Sign In to Follow Application
View All Documents & Correspondence

Scanning Threshold

Abstract: Included are embodiments for utilizing a scanning threshold. More specifically, one embodiment of a method includes entering a standby mode, wherein in the standby mode, at least one component of a communications device is shutdown, and wherein in the standby mode, at least one channel is scanned to determine potential interference and monitoring exchanged traffic with the communications device. Some embodiments include determining a relative volume of the exchanged traffic, compared to a predetermined threshold and based on the determination of the relative volume of the exchanged traffic and the predetermined threshold, entering a power save standby mode, wherein in the power save standby mode, scanning of the at least one channel is terminated.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
05 March 2010
Publication Number
32/2010
Publication Type
INA
Invention Field
COMMUNICATION
Status
Email
Parent Application

Applicants

CONEXANT SYSTEMS, INC.
100 SCHULTZ DRIVE, RED BANK, NJ 0771 UNITED STATES OF AMERICA

Inventors

1. WENTINK, MAARTEN, MENZO
OUDEGRACHT, 3A. 3511AB, UTRECHT THE NETHERLANDS

Specification

SCANNING THRESHOLD
CROSS REFERENCE
[0001] This application claims the benefit of U.S. Provisional Application Number
60/970,189, filed September 5, 2007, which is incorporated by reference in its
entirety.
BACKGROUND
[0002] As electronic communications have evolved, communications devices
have become more mobile. The utilization of one or more wireless protocols has
facilitated this evolution of wireless communication. However, while the mobility
of wireless devices has been a draw for many users, a wireless power source
can be a limiting factor in use of such devices. As many wireless devices utilize
wireless power sources, such as batteries, that can only store a limited amount of
energy, power conservation techniques are desired for many of these devices.
SUMMARY
[0003] Included are embodiments for utilizing a scanning threshold. More
specifically, one embodiment of a method includes entering a standby mode,
wherein in the standby mode, at least one component of a communications
device is shutdown, and wherein in the standby mode, at least one channel is
scanned to determine potential interference and monitoring exchanged traffic
with the communications device Some embodiments include determining a
relative volume of the exchanged traffic, compared to a predetermined threshold
and based on the determination of the relative volume of the exchanged traffic
and the predetermined threshold, entering a power save standby mode, wherein
in the power save standby mode, scanning of the at least one channel is
terminated.
[0004] Also included are embodiments of a computer readable medium. One
embodiment includes means for entering a standby mode, wherein in the
standby mode, at least one component of a communications device is shutdown,
and wherein in the standby mode, at least one channel is scanned to determine
potential interference and means for monitoring exchanged traffic with the
communications device. Some embodiments include means for determining a
relative volume of the exchanged traffic, compared to a predetermined threshold
and means for, based on the determination of the relative volume of the
exchanged traffic and the predetermined threshold, entering a power save
standby mode, wherein in the power save standby mode, scanning of the at least
one channel is terminated.
[0005] Also included are embodiments of a system. At least one embodiment
includes means for entering a standby mode, wherein in the standby mode, at
least one component of a communications device is shutdown, and wherein in
the standby mode, at least one channel is scanned to determine potential
interference and means for monitoring exchanged traffic with the
communications device. Some embodiments include means for determining a
relative volume of the exchanged traffic, compared to a predetermined threshold
and means for, based on the determination of the relative volume of the
exchanged traffic and the predetermined threshold, entering a power save
standby mode, wherein in the power save standby mode, scanning of the at least
one channel is terminated.
[0006] Other embodiments and/or advantages of this disclosure will be or may
become apparent to one with skill in the art upon examination of the following
drawings and detailed description. It is intended that all such additional systems,
methods, features, and advantages be included within this description and be
within the scope of the present disclosure.
BRIEF DESCRIPTION
[0007] Many aspects of the disclosure can be better understood with reference to
the following drawings. The components in the drawings are not necessarily to
scale, emphasis instead being placed upon clearly illustrating the principles of
the present disclosure. Moreover, in the drawings, like reference numerals
designate corresponding parts throughout the several views. While several
embodiments are described in connection with these drawings, there is no intent
to limit the disclosure to the embodiment or embodiments disclosed herein On
the contrary, the intent is to cover all alternatives, modifications, and equivalents.
