The present application relates generally to wireless communications and, more specifically, to a system and method for mitigating interference.
In 3GPP Long Term Evolution (LTE) (3GPP LTE), a base station (BS) receives uplink (UL) data signals from a subscriber station within the coverage of the BS as well as other subscriber stations belonging to other BSs. In order to decode uplink data signal, the BS needs to distinguish between a desired signal and interfering signals.
In a first embodiment, a method for mitigating interference in a wireless communication system is provided. The method includes receiving a signal transmitted from a mobile station. The method also includes subtracting a target signal within a target bandwidth (BW) from the received signal to obtain a resultant signal. The target signal is constructed by estimating the target channel and target symbols from the received signal. The method also includes determining a subspace blind interference sensing (BIS) BW by extending resource blocks (RBs) prior to the starting RB and after the ending RB of the target bandwidth using energy detection in each RB, determining a set of candidate interfering BWs in the subspace BIS BW by determining the number of interferers in each RB in the subspace BIS BW, determining a set of candidate interfering DeModulation Reference Signal (DMRS) sequences based on the set of candidate interfering BWs by performing DMRS detection for each candidate interfering BW, constructing interfering signals within the subspace BIS BW based on the set of candidate interfering DMRS sequences, subtracting the constructed interfering signals from the received signal, and decoding the target data signal from the resultant signal.
In a second embodiment, an apparatus for mitigating interference in a wireless communication system is provided. The apparatus includes a transceiver configured to receive a signal transmitted from a transmitter. The apparatus also includes a processor configured to subtract a target signal within a target bandwidth (BW) from the received signal to obtain a resultant signal. The target signal is constructed by estimating the target channel and target symbols from the signal. The processor is further configured to determine a subspace blind of interference sensing (BIS) BW by extending resource blocks (RBs) prior to the starting RB and after the ending RB of the target bandwidth, using an energy detection in each RB, determining a set of candidate interfering BWs in the subspace BIS BW by determining the number of interferers in each RB in the subspace BIS BW, determining a set of candidate interfering DeModulation Reference Signal (DMRS) sequences based on the set of candidate interfering BWs by performing DMRS detection for each candidate interfering BW, constructing interfering signals within the subspace BIS BW based on the set of candidate interfering DMRS sequences, subtracting the constructed interfering signals from the received signal, and decoding the target data signal from the resultant signal.
Other technical features may be readily apparent to one skilled in the art from the following figures, descriptions, and claims.
Before undertaking the DETAILED DESCRIPTION below, it may be advantageous to set forth definitions of certain words and phrases used throughout this patent document. The term “couple” and its derivatives refer to any direct or indirect communication between two or more elements, whether or not those elements are in physical contact with one another. The terms “transmit,” “receive,” and “communicate,” as well as derivatives thereof, encompass both direct and indirect communication. The terms “include” and “comprise,” as well as derivatives thereof, mean inclusion without limitation. The term “or” is inclusive, meaning and/or. The phrase “associated with,” as well as derivatives thereof, means to include, be included within, interconnect with, contain, be contained within, connect to or with, couple to or with, be communicable with, cooperate with, interleave, juxtapose, be proximate to, be bound to or with, have, have a property of, have a relationship to or with, or the like. The term “controller” means any device, system or part thereof that controls at least one operation. Such a controller may be implemented in hardware or a combination of hardware and software and/or firmware. The functionality associated with any particular controller may be centralized or distributed, whether locally or remotely. The phrase “at least one of,” when used with a list of items, means that different combinations of one or more of the listed items may be used, and only one item in the list may be needed. For example, “at least one of: A, B, and C” includes any of the following combinations: A, B, C, A and B, A and C, B and C, and A and B and C.
Definitions for other certain words and phrases are provided throughout this patent document. Those of ordinary skill in the art should understand that in many if not most instances, such definitions apply to prior as well as future uses of such defined words and phrases.
