.

    [0072] At block 1606, a first CRC is generated based on the field decoded at block 1604. The first CRC is generated using a first CRC generation scheme, the first CRC generation scheme specified for the field by the first communication protocol. For example, the first CRC is generated according to the CRC generation scheme 950 of Fig. 9A, the CRC generation scheme 960 of Fig. 9B or the CRC generation scheme 970 of Fig. 9C, in some examples. In other examples, the first CRC is generated according to other suitable CRC generation schemes specified for the field by the first communication protocol.

    [0073] At block 1608, a second CRC is generated based on the field decoded at block 1604. The second CRC is generated using a second CRC generation scheme, the second CRC generation scheme specified for the field by the second communication protocol. For example, the second CRC is generated according to the CRC generation scheme specified for the VHT-SIGA field in the IEEE 802.11ac Standard. In other examples, the second CRC is generated according to other suitable schemes specified for the field by the second communication protocol.

    [0074] At block 1610, the first CRC generated at block 1606 and the second CRC generated at block 1608 are compared to the received CRC decoded at block 1604. At block 1612, it is determined whether the first generated CRC or the second generated CRC matches the received CRC. When it is determined at block 1612 that the first generated CRC matches the received CRC, the method continues at block 1614, where it is determined that the data unit received at block 1602 conforms to the first communication protocol. On the other hand, when it is determined at block 1612 that the second generated CRC matches the received CRC, the method continues at block 1616, where it is determined that the data unit received at block 1602 conforms to the second communication protocol.

    [0075] Fig. 17 is a flow diagram of an example method 1700 for generating a data unit that conforms to a first communication protocol. With reference to Fig. 1, the method 1700 may be implemented by the network interface 16. For example, the PHY processing unit 20 may be configured to implement the method 1700. According to another example, the MAC processing 18 is also configured to implement at least a part of the method 1700. With continued reference to Fig. 1, in yet another example, the method 1700 is implemented by the network interface 27 (e.g., the PHY processing unit 29 and/or the MAC processing unit 28). In other examples, the method 1700 is implemented by other suitable network interfaces.

    [0076] At block 1702, a preamble of the data unit is generated. In an example, the preamble of the data unit 1300 in Fig. 13 is generated. In another example, another suitable preamble is generated. The preamble includes a first field having a plurality of OFDM symbols. In an example, the first field is the signal field 1302 in Fig. 13. In another example, the first field is another suitable first field. The first field includes at least a first OFDM symbol, a second OFDM symbol, and a third OFDM symbol.

    [0077] The first OFDM symbol is formatted such that the first OFDM symbol is decodable by a receiver device that conforms to a second communication protocol, but does not conform to the first communication protocol, to determine that the data unit conforms to a third communication protocol. The first OFDM symbol is formatted, for example, as the UHT-SIGA1 1302-1 of Fig. 13. In this example, the first OFDM symbol is modulated according to BPSK modulation. In an example, BPSK modulation of the first OFDM symbol causes a device that conforms to the second communication protocol (e.g., a legacy client station that conforms to the IEEE-802.11n Standard), to determine that the data unit conforms a third communication protocol (e.g., the IEEE-802.11a Standard).

    [0078] The second OFDM symbol is formatted such that the second OFDM symbol and the first OFDM symbol are decodable by a receiver device that conforms to a fourth communication protocol, but does not conform to the first communication protocol, to determine that the data unit conforms to the third communication protocol. The second OFDM symbol is formatted, for example, as the UHT-SIGA2 1302-2 of Fig. 13. In this example, the second OFDM symbol is modulated according to BPSK modulation. In an example, BPSK modulation of the first OFDM symbol, in combination with BPSK modulation of the first OFDM symbol, causes a device that conforms to the fourth communication protocol (e.g., a legacy client station that conforms to the IEEE-802.11ac Standard), to determine that the data unit conforms the third communication protocol (e.g., the IEEE-802.11a Standard).