[0008] FIG. 1 depicts a diagram illustrating an exemplary embodiment of a
network configuration that may be utilized for wireless communications.
[0009] FIG. 2 depicts a functional block diagram illustrating a communications
device, similar to the communications device from FIG. 1.
[0010] FIG 3 depicts an exemplary embodiment of a graph for comparing
exchanged traffic with a predetermined threshold, such as in the network from
FIG. 1
[0011] FIG. 4 depicts a flowchart, illustrating an exemplary embodiment of a
process for saving power in a communications device, such as the
communications device from FIG 2.
[0012] FIG. 5 depicts a flowchart illustrating an exemplary embodiment of another
process for saving power in a communications device, similar to the flowchart
from FIG. 4.
DETAILED DESCRIPTION
[0013] Generally speaking, communications devices may be configured to facilitate
communications in any of a plurality of protocols. In an effort to facilitate such
communications, wireless fidelity (WIFI) was developed. WIFI (e.g., IEEE 802 11)
has taken a plurality of revisions, one of which is version 802.11n. According to the
protocol, IEEE 802.11 n compatible communications devices that support 40 MHz
channels in a 2.4 GHz band may be required to periodically perform a channel scan,
to determine whether a surrounding environment contains no other networks which
would potentially experience negative interference from the 40 MHz network. If
such a network is detected during the scan, the communications device may report
this to an associated access point, after which the access point can reduce the
channel bandwidth to 20 MHz. While this may facilitate efficient operation of the
network, this periodic scanning requirement may impose a significant power
consumption requirement on communications devices that are operating in a
standby mode.
[0014] Embodiments disclosed herein may be configured to exempt communications
devices operating in standby mode from the scanning requirement when they have
transmitted and/or received less than a certain amount of data during a certain
period of time. Such a non-zero threshold may be utilized because stations in
standby mode rarely entirely cease transmitting and receiving data. As a
nonlimiting example, a connection with a session initiation protocol (SIP) server
may be periodically refreshed, or connection with the server may time out. The
same may be true for address resolution protocol (ARP) "keepalive" messages.
[0015] Referring to the drawings, FIG. 1 depicts a diagram illustrating an
exemplary embodiment of a network configuration that may be utilized for
wireless communications. As illustrated in the nonlimiting example from FIG. 1,
network 100 may be coupled to access points 110a and 110b. The access
points 110a and 110b can be configured to provide wireless communications to
communications devices 102a, 102b, 102c and/or 102d. More specifically,
depending on the particular configuration, access points 110a and/or 110b may
be configured for providing voice over internet protocol (VoIP) services, WIFI
services, WiMAX services, wireless session initiation protocol (SIP) services,
bluetooth services and/or other wireless communication services. Additionally
coupled to the network 100 is a server 106. The server 106 may be configured
as a web server, SIP server, and/or other type of server.
[0016] The network 100 may include a public switched telephone network
(PSTN), an integrated services digital network (ISDN), the Internet, a cellular
network, and/or other mediums for communicating data between communication
devices. More specifically, while the communications devices 102a and 102d
may be configured for WIFI communications, communications devices 102c,
102d, and/or 106 may be coupled to the network 100 and may be configured for
VoIP communications, Bluetooth communications, WIFI communications, and/or
other wireline and/or wireless communications.
[0017] FIG. 2 depicts a functional block diagram illustrating a communications
device, similar to the communications device 102 from FIG. 1. As illustrated in
FIG. 2, in terms of hardware architecture, the communications device 102 may
include a processor 282, a memory component 284, a display interface 294, a data
storage component 295, and one or more input and/or output (I/O) device
interface(s) 296 that are communicatively coupled via a local interface 292 The
local interface 292 can include, for example but not limited to, one or more buses
and/or other wired or wireless connections. The local interface 292 may have
additional elements, which are omitted for simplicity, such as controllers, buffers
(caches), drivers, repeaters, and receivers to enable communications. Further, the
local interface 292 may include address, control, and/or data connections to enable
appropriate communications among the aforementioned components. The
processor 282 may be a hardware device for executing software, particularly
software stored in the memory component 284.