For a more complete understanding of this disclosure and its advantages, reference is now made to the following description, taken in conjunction with the accompanying drawings, in which:
As shown in
Depending on the network type, other well-known terms may be used instead of “eNodeB” or “eNB,” such as “base station” or “access point.” For the sake of convenience, the terms “eNodeB” and “eNB” are used in this patent document to refer to network infrastructure components that provide wireless access to remote terminals. Also, depending on the network type, other well-known terms may be used instead of “user equipment” or “UE,” such as “mobile station,” “subscriber station,” “remote terminal,” “wireless terminal,” or “user device.” For the sake of convenience, the terms “user equipment” and “UE” are used in this patent document to refer to remote wireless equipment that wirelessly accesses an eNB, whether the UE is a mobile device (such as a mobile telephone or smartphone) or is normally considered a stationary device (such as a desktop computer or vending machine).
The eNB 102 provides wireless broadband access to the network 130 for a first plurality of user equipments (UEs) within a coverage area 120 of the eNB 102. The first plurality of UEs includes a UE 111, which may be located in a small business (SB); a UE 112, which may be located in an enterprise (E); a UE 113, which may be located in a WiFi hotspot (HS); a UE 114, which may be located in a first residence (R); a UE 115, which may be located in a second residence (R); and a UE 116, which may be a mobile device (M) like a cell phone, a wireless laptop, a wireless PDA, or the like. The eNB 103 provides wireless broadband access to the network 130 for a second plurality of UEs within a coverage area 125 of the eNB 103. The second plurality of UEs includes the UE 115 and the UE 116. In some embodiments, one or more of the eNBs 101-103 may communicate with each other and with the UEs 111-116 using 5G, LTE, LTE-A, WiMAX, or other advanced wireless communication techniques.
Dotted lines show the approximate extents of the coverage areas 120 and 125, which are shown as approximately circular for the purposes of illustration and explanation only. It should be clearly understood that the coverage areas associated with eNBs, such as the coverage areas 120 and 125, may have other shapes, including irregular shapes, depending upon the configuration of the eNBs and variations in the radio environment associated with natural and man-made obstructions.
As described in more detail below, one or more of BS 101, BS 102 and BS 103 performs the blind interference sensing (BIS) process, such as performed by a BIS algorithm, and decodes the received signal after subtracting out at least one interfering signal determined by the BIS algorithm. In some embodiments, the BIS algorithm can be used in other devices, such as a subscriber station.
Although
The transmit path 200 includes a channel coding and modulation block 205, a serial-to-parallel (S-to-P) block 210, a size N Inverse Fast Fourier Transform (IFFT) block 215, a parallel-to-serial (P-to-S) block 220, an add cyclic prefix block 225, and an up-converter (UC) 230. The receive path 250 includes a down-converter (DC) 255, a remove cyclic prefix block 260, a serial-to-parallel (S-to-P) block 265, a size N Fast Fourier Transform (FFT) block 270, a parallel-to-serial (P-to-S) block 275, and a channel decoding and demodulation block 280.
In the transmit path 200, the channel coding and modulation block 205 receives a set of information bits, applies coding (such as a low-density parity check (LDPC) coding), and modulates the input bits (such as with Quadrature Phase Shift Keying (QPSK) or Quadrature Amplitude Modulation (QAM)) to generate a sequence of frequency-domain modulation symbols. The serial-to-parallel block 210 converts (such as de-multiplexes) the serial modulated symbols to parallel data in order to generate N parallel symbol streams, where N is the IFFT/FFT size used in the eNB 102 and the UE 116. The size N IFFT block 215 performs an IFFT operation on the N parallel symbol streams to generate time-domain output signals. The parallel-to-serial block 220 converts (such as multiplexes) the parallel time-domain output symbols from the size N IFFT block 215 in order to generate a serial time-domain signal. The add cyclic prefix block 225 inserts a cyclic prefix to the time-domain signal. The up-converter 230 modulates (such as up-converts) the output of the add cyclic prefix block 225 to an RF frequency for transmission via a wireless channel. The signal may also be filtered at baseband before conversion to the RF frequency.
