1. Field
Embodiments of the invention generally relate to communication networks, such as wireless networks. More specifically, embodiments may relate to interference cancelation in wireless networks.
2. Description of the Related Art
Considerable research and development in wireless communications has been dedicated to cognitive radio and the coexistence of different wireless communications technologies. In these types of systems, a given frequency band may be shared between different wireless technologies. This sharing of frequency bands can result in interference among the different wireless technologies, or can even result in one system blocking the other. In order to enhance the spectrum usage, some coexistence strategy may be required so that different technologies are able to use the resources in an efficient manner.
Coexistence strategies are usually defined as cooperative or non-cooperative. The cooperative strategies often include some type of agreement between the systems in order to get a fair spectrum share. Cooperative strategies often result in one system giving away some of its resources to the other. As a result, the application of cooperative strategies may not result in benefits to the system that is mostly giving away its resources. On the other hand, non-cooperative strategies can be implemented without the consideration of one system sharing its resources with the other. Although non-cooperative technologies may result in smaller overhead and typically cheaper implementation, they will usually be less efficient than the cooperative strategies.
One embodiment is directed to a method for interference cancelation. The method may include forming, by a wireless system, a signal structure to match a structure of an interfering signal with repetitive time structure. The method may further include using the formed signal structure to eliminate interference caused by the interfering signal. The signal structure includes parts that are synchronized with repeated parts of the interfering signal structure to cancel a repetition of the interference, and the signal structure further comprises another part synchronized with non-repeated parts of the interfering signal.
Another embodiment is directed to an apparatus. The apparatus includes at least one processor and at least one memory comprising computer program code. The at least one memory and the computer program code configured, with the at least one processor, to cause the apparatus at least to form a signal structure in a wireless system to match a structure of an interfering signal with repetitive time structure, and to use the formed signal structure to eliminate interference caused by the interfering signal. The signal structure includes parts that are synchronized with repeated parts of the interfering signal structure to cancel a repetition of the interference, and the signal structure further comprises another part synchronized with non-repeated parts of the interfering signal.
Another embodiment is directed to a computer program, embodied on a computer readable medium, wherein the computer program is configured to control a processor to perform a process. The process includes forming a signal structure in a wireless system to match a structure of an interfering signal with repetitive time structure, and using the formed signal structure to eliminate interference caused by the interfering signal. The signal structure includes parts that are synchronized with repeated parts of the interfering signal structure to cancel a repetition of the interference, and the signal structure further comprises another part synchronized with non-repeated parts of the interfering signal.
For proper understanding of the invention, reference should be made to the accompanying drawings, wherein:
a illustrates an example of the time structure of an OFDM signal, according to an embodiment;
b illustrates an example of a cyclic prefix based opportunistic signal, according to one embodiment;
a illustrates resulting throughput achieved according to certain embodiments;
b illustrates throughput gain achieved according to certain embodiments;
a illustrates an example of Shannon capacity analysis in interference conditions for certain embodiments;
b illustrates an example of Shannon capacity gain analysis in interference conditions for certain embodiments;
c illustrates an example of Shannon capacity gain analysis in interference conditions for certain embodiments;
It will be readily understood that the components of the invention, as generally described and illustrated in the figures herein, may be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of a system, a method, an apparatus, and a computer program product for interference cancelation, as represented in the attached figures, is not intended to limit the scope of the invention, but is merely representative of selected embodiments of the invention.
If desired, the different functions discussed below may be performed in a different order and/or concurrently with each other. Furthermore, if desired, one or more of the described functions may be optional or may be combined. As such, the following description should be considered as merely illustrative of the principles, teachings and embodiments of this invention, and not in limitation thereof.
One embodiment provides a non-cooperative coexistence strategy, based on exploring the OFDM symbols structure for interference cancelation purposes.
Uncoordinated spectrum sharing is a difficult task when technologies have different access schemes. As an example, if LTE and WiFi are deployed in the same spectrum and location, WiFi senses that the channel is busy due to a LTE transmission for most of the time, and, consequently, WiFi is blocked most of the time. On the other hand, if WiFi loosens its Carrier sense multiple access with collision avoidance (CSMA/CA) thresholds, the high interference caused by LTE could increase significantly the packet error rate of WiFi. Hence, it is highly desirable to obtain effective interference cancelation techniques that enable coexistence between different systems or technologies.
