The present disclosure pertains to the field of wireless communications. The present disclosure relates to a method for improving communications by a wireless device, a method for performing interference measurements by the wireless device, a related network node and a related wireless device.
Coverage enhancing devices (CED), such as smart repeaters and reflective intelligent surfaces (RIS), can provide coverage enhancement for devices using 5G and beyond. Coverage enhancing devices can be used for beamforming, such as to or from a base station. Coverage enhancing devices can be used to improve signal coverage, for example at hard-to-reach locations, or transitions from outdoors to indoors. Certain coverage enhancing devices can be reconfigurable, such as having the ability to choose a phase shift per coverage enhancing device antenna. For given incoming and outgoing angles, an optimal phase setting can be obtained. However, a significant problem is that such phase setting is not limited to reflecting the configured—for incoming and outgoing signal directions but is in fact reflecting a wide range of other directional pairs with the same beamforming gain as for the configured—for incoming and outgoing signal directions. This is because, in general, any input angle has an associated output angle for a specific configuration, herein referred to as parasitic reflections. One unwanted side-effect of CEDs is that they can cause increased interference in a wireless communication system due to the mentioned parasitic reflection. This can negatively affect communication by a wireless device in the wireless communication system. The problem may be even larger if the CED applies gain to the reflected signals.
Accordingly, there is a need for network nodes, wireless devices and methods performed therein for improving communication by a wireless device, which may mitigate, alleviate or address the shortcomings existing and may provide an improved performance by the wireless device.
A method is disclosed performed by a network node of a communications network, for improving communication by a wireless device, WD. The method comprises transmitting, to the WD, a message indicating that a change of an interference state in the communications network will occur.
Further, a network node is provided, the network node comprising memory circuitry, processor circuitry, and a wireless interface, wherein the network node is configured to perform any of the methods disclosed herein and relating to the network node.
It is an advantage of the present disclosure that the network node can inform the wireless device about a change in interference conditions, such as a change in interference levels, in the wireless communications network. This enables the wireless device to adapt its interference measurements based on the change of interference states in the wireless communications network
A method is disclosed performed by a wireless device, WD, for performing interference measurements by the WD. The method comprises receiving, from the network node, a message indicating that a change of an interference state in a network will occur. The method comprises adapting an interference measurement based on the indicated change of the interference conditions.
Further, a wireless device is disclosed, the wireless device comprising memory circuitry, processor circuitry, and a wireless interface, wherein the wireless device is configured to perform any of the methods disclosed herein and relating to the wireless device.
It is an advantage of the present disclosure that the WD can be informed about changing interference conditions, such as interference levels, in the wireless communications network. This enables the wireless device to adapt its interference measurements based on the change of interference conditions in the wireless communications network, based on which the WD can adapt a computation of an interference covariance matrix for mitigating an impact of the interference on the communication with the network node.
The above and other features and advantages of the present disclosure will become readily apparent to those skilled in the art by the following detailed description of examples thereof with reference to the attached drawings, in which:
Various examples and details are described hereinafter, with reference to the figures when relevant. It should be noted that the figures may or may not be drawn to scale and that elements of similar structures or functions are represented by like reference numerals throughout the figures. It should also be noted that the figures are only intended to facilitate the description of the examples. They are not intended as an exhaustive description of the disclosure or as a limitation on the scope of the disclosure. In addition, an illustrated example needs not have all the aspects or advantages shown. An aspect or an advantage described in conjunction with a particular example is not necessarily limited to that example and can be practiced in any other examples even if not so illustrated, or if not so explicitly described.
The figures are schematic and simplified for clarity, and they merely show details which aid understanding the disclosure, while other details have been left out. Throughout, the same reference numerals are used for identical or corresponding parts.
As discussed in detail herein, the present disclosure relates to a wireless communication system 1 comprising a cellular system, for example, a 3GPP wireless communication system.