A transmitted RF signal from the eNB 102 arrives at the UE 116 after passing through the wireless channel, and reverse operations to those at the eNB 102 are performed at the UE 116. The down-converter 255 down-converts the received signal to a baseband frequency, and the remove cyclic prefix block 260 removes the cyclic prefix to generate a serial time-domain baseband signal. The serial-to-parallel block 265 converts the time-domain baseband signal to parallel time domain signals. The size N FFT block 270 performs an FFT algorithm to generate N parallel frequency-domain signals. The parallel-to-serial block 275 converts the parallel frequency-domain signals to a sequence of modulated data symbols. The channel decoding and demodulation block 280 demodulates and decodes the modulated symbols to recover the original input data stream.
Each of the eNBs 101-103 may implement a transmit path 200 that is analogous to transmitting in the downlink to UEs 111-116 and may implement a receive path 250 that is analogous to receiving in the uplink from UEs 111-116. Similarly, each of UEs 111-116 may implement a transmit path 200 for transmitting in the uplink to eNBs 101-103 and may implement a receive path 250 for receiving in the downlink from eNBs 101-103.
Each of the components in
Furthermore, although described as using FFT and IFFT, this is by way of illustration only and should not be construed to limit the scope of this disclosure. Other types of transforms, such as Discrete Fourier Transform (DFT) and Inverse Discrete Fourier Transform (IDFT) functions, could be used. It will be appreciated that the value of the variable N may be any integer number (such as 1, 2, 3, 4, or the like) for DFT and IDFT functions, while the value of the variable N may be any integer number that is a power of two (such as 1, 2, 4, 8, 16, or the like) for FFT and IFFT functions.
Although
As shown in
The RF transceiver 310 receives, from the antenna 305, an incoming RF signal transmitted by an eNB of the network 100. The RF transceiver 310 down-converts the incoming RF signal to generate an intermediate frequency (IF) or baseband signal. The IF or baseband signal is sent to the RX processing circuitry 325, which generates a processed baseband signal by filtering, decoding, and/or digitizing the baseband or IF signal. The RX processing circuitry 325 transmits the processed baseband signal to the speaker 330 (such as for voice data) or to the main processor 340 for further processing (such as for web browsing data).
The TX processing circuitry 315 receives analog or digital voice data from the microphone 320 or other outgoing baseband data (such as web data, e-mail, or interactive video game data) from the main processor 340. The TX processing circuitry 315 encodes, multiplexes, and/or digitizes the outgoing baseband data to generate a processed baseband or IF signal. The RF transceiver 310 receives the outgoing processed baseband or IF signal from the TX processing circuitry 315 and up-converts the baseband or IF signal to an RF signal that is transmitted via the antenna 305.
The main processor 340 can include one or more processors or other processing devices and execute the basic OS program 361 stored in the memory 360 in order to control the overall operation of the UE 116. For example, the main processor 340 could control the reception of forward channel signals and the transmission of reverse channel signals by the RF transceiver 310, the RX processing circuitry 325, and the TX processing circuitry 315 in accordance with well-known principles. In some embodiments, the main processor 340 includes at least one microprocessor or microcontroller.
The main processor 340 is also capable of executing other processes and programs resident in the memory 360, such as operations for detecting interference signals and decoding a received signal subtracted by the interference signals. The main processor 340 can move data into or out of the memory 360 as required by an executing process. In some embodiments, the main processor 340 is configured to execute the applications 362 based on the OS program 361 or in response to signals received from eNBs or an operator. The main processor 340 is also coupled to the I/O interface 345, which provides the UE 116 with the ability to connect to other devices such as laptop computers and handheld computers. The I/O interface 345 is the communication path between these accessories and the main controller 340.
The main processor 340 is also coupled to the keypad 350 and the display unit 355. The operator of the UE 116 can use the keypad 350 to enter data into the UE 116. The display 355 may be a liquid crystal display or other display capable of rendering text and/or at least limited graphics, such as from web sites.
The memory 360 is coupled to the main processor 340. Part of the memory 360 could include a random access memory (RAM), and another part of the memory 360 could include a Flash memory or other read-only memory (ROM).