It should be noted that, while embodiments described herein use LTE and WiFi as examples of wireless technologies to which embodiments can be applied, embodiments of the invention are not limited to these example technologies. For example, embodiments may be applicable to wireless networks including, but not limited to, radio access networks such as the Universal Mobile Telecommunications System (UMTS) Terrestrial Radio Access Network (UTRAN) Long Term Evolution (LTE) and Evolved UTRAN (E-UTRAN) or LTE-A, High Speed Packet Access (HSPA) and HSPA+, wireless local area networks (WLAN) such as WiFi, and WiMAX, or any other legacy, current, or future wireless technology.
Certain embodiments provide a solution for interference cancelation, for example, when different technologies use the same spectrum band. In one embodiment, a non-cooperative interference cancelation transmit/receive scheme is provided, where the structure of orthogonal frequency-division multiplexing (OFDM) signals is considered. OFDM signals have a predefined symbols structure that may be used for interference cancelation.
An objective of the transmit/receive scheme, according to one embodiment, is the transmission of data in an extreme non-cooperative interference condition where one technology would take over the channel while the other is completely blocked by interference. Additionally, certain embodiments may also be used in situations where simultaneous transmissions of two technologies are desirable.
Certain embodiments provide for the design of a signal structure that matches the structure of an OFDM symbol, as illustrated in
x1=k1,1s1+k1,2s2 Equation 1
x3=k3,1s1+k3,2s2 Equation 2
where s1 and s2 are two data signals, and kn,m represents the mapping of data signal sm into the transmitted signal xn. The data signals sm may include OFDM symbols, or any other type of modulated signal with a symbol length smaller than the length of the cyclic prefix of the interfering technology.
Since embodiments take into consideration the cyclic prefix redundancy, some embodiments may be referred to as cyclic prefix based opportunistic transmission/reception (CPoTx). However, other naming conventions can be used according to other embodiments.
One implementation for Equation 1 and Equation 2 includes ignoring the second data signal s2, and making k1,1=1 and k1,2=−1 in Equation 1 and Equation 2, which yields:
x1=−x3=s Equation 3
Once the result of Equation 3 is applied, the received signals y1 and y3 are obtained as:
y1=h*x1+g*B+n1=h*s+g*B+n1 Equation 4
y3=h*x3+g*B+n2=−h*s+g*B+n2 Equation 5
where h and g represent the channel impulse response for the signal s and B, respectively, n represents the noise, and the symbol “*” represents the time domain convolution. Given the received signals at Equation 4 and Equation 5, the effect of the interference over s and B can be removed by performing:
where rs is the received signal after canceling the interference B, and rb is the received signal after canceling s.] The result of Equation 6 shows that the interference of the cyclic prefix can be completely canceled at the receiver when choosing the transmission scheme of Equation 3. In other words, according to an embodiment, the cyclic prefix repetition of the interfering signal can be completely removed in the received signal. In the example of Equation 7, the term g*B of the LTE interference is completely removed since B is repeated twice and g is the same for both repetitions. Thus, certain embodiments provide a solution which can be used in extreme interference conditions with high interference level. In this embodiment, an interference with large power has known OFDM structure, with a symbol length which is larger than the symbol length of a second technology. Given this knowledge, certain embodiments are able to transmit a repeated version of the desired signal with opposite phase at the repeated version of the cyclic prefix, which enables perfect elimination of the interference as in Equation 6. As an additional advantage of the implementation of Equation 3, perfect elimination of the interference in the cyclic prefix of the interferer for estimation of B is enabled by Equation 7. This is an important result, since both technologies would have the means for interference cancelation once the structure of
In another embodiment, one additional implementation of Equation 1 and Equation 2 is possible without repetition of the message, as:
x3=−s Equation 8
x1=0 Equation 9
In this embodiment, the data message is only transmitted at the repeated cyclic prefix. The received signal is the same as in Equation 5, and the interference over s can be removed as:
rs=y1−y3≈h*s+n1−n3 Equation 10
This embodiment yields smaller power consumption, since there is no repetition of the data message. However, this embodiment assumes that no other source of interference is present at the cyclic prefix, and any other source of interference will be included at the noise terms. Secondly, the 3 dB SNR gain will not be observed in this embodiment, since there is no averaging operation for estimating s.