    [0079] The third OFDM symbol is formatted such a receiver device that conforms to the first communication protocol can determine that the data unit conforms to the first communication protocol. The third OFDM symbol is formatted, for example, as the UHT-SIGA3 1302-3 of Fig. 13. In this example, the third OFDM symbol is modulated according to Q-BPSK modulation. In an example, Q-BPSK modulation of the third OFDM symbol causes a device that conforms to the first communication protocol (e.g., the UHT communication protocol), to determine that the data unit conforms the first communication protocol.

    [0080] At block 1704, the data unit is generated to include at least the preamble. In an example, the data unit 1300 of Fig. 13 is generated. In an example, the data unit 1300 is generated, wherein the data unit 1300 omits the data portion 716. In another example, the data unit 1300 is generated, wherein the data unit 1300 includes the data portion 716. In other examples, other suitable data units are generated. When the data unit is generated to include a data portion, the data portion is generated such that the data portion conforms to the first communication protocol, and does not conform to either of the second communication protocol, the third communication protocol, and the fourth communication protocol.

    [0081] At least some of the various blocks, operations, and techniques described above may be implemented utilizing hardware, a processor executing firmware instructions, a processor executing software instructions, or any combination thereof. When implemented utilizing a processor executing software or firmware instructions, the software or firmware instructions may be stored in any computer readable memory such as on a magnetic disk, an optical disk, or other storage medium, in a RAM or ROM or flash memory, processor, hard disk drive, optical disk drive, tape drive, etc. Likewise, the software or firmware instructions may be delivered to a user or a system via any known or desired delivery method including, for example, on a computer readable disk or other transportable computer storage mechanism or via communication media. Communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism. The term "modulated data signal" means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, radio frequency, infrared and other wireless media. Thus, the software or firmware instructions may be delivered to a user or a system via a communication channel such as a telephone line, a DSL line, a cable television line, a fiber optics line, a wireless communication channel, the Internet, etc. (which are viewed as being the same as or interchangeable with providing such software via a transportable storage medium). The software or firmware instructions may include machine readable instructions that, when executed by the processor, cause the processor to perform various acts.

    [0082] When implemented in hardware, the hardware may comprise one or more of discrete components, an integrated circuit, an application-specific integrated circuit (ASIC), etc.


    Claims

    1. A method (1500) for generating a data unit (700, 1200, 1300, 1400) for transmission via a communication channel, the data unit (700, 1200, 1300, 1400) conforming to a first communication protocol, the method comprising:
    generating a first field (706, 1502) to be included in a preamble of the data unit, wherein the first field includes a first set of one or more information bits that indicate a duration of the data unit, the first field being formatted such that the first field is decodable by a receiver device (25-4) that conforms to a second communication protocol, but does not conform to the first communication protocol, to determine the duration of the data unit (700. 1200, 1300. 1400) based on the first field (706, 1502):

    generating a second field (708, 1504) to be included in the preamble, wherein the second field includes a second set of one or more information bits (708-2, 1510) that indicate to a receiver device (14, 25-1) that conforms to the first communication protocol that the data unit conforms to the first communication protocol;

    modulating the first field (1506) using a modulation scheme specified for a field corresponding to the first field by the second communication protocol;

    modulating the second field (1508) using a modulation scheme specified for a field corresponding to the second field by the second communication protocol;

    generating the preamble (1510) to include at least the first field (706, 1502) and the second field (708, 1504): and

    generating the data unit (700, 1200, 1300, 1400, 1512) to include at least the preamble;

    wherein generating the second field (1504) includes generating the second set of one or more information bits according to an error detection scheme not specified by the second communication protocol (950, 960, 970), including generating a cyclic redundancy check, CRC, for the second field that indicates an error when decoded by the receiver that conforms to the second communication protocol but does not conform to the first communication protocol,

    characterized in that generating the CRC for the second field comprises:

    generating a plurality of CRC bits (962, 972) according to a CRC polynomial specified for the corresponding field by the second communication protocol, and

    encrypting only one or more bits of the plurality of CRC bits (964, 974), the one or more bits being less than all bits of the plurality of CRC bits, to generate the CRC for the second field that indicates the error when decoded by the receiver device that conforms to the second communication protocol but does not conform to the first communication protocol.