Although
As shown in
The RF transceivers 372a-372n receive, from the antennas 370a-370n, incoming RF signals, such as signals transmitted by UEs or other eNBs. The RF transceivers 372a-372n down-convert the incoming RF signals to generate IF or baseband signals. The IF or baseband signals are sent to the RX processing circuitry 376, which generates processed baseband signals by filtering, decoding, and/or digitizing the baseband or IF signals. The RX processing circuitry 376 transmits the processed baseband signals to the controller/processor 378 for further processing.
The TX processing circuitry 374 receives analog or digital data (such as voice data, web data, e-mail, or interactive video game data) from the controller/processor 378. The TX processing circuitry 374 encodes, multiplexes, and/or digitizes the outgoing baseband data to generate processed baseband or IF signals. The RF transceivers 372a-372n receive the outgoing processed baseband or IF signals from the TX processing circuitry 374 and up-converts the baseband or IF signals to RF signals that are transmitted via the antennas 370a-370n.
The controller/processor 378 can include one or more processors or other processing devices that control the overall operation of the eNB 102. For example, the controller/processor 378 could control the reception of forward channel signals and the transmission of reverse channel signals by the RF transceivers 372a-372n, the RX processing circuitry 376, and the TX processing circuitry 324 in accordance with well-known principles. The controller/processor 378 could support additional functions as well, such as more advanced wireless communication functions. For instance, the controller/processor 378 can perform the blind interference sensing (BIS) process, such as performed by a BIS algorithm, and decodes the received signal subtracted by the interfering signals. Any of a wide variety of other functions could be supported in the eNB 102 by the controller/processor 378. In some embodiments, the controller/processor 378 includes at least one microprocessor or microcontroller.
The controller/processor 378 is also capable of executing programs and other processes resident in the memory 380, such as a basic OS. The controller/processor 378 can move data into or out of the memory 380 as required by an executing process.
The controller/processor 378 is also coupled to the backhaul or network interface 335. The backhaul or network interface 382 allows the eNB 102 to communicate with other devices or systems over a backhaul connection or over a network. The interface 382 could support communications over any suitable wired or wireless connection(s). For example, when the eNB 102 is implemented as part of a cellular communication system (such as one supporting 5G, LTE, or LTE-A), the interface 382 could allow the eNB 102 to communicate with other eNBs over a wired or wireless backhaul connection. When the eNB 102 is implemented as an access point, the interface 382 could allow the eNB 102 to communicate over a wired or wireless local area network or over a wired or wireless connection to a larger network (such as the Internet). The interface 382 includes any suitable structure supporting communications over a wired or wireless connection, such as an Ethernet or RF transceiver.
The memory 380 is coupled to the controller/processor 325. Part of the memory 330 could include a RAM, and another part of the memory 380 could include a Flash memory or other ROM. In certain embodiments, a plurality of instructions, such as a BIS algorithm is stored in memory. The plurality of instructions are configured to cause the controller/processor 378 to perform the BIS process and to decode a received signal after subtracting out at least one interfering signal determined by the BIS algorithm.
As described in more detail below, the transmit and receive paths of the eNB 102 (implemented using the RF transceivers 372a-372n, TX processing circuitry 374, and/or RX processing circuitry 376) support communication with aggregation of FDD cells and TDD cells.
Although
The UL received signal at eNB 101 includes a desired signal 405 from MS1410, and two interfering signals from MS2415 and MS3420 that transmit signals intended to two neighboring cells eNB 102 and eNB 103. For example, eNB 101 receives an interfering signal 425 from MS2415 and an interfering signal 430 from MS3420. It is noted that MS1101 can include the same or similar structure as UE 116 as illustrated in
If the received interference power is high, then decoding of the desired signal may fail. When the decoding fails, eNB 101 estimates at least one dominant interferer and subtracts (namely, cancels) the dominant interferer from the received signal prior to another decoding attempt. The eNB 101 can repeat this process multiple times if necessary. The challenge that eNB 101 has is the completely blind nature of interference sensing (BIS) and cancellation (IC). The eNB 101 needs to estimate all parameters necessary for IC, which includes number of dominant interferers (DI), and their PRB allocations, DMRS sequences, channels, modulation orders, and so forth. The information available at eNB 101 to estimate all these is received signal and parameters such as desired BW related to the desired signal 405 from MS1410.