A network node disclosed herein refers to a radio access network (RAN) node operating in the radio access network, such as a base station, an evolved Node B, eNB, gNB in NR.
In one or more examples, the RAN node is a functional unit which may be distributed in several physical units.
The CN node disclosed herein refers to a network node operating in the core network, such as in the Evolved Packet Core Network, EPC, and/or a 5G Core Network, 5GC. Examples of CN nodes in EPC include a Mobility Management Entity, MME.
In one or more examples, the CN node is a functional unit which may be distributed in several physical units.
The wireless communication system 1 described herein may comprise one or more wireless devices 300, 300A, and/or one or more network nodes 400, such as one or more of: a base station, an eNB, a gNB and/or an access point.
A wireless device may refer to a mobile device and/or a user equipment (UE).
The wireless device 300, 300A may be configured to communicate with the network node 400 via a wireless link (or radio access link) 10, 10A.
In one or more examples, the wireless communication system 1 may comprise a coverage enhancing device (CED) 20. The CED may be one or more of a smart repeater and a reflective intelligent surface (RIS). The CED may provide coverage enhancement for devices using 5G and beyond. The CED 20 may be configurable by the network node 400 and may be used to improve signal coverage in the wireless communication system 1. The CED 20 may be used to forward data between the network node 400 and the WD 300A when the WD 300A is located at hard-to-reach locations, such as at a border of a coverage area of the network node 400 or when a direct link between the network node 400 and the WD 300A is obstructed. The wireless device 300A may be configured to communicate with the network node 400 via the wireless link (or radio access link) 10A via the CED 20.
The WD 300, 300A may continuously measure interference experienced by the WD in the wireless communication system 1. The measured interference can be reported to the network node 400, such as to the gNB, and/or can be used internally by the WD 300, 300A when decoding data. An interference pattern might change depending on an operating mode of the CED 20. The WD 300, 300A may for example observe one interference pattern when the CED 20 is operating in a first state, such as using a first configuration, and another interference pattern when the CED 20 is operating in a second state, such as using a second configuration. In one or more example methods, the first configuration may be a first beam configuration, such as a beam configuration configured to serve a first WD. In one or more example methods, the second configuration may be a second beam configuration, such as a beam configuration configured to serve a second WD. In one or more example methods, the first configuration may be an ON mode and the second configuration may be an OFF mode of the CED 20. Thus, according to the current disclosure, the network node 400 can signal the WD 300, 300A about a change in the interference to enable the WD 300, 300A to adjust its interference measurement for decoding the WD's own data. The ON-state may herein be a state in which the CED 20 is controlled, such as by a network node, to beam-form communication between the network node 400 and the WD 300A. In one or more example methods, the OFF-state may be a state in which the CED 20 is not controlled, such as by the network node, to beam-form communication between the network node 400 and the WD 300A. In one or more example methods, the OFF-state may be a power OFF state, a state corresponding to a beamforming configuration in which the CED may scatter signals reaching the CED, or a state in which the CED operates with a lower gain configuration.
In one or more example methods, the method comprises obtaining S102 information about the change of interference state in the communications network. In one or more example methods, the network node can control the change of interference state, such as control a configuration of the CED, such as control a change of the configuration of the CED. When the network node can control the change of the interference state, it may be aware of the changes that may occur and when they may occur. In one or more example methods, the change of the interference state may be controlled by a second network node, such as due to a change of a configuration in a CED controlled by the second network node. When the change of the interference state is controlled by a second network node, obtaining S102 may comprise receiving S102A the information about the change of interference state in the communications network from the second network node.
In one or more example methods, the method comprises receiving S104, from the WD, a capability message indicative of the WD being able to use interference mitigation techniques, such as restarting, resetting, or adapting interference calculations, to improve communication. The capability message may indicate that the WD is an advanced receiver capable of performing interference mitigation and/or cancellation, such as based on interference calculations.