[0018] The processor 282 can be any custom made or commercially available
processor, a central processing unit (CPU), an auxiliary processor among several
processors associated with the communications device 102, a semiconductor
based microprocessor (in the form of a microchip or chip set), a macroprocessor,
or generally any device for executing instructions.
[0019] The memory component 284 can include any one or combination of volatile
memory elements (e.g., random access memory (RAM, such as DRAM, SRAM,
SDRAM, VRAM, etc)) and nonvolatile memory elements (e.g., ROM, hard drive,
tape, CD-ROM, etc.). Moreover, the memory component 284 may incorporate
electronic, magnetic, optical, and/or other types of storage media. Note that the
memory component 284 can also have a distributed architecture, where various
components are situated remotely from one another, but can be accessed by the
processor 282
[0020] The software in the memory component 284 may include one or more
separate programs, each of which includes an ordered listing of executable
instructions for implementing logical functions. In the example of FIG. 2, the
software in the memory component 284 may include power save logic 288, as well
as an operating system 286. As illustrated, the power save logic 288 may include
entering logic 290 configured to enter a standby mode, wherein in the standby
mode, at least one component of a communications device is shutdown, and
wherein in the standby mode, at least one channel is scanned to determine
potential interference.
[0021] Similarly, the power save logic 288 may include monitoring logic 292
configured to monitor exchanged traffic with the communications device. In some
embodiments the monitoring logic 292 may also be configured to exclude
broadcast and/or multicast data. Similarly, in some embodiments, the monitoring
logic 292 may be configured to monitor transmitted traffic and received unicast
traffic The power save logic 288 may include determining logic 293 configured to
determine a relative volume of the exchanged traffic, compared to a predetermined
threshold. Similarly, some embodiments may include scanning logic 297
configured to, based on the determination of the relative volume of the exchanged
traffic and the predetermined threshold, scan at least one channel for potential
interference.
[0022] Additionally, while the logic components 290, 291, 293, and 297 are each
illustrated in this nonlimiting example as a single piece of logic, these components
can include one or more separate software, hardware, and/or firmware modules
Similarly, one or more of these logical components can be combined to provide the
desired functionality. Additionally, the operating system 286 may be configured to
control the execution of other computer programs and may be configured to
provide scheduling, input-output control, file and data management, memory
management, and communication control and related services.
[0023] A system component embodied as software may also be construed as a
source program, executable program (object code), script, and/or any other entity
comprising a set of instructions to be performed. When constructed as a source
program, the program is translated via a compiler, assembler, interpreter, or the
like, which may or may not be included within the volatile and nonvolatile memory
284, so as to operate properly in connection with the operating system 286.
[0024] The input/output devices that may be coupled to system I/O Interface(s) 296
may include input devices, for example but not limited to, a keyboard, mouse,
scanner, microphone, camera, proximity device, receiver, etc. Further, the
input/output devices may also include output devices, for example but not limited
to, a printer, display, transmitter, etc. The input/output devices may further include
devices that communicate both as inputs and outputs, for instance but not limited
to, a modulator/demodulator (modem for accessing another device, system, or
network), a radio frequency (RF) or other transceiver, a telephonic interface, a
bridge, a router, WIFI communications device, WiMAX communications device,
Bluetooth communications device, etc. Similarly, a network interface 298, which is
coupled to local interface 292, can be configured to communication with a
communications network, such as the network from FIG. 1. While this
communication may be facilitated via the communications device 102, this is not a
requirement.