In a first block, the desired signal processing and subtraction 505 is performed. The initial input to the desired signal processing and subtraction 505 is the desired user's information, such as a desired BW (desired PRB allocation) and a received signal (y). The main processing for the desired signal processing and subtraction 505 includes desired channel estimation and decoding the received signal within the desired BW. If the decoding succeeds, then the algorithm stops; otherwise the desired signal (Σnhn(d)xn(d)) is subtracted by the received signal and the resultant signal (y−Σnhn(d)xn(d)) is fed to the next operation, namely the BIS 510.
A second block is the BIS 510. Using the desired BW and the received signal after desired signal subtraction, the BIS 510 estimates interference related parameters such as interfering BWs and DMRS sequences for different interferers.
A third block includes interference signal processing and subtraction 515. The estimated interfering DMRS sequences are then used to estimate interfering channels and modulations. They in turn are used to reconstruct the interference signal (Σn is interf.hn(i)xn(i)) for subtraction from the received signal (y). The resultant signal is then fed back to the desired signal processing and subtraction operation again for another decoding attempt.
The BIS starts by estimating interfering BWs of dominant interferers in terms of PRB indices. For this, a set of all possible interfering BWs I are considered that overlap with at least one PRB of the desired signal's BW: I={(s, e): s≦edes, e≧sdes., e≧s, s and e is a UL PRB index in the system BW}, where sdes. and edes., respectively are the start and the end PRB indices of the desired BW.
Since the size of set I can be large for practical systems, fully exhaustive search over all interfering BW candidates in I has high complexity. Therefore, there is a need to reduce the search space while maintaining the performance close to the full search. This disclosure proposes a subspace-based BIS algorithm to reduce the interfering BW search space. The reduced search space includes the correct interfering BWs of the dominant interferers with high probability (close to 1) and the achieved complexity reduction is substantial compared to the full search.
In some embodiments of this disclosure, the BIS algorithm is carried out in the three operations, as illustrated. The energy detection operation 705 detects the presence of interference in the whole UL PRBs (or total number of UL PRBs in the system BW), referred to as subspace BIS BW, by comparing the eigenvalues of the covariance matrices of the received signal after desired signal subtraction with a threshold value in different UL PRBs. The subspace BIS operation 710 performs the interference case detection (details are provided later) on all possible pairs of consecutive PRBs in the estimated subspace BIS BW, and obtains a set of candidate interference BWs (PRB allocations). Then, the DMRS BIS operation 715 performs interfering DMRS sequence detection for only those interference BWs that are in the set obtained in the subspace BIS operation.
In certain embodiments, the BIS algorithm 510 starts with the desired signal reconstruction 805: for example, from the estimated desired channel (h(d)) and estimated desired symbols (x(d)) as h(d)x(d). The desired channel can be estimated from DMRS measurements and the desired symbols may be estimated from soft bits (LLRs) to modulation symbol mapping. The reconstructed desired signal is subtracted from the received signal (y).
The resultant signal y−h(d)x(d) and the desired BW A0={sdes., . . . , edes.} are used to perform energy detection 810 to detect the presence of interference outside the desired BW A0, but within the whole UL BW. The result of the energy detection 810 is subspace BIS BW 815, which is a set A={Aleft,A0,Aright} consisting of indices of UL PRBs in desired BW (A0) and to the left (Aleft) and to the right (Aright) of desired BW.
Consequently, the subspace BIS operation 820 performs an interference case detection for each pair of consecutive RBs in A and outputs a set of candidate interference BWs {(n, k)} 825, where n and k correspond to the size and offset of interference BWs, respectively.
The DMRS BIS operation 830 carries out the DMRS sequence detection only for the candidate interference BWs. The outcome of the DMRS BIS operation is a set of DMRS parameters {(u, ncs, n, k)} 835, where u and ncs, respectively are the remaining two parameters (group id and cyclic shift) of the candidate interference DMRS sequences.
