1. Field of the Disclosure
The present disclosure relates generally to wireless communication systems and, in particular, to cell cluster coordination in wireless communication systems.
2. Description of the Related Art
Wireless communication systems typically include a variety of different types of cells deployed adjacent to each other or in an overlay configuration. For example, a heterogeneous wireless communication system may include macrocells for providing wireless connectivity over relatively large areas and one or more smaller cells for providing wireless connectivity over relatively small areas within the larger areas covered by the macrocells. The macrocells may include base stations, base station routers, and the like. The smaller cells may include low power nodes, microcells, femtocells, picocells, access points, home base station routers, and the like. The terms “cell,” “macrocell,” “microcell,” etc. are conventionally used to indicate both the physical device used to provide wireless connectivity and the coverage area of the wireless connectivity. Thus, the term “macrocell” may refer to a base station that provides wireless connectivity or the coverage area of the base station. User equipment can communicate with the wireless communication system over downlink (or forward link) channels that convey information from the network to the user equipment or uplink (or reverse link) channels that convey information from the user equipment to the network.
Wireless communication systems that implement standards such as the Long Term Evolution (LTE) Advanced standard can use time division duplexing (TDD) to allocate frames and subframes for uplink and downlink transmissions. For example, a base station in the wireless communication system that implements TDD may allocate subframes 0, 2, 4, 6, 8 to downlink transmission from the base station to user equipment and may allocate subframes 1, 3, 5, 7, and 9 to uplink transmissions from the user equipment to the base station. Different base stations can select different configurations of the uplink/downlink subframe allocation. For example, the LIT standard defines seven TDD subframe configurations and base stations can select from among these configurations. Some embodiments of the base stations may allocate larger numbers of TDD subframes to downlink transmissions for broadcasting large volumes of data to user equipment or they may allocate larger numbers of TDD subframes to uplink transmissions when receiving a large amount of data from user equipment.
The present disclosure may be better understood, and its numerous features and advantages made apparent to those skilled in the art by referencing the accompanying drawings. The use of the same reference symbols in different drawings indicates similar or identical items.
Dynamically allocating time division duplex (TDD) subframes, e.g., on timescales of milliseconds or frame-by-frame, may allow a TDD spectrum operator to adapt to rapid changes in uplink or downlink traffic or channel conditions. However, dynamically changing the uplink/downlink TDD subframe allocation in different base stations can lead to serious interference if the different base stations are not coordinated. For example, a base station that allocates a subframe to uplink transmissions may experience strong interference from a neighboring base station that allocates the same subframe to downlink transmissions since in TDD systems share the same frequency on the uplink and downlink channels. For another example, user equipment that are served by abuse station that allocates a subframe to downlink transmissions may experience strong interference from user equipment served by a neighboring base station that allocates the same subframe to uplink transmissions. This problem can be exacerbated in heterogeneous wireless communication systems that include combinations of macrocells and smaller cells that may be deployed by different vendors that may not coordinate operations of their networks.
At least in part to support dynamic allocation of TDD subframes and to reduce interference between base stations and user equipment, the present application describes embodiments of base stations that can negotiate with each other to decide whether to form a cluster and coordinate allocation of their TDD subframes. For example, a first base station may send information identifying its current or future TDD subframe configuration to one or more second base stations, e.g., base stations that may cause strong interference at the first base station in one or more subframes. The second base station(s) may acknowledge receipt of the information, thereby forming a cluster relationship with the first base station. The first and second base stations may then exchange TDD subframe configurations in the event that any of the TDD subframe configurations change. When a base station receives information indicating that a TDD subframe configuration of one of the base stations in its cluster has changed or is going to change, the base station can use this information to decide whether to change its own TDD subframe configuration or implement other interference mitigation techniques in the conflicting subframes. Some embodiments may form the clusters in a distributed manner using peer-to-peer negotiations between individual base stations
The base stations 110 may provide wireless communication to user equipment 115 using time division duplexing (TDD). For example, each transmission frame may be divided into a set of subframes and then each subframe may be used for either uplink or downlink communication. A. TDD subframe configuration may be used to determine the allocation of the subframes to uplink or downlink communication. For example, each base station 110 may choose a TDD subframe configuration from a set of predetermined or standardized configurations. The TDD subframe configurations may be modified semi-statically, or dynamically, e.g., on a timescale of milliseconds or on a frame-by-frame basis. The base stations 110 may modify the TDD subframe configurations based on changing uplink or downlink traffic, changing uplink or downlink channel conditions, and the like.
