Hi Joerg, On Thu, Apr 30, 2009 at 14:41, Joerg Pommnitz <pommnitz@xxxxxxxxx> wrote: > >> Based on that information, I have removed the "Yes (under development)" >> note from the driver page since it doesn't really support it... In fact, >> I'm surprised it works even with that hack since hostapd usually polls >> the station with nullfunc frames and waits for an ack. > > Reading the mail from Ivo (http://sourceforge.net/mailarchive/message.php?msg_id=200808082059.11968.IvDoorn%40gmail.com) > I gather that the ACK in question is not from the peer but from the local > hardware indicating that the frame was actually sent and not lost due to > some local error. > -- > Regards > Joerg According to Ivo, we cannot be totally sure that the device has sent the frame into the air, so no actual ACK is reported back to mac80211. The hostapd hack works, as long as the stations are not very far from the AP, and thus not 'too many retries' need to be sent. AFAIK, this is not optimal at all, so I don't go around and say 'it works'. It may or may not work in your case. If possible, test and report back your findings. Luis Correia rt2x00 project admin -- To unsubscribe from this list: send the line "unsubscribe linux-wireless" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html