The present disclosure relates to wireless communications. In particular, the present disclosure relates to systems and methods using two-way (full-duplex) wireless links.
A communication link (e.g. between node A and node B) with the capability to support the connection in both directions at the same time is called full-duplex, or two-way. In contrast, a link that can support the connection in only one direction at a time is called one-way or half-duplex.
Current wireless systems are one-way and rely on either separate time slots (Time Division Duplex, TDD) or separate frequency bands (Frequency Division Duplex, FDD) to transmit and to receive. These alternatives have their relative pros and cons, but both suffer from lack of ability to transmit and to receive simultaneously and over the entire frequency band. Full-duplex capability is particularly useful when several wireless nodes share a frequency band, as it helps in managing the impact of multi-user interference, maximizing spectral efficiency, and improving network quality of service.
Point-to-point communications primarily concerns transmission between a single transmitter and a single receiver, while networking concerns scenarios where more than two users share the channel. The impact of full-duplex links in point-to-point communications is limited to doubling the rate by providing two symmetrical pipes of data flowing in opposite directions. This affects the point-to-point throughput with no direct impact on networking. In contrast, in multi-user wireless systems, due to the nature of transmission that everyone hears everyone else, full-duplex capability provides new ways to facilitate sharing of a common spectrum.
A basic feature of wireless transmission is that the transmission media is shared among all users and everyone hears everyone else. This feature can cause harmful effects in terms of multi-user interference and normally necessitates sophisticated network management. Full-duplex capability with support for asynchronous clients provides the means to benefit from the same basic feature of wireless transmission and facilitate network management.
The accompanying figures, where like reference numerals refer to identical or functionally similar elements throughout the separate views, together with the detailed description below, are incorporated in and form part of the specification, and serve to further illustrate embodiments of concepts that include the claimed invention, and explain various principles and advantages of those embodiments.
Skilled artisans will appreciate that elements in the figures are illustrated for simplicity and clarity and have not necessarily been drawn to scale. For example, the dimensions of some of the elements in the figures may be exaggerated relative to other elements to help to improve understanding of embodiments of the present invention.
The apparatus and method components have been represented where appropriate by conventional symbols in the drawings, showing only those specific details that are pertinent to understanding the embodiments of the present invention so as not to obscure the disclosure with details that will be readily apparent to those of ordinary skill in the art having the benefit of the description herein.
Methods are disclosed to benefit from full-duplex capability to simplify practical implementation of network structures, simplify network management, or improve network performance. This includes a traditional network structure, as well as some basic information theoretic setups, such as space division multiple access (SDMA) in down-link (MIMO broadcast) and in the uplink (MIMO multiple access), cooperative signaling towards reducing multi-user interference, and interference channel. The methods mat be explained in terms of using OFDMA for multi-user multiplexing, similar concepts are applicable to other means of multi-user multiplexing, such as CDMA, TDMA and SDMA.
Cognitive transmission is a method to improve spectral efficiency of wireless networks by allowing secondary users to transmit over a spectrum primarily assigned to some primary users as long as the negative side effect on the primary users in managed. One example is the case of sharing a licensed spectrum with un-licensed users, which are allowed to transmit subject to causing zero or minimal interference to the licensed users. In conventional half-duplex networks, it is difficult to manage such a sharing of spectrum, as nodes inherently cannot listen while transmitting. Even in FDD systems, although users can listen while transmitting, they will not be able to manage the impact of their transmission on the reception of the other users in the network as reception and transmission are not in the same frequency band. This can be further generalized to scenarios in which there are several classes of QoS, corresponding to several classes of users, or to different types of data within the same class, e.g., depending on delay sensitivity of data or being emergency information. This disclosure includes strategies to handle the above scenarios. Primary users, or users sending data of a higher QoS requirement, send a signature signal that will be immediately detected by the secondary users, or by users sending data with a lower QoS requirement. Such secondary users will be continually listening and searching for such a signature. Once the signature is detected, secondary users adjust their transmission parameters accordingly, or stop their transmission altogether and continue with the remaining part at a later time when the network becomes once again available to them. Parameters of the periodic signal can be used to identify different classes of users or convey some critical information.
To describe the systems and methods a basic setup is employed. For this purpose, aspects relevant to supporting multiple clients and networking are described assuming OFDMA. However, techniques herein will be applicable if OFDMA is replaced by some other known alternatives, e.g., CDMA, OFDM-CDMA, Direct Sequence (DS)-CDMA, Time-division Multiple Access (TDMA), constellation construction/transmission in time with pulse shaping and equalization, Space Division Multiple Access (SDMA), and their possible combinations.
This disclosure encompasses systems and methods wherein signals for control of Physical Layer (PHY) operations are communicated in parallel with the flow of data. In particular, one of the nodes inserts pilots in its transmit signal to help in synchronizing distant nodes. As another example, transmitting nodes can simultaneously listen to a common synchronizing pilot sent by an external nodes, such as a satellite, and use it towards forming a coherent distributed/co-operative scheme, such as Interference Alignment or distributed MIMO, with support for joint detection of separately encoded messages. In particular, this technique can be applied to an interference channel, and to a MIMO multiple access channel. In the case of SDMA in MIMO broadcast channel, the central node sends a pilot in downlink to synchronize all its client nodes, and each of the client nodes uses part of its up-link channel to feedback its corresponding channel state. In the case of SDMA in MIMO uplink, the central node sends a pilot in downlink to synchronize all its client nodes.
It is desirable that new clients, through sending request-to-join signal, can join an existing network without prior co-ordination. Exploiting full-duplex capability, the Base-Station (BS) or Access Point (AP) can continually monitor its incoming signal in search for such a request-to-join signal. Once such a signal is detected, the node allocates resources to the new client and synchronizes it with the rest (i.e., synchronization within the cyclic prefix of the underling OFDM).