The method 100 comprises transmitting S106, to the WD, a message indicating that a change of an interference state in the communications network will occur. The interference state may herein be seen as an interference level, such as an interference signal strength, and/or a spatial structure of the interference experienced by the wireless device. The message indicating the interference state may thus be indicative of a change in the interference level and/or a spatial structure of the interference experienced by the wireless device.
The message indicating that a change of an interference state in the communications network will occur can inform the WD about the possibility of a change in interference observed by the WD. The change in interference observed by the WD may be due to one or more of a change in the network node configuration, a change in a network node transmit (Tx) beam, a change of a network configuration, such as adding or removing a CED or a new network node joining the network, or due to a configuration change of a CED controlled by the network node.
In one or more example methods, the message may comprise a timing indication indicative of when the change of the interference state will occur. The timing indication can be implicit e.g., relative to the timing, such as the time of transmittal or receival of the message, or explicit.
In one or more example methods, the change of the interference state is associated with the coverage enhancing device, CED, in the communications network. The first interference state may be caused by a first configuration of the CED, and the second interference state may be caused by a second configuration of the CED. The first configuration of the CED may be an ON-state of the CED. The second configuration of the CED may be an OFF-state of the CED.
In one or more example methods, the first interference state may be caused by the CED performing nulling and the second interference state may be caused by the CED not performing nulling. Nulling means that an antenna array of the CED may use a phase distribution to have minimum signal level in a predetermined direction.
In one or more example methods, the change of the interference state is associated with a transition between a first interference state and a second interference state. The first interference state may be due to a first state of the CED, such as an ON-state or a first beamforming state of the CED. The second interference state may be due to a second state of the CED, such as an OFF-state or a second beamforming state of the CED.
In one or more example methods, the message is indicative of a pattern of one or more transitions between the first interference state and the second interference state. The pattern may indicate at which times a transition between the first interference state and the second interference state may occur. In one or more example methods, the pattern may be associated with the transitions of the CED from a first state, such as from a first configuration of the CED, to a second state, such as to a second configuration of the CED, as shown in
In one or more example methods, the pattern is indicative of one or more of a duration of the first interference state and a duration of the second interference state. The duration of the first interference state and/or the second interference state may be an ON duration and/or OFF duration of the CED.
In one or more example methods, the message is indicative of a time instance when the change of the interference state will occur. The time instance may be indicated as a time offset from the transmission of the message, such as a time offset from a time stamp of the message.
In one or more example methods, the message is indicative of one or more beamforming patterns used or to be used at the CED during the first state or the second state. The beamforming pattern may be implicitly or explicitly indicated in the message. The different beamforming patterns of the CED results in the CED redirecting signals in different directions. Hence, the interference situation experienced by the WD may change.
In one or more example methods, the message is transmitted using one or more of a physical (PHY) layer signaling using downlink control information (DCI), a medium access control-control element (MAC-CE) signaling, and/or a Radio Resource Control (RRC) signaling.
In one or more example methods, transmitting S106 comprises transmitting S106A the message based on the capability message. The network node may determine, based on the capability message, whether the wireless device is capable of using the interference mitigation techniques, such as restarting, resetting and/or adapting interference calculations, to improve communication. Upon determining that the WD is capable of using the interference mitigation techniques, the network node may transmit the message to the WD. Upon determining that the WD is not capable of performing interference mitigation techniques, such as restarting, resetting and/or adapting interference calculations, the network node may refrain from transmitting the message to the WD.
In one or more example methods, transmitting S106 comprises transmitting S106B a unicast message. In other words, the network node may transmit dedicated messages to WDs being capable of using interference mitigation techniques to improve communication.
In one or more example methods, transmitting S106 comprises broadcasting S106C the message. The network node may transmit the message, such as signal the possibility of a change in interference state to all or a selected set of WDs connected to the network node. The message may thus be received by a WD regardless of whether the WD is capable of using interference mitigation techniques to improve communication based on the message.