     
    2. A method according to claim 1, wherein the second field (708) includes a modulation and coding (MCS) subfield (902-3, 902-5b, 902-5c, 902-5d, 902-5e, 902-5f), and wherein generating the second set of one or more information bits further comprises generating the MCS subfield to indicate a modulation and coding scheme not supported by the second communication protocol.
     
    3. A method according to claim 1, wherein the second field further includes an indication (1302-3) that the data unit conforms to the first communication protocol.
     
    4. A method according to claim 1, wherein the second communication protocol conforms to the Institute for Electrical and Electronics Engineers (IEEE) 802.11ac Standard.
     
    5. A method according to claim 4, wherein the first communication protocol is a communication protocol that supports a higher throughput than the IEEE 802.11ac Standard.
     
    6. An apparatus (14, 25) for generating a data unit (700) for transmission via a communication channel, the data unit conforming to a first communication protocol, the apparatus (14, 25) comprising a network interface (16, 27) configured to perform a method according to one of claims 1 to 5.
     
    7. A method (1000, 1100, 1600), comprising:

    receiving a data unit (700, 1602), wherein the data unit (700, 1602) conforms to a first communication protocol or to a second communication protocol;

    decoding a field of a preamble of the data unit (1604), including decoding a received cyclic redundancy check (CRC) included in the field; and

    generating, based on the field, a first CRC using a first CRC generation scheme (1002, 1102, 1606), the first CRC generation scheme specified for the first field by the first communication protocol;

    generating, based on the field, a second CRC using a second CRC generation scheme (1004, 1104, 1608), the second CRC generation scheme specified for the field by the second communication protocol;

    comparing (i) the first generated CRC and (ii) the second generated CRC to the received CRC (1006, 1106, 1610, 1612);

    determining that the data unit conforms to the first communication protocol when the first generated CRC matches the received CRC (1614); and

    determining that the data unit conforms to the second communication protocol when the second generated CRC matches the received CRC (1616),

    characterized in that

    generating the first CRC comprises generating the first CRC according to a first CRC polynomial, the first CRC polynomial specified for the field by the first communication protocol, and

    generating the second CRC comprises generating a plurality of CRC bits according to a second CRC polynomial different than the first CRC polynomial, and encrypting only one or more bits of the plurality of CRC bits to generate the second CRC, the one or more bits being less than all bits of the plurality of CRC bits.


     
    8. A method according to claim 7, wherein:

    generating the first CRC comprises generating the first CRC according to a first CRC polynomial (1002), the first CRC polynomial specified for the field by the first communication protocol, and

    generating the second CRC comprises generating the second CRC according to a second CRC polynomial (1004), the second CRC polynomial specified for the field by the second communication protocol, wherein the second CRC polynomial is different than the first CRC polynomial.


     
    9. A method according to claim 7, wherein:

    generating the first CRC (1002) comprises generating the first CRC according to a first CRC polynomial, the first CRC polynomial specified for the field by the first communication protocol, and

    generating the second CRC (1004) comprises:

    generating a plurality of CRC bits according to the first CRC polynomial,

    selecting a subset of the plurality of CRC bits, the subset to be utilized for the CRC for the second CRC; and

    encrypting one or more bits in the selected subset of the plurality of CRC bits to generate the second CRC.


     
    10. An apparatus (14, 25), comprising a network interface (16, 27) configured to perform a method according to one of claims 7 to 9.
     


    Ansprüche

    1. Verfahren (1500) zum Erzeugen einer Dateneinheit (700, 1200, 1300, 1400) für Übertragung über einen Kommunikationskanal, wobei die Dateneinheit (700, 1200, 1300, 1400) einem ersten Kommunikationsprotokoll entspricht und das Verfahren umfasst:
    Erzeugen eines ersten Feldes (706, 1502), das in einer Präambel der Dateneinheit enthalten sein soll, wobei das erste Feld einen ersten Satz aus einem oder mehreren Informations-Bit/s enthält, das/die eine Dauer der Dateneinheit anzeigt/anzeigen, das erste Feld so formatiert ist, dass das erste Feld von einer Empfängereinrichtung (25-4) dekodiert werden kann, die einem zweiten Kommunikationsprotokoll entspricht, dem ersten Kommunikationsprotokoll jedoch nicht entspricht, um die Dauer der Dateneinheit (700, 1200, 1300, 1400) auf Basis des ersten Feldes (706, 1502) zu bestimmen:

    Erzeugen eines zweiten Feldes (708, 1504), das in der Präambel enthalten sein soll, wobei das zweite Feld einen zweiten Satz aus einem oder mehreren Informations-Bit/s (708-2, 1510) enthält, das/die einer Empfängereinrichtung (14, 25-1), die dem ersten Kommunikationsprotokoll entspricht, anzeigt/anzeigen, dass die Dateneinheit dem ersten Kommunikationsprotokoll entspricht;

    Modulieren des ersten Feldes (1506) unter Verwendung eines Modulations-Schemas, das durch das zweite Kommunikationsprotokoll für ein dem ersten Feld entsprechendes Feld vorgegeben ist;

    Modulieren des zweiten Feldes (1508) unter Verwendung eines Modulations-Schemas, das durch das zweite Kommunikationsprotokoll für ein dem zweiten Feld entsprechendes Feld vorgegeben ist;

    Erzeugen der Präambel (1510), die wenigstens das erste Feld (706, 1502) und das zweite Feld (708, 1504) enthält; sowie

    Erzeugen der Dateneinheit (700, 1200, 1300, 1400, 1512), die wenigstens die Präambel enthält;

    wobei Erzeugen des zweiten Feldes (1504) Erzeugen des zweiten Satzes aus einem oder mehreren Informations-Bit/s gemäß einem Fehlererfassungs-Schema einschließt, das nicht durch das zweite Kommunikationsprotokoll (950, 960, 970) vorgegeben ist, Erzeugen einer zyklischen Redundanzüberprüfung (cyclic redundancy check - CRC) für das zweite Feld einschließt, die einen Fehler anzeigt, wenn sie durch den Empfänger decodiert wird, der dem zweiten Kommunikationsprotokoll entspricht, dem ersten Kommunikationsprotokoll jedoch nicht entspricht,

    dadurch gekennzeichnet, dass Erzeugen des CRC für das zweite Feld umfasst:

    Erzeugen einer Vielzahl von CRC-Bits (962, 972) gemäß einem CRC-Polynom, das durch das zweite Kommunikationsprotokoll für das entsprechende Feld vorgegeben ist, und

    Verschlüsseln nur eines oder mehrerer Bits der Vielzahl von CRC-Bits (964, 974), wobei das eine oder die mehreren Bit/s kleiner ist/sind als alle Bits der Vielzahl von CRC-Bits, um die CRC für das zweite Feld zu erzeugen, die den Fehler anzeigt, wenn sie von der Empfängereinrichtung dekodiert wird, die dem zweiten Kommunikationsprotokoll entspricht, dem ersten Kommunikationsprotokoll jedoch nicht entspricht.


     
    2. Verfahren nach Anspruch 1, wobei das zweite Feld (708) ein MCS(modulation and coding)-Teilfeld (902-3, 902-5b, 902-5c, 902-5d, 902-5e, 902-5f) enthält, und Erzeugen des zweiten Satzes aus einem oder mehreren Informations-Bit/s des Weiteren Erzeugen des MCS-Teilfeldes umfasst, das ein Modulations-und-Codier-Schema anzeigt, das von dem zweiten Kommunikationsprotokoll nicht unterstützt wird.
     
    3. Verfahren nach Anspruch 1, wobei das zweite Feld des Weiteren eine Anzeige (1302-3) dahingehend enthält, dass die Dateneinheit dem ersten Kommunikationsprotokoll entspricht.
     
    4. Verfahren nach Anspruch 1, wobei das zweite Kommunikationsprotokoll dem Standard IEEE 802.11ac entspricht.
     
    5. Verfahren nach Anspruch 4, wobei das erste Kommunikationsprotokoll ein Kommunikationsprotokoll ist, das einen höheren Durchsatz als der Standard IEEE 802.11ac unterstützt.
     