To handle asynchronous clients, receiving node (e.g., AP) will be always listening to detect a valid request-to-join signal, while supporting full-duplex connections to its current clients. In one embodiment, several repetitions of a sequence (i.e., several periods of a periodic sequence) are used as the request-to-join signal. Once such a signal passes through the linear system corresponding to the channel, it results in an almost periodic sequence of the same period. This can be detected at the receiver end by using a simple correlation calculation by sliding two consecutive windows of the length of that period, shifting them through the incoming signal sample by sample, and computing the inner product of the vectors within the two windows. This produces a peak when the periodicity starts, and this peak will continue until the periodicity lasts. It should be ensured that the remaining amount of self-interference does not cause complete loss of this correlation peak. Note that correlation calculation on its own provides a significant boost in signal to noise.
The possibility of supporting two-way links with multiple (initially asynchronous) clients helps with many of the current challenges of wireless networks (cellular and WLAN). Examples are problems of Multiple Access Control (MAC), resource allocation, Quality of Service (QoS), co-operative communications, interference management and scheduling.
Access to a return channel can be used in part (e.g., by allocating a subset of OFDM tones) to facilitate control signaling. This includes sending pilots for time and/or frequency synchronization, ARQ, power control, adaptive coding and modulation, etc. An important usage scenario in this category is the case of co-operative signaling. In recent years, there have been significant work on setups like broadcast channel, multiple access channel and interference channel. Time and frequency synchronization in such setups is a major issue. Access to full-duplex links can facilitate practical implementation of such setups. In one embodiment, one node broadcasts a set of pilots to be used by all network nodes as a reference for their carrier. Another embodiment concerns a scenario that a large number of transmit antennas, each with low transmission power, are used to perform beam-forming in phase and/or polarization for a receiver which has a small number, and in particular, a single antenna.
Access to a return channel also enables the receiver to periodically feedback the channel state (phase, magnitude and/or polarization) corresponding to each transmit antenna to be used by the multiple antenna transmitter for beam forming. This setup can be used to reduce transmit power, and in particular is useful in scenarios that transmit power is limited due to regulatory considerations. In another embodiment, transmitting nodes gather an indication of the amount of interference in different frequency bands through listening while transmitting, and adjust their transmission parameters accordingly.
Possibility of supporting two-way links solves many of resource allocation and scheduling issues that are currently prominent bottlenecks in cost effective and efficient realization of wireless networks. This disclosure includes methods wherein interfering nodes, by listening to each other while transmitting, can form a distributed collaborative signaling scheme. For example, in the case of two-user Interference Channel (IC), the two transmitting nodes can listen to each other during one symbol and then form a distributed space-time code, e.g., an Alamouti code, in the next symbol. This can be achieved by listening to several symbols gathered in a coded block and use this information (after partial or complete decoding of the coded block) to help in the following block(s). Likewise, the two transmitting nodes can listen to each other during one coded block and then form a distributed Alamouti code in the next block. Such setups can be also useful in multiple access scenarios, e.g., when two clients send data to an access point. As an alternative to Alamouti code, transmitter/receiver nodes can adjust their transmission/detection strategies such that each receiver detects its own message, rather than detecting both messages. In the case that the receiver nodes are also full duplex, it is possible to base the second phase (collaboration phase) on either the transmitter (as above) or the receiver. In other words, during the collaboration phase, either or both receivers relay their received message to the other receiver. This feature increases the achieved diversity gain. For example, in the case of two-user interference channel composed of interfering links T1R1 and T2
R2, the following configurations can be used in the collaboration phase (T1,T2), (T1,R1), (T1,R2), (T2,R1), or (T2,R2).
The above cooperative setup can be used in the case of a multiple access channel (the two nodes send data to the same access point). In a more general setup that multiple transmitter/receiver pairs share the spectrum, once a node has access to a data symbol relevant to the other node(s), it can decide to activate its transmitter to relay the received signal within the OFDM cyclic prefix, while continuing to listen to subsequent incoming signals. This feature can be used to enhance diversity, or save energy through a relaying operation (when the relaying nodes enjoy good outgoing channel conditions).
Traditional wireless networks rely on two types of links for exchange of two types of information, namely data and control. One type is to handle the main bulk of data to be communicated (data link) and another type is to handle various control information (control link). Data link is usually of high throughput, and control link is usually of low throughput. A major bottleneck is to establish the control link in a timely manner without causing too much disturbance on the network operation. In current half-duplex networks, data and control links are established either using different frequency bands, or using different time slots. Existing solutions based on frequency division duplex are usually expensive, and existing solutions based on time division duplex are usually inefficient. For example, in 802.11, which is based on time division duplex, a new node that wants to transmit information (data or control) has to wait until channel is idle. This is called Carrier Sense Multiple Access (CSMA) and is the main source of poor efficiency in 802.11. With the wide spread use of smart phones, this problem is expected to become more severe. The reason is that as smart phones move in areas covered by 802.11, they can easily get disconnected from their current access point and subsequently try to get associated with another access point and this requires significant control signaling. Ironically, in most cases, the moving smart phones do not have any actual data to send or receive, but their control signaling usually imposes overwhelming degradations in network delay and throughput. It will be useful if low throughput control links could be established asynchronously and in parallel with high throughput data links. In an embodiment, this is achieved by overlaying a network of low throughput control links on top of the high throughput network of data links. Transmission on the Low Throughput Overlay (LTO) channel forming the control links uses signaling schemes with low power and thereby low spectral efficiency. For example, a transmitter can send several periods of a periodic signal in time domain, which can be detected by a simple correlation calculation using sliding windows. The presence of such a signal indicates incoming control data, and the amplitude and/or phase and/or duration of a basic periodic signal can be varied (with respect a starting periodic signal used as a preamble) to embed the control data. This may also include FEC with a short block length. Nodes, which are interested to participate in the overlay control network, will sense the LTO channel and transmit if the channel is idle (can possibly use a back-off strategy similar to CSMA protocol used in 802.11). To avoid collisions, there is provided a manner to indicate occupancy of the LTO channel which shares (is overlaid on top of) the spectrum used for the main data network. Main data links operate with relatively higher power over the High Throughput Main (HTM) channel. Using methods described herein, this is achieved by searching for the basic periodic signal as a sign of LTO channel being idle or occupied. Nodes involved in signaling over HTM channel can first search for the LTO signal, perform signal detection on it, and then (partially or fully) cancel the LTO signal to reduce its harmful effect on the HTM channel. There is provided a method, in the context of handing asynchronous clients, to establish a framework to implement the above setup of an LTO channel working asynchronously and in parallel with the HTM channel without significantly degrading the HTM channel due to the inherent interference between LTO and HTM channels due to the sharing of spectrum.