In certain embodiments, starting with the desired BW, the subspace BIS BW iteratively expands 905 by one or more PRBs to the left of the desired BW in order to determine the subspace BIS BW. The expansion 905 is based on the energy detection using the eigenvalues of the covariance matrix of the received signal minus the reconstructed desired signal in one or more consecutive PRBs starting from the leftmost PRB in the desired BW. For example, if at least one of the eigenvalues is greater than a fixed threshold, then the presence of interference in the considered consecutive PRBs is declared.
As illustrated in the examples shown in
In one method, an expansion to the right is performed similar to the left expansion 905. In another method, this expansion is combined with the subspace BIS operation in the next step of the proposed algorithm.
As shown, to determine the subspace BIS BW, we can expand to the left by 1 PRB in each iteration starting from the leftmost PRB in desired BW. In block 1005, i is initialized to sdes. In block 1010, energy E(i) is detected in PRB i. For PRB i, the energy E(i) based on the eigenvalue of the covariance matrix of received signal in PRB i is compared against a threshold in block 1015 and then it is determined whether i is greater than 1 in block 1020. If E(i) is more than the threshold and i is greater than 1, expansion occurs in block 1025 and the process continues, otherwise the process stops in block 1030.
Likewise, the subspace BIS BW can also expand to the right by 1 PRB in each iteration starting from the rightmost PRB in desired BW. In block 1005, i is initialized to edes. In block 1010, energy E(i) is detected in PRB i. For PRB i, the energy E(i) based on the eigenvalue of the covariance matrix of received signal in PRB i is compared against a threshold in block 1015 and then it is determined whether i is smaller than the largest UL PRB index in block 1020. If E(i) is more than the threshold and i is greater than 1, expansion continues to the right in block 1025 and the process continues, otherwise the process stops in block 1030.
The subspace BIS block, such as via a BIS algorithm, performs interference case detection for two consecutive RBs (k, k+1) in the estimated subspace BIS BW by the steps:
In step (1), the subspace BIS block detects the number of interferers in each RB using the eigenvalues of the covariance matrix of the received signal (after desired signal subtraction) in that RB.
The covariance matrix of RB k is the following Equation 1:
where Mk is the set of received samples in RB k, yk,m is the received signal vector corresponding to resource element (RE) m in RB k, hk(d) and Rk(d) are the desired signal vector and covariance matrix, hk(i
Assuming that the desired signal can be subtracted by the received signal perfectly, the covariance matrix without the desired signal for RB k is the following Equation 2:
{tilde over (R)}k=Σl=1LRk(i
The eigenvalue decomposition of {tilde over (R)}k is the following Equation 3:
where Ui,k and Un,k respectively are the interference signal subspace and noise subspace. The eigenvalues of {tilde over (R)}k are used to determine the number of interferers in RB k. Let us use the notation rk to denote the number of interferers in RB k.
In step (2), the subspace BIS block uses the dimension or rank of the signal spaces of {tilde over (R)}k and {tilde over (R)}k+1 concatenated together for detecting the total number of interferers in RBs k and k+1 together using the eigenvalues of the covariance matrix of the received signal (after desired signal subtraction) in RBs k and k+1 together.
The average of the covariance matrices of the two RBs is defined as Equation 4:
and the eigenvalue decomposition of {tilde over (R)}k,k+1 is performed. The eigenvalues of {tilde over (R)}k,k+1 are used to determine the dimension or rank of the signal spaces of {tilde over (R)}k and {tilde over (R)}k+1 concatenated together. The notation δk is used to denote the eigenvalues of {tilde over (R)}k,k+1. In some embodiments, the variable δk indicates a number of events comprising a start of a candidate interference BW in RB k+1, an end of a candidate interference BW in RB k, and a continuing candidate interference BW in consecutive RBs (k, k+1). Thus, the variable δk together with rk and rk+1 distinguishes among the following three possibilities: the start of a candidate interference BW in PRB k+1; the end of a candidate interference BW in PRB k, and the continuing interference candidate BW in PRBs (k, k+1).