    6. Vorrichtung (14, 25) zum Erzeugen einer Dateneinheit (700) für Übertragung über einen Kommunikationskanal, wobei die Dateneinheit einem ersten Kommunikationsprotokoll entspricht und die Vorrichtung (14, 25) eine Netzwerkschnittstelle (16, 27) umfasst, die zum Durchführen eines Verfahrens nach einem der Ansprüche 1 bis 5 ausgeführt ist.
     
    7. Verfahren (1000, 1100, 1600), das umfasst:

    Empfangen einer Dateneinheit (700, 1602), wobei die Dateneinheit (700, 1602) einem ersten Kommunikationsprotokoll oder einem zweiten Kommunikationsprotokoll entspricht;

    Decodieren eines Feldes einer Präambel der Dateneinheit (1604), das Decodieren einer in dem Feld enthaltenen empfangenen zyklischen Redundanzüberprüfung (cyclic redundancy check - CRC) einschließt; sowie

    Erzeugen einer ersten CRC auf Basis des Feldes unter Verwendung eines ersten CRC-Erzeugungs-Schemas (1002, 1102, 1606), wobei das erste CRC-Erzeugungs-Schema durch das erste Kommunikationsprotokoll für das erste Feld vorgegeben ist;

    Erzeugen einer zweiten CRC auf Basis des Feldes unter Verwendung eines zweiten CRC-Erzeugungs-Schemas (1004, 1104, 1608), wobei das zweite CRC-Erzeugungs-Schema durch das zweite Kommunikationsprotokoll für das Feld vorgegeben ist;

    Vergleichen (i) der ersten erzeugten CRC und (ii) der zweiten erzeugten CRC mit der empfangenen CRC (1006, 1106, 1610, 1612);

    Feststellen, dass die Dateneinheit dem ersten Kommunikationsprotokoll entspricht, wenn die erste erzeugte CRC mit der empfangenen CRC (1614) übereinstimmt; und

    Feststellen, dass die Dateneinheit dem zweiten Kommunikationsprotokoll entspricht, wenn die zweite erzeugte CRC mit der empfangenen CRC (1616) übereinstimmt,

    dadurch gekennzeichnet, dass

    Erzeugen der ersten CRC Erzeugen der ersten CRC gemäß einem ersten CRC-Polynom umfasst, wobei das erste CRC-Polynom durch das erste Kommunikationsprotokoll für das Feld vorgegeben ist, und

    Erzeugen des zweiten CRC Erzeugen einer Vielzahl von CRC-Bits entsprechend einem zweiten CRC-Polynom, das sich von dem ersten CRC-Polynom unterscheidet, sowie Verschlüsseln nur eines oder mehrerer Bits der Vielzahl von CRC-Bits umfasst, um die zweite CRC zu erzeugen, wobei das eine oder die mehreren Bit/s kleiner ist/sind als alle Bits der Vielzahl von CRC-Bits.


     
    8. Verfahren nach Anspruch 7, wobei:

    Erzeugen der ersten CRC Erzeugen der ersten CRC gemäß einem ersten CRC-Polynom (1002) umfasst, wobei das erste CRC-Polynom durch das erste Kommunikationsprotokoll für das Feld vorgegeben ist, und

    Erzeugen des zweiten CRC Erzeugen des zweiten CRC gemäß einem zweiten CRC-Polynom (1004) umfasst, wobei das zweite CRC-Polynom durch das zweite Kommunikationsprotokoll für das Feld vorgegeben ist und sich das zweite CRC-Polynom von dem ersten CRC-Polynom unterscheidet.


     
    9. Verfahren nach Anspruch 7, wobei:

    Erzeugen der ersten CRC (1002) Erzeugen der ersten CRC gemäß einem ersten CRC-Polynom umfasst, wobei das erste CRC-Polynom durch das erste Kommunikationsprotokoll für das Feld vorgegeben ist, und

    Erzeugen der zweiten CRC (1004) umfasst:

    Erzeugen einer Vielzahl von CRC-Bits gemäß dem ersten CRC-Polynom,

    Auswählen eines Teilsatzes der Vielzahl von CRC-Bits, wobei der Teilsatz für die CRC für die zweite CRC zu verwenden ist; und

    Verschlüsseln eines oder mehrerer Bits in dem ausgewählten Teilsatz der Vielzahl von CRC-Bits, um die zweite CRC zu erzeugen.