According to one embodiment, both the transmitter and the receiver may be synchronized with the interfering technology. In an embodiment, this can be done using autocorrelation methods, or using the synchronization signals of the interfering technology. As an exemplary implementation, if the interferer technology is LTE, for example, the primary synchronization signal (PSS) and secondary synchronization signal symbol (SSS) can be used for synchronization. If the interference is from another technology, technology-specific synchronization signals can be used, or a simpler estimation of the beginning of symbol times can be obtained using autocorrelation metrics. Secondly, the transmitter can build the transmitted signal as in
Changes at the medium access control (MAC) layer of both the transmitter and the receiver are also necessary. For instance, the receiver may need to be made aware of the use of CPoTx transmitting structure, and this indication can be implemented with special signaling between the transmitter and receiver. Examples of possible implementations of such signaling for WiFi include the access point (AP) notifying the stations (STAs) at network subscription and authentication stages, or using special Information Element (IE) fields at regular MAC protocol data unit (MPDU) headers. Additionally, if a WiFi network uses this technique, its AP may have a special field in its beacon indicating that this feature is enabled.
As an example of implementation for WiFi, when an AP detects it is blocked by LTE it can switch to an operation mode where it only transmits or receives MPDUs using CPoTx as the transmission structure, which includes Beacon transmission and regular MPDUs. Also, as part of this exemplary implementation, the AP might define that when CPoTx is used then all resource allocations are scheduled by the AP, which for that might use polling techniques like 802.11n power-save multi-poll (PSMP) for implementing such centralized scheduling. This exemplary implementation allows the AP to better utilize the scarce resources while coexisting with another technology.
Additionally, the receiver may need to combine the repetitions of the signal. This can be implemented using a comb filter that implements Equation 6, as illustrated in the example of
According to certain embodiments, one advantage is to guarantee a minimum throughput in extreme interference scenarios. One example of such a scenario is in which a WiFi (i.e., IEEE 802.11 standard) network coexists with an LTE network. In this example, the LTE network will block the WiFi network for most of the time. It has been shown that, in this scenario, the WiFi network usually remains in contention mode for at least 90% of the time and is nearly never able to access the channel, resulting in a decrease in WiFi user throughput of between 50% and 100% depending on the network scenario. However, when embodiments of the invention are applied, the WiFi network would be able to have additional channel access time
The performance of certain embodiments can be analyzed as discussed in the following. The maximum throughput of the CPoTx protected period is calculated as throughput when no interference is present, multiplied by an scaling factor βCPoTx given by:
where TCPoTx is the useful time inside the cyclic prefix of the interferer where the CPoTx signal can be transmitted, and TINTERF is the interference symbol length. It is noted that TCPoTx is bounded by the length of the cyclic prefix of the interference TCPoTx≦TCP, and will usually be an integer multiple of the symbol length of the transmitting technology.
The simulations presented below are based on the scenario where an IEEE 802.11ac network coexists with a LTE network. Although the results are shown for this case, they could be easily generalized for coexistence with other technologies and are, therefore not limited to this example. In this simulation scenario, a 20 MHz LTE interferer using long cyclic prefix interferes in a WiFi network with 4 μs symbol length. Since the LTE interferer has 16.67 μs cyclic prefix length, four WiFi symbols are transmitted at each cyclic prefix period. This results in 16 μs being used by WiFi for transmission of CPoTx signals, yielding a throughput factor βCPoTx=0.19.