[0025] More specifically, the network interfaces 298 may be configured for
facilitating communication with one or more other devices. The network interface
298 may include any component configured to facilitate a connection with another
device. While in some embodiments, among others, the client device 102 can
include the network interface 298 that includes a Personal Computer Memory Card
International Association (PCMCIA) card (also abbreviated as "PC card") for
receiving a wireless network card, this is a nonlimiting example. Other
configurations can include the communications hardware within the client device
102, such that a wireless network card is unnecessary for communicating
wirelessly. Similarly, other embodiments include the network interfaces 298 for
communicating via a wired connection. Such interfaces may be configured with
Universal Serial Bus (USB) interfaces, serial ports, and/or other interfaces In
operation, the wireless network interfaces 298 may be configured to communicate
with other client devices 102, access points 110, and other wireless devices via a
wireless local area network (WLAN) or other wireless network.
[0026] If the communications device 102 is a personal computer, workstation, or
the like, the software in the memory component 284 may further include a basic
input output system (BIOS) (omitted for simplicity) The BIOS is a set of software
routines that initialize and test hardware at startup, start the Operating System 286,
and support the transfer of data among the hardware devices. The BIOS is stored
in ROM so that the BIOS can be executed when the communications device 102 is
activated.
(0027] When the communications device 102 is in operation, the processor 282
can be configured to execute software stored within the memory component 284,
to communicate data to with the memory component 284, and to generally control
operations of the communications device 102 pursuant to the software. Software
in memory 284, in whole or in part, may be read by the processor 282, perhaps
buffered within the processor 282, and then executed. Additionally, one should
note that while the above description is directed to a communications device 102,
other devices can also include the components described in FIG. 2.
[0028] One should note that the access point 110 (which may also be seen as a
communications device) can be configured with one or more of the components
and/or logic described above with respect to the communications device 102
Additionally, the access point 110, the communications device 102, and/or
other components of FIG. 1 can include other components and/or logic for
facilitating the operations described herein. Additionally, depending on the
particular configuration, the access point 110 may include both a wireless
interface for communicating to the client devices and a second interface for
communicating with the network. The access point 110 may be combined with
other network services, (e.g., network address translation (NAT), dynamic host
control protocol (DHCP), routing, firewall).
[0029] FIG. 3 depicts an exemplary embodiment of a graph for comparing
exchanged traffic 352 with a predetermined threshold 354, such as in the
network from FIG. 1. As illustrated in the nonlimiting example of FIG. 3,
exchanged data 352a - 352e is provided, each measured over a predefined
interval. In this nonlimiting example, the communications device 102 may enter a
standby mode without scanning for potential interference. As the data traffic
352a is exchanged, a determination is made whether the exchanged data 352a
exceeds a predetermined scanning threshold 354 Because the data exchange
352a does not exceed the scanning threshold, no action is taken Similarly,
exchanged data 352b does not exceed the scanning threshold 354, and thus no
scanning is activated.
[0030] With regard to exchanged data 352c, a determination can be made that
this data exceeds the predetermined scanning threshold 354. Upon making this
determination, the communications device 102 can begin scanning for
interference during the next exchanged data traffic 352d. Similarly, upon
exchanging data traffic 352e, a determination can be made that this data traffic is
below the predetermined scanning threshold 354. Consequently, during the next
exchange of data (not shown), scanning may be disabled
[0031] FIG. 4 depicts a flowchart, illustrating an exemplary embodiment of a
process for saving power in a communications device, such as the
communications device 102 from FIG. 2. As illustrated in the nonlimiting
example of FIG. 4, the communications device 102 can enter a standby power
save mode with no scanning for potential interference (block 432). The
communications device 102 can monitor exchanged traffic (block 434). A
determination can then be made whether data exchanged 352 during a previous
interval exceeds the scanning threshold 354 (block 436). If the data exchanged
352 does not exceed the scanning threshold 354, the communications device
102 can continue to monitor the exchanged traffic (block 434). If the data
exchanged 352 does exceed the scanning threshold, the communications device
102 can resume normal scanning (block 438) One should note that the
scanning is may be a periodic event (e.g., the channel does not have to be
monitored continuously, and can still be performed while in a power save, but
with higher power consumption as a result) The communications device 102
can continue to monitor exchanged traffic (block 440) A determination can be
made whether data exchanged 352 during a previous interval is below a
scanning threshold (block 442). If the data is not below the scanning threshold,
the communications device 102 can continue to monitor exchanged traffic (block
440). If the data 352 exchanged during the previous interval is below the
scanning threshold 354, then the communications device 102 can re-enter
standby power mode with no scanning (block 444).