As illustrated, the detected value of (rk, rk+1, δk) is used to determine a valid interference case. For example, if (rk, rk+1, δk)=(1,1,1), the base station has an interfering user IUE1 in both RBs k and k+1, as shown in
In certain embodiments, the detected value of (rk, rk+1, δk) is obtained based on the threshold test on the eigenvalues of the covariance matrix of the received signal. The eigenvalue matrix of the covariance matrix of the received signal is Equation 5:
where
is the achieved Interference to Noise power Ratio (INR), and
is a function of the achieved INR.
Then, the threshold test is given by Equation 6:
where T is the threshold, for example,
is the threshold as a function of target INR, TINR in dB.
In certain embodiments, the thresholds for rk,rk+1, and δk are the same. In other embodiments, the thresholds are different. In certain embodiments, the thresholds may be the function of eigenvalues. In certain embodiments, the threshold may be different for different eigenvalues. For example, the threshold for the largest eigenvalue may be the largest; the threshold for the second eigenvalue may be smaller than that for the largest eigenvalue, and so on. In certain embodiments, the threshold may be chosen to be a value in between a lower and upper bounds as shown in the following Equation 7:
Lower bound:L≦Threshold:T=f(U,L)≦Upper bound:U. (7)
In certain embodiments, the detected value of (rk, rk+1, δk) is obtained based on the threshold test on a few dominant eigenvalues (not all eigenvalues) of the covariance matrix of the received signal. For example, all eigenvalues may be sorted first and then a threshold test is performed starting from the largest eigenvalue. The test continues in the sorted order until a target percentage of sum interference power is detected.
In certain embodiments, the threshold test for (rk, rk+1, δk) is performed according to the following algorithm tabulated in Table 1.
In certain embodiments, the noise variance σn2 is estimated using the smallest eigenvalue of the average covariance of received signal after desired signal subtraction. Note that this is reasonable if the number of dominant interferers is less than the number of receive antennas or eigenvalues.
In certain embodiments, the estimated value of σn2 is equal to the smallest eigenvalue in a particular PRB. In other embodiments, the estimated value of σn2 is obtained by averaging the smallest eigenvalues over the desired user PRB allocations, i.e.
where Nd is the number of desired user PRBs, and λsmallest(i) is the smallest eigenvalue for PRB i. In yet other embodiments, the estimated value of σn2 is obtained by averaging the smallest eigenvalues over the subspace BIS BW.
In certain embodiments, the detected value of (rk, rk+1, δk) is obtained based on the model selection that fits the data (received signal after desired signal subtraction).
The model selection based on the maximum aposteriori probability is provided in M. Wax and T. Kailath “Detection of Signals by Information Theoretic Criteria,” IEEE Tr. Acous. Speech. Sig. Proc. 1985, which is incorporated in this disclosure in its entirety. Assuming i.i.d. complex Gaussian received sample of zero mean, the detected value of rk, (rk+1, and δk) is the value of k E {0, 1, . . . , p−1} for which Equation 8:
is minimized, where p is number of Rx antennas, and li is the i-th eigenvalue of the covariance matrix sorted in descending order, and N is the number of received samples. In certain embodiments, the subspace BIS block performs interference case detection for all pairs of consecutive RBs in the estimated subspace BIS BW, and aggregate arrivals (or starts) and departures (or ends) of detected interferer BWs over the entire subspace BIS BW, which in turn gives us a set of candidate interference BWs.
As shown in
Then, the five detected values of (rk, rk+1, δk): (2, 2, 2), (2, 1, 2), (1, 1, 1), (1, 2, 2), and (2, 2, 2) are mapped to five interference cases. Aggregating these interference cases results in three candidate interference BW candidates, which are (1, 2, 3, 4, 5, 6), (1, 2), and (5, 6).
When the detected triples (rk, rk+1, δk) are mapped to interference cases, there can be some cases where the interference case detection for some pairs of consecutive RBs in subspace BIS BW needs to be improved. Below are three example improvements. Any other potential improvements can be similarly included in the algorithm.