At 402, a determination is made whether the communications are over the HTO. If no operations return to the start of operations 400. If yes, operations perform self-interference cancellation in frequency domain, OFDMA networking and transmit/receive operations, possibly detecting/cancelling signal from LTO receive channel prior to decoding data 404.
At 406, a determination is made whether data is received over LTO channel. If yes, at 408, operations perform self-interference cancellation in the time domain and receive data via the LTO channel until all data is received. If data is not received, there may be data to send over the LTO channel (determination at 410). If yes, at 412, operations perform self-interference cancellation in the time domain and search for the periodic sequence indicating if the LTO channel is occupied. At 414 operations determine whether the LTO channel is idle (i.e. available for the communication device). If no, operations return to 412 to try again. If yes, at 416 data is transmitted over the LTO channel superimposed on the periodic signal indicating LTO channel occupancy. At 418, a determination is made whether more data is to be sent over the LTO channel. If yes, operations return to 416. If not, at 420 the device performs self-interference cancellation in the time domain and searches for the periodic sequence indicating if another node (device) wants to initiate communications over the LTO channel. If at 422 there is no incoming communication over the LTO channel, operations may continue at 410. If yes, operations continue at 408 as previously described.
In the context of IC, this disclosure includes methods to cancel the interference at a receiving node through filtering and super-imposing/relaying of the received signal. This feature makes it possible to achieve a multiplexing gain of one in a two-user IC, which is in contrast to the limit of ½ using traditional half-duplex radios. In particular, there is presented a setup in which each transmitter listen to the incoming signal and forwards it (after proper filtering in time domain) to its respective receiver (on top of the desired signal) such that it cancels the interference signal arriving through the cross link. To realize such a cooperative scheme, one needs to account for the delay in exchanging information between transmitters. Methods described herein use a minimum delay dictated by the channel memory as captured in OFDM cyclic prefix. In contrast, in the literature based on using a discrete time model for the underlying channels, the minimum delay for cooperation is assumed to be limited to at least one symbol interval in the discrete time axis. Relying on such a discrete time model limits the potential gain due to such collaborations. The embodiments herein handle the minimum delay requirement at a finer level of granularity. This exploits the fact that tolerance to transmission delay is governed by OFDM cyclic prefix, which is larger than the minimum delay requirement for cooperation as governed by the underlying filtering/relaying operation.
Another embodiment for the application of full-duplex link is a basic interference channel (
Note that using such filters increases the transmit energy and thereby results in decreasing the signal to noise ratio, but it will cancel the interference, and consequently, the multiplexing gain is 1 instead of 0.5 which is the limit for interference channel with half-duplex links.
t1=R1r1′+s1
t2=R2r2′+s2
r1=C11t1+C21t2
r2=C12t1C22t2
r1=G11t1+G21t2
r2=G12t1+G22t2
Another aspect of this disclosure concerns the situation that some or all the control signaling can affect the propagation environment in small increments. In this case, relying on a full duplex link, this disclosure includes methods to form a closed loop between a transmitter and its respective receiver wherein the control signals (affecting the channel impulse response) are adjusted relying on closed loop feedback, e.g., using methods known in the context of adaptive signal processing. Channel impulse response can be changed by modifying the RF properties of the environment external, but close, to the transmit and/or receive antenna(s). The criterion in such adaptive algorithms can be maximizing desired signal, and/or minimizing interference, and/or increasing frequency selectivity for diversity purposes. In such a setup, stability may be compromised due to closed loops. These are one local loop at each node (between transmitter and receiver in the same node due to the remaining self-interference) and the third one is the loop formed between transmitter/receiver of one node and receiver/transmitter of the other node. It should be clear to those skilled in the area that transmit gain, receive gain and gains in local loops of the two units can be adjusted to avoid such undesirable oscillations.
In some embodiments, a method of operating a wireless communication network for establishing communication between a Central Node, e.g., Access Point (AP), Base-station (BS), and respective multiple clients with two-way wireless links, i.e., complete or partial overlap in time as well as in frequency, the wireless communication node comprising a Multiple-Input Multiple-Output (MIMO) antenna system, the method comprising:
Alternative embodiments may include multiple clients connected to the central node sharing a common spectrum using Orthogonal Frequency Division Multiple Access (OFDMA). The method may include neighboring nodes, by listening to each other while transmitting, collaborating in the subsequent transmission symbol(s), or collaborate in subsequent transmission block(s). The method may include the use of part of a return link as a control channel to, at least one of:
The method of some further embodiments may include a central node using part of a forward link to broadcast a common pilot to be used by other nodes for synchronization and thereby enabling joint decoding in a multiple access channel or in an interference channel. Further embodiments may use a MIMO-SDMA network environment wherein part of a return link from each receiver node is used to periodically feedback its corresponding channel state, and wherein part of a forward link from a main transmitter node is used to periodically broadcast a common pilot for synchronization. The methods of further embodiments include a network environment wherein nodes periodically listen while transmitting to measure features of their observed multi-user interference terms, for example energy of interference in different frequency segments, and accordingly adjust their transmit/receive strategies.