Referring back to
Base stations 110 that agree to cluster together may coordinate allocation of their TDD subframes. For example, if base station 110(7) estimates that conflicts with the TDD subframe configurations of base stations 110(1-6) could cause strong interference at the base station 110(7), the base station 110(7) may form a cluster with the base stations 110(1-6) so that the base stations 110(1-7) agree to inform the others when their TDD subframe configurations are modified or may be modified in the future. When one of the base stations 110 receives information indicating that the TDD subframe configuration of another base station 110 has been modified or may be modified, the base station 110 can decide whether to adapt its TDD subframe configuration to conform more closely to the new TDD subframe configuration of the other base station. For example, the notified base station 110 may modify its own TDD subframe configuration to be the same (or partially the same) as the new TDD subframe configuration. The base station 110 may also decide whether to perform other interference mitigation procedures.
The cells 305, 310, 315 implement TDD communication with one or more user equipment 335. As discussed herein, conflicting TDD subframe configurations in the cells 305, 310, 315 can lead to significant interference between the cells 305, 310, 315 or user equipment served by the cells 305, 310, 315. The inter-cell interference may be exacerbated in a heterogeneous wireless communication system 300 because the cells 305, 310, 315 are deployed in an overlay configuration. Interference between the cells 305, 310, 315 may be reduced or mitigated by clustering cells that may interfere strongly with each other. For example, the cells 305, 310, 315 may be able to exchange messages to negotiate with each other and decide whether to form a cluster. Cells 305, 310, 315 within a cluster may then notify each other about current or impending changes in their TDD subframe configurations so that the other cells 305, 310, 315 can decide whether to modify their own TDD subframe configurations and/or perform other interference mitigation.
The base stations 401-403 may form a cluster and agree to coordinate their TDD subframe configurations. For example, the base station 401 may send a request to the base station 402 that includes a TDD subframe configuration, thereby indicating that the base station 401 is asking the base station 402 to form a cluster. This differs from the conventional practice because a conventional base station does not interpret receipt of TDD subframe configuration information as a request to establish a cluster. The base station 402 may acknowledge the request, e.g., because the base station 402 has identified the base station 401 as a potentially strong interferer, and the base stations 401-402 may form a cluster. The base station 401 may therefore store information identifying the base station 402 in a data structure such as a table 405. Entries in the data structure 405 may also include information identifying the current TDD subframe configuration of the base station 402, signal strength or interference level information associated with the base station 402, or other information. For another example, the base station 403 may send a request to the base station 401 that includes a TDD subframe configuration to indicate that the base station 403 is asking the base station 401 to form a cluster. The base station 401 may acknowledge the request and store information identifying the base station 403 in the table 405. The base stations 401 and 403 may then form a cluster and agree to exchange TDD subframe configuration information.
In the event that one or more of the base stations 402-403 in the cluster signal the base station 401 to indicate a modified TDD subframe configuration or a future modification of a TDD subframe configuration, adaptation logic 410 in the base station 401 may use information in the table 405 to decide whether to modify the TDD subframe configuration used by the base station 401. Some embodiments of the adaptation logic 410 may implement algorithms that select modifications to the TDD subframe configuration based on the TDD subframe configuration used by the base station 401, the modified TDD subframe configuration, TDD subframe configurations of other base stations in the duster, signal strength information associated with the other base stations in the cluster, or other information. For example, the adaptation logic 410 may change the TDD subframe configuration of the base station 401 to match the TDD subframe configuration of the base station 403 as long as this does not lead to excessive interference due to conflicts with the TDD subframe configuration of the base station 402. For another example, the adaptation logic 410 may change the UL/DL direction for one or more of the TDD subframes used by the base station 401 if an estimate of the interference in those TDD subframes caused by conflict with one or more of the base stations 402, 403 exceeds a threshold. The estimate maybe based on previous signals received from the base stations 402, 403, pilot signals received from the base stations 402, 403, common reference signals received from the base stations 402, 403, or using other techniques.
The base station 401 also includes mitigation logic 415 that can be used to select and apply interference mitigation, e.g., to mitigate the effects of interference caused by conflicts between different TDD subframe configurations. For example, if there is a TDD subframe conflict between the base station 401 and the base station 402 in one or more subframes, the mitigation logic 415 may select and apply one or more interference mitigation techniques in the conflicting subframes. Mitigation techniques may include transmission of almost blank subframes in the conflicting subframes, power reduction for transmissions in the conflicting subframes, or other interference mitigation techniques such as backhaul coordination to inform other cells of severe inter-base-station interference. For example, a base station that is experiencing high interference may inform other base stations in the cluster that are the source of interference to enable and initiate interference mitigation techniques. In some embodiments, adaptation logic 410 and mitigation logic 415 may work together to determine an optimal combination of modifying the TTD subframe configuration to change the transmission direction in a subset of subframes and performing interference mitigation in another subset of subframes.