[0032] FIG. 5 depicts a flowchart illustrating an exemplary embodiment of another
process for saving power in a communications device 102, similar to the
flowchart from FIG. 4. As illustrated in the nonlimiting example of FIG 5, the
communications device 102 can enter standby mode and begin scanning for
potential interference (block 532). The communications device 102 can monitor
the exchanged traffic 352 (block 534). A determination can be made whether the
amount of data exchanged is below the scanning threshold 354 (block 536). If
the data exchanged 352 is not below the scanning threshold 354, the
communications device can continue to monitor the exchanged traffic (block
534) If, on the other hand, the exchanged data 352 exceeds the scanning
threshold 354, the communications device 102 can enter standby power save
mode with no scanning (block 538). The communications device 102 can
continue to monitor exchanged traffic 352 (block 540). A determination can be
made whether the data 352 exchanged in a previous interval exceeds the
scanning threshold (block 542) If the data 352 does not exceed the scanning
threshold 354, the communications device 102 can continue monitoring the
exchanged data 352 (block 540). If, on the other hand, the exchanged data 352
exceeds the scanning threshold 354, the communications device can exit
standby power save mode and restart scanning (block 544) One should also
note that, depending on the particular configuration, the monitored traffic may
exclude received broadcast/multicast traffic.
[0033] The embodiments disclosed herein can be implemented in hardware,
software, firmware, or a combination thereof. At least one embodiment disclosed
herein may be implemented in software and/or firmware that is stored in a
memory and that is executed by a suitable instruction execution system. If
implemented in hardware, one or more of the embodiments disclosed herein can
be implemented with any or a combination of the following technologies: a
discrete logic circuit(s) having logic gates for implementing logic functions upon
data signals, an application specific integrated circuit (ASIC) having appropriate
combinational logic gates, a programmable gate array(s) (PGA), a field
programmable gate array (FPGA), etc.
[0034] One should note that the flowcharts included herein show the architecture,
functionality, and operation of a possible implementation of software. In this
regard, each block can be interpreted to represent a module, segment, or portion
of code, which comprises one or more executable instructions for implementing
the specified logical function(s). It should also be noted that in some alternative
implementations, the functions noted in the blocks may occur out of the order
and/or not at all. For example, two blocks shown in succession may in fact be
executed substantially concurrently or the blocks may sometimes be executed in
the reverse order, depending upon the functionality involved.
[0035] One should note that any of the programs listed herein, which can include
an ordered listing of executable instructions for implementing logical functions,
can be embodied in any computer-readable medium for use by or in connection
with an instruction execution system, apparatus, or device, such as a computer-
based system, processor-containing system, or other system that can fetch the
instructions from the instruction execution system, apparatus, or device and
execute the instructions. In the context of this document, a "computer-readable
medium" can be any means that can contain, store, communicate, or transport
the program for use by or in connection with the instruction execution system,
apparatus, or device. The computer readable medium can be, for example but
not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or
semiconductor system, apparatus, or device. More specific examples (a
nonexhaustive list) of the computer-readable medium could include an electrical
connection (electronic) having one or more wires, a portable computer diskette
(magnetic), a random access memory (RAM) (electronic), a read-only memory
(ROM) (electronic), an erasable programmable read-only memory (EPROM or
Flash memory) (electronic), an optical fiber (optical), and a portable compact disc
read-only memory (CDROM) (optical). In addition, the scope of the certain
embodiments of this disclosure can include embodying the functionality
described in logic embodied in hardware or software-configured mediums.
