The present disclosure relates generally to wireless communication networks and, more particularly but not exclusively, to interference mitigation in wireless communication networks.
The continued growth of bandwidth-hungry applications, coupled with expectations by users that these applications should be accessible anywhere, has resulted in an exponential growth in the amount of traffic carried by wireless cellular networks, thereby straining the capacity of cellular wireless networks. While adding spectrum to the cellular wireless networks will certainly alleviate the capacity problems, this option is not always available to the wireless service providers. In the absence of availability of additional spectrum, wireless service providers typically turn to increasing the density of base stations of the cellular wireless networks, effectively splitting the cellular wireless networks into finer cells. This is often done by deploying metro cells within the coverage areas of the macro cells already deployed by the wireless service providers. If these metro cells are placed in locations where they can be accessed by a large number of users, they have the potential to help offload significant amounts of traffic from the overloaded macro cells, thereby alleviating the capacity problems. However, while the deployment of such metro cells has the potential to offload traffic from the overloaded macro cells, various deployment constraints associated with deploying such metro cells may limit the effectiveness of the metro cells in offloading traffic from the overloaded macro cells.
The present disclosure generally discloses use of dirty paper coding in a wireless network.
In at least some embodiments, an apparatus is provided. The apparatus includes a processor and a memory communicatively connected to the processor. The processor is configured to receive, by a first wireless access device from a wireless end device associated with the first wireless access device, feedback information including information indicative of channel estimate information for a channel between the wireless end device and the first wireless access device and information indicative of channel estimate information for a channel between the wireless end device and a second wireless access device. The processor is configured to receive, by the first wireless access device from the second wireless access device, information indicative of a transmit sequence to be transmitted by the second wireless access device using a set of wireless resources. The processor is configured to determine, by the first wireless access device using a dirty paper coding scheme and based on the feedback information and the information indicative of the transmit sequence to be transmitted by the second wireless access device, a transmit sequence for transmission by the first wireless access device toward the wireless end device using the set of wireless resources. The processor is configured to transmit the transmit sequence toward the wireless end device using the set of wireless resources.
In at least some embodiments, an apparatus is provided. The apparatus includes a processor and a memory communicatively connected to the processor. The processor is configured to determine, by a wireless end device connected to a first wireless access device, feedback information including information indicative of channel estimate information for a channel between the wireless end device and the first wireless access device and information indicative of channel estimate information for a channel between the wireless end device and a second wireless access device. The processor is configured to send the feedback information from the wireless end device toward the first wireless access device. The processor is configured to receive, by the wireless end device from the first wireless access device, a wireless receive sequence.
In at least some embodiments, an apparatus is provided. The apparatus includes a processor and a memory communicatively connected to the processor. The processor is configured to receive, at a first wireless access device from a second wireless access device, a request for information indicative of a transmit sequence to be transmitted by the first wireless access device using a set of wireless resources. The processor is configured to send, from the first wireless access device toward the second wireless access device, a response including the information indicative of the transmit sequence to be transmitted by the first wireless access device using the set of wireless resources.
The teachings herein can be readily understood by considering the following detailed description in conjunction with the accompanying drawings, in which:
To facilitate understanding, identical reference numerals have been used, where possible, to designate identical elements that are common to the figures.