The interference cancelation results are illustrated as average power over 2000 iterations in
One additional conclusion can be taken from
The throughput gain of the CPoTx method, according to certain embodiments, is illustrated in
The “CP transmission” throughput results of
It should be also noted that the example results illustrated in
where ρ is the noise power with SNR=−10 log10(ρ), Pi is the interference power, and BW is the bandwidth. The capacity of Equation 12 is determined considering that the interference has the same effect as the noise in the channel capacity. Additionally, the noise and interference power are related by the interference to noise ratio (INR), INR=10 log10(Pi/ρ). On the other hand, the capacity when using the CPoTx may be calculated as:
It is noted that the SNR term in Shannon's formula is increased by two and the interference term Pi is zero, since the CPoTx filter of Equation 6 decreases the noise power by 3 dB. However, the capacity using the CPoTx is never larger than the capacity in Additive white Gaussian noise (AWGN) channel with Pi=0, since the factor βCPoTx is always smaller than 0.5. In an embodiment, βCPoTx is the throughput scaling factor, for example, used to obtain the CPoTx throughput when the throughput without CPoTx is available.
The results in the example of
The theoretical gains for LTE's short CP length are illustrated in
In an embodiment, apparatus 10 may further include a memory 14, coupled to processor 22, for storing information and instructions that may be executed by processor 22. Memory 14 may be one or more memories and of any type suitable to the local application environment, and may be implemented using any suitable volatile or nonvolatile data storage technology such as a semiconductor-based memory device, a magnetic memory device and system, an optical memory device and system, fixed memory, and removable memory. For example, memory 14 can be comprised of any combination of random access memory (“RAM”), read only memory (“ROM”), static storage such as a magnetic or optical disk, or any other type of non-transitory machine or computer readable media. The instructions stored in memory 14 may include program instructions or computer program code that, when executed by processor 22, enable the apparatus 10 to perform tasks as described herein.
Apparatus 10 may also include one or more antennas (not shown) for transmitting and receiving signals and/or data to and from apparatus 10. Apparatus 10 may further include a transceiver 28 that modulates information on to a carrier waveform for transmission by the antenna(s) and demodulates information received via the antenna(s) for further processing by other elements of apparatus 10. In other embodiments, transceiver 28 may be capable of transmitting and receiving signals or data directly. According to one embodiment, apparatus 10 may include an OFDM transmitter structure for cyclic prefix based opportunistic transmission, as illustrated in
According to an embodiment, processor 22 may perform functions associated with the operation of apparatus 10 including, without limitation, precoding of antenna gain/phase parameters, encoding and decoding of individual bits forming a communication message, formatting of information, and overall control of the apparatus 10, including processes related to management of communication resources.
In an embodiment, memory 14 stores software modules that provide functionality when executed by processor 22. The modules may include an operating system 15 that provides operating system functionality for apparatus 10. The memory may also store one or more functional modules 18, such as an application or program, to provide additional functionality for apparatus 10. The components of apparatus 10 may be implemented in hardware, or as any suitable combination of hardware and software.
According to certain embodiments, processor 22 and/or memory 14 may cause apparatus 10 to form a signal structure to match a structure of an orthogonal frequency-division multiplexing (OFDM) symbol of another wireless system, and to use the formed signal structure to completely eliminate interference caused by the OFDM symbol. For example, apparatus 10 may be caused to transmit the formed signal structure to cancel the interference caused by the OFDM symbol. As outlined above, the signal structure may include a first part (i.e., x1) synchronized to cancel a cyclic prefix of the OFDM symbol and a third part (i.e., x3) synchronized to cancel a repetition of the cyclic prefix of the OFDM symbol, and the signal structure may further include a second part (i.e., x2) synchronized with a remainder of the OFDM signal. Apparatus 10 may be configured to form and apply the signal structure as discussed above in connection with Equations 1-13 and
In some embodiments, the functionality of any of the methods described herein may be implemented by software stored in memory or other computer readable or tangible media, and executed by a processor. In other embodiments, the functionality may be performed by hardware, for example through the use of an application specific integrated circuit (ASIC), a programmable gate array (PGA), a field programmable gate array (FPGA), or any other combination of hardware and software.
The computer readable media mentioned above may be at least partially embodied by a transmission line, a compact disk, digital-video disk, a magnetic disk, holographic disk or tape, flash memory, magnetoresistive memory, integrated circuits, or any other digital processing apparatus memory device.
The described features, advantages, and characteristics of the invention may be combined in any suitable manner in one or more embodiments. One skilled in the relevant art will recognize that the invention may be practiced without one or more of the specific features or advantages of a particular embodiment. In other instances, additional features and advantages may be recognized in certain embodiments that may not be present in all embodiments of the invention.