[0036] One should also note that conditional language, such as, among others,
"can," "could," "might" or "may," unless specifically stated otherwise, or otherwise
understood within the context as used, is generally intended to convey that
certain embodiments include, while other embodiments do not include, certain
features, elements and/or steps. Thus, such conditional language is not
generally intended to imply that features, elements and/or steps are in any way
required for one or more particular embodiments or that one or more particular
embodiments necessarily include logic for deciding, with or without user input or
prompting, whether these features, elements and/or steps are included or are to
be performed in any particular embodiment.
[0037] It should be emphasized that the above-described embodiments are
merely possible examples of implementations, merely set forth for a clear
understanding of the principles of this disclosure. Many variations and
modifications may be made to the above-described embodiment(s) without
departing substantially from the spirit and principles of the disclosure. All such
modifications and variations are intended to be included herein within the scope
of this disclosure.
CLAIMS
Therefore, at least the following is claimed:
1. A method, comprising:
entering a standby mode, wherein in the standby mode, at least one
component of a communications device is shutdown;
monitoring exchanged traffic with the communications device;
determining a relative volume of the exchanged traffic, compared to a
predetermined threshold; and
based on the determination of the relative volume of the exchanged traffic
and the predetermined threshold, entering a power save standby mode, wherein
in the power save standby mode, at least one channel is scanned to determine
potential interference.
2. The method of claim 1, wherein in power save standby mode, the at
least one channel is terminated
3. The method of claim 1, further comprising monitoring, in the power save
standby mode, the exchanged traffic to determine whether the relative volume of
exchanged traffic has changed with regard to the predetermined threshold.
4. The method of claim 3, further comprising, in response to determining
that the relative volume of exchanged traffic has changed with regard to the
predetermined threshold, resuming the scanning of the at least one channel
5. The method of claim 1, wherein determining whether the exchanged
traffic is below a predetermined threshold does not include received broadcast
and multicast traffic.
6. The method of claim 1, wherein the communications device is
configured to communicate data in an IEEE 802.11n protocol.
7. The method of claim 1, wherein the communications device is
configured to support at least one 40 MHz channel in a 2.4 GHz frequency band.
8. A computer readable medium, comprising:
entering logic configured to enter a standby mode, wherein in the standby
mode, at least one component of a communications device is shutdown;
first monitoring logic configured to monitor exchanged traffic with the
communications device;
determining logic configured to determine a relative volume of the
exchanged traffic, compared to a predetermined threshold; and
scanning logic configured to, based on the determination of the relative
volume of the exchanged traffic and the predetermined threshold, scan at least
one channel for potential interference.
9. The computer readable medium of claim 8, wherein the monitoring logic
is configured to exclude received broadcast traffic.
10. The computer readable medium of claim 8, wherein the monitoring
logic is configured to exclude received multicast traffic.
11. The computer readable medium of claim 8, further comprising second
monitoring logic configured to monitor the exchanged traffic to determine whether
the relative volume of exchanged traffic has changed, with regard to the
predetermined threshold.
12. The computer readable medium of claim 11, further comprising power
save logic configured to, in response to determining that the relative volume of
exchanged traffic has changed with regard to the predetermined threshold,
terminate scanning of the at least one channel for potential interference.
13 The computer readable medium of claim 8, wherein the
communications device is configured to communicate data in an IEEE 802.11n
protocol.
14. The computer readable medium of claim 8, wherein the
communications device is configured to support at least one 40 MHz channel in a
2.4 GHz frequency band.
15. A system, comprising:
means for entering a standby mode, wherein in the standby mode, at least
one component of a communications device is shutdown, and wherein in the
standby mode, at least one channel is scanned to determine potential
interference;
means for monitoring exchanged traffic with the communications device;
means for determining a relative volume of the exchanged traffic,
compared to a predetermined threshold; and
means for, based on the determination of the relative volume of the
exchanged traffic and the predetermined threshold, entering a power save
standby mode, wherein in the power save standby mode, scanning of the at least
one channel is terminated.
16. The system of claim 15, wherein the monitoring means is configured to
monitor transmitted traffic and received unicast traffic.