The present disclosure generally discloses an interference mitigation capability. The present disclosure discloses use of dirty paper coding in a wireless communication network in order to mitigate interference in the wireless communication network. The wireless communication network may be a heterogeneous wireless communication network, where heterogeneity may be based on wireless access device technology type, wireless access device transmit power, or the like. For example, the wireless communication network may be a heterogeneous wireless communication network including a first type of wireless access device (e.g., a small cell device, such as a metro cell, microcell, picocell, femtocell, or the like) and a second type of wireless access device (e.g., a large cell device, such as a macro cell), where the first type of wireless access device is configured to use dirty paper coding to mitigate interference from the second type of wireless access device. These and various other embodiments and advantages of the interference mitigation capability may be further understood by way of reference to the exemplary heterogeneous wireless communication system of
The heterogeneous wireless communication system 100 may be based on any suitable wireless communications technologies. The heterogeneous wireless communication system 100 may include a primary communications system or capability and a secondary communications system or capability (e.g., to increase coverage, improve service, or the like). The primary and secondary communication systems or capabilities may be based on different wireless technologies or may be based on a common wireless technology. For example, the primary communications system or capability may be a cellular-based communication system, such as a Third Generation (3G) Universal Mobile for Telecommunications System (UMTS) wireless communications system, a Fourth Generation (4G) Long Term Evolution (LTE) wireless communications system, a Fifth Generation (5G) wireless communications system, or the like, as well as various combinations thereof. For example, the secondary communications system or capability may be based on various types of wireless communications technologies, such as small cell wireless communications technologies or the like. It is noted that the heterogeneous wireless communication system 100 may be based on other types of wireless communications technologies. It is further noted that the heterogeneity of heterogeneous wireless communication system 100 may be based on one or more of wireless access device technology type, wireless access device transmit power, or the like, as well as various combinations thereof.
The heterogeneous wireless communication system 100 includes a set of wireless access devices (WADs) 110 and a wireless end device (WED) 120.
The WADs 110 are wireless access devices configured to operate as points of wireless access for wireless end devices (illustratively, WED 120). The WADs include two WADs 110-L1 and 110-L2 (collectively, WADs 110-L) of a first WAD type and a WAD 110-S of a second WAD type. The WADs 110-L of the first WAD type may be large cell wireless access devices (e.g., macro cells). The WAD 110-S of the second WAD type may be a small cell wireless access device (e.g., a metro cell, a microcell, a picocell, a femtocell, or the like). The WADs 110 may be deployed at various geographic locations with respect to each other. It will be appreciated that the set of WADs 110 may include fewer or more WADs 110 (including fewer or more WAD 110-Ls or fewer or more WAD 110-Ss), that the WADs 110 may be arranged in various other arrangements with respect to each other, or the like, as well as various combinations thereof. The typical operation of wireless access devices in supporting wireless communications of wireless end devices will be understood.
The WED 120 may be any suitable type of wireless device which may communicate wirelessly via WADs 110. The WED 120 may be configured to attach to one of the WADs 110 for wireless communication via that WAD 110. The WED 120 may be configured to receive information from a WAD 110 via a wireless downlink (DL) and to transmit information to a WAD 110 via a wireless uplink (UL). It will be appreciated the DL and UL may include various wireless resources configured to support communications of WED 120 and other WEDs (omitted for purposes of clarity), where the manner in which such wireless resources are defined and arranged may vary for different types of wireless communication networks (e.g., 4G LTE, 5G, or the like). The WED 120 may be a fixed wireless device or a mobile wireless device. For example, WED 120 may be a wireless end device of a user (e.g., a smartphone, a tablet, a laptop computer, or the like), a wireless end device supporting automated communications (e.g., a wireless machine-type-communication (MTC) device, an Internet-of-Things (IoT) device, or the like), or the like. The typical operation of wireless end devices in communicating via wireless access devices will be understood.
The WADs 110 and WED 120 may be configured to cooperate to support use of dirty paper coding techniques to mitigate interference within heterogeneous wireless communication system 100.
The WAD 110-S includes a DPC interference mitigation element 111-S. The DPC interference mitigation element 111-S (and, thus, WAD 110-S) is configured to mitigate interference from one or more of the WADs 110-L when communicating with the WED 120.