In one or more example methods, the method 200 comprises sending S202, to the network node, a capability message indicative of a capability of the WD to use interference mitigation techniques, such as restarting, resetting, or adapting interference calculations, to improve communication. The capability message may indicate that the WD is an advanced receiver capable of performing interference mitigation and/or cancellations, such as based on interference calculations. In one or more example methods, the capability of the WD to use interference mitigation techniques is indicated based on a class, such as a category, of the WD. In one or more example methods, the capability of the WD to use interference mitigation techniques may be indicated as a response to a capability inquiry, such as a UE capability inquiry, from the network node in a certain band or a band combination, such as a frequency band or a frequency band combination.
The method 200 comprises receiving S204, from the network node, a message indicating that a change of an interference state in a network will occur.
The interference state may herein be seen as an interference level, such as an interference signal strength, and/or a spatial structure of the interference experienced by the wireless device. The message indicating the interference state may thus be indicative of a change in the interference level and/or a spatial structure of the interference experienced by the wireless device.
The message indicating that a change of an interference state in the communications network will occur can inform the WD about the possibility of a change in interference observed by the WD. The change in interference observed by the WD may be due to one or more of a change in the network node configuration, a change in a network node transmit (Tx) beam, a change of a network configuration, such as adding or removing a CED or a new network node joining the network, or due to a configuration change of a CED controlled by the network node.
In one or more example methods, the change of the interference state is associated with a transition between a first interference state and a second interference state.
In one or more example methods, the change of the interference state is associated with the coverage enhancing device, CED, in the communications network. The first interference state may be caused by a first configuration of the CED, and the second interference state may be caused by a second configuration of the CED. The first configuration of the CED may be an ON-state of the CED. The second configuration of the CED may be an OFF-state of the CED. The first interference state may be an ON-state of the CED. The second interference state may be an OFF-state of the CED.
In one or more example methods, the first interference state may be caused by the CED performing nulling and the second interference state may be caused by the CED not performing nulling. Nulling means that an antenna array of the CED may use a phase distribution to have minimum signal level in a predetermined direction.
In one or more example methods, the message is indicative of a pattern of one or more transitions between the first interference state and the second interference state. The pattern may indicate at which times a transition between the first interference state and the second interference state may occur. In one or more example methods, the pattern may be associated with the transitions of the CED from a first state, such as from a first configuration of the CED, to a second state, such as to a second configuration of the CED, as shown in
In one or more example methods, the pattern is indicative of one or more of a duration of the first interference state and a duration of the second interference state. The duration of the first interference state and/or the second interference state may be an ON duration and/or OFF duration of the CED.
In one or more example methods, the message is indicative of a time instance when the change of the interference state will occur. The time instance may be indicated as a time offset from the transmission of the message, such as a time offset from a time stamp of the message.
In one or more example methods, the message is indicative of one or more beamforming pattern used or to be used at the CED during the first state or the second state. The beamforming pattern may be implicitly or explicitly indicated in the message. The different beamforming patterns of the CED results in the CED redirecting signals in different directions. Hence, the interference situation experienced by the WD may change.
In one or more example methods, the message is transmitted using one or more of a physical (PHY) layer signaling using downlink control information (DCI), a medium access control-control element (MAC-CE) signaling, and/or a Radio Resource Control (RRC) signaling.
The method 200 comprises adapting S206 an interference measurement based on the indicated change of the interference state.
In one or more example methods, adapting S206 comprises restarting S206A an interference estimation based on the indicated change of interference state. Restarting the interference estimation may comprise starting a new covariance matrix measurement as disclosed in
In the scenario shown in
where Hd denotes an effective channel matrix from the first network node 400A to the WD 300 and xd is the desired signal transmitted by the first network node 400A to the WD 300. HI
It can be assumed that E[xdxdH]=I, E[xI
Assuming that xd is decoded correctly at the WD 300, the WD 300 can compute the interference-plus-noise-plus-channel estimation error covariance as
where the estimation or sample averaging can typically be performed at the WD 300 over multiple slots or multiple symbols of a slot. In equation (2), RCER=E[(Hd−Ĥd) (Ĥd−Ĥd)H] denotes a covariance matrix associated with the channel estimation error, RI
The covariance matrix in equation (2) may then be used to pre-whiten the received signal yOFF to improve the probability of detection of xd.