Embodiments may also include methods described above used in a network environment wherein a plurality of nodes filter and forward respective receive signals by super-imposing on the respective transmit signals of each respective node such that the corresponding interference term(s) at the respective intended receiver for a node is cancelled. The methods may use a 2-user interference channel wherein a transmit and/or a receive node filter and forward their received signal, including through super-imposing it on their transmit signal if applicable, to cancel the multi-user interference at either or both of receiving nodes. The method may be generalized to more than 2 interfering nodes, wherein transmit and/or receive nodes rely on multiple antennas in order to cancel the multi-user interference terms from several interfering nodes.
Further methods may be used in a cognitive transmission network, wherein
Additional methods may be used in a cognitive network, wherein
An embodiment includes a method for overlaying a network of Low Throughput Control (LTC) links on top of the High Throughput Main (HTM) data links with overlap in time and frequency, and wherein, to enable cancellation on the HTM channel, transmission on the LTO channel uses signaling schemes with low power and thereby low spectral efficiency.
These methods may be used where,
To avoid collisions, some of the above methods may use:
Further methods may rely on a full duplex link to form a closed loop between a transmitter and its respective receiver, wherein the control signals (affecting the channel impulse response) are adjusted relying on closed loop feedback, e.g., using methods known in the context of adaptive signal processing.
Many of the methods described above may be used even where at least one of the clients does not have full-duplex capability.
Still further embodiments include a wireless communication node configured to perform a method according to any one of the previous method claims.
In the foregoing specification, specific embodiments have been described. However, one of ordinary skill in the art appreciates that various modifications and changes can be made without departing from the scope of the invention as set forth in the claims below. Accordingly, the specification and figures are to be regarded in an illustrative rather than a restrictive sense, and all such modifications are intended to be included within the scope of present teachings.
The benefits, advantages, solutions to problems, and any element(s) that may cause any benefit, advantage, or solution to occur or become more pronounced are not to be construed as a critical, required, or essential features or elements of any or all the claims. The invention is defined solely by the appended claims including any amendments made during the pendency of this application and all equivalents of those claims as issued.
Moreover in this document, relational terms such as first and second, top and bottom, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. The terms “comprises,” “comprising,” “has”, “having,” “includes”, “including,” “contains”, “containing” or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises, has, includes, contains a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. An element proceeded by “comprises . . . a”, “has . . . a”, “includes . . . a”, “contains . . . a” does not, without more constraints, preclude the existence of additional identical elements in the process, method, article, or apparatus that comprises, has, includes, contains the element. The terms “a” and “an” are defined as one or more unless explicitly stated otherwise herein. The terms “substantially”, “essentially”, “approximately”, “about” or any other version thereof, are defined as being close to as understood by one of ordinary skill in the art, and in one non-limiting embodiment the term is defined to be within 10%, in another embodiment within 5%, in another embodiment within 1% and in another embodiment within 0.5%. The term “coupled” as used herein is defined as connected, although not necessarily directly and not necessarily mechanically. A device or structure that is “configured” in a certain way is configured in at least that way, but may also be configured in ways that are not listed.
It will be appreciated that some embodiments may be comprised of one or more generic or specialized processors (or “processing devices”) such as microprocessors, digital signal processors, customized processors and field programmable gate arrays (FPGAs) and unique stored program instructions (including both software and firmware) that control the one or more processors to implement, in conjunction with certain non-processor circuits, some, most, or all of the functions of the method and/or apparatus described herein. Alternatively, some or all functions could be implemented by a state machine that has no stored program instructions, or in one or more application specific integrated circuits (ASICs), in which each function or some combinations of certain of the functions are implemented as custom logic. Of course, a combination of the two approaches could be used.
Moreover, an embodiment can be implemented as a computer-readable storage medium having computer readable code stored thereon for programming a computer (e.g., comprising a processor) to perform a method as described and claimed herein. Examples of such computer-readable storage mediums include, but are not limited to, a hard disk, a CD-ROM, an optical storage device, a magnetic storage device, a ROM (Read Only Memory), a PROM (Programmable Read Only Memory), an EPROM (Erasable Programmable Read Only Memory), an EEPROM (Electrically Erasable Programmable Read Only Memory) and a Flash memory. Further, it is expected that one of ordinary skill, notwithstanding possibly significant effort and many design choices motivated by, for example, available time, current technology, and economic considerations, when guided by the concepts and principles disclosed herein will be readily capable of generating such software instructions and programs and ICs with minimal experimentation.
The Abstract of the Disclosure is provided to allow the reader to quickly ascertain the nature of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims. In addition, in the foregoing Detailed Description, it can be seen that various features are grouped together in various embodiments for the purpose of streamlining the disclosure. This method of disclosure is not to be interpreted as reflecting an intention that the claimed embodiments require more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive subject matter lies in less than all features of a single disclosed embodiment. Thus the following claims are hereby incorporated into the Detailed Description, with each claim standing on its own as a separately claimed subject matter.
The present application is continuation application of pending U.S. patent application Ser. No. 15/701,076, entitled “Distributed Collaborative Signaling in Full Duplex Wireless Transceivers,” filed on Sep. 11, 2017, which is continuation application of U.S. patent application Ser. No. 13/893,299, entitled “Distributed Collaborative Signaling in Full Duplex Wireless Transceivers,” filed May 13, 2013, now U.S. Pat. No. 9,763,104, which is a non-provisional filing of, and claims benefit under 35 U.S.C. § 119(e) from, U.S. Provisional Patent Application Ser. No. 61/646,312, entitled “Two-way Wireless Systems and Applications,” filed May 13, 2012, and U.S. Provisional Patent Application Ser. No. 61/771,815, entitled “Two-way (True Full-duplex) Wireless,” filed Mar. 2, 2013, all of which are hereby incorporated herein by reference in their entirety. In addition, this application is related to the following applications, all of which are also incorporated herein by reference in their entirety: 1) U.S. patent application Ser. No. 13/893,288, entitled “Full Duplex Wireless Transmission with Self-Interference Cancellation,” filed on May 13, 2013, now U.S. Pat. No. 9,713,010; 2) U.S. patent application Ser. No. 13/893,296, entitled “Wireless Transmission with Channel State Perturbation,” filed May 13, 2013, now U.S. Pat. No. 9,008,208; 3) U.S. application Ser. No. 13/893,297, entitled “Full Duplex Wireless Transmission with Channel Phase-Based Encryption,” filed May 13, 2013, now U.S. Pat. No. 9,572,038.