17. The system of claim 15, further comprising means for monitonng the
exchanged traffic to determine whether the relative volume of exchanged traffic
has changed with regard to the predetermined threshold
18. The system of claim 17, further comprising means for, in response to
determining that the relative volume of exchanged traffic has changed with
regard to the predetermined threshold, resuming the scanning of the at least one
channel
19. The system of claim 15, wherein the communications device is
configured to communicate data in an IEEE 802.11n protocol.
20. The system of claim 15, wherein the communications device is
configured to support at least one 40 MHz channel in a 2 4 GHz frequency band
21. The system of claim 15, wherein the means for monitoring is
configured to exclude received broadcast and multicast traffic.
22. A system, comprising:
a first entering component configured to enter a standby mode, wherein in
the standby mode, at least one component of a communications device is
shutdown, and wherein in the standby mode, at least one channel is scanned to
determine potential interference;
a first monitoring component configured to monitor exchanged traffic with
the communications device;
a determining component configured to determine a relative volume of the
exchanged traffic, compared to a predetermined threshold; and
a second entering component configured to, based on the determination
of the relative volume of the exchanged traffic and the predetermined threshold,
enter a power save standby mode, wherein in the power save standby mode,
scanning of the at least one channel is terminated
23. The system of claim 22, further comprising:
a second monitoring component configured to monitor the exchanged
traffic to determine whether the relative volume of exchanged traffic has changed
with regard to the predetermined threshold; and
a resuming component configured to, in response to determining that the
relative volume of exchanged traffic has changed with regard to the
predetermined threshold, resume the scanning of the at least one channel.

Included are embodiments for utilizing a scanning threshold. More specifically, one embodiment of a method includes
entering a standby mode, wherein in the standby mode, at least one component of a communications device is shutdown, and
wherein in the standby mode, at least one channel is scanned to determine potential interference and monitoring exchanged traffic
with the communications device. Some embodiments include determining a relative volume of the exchanged traffic, compared to
a predetermined threshold and based on the determination of the relative volume of the exchanged traffic and the predetermined
threshold, entering a power save standby mode, wherein in the power save standby mode, scanning of the at least one channel is
terminated.

Documents

Application Documents

# Name Date
1 abstract-846-kolnp-2010.jpg 2011-10-07
2 846-kolnp-2010-specification.pdf 2011-10-07
3 846-kolnp-2010-pct request form.pdf 2011-10-07
4 846-kolnp-2010-pct priority document notification.pdf 2011-10-07
5 846-KOLNP-2010-PA.pdf 2011-10-07
6 846-kolnp-2010-international search report.pdf 2011-10-07
7 846-kolnp-2010-international publication.pdf 2011-10-07
8 846-kolnp-2010-form 5.pdf 2011-10-07
9 846-kolnp-2010-form 3.pdf 2011-10-07
10 846-KOLNP-2010-FORM 3-1.1.pdf 2011-10-07
11 846-KOLNP-2010-FORM 3 1.2.pdf 2011-10-07
12 846-kolnp-2010-form 2.pdf 2011-10-07
13 846-KOLNP-2010-FORM 13.pdf 2011-10-07
14 846-kolnp-2010-form 1.pdf 2011-10-07
15 846-KOLNP-2010-FORM 1-1.1.pdf 2011-10-07
16 846-kolnp-2010-drawings.pdf 2011-10-07
17 846-kolnp-2010-description (complete).pdf 2011-10-07
18 846-kolnp-2010-correspondence.pdf 2011-10-07
19 846-KOLNP-2010-CORRESPONDENCE-1.3.pdf 2011-10-07
20 846-KOLNP-2010-CORRESPONDENCE-1.1.pdf 2011-10-07
21 846-KOLNP-2010-CORRESPONDENCE 1.2.pdf 2011-10-07
22 846-kolnp-2010-claims.pdf 2011-10-07
23 846-KOLNP-2010-ASSIGNMENT.pdf 2011-10-07
24 846-KOLNP-2010-ASSIGNMENT 1.1.pdf 2011-10-07
25 846-kolnp-2010-abstract.pdf 2011-10-07