Further, One having ordinary skill in the art will readily understand that the invention as discussed above may be practiced with steps in a different order, and/or with hardware elements in configurations which are different than those which are disclosed. Therefore, although the invention has been described based upon these preferred embodiments, it would be apparent to those of skill in the art that certain modifications, variations, and alternative constructions would be apparent, while remaining within the spirit and scope of the invention. In order to determine the metes and bounds of the invention, therefore, reference should be made to the appended claims.
Number | Name | Date | Kind |
---|---|---|---|
3757235 | McCormick et al. | Sep 1973 | A |
4470138 | Gutleber | Sep 1984 | A |
5732113 | Schmidl et al. | Mar 1998 | A |
6298035 | Heiskala | Oct 2001 | B1 |
6693984 | Andre | Feb 2004 | B1 |
8055234 | Mattisson et al. | Nov 2011 | B2 |
20100091789 | Choi et al. | Apr 2010 | A1 |
20100284298 | Xia et al. | Nov 2010 | A1 |
20120106364 | Kasslin et al. | May 2012 | A1 |
20120108179 | Kasslin et al. | May 2012 | A1 |
20130128807 | Vermani et al. | May 2013 | A1 |
20140315501 | Rudell et al. | Oct 2014 | A1 |
Number | Date | Country |
---|---|---|
WO 2012056091 | May 2012 | WO |
2014051606 | Apr 2014 | WO |
2014064322 | May 2014 | WO |
Entry |
---|
Andrews, J.G. , “Interference cancellation for cellular systems: a contemporary overview”, IEEE Wireless Communications, vol. 12, issue 2, Apr. 2005, pp. 19-29. |
Mahmoud, H., “OFDM for cognitive radio: merits and challenges”, IEEE Wireless Communications, vol. 16, issue 2, Apr. 2009, pp. 6-14. |
Popovski, P., et al., “Opportunistic Interference Cancellation in Cognitive Radio Systems”, DySPAN 2007, pp. 472-475. |
Maham, B., et al., “Opportunistic interference cancelation and user selection in cognitive multiple access network”, IEEE 13th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), 2012, pp. 174-178. |
Agus Santoso, Yang Tang, Branka Vucetic, Abbas Jamalipour; and Yonghui Li, “Interference Cancellation in Coexisting Wireless Local Area Networks”, ICCS 2006, 6 pages. |
Cumanan, K. , et al., “Joint Beamforming and User Maximization Techniques for Cognitive Radio Networks Based on Branch and Bound Method”, IEEE Trans. on Wireless Communications, vol. 9, Issue: 10, Oct. 2010, pp. 3082-3092. |
Villardi, G.P. et al., “Enabling coexistence of multiple cognitive networks in TV white space”, IEEE Wireless Communications, pp. 32-40, Aug. 2011. |
A. Cavalcante, et al. “Performance Evaluation of LTE and Wi-Fi coexistence in unlicensed bands”, VTC Spring 2013, Dresden, Germany (paper accepted for publication), 6 pages. |
Hendra Setiawan, Masayuki Kurosaki, Hiroshi Ochi, “LTE Physical Layer Identity Detection: Frequency vs Time Domain Schemes”, Proc. IEEE ICC 2011, 5 pages. |
Zhongshan Zhang, Jian Liu, and Keping Long, “Low-Complexity Cell Search With Fast PSS Identification in LTE”, IEEE Transactions on Vehicular Technology, vol. 61, No. 4, May 2012, pp. 1719-1729. |
Xiumei Yang, Yong Xiong, Guoqing Jia, Weidong Fang, Xiaoying Zheng, “PSS Based Time Synchronization for 3GPP LTE Downlink Receivers”, Proc. IEEE ICCT 2011, pp. 930-933. |
Eldad Perahia et al., “Next Generation Wireless LANs: Throughput, Robustness, and Reliability in 802.11n” Cambridge Univeristy Press 2008 (Complete Hard Copy of book enclosed). |
Wen Xu, Konstantinos Manolakis “Robust Synchronization for 3GPP LTE System” Proc. IEEE Globecom 2010 (pp. 1-5). |
Number | Date | Country | |
---|---|---|---|
20140301282 A1 | Oct 2014 | US |