Number | Name | Date | Kind |
---|---|---|---|
2995752 | Nicholas et al. | Aug 1961 | A |
3082421 | Nicholas | Mar 1963 | A |
3184747 | Alfred | May 1965 | A |
3725920 | Kupfer et al. | Apr 1973 | A |
3965475 | Deerkoski et al. | Jun 1976 | A |
4112430 | Ladstatter | Sep 1978 | A |
4268727 | Agrawal et al. | May 1981 | A |
4343005 | Han et al. | Aug 1982 | A |
4701935 | Namiki | Oct 1987 | A |
4750165 | Champagne et al. | Jun 1988 | A |
5383224 | Mizoguchi | Jan 1995 | A |
5388124 | Laroia et al. | Feb 1995 | A |
5596439 | Dankberg et al. | Jan 1997 | A |
5630154 | Bolstad et al. | May 1997 | A |
5691978 | Kenworthy | Nov 1997 | A |
5805116 | Morley | Sep 1998 | A |
5892769 | Lee | Apr 1999 | A |
6034638 | Thiel et al. | Mar 2000 | A |
6084919 | Kleider et al. | Jul 2000 | A |
6255997 | Ratkorn et al. | Jul 2001 | B1 |
6281988 | Leung | Aug 2001 | B1 |
6317092 | De et al. | Nov 2001 | B1 |
6369758 | Zhang | Apr 2002 | B1 |
6608864 | Strait | Aug 2003 | B1 |
6621876 | Camp et al. | Sep 2003 | B2 |
6731908 | Berliner et al. | May 2004 | B2 |
6745009 | Raghothaman | Jun 2004 | B2 |
6781991 | Anderlind | Aug 2004 | B1 |
6864852 | Chiang et al. | Mar 2005 | B2 |
6870515 | Kitchener et al. | Mar 2005 | B2 |
6917597 | Schmidl et al. | Jul 2005 | B1 |
6934511 | Lovinggood et al. | Aug 2005 | B1 |
7002518 | Lin et al. | Feb 2006 | B2 |
7065036 | Ryan | Jun 2006 | B1 |
7091894 | Fudge et al. | Aug 2006 | B2 |
7096042 | Marinier | Aug 2006 | B2 |
7184466 | Seemann et al. | Feb 2007 | B1 |
7187907 | Widrow | Mar 2007 | B2 |
7221688 | Vanness | May 2007 | B2 |
7263143 | Rothaar et al. | Aug 2007 | B1 |
7272366 | Haapoja et al. | Sep 2007 | B2 |
7286096 | Jaffer et al. | Oct 2007 | B2 |
7321611 | Fullerton | Jan 2008 | B2 |
7346100 | Kumar | Mar 2008 | B2 |
7471204 | Safarian et al. | Dec 2008 | B2 |
7482058 | Ahmed et al. | Jan 2009 | B2 |
7522115 | Waltman | Apr 2009 | B2 |
7627325 | McCoy | Dec 2009 | B2 |
7693174 | Ishibashi et al. | Apr 2010 | B2 |
7706744 | Rodgers et al. | Apr 2010 | B2 |
7817641 | Khandani | Oct 2010 | B1 |
7920539 | Stanford et al. | Apr 2011 | B2 |
7944871 | Imamura et al. | May 2011 | B2 |
7991160 | Guccione et al. | Aug 2011 | B2 |
3023438 | Kangasmaa et al. | Sep 2011 | A1 |
8031744 | Radunovic et al. | Oct 2011 | B2 |
8064502 | Sawai et al. | Nov 2011 | B2 |
8107906 | Lum et al. | Jan 2012 | B2 |
8175535 | Mu | May 2012 | B2 |
8184052 | Wu et al. | May 2012 | B1 |
8184061 | Sanford | May 2012 | B2 |
8208628 | Yener et al. | Jun 2012 | B2 |
8238551 | Reznik et al. | Aug 2012 | B2 |
8280046 | Rudolf et al. | Oct 2012 | B2 |
8306480 | Muhammad et al. | Nov 2012 | B2 |
8351874 | Dent et al. | Jan 2013 | B2 |
8373582 | Hoffberg | Feb 2013 | B2 |
8385235 | Chiu et al. | Feb 2013 | B2 |
8401196 | Goldberg et al. | Mar 2013 | B2 |
8405543 | Kluge et al. | Mar 2013 | B2 |
8423986 | Grechanik | Apr 2013 | B1 |
8498585 | Vandenameele | Jul 2013 | B2 |
8520855 | Kohno et al. | Aug 2013 | B1 |
8587492 | Runyon | Nov 2013 | B2 |
8628650 | Ah et al. | Jan 2014 | B2 |
8629650 | Mohammadian et al. | Jan 2014 | B2 |
8644768 | Kluge et al. | Feb 2014 | B2 |
8744377 | Rimini et al. | Jun 2014 | B2 |
8767869 | Rimini et al. | Jul 2014 | B2 |
8823577 | Smid et al. | Sep 2014 | B2 |
8836581 | Nysen | Sep 2014 | B2 |
8836601 | Sanford et al. | Sep 2014 | B2 |
8836606 | Kish et al. | Sep 2014 | B2 |
8837615 | Baldemair | Sep 2014 | B2 |
8842044 | Nysen et al. | Sep 2014 | B2 |
8860629 | Shtrom et al. | Oct 2014 | B2 |
8897269 | Ji et al. | Nov 2014 | B2 |
8918692 | Braithwaite | Dec 2014 | B2 |
8976641 | Choi et al. | Mar 2015 | B2 |
9008208 | Khandani | Apr 2015 | B2 |
9019165 | Shtrom et al. | Apr 2015 | B2 |
9036749 | Choi et al. | May 2015 | B2 |
9054795 | Choi et al. | Jun 2015 | B2 |
9059879 | Jaeger et al. | Jun 2015 | B2 |
9071313 | Monsen | Jun 2015 | B2 |
9077071 | Shtrom et al. | Jul 2015 | B2 |
9077407 | Koren et al. | Jul 2015 | B2 |
9077421 | Mehlman et al. | Jul 2015 | B1 |
9093758 | Kish et al. | Jul 2015 | B2 |