Now if the CED is in a second state, such as in an ON state as shown in
It can be noted that there is a new interference signal from the second network node 400B in cell 2 that also contributes to the received signal yON at the WD 300. If the WD 300 uses the RI+N+CE,OFF from equation (2) to pre-whiten yON, the performance will degrade as the interference contribution from HI
According to the current disclosure, if the WD 300 receives a signaling about the change in interference strength when the CED turns to the ON-state, the WD 300 can start a new covariance matrix measurement as shown in
The network node 400 is configured to transmit, such as via the wireless interface 300, to the WD, a message indicating that a change of an interference state in the communications network, such as a change of an interference level experienced by the WD, will occur.
The wireless interface 403 is configured for wireless communications via a wireless communication system, such as a 3GPP system, such as a 3GPP system supporting one or more of: New Radio, NR, Narrow-band IoT, NB-IoT, and Long Term Evolution-enhanced Machine Type Communication, LTE-M, millimeter-wave communications, such as millimeter-wave communications in licensed bands, such as device-to-device millimeter-wave communications in licensed bands.
Processor circuitry 402 is optionally configured to perform any of the operations disclosed in
Furthermore, the operations of the network node 400 may be considered as a method that the network node 400 is configured to carry out. Also, while the described functions and operations may be implemented in software, such functionality may also be carried out via dedicated hardware or firmware, or some combination of hardware, firmware and/or software.
Memory circuitry 401 may be one or more of a buffer, a flash memory, a hard drive, a removable media, a volatile memory, a non-volatile memory, a random access memory (RAM), or other suitable device. In a typical arrangement, memory circuitry 401 may include a non-volatile memory for long term data storage and a volatile memory that functions as system memory for processor circuitry 402. Memory circuitry 401 may exchange data with processor circuitry 402 over a data bus. Control lines and an address bus between memory circuitry 401 and processor circuitry 402 also may be present (not shown in
Memory circuitry 401 may be configured to store information (such as capability information, network configurations, CES configurations, and/or information about changes of an interference state in the network) in a part of the memory.
The wireless device 300 is configured to receive, such as via the wireless interface 303, from the network node, a message indicating that a change of an interference state in a network will occur.
The wireless device 300 is configured to adapt an interference measurement based on the indicated change of the interference state.
The wireless interface 303 is configured for wireless communications via a wireless communication system, such as a 3GPP system, such as a 3GPP system supporting one or more of: New Radio, NR, Narrow-band IoT, NB-IoT, and Long Term Evolution-enhanced Machine Type Communication, LTE-M, millimeter-wave communications, such as millimeter-wave communications in licensed bands, such as device-to-device millimeter-wave communications in licensed bands.
The wireless device 300 is optionally configured to perform any of the operations disclosed in
Furthermore, the operations of the wireless device 300 may be considered as a method that the wireless device 300 is configured to carry out. Also, while the described functions and operations may be implemented in software, such functionality may also be carried out via dedicated hardware or firmware, or some combination of hardware, firmware and/or software.
Memory circuitry 301 may be one or more of a buffer, a flash memory, a hard drive, a removable media, a volatile memory, a non-volatile memory, a random access memory (RAM), or other suitable device. In a typical arrangement, memory circuitry 301 may include a non-volatile memory for long term data storage and a volatile memory that functions as system memory for processor circuitry 302. Memory circuitry 301 may exchange data with processor circuitry 302 over a data bus. Control lines and an address bus between memory circuitry 301 and processor circuitry 302 also may be present (not shown in
Memory circuitry 301 may be configured to store information (such as capability information and/or information about changes of an interference state in the network) in a part of the memory.