The second base station can receive the request and use the information in the request to decide whether to accept the request to form the cell cluster. Some embodiments of the second base station can determine (at 510) whether the first base station is likely to be a strong interferer, e.g., in the event of a TDD subframe configuration conflict. A second base station may then decide (at 515) to add the first base station to its cluster. Although the illustrated embodiment of the second base station makes this decision based in part on whether the first base station is likely to be a strong interferer, other criteria may be used instead of or in addition to this criterion. The second base station then acknowledges (at 520) receipt of the request from the first base station, thereby indicating that the second base station has formed a cluster with the first base station. The first base station may then add (at 525) the second base station to its cluster. At the point indicated by the line 530, the first and second base stations have agreed to form a cluster and to inform each other in the event that their TDD subframe configurations have changed or are expected to change.
The first base station modifies (or decides that it may modify) its TDD subframe configuration at 535. Since modifying the TDD subframe configuration may cause significant interference at other base stations, the first base station notifies other base stations in its cluster. For example, the first base station sends (at 540) a notification to the second base station including information indicating the modified TDD subframe configuration. Some embodiments of the first base station may use the if shown in Table 1 to convey this information. In response to receiving the notification, the second base station decides (at 545) whether to modify its own TDD subframe configuration. Modification of the TDD subframe configuration may include changing its TDD subframe configuration to match the TDD subframe configuration of the first base station, changing the transmission direction of selected subframes to correspond to the transmission direction in the same subframes of the modified TDD subframe, or doing nothing. The second base station may also decide at 550) whether to mitigate interference in one or more subframes indicated in the modified TDD subframe configuration. The second base station may then notify (at 555) the first base station of modifications (if any) to the second base station's TDD subframe configuration.
Some embodiments of the method 500 may be implemented as part of a peer-to-peer negotiation between the first and second base stations. For example, the first and second base stations may negotiate the cluster relationship without any additional controller coordination by a central controller. Thus, the establishment of clusters may be performed in a distributed manner and not a hierarchical manner, Clusters formed in a distributed manner as described herein may be referred to as “loose” clusters.
In some embodiments, certain aspects of the techniques described above may implemented by one or more processors of a processing system executing software. The software comprises one or more sets of executable instructions stored or otherwise tangibly embodied on a non-transitory computer readable storage medium. The software can include the instructions and certain data that, when executed by the one or more processors, manipulate the one or more processors to perform one or more aspects of the techniques described above. The non-transitory computer readable storage medium can include, for example, optical media (e.g., compact disc (CD), digital versatile disc (DVD), Blu-Ray disc), magnetic media (e.g., floppy disc, magnetic tape, or magnetic hard drive), volatile memory (e.g., random access memory (RAM) or cache), non-volatile memory (e.g., read-only memory (ROM) or Flash memory), or microelectromechanical systems (MEMS)-based storage media. The computer readable storage medium may be embedded in the computing system (e.g., system RAM or ROM), fixedly attached to the computing system (e.g., a magnetic hard drive), removably attached to the computing system (e.g., an optical disc or Universal Serial Bus (USB)-based Flash memory), or coupled to the computer system via a wired or wireless network (e.g., network accessible storage (NAS)). The executable instructions stored on the non-transitory computer readable storage medium may be in source code, assembly language code, object code, or other instruction format that is interpreted or otherwise executable by one or more processors.
Note that not all of the activities or elements described above in the general description are required, that a portion of a specific activity or device may not be required, and that one or more further activities may be performed, or elements included, in addition to those described. Still further, the order in which activities are listed are not necessarily the order in which they are performed. Also, the concepts have been described with reference to specific embodiments. However, one of ordinary skill in the art appreciates that various modifications and changes can be made without departing from the scope of the present disclosure as set forth in the claims below. Accordingly, the specification and figures are to be regarded in an illustrative rather than a restrictive sense, and all such modifications are intended to be included within the scope of the present disclosure.
Benefits, other advantages, and solutions to problems have been described above with regard to specific embodiments. However, the benefits, advantages, solutions to problems, and any feature(s) that may cause any benefit, advantage, or solution to occur or become more pronounced are not to be construed as a critical, required, or essential feature of any or all the claims. Moreover, the particular embodiments disclosed above are illustrative only, as the disclosed subject matter may be modified and practiced in different but equivalent manners apparent to those skilled in the art having the benefit of the teachings herein. No limitations are intended to the details of construction or design herein shown, other than as described in the claims below. It is therefore evident that the particular embodiments disclosed above may be altered or modified and all such variations are considered within the scope of the disclosed subject matter. Accordingly, the protection sought herein is as set forth in the claims below.