     
    10. Vorrichtung (14, 25), die eine Netzwerkschnittstelle (16, 27) umfasst, die zum Durchführen eines Verfahrens nach einem der Ansprüche 7 bis 9 ausgeführt ist.
     


    Revendications

    1. Procédé (1500) de génération d'une unité de données (700, 1200, 1300, 1400) pour une transmission via un canal de communication, l'unité de données (700, 1200, 1300, 1400) se conformant à un premier protocole de communication, le procédé comprenant :

    la génération d'un premier champ (706, 1502) à inclure dans un préambule de l'unité de données, dans lequel le premier champ comprend un premier ensemble d'un ou plusieurs bits d'information qui indiquent une durée de l'unité de données, le premier champ étant formaté de telle sorte qu'il est décodable par un dispositif récepteur (25-4) conforme à un deuxième protocole de communication, mais non conforme au premier protocole de communication, pour déterminer la durée de l'unité de données (700, 1200, 1300, 1400) sur la base du premier champ (706, 1502) ;

    la génération d'un deuxième champ (708, 1504) à inclure dans le préambule, dans lequel le deuxième champ comprend un deuxième ensemble d'un ou plusieurs bits d'information (708-2, 1510) qui indiquent à un dispositif récepteur (14, 25-1) conforme au premier protocole de communication que l'unité de données est conforme au premier protocole de communication ;

    la modulation du premier champ (1506) en utilisant un schéma de modulation spécifié pour un champ correspondant au premier champ par le deuxième protocole de communication ;

    la modulation du deuxième champ (1508) en utilisant un schéma de modulation spécifié pour un champ correspondant au deuxième champ par le deuxième protocole de communication ;

    la génération du préambule (1510) pour inclure au moins le premier champ (706, 1502) et le deuxième champ (708, 1504) ; et

    la génération de l'unité de données (700, 1200, 1300, 1400, 1512) pour inclure au moins le préambule ;

    dans lequel la génération du deuxième champ (1504) comprend la génération du deuxième ensemble d'un ou plusieurs bits d'information conformément à un schéma de détection d'erreur qui n'est pas spécifié par le deuxième protocole de communication (950, 960, 970), comprenant la génération d'un contrôle de redondance cyclique, CRC, pour le deuxième champ qui indique une erreur lorsqu'il est décodé par le récepteur conforme au deuxième protocole de communication mais non conforme au premier protocole de communication,

    caractérisé en ce que la génération du CRC pour le deuxième champ comprend :

    la génération d'une pluralité de bits CRC (962, 972) conformément à un polynôme CRC spécifié pour le champ correspondant par le deuxième protocole de communication, et

    le chiffrement d'un ou plusieurs bits seulement de la pluralité de bits CRC (964, 974), lesdits un ou plusieurs bits étant moins nombreux que tous les bits de la pluralité de bits CRC, pour générer le CRC pour le deuxième champ qui indique l'erreur lors d'un décodage par le dispositif récepteur conforme au deuxième protocole de communication mais non conforme au premier protocole de communication.


     
    2. Procédé selon la revendication 1, dans lequel le deuxième champ (708) comprend un sous-champ de modulation et de codage (MCS) (902-3, 902-5b, 902-5c, 902-5d, 902-5e, 902-5f), et dans lequel la génération du deuxième ensemble d'un ou plusieurs bits d'information comprend en outre la génération du sous-champ MCS pour indiquer un schéma de modulation et de codage non pris en charge par le deuxième protocole de communication.
     
    3. Procédé selon la revendication 1, dans lequel le deuxième champ comprend en outre une indication (1302-3) que l'unité de données est conforme au premier protocole de communication.
     
    4. Procédé selon la revendication 1, dans lequel le deuxième protocole de communication est conforme à la norme 802.11ac de l'Institut des ingénieurs électriciens et électroniciens (IEEE).
     