9130693 | Reznik et al. | Sep 2015 | B2 |
9236996 | Khandani | Jan 2016 | B2 |
9246234 | Rao et al. | Jan 2016 | B2 |
9276682 | Bharadia et al. | Mar 2016 | B2 |
9277591 | Amini et al. | Mar 2016 | B2 |
9281979 | Maltsev et al. | Mar 2016 | B2 |
9337885 | Mehlman et al. | May 2016 | B2 |
9413516 | Khandani | Aug 2016 | B2 |
9479322 | Khandani | Oct 2016 | B2 |
9571205 | Suarez et al. | Feb 2017 | B1 |
9572038 | Khandani | Feb 2017 | B2 |
9608705 | Maru | Mar 2017 | B2 |
9622098 | Emmanuel et al. | Apr 2017 | B2 |
9713010 | Khandani | Jul 2017 | B2 |
9763104 | Khandani | Sep 2017 | B2 |
9791552 | Schuman | Oct 2017 | B1 |
9820311 | Khandani | Nov 2017 | B2 |
9924512 | Zhang | Mar 2018 | B1 |
9997830 | Khandani | Jun 2018 | B2 |
10063364 | Khandani | Aug 2018 | B2 |
10067746 | Yu | Sep 2018 | B1 |
10068228 | Winklevoss et al. | Sep 2018 | B1 |
10069479 | Desclos | Sep 2018 | B1 |
10177896 | Khandani | Jan 2019 | B2 |
10700766 | Khandani | Jun 2020 | B2 |
10778295 | Khandani | Sep 2020 | B2 |
11012144 | Khandani | May 2021 | B2 |
20010010495 | Helms et al. | Aug 2001 | A1 |
20010024434 | Ayyagari et al. | Sep 2001 | A1 |
20020028655 | Rosener et al. | Mar 2002 | A1 |
20020032004 | Widrow | Mar 2002 | A1 |
20020097810 | Seki | Jul 2002 | A1 |
20030043071 | Lilly et al. | Mar 2003 | A1 |
20030114128 | Haapoja et al. | Jun 2003 | A1 |
20030189974 | Ferry | Oct 2003 | A1 |
20030189975 | Fullerton | Oct 2003 | A1 |
20030206579 | Bryant | Nov 2003 | A1 |
20040022229 | Vanness | Feb 2004 | A1 |
20040027304 | Chiang et al. | Feb 2004 | A1 |
20040076246 | Vanderperren et al. | Apr 2004 | A1 |
20040106381 | Tiller | Jun 2004 | A1 |
20040132414 | Sendyk et al. | Jul 2004 | A1 |
20050020771 | Ahmed et al. | Jan 2005 | A1 |
20050024540 | Kim et al. | Feb 2005 | A1 |
20050052330 | Mehltretter | Mar 2005 | A1 |
20050057420 | Lin et al. | Mar 2005 | A1 |
20050083863 | Umei et al. | Apr 2005 | A1 |
20050129223 | Piket et al. | Jun 2005 | A1 |
20050275576 | Fudge et al. | Dec 2005 | A1 |
20060014491 | Cleveland | Jan 2006 | A1 |
20060045063 | Stanford et al. | Mar 2006 | A1 |
20060109067 | Shtrom | May 2006 | A1 |
20060192720 | Shtrom | Aug 2006 | A1 |
20060274776 | Malik | Dec 2006 | A1 |
20060280147 | Rizvi | Dec 2006 | A1 |
20070026804 | Ishibashi et al. | Feb 2007 | A1 |
20070026807 | Kish | Feb 2007 | A1 |
20070036353 | Reznik et al. | Feb 2007 | A1 |
20070057860 | Jaffer et al. | Mar 2007 | A1 |
20070063875 | Hoffberg | Mar 2007 | A1 |
20070070902 | Elaoud et al. | Mar 2007 | A1 |
20070080891 | De et al. | Apr 2007 | A1 |
20070082617 | McCallister | Apr 2007 | A1 |
20070082622 | Leinonen et al. | Apr 2007 | A1 |
20070118749 | Hagn et al. | May 2007 | A1 |
20070132651 | Nilsson | Jun 2007 | A1 |
20070189528 | Ueda | Aug 2007 | A1 |
20070254692 | McCoy | Nov 2007 | A1 |
20080009257 | Safarian et al. | Jan 2008 | A1 |
20080063113 | Gao et al. | Mar 2008 | A1 |
20080107046 | Kangasmaa et al. | May 2008 | A1 |
20080123851 | Guccione et al. | May 2008 | A1 |
20080125033 | Lee | May 2008 | A1 |
20080129640 | Shtrom et al. | Jun 2008 | A1 |
20080165874 | Steele et al. | Jul 2008 | A1 |
20080233966 | Scheim et al. | Sep 2008 | A1 |
20080294970 | Gross et al. | Nov 2008 | A1 |
20090092072 | Imamura et al. | Apr 2009 | A1 |
20090100313 | Gross et al. | Apr 2009 | A1 |
20090135748 | Lindoff et al. | May 2009 | A1 |
20090141900 | Ye et al. | Jun 2009 | A1 |
20090186582 | Muhammad et al. | Jul 2009 | A1 |
20090190558 | Strutt et al. | Jul 2009 | A1 |
20090213770 | Mu | Aug 2009 | A1 |
20090253385 | Dent et al. | Oct 2009 | A1 |
20090284218 | Mohammadian et al. | Nov 2009 | A1 |
20090323582 | Proctor et al. | Dec 2009 | A1 |
20100003931 | Krishnan et al. | Jan 2010 | A1 |
20100008406 | Sawai et al. | Jan 2010 | A1 |
20100020771 | Ji et al. | Jan 2010 | A1 |
20100022201 | Vandenameele | Jan 2010 | A1 |
20100086012 | Rofougaran et al. | Apr 2010 | A1 |
20100165866 | Sachse et al. | Jul 2010 | A1 |
20100165895 | Elahi et al. | Jul 2010 | A1 |