The DPC interference mitigation element 111-S may be configured to determine, for the WED 120, whether or not to apply DPC in order to mitigate interference from one or more of WADs 110-L when communicating with WED 120. The DPC interference mitigation element 111-S may be configured to determine whether or not to apply DPC when communicating with the WED 120 based on interference indicative information that is indicative as to the amount of interference that is experienced at WED 120 from the WADs 110-L. The DPC interference mitigation element 111-S may receive the interference indicative information for the WADs 110-L from the WED 120. The WED 120 may determine the interference indicative information of the WADs 110-L1 and 110-L2 based on processing of reference signals (RSs) received from the WADs 110-L1 and 110-L2, respectively. The WED 120 may determine and report the interference indicative information of the WADs 110-L in the form of one or more of Reference Signal Received Power (RSRP) values, Reference Signal Strength Indicator (RSSI) values, Reference Signal Received Quality (RSRQ) values, or the like. The DPC interference mitigation element 111-S may receive the interference indicative information for the WADs 110-L from the WED 120 and determine, for each of the WADs 110-L, whether or not interference of the respective WAD 110-L is to be mitigated based on DPC. The DPC interference mitigation element 111-S may determine, for a given WAD 110-L based on the interference indicative information for the given WAD 110-L, whether or not interference of the given WAD 110-L is to be mitigated based on DPC based on a determination as to whether interference experienced by the WED 120 from the given WAD 110-L is above a threshold. For example, for a given interference threshold, if interference experienced by the WED 120 from the WAD 110-L1 is above the threshold and interference experienced by the WED 120 from the WAD 110-L2 also is above the threshold, then DPC interference mitigation element 111-S may apply DPC for mitigation of the interference from WAD 110-L1 and WAD 110-L2 when transmitting to WED 120. Similarly, for example, for a given interference threshold, if interference experienced by the WED 120 from the WAD 110-L1 is above the threshold and interference experienced by the WED 120 from the WAD 110-L2 is below the threshold, then DPC interference mitigation element 111-S may only apply DPC for mitigation of the interference from WAD 110-L1 when transmitting to WED 120. Similarly, for example, for a given interference threshold, if interference experienced by the WED 120 from the WAD 110-L2 is below the threshold and interference experienced by the WED 120 from the WAD 110-L2 also is below the threshold, then DPC interference mitigation element 111-S may determine that DPC does not need to be applied when transmitting to WED 120. The DPC interference mitigation element 111-S may be configured to dynamically activate and deactivate use of DPC, over various time scales (e.g., per resource block, per subframe, per frame, or the like) as the interference from the WADs 110-L1 and 110-L2 changes (e.g., as the interference indicative information that is determined and reported by the WED 120 for the WADs 110-L1 and 110-L2 changes). It is noted that the DPC interference mitigation element 111-S also may be configured to determine whether or not interference of a given WAD 110-L is to be mitigated for the WED 120 based on DPC based on other information available to DPC interference mitigation element 111-S, such as whether or not the given WAD 110-L is scheduled to transmit when the WAD 110-S transmits to the WED 120 (e.g., even though the interference measured by the WED 120 for the given WAD 110-L is above an interference threshold, the DPC interference mitigation element 111-S may determine that mitigation of this interference of the given WAD 110-L is not necessary since the given WAD 110-L is not scheduled to transmit when the WAD 110-S transmits to the WED 120). The operation of the DPC interference mitigation element 111-S of the WAD 110-S in determining, for the WED 120, whether or not to apply DPC in order to mitigate interference from one or more of WADs 110-L when communicating with WED 120 may be further understood by way of reference to the DPC elements of
The DPC interference mitigation element 111-S is configured to mitigate interference from the one or more of the WADs 110-L based on use of DPC, which may be further understood by way of reference to
The WADs 110-L1 and 110-L2 include DPC support elements 112-L1 and 112-L2 (collectively, DPC support elements 112-L), respectively. The DPC support elements 112-L1 and 112-L2 of the WADs 110-L1 and L2 are configured to provide the DPC interference mitigation element 111-S of the WAD 110-S with information for use in mitigating interference from WADs 110-L1 and 110-L2, respectively, based on DPC. The operation of the DPC support elements 112-L1 and 112-L2 of the WADs 110-L1 and L2 may be further understood by way of reference to the DPC elements of
The WED 120 includes a DPC support element 122. The DPC support element 122 of the WED 120 is configured to provide the DPC interference mitigation element 111-S of the WAD 110-S with information for use in mitigating interference from one or more of the WADs 110-L based on DPC. The operation of the DPC support element 122 of the WED 120 may be further understood by way of reference to the DPC elements of
In general, implementing DPC involves imposing an order—specifically, the wireless access devices whose interference is sought to be mitigated construct their transmit sequences first and, only after these transmit sequences have been determined, does the wireless access device that is implementing DPC determine its own transmit sequence. As a result, users associated with the latter (i.e., the wireless access device that is implementing DPC) benefit from interference reduction while users associated with the former (i.e., wireless access devices that determine their transmit sequences first) do not benefit from interference reduction. It will be appreciated that such an order, and its associated consequences, are well-suited for the natural hierarchy of a co-channel heterogeneous wireless network where the major problem is the interference caused by large cell devices to small cell devices whereas the small cell devices do not cause much interference to the users of the large cell devices or to the users of other small cell devices unless deployed in extremely dense patterns. In view of the foregoing, in at least some embodiments, small cell devices may be configured to use DPC (e.g., THP-PIP DPC) in order to mitigate the interference experienced by their users from nearby large cell devices. In at least some embodiments, at least some small cell devices use DPC to mitigate the interference that their users experience from the K strongest large cell devices, whereas the large cell devices communicate with their users without using DPC. The use of DPC in this manner may be further understood by considering the example of
In the example of
In the example of
At block 501, method 500 begins.