    5. Procédé selon la revendication 4, dans lequel le premier protocole de communication est un protocole de communication qui prend en charge un débit supérieur à celui de la norme IEEE 802.11ac.
     
    6. Appareil (14, 25) pour générer une unité de données (700) pour une transmission via un canal de communication, l'unité de données étant conforme à un premier protocole de communication, l'appareil (14, 25) comprenant une interface réseau (16, 27) configurée pour mettre en œuvre un procédé selon l'une des revendications 1 à 5.
     
    7. Procédé (1000, 1100, 1600) comprenant :

    la réception d'une unité de données (700, 1602), dans lequel l'unité de données (700, 1602) est conforme à un premier protocole de communication ou à un deuxième protocole de communication ;

    le décodage d'un champ de préambule de l'unité de données (1604), comprenant le décodage d'un contrôle de redondance cyclique (CRC) reçu inclus dans le champ ; et

    la génération, sur la base du champ, d'un premier CRC en utilisant un premier schéma de génération de CRC (1002, 1102, 1606), le premier schéma de génération de CRC étant spécifié pour le premier champ par le premier protocole de communication ;

    la génération, sur la base du champ, d'un deuxième CRC en utilisant un deuxième schéma de génération de CRC (1004, 1104, 1608), le deuxième schéma de génération de CRC étant spécifié pour le champ par le deuxième protocole de communication ;

    la comparaison (i) du premier CRC généré et (ii) du deuxième CRC généré au CRC reçu (1006, 1106, 1610, 1612) ;

    la détermination du fait que l'unité de données est conforme au premier protocole de communication quand le premier CRC généré correspond au CRC reçu (1614) ; et

    la détermination du fait que l'unité de données est conforme au deuxième protocole de communication quand le deuxième CRC généré correspond au CRC reçu (1616),

    caractérisé en ce que

    la génération du premier CRC comprend la génération du premier CRC conformément au premier polynôme CRC, le premier polynôme CRC étant spécifié pour le champ par le premier protocole de communication, et

    la génération du deuxième CRC comprend la génération d'une pluralité de bits CRC conformément à un deuxième polynôme CRC différent du premier polynôme CRC, et le chiffrement d'un ou plusieurs bits seulement de la pluralité de bits CRC pour générer le deuxième CRC, lesdits un ou plusieurs bits étant moins nombreux que tous les bits de la pluralité de bits CRC.


     
    8. Procédé selon la revendication 7, dans lequel :

    la génération du premier CRC comprend la génération du premier CRC conformément au premier polynôme CRC (1002), le premier polynôme CRC étant spécifié pour le champ par le premier protocole de communication, et

    la génération du deuxième CRC comprend la génération du deuxième CRC conformément à un deuxième polynôme CRC (1004), le deuxième polynôme CRC étant spécifié pour le champ par le deuxième protocole de communication, dans lequel le deuxième polynôme CRC est différent du premier polynôme CRC.


     
    9. Procédé selon la revendication 7, dans lequel :

    la génération du premier CRC (1002) comprend la génération du premier CRC conformément à un premier polynôme CRC, le premier polynôme CRC étant spécifié pour le champ par le premier protocole de communication, et

    la génération du deuxième CRC (1004) comprend :

    la génération d'une pluralité de bits CRC conformément au premier polynôme CRC,

    la sélection d'un sous-ensemble de la pluralité de bits CRC, le sous-ensemble étant destiné à être utilisé pour le deuxième CRC ; et

    le chiffrement d'un ou plusieurs bits dans le sous-ensemble sélectionné de la pluralité de bits CRC afin de générer le deuxième CRC.


     
    10. Appareil (14, 25) comprenant une interface réseau (16, 27) configurée pour mettre en œuvre un procédé selon l'une des revendications 7 à 9.
     




    Drawing





















































    Cited references

    REFERENCES CITED IN THE DESCRIPTION



    This list of references cited by the applicant is for the reader's convenience only. It does not form part of the European patent document. Even though great care has been taken in compiling the references, errors or omissions cannot be excluded and the EPO disclaims all liability in this regard.

    Patent documents cited in the description