20100167662 | Kluge et al. | Jul 2010 | A1 |
20100232324 | Radunovic | Sep 2010 | A1 |
20100246434 | Wang | Sep 2010 | A1 |
20100248714 | Kang et al. | Sep 2010 | A1 |
20100271987 | Chiu et al. | Oct 2010 | A1 |
20100321245 | Aoki | Dec 2010 | A1 |
20100322225 | Kumar | Dec 2010 | A1 |
20110080325 | Livneh et al. | Apr 2011 | A1 |
20110110451 | Tsai et al. | May 2011 | A1 |
20110116639 | Kamada et al. | May 2011 | A1 |
20110143655 | Ahn et al. | Jun 2011 | A1 |
20110149714 | Rimini et al. | Jun 2011 | A1 |
20110268100 | Gorokhov et al. | Nov 2011 | A1 |
20120027113 | Gaal et al. | Feb 2012 | A1 |
20120068904 | Shtrom | Mar 2012 | A1 |
20120087424 | Brown et al. | Apr 2012 | A1 |
20120113862 | Santhanam et al. | May 2012 | A1 |
20120159279 | Braithwaite | Jun 2012 | A1 |
20120200158 | Takei | Aug 2012 | A1 |
20120201153 | Bharadia et al. | Aug 2012 | A1 |
20120201173 | Jain et al. | Aug 2012 | A1 |
20120220246 | Kushnir et al. | Aug 2012 | A1 |
20120281834 | Reznik et al. | Nov 2012 | A1 |
20120300680 | Pietsch et al. | Nov 2012 | A1 |
20120327881 | Nakano et al. | Dec 2012 | A1 |
20130010851 | Jaeger et al. | Jan 2013 | A1 |
20130044791 | Rimini et al. | Feb 2013 | A1 |
20130089009 | Li et al. | Apr 2013 | A1 |
20130089021 | Gaal et al. | Apr 2013 | A1 |
20130099974 | Wang et al. | Apr 2013 | A1 |
20130102254 | Cyzs et al. | Apr 2013 | A1 |
20130114468 | Hui et al. | May 2013 | A1 |
20130223419 | Ghosh | Aug 2013 | A1 |
20130286903 | Khojastepour et al. | Oct 2013 | A1 |
20130301487 | Khandani | Nov 2013 | A1 |
20140006797 | Cordella et al. | Jan 2014 | A1 |
20140126675 | Monsen | May 2014 | A1 |
20140135056 | Wang | May 2014 | A1 |
20140157367 | Zhang | Jun 2014 | A1 |
20140169236 | Choi et al. | Jun 2014 | A1 |
20140204808 | Choi et al. | Jul 2014 | A1 |
20140210681 | Shtrom | Jul 2014 | A1 |
20140218248 | Schulz et al. | Aug 2014 | A1 |
20140219139 | Choi et al. | Aug 2014 | A1 |
20140225788 | Schulz et al. | Aug 2014 | A1 |
20140269964 | Du et al. | Sep 2014 | A1 |
20140331061 | Wright et al. | Nov 2014 | A1 |
20140333466 | Mohamadi | Nov 2014 | A1 |
20140334322 | Shtrom et al. | Nov 2014 | A1 |
20140348018 | Bharadia et al. | Nov 2014 | A1 |
20140348032 | Hua et al. | Nov 2014 | A1 |
20140363008 | Chen et al. | Dec 2014 | A1 |
20150029906 | Jana et al. | Jan 2015 | A1 |
20150043323 | Choi et al. | Feb 2015 | A1 |
20150043685 | Choi et al. | Feb 2015 | A1 |
20150049834 | Choi et al. | Feb 2015 | A1 |
20150063176 | Hong et al. | Mar 2015 | A1 |
20150070243 | Kish et al. | Mar 2015 | A1 |
20150078217 | Choi et al. | Mar 2015 | A1 |
20150085830 | Nozaki et al. | Mar 2015 | A1 |
20150139284 | Choi et al. | May 2015 | A1 |
20150146539 | Mehta | May 2015 | A1 |
20150171903 | Mehlman et al. | Jun 2015 | A1 |
20150188646 | Bharadia et al. | Jul 2015 | A1 |
20150223173 | Khojastepour et al. | Aug 2015 | A1 |
20150236750 | Choi et al. | Aug 2015 | A1 |
20150249997 | Clegg | Sep 2015 | A1 |
20150261973 | Ohare et al. | Sep 2015 | A1 |
20150263780 | Mehlman et al. | Sep 2015 | A1 |
20150280893 | Choi et al. | Oct 2015 | A1 |
20150311599 | Shtrom et al. | Oct 2015 | A1 |
20150312905 | Seo et al. | Oct 2015 | A1 |
20150318976 | Eltawil et al. | Nov 2015 | A1 |
20150333847 | Bharadia et al. | Nov 2015 | A1 |
20150334745 | Zhao | Nov 2015 | A1 |
20150341125 | Bharadia et al. | Nov 2015 | A1 |
20150341879 | Shtrom et al. | Nov 2015 | A1 |
20160127876 | Kish et al. | May 2016 | A1 |
20160226653 | Bharadia et al. | Aug 2016 | A1 |
20160248160 | Shtrom | Aug 2016 | A1 |
20160249376 | Kish | Aug 2016 | A1 |
20160283937 | Reese et al. | Sep 2016 | A1 |
20170012696 | Jang | Jan 2017 | A1 |
20170161635 | Oono et al. | Jun 2017 | A1 |
20170195003 | Rosson et al. | Jul 2017 | A1 |
20180075347 | Alistarh et al. | Mar 2018 | A1 |
20180131502 | Askar | May 2018 | A1 |
20180234162 | Kim | Aug 2018 | A1 |
20180288019 | Dinia et al. | Oct 2018 | A1 |
20180373978 | Yu et al. | Dec 2018 | A1 |
Number | Date | Country |
---|---|---|
2180623 | Apr 2010 | EP |