At block 510, the small cell wireless access device receives, from a wireless end device associated with the small cell wireless access device, feedback information. The feedback information includes information indicative of channel estimate information for a channel between the wireless end device and the small cell wireless access device and information indicative of channel estimate information for a channel between the wireless end device and the large cell wireless access device. The information indicative of the channel estimate information for a channel may include (1) the channel estimate information itself (i.e., the products w0†h0 and w0†h1) or (2) the estimated channel information (i.e., h0 and h1) and the filter vector w0 such that the channel estimate information (again, the products w0†h0 and w0†h1) may be computed. The feedback information also includes a strength of the sum of noise and uncancelled interference at the wireless end device. The feedback information may include other types of information.
At block 520, the small cell wireless access device receives, from the large cell wireless access device, information indicative of a transmit sequence to be transmitted by the large cell wireless access device using a set of wireless resources. The information indicative of a transmit sequence to be transmitted by the large cell wireless access device using a set of wireless resources may include (1) the transmit sequence itself (i.e., the symbol(s) to be transmitted by the large cell wireless access device or (2) information which may be used to construct the transmit sequence (e.g., receiving the raw information bits to be transmitted and receiving information about the MCS to be applied by the wireless access devices to transmit the raw information bits).
At block 530, the small cell wireless access device determines, using a dirty paper coding scheme and based on the feedback information and the information indicative of the transmit sequence to be transmitted by the large cell wireless access device, a transmit sequence for transmission by the small cell wireless access device toward the wireless end device using the set of wireless resources.
At block 540, the small cell wireless access device transmits the transmit sequence toward the wireless end device using the set of wireless resources.
At block 599, method 500 ends.
At block 601, method 600 begins.
At block 610, the wireless end device determines feedback information including information indicative of channel estimate information for a channel between the wireless end device and the small cell wireless access device, information indicative of channel estimate information for a channel between the wireless end device and the large cell wireless access device, and a strength of the sum of noise and uncancelled interference at the wireless end device.
At block 620, the wireless end device sends the feedback information from the wireless end device toward the small cell wireless access device.
At block 630, the wireless end device receives a receive sequence from the small cell wireless access device via a set of wireless resources. The wireless receive sequence includes (1) a transmit sequence determined by the small cell wireless access device (using a dirty paper coding scheme based on the feedback information) and transmitted by the small cell wireless access device using the set of wireless resources, (2) interference (including uncancelled interference), and (3) noise.
At step 640, the wireless end device decodes the wireless receive sequence. The wireless end device decodes the wireless receive sequence to extract the information bits transmitted by the small cell wireless access device using the set of wireless resources. The wireless end device may then handle the information bits, extracted based on decoding of the wireless receive sequence, in various ways (e.g., storing the information bits, further propagating the information bits, processing the information bits, or the like, as well as various combinations thereof).
At block 699, method 600 ends.
At block 701, method 700 begins.