Examples of methods and products (network node and wireless device) according to the disclosure are set out in the following items:
The use of the terms “first”, “second”, “third” and “fourth”, “primary”, “secondary”, “tertiary” etc. does not imply any particular order, but are included to identify individual elements. Moreover, the use of the terms “first”, “second”, “third” and “fourth”, “primary”, “secondary”, “tertiary” etc. does not denote any order or importance, but rather the terms “first”, “second”, “third” and “fourth”, “primary”, “secondary”, “tertiary” etc. are used to distinguish one element from another. Note that the words “first”, “second”, “third” and “fourth”, “primary”, “secondary”, “tertiary” etc. are used here and elsewhere for labelling purposes only and are not intended to denote any specific spatial or temporal ordering. Furthermore, the labelling of a first element does not imply the presence of a second element and vice versa.
It may be appreciated that
Other operations that are not described herein can be incorporated in the example operations. For example, one or more additional operations can be performed before, after, simultaneously, or between any of the described operations.
Certain features discussed above as separate implementations can also be implemented in combination as a single implementation. Conversely, features described as a single implementation can also be implemented in multiple implementations separately or in any suitable sub-combination. Moreover, although features may be described above as acting in certain combinations, one or more features from a claimed combination can, in some cases, be excised from the combination, and the combination may be claimed as any sub-combination or variation of any sub-combination
It is to be noted that the word “comprising” does not necessarily exclude the presence of other elements or steps than those listed.
It is to be noted that the words “a” or “an” preceding an element do not exclude the presence of a plurality of such elements.
It should further be noted that any reference signs do not limit the scope of the claims, that the examples may be implemented at least in part by means of both hardware and software, and that several “means”, “units” or “devices” may be represented by the same item of hardware.
Language of degree used herein, such as the terms “approximately,” “about,” “generally,” and “substantially” as used herein represent a value, amount, or characteristic close to the stated value, amount, or characteristic that still performs a desired function or achieves a desired result. For example, the terms “approximately”, “about”, “generally,” and “substantially” may refer to an amount that is within less than or equal to 10% of, within less than or equal to 5% of, within less than or equal to 1% of, within less than or equal to 0.1% of, and within less than or equal to 0.01% of the stated amount. If the stated amount is 0 (e.g., none, having no), the above recited ranges can be specific ranges, and not within a particular % of the value. For example, within less than or equal to 10 wt./vol. % of, within less than or equal to 5 wt./vol. % of, within less than or equal to 1 wt./vol. % of, within less than or equal to 0.1 wt./vol. % of, and within less than or equal to 0.01 wt./vol. % of the stated amount.
The various example methods, devices, nodes and systems described herein are described in the general context of method steps or processes, which may be implemented in one aspect by a computer program product, embodied in a computer-readable medium, including computer-executable instructions, such as program code, executed by computers in networked environments. A computer-readable medium may include removable and non-removable storage devices including, but not limited to, Read Only Memory (ROM), Random Access Memory (RAM), compact discs (CDs), digital versatile discs (DVD), etc. Generally, program circuitries may include routines, programs, objects, components, data structures, etc. that perform specified tasks or implement specific abstract data types. Computer-executable instructions, associated data structures, and program circuitries represent examples of program code for executing steps of the methods disclosed herein. The particular sequence of such executable instructions or associated data structures represents examples of corresponding acts for implementing the functions described in such steps or processes.
Although features have been shown and described, it will be understood that they are not intended to limit the claimed disclosure, and it will be made obvious to those skilled in the art that various changes and modifications may be made without departing from the scope of the claimed disclosure. The specification and drawings are, accordingly, to be regarded in an illustrative rather than restrictive sense. The claimed disclosure is intended to cover all alternatives, modifications, and equivalents.
Number | Date | Country | Kind |
---|---|---|---|
2250012-8 | Jan 2022 | SE | national |
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/EP2022/085568 | 12/13/2022 | WO |