For example, as shown in
For example, when (rk, rk+1, δk)=(2,1,2) is detected, a decision needs to be made as to which of the two interferers, IUE1 and IUE2, departed in RB k+1. In option A-2, the decision is made by randomly assuming both are equally likely to depart. In option B-2, the decision is made randomly with the assumption of prior knowledge. In option C-2, two interference BW hypotheses are created for the next step of the algorithm, as shown in
For example, as shown in
In some embodiments, option C-1 is applied to address the issue 1, and the six triple values (rk, rk+1, δk) are mapped to (2, 1, 2), (1, 2, 2), (1, 2, 2), (1, 2, 2), (2, 1, 2), and (1, 2, 2), respectively. In some embodiments, option C-2 is applied to address issue 2 and option C-3 is applied for issue 3, which generate a total of 25=32 hypotheses. As shown, there are 32 interference hypotheses, and the one of them (top hypothesis) includes the correct interference BW.
The algorithm complexity depends on the value of max rk (number of layers). For example, the complexity for max rk=1 is less than that for max rk=2. However, since the BIS subspace size is more for max rk=1 than that for max rk=2, the performance of the subspace BIS algorithm with max rk=1 is better than the same with max rk=2 because the performance improves with increasing size of BIS subspace in general.
As shown in
The following simulation results are provided for the subspace (SS) BIS algorithm. Results are provided for 1 interference layer (max rk value=1) and are compared with the full DMRS search. The relevant information about the simulation environment is as follows: 10 MHz BW (50 RBs); perfectly overlap of desired and interference BWs; Ped. B channel and AWGN; SNR is 0 dB; u and ncs are random; and 3 interference cases as listed in the following Table 2:
Valid and invalid interference cases can be predetermined and saved, for example, in appendix A. Let us assume that (1) we can have at most N1=3 interferers per PRB, and (2) there are NRx=4 antennas at the receiver. The universe set {0≦rk, rk+1, δk≦min (NI, NRx)} comprises both valid and invalid interference cases. The valid interference cases are such that their (rk, rk+1, δk) values satisfy the following condition: max(rk, rk+1)≦δk≦rk+rk+1, where 0≦rk, rk+1, δk min(NI, NRx); Invalid (or impossible) cases are all the other cases that are physically impossible.
If the interference case detection for a pair of consecutive RBs (k, k+1) is performed, then depending on the outcome, an interference case can be detected that is physically valid or an invalid case.
For example,
Although the present disclosure has been described with an exemplary embodiment, various changes and modifications may be suggested to one skilled in the art. It is intended that the present disclosure encompass such changes and modifications as fall within the scope of the appended claims.
The present application claims priority to U.S. Provisional Patent Application Ser. No. 62/048,717, filed Sep. 10, 2014, entitled “METHOD AND APPARATUS OF UPLINK BLIND INTERFERENCE SENSING FOR ADVANCED WIRELESS COMMUNICATION SYSTEMS”. The content of the above-identified patent document is incorporated herein by reference.
Number | Name | Date | Kind |
---|---|---|---|
20060067446 | Maeda et al. | Mar 2006 | A1 |
20110222525 | Kishigami et al. | Sep 2011 | A1 |
20130016767 | Pean et al. | Jan 2013 | A1 |
20130094427 | Bhattad et al. | Apr 2013 | A1 |
20140307703 | Gaal | Oct 2014 | A1 |
Entry |
---|
International Search Report and Written Opinion issued for PCT/KR2015/009460 dated Dec. 16, 2015, 9 pgs. |
Toshiba, “Eigen-Feedback Reduction by Sub-Space Signalling”, 3GPP TSG RAN WG1 Meeting #59bis, R1-100063, Jan. 12, 2010, 5 pgs. |
Number | Date | Country | |
---|---|---|---|
20160073415 A1 | Mar 2016 | US |
Number | Date | Country | |
---|---|---|---|
62048717 | Sep 2014 | US |