At block 710, the large cell wireless access device receives, from the small cell wireless access device, a request for information indicative of a transmit sequence to be transmitted by the large cell wireless access device using a set of wireless resources.
At block 720, the large cell wireless access device sends, toward the small cell wireless access device, a response including the information indicative of the transmit sequence to be transmitted by the large cell wireless access device using the set of wireless resources.
At block 799, method 700 ends.
It is noted that DPC, while it may be applied in various contexts, is particularly well-suited for use within the context of a heterogeneous wireless network including large cell devices (e.g., macro cells) and small cell devices (e.g., metro cells). First, as indicated above, it may be applied to address major interference issues in co-channel heterogeneous wireless networks. However, it is also useful within this context for other reasons. For example, use of DPC within this context is based on the metro cells receiving channel estimates from the wireless user devices that they are serving, a process that involves some delays. In a dynamic environment, channels typically vary rapidly, which means that delays in reporting channel estimates can introduce significant errors in the channel estimates. However, metro cell users are typically static or exhibit low mobility, which means that their channels vary relatively slowly with time. As a result, even if there is a delay of a few milliseconds in reporting channel estimates, the channel estimates are likely to be quite accurate, thus making for a more effective DPC implementation.
Various embodiments of the dirty paper coding capabilities may provide various advantages or potential advantages. For example, various embodiments of the dirty paper coding capabilities may enable use of DPC in order to allow metro cells to mitigate most or all of the interference from macro cells without causing the macro cells to suffer loss of capacity. Various embodiments of the dirty paper coding capabilities may provide various other advantages or potential advantages.
The computer 800 includes a processor 802 (e.g., a central processing unit (CPU), a processor having a set of processor cores, a processor core of a processor, or the like) and a memory 804 (e.g., a random access memory (RAM), a read only memory (ROM), or the like). The processor 802 and the memory 804 are communicatively connected.
The computer 800 also may include a cooperating element 805. The cooperating element 805 may be a hardware device. The cooperating element 805 may be a process that can be loaded into the memory 804 and executed by the processor 802 to implement functions as discussed herein (in which case, for example, the cooperating element 805 (including associated data structures) can be stored on a non-transitory computer-readable storage medium, such as a storage device or other storage element (e.g., a magnetic drive, an optical drive, or the like)).
The computer 800 also may include one or more input/output devices 806. The input/output devices 806 may include one or more of a user input device (e.g., a keyboard, a keypad, a mouse, a microphone, a camera, or the like), a user output device (e.g., a display, a speaker, or the like), one or more network communication devices or elements (e.g., an input port, an output port, a receiver, a transmitter, a transceiver, or the like), one or more storage devices (e.g., a tape drive, a floppy drive, a hard disk drive, a compact disk drive, or the like), or the like, as well as various combinations thereof.
It will be appreciated that computer 800 of
It will be appreciated that at least some of the functions depicted and described herein may be implemented in software (e.g., via implementation of software on one or more processors, for executing on a general purpose computer (e.g., via execution by one or more processors) so as to provide a special purpose computer, and the like) and/or may be implemented in hardware (e.g., using a general purpose computer, one or more application specific integrated circuits (ASIC), and/or any other hardware equivalents).
It will be appreciated that at least some of the functions discussed herein as software methods may be implemented within hardware, for example, as circuitry that cooperates with the processor to perform various functions. Portions of the functions/elements described herein may be implemented as a computer program product wherein computer instructions, when processed by a computer, adapt the operation of the computer such that the methods and/or techniques described herein are invoked or otherwise provided. Instructions for invoking the various methods may be stored in fixed or removable media (e.g., non-transitory computer-readable media), transmitted via a data stream in a broadcast or other signal bearing medium, and/or stored within a memory within a computing device operating according to the instructions.
It will be appreciated that the term “or” as used herein refers to a non-exclusive “or” unless otherwise indicated (e.g., use of “or else” or “or in the alternative”).
It will be appreciated that, although various embodiments which incorporate the teachings presented herein have been shown and described in detail herein, those skilled in the art can readily devise many other varied embodiments that still incorporate these teachings.