1091437 | Nov 1967 | GB |
H10502220 | Feb 1998 | JP |
20040096404 | Nov 2004 | KR |
20070072629 | Jul 2007 | KR |
20120080231 | Jul 2012 | KR |
9428585 | Dec 1994 | WO |
9622643 | Jul 1996 | WO |
03098823 | Nov 2003 | WO |
2004007497 | Jan 2004 | WO |
2009156510 | Dec 2009 | WO |
2010005951 | Jan 2010 | WO |
2010051232 | May 2010 | WO |
2011065020 | Jun 2011 | WO |
2011148341 | Dec 2011 | WO |
2012042256 | Apr 2012 | WO |
2016014016 | Jan 2016 | WO |
Entry |
---|
International Search Report and Written Opinion for PCT/US2014/042136, dated Dec. 9, 2014, (13 pages). |
European Extended Search Report for EP App. No. 13790160.9, dated Jan. 20, 2016, (9 pages). |
International Search Report and Written Opinion for PCT/US2013/040822, dated Jul. 18, 2013, (8 pages). |
International Search Report for PCT/US2013/040818, dated Jul. 24, 2013, (2 pages). |
European Extended Search Report for EP App. No. 14865287.8, dated Jul. 4, 2017, (7 pages). |
European Extended Search Report for EP App. No. 13790076.7, dated Mar. 2, 2016, (8 pages). |
International Search Report and Written Opinion from PCT/US2014/050968, dated Nov. 19, 2014, (9 pages). |
International Search Report and Written Opinion for PCT/US2014/051137, dated Nov. 24, 2014, (10 pages). |
European Extended Search Report for EP App. No. 13790948.7, dated Nov. 4, 2015, (9 pages). |
Aono, Tomoyuki, et al., “Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels”, IEEE Transactions On Antennas and Propagation, IEEE Service Center, Piscataway, NJ, US, vol. 53, No. 11; XP001512766, ISSN: 0018-926X, DOI: 10.1109/TAP.2005.858853, Nov. 2005, 3776-3784. |
Chen, Brian , et al., “Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding”, IEEE Transaction on Information Theory, vol. 47, May 2001, 1423-1443. |
Choi, Jung Il, et al., “Achieving Single Channel, Full Duplex Wireless Communication”, Proceedings from the Annual International Conference on Mobile Computing and Networking, MOBICOM-MOBICOM 10 And MOBIHOC 10-Proceedings of the 16th Annual Intl Conference on Mobile Computing and Networking and 11th ACM Intl Symposi, XP002696691., Sep. 20, 2010, 1-12. |
Gharavol, Ebrahim A, et al., “Robust Joint Optimization of MIMO Two-Way Relay Channels With Imperfect CSI”, 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton), Monticello, IL, USA , IEEE, Sep. 28, 2011, 1665-1669. |
Jain, Mayank , et al., “Practical, Real-Time, Full Duplex Wireless”, MobiCom '11 Proceedings of the 17th annual International conference on Mobile computing and networking; Las Vegas, Nevada, USA, Sep. 19, 2011, 1-12. |
Khandani, Amir K, “Two-way (true full-duplex) wireless”, 2013 13th Canadian Workshop on Information Theory, IEEE, XP032495648, DOI: 10.1109/CWIT.2013 6621588 , [retrieved on Oct. 4, 2013], Jun. 18, 2013, 33-38. |
McMichael, Joseph G, et al., “Optimal tuning of analog self-interference cancellers for full-duplex wireless communication”, 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton), IEEE, Monticello, IL, USA, Oct. 1, 2012, 246-251.0 |
Persson, Daniel , et al., “Joint Source-Channel Coding for the MIMO Broadcast Channel”, IEEE Transactions on Signal Processing, vol. 60, No. 4, IEEE Signal Processing Society, Dec. 21, 2011, 2085-2090. |
Vaze, Rahul , et al., “To Code or Not to Code in Multi-Hop Relay Channels”, Arxiv.org, Cornell University Library, May 20, 2008, 1-30. |
Ding, Cunsheng , et al., “A Generic Construction of Cartesian Authentication Codes”, IEEE Transactions On Information Theory, vol. 53, No. 6, Jun. 2007, 2229-2235. |
International Preliminary Report on Patentability for PCT/US2013/040822, dated Nov. 18, 2014, (6 pages). |
Number | Date | Country | |
---|---|---|---|
20200220705 A1 | Jul 2020 | US |
Number | Date | Country | |
---|---|---|---|
61771815 | Mar 2013 | US | |
61646312 | May 2012 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 15701076 | Sep 2017 | US |
Child | 16730531 | US | |
Parent | 13893299 | May 2013 | US |
Child | 15701076 | US |